
From mystyle0029@gmail.com  Fri Feb  1 04:20:28 2013
Return-Path: <mystyle0029@gmail.com>
X-Original-To: oauth@ietfa.amsl.com
Delivered-To: oauth@ietfa.amsl.com
Received: from localhost (localhost [127.0.0.1]) by ietfa.amsl.com (Postfix) with ESMTP id 890E021F8671 for <oauth@ietfa.amsl.com>; Fri,  1 Feb 2013 04:20:28 -0800 (PST)
X-Virus-Scanned: amavisd-new at amsl.com
X-Spam-Flag: NO
X-Spam-Score: -3.598
X-Spam-Level: 
X-Spam-Status: No, score=-3.598 tagged_above=-999 required=5 tests=[BAYES_00=-2.599, HTML_MESSAGE=0.001, RCVD_IN_DNSWL_LOW=-1]
Received: from mail.ietf.org ([64.170.98.30]) by localhost (ietfa.amsl.com [127.0.0.1]) (amavisd-new, port 10024) with ESMTP id ylUY0pjafwtl for <oauth@ietfa.amsl.com>; Fri,  1 Feb 2013 04:20:15 -0800 (PST)
Received: from mail-wg0-f46.google.com (mail-wg0-f46.google.com [74.125.82.46]) by ietfa.amsl.com (Postfix) with ESMTP id 5C10821F866E for <oauth@ietf.org>; Fri,  1 Feb 2013 04:20:15 -0800 (PST)
Received: by mail-wg0-f46.google.com with SMTP id fg15so2768827wgb.1 for <oauth@ietf.org>; Fri, 01 Feb 2013 04:20:14 -0800 (PST)
DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=gmail.com; s=20120113; h=mime-version:x-received:date:message-id:subject:from:to:cc :content-type; bh=wO4gVaP/v+RiCBRj0UoPFkbphaluTI7FIJ2ypbw5Ack=; b=e05JGgqNwnjVW2RFfvUaz6VznAxXbnt8ARtX1ZReJzHwYoGPnAl+7sEKaK5ENelgwt eKZp0NZUMknfKnvyBu1wmuq6ckz8z43QQlAPsJ77H7Ys6OmgmKBEf72B5jWdx4UOv0S/ NiGbY2rZ5CT4bGDPVgPAgkFDbjpB528X4/9H8BsHOpaKypgy2GaN23Z6yjLNUo1IpPhM wxvRM/e0I2gH44kayEp54GeRAjziSdG59sBDAGOnJyGaLXMYNaI5b77ualpLACV/ILWd mjMaEhj1VcNux9nFLqLa4lHWO+pGrXSSqkzQs+6AyTtJfAcuq2DDB+K9tH4WeSi/Nmuo S0rA==
MIME-Version: 1.0
X-Received: by 10.180.90.147 with SMTP id bw19mr2416433wib.28.1359721214405; Fri, 01 Feb 2013 04:20:14 -0800 (PST)
Received: by 10.180.84.1 with HTTP; Fri, 1 Feb 2013 04:20:14 -0800 (PST)
Date: Fri, 1 Feb 2013 17:50:14 +0530
Message-ID: <CAP6-JGY9tbaNTgjRJ3iXZMAQ5Uo_PDtS7J_GgBnTawE949ZBaA@mail.gmail.com>
From: Yogesh Miki <mystyle0029@gmail.com>
To: "oauth@ietf.org" <oauth@ietf.org>
Content-Type: multipart/alternative; boundary=f46d04389251fa6bff04d4a8c36d
Cc: Yogesh Dhiman Miki <mystyle0029@gmail.com>
Subject: [OAUTH-WG] confm
X-BeenThere: oauth@ietf.org
X-Mailman-Version: 2.1.12
Precedence: list
List-Id: OAUTH WG <oauth.ietf.org>
List-Unsubscribe: <https://www.ietf.org/mailman/options/oauth>, <mailto:oauth-request@ietf.org?subject=unsubscribe>
List-Archive: <http://www.ietf.org/mail-archive/web/oauth>
List-Post: <mailto:oauth@ietf.org>
List-Help: <mailto:oauth-request@ietf.org?subject=help>
List-Subscribe: <https://www.ietf.org/mailman/listinfo/oauth>, <mailto:oauth-request@ietf.org?subject=subscribe>
X-List-Received-Date: Fri, 01 Feb 2013 12:20:28 -0000

--f46d04389251fa6bff04d4a8c36d
Content-Type: text/plain; charset=ISO-8859-1

pl  conf e mail account

-- 
Mystyle0029

--f46d04389251fa6bff04d4a8c36d
Content-Type: text/html; charset=ISO-8859-1
Content-Transfer-Encoding: quoted-printable

pl =A0conf e mail account <br><br>-- <br>Mystyle0029<br><br>

--f46d04389251fa6bff04d4a8c36d--

From lt.sego@gmail.com  Thu Jan 31 06:02:22 2013
Return-Path: <lt.sego@gmail.com>
X-Original-To: oauth@ietfa.amsl.com
Delivered-To: oauth@ietfa.amsl.com
Received: from localhost (localhost [127.0.0.1]) by ietfa.amsl.com (Postfix) with ESMTP id CDA0321F8470 for <oauth@ietfa.amsl.com>; Thu, 31 Jan 2013 06:02:22 -0800 (PST)
X-Virus-Scanned: amavisd-new at amsl.com
X-Spam-Flag: NO
X-Spam-Score: -3.598
X-Spam-Level: 
X-Spam-Status: No, score=-3.598 tagged_above=-999 required=5 tests=[BAYES_00=-2.599, HTML_MESSAGE=0.001, RCVD_IN_DNSWL_LOW=-1]
Received: from mail.ietf.org ([64.170.98.30]) by localhost (ietfa.amsl.com [127.0.0.1]) (amavisd-new, port 10024) with ESMTP id eLsWi7+YfFR4 for <oauth@ietfa.amsl.com>; Thu, 31 Jan 2013 06:02:17 -0800 (PST)
Received: from mail-vb0-f50.google.com (mail-vb0-f50.google.com [209.85.212.50]) by ietfa.amsl.com (Postfix) with ESMTP id ADC4021F8457 for <oauth@ietf.org>; Thu, 31 Jan 2013 06:02:17 -0800 (PST)
Received: by mail-vb0-f50.google.com with SMTP id ft2so1730286vbb.23 for <oauth@ietf.org>; Thu, 31 Jan 2013 06:02:17 -0800 (PST)
DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=gmail.com; s=20120113; h=x-received:mime-version:sender:from:date:x-google-sender-auth :message-id:subject:to:content-type; bh=zSIuY4h8/P8i+MYb+zEc2mcsjRud0XFJDF7hFDdnNhw=; b=ASLrWQCaw+7PbSD7coMzyZmnV6lkyWGPpwTIVojM8/p506uhym9Hnohx/cjOfwHHK4 QKamAUyzaas2e6nMVjijAuHzt91D2pdHzndnN3FuLYz0ZrhVk0DyHS0k+oW/GEsUQXSa 269Zujx+xgW5IKkiKtDK0TCAFG838Uc+jGVAJqcjGiDzbMHupaknAZQ56fYECIYE/APx ierw5+2Wb3DCG3EfbgobjBmoo1VjQexBQSUPxugKqK97Jh5i8eGUBsE6Kai1fUBh98nu 9nizMfMuHjn8Fj+g27SlFRPBmW+ZIrMDEOBoMKqjPcIueM9vkra1MfHjoTJytHAsswA8 3Gfw==
X-Received: by 10.52.69.39 with SMTP id b7mr7004636vdu.124.1359640936979; Thu, 31 Jan 2013 06:02:16 -0800 (PST)
MIME-Version: 1.0
Sender: lt.sego@gmail.com
Received: by 10.58.238.166 with HTTP; Thu, 31 Jan 2013 06:01:56 -0800 (PST)
From: "L. Preston Sego III" <LPSego3@gmail.com>
Date: Thu, 31 Jan 2013 09:01:56 -0500
X-Google-Sender-Auth: rwHdysE2RJac6kbRW3QOm628-U4
Message-ID: <CAEeqsMaCyF31X50=A6qM7QU2zbMLoSE4C-F8oe5NrWyiCb8hZA@mail.gmail.com>
To: oauth@ietf.org
Content-Type: multipart/alternative; boundary=90e6ba475d4f121ea504d4961391
X-Mailman-Approved-At: Fri, 01 Feb 2013 07:29:08 -0800
Subject: [OAUTH-WG] Where / how do we report security risks?
X-BeenThere: oauth@ietf.org
X-Mailman-Version: 2.1.12
Precedence: list
List-Id: OAUTH WG <oauth.ietf.org>
List-Unsubscribe: <https://www.ietf.org/mailman/options/oauth>, <mailto:oauth-request@ietf.org?subject=unsubscribe>
List-Archive: <http://www.ietf.org/mail-archive/web/oauth>
List-Post: <mailto:oauth@ietf.org>
List-Help: <mailto:oauth-request@ietf.org?subject=help>
List-Subscribe: <https://www.ietf.org/mailman/listinfo/oauth>, <mailto:oauth-request@ietf.org?subject=subscribe>
X-List-Received-Date: Thu, 31 Jan 2013 14:04:28 -0000

--90e6ba475d4f121ea504d4961391
Content-Type: text/plain; charset=ISO-8859-1

Don't want hackers to try anything on oauth2-using applications...

--90e6ba475d4f121ea504d4961391
Content-Type: text/html; charset=ISO-8859-1

<div dir="ltr">Don&#39;t want hackers to try anything on oauth2-using applications...</div>

--90e6ba475d4f121ea504d4961391--

From wmills_92105@yahoo.com  Fri Feb  1 07:31:05 2013
Return-Path: <wmills_92105@yahoo.com>
X-Original-To: oauth@ietfa.amsl.com
Delivered-To: oauth@ietfa.amsl.com
Received: from localhost (localhost [127.0.0.1]) by ietfa.amsl.com (Postfix) with ESMTP id 84CB021E803D for <oauth@ietfa.amsl.com>; Fri,  1 Feb 2013 07:31:05 -0800 (PST)
X-Virus-Scanned: amavisd-new at amsl.com
X-Spam-Flag: NO
X-Spam-Score: -0.648
X-Spam-Level: 
X-Spam-Status: No, score=-0.648 tagged_above=-999 required=5 tests=[AWL=-0.650, BAYES_50=0.001, HTML_MESSAGE=0.001]
Received: from mail.ietf.org ([64.170.98.30]) by localhost (ietfa.amsl.com [127.0.0.1]) (amavisd-new, port 10024) with ESMTP id mVr1sxexAbIy for <oauth@ietfa.amsl.com>; Fri,  1 Feb 2013 07:31:05 -0800 (PST)
Received: from nm17.bullet.mail.bf1.yahoo.com (nm17.bullet.mail.bf1.yahoo.com [98.139.212.176]) by ietfa.amsl.com (Postfix) with SMTP id DE7D221E8030 for <oauth@ietf.org>; Fri,  1 Feb 2013 07:31:04 -0800 (PST)
Received: from [98.139.212.145] by nm17.bullet.mail.bf1.yahoo.com with NNFMP; 01 Feb 2013 15:31:04 -0000
Received: from [98.139.215.228] by tm2.bullet.mail.bf1.yahoo.com with NNFMP; 01 Feb 2013 15:31:04 -0000
Received: from [127.0.0.1] by omp1068.mail.bf1.yahoo.com with NNFMP; 01 Feb 2013 15:31:04 -0000
X-Yahoo-Newman-Property: ymail-3
X-Yahoo-Newman-Id: 193289.59015.bm@omp1068.mail.bf1.yahoo.com
Received: (qmail 40215 invoked by uid 60001); 1 Feb 2013 15:31:03 -0000
DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=yahoo.com; s=s1024; t=1359732663; bh=TD/tDN9Ey43A1os8P2h17D6gy8emcj3xBhtkASeybN8=; h=X-YMail-OSG:Received:X-Rocket-MIMEInfo:X-Mailer:References:Message-ID:Date:From:Reply-To:Subject:To:In-Reply-To:MIME-Version:Content-Type; b=6OZpqiFTbKit/stDUoKr5avutU5Ai6+TZi/4uHPy0EhpjVq2ZSLQ9EhtlJFhFOvL1V/3sfdqk8bNbs+pNH8q05/3urFPEF8Fbc1oZep/0wXN8KIIE4MLwIiy22PaYpSirWSKR/CUc9ob0wwvxQkLTw+qibZNUOD/U0tKUkMeaYY=
DomainKey-Signature: a=rsa-sha1; q=dns; c=nofws; s=s1024; d=yahoo.com; h=X-YMail-OSG:Received:X-Rocket-MIMEInfo:X-Mailer:References:Message-ID:Date:From:Reply-To:Subject:To:In-Reply-To:MIME-Version:Content-Type; b=RX6v5fKdws//OwC91CTU26Z39SyMT4RcDF/Cc/u7pxGE8KpdshS+BBEdljZCRjsIsmf5rjHLVUVzMz0yr7Lb/mCdjednTixVnzJ+3QGd0nCAhy3vvIkv9l/M9c3IyY7ZXtlrjO1W7zBOnUEAfCif+ex+MmgHvslwrWBtB4qkG4s=;
X-YMail-OSG: 8NX.Hk4VM1mxLc8CrNc3EGdMyyR_c7RRkdCBGbS7dEpX_Uf aMrihywcbrqamHRav7vhOcs3mZg_Jaz4zmSMM7jg8xfvHyLas8WwLhe5REnU DaUtEVB9RD5hFdmujzqg7PoqrBzyyUYCm5iNTmmqinnOtRTbFd9QRyCWk1zx 7E1FnFJk0_WNVAeLXK.8ZG6bgPvsXV9BO8KYmOQ00IngjRn23bT7WsllH_GA pQgjBIEzq6U7iPmDtKAqOrLsOideWK9JyyYboi.JkvZd8oyPxPr2KEwv1gYt fUinIK8LZFwFLTNwsAvWmDUFWmHFxTIkMTTOam98.k8dYPLYMVWm8frvwoj_ OXVgRXgYPsBwwT9h4sxK9uENhFveko4uSxxVZmuAlZeEv_gUX1SKpEFJxDbB Qc0ibQrsS009bj1HFCxX4BHgTM8fhUZtiPsBS2GW1jrJacr39l8vwHEoMRZW q9GFPlitaIx1_Czov2YzcAggwfq.6YPaUM_M0AckxoF6v_F0w87iBT_IjJ2N SdySj7BS0E3FhFlVPEANz4ACQxINNaJ5_ZP2Jpw--
Received: from [99.31.212.42] by web31808.mail.mud.yahoo.com via HTTP; Fri, 01 Feb 2013 07:31:03 PST
X-Rocket-MIMEInfo: 001.001, SGVyZSBpcyBwcm9iYWJseSB5b3VyIGJlc3QgYmV0IGlmIGl0J3MgYSBkZXNpZ24gcXVlc3Rpb24uIMKgSWYgaXQncyBhIHNwZWNpZmljIGltcGxlbWVudGF0aW9uIHRoZW4gc2VuZCBpdCB0byB0aGUgY29tcGFueSBpbiBxdWVzdGlvbiBmaXJzdCBpZiB5b3UgdGhpbmsgdGhleSBoYXZlIGEgdnVsbmVyYWJpbGl0eS4KCgpfX19fX19fX19fX19fX19fX19fX19fX19fX19fX19fXwogRnJvbTogTC4gUHJlc3RvbiBTZWdvIElJSSA8TFBTZWdvM0BnbWFpbC5jb20.ClRvOiBvYXV0aEBpZXRmLm9yZyAKU2VudDogVGgBMAEBAQE-
X-Mailer: YahooMailWebService/0.8.132.503
References: <CAEeqsMaCyF31X50=A6qM7QU2zbMLoSE4C-F8oe5NrWyiCb8hZA@mail.gmail.com>
Message-ID: <1359732663.49190.YahooMailNeo@web31808.mail.mud.yahoo.com>
Date: Fri, 1 Feb 2013 07:31:03 -0800 (PST)
From: William Mills <wmills_92105@yahoo.com>
To: "L. Preston Sego III" <LPSego3@gmail.com>, "oauth@ietf.org" <oauth@ietf.org>
In-Reply-To: <CAEeqsMaCyF31X50=A6qM7QU2zbMLoSE4C-F8oe5NrWyiCb8hZA@mail.gmail.com>
MIME-Version: 1.0
Content-Type: multipart/alternative; boundary="258328648-2097133209-1359732663=:49190"
Subject: Re: [OAUTH-WG] Where / how do we report security risks?
X-BeenThere: oauth@ietf.org
X-Mailman-Version: 2.1.12
Precedence: list
Reply-To: William Mills <wmills_92105@yahoo.com>
List-Id: OAUTH WG <oauth.ietf.org>
List-Unsubscribe: <https://www.ietf.org/mailman/options/oauth>, <mailto:oauth-request@ietf.org?subject=unsubscribe>
List-Archive: <http://www.ietf.org/mail-archive/web/oauth>
List-Post: <mailto:oauth@ietf.org>
List-Help: <mailto:oauth-request@ietf.org?subject=help>
List-Subscribe: <https://www.ietf.org/mailman/listinfo/oauth>, <mailto:oauth-request@ietf.org?subject=subscribe>
X-List-Received-Date: Fri, 01 Feb 2013 15:31:05 -0000

--258328648-2097133209-1359732663=:49190
Content-Type: text/plain; charset=iso-8859-1
Content-Transfer-Encoding: quoted-printable

Here is probably your best bet if it's a design question. =A0If it's a spec=
ific implementation then send it to the company in question first if you th=
ink they have a vulnerability.=0A=0A=0A________________________________=0A =
From: L. Preston Sego III <LPSego3@gmail.com>=0ATo: oauth@ietf.org =0ASent:=
 Thursday, January 31, 2013 6:01 AM=0ASubject: [OAUTH-WG] Where / how do we=
 report security risks?=0A =0A=0ADon't want hackers to try anything on oaut=
h2-using applications...=0A_______________________________________________=
=0AOAuth mailing list=0AOAuth@ietf.org=0Ahttps://www.ietf.org/mailman/listi=
nfo/oauth
--258328648-2097133209-1359732663=:49190
Content-Type: text/html; charset=iso-8859-1
Content-Transfer-Encoding: quoted-printable

<html><body><div style=3D"color:#000; background-color:#fff; font-family:Co=
urier New, courier, monaco, monospace, sans-serif;font-size:12pt"><div><spa=
n>Here is probably your best bet if it's a design question. &nbsp;If it's a=
 specific implementation then send it to the company in question first if y=
ou think they have a vulnerability.</span></div><div><br></div>  <div style=
=3D"font-family: 'Courier New', courier, monaco, monospace, sans-serif; fon=
t-size: 12pt;"> <div style=3D"font-family: 'times new roman', 'new york', t=
imes, serif; font-size: 12pt;"> <div dir=3D"ltr"> <font size=3D"2" face=3D"=
Arial"> <hr size=3D"1">  <b><span style=3D"font-weight:bold;">From:</span><=
/b> L. Preston Sego III &lt;LPSego3@gmail.com&gt;<br> <b><span style=3D"fon=
t-weight: bold;">To:</span></b> oauth@ietf.org <br> <b><span style=3D"font-=
weight: bold;">Sent:</span></b> Thursday, January 31, 2013 6:01 AM<br> <b><=
span style=3D"font-weight: bold;">Subject:</span></b> [OAUTH-WG] Where / ho=
w do we report
 security risks?<br> </font> </div> <br>=0A<div id=3D"yiv153858524"><div di=
r=3D"ltr">Don't want hackers to try anything on oauth2-using applications..=
.</div>=0A</div><br>_______________________________________________<br>OAut=
h mailing list<br><a ymailto=3D"mailto:OAuth@ietf.org" href=3D"mailto:OAuth=
@ietf.org">OAuth@ietf.org</a><br><a href=3D"https://www.ietf.org/mailman/li=
stinfo/oauth" target=3D"_blank">https://www.ietf.org/mailman/listinfo/oauth=
</a><br><br><br> </div> </div>  </div></body></html>
--258328648-2097133209-1359732663=:49190--

From torsten@lodderstedt.net  Sun Feb  3 01:41:58 2013
Return-Path: <torsten@lodderstedt.net>
X-Original-To: oauth@ietfa.amsl.com
Delivered-To: oauth@ietfa.amsl.com
Received: from localhost (localhost [127.0.0.1]) by ietfa.amsl.com (Postfix) with ESMTP id 0BF8421F8584 for <oauth@ietfa.amsl.com>; Sun,  3 Feb 2013 01:41:58 -0800 (PST)
X-Virus-Scanned: amavisd-new at amsl.com
X-Spam-Flag: NO
X-Spam-Score: 0.388
X-Spam-Level: 
X-Spam-Status: No, score=0.388 tagged_above=-999 required=5 tests=[BAYES_00=-2.599, HELO_EQ_DE=0.35, HTML_MESSAGE=0.001, MIME_QP_LONG_LINE=1.396, SARE_LWSHORTT=1.24]
Received: from mail.ietf.org ([64.170.98.30]) by localhost (ietfa.amsl.com [127.0.0.1]) (amavisd-new, port 10024) with ESMTP id aoQXtQEa7otI for <oauth@ietfa.amsl.com>; Sun,  3 Feb 2013 01:41:56 -0800 (PST)
Received: from smtprelay01.ispgateway.de (smtprelay01.ispgateway.de [80.67.31.24]) by ietfa.amsl.com (Postfix) with ESMTP id 4FDAD21F84BF for <oauth@ietf.org>; Sun,  3 Feb 2013 01:41:54 -0800 (PST)
Received: from [79.253.33.56] (helo=[192.168.71.56]) by smtprelay01.ispgateway.de with esmtpsa (TLSv1:AES128-SHA:128) (Exim 4.68) (envelope-from <torsten@lodderstedt.net>) id 1U1w57-0000gl-2d; Sun, 03 Feb 2013 10:41:49 +0100
References: <006401cdfe5f$2555f170$7001d450$@reminetworks.com> <51085B43.3080103@aol.com> <00c901cdfe80$e7d0eb30$b772c190$@reminetworks.com>
Mime-Version: 1.0 (1.0)
In-Reply-To: <00c901cdfe80$e7d0eb30$b772c190$@reminetworks.com>
Content-Type: multipart/alternative; boundary=Apple-Mail-A3195BD8-5251-4F5B-A5A1-D9FE000AD6D0
Content-Transfer-Encoding: 7bit
Message-Id: <9DFD603A-1170-41D8-A22F-8654D55546B3@lodderstedt.net>
X-Mailer: iPad Mail (10B141)
From: Torsten Lodderstedt <torsten@lodderstedt.net>
Date: Sun, 3 Feb 2013 10:41:50 +0100
To: Donald F Coffin <donald.coffin@reminetworks.com>
X-Df-Sender: dG9yc3RlbkBsb2RkZXJzdGVkdC1vbmxpbmUuZGU=
Cc: John Adkins <jva2@pge.com>, Marty Burns <marty@hypertek.us>, Scott Crowder <scott.crowder@qadoenergy.com>, Dave Robin <drobin@automatedlogic.com>, John Teeter <john.teeter@peoplepowerco.com>, "<pmadsen@pingidentity.com>" <pmadsen@pingidentity.com>, Edward Denson <ewd7@pge.com>, "<oauth@ietf.org>" <oauth@ietf.org>, Ray Perlner <ray.perlner@nist.gov>, Anne Hendry <ahendry2@gmail.com>, Lynne Rodoni <mrodoni@semprautilities.com>, Uday Verma <uday.verma@ilinknet.com>
Subject: Re: [OAUTH-WG] draft-ietf-oauth-revocation-04
X-BeenThere: oauth@ietf.org
X-Mailman-Version: 2.1.12
Precedence: list
List-Id: OAUTH WG <oauth.ietf.org>
List-Unsubscribe: <https://www.ietf.org/mailman/options/oauth>, <mailto:oauth-request@ietf.org?subject=unsubscribe>
List-Archive: <http://www.ietf.org/mail-archive/web/oauth>
List-Post: <mailto:oauth@ietf.org>
List-Help: <mailto:oauth-request@ietf.org?subject=help>
List-Subscribe: <https://www.ietf.org/mailman/listinfo/oauth>, <mailto:oauth-request@ietf.org?subject=subscribe>
X-List-Received-Date: Sun, 03 Feb 2013 09:41:58 -0000

--Apple-Mail-A3195BD8-5251-4F5B-A5A1-D9FE000AD6D0
Content-Type: text/plain;
	charset=utf-8
Content-Transfer-Encoding: quoted-printable

Hi Donald,

thanks for your interest in OAuth and specifically the revocation draft. I h=
ave added my comments inline.

@George: thanks for answering Donald's questions in the first place. I'm obv=
iously to occupied with my day time work right now to react quickly.

regards,
Torsten.

Am 30.01.2013 um 01:29 schrieb "Donald F Coffin" <donald.coffin@reminetworks=
.com>:

> George,
> =20
> Thanks for the quick response.  I=E2=80=99ve added my comments after your r=
esponses below.
> =20
> Best regards,
> Don
> Donald F. Coffin
> Founder/CTO
> =20
> REMI Networks
> 22751 El Prado Suite 6216
> Rancho Santa Margarita, CA  92688-3836
> =20
> Phone:      (949) 636-8571
> Email:       donald.coffin@reminetworks.com
> =20
> From: George Fletcher [mailto:gffletch@aol.com]=20
> Sent: Tuesday, January 29, 2013 3:29 PM
> To: Donald F Coffin
> Cc: Torsten Lodderstedt; John Adkins; Scott Crowder; Dave Robin; John Teet=
er; pmadsen@pingidentity.com; Edward Denson; Marty Burns; Uday Verma; Ray Pe=
rlner; Anne Hendry; Lynne Rodoni; oauth@ietf.org
> Subject: Re: [OAUTH-WG] draft-ietf-oauth-revocation-04
> =20
> First, just want to say this is a great write up of the situation. Thanks!=

>=20
> A couple of additional thoughts regarding token management and processing.=
..
>=20
> 1. If all tokens being revoked are tokens issued by the same Authorization=
 Server (AS) then it can easily mark which are refresh and which are access s=
uch that I'm not sure an additional parameter is needed. If the issue is int=
egrating with legacy tokens, then I can see a short term need as an optimiza=
tion while the tokens rotate through. The question is whether the short term=
 need of the parameter justifies it if long term it's not needed. Maybe an o=
ption is for the ESPI profile to specify an additional parameter that is not=
 required by this spec.
>=20
> [Don] A few utilities have launched =E2=80=9CConnect My Data=E2=80=9D prog=
rams with Third Party applications, but these are using Certificates as a me=
ans of identifying Third Party applications.  There are no utilities, to my k=
nowledge, with =E2=80=9CConnect My Data=E2=80=9D programs that have implemen=
ted OAuth 2.0.  The current ESPI Standard requires the implementation of OAu=
th 1.0.  Therefore, there should not be a legacy token issue.  As a result o=
f the work our group is doing, we will shortly submit a request to NAESB to r=
evise the existing standard to reflect the migration from OAuth 1.0 to OAuth=
 2.0.
>=20
> Your suggestion to =E2=80=9Cmark which are refresh and which are access=E2=
=80=9D tokens while providing a method to identify what type of token was is=
sued after it has been found, still poses a processing problem if the only p=
arameter on the Token Revocation request is the Token.  Even implementing yo=
ur suggestion it will still be necessary to scan the entire set of Tokens to=
 locate and identify what type of Token is being revoked.  If a token_type p=
arameter is provided with the Token Revocation request the only Tokens that n=
eed to be scanned are those matching the type being revoked.  This will sign=
ificantly reduce the size of the dataset and therefore expedite the search. =
 I realize assigning the Token value as an index key would also improve the r=
etrieval time.  Since that is an implementation feature, it is beyond the sc=
ope of the activity our group is chartered to perform.

The effort needed directly depends on your token design. If, for example, ac=
cess and refresh tokens could be distinguished by the first byte (like magic=
 bytes in data files), things are evenly easy than having the additional par=
ameter. If your need to issue a database lookup, things get more processing i=
ntensive.

I'm not against adding the parameter (again). We had this discussion for qui=
te a while and decided against adding it again because of the current stage o=
f the draft.

see also http://www.ietf.org/mail-archive/web/oauth/current/msg10211.html fo=
r the options we had discussed.

>=20
>=20
> 2. I don't think you can always revoke the refresh_token if an access_toke=
n is revoked. I can see a use case where a client gets a refresh_token and a=
n access_token. The client uses the access_token for 5 minutes but the acces=
s_token is good for an hour. So the client revokes the access_token to ensur=
e it can't be used again. The client will just use it's refresh_token when i=
t needs another access_token. In this case, revoking the refresh_token would=
 "break" the client. In addition, unless you add audience style checking to t=
he token processing rules, you open up the AS to a denial of service attack.=
 Basically, if the AS revokes the refresh_token when an access_token is revo=
ked, I can steal an access_token and send it to the revocation endpoint caus=
ing the real client's refresh_token to be revoked. To prevent this, the toke=
ns should be bound to the client_id to which they were issued, and should on=
ly be revocable from that client_id.
> =20
> [Don] The focus of the ESPI Standard is to provide Retail Customer=E2=80=99=
s with access to a single UsagePoint (i.e. their Smart Meter).  Therefore an=
 access and refresh token will be tightly correlated with the type and frequ=
ency of data the Smart Meter provides.  There are only a few reasons defined=
 within the ESPI Standard list of use cases that will require the Token Revo=
cation request to be issued.  The following summarizes the situations that r=
equire a Token Revocation request:
>=20
> =C2=B7         A Third Party application wishes to terminate their relatio=
nship with a Retail Customer.
>=20
> =C2=B7         A Third Party application wishes to terminate their relatio=
nship with a Data Custodian.
>=20
> =C2=B7         A Retail Customer wishes to terminate their relationship wi=
th a Third Party application.
>=20
> =C2=B7         A Retail Customer wishes to change the data (i.e. scope) a T=
hird Party application has permission to access.
>=20
> In none of the above situations will it be valid to retain a refresh token=
, which I realize is implementation dependent, due to the nature of the ESPI=
 Standard.
>=20
> Perhaps the section on the Server=E2=80=99s Revocation Policy should addre=
ss a few of the reasons why a client may want or need to revoke a token.  Th=
e current description provides no consideration for the relationship between=
 tokens and scope, although there clearly is a relationship.
>=20
I'm confident client or resource owner would revoke refresh (and not access)=
 tokens in all use cases you listed above. In my opinion, access tokens are r=
evoked only if the authorization server does not support refresh tokens and t=
herefore uses long term access tokens or in high-security applications.

I would also like to hear the opinion of other WG members on this topic.

> 3. If the standard OAuth spec does not provide enough control, your profil=
e of OAuth2 for the ESPI can tighten it to provide the protections desired.
>=20
> [Don] I am aware we can provide additional parameters required to integrat=
e OAuth 2.0 with the ESPI Standard by submitting those parameter values to t=
he OAuth Parameters registry. I would prefer not to do that, given the large=
 amount of work being done on RFC-drafts to resolve many of the issues we ar=
e facing to integrate OAuth 2.0 with the ESPI Standard, since the need to us=
e those extensions will most likely be short lived.
>=20

Hmmm, if the need is only short lived, why do you want to make it part of th=
e long living revocation RFC?

> Thanks,
> George
>=20
> On 1/29/13 3:28 PM, Donald F Coffin wrote:
> Hi Thorsten,
> =20
> I am working with the OpenADE Task Force to document how the =E2=80=9CEner=
gy Service Provider Interface (ESPI) Standard =E2=80=9D published by the Nor=
th American Energy Standards Board (NAESB) in October of 2011 should be impl=
emented.  The ESPI Standard defines how Retail Customers, Third Party applic=
ations, and Data Custodians (i.e. electrical, gas, or water utility) must in=
terface to each other and the data format used to exchange energy informatio=
n.   The interface between the Retail Customer and the Data Custodian is kno=
wn as =E2=80=9CDownload My Data=E2=80=9D, which defines how a Retail Custome=
r receives their energy information in an XML file downloaded to them by the=
 Data Custodian.  The interface between the Third Party application and the D=
ata Custodian is known as =E2=80=9CConnect My Data=E2=80=9D, which defines t=
he message exchanges between the Third Party application and the Data Custod=
ian to allow the Third Party to access data at the Data Custodian after a Re=
tail Customer has granted the Third Party application access.
> =20
> It is my responsibility within the OpenADE Task Force to document the inte=
gration of the OAuth 2.0 protocol with the ESPI Standard.  Since the ESPI St=
andard requires Retail Customers, Third Party applications, and Data Custodi=
ans to revoke Tokens (i.e. Access and Refresh Tokens) I am very interested i=
n the =E2=80=9CToken Revocation (draft-ietf-oath-revocation-xx)=E2=80=9D wor=
k being done by you and your working group.
> =20
> Token Revocation Request
> =20
> The Token Revocation request has only the =E2=80=9Ctoken=E2=80=9D paramete=
r with the description that the authorization server is supposed to detect t=
he token type automatically.  I would like to request that an addition param=
eter =E2=80=9Ctoken_type=E2=80=9D be added to the request.  The =E2=80=9Ctok=
en_type=E2=80=9D parameter could be optional and would define the type of to=
ken being revoked (i.e. =E2=80=9Caccess=E2=80=9D, =E2=80=9Crefresh=E2=80=9D,=
 =E2=80=9Cregistration access=E2=80=9D, etc.).
> =20
> The ESPI Standard was developed to support the Advanced Meter Interface (A=
MI) which is the interface used by =E2=80=9CSmart Meters=E2=80=9D to provide=
 automated energy usage collection and other operational information about a=
 Retail Customer=E2=80=99s residence to their Data Custodian.  Third Party a=
pplications will be required to obtain the approval if each Retail Customer t=
hat has had a =E2=80=9CSmart Meter=E2=80=9D installed before they will be ab=
le to access the data provided by their =E2=80=9CSmart Meter=E2=80=9D.  The n=
umber of =E2=80=9CSmart Meters=E2=80=9D currently installed at the three lar=
gest California utilities (Pacific Gas & Electric, Southern California Ediso=
n, and San Diego Gas & Electric) is in excess of 10.0 M and growing.  The fo=
llowing table indicates the number of =E2=80=9CSmart Meters=E2=80=9D each of=
 the three utilities had installed as of May 2012:
> =20
> Utility
> =E2=80=9CSmart Meters=E2=80=9D Installed
> Pacific Gas & Electric (PG&E)
> 4,696,000
> San Diego Gas & Electric (SDG&E)
> 1,364,000
> Southern California Edison (SCE)
> 3,900,000
> =20
> The numbers in the chart were taken from the =E2=80=9CUtility-Scale Smart M=
eter Deployments, Plans, & Proposals -- IEE Report=E2=80=9D published May 20=
12 by The Edison Foundation Institute for Electric Efficiency=E2=80=9D which=
 I have attached.  The number of =E2=80=9CSmart Meters=E2=80=9D currently in=
stalled are even larger than shown in the report as I compose this email.  A=
ssuming 10% of Pacific Gas & Electric=E2=80=99s Retail Customers decide to u=
tilize a Third Party application (3 Third Party applications are currently s=
upported and are 3 more Third Party applications are preparing to be support=
ed) in order to support the ability to revoke a token they would be required=
 to track 500,000 access tokens and 500,000 refresh tokens.  Requiring PG&E=E2=
=80=99s authorization server to =E2=80=9Cautomatically=E2=80=9D determine th=
e type of Token being revoked begins to negatively impact their processing c=
apability.  If the Token Revocation request was capable of indicating the ty=
pe of Token to be revoked, the amount of time it will take PG&E=E2=80=99s au=
thorization server would show a significant time savings to process the requ=
est.
> =20
> Authorization Server Revocation Policy
> =20
> =20
>       6.       Does the revocation of the access token also revoke the ref=
resh token (if it was provided) ? Or is this a revocation policy decision ?
> =20
> - if the token passed to the request is a refresh token and the server sup=
ports access token revocation, the server SHOULD also revoke them.
> - if the token passed to the request is an access token, the server may de=
cide to revoke the respective refresh token as well.
> =20
> I believe that if the token passed in the request is an access token, the s=
erver MUST revoke any respective refresh token.  Otherwise, their exist a po=
tential security risk of the respective refresh token being used to gain acc=
ess to the resources for which the access token was issued.  It also means t=
he authorization server will have potential =E2=80=9Cjunk=E2=80=9D in the re=
fresh token file to search through for any additional Token Revocation reque=
st.
> =20
> I look forward to receiving your response.
> =20
> Best regards,
> Don
> Donald F. Coffin
> Founder/CTO
> =20
> REMI Networks
> 22751 El Prado Suite 6216
> Rancho Santa Margarita, CA  92688-3836
> =20
> Phone:      (949) 636-8571
> Email:       donald.coffin@reminetworks.com
> =20
>=20
>=20
>=20
> _______________________________________________
> OAuth mailing list
> OAuth@ietf.org
> https://www.ietf.org/mailman/listinfo/oauth
> =20

--Apple-Mail-A3195BD8-5251-4F5B-A5A1-D9FE000AD6D0
Content-Type: text/html;
	charset=utf-8
Content-Transfer-Encoding: quoted-printable

<html><head><meta http-equiv=3D"content-type" content=3D"text/html; charset=3D=
utf-8"></head><body dir=3D"auto"><div>Hi Donald,</div><div><br></div><div>th=
anks for your interest in OAuth and specifically the revocation draft. I hav=
e added my comments inline.</div><div><br></div><div>@George: thanks for ans=
wering Donald's questions in the first place. I'm obviously to occupied with=
 my day time work right now to react quickly.</div><div><br></div><div>regar=
ds,</div><div>Torsten.</div><div><br></div><div>Am 30.01.2013 um 01:29 schri=
eb "Donald F Coffin" &lt;<a href=3D"mailto:donald.coffin@reminetworks.com">d=
onald.coffin@reminetworks.com</a>&gt;:<br><br></div><blockquote type=3D"cite=
"><div><meta http-equiv=3D"Content-Type" content=3D"text/html; charset=3Dus-=
ascii"><meta name=3D"Generator" content=3D"Microsoft Word 14 (filtered mediu=
m)"><style><!--
/* Font Definitions */
@font-face
	{font-family:Helvetica;
	panose-1:2 11 6 4 2 2 2 2 2 4;}
@font-face
	{font-family:Wingdings;
	panose-1:5 0 0 0 0 0 0 0 0 0;}
@font-face
	{font-family:"Cambria Math";
	panose-1:2 4 5 3 5 4 6 3 2 4;}
@font-face
	{font-family:Cambria;
	panose-1:2 4 5 3 5 4 6 3 2 4;}
@font-face
	{font-family:Calibri;
	panose-1:2 15 5 2 2 2 4 3 2 4;}
@font-face
	{font-family:Tahoma;
	panose-1:2 11 6 4 3 5 4 4 2 4;}
@font-face
	{font-family:Consolas;
	panose-1:2 11 6 9 2 2 4 3 2 4;}
@font-face
	{font-family:"Brush Script MT";
	panose-1:3 6 8 2 4 4 6 7 3 4;}
@font-face
	{font-family:"Times New Roman \, serif";
	panose-1:0 0 0 0 0 0 0 0 0 0;}
/* Style Definitions */
p.MsoNormal, li.MsoNormal, div.MsoNormal
	{margin:0in;
	margin-bottom:.0001pt;
	font-size:11.0pt;
	font-family:"Calibri","sans-serif";
	color:black;}
a:link, span.MsoHyperlink
	{mso-style-priority:99;
	color:blue;
	text-decoration:underline;}
a:visited, span.MsoHyperlinkFollowed
	{mso-style-priority:99;
	color:purple;
	text-decoration:underline;}
pre
	{mso-style-priority:99;
	mso-style-link:"HTML Preformatted Char";
	margin:0in;
	margin-bottom:.0001pt;
	font-size:10.0pt;
	font-family:"Courier New";
	color:black;}
p.MsoListParagraph, li.MsoListParagraph, div.MsoListParagraph
	{mso-style-priority:34;
	margin-top:0in;
	margin-right:0in;
	margin-bottom:0in;
	margin-left:.5in;
	margin-bottom:.0001pt;
	font-size:11.0pt;
	font-family:"Calibri","sans-serif";
	color:black;}
span.EmailStyle18
	{mso-style-type:personal;
	font-family:"Cambria","serif";
	color:windowtext;}
span.HTMLPreformattedChar
	{mso-style-name:"HTML Preformatted Char";
	mso-style-priority:99;
	mso-style-link:"HTML Preformatted";
	font-family:Consolas;
	color:black;}
span.EmailStyle21
	{mso-style-type:personal-reply;
	font-family:"Cambria","serif";
	color:windowtext;
	font-weight:normal;
	font-style:normal;}
.MsoChpDefault
	{mso-style-type:export-only;
	font-size:10.0pt;}
@page WordSection1
	{size:8.5in 11.0in;
	margin:1.0in 1.0in 1.0in 1.0in;}
div.WordSection1
	{page:WordSection1;}
/* List Definitions */
@list l0
	{mso-list-id:217783835;
	mso-list-type:hybrid;
	mso-list-template-ids:1090914056 67698689 67698691 67698693 6769868=
9 67698691 67698693 67698689 67698691 67698693;}
@list l0:level1
	{mso-level-number-format:bullet;
	mso-level-text:\F0B7;
	mso-level-tab-stop:none;
	mso-level-number-position:left;
	margin-left:.75in;
	text-indent:-.25in;
	font-family:Symbol;}
@list l0:level2
	{mso-level-number-format:bullet;
	mso-level-text:o;
	mso-level-tab-stop:none;
	mso-level-number-position:left;
	margin-left:1.25in;
	text-indent:-.25in;
	font-family:"Courier New";}
@list l0:level3
	{mso-level-number-format:bullet;
	mso-level-text:\F0A7;
	mso-level-tab-stop:none;
	mso-level-number-position:left;
	margin-left:1.75in;
	text-indent:-.25in;
	font-family:Wingdings;}
@list l0:level4
	{mso-level-number-format:bullet;
	mso-level-text:\F0B7;
	mso-level-tab-stop:none;
	mso-level-number-position:left;
	margin-left:2.25in;
	text-indent:-.25in;
	font-family:Symbol;}
@list l0:level5
	{mso-level-number-format:bullet;
	mso-level-text:o;
	mso-level-tab-stop:none;
	mso-level-number-position:left;
	margin-left:2.75in;
	text-indent:-.25in;
	font-family:"Courier New";}
@list l0:level6
	{mso-level-number-format:bullet;
	mso-level-text:\F0A7;
	mso-level-tab-stop:none;
	mso-level-number-position:left;
	margin-left:3.25in;
	text-indent:-.25in;
	font-family:Wingdings;}
@list l0:level7
	{mso-level-number-format:bullet;
	mso-level-text:\F0B7;
	mso-level-tab-stop:none;
	mso-level-number-position:left;
	margin-left:3.75in;
	text-indent:-.25in;
	font-family:Symbol;}
@list l0:level8
	{mso-level-number-format:bullet;
	mso-level-text:o;
	mso-level-tab-stop:none;
	mso-level-number-position:left;
	margin-left:4.25in;
	text-indent:-.25in;
	font-family:"Courier New";}
@list l0:level9
	{mso-level-number-format:bullet;
	mso-level-text:\F0A7;
	mso-level-tab-stop:none;
	mso-level-number-position:left;
	margin-left:4.75in;
	text-indent:-.25in;
	font-family:Wingdings;}
ol
	{margin-bottom:0in;}
ul
	{margin-bottom:0in;}
--></style><!--[if gte mso 9]><xml>
<o:shapedefaults v:ext=3D"edit" spidmax=3D"1026" />
</xml><![endif]--><!--[if gte mso 9]><xml>
<o:shapelayout v:ext=3D"edit">
<o:idmap v:ext=3D"edit" data=3D"1" />
</o:shapelayout></xml><![endif]--><div class=3D"WordSection1"><p class=3D"Ms=
oNormal"><span style=3D"font-size:12.0pt;font-family:&quot;Cambria&quot;,&qu=
ot;serif&quot;;color:windowtext">George,<o:p></o:p></span></p><p class=3D"Ms=
oNormal"><span style=3D"font-size:12.0pt;font-family:&quot;Cambria&quot;,&qu=
ot;serif&quot;;color:windowtext"><o:p>&nbsp;</o:p></span></p><p class=3D"Mso=
Normal"><span style=3D"font-size:12.0pt;font-family:&quot;Cambria&quot;,&quo=
t;serif&quot;;color:windowtext">Thanks for the quick response.&nbsp; I=E2=80=
=99ve added my comments after your responses below.<o:p></o:p></span></p><p c=
lass=3D"MsoNormal"><span style=3D"font-size:12.0pt;font-family:&quot;Cambria=
&quot;,&quot;serif&quot;;color:windowtext"><o:p>&nbsp;</o:p></span></p><div>=
<p class=3D"MsoNormal"><span style=3D"font-size:12.0pt;color:windowtext">Bes=
t regards,<o:p></o:p></span></p><p class=3D"MsoNormal"><span style=3D"font-s=
ize:24.0pt;font-family:&quot;Brush Script MT&quot;,&quot;serif&quot;;color:w=
indowtext">Don<o:p></o:p></span></p><p class=3D"MsoNormal"><span style=3D"fo=
nt-size:12.0pt;color:windowtext">Donald F. Coffin<o:p></o:p></span></p><p cl=
ass=3D"MsoNormal"><span style=3D"font-size:12.0pt;color:windowtext">Founder/=
CTO<o:p></o:p></span></p><p class=3D"MsoNormal"><span style=3D"font-size:12.=
0pt;color:windowtext"><o:p>&nbsp;</o:p></span></p><p class=3D"MsoNormal"><sp=
an style=3D"font-size:12.0pt;color:windowtext">REMI Networks<o:p></o:p></spa=
n></p><p class=3D"MsoNormal"><span style=3D"font-size:12.0pt;color:windowtex=
t">22751 El Prado Suite 6216<o:p></o:p></span></p><p class=3D"MsoNormal"><sp=
an style=3D"font-size:12.0pt;color:windowtext">Rancho Santa Margarita, CA&nb=
sp; 92688-3836<o:p></o:p></span></p><p class=3D"MsoNormal"><span style=3D"fo=
nt-size:12.0pt;color:windowtext"><o:p>&nbsp;</o:p></span></p><p class=3D"Mso=
Normal"><span style=3D"font-size:12.0pt;color:windowtext">Phone:&nbsp;&nbsp;=
&nbsp;&nbsp;&nbsp; (949) 636-8571<o:p></o:p></span></p><p class=3D"MsoNormal=
"><span style=3D"font-size:12.0pt;color:windowtext">Email:&nbsp;&nbsp;&nbsp;=
&nbsp;&nbsp;&nbsp; <a href=3D"mailto:donald.coffin@reminetworks.com"><span s=
tyle=3D"color:blue">donald.coffin@reminetworks.com</span></a><o:p></o:p></sp=
an></p></div><p class=3D"MsoNormal"><span style=3D"font-size:12.0pt;font-fam=
ily:&quot;Cambria&quot;,&quot;serif&quot;;color:windowtext"><o:p>&nbsp;</o:p=
></span></p><div><div style=3D"border:none;border-top:solid #B5C4DF 1.0pt;pa=
dding:3.0pt 0in 0in 0in"><p class=3D"MsoNormal"><b><span style=3D"font-size:=
10.0pt;font-family:&quot;Tahoma&quot;,&quot;sans-serif&quot;;color:windowtex=
t">From:</span></b><span style=3D"font-size:10.0pt;font-family:&quot;Tahoma&=
quot;,&quot;sans-serif&quot;;color:windowtext"> George Fletcher [<a href=3D"=
mailto:gffletch@aol.com">mailto:gffletch@aol.com</a>] <br><b>Sent:</b> Tuesd=
ay, January 29, 2013 3:29 PM<br><b>To:</b> Donald F Coffin<br><b>Cc:</b> Tor=
sten Lodderstedt; John Adkins; Scott Crowder; Dave Robin; John Teeter; <a hr=
ef=3D"mailto:pmadsen@pingidentity.com">pmadsen@pingidentity.com</a>; Edward D=
enson; Marty Burns; Uday Verma; Ray Perlner; Anne Hendry; Lynne Rodoni; <a h=
ref=3D"mailto:oauth@ietf.org">oauth@ietf.org</a><br><b>Subject:</b> Re: [OAU=
TH-WG] draft-ietf-oauth-revocation-04<o:p></o:p></span></p></div></div><p cl=
ass=3D"MsoNormal"><o:p>&nbsp;</o:p></p><p class=3D"MsoNormal" style=3D"margi=
n-bottom:12.0pt"><span style=3D"font-family:&quot;Helvetica&quot;,&quot;sans=
-serif&quot;">First, just want to say this is a great write up of the situat=
ion. Thanks!<br><br>A couple of additional thoughts regarding token manageme=
nt and processing...<br><br>1. If all tokens being revoked are tokens issued=
 by the same Authorization Server (AS) then it can easily mark which are ref=
resh and which are access such that I'm not sure an additional parameter is n=
eeded. If the issue is integrating with legacy tokens, then I can see a shor=
t term need as an optimization while the tokens rotate through. The question=
 is whether the short term need of the parameter justifies it if long term i=
t's not needed. Maybe an option is for the ESPI profile to specify an additi=
onal parameter that is not required by this spec.</span><span style=3D"font-=
family:&quot;Helvetica&quot;,&quot;sans-serif&quot;;color:windowtext"><o:p><=
/o:p></span></p><p class=3D"MsoNormal" style=3D"margin-left:.5in;text-indent=
:-.5in"><span style=3D"font-size:12.0pt;font-family:&quot;Cambria&quot;,&quo=
t;serif&quot;;color:#0070C0">[Don] A few utilities have launched =E2=80=9C<b=
>Connect My Data</b>=E2=80=9D programs with Third Party applications, but th=
ese are using Certificates as a means of identifying Third Party application=
s.&nbsp; There are no utilities, to my knowledge, with =E2=80=9C<b>Connect M=
y Data</b>=E2=80=9D programs that have implemented <b>OAuth 2.0.&nbsp; </b>T=
he current <b>ESPI Standard</b> requires the implementation of <b>OAuth 1.0<=
/b>.&nbsp; Therefore, there should not be a legacy token issue. &nbsp;As a r=
esult of the work our group is doing, we will shortly submit a request to <b=
>NAESB</b> to revise the existing standard to reflect the migration from <b>=
OAuth 1.0</b> to <b>OAuth 2.0</b>.<br><br>Your suggestion to =E2=80=9Cmark w=
hich are refresh and which are access=E2=80=9D tokens while providing a meth=
od to identify what type of token was issued after it has been found, still p=
oses a processing problem if the only parameter on the <b>Token Revocation</=
b> request is the Token.&nbsp; Even implementing your suggestion it will sti=
ll be necessary to scan the entire set of Tokens to locate and identify what=
 type of Token is being revoked.&nbsp; If a <b>token_type</b> parameter is p=
rovided with the <b>Token Revocation </b>request the only Tokens that need t=
o be scanned are those matching the type being revoked.&nbsp; This will sign=
ificantly reduce the size of the dataset and therefore expedite the search.&=
nbsp; I realize assigning the Token value as an index key would also improve=
 the retrieval time.&nbsp; Since that is an implementation feature, it is be=
yond the scope of the activity our group is chartered to perform.<br></span>=
</p></div></div></blockquote><div><br></div><div>The effort needed directly d=
epends on your token design. If, for example, access and refresh tokens coul=
d be distinguished by the first byte (like magic bytes in data files), thing=
s are evenly easy than having the additional parameter. If your need to issu=
e a database lookup, things get more processing intensive.</div><div><br></d=
iv><div>I'm not against adding the parameter (again). We had this discussion=
 for quite a while and decided against adding it again because of the curren=
t stage of the draft.</div><div><br></div><div>see also&nbsp;<a href=3D"http=
://www.ietf.org/mail-archive/web/oauth/current/msg10211.html">http://www.iet=
f.org/mail-archive/web/oauth/current/msg10211.html</a>&nbsp;for the options w=
e had discussed.</div><br><blockquote type=3D"cite"><div><div class=3D"WordS=
ection1"><p class=3D"MsoNormal" style=3D"margin-left:.5in;text-indent:-.5in"=
><span style=3D"font-family:&quot;Helvetica&quot;,&quot;sans-serif&quot;"><b=
r><br>2. I don't think you can always revoke the refresh_token if an access_=
token is revoked. I can see a use case where a client gets a refresh_token a=
nd an access_token. The client uses the access_token for 5 minutes but the a=
ccess_token is good for an hour. So the client revokes the access_token to e=
nsure it can't be used again. The client will just use it's refresh_token wh=
en it needs another access_token. In this case, revoking the refresh_token w=
ould "break" the client. In addition, unless you add audience style checking=
 to the token processing rules, you open up the AS to a denial of service at=
tack. Basically, if the AS revokes the refresh_token when an access_token is=
 revoked, I can steal an access_token and send it to the revocation endpoint=
 causing the real client's refresh_token to be revoked. To prevent this, the=
 tokens should be bound to the client_id to which they were issued, and shou=
ld only be revocable from that client_id.</span><span style=3D"font-family:&=
quot;Helvetica&quot;,&quot;sans-serif&quot;;color:windowtext"><o:p></o:p></s=
pan></p><p class=3D"MsoNormal"><span style=3D"font-size:12.0pt;font-family:&=
quot;Cambria&quot;,&quot;serif&quot;;color:windowtext"><o:p>&nbsp;</o:p></sp=
an></p><p class=3D"MsoNormal" style=3D"mso-margin-top-alt:0in;margin-right:0=
in;margin-bottom:12.0pt;margin-left:.5in;text-indent:-.5in"><span style=3D"f=
ont-size:12.0pt;font-family:&quot;Cambria&quot;,&quot;serif&quot;;color:#007=
0C0">[Don] The focus of the <b>ESPI Standard</b> is to provide Retail Custom=
er=E2=80=99s with access to a single UsagePoint (i.e. their Smart Meter).&nb=
sp; Therefore an access and refresh token will be tightly correlated with th=
e type and frequency of data the Smart Meter provides.&nbsp; There are only a=
 few reasons defined within the <b>ESPI Standard</b> list of use cases that w=
ill require the <b>Token Revocation</b> request to be issued.&nbsp; The foll=
owing summarizes the situations that require a <b>Token Revocation </b>reque=
st:<o:p></o:p></span></p><p class=3D"MsoListParagraph" style=3D"mso-margin-t=
op-alt:0in;margin-right:0in;margin-bottom:12.0pt;margin-left:.75in;text-inde=
nt:-.25in;mso-list:l0 level1 lfo1"><!--[if !supportLists]--><span style=3D"f=
ont-size:12.0pt;font-family:Symbol;color:#0070C0"><span style=3D"mso-list:Ig=
nore">=C2=B7<span style=3D"font:7.0pt &quot;Times New Roman&quot;">&nbsp;&nb=
sp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp; </span></span></span><!--[endif]--><=
span style=3D"font-size:12.0pt;font-family:&quot;Cambria&quot;,&quot;serif&q=
uot;;color:#0070C0">A Third Party application wishes to terminate their rela=
tionship with a Retail Customer.<o:p></o:p></span></p><p class=3D"MsoListPar=
agraph" style=3D"mso-margin-top-alt:0in;margin-right:0in;margin-bottom:12.0p=
t;margin-left:.75in;text-indent:-.25in;mso-list:l0 level1 lfo1"><!--[if !sup=
portLists]--><span style=3D"font-size:12.0pt;font-family:Symbol;color:#0070C=
0"><span style=3D"mso-list:Ignore">=C2=B7<span style=3D"font:7.0pt &quot;Tim=
es New Roman&quot;">&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp; </span>=
</span></span><!--[endif]--><span style=3D"font-size:12.0pt;font-family:&quo=
t;Cambria&quot;,&quot;serif&quot;;color:#0070C0">A Third Party application w=
ishes to terminate their relationship with a Data Custodian.<o:p></o:p></spa=
n></p><p class=3D"MsoListParagraph" style=3D"mso-margin-top-alt:0in;margin-r=
ight:0in;margin-bottom:12.0pt;margin-left:.75in;text-indent:-.25in;mso-list:=
l0 level1 lfo1"><!--[if !supportLists]--><span style=3D"font-size:12.0pt;fon=
t-family:Symbol;color:#0070C0"><span style=3D"mso-list:Ignore">=C2=B7<span s=
tyle=3D"font:7.0pt &quot;Times New Roman&quot;">&nbsp;&nbsp;&nbsp;&nbsp;&nbs=
p;&nbsp;&nbsp;&nbsp; </span></span></span><!--[endif]--><span style=3D"font-=
size:12.0pt;font-family:&quot;Cambria&quot;,&quot;serif&quot;;color:#0070C0"=
>A Retail Customer wishes to terminate their relationship with a Third Party=
 application.<o:p></o:p></span></p><p class=3D"MsoListParagraph" style=3D"ms=
o-margin-top-alt:0in;margin-right:0in;margin-bottom:12.0pt;margin-left:.75in=
;text-indent:-.25in;mso-list:l0 level1 lfo1"><!--[if !supportLists]--><span s=
tyle=3D"font-size:12.0pt;font-family:Symbol;color:#0070C0"><span style=3D"ms=
o-list:Ignore">=C2=B7<span style=3D"font:7.0pt &quot;Times New Roman&quot;">=
&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp; </span></span></span><!--[e=
ndif]--><span style=3D"font-size:12.0pt;font-family:&quot;Cambria&quot;,&quo=
t;serif&quot;;color:#0070C0">A Retail Customer wishes to change the data (i.=
e. scope) a Third Party application has permission to access.<o:p></o:p></sp=
an></p><p class=3D"MsoNormal" style=3D"mso-margin-top-alt:0in;margin-right:0=
in;margin-bottom:12.0pt;margin-left:.5in"><span style=3D"font-size:12.0pt;fo=
nt-family:&quot;Cambria&quot;,&quot;serif&quot;;color:#0070C0">In none of th=
e above situations will it be valid to retain a refresh token, which I reali=
ze is implementation dependent, due to the nature of the <b>ESPI Standard.<o=
:p></o:p></b></span></p><p class=3D"MsoNormal" style=3D"mso-margin-top-alt:0=
in;margin-right:0in;margin-bottom:12.0pt;margin-left:.5in"><span style=3D"fo=
nt-size:12.0pt;font-family:&quot;Cambria&quot;,&quot;serif&quot;;color:#0070=
C0">Perhaps the section on the <b>Server=E2=80=99s Revocation Policy</b> sho=
uld address a few of the reasons why a client may want or need to revoke a t=
oken.&nbsp; The current description provides no consideration for the relati=
onship between tokens and scope, although there clearly is a relationship.</=
span></p></div></div></blockquote><div>I'm confident client or resource owne=
r would revoke refresh (and not access) tokens in all use cases you listed a=
bove. In my opinion, access tokens are revoked only if the authorization ser=
ver does not support refresh tokens and therefore uses long term access toke=
ns or in high-security applications.</div><div><br></div><div>I would also l=
ike to hear the opinion of other WG members on this topic.</div><div><br></d=
iv><blockquote type=3D"cite"><div><div class=3D"WordSection1"><p class=3D"Ms=
oNormal" style=3D"mso-margin-top-alt:0in;margin-right:0in;margin-bottom:12.0=
pt;margin-left:.5in"><span style=3D"font-size:12.0pt;font-family:&quot;Cambr=
ia&quot;,&quot;serif&quot;;color:#0070C0"><o:p></o:p></span></p><p class=3D"=
MsoNormal" style=3D"margin-bottom:12.0pt"><span style=3D"font-family:&quot;H=
elvetica&quot;,&quot;sans-serif&quot;">3. If the standard OAuth spec does no=
t provide enough control, your profile of OAuth2 for the ESPI can tighten it=
 to provide the protections desired.</span><span style=3D"font-family:&quot;=
Helvetica&quot;,&quot;sans-serif&quot;;color:windowtext"><o:p></o:p></span><=
/p><p class=3D"MsoNormal" style=3D"mso-margin-top-alt:0in;margin-right:0in;m=
argin-bottom:12.0pt;margin-left:.5in;text-indent:-.5in"><span style=3D"font-=
size:12.0pt;font-family:&quot;Cambria&quot;,&quot;serif&quot;;color:#0070C0"=
>[Don] I am aware we can provide additional parameters required to integrate=
 <b>OAuth 2.0 </b>with the <b>ESPI Standard</b> by submitting those paramete=
r values to the <b>OAuth Parameters</b> registry. I would prefer not to do t=
hat, given the large amount of work being done on RFC-drafts to resolve many=
 of the issues we are facing to integrate <b>OAuth 2.0</b> with the <b>ESPI S=
tandard</b>, since the need to use those extensions will most likely be shor=
t lived.</span></p></div></div></blockquote><div><br></div>Hmmm, if the need=
 is only short lived, why do you want to make it part of the long living rev=
ocation RFC?<div><br><blockquote type=3D"cite"><div><div class=3D"WordSectio=
n1"><p class=3D"MsoNormal" style=3D"mso-margin-top-alt:0in;margin-right:0in;=
margin-bottom:12.0pt;margin-left:.5in;text-indent:-.5in"><span style=3D"font=
-size:12.0pt;font-family:&quot;Cambria&quot;,&quot;serif&quot;;color:windowt=
ext"><o:p></o:p></span></p><p class=3D"MsoNormal" style=3D"margin-bottom:12.=
0pt"><span style=3D"font-family:&quot;Helvetica&quot;,&quot;sans-serif&quot;=
">Thanks,<br>George</span><o:p></o:p></p><div><p class=3D"MsoNormal">On 1/29=
/13 3:28 PM, Donald F Coffin wrote:<o:p></o:p></p></div><blockquote style=3D=
"margin-top:5.0pt;margin-bottom:5.0pt"><p class=3D"MsoNormal"><span style=3D=
"font-size:12.0pt;font-family:&quot;Cambria&quot;,&quot;serif&quot;">Hi Thor=
sten,</span><o:p></o:p></p><p class=3D"MsoNormal"><span style=3D"font-size:1=
2.0pt;font-family:&quot;Cambria&quot;,&quot;serif&quot;">&nbsp;</span><o:p><=
/o:p></p><p class=3D"MsoNormal"><span style=3D"font-size:12.0pt;font-family:=
&quot;Cambria&quot;,&quot;serif&quot;">I am working with the OpenADE Task Fo=
rce to document how the =E2=80=9C<b><i>Energy Service Provider Interface (ES=
PI) Standard</i></b> =E2=80=9D published by the <b>North American Energy Sta=
ndards Board</b> (NAESB) in October of 2011 should be implemented.&nbsp; The=
 <b>ESPI Standard</b> defines how Retail Customers, Third Party applications=
, and Data Custodians (i.e. electrical, gas, or water utility) must interfac=
e to each other and the data format used to exchange energy information.&nbs=
p; &nbsp;The interface between the Retail Customer and the Data Custodian is=
 known as =E2=80=9C<b>Download My Data</b>=E2=80=9D, which defines how a Ret=
ail Customer receives their energy information in an XML file downloaded to t=
hem by the Data Custodian.&nbsp; The interface between the Third Party appli=
cation and the Data Custodian is known as =E2=80=9C<b>Connect My Data</b>=E2=
=80=9D, which defines the message exchanges between the Third Party applicat=
ion and the Data Custodian to allow the Third Party to access data at the Da=
ta Custodian after a Retail Customer has granted the Third Party application=
 access.</span><o:p></o:p></p><p class=3D"MsoNormal"><span style=3D"font-siz=
e:12.0pt;font-family:&quot;Cambria&quot;,&quot;serif&quot;">&nbsp;</span><o:=
p></o:p></p><p class=3D"MsoNormal"><span style=3D"font-size:12.0pt;font-fami=
ly:&quot;Cambria&quot;,&quot;serif&quot;">It is my responsibility within the=
 OpenADE Task Force to document the integration of the <b>OAuth 2.0</b> prot=
ocol with the <b>ESPI Standard.</b>&nbsp; Since the <b>ESPI Standard</b> req=
uires Retail Customers, Third Party applications, and Data Custodians to rev=
oke Tokens (i.e. Access and Refresh Tokens) I am very interested in the =E2=80=
=9C<b><i>Token Revocation (draft-ietf-oath-revocation-xx)</i></b>=E2=80=9D w=
ork being done by you and your working group. </span><o:p></o:p></p><p class=
=3D"MsoNormal"><span style=3D"font-size:12.0pt;font-family:&quot;Cambria&quo=
t;,&quot;serif&quot;">&nbsp;</span><o:p></o:p></p><p class=3D"MsoNormal"><b>=
<u><span style=3D"font-size:12.0pt;font-family:&quot;Cambria&quot;,&quot;ser=
if&quot;">Token Revocation Request</span></u></b><o:p></o:p></p><p class=3D"=
MsoNormal"><span style=3D"font-size:12.0pt;font-family:&quot;Cambria&quot;,&=
quot;serif&quot;">&nbsp;</span><o:p></o:p></p><p class=3D"MsoNormal"><span s=
tyle=3D"font-size:12.0pt;font-family:&quot;Cambria&quot;,&quot;serif&quot;">=
The <b>Token Revocation</b> request has only the =E2=80=9Ctoken=E2=80=9D par=
ameter with the description that the authorization server is supposed to det=
ect the token type automatically.&nbsp; I would like to request that an addi=
tion parameter =E2=80=9Ctoken_type=E2=80=9D be added to the request.&nbsp; T=
he =E2=80=9Ctoken_type=E2=80=9D parameter could be optional and would define=
 the type of token being revoked (i.e. =E2=80=9Caccess=E2=80=9D, =E2=80=9Cre=
fresh=E2=80=9D, =E2=80=9Cregistration access=E2=80=9D, etc.).</span><o:p></o=
:p></p><p class=3D"MsoNormal"><span style=3D"font-size:12.0pt;font-family:&q=
uot;Cambria&quot;,&quot;serif&quot;">&nbsp;</span><o:p></o:p></p><p class=3D=
"MsoNormal"><span style=3D"font-size:12.0pt;font-family:&quot;Cambria&quot;,=
&quot;serif&quot;">The <b>ESPI Standard</b> was developed to support the <b>=
Advanced Meter Interface</b> <b>(AMI) </b>which is the interface used by =E2=
=80=9CSmart Meters=E2=80=9D to provide automated energy usage collection and=
 other operational information about a Retail Customer=E2=80=99s residence t=
o their Data Custodian.&nbsp; Third Party applications will be required to o=
btain the approval if each Retail Customer that has had a =E2=80=9CSmart Met=
er=E2=80=9D installed before they will be able to access the data provided b=
y their =E2=80=9CSmart Meter=E2=80=9D.&nbsp; The number of =E2=80=9CSmart Me=
ters=E2=80=9D currently installed at the three largest California utilities (=
Pacific Gas &amp; Electric, Southern California Edison, and San Diego Gas &a=
mp; Electric) is in excess of 10.0 M and growing.&nbsp; The following table i=
ndicates the number of =E2=80=9CSmart Meters=E2=80=9D each of the three util=
ities had installed as of May 2012:</span><o:p></o:p></p><p class=3D"MsoNorm=
al"><span style=3D"font-size:12.0pt;font-family:&quot;Cambria&quot;,&quot;se=
rif&quot;">&nbsp;</span><o:p></o:p></p><table class=3D"MsoNormalTable" borde=
r=3D"0" cellspacing=3D"0" cellpadding=3D"0" style=3D"margin-left:66.2pt;bord=
er-collapse:collapse"><tbody><tr><td width=3D"319" valign=3D"top" style=3D"w=
idth:239.4pt;border:solid windowtext 1.0pt;background:#A6A6A6;padding:0in 5.=
4pt 0in 5.4pt"><p class=3D"MsoNormal" align=3D"center" style=3D"text-align:c=
enter"><b><span style=3D"font-size:14.0pt;font-family:&quot;Cambria&quot;,&q=
uot;serif&quot;">Utility</span></b><o:p></o:p></p></td><td width=3D"319" val=
ign=3D"top" style=3D"width:239.4pt;border:solid windowtext 1.0pt;border-left=
:none;background:#A6A6A6;padding:0in 5.4pt 0in 5.4pt"><p class=3D"MsoNormal"=
 align=3D"center" style=3D"text-align:center"><b><span style=3D"font-size:14=
.0pt;font-family:&quot;Cambria&quot;,&quot;serif&quot;">=E2=80=9CSmart Meter=
s=E2=80=9D Installed</span></b><o:p></o:p></p></td></tr><tr><td width=3D"319=
" valign=3D"top" style=3D"width:239.4pt;border:solid windowtext 1.0pt;border=
-top:none;padding:0in 5.4pt 0in 5.4pt"><p class=3D"MsoNormal"><span style=3D=
"font-size:12.0pt;font-family:&quot;Cambria&quot;,&quot;serif&quot;">Pacific=
 Gas &amp; Electric (PG&amp;E)</span><o:p></o:p></p></td><td width=3D"319" v=
align=3D"top" style=3D"width:239.4pt;border-top:none;border-left:none;border=
-bottom:solid windowtext 1.0pt;border-right:solid windowtext 1.0pt;padding:0=
in 5.4pt 0in 5.4pt"><p class=3D"MsoNormal" align=3D"right" style=3D"text-ali=
gn:right"><span style=3D"font-size:12.0pt;font-family:&quot;Cambria&quot;,&q=
uot;serif&quot;">4,696,000</span><o:p></o:p></p></td></tr><tr><td width=3D"3=
19" valign=3D"top" style=3D"width:239.4pt;border:solid windowtext 1.0pt;bord=
er-top:none;padding:0in 5.4pt 0in 5.4pt"><p class=3D"MsoNormal"><span style=3D=
"font-size:12.0pt;font-family:&quot;Cambria&quot;,&quot;serif&quot;">San Die=
go Gas &amp; Electric (SDG&amp;E)</span><o:p></o:p></p></td><td width=3D"319=
" valign=3D"top" style=3D"width:239.4pt;border-top:none;border-left:none;bor=
der-bottom:solid windowtext 1.0pt;border-right:solid windowtext 1.0pt;paddin=
g:0in 5.4pt 0in 5.4pt"><p class=3D"MsoNormal" align=3D"right" style=3D"text-=
align:right"><span style=3D"font-size:12.0pt;font-family:&quot;Cambria&quot;=
,&quot;serif&quot;">1,364,000</span><o:p></o:p></p></td></tr><tr><td width=3D=
"319" valign=3D"top" style=3D"width:239.4pt;border:solid windowtext 1.0pt;bo=
rder-top:none;padding:0in 5.4pt 0in 5.4pt"><p class=3D"MsoNormal"><span styl=
e=3D"font-size:12.0pt;font-family:&quot;Cambria&quot;,&quot;serif&quot;">Sou=
thern California Edison (SCE)</span><o:p></o:p></p></td><td width=3D"319" va=
lign=3D"top" style=3D"width:239.4pt;border-top:none;border-left:none;border-=
bottom:solid windowtext 1.0pt;border-right:solid windowtext 1.0pt;padding:0i=
n 5.4pt 0in 5.4pt"><p class=3D"MsoNormal" align=3D"right" style=3D"text-alig=
n:right"><span style=3D"font-size:12.0pt;font-family:&quot;Cambria&quot;,&qu=
ot;serif&quot;">3,900,000</span><o:p></o:p></p></td></tr></tbody></table><p c=
lass=3D"MsoNormal"><span style=3D"font-size:12.0pt;font-family:&quot;Cambria=
&quot;,&quot;serif&quot;">&nbsp;</span><o:p></o:p></p><p class=3D"MsoNormal"=
><span style=3D"font-size:12.0pt;font-family:&quot;Cambria&quot;,&quot;serif=
&quot;">The numbers in the chart were taken from the =E2=80=9C<b><i>Utility-=
Scale Smart Meter Deployments, Plans, &amp; Proposals -- IEE Report</i></b>=E2=
=80=9D published May 2012 by <b>The Edison Foundation Institute for Electric=
 Efficiency=E2=80=9D </b>which I have attached.&nbsp; The number of =E2=80=9C=
Smart Meters=E2=80=9D currently installed are even larger than shown in the r=
eport as I compose this email.&nbsp; Assuming 10% of Pacific Gas &amp; Elect=
ric=E2=80=99s Retail Customers decide to utilize a Third Party application (=
3 Third Party applications are currently supported and are 3 more Third Part=
y applications are preparing to be supported) in order to support the abilit=
y to revoke a token they would be required to track 500,000 access tokens an=
d 500,000 refresh tokens.&nbsp; Requiring PG&amp;E=E2=80=99s authorization s=
erver to =E2=80=9Cautomatically=E2=80=9D determine the type of Token being r=
evoked begins to negatively impact their processing capability.&nbsp; If the=
 <b>Token Revocation</b> request was capable of indicating the type of Token=
 to be revoked, the amount of time it will take PG&amp;E=E2=80=99s authoriza=
tion server would show a significant time savings to process the request.</s=
pan><o:p></o:p></p><p class=3D"MsoNormal"><span style=3D"font-size:12.0pt;fo=
nt-family:&quot;Cambria&quot;,&quot;serif&quot;">&nbsp;</span><o:p></o:p></p=
><p class=3D"MsoNormal"><b><u><span style=3D"font-size:12.0pt;font-family:&q=
uot;Cambria&quot;,&quot;serif&quot;">Authorization Server Revocation Policy<=
/span></u></b><o:p></o:p></p><p class=3D"MsoNormal"><span style=3D"font-size=
:12.0pt;font-family:&quot;Cambria&quot;,&quot;serif&quot;">&nbsp;</span><o:p=
></o:p></p><p class=3D"MsoNormal"><span style=3D"font-size:12.0pt;font-famil=
y:&quot;Cambria&quot;,&quot;serif&quot;">&nbsp;</span><o:p></o:p></p><p clas=
s=3D"MsoListParagraph" style=3D"text-indent:-.25in"><span style=3D"font-size=
:12.0pt;font-family:&quot;Cambria&quot;,&quot;serif&quot;">&nbsp;&nbsp;&nbsp=
;&nbsp;&nbsp; </span>6.<span style=3D"font-size:7.0pt;font-family:&quot;Time=
s New Roman , serif&quot;,&quot;serif&quot;">&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&=
nbsp; </span>Does the revocation of the access token also revoke the refresh=
 token (if it was provided) ? Or is this a revocation policy decision ?<o:p>=
</o:p></p><p class=3D"MsoNormal"><span style=3D"font-size:12.0pt;font-family=
:&quot;Cambria&quot;,&quot;serif&quot;">&nbsp;</span><o:p></o:p></p><p class=
=3D"MsoNormal" style=3D"margin-left:1.0in"><span style=3D"font-size:12.0pt;f=
ont-family:&quot;Times New Roman , serif&quot;,&quot;serif&quot;">- if the t=
oken passed to the request is a refresh token and the server supports access=
 token revocation, the server SHOULD also revoke them.<br>- if the token pas=
sed to the request is an access token, the server may decide to revoke the r=
espective refresh token as well.</span><o:p></o:p></p><p class=3D"MsoNormal"=
 style=3D"margin-left:1.0in"><span style=3D"font-size:12.0pt;font-family:&qu=
ot;Times New Roman , serif&quot;,&quot;serif&quot;">&nbsp;</span><o:p></o:p>=
</p><p class=3D"MsoNormal" style=3D"margin-left:1.0in"><span style=3D"font-s=
ize:12.0pt;font-family:&quot;Times New Roman , serif&quot;,&quot;serif&quot;=
">I believe that if the token passed in the request is an access token, the s=
erver MUST revoke any respective refresh token.&nbsp; Otherwise, their exist=
 a potential security risk of the respective refresh token being used to gai=
n access to the resources for which the access token was issued.&nbsp; It al=
so means the authorization server will have potential =E2=80=9Cjunk=E2=80=9D=
 in the refresh token file to search through for any additional Token Revoca=
tion request.</span><o:p></o:p></p><p class=3D"MsoNormal" style=3D"margin-le=
ft:1.0in"><span style=3D"font-size:12.0pt;font-family:&quot;Times New Roman ,=
 serif&quot;,&quot;serif&quot;">&nbsp;</span><o:p></o:p></p><p class=3D"MsoN=
ormal"><span style=3D"font-size:12.0pt;font-family:&quot;Times New Roman , s=
erif&quot;,&quot;serif&quot;">I look forward to receiving your response.</sp=
an><o:p></o:p></p><p class=3D"MsoNormal"><span style=3D"font-size:12.0pt;fon=
t-family:&quot;Cambria&quot;,&quot;serif&quot;">&nbsp;</span><o:p></o:p></p>=
<p class=3D"MsoNormal"><span style=3D"font-size:12.0pt">Best regards,</span>=
<o:p></o:p></p><p class=3D"MsoNormal"><span style=3D"font-size:24.0pt;font-f=
amily:&quot;Brush Script MT&quot;,&quot;serif&quot;">Don</span><o:p></o:p></=
p><p class=3D"MsoNormal"><span style=3D"font-size:12.0pt">Donald F. Coffin</=
span><o:p></o:p></p><p class=3D"MsoNormal"><span style=3D"font-size:12.0pt">=
Founder/CTO</span><o:p></o:p></p><p class=3D"MsoNormal"><span style=3D"font-=
size:12.0pt">&nbsp;</span><o:p></o:p></p><p class=3D"MsoNormal"><span style=3D=
"font-size:12.0pt">REMI Networks</span><o:p></o:p></p><p class=3D"MsoNormal"=
><span style=3D"font-size:12.0pt">22751 El Prado Suite 6216</span><o:p></o:p=
></p><p class=3D"MsoNormal"><span style=3D"font-size:12.0pt">Rancho Santa Ma=
rgarita, CA&nbsp; 92688-3836</span><o:p></o:p></p><p class=3D"MsoNormal"><sp=
an style=3D"font-size:12.0pt">&nbsp;</span><o:p></o:p></p><p class=3D"MsoNor=
mal"><span style=3D"font-size:12.0pt">Phone:&nbsp;&nbsp;&nbsp;&nbsp;&nbsp; (=
949) 636-8571</span><o:p></o:p></p><p class=3D"MsoNormal"><span style=3D"fon=
t-size:12.0pt">Email:&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp; <a href=3D"mailto:=
donald.coffin@reminetworks.com">donald.coffin@reminetworks.com</a></span><o:=
p></o:p></p><p class=3D"MsoNormal">&nbsp;<o:p></o:p></p><p class=3D"MsoNorma=
l"><span style=3D"font-size:12.0pt;font-family:&quot;Times New Roman&quot;,&=
quot;serif&quot;"><br><br><br><o:p></o:p></span></p><pre>___________________=
____________________________<o:p></o:p></pre><pre>OAuth mailing list<o:p></o=
:p></pre><pre><a href=3D"mailto:OAuth@ietf.org">OAuth@ietf.org</a><o:p></o:p=
></pre><pre><a href=3D"https://www.ietf.org/mailman/listinfo/oauth">https://=
www.ietf.org/mailman/listinfo/oauth</a><o:p></o:p></pre></blockquote><p clas=
s=3D"MsoNormal"><span style=3D"font-size:12.0pt;font-family:&quot;Times New R=
oman&quot;,&quot;serif&quot;"><o:p>&nbsp;</o:p></span></p></div></div></bloc=
kquote></div></body></html>=

--Apple-Mail-A3195BD8-5251-4F5B-A5A1-D9FE000AD6D0--

From donald.coffin@reminetworks.com  Sun Feb  3 03:58:30 2013
Return-Path: <donald.coffin@reminetworks.com>
X-Original-To: oauth@ietfa.amsl.com
Delivered-To: oauth@ietfa.amsl.com
Received: from localhost (localhost [127.0.0.1]) by ietfa.amsl.com (Postfix) with ESMTP id D479A21F8512 for <oauth@ietfa.amsl.com>; Sun,  3 Feb 2013 03:58:30 -0800 (PST)
X-Virus-Scanned: amavisd-new at amsl.com
X-Spam-Flag: NO
X-Spam-Score: -0.142
X-Spam-Level: 
X-Spam-Status: No, score=-0.142 tagged_above=-999 required=5 tests=[AWL=-0.607, BAYES_05=-1.11, HTML_MESSAGE=0.001, IP_NOT_FRIENDLY=0.334, SARE_LWSHORTT=1.24]
Received: from mail.ietf.org ([64.170.98.30]) by localhost (ietfa.amsl.com [127.0.0.1]) (amavisd-new, port 10024) with ESMTP id hTeyrzo-Fj+e for <oauth@ietfa.amsl.com>; Sun,  3 Feb 2013 03:58:27 -0800 (PST)
Received: from oproxy6-pub.bluehost.com (oproxy6-pub.bluehost.com [67.222.54.6]) by ietfa.amsl.com (Postfix) with SMTP id 9E0A521F84DA for <oauth@ietf.org>; Sun,  3 Feb 2013 03:58:26 -0800 (PST)
Received: (qmail 2065 invoked by uid 0); 3 Feb 2013 11:58:00 -0000
Received: from unknown (HELO host125.hostmonster.com) (74.220.207.125) by cpoproxy3.bluehost.com with SMTP; 3 Feb 2013 11:58:00 -0000
DKIM-Signature: v=1; a=rsa-sha256; q=dns/txt; c=relaxed/relaxed; d=reminetworks.com; s=default;  h=Content-Type:MIME-Version:Message-ID:Date:Subject:In-Reply-To:References:Cc:To:From; bh=XOQuwAWT9uktTBbuDM1XfrtqD0LVtsVOEP5vXGKZj6Q=;  b=KuNVpaboT8Ko2uFxD9m4NVvUeF2QtA30NVWDBFujK6eW1cUMwMrTdGZR+SmebGoisQfmTaIgGzURlKOTUTDsaf356Jo+roomsMpZ3KR6D+MuokZtsNK/wsnY4S7phkJJ;
Received: from [68.4.207.246] (port=2884 helo=HPPavilionElite) by host125.hostmonster.com with esmtpa (Exim 4.80) (envelope-from <donald.coffin@reminetworks.com>) id 1U1yCu-0000Kc-AZ; Sun, 03 Feb 2013 04:58:00 -0700
From: "Donald F Coffin" <donald.coffin@reminetworks.com>
To: "'Torsten Lodderstedt'" <torsten@lodderstedt.net>
References: <006401cdfe5f$2555f170$7001d450$@reminetworks.com> <51085B43.3080103@aol.com> <00c901cdfe80$e7d0eb30$b772c190$@reminetworks.com> <9DFD603A-1170-41D8-A22F-8654D55546B3@lodderstedt.net>
In-Reply-To: <9DFD603A-1170-41D8-A22F-8654D55546B3@lodderstedt.net>
Date: Sun, 3 Feb 2013 03:57:59 -0800
Message-ID: <00a301ce0205$b6b1ca00$24155e00$@reminetworks.com>
MIME-Version: 1.0
Content-Type: multipart/alternative; boundary="----=_NextPart_000_00A4_01CE01C2.A895B5F0"
X-Mailer: Microsoft Outlook 14.0
Thread-Index: AQGqJs1aP2O8OPoDFE4j2TX8/D0+WgJbNiMKAkqArjkBxPa5m5h8S0Vg
Content-Language: en-us
X-Identified-User: {1395:host125.hostmonster.com:reminetw:reminetworks.com} {sentby:smtp auth 68.4.207.246 authed with donald.coffin@reminetworks.com}
Cc: 'John Adkins' <jva2@pge.com>, 'Marty Burns' <marty@hypertek.us>, 'Scott Crowder' <scott.crowder@qadoenergy.com>, 'Dave Robin' <drobin@automatedlogic.com>, 'John Teeter' <john.teeter@peoplepowerco.com>, pmadsen@pingidentity.com, 'Edward Denson' <ewd7@pge.com>, oauth@ietf.org, 'Ray Perlner' <ray.perlner@nist.gov>, 'Anne Hendry' <ahendry2@gmail.com>, 'Lynne Rodoni' <mrodoni@semprautilities.com>, 'Uday Verma' <uday.verma@ilinknet.com>
Subject: Re: [OAUTH-WG] draft-ietf-oauth-revocation-04
X-BeenThere: oauth@ietf.org
X-Mailman-Version: 2.1.12
Precedence: list
List-Id: OAUTH WG <oauth.ietf.org>
List-Unsubscribe: <https://www.ietf.org/mailman/options/oauth>, <mailto:oauth-request@ietf.org?subject=unsubscribe>
List-Archive: <http://www.ietf.org/mail-archive/web/oauth>
List-Post: <mailto:oauth@ietf.org>
List-Help: <mailto:oauth-request@ietf.org?subject=help>
List-Subscribe: <https://www.ietf.org/mailman/listinfo/oauth>, <mailto:oauth-request@ietf.org?subject=subscribe>
X-List-Received-Date: Sun, 03 Feb 2013 11:58:30 -0000

This is a multipart message in MIME format.

------=_NextPart_000_00A4_01CE01C2.A895B5F0
Content-Type: text/plain;
	charset="UTF-8"
Content-Transfer-Encoding: quoted-printable

Hi Torsten,

=20

Thanks for your additional comments.  I have added my comments inline.

=20

Best regards,

Don

Donald F. Coffin

Founder/CTO

=20

REMI Networks

22751 El Prado Suite 6216

Rancho Santa Margarita, CA  92688-3836

=20

Phone:      (949) 636-8571

Email:        <mailto:donald.coffin@reminetworks.com> =
donald.coffin@reminetworks.com

=20

From: Torsten Lodderstedt [mailto:torsten@lodderstedt.net]=20
Sent: Sunday, February 03, 2013 1:42 AM
To: Donald F Coffin
Cc: George Fletcher; John Adkins; Scott Crowder; Dave Robin; John =
Teeter; <pmadsen@pingidentity.com>; Edward Denson; Marty Burns; Uday =
Verma; Ray Perlner; Anne Hendry; Lynne Rodoni; <oauth@ietf.org>
Subject: Re: [OAUTH-WG] draft-ietf-oauth-revocation-04

=20

Hi Donald,

=20

thanks for your interest in OAuth and specifically the revocation draft. =
I have added my comments inline.

=20

@George: thanks for answering Donald's questions in the first place. I'm =
obviously to occupied with my day time work right now to react quickly.

=20

regards,

Torsten.

=20

Am 30.01.2013 um 01:29 schrieb "Donald F Coffin" =
<donald.coffin@reminetworks.com>:

George,

=20

Thanks for the quick response.  I=E2=80=99ve added my comments after =
your responses below.

=20

Best regards,

Don

Donald F. Coffin

Founder/CTO

=20

REMI Networks

22751 El Prado Suite 6216

Rancho Santa Margarita, CA  92688-3836

=20

Phone:      (949) 636-8571

Email:       donald.coffin@reminetworks.com

=20

From: George Fletcher [mailto:gffletch@aol.com]=20
Sent: Tuesday, January 29, 2013 3:29 PM
To: Donald F Coffin
Cc: Torsten Lodderstedt; John Adkins; Scott Crowder; Dave Robin; John =
Teeter; pmadsen@pingidentity.com; Edward Denson; Marty Burns; Uday =
Verma; Ray Perlner; Anne Hendry; Lynne Rodoni; oauth@ietf.org
Subject: Re: [OAUTH-WG] draft-ietf-oauth-revocation-04

=20

First, just want to say this is a great write up of the situation. =
Thanks!

A couple of additional thoughts regarding token management and =
processing...

1. If all tokens being revoked are tokens issued by the same =
Authorization Server (AS) then it can easily mark which are refresh and =
which are access such that I'm not sure an additional parameter is =
needed. If the issue is integrating with legacy tokens, then I can see a =
short term need as an optimization while the tokens rotate through. The =
question is whether the short term need of the parameter justifies it if =
long term it's not needed. Maybe an option is for the ESPI profile to =
specify an additional parameter that is not required by this spec.

[Don] A few utilities have launched =E2=80=9CConnect My Data=E2=80=9D =
programs with Third Party applications, but these are using Certificates =
as a means of identifying Third Party applications.  There are no =
utilities, to my knowledge, with =E2=80=9CConnect My Data=E2=80=9D =
programs that have implemented OAuth 2.0.  The current ESPI Standard =
requires the implementation of OAuth 1.0.  Therefore, there should not =
be a legacy token issue.  As a result of the work our group is doing, we =
will shortly submit a request to NAESB to revise the existing standard =
to reflect the migration from OAuth 1.0 to OAuth 2.0.

Your suggestion to =E2=80=9Cmark which are refresh and which are =
access=E2=80=9D tokens while providing a method to identify what type of =
token was issued after it has been found, still poses a processing =
problem if the only parameter on the Token Revocation request is the =
Token.  Even implementing your suggestion it will still be necessary to =
scan the entire set of Tokens to locate and identify what type of Token =
is being revoked.  If a token_type parameter is provided with the Token =
Revocation request the only Tokens that need to be scanned are those =
matching the type being revoked.  This will significantly reduce the =
size of the dataset and therefore expedite the search.  I realize =
assigning the Token value as an index key would also improve the =
retrieval time.  Since that is an implementation feature, it is beyond =
the scope of the activity our group is chartered to perform.

=20

The effort needed directly depends on your token design. If, for =
example, access and refresh tokens could be distinguished by the first =
byte (like magic bytes in data files), things are evenly easy than =
having the additional parameter. If your need to issue a database =
lookup, things get more processing intensive.

=20

I'm not against adding the parameter (again). We had this discussion for =
quite a while and decided against adding it again because of the current =
stage of the draft.

=20

see also =
http://www.ietf.org/mail-archive/web/oauth/current/msg10211.html for the =
options we had discussed.

=20

[Don] Thanks for the suggestion the format of the token could be =
distinguished by the first byte.  Since this is an implementation =
decision, it is beyond the scope of the work of the OpenESPI and OpenADE =
Task Force and therefore is something we could recommend in an =
implementation note only.  The creation of an implementation document =
has not been discussed within the group but is something we could look =
into providing after we complete the architectural task of integrating =
OAuth 2.0 with the ESPI standard.  However, using a data format solution =
with tokens seems to be a short term solution, given the additional =
number of tokens being created by the =E2=80=9COAuth Dynamic Client =
Registration Protocol=E2=80=9D and =E2=80=9CUser-Managed Access (UMA) =
Profile of OAuth 2.0=E2=80=9D drafts.  Since the management of an =
embedded marker could itself become very challenging, especially given =
any additional future RFC could in theory add even more token types, as =
the new proposed RFCs seem to be closing OAuth 2.0 implementation =
concerns or capabilities not covered in the core document.



2. I don't think you can always revoke the refresh_token if an =
access_token is revoked. I can see a use case where a client gets a =
refresh_token and an access_token. The client uses the access_token for =
5 minutes but the access_token is good for an hour. So the client =
revokes the access_token to ensure it can't be used again. The client =
will just use it's refresh_token when it needs another access_token. In =
this case, revoking the refresh_token would "break" the client. In =
addition, unless you add audience style checking to the token processing =
rules, you open up the AS to a denial of service attack. Basically, if =
the AS revokes the refresh_token when an access_token is revoked, I can =
steal an access_token and send it to the revocation endpoint causing the =
real client's refresh_token to be revoked. To prevent this, the tokens =
should be bound to the client_id to which they were issued, and should =
only be revocable from that client_id.

=20

[Don] A typical Third Party application built to use the ESPI Standard =
will interact with a Retail Customer and their energy provider.  The =
nature of interaction with the Retail Customer will utilize short =
interactive sessions.  However, the interaction with their energy =
provider will require the application obtain new energy information for =
the previous 24-hours once a day.  Therefore, I anticipate access_tokens =
will be granted for long periods of time as well as any supporting =
refresh_tokens.  Because of the amount of data being exchanged between =
the Third Party application and the energy provider, both in number of =
retail customers and the amount of energy meter data, it will be =
necessary to minimize the amount of =E2=80=9Cadministrative=E2=80=9D =
traffic required in the exchange.  Therefore, although I understand the =
use case you described, I anticipate such an implementation would be =
rare. =20

=20

The need to perform an audience style check to prevent exposure of the =
AS to a denial of service attack, appears primarily due to the fact the =
Revocation RFC requires an access_token and refresh_token to be revoked =
independently.  Should a client need to revoke both Tokens the sequence =
of the revocation request is extremely significant.  A simple solution =
to this problem would be to provide a method that allows a request to =
revoke both tokens simultaneously, as stated in one of the responses you =
referenced in the archives. =20

=20

The example you gave in your response demonstrating how a denial of =
service attack might occur is incorrect.  You said =E2=80=9Cif the AS =
revokes the refresh_token when an access_token is revoked, I can steal =
an access_token and send it to the revocation endpoint causing the real =
client=E2=80=99s refresh_token to be revoked=E2=80=9D.  I fail to see =
how that could occur, since the AS revoked both the access_token and the =
refresh_token when it received the request to revoke the access_token.  =
Rather than explaining why a refresh_token shouldn=E2=80=99t be revoked =
concurrently when an access_token is revoked, your example does the =
exact opposite.  It shows why a refresh_token should be revoked =
concurrently when an access_token is revoked.

=20

[Don] The focus of the ESPI Standard is to provide Retail =
Customer=E2=80=99s with access to a single UsagePoint (i.e. their Smart =
Meter).  Therefore an access and refresh token will be tightly =
correlated with the type and frequency of data the Smart Meter provides. =
 There are only a few reasons defined within the ESPI Standard list of =
use cases that will require the Token Revocation request to be issued.  =
The following summarizes the situations that require a Token Revocation =
request:

=C2=B7         A Third Party application wishes to terminate their =
relationship with a Retail Customer.

=C2=B7         A Third Party application wishes to terminate their =
relationship with a Data Custodian.

=C2=B7         A Retail Customer wishes to terminate their relationship =
with a Third Party application.

=C2=B7         A Retail Customer wishes to change the data (i.e. scope) =
a Third Party application has permission to access.

In none of the above situations will it be valid to retain a refresh =
token, which I realize is implementation dependent, due to the nature of =
the ESPI Standard.

Perhaps the section on the Server=E2=80=99s Revocation Policy should =
address a few of the reasons why a client may want or need to revoke a =
token.  The current description provides no consideration for the =
relationship between tokens and scope, although there clearly is a =
relationship.

I'm confident client or resource owner would revoke refresh (and not =
access) tokens in all use cases you listed above. In my opinion, access =
tokens are revoked only if the authorization server does not support =
refresh tokens and therefore uses long term access tokens or in =
high-security applications.

=20

[Don] Based on the above statement it would appear you assume an access =
token is only valid for a short period of time.  However, as I explained =
in my last response, due to the nature of the access required by the =
client and the manner in which the RS provides that data, access token =
durations will typically be in days not minutes.   Therefore, merely =
revoking a refresh_token will expose the data to access that the =
resource owner meant to prevent unless the access_token is also revoked.

=20

I would also like to hear the opinion of other WG members on this topic.

=20

3. If the standard OAuth spec does not provide enough control, your =
profile of OAuth2 for the ESPI can tighten it to provide the protections =
desired.

[Don] I am aware we can provide additional parameters required to =
integrate OAuth 2.0 with the ESPI Standard by submitting those parameter =
values to the OAuth Parameters registry. I would prefer not to do that, =
given the large amount of work being done on RFC-drafts to resolve many =
of the issues we are facing to integrate OAuth 2.0 with the ESPI =
Standard, since the need to use those extensions will most likely be =
short lived.

=20

Hmmm, if the need is only short lived, why do you want to make it part =
of the long living revocation RFC?

=20

[Don] My response was to the suggestion that if the OAuth specification =
does not provide enough control then the ESPI profile of OAuth 2.0 could =
tighten it to provide the protections desired.  I assumed George meant =
we could add additional =E2=80=9Ccompany=E2=80=9D based parameters, =
which requires us to register them with the =E2=80=9COAuth Parameter =
Registry=E2=80=9D.  I meant the usage of such =E2=80=9Ccompany=E2=80=9D =
parameters would be short termed.

=20

I do not view the need to identify the type of token being revoked as =
=E2=80=9Cshort term=E2=80=9D.  Even the previous exchanges on the topic =
within the WG indicates it feels there may be a need to add an =
additional parameter to the request.  However, because the draft is too =
far along, the WG seems to prefer releasing an RFC they =
=E2=80=9Csuspect=E2=80=9D will need to be adjusted and let the =
implementers confirm their suspicions.   This seems to be a very selfish =
and rather foolish attitude given we are discussing a security protocol. =
 Not to mention it would seem easier and faster to add an additional =
=E2=80=9Coptional=E2=80=9D parameter now, rather than requiring another =
RFC cycle.  A parameter I sensed in reading the archives the WG feels =
will very likely need to be added in the future.





Thanks,
George

On 1/29/13 3:28 PM, Donald F Coffin wrote:

Hi Thorsten,

=20

I am working with the OpenADE Task Force to document how the =
=E2=80=9CEnergy Service Provider Interface (ESPI) Standard =E2=80=9D =
published by the North American Energy Standards Board (NAESB) in =
October of 2011 should be implemented.  The ESPI Standard defines how =
Retail Customers, Third Party applications, and Data Custodians (i.e. =
electrical, gas, or water utility) must interface to each other and the =
data format used to exchange energy information.   The interface between =
the Retail Customer and the Data Custodian is known as =E2=80=9CDownload =
My Data=E2=80=9D, which defines how a Retail Customer receives their =
energy information in an XML file downloaded to them by the Data =
Custodian.  The interface between the Third Party application and the =
Data Custodian is known as =E2=80=9CConnect My Data=E2=80=9D, which =
defines the message exchanges between the Third Party application and =
the Data Custodian to allow the Third Party to access data at the Data =
Custodian after a Retail Customer has granted the Third Party =
application access.

=20

It is my responsibility within the OpenADE Task Force to document the =
integration of the OAuth 2.0 protocol with the ESPI Standard.  Since the =
ESPI Standard requires Retail Customers, Third Party applications, and =
Data Custodians to revoke Tokens (i.e. Access and Refresh Tokens) I am =
very interested in the =E2=80=9CToken Revocation =
(draft-ietf-oath-revocation-xx)=E2=80=9D work being done by you and your =
working group.=20

=20

Token Revocation Request

=20

The Token Revocation request has only the =E2=80=9Ctoken=E2=80=9D =
parameter with the description that the authorization server is supposed =
to detect the token type automatically.  I would like to request that an =
addition parameter =E2=80=9Ctoken_type=E2=80=9D be added to the request. =
 The =E2=80=9Ctoken_type=E2=80=9D parameter could be optional and would =
define the type of token being revoked (i.e. =E2=80=9Caccess=E2=80=9D, =
=E2=80=9Crefresh=E2=80=9D, =E2=80=9Cregistration access=E2=80=9D, etc.).

=20

The ESPI Standard was developed to support the Advanced Meter Interface =
(AMI) which is the interface used by =E2=80=9CSmart Meters=E2=80=9D to =
provide automated energy usage collection and other operational =
information about a Retail Customer=E2=80=99s residence to their Data =
Custodian.  Third Party applications will be required to obtain the =
approval if each Retail Customer that has had a =E2=80=9CSmart =
Meter=E2=80=9D installed before they will be able to access the data =
provided by their =E2=80=9CSmart Meter=E2=80=9D.  The number of =
=E2=80=9CSmart Meters=E2=80=9D currently installed at the three largest =
California utilities (Pacific Gas & Electric, Southern California =
Edison, and San Diego Gas & Electric) is in excess of 10.0 M and =
growing.  The following table indicates the number of =E2=80=9CSmart =
Meters=E2=80=9D each of the three utilities had installed as of May =
2012:

=20


Utility

=E2=80=9CSmart Meters=E2=80=9D Installed


Pacific Gas & Electric (PG&E)

4,696,000


San Diego Gas & Electric (SDG&E)

1,364,000


Southern California Edison (SCE)

3,900,000

=20

The numbers in the chart were taken from the =E2=80=9CUtility-Scale =
Smart Meter Deployments, Plans, & Proposals -- IEE Report=E2=80=9D =
published May 2012 by The Edison Foundation Institute for Electric =
Efficiency=E2=80=9D which I have attached.  The number of =E2=80=9CSmart =
Meters=E2=80=9D currently installed are even larger than shown in the =
report as I compose this email.  Assuming 10% of Pacific Gas & =
Electric=E2=80=99s Retail Customers decide to utilize a Third Party =
application (3 Third Party applications are currently supported and are =
3 more Third Party applications are preparing to be supported) in order =
to support the ability to revoke a token they would be required to track =
500,000 access tokens and 500,000 refresh tokens.  Requiring =
PG&E=E2=80=99s authorization server to =E2=80=9Cautomatically=E2=80=9D =
determine the type of Token being revoked begins to negatively impact =
their processing capability.  If the Token Revocation request was =
capable of indicating the type of Token to be revoked, the amount of =
time it will take PG&E=E2=80=99s authorization server would show a =
significant time savings to process the request.

=20

Authorization Server Revocation Policy

=20

=20

      6.       Does the revocation of the access token also revoke the =
refresh token (if it was provided) ? Or is this a revocation policy =
decision ?

=20

- if the token passed to the request is a refresh token and the server =
supports access token revocation, the server SHOULD also revoke them.
- if the token passed to the request is an access token, the server may =
decide to revoke the respective refresh token as well.

=20

I believe that if the token passed in the request is an access token, =
the server MUST revoke any respective refresh token.  Otherwise, their =
exist a potential security risk of the respective refresh token being =
used to gain access to the resources for which the access token was =
issued.  It also means the authorization server will have potential =
=E2=80=9Cjunk=E2=80=9D in the refresh token file to search through for =
any additional Token Revocation request.

=20

I look forward to receiving your response.

=20

Best regards,

Don

Donald F. Coffin

Founder/CTO

=20

REMI Networks

22751 El Prado Suite 6216

Rancho Santa Margarita, CA  92688-3836

=20

Phone:      (949) 636-8571

Email:       donald.coffin@reminetworks.com

=20







_______________________________________________
OAuth mailing list
OAuth@ietf.org
https://www.ietf.org/mailman/listinfo/oauth

=20


------=_NextPart_000_00A4_01CE01C2.A895B5F0
Content-Type: text/html;
	charset="UTF-8"
Content-Transfer-Encoding: quoted-printable

<html xmlns:v=3D"urn:schemas-microsoft-com:vml" =
xmlns:o=3D"urn:schemas-microsoft-com:office:office" =
xmlns:w=3D"urn:schemas-microsoft-com:office:word" =
xmlns:m=3D"http://schemas.microsoft.com/office/2004/12/omml" =
xmlns=3D"http://www.w3.org/TR/REC-html40"><head><meta =
http-equiv=3DContent-Type content=3D"text/html; charset=3Dutf-8"><meta =
name=3DGenerator content=3D"Microsoft Word 14 (filtered =
medium)"><style><!--
/* Font Definitions */
@font-face
	{font-family:Helvetica;
	panose-1:2 11 6 4 2 2 2 2 2 4;}
@font-face
	{font-family:Wingdings;
	panose-1:5 0 0 0 0 0 0 0 0 0;}
@font-face
	{font-family:"Cambria Math";
	panose-1:2 4 5 3 5 4 6 3 2 4;}
@font-face
	{font-family:Cambria;
	panose-1:2 4 5 3 5 4 6 3 2 4;}
@font-face
	{font-family:Calibri;
	panose-1:2 15 5 2 2 2 4 3 2 4;}
@font-face
	{font-family:Tahoma;
	panose-1:2 11 6 4 3 5 4 4 2 4;}
@font-face
	{font-family:"Brush Script MT";
	panose-1:3 6 8 2 4 4 6 7 3 4;}
@font-face
	{font-family:Consolas;
	panose-1:2 11 6 9 2 2 4 3 2 4;}
@font-face
	{font-family:"Times New Roman \, serif";}
/* Style Definitions */
p.MsoNormal, li.MsoNormal, div.MsoNormal
	{margin:0in;
	margin-bottom:.0001pt;
	font-size:11.0pt;
	font-family:"Calibri","sans-serif";
	color:black;}
a:link, span.MsoHyperlink
	{mso-style-priority:99;
	color:blue;
	text-decoration:underline;}
a:visited, span.MsoHyperlinkFollowed
	{mso-style-priority:99;
	color:purple;
	text-decoration:underline;}
pre
	{mso-style-priority:99;
	mso-style-link:"HTML Preformatted Char";
	margin:0in;
	margin-bottom:.0001pt;
	font-size:10.0pt;
	font-family:"Courier New";
	color:black;}
p.MsoAcetate, li.MsoAcetate, div.MsoAcetate
	{mso-style-priority:99;
	mso-style-link:"Balloon Text Char";
	margin:0in;
	margin-bottom:.0001pt;
	font-size:8.0pt;
	font-family:"Tahoma","sans-serif";
	color:black;}
p.MsoListParagraph, li.MsoListParagraph, div.MsoListParagraph
	{mso-style-priority:34;
	margin-top:0in;
	margin-right:0in;
	margin-bottom:0in;
	margin-left:.5in;
	margin-bottom:.0001pt;
	font-size:11.0pt;
	font-family:"Calibri","sans-serif";
	color:black;}
span.HTMLPreformattedChar
	{mso-style-name:"HTML Preformatted Char";
	mso-style-priority:99;
	mso-style-link:"HTML Preformatted";
	font-family:Consolas;
	color:black;}
span.EmailStyle20
	{mso-style-type:personal;
	font-family:"Cambria","serif";
	color:windowtext;}
span.EmailStyle21
	{mso-style-type:personal;
	font-family:"Cambria","serif";
	color:windowtext;
	font-weight:normal;
	font-style:normal;}
span.BalloonTextChar
	{mso-style-name:"Balloon Text Char";
	mso-style-priority:99;
	mso-style-link:"Balloon Text";
	font-family:"Tahoma","sans-serif";
	color:black;}
span.EmailStyle24
	{mso-style-type:personal-reply;
	font-family:"Cambria","serif";
	color:windowtext;
	font-weight:normal;
	font-style:normal;}
.MsoChpDefault
	{mso-style-type:export-only;
	font-size:10.0pt;}
@page WordSection1
	{size:8.5in 11.0in;
	margin:1.0in 1.0in 1.0in 1.0in;}
div.WordSection1
	{page:WordSection1;}
/* List Definitions */
@list l0
	{mso-list-id:217783835;
	mso-list-type:hybrid;
	mso-list-template-ids:1090914056 67698689 67698691 67698693 67698689 =
67698691 67698693 67698689 67698691 67698693;}
@list l0:level1
	{mso-level-number-format:bullet;
	mso-level-text:=EF=82=B7;
	mso-level-tab-stop:none;
	mso-level-number-position:left;
	margin-left:.75in;
	text-indent:-.25in;
	font-family:Symbol;}
@list l0:level2
	{mso-level-number-format:bullet;
	mso-level-text:o;
	mso-level-tab-stop:none;
	mso-level-number-position:left;
	margin-left:1.25in;
	text-indent:-.25in;
	font-family:"Courier New";}
@list l0:level3
	{mso-level-number-format:bullet;
	mso-level-text:=EF=82=A7;
	mso-level-tab-stop:none;
	mso-level-number-position:left;
	margin-left:1.75in;
	text-indent:-.25in;
	font-family:Wingdings;}
@list l0:level4
	{mso-level-number-format:bullet;
	mso-level-text:=EF=82=B7;
	mso-level-tab-stop:none;
	mso-level-number-position:left;
	margin-left:2.25in;
	text-indent:-.25in;
	font-family:Symbol;}
@list l0:level5
	{mso-level-number-format:bullet;
	mso-level-text:o;
	mso-level-tab-stop:none;
	mso-level-number-position:left;
	margin-left:2.75in;
	text-indent:-.25in;
	font-family:"Courier New";}
@list l0:level6
	{mso-level-number-format:bullet;
	mso-level-text:=EF=82=A7;
	mso-level-tab-stop:none;
	mso-level-number-position:left;
	margin-left:3.25in;
	text-indent:-.25in;
	font-family:Wingdings;}
@list l0:level7
	{mso-level-number-format:bullet;
	mso-level-text:=EF=82=B7;
	mso-level-tab-stop:none;
	mso-level-number-position:left;
	margin-left:3.75in;
	text-indent:-.25in;
	font-family:Symbol;}
@list l0:level8
	{mso-level-number-format:bullet;
	mso-level-text:o;
	mso-level-tab-stop:none;
	mso-level-number-position:left;
	margin-left:4.25in;
	text-indent:-.25in;
	font-family:"Courier New";}
@list l0:level9
	{mso-level-number-format:bullet;
	mso-level-text:=EF=82=A7;
	mso-level-tab-stop:none;
	mso-level-number-position:left;
	margin-left:4.75in;
	text-indent:-.25in;
	font-family:Wingdings;}
ol
	{margin-bottom:0in;}
ul
	{margin-bottom:0in;}
--></style><!--[if gte mso 9]><xml>
<o:shapedefaults v:ext=3D"edit" spidmax=3D"1026" />
</xml><![endif]--><!--[if gte mso 9]><xml>
<o:shapelayout v:ext=3D"edit">
<o:idmap v:ext=3D"edit" data=3D"1" />
</o:shapelayout></xml><![endif]--></head><body lang=3DEN-US link=3Dblue =
vlink=3Dpurple><div class=3DWordSection1><p class=3DMsoNormal><span =
style=3D'font-size:12.0pt;font-family:"Cambria","serif";color:windowtext'=
>Hi Torsten,<o:p></o:p></span></p><p class=3DMsoNormal><span =
style=3D'font-size:12.0pt;font-family:"Cambria","serif";color:windowtext'=
><o:p>&nbsp;</o:p></span></p><p class=3DMsoNormal><span =
style=3D'font-size:12.0pt;font-family:"Cambria","serif";color:windowtext'=
>Thanks for your additional comments.=C2=A0 I have added my comments =
inline.<o:p></o:p></span></p><p class=3DMsoNormal><span =
style=3D'font-size:12.0pt;font-family:"Cambria","serif";color:windowtext'=
><o:p>&nbsp;</o:p></span></p><div><p class=3DMsoNormal><span =
style=3D'font-size:12.0pt;color:windowtext'>Best =
regards,<o:p></o:p></span></p><p class=3DMsoNormal><span =
style=3D'font-size:24.0pt;font-family:"Brush Script =
MT";color:windowtext'>Don<o:p></o:p></span></p><p =
class=3DMsoNormal><span =
style=3D'font-size:12.0pt;color:windowtext'>Donald F. =
Coffin<o:p></o:p></span></p><p class=3DMsoNormal><span =
style=3D'font-size:12.0pt;color:windowtext'>Founder/CTO<o:p></o:p></span>=
</p><p class=3DMsoNormal><span =
style=3D'font-size:12.0pt;color:windowtext'><o:p>&nbsp;</o:p></span></p><=
p class=3DMsoNormal><span =
style=3D'font-size:12.0pt;color:windowtext'>REMI =
Networks<o:p></o:p></span></p><p class=3DMsoNormal><span =
style=3D'font-size:12.0pt;color:windowtext'>22751 El Prado Suite =
6216<o:p></o:p></span></p><p class=3DMsoNormal><span =
style=3D'font-size:12.0pt;color:windowtext'>Rancho Santa Margarita, =
CA=C2=A0 92688-3836<o:p></o:p></span></p><p class=3DMsoNormal><span =
style=3D'font-size:12.0pt;color:windowtext'><o:p>&nbsp;</o:p></span></p><=
p class=3DMsoNormal><span =
style=3D'font-size:12.0pt;color:windowtext'>Phone:=C2=A0=C2=A0=C2=A0=C2=A0=
=C2=A0 (949) 636-8571<o:p></o:p></span></p><p class=3DMsoNormal><span =
style=3D'font-size:12.0pt;color:windowtext'>Email:=C2=A0=C2=A0=C2=A0=C2=A0=
=C2=A0=C2=A0 <a href=3D"mailto:donald.coffin@reminetworks.com"><span =
style=3D'color:blue'>donald.coffin@reminetworks.com</span></a><o:p></o:p>=
</span></p></div><p class=3DMsoNormal><span =
style=3D'font-size:12.0pt;font-family:"Cambria","serif";color:windowtext'=
><o:p>&nbsp;</o:p></span></p><div><div =
style=3D'border:none;border-top:solid #B5C4DF 1.0pt;padding:3.0pt 0in =
0in 0in'><p class=3DMsoNormal><b><span =
style=3D'font-size:10.0pt;font-family:"Tahoma","sans-serif";color:windowt=
ext'>From:</span></b><span =
style=3D'font-size:10.0pt;font-family:"Tahoma","sans-serif";color:windowt=
ext'> Torsten Lodderstedt [mailto:torsten@lodderstedt.net] =
<br><b>Sent:</b> Sunday, February 03, 2013 1:42 AM<br><b>To:</b> Donald =
F Coffin<br><b>Cc:</b> George Fletcher; John Adkins; Scott Crowder; Dave =
Robin; John Teeter; &lt;pmadsen@pingidentity.com&gt;; Edward Denson; =
Marty Burns; Uday Verma; Ray Perlner; Anne Hendry; Lynne Rodoni; =
&lt;oauth@ietf.org&gt;<br><b>Subject:</b> Re: [OAUTH-WG] =
draft-ietf-oauth-revocation-04<o:p></o:p></span></p></div></div><p =
class=3DMsoNormal><o:p>&nbsp;</o:p></p><div><p class=3DMsoNormal>Hi =
Donald,<o:p></o:p></p></div><div><p =
class=3DMsoNormal><o:p>&nbsp;</o:p></p></div><div><p =
class=3DMsoNormal>thanks for your interest in OAuth and specifically the =
revocation draft. I have added my comments =
inline.<o:p></o:p></p></div><div><p =
class=3DMsoNormal><o:p>&nbsp;</o:p></p></div><div><p =
class=3DMsoNormal>@George: thanks for answering Donald's questions in =
the first place. I'm obviously to occupied with my day time work right =
now to react quickly.<o:p></o:p></p></div><div><p =
class=3DMsoNormal><o:p>&nbsp;</o:p></p></div><div><p =
class=3DMsoNormal>regards,<o:p></o:p></p></div><div><p =
class=3DMsoNormal>Torsten.<o:p></o:p></p></div><div><p =
class=3DMsoNormal><o:p>&nbsp;</o:p></p></div><div><p class=3DMsoNormal =
style=3D'margin-bottom:12.0pt'>Am 30.01.2013 um 01:29 schrieb =
&quot;Donald F Coffin&quot; &lt;<a =
href=3D"mailto:donald.coffin@reminetworks.com">donald.coffin@reminetworks=
.com</a>&gt;:<o:p></o:p></p></div><blockquote =
style=3D'margin-top:5.0pt;margin-bottom:5.0pt'><div><p =
class=3DMsoNormal><span =
style=3D'font-size:12.0pt;font-family:"Cambria","serif";color:windowtext'=
>George,</span><o:p></o:p></p><p class=3DMsoNormal><span =
style=3D'font-size:12.0pt;font-family:"Cambria","serif";color:windowtext'=
>&nbsp;</span><o:p></o:p></p><p class=3DMsoNormal><span =
style=3D'font-size:12.0pt;font-family:"Cambria","serif";color:windowtext'=
>Thanks for the quick response.&nbsp; I=E2=80=99ve added my comments =
after your responses below.</span><o:p></o:p></p><p =
class=3DMsoNormal><span =
style=3D'font-size:12.0pt;font-family:"Cambria","serif";color:windowtext'=
>&nbsp;</span><o:p></o:p></p><div><p class=3DMsoNormal><span =
style=3D'font-size:12.0pt;color:windowtext'>Best =
regards,</span><o:p></o:p></p><p class=3DMsoNormal><span =
style=3D'font-size:24.0pt;font-family:"Brush Script =
MT";color:windowtext'>Don</span><o:p></o:p></p><p =
class=3DMsoNormal><span =
style=3D'font-size:12.0pt;color:windowtext'>Donald F. =
Coffin</span><o:p></o:p></p><p class=3DMsoNormal><span =
style=3D'font-size:12.0pt;color:windowtext'>Founder/CTO</span><o:p></o:p>=
</p><p class=3DMsoNormal><span =
style=3D'font-size:12.0pt;color:windowtext'>&nbsp;</span><o:p></o:p></p><=
p class=3DMsoNormal><span =
style=3D'font-size:12.0pt;color:windowtext'>REMI =
Networks</span><o:p></o:p></p><p class=3DMsoNormal><span =
style=3D'font-size:12.0pt;color:windowtext'>22751 El Prado Suite =
6216</span><o:p></o:p></p><p class=3DMsoNormal><span =
style=3D'font-size:12.0pt;color:windowtext'>Rancho Santa Margarita, =
CA&nbsp; 92688-3836</span><o:p></o:p></p><p class=3DMsoNormal><span =
style=3D'font-size:12.0pt;color:windowtext'>&nbsp;</span><o:p></o:p></p><=
p class=3DMsoNormal><span =
style=3D'font-size:12.0pt;color:windowtext'>Phone:&nbsp;&nbsp;&nbsp;&nbsp=
;&nbsp; (949) 636-8571</span><o:p></o:p></p><p class=3DMsoNormal><span =
style=3D'font-size:12.0pt;color:windowtext'>Email:&nbsp;&nbsp;&nbsp;&nbsp=
;&nbsp;&nbsp; <a =
href=3D"mailto:donald.coffin@reminetworks.com">donald.coffin@reminetworks=
.com</a></span><o:p></o:p></p></div><p class=3DMsoNormal><span =
style=3D'font-size:12.0pt;font-family:"Cambria","serif";color:windowtext'=
>&nbsp;</span><o:p></o:p></p><div><div =
style=3D'border:none;border-top:solid #B5C4DF 1.0pt;padding:3.0pt 0in =
0in 0in'><p class=3DMsoNormal><b><span =
style=3D'font-size:10.0pt;font-family:"Tahoma","sans-serif";color:windowt=
ext'>From:</span></b><span =
style=3D'font-size:10.0pt;font-family:"Tahoma","sans-serif";color:windowt=
ext'> George Fletcher [<a =
href=3D"mailto:gffletch@aol.com">mailto:gffletch@aol.com</a>] =
<br><b>Sent:</b> Tuesday, January 29, 2013 3:29 PM<br><b>To:</b> Donald =
F Coffin<br><b>Cc:</b> Torsten Lodderstedt; John Adkins; Scott Crowder; =
Dave Robin; John Teeter; <a =
href=3D"mailto:pmadsen@pingidentity.com">pmadsen@pingidentity.com</a>; =
Edward Denson; Marty Burns; Uday Verma; Ray Perlner; Anne Hendry; Lynne =
Rodoni; <a =
href=3D"mailto:oauth@ietf.org">oauth@ietf.org</a><br><b>Subject:</b> Re: =
[OAUTH-WG] =
draft-ietf-oauth-revocation-04</span><o:p></o:p></p></div></div><p =
class=3DMsoNormal>&nbsp;<o:p></o:p></p><p class=3DMsoNormal =
style=3D'margin-bottom:12.0pt'><span =
style=3D'font-family:"Helvetica","sans-serif"'>First, just want to say =
this is a great write up of the situation. Thanks!<br><br>A couple of =
additional thoughts regarding token management and =
processing...<br><br>1. If all tokens being revoked are tokens issued by =
the same Authorization Server (AS) then it can easily mark which are =
refresh and which are access such that I'm not sure an additional =
parameter is needed. If the issue is integrating with legacy tokens, =
then I can see a short term need as an optimization while the tokens =
rotate through. The question is whether the short term need of the =
parameter justifies it if long term it's not needed. Maybe an option is =
for the ESPI profile to specify an additional parameter that is not =
required by this spec.</span><o:p></o:p></p><p class=3DMsoNormal =
style=3D'margin-left:.5in;text-indent:-.5in'><span =
style=3D'font-size:12.0pt;font-family:"Cambria","serif";color:#0070C0'>[D=
on] A few utilities have launched =E2=80=9C<b>Connect My =
Data</b>=E2=80=9D programs with Third Party applications, but these are =
using Certificates as a means of identifying Third Party =
applications.&nbsp; There are no utilities, to my knowledge, with =
=E2=80=9C<b>Connect My Data</b>=E2=80=9D programs that have implemented =
<b>OAuth 2.0.&nbsp; </b>The current <b>ESPI Standard</b> requires the =
implementation of <b>OAuth 1.0</b>.&nbsp; Therefore, there should not be =
a legacy token issue. &nbsp;As a result of the work our group is doing, =
we will shortly submit a request to <b>NAESB</b> to revise the existing =
standard to reflect the migration from <b>OAuth 1.0</b> to <b>OAuth =
2.0</b>.<br><br>Your suggestion to =E2=80=9Cmark which are refresh and =
which are access=E2=80=9D tokens while providing a method to identify =
what type of token was issued after it has been found, still poses a =
processing problem if the only parameter on the <b>Token Revocation</b> =
request is the Token.&nbsp; Even implementing your suggestion it will =
still be necessary to scan the entire set of Tokens to locate and =
identify what type of Token is being revoked.&nbsp; If a =
<b>token_type</b> parameter is provided with the <b>Token Revocation =
</b>request the only Tokens that need to be scanned are those matching =
the type being revoked.&nbsp; This will significantly reduce the size of =
the dataset and therefore expedite the search.&nbsp; I realize assigning =
the Token value as an index key would also improve the retrieval =
time.&nbsp; Since that is an implementation feature, it is beyond the =
scope of the activity our group is chartered to =
perform.</span><o:p></o:p></p></div></blockquote><div><p =
class=3DMsoNormal><span style=3D'font-size:12.0pt;font-family:"Times New =
Roman","serif";color:windowtext'><o:p>&nbsp;</o:p></span></p></div><div><=
p class=3DMsoNormal><span style=3D'font-size:12.0pt;font-family:"Times =
New Roman","serif";color:windowtext'>The effort needed directly depends =
on your token design. If, for example, access and refresh tokens could =
be distinguished by the first byte (like magic bytes in data files), =
things are evenly easy than having the additional parameter. If your =
need to issue a database lookup, things get more processing =
intensive.<o:p></o:p></span></p></div><div><p class=3DMsoNormal><span =
style=3D'font-size:12.0pt;font-family:"Times New =
Roman","serif";color:windowtext'><o:p>&nbsp;</o:p></span></p></div><div><=
p class=3DMsoNormal><span style=3D'font-size:12.0pt;font-family:"Times =
New Roman","serif";color:windowtext'>I'm not against adding the =
parameter (again). We had this discussion for quite a while and decided =
against adding it again because of the current stage of the =
draft.<o:p></o:p></span></p></div><div><p class=3DMsoNormal><span =
style=3D'font-size:12.0pt;font-family:"Times New =
Roman","serif";color:windowtext'><o:p>&nbsp;</o:p></span></p></div><div><=
p class=3DMsoNormal><span style=3D'font-size:12.0pt;font-family:"Times =
New Roman","serif";color:windowtext'>see also&nbsp;<a =
href=3D"http://www.ietf.org/mail-archive/web/oauth/current/msg10211.html"=
>http://www.ietf.org/mail-archive/web/oauth/current/msg10211.html</a>&nbs=
p;for the options we had discussed.<o:p></o:p></span></p><p =
class=3DMsoNormal><span =
style=3D'font-size:12.0pt;font-family:"Cambria","serif";color:windowtext'=
><o:p>&nbsp;</o:p></span></p><p class=3DMsoNormal =
style=3D'margin-left:.5in;text-indent:-.5in'><span =
style=3D'font-size:12.0pt;font-family:"Cambria","serif";color:windowtext'=
>[Don] Thanks for the suggestion the format of the token could be =
distinguished by the first byte.=C2=A0 Since this is an implementation =
decision, it is beyond the scope of the work of the OpenESPI and OpenADE =
Task Force and therefore is something we could recommend in an =
implementation note only.=C2=A0 The creation of an implementation =
document has not been discussed within the group but is something we =
could look into providing after we complete the architectural task of =
integrating OAuth 2.0 with the ESPI standard.=C2=A0 However, using a =
data format solution with tokens seems to be a short term solution, =
given the additional number of tokens being created by the =
=E2=80=9C<b><i>OAuth Dynamic Client Registration =
Protocol</i></b>=E2=80=9D and =E2=80=9C<b><i>User-Managed Access (UMA) =
Profile of OAuth 2.0</i></b>=E2=80=9D drafts.=C2=A0 Since the management =
of an embedded marker could itself become very challenging, especially =
given any additional future RFC could in theory add even more token =
types, as the new proposed RFCs seem to be closing OAuth 2.0 =
implementation concerns or capabilities not covered in the core =
document.<o:p></o:p></span></p></div><div><p class=3DMsoNormal =
style=3D'margin-left:.5in;text-indent:-.5in'><span =
style=3D'font-family:"Helvetica","sans-serif"'><br><br>2. I don't think =
you can always revoke the refresh_token if an access_token is revoked. I =
can see a use case where a client gets a refresh_token and an =
access_token. The client uses the access_token for 5 minutes but the =
access_token is good for an hour. So the client revokes the access_token =
to ensure it can't be used again. The client will just use it's =
refresh_token when it needs another access_token. In this case, revoking =
the refresh_token would &quot;break&quot; the client. In addition, =
unless you add audience style checking to the token processing rules, =
you open up the AS to a denial of service attack. Basically, if the AS =
revokes the refresh_token when an access_token is revoked, I can steal =
an access_token and send it to the revocation endpoint causing the real =
client's refresh_token to be revoked. To prevent this, the tokens should =
be bound to the client_id to which they were issued, and should only be =
revocable from that client_id.<o:p></o:p></span></p><p =
class=3DMsoNormal><span =
style=3D'font-size:12.0pt;font-family:"Cambria","serif";color:windowtext'=
><o:p>&nbsp;</o:p></span></p><p class=3DMsoNormal =
style=3D'margin-left:.5in;text-indent:-.5in'><span =
style=3D'font-size:12.0pt;font-family:"Cambria","serif";color:windowtext'=
>[Don] A typical Third Party application built to use the ESPI Standard =
will interact with a Retail Customer and their energy provider.=C2=A0 =
The nature of interaction with the Retail Customer will utilize short =
interactive sessions.=C2=A0 However, the interaction with their energy =
provider will require the application obtain new energy information for =
the previous 24-hours once a day.=C2=A0 Therefore, I anticipate =
access_tokens will be granted for long periods of time as well as any =
supporting refresh_tokens.=C2=A0 Because of the amount of data being =
exchanged between the Third Party application and the energy provider, =
both in number of retail customers and the amount of energy meter data, =
it will be necessary to minimize the amount of =
=E2=80=9Cadministrative=E2=80=9D traffic required in the exchange.=C2=A0 =
Therefore, although I understand the use case you described, I =
anticipate such an implementation would be rare.=C2=A0 =
<o:p></o:p></span></p><p class=3DMsoNormal =
style=3D'margin-left:.5in;text-indent:-.5in'><span =
style=3D'font-size:12.0pt;font-family:"Cambria","serif";color:windowtext'=
><o:p>&nbsp;</o:p></span></p><p class=3DMsoNormal =
style=3D'margin-left:.5in'><span =
style=3D'font-size:12.0pt;font-family:"Cambria","serif";color:windowtext'=
>The need to perform an audience style check to prevent exposure of the =
AS to a denial of service attack, appears primarily due to the fact the =
Revocation RFC requires an access_token and refresh_token to be revoked =
independently.=C2=A0 Should a client need to revoke both Tokens the =
sequence of the revocation request is extremely significant.=C2=A0 A =
simple solution to this problem would be to provide a method that allows =
a request to revoke both tokens simultaneously, as stated in one of the =
responses you referenced in the archives.=C2=A0 <o:p></o:p></span></p><p =
class=3DMsoNormal style=3D'margin-left:.5in'><span =
style=3D'font-size:12.0pt;font-family:"Cambria","serif";color:windowtext'=
><o:p>&nbsp;</o:p></span></p><p class=3DMsoNormal =
style=3D'margin-left:.5in'><span =
style=3D'font-size:12.0pt;font-family:"Cambria","serif";color:windowtext'=
>The example you gave in your response demonstrating how a denial of =
service attack might occur is incorrect.=C2=A0 You said =E2=80=9Cif the =
AS revokes the refresh_token when an access_token is revoked, I can =
steal an access_token and send it to the revocation endpoint causing the =
real client=E2=80=99s refresh_token to be revoked=E2=80=9D.=C2=A0 I fail =
to see how that could occur, since the AS revoked both the access_token =
and the refresh_token when it received the request to revoke the =
access_token.=C2=A0 Rather than explaining why a refresh_token =
shouldn=E2=80=99t be revoked concurrently when an access_token is =
revoked, your example does the exact opposite.=C2=A0 It shows why a =
refresh_token should be revoked concurrently when an access_token is =
revoked.<o:p></o:p></span></p><p class=3DMsoNormal><span =
style=3D'font-size:12.0pt;font-family:"Cambria","serif";color:windowtext'=
>&nbsp;</span><o:p></o:p></p><p class=3DMsoNormal =
style=3D'mso-margin-top-alt:0in;margin-right:0in;margin-bottom:12.0pt;mar=
gin-left:.5in;text-indent:-.5in'><span =
style=3D'font-size:12.0pt;font-family:"Cambria","serif";color:#0070C0'>[D=
on] The focus of the <b>ESPI Standard</b> is to provide Retail =
Customer=E2=80=99s with access to a single UsagePoint (i.e. their Smart =
Meter).&nbsp; Therefore an access and refresh token will be tightly =
correlated with the type and frequency of data the Smart Meter =
provides.&nbsp; There are only a few reasons defined within the <b>ESPI =
Standard</b> list of use cases that will require the <b>Token =
Revocation</b> request to be issued.&nbsp; The following summarizes the =
situations that require a <b>Token Revocation =
</b>request:</span><o:p></o:p></p><p class=3DMsoListParagraph =
style=3D'mso-margin-top-alt:0in;margin-right:0in;margin-bottom:12.0pt;mar=
gin-left:.75in;text-indent:-.25in;mso-list:l0 level1 lfo2'><![if =
!supportLists]><span style=3D'font-family:Symbol'><span =
style=3D'mso-list:Ignore'>=C2=B7<span style=3D'font:7.0pt "Times New =
Roman"'>&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp; =
</span></span></span><![endif]><span =
style=3D'font-size:12.0pt;font-family:"Cambria","serif";color:#0070C0'>A =
Third Party application wishes to terminate their relationship with a =
Retail Customer.</span><o:p></o:p></p><p class=3DMsoListParagraph =
style=3D'mso-margin-top-alt:0in;margin-right:0in;margin-bottom:12.0pt;mar=
gin-left:.75in;text-indent:-.25in;mso-list:l0 level1 lfo2'><![if =
!supportLists]><span style=3D'font-family:Symbol'><span =
style=3D'mso-list:Ignore'>=C2=B7<span style=3D'font:7.0pt "Times New =
Roman"'>&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp; =
</span></span></span><![endif]><span =
style=3D'font-size:12.0pt;font-family:"Cambria","serif";color:#0070C0'>A =
Third Party application wishes to terminate their relationship with a =
Data Custodian.</span><o:p></o:p></p><p class=3DMsoListParagraph =
style=3D'mso-margin-top-alt:0in;margin-right:0in;margin-bottom:12.0pt;mar=
gin-left:.75in;text-indent:-.25in;mso-list:l0 level1 lfo2'><![if =
!supportLists]><span style=3D'font-family:Symbol'><span =
style=3D'mso-list:Ignore'>=C2=B7<span style=3D'font:7.0pt "Times New =
Roman"'>&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp; =
</span></span></span><![endif]><span =
style=3D'font-size:12.0pt;font-family:"Cambria","serif";color:#0070C0'>A =
Retail Customer wishes to terminate their relationship with a Third =
Party application.</span><o:p></o:p></p><p class=3DMsoListParagraph =
style=3D'mso-margin-top-alt:0in;margin-right:0in;margin-bottom:12.0pt;mar=
gin-left:.75in;text-indent:-.25in;mso-list:l0 level1 lfo2'><![if =
!supportLists]><span style=3D'font-family:Symbol'><span =
style=3D'mso-list:Ignore'>=C2=B7<span style=3D'font:7.0pt "Times New =
Roman"'>&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp; =
</span></span></span><![endif]><span =
style=3D'font-size:12.0pt;font-family:"Cambria","serif";color:#0070C0'>A =
Retail Customer wishes to change the data (i.e. scope) a Third Party =
application has permission to access.</span><o:p></o:p></p><p =
class=3DMsoNormal =
style=3D'mso-margin-top-alt:0in;margin-right:0in;margin-bottom:12.0pt;mar=
gin-left:.5in'><span =
style=3D'font-size:12.0pt;font-family:"Cambria","serif";color:#0070C0'>In=
 none of the above situations will it be valid to retain a refresh =
token, which I realize is implementation dependent, due to the nature of =
the <b>ESPI Standard.</b></span><o:p></o:p></p><p class=3DMsoNormal =
style=3D'mso-margin-top-alt:0in;margin-right:0in;margin-bottom:12.0pt;mar=
gin-left:.5in'><span =
style=3D'font-size:12.0pt;font-family:"Cambria","serif";color:#0070C0'>Pe=
rhaps the section on the <b>Server=E2=80=99s Revocation Policy</b> =
should address a few of the reasons why a client may want or need to =
revoke a token.&nbsp; The current description provides no consideration =
for the relationship between tokens and scope, although there clearly is =
a relationship.</span><o:p></o:p></p></div><div><p =
class=3DMsoNormal><span style=3D'font-size:12.0pt;font-family:"Times New =
Roman","serif";color:windowtext'>I'm confident client or resource owner =
would revoke refresh (and not access) tokens in all use cases you listed =
above. In my opinion, access tokens are revoked only if the =
authorization server does not support refresh tokens and therefore uses =
long term access tokens or in high-security =
applications.<o:p></o:p></span></p><p class=3DMsoNormal><span =
style=3D'font-size:12.0pt;font-family:"Cambria","serif";color:windowtext'=
><o:p>&nbsp;</o:p></span></p><p class=3DMsoNormal =
style=3D'margin-left:.5in;text-indent:-.5in'><span =
style=3D'font-size:12.0pt;font-family:"Cambria","serif";color:windowtext'=
>[Don] Based on the above statement it would appear you assume an access =
token is only valid for a short period of time.=C2=A0 However, as I =
explained in my last response, due to the nature of the access required =
by the client and the manner in which the RS provides that data, access =
token durations will typically be in days not minutes. =
=C2=A0=C2=A0Therefore, merely revoking a refresh_token will expose the =
data to access that the resource owner meant to prevent unless the =
access_token is also revoked.<o:p></o:p></span></p></div><div><p =
class=3DMsoNormal><span style=3D'font-size:12.0pt;font-family:"Times New =
Roman","serif";color:windowtext'><o:p>&nbsp;</o:p></span></p></div><div><=
p class=3DMsoNormal><span style=3D'font-size:12.0pt;font-family:"Times =
New Roman","serif";color:windowtext'>I would also like to hear the =
opinion of other WG members on this =
topic.<o:p></o:p></span></p></div><div><p class=3DMsoNormal><span =
style=3D'font-size:12.0pt;font-family:"Times New =
Roman","serif";color:windowtext'><o:p>&nbsp;</o:p></span></p></div><block=
quote style=3D'margin-top:5.0pt;margin-bottom:5.0pt'><div><p =
class=3DMsoNormal style=3D'margin-bottom:12.0pt'><span =
style=3D'font-family:"Helvetica","sans-serif"'>3. If the standard OAuth =
spec does not provide enough control, your profile of OAuth2 for the =
ESPI can tighten it to provide the protections =
desired.</span><o:p></o:p></p><p class=3DMsoNormal =
style=3D'mso-margin-top-alt:0in;margin-right:0in;margin-bottom:12.0pt;mar=
gin-left:.5in;text-indent:-.5in'><span =
style=3D'font-size:12.0pt;font-family:"Cambria","serif";color:#0070C0'>[D=
on] I am aware we can provide additional parameters required to =
integrate <b>OAuth 2.0 </b>with the <b>ESPI Standard</b> by submitting =
those parameter values to the <b>OAuth Parameters</b> registry. I would =
prefer not to do that, given the large amount of work being done on =
RFC-drafts to resolve many of the issues we are facing to integrate =
<b>OAuth 2.0</b> with the <b>ESPI Standard</b>, since the need to use =
those extensions will most likely be short =
lived.</span><o:p></o:p></p></div></blockquote><div><p =
class=3DMsoNormal><span style=3D'font-size:12.0pt;font-family:"Times New =
Roman","serif";color:windowtext'><o:p>&nbsp;</o:p></span></p></div><p =
class=3DMsoNormal><span style=3D'font-size:12.0pt;font-family:"Times New =
Roman","serif";color:windowtext'>Hmmm, if the need is only short lived, =
why do you want to make it part of the long living revocation =
RFC?<o:p></o:p></span></p><p class=3DMsoNormal><span =
style=3D'font-size:12.0pt;font-family:"Cambria","serif";color:windowtext'=
><o:p>&nbsp;</o:p></span></p><p class=3DMsoNormal =
style=3D'margin-left:.5in;text-indent:-.5in'><span =
style=3D'font-size:12.0pt;font-family:"Cambria","serif";color:windowtext'=
>[Don] My response was to the suggestion that if the OAuth specification =
does not provide enough control then the ESPI profile of OAuth 2.0 could =
tighten it to provide the protections desired.=C2=A0 I assumed George =
meant we could add additional =E2=80=9Ccompany=E2=80=9D based =
parameters, which requires us to register them with the =E2=80=9COAuth =
Parameter Registry=E2=80=9D.=C2=A0 I meant the usage of such =
=E2=80=9Ccompany=E2=80=9D parameters would be short =
termed.<o:p></o:p></span></p><p class=3DMsoNormal =
style=3D'margin-left:.5in;text-indent:-.5in'><span =
style=3D'font-size:12.0pt;font-family:"Cambria","serif";color:windowtext'=
><o:p>&nbsp;</o:p></span></p><p class=3DMsoNormal =
style=3D'margin-left:.5in'><span =
style=3D'font-size:12.0pt;font-family:"Cambria","serif";color:windowtext'=
>I do not view the need to identify the type of token being revoked as =
=E2=80=9Cshort term=E2=80=9D.=C2=A0 Even the previous exchanges on the =
topic within the WG indicates it feels there may be a need to add an =
additional parameter to the request.=C2=A0 However, because the draft is =
too far along, the WG seems to prefer releasing an RFC they =
=E2=80=9Csuspect=E2=80=9D will need to be adjusted and let the =
implementers confirm their suspicions.=C2=A0=C2=A0 This seems to be a =
very selfish and rather foolish attitude given we are discussing a =
security protocol.=C2=A0 Not to mention it would seem easier and faster =
to add an additional =E2=80=9Coptional=E2=80=9D parameter now, rather =
than requiring another RFC cycle. =C2=A0A parameter I sensed in reading =
the archives the WG feels will very likely need to be added in the =
future.<o:p></o:p></span></p><div><p class=3DMsoNormal><span =
style=3D'font-size:12.0pt;font-family:"Times New =
Roman","serif";color:windowtext'><br><br><o:p></o:p></span></p><div><p =
class=3DMsoNormal style=3D'margin-bottom:12.0pt'><span =
style=3D'font-family:"Helvetica","sans-serif"'>Thanks,<br>George</span><o=
:p></o:p></p><div><p class=3DMsoNormal>On 1/29/13 3:28 PM, Donald F =
Coffin wrote:<o:p></o:p></p></div><blockquote =
style=3D'margin-top:5.0pt;margin-bottom:5.0pt'><p =
class=3DMsoNormal><span =
style=3D'font-size:12.0pt;font-family:"Cambria","serif"'>Hi =
Thorsten,</span><o:p></o:p></p><p class=3DMsoNormal><span =
style=3D'font-size:12.0pt;font-family:"Cambria","serif"'>&nbsp;</span><o:=
p></o:p></p><p class=3DMsoNormal><span =
style=3D'font-size:12.0pt;font-family:"Cambria","serif"'>I am working =
with the OpenADE Task Force to document how the =E2=80=9C<b><i>Energy =
Service Provider Interface (ESPI) Standard</i></b> =E2=80=9D published =
by the <b>North American Energy Standards Board</b> (NAESB) in October =
of 2011 should be implemented.&nbsp; The <b>ESPI Standard</b> defines =
how Retail Customers, Third Party applications, and Data Custodians =
(i.e. electrical, gas, or water utility) must interface to each other =
and the data format used to exchange energy information.&nbsp; &nbsp;The =
interface between the Retail Customer and the Data Custodian is known as =
=E2=80=9C<b>Download My Data</b>=E2=80=9D, which defines how a Retail =
Customer receives their energy information in an XML file downloaded to =
them by the Data Custodian.&nbsp; The interface between the Third Party =
application and the Data Custodian is known as =E2=80=9C<b>Connect My =
Data</b>=E2=80=9D, which defines the message exchanges between the Third =
Party application and the Data Custodian to allow the Third Party to =
access data at the Data Custodian after a Retail Customer has granted =
the Third Party application access.</span><o:p></o:p></p><p =
class=3DMsoNormal><span =
style=3D'font-size:12.0pt;font-family:"Cambria","serif"'>&nbsp;</span><o:=
p></o:p></p><p class=3DMsoNormal><span =
style=3D'font-size:12.0pt;font-family:"Cambria","serif"'>It is my =
responsibility within the OpenADE Task Force to document the integration =
of the <b>OAuth 2.0</b> protocol with the <b>ESPI Standard.</b>&nbsp; =
Since the <b>ESPI Standard</b> requires Retail Customers, Third Party =
applications, and Data Custodians to revoke Tokens (i.e. Access and =
Refresh Tokens) I am very interested in the =E2=80=9C<b><i>Token =
Revocation (draft-ietf-oath-revocation-xx)</i></b>=E2=80=9D work being =
done by you and your working group. </span><o:p></o:p></p><p =
class=3DMsoNormal><span =
style=3D'font-size:12.0pt;font-family:"Cambria","serif"'>&nbsp;</span><o:=
p></o:p></p><p class=3DMsoNormal><b><u><span =
style=3D'font-size:12.0pt;font-family:"Cambria","serif"'>Token =
Revocation Request</span></u></b><o:p></o:p></p><p =
class=3DMsoNormal><span =
style=3D'font-size:12.0pt;font-family:"Cambria","serif"'>&nbsp;</span><o:=
p></o:p></p><p class=3DMsoNormal><span =
style=3D'font-size:12.0pt;font-family:"Cambria","serif"'>The <b>Token =
Revocation</b> request has only the =E2=80=9Ctoken=E2=80=9D parameter =
with the description that the authorization server is supposed to detect =
the token type automatically.&nbsp; I would like to request that an =
addition parameter =E2=80=9Ctoken_type=E2=80=9D be added to the =
request.&nbsp; The =E2=80=9Ctoken_type=E2=80=9D parameter could be =
optional and would define the type of token being revoked (i.e. =
=E2=80=9Caccess=E2=80=9D, =E2=80=9Crefresh=E2=80=9D, =
=E2=80=9Cregistration access=E2=80=9D, etc.).</span><o:p></o:p></p><p =
class=3DMsoNormal><span =
style=3D'font-size:12.0pt;font-family:"Cambria","serif"'>&nbsp;</span><o:=
p></o:p></p><p class=3DMsoNormal><span =
style=3D'font-size:12.0pt;font-family:"Cambria","serif"'>The <b>ESPI =
Standard</b> was developed to support the <b>Advanced Meter =
Interface</b> <b>(AMI) </b>which is the interface used by =E2=80=9CSmart =
Meters=E2=80=9D to provide automated energy usage collection and other =
operational information about a Retail Customer=E2=80=99s residence to =
their Data Custodian.&nbsp; Third Party applications will be required to =
obtain the approval if each Retail Customer that has had a =
=E2=80=9CSmart Meter=E2=80=9D installed before they will be able to =
access the data provided by their =E2=80=9CSmart Meter=E2=80=9D.&nbsp; =
The number of =E2=80=9CSmart Meters=E2=80=9D currently installed at the =
three largest California utilities (Pacific Gas &amp; Electric, Southern =
California Edison, and San Diego Gas &amp; Electric) is in excess of =
10.0 M and growing.&nbsp; The following table indicates the number of =
=E2=80=9CSmart Meters=E2=80=9D each of the three utilities had installed =
as of May 2012:</span><o:p></o:p></p><p class=3DMsoNormal><span =
style=3D'font-size:12.0pt;font-family:"Cambria","serif"'>&nbsp;</span><o:=
p></o:p></p><table class=3DMsoNormalTable border=3D0 cellspacing=3D0 =
cellpadding=3D0 =
style=3D'margin-left:66.2pt;border-collapse:collapse'><tr><td =
width=3D319 valign=3Dtop style=3D'width:239.4pt;border:solid windowtext =
1.0pt;background:#A6A6A6;padding:0in 5.4pt 0in 5.4pt'><p =
class=3DMsoNormal align=3Dcenter style=3D'text-align:center'><b><span =
style=3D'font-size:14.0pt;font-family:"Cambria","serif"'>Utility</span></=
b><o:p></o:p></p></td><td width=3D319 valign=3Dtop =
style=3D'width:239.4pt;border:solid windowtext =
1.0pt;border-left:none;background:#A6A6A6;padding:0in 5.4pt 0in =
5.4pt'><p class=3DMsoNormal align=3Dcenter =
style=3D'text-align:center'><b><span =
style=3D'font-size:14.0pt;font-family:"Cambria","serif"'>=E2=80=9CSmart =
Meters=E2=80=9D Installed</span></b><o:p></o:p></p></td></tr><tr><td =
width=3D319 valign=3Dtop style=3D'width:239.4pt;border:solid windowtext =
1.0pt;border-top:none;padding:0in 5.4pt 0in 5.4pt'><p =
class=3DMsoNormal><span =
style=3D'font-size:12.0pt;font-family:"Cambria","serif"'>Pacific Gas =
&amp; Electric (PG&amp;E)</span><o:p></o:p></p></td><td width=3D319 =
valign=3Dtop =
style=3D'width:239.4pt;border-top:none;border-left:none;border-bottom:sol=
id windowtext 1.0pt;border-right:solid windowtext 1.0pt;padding:0in =
5.4pt 0in 5.4pt'><p class=3DMsoNormal align=3Dright =
style=3D'text-align:right'><span =
style=3D'font-size:12.0pt;font-family:"Cambria","serif"'>4,696,000</span>=
<o:p></o:p></p></td></tr><tr><td width=3D319 valign=3Dtop =
style=3D'width:239.4pt;border:solid windowtext =
1.0pt;border-top:none;padding:0in 5.4pt 0in 5.4pt'><p =
class=3DMsoNormal><span =
style=3D'font-size:12.0pt;font-family:"Cambria","serif"'>San Diego Gas =
&amp; Electric (SDG&amp;E)</span><o:p></o:p></p></td><td width=3D319 =
valign=3Dtop =
style=3D'width:239.4pt;border-top:none;border-left:none;border-bottom:sol=
id windowtext 1.0pt;border-right:solid windowtext 1.0pt;padding:0in =
5.4pt 0in 5.4pt'><p class=3DMsoNormal align=3Dright =
style=3D'text-align:right'><span =
style=3D'font-size:12.0pt;font-family:"Cambria","serif"'>1,364,000</span>=
<o:p></o:p></p></td></tr><tr><td width=3D319 valign=3Dtop =
style=3D'width:239.4pt;border:solid windowtext =
1.0pt;border-top:none;padding:0in 5.4pt 0in 5.4pt'><p =
class=3DMsoNormal><span =
style=3D'font-size:12.0pt;font-family:"Cambria","serif"'>Southern =
California Edison (SCE)</span><o:p></o:p></p></td><td width=3D319 =
valign=3Dtop =
style=3D'width:239.4pt;border-top:none;border-left:none;border-bottom:sol=
id windowtext 1.0pt;border-right:solid windowtext 1.0pt;padding:0in =
5.4pt 0in 5.4pt'><p class=3DMsoNormal align=3Dright =
style=3D'text-align:right'><span =
style=3D'font-size:12.0pt;font-family:"Cambria","serif"'>3,900,000</span>=
<o:p></o:p></p></td></tr></table><p class=3DMsoNormal><span =
style=3D'font-size:12.0pt;font-family:"Cambria","serif"'>&nbsp;</span><o:=
p></o:p></p><p class=3DMsoNormal><span =
style=3D'font-size:12.0pt;font-family:"Cambria","serif"'>The numbers in =
the chart were taken from the =E2=80=9C<b><i>Utility-Scale Smart Meter =
Deployments, Plans, &amp; Proposals -- IEE Report</i></b>=E2=80=9D =
published May 2012 by <b>The Edison Foundation Institute for Electric =
Efficiency=E2=80=9D </b>which I have attached.&nbsp; The number of =
=E2=80=9CSmart Meters=E2=80=9D currently installed are even larger than =
shown in the report as I compose this email.&nbsp; Assuming 10% of =
Pacific Gas &amp; Electric=E2=80=99s Retail Customers decide to utilize =
a Third Party application (3 Third Party applications are currently =
supported and are 3 more Third Party applications are preparing to be =
supported) in order to support the ability to revoke a token they would =
be required to track 500,000 access tokens and 500,000 refresh =
tokens.&nbsp; Requiring PG&amp;E=E2=80=99s authorization server to =
=E2=80=9Cautomatically=E2=80=9D determine the type of Token being =
revoked begins to negatively impact their processing capability.&nbsp; =
If the <b>Token Revocation</b> request was capable of indicating the =
type of Token to be revoked, the amount of time it will take =
PG&amp;E=E2=80=99s authorization server would show a significant time =
savings to process the request.</span><o:p></o:p></p><p =
class=3DMsoNormal><span =
style=3D'font-size:12.0pt;font-family:"Cambria","serif"'>&nbsp;</span><o:=
p></o:p></p><p class=3DMsoNormal><b><u><span =
style=3D'font-size:12.0pt;font-family:"Cambria","serif"'>Authorization =
Server Revocation Policy</span></u></b><o:p></o:p></p><p =
class=3DMsoNormal><span =
style=3D'font-size:12.0pt;font-family:"Cambria","serif"'>&nbsp;</span><o:=
p></o:p></p><p class=3DMsoNormal><span =
style=3D'font-size:12.0pt;font-family:"Cambria","serif"'>&nbsp;</span><o:=
p></o:p></p><p class=3DMsoListParagraph =
style=3D'text-indent:-.25in'><span =
style=3D'font-size:12.0pt;font-family:"Cambria","serif"'>&nbsp;&nbsp;&nbs=
p;&nbsp;&nbsp; </span>6.<span =
style=3D'font-size:7.0pt;font-family:"Times New Roman \, =
serif"'>&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp; </span>Does the revocation =
of the access token also revoke the refresh token (if it was provided) ? =
Or is this a revocation policy decision ?<o:p></o:p></p><p =
class=3DMsoNormal><span =
style=3D'font-size:12.0pt;font-family:"Cambria","serif"'>&nbsp;</span><o:=
p></o:p></p><p class=3DMsoNormal style=3D'margin-left:1.0in'><span =
style=3D'font-size:12.0pt;font-family:"Times New Roman \, serif"'>- if =
the token passed to the request is a refresh token and the server =
supports access token revocation, the server SHOULD also revoke =
them.<br>- if the token passed to the request is an access token, the =
server may decide to revoke the respective refresh token as =
well.</span><o:p></o:p></p><p class=3DMsoNormal =
style=3D'margin-left:1.0in'><span =
style=3D'font-size:12.0pt;font-family:"Times New Roman \, =
serif"'>&nbsp;</span><o:p></o:p></p><p class=3DMsoNormal =
style=3D'margin-left:1.0in'><span =
style=3D'font-size:12.0pt;font-family:"Times New Roman \, serif"'>I =
believe that if the token passed in the request is an access token, the =
server MUST revoke any respective refresh token.&nbsp; Otherwise, their =
exist a potential security risk of the respective refresh token being =
used to gain access to the resources for which the access token was =
issued.&nbsp; It also means the authorization server will have potential =
=E2=80=9Cjunk=E2=80=9D in the refresh token file to search through for =
any additional Token Revocation request.</span><o:p></o:p></p><p =
class=3DMsoNormal style=3D'margin-left:1.0in'><span =
style=3D'font-size:12.0pt;font-family:"Times New Roman \, =
serif"'>&nbsp;</span><o:p></o:p></p><p class=3DMsoNormal><span =
style=3D'font-size:12.0pt;font-family:"Times New Roman \, serif"'>I look =
forward to receiving your response.</span><o:p></o:p></p><p =
class=3DMsoNormal><span =
style=3D'font-size:12.0pt;font-family:"Cambria","serif"'>&nbsp;</span><o:=
p></o:p></p><p class=3DMsoNormal><span style=3D'font-size:12.0pt'>Best =
regards,</span><o:p></o:p></p><p class=3DMsoNormal><span =
style=3D'font-size:24.0pt;font-family:"Brush Script =
MT"'>Don</span><o:p></o:p></p><p class=3DMsoNormal><span =
style=3D'font-size:12.0pt'>Donald F. Coffin</span><o:p></o:p></p><p =
class=3DMsoNormal><span =
style=3D'font-size:12.0pt'>Founder/CTO</span><o:p></o:p></p><p =
class=3DMsoNormal><span =
style=3D'font-size:12.0pt'>&nbsp;</span><o:p></o:p></p><p =
class=3DMsoNormal><span style=3D'font-size:12.0pt'>REMI =
Networks</span><o:p></o:p></p><p class=3DMsoNormal><span =
style=3D'font-size:12.0pt'>22751 El Prado Suite =
6216</span><o:p></o:p></p><p class=3DMsoNormal><span =
style=3D'font-size:12.0pt'>Rancho Santa Margarita, CA&nbsp; =
92688-3836</span><o:p></o:p></p><p class=3DMsoNormal><span =
style=3D'font-size:12.0pt'>&nbsp;</span><o:p></o:p></p><p =
class=3DMsoNormal><span =
style=3D'font-size:12.0pt'>Phone:&nbsp;&nbsp;&nbsp;&nbsp;&nbsp; (949) =
636-8571</span><o:p></o:p></p><p class=3DMsoNormal><span =
style=3D'font-size:12.0pt'>Email:&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp; <a =
href=3D"mailto:donald.coffin@reminetworks.com">donald.coffin@reminetworks=
.com</a></span><o:p></o:p></p><p =
class=3DMsoNormal>&nbsp;<o:p></o:p></p><p class=3DMsoNormal><span =
style=3D'font-size:12.0pt;font-family:"Times New =
Roman","serif"'><br><br><br><br></span><o:p></o:p></p><pre>______________=
_________________________________<o:p></o:p></pre><pre>OAuth mailing =
list<o:p></o:p></pre><pre><a =
href=3D"mailto:OAuth@ietf.org">OAuth@ietf.org</a><o:p></o:p></pre><pre><a=
 =
href=3D"https://www.ietf.org/mailman/listinfo/oauth">https://www.ietf.org=
/mailman/listinfo/oauth</a><o:p></o:p></pre></blockquote><p =
class=3DMsoNormal><span style=3D'font-size:12.0pt;font-family:"Times New =
Roman","serif"'>&nbsp;</span><o:p></o:p></p></div></div></div></body></ht=
ml>
------=_NextPart_000_00A4_01CE01C2.A895B5F0--


From torsten@lodderstedt.net  Sun Feb  3 04:20:35 2013
Return-Path: <torsten@lodderstedt.net>
X-Original-To: oauth@ietfa.amsl.com
Delivered-To: oauth@ietfa.amsl.com
Received: from localhost (localhost [127.0.0.1]) by ietfa.amsl.com (Postfix) with ESMTP id A708B21F8621 for <oauth@ietfa.amsl.com>; Sun,  3 Feb 2013 04:20:35 -0800 (PST)
X-Virus-Scanned: amavisd-new at amsl.com
X-Spam-Flag: NO
X-Spam-Score: 0.897
X-Spam-Level: 
X-Spam-Status: No, score=0.897 tagged_above=-999 required=5 tests=[AWL=-0.509,  BAYES_40=-0.185, HELO_EQ_DE=0.35, HTML_MESSAGE=0.001, SARE_LWSHORTT=1.24]
Received: from mail.ietf.org ([64.170.98.30]) by localhost (ietfa.amsl.com [127.0.0.1]) (amavisd-new, port 10024) with ESMTP id CUVzjsRMZu0V for <oauth@ietfa.amsl.com>; Sun,  3 Feb 2013 04:20:33 -0800 (PST)
Received: from smtprelay05.ispgateway.de (smtprelay05.ispgateway.de [80.67.31.99]) by ietfa.amsl.com (Postfix) with ESMTP id ED31F21F854C for <oauth@ietf.org>; Sun,  3 Feb 2013 04:20:32 -0800 (PST)
Received: from [79.253.33.56] (helo=[192.168.71.36]) by smtprelay05.ispgateway.de with esmtpsa (TLSv1:AES256-SHA:256) (Exim 4.68) (envelope-from <torsten@lodderstedt.net>) id 1U1yYd-0006T5-93; Sun, 03 Feb 2013 13:20:27 +0100
Message-ID: <510E560A.4090107@lodderstedt.net>
Date: Sun, 03 Feb 2013 13:20:26 +0100
From: Torsten Lodderstedt <torsten@lodderstedt.net>
User-Agent: Mozilla/5.0 (Windows NT 6.2; rv:17.0) Gecko/20130107 Thunderbird/17.0.2
MIME-Version: 1.0
To: Donald F Coffin <donald.coffin@reminetworks.com>
References: <006401cdfe5f$2555f170$7001d450$@reminetworks.com> <51085B43.3080103@aol.com> <00c901cdfe80$e7d0eb30$b772c190$@reminetworks.com> <9DFD603A-1170-41D8-A22F-8654D55546B3@lodderstedt.net> <00a301ce0205$b6b1ca00$24155e00$@reminetworks.com>
In-Reply-To: <00a301ce0205$b6b1ca00$24155e00$@reminetworks.com>
Content-Type: multipart/alternative; boundary="------------070803000607060405040701"
X-Df-Sender: dG9yc3RlbkBsb2RkZXJzdGVkdC1vbmxpbmUuZGU=
Cc: 'John Adkins' <jva2@pge.com>, 'Marty Burns' <marty@hypertek.us>, 'Scott Crowder' <scott.crowder@qadoenergy.com>, 'Dave Robin' <drobin@automatedlogic.com>, 'John Teeter' <john.teeter@peoplepowerco.com>, pmadsen@pingidentity.com, 'Edward Denson' <ewd7@pge.com>, oauth@ietf.org, 'Ray Perlner' <ray.perlner@nist.gov>, 'Anne Hendry' <ahendry2@gmail.com>, 'Lynne Rodoni' <mrodoni@semprautilities.com>, 'Uday Verma' <uday.verma@ilinknet.com>
Subject: Re: [OAUTH-WG] draft-ietf-oauth-revocation-04
X-BeenThere: oauth@ietf.org
X-Mailman-Version: 2.1.12
Precedence: list
List-Id: OAUTH WG <oauth.ietf.org>
List-Unsubscribe: <https://www.ietf.org/mailman/options/oauth>, <mailto:oauth-request@ietf.org?subject=unsubscribe>
List-Archive: <http://www.ietf.org/mail-archive/web/oauth>
List-Post: <mailto:oauth@ietf.org>
List-Help: <mailto:oauth-request@ietf.org?subject=help>
List-Subscribe: <https://www.ietf.org/mailman/listinfo/oauth>, <mailto:oauth-request@ietf.org?subject=subscribe>
X-List-Received-Date: Sun, 03 Feb 2013 12:20:35 -0000

This is a multi-part message in MIME format.
--------------070803000607060405040701
Content-Type: text/plain; charset=UTF-8; format=flowed
Content-Transfer-Encoding: 8bit

Hi Donald,

Am 03.02.2013 12:57, schrieb Donald F Coffin:
> <snip>
>
> [Don] A typical Third Party application built to use the ESPI Standard 
> will interact with a Retail Customer and their energy provider.  The 
> nature of interaction with the Retail Customer will utilize short 
> interactive sessions. However, the interaction with their energy 
> provider will require the application obtain new energy information 
> for the previous 24-hours once a day.  Therefore, I anticipate 
> access_tokens will be granted for long periods of time as well as any 
> supporting refresh_tokens.  Because of the amount of data being 
> exchanged between the Third Party application and the energy provider, 
> both in number of retail customers and the amount of energy meter 
> data, it will be necessary to minimize the amount of â€œadministrativeâ€ 
> traffic required in the exchange. Therefore, although I understand the 
> use case you described, I anticipate such an implementation would be 
> rare.
>
> The need to perform an audience style check to prevent exposure of the 
> AS to a denial of service attack, appears primarily due to the fact 
> the Revocation RFC requires an access_token and refresh_token to be 
> revoked independently.  Should a client need to revoke both Tokens the 
> sequence of the revocation request is extremely significant.  A simple 
> solution to this problem would be to provide a method that allows a 
> request to revoke both tokens simultaneously, as stated in one of the 
> responses you referenced in the archives.
>
> The example you gave in your response demonstrating how a denial of 
> service attack might occur is incorrect.  You said â€œif the AS revokes 
> the refresh_token when an access_token is revoked, I can steal an 
> access_token and send it to the revocation endpoint causing the real 
> clientâ€™s refresh_token to be revokedâ€.  I fail to see how that could 
> occur, since the AS revoked both the access_token and the 
> refresh_token when it received the request to revoke the 
> access_token.  Rather than explaining why a refresh_token shouldnâ€™t be 
> revoked concurrently when an access_token is revoked, your example 
> does the exact opposite.  It shows why a refresh_token should be 
> revoked concurrently when an access_token is revoked.
>
> [Don] The focus of the *ESPI Standard* is to provide Retail Customerâ€™s 
> with access to a single UsagePoint (i.e. their Smart Meter).  
> Therefore an access and refresh token will be tightly correlated with 
> the type and frequency of data the Smart Meter provides.  There are 
> only a few reasons defined within the *ESPI Standard* list of use 
> cases that will require the *Token Revocation* request to be issued.  
> The following summarizes the situations that require a *Token 
> Revocation *request:
>
> Â·A Third Party application wishes to terminate their relationship with 
> a Retail Customer.
>
> Â·A Third Party application wishes to terminate their relationship with 
> a Data Custodian.
>
> Â·A Retail Customer wishes to terminate their relationship with a Third 
> Party application.
>
> Â·A Retail Customer wishes to change the data (i.e. scope) a Third 
> Party application has permission to access.
>
> In none of the above situations will it be valid to retain a refresh 
> token, which I realize is implementation dependent, due to the nature 
> of the *ESPI Standard.*
>
> Perhaps the section on the *Serverâ€™s Revocation Policy* should address 
> a few of the reasons why a client may want or need to revoke a token.  
> The current description provides no consideration for the relationship 
> between tokens and scope, although there clearly is a relationship.
>
> I'm confident client or resource owner would revoke refresh (and not 
> access) tokens in all use cases you listed above. In my opinion, 
> access tokens are revoked only if the authorization server does not 
> support refresh tokens and therefore uses long term access tokens or 
> in high-security applications.
>
> [Don] Based on the above statement it would appear you assume an 
> access token is only valid for a short period of time. However, as I 
> explained in my last response, due to the nature of the access 
> required by the client and the manner in which the RS provides that 
> data, access token durations will typically be in days not minutes. 
>   Therefore, merely revoking a refresh_token will expose the data to 
> access that the resource owner meant to prevent unless the 
> access_token is also revoked.
>

I don't understand why access tokens need such a long duration in your 
scenario, even if the client needs to obtain energy data once a day. Any 
client can (potentially) obtain a new access token at any time if the 
access token expires if the authorization server issues corresponding 
refresh tokens. So even in your scenario, access tokens could have a 
short duration. If you want to issue long-living access tokens in order 
to minimize load on the authorization servers, then you have to consider 
the extra complexitity and load required to notify resource servers of 
access token revocation. It's a tradeoff decision, which we tried to 
describe in 
http://tools.ietf.org/html/draft-ietf-oauth-revocation-04#section-3.


> I would also like to hear the opinion of other WG members on this topic.
>
>     3. If the standard OAuth spec does not provide enough control,
>     your profile of OAuth2 for the ESPI can tighten it to provide the
>     protections desired.
>
>     [Don] I am aware we can provide additional parameters required to
>     integrate *OAuth 2.0 *with the *ESPI Standard* by submitting those
>     parameter values to the *OAuth Parameters* registry. I would
>     prefer not to do that, given the large amount of work being done
>     on RFC-drafts to resolve many of the issues we are facing to
>     integrate *OAuth 2.0* with the *ESPI Standard*, since the need to
>     use those extensions will most likely be short lived.
>
> Hmmm, if the need is only short lived, why do you want to make it part 
> of the long living revocation RFC?
>
> [Don] My response was to the suggestion that if the OAuth 
> specification does not provide enough control then the ESPI profile of 
> OAuth 2.0 could tighten it to provide the protections desired.  I 
> assumed George meant we could add additional â€œcompanyâ€ based 
> parameters, which requires us to register them with the â€œOAuth 
> Parameter Registryâ€.  I meant the usage of such â€œcompanyâ€ parameters 
> would be short termed.
>

Understood.

> I do not view the need to identify the type of token being revoked as 
> â€œshort termâ€.  Even the previous exchanges on the topic within the WG 
> indicates it feels there may be a need to add an additional parameter 
> to the request.  However, because the draft is too far along, the WG 
> seems to prefer releasing an RFC they â€œsuspectâ€ will need to be 
> adjusted and let the implementers confirm their suspicions.   This 
> seems to be a very selfish and rather foolish attitude given we are 
> discussing a security protocol.  Not to mention it would seem easier 
> and faster to add an additional â€œoptionalâ€ parameter now, rather than 
> requiring another RFC cycle.  A parameter I sensed in reading the 
> archives the WG feels will very likely need to be added in the future.
>

Since this is a WG item, it is up to the WG to decide.

regards,
Torsten.

>
>
> Thanks,
> George
>
> On 1/29/13 3:28 PM, Donald F Coffin wrote:
>
>     Hi Thorsten,
>
>     I am working with the OpenADE Task Force to document how the
>     â€œ*/Energy Service Provider Interface (ESPI) Standard/* â€ published
>     by the *North American Energy Standards Board* (NAESB) in October
>     of 2011 should be implemented.  The *ESPI Standard* defines how
>     Retail Customers, Third Party applications, and Data Custodians
>     (i.e. electrical, gas, or water utility) must interface to each
>     other and the data format used to exchange energy information. 
>      The interface between the Retail Customer and the Data Custodian
>     is known as â€œ*Download My Data*â€, which defines how a Retail
>     Customer receives their energy information in an XML file
>     downloaded to them by the Data Custodian.  The interface between
>     the Third Party application and the Data Custodian is known as
>     â€œ*Connect My Data*â€, which defines the message exchanges between
>     the Third Party application and the Data Custodian to allow the
>     Third Party to access data at the Data Custodian after a Retail
>     Customer has granted the Third Party application access.
>
>     It is my responsibility within the OpenADE Task Force to document
>     the integration of the *OAuth 2.0* protocol with the *ESPI
>     Standard.*  Since the *ESPI Standard* requires Retail Customers,
>     Third Party applications, and Data Custodians to revoke Tokens
>     (i.e. Access and Refresh Tokens) I am very interested in the
>     â€œ*/Token Revocation (draft-ietf-oath-revocation-xx)/*â€ work being
>     done by you and your working group.
>
>     *_Token Revocation Request_*
>
>     The *Token Revocation* request has only the â€œtokenâ€ parameter with
>     the description that the authorization server is supposed to
>     detect the token type automatically.  I would like to request that
>     an addition parameter â€œtoken_typeâ€ be added to the request.  The
>     â€œtoken_typeâ€ parameter could be optional and would define the type
>     of token being revoked (i.e. â€œaccessâ€, â€œrefreshâ€, â€œregistration
>     accessâ€, etc.).
>
>     The *ESPI Standard* was developed to support the *Advanced Meter
>     Interface* *(AMI) *which is the interface used by â€œSmart Metersâ€
>     to provide automated energy usage collection and other operational
>     information about a Retail Customerâ€™s residence to their Data
>     Custodian.  Third Party applications will be required to obtain
>     the approval if each Retail Customer that has had a â€œSmart Meterâ€
>     installed before they will be able to access the data provided by
>     their â€œSmart Meterâ€.  The number of â€œSmart Metersâ€ currently
>     installed at the three largest California utilities (Pacific Gas &
>     Electric, Southern California Edison, and San Diego Gas &
>     Electric) is in excess of 10.0 M and growing.  The following table
>     indicates the number of â€œSmart Metersâ€ each of the three utilities
>     had installed as of May 2012:
>
>     *Utility*
>
>     	
>
>     *â€œSmart Metersâ€ Installed*
>
>     Pacific Gas & Electric (PG&E)
>
>     	
>
>     4,696,000
>
>     San Diego Gas & Electric (SDG&E)
>
>     	
>
>     1,364,000
>
>     Southern California Edison (SCE)
>
>     	
>
>     3,900,000
>
>     The numbers in the chart were taken from the â€œ*/Utility-Scale
>     Smart Meter Deployments, Plans, & Proposals -- IEE Report/*â€
>     published May 2012 by *The Edison Foundation Institute for
>     Electric Efficiencyâ€ *which I have attached.  The number of â€œSmart
>     Metersâ€ currently installed are even larger than shown in the
>     report as I compose this email.  Assuming 10% of Pacific Gas &
>     Electricâ€™s Retail Customers decide to utilize a Third Party
>     application (3 Third Party applications are currently supported
>     and are 3 more Third Party applications are preparing to be
>     supported) in order to support the ability to revoke a token they
>     would be required to track 500,000 access tokens and 500,000
>     refresh tokens.  Requiring PG&Eâ€™s authorization server to
>     â€œautomaticallyâ€ determine the type of Token being revoked begins
>     to negatively impact their processing capability.  If the *Token
>     Revocation* request was capable of indicating the type of Token to
>     be revoked, the amount of time it will take PG&Eâ€™s authorization
>     server would show a significant time savings to process the request.
>
>     *_Authorization Server Revocation Policy_*
>
>     6.Does the revocation of the access token also revoke the refresh
>     token (if it was provided) ? Or is this a revocation policy decision ?
>
>     - if the token passed to the request is a refresh token and the
>     server supports access token revocation, the server SHOULD also
>     revoke them.
>     - if the token passed to the request is an access token, the
>     server may decide to revoke the respective refresh token as well.
>
>     I believe that if the token passed in the request is an access
>     token, the server MUST revoke any respective refresh token. 
>     Otherwise, their exist a potential security risk of the respective
>     refresh token being used to gain access to the resources for which
>     the access token was issued. It also means the authorization
>     server will have potential â€œjunkâ€ in the refresh token file to
>     search through for any additional Token Revocation request.
>
>     I look forward to receiving your response.
>
>     Best regards,
>
>     Don
>
>     Donald F. Coffin
>
>     Founder/CTO
>
>     REMI Networks
>
>     22751 El Prado Suite 6216
>
>     Rancho Santa Margarita, CA  92688-3836
>
>     Phone: (949) 636-8571
>
>     Email: donald.coffin@reminetworks.com
>     <mailto:donald.coffin@reminetworks.com>
>
>
>
>
>
>     _______________________________________________
>
>     OAuth mailing list
>
>     OAuth@ietf.org  <mailto:OAuth@ietf.org>
>
>     https://www.ietf.org/mailman/listinfo/oauth
>


--------------070803000607060405040701
Content-Type: text/html; charset=UTF-8
Content-Transfer-Encoding: 8bit

<html>
  <head>
    <meta content="text/html; charset=UTF-8" http-equiv="Content-Type">
  </head>
  <body text="#000000" bgcolor="#FFFFFF">
    Hi Donald,<br>
    <br>
    <div class="moz-cite-prefix">Am 03.02.2013 12:57, schrieb Donald F
      Coffin:<br>
    </div>
    <blockquote
      cite="mid:00a301ce0205$b6b1ca00$24155e00$@reminetworks.com"
      type="cite">
      <meta http-equiv="Content-Type" content="text/html; charset=UTF-8">
      <meta name="Generator" content="Microsoft Word 14 (filtered
        medium)">
      <style><!--
/* Font Definitions */
@font-face
	{font-family:Helvetica;
	panose-1:2 11 6 4 2 2 2 2 2 4;}
@font-face
	{font-family:Wingdings;
	panose-1:5 0 0 0 0 0 0 0 0 0;}
@font-face
	{font-family:"Cambria Math";
	panose-1:2 4 5 3 5 4 6 3 2 4;}
@font-face
	{font-family:Cambria;
	panose-1:2 4 5 3 5 4 6 3 2 4;}
@font-face
	{font-family:Calibri;
	panose-1:2 15 5 2 2 2 4 3 2 4;}
@font-face
	{font-family:Tahoma;
	panose-1:2 11 6 4 3 5 4 4 2 4;}
@font-face
	{font-family:"Brush Script MT";
	panose-1:3 6 8 2 4 4 6 7 3 4;}
@font-face
	{font-family:Consolas;
	panose-1:2 11 6 9 2 2 4 3 2 4;}
@font-face
	{font-family:"Times New Roman \, serif";}
/* Style Definitions */
p.MsoNormal, li.MsoNormal, div.MsoNormal
	{margin:0in;
	margin-bottom:.0001pt;
	font-size:11.0pt;
	font-family:"Calibri","sans-serif";
	color:black;}
a:link, span.MsoHyperlink
	{mso-style-priority:99;
	color:blue;
	text-decoration:underline;}
a:visited, span.MsoHyperlinkFollowed
	{mso-style-priority:99;
	color:purple;
	text-decoration:underline;}
pre
	{mso-style-priority:99;
	mso-style-link:"HTML Preformatted Char";
	margin:0in;
	margin-bottom:.0001pt;
	font-size:10.0pt;
	font-family:"Courier New";
	color:black;}
p.MsoAcetate, li.MsoAcetate, div.MsoAcetate
	{mso-style-priority:99;
	mso-style-link:"Balloon Text Char";
	margin:0in;
	margin-bottom:.0001pt;
	font-size:8.0pt;
	font-family:"Tahoma","sans-serif";
	color:black;}
p.MsoListParagraph, li.MsoListParagraph, div.MsoListParagraph
	{mso-style-priority:34;
	margin-top:0in;
	margin-right:0in;
	margin-bottom:0in;
	margin-left:.5in;
	margin-bottom:.0001pt;
	font-size:11.0pt;
	font-family:"Calibri","sans-serif";
	color:black;}
span.HTMLPreformattedChar
	{mso-style-name:"HTML Preformatted Char";
	mso-style-priority:99;
	mso-style-link:"HTML Preformatted";
	font-family:Consolas;
	color:black;}
span.EmailStyle20
	{mso-style-type:personal;
	font-family:"Cambria","serif";
	color:windowtext;}
span.EmailStyle21
	{mso-style-type:personal;
	font-family:"Cambria","serif";
	color:windowtext;
	font-weight:normal;
	font-style:normal;}
span.BalloonTextChar
	{mso-style-name:"Balloon Text Char";
	mso-style-priority:99;
	mso-style-link:"Balloon Text";
	font-family:"Tahoma","sans-serif";
	color:black;}
span.EmailStyle24
	{mso-style-type:personal-reply;
	font-family:"Cambria","serif";
	color:windowtext;
	font-weight:normal;
	font-style:normal;}
.MsoChpDefault
	{mso-style-type:export-only;
	font-size:10.0pt;}
@page WordSection1
	{size:8.5in 11.0in;
	margin:1.0in 1.0in 1.0in 1.0in;}
div.WordSection1
	{page:WordSection1;}
/* List Definitions */
@list l0
	{mso-list-id:217783835;
	mso-list-type:hybrid;
	mso-list-template-ids:1090914056 67698689 67698691 67698693 67698689 67698691 67698693 67698689 67698691 67698693;}
@list l0:level1
	{mso-level-number-format:bullet;
	mso-level-text:ï‚·;
	mso-level-tab-stop:none;
	mso-level-number-position:left;
	margin-left:.75in;
	text-indent:-.25in;
	font-family:Symbol;}
@list l0:level2
	{mso-level-number-format:bullet;
	mso-level-text:o;
	mso-level-tab-stop:none;
	mso-level-number-position:left;
	margin-left:1.25in;
	text-indent:-.25in;
	font-family:"Courier New";}
@list l0:level3
	{mso-level-number-format:bullet;
	mso-level-text:ï‚§;
	mso-level-tab-stop:none;
	mso-level-number-position:left;
	margin-left:1.75in;
	text-indent:-.25in;
	font-family:Wingdings;}
@list l0:level4
	{mso-level-number-format:bullet;
	mso-level-text:ï‚·;
	mso-level-tab-stop:none;
	mso-level-number-position:left;
	margin-left:2.25in;
	text-indent:-.25in;
	font-family:Symbol;}
@list l0:level5
	{mso-level-number-format:bullet;
	mso-level-text:o;
	mso-level-tab-stop:none;
	mso-level-number-position:left;
	margin-left:2.75in;
	text-indent:-.25in;
	font-family:"Courier New";}
@list l0:level6
	{mso-level-number-format:bullet;
	mso-level-text:ï‚§;
	mso-level-tab-stop:none;
	mso-level-number-position:left;
	margin-left:3.25in;
	text-indent:-.25in;
	font-family:Wingdings;}
@list l0:level7
	{mso-level-number-format:bullet;
	mso-level-text:ï‚·;
	mso-level-tab-stop:none;
	mso-level-number-position:left;
	margin-left:3.75in;
	text-indent:-.25in;
	font-family:Symbol;}
@list l0:level8
	{mso-level-number-format:bullet;
	mso-level-text:o;
	mso-level-tab-stop:none;
	mso-level-number-position:left;
	margin-left:4.25in;
	text-indent:-.25in;
	font-family:"Courier New";}
@list l0:level9
	{mso-level-number-format:bullet;
	mso-level-text:ï‚§;
	mso-level-tab-stop:none;
	mso-level-number-position:left;
	margin-left:4.75in;
	text-indent:-.25in;
	font-family:Wingdings;}
ol
	{margin-bottom:0in;}
ul
	{margin-bottom:0in;}
--></style><!--[if gte mso 9]><xml>
<o:shapedefaults v:ext="edit" spidmax="1026" />
</xml><![endif]--><!--[if gte mso 9]><xml>
<o:shapelayout v:ext="edit">
<o:idmap v:ext="edit" data="1" />
</o:shapelayout></xml><![endif]-->
      <div class="WordSection1">&lt;snip&gt;<span
          style="font-family:&quot;Helvetica&quot;,&quot;sans-serif&quot;"><o:p></o:p></span>
        <div>
          <p class="MsoNormal"><span
style="font-size:12.0pt;font-family:&quot;Cambria&quot;,&quot;serif&quot;;color:windowtext"><o:p>Â </o:p></span></p>
          <p class="MsoNormal"
            style="margin-left:.5in;text-indent:-.5in"><span
style="font-size:12.0pt;font-family:&quot;Cambria&quot;,&quot;serif&quot;;color:windowtext">[Don]
              A typical Third Party application built to use the ESPI
              Standard will interact with a Retail Customer and their
              energy provider.Â  The nature of interaction with the
              Retail Customer will utilize short interactive sessions.Â 
              However, the interaction with their energy provider will
              require the application obtain new energy information for
              the previous 24-hours once a day.Â  Therefore, I anticipate
              access_tokens will be granted for long periods of time as
              well as any supporting refresh_tokens.Â  Because of the
              amount of data being exchanged between the Third Party
              application and the energy provider, both in number of
              retail customers and the amount of energy meter data, it
              will be necessary to minimize the amount of
              â€œadministrativeâ€ traffic required in the exchange.Â 
              Therefore, although I understand the use case you
              described, I anticipate such an implementation would be
              rare.Â  <o:p></o:p></span></p>
          <p class="MsoNormal"
            style="margin-left:.5in;text-indent:-.5in"><span
style="font-size:12.0pt;font-family:&quot;Cambria&quot;,&quot;serif&quot;;color:windowtext"><o:p>Â </o:p></span></p>
          <p class="MsoNormal" style="margin-left:.5in"><span
style="font-size:12.0pt;font-family:&quot;Cambria&quot;,&quot;serif&quot;;color:windowtext">The
              need to perform an audience style check to prevent
              exposure of the AS to a denial of service attack, appears
              primarily due to the fact the Revocation RFC requires an
              access_token and refresh_token to be revoked
              independently.Â  Should a client need to revoke both Tokens
              the sequence of the revocation request is extremely
              significant.Â  A simple solution to this problem would be
              to provide a method that allows a request to revoke both
              tokens simultaneously, as stated in one of the responses
              you referenced in the archives.Â  <o:p></o:p></span></p>
          <p class="MsoNormal" style="margin-left:.5in"><span
style="font-size:12.0pt;font-family:&quot;Cambria&quot;,&quot;serif&quot;;color:windowtext"><o:p>Â </o:p></span></p>
          <p class="MsoNormal" style="margin-left:.5in"><span
style="font-size:12.0pt;font-family:&quot;Cambria&quot;,&quot;serif&quot;;color:windowtext">The
              example you gave in your response demonstrating how a
              denial of service attack might occur is incorrect.Â  You
              said â€œif the AS revokes the refresh_token when an
              access_token is revoked, I can steal an access_token and
              send it to the revocation endpoint causing the real
              clientâ€™s refresh_token to be revokedâ€.Â  I fail to see how
              that could occur, since the AS revoked both the
              access_token and the refresh_token when it received the
              request to revoke the access_token.Â  Rather than
              explaining why a refresh_token shouldnâ€™t be revoked
              concurrently when an access_token is revoked, your example
              does the exact opposite.Â  It shows why a refresh_token
              should be revoked concurrently when an access_token is
              revoked.<o:p></o:p></span></p>
          <p class="MsoNormal"><span
style="font-size:12.0pt;font-family:&quot;Cambria&quot;,&quot;serif&quot;;color:windowtext">Â </span><o:p></o:p></p>
          <p class="MsoNormal"
style="mso-margin-top-alt:0in;margin-right:0in;margin-bottom:12.0pt;margin-left:.5in;text-indent:-.5in"><span
style="font-size:12.0pt;font-family:&quot;Cambria&quot;,&quot;serif&quot;;color:#0070C0">[Don]
              The focus of the <b>ESPI Standard</b> is to provide
              Retail Customerâ€™s with access to a single UsagePoint (i.e.
              their Smart Meter).Â  Therefore an access and refresh token
              will be tightly correlated with the type and frequency of
              data the Smart Meter provides.Â  There are only a few
              reasons defined within the <b>ESPI Standard</b> list of
              use cases that will require the <b>Token Revocation</b>
              request to be issued.Â  The following summarizes the
              situations that require a <b>Token Revocation </b>request:</span><o:p></o:p></p>
          <p class="MsoListParagraph"
            style="mso-margin-top-alt:0in;margin-right:0in;margin-bottom:12.0pt;margin-left:.75in;text-indent:-.25in;mso-list:l0
            level1 lfo2"><!--[if !supportLists]--><span
              style="font-family:Symbol"><span style="mso-list:Ignore">Â·<span
                  style="font:7.0pt &quot;Times New Roman&quot;">Â Â Â Â Â Â Â Â 
                </span></span></span><!--[endif]--><span
style="font-size:12.0pt;font-family:&quot;Cambria&quot;,&quot;serif&quot;;color:#0070C0">A
              Third Party application wishes to terminate their
              relationship with a Retail Customer.</span><o:p></o:p></p>
          <p class="MsoListParagraph"
            style="mso-margin-top-alt:0in;margin-right:0in;margin-bottom:12.0pt;margin-left:.75in;text-indent:-.25in;mso-list:l0
            level1 lfo2"><!--[if !supportLists]--><span
              style="font-family:Symbol"><span style="mso-list:Ignore">Â·<span
                  style="font:7.0pt &quot;Times New Roman&quot;">Â Â Â Â Â Â Â Â 
                </span></span></span><!--[endif]--><span
style="font-size:12.0pt;font-family:&quot;Cambria&quot;,&quot;serif&quot;;color:#0070C0">A
              Third Party application wishes to terminate their
              relationship with a Data Custodian.</span><o:p></o:p></p>
          <p class="MsoListParagraph"
            style="mso-margin-top-alt:0in;margin-right:0in;margin-bottom:12.0pt;margin-left:.75in;text-indent:-.25in;mso-list:l0
            level1 lfo2"><!--[if !supportLists]--><span
              style="font-family:Symbol"><span style="mso-list:Ignore">Â·<span
                  style="font:7.0pt &quot;Times New Roman&quot;">Â Â Â Â Â Â Â Â 
                </span></span></span><!--[endif]--><span
style="font-size:12.0pt;font-family:&quot;Cambria&quot;,&quot;serif&quot;;color:#0070C0">A
              Retail Customer wishes to terminate their relationship
              with a Third Party application.</span><o:p></o:p></p>
          <p class="MsoListParagraph"
            style="mso-margin-top-alt:0in;margin-right:0in;margin-bottom:12.0pt;margin-left:.75in;text-indent:-.25in;mso-list:l0
            level1 lfo2"><!--[if !supportLists]--><span
              style="font-family:Symbol"><span style="mso-list:Ignore">Â·<span
                  style="font:7.0pt &quot;Times New Roman&quot;">Â Â Â Â Â Â Â Â 
                </span></span></span><!--[endif]--><span
style="font-size:12.0pt;font-family:&quot;Cambria&quot;,&quot;serif&quot;;color:#0070C0">A
              Retail Customer wishes to change the data (i.e. scope) a
              Third Party application has permission to access.</span><o:p></o:p></p>
          <p class="MsoNormal"
style="mso-margin-top-alt:0in;margin-right:0in;margin-bottom:12.0pt;margin-left:.5in"><span
style="font-size:12.0pt;font-family:&quot;Cambria&quot;,&quot;serif&quot;;color:#0070C0">In
              none of the above situations will it be valid to retain a
              refresh token, which I realize is implementation
              dependent, due to the nature of the <b>ESPI Standard.</b></span><o:p></o:p></p>
          <p class="MsoNormal"
style="mso-margin-top-alt:0in;margin-right:0in;margin-bottom:12.0pt;margin-left:.5in"><span
style="font-size:12.0pt;font-family:&quot;Cambria&quot;,&quot;serif&quot;;color:#0070C0">Perhaps
              the section on the <b>Serverâ€™s Revocation Policy</b>
              should address a few of the reasons why a client may want
              or need to revoke a token.Â  The current description
              provides no consideration for the relationship between
              tokens and scope, although there clearly is a
              relationship.</span><o:p></o:p></p>
        </div>
        <div>
          <p class="MsoNormal"><span
              style="font-size:12.0pt;font-family:&quot;Times New
              Roman&quot;,&quot;serif&quot;;color:windowtext">I'm
              confident client or resource owner would revoke refresh
              (and not access) tokens in all use cases you listed above.
              In my opinion, access tokens are revoked only if the
              authorization server does not support refresh tokens and
              therefore uses long term access tokens or in high-security
              applications.<o:p></o:p></span></p>
          <p class="MsoNormal"><span
style="font-size:12.0pt;font-family:&quot;Cambria&quot;,&quot;serif&quot;;color:windowtext"><o:p>Â </o:p></span></p>
          <p class="MsoNormal"
            style="margin-left:.5in;text-indent:-.5in"><span
style="font-size:12.0pt;font-family:&quot;Cambria&quot;,&quot;serif&quot;;color:windowtext">[Don]
              Based on the above statement it would appear you assume an
              access token is only valid for a short period of time.Â 
              However, as I explained in my last response, due to the
              nature of the access required by the client and the manner
              in which the RS provides that data, access token durations
              will typically be in days not minutes. Â Â Therefore, merely
              revoking a refresh_token will expose the data to access
              that the resource owner meant to prevent unless the
              access_token is also revoked.</span></p>
        </div>
      </div>
    </blockquote>
    <br>
    I don't understand why access tokens need such a long duration in
    your scenario, even if the client needs to obtain energy data once a
    day. Any client can (potentially) obtain a new access token at any
    time if the access token expires if the authorization server issues
    corresponding refresh tokens. So even in your scenario, access
    tokens could have a short duration. If you want to issue long-living
    access tokens in order to minimize load on the authorization
    servers, then you have to consider the extra complexitity and load
    required to notify resource servers of access token revocation. It's
    a tradeoff decision, which we tried to describe in
    <a class="moz-txt-link-freetext" href="http://tools.ietf.org/html/draft-ietf-oauth-revocation-04#section-3">http://tools.ietf.org/html/draft-ietf-oauth-revocation-04#section-3</a>.
    <br>
    <br>
    <br>
    <blockquote
      cite="mid:00a301ce0205$b6b1ca00$24155e00$@reminetworks.com"
      type="cite">
      <div class="WordSection1">
        <div>
          <p class="MsoNormal"
            style="margin-left:.5in;text-indent:-.5in"><span
style="font-size:12.0pt;font-family:&quot;Cambria&quot;,&quot;serif&quot;;color:windowtext"><o:p></o:p></span></p>
        </div>
        <div>
          <p class="MsoNormal"><span
              style="font-size:12.0pt;font-family:&quot;Times New
              Roman&quot;,&quot;serif&quot;;color:windowtext"><o:p>Â </o:p></span></p>
        </div>
        <div>
          <p class="MsoNormal"><span
              style="font-size:12.0pt;font-family:&quot;Times New
              Roman&quot;,&quot;serif&quot;;color:windowtext">I would
              also like to hear the opinion of other WG members on this
              topic.<o:p></o:p></span></p>
        </div>
        <div>
          <p class="MsoNormal"><span
              style="font-size:12.0pt;font-family:&quot;Times New
              Roman&quot;,&quot;serif&quot;;color:windowtext"><o:p>Â </o:p></span></p>
        </div>
        <blockquote style="margin-top:5.0pt;margin-bottom:5.0pt">
          <div>
            <p class="MsoNormal" style="margin-bottom:12.0pt"><span
                style="font-family:&quot;Helvetica&quot;,&quot;sans-serif&quot;">3.
                If the standard OAuth spec does not provide enough
                control, your profile of OAuth2 for the ESPI can tighten
                it to provide the protections desired.</span><o:p></o:p></p>
            <p class="MsoNormal"
style="mso-margin-top-alt:0in;margin-right:0in;margin-bottom:12.0pt;margin-left:.5in;text-indent:-.5in"><span
style="font-size:12.0pt;font-family:&quot;Cambria&quot;,&quot;serif&quot;;color:#0070C0">[Don]
                I am aware we can provide additional parameters required
                to integrate <b>OAuth 2.0 </b>with the <b>ESPI
                  Standard</b> by submitting those parameter values to
                the <b>OAuth Parameters</b> registry. I would prefer
                not to do that, given the large amount of work being
                done on RFC-drafts to resolve many of the issues we are
                facing to integrate <b>OAuth 2.0</b> with the <b>ESPI
                  Standard</b>, since the need to use those extensions
                will most likely be short lived.</span><o:p></o:p></p>
          </div>
        </blockquote>
        <div>
          <p class="MsoNormal"><span
              style="font-size:12.0pt;font-family:&quot;Times New
              Roman&quot;,&quot;serif&quot;;color:windowtext"><o:p>Â </o:p></span></p>
        </div>
        <p class="MsoNormal"><span
            style="font-size:12.0pt;font-family:&quot;Times New
            Roman&quot;,&quot;serif&quot;;color:windowtext">Hmmm, if the
            need is only short lived, why do you want to make it part of
            the long living revocation RFC?<o:p></o:p></span></p>
        <p class="MsoNormal"><span
style="font-size:12.0pt;font-family:&quot;Cambria&quot;,&quot;serif&quot;;color:windowtext"><o:p>Â </o:p></span></p>
        <p class="MsoNormal" style="margin-left:.5in;text-indent:-.5in"><span
style="font-size:12.0pt;font-family:&quot;Cambria&quot;,&quot;serif&quot;;color:windowtext">[Don]
            My response was to the suggestion that if the OAuth
            specification does not provide enough control then the ESPI
            profile of OAuth 2.0 could tighten it to provide the
            protections desired.Â  I assumed George meant we could add
            additional â€œcompanyâ€ based parameters, which requires us to
            register them with the â€œOAuth Parameter Registryâ€.Â  I meant
            the usage of such â€œcompanyâ€ parameters would be short
            termed.</span></p>
      </div>
    </blockquote>
    <br>
    Understood.<br>
    <br>
    <blockquote
      cite="mid:00a301ce0205$b6b1ca00$24155e00$@reminetworks.com"
      type="cite">
      <div class="WordSection1">
        <p class="MsoNormal" style="margin-left:.5in;text-indent:-.5in"><span
style="font-size:12.0pt;font-family:&quot;Cambria&quot;,&quot;serif&quot;;color:windowtext"><o:p></o:p></span></p>
        <p class="MsoNormal" style="margin-left:.5in;text-indent:-.5in"><span
style="font-size:12.0pt;font-family:&quot;Cambria&quot;,&quot;serif&quot;;color:windowtext"><o:p>Â </o:p></span></p>
        <p class="MsoNormal" style="margin-left:.5in"><span
style="font-size:12.0pt;font-family:&quot;Cambria&quot;,&quot;serif&quot;;color:windowtext">I
            do not view the need to identify the type of token being
            revoked as â€œshort termâ€.Â  Even the previous exchanges on the
            topic within the WG indicates it feels there may be a need
            to add an additional parameter to the request.Â  However,
            because the draft is too far along, the WG seems to prefer
            releasing an RFC they â€œsuspectâ€ will need to be adjusted and
            let the implementers confirm their suspicions.Â Â  This seems
            to be a very selfish and rather foolish attitude given we
            are discussing a security protocol.Â  Not to mention it would
            seem easier and faster to add an additional â€œoptionalâ€
            parameter now, rather than requiring another RFC cycle. Â A
            parameter I sensed in reading the archives the WG feels will
            very likely need to be added in the future.</span></p>
      </div>
    </blockquote>
    <br>
    Since this is a WG item, it is up to the WG to decide.<br>
    <br>
    regards,<br>
    Torsten.<br>
    <br>
    <blockquote
      cite="mid:00a301ce0205$b6b1ca00$24155e00$@reminetworks.com"
      type="cite">
      <div class="WordSection1">
        <p class="MsoNormal" style="margin-left:.5in"><span
style="font-size:12.0pt;font-family:&quot;Cambria&quot;,&quot;serif&quot;;color:windowtext"><o:p></o:p></span></p>
        <div>
          <p class="MsoNormal"><span
              style="font-size:12.0pt;font-family:&quot;Times New
              Roman&quot;,&quot;serif&quot;;color:windowtext"><br>
              <br>
              <o:p></o:p></span></p>
          <div>
            <p class="MsoNormal" style="margin-bottom:12.0pt"><span
                style="font-family:&quot;Helvetica&quot;,&quot;sans-serif&quot;">Thanks,<br>
                George</span><o:p></o:p></p>
            <div>
              <p class="MsoNormal">On 1/29/13 3:28 PM, Donald F Coffin
                wrote:<o:p></o:p></p>
            </div>
            <blockquote style="margin-top:5.0pt;margin-bottom:5.0pt">
              <p class="MsoNormal"><span
style="font-size:12.0pt;font-family:&quot;Cambria&quot;,&quot;serif&quot;">Hi
                  Thorsten,</span><o:p></o:p></p>
              <p class="MsoNormal"><span
style="font-size:12.0pt;font-family:&quot;Cambria&quot;,&quot;serif&quot;">Â </span><o:p></o:p></p>
              <p class="MsoNormal"><span
style="font-size:12.0pt;font-family:&quot;Cambria&quot;,&quot;serif&quot;">I
                  am working with the OpenADE Task Force to document how
                  the â€œ<b><i>Energy Service Provider Interface (ESPI)
                      Standard</i></b> â€ published by the <b>North
                    American Energy Standards Board</b> (NAESB) in
                  October of 2011 should be implemented.Â  The <b>ESPI
                    Standard</b> defines how Retail Customers, Third
                  Party applications, and Data Custodians (i.e.
                  electrical, gas, or water utility) must interface to
                  each other and the data format used to exchange energy
                  information.Â  Â The interface between the Retail
                  Customer and the Data Custodian is known as â€œ<b>Download
                    My Data</b>â€, which defines how a Retail Customer
                  receives their energy information in an XML file
                  downloaded to them by the Data Custodian.Â  The
                  interface between the Third Party application and the
                  Data Custodian is known as â€œ<b>Connect My Data</b>â€,
                  which defines the message exchanges between the Third
                  Party application and the Data Custodian to allow the
                  Third Party to access data at the Data Custodian after
                  a Retail Customer has granted the Third Party
                  application access.</span><o:p></o:p></p>
              <p class="MsoNormal"><span
style="font-size:12.0pt;font-family:&quot;Cambria&quot;,&quot;serif&quot;">Â </span><o:p></o:p></p>
              <p class="MsoNormal"><span
style="font-size:12.0pt;font-family:&quot;Cambria&quot;,&quot;serif&quot;">It
                  is my responsibility within the OpenADE Task Force to
                  document the integration of the <b>OAuth 2.0</b>
                  protocol with the <b>ESPI Standard.</b>Â  Since the <b>ESPI
                    Standard</b> requires Retail Customers, Third Party
                  applications, and Data Custodians to revoke Tokens
                  (i.e. Access and Refresh Tokens) I am very interested
                  in the â€œ<b><i>Token Revocation
                      (draft-ietf-oath-revocation-xx)</i></b>â€ work
                  being done by you and your working group. </span><o:p></o:p></p>
              <p class="MsoNormal"><span
style="font-size:12.0pt;font-family:&quot;Cambria&quot;,&quot;serif&quot;">Â </span><o:p></o:p></p>
              <p class="MsoNormal"><b><u><span
style="font-size:12.0pt;font-family:&quot;Cambria&quot;,&quot;serif&quot;">Token
                      Revocation Request</span></u></b><o:p></o:p></p>
              <p class="MsoNormal"><span
style="font-size:12.0pt;font-family:&quot;Cambria&quot;,&quot;serif&quot;">Â </span><o:p></o:p></p>
              <p class="MsoNormal"><span
style="font-size:12.0pt;font-family:&quot;Cambria&quot;,&quot;serif&quot;">The
                  <b>Token Revocation</b> request has only the â€œtokenâ€
                  parameter with the description that the authorization
                  server is supposed to detect the token type
                  automatically.Â  I would like to request that an
                  addition parameter â€œtoken_typeâ€ be added to the
                  request.Â  The â€œtoken_typeâ€ parameter could be optional
                  and would define the type of token being revoked (i.e.
                  â€œaccessâ€, â€œrefreshâ€, â€œregistration accessâ€, etc.).</span><o:p></o:p></p>
              <p class="MsoNormal"><span
style="font-size:12.0pt;font-family:&quot;Cambria&quot;,&quot;serif&quot;">Â </span><o:p></o:p></p>
              <p class="MsoNormal"><span
style="font-size:12.0pt;font-family:&quot;Cambria&quot;,&quot;serif&quot;">The
                  <b>ESPI Standard</b> was developed to support the <b>Advanced
                    Meter Interface</b> <b>(AMI) </b>which is the
                  interface used by â€œSmart Metersâ€ to provide automated
                  energy usage collection and other operational
                  information about a Retail Customerâ€™s residence to
                  their Data Custodian.Â  Third Party applications will
                  be required to obtain the approval if each Retail
                  Customer that has had a â€œSmart Meterâ€ installed before
                  they will be able to access the data provided by their
                  â€œSmart Meterâ€.Â  The number of â€œSmart Metersâ€ currently
                  installed at the three largest California utilities
                  (Pacific Gas &amp; Electric, Southern California
                  Edison, and San Diego Gas &amp; Electric) is in excess
                  of 10.0 M and growing.Â  The following table indicates
                  the number of â€œSmart Metersâ€ each of the three
                  utilities had installed as of May 2012:</span><o:p></o:p></p>
              <p class="MsoNormal"><span
style="font-size:12.0pt;font-family:&quot;Cambria&quot;,&quot;serif&quot;">Â </span><o:p></o:p></p>
              <table class="MsoNormalTable"
                style="margin-left:66.2pt;border-collapse:collapse"
                border="0" cellpadding="0" cellspacing="0">
                <tbody>
                  <tr>
                    <td style="width:239.4pt;border:solid windowtext
                      1.0pt;background:#A6A6A6;padding:0in 5.4pt 0in
                      5.4pt" valign="top" width="319">
                      <p class="MsoNormal" style="text-align:center"
                        align="center"><b><span
style="font-size:14.0pt;font-family:&quot;Cambria&quot;,&quot;serif&quot;">Utility</span></b><o:p></o:p></p>
                    </td>
                    <td style="width:239.4pt;border:solid windowtext
                      1.0pt;border-left:none;background:#A6A6A6;padding:0in
                      5.4pt 0in 5.4pt" valign="top" width="319">
                      <p class="MsoNormal" style="text-align:center"
                        align="center"><b><span
style="font-size:14.0pt;font-family:&quot;Cambria&quot;,&quot;serif&quot;">â€œSmart
                            Metersâ€ Installed</span></b><o:p></o:p></p>
                    </td>
                  </tr>
                  <tr>
                    <td style="width:239.4pt;border:solid windowtext
                      1.0pt;border-top:none;padding:0in 5.4pt 0in 5.4pt"
                      valign="top" width="319">
                      <p class="MsoNormal"><span
style="font-size:12.0pt;font-family:&quot;Cambria&quot;,&quot;serif&quot;">Pacific
                          Gas &amp; Electric (PG&amp;E)</span><o:p></o:p></p>
                    </td>
                    <td
                      style="width:239.4pt;border-top:none;border-left:none;border-bottom:solid
                      windowtext 1.0pt;border-right:solid windowtext
                      1.0pt;padding:0in 5.4pt 0in 5.4pt" valign="top"
                      width="319">
                      <p class="MsoNormal" style="text-align:right"
                        align="right"><span
style="font-size:12.0pt;font-family:&quot;Cambria&quot;,&quot;serif&quot;">4,696,000</span><o:p></o:p></p>
                    </td>
                  </tr>
                  <tr>
                    <td style="width:239.4pt;border:solid windowtext
                      1.0pt;border-top:none;padding:0in 5.4pt 0in 5.4pt"
                      valign="top" width="319">
                      <p class="MsoNormal"><span
style="font-size:12.0pt;font-family:&quot;Cambria&quot;,&quot;serif&quot;">San
                          Diego Gas &amp; Electric (SDG&amp;E)</span><o:p></o:p></p>
                    </td>
                    <td
                      style="width:239.4pt;border-top:none;border-left:none;border-bottom:solid
                      windowtext 1.0pt;border-right:solid windowtext
                      1.0pt;padding:0in 5.4pt 0in 5.4pt" valign="top"
                      width="319">
                      <p class="MsoNormal" style="text-align:right"
                        align="right"><span
style="font-size:12.0pt;font-family:&quot;Cambria&quot;,&quot;serif&quot;">1,364,000</span><o:p></o:p></p>
                    </td>
                  </tr>
                  <tr>
                    <td style="width:239.4pt;border:solid windowtext
                      1.0pt;border-top:none;padding:0in 5.4pt 0in 5.4pt"
                      valign="top" width="319">
                      <p class="MsoNormal"><span
style="font-size:12.0pt;font-family:&quot;Cambria&quot;,&quot;serif&quot;">Southern
                          California Edison (SCE)</span><o:p></o:p></p>
                    </td>
                    <td
                      style="width:239.4pt;border-top:none;border-left:none;border-bottom:solid
                      windowtext 1.0pt;border-right:solid windowtext
                      1.0pt;padding:0in 5.4pt 0in 5.4pt" valign="top"
                      width="319">
                      <p class="MsoNormal" style="text-align:right"
                        align="right"><span
style="font-size:12.0pt;font-family:&quot;Cambria&quot;,&quot;serif&quot;">3,900,000</span><o:p></o:p></p>
                    </td>
                  </tr>
                </tbody>
              </table>
              <p class="MsoNormal"><span
style="font-size:12.0pt;font-family:&quot;Cambria&quot;,&quot;serif&quot;">Â </span><o:p></o:p></p>
              <p class="MsoNormal"><span
style="font-size:12.0pt;font-family:&quot;Cambria&quot;,&quot;serif&quot;">The
                  numbers in the chart were taken from the â€œ<b><i>Utility-Scale
                      Smart Meter Deployments, Plans, &amp; Proposals --
                      IEE Report</i></b>â€ published May 2012 by <b>The
                    Edison Foundation Institute for Electric Efficiencyâ€
                  </b>which I have attached.Â  The number of â€œSmart
                  Metersâ€ currently installed are even larger than shown
                  in the report as I compose this email.Â  Assuming 10%
                  of Pacific Gas &amp; Electricâ€™s Retail Customers
                  decide to utilize a Third Party application (3 Third
                  Party applications are currently supported and are 3
                  more Third Party applications are preparing to be
                  supported) in order to support the ability to revoke a
                  token they would be required to track 500,000 access
                  tokens and 500,000 refresh tokens.Â  Requiring
                  PG&amp;Eâ€™s authorization server to â€œautomaticallyâ€
                  determine the type of Token being revoked begins to
                  negatively impact their processing capability.Â  If the
                  <b>Token Revocation</b> request was capable of
                  indicating the type of Token to be revoked, the amount
                  of time it will take PG&amp;Eâ€™s authorization server
                  would show a significant time savings to process the
                  request.</span><o:p></o:p></p>
              <p class="MsoNormal"><span
style="font-size:12.0pt;font-family:&quot;Cambria&quot;,&quot;serif&quot;">Â </span><o:p></o:p></p>
              <p class="MsoNormal"><b><u><span
style="font-size:12.0pt;font-family:&quot;Cambria&quot;,&quot;serif&quot;">Authorization
                      Server Revocation Policy</span></u></b><o:p></o:p></p>
              <p class="MsoNormal"><span
style="font-size:12.0pt;font-family:&quot;Cambria&quot;,&quot;serif&quot;">Â </span><o:p></o:p></p>
              <p class="MsoNormal"><span
style="font-size:12.0pt;font-family:&quot;Cambria&quot;,&quot;serif&quot;">Â </span><o:p></o:p></p>
              <p class="MsoListParagraph" style="text-indent:-.25in"><span
style="font-size:12.0pt;font-family:&quot;Cambria&quot;,&quot;serif&quot;">Â Â Â Â Â 
                </span>6.<span
                  style="font-size:7.0pt;font-family:&quot;Times New
                  Roman \, serif&quot;">Â Â Â Â Â Â  </span>Does the
                revocation of the access token also revoke the refresh
                token (if it was provided) ? Or is this a revocation
                policy decision ?<o:p></o:p></p>
              <p class="MsoNormal"><span
style="font-size:12.0pt;font-family:&quot;Cambria&quot;,&quot;serif&quot;">Â </span><o:p></o:p></p>
              <p class="MsoNormal" style="margin-left:1.0in"><span
                  style="font-size:12.0pt;font-family:&quot;Times New
                  Roman \, serif&quot;">- if the token passed to the
                  request is a refresh token and the server supports
                  access token revocation, the server SHOULD also revoke
                  them.<br>
                  - if the token passed to the request is an access
                  token, the server may decide to revoke the respective
                  refresh token as well.</span><o:p></o:p></p>
              <p class="MsoNormal" style="margin-left:1.0in"><span
                  style="font-size:12.0pt;font-family:&quot;Times New
                  Roman \, serif&quot;">Â </span><o:p></o:p></p>
              <p class="MsoNormal" style="margin-left:1.0in"><span
                  style="font-size:12.0pt;font-family:&quot;Times New
                  Roman \, serif&quot;">I believe that if the token
                  passed in the request is an access token, the server
                  MUST revoke any respective refresh token.Â  Otherwise,
                  their exist a potential security risk of the
                  respective refresh token being used to gain access to
                  the resources for which the access token was issued.Â 
                  It also means the authorization server will have
                  potential â€œjunkâ€ in the refresh token file to search
                  through for any additional Token Revocation request.</span><o:p></o:p></p>
              <p class="MsoNormal" style="margin-left:1.0in"><span
                  style="font-size:12.0pt;font-family:&quot;Times New
                  Roman \, serif&quot;">Â </span><o:p></o:p></p>
              <p class="MsoNormal"><span
                  style="font-size:12.0pt;font-family:&quot;Times New
                  Roman \, serif&quot;">I look forward to receiving your
                  response.</span><o:p></o:p></p>
              <p class="MsoNormal"><span
style="font-size:12.0pt;font-family:&quot;Cambria&quot;,&quot;serif&quot;">Â </span><o:p></o:p></p>
              <p class="MsoNormal"><span style="font-size:12.0pt">Best
                  regards,</span><o:p></o:p></p>
              <p class="MsoNormal"><span
                  style="font-size:24.0pt;font-family:&quot;Brush Script
                  MT&quot;">Don</span><o:p></o:p></p>
              <p class="MsoNormal"><span style="font-size:12.0pt">Donald
                  F. Coffin</span><o:p></o:p></p>
              <p class="MsoNormal"><span style="font-size:12.0pt">Founder/CTO</span><o:p></o:p></p>
              <p class="MsoNormal"><span style="font-size:12.0pt">Â </span><o:p></o:p></p>
              <p class="MsoNormal"><span style="font-size:12.0pt">REMI
                  Networks</span><o:p></o:p></p>
              <p class="MsoNormal"><span style="font-size:12.0pt">22751
                  El Prado Suite 6216</span><o:p></o:p></p>
              <p class="MsoNormal"><span style="font-size:12.0pt">Rancho
                  Santa Margarita, CAÂ  92688-3836</span><o:p></o:p></p>
              <p class="MsoNormal"><span style="font-size:12.0pt">Â </span><o:p></o:p></p>
              <p class="MsoNormal"><span style="font-size:12.0pt">Phone:Â Â Â Â Â 
                  (949) 636-8571</span><o:p></o:p></p>
              <p class="MsoNormal"><span style="font-size:12.0pt">Email:Â Â Â Â Â Â 
                  <a moz-do-not-send="true"
                    href="mailto:donald.coffin@reminetworks.com">donald.coffin@reminetworks.com</a></span><o:p></o:p></p>
              <p class="MsoNormal">Â <o:p></o:p></p>
              <p class="MsoNormal"><span
                  style="font-size:12.0pt;font-family:&quot;Times New
                  Roman&quot;,&quot;serif&quot;"><br>
                  <br>
                  <br>
                  <br>
                </span><o:p></o:p></p>
              <pre>_______________________________________________<o:p></o:p></pre>
              <pre>OAuth mailing list<o:p></o:p></pre>
              <pre><a moz-do-not-send="true" href="mailto:OAuth@ietf.org">OAuth@ietf.org</a><o:p></o:p></pre>
              <pre><a moz-do-not-send="true" href="https://www.ietf.org/mailman/listinfo/oauth">https://www.ietf.org/mailman/listinfo/oauth</a><o:p></o:p></pre>
            </blockquote>
            <p class="MsoNormal"><span
                style="font-size:12.0pt;font-family:&quot;Times New
                Roman&quot;,&quot;serif&quot;">Â </span><o:p></o:p></p>
          </div>
        </div>
      </div>
    </blockquote>
    <br>
  </body>
</html>

--------------070803000607060405040701--

From torsten@lodderstedt.net  Sun Feb  3 05:02:06 2013
Return-Path: <torsten@lodderstedt.net>
X-Original-To: oauth@ietfa.amsl.com
Delivered-To: oauth@ietfa.amsl.com
Received: from localhost (localhost [127.0.0.1]) by ietfa.amsl.com (Postfix) with ESMTP id 38D3721F868F for <oauth@ietfa.amsl.com>; Sun,  3 Feb 2013 05:02:06 -0800 (PST)
X-Virus-Scanned: amavisd-new at amsl.com
X-Spam-Flag: NO
X-Spam-Score: -0.676
X-Spam-Level: 
X-Spam-Status: No, score=-0.676 tagged_above=-999 required=5 tests=[AWL=1.573,  BAYES_00=-2.599, HELO_EQ_DE=0.35]
Received: from mail.ietf.org ([64.170.98.30]) by localhost (ietfa.amsl.com [127.0.0.1]) (amavisd-new, port 10024) with ESMTP id RtYhHOi7GqZm for <oauth@ietfa.amsl.com>; Sun,  3 Feb 2013 05:02:04 -0800 (PST)
Received: from smtprelay04.ispgateway.de (smtprelay04.ispgateway.de [80.67.31.31]) by ietfa.amsl.com (Postfix) with ESMTP id 93EF921F8681 for <oauth@ietf.org>; Sun,  3 Feb 2013 05:02:04 -0800 (PST)
Received: from [79.253.33.56] (helo=[192.168.71.36]) by smtprelay04.ispgateway.de with esmtpsa (TLSv1:AES256-SHA:256) (Exim 4.68) (envelope-from <torsten@lodderstedt.net>) id 1U1zCt-0000fg-7S for oauth@ietf.org; Sun, 03 Feb 2013 14:02:03 +0100
Message-ID: <510E5FB5.10803@lodderstedt.net>
Date: Sun, 03 Feb 2013 14:01:41 +0100
From: Torsten Lodderstedt <torsten@lodderstedt.net>
User-Agent: Mozilla/5.0 (Windows NT 6.2; rv:17.0) Gecko/20130107 Thunderbird/17.0.2
MIME-Version: 1.0
To: OAuth WG <oauth@ietf.org>
Content-Type: text/plain; charset=ISO-8859-15; format=flowed
Content-Transfer-Encoding: 7bit
X-Df-Sender: dG9yc3RlbkBsb2RkZXJzdGVkdC1vbmxpbmUuZGU=
Subject: [OAUTH-WG] draft-ietf-oauth-revocation
X-BeenThere: oauth@ietf.org
X-Mailman-Version: 2.1.12
Precedence: list
List-Id: OAUTH WG <oauth.ietf.org>
List-Unsubscribe: <https://www.ietf.org/mailman/options/oauth>, <mailto:oauth-request@ietf.org?subject=unsubscribe>
List-Archive: <http://www.ietf.org/mail-archive/web/oauth>
List-Post: <mailto:oauth@ietf.org>
List-Help: <mailto:oauth-request@ietf.org?subject=help>
List-Subscribe: <https://www.ietf.org/mailman/listinfo/oauth>, <mailto:oauth-request@ietf.org?subject=subscribe>
X-List-Received-Date: Sun, 03 Feb 2013 13:02:06 -0000

Hi all,

before I publish a new revision of the draft, I would like to sort out 
the following issues and would like to ask you for your feedback.

- Authorization vs. access grant vs. authorization grant: I propose to 
use "authorization grant".
- invalid_token error code: I propose to use the new error code 
"invalid_parameter" (as suggested by Peter and George). I don't see the 
need to register it (see 
http://www.ietf.org/mail-archive/web/oauth/current/msg10604.html) but 
would like to get your advice.
- Donald F. Coffin raised the need for a token_type parameter to the 
revocation request. Shall we re-consider this topic?

best regards,
Torsten.

From torsten@lodderstedt.net  Sun Feb  3 05:04:53 2013
Return-Path: <torsten@lodderstedt.net>
X-Original-To: oauth@ietfa.amsl.com
Delivered-To: oauth@ietfa.amsl.com
Received: from localhost (localhost [127.0.0.1]) by ietfa.amsl.com (Postfix) with ESMTP id C070021F86A8 for <oauth@ietfa.amsl.com>; Sun,  3 Feb 2013 05:04:53 -0800 (PST)
X-Virus-Scanned: amavisd-new at amsl.com
X-Spam-Flag: NO
X-Spam-Score: -1.2
X-Spam-Level: 
X-Spam-Status: No, score=-1.2 tagged_above=-999 required=5 tests=[AWL=1.048, BAYES_00=-2.599, HELO_EQ_DE=0.35, HTML_MESSAGE=0.001]
Received: from mail.ietf.org ([64.170.98.30]) by localhost (ietfa.amsl.com [127.0.0.1]) (amavisd-new, port 10024) with ESMTP id uUtiOnge45TP for <oauth@ietfa.amsl.com>; Sun,  3 Feb 2013 05:04:53 -0800 (PST)
Received: from smtprelay03.ispgateway.de (smtprelay03.ispgateway.de [80.67.18.15]) by ietfa.amsl.com (Postfix) with ESMTP id EC03D21F86B8 for <oauth@ietf.org>; Sun,  3 Feb 2013 05:04:52 -0800 (PST)
Received: from [79.253.33.56] (helo=[192.168.71.36]) by smtprelay03.ispgateway.de with esmtpsa (TLSv1:AES256-SHA:256) (Exim 4.68) (envelope-from <torsten@lodderstedt.net>) id 1U1zFY-0004UH-0A; Sun, 03 Feb 2013 14:04:48 +0100
Message-ID: <510E606E.2040409@lodderstedt.net>
Date: Sun, 03 Feb 2013 14:04:46 +0100
From: Torsten Lodderstedt <torsten@lodderstedt.net>
User-Agent: Mozilla/5.0 (Windows NT 6.2; rv:17.0) Gecko/20130107 Thunderbird/17.0.2
MIME-Version: 1.0
To: Donald F Coffin <donald.coffin@reminetworks.com>
References: <006401cdfe5f$2555f170$7001d450$@reminetworks.com> <51085B43.3080103@aol.com> <00c901cdfe80$e7d0eb30$b772c190$@reminetworks.com> <9DFD603A-1170-41D8-A22F-8654D55546B3@lodderstedt.net> <00a301ce0205$b6b1ca00$24155e00$@reminetworks.com>
In-Reply-To: <00a301ce0205$b6b1ca00$24155e00$@reminetworks.com>
Content-Type: multipart/alternative; boundary="------------060604060908010306040000"
X-Df-Sender: dG9yc3RlbkBsb2RkZXJzdGVkdC1vbmxpbmUuZGU=
Cc: 'John Adkins' <jva2@pge.com>, 'Marty Burns' <marty@hypertek.us>, 'Scott Crowder' <scott.crowder@qadoenergy.com>, 'Dave Robin' <drobin@automatedlogic.com>, 'John Teeter' <john.teeter@peoplepowerco.com>, pmadsen@pingidentity.com, 'Edward Denson' <ewd7@pge.com>, oauth@ietf.org, 'Ray Perlner' <ray.perlner@nist.gov>, 'Anne Hendry' <ahendry2@gmail.com>, 'Lynne Rodoni' <mrodoni@semprautilities.com>, 'Uday Verma' <uday.verma@ilinknet.com>
Subject: Re: [OAUTH-WG] draft-ietf-oauth-revocation-04
X-BeenThere: oauth@ietf.org
X-Mailman-Version: 2.1.12
Precedence: list
List-Id: OAUTH WG <oauth.ietf.org>
List-Unsubscribe: <https://www.ietf.org/mailman/options/oauth>, <mailto:oauth-request@ietf.org?subject=unsubscribe>
List-Archive: <http://www.ietf.org/mail-archive/web/oauth>
List-Post: <mailto:oauth@ietf.org>
List-Help: <mailto:oauth-request@ietf.org?subject=help>
List-Subscribe: <https://www.ietf.org/mailman/listinfo/oauth>, <mailto:oauth-request@ietf.org?subject=subscribe>
X-List-Received-Date: Sun, 03 Feb 2013 13:04:53 -0000

This is a multi-part message in MIME format.
--------------060604060908010306040000
Content-Type: text/plain; charset=UTF-8; format=flowed
Content-Transfer-Encoding: 8bit

Hi Donald,

Am 03.02.2013 12:57, schrieb Donald F Coffin:
> Perhaps the section on the *Serverâ€™s Revocation Policy* should address 
> a few of the reasons why a client may want or need to revoke a token.  
> The current description provides no consideration for the relationship 
> between tokens and scope, although there clearly is a relationship.

I will extend the description text in the next revision.

regards,
Torsten.

--------------060604060908010306040000
Content-Type: text/html; charset=UTF-8
Content-Transfer-Encoding: 8bit

<html>
  <head>
    <meta content="text/html; charset=UTF-8" http-equiv="Content-Type">
  </head>
  <body text="#000000" bgcolor="#FFFFFF">
    Hi Donald,<br>
    <br>
    <div class="moz-cite-prefix">Am 03.02.2013 12:57, schrieb Donald F
      Coffin:<br>
    </div>
    <blockquote
      cite="mid:00a301ce0205$b6b1ca00$24155e00$@reminetworks.com"
      type="cite"><span
style="font-size:12.0pt;font-family:&quot;Cambria&quot;,&quot;serif&quot;;color:#0070C0">Perhaps
        the section on the <b>Serverâ€™s Revocation Policy</b> should
        address a few of the reasons why a client may want or need to
        revoke a token.Â  The current description provides no
        consideration for the relationship between tokens and scope,
        although there clearly is a relationship.</span></blockquote>
    <br>
    I will extend the description text in the next revision.<br>
    <br>
    regards,<br>
    Torsten.<br>
  </body>
</html>

--------------060604060908010306040000--

From hannes.tschofenig@gmx.net  Sun Feb  3 05:10:06 2013
Return-Path: <hannes.tschofenig@gmx.net>
X-Original-To: oauth@ietfa.amsl.com
Delivered-To: oauth@ietfa.amsl.com
Received: from localhost (localhost [127.0.0.1]) by ietfa.amsl.com (Postfix) with ESMTP id BD60221F86A8 for <oauth@ietfa.amsl.com>; Sun,  3 Feb 2013 05:10:06 -0800 (PST)
X-Virus-Scanned: amavisd-new at amsl.com
X-Spam-Flag: NO
X-Spam-Score: -102.312
X-Spam-Level: 
X-Spam-Status: No, score=-102.312 tagged_above=-999 required=5 tests=[AWL=0.287, BAYES_00=-2.599, USER_IN_WHITELIST=-100]
Received: from mail.ietf.org ([64.170.98.30]) by localhost (ietfa.amsl.com [127.0.0.1]) (amavisd-new, port 10024) with ESMTP id lXlE2NVuKVAj for <oauth@ietfa.amsl.com>; Sun,  3 Feb 2013 05:10:06 -0800 (PST)
Received: from mout.gmx.net (mout.gmx.net [212.227.15.18]) by ietfa.amsl.com (Postfix) with ESMTP id EBAEB21F8689 for <oauth@ietf.org>; Sun,  3 Feb 2013 05:10:05 -0800 (PST)
Received: from mailout-de.gmx.net ([10.1.76.30]) by mrigmx.server.lan (mrigmx001) with ESMTP (Nemesis) id 0Mgqx4-1UNw4K3vMm-00M3BT for <oauth@ietf.org>; Sun, 03 Feb 2013 14:10:05 +0100
Received: (qmail invoked by alias); 03 Feb 2013 13:10:04 -0000
Received: from a88-115-219-140.elisa-laajakaista.fi (EHLO [192.168.100.200]) [88.115.219.140] by mail.gmx.net (mp030) with SMTP; 03 Feb 2013 14:10:04 +0100
X-Authenticated: #29516787
X-Provags-ID: V01U2FsdGVkX1/lbqE+e4blNqCDYFyXs0gG7OM4Ny9I20muOW4pfB Y676UKSEx/ZDCA
Message-ID: <510E61AB.20808@gmx.net>
Date: Sun, 03 Feb 2013 15:10:03 +0200
From: Hannes Tschofenig <hannes.tschofenig@gmx.net>
User-Agent: Mozilla/5.0 (X11; Linux x86_64; rv:17.0) Gecko/20130106 Thunderbird/17.0.2
MIME-Version: 1.0
To: Torsten Lodderstedt <torsten@lodderstedt.net>
References: <510E5FB5.10803@lodderstedt.net>
In-Reply-To: <510E5FB5.10803@lodderstedt.net>
Content-Type: text/plain; charset=ISO-8859-1; format=flowed
Content-Transfer-Encoding: 7bit
X-Y-GMX-Trusted: 0
Cc: OAuth WG <oauth@ietf.org>
Subject: Re: [OAUTH-WG] draft-ietf-oauth-revocation
X-BeenThere: oauth@ietf.org
X-Mailman-Version: 2.1.12
Precedence: list
List-Id: OAUTH WG <oauth.ietf.org>
List-Unsubscribe: <https://www.ietf.org/mailman/options/oauth>, <mailto:oauth-request@ietf.org?subject=unsubscribe>
List-Archive: <http://www.ietf.org/mail-archive/web/oauth>
List-Post: <mailto:oauth@ietf.org>
List-Help: <mailto:oauth-request@ietf.org?subject=help>
List-Subscribe: <https://www.ietf.org/mailman/listinfo/oauth>, <mailto:oauth-request@ietf.org?subject=subscribe>
X-List-Received-Date: Sun, 03 Feb 2013 13:10:06 -0000

Hi Torsten,


On 02/03/2013 03:01 PM, Torsten Lodderstedt wrote:
> - invalid_token error code: I propose to use the new error code
> "invalid_parameter" (as suggested by Peter and George). I don't see the
> need to register it (see
> http://www.ietf.org/mail-archive/web/oauth/current/msg10604.html) but
> would like to get your advice.

If you define a new error code (which 'invalid_parameter' is) then it 
would make sense to register it.
The mail exchange you reference refers to re-using an existing error 
code (namely invalid_request).

Ciao
Hannes

From torsten@lodderstedt.net  Sun Feb  3 05:12:51 2013
Return-Path: <torsten@lodderstedt.net>
X-Original-To: oauth@ietfa.amsl.com
Delivered-To: oauth@ietfa.amsl.com
Received: from localhost (localhost [127.0.0.1]) by ietfa.amsl.com (Postfix) with ESMTP id DD38721F854C for <oauth@ietfa.amsl.com>; Sun,  3 Feb 2013 05:12:51 -0800 (PST)
X-Virus-Scanned: amavisd-new at amsl.com
X-Spam-Flag: NO
X-Spam-Score: -1.462
X-Spam-Level: 
X-Spam-Status: No, score=-1.462 tagged_above=-999 required=5 tests=[AWL=0.787,  BAYES_00=-2.599, HELO_EQ_DE=0.35]
Received: from mail.ietf.org ([64.170.98.30]) by localhost (ietfa.amsl.com [127.0.0.1]) (amavisd-new, port 10024) with ESMTP id EDEkev4d5lW2 for <oauth@ietfa.amsl.com>; Sun,  3 Feb 2013 05:12:51 -0800 (PST)
Received: from smtprelay02.ispgateway.de (smtprelay02.ispgateway.de [80.67.31.40]) by ietfa.amsl.com (Postfix) with ESMTP id F210521F853E for <oauth@ietf.org>; Sun,  3 Feb 2013 05:12:50 -0800 (PST)
Received: from [79.253.33.56] (helo=[192.168.71.36]) by smtprelay02.ispgateway.de with esmtpsa (TLSv1:AES256-SHA:256) (Exim 4.68) (envelope-from <torsten@lodderstedt.net>) id 1U1zNJ-0003a9-KB; Sun, 03 Feb 2013 14:12:49 +0100
Message-ID: <510E624D.202@lodderstedt.net>
Date: Sun, 03 Feb 2013 14:12:45 +0100
From: Torsten Lodderstedt <torsten@lodderstedt.net>
User-Agent: Mozilla/5.0 (Windows NT 6.2; rv:17.0) Gecko/20130107 Thunderbird/17.0.2
MIME-Version: 1.0
To: Hannes Tschofenig <hannes.tschofenig@gmx.net>
References: <510E5FB5.10803@lodderstedt.net> <510E61AB.20808@gmx.net>
In-Reply-To: <510E61AB.20808@gmx.net>
Content-Type: text/plain; charset=ISO-8859-1; format=flowed
Content-Transfer-Encoding: 7bit
X-Df-Sender: dG9yc3RlbkBsb2RkZXJzdGVkdC1vbmxpbmUuZGU=
Cc: OAuth WG <oauth@ietf.org>
Subject: Re: [OAUTH-WG] draft-ietf-oauth-revocation
X-BeenThere: oauth@ietf.org
X-Mailman-Version: 2.1.12
Precedence: list
List-Id: OAUTH WG <oauth.ietf.org>
List-Unsubscribe: <https://www.ietf.org/mailman/options/oauth>, <mailto:oauth-request@ietf.org?subject=unsubscribe>
List-Archive: <http://www.ietf.org/mail-archive/web/oauth>
List-Post: <mailto:oauth@ietf.org>
List-Help: <mailto:oauth-request@ietf.org?subject=help>
List-Subscribe: <https://www.ietf.org/mailman/listinfo/oauth>, <mailto:oauth-request@ietf.org?subject=subscribe>
X-List-Received-Date: Sun, 03 Feb 2013 13:12:52 -0000

Hi Hannes,

Am 03.02.2013 14:10, schrieb Hannes Tschofenig:
> Hi Torsten,
>
>
> On 02/03/2013 03:01 PM, Torsten Lodderstedt wrote:
>> - invalid_token error code: I propose to use the new error code
>> "invalid_parameter" (as suggested by Peter and George). I don't see the
>> need to register it (see
>> http://www.ietf.org/mail-archive/web/oauth/current/msg10604.html) but
>> would like to get your advice.
>
> If you define a new error code (which 'invalid_parameter' is) then it 
> would make sense to register it.

ok.

> The mail exchange you reference refers to re-using an existing error 
> code (namely invalid_request).

You also mention registering a new error code there. I was not sure what 
way you prefer, reusing invalid_request or introducing a new error code.

regards,
Torsten.


>
> Ciao
> Hannes


From wmills_92105@yahoo.com  Sun Feb  3 07:25:55 2013
Return-Path: <wmills_92105@yahoo.com>
X-Original-To: oauth@ietfa.amsl.com
Delivered-To: oauth@ietfa.amsl.com
Received: from localhost (localhost [127.0.0.1]) by ietfa.amsl.com (Postfix) with ESMTP id EAF4A21F84E0 for <oauth@ietfa.amsl.com>; Sun,  3 Feb 2013 07:25:55 -0800 (PST)
X-Virus-Scanned: amavisd-new at amsl.com
X-Spam-Flag: NO
X-Spam-Score: -1.731
X-Spam-Level: 
X-Spam-Status: No, score=-1.731 tagged_above=-999 required=5 tests=[AWL=0.867,  BAYES_00=-2.599, HTML_MESSAGE=0.001]
Received: from mail.ietf.org ([64.170.98.30]) by localhost (ietfa.amsl.com [127.0.0.1]) (amavisd-new, port 10024) with ESMTP id mPaV++O8gaRt for <oauth@ietfa.amsl.com>; Sun,  3 Feb 2013 07:25:55 -0800 (PST)
Received: from nm22-vm0.bullet.mail.ne1.yahoo.com (nm22-vm0.bullet.mail.ne1.yahoo.com [98.138.91.60]) by ietfa.amsl.com (Postfix) with ESMTP id 3520021F84DA for <oauth@ietf.org>; Sun,  3 Feb 2013 07:25:55 -0800 (PST)
Received: from [98.138.90.48] by nm22.bullet.mail.ne1.yahoo.com with NNFMP; 03 Feb 2013 15:25:54 -0000
Received: from [98.138.89.197] by tm1.bullet.mail.ne1.yahoo.com with NNFMP; 03 Feb 2013 15:25:54 -0000
Received: from [127.0.0.1] by omp1055.mail.ne1.yahoo.com with NNFMP; 03 Feb 2013 15:25:54 -0000
X-Yahoo-Newman-Property: ymail-3
X-Yahoo-Newman-Id: 646410.39635.bm@omp1055.mail.ne1.yahoo.com
Received: (qmail 37050 invoked by uid 60001); 3 Feb 2013 15:25:54 -0000
DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=yahoo.com; s=s1024; t=1359905154; bh=yaIUdR6s5bx7M6guYhoR1li1edgxycUnTzXANu5Qzlw=; h=X-YMail-OSG:Received:X-Rocket-MIMEInfo:X-Mailer:References:Message-ID:Date:From:Reply-To:Subject:To:In-Reply-To:MIME-Version:Content-Type; b=o6yVSsmfRUbgpibRnmlYF2mjrGpzVXAqe8f0Ise3giCo2onU4SPgp7RKJ5dGZ1ejsdiluX85Gd+0F/WZ/UnrNA1kMctRKYwieKXCyfmrjOni3ZBUGFEnkWRirjTMEc1O+h5DNedIOTnaZ3OqFjZLoHZv4T8PM52wa0ic3EprIFY=
DomainKey-Signature: a=rsa-sha1; q=dns; c=nofws; s=s1024; d=yahoo.com; h=X-YMail-OSG:Received:X-Rocket-MIMEInfo:X-Mailer:References:Message-ID:Date:From:Reply-To:Subject:To:In-Reply-To:MIME-Version:Content-Type; b=v9irZv4OALYNo0e6b7RXBXulMVQsfXqjx97MG14nTP2zJHEg2yPwMduJV+oIMDHFLl29O9loFUwGKvPCxz1A8mHlne5OnBWrzAFdCW6OAliKqaLwcOD/FSd30rZ9btcVtuWSDRFcCp/56R8K7RfrBc+KUWGTp3HAEyNmhfLYHtg=;
X-YMail-OSG: l6rIua4VM1l6mOLObD2WDUj1UTf3bQjAbEAu6VEQXvSE2SS gmaYsI2wuosQSIDFbvLLyIMuck255hfOp6HWMxK7YETT942TO8tettfjQUav BtVNQsy6VtWK6ICSkFPybSKLMrfk729Wf8QF8a4zB5c_mxyoXjyL5R0GEzOs LuXrZm7pDPWXOMEMs2QWzVBvS1gA8Xfu0w.GofFEpQHbLBbDVqF2IjRI3u95 WY3EDBzzqqzq7NPj2hkA17rISEPlXXSJ4ud0QSV24euZvrSJ.O_Oipf1swsH ZOXXfmsCZqem2Ckuk3.Oxj7APBsz.Tu8VQ6bl._WmV1uaxTR2ff9M0bEQy_y LUhTTmp3DGDaFT.oBtsFVdwk89Yj_EB3DLZGSPcFcSIQ5D.IKu.W2nIPPv4j zEGWIX5eaUc6n8VXVhiO7bwhO46uRyeFibu_SiIGZ37v5Tq7LIM.0rr7AAgO C9hXFH0wxdXjipXLYmXDaNWKsrPiDBWEncCeLv1fNtvWMztPnZSS7C2lRWia oCLylPr1E62WvJ2.eC4o-
Received: from [99.31.212.42] by web31812.mail.mud.yahoo.com via HTTP; Sun, 03 Feb 2013 07:25:53 PST
X-Rocket-MIMEInfo: 001.001, V2h5IGRvIHdlIG5lZWQgaW52YWxpZF90b2tlbiBhcyBhbiBlcnJvciBjb2RlIGF0IGFsbD8gwqBUbyBtZSBpdCBvbmx5IGludHJvZHVjZXMgYSB3YXkgdG8gZ2V0IGluZm9ybWF0aW9uIGFib3V0IHRva2Vucy4gwqBJbnZhbGlkIHBhcmFtZXRlciBJIGNhbiBzZWUgYXMgYSB1c2UgY2FzZSwgYnV0IGlmIHRoZSB0b2tlbiBpcyBpbnZhbGlkIGp1c3QgcmV0dXJuIDIwMC9PSyBiZWNhdXNlIHRoZXJlIGlzIG5vdGhpbmcgdG8gZG8uCgotYmlsbAoKCl9fX19fX19fX19fX19fX19fX19fX19fX19fX19fX19fCiBGcm8BMAEBAQE-
X-Mailer: YahooMailWebService/0.8.132.503
References: <510E5FB5.10803@lodderstedt.net>
Message-ID: <1359905153.80009.YahooMailNeo@web31812.mail.mud.yahoo.com>
Date: Sun, 3 Feb 2013 07:25:53 -0800 (PST)
From: William Mills <wmills_92105@yahoo.com>
To: Torsten Lodderstedt <torsten@lodderstedt.net>, OAuth WG <oauth@ietf.org>
In-Reply-To: <510E5FB5.10803@lodderstedt.net>
MIME-Version: 1.0
Content-Type: multipart/alternative; boundary="1458549034-1106129283-1359905153=:80009"
Subject: Re: [OAUTH-WG] draft-ietf-oauth-revocation
X-BeenThere: oauth@ietf.org
X-Mailman-Version: 2.1.12
Precedence: list
Reply-To: William Mills <wmills_92105@yahoo.com>
List-Id: OAUTH WG <oauth.ietf.org>
List-Unsubscribe: <https://www.ietf.org/mailman/options/oauth>, <mailto:oauth-request@ietf.org?subject=unsubscribe>
List-Archive: <http://www.ietf.org/mail-archive/web/oauth>
List-Post: <mailto:oauth@ietf.org>
List-Help: <mailto:oauth-request@ietf.org?subject=help>
List-Subscribe: <https://www.ietf.org/mailman/listinfo/oauth>, <mailto:oauth-request@ietf.org?subject=subscribe>
X-List-Received-Date: Sun, 03 Feb 2013 15:25:56 -0000

--1458549034-1106129283-1359905153=:80009
Content-Type: text/plain; charset=iso-8859-1
Content-Transfer-Encoding: quoted-printable

Why do we need invalid_token as an error code at all? =A0To me it only intr=
oduces a way to get information about tokens. =A0Invalid parameter I can se=
e as a use case, but if the token is invalid just return 200/OK because the=
re is nothing to do.=0A=0A-bill=0A=0A=0A________________________________=0A=
 From: Torsten Lodderstedt <torsten@lodderstedt.net>=0ATo: OAuth WG <oauth@=
ietf.org> =0ASent: Sunday, February 3, 2013 5:01 AM=0ASubject: [OAUTH-WG] d=
raft-ietf-oauth-revocation=0A =0AHi all,=0A=0Abefore I publish a new revisi=
on of the draft, I would like to sort out the following issues and would li=
ke to ask you for your feedback.=0A=0A- Authorization vs. access grant vs. =
authorization grant: I propose to use "authorization grant".=0A- invalid_to=
ken error code: I propose to use the new error code "invalid_parameter" (as=
 suggested by Peter and George). I don't see the need to register it (see h=
ttp://www.ietf.org/mail-archive/web/oauth/current/msg10604.html) but would =
like to get your advice.=0A- Donald F. Coffin raised the need for a token_t=
ype parameter to the revocation request. Shall we re-consider this topic?=
=0A=0Abest regards,=0ATorsten.=0A__________________________________________=
_____=0AOAuth mailing list=0AOAuth@ietf.org=0Ahttps://www.ietf.org/mailman/=
listinfo/oauth
--1458549034-1106129283-1359905153=:80009
Content-Type: text/html; charset=iso-8859-1
Content-Transfer-Encoding: quoted-printable

<html><body><div style=3D"color:#000; background-color:#fff; font-family:Co=
urier New, courier, monaco, monospace, sans-serif;font-size:12pt"><div><spa=
n>Why do we need invalid_token as an error code at all? &nbsp;To me it only=
 introduces a way to get information about tokens. &nbsp;Invalid parameter =
I can see as a use case, but if the token is invalid just return 200/OK bec=
ause there is nothing to do.</span></div><div style=3D"color: rgb(0, 0, 0);=
 font-size: 16px; font-family: 'Courier New', courier, monaco, monospace, s=
ans-serif; background-color: transparent; font-style: normal;"><span><br></=
span></div><div style=3D"color: rgb(0, 0, 0); font-size: 16px; font-family:=
 'Courier New', courier, monaco, monospace, sans-serif; background-color: t=
ransparent; font-style: normal;"><span>-bill</span></div><div><br></div>  <=
div style=3D"font-family: 'Courier New', courier, monaco, monospace, sans-s=
erif; font-size: 12pt;"> <div style=3D"font-family: 'times new roman', 'new
 york', times, serif; font-size: 12pt;"> <div dir=3D"ltr"> <font size=3D"2"=
 face=3D"Arial"> <hr size=3D"1">  <b><span style=3D"font-weight:bold;">From=
:</span></b> Torsten Lodderstedt &lt;torsten@lodderstedt.net&gt;<br> <b><sp=
an style=3D"font-weight: bold;">To:</span></b> OAuth WG &lt;oauth@ietf.org&=
gt; <br> <b><span style=3D"font-weight: bold;">Sent:</span></b> Sunday, Feb=
ruary 3, 2013 5:01 AM<br> <b><span style=3D"font-weight: bold;">Subject:</s=
pan></b> [OAUTH-WG] draft-ietf-oauth-revocation<br> </font> </div> <br>=0AH=
i all,<br><br>before I publish a new revision of the draft, I would like to=
 sort out the following issues and would like to ask you for your feedback.=
<br><br>- Authorization vs. access grant vs. authorization grant: I propose=
 to use "authorization grant".<br>- invalid_token error code: I propose to =
use the new error code "invalid_parameter" (as suggested by Peter and Georg=
e). I don't see the need to register it (see http://www.ietf.org/mail-archi=
ve/web/oauth/current/msg10604.html) but would like to get your advice.<br>-=
 Donald F. Coffin raised the need for a token_type parameter to the revocat=
ion request. Shall we re-consider this topic?<br><br>best regards,<br>Torst=
en.<br>_______________________________________________<br>OAuth mailing lis=
t<br><a ymailto=3D"mailto:OAuth@ietf.org" href=3D"mailto:OAuth@ietf.org">OA=
uth@ietf.org</a><br><a href=3D"https://www.ietf.org/mailman/listinfo/oauth"
 target=3D"_blank">https://www.ietf.org/mailman/listinfo/oauth</a><br><br><=
br> </div> </div>  </div></body></html>
--1458549034-1106129283-1359905153=:80009--

From pmhsfelix@gmail.com  Sun Feb  3 09:51:23 2013
Return-Path: <pmhsfelix@gmail.com>
X-Original-To: oauth@ietfa.amsl.com
Delivered-To: oauth@ietfa.amsl.com
Received: from localhost (localhost [127.0.0.1]) by ietfa.amsl.com (Postfix) with ESMTP id D485F21F853E for <oauth@ietfa.amsl.com>; Sun,  3 Feb 2013 09:51:23 -0800 (PST)
X-Virus-Scanned: amavisd-new at amsl.com
X-Spam-Flag: NO
X-Spam-Score: -3.598
X-Spam-Level: 
X-Spam-Status: No, score=-3.598 tagged_above=-999 required=5 tests=[BAYES_00=-2.599, HTML_MESSAGE=0.001, RCVD_IN_DNSWL_LOW=-1]
Received: from mail.ietf.org ([64.170.98.30]) by localhost (ietfa.amsl.com [127.0.0.1]) (amavisd-new, port 10024) with ESMTP id ospa0JkuSfpj for <oauth@ietfa.amsl.com>; Sun,  3 Feb 2013 09:51:23 -0800 (PST)
Received: from mail-qa0-f49.google.com (mail-qa0-f49.google.com [209.85.216.49]) by ietfa.amsl.com (Postfix) with ESMTP id 4D6A621F8539 for <oauth@ietf.org>; Sun,  3 Feb 2013 09:51:23 -0800 (PST)
Received: by mail-qa0-f49.google.com with SMTP id o13so993333qaj.1 for <oauth@ietf.org>; Sun, 03 Feb 2013 09:51:22 -0800 (PST)
DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=gmail.com; s=20120113; h=mime-version:x-received:date:message-id:subject:from:to :content-type; bh=Em4dHXmmp16VUVvScOqvC2n+Imi9qht4imBDuxCk7E0=; b=Kuuo7M8uK9qN0CqV0FBtn65IyUsj+iLhuS89/g3MDpW/2vtB2NMcCt7M7nPHVThTCE 3pXWLW6Tn3v4s32js6e5Rv7P9P0S+cRPQe7HQYl6ORh9qJtw+OlD36VLXfF4uegVk+5I qX6GWNAK4YgrHvzQelyDCF2UNVtgIftsHBZL2JKRz7XSi3GqY/rlQhL2/evxCpUBujCK qxXW2ivQJDvmiHezo3NHUymMK/l9UXWlsJdFHJovgYjnFy+RQ9V5VbJI7E1Kn3hQKFau TqUBb33AWJoXgyLVdfwbfmONB/1K3o4vp4nBzWcTtrj3oqN89Wmm8dhCYG5HFbUK4Bhn OXDQ==
MIME-Version: 1.0
X-Received: by 10.224.216.9 with SMTP id hg9mr16963958qab.44.1359913882727; Sun, 03 Feb 2013 09:51:22 -0800 (PST)
Received: by 10.49.61.102 with HTTP; Sun, 3 Feb 2013 09:51:22 -0800 (PST)
Date: Sun, 3 Feb 2013 17:51:22 +0000
Message-ID: <CAD+AFDsv59F5ksa73Gg=mmj8X8-5iC3GRExzd+9sRL+yO2_aiA@mail.gmail.com>
From: Pedro Felix <pmhsfelix@gmail.com>
To: oauth@ietf.org
Content-Type: multipart/alternative; boundary=20cf300512fee7b46d04d4d59fce
Subject: [OAUTH-WG] Best practices to use JWT tokens as access tokens
X-BeenThere: oauth@ietf.org
X-Mailman-Version: 2.1.12
Precedence: list
List-Id: OAUTH WG <oauth.ietf.org>
List-Unsubscribe: <https://www.ietf.org/mailman/options/oauth>, <mailto:oauth-request@ietf.org?subject=unsubscribe>
List-Archive: <http://www.ietf.org/mail-archive/web/oauth>
List-Post: <mailto:oauth@ietf.org>
List-Help: <mailto:oauth-request@ietf.org?subject=help>
List-Subscribe: <https://www.ietf.org/mailman/listinfo/oauth>, <mailto:oauth-request@ietf.org?subject=subscribe>
X-List-Received-Date: Sun, 03 Feb 2013 17:51:23 -0000

--20cf300512fee7b46d04d4d59fce
Content-Type: text/plain; charset=ISO-8859-1

Hi,

I'm considering using JWT tokens as access tokens in a scenario where the
AS is rather decoupled from the RS. Namely, the same AS with manage the
authorization for multiple RSs.
Using JWT for short-lived non-revocable access tokens means that the RS is
able to obtain all the authorization grant information without contacting
the AS or using a shared store.

My plan is to encode in the JWT token all the relevant authorization grant
information, namely:

1) The authorizing user (RO) claims
2) The authorized client information - at least its client_id, but there
can be more client info available
3) The authorized scopes

Are there any guidelines on how to represent this information as claims of
a JWT token? Namely, how can we group this info such that there are no
collisions between user claims and client claims?

Thanks
Pedro

--20cf300512fee7b46d04d4d59fce
Content-Type: text/html; charset=ISO-8859-1
Content-Transfer-Encoding: quoted-printable

<div dir=3D"ltr">Hi,<div><br></div><div style>I&#39;m considering using JWT=
 tokens as access tokens in a scenario where the AS is rather decoupled fro=
m the RS. Namely, the same AS with manage the authorization for multiple RS=
s.</div>
<div style>Using JWT for short-lived non-revocable access tokens means that=
 the RS is able to obtain all the authorization grant information without c=
ontacting the AS or using a shared store.</div><div style><br></div><div st=
yle>
My plan is to encode in the JWT token all the relevant authorization grant =
information, namely:</div><div style><br></div><div style>1) The authorizin=
g user (RO) claims</div><div style>2) The authorized client information - a=
t least its client_id, but there can be more client info available</div>
<div style>3) The authorized scopes</div><div style><br></div><div style>Ar=
e there any guidelines on how to represent this information as claims of a =
JWT token? Namely, how can we group this info such that there are no collis=
ions between user claims and client claims?</div>
<div style><br></div><div style>Thanks</div><div style>Pedro</div><div styl=
e><br></div><div style><br></div></div>

--20cf300512fee7b46d04d4d59fce--

From sberyozkin@gmail.com  Sun Feb  3 10:28:42 2013
Return-Path: <sberyozkin@gmail.com>
X-Original-To: oauth@ietfa.amsl.com
Delivered-To: oauth@ietfa.amsl.com
Received: from localhost (localhost [127.0.0.1]) by ietfa.amsl.com (Postfix) with ESMTP id 1E5D321F873D for <oauth@ietfa.amsl.com>; Sun,  3 Feb 2013 10:28:42 -0800 (PST)
X-Virus-Scanned: amavisd-new at amsl.com
X-Spam-Flag: NO
X-Spam-Score: -3.244
X-Spam-Level: 
X-Spam-Status: No, score=-3.244 tagged_above=-999 required=5 tests=[AWL=0.355,  BAYES_00=-2.599, RCVD_IN_DNSWL_LOW=-1]
Received: from mail.ietf.org ([64.170.98.30]) by localhost (ietfa.amsl.com [127.0.0.1]) (amavisd-new, port 10024) with ESMTP id 7UkwJvN9kpjb for <oauth@ietfa.amsl.com>; Sun,  3 Feb 2013 10:28:41 -0800 (PST)
Received: from mail-wi0-f182.google.com (mail-wi0-f182.google.com [209.85.212.182]) by ietfa.amsl.com (Postfix) with ESMTP id 578CB21F8731 for <oauth@ietf.org>; Sun,  3 Feb 2013 10:28:41 -0800 (PST)
Received: by mail-wi0-f182.google.com with SMTP id hi18so903192wib.9 for <oauth@ietf.org>; Sun, 03 Feb 2013 10:28:40 -0800 (PST)
DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=gmail.com; s=20120113; h=x-received:message-id:date:from:user-agent:mime-version:to:subject :references:in-reply-to:content-type:content-transfer-encoding; bh=z9KuzYr4B9rCPuowG1aPWJv8Zb9tOj5jWLP7fJz1meg=; b=vgK0HDb6VYxneF49F9fssEpQ4GdjpXSYqpSsliVG8HRnp7CRKGfD0QZSlEW1dSqBxA 82mDYbYUpx9JXNVri/srqyswJpCFvN3LPOGFb5pZTvqDczdJRNDm8xswTtXKJ568bqD6 +mA9WbVCsGKeE6RP6JzXAEb3TQJQo+pf70ren4T6BuJtYFWurQVZ2gz9lQ2mkULBUbxI Sqp67pZplTJiO/pUuIyxWA/dDzJIKOWXdImIDSKxzOZeHkI2Du/FG8Mx9aHDA+sVFwfp gdV4IeVK3Y3qzaaxBI5n9W8oXrunJZzNkg3db6IZfOsB5QAysr4ILLoeIfiShS/95R2M fCng==
X-Received: by 10.194.123.105 with SMTP id lz9mr31202187wjb.43.1359916120411;  Sun, 03 Feb 2013 10:28:40 -0800 (PST)
Received: from [192.168.2.5] ([89.100.140.13]) by mx.google.com with ESMTPS id m6sm17061465wic.2.2013.02.03.10.28.39 (version=TLSv1 cipher=ECDHE-RSA-RC4-SHA bits=128/128); Sun, 03 Feb 2013 10:28:39 -0800 (PST)
Message-ID: <510EAC47.5000006@gmail.com>
Date: Sun, 03 Feb 2013 18:28:23 +0000
From: Sergey Beryozkin <sberyozkin@gmail.com>
User-Agent: Mozilla/5.0 (X11; Linux x86_64; rv:12.0) Gecko/20120430 Thunderbird/12.0.1
MIME-Version: 1.0
To: oauth@ietf.org
References: <510E5FB5.10803@lodderstedt.net>
In-Reply-To: <510E5FB5.10803@lodderstedt.net>
Content-Type: text/plain; charset=ISO-8859-1; format=flowed
Content-Transfer-Encoding: 7bit
Subject: Re: [OAUTH-WG] draft-ietf-oauth-revocation
X-BeenThere: oauth@ietf.org
X-Mailman-Version: 2.1.12
Precedence: list
List-Id: OAUTH WG <oauth.ietf.org>
List-Unsubscribe: <https://www.ietf.org/mailman/options/oauth>, <mailto:oauth-request@ietf.org?subject=unsubscribe>
List-Archive: <http://www.ietf.org/mail-archive/web/oauth>
List-Post: <mailto:oauth@ietf.org>
List-Help: <mailto:oauth-request@ietf.org?subject=help>
List-Subscribe: <https://www.ietf.org/mailman/listinfo/oauth>, <mailto:oauth-request@ietf.org?subject=subscribe>
X-List-Received-Date: Sun, 03 Feb 2013 18:28:42 -0000

On 03/02/13 13:01, Torsten Lodderstedt wrote:
> Hi all,
>
> before I publish a new revision of the draft, I would like to sort out
> the following issues and would like to ask you for your feedback.
>
> - Authorization vs. access grant vs. authorization grant: I propose to
> use "authorization grant".
> - invalid_token error code: I propose to use the new error code
> "invalid_parameter" (as suggested by Peter and George). I don't see the
> need to register it (see
> http://www.ietf.org/mail-archive/web/oauth/current/msg10604.html) but
> would like to get your advice.
> - Donald F. Coffin raised the need for a token_type parameter to the
> revocation request. Shall we re-consider this topic?

Yes please if possible (I'm assuming 'access token' should be default, 
with an option to say it is refresh token)

Cheers, Sergey


>
> best regards,
> Torsten.
> _______________________________________________
> OAuth mailing list
> OAuth@ietf.org
> https://www.ietf.org/mailman/listinfo/oauth

From donald.coffin@reminetworks.com  Sun Feb  3 12:46:10 2013
Return-Path: <donald.coffin@reminetworks.com>
X-Original-To: oauth@ietfa.amsl.com
Delivered-To: oauth@ietfa.amsl.com
Received: from localhost (localhost [127.0.0.1]) by ietfa.amsl.com (Postfix) with ESMTP id A4B6721F87ED for <oauth@ietfa.amsl.com>; Sun,  3 Feb 2013 12:46:10 -0800 (PST)
X-Virus-Scanned: amavisd-new at amsl.com
X-Spam-Flag: NO
X-Spam-Score: 0.245
X-Spam-Level: 
X-Spam-Status: No, score=0.245 tagged_above=-999 required=5 tests=[AWL=-0.590,  BAYES_20=-0.74, HTML_MESSAGE=0.001, IP_NOT_FRIENDLY=0.334, SARE_LWSHORTT=1.24]
Received: from mail.ietf.org ([64.170.98.30]) by localhost (ietfa.amsl.com [127.0.0.1]) (amavisd-new, port 10024) with ESMTP id GYy+1B7dCw7F for <oauth@ietfa.amsl.com>; Sun,  3 Feb 2013 12:46:08 -0800 (PST)
Received: from oproxy9.bluehost.com (oproxy9.bluehost.com [69.89.24.6]) by ietfa.amsl.com (Postfix) with SMTP id E644421F87E4 for <oauth@ietf.org>; Sun,  3 Feb 2013 12:46:06 -0800 (PST)
Received: (qmail 2011 invoked by uid 0); 3 Feb 2013 20:45:42 -0000
Received: from unknown (HELO host125.hostmonster.com) (74.220.207.125) by oproxy9.bluehost.com with SMTP; 3 Feb 2013 20:45:42 -0000
DKIM-Signature: v=1; a=rsa-sha256; q=dns/txt; c=relaxed/relaxed; d=reminetworks.com; s=default;  h=Content-Type:MIME-Version:Message-ID:Date:Subject:In-Reply-To:References:Cc:To:From; bh=7JPT9LjYTUkew9W5cBPNa368DtNV0H3Z6aGRJraBtdw=;  b=YZ13U90JulHY61Ps01jlna6iy3W7j/7XawCypplF8KwdTMqKHQ4ax+g9R9ygfwTiD8e+nI/uZpqnbdKOQqDLZKdv1mityR8epmWCkBr8kJAVkpQwpAYPP1I6hevtH1tQ;
Received: from [68.4.207.246] (port=1846 helo=HPPavilionElite) by host125.hostmonster.com with esmtpa (Exim 4.80) (envelope-from <donald.coffin@reminetworks.com>) id 1U26RZ-0000HA-LV; Sun, 03 Feb 2013 13:45:41 -0700
From: "Donald F Coffin" <donald.coffin@reminetworks.com>
To: "'Torsten Lodderstedt'" <torsten@lodderstedt.net>
References: <006401cdfe5f$2555f170$7001d450$@reminetworks.com> <51085B43.3080103@aol.com> <00c901cdfe80$e7d0eb30$b772c190$@reminetworks.com> <9DFD603A-1170-41D8-A22F-8654D55546B3@lodderstedt.net> <00a301ce0205$b6b1ca00$24155e00$@reminetworks.com> <510E560A.4090107@lodderstedt.net>
In-Reply-To: <510E560A.4090107@lodderstedt.net>
Date: Sun, 3 Feb 2013 12:45:31 -0800
Message-ID: <003e01ce024f$6894feb0$39befc10$@reminetworks.com>
MIME-Version: 1.0
Content-Type: multipart/alternative; boundary="----=_NextPart_000_003F_01CE020C.5A780040"
X-Mailer: Microsoft Outlook 14.0
Thread-Index: AQGqJs1aP2O8OPoDFE4j2TX8/D0+WgJbNiMKAkqArjkBxPa5mwH8o5RMAdFqZ0eYXofKcA==
Content-Language: en-us
X-Identified-User: {1395:host125.hostmonster.com:reminetw:reminetworks.com} {sentby:smtp auth 68.4.207.246 authed with donald.coffin@reminetworks.com}
Cc: 'John Adkins' <jva2@pge.com>, 'Marty Burns' <marty@hypertek.us>, 'Scott Crowder' <scott.crowder@qadoenergy.com>, 'Dave Robin' <drobin@automatedlogic.com>, 'John Teeter' <john.teeter@peoplepowerco.com>, pmadsen@pingidentity.com, 'Edward Denson' <ewd7@pge.com>, oauth@ietf.org, 'Ray Perlner' <ray.perlner@nist.gov>, 'Anne Hendry' <ahendry2@gmail.com>, 'Lynne Rodoni' <mrodoni@semprautilities.com>, 'Uday Verma' <uday.verma@ilinknet.com>
Subject: Re: [OAUTH-WG] draft-ietf-oauth-revocation-04
X-BeenThere: oauth@ietf.org
X-Mailman-Version: 2.1.12
Precedence: list
List-Id: OAUTH WG <oauth.ietf.org>
List-Unsubscribe: <https://www.ietf.org/mailman/options/oauth>, <mailto:oauth-request@ietf.org?subject=unsubscribe>
List-Archive: <http://www.ietf.org/mail-archive/web/oauth>
List-Post: <mailto:oauth@ietf.org>
List-Help: <mailto:oauth-request@ietf.org?subject=help>
List-Subscribe: <https://www.ietf.org/mailman/listinfo/oauth>, <mailto:oauth-request@ietf.org?subject=subscribe>
X-List-Received-Date: Sun, 03 Feb 2013 20:46:10 -0000

This is a multipart message in MIME format.

------=_NextPart_000_003F_01CE020C.5A780040
Content-Type: text/plain;
	charset="UTF-8"
Content-Transfer-Encoding: quoted-printable

Hi Torsten,

=20

Best regards,

Don

Donald F. Coffin

Founder/CTO

=20

REMI Networks

22751 El Prado Suite 6216

Rancho Santa Margarita, CA  92688-3836

=20

Phone:      (949) 636-8571

Email:        <mailto:donald.coffin@reminetworks.com> =
donald.coffin@reminetworks.com

=20

From: Torsten Lodderstedt [mailto:torsten@lodderstedt.net]=20
Sent: Sunday, February 03, 2013 4:20 AM
To: Donald F Coffin
Cc: 'George Fletcher'; 'John Adkins'; 'Scott Crowder'; 'Dave Robin'; =
'John Teeter'; pmadsen@pingidentity.com; 'Edward Denson'; 'Marty Burns'; =
'Uday Verma'; 'Ray Perlner'; 'Anne Hendry'; 'Lynne Rodoni'; =
oauth@ietf.org
Subject: Re: [OAUTH-WG] draft-ietf-oauth-revocation-04

=20

Hi Donald,

Am 03.02.2013 12:57, schrieb Donald F Coffin:

<snip>=20

=20

[Don] A typical Third Party application built to use the ESPI Standard =
will interact with a Retail Customer and their energy provider.  The =
nature of interaction with the Retail Customer will utilize short =
interactive sessions.  However, the interaction with their energy =
provider will require the application obtain new energy information for =
the previous 24-hours once a day.  Therefore, I anticipate access_tokens =
will be granted for long periods of time as well as any supporting =
refresh_tokens.  Because of the amount of data being exchanged between =
the Third Party application and the energy provider, both in number of =
retail customers and the amount of energy meter data, it will be =
necessary to minimize the amount of =E2=80=9Cadministrative=E2=80=9D =
traffic required in the exchange.  Therefore, although I understand the =
use case you described, I anticipate such an implementation would be =
rare. =20

=20

The need to perform an audience style check to prevent exposure of the =
AS to a denial of service attack, appears primarily due to the fact the =
Revocation RFC requires an access_token and refresh_token to be revoked =
independently.  Should a client need to revoke both Tokens the sequence =
of the revocation request is extremely significant.  A simple solution =
to this problem would be to provide a method that allows a request to =
revoke both tokens simultaneously, as stated in one of the responses you =
referenced in the archives. =20

=20

The example you gave in your response demonstrating how a denial of =
service attack might occur is incorrect.  You said =E2=80=9Cif the AS =
revokes the refresh_token when an access_token is revoked, I can steal =
an access_token and send it to the revocation endpoint causing the real =
client=E2=80=99s refresh_token to be revoked=E2=80=9D.  I fail to see =
how that could occur, since the AS revoked both the access_token and the =
refresh_token when it received the request to revoke the access_token.  =
Rather than explaining why a refresh_token shouldn=E2=80=99t be revoked =
concurrently when an access_token is revoked, your example does the =
exact opposite.  It shows why a refresh_token should be revoked =
concurrently when an access_token is revoked.

=20

[Don] The focus of the ESPI Standard is to provide Retail =
Customer=E2=80=99s with access to a single UsagePoint (i.e. their Smart =
Meter).  Therefore an access and refresh token will be tightly =
correlated with the type and frequency of data the Smart Meter provides. =
 There are only a few reasons defined within the ESPI Standard list of =
use cases that will require the Token Revocation request to be issued.  =
The following summarizes the situations that require a Token Revocation =
request:

=C2=B7         A Third Party application wishes to terminate their =
relationship with a Retail Customer.

=C2=B7         A Third Party application wishes to terminate their =
relationship with a Data Custodian.

=C2=B7         A Retail Customer wishes to terminate their relationship =
with a Third Party application.

=C2=B7         A Retail Customer wishes to change the data (i.e. scope) =
a Third Party application has permission to access.

In none of the above situations will it be valid to retain a refresh =
token, which I realize is implementation dependent, due to the nature of =
the ESPI Standard.

Perhaps the section on the Server=E2=80=99s Revocation Policy should =
address a few of the reasons why a client may want or need to revoke a =
token.  The current description provides no consideration for the =
relationship between tokens and scope, although there clearly is a =
relationship.

I'm confident client or resource owner would revoke refresh (and not =
access) tokens in all use cases you listed above. In my opinion, access =
tokens are revoked only if the authorization server does not support =
refresh tokens and therefore uses long term access tokens or in =
high-security applications.

=20

[Don] Based on the above statement it would appear you assume an access =
token is only valid for a short period of time.  However, as I explained =
in my last response, due to the nature of the access required by the =
client and the manner in which the RS provides that data, access token =
durations will typically be in days not minutes.   Therefore, merely =
revoking a refresh_token will expose the data to access that the =
resource owner meant to prevent unless the access_token is also revoked.


I don't understand why access tokens need such a long duration in your =
scenario, even if the client needs to obtain energy data once a day. Any =
client can (potentially) obtain a new access token at any time if the =
access token expires if the authorization server issues corresponding =
refresh tokens. So even in your scenario, access tokens could have a =
short duration. If you want to issue long-living access tokens in order =
to minimize load on the authorization servers, then you have to consider =
the extra complexitity and load required to notify resource servers of =
access token revocation. It's a tradeoff decision, which we tried to =
describe in =
http://tools.ietf.org/html/draft-ietf-oauth-revocation-04#section-3.=20



=20

[Don] A critical fact I omitted in my last response is the data obtained =
on a daily basis by a Third Party application will utilize an =
access_token obtained using the client_credentials grant_type.  =
Therefore no refresh_token will be issued with the access_token.  The =
ESPI Standard requires the Retail Customer (resource owner) and the RS =
to be notified whenever an authorization is modified or revoked by =
either the Third Party (client) or Retail Customer (resource owner).  =
Therefore, the tradeoff decision has already been made.

=20

I personally feel that short lived access_tokens provide greater =
security, but in discussions with several utilities who have the =
responsibility of supporting the AS and RS functionality, they currently =
are planning on implementing long duration access_tokens.  This view may =
change once the begin to implement =E2=80=9CConnect My Data=E2=80=9D =
solutions, but that again is an implementation feature, which is beyond =
the scope of my groups current work product.



=20

I would also like to hear the opinion of other WG members on this topic.

=20

3. If the standard OAuth spec does not provide enough control, your =
profile of OAuth2 for the ESPI can tighten it to provide the protections =
desired.

[Don] I am aware we can provide additional parameters required to =
integrate OAuth 2.0 with the ESPI Standard by submitting those parameter =
values to the OAuth Parameters registry. I would prefer not to do that, =
given the large amount of work being done on RFC-drafts to resolve many =
of the issues we are facing to integrate OAuth 2.0 with the ESPI =
Standard, since the need to use those extensions will most likely be =
short lived.

=20

Hmmm, if the need is only short lived, why do you want to make it part =
of the long living revocation RFC?

=20

[Don] My response was to the suggestion that if the OAuth specification =
does not provide enough control then the ESPI profile of OAuth 2.0 could =
tighten it to provide the protections desired.  I assumed George meant =
we could add additional =E2=80=9Ccompany=E2=80=9D based parameters, =
which requires us to register them with the =E2=80=9COAuth Parameter =
Registry=E2=80=9D.  I meant the usage of such =E2=80=9Ccompany=E2=80=9D =
parameters would be short termed.


Understood.




I do not view the need to identify the type of token being revoked as =
=E2=80=9Cshort term=E2=80=9D.  Even the previous exchanges on the topic =
within the WG indicates it feels there may be a need to add an =
additional parameter to the request.  However, because the draft is too =
far along, the WG seems to prefer releasing an RFC they =
=E2=80=9Csuspect=E2=80=9D will need to be adjusted and let the =
implementers confirm their suspicions.   This seems to be a very selfish =
and rather foolish attitude given we are discussing a security protocol. =
 Not to mention it would seem easier and faster to add an additional =
=E2=80=9Coptional=E2=80=9D parameter now, rather than requiring another =
RFC cycle.  A parameter I sensed in reading the archives the WG feels =
will very likely need to be added in the future.


Since this is a WG item, it is up to the WG to decide.

=20

[Don] I fully understand it is the WG=E2=80=99s decision.  I am only =
providing my opinion as an implementer, who the WG desires to obtain =
feedback from before making the final decision.



regards,
Torsten.









Thanks,
George

On 1/29/13 3:28 PM, Donald F Coffin wrote:

Hi Thorsten,

=20

I am working with the OpenADE Task Force to document how the =
=E2=80=9CEnergy Service Provider Interface (ESPI) Standard =E2=80=9D =
published by the North American Energy Standards Board (NAESB) in =
October of 2011 should be implemented.  The ESPI Standard defines how =
Retail Customers, Third Party applications, and Data Custodians (i.e. =
electrical, gas, or water utility) must interface to each other and the =
data format used to exchange energy information.   The interface between =
the Retail Customer and the Data Custodian is known as =E2=80=9CDownload =
My Data=E2=80=9D, which defines how a Retail Customer receives their =
energy information in an XML file downloaded to them by the Data =
Custodian.  The interface between the Third Party application and the =
Data Custodian is known as =E2=80=9CConnect My Data=E2=80=9D, which =
defines the message exchanges between the Third Party application and =
the Data Custodian to allow the Third Party to access data at the Data =
Custodian after a Retail Customer has granted the Third Party =
application access.

=20

It is my responsibility within the OpenADE Task Force to document the =
integration of the OAuth 2.0 protocol with the ESPI Standard.  Since the =
ESPI Standard requires Retail Customers, Third Party applications, and =
Data Custodians to revoke Tokens (i.e. Access and Refresh Tokens) I am =
very interested in the =E2=80=9CToken Revocation =
(draft-ietf-oath-revocation-xx)=E2=80=9D work being done by you and your =
working group.=20

=20

Token Revocation Request

=20

The Token Revocation request has only the =E2=80=9Ctoken=E2=80=9D =
parameter with the description that the authorization server is supposed =
to detect the token type automatically.  I would like to request that an =
addition parameter =E2=80=9Ctoken_type=E2=80=9D be added to the request. =
 The =E2=80=9Ctoken_type=E2=80=9D parameter could be optional and would =
define the type of token being revoked (i.e. =E2=80=9Caccess=E2=80=9D, =
=E2=80=9Crefresh=E2=80=9D, =E2=80=9Cregistration access=E2=80=9D, etc.).

=20

The ESPI Standard was developed to support the Advanced Meter Interface =
(AMI) which is the interface used by =E2=80=9CSmart Meters=E2=80=9D to =
provide automated energy usage collection and other operational =
information about a Retail Customer=E2=80=99s residence to their Data =
Custodian.  Third Party applications will be required to obtain the =
approval if each Retail Customer that has had a =E2=80=9CSmart =
Meter=E2=80=9D installed before they will be able to access the data =
provided by their =E2=80=9CSmart Meter=E2=80=9D.  The number of =
=E2=80=9CSmart Meters=E2=80=9D currently installed at the three largest =
California utilities (Pacific Gas & Electric, Southern California =
Edison, and San Diego Gas & Electric) is in excess of 10.0 M and =
growing.  The following table indicates the number of =E2=80=9CSmart =
Meters=E2=80=9D each of the three utilities had installed as of May =
2012:

=20


Utility

=E2=80=9CSmart Meters=E2=80=9D Installed


Pacific Gas & Electric (PG&E)

4,696,000


San Diego Gas & Electric (SDG&E)

1,364,000


Southern California Edison (SCE)

3,900,000

=20

The numbers in the chart were taken from the =E2=80=9CUtility-Scale =
Smart Meter Deployments, Plans, & Proposals -- IEE Report=E2=80=9D =
published May 2012 by The Edison Foundation Institute for Electric =
Efficiency=E2=80=9D which I have attached.  The number of =E2=80=9CSmart =
Meters=E2=80=9D currently installed are even larger than shown in the =
report as I compose this email.  Assuming 10% of Pacific Gas & =
Electric=E2=80=99s Retail Customers decide to utilize a Third Party =
application (3 Third Party applications are currently supported and are =
3 more Third Party applications are preparing to be supported) in order =
to support the ability to revoke a token they would be required to track =
500,000 access tokens and 500,000 refresh tokens.  Requiring =
PG&E=E2=80=99s authorization server to =E2=80=9Cautomatically=E2=80=9D =
determine the type of Token being revoked begins to negatively impact =
their processing capability.  If the Token Revocation request was =
capable of indicating the type of Token to be revoked, the amount of =
time it will take PG&E=E2=80=99s authorization server would show a =
significant time savings to process the request.

=20

Authorization Server Revocation Policy

=20

=20

      6.       Does the revocation of the access token also revoke the =
refresh token (if it was provided) ? Or is this a revocation policy =
decision ?

=20

- if the token passed to the request is a refresh token and the server =
supports access token revocation, the server SHOULD also revoke them.
- if the token passed to the request is an access token, the server may =
decide to revoke the respective refresh token as well.

=20

I believe that if the token passed in the request is an access token, =
the server MUST revoke any respective refresh token.  Otherwise, their =
exist a potential security risk of the respective refresh token being =
used to gain access to the resources for which the access token was =
issued.  It also means the authorization server will have potential =
=E2=80=9Cjunk=E2=80=9D in the refresh token file to search through for =
any additional Token Revocation request.

=20

I look forward to receiving your response.

=20

Best regards,

Don

Donald F. Coffin

Founder/CTO

=20

REMI Networks

22751 El Prado Suite 6216

Rancho Santa Margarita, CA  92688-3836

=20

Phone:      (949) 636-8571

Email:       donald.coffin@reminetworks.com

=20








_______________________________________________
OAuth mailing list
OAuth@ietf.org
https://www.ietf.org/mailman/listinfo/oauth

=20

=20


------=_NextPart_000_003F_01CE020C.5A780040
Content-Type: text/html;
	charset="UTF-8"
Content-Transfer-Encoding: quoted-printable

<html xmlns:v=3D"urn:schemas-microsoft-com:vml" =
xmlns:o=3D"urn:schemas-microsoft-com:office:office" =
xmlns:w=3D"urn:schemas-microsoft-com:office:word" =
xmlns:m=3D"http://schemas.microsoft.com/office/2004/12/omml" =
xmlns=3D"http://www.w3.org/TR/REC-html40"><head><meta =
http-equiv=3DContent-Type content=3D"text/html; charset=3Dutf-8"><meta =
name=3DGenerator content=3D"Microsoft Word 14 (filtered =
medium)"><style><!--
/* Font Definitions */
@font-face
	{font-family:Helvetica;
	panose-1:2 11 6 4 2 2 2 2 2 4;}
@font-face
	{font-family:Wingdings;
	panose-1:5 0 0 0 0 0 0 0 0 0;}
@font-face
	{font-family:"Cambria Math";
	panose-1:2 4 5 3 5 4 6 3 2 4;}
@font-face
	{font-family:Cambria;
	panose-1:2 4 5 3 5 4 6 3 2 4;}
@font-face
	{font-family:Calibri;
	panose-1:2 15 5 2 2 2 4 3 2 4;}
@font-face
	{font-family:Tahoma;
	panose-1:2 11 6 4 3 5 4 4 2 4;}
@font-face
	{font-family:"Brush Script MT";
	panose-1:3 6 8 2 4 4 6 7 3 4;}
@font-face
	{font-family:Consolas;
	panose-1:2 11 6 9 2 2 4 3 2 4;}
@font-face
	{font-family:"Times New Roman \, serif";}
/* Style Definitions */
p.MsoNormal, li.MsoNormal, div.MsoNormal
	{margin:0in;
	margin-bottom:.0001pt;
	font-size:11.0pt;
	font-family:"Calibri","sans-serif";
	color:black;}
a:link, span.MsoHyperlink
	{mso-style-priority:99;
	color:blue;
	text-decoration:underline;}
a:visited, span.MsoHyperlinkFollowed
	{mso-style-priority:99;
	color:purple;
	text-decoration:underline;}
pre
	{mso-style-priority:99;
	mso-style-link:"HTML Preformatted Char";
	margin:0in;
	margin-bottom:.0001pt;
	font-size:10.0pt;
	font-family:"Courier New";
	color:black;}
p.MsoAcetate, li.MsoAcetate, div.MsoAcetate
	{mso-style-priority:99;
	mso-style-link:"Balloon Text Char";
	margin:0in;
	margin-bottom:.0001pt;
	font-size:8.0pt;
	font-family:"Tahoma","sans-serif";
	color:black;}
p.MsoListParagraph, li.MsoListParagraph, div.MsoListParagraph
	{mso-style-priority:34;
	margin-top:0in;
	margin-right:0in;
	margin-bottom:0in;
	margin-left:.5in;
	margin-bottom:.0001pt;
	font-size:11.0pt;
	font-family:"Calibri","sans-serif";
	color:black;}
span.HTMLPreformattedChar
	{mso-style-name:"HTML Preformatted Char";
	mso-style-priority:99;
	mso-style-link:"HTML Preformatted";
	font-family:Consolas;
	color:black;}
span.BalloonTextChar
	{mso-style-name:"Balloon Text Char";
	mso-style-priority:99;
	mso-style-link:"Balloon Text";
	font-family:"Tahoma","sans-serif";
	color:black;}
span.EmailStyle22
	{mso-style-type:personal;
	font-family:"Cambria","serif";
	color:windowtext;}
span.EmailStyle23
	{mso-style-type:personal;
	font-family:"Cambria","serif";
	color:windowtext;
	font-weight:normal;
	font-style:normal;}
span.EmailStyle24
	{mso-style-type:personal;
	font-family:"Cambria","serif";
	color:windowtext;
	font-weight:normal;
	font-style:normal;}
span.EmailStyle25
	{mso-style-type:personal-reply;
	font-family:"Cambria","serif";
	color:windowtext;
	font-weight:normal;
	font-style:normal;}
.MsoChpDefault
	{mso-style-type:export-only;
	font-size:10.0pt;}
@page WordSection1
	{size:8.5in 11.0in;
	margin:1.0in 1.0in 1.0in 1.0in;}
div.WordSection1
	{page:WordSection1;}
/* List Definitions */
@list l0
	{mso-list-id:217783835;
	mso-list-type:hybrid;
	mso-list-template-ids:1090914056 67698689 67698691 67698693 67698689 =
67698691 67698693 67698689 67698691 67698693;}
@list l0:level1
	{mso-level-number-format:bullet;
	mso-level-text:=EF=82=B7;
	mso-level-tab-stop:none;
	mso-level-number-position:left;
	margin-left:.75in;
	text-indent:-.25in;
	font-family:Symbol;}
@list l0:level2
	{mso-level-number-format:bullet;
	mso-level-text:o;
	mso-level-tab-stop:none;
	mso-level-number-position:left;
	margin-left:1.25in;
	text-indent:-.25in;
	font-family:"Courier New";}
@list l0:level3
	{mso-level-number-format:bullet;
	mso-level-text:=EF=82=A7;
	mso-level-tab-stop:none;
	mso-level-number-position:left;
	margin-left:1.75in;
	text-indent:-.25in;
	font-family:Wingdings;}
@list l0:level4
	{mso-level-number-format:bullet;
	mso-level-text:=EF=82=B7;
	mso-level-tab-stop:none;
	mso-level-number-position:left;
	margin-left:2.25in;
	text-indent:-.25in;
	font-family:Symbol;}
@list l0:level5
	{mso-level-number-format:bullet;
	mso-level-text:o;
	mso-level-tab-stop:none;
	mso-level-number-position:left;
	margin-left:2.75in;
	text-indent:-.25in;
	font-family:"Courier New";}
@list l0:level6
	{mso-level-number-format:bullet;
	mso-level-text:=EF=82=A7;
	mso-level-tab-stop:none;
	mso-level-number-position:left;
	margin-left:3.25in;
	text-indent:-.25in;
	font-family:Wingdings;}
@list l0:level7
	{mso-level-number-format:bullet;
	mso-level-text:=EF=82=B7;
	mso-level-tab-stop:none;
	mso-level-number-position:left;
	margin-left:3.75in;
	text-indent:-.25in;
	font-family:Symbol;}
@list l0:level8
	{mso-level-number-format:bullet;
	mso-level-text:o;
	mso-level-tab-stop:none;
	mso-level-number-position:left;
	margin-left:4.25in;
	text-indent:-.25in;
	font-family:"Courier New";}
@list l0:level9
	{mso-level-number-format:bullet;
	mso-level-text:=EF=82=A7;
	mso-level-tab-stop:none;
	mso-level-number-position:left;
	margin-left:4.75in;
	text-indent:-.25in;
	font-family:Wingdings;}
ol
	{margin-bottom:0in;}
ul
	{margin-bottom:0in;}
--></style><!--[if gte mso 9]><xml>
<o:shapedefaults v:ext=3D"edit" spidmax=3D"1026" />
</xml><![endif]--><!--[if gte mso 9]><xml>
<o:shapelayout v:ext=3D"edit">
<o:idmap v:ext=3D"edit" data=3D"1" />
</o:shapelayout></xml><![endif]--></head><body bgcolor=3Dwhite =
lang=3DEN-US link=3Dblue vlink=3Dpurple><div class=3DWordSection1><p =
class=3DMsoNormal><span =
style=3D'font-size:12.0pt;font-family:"Cambria","serif";color:windowtext'=
>Hi Torsten,<o:p></o:p></span></p><p class=3DMsoNormal><span =
style=3D'font-size:12.0pt;font-family:"Cambria","serif";color:windowtext'=
><o:p>&nbsp;</o:p></span></p><div><p class=3DMsoNormal><span =
style=3D'font-size:12.0pt;color:windowtext'>Best =
regards,<o:p></o:p></span></p><p class=3DMsoNormal><span =
style=3D'font-size:24.0pt;font-family:"Brush Script =
MT";color:windowtext'>Don<o:p></o:p></span></p><p =
class=3DMsoNormal><span =
style=3D'font-size:12.0pt;color:windowtext'>Donald F. =
Coffin<o:p></o:p></span></p><p class=3DMsoNormal><span =
style=3D'font-size:12.0pt;color:windowtext'>Founder/CTO<o:p></o:p></span>=
</p><p class=3DMsoNormal><span =
style=3D'font-size:12.0pt;color:windowtext'><o:p>&nbsp;</o:p></span></p><=
p class=3DMsoNormal><span =
style=3D'font-size:12.0pt;color:windowtext'>REMI =
Networks<o:p></o:p></span></p><p class=3DMsoNormal><span =
style=3D'font-size:12.0pt;color:windowtext'>22751 El Prado Suite =
6216<o:p></o:p></span></p><p class=3DMsoNormal><span =
style=3D'font-size:12.0pt;color:windowtext'>Rancho Santa Margarita, =
CA=C2=A0 92688-3836<o:p></o:p></span></p><p class=3DMsoNormal><span =
style=3D'font-size:12.0pt;color:windowtext'><o:p>&nbsp;</o:p></span></p><=
p class=3DMsoNormal><span =
style=3D'font-size:12.0pt;color:windowtext'>Phone:=C2=A0=C2=A0=C2=A0=C2=A0=
=C2=A0 (949) 636-8571<o:p></o:p></span></p><p class=3DMsoNormal><span =
style=3D'font-size:12.0pt;color:windowtext'>Email:=C2=A0=C2=A0=C2=A0=C2=A0=
=C2=A0=C2=A0 <a href=3D"mailto:donald.coffin@reminetworks.com"><span =
style=3D'color:blue'>donald.coffin@reminetworks.com</span></a><o:p></o:p>=
</span></p></div><p class=3DMsoNormal><span =
style=3D'font-size:12.0pt;font-family:"Cambria","serif";color:windowtext'=
><o:p>&nbsp;</o:p></span></p><div><div =
style=3D'border:none;border-top:solid #B5C4DF 1.0pt;padding:3.0pt 0in =
0in 0in'><p class=3DMsoNormal><b><span =
style=3D'font-size:10.0pt;font-family:"Tahoma","sans-serif";color:windowt=
ext'>From:</span></b><span =
style=3D'font-size:10.0pt;font-family:"Tahoma","sans-serif";color:windowt=
ext'> Torsten Lodderstedt [mailto:torsten@lodderstedt.net] =
<br><b>Sent:</b> Sunday, February 03, 2013 4:20 AM<br><b>To:</b> Donald =
F Coffin<br><b>Cc:</b> 'George Fletcher'; 'John Adkins'; 'Scott =
Crowder'; 'Dave Robin'; 'John Teeter'; pmadsen@pingidentity.com; 'Edward =
Denson'; 'Marty Burns'; 'Uday Verma'; 'Ray Perlner'; 'Anne Hendry'; =
'Lynne Rodoni'; oauth@ietf.org<br><b>Subject:</b> Re: [OAUTH-WG] =
draft-ietf-oauth-revocation-04<o:p></o:p></span></p></div></div><p =
class=3DMsoNormal><o:p>&nbsp;</o:p></p><p class=3DMsoNormal =
style=3D'margin-bottom:12.0pt'>Hi Donald,<o:p></o:p></p><div><p =
class=3DMsoNormal>Am 03.02.2013 12:57, schrieb Donald F =
Coffin:<o:p></o:p></p></div><blockquote =
style=3D'margin-top:5.0pt;margin-bottom:5.0pt'><p =
class=3DMsoNormal><span style=3D'font-size:12.0pt;font-family:"Times New =
Roman","serif"'>&lt;snip&gt; <o:p></o:p></span></p><div><p =
class=3DMsoNormal><span =
style=3D'font-size:12.0pt;font-family:"Cambria","serif";color:windowtext'=
>&nbsp;</span><o:p></o:p></p><p class=3DMsoNormal =
style=3D'margin-left:.5in;text-indent:-.5in'><span =
style=3D'font-size:12.0pt;font-family:"Cambria","serif";color:windowtext'=
>[Don] A typical Third Party application built to use the ESPI Standard =
will interact with a Retail Customer and their energy provider.&nbsp; =
The nature of interaction with the Retail Customer will utilize short =
interactive sessions.&nbsp; However, the interaction with their energy =
provider will require the application obtain new energy information for =
the previous 24-hours once a day.&nbsp; Therefore, I anticipate =
access_tokens will be granted for long periods of time as well as any =
supporting refresh_tokens.&nbsp; Because of the amount of data being =
exchanged between the Third Party application and the energy provider, =
both in number of retail customers and the amount of energy meter data, =
it will be necessary to minimize the amount of =
=E2=80=9Cadministrative=E2=80=9D traffic required in the exchange.&nbsp; =
Therefore, although I understand the use case you described, I =
anticipate such an implementation would be rare.&nbsp; =
</span><o:p></o:p></p><p class=3DMsoNormal =
style=3D'margin-left:.5in;text-indent:-.5in'><span =
style=3D'font-size:12.0pt;font-family:"Cambria","serif";color:windowtext'=
>&nbsp;</span><o:p></o:p></p><p class=3DMsoNormal =
style=3D'margin-left:.5in'><span =
style=3D'font-size:12.0pt;font-family:"Cambria","serif";color:windowtext'=
>The need to perform an audience style check to prevent exposure of the =
AS to a denial of service attack, appears primarily due to the fact the =
Revocation RFC requires an access_token and refresh_token to be revoked =
independently.&nbsp; Should a client need to revoke both Tokens the =
sequence of the revocation request is extremely significant.&nbsp; A =
simple solution to this problem would be to provide a method that allows =
a request to revoke both tokens simultaneously, as stated in one of the =
responses you referenced in the archives.&nbsp; </span><o:p></o:p></p><p =
class=3DMsoNormal style=3D'margin-left:.5in'><span =
style=3D'font-size:12.0pt;font-family:"Cambria","serif";color:windowtext'=
>&nbsp;</span><o:p></o:p></p><p class=3DMsoNormal =
style=3D'margin-left:.5in'><span =
style=3D'font-size:12.0pt;font-family:"Cambria","serif";color:windowtext'=
>The example you gave in your response demonstrating how a denial of =
service attack might occur is incorrect.&nbsp; You said =E2=80=9Cif the =
AS revokes the refresh_token when an access_token is revoked, I can =
steal an access_token and send it to the revocation endpoint causing the =
real client=E2=80=99s refresh_token to be revoked=E2=80=9D.&nbsp; I fail =
to see how that could occur, since the AS revoked both the access_token =
and the refresh_token when it received the request to revoke the =
access_token.&nbsp; Rather than explaining why a refresh_token =
shouldn=E2=80=99t be revoked concurrently when an access_token is =
revoked, your example does the exact opposite.&nbsp; It shows why a =
refresh_token should be revoked concurrently when an access_token is =
revoked.</span><o:p></o:p></p><p class=3DMsoNormal><span =
style=3D'font-size:12.0pt;font-family:"Cambria","serif";color:windowtext'=
>&nbsp;</span><o:p></o:p></p><p class=3DMsoNormal =
style=3D'mso-margin-top-alt:0in;margin-right:0in;margin-bottom:12.0pt;mar=
gin-left:.5in;text-indent:-.5in'><span =
style=3D'font-size:12.0pt;font-family:"Cambria","serif";color:#0070C0'>[D=
on] The focus of the <b>ESPI Standard</b> is to provide Retail =
Customer=E2=80=99s with access to a single UsagePoint (i.e. their Smart =
Meter).&nbsp; Therefore an access and refresh token will be tightly =
correlated with the type and frequency of data the Smart Meter =
provides.&nbsp; There are only a few reasons defined within the <b>ESPI =
Standard</b> list of use cases that will require the <b>Token =
Revocation</b> request to be issued.&nbsp; The following summarizes the =
situations that require a <b>Token Revocation =
</b>request:</span><o:p></o:p></p><p class=3DMsoListParagraph =
style=3D'mso-margin-top-alt:0in;margin-right:0in;margin-bottom:12.0pt;mar=
gin-left:.75in;text-indent:-.25in;mso-list:l0 level1 lfo2'><![if =
!supportLists]><span style=3D'font-family:Symbol'><span =
style=3D'mso-list:Ignore'>=C2=B7<span style=3D'font:7.0pt "Times New =
Roman"'>&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp; =
</span></span></span><![endif]><span =
style=3D'font-size:12.0pt;font-family:"Cambria","serif";color:#0070C0'>A =
Third Party application wishes to terminate their relationship with a =
Retail Customer.</span><o:p></o:p></p><p class=3DMsoListParagraph =
style=3D'mso-margin-top-alt:0in;margin-right:0in;margin-bottom:12.0pt;mar=
gin-left:.75in;text-indent:-.25in;mso-list:l0 level1 lfo2'><![if =
!supportLists]><span style=3D'font-family:Symbol'><span =
style=3D'mso-list:Ignore'>=C2=B7<span style=3D'font:7.0pt "Times New =
Roman"'>&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp; =
</span></span></span><![endif]><span =
style=3D'font-size:12.0pt;font-family:"Cambria","serif";color:#0070C0'>A =
Third Party application wishes to terminate their relationship with a =
Data Custodian.</span><o:p></o:p></p><p class=3DMsoListParagraph =
style=3D'mso-margin-top-alt:0in;margin-right:0in;margin-bottom:12.0pt;mar=
gin-left:.75in;text-indent:-.25in;mso-list:l0 level1 lfo2'><![if =
!supportLists]><span style=3D'font-family:Symbol'><span =
style=3D'mso-list:Ignore'>=C2=B7<span style=3D'font:7.0pt "Times New =
Roman"'>&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp; =
</span></span></span><![endif]><span =
style=3D'font-size:12.0pt;font-family:"Cambria","serif";color:#0070C0'>A =
Retail Customer wishes to terminate their relationship with a Third =
Party application.</span><o:p></o:p></p><p class=3DMsoListParagraph =
style=3D'mso-margin-top-alt:0in;margin-right:0in;margin-bottom:12.0pt;mar=
gin-left:.75in;text-indent:-.25in;mso-list:l0 level1 lfo2'><![if =
!supportLists]><span style=3D'font-family:Symbol'><span =
style=3D'mso-list:Ignore'>=C2=B7<span style=3D'font:7.0pt "Times New =
Roman"'>&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp; =
</span></span></span><![endif]><span =
style=3D'font-size:12.0pt;font-family:"Cambria","serif";color:#0070C0'>A =
Retail Customer wishes to change the data (i.e. scope) a Third Party =
application has permission to access.</span><o:p></o:p></p><p =
class=3DMsoNormal =
style=3D'mso-margin-top-alt:0in;margin-right:0in;margin-bottom:12.0pt;mar=
gin-left:.5in'><span =
style=3D'font-size:12.0pt;font-family:"Cambria","serif";color:#0070C0'>In=
 none of the above situations will it be valid to retain a refresh =
token, which I realize is implementation dependent, due to the nature of =
the <b>ESPI Standard.</b></span><o:p></o:p></p><p class=3DMsoNormal =
style=3D'mso-margin-top-alt:0in;margin-right:0in;margin-bottom:12.0pt;mar=
gin-left:.5in'><span =
style=3D'font-size:12.0pt;font-family:"Cambria","serif";color:#0070C0'>Pe=
rhaps the section on the <b>Server=E2=80=99s Revocation Policy</b> =
should address a few of the reasons why a client may want or need to =
revoke a token.&nbsp; The current description provides no consideration =
for the relationship between tokens and scope, although there clearly is =
a relationship.</span><o:p></o:p></p></div><div><p =
class=3DMsoNormal><span style=3D'font-size:12.0pt'>I'm confident client =
or resource owner would revoke refresh (and not access) tokens in all =
use cases you listed above. In my opinion, access tokens are revoked =
only if the authorization server does not support refresh tokens and =
therefore uses long term access tokens or in high-security =
applications.</span><o:p></o:p></p><p class=3DMsoNormal><span =
style=3D'font-size:12.0pt;font-family:"Cambria","serif";color:windowtext'=
>&nbsp;</span><o:p></o:p></p><p class=3DMsoNormal =
style=3D'margin-left:.5in;text-indent:-.5in'><span =
style=3D'font-size:12.0pt;font-family:"Cambria","serif";color:windowtext'=
>[Don] Based on the above statement it would appear you assume an access =
token is only valid for a short period of time.&nbsp; However, as I =
explained in my last response, due to the nature of the access required =
by the client and the manner in which the RS provides that data, access =
token durations will typically be in days not minutes. =
&nbsp;&nbsp;Therefore, merely revoking a refresh_token will expose the =
data to access that the resource owner meant to prevent unless the =
access_token is also revoked.</span><o:p></o:p></p></div></blockquote><p =
class=3DMsoNormal style=3D'margin-left:.5in;text-indent:-.5in'><span =
style=3D'font-size:12.0pt;font-family:"Times New Roman","serif"'><br>I =
don't understand why access tokens need such a long duration in your =
scenario, even if the client needs to obtain energy data once a day. Any =
client can (potentially) obtain a new access token at any time if the =
access token expires if the authorization server issues corresponding =
refresh tokens. So even in your scenario, access tokens could have a =
short duration. If you want to issue long-living access tokens in order =
to minimize load on the authorization servers, then you have to consider =
the extra complexitity and load required to notify resource servers of =
access token revocation. It's a tradeoff decision, which we tried to =
describe in <a =
href=3D"http://tools.ietf.org/html/draft-ietf-oauth-revocation-04#section=
-3">http://tools.ietf.org/html/draft-ietf-oauth-revocation-04#section-3</=
a>. <br><br></span><span style=3D'font-size:12.0pt;font-family:"Times =
New Roman","serif";color:windowtext'><o:p></o:p></span></p><p =
class=3DMsoNormal><span =
style=3D'font-size:12.0pt;font-family:"Cambria","serif";color:windowtext'=
><o:p>&nbsp;</o:p></span></p><p class=3DMsoNormal =
style=3D'margin-left:.5in;text-indent:-.5in'><span =
style=3D'font-size:12.0pt;font-family:"Times New =
Roman","serif";color:windowtext'>[Don] A critical fact I omitted in my =
last response is the data obtained on a daily basis by a Third Party =
application will utilize an access_token obtained using the =
client_credentials grant_type.=C2=A0 Therefore no refresh_token will be =
issued with the access_token.=C2=A0 The ESPI Standard requires the =
Retail Customer (resource owner) and the RS to be notified whenever an =
authorization is modified or revoked by either the Third Party (client) =
or Retail Customer (resource owner).=C2=A0 Therefore, the tradeoff =
decision has already been made.<o:p></o:p></span></p><p =
class=3DMsoNormal style=3D'margin-left:.5in;text-indent:-.5in'><span =
style=3D'font-size:12.0pt;font-family:"Times New =
Roman","serif";color:windowtext'><o:p>&nbsp;</o:p></span></p><p =
class=3DMsoNormal style=3D'margin-left:.5in'><span =
style=3D'font-size:12.0pt;font-family:"Times New =
Roman","serif";color:windowtext'>I personally feel that short lived =
access_tokens provide greater security, but in discussions with several =
utilities who have the responsibility of supporting the AS and RS =
functionality, they currently are planning on implementing long duration =
access_tokens.=C2=A0 This view may change once the begin to implement =
=E2=80=9CConnect My Data=E2=80=9D solutions, but that again is an =
implementation feature, which is beyond the scope of my groups current =
work product.</span><span style=3D'font-size:12.0pt;font-family:"Times =
New Roman","serif"'><br><br><o:p></o:p></span></p><div><p =
class=3DMsoNormal><span =
style=3D'font-size:12.0pt'>&nbsp;</span><o:p></o:p></p></div><div><p =
class=3DMsoNormal><span style=3D'font-size:12.0pt'>I would also like to =
hear the opinion of other WG members on this =
topic.</span><o:p></o:p></p></div><div><p class=3DMsoNormal><span =
style=3D'font-size:12.0pt'>&nbsp;</span><o:p></o:p></p></div><blockquote =
style=3D'margin-top:5.0pt;margin-bottom:5.0pt'><div><p class=3DMsoNormal =
style=3D'margin-bottom:12.0pt'><span =
style=3D'font-family:"Helvetica","sans-serif"'>3. If the standard OAuth =
spec does not provide enough control, your profile of OAuth2 for the =
ESPI can tighten it to provide the protections =
desired.</span><o:p></o:p></p><p class=3DMsoNormal =
style=3D'mso-margin-top-alt:0in;margin-right:0in;margin-bottom:12.0pt;mar=
gin-left:.5in;text-indent:-.5in'><span =
style=3D'font-size:12.0pt;font-family:"Cambria","serif";color:#0070C0'>[D=
on] I am aware we can provide additional parameters required to =
integrate <b>OAuth 2.0 </b>with the <b>ESPI Standard</b> by submitting =
those parameter values to the <b>OAuth Parameters</b> registry. I would =
prefer not to do that, given the large amount of work being done on =
RFC-drafts to resolve many of the issues we are facing to integrate =
<b>OAuth 2.0</b> with the <b>ESPI Standard</b>, since the need to use =
those extensions will most likely be short =
lived.</span><o:p></o:p></p></div></blockquote><div><p =
class=3DMsoNormal><span =
style=3D'font-size:12.0pt'>&nbsp;</span><o:p></o:p></p></div><p =
class=3DMsoNormal><span style=3D'font-size:12.0pt'>Hmmm, if the need is =
only short lived, why do you want to make it part of the long living =
revocation RFC?</span><o:p></o:p></p><p class=3DMsoNormal><span =
style=3D'font-size:12.0pt;font-family:"Cambria","serif";color:windowtext'=
>&nbsp;</span><o:p></o:p></p><p class=3DMsoNormal =
style=3D'margin-left:.5in;text-indent:-.5in'><span =
style=3D'font-size:12.0pt;font-family:"Cambria","serif";color:windowtext'=
>[Don] My response was to the suggestion that if the OAuth specification =
does not provide enough control then the ESPI profile of OAuth 2.0 could =
tighten it to provide the protections desired.&nbsp; I assumed George =
meant we could add additional =E2=80=9Ccompany=E2=80=9D based =
parameters, which requires us to register them with the =E2=80=9COAuth =
Parameter Registry=E2=80=9D.&nbsp; I meant the usage of such =
=E2=80=9Ccompany=E2=80=9D parameters would be short =
termed.</span><o:p></o:p></p><p class=3DMsoNormal><span =
style=3D'font-size:12.0pt;font-family:"Times New =
Roman","serif"'><br>Understood.<br><br><br></span><o:p></o:p></p><p =
class=3DMsoNormal style=3D'margin-left:.5in'><span =
style=3D'font-size:12.0pt;font-family:"Cambria","serif";color:windowtext'=
>I do not view the need to identify the type of token being revoked as =
=E2=80=9Cshort term=E2=80=9D.&nbsp; Even the previous exchanges on the =
topic within the WG indicates it feels there may be a need to add an =
additional parameter to the request.&nbsp; However, because the draft is =
too far along, the WG seems to prefer releasing an RFC they =
=E2=80=9Csuspect=E2=80=9D will need to be adjusted and let the =
implementers confirm their suspicions.&nbsp;&nbsp; This seems to be a =
very selfish and rather foolish attitude given we are discussing a =
security protocol.&nbsp; Not to mention it would seem easier and faster =
to add an additional =E2=80=9Coptional=E2=80=9D parameter now, rather =
than requiring another RFC cycle. &nbsp;A parameter I sensed in reading =
the archives the WG feels will very likely need to be added in the =
future.</span><o:p></o:p></p><p class=3DMsoNormal><span =
style=3D'font-size:12.0pt;font-family:"Times New =
Roman","serif"'><br>Since this is a WG item, it is up to the WG to =
decide.</span><span style=3D'font-size:12.0pt;font-family:"Times New =
Roman","serif";color:windowtext'><o:p></o:p></span></p><p =
class=3DMsoNormal><span =
style=3D'font-size:12.0pt;font-family:"Cambria","serif";color:windowtext'=
><o:p>&nbsp;</o:p></span></p><p class=3DMsoNormal><span =
style=3D'font-size:12.0pt;font-family:"Cambria","serif";color:windowtext'=
>[Don] I fully understand it is the WG=E2=80=99s decision.=C2=A0 I am =
only providing my opinion as an implementer, who the WG desires to =
obtain feedback from before making the final =
decision.<o:p></o:p></span></p><p class=3DMsoNormal><span =
style=3D'font-size:12.0pt;font-family:"Times New =
Roman","serif"'><br><br>regards,<br>Torsten.<br><br><br><o:p></o:p></span=
></p><div><p class=3DMsoNormal><span =
style=3D'font-size:12.0pt'><br><br><br></span><o:p></o:p></p><div><p =
class=3DMsoNormal style=3D'margin-bottom:12.0pt'><span =
style=3D'font-family:"Helvetica","sans-serif"'>Thanks,<br>George</span><o=
:p></o:p></p><div><p class=3DMsoNormal>On 1/29/13 3:28 PM, Donald F =
Coffin wrote:<o:p></o:p></p></div><blockquote =
style=3D'margin-top:5.0pt;margin-bottom:5.0pt'><p =
class=3DMsoNormal><span =
style=3D'font-size:12.0pt;font-family:"Cambria","serif"'>Hi =
Thorsten,</span><o:p></o:p></p><p class=3DMsoNormal><span =
style=3D'font-size:12.0pt;font-family:"Cambria","serif"'>&nbsp;</span><o:=
p></o:p></p><p class=3DMsoNormal><span =
style=3D'font-size:12.0pt;font-family:"Cambria","serif"'>I am working =
with the OpenADE Task Force to document how the =E2=80=9C<b><i>Energy =
Service Provider Interface (ESPI) Standard</i></b> =E2=80=9D published =
by the <b>North American Energy Standards Board</b> (NAESB) in October =
of 2011 should be implemented.&nbsp; The <b>ESPI Standard</b> defines =
how Retail Customers, Third Party applications, and Data Custodians =
(i.e. electrical, gas, or water utility) must interface to each other =
and the data format used to exchange energy information.&nbsp; &nbsp;The =
interface between the Retail Customer and the Data Custodian is known as =
=E2=80=9C<b>Download My Data</b>=E2=80=9D, which defines how a Retail =
Customer receives their energy information in an XML file downloaded to =
them by the Data Custodian.&nbsp; The interface between the Third Party =
application and the Data Custodian is known as =E2=80=9C<b>Connect My =
Data</b>=E2=80=9D, which defines the message exchanges between the Third =
Party application and the Data Custodian to allow the Third Party to =
access data at the Data Custodian after a Retail Customer has granted =
the Third Party application access.</span><o:p></o:p></p><p =
class=3DMsoNormal><span =
style=3D'font-size:12.0pt;font-family:"Cambria","serif"'>&nbsp;</span><o:=
p></o:p></p><p class=3DMsoNormal><span =
style=3D'font-size:12.0pt;font-family:"Cambria","serif"'>It is my =
responsibility within the OpenADE Task Force to document the integration =
of the <b>OAuth 2.0</b> protocol with the <b>ESPI Standard.</b>&nbsp; =
Since the <b>ESPI Standard</b> requires Retail Customers, Third Party =
applications, and Data Custodians to revoke Tokens (i.e. Access and =
Refresh Tokens) I am very interested in the =E2=80=9C<b><i>Token =
Revocation (draft-ietf-oath-revocation-xx)</i></b>=E2=80=9D work being =
done by you and your working group. </span><o:p></o:p></p><p =
class=3DMsoNormal><span =
style=3D'font-size:12.0pt;font-family:"Cambria","serif"'>&nbsp;</span><o:=
p></o:p></p><p class=3DMsoNormal><b><u><span =
style=3D'font-size:12.0pt;font-family:"Cambria","serif"'>Token =
Revocation Request</span></u></b><o:p></o:p></p><p =
class=3DMsoNormal><span =
style=3D'font-size:12.0pt;font-family:"Cambria","serif"'>&nbsp;</span><o:=
p></o:p></p><p class=3DMsoNormal><span =
style=3D'font-size:12.0pt;font-family:"Cambria","serif"'>The <b>Token =
Revocation</b> request has only the =E2=80=9Ctoken=E2=80=9D parameter =
with the description that the authorization server is supposed to detect =
the token type automatically.&nbsp; I would like to request that an =
addition parameter =E2=80=9Ctoken_type=E2=80=9D be added to the =
request.&nbsp; The =E2=80=9Ctoken_type=E2=80=9D parameter could be =
optional and would define the type of token being revoked (i.e. =
=E2=80=9Caccess=E2=80=9D, =E2=80=9Crefresh=E2=80=9D, =
=E2=80=9Cregistration access=E2=80=9D, etc.).</span><o:p></o:p></p><p =
class=3DMsoNormal><span =
style=3D'font-size:12.0pt;font-family:"Cambria","serif"'>&nbsp;</span><o:=
p></o:p></p><p class=3DMsoNormal><span =
style=3D'font-size:12.0pt;font-family:"Cambria","serif"'>The <b>ESPI =
Standard</b> was developed to support the <b>Advanced Meter =
Interface</b> <b>(AMI) </b>which is the interface used by =E2=80=9CSmart =
Meters=E2=80=9D to provide automated energy usage collection and other =
operational information about a Retail Customer=E2=80=99s residence to =
their Data Custodian.&nbsp; Third Party applications will be required to =
obtain the approval if each Retail Customer that has had a =
=E2=80=9CSmart Meter=E2=80=9D installed before they will be able to =
access the data provided by their =E2=80=9CSmart Meter=E2=80=9D.&nbsp; =
The number of =E2=80=9CSmart Meters=E2=80=9D currently installed at the =
three largest California utilities (Pacific Gas &amp; Electric, Southern =
California Edison, and San Diego Gas &amp; Electric) is in excess of =
10.0 M and growing.&nbsp; The following table indicates the number of =
=E2=80=9CSmart Meters=E2=80=9D each of the three utilities had installed =
as of May 2012:</span><o:p></o:p></p><p class=3DMsoNormal><span =
style=3D'font-size:12.0pt;font-family:"Cambria","serif"'>&nbsp;</span><o:=
p></o:p></p><table class=3DMsoNormalTable border=3D0 cellspacing=3D0 =
cellpadding=3D0 =
style=3D'margin-left:66.2pt;border-collapse:collapse'><tr><td =
width=3D319 valign=3Dtop style=3D'width:239.4pt;border:solid windowtext =
1.0pt;background:#A6A6A6;padding:0in 5.4pt 0in 5.4pt'><p =
class=3DMsoNormal align=3Dcenter style=3D'text-align:center'><b><span =
style=3D'font-size:14.0pt;font-family:"Cambria","serif"'>Utility</span></=
b><o:p></o:p></p></td><td width=3D319 valign=3Dtop =
style=3D'width:239.4pt;border:solid windowtext =
1.0pt;border-left:none;background:#A6A6A6;padding:0in 5.4pt 0in =
5.4pt'><p class=3DMsoNormal align=3Dcenter =
style=3D'text-align:center'><b><span =
style=3D'font-size:14.0pt;font-family:"Cambria","serif"'>=E2=80=9CSmart =
Meters=E2=80=9D Installed</span></b><o:p></o:p></p></td></tr><tr><td =
width=3D319 valign=3Dtop style=3D'width:239.4pt;border:solid windowtext =
1.0pt;border-top:none;padding:0in 5.4pt 0in 5.4pt'><p =
class=3DMsoNormal><span =
style=3D'font-size:12.0pt;font-family:"Cambria","serif"'>Pacific Gas =
&amp; Electric (PG&amp;E)</span><o:p></o:p></p></td><td width=3D319 =
valign=3Dtop =
style=3D'width:239.4pt;border-top:none;border-left:none;border-bottom:sol=
id windowtext 1.0pt;border-right:solid windowtext 1.0pt;padding:0in =
5.4pt 0in 5.4pt'><p class=3DMsoNormal align=3Dright =
style=3D'text-align:right'><span =
style=3D'font-size:12.0pt;font-family:"Cambria","serif"'>4,696,000</span>=
<o:p></o:p></p></td></tr><tr><td width=3D319 valign=3Dtop =
style=3D'width:239.4pt;border:solid windowtext =
1.0pt;border-top:none;padding:0in 5.4pt 0in 5.4pt'><p =
class=3DMsoNormal><span =
style=3D'font-size:12.0pt;font-family:"Cambria","serif"'>San Diego Gas =
&amp; Electric (SDG&amp;E)</span><o:p></o:p></p></td><td width=3D319 =
valign=3Dtop =
style=3D'width:239.4pt;border-top:none;border-left:none;border-bottom:sol=
id windowtext 1.0pt;border-right:solid windowtext 1.0pt;padding:0in =
5.4pt 0in 5.4pt'><p class=3DMsoNormal align=3Dright =
style=3D'text-align:right'><span =
style=3D'font-size:12.0pt;font-family:"Cambria","serif"'>1,364,000</span>=
<o:p></o:p></p></td></tr><tr><td width=3D319 valign=3Dtop =
style=3D'width:239.4pt;border:solid windowtext =
1.0pt;border-top:none;padding:0in 5.4pt 0in 5.4pt'><p =
class=3DMsoNormal><span =
style=3D'font-size:12.0pt;font-family:"Cambria","serif"'>Southern =
California Edison (SCE)</span><o:p></o:p></p></td><td width=3D319 =
valign=3Dtop =
style=3D'width:239.4pt;border-top:none;border-left:none;border-bottom:sol=
id windowtext 1.0pt;border-right:solid windowtext 1.0pt;padding:0in =
5.4pt 0in 5.4pt'><p class=3DMsoNormal align=3Dright =
style=3D'text-align:right'><span =
style=3D'font-size:12.0pt;font-family:"Cambria","serif"'>3,900,000</span>=
<o:p></o:p></p></td></tr></table><p class=3DMsoNormal><span =
style=3D'font-size:12.0pt;font-family:"Cambria","serif"'>&nbsp;</span><o:=
p></o:p></p><p class=3DMsoNormal><span =
style=3D'font-size:12.0pt;font-family:"Cambria","serif"'>The numbers in =
the chart were taken from the =E2=80=9C<b><i>Utility-Scale Smart Meter =
Deployments, Plans, &amp; Proposals -- IEE Report</i></b>=E2=80=9D =
published May 2012 by <b>The Edison Foundation Institute for Electric =
Efficiency=E2=80=9D </b>which I have attached.&nbsp; The number of =
=E2=80=9CSmart Meters=E2=80=9D currently installed are even larger than =
shown in the report as I compose this email.&nbsp; Assuming 10% of =
Pacific Gas &amp; Electric=E2=80=99s Retail Customers decide to utilize =
a Third Party application (3 Third Party applications are currently =
supported and are 3 more Third Party applications are preparing to be =
supported) in order to support the ability to revoke a token they would =
be required to track 500,000 access tokens and 500,000 refresh =
tokens.&nbsp; Requiring PG&amp;E=E2=80=99s authorization server to =
=E2=80=9Cautomatically=E2=80=9D determine the type of Token being =
revoked begins to negatively impact their processing capability.&nbsp; =
If the <b>Token Revocation</b> request was capable of indicating the =
type of Token to be revoked, the amount of time it will take =
PG&amp;E=E2=80=99s authorization server would show a significant time =
savings to process the request.</span><o:p></o:p></p><p =
class=3DMsoNormal><span =
style=3D'font-size:12.0pt;font-family:"Cambria","serif"'>&nbsp;</span><o:=
p></o:p></p><p class=3DMsoNormal><b><u><span =
style=3D'font-size:12.0pt;font-family:"Cambria","serif"'>Authorization =
Server Revocation Policy</span></u></b><o:p></o:p></p><p =
class=3DMsoNormal><span =
style=3D'font-size:12.0pt;font-family:"Cambria","serif"'>&nbsp;</span><o:=
p></o:p></p><p class=3DMsoNormal><span =
style=3D'font-size:12.0pt;font-family:"Cambria","serif"'>&nbsp;</span><o:=
p></o:p></p><p class=3DMsoListParagraph =
style=3D'text-indent:-.25in'><span =
style=3D'font-size:12.0pt;font-family:"Cambria","serif"'>&nbsp;&nbsp;&nbs=
p;&nbsp;&nbsp; </span>6.<span =
style=3D'font-size:7.0pt;font-family:"Times New Roman , =
serif","serif"'>&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp; </span>Does the =
revocation of the access token also revoke the refresh token (if it was =
provided) ? Or is this a revocation policy decision ?<o:p></o:p></p><p =
class=3DMsoNormal><span =
style=3D'font-size:12.0pt;font-family:"Cambria","serif"'>&nbsp;</span><o:=
p></o:p></p><p class=3DMsoNormal style=3D'margin-left:1.0in'><span =
style=3D'font-size:12.0pt;font-family:"Times New Roman , =
serif","serif"'>- if the token passed to the request is a refresh token =
and the server supports access token revocation, the server SHOULD also =
revoke them.<br>- if the token passed to the request is an access token, =
the server may decide to revoke the respective refresh token as =
well.</span><o:p></o:p></p><p class=3DMsoNormal =
style=3D'margin-left:1.0in'><span =
style=3D'font-size:12.0pt;font-family:"Times New Roman , =
serif","serif"'>&nbsp;</span><o:p></o:p></p><p class=3DMsoNormal =
style=3D'margin-left:1.0in'><span =
style=3D'font-size:12.0pt;font-family:"Times New Roman , =
serif","serif"'>I believe that if the token passed in the request is an =
access token, the server MUST revoke any respective refresh token.&nbsp; =
Otherwise, their exist a potential security risk of the respective =
refresh token being used to gain access to the resources for which the =
access token was issued.&nbsp; It also means the authorization server =
will have potential =E2=80=9Cjunk=E2=80=9D in the refresh token file to =
search through for any additional Token Revocation =
request.</span><o:p></o:p></p><p class=3DMsoNormal =
style=3D'margin-left:1.0in'><span =
style=3D'font-size:12.0pt;font-family:"Times New Roman , =
serif","serif"'>&nbsp;</span><o:p></o:p></p><p class=3DMsoNormal><span =
style=3D'font-size:12.0pt;font-family:"Times New Roman , =
serif","serif"'>I look forward to receiving your =
response.</span><o:p></o:p></p><p class=3DMsoNormal><span =
style=3D'font-size:12.0pt;font-family:"Cambria","serif"'>&nbsp;</span><o:=
p></o:p></p><p class=3DMsoNormal><span style=3D'font-size:12.0pt'>Best =
regards,</span><o:p></o:p></p><p class=3DMsoNormal><span =
style=3D'font-size:24.0pt;font-family:"Brush Script =
MT"'>Don</span><o:p></o:p></p><p class=3DMsoNormal><span =
style=3D'font-size:12.0pt'>Donald F. Coffin</span><o:p></o:p></p><p =
class=3DMsoNormal><span =
style=3D'font-size:12.0pt'>Founder/CTO</span><o:p></o:p></p><p =
class=3DMsoNormal><span =
style=3D'font-size:12.0pt'>&nbsp;</span><o:p></o:p></p><p =
class=3DMsoNormal><span style=3D'font-size:12.0pt'>REMI =
Networks</span><o:p></o:p></p><p class=3DMsoNormal><span =
style=3D'font-size:12.0pt'>22751 El Prado Suite =
6216</span><o:p></o:p></p><p class=3DMsoNormal><span =
style=3D'font-size:12.0pt'>Rancho Santa Margarita, CA&nbsp; =
92688-3836</span><o:p></o:p></p><p class=3DMsoNormal><span =
style=3D'font-size:12.0pt'>&nbsp;</span><o:p></o:p></p><p =
class=3DMsoNormal><span =
style=3D'font-size:12.0pt'>Phone:&nbsp;&nbsp;&nbsp;&nbsp;&nbsp; (949) =
636-8571</span><o:p></o:p></p><p class=3DMsoNormal><span =
style=3D'font-size:12.0pt'>Email:&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp; <a =
href=3D"mailto:donald.coffin@reminetworks.com">donald.coffin@reminetworks=
.com</a></span><o:p></o:p></p><p =
class=3DMsoNormal>&nbsp;<o:p></o:p></p><p class=3DMsoNormal><span =
style=3D'font-size:12.0pt;font-family:"Times New Roman , =
serif","serif"'><br><br><br><br><br></span><o:p></o:p></p><pre>__________=
_____________________________________<o:p></o:p></pre><pre>OAuth mailing =
list<o:p></o:p></pre><pre><a =
href=3D"mailto:OAuth@ietf.org">OAuth@ietf.org</a><o:p></o:p></pre><pre><a=
 =
href=3D"https://www.ietf.org/mailman/listinfo/oauth">https://www.ietf.org=
/mailman/listinfo/oauth</a><o:p></o:p></pre></blockquote><p =
class=3DMsoNormal><span style=3D'font-size:12.0pt;font-family:"Times New =
Roman , serif","serif"'>&nbsp;</span><o:p></o:p></p></div></div><p =
class=3DMsoNormal><span style=3D'font-size:12.0pt;font-family:"Times New =
Roman","serif"'><o:p>&nbsp;</o:p></span></p></div></body></html>
------=_NextPart_000_003F_01CE020C.5A780040--


From torsten@lodderstedt.net  Sun Feb  3 13:14:16 2013
Return-Path: <torsten@lodderstedt.net>
X-Original-To: oauth@ietfa.amsl.com
Delivered-To: oauth@ietfa.amsl.com
Received: from localhost (localhost [127.0.0.1]) by ietfa.amsl.com (Postfix) with ESMTP id CBA4621F854B for <oauth@ietfa.amsl.com>; Sun,  3 Feb 2013 13:14:16 -0800 (PST)
X-Virus-Scanned: amavisd-new at amsl.com
X-Spam-Flag: NO
X-Spam-Score: 0.628
X-Spam-Level: 
X-Spam-Status: No, score=0.628 tagged_above=-999 required=5 tests=[AWL=-1.619,  BAYES_20=-0.74, HELO_EQ_DE=0.35, HTML_MESSAGE=0.001, MIME_QP_LONG_LINE=1.396, SARE_LWSHORTT=1.24]
Received: from mail.ietf.org ([64.170.98.30]) by localhost (ietfa.amsl.com [127.0.0.1]) (amavisd-new, port 10024) with ESMTP id fViCTAND+X4i for <oauth@ietfa.amsl.com>; Sun,  3 Feb 2013 13:14:14 -0800 (PST)
Received: from smtprelay04.ispgateway.de (smtprelay04.ispgateway.de [80.67.29.8]) by ietfa.amsl.com (Postfix) with ESMTP id D9FFC21F8488 for <oauth@ietf.org>; Sun,  3 Feb 2013 13:14:13 -0800 (PST)
Received: from [79.253.33.56] (helo=[192.168.71.56]) by smtprelay04.ispgateway.de with esmtpsa (TLSv1:AES128-SHA:128) (Exim 4.68) (envelope-from <torsten@lodderstedt.net>) id 1U26t3-0000bi-9n; Sun, 03 Feb 2013 22:14:05 +0100
References: <006401cdfe5f$2555f170$7001d450$@reminetworks.com> <51085B43.3080103@aol.com> <00c901cdfe80$e7d0eb30$b772c190$@reminetworks.com> <9DFD603A-1170-41D8-A22F-8654D55546B3@lodderstedt.net> <00a301ce0205$b6b1ca00$24155e00$@reminetworks.com> <510E560A.4090107@lodderstedt.net> <003e01ce024f$6894feb0$39befc10$@reminetworks.com>
Mime-Version: 1.0 (1.0)
In-Reply-To: <003e01ce024f$6894feb0$39befc10$@reminetworks.com>
Content-Type: multipart/alternative; boundary=Apple-Mail-67BDD6D1-D210-4B99-9CA0-CC32BC500837
Content-Transfer-Encoding: 7bit
Message-Id: <446E24A6-1E3A-4596-AAEA-8B6F1AD7D1A0@lodderstedt.net>
X-Mailer: iPad Mail (10B141)
From: Torsten Lodderstedt <torsten@lodderstedt.net>
Date: Sun, 3 Feb 2013 22:14:02 +0100
To: Donald F Coffin <donald.coffin@reminetworks.com>
X-Df-Sender: dG9yc3RlbkBsb2RkZXJzdGVkdC1vbmxpbmUuZGU=
Cc: John Adkins <jva2@pge.com>, Marty Burns <marty@hypertek.us>, Scott Crowder <scott.crowder@qadoenergy.com>, Dave Robin <drobin@automatedlogic.com>, John Teeter <john.teeter@peoplepowerco.com>, "<pmadsen@pingidentity.com>" <pmadsen@pingidentity.com>, Edward Denson <ewd7@pge.com>, "<oauth@ietf.org>" <oauth@ietf.org>, Ray Perlner <ray.perlner@nist.gov>, Anne Hendry <ahendry2@gmail.com>, Lynne Rodoni <mrodoni@semprautilities.com>, Uday Verma <uday.verma@ilinknet.com>
Subject: Re: [OAUTH-WG] draft-ietf-oauth-revocation-04
X-BeenThere: oauth@ietf.org
X-Mailman-Version: 2.1.12
Precedence: list
List-Id: OAUTH WG <oauth.ietf.org>
List-Unsubscribe: <https://www.ietf.org/mailman/options/oauth>, <mailto:oauth-request@ietf.org?subject=unsubscribe>
List-Archive: <http://www.ietf.org/mail-archive/web/oauth>
List-Post: <mailto:oauth@ietf.org>
List-Help: <mailto:oauth-request@ietf.org?subject=help>
List-Subscribe: <https://www.ietf.org/mailman/listinfo/oauth>, <mailto:oauth-request@ietf.org?subject=subscribe>
X-List-Received-Date: Sun, 03 Feb 2013 21:14:16 -0000

--Apple-Mail-67BDD6D1-D210-4B99-9CA0-CC32BC500837
Content-Type: text/plain;
	charset=utf-8
Content-Transfer-Encoding: quoted-printable

Hi Donald,

Thanks for the clarification. Let me see whether I got you right. Although t=
he retail customer has to authorize the access by the 3rd party application,=
 there is no external representation of this authorization grant (e.g a refr=
esh token). Instead, the actual access token is issued based on client crede=
ntials. Is there any correlation between the access token and the particular=
 customer?

Please note: we highly appreciate your feedback as an implementer.

Best regards,
Torsten.

Am 03.02.2013 um 21:45 schrieb "Donald F Coffin" <donald.coffin@reminetworks=
.com>:

> Hi Torsten,
> =20
> Best regards,
> Don
> Donald F. Coffin
> Founder/CTO
> =20
> REMI Networks
> 22751 El Prado Suite 6216
> Rancho Santa Margarita, CA  92688-3836
> =20
> Phone:      (949) 636-8571
> Email:       donald.coffin@reminetworks.com
> =20
> From: Torsten Lodderstedt [mailto:torsten@lodderstedt.net]=20
> Sent: Sunday, February 03, 2013 4:20 AM
> To: Donald F Coffin
> Cc: 'George Fletcher'; 'John Adkins'; 'Scott Crowder'; 'Dave Robin'; 'John=
 Teeter'; pmadsen@pingidentity.com; 'Edward Denson'; 'Marty Burns'; 'Uday Ve=
rma'; 'Ray Perlner'; 'Anne Hendry'; 'Lynne Rodoni'; oauth@ietf.org
> Subject: Re: [OAUTH-WG] draft-ietf-oauth-revocation-04
> =20
> Hi Donald,
>=20
> Am 03.02.2013 12:57, schrieb Donald F Coffin:
> <snip>
> =20
> [Don] A typical Third Party application built to use the ESPI Standard wil=
l interact with a Retail Customer and their energy provider.  The nature of i=
nteraction with the Retail Customer will utilize short interactive sessions.=
  However, the interaction with their energy provider will require the appli=
cation obtain new energy information for the previous 24-hours once a day.  T=
herefore, I anticipate access_tokens will be granted for long periods of tim=
e as well as any supporting refresh_tokens.  Because of the amount of data b=
eing exchanged between the Third Party application and the energy provider, b=
oth in number of retail customers and the amount of energy meter data, it wi=
ll be necessary to minimize the amount of =E2=80=9Cadministrative=E2=80=9D t=
raffic required in the exchange.  Therefore, although I understand the use c=
ase you described, I anticipate such an implementation would be rare.=20
> =20
> The need to perform an audience style check to prevent exposure of the AS t=
o a denial of service attack, appears primarily due to the fact the Revocati=
on RFC requires an access_token and refresh_token to be revoked independentl=
y.  Should a client need to revoke both Tokens the sequence of the revocatio=
n request is extremely significant.  A simple solution to this problem would=
 be to provide a method that allows a request to revoke both tokens simultan=
eously, as stated in one of the responses you referenced in the archives.=20=

> =20
> The example you gave in your response demonstrating how a denial of servic=
e attack might occur is incorrect.  You said =E2=80=9Cif the AS revokes the r=
efresh_token when an access_token is revoked, I can steal an access_token an=
d send it to the revocation endpoint causing the real client=E2=80=99s refre=
sh_token to be revoked=E2=80=9D.  I fail to see how that could occur, since t=
he AS revoked both the access_token and the refresh_token when it received t=
he request to revoke the access_token.  Rather than explaining why a refresh=
_token shouldn=E2=80=99t be revoked concurrently when an access_token is rev=
oked, your example does the exact opposite.  It shows why a refresh_token sh=
ould be revoked concurrently when an access_token is revoked.
> =20
> [Don] The focus of the ESPI Standard is to provide Retail Customer=E2=80=99=
s with access to a single UsagePoint (i.e. their Smart Meter).  Therefore an=
 access and refresh token will be tightly correlated with the type and frequ=
ency of data the Smart Meter provides.  There are only a few reasons defined=
 within the ESPI Standard list of use cases that will require the Token Revo=
cation request to be issued.  The following summarizes the situations that r=
equire a Token Revocation request:
>=20
> =C2=B7         A Third Party application wishes to terminate their relatio=
nship with a Retail Customer.
>=20
> =C2=B7         A Third Party application wishes to terminate their relatio=
nship with a Data Custodian.
>=20
> =C2=B7         A Retail Customer wishes to terminate their relationship wi=
th a Third Party application.
>=20
> =C2=B7         A Retail Customer wishes to change the data (i.e. scope) a T=
hird Party application has permission to access.
>=20
> In none of the above situations will it be valid to retain a refresh token=
, which I realize is implementation dependent, due to the nature of the ESPI=
 Standard.
>=20
> Perhaps the section on the Server=E2=80=99s Revocation Policy should addre=
ss a few of the reasons why a client may want or need to revoke a token.  Th=
e current description provides no consideration for the relationship between=
 tokens and scope, although there clearly is a relationship.
>=20
> I'm confident client or resource owner would revoke refresh (and not acces=
s) tokens in all use cases you listed above. In my opinion, access tokens ar=
e revoked only if the authorization server does not support refresh tokens a=
nd therefore uses long term access tokens or in high-security applications.
> =20
> [Don] Based on the above statement it would appear you assume an access to=
ken is only valid for a short period of time.  However, as I explained in my=
 last response, due to the nature of the access required by the client and t=
he manner in which the RS provides that data, access token durations will ty=
pically be in days not minutes.   Therefore, merely revoking a refresh_token=
 will expose the data to access that the resource owner meant to prevent unl=
ess the access_token is also revoked.
>=20
> I don't understand why access tokens need such a long duration in your sce=
nario, even if the client needs to obtain energy data once a day. Any client=
 can (potentially) obtain a new access token at any time if the access token=
 expires if the authorization server issues corresponding refresh tokens. So=
 even in your scenario, access tokens could have a short duration. If you wa=
nt to issue long-living access tokens in order to minimize load on the autho=
rization servers, then you have to consider the extra complexitity and load r=
equired to notify resource servers of access token revocation. It's a tradeo=
ff decision, which we tried to describe in http://tools.ietf.org/html/draft-=
ietf-oauth-revocation-04#section-3.=20
>=20
> =20
> [Don] A critical fact I omitted in my last response is the data obtained o=
n a daily basis by a Third Party application will utilize an access_token ob=
tained using the client_credentials grant_type.  Therefore no refresh_token w=
ill be issued with the access_token.  The ESPI Standard requires the Retail C=
ustomer (resource owner) and the RS to be notified whenever an authorization=
 is modified or revoked by either the Third Party (client) or Retail Custome=
r (resource owner).  Therefore, the tradeoff decision has already been made.=

> =20
> I personally feel that short lived access_tokens provide greater security,=
 but in discussions with several utilities who have the responsibility of su=
pporting the AS and RS functionality, they currently are planning on impleme=
nting long duration access_tokens.  This view may change once the begin to i=
mplement =E2=80=9CConnect My Data=E2=80=9D solutions, but that again is an i=
mplementation feature, which is beyond the scope of my groups current work p=
roduct.
>=20
> =20
> I would also like to hear the opinion of other WG members on this topic.
> =20
> 3. If the standard OAuth spec does not provide enough control, your profil=
e of OAuth2 for the ESPI can tighten it to provide the protections desired.
>=20
> [Don] I am aware we can provide additional parameters required to integrat=
e OAuth 2.0 with the ESPI Standard by submitting those parameter values to t=
he OAuth Parameters registry. I would prefer not to do that, given the large=
 amount of work being done on RFC-drafts to resolve many of the issues we ar=
e facing to integrate OAuth 2.0 with the ESPI Standard, since the need to us=
e those extensions will most likely be short lived.
>=20
> =20
> Hmmm, if the need is only short lived, why do you want to make it part of t=
he long living revocation RFC?
> =20
> [Don] My response was to the suggestion that if the OAuth specification do=
es not provide enough control then the ESPI profile of OAuth 2.0 could tight=
en it to provide the protections desired.  I assumed George meant we could a=
dd additional =E2=80=9Ccompany=E2=80=9D based parameters, which requires us t=
o register them with the =E2=80=9COAuth Parameter Registry=E2=80=9D.  I mean=
t the usage of such =E2=80=9Ccompany=E2=80=9D parameters would be short term=
ed.
>=20
> Understood.
>=20
>=20
> I do not view the need to identify the type of token being revoked as =E2=80=
=9Cshort term=E2=80=9D.  Even the previous exchanges on the topic within the=
 WG indicates it feels there may be a need to add an additional parameter to=
 the request.  However, because the draft is too far along, the WG seems to p=
refer releasing an RFC they =E2=80=9Csuspect=E2=80=9D will need to be adjust=
ed and let the implementers confirm their suspicions.   This seems to be a v=
ery selfish and rather foolish attitude given we are discussing a security p=
rotocol.  Not to mention it would seem easier and faster to add an additiona=
l =E2=80=9Coptional=E2=80=9D parameter now, rather than requiring another RFC=
 cycle.  A parameter I sensed in reading the archives the WG feels will very=
 likely need to be added in the future.
>=20
> Since this is a WG item, it is up to the WG to decide.
> =20
> [Don] I fully understand it is the WG=E2=80=99s decision.  I am only provi=
ding my opinion as an implementer, who the WG desires to obtain feedback fro=
m before making the final decision.
>=20
>=20
> regards,
> Torsten.
>=20
>=20
>=20
>=20
>=20
> Thanks,
> George
>=20
> On 1/29/13 3:28 PM, Donald F Coffin wrote:
> Hi Thorsten,
> =20
> I am working with the OpenADE Task Force to document how the =E2=80=9CEner=
gy Service Provider Interface (ESPI) Standard =E2=80=9D published by the Nor=
th American Energy Standards Board (NAESB) in October of 2011 should be impl=
emented.  The ESPI Standard defines how Retail Customers, Third Party applic=
ations, and Data Custodians (i.e. electrical, gas, or water utility) must in=
terface to each other and the data format used to exchange energy informatio=
n.   The interface between the Retail Customer and the Data Custodian is kno=
wn as =E2=80=9CDownload My Data=E2=80=9D, which defines how a Retail Custome=
r receives their energy information in an XML file downloaded to them by the=
 Data Custodian.  The interface between the Third Party application and the D=
ata Custodian is known as =E2=80=9CConnect My Data=E2=80=9D, which defines t=
he message exchanges between the Third Party application and the Data Custod=
ian to allow the Third Party to access data at the Data Custodian after a Re=
tail Customer has granted the Third Party application access.
> =20
> It is my responsibility within the OpenADE Task Force to document the inte=
gration of the OAuth 2.0 protocol with the ESPI Standard.  Since the ESPI St=
andard requires Retail Customers, Third Party applications, and Data Custodi=
ans to revoke Tokens (i.e. Access and Refresh Tokens) I am very interested i=
n the =E2=80=9CToken Revocation (draft-ietf-oath-revocation-xx)=E2=80=9D wor=
k being done by you and your working group.
> =20
> Token Revocation Request
> =20
> The Token Revocation request has only the =E2=80=9Ctoken=E2=80=9D paramete=
r with the description that the authorization server is supposed to detect t=
he token type automatically.  I would like to request that an addition param=
eter =E2=80=9Ctoken_type=E2=80=9D be added to the request.  The =E2=80=9Ctok=
en_type=E2=80=9D parameter could be optional and would define the type of to=
ken being revoked (i.e. =E2=80=9Caccess=E2=80=9D, =E2=80=9Crefresh=E2=80=9D,=
 =E2=80=9Cregistration access=E2=80=9D, etc.).
> =20
> The ESPI Standard was developed to support the Advanced Meter Interface (A=
MI) which is the interface used by =E2=80=9CSmart Meters=E2=80=9D to provide=
 automated energy usage collection and other operational information about a=
 Retail Customer=E2=80=99s residence to their Data Custodian.  Third Party a=
pplications will be required to obtain the approval if each Retail Customer t=
hat has had a =E2=80=9CSmart Meter=E2=80=9D installed before they will be ab=
le to access the data provided by their =E2=80=9CSmart Meter=E2=80=9D.  The n=
umber of =E2=80=9CSmart Meters=E2=80=9D currently installed at the three lar=
gest California utilities (Pacific Gas & Electric, Southern California Ediso=
n, and San Diego Gas & Electric) is in excess of 10.0 M and growing.  The fo=
llowing table indicates the number of =E2=80=9CSmart Meters=E2=80=9D each of=
 the three utilities had installed as of May 2012:
> =20
> Utility
> =E2=80=9CSmart Meters=E2=80=9D Installed
> Pacific Gas & Electric (PG&E)
> 4,696,000
> San Diego Gas & Electric (SDG&E)
> 1,364,000
> Southern California Edison (SCE)
> 3,900,000
> =20
> The numbers in the chart were taken from the =E2=80=9CUtility-Scale Smart M=
eter Deployments, Plans, & Proposals -- IEE Report=E2=80=9D published May 20=
12 by The Edison Foundation Institute for Electric Efficiency=E2=80=9D which=
 I have attached.  The number of =E2=80=9CSmart Meters=E2=80=9D currently in=
stalled are even larger than shown in the report as I compose this email.  A=
ssuming 10% of Pacific Gas & Electric=E2=80=99s Retail Customers decide to u=
tilize a Third Party application (3 Third Party applications are currently s=
upported and are 3 more Third Party applications are preparing to be support=
ed) in order to support the ability to revoke a token they would be required=
 to track 500,000 access tokens and 500,000 refresh tokens.  Requiring PG&E=E2=
=80=99s authorization server to =E2=80=9Cautomatically=E2=80=9D determine th=
e type of Token being revoked begins to negatively impact their processing c=
apability.  If the Token Revocation request was capable of indicating the ty=
pe of Token to be revoked, the amount of time it will take PG&E=E2=80=99s au=
thorization server would show a significant time savings to process the requ=
est.
> =20
> Authorization Server Revocation Policy
> =20
> =20
>       6.       Does the revocation of the access token also revoke the ref=
resh token (if it was provided) ? Or is this a revocation policy decision ?
> =20
> - if the token passed to the request is a refresh token and the server sup=
ports access token revocation, the server SHOULD also revoke them.
> - if the token passed to the request is an access token, the server may de=
cide to revoke the respective refresh token as well.
> =20
> I believe that if the token passed in the request is an access token, the s=
erver MUST revoke any respective refresh token.  Otherwise, their exist a po=
tential security risk of the respective refresh token being used to gain acc=
ess to the resources for which the access token was issued.  It also means t=
he authorization server will have potential =E2=80=9Cjunk=E2=80=9D in the re=
fresh token file to search through for any additional Token Revocation reque=
st.
> =20
> I look forward to receiving your response.
> =20
> Best regards,
> Don
> Donald F. Coffin
> Founder/CTO
> =20
> REMI Networks
> 22751 El Prado Suite 6216
> Rancho Santa Margarita, CA  92688-3836
> =20
> Phone:      (949) 636-8571
> Email:       donald.coffin@reminetworks.com
> =20
>=20
>=20
>=20
>=20
>=20
> _______________________________________________
> OAuth mailing list
> OAuth@ietf.org
> https://www.ietf.org/mailman/listinfo/oauth
> =20
> =20

--Apple-Mail-67BDD6D1-D210-4B99-9CA0-CC32BC500837
Content-Type: text/html;
	charset=utf-8
Content-Transfer-Encoding: quoted-printable

<html><head><meta http-equiv=3D"content-type" content=3D"text/html; charset=3D=
utf-8"></head><body dir=3D"auto"><div>Hi Donald,</div><div><br></div><div>Th=
anks for the clarification. Let me see whether I got you right. Although the=
 retail customer has to authorize the access by the 3rd party application, t=
here is no external representation of this authorization grant (e.g a refres=
h token). Instead, the actual access token is issued based on client credent=
ials. Is there any correlation between the access token and the particular c=
ustomer?</div><div><br></div><div>Please note: we highly appreciate your fee=
dback as an implementer.</div><div><br></div><div>Best regards,</div><div>To=
rsten.</div><div><br>Am 03.02.2013 um 21:45 schrieb "Donald F Coffin" &lt;<a=
 href=3D"mailto:donald.coffin@reminetworks.com">donald.coffin@reminetworks.c=
om</a>&gt;:<br><br></div><blockquote type=3D"cite"><div><meta http-equiv=3D"=
Content-Type" content=3D"text/html; charset=3Dutf-8"><meta name=3D"Generator=
" content=3D"Microsoft Word 14 (filtered medium)"><style><!--
/* Font Definitions */
@font-face
	{font-family:Helvetica;
	panose-1:2 11 6 4 2 2 2 2 2 4;}
@font-face
	{font-family:Wingdings;
	panose-1:5 0 0 0 0 0 0 0 0 0;}
@font-face
	{font-family:"Cambria Math";
	panose-1:2 4 5 3 5 4 6 3 2 4;}
@font-face
	{font-family:Cambria;
	panose-1:2 4 5 3 5 4 6 3 2 4;}
@font-face
	{font-family:Calibri;
	panose-1:2 15 5 2 2 2 4 3 2 4;}
@font-face
	{font-family:Tahoma;
	panose-1:2 11 6 4 3 5 4 4 2 4;}
@font-face
	{font-family:"Brush Script MT";
	panose-1:3 6 8 2 4 4 6 7 3 4;}
@font-face
	{font-family:Consolas;
	panose-1:2 11 6 9 2 2 4 3 2 4;}
@font-face
	{font-family:"Times New Roman \, serif";}
/* Style Definitions */
p.MsoNormal, li.MsoNormal, div.MsoNormal
	{margin:0in;
	margin-bottom:.0001pt;
	font-size:11.0pt;
	font-family:"Calibri","sans-serif";
	color:black;}
a:link, span.MsoHyperlink
	{mso-style-priority:99;
	color:blue;
	text-decoration:underline;}
a:visited, span.MsoHyperlinkFollowed
	{mso-style-priority:99;
	color:purple;
	text-decoration:underline;}
pre
	{mso-style-priority:99;
	mso-style-link:"HTML Preformatted Char";
	margin:0in;
	margin-bottom:.0001pt;
	font-size:10.0pt;
	font-family:"Courier New";
	color:black;}
p.MsoAcetate, li.MsoAcetate, div.MsoAcetate
	{mso-style-priority:99;
	mso-style-link:"Balloon Text Char";
	margin:0in;
	margin-bottom:.0001pt;
	font-size:8.0pt;
	font-family:"Tahoma","sans-serif";
	color:black;}
p.MsoListParagraph, li.MsoListParagraph, div.MsoListParagraph
	{mso-style-priority:34;
	margin-top:0in;
	margin-right:0in;
	margin-bottom:0in;
	margin-left:.5in;
	margin-bottom:.0001pt;
	font-size:11.0pt;
	font-family:"Calibri","sans-serif";
	color:black;}
span.HTMLPreformattedChar
	{mso-style-name:"HTML Preformatted Char";
	mso-style-priority:99;
	mso-style-link:"HTML Preformatted";
	font-family:Consolas;
	color:black;}
span.BalloonTextChar
	{mso-style-name:"Balloon Text Char";
	mso-style-priority:99;
	mso-style-link:"Balloon Text";
	font-family:"Tahoma","sans-serif";
	color:black;}
span.EmailStyle22
	{mso-style-type:personal;
	font-family:"Cambria","serif";
	color:windowtext;}
span.EmailStyle23
	{mso-style-type:personal;
	font-family:"Cambria","serif";
	color:windowtext;
	font-weight:normal;
	font-style:normal;}
span.EmailStyle24
	{mso-style-type:personal;
	font-family:"Cambria","serif";
	color:windowtext;
	font-weight:normal;
	font-style:normal;}
span.EmailStyle25
	{mso-style-type:personal-reply;
	font-family:"Cambria","serif";
	color:windowtext;
	font-weight:normal;
	font-style:normal;}
.MsoChpDefault
	{mso-style-type:export-only;
	font-size:10.0pt;}
@page WordSection1
	{size:8.5in 11.0in;
	margin:1.0in 1.0in 1.0in 1.0in;}
div.WordSection1
	{page:WordSection1;}
/* List Definitions */
@list l0
	{mso-list-id:217783835;
	mso-list-type:hybrid;
	mso-list-template-ids:1090914056 67698689 67698691 67698693 6769868=
9 67698691 67698693 67698689 67698691 67698693;}
@list l0:level1
	{mso-level-number-format:bullet;
	mso-level-text:=EF=82=B7;
	mso-level-tab-stop:none;
	mso-level-number-position:left;
	margin-left:.75in;
	text-indent:-.25in;
	font-family:Symbol;}
@list l0:level2
	{mso-level-number-format:bullet;
	mso-level-text:o;
	mso-level-tab-stop:none;
	mso-level-number-position:left;
	margin-left:1.25in;
	text-indent:-.25in;
	font-family:"Courier New";}
@list l0:level3
	{mso-level-number-format:bullet;
	mso-level-text:=EF=82=A7;
	mso-level-tab-stop:none;
	mso-level-number-position:left;
	margin-left:1.75in;
	text-indent:-.25in;
	font-family:Wingdings;}
@list l0:level4
	{mso-level-number-format:bullet;
	mso-level-text:=EF=82=B7;
	mso-level-tab-stop:none;
	mso-level-number-position:left;
	margin-left:2.25in;
	text-indent:-.25in;
	font-family:Symbol;}
@list l0:level5
	{mso-level-number-format:bullet;
	mso-level-text:o;
	mso-level-tab-stop:none;
	mso-level-number-position:left;
	margin-left:2.75in;
	text-indent:-.25in;
	font-family:"Courier New";}
@list l0:level6
	{mso-level-number-format:bullet;
	mso-level-text:=EF=82=A7;
	mso-level-tab-stop:none;
	mso-level-number-position:left;
	margin-left:3.25in;
	text-indent:-.25in;
	font-family:Wingdings;}
@list l0:level7
	{mso-level-number-format:bullet;
	mso-level-text:=EF=82=B7;
	mso-level-tab-stop:none;
	mso-level-number-position:left;
	margin-left:3.75in;
	text-indent:-.25in;
	font-family:Symbol;}
@list l0:level8
	{mso-level-number-format:bullet;
	mso-level-text:o;
	mso-level-tab-stop:none;
	mso-level-number-position:left;
	margin-left:4.25in;
	text-indent:-.25in;
	font-family:"Courier New";}
@list l0:level9
	{mso-level-number-format:bullet;
	mso-level-text:=EF=82=A7;
	mso-level-tab-stop:none;
	mso-level-number-position:left;
	margin-left:4.75in;
	text-indent:-.25in;
	font-family:Wingdings;}
ol
	{margin-bottom:0in;}
ul
	{margin-bottom:0in;}
--></style><!--[if gte mso 9]><xml>
<o:shapedefaults v:ext=3D"edit" spidmax=3D"1026" />
</xml><![endif]--><!--[if gte mso 9]><xml>
<o:shapelayout v:ext=3D"edit">
<o:idmap v:ext=3D"edit" data=3D"1" />
</o:shapelayout></xml><![endif]--><div class=3D"WordSection1"><p class=3D"Ms=
oNormal"><span style=3D"font-size:12.0pt;font-family:&quot;Cambria&quot;,&qu=
ot;serif&quot;;color:windowtext">Hi Torsten,<o:p></o:p></span></p><p class=3D=
"MsoNormal"><span style=3D"font-size:12.0pt;font-family:&quot;Cambria&quot;,=
&quot;serif&quot;;color:windowtext"><o:p>&nbsp;</o:p></span></p><div><p clas=
s=3D"MsoNormal"><span style=3D"font-size:12.0pt;color:windowtext">Best regar=
ds,<o:p></o:p></span></p><p class=3D"MsoNormal"><span style=3D"font-size:24.=
0pt;font-family:&quot;Brush Script MT&quot;;color:windowtext">Don<o:p></o:p>=
</span></p><p class=3D"MsoNormal"><span style=3D"font-size:12.0pt;color:wind=
owtext">Donald F. Coffin<o:p></o:p></span></p><p class=3D"MsoNormal"><span s=
tyle=3D"font-size:12.0pt;color:windowtext">Founder/CTO<o:p></o:p></span></p>=
<p class=3D"MsoNormal"><span style=3D"font-size:12.0pt;color:windowtext"><o:=
p>&nbsp;</o:p></span></p><p class=3D"MsoNormal"><span style=3D"font-size:12.=
0pt;color:windowtext">REMI Networks<o:p></o:p></span></p><p class=3D"MsoNorm=
al"><span style=3D"font-size:12.0pt;color:windowtext">22751 El Prado Suite 6=
216<o:p></o:p></span></p><p class=3D"MsoNormal"><span style=3D"font-size:12.=
0pt;color:windowtext">Rancho Santa Margarita, CA&nbsp; 92688-3836<o:p></o:p>=
</span></p><p class=3D"MsoNormal"><span style=3D"font-size:12.0pt;color:wind=
owtext"><o:p>&nbsp;</o:p></span></p><p class=3D"MsoNormal"><span style=3D"fo=
nt-size:12.0pt;color:windowtext">Phone:&nbsp;&nbsp;&nbsp;&nbsp;&nbsp; (949) 6=
36-8571<o:p></o:p></span></p><p class=3D"MsoNormal"><span style=3D"font-size=
:12.0pt;color:windowtext">Email:&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp; <a href=
=3D"mailto:donald.coffin@reminetworks.com"><span style=3D"color:blue">donald=
.coffin@reminetworks.com</span></a><o:p></o:p></span></p></div><p class=3D"M=
soNormal"><span style=3D"font-size:12.0pt;font-family:&quot;Cambria&quot;,&q=
uot;serif&quot;;color:windowtext"><o:p>&nbsp;</o:p></span></p><div><div styl=
e=3D"border:none;border-top:solid #B5C4DF 1.0pt;padding:3.0pt 0in 0in 0in"><=
p class=3D"MsoNormal"><b><span style=3D"font-size:10.0pt;font-family:&quot;T=
ahoma&quot;,&quot;sans-serif&quot;;color:windowtext">From:</span></b><span s=
tyle=3D"font-size:10.0pt;font-family:&quot;Tahoma&quot;,&quot;sans-serif&quo=
t;;color:windowtext"> Torsten Lodderstedt [<a href=3D"mailto:torsten@lodders=
tedt.net">mailto:torsten@lodderstedt.net</a>] <br><b>Sent:</b> Sunday, Febru=
ary 03, 2013 4:20 AM<br><b>To:</b> Donald F Coffin<br><b>Cc:</b> 'George Fle=
tcher'; 'John Adkins'; 'Scott Crowder'; 'Dave Robin'; 'John Teeter'; <a href=
=3D"mailto:pmadsen@pingidentity.com">pmadsen@pingidentity.com</a>; 'Edward D=
enson'; 'Marty Burns'; 'Uday Verma'; 'Ray Perlner'; 'Anne Hendry'; 'Lynne Ro=
doni'; <a href=3D"mailto:oauth@ietf.org">oauth@ietf.org</a><br><b>Subject:</=
b> Re: [OAUTH-WG] draft-ietf-oauth-revocation-04<o:p></o:p></span></p></div>=
</div><p class=3D"MsoNormal"><o:p>&nbsp;</o:p></p><p class=3D"MsoNormal" sty=
le=3D"margin-bottom:12.0pt">Hi Donald,<o:p></o:p></p><div><p class=3D"MsoNor=
mal">Am 03.02.2013 12:57, schrieb Donald F Coffin:<o:p></o:p></p></div><bloc=
kquote style=3D"margin-top:5.0pt;margin-bottom:5.0pt"><p class=3D"MsoNormal"=
><span style=3D"font-size:12.0pt;font-family:&quot;Times New Roman&quot;,&qu=
ot;serif&quot;">&lt;snip&gt; <o:p></o:p></span></p><div><p class=3D"MsoNorma=
l"><span style=3D"font-size:12.0pt;font-family:&quot;Cambria&quot;,&quot;ser=
if&quot;;color:windowtext">&nbsp;</span><o:p></o:p></p><p class=3D"MsoNormal=
" style=3D"margin-left:.5in;text-indent:-.5in"><span style=3D"font-size:12.0=
pt;font-family:&quot;Cambria&quot;,&quot;serif&quot;;color:windowtext">[Don]=
 A typical Third Party application built to use the ESPI Standard will inter=
act with a Retail Customer and their energy provider.&nbsp; The nature of in=
teraction with the Retail Customer will utilize short interactive sessions.&=
nbsp; However, the interaction with their energy provider will require the a=
pplication obtain new energy information for the previous 24-hours once a da=
y.&nbsp; Therefore, I anticipate access_tokens will be granted for long peri=
ods of time as well as any supporting refresh_tokens.&nbsp; Because of the a=
mount of data being exchanged between the Third Party application and the en=
ergy provider, both in number of retail customers and the amount of energy m=
eter data, it will be necessary to minimize the amount of =E2=80=9Cadministr=
ative=E2=80=9D traffic required in the exchange.&nbsp; Therefore, although I=
 understand the use case you described, I anticipate such an implementation w=
ould be rare.&nbsp; </span><o:p></o:p></p><p class=3D"MsoNormal" style=3D"ma=
rgin-left:.5in;text-indent:-.5in"><span style=3D"font-size:12.0pt;font-famil=
y:&quot;Cambria&quot;,&quot;serif&quot;;color:windowtext">&nbsp;</span><o:p>=
</o:p></p><p class=3D"MsoNormal" style=3D"margin-left:.5in"><span style=3D"f=
ont-size:12.0pt;font-family:&quot;Cambria&quot;,&quot;serif&quot;;color:wind=
owtext">The need to perform an audience style check to prevent exposure of t=
he AS to a denial of service attack, appears primarily due to the fact the R=
evocation RFC requires an access_token and refresh_token to be revoked indep=
endently.&nbsp; Should a client need to revoke both Tokens the sequence of t=
he revocation request is extremely significant.&nbsp; A simple solution to t=
his problem would be to provide a method that allows a request to revoke bot=
h tokens simultaneously, as stated in one of the responses you referenced in=
 the archives.&nbsp; </span><o:p></o:p></p><p class=3D"MsoNormal" style=3D"m=
argin-left:.5in"><span style=3D"font-size:12.0pt;font-family:&quot;Cambria&q=
uot;,&quot;serif&quot;;color:windowtext">&nbsp;</span><o:p></o:p></p><p clas=
s=3D"MsoNormal" style=3D"margin-left:.5in"><span style=3D"font-size:12.0pt;f=
ont-family:&quot;Cambria&quot;,&quot;serif&quot;;color:windowtext">The examp=
le you gave in your response demonstrating how a denial of service attack mi=
ght occur is incorrect.&nbsp; You said =E2=80=9Cif the AS revokes the refres=
h_token when an access_token is revoked, I can steal an access_token and sen=
d it to the revocation endpoint causing the real client=E2=80=99s refresh_to=
ken to be revoked=E2=80=9D.&nbsp; I fail to see how that could occur, since t=
he AS revoked both the access_token and the refresh_token when it received t=
he request to revoke the access_token.&nbsp; Rather than explaining why a re=
fresh_token shouldn=E2=80=99t be revoked concurrently when an access_token i=
s revoked, your example does the exact opposite.&nbsp; It shows why a refres=
h_token should be revoked concurrently when an access_token is revoked.</spa=
n><o:p></o:p></p><p class=3D"MsoNormal"><span style=3D"font-size:12.0pt;font=
-family:&quot;Cambria&quot;,&quot;serif&quot;;color:windowtext">&nbsp;</span=
><o:p></o:p></p><p class=3D"MsoNormal" style=3D"mso-margin-top-alt:0in;margi=
n-right:0in;margin-bottom:12.0pt;margin-left:.5in;text-indent:-.5in"><span s=
tyle=3D"font-size:12.0pt;font-family:&quot;Cambria&quot;,&quot;serif&quot;;c=
olor:#0070C0">[Don] The focus of the <b>ESPI Standard</b> is to provide Reta=
il Customer=E2=80=99s with access to a single UsagePoint (i.e. their Smart M=
eter).&nbsp; Therefore an access and refresh token will be tightly correlate=
d with the type and frequency of data the Smart Meter provides.&nbsp; There a=
re only a few reasons defined within the <b>ESPI Standard</b> list of use ca=
ses that will require the <b>Token Revocation</b> request to be issued.&nbsp=
; The following summarizes the situations that require a <b>Token Revocation=
 </b>request:</span><o:p></o:p></p><p class=3D"MsoListParagraph" style=3D"ms=
o-margin-top-alt:0in;margin-right:0in;margin-bottom:12.0pt;margin-left:.75in=
;text-indent:-.25in;mso-list:l0 level1 lfo2"><!--[if !supportLists]--><span s=
tyle=3D"font-family:Symbol"><span style=3D"mso-list:Ignore">=C2=B7<span styl=
e=3D"font:7.0pt &quot;Times New Roman&quot;">&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&=
nbsp;&nbsp;&nbsp; </span></span></span><!--[endif]--><span style=3D"font-siz=
e:12.0pt;font-family:&quot;Cambria&quot;,&quot;serif&quot;;color:#0070C0">A T=
hird Party application wishes to terminate their relationship with a Retail C=
ustomer.</span><o:p></o:p></p><p class=3D"MsoListParagraph" style=3D"mso-mar=
gin-top-alt:0in;margin-right:0in;margin-bottom:12.0pt;margin-left:.75in;text=
-indent:-.25in;mso-list:l0 level1 lfo2"><!--[if !supportLists]--><span style=
=3D"font-family:Symbol"><span style=3D"mso-list:Ignore">=C2=B7<span style=3D=
"font:7.0pt &quot;Times New Roman&quot;">&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp=
;&nbsp;&nbsp; </span></span></span><!--[endif]--><span style=3D"font-size:12=
.0pt;font-family:&quot;Cambria&quot;,&quot;serif&quot;;color:#0070C0">A Thir=
d Party application wishes to terminate their relationship with a Data Custo=
dian.</span><o:p></o:p></p><p class=3D"MsoListParagraph" style=3D"mso-margin=
-top-alt:0in;margin-right:0in;margin-bottom:12.0pt;margin-left:.75in;text-in=
dent:-.25in;mso-list:l0 level1 lfo2"><!--[if !supportLists]--><span style=3D=
"font-family:Symbol"><span style=3D"mso-list:Ignore">=C2=B7<span style=3D"fo=
nt:7.0pt &quot;Times New Roman&quot;">&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&n=
bsp;&nbsp; </span></span></span><!--[endif]--><span style=3D"font-size:12.0p=
t;font-family:&quot;Cambria&quot;,&quot;serif&quot;;color:#0070C0">A Retail C=
ustomer wishes to terminate their relationship with a Third Party applicatio=
n.</span><o:p></o:p></p><p class=3D"MsoListParagraph" style=3D"mso-margin-to=
p-alt:0in;margin-right:0in;margin-bottom:12.0pt;margin-left:.75in;text-inden=
t:-.25in;mso-list:l0 level1 lfo2"><!--[if !supportLists]--><span style=3D"fo=
nt-family:Symbol"><span style=3D"mso-list:Ignore">=C2=B7<span style=3D"font:=
7.0pt &quot;Times New Roman&quot;">&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp=
;&nbsp; </span></span></span><!--[endif]--><span style=3D"font-size:12.0pt;f=
ont-family:&quot;Cambria&quot;,&quot;serif&quot;;color:#0070C0">A Retail Cus=
tomer wishes to change the data (i.e. scope) a Third Party application has p=
ermission to access.</span><o:p></o:p></p><p class=3D"MsoNormal" style=3D"ms=
o-margin-top-alt:0in;margin-right:0in;margin-bottom:12.0pt;margin-left:.5in"=
><span style=3D"font-size:12.0pt;font-family:&quot;Cambria&quot;,&quot;serif=
&quot;;color:#0070C0">In none of the above situations will it be valid to re=
tain a refresh token, which I realize is implementation dependent, due to th=
e nature of the <b>ESPI Standard.</b></span><o:p></o:p></p><p class=3D"MsoNo=
rmal" style=3D"mso-margin-top-alt:0in;margin-right:0in;margin-bottom:12.0pt;=
margin-left:.5in"><span style=3D"font-size:12.0pt;font-family:&quot;Cambria&=
quot;,&quot;serif&quot;;color:#0070C0">Perhaps the section on the <b>Server=E2=
=80=99s Revocation Policy</b> should address a few of the reasons why a clie=
nt may want or need to revoke a token.&nbsp; The current description provide=
s no consideration for the relationship between tokens and scope, although t=
here clearly is a relationship.</span><o:p></o:p></p></div><div><p class=3D"=
MsoNormal"><span style=3D"font-size:12.0pt">I'm confident client or resource=
 owner would revoke refresh (and not access) tokens in all use cases you lis=
ted above. In my opinion, access tokens are revoked only if the authorizatio=
n server does not support refresh tokens and therefore uses long term access=
 tokens or in high-security applications.</span><o:p></o:p></p><p class=3D"M=
soNormal"><span style=3D"font-size:12.0pt;font-family:&quot;Cambria&quot;,&q=
uot;serif&quot;;color:windowtext">&nbsp;</span><o:p></o:p></p><p class=3D"Ms=
oNormal" style=3D"margin-left:.5in;text-indent:-.5in"><span style=3D"font-si=
ze:12.0pt;font-family:&quot;Cambria&quot;,&quot;serif&quot;;color:windowtext=
">[Don] Based on the above statement it would appear you assume an access to=
ken is only valid for a short period of time.&nbsp; However, as I explained i=
n my last response, due to the nature of the access required by the client a=
nd the manner in which the RS provides that data, access token durations wil=
l typically be in days not minutes. &nbsp;&nbsp;Therefore, merely revoking a=
 refresh_token will expose the data to access that the resource owner meant t=
o prevent unless the access_token is also revoked.</span><o:p></o:p></p></di=
v></blockquote><p class=3D"MsoNormal" style=3D"margin-left:.5in;text-indent:=
-.5in"><span style=3D"font-size:12.0pt;font-family:&quot;Times New Roman&quo=
t;,&quot;serif&quot;"><br>I don't understand why access tokens need such a l=
ong duration in your scenario, even if the client needs to obtain energy dat=
a once a day. Any client can (potentially) obtain a new access token at any t=
ime if the access token expires if the authorization server issues correspon=
ding refresh tokens. So even in your scenario, access tokens could have a sh=
ort duration. If you want to issue long-living access tokens in order to min=
imize load on the authorization servers, then you have to consider the extra=
 complexitity and load required to notify resource servers of access token r=
evocation. It's a tradeoff decision, which we tried to describe in <a href=3D=
"http://tools.ietf.org/html/draft-ietf-oauth-revocation-04#section-3">http:/=
/tools.ietf.org/html/draft-ietf-oauth-revocation-04#section-3</a>. <br><br><=
/span><span style=3D"font-size:12.0pt;font-family:&quot;Times New Roman&quot=
;,&quot;serif&quot;;color:windowtext"><o:p></o:p></span></p><p class=3D"MsoN=
ormal"><span style=3D"font-size:12.0pt;font-family:&quot;Cambria&quot;,&quot=
;serif&quot;;color:windowtext"><o:p>&nbsp;</o:p></span></p><p class=3D"MsoNo=
rmal" style=3D"margin-left:.5in;text-indent:-.5in"><span style=3D"font-size:=
12.0pt;font-family:&quot;Times New Roman&quot;,&quot;serif&quot;;color:windo=
wtext">[Don] A critical fact I omitted in my last response is the data obtai=
ned on a daily basis by a Third Party application will utilize an access_tok=
en obtained using the client_credentials grant_type.&nbsp; Therefore no refr=
esh_token will be issued with the access_token.&nbsp; The ESPI Standard requ=
ires the Retail Customer (resource owner) and the RS to be notified whenever=
 an authorization is modified or revoked by either the Third Party (client) o=
r Retail Customer (resource owner).&nbsp; Therefore, the tradeoff decision h=
as already been made.<o:p></o:p></span></p><p class=3D"MsoNormal" style=3D"m=
argin-left:.5in;text-indent:-.5in"><span style=3D"font-size:12.0pt;font-fami=
ly:&quot;Times New Roman&quot;,&quot;serif&quot;;color:windowtext"><o:p>&nbs=
p;</o:p></span></p><p class=3D"MsoNormal" style=3D"margin-left:.5in"><span s=
tyle=3D"font-size:12.0pt;font-family:&quot;Times New Roman&quot;,&quot;serif=
&quot;;color:windowtext">I personally feel that short lived access_tokens pr=
ovide greater security, but in discussions with several utilities who have t=
he responsibility of supporting the AS and RS functionality, they currently a=
re planning on implementing long duration access_tokens.&nbsp; This view may=
 change once the begin to implement =E2=80=9CConnect My Data=E2=80=9D soluti=
ons, but that again is an implementation feature, which is beyond the scope o=
f my groups current work product.</span><span style=3D"font-size:12.0pt;font=
-family:&quot;Times New Roman&quot;,&quot;serif&quot;"><br><br><o:p></o:p></=
span></p><div><p class=3D"MsoNormal"><span style=3D"font-size:12.0pt">&nbsp;=
</span><o:p></o:p></p></div><div><p class=3D"MsoNormal"><span style=3D"font-=
size:12.0pt">I would also like to hear the opinion of other WG members on th=
is topic.</span><o:p></o:p></p></div><div><p class=3D"MsoNormal"><span style=
=3D"font-size:12.0pt">&nbsp;</span><o:p></o:p></p></div><blockquote style=3D=
"margin-top:5.0pt;margin-bottom:5.0pt"><div><p class=3D"MsoNormal" style=3D"=
margin-bottom:12.0pt"><span style=3D"font-family:&quot;Helvetica&quot;,&quot=
;sans-serif&quot;">3. If the standard OAuth spec does not provide enough con=
trol, your profile of OAuth2 for the ESPI can tighten it to provide the prot=
ections desired.</span><o:p></o:p></p><p class=3D"MsoNormal" style=3D"mso-ma=
rgin-top-alt:0in;margin-right:0in;margin-bottom:12.0pt;margin-left:.5in;text=
-indent:-.5in"><span style=3D"font-size:12.0pt;font-family:&quot;Cambria&quo=
t;,&quot;serif&quot;;color:#0070C0">[Don] I am aware we can provide addition=
al parameters required to integrate <b>OAuth 2.0 </b>with the <b>ESPI Standa=
rd</b> by submitting those parameter values to the <b>OAuth Parameters</b> r=
egistry. I would prefer not to do that, given the large amount of work being=
 done on RFC-drafts to resolve many of the issues we are facing to integrate=
 <b>OAuth 2.0</b> with the <b>ESPI Standard</b>, since the need to use those=
 extensions will most likely be short lived.</span><o:p></o:p></p></div></bl=
ockquote><div><p class=3D"MsoNormal"><span style=3D"font-size:12.0pt">&nbsp;=
</span><o:p></o:p></p></div><p class=3D"MsoNormal"><span style=3D"font-size:=
12.0pt">Hmmm, if the need is only short lived, why do you want to make it pa=
rt of the long living revocation RFC?</span><o:p></o:p></p><p class=3D"MsoNo=
rmal"><span style=3D"font-size:12.0pt;font-family:&quot;Cambria&quot;,&quot;=
serif&quot;;color:windowtext">&nbsp;</span><o:p></o:p></p><p class=3D"MsoNor=
mal" style=3D"margin-left:.5in;text-indent:-.5in"><span style=3D"font-size:1=
2.0pt;font-family:&quot;Cambria&quot;,&quot;serif&quot;;color:windowtext">[D=
on] My response was to the suggestion that if the OAuth specification does n=
ot provide enough control then the ESPI profile of OAuth 2.0 could tighten i=
t to provide the protections desired.&nbsp; I assumed George meant we could a=
dd additional =E2=80=9Ccompany=E2=80=9D based parameters, which requires us t=
o register them with the =E2=80=9COAuth Parameter Registry=E2=80=9D.&nbsp; I=
 meant the usage of such =E2=80=9Ccompany=E2=80=9D parameters would be short=
 termed.</span><o:p></o:p></p><p class=3D"MsoNormal"><span style=3D"font-siz=
e:12.0pt;font-family:&quot;Times New Roman&quot;,&quot;serif&quot;"><br>Unde=
rstood.<br><br><br></span><o:p></o:p></p><p class=3D"MsoNormal" style=3D"mar=
gin-left:.5in"><span style=3D"font-size:12.0pt;font-family:&quot;Cambria&quo=
t;,&quot;serif&quot;;color:windowtext">I do not view the need to identify th=
e type of token being revoked as =E2=80=9Cshort term=E2=80=9D.&nbsp; Even th=
e previous exchanges on the topic within the WG indicates it feels there may=
 be a need to add an additional parameter to the request.&nbsp; However, bec=
ause the draft is too far along, the WG seems to prefer releasing an RFC the=
y =E2=80=9Csuspect=E2=80=9D will need to be adjusted and let the implementer=
s confirm their suspicions.&nbsp;&nbsp; This seems to be a very selfish and r=
ather foolish attitude given we are discussing a security protocol.&nbsp; No=
t to mention it would seem easier and faster to add an additional =E2=80=9Co=
ptional=E2=80=9D parameter now, rather than requiring another RFC cycle. &nb=
sp;A parameter I sensed in reading the archives the WG feels will very likel=
y need to be added in the future.</span><o:p></o:p></p><p class=3D"MsoNormal=
"><span style=3D"font-size:12.0pt;font-family:&quot;Times New Roman&quot;,&q=
uot;serif&quot;"><br>Since this is a WG item, it is up to the WG to decide.<=
/span><span style=3D"font-size:12.0pt;font-family:&quot;Times New Roman&quot=
;,&quot;serif&quot;;color:windowtext"><o:p></o:p></span></p><p class=3D"MsoN=
ormal"><span style=3D"font-size:12.0pt;font-family:&quot;Cambria&quot;,&quot=
;serif&quot;;color:windowtext"><o:p>&nbsp;</o:p></span></p><p class=3D"MsoNo=
rmal"><span style=3D"font-size:12.0pt;font-family:&quot;Cambria&quot;,&quot;=
serif&quot;;color:windowtext">[Don] I fully understand it is the WG=E2=80=99=
s decision.&nbsp; I am only providing my opinion as an implementer, who the W=
G desires to obtain feedback from before making the final decision.<o:p></o:=
p></span></p><p class=3D"MsoNormal"><span style=3D"font-size:12.0pt;font-fam=
ily:&quot;Times New Roman&quot;,&quot;serif&quot;"><br><br>regards,<br>Torst=
en.<br><br><br><o:p></o:p></span></p><div><p class=3D"MsoNormal"><span style=
=3D"font-size:12.0pt"><br><br><br></span><o:p></o:p></p><div><p class=3D"Mso=
Normal" style=3D"margin-bottom:12.0pt"><span style=3D"font-family:&quot;Helv=
etica&quot;,&quot;sans-serif&quot;">Thanks,<br>George</span><o:p></o:p></p><=
div><p class=3D"MsoNormal">On 1/29/13 3:28 PM, Donald F Coffin wrote:<o:p></=
o:p></p></div><blockquote style=3D"margin-top:5.0pt;margin-bottom:5.0pt"><p c=
lass=3D"MsoNormal"><span style=3D"font-size:12.0pt;font-family:&quot;Cambria=
&quot;,&quot;serif&quot;">Hi Thorsten,</span><o:p></o:p></p><p class=3D"MsoN=
ormal"><span style=3D"font-size:12.0pt;font-family:&quot;Cambria&quot;,&quot=
;serif&quot;">&nbsp;</span><o:p></o:p></p><p class=3D"MsoNormal"><span style=
=3D"font-size:12.0pt;font-family:&quot;Cambria&quot;,&quot;serif&quot;">I am=
 working with the OpenADE Task Force to document how the =E2=80=9C<b><i>Ener=
gy Service Provider Interface (ESPI) Standard</i></b> =E2=80=9D published by=
 the <b>North American Energy Standards Board</b> (NAESB) in October of 2011=
 should be implemented.&nbsp; The <b>ESPI Standard</b> defines how Retail Cu=
stomers, Third Party applications, and Data Custodians (i.e. electrical, gas=
, or water utility) must interface to each other and the data format used to=
 exchange energy information.&nbsp; &nbsp;The interface between the Retail C=
ustomer and the Data Custodian is known as =E2=80=9C<b>Download My Data</b>=E2=
=80=9D, which defines how a Retail Customer receives their energy informatio=
n in an XML file downloaded to them by the Data Custodian.&nbsp; The interfa=
ce between the Third Party application and the Data Custodian is known as =E2=
=80=9C<b>Connect My Data</b>=E2=80=9D, which defines the message exchanges b=
etween the Third Party application and the Data Custodian to allow the Third=
 Party to access data at the Data Custodian after a Retail Customer has gran=
ted the Third Party application access.</span><o:p></o:p></p><p class=3D"Mso=
Normal"><span style=3D"font-size:12.0pt;font-family:&quot;Cambria&quot;,&quo=
t;serif&quot;">&nbsp;</span><o:p></o:p></p><p class=3D"MsoNormal"><span styl=
e=3D"font-size:12.0pt;font-family:&quot;Cambria&quot;,&quot;serif&quot;">It i=
s my responsibility within the OpenADE Task Force to document the integratio=
n of the <b>OAuth 2.0</b> protocol with the <b>ESPI Standard.</b>&nbsp; Sinc=
e the <b>ESPI Standard</b> requires Retail Customers, Third Party applicatio=
ns, and Data Custodians to revoke Tokens (i.e. Access and Refresh Tokens) I a=
m very interested in the =E2=80=9C<b><i>Token Revocation (draft-ietf-oath-re=
vocation-xx)</i></b>=E2=80=9D work being done by you and your working group.=
 </span><o:p></o:p></p><p class=3D"MsoNormal"><span style=3D"font-size:12.0p=
t;font-family:&quot;Cambria&quot;,&quot;serif&quot;">&nbsp;</span><o:p></o:p=
></p><p class=3D"MsoNormal"><b><u><span style=3D"font-size:12.0pt;font-famil=
y:&quot;Cambria&quot;,&quot;serif&quot;">Token Revocation Request</span></u>=
</b><o:p></o:p></p><p class=3D"MsoNormal"><span style=3D"font-size:12.0pt;fo=
nt-family:&quot;Cambria&quot;,&quot;serif&quot;">&nbsp;</span><o:p></o:p></p=
><p class=3D"MsoNormal"><span style=3D"font-size:12.0pt;font-family:&quot;Ca=
mbria&quot;,&quot;serif&quot;">The <b>Token Revocation</b> request has only t=
he =E2=80=9Ctoken=E2=80=9D parameter with the description that the authoriza=
tion server is supposed to detect the token type automatically.&nbsp; I woul=
d like to request that an addition parameter =E2=80=9Ctoken_type=E2=80=9D be=
 added to the request.&nbsp; The =E2=80=9Ctoken_type=E2=80=9D parameter coul=
d be optional and would define the type of token being revoked (i.e. =E2=80=9C=
access=E2=80=9D, =E2=80=9Crefresh=E2=80=9D, =E2=80=9Cregistration access=E2=80=
=9D, etc.).</span><o:p></o:p></p><p class=3D"MsoNormal"><span style=3D"font-=
size:12.0pt;font-family:&quot;Cambria&quot;,&quot;serif&quot;">&nbsp;</span>=
<o:p></o:p></p><p class=3D"MsoNormal"><span style=3D"font-size:12.0pt;font-f=
amily:&quot;Cambria&quot;,&quot;serif&quot;">The <b>ESPI Standard</b> was de=
veloped to support the <b>Advanced Meter Interface</b> <b>(AMI) </b>which is=
 the interface used by =E2=80=9CSmart Meters=E2=80=9D to provide automated e=
nergy usage collection and other operational information about a Retail Cust=
omer=E2=80=99s residence to their Data Custodian.&nbsp; Third Party applicat=
ions will be required to obtain the approval if each Retail Customer that ha=
s had a =E2=80=9CSmart Meter=E2=80=9D installed before they will be able to a=
ccess the data provided by their =E2=80=9CSmart Meter=E2=80=9D.&nbsp; The nu=
mber of =E2=80=9CSmart Meters=E2=80=9D currently installed at the three larg=
est California utilities (Pacific Gas &amp; Electric, Southern California Ed=
ison, and San Diego Gas &amp; Electric) is in excess of 10.0 M and growing.&=
nbsp; The following table indicates the number of =E2=80=9CSmart Meters=E2=80=
=9D each of the three utilities had installed as of May 2012:</span><o:p></o=
:p></p><p class=3D"MsoNormal"><span style=3D"font-size:12.0pt;font-family:&q=
uot;Cambria&quot;,&quot;serif&quot;">&nbsp;</span><o:p></o:p></p><table clas=
s=3D"MsoNormalTable" border=3D"0" cellspacing=3D"0" cellpadding=3D"0" style=3D=
"margin-left:66.2pt;border-collapse:collapse"><tbody><tr><td width=3D"319" v=
align=3D"top" style=3D"width:239.4pt;border:solid windowtext 1.0pt;backgroun=
d:#A6A6A6;padding:0in 5.4pt 0in 5.4pt"><p class=3D"MsoNormal" align=3D"cente=
r" style=3D"text-align:center"><b><span style=3D"font-size:14.0pt;font-famil=
y:&quot;Cambria&quot;,&quot;serif&quot;">Utility</span></b><o:p></o:p></p></=
td><td width=3D"319" valign=3D"top" style=3D"width:239.4pt;border:solid wind=
owtext 1.0pt;border-left:none;background:#A6A6A6;padding:0in 5.4pt 0in 5.4pt=
"><p class=3D"MsoNormal" align=3D"center" style=3D"text-align:center"><b><sp=
an style=3D"font-size:14.0pt;font-family:&quot;Cambria&quot;,&quot;serif&quo=
t;">=E2=80=9CSmart Meters=E2=80=9D Installed</span></b><o:p></o:p></p></td><=
/tr><tr><td width=3D"319" valign=3D"top" style=3D"width:239.4pt;border:solid=
 windowtext 1.0pt;border-top:none;padding:0in 5.4pt 0in 5.4pt"><p class=3D"M=
soNormal"><span style=3D"font-size:12.0pt;font-family:&quot;Cambria&quot;,&q=
uot;serif&quot;">Pacific Gas &amp; Electric (PG&amp;E)</span><o:p></o:p></p>=
</td><td width=3D"319" valign=3D"top" style=3D"width:239.4pt;border-top:none=
;border-left:none;border-bottom:solid windowtext 1.0pt;border-right:solid wi=
ndowtext 1.0pt;padding:0in 5.4pt 0in 5.4pt"><p class=3D"MsoNormal" align=3D"=
right" style=3D"text-align:right"><span style=3D"font-size:12.0pt;font-famil=
y:&quot;Cambria&quot;,&quot;serif&quot;">4,696,000</span><o:p></o:p></p></td=
></tr><tr><td width=3D"319" valign=3D"top" style=3D"width:239.4pt;border:sol=
id windowtext 1.0pt;border-top:none;padding:0in 5.4pt 0in 5.4pt"><p class=3D=
"MsoNormal"><span style=3D"font-size:12.0pt;font-family:&quot;Cambria&quot;,=
&quot;serif&quot;">San Diego Gas &amp; Electric (SDG&amp;E)</span><o:p></o:p=
></p></td><td width=3D"319" valign=3D"top" style=3D"width:239.4pt;border-top=
:none;border-left:none;border-bottom:solid windowtext 1.0pt;border-right:sol=
id windowtext 1.0pt;padding:0in 5.4pt 0in 5.4pt"><p class=3D"MsoNormal" alig=
n=3D"right" style=3D"text-align:right"><span style=3D"font-size:12.0pt;font-=
family:&quot;Cambria&quot;,&quot;serif&quot;">1,364,000</span><o:p></o:p></p=
></td></tr><tr><td width=3D"319" valign=3D"top" style=3D"width:239.4pt;borde=
r:solid windowtext 1.0pt;border-top:none;padding:0in 5.4pt 0in 5.4pt"><p cla=
ss=3D"MsoNormal"><span style=3D"font-size:12.0pt;font-family:&quot;Cambria&q=
uot;,&quot;serif&quot;">Southern California Edison (SCE)</span><o:p></o:p></=
p></td><td width=3D"319" valign=3D"top" style=3D"width:239.4pt;border-top:no=
ne;border-left:none;border-bottom:solid windowtext 1.0pt;border-right:solid w=
indowtext 1.0pt;padding:0in 5.4pt 0in 5.4pt"><p class=3D"MsoNormal" align=3D=
"right" style=3D"text-align:right"><span style=3D"font-size:12.0pt;font-fami=
ly:&quot;Cambria&quot;,&quot;serif&quot;">3,900,000</span><o:p></o:p></p></t=
d></tr></tbody></table><p class=3D"MsoNormal"><span style=3D"font-size:12.0p=
t;font-family:&quot;Cambria&quot;,&quot;serif&quot;">&nbsp;</span><o:p></o:p=
></p><p class=3D"MsoNormal"><span style=3D"font-size:12.0pt;font-family:&quo=
t;Cambria&quot;,&quot;serif&quot;">The numbers in the chart were taken from t=
he =E2=80=9C<b><i>Utility-Scale Smart Meter Deployments, Plans, &amp; Propos=
als -- IEE Report</i></b>=E2=80=9D published May 2012 by <b>The Edison Found=
ation Institute for Electric Efficiency=E2=80=9D </b>which I have attached.&=
nbsp; The number of =E2=80=9CSmart Meters=E2=80=9D currently installed are e=
ven larger than shown in the report as I compose this email.&nbsp; Assuming 1=
0% of Pacific Gas &amp; Electric=E2=80=99s Retail Customers decide to utiliz=
e a Third Party application (3 Third Party applications are currently suppor=
ted and are 3 more Third Party applications are preparing to be supported) i=
n order to support the ability to revoke a token they would be required to t=
rack 500,000 access tokens and 500,000 refresh tokens.&nbsp; Requiring PG&am=
p;E=E2=80=99s authorization server to =E2=80=9Cautomatically=E2=80=9D determ=
ine the type of Token being revoked begins to negatively impact their proces=
sing capability.&nbsp; If the <b>Token Revocation</b> request was capable of=
 indicating the type of Token to be revoked, the amount of time it will take=
 PG&amp;E=E2=80=99s authorization server would show a significant time savin=
gs to process the request.</span><o:p></o:p></p><p class=3D"MsoNormal"><span=
 style=3D"font-size:12.0pt;font-family:&quot;Cambria&quot;,&quot;serif&quot;=
">&nbsp;</span><o:p></o:p></p><p class=3D"MsoNormal"><b><u><span style=3D"fo=
nt-size:12.0pt;font-family:&quot;Cambria&quot;,&quot;serif&quot;">Authorizat=
ion Server Revocation Policy</span></u></b><o:p></o:p></p><p class=3D"MsoNor=
mal"><span style=3D"font-size:12.0pt;font-family:&quot;Cambria&quot;,&quot;s=
erif&quot;">&nbsp;</span><o:p></o:p></p><p class=3D"MsoNormal"><span style=3D=
"font-size:12.0pt;font-family:&quot;Cambria&quot;,&quot;serif&quot;">&nbsp;<=
/span><o:p></o:p></p><p class=3D"MsoListParagraph" style=3D"text-indent:-.25=
in"><span style=3D"font-size:12.0pt;font-family:&quot;Cambria&quot;,&quot;se=
rif&quot;">&nbsp;&nbsp;&nbsp;&nbsp;&nbsp; </span>6.<span style=3D"font-size:=
7.0pt;font-family:&quot;Times New Roman , serif&quot;,&quot;serif&quot;">&nb=
sp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp; </span>Does the revocation of the access t=
oken also revoke the refresh token (if it was provided) ? Or is this a revoc=
ation policy decision ?<o:p></o:p></p><p class=3D"MsoNormal"><span style=3D"=
font-size:12.0pt;font-family:&quot;Cambria&quot;,&quot;serif&quot;">&nbsp;</=
span><o:p></o:p></p><p class=3D"MsoNormal" style=3D"margin-left:1.0in"><span=
 style=3D"font-size:12.0pt;font-family:&quot;Times New Roman , serif&quot;,&=
quot;serif&quot;">- if the token passed to the request is a refresh token an=
d the server supports access token revocation, the server SHOULD also revoke=
 them.<br>- if the token passed to the request is an access token, the serve=
r may decide to revoke the respective refresh token as well.</span><o:p></o:=
p></p><p class=3D"MsoNormal" style=3D"margin-left:1.0in"><span style=3D"font=
-size:12.0pt;font-family:&quot;Times New Roman , serif&quot;,&quot;serif&quo=
t;">&nbsp;</span><o:p></o:p></p><p class=3D"MsoNormal" style=3D"margin-left:=
1.0in"><span style=3D"font-size:12.0pt;font-family:&quot;Times New Roman , s=
erif&quot;,&quot;serif&quot;">I believe that if the token passed in the requ=
est is an access token, the server MUST revoke any respective refresh token.=
&nbsp; Otherwise, their exist a potential security risk of the respective re=
fresh token being used to gain access to the resources for which the access t=
oken was issued.&nbsp; It also means the authorization server will have pote=
ntial =E2=80=9Cjunk=E2=80=9D in the refresh token file to search through for=
 any additional Token Revocation request.</span><o:p></o:p></p><p class=3D"M=
soNormal" style=3D"margin-left:1.0in"><span style=3D"font-size:12.0pt;font-f=
amily:&quot;Times New Roman , serif&quot;,&quot;serif&quot;">&nbsp;</span><o=
:p></o:p></p><p class=3D"MsoNormal"><span style=3D"font-size:12.0pt;font-fam=
ily:&quot;Times New Roman , serif&quot;,&quot;serif&quot;">I look forward to=
 receiving your response.</span><o:p></o:p></p><p class=3D"MsoNormal"><span s=
tyle=3D"font-size:12.0pt;font-family:&quot;Cambria&quot;,&quot;serif&quot;">=
&nbsp;</span><o:p></o:p></p><p class=3D"MsoNormal"><span style=3D"font-size:=
12.0pt">Best regards,</span><o:p></o:p></p><p class=3D"MsoNormal"><span styl=
e=3D"font-size:24.0pt;font-family:&quot;Brush Script MT&quot;">Don</span><o:=
p></o:p></p><p class=3D"MsoNormal"><span style=3D"font-size:12.0pt">Donald F.=
 Coffin</span><o:p></o:p></p><p class=3D"MsoNormal"><span style=3D"font-size=
:12.0pt">Founder/CTO</span><o:p></o:p></p><p class=3D"MsoNormal"><span style=
=3D"font-size:12.0pt">&nbsp;</span><o:p></o:p></p><p class=3D"MsoNormal"><sp=
an style=3D"font-size:12.0pt">REMI Networks</span><o:p></o:p></p><p class=3D=
"MsoNormal"><span style=3D"font-size:12.0pt">22751 El Prado Suite 6216</span=
><o:p></o:p></p><p class=3D"MsoNormal"><span style=3D"font-size:12.0pt">Ranc=
ho Santa Margarita, CA&nbsp; 92688-3836</span><o:p></o:p></p><p class=3D"Mso=
Normal"><span style=3D"font-size:12.0pt">&nbsp;</span><o:p></o:p></p><p clas=
s=3D"MsoNormal"><span style=3D"font-size:12.0pt">Phone:&nbsp;&nbsp;&nbsp;&nb=
sp;&nbsp; (949) 636-8571</span><o:p></o:p></p><p class=3D"MsoNormal"><span s=
tyle=3D"font-size:12.0pt">Email:&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp; <a href=
=3D"mailto:donald.coffin@reminetworks.com">donald.coffin@reminetworks.com</a=
></span><o:p></o:p></p><p class=3D"MsoNormal">&nbsp;<o:p></o:p></p><p class=3D=
"MsoNormal"><span style=3D"font-size:12.0pt;font-family:&quot;Times New Roma=
n , serif&quot;,&quot;serif&quot;"><br><br><br><br><br></span><o:p></o:p></p=
><pre>_______________________________________________<o:p></o:p></pre><pre>O=
Auth mailing list<o:p></o:p></pre><pre><a href=3D"mailto:OAuth@ietf.org">OAu=
th@ietf.org</a><o:p></o:p></pre><pre><a href=3D"https://www.ietf.org/mailman=
/listinfo/oauth">https://www.ietf.org/mailman/listinfo/oauth</a><o:p></o:p><=
/pre></blockquote><p class=3D"MsoNormal"><span style=3D"font-size:12.0pt;fon=
t-family:&quot;Times New Roman , serif&quot;,&quot;serif&quot;">&nbsp;</span=
><o:p></o:p></p></div></div><p class=3D"MsoNormal"><span style=3D"font-size:=
12.0pt;font-family:&quot;Times New Roman&quot;,&quot;serif&quot;"><o:p>&nbsp=
;</o:p></span></p></div></div></blockquote></body></html>=

--Apple-Mail-67BDD6D1-D210-4B99-9CA0-CC32BC500837--

From donald.coffin@reminetworks.com  Sun Feb  3 13:59:46 2013
Return-Path: <donald.coffin@reminetworks.com>
X-Original-To: oauth@ietfa.amsl.com
Delivered-To: oauth@ietfa.amsl.com
Received: from localhost (localhost [127.0.0.1]) by ietfa.amsl.com (Postfix) with ESMTP id 18DA821F88A1 for <oauth@ietfa.amsl.com>; Sun,  3 Feb 2013 13:59:46 -0800 (PST)
X-Virus-Scanned: amavisd-new at amsl.com
X-Spam-Flag: NO
X-Spam-Score: -0.459
X-Spam-Level: 
X-Spam-Status: No, score=-0.459 tagged_above=-999 required=5 tests=[AWL=0.410,  BAYES_05=-1.11, HTML_MESSAGE=0.001, RCVD_IN_DNSWL_LOW=-1, SARE_LWSHORTT=1.24]
Received: from mail.ietf.org ([64.170.98.30]) by localhost (ietfa.amsl.com [127.0.0.1]) (amavisd-new, port 10024) with ESMTP id TYMQW1MKIPee for <oauth@ietfa.amsl.com>; Sun,  3 Feb 2013 13:59:43 -0800 (PST)
Received: from oproxy12-pub.bluehost.com (oproxy12-pub.bluehost.com [50.87.16.10]) by ietfa.amsl.com (Postfix) with SMTP id 83F5121F889D for <oauth@ietf.org>; Sun,  3 Feb 2013 13:59:41 -0800 (PST)
Received: (qmail 28736 invoked by uid 0); 3 Feb 2013 21:59:17 -0000
Received: from unknown (HELO host125.hostmonster.com) (74.220.207.125) by oproxy12.bluehost.com with SMTP; 3 Feb 2013 21:59:17 -0000
DKIM-Signature: v=1; a=rsa-sha256; q=dns/txt; c=relaxed/relaxed; d=reminetworks.com; s=default;  h=Content-Type:MIME-Version:Message-ID:Date:Subject:In-Reply-To:References:Cc:To:From; bh=0vQAepDVMtG26XTKF85kQKGveB6KO24cVrGwp/fyIU0=;  b=nZzXILmTCNlsof7sPvITeL5cdZxzM9Q4rPKkUM9PcgaOaijItY39flYCzBzc0JcesOoHmiIV1tAQc3N/GI7qBY9yXLFs1SubrmiwDVX59lp3EhtxdQvnzZYbKJDQwYuz;
Received: from [68.4.207.246] (port=2098 helo=HPPavilionElite) by host125.hostmonster.com with esmtpa (Exim 4.80) (envelope-from <donald.coffin@reminetworks.com>) id 1U27an-0007OF-2A; Sun, 03 Feb 2013 14:59:17 -0700
From: "Donald F Coffin" <donald.coffin@reminetworks.com>
To: "'Torsten Lodderstedt'" <torsten@lodderstedt.net>
References: <006401cdfe5f$2555f170$7001d450$@reminetworks.com> <51085B43.3080103@aol.com> <00c901cdfe80$e7d0eb30$b772c190$@reminetworks.com> <9DFD603A-1170-41D8-A22F-8654D55546B3@lodderstedt.net> <00a301ce0205$b6b1ca00$24155e00$@reminetworks.com> <510E560A.4090107@lodderstedt.net> <003e01ce024f$6894feb0$39befc10$@reminetworks.com> <446E24A6-1E3A-4596-AAEA-8B6F1AD7D1A0@lodderstedt.net>
In-Reply-To: <446E24A6-1E3A-4596-AAEA-8B6F1AD7D1A0@lodderstedt.net>
Date: Sun, 3 Feb 2013 13:59:06 -0800
Message-ID: <006601ce0259$b05db840$111928c0$@reminetworks.com>
MIME-Version: 1.0
Content-Type: multipart/alternative; boundary="----=_NextPart_000_0067_01CE0216.A2406BB0"
X-Mailer: Microsoft Outlook 14.0
Thread-Index: AQGqJs1aP2O8OPoDFE4j2TX8/D0+WgJbNiMKAkqArjkBxPa5mwH8o5RMAdFqZ0cBjwcubAIIPbhsmEHfmFA=
Content-Language: en-us
X-Identified-User: {1395:host125.hostmonster.com:reminetw:reminetworks.com} {sentby:smtp auth 68.4.207.246 authed with donald.coffin@reminetworks.com}
Cc: 'John Adkins' <jva2@pge.com>, 'Marty Burns' <marty@hypertek.us>, 'Scott Crowder' <scott.crowder@qadoenergy.com>, 'Dave Robin' <drobin@automatedlogic.com>, 'John Teeter' <john.teeter@peoplepowerco.com>, pmadsen@pingidentity.com, 'Edward Denson' <ewd7@pge.com>, oauth@ietf.org, 'Ray Perlner' <ray.perlner@nist.gov>, 'Anne Hendry' <ahendry2@gmail.com>, 'Lynne Rodoni' <mrodoni@semprautilities.com>, 'Uday Verma' <uday.verma@ilinknet.com>
Subject: Re: [OAUTH-WG] draft-ietf-oauth-revocation-04
X-BeenThere: oauth@ietf.org
X-Mailman-Version: 2.1.12
Precedence: list
List-Id: OAUTH WG <oauth.ietf.org>
List-Unsubscribe: <https://www.ietf.org/mailman/options/oauth>, <mailto:oauth-request@ietf.org?subject=unsubscribe>
List-Archive: <http://www.ietf.org/mail-archive/web/oauth>
List-Post: <mailto:oauth@ietf.org>
List-Help: <mailto:oauth-request@ietf.org?subject=help>
List-Subscribe: <https://www.ietf.org/mailman/listinfo/oauth>, <mailto:oauth-request@ietf.org?subject=subscribe>
X-List-Received-Date: Sun, 03 Feb 2013 21:59:46 -0000

This is a multipart message in MIME format.

------=_NextPart_000_0067_01CE0216.A2406BB0
Content-Type: text/plain;
	charset="UTF-8"
Content-Transfer-Encoding: quoted-printable

Hi Torsten,

=20

The Third Party will utilize an access_token they obtain utilizing the =
client_credentials to obtain data from the RS for all Retail Customers =
who have granted them access to their data.  Therefore, the Third Party =
will also have an access_token they obtain utilizing the =
authentication_code response_type (i.e. grant_type of code for the =
access_token) for each of the Retail Customers who have authorized them =
access to their data.

=20

Although an access_token will exist for the Third Party, Retail =
Customer, and RS relationship its usage will be infrequent compared to =
the access_token the Third Party obtains using the client_credentials =
grant_type.  This is another reason why I believe in the ESPI Standard =
implementation it will be necessary to revoke the access_token and =
refresh_token simultaneously.  The RS should not include in the data =
stream (covered by the client_credentials access_token) data that is =
based on the authorization_code access_token when the Retail Customer =
has indicated  (either by alteration of the authorization scope or an =
outright revocation) the Third Party no longer is authorized to access =
the data.  Only revoking the refresh_token possess a privacy.  Only =
revoking the access_token, as you pointed out, poses a potential =
security issue allowing for the possibility of a denial of service =
attack.

=20

I hope this makes sense and clarifies my situation..

=20

Best regards,

Don

Donald F. Coffin

Founder/CTO

=20

REMI Networks

22751 El Prado Suite 6216

Rancho Santa Margarita, CA  92688-3836

=20

Phone:      (949) 636-8571

Email:        <mailto:donald.coffin@reminetworks.com> =
donald.coffin@reminetworks.com

=20

From: Torsten Lodderstedt [mailto:torsten@lodderstedt.net]=20
Sent: Sunday, February 03, 2013 1:14 PM
To: Donald F Coffin
Cc: George Fletcher; John Adkins; Scott Crowder; Dave Robin; John =
Teeter; <pmadsen@pingidentity.com>; Edward Denson; Marty Burns; Uday =
Verma; Ray Perlner; Anne Hendry; Lynne Rodoni; <oauth@ietf.org>
Subject: Re: [OAUTH-WG] draft-ietf-oauth-revocation-04

=20

Hi Donald,

=20

Thanks for the clarification. Let me see whether I got you right. =
Although the retail customer has to authorize the access by the 3rd =
party application, there is no external representation of this =
authorization grant (e.g a refresh token). Instead, the actual access =
token is issued based on client credentials. Is there any correlation =
between the access token and the particular customer?

=20

Please note: we highly appreciate your feedback as an implementer.

=20

Best regards,

Torsten.


Am 03.02.2013 um 21:45 schrieb "Donald F Coffin" =
<donald.coffin@reminetworks.com>:

Hi Torsten,

=20

Best regards,

Don

Donald F. Coffin

Founder/CTO

=20

REMI Networks

22751 El Prado Suite 6216

Rancho Santa Margarita, CA  92688-3836

=20

Phone:      (949) 636-8571

Email:       donald.coffin@reminetworks.com

=20

From: Torsten Lodderstedt [mailto:torsten@lodderstedt.net]=20
Sent: Sunday, February 03, 2013 4:20 AM
To: Donald F Coffin
Cc: 'George Fletcher'; 'John Adkins'; 'Scott Crowder'; 'Dave Robin'; =
'John Teeter'; pmadsen@pingidentity.com; 'Edward Denson'; 'Marty Burns'; =
'Uday Verma'; 'Ray Perlner'; 'Anne Hendry'; 'Lynne Rodoni'; =
oauth@ietf.org
Subject: Re: [OAUTH-WG] draft-ietf-oauth-revocation-04

=20

Hi Donald,

Am 03.02.2013 12:57, schrieb Donald F Coffin:

<snip>=20

=20

[Don] A typical Third Party application built to use the ESPI Standard =
will interact with a Retail Customer and their energy provider.  The =
nature of interaction with the Retail Customer will utilize short =
interactive sessions.  However, the interaction with their energy =
provider will require the application obtain new energy information for =
the previous 24-hours once a day.  Therefore, I anticipate access_tokens =
will be granted for long periods of time as well as any supporting =
refresh_tokens.  Because of the amount of data being exchanged between =
the Third Party application and the energy provider, both in number of =
retail customers and the amount of energy meter data, it will be =
necessary to minimize the amount of =E2=80=9Cadministrative=E2=80=9D =
traffic required in the exchange.  Therefore, although I understand the =
use case you described, I anticipate such an implementation would be =
rare. =20

=20

The need to perform an audience style check to prevent exposure of the =
AS to a denial of service attack, appears primarily due to the fact the =
Revocation RFC requires an access_token and refresh_token to be revoked =
independently.  Should a client need to revoke both Tokens the sequence =
of the revocation request is extremely significant.  A simple solution =
to this problem would be to provide a method that allows a request to =
revoke both tokens simultaneously, as stated in one of the responses you =
referenced in the archives. =20

=20

The example you gave in your response demonstrating how a denial of =
service attack might occur is incorrect.  You said =E2=80=9Cif the AS =
revokes the refresh_token when an access_token is revoked, I can steal =
an access_token and send it to the revocation endpoint causing the real =
client=E2=80=99s refresh_token to be revoked=E2=80=9D.  I fail to see =
how that could occur, since the AS revoked both the access_token and the =
refresh_token when it received the request to revoke the access_token.  =
Rather than explaining why a refresh_token shouldn=E2=80=99t be revoked =
concurrently when an access_token is revoked, your example does the =
exact opposite.  It shows why a refresh_token should be revoked =
concurrently when an access_token is revoked.

=20

[Don] The focus of the ESPI Standard is to provide Retail =
Customer=E2=80=99s with access to a single UsagePoint (i.e. their Smart =
Meter).  Therefore an access and refresh token will be tightly =
correlated with the type and frequency of data the Smart Meter provides. =
 There are only a few reasons defined within the ESPI Standard list of =
use cases that will require the Token Revocation request to be issued.  =
The following summarizes the situations that require a Token Revocation =
request:

=C2=B7         A Third Party application wishes to terminate their =
relationship with a Retail Customer.

=C2=B7         A Third Party application wishes to terminate their =
relationship with a Data Custodian.

=C2=B7         A Retail Customer wishes to terminate their relationship =
with a Third Party application.

=C2=B7         A Retail Customer wishes to change the data (i.e. scope) =
a Third Party application has permission to access.

In none of the above situations will it be valid to retain a refresh =
token, which I realize is implementation dependent, due to the nature of =
the ESPI Standard.

Perhaps the section on the Server=E2=80=99s Revocation Policy should =
address a few of the reasons why a client may want or need to revoke a =
token.  The current description provides no consideration for the =
relationship between tokens and scope, although there clearly is a =
relationship.

I'm confident client or resource owner would revoke refresh (and not =
access) tokens in all use cases you listed above. In my opinion, access =
tokens are revoked only if the authorization server does not support =
refresh tokens and therefore uses long term access tokens or in =
high-security applications.

=20

[Don] Based on the above statement it would appear you assume an access =
token is only valid for a short period of time.  However, as I explained =
in my last response, due to the nature of the access required by the =
client and the manner in which the RS provides that data, access token =
durations will typically be in days not minutes.   Therefore, merely =
revoking a refresh_token will expose the data to access that the =
resource owner meant to prevent unless the access_token is also revoked.


I don't understand why access tokens need such a long duration in your =
scenario, even if the client needs to obtain energy data once a day. Any =
client can (potentially) obtain a new access token at any time if the =
access token expires if the authorization server issues corresponding =
refresh tokens. So even in your scenario, access tokens could have a =
short duration. If you want to issue long-living access tokens in order =
to minimize load on the authorization servers, then you have to consider =
the extra complexitity and load required to notify resource servers of =
access token revocation. It's a tradeoff decision, which we tried to =
describe in =
http://tools.ietf.org/html/draft-ietf-oauth-revocation-04#section-3.=20




=20

[Don] A critical fact I omitted in my last response is the data obtained =
on a daily basis by a Third Party application will utilize an =
access_token obtained using the client_credentials grant_type.  =
Therefore no refresh_token will be issued with the access_token.  The =
ESPI Standard requires the Retail Customer (resource owner) and the RS =
to be notified whenever an authorization is modified or revoked by =
either the Third Party (client) or Retail Customer (resource owner).  =
Therefore, the tradeoff decision has already been made.

=20

I personally feel that short lived access_tokens provide greater =
security, but in discussions with several utilities who have the =
responsibility of supporting the AS and RS functionality, they currently =
are planning on implementing long duration access_tokens.  This view may =
change once the begin to implement =E2=80=9CConnect My Data=E2=80=9D =
solutions, but that again is an implementation feature, which is beyond =
the scope of my groups current work product.




=20

I would also like to hear the opinion of other WG members on this topic.

=20

3. If the standard OAuth spec does not provide enough control, your =
profile of OAuth2 for the ESPI can tighten it to provide the protections =
desired.

[Don] I am aware we can provide additional parameters required to =
integrate OAuth 2.0 with the ESPI Standard by submitting those parameter =
values to the OAuth Parameters registry. I would prefer not to do that, =
given the large amount of work being done on RFC-drafts to resolve many =
of the issues we are facing to integrate OAuth 2.0 with the ESPI =
Standard, since the need to use those extensions will most likely be =
short lived.

=20

Hmmm, if the need is only short lived, why do you want to make it part =
of the long living revocation RFC?

=20

[Don] My response was to the suggestion that if the OAuth specification =
does not provide enough control then the ESPI profile of OAuth 2.0 could =
tighten it to provide the protections desired.  I assumed George meant =
we could add additional =E2=80=9Ccompany=E2=80=9D based parameters, =
which requires us to register them with the =E2=80=9COAuth Parameter =
Registry=E2=80=9D.  I meant the usage of such =E2=80=9Ccompany=E2=80=9D =
parameters would be short termed.


Understood.





I do not view the need to identify the type of token being revoked as =
=E2=80=9Cshort term=E2=80=9D.  Even the previous exchanges on the topic =
within the WG indicates it feels there may be a need to add an =
additional parameter to the request.  However, because the draft is too =
far along, the WG seems to prefer releasing an RFC they =
=E2=80=9Csuspect=E2=80=9D will need to be adjusted and let the =
implementers confirm their suspicions.   This seems to be a very selfish =
and rather foolish attitude given we are discussing a security protocol. =
 Not to mention it would seem easier and faster to add an additional =
=E2=80=9Coptional=E2=80=9D parameter now, rather than requiring another =
RFC cycle.  A parameter I sensed in reading the archives the WG feels =
will very likely need to be added in the future.


Since this is a WG item, it is up to the WG to decide.

=20

[Don] I fully understand it is the WG=E2=80=99s decision.  I am only =
providing my opinion as an implementer, who the WG desires to obtain =
feedback from before making the final decision.



regards,
Torsten.











Thanks,
George

On 1/29/13 3:28 PM, Donald F Coffin wrote:

Hi Thorsten,

=20

I am working with the OpenADE Task Force to document how the =
=E2=80=9CEnergy Service Provider Interface (ESPI) Standard =E2=80=9D =
published by the North American Energy Standards Board (NAESB) in =
October of 2011 should be implemented.  The ESPI Standard defines how =
Retail Customers, Third Party applications, and Data Custodians (i.e. =
electrical, gas, or water utility) must interface to each other and the =
data format used to exchange energy information.   The interface between =
the Retail Customer and the Data Custodian is known as =E2=80=9CDownload =
My Data=E2=80=9D, which defines how a Retail Customer receives their =
energy information in an XML file downloaded to them by the Data =
Custodian.  The interface between the Third Party application and the =
Data Custodian is known as =E2=80=9CConnect My Data=E2=80=9D, which =
defines the message exchanges between the Third Party application and =
the Data Custodian to allow the Third Party to access data at the Data =
Custodian after a Retail Customer has granted the Third Party =
application access.

=20

It is my responsibility within the OpenADE Task Force to document the =
integration of the OAuth 2.0 protocol with the ESPI Standard.  Since the =
ESPI Standard requires Retail Customers, Third Party applications, and =
Data Custodians to revoke Tokens (i.e. Access and Refresh Tokens) I am =
very interested in the =E2=80=9CToken Revocation =
(draft-ietf-oath-revocation-xx)=E2=80=9D work being done by you and your =
working group.=20

=20

Token Revocation Request

=20

The Token Revocation request has only the =E2=80=9Ctoken=E2=80=9D =
parameter with the description that the authorization server is supposed =
to detect the token type automatically.  I would like to request that an =
addition parameter =E2=80=9Ctoken_type=E2=80=9D be added to the request. =
 The =E2=80=9Ctoken_type=E2=80=9D parameter could be optional and would =
define the type of token being revoked (i.e. =E2=80=9Caccess=E2=80=9D, =
=E2=80=9Crefresh=E2=80=9D, =E2=80=9Cregistration access=E2=80=9D, etc.).

=20

The ESPI Standard was developed to support the Advanced Meter Interface =
(AMI) which is the interface used by =E2=80=9CSmart Meters=E2=80=9D to =
provide automated energy usage collection and other operational =
information about a Retail Customer=E2=80=99s residence to their Data =
Custodian.  Third Party applications will be required to obtain the =
approval if each Retail Customer that has had a =E2=80=9CSmart =
Meter=E2=80=9D installed before they will be able to access the data =
provided by their =E2=80=9CSmart Meter=E2=80=9D.  The number of =
=E2=80=9CSmart Meters=E2=80=9D currently installed at the three largest =
California utilities (Pacific Gas & Electric, Southern California =
Edison, and San Diego Gas & Electric) is in excess of 10.0 M and =
growing.  The following table indicates the number of =E2=80=9CSmart =
Meters=E2=80=9D each of the three utilities had installed as of May =
2012:

=20


Utility

=E2=80=9CSmart Meters=E2=80=9D Installed


Pacific Gas & Electric (PG&E)

4,696,000


San Diego Gas & Electric (SDG&E)

1,364,000


Southern California Edison (SCE)

3,900,000

=20

The numbers in the chart were taken from the =E2=80=9CUtility-Scale =
Smart Meter Deployments, Plans, & Proposals -- IEE Report=E2=80=9D =
published May 2012 by The Edison Foundation Institute for Electric =
Efficiency=E2=80=9D which I have attached.  The number of =E2=80=9CSmart =
Meters=E2=80=9D currently installed are even larger than shown in the =
report as I compose this email.  Assuming 10% of Pacific Gas & =
Electric=E2=80=99s Retail Customers decide to utilize a Third Party =
application (3 Third Party applications are currently supported and are =
3 more Third Party applications are preparing to be supported) in order =
to support the ability to revoke a token they would be required to track =
500,000 access tokens and 500,000 refresh tokens.  Requiring =
PG&E=E2=80=99s authorization server to =E2=80=9Cautomatically=E2=80=9D =
determine the type of Token being revoked begins to negatively impact =
their processing capability.  If the Token Revocation request was =
capable of indicating the type of Token to be revoked, the amount of =
time it will take PG&E=E2=80=99s authorization server would show a =
significant time savings to process the request.

=20

Authorization Server Revocation Policy

=20

=20

      6.       Does the revocation of the access token also revoke the =
refresh token (if it was provided) ? Or is this a revocation policy =
decision ?

=20

- if the token passed to the request is a refresh token and the server =
supports access token revocation, the server SHOULD also revoke them.
- if the token passed to the request is an access token, the server may =
decide to revoke the respective refresh token as well.

=20

I believe that if the token passed in the request is an access token, =
the server MUST revoke any respective refresh token.  Otherwise, their =
exist a potential security risk of the respective refresh token being =
used to gain access to the resources for which the access token was =
issued.  It also means the authorization server will have potential =
=E2=80=9Cjunk=E2=80=9D in the refresh token file to search through for =
any additional Token Revocation request.

=20

I look forward to receiving your response.

=20

Best regards,

Don

Donald F. Coffin

Founder/CTO

=20

REMI Networks

22751 El Prado Suite 6216

Rancho Santa Margarita, CA  92688-3836

=20

Phone:      (949) 636-8571

Email:       donald.coffin@reminetworks.com

=20









_______________________________________________
OAuth mailing list
OAuth@ietf.org
https://www.ietf.org/mailman/listinfo/oauth

=20

=20


------=_NextPart_000_0067_01CE0216.A2406BB0
Content-Type: text/html;
	charset="UTF-8"
Content-Transfer-Encoding: quoted-printable

<html xmlns:v=3D"urn:schemas-microsoft-com:vml" =
xmlns:o=3D"urn:schemas-microsoft-com:office:office" =
xmlns:w=3D"urn:schemas-microsoft-com:office:word" =
xmlns:m=3D"http://schemas.microsoft.com/office/2004/12/omml" =
xmlns=3D"http://www.w3.org/TR/REC-html40"><head><meta =
http-equiv=3DContent-Type content=3D"text/html; charset=3Dutf-8"><meta =
name=3DGenerator content=3D"Microsoft Word 14 (filtered =
medium)"><style><!--
/* Font Definitions */
@font-face
	{font-family:Helvetica;
	panose-1:2 11 6 4 2 2 2 2 2 4;}
@font-face
	{font-family:Wingdings;
	panose-1:5 0 0 0 0 0 0 0 0 0;}
@font-face
	{font-family:"Cambria Math";
	panose-1:2 4 5 3 5 4 6 3 2 4;}
@font-face
	{font-family:Cambria;
	panose-1:2 4 5 3 5 4 6 3 2 4;}
@font-face
	{font-family:Calibri;
	panose-1:2 15 5 2 2 2 4 3 2 4;}
@font-face
	{font-family:Tahoma;
	panose-1:2 11 6 4 3 5 4 4 2 4;}
@font-face
	{font-family:"Brush Script MT";
	panose-1:3 6 8 2 4 4 6 7 3 4;}
@font-face
	{font-family:Consolas;
	panose-1:2 11 6 9 2 2 4 3 2 4;}
@font-face
	{font-family:"Times New Roman \, serif";}
/* Style Definitions */
p.MsoNormal, li.MsoNormal, div.MsoNormal
	{margin:0in;
	margin-bottom:.0001pt;
	font-size:11.0pt;
	font-family:"Calibri","sans-serif";
	color:black;}
a:link, span.MsoHyperlink
	{mso-style-priority:99;
	color:blue;
	text-decoration:underline;}
a:visited, span.MsoHyperlinkFollowed
	{mso-style-priority:99;
	color:purple;
	text-decoration:underline;}
pre
	{mso-style-priority:99;
	mso-style-link:"HTML Preformatted Char";
	margin:0in;
	margin-bottom:.0001pt;
	font-size:10.0pt;
	font-family:"Courier New";
	color:black;}
p.MsoAcetate, li.MsoAcetate, div.MsoAcetate
	{mso-style-priority:99;
	mso-style-link:"Balloon Text Char";
	margin:0in;
	margin-bottom:.0001pt;
	font-size:8.0pt;
	font-family:"Tahoma","sans-serif";
	color:black;}
p.MsoListParagraph, li.MsoListParagraph, div.MsoListParagraph
	{mso-style-priority:34;
	margin-top:0in;
	margin-right:0in;
	margin-bottom:0in;
	margin-left:.5in;
	margin-bottom:.0001pt;
	font-size:11.0pt;
	font-family:"Calibri","sans-serif";
	color:black;}
span.HTMLPreformattedChar
	{mso-style-name:"HTML Preformatted Char";
	mso-style-priority:99;
	mso-style-link:"HTML Preformatted";
	font-family:Consolas;
	color:black;}
span.BalloonTextChar
	{mso-style-name:"Balloon Text Char";
	mso-style-priority:99;
	mso-style-link:"Balloon Text";
	font-family:"Tahoma","sans-serif";
	color:black;}
span.EmailStyle22
	{mso-style-type:personal;
	font-family:"Cambria","serif";
	color:windowtext;}
span.EmailStyle23
	{mso-style-type:personal;
	font-family:"Cambria","serif";
	color:windowtext;
	font-weight:normal;
	font-style:normal;}
span.EmailStyle24
	{mso-style-type:personal;
	font-family:"Cambria","serif";
	color:windowtext;
	font-weight:normal;
	font-style:normal;}
span.EmailStyle25
	{mso-style-type:personal;
	font-family:"Cambria","serif";
	color:windowtext;
	font-weight:normal;
	font-style:normal;}
span.EmailStyle26
	{mso-style-type:personal-reply;
	font-family:"Cambria","serif";
	color:windowtext;
	font-weight:normal;
	font-style:normal;}
.MsoChpDefault
	{mso-style-type:export-only;
	font-size:10.0pt;}
@page WordSection1
	{size:8.5in 11.0in;
	margin:1.0in 1.0in 1.0in 1.0in;}
div.WordSection1
	{page:WordSection1;}
/* List Definitions */
@list l0
	{mso-list-id:217783835;
	mso-list-type:hybrid;
	mso-list-template-ids:1090914056 67698689 67698691 67698693 67698689 =
67698691 67698693 67698689 67698691 67698693;}
@list l0:level1
	{mso-level-number-format:bullet;
	mso-level-text:=EF=82=B7;
	mso-level-tab-stop:none;
	mso-level-number-position:left;
	margin-left:.75in;
	text-indent:-.25in;
	font-family:Symbol;}
@list l0:level2
	{mso-level-number-format:bullet;
	mso-level-text:o;
	mso-level-tab-stop:none;
	mso-level-number-position:left;
	margin-left:1.25in;
	text-indent:-.25in;
	font-family:"Courier New";}
@list l0:level3
	{mso-level-number-format:bullet;
	mso-level-text:=EF=82=A7;
	mso-level-tab-stop:none;
	mso-level-number-position:left;
	margin-left:1.75in;
	text-indent:-.25in;
	font-family:Wingdings;}
@list l0:level4
	{mso-level-number-format:bullet;
	mso-level-text:=EF=82=B7;
	mso-level-tab-stop:none;
	mso-level-number-position:left;
	margin-left:2.25in;
	text-indent:-.25in;
	font-family:Symbol;}
@list l0:level5
	{mso-level-number-format:bullet;
	mso-level-text:o;
	mso-level-tab-stop:none;
	mso-level-number-position:left;
	margin-left:2.75in;
	text-indent:-.25in;
	font-family:"Courier New";}
@list l0:level6
	{mso-level-number-format:bullet;
	mso-level-text:=EF=82=A7;
	mso-level-tab-stop:none;
	mso-level-number-position:left;
	margin-left:3.25in;
	text-indent:-.25in;
	font-family:Wingdings;}
@list l0:level7
	{mso-level-number-format:bullet;
	mso-level-text:=EF=82=B7;
	mso-level-tab-stop:none;
	mso-level-number-position:left;
	margin-left:3.75in;
	text-indent:-.25in;
	font-family:Symbol;}
@list l0:level8
	{mso-level-number-format:bullet;
	mso-level-text:o;
	mso-level-tab-stop:none;
	mso-level-number-position:left;
	margin-left:4.25in;
	text-indent:-.25in;
	font-family:"Courier New";}
@list l0:level9
	{mso-level-number-format:bullet;
	mso-level-text:=EF=82=A7;
	mso-level-tab-stop:none;
	mso-level-number-position:left;
	margin-left:4.75in;
	text-indent:-.25in;
	font-family:Wingdings;}
ol
	{margin-bottom:0in;}
ul
	{margin-bottom:0in;}
--></style><!--[if gte mso 9]><xml>
<o:shapedefaults v:ext=3D"edit" spidmax=3D"1026" />
</xml><![endif]--><!--[if gte mso 9]><xml>
<o:shapelayout v:ext=3D"edit">
<o:idmap v:ext=3D"edit" data=3D"1" />
</o:shapelayout></xml><![endif]--></head><body lang=3DEN-US link=3Dblue =
vlink=3Dpurple><div class=3DWordSection1><p class=3DMsoNormal><span =
style=3D'font-size:12.0pt;font-family:"Cambria","serif";color:windowtext'=
>Hi Torsten,<o:p></o:p></span></p><p class=3DMsoNormal><span =
style=3D'font-size:12.0pt;font-family:"Cambria","serif";color:windowtext'=
><o:p>&nbsp;</o:p></span></p><p class=3DMsoNormal><span =
style=3D'font-size:12.0pt;font-family:"Cambria","serif";color:windowtext'=
>The Third Party will utilize an access_token they obtain utilizing the =
client_credentials to obtain data from the RS for all Retail Customers =
who have granted them access to their data.=C2=A0 Therefore, the Third =
Party will also have an access_token they obtain utilizing the =
authentication_code response_type (i.e. grant_type of code for the =
access_token) for each of the Retail Customers who have authorized them =
access to their data.<o:p></o:p></span></p><p class=3DMsoNormal><span =
style=3D'font-size:12.0pt;font-family:"Cambria","serif";color:windowtext'=
><o:p>&nbsp;</o:p></span></p><p class=3DMsoNormal><span =
style=3D'font-size:12.0pt;font-family:"Cambria","serif";color:windowtext'=
>Although an access_token will exist for the Third Party, Retail =
Customer, and RS relationship its usage will be infrequent compared to =
the access_token the Third Party obtains using the client_credentials =
grant_type.=C2=A0 This is another reason why I believe in the ESPI =
Standard implementation it will be necessary to revoke the access_token =
and refresh_token simultaneously.=C2=A0 The RS should not include in the =
data stream (covered by the client_credentials access_token) data that =
is based on the authorization_code access_token when the Retail Customer =
has indicated =C2=A0(either by alteration of the authorization scope or =
an outright revocation) the Third Party no longer is authorized to =
access the data.=C2=A0 Only revoking the refresh_token possess a =
privacy.=C2=A0 Only revoking the access_token, as you pointed out, poses =
a potential security issue allowing for the possibility of a denial of =
service attack.<o:p></o:p></span></p><p class=3DMsoNormal><span =
style=3D'font-size:12.0pt;font-family:"Cambria","serif";color:windowtext'=
><o:p>&nbsp;</o:p></span></p><p class=3DMsoNormal><span =
style=3D'font-size:12.0pt;font-family:"Cambria","serif";color:windowtext'=
>I hope this makes sense and clarifies my =
situation..<o:p></o:p></span></p><p class=3DMsoNormal><span =
style=3D'font-size:12.0pt;font-family:"Cambria","serif";color:windowtext'=
><o:p>&nbsp;</o:p></span></p><div><p class=3DMsoNormal><span =
style=3D'font-size:12.0pt;color:windowtext'>Best =
regards,<o:p></o:p></span></p><p class=3DMsoNormal><span =
style=3D'font-size:24.0pt;font-family:"Brush Script =
MT","serif";color:windowtext'>Don<o:p></o:p></span></p><p =
class=3DMsoNormal><span =
style=3D'font-size:12.0pt;color:windowtext'>Donald F. =
Coffin<o:p></o:p></span></p><p class=3DMsoNormal><span =
style=3D'font-size:12.0pt;color:windowtext'>Founder/CTO<o:p></o:p></span>=
</p><p class=3DMsoNormal><span =
style=3D'font-size:12.0pt;color:windowtext'><o:p>&nbsp;</o:p></span></p><=
p class=3DMsoNormal><span =
style=3D'font-size:12.0pt;color:windowtext'>REMI =
Networks<o:p></o:p></span></p><p class=3DMsoNormal><span =
style=3D'font-size:12.0pt;color:windowtext'>22751 El Prado Suite =
6216<o:p></o:p></span></p><p class=3DMsoNormal><span =
style=3D'font-size:12.0pt;color:windowtext'>Rancho Santa Margarita, =
CA=C2=A0 92688-3836<o:p></o:p></span></p><p class=3DMsoNormal><span =
style=3D'font-size:12.0pt;color:windowtext'><o:p>&nbsp;</o:p></span></p><=
p class=3DMsoNormal><span =
style=3D'font-size:12.0pt;color:windowtext'>Phone:=C2=A0=C2=A0=C2=A0=C2=A0=
=C2=A0 (949) 636-8571<o:p></o:p></span></p><p class=3DMsoNormal><span =
style=3D'font-size:12.0pt;color:windowtext'>Email:=C2=A0=C2=A0=C2=A0=C2=A0=
=C2=A0=C2=A0 <a href=3D"mailto:donald.coffin@reminetworks.com"><span =
style=3D'color:blue'>donald.coffin@reminetworks.com</span></a><o:p></o:p>=
</span></p></div><p class=3DMsoNormal><span =
style=3D'font-size:12.0pt;font-family:"Cambria","serif";color:windowtext'=
><o:p>&nbsp;</o:p></span></p><div><div =
style=3D'border:none;border-top:solid #B5C4DF 1.0pt;padding:3.0pt 0in =
0in 0in'><p class=3DMsoNormal><b><span =
style=3D'font-size:10.0pt;font-family:"Tahoma","sans-serif";color:windowt=
ext'>From:</span></b><span =
style=3D'font-size:10.0pt;font-family:"Tahoma","sans-serif";color:windowt=
ext'> Torsten Lodderstedt [mailto:torsten@lodderstedt.net] =
<br><b>Sent:</b> Sunday, February 03, 2013 1:14 PM<br><b>To:</b> Donald =
F Coffin<br><b>Cc:</b> George Fletcher; John Adkins; Scott Crowder; Dave =
Robin; John Teeter; &lt;pmadsen@pingidentity.com&gt;; Edward Denson; =
Marty Burns; Uday Verma; Ray Perlner; Anne Hendry; Lynne Rodoni; =
&lt;oauth@ietf.org&gt;<br><b>Subject:</b> Re: [OAUTH-WG] =
draft-ietf-oauth-revocation-04<o:p></o:p></span></p></div></div><p =
class=3DMsoNormal><o:p>&nbsp;</o:p></p><div><p class=3DMsoNormal>Hi =
Donald,<o:p></o:p></p></div><div><p =
class=3DMsoNormal><o:p>&nbsp;</o:p></p></div><div><p =
class=3DMsoNormal>Thanks for the clarification. Let me see whether I got =
you right. Although the retail customer has to authorize the access by =
the 3rd party application, there is no external representation of this =
authorization grant (e.g a refresh token). Instead, the actual access =
token is issued based on client credentials. Is there any correlation =
between the access token and the particular =
customer?<o:p></o:p></p></div><div><p =
class=3DMsoNormal><o:p>&nbsp;</o:p></p></div><div><p =
class=3DMsoNormal>Please note: we highly appreciate your feedback as an =
implementer.<o:p></o:p></p></div><div><p =
class=3DMsoNormal><o:p>&nbsp;</o:p></p></div><div><p =
class=3DMsoNormal>Best regards,<o:p></o:p></p></div><div><p =
class=3DMsoNormal>Torsten.<o:p></o:p></p></div><div><p class=3DMsoNormal =
style=3D'margin-bottom:12.0pt'><br>Am 03.02.2013 um 21:45 schrieb =
&quot;Donald F Coffin&quot; &lt;<a =
href=3D"mailto:donald.coffin@reminetworks.com">donald.coffin@reminetworks=
.com</a>&gt;:<o:p></o:p></p></div><blockquote =
style=3D'margin-top:5.0pt;margin-bottom:5.0pt'><div><p =
class=3DMsoNormal><span =
style=3D'font-size:12.0pt;font-family:"Cambria","serif";color:windowtext'=
>Hi Torsten,</span><o:p></o:p></p><p class=3DMsoNormal><span =
style=3D'font-size:12.0pt;font-family:"Cambria","serif";color:windowtext'=
>&nbsp;</span><o:p></o:p></p><div><p class=3DMsoNormal><span =
style=3D'font-size:12.0pt;color:windowtext'>Best =
regards,</span><o:p></o:p></p><p class=3DMsoNormal><span =
style=3D'font-size:24.0pt;font-family:"Brush Script =
MT","serif";color:windowtext'>Don</span><o:p></o:p></p><p =
class=3DMsoNormal><span =
style=3D'font-size:12.0pt;color:windowtext'>Donald F. =
Coffin</span><o:p></o:p></p><p class=3DMsoNormal><span =
style=3D'font-size:12.0pt;color:windowtext'>Founder/CTO</span><o:p></o:p>=
</p><p class=3DMsoNormal><span =
style=3D'font-size:12.0pt;color:windowtext'>&nbsp;</span><o:p></o:p></p><=
p class=3DMsoNormal><span =
style=3D'font-size:12.0pt;color:windowtext'>REMI =
Networks</span><o:p></o:p></p><p class=3DMsoNormal><span =
style=3D'font-size:12.0pt;color:windowtext'>22751 El Prado Suite =
6216</span><o:p></o:p></p><p class=3DMsoNormal><span =
style=3D'font-size:12.0pt;color:windowtext'>Rancho Santa Margarita, =
CA&nbsp; 92688-3836</span><o:p></o:p></p><p class=3DMsoNormal><span =
style=3D'font-size:12.0pt;color:windowtext'>&nbsp;</span><o:p></o:p></p><=
p class=3DMsoNormal><span =
style=3D'font-size:12.0pt;color:windowtext'>Phone:&nbsp;&nbsp;&nbsp;&nbsp=
;&nbsp; (949) 636-8571</span><o:p></o:p></p><p class=3DMsoNormal><span =
style=3D'font-size:12.0pt;color:windowtext'>Email:&nbsp;&nbsp;&nbsp;&nbsp=
;&nbsp;&nbsp; <a =
href=3D"mailto:donald.coffin@reminetworks.com">donald.coffin@reminetworks=
.com</a></span><o:p></o:p></p></div><p class=3DMsoNormal><span =
style=3D'font-size:12.0pt;font-family:"Cambria","serif";color:windowtext'=
>&nbsp;</span><o:p></o:p></p><div><div =
style=3D'border:none;border-top:solid #B5C4DF 1.0pt;padding:3.0pt 0in =
0in 0in'><p class=3DMsoNormal><b><span =
style=3D'font-size:10.0pt;font-family:"Tahoma","sans-serif";color:windowt=
ext'>From:</span></b><span =
style=3D'font-size:10.0pt;font-family:"Tahoma","sans-serif";color:windowt=
ext'> Torsten Lodderstedt [<a =
href=3D"mailto:torsten@lodderstedt.net">mailto:torsten@lodderstedt.net</a=
>] <br><b>Sent:</b> Sunday, February 03, 2013 4:20 AM<br><b>To:</b> =
Donald F Coffin<br><b>Cc:</b> 'George Fletcher'; 'John Adkins'; 'Scott =
Crowder'; 'Dave Robin'; 'John Teeter'; <a =
href=3D"mailto:pmadsen@pingidentity.com">pmadsen@pingidentity.com</a>; =
'Edward Denson'; 'Marty Burns'; 'Uday Verma'; 'Ray Perlner'; 'Anne =
Hendry'; 'Lynne Rodoni'; <a =
href=3D"mailto:oauth@ietf.org">oauth@ietf.org</a><br><b>Subject:</b> Re: =
[OAUTH-WG] =
draft-ietf-oauth-revocation-04</span><o:p></o:p></p></div></div><p =
class=3DMsoNormal>&nbsp;<o:p></o:p></p><p class=3DMsoNormal =
style=3D'margin-bottom:12.0pt'>Hi Donald,<o:p></o:p></p><div><p =
class=3DMsoNormal>Am 03.02.2013 12:57, schrieb Donald F =
Coffin:<o:p></o:p></p></div><blockquote =
style=3D'margin-top:5.0pt;margin-bottom:5.0pt'><p =
class=3DMsoNormal><span style=3D'font-size:12.0pt;font-family:"Times New =
Roman","serif"'>&lt;snip&gt; </span><o:p></o:p></p><div><p =
class=3DMsoNormal><span =
style=3D'font-size:12.0pt;font-family:"Cambria","serif";color:windowtext'=
>&nbsp;</span><o:p></o:p></p><p class=3DMsoNormal =
style=3D'margin-left:.5in;text-indent:-.5in'><span =
style=3D'font-size:12.0pt;font-family:"Cambria","serif";color:windowtext'=
>[Don] A typical Third Party application built to use the ESPI Standard =
will interact with a Retail Customer and their energy provider.&nbsp; =
The nature of interaction with the Retail Customer will utilize short =
interactive sessions.&nbsp; However, the interaction with their energy =
provider will require the application obtain new energy information for =
the previous 24-hours once a day.&nbsp; Therefore, I anticipate =
access_tokens will be granted for long periods of time as well as any =
supporting refresh_tokens.&nbsp; Because of the amount of data being =
exchanged between the Third Party application and the energy provider, =
both in number of retail customers and the amount of energy meter data, =
it will be necessary to minimize the amount of =
=E2=80=9Cadministrative=E2=80=9D traffic required in the exchange.&nbsp; =
Therefore, although I understand the use case you described, I =
anticipate such an implementation would be rare.&nbsp; =
</span><o:p></o:p></p><p class=3DMsoNormal =
style=3D'margin-left:.5in;text-indent:-.5in'><span =
style=3D'font-size:12.0pt;font-family:"Cambria","serif";color:windowtext'=
>&nbsp;</span><o:p></o:p></p><p class=3DMsoNormal =
style=3D'margin-left:.5in'><span =
style=3D'font-size:12.0pt;font-family:"Cambria","serif";color:windowtext'=
>The need to perform an audience style check to prevent exposure of the =
AS to a denial of service attack, appears primarily due to the fact the =
Revocation RFC requires an access_token and refresh_token to be revoked =
independently.&nbsp; Should a client need to revoke both Tokens the =
sequence of the revocation request is extremely significant.&nbsp; A =
simple solution to this problem would be to provide a method that allows =
a request to revoke both tokens simultaneously, as stated in one of the =
responses you referenced in the archives.&nbsp; </span><o:p></o:p></p><p =
class=3DMsoNormal style=3D'margin-left:.5in'><span =
style=3D'font-size:12.0pt;font-family:"Cambria","serif";color:windowtext'=
>&nbsp;</span><o:p></o:p></p><p class=3DMsoNormal =
style=3D'margin-left:.5in'><span =
style=3D'font-size:12.0pt;font-family:"Cambria","serif";color:windowtext'=
>The example you gave in your response demonstrating how a denial of =
service attack might occur is incorrect.&nbsp; You said =E2=80=9Cif the =
AS revokes the refresh_token when an access_token is revoked, I can =
steal an access_token and send it to the revocation endpoint causing the =
real client=E2=80=99s refresh_token to be revoked=E2=80=9D.&nbsp; I fail =
to see how that could occur, since the AS revoked both the access_token =
and the refresh_token when it received the request to revoke the =
access_token.&nbsp; Rather than explaining why a refresh_token =
shouldn=E2=80=99t be revoked concurrently when an access_token is =
revoked, your example does the exact opposite.&nbsp; It shows why a =
refresh_token should be revoked concurrently when an access_token is =
revoked.</span><o:p></o:p></p><p class=3DMsoNormal><span =
style=3D'font-size:12.0pt;font-family:"Cambria","serif";color:windowtext'=
>&nbsp;</span><o:p></o:p></p><p class=3DMsoNormal =
style=3D'mso-margin-top-alt:0in;margin-right:0in;margin-bottom:12.0pt;mar=
gin-left:.5in;text-indent:-.5in'><span =
style=3D'font-size:12.0pt;font-family:"Cambria","serif";color:#0070C0'>[D=
on] The focus of the <b>ESPI Standard</b> is to provide Retail =
Customer=E2=80=99s with access to a single UsagePoint (i.e. their Smart =
Meter).&nbsp; Therefore an access and refresh token will be tightly =
correlated with the type and frequency of data the Smart Meter =
provides.&nbsp; There are only a few reasons defined within the <b>ESPI =
Standard</b> list of use cases that will require the <b>Token =
Revocation</b> request to be issued.&nbsp; The following summarizes the =
situations that require a <b>Token Revocation =
</b>request:</span><o:p></o:p></p><p class=3DMsoListParagraph =
style=3D'mso-margin-top-alt:0in;margin-right:0in;margin-bottom:12.0pt;mar=
gin-left:.75in;text-indent:-.25in;mso-list:l0 level1 lfo2'><![if =
!supportLists]><span style=3D'font-family:Symbol'><span =
style=3D'mso-list:Ignore'>=C2=B7<span style=3D'font:7.0pt "Times New =
Roman"'>&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp; =
</span></span></span><![endif]><span =
style=3D'font-size:12.0pt;font-family:"Cambria","serif";color:#0070C0'>A =
Third Party application wishes to terminate their relationship with a =
Retail Customer.</span><o:p></o:p></p><p class=3DMsoListParagraph =
style=3D'mso-margin-top-alt:0in;margin-right:0in;margin-bottom:12.0pt;mar=
gin-left:.75in;text-indent:-.25in;mso-list:l0 level1 lfo2'><![if =
!supportLists]><span style=3D'font-family:Symbol'><span =
style=3D'mso-list:Ignore'>=C2=B7<span style=3D'font:7.0pt "Times New =
Roman"'>&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp; =
</span></span></span><![endif]><span =
style=3D'font-size:12.0pt;font-family:"Cambria","serif";color:#0070C0'>A =
Third Party application wishes to terminate their relationship with a =
Data Custodian.</span><o:p></o:p></p><p class=3DMsoListParagraph =
style=3D'mso-margin-top-alt:0in;margin-right:0in;margin-bottom:12.0pt;mar=
gin-left:.75in;text-indent:-.25in;mso-list:l0 level1 lfo2'><![if =
!supportLists]><span style=3D'font-family:Symbol'><span =
style=3D'mso-list:Ignore'>=C2=B7<span style=3D'font:7.0pt "Times New =
Roman"'>&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp; =
</span></span></span><![endif]><span =
style=3D'font-size:12.0pt;font-family:"Cambria","serif";color:#0070C0'>A =
Retail Customer wishes to terminate their relationship with a Third =
Party application.</span><o:p></o:p></p><p class=3DMsoListParagraph =
style=3D'mso-margin-top-alt:0in;margin-right:0in;margin-bottom:12.0pt;mar=
gin-left:.75in;text-indent:-.25in;mso-list:l0 level1 lfo2'><![if =
!supportLists]><span style=3D'font-family:Symbol'><span =
style=3D'mso-list:Ignore'>=C2=B7<span style=3D'font:7.0pt "Times New =
Roman"'>&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp; =
</span></span></span><![endif]><span =
style=3D'font-size:12.0pt;font-family:"Cambria","serif";color:#0070C0'>A =
Retail Customer wishes to change the data (i.e. scope) a Third Party =
application has permission to access.</span><o:p></o:p></p><p =
class=3DMsoNormal =
style=3D'mso-margin-top-alt:0in;margin-right:0in;margin-bottom:12.0pt;mar=
gin-left:.5in'><span =
style=3D'font-size:12.0pt;font-family:"Cambria","serif";color:#0070C0'>In=
 none of the above situations will it be valid to retain a refresh =
token, which I realize is implementation dependent, due to the nature of =
the <b>ESPI Standard.</b></span><o:p></o:p></p><p class=3DMsoNormal =
style=3D'mso-margin-top-alt:0in;margin-right:0in;margin-bottom:12.0pt;mar=
gin-left:.5in'><span =
style=3D'font-size:12.0pt;font-family:"Cambria","serif";color:#0070C0'>Pe=
rhaps the section on the <b>Server=E2=80=99s Revocation Policy</b> =
should address a few of the reasons why a client may want or need to =
revoke a token.&nbsp; The current description provides no consideration =
for the relationship between tokens and scope, although there clearly is =
a relationship.</span><o:p></o:p></p></div><div><p =
class=3DMsoNormal><span style=3D'font-size:12.0pt'>I'm confident client =
or resource owner would revoke refresh (and not access) tokens in all =
use cases you listed above. In my opinion, access tokens are revoked =
only if the authorization server does not support refresh tokens and =
therefore uses long term access tokens or in high-security =
applications.</span><o:p></o:p></p><p class=3DMsoNormal><span =
style=3D'font-size:12.0pt;font-family:"Cambria","serif";color:windowtext'=
>&nbsp;</span><o:p></o:p></p><p class=3DMsoNormal =
style=3D'margin-left:.5in;text-indent:-.5in'><span =
style=3D'font-size:12.0pt;font-family:"Cambria","serif";color:windowtext'=
>[Don] Based on the above statement it would appear you assume an access =
token is only valid for a short period of time.&nbsp; However, as I =
explained in my last response, due to the nature of the access required =
by the client and the manner in which the RS provides that data, access =
token durations will typically be in days not minutes. =
&nbsp;&nbsp;Therefore, merely revoking a refresh_token will expose the =
data to access that the resource owner meant to prevent unless the =
access_token is also revoked.</span><o:p></o:p></p></div></blockquote><p =
class=3DMsoNormal style=3D'margin-left:.5in;text-indent:-.5in'><span =
style=3D'font-size:12.0pt;font-family:"Times New Roman","serif"'><br>I =
don't understand why access tokens need such a long duration in your =
scenario, even if the client needs to obtain energy data once a day. Any =
client can (potentially) obtain a new access token at any time if the =
access token expires if the authorization server issues corresponding =
refresh tokens. So even in your scenario, access tokens could have a =
short duration. If you want to issue long-living access tokens in order =
to minimize load on the authorization servers, then you have to consider =
the extra complexitity and load required to notify resource servers of =
access token revocation. It's a tradeoff decision, which we tried to =
describe in <a =
href=3D"http://tools.ietf.org/html/draft-ietf-oauth-revocation-04#section=
-3">http://tools.ietf.org/html/draft-ietf-oauth-revocation-04#section-3</=
a>. <br><br><br></span><o:p></o:p></p><p class=3DMsoNormal><span =
style=3D'font-size:12.0pt;font-family:"Cambria","serif";color:windowtext'=
>&nbsp;</span><o:p></o:p></p><p class=3DMsoNormal =
style=3D'margin-left:.5in;text-indent:-.5in'><span =
style=3D'font-size:12.0pt;font-family:"Times New =
Roman","serif";color:windowtext'>[Don] A critical fact I omitted in my =
last response is the data obtained on a daily basis by a Third Party =
application will utilize an access_token obtained using the =
client_credentials grant_type.&nbsp; Therefore no refresh_token will be =
issued with the access_token.&nbsp; The ESPI Standard requires the =
Retail Customer (resource owner) and the RS to be notified whenever an =
authorization is modified or revoked by either the Third Party (client) =
or Retail Customer (resource owner).&nbsp; Therefore, the tradeoff =
decision has already been made.</span><o:p></o:p></p><p =
class=3DMsoNormal style=3D'margin-left:.5in;text-indent:-.5in'><span =
style=3D'font-size:12.0pt;font-family:"Times New =
Roman","serif";color:windowtext'>&nbsp;</span><o:p></o:p></p><p =
class=3DMsoNormal style=3D'margin-left:.5in'><span =
style=3D'font-size:12.0pt;font-family:"Times New =
Roman","serif";color:windowtext'>I personally feel that short lived =
access_tokens provide greater security, but in discussions with several =
utilities who have the responsibility of supporting the AS and RS =
functionality, they currently are planning on implementing long duration =
access_tokens.&nbsp; This view may change once the begin to implement =
=E2=80=9CConnect My Data=E2=80=9D solutions, but that again is an =
implementation feature, which is beyond the scope of my groups current =
work product.</span><span style=3D'font-size:12.0pt;font-family:"Times =
New Roman","serif"'><br><br><br></span><o:p></o:p></p><div><p =
class=3DMsoNormal><span =
style=3D'font-size:12.0pt'>&nbsp;</span><o:p></o:p></p></div><div><p =
class=3DMsoNormal><span style=3D'font-size:12.0pt'>I would also like to =
hear the opinion of other WG members on this =
topic.</span><o:p></o:p></p></div><div><p class=3DMsoNormal><span =
style=3D'font-size:12.0pt'>&nbsp;</span><o:p></o:p></p></div><blockquote =
style=3D'margin-top:5.0pt;margin-bottom:5.0pt'><div><p class=3DMsoNormal =
style=3D'margin-bottom:12.0pt'><span =
style=3D'font-family:"Helvetica","sans-serif"'>3. If the standard OAuth =
spec does not provide enough control, your profile of OAuth2 for the =
ESPI can tighten it to provide the protections =
desired.</span><o:p></o:p></p><p class=3DMsoNormal =
style=3D'mso-margin-top-alt:0in;margin-right:0in;margin-bottom:12.0pt;mar=
gin-left:.5in;text-indent:-.5in'><span =
style=3D'font-size:12.0pt;font-family:"Cambria","serif";color:#0070C0'>[D=
on] I am aware we can provide additional parameters required to =
integrate <b>OAuth 2.0 </b>with the <b>ESPI Standard</b> by submitting =
those parameter values to the <b>OAuth Parameters</b> registry. I would =
prefer not to do that, given the large amount of work being done on =
RFC-drafts to resolve many of the issues we are facing to integrate =
<b>OAuth 2.0</b> with the <b>ESPI Standard</b>, since the need to use =
those extensions will most likely be short =
lived.</span><o:p></o:p></p></div></blockquote><div><p =
class=3DMsoNormal><span =
style=3D'font-size:12.0pt'>&nbsp;</span><o:p></o:p></p></div><p =
class=3DMsoNormal><span style=3D'font-size:12.0pt'>Hmmm, if the need is =
only short lived, why do you want to make it part of the long living =
revocation RFC?</span><o:p></o:p></p><p class=3DMsoNormal><span =
style=3D'font-size:12.0pt;font-family:"Cambria","serif";color:windowtext'=
>&nbsp;</span><o:p></o:p></p><p class=3DMsoNormal =
style=3D'margin-left:.5in;text-indent:-.5in'><span =
style=3D'font-size:12.0pt;font-family:"Cambria","serif";color:windowtext'=
>[Don] My response was to the suggestion that if the OAuth specification =
does not provide enough control then the ESPI profile of OAuth 2.0 could =
tighten it to provide the protections desired.&nbsp; I assumed George =
meant we could add additional =E2=80=9Ccompany=E2=80=9D based =
parameters, which requires us to register them with the =E2=80=9COAuth =
Parameter Registry=E2=80=9D.&nbsp; I meant the usage of such =
=E2=80=9Ccompany=E2=80=9D parameters would be short =
termed.</span><o:p></o:p></p><p class=3DMsoNormal><span =
style=3D'font-size:12.0pt;font-family:"Times New =
Roman","serif"'><br>Understood.<br><br><br><br></span><o:p></o:p></p><p =
class=3DMsoNormal style=3D'margin-left:.5in'><span =
style=3D'font-size:12.0pt;font-family:"Cambria","serif";color:windowtext'=
>I do not view the need to identify the type of token being revoked as =
=E2=80=9Cshort term=E2=80=9D.&nbsp; Even the previous exchanges on the =
topic within the WG indicates it feels there may be a need to add an =
additional parameter to the request.&nbsp; However, because the draft is =
too far along, the WG seems to prefer releasing an RFC they =
=E2=80=9Csuspect=E2=80=9D will need to be adjusted and let the =
implementers confirm their suspicions.&nbsp;&nbsp; This seems to be a =
very selfish and rather foolish attitude given we are discussing a =
security protocol.&nbsp; Not to mention it would seem easier and faster =
to add an additional =E2=80=9Coptional=E2=80=9D parameter now, rather =
than requiring another RFC cycle. &nbsp;A parameter I sensed in reading =
the archives the WG feels will very likely need to be added in the =
future.</span><o:p></o:p></p><p class=3DMsoNormal><span =
style=3D'font-size:12.0pt;font-family:"Times New =
Roman","serif"'><br>Since this is a WG item, it is up to the WG to =
decide.</span><o:p></o:p></p><p class=3DMsoNormal><span =
style=3D'font-size:12.0pt;font-family:"Cambria","serif";color:windowtext'=
>&nbsp;</span><o:p></o:p></p><p class=3DMsoNormal><span =
style=3D'font-size:12.0pt;font-family:"Cambria","serif";color:windowtext'=
>[Don] I fully understand it is the WG=E2=80=99s decision.&nbsp; I am =
only providing my opinion as an implementer, who the WG desires to =
obtain feedback from before making the final =
decision.</span><o:p></o:p></p><p class=3DMsoNormal><span =
style=3D'font-size:12.0pt;font-family:"Times New =
Roman","serif"'><br><br>regards,<br>Torsten.<br><br><br><br></span><o:p><=
/o:p></p><div><p class=3DMsoNormal><span =
style=3D'font-size:12.0pt'><br><br><br><br></span><o:p></o:p></p><div><p =
class=3DMsoNormal style=3D'margin-bottom:12.0pt'><span =
style=3D'font-family:"Helvetica","sans-serif"'>Thanks,<br>George</span><o=
:p></o:p></p><div><p class=3DMsoNormal>On 1/29/13 3:28 PM, Donald F =
Coffin wrote:<o:p></o:p></p></div><blockquote =
style=3D'margin-top:5.0pt;margin-bottom:5.0pt'><p =
class=3DMsoNormal><span =
style=3D'font-size:12.0pt;font-family:"Cambria","serif"'>Hi =
Thorsten,</span><o:p></o:p></p><p class=3DMsoNormal><span =
style=3D'font-size:12.0pt;font-family:"Cambria","serif"'>&nbsp;</span><o:=
p></o:p></p><p class=3DMsoNormal><span =
style=3D'font-size:12.0pt;font-family:"Cambria","serif"'>I am working =
with the OpenADE Task Force to document how the =E2=80=9C<b><i>Energy =
Service Provider Interface (ESPI) Standard</i></b> =E2=80=9D published =
by the <b>North American Energy Standards Board</b> (NAESB) in October =
of 2011 should be implemented.&nbsp; The <b>ESPI Standard</b> defines =
how Retail Customers, Third Party applications, and Data Custodians =
(i.e. electrical, gas, or water utility) must interface to each other =
and the data format used to exchange energy information.&nbsp; &nbsp;The =
interface between the Retail Customer and the Data Custodian is known as =
=E2=80=9C<b>Download My Data</b>=E2=80=9D, which defines how a Retail =
Customer receives their energy information in an XML file downloaded to =
them by the Data Custodian.&nbsp; The interface between the Third Party =
application and the Data Custodian is known as =E2=80=9C<b>Connect My =
Data</b>=E2=80=9D, which defines the message exchanges between the Third =
Party application and the Data Custodian to allow the Third Party to =
access data at the Data Custodian after a Retail Customer has granted =
the Third Party application access.</span><o:p></o:p></p><p =
class=3DMsoNormal><span =
style=3D'font-size:12.0pt;font-family:"Cambria","serif"'>&nbsp;</span><o:=
p></o:p></p><p class=3DMsoNormal><span =
style=3D'font-size:12.0pt;font-family:"Cambria","serif"'>It is my =
responsibility within the OpenADE Task Force to document the integration =
of the <b>OAuth 2.0</b> protocol with the <b>ESPI Standard.</b>&nbsp; =
Since the <b>ESPI Standard</b> requires Retail Customers, Third Party =
applications, and Data Custodians to revoke Tokens (i.e. Access and =
Refresh Tokens) I am very interested in the =E2=80=9C<b><i>Token =
Revocation (draft-ietf-oath-revocation-xx)</i></b>=E2=80=9D work being =
done by you and your working group. </span><o:p></o:p></p><p =
class=3DMsoNormal><span =
style=3D'font-size:12.0pt;font-family:"Cambria","serif"'>&nbsp;</span><o:=
p></o:p></p><p class=3DMsoNormal><b><u><span =
style=3D'font-size:12.0pt;font-family:"Cambria","serif"'>Token =
Revocation Request</span></u></b><o:p></o:p></p><p =
class=3DMsoNormal><span =
style=3D'font-size:12.0pt;font-family:"Cambria","serif"'>&nbsp;</span><o:=
p></o:p></p><p class=3DMsoNormal><span =
style=3D'font-size:12.0pt;font-family:"Cambria","serif"'>The <b>Token =
Revocation</b> request has only the =E2=80=9Ctoken=E2=80=9D parameter =
with the description that the authorization server is supposed to detect =
the token type automatically.&nbsp; I would like to request that an =
addition parameter =E2=80=9Ctoken_type=E2=80=9D be added to the =
request.&nbsp; The =E2=80=9Ctoken_type=E2=80=9D parameter could be =
optional and would define the type of token being revoked (i.e. =
=E2=80=9Caccess=E2=80=9D, =E2=80=9Crefresh=E2=80=9D, =
=E2=80=9Cregistration access=E2=80=9D, etc.).</span><o:p></o:p></p><p =
class=3DMsoNormal><span =
style=3D'font-size:12.0pt;font-family:"Cambria","serif"'>&nbsp;</span><o:=
p></o:p></p><p class=3DMsoNormal><span =
style=3D'font-size:12.0pt;font-family:"Cambria","serif"'>The <b>ESPI =
Standard</b> was developed to support the <b>Advanced Meter =
Interface</b> <b>(AMI) </b>which is the interface used by =E2=80=9CSmart =
Meters=E2=80=9D to provide automated energy usage collection and other =
operational information about a Retail Customer=E2=80=99s residence to =
their Data Custodian.&nbsp; Third Party applications will be required to =
obtain the approval if each Retail Customer that has had a =
=E2=80=9CSmart Meter=E2=80=9D installed before they will be able to =
access the data provided by their =E2=80=9CSmart Meter=E2=80=9D.&nbsp; =
The number of =E2=80=9CSmart Meters=E2=80=9D currently installed at the =
three largest California utilities (Pacific Gas &amp; Electric, Southern =
California Edison, and San Diego Gas &amp; Electric) is in excess of =
10.0 M and growing.&nbsp; The following table indicates the number of =
=E2=80=9CSmart Meters=E2=80=9D each of the three utilities had installed =
as of May 2012:</span><o:p></o:p></p><p class=3DMsoNormal><span =
style=3D'font-size:12.0pt;font-family:"Cambria","serif"'>&nbsp;</span><o:=
p></o:p></p><table class=3DMsoNormalTable border=3D0 cellspacing=3D0 =
cellpadding=3D0 =
style=3D'margin-left:66.2pt;border-collapse:collapse'><tr><td =
width=3D319 valign=3Dtop style=3D'width:239.4pt;border:solid windowtext =
1.0pt;background:#A6A6A6;padding:0in 5.4pt 0in 5.4pt'><p =
class=3DMsoNormal align=3Dcenter style=3D'text-align:center'><b><span =
style=3D'font-size:14.0pt;font-family:"Cambria","serif"'>Utility</span></=
b><o:p></o:p></p></td><td width=3D319 valign=3Dtop =
style=3D'width:239.4pt;border:solid windowtext =
1.0pt;border-left:none;background:#A6A6A6;padding:0in 5.4pt 0in =
5.4pt'><p class=3DMsoNormal align=3Dcenter =
style=3D'text-align:center'><b><span =
style=3D'font-size:14.0pt;font-family:"Cambria","serif"'>=E2=80=9CSmart =
Meters=E2=80=9D Installed</span></b><o:p></o:p></p></td></tr><tr><td =
width=3D319 valign=3Dtop style=3D'width:239.4pt;border:solid windowtext =
1.0pt;border-top:none;padding:0in 5.4pt 0in 5.4pt'><p =
class=3DMsoNormal><span =
style=3D'font-size:12.0pt;font-family:"Cambria","serif"'>Pacific Gas =
&amp; Electric (PG&amp;E)</span><o:p></o:p></p></td><td width=3D319 =
valign=3Dtop =
style=3D'width:239.4pt;border-top:none;border-left:none;border-bottom:sol=
id windowtext 1.0pt;border-right:solid windowtext 1.0pt;padding:0in =
5.4pt 0in 5.4pt'><p class=3DMsoNormal align=3Dright =
style=3D'text-align:right'><span =
style=3D'font-size:12.0pt;font-family:"Cambria","serif"'>4,696,000</span>=
<o:p></o:p></p></td></tr><tr><td width=3D319 valign=3Dtop =
style=3D'width:239.4pt;border:solid windowtext =
1.0pt;border-top:none;padding:0in 5.4pt 0in 5.4pt'><p =
class=3DMsoNormal><span =
style=3D'font-size:12.0pt;font-family:"Cambria","serif"'>San Diego Gas =
&amp; Electric (SDG&amp;E)</span><o:p></o:p></p></td><td width=3D319 =
valign=3Dtop =
style=3D'width:239.4pt;border-top:none;border-left:none;border-bottom:sol=
id windowtext 1.0pt;border-right:solid windowtext 1.0pt;padding:0in =
5.4pt 0in 5.4pt'><p class=3DMsoNormal align=3Dright =
style=3D'text-align:right'><span =
style=3D'font-size:12.0pt;font-family:"Cambria","serif"'>1,364,000</span>=
<o:p></o:p></p></td></tr><tr><td width=3D319 valign=3Dtop =
style=3D'width:239.4pt;border:solid windowtext =
1.0pt;border-top:none;padding:0in 5.4pt 0in 5.4pt'><p =
class=3DMsoNormal><span =
style=3D'font-size:12.0pt;font-family:"Cambria","serif"'>Southern =
California Edison (SCE)</span><o:p></o:p></p></td><td width=3D319 =
valign=3Dtop =
style=3D'width:239.4pt;border-top:none;border-left:none;border-bottom:sol=
id windowtext 1.0pt;border-right:solid windowtext 1.0pt;padding:0in =
5.4pt 0in 5.4pt'><p class=3DMsoNormal align=3Dright =
style=3D'text-align:right'><span =
style=3D'font-size:12.0pt;font-family:"Cambria","serif"'>3,900,000</span>=
<o:p></o:p></p></td></tr></table><p class=3DMsoNormal><span =
style=3D'font-size:12.0pt;font-family:"Cambria","serif"'>&nbsp;</span><o:=
p></o:p></p><p class=3DMsoNormal><span =
style=3D'font-size:12.0pt;font-family:"Cambria","serif"'>The numbers in =
the chart were taken from the =E2=80=9C<b><i>Utility-Scale Smart Meter =
Deployments, Plans, &amp; Proposals -- IEE Report</i></b>=E2=80=9D =
published May 2012 by <b>The Edison Foundation Institute for Electric =
Efficiency=E2=80=9D </b>which I have attached.&nbsp; The number of =
=E2=80=9CSmart Meters=E2=80=9D currently installed are even larger than =
shown in the report as I compose this email.&nbsp; Assuming 10% of =
Pacific Gas &amp; Electric=E2=80=99s Retail Customers decide to utilize =
a Third Party application (3 Third Party applications are currently =
supported and are 3 more Third Party applications are preparing to be =
supported) in order to support the ability to revoke a token they would =
be required to track 500,000 access tokens and 500,000 refresh =
tokens.&nbsp; Requiring PG&amp;E=E2=80=99s authorization server to =
=E2=80=9Cautomatically=E2=80=9D determine the type of Token being =
revoked begins to negatively impact their processing capability.&nbsp; =
If the <b>Token Revocation</b> request was capable of indicating the =
type of Token to be revoked, the amount of time it will take =
PG&amp;E=E2=80=99s authorization server would show a significant time =
savings to process the request.</span><o:p></o:p></p><p =
class=3DMsoNormal><span =
style=3D'font-size:12.0pt;font-family:"Cambria","serif"'>&nbsp;</span><o:=
p></o:p></p><p class=3DMsoNormal><b><u><span =
style=3D'font-size:12.0pt;font-family:"Cambria","serif"'>Authorization =
Server Revocation Policy</span></u></b><o:p></o:p></p><p =
class=3DMsoNormal><span =
style=3D'font-size:12.0pt;font-family:"Cambria","serif"'>&nbsp;</span><o:=
p></o:p></p><p class=3DMsoNormal><span =
style=3D'font-size:12.0pt;font-family:"Cambria","serif"'>&nbsp;</span><o:=
p></o:p></p><p class=3DMsoListParagraph =
style=3D'text-indent:-.25in'><span =
style=3D'font-size:12.0pt;font-family:"Cambria","serif"'>&nbsp;&nbsp;&nbs=
p;&nbsp;&nbsp; </span>6.<span =
style=3D'font-size:7.0pt;font-family:"Times New Roman , =
serif","serif"'>&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp; </span>Does the =
revocation of the access token also revoke the refresh token (if it was =
provided) ? Or is this a revocation policy decision ?<o:p></o:p></p><p =
class=3DMsoNormal><span =
style=3D'font-size:12.0pt;font-family:"Cambria","serif"'>&nbsp;</span><o:=
p></o:p></p><p class=3DMsoNormal style=3D'margin-left:1.0in'><span =
style=3D'font-size:12.0pt;font-family:"Times New Roman , =
serif","serif"'>- if the token passed to the request is a refresh token =
and the server supports access token revocation, the server SHOULD also =
revoke them.<br>- if the token passed to the request is an access token, =
the server may decide to revoke the respective refresh token as =
well.</span><o:p></o:p></p><p class=3DMsoNormal =
style=3D'margin-left:1.0in'><span =
style=3D'font-size:12.0pt;font-family:"Times New Roman , =
serif","serif"'>&nbsp;</span><o:p></o:p></p><p class=3DMsoNormal =
style=3D'margin-left:1.0in'><span =
style=3D'font-size:12.0pt;font-family:"Times New Roman , =
serif","serif"'>I believe that if the token passed in the request is an =
access token, the server MUST revoke any respective refresh token.&nbsp; =
Otherwise, their exist a potential security risk of the respective =
refresh token being used to gain access to the resources for which the =
access token was issued.&nbsp; It also means the authorization server =
will have potential =E2=80=9Cjunk=E2=80=9D in the refresh token file to =
search through for any additional Token Revocation =
request.</span><o:p></o:p></p><p class=3DMsoNormal =
style=3D'margin-left:1.0in'><span =
style=3D'font-size:12.0pt;font-family:"Times New Roman , =
serif","serif"'>&nbsp;</span><o:p></o:p></p><p class=3DMsoNormal><span =
style=3D'font-size:12.0pt;font-family:"Times New Roman , =
serif","serif"'>I look forward to receiving your =
response.</span><o:p></o:p></p><p class=3DMsoNormal><span =
style=3D'font-size:12.0pt;font-family:"Cambria","serif"'>&nbsp;</span><o:=
p></o:p></p><p class=3DMsoNormal><span style=3D'font-size:12.0pt'>Best =
regards,</span><o:p></o:p></p><p class=3DMsoNormal><span =
style=3D'font-size:24.0pt;font-family:"Brush Script =
MT","serif"'>Don</span><o:p></o:p></p><p class=3DMsoNormal><span =
style=3D'font-size:12.0pt'>Donald F. Coffin</span><o:p></o:p></p><p =
class=3DMsoNormal><span =
style=3D'font-size:12.0pt'>Founder/CTO</span><o:p></o:p></p><p =
class=3DMsoNormal><span =
style=3D'font-size:12.0pt'>&nbsp;</span><o:p></o:p></p><p =
class=3DMsoNormal><span style=3D'font-size:12.0pt'>REMI =
Networks</span><o:p></o:p></p><p class=3DMsoNormal><span =
style=3D'font-size:12.0pt'>22751 El Prado Suite =
6216</span><o:p></o:p></p><p class=3DMsoNormal><span =
style=3D'font-size:12.0pt'>Rancho Santa Margarita, CA&nbsp; =
92688-3836</span><o:p></o:p></p><p class=3DMsoNormal><span =
style=3D'font-size:12.0pt'>&nbsp;</span><o:p></o:p></p><p =
class=3DMsoNormal><span =
style=3D'font-size:12.0pt'>Phone:&nbsp;&nbsp;&nbsp;&nbsp;&nbsp; (949) =
636-8571</span><o:p></o:p></p><p class=3DMsoNormal><span =
style=3D'font-size:12.0pt'>Email:&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp; <a =
href=3D"mailto:donald.coffin@reminetworks.com">donald.coffin@reminetworks=
.com</a></span><o:p></o:p></p><p =
class=3DMsoNormal>&nbsp;<o:p></o:p></p><p class=3DMsoNormal><span =
style=3D'font-size:12.0pt;font-family:"Times New Roman , =
serif","serif"'><br><br><br><br><br><br></span><o:p></o:p></p><pre>______=
_________________________________________<o:p></o:p></pre><pre>OAuth =
mailing list<o:p></o:p></pre><pre><a =
href=3D"mailto:OAuth@ietf.org">OAuth@ietf.org</a><o:p></o:p></pre><pre><a=
 =
href=3D"https://www.ietf.org/mailman/listinfo/oauth">https://www.ietf.org=
/mailman/listinfo/oauth</a><o:p></o:p></pre></blockquote><p =
class=3DMsoNormal><span style=3D'font-size:12.0pt;font-family:"Times New =
Roman , serif","serif"'>&nbsp;</span><o:p></o:p></p></div></div><p =
class=3DMsoNormal><span style=3D'font-size:12.0pt;font-family:"Times New =
Roman","serif"'>&nbsp;</span><o:p></o:p></p></div></blockquote></div></bo=
dy></html>
------=_NextPart_000_0067_01CE0216.A2406BB0--


From tonynad@microsoft.com  Sun Feb  3 17:57:12 2013
Return-Path: <tonynad@microsoft.com>
X-Original-To: oauth@ietfa.amsl.com
Delivered-To: oauth@ietfa.amsl.com
Received: from localhost (localhost [127.0.0.1]) by ietfa.amsl.com (Postfix) with ESMTP id 7375D21F8425 for <oauth@ietfa.amsl.com>; Sun,  3 Feb 2013 17:57:12 -0800 (PST)
X-Virus-Scanned: amavisd-new at amsl.com
X-Spam-Flag: NO
X-Spam-Score: 0.534
X-Spam-Level: 
X-Spam-Status: No, score=0.534 tagged_above=-999 required=5 tests=[BAYES_00=-2.599, HTML_MESSAGE=0.001, UNRESOLVED_TEMPLATE=3.132]
Received: from mail.ietf.org ([64.170.98.30]) by localhost (ietfa.amsl.com [127.0.0.1]) (amavisd-new, port 10024) with ESMTP id gEJ8FuWLpXyj for <oauth@ietfa.amsl.com>; Sun,  3 Feb 2013 17:57:11 -0800 (PST)
Received: from na01-bl2-obe.outbound.protection.outlook.com (na01-bl2-obe.ptr.protection.outlook.com [65.55.169.25]) by ietfa.amsl.com (Postfix) with ESMTP id CD88D21F8632 for <oauth@ietf.org>; Sun,  3 Feb 2013 17:57:10 -0800 (PST)
Received: from BY2FFO11FD014.protection.gbl (10.1.15.200) by BY2FFO11HUB007.protection.gbl (10.1.14.165) with Microsoft SMTP Server (TLS) id 15.0.609.9; Mon, 4 Feb 2013 01:57:02 +0000
Received: from TK5EX14HUBC104.redmond.corp.microsoft.com (131.107.125.37) by BY2FFO11FD014.mail.protection.outlook.com (10.1.14.76) with Microsoft SMTP Server (TLS) id 15.0.609.9 via Frontend Transport; Mon, 4 Feb 2013 01:57:01 +0000
Received: from ch1outboundpool.messaging.microsoft.com (157.54.51.80) by mail.microsoft.com (157.54.80.25) with Microsoft SMTP Server (TLS) id 14.2.318.3; Mon, 4 Feb 2013 01:56:30 +0000
Received: from mail112-ch1-R.bigfish.com (10.43.68.248) by CH1EHSOBE010.bigfish.com (10.43.70.60) with Microsoft SMTP Server id 14.1.225.23; Mon, 4 Feb 2013 01:56:29 +0000
Received: from mail112-ch1 (localhost [127.0.0.1])	by mail112-ch1-R.bigfish.com (Postfix) with ESMTP id 896D360263	for <oauth@ietf.org.FOPE.CONNECTOR.OVERRIDE>; Mon,  4 Feb 2013 01:56:29 +0000 (UTC)
X-Forefront-Antispam-Report-Untrusted: CIP:157.56.240.21; KIP:(null); UIP:(null); (null); H:BL2PRD0310HT001.namprd03.prod.outlook.com; R:internal; EFV:INT
X-SpamScore: -17
X-BigFish: PS-17(zz9371Ic89bh14ffIzz1ee6h1de0h1202h1e76h1d1ah1d2ah1082kzz8275ch1033IL17326ah8275dh18c673hz31h2a8h668h839hd24hf0ah1288h12a5h12bdh137ah1441h1504h1537h153bh162dh1631h1758h18e1h1946h9a9j1155h)
Received-SPF: softfail (mail112-ch1: transitioning domain of microsoft.com does not designate 157.56.240.21 as permitted sender) client-ip=157.56.240.21; envelope-from=tonynad@microsoft.com; helo=BL2PRD0310HT001.namprd03.prod.outlook.com ;.outlook.com ;
X-Forefront-Antispam-Report-Untrusted: SFV:SKI; SFS:; DIR:OUT; SFP:; SCL:-1; SRVR:BY2PR03MB043; H:BY2PR03MB041.namprd03.prod.outlook.com; LANG:en; 
Received: from mail112-ch1 (localhost.localdomain [127.0.0.1]) by mail112-ch1 (MessageSwitch) id 1359942987202853_5983; Mon,  4 Feb 2013 01:56:27 +0000 (UTC)
Received: from CH1EHSMHS031.bigfish.com (snatpool1.int.messaging.microsoft.com [10.43.68.245])	by mail112-ch1.bigfish.com (Postfix) with ESMTP id 23B2110008B;	Mon,  4 Feb 2013 01:56:27 +0000 (UTC)
Received: from BL2PRD0310HT001.namprd03.prod.outlook.com (157.56.240.21) by CH1EHSMHS031.bigfish.com (10.43.70.31) with Microsoft SMTP Server (TLS) id 14.1.225.23; Mon, 4 Feb 2013 01:56:25 +0000
Received: from BY2PR03MB043.namprd03.prod.outlook.com (10.255.241.147) by BL2PRD0310HT001.namprd03.prod.outlook.com (10.255.97.36) with Microsoft SMTP Server (TLS) id 14.16.263.1; Mon, 4 Feb 2013 01:56:23 +0000
Received: from BY2PR03MB041.namprd03.prod.outlook.com (10.255.241.145) by BY2PR03MB043.namprd03.prod.outlook.com (10.255.241.147) with Microsoft SMTP Server (TLS) id 15.0.614.5; Mon, 4 Feb 2013 01:56:22 +0000
Received: from BY2PR03MB041.namprd03.prod.outlook.com ([169.254.8.165]) by BY2PR03MB041.namprd03.prod.outlook.com ([169.254.8.165]) with mapi id 15.00.0614.003; Mon, 4 Feb 2013 01:56:16 +0000
From: Anthony Nadalin <tonynad@microsoft.com>
To: Torsten Lodderstedt <torsten@lodderstedt.net>, OAuth WG <oauth@ietf.org>
Thread-Topic: [OAUTH-WG] draft-ietf-oauth-revocation
Thread-Index: AQHOAg7DisW1YXk/AEGIlqfeZ/JKeJho8YRU
Date: Mon, 4 Feb 2013 01:56:15 +0000
Message-ID: <bdd3d698cfad46d1b370a319fd07f575@BY2PR03MB041.namprd03.prod.outlook.com>
References: <510E5FB5.10803@lodderstedt.net>
In-Reply-To: <510E5FB5.10803@lodderstedt.net>
Accept-Language: en-US
Content-Language: en-US
X-MS-Has-Attach: 
X-MS-TNEF-Correlator: 
x-originating-ip: [166.137.219.240]
Content-Type: multipart/alternative; boundary="_000_bdd3d698cfad46d1b370a319fd07f575BY2PR03MB041namprd03pro_"
MIME-Version: 1.0
X-OrganizationHeadersPreserved: BY2PR03MB043.namprd03.prod.outlook.com
X-FOPE-CONNECTOR: Id%0$Dn%*$RO%0$TLS%0$FQDN%$TlsDn%
X-FOPE-CONNECTOR: Id%59$Dn%IETF.ORG$RO%2$TLS%6$FQDN%131.107.125.5$TlsDn%
X-FOPE-CONNECTOR: Id%59$Dn%LODDERSTEDT.NET$RO%2$TLS%6$FQDN%131.107.125.5$TlsDn%
X-CrossPremisesHeadersPromoted: TK5EX14HUBC104.redmond.corp.microsoft.com
X-CrossPremisesHeadersFiltered: TK5EX14HUBC104.redmond.corp.microsoft.com
X-Forefront-Antispam-Report: CIP:131.107.125.37; CTRY:US; IPV:CAL; IPV:NLI; EFV:NLI; SFV:NSPM; SFS:(377454001)(199002)(189002)(6806001)(4396001)(33646001)(50986001)(63696002)(5343655001)(77982001)(59766001)(15202345001)(74502001)(74662001)(46102001)(31966008)(47446002)(51856001)(44976002)(16676001)(47736001)(56776001)(76482001)(20776003)(5343645001)(49866001)(54316002)(47976001)(56816002)(54356001)(53806001)(79102001)(16236675001)(42262001)(24736002); DIR:OUT; SFP:; SCL:1; SRVR:BY2FFO11HUB007; H:TK5EX14HUBC104.redmond.corp.microsoft.com; RD:InfoDomainNonexistent; A:1; MX:1; LANG:en; 
X-OriginatorOrg: microsoft.onmicrosoft.com
X-Forefront-PRVS: 07473990A5
Subject: Re: [OAUTH-WG] draft-ietf-oauth-revocation
X-BeenThere: oauth@ietf.org
X-Mailman-Version: 2.1.12
Precedence: list
List-Id: OAUTH WG <oauth.ietf.org>
List-Unsubscribe: <https://www.ietf.org/mailman/options/oauth>, <mailto:oauth-request@ietf.org?subject=unsubscribe>
List-Archive: <http://www.ietf.org/mail-archive/web/oauth>
List-Post: <mailto:oauth@ietf.org>
List-Help: <mailto:oauth-request@ietf.org?subject=help>
List-Subscribe: <https://www.ietf.org/mailman/listinfo/oauth>, <mailto:oauth-request@ietf.org?subject=subscribe>
X-List-Received-Date: Mon, 04 Feb 2013 01:57:12 -0000

--_000_bdd3d698cfad46d1b370a319fd07f575BY2PR03MB041namprd03pro_
Content-Type: text/plain; charset="windows-1256"
Content-Transfer-Encoding: quoted-printable

Yes on token_type

Sent from my Windows Phone
________________________________
From: Torsten Lodderstedt<mailto:torsten@lodderstedt.net>
Sent: =FD2/=FD3/=FD2013 6:02 AM
To: OAuth WG<mailto:oauth@ietf.org>
Subject: [OAUTH-WG] draft-ietf-oauth-revocation

Hi all,

before I publish a new revision of the draft, I would like to sort out
the following issues and would like to ask you for your feedback.

- Authorization vs. access grant vs. authorization grant: I propose to
use "authorization grant".
- invalid_token error code: I propose to use the new error code
"invalid_parameter" (as suggested by Peter and George). I don't see the
need to register it (see
http://www.ietf.org/mail-archive/web/oauth/current/msg10604.html) but
would like to get your advice.
- Donald F. Coffin raised the need for a token_type parameter to the
revocation request. Shall we re-consider this topic?

best regards,
Torsten.
_______________________________________________
OAuth mailing list
OAuth@ietf.org
https://www.ietf.org/mailman/listinfo/oauth



--_000_bdd3d698cfad46d1b370a319fd07f575BY2PR03MB041namprd03pro_
Content-Type: text/html; charset="windows-1256"
Content-Transfer-Encoding: quoted-printable

<html>
<head>
<meta http-equiv=3D"Content-Type" content=3D"text/html; charset=3Dwindows-1=
256">
<meta name=3D"Generator" content=3D"Microsoft Exchange Server">
<!-- converted from text --><style><!-- .EmailQuote { margin-left: 1pt; pad=
ding-left: 4pt; border-left: #800000 2px solid; } --></style>
</head>
<body>
<div>
<div>
<div style=3D"font-size:11pt; font-family:Calibri,sans-serif">Yes on token_=
type<br>
<br>
Sent from my Windows Phone</div>
</div>
<div dir=3D"ltr">
<hr>
<span style=3D"font-size:11pt; font-family:Calibri,sans-serif; font-weight:=
bold">From:
</span><span style=3D"font-size:11pt; font-family:Calibri,sans-serif"><a hr=
ef=3D"mailto:torsten@lodderstedt.net">Torsten Lodderstedt</a></span><br>
<span style=3D"font-size:11pt; font-family:Calibri,sans-serif; font-weight:=
bold">Sent:
</span><span style=3D"font-size:11pt; font-family:Calibri,sans-serif">=FD2/=
=FD3/=FD2013 6:02 AM</span><br>
<span style=3D"font-size:11pt; font-family:Calibri,sans-serif; font-weight:=
bold">To:
</span><span style=3D"font-size:11pt; font-family:Calibri,sans-serif"><a hr=
ef=3D"mailto:oauth@ietf.org">OAuth WG</a></span><br>
<span style=3D"font-size:11pt; font-family:Calibri,sans-serif; font-weight:=
bold">Subject:
</span><span style=3D"font-size:11pt; font-family:Calibri,sans-serif">[OAUT=
H-WG] draft-ietf-oauth-revocation</span><br>
<br>
</div>
</div>
<font size=3D"2"><span style=3D"font-size:10pt;">
<div class=3D"PlainText">Hi all,<br>
<br>
before I publish a new revision of the draft, I would like to sort out <br>
the following issues and would like to ask you for your feedback.<br>
<br>
- Authorization vs. access grant vs. authorization grant: I propose to <br>
use &quot;authorization grant&quot;.<br>
- invalid_token error code: I propose to use the new error code <br>
&quot;invalid_parameter&quot; (as suggested by Peter and George). I don't s=
ee the <br>
need to register it (see <br>
<a href=3D"http://www.ietf.org/mail-archive/web/oauth/current/msg10604.html=
">http://www.ietf.org/mail-archive/web/oauth/current/msg10604.html</a>) but
<br>
would like to get your advice.<br>
- Donald F. Coffin raised the need for a token_type parameter to the <br>
revocation request. Shall we re-consider this topic?<br>
<br>
best regards,<br>
Torsten.<br>
_______________________________________________<br>
OAuth mailing list<br>
OAuth@ietf.org<br>
<a href=3D"https://www.ietf.org/mailman/listinfo/oauth">https://www.ietf.or=
g/mailman/listinfo/oauth</a><br>
<br>
<br>
</div>
</span></font>
</body>
</html>

--_000_bdd3d698cfad46d1b370a319fd07f575BY2PR03MB041namprd03pro_--

From lainhart@us.ibm.com  Mon Feb  4 07:07:02 2013
Return-Path: <lainhart@us.ibm.com>
X-Original-To: oauth@ietfa.amsl.com
Delivered-To: oauth@ietfa.amsl.com
Received: from localhost (localhost [127.0.0.1]) by ietfa.amsl.com (Postfix) with ESMTP id B560421F885B for <oauth@ietfa.amsl.com>; Mon,  4 Feb 2013 07:07:02 -0800 (PST)
X-Virus-Scanned: amavisd-new at amsl.com
X-Spam-Flag: NO
X-Spam-Score: -10.47
X-Spam-Level: 
X-Spam-Status: No, score=-10.47 tagged_above=-999 required=5 tests=[AWL=0.128,  BAYES_00=-2.599, HTML_MESSAGE=0.001, RCVD_IN_DNSWL_HI=-8]
Received: from mail.ietf.org ([64.170.98.30]) by localhost (ietfa.amsl.com [127.0.0.1]) (amavisd-new, port 10024) with ESMTP id JSOJ6M2kXvr1 for <oauth@ietfa.amsl.com>; Mon,  4 Feb 2013 07:07:02 -0800 (PST)
Received: from e9.ny.us.ibm.com (e9.ny.us.ibm.com [32.97.182.139]) by ietfa.amsl.com (Postfix) with ESMTP id BF8FF21F869C for <oauth@ietf.org>; Mon,  4 Feb 2013 07:07:01 -0800 (PST)
Received: from /spool/local by e9.ny.us.ibm.com with IBM ESMTP SMTP Gateway: Authorized Use Only! Violators will be prosecuted for <oauth@ietf.org> from <lainhart@us.ibm.com>; Mon, 4 Feb 2013 10:06:59 -0500
Received: from d01dlp02.pok.ibm.com (9.56.250.167) by e9.ny.us.ibm.com (192.168.1.109) with IBM ESMTP SMTP Gateway: Authorized Use Only! Violators will be prosecuted;  Mon, 4 Feb 2013 10:06:56 -0500
Received: from d01relay01.pok.ibm.com (d01relay01.pok.ibm.com [9.56.227.233]) by d01dlp02.pok.ibm.com (Postfix) with ESMTP id AAA516E8040 for <oauth@ietf.org>; Mon,  4 Feb 2013 10:06:54 -0500 (EST)
Received: from d01av03.pok.ibm.com (d01av03.pok.ibm.com [9.56.224.217]) by d01relay01.pok.ibm.com (8.13.8/8.13.8/NCO v10.0) with ESMTP id r14F6tgf297672 for <oauth@ietf.org>; Mon, 4 Feb 2013 10:06:55 -0500
Received: from d01av03.pok.ibm.com (loopback [127.0.0.1]) by d01av03.pok.ibm.com (8.14.4/8.13.1/NCO v10.0 AVout) with ESMTP id r14F6t4t017927 for <oauth@ietf.org>; Mon, 4 Feb 2013 13:06:55 -0200
Received: from d01ml255.pok.ibm.com (d01ml255.pok.ibm.com [9.63.10.54]) by d01av03.pok.ibm.com (8.14.4/8.13.1/NCO v10.0 AVin) with ESMTP id r14F6qlo017455; Mon, 4 Feb 2013 13:06:52 -0200
In-Reply-To: <51099FBA.1060608@mitre.org>
References: <OF3031393A.750F4AB2-ON85257B03.007AD84B-85257B03.007B56E7@us.ibm.com> <MLQM-20130130173104302-123870@mlite.mitre.org> <51099FBA.1060608@mitre.org>
To: Justin Richer <jricher@mitre.org>
MIME-Version: 1.0
X-KeepSent: 0C4DFB94:D230FCE2-85257B08:0052DA9C; type=4; name=$KeepSent
X-Mailer: Lotus Notes Release 8.5.3FP2 SHF22 July 19, 2012
Message-ID: <OF0C4DFB94.D230FCE2-ON85257B08.0052DA9C-85257B08.00530629@us.ibm.com>
From: Todd W Lainhart <lainhart@us.ibm.com>
Date: Mon, 4 Feb 2013 10:06:50 -0500
X-MIMETrack: Serialize by Router on D01ML255/01/M/IBM(Release 8.5.3FP2 ZX853FP2HF4|December 14, 2012) at 02/04/2013 10:06:52, Serialize complete at 02/04/2013 10:06:52
Content-Type: multipart/alternative; boundary="=_alternative 0053062885257B08_="
X-Content-Scanned: Fidelis XPS MAILER
x-cbid: 13020415-7182-0000-0000-000004EA9A6B
Cc: IETF oauth WG <oauth@ietf.org>
Subject: Re: [OAUTH-WG] draft-richer-oauth-introspection-01 scope syntax
X-BeenThere: oauth@ietf.org
X-Mailman-Version: 2.1.12
Precedence: list
List-Id: OAUTH WG <oauth.ietf.org>
List-Unsubscribe: <https://www.ietf.org/mailman/options/oauth>, <mailto:oauth-request@ietf.org?subject=unsubscribe>
List-Archive: <http://www.ietf.org/mail-archive/web/oauth>
List-Post: <mailto:oauth@ietf.org>
List-Help: <mailto:oauth-request@ietf.org?subject=help>
List-Subscribe: <https://www.ietf.org/mailman/listinfo/oauth>, <mailto:oauth-request@ietf.org?subject=subscribe>
X-List-Received-Date: Mon, 04 Feb 2013 15:07:02 -0000

This is a multipart message in MIME format.
--=_alternative 0053062885257B08_=
Content-Type: text/plain; charset="US-ASCII"

Has there been any thinking or movement as to whether the scopes syntax 
stands as is, or aligns with 6749?  Of the folks who chose to respond, it 
seemed like the position was split.







From:   Justin Richer <jricher@mitre.org>
To:     Todd W Lainhart/Lexington/IBM@IBMUS, 
Cc:     IETF oauth WG <oauth@ietf.org>
Date:   01/30/2013 05:34 PM
Subject:        Re: [OAUTH-WG] draft-richer-oauth-introspection-01 scope 
syntax



I should add that this is also a bit of an artifact of our implementation. 
Internally, we parse and store scopes as collections of discrete strings 
and process them that way. So serialization of that value naturally fell 
to a JSON list.

 -- Justin

On 01/30/2013 05:29 PM, Justin Richer wrote:
It's not meant to follow the same syntax. Instead, it's making use of the 
JSON object structure to avoid additional parsing of the values on the 
client side.

We could fairly easily define it as the same space-delimited string if 
enough people want to keep the scope format consistent.

 -- Justin

On 01/30/2013 05:27 PM, Todd W Lainhart wrote:
That the scope syntax in draft-richer-oauth-introspection-01 is different 
than RFC 6749 Section 3.3, as in: 


   "scope": ["read", "write", "dolphin"], 

vs. 

  scope = scope-token *( SP scope-token )
     scope-token = 1*( %x21 / %x23-5B / %x5D-7E ) 

Should introspection-01 follow the 6749 syntax for scopes?





_______________________________________________
OAuth mailing list
OAuth@ietf.org
https://www.ietf.org/mailman/listinfo/oauth




_______________________________________________
OAuth mailing list
OAuth@ietf.org
https://www.ietf.org/mailman/listinfo/oauth



--=_alternative 0053062885257B08_=
Content-Type: text/html; charset="US-ASCII"

<font size=2 face="sans-serif">Has there been any thinking or movement
as to whether the scopes syntax stands as is, or aligns with 6749? &nbsp;Of
the folks who chose to respond, it seemed like the position was split.<br>
</font>
<br>
<table width=223 style="border-collapse:collapse;">
<tr height=8>
<td width=223 bgcolor=white style="border-style:solid;border-color:#000000;border-width:0px 0px 0px 0px;padding:0px 0px;"></table>
<br>
<br>
<br>
<br>
<br><font size=1 color=#5f5f5f face="sans-serif">From: &nbsp; &nbsp; &nbsp;
&nbsp;</font><font size=1 face="sans-serif">Justin Richer &lt;jricher@mitre.org&gt;</font>
<br><font size=1 color=#5f5f5f face="sans-serif">To: &nbsp; &nbsp; &nbsp;
&nbsp;</font><font size=1 face="sans-serif">Todd W Lainhart/Lexington/IBM@IBMUS,
</font>
<br><font size=1 color=#5f5f5f face="sans-serif">Cc: &nbsp; &nbsp; &nbsp;
&nbsp;</font><font size=1 face="sans-serif">IETF oauth WG &lt;oauth@ietf.org&gt;</font>
<br><font size=1 color=#5f5f5f face="sans-serif">Date: &nbsp; &nbsp; &nbsp;
&nbsp;</font><font size=1 face="sans-serif">01/30/2013 05:34 PM</font>
<br><font size=1 color=#5f5f5f face="sans-serif">Subject: &nbsp; &nbsp;
&nbsp; &nbsp;</font><font size=1 face="sans-serif">Re: [OAUTH-WG]
draft-richer-oauth-introspection-01 scope syntax</font>
<br>
<hr noshade>
<br>
<br>
<br><font size=3>I should add that this is also a bit of an artifact of
our implementation. Internally, we parse and store scopes as collections
of discrete strings and process them that way. So serialization of that
value naturally fell to a JSON list.<br>
<br>
 -- Justin<br>
</font>
<br><font size=3>On 01/30/2013 05:29 PM, Justin Richer wrote:</font>
<br><font size=3>It's not meant to follow the same syntax. Instead, it's
making use of the JSON object structure to avoid additional parsing of
the values on the client side.<br>
<br>
We could fairly easily define it as the same space-delimited string if
enough people want to keep the scope format consistent.<br>
<br>
 -- Justin<br>
</font>
<br><font size=3>On 01/30/2013 05:27 PM, Todd W Lainhart wrote:</font>
<br><font size=2 face="sans-serif">That the scope syntax in draft-richer-oauth-introspection-01
is different than RFC 6749 Section 3.3, as in:</font><font size=3> <br>
<br>
</font><font size=2 face="sans-serif"><br>
 &nbsp; </font><tt><font size=3>&quot;scope&quot;: [&quot;read&quot;, &quot;write&quot;,
&quot;dolphin&quot;],</font></tt><font size=3> <br>
</font><font size=2 face="sans-serif"><br>
vs.</font><font size=3> <br>
</font><tt><font size=3><br>
 &nbsp;scope = scope-token *( SP scope-token )<br>
 &nbsp; &nbsp; scope-token = 1*( %x21 / %x23-5B / %x5D-7E )</font></tt><font size=3>
<br>
</font><font size=2 face="sans-serif"><br>
Should introspection-01 follow the 6749 syntax for scopes?</font><font size=3><br>
</font>
<table width=223 style="border-collapse:collapse;">
<tr height=8>
<td width=221 bgcolor=white style="border-style:solid;border-color:#000000;border-width:0px 0px 0px 0px;padding:1px 1px;"></table>
<br><font size=3><br>
<br>
</font>
<br><tt><font size=3>_______________________________________________<br>
OAuth mailing list<br>
</font></tt><a href=mailto:OAuth@ietf.org><tt><font size=3 color=blue><u>OAuth@ietf.org</u></font></tt></a><tt><font size=3><br>
</font></tt><a href=https://www.ietf.org/mailman/listinfo/oauth><tt><font size=3 color=blue><u>https://www.ietf.org/mailman/listinfo/oauth</u></font></tt></a><tt><font size=3><br>
</font></tt>
<br><font size=3><br>
<br>
</font>
<br><tt><font size=3>_______________________________________________<br>
OAuth mailing list<br>
</font></tt><a href=mailto:OAuth@ietf.org><tt><font size=3 color=blue><u>OAuth@ietf.org</u></font></tt></a><tt><font size=3><br>
</font></tt><a href=https://www.ietf.org/mailman/listinfo/oauth><tt><font size=3 color=blue><u>https://www.ietf.org/mailman/listinfo/oauth</u></font></tt></a><tt><font size=3><br>
</font></tt>
<br>
<br>
--=_alternative 0053062885257B08_=--


From lt.sego@gmail.com  Fri Feb  1 07:34:11 2013
Return-Path: <lt.sego@gmail.com>
X-Original-To: oauth@ietfa.amsl.com
Delivered-To: oauth@ietfa.amsl.com
Received: from localhost (localhost [127.0.0.1]) by ietfa.amsl.com (Postfix) with ESMTP id 77B5921E803D for <oauth@ietfa.amsl.com>; Fri,  1 Feb 2013 07:34:11 -0800 (PST)
X-Virus-Scanned: amavisd-new at amsl.com
X-Spam-Flag: NO
X-Spam-Score: -3.598
X-Spam-Level: 
X-Spam-Status: No, score=-3.598 tagged_above=-999 required=5 tests=[BAYES_00=-2.599, HTML_MESSAGE=0.001, RCVD_IN_DNSWL_LOW=-1]
Received: from mail.ietf.org ([64.170.98.30]) by localhost (ietfa.amsl.com [127.0.0.1]) (amavisd-new, port 10024) with ESMTP id K54oW7vcXfIp for <oauth@ietfa.amsl.com>; Fri,  1 Feb 2013 07:34:11 -0800 (PST)
Received: from mail-vb0-f43.google.com (mail-vb0-f43.google.com [209.85.212.43]) by ietfa.amsl.com (Postfix) with ESMTP id CFE2C21E8030 for <oauth@ietf.org>; Fri,  1 Feb 2013 07:34:10 -0800 (PST)
Received: by mail-vb0-f43.google.com with SMTP id fr13so2544573vbb.30 for <oauth@ietf.org>; Fri, 01 Feb 2013 07:34:10 -0800 (PST)
DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=gmail.com; s=20120113; h=x-received:mime-version:sender:in-reply-to:references:from:date :x-google-sender-auth:message-id:subject:to:cc:content-type; bh=IK41Sy8QCSzyMNGyZJw5T+zIktyxFXQwg33TDKM57Ug=; b=UTCxEEoxVIxDXATSXeYu/GTmZeUuzMftv1z4zQnr1vUCjq2I9RM+XG0Ndk2cIrlgt+ bVhrrRcqL8iYYePOLGMj7WBERUQGiPaA8rxG3a685gunQhBCCSrwSZ7uXVpoYhIoiu/7 JMAbRSEhDt1JtF5E2wHoCsoRDdTwwpWdWarXCMVIFOnoF7hQX1IYvJfGJYe5N44+onka XhYDX9uTOENPkIFPRS5YBzlz441QJ2dKD4cmUuF0W/URbHj9oSC0DomQP8rhnCl+KCd/ DqTUDjSTAzdczGfwjIpVDq4IszYiVvTiC4CBrLKqjsi68XiPQNBdUH4DUuF1z6RsWWZo 2FSg==
X-Received: by 10.52.69.39 with SMTP id b7mr10081815vdu.124.1359732850329; Fri, 01 Feb 2013 07:34:10 -0800 (PST)
MIME-Version: 1.0
Sender: lt.sego@gmail.com
Received: by 10.58.238.166 with HTTP; Fri, 1 Feb 2013 07:33:50 -0800 (PST)
In-Reply-To: <1359732663.49190.YahooMailNeo@web31808.mail.mud.yahoo.com>
References: <CAEeqsMaCyF31X50=A6qM7QU2zbMLoSE4C-F8oe5NrWyiCb8hZA@mail.gmail.com> <1359732663.49190.YahooMailNeo@web31808.mail.mud.yahoo.com>
From: "L. Preston Sego III" <LPSego3@gmail.com>
Date: Fri, 1 Feb 2013 10:33:50 -0500
X-Google-Sender-Auth: UWYcC0lkQzdNpD8S3YFquwfTNiI
Message-ID: <CAEeqsMbM9YabORL6XudocmRkvJndt6CFJGjDPp60LbH-kvy2KQ@mail.gmail.com>
To: William Mills <wmills_92105@yahoo.com>
Content-Type: multipart/alternative; boundary=90e6ba475d4f88883804d4ab79c6
X-Mailman-Approved-At: Mon, 04 Feb 2013 08:12:33 -0800
Cc: "oauth@ietf.org" <oauth@ietf.org>
Subject: Re: [OAUTH-WG] Where / how do we report security risks?
X-BeenThere: oauth@ietf.org
X-Mailman-Version: 2.1.12
Precedence: list
List-Id: OAUTH WG <oauth.ietf.org>
List-Unsubscribe: <https://www.ietf.org/mailman/options/oauth>, <mailto:oauth-request@ietf.org?subject=unsubscribe>
List-Archive: <http://www.ietf.org/mail-archive/web/oauth>
List-Post: <mailto:oauth@ietf.org>
List-Help: <mailto:oauth-request@ietf.org?subject=help>
List-Subscribe: <https://www.ietf.org/mailman/listinfo/oauth>, <mailto:oauth-request@ietf.org?subject=subscribe>
X-List-Received-Date: Fri, 01 Feb 2013 15:34:11 -0000

--90e6ba475d4f88883804d4ab79c6
Content-Type: text/plain; charset=ISO-8859-1

ok, cool. I don't have any sort of specific implementation or anything.
Just a concern. thanks!


On Fri, Feb 1, 2013 at 10:31 AM, William Mills <wmills_92105@yahoo.com>wrote:

> Here is probably your best bet if it's a design question.  If it's a
> specific implementation then send it to the company in question first if
> you think they have a vulnerability.
>
>   ------------------------------
> *From:* L. Preston Sego III <LPSego3@gmail.com>
> *To:* oauth@ietf.org
> *Sent:* Thursday, January 31, 2013 6:01 AM
> *Subject:* [OAUTH-WG] Where / how do we report security risks?
>
> Don't want hackers to try anything on oauth2-using applications...
>
> _______________________________________________
> OAuth mailing list
> OAuth@ietf.org
> https://www.ietf.org/mailman/listinfo/oauth
>
>
>

--90e6ba475d4f88883804d4ab79c6
Content-Type: text/html; charset=ISO-8859-1
Content-Transfer-Encoding: quoted-printable

<div dir=3D"ltr">ok, cool. I don&#39;t have any sort of specific implementa=
tion or anything. Just a concern. thanks!</div><div class=3D"gmail_extra"><=
br><br><div class=3D"gmail_quote">On Fri, Feb 1, 2013 at 10:31 AM, William =
Mills <span dir=3D"ltr">&lt;<a href=3D"mailto:wmills_92105@yahoo.com" targe=
t=3D"_blank">wmills_92105@yahoo.com</a>&gt;</span> wrote:<br>

<blockquote class=3D"gmail_quote" style=3D"margin:0 0 0 .8ex;border-left:1p=
x #ccc solid;padding-left:1ex"><div><div style=3D"font-size:12pt;font-famil=
y:Courier New,courier,monaco,monospace,sans-serif"><div><span>Here is proba=
bly your best bet if it&#39;s a design question. =A0If it&#39;s a specific =
implementation then send it to the company in question first if you think t=
hey have a vulnerability.</span></div>

<div><br></div>  <div style=3D"font-family:&#39;Courier New&#39;,courier,mo=
naco,monospace,sans-serif;font-size:12pt"> <div style=3D"font-family:&#39;t=
imes new roman&#39;,&#39;new york&#39;,times,serif;font-size:12pt"> <div di=
r=3D"ltr">

 <font face=3D"Arial"> <hr size=3D"1">  <b><span style=3D"font-weight:bold"=
>From:</span></b> L. Preston Sego III &lt;<a href=3D"mailto:LPSego3@gmail.c=
om" target=3D"_blank">LPSego3@gmail.com</a>&gt;<br> <b><span style=3D"font-=
weight:bold">To:</span></b> <a href=3D"mailto:oauth@ietf.org" target=3D"_bl=
ank">oauth@ietf.org</a> <br>

 <b><span style=3D"font-weight:bold">Sent:</span></b> Thursday, January 31,=
 2013 6:01 AM<br> <b><span style=3D"font-weight:bold">Subject:</span></b> [=
OAUTH-WG] Where / how do we report
 security risks?<br> </font> </div><div class=3D"im"> <br>
<div><div dir=3D"ltr">Don&#39;t want hackers to try anything on oauth2-usin=
g applications...</div>
</div><br></div>_______________________________________________<br>OAuth ma=
iling list<br><a href=3D"mailto:OAuth@ietf.org" target=3D"_blank">OAuth@iet=
f.org</a><br><a href=3D"https://www.ietf.org/mailman/listinfo/oauth" target=
=3D"_blank">https://www.ietf.org/mailman/listinfo/oauth</a><br>

<br><br> </div> </div>  </div></div></blockquote></div><br></div>

--90e6ba475d4f88883804d4ab79c6--

From lt.sego@gmail.com  Fri Feb  1 07:37:51 2013
Return-Path: <lt.sego@gmail.com>
X-Original-To: oauth@ietfa.amsl.com
Delivered-To: oauth@ietfa.amsl.com
Received: from localhost (localhost [127.0.0.1]) by ietfa.amsl.com (Postfix) with ESMTP id 9373521E8053 for <oauth@ietfa.amsl.com>; Fri,  1 Feb 2013 07:37:51 -0800 (PST)
X-Virus-Scanned: amavisd-new at amsl.com
X-Spam-Flag: NO
X-Spam-Score: -3.598
X-Spam-Level: 
X-Spam-Status: No, score=-3.598 tagged_above=-999 required=5 tests=[BAYES_00=-2.599, HTML_MESSAGE=0.001, RCVD_IN_DNSWL_LOW=-1]
Received: from mail.ietf.org ([64.170.98.30]) by localhost (ietfa.amsl.com [127.0.0.1]) (amavisd-new, port 10024) with ESMTP id qPzxHsvh8Gcw for <oauth@ietfa.amsl.com>; Fri,  1 Feb 2013 07:37:51 -0800 (PST)
Received: from mail-vc0-f172.google.com (mail-vc0-f172.google.com [209.85.220.172]) by ietfa.amsl.com (Postfix) with ESMTP id EAF7821E8030 for <oauth@ietf.org>; Fri,  1 Feb 2013 07:37:50 -0800 (PST)
Received: by mail-vc0-f172.google.com with SMTP id l6so2530163vcl.17 for <oauth@ietf.org>; Fri, 01 Feb 2013 07:37:50 -0800 (PST)
DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=gmail.com; s=20120113; h=x-received:mime-version:sender:from:date:x-google-sender-auth :message-id:subject:to:content-type; bh=YMLhVN3AaUIxP/eZ83qFjhCAx1ns7EAxlrUnVqdyCHs=; b=riV5EOeMCKLezp5DSoxC1wW6bDBbtzAGxQu13rwcH7ivlv3tui0Rjka18YuZlao5Ny L4BXGe77OnqSfnFJuVlW/rTNwCQbfdK68M5mInk3V3gIpJr0VYbetgajzDva0HP8T2q5 tFIkAgzA6VFev2w6rSjBjYniEKtvsEUCl/d91Uoe3/3VX0l6ztxKkPP16EQ2fG8+untY AJ3k3x80314Lq1Ufn2Hiuz6Scm2DmL0KS8PdsLIyCqlh+mA8g1/6e1cFIciSHCE4V/wu ve32S/JLdDbCdEFBkOeCabvQOzDUWMCBJ41boj+i1h2a1DGOFkZTW7Bc2m4T/yJODeCf s3kQ==
X-Received: by 10.58.181.201 with SMTP id dy9mr2330050vec.34.1359733070468; Fri, 01 Feb 2013 07:37:50 -0800 (PST)
MIME-Version: 1.0
Sender: lt.sego@gmail.com
Received: by 10.58.238.166 with HTTP; Fri, 1 Feb 2013 07:37:30 -0800 (PST)
From: "L. Preston Sego III" <LPSego3@gmail.com>
Date: Fri, 1 Feb 2013 10:37:30 -0500
X-Google-Sender-Auth: 5JuKXMqcanwr07ZfspbkEwz37Wc
Message-ID: <CAEeqsMat2_zoSCyx7uN373m1SMNGAz=QxEmVYWOYax=Ppt2LnQ@mail.gmail.com>
To: oauth@ietf.org
Content-Type: multipart/alternative; boundary=047d7b5d8823a7961604d4ab8600
X-Mailman-Approved-At: Mon, 04 Feb 2013 08:12:33 -0800
Subject: [OAUTH-WG] I'm concerned about how the sniffability of oauth2 requests
X-BeenThere: oauth@ietf.org
X-Mailman-Version: 2.1.12
Precedence: list
List-Id: OAUTH WG <oauth.ietf.org>
List-Unsubscribe: <https://www.ietf.org/mailman/options/oauth>, <mailto:oauth-request@ietf.org?subject=unsubscribe>
List-Archive: <http://www.ietf.org/mail-archive/web/oauth>
List-Post: <mailto:oauth@ietf.org>
List-Help: <mailto:oauth-request@ietf.org?subject=help>
List-Subscribe: <https://www.ietf.org/mailman/listinfo/oauth>, <mailto:oauth-request@ietf.org?subject=subscribe>
X-List-Received-Date: Fri, 01 Feb 2013 15:37:51 -0000

--047d7b5d8823a7961604d4ab8600
Content-Type: text/plain; charset=ISO-8859-1

In an oauth2 request, the access token is passed along in the header, with
nothing else.

As I understand it, oauth2 was designed to be simple for everyone to use.
And while, that's true, I don't really like how all of the security is
reliant on SSL.

what if an attack can strip away SSL using a tool such as sslstrip (or
whatever else would be more suitable for modern https)? They would be able
to see the access token and start forging whatever request he or she wants
to.

Why not do some sort of RSA-type public-private key thing like back in
Oauth1, where there is verification of the payload on each request? Just
use a better algorithm?

--047d7b5d8823a7961604d4ab8600
Content-Type: text/html; charset=ISO-8859-1
Content-Transfer-Encoding: quoted-printable

<div dir=3D"ltr">In an oauth2 request, the access token is passed along in =
the header, with nothing else.<div><br></div><div style>As I understand it,=
 oauth2 was designed to be simple for everyone to use. And while, that&#39;=
s true, I don&#39;t really like how all of the security is reliant on SSL.<=
/div>

<div style><br></div><div style>what if an attack can strip away SSL using =
a tool such as sslstrip (or whatever else would be more suitable for modern=
 https)? They would be able to see the access token and start forging whate=
ver request he or she wants to.</div>

<div style><br></div><div style>Why not do some sort of RSA-type public-pri=
vate key thing like back in Oauth1, where there is verification of the payl=
oad on each request? Just use a better algorithm?</div></div>

--047d7b5d8823a7961604d4ab8600--

From jricher@mitre.org  Mon Feb  4 08:23:34 2013
Return-Path: <jricher@mitre.org>
X-Original-To: oauth@ietfa.amsl.com
Delivered-To: oauth@ietfa.amsl.com
Received: from localhost (localhost [127.0.0.1]) by ietfa.amsl.com (Postfix) with ESMTP id 7D93021F885B for <oauth@ietfa.amsl.com>; Mon,  4 Feb 2013 08:23:34 -0800 (PST)
X-Virus-Scanned: amavisd-new at amsl.com
X-Spam-Flag: NO
X-Spam-Score: -6.556
X-Spam-Level: 
X-Spam-Status: No, score=-6.556 tagged_above=-999 required=5 tests=[AWL=0.042,  BAYES_00=-2.599, HTML_MESSAGE=0.001, RCVD_IN_DNSWL_MED=-4]
Received: from mail.ietf.org ([64.170.98.30]) by localhost (ietfa.amsl.com [127.0.0.1]) (amavisd-new, port 10024) with ESMTP id H4K0HqQHf7t4 for <oauth@ietfa.amsl.com>; Mon,  4 Feb 2013 08:23:33 -0800 (PST)
Received: from smtpksrv1.mitre.org (smtpksrv1.mitre.org [198.49.146.77]) by ietfa.amsl.com (Postfix) with ESMTP id 81A5221F86EB for <oauth@ietf.org>; Mon,  4 Feb 2013 08:23:33 -0800 (PST)
Received: from smtpksrv1.mitre.org (localhost.localdomain [127.0.0.1]) by localhost (Postfix) with SMTP id E867F5310F72; Mon,  4 Feb 2013 11:23:32 -0500 (EST)
Received: from IMCCAS03.MITRE.ORG (imccas03.mitre.org [129.83.29.80]) by smtpksrv1.mitre.org (Postfix) with ESMTP id D2EB45310F6A; Mon,  4 Feb 2013 11:23:32 -0500 (EST)
Received: from IMCMBX01.MITRE.ORG ([169.254.1.25]) by IMCCAS03.MITRE.ORG ([129.83.29.80]) with mapi id 14.02.0318.004; Mon, 4 Feb 2013 11:23:32 -0500
From: "Richer, Justin P." <jricher@mitre.org>
To: Todd W Lainhart <lainhart@us.ibm.com>
Thread-Topic: [OAUTH-WG] draft-richer-oauth-introspection-01 scope syntax
Thread-Index: AQHOAuls0s8jUm5EhEujJWJMOkWRiZhqNe+A
Date: Mon, 4 Feb 2013 16:23:31 +0000
Message-ID: <B33BFB58CCC8BE4998958016839DE27E06885FEC@IMCMBX01.MITRE.ORG>
References: <OF3031393A.750F4AB2-ON85257B03.007AD84B-85257B03.007B56E7@us.ibm.com> <MLQM-20130130173104302-123870@mlite.mitre.org> <51099FBA.1060608@mitre.org> <OF0C4DFB94.D230FCE2-ON85257B08.0052DA9C-85257B08.00530629@us.ibm.com>
In-Reply-To: <OF0C4DFB94.D230FCE2-ON85257B08.0052DA9C-85257B08.00530629@us.ibm.com>
Accept-Language: en-US
Content-Language: en-US
X-MS-Has-Attach: 
X-MS-TNEF-Correlator: 
x-originating-ip: [172.31.13.11]
Content-Type: multipart/alternative; boundary="_000_B33BFB58CCC8BE4998958016839DE27E06885FECIMCMBX01MITREOR_"
MIME-Version: 1.0
Cc: IETF oauth WG <oauth@ietf.org>
Subject: Re: [OAUTH-WG] draft-richer-oauth-introspection-01 scope syntax
X-BeenThere: oauth@ietf.org
X-Mailman-Version: 2.1.12
Precedence: list
List-Id: OAUTH WG <oauth.ietf.org>
List-Unsubscribe: <https://www.ietf.org/mailman/options/oauth>, <mailto:oauth-request@ietf.org?subject=unsubscribe>
List-Archive: <http://www.ietf.org/mail-archive/web/oauth>
List-Post: <mailto:oauth@ietf.org>
List-Help: <mailto:oauth-request@ietf.org?subject=help>
List-Subscribe: <https://www.ietf.org/mailman/listinfo/oauth>, <mailto:oauth-request@ietf.org?subject=subscribe>
X-List-Received-Date: Mon, 04 Feb 2013 16:23:34 -0000

--_000_B33BFB58CCC8BE4998958016839DE27E06885FECIMCMBX01MITREOR_
Content-Type: text/plain; charset="us-ascii"
Content-Transfer-Encoding: quoted-printable

I got the same reading of the list as you, and I could go either way. I bel=
ieve we absolutely must pick one or the other though.

If anyone has thoughts on the matter one way or the other, please speak up.=
 The options are:

1) scopes are returned as a JSON array (current introspection text)
2) scopes are returned as a space-separated string (rfc6749 format for the =
"scope" parameter)


 -- Justin


On Feb 4, 2013, at 10:06 AM, Todd W Lainhart <lainhart@us.ibm.com<mailto:la=
inhart@us.ibm.com>>
 wrote:

Has there been any thinking or movement as to whether the scopes syntax sta=
nds as is, or aligns with 6749?  Of the folks who chose to respond, it seem=
ed like the position was split.







From:        Justin Richer <jricher@mitre.org<mailto:jricher@mitre.org>>
To:        Todd W Lainhart/Lexington/IBM@IBMUS,
Cc:        IETF oauth WG <oauth@ietf.org<mailto:oauth@ietf.org>>
Date:        01/30/2013 05:34 PM
Subject:        Re: [OAUTH-WG] draft-richer-oauth-introspection-01 scope sy=
ntax
________________________________



I should add that this is also a bit of an artifact of our implementation. =
Internally, we parse and store scopes as collections of discrete strings an=
d process them that way. So serialization of that value naturally fell to a=
 JSON list.

-- Justin

On 01/30/2013 05:29 PM, Justin Richer wrote:
It's not meant to follow the same syntax. Instead, it's making use of the J=
SON object structure to avoid additional parsing of the values on the clien=
t side.

We could fairly easily define it as the same space-delimited string if enou=
gh people want to keep the scope format consistent.

-- Justin

On 01/30/2013 05:27 PM, Todd W Lainhart wrote:
That the scope syntax in draft-richer-oauth-introspection-01 is different t=
han RFC 6749 Section 3.3, as in:


  "scope": ["read", "write", "dolphin"],

vs.

 scope =3D scope-token *( SP scope-token )
    scope-token =3D 1*( %x21 / %x23-5B / %x5D-7E )

Should introspection-01 follow the 6749 syntax for scopes?





_______________________________________________
OAuth mailing list
OAuth@ietf.org<mailto:OAuth@ietf.org>
https://www.ietf.org/mailman/listinfo/oauth




_______________________________________________
OAuth mailing list
OAuth@ietf.org<mailto:OAuth@ietf.org>
https://www.ietf.org/mailman/listinfo/oauth




--_000_B33BFB58CCC8BE4998958016839DE27E06885FECIMCMBX01MITREOR_
Content-Type: text/html; charset="us-ascii"
Content-ID: <426A51D431A2684D978A8DF20EF59EC3@imc.mitre.org>
Content-Transfer-Encoding: quoted-printable

<html>
<head>
<meta http-equiv=3D"Content-Type" content=3D"text/html; charset=3Dus-ascii"=
>
</head>
<body style=3D"word-wrap: break-word; -webkit-nbsp-mode: space; -webkit-lin=
e-break: after-white-space; ">
I got the same reading of the list as you, and I could go either way. I bel=
ieve we absolutely must pick one or the other though.
<div><br>
</div>
<div>If anyone has thoughts on the matter one way or the other, please spea=
k up. The options are:</div>
<div><br>
</div>
<div>1) scopes are returned as a JSON array (current introspection text)</d=
iv>
<div>2) scopes are returned as a space-separated string (rfc6749 format for=
 the &quot;scope&quot; parameter)</div>
<div><br>
</div>
<div><br>
</div>
<div>&nbsp;-- Justin</div>
<div><br>
</div>
<div><br>
<div>
<div>
<div>On Feb 4, 2013, at 10:06 AM, Todd W Lainhart &lt;<a href=3D"mailto:lai=
nhart@us.ibm.com">lainhart@us.ibm.com</a>&gt;</div>
<div>&nbsp;wrote:</div>
<br class=3D"Apple-interchange-newline">
<blockquote type=3D"cite"><font size=3D"2" face=3D"sans-serif">Has there be=
en any thinking or movement as to whether the scopes syntax stands as is, o=
r aligns with 6749? &nbsp;Of the folks who chose to respond, it seemed like=
 the position was split.<br>
</font><br>
<table width=3D"223" style=3D"border-collapse:collapse;">
<tbody>
<tr height=3D"8">
<td width=3D"223" bgcolor=3D"white" style=3D"border-style:solid;border-colo=
r:#000000;border-width:0px 0px 0px 0px;padding:0px 0px;">
</td>
</tr>
</tbody>
</table>
<br>
<br>
<br>
<br>
<br>
<font size=3D"1" color=3D"#5f5f5f" face=3D"sans-serif">From: &nbsp; &nbsp; =
&nbsp; &nbsp;</font><font size=3D"1" face=3D"sans-serif">Justin Richer &lt;=
<a href=3D"mailto:jricher@mitre.org">jricher@mitre.org</a>&gt;</font>
<br>
<font size=3D"1" color=3D"#5f5f5f" face=3D"sans-serif">To: &nbsp; &nbsp; &n=
bsp; &nbsp;</font><font size=3D"1" face=3D"sans-serif">Todd W Lainhart/Lexi=
ngton/IBM@IBMUS,
</font><br>
<font size=3D"1" color=3D"#5f5f5f" face=3D"sans-serif">Cc: &nbsp; &nbsp; &n=
bsp; &nbsp;</font><font size=3D"1" face=3D"sans-serif">IETF oauth WG &lt;<a=
 href=3D"mailto:oauth@ietf.org">oauth@ietf.org</a>&gt;</font>
<br>
<font size=3D"1" color=3D"#5f5f5f" face=3D"sans-serif">Date: &nbsp; &nbsp; =
&nbsp; &nbsp;</font><font size=3D"1" face=3D"sans-serif">01/30/2013 05:34 P=
M</font>
<br>
<font size=3D"1" color=3D"#5f5f5f" face=3D"sans-serif">Subject: &nbsp; &nbs=
p; &nbsp; &nbsp;</font><font size=3D"1" face=3D"sans-serif">Re: [OAUTH-WG] =
draft-richer-oauth-introspection-01 scope syntax</font>
<br>
<hr noshade=3D"">
<br>
<br>
<br>
<font size=3D"3">I should add that this is also a bit of an artifact of our=
 implementation. Internally, we parse and store scopes as collections of di=
screte strings and process them that way. So serialization of that value na=
turally fell to a JSON list.<br>
<br>
-- Justin<br>
</font><br>
<font size=3D"3">On 01/30/2013 05:29 PM, Justin Richer wrote:</font> <br>
<font size=3D"3">It's not meant to follow the same syntax. Instead, it's ma=
king use of the JSON object structure to avoid additional parsing of the va=
lues on the client side.<br>
<br>
We could fairly easily define it as the same space-delimited string if enou=
gh people want to keep the scope format consistent.<br>
<br>
-- Justin<br>
</font><br>
<font size=3D"3">On 01/30/2013 05:27 PM, Todd W Lainhart wrote:</font> <br>
<font size=3D"2" face=3D"sans-serif">That the scope syntax in draft-richer-=
oauth-introspection-01 is different than RFC 6749 Section 3.3, as in:</font=
><font size=3D"3">
<br>
<br>
</font><font size=3D"2" face=3D"sans-serif"><br>
&nbsp; </font><tt>&quot;scope&quot;: [&quot;read&quot;, &quot;write&quot;, =
&quot;dolphin&quot;],</tt><font size=3D"3"> <br>
</font><font size=3D"2" face=3D"sans-serif"><br>
vs.</font><font size=3D"3"> <br>
</font><tt><br>
&nbsp;scope =3D scope-token *( SP scope-token )<br>
&nbsp; &nbsp; scope-token =3D 1*( %x21 / %x23-5B / %x5D-7E )</tt><font size=
=3D"3"> <br>
</font><font size=3D"2" face=3D"sans-serif"><br>
Should introspection-01 follow the 6749 syntax for scopes?</font><font size=
=3D"3"><br>
</font>
<table width=3D"223" style=3D"border-collapse:collapse;">
<tbody>
<tr height=3D"8">
<td width=3D"221" bgcolor=3D"white" style=3D"border-style:solid;border-colo=
r:#000000;border-width:0px 0px 0px 0px;padding:1px 1px;">
</td>
</tr>
</tbody>
</table>
<br>
<font size=3D"3"><br>
<br>
</font><br>
<tt>_______________________________________________<br>
OAuth mailing list<br>
</tt><a href=3D"mailto:OAuth@ietf.org"><tt><font size=3D"3" color=3D"blue">=
<u>OAuth@ietf.org</u></font></tt></a><tt><br>
</tt><a href=3D"https://www.ietf.org/mailman/listinfo/oauth"><tt><font size=
=3D"3" color=3D"blue"><u>https://www.ietf.org/mailman/listinfo/oauth</u></f=
ont></tt></a><tt><br>
</tt><br>
<font size=3D"3"><br>
<br>
</font><br>
<tt>_______________________________________________<br>
OAuth mailing list<br>
</tt><a href=3D"mailto:OAuth@ietf.org"><tt><font size=3D"3" color=3D"blue">=
<u>OAuth@ietf.org</u></font></tt></a><tt><br>
</tt><a href=3D"https://www.ietf.org/mailman/listinfo/oauth"><tt><font size=
=3D"3" color=3D"blue"><u>https://www.ietf.org/mailman/listinfo/oauth</u></f=
ont></tt></a><tt><br>
</tt><br>
<br>
</blockquote>
</div>
<br>
</div>
</div>
</body>
</html>

--_000_B33BFB58CCC8BE4998958016839DE27E06885FECIMCMBX01MITREOR_--

From wmills_92105@yahoo.com  Mon Feb  4 08:27:55 2013
Return-Path: <wmills_92105@yahoo.com>
X-Original-To: oauth@ietfa.amsl.com
Delivered-To: oauth@ietfa.amsl.com
Received: from localhost (localhost [127.0.0.1]) by ietfa.amsl.com (Postfix) with ESMTP id B21B521F889D for <oauth@ietfa.amsl.com>; Mon,  4 Feb 2013 08:27:55 -0800 (PST)
X-Virus-Scanned: amavisd-new at amsl.com
X-Spam-Flag: NO
X-Spam-Score: -0.461
X-Spam-Level: 
X-Spam-Status: No, score=-0.461 tagged_above=-999 required=5 tests=[AWL=-0.277, BAYES_40=-0.185, HTML_MESSAGE=0.001]
Received: from mail.ietf.org ([64.170.98.30]) by localhost (ietfa.amsl.com [127.0.0.1]) (amavisd-new, port 10024) with ESMTP id tKnf5q32ge+l for <oauth@ietfa.amsl.com>; Mon,  4 Feb 2013 08:27:55 -0800 (PST)
Received: from nm10-vm0.bullet.mail.bf1.yahoo.com (nm10-vm0.bullet.mail.bf1.yahoo.com [98.139.213.147]) by ietfa.amsl.com (Postfix) with SMTP id E519021F86D3 for <oauth@ietf.org>; Mon,  4 Feb 2013 08:27:54 -0800 (PST)
Received: from [98.139.215.140] by nm10.bullet.mail.bf1.yahoo.com with NNFMP; 04 Feb 2013 16:27:54 -0000
Received: from [98.139.212.193] by tm11.bullet.mail.bf1.yahoo.com with NNFMP; 04 Feb 2013 16:27:54 -0000
Received: from [127.0.0.1] by omp1002.mail.bf1.yahoo.com with NNFMP; 04 Feb 2013 16:27:54 -0000
X-Yahoo-Newman-Property: ymail-3
X-Yahoo-Newman-Id: 276422.27901.bm@omp1002.mail.bf1.yahoo.com
Received: (qmail 64717 invoked by uid 60001); 4 Feb 2013 16:27:53 -0000
DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=yahoo.com; s=s1024; t=1359995273; bh=2ETyejBgb1qLxGDTBHpyHTW2vYX2g2GNu3hxvVBYhZQ=; h=X-YMail-OSG:Received:X-Rocket-MIMEInfo:X-Mailer:References:Message-ID:Date:From:Reply-To:Subject:To:In-Reply-To:MIME-Version:Content-Type; b=AHZTLWbeZlKcTWaGmpWlW/GlHmS8RnbUn7ojcka8/+k3R6YJXo4jORql1Pr4m0coqB+b58Td7r9v8QEjAxkNvHVWpdjNhkH7CSwZYztFR91rIgruIUoROIgPuVMtXTkW77gg+nAYZ5gj2zCPxnOy05q21QQOsHAyLmLbXvMSrWM=
DomainKey-Signature: a=rsa-sha1; q=dns; c=nofws; s=s1024; d=yahoo.com; h=X-YMail-OSG:Received:X-Rocket-MIMEInfo:X-Mailer:References:Message-ID:Date:From:Reply-To:Subject:To:In-Reply-To:MIME-Version:Content-Type; b=VNtZFnxXHQD1U+E+7WNUbKyF+BJfbiL1/0ruIJMcfRw3FckhfEDvEWz3e3WBRAmlxLDrf6+DvFKOYBQuKbFVPP5MfkIJz8vi+ZmbgJ3h41fzpPZzJqIFmT0dClyxgwiUt/Y5D56pbSvzcXBFGtusenPS1CsJ0NfeUu/+pWEXyls=;
X-YMail-OSG: zhMGnbIVM1mFYqGR_75PCfuBLYk0W.rHLRMiqbJwPt171OY maOrgFfFAaQHfjyamAXbHwcLheNHs700R7_EgHpMPC44JOpMc.YYto8RSaox VW2HywjmhGDpksRVzDQUAtJcPaBOzxty6_ueAi2OlxB6LXbAJIgGQgFkmLQy k_UxcH5PdosODf3OyJ7XdI_iSG97JevzzIss5.0m5lSMZu7cC7CVdbPpgoPZ vr1UzvFs1oeoNaCv4FlrCaTJpjybir4Yp2BU8EWVXL5xqjljwyRK2G_tmOmZ rABnaL2feT0IZJmUOv_38TmjPJXAa9HJ.kKN9CoGBOKn9xbAdvOR.ZL_gNSr xDkvpn9iwPtie90PdsGGESYowQIv63dsIHMI9.KVulL4D4s5JB9AfnFBckqh TZfp3KdG9V_ECBjOHumKvGWvQHupysNk9vGyF0owsQQ2UwpRlz4n_yxeTmkx 3oD1we7swyAUPVn6KuEFe2vCJuDm5s4iZM0d9i5_OG0rb4c1_XPRHNeT4oji T3FrJzqBlVRY507DKiNMEkQFkb8f3h0vbR7AQXWhXQ1M-
Received: from [209.131.62.115] by web31809.mail.mud.yahoo.com via HTTP; Mon, 04 Feb 2013 08:27:53 PST
X-Rocket-MIMEInfo: 001.001, VGhlcmUgYXJlIHR3byBlZmZvcnRzIGF0IHNpZ25lZCB0b2tlbiB0eXBlczogTUFDIHdoaWNoIGlzIHN0aWxsIGEgcG9zc2liaWxpdHkgaWYgd2Ugd2FrZSB1cCBhbmQgZG8gaXQsIGFuZCB0aGUgIkhvbGRlciBPZiBLZXkiIHR5cGUgdG9rZW5zLgoKVGhlcmUgYXJlIGEgbG90IG9mIGZvbGtzIHRoYXQgYWdyZWUgd2l0aCB5b3UuCgoKX19fX19fX19fX19fX19fX19fX19fX19fX19fX19fX18KIEZyb206IEwuIFByZXN0b24gU2VnbyBJSUkgPExQU2VnbzNAZ21haWwuY29tPgpUbzogb2F1dGhAaWV0Zi5vcmcgClMBMAEBAQE-
X-Mailer: YahooMailWebService/0.8.132.503
References: <CAEeqsMat2_zoSCyx7uN373m1SMNGAz=QxEmVYWOYax=Ppt2LnQ@mail.gmail.com>
Message-ID: <1359995273.56871.YahooMailNeo@web31809.mail.mud.yahoo.com>
Date: Mon, 4 Feb 2013 08:27:53 -0800 (PST)
From: William Mills <wmills_92105@yahoo.com>
To: "L. Preston Sego III" <LPSego3@gmail.com>, "oauth@ietf.org" <oauth@ietf.org>
In-Reply-To: <CAEeqsMat2_zoSCyx7uN373m1SMNGAz=QxEmVYWOYax=Ppt2LnQ@mail.gmail.com>
MIME-Version: 1.0
Content-Type: multipart/alternative; boundary="-1395015409-1689342969-1359995273=:56871"
Subject: Re: [OAUTH-WG] I'm concerned about how the sniffability of oauth2 requests
X-BeenThere: oauth@ietf.org
X-Mailman-Version: 2.1.12
Precedence: list
Reply-To: William Mills <wmills_92105@yahoo.com>
List-Id: OAUTH WG <oauth.ietf.org>
List-Unsubscribe: <https://www.ietf.org/mailman/options/oauth>, <mailto:oauth-request@ietf.org?subject=unsubscribe>
List-Archive: <http://www.ietf.org/mail-archive/web/oauth>
List-Post: <mailto:oauth@ietf.org>
List-Help: <mailto:oauth-request@ietf.org?subject=help>
List-Subscribe: <https://www.ietf.org/mailman/listinfo/oauth>, <mailto:oauth-request@ietf.org?subject=subscribe>
X-List-Received-Date: Mon, 04 Feb 2013 16:27:55 -0000

---1395015409-1689342969-1359995273=:56871
Content-Type: text/plain; charset=us-ascii

There are two efforts at signed token types: MAC which is still a possibility if we wake up and do it, and the "Holder Of Key" type tokens.

There are a lot of folks that agree with you.


________________________________
 From: L. Preston Sego III <LPSego3@gmail.com>
To: oauth@ietf.org 
Sent: Friday, February 1, 2013 7:37 AM
Subject: [OAUTH-WG] I'm concerned about how the sniffability of oauth2 requests
 

In an oauth2 request, the access token is passed along in the header, with nothing else.

As I understand it, oauth2 was designed to be simple for everyone to use. And while, that's true, I don't really like how all of the security is reliant on SSL.

what if an attack can strip away SSL using a tool such as sslstrip (or whatever else would be more suitable for modern https)? They would be able to see the access token and start forging whatever request he or she wants to.

Why not do some sort of RSA-type public-private key thing like back in Oauth1, where there is verification of the payload on each request? Just use a better algorithm?
_______________________________________________
OAuth mailing list
OAuth@ietf.org
https://www.ietf.org/mailman/listinfo/oauth
---1395015409-1689342969-1359995273=:56871
Content-Type: text/html; charset=us-ascii

<html><body><div style="color:#000; background-color:#fff; font-family:Courier New, courier, monaco, monospace, sans-serif;font-size:12pt"><div><span>There are two efforts at signed token types: MAC which is still a possibility if we wake up and do it, and the "Holder Of Key" type tokens.</span></div><div style="color: rgb(0, 0, 0); font-size: 16px; font-family: 'Courier New', courier, monaco, monospace, sans-serif; background-color: transparent; font-style: normal;"><span><br></span></div><div style="color: rgb(0, 0, 0); font-size: 16px; font-family: 'Courier New', courier, monaco, monospace, sans-serif; background-color: transparent; font-style: normal;"><span>There are a lot of folks that agree with you.</span></div><div><br></div>  <div style="font-family: 'Courier New', courier, monaco, monospace, sans-serif; font-size: 12pt;"> <div style="font-family: 'times new roman', 'new york', times, serif; font-size: 12pt;"> <div dir="ltr"> <font size="2"
 face="Arial"> <hr size="1">  <b><span style="font-weight:bold;">From:</span></b> L. Preston Sego III &lt;LPSego3@gmail.com&gt;<br> <b><span style="font-weight: bold;">To:</span></b> oauth@ietf.org <br> <b><span style="font-weight: bold;">Sent:</span></b> Friday, February 1, 2013 7:37 AM<br> <b><span style="font-weight: bold;">Subject:</span></b> [OAUTH-WG] I'm concerned about how the sniffability of oauth2 requests<br> </font> </div> <br>
<div id="yiv300883119"><div dir="ltr">In an oauth2 request, the access token is passed along in the header, with nothing else.<div><br></div><div style="">As I understand it, oauth2 was designed to be simple for everyone to use. And while, that's true, I don't really like how all of the security is reliant on SSL.</div>

<div style=""><br></div><div style="">what if an attack can strip away SSL using a tool such as sslstrip (or whatever else would be more suitable for modern https)? They would be able to see the access token and start forging whatever request he or she wants to.</div>

<div style=""><br></div><div style="">Why not do some sort of RSA-type public-private key thing like back in Oauth1, where there is verification of the payload on each request? Just use a better algorithm?</div></div>
</div><br>_______________________________________________<br>OAuth mailing list<br><a ymailto="mailto:OAuth@ietf.org" href="mailto:OAuth@ietf.org">OAuth@ietf.org</a><br><a href="https://www.ietf.org/mailman/listinfo/oauth" target="_blank">https://www.ietf.org/mailman/listinfo/oauth</a><br><br><br> </div> </div>  </div></body></html>
---1395015409-1689342969-1359995273=:56871--

From prateek.mishra@oracle.com  Mon Feb  4 08:35:32 2013
Return-Path: <prateek.mishra@oracle.com>
X-Original-To: oauth@ietfa.amsl.com
Delivered-To: oauth@ietfa.amsl.com
Received: from localhost (localhost [127.0.0.1]) by ietfa.amsl.com (Postfix) with ESMTP id 790F221F8929 for <oauth@ietfa.amsl.com>; Mon,  4 Feb 2013 08:35:32 -0800 (PST)
X-Virus-Scanned: amavisd-new at amsl.com
X-Spam-Flag: NO
X-Spam-Score: -6.598
X-Spam-Level: 
X-Spam-Status: No, score=-6.598 tagged_above=-999 required=5 tests=[BAYES_00=-2.599, HTML_MESSAGE=0.001, RCVD_IN_DNSWL_MED=-4]
Received: from mail.ietf.org ([64.170.98.30]) by localhost (ietfa.amsl.com [127.0.0.1]) (amavisd-new, port 10024) with ESMTP id snvDCVXnFmdL for <oauth@ietfa.amsl.com>; Mon,  4 Feb 2013 08:35:31 -0800 (PST)
Received: from userp1040.oracle.com (userp1040.oracle.com [156.151.31.81]) by ietfa.amsl.com (Postfix) with ESMTP id D34A221F8922 for <oauth@ietf.org>; Mon,  4 Feb 2013 08:35:31 -0800 (PST)
Received: from ucsinet22.oracle.com (ucsinet22.oracle.com [156.151.31.94]) by userp1040.oracle.com (Sentrion-MTA-4.3.1/Sentrion-MTA-4.3.1) with ESMTP id r14GZSue006326 (version=TLSv1/SSLv3 cipher=DHE-RSA-AES256-SHA bits=256 verify=OK); Mon, 4 Feb 2013 16:35:29 GMT
Received: from acsmt356.oracle.com (acsmt356.oracle.com [141.146.40.156]) by ucsinet22.oracle.com (8.14.4+Sun/8.14.4) with ESMTP id r14GZPJj022601 (version=TLSv1/SSLv3 cipher=DHE-RSA-AES256-SHA bits=256 verify=NO); Mon, 4 Feb 2013 16:35:25 GMT
Received: from abhmt112.oracle.com (abhmt112.oracle.com [141.146.116.64]) by acsmt356.oracle.com (8.12.11.20060308/8.12.11) with ESMTP id r14GZPDC002280; Mon, 4 Feb 2013 10:35:25 -0600
Received: from [10.152.55.88] (/10.152.55.88) by default (Oracle Beehive Gateway v4.0) with ESMTP ; Mon, 04 Feb 2013 08:35:24 -0800
Message-ID: <510FE34B.1080601@oracle.com>
Date: Mon, 04 Feb 2013 11:35:23 -0500
From: Prateek Mishra <prateek.mishra@oracle.com>
Organization: Oracle Corporation
User-Agent: Mozilla/5.0 (Windows NT 5.1; rv:17.0) Gecko/20130107 Thunderbird/17.0.2
MIME-Version: 1.0
To: oauth@ietf.org, LPSego3@gmail.com
References: <CAEeqsMat2_zoSCyx7uN373m1SMNGAz=QxEmVYWOYax=Ppt2LnQ@mail.gmail.com> <1359995273.56871.YahooMailNeo@web31809.mail.mud.yahoo.com>
In-Reply-To: <1359995273.56871.YahooMailNeo@web31809.mail.mud.yahoo.com>
Content-Type: multipart/alternative; boundary="------------070808080201080307040306"
X-Source-IP: ucsinet22.oracle.com [156.151.31.94]
Subject: Re: [OAUTH-WG] I'm concerned about how the sniffability of oauth2 requests
X-BeenThere: oauth@ietf.org
X-Mailman-Version: 2.1.12
Precedence: list
List-Id: OAUTH WG <oauth.ietf.org>
List-Unsubscribe: <https://www.ietf.org/mailman/options/oauth>, <mailto:oauth-request@ietf.org?subject=unsubscribe>
List-Archive: <http://www.ietf.org/mail-archive/web/oauth>
List-Post: <mailto:oauth@ietf.org>
List-Help: <mailto:oauth-request@ietf.org?subject=help>
List-Subscribe: <https://www.ietf.org/mailman/listinfo/oauth>, <mailto:oauth-request@ietf.org?subject=subscribe>
X-List-Received-Date: Mon, 04 Feb 2013 16:35:32 -0000

This is a multi-part message in MIME format.
--------------070808080201080307040306
Content-Type: text/plain; charset=ISO-8859-1; format=flowed
Content-Transfer-Encoding: 7bit

Can you explain how SSLstrip could be used to defeat the OAuth flows? 
Isn't it dependent on web pages with non-HTTPs links?

Which step in the OAuth exchanges would be vulnerable?

BTW, there is a threats analysis document that discusses a variety of 
attacks and countermeasures  -

http://datatracker.ietf.org/doc/rfc6819/


> There are two efforts at signed token types: MAC which is still a 
> possibility if we wake up and do it, and the "Holder Of Key" type tokens.
>
> There are a lot of folks that agree with you.
>
> ------------------------------------------------------------------------
> *From:* L. Preston Sego III <LPSego3@gmail.com>
> *To:* oauth@ietf.org
> *Sent:* Friday, February 1, 2013 7:37 AM
> *Subject:* [OAUTH-WG] I'm concerned about how the sniffability of 
> oauth2 requests
>
> In an oauth2 request, the access token is passed along in the header, 
> with nothing else.
>
> As I understand it, oauth2 was designed to be simple for everyone to 
> use. And while, that's true, I don't really like how all of the 
> security is reliant on SSL.
>
> what if an attack can strip away SSL using a tool such as sslstrip (or 
> whatever else would be more suitable for modern https)? They would be 
> able to see the access token and start forging whatever request he or 
> she wants to.
>
> Why not do some sort of RSA-type public-private key thing like back in 
> Oauth1, where there is verification of the payload on each request? 
> Just use a better algorithm?
>
> _______________________________________________
> OAuth mailing list
> OAuth@ietf.org <mailto:OAuth@ietf.org>
> https://www.ietf.org/mailman/listinfo/oauth
>
>
>
>
> _______________________________________________
> OAuth mailing list
> OAuth@ietf.org
> https://www.ietf.org/mailman/listinfo/oauth


--------------070808080201080307040306
Content-Type: text/html; charset=ISO-8859-1
Content-Transfer-Encoding: 7bit

<html>
  <head>
    <meta content="text/html; charset=ISO-8859-1"
      http-equiv="Content-Type">
  </head>
  <body bgcolor="#FFFFFF" text="#000000">
    Can you explain how SSLstrip could be used to defeat the OAuth
    flows? Isn't it dependent on web pages with non-HTTPs links?<br>
    <br>
    Which step in the OAuth exchanges would be vulnerable?<br>
    <br>
    BTW, there is a threats analysis document that discusses a variety
    of attacks and countermeasures&nbsp; -<br>
    <br>
    <a class="moz-txt-link-freetext" href="http://datatracker.ietf.org/doc/rfc6819/">http://datatracker.ietf.org/doc/rfc6819/</a><br>
    <br>
    <br>
    <blockquote
      cite="mid:1359995273.56871.YahooMailNeo@web31809.mail.mud.yahoo.com"
      type="cite">
      <div style="color:#000; background-color:#fff; font-family:Courier
        New, courier, monaco, monospace, sans-serif;font-size:12pt">
        <div><span>There are two efforts at signed token types: MAC
            which is still a possibility if we wake up and do it, and
            the "Holder Of Key" type tokens.</span></div>
        <div style="color: rgb(0, 0, 0); font-size: 16px; font-family:
          'Courier New', courier, monaco, monospace, sans-serif;
          background-color: transparent; font-style: normal;"><span><br>
          </span></div>
        <div style="color: rgb(0, 0, 0); font-size: 16px; font-family:
          'Courier New', courier, monaco, monospace, sans-serif;
          background-color: transparent; font-style: normal;"><span>There
            are a lot of folks that agree with you.</span></div>
        <div><br>
        </div>
        <div style="font-family: 'Courier New', courier, monaco,
          monospace, sans-serif; font-size: 12pt;">
          <div style="font-family: 'times new roman', 'new york', times,
            serif; font-size: 12pt;">
            <div dir="ltr"> <font face="Arial" size="2">
                <hr size="1"> <b><span style="font-weight:bold;">From:</span></b>
                L. Preston Sego III <a class="moz-txt-link-rfc2396E" href="mailto:LPSego3@gmail.com">&lt;LPSego3@gmail.com&gt;</a><br>
                <b><span style="font-weight: bold;">To:</span></b>
                <a class="moz-txt-link-abbreviated" href="mailto:oauth@ietf.org">oauth@ietf.org</a> <br>
                <b><span style="font-weight: bold;">Sent:</span></b>
                Friday, February 1, 2013 7:37 AM<br>
                <b><span style="font-weight: bold;">Subject:</span></b>
                [OAUTH-WG] I'm concerned about how the sniffability of
                oauth2 requests<br>
              </font> </div>
            <br>
            <div id="yiv300883119">
              <div dir="ltr">In an oauth2 request, the access token is
                passed along in the header, with nothing else.
                <div><br>
                </div>
                <div style="">As I understand it, oauth2 was designed to
                  be simple for everyone to use. And while, that's true,
                  I don't really like how all of the security is reliant
                  on SSL.</div>
                <div style=""><br>
                </div>
                <div style="">what if an attack can strip away SSL using
                  a tool such as sslstrip (or whatever else would be
                  more suitable for modern https)? They would be able to
                  see the access token and start forging whatever
                  request he or she wants to.</div>
                <div style=""><br>
                </div>
                <div style="">Why not do some sort of RSA-type
                  public-private key thing like back in Oauth1, where
                  there is verification of the payload on each request?
                  Just use a better algorithm?</div>
              </div>
            </div>
            <br>
            _______________________________________________<br>
            OAuth mailing list<br>
            <a moz-do-not-send="true" ymailto="mailto:OAuth@ietf.org"
              href="mailto:OAuth@ietf.org">OAuth@ietf.org</a><br>
            <a moz-do-not-send="true"
              href="https://www.ietf.org/mailman/listinfo/oauth"
              target="_blank">https://www.ietf.org/mailman/listinfo/oauth</a><br>
            <br>
            <br>
          </div>
        </div>
      </div>
      <br>
      <fieldset class="mimeAttachmentHeader"></fieldset>
      <br>
      <pre wrap="">_______________________________________________
OAuth mailing list
<a class="moz-txt-link-abbreviated" href="mailto:OAuth@ietf.org">OAuth@ietf.org</a>
<a class="moz-txt-link-freetext" href="https://www.ietf.org/mailman/listinfo/oauth">https://www.ietf.org/mailman/listinfo/oauth</a>
</pre>
    </blockquote>
    <br>
  </body>
</html>

--------------070808080201080307040306--

From sberyozkin@gmail.com  Mon Feb  4 08:57:53 2013
Return-Path: <sberyozkin@gmail.com>
X-Original-To: oauth@ietfa.amsl.com
Delivered-To: oauth@ietfa.amsl.com
Received: from localhost (localhost [127.0.0.1]) by ietfa.amsl.com (Postfix) with ESMTP id 4E6B221F8837 for <oauth@ietfa.amsl.com>; Mon,  4 Feb 2013 08:57:53 -0800 (PST)
X-Virus-Scanned: amavisd-new at amsl.com
X-Spam-Flag: NO
X-Spam-Score: -3.599
X-Spam-Level: 
X-Spam-Status: No, score=-3.599 tagged_above=-999 required=5 tests=[BAYES_00=-2.599, RCVD_IN_DNSWL_LOW=-1]
Received: from mail.ietf.org ([64.170.98.30]) by localhost (ietfa.amsl.com [127.0.0.1]) (amavisd-new, port 10024) with ESMTP id l25WZvL1Aoih for <oauth@ietfa.amsl.com>; Mon,  4 Feb 2013 08:57:52 -0800 (PST)
Received: from mail-ee0-f47.google.com (mail-ee0-f47.google.com [74.125.83.47]) by ietfa.amsl.com (Postfix) with ESMTP id 6AFA121F8833 for <oauth@ietf.org>; Mon,  4 Feb 2013 08:57:52 -0800 (PST)
Received: by mail-ee0-f47.google.com with SMTP id e52so3303552eek.6 for <oauth@ietf.org>; Mon, 04 Feb 2013 08:57:51 -0800 (PST)
DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=gmail.com; s=20120113; h=x-received:message-id:date:from:user-agent:mime-version:to:subject :references:in-reply-to:content-type:content-transfer-encoding; bh=JKbRTGZjkZaUhx6c65gOduZIKXKtF0uxwjInSrL7y48=; b=kaic8LjdFwNXQS+MJYXGL/RgUv12/KcZWELhRFkY5cudS0BBvV9cIIP588veml4vXv L2WzoDMOndp0JXwZvBTrIYZz97tycyjXusLzDp1D4N4tH9ZKDoZ/nWnNN+/3nHo2iZey XEEm/DcCePIFmsYI2NUaaZ5VB1qzgJFqjA0iysLZhVGF+nzuxPYUUQqOjuk5j3NLSnO3 b+3OAjRg7zvJ/mYzHkxJsmrfNFy1PgTEJJIAWphndtVeY02Ww6DW0xjm96unR/KPAmze dKY8mv3L3YZF9n91Gve3fiB00r7rSD53dNm3NqFH3oimiSbeZveXsFoBpKjpbZKbTHlg 0Y9w==
X-Received: by 10.14.173.65 with SMTP id u41mr73819312eel.13.1359997071352; Mon, 04 Feb 2013 08:57:51 -0800 (PST)
Received: from [10.36.226.5] ([217.173.99.61]) by mx.google.com with ESMTPS id a1sm2875700eep.2.2013.02.04.08.57.49 (version=TLSv1 cipher=ECDHE-RSA-RC4-SHA bits=128/128); Mon, 04 Feb 2013 08:57:50 -0800 (PST)
Message-ID: <510FE88B.9040200@gmail.com>
Date: Mon, 04 Feb 2013 16:57:47 +0000
From: Sergey Beryozkin <sberyozkin@gmail.com>
User-Agent: Mozilla/5.0 (X11; Linux x86_64; rv:12.0) Gecko/20120430 Thunderbird/12.0.1
MIME-Version: 1.0
To: oauth@ietf.org
References: <CAEeqsMat2_zoSCyx7uN373m1SMNGAz=QxEmVYWOYax=Ppt2LnQ@mail.gmail.com> <1359995273.56871.YahooMailNeo@web31809.mail.mud.yahoo.com>
In-Reply-To: <1359995273.56871.YahooMailNeo@web31809.mail.mud.yahoo.com>
Content-Type: text/plain; charset=ISO-8859-1; format=flowed
Content-Transfer-Encoding: 7bit
Subject: Re: [OAUTH-WG] I'm concerned about how the sniffability of oauth2 requests
X-BeenThere: oauth@ietf.org
X-Mailman-Version: 2.1.12
Precedence: list
List-Id: OAUTH WG <oauth.ietf.org>
List-Unsubscribe: <https://www.ietf.org/mailman/options/oauth>, <mailto:oauth-request@ietf.org?subject=unsubscribe>
List-Archive: <http://www.ietf.org/mail-archive/web/oauth>
List-Post: <mailto:oauth@ietf.org>
List-Help: <mailto:oauth-request@ietf.org?subject=help>
List-Subscribe: <https://www.ietf.org/mailman/listinfo/oauth>, <mailto:oauth-request@ietf.org?subject=subscribe>
X-List-Received-Date: Mon, 04 Feb 2013 16:57:53 -0000

On 04/02/13 16:27, William Mills wrote:
> There are two efforts at signed token types: MAC which is still a
> possibility if we wake up and do it,

I'd rephrase it slightly differently, it is a possibility right now, 
OAuth2 supports custom tokens, the fact that OAuth2 may not formally 
approve MAC won't preclude the use of MAC in the OAuth2 compliant manner.

Of course OAuth2 putting a stamp of approval will make it more visible, 
without it, the existing MAC draft issues (if any) will end up being 
addressed at the specific implementations level only - not ideal for the 
community at large but it is up to OAuth2...

Cheers, Sergey


> and the "Holder Of Key" type tokens.
>
> There are a lot of folks that agree with you.
>
> ------------------------------------------------------------------------
> *From:* L. Preston Sego III <LPSego3@gmail.com>
> *To:* oauth@ietf.org
> *Sent:* Friday, February 1, 2013 7:37 AM
> *Subject:* [OAUTH-WG] I'm concerned about how the sniffability of oauth2
> requests
>
> In an oauth2 request, the access token is passed along in the header,
> with nothing else.
>
> As I understand it, oauth2 was designed to be simple for everyone to
> use. And while, that's true, I don't really like how all of the security
> is reliant on SSL.
>
> what if an attack can strip away SSL using a tool such as sslstrip (or
> whatever else would be more suitable for modern https)? They would be
> able to see the access token and start forging whatever request he or
> she wants to.
>
> Why not do some sort of RSA-type public-private key thing like back in
> Oauth1, where there is verification of the payload on each request? Just
> use a better algorithm?
>
> _______________________________________________
> OAuth mailing list
> OAuth@ietf.org <mailto:OAuth@ietf.org>
> https://www.ietf.org/mailman/listinfo/oauth
>
>
>
>
> _______________________________________________
> OAuth mailing list
> OAuth@ietf.org
> https://www.ietf.org/mailman/listinfo/oauth



From Adam.Lewis@motorolasolutions.com  Mon Feb  4 09:02:40 2013
Return-Path: <Adam.Lewis@motorolasolutions.com>
X-Original-To: oauth@ietfa.amsl.com
Delivered-To: oauth@ietfa.amsl.com
Received: from localhost (localhost [127.0.0.1]) by ietfa.amsl.com (Postfix) with ESMTP id 1A25E21F8470 for <oauth@ietfa.amsl.com>; Mon,  4 Feb 2013 09:02:40 -0800 (PST)
X-Virus-Scanned: amavisd-new at amsl.com
X-Spam-Flag: NO
X-Spam-Score: -3.467
X-Spam-Level: 
X-Spam-Status: No, score=-3.467 tagged_above=-999 required=5 tests=[BAYES_00=-2.599, RCVD_IN_DNSWL_MED=-4, UNRESOLVED_TEMPLATE=3.132]
Received: from mail.ietf.org ([64.170.98.30]) by localhost (ietfa.amsl.com [127.0.0.1]) (amavisd-new, port 10024) with ESMTP id 9izXU0Ok0DFr for <oauth@ietfa.amsl.com>; Mon,  4 Feb 2013 09:02:39 -0800 (PST)
Received: from co9outboundpool.messaging.microsoft.com (co9ehsobe004.messaging.microsoft.com [207.46.163.27]) by ietfa.amsl.com (Postfix) with ESMTP id 6E07821F8468 for <oauth@ietf.org>; Mon,  4 Feb 2013 09:02:39 -0800 (PST)
Received: from mail81-co9-R.bigfish.com (10.236.132.229) by CO9EHSOBE033.bigfish.com (10.236.130.96) with Microsoft SMTP Server id 14.1.225.23; Mon, 4 Feb 2013 17:02:38 +0000
Received: from mail81-co9 (localhost [127.0.0.1])	by mail81-co9-R.bigfish.com (Postfix) with ESMTP id 79D5F1E0170	for <oauth@ietf.org>; Mon,  4 Feb 2013 17:02:38 +0000 (UTC)
X-Forefront-Antispam-Report: CIP:129.188.136.18; KIP:(null); UIP:(null); IPV:NLI; H:il06msg02.am.mot-solutions.com; RD:none; EFVD:NLI
X-SpamScore: -25
X-BigFish: VPS-25(zzbb2dI98dI9371I542I1432Izz1ee6h1de0h1202h1e76h1d1ah1d2ahzz1033IL8275bh8275dhz2fh2a8h683h839h944hd25hf0ah1220h1288h12a5h12a9h12bdh137ah13b6h1441h1504h1537h153bh15d0h162dh1631h1758h18e1h1946h1155h)
Received-SPF: pass (mail81-co9: domain of motorolasolutions.com designates 129.188.136.18 as permitted sender) client-ip=129.188.136.18; envelope-from=Adam.Lewis@motorolasolutions.com; helo=il06msg02.am.mot-solutions.com ; olutions.com ; 
X-Forefront-Antispam-Report-Untrusted: CIP:157.56.237.133; KIP:(null); UIP:(null); (null); H:BY2PRD0411HT005.namprd04.prod.outlook.com; R:internal; EFV:INT
Received: from mail81-co9 (localhost.localdomain [127.0.0.1]) by mail81-co9 (MessageSwitch) id 1359997355232299_4628; Mon,  4 Feb 2013 17:02:35 +0000 (UTC)
Received: from CO9EHSMHS023.bigfish.com (unknown [10.236.132.247])	by mail81-co9.bigfish.com (Postfix) with ESMTP id 297428005B	for <oauth@ietf.org>; Mon,  4 Feb 2013 17:02:35 +0000 (UTC)
Received: from il06msg02.am.mot-solutions.com (129.188.136.18) by CO9EHSMHS023.bigfish.com (10.236.130.33) with Microsoft SMTP Server (TLS) id 14.1.225.23; Mon, 4 Feb 2013 17:02:31 +0000
Received: from il06msg02.am.mot-solutions.com (il06vts01.mot.com [129.188.137.141])	by il06msg02.am.mot-solutions.com (8.14.3/8.14.3) with ESMTP id r14H2UBb020820	for <oauth@ietf.org>; Mon, 4 Feb 2013 12:02:30 -0500 (EST)
Received: from CO9EHSOBE004.bigfish.com (co9ehsobe001.messaging.microsoft.com [207.46.163.24])	by il06msg02.am.mot-solutions.com (8.14.3/8.14.3) with ESMTP id r14H2Uim020814	(version=TLSv1/SSLv3 cipher=AES128-SHA bits=128 verify=FAIL)	for <oauth@ietf.org>; Mon, 4 Feb 2013 12:02:30 -0500 (EST)
Received: from mail5-co9-R.bigfish.com (10.236.132.250) by CO9EHSOBE004.bigfish.com (10.236.130.67) with Microsoft SMTP Server id 14.1.225.23; Mon, 4 Feb 2013 17:02:29 +0000
Received: from mail5-co9 (localhost [127.0.0.1])	by mail5-co9-R.bigfish.com (Postfix) with ESMTP id D7774600E2	for <oauth@ietf.org.FOPE.CONNECTOR.OVERRIDE>; Mon,  4 Feb 2013 17:02:29 +0000 (UTC)
Received: from mail5-co9 (localhost.localdomain [127.0.0.1]) by mail5-co9 (MessageSwitch) id 1359997347102196_14450; Mon,  4 Feb 2013 17:02:27 +0000 (UTC)
Received: from CO9EHSMHS032.bigfish.com (unknown [10.236.132.240])	by mail5-co9.bigfish.com (Postfix) with ESMTP id 0D00D2A0092; Mon,  4 Feb 2013 17:02:27 +0000 (UTC)
Received: from BY2PRD0411HT005.namprd04.prod.outlook.com (157.56.237.133) by CO9EHSMHS032.bigfish.com (10.236.130.42) with Microsoft SMTP Server (TLS) id 14.1.225.23; Mon, 4 Feb 2013 17:02:25 +0000
Received: from BY2PRD0411MB441.namprd04.prod.outlook.com ([169.254.5.124]) by BY2PRD0411HT005.namprd04.prod.outlook.com ([10.255.128.40]) with mapi id 14.16.0263.000; Mon, 4 Feb 2013 17:02:25 +0000
From: Lewis Adam-CAL022 <Adam.Lewis@motorolasolutions.com>
To: Sergey Beryozkin <sberyozkin@gmail.com>, "oauth@ietf.org" <oauth@ietf.org>
Thread-Topic: [OAUTH-WG] I'm concerned about how the sniffability of oauth2 requests
Thread-Index: AQHOAvjXSWFz2rdIEU2u7m+7uFC8jphp7JuA
Date: Mon, 4 Feb 2013 17:02:23 +0000
Message-ID: <59E470B10C4630419ED717AC79FCF9A9483E53D9@BY2PRD0411MB441.namprd04.prod.outlook.com>
References: <CAEeqsMat2_zoSCyx7uN373m1SMNGAz=QxEmVYWOYax=Ppt2LnQ@mail.gmail.com> <1359995273.56871.YahooMailNeo@web31809.mail.mud.yahoo.com> <510FE88B.9040200@gmail.com>
In-Reply-To: <510FE88B.9040200@gmail.com>
Accept-Language: en-US
Content-Language: en-US
X-MS-Has-Attach: 
X-MS-TNEF-Correlator: 
x-originating-ip: [150.130.131.252]
Content-Type: text/plain; charset="us-ascii"
Content-Transfer-Encoding: quoted-printable
MIME-Version: 1.0
X-FOPE-CONNECTOR: Id%0$Dn%*$RO%0$TLS%0$FQDN%$TlsDn%
X-FOPE-CONNECTOR: Id%1294$Dn%GMAIL.COM$RO%2$TLS%3$FQDN%msgate.mot-solutions.com$TlsDn%
X-FOPE-CONNECTOR: Id%1294$Dn%IETF.ORG$RO%2$TLS%3$FQDN%msgate.mot-solutions.com$TlsDn%
X-CFilter-Loop: Reflected
X-OriginatorOrg: motorolasolutions.com
Subject: Re: [OAUTH-WG] I'm concerned about how the sniffability of oauth2 requests
X-BeenThere: oauth@ietf.org
X-Mailman-Version: 2.1.12
Precedence: list
List-Id: OAUTH WG <oauth.ietf.org>
List-Unsubscribe: <https://www.ietf.org/mailman/options/oauth>, <mailto:oauth-request@ietf.org?subject=unsubscribe>
List-Archive: <http://www.ietf.org/mail-archive/web/oauth>
List-Post: <mailto:oauth@ietf.org>
List-Help: <mailto:oauth-request@ietf.org?subject=help>
List-Subscribe: <https://www.ietf.org/mailman/listinfo/oauth>, <mailto:oauth-request@ietf.org?subject=subscribe>
X-List-Received-Date: Mon, 04 Feb 2013 17:02:40 -0000

Speaking of ... what is the status of the HOK work?  The last draft has exp=
ired and its fallen off of the OAuth page now. =20



-----Original Message-----
From: oauth-bounces@ietf.org [mailto:oauth-bounces@ietf.org] On Behalf Of S=
ergey Beryozkin
Sent: Monday, February 04, 2013 10:58 AM
To: oauth@ietf.org
Subject: Re: [OAUTH-WG] I'm concerned about how the sniffability of oauth2 =
requests

On 04/02/13 16:27, William Mills wrote:
> There are two efforts at signed token types: MAC which is still a
> possibility if we wake up and do it,

I'd rephrase it slightly differently, it is a possibility right now,=20
OAuth2 supports custom tokens, the fact that OAuth2 may not formally=20
approve MAC won't preclude the use of MAC in the OAuth2 compliant manner.

Of course OAuth2 putting a stamp of approval will make it more visible,=20
without it, the existing MAC draft issues (if any) will end up being=20
addressed at the specific implementations level only - not ideal for the=20
community at large but it is up to OAuth2...

Cheers, Sergey


> and the "Holder Of Key" type tokens.
>
> There are a lot of folks that agree with you.
>
> ------------------------------------------------------------------------
> *From:* L. Preston Sego III <LPSego3@gmail.com>
> *To:* oauth@ietf.org
> *Sent:* Friday, February 1, 2013 7:37 AM
> *Subject:* [OAUTH-WG] I'm concerned about how the sniffability of oauth2
> requests
>
> In an oauth2 request, the access token is passed along in the header,
> with nothing else.
>
> As I understand it, oauth2 was designed to be simple for everyone to
> use. And while, that's true, I don't really like how all of the security
> is reliant on SSL.
>
> what if an attack can strip away SSL using a tool such as sslstrip (or
> whatever else would be more suitable for modern https)? They would be
> able to see the access token and start forging whatever request he or
> she wants to.
>
> Why not do some sort of RSA-type public-private key thing like back in
> Oauth1, where there is verification of the payload on each request? Just
> use a better algorithm?
>
> _______________________________________________
> OAuth mailing list
> OAuth@ietf.org <mailto:OAuth@ietf.org>
> https://www.ietf.org/mailman/listinfo/oauth
>
>
>
>
> _______________________________________________
> OAuth mailing list
> OAuth@ietf.org
> https://www.ietf.org/mailman/listinfo/oauth


_______________________________________________
OAuth mailing list
OAuth@ietf.org
https://www.ietf.org/mailman/listinfo/oauth






From hannes.tschofenig@gmx.net  Mon Feb  4 09:09:41 2013
Return-Path: <hannes.tschofenig@gmx.net>
X-Original-To: oauth@ietfa.amsl.com
Delivered-To: oauth@ietfa.amsl.com
Received: from localhost (localhost [127.0.0.1]) by ietfa.amsl.com (Postfix) with ESMTP id A5F7A21F8A04 for <oauth@ietfa.amsl.com>; Mon,  4 Feb 2013 09:09:41 -0800 (PST)
X-Virus-Scanned: amavisd-new at amsl.com
X-Spam-Flag: NO
X-Spam-Score: -102.339
X-Spam-Level: 
X-Spam-Status: No, score=-102.339 tagged_above=-999 required=5 tests=[AWL=0.260, BAYES_00=-2.599, USER_IN_WHITELIST=-100]
Received: from mail.ietf.org ([64.170.98.30]) by localhost (ietfa.amsl.com [127.0.0.1]) (amavisd-new, port 10024) with ESMTP id 4u9UUOzK-eKj for <oauth@ietfa.amsl.com>; Mon,  4 Feb 2013 09:09:41 -0800 (PST)
Received: from mout.gmx.net (mout.gmx.net [212.227.15.18]) by ietfa.amsl.com (Postfix) with ESMTP id A269821F89FD for <oauth@ietf.org>; Mon,  4 Feb 2013 09:09:35 -0800 (PST)
Received: from mailout-de.gmx.net ([10.1.76.35]) by mrigmx.server.lan (mrigmx001) with ESMTP (Nemesis) id 0Lsdt9-1UzHZH1wvx-012GXF for <oauth@ietf.org>; Mon, 04 Feb 2013 18:09:34 +0100
Received: (qmail invoked by alias); 04 Feb 2013 17:09:34 -0000
Received: from a88-115-219-140.elisa-laajakaista.fi (EHLO [192.168.100.100]) [88.115.219.140] by mail.gmx.net (mp035) with SMTP; 04 Feb 2013 18:09:34 +0100
X-Authenticated: #29516787
X-Provags-ID: V01U2FsdGVkX18oMdkcBc4ojfk5PrK6fW/J57Kw0VCGpTtx0HXNDH XrFEJZbDgRpfk3
Mime-Version: 1.0 (Apple Message framework v1085)
Content-Type: text/plain; charset=us-ascii
From: Hannes Tschofenig <hannes.tschofenig@gmx.net>
In-Reply-To: <59E470B10C4630419ED717AC79FCF9A9483E53D9@BY2PRD0411MB441.namprd04.prod.outlook.com>
Date: Mon, 4 Feb 2013 19:09:28 +0200
Content-Transfer-Encoding: quoted-printable
Message-Id: <22CA7ED1-7C56-4358-B69B-9A3067D0829B@gmx.net>
References: <CAEeqsMat2_zoSCyx7uN373m1SMNGAz=QxEmVYWOYax=Ppt2LnQ@mail.gmail.com> <1359995273.56871.YahooMailNeo@web31809.mail.mud.yahoo.com> <510FE88B.9040200@gmail.com> <59E470B10C4630419ED717AC79FCF9A9483E53D9@BY2PRD0411MB441.namprd04.prod.outlook.com>
To: Lewis Adam-CAL022 <Adam.Lewis@motorolasolutions.com>
X-Mailer: Apple Mail (2.1085)
X-Y-GMX-Trusted: 0
Cc: "oauth@ietf.org" <oauth@ietf.org>
Subject: Re: [OAUTH-WG] I'm concerned about how the sniffability of oauth2 requests
X-BeenThere: oauth@ietf.org
X-Mailman-Version: 2.1.12
Precedence: list
List-Id: OAUTH WG <oauth.ietf.org>
List-Unsubscribe: <https://www.ietf.org/mailman/options/oauth>, <mailto:oauth-request@ietf.org?subject=unsubscribe>
List-Archive: <http://www.ietf.org/mail-archive/web/oauth>
List-Post: <mailto:oauth@ietf.org>
List-Help: <mailto:oauth-request@ietf.org?subject=help>
List-Subscribe: <https://www.ietf.org/mailman/listinfo/oauth>, <mailto:oauth-request@ietf.org?subject=subscribe>
X-List-Received-Date: Mon, 04 Feb 2013 17:09:41 -0000

Hi Adam,=20

we had 3 conference calls to discuss the security requirements and now =
we have started the design team work. In fact the first call of the =
design team starts in 45 mins and the conference call details have been =
sent to the list. You are also welcome to join; it is an open design =
team.=20

The security requirements document had been updated and I have =
distributed the meeting minutes to the list.=20
All the drafts will be refreshed in time for the submission deadline.=20

Ciao
Hannes

On Feb 4, 2013, at 7:02 PM, Lewis Adam-CAL022 wrote:

> Speaking of ... what is the status of the HOK work?  The last draft =
has expired and its fallen off of the OAuth page now. =20
>=20
>=20
>=20
> -----Original Message-----
> From: oauth-bounces@ietf.org [mailto:oauth-bounces@ietf.org] On Behalf =
Of Sergey Beryozkin
> Sent: Monday, February 04, 2013 10:58 AM
> To: oauth@ietf.org
> Subject: Re: [OAUTH-WG] I'm concerned about how the sniffability of =
oauth2 requests
>=20
> On 04/02/13 16:27, William Mills wrote:
>> There are two efforts at signed token types: MAC which is still a
>> possibility if we wake up and do it,
>=20
> I'd rephrase it slightly differently, it is a possibility right now,=20=

> OAuth2 supports custom tokens, the fact that OAuth2 may not formally=20=

> approve MAC won't preclude the use of MAC in the OAuth2 compliant =
manner.
>=20
> Of course OAuth2 putting a stamp of approval will make it more =
visible,=20
> without it, the existing MAC draft issues (if any) will end up being=20=

> addressed at the specific implementations level only - not ideal for =
the=20
> community at large but it is up to OAuth2...
>=20
> Cheers, Sergey
>=20
>=20
>> and the "Holder Of Key" type tokens.
>>=20
>> There are a lot of folks that agree with you.
>>=20
>> =
------------------------------------------------------------------------
>> *From:* L. Preston Sego III <LPSego3@gmail.com>
>> *To:* oauth@ietf.org
>> *Sent:* Friday, February 1, 2013 7:37 AM
>> *Subject:* [OAUTH-WG] I'm concerned about how the sniffability of =
oauth2
>> requests
>>=20
>> In an oauth2 request, the access token is passed along in the header,
>> with nothing else.
>>=20
>> As I understand it, oauth2 was designed to be simple for everyone to
>> use. And while, that's true, I don't really like how all of the =
security
>> is reliant on SSL.
>>=20
>> what if an attack can strip away SSL using a tool such as sslstrip =
(or
>> whatever else would be more suitable for modern https)? They would be
>> able to see the access token and start forging whatever request he or
>> she wants to.
>>=20
>> Why not do some sort of RSA-type public-private key thing like back =
in
>> Oauth1, where there is verification of the payload on each request? =
Just
>> use a better algorithm?
>>=20
>> _______________________________________________
>> OAuth mailing list
>> OAuth@ietf.org <mailto:OAuth@ietf.org>
>> https://www.ietf.org/mailman/listinfo/oauth
>>=20
>>=20
>>=20
>>=20
>> _______________________________________________
>> OAuth mailing list
>> OAuth@ietf.org
>> https://www.ietf.org/mailman/listinfo/oauth
>=20
>=20
> _______________________________________________
> OAuth mailing list
> OAuth@ietf.org
> https://www.ietf.org/mailman/listinfo/oauth
>=20
>=20
>=20
>=20
>=20
> _______________________________________________
> OAuth mailing list
> OAuth@ietf.org
> https://www.ietf.org/mailman/listinfo/oauth


From donald.coffin@reminetworks.com  Mon Feb  4 10:55:59 2013
Return-Path: <donald.coffin@reminetworks.com>
X-Original-To: oauth@ietfa.amsl.com
Delivered-To: oauth@ietfa.amsl.com
Received: from localhost (localhost [127.0.0.1]) by ietfa.amsl.com (Postfix) with ESMTP id 5C11121F87E1 for <oauth@ietfa.amsl.com>; Mon,  4 Feb 2013 10:55:59 -0800 (PST)
X-Virus-Scanned: amavisd-new at amsl.com
X-Spam-Flag: NO
X-Spam-Score: -1.239
X-Spam-Level: 
X-Spam-Status: No, score=-1.239 tagged_above=-999 required=5 tests=[AWL=1.025,  BAYES_00=-2.599, HTML_MESSAGE=0.001, IP_NOT_FRIENDLY=0.334]
Received: from mail.ietf.org ([64.170.98.30]) by localhost (ietfa.amsl.com [127.0.0.1]) (amavisd-new, port 10024) with ESMTP id sweb1KHxfdwZ for <oauth@ietfa.amsl.com>; Mon,  4 Feb 2013 10:55:56 -0800 (PST)
Received: from oproxy9.bluehost.com (oproxy9.bluehost.com [69.89.24.6]) by ietfa.amsl.com (Postfix) with SMTP id 8D99221F8783 for <oauth@ietf.org>; Mon,  4 Feb 2013 10:55:51 -0800 (PST)
Received: (qmail 30804 invoked by uid 0); 4 Feb 2013 18:55:29 -0000
Received: from unknown (HELO host125.hostmonster.com) (74.220.207.125) by oproxy9.bluehost.com with SMTP; 4 Feb 2013 18:55:29 -0000
DKIM-Signature: v=1; a=rsa-sha256; q=dns/txt; c=relaxed/relaxed; d=reminetworks.com; s=default;  h=Content-Type:MIME-Version:Message-ID:Date:Subject:In-Reply-To:References:Cc:To:From; bh=Xk+Rfvp0/TlTV3/eHzHLx20/OfV4o/azZRlUfWOPz8c=;  b=lVBqqqOT156Os2U7kgU1WXhrYG48jTdJ3b2ZhSOVZrl8PVGQMqTaEI1HM4WEu7hf4tei9TPVI66h1dwDxV9NQRN7+SFx+Ex0vBBhwVeEztsliUiHaBKtpn8hyT4hFGCk;
Received: from [68.4.207.246] (port=2827 helo=HPPavilionElite) by host125.hostmonster.com with esmtpa (Exim 4.80) (envelope-from <donald.coffin@reminetworks.com>) id 1U2RCT-0007c0-3F; Mon, 04 Feb 2013 11:55:29 -0700
From: "Donald F Coffin" <donald.coffin@reminetworks.com>
To: "'Richer, Justin P.'" <jricher@mitre.org>, "'Todd W Lainhart'" <lainhart@us.ibm.com>
References: <OF3031393A.750F4AB2-ON85257B03.007AD84B-85257B03.007B56E7@us.ibm.com>	<MLQM-20130130173104302-123870@mlite.mitre.org>	<51099FBA.1060608@mitre.org>	<OF0C4DFB94.D230FCE2-ON85257B08.0052DA9C-85257B08.00530629@us.ibm.com> <B33BFB58CCC8BE4998958016839DE27E06885FEC@IMCMBX01.MITRE.ORG>
In-Reply-To: <B33BFB58CCC8BE4998958016839DE27E06885FEC@IMCMBX01.MITRE.ORG>
Date: Mon, 4 Feb 2013 10:54:57 -0800
Message-ID: <00e101ce0309$21303700$6390a500$@reminetworks.com>
MIME-Version: 1.0
Content-Type: multipart/alternative; boundary="----=_NextPart_000_00E2_01CE02C6.130FB620"
X-Mailer: Microsoft Outlook 14.0
Thread-Index: AQHayEWWF0dQwkH9jF/aixGg/SYQlwGIUUn7AY7uQ+oB5ewA+wEpjK7xmB8nlqA=
Content-Language: en-us
X-Identified-User: {1395:host125.hostmonster.com:reminetw:reminetworks.com} {sentby:smtp auth 68.4.207.246 authed with donald.coffin@reminetworks.com}
Cc: John Adkins <jva2@pge.com>, Marty Burns <marty@hypertek.us>, Scott Crowder <scott.crowder@qadoenergy.com>, Dave Robin <drobin@automatedlogic.com>, John Teeter <john.teeter@peoplepowerco.com>, pmadsen@pingidentity.com, Edward Denson <ewd7@pge.com>, Uday Verma <uday.verma@ilinknet.com>, Ray Perlner <ray.perlner@nist.gov>, Anne Hendry <ahendry2@gmail.com>, Lynne Rodoni <mrodoni@semprautilities.com>, 'IETF oauth WG' <oauth@ietf.org>
Subject: Re: [OAUTH-WG] draft-richer-oauth-introspection-01 scope syntax
X-BeenThere: oauth@ietf.org
X-Mailman-Version: 2.1.12
Precedence: list
List-Id: OAUTH WG <oauth.ietf.org>
List-Unsubscribe: <https://www.ietf.org/mailman/options/oauth>, <mailto:oauth-request@ietf.org?subject=unsubscribe>
List-Archive: <http://www.ietf.org/mail-archive/web/oauth>
List-Post: <mailto:oauth@ietf.org>
List-Help: <mailto:oauth-request@ietf.org?subject=help>
List-Subscribe: <https://www.ietf.org/mailman/listinfo/oauth>, <mailto:oauth-request@ietf.org?subject=subscribe>
X-List-Received-Date: Mon, 04 Feb 2013 18:55:59 -0000

This is a multipart message in MIME format.

------=_NextPart_000_00E2_01CE02C6.130FB620
Content-Type: text/plain;
	charset="us-ascii"
Content-Transfer-Encoding: 7bit

Justin,

 

I am involved with the OpenESPI and OpenADE Task Force within the Smart Grid
Interoperability Panel (SGIP) which was established to engage stakeholders
from the Smart Grid Community in a participatory public process to identify
applicable standards, gaps in currently available standards, and priorities
for new standardization activities for the evolving Smart Grid. The SGIP
supports the National Institute of Standards and Technology (NIST) in
fulfilling its responsibilities under the 2007 Energy Independence and
Security Act.  My particular function is to chair the OpenESPI OAuth
sub-committee which is chartered with the integration of the OAuth 2.0
Protocol and the ESPI Standard.

 

Since OAuth 2.0 (RFC6749) has already established "scope" is a
space-separated string, it will be very confusing to implementers to no
define "scope" as a JSON array.  While a JSON array may be what the current
space-separated string is converted into when the application is written
using Java or one of its variants, there are other programming languages
that implementers may select to use.  Having to deal with two methods of
handling a "scope" response will require additional logic and merely
complicate the coding task.

 

Additional OAuth 2.0 specifications should not redefine data elements that
are already defined by RFC6749. Implementers should be able to rely on data
element definitions within RFC6749 being persistent throughout the OAuth
protocol framework.  If the OAuth introspective WG feels "scope" should be a
JSON array, then the WG should define a new data element rather than
changing the definition of an existing data element already defined by
RFC6749.

 

Best regards,

Don

Donald F. Coffin

Founder/CTO

 

REMI Networks

22751 El Prado Suite 6216

Rancho Santa Margarita, CA  92688-3836

 

Phone:      (949) 636-8571

Email:        <mailto:donald.coffin@reminetworks.com>
donald.coffin@reminetworks.com

 

From: Richer, Justin P. [mailto:jricher@mitre.org] 
Sent: Monday, February 04, 2013 8:24 AM
To: Todd W Lainhart
Cc: IETF oauth WG
Subject: Re: [OAUTH-WG] draft-richer-oauth-introspection-01 scope syntax

 

I got the same reading of the list as you, and I could go either way. I
believe we absolutely must pick one or the other though. 

 

If anyone has thoughts on the matter one way or the other, please speak up.
The options are:

 

1) scopes are returned as a JSON array (current introspection text)

2) scopes are returned as a space-separated string (rfc6749 format for the
"scope" parameter)

 

 

 -- Justin

 

 

On Feb 4, 2013, at 10:06 AM, Todd W Lainhart <lainhart@us.ibm.com>

 wrote:





Has there been any thinking or movement as to whether the scopes syntax
stands as is, or aligns with 6749?  Of the folks who chose to respond, it
seemed like the position was split.

	






From:        Justin Richer <jricher@mitre.org> 
To:        Todd W Lainhart/Lexington/IBM@IBMUS, 
Cc:        IETF oauth WG <oauth@ietf.org> 
Date:        01/30/2013 05:34 PM 
Subject:        Re: [OAUTH-WG] draft-richer-oauth-introspection-01 scope
syntax 

  _____  




I should add that this is also a bit of an artifact of our implementation.
Internally, we parse and store scopes as collections of discrete strings and
process them that way. So serialization of that value naturally fell to a
JSON list.

-- Justin

On 01/30/2013 05:29 PM, Justin Richer wrote: 
It's not meant to follow the same syntax. Instead, it's making use of the
JSON object structure to avoid additional parsing of the values on the
client side.

We could fairly easily define it as the same space-delimited string if
enough people want to keep the scope format consistent.

-- Justin

On 01/30/2013 05:27 PM, Todd W Lainhart wrote: 
That the scope syntax in draft-richer-oauth-introspection-01 is different
than RFC 6749 Section 3.3, as in: 


  "scope": ["read", "write", "dolphin"], 

vs. 

 scope = scope-token *( SP scope-token )
    scope-token = 1*( %x21 / %x23-5B / %x5D-7E ) 

Should introspection-01 follow the 6749 syntax for scopes?

	





_______________________________________________
OAuth mailing list
 <mailto:OAuth@ietf.org> OAuth@ietf.org
 <https://www.ietf.org/mailman/listinfo/oauth>
https://www.ietf.org/mailman/listinfo/oauth




_______________________________________________
OAuth mailing list
 <mailto:OAuth@ietf.org> OAuth@ietf.org
 <https://www.ietf.org/mailman/listinfo/oauth>
https://www.ietf.org/mailman/listinfo/oauth



 


------=_NextPart_000_00E2_01CE02C6.130FB620
Content-Type: text/html;
	charset="us-ascii"
Content-Transfer-Encoding: quoted-printable

<html xmlns:v=3D"urn:schemas-microsoft-com:vml" =
xmlns:o=3D"urn:schemas-microsoft-com:office:office" =
xmlns:w=3D"urn:schemas-microsoft-com:office:word" =
xmlns:m=3D"http://schemas.microsoft.com/office/2004/12/omml" =
xmlns=3D"http://www.w3.org/TR/REC-html40"><head><meta =
http-equiv=3DContent-Type content=3D"text/html; =
charset=3Dus-ascii"><meta name=3DGenerator content=3D"Microsoft Word 14 =
(filtered medium)"><!--[if !mso]><style>v\:* =
{behavior:url(#default#VML);}
o\:* {behavior:url(#default#VML);}
w\:* {behavior:url(#default#VML);}
.shape {behavior:url(#default#VML);}
</style><![endif]--><style><!--
/* Font Definitions */
@font-face
	{font-family:"Cambria Math";
	panose-1:2 4 5 3 5 4 6 3 2 4;}
@font-face
	{font-family:Cambria;
	panose-1:2 4 5 3 5 4 6 3 2 4;}
@font-face
	{font-family:Calibri;
	panose-1:2 15 5 2 2 2 4 3 2 4;}
@font-face
	{font-family:Tahoma;
	panose-1:2 11 6 4 3 5 4 4 2 4;}
@font-face
	{font-family:Verdana;
	panose-1:2 11 6 4 3 5 4 4 2 4;}
@font-face
	{font-family:"Brush Script MT";
	panose-1:3 6 8 2 4 4 6 7 3 4;}
/* Style Definitions */
p.MsoNormal, li.MsoNormal, div.MsoNormal
	{margin:0in;
	margin-bottom:.0001pt;
	font-size:12.0pt;
	font-family:"Times New Roman","serif";}
a:link, span.MsoHyperlink
	{mso-style-priority:99;
	color:blue;
	text-decoration:underline;}
a:visited, span.MsoHyperlinkFollowed
	{mso-style-priority:99;
	color:purple;
	text-decoration:underline;}
tt
	{mso-style-priority:99;
	font-family:"Courier New";}
span.EmailStyle18
	{mso-style-type:personal-reply;
	font-family:"Cambria","serif";
	color:windowtext;
	font-weight:normal;
	font-style:normal;}
.MsoChpDefault
	{mso-style-type:export-only;
	font-size:10.0pt;}
@page WordSection1
	{size:8.5in 11.0in;
	margin:1.0in 1.0in 1.0in 1.0in;}
div.WordSection1
	{page:WordSection1;}
--></style><!--[if gte mso 9]><xml>
<o:shapedefaults v:ext=3D"edit" spidmax=3D"1026" />
</xml><![endif]--><!--[if gte mso 9]><xml>
<o:shapelayout v:ext=3D"edit">
<o:idmap v:ext=3D"edit" data=3D"1" />
</o:shapelayout></xml><![endif]--></head><body lang=3DEN-US link=3Dblue =
vlink=3Dpurple><div class=3DWordSection1><p class=3DMsoNormal><span =
style=3D'font-family:"Cambria","serif"'>Justin,<o:p></o:p></span></p><p =
class=3DMsoNormal><span =
style=3D'font-family:"Cambria","serif"'><o:p>&nbsp;</o:p></span></p><p =
class=3DMsoNormal><span style=3D'font-family:"Cambria","serif"'>I am =
involved with the OpenESPI and OpenADE Task Force within the Smart Grid =
Interoperability Panel (SGIP) which was established </span><span =
style=3D'font-family:"Cambria","serif"'>to engage </span><span =
style=3D'font-family:"Cambria","serif";color:black;background:white'>stak=
eholders from the Smart Grid Community in a participatory public process =
to identify applicable standards, gaps in currently available standards, =
and priorities for new standardization activities for the evolving Smart =
Grid</span><span =
style=3D'font-size:9.0pt;font-family:"Verdana","sans-serif";color:black;b=
ackground:white'>. </span><span =
style=3D'font-family:"Cambria","serif";color:black;background:white'>The =
SGIP supports the National Institute of Standards and Technology (NIST) =
in fulfilling its responsibilities under the 2007 Energy Independence =
and Security Act.&nbsp; My particular function is to chair the OpenESPI =
OAuth sub-committee which is chartered with the integration of the OAuth =
2.0 Protocol and the ESPI Standard.<o:p></o:p></span></p><p =
class=3DMsoNormal><span =
style=3D'font-family:"Cambria","serif";color:black;background:white'><o:p=
>&nbsp;</o:p></span></p><p class=3DMsoNormal><span =
style=3D'font-family:"Cambria","serif";color:black;background:white'>Sinc=
e OAuth 2.0 (RFC6749) has already established &#8220;scope&#8221; is a =
space-separated string, it will be very confusing to implementers to no =
define &#8220;scope&#8221; as a JSON array.&nbsp; While a JSON array may =
be what the current space-separated string is converted into when the =
application is written using Java or one of its variants, there are =
other programming languages that implementers may select to use.&nbsp; =
Having to deal with two methods of handling a &#8220;scope&#8221; =
response will require additional logic and merely complicate the coding =
task.<o:p></o:p></span></p><p class=3DMsoNormal><span =
style=3D'font-family:"Cambria","serif";color:black;background:white'><o:p=
>&nbsp;</o:p></span></p><p class=3DMsoNormal><span =
style=3D'font-family:"Cambria","serif";color:black;background:white'>Addi=
tional OAuth 2.0 specifications should not redefine data elements that =
are already defined by RFC6749. Implementers should be able to rely on =
data element definitions within RFC6749 being persistent throughout the =
OAuth protocol framework.&nbsp; If the OAuth introspective WG feels =
&#8220;scope&#8221; should be a JSON array, then the WG should define a =
new data element rather than changing the definition of an existing data =
element already defined by RFC6749.</span><span =
style=3D'font-family:"Cambria","serif"'><o:p></o:p></span></p><p =
class=3DMsoNormal><span =
style=3D'font-family:"Cambria","serif"'><o:p>&nbsp;</o:p></span></p><div>=
<p class=3DMsoNormal><span =
style=3D'font-family:"Calibri","sans-serif"'>Best =
regards,<o:p></o:p></span></p><p class=3DMsoNormal><span =
style=3D'font-size:24.0pt;font-family:"Brush Script =
MT"'>Don<o:p></o:p></span></p><p class=3DMsoNormal><span =
style=3D'font-family:"Calibri","sans-serif"'>Donald F. =
Coffin<o:p></o:p></span></p><p class=3DMsoNormal><span =
style=3D'font-family:"Calibri","sans-serif"'>Founder/CTO<o:p></o:p></span=
></p><p class=3DMsoNormal><span =
style=3D'font-family:"Calibri","sans-serif"'><o:p>&nbsp;</o:p></span></p>=
<p class=3DMsoNormal><span =
style=3D'font-family:"Calibri","sans-serif"'>REMI =
Networks<o:p></o:p></span></p><p class=3DMsoNormal><span =
style=3D'font-family:"Calibri","sans-serif"'>22751 El Prado Suite =
6216<o:p></o:p></span></p><p class=3DMsoNormal><span =
style=3D'font-family:"Calibri","sans-serif"'>Rancho Santa Margarita, =
CA&nbsp; 92688-3836<o:p></o:p></span></p><p class=3DMsoNormal><span =
style=3D'font-family:"Calibri","sans-serif"'><o:p>&nbsp;</o:p></span></p>=
<p class=3DMsoNormal><span =
style=3D'font-family:"Calibri","sans-serif"'>Phone:&nbsp;&nbsp;&nbsp;&nbs=
p;&nbsp; (949) 636-8571<o:p></o:p></span></p><p class=3DMsoNormal><span =
style=3D'font-family:"Calibri","sans-serif"'>Email:&nbsp;&nbsp;&nbsp;&nbs=
p;&nbsp;&nbsp; <a href=3D"mailto:donald.coffin@reminetworks.com"><span =
style=3D'color:blue'>donald.coffin@reminetworks.com</span></a><o:p></o:p>=
</span></p></div><p class=3DMsoNormal><span =
style=3D'font-family:"Cambria","serif"'><o:p>&nbsp;</o:p></span></p><div>=
<div style=3D'border:none;border-top:solid #B5C4DF 1.0pt;padding:3.0pt =
0in 0in 0in'><p class=3DMsoNormal><b><span =
style=3D'font-size:10.0pt;font-family:"Tahoma","sans-serif"'>From:</span>=
</b><span style=3D'font-size:10.0pt;font-family:"Tahoma","sans-serif"'> =
Richer, Justin P. [mailto:jricher@mitre.org] <br><b>Sent:</b> Monday, =
February 04, 2013 8:24 AM<br><b>To:</b> Todd W Lainhart<br><b>Cc:</b> =
IETF oauth WG<br><b>Subject:</b> Re: [OAUTH-WG] =
draft-richer-oauth-introspection-01 scope =
syntax<o:p></o:p></span></p></div></div><p =
class=3DMsoNormal><o:p>&nbsp;</o:p></p><p class=3DMsoNormal>I got the =
same reading of the list as you, and I could go either way. I believe we =
absolutely must pick one or the other though. <o:p></o:p></p><div><p =
class=3DMsoNormal><o:p>&nbsp;</o:p></p></div><div><p =
class=3DMsoNormal>If anyone has thoughts on the matter one way or the =
other, please speak up. The options are:<o:p></o:p></p></div><div><p =
class=3DMsoNormal><o:p>&nbsp;</o:p></p></div><div><p =
class=3DMsoNormal>1) scopes are returned as a JSON array (current =
introspection text)<o:p></o:p></p></div><div><p class=3DMsoNormal>2) =
scopes are returned as a space-separated string (rfc6749 format for the =
&quot;scope&quot; parameter)<o:p></o:p></p></div><div><p =
class=3DMsoNormal><o:p>&nbsp;</o:p></p></div><div><p =
class=3DMsoNormal><o:p>&nbsp;</o:p></p></div><div><p =
class=3DMsoNormal>&nbsp;-- Justin<o:p></o:p></p></div><div><p =
class=3DMsoNormal><o:p>&nbsp;</o:p></p></div><div><p =
class=3DMsoNormal><o:p>&nbsp;</o:p></p><div><div><div><p =
class=3DMsoNormal>On Feb 4, 2013, at 10:06 AM, Todd W Lainhart &lt;<a =
href=3D"mailto:lainhart@us.ibm.com">lainhart@us.ibm.com</a>&gt;<o:p></o:p=
></p></div><div><p class=3DMsoNormal>&nbsp;wrote:<o:p></o:p></p></div><p =
class=3DMsoNormal><br><br><o:p></o:p></p><p class=3DMsoNormal =
style=3D'margin-bottom:12.0pt'><span =
style=3D'font-size:10.0pt;font-family:"Arial","sans-serif"'>Has there =
been any thinking or movement as to whether the scopes syntax stands as =
is, or aligns with 6749? &nbsp;Of the folks who chose to respond, it =
seemed like the position was split.</span><o:p></o:p></p><table =
class=3DMsoNormalTable border=3D0 cellspacing=3D0 cellpadding=3D0 =
width=3D223 style=3D'width:167.25pt;border-collapse:collapse'><tr =
style=3D'height:6.0pt'><td width=3D223 =
style=3D'width:167.25pt;border:solid black =
1.0pt;background:white;padding:0in 0in 0in =
0in;height:6.0pt'></td></tr></table><p =
class=3DMsoNormal><br><br><br><br><br><span =
style=3D'font-size:7.5pt;font-family:"Arial","sans-serif";color:#5F5F5F'>=
From: &nbsp; &nbsp; &nbsp; &nbsp;</span><span =
style=3D'font-size:7.5pt;font-family:"Arial","sans-serif"'>Justin Richer =
&lt;<a =
href=3D"mailto:jricher@mitre.org">jricher@mitre.org</a>&gt;</span> =
<br><span =
style=3D'font-size:7.5pt;font-family:"Arial","sans-serif";color:#5F5F5F'>=
To: &nbsp; &nbsp; &nbsp; &nbsp;</span><span =
style=3D'font-size:7.5pt;font-family:"Arial","sans-serif"'>Todd W =
Lainhart/Lexington/IBM@IBMUS, </span><br><span =
style=3D'font-size:7.5pt;font-family:"Arial","sans-serif";color:#5F5F5F'>=
Cc: &nbsp; &nbsp; &nbsp; &nbsp;</span><span =
style=3D'font-size:7.5pt;font-family:"Arial","sans-serif"'>IETF oauth WG =
&lt;<a href=3D"mailto:oauth@ietf.org">oauth@ietf.org</a>&gt;</span> =
<br><span =
style=3D'font-size:7.5pt;font-family:"Arial","sans-serif";color:#5F5F5F'>=
Date: &nbsp; &nbsp; &nbsp; &nbsp;</span><span =
style=3D'font-size:7.5pt;font-family:"Arial","sans-serif"'>01/30/2013 =
05:34 PM</span> <br><span =
style=3D'font-size:7.5pt;font-family:"Arial","sans-serif";color:#5F5F5F'>=
Subject: &nbsp; &nbsp; &nbsp; &nbsp;</span><span =
style=3D'font-size:7.5pt;font-family:"Arial","sans-serif"'>Re: =
[OAUTH-WG] draft-richer-oauth-introspection-01 scope syntax</span> =
<o:p></o:p></p><div class=3DMsoNormal align=3Dcenter =
style=3D'text-align:center'><hr size=3D2 width=3D"100%" noshade =
style=3D'color:#A0A0A0' align=3Dcenter></div><p =
class=3DMsoNormal><br><br><br>I should add that this is also a bit of an =
artifact of our implementation. Internally, we parse and store scopes as =
collections of discrete strings and process them that way. So =
serialization of that value naturally fell to a JSON list.<br><br>-- =
Justin<br><br>On 01/30/2013 05:29 PM, Justin Richer wrote: <br>It's not =
meant to follow the same syntax. Instead, it's making use of the JSON =
object structure to avoid additional parsing of the values on the client =
side.<br><br>We could fairly easily define it as the same =
space-delimited string if enough people want to keep the scope format =
consistent.<br><br>-- Justin<br><br>On 01/30/2013 05:27 PM, Todd W =
Lainhart wrote: <br><span =
style=3D'font-size:10.0pt;font-family:"Arial","sans-serif"'>That the =
scope syntax in draft-richer-oauth-introspection-01 is different than =
RFC 6749 Section 3.3, as in:</span> <br><br><span =
style=3D'font-size:10.0pt;font-family:"Arial","sans-serif"'><br>&nbsp; =
</span><tt><span style=3D'font-size:10.0pt'>&quot;scope&quot;: =
[&quot;read&quot;, &quot;write&quot;, &quot;dolphin&quot;],</span></tt> =
<br><span =
style=3D'font-size:10.0pt;font-family:"Arial","sans-serif"'><br>vs.</span=
> <br><span style=3D'font-size:10.0pt;font-family:"Courier =
New"'><br><tt>&nbsp;scope =3D scope-token *( SP scope-token =
)</tt><br><tt>&nbsp; &nbsp; scope-token =3D 1*( %x21 / %x23-5B / %x5D-7E =
)</tt></span> <br><span =
style=3D'font-size:10.0pt;font-family:"Arial","sans-serif"'><br>Should =
introspection-01 follow the 6749 syntax for =
scopes?</span><o:p></o:p></p><table class=3DMsoNormalTable border=3D0 =
cellspacing=3D0 cellpadding=3D0 width=3D223 =
style=3D'width:167.25pt;border-collapse:collapse'><tr =
style=3D'height:6.0pt'><td width=3D221 =
style=3D'width:165.75pt;border:solid black =
1.0pt;background:white;padding:.75pt .75pt .75pt =
.75pt;height:6.0pt'></td></tr></table><p class=3DMsoNormal =
style=3D'margin-bottom:12.0pt'><br><br><br><br><tt><span =
style=3D'font-size:10.0pt'>______________________________________________=
_</span></tt><span style=3D'font-size:10.0pt;font-family:"Courier =
New"'><br><tt>OAuth mailing list</tt><br></span><a =
href=3D"mailto:OAuth@ietf.org"><tt>OAuth@ietf.org</tt></a><span =
style=3D'font-size:10.0pt;font-family:"Courier New"'><br></span><a =
href=3D"https://www.ietf.org/mailman/listinfo/oauth"><tt>https://www.ietf=
.org/mailman/listinfo/oauth</tt></a><span =
style=3D'font-size:10.0pt;font-family:"Courier =
New"'><br></span><br><br><br><br><tt><span =
style=3D'font-size:10.0pt'>______________________________________________=
_</span></tt><span style=3D'font-size:10.0pt;font-family:"Courier =
New"'><br><tt>OAuth mailing list</tt><br></span><a =
href=3D"mailto:OAuth@ietf.org"><tt>OAuth@ietf.org</tt></a><span =
style=3D'font-size:10.0pt;font-family:"Courier New"'><br></span><a =
href=3D"https://www.ietf.org/mailman/listinfo/oauth"><tt>https://www.ietf=
.org/mailman/listinfo/oauth</tt></a><span =
style=3D'font-size:10.0pt;font-family:"Courier =
New"'><br><br></span><o:p></o:p></p></div><p =
class=3DMsoNormal><o:p>&nbsp;</o:p></p></div></div></div></body></html>
------=_NextPart_000_00E2_01CE02C6.130FB620--


From lainhart@us.ibm.com  Mon Feb  4 11:03:52 2013
Return-Path: <lainhart@us.ibm.com>
X-Original-To: oauth@ietfa.amsl.com
Delivered-To: oauth@ietfa.amsl.com
Received: from localhost (localhost [127.0.0.1]) by ietfa.amsl.com (Postfix) with ESMTP id 94BFB21F89A4 for <oauth@ietfa.amsl.com>; Mon,  4 Feb 2013 11:03:52 -0800 (PST)
X-Virus-Scanned: amavisd-new at amsl.com
X-Spam-Flag: NO
X-Spam-Score: -10.48
X-Spam-Level: 
X-Spam-Status: No, score=-10.48 tagged_above=-999 required=5 tests=[AWL=0.117,  BAYES_00=-2.599, HTML_FONT_SIZE_LARGE=0.001, HTML_MESSAGE=0.001, RCVD_IN_DNSWL_HI=-8]
Received: from mail.ietf.org ([64.170.98.30]) by localhost (ietfa.amsl.com [127.0.0.1]) (amavisd-new, port 10024) with ESMTP id UJQz2bRBfM25 for <oauth@ietfa.amsl.com>; Mon,  4 Feb 2013 11:03:50 -0800 (PST)
Received: from e9.ny.us.ibm.com (e9.ny.us.ibm.com [32.97.182.139]) by ietfa.amsl.com (Postfix) with ESMTP id 1A79B21F899E for <oauth@ietf.org>; Mon,  4 Feb 2013 11:03:50 -0800 (PST)
Received: from /spool/local by e9.ny.us.ibm.com with IBM ESMTP SMTP Gateway: Authorized Use Only! Violators will be prosecuted for <oauth@ietf.org> from <lainhart@us.ibm.com>; Mon, 4 Feb 2013 14:03:49 -0500
Received: from d01dlp01.pok.ibm.com (9.56.250.166) by e9.ny.us.ibm.com (192.168.1.109) with IBM ESMTP SMTP Gateway: Authorized Use Only! Violators will be prosecuted;  Mon, 4 Feb 2013 14:03:46 -0500
Received: from d01relay01.pok.ibm.com (d01relay01.pok.ibm.com [9.56.227.233]) by d01dlp01.pok.ibm.com (Postfix) with ESMTP id CC02338C805C for <oauth@ietf.org>; Mon,  4 Feb 2013 14:03:44 -0500 (EST)
Received: from d01av05.pok.ibm.com (d01av05.pok.ibm.com [9.56.224.195]) by d01relay01.pok.ibm.com (8.13.8/8.13.8/NCO v10.0) with ESMTP id r14J3idL286788 for <oauth@ietf.org>; Mon, 4 Feb 2013 14:03:44 -0500
Received: from d01av05.pok.ibm.com (loopback [127.0.0.1]) by d01av05.pok.ibm.com (8.14.4/8.13.1/NCO v10.0 AVout) with ESMTP id r14J3hjH028340 for <oauth@ietf.org>; Mon, 4 Feb 2013 14:03:44 -0500
Received: from d01ml255.pok.ibm.com (d01ml255.pok.ibm.com [9.63.10.54]) by d01av05.pok.ibm.com (8.14.4/8.13.1/NCO v10.0 AVin) with ESMTP id r14J3hDP028337; Mon, 4 Feb 2013 14:03:43 -0500
In-Reply-To: <00e101ce0309$21303700$6390a500$@reminetworks.com>
References: <OF3031393A.750F4AB2-ON85257B03.007AD84B-85257B03.007B56E7@us.ibm.com>	<MLQM-20130130173104302-123870@mlite.mitre.org> <51099FBA.1060608@mitre.org>	<OF0C4DFB94.D230FCE2-ON85257B08.0052DA9C-85257B08.00530629@us.ibm.com> <B33BFB58CCC8BE4998958016839DE27E06885FEC@IMCMBX01.MITRE.ORG> <00e101ce0309$21303700$6390a500$@reminetworks.com>
To: "Donald F Coffin" <donald.coffin@reminetworks.com>
MIME-Version: 1.0
X-KeepSent: 08220115:29CA2A02-85257B08:00682B7C; type=4; name=$KeepSent
X-Mailer: Lotus Notes Release 8.5.3FP2 SHF22 July 19, 2012
Message-ID: <OF08220115.29CA2A02-ON85257B08.00682B7C-85257B08.0068B32B@us.ibm.com>
From: Todd W Lainhart <lainhart@us.ibm.com>
Date: Mon, 4 Feb 2013 14:03:36 -0500
X-MIMETrack: Serialize by Router on D01ML255/01/M/IBM(Release 8.5.3FP2 ZX853FP2HF4|December 14, 2012) at 02/04/2013 14:03:42, Serialize complete at 02/04/2013 14:03:42
Content-Type: multipart/alternative; boundary="=_alternative 0068B32985257B08_="
X-Content-Scanned: Fidelis XPS MAILER
x-cbid: 13020419-7182-0000-0000-000004ED57B2
Cc: John Adkins <jva2@pge.com>, Marty Burns <marty@hypertek.us>, Scott Crowder <scott.crowder@qadoenergy.com>, Dave Robin <drobin@automatedlogic.com>, John Teeter <john.teeter@peoplepowerco.com>, pmadsen@pingidentity.com, Edward Denson <ewd7@pge.com>, 'IETF oauth WG' <oauth@ietf.org>, Uday Verma <uday.verma@ilinknet.com>, Ray Perlner <ray.perlner@nist.gov>, Anne Hendry <ahendry2@gmail.com>, Lynne Rodoni <mrodoni@semprautilities.com>
Subject: Re: [OAUTH-WG] draft-richer-oauth-introspection-01 scope syntax
X-BeenThere: oauth@ietf.org
X-Mailman-Version: 2.1.12
Precedence: list
List-Id: OAUTH WG <oauth.ietf.org>
List-Unsubscribe: <https://www.ietf.org/mailman/options/oauth>, <mailto:oauth-request@ietf.org?subject=unsubscribe>
List-Archive: <http://www.ietf.org/mail-archive/web/oauth>
List-Post: <mailto:oauth@ietf.org>
List-Help: <mailto:oauth-request@ietf.org?subject=help>
List-Subscribe: <https://www.ietf.org/mailman/listinfo/oauth>, <mailto:oauth-request@ietf.org?subject=subscribe>
X-List-Received-Date: Mon, 04 Feb 2013 19:03:52 -0000

This is a multipart message in MIME format.
--=_alternative 0068B32985257B08_=
Content-Type: text/plain; charset="UTF-8"
Content-Transfer-Encoding: base64

SWYgd2UncmUgdGFsbHlpbmcgdm90ZXMsIEknbGwgcmUtc3RhdGUgbXkgcG9zaXRpb24gdGhhdCBJ
J20gYWxzbyBpbiBmYXZvciANCm9mIHVzaW5nIHRoZSBzY29wZSBzeW50YXggZGVmaW5pdGlvbiBw
ZXIgNjc0OSAtIG90aGVyd2lzZSBpdCBpcyBjb25mdXNpbmcgDQp3aGVuIHdyaXRpbmcgZ3VpZGFu
Y2UgZG9jdW1lbnRhdGlvbi4gDQoNCklmIHN1cHBvcnRpbmcgSlNPTiBhcnJheSBzeW50YXggaXMg
aW1wb3J0YW50IGZvciB0aGlzIHJlc3BvbnNlIHZhbHVlLCANCkRvbidzIHN1Z2dlc3Rpb24gb2Yg
aW50cm9kdWNpbmcgYSBuZXcgcmVzcG9uc2UgcGFyYW1ldGVyIHNlZW1zIGEgZ29vZCANCmNvbXBy
b21pc2UuDQoNCg0KDQoNCg0KDQoNCkZyb206ICAgIkRvbmFsZCBGIENvZmZpbiIgPGRvbmFsZC5j
b2ZmaW5AcmVtaW5ldHdvcmtzLmNvbT4NClRvOiAgICAgIidSaWNoZXIsIEp1c3RpbiBQLiciIDxq
cmljaGVyQG1pdHJlLm9yZz4sIFRvZGQgVyANCkxhaW5oYXJ0L0xleGluZ3Rvbi9JQk1ASUJNVVMs
IA0KQ2M6ICAgICAiJ0lFVEYgb2F1dGggV0cnIiA8b2F1dGhAaWV0Zi5vcmc+LCAiQW5uZSBIZW5k
cnkiIA0KPGFoZW5kcnkyQGdtYWlsLmNvbT4sICJEYXZlIFJvYmluIiA8ZHJvYmluQGF1dG9tYXRl
ZGxvZ2ljLmNvbT4sICJFZHdhcmQgDQpEZW5zb24iIDxld2Q3QHBnZS5jb20+LCAiSm9obiBBZGtp
bnMiIDxqdmEyQHBnZS5jb20+LCAiSm9obiBUZWV0ZXIiIA0KPGpvaG4udGVldGVyQHBlb3BsZXBv
d2VyY28uY29tPiwgIkx5bm5lIFJvZG9uaSIgDQo8bXJvZG9uaUBzZW1wcmF1dGlsaXRpZXMuY29t
PiwgIk1hcnR5IEJ1cm5zIiA8bWFydHlAaHlwZXJ0ZWsudXM+LCANCjxwbWFkc2VuQHBpbmdpZGVu
dGl0eS5jb20+LCAiUmF5IFBlcmxuZXIiIDxyYXkucGVybG5lckBuaXN0Lmdvdj4sICJTY290dCAN
CkNyb3dkZXIiIDxzY290dC5jcm93ZGVyQHFhZG9lbmVyZ3kuY29tPiwgIlVkYXkgVmVybWEiIA0K
PHVkYXkudmVybWFAaWxpbmtuZXQuY29tPg0KRGF0ZTogICAwMi8wNC8yMDEzIDAxOjU2IFBNDQpT
dWJqZWN0OiAgICAgICAgUkU6IFtPQVVUSC1XR10gZHJhZnQtcmljaGVyLW9hdXRoLWludHJvc3Bl
Y3Rpb24tMDEgc2NvcGUgDQpzeW50YXgNCg0KDQoNCkp1c3RpbiwNCiANCkkgYW0gaW52b2x2ZWQg
d2l0aCB0aGUgT3BlbkVTUEkgYW5kIE9wZW5BREUgVGFzayBGb3JjZSB3aXRoaW4gdGhlIFNtYXJ0
IA0KR3JpZCBJbnRlcm9wZXJhYmlsaXR5IFBhbmVsIChTR0lQKSB3aGljaCB3YXMgZXN0YWJsaXNo
ZWQgdG8gZW5nYWdlIA0Kc3Rha2Vob2xkZXJzIGZyb20gdGhlIFNtYXJ0IEdyaWQgQ29tbXVuaXR5
IGluIGEgcGFydGljaXBhdG9yeSBwdWJsaWMgDQpwcm9jZXNzIHRvIGlkZW50aWZ5IGFwcGxpY2Fi
bGUgc3RhbmRhcmRzLCBnYXBzIGluIGN1cnJlbnRseSBhdmFpbGFibGUgDQpzdGFuZGFyZHMsIGFu
ZCBwcmlvcml0aWVzIGZvciBuZXcgc3RhbmRhcmRpemF0aW9uIGFjdGl2aXRpZXMgZm9yIHRoZSAN
CmV2b2x2aW5nIFNtYXJ0IEdyaWQuIFRoZSBTR0lQIHN1cHBvcnRzIHRoZSBOYXRpb25hbCBJbnN0
aXR1dGUgb2YgU3RhbmRhcmRzIA0KYW5kIFRlY2hub2xvZ3kgKE5JU1QpIGluIGZ1bGZpbGxpbmcg
aXRzIHJlc3BvbnNpYmlsaXRpZXMgdW5kZXIgdGhlIDIwMDcgDQpFbmVyZ3kgSW5kZXBlbmRlbmNl
IGFuZCBTZWN1cml0eSBBY3QuICBNeSBwYXJ0aWN1bGFyIGZ1bmN0aW9uIGlzIHRvIGNoYWlyIA0K
dGhlIE9wZW5FU1BJIE9BdXRoIHN1Yi1jb21taXR0ZWUgd2hpY2ggaXMgY2hhcnRlcmVkIHdpdGgg
dGhlIGludGVncmF0aW9uIA0Kb2YgdGhlIE9BdXRoIDIuMCBQcm90b2NvbCBhbmQgdGhlIEVTUEkg
U3RhbmRhcmQuDQogDQpTaW5jZSBPQXV0aCAyLjAgKFJGQzY3NDkpIGhhcyBhbHJlYWR5IGVzdGFi
bGlzaGVkIOKAnHNjb3Bl4oCdIGlzIGEgDQpzcGFjZS1zZXBhcmF0ZWQgc3RyaW5nLCBpdCB3aWxs
IGJlIHZlcnkgY29uZnVzaW5nIHRvIGltcGxlbWVudGVycyB0byBubyANCmRlZmluZSDigJxzY29w
ZeKAnSBhcyBhIEpTT04gYXJyYXkuICBXaGlsZSBhIEpTT04gYXJyYXkgbWF5IGJlIHdoYXQgdGhl
IA0KY3VycmVudCBzcGFjZS1zZXBhcmF0ZWQgc3RyaW5nIGlzIGNvbnZlcnRlZCBpbnRvIHdoZW4g
dGhlIGFwcGxpY2F0aW9uIGlzIA0Kd3JpdHRlbiB1c2luZyBKYXZhIG9yIG9uZSBvZiBpdHMgdmFy
aWFudHMsIHRoZXJlIGFyZSBvdGhlciBwcm9ncmFtbWluZyANCmxhbmd1YWdlcyB0aGF0IGltcGxl
bWVudGVycyBtYXkgc2VsZWN0IHRvIHVzZS4gIEhhdmluZyB0byBkZWFsIHdpdGggdHdvIA0KbWV0
aG9kcyBvZiBoYW5kbGluZyBhIOKAnHNjb3Bl4oCdIHJlc3BvbnNlIHdpbGwgcmVxdWlyZSBhZGRp
dGlvbmFsIGxvZ2ljIGFuZCANCm1lcmVseSBjb21wbGljYXRlIHRoZSBjb2RpbmcgdGFzay4NCiAN
CkFkZGl0aW9uYWwgT0F1dGggMi4wIHNwZWNpZmljYXRpb25zIHNob3VsZCBub3QgcmVkZWZpbmUg
ZGF0YSBlbGVtZW50cyB0aGF0IA0KYXJlIGFscmVhZHkgZGVmaW5lZCBieSBSRkM2NzQ5LiBJbXBs
ZW1lbnRlcnMgc2hvdWxkIGJlIGFibGUgdG8gcmVseSBvbiANCmRhdGEgZWxlbWVudCBkZWZpbml0
aW9ucyB3aXRoaW4gUkZDNjc0OSBiZWluZyBwZXJzaXN0ZW50IHRocm91Z2hvdXQgdGhlIA0KT0F1
dGggcHJvdG9jb2wgZnJhbWV3b3JrLiAgSWYgdGhlIE9BdXRoIGludHJvc3BlY3RpdmUgV0cgZmVl
bHMg4oCcc2NvcGXigJ0gDQpzaG91bGQgYmUgYSBKU09OIGFycmF5LCB0aGVuIHRoZSBXRyBzaG91
bGQgZGVmaW5lIGEgbmV3IGRhdGEgZWxlbWVudCANCnJhdGhlciB0aGFuIGNoYW5naW5nIHRoZSBk
ZWZpbml0aW9uIG9mIGFuIGV4aXN0aW5nIGRhdGEgZWxlbWVudCBhbHJlYWR5IA0KZGVmaW5lZCBi
eSBSRkM2NzQ5Lg0KIA0KQmVzdCByZWdhcmRzLA0KRG9uDQpEb25hbGQgRi4gQ29mZmluDQpGb3Vu
ZGVyL0NUTw0KIA0KUkVNSSBOZXR3b3Jrcw0KMjI3NTEgRWwgUHJhZG8gU3VpdGUgNjIxNg0KUmFu
Y2hvIFNhbnRhIE1hcmdhcml0YSwgQ0EgIDkyNjg4LTM4MzYNCiANClBob25lOiAgICAgICg5NDkp
IDYzNi04NTcxDQpFbWFpbDogICAgICAgZG9uYWxkLmNvZmZpbkByZW1pbmV0d29ya3MuY29tDQog
DQpGcm9tOiBSaWNoZXIsIEp1c3RpbiBQLiBbbWFpbHRvOmpyaWNoZXJAbWl0cmUub3JnXSANClNl
bnQ6IE1vbmRheSwgRmVicnVhcnkgMDQsIDIwMTMgODoyNCBBTQ0KVG86IFRvZGQgVyBMYWluaGFy
dA0KQ2M6IElFVEYgb2F1dGggV0cNClN1YmplY3Q6IFJlOiBbT0FVVEgtV0ddIGRyYWZ0LXJpY2hl
ci1vYXV0aC1pbnRyb3NwZWN0aW9uLTAxIHNjb3BlIHN5bnRheA0KIA0KSSBnb3QgdGhlIHNhbWUg
cmVhZGluZyBvZiB0aGUgbGlzdCBhcyB5b3UsIGFuZCBJIGNvdWxkIGdvIGVpdGhlciB3YXkuIEkg
DQpiZWxpZXZlIHdlIGFic29sdXRlbHkgbXVzdCBwaWNrIG9uZSBvciB0aGUgb3RoZXIgdGhvdWdo
LiANCiANCklmIGFueW9uZSBoYXMgdGhvdWdodHMgb24gdGhlIG1hdHRlciBvbmUgd2F5IG9yIHRo
ZSBvdGhlciwgcGxlYXNlIHNwZWFrIA0KdXAuIFRoZSBvcHRpb25zIGFyZToNCiANCjEpIHNjb3Bl
cyBhcmUgcmV0dXJuZWQgYXMgYSBKU09OIGFycmF5IChjdXJyZW50IGludHJvc3BlY3Rpb24gdGV4
dCkNCjIpIHNjb3BlcyBhcmUgcmV0dXJuZWQgYXMgYSBzcGFjZS1zZXBhcmF0ZWQgc3RyaW5nIChy
ZmM2NzQ5IGZvcm1hdCBmb3IgdGhlIA0KInNjb3BlIiBwYXJhbWV0ZXIpDQogDQogDQogLS0gSnVz
dGluDQogDQogDQpPbiBGZWIgNCwgMjAxMywgYXQgMTA6MDYgQU0sIFRvZGQgVyBMYWluaGFydCA8
bGFpbmhhcnRAdXMuaWJtLmNvbT4NCiB3cm90ZToNCg0KDQpIYXMgdGhlcmUgYmVlbiBhbnkgdGhp
bmtpbmcgb3IgbW92ZW1lbnQgYXMgdG8gd2hldGhlciB0aGUgc2NvcGVzIHN5bnRheCANCnN0YW5k
cyBhcyBpcywgb3IgYWxpZ25zIHdpdGggNjc0OT8gIE9mIHRoZSBmb2xrcyB3aG8gY2hvc2UgdG8g
cmVzcG9uZCwgaXQgDQpzZWVtZWQgbGlrZSB0aGUgcG9zaXRpb24gd2FzIHNwbGl0Lg0KDQoNCg0K
DQoNCg0KDQpGcm9tOiAgICAgICAgSnVzdGluIFJpY2hlciA8anJpY2hlckBtaXRyZS5vcmc+IA0K
VG86ICAgICAgICBUb2RkIFcgTGFpbmhhcnQvTGV4aW5ndG9uL0lCTUBJQk1VUywgDQpDYzogICAg
ICAgIElFVEYgb2F1dGggV0cgPG9hdXRoQGlldGYub3JnPiANCkRhdGU6ICAgICAgICAwMS8zMC8y
MDEzIDA1OjM0IFBNIA0KU3ViamVjdDogICAgICAgIFJlOiBbT0FVVEgtV0ddIGRyYWZ0LXJpY2hl
ci1vYXV0aC1pbnRyb3NwZWN0aW9uLTAxIHNjb3BlIA0Kc3ludGF4IA0KDQoNCg0KDQpJIHNob3Vs
ZCBhZGQgdGhhdCB0aGlzIGlzIGFsc28gYSBiaXQgb2YgYW4gYXJ0aWZhY3Qgb2Ygb3VyIGltcGxl
bWVudGF0aW9uLiANCkludGVybmFsbHksIHdlIHBhcnNlIGFuZCBzdG9yZSBzY29wZXMgYXMgY29s
bGVjdGlvbnMgb2YgZGlzY3JldGUgc3RyaW5ncyANCmFuZCBwcm9jZXNzIHRoZW0gdGhhdCB3YXku
IFNvIHNlcmlhbGl6YXRpb24gb2YgdGhhdCB2YWx1ZSBuYXR1cmFsbHkgZmVsbCANCnRvIGEgSlNP
TiBsaXN0Lg0KDQotLSBKdXN0aW4NCg0KT24gMDEvMzAvMjAxMyAwNToyOSBQTSwgSnVzdGluIFJp
Y2hlciB3cm90ZTogDQpJdCdzIG5vdCBtZWFudCB0byBmb2xsb3cgdGhlIHNhbWUgc3ludGF4LiBJ
bnN0ZWFkLCBpdCdzIG1ha2luZyB1c2Ugb2YgdGhlIA0KSlNPTiBvYmplY3Qgc3RydWN0dXJlIHRv
IGF2b2lkIGFkZGl0aW9uYWwgcGFyc2luZyBvZiB0aGUgdmFsdWVzIG9uIHRoZSANCmNsaWVudCBz
aWRlLg0KDQpXZSBjb3VsZCBmYWlybHkgZWFzaWx5IGRlZmluZSBpdCBhcyB0aGUgc2FtZSBzcGFj
ZS1kZWxpbWl0ZWQgc3RyaW5nIGlmIA0KZW5vdWdoIHBlb3BsZSB3YW50IHRvIGtlZXAgdGhlIHNj
b3BlIGZvcm1hdCBjb25zaXN0ZW50Lg0KDQotLSBKdXN0aW4NCg0KT24gMDEvMzAvMjAxMyAwNToy
NyBQTSwgVG9kZCBXIExhaW5oYXJ0IHdyb3RlOiANClRoYXQgdGhlIHNjb3BlIHN5bnRheCBpbiBk
cmFmdC1yaWNoZXItb2F1dGgtaW50cm9zcGVjdGlvbi0wMSBpcyBkaWZmZXJlbnQgDQp0aGFuIFJG
QyA2NzQ5IFNlY3Rpb24gMy4zLCBhcyBpbjogDQoNCg0KICAic2NvcGUiOiBbInJlYWQiLCAid3Jp
dGUiLCAiZG9scGhpbiJdLCANCg0KdnMuIA0KDQogc2NvcGUgPSBzY29wZS10b2tlbiAqKCBTUCBz
Y29wZS10b2tlbiApDQogICAgc2NvcGUtdG9rZW4gPSAxKiggJXgyMSAvICV4MjMtNUIgLyAleDVE
LTdFICkgDQoNClNob3VsZCBpbnRyb3NwZWN0aW9uLTAxIGZvbGxvdyB0aGUgNjc0OSBzeW50YXgg
Zm9yIHNjb3Blcz8NCg0KDQoNCg0KDQoNCl9fX19fX19fX19fX19fX19fX19fX19fX19fX19fX19f
X19fX19fX19fX19fX19fDQpPQXV0aCBtYWlsaW5nIGxpc3QNCk9BdXRoQGlldGYub3JnDQpodHRw
czovL3d3dy5pZXRmLm9yZy9tYWlsbWFuL2xpc3RpbmZvL29hdXRoDQoNCg0KDQoNCl9fX19fX19f
X19fX19fX19fX19fX19fX19fX19fX19fX19fX19fX19fX19fX19fDQpPQXV0aCBtYWlsaW5nIGxp
c3QNCk9BdXRoQGlldGYub3JnDQpodHRwczovL3d3dy5pZXRmLm9yZy9tYWlsbWFuL2xpc3RpbmZv
L29hdXRoDQoNCiANCg0K
--=_alternative 0068B32985257B08_=
Content-Type: text/html; charset="UTF-8"
Content-Transfer-Encoding: base64
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==
--=_alternative 0068B32985257B08_=--


From wmills_92105@yahoo.com  Mon Feb  4 12:22:13 2013
Return-Path: <wmills_92105@yahoo.com>
X-Original-To: oauth@ietfa.amsl.com
Delivered-To: oauth@ietfa.amsl.com
Received: from localhost (localhost [127.0.0.1]) by ietfa.amsl.com (Postfix) with ESMTP id 9F48B21F87C4 for <oauth@ietfa.amsl.com>; Mon,  4 Feb 2013 12:22:13 -0800 (PST)
X-Virus-Scanned: amavisd-new at amsl.com
X-Spam-Flag: NO
X-Spam-Score: -0.323
X-Spam-Level: 
X-Spam-Status: No, score=-0.323 tagged_above=-999 required=5 tests=[AWL=-0.139, BAYES_40=-0.185, HTML_MESSAGE=0.001]
Received: from mail.ietf.org ([64.170.98.30]) by localhost (ietfa.amsl.com [127.0.0.1]) (amavisd-new, port 10024) with ESMTP id PJqgikQUI+se for <oauth@ietfa.amsl.com>; Mon,  4 Feb 2013 12:22:13 -0800 (PST)
Received: from nm13-vm1.bullet.mail.ne1.yahoo.com (nm13-vm1.bullet.mail.ne1.yahoo.com [98.138.91.62]) by ietfa.amsl.com (Postfix) with ESMTP id D789121F8759 for <oauth@ietf.org>; Mon,  4 Feb 2013 12:22:12 -0800 (PST)
Received: from [98.138.90.57] by nm13.bullet.mail.ne1.yahoo.com with NNFMP; 04 Feb 2013 20:22:12 -0000
Received: from [98.138.87.2] by tm10.bullet.mail.ne1.yahoo.com with NNFMP; 04 Feb 2013 20:22:12 -0000
Received: from [127.0.0.1] by omp1002.mail.ne1.yahoo.com with NNFMP; 04 Feb 2013 20:22:12 -0000
X-Yahoo-Newman-Property: ymail-3
X-Yahoo-Newman-Id: 450692.41930.bm@omp1002.mail.ne1.yahoo.com
Received: (qmail 33567 invoked by uid 60001); 4 Feb 2013 20:22:12 -0000
DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=yahoo.com; s=s1024; t=1360009332; bh=l9pFngQ73RSyoTUAFi+iBSg0Bd/QmAFB97S8R2kEFMQ=; h=X-YMail-OSG:Received:X-Rocket-MIMEInfo:X-Mailer:Message-ID:Date:From:Reply-To:Subject:To:MIME-Version:Content-Type; b=pIx0OHXjtGDZ2RhZ89h8Iaxqh7idObbcvdoxwYHdKuFRo4TraDjXY9NrrLQ4ORgohCZEv02KFGpz88i0IxYhr5q4iegO4VySlEUJjx6pUy+XwM7kpdk3F6lZyIRbDpW3W5x19Sfvdj70ibCISTKFAwKETHq5blGJ5UT0cxYgLdk=
DomainKey-Signature: a=rsa-sha1; q=dns; c=nofws; s=s1024; d=yahoo.com; h=X-YMail-OSG:Received:X-Rocket-MIMEInfo:X-Mailer:Message-ID:Date:From:Reply-To:Subject:To:MIME-Version:Content-Type; b=emhWhTdY+ydT9F73uLDbG1i+YRy3R7S0K+t/V7id9OICg5ABING8+MTlxut5OoP8WMPo+mX28h9WyNBk1luQK3pCqXRhblDJwF+xozUleGMdEuYwZyLfPH/y8j9J4HLVoTmdTgjj3qNOilhAi6KTCYusSM01prdMmxHX2607uU0=;
X-YMail-OSG: bQIXWSQVM1mDJpV9ixQxcK70UeL1qET7ImUqHlaTL912Qz_ OLZlX88AvF9.84tIOVNSFOU2_6HlW8rdh0rDekrmzFWn.biqQe1IUo8E8F6C 6rAJQyOb.d6WZgqX61wtSioRRN6OIrWZiMTqf6zJ9B1GsujK5a7DRxwqtvX. Q59UNazLihEBuv8X4ZaZ0fbrjxY8ftPBAECaVKJYhAbokO1hKUcK153C1gW5 WkBrWs6xxEys7L7RO9r4b7HUAE9NU2TGEn5ZkxOOAsk9.qAklj9pJ_cGnEKl jUPE9vayipniPoXr5L5OMYSTxMf.xJTKe3gGPm1ayZafSW9bjJMu_sDxFKMn Heu2N060ESkgKtIOxw81WPYwXOYnihpXf8CUCP1Tfxo1VjhuJXmpyvQnrglz uTYP4GbqfUnKBigA5TIMrDfmWxbKOHnUT2BDmAoDZEMk_uy4VDbnLlQymnqA 2sijy5f8s8yiGQRCQHKeSbora4qSJEHXv706LCDu4Yzs4D6Ie5cYzZ9hlBHk ZW8JyUqoeLTip2PGZFzIpgnyWPRryLYLBHUjcIA--
Received: from [209.131.62.113] by web31801.mail.mud.yahoo.com via HTTP; Mon, 04 Feb 2013 12:22:11 PST
X-Rocket-MIMEInfo: 001.001, MSkgwqBJIHRoaW5rIHRoYXQgd2UgbmVlZCB0byBmb2N1cyBvbiBzcGVjaWZpYyBzb2x1dGlvbnMsIGFzIEkgc2FpZCBvbiB0aGUgY2FsbCwgYW5kIHNvbHZlIHRoZSBPQXV0aCAxLjBhL01BQyB1c2UgY2FzZS4gwqBUaGVyZSdzIHNpZ25pZmljYW50IGluc3RhbGxlZCBiYXNlIG9mIE9BdXRoIDEuMGEgYW5kIHdlIG5lZWQgYSBwYXRoIGZvciB0aG9zZSBpbnN0YWxsYXRpb25zIGludG8gT0F1dGggMi4wLiDCoEkgbWF5IHdlbGwgcHVyc3VlIE1BQyBpbiB0aGUgaW50ZXJpbSB0byBkbyB0aGlzLCBidXQgYSBmdWwBMAEBAQE-
X-Mailer: YahooMailWebService/0.8.132.503
Message-ID: <1360009331.12021.YahooMailNeo@web31801.mail.mud.yahoo.com>
Date: Mon, 4 Feb 2013 12:22:11 -0800 (PST)
From: William Mills <wmills_92105@yahoo.com>
To: O Auth WG <oauth@ietf.org>
MIME-Version: 1.0
Content-Type: multipart/alternative; boundary="-368338466-1500808155-1360009331=:12021"
Subject: [OAUTH-WG] conf call follow up from  today
X-BeenThere: oauth@ietf.org
X-Mailman-Version: 2.1.12
Precedence: list
Reply-To: William Mills <wmills_92105@yahoo.com>
List-Id: OAUTH WG <oauth.ietf.org>
List-Unsubscribe: <https://www.ietf.org/mailman/options/oauth>, <mailto:oauth-request@ietf.org?subject=unsubscribe>
List-Archive: <http://www.ietf.org/mail-archive/web/oauth>
List-Post: <mailto:oauth@ietf.org>
List-Help: <mailto:oauth-request@ietf.org?subject=help>
List-Subscribe: <https://www.ietf.org/mailman/listinfo/oauth>, <mailto:oauth-request@ietf.org?subject=subscribe>
X-List-Received-Date: Mon, 04 Feb 2013 20:22:13 -0000

---368338466-1500808155-1360009331=:12021
Content-Type: text/plain; charset=iso-8859-1
Content-Transfer-Encoding: quoted-printable

1) =A0I think that we need to focus on specific solutions, as I said on the=
 call, and solve the OAuth 1.0a/MAC use case. =A0There's significant instal=
led base of OAuth 1.0a and we need a path for those installations into OAut=
h 2.0. =A0I may well pursue MAC in the interim to do this, but a full HOK s=
olution woul work too.=0A=0A2) =A0I think the discussion we were having abo=
ut "which authenticator to use" falls squarely into the endpoint discovery =
discussion and we should put that energy into endpoint discovery as distinc=
t from HOK.=0A=0A3) =A0We haven't talked yet about how a client will be abl=
e to specify a token type if it wants a specific one. =A0OAuth 2 core will =
need to be extended to support this.=0A=0A4) =A0We should leave the key dis=
tribution/discovery mechanism either out of scope or define it explicitly p=
er HOK token type profile. =A0This will have to work with the extensions fo=
r #3 above.=0A=0A5) =A0I want to avoid the problem in OAuth 1.0a of having =
to support and accept every possible signing mode. =A0Being force to accept=
 PLAINTEXT sucks. =A0We need a way for the discovery endpoint to mandate a =
specific set of allowed signature methods.=0A=0ARegards,=0A=0A-bill=0A
---368338466-1500808155-1360009331=:12021
Content-Type: text/html; charset=iso-8859-1
Content-Transfer-Encoding: quoted-printable

<html><body><div style=3D"color:#000; background-color:#fff; font-family:Co=
urier New, courier, monaco, monospace, sans-serif;font-size:12pt"><div>1) &=
nbsp;I think that we need to focus on specific solutions, as I said on the =
call, and solve the OAuth 1.0a/MAC use case. &nbsp;There's significant inst=
alled base of OAuth 1.0a and we need a path for those installations into OA=
uth 2.0. &nbsp;I may well pursue MAC in the interim to do this, but a full =
HOK solution woul work too.</div><div><br></div><div style=3D"color: rgb(0,=
 0, 0); font-size: 16px; font-family: 'Courier New', courier, monaco, monos=
pace, sans-serif; background-color: transparent; font-style: normal;">2) &n=
bsp;I think the discussion we were having about "which authenticator to use=
" falls squarely into the endpoint discovery discussion and we should put t=
hat energy into endpoint discovery as distinct from HOK.</div><div style=3D=
"color: rgb(0, 0, 0); font-size: 16px; font-family: 'Courier New',
 courier, monaco, monospace, sans-serif; background-color: transparent; fon=
t-style: normal;"><br></div><div style=3D"color: rgb(0, 0, 0); font-size: 1=
6px; font-family: 'Courier New', courier, monaco, monospace, sans-serif; ba=
ckground-color: transparent; font-style: normal;">3) &nbsp;We haven't talke=
d yet about how a client will be able to specify a token type if it wants a=
 specific one. &nbsp;OAuth 2 core will need to be extended to support this.=
</div><div style=3D"color: rgb(0, 0, 0); font-size: 16px; font-family: 'Cou=
rier New', courier, monaco, monospace, sans-serif; background-color: transp=
arent; font-style: normal;"><br></div><div style=3D"color: rgb(0, 0, 0); fo=
nt-size: 16px; font-family: 'Courier New', courier, monaco, monospace, sans=
-serif; background-color: transparent; font-style: normal;">4) &nbsp;We sho=
uld leave the key distribution/discovery mechanism either out of scope or d=
efine it explicitly per HOK token type profile. &nbsp;This will have to
 work with the extensions for #3 above.</div><div style=3D"color: rgb(0, 0,=
 0); font-size: 16px; font-family: 'Courier New', courier, monaco, monospac=
e, sans-serif; background-color: transparent; font-style: normal;"><br></di=
v><div style=3D"color: rgb(0, 0, 0); font-size: 16px; font-family: 'Courier=
 New', courier, monaco, monospace, sans-serif; background-color: transparen=
t; font-style: normal;">5) &nbsp;I want to avoid the problem in OAuth 1.0a =
of having to support and accept every possible signing mode. &nbsp;Being fo=
rce to accept PLAINTEXT sucks. &nbsp;We need a way for the discovery endpoi=
nt to mandate a specific set of allowed signature methods.</div><div style=
=3D"color: rgb(0, 0, 0); font-size: 16px; font-family: 'Courier New', couri=
er, monaco, monospace, sans-serif; background-color: transparent; font-styl=
e: normal;"><br></div><div style=3D"color: rgb(0, 0, 0); font-size: 16px; f=
ont-family: 'Courier New', courier, monaco, monospace, sans-serif;
 background-color: transparent; font-style: normal;">Regards,</div><div sty=
le=3D"color: rgb(0, 0, 0); font-size: 16px; font-family: 'Courier New', cou=
rier, monaco, monospace, sans-serif; background-color: transparent; font-st=
yle: normal;"><br></div><div style=3D"color: rgb(0, 0, 0); font-size: 16px;=
 font-family: 'Courier New', courier, monaco, monospace, sans-serif; backgr=
ound-color: transparent; font-style: normal;">-bill</div><div style=3D"colo=
r: rgb(0, 0, 0); font-size: 16px; font-family: 'Courier New', courier, mona=
co, monospace, sans-serif; background-color: transparent; font-style: norma=
l;"><br></div></div></body></html>
---368338466-1500808155-1360009331=:12021--

From jricher@mitre.org  Mon Feb  4 12:41:51 2013
Return-Path: <jricher@mitre.org>
X-Original-To: oauth@ietfa.amsl.com
Delivered-To: oauth@ietfa.amsl.com
Received: from localhost (localhost [127.0.0.1]) by ietfa.amsl.com (Postfix) with ESMTP id DF5E021F8ACE for <oauth@ietfa.amsl.com>; Mon,  4 Feb 2013 12:41:51 -0800 (PST)
X-Virus-Scanned: amavisd-new at amsl.com
X-Spam-Flag: NO
X-Spam-Score: -6.558
X-Spam-Level: 
X-Spam-Status: No, score=-6.558 tagged_above=-999 required=5 tests=[AWL=0.041,  BAYES_00=-2.599, RCVD_IN_DNSWL_MED=-4]
Received: from mail.ietf.org ([64.170.98.30]) by localhost (ietfa.amsl.com [127.0.0.1]) (amavisd-new, port 10024) with ESMTP id dMAWA-7dCq+F for <oauth@ietfa.amsl.com>; Mon,  4 Feb 2013 12:41:51 -0800 (PST)
Received: from smtpksrv1.mitre.org (smtpksrv1.mitre.org [198.49.146.77]) by ietfa.amsl.com (Postfix) with ESMTP id 5088E21F8AB6 for <oauth@ietf.org>; Mon,  4 Feb 2013 12:41:51 -0800 (PST)
Received: from smtpksrv1.mitre.org (localhost.localdomain [127.0.0.1]) by localhost (Postfix) with SMTP id A221353110C1; Mon,  4 Feb 2013 15:41:50 -0500 (EST)
Received: from IMCCAS02.MITRE.ORG (imccas02.mitre.org [129.83.29.79]) by smtpksrv1.mitre.org (Postfix) with ESMTP id 97F3D1F0B4B; Mon,  4 Feb 2013 15:41:50 -0500 (EST)
Received: from IMCMBX01.MITRE.ORG ([169.254.1.25]) by IMCCAS02.MITRE.ORG ([129.83.29.69]) with mapi id 14.02.0318.004; Mon, 4 Feb 2013 15:41:50 -0500
From: "Richer, Justin P." <jricher@mitre.org>
To: Torsten Lodderstedt <torsten@lodderstedt.net>
Thread-Topic: [OAUTH-WG] draft-ietf-oauth-revocation
Thread-Index: AQHOAg6vIhUkwEc0U0KvYyCodlh1/Jhqf9CA
Date: Mon, 4 Feb 2013 20:41:49 +0000
Message-ID: <B33BFB58CCC8BE4998958016839DE27E06886427@IMCMBX01.MITRE.ORG>
References: <510E5FB5.10803@lodderstedt.net>
In-Reply-To: <510E5FB5.10803@lodderstedt.net>
Accept-Language: en-US
Content-Language: en-US
X-MS-Has-Attach: 
X-MS-TNEF-Correlator: 
x-originating-ip: [172.31.48.118]
Content-Type: text/plain; charset="us-ascii"
Content-ID: <7CDA51F8899AA8459F1EC6685519BF1A@imc.mitre.org>
Content-Transfer-Encoding: quoted-printable
MIME-Version: 1.0
Cc: OAuth WG <oauth@ietf.org>
Subject: Re: [OAUTH-WG] draft-ietf-oauth-revocation
X-BeenThere: oauth@ietf.org
X-Mailman-Version: 2.1.12
Precedence: list
List-Id: OAUTH WG <oauth.ietf.org>
List-Unsubscribe: <https://www.ietf.org/mailman/options/oauth>, <mailto:oauth-request@ietf.org?subject=unsubscribe>
List-Archive: <http://www.ietf.org/mail-archive/web/oauth>
List-Post: <mailto:oauth@ietf.org>
List-Help: <mailto:oauth-request@ietf.org?subject=help>
List-Subscribe: <https://www.ietf.org/mailman/listinfo/oauth>, <mailto:oauth-request@ietf.org?subject=subscribe>
X-List-Received-Date: Mon, 04 Feb 2013 20:41:52 -0000

On Feb 3, 2013, at 8:01 AM, Torsten Lodderstedt <torsten@lodderstedt.net> w=
rote:

> Hi all,
>=20
> before I publish a new revision of the draft, I would like to sort out th=
e following issues and would like to ask you for your feedback.
>=20
> - Authorization vs. access grant vs. authorization grant: I propose to us=
e "authorization grant".

+1 to authorization grant

> - invalid_token error code: I propose to use the new error code "invalid_=
parameter" (as suggested by Peter and George). I don't see the need to regi=
ster it (see http://www.ietf.org/mail-archive/web/oauth/current/msg10604.ht=
ml) but would like to get your advice.

something more like "invalid_token_parameter" would maybe make sense, since=
 it's not just *any* parameter, it's the special "token" parameter that we'=
re talking about, but it's distinct from the invalid_token response. The in=
trospection endpoint uses the same pattern of a token=3D parameter, but sin=
ce the whole point of the introspection endpoint is determining token valid=
ity it doesn't actually throw an error here.=20

I agree that it doesn't need to be registered (since it's on a different en=
dpoint).

> - Donald F. Coffin raised the need for a token_type parameter to the revo=
cation request. Shall we re-consider this topic?
>=20

Only if it's optional, and informational from the client's behalf. Would yo=
u define "access" and "refresh" values here, with a means for other specs (=
like OIDC) to put in their own values (like "id_token")?

 -- Justin

> best regards,
> Torsten.
> _______________________________________________
> OAuth mailing list
> OAuth@ietf.org
> https://www.ietf.org/mailman/listinfo/oauth


From gffletch@aol.com  Mon Feb  4 12:57:58 2013
Return-Path: <gffletch@aol.com>
X-Original-To: oauth@ietfa.amsl.com
Delivered-To: oauth@ietfa.amsl.com
Received: from localhost (localhost [127.0.0.1]) by ietfa.amsl.com (Postfix) with ESMTP id ACCF421F8B3A for <oauth@ietfa.amsl.com>; Mon,  4 Feb 2013 12:57:58 -0800 (PST)
X-Virus-Scanned: amavisd-new at amsl.com
X-Spam-Flag: NO
X-Spam-Score: -1.679
X-Spam-Level: 
X-Spam-Status: No, score=-1.679 tagged_above=-999 required=5 tests=[AWL=0.921,  BAYES_00=-2.599]
Received: from mail.ietf.org ([64.170.98.30]) by localhost (ietfa.amsl.com [127.0.0.1]) (amavisd-new, port 10024) with ESMTP id IsV27IqP1DBU for <oauth@ietfa.amsl.com>; Mon,  4 Feb 2013 12:57:58 -0800 (PST)
Received: from imr-da02.mx.aol.com (imr-da02.mx.aol.com [205.188.105.144]) by ietfa.amsl.com (Postfix) with ESMTP id 279E221F8B1E for <oauth@ietf.org>; Mon,  4 Feb 2013 12:57:58 -0800 (PST)
Received: from mtaout-mb03.r1000.mx.aol.com (mtaout-mb03.r1000.mx.aol.com [172.29.41.67]) by imr-da02.mx.aol.com (Outbound Mail Relay) with ESMTP id 9A4571C0001DB; Mon,  4 Feb 2013 15:57:57 -0500 (EST)
Received: from palantir.local (unknown [10.181.176.202]) (using TLSv1 with cipher DHE-RSA-AES256-SHA (256/256 bits)) (No client certificate requested) by mtaout-mb03.r1000.mx.aol.com (MUA/Third Party Client Interface) with ESMTPSA id 4D869E0000D4; Mon,  4 Feb 2013 15:57:56 -0500 (EST)
Message-ID: <511020D3.1090201@aol.com>
Date: Mon, 04 Feb 2013 15:57:55 -0500
From: George Fletcher <gffletch@aol.com>
Organization: AOL LLC
User-Agent: Mozilla/5.0 (Macintosh; Intel Mac OS X 10.7; rv:17.0) Gecko/20130107 Thunderbird/17.0.2
MIME-Version: 1.0
To: "Richer, Justin P." <jricher@mitre.org>
References: <510E5FB5.10803@lodderstedt.net> <B33BFB58CCC8BE4998958016839DE27E06886427@IMCMBX01.MITRE.ORG>
In-Reply-To: <B33BFB58CCC8BE4998958016839DE27E06886427@IMCMBX01.MITRE.ORG>
Content-Type: text/plain; charset=ISO-8859-1; format=flowed
Content-Transfer-Encoding: 7bit
x-aol-global-disposition: G
DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=mx.aol.com; s=20121107; t=1360011477; bh=+Zm5iSpO+zwuCL5uDbFxyC+Lr2BWXkvylZCO8pPyuK8=; h=From:To:Subject:Message-ID:Date:MIME-Version:Content-Type; b=oU4zJAlp2pIXwx6YQ1eBRSnf4clp8hw59Re++QUdIUYbd43kltjcST+k4J0z5CLUu +kPHDZeR6SDEWeKKW6hBZRXc2hxHwdwhuZYAHooU0gCMbzI72pnHoLrcWepNkUYexJ XgI9kkW89hh5iXYTKo0/HBpc2JrRwonPGxN2ZdUw=
X-AOL-SCOLL-SCORE: 0:2:464563904:93952408  
X-AOL-SCOLL-URL_COUNT: 0  
x-aol-sid: 3039ac1d2943511020d40b55
X-AOL-IP: 10.181.176.202
Cc: OAuth WG <oauth@ietf.org>
Subject: Re: [OAUTH-WG] draft-ietf-oauth-revocation
X-BeenThere: oauth@ietf.org
X-Mailman-Version: 2.1.12
Precedence: list
List-Id: OAUTH WG <oauth.ietf.org>
List-Unsubscribe: <https://www.ietf.org/mailman/options/oauth>, <mailto:oauth-request@ietf.org?subject=unsubscribe>
List-Archive: <http://www.ietf.org/mail-archive/web/oauth>
List-Post: <mailto:oauth@ietf.org>
List-Help: <mailto:oauth-request@ietf.org?subject=help>
List-Subscribe: <https://www.ietf.org/mailman/listinfo/oauth>, <mailto:oauth-request@ietf.org?subject=subscribe>
X-List-Received-Date: Mon, 04 Feb 2013 20:57:58 -0000

On 2/4/13 3:41 PM, Richer, Justin P. wrote:
> On Feb 3, 2013, at 8:01 AM, Torsten Lodderstedt <torsten@lodderstedt.net> wrote:
>
>
>> - invalid_token error code: I propose to use the new error code "invalid_parameter" (as suggested by Peter and George). I don't see the need to register it (see http://www.ietf.org/mail-archive/web/oauth/current/msg10604.html) but would like to get your advice.
> something more like "invalid_token_parameter" would maybe make sense, since it's not just *any* parameter, it's the special "token" parameter that we're talking about, but it's distinct from the invalid_token response. The introspection endpoint uses the same pattern of a token= parameter, but since the whole point of the introspection endpoint is determining token validity it doesn't actually throw an error here.
>
> I agree that it doesn't need to be registered (since it's on a different endpoint).
For what it's worth my thinking was that if we have an 
'invalid_parameter' error, then the description can define which 
parameter is invalid. I don't think we should create a bunch of specific 
error values that are endpoint specific and could overlap which is where 
the whole error return value started.

Thanks,
George


From jricher@mitre.org  Mon Feb  4 13:10:25 2013
Return-Path: <jricher@mitre.org>
X-Original-To: oauth@ietfa.amsl.com
Delivered-To: oauth@ietfa.amsl.com
Received: from localhost (localhost [127.0.0.1]) by ietfa.amsl.com (Postfix) with ESMTP id 5D6C821F8934 for <oauth@ietfa.amsl.com>; Mon,  4 Feb 2013 13:10:25 -0800 (PST)
X-Virus-Scanned: amavisd-new at amsl.com
X-Spam-Flag: NO
X-Spam-Score: -6.56
X-Spam-Level: 
X-Spam-Status: No, score=-6.56 tagged_above=-999 required=5 tests=[AWL=0.039,  BAYES_00=-2.599, RCVD_IN_DNSWL_MED=-4]
Received: from mail.ietf.org ([64.170.98.30]) by localhost (ietfa.amsl.com [127.0.0.1]) (amavisd-new, port 10024) with ESMTP id fWYTT8RarOth for <oauth@ietfa.amsl.com>; Mon,  4 Feb 2013 13:10:24 -0800 (PST)
Received: from smtpksrv1.mitre.org (smtpksrv1.mitre.org [198.49.146.77]) by ietfa.amsl.com (Postfix) with ESMTP id B647A21F8935 for <oauth@ietf.org>; Mon,  4 Feb 2013 13:10:24 -0800 (PST)
Received: from smtpksrv1.mitre.org (localhost.localdomain [127.0.0.1]) by localhost (Postfix) with SMTP id 60B2D1F060A; Mon,  4 Feb 2013 16:10:24 -0500 (EST)
Received: from IMCCAS04.MITRE.ORG (imccas04.mitre.org [129.83.29.81]) by smtpksrv1.mitre.org (Postfix) with ESMTP id 512851F062C; Mon,  4 Feb 2013 16:10:24 -0500 (EST)
Received: from IMCMBX01.MITRE.ORG ([169.254.1.25]) by IMCCAS04.MITRE.ORG ([129.83.29.81]) with mapi id 14.02.0318.004; Mon, 4 Feb 2013 16:10:23 -0500
From: "Richer, Justin P." <jricher@mitre.org>
To: George Fletcher <gffletch@aol.com>
Thread-Topic: [OAUTH-WG] draft-ietf-oauth-revocation
Thread-Index: AQHOAg6vIhUkwEc0U0KvYyCodlh1/Jhqf9CAgAAEf4CAAAN8gA==
Date: Mon, 4 Feb 2013 21:10:23 +0000
Message-ID: <B33BFB58CCC8BE4998958016839DE27E068865E3@IMCMBX01.MITRE.ORG>
References: <510E5FB5.10803@lodderstedt.net> <B33BFB58CCC8BE4998958016839DE27E06886427@IMCMBX01.MITRE.ORG> <511020D3.1090201@aol.com>
In-Reply-To: <511020D3.1090201@aol.com>
Accept-Language: en-US
Content-Language: en-US
X-MS-Has-Attach: 
X-MS-TNEF-Correlator: 
x-originating-ip: [172.31.48.118]
Content-Type: text/plain; charset="iso-8859-1"
Content-ID: <849877590245434F82504648073E90BC@imc.mitre.org>
Content-Transfer-Encoding: quoted-printable
MIME-Version: 1.0
Cc: OAuth WG <oauth@ietf.org>
Subject: Re: [OAUTH-WG] draft-ietf-oauth-revocation
X-BeenThere: oauth@ietf.org
X-Mailman-Version: 2.1.12
Precedence: list
List-Id: OAUTH WG <oauth.ietf.org>
List-Unsubscribe: <https://www.ietf.org/mailman/options/oauth>, <mailto:oauth-request@ietf.org?subject=unsubscribe>
List-Archive: <http://www.ietf.org/mail-archive/web/oauth>
List-Post: <mailto:oauth@ietf.org>
List-Help: <mailto:oauth-request@ietf.org?subject=help>
List-Subscribe: <https://www.ietf.org/mailman/listinfo/oauth>, <mailto:oauth-request@ietf.org?subject=subscribe>
X-List-Received-Date: Mon, 04 Feb 2013 21:10:25 -0000

On Feb 4, 2013, at 3:57 PM, George Fletcher <gffletch@aol.com>
 wrote:

>=20
> On 2/4/13 3:41 PM, Richer, Justin P. wrote:
>> On Feb 3, 2013, at 8:01 AM, Torsten Lodderstedt <torsten@lodderstedt.net=
> wrote:
>>=20
>>=20
>>> - invalid_token error code: I propose to use the new error code "invali=
d_parameter" (as suggested by Peter and George). I don't see the need to re=
gister it (see http://www.ietf.org/mail-archive/web/oauth/current/msg10604.=
html) but would like to get your advice.
>> something more like "invalid_token_parameter" would maybe make sense, si=
nce it's not just *any* parameter, it's the special "token" parameter that =
we're talking about, but it's distinct from the invalid_token response. The=
 introspection endpoint uses the same pattern of a token=3D parameter, but =
since the whole point of the introspection endpoint is determining token va=
lidity it doesn't actually throw an error here.
>>=20
>> I agree that it doesn't need to be registered (since it's on a different=
 endpoint).
> For what it's worth my thinking was that if we have an 'invalid_parameter=
' error, then the description can define which parameter is invalid. I don'=
t think we should create a bunch of specific error values that are endpoint=
 specific and could overlap which is where the whole error return value sta=
rted.
>=20

Hm, I see what you're saying, but the error response is already endpoint sp=
ecific. Though there is value in not having conflicting and/or confusing re=
sponses from different endpoints that use the same error code for different=
 things.=20

What it really comes down to is: what can the client do with this error? Co=
uld it do something with invalid_parameter that it couldn't do with invalid=
_token_parameter (among others), or vice versa? As I'm writing this out, I'=
m not convinced that it could, really, so this may be a bike shedding argum=
ent.

 -- Justin



From lainhart@us.ibm.com  Mon Feb  4 13:20:30 2013
Return-Path: <lainhart@us.ibm.com>
X-Original-To: oauth@ietfa.amsl.com
Delivered-To: oauth@ietfa.amsl.com
Received: from localhost (localhost [127.0.0.1]) by ietfa.amsl.com (Postfix) with ESMTP id 2BF8B21F8B11 for <oauth@ietfa.amsl.com>; Mon,  4 Feb 2013 13:20:30 -0800 (PST)
X-Virus-Scanned: amavisd-new at amsl.com
X-Spam-Flag: NO
X-Spam-Score: -10.49
X-Spam-Level: 
X-Spam-Status: No, score=-10.49 tagged_above=-999 required=5 tests=[AWL=0.108,  BAYES_00=-2.599, HTML_MESSAGE=0.001, RCVD_IN_DNSWL_HI=-8]
Received: from mail.ietf.org ([64.170.98.30]) by localhost (ietfa.amsl.com [127.0.0.1]) (amavisd-new, port 10024) with ESMTP id FnNeX3nQeREO for <oauth@ietfa.amsl.com>; Mon,  4 Feb 2013 13:20:29 -0800 (PST)
Received: from e9.ny.us.ibm.com (e9.ny.us.ibm.com [32.97.182.139]) by ietfa.amsl.com (Postfix) with ESMTP id 2519621F8B0B for <oauth@ietf.org>; Mon,  4 Feb 2013 13:20:28 -0800 (PST)
Received: from /spool/local by e9.ny.us.ibm.com with IBM ESMTP SMTP Gateway: Authorized Use Only! Violators will be prosecuted for <oauth@ietf.org> from <lainhart@us.ibm.com>; Mon, 4 Feb 2013 16:20:28 -0500
Received: from d01dlp03.pok.ibm.com (9.56.250.168) by e9.ny.us.ibm.com (192.168.1.109) with IBM ESMTP SMTP Gateway: Authorized Use Only! Violators will be prosecuted;  Mon, 4 Feb 2013 16:20:25 -0500
Received: from d01relay03.pok.ibm.com (d01relay03.pok.ibm.com [9.56.227.235]) by d01dlp03.pok.ibm.com (Postfix) with ESMTP id CD99DC9003C; Mon,  4 Feb 2013 16:20:24 -0500 (EST)
Received: from d01av02.pok.ibm.com (d01av02.pok.ibm.com [9.56.224.216]) by d01relay03.pok.ibm.com (8.13.8/8.13.8/NCO v10.0) with ESMTP id r14LKOaC303270; Mon, 4 Feb 2013 16:20:24 -0500
Received: from d01av02.pok.ibm.com (loopback [127.0.0.1]) by d01av02.pok.ibm.com (8.14.4/8.13.1/NCO v10.0 AVout) with ESMTP id r14LKOeU012278; Mon, 4 Feb 2013 19:20:24 -0200
Received: from d01ml255.pok.ibm.com (d01ml255.pok.ibm.com [9.63.10.54]) by d01av02.pok.ibm.com (8.14.4/8.13.1/NCO v10.0 AVin) with ESMTP id r14LKOrd012274; Mon, 4 Feb 2013 19:20:24 -0200
In-Reply-To: <B33BFB58CCC8BE4998958016839DE27E06886427@IMCMBX01.MITRE.ORG>
References: <510E5FB5.10803@lodderstedt.net> <B33BFB58CCC8BE4998958016839DE27E06886427@IMCMBX01.MITRE.ORG>
To: "Richer, Justin P." <jricher@mitre.org>
MIME-Version: 1.0
X-KeepSent: 6BFF989E:BA988CD3-85257B08:0071ED60; type=4; name=$KeepSent
X-Mailer: Lotus Notes Release 8.5.3FP2 SHF22 July 19, 2012
Message-ID: <OF6BFF989E.BA988CD3-ON85257B08.0071ED60-85257B08.00753859@us.ibm.com>
From: Todd W Lainhart <lainhart@us.ibm.com>
Date: Mon, 4 Feb 2013 16:20:21 -0500
X-MIMETrack: Serialize by Router on D01ML255/01/M/IBM(Release 8.5.3FP2 ZX853FP2HF4|December 14, 2012) at 02/04/2013 16:20:24, Serialize complete at 02/04/2013 16:20:24
Content-Type: multipart/alternative; boundary="=_alternative 0075385985257B08_="
X-Content-Scanned: Fidelis XPS MAILER
x-cbid: 13020421-7182-0000-0000-000004EE5EAD
Cc: OAuth WG <oauth@ietf.org>, oauth-bounces@ietf.org
Subject: Re: [OAUTH-WG] draft-ietf-oauth-revocation
X-BeenThere: oauth@ietf.org
X-Mailman-Version: 2.1.12
Precedence: list
List-Id: OAUTH WG <oauth.ietf.org>
List-Unsubscribe: <https://www.ietf.org/mailman/options/oauth>, <mailto:oauth-request@ietf.org?subject=unsubscribe>
List-Archive: <http://www.ietf.org/mail-archive/web/oauth>
List-Post: <mailto:oauth@ietf.org>
List-Help: <mailto:oauth-request@ietf.org?subject=help>
List-Subscribe: <https://www.ietf.org/mailman/listinfo/oauth>, <mailto:oauth-request@ietf.org?subject=subscribe>
X-List-Received-Date: Mon, 04 Feb 2013 21:20:30 -0000

This is a multipart message in MIME format.
--=_alternative 0075385985257B08_=
Content-Type: text/plain; charset="US-ASCII"

> Only if it's optional, and informational from the client's behalf. Would 
you define "access" and "refresh" values here, with a means for other 
specs (like OIDC) to put in their own values (like "id_token")?

I'd also like to see token_type explicitly called out, as we've also 
extended the spec for a token type.  Arguably the type could be encoded in 
the token itself, but it seems better to not require this of the 
implementation.

That said, the introspection endpoint doesn't disambiguate the incoming 
token via a token_type parameter.  Is there any reason to believe that it 
wouldn't see the same types of tokens that revocation would?





Todd Lainhart
Rational software
IBM Corporation
550 King Street, Littleton, MA 01460-1250
1-978-899-4705
2-276-4705 (T/L)
lainhart@us.ibm.com




From:   "Richer, Justin P." <jricher@mitre.org>
To:     Torsten Lodderstedt <torsten@lodderstedt.net>, 
Cc:     OAuth WG <oauth@ietf.org>
Date:   02/04/2013 03:42 PM
Subject:        Re: [OAUTH-WG] draft-ietf-oauth-revocation
Sent by:        oauth-bounces@ietf.org




On Feb 3, 2013, at 8:01 AM, Torsten Lodderstedt <torsten@lodderstedt.net> 
wrote:

> Hi all,
> 
> before I publish a new revision of the draft, I would like to sort out 
the following issues and would like to ask you for your feedback.
> 
> - Authorization vs. access grant vs. authorization grant: I propose to 
use "authorization grant".

+1 to authorization grant

> - invalid_token error code: I propose to use the new error code 
"invalid_parameter" (as suggested by Peter and George). I don't see the 
need to register it (see 
http://www.ietf.org/mail-archive/web/oauth/current/msg10604.html) but 
would like to get your advice.

something more like "invalid_token_parameter" would maybe make sense, 
since it's not just *any* parameter, it's the special "token" parameter 
that we're talking about, but it's distinct from the invalid_token 
response. The introspection endpoint uses the same pattern of a token= 
parameter, but since the whole point of the introspection endpoint is 
determining token validity it doesn't actually throw an error here. 

I agree that it doesn't need to be registered (since it's on a different 
endpoint).

> - Donald F. Coffin raised the need for a token_type parameter to the 
revocation request. Shall we re-consider this topic?
> 

Only if it's optional, and informational from the client's behalf. Would 
you define "access" and "refresh" values here, with a means for other 
specs (like OIDC) to put in their own values (like "id_token")?

 -- Justin

> best regards,
> Torsten.
> _______________________________________________
> OAuth mailing list
> OAuth@ietf.org
> https://www.ietf.org/mailman/listinfo/oauth

_______________________________________________
OAuth mailing list
OAuth@ietf.org
https://www.ietf.org/mailman/listinfo/oauth



--=_alternative 0075385985257B08_=
Content-Type: text/html; charset="US-ASCII"

<font size=2 face="sans-serif">&gt; </font><tt><font size=2>Only if it's
optional, and informational from the client's behalf. Would you define
&quot;access&quot; and &quot;refresh&quot; values here, with a means for
other specs (like OIDC) to put in their own values (like &quot;id_token&quot;)?</font></tt>
<br>
<br><font size=2 face="sans-serif">I'd also like to see token_type explicitly
called out, as we've also extended the spec for a token type. &nbsp;Arguably
the type could be encoded in the token itself, but it seems better to not
require this of the implementation.</font>
<br>
<br><font size=2 face="sans-serif">That said, the introspection endpoint
doesn't disambiguate the incoming token via a token_type parameter. &nbsp;Is
there any reason to believe that it wouldn't see the same types of tokens
that revocation would?</font>
<br>
<br>
<table width=223 style="border-collapse:collapse;">
<tr height=8>
<td width=223 bgcolor=white style="border-style:solid;border-color:#000000;border-width:0px 0px 0px 0px;padding:0px 0px;"><font size=1 face="Verdana"><b><br>
<br>
<br>
Todd Lainhart<br>
Rational software<br>
IBM Corporation<br>
550 King Street, Littleton, MA 01460-1250</b></font><font size=1 face="Arial"><b><br>
1-978-899-4705<br>
2-276-4705 (T/L)<br>
lainhart@us.ibm.com</b></font></table>
<br>
<br>
<br>
<br>
<br><font size=1 color=#5f5f5f face="sans-serif">From: &nbsp; &nbsp; &nbsp;
&nbsp;</font><font size=1 face="sans-serif">&quot;Richer, Justin
P.&quot; &lt;jricher@mitre.org&gt;</font>
<br><font size=1 color=#5f5f5f face="sans-serif">To: &nbsp; &nbsp; &nbsp;
&nbsp;</font><font size=1 face="sans-serif">Torsten Lodderstedt
&lt;torsten@lodderstedt.net&gt;, </font>
<br><font size=1 color=#5f5f5f face="sans-serif">Cc: &nbsp; &nbsp; &nbsp;
&nbsp;</font><font size=1 face="sans-serif">OAuth WG &lt;oauth@ietf.org&gt;</font>
<br><font size=1 color=#5f5f5f face="sans-serif">Date: &nbsp; &nbsp; &nbsp;
&nbsp;</font><font size=1 face="sans-serif">02/04/2013 03:42 PM</font>
<br><font size=1 color=#5f5f5f face="sans-serif">Subject: &nbsp; &nbsp;
&nbsp; &nbsp;</font><font size=1 face="sans-serif">Re: [OAUTH-WG]
draft-ietf-oauth-revocation</font>
<br><font size=1 color=#5f5f5f face="sans-serif">Sent by: &nbsp; &nbsp;
&nbsp; &nbsp;</font><font size=1 face="sans-serif">oauth-bounces@ietf.org</font>
<br>
<hr noshade>
<br>
<br>
<br><tt><font size=2><br>
On Feb 3, 2013, at 8:01 AM, Torsten Lodderstedt &lt;torsten@lodderstedt.net&gt;
wrote:<br>
<br>
&gt; Hi all,<br>
&gt; <br>
&gt; before I publish a new revision of the draft, I would like to sort
out the following issues and would like to ask you for your feedback.<br>
&gt; <br>
&gt; - Authorization vs. access grant vs. authorization grant: I propose
to use &quot;authorization grant&quot;.<br>
<br>
+1 to authorization grant<br>
<br>
&gt; - invalid_token error code: I propose to use the new error code &quot;invalid_parameter&quot;
(as suggested by Peter and George). I don't see the need to register it
(see </font></tt><a href="http://www.ietf.org/mail-archive/web/oauth/current/msg10604.html"><tt><font size=2>http://www.ietf.org/mail-archive/web/oauth/current/msg10604.html</font></tt></a><tt><font size=2>)
but would like to get your advice.<br>
<br>
something more like &quot;invalid_token_parameter&quot; would maybe make
sense, since it's not just *any* parameter, it's the special &quot;token&quot;
parameter that we're talking about, but it's distinct from the invalid_token
response. The introspection endpoint uses the same pattern of a token=
parameter, but since the whole point of the introspection endpoint is determining
token validity it doesn't actually throw an error here. <br>
<br>
I agree that it doesn't need to be registered (since it's on a different
endpoint).<br>
<br>
&gt; - Donald F. Coffin raised the need for a token_type parameter to the
revocation request. Shall we re-consider this topic?<br>
&gt; <br>
<br>
Only if it's optional, and informational from the client's behalf. Would
you define &quot;access&quot; and &quot;refresh&quot; values here, with
a means for other specs (like OIDC) to put in their own values (like &quot;id_token&quot;)?<br>
<br>
 -- Justin<br>
<br>
&gt; best regards,<br>
&gt; Torsten.<br>
&gt; _______________________________________________<br>
&gt; OAuth mailing list<br>
&gt; OAuth@ietf.org<br>
&gt; </font></tt><a href=https://www.ietf.org/mailman/listinfo/oauth><tt><font size=2>https://www.ietf.org/mailman/listinfo/oauth</font></tt></a><tt><font size=2><br>
<br>
_______________________________________________<br>
OAuth mailing list<br>
OAuth@ietf.org<br>
</font></tt><a href=https://www.ietf.org/mailman/listinfo/oauth><tt><font size=2>https://www.ietf.org/mailman/listinfo/oauth</font></tt></a><tt><font size=2><br>
<br>
</font></tt>
<br>
--=_alternative 0075385985257B08_=--


From Michael.Jones@microsoft.com  Mon Feb  4 13:25:53 2013
Return-Path: <Michael.Jones@microsoft.com>
X-Original-To: oauth@ietfa.amsl.com
Delivered-To: oauth@ietfa.amsl.com
Received: from localhost (localhost [127.0.0.1]) by ietfa.amsl.com (Postfix) with ESMTP id B2A8D21F8AC0 for <oauth@ietfa.amsl.com>; Mon,  4 Feb 2013 13:25:53 -0800 (PST)
X-Virus-Scanned: amavisd-new at amsl.com
X-Spam-Flag: NO
X-Spam-Score: -2.598
X-Spam-Level: 
X-Spam-Status: No, score=-2.598 tagged_above=-999 required=5 tests=[AWL=-0.000, BAYES_00=-2.599, HTML_MESSAGE=0.001]
Received: from mail.ietf.org ([64.170.98.30]) by localhost (ietfa.amsl.com [127.0.0.1]) (amavisd-new, port 10024) with ESMTP id W6cPzp1oitxO for <oauth@ietfa.amsl.com>; Mon,  4 Feb 2013 13:25:53 -0800 (PST)
Received: from na01-by2-obe.outbound.protection.outlook.com (na01-by2-obe.ptr.protection.outlook.com [207.46.100.30]) by ietfa.amsl.com (Postfix) with ESMTP id 151E221F8AB8 for <oauth@ietf.org>; Mon,  4 Feb 2013 13:25:52 -0800 (PST)
Received: from BL2FFO11FD009.protection.gbl (10.173.161.201) by BL2FFO11HUB029.protection.gbl (10.173.161.53) with Microsoft SMTP Server (TLS) id 15.0.609.9; Mon, 4 Feb 2013 21:25:50 +0000
Received: from TK5EX14MLTC103.redmond.corp.microsoft.com (131.107.125.37) by BL2FFO11FD009.mail.protection.outlook.com (10.173.161.15) with Microsoft SMTP Server (TLS) id 15.0.609.9 via Frontend Transport; Mon, 4 Feb 2013 21:25:50 +0000
Received: from TK5EX14MBXC284.redmond.corp.microsoft.com ([169.254.1.132]) by TK5EX14MLTC103.redmond.corp.microsoft.com ([157.54.79.174]) with mapi id 14.02.0318.003; Mon, 4 Feb 2013 21:25:23 +0000
From: Mike Jones <Michael.Jones@microsoft.com>
To: "oauth@ietf.org" <oauth@ietf.org>
Thread-Topic: Should registration request be form-urlencoded or JSON?
Thread-Index: Ac4DHiIcTE3oals3S1ip2f/AR/tbdw==
Date: Mon, 4 Feb 2013 21:25:22 +0000
Message-ID: <4E1F6AAD24975D4BA5B1680429673943674111BE@TK5EX14MBXC284.redmond.corp.microsoft.com>
Accept-Language: en-US
Content-Language: en-US
X-MS-Has-Attach: 
X-MS-TNEF-Correlator: 
x-originating-ip: [157.54.51.78]
Content-Type: multipart/alternative; boundary="_000_4E1F6AAD24975D4BA5B1680429673943674111BETK5EX14MBXC284r_"
MIME-Version: 1.0
X-Forefront-Antispam-Report: CIP:131.107.125.37; CTRY:US; IPV:CAL; IPV:NLI; EFV:NLI; SFV:NSPM; SFS:(199002)(189002)(74502001)(49866001)(79102001)(50986001)(44976002)(47446002)(47736001)(55846006)(4396001)(16236675001)(47976001)(512954001)(77982001)(5343635001)(53806001)(56816002)(54316002)(59766001)(33656001)(5343655001)(63696002)(76482001)(74662001)(20776003)(56776001)(31966008)(54356001)(46102001)(15202345001)(51856001)(16406001); DIR:OUT; SFP:; SCL:1; SRVR:BL2FFO11HUB029; H:TK5EX14MLTC103.redmond.corp.microsoft.com; RD:InfoDomainNonexistent; A:1; MX:1; LANG:en; 
X-OriginatorOrg: microsoft.onmicrosoft.com
X-Forefront-PRVS: 07473990A5
Subject: [OAUTH-WG] Should registration request be form-urlencoded or JSON?
X-BeenThere: oauth@ietf.org
X-Mailman-Version: 2.1.12
Precedence: list
List-Id: OAUTH WG <oauth.ietf.org>
List-Unsubscribe: <https://www.ietf.org/mailman/options/oauth>, <mailto:oauth-request@ietf.org?subject=unsubscribe>
List-Archive: <http://www.ietf.org/mail-archive/web/oauth>
List-Post: <mailto:oauth@ietf.org>
List-Help: <mailto:oauth-request@ietf.org?subject=help>
List-Subscribe: <https://www.ietf.org/mailman/listinfo/oauth>, <mailto:oauth-request@ietf.org?subject=subscribe>
X-List-Received-Date: Mon, 04 Feb 2013 21:25:53 -0000

--_000_4E1F6AAD24975D4BA5B1680429673943674111BETK5EX14MBXC284r_
Content-Type: text/plain; charset="us-ascii"
Content-Transfer-Encoding: quoted-printable

Now that we're returning the registration state as JSON, it's pretty incons=
istent for the registration request to instead be form-url-encoded. The cas=
e can be made for switching to JSON now - especially in light of possibly w=
anting to convey some structured information at registration time.
I realize that this is a big change, but if we're going to do it, we should=
 do it now.
As a precedent, apparently SCIM requests are JSON, rather than form-url-enc=
oded.

                                                                -- Mike


--_000_4E1F6AAD24975D4BA5B1680429673943674111BETK5EX14MBXC284r_
Content-Type: text/html; charset="us-ascii"
Content-Transfer-Encoding: quoted-printable

<html xmlns:v=3D"urn:schemas-microsoft-com:vml" xmlns:o=3D"urn:schemas-micr=
osoft-com:office:office" xmlns:w=3D"urn:schemas-microsoft-com:office:word" =
xmlns:m=3D"http://schemas.microsoft.com/office/2004/12/omml" xmlns=3D"http:=
//www.w3.org/TR/REC-html40">
<head>
<meta http-equiv=3D"Content-Type" content=3D"text/html; charset=3Dus-ascii"=
>
<meta name=3D"Generator" content=3D"Microsoft Word 14 (filtered medium)">
<style><!--
/* Font Definitions */
@font-face
	{font-family:Calibri;
	panose-1:2 15 5 2 2 2 4 3 2 4;}
/* Style Definitions */
p.MsoNormal, li.MsoNormal, div.MsoNormal
	{margin:0in;
	margin-bottom:.0001pt;
	font-size:11.0pt;
	font-family:"Calibri","sans-serif";}
a:link, span.MsoHyperlink
	{mso-style-priority:99;
	color:blue;
	text-decoration:underline;}
a:visited, span.MsoHyperlinkFollowed
	{mso-style-priority:99;
	color:purple;
	text-decoration:underline;}
span.EmailStyle17
	{mso-style-type:personal-compose;
	font-family:"Calibri","sans-serif";
	color:windowtext;}
.MsoChpDefault
	{mso-style-type:export-only;}
@page WordSection1
	{size:8.5in 11.0in;
	margin:1.0in 1.0in 1.0in 1.0in;}
div.WordSection1
	{page:WordSection1;}
--></style><!--[if gte mso 9]><xml>
<o:shapedefaults v:ext=3D"edit" spidmax=3D"1026" />
</xml><![endif]--><!--[if gte mso 9]><xml>
<o:shapelayout v:ext=3D"edit">
<o:idmap v:ext=3D"edit" data=3D"1" />
</o:shapelayout></xml><![endif]-->
</head>
<body lang=3D"EN-US" link=3D"blue" vlink=3D"purple">
<div class=3D"WordSection1">
<p class=3D"MsoNormal">Now that we're returning the registration state as J=
SON, it's pretty inconsistent for the registration request to instead be fo=
rm-url-encoded. The case can be made for switching to JSON now - especially=
 in light of possibly wanting to convey
 some structured information at registration time.<o:p></o:p></p>
<p class=3D"MsoNormal"><o:p></o:p></p>
<p class=3D"MsoNormal">I realize that this is a big change, but if we're go=
ing to do it, we should do it now.<o:p></o:p></p>
<p class=3D"MsoNormal"><o:p></o:p></p>
<p class=3D"MsoNormal">As a precedent, apparently SCIM requests are JSON, r=
ather than form-url-encoded.<o:p></o:p></p>
<p class=3D"MsoNormal"><o:p>&nbsp;</o:p></p>
<p class=3D"MsoNormal">&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbs=
p;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&=
nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbs=
p;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&=
nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbs=
p;&nbsp;&nbsp;&nbsp;&nbsp; -- Mike<o:p></o:p></p>
<p class=3D"MsoNormal"><o:p>&nbsp;</o:p></p>
</div>
</body>
</html>

--_000_4E1F6AAD24975D4BA5B1680429673943674111BETK5EX14MBXC284r_--

From prateek.mishra@oracle.com  Mon Feb  4 13:28:22 2013
Return-Path: <prateek.mishra@oracle.com>
X-Original-To: oauth@ietfa.amsl.com
Delivered-To: oauth@ietfa.amsl.com
Received: from localhost (localhost [127.0.0.1]) by ietfa.amsl.com (Postfix) with ESMTP id 5A6D121F8AF2 for <oauth@ietfa.amsl.com>; Mon,  4 Feb 2013 13:28:22 -0800 (PST)
X-Virus-Scanned: amavisd-new at amsl.com
X-Spam-Flag: NO
X-Spam-Score: -6.598
X-Spam-Level: 
X-Spam-Status: No, score=-6.598 tagged_above=-999 required=5 tests=[BAYES_00=-2.599, HTML_MESSAGE=0.001, RCVD_IN_DNSWL_MED=-4]
Received: from mail.ietf.org ([64.170.98.30]) by localhost (ietfa.amsl.com [127.0.0.1]) (amavisd-new, port 10024) with ESMTP id rqsAsHduMdRe for <oauth@ietfa.amsl.com>; Mon,  4 Feb 2013 13:28:21 -0800 (PST)
Received: from userp1040.oracle.com (userp1040.oracle.com [156.151.31.81]) by ietfa.amsl.com (Postfix) with ESMTP id 8A5A421F8AE7 for <oauth@ietf.org>; Mon,  4 Feb 2013 13:28:21 -0800 (PST)
Received: from acsinet22.oracle.com (acsinet22.oracle.com [141.146.126.238]) by userp1040.oracle.com (Sentrion-MTA-4.3.1/Sentrion-MTA-4.3.1) with ESMTP id r14LSKsn015227 (version=TLSv1/SSLv3 cipher=DHE-RSA-AES256-SHA bits=256 verify=OK); Mon, 4 Feb 2013 21:28:21 GMT
Received: from acsmt357.oracle.com (acsmt357.oracle.com [141.146.40.157]) by acsinet22.oracle.com (8.14.4+Sun/8.14.4) with ESMTP id r14LSJFH028785 (version=TLSv1/SSLv3 cipher=DHE-RSA-AES256-SHA bits=256 verify=NO); Mon, 4 Feb 2013 21:28:20 GMT
Received: from abhmt103.oracle.com (abhmt103.oracle.com [141.146.116.55]) by acsmt357.oracle.com (8.12.11.20060308/8.12.11) with ESMTP id r14LSJF3012069; Mon, 4 Feb 2013 15:28:19 -0600
Received: from [10.152.55.88] (/10.152.55.88) by default (Oracle Beehive Gateway v4.0) with ESMTP ; Mon, 04 Feb 2013 13:28:19 -0800
Message-ID: <511027F1.8050607@oracle.com>
Date: Mon, 04 Feb 2013 16:28:17 -0500
From: Prateek Mishra <prateek.mishra@oracle.com>
Organization: Oracle Corporation
User-Agent: Mozilla/5.0 (Windows NT 5.1; rv:17.0) Gecko/20130107 Thunderbird/17.0.2
MIME-Version: 1.0
To: oauth@ietf.org, William Mills <wmills_92105@yahoo.com>
References: <1360009331.12021.YahooMailNeo@web31801.mail.mud.yahoo.com>
In-Reply-To: <1360009331.12021.YahooMailNeo@web31801.mail.mud.yahoo.com>
Content-Type: multipart/alternative; boundary="------------060206080601040708070505"
X-Source-IP: acsinet22.oracle.com [141.146.126.238]
Subject: Re: [OAUTH-WG] conf call follow up from  today
X-BeenThere: oauth@ietf.org
X-Mailman-Version: 2.1.12
Precedence: list
List-Id: OAUTH WG <oauth.ietf.org>
List-Unsubscribe: <https://www.ietf.org/mailman/options/oauth>, <mailto:oauth-request@ietf.org?subject=unsubscribe>
List-Archive: <http://www.ietf.org/mail-archive/web/oauth>
List-Post: <mailto:oauth@ietf.org>
List-Help: <mailto:oauth-request@ietf.org?subject=help>
List-Subscribe: <https://www.ietf.org/mailman/listinfo/oauth>, <mailto:oauth-request@ietf.org?subject=subscribe>
X-List-Received-Date: Mon, 04 Feb 2013 21:28:22 -0000

This is a multi-part message in MIME format.
--------------060206080601040708070505
Content-Type: text/plain; charset=ISO-8859-1; format=flowed
Content-Transfer-Encoding: 7bit

Bill -

How does OAuth 1.0a deal with the problem of HTTP URL and header 
mutability? Header order may get re-arranged and URLs modified in 
transit from client to server. As a result, the signature/HMAC
might not validate at the final destination.

Isn't that a foundational problem with the OAuth 1.0a model? I thought 
that was one of the concerns expressed at the meeting today.

- prateek


> 1)  I think that we need to focus on specific solutions, as I said on 
> the call, and solve the OAuth 1.0a/MAC use case.  There's significant 
> installed base of OAuth 1.0a and we need a path for those 
> installations into OAuth 2.0.  I may well pursue MAC in the interim to 
> do this, but a full HOK solution woul work too.
>
> 2)  I think the discussion we were having about "which authenticator 
> to use" falls squarely into the endpoint discovery discussion and we 
> should put that energy into endpoint discovery as distinct from HOK.
>
> 3)  We haven't talked yet about how a client will be able to specify a 
> token type if it wants a specific one.  OAuth 2 core will need to be 
> extended to support this.
>
> 4)  We should leave the key distribution/discovery mechanism either 
> out of scope or define it explicitly per HOK token type profile.  This 
> will have to work with the extensions for #3 above.
>
> 5)  I want to avoid the problem in OAuth 1.0a of having to support and 
> accept every possible signing mode.  Being force to accept PLAINTEXT 
> sucks.  We need a way for the discovery endpoint to mandate a specific 
> set of allowed signature methods.
>
> Regards,
>
> -bill
>
>
>
> _______________________________________________
> OAuth mailing list
> OAuth@ietf.org
> https://www.ietf.org/mailman/listinfo/oauth


--------------060206080601040708070505
Content-Type: text/html; charset=ISO-8859-1
Content-Transfer-Encoding: 7bit

<html>
  <head>
    <meta content="text/html; charset=ISO-8859-1"
      http-equiv="Content-Type">
  </head>
  <body bgcolor="#FFFFFF" text="#000000">
    Bill - <br>
    <br>
    How does OAuth 1.0a deal with the problem of HTTP URL and header
    mutability? Header order may get re-arranged and URLs modified in
    transit from client to server. As a result, the signature/HMAC<br>
    might not validate at the final destination.<br>
    <br>
    Isn't that a foundational problem with the OAuth 1.0a model? I
    thought that was one of the concerns expressed at the meeting today.<br>
    <br>
    - prateek<br>
    <br>
    <br>
    <blockquote
      cite="mid:1360009331.12021.YahooMailNeo@web31801.mail.mud.yahoo.com"
      type="cite">
      <div style="color:#000; background-color:#fff; font-family:Courier
        New, courier, monaco, monospace, sans-serif;font-size:12pt">
        <div>1) &nbsp;I think that we need to focus on specific solutions, as
          I said on the call, and solve the OAuth 1.0a/MAC use case.
          &nbsp;There's significant installed base of OAuth 1.0a and we need
          a path for those installations into OAuth 2.0. &nbsp;I may well
          pursue MAC in the interim to do this, but a full HOK solution
          woul work too.</div>
        <div><br>
        </div>
        <div style="color: rgb(0, 0, 0); font-size: 16px; font-family:
          'Courier New', courier, monaco, monospace, sans-serif;
          background-color: transparent; font-style: normal;">2) &nbsp;I
          think the discussion we were having about "which authenticator
          to use" falls squarely into the endpoint discovery discussion
          and we should put that energy into endpoint discovery as
          distinct from HOK.</div>
        <div style="color: rgb(0, 0, 0); font-size: 16px; font-family:
          'Courier New', courier, monaco, monospace, sans-serif;
          background-color: transparent; font-style: normal;"><br>
        </div>
        <div style="color: rgb(0, 0, 0); font-size: 16px; font-family:
          'Courier New', courier, monaco, monospace, sans-serif;
          background-color: transparent; font-style: normal;">3) &nbsp;We
          haven't talked yet about how a client will be able to specify
          a token type if it wants a specific one. &nbsp;OAuth 2 core will
          need to be extended to support this.</div>
        <div style="color: rgb(0, 0, 0); font-size: 16px; font-family:
          'Courier New', courier, monaco, monospace, sans-serif;
          background-color: transparent; font-style: normal;"><br>
        </div>
        <div style="color: rgb(0, 0, 0); font-size: 16px; font-family:
          'Courier New', courier, monaco, monospace, sans-serif;
          background-color: transparent; font-style: normal;">4) &nbsp;We
          should leave the key distribution/discovery mechanism either
          out of scope or define it explicitly per HOK token type
          profile. &nbsp;This will have to work with the extensions for #3
          above.</div>
        <div style="color: rgb(0, 0, 0); font-size: 16px; font-family:
          'Courier New', courier, monaco, monospace, sans-serif;
          background-color: transparent; font-style: normal;"><br>
        </div>
        <div style="color: rgb(0, 0, 0); font-size: 16px; font-family:
          'Courier New', courier, monaco, monospace, sans-serif;
          background-color: transparent; font-style: normal;">5) &nbsp;I want
          to avoid the problem in OAuth 1.0a of having to support and
          accept every possible signing mode. &nbsp;Being force to accept
          PLAINTEXT sucks. &nbsp;We need a way for the discovery endpoint to
          mandate a specific set of allowed signature methods.</div>
        <div style="color: rgb(0, 0, 0); font-size: 16px; font-family:
          'Courier New', courier, monaco, monospace, sans-serif;
          background-color: transparent; font-style: normal;"><br>
        </div>
        <div style="color: rgb(0, 0, 0); font-size: 16px; font-family:
          'Courier New', courier, monaco, monospace, sans-serif;
          background-color: transparent; font-style: normal;">Regards,</div>
        <div style="color: rgb(0, 0, 0); font-size: 16px; font-family:
          'Courier New', courier, monaco, monospace, sans-serif;
          background-color: transparent; font-style: normal;"><br>
        </div>
        <div style="color: rgb(0, 0, 0); font-size: 16px; font-family:
          'Courier New', courier, monaco, monospace, sans-serif;
          background-color: transparent; font-style: normal;">-bill</div>
        <div style="color: rgb(0, 0, 0); font-size: 16px; font-family:
          'Courier New', courier, monaco, monospace, sans-serif;
          background-color: transparent; font-style: normal;"><br>
        </div>
      </div>
      <br>
      <fieldset class="mimeAttachmentHeader"></fieldset>
      <br>
      <pre wrap="">_______________________________________________
OAuth mailing list
<a class="moz-txt-link-abbreviated" href="mailto:OAuth@ietf.org">OAuth@ietf.org</a>
<a class="moz-txt-link-freetext" href="https://www.ietf.org/mailman/listinfo/oauth">https://www.ietf.org/mailman/listinfo/oauth</a>
</pre>
    </blockquote>
    <br>
  </body>
</html>

--------------060206080601040708070505--

From wmills_92105@yahoo.com  Mon Feb  4 13:33:29 2013
Return-Path: <wmills_92105@yahoo.com>
X-Original-To: oauth@ietfa.amsl.com
Delivered-To: oauth@ietfa.amsl.com
Received: from localhost (localhost [127.0.0.1]) by ietfa.amsl.com (Postfix) with ESMTP id EAFE621F8A77 for <oauth@ietfa.amsl.com>; Mon,  4 Feb 2013 13:33:29 -0800 (PST)
X-Virus-Scanned: amavisd-new at amsl.com
X-Spam-Flag: NO
X-Spam-Score: -1.484
X-Spam-Level: 
X-Spam-Status: No, score=-1.484 tagged_above=-999 required=5 tests=[AWL=1.115,  BAYES_00=-2.599, HTML_MESSAGE=0.001]
Received: from mail.ietf.org ([64.170.98.30]) by localhost (ietfa.amsl.com [127.0.0.1]) (amavisd-new, port 10024) with ESMTP id II1WYpxVep7l for <oauth@ietfa.amsl.com>; Mon,  4 Feb 2013 13:33:29 -0800 (PST)
Received: from nm3-vm3.bullet.mail.ne1.yahoo.com (nm3-vm3.bullet.mail.ne1.yahoo.com [98.138.91.133]) by ietfa.amsl.com (Postfix) with ESMTP id 160FE21F892D for <oauth@ietf.org>; Mon,  4 Feb 2013 13:33:29 -0800 (PST)
Received: from [98.138.90.52] by nm3.bullet.mail.ne1.yahoo.com with NNFMP; 04 Feb 2013 21:33:28 -0000
Received: from [98.138.89.240] by tm5.bullet.mail.ne1.yahoo.com with NNFMP; 04 Feb 2013 21:33:28 -0000
Received: from [127.0.0.1] by omp1013.mail.ne1.yahoo.com with NNFMP; 04 Feb 2013 21:33:28 -0000
X-Yahoo-Newman-Property: ymail-3
X-Yahoo-Newman-Id: 567161.8036.bm@omp1013.mail.ne1.yahoo.com
Received: (qmail 14853 invoked by uid 60001); 4 Feb 2013 21:33:28 -0000
DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=yahoo.com; s=s1024; t=1360013608; bh=XzqYOrbWCLNbGdJjDJSINDOAJ9/7wLGCo7pns2IMbKA=; h=X-YMail-OSG:Received:X-Rocket-MIMEInfo:X-Mailer:References:Message-ID:Date:From:Reply-To:Subject:To:In-Reply-To:MIME-Version:Content-Type; b=TN1EcFTyZnFx3ZFzxbniSSvcR8NaoXbCINLmokj4ABfBD9z7BeBTKjInfhDuzk0j1RVrna2L8q7DXfRzCBT/W0GOttVTvAUmtECTQHopr8Q7kbq5cgLLUBOJMyWVnOHbEOEE/qtrTQ6FWiQAWpaTYwCKQoUzYBIw/4fdcGlYeNM=
DomainKey-Signature: a=rsa-sha1; q=dns; c=nofws; s=s1024; d=yahoo.com; h=X-YMail-OSG:Received:X-Rocket-MIMEInfo:X-Mailer:References:Message-ID:Date:From:Reply-To:Subject:To:In-Reply-To:MIME-Version:Content-Type; b=nyEUO0sX2gWXHJNa1VPv6Khj7LextnGsrReD/NNViheNftYbClOJZvM9LOA9zrDCCLck6sGHuFxxr0lm9R+4vzJj6Z5OfPN07MwRr+3eRzE054qqzRWx5Gxbs89h8/ObRfF5xfol+kbNaaBK16I3pcJcMRh7yi/MLGVtLqtzJJs=;
X-YMail-OSG: 45wfy6sVM1mvZdgkG9O9mYGY88XZSEooD5VfigHqaDLB7yZ D69RtmWWuEsvu2X4YWNVnbJkto1O4ySHYpXEvaRUyawYDRcfpyLHgAU6Yf4J 6XScGJ1tjXeg4aHOgw7aDWkw7G8HTJ0h0vgAsiiZQecz8lLEMLhdpG.0l929 ZG0wItNmkn4ouT61eNHM239Jdc7Vi3VRDF7JCVyXpEHZwsWtYGIFpknrheti PrHPtMMVOz1o.VGQxvgsD1Uj6v2geNF.fibxhI7icqpy7HPBQnhq7Y5.lCR. PkSnLSFq5dPNf4NoaSy8K10v2ddUsvH8NleIzz49ax6PZN5qwjKhYFLxnoYX .9FNyhkGC7upNBY88YcGDc9RSlh_iTFXCe5qnSXd2ZJb1QP_unTUMaHInrLK fi5GmB_YivdKCS7WFwz_NUJmKmbj6oX5w0RUyALrDWqmVxSnrfSOxAYsJLxY XJyXNDBxjSmGityBg7Weho.ZaplZcodGEKmTcERgLq_ATqHB8tn3BdwFLIuV NUY10Ob5e2W4PJpRX2i6HHXwEr4Wh_.9XABzWjiyUUAs-
Received: from [209.131.62.145] by web31807.mail.mud.yahoo.com via HTTP; Mon, 04 Feb 2013 13:33:27 PST
X-Rocket-MIMEInfo: 001.001, T0F1dGggMS4wYSBzb2x2ZXMgb3JkZXJpbmcgcHJvYmxlbXMgdGhlcmUgYnV0IG5vdCBhZGRpdGlvbmFsIGRhdGEgYmVpbmcgYWRkZWQgdG8gdGhlIHNwZWNpZmljIGhlYWRlcnMuIMKgSXQgc3BlY2lmaWNhbGx5IHJlcXVpcmVzIHRoZSBsaWJyYXJ5IHRvIGJyZWFrIGFwYXJ0LCBzb3J0LCBhbmQgcmVhc3NlbWJsZSBpbiBhIGFscGhhYmV0aWNhbCBvcmRlciBieSBuYW1lIHRoZSBxdWVyeSBzdHJpbmcgcGFyYW1ldGVycyBhbmQgb2F1dGhfKiBwYXJhbWV0ZXJzLiDCoE9uZSBvZiB0aGUgbGVzcyBwb3B1bGFyIHQBMAEBAQE-
X-Mailer: YahooMailWebService/0.8.132.503
References: <1360009331.12021.YahooMailNeo@web31801.mail.mud.yahoo.com> <511027F1.8050607@oracle.com>
Message-ID: <1360013607.94969.YahooMailNeo@web31807.mail.mud.yahoo.com>
Date: Mon, 4 Feb 2013 13:33:27 -0800 (PST)
From: William Mills <wmills_92105@yahoo.com>
To: Prateek Mishra <prateek.mishra@oracle.com>, "oauth@ietf.org" <oauth@ietf.org>
In-Reply-To: <511027F1.8050607@oracle.com>
MIME-Version: 1.0
Content-Type: multipart/alternative; boundary="-125733401-859990031-1360013607=:94969"
Subject: Re: [OAUTH-WG] conf call follow up from  today
X-BeenThere: oauth@ietf.org
X-Mailman-Version: 2.1.12
Precedence: list
Reply-To: William Mills <wmills_92105@yahoo.com>
List-Id: OAUTH WG <oauth.ietf.org>
List-Unsubscribe: <https://www.ietf.org/mailman/options/oauth>, <mailto:oauth-request@ietf.org?subject=unsubscribe>
List-Archive: <http://www.ietf.org/mail-archive/web/oauth>
List-Post: <mailto:oauth@ietf.org>
List-Help: <mailto:oauth-request@ietf.org?subject=help>
List-Subscribe: <https://www.ietf.org/mailman/listinfo/oauth>, <mailto:oauth-request@ietf.org?subject=subscribe>
X-List-Received-Date: Mon, 04 Feb 2013 21:33:30 -0000

---125733401-859990031-1360013607=:94969
Content-Type: text/plain; charset=iso-8859-1
Content-Transfer-Encoding: quoted-printable

OAuth 1.0a solves ordering problems there but not additional data being add=
ed to the specific headers. =A0It specifically requires the library to brea=
k apart, sort, and reassemble in a alphabetical order by name the query str=
ing parameters and oauth_* parameters. =A0One of the less popular things ab=
out it.=A0=0A=0A=0A________________________________=0A From: Prateek Mishra=
 <prateek.mishra@oracle.com>=0ATo: oauth@ietf.org; William Mills <wmills_92=
105@yahoo.com> =0ASent: Monday, February 4, 2013 1:28 PM=0ASubject: Re: [OA=
UTH-WG] conf call follow up from  today=0A =0A=0ABill - =0A=0AHow does OAut=
h 1.0a deal with the problem of HTTP URL and header=0A    mutability? Heade=
r order may get re-arranged and URLs modified in=0A    transit from client =
to server. As a result, the signature/HMAC=0Amight not validate at the fina=
l destination.=0A=0AIsn't that a foundational problem with the OAuth 1.0a m=
odel? I=0A    thought that was one of the concerns expressed at the meeting=
 today.=0A=0A- prateek=0A=0A=0A=0A1) =A0I think that we need to focus on sp=
ecific solutions, as I said on the call, and solve the OAuth 1.0a/MAC use c=
ase. =A0There's significant installed base of OAuth 1.0a and we need a path=
 for those installations into OAuth 2.0. =A0I may well pursue MAC in the in=
terim to do this, but a full HOK solution woul work too.=0A>=0A>=0A>2) =A0I=
 think the discussion we were having about "which authenticator to use" fal=
ls squarely into the endpoint discovery discussion and we should put that e=
nergy into endpoint discovery as distinct from HOK.=0A>=0A>=0A>3) =A0We hav=
en't talked yet about how a client will be able to specify a token type if =
it wants a specific one. =A0OAuth 2 core will need to be extended to suppor=
t this.=0A>=0A>=0A>4) =A0We should leave the key distribution/discovery mec=
hanism either out of scope or define it explicitly per HOK token type profi=
le. =A0This will have to work with the extensions for #3 above.=0A>=0A>=0A>=
5) =A0I want to avoid the problem in OAuth 1.0a of having to support and ac=
cept every possible signing mode. =A0Being force to accept PLAINTEXT sucks.=
 =A0We need a way for the discovery endpoint to mandate a specific set of a=
llowed signature methods.=0A>=0A>=0A>Regards,=0A>=0A>=0A>-bill=0A>=0A>=0A>=
=0A>=0A>_______________________________________________=0AOAuth mailing lis=
t OAuth@ietf.org https://www.ietf.org/mailman/listinfo/oauth 
---125733401-859990031-1360013607=:94969
Content-Type: text/html; charset=iso-8859-1
Content-Transfer-Encoding: quoted-printable

<html><body><div style=3D"color:#000; background-color:#fff; font-family:Co=
urier New, courier, monaco, monospace, sans-serif;font-size:12pt"><div><spa=
n>OAuth 1.0a solves ordering problems there but not additional data being a=
dded to the specific headers. &nbsp;It specifically requires the library to=
 break apart, sort, and reassemble in a alphabetical order by name the quer=
y string parameters and oauth_* parameters. &nbsp;One of the less popular t=
hings about it.</span><span style=3D"background-color: transparent;">&nbsp;=
</span></div><div><br></div>  <div style=3D"font-family: 'Courier New', cou=
rier, monaco, monospace, sans-serif; font-size: 12pt;"> <div style=3D"font-=
family: 'times new roman', 'new york', times, serif; font-size: 12pt;"> <di=
v dir=3D"ltr"> <font size=3D"2" face=3D"Arial"> <hr size=3D"1">  <b><span s=
tyle=3D"font-weight:bold;">From:</span></b> Prateek Mishra &lt;prateek.mish=
ra@oracle.com&gt;<br> <b><span style=3D"font-weight: bold;">To:</span></b>
 oauth@ietf.org; William Mills &lt;wmills_92105@yahoo.com&gt; <br> <b><span=
 style=3D"font-weight: bold;">Sent:</span></b> Monday, February 4, 2013 1:2=
8 PM<br> <b><span style=3D"font-weight: bold;">Subject:</span></b> Re: [OAU=
TH-WG] conf call follow up from  today<br> </font> </div> <br>=0A<div id=3D=
"yiv667264885">=0A  =0A=0A    =0A  =0A  <div>=0A    Bill - <br>=0A    <br>=
=0A    How does OAuth 1.0a deal with the problem of HTTP URL and header=0A =
   mutability? Header order may get re-arranged and URLs modified in=0A    =
transit from client to server. As a result, the signature/HMAC<br>=0A    mi=
ght not validate at the final destination.<br>=0A    <br>=0A    Isn't that =
a foundational problem with the OAuth 1.0a model? I=0A    thought that was =
one of the concerns expressed at the meeting today.<br>=0A    <br>=0A    - =
prateek<br>=0A    <br>=0A    <br>=0A    <blockquote type=3D"cite">=0A      =
<div style=3D"color: rgb(0, 0, 0); background-color: rgb(255, 255, 255); fo=
nt-family: 'Courier New', courier, monaco, monospace, sans-serif; font-size=
: 12pt;">=0A        <div>1) &nbsp;I think that we need to focus on specific=
 solutions, as=0A          I said on the call, and solve the OAuth 1.0a/MAC=
 use case.=0A          &nbsp;There's significant installed base of OAuth 1.=
0a and we need=0A          a path for those installations into OAuth 2.0. &=
nbsp;I may well=0A          pursue MAC in the interim to do this, but a ful=
l HOK solution=0A          woul work too.</div>=0A        <div><br>=0A     =
   </div>=0A        <div style=3D"color: rgb(0, 0, 0); font-size: 16px; fon=
t-family: 'Courier New', courier, monaco, monospace, sans-serif; background=
-color: transparent; font-style: normal;">2) &nbsp;I=0A          think the =
discussion we were having about "which authenticator=0A          to use" fa=
lls squarely into the endpoint discovery discussion=0A          and we shou=
ld put that energy into endpoint discovery as=0A          distinct from HOK=
.</div>=0A        <div style=3D"color: rgb(0, 0, 0); font-size: 16px; font-=
family: 'Courier New', courier, monaco, monospace, sans-serif; background-c=
olor: transparent; font-style: normal;"><br>=0A        </div>=0A        <di=
v style=3D"color: rgb(0, 0, 0); font-size: 16px; font-family: 'Courier New'=
, courier, monaco, monospace, sans-serif; background-color: transparent; fo=
nt-style: normal;">3) &nbsp;We=0A          haven't talked yet about how a c=
lient will be able to specify=0A          a token type if it wants a specif=
ic one. &nbsp;OAuth 2 core will=0A          need to be extended to support =
this.</div>=0A        <div style=3D"color: rgb(0, 0, 0); font-size: 16px; f=
ont-family: 'Courier New', courier, monaco, monospace, sans-serif; backgrou=
nd-color: transparent; font-style: normal;"><br>=0A        </div>=0A       =
 <div style=3D"color: rgb(0, 0, 0); font-size: 16px; font-family: 'Courier =
New', courier, monaco, monospace, sans-serif; background-color: transparent=
; font-style: normal;">4) &nbsp;We=0A          should leave the key distrib=
ution/discovery mechanism either=0A          out of scope or define it expl=
icitly per HOK token type=0A          profile. &nbsp;This will have to work=
 with the extensions for #3=0A          above.</div>=0A        <div style=
=3D"color: rgb(0, 0, 0); font-size: 16px; font-family: 'Courier New', couri=
er, monaco, monospace, sans-serif; background-color: transparent; font-styl=
e: normal;"><br>=0A        </div>=0A        <div style=3D"color: rgb(0, 0, =
0); font-size: 16px; font-family: 'Courier New', courier, monaco, monospace=
, sans-serif; background-color: transparent; font-style: normal;">5) &nbsp;=
I want=0A          to avoid the problem in OAuth 1.0a of having to support =
and=0A          accept every possible signing mode. &nbsp;Being force to ac=
cept=0A          PLAINTEXT sucks. &nbsp;We need a way for the discovery end=
point to=0A          mandate a specific set of allowed signature methods.</=
div>=0A        <div style=3D"color: rgb(0, 0, 0); font-size: 16px; font-fam=
ily: 'Courier New', courier, monaco, monospace, sans-serif; background-colo=
r: transparent; font-style: normal;"><br>=0A        </div>=0A        <div s=
tyle=3D"color: rgb(0, 0, 0); font-size: 16px; font-family: 'Courier New', c=
ourier, monaco, monospace, sans-serif; background-color: transparent; font-=
style: normal;">Regards,</div>=0A        <div style=3D"color: rgb(0, 0, 0);=
 font-size: 16px; font-family: 'Courier New', courier, monaco, monospace, s=
ans-serif; background-color: transparent; font-style: normal;"><br>=0A     =
   </div>=0A        <div style=3D"color: rgb(0, 0, 0); font-size: 16px; fon=
t-family: 'Courier New', courier, monaco, monospace, sans-serif; background=
-color: transparent; font-style: normal;">-bill</div>=0A        <div style=
=3D"color: rgb(0, 0, 0); font-size: 16px; font-family: 'Courier New', couri=
er, monaco, monospace, sans-serif; background-color: transparent; font-styl=
e: normal;"><br>=0A        </div>=0A      </div>=0A      <br>=0A      <fiel=
dset class=3D"yiv667264885mimeAttachmentHeader"></fieldset>=0A      <br>=0A=
      <pre>_______________________________________________=0AOAuth mailing =
list=0A<a rel=3D"nofollow" class=3D"yiv667264885moz-txt-link-abbreviated" y=
mailto=3D"mailto:OAuth@ietf.org" target=3D"_blank" href=3D"mailto:OAuth@iet=
f.org">OAuth@ietf.org</a>=0A<a rel=3D"nofollow" class=3D"yiv667264885moz-tx=
t-link-freetext" target=3D"_blank" href=3D"https://www.ietf.org/mailman/lis=
tinfo/oauth">https://www.ietf.org/mailman/listinfo/oauth</a>=0A</pre>=0A   =
 </blockquote>=0A    <br>=0A  </div>=0A=0A</div><br><br> </div> </div>  </d=
iv></body></html>
---125733401-859990031-1360013607=:94969--

From jricher@mitre.org  Mon Feb  4 13:34:10 2013
Return-Path: <jricher@mitre.org>
X-Original-To: oauth@ietfa.amsl.com
Delivered-To: oauth@ietfa.amsl.com
Received: from localhost (localhost [127.0.0.1]) by ietfa.amsl.com (Postfix) with ESMTP id 570FA21F8B0B for <oauth@ietfa.amsl.com>; Mon,  4 Feb 2013 13:34:10 -0800 (PST)
X-Virus-Scanned: amavisd-new at amsl.com
X-Spam-Flag: NO
X-Spam-Score: -6.562
X-Spam-Level: 
X-Spam-Status: No, score=-6.562 tagged_above=-999 required=5 tests=[AWL=0.036,  BAYES_00=-2.599, HTML_MESSAGE=0.001, RCVD_IN_DNSWL_MED=-4]
Received: from mail.ietf.org ([64.170.98.30]) by localhost (ietfa.amsl.com [127.0.0.1]) (amavisd-new, port 10024) with ESMTP id UtQ6ZaH9wCeV for <oauth@ietfa.amsl.com>; Mon,  4 Feb 2013 13:34:05 -0800 (PST)
Received: from smtpksrv1.mitre.org (smtpksrv1.mitre.org [198.49.146.77]) by ietfa.amsl.com (Postfix) with ESMTP id 87F8921F8AF2 for <oauth@ietf.org>; Mon,  4 Feb 2013 13:34:05 -0800 (PST)
Received: from smtpksrv1.mitre.org (localhost.localdomain [127.0.0.1]) by localhost (Postfix) with SMTP id 0201B5311132; Mon,  4 Feb 2013 16:34:05 -0500 (EST)
Received: from IMCCAS02.MITRE.ORG (imccas02.mitre.org [129.83.29.79]) by smtpksrv1.mitre.org (Postfix) with ESMTP id E0D505311130; Mon,  4 Feb 2013 16:34:04 -0500 (EST)
Received: from IMCMBX01.MITRE.ORG ([169.254.1.25]) by IMCCAS02.MITRE.ORG ([129.83.29.69]) with mapi id 14.02.0318.004; Mon, 4 Feb 2013 16:34:04 -0500
From: "Richer, Justin P." <jricher@mitre.org>
To: Mike Jones <Michael.Jones@microsoft.com>
Thread-Topic: [OAUTH-WG] Should registration request be form-urlencoded or JSON?
Thread-Index: Ac4DHiIcTE3oals3S1ip2f/AR/tbdwAKyDGA
Date: Mon, 4 Feb 2013 21:34:03 +0000
Message-ID: <B33BFB58CCC8BE4998958016839DE27E068866A0@IMCMBX01.MITRE.ORG>
References: <4E1F6AAD24975D4BA5B1680429673943674111BE@TK5EX14MBXC284.redmond.corp.microsoft.com>
In-Reply-To: <4E1F6AAD24975D4BA5B1680429673943674111BE@TK5EX14MBXC284.redmond.corp.microsoft.com>
Accept-Language: en-US
Content-Language: en-US
X-MS-Has-Attach: 
X-MS-TNEF-Correlator: 
x-originating-ip: [172.31.48.118]
Content-Type: multipart/alternative; boundary="_000_B33BFB58CCC8BE4998958016839DE27E068866A0IMCMBX01MITREOR_"
MIME-Version: 1.0
Cc: "oauth@ietf.org" <oauth@ietf.org>
Subject: Re: [OAUTH-WG] Should registration request be form-urlencoded or JSON?
X-BeenThere: oauth@ietf.org
X-Mailman-Version: 2.1.12
Precedence: list
List-Id: OAUTH WG <oauth.ietf.org>
List-Unsubscribe: <https://www.ietf.org/mailman/options/oauth>, <mailto:oauth-request@ietf.org?subject=unsubscribe>
List-Archive: <http://www.ietf.org/mail-archive/web/oauth>
List-Post: <mailto:oauth@ietf.org>
List-Help: <mailto:oauth-request@ietf.org?subject=help>
List-Subscribe: <https://www.ietf.org/mailman/listinfo/oauth>, <mailto:oauth-request@ietf.org?subject=subscribe>
X-List-Received-Date: Mon, 04 Feb 2013 21:34:10 -0000

--_000_B33BFB58CCC8BE4998958016839DE27E068866A0IMCMBX01MITREOR_
Content-Type: text/plain; charset="us-ascii"
Content-Transfer-Encoding: quoted-printable

For history, the original UMA registration spec from whence this all grew w=
as JSON-in and JSON-out. It's feeling like this is coming back around.

Pro:
 - more REST-ish (particularly if we use real REST style like URL templates=
 and verbs)
 - consistent data structures
 - possible use of rich client data structures like lists and sub-objects

Con:
 - unlike the rest of OAuth, which is form-in, JSON-out
 - major change from existing code
 - possible overhead for existing OAuth libraries which haven't had to deal=
 with JSON from clients



If we're going to do this, we should dive in with both feet and define a fu=
ll RESTful API with all appropriate verbs and CRUD ops, and define it at th=
e OAuth DynReg level as well.


-- Justin

On Feb 4, 2013, at 4:25 PM, Mike Jones <Michael.Jones@microsoft.com<mailto:=
Michael.Jones@microsoft.com>>
 wrote:

Now that we're returning the registration state as JSON, it's pretty incons=
istent for the registration request to instead be form-url-encoded. The cas=
e can be made for switching to JSON now - especially in light of possibly w=
anting to convey some structured information at registration time.
I realize that this is a big change, but if we're going to do it, we should=
 do it now.
As a precedent, apparently SCIM requests are JSON, rather than form-url-enc=
oded.

                                                                -- Mike

_______________________________________________
OAuth mailing list
OAuth@ietf.org<mailto:OAuth@ietf.org>
https://www.ietf.org/mailman/listinfo/oauth


--_000_B33BFB58CCC8BE4998958016839DE27E068866A0IMCMBX01MITREOR_
Content-Type: text/html; charset="us-ascii"
Content-ID: <15A61AEE38B9E34993C154EF31F4B606@imc.mitre.org>
Content-Transfer-Encoding: quoted-printable

<html>
<head>
<meta http-equiv=3D"Content-Type" content=3D"text/html; charset=3Dus-ascii"=
>
</head>
<body style=3D"word-wrap: break-word; -webkit-nbsp-mode: space; -webkit-lin=
e-break: after-white-space; ">
For history, the original UMA registration spec from whence this all grew w=
as JSON-in and JSON-out. It's feeling like this is coming back around.
<div><br>
</div>
<div>Pro:</div>
<div>&nbsp;- more REST-ish (particularly if we use real REST style like URL=
 templates and verbs)</div>
<div>&nbsp;- consistent data structures</div>
<div>&nbsp;- possible use of rich client data structures like lists and sub=
-objects</div>
<div><br>
</div>
<div>Con:</div>
<div>&nbsp;- unlike the rest of OAuth, which is form-in, JSON-out</div>
<div>&nbsp;- major change from existing code</div>
<div>&nbsp;- possible overhead for existing OAuth libraries which haven't h=
ad to deal with JSON from clients</div>
<div><br>
</div>
<div><br>
</div>
<div><br>
</div>
<div>If we're going to do this, we should dive in with both feet and define=
 a full RESTful API with all appropriate verbs and CRUD ops, and define it =
at the OAuth DynReg level as well.</div>
<div><br>
</div>
<div><br>
</div>
<div>-- Justin</div>
<div><br>
<div>
<div>On Feb 4, 2013, at 4:25 PM, Mike Jones &lt;<a href=3D"mailto:Michael.J=
ones@microsoft.com">Michael.Jones@microsoft.com</a>&gt;</div>
<div>&nbsp;wrote:</div>
<br class=3D"Apple-interchange-newline">
<blockquote type=3D"cite">
<div lang=3D"EN-US" link=3D"blue" vlink=3D"purple" style=3D"font-family: He=
lvetica; font-size: medium; font-style: normal; font-variant: normal; font-=
weight: normal; letter-spacing: normal; line-height: normal; orphans: 2; te=
xt-align: -webkit-auto; text-indent: 0px; text-transform: none; white-space=
: normal; widows: 2; word-spacing: 0px; -webkit-text-size-adjust: auto; -we=
bkit-text-stroke-width: 0px; ">
<div class=3D"WordSection1" style=3D"page: WordSection1; ">
<div style=3D"margin: 0in 0in 0.0001pt; font-size: 11pt; font-family: Calib=
ri, sans-serif; ">
Now that we're returning the registration state as JSON, it's pretty incons=
istent for the registration request to instead be form-url-encoded. The cas=
e can be made for switching to JSON now - especially in light of possibly w=
anting to convey some structured
 information at registration time.<o:p></o:p></div>
<div style=3D"margin: 0in 0in 0.0001pt; font-size: 11pt; font-family: Calib=
ri, sans-serif; ">
<o:p></o:p></div>
<div style=3D"margin: 0in 0in 0.0001pt; font-size: 11pt; font-family: Calib=
ri, sans-serif; ">
I realize that this is a big change, but if we're going to do it, we should=
 do it now.<o:p></o:p></div>
<div style=3D"margin: 0in 0in 0.0001pt; font-size: 11pt; font-family: Calib=
ri, sans-serif; ">
<o:p></o:p></div>
<div style=3D"margin: 0in 0in 0.0001pt; font-size: 11pt; font-family: Calib=
ri, sans-serif; ">
As a precedent, apparently SCIM requests are JSON, rather than form-url-enc=
oded.<o:p></o:p></div>
<div style=3D"margin: 0in 0in 0.0001pt; font-size: 11pt; font-family: Calib=
ri, sans-serif; ">
<o:p>&nbsp;</o:p></div>
<div style=3D"margin: 0in 0in 0.0001pt; font-size: 11pt; font-family: Calib=
ri, sans-serif; ">
&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nb=
sp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;=
&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nb=
sp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;=
&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nb=
sp; -- Mike<o:p></o:p></div>
<div style=3D"margin: 0in 0in 0.0001pt; font-size: 11pt; font-family: Calib=
ri, sans-serif; ">
<o:p>&nbsp;</o:p></div>
</div>
_______________________________________________<br>
OAuth mailing list<br>
<a href=3D"mailto:OAuth@ietf.org" style=3D"color: purple; text-decoration: =
underline; ">OAuth@ietf.org</a><br>
<a href=3D"https://www.ietf.org/mailman/listinfo/oauth" style=3D"color: pur=
ple; text-decoration: underline; ">https://www.ietf.org/mailman/listinfo/oa=
uth</a><br>
</div>
</blockquote>
</div>
<br>
</div>
</body>
</html>

--_000_B33BFB58CCC8BE4998958016839DE27E068866A0IMCMBX01MITREOR_--

From jricher@mitre.org  Mon Feb  4 13:35:52 2013
Return-Path: <jricher@mitre.org>
X-Original-To: oauth@ietfa.amsl.com
Delivered-To: oauth@ietfa.amsl.com
Received: from localhost (localhost [127.0.0.1]) by ietfa.amsl.com (Postfix) with ESMTP id 8E6C821F8B14 for <oauth@ietfa.amsl.com>; Mon,  4 Feb 2013 13:35:52 -0800 (PST)
X-Virus-Scanned: amavisd-new at amsl.com
X-Spam-Flag: NO
X-Spam-Score: -6.563
X-Spam-Level: 
X-Spam-Status: No, score=-6.563 tagged_above=-999 required=5 tests=[AWL=0.035,  BAYES_00=-2.599, HTML_MESSAGE=0.001, RCVD_IN_DNSWL_MED=-4]
Received: from mail.ietf.org ([64.170.98.30]) by localhost (ietfa.amsl.com [127.0.0.1]) (amavisd-new, port 10024) with ESMTP id 2pCF050-G7ah for <oauth@ietfa.amsl.com>; Mon,  4 Feb 2013 13:35:52 -0800 (PST)
Received: from smtpksrv1.mitre.org (smtpksrv1.mitre.org [198.49.146.77]) by ietfa.amsl.com (Postfix) with ESMTP id C5EEF21F8AF2 for <oauth@ietf.org>; Mon,  4 Feb 2013 13:35:51 -0800 (PST)
Received: from smtpksrv1.mitre.org (localhost.localdomain [127.0.0.1]) by localhost (Postfix) with SMTP id 6B7001F0B99; Mon,  4 Feb 2013 16:35:51 -0500 (EST)
Received: from IMCCAS02.MITRE.ORG (imccas02.mitre.org [129.83.29.79]) by smtpksrv1.mitre.org (Postfix) with ESMTP id 5C76A1F0654; Mon,  4 Feb 2013 16:35:51 -0500 (EST)
Received: from IMCMBX01.MITRE.ORG ([169.254.1.25]) by IMCCAS02.MITRE.ORG ([129.83.29.69]) with mapi id 14.02.0318.004; Mon, 4 Feb 2013 16:35:51 -0500
From: "Richer, Justin P." <jricher@mitre.org>
To: Mike Jones <Michael.Jones@microsoft.com>
Thread-Topic: [OAUTH-WG] Should registration request be form-urlencoded or JSON?
Thread-Index: Ac4DHiIcTE3oals3S1ip2f/AR/tbdwAK2CMA
Date: Mon, 4 Feb 2013 21:35:50 +0000
Message-ID: <B33BFB58CCC8BE4998958016839DE27E068866BF@IMCMBX01.MITRE.ORG>
References: <4E1F6AAD24975D4BA5B1680429673943674111BE@TK5EX14MBXC284.redmond.corp.microsoft.com>
In-Reply-To: <4E1F6AAD24975D4BA5B1680429673943674111BE@TK5EX14MBXC284.redmond.corp.microsoft.com>
Accept-Language: en-US
Content-Language: en-US
X-MS-Has-Attach: 
X-MS-TNEF-Correlator: 
x-originating-ip: [172.31.48.118]
Content-Type: multipart/alternative; boundary="_000_B33BFB58CCC8BE4998958016839DE27E068866BFIMCMBX01MITREOR_"
MIME-Version: 1.0
Cc: "oauth@ietf.org" <oauth@ietf.org>
Subject: Re: [OAUTH-WG] Should registration request be form-urlencoded or JSON?
X-BeenThere: oauth@ietf.org
X-Mailman-Version: 2.1.12
Precedence: list
List-Id: OAUTH WG <oauth.ietf.org>
List-Unsubscribe: <https://www.ietf.org/mailman/options/oauth>, <mailto:oauth-request@ietf.org?subject=unsubscribe>
List-Archive: <http://www.ietf.org/mail-archive/web/oauth>
List-Post: <mailto:oauth@ietf.org>
List-Help: <mailto:oauth-request@ietf.org?subject=help>
List-Subscribe: <https://www.ietf.org/mailman/listinfo/oauth>, <mailto:oauth-request@ietf.org?subject=subscribe>
X-List-Received-Date: Mon, 04 Feb 2013 21:35:52 -0000

--_000_B33BFB58CCC8BE4998958016839DE27E068866BFIMCMBX01MITREOR_
Content-Type: text/plain; charset="us-ascii"
Content-Transfer-Encoding: quoted-printable

Additionally:

This begs the question, why not just do SCIM here? CloudFoundry's UAA has a=
 SCIM class for OAuth clients that they use for dynamic registration today.

 -- Justin


On Feb 4, 2013, at 4:25 PM, Mike Jones <Michael.Jones@microsoft.com<mailto:=
Michael.Jones@microsoft.com>>
 wrote:

Now that we're returning the registration state as JSON, it's pretty incons=
istent for the registration request to instead be form-url-encoded. The cas=
e can be made for switching to JSON now - especially in light of possibly w=
anting to convey some structured information at registration time.
I realize that this is a big change, but if we're going to do it, we should=
 do it now.
As a precedent, apparently SCIM requests are JSON, rather than form-url-enc=
oded.

                                                                -- Mike

_______________________________________________
OAuth mailing list
OAuth@ietf.org<mailto:OAuth@ietf.org>
https://www.ietf.org/mailman/listinfo/oauth


--_000_B33BFB58CCC8BE4998958016839DE27E068866BFIMCMBX01MITREOR_
Content-Type: text/html; charset="us-ascii"
Content-ID: <1804712D244B9542B6254822211A1293@imc.mitre.org>
Content-Transfer-Encoding: quoted-printable

<html>
<head>
<meta http-equiv=3D"Content-Type" content=3D"text/html; charset=3Dus-ascii"=
>
</head>
<body style=3D"word-wrap: break-word; -webkit-nbsp-mode: space; -webkit-lin=
e-break: after-white-space; ">
Additionally:
<div><br>
</div>
<div>This begs the question, why not just do SCIM here? CloudFoundry's UAA =
has a SCIM class for OAuth clients that they use for dynamic registration t=
oday.</div>
<div><br>
</div>
<div>&nbsp;-- Justin</div>
<div><br>
</div>
<div><br>
<div>
<div>On Feb 4, 2013, at 4:25 PM, Mike Jones &lt;<a href=3D"mailto:Michael.J=
ones@microsoft.com">Michael.Jones@microsoft.com</a>&gt;</div>
<div>&nbsp;wrote:</div>
<br class=3D"Apple-interchange-newline">
<blockquote type=3D"cite">
<div lang=3D"EN-US" link=3D"blue" vlink=3D"purple" style=3D"font-family: He=
lvetica; font-size: medium; font-style: normal; font-variant: normal; font-=
weight: normal; letter-spacing: normal; line-height: normal; orphans: 2; te=
xt-align: -webkit-auto; text-indent: 0px; text-transform: none; white-space=
: normal; widows: 2; word-spacing: 0px; -webkit-text-size-adjust: auto; -we=
bkit-text-stroke-width: 0px; ">
<div class=3D"WordSection1" style=3D"page: WordSection1; ">
<div style=3D"margin: 0in 0in 0.0001pt; font-size: 11pt; font-family: Calib=
ri, sans-serif; ">
Now that we're returning the registration state as JSON, it's pretty incons=
istent for the registration request to instead be form-url-encoded. The cas=
e can be made for switching to JSON now - especially in light of possibly w=
anting to convey some structured
 information at registration time.<o:p></o:p></div>
<div style=3D"margin: 0in 0in 0.0001pt; font-size: 11pt; font-family: Calib=
ri, sans-serif; ">
<o:p></o:p></div>
<div style=3D"margin: 0in 0in 0.0001pt; font-size: 11pt; font-family: Calib=
ri, sans-serif; ">
I realize that this is a big change, but if we're going to do it, we should=
 do it now.<o:p></o:p></div>
<div style=3D"margin: 0in 0in 0.0001pt; font-size: 11pt; font-family: Calib=
ri, sans-serif; ">
<o:p></o:p></div>
<div style=3D"margin: 0in 0in 0.0001pt; font-size: 11pt; font-family: Calib=
ri, sans-serif; ">
As a precedent, apparently SCIM requests are JSON, rather than form-url-enc=
oded.<o:p></o:p></div>
<div style=3D"margin: 0in 0in 0.0001pt; font-size: 11pt; font-family: Calib=
ri, sans-serif; ">
<o:p>&nbsp;</o:p></div>
<div style=3D"margin: 0in 0in 0.0001pt; font-size: 11pt; font-family: Calib=
ri, sans-serif; ">
&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nb=
sp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;=
&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nb=
sp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;=
&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nb=
sp; -- Mike<o:p></o:p></div>
<div style=3D"margin: 0in 0in 0.0001pt; font-size: 11pt; font-family: Calib=
ri, sans-serif; ">
<o:p>&nbsp;</o:p></div>
</div>
_______________________________________________<br>
OAuth mailing list<br>
<a href=3D"mailto:OAuth@ietf.org" style=3D"color: purple; text-decoration: =
underline; ">OAuth@ietf.org</a><br>
<a href=3D"https://www.ietf.org/mailman/listinfo/oauth" style=3D"color: pur=
ple; text-decoration: underline; ">https://www.ietf.org/mailman/listinfo/oa=
uth</a><br>
</div>
</blockquote>
</div>
<br>
</div>
</body>
</html>

--_000_B33BFB58CCC8BE4998958016839DE27E068866BFIMCMBX01MITREOR_--

From jricher@mitre.org  Mon Feb  4 13:37:12 2013
Return-Path: <jricher@mitre.org>
X-Original-To: oauth@ietfa.amsl.com
Delivered-To: oauth@ietfa.amsl.com
Received: from localhost (localhost [127.0.0.1]) by ietfa.amsl.com (Postfix) with ESMTP id 7235C21F8456 for <oauth@ietfa.amsl.com>; Mon,  4 Feb 2013 13:37:12 -0800 (PST)
X-Virus-Scanned: amavisd-new at amsl.com
X-Spam-Flag: NO
X-Spam-Score: -6.565
X-Spam-Level: 
X-Spam-Status: No, score=-6.565 tagged_above=-999 required=5 tests=[AWL=0.033,  BAYES_00=-2.599, HTML_MESSAGE=0.001, RCVD_IN_DNSWL_MED=-4]
Received: from mail.ietf.org ([64.170.98.30]) by localhost (ietfa.amsl.com [127.0.0.1]) (amavisd-new, port 10024) with ESMTP id BfnXmI5cHynB for <oauth@ietfa.amsl.com>; Mon,  4 Feb 2013 13:37:09 -0800 (PST)
Received: from smtpksrv1.mitre.org (smtpksrv1.mitre.org [198.49.146.77]) by ietfa.amsl.com (Postfix) with ESMTP id E487D21F8B14 for <oauth@ietf.org>; Mon,  4 Feb 2013 13:37:08 -0800 (PST)
Received: from smtpksrv1.mitre.org (localhost.localdomain [127.0.0.1]) by localhost (Postfix) with SMTP id 8440A531114A; Mon,  4 Feb 2013 16:37:08 -0500 (EST)
Received: from IMCCAS03.MITRE.ORG (imccas03.mitre.org [129.83.29.80]) by smtpksrv1.mitre.org (Postfix) with ESMTP id 748835311132; Mon,  4 Feb 2013 16:37:08 -0500 (EST)
Received: from IMCMBX01.MITRE.ORG ([169.254.1.25]) by IMCCAS03.MITRE.ORG ([129.83.29.80]) with mapi id 14.02.0318.004; Mon, 4 Feb 2013 16:37:07 -0500
From: "Richer, Justin P." <jricher@mitre.org>
To: William Mills <wmills_92105@yahoo.com>
Thread-Topic: [OAUTH-WG] conf call follow up from  today
Thread-Index: AQHOAx/HMw1LSuuzGkiPKErnOGKKJg==
Date: Mon, 4 Feb 2013 21:37:06 +0000
Message-ID: <B33BFB58CCC8BE4998958016839DE27E068866EF@IMCMBX01.MITRE.ORG>
References: <1360009331.12021.YahooMailNeo@web31801.mail.mud.yahoo.com>
In-Reply-To: <1360009331.12021.YahooMailNeo@web31801.mail.mud.yahoo.com>
Accept-Language: en-US
Content-Language: en-US
X-MS-Has-Attach: 
X-MS-TNEF-Correlator: 
x-originating-ip: [172.31.48.118]
Content-Type: multipart/alternative; boundary="_000_B33BFB58CCC8BE4998958016839DE27E068866EFIMCMBX01MITREOR_"
MIME-Version: 1.0
Cc: O Auth WG <oauth@ietf.org>
Subject: Re: [OAUTH-WG] conf call follow up from  today
X-BeenThere: oauth@ietf.org
X-Mailman-Version: 2.1.12
Precedence: list
List-Id: OAUTH WG <oauth.ietf.org>
List-Unsubscribe: <https://www.ietf.org/mailman/options/oauth>, <mailto:oauth-request@ietf.org?subject=unsubscribe>
List-Archive: <http://www.ietf.org/mail-archive/web/oauth>
List-Post: <mailto:oauth@ietf.org>
List-Help: <mailto:oauth-request@ietf.org?subject=help>
List-Subscribe: <https://www.ietf.org/mailman/listinfo/oauth>, <mailto:oauth-request@ietf.org?subject=subscribe>
X-List-Received-Date: Mon, 04 Feb 2013 21:37:12 -0000

--_000_B33BFB58CCC8BE4998958016839DE27E068866EFIMCMBX01MITREOR_
Content-Type: text/plain; charset="iso-8859-1"
Content-Transfer-Encoding: quoted-printable

What if we define a means to request OAuth1 style tokens from an OAuth2 aut=
h/token endpoint, but defer to OAuth1 for methods of how to use the token a=
t protected resources?

 -- Justin

On Feb 4, 2013, at 3:22 PM, William Mills <wmills_92105@yahoo.com<mailto:wm=
ills_92105@yahoo.com>> wrote:

1)  I think that we need to focus on specific solutions, as I said on the c=
all, and solve the OAuth 1.0a/MAC use case.  There's significant installed =
base of OAuth 1.0a and we need a path for those installations into OAuth 2.=
0.  I may well pursue MAC in the interim to do this, but a full HOK solutio=
n woul work too.

2)  I think the discussion we were having about "which authenticator to use=
" falls squarely into the endpoint discovery discussion and we should put t=
hat energy into endpoint discovery as distinct from HOK.

3)  We haven't talked yet about how a client will be able to specify a toke=
n type if it wants a specific one.  OAuth 2 core will need to be extended t=
o support this.

4)  We should leave the key distribution/discovery mechanism either out of =
scope or define it explicitly per HOK token type profile.  This will have t=
o work with the extensions for #3 above.

5)  I want to avoid the problem in OAuth 1.0a of having to support and acce=
pt every possible signing mode.  Being force to accept PLAINTEXT sucks.  We=
 need a way for the discovery endpoint to mandate a specific set of allowed=
 signature methods.

Regards,

-bill

_______________________________________________
OAuth mailing list
OAuth@ietf.org<mailto:OAuth@ietf.org>
https://www.ietf.org/mailman/listinfo/oauth


--_000_B33BFB58CCC8BE4998958016839DE27E068866EFIMCMBX01MITREOR_
Content-Type: text/html; charset="iso-8859-1"
Content-ID: <413FC106B98B444CBDBAEA04FDD7DE3E@imc.mitre.org>
Content-Transfer-Encoding: quoted-printable

<html>
<head>
<meta http-equiv=3D"Content-Type" content=3D"text/html; charset=3Diso-8859-=
1">
</head>
<body style=3D"word-wrap: break-word; -webkit-nbsp-mode: space; -webkit-lin=
e-break: after-white-space; ">
What if we define a means to request OAuth1 style tokens from an OAuth2 aut=
h/token endpoint, but defer to OAuth1 for methods of how to use the token a=
t protected resources?
<div><br>
</div>
<div>&nbsp;-- Justin<br>
<div><br>
<div>
<div>On Feb 4, 2013, at 3:22 PM, William Mills &lt;<a href=3D"mailto:wmills=
_92105@yahoo.com">wmills_92105@yahoo.com</a>&gt; wrote:</div>
<br class=3D"Apple-interchange-newline">
<blockquote type=3D"cite">
<div>
<div style=3D"background-color: rgb(255, 255, 255); font-family: 'Courier N=
ew', courier, monaco, monospace, sans-serif; font-size: 12pt; ">
<div>1) &nbsp;I think that we need to focus on specific solutions, as I sai=
d on the call, and solve the OAuth 1.0a/MAC use case. &nbsp;There's signifi=
cant installed base of OAuth 1.0a and we need a path for those installation=
s into OAuth 2.0. &nbsp;I may well pursue MAC in
 the interim to do this, but a full HOK solution woul work too.</div>
<div><br>
</div>
<div style=3D"font-size: 16px; font-family: 'Courier New', courier, monaco,=
 monospace, sans-serif; background-color: transparent; font-style: normal; =
">
2) &nbsp;I think the discussion we were having about &quot;which authentica=
tor to use&quot; falls squarely into the endpoint discovery discussion and =
we should put that energy into endpoint discovery as distinct from HOK.</di=
v>
<div style=3D"font-size: 16px; font-family: 'Courier New', courier, monaco,=
 monospace, sans-serif; background-color: transparent; font-style: normal; =
">
<br>
</div>
<div style=3D"font-size: 16px; font-family: 'Courier New', courier, monaco,=
 monospace, sans-serif; background-color: transparent; font-style: normal; =
">
3) &nbsp;We haven't talked yet about how a client will be able to specify a=
 token type if it wants a specific one. &nbsp;OAuth 2 core will need to be =
extended to support this.</div>
<div style=3D"font-size: 16px; font-family: 'Courier New', courier, monaco,=
 monospace, sans-serif; background-color: transparent; font-style: normal; =
">
<br>
</div>
<div style=3D"font-size: 16px; font-family: 'Courier New', courier, monaco,=
 monospace, sans-serif; background-color: transparent; font-style: normal; =
">
4) &nbsp;We should leave the key distribution/discovery mechanism either ou=
t of scope or define it explicitly per HOK token type profile. &nbsp;This w=
ill have to work with the extensions for #3 above.</div>
<div style=3D"font-size: 16px; font-family: 'Courier New', courier, monaco,=
 monospace, sans-serif; background-color: transparent; font-style: normal; =
">
<br>
</div>
<div style=3D"font-size: 16px; font-family: 'Courier New', courier, monaco,=
 monospace, sans-serif; background-color: transparent; font-style: normal; =
">
5) &nbsp;I want to avoid the problem in OAuth 1.0a of having to support and=
 accept every possible signing mode. &nbsp;Being force to accept PLAINTEXT =
sucks. &nbsp;We need a way for the discovery endpoint to mandate a specific=
 set of allowed signature methods.</div>
<div style=3D"font-size: 16px; font-family: 'Courier New', courier, monaco,=
 monospace, sans-serif; background-color: transparent; font-style: normal; =
">
<br>
</div>
<div style=3D"font-size: 16px; font-family: 'Courier New', courier, monaco,=
 monospace, sans-serif; background-color: transparent; font-style: normal; =
">
Regards,</div>
<div style=3D"font-size: 16px; font-family: 'Courier New', courier, monaco,=
 monospace, sans-serif; background-color: transparent; font-style: normal; =
">
<br>
</div>
<div style=3D"font-size: 16px; font-family: 'Courier New', courier, monaco,=
 monospace, sans-serif; background-color: transparent; font-style: normal; =
">
-bill</div>
<div style=3D"font-size: 16px; font-family: 'Courier New', courier, monaco,=
 monospace, sans-serif; background-color: transparent; font-style: normal; =
">
<br>
</div>
</div>
</div>
_______________________________________________<br>
OAuth mailing list<br>
<a href=3D"mailto:OAuth@ietf.org">OAuth@ietf.org</a><br>
https://www.ietf.org/mailman/listinfo/oauth<br>
</blockquote>
</div>
<br>
</div>
</div>
</body>
</html>

--_000_B33BFB58CCC8BE4998958016839DE27E068866EFIMCMBX01MITREOR_--

From sberyozkin@gmail.com  Mon Feb  4 13:42:42 2013
Return-Path: <sberyozkin@gmail.com>
X-Original-To: oauth@ietfa.amsl.com
Delivered-To: oauth@ietfa.amsl.com
Received: from localhost (localhost [127.0.0.1]) by ietfa.amsl.com (Postfix) with ESMTP id 45EFD21F8528 for <oauth@ietfa.amsl.com>; Mon,  4 Feb 2013 13:42:42 -0800 (PST)
X-Virus-Scanned: amavisd-new at amsl.com
X-Spam-Flag: NO
X-Spam-Score: -3.295
X-Spam-Level: 
X-Spam-Status: No, score=-3.295 tagged_above=-999 required=5 tests=[AWL=0.304,  BAYES_00=-2.599, RCVD_IN_DNSWL_LOW=-1]
Received: from mail.ietf.org ([64.170.98.30]) by localhost (ietfa.amsl.com [127.0.0.1]) (amavisd-new, port 10024) with ESMTP id 5DG7FaKJZ8DI for <oauth@ietfa.amsl.com>; Mon,  4 Feb 2013 13:42:41 -0800 (PST)
Received: from mail-wi0-f182.google.com (mail-wi0-f182.google.com [209.85.212.182]) by ietfa.amsl.com (Postfix) with ESMTP id 8C4F321F85B4 for <oauth@ietf.org>; Mon,  4 Feb 2013 13:42:41 -0800 (PST)
Received: by mail-wi0-f182.google.com with SMTP id hi18so2240746wib.15 for <oauth@ietf.org>; Mon, 04 Feb 2013 13:42:40 -0800 (PST)
DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=gmail.com; s=20120113; h=x-received:message-id:date:from:user-agent:mime-version:to:subject :references:in-reply-to:content-type:content-transfer-encoding; bh=4Cn2FPgMfA1AQwkEe6nGNmiXVZh4AwtIa9B+rxAmthU=; b=ocvWLZ8nHLHe5tundQjFSn/JLPAsBMxDKqO6TrR/RbfTGQ0AOYBYeqq/zVy8Jqsq3l inGKkzMMz5N3gzwMHNc5GImq6kPF7b8JbtfYQok3Usp9uvkbtBS9nknu439kmON51Ylk bV1fCdxGJTGpcPliZDaPbL0nZpvFi11kEJR4nLg7eCaZZg94EYLFLD7n4ZgXH5GKnLlX KiwO5MZ7UWH8GQvX4CY6mSsPsFtVFqiEXW9Dh6BKOl2PMmMCRt1P9E3pYctuA+r0SBeq Hhbf3eCDHYHXgoFVL/zJcAe66rHF5KS4r5eVqjYBZDvgsVPS06DZBIVm41U83ZKKU9Yj YXIg==
X-Received: by 10.180.73.212 with SMTP id n20mr12920640wiv.11.1360014160588; Mon, 04 Feb 2013 13:42:40 -0800 (PST)
Received: from [192.168.2.5] ([89.100.140.13]) by mx.google.com with ESMTPS id eo10sm24167979wib.9.2013.02.04.13.42.38 (version=TLSv1 cipher=ECDHE-RSA-RC4-SHA bits=128/128); Mon, 04 Feb 2013 13:42:39 -0800 (PST)
Message-ID: <51102B30.2010506@gmail.com>
Date: Mon, 04 Feb 2013 21:42:08 +0000
From: Sergey Beryozkin <sberyozkin@gmail.com>
User-Agent: Mozilla/5.0 (X11; Linux x86_64; rv:12.0) Gecko/20120430 Thunderbird/12.0.1
MIME-Version: 1.0
To: oauth@ietf.org
References: <1360009331.12021.YahooMailNeo@web31801.mail.mud.yahoo.com>
In-Reply-To: <1360009331.12021.YahooMailNeo@web31801.mail.mud.yahoo.com>
Content-Type: text/plain; charset=ISO-8859-1; format=flowed
Content-Transfer-Encoding: 7bit
Subject: Re: [OAUTH-WG] conf call follow up from  today
X-BeenThere: oauth@ietf.org
X-Mailman-Version: 2.1.12
Precedence: list
List-Id: OAUTH WG <oauth.ietf.org>
List-Unsubscribe: <https://www.ietf.org/mailman/options/oauth>, <mailto:oauth-request@ietf.org?subject=unsubscribe>
List-Archive: <http://www.ietf.org/mail-archive/web/oauth>
List-Post: <mailto:oauth@ietf.org>
List-Help: <mailto:oauth-request@ietf.org?subject=help>
List-Subscribe: <https://www.ietf.org/mailman/listinfo/oauth>, <mailto:oauth-request@ietf.org?subject=subscribe>
X-List-Received-Date: Mon, 04 Feb 2013 21:42:42 -0000

On 04/02/13 20:22, William Mills wrote:
> 1) I think that we need to focus on specific solutions, as I said on the
> call, and solve the OAuth 1.0a/MAC use case. There's significant
> installed base of OAuth 1.0a and we need a path for those installations
> into OAuth 2.0.
+1.

> I may well pursue MAC in the interim to do this,

I can help with some testing if/when needed...

Sergey

> but a
> full HOK solution woul work too.
>
> 2) I think the discussion we were having about "which authenticator to
> use" falls squarely into the endpoint discovery discussion and we should
> put that energy into endpoint discovery as distinct from HOK.
>
> 3) We haven't talked yet about how a client will be able to specify a
> token type if it wants a specific one. OAuth 2 core will need to be
> extended to support this.
>
> 4) We should leave the key distribution/discovery mechanism either out
> of scope or define it explicitly per HOK token type profile. This will
> have to work with the extensions for #3 above.
>
> 5) I want to avoid the problem in OAuth 1.0a of having to support and
> accept every possible signing mode. Being force to accept PLAINTEXT
> sucks. We need a way for the discovery endpoint to mandate a specific
> set of allowed signature methods.
>
> Regards,
>
> -bill
>
>
>
> _______________________________________________
> OAuth mailing list
> OAuth@ietf.org
> https://www.ietf.org/mailman/listinfo/oauth

From Michael.Jones@microsoft.com  Mon Feb  4 13:47:50 2013
Return-Path: <Michael.Jones@microsoft.com>
X-Original-To: oauth@ietfa.amsl.com
Delivered-To: oauth@ietfa.amsl.com
Received: from localhost (localhost [127.0.0.1]) by ietfa.amsl.com (Postfix) with ESMTP id 84F6121F85D2 for <oauth@ietfa.amsl.com>; Mon,  4 Feb 2013 13:47:49 -0800 (PST)
X-Virus-Scanned: amavisd-new at amsl.com
X-Spam-Flag: NO
X-Spam-Score: -2.598
X-Spam-Level: 
X-Spam-Status: No, score=-2.598 tagged_above=-999 required=5 tests=[AWL=-0.000, BAYES_00=-2.599, HTML_MESSAGE=0.001]
Received: from mail.ietf.org ([64.170.98.30]) by localhost (ietfa.amsl.com [127.0.0.1]) (amavisd-new, port 10024) with ESMTP id 7Vw8BJjCka4v for <oauth@ietfa.amsl.com>; Mon,  4 Feb 2013 13:47:41 -0800 (PST)
Received: from na01-bl2-obe.outbound.protection.outlook.com (na01-bl2-obe.ptr.protection.outlook.com [65.55.169.23]) by ietfa.amsl.com (Postfix) with ESMTP id 2C2E321F85B8 for <oauth@ietf.org>; Mon,  4 Feb 2013 13:47:41 -0800 (PST)
Received: from BY2FFO11FD012.protection.gbl (10.1.15.203) by BY2FFO11HUB013.protection.gbl (10.1.14.85) with Microsoft SMTP Server (TLS) id 15.0.609.9; Mon, 4 Feb 2013 21:47:35 +0000
Received: from TK5EX14HUBC104.redmond.corp.microsoft.com (131.107.125.37) by BY2FFO11FD012.mail.protection.outlook.com (10.1.14.130) with Microsoft SMTP Server (TLS) id 15.0.609.9 via Frontend Transport; Mon, 4 Feb 2013 21:47:35 +0000
Received: from TK5EX14MBXC284.redmond.corp.microsoft.com ([169.254.1.132]) by TK5EX14HUBC104.redmond.corp.microsoft.com ([157.54.80.25]) with mapi id 14.02.0318.003; Mon, 4 Feb 2013 21:46:45 +0000
From: Mike Jones <Michael.Jones@microsoft.com>
To: "Richer, Justin P." <jricher@mitre.org>
Thread-Topic: [OAUTH-WG] Should registration request be form-urlencoded or JSON?
Thread-Index: Ac4DHiIcTE3oals3S1ip2f/AR/tbdwAKyDGAAAo364A=
Date: Mon, 4 Feb 2013 21:46:44 +0000
Message-ID: <4E1F6AAD24975D4BA5B168042967394367411337@TK5EX14MBXC284.redmond.corp.microsoft.com>
References: <4E1F6AAD24975D4BA5B1680429673943674111BE@TK5EX14MBXC284.redmond.corp.microsoft.com> <B33BFB58CCC8BE4998958016839DE27E068866A0@IMCMBX01.MITRE.ORG>
In-Reply-To: <B33BFB58CCC8BE4998958016839DE27E068866A0@IMCMBX01.MITRE.ORG>
Accept-Language: en-US
Content-Language: en-US
X-MS-Has-Attach: 
X-MS-TNEF-Correlator: 
x-originating-ip: [157.54.51.78]
Content-Type: multipart/alternative; boundary="_000_4E1F6AAD24975D4BA5B168042967394367411337TK5EX14MBXC284r_"
MIME-Version: 1.0
X-Forefront-Antispam-Report: CIP:131.107.125.37; CTRY:US; IPV:CAL; IPV:NLI; EFV:NLI; SFV:NSPM; SFS:(377454001)(199002)(189002)(24454001)(50986001)(33656001)(47976001)(51856001)(47736001)(5343655001)(5343635001)(512954001)(20776003)(79102001)(4396001)(56816002)(63696002)(49866001)(46102001)(74502001)(15202345001)(31966008)(16236675001)(77982001)(59766001)(47446002)(44976002)(74662001)(55846006)(53806001)(76482001)(16406001)(56776001)(54356001)(54316002); DIR:OUT; SFP:; SCL:1; SRVR:BY2FFO11HUB013; H:TK5EX14HUBC104.redmond.corp.microsoft.com; RD:InfoDomainNonexistent; A:1; MX:1; LANG:en; 
X-OriginatorOrg: microsoft.onmicrosoft.com
X-Forefront-PRVS: 07473990A5
Cc: "oauth@ietf.org" <oauth@ietf.org>
Subject: Re: [OAUTH-WG] Should registration request be form-urlencoded or JSON?
X-BeenThere: oauth@ietf.org
X-Mailman-Version: 2.1.12
Precedence: list
List-Id: OAUTH WG <oauth.ietf.org>
List-Unsubscribe: <https://www.ietf.org/mailman/options/oauth>, <mailto:oauth-request@ietf.org?subject=unsubscribe>
List-Archive: <http://www.ietf.org/mail-archive/web/oauth>
List-Post: <mailto:oauth@ietf.org>
List-Help: <mailto:oauth-request@ietf.org?subject=help>
List-Subscribe: <https://www.ietf.org/mailman/listinfo/oauth>, <mailto:oauth-request@ietf.org?subject=subscribe>
X-List-Received-Date: Mon, 04 Feb 2013 21:47:50 -0000

--_000_4E1F6AAD24975D4BA5B168042967394367411337TK5EX14MBXC284r_
Content-Type: text/plain; charset="us-ascii"
Content-Transfer-Encoding: quoted-printable

I'm not proposing that we boil the ocean.  "Diving in with both feet and de=
fine a full RESTful API with all appropriate verbs and CRUD ops" is an almo=
st sure way to build a complicated spec, most of which isn't needed, and to=
 have it take a long time.

Everything in the current OpenID Registration spec is motivated by an actua=
l use case.  Stuff that isn't isn't in the spec.  That's nearly true of the=
 closely-related OAuth Registration spec, with what I believe to be a few e=
xceptions.  (Yes, we should harmonize those differences - hopefully based u=
pon real use cases.)

I was only proposing that we answer the single question of whether we're us=
ing the right input format or not.  I hope we can keep the discussion to th=
at topic and not use it to generate a passel of new work items as a side ef=
fect.

                                                                -- Mike

From: Richer, Justin P. [mailto:jricher@mitre.org]
Sent: Monday, February 04, 2013 1:34 PM
To: Mike Jones
Cc: oauth@ietf.org
Subject: Re: [OAUTH-WG] Should registration request be form-urlencoded or J=
SON?

For history, the original UMA registration spec from whence this all grew w=
as JSON-in and JSON-out. It's feeling like this is coming back around.

Pro:
 - more REST-ish (particularly if we use real REST style like URL templates=
 and verbs)
 - consistent data structures
 - possible use of rich client data structures like lists and sub-objects

Con:
 - unlike the rest of OAuth, which is form-in, JSON-out
 - major change from existing code
 - possible overhead for existing OAuth libraries which haven't had to deal=
 with JSON from clients



If we're going to do this, we should dive in with both feet and define a fu=
ll RESTful API with all appropriate verbs and CRUD ops, and define it at th=
e OAuth DynReg level as well.


-- Justin

On Feb 4, 2013, at 4:25 PM, Mike Jones <Michael.Jones@microsoft.com<mailto:=
Michael.Jones@microsoft.com>>
 wrote:


Now that we're returning the registration state as JSON, it's pretty incons=
istent for the registration request to instead be form-url-encoded. The cas=
e can be made for switching to JSON now - especially in light of possibly w=
anting to convey some structured information at registration time.
I realize that this is a big change, but if we're going to do it, we should=
 do it now.
As a precedent, apparently SCIM requests are JSON, rather than form-url-enc=
oded.

                                                                -- Mike

_______________________________________________
OAuth mailing list
OAuth@ietf.org<mailto:OAuth@ietf.org>
https://www.ietf.org/mailman/listinfo/oauth


--_000_4E1F6AAD24975D4BA5B168042967394367411337TK5EX14MBXC284r_
Content-Type: text/html; charset="us-ascii"
Content-Transfer-Encoding: quoted-printable

<html xmlns:v=3D"urn:schemas-microsoft-com:vml" xmlns:o=3D"urn:schemas-micr=
osoft-com:office:office" xmlns:w=3D"urn:schemas-microsoft-com:office:word" =
xmlns:m=3D"http://schemas.microsoft.com/office/2004/12/omml" xmlns=3D"http:=
//www.w3.org/TR/REC-html40">
<head>
<meta http-equiv=3D"Content-Type" content=3D"text/html; charset=3Dus-ascii"=
>
<meta name=3D"Generator" content=3D"Microsoft Word 14 (filtered medium)">
<style><!--
/* Font Definitions */
@font-face
	{font-family:Helvetica;
	panose-1:2 11 6 4 2 2 2 2 2 4;}
@font-face
	{font-family:Helvetica;
	panose-1:2 11 6 4 2 2 2 2 2 4;}
@font-face
	{font-family:Calibri;
	panose-1:2 15 5 2 2 2 4 3 2 4;}
@font-face
	{font-family:Tahoma;
	panose-1:2 11 6 4 3 5 4 4 2 4;}
/* Style Definitions */
p.MsoNormal, li.MsoNormal, div.MsoNormal
	{margin:0in;
	margin-bottom:.0001pt;
	font-size:12.0pt;
	font-family:"Times New Roman","serif";}
a:link, span.MsoHyperlink
	{mso-style-priority:99;
	color:blue;
	text-decoration:underline;}
a:visited, span.MsoHyperlinkFollowed
	{mso-style-priority:99;
	color:purple;
	text-decoration:underline;}
span.EmailStyle17
	{mso-style-type:personal-reply;
	font-family:"Calibri","sans-serif";
	color:#1F497D;}
.MsoChpDefault
	{mso-style-type:export-only;
	font-size:10.0pt;}
@page WordSection1
	{size:8.5in 11.0in;
	margin:1.0in 1.0in 1.0in 1.0in;}
div.WordSection1
	{page:WordSection1;}
--></style><!--[if gte mso 9]><xml>
<o:shapedefaults v:ext=3D"edit" spidmax=3D"1026" />
</xml><![endif]--><!--[if gte mso 9]><xml>
<o:shapelayout v:ext=3D"edit">
<o:idmap v:ext=3D"edit" data=3D"1" />
</o:shapelayout></xml><![endif]-->
</head>
<body lang=3D"EN-US" link=3D"blue" vlink=3D"purple">
<div class=3D"WordSection1">
<p class=3D"MsoNormal"><span style=3D"font-size:11.0pt;font-family:&quot;Ca=
libri&quot;,&quot;sans-serif&quot;;color:#1F497D">I&#8217;m not proposing t=
hat we boil the ocean.&nbsp; &#8220;</span>Diving in with both feet and def=
ine a full RESTful API with all appropriate verbs and CRUD ops<span style=
=3D"font-size:11.0pt;font-family:&quot;Calibri&quot;,&quot;sans-serif&quot;=
;color:#1F497D">&#8221;
 is an almost sure way to build a complicated spec, most of which isn&#8217=
;t needed, and to have it take a long time.<o:p></o:p></span></p>
<p class=3D"MsoNormal"><span style=3D"font-size:11.0pt;font-family:&quot;Ca=
libri&quot;,&quot;sans-serif&quot;;color:#1F497D"><o:p>&nbsp;</o:p></span><=
/p>
<p class=3D"MsoNormal"><span style=3D"font-size:11.0pt;font-family:&quot;Ca=
libri&quot;,&quot;sans-serif&quot;;color:#1F497D">Everything in the current=
 OpenID Registration spec is motivated by an actual use case.&nbsp; Stuff t=
hat isn&#8217;t isn&#8217;t in the spec.&nbsp; That&#8217;s nearly true of =
the closely-related
 OAuth Registration spec, with what I believe to be a few exceptions.&nbsp;=
 (Yes, we should harmonize those differences &#8211; hopefully based upon r=
eal use cases.)<o:p></o:p></span></p>
<p class=3D"MsoNormal"><span style=3D"font-size:11.0pt;font-family:&quot;Ca=
libri&quot;,&quot;sans-serif&quot;;color:#1F497D"><o:p>&nbsp;</o:p></span><=
/p>
<p class=3D"MsoNormal"><span style=3D"font-size:11.0pt;font-family:&quot;Ca=
libri&quot;,&quot;sans-serif&quot;;color:#1F497D">I was only proposing that=
 we answer the single question of whether we&#8217;re using the right input=
 format or not.&nbsp; I hope we can keep the discussion to that topic
 and not use it to generate a passel of new work items as a side effect.<o:=
p></o:p></span></p>
<p class=3D"MsoNormal"><span style=3D"font-size:11.0pt;font-family:&quot;Ca=
libri&quot;,&quot;sans-serif&quot;;color:#1F497D"><o:p>&nbsp;</o:p></span><=
/p>
<p class=3D"MsoNormal"><span style=3D"font-size:11.0pt;font-family:&quot;Ca=
libri&quot;,&quot;sans-serif&quot;;color:#1F497D">&nbsp;&nbsp;&nbsp;&nbsp;&=
nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbs=
p;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&=
nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbs=
p;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&=
nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp; -- Mike<o:p></o:p></s=
pan></p>
<p class=3D"MsoNormal"><span style=3D"font-size:11.0pt;font-family:&quot;Ca=
libri&quot;,&quot;sans-serif&quot;;color:#1F497D"><o:p>&nbsp;</o:p></span><=
/p>
<div>
<div style=3D"border:none;border-top:solid #B5C4DF 1.0pt;padding:3.0pt 0in =
0in 0in">
<p class=3D"MsoNormal"><b><span style=3D"font-size:10.0pt;font-family:&quot=
;Tahoma&quot;,&quot;sans-serif&quot;">From:</span></b><span style=3D"font-s=
ize:10.0pt;font-family:&quot;Tahoma&quot;,&quot;sans-serif&quot;"> Richer, =
Justin P. [mailto:jricher@mitre.org]
<br>
<b>Sent:</b> Monday, February 04, 2013 1:34 PM<br>
<b>To:</b> Mike Jones<br>
<b>Cc:</b> oauth@ietf.org<br>
<b>Subject:</b> Re: [OAUTH-WG] Should registration request be form-urlencod=
ed or JSON?<o:p></o:p></span></p>
</div>
</div>
<p class=3D"MsoNormal"><o:p>&nbsp;</o:p></p>
<p class=3D"MsoNormal">For history, the original UMA registration spec from=
 whence this all grew was JSON-in and JSON-out. It's feeling like this is c=
oming back around.
<o:p></o:p></p>
<div>
<p class=3D"MsoNormal"><o:p>&nbsp;</o:p></p>
</div>
<div>
<p class=3D"MsoNormal">Pro:<o:p></o:p></p>
</div>
<div>
<p class=3D"MsoNormal">&nbsp;- more REST-ish (particularly if we use real R=
EST style like URL templates and verbs)<o:p></o:p></p>
</div>
<div>
<p class=3D"MsoNormal">&nbsp;- consistent data structures<o:p></o:p></p>
</div>
<div>
<p class=3D"MsoNormal">&nbsp;- possible use of rich client data structures =
like lists and sub-objects<o:p></o:p></p>
</div>
<div>
<p class=3D"MsoNormal"><o:p>&nbsp;</o:p></p>
</div>
<div>
<p class=3D"MsoNormal">Con:<o:p></o:p></p>
</div>
<div>
<p class=3D"MsoNormal">&nbsp;- unlike the rest of OAuth, which is form-in, =
JSON-out<o:p></o:p></p>
</div>
<div>
<p class=3D"MsoNormal">&nbsp;- major change from existing code<o:p></o:p></=
p>
</div>
<div>
<p class=3D"MsoNormal">&nbsp;- possible overhead for existing OAuth librari=
es which haven't had to deal with JSON from clients<o:p></o:p></p>
</div>
<div>
<p class=3D"MsoNormal"><o:p>&nbsp;</o:p></p>
</div>
<div>
<p class=3D"MsoNormal"><o:p>&nbsp;</o:p></p>
</div>
<div>
<p class=3D"MsoNormal"><o:p>&nbsp;</o:p></p>
</div>
<div>
<p class=3D"MsoNormal">If we're going to do this, we should dive in with bo=
th feet and define a full RESTful API with all appropriate verbs and CRUD o=
ps, and define it at the OAuth DynReg level as well.<o:p></o:p></p>
</div>
<div>
<p class=3D"MsoNormal"><o:p>&nbsp;</o:p></p>
</div>
<div>
<p class=3D"MsoNormal"><o:p>&nbsp;</o:p></p>
</div>
<div>
<p class=3D"MsoNormal">-- Justin<o:p></o:p></p>
</div>
<div>
<p class=3D"MsoNormal"><o:p>&nbsp;</o:p></p>
<div>
<div>
<p class=3D"MsoNormal">On Feb 4, 2013, at 4:25 PM, Mike Jones &lt;<a href=
=3D"mailto:Michael.Jones@microsoft.com">Michael.Jones@microsoft.com</a>&gt;=
<o:p></o:p></p>
</div>
<div>
<p class=3D"MsoNormal">&nbsp;wrote:<o:p></o:p></p>
</div>
<p class=3D"MsoNormal"><br>
<br>
<o:p></o:p></p>
<div>
<div>
<p class=3D"MsoNormal"><span style=3D"font-size:11.0pt;font-family:&quot;Ca=
libri&quot;,&quot;sans-serif&quot;">Now that we're returning the registrati=
on state as JSON, it's pretty inconsistent for the registration request to =
instead be form-url-encoded. The case can be made for switching
 to JSON now - especially in light of possibly wanting to convey some struc=
tured information at registration time.<o:p></o:p></span></p>
</div>
<div>
<p class=3D"MsoNormal"><span style=3D"font-size:11.0pt;font-family:&quot;Ca=
libri&quot;,&quot;sans-serif&quot;">I realize that this is a big change, bu=
t if we're going to do it, we should do it now.<o:p></o:p></span></p>
</div>
<div>
<p class=3D"MsoNormal"><span style=3D"font-size:11.0pt;font-family:&quot;Ca=
libri&quot;,&quot;sans-serif&quot;">As a precedent, apparently SCIM request=
s are JSON, rather than form-url-encoded.<o:p></o:p></span></p>
</div>
<div>
<p class=3D"MsoNormal"><span style=3D"font-size:11.0pt;font-family:&quot;Ca=
libri&quot;,&quot;sans-serif&quot;">&nbsp;<o:p></o:p></span></p>
</div>
<div>
<p class=3D"MsoNormal"><span style=3D"font-size:11.0pt;font-family:&quot;Ca=
libri&quot;,&quot;sans-serif&quot;">&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nb=
sp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;=
&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nb=
sp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;=
&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nb=
sp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp; -- Mike<o:p></o:p></span></p>
</div>
<div>
<p class=3D"MsoNormal"><span style=3D"font-size:11.0pt;font-family:&quot;Ca=
libri&quot;,&quot;sans-serif&quot;">&nbsp;<o:p></o:p></span></p>
</div>
<p class=3D"MsoNormal"><span style=3D"font-size:13.5pt;font-family:&quot;He=
lvetica&quot;,&quot;sans-serif&quot;">_____________________________________=
__________<br>
OAuth mailing list<br>
<a href=3D"mailto:OAuth@ietf.org"><span style=3D"color:purple">OAuth@ietf.o=
rg</span></a><br>
<a href=3D"https://www.ietf.org/mailman/listinfo/oauth"><span style=3D"colo=
r:purple">https://www.ietf.org/mailman/listinfo/oauth</span></a><o:p></o:p>=
</span></p>
</div>
</div>
<p class=3D"MsoNormal"><o:p>&nbsp;</o:p></p>
</div>
</div>
</body>
</html>

--_000_4E1F6AAD24975D4BA5B168042967394367411337TK5EX14MBXC284r_--

From twbray@google.com  Mon Feb  4 13:51:43 2013
Return-Path: <twbray@google.com>
X-Original-To: oauth@ietfa.amsl.com
Delivered-To: oauth@ietfa.amsl.com
Received: from localhost (localhost [127.0.0.1]) by ietfa.amsl.com (Postfix) with ESMTP id E552921F887F for <oauth@ietfa.amsl.com>; Mon,  4 Feb 2013 13:51:41 -0800 (PST)
X-Virus-Scanned: amavisd-new at amsl.com
X-Spam-Flag: NO
X-Spam-Score: -101.977
X-Spam-Level: 
X-Spam-Status: No, score=-101.977 tagged_above=-999 required=5 tests=[BAYES_00=-2.599, FM_FORGED_GMAIL=0.622, HTML_MESSAGE=0.001, NO_RELAYS=-0.001, USER_IN_WHITELIST=-100]
Received: from mail.ietf.org ([64.170.98.30]) by localhost (ietfa.amsl.com [127.0.0.1]) (amavisd-new, port 10024) with ESMTP id dcroLdmFFncN for <oauth@ietfa.amsl.com>; Mon,  4 Feb 2013 13:51:40 -0800 (PST)
Received: from mail-ia0-x233.google.com (mail-ia0-x233.google.com [IPv6:2607:f8b0:4001:c02::233]) by ietfa.amsl.com (Postfix) with ESMTP id 3970E21F8869 for <oauth@ietf.org>; Mon,  4 Feb 2013 13:51:32 -0800 (PST)
Received: by mail-ia0-f179.google.com with SMTP id x24so8560014iak.38 for <oauth@ietf.org>; Mon, 04 Feb 2013 13:51:31 -0800 (PST)
DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=google.com; s=20120113; h=x-received:mime-version:in-reply-to:references:from:date:message-id :subject:to:cc:content-type; bh=mS5xXPejXW7wL1k1Gs+7/4JoCyPgSYBcuADfcEiEru4=; b=GKTDsNzJ7c/9A7GMJ7lVd1ATe7qeNyuQwxDrGEMSViQolnqeu2KtUZikKz8/ybZsUb W/MDLuQX9kAtmuGilGLPpNTeM4w4ERJVwcZf65UIT7jRds3d3/z9KIZf9TC/XMeOdsYW 3qA72ILirG9sl1SY+s5PVQmGA8tY8DNJUmfxwHQHZOnFroL7LDeVZKnlOc+FdhnoCiDM haCSnPMaFbv1FQgHr8aXOpSS5HB2KF8B8OAMiG5Ankn+xywG5fTMH3rgGGMldQDD6lUO uw4H0O/5WYcLMj6VEqqDSfs5S087bOawyXbmRWVBHDdDG7POw8eMdvn2SEjgSphcfPAD /kkw==
X-Google-DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=google.com; s=20120113; h=x-received:mime-version:in-reply-to:references:from:date:message-id :subject:to:cc:content-type:x-gm-message-state; bh=mS5xXPejXW7wL1k1Gs+7/4JoCyPgSYBcuADfcEiEru4=; b=ZtgSjMkxL7LQKPMjaxEm8a9oG4rSMNHmgGRNiWIEG8cOq0aWM2d4xQel+2HlKZM/NU L1iL+WKv0WBUP5FiJ7Iv7nC8mCp7YmhHnza0vbdMfF7O5/f0jY2LvAHsoQDSf2f0INmc V9uxN6lGR8Nnj+LtJzYaFcKrGi3GDvCqqgl17ovE4kLHAxzIZfDRjbh27wLGB6w+tXPU t1lwfDp4pMmiHbvE9KX9qEQk5LcGeJZjU1zBOI7CeLOvm8NcSQ9iniP65ekNb6qB2wOO powYpgikaYhUbBSCbqTACD1PgYg3RGORFsXaU0fdIokwZsGWHuoQUQ7OY3IxDrX0nbFm esOA==
X-Received: by 10.50.189.193 with SMTP id gk1mr9406137igc.87.1360014691710; Mon, 04 Feb 2013 13:51:31 -0800 (PST)
MIME-Version: 1.0
Received: by 10.64.63.11 with HTTP; Mon, 4 Feb 2013 13:51:00 -0800 (PST)
In-Reply-To: <4E1F6AAD24975D4BA5B168042967394367411337@TK5EX14MBXC284.redmond.corp.microsoft.com>
References: <4E1F6AAD24975D4BA5B1680429673943674111BE@TK5EX14MBXC284.redmond.corp.microsoft.com> <B33BFB58CCC8BE4998958016839DE27E068866A0@IMCMBX01.MITRE.ORG> <4E1F6AAD24975D4BA5B168042967394367411337@TK5EX14MBXC284.redmond.corp.microsoft.com>
From: Tim Bray <twbray@google.com>
Date: Mon, 4 Feb 2013 13:51:00 -0800
Message-ID: <CA+ZpN26np0h+wkv5vJeSofCpVi3cwxaiDaOj0aWn3bGuw29D0A@mail.gmail.com>
To: Mike Jones <Michael.Jones@microsoft.com>
Content-Type: multipart/alternative; boundary=14dae93410d396b92204d4ed189f
X-Gm-Message-State: ALoCoQmxcaQAXUstMxcEvpczzx+A3JDf4vgx6YvXd+Nq+NhD4CxFADwA38I+JkFB5SYsnA/C2bLXg52qYwRTYvoIYR1zC+yRgHWc+uFQO/IDwyaFXnjGvLlzkNex+0ZoMKzZAD7SR9z8g/879jPblAMfzkSjELvmts9epmBg0Ut/migwCvp0I5te5/299EEvY3JcZEPxYHIs
Cc: "oauth@ietf.org" <oauth@ietf.org>
Subject: Re: [OAUTH-WG] Should registration request be form-urlencoded or JSON?
X-BeenThere: oauth@ietf.org
X-Mailman-Version: 2.1.12
Precedence: list
List-Id: OAUTH WG <oauth.ietf.org>
List-Unsubscribe: <https://www.ietf.org/mailman/options/oauth>, <mailto:oauth-request@ietf.org?subject=unsubscribe>
List-Archive: <http://www.ietf.org/mail-archive/web/oauth>
List-Post: <mailto:oauth@ietf.org>
List-Help: <mailto:oauth-request@ietf.org?subject=help>
List-Subscribe: <https://www.ietf.org/mailman/listinfo/oauth>, <mailto:oauth-request@ietf.org?subject=subscribe>
X-List-Received-Date: Mon, 04 Feb 2013 21:51:43 -0000

--14dae93410d396b92204d4ed189f
Content-Type: text/plain; charset=UTF-8
Content-Transfer-Encoding: quoted-printable

>From the point of view of developer experience, meh, the degree of
difficulty of generating/parsing JSON & form/url is about the same.

JSON has the advantage that it forces you to use UTF-8, and is more
pleasant to debug when things get weird.

For my money, anything that forces anyone to use UTF-8 is A Good Thing.  -T

On Mon, Feb 4, 2013 at 1:46 PM, Mike Jones <Michael.Jones@microsoft.com>wro=
te:

>  I=E2=80=99m not proposing that we boil the ocean.  =E2=80=9CDiving in wi=
th both feet and
> define a full RESTful API with all appropriate verbs and CRUD ops=E2=80=
=9D is an
> almost sure way to build a complicated spec, most of which isn=E2=80=99t =
needed,
> and to have it take a long time.****
>
> ** **
>
> Everything in the current OpenID Registration spec is motivated by an
> actual use case.  Stuff that isn=E2=80=99t isn=E2=80=99t in the spec.  Th=
at=E2=80=99s nearly true
> of the closely-related OAuth Registration spec, with what I believe to be=
 a
> few exceptions.  (Yes, we should harmonize those differences =E2=80=93 ho=
pefully
> based upon real use cases.)****
>
> ** **
>
> I was only proposing that we answer the single question of whether we=E2=
=80=99re
> using the right input format or not.  I hope we can keep the discussion t=
o
> that topic and not use it to generate a passel of new work items as a sid=
e
> effect.****
>
> ** **
>
>                                                                 -- Mike**=
*
> *
>
> ** **
>
> *From:* Richer, Justin P. [mailto:jricher@mitre.org]
> *Sent:* Monday, February 04, 2013 1:34 PM
> *To:* Mike Jones
> *Cc:* oauth@ietf.org
> *Subject:* Re: [OAUTH-WG] Should registration request be form-urlencoded
> or JSON?****
>
> ** **
>
> For history, the original UMA registration spec from whence this all grew
> was JSON-in and JSON-out. It's feeling like this is coming back around. *=
*
> **
>
> ** **
>
> Pro:****
>
>  - more REST-ish (particularly if we use real REST style like URL
> templates and verbs)****
>
>  - consistent data structures****
>
>  - possible use of rich client data structures like lists and sub-objects=
*
> ***
>
> ** **
>
> Con:****
>
>  - unlike the rest of OAuth, which is form-in, JSON-out****
>
>  - major change from existing code****
>
>  - possible overhead for existing OAuth libraries which haven't had to
> deal with JSON from clients****
>
> ** **
>
> ** **
>
> ** **
>
> If we're going to do this, we should dive in with both feet and define a
> full RESTful API with all appropriate verbs and CRUD ops, and define it a=
t
> the OAuth DynReg level as well.****
>
> ** **
>
> ** **
>
> -- Justin****
>
> ** **
>
> On Feb 4, 2013, at 4:25 PM, Mike Jones <Michael.Jones@microsoft.com>****
>
>  wrote:****
>
>
>
> ****
>
> Now that we're returning the registration state as JSON, it's pretty
> inconsistent for the registration request to instead be form-url-encoded.
> The case can be made for switching to JSON now - especially in light of
> possibly wanting to convey some structured information at registration ti=
me.
> ****
>
> I realize that this is a big change, but if we're going to do it, we
> should do it now.****
>
> As a precedent, apparently SCIM requests are JSON, rather than
> form-url-encoded.****
>
>  ****
>
>                                                                 -- Mike**=
*
> *
>
>  ****
>
> _______________________________________________
> OAuth mailing list
> OAuth@ietf.org
> https://www.ietf.org/mailman/listinfo/oauth****
>
> ** **
>
> _______________________________________________
> OAuth mailing list
> OAuth@ietf.org
> https://www.ietf.org/mailman/listinfo/oauth
>
>

--14dae93410d396b92204d4ed189f
Content-Type: text/html; charset=UTF-8
Content-Transfer-Encoding: quoted-printable

>From the point of view of developer experience, meh, the degree of difficul=
ty of generating/parsing JSON &amp; form/url is about the same.<div><br></d=
iv><div>JSON has the advantage that it forces you to use UTF-8, and is more=
 pleasant to debug when things get weird.</div>

<div><br></div><div>For my money, anything that forces anyone to use UTF-8 =
is A Good Thing. =C2=A0-T<br><br><div class=3D"gmail_quote">On Mon, Feb 4, =
2013 at 1:46 PM, Mike Jones <span dir=3D"ltr">&lt;<a href=3D"mailto:Michael=
.Jones@microsoft.com" target=3D"_blank">Michael.Jones@microsoft.com</a>&gt;=
</span> wrote:<br>

<blockquote class=3D"gmail_quote" style=3D"margin:0 0 0 .8ex;border-left:1p=
x #ccc solid;padding-left:1ex">





<div lang=3D"EN-US" link=3D"blue" vlink=3D"purple">
<div>
<p class=3D"MsoNormal"><span style=3D"font-size:11.0pt;font-family:&quot;Ca=
libri&quot;,&quot;sans-serif&quot;;color:#1f497d">I=E2=80=99m not proposing=
 that we boil the ocean.=C2=A0 =E2=80=9C</span>Diving in with both feet and=
 define a full RESTful API with all appropriate verbs and CRUD ops<span sty=
le=3D"font-size:11.0pt;font-family:&quot;Calibri&quot;,&quot;sans-serif&quo=
t;;color:#1f497d">=E2=80=9D
 is an almost sure way to build a complicated spec, most of which isn=E2=80=
=99t needed, and to have it take a long time.<u></u><u></u></span></p>
<p class=3D"MsoNormal"><span style=3D"font-size:11.0pt;font-family:&quot;Ca=
libri&quot;,&quot;sans-serif&quot;;color:#1f497d"><u></u>=C2=A0<u></u></spa=
n></p>
<p class=3D"MsoNormal"><span style=3D"font-size:11.0pt;font-family:&quot;Ca=
libri&quot;,&quot;sans-serif&quot;;color:#1f497d">Everything in the current=
 OpenID Registration spec is motivated by an actual use case.=C2=A0 Stuff t=
hat isn=E2=80=99t isn=E2=80=99t in the spec.=C2=A0 That=E2=80=99s nearly tr=
ue of the closely-related
 OAuth Registration spec, with what I believe to be a few exceptions.=C2=A0=
 (Yes, we should harmonize those differences =E2=80=93 hopefully based upon=
 real use cases.)<u></u><u></u></span></p>
<p class=3D"MsoNormal"><span style=3D"font-size:11.0pt;font-family:&quot;Ca=
libri&quot;,&quot;sans-serif&quot;;color:#1f497d"><u></u>=C2=A0<u></u></spa=
n></p>
<p class=3D"MsoNormal"><span style=3D"font-size:11.0pt;font-family:&quot;Ca=
libri&quot;,&quot;sans-serif&quot;;color:#1f497d">I was only proposing that=
 we answer the single question of whether we=E2=80=99re using the right inp=
ut format or not.=C2=A0 I hope we can keep the discussion to that topic
 and not use it to generate a passel of new work items as a side effect.<u>=
</u><u></u></span></p>
<p class=3D"MsoNormal"><span style=3D"font-size:11.0pt;font-family:&quot;Ca=
libri&quot;,&quot;sans-serif&quot;;color:#1f497d"><u></u>=C2=A0<u></u></spa=
n></p>
<p class=3D"MsoNormal"><span style=3D"font-size:11.0pt;font-family:&quot;Ca=
libri&quot;,&quot;sans-serif&quot;;color:#1f497d">=C2=A0=C2=A0=C2=A0=C2=A0=
=C2=A0=C2=A0=C2=A0=C2=A0=C2=A0=C2=A0=C2=A0=C2=A0=C2=A0=C2=A0=C2=A0=C2=A0=C2=
=A0=C2=A0=C2=A0=C2=A0=C2=A0=C2=A0=C2=A0=C2=A0=C2=A0=C2=A0=C2=A0=C2=A0=C2=A0=
=C2=A0=C2=A0=C2=A0=C2=A0=C2=A0=C2=A0=C2=A0=C2=A0=C2=A0=C2=A0=C2=A0=C2=A0=C2=
=A0=C2=A0=C2=A0=C2=A0=C2=A0=C2=A0=C2=A0=C2=A0=C2=A0=C2=A0=C2=A0=C2=A0=C2=A0=
=C2=A0=C2=A0=C2=A0=C2=A0=C2=A0=C2=A0=C2=A0=C2=A0=C2=A0 -- Mike<u></u><u></u=
></span></p>
<p class=3D"MsoNormal"><span style=3D"font-size:11.0pt;font-family:&quot;Ca=
libri&quot;,&quot;sans-serif&quot;;color:#1f497d"><u></u>=C2=A0<u></u></spa=
n></p>
<div>
<div style=3D"border:none;border-top:solid #b5c4df 1.0pt;padding:3.0pt 0in =
0in 0in">
<p class=3D"MsoNormal"><b><span style=3D"font-size:10.0pt;font-family:&quot=
;Tahoma&quot;,&quot;sans-serif&quot;">From:</span></b><span style=3D"font-s=
ize:10.0pt;font-family:&quot;Tahoma&quot;,&quot;sans-serif&quot;"> Richer, =
Justin P. [mailto:<a href=3D"mailto:jricher@mitre.org" target=3D"_blank">jr=
icher@mitre.org</a>]
<br>
<b>Sent:</b> Monday, February 04, 2013 1:34 PM<br>
<b>To:</b> Mike Jones<br>
<b>Cc:</b> <a href=3D"mailto:oauth@ietf.org" target=3D"_blank">oauth@ietf.o=
rg</a><br>
<b>Subject:</b> Re: [OAUTH-WG] Should registration request be form-urlencod=
ed or JSON?<u></u><u></u></span></p>
</div>
</div><div><div class=3D"h5">
<p class=3D"MsoNormal"><u></u>=C2=A0<u></u></p>
<p class=3D"MsoNormal">For history, the original UMA registration spec from=
 whence this all grew was JSON-in and JSON-out. It&#39;s feeling like this =
is coming back around.
<u></u><u></u></p>
<div>
<p class=3D"MsoNormal"><u></u>=C2=A0<u></u></p>
</div>
<div>
<p class=3D"MsoNormal">Pro:<u></u><u></u></p>
</div>
<div>
<p class=3D"MsoNormal">=C2=A0- more REST-ish (particularly if we use real R=
EST style like URL templates and verbs)<u></u><u></u></p>
</div>
<div>
<p class=3D"MsoNormal">=C2=A0- consistent data structures<u></u><u></u></p>
</div>
<div>
<p class=3D"MsoNormal">=C2=A0- possible use of rich client data structures =
like lists and sub-objects<u></u><u></u></p>
</div>
<div>
<p class=3D"MsoNormal"><u></u>=C2=A0<u></u></p>
</div>
<div>
<p class=3D"MsoNormal">Con:<u></u><u></u></p>
</div>
<div>
<p class=3D"MsoNormal">=C2=A0- unlike the rest of OAuth, which is form-in, =
JSON-out<u></u><u></u></p>
</div>
<div>
<p class=3D"MsoNormal">=C2=A0- major change from existing code<u></u><u></u=
></p>
</div>
<div>
<p class=3D"MsoNormal">=C2=A0- possible overhead for existing OAuth librari=
es which haven&#39;t had to deal with JSON from clients<u></u><u></u></p>
</div>
<div>
<p class=3D"MsoNormal"><u></u>=C2=A0<u></u></p>
</div>
<div>
<p class=3D"MsoNormal"><u></u>=C2=A0<u></u></p>
</div>
<div>
<p class=3D"MsoNormal"><u></u>=C2=A0<u></u></p>
</div>
<div>
<p class=3D"MsoNormal">If we&#39;re going to do this, we should dive in wit=
h both feet and define a full RESTful API with all appropriate verbs and CR=
UD ops, and define it at the OAuth DynReg level as well.<u></u><u></u></p>


</div>
<div>
<p class=3D"MsoNormal"><u></u>=C2=A0<u></u></p>
</div>
<div>
<p class=3D"MsoNormal"><u></u>=C2=A0<u></u></p>
</div>
<div>
<p class=3D"MsoNormal">-- Justin<u></u><u></u></p>
</div>
<div>
<p class=3D"MsoNormal"><u></u>=C2=A0<u></u></p>
<div>
<div>
<p class=3D"MsoNormal">On Feb 4, 2013, at 4:25 PM, Mike Jones &lt;<a href=
=3D"mailto:Michael.Jones@microsoft.com" target=3D"_blank">Michael.Jones@mic=
rosoft.com</a>&gt;<u></u><u></u></p>
</div>
<div>
<p class=3D"MsoNormal">=C2=A0wrote:<u></u><u></u></p>
</div>
<p class=3D"MsoNormal"><br>
<br>
<u></u><u></u></p>
<div>
<div>
<p class=3D"MsoNormal"><span style=3D"font-size:11.0pt;font-family:&quot;Ca=
libri&quot;,&quot;sans-serif&quot;">Now that we&#39;re returning the regist=
ration state as JSON, it&#39;s pretty inconsistent for the registration req=
uest to instead be form-url-encoded. The case can be made for switching
 to JSON now - especially in light of possibly wanting to convey some struc=
tured information at registration time.<u></u><u></u></span></p>
</div>
<div>
<p class=3D"MsoNormal"><span style=3D"font-size:11.0pt;font-family:&quot;Ca=
libri&quot;,&quot;sans-serif&quot;">I realize that this is a big change, bu=
t if we&#39;re going to do it, we should do it now.<u></u><u></u></span></p=
>


</div>
<div>
<p class=3D"MsoNormal"><span style=3D"font-size:11.0pt;font-family:&quot;Ca=
libri&quot;,&quot;sans-serif&quot;">As a precedent, apparently SCIM request=
s are JSON, rather than form-url-encoded.<u></u><u></u></span></p>
</div>
<div>
<p class=3D"MsoNormal"><span style=3D"font-size:11.0pt;font-family:&quot;Ca=
libri&quot;,&quot;sans-serif&quot;">=C2=A0<u></u><u></u></span></p>
</div>
<div>
<p class=3D"MsoNormal"><span style=3D"font-size:11.0pt;font-family:&quot;Ca=
libri&quot;,&quot;sans-serif&quot;">=C2=A0=C2=A0=C2=A0=C2=A0=C2=A0=C2=A0=C2=
=A0=C2=A0=C2=A0=C2=A0=C2=A0=C2=A0=C2=A0=C2=A0=C2=A0=C2=A0=C2=A0=C2=A0=C2=A0=
=C2=A0=C2=A0=C2=A0=C2=A0=C2=A0=C2=A0=C2=A0=C2=A0=C2=A0=C2=A0=C2=A0=C2=A0=C2=
=A0=C2=A0=C2=A0=C2=A0=C2=A0=C2=A0=C2=A0=C2=A0=C2=A0=C2=A0=C2=A0=C2=A0=C2=A0=
=C2=A0=C2=A0=C2=A0=C2=A0=C2=A0=C2=A0=C2=A0=C2=A0=C2=A0=C2=A0=C2=A0=C2=A0=C2=
=A0=C2=A0=C2=A0=C2=A0=C2=A0=C2=A0=C2=A0 -- Mike<u></u><u></u></span></p>
</div>
<div>
<p class=3D"MsoNormal"><span style=3D"font-size:11.0pt;font-family:&quot;Ca=
libri&quot;,&quot;sans-serif&quot;">=C2=A0<u></u><u></u></span></p>
</div>
<p class=3D"MsoNormal"><span style=3D"font-size:13.5pt;font-family:&quot;He=
lvetica&quot;,&quot;sans-serif&quot;">_____________________________________=
__________<br>
OAuth mailing list<br>
<a href=3D"mailto:OAuth@ietf.org" target=3D"_blank"><span style=3D"color:pu=
rple">OAuth@ietf.org</span></a><br>
<a href=3D"https://www.ietf.org/mailman/listinfo/oauth" target=3D"_blank"><=
span style=3D"color:purple">https://www.ietf.org/mailman/listinfo/oauth</sp=
an></a><u></u><u></u></span></p>
</div>
</div>
<p class=3D"MsoNormal"><u></u>=C2=A0<u></u></p>
</div>
</div></div></div>
</div>

<br>_______________________________________________<br>
OAuth mailing list<br>
<a href=3D"mailto:OAuth@ietf.org">OAuth@ietf.org</a><br>
<a href=3D"https://www.ietf.org/mailman/listinfo/oauth" target=3D"_blank">h=
ttps://www.ietf.org/mailman/listinfo/oauth</a><br>
<br></blockquote></div><br></div>

--14dae93410d396b92204d4ed189f--

From wmills_92105@yahoo.com  Mon Feb  4 14:30:02 2013
Return-Path: <wmills_92105@yahoo.com>
X-Original-To: oauth@ietfa.amsl.com
Delivered-To: oauth@ietfa.amsl.com
Received: from localhost (localhost [127.0.0.1]) by ietfa.amsl.com (Postfix) with ESMTP id 4E82C21F8B35 for <oauth@ietfa.amsl.com>; Mon,  4 Feb 2013 14:30:02 -0800 (PST)
X-Virus-Scanned: amavisd-new at amsl.com
X-Spam-Flag: NO
X-Spam-Score: -1.762
X-Spam-Level: 
X-Spam-Status: No, score=-1.762 tagged_above=-999 required=5 tests=[AWL=0.836,  BAYES_00=-2.599, HTML_MESSAGE=0.001]
Received: from mail.ietf.org ([64.170.98.30]) by localhost (ietfa.amsl.com [127.0.0.1]) (amavisd-new, port 10024) with ESMTP id OmAawFwXqLpP for <oauth@ietfa.amsl.com>; Mon,  4 Feb 2013 14:30:01 -0800 (PST)
Received: from nm14-vm0.bullet.mail.bf1.yahoo.com (nm14-vm0.bullet.mail.bf1.yahoo.com [98.139.213.164]) by ietfa.amsl.com (Postfix) with SMTP id EABCF21F8B2E for <oauth@ietf.org>; Mon,  4 Feb 2013 14:29:58 -0800 (PST)
Received: from [98.139.212.151] by nm14.bullet.mail.bf1.yahoo.com with NNFMP; 04 Feb 2013 22:29:58 -0000
Received: from [98.139.212.222] by tm8.bullet.mail.bf1.yahoo.com with NNFMP; 04 Feb 2013 22:29:58 -0000
Received: from [127.0.0.1] by omp1031.mail.bf1.yahoo.com with NNFMP; 04 Feb 2013 22:29:58 -0000
X-Yahoo-Newman-Property: ymail-3
X-Yahoo-Newman-Id: 359597.31449.bm@omp1031.mail.bf1.yahoo.com
Received: (qmail 95022 invoked by uid 60001); 4 Feb 2013 22:29:57 -0000
DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=yahoo.com; s=s1024; t=1360016997; bh=KbKXnLx6fTeG7EGQ54HosFPnzKmwgRbOLGlmAk8Dc4I=; h=X-YMail-OSG:Received:X-Rocket-MIMEInfo:X-Mailer:References:Message-ID:Date:From:Reply-To:Subject:To:Cc:In-Reply-To:MIME-Version:Content-Type; b=HtA0Ta6z1Ct2dO/ndE0MCoJnLC0rzJjH3wCdRLOqMlDyVjPAnZMAN2VPvYs43O40ZXmuDjsnoc0+T8qpHdd9g0JM70aCL3Ta0jdXmmenM0oUPPNA4OnnovY4bHleEhUxSWxj6nzun3jVv8JwFhP3yVtyA3yd8ndMWUa4j/l3jkw=
DomainKey-Signature: a=rsa-sha1; q=dns; c=nofws; s=s1024; d=yahoo.com; h=X-YMail-OSG:Received:X-Rocket-MIMEInfo:X-Mailer:References:Message-ID:Date:From:Reply-To:Subject:To:Cc:In-Reply-To:MIME-Version:Content-Type; b=YWvcggdSrHNiN0l2XJeC8d5ib5XlXtk4RXbr+gezVuJVmuyPaaP2tD0afIUuICzJ6q+LjA4wMhQ429RgdzFXhPQaD5YR0QY44ALxdhnuFq3MqjEPIIVmZtVO/rusDgXnDUqIcpNAKQX7HBMdEytkqR1l9dsAOWzRsqUeVnUNQt4=;
X-YMail-OSG: c3P0xcsVM1l.1hwKrL2aUyL14MMB_Pk1.ZP.wd6bNTlupaM WfQGQ0nXNuou2jIoFzw2nxrf1FaBAps5BlJwlSsKbqaIyy0lOIlUAnZZuFWH LNjcgTCK_L8QTcHM0JqKOrbmIuvCNAwAmjbacPABpg8_GUS04T2kZzBe95Il yCjAxZw.GlLP_2Ld3bGY5xC2ut645BHBK6DBXTRDoTPsNiBJMQCuialO5wTz rnjVCvZ5Hmgnp8HcG4yP_gsQSM2_xm_GZCHR6HiDOL2fQdGXCBubTDL7nf4F fKTpjQDH6L9zO1TztV2PLX9CiHBDCN2qfpF7wLg3Of1L5UqY3nogMygeM85Q 90nnIvh8UzqDS2i_qAoE98GLyOIDBMlXostBemDwVuEJ4QDgQ2e68YF0ZFpO BsXfwA3L75zniEO.5dMeqoeeAPBdkA4xPdfqELTNHHUNuZdUZGPeak2r297h GLxkXPNaZMR9Rn_2YyxZk1v1XXAES5n656YmBxj7n1rD9NZAKxWpI7O9NxN4 kj7Ub_fNFDlhRbz9Pb1Szn20Y8I_QltHYrA7TCD4cT68-
Received: from [209.131.62.145] by web31816.mail.mud.yahoo.com via HTTP; Mon, 04 Feb 2013 14:29:56 PST
X-Rocket-MIMEInfo: 001.001, V2UgY2FuIGRvIHRoYXQgdG9vLCBhbmQgSSByYXRoZXIgbGlrZSBpdC4gwqBJIHRob3VnaHQgdGhlcmUgd2FzIGEgYmlnICJkb24ndCBjcm9zcyB0aGUgYmVhbXMiIHdhcm5pbmcgc29tZXdoZXJlIHRob3VnaC4KCi1iaWxsCgoKX19fX19fX19fX19fX19fX19fX19fX19fX19fX19fX18KIEZyb206ICJSaWNoZXIsIEp1c3RpbiBQLiIgPGpyaWNoZXJAbWl0cmUub3JnPgpUbzogV2lsbGlhbSBNaWxscyA8d21pbGxzXzkyMTA1QHlhaG9vLmNvbT4gCkNjOiBPIEF1dGggV0cgPG9hdXRoQGlldGYub3JnPiAKU2VudDoBMAEBAQE-
X-Mailer: YahooMailWebService/0.8.132.503
References: <1360009331.12021.YahooMailNeo@web31801.mail.mud.yahoo.com> <B33BFB58CCC8BE4998958016839DE27E068866EF@IMCMBX01.MITRE.ORG>
Message-ID: <1360016996.80104.YahooMailNeo@web31816.mail.mud.yahoo.com>
Date: Mon, 4 Feb 2013 14:29:56 -0800 (PST)
From: William Mills <wmills_92105@yahoo.com>
To: "Richer, Justin P." <jricher@mitre.org>
In-Reply-To: <B33BFB58CCC8BE4998958016839DE27E068866EF@IMCMBX01.MITRE.ORG>
MIME-Version: 1.0
Content-Type: multipart/alternative; boundary="-1238014912-751286513-1360016996=:80104"
Cc: O Auth WG <oauth@ietf.org>
Subject: Re: [OAUTH-WG] conf call follow up from  today
X-BeenThere: oauth@ietf.org
X-Mailman-Version: 2.1.12
Precedence: list
Reply-To: William Mills <wmills_92105@yahoo.com>
List-Id: OAUTH WG <oauth.ietf.org>
List-Unsubscribe: <https://www.ietf.org/mailman/options/oauth>, <mailto:oauth-request@ietf.org?subject=unsubscribe>
List-Archive: <http://www.ietf.org/mail-archive/web/oauth>
List-Post: <mailto:oauth@ietf.org>
List-Help: <mailto:oauth-request@ietf.org?subject=help>
List-Subscribe: <https://www.ietf.org/mailman/listinfo/oauth>, <mailto:oauth-request@ietf.org?subject=subscribe>
X-List-Received-Date: Mon, 04 Feb 2013 22:30:02 -0000

---1238014912-751286513-1360016996=:80104
Content-Type: text/plain; charset=iso-8859-1
Content-Transfer-Encoding: quoted-printable

We can do that too, and I rather like it. =A0I thought there was a big "don=
't cross the beams" warning somewhere though.=0A=0A-bill=0A=0A=0A__________=
______________________=0A From: "Richer, Justin P." <jricher@mitre.org>=0AT=
o: William Mills <wmills_92105@yahoo.com> =0ACc: O Auth WG <oauth@ietf.org>=
 =0ASent: Monday, February 4, 2013 1:37 PM=0ASubject: Re: [OAUTH-WG] conf c=
all follow up from  today=0A =0A=0AWhat if we define a means to request OAu=
th1 style tokens from an OAuth2 auth/token endpoint, but defer to OAuth1 fo=
r methods of how to use the token at protected resources? =0A=0A=A0-- Justi=
n=0A=0A=0A=0AOn Feb 4, 2013, at 3:22 PM, William Mills <wmills_92105@yahoo.=
com> wrote:=0A=0A1) =A0I think that we need to focus on specific solutions,=
 as I said on the call, and solve the OAuth 1.0a/MAC use case. =A0There's s=
ignificant installed base of OAuth 1.0a and we need a path for those instal=
lations into OAuth 2.0. =A0I may well pursue MAC in the interim to do this,=
 but a full HOK solution woul work too.=0A>=0A>=0A>2) =A0I think the discus=
sion we were having about "which authenticator to use" falls squarely into =
the endpoint discovery discussion and we should put that energy into endpoi=
nt discovery as distinct from HOK.=0A>=0A>=0A>3) =A0We haven't talked yet a=
bout how a client will be able to specify a token type if it wants a specif=
ic one. =A0OAuth 2 core will need to be extended to support this.=0A>=0A>=
=0A>4) =A0We should leave the key distribution/discovery mechanism either o=
ut of scope or define it explicitly per HOK token type profile. =A0This wil=
l have to work with the extensions for #3 above.=0A>=0A>=0A>5) =A0I want to=
 avoid the problem in OAuth 1.0a of having to support and accept every poss=
ible signing mode. =A0Being force to accept PLAINTEXT sucks. =A0We need a w=
ay for the discovery endpoint to mandate a specific set of allowed signatur=
e methods.=0A>=0A>=0A>Regards,=0A>=0A>=0A>-bill=0A>=0A>=0A_________________=
______________________________=0A>OAuth mailing list=0A>OAuth@ietf.org=0A>h=
ttps://www.ietf.org/mailman/listinfo/oauth=0A>
---1238014912-751286513-1360016996=:80104
Content-Type: text/html; charset=iso-8859-1
Content-Transfer-Encoding: quoted-printable

<html><body><div style=3D"color:#000; background-color:#fff; font-family:Co=
urier New, courier, monaco, monospace, sans-serif;font-size:12pt"><div><spa=
n>We can do that too, and I rather like it. &nbsp;I thought there was a big=
 "don't cross the beams" warning somewhere though.</span></div><div><br></d=
iv><div style=3D"color: rgb(0, 0, 0); font-size: 16px; font-family: 'Courie=
r New', courier, monaco, monospace, sans-serif; background-color: transpare=
nt; font-style: normal;">-bill</div><div style=3D"color: rgb(0, 0, 0); font=
-size: 16px; font-family: 'Courier New', courier, monaco, monospace, sans-s=
erif; background-color: transparent; font-style: normal;"><br></div>  <div =
style=3D"font-family: 'Courier New', courier, monaco, monospace, sans-serif=
; font-size: 12pt;"> <div style=3D"font-family: 'times new roman', 'new yor=
k', times, serif; font-size: 12pt;"> <div dir=3D"ltr"> <font size=3D"2" fac=
e=3D"Arial"> <hr size=3D"1">  <b><span style=3D"font-weight:bold;">From:</s=
pan></b>
 "Richer, Justin P." &lt;jricher@mitre.org&gt;<br> <b><span style=3D"font-w=
eight: bold;">To:</span></b> William Mills &lt;wmills_92105@yahoo.com&gt; <=
br><b><span style=3D"font-weight: bold;">Cc:</span></b> O Auth WG &lt;oauth=
@ietf.org&gt; <br> <b><span style=3D"font-weight: bold;">Sent:</span></b> M=
onday, February 4, 2013 1:37 PM<br> <b><span style=3D"font-weight: bold;">S=
ubject:</span></b> Re: [OAUTH-WG] conf call follow up from  today<br> </fon=
t> </div> <br>=0A<div id=3D"yiv596592942">=0A=0A =0A=0A<div>=0AWhat if we d=
efine a means to request OAuth1 style tokens from an OAuth2 auth/token endp=
oint, but defer to OAuth1 for methods of how to use the token at protected =
resources?=0A<div><br>=0A</div>=0A<div>&nbsp;-- Justin<br>=0A<div><br>=0A<d=
iv>=0A<div>On Feb 4, 2013, at 3:22 PM, William Mills &lt;<a rel=3D"nofollow=
" ymailto=3D"mailto:wmills_92105@yahoo.com" target=3D"_blank" href=3D"mailt=
o:wmills_92105@yahoo.com">wmills_92105@yahoo.com</a>&gt; wrote:</div>=0A<br=
 class=3D"yiv596592942Apple-interchange-newline">=0A<blockquote type=3D"cit=
e">=0A<div>=0A<div style=3D"background-color: rgb(255, 255, 255); font-fami=
ly: 'Courier New', courier, monaco, monospace, sans-serif; font-size: 12pt;=
">=0A<div>1) &nbsp;I think that we need to focus on specific solutions, as =
I said on the call, and solve the OAuth 1.0a/MAC use case. &nbsp;There's si=
gnificant installed base of OAuth 1.0a and we need a path for those install=
ations into OAuth 2.0. &nbsp;I may well pursue MAC in=0A the interim to do =
this, but a full HOK solution woul work too.</div>=0A<div><br>=0A</div>=0A<=
div style=3D"font-size: 16px; font-family: 'Courier New', courier, monaco, =
monospace, sans-serif; background-color: transparent; font-style: normal;">=
=0A2) &nbsp;I think the discussion we were having about "which authenticato=
r to use" falls squarely into the endpoint discovery discussion and we shou=
ld put that energy into endpoint discovery as distinct from HOK.</div>=0A<d=
iv style=3D"font-size: 16px; font-family: 'Courier New', courier, monaco, m=
onospace, sans-serif; background-color: transparent; font-style: normal;">=
=0A<br>=0A</div>=0A<div style=3D"font-size: 16px; font-family: 'Courier New=
', courier, monaco, monospace, sans-serif; background-color: transparent; f=
ont-style: normal;">=0A3) &nbsp;We haven't talked yet about how a client wi=
ll be able to specify a token type if it wants a specific one. &nbsp;OAuth =
2 core will need to be extended to support this.</div>=0A<div style=3D"font=
-size: 16px; font-family: 'Courier New', courier, monaco, monospace, sans-s=
erif; background-color: transparent; font-style: normal;">=0A<br>=0A</div>=
=0A<div style=3D"font-size: 16px; font-family: 'Courier New', courier, mona=
co, monospace, sans-serif; background-color: transparent; font-style: norma=
l;">=0A4) &nbsp;We should leave the key distribution/discovery mechanism ei=
ther out of scope or define it explicitly per HOK token type profile. &nbsp=
;This will have to work with the extensions for #3 above.</div>=0A<div styl=
e=3D"font-size: 16px; font-family: 'Courier New', courier, monaco, monospac=
e, sans-serif; background-color: transparent; font-style: normal;">=0A<br>=
=0A</div>=0A<div style=3D"font-size: 16px; font-family: 'Courier New', cour=
ier, monaco, monospace, sans-serif; background-color: transparent; font-sty=
le: normal;">=0A5) &nbsp;I want to avoid the problem in OAuth 1.0a of havin=
g to support and accept every possible signing mode. &nbsp;Being force to a=
ccept PLAINTEXT sucks. &nbsp;We need a way for the discovery endpoint to ma=
ndate a specific set of allowed signature methods.</div>=0A<div style=3D"fo=
nt-size: 16px; font-family: 'Courier New', courier, monaco, monospace, sans=
-serif; background-color: transparent; font-style: normal;">=0A<br>=0A</div=
>=0A<div style=3D"font-size: 16px; font-family: 'Courier New', courier, mon=
aco, monospace, sans-serif; background-color: transparent; font-style: norm=
al;">=0ARegards,</div>=0A<div style=3D"font-size: 16px; font-family: 'Couri=
er New', courier, monaco, monospace, sans-serif; background-color: transpar=
ent; font-style: normal;">=0A<br>=0A</div>=0A<div style=3D"font-size: 16px;=
 font-family: 'Courier New', courier, monaco, monospace, sans-serif; backgr=
ound-color: transparent; font-style: normal;">=0A-bill</div>=0A<div style=
=3D"font-size: 16px; font-family: 'Courier New', courier, monaco, monospace=
, sans-serif; background-color: transparent; font-style: normal;">=0A<br>=
=0A</div>=0A</div>=0A</div>=0A_____________________________________________=
__<br>=0AOAuth mailing list<br>=0A<a rel=3D"nofollow" ymailto=3D"mailto:OAu=
th@ietf.org" target=3D"_blank" href=3D"mailto:OAuth@ietf.org">OAuth@ietf.or=
g</a><br>=0Ahttps://www.ietf.org/mailman/listinfo/oauth<br>=0A</blockquote>=
=0A</div>=0A<br>=0A</div>=0A</div>=0A</div>=0A=0A</div><br><br> </div> </di=
v>  </div></body></html>
---1238014912-751286513-1360016996=:80104--

From ve7jtb@ve7jtb.com  Mon Feb  4 14:49:48 2013
Return-Path: <ve7jtb@ve7jtb.com>
X-Original-To: oauth@ietfa.amsl.com
Delivered-To: oauth@ietfa.amsl.com
Received: from localhost (localhost [127.0.0.1]) by ietfa.amsl.com (Postfix) with ESMTP id 817D721F8B3F for <oauth@ietfa.amsl.com>; Mon,  4 Feb 2013 14:49:48 -0800 (PST)
X-Virus-Scanned: amavisd-new at amsl.com
X-Spam-Flag: NO
X-Spam-Score: -3.598
X-Spam-Level: 
X-Spam-Status: No, score=-3.598 tagged_above=-999 required=5 tests=[BAYES_00=-2.599, HTML_MESSAGE=0.001, RCVD_IN_DNSWL_LOW=-1]
Received: from mail.ietf.org ([64.170.98.30]) by localhost (ietfa.amsl.com [127.0.0.1]) (amavisd-new, port 10024) with ESMTP id iFJzSpYGTL-R for <oauth@ietfa.amsl.com>; Mon,  4 Feb 2013 14:49:47 -0800 (PST)
Received: from mail-pa0-f46.google.com (mail-pa0-f46.google.com [209.85.220.46]) by ietfa.amsl.com (Postfix) with ESMTP id 71FBB21F8B47 for <oauth@ietf.org>; Mon,  4 Feb 2013 14:49:47 -0800 (PST)
Received: by mail-pa0-f46.google.com with SMTP id kp14so3611397pab.19 for <oauth@ietf.org>; Mon, 04 Feb 2013 14:49:42 -0800 (PST)
X-Google-DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=google.com; s=20120113; h=x-received:content-type:mime-version:subject:from:in-reply-to:date :cc:message-id:references:to:x-mailer:x-gm-message-state; bh=3ntJbll0j7k5XCVBjs7Ve3x0wCfbFu2j9trADySSx7M=; b=TgX2jKsU0MPIFLuCweS1ZkhkPB2YzPLQ7JfCpyNrSKd8A0m754cg9YW5BWBX0lib2B yCDVJd2rcaEpEleqUoaAJeVGcRnlf+AGF17eLQU/tpIqz4QEITe51mNL9t8WycMWOd+k cmffD5QjlJHvK5mFQRYDaILZEySXxkvAtDwhzUmc2MeowIFjIRn/I4RgUleMc1OfZHDD d8aV8pxl7WFN7uHySKFOs9xh3Ee99qTc54peCiPkmIl+YXUs29z0r/ggzindd88+aXGq LxErYWe6NRx+QDyxLkpjXjVcQbj+h3QXkcQfS+jH7QD7/8G7fvG4rOC0mBeWzdevQ0j0 QiYg==
X-Received: by 10.66.79.135 with SMTP id j7mr33831394pax.0.1360018181890; Mon, 04 Feb 2013 14:49:41 -0800 (PST)
Received: from dhcp50-95-212-134.hil-phxpphs.phx.wayport.net (dhcp50-95-212-134.hil-phxpphs.phx.wayport.net. [50.95.212.134]) by mx.google.com with ESMTPS id az8sm24450853pab.3.2013.02.04.14.49.28 (version=TLSv1 cipher=ECDHE-RSA-RC4-SHA bits=128/128); Mon, 04 Feb 2013 14:49:32 -0800 (PST)
Content-Type: multipart/alternative; boundary="Apple-Mail=_C49CAA19-4EE8-476A-9DA5-86B984C0287E"
Mime-Version: 1.0 (Mac OS X Mail 6.2 \(1499\))
From: John Bradley <ve7jtb@ve7jtb.com>
In-Reply-To: <CA+ZpN26np0h+wkv5vJeSofCpVi3cwxaiDaOj0aWn3bGuw29D0A@mail.gmail.com>
Date: Mon, 4 Feb 2013 15:49:20 -0700
Message-Id: <72121AC2-D597-4C93-9BFC-D4A4B356B9A9@ve7jtb.com>
References: <4E1F6AAD24975D4BA5B1680429673943674111BE@TK5EX14MBXC284.redmond.corp.microsoft.com> <B33BFB58CCC8BE4998958016839DE27E068866A0@IMCMBX01.MITRE.ORG> <4E1F6AAD24975D4BA5B168042967394367411337@TK5EX14MBXC284.redmond.corp.microsoft.com> <CA+ZpN26np0h+wkv5vJeSofCpVi3cwxaiDaOj0aWn3bGuw29D0A@mail.gmail.com>
To: Tim Bray <twbray@google.com>
X-Mailer: Apple Mail (2.1499)
X-Gm-Message-State: ALoCoQnZJzvC8M+DDbPo/LPnpjlyUY6edS7kaOSR6fG4G/OFJXOH8MrVYbZiVU3/Y8ZhW8n6SA1O
Cc: "oauth@ietf.org" <oauth@ietf.org>
Subject: Re: [OAUTH-WG] Should registration request be form-urlencoded or JSON?
X-BeenThere: oauth@ietf.org
X-Mailman-Version: 2.1.12
Precedence: list
List-Id: OAUTH WG <oauth.ietf.org>
List-Unsubscribe: <https://www.ietf.org/mailman/options/oauth>, <mailto:oauth-request@ietf.org?subject=unsubscribe>
List-Archive: <http://www.ietf.org/mail-archive/web/oauth>
List-Post: <mailto:oauth@ietf.org>
List-Help: <mailto:oauth-request@ietf.org?subject=help>
List-Subscribe: <https://www.ietf.org/mailman/listinfo/oauth>, <mailto:oauth-request@ietf.org?subject=subscribe>
X-List-Received-Date: Mon, 04 Feb 2013 22:49:48 -0000

--Apple-Mail=_C49CAA19-4EE8-476A-9DA5-86B984C0287E
Content-Transfer-Encoding: quoted-printable
Content-Type: text/plain;
	charset=windows-1252

For debugging JSON is cleaner than form encoded.  I hate faking arrays =
with space separated list (yes like scopes).

It is the way it is to be consistent with OAuth.

I think that should be a separate issue from url templates etc.

John=20

On 2013-02-04, at 2:51 PM, Tim Bray <twbray@google.com> wrote:

> =46rom the point of view of developer experience, meh, the degree of =
difficulty of generating/parsing JSON & form/url is about the same.
>=20
> JSON has the advantage that it forces you to use UTF-8, and is more =
pleasant to debug when things get weird.
>=20
> For my money, anything that forces anyone to use UTF-8 is A Good =
Thing.  -T
>=20
> On Mon, Feb 4, 2013 at 1:46 PM, Mike Jones =
<Michael.Jones@microsoft.com> wrote:
> I=92m not proposing that we boil the ocean.  =93Diving in with both =
feet and define a full RESTful API with all appropriate verbs and CRUD =
ops=94 is an almost sure way to build a complicated spec, most of which =
isn=92t needed, and to have it take a long time.
>=20
> =20
>=20
> Everything in the current OpenID Registration spec is motivated by an =
actual use case.  Stuff that isn=92t isn=92t in the spec.  That=92s =
nearly true of the closely-related OAuth Registration spec, with what I =
believe to be a few exceptions.  (Yes, we should harmonize those =
differences =96 hopefully based upon real use cases.)
>=20
> =20
>=20
> I was only proposing that we answer the single question of whether =
we=92re using the right input format or not.  I hope we can keep the =
discussion to that topic and not use it to generate a passel of new work =
items as a side effect.
>=20
> =20
>=20
>                                                                 -- =
Mike
>=20
> =20
>=20
> From: Richer, Justin P. [mailto:jricher@mitre.org]=20
> Sent: Monday, February 04, 2013 1:34 PM
> To: Mike Jones
> Cc: oauth@ietf.org
> Subject: Re: [OAUTH-WG] Should registration request be form-urlencoded =
or JSON?
>=20
> =20
>=20
> For history, the original UMA registration spec from whence this all =
grew was JSON-in and JSON-out. It's feeling like this is coming back =
around.
>=20
> =20
>=20
> Pro:
>=20
>  - more REST-ish (particularly if we use real REST style like URL =
templates and verbs)
>=20
>  - consistent data structures
>=20
>  - possible use of rich client data structures like lists and =
sub-objects
>=20
> =20
>=20
> Con:
>=20
>  - unlike the rest of OAuth, which is form-in, JSON-out
>=20
>  - major change from existing code
>=20
>  - possible overhead for existing OAuth libraries which haven't had to =
deal with JSON from clients
>=20
> =20
>=20
> =20
>=20
> =20
>=20
> If we're going to do this, we should dive in with both feet and define =
a full RESTful API with all appropriate verbs and CRUD ops, and define =
it at the OAuth DynReg level as well.
>=20
> =20
>=20
> =20
>=20
> -- Justin
>=20
> =20
>=20
> On Feb 4, 2013, at 4:25 PM, Mike Jones <Michael.Jones@microsoft.com>
>=20
>  wrote:
>=20
>=20
>=20
>=20
> Now that we're returning the registration state as JSON, it's pretty =
inconsistent for the registration request to instead be =
form-url-encoded. The case can be made for switching to JSON now - =
especially in light of possibly wanting to convey some structured =
information at registration time.
>=20
> I realize that this is a big change, but if we're going to do it, we =
should do it now.
>=20
> As a precedent, apparently SCIM requests are JSON, rather than =
form-url-encoded.
>=20
> =20
>=20
>                                                                 -- =
Mike
>=20
> =20
>=20
> _______________________________________________
> OAuth mailing list
> OAuth@ietf.org
> https://www.ietf.org/mailman/listinfo/oauth
>=20
> =20
>=20
>=20
> _______________________________________________
> OAuth mailing list
> OAuth@ietf.org
> https://www.ietf.org/mailman/listinfo/oauth
>=20
>=20
> _______________________________________________
> OAuth mailing list
> OAuth@ietf.org
> https://www.ietf.org/mailman/listinfo/oauth


--Apple-Mail=_C49CAA19-4EE8-476A-9DA5-86B984C0287E
Content-Transfer-Encoding: quoted-printable
Content-Type: text/html;
	charset=windows-1252

<html><head><meta http-equiv=3D"Content-Type" content=3D"text/html =
charset=3Dwindows-1252"></head><body style=3D"word-wrap: break-word; =
-webkit-nbsp-mode: space; -webkit-line-break: after-white-space; ">For =
debugging JSON is cleaner than form encoded. &nbsp;I hate faking arrays =
with space separated list (yes like scopes).<div><br></div><div>It is =
the way it is to be consistent with OAuth.</div><div><br></div><div>I =
think that should be a separate issue from url templates =
etc.</div><div><br></div><div>John&nbsp;</div><div><br><div><div>On =
2013-02-04, at 2:51 PM, Tim Bray &lt;<a =
href=3D"mailto:twbray@google.com">twbray@google.com</a>&gt; =
wrote:</div><br class=3D"Apple-interchange-newline"><blockquote =
type=3D"cite">=46rom the point of view of developer experience, meh, the =
degree of difficulty of generating/parsing JSON &amp; form/url is about =
the same.<div><br></div><div>JSON has the advantage that it forces you =
to use UTF-8, and is more pleasant to debug when things get weird.</div>

<div><br></div><div>For my money, anything that forces anyone to use =
UTF-8 is A Good Thing. &nbsp;-T<br><br><div class=3D"gmail_quote">On =
Mon, Feb 4, 2013 at 1:46 PM, Mike Jones <span dir=3D"ltr">&lt;<a =
href=3D"mailto:Michael.Jones@microsoft.com" =
target=3D"_blank">Michael.Jones@microsoft.com</a>&gt;</span> wrote:<br>

<blockquote class=3D"gmail_quote" style=3D"margin:0 0 0 =
.8ex;border-left:1px #ccc solid;padding-left:1ex">





<div lang=3D"EN-US" link=3D"blue" vlink=3D"purple">
<div><p class=3D"MsoNormal"><span =
style=3D"font-size:11.0pt;font-family:&quot;Calibri&quot;,&quot;sans-serif=
&quot;;color:#1f497d">I=92m not proposing that we boil the ocean.&nbsp; =
=93</span>Diving in with both feet and define a full RESTful API with =
all appropriate verbs and CRUD ops<span =
style=3D"font-size:11.0pt;font-family:&quot;Calibri&quot;,&quot;sans-serif=
&quot;;color:#1f497d">=94
 is an almost sure way to build a complicated spec, most of which isn=92t =
needed, and to have it take a long time.<u></u><u></u></span></p><p =
class=3D"MsoNormal"><span =
style=3D"font-size:11.0pt;font-family:&quot;Calibri&quot;,&quot;sans-serif=
&quot;;color:#1f497d"><u></u>&nbsp;<u></u></span></p><p =
class=3D"MsoNormal"><span =
style=3D"font-size:11.0pt;font-family:&quot;Calibri&quot;,&quot;sans-serif=
&quot;;color:#1f497d">Everything in the current OpenID Registration spec =
is motivated by an actual use case.&nbsp; Stuff that isn=92t isn=92t in =
the spec.&nbsp; That=92s nearly true of the closely-related
 OAuth Registration spec, with what I believe to be a few =
exceptions.&nbsp; (Yes, we should harmonize those differences =96 =
hopefully based upon real use cases.)<u></u><u></u></span></p><p =
class=3D"MsoNormal"><span =
style=3D"font-size:11.0pt;font-family:&quot;Calibri&quot;,&quot;sans-serif=
&quot;;color:#1f497d"><u></u>&nbsp;<u></u></span></p><p =
class=3D"MsoNormal"><span =
style=3D"font-size:11.0pt;font-family:&quot;Calibri&quot;,&quot;sans-serif=
&quot;;color:#1f497d">I was only proposing that we answer the single =
question of whether we=92re using the right input format or not.&nbsp; I =
hope we can keep the discussion to that topic
 and not use it to generate a passel of new work items as a side =
effect.<u></u><u></u></span></p><p class=3D"MsoNormal"><span =
style=3D"font-size:11.0pt;font-family:&quot;Calibri&quot;,&quot;sans-serif=
&quot;;color:#1f497d"><u></u>&nbsp;<u></u></span></p><p =
class=3D"MsoNormal"><span =
style=3D"font-size:11.0pt;font-family:&quot;Calibri&quot;,&quot;sans-serif=
&quot;;color:#1f497d">&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbs=
p;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;=
&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&n=
bsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbs=
p;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;=
&nbsp;&nbsp;&nbsp;&nbsp;&nbsp; -- Mike<u></u><u></u></span></p><p =
class=3D"MsoNormal"><span =
style=3D"font-size:11.0pt;font-family:&quot;Calibri&quot;,&quot;sans-serif=
&quot;;color:#1f497d"><u></u>&nbsp;<u></u></span></p>
<div>
<div style=3D"border:none;border-top:solid #b5c4df 1.0pt;padding:3.0pt =
0in 0in 0in"><p class=3D"MsoNormal"><b><span =
style=3D"font-size:10.0pt;font-family:&quot;Tahoma&quot;,&quot;sans-serif&=
quot;">From:</span></b><span =
style=3D"font-size:10.0pt;font-family:&quot;Tahoma&quot;,&quot;sans-serif&=
quot;"> Richer, Justin P. [mailto:<a href=3D"mailto:jricher@mitre.org" =
target=3D"_blank">jricher@mitre.org</a>]
<br>
<b>Sent:</b> Monday, February 04, 2013 1:34 PM<br>
<b>To:</b> Mike Jones<br>
<b>Cc:</b> <a href=3D"mailto:oauth@ietf.org" =
target=3D"_blank">oauth@ietf.org</a><br>
<b>Subject:</b> Re: [OAUTH-WG] Should registration request be =
form-urlencoded or JSON?<u></u><u></u></span></p>
</div>
</div><div><div class=3D"h5"><p =
class=3D"MsoNormal"><u></u>&nbsp;<u></u></p><p class=3D"MsoNormal">For =
history, the original UMA registration spec from whence this all grew =
was JSON-in and JSON-out. It's feeling like this is coming back around.
<u></u><u></u></p>
<div><p class=3D"MsoNormal"><u></u>&nbsp;<u></u></p>
</div>
<div><p class=3D"MsoNormal">Pro:<u></u><u></u></p>
</div>
<div><p class=3D"MsoNormal">&nbsp;- more REST-ish (particularly if we =
use real REST style like URL templates and verbs)<u></u><u></u></p>
</div>
<div><p class=3D"MsoNormal">&nbsp;- consistent data =
structures<u></u><u></u></p>
</div>
<div><p class=3D"MsoNormal">&nbsp;- possible use of rich client data =
structures like lists and sub-objects<u></u><u></u></p>
</div>
<div><p class=3D"MsoNormal"><u></u>&nbsp;<u></u></p>
</div>
<div><p class=3D"MsoNormal">Con:<u></u><u></u></p>
</div>
<div><p class=3D"MsoNormal">&nbsp;- unlike the rest of OAuth, which is =
form-in, JSON-out<u></u><u></u></p>
</div>
<div><p class=3D"MsoNormal">&nbsp;- major change from existing =
code<u></u><u></u></p>
</div>
<div><p class=3D"MsoNormal">&nbsp;- possible overhead for existing OAuth =
libraries which haven't had to deal with JSON from =
clients<u></u><u></u></p>
</div>
<div><p class=3D"MsoNormal"><u></u>&nbsp;<u></u></p>
</div>
<div><p class=3D"MsoNormal"><u></u>&nbsp;<u></u></p>
</div>
<div><p class=3D"MsoNormal"><u></u>&nbsp;<u></u></p>
</div>
<div><p class=3D"MsoNormal">If we're going to do this, we should dive in =
with both feet and define a full RESTful API with all appropriate verbs =
and CRUD ops, and define it at the OAuth DynReg level as =
well.<u></u><u></u></p>


</div>
<div><p class=3D"MsoNormal"><u></u>&nbsp;<u></u></p>
</div>
<div><p class=3D"MsoNormal"><u></u>&nbsp;<u></u></p>
</div>
<div><p class=3D"MsoNormal">-- Justin<u></u><u></u></p>
</div>
<div><p class=3D"MsoNormal"><u></u>&nbsp;<u></u></p>
<div>
<div><p class=3D"MsoNormal">On Feb 4, 2013, at 4:25 PM, Mike Jones =
&lt;<a href=3D"mailto:Michael.Jones@microsoft.com" =
target=3D"_blank">Michael.Jones@microsoft.com</a>&gt;<u></u><u></u></p>
</div>
<div><p class=3D"MsoNormal">&nbsp;wrote:<u></u><u></u></p>
</div><p class=3D"MsoNormal"><br>
<br>
<u></u><u></u></p>
<div>
<div><p class=3D"MsoNormal"><span =
style=3D"font-size:11.0pt;font-family:&quot;Calibri&quot;,&quot;sans-serif=
&quot;">Now that we're returning the registration state as JSON, it's =
pretty inconsistent for the registration request to instead be =
form-url-encoded. The case can be made for switching
 to JSON now - especially in light of possibly wanting to convey some =
structured information at registration time.<u></u><u></u></span></p>
</div>
<div><p class=3D"MsoNormal"><span =
style=3D"font-size:11.0pt;font-family:&quot;Calibri&quot;,&quot;sans-serif=
&quot;">I realize that this is a big change, but if we're going to do =
it, we should do it now.<u></u><u></u></span></p>


</div>
<div><p class=3D"MsoNormal"><span =
style=3D"font-size:11.0pt;font-family:&quot;Calibri&quot;,&quot;sans-serif=
&quot;">As a precedent, apparently SCIM requests are JSON, rather than =
form-url-encoded.<u></u><u></u></span></p>
</div>
<div><p class=3D"MsoNormal"><span =
style=3D"font-size:11.0pt;font-family:&quot;Calibri&quot;,&quot;sans-serif=
&quot;">&nbsp;<u></u><u></u></span></p>
</div>
<div><p class=3D"MsoNormal"><span =
style=3D"font-size:11.0pt;font-family:&quot;Calibri&quot;,&quot;sans-serif=
&quot;">&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;=
&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&n=
bsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbs=
p;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;=
&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&n=
bsp;&nbsp;&nbsp; -- Mike<u></u><u></u></span></p>
</div>
<div><p class=3D"MsoNormal"><span =
style=3D"font-size:11.0pt;font-family:&quot;Calibri&quot;,&quot;sans-serif=
&quot;">&nbsp;<u></u><u></u></span></p>
</div><p class=3D"MsoNormal"><span =
style=3D"font-size:13.5pt;font-family:&quot;Helvetica&quot;,&quot;sans-ser=
if&quot;">_______________________________________________<br>
OAuth mailing list<br>
<a href=3D"mailto:OAuth@ietf.org" target=3D"_blank"><span =
style=3D"color:purple">OAuth@ietf.org</span></a><br>
<a href=3D"https://www.ietf.org/mailman/listinfo/oauth" =
target=3D"_blank"><span =
style=3D"color:purple">https://www.ietf.org/mailman/listinfo/oauth</span><=
/a><u></u><u></u></span></p>
</div>
</div><p class=3D"MsoNormal"><u></u>&nbsp;<u></u></p>
</div>
</div></div></div>
</div>

<br>_______________________________________________<br>
OAuth mailing list<br>
<a href=3D"mailto:OAuth@ietf.org">OAuth@ietf.org</a><br>
<a href=3D"https://www.ietf.org/mailman/listinfo/oauth" =
target=3D"_blank">https://www.ietf.org/mailman/listinfo/oauth</a><br>
<br></blockquote></div><br></div>
_______________________________________________<br>OAuth mailing =
list<br><a =
href=3D"mailto:OAuth@ietf.org">OAuth@ietf.org</a><br>https://www.ietf.org/=
mailman/listinfo/oauth<br></blockquote></div><br></div></body></html>=

--Apple-Mail=_C49CAA19-4EE8-476A-9DA5-86B984C0287E--

From olds@rbcon.com  Mon Feb  4 23:42:25 2013
Return-Path: <olds@rbcon.com>
X-Original-To: oauth@ietfa.amsl.com
Delivered-To: oauth@ietfa.amsl.com
Received: from localhost (localhost [127.0.0.1]) by ietfa.amsl.com (Postfix) with ESMTP id C664821F858C for <oauth@ietfa.amsl.com>; Mon,  4 Feb 2013 23:42:25 -0800 (PST)
X-Virus-Scanned: amavisd-new at amsl.com
X-Spam-Flag: NO
X-Spam-Score: -103.598
X-Spam-Level: 
X-Spam-Status: No, score=-103.598 tagged_above=-999 required=5 tests=[BAYES_00=-2.599, HTML_MESSAGE=0.001, RCVD_IN_DNSWL_LOW=-1, USER_IN_WHITELIST=-100]
Received: from mail.ietf.org ([64.170.98.30]) by localhost (ietfa.amsl.com [127.0.0.1]) (amavisd-new, port 10024) with ESMTP id Z5KSdVAsUOb1 for <oauth@ietfa.amsl.com>; Mon,  4 Feb 2013 23:42:24 -0800 (PST)
Received: from mail-pa0-f46.google.com (mail-pa0-f46.google.com [209.85.220.46]) by ietfa.amsl.com (Postfix) with ESMTP id D896321F8545 for <oauth@ietf.org>; Mon,  4 Feb 2013 23:42:24 -0800 (PST)
Received: by mail-pa0-f46.google.com with SMTP id kp14so3880960pab.33 for <oauth@ietf.org>; Mon, 04 Feb 2013 23:42:21 -0800 (PST)
X-Google-DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=google.com; s=20120113; h=x-received:sender:message-id:date:from:user-agent:mime-version:to :subject:references:in-reply-to:content-type:x-gm-message-state; bh=lhcK2l2+GEDpqAmg4HDYx6i/Z21YuVE+ypSCJmfb1iM=; b=IDuFluslYU1jfjLT5l+R3pU3SVzi01BSLd8OF0a3UCopMHGlnjdCd1O4qC3V8ytbLZ Gt0YnPg8UwaYl23tUKO3z3kydj83e+8pUUR4jD2hm7smLO8XIfyxrAizKYHK3KsBImzx 562o8ixjqGiwWYY/GaaJ+MLCTvJCUh0W3dEUCuZhOJ0Oc+OWcbI3FmyM3JTAb/2Wz/51 PahvVtJ4mmm4gre4jbB6XMzqVvocX3zZoZj2HgD2vq4XPsinNZS39waKuGU+J0GcDA69 pWtNnKmjDRI/05f4X3Z7+5q38K0XcfBhaxaZ3KyS5fvcUudvZp+ZdQhfnrVYSgDcPfkl evKQ==
X-Received: by 10.66.85.103 with SMTP id g7mr61613392paz.45.1360050141134; Mon, 04 Feb 2013 23:42:21 -0800 (PST)
Received: from ?IPv6:2601:9:5800:33:19c1:68d9:cdbc:9b13? ([2601:9:5800:33:19c1:68d9:cdbc:9b13]) by mx.google.com with ESMTPS id f9sm27299271paz.12.2013.02.04.23.42.19 (version=TLSv1 cipher=ECDHE-RSA-RC4-SHA bits=128/128); Mon, 04 Feb 2013 23:42:20 -0800 (PST)
Sender: Dale Olds <olds@rbcon.com>
Message-ID: <5110B7D9.1000001@vmware.com>
Date: Mon, 04 Feb 2013 23:42:17 -0800
From: Dale Olds <olds@vmware.com>
User-Agent: Mozilla/5.0 (X11; Linux x86_64; rv:17.0) Gecko/20130106 Thunderbird/17.0.2
MIME-Version: 1.0
To: oauth@ietf.org
References: <4E1F6AAD24975D4BA5B1680429673943674111BE@TK5EX14MBXC284.redmond.corp.microsoft.com> <B33BFB58CCC8BE4998958016839DE27E068866BF@IMCMBX01.MITRE.ORG>
In-Reply-To: <B33BFB58CCC8BE4998958016839DE27E068866BF@IMCMBX01.MITRE.ORG>
Content-Type: multipart/alternative; boundary="------------070200080302040601020608"
X-Gm-Message-State: ALoCoQkCf51RV7sMKYmgg84fvKgJVKSXp0NELqD/Z8yI3OqzPyMTxDkKNvvIHVo4P5XTkBF4bTP2
Subject: Re: [OAUTH-WG] Should registration request be form-urlencoded or JSON?
X-BeenThere: oauth@ietf.org
X-Mailman-Version: 2.1.12
Precedence: list
List-Id: OAUTH WG <oauth.ietf.org>
List-Unsubscribe: <https://www.ietf.org/mailman/options/oauth>, <mailto:oauth-request@ietf.org?subject=unsubscribe>
List-Archive: <http://www.ietf.org/mail-archive/web/oauth>
List-Post: <mailto:oauth@ietf.org>
List-Help: <mailto:oauth-request@ietf.org?subject=help>
List-Subscribe: <https://www.ietf.org/mailman/listinfo/oauth>, <mailto:oauth-request@ietf.org?subject=subscribe>
X-List-Received-Date: Tue, 05 Feb 2013 07:42:25 -0000

This is a multi-part message in MIME format.
--------------070200080302040601020608
Content-Type: text/plain; charset=ISO-8859-1; format=flowed
Content-Transfer-Encoding: 7bit

Rather surprised (and pleased) to see a reference to the UAA here, but I 
would like to make a quick clarification.

Justin, I think we concluded that what the UAA is doing is static client 
registration via SCIM extensions, not dynamic client registrations. The 
UAA has been serving OAuth2 and SCIM requests in the cloudfoundry.com 
PaaS for over a year now -- there was no client registration standard at 
that time, and SCIM provides what we need.

I agree with your point that we should not invent unnecessary standards, 
and SCIM is working quite well for us in combination with OAuth2 for 
static client registrations. That said, I expect we will have a future 
need for dynamic client registrations and that there may be some 
significant differences.

And my preference would also be json in and json out.

--Dale

On 02/04/2013 01:35 PM, Richer, Justin P. wrote:
> Additionally:
>
> This begs the question, why not just do SCIM here? CloudFoundry's UAA 
> has a SCIM class for OAuth clients that they use for dynamic 
> registration today.
>
>  -- Justin
>
>
> On Feb 4, 2013, at 4:25 PM, Mike Jones <Michael.Jones@microsoft.com 
> <mailto:Michael.Jones@microsoft.com>>
>  wrote:
>
>> Now that we're returning the registration state as JSON, it's pretty 
>> inconsistent for the registration request to instead be 
>> form-url-encoded. The case can be made for switching to JSON now - 
>> especially in light of possibly wanting to convey some structured 
>> information at registration time.
>> I realize that this is a big change, but if we're going to do it, we 
>> should do it now.
>> As a precedent, apparently SCIM requests are JSON, rather than 
>> form-url-encoded.
>> -- Mike
>> _______________________________________________
>> OAuth mailing list
>> OAuth@ietf.org <mailto:OAuth@ietf.org>
>> https://www.ietf.org/mailman/listinfo/oauth
>
>
>
> _______________________________________________
> OAuth mailing list
> OAuth@ietf.org
> https://www.ietf.org/mailman/listinfo/oauth


--------------070200080302040601020608
Content-Type: text/html; charset=ISO-8859-1
Content-Transfer-Encoding: 7bit

<html>
  <head>
    <meta content="text/html; charset=ISO-8859-1"
      http-equiv="Content-Type">
  </head>
  <body text="#000000" bgcolor="#FFFFFF">
    Rather surprised (and pleased) to see a reference to the UAA here,
    but I would like to make a quick clarification.<br>
    <br>
    Justin, I think we concluded that what the UAA is doing is static
    client registration via SCIM extensions, not dynamic client
    registrations. The UAA has been serving OAuth2 and SCIM requests in
    the cloudfoundry.com PaaS for over a year now -- there was no client
    registration standard at that time, and SCIM provides what we need.
    <br>
    <br>
    I agree with your point that we should not invent unnecessary
    standards, and SCIM is working quite well for us in combination with
    OAuth2 for static client registrations. That said, I expect we will
    have a future need for dynamic client registrations and that there
    may be some significant differences.<br>
    <br>
    And my preference would also be json in and json out. <br>
    <br>
    --Dale<br>
    <br>
    <div class="moz-cite-prefix">On 02/04/2013 01:35 PM, Richer, Justin
      P. wrote:<br>
    </div>
    <blockquote
      cite="mid:B33BFB58CCC8BE4998958016839DE27E068866BF@IMCMBX01.MITRE.ORG"
      type="cite">
      <meta http-equiv="Content-Type" content="text/html;
        charset=ISO-8859-1">
      Additionally:
      <div><br>
      </div>
      <div>This begs the question, why not just do SCIM here?
        CloudFoundry's UAA has a SCIM class for OAuth clients that they
        use for dynamic registration today.</div>
      <div><br>
      </div>
      <div>&nbsp;-- Justin</div>
      <div><br>
      </div>
      <div><br>
        <div>
          <div>On Feb 4, 2013, at 4:25 PM, Mike Jones &lt;<a
              moz-do-not-send="true"
              href="mailto:Michael.Jones@microsoft.com">Michael.Jones@microsoft.com</a>&gt;</div>
          <div>&nbsp;wrote:</div>
          <br class="Apple-interchange-newline">
          <blockquote type="cite">
            <div link="blue" vlink="purple" style="font-family:
              Helvetica; font-size: medium; font-style: normal;
              font-variant: normal; font-weight: normal; letter-spacing:
              normal; line-height: normal; orphans: 2; text-align:
              -webkit-auto; text-indent: 0px; text-transform: none;
              white-space: normal; widows: 2; word-spacing: 0px;
              -webkit-text-size-adjust: auto; -webkit-text-stroke-width:
              0px; " lang="EN-US">
              <div class="WordSection1" style="page: WordSection1; ">
                <div style="margin: 0in 0in 0.0001pt; font-size: 11pt;
                  font-family: Calibri, sans-serif; ">
                  Now that we're returning the registration state as
                  JSON, it's pretty inconsistent for the registration
                  request to instead be form-url-encoded. The case can
                  be made for switching to JSON now - especially in
                  light of possibly wanting to convey some structured
                  information at registration time.<o:p></o:p></div>
                <div style="margin: 0in 0in 0.0001pt; font-size: 11pt;
                  font-family: Calibri, sans-serif; ">
                  <o:p></o:p></div>
                <div style="margin: 0in 0in 0.0001pt; font-size: 11pt;
                  font-family: Calibri, sans-serif; ">
                  I realize that this is a big change, but if we're
                  going to do it, we should do it now.<o:p></o:p></div>
                <div style="margin: 0in 0in 0.0001pt; font-size: 11pt;
                  font-family: Calibri, sans-serif; ">
                  <o:p></o:p></div>
                <div style="margin: 0in 0in 0.0001pt; font-size: 11pt;
                  font-family: Calibri, sans-serif; ">
                  As a precedent, apparently SCIM requests are JSON,
                  rather than form-url-encoded.<o:p></o:p></div>
                <div style="margin: 0in 0in 0.0001pt; font-size: 11pt;
                  font-family: Calibri, sans-serif; ">
                  <o:p>&nbsp;</o:p></div>
                <div style="margin: 0in 0in 0.0001pt; font-size: 11pt;
                  font-family: Calibri, sans-serif; ">
                  &nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;
                  -- Mike<o:p></o:p></div>
                <div style="margin: 0in 0in 0.0001pt; font-size: 11pt;
                  font-family: Calibri, sans-serif; ">
                  <o:p>&nbsp;</o:p></div>
              </div>
              _______________________________________________<br>
              OAuth mailing list<br>
              <a moz-do-not-send="true" href="mailto:OAuth@ietf.org"
                style="color: purple; text-decoration: underline; ">OAuth@ietf.org</a><br>
              <a moz-do-not-send="true"
                href="https://www.ietf.org/mailman/listinfo/oauth"
                style="color: purple; text-decoration: underline; ">https://www.ietf.org/mailman/listinfo/oauth</a><br>
            </div>
          </blockquote>
        </div>
        <br>
      </div>
      <br>
      <fieldset class="mimeAttachmentHeader"></fieldset>
      <br>
      <pre wrap="">_______________________________________________
OAuth mailing list
<a class="moz-txt-link-abbreviated" href="mailto:OAuth@ietf.org">OAuth@ietf.org</a>
<a class="moz-txt-link-freetext" href="https://www.ietf.org/mailman/listinfo/oauth">https://www.ietf.org/mailman/listinfo/oauth</a>
</pre>
    </blockquote>
    <br>
  </body>
</html>

--------------070200080302040601020608--

From jricher@mitre.org  Tue Feb  5 07:04:47 2013
Return-Path: <jricher@mitre.org>
X-Original-To: oauth@ietfa.amsl.com
Delivered-To: oauth@ietfa.amsl.com
Received: from localhost (localhost [127.0.0.1]) by ietfa.amsl.com (Postfix) with ESMTP id DBA7821F8619 for <oauth@ietfa.amsl.com>; Tue,  5 Feb 2013 07:04:47 -0800 (PST)
X-Virus-Scanned: amavisd-new at amsl.com
X-Spam-Flag: NO
X-Spam-Score: -6.566
X-Spam-Level: 
X-Spam-Status: No, score=-6.566 tagged_above=-999 required=5 tests=[AWL=0.032,  BAYES_00=-2.599, HTML_MESSAGE=0.001, RCVD_IN_DNSWL_MED=-4]
Received: from mail.ietf.org ([64.170.98.30]) by localhost (ietfa.amsl.com [127.0.0.1]) (amavisd-new, port 10024) with ESMTP id HW3yIJ3dX54u for <oauth@ietfa.amsl.com>; Tue,  5 Feb 2013 07:04:46 -0800 (PST)
Received: from smtpksrv1.mitre.org (smtpksrv1.mitre.org [198.49.146.77]) by ietfa.amsl.com (Postfix) with ESMTP id BD65921F84CE for <oauth@ietf.org>; Tue,  5 Feb 2013 07:04:45 -0800 (PST)
Received: from smtpksrv1.mitre.org (localhost.localdomain [127.0.0.1]) by localhost (Postfix) with SMTP id 872896150098; Tue,  5 Feb 2013 10:04:44 -0500 (EST)
Received: from IMCCAS02.MITRE.ORG (imccas02.mitre.org [129.83.29.79]) by smtpksrv1.mitre.org (Postfix) with ESMTP id 6AA78615009E; Tue,  5 Feb 2013 10:04:44 -0500 (EST)
Received: from [10.146.15.29] (129.83.31.58) by IMCCAS02.MITRE.ORG (129.83.29.79) with Microsoft SMTP Server (TLS) id 14.2.318.4; Tue, 5 Feb 2013 10:04:44 -0500
Message-ID: <51111F69.1080503@mitre.org>
Date: Tue, 5 Feb 2013 10:04:09 -0500
From: Justin Richer <jricher@mitre.org>
User-Agent: Mozilla/5.0 (X11; Linux i686; rv:17.0) Gecko/20130106 Thunderbird/17.0.2
MIME-Version: 1.0
To: Mike Jones <Michael.Jones@microsoft.com>
References: <4E1F6AAD24975D4BA5B1680429673943674111BE@TK5EX14MBXC284.redmond.corp.microsoft.com> <B33BFB58CCC8BE4998958016839DE27E068866A0@IMCMBX01.MITRE.ORG> <4E1F6AAD24975D4BA5B168042967394367411337@TK5EX14MBXC284.redmond.corp.microsoft.com>
In-Reply-To: <4E1F6AAD24975D4BA5B168042967394367411337@TK5EX14MBXC284.redmond.corp.microsoft.com>
Content-Type: multipart/alternative; boundary="------------040104000305090407090405"
X-Originating-IP: [129.83.31.58]
Cc: "oauth@ietf.org" <oauth@ietf.org>
Subject: Re: [OAUTH-WG] Should registration request be form-urlencoded or JSON?
X-BeenThere: oauth@ietf.org
X-Mailman-Version: 2.1.12
Precedence: list
List-Id: OAUTH WG <oauth.ietf.org>
List-Unsubscribe: <https://www.ietf.org/mailman/options/oauth>, <mailto:oauth-request@ietf.org?subject=unsubscribe>
List-Archive: <http://www.ietf.org/mail-archive/web/oauth>
List-Post: <mailto:oauth@ietf.org>
List-Help: <mailto:oauth-request@ietf.org?subject=help>
List-Subscribe: <https://www.ietf.org/mailman/listinfo/oauth>, <mailto:oauth-request@ietf.org?subject=subscribe>
X-List-Received-Date: Tue, 05 Feb 2013 15:04:48 -0000

--------------040104000305090407090405
Content-Type: text/plain; charset="ISO-8859-1"; format=flowed
Content-Transfer-Encoding: 7bit

The counter argument is that if you do something that's half way between 
two fairly well-established programming practices, then you can end up 
making a strange chimera. I agree that we shouldn't "boil the ocean", 
but dictating HTTP verb usage on the endpoint is far from that.

The crux of my argument is this: with the same input format in and out, 
we have an opportunity to make something much more RESTful than with the 
data formats being asymmetrical, as they are now.

I'll put together a draft of this proposed change to DynReg sometime 
this week that's much more fully RESTful, based on Nat's OIDC 
registration draft. The pros/cons below still apply, but I think it 
might help people to see a concrete proposal. The goal will still be to 
have a base DynReg proposal that OIDC, UMA, and others can profile and 
extend for their use cases.

  -- Justin


On 02/04/2013 04:46 PM, Mike Jones wrote:
>
> I'm not proposing that we boil the ocean.  "Diving in with both feet 
> and define a full RESTful API with all appropriate verbs and CRUD ops" 
> is an almost sure way to build a complicated spec, most of which isn't 
> needed, and to have it take a long time.
>
> Everything in the current OpenID Registration spec is motivated by an 
> actual use case.  Stuff that isn't isn't in the spec. That's nearly 
> true of the closely-related OAuth Registration spec, with what I 
> believe to be a few exceptions.  (Yes, we should harmonize those 
> differences -- hopefully based upon real use cases.)
>
> I was only proposing that we answer the single question of whether 
> we're using the right input format or not.  I hope we can keep the 
> discussion to that topic and not use it to generate a passel of new 
> work items as a side effect.
>
> -- Mike
>
> *From:*Richer, Justin P. [mailto:jricher@mitre.org]
> *Sent:* Monday, February 04, 2013 1:34 PM
> *To:* Mike Jones
> *Cc:* oauth@ietf.org
> *Subject:* Re: [OAUTH-WG] Should registration request be 
> form-urlencoded or JSON?
>
> For history, the original UMA registration spec from whence this all 
> grew was JSON-in and JSON-out. It's feeling like this is coming back 
> around.
>
> Pro:
>
>  - more REST-ish (particularly if we use real REST style like URL 
> templates and verbs)
>
>  - consistent data structures
>
>  - possible use of rich client data structures like lists and sub-objects
>
> Con:
>
>  - unlike the rest of OAuth, which is form-in, JSON-out
>
>  - major change from existing code
>
>  - possible overhead for existing OAuth libraries which haven't had to 
> deal with JSON from clients
>
> If we're going to do this, we should dive in with both feet and define 
> a full RESTful API with all appropriate verbs and CRUD ops, and define 
> it at the OAuth DynReg level as well.
>
> -- Justin
>
> On Feb 4, 2013, at 4:25 PM, Mike Jones <Michael.Jones@microsoft.com 
> <mailto:Michael.Jones@microsoft.com>>
>
>  wrote:
>
>
>
> Now that we're returning the registration state as JSON, it's pretty 
> inconsistent for the registration request to instead be 
> form-url-encoded. The case can be made for switching to JSON now - 
> especially in light of possibly wanting to convey some structured 
> information at registration time.
>
> I realize that this is a big change, but if we're going to do it, we 
> should do it now.
>
> As a precedent, apparently SCIM requests are JSON, rather than 
> form-url-encoded.
>
> -- Mike
>
> _______________________________________________
> OAuth mailing list
> OAuth@ietf.org <mailto:OAuth@ietf.org>
> https://www.ietf.org/mailman/listinfo/oauth
>


--------------040104000305090407090405
Content-Type: text/html; charset="ISO-8859-1"
Content-Transfer-Encoding: 7bit

<html>
  <head>
    <meta content="text/html; charset=ISO-8859-1"
      http-equiv="Content-Type">
  </head>
  <body bgcolor="#FFFFFF" text="#000000">
    The counter argument is that if you do something that's half way
    between two fairly well-established programming practices, then you
    can end up making a strange chimera. I agree that we shouldn't "boil
    the ocean", but dictating HTTP verb usage on the endpoint is far
    from that. <br>
    <br>
    The crux of my argument is this: with the same input format in and
    out, we have an opportunity to make something much more RESTful than
    with the data formats being asymmetrical, as they are now. <br>
    <br>
    I'll put together a draft of this proposed change to DynReg sometime
    this week that's much more fully RESTful, based on Nat's OIDC
    registration draft. The pros/cons below still apply, but I think it
    might help people to see a concrete proposal. The goal will still be
    to have a base DynReg proposal that OIDC, UMA, and others can
    profile and extend for their use cases.<br>
    <br>
    &nbsp;-- Justin<br>
    <br>
    <br>
    <div class="moz-cite-prefix">On 02/04/2013 04:46 PM, Mike Jones
      wrote:<br>
    </div>
    <blockquote
cite="mid:4E1F6AAD24975D4BA5B168042967394367411337@TK5EX14MBXC284.redmond.corp.microsoft.com"
      type="cite">
      <meta http-equiv="Content-Type" content="text/html;
        charset=ISO-8859-1">
      <meta name="Generator" content="Microsoft Word 14 (filtered
        medium)">
      <style><!--
/* Font Definitions */
@font-face
	{font-family:Helvetica;
	panose-1:2 11 6 4 2 2 2 2 2 4;}
@font-face
	{font-family:Helvetica;
	panose-1:2 11 6 4 2 2 2 2 2 4;}
@font-face
	{font-family:Calibri;
	panose-1:2 15 5 2 2 2 4 3 2 4;}
@font-face
	{font-family:Tahoma;
	panose-1:2 11 6 4 3 5 4 4 2 4;}
/* Style Definitions */
p.MsoNormal, li.MsoNormal, div.MsoNormal
	{margin:0in;
	margin-bottom:.0001pt;
	font-size:12.0pt;
	font-family:"Times New Roman","serif";}
a:link, span.MsoHyperlink
	{mso-style-priority:99;
	color:blue;
	text-decoration:underline;}
a:visited, span.MsoHyperlinkFollowed
	{mso-style-priority:99;
	color:purple;
	text-decoration:underline;}
span.EmailStyle17
	{mso-style-type:personal-reply;
	font-family:"Calibri","sans-serif";
	color:#1F497D;}
.MsoChpDefault
	{mso-style-type:export-only;
	font-size:10.0pt;}
@page WordSection1
	{size:8.5in 11.0in;
	margin:1.0in 1.0in 1.0in 1.0in;}
div.WordSection1
	{page:WordSection1;}
--></style><!--[if gte mso 9]><xml>
<o:shapedefaults v:ext="edit" spidmax="1026" />
</xml><![endif]--><!--[if gte mso 9]><xml>
<o:shapelayout v:ext="edit">
<o:idmap v:ext="edit" data="1" />
</o:shapelayout></xml><![endif]-->
      <div class="WordSection1">
        <p class="MsoNormal"><span
style="font-size:11.0pt;font-family:&quot;Calibri&quot;,&quot;sans-serif&quot;;color:#1F497D">I&#8217;m
            not proposing that we boil the ocean.&nbsp; &#8220;</span>Diving in
          with both feet and define a full RESTful API with all
          appropriate verbs and CRUD ops<span
style="font-size:11.0pt;font-family:&quot;Calibri&quot;,&quot;sans-serif&quot;;color:#1F497D">&#8221;
            is an almost sure way to build a complicated spec, most of
            which isn&#8217;t needed, and to have it take a long time.<o:p></o:p></span></p>
        <p class="MsoNormal"><span
style="font-size:11.0pt;font-family:&quot;Calibri&quot;,&quot;sans-serif&quot;;color:#1F497D"><o:p>&nbsp;</o:p></span></p>
        <p class="MsoNormal"><span
style="font-size:11.0pt;font-family:&quot;Calibri&quot;,&quot;sans-serif&quot;;color:#1F497D">Everything
            in the current OpenID Registration spec is motivated by an
            actual use case.&nbsp; Stuff that isn&#8217;t isn&#8217;t in the spec.&nbsp;
            That&#8217;s nearly true of the closely-related OAuth Registration
            spec, with what I believe to be a few exceptions.&nbsp; (Yes, we
            should harmonize those differences &#8211; hopefully based upon
            real use cases.)<o:p></o:p></span></p>
        <p class="MsoNormal"><span
style="font-size:11.0pt;font-family:&quot;Calibri&quot;,&quot;sans-serif&quot;;color:#1F497D"><o:p>&nbsp;</o:p></span></p>
        <p class="MsoNormal"><span
style="font-size:11.0pt;font-family:&quot;Calibri&quot;,&quot;sans-serif&quot;;color:#1F497D">I
            was only proposing that we answer the single question of
            whether we&#8217;re using the right input format or not.&nbsp; I hope
            we can keep the discussion to that topic and not use it to
            generate a passel of new work items as a side effect.<o:p></o:p></span></p>
        <p class="MsoNormal"><span
style="font-size:11.0pt;font-family:&quot;Calibri&quot;,&quot;sans-serif&quot;;color:#1F497D"><o:p>&nbsp;</o:p></span></p>
        <p class="MsoNormal"><span
style="font-size:11.0pt;font-family:&quot;Calibri&quot;,&quot;sans-serif&quot;;color:#1F497D">&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;
            -- Mike<o:p></o:p></span></p>
        <p class="MsoNormal"><span
style="font-size:11.0pt;font-family:&quot;Calibri&quot;,&quot;sans-serif&quot;;color:#1F497D"><o:p>&nbsp;</o:p></span></p>
        <div>
          <div style="border:none;border-top:solid #B5C4DF
            1.0pt;padding:3.0pt 0in 0in 0in">
            <p class="MsoNormal"><b><span
style="font-size:10.0pt;font-family:&quot;Tahoma&quot;,&quot;sans-serif&quot;">From:</span></b><span
style="font-size:10.0pt;font-family:&quot;Tahoma&quot;,&quot;sans-serif&quot;">
                Richer, Justin P. [<a class="moz-txt-link-freetext" href="mailto:jricher@mitre.org">mailto:jricher@mitre.org</a>]
                <br>
                <b>Sent:</b> Monday, February 04, 2013 1:34 PM<br>
                <b>To:</b> Mike Jones<br>
                <b>Cc:</b> <a class="moz-txt-link-abbreviated" href="mailto:oauth@ietf.org">oauth@ietf.org</a><br>
                <b>Subject:</b> Re: [OAUTH-WG] Should registration
                request be form-urlencoded or JSON?<o:p></o:p></span></p>
          </div>
        </div>
        <p class="MsoNormal"><o:p>&nbsp;</o:p></p>
        <p class="MsoNormal">For history, the original UMA registration
          spec from whence this all grew was JSON-in and JSON-out. It's
          feeling like this is coming back around.
          <o:p></o:p></p>
        <div>
          <p class="MsoNormal"><o:p>&nbsp;</o:p></p>
        </div>
        <div>
          <p class="MsoNormal">Pro:<o:p></o:p></p>
        </div>
        <div>
          <p class="MsoNormal">&nbsp;- more REST-ish (particularly if we use
            real REST style like URL templates and verbs)<o:p></o:p></p>
        </div>
        <div>
          <p class="MsoNormal">&nbsp;- consistent data structures<o:p></o:p></p>
        </div>
        <div>
          <p class="MsoNormal">&nbsp;- possible use of rich client data
            structures like lists and sub-objects<o:p></o:p></p>
        </div>
        <div>
          <p class="MsoNormal"><o:p>&nbsp;</o:p></p>
        </div>
        <div>
          <p class="MsoNormal">Con:<o:p></o:p></p>
        </div>
        <div>
          <p class="MsoNormal">&nbsp;- unlike the rest of OAuth, which is
            form-in, JSON-out<o:p></o:p></p>
        </div>
        <div>
          <p class="MsoNormal">&nbsp;- major change from existing code<o:p></o:p></p>
        </div>
        <div>
          <p class="MsoNormal">&nbsp;- possible overhead for existing OAuth
            libraries which haven't had to deal with JSON from clients<o:p></o:p></p>
        </div>
        <div>
          <p class="MsoNormal"><o:p>&nbsp;</o:p></p>
        </div>
        <div>
          <p class="MsoNormal"><o:p>&nbsp;</o:p></p>
        </div>
        <div>
          <p class="MsoNormal"><o:p>&nbsp;</o:p></p>
        </div>
        <div>
          <p class="MsoNormal">If we're going to do this, we should dive
            in with both feet and define a full RESTful API with all
            appropriate verbs and CRUD ops, and define it at the OAuth
            DynReg level as well.<o:p></o:p></p>
        </div>
        <div>
          <p class="MsoNormal"><o:p>&nbsp;</o:p></p>
        </div>
        <div>
          <p class="MsoNormal"><o:p>&nbsp;</o:p></p>
        </div>
        <div>
          <p class="MsoNormal">-- Justin<o:p></o:p></p>
        </div>
        <div>
          <p class="MsoNormal"><o:p>&nbsp;</o:p></p>
          <div>
            <div>
              <p class="MsoNormal">On Feb 4, 2013, at 4:25 PM, Mike
                Jones &lt;<a moz-do-not-send="true"
                  href="mailto:Michael.Jones@microsoft.com">Michael.Jones@microsoft.com</a>&gt;<o:p></o:p></p>
            </div>
            <div>
              <p class="MsoNormal">&nbsp;wrote:<o:p></o:p></p>
            </div>
            <p class="MsoNormal"><br>
              <br>
              <o:p></o:p></p>
            <div>
              <div>
                <p class="MsoNormal"><span
style="font-size:11.0pt;font-family:&quot;Calibri&quot;,&quot;sans-serif&quot;">Now
                    that we're returning the registration state as JSON,
                    it's pretty inconsistent for the registration
                    request to instead be form-url-encoded. The case can
                    be made for switching to JSON now - especially in
                    light of possibly wanting to convey some structured
                    information at registration time.<o:p></o:p></span></p>
              </div>
              <div>
                <p class="MsoNormal"><span
style="font-size:11.0pt;font-family:&quot;Calibri&quot;,&quot;sans-serif&quot;">I
                    realize that this is a big change, but if we're
                    going to do it, we should do it now.<o:p></o:p></span></p>
              </div>
              <div>
                <p class="MsoNormal"><span
style="font-size:11.0pt;font-family:&quot;Calibri&quot;,&quot;sans-serif&quot;">As
                    a precedent, apparently SCIM requests are JSON,
                    rather than form-url-encoded.<o:p></o:p></span></p>
              </div>
              <div>
                <p class="MsoNormal"><span
style="font-size:11.0pt;font-family:&quot;Calibri&quot;,&quot;sans-serif&quot;">&nbsp;<o:p></o:p></span></p>
              </div>
              <div>
                <p class="MsoNormal"><span
style="font-size:11.0pt;font-family:&quot;Calibri&quot;,&quot;sans-serif&quot;">&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;
                    -- Mike<o:p></o:p></span></p>
              </div>
              <div>
                <p class="MsoNormal"><span
style="font-size:11.0pt;font-family:&quot;Calibri&quot;,&quot;sans-serif&quot;">&nbsp;<o:p></o:p></span></p>
              </div>
              <p class="MsoNormal"><span
style="font-size:13.5pt;font-family:&quot;Helvetica&quot;,&quot;sans-serif&quot;">_______________________________________________<br>
                  OAuth mailing list<br>
                  <a moz-do-not-send="true" href="mailto:OAuth@ietf.org"><span
                      style="color:purple">OAuth@ietf.org</span></a><br>
                  <a moz-do-not-send="true"
                    href="https://www.ietf.org/mailman/listinfo/oauth"><span
                      style="color:purple">https://www.ietf.org/mailman/listinfo/oauth</span></a><o:p></o:p></span></p>
            </div>
          </div>
          <p class="MsoNormal"><o:p>&nbsp;</o:p></p>
        </div>
      </div>
    </blockquote>
    <br>
  </body>
</html>

--------------040104000305090407090405--

From jricher@mitre.org  Tue Feb  5 07:12:37 2013
Return-Path: <jricher@mitre.org>
X-Original-To: oauth@ietfa.amsl.com
Delivered-To: oauth@ietfa.amsl.com
Received: from localhost (localhost [127.0.0.1]) by ietfa.amsl.com (Postfix) with ESMTP id 4F21E21F84DA for <oauth@ietfa.amsl.com>; Tue,  5 Feb 2013 07:12:37 -0800 (PST)
X-Virus-Scanned: amavisd-new at amsl.com
X-Spam-Flag: NO
X-Spam-Score: -6.567
X-Spam-Level: 
X-Spam-Status: No, score=-6.567 tagged_above=-999 required=5 tests=[AWL=0.031,  BAYES_00=-2.599, HTML_MESSAGE=0.001, RCVD_IN_DNSWL_MED=-4]
Received: from mail.ietf.org ([64.170.98.30]) by localhost (ietfa.amsl.com [127.0.0.1]) (amavisd-new, port 10024) with ESMTP id rs3K3hVIevy6 for <oauth@ietfa.amsl.com>; Tue,  5 Feb 2013 07:12:36 -0800 (PST)
Received: from smtpksrv1.mitre.org (smtpksrv1.mitre.org [198.49.146.77]) by ietfa.amsl.com (Postfix) with ESMTP id 38E4E21F84BF for <oauth@ietf.org>; Tue,  5 Feb 2013 07:12:36 -0800 (PST)
Received: from smtpksrv1.mitre.org (localhost.localdomain [127.0.0.1]) by localhost (Postfix) with SMTP id 24F75615041B; Tue,  5 Feb 2013 10:12:34 -0500 (EST)
Received: from IMCCAS04.MITRE.ORG (imccas04.mitre.org [129.83.29.81]) by smtpksrv1.mitre.org (Postfix) with ESMTP id 0B256615041E; Tue,  5 Feb 2013 10:12:34 -0500 (EST)
Received: from [10.146.15.29] (129.83.31.58) by IMCCAS04.MITRE.ORG (129.83.29.81) with Microsoft SMTP Server (TLS) id 14.2.318.4; Tue, 5 Feb 2013 10:12:33 -0500
Message-ID: <5111213F.4070406@mitre.org>
Date: Tue, 5 Feb 2013 10:11:59 -0500
From: Justin Richer <jricher@mitre.org>
User-Agent: Mozilla/5.0 (X11; Linux i686; rv:17.0) Gecko/20130106 Thunderbird/17.0.2
MIME-Version: 1.0
To: Dale Olds <olds@vmware.com>
References: <4E1F6AAD24975D4BA5B1680429673943674111BE@TK5EX14MBXC284.redmond.corp.microsoft.com> <B33BFB58CCC8BE4998958016839DE27E068866BF@IMCMBX01.MITRE.ORG> <5110B7D9.1000001@vmware.com>
In-Reply-To: <5110B7D9.1000001@vmware.com>
Content-Type: multipart/alternative; boundary="------------040408000008000800010006"
X-Originating-IP: [129.83.31.58]
Cc: oauth@ietf.org
Subject: Re: [OAUTH-WG] Should registration request be form-urlencoded or JSON?
X-BeenThere: oauth@ietf.org
X-Mailman-Version: 2.1.12
Precedence: list
List-Id: OAUTH WG <oauth.ietf.org>
List-Unsubscribe: <https://www.ietf.org/mailman/options/oauth>, <mailto:oauth-request@ietf.org?subject=unsubscribe>
List-Archive: <http://www.ietf.org/mail-archive/web/oauth>
List-Post: <mailto:oauth@ietf.org>
List-Help: <mailto:oauth-request@ietf.org?subject=help>
List-Subscribe: <https://www.ietf.org/mailman/listinfo/oauth>, <mailto:oauth-request@ietf.org?subject=subscribe>
X-List-Received-Date: Tue, 05 Feb 2013 15:12:37 -0000

--------------040408000008000800010006
Content-Type: text/plain; charset="ISO-8859-1"; format=flowed
Content-Transfer-Encoding: 7bit

Dale is correct, I was misremembering slightly -- UAA does not do what 
we would really call dynamic registration with SCIM, but rather does a 
static client provisioning using SCIM as the API for provisioning the 
client objects. Still, it's a real-life implementation of something 
similar that we can look at.

  -- Justin

On 02/05/2013 02:42 AM, Dale Olds wrote:
> Rather surprised (and pleased) to see a reference to the UAA here, but 
> I would like to make a quick clarification.
>
> Justin, I think we concluded that what the UAA is doing is static 
> client registration via SCIM extensions, not dynamic client 
> registrations. The UAA has been serving OAuth2 and SCIM requests in 
> the cloudfoundry.com PaaS for over a year now -- there was no client 
> registration standard at that time, and SCIM provides what we need.
>
> I agree with your point that we should not invent unnecessary 
> standards, and SCIM is working quite well for us in combination with 
> OAuth2 for static client registrations. That said, I expect we will 
> have a future need for dynamic client registrations and that there may 
> be some significant differences.
>
> And my preference would also be json in and json out.
>
> --Dale
>
> On 02/04/2013 01:35 PM, Richer, Justin P. wrote:
>> Additionally:
>>
>> This begs the question, why not just do SCIM here? CloudFoundry's UAA 
>> has a SCIM class for OAuth clients that they use for dynamic 
>> registration today.
>>
>>  -- Justin
>>
>>
>> On Feb 4, 2013, at 4:25 PM, Mike Jones <Michael.Jones@microsoft.com 
>> <mailto:Michael.Jones@microsoft.com>>
>>  wrote:
>>
>>> Now that we're returning the registration state as JSON, it's pretty 
>>> inconsistent for the registration request to instead be 
>>> form-url-encoded. The case can be made for switching to JSON now - 
>>> especially in light of possibly wanting to convey some structured 
>>> information at registration time.
>>> I realize that this is a big change, but if we're going to do it, we 
>>> should do it now.
>>> As a precedent, apparently SCIM requests are JSON, rather than 
>>> form-url-encoded.
>>> -- Mike
>>> _______________________________________________
>>> OAuth mailing list
>>> OAuth@ietf.org <mailto:OAuth@ietf.org>
>>> https://www.ietf.org/mailman/listinfo/oauth
>>
>>
>>
>> _______________________________________________
>> OAuth mailing list
>> OAuth@ietf.org
>> https://www.ietf.org/mailman/listinfo/oauth
>
>
>
> _______________________________________________
> OAuth mailing list
> OAuth@ietf.org
> https://www.ietf.org/mailman/listinfo/oauth


--------------040408000008000800010006
Content-Type: text/html; charset="ISO-8859-1"
Content-Transfer-Encoding: 7bit

<html>
  <head>
    <meta content="text/html; charset=ISO-8859-1"
      http-equiv="Content-Type">
  </head>
  <body bgcolor="#FFFFFF" text="#000000">
    Dale is correct, I was misremembering slightly -- UAA does not do
    what we would really call dynamic registration with SCIM, but rather
    does a static client provisioning using SCIM as the API for
    provisioning the client objects. Still, it's a real-life
    implementation of something similar that we can look at.<br>
    <br>
    &nbsp;-- Justin<br>
    <br>
    <div class="moz-cite-prefix">On 02/05/2013 02:42 AM, Dale Olds
      wrote:<br>
    </div>
    <blockquote cite="mid:5110B7D9.1000001@vmware.com" type="cite">
      <meta http-equiv="Content-Type" content="text/html;
        charset=ISO-8859-1">
      Rather surprised (and pleased) to see a reference to the UAA here,
      but I would like to make a quick clarification.<br>
      <br>
      Justin, I think we concluded that what the UAA is doing is static
      client registration via SCIM extensions, not dynamic client
      registrations. The UAA has been serving OAuth2 and SCIM requests
      in the cloudfoundry.com PaaS for over a year now -- there was no
      client registration standard at that time, and SCIM provides what
      we need. <br>
      <br>
      I agree with your point that we should not invent unnecessary
      standards, and SCIM is working quite well for us in combination
      with OAuth2 for static client registrations. That said, I expect
      we will have a future need for dynamic client registrations and
      that there may be some significant differences.<br>
      <br>
      And my preference would also be json in and json out. <br>
      <br>
      --Dale<br>
      <br>
      <div class="moz-cite-prefix">On 02/04/2013 01:35 PM, Richer,
        Justin P. wrote:<br>
      </div>
      <blockquote
        cite="mid:B33BFB58CCC8BE4998958016839DE27E068866BF@IMCMBX01.MITRE.ORG"
        type="cite"> Additionally:
        <div><br>
        </div>
        <div>This begs the question, why not just do SCIM here?
          CloudFoundry's UAA has a SCIM class for OAuth clients that
          they use for dynamic registration today.</div>
        <div><br>
        </div>
        <div>&nbsp;-- Justin</div>
        <div><br>
        </div>
        <div><br>
          <div>
            <div>On Feb 4, 2013, at 4:25 PM, Mike Jones &lt;<a
                moz-do-not-send="true"
                href="mailto:Michael.Jones@microsoft.com">Michael.Jones@microsoft.com</a>&gt;</div>
            <div>&nbsp;wrote:</div>
            <br class="Apple-interchange-newline">
            <blockquote type="cite">
              <div link="blue" vlink="purple" style="font-family:
                Helvetica; font-size: medium; font-style: normal;
                font-variant: normal; font-weight: normal;
                letter-spacing: normal; line-height: normal; orphans: 2;
                text-align: -webkit-auto; text-indent: 0px;
                text-transform: none; white-space: normal; widows: 2;
                word-spacing: 0px; -webkit-text-size-adjust: auto;
                -webkit-text-stroke-width: 0px; " lang="EN-US">
                <div class="WordSection1" style="page: WordSection1; ">
                  <div style="margin: 0in 0in 0.0001pt; font-size: 11pt;
                    font-family: Calibri, sans-serif; "> Now that we're
                    returning the registration state as JSON, it's
                    pretty inconsistent for the registration request to
                    instead be form-url-encoded. The case can be made
                    for switching to JSON now - especially in light of
                    possibly wanting to convey some structured
                    information at registration time.<o:p></o:p></div>
                  <div style="margin: 0in 0in 0.0001pt; font-size: 11pt;
                    font-family: Calibri, sans-serif; "> <o:p></o:p></div>
                  <div style="margin: 0in 0in 0.0001pt; font-size: 11pt;
                    font-family: Calibri, sans-serif; "> I realize that
                    this is a big change, but if we're going to do it,
                    we should do it now.<o:p></o:p></div>
                  <div style="margin: 0in 0in 0.0001pt; font-size: 11pt;
                    font-family: Calibri, sans-serif; "> <o:p></o:p></div>
                  <div style="margin: 0in 0in 0.0001pt; font-size: 11pt;
                    font-family: Calibri, sans-serif; "> As a precedent,
                    apparently SCIM requests are JSON, rather than
                    form-url-encoded.<o:p></o:p></div>
                  <div style="margin: 0in 0in 0.0001pt; font-size: 11pt;
                    font-family: Calibri, sans-serif; "> <o:p>&nbsp;</o:p></div>
                  <div style="margin: 0in 0in 0.0001pt; font-size: 11pt;
                    font-family: Calibri, sans-serif; ">
                    &nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;
                    -- Mike<o:p></o:p></div>
                  <div style="margin: 0in 0in 0.0001pt; font-size: 11pt;
                    font-family: Calibri, sans-serif; "> <o:p>&nbsp;</o:p></div>
                </div>
                _______________________________________________<br>
                OAuth mailing list<br>
                <a moz-do-not-send="true" href="mailto:OAuth@ietf.org"
                  style="color: purple; text-decoration: underline; ">OAuth@ietf.org</a><br>
                <a moz-do-not-send="true"
                  href="https://www.ietf.org/mailman/listinfo/oauth"
                  style="color: purple; text-decoration: underline; ">https://www.ietf.org/mailman/listinfo/oauth</a><br>
              </div>
            </blockquote>
          </div>
          <br>
        </div>
        <br>
        <fieldset class="mimeAttachmentHeader"></fieldset>
        <br>
        <pre wrap="">_______________________________________________
OAuth mailing list
<a moz-do-not-send="true" class="moz-txt-link-abbreviated" href="mailto:OAuth@ietf.org">OAuth@ietf.org</a>
<a moz-do-not-send="true" class="moz-txt-link-freetext" href="https://www.ietf.org/mailman/listinfo/oauth">https://www.ietf.org/mailman/listinfo/oauth</a>
</pre>
      </blockquote>
      <br>
      <br>
      <fieldset class="mimeAttachmentHeader"></fieldset>
      <br>
      <pre wrap="">_______________________________________________
OAuth mailing list
<a class="moz-txt-link-abbreviated" href="mailto:OAuth@ietf.org">OAuth@ietf.org</a>
<a class="moz-txt-link-freetext" href="https://www.ietf.org/mailman/listinfo/oauth">https://www.ietf.org/mailman/listinfo/oauth</a>
</pre>
    </blockquote>
    <br>
  </body>
</html>

--------------040408000008000800010006--

From prabath@wso2.com  Tue Feb  5 08:54:50 2013
Return-Path: <prabath@wso2.com>
X-Original-To: oauth@ietfa.amsl.com
Delivered-To: oauth@ietfa.amsl.com
Received: from localhost (localhost [127.0.0.1]) by ietfa.amsl.com (Postfix) with ESMTP id EDD8C21F86E7 for <oauth@ietfa.amsl.com>; Tue,  5 Feb 2013 08:54:48 -0800 (PST)
X-Virus-Scanned: amavisd-new at amsl.com
X-Spam-Flag: NO
X-Spam-Score: -1.726
X-Spam-Level: 
X-Spam-Status: No, score=-1.726 tagged_above=-999 required=5 tests=[AWL=1.250,  BAYES_00=-2.599, FM_FORGED_GMAIL=0.622, HTML_MESSAGE=0.001, RCVD_IN_DNSWL_LOW=-1]
Received: from mail.ietf.org ([64.170.98.30]) by localhost (ietfa.amsl.com [127.0.0.1]) (amavisd-new, port 10024) with ESMTP id 4dLwfj4gbTUl for <oauth@ietfa.amsl.com>; Tue,  5 Feb 2013 08:54:48 -0800 (PST)
Received: from mail-ea0-f172.google.com (mail-ea0-f172.google.com [209.85.215.172]) by ietfa.amsl.com (Postfix) with ESMTP id D955C21F8697 for <oauth@ietf.org>; Tue,  5 Feb 2013 08:54:47 -0800 (PST)
Received: by mail-ea0-f172.google.com with SMTP id f13so193394eaa.3 for <oauth@ietf.org>; Tue, 05 Feb 2013 08:54:44 -0800 (PST)
X-Google-DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=google.com; s=20120113; h=mime-version:x-received:date:message-id:subject:from:to :content-type:x-gm-message-state; bh=kioR7TvCzn+IdyDBztcWf4oAU2JC0j+/UJvGoSQo9Yk=; b=iQgwGTI3qFHaVL0AjYX08mtlLXSj25DFXVRyCbnUrlHCOXwJCR9mEkecWCjyi+ZJ15 CZH57hKhzfz7K3lhSPvyGO/H+dkUIXb6IGP0qeKFVtrVHCsj4uuLWb2F5Dj1kd1gWnR7 YlsfUhi3zg+kA2kkRqRpwtJ6778Cqfd0QsvpKOlRru2uzEKUASCJbt35dK6ypsf266pj V1iyQtGgT2jc5LsVXwz/vGGdfJEoNCrNnsQMQIFTGUs+r0rqgGnyaVDLxNi6wgSA8+3Y Os0HQu/qY/KN3CzT2zNvX7560mAexw2/xW3zK+vYbm4Jl/JrblicCEpT9pugkMjzlAux yRtw==
MIME-Version: 1.0
X-Received: by 10.14.203.3 with SMTP id e3mr86469338eeo.9.1360083284269; Tue, 05 Feb 2013 08:54:44 -0800 (PST)
Received: by 10.223.175.134 with HTTP; Tue, 5 Feb 2013 08:54:44 -0800 (PST)
Date: Tue, 5 Feb 2013 22:24:44 +0530
Message-ID: <CAJV9qO-Qh=0_2ipAnnwunLiWrq0+LiRcmg=s=bxih9VercobAw@mail.gmail.com>
From: Prabath Siriwardena <prabath@wso2.com>
To: "oauth@ietf.org WG" <oauth@ietf.org>
Content-Type: multipart/alternative; boundary=047d7b343b2a061b2b04d4fd1185
X-Gm-Message-State: ALoCoQlQd2bk+31VcuO8sl5m9jipAOUjoeH+AXNHcLs3szPS5UiUaAaSQ/9zc7kqOTd/vgjaSAfw
Subject: [OAUTH-WG] Does Facebook login OAuth 2.0 compatible ?
X-BeenThere: oauth@ietf.org
X-Mailman-Version: 2.1.12
Precedence: list
List-Id: OAUTH WG <oauth.ietf.org>
List-Unsubscribe: <https://www.ietf.org/mailman/options/oauth>, <mailto:oauth-request@ietf.org?subject=unsubscribe>
List-Archive: <http://www.ietf.org/mail-archive/web/oauth>
List-Post: <mailto:oauth@ietf.org>
List-Help: <mailto:oauth-request@ietf.org?subject=help>
List-Subscribe: <https://www.ietf.org/mailman/listinfo/oauth>, <mailto:oauth-request@ietf.org?subject=subscribe>
X-List-Received-Date: Tue, 05 Feb 2013 16:54:50 -0000

--047d7b343b2a061b2b04d4fd1185
Content-Type: text/plain; charset=ISO-8859-1

Here are some references that I found they do not.. thoughts appreciated...

1. https://developers.facebook.com/docs/howtos/login/login-as-app/
2. https://developers.facebook.com/docs/howtos/login/extending-tokens/
3. https://developers.facebook.com/docs/howtos/login/login-as-page/

Thanks & Regards,
Prabath

Mobile : +94 71 809 6732

http://blog.facilelogin.com
http://RampartFAQ.com

--047d7b343b2a061b2b04d4fd1185
Content-Type: text/html; charset=ISO-8859-1
Content-Transfer-Encoding: quoted-printable

Here are some references that I found they do not.. thoughts appreciated...=
<div><br></div><div>1.=A0<a href=3D"https://developers.facebook.com/docs/ho=
wtos/login/login-as-app/">https://developers.facebook.com/docs/howtos/login=
/login-as-app/</a></div>
<div>2.=A0<a href=3D"https://developers.facebook.com/docs/howtos/login/exte=
nding-tokens/">https://developers.facebook.com/docs/howtos/login/extending-=
tokens/</a></div><div>3.=A0<a href=3D"https://developers.facebook.com/docs/=
howtos/login/login-as-page/">https://developers.facebook.com/docs/howtos/lo=
gin/login-as-page/</a><br clear=3D"all">
<div><br></div>Thanks &amp; Regards,<br>Prabath<div><br></div><div>Mobile :=
 +94 71 809 6732=A0<br><br><a href=3D"http://blog.facilelogin.com" target=
=3D"_blank">http://blog.facilelogin.com</a><br><a href=3D"http://RampartFAQ=
.com" target=3D"_blank">http://RampartFAQ.com</a></div>

</div>

--047d7b343b2a061b2b04d4fd1185--

From lainhart@us.ibm.com  Tue Feb  5 09:46:03 2013
Return-Path: <lainhart@us.ibm.com>
X-Original-To: oauth@ietfa.amsl.com
Delivered-To: oauth@ietfa.amsl.com
Received: from localhost (localhost [127.0.0.1]) by ietfa.amsl.com (Postfix) with ESMTP id BDC8221F86A2 for <oauth@ietfa.amsl.com>; Tue,  5 Feb 2013 09:46:03 -0800 (PST)
X-Virus-Scanned: amavisd-new at amsl.com
X-Spam-Flag: NO
X-Spam-Score: -10.51
X-Spam-Level: 
X-Spam-Status: No, score=-10.51 tagged_above=-999 required=5 tests=[AWL=0.088,  BAYES_00=-2.599, HTML_MESSAGE=0.001, RCVD_IN_DNSWL_HI=-8]
Received: from mail.ietf.org ([64.170.98.30]) by localhost (ietfa.amsl.com [127.0.0.1]) (amavisd-new, port 10024) with ESMTP id 42755VFzjR7I for <oauth@ietfa.amsl.com>; Tue,  5 Feb 2013 09:46:03 -0800 (PST)
Received: from e4.ny.us.ibm.com (e4.ny.us.ibm.com [32.97.182.144]) by ietfa.amsl.com (Postfix) with ESMTP id B4B1121F8630 for <oauth@ietf.org>; Tue,  5 Feb 2013 09:46:02 -0800 (PST)
Received: from /spool/local by e4.ny.us.ibm.com with IBM ESMTP SMTP Gateway: Authorized Use Only! Violators will be prosecuted for <oauth@ietf.org> from <lainhart@us.ibm.com>; Tue, 5 Feb 2013 12:42:15 -0500
Received: from d01dlp01.pok.ibm.com (9.56.250.166) by e4.ny.us.ibm.com (192.168.1.104) with IBM ESMTP SMTP Gateway: Authorized Use Only! Violators will be prosecuted;  Tue, 5 Feb 2013 12:42:01 -0500
Received: from d01relay02.pok.ibm.com (d01relay02.pok.ibm.com [9.56.227.234]) by d01dlp01.pok.ibm.com (Postfix) with ESMTP id 181EA38C90A7; Tue,  5 Feb 2013 11:47:22 -0500 (EST)
Received: from d01av02.pok.ibm.com (d01av02.pok.ibm.com [9.56.224.216]) by d01relay02.pok.ibm.com (8.13.8/8.13.8/NCO v10.0) with ESMTP id r15GlL7w276780; Tue, 5 Feb 2013 11:47:21 -0500
Received: from d01av02.pok.ibm.com (loopback [127.0.0.1]) by d01av02.pok.ibm.com (8.14.4/8.13.1/NCO v10.0 AVout) with ESMTP id r15GlHKl026431; Tue, 5 Feb 2013 14:47:19 -0200
Received: from d01ml255.pok.ibm.com (d01ml255.pok.ibm.com [9.63.10.54]) by d01av02.pok.ibm.com (8.14.4/8.13.1/NCO v10.0 AVin) with ESMTP id r15GkoVd022195; Tue, 5 Feb 2013 14:46:53 -0200
In-Reply-To: <B33BFB58CCC8BE4998958016839DE27E068865E3@IMCMBX01.MITRE.ORG>
References: <510E5FB5.10803@lodderstedt.net>	<B33BFB58CCC8BE4998958016839DE27E06886427@IMCMBX01.MITRE.ORG> <511020D3.1090201@aol.com> <B33BFB58CCC8BE4998958016839DE27E068865E3@IMCMBX01.MITRE.ORG>
To: "Richer, Justin P." <jricher@mitre.org>
MIME-Version: 1.0
X-KeepSent: 2060C435:DEAE300A-85257B09:005BEF8B; type=4; name=$KeepSent
X-Mailer: Lotus Notes Release 8.5.3FP2 SHF22 July 19, 2012
Message-ID: <OF2060C435.DEAE300A-ON85257B09.005BEF8B-85257B09.005C2559@us.ibm.com>
From: Todd W Lainhart <lainhart@us.ibm.com>
Date: Tue, 5 Feb 2013 11:46:28 -0500
X-MIMETrack: Serialize by Router on D01ML255/01/M/IBM(Release 8.5.3FP2 ZX853FP2HF4|December 14, 2012) at 02/05/2013 11:46:53, Serialize complete at 02/05/2013 11:46:53
Content-Type: multipart/alternative; boundary="=_alternative 005C255885257B09_="
X-Content-Scanned: Fidelis XPS MAILER
x-cbid: 13020517-3534-0000-0000-000015046733
Cc: OAuth WG <oauth@ietf.org>, oauth-bounces@ietf.org
Subject: Re: [OAUTH-WG] draft-ietf-oauth-revocation
X-BeenThere: oauth@ietf.org
X-Mailman-Version: 2.1.12
Precedence: list
List-Id: OAUTH WG <oauth.ietf.org>
List-Unsubscribe: <https://www.ietf.org/mailman/options/oauth>, <mailto:oauth-request@ietf.org?subject=unsubscribe>
List-Archive: <http://www.ietf.org/mail-archive/web/oauth>
List-Post: <mailto:oauth@ietf.org>
List-Help: <mailto:oauth-request@ietf.org?subject=help>
List-Subscribe: <https://www.ietf.org/mailman/listinfo/oauth>, <mailto:oauth-request@ietf.org?subject=subscribe>
X-List-Received-Date: Tue, 05 Feb 2013 17:46:03 -0000

This is a multipart message in MIME format.
--=_alternative 005C255885257B09_=
Content-Type: text/plain; charset="US-ASCII"

> Could it do something with invalid_parameter that it couldn't do with 
invalid_token_parameter (among others), or vice versa? 

I'm not imagining a client doing anything programmatically useful with the 
distinction.





Todd Lainhart
Rational software
IBM Corporation
550 King Street, Littleton, MA 01460-1250
1-978-899-4705
2-276-4705 (T/L)
lainhart@us.ibm.com




From:   "Richer, Justin P." <jricher@mitre.org>
To:     George Fletcher <gffletch@aol.com>, 
Cc:     OAuth WG <oauth@ietf.org>
Date:   02/04/2013 04:10 PM
Subject:        Re: [OAUTH-WG] draft-ietf-oauth-revocation
Sent by:        oauth-bounces@ietf.org




On Feb 4, 2013, at 3:57 PM, George Fletcher <gffletch@aol.com>
 wrote:

> 
> On 2/4/13 3:41 PM, Richer, Justin P. wrote:
>> On Feb 3, 2013, at 8:01 AM, Torsten Lodderstedt 
<torsten@lodderstedt.net> wrote:
>> 
>> 
>>> - invalid_token error code: I propose to use the new error code 
"invalid_parameter" (as suggested by Peter and George). I don't see the 
need to register it (see 
http://www.ietf.org/mail-archive/web/oauth/current/msg10604.html) but 
would like to get your advice.
>> something more like "invalid_token_parameter" would maybe make sense, 
since it's not just *any* parameter, it's the special "token" parameter 
that we're talking about, but it's distinct from the invalid_token 
response. The introspection endpoint uses the same pattern of a token= 
parameter, but since the whole point of the introspection endpoint is 
determining token validity it doesn't actually throw an error here.
>> 
>> I agree that it doesn't need to be registered (since it's on a 
different endpoint).
> For what it's worth my thinking was that if we have an 
'invalid_parameter' error, then the description can define which parameter 
is invalid. I don't think we should create a bunch of specific error 
values that are endpoint specific and could overlap which is where the 
whole error return value started.
> 

Hm, I see what you're saying, but the error response is already endpoint 
specific. Though there is value in not having conflicting and/or confusing 
responses from different endpoints that use the same error code for 
different things. 

What it really comes down to is: what can the client do with this error? 
Could it do something with invalid_parameter that it couldn't do with 
invalid_token_parameter (among others), or vice versa? As I'm writing this 
out, I'm not convinced that it could, really, so this may be a bike 
shedding argument.

 -- Justin


_______________________________________________
OAuth mailing list
OAuth@ietf.org
https://www.ietf.org/mailman/listinfo/oauth



--=_alternative 005C255885257B09_=
Content-Type: text/html; charset="US-ASCII"

<font size=2 face="sans-serif">&gt; </font><tt><font size=2>Could it do
something with invalid_parameter that it couldn't do with invalid_token_parameter
(among others), or vice versa? </font></tt>
<br>
<br><font size=2 face="sans-serif">I'm not imagining a client doing anything
programmatically useful with the distinction.<br>
</font>
<br>
<table width=223 style="border-collapse:collapse;">
<tr height=8>
<td width=223 bgcolor=white style="border-style:solid;border-color:#000000;border-width:0px 0px 0px 0px;padding:0px 0px;"><font size=1 face="Verdana"><b><br>
<br>
<br>
Todd Lainhart<br>
Rational software<br>
IBM Corporation<br>
550 King Street, Littleton, MA 01460-1250</b></font><font size=1 face="Arial"><b><br>
1-978-899-4705<br>
2-276-4705 (T/L)<br>
lainhart@us.ibm.com</b></font></table>
<br>
<br>
<br>
<br>
<br><font size=1 color=#5f5f5f face="sans-serif">From: &nbsp; &nbsp; &nbsp;
&nbsp;</font><font size=1 face="sans-serif">&quot;Richer, Justin
P.&quot; &lt;jricher@mitre.org&gt;</font>
<br><font size=1 color=#5f5f5f face="sans-serif">To: &nbsp; &nbsp; &nbsp;
&nbsp;</font><font size=1 face="sans-serif">George Fletcher &lt;gffletch@aol.com&gt;,
</font>
<br><font size=1 color=#5f5f5f face="sans-serif">Cc: &nbsp; &nbsp; &nbsp;
&nbsp;</font><font size=1 face="sans-serif">OAuth WG &lt;oauth@ietf.org&gt;</font>
<br><font size=1 color=#5f5f5f face="sans-serif">Date: &nbsp; &nbsp; &nbsp;
&nbsp;</font><font size=1 face="sans-serif">02/04/2013 04:10 PM</font>
<br><font size=1 color=#5f5f5f face="sans-serif">Subject: &nbsp; &nbsp;
&nbsp; &nbsp;</font><font size=1 face="sans-serif">Re: [OAUTH-WG]
draft-ietf-oauth-revocation</font>
<br><font size=1 color=#5f5f5f face="sans-serif">Sent by: &nbsp; &nbsp;
&nbsp; &nbsp;</font><font size=1 face="sans-serif">oauth-bounces@ietf.org</font>
<br>
<hr noshade>
<br>
<br>
<br><tt><font size=2><br>
On Feb 4, 2013, at 3:57 PM, George Fletcher &lt;gffletch@aol.com&gt;<br>
 wrote:<br>
<br>
&gt; <br>
&gt; On 2/4/13 3:41 PM, Richer, Justin P. wrote:<br>
&gt;&gt; On Feb 3, 2013, at 8:01 AM, Torsten Lodderstedt &lt;torsten@lodderstedt.net&gt;
wrote:<br>
&gt;&gt; <br>
&gt;&gt; <br>
&gt;&gt;&gt; - invalid_token error code: I propose to use the new error
code &quot;invalid_parameter&quot; (as suggested by Peter and George).
I don't see the need to register it (see </font></tt><a href="http://www.ietf.org/mail-archive/web/oauth/current/msg10604.html"><tt><font size=2>http://www.ietf.org/mail-archive/web/oauth/current/msg10604.html</font></tt></a><tt><font size=2>)
but would like to get your advice.<br>
&gt;&gt; something more like &quot;invalid_token_parameter&quot; would
maybe make sense, since it's not just *any* parameter, it's the special
&quot;token&quot; parameter that we're talking about, but it's distinct
from the invalid_token response. The introspection endpoint uses the same
pattern of a token= parameter, but since the whole point of the introspection
endpoint is determining token validity it doesn't actually throw an error
here.<br>
&gt;&gt; <br>
&gt;&gt; I agree that it doesn't need to be registered (since it's on a
different endpoint).<br>
&gt; For what it's worth my thinking was that if we have an 'invalid_parameter'
error, then the description can define which parameter is invalid. I don't
think we should create a bunch of specific error values that are endpoint
specific and could overlap which is where the whole error return value
started.<br>
&gt; <br>
<br>
Hm, I see what you're saying, but the error response is already endpoint
specific. Though there is value in not having conflicting and/or confusing
responses from different endpoints that use the same error code for different
things. <br>
<br>
What it really comes down to is: what can the client do with this error?
Could it do something with invalid_parameter that it couldn't do with invalid_token_parameter
(among others), or vice versa? As I'm writing this out, I'm not convinced
that it could, really, so this may be a bike shedding argument.<br>
<br>
 -- Justin<br>
<br>
<br>
_______________________________________________<br>
OAuth mailing list<br>
OAuth@ietf.org<br>
</font></tt><a href=https://www.ietf.org/mailman/listinfo/oauth><tt><font size=2>https://www.ietf.org/mailman/listinfo/oauth</font></tt></a><tt><font size=2><br>
<br>
</font></tt>
<br>
--=_alternative 005C255885257B09_=--


From torsten@lodderstedt.net  Tue Feb  5 11:41:23 2013
Return-Path: <torsten@lodderstedt.net>
X-Original-To: oauth@ietfa.amsl.com
Delivered-To: oauth@ietfa.amsl.com
Received: from localhost (localhost [127.0.0.1]) by ietfa.amsl.com (Postfix) with ESMTP id BE3CF21F869F; Tue,  5 Feb 2013 11:41:23 -0800 (PST)
X-Virus-Scanned: amavisd-new at amsl.com
X-Spam-Flag: NO
X-Spam-Score: -1.55
X-Spam-Level: 
X-Spam-Status: No, score=-1.55 tagged_above=-999 required=5 tests=[AWL=-0.698,  BAYES_00=-2.599, HELO_EQ_DE=0.35, HTML_MESSAGE=0.001, MIME_QP_LONG_LINE=1.396]
Received: from mail.ietf.org ([64.170.98.30]) by localhost (ietfa.amsl.com [127.0.0.1]) (amavisd-new, port 10024) with ESMTP id tzey5-sNSIHG; Tue,  5 Feb 2013 11:41:23 -0800 (PST)
Received: from smtprelay02.ispgateway.de (smtprelay02.ispgateway.de [80.67.18.44]) by ietfa.amsl.com (Postfix) with ESMTP id 9308721F8697; Tue,  5 Feb 2013 11:41:22 -0800 (PST)
Received: from [91.2.92.91] (helo=[192.168.71.56]) by smtprelay02.ispgateway.de with esmtpsa (TLSv1:AES128-SHA:128) (Exim 4.68) (envelope-from <torsten@lodderstedt.net>) id 1U2oOL-0002F9-Uy; Tue, 05 Feb 2013 20:41:18 +0100
References: <510E5FB5.10803@lodderstedt.net> <B33BFB58CCC8BE4998958016839DE27E06886427@IMCMBX01.MITRE.ORG> <511020D3.1090201@aol.com> <B33BFB58CCC8BE4998958016839DE27E068865E3@IMCMBX01.MITRE.ORG> <OF2060C435.DEAE300A-ON85257B09.005BEF8B-85257B09.005C2559@us.ibm.com>
Mime-Version: 1.0 (1.0)
In-Reply-To: <OF2060C435.DEAE300A-ON85257B09.005BEF8B-85257B09.005C2559@us.ibm.com>
Content-Type: multipart/alternative; boundary=Apple-Mail-8B1A01EF-1411-4096-A29C-71F4FD1A91EA
Content-Transfer-Encoding: 7bit
Message-Id: <2DC4D4CA-C65F-4B7D-96E3-A811B303B15A@lodderstedt.net>
X-Mailer: iPad Mail (10B141)
From: Torsten Lodderstedt <torsten@lodderstedt.net>
Date: Tue, 5 Feb 2013 20:41:18 +0100
To: Todd W Lainhart <lainhart@us.ibm.com>
X-Df-Sender: dG9yc3RlbkBsb2RkZXJzdGVkdC1vbmxpbmUuZGU=
Cc: "oauth-bounces@ietf.org" <oauth-bounces@ietf.org>, OAuth WG <oauth@ietf.org>
Subject: Re: [OAUTH-WG] draft-ietf-oauth-revocation
X-BeenThere: oauth@ietf.org
X-Mailman-Version: 2.1.12
Precedence: list
List-Id: OAUTH WG <oauth.ietf.org>
List-Unsubscribe: <https://www.ietf.org/mailman/options/oauth>, <mailto:oauth-request@ietf.org?subject=unsubscribe>
List-Archive: <http://www.ietf.org/mail-archive/web/oauth>
List-Post: <mailto:oauth@ietf.org>
List-Help: <mailto:oauth-request@ietf.org?subject=help>
List-Subscribe: <https://www.ietf.org/mailman/listinfo/oauth>, <mailto:oauth-request@ietf.org?subject=subscribe>
X-List-Received-Date: Tue, 05 Feb 2013 19:41:23 -0000

--Apple-Mail-8B1A01EF-1411-4096-A29C-71F4FD1A91EA
Content-Type: text/plain;
	charset=us-ascii
Content-Transfer-Encoding: quoted-printable

Why not adopting Bill's suggestion and just return HTTP status code 200 for (=
already) invalid tokens?

regards,
Torsten.

Am 05.02.2013 um 17:46 schrieb Todd W Lainhart <lainhart@us.ibm.com>:

> > Could it do something with invalid_parameter that it couldn't do with in=
valid_token_parameter (among others), or vice versa?=20
>=20
> I'm not imagining a client doing anything programmatically useful with the=
 distinction.
>=20
>=20
>=20
>=20
> Todd Lainhart
> Rational software
> IBM Corporation
> 550 King Street, Littleton, MA 01460-1250
> 1-978-899-4705
> 2-276-4705 (T/L)
> lainhart@us.ibm.com
>=20
>=20
>=20
>=20
>=20
> From:        "Richer, Justin P." <jricher@mitre.org>=20
> To:        George Fletcher <gffletch@aol.com>,=20
> Cc:        OAuth WG <oauth@ietf.org>=20
> Date:        02/04/2013 04:10 PM=20
> Subject:        Re: [OAUTH-WG] draft-ietf-oauth-revocation=20
> Sent by:        oauth-bounces@ietf.org=20
>=20
>=20
>=20
>=20
> On Feb 4, 2013, at 3:57 PM, George Fletcher <gffletch@aol.com>
> wrote:
>=20
> >=20
> > On 2/4/13 3:41 PM, Richer, Justin P. wrote:
> >> On Feb 3, 2013, at 8:01 AM, Torsten Lodderstedt <torsten@lodderstedt.ne=
t> wrote:
> >>=20
> >>=20
> >>> - invalid_token error code: I propose to use the new error code "inval=
id_parameter" (as suggested by Peter and George). I don't see the need to re=
gister it (see http://www.ietf.org/mail-archive/web/oauth/current/msg10604.h=
tml) but would like to get your advice.
> >> something more like "invalid_token_parameter" would maybe make sense, s=
ince it's not just *any* parameter, it's the special "token" parameter that w=
e're talking about, but it's distinct from the invalid_token response. The i=
ntrospection endpoint uses the same pattern of a token=3D parameter, but sin=
ce the whole point of the introspection endpoint is determining token validi=
ty it doesn't actually throw an error here.
> >>=20
> >> I agree that it doesn't need to be registered (since it's on a differen=
t endpoint).
> > For what it's worth my thinking was that if we have an 'invalid_paramete=
r' error, then the description can define which parameter is invalid. I don'=
t think we should create a bunch of specific error values that are endpoint s=
pecific and could overlap which is where the whole error return value starte=
d.
> >=20
>=20
> Hm, I see what you're saying, but the error response is already endpoint s=
pecific. Though there is value in not having conflicting and/or confusing re=
sponses from different endpoints that use the same error code for different t=
hings.=20
>=20
> What it really comes down to is: what can the client do with this error? C=
ould it do something with invalid_parameter that it couldn't do with invalid=
_token_parameter (among others), or vice versa? As I'm writing this out, I'm=
 not convinced that it could, really, so this may be a bike shedding argumen=
t.
>=20
> -- Justin
>=20
>=20
> _______________________________________________
> OAuth mailing list
> OAuth@ietf.org
> https://www.ietf.org/mailman/listinfo/oauth
>=20
>=20
> _______________________________________________
> OAuth mailing list
> OAuth@ietf.org
> https://www.ietf.org/mailman/listinfo/oauth

--Apple-Mail-8B1A01EF-1411-4096-A29C-71F4FD1A91EA
Content-Type: text/html;
	charset=utf-8
Content-Transfer-Encoding: 7bit

<html><head><meta http-equiv="content-type" content="text/html; charset=utf-8"></head><body dir="auto"><div>Why not adopting Bill's suggestion and just return HTTP status code 200 for (already) invalid tokens?</div><div><br></div><div>regards,</div><div>Torsten.</div><div><br>Am 05.02.2013 um 17:46 schrieb Todd W Lainhart &lt;<a href="mailto:lainhart@us.ibm.com">lainhart@us.ibm.com</a>&gt;:<br><br></div><blockquote type="cite"><div><font size="2" face="sans-serif">&gt; </font><tt><font size="2">Could it do
something with invalid_parameter that it couldn't do with invalid_token_parameter
(among others), or vice versa? </font></tt>
<br>
<br><font size="2" face="sans-serif">I'm not imagining a client doing anything
programmatically useful with the distinction.<br>
</font>
<br>
<table width="223" style="border-collapse:collapse;">
<tbody><tr height="8">
<td width="223" bgcolor="white" style="border-style:solid;border-color:#000000;border-width:0px 0px 0px 0px;padding:0px 0px;"><font size="1" face="Verdana"><b><br>
<br>
<br>
Todd Lainhart<br>
Rational software<br>
IBM Corporation<br>
550 King Street, Littleton, MA 01460-1250</b></font><font size="1" face="Arial"><b><br>
1-978-899-4705<br>
2-276-4705 (T/L)<br>
<a href="mailto:lainhart@us.ibm.com">lainhart@us.ibm.com</a></b></font></td></tr></tbody></table>
<br>
<br>
<br>
<br>
<br><font size="1" color="#5f5f5f" face="sans-serif">From: &nbsp; &nbsp; &nbsp;
&nbsp;</font><font size="1" face="sans-serif">"Richer, Justin
P." &lt;<a href="mailto:jricher@mitre.org">jricher@mitre.org</a>&gt;</font>
<br><font size="1" color="#5f5f5f" face="sans-serif">To: &nbsp; &nbsp; &nbsp;
&nbsp;</font><font size="1" face="sans-serif">George Fletcher &lt;<a href="mailto:gffletch@aol.com">gffletch@aol.com</a>&gt;,
</font>
<br><font size="1" color="#5f5f5f" face="sans-serif">Cc: &nbsp; &nbsp; &nbsp;
&nbsp;</font><font size="1" face="sans-serif">OAuth WG &lt;<a href="mailto:oauth@ietf.org">oauth@ietf.org</a>&gt;</font>
<br><font size="1" color="#5f5f5f" face="sans-serif">Date: &nbsp; &nbsp; &nbsp;
&nbsp;</font><font size="1" face="sans-serif">02/04/2013 04:10 PM</font>
<br><font size="1" color="#5f5f5f" face="sans-serif">Subject: &nbsp; &nbsp;
&nbsp; &nbsp;</font><font size="1" face="sans-serif">Re: [OAUTH-WG]
draft-ietf-oauth-revocation</font>
<br><font size="1" color="#5f5f5f" face="sans-serif">Sent by: &nbsp; &nbsp;
&nbsp; &nbsp;</font><font size="1" face="sans-serif"><a href="mailto:oauth-bounces@ietf.org">oauth-bounces@ietf.org</a></font>
<br>
<hr noshade="">
<br>
<br>
<br><tt><font size="2"><br>
On Feb 4, 2013, at 3:57 PM, George Fletcher &lt;<a href="mailto:gffletch@aol.com">gffletch@aol.com</a>&gt;<br>
 wrote:<br>
<br>
&gt; <br>
&gt; On 2/4/13 3:41 PM, Richer, Justin P. wrote:<br>
&gt;&gt; On Feb 3, 2013, at 8:01 AM, Torsten Lodderstedt &lt;<a href="mailto:torsten@lodderstedt.net">torsten@lodderstedt.net</a>&gt;
wrote:<br>
&gt;&gt; <br>
&gt;&gt; <br>
&gt;&gt;&gt; - invalid_token error code: I propose to use the new error
code "invalid_parameter" (as suggested by Peter and George).
I don't see the need to register it (see </font></tt><a href="http://www.ietf.org/mail-archive/web/oauth/current/msg10604.html"><tt><font size="2">http://www.ietf.org/mail-archive/web/oauth/current/msg10604.html</font></tt></a><tt><font size="2">)
but would like to get your advice.<br>
&gt;&gt; something more like "invalid_token_parameter" would
maybe make sense, since it's not just *any* parameter, it's the special
"token" parameter that we're talking about, but it's distinct
from the invalid_token response. The introspection endpoint uses the same
pattern of a token= parameter, but since the whole point of the introspection
endpoint is determining token validity it doesn't actually throw an error
here.<br>
&gt;&gt; <br>
&gt;&gt; I agree that it doesn't need to be registered (since it's on a
different endpoint).<br>
&gt; For what it's worth my thinking was that if we have an 'invalid_parameter'
error, then the description can define which parameter is invalid. I don't
think we should create a bunch of specific error values that are endpoint
specific and could overlap which is where the whole error return value
started.<br>
&gt; <br>
<br>
Hm, I see what you're saying, but the error response is already endpoint
specific. Though there is value in not having conflicting and/or confusing
responses from different endpoints that use the same error code for different
things. <br>
<br>
What it really comes down to is: what can the client do with this error?
Could it do something with invalid_parameter that it couldn't do with invalid_token_parameter
(among others), or vice versa? As I'm writing this out, I'm not convinced
that it could, really, so this may be a bike shedding argument.<br>
<br>
 -- Justin<br>
<br>
<br>
_______________________________________________<br>
OAuth mailing list<br>
<a href="mailto:OAuth@ietf.org">OAuth@ietf.org</a><br>
</font></tt><a href="https://www.ietf.org/mailman/listinfo/oauth"><tt><font size="2">https://www.ietf.org/mailman/listinfo/oauth</font></tt></a><tt><font size="2"><br>
<br>
</font></tt>
<br></div></blockquote><blockquote type="cite"><div><span>_______________________________________________</span><br><span>OAuth mailing list</span><br><span><a href="mailto:OAuth@ietf.org">OAuth@ietf.org</a></span><br><span><a href="https://www.ietf.org/mailman/listinfo/oauth">https://www.ietf.org/mailman/listinfo/oauth</a></span><br></div></blockquote></body></html>
--Apple-Mail-8B1A01EF-1411-4096-A29C-71F4FD1A91EA--

From jricher@mitre.org  Tue Feb  5 11:49:51 2013
Return-Path: <jricher@mitre.org>
X-Original-To: oauth@ietfa.amsl.com
Delivered-To: oauth@ietfa.amsl.com
Received: from localhost (localhost [127.0.0.1]) by ietfa.amsl.com (Postfix) with ESMTP id B477621F8614; Tue,  5 Feb 2013 11:49:51 -0800 (PST)
X-Virus-Scanned: amavisd-new at amsl.com
X-Spam-Flag: NO
X-Spam-Score: -6.568
X-Spam-Level: 
X-Spam-Status: No, score=-6.568 tagged_above=-999 required=5 tests=[AWL=0.030,  BAYES_00=-2.599, HTML_MESSAGE=0.001, RCVD_IN_DNSWL_MED=-4]
Received: from mail.ietf.org ([64.170.98.30]) by localhost (ietfa.amsl.com [127.0.0.1]) (amavisd-new, port 10024) with ESMTP id CqjcQgYk6jhT; Tue,  5 Feb 2013 11:49:50 -0800 (PST)
Received: from smtpksrv1.mitre.org (smtpksrv1.mitre.org [198.49.146.77]) by ietfa.amsl.com (Postfix) with ESMTP id 96AD621F85D4; Tue,  5 Feb 2013 11:49:50 -0800 (PST)
Received: from smtpksrv1.mitre.org (localhost.localdomain [127.0.0.1]) by localhost (Postfix) with SMTP id D9A581F113E; Tue,  5 Feb 2013 14:49:49 -0500 (EST)
Received: from IMCCAS03.MITRE.ORG (imccas03.mitre.org [129.83.29.80]) by smtpksrv1.mitre.org (Postfix) with ESMTP id E0C10531136A; Tue,  5 Feb 2013 14:49:48 -0500 (EST)
Received: from [10.146.15.29] (129.83.31.58) by IMCCAS03.MITRE.ORG (129.83.29.80) with Microsoft SMTP Server (TLS) id 14.2.318.4; Tue, 5 Feb 2013 14:49:48 -0500
Message-ID: <51116239.7030104@mitre.org>
Date: Tue, 5 Feb 2013 14:49:13 -0500
From: Justin Richer <jricher@mitre.org>
User-Agent: Mozilla/5.0 (X11; Linux i686; rv:17.0) Gecko/20130106 Thunderbird/17.0.2
MIME-Version: 1.0
To: Torsten Lodderstedt <torsten@lodderstedt.net>
References: <510E5FB5.10803@lodderstedt.net> <B33BFB58CCC8BE4998958016839DE27E06886427@IMCMBX01.MITRE.ORG> <511020D3.1090201@aol.com> <B33BFB58CCC8BE4998958016839DE27E068865E3@IMCMBX01.MITRE.ORG> <OF2060C435.DEAE300A-ON85257B09.005BEF8B-85257B09.005C2559@us.ibm.com> <2DC4D4CA-C65F-4B7D-96E3-A811B303B15A@lodderstedt.net>
In-Reply-To: <2DC4D4CA-C65F-4B7D-96E3-A811B303B15A@lodderstedt.net>
Content-Type: multipart/alternative; boundary="------------070205040608040806020508"
X-Originating-IP: [129.83.31.58]
Cc: OAuth WG <oauth@ietf.org>, "oauth-bounces@ietf.org" <oauth-bounces@ietf.org>
Subject: Re: [OAUTH-WG] draft-ietf-oauth-revocation
X-BeenThere: oauth@ietf.org
X-Mailman-Version: 2.1.12
Precedence: list
List-Id: OAUTH WG <oauth.ietf.org>
List-Unsubscribe: <https://www.ietf.org/mailman/options/oauth>, <mailto:oauth-request@ietf.org?subject=unsubscribe>
List-Archive: <http://www.ietf.org/mail-archive/web/oauth>
List-Post: <mailto:oauth@ietf.org>
List-Help: <mailto:oauth-request@ietf.org?subject=help>
List-Subscribe: <https://www.ietf.org/mailman/listinfo/oauth>, <mailto:oauth-request@ietf.org?subject=subscribe>
X-List-Received-Date: Tue, 05 Feb 2013 19:49:51 -0000

--------------070205040608040806020508
Content-Type: text/plain; charset="UTF-8"; format=flowed
Content-Transfer-Encoding: 7bit

You know, that works as well. From the client's perspective, the token 
isn't good anymore. The client shouldn't care if the token was good in 
the first place if it's revoking it.

  -- Justin


On 02/05/2013 02:41 PM, Torsten Lodderstedt wrote:
> Why not adopting Bill's suggestion and just return HTTP status code 
> 200 for (already) invalid tokens?
>
> regards,
> Torsten.
>
> Am 05.02.2013 um 17:46 schrieb Todd W Lainhart <lainhart@us.ibm.com 
> <mailto:lainhart@us.ibm.com>>:
>
>> > Could it do something with invalid_parameter that it couldn't do 
>> with invalid_token_parameter (among others), or vice versa?
>>
>> I'm not imagining a client doing anything programmatically useful 
>> with the distinction.
>>
>> *
>>
>>
>> Todd Lainhart
>> Rational software
>> IBM Corporation
>> 550 King Street, Littleton, MA 01460-1250**
>> 1-978-899-4705
>> 2-276-4705 (T/L)
>> lainhart@us.ibm.com <mailto:lainhart@us.ibm.com>*
>>
>>
>>
>>
>>
>>
>> From: "Richer, Justin P." <jricher@mitre.org <mailto:jricher@mitre.org>>
>> To: George Fletcher <gffletch@aol.com <mailto:gffletch@aol.com>>,
>> Cc: OAuth WG <oauth@ietf.org <mailto:oauth@ietf.org>>
>> Date: 02/04/2013 04:10 PM
>> Subject: Re: [OAUTH-WG] draft-ietf-oauth-revocation
>> Sent by: oauth-bounces@ietf.org <mailto:oauth-bounces@ietf.org>
>> ------------------------------------------------------------------------
>>
>>
>>
>>
>> On Feb 4, 2013, at 3:57 PM, George Fletcher <gffletch@aol.com 
>> <mailto:gffletch@aol.com>>
>> wrote:
>>
>> >
>> > On 2/4/13 3:41 PM, Richer, Justin P. wrote:
>> >> On Feb 3, 2013, at 8:01 AM, Torsten Lodderstedt 
>> <torsten@lodderstedt.net <mailto:torsten@lodderstedt.net>> wrote:
>> >>
>> >>
>> >>> - invalid_token error code: I propose to use the new error code 
>> "invalid_parameter" (as suggested by Peter and George). I don't see 
>> the need to register it (see 
>> http://www.ietf.org/mail-archive/web/oauth/current/msg10604.html) but 
>> would like to get your advice.
>> >> something more like "invalid_token_parameter" would maybe make 
>> sense, since it's not just *any* parameter, it's the special "token" 
>> parameter that we're talking about, but it's distinct from the 
>> invalid_token response. The introspection endpoint uses the same 
>> pattern of a token= parameter, but since the whole point of the 
>> introspection endpoint is determining token validity it doesn't 
>> actually throw an error here.
>> >>
>> >> I agree that it doesn't need to be registered (since it's on a 
>> different endpoint).
>> > For what it's worth my thinking was that if we have an 
>> 'invalid_parameter' error, then the description can define which 
>> parameter is invalid. I don't think we should create a bunch of 
>> specific error values that are endpoint specific and could overlap 
>> which is where the whole error return value started.
>> >
>>
>> Hm, I see what you're saying, but the error response is already 
>> endpoint specific. Though there is value in not having conflicting 
>> and/or confusing responses from different endpoints that use the same 
>> error code for different things.
>>
>> What it really comes down to is: what can the client do with this 
>> error? Could it do something with invalid_parameter that it couldn't 
>> do with invalid_token_parameter (among others), or vice versa? As I'm 
>> writing this out, I'm not convinced that it could, really, so this 
>> may be a bike shedding argument.
>>
>> -- Justin
>>
>>
>> _______________________________________________
>> OAuth mailing list
>> OAuth@ietf.org <mailto:OAuth@ietf.org>
>> https://www.ietf.org/mailman/listinfo/oauth
>>
>>
>> _______________________________________________
>> OAuth mailing list
>> OAuth@ietf.org <mailto:OAuth@ietf.org>
>> https://www.ietf.org/mailman/listinfo/oauth


--------------070205040608040806020508
Content-Type: text/html; charset="UTF-8"
Content-Transfer-Encoding: 8bit

<html>
  <head>
    <meta content="text/html; charset=UTF-8" http-equiv="Content-Type">
  </head>
  <body bgcolor="#FFFFFF" text="#000000">
    You know, that works as well. From the client's perspective, the
    token isn't good anymore. The client shouldn't care if the token was
    good in the first place if it's revoking it.<br>
    <br>
    Â -- Justin<br>
    <br>
    <br>
    <div class="moz-cite-prefix">On 02/05/2013 02:41 PM, Torsten
      Lodderstedt wrote:<br>
    </div>
    <blockquote
      cite="mid:2DC4D4CA-C65F-4B7D-96E3-A811B303B15A@lodderstedt.net"
      type="cite">
      <meta http-equiv="Content-Type" content="text/html; charset=UTF-8">
      <div>Why not adopting Bill's suggestion and just return HTTP
        status code 200 for (already) invalid tokens?</div>
      <div><br>
      </div>
      <div>regards,</div>
      <div>Torsten.</div>
      <div><br>
        Am 05.02.2013 um 17:46 schrieb Todd W Lainhart &lt;<a
          moz-do-not-send="true" href="mailto:lainhart@us.ibm.com">lainhart@us.ibm.com</a>&gt;:<br>
        <br>
      </div>
      <blockquote type="cite">
        <div><font face="sans-serif" size="2">&gt; </font><tt><font
              size="2">Could it do
              something with invalid_parameter that it couldn't do with
              invalid_token_parameter
              (among others), or vice versa? </font></tt>
          <br>
          <br>
          <font face="sans-serif" size="2">I'm not imagining a client
            doing anything
            programmatically useful with the distinction.<br>
          </font>
          <br>
          <table style="border-collapse:collapse;" width="223">
            <tbody>
              <tr height="8">
                <td
                  style="border-style:solid;border-color:#000000;border-width:0px
                  0px 0px 0px;padding:0px 0px;" bgcolor="white"
                  width="223"><font face="Verdana" size="1"><b><br>
                      <br>
                      <br>
                      Todd Lainhart<br>
                      Rational software<br>
                      IBM Corporation<br>
                      550 King Street, Littleton, MA 01460-1250</b></font><font
                    face="Arial" size="1"><b><br>
                      1-978-899-4705<br>
                      2-276-4705 (T/L)<br>
                      <a moz-do-not-send="true"
                        href="mailto:lainhart@us.ibm.com">lainhart@us.ibm.com</a></b></font></td>
              </tr>
            </tbody>
          </table>
          <br>
          <br>
          <br>
          <br>
          <br>
          <font color="#5f5f5f" face="sans-serif" size="1">From: Â  Â  Â 
            Â </font><font face="sans-serif" size="1">"Richer, Justin
            P." &lt;<a moz-do-not-send="true"
              href="mailto:jricher@mitre.org">jricher@mitre.org</a>&gt;</font>
          <br>
          <font color="#5f5f5f" face="sans-serif" size="1">To: Â  Â  Â 
            Â </font><font face="sans-serif" size="1">George Fletcher
            &lt;<a moz-do-not-send="true" href="mailto:gffletch@aol.com">gffletch@aol.com</a>&gt;,
          </font>
          <br>
          <font color="#5f5f5f" face="sans-serif" size="1">Cc: Â  Â  Â 
            Â </font><font face="sans-serif" size="1">OAuth WG &lt;<a
              moz-do-not-send="true" href="mailto:oauth@ietf.org">oauth@ietf.org</a>&gt;</font>
          <br>
          <font color="#5f5f5f" face="sans-serif" size="1">Date: Â  Â  Â 
            Â </font><font face="sans-serif" size="1">02/04/2013 04:10 PM</font>
          <br>
          <font color="#5f5f5f" face="sans-serif" size="1">Subject: Â  Â 
            Â  Â </font><font face="sans-serif" size="1">Re: [OAUTH-WG]
            draft-ietf-oauth-revocation</font>
          <br>
          <font color="#5f5f5f" face="sans-serif" size="1">Sent by: Â  Â 
            Â  Â </font><font face="sans-serif" size="1"><a
              moz-do-not-send="true"
              href="mailto:oauth-bounces@ietf.org">oauth-bounces@ietf.org</a></font>
          <br>
          <hr noshade="noshade">
          <br>
          <br>
          <br>
          <tt><font size="2"><br>
              On Feb 4, 2013, at 3:57 PM, George Fletcher &lt;<a
                moz-do-not-send="true" href="mailto:gffletch@aol.com">gffletch@aol.com</a>&gt;<br>
              wrote:<br>
              <br>
              &gt; <br>
              &gt; On 2/4/13 3:41 PM, Richer, Justin P. wrote:<br>
              &gt;&gt; On Feb 3, 2013, at 8:01 AM, Torsten Lodderstedt
              &lt;<a moz-do-not-send="true"
                href="mailto:torsten@lodderstedt.net">torsten@lodderstedt.net</a>&gt;
              wrote:<br>
              &gt;&gt; <br>
              &gt;&gt; <br>
              &gt;&gt;&gt; - invalid_token error code: I propose to use
              the new error
              code "invalid_parameter" (as suggested by Peter and
              George).
              I don't see the need to register it (see </font></tt><a
            moz-do-not-send="true"
            href="http://www.ietf.org/mail-archive/web/oauth/current/msg10604.html"><tt><font
                size="2">http://www.ietf.org/mail-archive/web/oauth/current/msg10604.html</font></tt></a><tt><font
              size="2">)
              but would like to get your advice.<br>
              &gt;&gt; something more like "invalid_token_parameter"
              would
              maybe make sense, since it's not just *any* parameter,
              it's the special
              "token" parameter that we're talking about, but it's
              distinct
              from the invalid_token response. The introspection
              endpoint uses the same
              pattern of a token= parameter, but since the whole point
              of the introspection
              endpoint is determining token validity it doesn't actually
              throw an error
              here.<br>
              &gt;&gt; <br>
              &gt;&gt; I agree that it doesn't need to be registered
              (since it's on a
              different endpoint).<br>
              &gt; For what it's worth my thinking was that if we have
              an 'invalid_parameter'
              error, then the description can define which parameter is
              invalid. I don't
              think we should create a bunch of specific error values
              that are endpoint
              specific and could overlap which is where the whole error
              return value
              started.<br>
              &gt; <br>
              <br>
              Hm, I see what you're saying, but the error response is
              already endpoint
              specific. Though there is value in not having conflicting
              and/or confusing
              responses from different endpoints that use the same error
              code for different
              things. <br>
              <br>
              What it really comes down to is: what can the client do
              with this error?
              Could it do something with invalid_parameter that it
              couldn't do with invalid_token_parameter
              (among others), or vice versa? As I'm writing this out,
              I'm not convinced
              that it could, really, so this may be a bike shedding
              argument.<br>
              <br>
              -- Justin<br>
              <br>
              <br>
              _______________________________________________<br>
              OAuth mailing list<br>
              <a moz-do-not-send="true" href="mailto:OAuth@ietf.org">OAuth@ietf.org</a><br>
            </font></tt><a moz-do-not-send="true"
            href="https://www.ietf.org/mailman/listinfo/oauth"><tt><font
                size="2">https://www.ietf.org/mailman/listinfo/oauth</font></tt></a><tt><font
              size="2"><br>
              <br>
            </font></tt>
          <br>
        </div>
      </blockquote>
      <blockquote type="cite">
        <div><span>_______________________________________________</span><br>
          <span>OAuth mailing list</span><br>
          <span><a moz-do-not-send="true" href="mailto:OAuth@ietf.org">OAuth@ietf.org</a></span><br>
          <span><a moz-do-not-send="true"
              href="https://www.ietf.org/mailman/listinfo/oauth">https://www.ietf.org/mailman/listinfo/oauth</a></span><br>
        </div>
      </blockquote>
    </blockquote>
    <br>
  </body>
</html>

--------------070205040608040806020508--

From prabath@wso2.com  Tue Feb  5 11:53:12 2013
Return-Path: <prabath@wso2.com>
X-Original-To: oauth@ietfa.amsl.com
Delivered-To: oauth@ietfa.amsl.com
Received: from localhost (localhost [127.0.0.1]) by ietfa.amsl.com (Postfix) with ESMTP id 412DA21F863C for <oauth@ietfa.amsl.com>; Tue,  5 Feb 2013 11:53:11 -0800 (PST)
X-Virus-Scanned: amavisd-new at amsl.com
X-Spam-Flag: NO
X-Spam-Score: -2.364
X-Spam-Level: 
X-Spam-Status: No, score=-2.364 tagged_above=-999 required=5 tests=[AWL=0.613,  BAYES_00=-2.599, FM_FORGED_GMAIL=0.622, HTML_MESSAGE=0.001, RCVD_IN_DNSWL_LOW=-1]
Received: from mail.ietf.org ([64.170.98.30]) by localhost (ietfa.amsl.com [127.0.0.1]) (amavisd-new, port 10024) with ESMTP id gQ5RZqzK25OW for <oauth@ietfa.amsl.com>; Tue,  5 Feb 2013 11:53:08 -0800 (PST)
Received: from mail-ee0-f47.google.com (mail-ee0-f47.google.com [74.125.83.47]) by ietfa.amsl.com (Postfix) with ESMTP id AABFB21F8614 for <oauth@ietf.org>; Tue,  5 Feb 2013 11:53:00 -0800 (PST)
Received: by mail-ee0-f47.google.com with SMTP id e52so344637eek.34 for <oauth@ietf.org>; Tue, 05 Feb 2013 11:52:59 -0800 (PST)
X-Google-DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=google.com; s=20120113; h=mime-version:x-received:date:message-id:subject:from:to :content-type:x-gm-message-state; bh=mh68plrofxjb0vflu0teDPpDP0R6ZdeenyJu4hf2KZM=; b=BAfwBHyPV/AteQtZkoCHlpWCpR3d3bw9UT3onmwCwfe5liXjOjiW0YVpfry1vzqGeF eT6YtCIgh0J0qts7q8ym5FrX5rD5q0A0IvomqINv2XOkXSg/Kd5ItEWGZe+a8n1EOPn1 q2iJQlu0id8rD3x4Tx3IhqsYfe+X4CCePFIBbZh79QRgM2Rq4yR5x3WoTkECwZfnkKRb lTqa9ZMt3ZecxLoR29FB3WIvnRbCrEkCsEiQRvThIflMyM/ddGlzuGUK3e7xiZjQ1BbH CBE21QrWiqkmnYJacrG9qNRJDv6KhMZLlvmvjltQ2daoadfdDzwT1ADyDD76AJcng9Zq GAFg==
MIME-Version: 1.0
X-Received: by 10.14.178.196 with SMTP id f44mr87984293eem.14.1360093979618; Tue, 05 Feb 2013 11:52:59 -0800 (PST)
Received: by 10.223.175.134 with HTTP; Tue, 5 Feb 2013 11:52:59 -0800 (PST)
Date: Wed, 6 Feb 2013 01:22:59 +0530
Message-ID: <CAJV9qO_J1-AhGB=XST0R-kwAd-9hjUbCJ4ieBPoE_OMe760mqg@mail.gmail.com>
From: Prabath Siriwardena <prabath@wso2.com>
To: "oauth@ietf.org WG" <oauth@ietf.org>
Content-Type: multipart/alternative; boundary=047d7b622520842d2504d4ff8ea9
X-Gm-Message-State: ALoCoQlMPuAxdmF0+E7E4C8jmNcz6vRdboICZ2sWLaC17tTKs4rO+f7bvbKfdmUWqdj4jRcsuEzx
Subject: [OAUTH-WG] Why OAuth it self is not an authentication framework ?
X-BeenThere: oauth@ietf.org
X-Mailman-Version: 2.1.12
Precedence: list
List-Id: OAUTH WG <oauth.ietf.org>
List-Unsubscribe: <https://www.ietf.org/mailman/options/oauth>, <mailto:oauth-request@ietf.org?subject=unsubscribe>
List-Archive: <http://www.ietf.org/mail-archive/web/oauth>
List-Post: <mailto:oauth@ietf.org>
List-Help: <mailto:oauth-request@ietf.org?subject=help>
List-Subscribe: <https://www.ietf.org/mailman/listinfo/oauth>, <mailto:oauth-request@ietf.org?subject=subscribe>
X-List-Received-Date: Tue, 05 Feb 2013 19:53:12 -0000

--047d7b622520842d2504d4ff8ea9
Content-Type: text/plain; charset=ISO-8859-1

FYI and for your comments..

http://blog.facilelogin.com/2013/02/why-oauth-it-self-is-not-authentication.html

Thanks & Regards,
Prabath

Mobile : +94 71 809 6732

http://blog.facilelogin.com
http://RampartFAQ.com

--047d7b622520842d2504d4ff8ea9
Content-Type: text/html; charset=ISO-8859-1
Content-Transfer-Encoding: quoted-printable

FYI and for your comments..<div><br></div><div><a href=3D"http://blog.facil=
elogin.com/2013/02/why-oauth-it-self-is-not-authentication.html">http://blo=
g.facilelogin.com/2013/02/why-oauth-it-self-is-not-authentication.html</a><=
br clear=3D"all">
<div>=A0</div>Thanks &amp; Regards,<br>Prabath<div><br></div><div>Mobile : =
+94 71 809 6732=A0<br><br><a href=3D"http://blog.facilelogin.com" target=3D=
"_blank">http://blog.facilelogin.com</a><br><a href=3D"http://RampartFAQ.co=
m" target=3D"_blank">http://RampartFAQ.com</a></div>

</div>

--047d7b622520842d2504d4ff8ea9--

From pranamcs@sg.ibm.com  Tue Feb  5 12:08:10 2013
Return-Path: <pranamcs@sg.ibm.com>
X-Original-To: oauth@ietfa.amsl.com
Delivered-To: oauth@ietfa.amsl.com
Received: from localhost (localhost [127.0.0.1]) by ietfa.amsl.com (Postfix) with ESMTP id DEBCF21F85B2 for <oauth@ietfa.amsl.com>; Tue,  5 Feb 2013 12:08:10 -0800 (PST)
X-Virus-Scanned: amavisd-new at amsl.com
X-Spam-Flag: NO
X-Spam-Score: -4.739
X-Spam-Level: 
X-Spam-Status: No, score=-4.739 tagged_above=-999 required=5 tests=[BAYES_20=-0.74, HTML_MESSAGE=0.001, RCVD_IN_DNSWL_MED=-4]
Received: from mail.ietf.org ([64.170.98.30]) by localhost (ietfa.amsl.com [127.0.0.1]) (amavisd-new, port 10024) with ESMTP id PH+7pqPaZgsK for <oauth@ietfa.amsl.com>; Tue,  5 Feb 2013 12:08:06 -0800 (PST)
Received: from e23smtp04.au.ibm.com (e23smtp04.au.ibm.com [202.81.31.146]) by ietfa.amsl.com (Postfix) with ESMTP id 6D7BA21F85AF for <oauth@ietf.org>; Tue,  5 Feb 2013 12:08:05 -0800 (PST)
Received: from /spool/local by e23smtp04.au.ibm.com with IBM ESMTP SMTP Gateway: Authorized Use Only! Violators will be prosecuted for <oauth@ietf.org> from <pranamcs@sg.ibm.com>; Wed, 6 Feb 2013 05:59:22 +1000
Received: from d23dlp03.au.ibm.com (202.81.31.214) by e23smtp04.au.ibm.com (202.81.31.210) with IBM ESMTP SMTP Gateway: Authorized Use Only! Violators will be prosecuted;  Wed, 6 Feb 2013 05:59:20 +1000
Received: from d23relay03.au.ibm.com (d23relay03.au.ibm.com [9.190.235.21]) by d23dlp03.au.ibm.com (Postfix) with ESMTP id 3364A3578023 for <oauth@ietf.org>; Wed,  6 Feb 2013 07:07:54 +1100 (EST)
Received: from d23av05.au.ibm.com (d23av05.au.ibm.com [9.190.234.119]) by d23relay03.au.ibm.com (8.13.8/8.13.8/NCO v10.0) with ESMTP id r15K7pxL60621028 for <oauth@ietf.org>; Wed, 6 Feb 2013 07:07:53 +1100
Received: from d23av05.au.ibm.com (loopback [127.0.0.1]) by d23av05.au.ibm.com (8.14.4/8.13.1/NCO v10.0 AVout) with ESMTP id r15K7qmt025956 for <oauth@ietf.org>; Wed, 6 Feb 2013 07:07:52 +1100
Received: from d23ml125.sg.ibm.com (d23ml125.sg.ibm.com [9.127.37.161]) by d23av05.au.ibm.com (8.14.4/8.13.1/NCO v10.0 AVin) with ESMTP id r15K7liJ025904 for <oauth@ietf.org>; Wed, 6 Feb 2013 07:07:48 +1100
Auto-Submitted: auto-generated
From: Codur Sreedhar Pranam <pranamcs@sg.ibm.com>
To: oauth@ietf.org
Message-ID: <OF26F71C10.1C3587DE-ON48257B09.006DF810-48257B09.006DF810@sg.ibm.com>
Date: Wed, 6 Feb 2013 04:01:09 +0800
X-MIMETrack: Serialize by Router on d23ml125/23/M/IBM(Release 8.5.3FP2HF29 | July 24, 2012) at 02/06/2013 04:01:10
MIME-Version: 1.0
Content-type: multipart/alternative;  Boundary="0__=C7BBF19ADFFE7E808f9e8a93df938690918cC7BBF19ADFFE7E80"
Content-Disposition: inline
X-Content-Scanned: Fidelis XPS MAILER
x-cbid: 13020519-9264-0000-0000-0000031C7456
Subject: [OAUTH-WG] AUTO: Codur Sreedhar Pranam is out of the office (returning 02/19/2013)
X-BeenThere: oauth@ietf.org
X-Mailman-Version: 2.1.12
Precedence: list
List-Id: OAUTH WG <oauth.ietf.org>
List-Unsubscribe: <https://www.ietf.org/mailman/options/oauth>, <mailto:oauth-request@ietf.org?subject=unsubscribe>
List-Archive: <http://www.ietf.org/mail-archive/web/oauth>
List-Post: <mailto:oauth@ietf.org>
List-Help: <mailto:oauth-request@ietf.org?subject=help>
List-Subscribe: <https://www.ietf.org/mailman/listinfo/oauth>, <mailto:oauth-request@ietf.org?subject=subscribe>
X-List-Received-Date: Tue, 05 Feb 2013 20:08:11 -0000

--0__=C7BBF19ADFFE7E808f9e8a93df938690918cC7BBF19ADFFE7E80
Content-type: text/plain; charset=US-ASCII
Content-transfer-encoding: quoted-printable



I am out of the office until 02/19/2013.




Note: This is an automated response to your message  "OAuth Digest, Vol=
 52,
Issue 17" sent on 02/06/2013 3:49:52.

This is the only notification you will receive while this person is awa=
y.=

--0__=C7BBF19ADFFE7E808f9e8a93df938690918cC7BBF19ADFFE7E80
Content-type: text/html; charset=US-ASCII
Content-Disposition: inline
Content-transfer-encoding: quoted-printable

<html><body>
<p><font size=3D"1" face=3D"sans-serif">I am out of the office until 02=
/19/2013.<br>
</font><font size=3D"1" face=3D"sans-serif"><br>
</font><font size=3D"1" face=3D"sans-serif"><br>
</font><font size=3D"1" face=3D"sans-serif"><br>
</font><font size=3D"1" face=3D"sans-serif"><br>
</font><font size=3D"1" color=3D"#808080" face=3D"sans-serif">Note: Thi=
s is an automated response to your message &nbsp;</font><font size=3D"1=
" face=3D"sans-serif"><b>&quot;OAuth Digest, Vol 52, Issue 17&quot;</b>=
</font><font size=3D"1" color=3D"#808080" face=3D"sans-serif">&nbsp;sen=
t on </font><font size=3D"1" face=3D"sans-serif"><b>02/06/2013 3:49:52<=
/b></font><font size=3D"1" color=3D"#808080" face=3D"sans-serif">. <br>=

</font><font size=3D"1" color=3D"#808080" face=3D"sans-serif"><br>
</font><font size=3D"1" color=3D"#808080" face=3D"sans-serif">This is t=
he only notification you will receive while this person is away.</font>=
</body></html>=

--0__=C7BBF19ADFFE7E808f9e8a93df938690918cC7BBF19ADFFE7E80--


From ve7jtb@ve7jtb.com  Tue Feb  5 12:36:37 2013
Return-Path: <ve7jtb@ve7jtb.com>
X-Original-To: oauth@ietfa.amsl.com
Delivered-To: oauth@ietfa.amsl.com
Received: from localhost (localhost [127.0.0.1]) by ietfa.amsl.com (Postfix) with ESMTP id E1D8521F8625 for <oauth@ietfa.amsl.com>; Tue,  5 Feb 2013 12:36:37 -0800 (PST)
X-Virus-Scanned: amavisd-new at amsl.com
X-Spam-Flag: NO
X-Spam-Score: -3.598
X-Spam-Level: 
X-Spam-Status: No, score=-3.598 tagged_above=-999 required=5 tests=[BAYES_00=-2.599, HTML_MESSAGE=0.001, RCVD_IN_DNSWL_LOW=-1]
Received: from mail.ietf.org ([64.170.98.30]) by localhost (ietfa.amsl.com [127.0.0.1]) (amavisd-new, port 10024) with ESMTP id y9phUg3hClkE for <oauth@ietfa.amsl.com>; Tue,  5 Feb 2013 12:36:37 -0800 (PST)
Received: from mail-oa0-f45.google.com (mail-oa0-f45.google.com [209.85.219.45]) by ietfa.amsl.com (Postfix) with ESMTP id 4BCC521F8534 for <oauth@ietf.org>; Tue,  5 Feb 2013 12:36:37 -0800 (PST)
Received: by mail-oa0-f45.google.com with SMTP id o6so706362oag.18 for <oauth@ietf.org>; Tue, 05 Feb 2013 12:36:36 -0800 (PST)
X-Google-DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=google.com; s=20120113; h=x-received:content-type:mime-version:subject:from:in-reply-to:date :cc:message-id:references:to:x-mailer:x-gm-message-state; bh=Sz1LjBhV0sPyItRXUZFXe97mOrRsiYEhjwAVtD+L87g=; b=dqB778msl2zAfCPj3ZT/AuTdjTor6T9bA0nBwZBWNR2pFUq2/fodJZFJsGY3Rf1Klo 1/ErmCelTrQN+P9DFq26ELvwquY9R9C5k25jnt6PTUJakSxjKLT2V4vBlBthZYr5Gaa2 jRLAum0YMJ1WF2oWUTLfLUEbMCnaGP7/PnnfKFP3/c7rPd6HWulevam495tplZ3+uzQm wVH11vPoTPRX+cAMcOp58731O0we/6FnhNZpgCtWCIUCkzLw7La5BW0iEtcHL3Su9LTH +EL3F+YV7CmU12xp3afy18VjAn9JdGHvOikaWepGeT/e77yXrHT8C9eRUbximHH4O4jS FoMA==
X-Received: by 10.60.21.133 with SMTP id v5mr20484745oee.69.1360096596746; Tue, 05 Feb 2013 12:36:36 -0800 (PST)
Received: from [10.37.15.80] ([96.8.44.21]) by mx.google.com with ESMTPS id y4sm26996505oea.7.2013.02.05.12.36.33 (version=TLSv1 cipher=ECDHE-RSA-RC4-SHA bits=128/128); Tue, 05 Feb 2013 12:36:35 -0800 (PST)
Content-Type: multipart/alternative; boundary="Apple-Mail=_742B83E9-3E8E-4DB1-AA27-7A1707626E4D"
Mime-Version: 1.0 (Mac OS X Mail 6.2 \(1499\))
From: John Bradley <ve7jtb@ve7jtb.com>
In-Reply-To: <CAJV9qO_J1-AhGB=XST0R-kwAd-9hjUbCJ4ieBPoE_OMe760mqg@mail.gmail.com>
Date: Tue, 5 Feb 2013 13:36:32 -0700
Message-Id: <73B7EC23-AA93-42EE-B3EB-35BA1B82558F@ve7jtb.com>
References: <CAJV9qO_J1-AhGB=XST0R-kwAd-9hjUbCJ4ieBPoE_OMe760mqg@mail.gmail.com>
To: Prabath Siriwardena <prabath@wso2.com>
X-Mailer: Apple Mail (2.1499)
X-Gm-Message-State: ALoCoQk5A+oNOWgnt8Q6PYCkQx70T+tpi2ifS2JufwdMpTR5Y3fJM5FPUH7XRRKKfx1tXylw5K9b
Cc: "oauth@ietf.org WG" <oauth@ietf.org>
Subject: Re: [OAUTH-WG] Why OAuth it self is not an authentication framework ?
X-BeenThere: oauth@ietf.org
X-Mailman-Version: 2.1.12
Precedence: list
List-Id: OAUTH WG <oauth.ietf.org>
List-Unsubscribe: <https://www.ietf.org/mailman/options/oauth>, <mailto:oauth-request@ietf.org?subject=unsubscribe>
List-Archive: <http://www.ietf.org/mail-archive/web/oauth>
List-Post: <mailto:oauth@ietf.org>
List-Help: <mailto:oauth-request@ietf.org?subject=help>
List-Subscribe: <https://www.ietf.org/mailman/listinfo/oauth>, <mailto:oauth-request@ietf.org?subject=subscribe>
X-List-Received-Date: Tue, 05 Feb 2013 20:36:38 -0000

--Apple-Mail=_742B83E9-3E8E-4DB1-AA27-7A1707626E4D
Content-Transfer-Encoding: quoted-printable
Content-Type: text/plain;
	charset=iso-8859-1

OAuth is an Authorization protocol as many of us have pointed out.

The post is largely correct and based on one of mine.

John B.

On 2013-02-05, at 12:52 PM, Prabath Siriwardena <prabath@wso2.com> =
wrote:

> FYI and for your comments..
>=20
> =
http://blog.facilelogin.com/2013/02/why-oauth-it-self-is-not-authenticatio=
n.html
> =20
> Thanks & Regards,
> Prabath
>=20
> Mobile : +94 71 809 6732=20
>=20
> http://blog.facilelogin.com
> http://RampartFAQ.com
> _______________________________________________
> OAuth mailing list
> OAuth@ietf.org
> https://www.ietf.org/mailman/listinfo/oauth


--Apple-Mail=_742B83E9-3E8E-4DB1-AA27-7A1707626E4D
Content-Transfer-Encoding: 7bit
Content-Type: text/html;
	charset=iso-8859-1

<html><head><meta http-equiv="Content-Type" content="text/html charset=iso-8859-1"><meta http-equiv="Content-Type" content="text/html charset=iso-8859-1"></head><body style="word-wrap: break-word; -webkit-nbsp-mode: space; -webkit-line-break: after-white-space; ">OAuth is an Authorization protocol as many of us have pointed out.<div><br></div><div>The post is largely correct and based on one of mine.</div><div><br></div><div>John B.</div><div><br><div><div>On 2013-02-05, at 12:52 PM, Prabath Siriwardena &lt;<a href="mailto:prabath@wso2.com">prabath@wso2.com</a>&gt; wrote:</div><br class="Apple-interchange-newline"><blockquote type="cite">FYI and for your comments..<div><br></div><div><a href="http://blog.facilelogin.com/2013/02/why-oauth-it-self-is-not-authentication.html">http://blog.facilelogin.com/2013/02/why-oauth-it-self-is-not-authentication.html</a><br clear="all">
<div>&nbsp;</div>Thanks &amp; Regards,<br>Prabath<div><br></div><div>Mobile : +94 71 809 6732&nbsp;<br><br><a href="http://blog.facilelogin.com/" target="_blank">http://blog.facilelogin.com</a><br><a href="http://rampartfaq.com/" target="_blank">http://RampartFAQ.com</a></div>

</div>
_______________________________________________<br>OAuth mailing list<br><a href="mailto:OAuth@ietf.org">OAuth@ietf.org</a><br><a href="https://www.ietf.org/mailman/listinfo/oauth">https://www.ietf.org/mailman/listinfo/oauth</a><br></blockquote></div><br></div></body></html>
--Apple-Mail=_742B83E9-3E8E-4DB1-AA27-7A1707626E4D--

From jricher@mitre.org  Tue Feb  5 12:42:35 2013
Return-Path: <jricher@mitre.org>
X-Original-To: oauth@ietfa.amsl.com
Delivered-To: oauth@ietfa.amsl.com
Received: from localhost (localhost [127.0.0.1]) by ietfa.amsl.com (Postfix) with ESMTP id 3864021F8534 for <oauth@ietfa.amsl.com>; Tue,  5 Feb 2013 12:42:35 -0800 (PST)
X-Virus-Scanned: amavisd-new at amsl.com
X-Spam-Flag: NO
X-Spam-Score: -6.569
X-Spam-Level: 
X-Spam-Status: No, score=-6.569 tagged_above=-999 required=5 tests=[AWL=0.029,  BAYES_00=-2.599, HTML_MESSAGE=0.001, RCVD_IN_DNSWL_MED=-4]
Received: from mail.ietf.org ([64.170.98.30]) by localhost (ietfa.amsl.com [127.0.0.1]) (amavisd-new, port 10024) with ESMTP id ifjDTlev94aC for <oauth@ietfa.amsl.com>; Tue,  5 Feb 2013 12:42:34 -0800 (PST)
Received: from smtpksrv1.mitre.org (smtpksrv1.mitre.org [198.49.146.77]) by ietfa.amsl.com (Postfix) with ESMTP id 73EC121F853D for <oauth@ietf.org>; Tue,  5 Feb 2013 12:42:34 -0800 (PST)
Received: from smtpksrv1.mitre.org (localhost.localdomain [127.0.0.1]) by localhost (Postfix) with SMTP id E5C4A1F102A; Tue,  5 Feb 2013 15:42:33 -0500 (EST)
Received: from IMCCAS02.MITRE.ORG (imccas02.mitre.org [129.83.29.79]) by smtpksrv1.mitre.org (Postfix) with ESMTP id CFD031F02D3; Tue,  5 Feb 2013 15:42:33 -0500 (EST)
Received: from [10.146.15.29] (129.83.31.58) by IMCCAS02.MITRE.ORG (129.83.29.79) with Microsoft SMTP Server (TLS) id 14.2.318.4; Tue, 5 Feb 2013 15:42:33 -0500
Message-ID: <51116E96.7090907@mitre.org>
Date: Tue, 5 Feb 2013 15:41:58 -0500
From: Justin Richer <jricher@mitre.org>
User-Agent: Mozilla/5.0 (X11; Linux i686; rv:17.0) Gecko/20130106 Thunderbird/17.0.2
MIME-Version: 1.0
To: Prabath Siriwardena <prabath@wso2.com>
References: <CAJV9qO_J1-AhGB=XST0R-kwAd-9hjUbCJ4ieBPoE_OMe760mqg@mail.gmail.com>
In-Reply-To: <CAJV9qO_J1-AhGB=XST0R-kwAd-9hjUbCJ4ieBPoE_OMe760mqg@mail.gmail.com>
Content-Type: multipart/alternative; boundary="------------040504070400020005090102"
X-Originating-IP: [129.83.31.58]
Cc: "oauth@ietf.org WG" <oauth@ietf.org>
Subject: Re: [OAUTH-WG] Why OAuth it self is not an authentication framework ?
X-BeenThere: oauth@ietf.org
X-Mailman-Version: 2.1.12
Precedence: list
List-Id: OAUTH WG <oauth.ietf.org>
List-Unsubscribe: <https://www.ietf.org/mailman/options/oauth>, <mailto:oauth-request@ietf.org?subject=unsubscribe>
List-Archive: <http://www.ietf.org/mail-archive/web/oauth>
List-Post: <mailto:oauth@ietf.org>
List-Help: <mailto:oauth-request@ietf.org?subject=help>
List-Subscribe: <https://www.ietf.org/mailman/listinfo/oauth>, <mailto:oauth-request@ietf.org?subject=subscribe>
X-List-Received-Date: Tue, 05 Feb 2013 20:42:35 -0000

--------------040504070400020005090102
Content-Type: text/plain; charset="ISO-8859-1"; format=flowed
Content-Transfer-Encoding: 7bit

Another very good writeup of this was published recently as well:

http://blogs.msdn.com/b/vbertocci/archive/2013/01/02/oauth-2-0-and-sign-in.aspx

This confusion seems to be a major sticking point among developers.

  -- Justin

On 02/05/2013 02:52 PM, Prabath Siriwardena wrote:
> FYI and for your comments..
>
> http://blog.facilelogin.com/2013/02/why-oauth-it-self-is-not-authentication.html
> Thanks & Regards,
> Prabath
>
> Mobile : +94 71 809 6732
>
> http://blog.facilelogin.com
> http://RampartFAQ.com
>
>
> _______________________________________________
> OAuth mailing list
> OAuth@ietf.org
> https://www.ietf.org/mailman/listinfo/oauth


--------------040504070400020005090102
Content-Type: text/html; charset="ISO-8859-1"
Content-Transfer-Encoding: 7bit

<html>
  <head>
    <meta content="text/html; charset=ISO-8859-1"
      http-equiv="Content-Type">
  </head>
  <body bgcolor="#FFFFFF" text="#000000">
    Another very good writeup of this was published recently as well:<br>
    <br>
    &nbsp;
<a class="moz-txt-link-freetext" href="http://blogs.msdn.com/b/vbertocci/archive/2013/01/02/oauth-2-0-and-sign-in.aspx">http://blogs.msdn.com/b/vbertocci/archive/2013/01/02/oauth-2-0-and-sign-in.aspx</a><br>
    <br>
    This confusion seems to be a major sticking point among developers.<br>
    <br>
    &nbsp;-- Justin<br>
    <br>
    <div class="moz-cite-prefix">On 02/05/2013 02:52 PM, Prabath
      Siriwardena wrote:<br>
    </div>
    <blockquote
cite="mid:CAJV9qO_J1-AhGB=XST0R-kwAd-9hjUbCJ4ieBPoE_OMe760mqg@mail.gmail.com"
      type="cite">
      <meta http-equiv="Content-Type" content="text/html;
        charset=ISO-8859-1">
      FYI and for your comments..
      <div><br>
      </div>
      <div><a moz-do-not-send="true"
href="http://blog.facilelogin.com/2013/02/why-oauth-it-self-is-not-authentication.html">http://blog.facilelogin.com/2013/02/why-oauth-it-self-is-not-authentication.html</a><br
          clear="all">
        <div>&nbsp;</div>
        Thanks &amp; Regards,<br>
        Prabath
        <div><br>
        </div>
        <div>Mobile : +94 71 809 6732&nbsp;<br>
          <br>
          <a moz-do-not-send="true" href="http://blog.facilelogin.com"
            target="_blank">http://blog.facilelogin.com</a><br>
          <a moz-do-not-send="true" href="http://RampartFAQ.com"
            target="_blank">http://RampartFAQ.com</a></div>
      </div>
      <br>
      <fieldset class="mimeAttachmentHeader"></fieldset>
      <br>
      <pre wrap="">_______________________________________________
OAuth mailing list
<a class="moz-txt-link-abbreviated" href="mailto:OAuth@ietf.org">OAuth@ietf.org</a>
<a class="moz-txt-link-freetext" href="https://www.ietf.org/mailman/listinfo/oauth">https://www.ietf.org/mailman/listinfo/oauth</a>
</pre>
    </blockquote>
    <br>
  </body>
</html>

--------------040504070400020005090102--

From torsten@lodderstedt.net  Tue Feb  5 12:45:25 2013
Return-Path: <torsten@lodderstedt.net>
X-Original-To: oauth@ietfa.amsl.com
Delivered-To: oauth@ietfa.amsl.com
Received: from localhost (localhost [127.0.0.1]) by ietfa.amsl.com (Postfix) with ESMTP id E149C21F86D8; Tue,  5 Feb 2013 12:45:25 -0800 (PST)
X-Virus-Scanned: amavisd-new at amsl.com
X-Spam-Flag: NO
X-Spam-Score: -1.376
X-Spam-Level: 
X-Spam-Status: No, score=-1.376 tagged_above=-999 required=5 tests=[AWL=-0.524, BAYES_00=-2.599, HELO_EQ_DE=0.35, HTML_MESSAGE=0.001, MIME_QP_LONG_LINE=1.396]
Received: from mail.ietf.org ([64.170.98.30]) by localhost (ietfa.amsl.com [127.0.0.1]) (amavisd-new, port 10024) with ESMTP id 9QUH6R9VOz5U; Tue,  5 Feb 2013 12:45:25 -0800 (PST)
Received: from smtprelay05.ispgateway.de (smtprelay05.ispgateway.de [80.67.31.100]) by ietfa.amsl.com (Postfix) with ESMTP id 883AC21F85B4; Tue,  5 Feb 2013 12:45:24 -0800 (PST)
Received: from [91.2.92.91] (helo=[192.168.71.56]) by smtprelay05.ispgateway.de with esmtpsa (TLSv1:AES128-SHA:128) (Exim 4.68) (envelope-from <torsten@lodderstedt.net>) id 1U2pOK-0002LS-1A; Tue, 05 Feb 2013 21:45:20 +0100
References: <510E5FB5.10803@lodderstedt.net> <B33BFB58CCC8BE4998958016839DE27E06886427@IMCMBX01.MITRE.ORG> <511020D3.1090201@aol.com> <B33BFB58CCC8BE4998958016839DE27E068865E3@IMCMBX01.MITRE.ORG> <OF2060C435.DEAE300A-ON85257B09.005BEF8B-85257B09.005C2559@us.ibm.com> <2DC4D4CA-C65F-4B7D-96E3-A811B303B15A@lodderstedt.net> <51116239.7030104@mitre.org>
Mime-Version: 1.0 (1.0)
In-Reply-To: <51116239.7030104@mitre.org>
Content-Type: multipart/alternative; boundary=Apple-Mail-F77DA7C9-606C-4641-8531-12009BB147E4
Content-Transfer-Encoding: 7bit
Message-Id: <D67A78CC-31FB-4E5E-A9C0-BD8951742E90@lodderstedt.net>
X-Mailer: iPad Mail (10B141)
From: Torsten Lodderstedt <torsten@lodderstedt.net>
Date: Tue, 5 Feb 2013 21:45:20 +0100
To: Justin Richer <jricher@mitre.org>
X-Df-Sender: dG9yc3RlbkBsb2RkZXJzdGVkdC1vbmxpbmUuZGU=
Cc: OAuth WG <oauth@ietf.org>, "oauth-bounces@ietf.org" <oauth-bounces@ietf.org>
Subject: Re: [OAUTH-WG] draft-ietf-oauth-revocation
X-BeenThere: oauth@ietf.org
X-Mailman-Version: 2.1.12
Precedence: list
List-Id: OAUTH WG <oauth.ietf.org>
List-Unsubscribe: <https://www.ietf.org/mailman/options/oauth>, <mailto:oauth-request@ietf.org?subject=unsubscribe>
List-Archive: <http://www.ietf.org/mail-archive/web/oauth>
List-Post: <mailto:oauth@ietf.org>
List-Help: <mailto:oauth-request@ietf.org?subject=help>
List-Subscribe: <https://www.ietf.org/mailman/listinfo/oauth>, <mailto:oauth-request@ietf.org?subject=subscribe>
X-List-Received-Date: Tue, 05 Feb 2013 20:45:26 -0000

--Apple-Mail-F77DA7C9-606C-4641-8531-12009BB147E4
Content-Type: text/plain;
	charset=us-ascii
Content-Transfer-Encoding: quoted-printable

I know, that's why I asked. I think this is the simplest way to deal with th=
is type of error. I therefore prefer it.

Am 05.02.2013 um 20:49 schrieb Justin Richer <jricher@mitre.org>:

> You know, that works as well. =46rom the client's perspective, the token i=
sn't good anymore. The client shouldn't care if the token was good in the fi=
rst place if it's revoking it.
>=20
>  -- Justin
>=20
>=20
> On 02/05/2013 02:41 PM, Torsten Lodderstedt wrote:
>> Why not adopting Bill's suggestion and just return HTTP status code 200 f=
or (already) invalid tokens?
>>=20
>> regards,
>> Torsten.
>>=20
>> Am 05.02.2013 um 17:46 schrieb Todd W Lainhart <lainhart@us.ibm.com>:
>>=20
>>> > Could it do something with invalid_parameter that it couldn't do with i=
nvalid_token_parameter (among others), or vice versa?=20
>>>=20
>>> I'm not imagining a client doing anything programmatically useful with t=
he distinction.
>>>=20
>>>=20
>>>=20
>>>=20
>>> Todd Lainhart
>>> Rational software
>>> IBM Corporation
>>> 550 King Street, Littleton, MA 01460-1250
>>> 1-978-899-4705
>>> 2-276-4705 (T/L)
>>> lainhart@us.ibm.com
>>>=20
>>>=20
>>>=20
>>>=20
>>> From:        "Richer, Justin P." <jricher@mitre.org>=20
>>> To:        George Fletcher <gffletch@aol.com>,=20
>>> Cc:        OAuth WG <oauth@ietf.org>=20
>>> Date:        02/04/2013 04:10 PM=20
>>> Subject:        Re: [OAUTH-WG] draft-ietf-oauth-revocation=20
>>> Sent by:        oauth-bounces@ietf.org=20
>>>=20
>>>=20
>>>=20
>>>=20
>>> On Feb 4, 2013, at 3:57 PM, George Fletcher <gffletch@aol.com>
>>> wrote:
>>>=20
>>> >=20
>>> > On 2/4/13 3:41 PM, Richer, Justin P. wrote:
>>> >> On Feb 3, 2013, at 8:01 AM, Torsten Lodderstedt <torsten@lodderstedt.=
net> wrote:
>>> >>=20
>>> >>=20
>>> >>> - invalid_token error code: I propose to use the new error code "inv=
alid_parameter" (as suggested by Peter and George). I don't see the need to r=
egister it (see http://www.ietf.org/mail-archive/web/oauth/current/msg10604.=
html) but would like to get your advice.
>>> >> something more like "invalid_token_parameter" would maybe make sense,=
 since it's not just *any* parameter, it's the special "token" parameter tha=
t we're talking about, but it's distinct from the invalid_token response. Th=
e introspection endpoint uses the same pattern of a token=3D parameter, but s=
ince the whole point of the introspection endpoint is determining token vali=
dity it doesn't actually throw an error here.
>>> >>=20
>>> >> I agree that it doesn't need to be registered (since it's on a differ=
ent endpoint).
>>> > For what it's worth my thinking was that if we have an 'invalid_parame=
ter' error, then the description can define which parameter is invalid. I do=
n't think we should create a bunch of specific error values that are endpoin=
t specific and could overlap which is where the whole error return value sta=
rted.
>>> >=20
>>>=20
>>> Hm, I see what you're saying, but the error response is already endpoint=
 specific. Though there is value in not having conflicting and/or confusing r=
esponses from different endpoints that use the same error code for different=
               things.=20
>>>=20
>>> What it really comes down to is: what can the client do with this error?=
 Could it do something with invalid_parameter that it couldn't do with inval=
id_token_parameter (among others), or vice versa? As I'm writing this out, I=
'm not convinced that it could, really, so this may be a bike shedding argum=
ent.
>>>=20
>>> -- Justin
>>>=20
>>>=20
>>> _______________________________________________
>>> OAuth mailing list
>>> OAuth@ietf.org
>>> https://www.ietf.org/mailman/listinfo/oauth
>>>=20
>>>=20
>>> _______________________________________________
>>> OAuth mailing list
>>> OAuth@ietf.org
>>> https://www.ietf.org/mailman/listinfo/oauth
>=20

--Apple-Mail-F77DA7C9-606C-4641-8531-12009BB147E4
Content-Type: text/html;
	charset=utf-8
Content-Transfer-Encoding: 7bit

<html><head><meta http-equiv="content-type" content="text/html; charset=utf-8"></head><body dir="auto"><div>I know, that's why I asked. I think this is the simplest way to deal with this type of error. I therefore prefer it.</div><div><br>Am 05.02.2013 um 20:49 schrieb Justin Richer &lt;<a href="mailto:jricher@mitre.org">jricher@mitre.org</a>&gt;:<br><br></div><blockquote type="cite"><div>
  
    <meta content="text/html; charset=UTF-8" http-equiv="Content-Type">
  
  
    You know, that works as well. From the client's perspective, the
    token isn't good anymore. The client shouldn't care if the token was
    good in the first place if it's revoking it.<br>
    <br>
    &nbsp;-- Justin<br>
    <br>
    <br>
    <div class="moz-cite-prefix">On 02/05/2013 02:41 PM, Torsten
      Lodderstedt wrote:<br>
    </div>
    <blockquote cite="mid:2DC4D4CA-C65F-4B7D-96E3-A811B303B15A@lodderstedt.net" type="cite">
      <meta http-equiv="Content-Type" content="text/html; charset=UTF-8">
      <div>Why not adopting Bill's suggestion and just return HTTP
        status code 200 for (already) invalid tokens?</div>
      <div><br>
      </div>
      <div>regards,</div>
      <div>Torsten.</div>
      <div><br>
        Am 05.02.2013 um 17:46 schrieb Todd W Lainhart &lt;<a moz-do-not-send="true" href="mailto:lainhart@us.ibm.com">lainhart@us.ibm.com</a>&gt;:<br>
        <br>
      </div>
      <blockquote type="cite">
        <div><font face="sans-serif" size="2">&gt; </font><tt><font size="2">Could it do
              something with invalid_parameter that it couldn't do with
              invalid_token_parameter
              (among others), or vice versa? </font></tt>
          <br>
          <br>
          <font face="sans-serif" size="2">I'm not imagining a client
            doing anything
            programmatically useful with the distinction.<br>
          </font>
          <br>
          <table style="border-collapse:collapse;" width="223">
            <tbody>
              <tr height="8">
                <td style="border-style:solid;border-color:#000000;border-width:0px
                  0px 0px 0px;padding:0px 0px;" bgcolor="white" width="223"><font face="Verdana" size="1"><b><br>
                      <br>
                      <br>
                      Todd Lainhart<br>
                      Rational software<br>
                      IBM Corporation<br>
                      550 King Street, Littleton, MA 01460-1250</b></font><font face="Arial" size="1"><b><br>
                      1-978-899-4705<br>
                      2-276-4705 (T/L)<br>
                      <a moz-do-not-send="true" href="mailto:lainhart@us.ibm.com">lainhart@us.ibm.com</a></b></font></td>
              </tr>
            </tbody>
          </table>
          <br>
          <br>
          <br>
          <br>
          <br>
          <font color="#5f5f5f" face="sans-serif" size="1">From: &nbsp; &nbsp; &nbsp;
            &nbsp;</font><font face="sans-serif" size="1">"Richer, Justin
            P." &lt;<a moz-do-not-send="true" href="mailto:jricher@mitre.org">jricher@mitre.org</a>&gt;</font>
          <br>
          <font color="#5f5f5f" face="sans-serif" size="1">To: &nbsp; &nbsp; &nbsp;
            &nbsp;</font><font face="sans-serif" size="1">George Fletcher
            &lt;<a moz-do-not-send="true" href="mailto:gffletch@aol.com">gffletch@aol.com</a>&gt;,
          </font>
          <br>
          <font color="#5f5f5f" face="sans-serif" size="1">Cc: &nbsp; &nbsp; &nbsp;
            &nbsp;</font><font face="sans-serif" size="1">OAuth WG &lt;<a moz-do-not-send="true" href="mailto:oauth@ietf.org">oauth@ietf.org</a>&gt;</font>
          <br>
          <font color="#5f5f5f" face="sans-serif" size="1">Date: &nbsp; &nbsp; &nbsp;
            &nbsp;</font><font face="sans-serif" size="1">02/04/2013 04:10 PM</font>
          <br>
          <font color="#5f5f5f" face="sans-serif" size="1">Subject: &nbsp; &nbsp;
            &nbsp; &nbsp;</font><font face="sans-serif" size="1">Re: [OAUTH-WG]
            draft-ietf-oauth-revocation</font>
          <br>
          <font color="#5f5f5f" face="sans-serif" size="1">Sent by: &nbsp; &nbsp;
            &nbsp; &nbsp;</font><font face="sans-serif" size="1"><a moz-do-not-send="true" href="mailto:oauth-bounces@ietf.org">oauth-bounces@ietf.org</a></font>
          <br>
          <hr noshade="noshade">
          <br>
          <br>
          <br>
          <tt><font size="2"><br>
              On Feb 4, 2013, at 3:57 PM, George Fletcher &lt;<a moz-do-not-send="true" href="mailto:gffletch@aol.com">gffletch@aol.com</a>&gt;<br>
              wrote:<br>
              <br>
              &gt; <br>
              &gt; On 2/4/13 3:41 PM, Richer, Justin P. wrote:<br>
              &gt;&gt; On Feb 3, 2013, at 8:01 AM, Torsten Lodderstedt
              &lt;<a moz-do-not-send="true" href="mailto:torsten@lodderstedt.net">torsten@lodderstedt.net</a>&gt;
              wrote:<br>
              &gt;&gt; <br>
              &gt;&gt; <br>
              &gt;&gt;&gt; - invalid_token error code: I propose to use
              the new error
              code "invalid_parameter" (as suggested by Peter and
              George).
              I don't see the need to register it (see </font></tt><a moz-do-not-send="true" href="http://www.ietf.org/mail-archive/web/oauth/current/msg10604.html"><tt><font size="2">http://www.ietf.org/mail-archive/web/oauth/current/msg10604.html</font></tt></a><tt><font size="2">)
              but would like to get your advice.<br>
              &gt;&gt; something more like "invalid_token_parameter"
              would
              maybe make sense, since it's not just *any* parameter,
              it's the special
              "token" parameter that we're talking about, but it's
              distinct
              from the invalid_token response. The introspection
              endpoint uses the same
              pattern of a token= parameter, but since the whole point
              of the introspection
              endpoint is determining token validity it doesn't actually
              throw an error
              here.<br>
              &gt;&gt; <br>
              &gt;&gt; I agree that it doesn't need to be registered
              (since it's on a
              different endpoint).<br>
              &gt; For what it's worth my thinking was that if we have
              an 'invalid_parameter'
              error, then the description can define which parameter is
              invalid. I don't
              think we should create a bunch of specific error values
              that are endpoint
              specific and could overlap which is where the whole error
              return value
              started.<br>
              &gt; <br>
              <br>
              Hm, I see what you're saying, but the error response is
              already endpoint
              specific. Though there is value in not having conflicting
              and/or confusing
              responses from different endpoints that use the same error
              code for different
              things. <br>
              <br>
              What it really comes down to is: what can the client do
              with this error?
              Could it do something with invalid_parameter that it
              couldn't do with invalid_token_parameter
              (among others), or vice versa? As I'm writing this out,
              I'm not convinced
              that it could, really, so this may be a bike shedding
              argument.<br>
              <br>
              -- Justin<br>
              <br>
              <br>
              _______________________________________________<br>
              OAuth mailing list<br>
              <a moz-do-not-send="true" href="mailto:OAuth@ietf.org">OAuth@ietf.org</a><br>
            </font></tt><a moz-do-not-send="true" href="https://www.ietf.org/mailman/listinfo/oauth"><tt><font size="2">https://www.ietf.org/mailman/listinfo/oauth</font></tt></a><tt><font size="2"><br>
              <br>
            </font></tt>
          <br>
        </div>
      </blockquote>
      <blockquote type="cite">
        <div><span>_______________________________________________</span><br>
          <span>OAuth mailing list</span><br>
          <span><a moz-do-not-send="true" href="mailto:OAuth@ietf.org">OAuth@ietf.org</a></span><br>
          <span><a moz-do-not-send="true" href="https://www.ietf.org/mailman/listinfo/oauth">https://www.ietf.org/mailman/listinfo/oauth</a></span><br>
        </div>
      </blockquote>
    </blockquote>
    <br>
  

</div></blockquote></body></html>
--Apple-Mail-F77DA7C9-606C-4641-8531-12009BB147E4--

From paul.madsen@gmail.com  Tue Feb  5 13:12:15 2013
Return-Path: <paul.madsen@gmail.com>
X-Original-To: oauth@ietfa.amsl.com
Delivered-To: oauth@ietfa.amsl.com
Received: from localhost (localhost [127.0.0.1]) by ietfa.amsl.com (Postfix) with ESMTP id 06F3621F84FC for <oauth@ietfa.amsl.com>; Tue,  5 Feb 2013 13:12:15 -0800 (PST)
X-Virus-Scanned: amavisd-new at amsl.com
X-Spam-Flag: NO
X-Spam-Score: -0.151
X-Spam-Level: 
X-Spam-Status: No, score=-0.151 tagged_above=-999 required=5 tests=[BAYES_00=-2.599, HOST_EQ_CPE=0.979, HOST_EQ_MODEMCABLE=1.368, HTML_MESSAGE=0.001, RDNS_DYNAMIC=0.1]
Received: from mail.ietf.org ([64.170.98.30]) by localhost (ietfa.amsl.com [127.0.0.1]) (amavisd-new, port 10024) with ESMTP id J6MW2jtUdDKl for <oauth@ietfa.amsl.com>; Tue,  5 Feb 2013 13:12:14 -0800 (PST)
Received: from mail-ia0-x233.google.com (mail-ia0-x233.google.com [IPv6:2607:f8b0:4001:c02::233]) by ietfa.amsl.com (Postfix) with ESMTP id 164F621F84C8 for <oauth@ietf.org>; Tue,  5 Feb 2013 13:12:14 -0800 (PST)
Received: by mail-ia0-f179.google.com with SMTP id x24so688892iak.10 for <oauth@ietf.org>; Tue, 05 Feb 2013 13:12:13 -0800 (PST)
DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=gmail.com; s=20120113; h=x-received:message-id:date:from:user-agent:mime-version:to:cc :subject:references:in-reply-to:content-type; bh=NirnajTTKJAtwJng2XXF+IWZdpWWcQVwtuiI3G4TX50=; b=ENAxkgxuMfHsdmAWi33rYE0XWz+Fkibdgtfoj/fkcr+rVw4zF3MVGVbAL2BAlZlmcp 1rEz5zbC9YBTUlQum92/PK32MuJ4/AiALkAn66NN5xeRHvno1917axq6qb3yosvkpksx uWA20V4Z+lMDzYMVfm9/6jqFelznUy2DwF932ItJUbtEKWtz5VB44/G+T3WAMaCM8Fzh fmj+mmamNDeLYJ3hhyASiw1yMI/8zrrKlUS+7vpjwgYpQ+lW4hB4ASufk2jWhvHHWNtK cnAkjgcd3CmtpXjKE8Gk6YsRS3nlECReWZIE6xleZb1gXTGOuSacd/fIURziU9kXaYtL vmew==
X-Received: by 10.50.214.67 with SMTP id ny3mr1086183igc.13.1360098733690; Tue, 05 Feb 2013 13:12:13 -0800 (PST)
Received: from pmadsen-mbp.local (CPE0022b0cb82b4-CMbc1401e98fa0.cpe.net.cable.rogers.com. [99.240.72.98]) by mx.google.com with ESMTPS id fa6sm24532030igb.2.2013.02.05.13.12.11 (version=TLSv1 cipher=ECDHE-RSA-RC4-SHA bits=128/128); Tue, 05 Feb 2013 13:12:12 -0800 (PST)
Message-ID: <511175AA.9030301@gmail.com>
Date: Tue, 05 Feb 2013 16:12:10 -0500
From: Paul Madsen <paul.madsen@gmail.com>
User-Agent: Mozilla/5.0 (Macintosh; Intel Mac OS X 10.8; rv:17.0) Gecko/20130107 Thunderbird/17.0.2
MIME-Version: 1.0
To: John Bradley <ve7jtb@ve7jtb.com>
References: <CAJV9qO_J1-AhGB=XST0R-kwAd-9hjUbCJ4ieBPoE_OMe760mqg@mail.gmail.com> <73B7EC23-AA93-42EE-B3EB-35BA1B82558F@ve7jtb.com>
In-Reply-To: <73B7EC23-AA93-42EE-B3EB-35BA1B82558F@ve7jtb.com>
Content-Type: multipart/alternative; boundary="------------030803020409040005010306"
Cc: "oauth@ietf.org WG" <oauth@ietf.org>
Subject: Re: [OAUTH-WG] Why OAuth it self is not an authentication framework ?
X-BeenThere: oauth@ietf.org
X-Mailman-Version: 2.1.12
Precedence: list
List-Id: OAUTH WG <oauth.ietf.org>
List-Unsubscribe: <https://www.ietf.org/mailman/options/oauth>, <mailto:oauth-request@ietf.org?subject=unsubscribe>
List-Archive: <http://www.ietf.org/mail-archive/web/oauth>
List-Post: <mailto:oauth@ietf.org>
List-Help: <mailto:oauth-request@ietf.org?subject=help>
List-Subscribe: <https://www.ietf.org/mailman/listinfo/oauth>, <mailto:oauth-request@ietf.org?subject=subscribe>
X-List-Received-Date: Tue, 05 Feb 2013 21:12:15 -0000

This is a multi-part message in MIME format.
--------------030803020409040005010306
Content-Type: text/plain; charset=ISO-8859-1; format=flowed
Content-Transfer-Encoding: 7bit

why pigeonhole it?

OAuth can be deployed with no authz semantics at all (or at least as 
little as any authn mechanism), e.g client creds grant type with no scopes

I agree that OAuth is not an *SSO* protocol.

On 2/5/13 3:36 PM, John Bradley wrote:
> OAuth is an Authorization protocol as many of us have pointed out.
>
> The post is largely correct and based on one of mine.
>
> John B.
>
> On 2013-02-05, at 12:52 PM, Prabath Siriwardena <prabath@wso2.com 
> <mailto:prabath@wso2.com>> wrote:
>
>> FYI and for your comments..
>>
>> http://blog.facilelogin.com/2013/02/why-oauth-it-self-is-not-authentication.html
>> Thanks & Regards,
>> Prabath
>>
>> Mobile : +94 71 809 6732
>>
>> http://blog.facilelogin.com <http://blog.facilelogin.com/>
>> http://RampartFAQ.com <http://rampartfaq.com/>
>> _______________________________________________
>> OAuth mailing list
>> OAuth@ietf.org <mailto:OAuth@ietf.org>
>> https://www.ietf.org/mailman/listinfo/oauth
>
>
>
> _______________________________________________
> OAuth mailing list
> OAuth@ietf.org
> https://www.ietf.org/mailman/listinfo/oauth


--------------030803020409040005010306
Content-Type: text/html; charset=ISO-8859-1
Content-Transfer-Encoding: 7bit

<html>
  <head>
    <meta content="text/html; charset=ISO-8859-1"
      http-equiv="Content-Type">
  </head>
  <body bgcolor="#FFFFFF" text="#000000">
    <font face="Arial">why pigeonhole it? <br>
      <br>
      OAuth can be deployed with no authz semantics at all (or at least
      as little as any authn mechanism), e.g client creds grant type
      with no scopes<br>
      <br>
      I agree that OAuth is not an *SSO* protocol.<br>
      <br>
    </font>
    <div class="moz-cite-prefix">On 2/5/13 3:36 PM, John Bradley wrote:<br>
    </div>
    <blockquote
      cite="mid:73B7EC23-AA93-42EE-B3EB-35BA1B82558F@ve7jtb.com"
      type="cite">
      <meta http-equiv="Content-Type" content="text/html;
        charset=ISO-8859-1">
      <meta http-equiv="Content-Type" content="text/html;
        charset=ISO-8859-1">
      OAuth is an Authorization protocol as many of us have pointed out.
      <div><br>
      </div>
      <div>The post is largely correct and based on one of mine.</div>
      <div><br>
      </div>
      <div>John B.</div>
      <div><br>
        <div>
          <div>On 2013-02-05, at 12:52 PM, Prabath Siriwardena &lt;<a
              moz-do-not-send="true" href="mailto:prabath@wso2.com">prabath@wso2.com</a>&gt;
            wrote:</div>
          <br class="Apple-interchange-newline">
          <blockquote type="cite">FYI and for your comments..
            <div><br>
            </div>
            <div><a moz-do-not-send="true"
href="http://blog.facilelogin.com/2013/02/why-oauth-it-self-is-not-authentication.html">http://blog.facilelogin.com/2013/02/why-oauth-it-self-is-not-authentication.html</a><br
                clear="all">
              <div>&nbsp;</div>
              Thanks &amp; Regards,<br>
              Prabath
              <div><br>
              </div>
              <div>Mobile : +94 71 809 6732&nbsp;<br>
                <br>
                <a moz-do-not-send="true"
                  href="http://blog.facilelogin.com/" target="_blank">http://blog.facilelogin.com</a><br>
                <a moz-do-not-send="true" href="http://rampartfaq.com/"
                  target="_blank">http://RampartFAQ.com</a></div>
            </div>
            _______________________________________________<br>
            OAuth mailing list<br>
            <a moz-do-not-send="true" href="mailto:OAuth@ietf.org">OAuth@ietf.org</a><br>
            <a moz-do-not-send="true"
              href="https://www.ietf.org/mailman/listinfo/oauth">https://www.ietf.org/mailman/listinfo/oauth</a><br>
          </blockquote>
        </div>
        <br>
      </div>
      <br>
      <fieldset class="mimeAttachmentHeader"></fieldset>
      <br>
      <pre wrap="">_______________________________________________
OAuth mailing list
<a class="moz-txt-link-abbreviated" href="mailto:OAuth@ietf.org">OAuth@ietf.org</a>
<a class="moz-txt-link-freetext" href="https://www.ietf.org/mailman/listinfo/oauth">https://www.ietf.org/mailman/listinfo/oauth</a>
</pre>
    </blockquote>
    <br>
  </body>
</html>

--------------030803020409040005010306--

From wmills_92105@yahoo.com  Tue Feb  5 13:22:54 2013
Return-Path: <wmills_92105@yahoo.com>
X-Original-To: oauth@ietfa.amsl.com
Delivered-To: oauth@ietfa.amsl.com
Received: from localhost (localhost [127.0.0.1]) by ietfa.amsl.com (Postfix) with ESMTP id 48AA221F8702 for <oauth@ietfa.amsl.com>; Tue,  5 Feb 2013 13:22:54 -0800 (PST)
X-Virus-Scanned: amavisd-new at amsl.com
X-Spam-Flag: NO
X-Spam-Score: -1.929
X-Spam-Level: 
X-Spam-Status: No, score=-1.929 tagged_above=-999 required=5 tests=[AWL=0.669,  BAYES_00=-2.599, HTML_MESSAGE=0.001]
Received: from mail.ietf.org ([64.170.98.30]) by localhost (ietfa.amsl.com [127.0.0.1]) (amavisd-new, port 10024) with ESMTP id aHSflKA953np for <oauth@ietfa.amsl.com>; Tue,  5 Feb 2013 13:22:53 -0800 (PST)
Received: from nm31-vm7.bullet.mail.ne1.yahoo.com (nm31-vm7.bullet.mail.ne1.yahoo.com [98.138.229.47]) by ietfa.amsl.com (Postfix) with ESMTP id 6C47421F88A2 for <oauth@ietf.org>; Tue,  5 Feb 2013 13:22:53 -0800 (PST)
Received: from [98.138.90.49] by nm31.bullet.mail.ne1.yahoo.com with NNFMP; 05 Feb 2013 21:22:53 -0000
Received: from [98.138.88.238] by tm2.bullet.mail.ne1.yahoo.com with NNFMP; 05 Feb 2013 21:22:52 -0000
Received: from [127.0.0.1] by omp1038.mail.ne1.yahoo.com with NNFMP; 05 Feb 2013 21:22:52 -0000
X-Yahoo-Newman-Property: ymail-3
X-Yahoo-Newman-Id: 782885.91727.bm@omp1038.mail.ne1.yahoo.com
Received: (qmail 70213 invoked by uid 60001); 5 Feb 2013 21:22:52 -0000
DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=yahoo.com; s=s1024; t=1360099372; bh=PL4fe06liymBh1XBVAVNdD8lUvJvYcvoHkxgDoXSlZE=; h=X-YMail-OSG:Received:X-Rocket-MIMEInfo:X-Mailer:References:Message-ID:Date:From:Reply-To:Subject:To:Cc:In-Reply-To:MIME-Version:Content-Type; b=R7783eHb+YpTCDRNqS8GRBUjjYwPsw460QCcfPELpY2c7EaoOmo9RH4+qc2SsWJkeF7kvN6as5PMt5eKyQ8T0Rv9F06Xloczm92g1Ac8PprIXCXKl87iNa2Mvw1fRD5zPXizdgqFBVTjiR39J1seCXa4kYO5GDMKWKsEzXvK8Lg=
DomainKey-Signature: a=rsa-sha1; q=dns; c=nofws; s=s1024; d=yahoo.com; h=X-YMail-OSG:Received:X-Rocket-MIMEInfo:X-Mailer:References:Message-ID:Date:From:Reply-To:Subject:To:Cc:In-Reply-To:MIME-Version:Content-Type; b=eCo01DvC3xId00TKVNf66qfmFMrwc2hmn/3+B1kfr8U2kAfloYq+Mxh9dEBbsnTAUtT9VUJ96cTPVdyuK3bTTbHJtiK5mzxZr3adYNbcY4SFmGjkVMhLnBTxq+PIwQOCpY0EMRL6J2EhNE13DAXA9xAxdjlsp+uD45tzNJRcUiI=;
X-YMail-OSG: NaIwfMMVM1kmCJCZtfB_VdTyWBxjl8AnUb8_saN_KNN.tGx 0VJ0y40y0kvRD6Q3pXECCtkH8rGypM0SQORMtF7HF3y6k0EFz4Rm0CWKJMIt IhW0rQjHsKyr8sP.oN9GM87K8.Y3RIIIfTE_Qe.pL6kAcN1tZPtjvoK4sFFD WHu77PJoAQ4luZNooB.ivWYiElJACpHXsjjiH1fZHXT2CV0Ll268p0PhVvNi ia03WyXCes.7om.AaqR01eRPexYIXqC1OAGg710e4jZfNaEtYPavDTzCPZj5 EUUYnBsR8JQ4QiF5.HtY4u.Gn77rnrj0vaX0F6xE0Zc.qvzfVsN5Eurm5KSo E8423L3RdvOUqDGxegGurrqVL8ILvi82WfZ2yAZt0NP5VMvfsITgq6ePKzv3 ZVoXdj6sn3EvbgxPvgT8wbyyBe0fodObSdWwFMaxLt_FpG613dPReSc7P_5r .osRdZG8MoaaZhB7l8L.U.jgL6k0fydS4mokvvel3YulR0_4veBQU6HrDQxz jsJm3mYhd06aZQ6uNinZqx9_9ejkz5S41L.Patgj8v6jET7d9WGXSqwo1Tft fvQjdwCQSrpV2H7EnVmeoKo61v5qqqbQrrPfI_s8coLSk0IMbTPFy3yZkyZs uMd77x7AlyTVuol5EDRMRjDwi7wpq_Oy8s_nY5iWxYbhTnjwd9Hrjwc53xys roNbq
Received: from [209.131.62.145] by web31807.mail.mud.yahoo.com via HTTP; Tue, 05 Feb 2013 13:22:52 PST
X-Rocket-MIMEInfo: 001.001, VGhlcmUgYXJlIHNvbWUgc3BlY2lmaWMgZGVzaWduIG1pcy1tYXRjaGVzIGZvciBPQXV0aCBhcyBhbiBhdXRoZW50aWNhdGlvbiBwcm90b2NvbCwgaXQncyBub3Qgd2hhdCBpdCdzIGRlc2lnbmVkIGZvciBhbmQgdGhlcmUgYXJlIHNvbWUgcHJvYmxlbXMgeW91IHdpbGwgcnVuIGludG8uIMKgU29tZSBoYXZlIHVzZWQgaXQgYXMgc3VjaCwgYnV0IGl0J3Mgbm90IGEgZ29vZCBnZW5lcmFsIHNvbHV0aW9uLgoKLWJpbGwKCgpfX19fX19fX19fX19fX19fX19fX19fX19fX19fX19fXwogRnJvbTogUGF1bCBNYWRzZW4BMAEBAQE-
X-Mailer: YahooMailWebService/0.8.133.504
References: <CAJV9qO_J1-AhGB=XST0R-kwAd-9hjUbCJ4ieBPoE_OMe760mqg@mail.gmail.com> <73B7EC23-AA93-42EE-B3EB-35BA1B82558F@ve7jtb.com> <511175AA.9030301@gmail.com>
Message-ID: <1360099372.47338.YahooMailNeo@web31807.mail.mud.yahoo.com>
Date: Tue, 5 Feb 2013 13:22:52 -0800 (PST)
From: William Mills <wmills_92105@yahoo.com>
To: Paul Madsen <paul.madsen@gmail.com>, John Bradley <ve7jtb@ve7jtb.com>
In-Reply-To: <511175AA.9030301@gmail.com>
MIME-Version: 1.0
Content-Type: multipart/alternative; boundary="-125733401-308405885-1360099372=:47338"
Cc: "oauth@ietf.org WG" <oauth@ietf.org>
Subject: Re: [OAUTH-WG] Why OAuth it self is not an authentication framework ?
X-BeenThere: oauth@ietf.org
X-Mailman-Version: 2.1.12
Precedence: list
Reply-To: William Mills <wmills_92105@yahoo.com>
List-Id: OAUTH WG <oauth.ietf.org>
List-Unsubscribe: <https://www.ietf.org/mailman/options/oauth>, <mailto:oauth-request@ietf.org?subject=unsubscribe>
List-Archive: <http://www.ietf.org/mail-archive/web/oauth>
List-Post: <mailto:oauth@ietf.org>
List-Help: <mailto:oauth-request@ietf.org?subject=help>
List-Subscribe: <https://www.ietf.org/mailman/listinfo/oauth>, <mailto:oauth-request@ietf.org?subject=subscribe>
X-List-Received-Date: Tue, 05 Feb 2013 21:22:54 -0000

---125733401-308405885-1360099372=:47338
Content-Type: text/plain; charset=iso-8859-1
Content-Transfer-Encoding: quoted-printable

There are some specific design mis-matches for OAuth as an authentication p=
rotocol, it's not what it's designed for and there are some problems you wi=
ll run into. =A0Some have used it as such, but it's not a good general solu=
tion.=0A=0A-bill=0A=0A=0A________________________________=0A From: Paul Mad=
sen <paul.madsen@gmail.com>=0ATo: John Bradley <ve7jtb@ve7jtb.com> =0ACc: "=
oauth@ietf.org WG" <oauth@ietf.org> =0ASent: Tuesday, February 5, 2013 1:12=
 PM=0ASubject: Re: [OAUTH-WG] Why OAuth it self is not an authentication fr=
amework ?=0A =0A=0Awhy pigeonhole it? =0A=0AOAuth can be deployed with no a=
uthz semantics at all (or at least=0A      as little as any authn mechanism=
), e.g client creds grant type=0A      with no scopes=0A=0AI agree that OAu=
th is not an *SSO* protocol.=0A=0A =0AOn 2/5/13 3:36 PM, John Bradley wrote=
:=0A=0AOAuth is an Authorization protocol as many of us have pointed out. =
=0A>=0A>=0A>The post is largely correct and based on one of mine.=0A>=0A>=
=0A>John B.=0A>=0A>=0A>On 2013-02-05, at 12:52 PM, Prabath Siriwardena <pra=
bath@wso2.com> wrote:=0A>=0A>FYI and for your comments.. =0A>>=0A>>=0A>>htt=
p://blog.facilelogin.com/2013/02/why-oauth-it-self-is-not-authentication.ht=
ml=0A>>=0A>>=A0=0AThanks & Regards,=0A>>Prabath =0A>>=0A>>=0A>>Mobile : +94=
 71 809 6732=A0=0A>>=0A>>http://blog.facilelogin.com/=0A>>http://rampartfaq=
.com/=0A_______________________________________________=0A>>OAuth mailing l=
ist=0A>>OAuth@ietf.org=0A>>https://www.ietf.org/mailman/listinfo/oauth=0A>>=
=0A>=0A>=0A>=0A>_______________________________________________=0AOAuth mai=
ling list OAuth@ietf.org https://www.ietf.org/mailman/listinfo/oauth =0A=0A=
_______________________________________________=0AOAuth mailing list=0AOAut=
h@ietf.org=0Ahttps://www.ietf.org/mailman/listinfo/oauth
---125733401-308405885-1360099372=:47338
Content-Type: text/html; charset=iso-8859-1
Content-Transfer-Encoding: quoted-printable

<html><body><div style=3D"color:#000; background-color:#fff; font-family:Co=
urier New, courier, monaco, monospace, sans-serif;font-size:12pt"><div><spa=
n>There are some specific design mis-matches for OAuth as an authentication=
 protocol, it's not what it's designed for and there are some problems you =
will run into. &nbsp;Some have used it as such, but it's not a good general=
 solution.</span></div><div style=3D"color: rgb(0, 0, 0); font-size: 16px; =
font-family: 'Courier New', courier, monaco, monospace, sans-serif; backgro=
und-color: transparent; font-style: normal;"><span><br></span></div><div st=
yle=3D"color: rgb(0, 0, 0); font-size: 16px; font-family: 'Courier New', co=
urier, monaco, monospace, sans-serif; background-color: transparent; font-s=
tyle: normal;"><span>-bill</span></div><div><br></div>  <div style=3D"font-=
family: 'Courier New', courier, monaco, monospace, sans-serif; font-size: 1=
2pt;"> <div style=3D"font-family: 'times new roman', 'new york', times, ser=
if;
 font-size: 12pt;"> <div dir=3D"ltr"> <font size=3D"2" face=3D"Arial"> <hr =
size=3D"1">  <b><span style=3D"font-weight:bold;">From:</span></b> Paul Mad=
sen &lt;paul.madsen@gmail.com&gt;<br> <b><span style=3D"font-weight: bold;"=
>To:</span></b> John Bradley &lt;ve7jtb@ve7jtb.com&gt; <br><b><span style=
=3D"font-weight: bold;">Cc:</span></b> "oauth@ietf.org WG" &lt;oauth@ietf.o=
rg&gt; <br> <b><span style=3D"font-weight: bold;">Sent:</span></b> Tuesday,=
 February 5, 2013 1:12 PM<br> <b><span style=3D"font-weight: bold;">Subject=
:</span></b> Re: [OAUTH-WG] Why OAuth it self is not an authentication fram=
ework ?<br> </font> </div> <br>=0A<div id=3D"yiv746051961">=0A  =0A=0A    =
=0A  =0A  <div>=0A    <font face=3D"Arial">why pigeonhole it? <br>=0A      =
<br>=0A      OAuth can be deployed with no authz semantics at all (or at le=
ast=0A      as little as any authn mechanism), e.g client creds grant type=
=0A      with no scopes<br>=0A      <br>=0A      I agree that OAuth is not =
an *SSO* protocol.<br>=0A      <br>=0A    </font>=0A    <div class=3D"yiv74=
6051961moz-cite-prefix">On 2/5/13 3:36 PM, John Bradley wrote:<br>=0A    </=
div>=0A    <blockquote type=3D"cite">=0A      =0A      =0A      OAuth is an=
 Authorization protocol as many of us have pointed out.=0A      <div><br>=
=0A      </div>=0A      <div>The post is largely correct and based on one o=
f mine.</div>=0A      <div><br>=0A      </div>=0A      <div>John B.</div>=
=0A      <div><br>=0A        <div>=0A          <div>On 2013-02-05, at 12:52=
 PM, Prabath Siriwardena &lt;<a rel=3D"nofollow" ymailto=3D"mailto:prabath@=
wso2.com" target=3D"_blank" href=3D"mailto:prabath@wso2.com">prabath@wso2.c=
om</a>&gt;=0A            wrote:</div>=0A          <br class=3D"yiv746051961=
Apple-interchange-newline">=0A          <blockquote type=3D"cite">FYI and f=
or your comments..=0A            <div><br>=0A            </div>=0A         =
   <div>http://blog.facilelogin.com/2013/02/why-oauth-it-self-is-not-authen=
tication.html<br clear=3D"all">=0A              <div>&nbsp;</div>=0A       =
       Thanks &amp; Regards,<br>=0A              Prabath=0A              <d=
iv><br>=0A              </div>=0A              <div>Mobile : +94 71 809 673=
2&nbsp;<br>=0A                <br>=0A                http://blog.facilelogi=
n.com/<br>=0A                http://rampartfaq.com/</div>=0A            </d=
iv>=0A            _______________________________________________<br>=0A   =
         OAuth mailing list<br>=0A            <a rel=3D"nofollow" ymailto=
=3D"mailto:OAuth@ietf.org" target=3D"_blank" href=3D"mailto:OAuth@ietf.org"=
>OAuth@ietf.org</a><br>=0A            <a rel=3D"nofollow" target=3D"_blank"=
 href=3D"https://www.ietf.org/mailman/listinfo/oauth">https://www.ietf.org/=
mailman/listinfo/oauth</a><br>=0A          </blockquote>=0A        </div>=
=0A        <br>=0A      </div>=0A      <br>=0A      <fieldset class=3D"yiv7=
46051961mimeAttachmentHeader"></fieldset>=0A      <br>=0A      <pre>_______=
________________________________________=0AOAuth mailing list=0A<a rel=3D"n=
ofollow" class=3D"yiv746051961moz-txt-link-abbreviated" ymailto=3D"mailto:O=
Auth@ietf.org" target=3D"_blank" href=3D"mailto:OAuth@ietf.org">OAuth@ietf.=
org</a>=0A<a rel=3D"nofollow" class=3D"yiv746051961moz-txt-link-freetext" t=
arget=3D"_blank" href=3D"https://www.ietf.org/mailman/listinfo/oauth">https=
://www.ietf.org/mailman/listinfo/oauth</a>=0A</pre>=0A    </blockquote>=0A =
   <br>=0A  </div>=0A=0A</div><br>_________________________________________=
______<br>OAuth mailing list<br><a ymailto=3D"mailto:OAuth@ietf.org" href=
=3D"mailto:OAuth@ietf.org">OAuth@ietf.org</a><br><a href=3D"https://www.iet=
f.org/mailman/listinfo/oauth" target=3D"_blank">https://www.ietf.org/mailma=
n/listinfo/oauth</a><br><br><br> </div> </div>  </div></body></html>
---125733401-308405885-1360099372=:47338--

From twbray@google.com  Tue Feb  5 13:28:05 2013
Return-Path: <twbray@google.com>
X-Original-To: oauth@ietfa.amsl.com
Delivered-To: oauth@ietfa.amsl.com
Received: from localhost (localhost [127.0.0.1]) by ietfa.amsl.com (Postfix) with ESMTP id E496821F8691 for <oauth@ietfa.amsl.com>; Tue,  5 Feb 2013 13:28:05 -0800 (PST)
X-Virus-Scanned: amavisd-new at amsl.com
X-Spam-Flag: NO
X-Spam-Score: -101.977
X-Spam-Level: 
X-Spam-Status: No, score=-101.977 tagged_above=-999 required=5 tests=[BAYES_00=-2.599, FM_FORGED_GMAIL=0.622, HTML_MESSAGE=0.001, NO_RELAYS=-0.001, USER_IN_WHITELIST=-100]
Received: from mail.ietf.org ([64.170.98.30]) by localhost (ietfa.amsl.com [127.0.0.1]) (amavisd-new, port 10024) with ESMTP id qHXVSAP6UPlb for <oauth@ietfa.amsl.com>; Tue,  5 Feb 2013 13:28:04 -0800 (PST)
Received: from mail-ia0-x22c.google.com (ia-in-x022c.1e100.net [IPv6:2607:f8b0:4001:c02::22c]) by ietfa.amsl.com (Postfix) with ESMTP id BA72721F8596 for <oauth@ietf.org>; Tue,  5 Feb 2013 13:28:04 -0800 (PST)
Received: by mail-ia0-f172.google.com with SMTP id u8so692982iag.17 for <oauth@ietf.org>; Tue, 05 Feb 2013 13:28:04 -0800 (PST)
DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=google.com; s=20120113; h=x-received:mime-version:in-reply-to:references:from:date:message-id :subject:to:cc:content-type; bh=Om6Eyc5eQuJZwhzvdbD6aqtDbxpOL6zDjClochODCUE=; b=EaeuUrHt/7t6e8XVQeKmuzqGI6qhAFJR4HN7aZdOLIEVTbmBFBmRGbceDA5FR4UASH XHz4KePMfNH2iCOWUeBWHOY3/bTlRk/Im+aHU5CZuByXUA+6lBwwWE0PlUM8/lIF5/F7 EHEuunXYvUbVnGEF6auF+qeXjqBaCEOIFoeWfiBAt6Vg7/He+hXesUpHOmzDFFqK9UwI BKbS/ewvBjAK6fx/MH/IA8ZBWmqY/h8mvkp++DFAXuAWkFyV3FIi/xIrSxAAaRvV+sKq HgaOSROMHEkvDZ180bip2FGfD31HyeLEHu1lUD7L6edbgqBce/fMCZ3zMGyq3NlTJMr5 fSrQ==
X-Google-DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=google.com; s=20120113; h=x-received:mime-version:in-reply-to:references:from:date:message-id :subject:to:cc:content-type:x-gm-message-state; bh=Om6Eyc5eQuJZwhzvdbD6aqtDbxpOL6zDjClochODCUE=; b=pAkB90uqb3Oh/xrW3i3sBRt14/SdyPE/m6FU1am3TcOCMj7K8ztij83gDPOKkFXxd+ ELVWB08n9V4QzG6CzSUFX5IGUWQeIHGC+Mzhwlg5ht+9DYHXMlDb4pYBfCrqYQtw8nao EQhJqthRs7bfdmOfbwBdyv8MdrlMB94lUlmMKaHsktXiGnyNHpLDkng3iaKXRN7PlSMX oNQnR1rD3sY1ohRXZUyJrq7kBmVCOXQEV79wEtMtmFCALJagc1MI/kFuUKU3Fos8zL07 t+m33bKgoK+v9hyPzdyBS2BA31kaaEbcx1gb/51nbBkEFWM1LwllA6bjf+IZ0cYjqx61 3WFQ==
X-Received: by 10.50.189.193 with SMTP id gk1mr954679igc.87.1360099684190; Tue, 05 Feb 2013 13:28:04 -0800 (PST)
MIME-Version: 1.0
Received: by 10.64.63.11 with HTTP; Tue, 5 Feb 2013 13:27:34 -0800 (PST)
In-Reply-To: <1360099372.47338.YahooMailNeo@web31807.mail.mud.yahoo.com>
References: <CAJV9qO_J1-AhGB=XST0R-kwAd-9hjUbCJ4ieBPoE_OMe760mqg@mail.gmail.com> <73B7EC23-AA93-42EE-B3EB-35BA1B82558F@ve7jtb.com> <511175AA.9030301@gmail.com> <1360099372.47338.YahooMailNeo@web31807.mail.mud.yahoo.com>
From: Tim Bray <twbray@google.com>
Date: Tue, 5 Feb 2013 13:27:34 -0800
Message-ID: <CA+ZpN27GnnU6w5Dnth4zfsa+nMhi6Rsyqmq-tYOqG54+Sh-9ww@mail.gmail.com>
To: William Mills <wmills_92105@yahoo.com>
Content-Type: multipart/alternative; boundary=14dae93410d3890b5004d500e236
X-Gm-Message-State: ALoCoQms3BltgDOWzsE7DxeLV+vSOjpBXIoNxpHC1JeQdqDkLf2IOWEZjp1w3vQffxO8gY01IlFFsjQBSyVy92IRTvVEJDj00vhNAu1cwWqU3OrPEQ6baKf4ZBxtfi2iJOFgm8xUekv09CS7GQ4Y8Lz0RbYpW53MAA/0FNAfJL/fxJ8+3H3fHt0mbXGrABXjmtrX0POktrMm
Cc: "oauth@ietf.org WG" <oauth@ietf.org>
Subject: Re: [OAUTH-WG] Why OAuth it self is not an authentication framework ?
X-BeenThere: oauth@ietf.org
X-Mailman-Version: 2.1.12
Precedence: list
List-Id: OAUTH WG <oauth.ietf.org>
List-Unsubscribe: <https://www.ietf.org/mailman/options/oauth>, <mailto:oauth-request@ietf.org?subject=unsubscribe>
List-Archive: <http://www.ietf.org/mail-archive/web/oauth>
List-Post: <mailto:oauth@ietf.org>
List-Help: <mailto:oauth-request@ietf.org?subject=help>
List-Subscribe: <https://www.ietf.org/mailman/listinfo/oauth>, <mailto:oauth-request@ietf.org?subject=subscribe>
X-List-Received-Date: Tue, 05 Feb 2013 21:28:06 -0000

--14dae93410d3890b5004d500e236
Content-Type: text/plain; charset=UTF-8
Content-Transfer-Encoding: quoted-printable

OIDC seems about the most plausible candidate for a =E2=80=9Cgood general s=
olution=E2=80=9D
that I=E2=80=99m aware of.   -T

On Tue, Feb 5, 2013 at 1:22 PM, William Mills <wmills_92105@yahoo.com>wrote=
:

> There are some specific design mis-matches for OAuth as an authentication
> protocol, it's not what it's designed for and there are some problems you
> will run into.  Some have used it as such, but it's not a good general
> solution.
>
> -bill
>
>   ------------------------------
> *From:* Paul Madsen <paul.madsen@gmail.com>
> *To:* John Bradley <ve7jtb@ve7jtb.com>
> *Cc:* "oauth@ietf.org WG" <oauth@ietf.org>
> *Sent:* Tuesday, February 5, 2013 1:12 PM
> *Subject:* Re: [OAUTH-WG] Why OAuth it self is not an authentication
> framework ?
>
>  why pigeonhole it?
>
> OAuth can be deployed with no authz semantics at all (or at least as
> little as any authn mechanism), e.g client creds grant type with no scope=
s
>
> I agree that OAuth is not an *SSO* protocol.
>
>  On 2/5/13 3:36 PM, John Bradley wrote:
>
> OAuth is an Authorization protocol as many of us have pointed out.
>
>  The post is largely correct and based on one of mine.
>
>  John B.
>
>  On 2013-02-05, at 12:52 PM, Prabath Siriwardena <prabath@wso2.com> wrote=
:
>
> FYI and for your comments..
>
>
> http://blog.facilelogin.com/2013/02/why-oauth-it-self-is-not-authenticati=
on.html
>
> Thanks & Regards,
> Prabath
>
>  Mobile : +94 71 809 6732
>
> http://blog.facilelogin.com/
> http://rampartfaq.com/
>  _______________________________________________
> OAuth mailing list
> OAuth@ietf.org
> https://www.ietf.org/mailman/listinfo/oauth
>
>
>
>
> _______________________________________________
> OAuth mailing listOAuth@ietf.orghttps://www.ietf.org/mailman/listinfo/oau=
th
>
>
>
> _______________________________________________
> OAuth mailing list
> OAuth@ietf.org
> https://www.ietf.org/mailman/listinfo/oauth
>
>
>
> _______________________________________________
> OAuth mailing list
> OAuth@ietf.org
> https://www.ietf.org/mailman/listinfo/oauth
>
>

--14dae93410d3890b5004d500e236
Content-Type: text/html; charset=UTF-8
Content-Transfer-Encoding: quoted-printable

OIDC seems about the most plausible candidate for a =E2=80=9Cgood general s=
olution=E2=80=9D that I=E2=80=99m aware of. =C2=A0 -T<br><br><div class=3D"=
gmail_quote">On Tue, Feb 5, 2013 at 1:22 PM, William Mills <span dir=3D"ltr=
">&lt;<a href=3D"mailto:wmills_92105@yahoo.com" target=3D"_blank">wmills_92=
105@yahoo.com</a>&gt;</span> wrote:<br>

<blockquote class=3D"gmail_quote" style=3D"margin:0 0 0 .8ex;border-left:1p=
x #ccc solid;padding-left:1ex"><div><div style=3D"font-size:12pt;font-famil=
y:Courier New,courier,monaco,monospace,sans-serif"><div><span>There are som=
e specific design mis-matches for OAuth as an authentication protocol, it&#=
39;s not what it&#39;s designed for and there are some problems you will ru=
n into. =C2=A0Some have used it as such, but it&#39;s not a good general so=
lution.</span></div>

<div style=3D"font-style:normal;font-size:16px;background-color:transparent=
;font-family:&#39;Courier New&#39;,courier,monaco,monospace,sans-serif"><sp=
an><br></span></div><div style=3D"font-style:normal;font-size:16px;backgrou=
nd-color:transparent;font-family:&#39;Courier New&#39;,courier,monaco,monos=
pace,sans-serif">

<span>-bill</span></div><div><br></div>  <div style=3D"font-family:&#39;Cou=
rier New&#39;,courier,monaco,monospace,sans-serif;font-size:12pt"> <div sty=
le=3D"font-family:&#39;times new roman&#39;,&#39;new york&#39;,times,serif;=
font-size:12pt">

 <div dir=3D"ltr"> <font face=3D"Arial"> <hr size=3D"1">  <b><span style=3D=
"font-weight:bold">From:</span></b> Paul Madsen &lt;<a href=3D"mailto:paul.=
madsen@gmail.com" target=3D"_blank">paul.madsen@gmail.com</a>&gt;<br> <b><s=
pan style=3D"font-weight:bold">To:</span></b> John Bradley &lt;<a href=3D"m=
ailto:ve7jtb@ve7jtb.com" target=3D"_blank">ve7jtb@ve7jtb.com</a>&gt; <br>

<b><span style=3D"font-weight:bold">Cc:</span></b> &quot;<a href=3D"mailto:=
oauth@ietf.org" target=3D"_blank">oauth@ietf.org</a> WG&quot; &lt;<a href=
=3D"mailto:oauth@ietf.org" target=3D"_blank">oauth@ietf.org</a>&gt; <br> <b=
><span style=3D"font-weight:bold">Sent:</span></b> Tuesday, February 5, 201=
3 1:12 PM<br>

 <b><span style=3D"font-weight:bold">Subject:</span></b> Re: [OAUTH-WG] Why=
 OAuth it self is not an authentication framework ?<br> </font> </div> <br>
<div>
 =20

   =20
 =20
  <div><div class=3D"im">
    <font face=3D"Arial">why pigeonhole it? <br>
      <br>
      OAuth can be deployed with no authz semantics at all (or at least
      as little as any authn mechanism), e.g client creds grant type
      with no scopes<br>
      <br>
      I agree that OAuth is not an *SSO* protocol.<br>
      <br>
    </font>
    <div>On 2/5/13 3:36 PM, John Bradley wrote:<br>
    </div>
    </div><blockquote type=3D"cite"><div class=3D"im">
     =20
     =20
      OAuth is an Authorization protocol as many of us have pointed out.
      <div><br>
      </div>
      <div>The post is largely correct and based on one of mine.</div>
      <div><br>
      </div>
      <div>John B.</div>
      </div><div><br>
        <div><div class=3D"im">
          <div>On 2013-02-05, at 12:52 PM, Prabath Siriwardena &lt;<a rel=
=3D"nofollow" href=3D"mailto:prabath@wso2.com" target=3D"_blank">prabath@ws=
o2.com</a>&gt;
            wrote:</div>
          <br>
          </div><blockquote type=3D"cite"><div class=3D"im">FYI and for you=
r comments..
            <div><br>
            </div>
            </div><div><div class=3D"im"><a href=3D"http://blog.facilelogin=
.com/2013/02/why-oauth-it-self-is-not-authentication.html" target=3D"_blank=
">http://blog.facilelogin.com/2013/02/why-oauth-it-self-is-not-authenticati=
on.html</a><br clear=3D"all">


              <div>=C2=A0</div>
              Thanks &amp; Regards,<br>
              Prabath
              <div><br>
              </div>
              </div><div><div class=3D"im">Mobile : <a href=3D"tel:%2B94%20=
71%20809%206732" value=3D"+94718096732" target=3D"_blank">+94 71 809 6732</=
a>=C2=A0<br>
                <br>
                </div><a href=3D"http://blog.facilelogin.com/" target=3D"_b=
lank">http://blog.facilelogin.com/</a><br>
                <a href=3D"http://rampartfaq.com/" target=3D"_blank">http:/=
/rampartfaq.com/</a></div>
            </div><div class=3D"im">
            _______________________________________________<br>
            OAuth mailing list<br>
            <a rel=3D"nofollow" href=3D"mailto:OAuth@ietf.org" target=3D"_b=
lank">OAuth@ietf.org</a><br>
            <a rel=3D"nofollow" href=3D"https://www.ietf.org/mailman/listin=
fo/oauth" target=3D"_blank">https://www.ietf.org/mailman/listinfo/oauth</a>=
<br>
          </div></blockquote>
        </div>
        <br>
      </div><div class=3D"im">
      <br>
      <fieldset></fieldset>
      <br>
      <pre>_______________________________________________
OAuth mailing list
<a rel=3D"nofollow" href=3D"mailto:OAuth@ietf.org" target=3D"_blank">OAuth@=
ietf.org</a>
<a rel=3D"nofollow" href=3D"https://www.ietf.org/mailman/listinfo/oauth" ta=
rget=3D"_blank">https://www.ietf.org/mailman/listinfo/oauth</a>
</pre>
    </div></blockquote>
    <br>
  </div>

</div><div class=3D"im"><br>_______________________________________________=
<br>OAuth mailing list<br><a href=3D"mailto:OAuth@ietf.org" target=3D"_blan=
k">OAuth@ietf.org</a><br><a href=3D"https://www.ietf.org/mailman/listinfo/o=
auth" target=3D"_blank">https://www.ietf.org/mailman/listinfo/oauth</a><br>

<br><br> </div></div> </div>  </div></div><br>_____________________________=
__________________<br>
OAuth mailing list<br>
<a href=3D"mailto:OAuth@ietf.org">OAuth@ietf.org</a><br>
<a href=3D"https://www.ietf.org/mailman/listinfo/oauth" target=3D"_blank">h=
ttps://www.ietf.org/mailman/listinfo/oauth</a><br>
<br></blockquote></div><br>

--14dae93410d3890b5004d500e236--

From gffletch@aol.com  Tue Feb  5 13:35:13 2013
Return-Path: <gffletch@aol.com>
X-Original-To: oauth@ietfa.amsl.com
Delivered-To: oauth@ietfa.amsl.com
Received: from localhost (localhost [127.0.0.1]) by ietfa.amsl.com (Postfix) with ESMTP id 5E8AD21F88ED for <oauth@ietfa.amsl.com>; Tue,  5 Feb 2013 13:35:13 -0800 (PST)
X-Virus-Scanned: amavisd-new at amsl.com
X-Spam-Flag: NO
X-Spam-Score: -1.793
X-Spam-Level: 
X-Spam-Status: No, score=-1.793 tagged_above=-999 required=5 tests=[AWL=0.805,  BAYES_00=-2.599, HTML_MESSAGE=0.001]
Received: from mail.ietf.org ([64.170.98.30]) by localhost (ietfa.amsl.com [127.0.0.1]) (amavisd-new, port 10024) with ESMTP id 2UBTuvcf9iPp for <oauth@ietfa.amsl.com>; Tue,  5 Feb 2013 13:35:12 -0800 (PST)
Received: from imr-ma05.mx.aol.com (imr-ma05.mx.aol.com [64.12.100.31]) by ietfa.amsl.com (Postfix) with ESMTP id 266CB21F88EA for <oauth@ietf.org>; Tue,  5 Feb 2013 13:35:12 -0800 (PST)
Received: from mtaout-mb02.r1000.mx.aol.com (mtaout-mb02.r1000.mx.aol.com [172.29.41.66]) by imr-ma05.mx.aol.com (Outbound Mail Relay) with ESMTP id 860F21C00025A; Tue,  5 Feb 2013 16:35:11 -0500 (EST)
Received: from palantir.local (unknown [10.181.176.202]) (using TLSv1 with cipher DHE-RSA-AES256-SHA (256/256 bits)) (No client certificate requested) by mtaout-mb02.r1000.mx.aol.com (MUA/Third Party Client Interface) with ESMTPSA id 174D4E0000A6; Tue,  5 Feb 2013 16:35:11 -0500 (EST)
Message-ID: <51117B0D.7040703@aol.com>
Date: Tue, 05 Feb 2013 16:35:09 -0500
From: George Fletcher <gffletch@aol.com>
Organization: AOL LLC
User-Agent: Mozilla/5.0 (Macintosh; Intel Mac OS X 10.7; rv:17.0) Gecko/20130107 Thunderbird/17.0.2
MIME-Version: 1.0
To: Torsten Lodderstedt <torsten@lodderstedt.net>
References: <510E5FB5.10803@lodderstedt.net> <B33BFB58CCC8BE4998958016839DE27E06886427@IMCMBX01.MITRE.ORG> <511020D3.1090201@aol.com> <B33BFB58CCC8BE4998958016839DE27E068865E3@IMCMBX01.MITRE.ORG> <OF2060C435.DEAE300A-ON85257B09.005BEF8B-85257B09.005C2559@us.ibm.com> <2DC4D4CA-C65F-4B7D-96E3-A811B303B15A@lodderstedt.net> <51116239.7030104@mitre.org> <D67A78CC-31FB-4E5E-A9C0-BD8951742E90@lodderstedt.net>
In-Reply-To: <D67A78CC-31FB-4E5E-A9C0-BD8951742E90@lodderstedt.net>
Content-Type: multipart/alternative; boundary="------------010906020003020401020400"
x-aol-global-disposition: G
DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=mx.aol.com; s=20121107; t=1360100111; bh=G5cOypxdofvhGJ4sya/EY6km0559T73NPytfGGzdux8=; h=From:To:Subject:Message-ID:Date:MIME-Version:Content-Type; b=qwFVsoy+qD7U3wWL/acSgWqmKWM0+N080wfrcR7zC4bbgXW+1CGNOFmIjWXEWvKIq 6dXwzNl05MuVfcBCHcgIp3iUDNClzunesKqgkxEDE2ttyK+lnwTHw2hNlnBdLrHOnz nJ0TD3h1HRoKbMHXiXPTlRp3jb5DuW0ECSGgyihE=
X-AOL-SCOLL-SCORE: 0:2:483424256:93952408  
X-AOL-SCOLL-URL_COUNT: 0  
x-aol-sid: 3039ac1d294251117b0d789a
X-AOL-IP: 10.181.176.202
Cc: "oauth-bounces@ietf.org" <oauth-bounces@ietf.org>, OAuth WG <oauth@ietf.org>
Subject: Re: [OAUTH-WG] draft-ietf-oauth-revocation
X-BeenThere: oauth@ietf.org
X-Mailman-Version: 2.1.12
Precedence: list
List-Id: OAUTH WG <oauth.ietf.org>
List-Unsubscribe: <https://www.ietf.org/mailman/options/oauth>, <mailto:oauth-request@ietf.org?subject=unsubscribe>
List-Archive: <http://www.ietf.org/mail-archive/web/oauth>
List-Post: <mailto:oauth@ietf.org>
List-Help: <mailto:oauth-request@ietf.org?subject=help>
List-Subscribe: <https://www.ietf.org/mailman/listinfo/oauth>, <mailto:oauth-request@ietf.org?subject=subscribe>
X-List-Received-Date: Tue, 05 Feb 2013 21:35:13 -0000

This is a multi-part message in MIME format.
--------------010906020003020401020400
Content-Type: text/plain; charset=ISO-8859-1; format=flowed
Content-Transfer-Encoding: 7bit

I'm fine with this solution as well.  --George

On 2/5/13 3:45 PM, Torsten Lodderstedt wrote:
> I know, that's why I asked. I think this is the simplest way to deal 
> with this type of error. I therefore prefer it.
>
> Am 05.02.2013 um 20:49 schrieb Justin Richer <jricher@mitre.org 
> <mailto:jricher@mitre.org>>:
>
>> You know, that works as well. From the client's perspective, the 
>> token isn't good anymore. The client shouldn't care if the token was 
>> good in the first place if it's revoking it.
>>
>>  -- Justin
>>
>>
>> On 02/05/2013 02:41 PM, Torsten Lodderstedt wrote:
>>> Why not adopting Bill's suggestion and just return HTTP status code 
>>> 200 for (already) invalid tokens?
>>>
>>> regards,
>>> Torsten.
>>>
>>> Am 05.02.2013 um 17:46 schrieb Todd W Lainhart <lainhart@us.ibm.com 
>>> <mailto:lainhart@us.ibm.com>>:
>>>
>>>> > Could it do something with invalid_parameter that it couldn't do 
>>>> with invalid_token_parameter (among others), or vice versa?
>>>>
>>>> I'm not imagining a client doing anything programmatically useful 
>>>> with the distinction.
>>>>
>>>> *
>>>>
>>>>
>>>> Todd Lainhart
>>>> Rational software
>>>> IBM Corporation
>>>> 550 King Street, Littleton, MA 01460-1250**
>>>> 1-978-899-4705
>>>> 2-276-4705 (T/L)
>>>> lainhart@us.ibm.com <mailto:lainhart@us.ibm.com>*
>>>>
>>>>
>>>>
>>>>
>>>>
>>>>
>>>> From: "Richer, Justin P." <jricher@mitre.org 
>>>> <mailto:jricher@mitre.org>>
>>>> To: George Fletcher <gffletch@aol.com <mailto:gffletch@aol.com>>,
>>>> Cc: OAuth WG <oauth@ietf.org <mailto:oauth@ietf.org>>
>>>> Date: 02/04/2013 04:10 PM
>>>> Subject: Re: [OAUTH-WG] draft-ietf-oauth-revocation
>>>> Sent by: oauth-bounces@ietf.org <mailto:oauth-bounces@ietf.org>
>>>> ------------------------------------------------------------------------
>>>>
>>>>
>>>>
>>>>
>>>> On Feb 4, 2013, at 3:57 PM, George Fletcher <gffletch@aol.com 
>>>> <mailto:gffletch@aol.com>>
>>>> wrote:
>>>>
>>>> >
>>>> > On 2/4/13 3:41 PM, Richer, Justin P. wrote:
>>>> >> On Feb 3, 2013, at 8:01 AM, Torsten Lodderstedt 
>>>> <torsten@lodderstedt.net <mailto:torsten@lodderstedt.net>> wrote:
>>>> >>
>>>> >>
>>>> >>> - invalid_token error code: I propose to use the new error code 
>>>> "invalid_parameter" (as suggested by Peter and George). I don't see 
>>>> the need to register it (see 
>>>> http://www.ietf.org/mail-archive/web/oauth/current/msg10604.html) 
>>>> but would like to get your advice.
>>>> >> something more like "invalid_token_parameter" would maybe make 
>>>> sense, since it's not just *any* parameter, it's the special 
>>>> "token" parameter that we're talking about, but it's distinct from 
>>>> the invalid_token response. The introspection endpoint uses the 
>>>> same pattern of a token= parameter, but since the whole point of 
>>>> the introspection endpoint is determining token validity it doesn't 
>>>> actually throw an error here.
>>>> >>
>>>> >> I agree that it doesn't need to be registered (since it's on a 
>>>> different endpoint).
>>>> > For what it's worth my thinking was that if we have an 
>>>> 'invalid_parameter' error, then the description can define which 
>>>> parameter is invalid. I don't think we should create a bunch of 
>>>> specific error values that are endpoint specific and could overlap 
>>>> which is where the whole error return value started.
>>>> >
>>>>
>>>> Hm, I see what you're saying, but the error response is already 
>>>> endpoint specific. Though there is value in not having conflicting 
>>>> and/or confusing responses from different endpoints that use the 
>>>> same error code for different things.
>>>>
>>>> What it really comes down to is: what can the client do with this 
>>>> error? Could it do something with invalid_parameter that it 
>>>> couldn't do with invalid_token_parameter (among others), or vice 
>>>> versa? As I'm writing this out, I'm not convinced that it could, 
>>>> really, so this may be a bike shedding argument.
>>>>
>>>> -- Justin
>>>>
>>>>
>>>> _______________________________________________
>>>> OAuth mailing list
>>>> OAuth@ietf.org <mailto:OAuth@ietf.org>
>>>> https://www.ietf.org/mailman/listinfo/oauth
>>>>
>>>>
>>>> _______________________________________________
>>>> OAuth mailing list
>>>> OAuth@ietf.org <mailto:OAuth@ietf.org>
>>>> https://www.ietf.org/mailman/listinfo/oauth
>>
>
>
> _______________________________________________
> OAuth mailing list
> OAuth@ietf.org
> https://www.ietf.org/mailman/listinfo/oauth


--------------010906020003020401020400
Content-Type: text/html; charset=ISO-8859-1
Content-Transfer-Encoding: 7bit

<html>
  <head>
    <meta content="text/html; charset=ISO-8859-1"
      http-equiv="Content-Type">
  </head>
  <body bgcolor="#FFFFFF" text="#000000">
    <font face="Helvetica, Arial, sans-serif">I'm fine with this
      solution as well.&nbsp; --George<br>
      <br>
    </font>
    <div class="moz-cite-prefix">On 2/5/13 3:45 PM, Torsten Lodderstedt
      wrote:<br>
    </div>
    <blockquote
      cite="mid:D67A78CC-31FB-4E5E-A9C0-BD8951742E90@lodderstedt.net"
      type="cite">
      <meta http-equiv="content-type" content="text/html;
        charset=ISO-8859-1">
      <div>I know, that's why I asked. I think this is the simplest way
        to deal with this type of error. I therefore prefer it.</div>
      <div><br>
        Am 05.02.2013 um 20:49 schrieb Justin Richer &lt;<a
          moz-do-not-send="true" href="mailto:jricher@mitre.org">jricher@mitre.org</a>&gt;:<br>
        <br>
      </div>
      <blockquote type="cite">
        <div>
          <meta content="text/html; charset=ISO-8859-1"
            http-equiv="Content-Type">
          You know, that works as well. From the client's perspective,
          the token isn't good anymore. The client shouldn't care if the
          token was good in the first place if it's revoking it.<br>
          <br>
          &nbsp;-- Justin<br>
          <br>
          <br>
          <div class="moz-cite-prefix">On 02/05/2013 02:41 PM, Torsten
            Lodderstedt wrote:<br>
          </div>
          <blockquote
            cite="mid:2DC4D4CA-C65F-4B7D-96E3-A811B303B15A@lodderstedt.net"
            type="cite">
            <meta http-equiv="Content-Type" content="text/html;
              charset=ISO-8859-1">
            <div>Why not adopting Bill's suggestion and just return HTTP
              status code 200 for (already) invalid tokens?</div>
            <div><br>
            </div>
            <div>regards,</div>
            <div>Torsten.</div>
            <div><br>
              Am 05.02.2013 um 17:46 schrieb Todd W Lainhart &lt;<a
                moz-do-not-send="true" href="mailto:lainhart@us.ibm.com">lainhart@us.ibm.com</a>&gt;:<br>
              <br>
            </div>
            <blockquote type="cite">
              <div><font face="sans-serif" size="2">&gt; </font><tt><font
                    size="2">Could it do something with
                    invalid_parameter that it couldn't do with
                    invalid_token_parameter (among others), or vice
                    versa? </font></tt> <br>
                <br>
                <font face="sans-serif" size="2">I'm not imagining a
                  client doing anything programmatically useful with the
                  distinction.<br>
                </font> <br>
                <table style="border-collapse:collapse;" width="223">
                  <tbody>
                    <tr height="8">
                      <td
                        style="border-style:solid;border-color:#000000;border-width:0px
                        0px 0px 0px;padding:0px 0px;" bgcolor="white"
                        width="223"><font face="Verdana" size="1"><b><br>
                            <br>
                            <br>
                            Todd Lainhart<br>
                            Rational software<br>
                            IBM Corporation<br>
                            550 King Street, Littleton, MA 01460-1250</b></font><font
                          face="Arial" size="1"><b><br>
                            1-978-899-4705<br>
                            2-276-4705 (T/L)<br>
                            <a moz-do-not-send="true"
                              href="mailto:lainhart@us.ibm.com">lainhart@us.ibm.com</a></b></font></td>
                    </tr>
                  </tbody>
                </table>
                <br>
                <br>
                <br>
                <br>
                <br>
                <font color="#5f5f5f" face="sans-serif" size="1">From: &nbsp;
                  &nbsp; &nbsp; &nbsp;</font><font face="sans-serif" size="1">"Richer,
                  Justin P." &lt;<a moz-do-not-send="true"
                    href="mailto:jricher@mitre.org">jricher@mitre.org</a>&gt;</font>
                <br>
                <font color="#5f5f5f" face="sans-serif" size="1">To: &nbsp; &nbsp;
                  &nbsp; &nbsp;</font><font face="sans-serif" size="1">George
                  Fletcher &lt;<a moz-do-not-send="true"
                    href="mailto:gffletch@aol.com">gffletch@aol.com</a>&gt;,

                </font> <br>
                <font color="#5f5f5f" face="sans-serif" size="1">Cc: &nbsp; &nbsp;
                  &nbsp; &nbsp;</font><font face="sans-serif" size="1">OAuth WG
                  &lt;<a moz-do-not-send="true"
                    href="mailto:oauth@ietf.org">oauth@ietf.org</a>&gt;</font>
                <br>
                <font color="#5f5f5f" face="sans-serif" size="1">Date: &nbsp;
                  &nbsp; &nbsp; &nbsp;</font><font face="sans-serif" size="1">02/04/2013
                  04:10 PM</font> <br>
                <font color="#5f5f5f" face="sans-serif" size="1">Subject:
                  &nbsp; &nbsp; &nbsp; &nbsp;</font><font face="sans-serif" size="1">Re:
                  [OAUTH-WG] draft-ietf-oauth-revocation</font> <br>
                <font color="#5f5f5f" face="sans-serif" size="1">Sent
                  by: &nbsp; &nbsp; &nbsp; &nbsp;</font><font face="sans-serif" size="1"><a
                    moz-do-not-send="true"
                    href="mailto:oauth-bounces@ietf.org">oauth-bounces@ietf.org</a></font>
                <br>
                <hr noshade="noshade"> <br>
                <br>
                <br>
                <tt><font size="2"><br>
                    On Feb 4, 2013, at 3:57 PM, George Fletcher &lt;<a
                      moz-do-not-send="true"
                      href="mailto:gffletch@aol.com">gffletch@aol.com</a>&gt;<br>
                    wrote:<br>
                    <br>
                    &gt; <br>
                    &gt; On 2/4/13 3:41 PM, Richer, Justin P. wrote:<br>
                    &gt;&gt; On Feb 3, 2013, at 8:01 AM, Torsten
                    Lodderstedt &lt;<a moz-do-not-send="true"
                      href="mailto:torsten@lodderstedt.net">torsten@lodderstedt.net</a>&gt;

                    wrote:<br>
                    &gt;&gt; <br>
                    &gt;&gt; <br>
                    &gt;&gt;&gt; - invalid_token error code: I propose
                    to use the new error code "invalid_parameter" (as
                    suggested by Peter and George). I don't see the need
                    to register it (see </font></tt><a
                  moz-do-not-send="true"
                  href="http://www.ietf.org/mail-archive/web/oauth/current/msg10604.html"><tt><font
                      size="2">http://www.ietf.org/mail-archive/web/oauth/current/msg10604.html</font></tt></a><tt><font
                    size="2">) but would like to get your advice.<br>
                    &gt;&gt; something more like
                    "invalid_token_parameter" would maybe make sense,
                    since it's not just *any* parameter, it's the
                    special "token" parameter that we're talking about,
                    but it's distinct from the invalid_token response.
                    The introspection endpoint uses the same pattern of
                    a token= parameter, but since the whole point of the
                    introspection endpoint is determining token validity
                    it doesn't actually throw an error here.<br>
                    &gt;&gt; <br>
                    &gt;&gt; I agree that it doesn't need to be
                    registered (since it's on a different endpoint).<br>
                    &gt; For what it's worth my thinking was that if we
                    have an 'invalid_parameter' error, then the
                    description can define which parameter is invalid. I
                    don't think we should create a bunch of specific
                    error values that are endpoint specific and could
                    overlap which is where the whole error return value
                    started.<br>
                    &gt; <br>
                    <br>
                    Hm, I see what you're saying, but the error response
                    is already endpoint specific. Though there is value
                    in not having conflicting and/or confusing responses
                    from different endpoints that use the same error
                    code for different things. <br>
                    <br>
                    What it really comes down to is: what can the client
                    do with this error? Could it do something with
                    invalid_parameter that it couldn't do with
                    invalid_token_parameter (among others), or vice
                    versa? As I'm writing this out, I'm not convinced
                    that it could, really, so this may be a bike
                    shedding argument.<br>
                    <br>
                    -- Justin<br>
                    <br>
                    <br>
                    _______________________________________________<br>
                    OAuth mailing list<br>
                    <a moz-do-not-send="true"
                      href="mailto:OAuth@ietf.org">OAuth@ietf.org</a><br>
                  </font></tt><a moz-do-not-send="true"
                  href="https://www.ietf.org/mailman/listinfo/oauth"><tt><font
                      size="2">https://www.ietf.org/mailman/listinfo/oauth</font></tt></a><tt><font
                    size="2"><br>
                    <br>
                  </font></tt> <br>
              </div>
            </blockquote>
            <blockquote type="cite">
              <div><span>_______________________________________________</span><br>
                <span>OAuth mailing list</span><br>
                <span><a moz-do-not-send="true"
                    href="mailto:OAuth@ietf.org">OAuth@ietf.org</a></span><br>
                <span><a moz-do-not-send="true"
                    href="https://www.ietf.org/mailman/listinfo/oauth">https://www.ietf.org/mailman/listinfo/oauth</a></span><br>
              </div>
            </blockquote>
          </blockquote>
          <br>
        </div>
      </blockquote>
      <br>
      <fieldset class="mimeAttachmentHeader"></fieldset>
      <br>
      <pre wrap="">_______________________________________________
OAuth mailing list
<a class="moz-txt-link-abbreviated" href="mailto:OAuth@ietf.org">OAuth@ietf.org</a>
<a class="moz-txt-link-freetext" href="https://www.ietf.org/mailman/listinfo/oauth">https://www.ietf.org/mailman/listinfo/oauth</a>
</pre>
    </blockquote>
    <br>
  </body>
</html>

--------------010906020003020401020400--

From lainhart@us.ibm.com  Tue Feb  5 13:40:01 2013
Return-Path: <lainhart@us.ibm.com>
X-Original-To: oauth@ietfa.amsl.com
Delivered-To: oauth@ietfa.amsl.com
Received: from localhost (localhost [127.0.0.1]) by ietfa.amsl.com (Postfix) with ESMTP id 6542F21F892E for <oauth@ietfa.amsl.com>; Tue,  5 Feb 2013 13:40:01 -0800 (PST)
X-Virus-Scanned: amavisd-new at amsl.com
X-Spam-Flag: NO
X-Spam-Score: -10.52
X-Spam-Level: 
X-Spam-Status: No, score=-10.52 tagged_above=-999 required=5 tests=[AWL=0.078,  BAYES_00=-2.599, HTML_MESSAGE=0.001, RCVD_IN_DNSWL_HI=-8]
Received: from mail.ietf.org ([64.170.98.30]) by localhost (ietfa.amsl.com [127.0.0.1]) (amavisd-new, port 10024) with ESMTP id iUQa1v2PKMuS for <oauth@ietfa.amsl.com>; Tue,  5 Feb 2013 13:40:00 -0800 (PST)
Received: from e8.ny.us.ibm.com (e8.ny.us.ibm.com [32.97.182.138]) by ietfa.amsl.com (Postfix) with ESMTP id E01FB21F8915 for <oauth@ietf.org>; Tue,  5 Feb 2013 13:39:58 -0800 (PST)
Received: from /spool/local by e8.ny.us.ibm.com with IBM ESMTP SMTP Gateway: Authorized Use Only! Violators will be prosecuted for <oauth@ietf.org> from <lainhart@us.ibm.com>; Tue, 5 Feb 2013 16:39:57 -0500
Received: from d01dlp01.pok.ibm.com (9.56.250.166) by e8.ny.us.ibm.com (192.168.1.108) with IBM ESMTP SMTP Gateway: Authorized Use Only! Violators will be prosecuted;  Tue, 5 Feb 2013 16:39:55 -0500
Received: from d01relay02.pok.ibm.com (d01relay02.pok.ibm.com [9.56.227.234]) by d01dlp01.pok.ibm.com (Postfix) with ESMTP id 3969F38C8021; Tue,  5 Feb 2013 16:39:55 -0500 (EST)
Received: from d01av01.pok.ibm.com (d01av01.pok.ibm.com [9.56.224.215]) by d01relay02.pok.ibm.com (8.13.8/8.13.8/NCO v10.0) with ESMTP id r15LdsIb275304; Tue, 5 Feb 2013 16:39:54 -0500
Received: from d01av01.pok.ibm.com (loopback [127.0.0.1]) by d01av01.pok.ibm.com (8.14.4/8.13.1/NCO v10.0 AVout) with ESMTP id r15LdsnE004472; Tue, 5 Feb 2013 16:39:54 -0500
Received: from d01ml255.pok.ibm.com (d01ml255.pok.ibm.com [9.63.10.54]) by d01av01.pok.ibm.com (8.14.4/8.13.1/NCO v10.0 AVin) with ESMTP id r15Ldsv4004454; Tue, 5 Feb 2013 16:39:54 -0500
In-Reply-To: <51117B0D.7040703@aol.com>
References: <510E5FB5.10803@lodderstedt.net>	<B33BFB58CCC8BE4998958016839DE27E06886427@IMCMBX01.MITRE.ORG> <511020D3.1090201@aol.com>	<B33BFB58CCC8BE4998958016839DE27E068865E3@IMCMBX01.MITRE.ORG> <OF2060C435.DEAE300A-ON85257B09.005BEF8B-85257B09.005C2559@us.ibm.com>	<2DC4D4CA-C65F-4B7D-96E3-A811B303B15A@lodderstedt.net> <51116239.7030104@mitre.org>	<D67A78CC-31FB-4E5E-A9C0-BD8951742E90@lodderstedt.net> <51117B0D.7040703@aol.com>
To: George Fletcher <gffletch@aol.com>
MIME-Version: 1.0
X-KeepSent: F051EEAA:E9A53F64-85257B09:0076FEB6; type=4; name=$KeepSent
X-Mailer: Lotus Notes Release 8.5.3FP2 SHF22 July 19, 2012
Message-ID: <OFF051EEAA.E9A53F64-ON85257B09.0076FEB6-85257B09.007701D9@us.ibm.com>
From: Todd W Lainhart <lainhart@us.ibm.com>
Date: Tue, 5 Feb 2013 16:39:52 -0500
X-MIMETrack: Serialize by Router on D01ML255/01/M/IBM(Release 8.5.3FP2 ZX853FP2HF4|December 14, 2012) at 02/05/2013 16:39:54, Serialize complete at 02/05/2013 16:39:54
Content-Type: multipart/alternative; boundary="=_alternative 007701D885257B09_="
X-Content-Scanned: Fidelis XPS MAILER
x-cbid: 13020521-9360-0000-0000-000010329CCC
Cc: OAuth WG <oauth@ietf.org>, "oauth-bounces@ietf.org" <oauth-bounces@ietf.org>
Subject: Re: [OAUTH-WG] draft-ietf-oauth-revocation
X-BeenThere: oauth@ietf.org
X-Mailman-Version: 2.1.12
Precedence: list
List-Id: OAUTH WG <oauth.ietf.org>
List-Unsubscribe: <https://www.ietf.org/mailman/options/oauth>, <mailto:oauth-request@ietf.org?subject=unsubscribe>
List-Archive: <http://www.ietf.org/mail-archive/web/oauth>
List-Post: <mailto:oauth@ietf.org>
List-Help: <mailto:oauth-request@ietf.org?subject=help>
List-Subscribe: <https://www.ietf.org/mailman/listinfo/oauth>, <mailto:oauth-request@ietf.org?subject=subscribe>
X-List-Received-Date: Tue, 05 Feb 2013 21:40:01 -0000

This is a multipart message in MIME format.
--=_alternative 007701D885257B09_=
Content-Type: text/plain; charset="US-ASCII"

+1





Todd Lainhart
Rational software
IBM Corporation
550 King Street, Littleton, MA 01460-1250
1-978-899-4705
2-276-4705 (T/L)
lainhart@us.ibm.com




From:   George Fletcher <gffletch@aol.com>
To:     Torsten Lodderstedt <torsten@lodderstedt.net>, 
Cc:     "oauth-bounces@ietf.org" <oauth-bounces@ietf.org>, OAuth WG 
<oauth@ietf.org>
Date:   02/05/2013 04:35 PM
Subject:        Re: [OAUTH-WG] draft-ietf-oauth-revocation
Sent by:        oauth-bounces@ietf.org



I'm fine with this solution as well.  --George

On 2/5/13 3:45 PM, Torsten Lodderstedt wrote:
I know, that's why I asked. I think this is the simplest way to deal with 
this type of error. I therefore prefer it.

Am 05.02.2013 um 20:49 schrieb Justin Richer <jricher@mitre.org>:

You know, that works as well. From the client's perspective, the token 
isn't good anymore. The client shouldn't care if the token was good in the 
first place if it's revoking it.

 -- Justin


On 02/05/2013 02:41 PM, Torsten Lodderstedt wrote:
Why not adopting Bill's suggestion and just return HTTP status code 200 
for (already) invalid tokens?

regards,
Torsten.

Am 05.02.2013 um 17:46 schrieb Todd W Lainhart <lainhart@us.ibm.com>:

> Could it do something with invalid_parameter that it couldn't do with 
invalid_token_parameter (among others), or vice versa? 

I'm not imagining a client doing anything programmatically useful with the 
distinction.




Todd Lainhart
Rational software
IBM Corporation
550 King Street, Littleton, MA 01460-1250
1-978-899-4705
2-276-4705 (T/L)
lainhart@us.ibm.com





From:        "Richer, Justin P." <jricher@mitre.org> 
To:        George Fletcher <gffletch@aol.com>, 
Cc:        OAuth WG <oauth@ietf.org> 
Date:        02/04/2013 04:10 PM 
Subject:        Re: [OAUTH-WG] draft-ietf-oauth-revocation 
Sent by:        oauth-bounces@ietf.org 




On Feb 4, 2013, at 3:57 PM, George Fletcher <gffletch@aol.com>
wrote:

> 
> On 2/4/13 3:41 PM, Richer, Justin P. wrote:
>> On Feb 3, 2013, at 8:01 AM, Torsten Lodderstedt <
torsten@lodderstedt.net> wrote:
>> 
>> 
>>> - invalid_token error code: I propose to use the new error code 
"invalid_parameter" (as suggested by Peter and George). I don't see the 
need to register it (see 
http://www.ietf.org/mail-archive/web/oauth/current/msg10604.html) but 
would like to get your advice.
>> something more like "invalid_token_parameter" would maybe make sense, 
since it's not just *any* parameter, it's the special "token" parameter 
that we're talking about, but it's distinct from the invalid_token 
response. The introspection endpoint uses the same pattern of a token= 
parameter, but since the whole point of the introspection endpoint is 
determining token validity it doesn't actually throw an error here.
>> 
>> I agree that it doesn't need to be registered (since it's on a 
different endpoint).
> For what it's worth my thinking was that if we have an 
'invalid_parameter' error, then the description can define which parameter 
is invalid. I don't think we should create a bunch of specific error 
values that are endpoint specific and could overlap which is where the 
whole error return value started.
> 

Hm, I see what you're saying, but the error response is already endpoint 
specific. Though there is value in not having conflicting and/or confusing 
responses from different endpoints that use the same error code for 
different things. 

What it really comes down to is: what can the client do with this error? 
Could it do something with invalid_parameter that it couldn't do with 
invalid_token_parameter (among others), or vice versa? As I'm writing this 
out, I'm not convinced that it could, really, so this may be a bike 
shedding argument.

-- Justin


_______________________________________________
OAuth mailing list
OAuth@ietf.org
https://www.ietf.org/mailman/listinfo/oauth


_______________________________________________
OAuth mailing list
OAuth@ietf.org
https://www.ietf.org/mailman/listinfo/oauth



_______________________________________________
OAuth mailing list
OAuth@ietf.org
https://www.ietf.org/mailman/listinfo/oauth

_______________________________________________
OAuth mailing list
OAuth@ietf.org
https://www.ietf.org/mailman/listinfo/oauth


--=_alternative 007701D885257B09_=
Content-Type: text/html; charset="US-ASCII"

<font size=2 face="sans-serif">+1<br>
</font>
<br>
<table width=223 style="border-collapse:collapse;">
<tr height=8>
<td width=223 bgcolor=white style="border-style:solid;border-color:#000000;border-width:0px 0px 0px 0px;padding:0px 0px;"><font size=1 face="Verdana"><b><br>
<br>
<br>
Todd Lainhart<br>
Rational software<br>
IBM Corporation<br>
550 King Street, Littleton, MA 01460-1250</b></font><font size=1 face="Arial"><b><br>
1-978-899-4705<br>
2-276-4705 (T/L)<br>
lainhart@us.ibm.com</b></font></table>
<br>
<br>
<br>
<br>
<br><font size=1 color=#5f5f5f face="sans-serif">From: &nbsp; &nbsp; &nbsp;
&nbsp;</font><font size=1 face="sans-serif">George Fletcher &lt;gffletch@aol.com&gt;</font>
<br><font size=1 color=#5f5f5f face="sans-serif">To: &nbsp; &nbsp; &nbsp;
&nbsp;</font><font size=1 face="sans-serif">Torsten Lodderstedt
&lt;torsten@lodderstedt.net&gt;, </font>
<br><font size=1 color=#5f5f5f face="sans-serif">Cc: &nbsp; &nbsp; &nbsp;
&nbsp;</font><font size=1 face="sans-serif">&quot;oauth-bounces@ietf.org&quot;
&lt;oauth-bounces@ietf.org&gt;, OAuth WG &lt;oauth@ietf.org&gt;</font>
<br><font size=1 color=#5f5f5f face="sans-serif">Date: &nbsp; &nbsp; &nbsp;
&nbsp;</font><font size=1 face="sans-serif">02/05/2013 04:35 PM</font>
<br><font size=1 color=#5f5f5f face="sans-serif">Subject: &nbsp; &nbsp;
&nbsp; &nbsp;</font><font size=1 face="sans-serif">Re: [OAUTH-WG]
draft-ietf-oauth-revocation</font>
<br><font size=1 color=#5f5f5f face="sans-serif">Sent by: &nbsp; &nbsp;
&nbsp; &nbsp;</font><font size=1 face="sans-serif">oauth-bounces@ietf.org</font>
<br>
<hr noshade>
<br>
<br>
<br><font size=3 face="Arial">I'm fine with this solution as well. &nbsp;--George<br>
</font>
<br><font size=3>On 2/5/13 3:45 PM, Torsten Lodderstedt wrote:</font>
<br><font size=3>I know, that's why I asked. I think this is the simplest
way to deal with this type of error. I therefore prefer it.</font>
<br><font size=3><br>
Am 05.02.2013 um 20:49 schrieb Justin Richer &lt;</font><a href=mailto:jricher@mitre.org><font size=3 color=blue><u>jricher@mitre.org</u></font></a><font size=3>&gt;:<br>
</font>
<br><font size=3>You know, that works as well. From the client's perspective,
the token isn't good anymore. The client shouldn't care if the token was
good in the first place if it's revoking it.<br>
<br>
 -- Justin<br>
<br>
</font>
<br><font size=3>On 02/05/2013 02:41 PM, Torsten Lodderstedt wrote:</font>
<br><font size=3>Why not adopting Bill's suggestion and just return HTTP
status code 200 for (already) invalid tokens?</font>
<br>
<br><font size=3>regards,</font>
<br><font size=3>Torsten.</font>
<br><font size=3><br>
Am 05.02.2013 um 17:46 schrieb Todd W Lainhart &lt;</font><a href=mailto:lainhart@us.ibm.com><font size=3 color=blue><u>lainhart@us.ibm.com</u></font></a><font size=3>&gt;:<br>
</font>
<br><font size=2 face="sans-serif">&gt; </font><tt><font size=2>Could it
do something with invalid_parameter that it couldn't do with invalid_token_parameter
(among others), or vice versa? </font></tt><font size=3><br>
</font><font size=2 face="sans-serif"><br>
I'm not imagining a client doing anything programmatically useful with
the distinction.</font><font size=3><br>
</font>
<table width=223 style="border-collapse:collapse;">
<tr height=8>
<td width=221 bgcolor=white style="border-style:solid;border-color:#000000;border-width:0px 0px 0px 0px;padding:1px 1px;"><font size=1 face="Verdana"><b><br>
<br>
<br>
Todd Lainhart<br>
Rational software<br>
IBM Corporation<br>
550 King Street, Littleton, MA 01460-1250</b></font><font size=1 face="Arial"><b><br>
1-978-899-4705<br>
2-276-4705 (T/L)</b></font><font size=1 color=blue face="Arial"><b><u><br>
</u></b></font><a href=mailto:lainhart@us.ibm.com><font size=1 color=blue face="Arial"><b><u>lainhart@us.ibm.com</u></b></font></a></table>
<br><font size=3><br>
<br>
<br>
<br>
</font><font size=1 color=#5f5f5f face="sans-serif"><br>
From: &nbsp; &nbsp; &nbsp; &nbsp;</font><font size=1 face="sans-serif">&quot;Richer,
Justin P.&quot; &lt;</font><a href=mailto:jricher@mitre.org><font size=1 color=blue face="sans-serif"><u>jricher@mitre.org</u></font></a><font size=1 face="sans-serif">&gt;</font><font size=3>
</font><font size=1 color=#5f5f5f face="sans-serif"><br>
To: &nbsp; &nbsp; &nbsp; &nbsp;</font><font size=1 face="sans-serif">George
Fletcher &lt;</font><a href=mailto:gffletch@aol.com><font size=1 color=blue face="sans-serif"><u>gffletch@aol.com</u></font></a><font size=1 face="sans-serif">&gt;,
</font><font size=1 color=#5f5f5f face="sans-serif"><br>
Cc: &nbsp; &nbsp; &nbsp; &nbsp;</font><font size=1 face="sans-serif">OAuth
WG &lt;</font><a href=mailto:oauth@ietf.org><font size=1 color=blue face="sans-serif"><u>oauth@ietf.org</u></font></a><font size=1 face="sans-serif">&gt;</font><font size=3>
</font><font size=1 color=#5f5f5f face="sans-serif"><br>
Date: &nbsp; &nbsp; &nbsp; &nbsp;</font><font size=1 face="sans-serif">02/04/2013
04:10 PM</font><font size=3> </font><font size=1 color=#5f5f5f face="sans-serif"><br>
Subject: &nbsp; &nbsp; &nbsp; &nbsp;</font><font size=1 face="sans-serif">Re:
[OAUTH-WG] draft-ietf-oauth-revocation</font><font size=3> </font><font size=1 color=#5f5f5f face="sans-serif"><br>
Sent by: &nbsp; &nbsp; &nbsp; &nbsp;</font><a href="mailto:oauth-bounces@ietf.org"><font size=1 color=blue face="sans-serif"><u>oauth-bounces@ietf.org</u></font></a><font size=3>
<br>
</font>
<hr noshade><font size=3><br>
<br>
</font><tt><font size=2><br>
<br>
On Feb 4, 2013, at 3:57 PM, George Fletcher &lt;</font></tt><a href=mailto:gffletch@aol.com><tt><font size=2 color=blue><u>gffletch@aol.com</u></font></tt></a><tt><font size=2>&gt;<br>
wrote:<br>
<br>
&gt; <br>
&gt; On 2/4/13 3:41 PM, Richer, Justin P. wrote:<br>
&gt;&gt; On Feb 3, 2013, at 8:01 AM, Torsten Lodderstedt &lt;</font></tt><a href=mailto:torsten@lodderstedt.net><tt><font size=2 color=blue><u>torsten@lodderstedt.net</u></font></tt></a><tt><font size=2>&gt;
wrote:<br>
&gt;&gt; <br>
&gt;&gt; <br>
&gt;&gt;&gt; - invalid_token error code: I propose to use the new error
code &quot;invalid_parameter&quot; (as suggested by Peter and George).
I don't see the need to register it (see </font></tt><a href="http://www.ietf.org/mail-archive/web/oauth/current/msg10604.html"><tt><font size=2 color=blue><u>http://www.ietf.org/mail-archive/web/oauth/current/msg10604.html</u></font></tt></a><tt><font size=2>)
but would like to get your advice.<br>
&gt;&gt; something more like &quot;invalid_token_parameter&quot; would
maybe make sense, since it's not just *any* parameter, it's the special
&quot;token&quot; parameter that we're talking about, but it's distinct
from the invalid_token response. The introspection endpoint uses the same
pattern of a token= parameter, but since the whole point of the introspection
endpoint is determining token validity it doesn't actually throw an error
here.<br>
&gt;&gt; <br>
&gt;&gt; I agree that it doesn't need to be registered (since it's on a
different endpoint).<br>
&gt; For what it's worth my thinking was that if we have an 'invalid_parameter'
error, then the description can define which parameter is invalid. I don't
think we should create a bunch of specific error values that are endpoint
specific and could overlap which is where the whole error return value
started.<br>
&gt; <br>
<br>
Hm, I see what you're saying, but the error response is already endpoint
specific. Though there is value in not having conflicting and/or confusing
responses from different endpoints that use the same error code for different
things. <br>
<br>
What it really comes down to is: what can the client do with this error?
Could it do something with invalid_parameter that it couldn't do with invalid_token_parameter
(among others), or vice versa? As I'm writing this out, I'm not convinced
that it could, really, so this may be a bike shedding argument.<br>
<br>
-- Justin<br>
<br>
<br>
_______________________________________________<br>
OAuth mailing list</font></tt><tt><font size=2 color=blue><u><br>
</u></font></tt><a href=mailto:OAuth@ietf.org><tt><font size=2 color=blue><u>OAuth@ietf.org</u></font></tt></a><font size=3 color=blue><u><br>
</u></font><a href=https://www.ietf.org/mailman/listinfo/oauth><tt><font size=2 color=blue><u>https://www.ietf.org/mailman/listinfo/oauth</u></font></tt></a><tt><font size=2><br>
</font></tt><font size=3><br>
</font>
<br><font size=3>_______________________________________________<br>
OAuth mailing list</font><font size=3 color=blue><u><br>
</u></font><a href=mailto:OAuth@ietf.org><font size=3 color=blue><u>OAuth@ietf.org</u></font></a><font size=3 color=blue><u><br>
</u></font><a href=https://www.ietf.org/mailman/listinfo/oauth><font size=3 color=blue><u>https://www.ietf.org/mailman/listinfo/oauth</u></font></a>
<br>
<br><font size=3><br>
</font>
<br><tt><font size=3>_______________________________________________<br>
OAuth mailing list<br>
</font></tt><a href=mailto:OAuth@ietf.org><tt><font size=3 color=blue><u>OAuth@ietf.org</u></font></tt></a><tt><font size=3><br>
</font></tt><a href=https://www.ietf.org/mailman/listinfo/oauth><tt><font size=3 color=blue><u>https://www.ietf.org/mailman/listinfo/oauth</u></font></tt></a><tt><font size=3><br>
</font></tt>
<br><tt><font size=2>_______________________________________________<br>
OAuth mailing list<br>
OAuth@ietf.org<br>
</font></tt><a href=https://www.ietf.org/mailman/listinfo/oauth><tt><font size=2>https://www.ietf.org/mailman/listinfo/oauth</font></tt></a><tt><font size=2><br>
</font></tt>
<br>
--=_alternative 007701D885257B09_=--


From Adam.Lewis@motorolasolutions.com  Tue Feb  5 14:34:15 2013
Return-Path: <Adam.Lewis@motorolasolutions.com>
X-Original-To: oauth@ietfa.amsl.com
Delivered-To: oauth@ietfa.amsl.com
Received: from localhost (localhost [127.0.0.1]) by ietfa.amsl.com (Postfix) with ESMTP id DE23321F8904 for <oauth@ietfa.amsl.com>; Tue,  5 Feb 2013 14:34:15 -0800 (PST)
X-Virus-Scanned: amavisd-new at amsl.com
X-Spam-Flag: NO
X-Spam-Score: -3.167
X-Spam-Level: 
X-Spam-Status: No, score=-3.167 tagged_above=-999 required=5 tests=[AWL=-0.300, BAYES_00=-2.599, HTML_MESSAGE=0.001, J_CHICKENPOX_210=0.6, RCVD_IN_DNSWL_MED=-4, UNRESOLVED_TEMPLATE=3.132]
Received: from mail.ietf.org ([64.170.98.30]) by localhost (ietfa.amsl.com [127.0.0.1]) (amavisd-new, port 10024) with ESMTP id ruLEVxV8djEc for <oauth@ietfa.amsl.com>; Tue,  5 Feb 2013 14:34:14 -0800 (PST)
Received: from co9outboundpool.messaging.microsoft.com (co9ehsobe003.messaging.microsoft.com [207.46.163.26]) by ietfa.amsl.com (Postfix) with ESMTP id 9A28A21F8900 for <oauth@ietf.org>; Tue,  5 Feb 2013 14:34:14 -0800 (PST)
Received: from mail71-co9-R.bigfish.com (10.236.132.244) by CO9EHSOBE028.bigfish.com (10.236.130.91) with Microsoft SMTP Server id 14.1.225.23; Tue, 5 Feb 2013 22:34:13 +0000
Received: from mail71-co9 (localhost [127.0.0.1])	by mail71-co9-R.bigfish.com (Postfix) with ESMTP id CA20FA0224	for <oauth@ietf.org>; Tue,  5 Feb 2013 22:34:13 +0000 (UTC)
X-Forefront-Antispam-Report: CIP:192.160.210.14; KIP:(null); UIP:(null); IPV:NLI; H:ct11msg02.am.mot-solutions.com; RD:ct11msg02.mot-solutions.com; EFVD:NLI
X-SpamScore: -25
X-BigFish: VPS-25(zzbb2dI98dI9371Ic89bh936eI1b0bIc857hzz1ee6h1de0h1202h1e76h1d1ah1d2ahzz1033IL177df4h17326ah8275bh8275dh18c673hz2fh2a8h683h839hd25hf0ah1288h12a5h12bdh137ah1441h1504h1537h153bh15d0h162dh1631h1758h18e1h1946h1155h)
Received-SPF: pass (mail71-co9: domain of motorolasolutions.com designates 192.160.210.14 as permitted sender) client-ip=192.160.210.14; envelope-from=Adam.Lewis@motorolasolutions.com; helo=ct11msg02.am.mot-solutions.com ; olutions.com ; 
X-Forefront-Antispam-Report-Untrusted: CIP:157.56.237.133; KIP:(null); UIP:(null); (null); H:BY2PRD0411HT003.namprd04.prod.outlook.com; R:internal; EFV:INT
Received: from mail71-co9 (localhost.localdomain [127.0.0.1]) by mail71-co9 (MessageSwitch) id 1360103652450158_32735; Tue,  5 Feb 2013 22:34:12 +0000 (UTC)
Received: from CO9EHSMHS032.bigfish.com (unknown [10.236.132.251])	by mail71-co9.bigfish.com (Postfix) with ESMTP id 6B9A92E008A	for <oauth@ietf.org>; Tue,  5 Feb 2013 22:34:12 +0000 (UTC)
Received: from ct11msg02.am.mot-solutions.com (192.160.210.14) by CO9EHSMHS032.bigfish.com (10.236.130.42) with Microsoft SMTP Server (TLS) id 14.1.225.23; Tue, 5 Feb 2013 22:30:34 +0000
Received: from ct11msg02.am.mot-solutions.com (ct11vts03.am.mot.com [10.177.16.162])	by ct11msg02.am.mot-solutions.com (8.14.3/8.14.3) with ESMTP id r15Mda5Z021704	for <oauth@ietf.org>; Tue, 5 Feb 2013 17:39:36 -0500 (EST)
Received: from CO9EHSOBE038.bigfish.com (co9ehsobe004.messaging.microsoft.com [207.46.163.27])	by ct11msg02.am.mot-solutions.com (8.14.3/8.14.3) with ESMTP id r15MdZHS021688	(version=TLSv1/SSLv3 cipher=AES128-SHA bits=128 verify=FAIL)	for <oauth@ietf.org>; Tue, 5 Feb 2013 17:39:36 -0500 (EST)
Received: from mail197-co9-R.bigfish.com (10.236.132.235) by CO9EHSOBE038.bigfish.com (10.236.130.101) with Microsoft SMTP Server id 14.1.225.23; Tue, 5 Feb 2013 22:30:10 +0000
Received: from mail197-co9 (localhost [127.0.0.1])	by mail197-co9-R.bigfish.com (Postfix) with ESMTP id 17F8BB40432	for <oauth@ietf.org.FOPE.CONNECTOR.OVERRIDE>; Tue,  5 Feb 2013 22:30:10 +0000 (UTC)
Received: from mail197-co9 (localhost.localdomain [127.0.0.1]) by mail197-co9 (MessageSwitch) id 1360103384875753_17074; Tue,  5 Feb 2013 22:29:44 +0000 (UTC)
Received: from CO9EHSMHS032.bigfish.com (unknown [10.236.132.250])	by mail197-co9.bigfish.com (Postfix) with ESMTP id CDC1054007B; Tue,  5 Feb 2013 22:29:44 +0000 (UTC)
Received: from BY2PRD0411HT003.namprd04.prod.outlook.com (157.56.237.133) by CO9EHSMHS032.bigfish.com (10.236.130.42) with Microsoft SMTP Server (TLS) id 14.1.225.23; Tue, 5 Feb 2013 22:27:13 +0000
Received: from BY2PRD0411MB441.namprd04.prod.outlook.com ([169.254.5.124]) by BY2PRD0411HT003.namprd04.prod.outlook.com ([10.255.128.38]) with mapi id 14.16.0263.000; Tue, 5 Feb 2013 22:27:12 +0000
From: Lewis Adam-CAL022 <Adam.Lewis@motorolasolutions.com>
To: Tim Bray <twbray@google.com>, William Mills <wmills_92105@yahoo.com>
Thread-Topic: [OAUTH-WG] Why OAuth it self is not an authentication framework	?
Thread-Index: AQHOA+fGJBeF9Xfhl02+J3AuR3qpvZhr1Efg
Date: Tue, 5 Feb 2013 22:27:12 +0000
Message-ID: <59E470B10C4630419ED717AC79FCF9A9483E7B3D@BY2PRD0411MB441.namprd04.prod.outlook.com>
References: <CAJV9qO_J1-AhGB=XST0R-kwAd-9hjUbCJ4ieBPoE_OMe760mqg@mail.gmail.com> <73B7EC23-AA93-42EE-B3EB-35BA1B82558F@ve7jtb.com> <511175AA.9030301@gmail.com> <1360099372.47338.YahooMailNeo@web31807.mail.mud.yahoo.com> <CA+ZpN27GnnU6w5Dnth4zfsa+nMhi6Rsyqmq-tYOqG54+Sh-9ww@mail.gmail.com>
In-Reply-To: <CA+ZpN27GnnU6w5Dnth4zfsa+nMhi6Rsyqmq-tYOqG54+Sh-9ww@mail.gmail.com>
Accept-Language: en-US
Content-Language: en-US
X-MS-Has-Attach: 
X-MS-TNEF-Correlator: 
x-originating-ip: [150.130.48.53]
Content-Type: multipart/alternative; boundary="_000_59E470B10C4630419ED717AC79FCF9A9483E7B3DBY2PRD0411MB441_"
MIME-Version: 1.0
X-FOPE-CONNECTOR: Id%0$Dn%*$RO%0$TLS%0$FQDN%$TlsDn%
X-FOPE-CONNECTOR: Id%1294$Dn%GOOGLE.COM$RO%2$TLS%3$FQDN%msgate.mot-solutions.com$TlsDn%
X-FOPE-CONNECTOR: Id%1294$Dn%YAHOO.COM$RO%2$TLS%3$FQDN%msgate.mot-solutions.com$TlsDn%
X-FOPE-CONNECTOR: Id%1294$Dn%IETF.ORG$RO%2$TLS%3$FQDN%msgate.mot-solutions.com$TlsDn%
X-CFilter-Loop: Reflected
X-OriginatorOrg: motorolasolutions.com
Cc: "oauth@ietf.org WG" <oauth@ietf.org>
Subject: Re: [OAUTH-WG] Why OAuth it self is not an authentication framework	?
X-BeenThere: oauth@ietf.org
X-Mailman-Version: 2.1.12
Precedence: list
List-Id: OAUTH WG <oauth.ietf.org>
List-Unsubscribe: <https://www.ietf.org/mailman/options/oauth>, <mailto:oauth-request@ietf.org?subject=unsubscribe>
List-Archive: <http://www.ietf.org/mail-archive/web/oauth>
List-Post: <mailto:oauth@ietf.org>
List-Help: <mailto:oauth-request@ietf.org?subject=help>
List-Subscribe: <https://www.ietf.org/mailman/listinfo/oauth>, <mailto:oauth-request@ietf.org?subject=subscribe>
X-List-Received-Date: Tue, 05 Feb 2013 22:34:16 -0000

--_000_59E470B10C4630419ED717AC79FCF9A9483E7B3DBY2PRD0411MB441_
Content-Type: text/plain; charset="utf-8"
Content-Transfer-Encoding: base64
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--_000_59E470B10C4630419ED717AC79FCF9A9483E7B3DBY2PRD0411MB441_
Content-Type: text/html; charset="utf-8"
Content-Transfer-Encoding: base64
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--_000_59E470B10C4630419ED717AC79FCF9A9483E7B3DBY2PRD0411MB441_--

From ve7jtb@ve7jtb.com  Tue Feb  5 15:28:29 2013
Return-Path: <ve7jtb@ve7jtb.com>
X-Original-To: oauth@ietfa.amsl.com
Delivered-To: oauth@ietfa.amsl.com
Received: from localhost (localhost [127.0.0.1]) by ietfa.amsl.com (Postfix) with ESMTP id 321C921F8915 for <oauth@ietfa.amsl.com>; Tue,  5 Feb 2013 15:28:29 -0800 (PST)
X-Virus-Scanned: amavisd-new at amsl.com
X-Spam-Flag: NO
X-Spam-Score: -3.298
X-Spam-Level: 
X-Spam-Status: No, score=-3.298 tagged_above=-999 required=5 tests=[AWL=-0.300, BAYES_00=-2.599, HTML_MESSAGE=0.001, J_CHICKENPOX_210=0.6, RCVD_IN_DNSWL_LOW=-1]
Received: from mail.ietf.org ([64.170.98.30]) by localhost (ietfa.amsl.com [127.0.0.1]) (amavisd-new, port 10024) with ESMTP id jd7EI6VsIE89 for <oauth@ietfa.amsl.com>; Tue,  5 Feb 2013 15:28:28 -0800 (PST)
Received: from mail-oa0-f53.google.com (mail-oa0-f53.google.com [209.85.219.53]) by ietfa.amsl.com (Postfix) with ESMTP id CB4E521F8881 for <oauth@ietf.org>; Tue,  5 Feb 2013 15:28:27 -0800 (PST)
Received: by mail-oa0-f53.google.com with SMTP id m1so868169oag.26 for <oauth@ietf.org>; Tue, 05 Feb 2013 15:28:27 -0800 (PST)
X-Google-DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=google.com; s=20120113; h=x-received:content-type:mime-version:subject:from:in-reply-to:date :cc:message-id:references:to:x-mailer:x-gm-message-state; bh=A5pIVdGhqYNyusjUjtkG4iB09tkBXeQiZqzsxceTVd0=; b=aDFWUleBHF+G0D+R2llDO7qPyf7sK9IH3e2/vDhjxfK3rbQoOXpxienHoRX25eYjyk rOX5fXr1h2CvM/5YNsPu3VLTjA44ervGQmPK80t0OL6Qg2KPqlw/F3qSF+TGtwJiIqJ5 Rj4VdY6865h7wDWZfDmPIjIYIxtBSeL+epWjXkT8VG24uBc49DAcmiFQkUvgmyUVL86H MrPeSwqkjQb3/KYFZZzv5LbHQ68sXBwcYZ7NNEK9hM6luTZlkRNtBK2ibuacXJD3KFiq qgJ1DqRjyc6k4BdbjWErHx/1iT4oyuOTnYFX97veYxe5mu1YW1QLGkJWQlUdLAVRQvVU uzCg==
X-Received: by 10.60.172.40 with SMTP id az8mr20383824oec.5.1360106907274; Tue, 05 Feb 2013 15:28:27 -0800 (PST)
Received: from [10.37.15.80] ([96.8.44.21]) by mx.google.com with ESMTPS id el2sm26920225obc.9.2013.02.05.15.28.23 (version=TLSv1 cipher=ECDHE-RSA-RC4-SHA bits=128/128); Tue, 05 Feb 2013 15:28:25 -0800 (PST)
Content-Type: multipart/signed; boundary="Apple-Mail=_EC7D6972-4C3C-4FE3-8B53-858A12E17C41"; protocol="application/pkcs7-signature"; micalg=sha1
Mime-Version: 1.0 (Mac OS X Mail 6.2 \(1499\))
From: John Bradley <ve7jtb@ve7jtb.com>
In-Reply-To: <59E470B10C4630419ED717AC79FCF9A9483E7B3D@BY2PRD0411MB441.namprd04.prod.outlook.com>
Date: Tue, 5 Feb 2013 16:28:24 -0700
Message-Id: <148B9187-4907-4189-BF58-B1AE5E211F58@ve7jtb.com>
References: <CAJV9qO_J1-AhGB=XST0R-kwAd-9hjUbCJ4ieBPoE_OMe760mqg@mail.gmail.com> <73B7EC23-AA93-42EE-B3EB-35BA1B82558F@ve7jtb.com> <511175AA.9030301@gmail.com> <1360099372.47338.YahooMailNeo@web31807.mail.mud.yahoo.com> <CA+ZpN27GnnU6w5Dnth4zfsa+nMhi6Rsyqmq-tYOqG54+Sh-9ww@mail.gmail.com> <59E470B10C4630419ED717AC79FCF9A9483E7B3D@BY2PRD0411MB441.namprd04.prod.outlook.com>
To: Lewis Adam-CAL022 <Adam.Lewis@motorolasolutions.com>
X-Mailer: Apple Mail (2.1499)
X-Gm-Message-State: ALoCoQlPtvKcobAXI9CEDPzpKdhSv2rmmyIZ7Ym/odMke24gltn+MZfgEwTWkfp4OVSTy459b9/H
Cc: "oauth@ietf.org WG" <oauth@ietf.org>
Subject: Re: [OAUTH-WG] Why OAuth it self is not an authentication framework	?
X-BeenThere: oauth@ietf.org
X-Mailman-Version: 2.1.12
Precedence: list
List-Id: OAUTH WG <oauth.ietf.org>
List-Unsubscribe: <https://www.ietf.org/mailman/options/oauth>, <mailto:oauth-request@ietf.org?subject=unsubscribe>
List-Archive: <http://www.ietf.org/mail-archive/web/oauth>
List-Post: <mailto:oauth@ietf.org>
List-Help: <mailto:oauth-request@ietf.org?subject=help>
List-Subscribe: <https://www.ietf.org/mailman/listinfo/oauth>, <mailto:oauth-request@ietf.org?subject=subscribe>
X-List-Received-Date: Tue, 05 Feb 2013 23:28:29 -0000

--Apple-Mail=_EC7D6972-4C3C-4FE3-8B53-858A12E17C41
Content-Type: multipart/alternative;
	boundary="Apple-Mail=_39FC561D-99DC-4D2A-99A9-0D5DF02F39B9"


--Apple-Mail=_39FC561D-99DC-4D2A-99A9-0D5DF02F39B9
Content-Transfer-Encoding: quoted-printable
Content-Type: text/plain;
	charset=windows-1252

I am not against using OAuth to build other protocols.

I am only concerned that when people build those things they perform the =
appropriate security analyses, and not make inappropriate assumptions =
about the underlying protocol.

You  can certainly use OAuth to authenticate a principal to a client or =
a client to a RS in lots of ways that will work.
When you do that you are creating a new protocol that needs to be looked =
at for security considerations, or you wind up introducing replay and =
substitution attacks that don't apply to pure OAuth.

OAuth is a framework to build things on, like TLS or HTTP.

John B.
On 2013-02-05, at 3:27 PM, Lewis Adam-CAL022 =
<Adam.Lewis@motorolasolutions.com> wrote:

> I think this is becoming a largely academic / philosophical argument =
by this time.  The people who designed OAuth will likely point out that =
it was conceptualized as an authorization protocol to enable a RO to =
delegate access to a client to access its protected resources on some =
RS.  And of course this is the history of it.  And the RO and end-user =
were typically the same entity.  But get caught up in what it was =
envisioned to do vs. real life use cases that OAuth can solve (and is =
solving) beyond its initial use cases misses the point =85 because OAuth =
is gaining traction in the enterprise and will be used in all different =
sorts of ways, including authentication.=20
> =20
> This is especially true of RESTful APIs within an enterprise where the =
RO and end-user are *not* the same: e.g. RO=3Denterprise and =
end-user=3Demployee.  In this model the end-user is not authorizing =
anything when their client requests a token from the AS =85 they =
authenticate to the AS and the client gets an AT, which will likely be =
profiled by most enterprise deployments to look something like an OIDC =
id_token.  The AT will be presented to the RS which will examine the =
claims (user identity, LOA, etc.) and make authorization decisions based =
on business logic.  The AT has not authorized the user to do anything, =
it has only made an assertion that the user has been authenticated by =
the AS (sort of sounds a lot like an IdP now).
> =20
> All this talked of OAuth being authorization and not authentication =
was extremely confusing to me when I first started looking at OAuth for =
my use cases, and I think at some point the authors of OAuth are going =
to have to recognize that their baby has grown up to be multi-faceted =
(and I mean this as a complement).  The abstractions left in the OAuth =
spec (while some have claimed of the lack of interoperability it will =
cause) will also enable it to be used in ways possibly still not =
envisioned by any of us.  I think as soon as we can stop trying to draw =
the artificial line around OAuth being =93an authorization protocol=94 =
the better things will be.
> =20
> I like to say that they authors had it right when they named it =
=93OAuth=94 and not =93OAuthR=94 J
> =20
> -adam
> =20
> From: oauth-bounces@ietf.org [mailto:oauth-bounces@ietf.org] On Behalf =
Of Tim Bray
> Sent: Tuesday, February 05, 2013 3:28 PM
> To: William Mills
> Cc: oauth@ietf.org WG
> Subject: Re: [OAUTH-WG] Why OAuth it self is not an authentication =
framework ?
> =20
> OIDC seems about the most plausible candidate for a =93good general =
solution=94 that I=92m aware of.   -T
>=20
> On Tue, Feb 5, 2013 at 1:22 PM, William Mills <wmills_92105@yahoo.com> =
wrote:
> There are some specific design mis-matches for OAuth as an =
authentication protocol, it's not what it's designed for and there are =
some problems you will run into.  Some have used it as such, but it's =
not a good general solution.
> =20
> -bill
> =20
> From: Paul Madsen <paul.madsen@gmail.com>
> To: John Bradley <ve7jtb@ve7jtb.com>=20
> Cc: "oauth@ietf.org WG" <oauth@ietf.org>=20
> Sent: Tuesday, February 5, 2013 1:12 PM
> Subject: Re: [OAUTH-WG] Why OAuth it self is not an authentication =
framework ?
> =20
> why pigeonhole it?=20
>=20
> OAuth can be deployed with no authz semantics at all (or at least as =
little as any authn mechanism), e.g client creds grant type with no =
scopes
>=20
> I agree that OAuth is not an *SSO* protocol.
>=20
> On 2/5/13 3:36 PM, John Bradley wrote:
> OAuth is an Authorization protocol as many of us have pointed out.
> =20
> The post is largely correct and based on one of mine.
> =20
> John B.
> =20
> On 2013-02-05, at 12:52 PM, Prabath Siriwardena <prabath@wso2.com> =
wrote:
> =20
> FYI and for your comments..
> =20
> =
http://blog.facilelogin.com/2013/02/why-oauth-it-self-is-not-authenticatio=
n.html
> =20
> Thanks & Regards,
> Prabath
> =20
> Mobile : +94 71 809 6732=20
>=20
> http://blog.facilelogin.com/
> http://rampartfaq.com/
> _______________________________________________
> OAuth mailing list
> OAuth@ietf.org
> https://www.ietf.org/mailman/listinfo/oauth
> =20
> =20
>=20
> _______________________________________________
> OAuth mailing list
> OAuth@ietf.org
> https://www.ietf.org/mailman/listinfo/oauth
> =20
>=20
> _______________________________________________
> OAuth mailing list
> OAuth@ietf.org
> https://www.ietf.org/mailman/listinfo/oauth
>=20
>=20
>=20
> _______________________________________________
> OAuth mailing list
> OAuth@ietf.org
> https://www.ietf.org/mailman/listinfo/oauth
>=20
> =20
> _______________________________________________
> OAuth mailing list
> OAuth@ietf.org
> https://www.ietf.org/mailman/listinfo/oauth


--Apple-Mail=_39FC561D-99DC-4D2A-99A9-0D5DF02F39B9
Content-Transfer-Encoding: quoted-printable
Content-Type: text/html;
	charset=windows-1252

<html><head><meta http-equiv=3D"Content-Type" content=3D"text/html =
charset=3Dwindows-1252"><base href=3D"x-msg://2036/"></head><body =
style=3D"word-wrap: break-word; -webkit-nbsp-mode: space; =
-webkit-line-break: after-white-space; ">I am not against using OAuth to =
build other protocols.<div><br></div><div>I am only concerned that when =
people build those things they perform the appropriate security =
analyses, and not make inappropriate assumptions about the underlying =
protocol.</div><div><br></div><div>You &nbsp;can certainly use OAuth to =
authenticate a principal to a client or a client to a RS in lots of ways =
that will work.</div><div>When you do that you are creating a new =
protocol that needs to be looked at for security considerations, or you =
wind up introducing replay and substitution attacks that don't apply to =
pure OAuth.</div><div><br></div><div>OAuth is a framework to build =
things on, like TLS or HTTP.</div><div><br></div><div>John =
B.</div><div><div><div>On 2013-02-05, at 3:27 PM, Lewis Adam-CAL022 =
&lt;<a =
href=3D"mailto:Adam.Lewis@motorolasolutions.com">Adam.Lewis@motorolasoluti=
ons.com</a>&gt; wrote:</div><br =
class=3D"Apple-interchange-newline"><blockquote type=3D"cite"><div =
lang=3D"EN-US" link=3D"blue" vlink=3D"purple" style=3D"font-family: =
Helvetica; font-size: medium; font-style: normal; font-variant: normal; =
font-weight: normal; letter-spacing: normal; line-height: normal; =
orphans: 2; text-align: -webkit-auto; text-indent: 0px; text-transform: =
none; white-space: normal; widows: 2; word-spacing: 0px; =
-webkit-text-size-adjust: auto; -webkit-text-stroke-width: 0px; "><div =
class=3D"WordSection1" style=3D"page: WordSection1; "><div =
style=3D"margin: 0in 0in 0.0001pt; font-size: 12pt; font-family: 'Times =
New Roman', serif; "><span style=3D"font-size: 10.5pt; font-family: =
'Book Antiqua', serif; color: olive; ">I think this is becoming a =
largely academic / philosophical argument by this time.&nbsp; The people =
who designed OAuth will likely point out that it was conceptualized as =
an authorization protocol to enable a RO to delegate access to a client =
to access its protected resources on some RS.&nbsp; And of course this =
is the history of it.&nbsp; And the RO and end-user were typically the =
same entity.&nbsp; But get caught up in what it was envisioned to do vs. =
real life use cases that OAuth can solve (and is solving) beyond its =
initial use cases misses the point =85 because OAuth is gaining traction =
in the enterprise and will be used in all different sorts of ways, =
including authentication.&nbsp;<o:p></o:p></span></div><div =
style=3D"margin: 0in 0in 0.0001pt; font-size: 12pt; font-family: 'Times =
New Roman', serif; "><span style=3D"font-size: 10.5pt; font-family: =
'Book Antiqua', serif; color: olive; ">&nbsp;</span></div><div =
style=3D"margin: 0in 0in 0.0001pt; font-size: 12pt; font-family: 'Times =
New Roman', serif; "><span style=3D"font-size: 10.5pt; font-family: =
'Book Antiqua', serif; color: olive; ">This is especially true of =
RESTful APIs within an enterprise where the RO and end-user are =
*<b>not</b>* the same: e.g. RO=3Denterprise and end-user=3Demployee.&nbsp;=
 In this model the end-user is not authorizing anything when their =
client requests a token from the AS =85 they authenticate to the AS and =
the client gets an AT, which will likely be profiled by most enterprise =
deployments to look something like an OIDC id_token.&nbsp; The AT will =
be presented to the RS which will examine the claims (user identity, =
LOA, etc.) and make authorization decisions based on business =
logic.&nbsp; The AT has not authorized the user to do anything, it has =
only made an assertion that the user has been authenticated by the AS =
(sort of sounds a lot like an IdP now).<o:p></o:p></span></div><div =
style=3D"margin: 0in 0in 0.0001pt; font-size: 12pt; font-family: 'Times =
New Roman', serif; "><span style=3D"font-size: 10.5pt; font-family: =
'Book Antiqua', serif; color: olive; ">&nbsp;</span></div><div =
style=3D"margin: 0in 0in 0.0001pt; font-size: 12pt; font-family: 'Times =
New Roman', serif; "><span style=3D"font-size: 10.5pt; font-family: =
'Book Antiqua', serif; color: olive; ">All this talked of OAuth being =
authorization and not authentication was extremely confusing to me when =
I first started looking at OAuth for my use cases, and I think at some =
point the authors of OAuth are going to have to recognize that their =
baby has grown up to be multi-faceted (and I mean this as a =
complement).&nbsp; The abstractions left in the OAuth spec (while some =
have claimed of the lack of interoperability it will cause) will also =
enable it to be used in ways possibly still not envisioned by any of =
us.&nbsp; I think as soon as we can stop trying to draw the artificial =
line around OAuth being =93an authorization protocol=94 the better =
things will be.<o:p></o:p></span></div><div style=3D"margin: 0in 0in =
0.0001pt; font-size: 12pt; font-family: 'Times New Roman', serif; =
"><span style=3D"font-size: 10.5pt; font-family: 'Book Antiqua', serif; =
color: olive; ">&nbsp;</span></div><div style=3D"margin: 0in 0in =
0.0001pt; font-size: 12pt; font-family: 'Times New Roman', serif; =
"><span style=3D"font-size: 10.5pt; font-family: 'Book Antiqua', serif; =
color: olive; ">I like to say that they authors had it right when they =
named it =93OAuth=94 and not =93OAuthR=94<span =
class=3D"Apple-converted-space">&nbsp;</span></span><span =
style=3D"font-size: 10.5pt; font-family: Wingdings; color: olive; =
">J</span><span style=3D"font-size: 10.5pt; font-family: 'Book Antiqua', =
serif; color: olive; "><o:p></o:p></span></div><div style=3D"margin: 0in =
0in 0.0001pt; font-size: 12pt; font-family: 'Times New Roman', serif; =
"><span style=3D"font-size: 10.5pt; font-family: 'Book Antiqua', serif; =
color: olive; ">&nbsp;</span></div><div style=3D"margin: 0in 0in =
0.0001pt; font-size: 12pt; font-family: 'Times New Roman', serif; =
"><span style=3D"font-size: 10.5pt; font-family: 'Book Antiqua', serif; =
color: olive; ">-adam<o:p></o:p></span></div><div style=3D"margin: 0in =
0in 0.0001pt; font-size: 12pt; font-family: 'Times New Roman', serif; =
"><span style=3D"font-size: 10.5pt; font-family: 'Book Antiqua', serif; =
color: olive; ">&nbsp;</span></div><div style=3D"border-style: solid =
none none; border-top-width: 1pt; border-top-color: rgb(181, 196, 223); =
padding: 3pt 0in 0in; "><div style=3D"margin: 0in 0in 0.0001pt; =
font-size: 12pt; font-family: 'Times New Roman', serif; "><b><span =
style=3D"font-size: 10pt; font-family: Tahoma, sans-serif; =
">From:</span></b><span style=3D"font-size: 10pt; font-family: Tahoma, =
sans-serif; "><span class=3D"Apple-converted-space">&nbsp;</span><a =
href=3D"mailto:oauth-bounces@ietf.org">oauth-bounces@ietf.org</a> =
[mailto:oauth-<a =
href=3D"mailto:bounces@ietf.org">bounces@ietf.org</a>]<span =
class=3D"Apple-converted-space">&nbsp;</span><b>On Behalf Of<span =
class=3D"Apple-converted-space">&nbsp;</span></b>Tim =
Bray<br><b>Sent:</b><span =
class=3D"Apple-converted-space">&nbsp;</span>Tuesday, February 05, 2013 =
3:28 PM<br><b>To:</b><span =
class=3D"Apple-converted-space">&nbsp;</span>William =
Mills<br><b>Cc:</b><span class=3D"Apple-converted-space">&nbsp;</span><a =
href=3D"mailto:oauth@ietf.org">oauth@ietf.org</a> =
WG<br><b>Subject:</b><span =
class=3D"Apple-converted-space">&nbsp;</span>Re: [OAUTH-WG] Why OAuth it =
self is not an authentication framework =
?<o:p></o:p></span></div></div><div style=3D"margin: 0in 0in 0.0001pt; =
font-size: 12pt; font-family: 'Times New Roman', serif; =
"><o:p>&nbsp;</o:p></div><p class=3D"MsoNormal" style=3D"margin: 0in 0in =
12pt; font-size: 12pt; font-family: 'Times New Roman', serif; ">OIDC =
seems about the most plausible candidate for a =93good general solution=94=
 that I=92m aware of. &nbsp; -T<o:p></o:p></p><div><div style=3D"margin: =
0in 0in 0.0001pt; font-size: 12pt; font-family: 'Times New Roman', =
serif; ">On Tue, Feb 5, 2013 at 1:22 PM, William Mills &lt;<a =
href=3D"mailto:wmills_92105@yahoo.com" target=3D"_blank" style=3D"color: =
purple; text-decoration: underline; ">wmills_92105@yahoo.com</a>&gt; =
wrote:<o:p></o:p></div><div><div><div style=3D"margin: 0in 0in 0.0001pt; =
font-size: 12pt; font-family: 'Times New Roman', serif; "><span =
style=3D"font-family: 'Courier New', serif; ">There are some specific =
design mis-matches for OAuth as an authentication protocol, it's not =
what it's designed for and there are some problems you will run into. =
&nbsp;Some have used it as such, but it's not a good general =
solution.<o:p></o:p></span></div></div><div><div style=3D"margin: 0in =
0in 0.0001pt; font-size: 12pt; font-family: 'Times New Roman', serif; =
"><span style=3D"font-family: 'Courier New', serif; =
">&nbsp;</span></div></div><div><div style=3D"margin: 0in 0in 0.0001pt; =
font-size: 12pt; font-family: 'Times New Roman', serif; "><span =
style=3D"font-family: 'Courier New', serif; =
">-bill<o:p></o:p></span></div></div><div><div style=3D"margin: 0in 0in =
0.0001pt; font-size: 12pt; font-family: 'Times New Roman', serif; =
"><span style=3D"font-family: 'Courier New', serif; =
">&nbsp;</span></div></div><div><div><div class=3D"MsoNormal" =
align=3D"center" style=3D"margin: 0in 0in 0.0001pt; font-size: 12pt; =
font-family: 'Times New Roman', serif; text-align: center; "><span =
style=3D"font-family: Arial, sans-serif; "><hr size=3D"1" width=3D"100%" =
align=3D"center"></span></div><div style=3D"margin: 0in 0in 0.0001pt; =
font-size: 12pt; font-family: 'Times New Roman', serif; "><b><span =
style=3D"font-family: Arial, sans-serif; ">From:</span></b><span =
style=3D"font-family: Arial, sans-serif; "><span =
class=3D"Apple-converted-space">&nbsp;</span>Paul Madsen &lt;<a =
href=3D"mailto:paul.madsen@gmail.com" target=3D"_blank" style=3D"color: =
purple; text-decoration: underline; =
">paul.madsen@gmail.com</a>&gt;<br><b>To:</b><span =
class=3D"Apple-converted-space">&nbsp;</span>John Bradley &lt;<a =
href=3D"mailto:ve7jtb@ve7jtb.com" target=3D"_blank" style=3D"color: =
purple; text-decoration: underline; ">ve7jtb@ve7jtb.com</a>&gt;<span =
class=3D"Apple-converted-space">&nbsp;</span><br><b>Cc:</b><span =
class=3D"Apple-converted-space">&nbsp;</span>"<a =
href=3D"mailto:oauth@ietf.org" target=3D"_blank" style=3D"color: purple; =
text-decoration: underline; ">oauth@ietf.org</a><span =
class=3D"Apple-converted-space">&nbsp;</span>WG" &lt;<a =
href=3D"mailto:oauth@ietf.org" target=3D"_blank" style=3D"color: purple; =
text-decoration: underline; ">oauth@ietf.org</a>&gt;<span =
class=3D"Apple-converted-space">&nbsp;</span><br><b>Sent:</b><span =
class=3D"Apple-converted-space">&nbsp;</span>Tuesday, February 5, 2013 =
1:12 PM<br><b>Subject:</b><span =
class=3D"Apple-converted-space">&nbsp;</span>Re: [OAUTH-WG] Why OAuth it =
self is not an authentication framework =
?</span><o:p></o:p></div></div><div style=3D"margin: 0in 0in 0.0001pt; =
font-size: 12pt; font-family: 'Times New Roman', serif; =
"><o:p>&nbsp;</o:p></div><div><div><p class=3D"MsoNormal" style=3D"margin:=
 0in 0in 12pt; font-size: 12pt; font-family: 'Times New Roman', serif; =
"><span style=3D"font-family: Arial, sans-serif; ">why pigeonhole =
it?<span class=3D"Apple-converted-space">&nbsp;</span><br><br>OAuth can =
be deployed with no authz semantics at all (or at least as little as any =
authn mechanism), e.g client creds grant type with no scopes<br><br>I =
agree that OAuth is not an *SSO* =
protocol.</span><o:p></o:p></p><div><div style=3D"margin: 0in 0in =
0.0001pt; font-size: 12pt; font-family: 'Times New Roman', serif; ">On =
2/5/13 3:36 PM, John Bradley =
wrote:<o:p></o:p></div></div></div><blockquote style=3D"margin-top: 5pt; =
margin-bottom: 5pt; "><div><div style=3D"margin: 0in 0in 0.0001pt; =
font-size: 12pt; font-family: 'Times New Roman', serif; ">OAuth is an =
Authorization protocol as many of us have pointed =
out.<o:p></o:p></div><div><div style=3D"margin: 0in 0in 0.0001pt; =
font-size: 12pt; font-family: 'Times New Roman', serif; =
"><o:p>&nbsp;</o:p></div></div><div><div style=3D"margin: 0in 0in =
0.0001pt; font-size: 12pt; font-family: 'Times New Roman', serif; ">The =
post is largely correct and based on one of =
mine.<o:p></o:p></div></div><div><div style=3D"margin: 0in 0in 0.0001pt; =
font-size: 12pt; font-family: 'Times New Roman', serif; =
"><o:p>&nbsp;</o:p></div></div><div><div style=3D"margin: 0in 0in =
0.0001pt; font-size: 12pt; font-family: 'Times New Roman', serif; ">John =
B.<o:p></o:p></div></div></div><div><div style=3D"margin: 0in 0in =
0.0001pt; font-size: 12pt; font-family: 'Times New Roman', serif; =
"><o:p>&nbsp;</o:p></div><div><div><div><div style=3D"margin: 0in 0in =
0.0001pt; font-size: 12pt; font-family: 'Times New Roman', serif; ">On =
2013-02-05, at 12:52 PM, Prabath Siriwardena &lt;<a =
href=3D"mailto:prabath@wso2.com" target=3D"_blank" style=3D"color: =
purple; text-decoration: underline; ">prabath@wso2.com</a>&gt; =
wrote:<o:p></o:p></div></div><div style=3D"margin: 0in 0in 0.0001pt; =
font-size: 12pt; font-family: 'Times New Roman', serif; =
"><o:p>&nbsp;</o:p></div></div><blockquote style=3D"margin-top: 5pt; =
margin-bottom: 5pt; "><div><div style=3D"margin: 0in 0in 0.0001pt; =
font-size: 12pt; font-family: 'Times New Roman', serif; ">FYI and for =
your comments..<o:p></o:p></div><div><div style=3D"margin: 0in 0in =
0.0001pt; font-size: 12pt; font-family: 'Times New Roman', serif; =
"><o:p>&nbsp;</o:p></div></div></div><div><div><div style=3D"margin: 0in =
0in 0.0001pt; font-size: 12pt; font-family: 'Times New Roman', serif; =
"><a =
href=3D"http://blog.facilelogin.com/2013/02/why-oauth-it-self-is-not-authe=
ntication.html" target=3D"_blank" style=3D"color: purple; =
text-decoration: underline; =
">http://blog.facilelogin.com/2013/02/why-oauth-it-self-is-not-authenticat=
ion.html</a><br clear=3D"all"><o:p></o:p></div><div><div style=3D"margin: =
0in 0in 0.0001pt; font-size: 12pt; font-family: 'Times New Roman', =
serif; ">&nbsp;<o:p></o:p></div></div><div style=3D"margin: 0in 0in =
0.0001pt; font-size: 12pt; font-family: 'Times New Roman', serif; =
">Thanks &amp; Regards,<br>Prabath<o:p></o:p></div><div><div =
style=3D"margin: 0in 0in 0.0001pt; font-size: 12pt; font-family: 'Times =
New Roman', serif; "><o:p>&nbsp;</o:p></div></div></div><div><div><p =
class=3D"MsoNormal" style=3D"margin: 0in 0in 12pt; font-size: 12pt; =
font-family: 'Times New Roman', serif; ">Mobile :<span =
class=3D"Apple-converted-space">&nbsp;</span><a =
href=3D"tel:%2B94%2071%20809%206732" target=3D"_blank" style=3D"color: =
purple; text-decoration: underline; ">+94 71 809 =
6732</a>&nbsp;<o:p></o:p></p></div><div style=3D"margin: 0in 0in =
0.0001pt; font-size: 12pt; font-family: 'Times New Roman', serif; "><a =
href=3D"http://blog.facilelogin.com/" target=3D"_blank" style=3D"color: =
purple; text-decoration: underline; =
">http://blog.facilelogin.com/</a><br><a href=3D"http://rampartfaq.com/" =
target=3D"_blank" style=3D"color: purple; text-decoration: underline; =
">http://rampartfaq.com/</a><o:p></o:p></div></div></div><div><div =
style=3D"margin: 0in 0in 0.0001pt; font-size: 12pt; font-family: 'Times =
New Roman', serif; =
">_______________________________________________<br>OAuth mailing =
list<br><a href=3D"mailto:OAuth@ietf.org" target=3D"_blank" =
style=3D"color: purple; text-decoration: underline; =
">OAuth@ietf.org</a><br><a =
href=3D"https://www.ietf.org/mailman/listinfo/oauth" target=3D"_blank" =
style=3D"color: purple; text-decoration: underline; =
">https://www.ietf.org/mailman/listinfo/oauth</a><o:p></o:p></div></div></=
blockquote></div><div style=3D"margin: 0in 0in 0.0001pt; font-size: =
12pt; font-family: 'Times New Roman', serif; =
"><o:p>&nbsp;</o:p></div></div><div><p class=3D"MsoNormal" =
style=3D"margin: 0in 0in 12pt; font-size: 12pt; font-family: 'Times New =
Roman', serif; "><o:p>&nbsp;</o:p></p><pre style=3D"margin: 0in 0in =
0.0001pt; font-size: 10pt; font-family: 'Courier New', serif; =
">_______________________________________________<o:p></o:p></pre><pre =
style=3D"margin: 0in 0in 0.0001pt; font-size: 10pt; font-family: =
'Courier New', serif; ">OAuth mailing list<o:p></o:p></pre><pre =
style=3D"margin: 0in 0in 0.0001pt; font-size: 10pt; font-family: =
'Courier New', serif; "><a href=3D"mailto:OAuth@ietf.org" =
target=3D"_blank" style=3D"color: purple; text-decoration: underline; =
">OAuth@ietf.org</a><o:p></o:p></pre><pre style=3D"margin: 0in 0in =
0.0001pt; font-size: 10pt; font-family: 'Courier New', serif; "><a =
href=3D"https://www.ietf.org/mailman/listinfo/oauth" target=3D"_blank" =
style=3D"color: purple; text-decoration: underline; =
">https://www.ietf.org/mailman/listinfo/oauth</a><o:p></o:p></pre></div></=
blockquote><div style=3D"margin: 0in 0in 0.0001pt; font-size: 12pt; =
font-family: 'Times New Roman', serif; =
"><o:p>&nbsp;</o:p></div></div><div><p class=3D"MsoNormal" =
style=3D"margin: 0in 0in 12pt; font-size: 12pt; font-family: 'Times New =
Roman', serif; =
"><br>_______________________________________________<br>OAuth mailing =
list<br><a href=3D"mailto:OAuth@ietf.org" target=3D"_blank" =
style=3D"color: purple; text-decoration: underline; =
">OAuth@ietf.org</a><br><a =
href=3D"https://www.ietf.org/mailman/listinfo/oauth" target=3D"_blank" =
style=3D"color: purple; text-decoration: underline; =
">https://www.ietf.org/mailman/listinfo/oauth</a><br><br><o:p></o:p></p></=
div></div></div><p class=3D"MsoNormal" style=3D"margin: 0in 0in 12pt; =
font-size: 12pt; font-family: 'Times New Roman', serif; =
"><br>_______________________________________________<br>OAuth mailing =
list<br><a href=3D"mailto:OAuth@ietf.org" style=3D"color: purple; =
text-decoration: underline; ">OAuth@ietf.org</a><br><a =
href=3D"https://www.ietf.org/mailman/listinfo/oauth" target=3D"_blank" =
style=3D"color: purple; text-decoration: underline; =
">https://www.ietf.org/mailman/listinfo/oauth</a><o:p></o:p></p></div><div=
 style=3D"margin: 0in 0in 0.0001pt; font-size: 12pt; font-family: 'Times =
New Roman', serif; =
"><o:p>&nbsp;</o:p></div></div>___________________________________________=
____<br>OAuth mailing list<br><a href=3D"mailto:OAuth@ietf.org" =
style=3D"color: purple; text-decoration: underline; =
">OAuth@ietf.org</a><br><a =
href=3D"https://www.ietf.org/mailman/listinfo/oauth" style=3D"color: =
purple; text-decoration: underline; =
">https://www.ietf.org/mailman/listinfo/oauth</a></div></blockquote></div>=
<br></div></body></html>=

--Apple-Mail=_39FC561D-99DC-4D2A-99A9-0D5DF02F39B9--

--Apple-Mail=_EC7D6972-4C3C-4FE3-8B53-858A12E17C41
Content-Disposition: attachment;
	filename=smime.p7s
Content-Type: application/pkcs7-signature;
	name=smime.p7s
Content-Transfer-Encoding: base64
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--Apple-Mail=_EC7D6972-4C3C-4FE3-8B53-858A12E17C41--

From wmills_92105@yahoo.com  Tue Feb  5 16:48:36 2013
Return-Path: <wmills_92105@yahoo.com>
X-Original-To: oauth@ietfa.amsl.com
Delivered-To: oauth@ietfa.amsl.com
Received: from localhost (localhost [127.0.0.1]) by ietfa.amsl.com (Postfix) with ESMTP id 4359321F8915 for <oauth@ietfa.amsl.com>; Tue,  5 Feb 2013 16:48:36 -0800 (PST)
X-Virus-Scanned: amavisd-new at amsl.com
X-Spam-Flag: NO
X-Spam-Score: -1.741
X-Spam-Level: 
X-Spam-Status: No, score=-1.741 tagged_above=-999 required=5 tests=[AWL=0.257,  BAYES_00=-2.599, HTML_MESSAGE=0.001, J_CHICKENPOX_210=0.6]
Received: from mail.ietf.org ([64.170.98.30]) by localhost (ietfa.amsl.com [127.0.0.1]) (amavisd-new, port 10024) with ESMTP id r-GS2Sgz0d9Y for <oauth@ietfa.amsl.com>; Tue,  5 Feb 2013 16:48:35 -0800 (PST)
Received: from nm17-vm0.bullet.mail.bf1.yahoo.com (nm17-vm0.bullet.mail.bf1.yahoo.com [98.139.213.157]) by ietfa.amsl.com (Postfix) with SMTP id D52F321F8893 for <oauth@ietf.org>; Tue,  5 Feb 2013 16:48:34 -0800 (PST)
Received: from [98.139.215.143] by nm17.bullet.mail.bf1.yahoo.com with NNFMP; 06 Feb 2013 00:48:34 -0000
Received: from [98.139.212.231] by tm14.bullet.mail.bf1.yahoo.com with NNFMP; 06 Feb 2013 00:48:34 -0000
Received: from [127.0.0.1] by omp1040.mail.bf1.yahoo.com with NNFMP; 06 Feb 2013 00:48:34 -0000
X-Yahoo-Newman-Property: ymail-3
X-Yahoo-Newman-Id: 314930.19599.bm@omp1040.mail.bf1.yahoo.com
Received: (qmail 28976 invoked by uid 60001); 6 Feb 2013 00:48:33 -0000
DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=yahoo.com; s=s1024; t=1360111713; bh=SpV+P2kH/vWEgvUcFKirEiWpRyd5POJo7Ovu9nw/HS0=; h=X-YMail-OSG:Received:X-Rocket-MIMEInfo:X-Mailer:References:Message-ID:Date:From:Reply-To:Subject:To:Cc:In-Reply-To:MIME-Version:Content-Type; b=KUZCNGofYFylM/iGu3pgqhuAEndsluhrmOxQ7twhK1aDyUGyvLcu8/CzSC/wmMKS7r2LVXzEHBpw4C/yc47H8Cn5T1IBpzSdwYQWvITK2InjF10Hg3ygbcaln0DhMyVT+4Jv0KF+zvvbiCtaNcUdAkeerz7kHmF9P6T/IO28PSg=
DomainKey-Signature: a=rsa-sha1; q=dns; c=nofws; s=s1024; d=yahoo.com; h=X-YMail-OSG:Received:X-Rocket-MIMEInfo:X-Mailer:References:Message-ID:Date:From:Reply-To:Subject:To:Cc:In-Reply-To:MIME-Version:Content-Type; b=eIMWUsc0JZbypK94T43aNZEt1vA5qr02NVx/kuAN4wKZtTe79fnQ9R7qrE78snzLLnd9nTAE/6IUguHQUi/89KNClyEPgq+WsPXr0+UZiowk6jF2NUWDtRp3tRhYNc1l+mhhZ45/ehtalF1/DcQOANliaYj/dSMh+E4TVFUIUn8=;
X-YMail-OSG: bvlLAIYVM1mNIidneNNdn7YnPG7JcvxEHJr2N0s2pC7JRzP S03hW9Ao7llxF8Tgmf8FDnUrb3ZePbzd7wCD3t.S1YnxfinLiydtLQ8xZCNW IDCENPvi99YorwSbXO5Ill2gfz6bf7QtCrFuutMCZYRYcnzwICNo46dOATOT vaqNGu2liYVafzhc94LZ0Op7nQZ.22ZQfWPSS4.zgXM4KWUc0kCTA7EAuPKA MectpeIF7M_h4rTrV2zS4XGNyCvYMeBJ7doid9OLmPOSEhMTYr3Hpjp4uyM4 3HZ.eSRlI09pqy.sJeQqsBMMgYzDi1uGiiGuKS0Q6eDjjEfOc1.D.4mthkby grmp8xGpfShwu8_YyJDBnALGAr2Z4P7czeY4Nd_4kOMTTTIWnYGDIlEfK6rm aDVIcyVZnTcRgX_flTStda6lOs8zIU1fxgZCrmsBwq9YeP0b5aF8D2VvnEQk PM2L7JYSdpK8u2JArVDOmQEQoWRHcIXgrwpqVfM6Lf0fIcGfaHV1la6Zuugo zrk7QH6vK6NJTHt4AKtQJo8M.6Q4zIEG4CklfG0eypluiBYFk7bDClmZbxzr FUyL0XmLhPsl9vikQxOm25HJ6PmGP9Ms4jz90ATIRUxzsvZsRI4QoGIyZVQO UY91KSsH8sn7QbhNoCU5yIzHGBRqX4XwqZ9aO4ml7VhPTjQ--
Received: from [209.131.62.145] by web31812.mail.mud.yahoo.com via HTTP; Tue, 05 Feb 2013 16:48:32 PST
X-Rocket-MIMEInfo: 001.001, V2h5IHVzZSBPQXV0aCB3aGVuIE9wZW5JRCBkb2VzIGV2ZXJ5dGhpbmcgdGhhdCBPQXV0aCBjYW4gZG8gYXMgYW4gYXV0aGVudGljYXRpb24gbWV0aG9kIGFuZCBkb2VzIGEgZmV3IHRoaW5ncyBtdWNoIGJldHRlcj8KClNwZWNpZmljYWxseSBPQXV0aCBsYWNrcyBhbnkgZGVmaW5lZCB3YXkgdG86CgotZmVlZCBiYWNrIGFueSBhZGRpdGlvbmFsIGluZm9ybWF0aW9uIGxpa2UgdGhlIHJlYWwgdXNlciBJRCAoYXMgb3Bwb3NlZCB0byB3aGF0IHRoZSBlbnRlcmVkKQotYm91bmQgYW4gYXV0aGVudGljYXRpb24gZXYBMAEBAQE-
X-Mailer: YahooMailWebService/0.8.133.504
References: <CAJV9qO_J1-AhGB=XST0R-kwAd-9hjUbCJ4ieBPoE_OMe760mqg@mail.gmail.com> <73B7EC23-AA93-42EE-B3EB-35BA1B82558F@ve7jtb.com> <511175AA.9030301@gmail.com> <1360099372.47338.YahooMailNeo@web31807.mail.mud.yahoo.com> <CA+ZpN27GnnU6w5Dnth4zfsa+nMhi6Rsyqmq-tYOqG54+Sh-9ww@mail.gmail.com> <59E470B10C4630419ED717AC79FCF9A9483E7B3D@BY2PRD0411MB441.namprd04.prod.outlook.com>
Message-ID: <1360111712.54487.YahooMailNeo@web31812.mail.mud.yahoo.com>
Date: Tue, 5 Feb 2013 16:48:32 -0800 (PST)
From: William Mills <wmills_92105@yahoo.com>
To: Lewis Adam-CAL022 <Adam.Lewis@motorolasolutions.com>, Tim Bray <twbray@google.com>
In-Reply-To: <59E470B10C4630419ED717AC79FCF9A9483E7B3D@BY2PRD0411MB441.namprd04.prod.outlook.com>
MIME-Version: 1.0
Content-Type: multipart/alternative; boundary="1458549034-106740509-1360111712=:54487"
Cc: "oauth@ietf.org WG" <oauth@ietf.org>
Subject: Re: [OAUTH-WG] Why OAuth it self is not an authentication framework ?
X-BeenThere: oauth@ietf.org
X-Mailman-Version: 2.1.12
Precedence: list
Reply-To: William Mills <wmills_92105@yahoo.com>
List-Id: OAUTH WG <oauth.ietf.org>
List-Unsubscribe: <https://www.ietf.org/mailman/options/oauth>, <mailto:oauth-request@ietf.org?subject=unsubscribe>
List-Archive: <http://www.ietf.org/mail-archive/web/oauth>
List-Post: <mailto:oauth@ietf.org>
List-Help: <mailto:oauth-request@ietf.org?subject=help>
List-Subscribe: <https://www.ietf.org/mailman/listinfo/oauth>, <mailto:oauth-request@ietf.org?subject=subscribe>
X-List-Received-Date: Wed, 06 Feb 2013 00:48:36 -0000

--1458549034-106740509-1360111712=:54487
Content-Type: text/plain; charset=utf-8
Content-Transfer-Encoding: quoted-printable

Why use OAuth when OpenID does everything that OAuth can do as an authentic=
ation method and does a few things much better?=0A=0ASpecifically OAuth lac=
ks any defined way to:=0A=0A-feed back any additional information like the =
real user ID (as opposed to what the entered)=0A-bound an authentication ev=
ent in time=0A-provide any form of additional SSO payload like a display na=
me for the user=0A=0Athere's probably other things.=0A=0AIt'll mostly work =
but there are things it doesn't do. =C2=A0Could you solve some of the rest =
of this with token introspection or a user API that the RP could use to fet=
ch user info, sure, but why rebuild OpenID when OpenID exists?=0A=0A-bill=
=0A=0A=0A=0A________________________________=0A From: Lewis Adam-CAL022 <Ad=
am.Lewis@motorolasolutions.com>=0ATo: Tim Bray <twbray@google.com>; William=
 Mills <wmills_92105@yahoo.com> =0ACc: "oauth@ietf.org WG" <oauth@ietf.org>=
 =0ASent: Tuesday, February 5, 2013 2:27 PM=0ASubject: RE: [OAUTH-WG] Why O=
Auth it self is not an authentication framework ?=0A =0A=0A =0AI think this=
 is becoming a largely academic / philosophical argument by this time.=C2=
=A0 The people who designed OAuth will likely point out that it was concept=
ualized as an authorization protocol to enable a RO to delegate access to a=
 client to access its protected resources on some RS.=C2=A0 And of course t=
his is the history of it.=C2=A0 And the RO and end-user were typically the =
same entity.=C2=A0 But get caught up in what it was envisioned to do vs. re=
al life use cases that OAuth can solve (and is solving) beyond its initial =
use cases misses the point =E2=80=A6 because OAuth is gaining traction in t=
he enterprise and will be used in all different sorts of ways, including au=
thentication.=C2=A0 =0A=C2=A0=0AThis is especially true of RESTful APIs wit=
hin an enterprise where the RO and end-user are *not* the same: e.g. RO=3De=
nterprise and end-user=3Demployee.=C2=A0 In this model the end-user is not =
authorizing anything when their client requests a token from the AS =E2=80=
=A6 they authenticate to the AS and the client gets an AT, which will likel=
y be profiled by most enterprise deployments to look something like an OIDC=
 id_token.=C2=A0 The AT will be presented to the RS which will examine the =
claims (user identity, LOA, etc.) and make authorization decisions based on=
 business logic.=C2=A0 The AT has not authorized the user to do anything, i=
t has only made an assertion that the user has been authenticated by the AS=
 (sort of sounds a lot like an IdP now).=0A=C2=A0=0AAll this talked of OAut=
h being authorization and not authentication was extremely confusing to me =
when I first started looking at OAuth for my use cases, and I think at some=
 point the authors of OAuth are going to have to recognize that their baby =
has grown up to be multi-faceted (and I mean this as a complement).=C2=A0 T=
he abstractions left in the OAuth spec (while some have claimed of the lack=
 of interoperability it will cause) will also enable it to be used in ways =
possibly still not envisioned by any of us.=C2=A0 I think as soon as we can=
 stop trying to draw the artificial line around OAuth being =E2=80=9Can aut=
horization protocol=E2=80=9D the better things will be. =0A=C2=A0=0AI like =
to say that they authors had it right when they named it =E2=80=9COAuth=E2=
=80=9D and not =E2=80=9COAuthR=E2=80=9D J=0A=C2=A0=0A-adam=0A=C2=A0=0AFrom:=
oauth-bounces@ietf.org [mailto:oauth-bounces@ietf.org] On Behalf Of Tim Bra=
y=0ASent: Tuesday, February 05, 2013 3:28 PM=0ATo: William Mills=0ACc: oaut=
h@ietf.org WG=0ASubject: Re: [OAUTH-WG] Why OAuth it self is not an authent=
ication framework ?=0A=C2=A0=0AOIDC seems about the most plausible candidat=
e for a =E2=80=9Cgood general solution=E2=80=9D that I=E2=80=99m aware of. =
=C2=A0 -T=0AOn Tue, Feb 5, 2013 at 1:22 PM, William Mills <wmills_92105@yah=
oo.com> wrote:=0AThere are some specific design mis-matches for OAuth as an=
 authentication protocol, it's not what it's designed for and there are som=
e problems you will run into. =C2=A0Some have used it as such, but it's not=
 a good general solution.=0A=C2=A0=0A-bill=0A=C2=A0=0A=0A__________________=
______________=0A =0AFrom:Paul Madsen <paul.madsen@gmail.com>=0ATo: John Br=
adley <ve7jtb@ve7jtb.com> =0ACc: "oauth@ietf.org WG" <oauth@ietf.org> =0ASe=
nt: Tuesday, February 5, 2013 1:12 PM=0ASubject: Re: [OAUTH-WG] Why OAuth i=
t self is not an authentication framework ?=0A=C2=A0=0Awhy pigeonhole it? =
=0A=0AOAuth can be deployed with no authz semantics at all (or at least as =
little as any authn mechanism), e.g client creds grant type with no scopes=
=0A=0AI agree that OAuth is not an *SSO* protocol.=0AOn 2/5/13 3:36 PM, Joh=
n Bradley wrote:=0AOAuth is an Authorization protocol as many of us have po=
inted out. =0A>=C2=A0=0A>The post is largely correct and based on one of mi=
ne.=0A>=C2=A0=0A>John B.=0A>=C2=A0=0A>On 2013-02-05, at 12:52 PM, Prabath S=
iriwardena <prabath@wso2.com> wrote:=0A>=C2=A0=0A>FYI and for your comments=
.. =0A>>=C2=A0=0A>>http://blog.facilelogin.com/2013/02/why-oauth-it-self-is=
-not-authentication.html=0A>>=0A>>=C2=A0=0A>>Thanks & Regards,=0A>>Prabath =
=0A>>=C2=A0=0A>>Mobile : +94 71 809 6732=C2=A0=0A>>http://blog.facilelogin.=
com/=0A>>http://rampartfaq.com/=0A>>_______________________________________=
________=0A>>OAuth mailing list=0A>>OAuth@ietf.org=0A>>https://www.ietf.org=
/mailman/listinfo/oauth=0A>=C2=A0=0A>=C2=A0=0A>____________________________=
___________________=0A>OAuth mailing list=0A>OAuth@ietf.org=0A>https://www.=
ietf.org/mailman/listinfo/oauth=0A=C2=A0=0A=0A_____________________________=
__________________=0AOAuth mailing list=0AOAuth@ietf.org=0Ahttps://www.ietf=
.org/mailman/listinfo/oauth=0A=0A=0A=0A____________________________________=
___________=0AOAuth mailing list=0AOAuth@ietf.org=0Ahttps://www.ietf.org/ma=
ilman/listinfo/oauth
--1458549034-106740509-1360111712=:54487
Content-Type: text/html; charset=utf-8
Content-Transfer-Encoding: quoted-printable

<html><body><div style=3D"color:#000; background-color:#fff; font-family:Co=
urier New, courier, monaco, monospace, sans-serif;font-size:12pt"><div>Why =
use OAuth when OpenID does everything that OAuth can do as an authenticatio=
n method and does a few things much better?</div><div><br></div><div style=
=3D"color: rgb(0, 0, 0); font-size: 16px; font-family: 'Courier New', couri=
er, monaco, monospace, sans-serif; background-color: transparent; font-styl=
e: normal;">Specifically OAuth lacks any defined way to:</div><div style=3D=
"color: rgb(0, 0, 0); font-size: 16px; font-family: 'Courier New', courier,=
 monaco, monospace, sans-serif; background-color: transparent; font-style: =
normal;"><br></div><div style=3D"color: rgb(0, 0, 0); font-size: 16px; font=
-family: 'Courier New', courier, monaco, monospace, sans-serif; background-=
color: transparent; font-style: normal;">-<span class=3D"Apple-tab-span" st=
yle=3D"white-space:pre">=09</span>feed back any additional information like=
 the
 real user ID (as opposed to what the entered)</div><div style=3D"color: rg=
b(0, 0, 0); font-size: 16px; font-family: 'Courier New', courier, monaco, m=
onospace, sans-serif; background-color: transparent; font-style: normal;">-=
<span class=3D"Apple-tab-span" style=3D"white-space:pre">=09</span>bound an=
 authentication event in time</div><div style=3D"color: rgb(0, 0, 0); font-=
size: 16px; font-family: 'Courier New', courier, monaco, monospace, sans-se=
rif; background-color: transparent; font-style: normal;">-<span class=3D"Ap=
ple-tab-span" style=3D"white-space:pre">=09</span>provide any form of addit=
ional SSO payload like a display name for the user</div><div style=3D"color=
: rgb(0, 0, 0); font-size: 16px; font-family: 'Courier New', courier, monac=
o, monospace, sans-serif; background-color: transparent; font-style: normal=
;"><br></div><div style=3D"color: rgb(0, 0, 0); font-size: 16px; font-famil=
y: 'Courier New', courier, monaco, monospace, sans-serif; background-color:=
 transparent;
 font-style: normal;">there's probably other things.</div><div style=3D"col=
or: rgb(0, 0, 0); font-size: 16px; font-family: 'Courier New', courier, mon=
aco, monospace, sans-serif; background-color: transparent; font-style: norm=
al;"><br></div><div style=3D"color: rgb(0, 0, 0); font-size: 16px; font-fam=
ily: 'Courier New', courier, monaco, monospace, sans-serif; background-colo=
r: transparent; font-style: normal;">It'll mostly work but there are things=
 it doesn't do. &nbsp;Could you solve some of the rest of this with token i=
ntrospection or a user API that the RP could use to fetch user info, sure, =
but why rebuild OpenID when OpenID exists?</div><div style=3D"color: rgb(0,=
 0, 0); font-size: 16px; font-family: 'Courier New', courier, monaco, monos=
pace, sans-serif; background-color: transparent; font-style: normal;"><br><=
/div><div style=3D"color: rgb(0, 0, 0); font-size: 16px; font-family: 'Cour=
ier New', courier, monaco, monospace, sans-serif; background-color:
 transparent; font-style: normal;">-bill</div><div style=3D"color: rgb(0, 0=
, 0); font-size: 16px; font-family: 'Courier New', courier, monaco, monospa=
ce, sans-serif; background-color: transparent; font-style: normal;"><br></d=
iv><div style=3D"color: rgb(0, 0, 0); font-size: 16px; font-family: 'Courie=
r New', courier, monaco, monospace, sans-serif; background-color: transpare=
nt; font-style: normal;"><br></div>  <div style=3D"font-family: 'Courier Ne=
w', courier, monaco, monospace, sans-serif; font-size: 12pt;"> <div style=
=3D"font-family: 'times new roman', 'new york', times, serif; font-size: 12=
pt;"> <div dir=3D"ltr"> <font size=3D"2" face=3D"Arial"> <hr size=3D"1">  <=
b><span style=3D"font-weight:bold;">From:</span></b> Lewis Adam-CAL022 &lt;=
Adam.Lewis@motorolasolutions.com&gt;<br> <b><span style=3D"font-weight: bol=
d;">To:</span></b> Tim Bray &lt;twbray@google.com&gt;; William Mills &lt;wm=
ills_92105@yahoo.com&gt; <br><b><span style=3D"font-weight: bold;">Cc:</spa=
n></b>
 "oauth@ietf.org WG" &lt;oauth@ietf.org&gt; <br> <b><span style=3D"font-wei=
ght: bold;">Sent:</span></b> Tuesday, February 5, 2013 2:27 PM<br> <b><span=
 style=3D"font-weight: bold;">Subject:</span></b> RE: [OAUTH-WG] Why OAuth =
it self is not an authentication framework ?<br> </font> </div> <br>=0A<div=
 id=3D"yiv2141144710">=0A=0A =0A =0A<style><!--=0A#yiv2141144710  =0A _filt=
ered #yiv2141144710 {font-family:Wingdings;=0Apanose-1:5 0 0 0 0 0 0 0 0 0;=
}=0A _filtered #yiv2141144710 {font-family:Wingdings;=0Apanose-1:5 0 0 0 0 =
0 0 0 0 0;}=0A _filtered #yiv2141144710 {font-family:Calibri;=0Apanose-1:2 =
15 5 2 2 2 4 3 2 4;}=0A _filtered #yiv2141144710 {font-family:Tahoma;=0Apan=
ose-1:2 11 6 4 3 5 4 4 2 4;}=0A _filtered #yiv2141144710 {font-family:"Book=
 Antiqua";=0Apanose-1:2 4 6 2 5 3 5 3 3 4;}=0A _filtered #yiv2141144710 {fo=
nt-family:Consolas;=0Apanose-1:2 11 6 9 2 2 4 3 2 4;}=0A#yiv2141144710  =0A=
#yiv2141144710 p.yiv2141144710MsoNormal, #yiv2141144710 li.yiv2141144710Mso=
Normal, #yiv2141144710 div.yiv2141144710MsoNormal=0A=09{margin:0in;=0Amargi=
n-bottom:.0001pt;=0Afont-size:12.0pt;=0Afont-family:"Times New Roman", "ser=
if";}=0A#yiv2141144710 a:link, #yiv2141144710 span.yiv2141144710MsoHyperlin=
k=0A=09{=0Acolor:blue;=0Atext-decoration:underline;}=0A#yiv2141144710 a:vis=
ited, #yiv2141144710 span.yiv2141144710MsoHyperlinkFollowed=0A=09{=0Acolor:=
purple;=0Atext-decoration:underline;}=0A#yiv2141144710 pre=0A=09{=0A=0Amarg=
in:0in;=0Amargin-bottom:.0001pt;=0Afont-size:10.0pt;=0Afont-family:"Courier=
 New", "serif";}=0A#yiv2141144710 span.yiv2141144710HTMLPreformattedChar=0A=
=09{=0A=0A=0Afont-family:Consolas;}=0A#yiv2141144710 span.yiv2141144710Emai=
lStyle19=0A=09{=0Afont-family:"Book Antiqua", "serif";=0Acolor:olive;=0Afon=
t-weight:normal;=0Afont-style:normal;=0Atext-decoration:none none;}=0A#yiv2=
141144710 .yiv2141144710MsoChpDefault=0A=09{}=0A _filtered #yiv2141144710 {=
=0Amargin:1.0in 1.0in 1.0in 1.0in;}=0A#yiv2141144710 div.yiv2141144710WordS=
ection1=0A=09{}=0A--></style>=0A=0A<div>=0A<div class=3D"yiv2141144710WordS=
ection1">=0A<div class=3D"yiv2141144710MsoNormal"><span style=3D"font-size:=
10.5pt;color:olive;">I think this is becoming a largely academic / philosop=
hical argument by this time.&nbsp; The people who designed OAuth will likel=
y point out that it was conceptualized=0A as an authorization protocol to e=
nable a RO to delegate access to a client to access its protected resources=
 on some RS.&nbsp; And of course this is the history of it.&nbsp; And the R=
O and end-user were typically the same entity.&nbsp; But get caught up in w=
hat it was envisioned=0A to do vs. real life use cases that OAuth can solve=
 (and is solving) beyond its initial use cases misses the point =E2=80=A6 b=
ecause OAuth is gaining traction in the enterprise and will be used in all =
different sorts of ways, including authentication.&nbsp;=0A</span></div> =
=0A<div class=3D"yiv2141144710MsoNormal"><span style=3D"font-size:10.5pt;co=
lor:olive;"> &nbsp;</span></div> =0A<div class=3D"yiv2141144710MsoNormal"><=
span style=3D"font-size:10.5pt;color:olive;">This is especially true of RES=
Tful APIs within an enterprise where the RO and end-user are *<b>not</b>* t=
he same: e.g. RO=3Denterprise and end-user=3Demployee.&nbsp; In=0A this mod=
el the end-user is not authorizing anything when their client requests a to=
ken from the AS =E2=80=A6 they authenticate to the AS and the client gets a=
n AT, which will likely be profiled by most enterprise deployments to look =
something like an OIDC id_token.&nbsp;=0A The AT will be presented to the R=
S which will examine the claims (user identity, LOA, etc.) and make authori=
zation decisions based on business logic.&nbsp; The AT has not authorized t=
he user to do anything, it has only made an assertion that the user has bee=
n authenticated=0A by the AS (sort of sounds a lot like an IdP now).</span>=
</div> =0A<div class=3D"yiv2141144710MsoNormal"><span style=3D"font-size:10=
.5pt;color:olive;"> &nbsp;</span></div> =0A<div class=3D"yiv2141144710MsoNo=
rmal"><span style=3D"font-size:10.5pt;color:olive;">All this talked of OAut=
h being authorization and not authentication was extremely confusing to me =
when I first started looking at OAuth for my use cases, and=0A I think at s=
ome point the authors of OAuth are going to have to recognize that their ba=
by has grown up to be multi-faceted (and I mean this as a complement).&nbsp=
; The abstractions left in the OAuth spec (while some have claimed of the l=
ack of interoperability=0A it will cause) will also enable it to be used in=
 ways possibly still not envisioned by any of us.&nbsp; I think as soon as =
we can stop trying to draw the artificial line around OAuth being =E2=80=9C=
an authorization protocol=E2=80=9D the better things will be.=0A</span></di=
v> =0A<div class=3D"yiv2141144710MsoNormal"><span style=3D"font-size:10.5pt=
;color:olive;"> &nbsp;</span></div> =0A<div class=3D"yiv2141144710MsoNormal=
"><span style=3D"font-size:10.5pt;color:olive;">I like to say that they aut=
hors had it right when they named it =E2=80=9COAuth=E2=80=9D and not =E2=80=
=9COAuthR=E2=80=9D=0A</span><span style=3D"font-size: 10.5pt; font-family: =
Wingdings; color: olive;">J</span><span style=3D"font-size:10.5pt;color:oli=
ve;"></span></div> =0A<div class=3D"yiv2141144710MsoNormal"><span style=3D"=
font-size:10.5pt;color:olive;"> &nbsp;</span></div> =0A<div class=3D"yiv214=
1144710MsoNormal"><span style=3D"font-size:10.5pt;color:olive;">-adam</span=
></div> =0A<div class=3D"yiv2141144710MsoNormal"><span style=3D"font-size:1=
0.5pt;color:olive;"> &nbsp;</span></div> =0A<div style=3D"border:none;borde=
r-top:solid #B5C4DF 1.0pt;padding:3.0pt 0in 0in 0in;">=0A<div class=3D"yiv2=
141144710MsoNormal"><b><span style=3D"font-size:10.0pt;">From:</span></b><s=
pan style=3D"font-size:10.0pt;"> oauth-bounces@ietf.org [mailto:oauth-bounc=
es@ietf.org]=0A<b>On Behalf Of </b>Tim Bray<br>=0A<b>Sent:</b> Tuesday, Feb=
ruary 05, 2013 3:28 PM<br>=0A<b>To:</b> William Mills<br>=0A<b>Cc:</b> oaut=
h@ietf.org WG<br>=0A<b>Subject:</b> Re: [OAUTH-WG] Why OAuth it self is not=
 an authentication framework ?</span></div> =0A</div>=0A<div class=3D"yiv21=
41144710MsoNormal"> &nbsp;</div> =0A<div class=3D"yiv2141144710MsoNormal" s=
tyle=3D"margin-bottom:12.0pt;">OIDC seems about the most plausible candidat=
e for a =E2=80=9Cgood general solution=E2=80=9D that I=E2=80=99m aware of. =
&nbsp; -T</div> =0A<div>=0A<div class=3D"yiv2141144710MsoNormal">On Tue, Fe=
b 5, 2013 at 1:22 PM, William Mills &lt;<a rel=3D"nofollow" ymailto=3D"mail=
to:wmills_92105@yahoo.com" target=3D"_blank" href=3D"mailto:wmills_92105@ya=
hoo.com">wmills_92105@yahoo.com</a>&gt; wrote:</div> =0A<div>=0A<div>=0A<di=
v>=0A<div class=3D"yiv2141144710MsoNormal"><span style=3D"">There are some =
specific design mis-matches for OAuth as an authentication protocol, it's n=
ot what it's designed for and there are some problems you will run into. &n=
bsp;Some have used it as such,=0A but it's not a good general solution.</sp=
an></div> =0A</div>=0A<div>=0A<div class=3D"yiv2141144710MsoNormal"><span s=
tyle=3D""> &nbsp;</span></div> =0A</div>=0A<div>=0A<div class=3D"yiv2141144=
710MsoNormal"><span style=3D"">-bill</span></div> =0A</div>=0A<div>=0A<div =
class=3D"yiv2141144710MsoNormal"><span style=3D""> &nbsp;</span></div> =0A<=
/div>=0A<div>=0A<div>=0A<div>=0A<div class=3D"yiv2141144710MsoNormal" align=
=3D"center" style=3D"text-align:center;"><span style=3D"">=0A<hr size=3D"1"=
 width=3D"100%" align=3D"center">=0A</span></div>=0A<div class=3D"yiv214114=
4710MsoNormal"><b><span style=3D"">From:</span></b><span style=3D""> Paul M=
adsen &lt;<a rel=3D"nofollow" ymailto=3D"mailto:paul.madsen@gmail.com" targ=
et=3D"_blank" href=3D"mailto:paul.madsen@gmail.com">paul.madsen@gmail.com</=
a>&gt;<br>=0A<b>To:</b> John Bradley &lt;<a rel=3D"nofollow" ymailto=3D"mai=
lto:ve7jtb@ve7jtb.com" target=3D"_blank" href=3D"mailto:ve7jtb@ve7jtb.com">=
ve7jtb@ve7jtb.com</a>&gt;=0A<br>=0A<b>Cc:</b> "<a rel=3D"nofollow" ymailto=
=3D"mailto:oauth@ietf.org" target=3D"_blank" href=3D"mailto:oauth@ietf.org"=
>oauth@ietf.org</a> WG" &lt;<a rel=3D"nofollow" ymailto=3D"mailto:oauth@iet=
f.org" target=3D"_blank" href=3D"mailto:oauth@ietf.org">oauth@ietf.org</a>&=
gt;=0A<br>=0A<b>Sent:</b> Tuesday, February 5, 2013 1:12 PM<br>=0A<b>Subjec=
t:</b> Re: [OAUTH-WG] Why OAuth it self is not an authentication framework =
?</span></div> =0A</div>=0A<div class=3D"yiv2141144710MsoNormal"> &nbsp;</d=
iv> =0A<div>=0A<div>=0A<div>=0A<div class=3D"yiv2141144710MsoNormal" style=
=3D"margin-bottom:12.0pt;"><span style=3D"">why pigeonhole it?=0A<br>=0A<br=
>=0AOAuth can be deployed with no authz semantics at all (or at least as li=
ttle as any authn mechanism), e.g client creds grant type with no scopes<br=
>=0A<br>=0AI agree that OAuth is not an *SSO* protocol.</span></div> =0A<di=
v>=0A<div class=3D"yiv2141144710MsoNormal">On 2/5/13 3:36 PM, John Bradley =
wrote:</div> =0A</div>=0A</div>=0A<blockquote style=3D"margin-top:5.0pt;mar=
gin-bottom:5.0pt;">=0A<div>=0A<div class=3D"yiv2141144710MsoNormal">OAuth i=
s an Authorization protocol as many of us have pointed out.=0A</div> =0A<di=
v>=0A<div class=3D"yiv2141144710MsoNormal"> &nbsp;</div> =0A</div>=0A<div>=
=0A<div class=3D"yiv2141144710MsoNormal">The post is largely correct and ba=
sed on one of mine.</div> =0A</div>=0A<div>=0A<div class=3D"yiv2141144710Ms=
oNormal"> &nbsp;</div> =0A</div>=0A<div>=0A<div class=3D"yiv2141144710MsoNo=
rmal">John B.</div> =0A</div>=0A</div>=0A<div>=0A<div class=3D"yiv214114471=
0MsoNormal"> &nbsp;</div> =0A<div>=0A<div>=0A<div>=0A<div class=3D"yiv21411=
44710MsoNormal">On 2013-02-05, at 12:52 PM, Prabath Siriwardena &lt;<a rel=
=3D"nofollow" ymailto=3D"mailto:prabath@wso2.com" target=3D"_blank" href=3D=
"mailto:prabath@wso2.com">prabath@wso2.com</a>&gt; wrote:</div> =0A</div>=
=0A<div class=3D"yiv2141144710MsoNormal"> &nbsp;</div> =0A</div>=0A<blockqu=
ote style=3D"margin-top:5.0pt;margin-bottom:5.0pt;">=0A<div>=0A<div class=
=3D"yiv2141144710MsoNormal">FYI and for your comments.. </div> =0A<div>=0A<=
div class=3D"yiv2141144710MsoNormal"> &nbsp;</div> =0A</div>=0A</div>=0A<di=
v>=0A<div>=0A<div class=3D"yiv2141144710MsoNormal">http://blog.facilelogin.=
com/2013/02/why-oauth-it-self-is-not-authentication.html<br clear=3D"all">=
=0A</div> =0A<div>=0A<div class=3D"yiv2141144710MsoNormal">&nbsp;</div> =0A=
</div>=0A<div class=3D"yiv2141144710MsoNormal">Thanks &amp; Regards,<br>=0A=
Prabath </div> =0A<div>=0A<div class=3D"yiv2141144710MsoNormal"> &nbsp;</di=
v> =0A</div>=0A</div>=0A<div>=0A<div>=0A<div class=3D"yiv2141144710MsoNorma=
l" style=3D"margin-bottom:12.0pt;">Mobile : <a rel=3D"nofollow" href=3D"">=
=0A+94 71 809 6732</a>&nbsp;</div> =0A</div>=0A<div class=3D"yiv2141144710M=
soNormal">http://blog.facilelogin.com/<br>=0Ahttp://rampartfaq.com/</div> =
=0A</div>=0A</div>=0A<div>=0A<div class=3D"yiv2141144710MsoNormal">________=
_______________________________________<br>=0AOAuth mailing list<br>=0A<a r=
el=3D"nofollow" ymailto=3D"mailto:OAuth@ietf.org" target=3D"_blank" href=3D=
"mailto:OAuth@ietf.org">OAuth@ietf.org</a><br>=0A<a rel=3D"nofollow" target=
=3D"_blank" href=3D"https://www.ietf.org/mailman/listinfo/oauth">https://ww=
w.ietf.org/mailman/listinfo/oauth</a></div> =0A</div>=0A</blockquote>=0A</d=
iv>=0A<div class=3D"yiv2141144710MsoNormal"> &nbsp;</div> =0A</div>=0A<div>=
=0A<div class=3D"yiv2141144710MsoNormal" style=3D"margin-bottom:12.0pt;"> &=
nbsp;</div> =0A<pre>_______________________________________________</pre> =
=0A<pre>OAuth mailing list</pre> =0A<pre><a rel=3D"nofollow" ymailto=3D"mai=
lto:OAuth@ietf.org" target=3D"_blank" href=3D"mailto:OAuth@ietf.org">OAuth@=
ietf.org</a></pre> =0A<pre><a rel=3D"nofollow" target=3D"_blank" href=3D"ht=
tps://www.ietf.org/mailman/listinfo/oauth">https://www.ietf.org/mailman/lis=
tinfo/oauth</a></pre> =0A</div>=0A</blockquote>=0A<div class=3D"yiv21411447=
10MsoNormal"> &nbsp;</div> =0A</div>=0A</div>=0A<div>=0A<div class=3D"yiv21=
41144710MsoNormal" style=3D"margin-bottom:12.0pt;"><br>=0A_________________=
______________________________<br>=0AOAuth mailing list<br>=0A<a rel=3D"nof=
ollow" ymailto=3D"mailto:OAuth@ietf.org" target=3D"_blank" href=3D"mailto:O=
Auth@ietf.org">OAuth@ietf.org</a><br>=0A<a rel=3D"nofollow" target=3D"_blan=
k" href=3D"https://www.ietf.org/mailman/listinfo/oauth">https://www.ietf.or=
g/mailman/listinfo/oauth</a><br>=0A<br>=0A</div> =0A</div>=0A</div>=0A</div=
>=0A</div>=0A</div>=0A<div class=3D"yiv2141144710MsoNormal" style=3D"margin=
-bottom:12.0pt;"><br>=0A_______________________________________________<br>=
=0AOAuth mailing list<br>=0A<a rel=3D"nofollow" ymailto=3D"mailto:OAuth@iet=
f.org" target=3D"_blank" href=3D"mailto:OAuth@ietf.org">OAuth@ietf.org</a><=
br>=0A<a rel=3D"nofollow" target=3D"_blank" href=3D"https://www.ietf.org/ma=
ilman/listinfo/oauth">https://www.ietf.org/mailman/listinfo/oauth</a></div>=
 =0A</div>=0A<div class=3D"yiv2141144710MsoNormal"> &nbsp;</div> =0A</div>=
=0A</div>=0A=0A</div><br><br> </div> </div>  </div></body></html>
--1458549034-106740509-1360111712=:54487--

From prabath@wso2.com  Wed Feb  6 01:35:50 2013
Return-Path: <prabath@wso2.com>
X-Original-To: oauth@ietfa.amsl.com
Delivered-To: oauth@ietfa.amsl.com
Received: from localhost (localhost [127.0.0.1]) by ietfa.amsl.com (Postfix) with ESMTP id BDB3021F8808 for <oauth@ietfa.amsl.com>; Wed,  6 Feb 2013 01:35:50 -0800 (PST)
X-Virus-Scanned: amavisd-new at amsl.com
X-Spam-Flag: NO
X-Spam-Score: -2.212
X-Spam-Level: 
X-Spam-Status: No, score=-2.212 tagged_above=-999 required=5 tests=[AWL=0.764,  BAYES_00=-2.599, FM_FORGED_GMAIL=0.622, HTML_MESSAGE=0.001, RCVD_IN_DNSWL_LOW=-1]
Received: from mail.ietf.org ([64.170.98.30]) by localhost (ietfa.amsl.com [127.0.0.1]) (amavisd-new, port 10024) with ESMTP id O3sQ8oP5YGoU for <oauth@ietfa.amsl.com>; Wed,  6 Feb 2013 01:35:50 -0800 (PST)
Received: from mail-ea0-f174.google.com (mail-ea0-f174.google.com [209.85.215.174]) by ietfa.amsl.com (Postfix) with ESMTP id D2DB621F8793 for <oauth@ietf.org>; Wed,  6 Feb 2013 01:35:43 -0800 (PST)
Received: by mail-ea0-f174.google.com with SMTP id 1so495802eaa.5 for <oauth@ietf.org>; Wed, 06 Feb 2013 01:35:42 -0800 (PST)
X-Google-DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=google.com; s=20120113; h=mime-version:x-received:date:message-id:subject:from:to :content-type:x-gm-message-state; bh=ktCkw28LtzPSF8fZFtRA7OhIwjk1XSs2QxtYQo/LJUc=; b=QztbhOUw6/n02HVnPJRn9s20HADzingNPYddtJuKavCQAsIAeYEbkWRX53trGA3QG0 pzLITldOE1/dtMlNWt9CLRjeyX9+Jbq+l6fhuGvCRAIajuRN+GztJuNKeWBor7Z/bcP8 /Xs1BuzLyiVWzYPEGUcBZBLGIOS4BFGavTDdWMooSvcy8PAy8XlogskuHgCOMcb2Z+3o fQsda9u38vPAFfI/q72EV+B1xvD6TcRcdqusZAGJEKHA8UxVEEc8jE8I5MosnYmuR6ha Ar0VOS3QDMhPcB6AgDmH+NXGEkvCWl8w6Zgs8d07RnhS2aVBcH2gv9/HAzCto2F7jwP9 yF5g==
MIME-Version: 1.0
X-Received: by 10.14.176.133 with SMTP id b5mr80637584eem.37.1360143342405; Wed, 06 Feb 2013 01:35:42 -0800 (PST)
Received: by 10.223.175.134 with HTTP; Wed, 6 Feb 2013 01:35:42 -0800 (PST)
Date: Wed, 6 Feb 2013 15:05:42 +0530
Message-ID: <CAJV9qO8UgLV6SdegZSk4KT3Qyb-M2KmPFPV9xDht_WjibeUWrg@mail.gmail.com>
From: Prabath Siriwardena <prabath@wso2.com>
To: "oauth@ietf.org WG" <oauth@ietf.org>
Content-Type: multipart/alternative; boundary=047d7b603c02c486fe04d50b0cc7
X-Gm-Message-State: ALoCoQkxHe5CLd4qTERdfPtzbZVctpz188gR3gnQBhjZUGp13qnMXlZi1GYR38tdI7sdeXF7Kyg3
Subject: [OAUTH-WG] A question on token revocation.
X-BeenThere: oauth@ietf.org
X-Mailman-Version: 2.1.12
Precedence: list
List-Id: OAUTH WG <oauth.ietf.org>
List-Unsubscribe: <https://www.ietf.org/mailman/options/oauth>, <mailto:oauth-request@ietf.org?subject=unsubscribe>
List-Archive: <http://www.ietf.org/mail-archive/web/oauth>
List-Post: <mailto:oauth@ietf.org>
List-Help: <mailto:oauth-request@ietf.org?subject=help>
List-Subscribe: <https://www.ietf.org/mailman/listinfo/oauth>, <mailto:oauth-request@ietf.org?subject=subscribe>
X-List-Received-Date: Wed, 06 Feb 2013 09:35:50 -0000

--047d7b603c02c486fe04d50b0cc7
Content-Type: text/plain; charset=ISO-8859-1

I am sorry if this was already discussed in this list..

Looking at [1] it only talks about revoking the access token from the
client.

How about the resource owner..?

There can be cases where resource owner needs to revoke an authorized
access token from a given client. Or revoke an scope..

How are we going to address these requirements..? Thoughts appreciated...

[1] http://tools.ietf.org/html/draft-ietf-oauth-revocation-04

-- 
Thanks & Regards,
Prabath

Mobile : +94 71 809 6732

http://blog.facilelogin.com
http://RampartFAQ.com

--047d7b603c02c486fe04d50b0cc7
Content-Type: text/html; charset=ISO-8859-1
Content-Transfer-Encoding: quoted-printable

<div>I am sorry if this was already discussed in this list..=A0</div><div><=
br></div><div>Looking at [1] it only talks about revoking the access token =
from the client.</div><div><br></div><div>How about the resource owner..?</=
div>
<div><br></div><div>There can be cases where resource owner needs to revoke=
 an authorized access token from a given client. Or revoke an scope..</div>=
<div><br></div><div>How are we going to address these requirements..? Thoug=
hts appreciated...</div>
<div><br></div>[1] <a href=3D"http://tools.ietf.org/html/draft-ietf-oauth-r=
evocation-04">http://tools.ietf.org/html/draft-ietf-oauth-revocation-04</a>=
<br clear=3D"all"><div><br></div>-- <br>Thanks &amp; Regards,<br>Prabath<di=
v>
<br></div><div>Mobile : +94 71 809 6732=A0<br><br><a href=3D"http://blog.fa=
cilelogin.com" target=3D"_blank">http://blog.facilelogin.com</a><br><a href=
=3D"http://RampartFAQ.com" target=3D"_blank">http://RampartFAQ.com</a></div=
>

--047d7b603c02c486fe04d50b0cc7--

From hannes.tschofenig@gmx.net  Wed Feb  6 05:26:22 2013
Return-Path: <hannes.tschofenig@gmx.net>
X-Original-To: oauth@ietfa.amsl.com
Delivered-To: oauth@ietfa.amsl.com
Received: from localhost (localhost [127.0.0.1]) by ietfa.amsl.com (Postfix) with ESMTP id 1610321F85ED for <oauth@ietfa.amsl.com>; Wed,  6 Feb 2013 05:26:22 -0800 (PST)
X-Virus-Scanned: amavisd-new at amsl.com
X-Spam-Flag: NO
X-Spam-Score: -100.844
X-Spam-Level: 
X-Spam-Status: No, score=-100.844 tagged_above=-999 required=5 tests=[AWL=-0.824, BAYES_00=-2.599, RCVD_IN_BL_SPAMCOP_NET=1.96, RCVD_IN_SORBS_WEB=0.619, USER_IN_WHITELIST=-100]
Received: from mail.ietf.org ([64.170.98.30]) by localhost (ietfa.amsl.com [127.0.0.1]) (amavisd-new, port 10024) with ESMTP id w8JZ0ec8shzv for <oauth@ietfa.amsl.com>; Wed,  6 Feb 2013 05:26:19 -0800 (PST)
Received: from mout.gmx.net (mout.gmx.net [212.227.15.19]) by ietfa.amsl.com (Postfix) with ESMTP id D4FE121F85D2 for <oauth@ietf.org>; Wed,  6 Feb 2013 05:26:18 -0800 (PST)
Received: from mailout-de.gmx.net ([10.1.76.16]) by mrigmx.server.lan (mrigmx002) with ESMTP (Nemesis) id 0MKwSE-1U350z3LiS-000523 for <oauth@ietf.org>; Wed, 06 Feb 2013 14:26:17 +0100
Received: (qmail invoked by alias); 06 Feb 2013 13:26:17 -0000
Received: from unknown (EHLO [10.255.135.174]) [194.251.119.201] by mail.gmx.net (mp016) with SMTP; 06 Feb 2013 14:26:17 +0100
X-Authenticated: #29516787
X-Provags-ID: V01U2FsdGVkX1+lUQA97KCl4QdVocPsTLER57UlIvdJQ14c6p1ueY Og06oPad/z4g6f
From: Hannes Tschofenig <hannes.tschofenig@gmx.net>
Content-Type: text/plain; charset=us-ascii
Content-Transfer-Encoding: quoted-printable
Date: Wed, 6 Feb 2013 15:26:16 +0200
Message-Id: <D9D3D934-D8B8-4ED3-BAD5-A604EC180031@gmx.net>
To: "oauth@ietf.org WG" <oauth@ietf.org>
Mime-Version: 1.0 (Apple Message framework v1085)
X-Mailer: Apple Mail (2.1085)
X-Y-GMX-Trusted: 0
Subject: [OAUTH-WG] Minutes from the OAuth Design Team Conference Call - 4th February 2013
X-BeenThere: oauth@ietf.org
X-Mailman-Version: 2.1.12
Precedence: list
List-Id: OAUTH WG <oauth.ietf.org>
List-Unsubscribe: <https://www.ietf.org/mailman/options/oauth>, <mailto:oauth-request@ietf.org?subject=unsubscribe>
List-Archive: <http://www.ietf.org/mail-archive/web/oauth>
List-Post: <mailto:oauth@ietf.org>
List-Help: <mailto:oauth-request@ietf.org?subject=help>
List-Subscribe: <https://www.ietf.org/mailman/listinfo/oauth>, <mailto:oauth-request@ietf.org?subject=subscribe>
X-List-Received-Date: Wed, 06 Feb 2013 13:26:22 -0000

Here are my notes.=20

Participants:

* John Bradley
* Derek Atkins
* Phil Hunt
* Prateek Mishra
* George Fletcher
* Bill Mills
* Hannes Tschofenig

Notes:=20

We discussed the slides available at =
http://www.tschofenig.priv.at/OAuth2-Security-4Feb2013.ppt, which =
contained a summary of the earlier discussion to determine where we have =
a common view and where not.=20

The entire meeting time was spent to discuss whether a solution at the =
HTTP layer or at the JSON level would be preferred. The view of the =
participants on this call indicated a preference for a solution at the =
HTTP level.=20

The discussion about what HTTP elements should be covered by the keyed =
message digest indicated a preference for a flexible approach, similar =
to DKIM, where the list of included headers is carried in the message =
itself.

The next conference call will take place Monday, 11th Feb. 2013.=20=

From lainhart@us.ibm.com  Wed Feb  6 06:21:59 2013
Return-Path: <lainhart@us.ibm.com>
X-Original-To: oauth@ietfa.amsl.com
Delivered-To: oauth@ietfa.amsl.com
Received: from localhost (localhost [127.0.0.1]) by ietfa.amsl.com (Postfix) with ESMTP id 3CC1221F8A74 for <oauth@ietfa.amsl.com>; Wed,  6 Feb 2013 06:21:59 -0800 (PST)
X-Virus-Scanned: amavisd-new at amsl.com
X-Spam-Flag: NO
X-Spam-Score: -10.524
X-Spam-Level: 
X-Spam-Status: No, score=-10.524 tagged_above=-999 required=5 tests=[AWL=0.074, BAYES_00=-2.599, HTML_MESSAGE=0.001, RCVD_IN_DNSWL_HI=-8]
Received: from mail.ietf.org ([64.170.98.30]) by localhost (ietfa.amsl.com [127.0.0.1]) (amavisd-new, port 10024) with ESMTP id bOq68HOziU88 for <oauth@ietfa.amsl.com>; Wed,  6 Feb 2013 06:21:58 -0800 (PST)
Received: from e9.ny.us.ibm.com (e9.ny.us.ibm.com [32.97.182.139]) by ietfa.amsl.com (Postfix) with ESMTP id 273B321F84DA for <oauth@ietf.org>; Wed,  6 Feb 2013 06:21:58 -0800 (PST)
Received: from /spool/local by e9.ny.us.ibm.com with IBM ESMTP SMTP Gateway: Authorized Use Only! Violators will be prosecuted for <oauth@ietf.org> from <lainhart@us.ibm.com>; Wed, 6 Feb 2013 09:21:57 -0500
Received: from d01dlp02.pok.ibm.com (9.56.250.167) by e9.ny.us.ibm.com (192.168.1.109) with IBM ESMTP SMTP Gateway: Authorized Use Only! Violators will be prosecuted;  Wed, 6 Feb 2013 09:21:55 -0500
Received: from d01relay05.pok.ibm.com (d01relay05.pok.ibm.com [9.56.227.237]) by d01dlp02.pok.ibm.com (Postfix) with ESMTP id 57F956E801F; Wed,  6 Feb 2013 09:21:53 -0500 (EST)
Received: from d01av05.pok.ibm.com (d01av05.pok.ibm.com [9.56.224.195]) by d01relay05.pok.ibm.com (8.13.8/8.13.8/NCO v10.0) with ESMTP id r16ELs7w235278; Wed, 6 Feb 2013 09:21:54 -0500
Received: from d01av05.pok.ibm.com (loopback [127.0.0.1]) by d01av05.pok.ibm.com (8.14.4/8.13.1/NCO v10.0 AVout) with ESMTP id r16ELsS4001702; Wed, 6 Feb 2013 09:21:54 -0500
Received: from d01ml255.pok.ibm.com (d01ml255.pok.ibm.com [9.63.10.54]) by d01av05.pok.ibm.com (8.14.4/8.13.1/NCO v10.0 AVin) with ESMTP id r16ELsb2001699; Wed, 6 Feb 2013 09:21:54 -0500
In-Reply-To: <CAJV9qO8UgLV6SdegZSk4KT3Qyb-M2KmPFPV9xDht_WjibeUWrg@mail.gmail.com>
References: <CAJV9qO8UgLV6SdegZSk4KT3Qyb-M2KmPFPV9xDht_WjibeUWrg@mail.gmail.com>
To: Prabath Siriwardena <prabath@wso2.com>
MIME-Version: 1.0
X-KeepSent: 2F22026A:D81D17E1-85257B0A:004EC66E; type=4; name=$KeepSent
X-Mailer: Lotus Notes Release 8.5.3FP2 SHF22 July 19, 2012
Message-ID: <OF2F22026A.D81D17E1-ON85257B0A.004EC66E-85257B0A.004EE884@us.ibm.com>
From: Todd W Lainhart <lainhart@us.ibm.com>
Date: Wed, 6 Feb 2013 09:21:53 -0500
X-MIMETrack: Serialize by Router on D01ML255/01/M/IBM(Release 8.5.3FP2 ZX853FP2HF4|December 14, 2012) at 02/06/2013 09:21:53, Serialize complete at 02/06/2013 09:21:53
Content-Type: multipart/alternative; boundary="=_alternative 004EE88285257B0A_="
X-Content-Scanned: Fidelis XPS MAILER
x-cbid: 13020614-7182-0000-0000-0000050572B3
Cc: "oauth@ietf.org WG" <oauth@ietf.org>, oauth-bounces@ietf.org
Subject: Re: [OAUTH-WG] A question on token revocation.
X-BeenThere: oauth@ietf.org
X-Mailman-Version: 2.1.12
Precedence: list
List-Id: OAUTH WG <oauth.ietf.org>
List-Unsubscribe: <https://www.ietf.org/mailman/options/oauth>, <mailto:oauth-request@ietf.org?subject=unsubscribe>
List-Archive: <http://www.ietf.org/mail-archive/web/oauth>
List-Post: <mailto:oauth@ietf.org>
List-Help: <mailto:oauth-request@ietf.org?subject=help>
List-Subscribe: <https://www.ietf.org/mailman/listinfo/oauth>, <mailto:oauth-request@ietf.org?subject=subscribe>
X-List-Received-Date: Wed, 06 Feb 2013 14:21:59 -0000

This is a multipart message in MIME format.
--=_alternative 004EE88285257B0A_=
Content-Type: text/plain; charset="US-ASCII"

> There can be cases where resource owner needs to revoke an authorized 
access token from a given client. 

Why wouldn't the RO go through the client to revoke the token?





Todd Lainhart
Rational software
IBM Corporation
550 King Street, Littleton, MA 01460-1250
1-978-899-4705
2-276-4705 (T/L)
lainhart@us.ibm.com




From:   Prabath Siriwardena <prabath@wso2.com>
To:     "oauth@ietf.org WG" <oauth@ietf.org>, 
Date:   02/06/2013 04:36 AM
Subject:        [OAUTH-WG] A question on token revocation.
Sent by:        oauth-bounces@ietf.org



I am sorry if this was already discussed in this list.. 

Looking at [1] it only talks about revoking the access token from the 
client.

How about the resource owner..?

There can be cases where resource owner needs to revoke an authorized 
access token from a given client. Or revoke an scope..

How are we going to address these requirements..? Thoughts appreciated...

[1] http://tools.ietf.org/html/draft-ietf-oauth-revocation-04

-- 
Thanks & Regards,
Prabath

Mobile : +94 71 809 6732 

http://blog.facilelogin.com
http://RampartFAQ.com_______________________________________________
OAuth mailing list
OAuth@ietf.org
https://www.ietf.org/mailman/listinfo/oauth


--=_alternative 004EE88285257B0A_=
Content-Type: text/html; charset="US-ASCII"

<font size=2 face="sans-serif">&gt; </font><font size=3>There can be cases
where resource owner needs to revoke an authorized access token from a
given client. </font>
<br>
<br><font size=2 face="sans-serif">Why wouldn't the RO go through the client
to revoke the token?<br>
</font>
<br>
<table width=223 style="border-collapse:collapse;">
<tr height=8>
<td width=223 bgcolor=white style="border-style:solid;border-color:#000000;border-width:0px 0px 0px 0px;padding:0px 0px;"><font size=1 face="Verdana"><b><br>
<br>
<br>
Todd Lainhart<br>
Rational software<br>
IBM Corporation<br>
550 King Street, Littleton, MA 01460-1250</b></font><font size=1 face="Arial"><b><br>
1-978-899-4705<br>
2-276-4705 (T/L)<br>
lainhart@us.ibm.com</b></font></table>
<br>
<br>
<br>
<br>
<br><font size=1 color=#5f5f5f face="sans-serif">From: &nbsp; &nbsp; &nbsp;
&nbsp;</font><font size=1 face="sans-serif">Prabath Siriwardena
&lt;prabath@wso2.com&gt;</font>
<br><font size=1 color=#5f5f5f face="sans-serif">To: &nbsp; &nbsp; &nbsp;
&nbsp;</font><font size=1 face="sans-serif">&quot;oauth@ietf.org
WG&quot; &lt;oauth@ietf.org&gt;, </font>
<br><font size=1 color=#5f5f5f face="sans-serif">Date: &nbsp; &nbsp; &nbsp;
&nbsp;</font><font size=1 face="sans-serif">02/06/2013 04:36 AM</font>
<br><font size=1 color=#5f5f5f face="sans-serif">Subject: &nbsp; &nbsp;
&nbsp; &nbsp;</font><font size=1 face="sans-serif">[OAUTH-WG] A
question on token revocation.</font>
<br><font size=1 color=#5f5f5f face="sans-serif">Sent by: &nbsp; &nbsp;
&nbsp; &nbsp;</font><font size=1 face="sans-serif">oauth-bounces@ietf.org</font>
<br>
<hr noshade>
<br>
<br>
<br><font size=3>I am sorry if this was already discussed in this list..&nbsp;</font>
<br>
<br><font size=3>Looking at [1] it only talks about revoking the access
token from the client.</font>
<br>
<br><font size=3>How about the resource owner..?</font>
<br>
<br><font size=3>There can be cases where resource owner needs to revoke
an authorized access token from a given client. Or revoke an scope..</font>
<br>
<br><font size=3>How are we going to address these requirements..? Thoughts
appreciated...</font>
<br>
<br><font size=3>[1] </font><a href="http://tools.ietf.org/html/draft-ietf-oauth-revocation-04"><font size=3 color=blue><u>http://tools.ietf.org/html/draft-ietf-oauth-revocation-04</u></font></a>
<br>
<br><font size=3>-- <br>
Thanks &amp; Regards,<br>
Prabath</font>
<br>
<br><font size=3>Mobile : +94 71 809 6732&nbsp;<br>
</font><font size=3 color=blue><u><br>
</u></font><a href=http://blog.facilelogin.com/ target=_blank><font size=3 color=blue><u>http://blog.facilelogin.com</u></font></a><font size=3 color=blue><u><br>
</u></font><a href=http://rampartfaq.com/ target=_blank><font size=3 color=blue><u>http://RampartFAQ.com</u></font></a><tt><font size=2>_______________________________________________<br>
OAuth mailing list<br>
OAuth@ietf.org<br>
</font></tt><a href=https://www.ietf.org/mailman/listinfo/oauth><tt><font size=2>https://www.ietf.org/mailman/listinfo/oauth</font></tt></a><tt><font size=2><br>
</font></tt>
<br>
--=_alternative 004EE88285257B0A_=--


From lainhart@us.ibm.com  Wed Feb  6 06:26:44 2013
Return-Path: <lainhart@us.ibm.com>
X-Original-To: oauth@ietfa.amsl.com
Delivered-To: oauth@ietfa.amsl.com
Received: from localhost (localhost [127.0.0.1]) by ietfa.amsl.com (Postfix) with ESMTP id C3AC721F868D for <oauth@ietfa.amsl.com>; Wed,  6 Feb 2013 06:26:44 -0800 (PST)
X-Virus-Scanned: amavisd-new at amsl.com
X-Spam-Flag: NO
X-Spam-Score: -10.531
X-Spam-Level: 
X-Spam-Status: No, score=-10.531 tagged_above=-999 required=5 tests=[AWL=0.067, BAYES_00=-2.599, HTML_MESSAGE=0.001, RCVD_IN_DNSWL_HI=-8]
Received: from mail.ietf.org ([64.170.98.30]) by localhost (ietfa.amsl.com [127.0.0.1]) (amavisd-new, port 10024) with ESMTP id HOX78+sYuJWr for <oauth@ietfa.amsl.com>; Wed,  6 Feb 2013 06:26:44 -0800 (PST)
Received: from e8.ny.us.ibm.com (e8.ny.us.ibm.com [32.97.182.138]) by ietfa.amsl.com (Postfix) with ESMTP id B7C4F21F853E for <oauth@ietf.org>; Wed,  6 Feb 2013 06:26:43 -0800 (PST)
Received: from /spool/local by e8.ny.us.ibm.com with IBM ESMTP SMTP Gateway: Authorized Use Only! Violators will be prosecuted for <oauth@ietf.org> from <lainhart@us.ibm.com>; Wed, 6 Feb 2013 09:26:42 -0500
Received: from d01dlp01.pok.ibm.com (9.56.250.166) by e8.ny.us.ibm.com (192.168.1.108) with IBM ESMTP SMTP Gateway: Authorized Use Only! Violators will be prosecuted;  Wed, 6 Feb 2013 09:26:40 -0500
Received: from d01relay06.pok.ibm.com (d01relay06.pok.ibm.com [9.56.227.116]) by d01dlp01.pok.ibm.com (Postfix) with ESMTP id 61E8738C8022 for <oauth@ietf.org>; Wed,  6 Feb 2013 09:26:40 -0500 (EST)
Received: from d01av05.pok.ibm.com (d01av05.pok.ibm.com [9.56.224.195]) by d01relay06.pok.ibm.com (8.13.8/8.13.8/NCO v10.0) with ESMTP id r16EQdSl25428146 for <oauth@ietf.org>; Wed, 6 Feb 2013 09:26:40 -0500
Received: from d01av05.pok.ibm.com (loopback [127.0.0.1]) by d01av05.pok.ibm.com (8.14.4/8.13.1/NCO v10.0 AVout) with ESMTP id r16EQd15014265 for <oauth@ietf.org>; Wed, 6 Feb 2013 09:26:39 -0500
Received: from d01ml255.pok.ibm.com (d01ml255.pok.ibm.com [9.63.10.54]) by d01av05.pok.ibm.com (8.14.4/8.13.1/NCO v10.0 AVin) with ESMTP id r16EQcv9014243 for <oauth@ietf.org>; Wed, 6 Feb 2013 09:26:38 -0500
To: "IETF oauth WG" <oauth@ietf.org>
MIME-Version: 1.0
X-KeepSent: F92A76B3:F047824F-85257B0A:004EF063; type=4; name=$KeepSent
X-Mailer: Lotus Notes Release 8.5.3FP2 SHF22 July 19, 2012
Message-ID: <OFF92A76B3.F047824F-ON85257B0A.004EF063-85257B0A.004F5490@us.ibm.com>
From: Todd W Lainhart <lainhart@us.ibm.com>
Date: Wed, 6 Feb 2013 09:26:30 -0500
X-MIMETrack: Serialize by Router on D01ML255/01/M/IBM(Release 8.5.3FP2 ZX853FP2HF4|December 14, 2012) at 02/06/2013 09:26:38, Serialize complete at 02/06/2013 09:26:38
Content-Type: multipart/alternative; boundary="=_alternative 004F548F85257B0A_="
X-Content-Scanned: Fidelis XPS MAILER
x-cbid: 13020614-9360-0000-0000-00001039687A
Subject: [OAUTH-WG] How soon until last call on introspection and revocation
X-BeenThere: oauth@ietf.org
X-Mailman-Version: 2.1.12
Precedence: list
List-Id: OAUTH WG <oauth.ietf.org>
List-Unsubscribe: <https://www.ietf.org/mailman/options/oauth>, <mailto:oauth-request@ietf.org?subject=unsubscribe>
List-Archive: <http://www.ietf.org/mail-archive/web/oauth>
List-Post: <mailto:oauth@ietf.org>
List-Help: <mailto:oauth-request@ietf.org?subject=help>
List-Subscribe: <https://www.ietf.org/mailman/listinfo/oauth>, <mailto:oauth-request@ietf.org?subject=subscribe>
X-List-Received-Date: Wed, 06 Feb 2013 14:26:44 -0000

This is a multipart message in MIME format.
--=_alternative 004F548F85257B0A_=
Content-Type: text/plain; charset="US-ASCII"

Does anyone have any intuition as to how far away we are on last call for 
introspection and revocation?





Todd Lainhart
Rational software
IBM Corporation
550 King Street, Littleton, MA 01460-1250
1-978-899-4705
2-276-4705 (T/L)
lainhart@us.ibm.com

--=_alternative 004F548F85257B0A_=
Content-Type: text/html; charset="US-ASCII"

<font size=2 face="sans-serif">Does anyone have any intuition as to how
far away we are on last call for introspection and revocation?</font>
<br>
<br>
<table width=223 style="border-collapse:collapse;">
<tr height=8>
<td width=223 bgcolor=white style="border-style:solid;border-color:#000000;border-width:0px 0px 0px 0px;padding:0px 0px;"><font size=1 face="Verdana"><b><br>
<br>
<br>
Todd Lainhart<br>
Rational software<br>
IBM Corporation<br>
550 King Street, Littleton, MA 01460-1250</b></font><font size=1 face="Arial"><b><br>
1-978-899-4705<br>
2-276-4705 (T/L)<br>
lainhart@us.ibm.com</b></font></table>
<br>
--=_alternative 004F548F85257B0A_=--


From hannes.tschofenig@gmx.net  Wed Feb  6 06:45:27 2013
Return-Path: <hannes.tschofenig@gmx.net>
X-Original-To: oauth@ietfa.amsl.com
Delivered-To: oauth@ietfa.amsl.com
Received: from localhost (localhost [127.0.0.1]) by ietfa.amsl.com (Postfix) with ESMTP id 0DC7D21F8A45 for <oauth@ietfa.amsl.com>; Wed,  6 Feb 2013 06:45:27 -0800 (PST)
X-Virus-Scanned: amavisd-new at amsl.com
X-Spam-Flag: NO
X-Spam-Score: -102.372
X-Spam-Level: 
X-Spam-Status: No, score=-102.372 tagged_above=-999 required=5 tests=[AWL=0.227, BAYES_00=-2.599, USER_IN_WHITELIST=-100]
Received: from mail.ietf.org ([64.170.98.30]) by localhost (ietfa.amsl.com [127.0.0.1]) (amavisd-new, port 10024) with ESMTP id jgEJG1-qDXBE for <oauth@ietfa.amsl.com>; Wed,  6 Feb 2013 06:45:26 -0800 (PST)
Received: from mout.gmx.net (mout.gmx.net [212.227.15.19]) by ietfa.amsl.com (Postfix) with ESMTP id 30D5821F868D for <oauth@ietf.org>; Wed,  6 Feb 2013 06:45:26 -0800 (PST)
Received: from mailout-de.gmx.net ([10.1.76.33]) by mrigmx.server.lan (mrigmx002) with ESMTP (Nemesis) id 0MVGQC-1URkgl1T0I-00YhzS for <oauth@ietf.org>; Wed, 06 Feb 2013 15:45:25 +0100
Received: (qmail invoked by alias); 06 Feb 2013 14:45:25 -0000
Received: from a88-115-219-140.elisa-laajakaista.fi (EHLO [192.168.100.100]) [88.115.219.140] by mail.gmx.net (mp033) with SMTP; 06 Feb 2013 15:45:25 +0100
X-Authenticated: #29516787
X-Provags-ID: V01U2FsdGVkX1+tcW9c6I2t/dLa2a0LpZbnI8MV/mRqR2toFE2QPe 6Y27UspmBrXE0A
Mime-Version: 1.0 (Apple Message framework v1085)
Content-Type: text/plain; charset=us-ascii
From: Hannes Tschofenig <hannes.tschofenig@gmx.net>
In-Reply-To: <OFF92A76B3.F047824F-ON85257B0A.004EF063-85257B0A.004F5490@us.ibm.com>
Date: Wed, 6 Feb 2013 16:45:22 +0200
Content-Transfer-Encoding: quoted-printable
Message-Id: <64485787-77EE-4715-94E3-0A500992CDF2@gmx.net>
References: <OFF92A76B3.F047824F-ON85257B0A.004EF063-85257B0A.004F5490@us.ibm.com>
To: Todd W Lainhart <lainhart@us.ibm.com>
X-Mailer: Apple Mail (2.1085)
X-Y-GMX-Trusted: 0
Cc: IETF oauth WG <oauth@ietf.org>
Subject: Re: [OAUTH-WG] How soon until last call on introspection and revocation
X-BeenThere: oauth@ietf.org
X-Mailman-Version: 2.1.12
Precedence: list
List-Id: OAUTH WG <oauth.ietf.org>
List-Unsubscribe: <https://www.ietf.org/mailman/options/oauth>, <mailto:oauth-request@ietf.org?subject=unsubscribe>
List-Archive: <http://www.ietf.org/mail-archive/web/oauth>
List-Post: <mailto:oauth@ietf.org>
List-Help: <mailto:oauth-request@ietf.org?subject=help>
List-Subscribe: <https://www.ietf.org/mailman/listinfo/oauth>, <mailto:oauth-request@ietf.org?subject=subscribe>
X-List-Received-Date: Wed, 06 Feb 2013 14:45:27 -0000

Hi Todd,=20

two answers:

1) Token Revocation:

I had initiated a Working Group Last Call for the token revocation =
document end of November:
http://www.ietf.org/mail-archive/web/oauth/current/msg10102.html

As you have seen on the list, this has generated a fair amount of =
discussion.=20

I hope that Torsten, the draft editor, is able to produce a new draft =
version quickly with a resolution of the open issues that is acceptable =
to the rest of the group.=20

Then, we will have to judge whether the document can move forward to the =
IESG.=20

2) Introspection

That document is not even a working group item.=20

Ciao
Hannes

On Feb 6, 2013, at 4:26 PM, Todd W Lainhart wrote:

> Does anyone have any intuition as to how far away we are on last call =
for introspection and revocation?=20


From jricher@mitre.org  Wed Feb  6 06:49:47 2013
Return-Path: <jricher@mitre.org>
X-Original-To: oauth@ietfa.amsl.com
Delivered-To: oauth@ietfa.amsl.com
Received: from localhost (localhost [127.0.0.1]) by ietfa.amsl.com (Postfix) with ESMTP id 6D21621F873D for <oauth@ietfa.amsl.com>; Wed,  6 Feb 2013 06:49:47 -0800 (PST)
X-Virus-Scanned: amavisd-new at amsl.com
X-Spam-Flag: NO
X-Spam-Score: -6.57
X-Spam-Level: 
X-Spam-Status: No, score=-6.57 tagged_above=-999 required=5 tests=[AWL=0.028,  BAYES_00=-2.599, HTML_MESSAGE=0.001, RCVD_IN_DNSWL_MED=-4]
Received: from mail.ietf.org ([64.170.98.30]) by localhost (ietfa.amsl.com [127.0.0.1]) (amavisd-new, port 10024) with ESMTP id O-L6uVk2COQ7 for <oauth@ietfa.amsl.com>; Wed,  6 Feb 2013 06:49:46 -0800 (PST)
Received: from smtpksrv1.mitre.org (smtpksrv1.mitre.org [198.49.146.77]) by ietfa.amsl.com (Postfix) with ESMTP id 727E721F870E for <oauth@ietf.org>; Wed,  6 Feb 2013 06:49:46 -0800 (PST)
Received: from smtpksrv1.mitre.org (localhost.localdomain [127.0.0.1]) by localhost (Postfix) with SMTP id DA12B1F130B; Wed,  6 Feb 2013 09:49:45 -0500 (EST)
Received: from IMCCAS03.MITRE.ORG (imccas03.mitre.org [129.83.29.80]) by smtpksrv1.mitre.org (Postfix) with ESMTP id C27621F042A; Wed,  6 Feb 2013 09:49:45 -0500 (EST)
Received: from [10.146.15.29] (129.83.31.58) by IMCCAS03.MITRE.ORG (129.83.29.80) with Microsoft SMTP Server (TLS) id 14.2.318.4; Wed, 6 Feb 2013 09:49:45 -0500
Message-ID: <51126D65.2090707@mitre.org>
Date: Wed, 6 Feb 2013 09:49:09 -0500
From: Justin Richer <jricher@mitre.org>
User-Agent: Mozilla/5.0 (X11; Linux i686; rv:17.0) Gecko/20130106 Thunderbird/17.0.2
MIME-Version: 1.0
To: Prabath Siriwardena <prabath@wso2.com>
References: <CAJV9qO8UgLV6SdegZSk4KT3Qyb-M2KmPFPV9xDht_WjibeUWrg@mail.gmail.com>
In-Reply-To: <CAJV9qO8UgLV6SdegZSk4KT3Qyb-M2KmPFPV9xDht_WjibeUWrg@mail.gmail.com>
Content-Type: multipart/alternative; boundary="------------000508090505060209000809"
X-Originating-IP: [129.83.31.58]
Cc: "oauth@ietf.org WG" <oauth@ietf.org>
Subject: Re: [OAUTH-WG] A question on token revocation.
X-BeenThere: oauth@ietf.org
X-Mailman-Version: 2.1.12
Precedence: list
List-Id: OAUTH WG <oauth.ietf.org>
List-Unsubscribe: <https://www.ietf.org/mailman/options/oauth>, <mailto:oauth-request@ietf.org?subject=unsubscribe>
List-Archive: <http://www.ietf.org/mail-archive/web/oauth>
List-Post: <mailto:oauth@ietf.org>
List-Help: <mailto:oauth-request@ietf.org?subject=help>
List-Subscribe: <https://www.ietf.org/mailman/listinfo/oauth>, <mailto:oauth-request@ietf.org?subject=subscribe>
X-List-Received-Date: Wed, 06 Feb 2013 14:49:47 -0000

--------------000508090505060209000809
Content-Type: text/plain; charset="ISO-8859-1"; format=flowed
Content-Transfer-Encoding: 7bit

These are generally handled through a user interface where the RO is 
authenticated directly to the AS, and there's not much need for a 
"protocol" here, in practice. There are larger applications, like UMA, 
that have client and PR provisioning that would allow for this to be 
managed somewhat programmatically, but even in that case you're still 
generally doing token revocation by a "client" in some fashion. In UMA, 
though, several different pieces can play the role of a "client" at 
different parts of the process.

Revoking a scope is a whole different mess. Generally, you'd want to 
just revoke an existing token and make a new authorization grant with 
lower access if you don't want that client getting that scope anymore. 
If you just want to downscope for a single transaction, you can already 
do that with either the refresh token or token chaining approaches, 
depending on where in the process you are. The latter of these are both 
client-focused, though, and the RO doesn't have a direct hand in it at 
this point.

  -- Justin

On 02/06/2013 04:35 AM, Prabath Siriwardena wrote:
> I am sorry if this was already discussed in this list..
>
> Looking at [1] it only talks about revoking the access token from the 
> client.
>
> How about the resource owner..?
>
> There can be cases where resource owner needs to revoke an authorized 
> access token from a given client. Or revoke an scope..
>
> How are we going to address these requirements..? Thoughts appreciated...
>
> [1] http://tools.ietf.org/html/draft-ietf-oauth-revocation-04
>
> -- 
> Thanks & Regards,
> Prabath
>
> Mobile : +94 71 809 6732
>
> http://blog.facilelogin.com
> http://RampartFAQ.com
>
>
> _______________________________________________
> OAuth mailing list
> OAuth@ietf.org
> https://www.ietf.org/mailman/listinfo/oauth


--------------000508090505060209000809
Content-Type: text/html; charset="ISO-8859-1"
Content-Transfer-Encoding: 7bit

<html>
  <head>
    <meta content="text/html; charset=ISO-8859-1"
      http-equiv="Content-Type">
  </head>
  <body bgcolor="#FFFFFF" text="#000000">
    These are generally handled through a user interface where the RO is
    authenticated directly to the AS, and there's not much need for a
    "protocol" here, in practice. There are larger applications, like
    UMA, that have client and PR provisioning that would allow for this
    to be managed somewhat programmatically, but even in that case
    you're still generally doing token revocation by a "client" in some
    fashion. In UMA, though, several different pieces can play the role
    of a "client" at different parts of the process.<br>
    <br>
    Revoking a scope is a whole different mess. Generally, you'd want to
    just revoke an existing token and make a new authorization grant
    with lower access if you don't want that client getting that scope
    anymore. If you just want to downscope for a single transaction, you
    can already do that with either the refresh token or token chaining
    approaches, depending on where in the process you are. The latter of
    these are both client-focused, though, and the RO doesn't have a
    direct hand in it at this point.<br>
    <br>
    &nbsp;-- Justin<br>
    <br>
    <div class="moz-cite-prefix">On 02/06/2013 04:35 AM, Prabath
      Siriwardena wrote:<br>
    </div>
    <blockquote
cite="mid:CAJV9qO8UgLV6SdegZSk4KT3Qyb-M2KmPFPV9xDht_WjibeUWrg@mail.gmail.com"
      type="cite">
      <meta http-equiv="Content-Type" content="text/html;
        charset=ISO-8859-1">
      <div>I am sorry if this was already discussed in this list..&nbsp;</div>
      <div><br>
      </div>
      <div>Looking at [1] it only talks about revoking the access token
        from the client.</div>
      <div><br>
      </div>
      <div>How about the resource owner..?</div>
      <div><br>
      </div>
      <div>There can be cases where resource owner needs to revoke an
        authorized access token from a given client. Or revoke an
        scope..</div>
      <div><br>
      </div>
      <div>How are we going to address these requirements..? Thoughts
        appreciated...</div>
      <div><br>
      </div>
      [1] <a moz-do-not-send="true"
        href="http://tools.ietf.org/html/draft-ietf-oauth-revocation-04">http://tools.ietf.org/html/draft-ietf-oauth-revocation-04</a><br
        clear="all">
      <div><br>
      </div>
      -- <br>
      Thanks &amp; Regards,<br>
      Prabath
      <div>
        <br>
      </div>
      <div>Mobile : +94 71 809 6732&nbsp;<br>
        <br>
        <a moz-do-not-send="true" href="http://blog.facilelogin.com"
          target="_blank">http://blog.facilelogin.com</a><br>
        <a moz-do-not-send="true" href="http://RampartFAQ.com"
          target="_blank">http://RampartFAQ.com</a></div>
      <br>
      <fieldset class="mimeAttachmentHeader"></fieldset>
      <br>
      <pre wrap="">_______________________________________________
OAuth mailing list
<a class="moz-txt-link-abbreviated" href="mailto:OAuth@ietf.org">OAuth@ietf.org</a>
<a class="moz-txt-link-freetext" href="https://www.ietf.org/mailman/listinfo/oauth">https://www.ietf.org/mailman/listinfo/oauth</a>
</pre>
    </blockquote>
    <br>
  </body>
</html>

--------------000508090505060209000809--

From jricher@mitre.org  Wed Feb  6 06:56:38 2013
Return-Path: <jricher@mitre.org>
X-Original-To: oauth@ietfa.amsl.com
Delivered-To: oauth@ietfa.amsl.com
Received: from localhost (localhost [127.0.0.1]) by ietfa.amsl.com (Postfix) with ESMTP id B96E721F882E for <oauth@ietfa.amsl.com>; Wed,  6 Feb 2013 06:56:38 -0800 (PST)
X-Virus-Scanned: amavisd-new at amsl.com
X-Spam-Flag: NO
X-Spam-Score: -6.572
X-Spam-Level: 
X-Spam-Status: No, score=-6.572 tagged_above=-999 required=5 tests=[AWL=0.027,  BAYES_00=-2.599, RCVD_IN_DNSWL_MED=-4]
Received: from mail.ietf.org ([64.170.98.30]) by localhost (ietfa.amsl.com [127.0.0.1]) (amavisd-new, port 10024) with ESMTP id TnQE1U9dDdv2 for <oauth@ietfa.amsl.com>; Wed,  6 Feb 2013 06:56:38 -0800 (PST)
Received: from smtpksrv1.mitre.org (smtpksrv1.mitre.org [198.49.146.77]) by ietfa.amsl.com (Postfix) with ESMTP id 07FB121F873D for <oauth@ietf.org>; Wed,  6 Feb 2013 06:56:38 -0800 (PST)
Received: from smtpksrv1.mitre.org (localhost.localdomain [127.0.0.1]) by localhost (Postfix) with SMTP id 9DDCF1F042E; Wed,  6 Feb 2013 09:56:37 -0500 (EST)
Received: from IMCCAS04.MITRE.ORG (imccas04.mitre.org [129.83.29.81]) by smtpksrv1.mitre.org (Postfix) with ESMTP id 84D8D1F042A; Wed,  6 Feb 2013 09:56:37 -0500 (EST)
Received: from [10.146.15.29] (129.83.31.58) by IMCCAS04.MITRE.ORG (129.83.29.81) with Microsoft SMTP Server (TLS) id 14.2.318.4; Wed, 6 Feb 2013 09:56:37 -0500
Message-ID: <51126F01.3010605@mitre.org>
Date: Wed, 6 Feb 2013 09:56:01 -0500
From: Justin Richer <jricher@mitre.org>
User-Agent: Mozilla/5.0 (X11; Linux i686; rv:17.0) Gecko/20130106 Thunderbird/17.0.2
MIME-Version: 1.0
To: Hannes Tschofenig <hannes.tschofenig@gmx.net>
References: <OFF92A76B3.F047824F-ON85257B0A.004EF063-85257B0A.004F5490@us.ibm.com> <64485787-77EE-4715-94E3-0A500992CDF2@gmx.net>
In-Reply-To: <64485787-77EE-4715-94E3-0A500992CDF2@gmx.net>
Content-Type: text/plain; charset="ISO-8859-1"; format=flowed
Content-Transfer-Encoding: 7bit
X-Originating-IP: [129.83.31.58]
Cc: IETF oauth WG <oauth@ietf.org>
Subject: Re: [OAUTH-WG] How soon until last call on introspection and revocation
X-BeenThere: oauth@ietf.org
X-Mailman-Version: 2.1.12
Precedence: list
List-Id: OAUTH WG <oauth.ietf.org>
List-Unsubscribe: <https://www.ietf.org/mailman/options/oauth>, <mailto:oauth-request@ietf.org?subject=unsubscribe>
List-Archive: <http://www.ietf.org/mail-archive/web/oauth>
List-Post: <mailto:oauth@ietf.org>
List-Help: <mailto:oauth-request@ietf.org?subject=help>
List-Subscribe: <https://www.ietf.org/mailman/listinfo/oauth>, <mailto:oauth-request@ietf.org?subject=subscribe>
X-List-Received-Date: Wed, 06 Feb 2013 14:56:38 -0000

As editor of introspection draft, I would like to see it become a 
working group item. After talking with the chairs, there appears to be 
some friction with the amount of open working items that the working 
group has right now, though, leading to hesitation to add more to our 
official plate.

That said, it doesn't mean we can't all just *work* on it, and I'm 
actively editing it based on feedback. We're implementing and deploying 
it in our own systems right now, too. I'm tracking issues to the draft 
here if you have any direct changes (or pull requests!):

   https://github.com/jricher/oauth-spec/issues

So I hope that we can at least stabilize the functionality of the spec 
so that by the time the IETF process can start to chew on it in an 
official fashion, it will be mostly baked and we can run it through 
relatively quickly.

  -- Justin

On 02/06/2013 09:45 AM, Hannes Tschofenig wrote:
> Hi Todd,
>
> two answers:
>
> 1) Token Revocation:
>
> I had initiated a Working Group Last Call for the token revocation document end of November:
> http://www.ietf.org/mail-archive/web/oauth/current/msg10102.html
>
> As you have seen on the list, this has generated a fair amount of discussion.
>
> I hope that Torsten, the draft editor, is able to produce a new draft version quickly with a resolution of the open issues that is acceptable to the rest of the group.
>
> Then, we will have to judge whether the document can move forward to the IESG.
>
> 2) Introspection
>
> That document is not even a working group item.
>
> Ciao
> Hannes
>
> On Feb 6, 2013, at 4:26 PM, Todd W Lainhart wrote:
>
>> Does anyone have any intuition as to how far away we are on last call for introspection and revocation?
> _______________________________________________
> OAuth mailing list
> OAuth@ietf.org
> https://www.ietf.org/mailman/listinfo/oauth


From lainhart@us.ibm.com  Wed Feb  6 07:00:27 2013
Return-Path: <lainhart@us.ibm.com>
X-Original-To: oauth@ietfa.amsl.com
Delivered-To: oauth@ietfa.amsl.com
Received: from localhost (localhost [127.0.0.1]) by ietfa.amsl.com (Postfix) with ESMTP id D0C7221F8759 for <oauth@ietfa.amsl.com>; Wed,  6 Feb 2013 07:00:27 -0800 (PST)
X-Virus-Scanned: amavisd-new at amsl.com
X-Spam-Flag: NO
X-Spam-Score: -10.534
X-Spam-Level: 
X-Spam-Status: No, score=-10.534 tagged_above=-999 required=5 tests=[AWL=0.064, BAYES_00=-2.599, HTML_MESSAGE=0.001, RCVD_IN_DNSWL_HI=-8]
Received: from mail.ietf.org ([64.170.98.30]) by localhost (ietfa.amsl.com [127.0.0.1]) (amavisd-new, port 10024) with ESMTP id J3Sk8VDrpyBx for <oauth@ietfa.amsl.com>; Wed,  6 Feb 2013 07:00:27 -0800 (PST)
Received: from e8.ny.us.ibm.com (e8.ny.us.ibm.com [32.97.182.138]) by ietfa.amsl.com (Postfix) with ESMTP id E4CD221F8545 for <oauth@ietf.org>; Wed,  6 Feb 2013 07:00:26 -0800 (PST)
Received: from /spool/local by e8.ny.us.ibm.com with IBM ESMTP SMTP Gateway: Authorized Use Only! Violators will be prosecuted for <oauth@ietf.org> from <lainhart@us.ibm.com>; Wed, 6 Feb 2013 10:00:26 -0500
Received: from d01dlp03.pok.ibm.com (9.56.250.168) by e8.ny.us.ibm.com (192.168.1.108) with IBM ESMTP SMTP Gateway: Authorized Use Only! Violators will be prosecuted;  Wed, 6 Feb 2013 10:00:19 -0500
Received: from d01relay02.pok.ibm.com (d01relay02.pok.ibm.com [9.56.227.234]) by d01dlp03.pok.ibm.com (Postfix) with ESMTP id 4E19BC90021 for <oauth@ietf.org>; Wed,  6 Feb 2013 10:00:19 -0500 (EST)
Received: from d01av05.pok.ibm.com (d01av05.pok.ibm.com [9.56.224.195]) by d01relay02.pok.ibm.com (8.13.8/8.13.8/NCO v10.0) with ESMTP id r16F0J9x290516 for <oauth@ietf.org>; Wed, 6 Feb 2013 10:00:19 -0500
Received: from d01av05.pok.ibm.com (loopback [127.0.0.1]) by d01av05.pok.ibm.com (8.14.4/8.13.1/NCO v10.0 AVout) with ESMTP id r16F0I2o024670 for <oauth@ietf.org>; Wed, 6 Feb 2013 10:00:18 -0500
Received: from d01ml255.pok.ibm.com (d01ml255.pok.ibm.com [9.63.10.54]) by d01av05.pok.ibm.com (8.14.4/8.13.1/NCO v10.0 AVin) with ESMTP id r16F0IjT024621; Wed, 6 Feb 2013 10:00:18 -0500
In-Reply-To: <64485787-77EE-4715-94E3-0A500992CDF2@gmx.net>
References: <OFF92A76B3.F047824F-ON85257B0A.004EF063-85257B0A.004F5490@us.ibm.com> <64485787-77EE-4715-94E3-0A500992CDF2@gmx.net>
To: Hannes Tschofenig <hannes.tschofenig@gmx.net>
MIME-Version: 1.0
X-KeepSent: 5936093F:E5A22F4E-85257B0A:00521942; type=4; name=$KeepSent
X-Mailer: Lotus Notes Release 8.5.3FP2 SHF22 July 19, 2012
Message-ID: <OF5936093F.E5A22F4E-ON85257B0A.00521942-85257B0A.00526C2D@us.ibm.com>
From: Todd W Lainhart <lainhart@us.ibm.com>
Date: Wed, 6 Feb 2013 10:00:16 -0500
X-MIMETrack: Serialize by Router on D01ML255/01/M/IBM(Release 8.5.3FP2 ZX853FP2HF4|December 14, 2012) at 02/06/2013 10:00:18, Serialize complete at 02/06/2013 10:00:18
Content-Type: multipart/alternative; boundary="=_alternative 00526C2C85257B0A_="
X-Content-Scanned: Fidelis XPS MAILER
x-cbid: 13020615-9360-0000-0000-00001039C3CD
Cc: IETF oauth WG <oauth@ietf.org>
Subject: Re: [OAUTH-WG] How soon until last call on introspection and revocation
X-BeenThere: oauth@ietf.org
X-Mailman-Version: 2.1.12
Precedence: list
List-Id: OAUTH WG <oauth.ietf.org>
List-Unsubscribe: <https://www.ietf.org/mailman/options/oauth>, <mailto:oauth-request@ietf.org?subject=unsubscribe>
List-Archive: <http://www.ietf.org/mail-archive/web/oauth>
List-Post: <mailto:oauth@ietf.org>
List-Help: <mailto:oauth-request@ietf.org?subject=help>
List-Subscribe: <https://www.ietf.org/mailman/listinfo/oauth>, <mailto:oauth-request@ietf.org?subject=subscribe>
X-List-Received-Date: Wed, 06 Feb 2013 15:00:28 -0000

This is a multipart message in MIME format.
--=_alternative 00526C2C85257B0A_=
Content-Type: text/plain; charset="US-ASCII"

Thanks Hannes.

> That document is not even a working group item. 

Ha.  I hadn't noticed that - I now see it is part associated to the 
"Network Working Group" instead of "OAuth Working Group". 

I'm confused, and perhaps it's just IETF ignorance, or me not paying 
attention.  What does it mean for the introspection spec, which describes 
itself to be an OAuth 2 endpoint, not to be in this WG?





Todd Lainhart
Rational software
IBM Corporation
550 King Street, Littleton, MA 01460-1250
1-978-899-4705
2-276-4705 (T/L)
lainhart@us.ibm.com




From:   Hannes Tschofenig <hannes.tschofenig@gmx.net>
To:     Todd W Lainhart/Lexington/IBM@IBMUS, 
Cc:     Hannes Tschofenig <hannes.tschofenig@gmx.net>, "IETF oauth WG" 
<oauth@ietf.org>
Date:   02/06/2013 09:47 AM
Subject:        Re: [OAUTH-WG] How soon until last call on introspection 
and revocation



Hi Todd, 

two answers:

1) Token Revocation:

I had initiated a Working Group Last Call for the token revocation 
document end of November:
http://www.ietf.org/mail-archive/web/oauth/current/msg10102.html

As you have seen on the list, this has generated a fair amount of 
discussion. 

I hope that Torsten, the draft editor, is able to produce a new draft 
version quickly with a resolution of the open issues that is acceptable to 
the rest of the group. 

Then, we will have to judge whether the document can move forward to the 
IESG. 

2) Introspection

That document is not even a working group item. 

Ciao
Hannes

On Feb 6, 2013, at 4:26 PM, Todd W Lainhart wrote:

> Does anyone have any intuition as to how far away we are on last call 
for introspection and revocation? 



--=_alternative 00526C2C85257B0A_=
Content-Type: text/html; charset="US-ASCII"

<font size=2 face="sans-serif">Thanks Hannes.</font>
<br>
<br><font size=2 face="sans-serif">&gt; </font><tt><font size=2>That document
is not even a working group item. </font></tt>
<br>
<br><font size=2 face="sans-serif">Ha. &nbsp;I hadn't noticed that - I
now see it is part associated to the &quot;Network Working Group&quot;
instead of &quot;OAuth Working Group&quot;. &nbsp;</font>
<br>
<br><font size=2 face="sans-serif">I'm confused, and perhaps it's just
IETF ignorance, or me not paying attention. &nbsp;What does it mean for
the introspection spec, which describes itself to be an OAuth 2 endpoint,
not to be in this WG?<br>
</font>
<br>
<table width=223 style="border-collapse:collapse;">
<tr height=8>
<td width=223 bgcolor=white style="border-style:solid;border-color:#000000;border-width:0px 0px 0px 0px;padding:0px 0px;"><font size=1 face="Verdana"><b><br>
<br>
<br>
Todd Lainhart<br>
Rational software<br>
IBM Corporation<br>
550 King Street, Littleton, MA 01460-1250</b></font><font size=1 face="Arial"><b><br>
1-978-899-4705<br>
2-276-4705 (T/L)<br>
lainhart@us.ibm.com</b></font></table>
<br>
<br>
<br>
<br>
<br><font size=1 color=#5f5f5f face="sans-serif">From: &nbsp; &nbsp; &nbsp;
&nbsp;</font><font size=1 face="sans-serif">Hannes Tschofenig &lt;hannes.tschofenig@gmx.net&gt;</font>
<br><font size=1 color=#5f5f5f face="sans-serif">To: &nbsp; &nbsp; &nbsp;
&nbsp;</font><font size=1 face="sans-serif">Todd W Lainhart/Lexington/IBM@IBMUS,
</font>
<br><font size=1 color=#5f5f5f face="sans-serif">Cc: &nbsp; &nbsp; &nbsp;
&nbsp;</font><font size=1 face="sans-serif">Hannes Tschofenig &lt;hannes.tschofenig@gmx.net&gt;,
&quot;IETF oauth WG&quot; &lt;oauth@ietf.org&gt;</font>
<br><font size=1 color=#5f5f5f face="sans-serif">Date: &nbsp; &nbsp; &nbsp;
&nbsp;</font><font size=1 face="sans-serif">02/06/2013 09:47 AM</font>
<br><font size=1 color=#5f5f5f face="sans-serif">Subject: &nbsp; &nbsp;
&nbsp; &nbsp;</font><font size=1 face="sans-serif">Re: [OAUTH-WG]
How soon until last call on introspection and revocation</font>
<br>
<hr noshade>
<br>
<br>
<br><tt><font size=2>Hi Todd, <br>
<br>
two answers:<br>
<br>
1) Token Revocation:<br>
<br>
I had initiated a Working Group Last Call for the token revocation document
end of November:<br>
</font></tt><a href="http://www.ietf.org/mail-archive/web/oauth/current/msg10102.html"><tt><font size=2>http://www.ietf.org/mail-archive/web/oauth/current/msg10102.html</font></tt></a><tt><font size=2><br>
<br>
As you have seen on the list, this has generated a fair amount of discussion.
<br>
<br>
I hope that Torsten, the draft editor, is able to produce a new draft version
quickly with a resolution of the open issues that is acceptable to the
rest of the group. <br>
<br>
Then, we will have to judge whether the document can move forward to the
IESG. <br>
<br>
2) Introspection<br>
<br>
That document is not even a working group item. <br>
<br>
Ciao<br>
Hannes<br>
<br>
On Feb 6, 2013, at 4:26 PM, Todd W Lainhart wrote:<br>
<br>
&gt; Does anyone have any intuition as to how far away we are on last call
for introspection and revocation? <br>
<br>
</font></tt>
<br>
--=_alternative 00526C2C85257B0A_=--


From prabath@wso2.com  Wed Feb  6 07:04:55 2013
Return-Path: <prabath@wso2.com>
X-Original-To: oauth@ietfa.amsl.com
Delivered-To: oauth@ietfa.amsl.com
Received: from localhost (localhost [127.0.0.1]) by ietfa.amsl.com (Postfix) with ESMTP id 894FC21F8625 for <oauth@ietfa.amsl.com>; Wed,  6 Feb 2013 07:04:55 -0800 (PST)
X-Virus-Scanned: amavisd-new at amsl.com
X-Spam-Flag: NO
X-Spam-Score: -2.568
X-Spam-Level: 
X-Spam-Status: No, score=-2.568 tagged_above=-999 required=5 tests=[AWL=0.408,  BAYES_00=-2.599, FM_FORGED_GMAIL=0.622, HTML_MESSAGE=0.001, RCVD_IN_DNSWL_LOW=-1]
Received: from mail.ietf.org ([64.170.98.30]) by localhost (ietfa.amsl.com [127.0.0.1]) (amavisd-new, port 10024) with ESMTP id GCOCCSAie94z for <oauth@ietfa.amsl.com>; Wed,  6 Feb 2013 07:04:54 -0800 (PST)
Received: from mail-ee0-f49.google.com (mail-ee0-f49.google.com [74.125.83.49]) by ietfa.amsl.com (Postfix) with ESMTP id 3752921F870E for <oauth@ietf.org>; Wed,  6 Feb 2013 07:04:54 -0800 (PST)
Received: by mail-ee0-f49.google.com with SMTP id d4so734256eek.36 for <oauth@ietf.org>; Wed, 06 Feb 2013 07:04:53 -0800 (PST)
X-Google-DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=google.com; s=20120113; h=mime-version:x-received:in-reply-to:references:date:message-id :subject:from:to:cc:content-type:x-gm-message-state; bh=RF/huxufsCNV+NNymWVa62UHsFHRZmBuSiLW8xEaKVM=; b=QN0hA2PJSlOMTKLAfh9j3ZkE7B6ZBCqIN9X4+q+Y4vj+K8HLUuVC72eZZvE35eG9fX cnFn/NIutgNkDxg9CDbzIPJK9Y0G/G0ShtmDSZVyTTT07q38TFtIJWRuVmIJ1BrF3Lcy qlKSz63YgIWjkPkMt8Me8iDvo/rN9l6xbYWy/xhaj1gFc3xFmMH39VAQOTGVR+OyxTM5 clVkvZ9Hbgk0f6yZuxYHabmiDdCgwtob5+tcJXYD5JcbeNzRey09wkN/PsgO0BSNqwNZ Gd3uzBvwY1qT5u4wFRZjurlR3E39Xnk6sDDw7+SaVT6GTUmBz4sy48+6gJF4A2Af/5sA K9DQ==
MIME-Version: 1.0
X-Received: by 10.14.211.137 with SMTP id w9mr96820925eeo.39.1360163092841; Wed, 06 Feb 2013 07:04:52 -0800 (PST)
Received: by 10.223.175.134 with HTTP; Wed, 6 Feb 2013 07:04:52 -0800 (PST)
In-Reply-To: <OF2F22026A.D81D17E1-ON85257B0A.004EC66E-85257B0A.004EE884@us.ibm.com>
References: <CAJV9qO8UgLV6SdegZSk4KT3Qyb-M2KmPFPV9xDht_WjibeUWrg@mail.gmail.com> <OF2F22026A.D81D17E1-ON85257B0A.004EC66E-85257B0A.004EE884@us.ibm.com>
Date: Wed, 6 Feb 2013 20:34:52 +0530
Message-ID: <CAJV9qO9B-2eWK7Vss4XGspUhTU0S716Nh4acii5f9puJvmT7mQ@mail.gmail.com>
From: Prabath Siriwardena <prabath@wso2.com>
To: Todd W Lainhart <lainhart@us.ibm.com>
Content-Type: multipart/alternative; boundary=047d7b624ab8fc455c04d50fa568
X-Gm-Message-State: ALoCoQnpcYxvXeh99LhZ28pf2l8c62O1Us8eIiwh8DaSHRwpyWW7BYwy3RzmybIRCja4lShY/WB6
Cc: "oauth@ietf.org WG" <oauth@ietf.org>, oauth-bounces@ietf.org
Subject: Re: [OAUTH-WG] A question on token revocation.
X-BeenThere: oauth@ietf.org
X-Mailman-Version: 2.1.12
Precedence: list
List-Id: OAUTH WG <oauth.ietf.org>
List-Unsubscribe: <https://www.ietf.org/mailman/options/oauth>, <mailto:oauth-request@ietf.org?subject=unsubscribe>
List-Archive: <http://www.ietf.org/mail-archive/web/oauth>
List-Post: <mailto:oauth@ietf.org>
List-Help: <mailto:oauth-request@ietf.org?subject=help>
List-Subscribe: <https://www.ietf.org/mailman/listinfo/oauth>, <mailto:oauth-request@ietf.org?subject=subscribe>
X-List-Received-Date: Wed, 06 Feb 2013 15:04:55 -0000

--047d7b624ab8fc455c04d50fa568
Content-Type: text/plain; charset=ISO-8859-1

On Wed, Feb 6, 2013 at 7:51 PM, Todd W Lainhart <lainhart@us.ibm.com> wrote:

> > There can be cases where resource owner needs to revoke an authorized
> access token from a given client.
>
> Why wouldn't the RO go through the client to revoke the token?
>

RO needs not to go through the client to revoke. Resource owner should have
the capability to revoke an acces token by client.

Thanks & regards,
-Prabath


>
>  *
>
>
> Todd Lainhart
> Rational software
> IBM Corporation
> 550 King Street, Littleton, MA 01460-1250**
> 1-978-899-4705
> 2-276-4705 (T/L)
> lainhart@us.ibm.com*
>
>
>
>
> From:        Prabath Siriwardena <prabath@wso2.com>
> To:        "oauth@ietf.org WG" <oauth@ietf.org>,
> Date:        02/06/2013 04:36 AM
> Subject:        [OAUTH-WG] A question on token revocation.
> Sent by:        oauth-bounces@ietf.org
> ------------------------------
>
>
>
> I am sorry if this was already discussed in this list..
>
> Looking at [1] it only talks about revoking the access token from the
> client.
>
> How about the resource owner..?
>
> There can be cases where resource owner needs to revoke an authorized
> access token from a given client. Or revoke an scope..
>
> How are we going to address these requirements..? Thoughts appreciated...
>
> [1] *http://tools.ietf.org/html/draft-ietf-oauth-revocation-04*<http://tools.ietf.org/html/draft-ietf-oauth-revocation-04>
>
> --
> Thanks & Regards,
> Prabath
>
> Mobile : +94 71 809 6732
> *
> **http://blog.facilelogin.com* <http://blog.facilelogin.com/>*
> *
> *http://RampartFAQ.com* <http://rampartfaq.com/>
> _______________________________________________
> OAuth mailing list
> OAuth@ietf.org
> https://www.ietf.org/mailman/listinfo/oauth
>
>


-- 
Thanks & Regards,
Prabath

Mobile : +94 71 809 6732

http://blog.facilelogin.com
http://RampartFAQ.com

--047d7b624ab8fc455c04d50fa568
Content-Type: text/html; charset=ISO-8859-1
Content-Transfer-Encoding: quoted-printable

<br><br><div class=3D"gmail_quote">On Wed, Feb 6, 2013 at 7:51 PM, Todd W L=
ainhart <span dir=3D"ltr">&lt;<a href=3D"mailto:lainhart@us.ibm.com" target=
=3D"_blank">lainhart@us.ibm.com</a>&gt;</span> wrote:<br><blockquote class=
=3D"gmail_quote" style=3D"margin:0 0 0 .8ex;border-left:1px #ccc solid;padd=
ing-left:1ex">
<div class=3D"im"><font face=3D"sans-serif">&gt; </font><font size=3D"3">Th=
ere can be cases
where resource owner needs to revoke an authorized access token from a
given client. </font>
<br>
<br></div><font face=3D"sans-serif">Why wouldn&#39;t the RO go through the =
client
to revoke the token?<br></font></blockquote><div><br></div><div>RO needs no=
t to go through the client to revoke. Resource owner should have the capabi=
lity to revoke an acces token by client.</div><div><br></div><div>Thanks &a=
mp; regards,</div>
<div>-Prabath</div><div>=A0</div><blockquote class=3D"gmail_quote" style=3D=
"margin:0 0 0 .8ex;border-left:1px #ccc solid;padding-left:1ex"><font face=
=3D"sans-serif">
</font>
<br>
<table width=3D"223" style=3D"border-collapse:collapse">
<tbody><tr height=3D"8">
<td width=3D"223" bgcolor=3D"white" style=3D"border-style:solid;border-colo=
r:#000000;border-width:0px 0px 0px 0px;padding:0px 0px"><font size=3D"1" fa=
ce=3D"Verdana"><b><br>
<br>
<br>
Todd Lainhart<br>
Rational software<br>
IBM Corporation<br>
550 King Street, Littleton, MA 01460-1250</b></font><font size=3D"1" face=
=3D"Arial"><b><br>
1-978-899-4705<br>
2-276-4705 (T/L)<br>
<a href=3D"mailto:lainhart@us.ibm.com" target=3D"_blank">lainhart@us.ibm.co=
m</a></b></font></td></tr></tbody></table>
<br>
<br>
<br>
<br>
<br><font size=3D"1" color=3D"#5f5f5f" face=3D"sans-serif">From: =A0 =A0 =
=A0
=A0</font><font size=3D"1" face=3D"sans-serif">Prabath Siriwardena
&lt;<a href=3D"mailto:prabath@wso2.com" target=3D"_blank">prabath@wso2.com<=
/a>&gt;</font>
<br><font size=3D"1" color=3D"#5f5f5f" face=3D"sans-serif">To: =A0 =A0 =A0
=A0</font><font size=3D"1" face=3D"sans-serif">&quot;<a href=3D"mailto:oaut=
h@ietf.org" target=3D"_blank">oauth@ietf.org</a>
WG&quot; &lt;<a href=3D"mailto:oauth@ietf.org" target=3D"_blank">oauth@ietf=
.org</a>&gt;, </font>
<br><font size=3D"1" color=3D"#5f5f5f" face=3D"sans-serif">Date: =A0 =A0 =
=A0
=A0</font><font size=3D"1" face=3D"sans-serif">02/06/2013 04:36 AM</font>
<br><font size=3D"1" color=3D"#5f5f5f" face=3D"sans-serif">Subject: =A0 =A0
=A0 =A0</font><font size=3D"1" face=3D"sans-serif">[OAUTH-WG] A
question on token revocation.</font>
<br><font size=3D"1" color=3D"#5f5f5f" face=3D"sans-serif">Sent by: =A0 =A0
=A0 =A0</font><font size=3D"1" face=3D"sans-serif"><a href=3D"mailto:oauth-=
bounces@ietf.org" target=3D"_blank">oauth-bounces@ietf.org</a></font>
<br>
<hr noshade><div><div class=3D"h5">
<br>
<br>
<br><font size=3D"3">I am sorry if this was already discussed in this list.=
.=A0</font>
<br>
<br><font size=3D"3">Looking at [1] it only talks about revoking the access
token from the client.</font>
<br>
<br><font size=3D"3">How about the resource owner..?</font>
<br>
<br><font size=3D"3">There can be cases where resource owner needs to revok=
e
an authorized access token from a given client. Or revoke an scope..</font>
<br>
<br><font size=3D"3">How are we going to address these requirements..? Thou=
ghts
appreciated...</font>
<br>
<br><font size=3D"3">[1] </font><a href=3D"http://tools.ietf.org/html/draft=
-ietf-oauth-revocation-04" target=3D"_blank"><font size=3D"3" color=3D"blue=
"><u>http://tools.ietf.org/html/draft-ietf-oauth-revocation-04</u></font></=
a>
<br>
<br><font size=3D"3">-- <br>
Thanks &amp; Regards,<br>
Prabath</font>
<br>
<br><font size=3D"3">Mobile : <a href=3D"tel:%2B94%2071%20809%206732" value=
=3D"+94718096732" target=3D"_blank">+94 71 809 6732</a>=A0<br>
</font><font size=3D"3" color=3D"blue"><u><br>
</u></font><a href=3D"http://blog.facilelogin.com/" target=3D"_blank"><font=
 size=3D"3" color=3D"blue"><u>http://blog.facilelogin.com</u></font></a><fo=
nt size=3D"3" color=3D"blue"><u><br>
</u></font></div></div><a href=3D"http://rampartfaq.com/" target=3D"_blank"=
><font size=3D"3" color=3D"blue"><u>http://RampartFAQ.com</u></font></a><tt=
><font>_______________________________________________<br>
OAuth mailing list<br>
<a href=3D"mailto:OAuth@ietf.org" target=3D"_blank">OAuth@ietf.org</a><br>
</font></tt><a href=3D"https://www.ietf.org/mailman/listinfo/oauth" target=
=3D"_blank"><tt><font>https://www.ietf.org/mailman/listinfo/oauth</font></t=
t></a><tt><font><br>
</font></tt>
<br></blockquote></div><br><br clear=3D"all"><div><br></div>-- <br>Thanks &=
amp; Regards,<br>Prabath<div><br></div><div>Mobile : +94 71 809 6732=A0<br>=
<br><a href=3D"http://blog.facilelogin.com" target=3D"_blank">http://blog.f=
acilelogin.com</a><br>
<a href=3D"http://RampartFAQ.com" target=3D"_blank">http://RampartFAQ.com</=
a></div>

--047d7b624ab8fc455c04d50fa568--

From lainhart@us.ibm.com  Wed Feb  6 07:06:34 2013
Return-Path: <lainhart@us.ibm.com>
X-Original-To: oauth@ietfa.amsl.com
Delivered-To: oauth@ietfa.amsl.com
Received: from localhost (localhost [127.0.0.1]) by ietfa.amsl.com (Postfix) with ESMTP id 9732C21F87A5 for <oauth@ietfa.amsl.com>; Wed,  6 Feb 2013 07:06:34 -0800 (PST)
X-Virus-Scanned: amavisd-new at amsl.com
X-Spam-Flag: NO
X-Spam-Score: -10.537
X-Spam-Level: 
X-Spam-Status: No, score=-10.537 tagged_above=-999 required=5 tests=[AWL=0.061, BAYES_00=-2.599, HTML_MESSAGE=0.001, RCVD_IN_DNSWL_HI=-8]
Received: from mail.ietf.org ([64.170.98.30]) by localhost (ietfa.amsl.com [127.0.0.1]) (amavisd-new, port 10024) with ESMTP id 83Th4-cvYXzX for <oauth@ietfa.amsl.com>; Wed,  6 Feb 2013 07:06:33 -0800 (PST)
Received: from e9.ny.us.ibm.com (e9.ny.us.ibm.com [32.97.182.139]) by ietfa.amsl.com (Postfix) with ESMTP id 63F3221F8759 for <oauth@ietf.org>; Wed,  6 Feb 2013 07:06:33 -0800 (PST)
Received: from /spool/local by e9.ny.us.ibm.com with IBM ESMTP SMTP Gateway: Authorized Use Only! Violators will be prosecuted for <oauth@ietf.org> from <lainhart@us.ibm.com>; Wed, 6 Feb 2013 10:06:31 -0500
Received: from d01dlp02.pok.ibm.com (9.56.250.167) by e9.ny.us.ibm.com (192.168.1.109) with IBM ESMTP SMTP Gateway: Authorized Use Only! Violators will be prosecuted;  Wed, 6 Feb 2013 10:06:29 -0500
Received: from d01relay06.pok.ibm.com (d01relay06.pok.ibm.com [9.56.227.116]) by d01dlp02.pok.ibm.com (Postfix) with ESMTP id 4B30F6E8021 for <oauth@ietf.org>; Wed,  6 Feb 2013 10:06:27 -0500 (EST)
Received: from d01av04.pok.ibm.com (d01av04.pok.ibm.com [9.56.224.64]) by d01relay06.pok.ibm.com (8.13.8/8.13.8/NCO v10.0) with ESMTP id r16F6SlG24969234 for <oauth@ietf.org>; Wed, 6 Feb 2013 10:06:28 -0500
Received: from d01av04.pok.ibm.com (loopback [127.0.0.1]) by d01av04.pok.ibm.com (8.14.4/8.13.1/NCO v10.0 AVout) with ESMTP id r16F6SRG032645 for <oauth@ietf.org>; Wed, 6 Feb 2013 10:06:28 -0500
Received: from d01ml255.pok.ibm.com (d01ml255.pok.ibm.com [9.63.10.54]) by d01av04.pok.ibm.com (8.14.4/8.13.1/NCO v10.0 AVin) with ESMTP id r16F6M3l032161; Wed, 6 Feb 2013 10:06:23 -0500
In-Reply-To: <51126F01.3010605@mitre.org>
References: <OFF92A76B3.F047824F-ON85257B0A.004EF063-85257B0A.004F5490@us.ibm.com> <64485787-77EE-4715-94E3-0A500992CDF2@gmx.net> <51126F01.3010605@mitre.org>
To: Justin Richer <jricher@mitre.org>
MIME-Version: 1.0
X-KeepSent: 2FACACEF:7751146F-85257B0A:0052D0AD; type=4; name=$KeepSent
X-Mailer: Lotus Notes Release 8.5.3FP2 SHF22 July 19, 2012
Message-ID: <OF2FACACEF.7751146F-ON85257B0A.0052D0AD-85257B0A.0052F833@us.ibm.com>
From: Todd W Lainhart <lainhart@us.ibm.com>
Date: Wed, 6 Feb 2013 10:06:15 -0500
X-MIMETrack: Serialize by Router on D01ML255/01/M/IBM(Release 8.5.3FP2 ZX853FP2HF4|December 14, 2012) at 02/06/2013 10:06:23, Serialize complete at 02/06/2013 10:06:23
Content-Type: multipart/alternative; boundary="=_alternative 0052F83285257B0A_="
X-Content-Scanned: Fidelis XPS MAILER
x-cbid: 13020615-7182-0000-0000-00000505DBDA
Cc: IETF oauth WG <oauth@ietf.org>
Subject: Re: [OAUTH-WG] How soon until last call on introspection and revocation
X-BeenThere: oauth@ietf.org
X-Mailman-Version: 2.1.12
Precedence: list
List-Id: OAUTH WG <oauth.ietf.org>
List-Unsubscribe: <https://www.ietf.org/mailman/options/oauth>, <mailto:oauth-request@ietf.org?subject=unsubscribe>
List-Archive: <http://www.ietf.org/mail-archive/web/oauth>
List-Post: <mailto:oauth@ietf.org>
List-Help: <mailto:oauth-request@ietf.org?subject=help>
List-Subscribe: <https://www.ietf.org/mailman/listinfo/oauth>, <mailto:oauth-request@ietf.org?subject=subscribe>
X-List-Received-Date: Wed, 06 Feb 2013 15:06:34 -0000

This is a multipart message in MIME format.
--=_alternative 0052F83285257B0A_=
Content-Type: text/plain; charset="US-ASCII"

>That said, it doesn't mean we can't all just *work* on it...

Agreed.  Thanks for the clarification.





Todd Lainhart
Rational software
IBM Corporation
550 King Street, Littleton, MA 01460-1250
1-978-899-4705
2-276-4705 (T/L)
lainhart@us.ibm.com




From:   Justin Richer <jricher@mitre.org>
To:     Hannes Tschofenig <hannes.tschofenig@gmx.net>, 
Cc:     Todd W Lainhart/Lexington/IBM@IBMUS, IETF oauth WG 
<oauth@ietf.org>
Date:   02/06/2013 09:57 AM
Subject:        Re: [OAUTH-WG] How soon until last call on introspection 
and revocation



As editor of introspection draft, I would like to see it become a 
working group item. After talking with the chairs, there appears to be 
some friction with the amount of open working items that the working 
group has right now, though, leading to hesitation to add more to our 
official plate.

That said, it doesn't mean we can't all just *work* on it, and I'm 
actively editing it based on feedback. We're implementing and deploying 
it in our own systems right now, too. I'm tracking issues to the draft 
here if you have any direct changes (or pull requests!):

   https://github.com/jricher/oauth-spec/issues

So I hope that we can at least stabilize the functionality of the spec 
so that by the time the IETF process can start to chew on it in an 
official fashion, it will be mostly baked and we can run it through 
relatively quickly.

  -- Justin

On 02/06/2013 09:45 AM, Hannes Tschofenig wrote:
> Hi Todd,
>
> two answers:
>
> 1) Token Revocation:
>
> I had initiated a Working Group Last Call for the token revocation 
document end of November:
> http://www.ietf.org/mail-archive/web/oauth/current/msg10102.html
>
> As you have seen on the list, this has generated a fair amount of 
discussion.
>
> I hope that Torsten, the draft editor, is able to produce a new draft 
version quickly with a resolution of the open issues that is acceptable to 
the rest of the group.
>
> Then, we will have to judge whether the document can move forward to the 
IESG.
>
> 2) Introspection
>
> That document is not even a working group item.
>
> Ciao
> Hannes
>
> On Feb 6, 2013, at 4:26 PM, Todd W Lainhart wrote:
>
>> Does anyone have any intuition as to how far away we are on last call 
for introspection and revocation?
> _______________________________________________
> OAuth mailing list
> OAuth@ietf.org
> https://www.ietf.org/mailman/listinfo/oauth



--=_alternative 0052F83285257B0A_=
Content-Type: text/html; charset="US-ASCII"

<font size=2 face="sans-serif">&gt;</font><tt><font size=2>That said,
it doesn't mean we can't all just *work* on it...</font></tt>
<br>
<br><font size=2 face="sans-serif">Agreed. &nbsp;Thanks for the clarification.<br>
</font>
<br>
<table width=223 style="border-collapse:collapse;">
<tr height=8>
<td width=223 bgcolor=white style="border-style:solid;border-color:#000000;border-width:0px 0px 0px 0px;padding:0px 0px;"><font size=1 face="Verdana"><b><br>
<br>
<br>
Todd Lainhart<br>
Rational software<br>
IBM Corporation<br>
550 King Street, Littleton, MA 01460-1250</b></font><font size=1 face="Arial"><b><br>
1-978-899-4705<br>
2-276-4705 (T/L)<br>
lainhart@us.ibm.com</b></font></table>
<br>
<br>
<br>
<br>
<br><font size=1 color=#5f5f5f face="sans-serif">From: &nbsp; &nbsp; &nbsp;
&nbsp;</font><font size=1 face="sans-serif">Justin Richer &lt;jricher@mitre.org&gt;</font>
<br><font size=1 color=#5f5f5f face="sans-serif">To: &nbsp; &nbsp; &nbsp;
&nbsp;</font><font size=1 face="sans-serif">Hannes Tschofenig &lt;hannes.tschofenig@gmx.net&gt;,
</font>
<br><font size=1 color=#5f5f5f face="sans-serif">Cc: &nbsp; &nbsp; &nbsp;
&nbsp;</font><font size=1 face="sans-serif">Todd W Lainhart/Lexington/IBM@IBMUS,
IETF oauth WG &lt;oauth@ietf.org&gt;</font>
<br><font size=1 color=#5f5f5f face="sans-serif">Date: &nbsp; &nbsp; &nbsp;
&nbsp;</font><font size=1 face="sans-serif">02/06/2013 09:57 AM</font>
<br><font size=1 color=#5f5f5f face="sans-serif">Subject: &nbsp; &nbsp;
&nbsp; &nbsp;</font><font size=1 face="sans-serif">Re: [OAUTH-WG]
How soon until last call on introspection and revocation</font>
<br>
<hr noshade>
<br>
<br>
<br><tt><font size=2>As editor of introspection draft, I would like to
see it become a <br>
working group item. After talking with the chairs, there appears to be
<br>
some friction with the amount of open working items that the working <br>
group has right now, though, leading to hesitation to add more to our <br>
official plate.<br>
<br>
That said, it doesn't mean we can't all just *work* on it, and I'm <br>
actively editing it based on feedback. We're implementing and deploying
<br>
it in our own systems right now, too. I'm tracking issues to the draft
<br>
here if you have any direct changes (or pull requests!):<br>
<br>
 &nbsp; </font></tt><a href="https://github.com/jricher/oauth-spec/issues"><tt><font size=2>https://github.com/jricher/oauth-spec/issues</font></tt></a><tt><font size=2><br>
<br>
So I hope that we can at least stabilize the functionality of the spec
<br>
so that by the time the IETF process can start to chew on it in an <br>
official fashion, it will be mostly baked and we can run it through <br>
relatively quickly.<br>
<br>
 &nbsp;-- Justin<br>
<br>
On 02/06/2013 09:45 AM, Hannes Tschofenig wrote:<br>
&gt; Hi Todd,<br>
&gt;<br>
&gt; two answers:<br>
&gt;<br>
&gt; 1) Token Revocation:<br>
&gt;<br>
&gt; I had initiated a Working Group Last Call for the token revocation
document end of November:<br>
&gt; </font></tt><a href="http://www.ietf.org/mail-archive/web/oauth/current/msg10102.html"><tt><font size=2>http://www.ietf.org/mail-archive/web/oauth/current/msg10102.html</font></tt></a><tt><font size=2><br>
&gt;<br>
&gt; As you have seen on the list, this has generated a fair amount of
discussion.<br>
&gt;<br>
&gt; I hope that Torsten, the draft editor, is able to produce a new draft
version quickly with a resolution of the open issues that is acceptable
to the rest of the group.<br>
&gt;<br>
&gt; Then, we will have to judge whether the document can move forward
to the IESG.<br>
&gt;<br>
&gt; 2) Introspection<br>
&gt;<br>
&gt; That document is not even a working group item.<br>
&gt;<br>
&gt; Ciao<br>
&gt; Hannes<br>
&gt;<br>
&gt; On Feb 6, 2013, at 4:26 PM, Todd W Lainhart wrote:<br>
&gt;<br>
&gt;&gt; Does anyone have any intuition as to how far away we are on last
call for introspection and revocation?<br>
&gt; _______________________________________________<br>
&gt; OAuth mailing list<br>
&gt; OAuth@ietf.org<br>
&gt; </font></tt><a href=https://www.ietf.org/mailman/listinfo/oauth><tt><font size=2>https://www.ietf.org/mailman/listinfo/oauth</font></tt></a><tt><font size=2><br>
<br>
</font></tt>
<br>
--=_alternative 0052F83285257B0A_=--


From prabath@wso2.com  Wed Feb  6 07:13:51 2013
Return-Path: <prabath@wso2.com>
X-Original-To: oauth@ietfa.amsl.com
Delivered-To: oauth@ietfa.amsl.com
Received: from localhost (localhost [127.0.0.1]) by ietfa.amsl.com (Postfix) with ESMTP id 8665421F85B2 for <oauth@ietfa.amsl.com>; Wed,  6 Feb 2013 07:13:51 -0800 (PST)
X-Virus-Scanned: amavisd-new at amsl.com
X-Spam-Flag: NO
X-Spam-Score: -2.67
X-Spam-Level: 
X-Spam-Status: No, score=-2.67 tagged_above=-999 required=5 tests=[AWL=0.306,  BAYES_00=-2.599, FM_FORGED_GMAIL=0.622, HTML_MESSAGE=0.001, RCVD_IN_DNSWL_LOW=-1]
Received: from mail.ietf.org ([64.170.98.30]) by localhost (ietfa.amsl.com [127.0.0.1]) (amavisd-new, port 10024) with ESMTP id snfADvYaAaAx for <oauth@ietfa.amsl.com>; Wed,  6 Feb 2013 07:13:50 -0800 (PST)
Received: from mail-ee0-f45.google.com (mail-ee0-f45.google.com [74.125.83.45]) by ietfa.amsl.com (Postfix) with ESMTP id 39A8721F8481 for <oauth@ietf.org>; Wed,  6 Feb 2013 07:13:50 -0800 (PST)
Received: by mail-ee0-f45.google.com with SMTP id b57so817712eek.4 for <oauth@ietf.org>; Wed, 06 Feb 2013 07:13:49 -0800 (PST)
X-Google-DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=google.com; s=20120113; h=mime-version:x-received:in-reply-to:references:date:message-id :subject:from:to:cc:content-type:x-gm-message-state; bh=v1fiQGs3MW7kv+NOT0Q6EEnN4bcCfxewcndUoUWMpwk=; b=kaIuNye531kZoxCxrGGTgPO4SSpvyl0osz/t8YDu+BdaVw+1wdTqJ9R6dtgZFhQhV5 Rgvx/1oTaLKsTDusvBRJyqt2zKIgHM4/H816jazfMZngfK1XIO4Yp+XzMh/eGVUdF7CT MrxVGeYzNqbOXZXi12Dcn7XdaoWFodiAPlt3T4hufmhL9LMXU1Q/jM07iHiigUO1OFbM maQW7wpR3h3hPFPdbCuFt0rLJUBkTpwZsMul7drSiR3vxHvqGGZH/vUpm840S1L5jnrH Ea+h4mhaqzh/CfkFFZ5di5xmQoRbhcsMKAqlyl6iUo0Sl6+rc9V1DDSKFuhAHsAxInQm MAOw==
MIME-Version: 1.0
X-Received: by 10.14.203.3 with SMTP id e3mr98137999eeo.9.1360163629175; Wed, 06 Feb 2013 07:13:49 -0800 (PST)
Received: by 10.223.175.134 with HTTP; Wed, 6 Feb 2013 07:13:49 -0800 (PST)
In-Reply-To: <51126D65.2090707@mitre.org>
References: <CAJV9qO8UgLV6SdegZSk4KT3Qyb-M2KmPFPV9xDht_WjibeUWrg@mail.gmail.com> <51126D65.2090707@mitre.org>
Date: Wed, 6 Feb 2013 20:43:49 +0530
Message-ID: <CAJV9qO-ZNVcbzNvb---CmXv+vo0jZHKQaDon8OqrPJCfAXKTRQ@mail.gmail.com>
From: Prabath Siriwardena <prabath@wso2.com>
To: Justin Richer <jricher@mitre.org>
Content-Type: multipart/alternative; boundary=047d7b343b2af413b204d50fc53b
X-Gm-Message-State: ALoCoQk7j08RjbURYWtYyJUp+wECuhXLaTtjs+MENg//BYVsO3tMwe+pmc3U4yCWeRs5Tjefnl/r
Cc: "oauth@ietf.org WG" <oauth@ietf.org>
Subject: Re: [OAUTH-WG] A question on token revocation.
X-BeenThere: oauth@ietf.org
X-Mailman-Version: 2.1.12
Precedence: list
List-Id: OAUTH WG <oauth.ietf.org>
List-Unsubscribe: <https://www.ietf.org/mailman/options/oauth>, <mailto:oauth-request@ietf.org?subject=unsubscribe>
List-Archive: <http://www.ietf.org/mail-archive/web/oauth>
List-Post: <mailto:oauth@ietf.org>
List-Help: <mailto:oauth-request@ietf.org?subject=help>
List-Subscribe: <https://www.ietf.org/mailman/listinfo/oauth>, <mailto:oauth-request@ietf.org?subject=subscribe>
X-List-Received-Date: Wed, 06 Feb 2013 15:13:51 -0000

--047d7b343b2af413b204d50fc53b
Content-Type: text/plain; charset=ISO-8859-1

On Wed, Feb 6, 2013 at 8:19 PM, Justin Richer <jricher@mitre.org> wrote:

>  These are generally handled through a user interface where the RO is
> authenticated directly to the AS, and there's not much need for a
> "protocol" here, in practice.
>

Why do you think leaving access token revocation by RO to a proprietary API
is a good practice ? IMO this an essential requirement in API security.

IMHO token revocation done my RO is more practical than token revocation
done by the Client.


> There are larger applications, like UMA, that have client and PR
> provisioning that would allow for this to be managed somewhat
> programmatically, but even in that case you're still generally doing token
> revocation by a "client" in some fashion. In UMA, though, several different
> pieces can play the role of a "client" at different parts of the process.
>
> Revoking a scope is a whole different mess. Generally, you'd want to just
> revoke an existing token and make a new authorization grant with lower
> access if you don't want that client getting that scope anymore. If you
> just want to downscope for a single transaction, you can already do that
> with either the refresh token or token chaining approaches, depending on
> where in the process you are. The latter of these are both client-focused,
> though, and the RO doesn't have a direct hand in it at this point.
>

Why do you think it a mess. If you revoke the entire token then Client
needs to go through the complete OAuth flow - and also needs to get the
user consent. If RO can  downgrade the scope, then we restrict API access
by the client at RS end and its transparent to the client.

Thanks & regards,
-Prabath


>
>
>  -- Justin
>
>
> On 02/06/2013 04:35 AM, Prabath Siriwardena wrote:
>
> I am sorry if this was already discussed in this list..
>
>  Looking at [1] it only talks about revoking the access token from the
> client.
>
>  How about the resource owner..?
>
>  There can be cases where resource owner needs to revoke an authorized
> access token from a given client. Or revoke an scope..
>
>  How are we going to address these requirements..? Thoughts appreciated...
>
>  [1] http://tools.ietf.org/html/draft-ietf-oauth-revocation-04
>
>  --
> Thanks & Regards,
> Prabath
>
>  Mobile : +94 71 809 6732
>
> http://blog.facilelogin.com
> http://RampartFAQ.com
>
>
> _______________________________________________
> OAuth mailing listOAuth@ietf.orghttps://www.ietf.org/mailman/listinfo/oauth
>
>
>


-- 
Thanks & Regards,
Prabath

Mobile : +94 71 809 6732

http://blog.facilelogin.com
http://RampartFAQ.com

--047d7b343b2af413b204d50fc53b
Content-Type: text/html; charset=ISO-8859-1
Content-Transfer-Encoding: quoted-printable

<br><br><div class=3D"gmail_quote">On Wed, Feb 6, 2013 at 8:19 PM, Justin R=
icher <span dir=3D"ltr">&lt;<a href=3D"mailto:jricher@mitre.org" target=3D"=
_blank">jricher@mitre.org</a>&gt;</span> wrote:<br><blockquote class=3D"gma=
il_quote" style=3D"margin:0 0 0 .8ex;border-left:1px #ccc solid;padding-lef=
t:1ex">

 =20
   =20
 =20
  <div bgcolor=3D"#FFFFFF" text=3D"#000000">
    These are generally handled through a user interface where the RO is
    authenticated directly to the AS, and there&#39;s not much need for a
    &quot;protocol&quot; here, in practice. </div></blockquote><div><br></d=
iv><div>Why do you think leaving access token revocation by RO to a proprie=
tary API is a good practice ? IMO this an essential requirement in API secu=
rity.</div>
<div><br></div><div>IMHO token revocation done my RO is more practical than=
 token revocation done by the Client.</div><div>=A0</div><blockquote class=
=3D"gmail_quote" style=3D"margin:0 0 0 .8ex;border-left:1px #ccc solid;padd=
ing-left:1ex">
<div bgcolor=3D"#FFFFFF" text=3D"#000000">There are larger applications, li=
ke
    UMA, that have client and PR provisioning that would allow for this
    to be managed somewhat programmatically, but even in that case
    you&#39;re still generally doing token revocation by a &quot;client&quo=
t; in some
    fashion. In UMA, though, several different pieces can play the role
    of a &quot;client&quot; at different parts of the process.<br>
    <br>
    Revoking a scope is a whole different mess. Generally, you&#39;d want t=
o
    just revoke an existing token and make a new authorization grant
    with lower access if you don&#39;t want that client getting that scope
    anymore. If you just want to downscope for a single transaction, you
    can already do that with either the refresh token or token chaining
    approaches, depending on where in the process you are. The latter of
    these are both client-focused, though, and the RO doesn&#39;t have a
    direct hand in it at this point.</div></blockquote><div><br></div><div>=
Why do you think it a mess. If you revoke the entire token then Client need=
s to go through the complete OAuth flow - and also needs to get the user co=
nsent. If RO can =A0downgrade the scope, then we restrict API access by the=
 client at RS end and its transparent to the client.</div>
<div><br></div><div>Thanks &amp; regards,</div><div>-Prabath</div><div>=A0<=
/div><blockquote class=3D"gmail_quote" style=3D"margin:0 0 0 .8ex;border-le=
ft:1px #ccc solid;padding-left:1ex"><div bgcolor=3D"#FFFFFF" text=3D"#00000=
0"><span class=3D"HOEnZb"><font color=3D"#888888"><br>

    <br>
    =A0-- Justin</font></span><div><div class=3D"h5"><br>
    <br>
    <div>On 02/06/2013 04:35 AM, Prabath
      Siriwardena wrote:<br>
    </div>
    </div></div><blockquote type=3D"cite"><div><div class=3D"h5">
     =20
      <div>I am sorry if this was already discussed in this list..=A0</div>
      <div><br>
      </div>
      <div>Looking at [1] it only talks about revoking the access token
        from the client.</div>
      <div><br>
      </div>
      <div>How about the resource owner..?</div>
      <div><br>
      </div>
      <div>There can be cases where resource owner needs to revoke an
        authorized access token from a given client. Or revoke an
        scope..</div>
      <div><br>
      </div>
      <div>How are we going to address these requirements..? Thoughts
        appreciated...</div>
      <div><br>
      </div>
      [1] <a href=3D"http://tools.ietf.org/html/draft-ietf-oauth-revocation=
-04" target=3D"_blank">http://tools.ietf.org/html/draft-ietf-oauth-revocati=
on-04</a><br clear=3D"all">
      <div><br>
      </div>
      -- <br>
      Thanks &amp; Regards,<br>
      Prabath
      <div>
        <br>
      </div>
      <div>Mobile : <a href=3D"tel:%2B94%2071%20809%206732" value=3D"+94718=
096732" target=3D"_blank">+94 71 809 6732</a>=A0<br>
        <br>
        <a href=3D"http://blog.facilelogin.com" target=3D"_blank">http://bl=
og.facilelogin.com</a><br>
        <a href=3D"http://RampartFAQ.com" target=3D"_blank">http://RampartF=
AQ.com</a></div>
      <br>
      <fieldset></fieldset>
      <br>
      </div></div><div class=3D"im"><pre>__________________________________=
_____________
OAuth mailing list
<a href=3D"mailto:OAuth@ietf.org" target=3D"_blank">OAuth@ietf.org</a>
<a href=3D"https://www.ietf.org/mailman/listinfo/oauth" target=3D"_blank">h=
ttps://www.ietf.org/mailman/listinfo/oauth</a>
</pre>
    </div></blockquote>
    <br>
  </div>

</blockquote></div><br><br clear=3D"all"><div><br></div>-- <br>Thanks &amp;=
 Regards,<br>Prabath<div><br></div><div>Mobile : +94 71 809 6732=A0<br><br>=
<a href=3D"http://blog.facilelogin.com" target=3D"_blank">http://blog.facil=
elogin.com</a><br>
<a href=3D"http://RampartFAQ.com" target=3D"_blank">http://RampartFAQ.com</=
a></div>

--047d7b343b2af413b204d50fc53b--

From wmills_92105@yahoo.com  Wed Feb  6 07:19:32 2013
Return-Path: <wmills_92105@yahoo.com>
X-Original-To: oauth@ietfa.amsl.com
Delivered-To: oauth@ietfa.amsl.com
Received: from localhost (localhost [127.0.0.1]) by ietfa.amsl.com (Postfix) with ESMTP id D80BB21F875F for <oauth@ietfa.amsl.com>; Wed,  6 Feb 2013 07:19:32 -0800 (PST)
X-Virus-Scanned: amavisd-new at amsl.com
X-Spam-Flag: NO
X-Spam-Score: -2.078
X-Spam-Level: 
X-Spam-Status: No, score=-2.078 tagged_above=-999 required=5 tests=[AWL=0.520,  BAYES_00=-2.599, HTML_MESSAGE=0.001]
Received: from mail.ietf.org ([64.170.98.30]) by localhost (ietfa.amsl.com [127.0.0.1]) (amavisd-new, port 10024) with ESMTP id Prx9KA5VSw-O for <oauth@ietfa.amsl.com>; Wed,  6 Feb 2013 07:19:32 -0800 (PST)
Received: from nm39-vm2.bullet.mail.ne1.yahoo.com (nm39-vm2.bullet.mail.ne1.yahoo.com [98.138.229.162]) by ietfa.amsl.com (Postfix) with ESMTP id 8DAE521F8585 for <oauth@ietf.org>; Wed,  6 Feb 2013 07:19:31 -0800 (PST)
Received: from [98.138.226.178] by nm39.bullet.mail.ne1.yahoo.com with NNFMP; 06 Feb 2013 15:19:31 -0000
Received: from [98.138.89.246] by tm13.bullet.mail.ne1.yahoo.com with NNFMP; 06 Feb 2013 15:19:31 -0000
Received: from [127.0.0.1] by omp1060.mail.ne1.yahoo.com with NNFMP; 06 Feb 2013 15:19:31 -0000
X-Yahoo-Newman-Property: ymail-3
X-Yahoo-Newman-Id: 48141.39758.bm@omp1060.mail.ne1.yahoo.com
Received: (qmail 86362 invoked by uid 60001); 6 Feb 2013 15:19:30 -0000
DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=yahoo.com; s=s1024; t=1360163970; bh=S7/B7pZS6HZhl65cD9klIa98VsKh/3Lv1o8F3NTAYOs=; h=X-YMail-OSG:Received:X-Rocket-MIMEInfo:X-Mailer:References:Message-ID:Date:From:Reply-To:Subject:To:Cc:In-Reply-To:MIME-Version:Content-Type; b=PQ0JlwSsmO6LCgr/1VJ8F/OS24Z8IwVvx1dqCMEtZfZJA0Gdeuxju6KqbcjInCUszVJmqm5LMLM5ZqHR8hP23Kr3jrSGmVtlA1uhNhBg0njZG5AygmBvj4JH45NKvCXUuz8t76SN9rVn3mZctlxfCUT21k4K1iB369bkAaWMXgg=
DomainKey-Signature: a=rsa-sha1; q=dns; c=nofws; s=s1024; d=yahoo.com; h=X-YMail-OSG:Received:X-Rocket-MIMEInfo:X-Mailer:References:Message-ID:Date:From:Reply-To:Subject:To:Cc:In-Reply-To:MIME-Version:Content-Type; b=RFbdu3P0aCWDcodiL53JFP5ZJo+nwJs3Q7ILICnQqlcCdOktsjHpbdpnQ7qWRWz/vyyTwvukNxW3Yx69NhZDmNoLOullrPemK4Irlec+Pde4wdF77x++mRB9wKbI3J9tqtIfa54LswzrLE9rvF0m5S6+wxQXqB+0xObVaIPK4H0=;
X-YMail-OSG: YF5MwJYVM1ln0m41G2jZvHbiA5dtuLuEsL0VdMuUWjlRmHh uNelSYoqsoie8GplAnw4K8vP.n7dw2GaVVhWISc8AINZiWMhwYOJJ6bel_Ye Ym9.WLAOWch7diOp1n47LjIJYAswN_l98pVyxN.HL158i4NFG_r8_oP1ZRzL hcx9HXUJYd3g_ZB0afgco7gLyPUHPpaabNvKqXo_TSe5tdQaGkw418Uh9j.I Rr93Yz0tp2EfzFQEAugobGLU.6x.iAvb8X1lmzSsxdiX5ESQD_Zoh0FjZgbE J2rjECqHLjasWrMZwmhjY2_J0en2HvaDGPNhM_HGzudg.AYCsrGWbCiNInwG jmJ0M05VWB4kGqobYxLmcY6lRri71wyTGpAifWs3EtrotqL_UePY_IBPVvM2 b4kcuKOlEBWFsg5NMOqW_EAstq2nysYdPzAldGq0SSZ.SA.O4P5sFNKLo6iC .YZa4Z3EoEiGWJdNvhZr7PTwbRgcVT.v3328fpD3bnRSZgtj84slVirCN92C ys7o2Z4cU7O0e4i4hHv2MK9DXjfxex3AmsX64UHAUCSzliYQ1XbQ34ODdpvi AZoFMmkm6zbMdKf2qeqaKof1aEWDAjItZFTyLshggCCMteLcZIx5l5m7iWnj xUImz0kw6oAUy6YXiIfJmtWRwxIUDodaun01EI0MUjNU-
Received: from [209.131.62.115] by web31811.mail.mud.yahoo.com via HTTP; Wed, 06 Feb 2013 07:19:30 PST
X-Rocket-MIMEInfo: 001.001, KzEKCgpfX19fX19fX19fX19fX19fX19fX19fX19fX19fX19fXwogRnJvbTogUHJhYmF0aCBTaXJpd2FyZGVuYSA8cHJhYmF0aEB3c28yLmNvbT4KVG86IFRvZGQgVyBMYWluaGFydCA8bGFpbmhhcnRAdXMuaWJtLmNvbT4gCkNjOiAib2F1dGhAaWV0Zi5vcmcgV0ciIDxvYXV0aEBpZXRmLm9yZz47IG9hdXRoLWJvdW5jZXNAaWV0Zi5vcmcgClNlbnQ6IFdlZG5lc2RheSwgRmVicnVhcnkgNiwgMjAxMyA3OjA0IEFNClN1YmplY3Q6IFJlOiBbT0FVVEgtV0ddIEEgcXVlc3Rpb24gb24gdG9rZW4gcmV2b2NhdGlvbi4BMAEBAQE-
X-Mailer: YahooMailWebService/0.8.133.504
References: <CAJV9qO8UgLV6SdegZSk4KT3Qyb-M2KmPFPV9xDht_WjibeUWrg@mail.gmail.com> <OF2F22026A.D81D17E1-ON85257B0A.004EC66E-85257B0A.004EE884@us.ibm.com> <CAJV9qO9B-2eWK7Vss4XGspUhTU0S716Nh4acii5f9puJvmT7mQ@mail.gmail.com>
Message-ID: <1360163970.12201.YahooMailNeo@web31811.mail.mud.yahoo.com>
Date: Wed, 6 Feb 2013 07:19:30 -0800 (PST)
From: William Mills <wmills_92105@yahoo.com>
To: Prabath Siriwardena <prabath@wso2.com>, Todd W Lainhart <lainhart@us.ibm.com>
In-Reply-To: <CAJV9qO9B-2eWK7Vss4XGspUhTU0S716Nh4acii5f9puJvmT7mQ@mail.gmail.com>
MIME-Version: 1.0
Content-Type: multipart/alternative; boundary="764183289-1769135125-1360163970=:12201"
Cc: "oauth@ietf.org WG" <oauth@ietf.org>, "oauth-bounces@ietf.org" <oauth-bounces@ietf.org>
Subject: Re: [OAUTH-WG] A question on token revocation.
X-BeenThere: oauth@ietf.org
X-Mailman-Version: 2.1.12
Precedence: list
Reply-To: William Mills <wmills_92105@yahoo.com>
List-Id: OAUTH WG <oauth.ietf.org>
List-Unsubscribe: <https://www.ietf.org/mailman/options/oauth>, <mailto:oauth-request@ietf.org?subject=unsubscribe>
List-Archive: <http://www.ietf.org/mail-archive/web/oauth>
List-Post: <mailto:oauth@ietf.org>
List-Help: <mailto:oauth-request@ietf.org?subject=help>
List-Subscribe: <https://www.ietf.org/mailman/listinfo/oauth>, <mailto:oauth-request@ietf.org?subject=subscribe>
X-List-Received-Date: Wed, 06 Feb 2013 15:19:33 -0000

--764183289-1769135125-1360163970=:12201
Content-Type: text/plain; charset=iso-8859-1
Content-Transfer-Encoding: quoted-printable

+1=0A=0A=0A________________________________=0A From: Prabath Siriwardena <p=
rabath@wso2.com>=0ATo: Todd W Lainhart <lainhart@us.ibm.com> =0ACc: "oauth@=
ietf.org WG" <oauth@ietf.org>; oauth-bounces@ietf.org =0ASent: Wednesday, F=
ebruary 6, 2013 7:04 AM=0ASubject: Re: [OAUTH-WG] A question on token revoc=
ation.=0A =0A=0A=0A=0A=0AOn Wed, Feb 6, 2013 at 7:51 PM, Todd W Lainhart <l=
ainhart@us.ibm.com> wrote:=0A=0A> There can be cases=0Awhere resource owner=
 needs to revoke an authorized access token from a=0Agiven client.  =0A>=0A=
>Why wouldn't the RO go through the client=0Ato revoke the token?=0A>=0A=0A=
RO needs not to go through the client to revoke. Resource owner should have=
 the capability to revoke an acces token by client.=0A=0AThanks & regards,=
=0A-Prabath=0A=A0=0A =0A>=0A>=0A>=0A>=0A>Todd Lainhart=0A>Rational software=
=0A>IBM Corporation=0A>550 King Street, Littleton, MA 01460-1250=0A>1-978-8=
99-4705=0A>2-276-4705 (T/L)=0A>lainhart@us.ibm.com =0A>=0A>=0A>=0A>=0A>From=
: =A0 =A0 =A0=0A=A0Prabath Siriwardena=0A<prabath@wso2.com> =0A>To: =A0 =A0=
 =A0=0A=A0"oauth@ietf.org WG" <oauth@ietf.org>,  =0A>Date: =A0 =A0 =A0=0A=
=A002/06/2013 04:36 AM =0A>Subject: =A0 =A0=0A=A0 =A0[OAUTH-WG] A=0Aquestio=
n on token revocation. =0A>Sent by: =A0 =A0=0A=A0 =A0oauth-bounces@ietf.org=
 =0A>>________________________________=0A>=0A>=0A>=0A>=0A>I am sorry if thi=
s was already discussed in this list..=A0 =0A>=0A>Looking at [1] it only ta=
lks about revoking the access=0Atoken from the client. =0A>=0A>How about th=
e resource owner..? =0A>=0A>There can be cases where resource owner needs t=
o revoke=0Aan authorized access token from a given client. Or revoke an sco=
pe.. =0A>=0A>How are we going to address these requirements..? Thoughts=0Aa=
ppreciated... =0A>=0A>[1] http://tools.ietf.org/html/draft-ietf-oauth-revoc=
ation-04 =0A>=0A>-- =0A>Thanks & Regards,=0A>Prabath =0A>=0A>Mobile : +94 7=
1 809 6732=A0=0A>=0A>http://blog.facilelogin.com=0A>http://RampartFAQ.com__=
_____________________________________________=0A>OAuth mailing list=0A>OAut=
h@ietf.org=0A>https://www.ietf.org/mailman/listinfo/oauth=0A> =0A>=0A=0A=0A=
-- =0AThanks & Regards,=0APrabath=0A=0AMobile : +94 71 809 6732=A0=0A=0Ahtt=
p://blog.facilelogin.com=0Ahttp://RampartFAQ.com=0A________________________=
_______________________=0AOAuth mailing list=0AOAuth@ietf.org=0Ahttps://www=
.ietf.org/mailman/listinfo/oauth
--764183289-1769135125-1360163970=:12201
Content-Type: text/html; charset=iso-8859-1
Content-Transfer-Encoding: quoted-printable

<html><body><div style=3D"color:#000; background-color:#fff; font-family:Co=
urier New, courier, monaco, monospace, sans-serif;font-size:12pt"><div><spa=
n>+1</span></div><div><br></div>  <div style=3D"font-family: 'Courier New',=
 courier, monaco, monospace, sans-serif; font-size: 12pt;"> <div style=3D"f=
ont-family: 'times new roman', 'new york', times, serif; font-size: 12pt;">=
 <div dir=3D"ltr"> <font size=3D"2" face=3D"Arial"> <hr size=3D"1">  <b><sp=
an style=3D"font-weight:bold;">From:</span></b> Prabath Siriwardena &lt;pra=
bath@wso2.com&gt;<br> <b><span style=3D"font-weight: bold;">To:</span></b> =
Todd W Lainhart &lt;lainhart@us.ibm.com&gt; <br><b><span style=3D"font-weig=
ht: bold;">Cc:</span></b> "oauth@ietf.org WG" &lt;oauth@ietf.org&gt;; oauth=
-bounces@ietf.org <br> <b><span style=3D"font-weight: bold;">Sent:</span></=
b> Wednesday, February 6, 2013 7:04 AM<br> <b><span style=3D"font-weight: b=
old;">Subject:</span></b> Re: [OAUTH-WG] A question on token revocation.<br=
> </font> </div>
 <br>=0A<div id=3D"yiv2079673834"><br><br><div class=3D"yiv2079673834gmail_=
quote">On Wed, Feb 6, 2013 at 7:51 PM, Todd W Lainhart <span dir=3D"ltr">&l=
t;<a rel=3D"nofollow" ymailto=3D"mailto:lainhart@us.ibm.com" target=3D"_bla=
nk" href=3D"mailto:lainhart@us.ibm.com">lainhart@us.ibm.com</a>&gt;</span> =
wrote:<br><blockquote class=3D"yiv2079673834gmail_quote" style=3D"margin:0 =
0 0 .8ex;border-left:1px #ccc solid;padding-left:1ex;">=0A<div class=3D"yiv=
2079673834im"><font face=3D"sans-serif">&gt; </font><font size=3D"3">There =
can be cases=0Awhere resource owner needs to revoke an authorized access to=
ken from a=0Agiven client. </font>=0A<br>=0A<br></div><font face=3D"sans-se=
rif">Why wouldn't the RO go through the client=0Ato revoke the token?<br></=
font></blockquote><div><br></div><div>RO needs not to go through the client=
 to revoke. Resource owner should have the capability to revoke an acces to=
ken by client.</div><div><br></div><div>Thanks &amp; regards,</div>=0A<div>=
-Prabath</div><div>&nbsp;</div><blockquote class=3D"yiv2079673834gmail_quot=
e" style=3D"margin:0 0 0 .8ex;border-left:1px #ccc solid;padding-left:1ex;"=
><font face=3D"sans-serif">=0A</font>=0A<br>=0A<table width=3D"223" style=
=3D"border-collapse:collapse;">=0A<tbody><tr height=3D"8">=0A<td width=3D"2=
23" bgcolor=3D"white" style=3D"border-style:solid;border-color:#000000;bord=
er-width:0px 0px 0px 0px;padding:0px 0px;"><font size=3D"1" face=3D"Verdana=
"><b><br>=0A<br>=0A<br>=0ATodd Lainhart<br>=0ARational software<br>=0AIBM C=
orporation<br>=0A550 King Street, Littleton, MA 01460-1250</b></font><font =
size=3D"1" face=3D"Arial"><b><br>=0A1-978-899-4705<br>=0A2-276-4705 (T/L)<b=
r>=0A<a rel=3D"nofollow" ymailto=3D"mailto:lainhart@us.ibm.com" target=3D"_=
blank" href=3D"mailto:lainhart@us.ibm.com">lainhart@us.ibm.com</a></b></fon=
t></td></tr></tbody></table>=0A<br>=0A<br>=0A<br>=0A<br>=0A<br><font size=
=3D"1" color=3D"#5f5f5f" face=3D"sans-serif">From: &nbsp; &nbsp; &nbsp;=0A&=
nbsp;</font><font size=3D"1" face=3D"sans-serif">Prabath Siriwardena=0A&lt;=
<a rel=3D"nofollow" ymailto=3D"mailto:prabath@wso2.com" target=3D"_blank" h=
ref=3D"mailto:prabath@wso2.com">prabath@wso2.com</a>&gt;</font>=0A<br><font=
 size=3D"1" color=3D"#5f5f5f" face=3D"sans-serif">To: &nbsp; &nbsp; &nbsp;=
=0A&nbsp;</font><font size=3D"1" face=3D"sans-serif">"<a rel=3D"nofollow" y=
mailto=3D"mailto:oauth@ietf.org" target=3D"_blank" href=3D"mailto:oauth@iet=
f.org">oauth@ietf.org</a>=0AWG" &lt;<a rel=3D"nofollow" ymailto=3D"mailto:o=
auth@ietf.org" target=3D"_blank" href=3D"mailto:oauth@ietf.org">oauth@ietf.=
org</a>&gt;, </font>=0A<br><font size=3D"1" color=3D"#5f5f5f" face=3D"sans-=
serif">Date: &nbsp; &nbsp; &nbsp;=0A&nbsp;</font><font size=3D"1" face=3D"s=
ans-serif">02/06/2013 04:36 AM</font>=0A<br><font size=3D"1" color=3D"#5f5f=
5f" face=3D"sans-serif">Subject: &nbsp; &nbsp;=0A&nbsp; &nbsp;</font><font =
size=3D"1" face=3D"sans-serif">[OAUTH-WG] A=0Aquestion on token revocation.=
</font>=0A<br><font size=3D"1" color=3D"#5f5f5f" face=3D"sans-serif">Sent b=
y: &nbsp; &nbsp;=0A&nbsp; &nbsp;</font><font size=3D"1" face=3D"sans-serif"=
><a rel=3D"nofollow" ymailto=3D"mailto:oauth-bounces@ietf.org" target=3D"_b=
lank" href=3D"mailto:oauth-bounces@ietf.org">oauth-bounces@ietf.org</a></fo=
nt>=0A<br>=0A<hr noshade=3D""><div><div class=3D"yiv2079673834h5">=0A<br>=
=0A<br>=0A<br><font size=3D"3">I am sorry if this was already discussed in =
this list..&nbsp;</font>=0A<br>=0A<br><font size=3D"3">Looking at [1] it on=
ly talks about revoking the access=0Atoken from the client.</font>=0A<br>=
=0A<br><font size=3D"3">How about the resource owner..?</font>=0A<br>=0A<br=
><font size=3D"3">There can be cases where resource owner needs to revoke=
=0Aan authorized access token from a given client. Or revoke an scope..</fo=
nt>=0A<br>=0A<br><font size=3D"3">How are we going to address these require=
ments..? Thoughts=0Aappreciated...</font>=0A<br>=0A<br><font size=3D"3">[1]=
 </font><a rel=3D"nofollow" target=3D"_blank" href=3D"http://tools.ietf.org=
/html/draft-ietf-oauth-revocation-04"><font size=3D"3" color=3D"blue"><u>ht=
tp://tools.ietf.org/html/draft-ietf-oauth-revocation-04</u></font></a>=0A<b=
r>=0A<br><font size=3D"3">-- <br>=0AThanks &amp; Regards,<br>=0APrabath</fo=
nt>=0A<br>=0A<br><font size=3D"3">Mobile : <a rel=3D"nofollow" href=3D"">+9=
4 71 809 6732</a>&nbsp;<br>=0A</font><font size=3D"3" color=3D"blue"><u><br=
>=0A</u></font><a rel=3D"nofollow" target=3D"_blank" href=3D"http://blog.fa=
cilelogin.com/"><font size=3D"3" color=3D"blue"><u>http://blog.facilelogin.=
com</u></font></a><font size=3D"3" color=3D"blue"><u><br>=0A</u></font></di=
v></div><a rel=3D"nofollow" target=3D"_blank" href=3D"http://rampartfaq.com=
/"><font size=3D"3" color=3D"blue"><u>http://RampartFAQ.com</u></font></a><=
tt><font>_______________________________________________<br>=0AOAuth mailin=
g list<br>=0A<a rel=3D"nofollow" ymailto=3D"mailto:OAuth@ietf.org" target=
=3D"_blank" href=3D"mailto:OAuth@ietf.org">OAuth@ietf.org</a><br>=0A</font>=
</tt><a rel=3D"nofollow" target=3D"_blank" href=3D"https://www.ietf.org/mai=
lman/listinfo/oauth"><tt><font>https://www.ietf.org/mailman/listinfo/oauth<=
/font></tt></a><tt><font><br>=0A</font></tt>=0A<br></blockquote></div><br><=
br clear=3D"all"><div><br></div>-- <br>Thanks &amp; Regards,<br>Prabath<div=
><br></div><div>Mobile : +94 71 809 6732&nbsp;<br><br><a rel=3D"nofollow" t=
arget=3D"_blank" href=3D"http://blog.facilelogin.com/">http://blog.facilelo=
gin.com</a><br>=0Ahttp://RampartFAQ.com</div>=0A</div><br>_________________=
______________________________<br>OAuth mailing list<br><a ymailto=3D"mailt=
o:OAuth@ietf.org" href=3D"mailto:OAuth@ietf.org">OAuth@ietf.org</a><br><a h=
ref=3D"https://www.ietf.org/mailman/listinfo/oauth" target=3D"_blank">https=
://www.ietf.org/mailman/listinfo/oauth</a><br><br><br> </div> </div>  </div=
></body></html>
--764183289-1769135125-1360163970=:12201--

From jricher@mitre.org  Wed Feb  6 07:19:45 2013
Return-Path: <jricher@mitre.org>
X-Original-To: oauth@ietfa.amsl.com
Delivered-To: oauth@ietfa.amsl.com
Received: from localhost (localhost [127.0.0.1]) by ietfa.amsl.com (Postfix) with ESMTP id B01DF21F892B for <oauth@ietfa.amsl.com>; Wed,  6 Feb 2013 07:19:45 -0800 (PST)
X-Virus-Scanned: amavisd-new at amsl.com
X-Spam-Flag: NO
X-Spam-Score: -6.572
X-Spam-Level: 
X-Spam-Status: No, score=-6.572 tagged_above=-999 required=5 tests=[AWL=0.026,  BAYES_00=-2.599, HTML_MESSAGE=0.001, RCVD_IN_DNSWL_MED=-4]
Received: from mail.ietf.org ([64.170.98.30]) by localhost (ietfa.amsl.com [127.0.0.1]) (amavisd-new, port 10024) with ESMTP id a33bNESq1fvJ for <oauth@ietfa.amsl.com>; Wed,  6 Feb 2013 07:19:44 -0800 (PST)
Received: from smtpksrv1.mitre.org (smtpksrv1.mitre.org [198.49.146.77]) by ietfa.amsl.com (Postfix) with ESMTP id 856A021F88E6 for <oauth@ietf.org>; Wed,  6 Feb 2013 07:19:44 -0800 (PST)
Received: from smtpksrv1.mitre.org (localhost.localdomain [127.0.0.1]) by localhost (Postfix) with SMTP id 1517C451000D; Wed,  6 Feb 2013 10:19:44 -0500 (EST)
Received: from IMCCAS03.MITRE.ORG (imccas03.mitre.org [129.83.29.80]) by smtpksrv1.mitre.org (Postfix) with ESMTP id ECD2D1F2CA5; Wed,  6 Feb 2013 10:19:43 -0500 (EST)
Received: from [10.146.15.29] (129.83.31.58) by IMCCAS03.MITRE.ORG (129.83.29.80) with Microsoft SMTP Server (TLS) id 14.2.318.4; Wed, 6 Feb 2013 10:19:43 -0500
Message-ID: <5112746B.70403@mitre.org>
Date: Wed, 6 Feb 2013 10:19:07 -0500
From: Justin Richer <jricher@mitre.org>
User-Agent: Mozilla/5.0 (X11; Linux i686; rv:17.0) Gecko/20130106 Thunderbird/17.0.2
MIME-Version: 1.0
To: Prabath Siriwardena <prabath@wso2.com>
References: <CAJV9qO8UgLV6SdegZSk4KT3Qyb-M2KmPFPV9xDht_WjibeUWrg@mail.gmail.com> <51126D65.2090707@mitre.org> <CAJV9qO-ZNVcbzNvb---CmXv+vo0jZHKQaDon8OqrPJCfAXKTRQ@mail.gmail.com>
In-Reply-To: <CAJV9qO-ZNVcbzNvb---CmXv+vo0jZHKQaDon8OqrPJCfAXKTRQ@mail.gmail.com>
Content-Type: multipart/alternative; boundary="------------050909000801090906040907"
X-Originating-IP: [129.83.31.58]
Cc: "oauth@ietf.org WG" <oauth@ietf.org>
Subject: Re: [OAUTH-WG] A question on token revocation.
X-BeenThere: oauth@ietf.org
X-Mailman-Version: 2.1.12
Precedence: list
List-Id: OAUTH WG <oauth.ietf.org>
List-Unsubscribe: <https://www.ietf.org/mailman/options/oauth>, <mailto:oauth-request@ietf.org?subject=unsubscribe>
List-Archive: <http://www.ietf.org/mail-archive/web/oauth>
List-Post: <mailto:oauth@ietf.org>
List-Help: <mailto:oauth-request@ietf.org?subject=help>
List-Subscribe: <https://www.ietf.org/mailman/listinfo/oauth>, <mailto:oauth-request@ietf.org?subject=subscribe>
X-List-Received-Date: Wed, 06 Feb 2013 15:19:45 -0000

--------------050909000801090906040907
Content-Type: text/plain; charset="ISO-8859-1"; format=flowed
Content-Transfer-Encoding: 7bit


On 02/06/2013 10:13 AM, Prabath Siriwardena wrote:
>
>
> On Wed, Feb 6, 2013 at 8:19 PM, Justin Richer <jricher@mitre.org 
> <mailto:jricher@mitre.org>> wrote:
>
>     These are generally handled through a user interface where the RO
>     is authenticated directly to the AS, and there's not much need for
>     a "protocol" here, in practice.
>
>
> Why do you think leaving access token revocation by RO to a 
> proprietary API is a good practice ? IMO this an essential requirement 
> in API security.
I think it makes more sense in the same way that having a "proprietary" 
UI/API for managing the user consent makes sense: unless you're doing a 
fully dynamic end-to-end system like UMA, then there's not much value in 
trying to squeeze disparate systems into the same mold, since they won't 
be talking to each other anyway.

And since you refer to it as an "API", what will the RO be using to call 
this API? Is there a token management client that's separate from the 
OAuth client?

>
> IMHO token revocation done my RO is more practical than token 
> revocation done by the Client.
They're both valid but require different kinds of protocols and 
considerations. This token revocation draft is meant to solve one 
problem, and that doesn't mean it can or should solve other seemingly 
related problems.

If you would like to see the RO-initiated token revocation go through 
(not grant revocation, mind you -- that's related, but different), then 
I would suggest that you start specifying exactly how that works. I 
predict it will be problematic in practice, though, as the RO often 
doesn't actually have direct access to the token itself.

>     There are larger applications, like UMA, that have client and PR
>     provisioning that would allow for this to be managed somewhat
>     programmatically, but even in that case you're still generally
>     doing token revocation by a "client" in some fashion. In UMA,
>     though, several different pieces can play the role of a "client"
>     at different parts of the process.
>
>     Revoking a scope is a whole different mess. Generally, you'd want
>     to just revoke an existing token and make a new authorization
>     grant with lower access if you don't want that client getting that
>     scope anymore. If you just want to downscope for a single
>     transaction, you can already do that with either the refresh token
>     or token chaining approaches, depending on where in the process
>     you are. The latter of these are both client-focused, though, and
>     the RO doesn't have a direct hand in it at this point.
>
>
> Why do you think it a mess. If you revoke the entire token then Client 
> needs to go through the complete OAuth flow - and also needs to get 
> the user consent. If RO can  downgrade the scope, then we restrict API 
> access by the client at RS end and its transparent to the client.
>

Downgrading the scope of tokens in the wild is hardly transparent to the 
client (stuff that it expects to work will suddenly start to fail, 
meaning that most clients will throw out the token and try to get a new 
one), and in a distributed system you've got to propagate that change to 
the RS. If you bake the scopes into the token itself (which many do) 
then you actually *can't* downgrade a single token, anyway.

  -- Justin

> Thanks & regards,
> -Prabath
>
>
>
>      -- Justin
>
>
>     On 02/06/2013 04:35 AM, Prabath Siriwardena wrote:
>>     I am sorry if this was already discussed in this list..
>>
>>     Looking at [1] it only talks about revoking the access token from
>>     the client.
>>
>>     How about the resource owner..?
>>
>>     There can be cases where resource owner needs to revoke an
>>     authorized access token from a given client. Or revoke an scope..
>>
>>     How are we going to address these requirements..? Thoughts
>>     appreciated...
>>
>>     [1] http://tools.ietf.org/html/draft-ietf-oauth-revocation-04
>>
>>     -- 
>>     Thanks & Regards,
>>     Prabath
>>
>>     Mobile : +94 71 809 6732 <tel:%2B94%2071%20809%206732>
>>
>>     http://blog.facilelogin.com
>>     http://RampartFAQ.com
>>
>>
>>     _______________________________________________
>>     OAuth mailing list
>>     OAuth@ietf.org  <mailto:OAuth@ietf.org>
>>     https://www.ietf.org/mailman/listinfo/oauth
>
>
>
>
> -- 
> Thanks & Regards,
> Prabath
>
> Mobile : +94 71 809 6732
>
> http://blog.facilelogin.com
> http://RampartFAQ.com


--------------050909000801090906040907
Content-Type: text/html; charset="ISO-8859-1"
Content-Transfer-Encoding: 7bit

<html>
  <head>
    <meta content="text/html; charset=ISO-8859-1"
      http-equiv="Content-Type">
  </head>
  <body bgcolor="#FFFFFF" text="#000000">
    <br>
    <div class="moz-cite-prefix">On 02/06/2013 10:13 AM, Prabath
      Siriwardena wrote:<br>
    </div>
    <blockquote
cite="mid:CAJV9qO-ZNVcbzNvb---CmXv+vo0jZHKQaDon8OqrPJCfAXKTRQ@mail.gmail.com"
      type="cite">
      <meta http-equiv="Content-Type" content="text/html;
        charset=ISO-8859-1">
      <br>
      <br>
      <div class="gmail_quote">On Wed, Feb 6, 2013 at 8:19 PM, Justin
        Richer <span dir="ltr">&lt;<a moz-do-not-send="true"
            href="mailto:jricher@mitre.org" target="_blank">jricher@mitre.org</a>&gt;</span>
        wrote:<br>
        <blockquote class="gmail_quote" style="margin:0 0 0
          .8ex;border-left:1px #ccc solid;padding-left:1ex">
          <div bgcolor="#FFFFFF" text="#000000"> These are generally
            handled through a user interface where the RO is
            authenticated directly to the AS, and there's not much need
            for a "protocol" here, in practice. </div>
        </blockquote>
        <div><br>
        </div>
        <div>Why do you think leaving access token revocation by RO to a
          proprietary API is a good practice ? IMO this an essential
          requirement in API security.</div>
      </div>
    </blockquote>
    I think it makes more sense in the same way that having a
    "proprietary" UI/API for managing the user consent makes sense:
    unless you're doing a fully dynamic end-to-end system like UMA, then
    there's not much value in trying to squeeze disparate systems into
    the same mold, since they won't be talking to each other anyway. <br>
    <br>
    And since you refer to it as an "API", what will the RO be using to
    call this API? Is there a token management client that's separate
    from the OAuth client? <br>
    <br>
    <blockquote
cite="mid:CAJV9qO-ZNVcbzNvb---CmXv+vo0jZHKQaDon8OqrPJCfAXKTRQ@mail.gmail.com"
      type="cite">
      <div class="gmail_quote">
        <div><br>
        </div>
        <div>IMHO token revocation done my RO is more practical than
          token revocation done by the Client.</div>
      </div>
    </blockquote>
    They're both valid but require different kinds of protocols and
    considerations. This token revocation draft is meant to solve one
    problem, and that doesn't mean it can or should solve other
    seemingly related problems.<br>
    <br>
    If you would like to see the RO-initiated token revocation go
    through (not grant revocation, mind you -- that's related, but
    different), then I would suggest that you start specifying exactly
    how that works. I predict it will be problematic in practice,
    though, as the RO often doesn't actually have direct access to the
    token itself. <br>
    <br>
    <blockquote
cite="mid:CAJV9qO-ZNVcbzNvb---CmXv+vo0jZHKQaDon8OqrPJCfAXKTRQ@mail.gmail.com"
      type="cite">
      <div class="gmail_quote">
        <div>&nbsp;</div>
        <blockquote class="gmail_quote" style="margin:0 0 0
          .8ex;border-left:1px #ccc solid;padding-left:1ex">
          <div bgcolor="#FFFFFF" text="#000000">There are larger
            applications, like UMA, that have client and PR provisioning
            that would allow for this to be managed somewhat
            programmatically, but even in that case you're still
            generally doing token revocation by a "client" in some
            fashion. In UMA, though, several different pieces can play
            the role of a "client" at different parts of the process.<br>
            <br>
            Revoking a scope is a whole different mess. Generally, you'd
            want to just revoke an existing token and make a new
            authorization grant with lower access if you don't want that
            client getting that scope anymore. If you just want to
            downscope for a single transaction, you can already do that
            with either the refresh token or token chaining approaches,
            depending on where in the process you are. The latter of
            these are both client-focused, though, and the RO doesn't
            have a direct hand in it at this point.</div>
        </blockquote>
        <div><br>
        </div>
        <div>Why do you think it a mess. If you revoke the entire token
          then Client needs to go through the complete OAuth flow - and
          also needs to get the user consent. If RO can &nbsp;downgrade the
          scope, then we restrict API access by the client at RS end and
          its transparent to the client.</div>
        <div><br>
        </div>
      </div>
    </blockquote>
    <br>
    Downgrading the scope of tokens in the wild is hardly transparent to
    the client (stuff that it expects to work will suddenly start to
    fail, meaning that most clients will throw out the token and try to
    get a new one), and in a distributed system you've got to propagate
    that change to the RS. If you bake the scopes into the token itself
    (which many do) then you actually *can't* downgrade a single token,
    anyway. <br>
    <br>
    &nbsp;-- Justin<br>
    <br>
    <blockquote
cite="mid:CAJV9qO-ZNVcbzNvb---CmXv+vo0jZHKQaDon8OqrPJCfAXKTRQ@mail.gmail.com"
      type="cite">
      <div class="gmail_quote">
        <div>Thanks &amp; regards,</div>
        <div>-Prabath</div>
        <div>&nbsp;</div>
        <blockquote class="gmail_quote" style="margin:0 0 0
          .8ex;border-left:1px #ccc solid;padding-left:1ex">
          <div bgcolor="#FFFFFF" text="#000000"><span class="HOEnZb"><font
                color="#888888"><br>
                <br>
                &nbsp;-- Justin</font></span>
            <div>
              <div class="h5"><br>
                <br>
                <div>On 02/06/2013 04:35 AM, Prabath Siriwardena wrote:<br>
                </div>
              </div>
            </div>
            <blockquote type="cite">
              <div>
                <div class="h5">
                  <div>I am sorry if this was already discussed in this
                    list..&nbsp;</div>
                  <div><br>
                  </div>
                  <div>Looking at [1] it only talks about revoking the
                    access token from the client.</div>
                  <div><br>
                  </div>
                  <div>How about the resource owner..?</div>
                  <div><br>
                  </div>
                  <div>There can be cases where resource owner needs to
                    revoke an authorized access token from a given
                    client. Or revoke an scope..</div>
                  <div><br>
                  </div>
                  <div>How are we going to address these requirements..?
                    Thoughts appreciated...</div>
                  <div><br>
                  </div>
                  [1] <a moz-do-not-send="true"
                    href="http://tools.ietf.org/html/draft-ietf-oauth-revocation-04"
                    target="_blank">http://tools.ietf.org/html/draft-ietf-oauth-revocation-04</a><br
                    clear="all">
                  <div><br>
                  </div>
                  -- <br>
                  Thanks &amp; Regards,<br>
                  Prabath
                  <div> <br>
                  </div>
                  <div>Mobile : <a moz-do-not-send="true"
                      href="tel:%2B94%2071%20809%206732"
                      value="+94718096732" target="_blank">+94 71 809
                      6732</a>&nbsp;<br>
                    <br>
                    <a moz-do-not-send="true"
                      href="http://blog.facilelogin.com" target="_blank">http://blog.facilelogin.com</a><br>
                    <a moz-do-not-send="true"
                      href="http://RampartFAQ.com" target="_blank">http://RampartFAQ.com</a></div>
                  <br>
                  <fieldset></fieldset>
                  <br>
                </div>
              </div>
              <div class="im">
                <pre>_______________________________________________
OAuth mailing list
<a moz-do-not-send="true" href="mailto:OAuth@ietf.org" target="_blank">OAuth@ietf.org</a>
<a moz-do-not-send="true" href="https://www.ietf.org/mailman/listinfo/oauth" target="_blank">https://www.ietf.org/mailman/listinfo/oauth</a>
</pre>
              </div>
            </blockquote>
            <br>
          </div>
        </blockquote>
      </div>
      <br>
      <br clear="all">
      <div><br>
      </div>
      -- <br>
      Thanks &amp; Regards,<br>
      Prabath
      <div><br>
      </div>
      <div>Mobile : +94 71 809 6732&nbsp;<br>
        <br>
        <a moz-do-not-send="true" href="http://blog.facilelogin.com"
          target="_blank">http://blog.facilelogin.com</a><br>
        <a moz-do-not-send="true" href="http://RampartFAQ.com"
          target="_blank">http://RampartFAQ.com</a></div>
    </blockquote>
    <br>
  </body>
</html>

--------------050909000801090906040907--

From tonynad@microsoft.com  Wed Feb  6 07:21:03 2013
Return-Path: <tonynad@microsoft.com>
X-Original-To: oauth@ietfa.amsl.com
Delivered-To: oauth@ietfa.amsl.com
Received: from localhost (localhost [127.0.0.1]) by ietfa.amsl.com (Postfix) with ESMTP id 3C72921F8A04 for <oauth@ietfa.amsl.com>; Wed,  6 Feb 2013 07:21:03 -0800 (PST)
X-Virus-Scanned: amavisd-new at amsl.com
X-Spam-Flag: NO
X-Spam-Score: 0.534
X-Spam-Level: 
X-Spam-Status: No, score=0.534 tagged_above=-999 required=5 tests=[BAYES_00=-2.599, HTML_MESSAGE=0.001, UNRESOLVED_TEMPLATE=3.132]
Received: from mail.ietf.org ([64.170.98.30]) by localhost (ietfa.amsl.com [127.0.0.1]) (amavisd-new, port 10024) with ESMTP id Qk9q4d9meFH7 for <oauth@ietfa.amsl.com>; Wed,  6 Feb 2013 07:21:02 -0800 (PST)
Received: from na01-bl2-obe.outbound.protection.outlook.com (na01-bl2-obe.ptr.protection.outlook.com [65.55.169.27]) by ietfa.amsl.com (Postfix) with ESMTP id 59D6221F8566 for <oauth@ietf.org>; Wed,  6 Feb 2013 07:21:01 -0800 (PST)
Received: from BY2FFO11FD003.protection.gbl (10.1.15.202) by BY2FFO11HUB023.protection.gbl (10.1.14.110) with Microsoft SMTP Server (TLS) id 15.0.609.9; Wed, 6 Feb 2013 15:20:52 +0000
Received: from TK5EX14HUBC103.redmond.corp.microsoft.com (131.107.125.37) by BY2FFO11FD003.mail.protection.outlook.com (10.1.14.125) with Microsoft SMTP Server (TLS) id 15.0.609.9 via Frontend Transport; Wed, 6 Feb 2013 15:20:51 +0000
Received: from va3outboundpool.messaging.microsoft.com (157.54.51.81) by mail.microsoft.com (157.54.86.9) with Microsoft SMTP Server (TLS) id 14.2.318.3; Wed, 6 Feb 2013 15:20:20 +0000
Received: from mail54-va3-R.bigfish.com (10.7.14.241) by VA3EHSOBE003.bigfish.com (10.7.40.23) with Microsoft SMTP Server id 14.1.225.23; Wed, 6 Feb 2013 15:20:19 +0000
Received: from mail54-va3 (localhost [127.0.0.1])	by mail54-va3-R.bigfish.com (Postfix) with ESMTP id 1C2E94A0245	for <oauth@ietf.org.FOPE.CONNECTOR.OVERRIDE>; Wed,  6 Feb 2013 15:20:19 +0000 (UTC)
X-Forefront-Antispam-Report-Untrusted: CIP:157.56.240.21; KIP:(null); UIP:(null); (null); H:BL2PRD0310HT003.namprd03.prod.outlook.com; R:internal; EFV:INT
X-SpamScore: -20
X-BigFish: PS-20(zzbb2dI98dI9371Ic89bh1432I1418Ic857hzz1ee6h1de0h1202h1e76h1d1ah1d2ah1082kzz1033IL17326ah8275bh8275dh18c673hz31h2a8h668h839hd24hf0ah1288h12a5h12bdh137ah1441h1504h1537h153bh162dh1631h1758h18e1h1946h19b5h9a9j1155h)
Received-SPF: softfail (mail54-va3: transitioning domain of microsoft.com does not designate 157.56.240.21 as permitted sender) client-ip=157.56.240.21; envelope-from=tonynad@microsoft.com; helo=BL2PRD0310HT003.namprd03.prod.outlook.com ;.outlook.com ;
X-Forefront-Antispam-Report-Untrusted: SFV:SKI; SFS:; DIR:OUT; SFP:; SCL:-1; SRVR:BLUPR03MB036; H:BLUPR03MB035.namprd03.prod.outlook.com; LANG:en; 
Received: from mail54-va3 (localhost.localdomain [127.0.0.1]) by mail54-va3 (MessageSwitch) id 1360164011630956_3765; Wed,  6 Feb 2013 15:20:11 +0000 (UTC)
Received: from VA3EHSMHS027.bigfish.com (unknown [10.7.14.235])	by mail54-va3.bigfish.com (Postfix) with ESMTP id 9134D8069A; Wed,  6 Feb 2013 15:20:11 +0000 (UTC)
Received: from BL2PRD0310HT003.namprd03.prod.outlook.com (157.56.240.21) by VA3EHSMHS027.bigfish.com (10.7.99.37) with Microsoft SMTP Server (TLS) id 14.1.225.23; Wed, 6 Feb 2013 15:20:09 +0000
Received: from BLUPR03MB036.namprd03.prod.outlook.com (10.255.209.148) by BL2PRD0310HT003.namprd03.prod.outlook.com (10.255.97.38) with Microsoft SMTP Server (TLS) id 14.16.263.1; Wed, 6 Feb 2013 15:20:08 +0000
Received: from BLUPR03MB035.namprd03.prod.outlook.com (10.255.209.147) by BLUPR03MB036.namprd03.prod.outlook.com (10.255.209.148) with Microsoft SMTP Server (TLS) id 15.0.614.5; Wed, 6 Feb 2013 15:20:07 +0000
Received: from BLUPR03MB035.namprd03.prod.outlook.com ([169.254.1.43]) by BLUPR03MB035.namprd03.prod.outlook.com ([169.254.1.43]) with mapi id 15.00.0614.003; Wed, 6 Feb 2013 15:20:01 +0000
From: Anthony Nadalin <tonynad@microsoft.com>
To: Hannes Tschofenig <hannes.tschofenig@gmx.net>, Justin Richer <jricher@mitre.org>
Thread-Topic: [OAUTH-WG] How soon until last call on introspection and revocation
Thread-Index: AQHOBH1uQnGxeW7vfEueX6bNKilo1g==
Date: Wed, 6 Feb 2013 15:20:01 +0000
Message-ID: <c78f5209366f4a73b11dcdf37aa36900@BLUPR03MB035.namprd03.prod.outlook.com>
Accept-Language: en-US
Content-Language: en-US
X-MS-Has-Attach: 
X-MS-TNEF-Correlator: 
x-originating-ip: [96.8.44.21]
Content-Type: multipart/alternative; boundary="_000_c78f5209366f4a73b11dcdf37aa36900BLUPR03MB035namprd03pro_"
MIME-Version: 1.0
X-OrganizationHeadersPreserved: BLUPR03MB036.namprd03.prod.outlook.com
X-FOPE-CONNECTOR: Id%0$Dn%*$RO%0$TLS%0$FQDN%$TlsDn%
X-FOPE-CONNECTOR: Id%59$Dn%IETF.ORG$RO%2$TLS%6$FQDN%corpf5vips-237160.customer.frontbridge.com$TlsDn%
X-FOPE-CONNECTOR: Id%59$Dn%MITRE.ORG$RO%2$TLS%6$FQDN%corpf5vips-237160.customer.frontbridge.com$TlsDn%
X-FOPE-CONNECTOR: Id%59$Dn%GMX.NET$RO%2$TLS%6$FQDN%corpf5vips-237160.customer.frontbridge.com$TlsDn%
X-CrossPremisesHeadersPromoted: TK5EX14HUBC103.redmond.corp.microsoft.com
X-CrossPremisesHeadersFiltered: TK5EX14HUBC103.redmond.corp.microsoft.com
X-Forefront-Antispam-Report: CIP:131.107.125.37; CTRY:US; IPV:CAL; IPV:NLI; EFV:NLI; SFV:NSPM; SFS:(189002)(199002)(47446002)(63696002)(53806001)(20776003)(77982001)(56776001)(56816002)(54356001)(74662001)(33646001)(59766001)(16676001)(44976002)(49866001)(79102001)(31966008)(76482001)(50986001)(74502001)(47736001)(4396001)(51856001)(6806001)(512874001)(47976001)(54316002)(5343635001)(46102001)(65816001)(42262001)(24736002); DIR:OUT; SFP:; SCL:1; SRVR:BY2FFO11HUB023; H:TK5EX14HUBC103.redmond.corp.microsoft.com; RD:InfoDomainNonexistent; MX:1; A:1; LANG:en; 
X-OriginatorOrg: microsoft.onmicrosoft.com
X-Forefront-PRVS: 0749DC2CE6
Cc: IETF oauth WG <oauth@ietf.org>
Subject: Re: [OAUTH-WG] How soon until last call on introspection and	revocation
X-BeenThere: oauth@ietf.org
X-Mailman-Version: 2.1.12
Precedence: list
List-Id: OAUTH WG <oauth.ietf.org>
List-Unsubscribe: <https://www.ietf.org/mailman/options/oauth>, <mailto:oauth-request@ietf.org?subject=unsubscribe>
List-Archive: <http://www.ietf.org/mail-archive/web/oauth>
List-Post: <mailto:oauth@ietf.org>
List-Help: <mailto:oauth-request@ietf.org?subject=help>
List-Subscribe: <https://www.ietf.org/mailman/listinfo/oauth>, <mailto:oauth-request@ietf.org?subject=subscribe>
X-List-Received-Date: Wed, 06 Feb 2013 15:21:03 -0000

--_000_c78f5209366f4a73b11dcdf37aa36900BLUPR03MB035namprd03pro_
Content-Type: text/plain; charset="utf-8"
Content-Transfer-Encoding: base64

SSB0aGluayB0aGF0IHRoZXJlIGFyZSBzdGlsbCBmdW5kYW1lbnRhbCBkZXNpZ24gZGlzYWdyZWVt
ZW50cyB0aGF0IHdvdWxkIG5lZWQgdG8gYmUgcmVzb2x2ZWQuDQoNClNlbnQgZnJvbSBXaW5kb3dz
IE1haWwNCg0KRnJvbTogSnVzdGluIFJpY2hlcg0KU2VudDog4oCORmVicnVhcnnigI4g4oCONuKA
jiwg4oCOMjAxMyDigI424oCOOuKAjjU34oCOIOKAjkFNDQpUbzogSGFubmVzIFRzY2hvZmVuaWcN
CkNDOiBJRVRGIG9hdXRoIFdHDQpTdWJqZWN0OiBSZTogW09BVVRILVdHXSBIb3cgc29vbiB1bnRp
bCBsYXN0IGNhbGwgb24gaW50cm9zcGVjdGlvbiBhbmQgcmV2b2NhdGlvbg0KDQpBcyBlZGl0b3Ig
b2YgaW50cm9zcGVjdGlvbiBkcmFmdCwgSSB3b3VsZCBsaWtlIHRvIHNlZSBpdCBiZWNvbWUgYQ0K
d29ya2luZyBncm91cCBpdGVtLiBBZnRlciB0YWxraW5nIHdpdGggdGhlIGNoYWlycywgdGhlcmUg
YXBwZWFycyB0byBiZQ0Kc29tZSBmcmljdGlvbiB3aXRoIHRoZSBhbW91bnQgb2Ygb3BlbiB3b3Jr
aW5nIGl0ZW1zIHRoYXQgdGhlIHdvcmtpbmcNCmdyb3VwIGhhcyByaWdodCBub3csIHRob3VnaCwg
bGVhZGluZyB0byBoZXNpdGF0aW9uIHRvIGFkZCBtb3JlIHRvIG91cg0Kb2ZmaWNpYWwgcGxhdGUu
DQoNClRoYXQgc2FpZCwgaXQgZG9lc24ndCBtZWFuIHdlIGNhbid0IGFsbCBqdXN0ICp3b3JrKiBv
biBpdCwgYW5kIEknbQ0KYWN0aXZlbHkgZWRpdGluZyBpdCBiYXNlZCBvbiBmZWVkYmFjay4gV2Un
cmUgaW1wbGVtZW50aW5nIGFuZCBkZXBsb3lpbmcNCml0IGluIG91ciBvd24gc3lzdGVtcyByaWdo
dCBub3csIHRvby4gSSdtIHRyYWNraW5nIGlzc3VlcyB0byB0aGUgZHJhZnQNCmhlcmUgaWYgeW91
IGhhdmUgYW55IGRpcmVjdCBjaGFuZ2VzIChvciBwdWxsIHJlcXVlc3RzISk6DQoNCiAgIGh0dHBz
Oi8vZ2l0aHViLmNvbS9qcmljaGVyL29hdXRoLXNwZWMvaXNzdWVzDQoNClNvIEkgaG9wZSB0aGF0
IHdlIGNhbiBhdCBsZWFzdCBzdGFiaWxpemUgdGhlIGZ1bmN0aW9uYWxpdHkgb2YgdGhlIHNwZWMN
CnNvIHRoYXQgYnkgdGhlIHRpbWUgdGhlIElFVEYgcHJvY2VzcyBjYW4gc3RhcnQgdG8gY2hldyBv
biBpdCBpbiBhbg0Kb2ZmaWNpYWwgZmFzaGlvbiwgaXQgd2lsbCBiZSBtb3N0bHkgYmFrZWQgYW5k
IHdlIGNhbiBydW4gaXQgdGhyb3VnaA0KcmVsYXRpdmVseSBxdWlja2x5Lg0KDQogIC0tIEp1c3Rp
bg0KDQpPbiAwMi8wNi8yMDEzIDA5OjQ1IEFNLCBIYW5uZXMgVHNjaG9mZW5pZyB3cm90ZToNCj4g
SGkgVG9kZCwNCj4NCj4gdHdvIGFuc3dlcnM6DQo+DQo+IDEpIFRva2VuIFJldm9jYXRpb246DQo+
DQo+IEkgaGFkIGluaXRpYXRlZCBhIFdvcmtpbmcgR3JvdXAgTGFzdCBDYWxsIGZvciB0aGUgdG9r
ZW4gcmV2b2NhdGlvbiBkb2N1bWVudCBlbmQgb2YgTm92ZW1iZXI6DQo+IGh0dHA6Ly93d3cuaWV0
Zi5vcmcvbWFpbC1hcmNoaXZlL3dlYi9vYXV0aC9jdXJyZW50L21zZzEwMTAyLmh0bWwNCj4NCj4g
QXMgeW91IGhhdmUgc2VlbiBvbiB0aGUgbGlzdCwgdGhpcyBoYXMgZ2VuZXJhdGVkIGEgZmFpciBh
bW91bnQgb2YgZGlzY3Vzc2lvbi4NCj4NCj4gSSBob3BlIHRoYXQgVG9yc3RlbiwgdGhlIGRyYWZ0
IGVkaXRvciwgaXMgYWJsZSB0byBwcm9kdWNlIGEgbmV3IGRyYWZ0IHZlcnNpb24gcXVpY2tseSB3
aXRoIGEgcmVzb2x1dGlvbiBvZiB0aGUgb3BlbiBpc3N1ZXMgdGhhdCBpcyBhY2NlcHRhYmxlIHRv
IHRoZSByZXN0IG9mIHRoZSBncm91cC4NCj4NCj4gVGhlbiwgd2Ugd2lsbCBoYXZlIHRvIGp1ZGdl
IHdoZXRoZXIgdGhlIGRvY3VtZW50IGNhbiBtb3ZlIGZvcndhcmQgdG8gdGhlIElFU0cuDQo+DQo+
IDIpIEludHJvc3BlY3Rpb24NCj4NCj4gVGhhdCBkb2N1bWVudCBpcyBub3QgZXZlbiBhIHdvcmtp
bmcgZ3JvdXAgaXRlbS4NCj4NCj4gQ2lhbw0KPiBIYW5uZXMNCj4NCj4gT24gRmViIDYsIDIwMTMs
IGF0IDQ6MjYgUE0sIFRvZGQgVyBMYWluaGFydCB3cm90ZToNCj4NCj4+IERvZXMgYW55b25lIGhh
dmUgYW55IGludHVpdGlvbiBhcyB0byBob3cgZmFyIGF3YXkgd2UgYXJlIG9uIGxhc3QgY2FsbCBm
b3IgaW50cm9zcGVjdGlvbiBhbmQgcmV2b2NhdGlvbj8NCj4gX19fX19fX19fX19fX19fX19fX19f
X19fX19fX19fX19fX19fX19fX19fX19fX18NCj4gT0F1dGggbWFpbGluZyBsaXN0DQo+IE9BdXRo
QGlldGYub3JnDQo+IGh0dHBzOi8vd3d3LmlldGYub3JnL21haWxtYW4vbGlzdGluZm8vb2F1dGgN
Cg0KX19fX19fX19fX19fX19fX19fX19fX19fX19fX19fX19fX19fX19fX19fX19fX18NCk9BdXRo
IG1haWxpbmcgbGlzdA0KT0F1dGhAaWV0Zi5vcmcNCmh0dHBzOi8vd3d3LmlldGYub3JnL21haWxt
YW4vbGlzdGluZm8vb2F1dGgNCg0KDQo=

--_000_c78f5209366f4a73b11dcdf37aa36900BLUPR03MB035namprd03pro_
Content-Type: text/html; charset="utf-8"
Content-ID: <3598E3503A330D4283EF786DBB592526@microsoft.onmicrosoft.com>
Content-Transfer-Encoding: base64
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--_000_c78f5209366f4a73b11dcdf37aa36900BLUPR03MB035namprd03pro_--

From lainhart@us.ibm.com  Wed Feb  6 07:30:57 2013
Return-Path: <lainhart@us.ibm.com>
X-Original-To: oauth@ietfa.amsl.com
Delivered-To: oauth@ietfa.amsl.com
Received: from localhost (localhost [127.0.0.1]) by ietfa.amsl.com (Postfix) with ESMTP id 5B52521F84C2 for <oauth@ietfa.amsl.com>; Wed,  6 Feb 2013 07:30:57 -0800 (PST)
X-Virus-Scanned: amavisd-new at amsl.com
X-Spam-Flag: NO
X-Spam-Score: -10.542
X-Spam-Level: 
X-Spam-Status: No, score=-10.542 tagged_above=-999 required=5 tests=[AWL=0.056, BAYES_00=-2.599, HTML_MESSAGE=0.001, RCVD_IN_DNSWL_HI=-8]
Received: from mail.ietf.org ([64.170.98.30]) by localhost (ietfa.amsl.com [127.0.0.1]) (amavisd-new, port 10024) with ESMTP id dBVW3cBqvVA5 for <oauth@ietfa.amsl.com>; Wed,  6 Feb 2013 07:30:56 -0800 (PST)
Received: from e9.ny.us.ibm.com (e9.ny.us.ibm.com [32.97.182.139]) by ietfa.amsl.com (Postfix) with ESMTP id 1927521F853A for <oauth@ietf.org>; Wed,  6 Feb 2013 07:30:56 -0800 (PST)
Received: from /spool/local by e9.ny.us.ibm.com with IBM ESMTP SMTP Gateway: Authorized Use Only! Violators will be prosecuted for <oauth@ietf.org> from <lainhart@us.ibm.com>; Wed, 6 Feb 2013 10:30:54 -0500
Received: from d01dlp02.pok.ibm.com (9.56.250.167) by e9.ny.us.ibm.com (192.168.1.109) with IBM ESMTP SMTP Gateway: Authorized Use Only! Violators will be prosecuted;  Wed, 6 Feb 2013 10:30:52 -0500
Received: from d01relay05.pok.ibm.com (d01relay05.pok.ibm.com [9.56.227.237]) by d01dlp02.pok.ibm.com (Postfix) with ESMTP id 9012B6E8036; Wed,  6 Feb 2013 10:30:49 -0500 (EST)
Received: from d01av01.pok.ibm.com (d01av01.pok.ibm.com [9.56.224.215]) by d01relay05.pok.ibm.com (8.13.8/8.13.8/NCO v10.0) with ESMTP id r16FUj65328532; Wed, 6 Feb 2013 10:30:45 -0500
Received: from d01av01.pok.ibm.com (loopback [127.0.0.1]) by d01av01.pok.ibm.com (8.14.4/8.13.1/NCO v10.0 AVout) with ESMTP id r16FUjLU025958; Wed, 6 Feb 2013 10:30:45 -0500
Received: from d01ml255.pok.ibm.com (d01ml255.pok.ibm.com [9.63.10.54]) by d01av01.pok.ibm.com (8.14.4/8.13.1/NCO v10.0 AVin) with ESMTP id r16FUjRa025905; Wed, 6 Feb 2013 10:30:45 -0500
In-Reply-To: <5112746B.70403@mitre.org>
References: <CAJV9qO8UgLV6SdegZSk4KT3Qyb-M2KmPFPV9xDht_WjibeUWrg@mail.gmail.com>	<51126D65.2090707@mitre.org> <CAJV9qO-ZNVcbzNvb---CmXv+vo0jZHKQaDon8OqrPJCfAXKTRQ@mail.gmail.com> <5112746B.70403@mitre.org>
To: Justin Richer <jricher@mitre.org>
MIME-Version: 1.0
X-KeepSent: E5AD1D75:31752E83-85257B0A:00552A3B; type=4; name=$KeepSent
X-Mailer: Lotus Notes Release 8.5.3FP2 SHF22 July 19, 2012
Message-ID: <OFE5AD1D75.31752E83-ON85257B0A.00552A3B-85257B0A.0055358A@us.ibm.com>
From: Todd W Lainhart <lainhart@us.ibm.com>
Date: Wed, 6 Feb 2013 10:30:42 -0500
X-MIMETrack: Serialize by Router on D01ML255/01/M/IBM(Release 8.5.3FP2 ZX853FP2HF4|December 14, 2012) at 02/06/2013 10:30:45, Serialize complete at 02/06/2013 10:30:45
Content-Type: multipart/alternative; boundary="=_alternative 0055358A85257B0A_="
X-Content-Scanned: Fidelis XPS MAILER
x-cbid: 13020615-7182-0000-0000-00000506381E
Cc: "oauth@ietf.org WG" <oauth@ietf.org>, oauth-bounces@ietf.org
Subject: Re: [OAUTH-WG] A question on token revocation.
X-BeenThere: oauth@ietf.org
X-Mailman-Version: 2.1.12
Precedence: list
List-Id: OAUTH WG <oauth.ietf.org>
List-Unsubscribe: <https://www.ietf.org/mailman/options/oauth>, <mailto:oauth-request@ietf.org?subject=unsubscribe>
List-Archive: <http://www.ietf.org/mail-archive/web/oauth>
List-Post: <mailto:oauth@ietf.org>
List-Help: <mailto:oauth-request@ietf.org?subject=help>
List-Subscribe: <https://www.ietf.org/mailman/listinfo/oauth>, <mailto:oauth-request@ietf.org?subject=subscribe>
X-List-Received-Date: Wed, 06 Feb 2013 15:30:57 -0000

This is a multipart message in MIME format.
--=_alternative 0055358A85257B0A_=
Content-Type: text/plain; charset="US-ASCII"

> If you would like to see the RO-initiated token revocation go through 
(not grant revocation, mind you -- that's related, but different), then I 
would suggest that you start specifying exactly how that works.

+1





Todd Lainhart
Rational software
IBM Corporation
550 King Street, Littleton, MA 01460-1250
1-978-899-4705
2-276-4705 (T/L)
lainhart@us.ibm.com




From:   Justin Richer <jricher@mitre.org>
To:     Prabath Siriwardena <prabath@wso2.com>, 
Cc:     "oauth@ietf.org WG" <oauth@ietf.org>
Date:   02/06/2013 10:21 AM
Subject:        Re: [OAUTH-WG] A question on token revocation.
Sent by:        oauth-bounces@ietf.org




On 02/06/2013 10:13 AM, Prabath Siriwardena wrote:


On Wed, Feb 6, 2013 at 8:19 PM, Justin Richer <jricher@mitre.org> wrote:
These are generally handled through a user interface where the RO is 
authenticated directly to the AS, and there's not much need for a 
"protocol" here, in practice. 

Why do you think leaving access token revocation by RO to a proprietary 
API is a good practice ? IMO this an essential requirement in API 
security.
I think it makes more sense in the same way that having a "proprietary" 
UI/API for managing the user consent makes sense: unless you're doing a 
fully dynamic end-to-end system like UMA, then there's not much value in 
trying to squeeze disparate systems into the same mold, since they won't 
be talking to each other anyway. 

And since you refer to it as an "API", what will the RO be using to call 
this API? Is there a token management client that's separate from the 
OAuth client? 


IMHO token revocation done my RO is more practical than token revocation 
done by the Client.
They're both valid but require different kinds of protocols and 
considerations. This token revocation draft is meant to solve one problem, 
and that doesn't mean it can or should solve other seemingly related 
problems.

If you would like to see the RO-initiated token revocation go through (not 
grant revocation, mind you -- that's related, but different), then I would 
suggest that you start specifying exactly how that works. I predict it 
will be problematic in practice, though, as the RO often doesn't actually 
have direct access to the token itself. 

 
There are larger applications, like UMA, that have client and PR 
provisioning that would allow for this to be managed somewhat 
programmatically, but even in that case you're still generally doing token 
revocation by a "client" in some fashion. In UMA, though, several 
different pieces can play the role of a "client" at different parts of the 
process.

Revoking a scope is a whole different mess. Generally, you'd want to just 
revoke an existing token and make a new authorization grant with lower 
access if you don't want that client getting that scope anymore. If you 
just want to downscope for a single transaction, you can already do that 
with either the refresh token or token chaining approaches, depending on 
where in the process you are. The latter of these are both client-focused, 
though, and the RO doesn't have a direct hand in it at this point.

Why do you think it a mess. If you revoke the entire token then Client 
needs to go through the complete OAuth flow - and also needs to get the 
user consent. If RO can  downgrade the scope, then we restrict API access 
by the client at RS end and its transparent to the client.


Downgrading the scope of tokens in the wild is hardly transparent to the 
client (stuff that it expects to work will suddenly start to fail, meaning 
that most clients will throw out the token and try to get a new one), and 
in a distributed system you've got to propagate that change to the RS. If 
you bake the scopes into the token itself (which many do) then you 
actually *can't* downgrade a single token, anyway. 

 -- Justin

Thanks & regards,
-Prabath
 


 -- Justin 


On 02/06/2013 04:35 AM, Prabath Siriwardena wrote:
I am sorry if this was already discussed in this list.. 

Looking at [1] it only talks about revoking the access token from the 
client.

How about the resource owner..?

There can be cases where resource owner needs to revoke an authorized 
access token from a given client. Or revoke an scope..

How are we going to address these requirements..? Thoughts appreciated...

[1] http://tools.ietf.org/html/draft-ietf-oauth-revocation-04

-- 
Thanks & Regards,
Prabath 

Mobile : +94 71 809 6732 

http://blog.facilelogin.com
http://RampartFAQ.com


_______________________________________________
OAuth mailing list
OAuth@ietf.org
https://www.ietf.org/mailman/listinfo/oauth





-- 
Thanks & Regards,
Prabath 

Mobile : +94 71 809 6732 

http://blog.facilelogin.com
http://RampartFAQ.com
_______________________________________________
OAuth mailing list
OAuth@ietf.org
https://www.ietf.org/mailman/listinfo/oauth


--=_alternative 0055358A85257B0A_=
Content-Type: text/html; charset="US-ASCII"

<font size=2 face="sans-serif">&gt; </font><font size=3>If you would like
to see the RO-initiated token revocation go through (not grant revocation,
mind you -- that's related, but different), then I would suggest that you
start specifying exactly how that works.</font>
<br>
<br><font size=2 face="sans-serif">+1<br>
</font>
<br>
<table width=223 style="border-collapse:collapse;">
<tr height=8>
<td width=223 bgcolor=white style="border-style:solid;border-color:#000000;border-width:0px 0px 0px 0px;padding:0px 0px;"><font size=1 face="Verdana"><b><br>
<br>
<br>
Todd Lainhart<br>
Rational software<br>
IBM Corporation<br>
550 King Street, Littleton, MA 01460-1250</b></font><font size=1 face="Arial"><b><br>
1-978-899-4705<br>
2-276-4705 (T/L)<br>
lainhart@us.ibm.com</b></font></table>
<br>
<br>
<br>
<br>
<br><font size=1 color=#5f5f5f face="sans-serif">From: &nbsp; &nbsp; &nbsp;
&nbsp;</font><font size=1 face="sans-serif">Justin Richer &lt;jricher@mitre.org&gt;</font>
<br><font size=1 color=#5f5f5f face="sans-serif">To: &nbsp; &nbsp; &nbsp;
&nbsp;</font><font size=1 face="sans-serif">Prabath Siriwardena
&lt;prabath@wso2.com&gt;, </font>
<br><font size=1 color=#5f5f5f face="sans-serif">Cc: &nbsp; &nbsp; &nbsp;
&nbsp;</font><font size=1 face="sans-serif">&quot;oauth@ietf.org
WG&quot; &lt;oauth@ietf.org&gt;</font>
<br><font size=1 color=#5f5f5f face="sans-serif">Date: &nbsp; &nbsp; &nbsp;
&nbsp;</font><font size=1 face="sans-serif">02/06/2013 10:21 AM</font>
<br><font size=1 color=#5f5f5f face="sans-serif">Subject: &nbsp; &nbsp;
&nbsp; &nbsp;</font><font size=1 face="sans-serif">Re: [OAUTH-WG]
A question on token revocation.</font>
<br><font size=1 color=#5f5f5f face="sans-serif">Sent by: &nbsp; &nbsp;
&nbsp; &nbsp;</font><font size=1 face="sans-serif">oauth-bounces@ietf.org</font>
<br>
<hr noshade>
<br>
<br>
<br>
<br><font size=3>On 02/06/2013 10:13 AM, Prabath Siriwardena wrote:</font>
<br><font size=3><br>
</font>
<br><font size=3>On Wed, Feb 6, 2013 at 8:19 PM, Justin Richer &lt;</font><a href=mailto:jricher@mitre.org target=_blank><font size=3 color=blue><u>jricher@mitre.org</u></font></a><font size=3>&gt;
wrote:</font>
<br><font size=3>These are generally handled through a user interface where
the RO is authenticated directly to the AS, and there's not much need for
a &quot;protocol&quot; here, in practice. </font>
<br>
<br><font size=3>Why do you think leaving access token revocation by RO
to a proprietary API is a good practice ? IMO this an essential requirement
in API security.</font>
<br><font size=3>I think it makes more sense in the same way that having
a &quot;proprietary&quot; UI/API for managing the user consent makes sense:
unless you're doing a fully dynamic end-to-end system like UMA, then there's
not much value in trying to squeeze disparate systems into the same mold,
since they won't be talking to each other anyway. <br>
<br>
And since you refer to it as an &quot;API&quot;, what will the RO be using
to call this API? Is there a token management client that's separate from
the OAuth client? <br>
</font>
<br>
<br><font size=3>IMHO token revocation done my RO is more practical than
token revocation done by the Client.</font>
<br><font size=3>They're both valid but require different kinds of protocols
and considerations. This token revocation draft is meant to solve one problem,
and that doesn't mean it can or should solve other seemingly related problems.<br>
<br>
If you would like to see the RO-initiated token revocation go through (not
grant revocation, mind you -- that's related, but different), then I would
suggest that you start specifying exactly how that works. I predict it
will be problematic in practice, though, as the RO often doesn't actually
have direct access to the token itself. <br>
</font>
<br><font size=3>&nbsp;</font>
<br><font size=3>There are larger applications, like UMA, that have client
and PR provisioning that would allow for this to be managed somewhat programmatically,
but even in that case you're still generally doing token revocation by
a &quot;client&quot; in some fashion. In UMA, though, several different
pieces can play the role of a &quot;client&quot; at different parts of
the process.<br>
<br>
Revoking a scope is a whole different mess. Generally, you'd want to just
revoke an existing token and make a new authorization grant with lower
access if you don't want that client getting that scope anymore. If you
just want to downscope for a single transaction, you can already do that
with either the refresh token or token chaining approaches, depending on
where in the process you are. The latter of these are both client-focused,
though, and the RO doesn't have a direct hand in it at this point.</font>
<br>
<br><font size=3>Why do you think it a mess. If you revoke the entire token
then Client needs to go through the complete OAuth flow - and also needs
to get the user consent. If RO can &nbsp;downgrade the scope, then we restrict
API access by the client at RS end and its transparent to the client.</font>
<br>
<br><font size=3><br>
Downgrading the scope of tokens in the wild is hardly transparent to the
client (stuff that it expects to work will suddenly start to fail, meaning
that most clients will throw out the token and try to get a new one), and
in a distributed system you've got to propagate that change to the RS.
If you bake the scopes into the token itself (which many do) then you actually
*can't* downgrade a single token, anyway. <br>
<br>
 -- Justin<br>
</font>
<br><font size=3>Thanks &amp; regards,</font>
<br><font size=3>-Prabath</font>
<br><font size=3>&nbsp;</font>
<br><font size=3 color=#8f8f8f><br>
<br>
 -- Justin</font><font size=3> </font>
<br><font size=3><br>
</font>
<br><font size=3>On 02/06/2013 04:35 AM, Prabath Siriwardena wrote:</font>
<br><font size=3>I am sorry if this was already discussed in this list..
</font>
<br>
<br><font size=3>Looking at [1] it only talks about revoking the access
token from the client.</font>
<br>
<br><font size=3>How about the resource owner..?</font>
<br>
<br><font size=3>There can be cases where resource owner needs to revoke
an authorized access token from a given client. Or revoke an scope..</font>
<br>
<br><font size=3>How are we going to address these requirements..? Thoughts
appreciated...</font>
<br>
<br><font size=3>[1] </font><a href="http://tools.ietf.org/html/draft-ietf-oauth-revocation-04" target=_blank><font size=3 color=blue><u>http://tools.ietf.org/html/draft-ietf-oauth-revocation-04</u></font></a>
<br>
<br><font size=3>-- <br>
Thanks &amp; Regards,<br>
Prabath </font>
<br>
<br><font size=3>Mobile : </font><a href=tel:%2B94%2071%20809%206732 target=_blank><font size=3 color=blue><u>+94
71 809 6732</u></font></a><font size=3> <br>
</font><font size=3 color=blue><u><br>
</u></font><a href=http://blog.facilelogin.com/ target=_blank><font size=3 color=blue><u>http://blog.facilelogin.com</u></font></a><font size=3 color=blue><u><br>
</u></font><a href=http://rampartfaq.com/ target=_blank><font size=3 color=blue><u>http://RampartFAQ.com</u></font></a>
<br><font size=3><br>
</font>
<br><tt><font size=3>_______________________________________________<br>
OAuth mailing list<br>
</font></tt><a href=mailto:OAuth@ietf.org target=_blank><tt><font size=3 color=blue><u>OAuth@ietf.org</u></font></tt></a><tt><font size=3><br>
</font></tt><a href=https://www.ietf.org/mailman/listinfo/oauth target=_blank><tt><font size=3 color=blue><u>https://www.ietf.org/mailman/listinfo/oauth</u></font></tt></a><tt><font size=3><br>
</font></tt>
<br>
<br><font size=3><br>
</font>
<br>
<br><font size=3>-- <br>
Thanks &amp; Regards,<br>
Prabath </font>
<br>
<br><font size=3>Mobile : +94 71 809 6732 <br>
</font><font size=3 color=blue><u><br>
</u></font><a href=http://blog.facilelogin.com/ target=_blank><font size=3 color=blue><u>http://blog.facilelogin.com</u></font></a><font size=3 color=blue><u><br>
</u></font><a href=http://rampartfaq.com/ target=_blank><font size=3 color=blue><u>http://RampartFAQ.com</u></font></a>
<br><tt><font size=2>_______________________________________________<br>
OAuth mailing list<br>
OAuth@ietf.org<br>
</font></tt><a href=https://www.ietf.org/mailman/listinfo/oauth><tt><font size=2>https://www.ietf.org/mailman/listinfo/oauth</font></tt></a><tt><font size=2><br>
</font></tt>
<br>
--=_alternative 0055358A85257B0A_=--


From prabath@wso2.com  Wed Feb  6 07:31:33 2013
Return-Path: <prabath@wso2.com>
X-Original-To: oauth@ietfa.amsl.com
Delivered-To: oauth@ietfa.amsl.com
Received: from localhost (localhost [127.0.0.1]) by ietfa.amsl.com (Postfix) with ESMTP id BFA5D21F87F9 for <oauth@ietfa.amsl.com>; Wed,  6 Feb 2013 07:31:33 -0800 (PST)
X-Virus-Scanned: amavisd-new at amsl.com
X-Spam-Flag: NO
X-Spam-Score: -2.403
X-Spam-Level: 
X-Spam-Status: No, score=-2.403 tagged_above=-999 required=5 tests=[AWL=0.573,  BAYES_00=-2.599, FM_FORGED_GMAIL=0.622, HTML_MESSAGE=0.001, RCVD_IN_DNSWL_LOW=-1]
Received: from mail.ietf.org ([64.170.98.30]) by localhost (ietfa.amsl.com [127.0.0.1]) (amavisd-new, port 10024) with ESMTP id c0CiiXUFP-PA for <oauth@ietfa.amsl.com>; Wed,  6 Feb 2013 07:31:32 -0800 (PST)
Received: from mail-ea0-f180.google.com (mail-ea0-f180.google.com [209.85.215.180]) by ietfa.amsl.com (Postfix) with ESMTP id 3EFE621F856F for <oauth@ietf.org>; Wed,  6 Feb 2013 07:31:31 -0800 (PST)
Received: by mail-ea0-f180.google.com with SMTP id c1so616469eaa.11 for <oauth@ietf.org>; Wed, 06 Feb 2013 07:31:31 -0800 (PST)
X-Google-DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=google.com; s=20120113; h=mime-version:x-received:in-reply-to:references:date:message-id :subject:from:to:cc:content-type:x-gm-message-state; bh=xi9MVZtNIreYjjCkKamsk2gxd7cvYQ+aMRSS74ZkY4M=; b=VGpUHlAlQabsPCoI2d1wgShLWNQ4AbAtonFMxJyXgezbE/soFQOHX/zO7zN600+e+c 0GGDpAAoACvFU1oRwMiCGThO1xTfwB7BQ5vxlgIz+J5D59iRBZ//pqE0A6mRfOYydjeU TGgf0DO1DgpxPYFGafDm8WoHL+5ze1E5aRs+PbuGF2MXsyLkU9BxPiu5/EI8cX6/QwwO jvVf7I/V18s4VRlMHcQNjwDDTzJ7gFJcTsfrTne6ha8swT/GAtpeSJbO+4TgIdyBH3wP duyds+W+xkxzULS7x5HioOp0HC8Lt+PwrC0D+NMCKlaVu+apUEXvN3Qk0KJM2dWuxgkf 6ZvA==
MIME-Version: 1.0
X-Received: by 10.14.202.197 with SMTP id d45mr52218386eeo.1.1360164691145; Wed, 06 Feb 2013 07:31:31 -0800 (PST)
Received: by 10.223.175.134 with HTTP; Wed, 6 Feb 2013 07:31:31 -0800 (PST)
In-Reply-To: <5112746B.70403@mitre.org>
References: <CAJV9qO8UgLV6SdegZSk4KT3Qyb-M2KmPFPV9xDht_WjibeUWrg@mail.gmail.com> <51126D65.2090707@mitre.org> <CAJV9qO-ZNVcbzNvb---CmXv+vo0jZHKQaDon8OqrPJCfAXKTRQ@mail.gmail.com> <5112746B.70403@mitre.org>
Date: Wed, 6 Feb 2013 21:01:31 +0530
Message-ID: <CAJV9qO-mz=K_fJHO8g8XH8DtUxFPvN8hRF7K=gn0etAAqeb0zg@mail.gmail.com>
From: Prabath Siriwardena <prabath@wso2.com>
To: Justin Richer <jricher@mitre.org>
Content-Type: multipart/alternative; boundary=047d7b343b064074a904d51005e6
X-Gm-Message-State: ALoCoQlnDgbdriWEpRmKlLZneUzJtyggppNZrmXiX6IndZLGJSDuLVt6l7g0x4JL+NDv5n7f40oy
Cc: "oauth@ietf.org WG" <oauth@ietf.org>
Subject: Re: [OAUTH-WG] A question on token revocation.
X-BeenThere: oauth@ietf.org
X-Mailman-Version: 2.1.12
Precedence: list
List-Id: OAUTH WG <oauth.ietf.org>
List-Unsubscribe: <https://www.ietf.org/mailman/options/oauth>, <mailto:oauth-request@ietf.org?subject=unsubscribe>
List-Archive: <http://www.ietf.org/mail-archive/web/oauth>
List-Post: <mailto:oauth@ietf.org>
List-Help: <mailto:oauth-request@ietf.org?subject=help>
List-Subscribe: <https://www.ietf.org/mailman/listinfo/oauth>, <mailto:oauth-request@ietf.org?subject=subscribe>
X-List-Received-Date: Wed, 06 Feb 2013 15:31:33 -0000

--047d7b343b064074a904d51005e6
Content-Type: text/plain; charset=ISO-8859-1

On Wed, Feb 6, 2013 at 8:49 PM, Justin Richer <jricher@mitre.org> wrote:

>
> On 02/06/2013 10:13 AM, Prabath Siriwardena wrote:
>
>
>
> On Wed, Feb 6, 2013 at 8:19 PM, Justin Richer <jricher@mitre.org> wrote:
>
>>  These are generally handled through a user interface where the RO is
>> authenticated directly to the AS, and there's not much need for a
>> "protocol" here, in practice.
>>
>
>  Why do you think leaving access token revocation by RO to a proprietary
> API is a good practice ? IMO this an essential requirement in API security.
>
> I think it makes more sense in the same way that having a "proprietary"
> UI/API for managing the user consent makes sense: unless you're doing a
> fully dynamic end-to-end system like UMA, then there's not much value in
> trying to squeeze disparate systems into the same mold, since they won't be
> talking to each other anyway.
>

This is required in distributed setup for each API platform from different
vendors to perform in an interop manner.


>
> And since you refer to it as an "API", what will the RO be using to call
> this API? Is there a token management client that's separate from the OAuth
> client?
>

I didn't get your question right... If you meant the how to invoke
revocation end point, the the resource owner needs to know the consumer key
(represents the OAuth Client app) & scope to revoke the access token for a
given client.


>
>  IMHO token revocation done my RO is more practical than token revocation
> done by the Client.
>
> They're both valid but require different kinds of protocols and
> considerations. This token revocation draft is meant to solve one problem,
> and that doesn't mean it can or should solve other seemingly related
> problems.
>
> If you would like to see the RO-initiated token revocation go through (not
> grant revocation, mind you -- that's related, but different), then I would
> suggest that you start specifying exactly how that works. I predict it will
> be problematic in practice, though, as the RO often doesn't actually have
> direct access to the token itself.
>

Resource owner needs to know the consumer key (represents the OAuth Client
app) & scope to revoke the access token for a given client.



>
>
>
>> There are larger applications, like UMA, that have client and PR
>> provisioning that would allow for this to be managed somewhat
>> programmatically, but even in that case you're still generally doing token
>> revocation by a "client" in some fashion. In UMA, though, several different
>> pieces can play the role of a "client" at different parts of the process.
>>
>> Revoking a scope is a whole different mess. Generally, you'd want to just
>> revoke an existing token and make a new authorization grant with lower
>> access if you don't want that client getting that scope anymore. If you
>> just want to downscope for a single transaction, you can already do that
>> with either the refresh token or token chaining approaches, depending on
>> where in the process you are. The latter of these are both client-focused,
>> though, and the RO doesn't have a direct hand in it at this point.
>>
>
>  Why do you think it a mess. If you revoke the entire token then Client
> needs to go through the complete OAuth flow - and also needs to get the
> user consent. If RO can  downgrade the scope, then we restrict API access
> by the client at RS end and its transparent to the client.
>
>
> Downgrading the scope of tokens in the wild is hardly transparent to the
> client (stuff that it expects to work will suddenly start to fail, meaning
> that most clients will throw out the token and try to get a new one), and
> in a distributed system you've got to propagate that change to the RS. If
> you bake the scopes into the token itself (which many do) then you actually
> *can't* downgrade a single token, anyway.
>

Yes.. that is the expected behavior. I mean the process is transparent.
Client will notice at runtime.

Thanks & regards,
-Prabath


>
>  -- Justin
>
>
>  Thanks & regards,
> -Prabath
>
>
>>
>>
>>  -- Justin
>>
>>
>> On 02/06/2013 04:35 AM, Prabath Siriwardena wrote:
>>
>>  I am sorry if this was already discussed in this list..
>>
>>  Looking at [1] it only talks about revoking the access token from the
>> client.
>>
>>  How about the resource owner..?
>>
>>  There can be cases where resource owner needs to revoke an authorized
>> access token from a given client. Or revoke an scope..
>>
>>  How are we going to address these requirements..? Thoughts
>> appreciated...
>>
>>  [1] http://tools.ietf.org/html/draft-ietf-oauth-revocation-04
>>
>>  --
>> Thanks & Regards,
>> Prabath
>>
>>  Mobile : +94 71 809 6732 <%2B94%2071%20809%206732>
>>
>> http://blog.facilelogin.com
>> http://RampartFAQ.com
>>
>>
>>   _______________________________________________
>> OAuth mailing listOAuth@ietf.orghttps://www.ietf.org/mailman/listinfo/oauth
>>
>>
>>
>
>
>  --
> Thanks & Regards,
> Prabath
>
>  Mobile : +94 71 809 6732
>
> http://blog.facilelogin.com
> http://RampartFAQ.com
>
>
>


-- 
Thanks & Regards,
Prabath

Mobile : +94 71 809 6732

http://blog.facilelogin.com
http://RampartFAQ.com

--047d7b343b064074a904d51005e6
Content-Type: text/html; charset=ISO-8859-1
Content-Transfer-Encoding: quoted-printable

<br><br><div class=3D"gmail_quote">On Wed, Feb 6, 2013 at 8:49 PM, Justin R=
icher <span dir=3D"ltr">&lt;<a href=3D"mailto:jricher@mitre.org" target=3D"=
_blank">jricher@mitre.org</a>&gt;</span> wrote:<br><blockquote class=3D"gma=
il_quote" style=3D"margin:0 0 0 .8ex;border-left:1px #ccc solid;padding-lef=
t:1ex">

 =20
   =20
 =20
  <div bgcolor=3D"#FFFFFF" text=3D"#000000"><div class=3D"im">
    <br>
    <div>On 02/06/2013 10:13 AM, Prabath
      Siriwardena wrote:<br>
    </div>
    <blockquote type=3D"cite">
     =20
      <br>
      <br>
      <div class=3D"gmail_quote">On Wed, Feb 6, 2013 at 8:19 PM, Justin
        Richer <span dir=3D"ltr">&lt;<a href=3D"mailto:jricher@mitre.org" t=
arget=3D"_blank">jricher@mitre.org</a>&gt;</span>
        wrote:<br>
        <blockquote class=3D"gmail_quote" style=3D"margin:0 0 0 .8ex;border=
-left:1px #ccc solid;padding-left:1ex">
          <div bgcolor=3D"#FFFFFF" text=3D"#000000"> These are generally
            handled through a user interface where the RO is
            authenticated directly to the AS, and there&#39;s not much need
            for a &quot;protocol&quot; here, in practice. </div>
        </blockquote>
        <div><br>
        </div>
        <div>Why do you think leaving access token revocation by RO to a
          proprietary API is a good practice ? IMO this an essential
          requirement in API security.</div>
      </div>
    </blockquote></div>
    I think it makes more sense in the same way that having a
    &quot;proprietary&quot; UI/API for managing the user consent makes sens=
e:
    unless you&#39;re doing a fully dynamic end-to-end system like UMA, the=
n
    there&#39;s not much value in trying to squeeze disparate systems into
    the same mold, since they won&#39;t be talking to each other anyway. <b=
r></div></blockquote><div><br></div><div>This is required in distributed se=
tup for each API platform from different vendors to perform in an interop m=
anner.</div>
<div>=A0</div><blockquote class=3D"gmail_quote" style=3D"margin:0 0 0 .8ex;=
border-left:1px #ccc solid;padding-left:1ex"><div bgcolor=3D"#FFFFFF" text=
=3D"#000000">
    <br>
    And since you refer to it as an &quot;API&quot;, what will the RO be us=
ing to
    call this API? Is there a token management client that&#39;s separate
    from the OAuth client? <br></div></blockquote><div><br></div><div>I did=
n&#39;t get your question right... If you meant the how to invoke revocatio=
n end point, the the resource owner needs to know the consumer key (represe=
nts the OAuth Client app) &amp; scope to revoke the access token for a give=
n client.=A0</div>
<div><br></div><blockquote class=3D"gmail_quote" style=3D"margin:0 0 0 .8ex=
;border-left:1px #ccc solid;padding-left:1ex"><div bgcolor=3D"#FFFFFF" text=
=3D"#000000"><div class=3D"im"><br>
    <blockquote type=3D"cite">
      <div class=3D"gmail_quote">
        <div><br>
        </div>
        <div>IMHO token revocation done my RO is more practical than
          token revocation done by the Client.</div>
      </div>
    </blockquote></div>
    They&#39;re both valid but require different kinds of protocols and
    considerations. This token revocation draft is meant to solve one
    problem, and that doesn&#39;t mean it can or should solve other
    seemingly related problems.<br>
    <br>
    If you would like to see the RO-initiated token revocation go
    through (not grant revocation, mind you -- that&#39;s related, but
    different), then I would suggest that you start specifying exactly
    how that works. I predict it will be problematic in practice,
    though, as the RO often doesn&#39;t actually have direct access to the
    token itself. <br></div></blockquote><div><br></div><div>Resource owner=
 needs to know the consumer key (represents the OAuth Client app) &amp; sco=
pe to revoke the access token for a given client.=A0</div><div><br></div>
<div>=A0</div><blockquote class=3D"gmail_quote" style=3D"margin:0 0 0 .8ex;=
border-left:1px #ccc solid;padding-left:1ex"><div bgcolor=3D"#FFFFFF" text=
=3D"#000000"><div class=3D"im">
    <br>
    <blockquote type=3D"cite">
      <div class=3D"gmail_quote">
        <div>=A0</div>
        <blockquote class=3D"gmail_quote" style=3D"margin:0 0 0 .8ex;border=
-left:1px #ccc solid;padding-left:1ex">
          <div bgcolor=3D"#FFFFFF" text=3D"#000000">There are larger
            applications, like UMA, that have client and PR provisioning
            that would allow for this to be managed somewhat
            programmatically, but even in that case you&#39;re still
            generally doing token revocation by a &quot;client&quot; in som=
e
            fashion. In UMA, though, several different pieces can play
            the role of a &quot;client&quot; at different parts of the proc=
ess.<br>
            <br>
            Revoking a scope is a whole different mess. Generally, you&#39;=
d
            want to just revoke an existing token and make a new
            authorization grant with lower access if you don&#39;t want tha=
t
            client getting that scope anymore. If you just want to
            downscope for a single transaction, you can already do that
            with either the refresh token or token chaining approaches,
            depending on where in the process you are. The latter of
            these are both client-focused, though, and the RO doesn&#39;t
            have a direct hand in it at this point.</div>
        </blockquote>
        <div><br>
        </div>
        <div>Why do you think it a mess. If you revoke the entire token
          then Client needs to go through the complete OAuth flow - and
          also needs to get the user consent. If RO can =A0downgrade the
          scope, then we restrict API access by the client at RS end and
          its transparent to the client.</div>
        <div><br>
        </div>
      </div>
    </blockquote>
    <br></div>
    Downgrading the scope of tokens in the wild is hardly transparent to
    the client (stuff that it expects to work will suddenly start to
    fail, meaning that most clients will throw out the token and try to
    get a new one), and in a distributed system you&#39;ve got to propagate
    that change to the RS. If you bake the scopes into the token itself
    (which many do) then you actually *can&#39;t* downgrade a single token,
    anyway. <br></div></blockquote><div><br></div><div>Yes.. that is the ex=
pected behavior. I mean the process is transparent. Client will notice at r=
untime.</div><div><br></div><div>Thanks &amp; regards,</div><div>-Prabath</=
div>
<div>=A0</div><blockquote class=3D"gmail_quote" style=3D"margin:0 0 0 .8ex;=
border-left:1px #ccc solid;padding-left:1ex"><div bgcolor=3D"#FFFFFF" text=
=3D"#000000"><span class=3D"HOEnZb"><font color=3D"#888888">
    <br>
    =A0-- Justin</font></span><div><div class=3D"h5"><br>
    <br>
    <blockquote type=3D"cite">
      <div class=3D"gmail_quote">
        <div>Thanks &amp; regards,</div>
        <div>-Prabath</div>
        <div>=A0</div>
        <blockquote class=3D"gmail_quote" style=3D"margin:0 0 0 .8ex;border=
-left:1px #ccc solid;padding-left:1ex">
          <div bgcolor=3D"#FFFFFF" text=3D"#000000"><span><font color=3D"#8=
88888"><br>
                <br>
                =A0-- Justin</font></span>
            <div>
              <div><br>
                <br>
                <div>On 02/06/2013 04:35 AM, Prabath Siriwardena wrote:<br>
                </div>
              </div>
            </div>
            <blockquote type=3D"cite">
              <div>
                <div>
                  <div>I am sorry if this was already discussed in this
                    list..=A0</div>
                  <div><br>
                  </div>
                  <div>Looking at [1] it only talks about revoking the
                    access token from the client.</div>
                  <div><br>
                  </div>
                  <div>How about the resource owner..?</div>
                  <div><br>
                  </div>
                  <div>There can be cases where resource owner needs to
                    revoke an authorized access token from a given
                    client. Or revoke an scope..</div>
                  <div><br>
                  </div>
                  <div>How are we going to address these requirements..?
                    Thoughts appreciated...</div>
                  <div><br>
                  </div>
                  [1] <a href=3D"http://tools.ietf.org/html/draft-ietf-oaut=
h-revocation-04" target=3D"_blank">http://tools.ietf.org/html/draft-ietf-oa=
uth-revocation-04</a><br clear=3D"all">
                  <div><br>
                  </div>
                  -- <br>
                  Thanks &amp; Regards,<br>
                  Prabath
                  <div> <br>
                  </div>
                  <div>Mobile : <a href=3D"tel:%2B94%2071%20809%206732" val=
ue=3D"+94718096732" target=3D"_blank">+94 71 809
                      6732</a>=A0<br>
                    <br>
                    <a href=3D"http://blog.facilelogin.com" target=3D"_blan=
k">http://blog.facilelogin.com</a><br>
                    <a href=3D"http://RampartFAQ.com" target=3D"_blank">htt=
p://RampartFAQ.com</a></div>
                  <br>
                  <fieldset></fieldset>
                  <br>
                </div>
              </div>
              <div>
                <pre>_______________________________________________
OAuth mailing list
<a href=3D"mailto:OAuth@ietf.org" target=3D"_blank">OAuth@ietf.org</a>
<a href=3D"https://www.ietf.org/mailman/listinfo/oauth" target=3D"_blank">h=
ttps://www.ietf.org/mailman/listinfo/oauth</a>
</pre>
              </div>
            </blockquote>
            <br>
          </div>
        </blockquote>
      </div>
      <br>
      <br clear=3D"all">
      <div><br>
      </div>
      -- <br>
      Thanks &amp; Regards,<br>
      Prabath
      <div><br>
      </div>
      <div>Mobile : <a href=3D"tel:%2B94%2071%20809%206732" value=3D"+94718=
096732" target=3D"_blank">+94 71 809 6732</a>=A0<br>
        <br>
        <a href=3D"http://blog.facilelogin.com" target=3D"_blank">http://bl=
og.facilelogin.com</a><br>
        <a href=3D"http://RampartFAQ.com" target=3D"_blank">http://RampartF=
AQ.com</a></div>
    </blockquote>
    <br>
  </div></div></div>

</blockquote></div><br><br clear=3D"all"><div><br></div>-- <br>Thanks &amp;=
 Regards,<br>Prabath<div><br></div><div>Mobile : +94 71 809 6732=A0<br><br>=
<a href=3D"http://blog.facilelogin.com" target=3D"_blank">http://blog.facil=
elogin.com</a><br>
<a href=3D"http://RampartFAQ.com" target=3D"_blank">http://RampartFAQ.com</=
a></div>

--047d7b343b064074a904d51005e6--

From lainhart@us.ibm.com  Wed Feb  6 07:34:27 2013
Return-Path: <lainhart@us.ibm.com>
X-Original-To: oauth@ietfa.amsl.com
Delivered-To: oauth@ietfa.amsl.com
Received: from localhost (localhost [127.0.0.1]) by ietfa.amsl.com (Postfix) with ESMTP id 5216621F875F for <oauth@ietfa.amsl.com>; Wed,  6 Feb 2013 07:34:27 -0800 (PST)
X-Virus-Scanned: amavisd-new at amsl.com
X-Spam-Flag: NO
X-Spam-Score: -10.546
X-Spam-Level: 
X-Spam-Status: No, score=-10.546 tagged_above=-999 required=5 tests=[AWL=0.052, BAYES_00=-2.599, HTML_MESSAGE=0.001, RCVD_IN_DNSWL_HI=-8]
Received: from mail.ietf.org ([64.170.98.30]) by localhost (ietfa.amsl.com [127.0.0.1]) (amavisd-new, port 10024) with ESMTP id hN2B8qJTc7pn for <oauth@ietfa.amsl.com>; Wed,  6 Feb 2013 07:34:26 -0800 (PST)
Received: from e9.ny.us.ibm.com (e9.ny.us.ibm.com [32.97.182.139]) by ietfa.amsl.com (Postfix) with ESMTP id E546521F868D for <oauth@ietf.org>; Wed,  6 Feb 2013 07:34:25 -0800 (PST)
Received: from /spool/local by e9.ny.us.ibm.com with IBM ESMTP SMTP Gateway: Authorized Use Only! Violators will be prosecuted for <oauth@ietf.org> from <lainhart@us.ibm.com>; Wed, 6 Feb 2013 10:34:25 -0500
Received: from d01dlp03.pok.ibm.com (9.56.250.168) by e9.ny.us.ibm.com (192.168.1.109) with IBM ESMTP SMTP Gateway: Authorized Use Only! Violators will be prosecuted;  Wed, 6 Feb 2013 10:34:22 -0500
Received: from d01relay06.pok.ibm.com (d01relay06.pok.ibm.com [9.56.227.116]) by d01dlp03.pok.ibm.com (Postfix) with ESMTP id E6693C90028; Wed,  6 Feb 2013 10:34:20 -0500 (EST)
Received: from d01av02.pok.ibm.com (d01av02.pok.ibm.com [9.56.224.216]) by d01relay06.pok.ibm.com (8.13.8/8.13.8/NCO v10.0) with ESMTP id r16FYKUw29360192; Wed, 6 Feb 2013 10:34:20 -0500
Received: from d01av02.pok.ibm.com (loopback [127.0.0.1]) by d01av02.pok.ibm.com (8.14.4/8.13.1/NCO v10.0 AVout) with ESMTP id r16FYJQY009566; Wed, 6 Feb 2013 13:34:19 -0200
Received: from d01ml255.pok.ibm.com (d01ml255.pok.ibm.com [9.63.10.54]) by d01av02.pok.ibm.com (8.14.4/8.13.1/NCO v10.0 AVin) with ESMTP id r16FYA3u008297; Wed, 6 Feb 2013 13:34:14 -0200
In-Reply-To: <CAJV9qO-mz=K_fJHO8g8XH8DtUxFPvN8hRF7K=gn0etAAqeb0zg@mail.gmail.com>
References: <CAJV9qO8UgLV6SdegZSk4KT3Qyb-M2KmPFPV9xDht_WjibeUWrg@mail.gmail.com>	<51126D65.2090707@mitre.org> <CAJV9qO-ZNVcbzNvb---CmXv+vo0jZHKQaDon8OqrPJCfAXKTRQ@mail.gmail.com>	<5112746B.70403@mitre.org> <CAJV9qO-mz=K_fJHO8g8XH8DtUxFPvN8hRF7K=gn0etAAqeb0zg@mail.gmail.com>
To: Prabath Siriwardena <prabath@wso2.com>
MIME-Version: 1.0
X-KeepSent: 8CC0704A:7E320CB4-85257B0A:0055661B; type=4; name=$KeepSent
X-Mailer: Lotus Notes Release 8.5.3FP2 SHF22 July 19, 2012
Message-ID: <OF8CC0704A.7E320CB4-ON85257B0A.0055661B-85257B0A.00558648@us.ibm.com>
From: Todd W Lainhart <lainhart@us.ibm.com>
Date: Wed, 6 Feb 2013 10:34:09 -0500
X-MIMETrack: Serialize by Router on D01ML255/01/M/IBM(Release 8.5.3FP2 ZX853FP2HF4|December 14, 2012) at 02/06/2013 10:34:14, Serialize complete at 02/06/2013 10:34:14
Content-Type: multipart/alternative; boundary="=_alternative 0055864785257B0A_="
X-Content-Scanned: Fidelis XPS MAILER
x-cbid: 13020615-7182-0000-0000-00000506413B
Cc: oauth-bounces@ietf.org, "oauth@ietf.org WG" <oauth@ietf.org>
Subject: Re: [OAUTH-WG] A question on token revocation.
X-BeenThere: oauth@ietf.org
X-Mailman-Version: 2.1.12
Precedence: list
List-Id: OAUTH WG <oauth.ietf.org>
List-Unsubscribe: <https://www.ietf.org/mailman/options/oauth>, <mailto:oauth-request@ietf.org?subject=unsubscribe>
List-Archive: <http://www.ietf.org/mail-archive/web/oauth>
List-Post: <mailto:oauth@ietf.org>
List-Help: <mailto:oauth-request@ietf.org?subject=help>
List-Subscribe: <https://www.ietf.org/mailman/listinfo/oauth>, <mailto:oauth-request@ietf.org?subject=subscribe>
X-List-Received-Date: Wed, 06 Feb 2013 15:34:27 -0000

This is a multipart message in MIME format.
--=_alternative 0055864785257B0A_=
Content-Type: text/plain; charset="US-ASCII"

> Resource owner needs to know the consumer key (represents the OAuth 
Client app) & scope to revoke the access token for a given client. 

I see - you're saying that requiring client credentials on the end point 
is the problem?





Todd Lainhart
Rational software
IBM Corporation
550 King Street, Littleton, MA 01460-1250
1-978-899-4705
2-276-4705 (T/L)
lainhart@us.ibm.com




From:   Prabath Siriwardena <prabath@wso2.com>
To:     Justin Richer <jricher@mitre.org>, 
Cc:     "oauth@ietf.org WG" <oauth@ietf.org>
Date:   02/06/2013 10:31 AM
Subject:        Re: [OAUTH-WG] A question on token revocation.
Sent by:        oauth-bounces@ietf.org





On Wed, Feb 6, 2013 at 8:49 PM, Justin Richer <jricher@mitre.org> wrote:

On 02/06/2013 10:13 AM, Prabath Siriwardena wrote:


On Wed, Feb 6, 2013 at 8:19 PM, Justin Richer <jricher@mitre.org> wrote:
These are generally handled through a user interface where the RO is 
authenticated directly to the AS, and there's not much need for a 
"protocol" here, in practice. 

Why do you think leaving access token revocation by RO to a proprietary 
API is a good practice ? IMO this an essential requirement in API 
security.
I think it makes more sense in the same way that having a "proprietary" 
UI/API for managing the user consent makes sense: unless you're doing a 
fully dynamic end-to-end system like UMA, then there's not much value in 
trying to squeeze disparate systems into the same mold, since they won't 
be talking to each other anyway. 

This is required in distributed setup for each API platform from different 
vendors to perform in an interop manner.
 

And since you refer to it as an "API", what will the RO be using to call 
this API? Is there a token management client that's separate from the 
OAuth client? 

I didn't get your question right... If you meant the how to invoke 
revocation end point, the the resource owner needs to know the consumer 
key (represents the OAuth Client app) & scope to revoke the access token 
for a given client. 



IMHO token revocation done my RO is more practical than token revocation 
done by the Client.
They're both valid but require different kinds of protocols and 
considerations. This token revocation draft is meant to solve one problem, 
and that doesn't mean it can or should solve other seemingly related 
problems.

If you would like to see the RO-initiated token revocation go through (not 
grant revocation, mind you -- that's related, but different), then I would 
suggest that you start specifying exactly how that works. I predict it 
will be problematic in practice, though, as the RO often doesn't actually 
have direct access to the token itself. 

Resource owner needs to know the consumer key (represents the OAuth Client 
app) & scope to revoke the access token for a given client. 

 

 
There are larger applications, like UMA, that have client and PR 
provisioning that would allow for this to be managed somewhat 
programmatically, but even in that case you're still generally doing token 
revocation by a "client" in some fashion. In UMA, though, several 
different pieces can play the role of a "client" at different parts of the 
process.

Revoking a scope is a whole different mess. Generally, you'd want to just 
revoke an existing token and make a new authorization grant with lower 
access if you don't want that client getting that scope anymore. If you 
just want to downscope for a single transaction, you can already do that 
with either the refresh token or token chaining approaches, depending on 
where in the process you are. The latter of these are both client-focused, 
though, and the RO doesn't have a direct hand in it at this point.

Why do you think it a mess. If you revoke the entire token then Client 
needs to go through the complete OAuth flow - and also needs to get the 
user consent. If RO can  downgrade the scope, then we restrict API access 
by the client at RS end and its transparent to the client.


Downgrading the scope of tokens in the wild is hardly transparent to the 
client (stuff that it expects to work will suddenly start to fail, meaning 
that most clients will throw out the token and try to get a new one), and 
in a distributed system you've got to propagate that change to the RS. If 
you bake the scopes into the token itself (which many do) then you 
actually *can't* downgrade a single token, anyway. 

Yes.. that is the expected behavior. I mean the process is transparent. 
Client will notice at runtime.

Thanks & regards,
-Prabath
 

 -- Justin


Thanks & regards,
-Prabath
 


 -- Justin 


On 02/06/2013 04:35 AM, Prabath Siriwardena wrote:
I am sorry if this was already discussed in this list.. 

Looking at [1] it only talks about revoking the access token from the 
client.

How about the resource owner..?

There can be cases where resource owner needs to revoke an authorized 
access token from a given client. Or revoke an scope..

How are we going to address these requirements..? Thoughts appreciated...

[1] http://tools.ietf.org/html/draft-ietf-oauth-revocation-04

-- 
Thanks & Regards,
Prabath 

Mobile : +94 71 809 6732 

http://blog.facilelogin.com
http://RampartFAQ.com


_______________________________________________
OAuth mailing list
OAuth@ietf.org
https://www.ietf.org/mailman/listinfo/oauth





-- 
Thanks & Regards,
Prabath 

Mobile : +94 71 809 6732 

http://blog.facilelogin.com
http://RampartFAQ.com




-- 
Thanks & Regards,
Prabath

Mobile : +94 71 809 6732 

http://blog.facilelogin.com
http://RampartFAQ.com_______________________________________________
OAuth mailing list
OAuth@ietf.org
https://www.ietf.org/mailman/listinfo/oauth


--=_alternative 0055864785257B0A_=
Content-Type: text/html; charset="US-ASCII"

<font size=2 face="sans-serif">&gt; </font><font size=3>Resource owner
needs to know the consumer key (represents the OAuth Client app) &amp;
scope to revoke the access token for a given client.&nbsp;</font>
<br>
<br><font size=2 face="sans-serif">I see - you're saying that requiring
client credentials on the end point is the problem?<br>
</font>
<br>
<table width=223 style="border-collapse:collapse;">
<tr height=8>
<td width=223 bgcolor=white style="border-style:solid;border-color:#000000;border-width:0px 0px 0px 0px;padding:0px 0px;"><font size=1 face="Verdana"><b><br>
<br>
<br>
Todd Lainhart<br>
Rational software<br>
IBM Corporation<br>
550 King Street, Littleton, MA 01460-1250</b></font><font size=1 face="Arial"><b><br>
1-978-899-4705<br>
2-276-4705 (T/L)<br>
lainhart@us.ibm.com</b></font></table>
<br>
<br>
<br>
<br>
<br><font size=1 color=#5f5f5f face="sans-serif">From: &nbsp; &nbsp; &nbsp;
&nbsp;</font><font size=1 face="sans-serif">Prabath Siriwardena
&lt;prabath@wso2.com&gt;</font>
<br><font size=1 color=#5f5f5f face="sans-serif">To: &nbsp; &nbsp; &nbsp;
&nbsp;</font><font size=1 face="sans-serif">Justin Richer &lt;jricher@mitre.org&gt;,
</font>
<br><font size=1 color=#5f5f5f face="sans-serif">Cc: &nbsp; &nbsp; &nbsp;
&nbsp;</font><font size=1 face="sans-serif">&quot;oauth@ietf.org
WG&quot; &lt;oauth@ietf.org&gt;</font>
<br><font size=1 color=#5f5f5f face="sans-serif">Date: &nbsp; &nbsp; &nbsp;
&nbsp;</font><font size=1 face="sans-serif">02/06/2013 10:31 AM</font>
<br><font size=1 color=#5f5f5f face="sans-serif">Subject: &nbsp; &nbsp;
&nbsp; &nbsp;</font><font size=1 face="sans-serif">Re: [OAUTH-WG]
A question on token revocation.</font>
<br><font size=1 color=#5f5f5f face="sans-serif">Sent by: &nbsp; &nbsp;
&nbsp; &nbsp;</font><font size=1 face="sans-serif">oauth-bounces@ietf.org</font>
<br>
<hr noshade>
<br>
<br>
<br><font size=3><br>
</font>
<br><font size=3>On Wed, Feb 6, 2013 at 8:49 PM, Justin Richer &lt;</font><a href=mailto:jricher@mitre.org target=_blank><font size=3 color=blue><u>jricher@mitre.org</u></font></a><font size=3>&gt;
wrote:</font>
<br>
<br><font size=3>On 02/06/2013 10:13 AM, Prabath Siriwardena wrote:</font>
<br><font size=3><br>
</font>
<br><font size=3>On Wed, Feb 6, 2013 at 8:19 PM, Justin Richer &lt;</font><a href=mailto:jricher@mitre.org target=_blank><font size=3 color=blue><u>jricher@mitre.org</u></font></a><font size=3>&gt;
wrote:</font>
<br><font size=3>These are generally handled through a user interface where
the RO is authenticated directly to the AS, and there's not much need for
a &quot;protocol&quot; here, in practice. </font>
<br>
<br><font size=3>Why do you think leaving access token revocation by RO
to a proprietary API is a good practice ? IMO this an essential requirement
in API security.</font>
<br><font size=3>I think it makes more sense in the same way that having
a &quot;proprietary&quot; UI/API for managing the user consent makes sense:
unless you're doing a fully dynamic end-to-end system like UMA, then there's
not much value in trying to squeeze disparate systems into the same mold,
since they won't be talking to each other anyway. </font>
<br>
<br><font size=3>This is required in distributed setup for each API platform
from different vendors to perform in an interop manner.</font>
<br><font size=3>&nbsp;</font>
<br><font size=3><br>
And since you refer to it as an &quot;API&quot;, what will the RO be using
to call this API? Is there a token management client that's separate from
the OAuth client? </font>
<br>
<br><font size=3>I didn't get your question right... If you meant the how
to invoke revocation end point, the the resource owner needs to know the
consumer key (represents the OAuth Client app) &amp; scope to revoke the
access token for a given client.&nbsp;</font>
<br>
<br>
<br>
<br><font size=3>IMHO token revocation done my RO is more practical than
token revocation done by the Client.</font>
<br><font size=3>They're both valid but require different kinds of protocols
and considerations. This token revocation draft is meant to solve one problem,
and that doesn't mean it can or should solve other seemingly related problems.<br>
<br>
If you would like to see the RO-initiated token revocation go through (not
grant revocation, mind you -- that's related, but different), then I would
suggest that you start specifying exactly how that works. I predict it
will be problematic in practice, though, as the RO often doesn't actually
have direct access to the token itself. </font>
<br>
<br><font size=3>Resource owner needs to know the consumer key (represents
the OAuth Client app) &amp; scope to revoke the access token for a given
client.&nbsp;</font>
<br>
<br><font size=3>&nbsp;</font>
<br>
<br><font size=3>&nbsp;</font>
<br><font size=3>There are larger applications, like UMA, that have client
and PR provisioning that would allow for this to be managed somewhat programmatically,
but even in that case you're still generally doing token revocation by
a &quot;client&quot; in some fashion. In UMA, though, several different
pieces can play the role of a &quot;client&quot; at different parts of
the process.<br>
<br>
Revoking a scope is a whole different mess. Generally, you'd want to just
revoke an existing token and make a new authorization grant with lower
access if you don't want that client getting that scope anymore. If you
just want to downscope for a single transaction, you can already do that
with either the refresh token or token chaining approaches, depending on
where in the process you are. The latter of these are both client-focused,
though, and the RO doesn't have a direct hand in it at this point.</font>
<br>
<br><font size=3>Why do you think it a mess. If you revoke the entire token
then Client needs to go through the complete OAuth flow - and also needs
to get the user consent. If RO can &nbsp;downgrade the scope, then we restrict
API access by the client at RS end and its transparent to the client.</font>
<br>
<br>
<br><font size=3>Downgrading the scope of tokens in the wild is hardly
transparent to the client (stuff that it expects to work will suddenly
start to fail, meaning that most clients will throw out the token and try
to get a new one), and in a distributed system you've got to propagate
that change to the RS. If you bake the scopes into the token itself (which
many do) then you actually *can't* downgrade a single token, anyway. </font>
<br>
<br><font size=3>Yes.. that is the expected behavior. I mean the process
is transparent. Client will notice at runtime.</font>
<br>
<br><font size=3>Thanks &amp; regards,</font>
<br><font size=3>-Prabath</font>
<br><font size=3>&nbsp;</font>
<br><font size=3 color=#8f8f8f><br>
&nbsp;-- Justin</font>
<br><font size=3><br>
</font>
<br><font size=3>Thanks &amp; regards,</font>
<br><font size=3>-Prabath</font>
<br><font size=3>&nbsp;</font>
<br><font size=3 color=#8f8f8f><br>
<br>
&nbsp;-- Justin</font><font size=3> </font>
<br><font size=3><br>
</font>
<br><font size=3>On 02/06/2013 04:35 AM, Prabath Siriwardena wrote:</font>
<br><font size=3>I am sorry if this was already discussed in this list..&nbsp;</font>
<br>
<br><font size=3>Looking at [1] it only talks about revoking the access
token from the client.</font>
<br>
<br><font size=3>How about the resource owner..?</font>
<br>
<br><font size=3>There can be cases where resource owner needs to revoke
an authorized access token from a given client. Or revoke an scope..</font>
<br>
<br><font size=3>How are we going to address these requirements..? Thoughts
appreciated...</font>
<br>
<br><font size=3>[1] </font><a href="http://tools.ietf.org/html/draft-ietf-oauth-revocation-04" target=_blank><font size=3 color=blue><u>http://tools.ietf.org/html/draft-ietf-oauth-revocation-04</u></font></a>
<br>
<br><font size=3>-- <br>
Thanks &amp; Regards,<br>
Prabath </font>
<br>
<br><font size=3>Mobile : </font><a href=tel:%2B94%2071%20809%206732 target=_blank><font size=3 color=blue><u>+94
71 809 6732</u></font></a><font size=3>&nbsp;<br>
</font><font size=3 color=blue><u><br>
</u></font><a href=http://blog.facilelogin.com/ target=_blank><font size=3 color=blue><u>http://blog.facilelogin.com</u></font></a><font size=3 color=blue><u><br>
</u></font><a href=http://rampartfaq.com/ target=_blank><font size=3 color=blue><u>http://RampartFAQ.com</u></font></a>
<br><font size=3><br>
</font>
<br><tt><font size=3>_______________________________________________<br>
OAuth mailing list<br>
</font></tt><a href=mailto:OAuth@ietf.org target=_blank><tt><font size=3 color=blue><u>OAuth@ietf.org</u></font></tt></a><tt><font size=3><br>
</font></tt><a href=https://www.ietf.org/mailman/listinfo/oauth target=_blank><tt><font size=3 color=blue><u>https://www.ietf.org/mailman/listinfo/oauth</u></font></tt></a><tt><font size=3><br>
</font></tt>
<br>
<br><font size=3><br>
</font>
<br>
<br><font size=3>-- <br>
Thanks &amp; Regards,<br>
Prabath </font>
<br>
<br><font size=3>Mobile : </font><a href=tel:%2B94%2071%20809%206732 target=_blank><font size=3 color=blue><u>+94
71 809 6732</u></font></a><font size=3>&nbsp;<br>
</font><font size=3 color=blue><u><br>
</u></font><a href=http://blog.facilelogin.com/ target=_blank><font size=3 color=blue><u>http://blog.facilelogin.com</u></font></a><font size=3 color=blue><u><br>
</u></font><a href=http://rampartfaq.com/ target=_blank><font size=3 color=blue><u>http://RampartFAQ.com</u></font></a>
<br>
<br><font size=3><br>
</font>
<br>
<br><font size=3>-- <br>
Thanks &amp; Regards,<br>
Prabath</font>
<br>
<br><font size=3>Mobile : +94 71 809 6732&nbsp;<br>
</font><font size=3 color=blue><u><br>
</u></font><a href=http://blog.facilelogin.com/ target=_blank><font size=3 color=blue><u>http://blog.facilelogin.com</u></font></a><font size=3 color=blue><u><br>
</u></font><a href=http://rampartfaq.com/ target=_blank><font size=3 color=blue><u>http://RampartFAQ.com</u></font></a><tt><font size=2>_______________________________________________<br>
OAuth mailing list<br>
OAuth@ietf.org<br>
</font></tt><a href=https://www.ietf.org/mailman/listinfo/oauth><tt><font size=2>https://www.ietf.org/mailman/listinfo/oauth</font></tt></a><tt><font size=2><br>
</font></tt>
<br>
--=_alternative 0055864785257B0A_=--


From prabath@wso2.com  Wed Feb  6 07:34:33 2013
Return-Path: <prabath@wso2.com>
X-Original-To: oauth@ietfa.amsl.com
Delivered-To: oauth@ietfa.amsl.com
Received: from localhost (localhost [127.0.0.1]) by ietfa.amsl.com (Postfix) with ESMTP id 4541A21F8893 for <oauth@ietfa.amsl.com>; Wed,  6 Feb 2013 07:34:33 -0800 (PST)
X-Virus-Scanned: amavisd-new at amsl.com
X-Spam-Flag: NO
X-Spam-Score: -2.467
X-Spam-Level: 
X-Spam-Status: No, score=-2.467 tagged_above=-999 required=5 tests=[AWL=0.509,  BAYES_00=-2.599, FM_FORGED_GMAIL=0.622, HTML_MESSAGE=0.001, RCVD_IN_DNSWL_LOW=-1]
Received: from mail.ietf.org ([64.170.98.30]) by localhost (ietfa.amsl.com [127.0.0.1]) (amavisd-new, port 10024) with ESMTP id F5vuzsJMgswm for <oauth@ietfa.amsl.com>; Wed,  6 Feb 2013 07:34:32 -0800 (PST)
Received: from mail-ea0-f181.google.com (mail-ea0-f181.google.com [209.85.215.181]) by ietfa.amsl.com (Postfix) with ESMTP id 8A3C221F897A for <oauth@ietf.org>; Wed,  6 Feb 2013 07:34:31 -0800 (PST)
Received: by mail-ea0-f181.google.com with SMTP id i13so671045eaa.26 for <oauth@ietf.org>; Wed, 06 Feb 2013 07:34:30 -0800 (PST)
X-Google-DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=google.com; s=20120113; h=mime-version:x-received:in-reply-to:references:date:message-id :subject:from:to:cc:content-type:x-gm-message-state; bh=7IJA+kHYChNu8Rdxky5NCl7itvmL2VOsZhJgEtoPqhg=; b=Ke7bNyUjZxzIOQqyyOzA0IMhFX2ARS+OVgAA3mq6bPE8gRuJyVeHo3R6tEOvVzpHvs ugFHKdyRHD8GODeGz7Zg2j4bUSIfvH6lFUONczhhinx6o1qLc5c/q4tUPhFcE4FGfvl4 4JVXoGeIlz55O76qDOzz5ZRsA4h9eGLLhc5M0JpCsTK0cYyDPuZM3ghOx+Alf7U+xcu6 Bn4aBXeQ95RMFo6T7N75v3OjUnq3XzF3OPXu2ONm5UbPQg4qjPtAmW3Vq8rUxF8/1R6g vEYqGFLdEvuU4PaSBio6di61p6Gsz6yVcp7odq+5OX0bOd2cu8i/fnnGchav3SBgpko8 lDkw==
MIME-Version: 1.0
X-Received: by 10.14.211.137 with SMTP id w9mr97097235eeo.39.1360164870339; Wed, 06 Feb 2013 07:34:30 -0800 (PST)
Received: by 10.223.175.134 with HTTP; Wed, 6 Feb 2013 07:34:30 -0800 (PST)
In-Reply-To: <OFE5AD1D75.31752E83-ON85257B0A.00552A3B-85257B0A.0055358A@us.ibm.com>
References: <CAJV9qO8UgLV6SdegZSk4KT3Qyb-M2KmPFPV9xDht_WjibeUWrg@mail.gmail.com> <51126D65.2090707@mitre.org> <CAJV9qO-ZNVcbzNvb---CmXv+vo0jZHKQaDon8OqrPJCfAXKTRQ@mail.gmail.com> <5112746B.70403@mitre.org> <OFE5AD1D75.31752E83-ON85257B0A.00552A3B-85257B0A.0055358A@us.ibm.com>
Date: Wed, 6 Feb 2013 21:04:30 +0530
Message-ID: <CAJV9qO84D6ZxBHS_KG9t2LsC9V-nEdugS50QqhrT=9qU=kOH-A@mail.gmail.com>
From: Prabath Siriwardena <prabath@wso2.com>
To: Todd W Lainhart <lainhart@us.ibm.com>
Content-Type: multipart/alternative; boundary=047d7b624ab8eebcf604d5100f36
X-Gm-Message-State: ALoCoQkAhqVAchA/nNm6EbHUFE3mMxBfqAjdyTL4CPFWU4gUcfamA/QfFB54VXcIoS/wBbBelZaw
Cc: oauth-bounces@ietf.org, "oauth@ietf.org WG" <oauth@ietf.org>
Subject: Re: [OAUTH-WG] A question on token revocation.
X-BeenThere: oauth@ietf.org
X-Mailman-Version: 2.1.12
Precedence: list
List-Id: OAUTH WG <oauth.ietf.org>
List-Unsubscribe: <https://www.ietf.org/mailman/options/oauth>, <mailto:oauth-request@ietf.org?subject=unsubscribe>
List-Archive: <http://www.ietf.org/mail-archive/web/oauth>
List-Post: <mailto:oauth@ietf.org>
List-Help: <mailto:oauth-request@ietf.org?subject=help>
List-Subscribe: <https://www.ietf.org/mailman/listinfo/oauth>, <mailto:oauth-request@ietf.org?subject=subscribe>
X-List-Received-Date: Wed, 06 Feb 2013 15:34:33 -0000

--047d7b624ab8eebcf604d5100f36
Content-Type: text/plain; charset=ISO-8859-1

Sure that can done.. Do you see any issues having discuss that under the
same spec.. The purpose of both are the same. Only the actor differs.

Thanks & regards,
-Prabath

On Wed, Feb 6, 2013 at 9:00 PM, Todd W Lainhart <lainhart@us.ibm.com> wrote:

> > If you would like to see the RO-initiated token revocation go through
> (not grant revocation, mind you -- that's related, but different), then I
> would suggest that you start specifying exactly how that works.
>
> +1
>
>  *
>
>
> Todd Lainhart
> Rational software
> IBM Corporation
> 550 King Street, Littleton, MA 01460-1250**
> 1-978-899-4705
> 2-276-4705 (T/L)
> lainhart@us.ibm.com*
>
>
>
>
> From:        Justin Richer <jricher@mitre.org>
> To:        Prabath Siriwardena <prabath@wso2.com>,
> Cc:        "oauth@ietf.org WG" <oauth@ietf.org>
> Date:        02/06/2013 10:21 AM
> Subject:        Re: [OAUTH-WG] A question on token revocation.
> Sent by:        oauth-bounces@ietf.org
> ------------------------------
>
>
>
>
> On 02/06/2013 10:13 AM, Prabath Siriwardena wrote:
>
>
> On Wed, Feb 6, 2013 at 8:19 PM, Justin Richer <*jricher@mitre.org*<jricher@mitre.org>>
> wrote:
> These are generally handled through a user interface where the RO is
> authenticated directly to the AS, and there's not much need for a
> "protocol" here, in practice.
>
> Why do you think leaving access token revocation by RO to a proprietary
> API is a good practice ? IMO this an essential requirement in API security.
> I think it makes more sense in the same way that having a "proprietary"
> UI/API for managing the user consent makes sense: unless you're doing a
> fully dynamic end-to-end system like UMA, then there's not much value in
> trying to squeeze disparate systems into the same mold, since they won't be
> talking to each other anyway.
>
> And since you refer to it as an "API", what will the RO be using to call
> this API? Is there a token management client that's separate from the OAuth
> client?
>
>
> IMHO token revocation done my RO is more practical than token revocation
> done by the Client.
> They're both valid but require different kinds of protocols and
> considerations. This token revocation draft is meant to solve one problem,
> and that doesn't mean it can or should solve other seemingly related
> problems.
>
> If you would like to see the RO-initiated token revocation go through (not
> grant revocation, mind you -- that's related, but different), then I would
> suggest that you start specifying exactly how that works. I predict it will
> be problematic in practice, though, as the RO often doesn't actually have
> direct access to the token itself.
>
>
> There are larger applications, like UMA, that have client and PR
> provisioning that would allow for this to be managed somewhat
> programmatically, but even in that case you're still generally doing token
> revocation by a "client" in some fashion. In UMA, though, several different
> pieces can play the role of a "client" at different parts of the process.
>
> Revoking a scope is a whole different mess. Generally, you'd want to just
> revoke an existing token and make a new authorization grant with lower
> access if you don't want that client getting that scope anymore. If you
> just want to downscope for a single transaction, you can already do that
> with either the refresh token or token chaining approaches, depending on
> where in the process you are. The latter of these are both client-focused,
> though, and the RO doesn't have a direct hand in it at this point.
>
> Why do you think it a mess. If you revoke the entire token then Client
> needs to go through the complete OAuth flow - and also needs to get the
> user consent. If RO can  downgrade the scope, then we restrict API access
> by the client at RS end and its transparent to the client.
>
>
> Downgrading the scope of tokens in the wild is hardly transparent to the
> client (stuff that it expects to work will suddenly start to fail, meaning
> that most clients will throw out the token and try to get a new one), and
> in a distributed system you've got to propagate that change to the RS. If
> you bake the scopes into the token itself (which many do) then you actually
> *can't* downgrade a single token, anyway.
>
> -- Justin
>
> Thanks & regards,
> -Prabath
>
>
>
> -- Justin
>
>
> On 02/06/2013 04:35 AM, Prabath Siriwardena wrote:
> I am sorry if this was already discussed in this list..
>
> Looking at [1] it only talks about revoking the access token from the
> client.
>
> How about the resource owner..?
>
> There can be cases where resource owner needs to revoke an authorized
> access token from a given client. Or revoke an scope..
>
> How are we going to address these requirements..? Thoughts appreciated...
>
> [1] *http://tools.ietf.org/html/draft-ietf-oauth-revocation-04*<http://tools.ietf.org/html/draft-ietf-oauth-revocation-04>
>
> --
> Thanks & Regards,
> Prabath
>
> Mobile : *+94 71 809 6732* <%2B94%2071%20809%206732>
> *
> **http://blog.facilelogin.com* <http://blog.facilelogin.com/>*
> **http://RampartFAQ.com* <http://rampartfaq.com/>
>
>
> _______________________________________________
> OAuth mailing list
> *OAuth@ietf.org* <OAuth@ietf.org>
> *https://www.ietf.org/mailman/listinfo/oauth*<https://www.ietf.org/mailman/listinfo/oauth>
>
>
>
>
>
> --
> Thanks & Regards,
> Prabath
>
> Mobile : +94 71 809 6732
> *
> **http://blog.facilelogin.com* <http://blog.facilelogin.com/>*
> **http://RampartFAQ.com* <http://rampartfaq.com/>
> _______________________________________________
> OAuth mailing list
> OAuth@ietf.org
> https://www.ietf.org/mailman/listinfo/oauth
>
>


-- 
Thanks & Regards,
Prabath

Mobile : +94 71 809 6732

http://blog.facilelogin.com
http://RampartFAQ.com

--047d7b624ab8eebcf604d5100f36
Content-Type: text/html; charset=ISO-8859-1
Content-Transfer-Encoding: quoted-printable

Sure that can done.. Do you see any issues having discuss that under the sa=
me spec.. The purpose of both are the same. Only the actor differs.<div><br=
></div><div>Thanks &amp; regards,</div><div>-Prabath<br><br><div class=3D"g=
mail_quote">
On Wed, Feb 6, 2013 at 9:00 PM, Todd W Lainhart <span dir=3D"ltr">&lt;<a hr=
ef=3D"mailto:lainhart@us.ibm.com" target=3D"_blank">lainhart@us.ibm.com</a>=
&gt;</span> wrote:<br><blockquote class=3D"gmail_quote" style=3D"margin:0 0=
 0 .8ex;border-left:1px #ccc solid;padding-left:1ex">
<div class=3D"im"><font face=3D"sans-serif">&gt; </font><font size=3D"3">If=
 you would like
to see the RO-initiated token revocation go through (not grant revocation,
mind you -- that&#39;s related, but different), then I would suggest that y=
ou
start specifying exactly how that works.</font>
<br>
<br></div><font face=3D"sans-serif">+1<br>
</font><div class=3D"im">
<br>
<table width=3D"223" style=3D"border-collapse:collapse">
<tbody><tr height=3D"8">
<td width=3D"223" bgcolor=3D"white" style=3D"border-style:solid;border-colo=
r:#000000;border-width:0px 0px 0px 0px;padding:0px 0px"><font size=3D"1" fa=
ce=3D"Verdana"><b><br>
<br>
<br>
Todd Lainhart<br>
Rational software<br>
IBM Corporation<br>
550 King Street, Littleton, MA 01460-1250</b></font><font size=3D"1" face=
=3D"Arial"><b><br>
1-978-899-4705<br>
2-276-4705 (T/L)<br>
<a href=3D"mailto:lainhart@us.ibm.com" target=3D"_blank">lainhart@us.ibm.co=
m</a></b></font></td></tr></tbody></table>
<br>
<br>
<br>
<br>
<br></div><font size=3D"1" color=3D"#5f5f5f" face=3D"sans-serif">From: =A0 =
=A0 =A0
=A0</font><font size=3D"1" face=3D"sans-serif">Justin Richer &lt;<a href=3D=
"mailto:jricher@mitre.org" target=3D"_blank">jricher@mitre.org</a>&gt;</fon=
t>
<br><font size=3D"1" color=3D"#5f5f5f" face=3D"sans-serif">To: =A0 =A0 =A0
=A0</font><font size=3D"1" face=3D"sans-serif">Prabath Siriwardena
&lt;<a href=3D"mailto:prabath@wso2.com" target=3D"_blank">prabath@wso2.com<=
/a>&gt;, </font>
<br><font size=3D"1" color=3D"#5f5f5f" face=3D"sans-serif">Cc: =A0 =A0 =A0
=A0</font><font size=3D"1" face=3D"sans-serif">&quot;<a href=3D"mailto:oaut=
h@ietf.org" target=3D"_blank">oauth@ietf.org</a>
WG&quot; &lt;<a href=3D"mailto:oauth@ietf.org" target=3D"_blank">oauth@ietf=
.org</a>&gt;</font>
<br><font size=3D"1" color=3D"#5f5f5f" face=3D"sans-serif">Date: =A0 =A0 =
=A0
=A0</font><font size=3D"1" face=3D"sans-serif">02/06/2013 10:21 AM</font>
<br><div class=3D"im"><font size=3D"1" color=3D"#5f5f5f" face=3D"sans-serif=
">Subject: =A0 =A0
=A0 =A0</font><font size=3D"1" face=3D"sans-serif">Re: [OAUTH-WG]
A question on token revocation.</font>
<br></div><font size=3D"1" color=3D"#5f5f5f" face=3D"sans-serif">Sent by: =
=A0 =A0
=A0 =A0</font><font size=3D"1" face=3D"sans-serif"><a href=3D"mailto:oauth-=
bounces@ietf.org" target=3D"_blank">oauth-bounces@ietf.org</a></font>
<br>
<hr noshade><div class=3D"HOEnZb"><div class=3D"h5">
<br>
<br>
<br>
<br><font size=3D"3">On 02/06/2013 10:13 AM, Prabath Siriwardena wrote:</fo=
nt>
<br><font size=3D"3"><br>
</font>
<br><font size=3D"3">On Wed, Feb 6, 2013 at 8:19 PM, Justin Richer &lt;</fo=
nt><a href=3D"mailto:jricher@mitre.org" target=3D"_blank"><font size=3D"3" =
color=3D"blue"><u>jricher@mitre.org</u></font></a><font size=3D"3">&gt;
wrote:</font>
<br><font size=3D"3">These are generally handled through a user interface w=
here
the RO is authenticated directly to the AS, and there&#39;s not much need f=
or
a &quot;protocol&quot; here, in practice. </font>
<br>
<br><font size=3D"3">Why do you think leaving access token revocation by RO
to a proprietary API is a good practice ? IMO this an essential requirement
in API security.</font>
<br><font size=3D"3">I think it makes more sense in the same way that havin=
g
a &quot;proprietary&quot; UI/API for managing the user consent makes sense:
unless you&#39;re doing a fully dynamic end-to-end system like UMA, then th=
ere&#39;s
not much value in trying to squeeze disparate systems into the same mold,
since they won&#39;t be talking to each other anyway. <br>
<br>
And since you refer to it as an &quot;API&quot;, what will the RO be using
to call this API? Is there a token management client that&#39;s separate fr=
om
the OAuth client? <br>
</font>
<br>
<br><font size=3D"3">IMHO token revocation done my RO is more practical tha=
n
token revocation done by the Client.</font>
<br><font size=3D"3">They&#39;re both valid but require different kinds of =
protocols
and considerations. This token revocation draft is meant to solve one probl=
em,
and that doesn&#39;t mean it can or should solve other seemingly related pr=
oblems.<br>
<br>
If you would like to see the RO-initiated token revocation go through (not
grant revocation, mind you -- that&#39;s related, but different), then I wo=
uld
suggest that you start specifying exactly how that works. I predict it
will be problematic in practice, though, as the RO often doesn&#39;t actual=
ly
have direct access to the token itself. <br>
</font>
<br><font size=3D"3">=A0</font>
<br><font size=3D"3">There are larger applications, like UMA, that have cli=
ent
and PR provisioning that would allow for this to be managed somewhat progra=
mmatically,
but even in that case you&#39;re still generally doing token revocation by
a &quot;client&quot; in some fashion. In UMA, though, several different
pieces can play the role of a &quot;client&quot; at different parts of
the process.<br>
<br>
Revoking a scope is a whole different mess. Generally, you&#39;d want to ju=
st
revoke an existing token and make a new authorization grant with lower
access if you don&#39;t want that client getting that scope anymore. If you
just want to downscope for a single transaction, you can already do that
with either the refresh token or token chaining approaches, depending on
where in the process you are. The latter of these are both client-focused,
though, and the RO doesn&#39;t have a direct hand in it at this point.</fon=
t>
<br>
<br><font size=3D"3">Why do you think it a mess. If you revoke the entire t=
oken
then Client needs to go through the complete OAuth flow - and also needs
to get the user consent. If RO can =A0downgrade the scope, then we restrict
API access by the client at RS end and its transparent to the client.</font=
>
<br>
<br><font size=3D"3"><br>
Downgrading the scope of tokens in the wild is hardly transparent to the
client (stuff that it expects to work will suddenly start to fail, meaning
that most clients will throw out the token and try to get a new one), and
in a distributed system you&#39;ve got to propagate that change to the RS.
If you bake the scopes into the token itself (which many do) then you actua=
lly
*can&#39;t* downgrade a single token, anyway. <br>
<br>
 -- Justin<br>
</font>
<br><font size=3D"3">Thanks &amp; regards,</font>
<br><font size=3D"3">-Prabath</font>
<br><font size=3D"3">=A0</font>
<br><font size=3D"3" color=3D"#8f8f8f"><br>
<br>
 -- Justin</font><font size=3D"3"> </font>
<br><font size=3D"3"><br>
</font>
<br><font size=3D"3">On 02/06/2013 04:35 AM, Prabath Siriwardena wrote:</fo=
nt>
<br><font size=3D"3">I am sorry if this was already discussed in this list.=
.
</font>
<br>
<br><font size=3D"3">Looking at [1] it only talks about revoking the access
token from the client.</font>
<br>
<br><font size=3D"3">How about the resource owner..?</font>
<br>
<br><font size=3D"3">There can be cases where resource owner needs to revok=
e
an authorized access token from a given client. Or revoke an scope..</font>
<br>
<br><font size=3D"3">How are we going to address these requirements..? Thou=
ghts
appreciated...</font>
<br>
<br><font size=3D"3">[1] </font><a href=3D"http://tools.ietf.org/html/draft=
-ietf-oauth-revocation-04" target=3D"_blank"><font size=3D"3" color=3D"blue=
"><u>http://tools.ietf.org/html/draft-ietf-oauth-revocation-04</u></font></=
a>
<br>
<br><font size=3D"3">-- <br>
Thanks &amp; Regards,<br>
Prabath </font>
<br>
<br><font size=3D"3">Mobile : </font><a href=3D"tel:%2B94%2071%20809%206732=
" target=3D"_blank"><font size=3D"3" color=3D"blue"><u>+94
71 809 6732</u></font></a><font size=3D"3"> <br>
</font><font size=3D"3" color=3D"blue"><u><br>
</u></font><a href=3D"http://blog.facilelogin.com/" target=3D"_blank"><font=
 size=3D"3" color=3D"blue"><u>http://blog.facilelogin.com</u></font></a><fo=
nt size=3D"3" color=3D"blue"><u><br>
</u></font><a href=3D"http://rampartfaq.com/" target=3D"_blank"><font size=
=3D"3" color=3D"blue"><u>http://RampartFAQ.com</u></font></a>
<br><font size=3D"3"><br>
</font>
<br><tt><font size=3D"3">_______________________________________________<br=
>
OAuth mailing list<br>
</font></tt><a href=3D"mailto:OAuth@ietf.org" target=3D"_blank"><tt><font s=
ize=3D"3" color=3D"blue"><u>OAuth@ietf.org</u></font></tt></a><tt><font siz=
e=3D"3"><br>
</font></tt><a href=3D"https://www.ietf.org/mailman/listinfo/oauth" target=
=3D"_blank"><tt><font size=3D"3" color=3D"blue"><u>https://www.ietf.org/mai=
lman/listinfo/oauth</u></font></tt></a><tt><font size=3D"3"><br>
</font></tt>
<br>
<br><font size=3D"3"><br>
</font>
<br>
<br><font size=3D"3">-- <br>
Thanks &amp; Regards,<br>
Prabath </font>
<br>
<br><font size=3D"3">Mobile : <a href=3D"tel:%2B94%2071%20809%206732" value=
=3D"+94718096732" target=3D"_blank">+94 71 809 6732</a> <br>
</font><font size=3D"3" color=3D"blue"><u><br>
</u></font><a href=3D"http://blog.facilelogin.com/" target=3D"_blank"><font=
 size=3D"3" color=3D"blue"><u>http://blog.facilelogin.com</u></font></a><fo=
nt size=3D"3" color=3D"blue"><u><br>
</u></font><a href=3D"http://rampartfaq.com/" target=3D"_blank"><font size=
=3D"3" color=3D"blue"><u>http://RampartFAQ.com</u></font></a>
<br><tt><font>_______________________________________________<br>
OAuth mailing list<br>
<a href=3D"mailto:OAuth@ietf.org" target=3D"_blank">OAuth@ietf.org</a><br>
</font></tt><a href=3D"https://www.ietf.org/mailman/listinfo/oauth" target=
=3D"_blank"><tt><font>https://www.ietf.org/mailman/listinfo/oauth</font></t=
t></a><tt><font><br>
</font></tt>
<br></div></div></blockquote></div><br><br clear=3D"all"><div><br></div>-- =
<br>Thanks &amp; Regards,<br>Prabath<div><br></div><div>Mobile : +94 71 809=
 6732=A0<br><br><a href=3D"http://blog.facilelogin.com" target=3D"_blank">h=
ttp://blog.facilelogin.com</a><br>
<a href=3D"http://RampartFAQ.com" target=3D"_blank">http://RampartFAQ.com</=
a></div>
</div>

--047d7b624ab8eebcf604d5100f36--

From prabath@wso2.com  Wed Feb  6 07:37:12 2013
Return-Path: <prabath@wso2.com>
X-Original-To: oauth@ietfa.amsl.com
Delivered-To: oauth@ietfa.amsl.com
Received: from localhost (localhost [127.0.0.1]) by ietfa.amsl.com (Postfix) with ESMTP id 04F0821F84ED for <oauth@ietfa.amsl.com>; Wed,  6 Feb 2013 07:37:12 -0800 (PST)
X-Virus-Scanned: amavisd-new at amsl.com
X-Spam-Flag: NO
X-Spam-Score: -2.559
X-Spam-Level: 
X-Spam-Status: No, score=-2.559 tagged_above=-999 required=5 tests=[AWL=0.417,  BAYES_00=-2.599, FM_FORGED_GMAIL=0.622, HTML_MESSAGE=0.001, RCVD_IN_DNSWL_LOW=-1]
Received: from mail.ietf.org ([64.170.98.30]) by localhost (ietfa.amsl.com [127.0.0.1]) (amavisd-new, port 10024) with ESMTP id sOCl-fVGWu+M for <oauth@ietfa.amsl.com>; Wed,  6 Feb 2013 07:37:10 -0800 (PST)
Received: from mail-ea0-f177.google.com (mail-ea0-f177.google.com [209.85.215.177]) by ietfa.amsl.com (Postfix) with ESMTP id 5E67C21F875F for <oauth@ietf.org>; Wed,  6 Feb 2013 07:37:09 -0800 (PST)
Received: by mail-ea0-f177.google.com with SMTP id n13so611926eaa.36 for <oauth@ietf.org>; Wed, 06 Feb 2013 07:37:08 -0800 (PST)
X-Google-DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=google.com; s=20120113; h=mime-version:x-received:in-reply-to:references:date:message-id :subject:from:to:cc:content-type:x-gm-message-state; bh=WNRgh1aUuCXV0xEVRJ5esQuCtTm4U2nIbcK7e3d0Jo4=; b=lxoIz6lIu34kLykiVFcX96x5WWDwhJ+h+U57sdKLMWu8zIK0ujM+xST+IEC3cM1H9W URvkSmhCeQqxbFYzj3NYewUIZMLP2f98FkNjs8vVUn9R2IPZCPQwiXajWU2cxmkhK5l2 HllfOuLbQxraNne2nRKhtlbg+bQ/A8af86SqcY/dhUziDhThH3uhlrS2oQiXvTz+3GUj M25qzYB1WViNTA4rGO+mQqgZi+pxKYV65CsH1FW6Pfz/Mzg9vYwDWsszzk19ba0Mn1f2 s2v+MRQLJx2zq7rWOZjYCMVrhppRUYa/wUxMLiHBlcGh4CpafMntIz7KTVTUlNbn/qSU 7ymg==
MIME-Version: 1.0
X-Received: by 10.14.173.196 with SMTP id v44mr97503267eel.29.1360165028348; Wed, 06 Feb 2013 07:37:08 -0800 (PST)
Received: by 10.223.175.134 with HTTP; Wed, 6 Feb 2013 07:37:08 -0800 (PST)
In-Reply-To: <OF8CC0704A.7E320CB4-ON85257B0A.0055661B-85257B0A.00558648@us.ibm.com>
References: <CAJV9qO8UgLV6SdegZSk4KT3Qyb-M2KmPFPV9xDht_WjibeUWrg@mail.gmail.com> <51126D65.2090707@mitre.org> <CAJV9qO-ZNVcbzNvb---CmXv+vo0jZHKQaDon8OqrPJCfAXKTRQ@mail.gmail.com> <5112746B.70403@mitre.org> <CAJV9qO-mz=K_fJHO8g8XH8DtUxFPvN8hRF7K=gn0etAAqeb0zg@mail.gmail.com> <OF8CC0704A.7E320CB4-ON85257B0A.0055661B-85257B0A.00558648@us.ibm.com>
Date: Wed, 6 Feb 2013 21:07:08 +0530
Message-ID: <CAJV9qO-fM6JgHRzKOzJi00AcsnZCqO-i-YCM_uoRuB=HqWDg7A@mail.gmail.com>
From: Prabath Siriwardena <prabath@wso2.com>
To: Todd W Lainhart <lainhart@us.ibm.com>
Content-Type: multipart/alternative; boundary=047d7b60436859c55c04d51019f4
X-Gm-Message-State: ALoCoQlR4vHPB0C7WHgcr03YG46k0ZY+M/J3/5mKoR4sfpMXhB6g6yiOt6EwH3l745g2HHgxdrP1
Cc: oauth-bounces@ietf.org, "oauth@ietf.org WG" <oauth@ietf.org>
Subject: Re: [OAUTH-WG] A question on token revocation.
X-BeenThere: oauth@ietf.org
X-Mailman-Version: 2.1.12
Precedence: list
List-Id: OAUTH WG <oauth.ietf.org>
List-Unsubscribe: <https://www.ietf.org/mailman/options/oauth>, <mailto:oauth-request@ietf.org?subject=unsubscribe>
List-Archive: <http://www.ietf.org/mail-archive/web/oauth>
List-Post: <mailto:oauth@ietf.org>
List-Help: <mailto:oauth-request@ietf.org?subject=help>
List-Subscribe: <https://www.ietf.org/mailman/listinfo/oauth>, <mailto:oauth-request@ietf.org?subject=subscribe>
X-List-Received-Date: Wed, 06 Feb 2013 15:37:12 -0000

--047d7b60436859c55c04d51019f4
Content-Type: text/plain; charset=ISO-8859-1

On Wed, Feb 6, 2013 at 9:04 PM, Todd W Lainhart <lainhart@us.ibm.com> wrote:

> > Resource owner needs to know the consumer key (represents the OAuth
> Client app) & scope to revoke the access token for a given client.
>
> I see - you're saying that requiring client credentials on the end point
> is the problem?
>

In fact what I meant was - when RO authorizes the an access token for
client for particular scope. Those information are kept at the AS.

Now - if the RO want to revoke access from the client - the RO needs to
authenticate him self to the AS and pass the consumer key and the scope. So
AS can revoke access.

Thanks & regards,
-Prabath


>
>  *
>
>
> Todd Lainhart
> Rational software
> IBM Corporation
> 550 King Street, Littleton, MA 01460-1250**
> 1-978-899-4705
> 2-276-4705 (T/L)
> lainhart@us.ibm.com*
>
>
>
>
> From:        Prabath Siriwardena <prabath@wso2.com>
> To:        Justin Richer <jricher@mitre.org>,
> Cc:        "oauth@ietf.org WG" <oauth@ietf.org>
> Date:        02/06/2013 10:31 AM
> Subject:        Re: [OAUTH-WG] A question on token revocation.
> Sent by:        oauth-bounces@ietf.org
> ------------------------------
>
>
>
>
>
> On Wed, Feb 6, 2013 at 8:49 PM, Justin Richer <*jricher@mitre.org*<jricher@mitre.org>>
> wrote:
>
> On 02/06/2013 10:13 AM, Prabath Siriwardena wrote:
>
>
> On Wed, Feb 6, 2013 at 8:19 PM, Justin Richer <*jricher@mitre.org*<jricher@mitre.org>>
> wrote:
> These are generally handled through a user interface where the RO is
> authenticated directly to the AS, and there's not much need for a
> "protocol" here, in practice.
>
> Why do you think leaving access token revocation by RO to a proprietary
> API is a good practice ? IMO this an essential requirement in API security.
> I think it makes more sense in the same way that having a "proprietary"
> UI/API for managing the user consent makes sense: unless you're doing a
> fully dynamic end-to-end system like UMA, then there's not much value in
> trying to squeeze disparate systems into the same mold, since they won't be
> talking to each other anyway.
>
> This is required in distributed setup for each API platform from different
> vendors to perform in an interop manner.
>
>
> And since you refer to it as an "API", what will the RO be using to call
> this API? Is there a token management client that's separate from the OAuth
> client?
>
> I didn't get your question right... If you meant the how to invoke
> revocation end point, the the resource owner needs to know the consumer key
> (represents the OAuth Client app) & scope to revoke the access token for a
> given client.
>
>
>
> IMHO token revocation done my RO is more practical than token revocation
> done by the Client.
> They're both valid but require different kinds of protocols and
> considerations. This token revocation draft is meant to solve one problem,
> and that doesn't mean it can or should solve other seemingly related
> problems.
>
> If you would like to see the RO-initiated token revocation go through (not
> grant revocation, mind you -- that's related, but different), then I would
> suggest that you start specifying exactly how that works. I predict it will
> be problematic in practice, though, as the RO often doesn't actually have
> direct access to the token itself.
>
> Resource owner needs to know the consumer key (represents the OAuth Client
> app) & scope to revoke the access token for a given client.
>
>
>
>
> There are larger applications, like UMA, that have client and PR
> provisioning that would allow for this to be managed somewhat
> programmatically, but even in that case you're still generally doing token
> revocation by a "client" in some fashion. In UMA, though, several different
> pieces can play the role of a "client" at different parts of the process.
>
> Revoking a scope is a whole different mess. Generally, you'd want to just
> revoke an existing token and make a new authorization grant with lower
> access if you don't want that client getting that scope anymore. If you
> just want to downscope for a single transaction, you can already do that
> with either the refresh token or token chaining approaches, depending on
> where in the process you are. The latter of these are both client-focused,
> though, and the RO doesn't have a direct hand in it at this point.
>
> Why do you think it a mess. If you revoke the entire token then Client
> needs to go through the complete OAuth flow - and also needs to get the
> user consent. If RO can  downgrade the scope, then we restrict API access
> by the client at RS end and its transparent to the client.
>
>
> Downgrading the scope of tokens in the wild is hardly transparent to the
> client (stuff that it expects to work will suddenly start to fail, meaning
> that most clients will throw out the token and try to get a new one), and
> in a distributed system you've got to propagate that change to the RS. If
> you bake the scopes into the token itself (which many do) then you actually
> *can't* downgrade a single token, anyway.
>
> Yes.. that is the expected behavior. I mean the process is transparent.
> Client will notice at runtime.
>
> Thanks & regards,
> -Prabath
>
>
>  -- Justin
>
>
> Thanks & regards,
> -Prabath
>
>
>
>  -- Justin
>
>
> On 02/06/2013 04:35 AM, Prabath Siriwardena wrote:
> I am sorry if this was already discussed in this list..
>
> Looking at [1] it only talks about revoking the access token from the
> client.
>
> How about the resource owner..?
>
> There can be cases where resource owner needs to revoke an authorized
> access token from a given client. Or revoke an scope..
>
> How are we going to address these requirements..? Thoughts appreciated...
>
> [1] *http://tools.ietf.org/html/draft-ietf-oauth-revocation-04*<http://tools.ietf.org/html/draft-ietf-oauth-revocation-04>
>
> --
> Thanks & Regards,
> Prabath
>
> Mobile : *+94 71 809 6732* <%2B94%2071%20809%206732>
> *
> **http://blog.facilelogin.com* <http://blog.facilelogin.com/>*
> **http://RampartFAQ.com* <http://rampartfaq.com/>
>
>
> _______________________________________________
> OAuth mailing list
> *OAuth@ietf.org* <OAuth@ietf.org>
> *https://www.ietf.org/mailman/listinfo/oauth*<https://www.ietf.org/mailman/listinfo/oauth>
>
>
>
>
>
> --
> Thanks & Regards,
> Prabath
>
> Mobile : *+94 71 809 6732* <%2B94%2071%20809%206732>
> *
> **http://blog.facilelogin.com* <http://blog.facilelogin.com/>*
> **http://RampartFAQ.com* <http://rampartfaq.com/>
>
>
>
>
> --
> Thanks & Regards,
> Prabath
>
> Mobile : +94 71 809 6732
> *
> **http://blog.facilelogin.com* <http://blog.facilelogin.com/>*
> *
> *http://RampartFAQ.com* <http://rampartfaq.com/>
> _______________________________________________
> OAuth mailing list
> OAuth@ietf.org
> https://www.ietf.org/mailman/listinfo/oauth
>
>


-- 
Thanks & Regards,
Prabath

Mobile : +94 71 809 6732

http://blog.facilelogin.com
http://RampartFAQ.com

--047d7b60436859c55c04d51019f4
Content-Type: text/html; charset=ISO-8859-1
Content-Transfer-Encoding: quoted-printable

<br><br><div class=3D"gmail_quote">On Wed, Feb 6, 2013 at 9:04 PM, Todd W L=
ainhart <span dir=3D"ltr">&lt;<a href=3D"mailto:lainhart@us.ibm.com" target=
=3D"_blank">lainhart@us.ibm.com</a>&gt;</span> wrote:<br><blockquote class=
=3D"gmail_quote" style=3D"margin:0 0 0 .8ex;border-left:1px #ccc solid;padd=
ing-left:1ex">
<div class=3D"im"><font face=3D"sans-serif">&gt; </font><font size=3D"3">Re=
source owner
needs to know the consumer key (represents the OAuth Client app) &amp;
scope to revoke the access token for a given client.=A0</font>
<br>
<br></div><font face=3D"sans-serif">I see - you&#39;re saying that requirin=
g
client credentials on the end point is the problem?<br></font></blockquote>=
<div><br></div><div>In fact what I meant was - when RO authorizes the an ac=
cess token for client for particular scope. Those information are kept at t=
he AS.</div>
<div><br></div><div>Now - if the RO want to revoke access from the client -=
 the RO needs to authenticate him self to the AS and pass the consumer key =
and the scope. So AS can revoke access.</div><div><br></div><div>Thanks &am=
p; regards,</div>
<div>-Prabath</div><div>=A0</div><blockquote class=3D"gmail_quote" style=3D=
"margin:0 0 0 .8ex;border-left:1px #ccc solid;padding-left:1ex"><font face=
=3D"sans-serif">
</font><div class=3D"im">
<br>
<table width=3D"223" style=3D"border-collapse:collapse">
<tbody><tr height=3D"8">
<td width=3D"223" bgcolor=3D"white" style=3D"border-style:solid;border-colo=
r:#000000;border-width:0px 0px 0px 0px;padding:0px 0px"><font size=3D"1" fa=
ce=3D"Verdana"><b><br>
<br>
<br>
Todd Lainhart<br>
Rational software<br>
IBM Corporation<br>
550 King Street, Littleton, MA 01460-1250</b></font><font size=3D"1" face=
=3D"Arial"><b><br>
1-978-899-4705<br>
2-276-4705 (T/L)<br>
<a href=3D"mailto:lainhart@us.ibm.com" target=3D"_blank">lainhart@us.ibm.co=
m</a></b></font></td></tr></tbody></table>
<br>
<br>
<br>
<br>
<br></div><font size=3D"1" color=3D"#5f5f5f" face=3D"sans-serif">From: =A0 =
=A0 =A0
=A0</font><font size=3D"1" face=3D"sans-serif">Prabath Siriwardena
&lt;<a href=3D"mailto:prabath@wso2.com" target=3D"_blank">prabath@wso2.com<=
/a>&gt;</font>
<br><font size=3D"1" color=3D"#5f5f5f" face=3D"sans-serif">To: =A0 =A0 =A0
=A0</font><font size=3D"1" face=3D"sans-serif">Justin Richer &lt;<a href=3D=
"mailto:jricher@mitre.org" target=3D"_blank">jricher@mitre.org</a>&gt;,
</font>
<br><font size=3D"1" color=3D"#5f5f5f" face=3D"sans-serif">Cc: =A0 =A0 =A0
=A0</font><font size=3D"1" face=3D"sans-serif">&quot;<a href=3D"mailto:oaut=
h@ietf.org" target=3D"_blank">oauth@ietf.org</a>
WG&quot; &lt;<a href=3D"mailto:oauth@ietf.org" target=3D"_blank">oauth@ietf=
.org</a>&gt;</font>
<br><font size=3D"1" color=3D"#5f5f5f" face=3D"sans-serif">Date: =A0 =A0 =
=A0
=A0</font><font size=3D"1" face=3D"sans-serif">02/06/2013 10:31 AM</font>
<br><div class=3D"im"><font size=3D"1" color=3D"#5f5f5f" face=3D"sans-serif=
">Subject: =A0 =A0
=A0 =A0</font><font size=3D"1" face=3D"sans-serif">Re: [OAUTH-WG]
A question on token revocation.</font>
<br><font size=3D"1" color=3D"#5f5f5f" face=3D"sans-serif">Sent by: =A0 =A0
=A0 =A0</font><font size=3D"1" face=3D"sans-serif"><a href=3D"mailto:oauth-=
bounces@ietf.org" target=3D"_blank">oauth-bounces@ietf.org</a></font>
<br>
<hr noshade>
<br>
<br>
<br><font size=3D"3"><br>
</font>
<br></div><div><div class=3D"h5"><font size=3D"3">On Wed, Feb 6, 2013 at 8:=
49 PM, Justin Richer &lt;</font><a href=3D"mailto:jricher@mitre.org" target=
=3D"_blank"><font size=3D"3" color=3D"blue"><u>jricher@mitre.org</u></font>=
</a><font size=3D"3">&gt;
wrote:</font>
<br>
<br><font size=3D"3">On 02/06/2013 10:13 AM, Prabath Siriwardena wrote:</fo=
nt>
<br><font size=3D"3"><br>
</font>
<br><font size=3D"3">On Wed, Feb 6, 2013 at 8:19 PM, Justin Richer &lt;</fo=
nt><a href=3D"mailto:jricher@mitre.org" target=3D"_blank"><font size=3D"3" =
color=3D"blue"><u>jricher@mitre.org</u></font></a><font size=3D"3">&gt;
wrote:</font>
<br><font size=3D"3">These are generally handled through a user interface w=
here
the RO is authenticated directly to the AS, and there&#39;s not much need f=
or
a &quot;protocol&quot; here, in practice. </font>
<br>
<br><font size=3D"3">Why do you think leaving access token revocation by RO
to a proprietary API is a good practice ? IMO this an essential requirement
in API security.</font>
<br><font size=3D"3">I think it makes more sense in the same way that havin=
g
a &quot;proprietary&quot; UI/API for managing the user consent makes sense:
unless you&#39;re doing a fully dynamic end-to-end system like UMA, then th=
ere&#39;s
not much value in trying to squeeze disparate systems into the same mold,
since they won&#39;t be talking to each other anyway. </font>
<br>
<br><font size=3D"3">This is required in distributed setup for each API pla=
tform
from different vendors to perform in an interop manner.</font>
<br><font size=3D"3">=A0</font>
<br><font size=3D"3"><br>
And since you refer to it as an &quot;API&quot;, what will the RO be using
to call this API? Is there a token management client that&#39;s separate fr=
om
the OAuth client? </font>
<br>
<br><font size=3D"3">I didn&#39;t get your question right... If you meant t=
he how
to invoke revocation end point, the the resource owner needs to know the
consumer key (represents the OAuth Client app) &amp; scope to revoke the
access token for a given client.=A0</font>
<br>
<br>
<br>
<br><font size=3D"3">IMHO token revocation done my RO is more practical tha=
n
token revocation done by the Client.</font>
<br><font size=3D"3">They&#39;re both valid but require different kinds of =
protocols
and considerations. This token revocation draft is meant to solve one probl=
em,
and that doesn&#39;t mean it can or should solve other seemingly related pr=
oblems.<br>
<br>
If you would like to see the RO-initiated token revocation go through (not
grant revocation, mind you -- that&#39;s related, but different), then I wo=
uld
suggest that you start specifying exactly how that works. I predict it
will be problematic in practice, though, as the RO often doesn&#39;t actual=
ly
have direct access to the token itself. </font>
<br>
<br><font size=3D"3">Resource owner needs to know the consumer key (represe=
nts
the OAuth Client app) &amp; scope to revoke the access token for a given
client.=A0</font>
<br>
<br><font size=3D"3">=A0</font>
<br>
<br><font size=3D"3">=A0</font>
<br><font size=3D"3">There are larger applications, like UMA, that have cli=
ent
and PR provisioning that would allow for this to be managed somewhat progra=
mmatically,
but even in that case you&#39;re still generally doing token revocation by
a &quot;client&quot; in some fashion. In UMA, though, several different
pieces can play the role of a &quot;client&quot; at different parts of
the process.<br>
<br>
Revoking a scope is a whole different mess. Generally, you&#39;d want to ju=
st
revoke an existing token and make a new authorization grant with lower
access if you don&#39;t want that client getting that scope anymore. If you
just want to downscope for a single transaction, you can already do that
with either the refresh token or token chaining approaches, depending on
where in the process you are. The latter of these are both client-focused,
though, and the RO doesn&#39;t have a direct hand in it at this point.</fon=
t>
<br>
<br><font size=3D"3">Why do you think it a mess. If you revoke the entire t=
oken
then Client needs to go through the complete OAuth flow - and also needs
to get the user consent. If RO can =A0downgrade the scope, then we restrict
API access by the client at RS end and its transparent to the client.</font=
>
<br>
<br>
<br><font size=3D"3">Downgrading the scope of tokens in the wild is hardly
transparent to the client (stuff that it expects to work will suddenly
start to fail, meaning that most clients will throw out the token and try
to get a new one), and in a distributed system you&#39;ve got to propagate
that change to the RS. If you bake the scopes into the token itself (which
many do) then you actually *can&#39;t* downgrade a single token, anyway. </=
font>
<br>
<br><font size=3D"3">Yes.. that is the expected behavior. I mean the proces=
s
is transparent. Client will notice at runtime.</font>
<br>
<br><font size=3D"3">Thanks &amp; regards,</font>
<br><font size=3D"3">-Prabath</font>
<br><font size=3D"3">=A0</font>
<br><font size=3D"3" color=3D"#8f8f8f"><br>
=A0-- Justin</font>
<br><font size=3D"3"><br>
</font>
<br><font size=3D"3">Thanks &amp; regards,</font>
<br><font size=3D"3">-Prabath</font>
<br><font size=3D"3">=A0</font>
<br><font size=3D"3" color=3D"#8f8f8f"><br>
<br>
=A0-- Justin</font><font size=3D"3"> </font>
<br><font size=3D"3"><br>
</font>
<br><font size=3D"3">On 02/06/2013 04:35 AM, Prabath Siriwardena wrote:</fo=
nt>
<br><font size=3D"3">I am sorry if this was already discussed in this list.=
.=A0</font>
<br>
<br><font size=3D"3">Looking at [1] it only talks about revoking the access
token from the client.</font>
<br>
<br><font size=3D"3">How about the resource owner..?</font>
<br>
<br><font size=3D"3">There can be cases where resource owner needs to revok=
e
an authorized access token from a given client. Or revoke an scope..</font>
<br>
<br><font size=3D"3">How are we going to address these requirements..? Thou=
ghts
appreciated...</font>
<br>
<br><font size=3D"3">[1] </font><a href=3D"http://tools.ietf.org/html/draft=
-ietf-oauth-revocation-04" target=3D"_blank"><font size=3D"3" color=3D"blue=
"><u>http://tools.ietf.org/html/draft-ietf-oauth-revocation-04</u></font></=
a>
<br>
<br><font size=3D"3">-- <br>
Thanks &amp; Regards,<br>
Prabath </font>
<br>
<br><font size=3D"3">Mobile : </font><a href=3D"tel:%2B94%2071%20809%206732=
" target=3D"_blank"><font size=3D"3" color=3D"blue"><u>+94
71 809 6732</u></font></a><font size=3D"3">=A0<br>
</font><font size=3D"3" color=3D"blue"><u><br>
</u></font><a href=3D"http://blog.facilelogin.com/" target=3D"_blank"><font=
 size=3D"3" color=3D"blue"><u>http://blog.facilelogin.com</u></font></a><fo=
nt size=3D"3" color=3D"blue"><u><br>
</u></font><a href=3D"http://rampartfaq.com/" target=3D"_blank"><font size=
=3D"3" color=3D"blue"><u>http://RampartFAQ.com</u></font></a>
<br><font size=3D"3"><br>
</font>
<br><tt><font size=3D"3">_______________________________________________<br=
>
OAuth mailing list<br>
</font></tt><a href=3D"mailto:OAuth@ietf.org" target=3D"_blank"><tt><font s=
ize=3D"3" color=3D"blue"><u>OAuth@ietf.org</u></font></tt></a><tt><font siz=
e=3D"3"><br>
</font></tt><a href=3D"https://www.ietf.org/mailman/listinfo/oauth" target=
=3D"_blank"><tt><font size=3D"3" color=3D"blue"><u>https://www.ietf.org/mai=
lman/listinfo/oauth</u></font></tt></a><tt><font size=3D"3"><br>
</font></tt>
<br>
<br><font size=3D"3"><br>
</font>
<br>
<br><font size=3D"3">-- <br>
Thanks &amp; Regards,<br>
Prabath </font>
<br>
<br><font size=3D"3">Mobile : </font><a href=3D"tel:%2B94%2071%20809%206732=
" target=3D"_blank"><font size=3D"3" color=3D"blue"><u>+94
71 809 6732</u></font></a><font size=3D"3">=A0<br>
</font><font size=3D"3" color=3D"blue"><u><br>
</u></font><a href=3D"http://blog.facilelogin.com/" target=3D"_blank"><font=
 size=3D"3" color=3D"blue"><u>http://blog.facilelogin.com</u></font></a><fo=
nt size=3D"3" color=3D"blue"><u><br>
</u></font><a href=3D"http://rampartfaq.com/" target=3D"_blank"><font size=
=3D"3" color=3D"blue"><u>http://RampartFAQ.com</u></font></a>
<br>
<br><font size=3D"3"><br>
</font>
<br>
<br><font size=3D"3">-- <br>
Thanks &amp; Regards,<br>
Prabath</font>
<br>
<br><font size=3D"3">Mobile : <a href=3D"tel:%2B94%2071%20809%206732" value=
=3D"+94718096732" target=3D"_blank">+94 71 809 6732</a>=A0<br>
</font><font size=3D"3" color=3D"blue"><u><br>
</u></font><a href=3D"http://blog.facilelogin.com/" target=3D"_blank"><font=
 size=3D"3" color=3D"blue"><u>http://blog.facilelogin.com</u></font></a><fo=
nt size=3D"3" color=3D"blue"><u><br>
</u></font></div></div><a href=3D"http://rampartfaq.com/" target=3D"_blank"=
><font size=3D"3" color=3D"blue"><u>http://RampartFAQ.com</u></font></a><tt=
><font>_______________________________________________<br>
OAuth mailing list<br>
<a href=3D"mailto:OAuth@ietf.org" target=3D"_blank">OAuth@ietf.org</a><br>
</font></tt><a href=3D"https://www.ietf.org/mailman/listinfo/oauth" target=
=3D"_blank"><tt><font>https://www.ietf.org/mailman/listinfo/oauth</font></t=
t></a><tt><font><br>
</font></tt>
<br></blockquote></div><br><br clear=3D"all"><div><br></div>-- <br>Thanks &=
amp; Regards,<br>Prabath<div><br></div><div>Mobile : +94 71 809 6732=A0<br>=
<br><a href=3D"http://blog.facilelogin.com" target=3D"_blank">http://blog.f=
acilelogin.com</a><br>
<a href=3D"http://RampartFAQ.com" target=3D"_blank">http://RampartFAQ.com</=
a></div>

--047d7b60436859c55c04d51019f4--

From Adam.Lewis@motorolasolutions.com  Wed Feb  6 08:05:27 2013
Return-Path: <Adam.Lewis@motorolasolutions.com>
X-Original-To: oauth@ietfa.amsl.com
Delivered-To: oauth@ietfa.amsl.com
Received: from localhost (localhost [127.0.0.1]) by ietfa.amsl.com (Postfix) with ESMTP id 722F821F8947 for <oauth@ietfa.amsl.com>; Wed,  6 Feb 2013 08:05:27 -0800 (PST)
X-Virus-Scanned: amavisd-new at amsl.com
X-Spam-Flag: NO
X-Spam-Score: -1.516
X-Spam-Level: 
X-Spam-Status: No, score=-1.516 tagged_above=-999 required=5 tests=[AWL=-1.650, BAYES_00=-2.599, HTML_MESSAGE=0.001, J_CHICKENPOX_210=0.6, RCVD_IN_DNSWL_LOW=-1, UNRESOLVED_TEMPLATE=3.132]
Received: from mail.ietf.org ([64.170.98.30]) by localhost (ietfa.amsl.com [127.0.0.1]) (amavisd-new, port 10024) with ESMTP id 1rLPKudIRq62 for <oauth@ietfa.amsl.com>; Wed,  6 Feb 2013 08:05:22 -0800 (PST)
Received: from va3outboundpool.messaging.microsoft.com (va3ehsobe002.messaging.microsoft.com [216.32.180.12]) by ietfa.amsl.com (Postfix) with ESMTP id 24B0A21F87FF for <oauth@ietf.org>; Wed,  6 Feb 2013 08:05:21 -0800 (PST)
Received: from mail131-va3-R.bigfish.com (10.7.14.246) by VA3EHSOBE011.bigfish.com (10.7.40.61) with Microsoft SMTP Server id 14.1.225.23; Wed, 6 Feb 2013 16:05:20 +0000
Received: from mail131-va3 (localhost [127.0.0.1])	by mail131-va3-R.bigfish.com (Postfix) with ESMTP id D51CC240160	for <oauth@ietf.org>; Wed,  6 Feb 2013 16:05:20 +0000 (UTC)
X-Forefront-Antispam-Report: CIP:129.188.136.17; KIP:(null); UIP:(null); IPV:NLI; H:il06msg01.mot-solutions.com; RD:none; EFVD:NLI
X-SpamScore: -25
X-BigFish: VPS-25(zzbb2dI98dI9371Ic89bh936eI1b0bId772hc857hzz1ee6h1de0h1202h1e76h1d1ah1d2ahzz1033IL177df4h17326ah8275bh8275dh18c673hz2fh2a8h683h839hd25hf0ah1288h12a5h12bdh137ah1441h1504h1537h153bh15d0h162dh1631h1758h18e1h1946h19b5h1155h)
Received-SPF: pass (mail131-va3: domain of motorolasolutions.com designates 129.188.136.17 as permitted sender) client-ip=129.188.136.17; envelope-from=Adam.Lewis@motorolasolutions.com; helo=il06msg01.mot-solutions.com ; olutions.com ; 
X-Forefront-Antispam-Report-Untrusted: CIP:157.56.237.133; KIP:(null); UIP:(null); (null); H:BY2PRD0411HT005.namprd04.prod.outlook.com; R:internal; EFV:INT
Received: from mail131-va3 (localhost.localdomain [127.0.0.1]) by mail131-va3 (MessageSwitch) id 1360166716798860_17240; Wed,  6 Feb 2013 16:05:16 +0000 (UTC)
Received: from VA3EHSMHS001.bigfish.com (unknown [10.7.14.251])	by mail131-va3.bigfish.com (Postfix) with ESMTP id B3951C00A8	for <oauth@ietf.org>; Wed,  6 Feb 2013 16:05:16 +0000 (UTC)
Received: from il06msg01.mot-solutions.com (129.188.136.17) by VA3EHSMHS001.bigfish.com (10.7.99.11) with Microsoft SMTP Server (TLS) id 14.1.225.23; Wed, 6 Feb 2013 16:05:16 +0000
Received: from il06msg01.mot-solutions.com (il06vts02.mot.com [129.188.137.142])	by il06msg01.mot-solutions.com (8.14.3/8.14.3) with ESMTP id r16H349a012958	for <oauth@ietf.org>; Wed, 6 Feb 2013 11:03:04 -0600 (CST)
Received: from CO9EHSOBE013.bigfish.com (co9ehsobe002.messaging.microsoft.com [207.46.163.25])	by il06msg01.mot-solutions.com (8.14.3/8.14.3) with ESMTP id r16H33ci012947	(version=TLSv1/SSLv3 cipher=AES128-SHA bits=128 verify=FAIL) for <oauth@ietf.org>; Wed, 6 Feb 2013 11:03:04 -0600 (CST)
Received: from mail154-co9-R.bigfish.com (10.236.132.231) by CO9EHSOBE013.bigfish.com (10.236.130.76) with Microsoft SMTP Server id 14.1.225.23; Wed, 6 Feb 2013 16:05:14 +0000
Received: from mail154-co9 (localhost [127.0.0.1])	by mail154-co9-R.bigfish.com (Postfix) with ESMTP id 924FA4202E8	for <oauth@ietf.org.FOPE.CONNECTOR.OVERRIDE>; Wed,  6 Feb 2013 16:05:14 +0000 (UTC)
Received: from mail154-co9 (localhost.localdomain [127.0.0.1]) by mail154-co9 (MessageSwitch) id 1360166711934037_31729; Wed,  6 Feb 2013 16:05:11 +0000 (UTC)
Received: from CO9EHSMHS007.bigfish.com (unknown [10.236.132.241])	by mail154-co9.bigfish.com (Postfix) with ESMTP id DF5F52C0072; Wed,  6 Feb 2013 16:05:11 +0000 (UTC)
Received: from BY2PRD0411HT005.namprd04.prod.outlook.com (157.56.237.133) by CO9EHSMHS007.bigfish.com (10.236.130.17) with Microsoft SMTP Server (TLS) id 14.1.225.23; Wed, 6 Feb 2013 16:05:11 +0000
Received: from BY2PRD0411MB441.namprd04.prod.outlook.com ([169.254.5.124]) by BY2PRD0411HT005.namprd04.prod.outlook.com ([10.255.128.40]) with mapi id 14.16.0263.000; Wed, 6 Feb 2013 16:05:09 +0000
From: Lewis Adam-CAL022 <Adam.Lewis@motorolasolutions.com>
To: William Mills <wmills_92105@yahoo.com>, Tim Bray <twbray@google.com>
Thread-Topic: [OAUTH-WG] Why OAuth it self is not an authentication framework ?
Thread-Index: AQHOBAO7HOBDv8jxSkeu2jMRVB/25Jhs+8eAgAADjVA=
Date: Wed, 6 Feb 2013 16:05:08 +0000
Message-ID: <59E470B10C4630419ED717AC79FCF9A9483E7E50@BY2PRD0411MB441.namprd04.prod.outlook.com>
References: <CAJV9qO_J1-AhGB=XST0R-kwAd-9hjUbCJ4ieBPoE_OMe760mqg@mail.gmail.com> <73B7EC23-AA93-42EE-B3EB-35BA1B82558F@ve7jtb.com> <511175AA.9030301@gmail.com> <1360099372.47338.YahooMailNeo@web31807.mail.mud.yahoo.com> <CA+ZpN27GnnU6w5Dnth4zfsa+nMhi6Rsyqmq-tYOqG54+Sh-9ww@mail.gmail.com> <59E470B10C4630419ED717AC79FCF9A9483E7B3D@BY2PRD0411MB441.namprd04.prod.outlook.com> <1360111712.54487.YahooMailNeo@web31812.mail.mud.yahoo.com> 
Accept-Language: en-US
Content-Language: en-US
X-MS-Has-Attach: 
X-MS-TNEF-Correlator: 
x-originating-ip: [150.130.10.219]
Content-Type: multipart/alternative; boundary="_000_59E470B10C4630419ED717AC79FCF9A9483E7E50BY2PRD0411MB441_"
MIME-Version: 1.0
X-FOPE-CONNECTOR: Id%0$Dn%*$RO%0$TLS%0$FQDN%$TlsDn%
X-FOPE-CONNECTOR: Id%1294$Dn%YAHOO.COM$RO%2$TLS%3$FQDN%msgate.mot-solutions.com$TlsDn%
X-FOPE-CONNECTOR: Id%1294$Dn%GOOGLE.COM$RO%2$TLS%3$FQDN%msgate.mot-solutions.com$TlsDn%
X-FOPE-CONNECTOR: Id%1294$Dn%IETF.ORG$RO%2$TLS%3$FQDN%msgate.mot-solutions.com$TlsDn%
X-CFilter-Loop: Reflected
X-OriginatorOrg: motorolasolutions.com
Cc: "oauth@ietf.org WG" <oauth@ietf.org>
Subject: Re: [OAUTH-WG] Why OAuth it self is not an authentication framework ?
X-BeenThere: oauth@ietf.org
X-Mailman-Version: 2.1.12
Precedence: list
List-Id: OAUTH WG <oauth.ietf.org>
List-Unsubscribe: <https://www.ietf.org/mailman/options/oauth>, <mailto:oauth-request@ietf.org?subject=unsubscribe>
List-Archive: <http://www.ietf.org/mail-archive/web/oauth>
List-Post: <mailto:oauth@ietf.org>
List-Help: <mailto:oauth-request@ietf.org?subject=help>
List-Subscribe: <https://www.ietf.org/mailman/listinfo/oauth>, <mailto:oauth-request@ietf.org?subject=subscribe>
X-List-Received-Date: Wed, 06 Feb 2013 16:05:27 -0000

--_000_59E470B10C4630419ED717AC79FCF9A9483E7E50BY2PRD0411MB441_
Content-Type: text/plain; charset="utf-8"
Content-Transfer-Encoding: base64
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--_000_59E470B10C4630419ED717AC79FCF9A9483E7E50BY2PRD0411MB441_
Content-Type: text/html; charset="utf-8"
Content-Transfer-Encoding: base64
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--_000_59E470B10C4630419ED717AC79FCF9A9483E7E50BY2PRD0411MB441_--

From ve7jtb@ve7jtb.com  Wed Feb  6 08:21:59 2013
Return-Path: <ve7jtb@ve7jtb.com>
X-Original-To: oauth@ietfa.amsl.com
Delivered-To: oauth@ietfa.amsl.com
Received: from localhost (localhost [127.0.0.1]) by ietfa.amsl.com (Postfix) with ESMTP id 3222721F879E for <oauth@ietfa.amsl.com>; Wed,  6 Feb 2013 08:21:59 -0800 (PST)
X-Virus-Scanned: amavisd-new at amsl.com
X-Spam-Flag: NO
X-Spam-Score: -3.148
X-Spam-Level: 
X-Spam-Status: No, score=-3.148 tagged_above=-999 required=5 tests=[AWL=-0.150, BAYES_00=-2.599, HTML_MESSAGE=0.001, J_CHICKENPOX_210=0.6, RCVD_IN_DNSWL_LOW=-1]
Received: from mail.ietf.org ([64.170.98.30]) by localhost (ietfa.amsl.com [127.0.0.1]) (amavisd-new, port 10024) with ESMTP id e3YAc0VuIITB for <oauth@ietfa.amsl.com>; Wed,  6 Feb 2013 08:21:56 -0800 (PST)
Received: from mail-ob0-f169.google.com (mail-ob0-f169.google.com [209.85.214.169]) by ietfa.amsl.com (Postfix) with ESMTP id 616F921F8715 for <oauth@ietf.org>; Wed,  6 Feb 2013 08:21:55 -0800 (PST)
Received: by mail-ob0-f169.google.com with SMTP id ta14so1648605obb.0 for <oauth@ietf.org>; Wed, 06 Feb 2013 08:21:54 -0800 (PST)
X-Google-DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=google.com; s=20120113; h=x-received:content-type:mime-version:subject:from:in-reply-to:date :cc:message-id:references:to:x-mailer:x-gm-message-state; bh=3dYtosZyuZo8zqG+Hb3vZz1Hy89DoR6tFd86sUT0FzQ=; b=bg2yGxoIU3lX8MSR+FyUWjNx5AC0uqkaiLrYj44lYqS1DFQfI5MW+ecBLWgVUTTIxr rRCyq3x7INy2MZ44/YYl3kL9/S+0IGjZs6U3UO7yNS/vwaM4FHjSk5CJ8OjMio7oCHZv apVI9hdPWLmDDSEXOo6L45lqUXDFQia0TO5GZCu52kBEcVbD3m2JJkhRlp+oDrg152Hl p5LLMln6cor1ZMaCn8P348cCwdsWTVAnaQez6EFFnCJ3jp1prS+FSTGTOE5d7QlKCepa Z+MTdYC2lvWg60uxmvCD7Ph8wweNPlVq1Q//ddzCMyyO9pH32zW0p21BydqjtQfWehk5 aeqQ==
X-Received: by 10.60.32.84 with SMTP id g20mr4622536oei.42.1360167714779; Wed, 06 Feb 2013 08:21:54 -0800 (PST)
Received: from [10.37.15.80] ([96.8.44.21]) by mx.google.com with ESMTPS id dl6sm29747856obb.5.2013.02.06.08.21.51 (version=TLSv1 cipher=ECDHE-RSA-RC4-SHA bits=128/128); Wed, 06 Feb 2013 08:21:53 -0800 (PST)
Content-Type: multipart/signed; boundary="Apple-Mail=_2029DE69-EFBF-41E5-A6CB-1B623885D36E"; protocol="application/pkcs7-signature"; micalg=sha1
Mime-Version: 1.0 (Mac OS X Mail 6.2 \(1499\))
From: John Bradley <ve7jtb@ve7jtb.com>
In-Reply-To: <59E470B10C4630419ED717AC79FCF9A9483E7E50@BY2PRD0411MB441.namprd04.prod.outlook.com>
Date: Wed, 6 Feb 2013 09:21:48 -0700
Message-Id: <E52E0947-31AE-4F33-BE7E-4D3D6E8D2FFB@ve7jtb.com>
References: <CAJV9qO_J1-AhGB=XST0R-kwAd-9hjUbCJ4ieBPoE_OMe760mqg@mail.gmail.com> <73B7EC23-AA93-42EE-B3EB-35BA1B82558F@ve7jtb.com> <511175AA.9030301@gmail.com> <1360099372.47338.YahooMailNeo@web31807.mail.mud.yahoo.com> <CA+ZpN27GnnU6w5Dnth4zfsa+nMhi6Rsyqmq-tYOqG54+Sh-9ww@mail.gmail.com> <59E470B10C4630419ED717AC79FCF9A9483E7B3D@BY2PRD0411MB441.namprd04.prod.outlook.com> <1360111712.54487.YahooMailNeo@web31812.mail.mud.yahoo.com> <59E470B10C4630419ED717AC79FCF9A9483E7E50@BY2PRD0411MB441.namprd04.prod.outlook.com>
To: Lewis Adam-CAL022 <Adam.Lewis@motorolasolutions.com>
X-Mailer: Apple Mail (2.1499)
X-Gm-Message-State: ALoCoQm92hoKcp5/dVg+LRxKVi4XS6Ztl+s1x6xbbu4c9Sphzr+O+8lkMqT2Y1P3r2JiUWBmz2J6
Cc: "oauth@ietf.org WG" <oauth@ietf.org>
Subject: Re: [OAUTH-WG] Why OAuth it self is not an authentication framework ?
X-BeenThere: oauth@ietf.org
X-Mailman-Version: 2.1.12
Precedence: list
List-Id: OAUTH WG <oauth.ietf.org>
List-Unsubscribe: <https://www.ietf.org/mailman/options/oauth>, <mailto:oauth-request@ietf.org?subject=unsubscribe>
List-Archive: <http://www.ietf.org/mail-archive/web/oauth>
List-Post: <mailto:oauth@ietf.org>
List-Help: <mailto:oauth-request@ietf.org?subject=help>
List-Subscribe: <https://www.ietf.org/mailman/listinfo/oauth>, <mailto:oauth-request@ietf.org?subject=subscribe>
X-List-Received-Date: Wed, 06 Feb 2013 16:21:59 -0000

--Apple-Mail=_2029DE69-EFBF-41E5-A6CB-1B623885D36E
Content-Type: multipart/alternative;
	boundary="Apple-Mail=_03D00D03-26D7-4694-A2F6-AE4E72199A00"


--Apple-Mail=_03D00D03-26D7-4694-A2F6-AE4E72199A00
Content-Transfer-Encoding: quoted-printable
Content-Type: text/plain;
	charset=windows-1252

Adam,

We have made some changes in the latest draft to address some input from =
Google that I think may also address your need to using the id_token in =
an assertion or possibly as an access token to a federated RS.

I can go over it with you if you like.

John B.

On 2013-02-06, at 9:05 AM, Lewis Adam-CAL022 =
<Adam.Lewis@motorolasolutions.com> wrote:

> Hi Bill,
> =20
> My reason for using OAuth rather than OIDC is because the id_token in =
OIDC is audience restricted to the client.  This was clearly intended =
for WebSSO / authentication to a client running on a web server.  It =
does not help the case where the user of a RESTful native client want to =
authenticate to a RESTful web service.=20
> =20
> I agree that OAuth lacks a =93defined=94 way to communicate what is in =
the AT (as OAuth does not define the content of the AT), but within an =
enterprise domain this is easy to solve by profiling.  And in any =
implementation of OAuth on the Internet, the AT must at some level =
identify the user to the RS.  Otherwise how else would the RS know who=92s=
 protected resources the client is trying to access?  Now whether the RS =
learns that through introspection or by parsing a JWT-structured AT is =
of course not defined.  But at the end of the day, the AT definitely (in =
all cases that I can think of) identifies the user.=20
> =20
> I am open minded to using OIDC if in the future if the client can =
request an id_token that is audience restricted to the RS it is going to =
communicate.  In other words, yes I agree that OIDC is the preferred =
mechanism for performing =93user authentication to a client,=94 but I =
also argue that OAuth is the best method to perform =93user =
authentication to an RS=94 (if you want to get your RS out of the =
password consumption business).  I am not at all advocating OAuth for =
authentication to a client.=20
> =20
> -adam
> =20
> From: William Mills [mailto:wmills_92105@yahoo.com]=20
> Sent: Tuesday, February 05, 2013 6:49 PM
> To: Lewis Adam-CAL022; Tim Bray
> Cc: "WG <oauth@ietf.org>"@il06exr02.mot.com
> Subject: Re: [OAUTH-WG] Why OAuth it self is not an authentication =
framework ?
> =20
> Why use OAuth when OpenID does everything that OAuth can do as an =
authentication method and does a few things much better?
> =20
> Specifically OAuth lacks any defined way to:
> =20
> -    feed back any additional information like the real user ID (as =
opposed to what the entered)
> -    bound an authentication event in time
> -    provide any form of additional SSO payload like a display name =
for the user
> =20
> there's probably other things.
> =20
> It'll mostly work but there are things it doesn't do.  Could you solve =
some of the rest of this with token introspection or a user API that the =
RP could use to fetch user info, sure, but why rebuild OpenID when =
OpenID exists?
> =20
> -bill
> =20
> =20
> From: Lewis Adam-CAL022 <Adam.Lewis@motorolasolutions.com>
> To: Tim Bray <twbray@google.com>; William Mills =
<wmills_92105@yahoo.com>=20
> Cc: "oauth@ietf.org WG" <oauth@ietf.org>=20
> Sent: Tuesday, February 5, 2013 2:27 PM
> Subject: RE: [OAUTH-WG] Why OAuth it self is not an authentication =
framework ?
> =20
> I think this is becoming a largely academic / philosophical argument =
by this time.  The people who designed OAuth will likely point out that =
it was conceptualized as an authorization protocol to enable a RO to =
delegate access to a client to access its protected resources on some =
RS.  And of course this is the history of it.  And the RO and end-user =
were typically the same entity.  But get caught up in what it was =
envisioned to do vs. real life use cases that OAuth can solve (and is =
solving) beyond its initial use cases misses the point =85 because OAuth =
is gaining traction in the enterprise and will be used in all different =
sorts of ways, including authentication.=20
> =20
> This is especially true of RESTful APIs within an enterprise where the =
RO and end-user are *not* the same: e.g. RO=3Denterprise and =
end-user=3Demployee.  In this model the end-user is not authorizing =
anything when their client requests a token from the AS =85 they =
authenticate to the AS and the client gets an AT, which will likely be =
profiled by most enterprise deployments to look something like an OIDC =
id_token.  The AT will be presented to the RS which will examine the =
claims (user identity, LOA, etc.) and make authorization decisions based =
on business logic.  The AT has not authorized the user to do anything, =
it has only made an assertion that the user has been authenticated by =
the AS (sort of sounds a lot like an IdP now).
> =20
> All this talked of OAuth being authorization and not authentication =
was extremely confusing to me when I first started looking at OAuth for =
my use cases, and I think at some point the authors of OAuth are going =
to have to recognize that their baby has grown up to be multi-faceted =
(and I mean this as a complement).  The abstractions left in the OAuth =
spec (while some have claimed of the lack of interoperability it will =
cause) will also enable it to be used in ways possibly still not =
envisioned by any of us.  I think as soon as we can stop trying to draw =
the artificial line around OAuth being =93an authorization protocol=94 =
the better things will be.
> =20
> I like to say that they authors had it right when they named it =
=93OAuth=94 and not =93OAuthR=94 J
> =20
> -adam
> =20
> From: oauth-bounces@ietf.org [mailto:oauth-bounces@ietf.org] On Behalf =
Of Tim Bray
> Sent: Tuesday, February 05, 2013 3:28 PM
> To: William Mills
> Cc: oauth@ietf.org WG
> Subject: Re: [OAUTH-WG] Why OAuth it self is not an authentication =
framework ?
> =20
> OIDC seems about the most plausible candidate for a =93good general =
solution=94 that I=92m aware of.   -T
> On Tue, Feb 5, 2013 at 1:22 PM, William Mills <wmills_92105@yahoo.com> =
wrote:
> There are some specific design mis-matches for OAuth as an =
authentication protocol, it's not what it's designed for and there are =
some problems you will run into.  Some have used it as such, but it's =
not a good general solution.
> =20
> -bill
> =20
> From: Paul Madsen <paul.madsen@gmail.com>
> To: John Bradley <ve7jtb@ve7jtb.com>=20
> Cc: "oauth@ietf.org WG" <oauth@ietf.org>=20
> Sent: Tuesday, February 5, 2013 1:12 PM
> Subject: Re: [OAUTH-WG] Why OAuth it self is not an authentication =
framework ?
> =20
> why pigeonhole it?=20
>=20
> OAuth can be deployed with no authz semantics at all (or at least as =
little as any authn mechanism), e.g client creds grant type with no =
scopes
>=20
> I agree that OAuth is not an *SSO* protocol.
> On 2/5/13 3:36 PM, John Bradley wrote:
> OAuth is an Authorization protocol as many of us have pointed out.
> =20
> The post is largely correct and based on one of mine.
> =20
> John B.
> =20
> On 2013-02-05, at 12:52 PM, Prabath Siriwardena <prabath@wso2.com> =
wrote:
> =20
> FYI and for your comments..
> =20
> =
http://blog.facilelogin.com/2013/02/why-oauth-it-self-is-not-authenticatio=
n.html
> =20
> Thanks & Regards,
> Prabath
> =20
> Mobile : +94 71 809 6732=20
> http://blog.facilelogin.com/
> http://rampartfaq.com/
> _______________________________________________
> OAuth mailing list
> OAuth@ietf.org
> https://www.ietf.org/mailman/listinfo/oauth
> =20
> =20
> _______________________________________________
> OAuth mailing list
> OAuth@ietf.org
> https://www.ietf.org/mailman/listinfo/oauth
> =20
>=20
> _______________________________________________
> OAuth mailing list
> OAuth@ietf.org
> https://www.ietf.org/mailman/listinfo/oauth
>=20
>=20
> _______________________________________________
> OAuth mailing list
> OAuth@ietf.org
> https://www.ietf.org/mailman/listinfo/oauth
> =20
> =20
>=20
> _______________________________________________
> OAuth mailing list
> OAuth@ietf.org
> https://www.ietf.org/mailman/listinfo/oauth


--Apple-Mail=_03D00D03-26D7-4694-A2F6-AE4E72199A00
Content-Transfer-Encoding: quoted-printable
Content-Type: text/html;
	charset=windows-1252

<html><head><meta http-equiv=3D"Content-Type" content=3D"text/html =
charset=3Dwindows-1252"><base href=3D"x-msg://2740/"></head><body =
style=3D"word-wrap: break-word; -webkit-nbsp-mode: space; =
-webkit-line-break: after-white-space; ">Adam,<div><br></div><div>We =
have made some changes in the latest draft to address some input from =
Google that I think may also address your need to using the id_token in =
an assertion or possibly as an access token to a federated =
RS.</div><div><br></div><div>I can go over it with you if you =
like.</div><div><br></div><div>John B.</div><div><br><div><div>On =
2013-02-06, at 9:05 AM, Lewis Adam-CAL022 &lt;<a =
href=3D"mailto:Adam.Lewis@motorolasolutions.com">Adam.Lewis@motorolasoluti=
ons.com</a>&gt; wrote:</div><br =
class=3D"Apple-interchange-newline"><blockquote type=3D"cite"><div =
lang=3D"EN-US" link=3D"blue" vlink=3D"purple" style=3D"font-family: =
Helvetica; font-size: medium; font-style: normal; font-variant: normal; =
font-weight: normal; letter-spacing: normal; line-height: normal; =
orphans: 2; text-align: -webkit-auto; text-indent: 0px; text-transform: =
none; white-space: normal; widows: 2; word-spacing: 0px; =
-webkit-text-size-adjust: auto; -webkit-text-stroke-width: 0px; "><div =
class=3D"WordSection1" style=3D"page: WordSection1; "><div =
style=3D"margin: 0in 0in 0.0001pt; font-size: 12pt; font-family: 'Times =
New Roman', serif; "><span style=3D"font-size: 10.5pt; font-family: =
'Book Antiqua', serif; color: olive; ">Hi =
Bill,<o:p></o:p></span></div><div style=3D"margin: 0in 0in 0.0001pt; =
font-size: 12pt; font-family: 'Times New Roman', serif; "><span =
style=3D"font-size: 10.5pt; font-family: 'Book Antiqua', serif; color: =
olive; ">&nbsp;</span></div><div style=3D"margin: 0in 0in 0.0001pt; =
font-size: 12pt; font-family: 'Times New Roman', serif; "><span =
style=3D"font-size: 10.5pt; font-family: 'Book Antiqua', serif; color: =
olive; ">My reason for using OAuth rather than OIDC is because the =
id_token in OIDC is audience restricted to the client.&nbsp; This was =
clearly intended for WebSSO / authentication to a client running on a =
web server.&nbsp; It does not help the case where the user of a RESTful =
native client want to authenticate to a RESTful web =
service.&nbsp;<o:p></o:p></span></div><div style=3D"margin: 0in 0in =
0.0001pt; font-size: 12pt; font-family: 'Times New Roman', serif; =
"><span style=3D"font-size: 10.5pt; font-family: 'Book Antiqua', serif; =
color: olive; ">&nbsp;</span></div><div style=3D"margin: 0in 0in =
0.0001pt; font-size: 12pt; font-family: 'Times New Roman', serif; =
"><span style=3D"font-size: 10.5pt; font-family: 'Book Antiqua', serif; =
color: olive; ">I agree that OAuth lacks a =93defined=94 way to =
communicate what is in the AT (as OAuth does not define the content of =
the AT), but within an enterprise domain this is easy to solve by =
profiling.&nbsp; And in any implementation of OAuth on the Internet, the =
AT must at some level identify the user to the RS.&nbsp; Otherwise how =
else would the RS know who=92s protected resources the client is trying =
to access?&nbsp; Now whether the RS learns that through introspection or =
by parsing a JWT-structured AT is of course not defined.&nbsp; But at =
the end of the day, the AT definitely (in all cases that I can think of) =
identifies the user.&nbsp;<o:p></o:p></span></div><div style=3D"margin: =
0in 0in 0.0001pt; font-size: 12pt; font-family: 'Times New Roman', =
serif; "><span style=3D"font-size: 10.5pt; font-family: 'Book Antiqua', =
serif; color: olive; ">&nbsp;</span></div><div style=3D"margin: 0in 0in =
0.0001pt; font-size: 12pt; font-family: 'Times New Roman', serif; =
"><span style=3D"font-size: 10.5pt; font-family: 'Book Antiqua', serif; =
color: olive; ">I am open minded to using OIDC if in the future if the =
client can request an id_token that is audience restricted to the RS it =
is going to communicate.&nbsp; In other words, yes I agree that OIDC is =
the preferred mechanism for performing =93user authentication to a =
client,=94 but I also argue that OAuth is the best method to perform =
=93user authentication to an RS=94 (if you want to get your RS out of =
the password consumption business).&nbsp; I am not at all advocating =
OAuth for authentication to a client.&nbsp;<o:p></o:p></span></div><div =
style=3D"margin: 0in 0in 0.0001pt; font-size: 12pt; font-family: 'Times =
New Roman', serif; "><span style=3D"font-size: 10.5pt; font-family: =
'Book Antiqua', serif; color: olive; ">&nbsp;</span></div><div =
style=3D"margin: 0in 0in 0.0001pt; font-size: 12pt; font-family: 'Times =
New Roman', serif; "><span style=3D"font-size: 10.5pt; font-family: =
'Book Antiqua', serif; color: olive; ">-adam<o:p></o:p></span></div><div =
style=3D"margin: 0in 0in 0.0001pt; font-size: 12pt; font-family: 'Times =
New Roman', serif; "><span style=3D"font-size: 10.5pt; font-family: =
'Book Antiqua', serif; color: olive; ">&nbsp;</span></div><div><div =
style=3D"border-style: solid none none; border-top-width: 1pt; =
border-top-color: rgb(181, 196, 223); padding: 3pt 0in 0in; "><div =
style=3D"margin: 0in 0in 0.0001pt; font-size: 12pt; font-family: 'Times =
New Roman', serif; "><b><span style=3D"font-size: 10pt; font-family: =
Tahoma, sans-serif; ">From:</span></b><span style=3D"font-size: 10pt; =
font-family: Tahoma, sans-serif; "><span =
class=3D"Apple-converted-space">&nbsp;</span>William Mills =
[mailto:wmills_92105@<a href=3D"http://yahoo.com">yahoo.com</a>]<span =
class=3D"Apple-converted-space">&nbsp;</span><br><b>Sent:</b><span =
class=3D"Apple-converted-space">&nbsp;</span>Tuesday, February 05, 2013 =
6:49 PM<br><b>To:</b><span =
class=3D"Apple-converted-space">&nbsp;</span>Lewis Adam-CAL022; Tim =
Bray<br><b>Cc:</b><span class=3D"Apple-converted-space">&nbsp;</span>"WG =
&lt;<a href=3D"mailto:oauth@ietf.org">oauth@ietf.org</a>&gt;"@<a =
href=3D"http://il06exr02.mot.com">il06exr02.mot.com</a><br><b>Subject:</b>=
<span class=3D"Apple-converted-space">&nbsp;</span>Re: [OAUTH-WG] Why =
OAuth it self is not an authentication framework =
?<o:p></o:p></span></div></div></div><div style=3D"margin: 0in 0in =
0.0001pt; font-size: 12pt; font-family: 'Times New Roman', serif; =
"><o:p>&nbsp;</o:p></div><div><div><div style=3D"margin: 0in 0in =
0.0001pt; font-size: 12pt; font-family: 'Times New Roman', serif; =
background-color: white; "><span style=3D"font-family: 'Courier New', =
serif; ">Why use OAuth when OpenID does everything that OAuth can do as =
an authentication method and does a few things much =
better?<o:p></o:p></span></div></div><div><div style=3D"margin: 0in 0in =
0.0001pt; font-size: 12pt; font-family: 'Times New Roman', serif; =
background-color: white; "><span style=3D"font-family: 'Courier New', =
serif; ">&nbsp;</span></div></div><div><div style=3D"margin: 0in 0in =
0.0001pt; font-size: 12pt; font-family: 'Times New Roman', serif; =
"><span style=3D"font-family: 'Courier New', serif; ">Specifically OAuth =
lacks any defined way to:<o:p></o:p></span></div></div><div><div =
style=3D"margin: 0in 0in 0.0001pt; font-size: 12pt; font-family: 'Times =
New Roman', serif; "><span style=3D"font-family: 'Courier New', serif; =
">&nbsp;</span></div></div><div><div style=3D"margin: 0in 0in 0.0001pt; =
font-size: 12pt; font-family: 'Times New Roman', serif; "><span =
style=3D"font-family: 'Courier New', serif; ">-<span =
class=3D"apple-tab-span">&nbsp;&nbsp;&nbsp;<span =
class=3D"Apple-converted-space">&nbsp;</span></span>feed back any =
additional information like the real user ID (as opposed to what the =
entered)<o:p></o:p></span></div></div><div><div style=3D"margin: 0in 0in =
0.0001pt; font-size: 12pt; font-family: 'Times New Roman', serif; =
"><span style=3D"font-family: 'Courier New', serif; ">-<span =
class=3D"apple-tab-span">&nbsp;&nbsp;&nbsp;<span =
class=3D"Apple-converted-space">&nbsp;</span></span>bound an =
authentication event in time<o:p></o:p></span></div></div><div><div =
style=3D"margin: 0in 0in 0.0001pt; font-size: 12pt; font-family: 'Times =
New Roman', serif; "><span style=3D"font-family: 'Courier New', serif; =
">-<span class=3D"apple-tab-span">&nbsp;&nbsp;&nbsp;<span =
class=3D"Apple-converted-space">&nbsp;</span></span>provide any form of =
additional SSO payload like a display name for the =
user<o:p></o:p></span></div></div><div><div style=3D"margin: 0in 0in =
0.0001pt; font-size: 12pt; font-family: 'Times New Roman', serif; =
"><span style=3D"font-family: 'Courier New', serif; =
">&nbsp;</span></div></div><div><div style=3D"margin: 0in 0in 0.0001pt; =
font-size: 12pt; font-family: 'Times New Roman', serif; "><span =
style=3D"font-family: 'Courier New', serif; ">there's probably other =
things.<o:p></o:p></span></div></div><div><div style=3D"margin: 0in 0in =
0.0001pt; font-size: 12pt; font-family: 'Times New Roman', serif; =
"><span style=3D"font-family: 'Courier New', serif; =
">&nbsp;</span></div></div><div><div style=3D"margin: 0in 0in 0.0001pt; =
font-size: 12pt; font-family: 'Times New Roman', serif; "><span =
style=3D"font-family: 'Courier New', serif; ">It'll mostly work but =
there are things it doesn't do. &nbsp;Could you solve some of the rest =
of this with token introspection or a user API that the RP could use to =
fetch user info, sure, but why rebuild OpenID when OpenID =
exists?<o:p></o:p></span></div></div><div><div style=3D"margin: 0in 0in =
0.0001pt; font-size: 12pt; font-family: 'Times New Roman', serif; =
"><span style=3D"font-family: 'Courier New', serif; =
">&nbsp;</span></div></div><div><div style=3D"margin: 0in 0in 0.0001pt; =
font-size: 12pt; font-family: 'Times New Roman', serif; "><span =
style=3D"font-family: 'Courier New', serif; =
">-bill<o:p></o:p></span></div></div><div><div style=3D"margin: 0in 0in =
0.0001pt; font-size: 12pt; font-family: 'Times New Roman', serif; =
"><span style=3D"font-family: 'Courier New', serif; =
">&nbsp;</span></div></div><div><div style=3D"margin: 0in 0in 0.0001pt; =
font-size: 12pt; font-family: 'Times New Roman', serif; "><span =
style=3D"font-family: 'Courier New', serif; =
">&nbsp;</span></div></div><div><div><div class=3D"MsoNormal" =
align=3D"center" style=3D"margin: 0in 0in 0.0001pt; font-size: 12pt; =
font-family: 'Times New Roman', serif; text-align: center; =
background-color: white; background-position: initial initial; =
background-repeat: initial initial; "><span style=3D"font-size: 10pt; =
font-family: Arial, sans-serif; "><hr size=3D"1" width=3D"100%" =
align=3D"center"></span></div><div style=3D"margin: 0in 0in 0.0001pt; =
font-size: 12pt; font-family: 'Times New Roman', serif; =
background-color: white; "><b><span style=3D"font-size: 10pt; =
font-family: Arial, sans-serif; ">From:</span></b><span =
style=3D"font-size: 10pt; font-family: Arial, sans-serif; "><span =
class=3D"Apple-converted-space">&nbsp;</span>Lewis Adam-CAL022 &lt;<a =
href=3D"mailto:Adam.Lewis@motorolasolutions.com">Adam.Lewis@motorolasoluti=
ons.com</a>&gt;<br><b>To:</b><span =
class=3D"Apple-converted-space">&nbsp;</span>Tim Bray &lt;<a =
href=3D"mailto:twbray@google.com">twbray@google.com</a>&gt;; William =
Mills &lt;<a =
href=3D"mailto:wmills_92105@yahoo.com">wmills_92105@yahoo.com</a>&gt;<span=
 class=3D"Apple-converted-space">&nbsp;</span><br><b>Cc:</b><span =
class=3D"Apple-converted-space">&nbsp;</span>"<a =
href=3D"mailto:oauth@ietf.org">oauth@ietf.org</a> WG" &lt;<a =
href=3D"mailto:oauth@ietf.org">oauth@ietf.org</a>&gt;<span =
class=3D"Apple-converted-space">&nbsp;</span><br><b>Sent:</b><span =
class=3D"Apple-converted-space">&nbsp;</span>Tuesday, February 5, 2013 =
2:27 PM<br><b>Subject:</b><span =
class=3D"Apple-converted-space">&nbsp;</span>RE: [OAUTH-WG] Why OAuth it =
self is not an authentication framework ?</span><span =
style=3D""><o:p></o:p></span></div></div><div style=3D"margin: 0in 0in =
0.0001pt; font-size: 12pt; font-family: 'Times New Roman', serif; =
background-color: white; "><span style=3D"">&nbsp;</span></div><div =
id=3D"yiv2141144710"><div><div style=3D"margin: 0in 0in 0.0001pt; =
font-size: 12pt; font-family: 'Times New Roman', serif; =
background-color: white; "><span style=3D"font-size: 10.5pt; color: =
olive; ">I think this is becoming a largely academic / philosophical =
argument by this time.&nbsp; The people who designed OAuth will likely =
point out that it was conceptualized as an authorization protocol to =
enable a RO to delegate access to a client to access its protected =
resources on some RS.&nbsp; And of course this is the history of =
it.&nbsp; And the RO and end-user were typically the same entity.&nbsp; =
But get caught up in what it was envisioned to do vs. real life use =
cases that OAuth can solve (and is solving) beyond its initial use cases =
misses the point =85 because OAuth is gaining traction in the enterprise =
and will be used in all different sorts of ways, including =
authentication.&nbsp;</span><span =
style=3D""><o:p></o:p></span></div></div><div><div style=3D"margin: 0in =
0in 0.0001pt; font-size: 12pt; font-family: 'Times New Roman', serif; =
background-color: white; "><span style=3D"font-size: 10.5pt; color: =
olive; ">&nbsp;</span><span =
style=3D""><o:p></o:p></span></div></div><div><div style=3D"margin: 0in =
0in 0.0001pt; font-size: 12pt; font-family: 'Times New Roman', serif; =
background-color: white; "><span style=3D"font-size: 10.5pt; color: =
olive; ">This is especially true of RESTful APIs within an enterprise =
where the RO and end-user are *<b>not</b>* the same: e.g. RO=3Denterprise =
and end-user=3Demployee.&nbsp; In this model the end-user is not =
authorizing anything when their client requests a token from the AS =85 =
they authenticate to the AS and the client gets an AT, which will likely =
be profiled by most enterprise deployments to look something like an =
OIDC id_token.&nbsp; The AT will be presented to the RS which will =
examine the claims (user identity, LOA, etc.) and make authorization =
decisions based on business logic.&nbsp; The AT has not authorized the =
user to do anything, it has only made an assertion that the user has =
been authenticated by the AS (sort of sounds a lot like an IdP =
now).</span><span style=3D""><o:p></o:p></span></div></div><div><div =
style=3D"margin: 0in 0in 0.0001pt; font-size: 12pt; font-family: 'Times =
New Roman', serif; background-color: white; "><span style=3D"font-size: =
10.5pt; color: olive; ">&nbsp;</span><span =
style=3D""><o:p></o:p></span></div></div><div><div style=3D"margin: 0in =
0in 0.0001pt; font-size: 12pt; font-family: 'Times New Roman', serif; =
background-color: white; "><span style=3D"font-size: 10.5pt; color: =
olive; ">All this talked of OAuth being authorization and not =
authentication was extremely confusing to me when I first started =
looking at OAuth for my use cases, and I think at some point the authors =
of OAuth are going to have to recognize that their baby has grown up to =
be multi-faceted (and I mean this as a complement).&nbsp; The =
abstractions left in the OAuth spec (while some have claimed of the lack =
of interoperability it will cause) will also enable it to be used in =
ways possibly still not envisioned by any of us.&nbsp; I think as soon =
as we can stop trying to draw the artificial line around OAuth being =93an=
 authorization protocol=94 the better things will be.</span><span =
style=3D""><o:p></o:p></span></div></div><div><div style=3D"margin: 0in =
0in 0.0001pt; font-size: 12pt; font-family: 'Times New Roman', serif; =
background-color: white; "><span style=3D"font-size: 10.5pt; color: =
olive; ">&nbsp;</span><span =
style=3D""><o:p></o:p></span></div></div><div><div style=3D"margin: 0in =
0in 0.0001pt; font-size: 12pt; font-family: 'Times New Roman', serif; =
background-color: white; "><span style=3D"font-size: 10.5pt; color: =
olive; ">I like to say that they authors had it right when they named it =
=93OAuth=94 and not =93OAuthR=94<span =
class=3D"Apple-converted-space">&nbsp;</span></span><span =
style=3D"font-size: 10.5pt; font-family: Wingdings; color: olive; =
">J</span><span style=3D""><o:p></o:p></span></div></div><div><div =
style=3D"margin: 0in 0in 0.0001pt; font-size: 12pt; font-family: 'Times =
New Roman', serif; background-color: white; "><span style=3D"font-size: =
10.5pt; color: olive; ">&nbsp;</span><span =
style=3D""><o:p></o:p></span></div></div><div><div style=3D"margin: 0in =
0in 0.0001pt; font-size: 12pt; font-family: 'Times New Roman', serif; =
background-color: white; "><span style=3D"font-size: 10.5pt; color: =
olive; ">-adam</span><span =
style=3D""><o:p></o:p></span></div></div><div><div style=3D"margin: 0in =
0in 0.0001pt; font-size: 12pt; font-family: 'Times New Roman', serif; =
background-color: white; "><span style=3D"font-size: 10.5pt; color: =
olive; ">&nbsp;</span><span style=3D""><o:p></o:p></span></div></div><div =
style=3D"border-style: solid none none; border-top-width: 1pt; =
border-top-color: rgb(181, 196, 223); padding: 3pt 0in 0in; "><div =
style=3D"margin: 0in 0in 0.0001pt; font-size: 12pt; font-family: 'Times =
New Roman', serif; background-color: white; "><b><span style=3D"font-size:=
 10pt; ">From:</span></b><span style=3D"font-size: 10pt; "><span =
class=3D"Apple-converted-space">&nbsp;</span><a =
href=3D"mailto:oauth-bounces@ietf.org">oauth-bounces@ietf.org</a> =
[mailto:oauth-<a =
href=3D"mailto:bounces@ietf.org">bounces@ietf.org</a>]<span =
class=3D"Apple-converted-space">&nbsp;</span><b>On Behalf Of<span =
class=3D"Apple-converted-space">&nbsp;</span></b>Tim =
Bray<br><b>Sent:</b><span =
class=3D"Apple-converted-space">&nbsp;</span>Tuesday, February 05, 2013 =
3:28 PM<br><b>To:</b><span =
class=3D"Apple-converted-space">&nbsp;</span>William =
Mills<br><b>Cc:</b><span class=3D"Apple-converted-space">&nbsp;</span><a =
href=3D"mailto:oauth@ietf.org">oauth@ietf.org</a> =
WG<br><b>Subject:</b><span =
class=3D"Apple-converted-space">&nbsp;</span>Re: [OAUTH-WG] Why OAuth it =
self is not an authentication framework ?</span><span =
style=3D""><o:p></o:p></span></div></div><div><div style=3D"margin: 0in =
0in 0.0001pt; font-size: 12pt; font-family: 'Times New Roman', serif; =
background-color: white; "><span =
style=3D"">&nbsp;<o:p></o:p></span></div></div><div =
style=3D"margin-bottom: 12pt; "><div style=3D"margin: 0in 0in 0.0001pt; =
font-size: 12pt; font-family: 'Times New Roman', serif; =
background-color: white; "><span style=3D"">OIDC seems about the most =
plausible candidate for a =93good general solution=94 that I=92m aware =
of. &nbsp; -T<o:p></o:p></span></div></div><div><div><div style=3D"margin:=
 0in 0in 0.0001pt; font-size: 12pt; font-family: 'Times New Roman', =
serif; background-color: white; "><span style=3D"">On Tue, Feb 5, 2013 =
at 1:22 PM, William Mills &lt;<a href=3D"mailto:wmills_92105@yahoo.com" =
target=3D"_blank" style=3D"color: purple; text-decoration: underline; =
">wmills_92105@yahoo.com</a>&gt; =
wrote:<o:p></o:p></span></div></div><div><div><div style=3D"margin: 0in =
0in 0.0001pt; font-size: 12pt; font-family: 'Times New Roman', serif; =
background-color: white; "><span style=3D"">There are some specific =
design mis-matches for OAuth as an authentication protocol, it's not =
what it's designed for and there are some problems you will run into. =
&nbsp;Some have used it as such, but it's not a good general =
solution.<o:p></o:p></span></div></div><div><div style=3D"margin: 0in =
0in 0.0001pt; font-size: 12pt; font-family: 'Times New Roman', serif; =
background-color: white; "><span =
style=3D"">&nbsp;<o:p></o:p></span></div></div><div><div style=3D"margin: =
0in 0in 0.0001pt; font-size: 12pt; font-family: 'Times New Roman', =
serif; background-color: white; "><span =
style=3D"">-bill<o:p></o:p></span></div></div><div><div style=3D"margin: =
0in 0in 0.0001pt; font-size: 12pt; font-family: 'Times New Roman', =
serif; background-color: white; "><span =
style=3D"">&nbsp;<o:p></o:p></span></div></div><div><div><div =
class=3D"MsoNormal" align=3D"center" style=3D"margin: 0in 0in 0.0001pt; =
font-size: 12pt; font-family: 'Times New Roman', serif; text-align: =
center; background-color: white; background-position: initial initial; =
background-repeat: initial initial; "><span style=3D""><hr size=3D"1" =
width=3D"100%" align=3D"center"></span></div><div><div style=3D"margin: =
0in 0in 0.0001pt; font-size: 12pt; font-family: 'Times New Roman', =
serif; background-color: white; "><b>From:</b><span style=3D""><span =
class=3D"Apple-converted-space">&nbsp;</span>Paul Madsen &lt;<a =
href=3D"mailto:paul.madsen@gmail.com" target=3D"_blank" style=3D"color: =
purple; text-decoration: underline; =
">paul.madsen@gmail.com</a>&gt;<br><b>To:</b><span =
class=3D"Apple-converted-space">&nbsp;</span>John Bradley &lt;<a =
href=3D"mailto:ve7jtb@ve7jtb.com" target=3D"_blank" style=3D"color: =
purple; text-decoration: underline; ">ve7jtb@ve7jtb.com</a>&gt;<span =
class=3D"Apple-converted-space">&nbsp;</span><br><b>Cc:</b><span =
class=3D"Apple-converted-space">&nbsp;</span>"<a =
href=3D"mailto:oauth@ietf.org" target=3D"_blank" style=3D"color: purple; =
text-decoration: underline; ">oauth@ietf.org</a><span =
class=3D"Apple-converted-space">&nbsp;</span>WG" &lt;<a =
href=3D"mailto:oauth@ietf.org" target=3D"_blank" style=3D"color: purple; =
text-decoration: underline; ">oauth@ietf.org</a>&gt;<span =
class=3D"Apple-converted-space">&nbsp;</span><br><b>Sent:</b><span =
class=3D"Apple-converted-space">&nbsp;</span>Tuesday, February 5, 2013 =
1:12 PM<br><b>Subject:</b><span =
class=3D"Apple-converted-space">&nbsp;</span>Re: [OAUTH-WG] Why OAuth it =
self is not an authentication framework =
?<o:p></o:p></span></div></div></div><div><div style=3D"margin: 0in 0in =
0.0001pt; font-size: 12pt; font-family: 'Times New Roman', serif; =
background-color: white; "><span =
style=3D"">&nbsp;<o:p></o:p></span></div></div><div><div><div =
style=3D"margin-bottom: 12pt; "><div style=3D"margin: 0in 0in 0.0001pt; =
font-size: 12pt; font-family: 'Times New Roman', serif; =
background-color: white; "><span style=3D"">why pigeonhole it?<span =
class=3D"Apple-converted-space">&nbsp;</span><br><br>OAuth can be =
deployed with no authz semantics at all (or at least as little as any =
authn mechanism), e.g client creds grant type with no scopes<br><br>I =
agree that OAuth is not an *SSO* =
protocol.<o:p></o:p></span></div></div><div><div style=3D"margin: 0in =
0in 0.0001pt; font-size: 12pt; font-family: 'Times New Roman', serif; =
background-color: white; "><span style=3D"">On 2/5/13 3:36 PM, John =
Bradley wrote:<o:p></o:p></span></div></div></div><blockquote =
style=3D"margin-top: 5pt; margin-bottom: 5pt; "><div><div><div =
style=3D"margin: 0in 0in 0.0001pt; font-size: 12pt; font-family: 'Times =
New Roman', serif; background-color: white; "><span style=3D"">OAuth is =
an Authorization protocol as many of us have pointed =
out.<o:p></o:p></span></div></div><div><div style=3D"margin: 0in 0in =
0.0001pt; font-size: 12pt; font-family: 'Times New Roman', serif; =
background-color: white; "><span =
style=3D"">&nbsp;<o:p></o:p></span></div></div><div><div style=3D"margin: =
0in 0in 0.0001pt; font-size: 12pt; font-family: 'Times New Roman', =
serif; background-color: white; "><span style=3D"">The post is largely =
correct and based on one of mine.<o:p></o:p></span></div></div><div><div =
style=3D"margin: 0in 0in 0.0001pt; font-size: 12pt; font-family: 'Times =
New Roman', serif; background-color: white; "><span =
style=3D"">&nbsp;<o:p></o:p></span></div></div><div><div style=3D"margin: =
0in 0in 0.0001pt; font-size: 12pt; font-family: 'Times New Roman', =
serif; background-color: white; "><span style=3D"">John =
B.<o:p></o:p></span></div></div></div><div><div><div style=3D"margin: =
0in 0in 0.0001pt; font-size: 12pt; font-family: 'Times New Roman', =
serif; background-color: white; "><span =
style=3D"">&nbsp;<o:p></o:p></span></div></div><div><div><div><div =
style=3D"margin: 0in 0in 0.0001pt; font-size: 12pt; font-family: 'Times =
New Roman', serif; background-color: white; "><span style=3D"">On =
2013-02-05, at 12:52 PM, Prabath Siriwardena &lt;<a =
href=3D"mailto:prabath@wso2.com" target=3D"_blank" style=3D"color: =
purple; text-decoration: underline; ">prabath@wso2.com</a>&gt; =
wrote:<o:p></o:p></span></div></div><div><div style=3D"margin: 0in 0in =
0.0001pt; font-size: 12pt; font-family: 'Times New Roman', serif; =
background-color: white; "><span =
style=3D"">&nbsp;<o:p></o:p></span></div></div></div><blockquote =
style=3D"margin-top: 5pt; margin-bottom: 5pt; "><div><div><div =
style=3D"margin: 0in 0in 0.0001pt; font-size: 12pt; font-family: 'Times =
New Roman', serif; background-color: white; "><span style=3D"">FYI and =
for your comments..<o:p></o:p></span></div></div><div><div =
style=3D"margin: 0in 0in 0.0001pt; font-size: 12pt; font-family: 'Times =
New Roman', serif; background-color: white; "><span =
style=3D"">&nbsp;<o:p></o:p></span></div></div></div><div><div><div><div =
style=3D"margin: 0in 0in 0.0001pt; font-size: 12pt; font-family: 'Times =
New Roman', serif; background-color: white; "><span style=3D""><a =
href=3D"http://blog.facilelogin.com/2013/02/why-oauth-it-self-is-not-authe=
ntication.html">http://blog.facilelogin.com/2013/02/why-oauth-it-self-is-n=
ot-authentication.html</a><br =
clear=3D"all"><o:p></o:p></span></div></div><div><div style=3D"margin: =
0in 0in 0.0001pt; font-size: 12pt; font-family: 'Times New Roman', =
serif; background-color: white; "><span =
style=3D"">&nbsp;<o:p></o:p></span></div></div><div><div style=3D"margin: =
0in 0in 0.0001pt; font-size: 12pt; font-family: 'Times New Roman', =
serif; background-color: white; "><span style=3D"">Thanks &amp; =
Regards,<br>Prabath<o:p></o:p></span></div></div><div><div =
style=3D"margin: 0in 0in 0.0001pt; font-size: 12pt; font-family: 'Times =
New Roman', serif; background-color: white; "><span =
style=3D"">&nbsp;<o:p></o:p></span></div></div></div><div><div><div =
style=3D"margin-bottom: 12pt; "><div style=3D"margin: 0in 0in 0.0001pt; =
font-size: 12pt; font-family: 'Times New Roman', serif; =
background-color: white; "><span style=3D"">Mobile :<span =
class=3D"Apple-converted-space">&nbsp;</span></span><span =
class=3D"MsoHyperlink" style=3D"color: blue; text-decoration: underline; =
">+94 71 809 6732</span><span =
style=3D"">&nbsp;<o:p></o:p></span></div></div></div><div><div =
style=3D"margin: 0in 0in 0.0001pt; font-size: 12pt; font-family: 'Times =
New Roman', serif; background-color: white; "><span style=3D""><a =
href=3D"http://blog.facilelogin.com/">http://blog.facilelogin.com/</a><br>=
http://rampartfaq.com/<o:p></o:p></span></div></div></div></div><div><div =
style=3D"margin: 0in 0in 0.0001pt; font-size: 12pt; font-family: 'Times =
New Roman', serif; background-color: white; "><span =
style=3D"">_______________________________________________<br>OAuth =
mailing list<br><a href=3D"mailto:OAuth@ietf.org" target=3D"_blank" =
style=3D"color: purple; text-decoration: underline; =
">OAuth@ietf.org</a><br><a =
href=3D"https://www.ietf.org/mailman/listinfo/oauth" target=3D"_blank" =
style=3D"color: purple; text-decoration: underline; =
">https://www.ietf.org/mailman/listinfo/oauth</a><o:p></o:p></span></div><=
/div></blockquote></div><div><div style=3D"margin: 0in 0in 0.0001pt; =
font-size: 12pt; font-family: 'Times New Roman', serif; =
background-color: white; "><span =
style=3D"">&nbsp;<o:p></o:p></span></div></div></div><div><div =
style=3D"margin-bottom: 12pt; "><div style=3D"margin: 0in 0in 0.0001pt; =
font-size: 12pt; font-family: 'Times New Roman', serif; =
background-color: white; "><span =
style=3D"">&nbsp;<o:p></o:p></span></div></div><pre style=3D"margin: 0in =
0in 0.0001pt; font-size: 10pt; font-family: 'Courier New', serif; =
background-color: white; background-position: initial initial; =
background-repeat: initial initial; "><span =
style=3D"">_______________________________________________<o:p></o:p></spa=
n></pre><pre style=3D"margin: 0in 0in 0.0001pt; font-size: 10pt; =
font-family: 'Courier New', serif; background-color: white; =
background-position: initial initial; background-repeat: initial =
initial; "><span style=3D"">OAuth mailing =
list<o:p></o:p></span></pre><pre style=3D"margin: 0in 0in 0.0001pt; =
font-size: 10pt; font-family: 'Courier New', serif; background-color: =
white; background-position: initial initial; background-repeat: initial =
initial; "><span style=3D""><a href=3D"mailto:OAuth@ietf.org" =
target=3D"_blank" style=3D"color: purple; text-decoration: underline; =
">OAuth@ietf.org</a><o:p></o:p></span></pre><pre style=3D"margin: 0in =
0in 0.0001pt; font-size: 10pt; font-family: 'Courier New', serif; =
background-color: white; background-position: initial initial; =
background-repeat: initial initial; "><span style=3D""><a =
href=3D"https://www.ietf.org/mailman/listinfo/oauth" target=3D"_blank" =
style=3D"color: purple; text-decoration: underline; =
">https://www.ietf.org/mailman/listinfo/oauth</a><o:p></o:p></span></pre><=
/div></blockquote><div><div style=3D"margin: 0in 0in 0.0001pt; =
font-size: 12pt; font-family: 'Times New Roman', serif; =
background-color: white; "><span =
style=3D"">&nbsp;<o:p></o:p></span></div></div></div><div><div =
style=3D"margin-bottom: 12pt; "><p class=3D"MsoNormal" style=3D"margin: =
0in 0in 12pt; font-size: 12pt; font-family: 'Times New Roman', serif; =
background-color: white; background-position: initial initial; =
background-repeat: initial initial; "><span =
style=3D""><br>_______________________________________________<br>OAuth =
mailing list<br><a href=3D"mailto:OAuth@ietf.org" target=3D"_blank" =
style=3D"color: purple; text-decoration: underline; =
">OAuth@ietf.org</a><br><a =
href=3D"https://www.ietf.org/mailman/listinfo/oauth" target=3D"_blank" =
style=3D"color: purple; text-decoration: underline; =
">https://www.ietf.org/mailman/listinfo/oauth</a><o:p></o:p></span></p></d=
iv></div></div></div><div style=3D"margin-bottom: 12pt; "><div =
style=3D"margin: 0in 0in 0.0001pt; font-size: 12pt; font-family: 'Times =
New Roman', serif; background-color: white; "><span =
style=3D""><br>_______________________________________________<br>OAuth =
mailing list<br><a href=3D"mailto:OAuth@ietf.org" target=3D"_blank" =
style=3D"color: purple; text-decoration: underline; =
">OAuth@ietf.org</a><br><a =
href=3D"https://www.ietf.org/mailman/listinfo/oauth" target=3D"_blank" =
style=3D"color: purple; text-decoration: underline; =
">https://www.ietf.org/mailman/listinfo/oauth</a><o:p></o:p></span></div><=
/div></div><div><div style=3D"margin: 0in 0in 0.0001pt; font-size: 12pt; =
font-family: 'Times New Roman', serif; background-color: white; "><span =
style=3D"">&nbsp;<o:p></o:p></span></div></div></div><p =
class=3D"MsoNormal" style=3D"margin: 0in 0in 12pt; font-size: 12pt; =
font-family: 'Times New Roman', serif; background-color: white; =
background-position: initial initial; background-repeat: initial =
initial; "><span =
style=3D"">&nbsp;</span></p></div></div></div>____________________________=
___________________<br>OAuth mailing list<br><a =
href=3D"mailto:OAuth@ietf.org">OAuth@ietf.org</a><br>https://www.ietf.org/=
mailman/listinfo/oauth</div></blockquote></div><br></div></body></html>=

--Apple-Mail=_03D00D03-26D7-4694-A2F6-AE4E72199A00--

--Apple-Mail=_2029DE69-EFBF-41E5-A6CB-1B623885D36E
Content-Disposition: attachment;
	filename=smime.p7s
Content-Type: application/pkcs7-signature;
	name=smime.p7s
Content-Transfer-Encoding: base64
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--Apple-Mail=_2029DE69-EFBF-41E5-A6CB-1B623885D36E--

From prabath@wso2.com  Wed Feb  6 08:23:07 2013
Return-Path: <prabath@wso2.com>
X-Original-To: oauth@ietfa.amsl.com
Delivered-To: oauth@ietfa.amsl.com
Received: from localhost (localhost [127.0.0.1]) by ietfa.amsl.com (Postfix) with ESMTP id DCB4D21F88CA for <oauth@ietfa.amsl.com>; Wed,  6 Feb 2013 08:23:07 -0800 (PST)
X-Virus-Scanned: amavisd-new at amsl.com
X-Spam-Flag: NO
X-Spam-Score: -2.594
X-Spam-Level: 
X-Spam-Status: No, score=-2.594 tagged_above=-999 required=5 tests=[AWL=0.382,  BAYES_00=-2.599, FM_FORGED_GMAIL=0.622, HTML_MESSAGE=0.001, RCVD_IN_DNSWL_LOW=-1]
Received: from mail.ietf.org ([64.170.98.30]) by localhost (ietfa.amsl.com [127.0.0.1]) (amavisd-new, port 10024) with ESMTP id Z4GC-JF1sSix for <oauth@ietfa.amsl.com>; Wed,  6 Feb 2013 08:23:06 -0800 (PST)
Received: from mail-ea0-f169.google.com (mail-ea0-f169.google.com [209.85.215.169]) by ietfa.amsl.com (Postfix) with ESMTP id E234421F879E for <oauth@ietf.org>; Wed,  6 Feb 2013 08:23:04 -0800 (PST)
Received: by mail-ea0-f169.google.com with SMTP id d13so704620eaa.14 for <oauth@ietf.org>; Wed, 06 Feb 2013 08:23:04 -0800 (PST)
X-Google-DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=google.com; s=20120113; h=mime-version:x-received:in-reply-to:references:date:message-id :subject:from:to:cc:content-type:x-gm-message-state; bh=8efow7MFoc9jZx7Cx2U7WQDtYUPcaNAhbqstTlsAULc=; b=gofaVkQGM1sRW+wDX4xq/Mq6rsqat3wOkGF1dBWspoh56QR9AECCqI5vxDoLn7EEJD v4KKHoKhsgtdNfVyeIZFl2Rg29/X2wB1qA7hS8HXw+q8aIVWyDLrclUosCV+cW7o7H3U VT+KAnjI8iEqB2m6jlJD5cqgrDhhQHJGx+0dXY/aarNvNINef0xsGAAvVhrWdq3GKWGk v6yxupew3Ut3RdTCMjeF1+k6tZuz0U3gmITQ46VQ5mh8cc/DqSvs1GsWtLeTI2jQ6/Xn GQwCa4D4v8G/BwZ3F5kYBQ1M5nOC5jo91EnnPBKC18Qt4T2WUSaCuKuQdmREIwcU+cOm Zr+g==
MIME-Version: 1.0
X-Received: by 10.14.203.3 with SMTP id e3mr98776253eeo.9.1360167783684; Wed, 06 Feb 2013 08:23:03 -0800 (PST)
Received: by 10.223.175.134 with HTTP; Wed, 6 Feb 2013 08:23:03 -0800 (PST)
In-Reply-To: <1359995273.56871.YahooMailNeo@web31809.mail.mud.yahoo.com>
References: <CAEeqsMat2_zoSCyx7uN373m1SMNGAz=QxEmVYWOYax=Ppt2LnQ@mail.gmail.com> <1359995273.56871.YahooMailNeo@web31809.mail.mud.yahoo.com>
Date: Wed, 6 Feb 2013 21:53:03 +0530
Message-ID: <CAJV9qO_Zw3bO2L=m6AzhPGQF0B6T5_HOyuTzLTDiKGJGM=Wi7A@mail.gmail.com>
From: Prabath Siriwardena <prabath@wso2.com>
To: William Mills <wmills_92105@yahoo.com>
Content-Type: multipart/alternative; boundary=047d7b343b2a94d91704d510bd21
X-Gm-Message-State: ALoCoQlzVCzfnHkkQ9/z61AMkYLvP6k/UstZZoaMR3YAR0e4aKlfYsm4sfAo6ZQ+H1LNuvfWJ0tz
Cc: "oauth@ietf.org" <oauth@ietf.org>, "L. Preston Sego III" <LPSego3@gmail.com>
Subject: Re: [OAUTH-WG] I'm concerned about how the sniffability of oauth2 requests
X-BeenThere: oauth@ietf.org
X-Mailman-Version: 2.1.12
Precedence: list
List-Id: OAUTH WG <oauth.ietf.org>
List-Unsubscribe: <https://www.ietf.org/mailman/options/oauth>, <mailto:oauth-request@ietf.org?subject=unsubscribe>
List-Archive: <http://www.ietf.org/mail-archive/web/oauth>
List-Post: <mailto:oauth@ietf.org>
List-Help: <mailto:oauth-request@ietf.org?subject=help>
List-Subscribe: <https://www.ietf.org/mailman/listinfo/oauth>, <mailto:oauth-request@ietf.org?subject=subscribe>
X-List-Received-Date: Wed, 06 Feb 2013 16:23:08 -0000

--047d7b343b2a94d91704d510bd21
Content-Type: text/plain; charset=ISO-8859-1

On Mon, Feb 4, 2013 at 9:57 PM, William Mills <wmills_92105@yahoo.com>wrote:

> There are two efforts at signed token types: MAC which is still a
> possibility if we wake up and do it, and the "Holder Of Key" type tokens.
>

If someone can use sslstrip then even MAC is not safe - since MAC key needs
to be transferred over SSL to the Client from the AS.

There are standard ways in HTTP to avoid or protect from sslstrip - IMHO we
need to occupy those best practices...

Thanks & regards,
-Prabath


>
> There are a lot of folks that agree with you.
>
>   ------------------------------
> *From:* L. Preston Sego III <LPSego3@gmail.com>
> *To:* oauth@ietf.org
> *Sent:* Friday, February 1, 2013 7:37 AM
> *Subject:* [OAUTH-WG] I'm concerned about how the sniffability of oauth2
> requests
>
> In an oauth2 request, the access token is passed along in the header, with
> nothing else.
>
> As I understand it, oauth2 was designed to be simple for everyone to use.
> And while, that's true, I don't really like how all of the security is
> reliant on SSL.
>
> what if an attack can strip away SSL using a tool such as sslstrip (or
> whatever else would be more suitable for modern https)? They would be able
> to see the access token and start forging whatever request he or she wants
> to.
>
> Why not do some sort of RSA-type public-private key thing like back in
> Oauth1, where there is verification of the payload on each request? Just
> use a better algorithm?
>
> _______________________________________________
> OAuth mailing list
> OAuth@ietf.org
> https://www.ietf.org/mailman/listinfo/oauth
>
>
>
> _______________________________________________
> OAuth mailing list
> OAuth@ietf.org
> https://www.ietf.org/mailman/listinfo/oauth
>
>


-- 
Thanks & Regards,
Prabath

Mobile : +94 71 809 6732

http://blog.facilelogin.com
http://RampartFAQ.com

--047d7b343b2a94d91704d510bd21
Content-Type: text/html; charset=ISO-8859-1
Content-Transfer-Encoding: quoted-printable

<br><br><div class=3D"gmail_quote">On Mon, Feb 4, 2013 at 9:57 PM, William =
Mills <span dir=3D"ltr">&lt;<a href=3D"mailto:wmills_92105@yahoo.com" targe=
t=3D"_blank">wmills_92105@yahoo.com</a>&gt;</span> wrote:<br><blockquote cl=
ass=3D"gmail_quote" style=3D"margin:0 0 0 .8ex;border-left:1px #ccc solid;p=
adding-left:1ex">
<div><div style=3D"font-size:12pt;font-family:Courier New,courier,monaco,mo=
nospace,sans-serif"><div><span>There are two efforts at signed token types:=
 MAC which is still a possibility if we wake up and do it, and the &quot;Ho=
lder Of Key&quot; type tokens.</span></div>
</div></div></blockquote><div><br></div><div>If someone can use sslstrip th=
en even MAC is not safe - since MAC key needs to be transferred over SSL to=
 the Client from the AS.</div><div><br></div><div>There are standard ways i=
n HTTP to avoid or protect from sslstrip - IMHO we need to occupy those bes=
t practices...</div>
<div><br></div><div>Thanks &amp; regards,</div><div>-Prabath</div><div>=A0<=
/div><blockquote class=3D"gmail_quote" style=3D"margin:0 0 0 .8ex;border-le=
ft:1px #ccc solid;padding-left:1ex"><div><div style=3D"font-size:12pt;font-=
family:Courier New,courier,monaco,monospace,sans-serif">
<div style=3D"font-style:normal;font-size:16px;background-color:transparent=
;font-family:&#39;Courier New&#39;,courier,monaco,monospace,sans-serif"><sp=
an><br></span></div><div style=3D"font-style:normal;font-size:16px;backgrou=
nd-color:transparent;font-family:&#39;Courier New&#39;,courier,monaco,monos=
pace,sans-serif">
<span>There are a lot of folks that agree with you.</span></div><div><br></=
div>  <div style=3D"font-family:&#39;Courier New&#39;,courier,monaco,monosp=
ace,sans-serif;font-size:12pt"> <div style=3D"font-family:&#39;times new ro=
man&#39;,&#39;new york&#39;,times,serif;font-size:12pt">
 <div dir=3D"ltr"> <font face=3D"Arial"> <hr size=3D"1">  <b><span style=3D=
"font-weight:bold">From:</span></b> L. Preston Sego III &lt;<a href=3D"mail=
to:LPSego3@gmail.com" target=3D"_blank">LPSego3@gmail.com</a>&gt;<br> <b><s=
pan style=3D"font-weight:bold">To:</span></b> <a href=3D"mailto:oauth@ietf.=
org" target=3D"_blank">oauth@ietf.org</a> <br>
 <b><span style=3D"font-weight:bold">Sent:</span></b> Friday, February 1, 2=
013 7:37 AM<br> <b><span style=3D"font-weight:bold">Subject:</span></b> [OA=
UTH-WG] I&#39;m concerned about how the sniffability of oauth2 requests<br>
 </font> </div><div><div class=3D"h5"> <br>
<div><div dir=3D"ltr">In an oauth2 request, the access token is passed alon=
g in the header, with nothing else.<div><br></div><div>As I understand it, =
oauth2 was designed to be simple for everyone to use. And while, that&#39;s=
 true, I don&#39;t really like how all of the security is reliant on SSL.</=
div>


<div><br></div><div>what if an attack can strip away SSL using a tool such =
as sslstrip (or whatever else would be more suitable for modern https)? The=
y would be able to see the access token and start forging whatever request =
he or she wants to.</div>


<div><br></div><div>Why not do some sort of RSA-type public-private key thi=
ng like back in Oauth1, where there is verification of the payload on each =
request? Just use a better algorithm?</div></div>
</div><br></div></div>_______________________________________________<br>OA=
uth mailing list<br><a href=3D"mailto:OAuth@ietf.org" target=3D"_blank">OAu=
th@ietf.org</a><br><a href=3D"https://www.ietf.org/mailman/listinfo/oauth" =
target=3D"_blank">https://www.ietf.org/mailman/listinfo/oauth</a><br>
<br><br> </div> </div>  </div></div><br>___________________________________=
____________<br>
OAuth mailing list<br>
<a href=3D"mailto:OAuth@ietf.org">OAuth@ietf.org</a><br>
<a href=3D"https://www.ietf.org/mailman/listinfo/oauth" target=3D"_blank">h=
ttps://www.ietf.org/mailman/listinfo/oauth</a><br>
<br></blockquote></div><br><br clear=3D"all"><div><br></div>-- <br>Thanks &=
amp; Regards,<br>Prabath<div><br></div><div>Mobile : +94 71 809 6732=A0<br>=
<br><a href=3D"http://blog.facilelogin.com" target=3D"_blank">http://blog.f=
acilelogin.com</a><br>
<a href=3D"http://RampartFAQ.com" target=3D"_blank">http://RampartFAQ.com</=
a></div>

--047d7b343b2a94d91704d510bd21--

From wmills_92105@yahoo.com  Wed Feb  6 09:56:25 2013
Return-Path: <wmills_92105@yahoo.com>
X-Original-To: oauth@ietfa.amsl.com
Delivered-To: oauth@ietfa.amsl.com
Received: from localhost (localhost [127.0.0.1]) by ietfa.amsl.com (Postfix) with ESMTP id DF28E21F8630 for <oauth@ietfa.amsl.com>; Wed,  6 Feb 2013 09:56:22 -0800 (PST)
X-Virus-Scanned: amavisd-new at amsl.com
X-Spam-Flag: NO
X-Spam-Score: -2.143
X-Spam-Level: 
X-Spam-Status: No, score=-2.143 tagged_above=-999 required=5 tests=[AWL=0.455,  BAYES_00=-2.599, HTML_MESSAGE=0.001]
Received: from mail.ietf.org ([64.170.98.30]) by localhost (ietfa.amsl.com [127.0.0.1]) (amavisd-new, port 10024) with ESMTP id v5ciK5jDZc5S for <oauth@ietfa.amsl.com>; Wed,  6 Feb 2013 09:56:20 -0800 (PST)
Received: from nm6-vm2.bullet.mail.ne1.yahoo.com (nm6-vm2.bullet.mail.ne1.yahoo.com [98.138.90.154]) by ietfa.amsl.com (Postfix) with ESMTP id B2F5221F85E2 for <oauth@ietf.org>; Wed,  6 Feb 2013 09:56:13 -0800 (PST)
Received: from [98.138.90.49] by nm6.bullet.mail.ne1.yahoo.com with NNFMP; 06 Feb 2013 17:56:11 -0000
Received: from [98.138.226.164] by tm2.bullet.mail.ne1.yahoo.com with NNFMP; 06 Feb 2013 17:56:11 -0000
Received: from [127.0.0.1] by omp1065.mail.ne1.yahoo.com with NNFMP; 06 Feb 2013 17:56:11 -0000
X-Yahoo-Newman-Property: ymail-3
X-Yahoo-Newman-Id: 38595.93204.bm@omp1065.mail.ne1.yahoo.com
Received: (qmail 63399 invoked by uid 60001); 6 Feb 2013 17:56:10 -0000
DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=yahoo.com; s=s1024; t=1360173370; bh=uA7P+9Gc+N0pLxgSJQpOnyIhRPZKSTFuCGfoAmi7vJY=; h=X-YMail-OSG:Received:X-Rocket-MIMEInfo:X-Mailer:References:Message-ID:Date:From:Reply-To:Subject:To:Cc:In-Reply-To:MIME-Version:Content-Type; b=XccjutE915Xs8mOoDEzvFzusgoOWrRm0meDx6jVNALm2g0v++gnfL49CxgAL8L2nCfVWkJAfF9fZh/N2PK3kMGxpeHujajpYdf+GBs8V/GW1r2WbAsjB/QYldfNCGQYkx0SfXR1Cg1L5VQQQ8UsuiVzlJsluag/Ymg1I+sutz8E=
DomainKey-Signature: a=rsa-sha1; q=dns; c=nofws; s=s1024; d=yahoo.com; h=X-YMail-OSG:Received:X-Rocket-MIMEInfo:X-Mailer:References:Message-ID:Date:From:Reply-To:Subject:To:Cc:In-Reply-To:MIME-Version:Content-Type; b=GfmODnykze7LnGuTGwhfgqbSycY3GXW5ZO6uvgBcMD70Nmfm9/ZZRRZoAUU5jOR6Io26pDi4qrxavnLHMooLKtIUOh45LSTSF5sUhHhC/jHq/LK3Lfg3mHt+99yraoJsaKSgw7sU4WwQANYDL3sfzAnyXHD2GJapwhfUuVK3qC4=;
X-YMail-OSG: 0tliOfEVM1nulP0_R2LmqoVG1jKCO2jbBmL_gZTpdJH9D9m kgmN4HWVPnkTBpghj01mdYEEQJ5oy3A1qC_7QlbXJoVRKCL72a1UcnKwEapY Um5SFtbGi_sykuxEbxd5P1jtf_4l8MG9n_mzBJHhe9F.y1R6SnntR9s03RtC LGtHZ7TCccw5Ecuck7fYzBL5AsJMNiqvM8EPy4Tmjgqk16XCQggA7r0c2OsM oAUDL6JFNWHJnAHOBwMN8k8XcttVjuo_5AGbeO2hqyOASmu2IBu2TpzYSOfI GOGK2qf2Tu1kokaKk8O8rO4MaRqX3aHp6FfU0O0JgHfBlFxRF_O5IcfJeBrP SX6lnemRMVy5m5opclrXhnjp.0AQbvyomJ2Hk9zlidSSBTdX34patJC2d.uA 9B17fLwpVLBqrj4lbrWhKEzbbiOcD1H9DCZXM.boxY1vHXv1Ime_zbZ7ch4V Em9nn0XoELYMNiGrkLlzoVP3i0KVvrqUiiclmAkt98NDqoMwk8hmh8RaIzXf 44Vib_LEpaLHXCLE8SUlpwxGUCoXbIAcvQvZnLQ3H_.8v6MoIT3fbt8LcUvg VOk1BKNnA3BgNMPxDysNdiLDgFw88MZOaRN6Xp20wvaxhjiofP7VKoRN7ghA CD0PpKdVwqw4nHMKe7jbxyVrsvVA7zKPGoYRmRDO9Rlk-
Received: from [209.131.62.145] by web31810.mail.mud.yahoo.com via HTTP; Wed, 06 Feb 2013 09:56:09 PST
X-Rocket-MIMEInfo: 001.001, WWVzLCBNQUMgcmVsaWVzIG9uIFNTTCBmb3IgdHJhbnNwb3J0IHNlY3VyaXR5LiDCoEJ1dCB5b3UgaGF2ZSBiaWdnZXIgcHJvYmxlbXMgdGhhbiB0aGF0IGlmIFNTTCBpcyBicm9rZW4sIGJlY2F1c2UgeW91ciBwcmltYXJ5IGF1dGhlbnRpY2F0aW9uIGNyZWRlbnRpYWwgaXMgY29tcHJvbWlzZWQgbm93LgoKRG8gd2UgbmVlZCB0byBhZGRyZXNzIHNzbHN0cmlwIGhlcmUgaWYgaXQncyBhIGdlbmVyYWwgYXR0YWNrIG9uIFNTTCB0cmFuc3BvcnQgZm9yIHRoZSBicm93c2VyPwoKCl9fX19fX19fX19fX19fX19fX18BMAEBAQE-
X-Mailer: YahooMailWebService/0.8.133.504
References: <CAEeqsMat2_zoSCyx7uN373m1SMNGAz=QxEmVYWOYax=Ppt2LnQ@mail.gmail.com> <1359995273.56871.YahooMailNeo@web31809.mail.mud.yahoo.com> <CAJV9qO_Zw3bO2L=m6AzhPGQF0B6T5_HOyuTzLTDiKGJGM=Wi7A@mail.gmail.com>
Message-ID: <1360173369.63130.YahooMailNeo@web31810.mail.mud.yahoo.com>
Date: Wed, 6 Feb 2013 09:56:09 -0800 (PST)
From: William Mills <wmills_92105@yahoo.com>
To: Prabath Siriwardena <prabath@wso2.com>
In-Reply-To: <CAJV9qO_Zw3bO2L=m6AzhPGQF0B6T5_HOyuTzLTDiKGJGM=Wi7A@mail.gmail.com>
MIME-Version: 1.0
Content-Type: multipart/alternative; boundary="1935884094-1082862167-1360173369=:63130"
Cc: "oauth@ietf.org" <oauth@ietf.org>, "L. Preston Sego III" <LPSego3@gmail.com>
Subject: Re: [OAUTH-WG] I'm concerned about how the sniffability of oauth2 requests
X-BeenThere: oauth@ietf.org
X-Mailman-Version: 2.1.12
Precedence: list
Reply-To: William Mills <wmills_92105@yahoo.com>
List-Id: OAUTH WG <oauth.ietf.org>
List-Unsubscribe: <https://www.ietf.org/mailman/options/oauth>, <mailto:oauth-request@ietf.org?subject=unsubscribe>
List-Archive: <http://www.ietf.org/mail-archive/web/oauth>
List-Post: <mailto:oauth@ietf.org>
List-Help: <mailto:oauth-request@ietf.org?subject=help>
List-Subscribe: <https://www.ietf.org/mailman/listinfo/oauth>, <mailto:oauth-request@ietf.org?subject=subscribe>
X-List-Received-Date: Wed, 06 Feb 2013 17:56:25 -0000

--1935884094-1082862167-1360173369=:63130
Content-Type: text/plain; charset=iso-8859-1
Content-Transfer-Encoding: quoted-printable

Yes, MAC relies on SSL for transport security. =A0But you have bigger probl=
ems than that if SSL is broken, because your primary authentication credent=
ial is compromised now.=0A=0ADo we need to address sslstrip here if it's a =
general attack on SSL transport for the browser?=0A=0A=0A__________________=
______________=0A From: Prabath Siriwardena <prabath@wso2.com>=0ATo: Willia=
m Mills <wmills_92105@yahoo.com> =0ACc: L. Preston Sego III <LPSego3@gmail.=
com>; "oauth@ietf.org" <oauth@ietf.org> =0ASent: Wednesday, February 6, 201=
3 8:23 AM=0ASubject: Re: [OAUTH-WG] I'm concerned about how the sniffabilit=
y of oauth2 requests=0A =0A=0A=0A=0A=0AOn Mon, Feb 4, 2013 at 9:57 PM, Will=
iam Mills <wmills_92105@yahoo.com> wrote:=0A=0AThere are two efforts at sig=
ned token types: MAC which is still a possibility if we wake up and do it, =
and the "Holder Of Key" type tokens.=0A=0AIf someone can use sslstrip then =
even MAC is not safe - since MAC key needs to be transferred over SSL to th=
e Client from the AS.=0A=0AThere are standard ways in HTTP to avoid or prot=
ect from sslstrip - IMHO we need to occupy those best practices...=0A=0ATha=
nks & regards,=0A-Prabath=0A=A0=0A=0A>=0A>There are a lot of folks that agr=
ee with you.=0A>=0A>=0A>=0A>________________________________=0A> From: L. P=
reston Sego III <LPSego3@gmail.com>=0A>To: oauth@ietf.org =0A>Sent: Friday,=
 February 1, 2013 7:37 AM=0A>Subject: [OAUTH-WG] I'm concerned about how th=
e sniffability of oauth2 requests=0A> =0A>=0A>=0A>In an oauth2 request, the=
 access token is passed along in the header, with nothing else.=0A>=0A>=0A>=
As I understand it, oauth2 was designed to be simple for everyone to use. A=
nd while, that's true, I don't really like how all of the security is relia=
nt on SSL.=0A>=0A>=0A>what if an attack can strip away SSL using a tool suc=
h as sslstrip (or whatever else would be more suitable for modern https)? T=
hey would be able to see the access token and start forging whatever reques=
t he or she wants to.=0A>=0A>=0A>Why not do some sort of RSA-type public-pr=
ivate key thing like back in Oauth1, where there is verification of the pay=
load on each request? Just use a better algorithm?=0A>_____________________=
__________________________=0A>OAuth mailing list=0A>OAuth@ietf.org=0A>https=
://www.ietf.org/mailman/listinfo/oauth=0A>=0A>=0A>=0A>_____________________=
__________________________=0A>OAuth mailing list=0A>OAuth@ietf.org=0A>https=
://www.ietf.org/mailman/listinfo/oauth=0A>=0A>=0A=0A=0A-- =0AThanks & Regar=
ds,=0APrabath=0A=0AMobile : +94 71 809 6732=A0=0A=0Ahttp://blog.facilelogin=
.com=0Ahttp://RampartFAQ.com
--1935884094-1082862167-1360173369=:63130
Content-Type: text/html; charset=iso-8859-1
Content-Transfer-Encoding: quoted-printable

<html><body><div style=3D"color:#000; background-color:#fff; font-family:Co=
urier New, courier, monaco, monospace, sans-serif;font-size:12pt"><div><spa=
n>Yes, MAC relies on SSL for transport security. &nbsp;But you have bigger =
problems than that if SSL is broken, because your primary authentication cr=
edential is compromised now.</span></div><div style=3D"color: rgb(0, 0, 0);=
 font-size: 16px; font-family: 'Courier New', courier, monaco, monospace, s=
ans-serif; background-color: transparent; font-style: normal;"><span><br></=
span></div><div style=3D"color: rgb(0, 0, 0); font-size: 16px; font-family:=
 'Courier New', courier, monaco, monospace, sans-serif; background-color: t=
ransparent; font-style: normal;"><span>Do we need to address sslstrip here =
if it's a general attack on SSL transport for the browser?</span></div><div=
><br></div>  <div style=3D"font-family: 'Courier New', courier, monaco, mon=
ospace, sans-serif; font-size: 12pt;"> <div style=3D"font-family: 'times ne=
w
 roman', 'new york', times, serif; font-size: 12pt;"> <div dir=3D"ltr"> <fo=
nt size=3D"2" face=3D"Arial"> <hr size=3D"1">  <b><span style=3D"font-weigh=
t:bold;">From:</span></b> Prabath Siriwardena &lt;prabath@wso2.com&gt;<br> =
<b><span style=3D"font-weight: bold;">To:</span></b> William Mills &lt;wmil=
ls_92105@yahoo.com&gt; <br><b><span style=3D"font-weight: bold;">Cc:</span>=
</b> L. Preston Sego III &lt;LPSego3@gmail.com&gt;; "oauth@ietf.org" &lt;oa=
uth@ietf.org&gt; <br> <b><span style=3D"font-weight: bold;">Sent:</span></b=
> Wednesday, February 6, 2013 8:23 AM<br> <b><span style=3D"font-weight: bo=
ld;">Subject:</span></b> Re: [OAUTH-WG] I'm concerned about how the sniffab=
ility of oauth2 requests<br> </font> </div> <br>=0A<div id=3D"yiv450162103"=
><br><br><div class=3D"yiv450162103gmail_quote">On Mon, Feb 4, 2013 at 9:57=
 PM, William Mills <span dir=3D"ltr">&lt;<a rel=3D"nofollow" ymailto=3D"mai=
lto:wmills_92105@yahoo.com" target=3D"_blank" href=3D"mailto:wmills_92105@y=
ahoo.com">wmills_92105@yahoo.com</a>&gt;</span> wrote:<br><blockquote class=
=3D"yiv450162103gmail_quote" style=3D"margin:0 0 0 .8ex;border-left:1px #cc=
c solid;padding-left:1ex;">=0A<div><div style=3D"font-size: 12pt; font-fami=
ly: 'Courier New', courier, monaco, monospace, sans-serif;"><div><span>Ther=
e are two efforts at signed token types: MAC which is still a possibility i=
f we wake up and do it, and the "Holder Of Key" type tokens.</span></div>=
=0A</div></div></blockquote><div><br></div><div>If someone can use sslstrip=
 then even MAC is not safe - since MAC key needs to be transferred over SSL=
 to the Client from the AS.</div><div><br></div><div>There are standard way=
s in HTTP to avoid or protect from sslstrip - IMHO we need to occupy those =
best practices...</div>=0A<div><br></div><div>Thanks &amp; regards,</div><d=
iv>-Prabath</div><div>&nbsp;</div><blockquote class=3D"yiv450162103gmail_qu=
ote" style=3D"margin:0 0 0 .8ex;border-left:1px #ccc solid;padding-left:1ex=
;"><div><div style=3D"font-size: 12pt; font-family: 'Courier New', courier,=
 monaco, monospace, sans-serif;">=0A<div style=3D"font-style:normal;font-si=
ze:16px;background-color:transparent;"><span><br></span></div><div style=3D=
"font-style:normal;font-size:16px;background-color:transparent;">=0A<span>T=
here are a lot of folks that agree with you.</span></div><div><br></div>  <=
div style=3D"font-size:12pt;"> <div style=3D"font-size:12pt;">=0A <div dir=
=3D"ltr"> <font face=3D"Arial"> <hr size=3D"1">  <b><span style=3D"font-wei=
ght:bold;">From:</span></b> L. Preston Sego III &lt;<a rel=3D"nofollow" yma=
ilto=3D"mailto:LPSego3@gmail.com" target=3D"_blank" href=3D"mailto:LPSego3@=
gmail.com">LPSego3@gmail.com</a>&gt;<br> <b><span style=3D"font-weight:bold=
;">To:</span></b> <a rel=3D"nofollow" ymailto=3D"mailto:oauth@ietf.org" tar=
get=3D"_blank" href=3D"mailto:oauth@ietf.org">oauth@ietf.org</a> <br>=0A <b=
><span style=3D"font-weight:bold;">Sent:</span></b> Friday, February 1, 201=
3 7:37 AM<br> <b><span style=3D"font-weight:bold;">Subject:</span></b> [OAU=
TH-WG] I'm concerned about how the sniffability of oauth2 requests<br>=0A <=
/font> </div><div><div class=3D"yiv450162103h5"> <br>=0A<div><div dir=3D"lt=
r">In an oauth2 request, the access token is passed along in the header, wi=
th nothing else.<div><br></div><div>As I understand it, oauth2 was designed=
 to be simple for everyone to use. And while, that's true, I don't really l=
ike how all of the security is reliant on SSL.</div>=0A=0A=0A<div><br></div=
><div>what if an attack can strip away SSL using a tool such as sslstrip (o=
r whatever else would be more suitable for modern https)? They would be abl=
e to see the access token and start forging whatever request he or she want=
s to.</div>=0A=0A=0A<div><br></div><div>Why not do some sort of RSA-type pu=
blic-private key thing like back in Oauth1, where there is verification of =
the payload on each request? Just use a better algorithm?</div></div>=0A</d=
iv><br></div></div>_______________________________________________<br>OAuth=
 mailing list<br><a rel=3D"nofollow" ymailto=3D"mailto:OAuth@ietf.org" targ=
et=3D"_blank" href=3D"mailto:OAuth@ietf.org">OAuth@ietf.org</a><br><a rel=
=3D"nofollow" target=3D"_blank" href=3D"https://www.ietf.org/mailman/listin=
fo/oauth">https://www.ietf.org/mailman/listinfo/oauth</a><br>=0A<br><br> </=
div> </div>  </div></div><br>______________________________________________=
_<br>=0AOAuth mailing list<br>=0A<a rel=3D"nofollow" ymailto=3D"mailto:OAut=
h@ietf.org" target=3D"_blank" href=3D"mailto:OAuth@ietf.org">OAuth@ietf.org=
</a><br>=0A<a rel=3D"nofollow" target=3D"_blank" href=3D"https://www.ietf.o=
rg/mailman/listinfo/oauth">https://www.ietf.org/mailman/listinfo/oauth</a><=
br>=0A<br></blockquote></div><br><br clear=3D"all"><div><br></div>-- <br>Th=
anks &amp; Regards,<br>Prabath<div><br></div><div>Mobile : +94 71 809 6732&=
nbsp;<br><br>http://blog.facilelogin.com<br>=0Ahttp://RampartFAQ.com</div>=
=0A</div><br><br> </div> </div>  </div></body></html>
--1935884094-1082862167-1360173369=:63130--

From prabath@wso2.com  Wed Feb  6 10:00:08 2013
Return-Path: <prabath@wso2.com>
X-Original-To: oauth@ietfa.amsl.com
Delivered-To: oauth@ietfa.amsl.com
Received: from localhost (localhost [127.0.0.1]) by ietfa.amsl.com (Postfix) with ESMTP id 57E5D21F897A for <oauth@ietfa.amsl.com>; Wed,  6 Feb 2013 10:00:08 -0800 (PST)
X-Virus-Scanned: amavisd-new at amsl.com
X-Spam-Flag: NO
X-Spam-Score: -2.624
X-Spam-Level: 
X-Spam-Status: No, score=-2.624 tagged_above=-999 required=5 tests=[AWL=0.353,  BAYES_00=-2.599, FM_FORGED_GMAIL=0.622, HTML_MESSAGE=0.001, RCVD_IN_DNSWL_LOW=-1]
Received: from mail.ietf.org ([64.170.98.30]) by localhost (ietfa.amsl.com [127.0.0.1]) (amavisd-new, port 10024) with ESMTP id itGJ3mO8Q6lu for <oauth@ietfa.amsl.com>; Wed,  6 Feb 2013 10:00:07 -0800 (PST)
Received: from mail-ea0-f170.google.com (mail-ea0-f170.google.com [209.85.215.170]) by ietfa.amsl.com (Postfix) with ESMTP id 092AF21F8999 for <oauth@ietf.org>; Wed,  6 Feb 2013 10:00:06 -0800 (PST)
Received: by mail-ea0-f170.google.com with SMTP id a11so751151eaa.29 for <oauth@ietf.org>; Wed, 06 Feb 2013 10:00:05 -0800 (PST)
X-Google-DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=google.com; s=20120113; h=mime-version:x-received:in-reply-to:references:date:message-id :subject:from:to:cc:content-type:x-gm-message-state; bh=eD7t1a4+wajK+YEDWqhM4roaw22nDGOiYK7K0NyvGMQ=; b=fca67tW+2zzPo+7rmukg/TtgNRbrkWPRGLvJSJnQmBuamD4wHtg5Jf9vikeg8B2Vyy tTE5fGY7HGaYR08sErlG3VcXq8dExNMieESaFJvQg7EqtEb2VkXf3mCsWX2ikv5LxXT2 IT7iE78czl1IeyQ45nAiHx0s1WWCbbqU13JtkitdnrkT83rRsPE2VcIpwcMoSLfmvGVi xYCZ98VcBYmBV325ls6bzh7bFBstonGVNgwBtca5Afe7afmEroMjCxXib5Rz7KzyAWGJ EZqW0on2eFW3FUu3MNiloei02VQO8PpBSNNuknRstg+BzH4LEpwUl13wGb3Vl+p7R9dY dC1A==
MIME-Version: 1.0
X-Received: by 10.14.173.196 with SMTP id v44mr98741393eel.29.1360173605597; Wed, 06 Feb 2013 10:00:05 -0800 (PST)
Received: by 10.223.175.134 with HTTP; Wed, 6 Feb 2013 10:00:05 -0800 (PST)
In-Reply-To: <1360173369.63130.YahooMailNeo@web31810.mail.mud.yahoo.com>
References: <CAEeqsMat2_zoSCyx7uN373m1SMNGAz=QxEmVYWOYax=Ppt2LnQ@mail.gmail.com> <1359995273.56871.YahooMailNeo@web31809.mail.mud.yahoo.com> <CAJV9qO_Zw3bO2L=m6AzhPGQF0B6T5_HOyuTzLTDiKGJGM=Wi7A@mail.gmail.com> <1360173369.63130.YahooMailNeo@web31810.mail.mud.yahoo.com>
Date: Wed, 6 Feb 2013 23:30:05 +0530
Message-ID: <CAJV9qO94U5PMHOzM6LjPGAqUGdCsPAgDbxV8vWedYbWmiF815A@mail.gmail.com>
From: Prabath Siriwardena <prabath@wso2.com>
To: William Mills <wmills_92105@yahoo.com>
Content-Type: multipart/alternative; boundary=047d7b60436898324504d5121835
X-Gm-Message-State: ALoCoQnC/27UDv6p7Kp3CnUA5npY9iiiNeEPxGyBJwmiqdAzDE8tdeSr27n4hOFl5sKKnEA6z6bm
Cc: "oauth@ietf.org" <oauth@ietf.org>, "L. Preston Sego III" <LPSego3@gmail.com>
Subject: Re: [OAUTH-WG] I'm concerned about how the sniffability of oauth2 requests
X-BeenThere: oauth@ietf.org
X-Mailman-Version: 2.1.12
Precedence: list
List-Id: OAUTH WG <oauth.ietf.org>
List-Unsubscribe: <https://www.ietf.org/mailman/options/oauth>, <mailto:oauth-request@ietf.org?subject=unsubscribe>
List-Archive: <http://www.ietf.org/mail-archive/web/oauth>
List-Post: <mailto:oauth@ietf.org>
List-Help: <mailto:oauth-request@ietf.org?subject=help>
List-Subscribe: <https://www.ietf.org/mailman/listinfo/oauth>, <mailto:oauth-request@ietf.org?subject=subscribe>
X-List-Received-Date: Wed, 06 Feb 2013 18:00:08 -0000

--047d7b60436898324504d5121835
Content-Type: text/plain; charset=ISO-8859-1

On Wed, Feb 6, 2013 at 11:26 PM, William Mills <wmills_92105@yahoo.com>wrote:

> Yes, MAC relies on SSL for transport security.  But you have bigger
> problems than that if SSL is broken, because your primary authentication
> credential is compromised now.
>

+1


>
> Do we need to address sslstrip here if it's a general attack on SSL
> transport for the browser?
>

Yes.. its a general attack against SSL and counter measures defined too..

Thanks & regards,
-Prabath


>   ------------------------------
> *From:* Prabath Siriwardena <prabath@wso2.com>
> *To:* William Mills <wmills_92105@yahoo.com>
> *Cc:* L. Preston Sego III <LPSego3@gmail.com>; "oauth@ietf.org" <
> oauth@ietf.org>
> *Sent:* Wednesday, February 6, 2013 8:23 AM
> *Subject:* Re: [OAUTH-WG] I'm concerned about how the sniffability of
> oauth2 requests
>
>
>
> On Mon, Feb 4, 2013 at 9:57 PM, William Mills <wmills_92105@yahoo.com>wrote:
>
> There are two efforts at signed token types: MAC which is still a
> possibility if we wake up and do it, and the "Holder Of Key" type tokens.
>
>
> If someone can use sslstrip then even MAC is not safe - since MAC key
> needs to be transferred over SSL to the Client from the AS.
>
> There are standard ways in HTTP to avoid or protect from sslstrip - IMHO
> we need to occupy those best practices...
>
> Thanks & regards,
> -Prabath
>
>
>
> There are a lot of folks that agree with you.
>
>   ------------------------------
> *From:* L. Preston Sego III <LPSego3@gmail.com>
> *To:* oauth@ietf.org
> *Sent:* Friday, February 1, 2013 7:37 AM
> *Subject:* [OAUTH-WG] I'm concerned about how the sniffability of oauth2
> requests
>
> In an oauth2 request, the access token is passed along in the header, with
> nothing else.
>
> As I understand it, oauth2 was designed to be simple for everyone to use.
> And while, that's true, I don't really like how all of the security is
> reliant on SSL.
>
> what if an attack can strip away SSL using a tool such as sslstrip (or
> whatever else would be more suitable for modern https)? They would be able
> to see the access token and start forging whatever request he or she wants
> to.
>
> Why not do some sort of RSA-type public-private key thing like back in
> Oauth1, where there is verification of the payload on each request? Just
> use a better algorithm?
>
> _______________________________________________
> OAuth mailing list
> OAuth@ietf.org
> https://www.ietf.org/mailman/listinfo/oauth
>
>
>
> _______________________________________________
> OAuth mailing list
> OAuth@ietf.org
> https://www.ietf.org/mailman/listinfo/oauth
>
>
>
>
> --
> Thanks & Regards,
> Prabath
>
> Mobile : +94 71 809 6732
>
> http://blog.facilelogin.com
> http://RampartFAQ.com
>
>
>


-- 
Thanks & Regards,
Prabath

Mobile : +94 71 809 6732

http://blog.facilelogin.com
http://RampartFAQ.com

--047d7b60436898324504d5121835
Content-Type: text/html; charset=ISO-8859-1
Content-Transfer-Encoding: quoted-printable

<br><br><div class=3D"gmail_quote">On Wed, Feb 6, 2013 at 11:26 PM, William=
 Mills <span dir=3D"ltr">&lt;<a href=3D"mailto:wmills_92105@yahoo.com" targ=
et=3D"_blank">wmills_92105@yahoo.com</a>&gt;</span> wrote:<br><blockquote c=
lass=3D"gmail_quote" style=3D"margin:0 0 0 .8ex;border-left:1px #ccc solid;=
padding-left:1ex">
<div><div style=3D"font-size:12pt;font-family:Courier New,courier,monaco,mo=
nospace,sans-serif"><div><span>Yes, MAC relies on SSL for transport securit=
y. =A0But you have bigger problems than that if SSL is broken, because your=
 primary authentication credential is compromised now.</span></div>
</div></div></blockquote><div><br></div><div>+1</div><div>=A0</div><blockqu=
ote class=3D"gmail_quote" style=3D"margin:0 0 0 .8ex;border-left:1px #ccc s=
olid;padding-left:1ex"><div><div style=3D"font-size:12pt;font-family:Courie=
r New,courier,monaco,monospace,sans-serif">
<div style=3D"font-style:normal;font-size:16px;background-color:transparent=
;font-family:&#39;Courier New&#39;,courier,monaco,monospace,sans-serif"><sp=
an><br></span></div><div style=3D"font-style:normal;font-size:16px;backgrou=
nd-color:transparent;font-family:&#39;Courier New&#39;,courier,monaco,monos=
pace,sans-serif">
<span>Do we need to address sslstrip here if it&#39;s a general attack on S=
SL transport for the browser?</span></div></div></div></blockquote><div><br=
></div><div>Yes.. its a general attack against SSL and counter measures def=
ined too..=A0</div>
<div><br></div><div>Thanks &amp; regards,</div><div>-Prabath</div><div><br>=
</div><blockquote class=3D"gmail_quote" style=3D"margin:0 0 0 .8ex;border-l=
eft:1px #ccc solid;padding-left:1ex"><div><div style=3D"font-size:12pt;font=
-family:Courier New,courier,monaco,monospace,sans-serif">
<div><br></div><div class=3D"hm HOEnZb">  </div><div style=3D"font-family:&=
#39;Courier New&#39;,courier,monaco,monospace,sans-serif;font-size:12pt"><d=
iv class=3D"hm HOEnZb"> </div><div><div class=3D"hm HOEnZb"> <div dir=3D"lt=
r"> <font face=3D"Arial"> <hr size=3D"1">
  <b><span style=3D"font-weight:bold">From:</span></b> Prabath Siriwardena =
&lt;<a href=3D"mailto:prabath@wso2.com" target=3D"_blank">prabath@wso2.com<=
/a>&gt;<br> <b><span style=3D"font-weight:bold">To:</span></b> William Mill=
s &lt;<a href=3D"mailto:wmills_92105@yahoo.com" target=3D"_blank">wmills_92=
105@yahoo.com</a>&gt; <br>
<b><span style=3D"font-weight:bold">Cc:</span></b> L. Preston Sego III &lt;=
<a href=3D"mailto:LPSego3@gmail.com" target=3D"_blank">LPSego3@gmail.com</a=
>&gt;; &quot;<a href=3D"mailto:oauth@ietf.org" target=3D"_blank">oauth@ietf=
.org</a>&quot; &lt;<a href=3D"mailto:oauth@ietf.org" target=3D"_blank">oaut=
h@ietf.org</a>&gt; <br>
 <b><span style=3D"font-weight:bold">Sent:</span></b> Wednesday, February 6=
, 2013 8:23 AM<br> <b><span style=3D"font-weight:bold">Subject:</span></b> =
Re: [OAUTH-WG] I&#39;m concerned about how the sniffability of oauth2 reque=
sts<br>
 </font> </div></div><div><div class=3D"h5"> <br>
<div><br><br><div>On Mon, Feb 4, 2013 at 9:57 PM, William Mills <span dir=
=3D"ltr">&lt;<a rel=3D"nofollow" href=3D"mailto:wmills_92105@yahoo.com" tar=
get=3D"_blank">wmills_92105@yahoo.com</a>&gt;</span> wrote:<br><blockquote =
style=3D"margin:0 0 0 .8ex;border-left:1px #ccc solid;padding-left:1ex">

<div><div style=3D"font-size:12pt;font-family:&#39;Courier New&#39;,courier=
,monaco,monospace,sans-serif"><div><span>There are two efforts at signed to=
ken types: MAC which is still a possibility if we wake up and do it, and th=
e &quot;Holder Of Key&quot; type tokens.</span></div>

</div></div></blockquote><div><br></div><div>If someone can use sslstrip th=
en even MAC is not safe - since MAC key needs to be transferred over SSL to=
 the Client from the AS.</div><div><br></div><div>There are standard ways i=
n HTTP to avoid or protect from sslstrip - IMHO we need to occupy those bes=
t practices...</div>

<div><br></div><div>Thanks &amp; regards,</div><div>-Prabath</div><div>=A0<=
/div><blockquote style=3D"margin:0 0 0 .8ex;border-left:1px #ccc solid;padd=
ing-left:1ex"><div><div style=3D"font-size:12pt;font-family:&#39;Courier Ne=
w&#39;,courier,monaco,monospace,sans-serif">

<div style=3D"font-style:normal;font-size:16px;background-color:transparent=
"><span><br></span></div><div style=3D"font-style:normal;font-size:16px;bac=
kground-color:transparent">
<span>There are a lot of folks that agree with you.</span></div><div><br></=
div>  <div style=3D"font-size:12pt"> <div style=3D"font-size:12pt">
 <div dir=3D"ltr"> <font face=3D"Arial"> <hr size=3D"1">  <b><span style=3D=
"font-weight:bold">From:</span></b> L. Preston Sego III &lt;<a rel=3D"nofol=
low" href=3D"mailto:LPSego3@gmail.com" target=3D"_blank">LPSego3@gmail.com<=
/a>&gt;<br>
 <b><span style=3D"font-weight:bold">To:</span></b> <a rel=3D"nofollow" hre=
f=3D"mailto:oauth@ietf.org" target=3D"_blank">oauth@ietf.org</a> <br>
 <b><span style=3D"font-weight:bold">Sent:</span></b> Friday, February 1, 2=
013 7:37 AM<br> <b><span style=3D"font-weight:bold">Subject:</span></b> [OA=
UTH-WG] I&#39;m concerned about how the sniffability of oauth2 requests<br>

 </font> </div><div><div> <br>
<div><div dir=3D"ltr">In an oauth2 request, the access token is passed alon=
g in the header, with nothing else.<div><br></div><div>As I understand it, =
oauth2 was designed to be simple for everyone to use. And while, that&#39;s=
 true, I don&#39;t really like how all of the security is reliant on SSL.</=
div>



<div><br></div><div>what if an attack can strip away SSL using a tool such =
as sslstrip (or whatever else would be more suitable for modern https)? The=
y would be able to see the access token and start forging whatever request =
he or she wants to.</div>



<div><br></div><div>Why not do some sort of RSA-type public-private key thi=
ng like back in Oauth1, where there is verification of the payload on each =
request? Just use a better algorithm?</div></div>
</div><br></div></div>_______________________________________________<br>OA=
uth mailing list<br><a rel=3D"nofollow" href=3D"mailto:OAuth@ietf.org" targ=
et=3D"_blank">OAuth@ietf.org</a><br><a rel=3D"nofollow" href=3D"https://www=
.ietf.org/mailman/listinfo/oauth" target=3D"_blank">https://www.ietf.org/ma=
ilman/listinfo/oauth</a><br>

<br><br> </div> </div>  </div></div><br>___________________________________=
____________<br>
OAuth mailing list<br>
<a rel=3D"nofollow" href=3D"mailto:OAuth@ietf.org" target=3D"_blank">OAuth@=
ietf.org</a><br>
<a rel=3D"nofollow" href=3D"https://www.ietf.org/mailman/listinfo/oauth" ta=
rget=3D"_blank">https://www.ietf.org/mailman/listinfo/oauth</a><br>
<br></blockquote></div><br><br clear=3D"all"><div><br></div>-- <br>Thanks &=
amp; Regards,<br>Prabath<div><br></div><div>Mobile : <a href=3D"tel:%2B94%2=
071%20809%206732" value=3D"+94718096732" target=3D"_blank">+94 71 809 6732<=
/a>=A0<br>
<br><a href=3D"http://blog.facilelogin.com" target=3D"_blank">http://blog.f=
acilelogin.com</a><br>
<a href=3D"http://RampartFAQ.com" target=3D"_blank">http://RampartFAQ.com</=
a></div>
</div><br><br> </div></div></div> </div>  </div></div></blockquote></div><b=
r><br clear=3D"all"><div><br></div>-- <br>Thanks &amp; Regards,<br>Prabath<=
div><br></div><div>Mobile : +94 71 809 6732=A0<br><br><a href=3D"http://blo=
g.facilelogin.com" target=3D"_blank">http://blog.facilelogin.com</a><br>
<a href=3D"http://RampartFAQ.com" target=3D"_blank">http://RampartFAQ.com</=
a></div>

--047d7b60436898324504d5121835--

From torsten@lodderstedt.net  Wed Feb  6 10:26:05 2013
Return-Path: <torsten@lodderstedt.net>
X-Original-To: oauth@ietfa.amsl.com
Delivered-To: oauth@ietfa.amsl.com
Received: from localhost (localhost [127.0.0.1]) by ietfa.amsl.com (Postfix) with ESMTP id C5F1C21F8A71; Wed,  6 Feb 2013 10:26:05 -0800 (PST)
X-Virus-Scanned: amavisd-new at amsl.com
X-Spam-Flag: NO
X-Spam-Score: -0.651
X-Spam-Level: 
X-Spam-Status: No, score=-0.651 tagged_above=-999 required=5 tests=[AWL=0.201,  BAYES_00=-2.599, HELO_EQ_DE=0.35, HTML_MESSAGE=0.001, MIME_QP_LONG_LINE=1.396]
Received: from mail.ietf.org ([64.170.98.30]) by localhost (ietfa.amsl.com [127.0.0.1]) (amavisd-new, port 10024) with ESMTP id P5ddq8xTTToR; Wed,  6 Feb 2013 10:26:04 -0800 (PST)
Received: from smtprelay03.ispgateway.de (smtprelay03.ispgateway.de [80.67.31.41]) by ietfa.amsl.com (Postfix) with ESMTP id B2E3921F8A9B; Wed,  6 Feb 2013 10:26:03 -0800 (PST)
Received: from [79.253.12.66] (helo=[192.168.71.56]) by smtprelay03.ispgateway.de with esmtpsa (TLSv1:AES128-SHA:128) (Exim 4.68) (envelope-from <torsten@lodderstedt.net>) id 1U39gt-0007yE-UZ; Wed, 06 Feb 2013 19:25:52 +0100
References: <CAJV9qO8UgLV6SdegZSk4KT3Qyb-M2KmPFPV9xDht_WjibeUWrg@mail.gmail.com> <51126D65.2090707@mitre.org> <CAJV9qO-ZNVcbzNvb---CmXv+vo0jZHKQaDon8OqrPJCfAXKTRQ@mail.gmail.com> <5112746B.70403@mitre.org> <CAJV9qO-mz=K_fJHO8g8XH8DtUxFPvN8hRF7K=gn0etAAqeb0zg@mail.gmail.com> <OF8CC0704A.7E320CB4-ON85257B0A.0055661B-85257B0A.00558648@us.ibm.com> <CAJV9qO-fM6JgHRzKOzJi00AcsnZCqO-i-YCM_uoRuB=HqWDg7A@mail.gmail.com>
Mime-Version: 1.0 (1.0)
In-Reply-To: <CAJV9qO-fM6JgHRzKOzJi00AcsnZCqO-i-YCM_uoRuB=HqWDg7A@mail.gmail.com>
Content-Type: multipart/alternative; boundary=Apple-Mail-86FAD03F-F32C-4118-9F10-28BE9AF4C20F
Content-Transfer-Encoding: 7bit
Message-Id: <611639B1-8B4B-4010-A1DF-A0A8057F3EA8@lodderstedt.net>
X-Mailer: iPad Mail (10B141)
From: Torsten Lodderstedt <torsten@lodderstedt.net>
Date: Wed, 6 Feb 2013 19:25:54 +0100
To: Prabath Siriwardena <prabath@wso2.com>
X-Df-Sender: dG9yc3RlbkBsb2RkZXJzdGVkdC1vbmxpbmUuZGU=
Cc: "oauth-bounces@ietf.org" <oauth-bounces@ietf.org>, "oauth@ietf.org WG" <oauth@ietf.org>
Subject: Re: [OAUTH-WG] A question on token revocation.
X-BeenThere: oauth@ietf.org
X-Mailman-Version: 2.1.12
Precedence: list
List-Id: OAUTH WG <oauth.ietf.org>
List-Unsubscribe: <https://www.ietf.org/mailman/options/oauth>, <mailto:oauth-request@ietf.org?subject=unsubscribe>
List-Archive: <http://www.ietf.org/mail-archive/web/oauth>
List-Post: <mailto:oauth@ietf.org>
List-Help: <mailto:oauth-request@ietf.org?subject=help>
List-Subscribe: <https://www.ietf.org/mailman/listinfo/oauth>, <mailto:oauth-request@ietf.org?subject=subscribe>
X-List-Received-Date: Wed, 06 Feb 2013 18:26:05 -0000

--Apple-Mail-86FAD03F-F32C-4118-9F10-28BE9AF4C20F
Content-Type: text/plain;
	charset=us-ascii
Content-Transfer-Encoding: quoted-printable

Hi Prabath,

we tried to address both use cases in the first revisions of the draft. The A=
PI was well suited for client-driven revocation but not the resource owner -=
 driven use case. There are definitely differences with respect to the proto=
col design, at least regarding authentication and authorization of the respe=
ctive actors. This made the spec more complex and caused ambiguities and con=
fusion. Moreover, the working group seemed not convinced by the the latter u=
se case.

Therefore the working group decided to focus on the single use cases of the r=
evocation by clients. This makes a lot of sense since this interface is most=
 important with respect to interoperability.

I'm focusing right now on finishing this draft. And the open issues discusse=
d on the list in the last couple of weeks illustrate that even this poses a c=
onsiderable amount of work. So I'm very reluctant to add support for a whole=
 new use case at that point of the process.

If you feel this is an important use case worth an RFC, don't hesitate to pu=
blish a new I-D.

regards,
Torsten.

Am 06.02.2013 um 16:37 schrieb Prabath Siriwardena <prabath@wso2.com>:

>=20
>=20
> On Wed, Feb 6, 2013 at 9:04 PM, Todd W Lainhart <lainhart@us.ibm.com> wrot=
e:
>> > Resource owner needs to know the consumer key (represents the OAuth Cli=
ent app) & scope to revoke the access token for a given client. =20
>>=20
>> I see - you're saying that requiring client credentials on the end point i=
s the problem?
>=20
> In fact what I meant was - when RO authorizes the an access token for clie=
nt for particular scope. Those information are kept at the AS.
>=20
> Now - if the RO want to revoke access from the client - the RO needs to au=
thenticate him self to the AS and pass the consumer key and the scope. So AS=
 can revoke access.
>=20
> Thanks & regards,
> -Prabath
> =20
>>=20
>>=20
>>=20
>>=20
>> Todd Lainhart
>> Rational software
>> IBM Corporation
>> 550 King Street, Littleton, MA 01460-1250
>> 1-978-899-4705
>> 2-276-4705 (T/L)
>> lainhart@us.ibm.com
>>=20
>>=20
>>=20
>>=20
>>=20
>> From:        Prabath Siriwardena <prabath@wso2.com>=20
>> To:        Justin Richer <jricher@mitre.org>,=20
>> Cc:        "oauth@ietf.org WG" <oauth@ietf.org>=20
>> Date:        02/06/2013 10:31 AM=20
>> Subject:        Re: [OAUTH-WG] A question on token revocation.=20
>> Sent by:        oauth-bounces@ietf.org=20
>>=20
>>=20
>>=20
>>=20
>>=20
>> On Wed, Feb 6, 2013 at 8:49 PM, Justin Richer <jricher@mitre.org> wrote:=20=

>>=20
>> On 02/06/2013 10:13 AM, Prabath Siriwardena wrote:=20
>>=20
>>=20
>> On Wed, Feb 6, 2013 at 8:19 PM, Justin Richer <jricher@mitre.org> wrote:=20=

>> These are generally handled through a user interface where the RO is auth=
enticated directly to the AS, and there's not much need for a "protocol" her=
e, in practice.=20
>>=20
>> Why do you think leaving access token revocation by RO to a proprietary A=
PI is a good practice ? IMO this an essential requirement in API security.=20=

>> I think it makes more sense in the same way that having a "proprietary" U=
I/API for managing the user consent makes sense: unless you're doing a fully=
 dynamic end-to-end system like UMA, then there's not much value in trying t=
o squeeze disparate systems into the same mold, since they won't be talking t=
o each other anyway.=20
>>=20
>> This is required in distributed setup for each API platform from differen=
t vendors to perform in an interop manner.=20
>>  =20
>>=20
>> And since you refer to it as an "API", what will the RO be using to call t=
his API? Is there a token management client that's separate from the OAuth c=
lient?=20
>>=20
>> I didn't get your question right... If you meant the how to invoke revoca=
tion end point, the the resource owner needs to know the consumer key (repre=
sents the OAuth Client app) & scope to revoke the access token for a given c=
lient. =20
>>=20
>>=20
>>=20
>> IMHO token revocation done my RO is more practical than token revocation d=
one by the Client.=20
>> They're both valid but require different kinds of protocols and considera=
tions. This token revocation draft is meant to solve one problem, and that d=
oesn't mean it can or should solve other seemingly related problems.
>>=20
>> If you would like to see the RO-initiated token revocation go through (no=
t grant revocation, mind you -- that's related, but different), then I would=
 suggest that you start specifying exactly how that works. I predict it will=
 be problematic in practice, though, as the RO often doesn't actually have d=
irect access to the token itself.=20
>>=20
>> Resource owner needs to know the consumer key (represents the OAuth Clien=
t app) & scope to revoke the access token for a given client. =20
>>=20
>>  =20
>>=20
>>  =20
>> There are larger applications, like UMA, that have client and PR provisio=
ning that would allow for this to be managed somewhat programmatically, but e=
ven in that case you're still generally doing token revocation by a "client"=
 in some fashion. In UMA, though, several different pieces can play the role=
 of a "client" at different parts of the process.
>>=20
>> Revoking a scope is a whole different mess. Generally, you'd want to just=
 revoke an existing token and make a new authorization grant with lower acce=
ss if you don't want that client getting that scope anymore. If you just wan=
t to downscope for a single transaction, you can already do that with either=
 the refresh token or token chaining approaches, depending on where in the p=
rocess you are. The latter of these are both client-focused, though, and the=
 RO doesn't have a direct hand in it at this point.=20
>>=20
>> Why do you think it a mess. If you revoke the entire token then Client ne=
eds to go through the complete OAuth flow - and also needs to get the user c=
onsent. If RO can  downgrade the scope, then we restrict API access by the c=
lient at RS end and its transparent to the client.=20
>>=20
>>=20
>> Downgrading the scope of tokens in the wild is hardly transparent to the c=
lient (stuff that it expects to work will suddenly start to fail, meaning th=
at most clients will throw out the token and try to get a new one), and in a=
 distributed system you've got to propagate that change to the RS. If you ba=
ke the scopes into the token itself (which many do) then you actually *can't=
* downgrade a single token, anyway.=20
>>=20
>> Yes.. that is the expected behavior. I mean the process is transparent. C=
lient will notice at runtime.=20
>>=20
>> Thanks & regards,=20
>> -Prabath=20
>>  =20
>>=20
>>  -- Justin=20
>>=20
>>=20
>> Thanks & regards,=20
>> -Prabath=20
>>  =20
>>=20
>>=20
>>  -- Justin=20
>>=20
>>=20
>> On 02/06/2013 04:35 AM, Prabath Siriwardena wrote:=20
>> I am sorry if this was already discussed in this list.. =20
>>=20
>> Looking at [1] it only talks about revoking the access token from the cli=
ent.=20
>>=20
>> How about the resource owner..?=20
>>=20
>> There can be cases where resource owner needs to revoke an authorized acc=
ess token from a given client. Or revoke an scope..=20
>>=20
>> How are we going to address these requirements..? Thoughts appreciated...=
=20
>>=20
>> [1] http://tools.ietf.org/html/draft-ietf-oauth-revocation-04=20
>>=20
>> --=20
>> Thanks & Regards,
>> Prabath=20
>>=20
>> Mobile : +94 71 809 6732=20
>>=20
>> http://blog.facilelogin.com
>> http://RampartFAQ.com=20
>>=20
>>=20
>> _______________________________________________
>> OAuth mailing list
>> OAuth@ietf.org
>> https://www.ietf.org/mailman/listinfo/oauth
>>=20
>>=20
>>=20
>>=20
>>=20
>> --=20
>> Thanks & Regards,
>> Prabath=20
>>=20
>> Mobile : +94 71 809 6732=20
>>=20
>> http://blog.facilelogin.com
>> http://RampartFAQ.com=20
>>=20
>>=20
>>=20
>>=20
>> --=20
>> Thanks & Regards,
>> Prabath=20
>>=20
>> Mobile : +94 71 809 6732=20
>>=20
>> http://blog.facilelogin.com
>> http://RampartFAQ.com_______________________________________________
>> OAuth mailing list
>> OAuth@ietf.org
>> https://www.ietf.org/mailman/listinfo/oauth
>=20
>=20
>=20
> --=20
> Thanks & Regards,
> Prabath
>=20
> Mobile : +94 71 809 6732=20
>=20
> http://blog.facilelogin.com
> http://RampartFAQ.com
> _______________________________________________
> OAuth mailing list
> OAuth@ietf.org
> https://www.ietf.org/mailman/listinfo/oauth

--Apple-Mail-86FAD03F-F32C-4118-9F10-28BE9AF4C20F
Content-Type: text/html;
	charset=utf-8
Content-Transfer-Encoding: quoted-printable

<html><head><meta http-equiv=3D"content-type" content=3D"text/html; charset=3D=
utf-8"></head><body dir=3D"auto"><div>Hi Prabath,</div><div><br></div><div>w=
e tried to address both use cases in the first revisions of the draft. The A=
PI was well suited for client-driven revocation but not the resource owner -=
 driven use case. There are definitely differences with respect to the proto=
col design, at least regarding <span style=3D"-webkit-tap-highlight-color: r=
gba(26, 26, 26, 0.292969); -webkit-composition-fill-color: rgba(175, 192, 22=
7, 0.230469); -webkit-composition-frame-color: rgba(77, 128, 180, 0.230469);=
 ">authentication and authorization of the respective actors.&nbsp;</span>Th=
is made the spec more complex and<span style=3D"-webkit-tap-highlight-color:=
 rgba(26, 26, 26, 0.292969); -webkit-composition-fill-color: rgba(175, 192, 2=
27, 0.230469); -webkit-composition-frame-color: rgba(77, 128, 180, 0.230469)=
; ">&nbsp;caused ambiguities and confusion. Moreover, the working group seem=
ed not convinced by the the latter use case.</span></div><div><br></div><div=
>Therefore the working group decided to focus on the single use cases of the=
 revocation by clients. This makes a lot of sense since this interface is mo=
st important with respect to interoperability.</div><div><br></div><div>I'm f=
ocusing right now on finishing this draft. And the open issues discussed on t=
he list in the last couple of weeks illustrate that even this poses a consid=
erable amount of work. So I'm very reluctant to add support for a whole new u=
se case at that point of the process.</div><div><br></div><div>If you feel t=
his is an important use case worth an RFC, don't hesitate to publish a new I=
-D.</div><div><br></div><div>regards,</div><div>Torsten.</div><div><br></div=
><div>Am 06.02.2013 um 16:37 schrieb Prabath Siriwardena &lt;<a href=3D"mail=
to:prabath@wso2.com">prabath@wso2.com</a>&gt;:<br><br></div><blockquote type=
=3D"cite"><div><br><br><div class=3D"gmail_quote">On Wed, Feb 6, 2013 at 9:0=
4 PM, Todd W Lainhart <span dir=3D"ltr">&lt;<a href=3D"mailto:lainhart@us.ib=
m.com" target=3D"_blank">lainhart@us.ibm.com</a>&gt;</span> wrote:<br><block=
quote class=3D"gmail_quote" style=3D"margin:0 0 0 .8ex;border-left:1px #ccc s=
olid;padding-left:1ex">
<div class=3D"im"><font face=3D"sans-serif">&gt; </font><font size=3D"3">Res=
ource owner
needs to know the consumer key (represents the OAuth Client app) &amp;
scope to revoke the access token for a given client.&nbsp;</font>
<br>
<br></div><font face=3D"sans-serif">I see - you're saying that requiring
client credentials on the end point is the problem?<br></font></blockquote><=
div><br></div><div>In fact what I meant was - when RO authorizes the an acce=
ss token for client for particular scope. Those information are kept at the A=
S.</div>
<div><br></div><div>Now - if the RO want to revoke access from the client - t=
he RO needs to authenticate him self to the AS and pass the consumer key and=
 the scope. So AS can revoke access.</div><div><br></div><div>Thanks &amp; r=
egards,</div>
<div>-Prabath</div><div>&nbsp;</div><blockquote class=3D"gmail_quote" style=3D=
"margin:0 0 0 .8ex;border-left:1px #ccc solid;padding-left:1ex"><font face=3D=
"sans-serif">
</font><div class=3D"im">
<br>
<table width=3D"223" style=3D"border-collapse:collapse">
<tbody><tr height=3D"8">
<td width=3D"223" bgcolor=3D"white" style=3D"border-style:solid;border-color=
:#000000;border-width:0px 0px 0px 0px;padding:0px 0px"><font size=3D"1" face=
=3D"Verdana"><b><br>
<br>
<br>
Todd Lainhart<br>
Rational software<br>
IBM Corporation<br>
550 King Street, Littleton, MA 01460-1250</b></font><font size=3D"1" face=3D=
"Arial"><b><br>
1-978-899-4705<br>
2-276-4705 (T/L)<br>
<a href=3D"mailto:lainhart@us.ibm.com" target=3D"_blank">lainhart@us.ibm.com=
</a></b></font></td></tr></tbody></table>
<br>
<br>
<br>
<br>
<br></div><font size=3D"1" color=3D"#5f5f5f" face=3D"sans-serif">From: &nbsp=
; &nbsp; &nbsp;
&nbsp;</font><font size=3D"1" face=3D"sans-serif">Prabath Siriwardena
&lt;<a href=3D"mailto:prabath@wso2.com" target=3D"_blank">prabath@wso2.com</=
a>&gt;</font>
<br><font size=3D"1" color=3D"#5f5f5f" face=3D"sans-serif">To: &nbsp; &nbsp;=
 &nbsp;
&nbsp;</font><font size=3D"1" face=3D"sans-serif">Justin Richer &lt;<a href=3D=
"mailto:jricher@mitre.org" target=3D"_blank">jricher@mitre.org</a>&gt;,
</font>
<br><font size=3D"1" color=3D"#5f5f5f" face=3D"sans-serif">Cc: &nbsp; &nbsp;=
 &nbsp;
&nbsp;</font><font size=3D"1" face=3D"sans-serif">"<a href=3D"mailto:oauth@i=
etf.org" target=3D"_blank">oauth@ietf.org</a>
WG" &lt;<a href=3D"mailto:oauth@ietf.org" target=3D"_blank">oauth@ietf.org</=
a>&gt;</font>
<br><font size=3D"1" color=3D"#5f5f5f" face=3D"sans-serif">Date: &nbsp; &nbs=
p; &nbsp;
&nbsp;</font><font size=3D"1" face=3D"sans-serif">02/06/2013 10:31 AM</font>=

<br><div class=3D"im"><font size=3D"1" color=3D"#5f5f5f" face=3D"sans-serif"=
>Subject: &nbsp; &nbsp;
&nbsp; &nbsp;</font><font size=3D"1" face=3D"sans-serif">Re: [OAUTH-WG]
A question on token revocation.</font>
<br><font size=3D"1" color=3D"#5f5f5f" face=3D"sans-serif">Sent by: &nbsp; &=
nbsp;
&nbsp; &nbsp;</font><font size=3D"1" face=3D"sans-serif"><a href=3D"mailto:o=
auth-bounces@ietf.org" target=3D"_blank">oauth-bounces@ietf.org</a></font>
<br>
<hr noshade=3D"">
<br>
<br>
<br><font size=3D"3"><br>
</font>
<br></div><div><div class=3D"h5"><font size=3D"3">On Wed, Feb 6, 2013 at 8:4=
9 PM, Justin Richer &lt;</font><a href=3D"mailto:jricher@mitre.org" target=3D=
"_blank"><font size=3D"3" color=3D"blue"><u>jricher@mitre.org</u></font></a>=
<font size=3D"3">&gt;
wrote:</font>
<br>
<br><font size=3D"3">On 02/06/2013 10:13 AM, Prabath Siriwardena wrote:</fon=
t>
<br><font size=3D"3"><br>
</font>
<br><font size=3D"3">On Wed, Feb 6, 2013 at 8:19 PM, Justin Richer &lt;</fon=
t><a href=3D"mailto:jricher@mitre.org" target=3D"_blank"><font size=3D"3" co=
lor=3D"blue"><u>jricher@mitre.org</u></font></a><font size=3D"3">&gt;
wrote:</font>
<br><font size=3D"3">These are generally handled through a user interface wh=
ere
the RO is authenticated directly to the AS, and there's not much need for
a "protocol" here, in practice. </font>
<br>
<br><font size=3D"3">Why do you think leaving access token revocation by RO
to a proprietary API is a good practice ? IMO this an essential requirement
in API security.</font>
<br><font size=3D"3">I think it makes more sense in the same way that having=

a "proprietary" UI/API for managing the user consent makes sense:
unless you're doing a fully dynamic end-to-end system like UMA, then there's=

not much value in trying to squeeze disparate systems into the same mold,
since they won't be talking to each other anyway. </font>
<br>
<br><font size=3D"3">This is required in distributed setup for each API plat=
form
from different vendors to perform in an interop manner.</font>
<br><font size=3D"3">&nbsp;</font>
<br><font size=3D"3"><br>
And since you refer to it as an "API", what will the RO be using
to call this API? Is there a token management client that's separate from
the OAuth client? </font>
<br>
<br><font size=3D"3">I didn't get your question right... If you meant the ho=
w
to invoke revocation end point, the the resource owner needs to know the
consumer key (represents the OAuth Client app) &amp; scope to revoke the
access token for a given client.&nbsp;</font>
<br>
<br>
<br>
<br><font size=3D"3">IMHO token revocation done my RO is more practical than=

token revocation done by the Client.</font>
<br><font size=3D"3">They're both valid but require different kinds of proto=
cols
and considerations. This token revocation draft is meant to solve one proble=
m,
and that doesn't mean it can or should solve other seemingly related problem=
s.<br>
<br>
If you would like to see the RO-initiated token revocation go through (not
grant revocation, mind you -- that's related, but different), then I would
suggest that you start specifying exactly how that works. I predict it
will be problematic in practice, though, as the RO often doesn't actually
have direct access to the token itself. </font>
<br>
<br><font size=3D"3">Resource owner needs to know the consumer key (represen=
ts
the OAuth Client app) &amp; scope to revoke the access token for a given
client.&nbsp;</font>
<br>
<br><font size=3D"3">&nbsp;</font>
<br>
<br><font size=3D"3">&nbsp;</font>
<br><font size=3D"3">There are larger applications, like UMA, that have clie=
nt
and PR provisioning that would allow for this to be managed somewhat program=
matically,
but even in that case you're still generally doing token revocation by
a "client" in some fashion. In UMA, though, several different
pieces can play the role of a "client" at different parts of
the process.<br>
<br>
Revoking a scope is a whole different mess. Generally, you'd want to just
revoke an existing token and make a new authorization grant with lower
access if you don't want that client getting that scope anymore. If you
just want to downscope for a single transaction, you can already do that
with either the refresh token or token chaining approaches, depending on
where in the process you are. The latter of these are both client-focused,
though, and the RO doesn't have a direct hand in it at this point.</font>
<br>
<br><font size=3D"3">Why do you think it a mess. If you revoke the entire to=
ken
then Client needs to go through the complete OAuth flow - and also needs
to get the user consent. If RO can &nbsp;downgrade the scope, then we restri=
ct
API access by the client at RS end and its transparent to the client.</font>=

<br>
<br>
<br><font size=3D"3">Downgrading the scope of tokens in the wild is hardly
transparent to the client (stuff that it expects to work will suddenly
start to fail, meaning that most clients will throw out the token and try
to get a new one), and in a distributed system you've got to propagate
that change to the RS. If you bake the scopes into the token itself (which
many do) then you actually *can't* downgrade a single token, anyway. </font>=

<br>
<br><font size=3D"3">Yes.. that is the expected behavior. I mean the process=

is transparent. Client will notice at runtime.</font>
<br>
<br><font size=3D"3">Thanks &amp; regards,</font>
<br><font size=3D"3">-Prabath</font>
<br><font size=3D"3">&nbsp;</font>
<br><font size=3D"3" color=3D"#8f8f8f"><br>
&nbsp;-- Justin</font>
<br><font size=3D"3"><br>
</font>
<br><font size=3D"3">Thanks &amp; regards,</font>
<br><font size=3D"3">-Prabath</font>
<br><font size=3D"3">&nbsp;</font>
<br><font size=3D"3" color=3D"#8f8f8f"><br>
<br>
&nbsp;-- Justin</font><font size=3D"3"> </font>
<br><font size=3D"3"><br>
</font>
<br><font size=3D"3">On 02/06/2013 04:35 AM, Prabath Siriwardena wrote:</fon=
t>
<br><font size=3D"3">I am sorry if this was already discussed in this list..=
&nbsp;</font>
<br>
<br><font size=3D"3">Looking at [1] it only talks about revoking the access
token from the client.</font>
<br>
<br><font size=3D"3">How about the resource owner..?</font>
<br>
<br><font size=3D"3">There can be cases where resource owner needs to revoke=

an authorized access token from a given client. Or revoke an scope..</font>
<br>
<br><font size=3D"3">How are we going to address these requirements..? Thoug=
hts
appreciated...</font>
<br>
<br><font size=3D"3">[1] </font><a href=3D"http://tools.ietf.org/html/draft-=
ietf-oauth-revocation-04" target=3D"_blank"><font size=3D"3" color=3D"blue">=
<u>http://tools.ietf.org/html/draft-ietf-oauth-revocation-04</u></font></a>
<br>
<br><font size=3D"3">-- <br>
Thanks &amp; Regards,<br>
Prabath </font>
<br>
<br><font size=3D"3">Mobile : </font><a href=3D"tel:%2B94%2071%20809%206732"=
 target=3D"_blank"><font size=3D"3" color=3D"blue"><u>+94
71 809 6732</u></font></a><font size=3D"3">&nbsp;<br>
</font><font size=3D"3" color=3D"blue"><u><br>
</u></font><a href=3D"http://blog.facilelogin.com/" target=3D"_blank"><font s=
ize=3D"3" color=3D"blue"><u>http://blog.facilelogin.com</u></font></a><font s=
ize=3D"3" color=3D"blue"><u><br>
</u></font><a href=3D"http://rampartfaq.com/" target=3D"_blank"><font size=3D=
"3" color=3D"blue"><u>http://RampartFAQ.com</u></font></a>
<br><font size=3D"3"><br>
</font>
<br><tt><font size=3D"3">_______________________________________________<br>=

OAuth mailing list<br>
</font></tt><a href=3D"mailto:OAuth@ietf.org" target=3D"_blank"><tt><font si=
ze=3D"3" color=3D"blue"><u>OAuth@ietf.org</u></font></tt></a><tt><font size=3D=
"3"><br>
</font></tt><a href=3D"https://www.ietf.org/mailman/listinfo/oauth" target=3D=
"_blank"><tt><font size=3D"3" color=3D"blue"><u>https://www.ietf.org/mailman=
/listinfo/oauth</u></font></tt></a><tt><font size=3D"3"><br>
</font></tt>
<br>
<br><font size=3D"3"><br>
</font>
<br>
<br><font size=3D"3">-- <br>
Thanks &amp; Regards,<br>
Prabath </font>
<br>
<br><font size=3D"3">Mobile : </font><a href=3D"tel:%2B94%2071%20809%206732"=
 target=3D"_blank"><font size=3D"3" color=3D"blue"><u>+94
71 809 6732</u></font></a><font size=3D"3">&nbsp;<br>
</font><font size=3D"3" color=3D"blue"><u><br>
</u></font><a href=3D"http://blog.facilelogin.com/" target=3D"_blank"><font s=
ize=3D"3" color=3D"blue"><u>http://blog.facilelogin.com</u></font></a><font s=
ize=3D"3" color=3D"blue"><u><br>
</u></font><a href=3D"http://rampartfaq.com/" target=3D"_blank"><font size=3D=
"3" color=3D"blue"><u>http://RampartFAQ.com</u></font></a>
<br>
<br><font size=3D"3"><br>
</font>
<br>
<br><font size=3D"3">-- <br>
Thanks &amp; Regards,<br>
Prabath</font>
<br>
<br><font size=3D"3">Mobile : <a href=3D"tel:%2B94%2071%20809%206732" value=3D=
"+94718096732" target=3D"_blank">+94 71 809 6732</a>&nbsp;<br>
</font><font size=3D"3" color=3D"blue"><u><br>
</u></font><a href=3D"http://blog.facilelogin.com/" target=3D"_blank"><font s=
ize=3D"3" color=3D"blue"><u>http://blog.facilelogin.com</u></font></a><font s=
ize=3D"3" color=3D"blue"><u><br>
</u></font></div></div><a href=3D"http://rampartfaq.com/" target=3D"_blank">=
<font size=3D"3" color=3D"blue"><u>http://RampartFAQ.com</u></font></a><tt><=
font>_______________________________________________<br>
OAuth mailing list<br>
<a href=3D"mailto:OAuth@ietf.org" target=3D"_blank">OAuth@ietf.org</a><br>
</font></tt><a href=3D"https://www.ietf.org/mailman/listinfo/oauth" target=3D=
"_blank"><tt><font>https://www.ietf.org/mailman/listinfo/oauth</font></tt></=
a><tt><font><br>
</font></tt>
<br></blockquote></div><br><br clear=3D"all"><div><br></div>-- <br>Thanks &a=
mp; Regards,<br>Prabath<div><br></div><div>Mobile : +94 71 809 6732&nbsp;<br=
><br><a href=3D"http://blog.facilelogin.com" target=3D"_blank">http://blog.f=
acilelogin.com</a><br>
<a href=3D"http://RampartFAQ.com" target=3D"_blank">http://RampartFAQ.com</a=
></div>
</div></blockquote><blockquote type=3D"cite"><div><span>____________________=
___________________________</span><br><span>OAuth mailing list</span><br><sp=
an><a href=3D"mailto:OAuth@ietf.org">OAuth@ietf.org</a></span><br><span><a h=
ref=3D"https://www.ietf.org/mailman/listinfo/oauth">https://www.ietf.org/mai=
lman/listinfo/oauth</a></span><br></div></blockquote></body></html>=

--Apple-Mail-86FAD03F-F32C-4118-9F10-28BE9AF4C20F--

From prabath@wso2.com  Wed Feb  6 10:32:32 2013
Return-Path: <prabath@wso2.com>
X-Original-To: oauth@ietfa.amsl.com
Delivered-To: oauth@ietfa.amsl.com
Received: from localhost (localhost [127.0.0.1]) by ietfa.amsl.com (Postfix) with ESMTP id 49E7A21F8715 for <oauth@ietfa.amsl.com>; Wed,  6 Feb 2013 10:32:32 -0800 (PST)
X-Virus-Scanned: amavisd-new at amsl.com
X-Spam-Flag: NO
X-Spam-Score: -2.649
X-Spam-Level: 
X-Spam-Status: No, score=-2.649 tagged_above=-999 required=5 tests=[AWL=0.327,  BAYES_00=-2.599, FM_FORGED_GMAIL=0.622, HTML_MESSAGE=0.001, RCVD_IN_DNSWL_LOW=-1]
Received: from mail.ietf.org ([64.170.98.30]) by localhost (ietfa.amsl.com [127.0.0.1]) (amavisd-new, port 10024) with ESMTP id WWrupykWlaWR for <oauth@ietfa.amsl.com>; Wed,  6 Feb 2013 10:32:30 -0800 (PST)
Received: from mail-ea0-f169.google.com (mail-ea0-f169.google.com [209.85.215.169]) by ietfa.amsl.com (Postfix) with ESMTP id 122F021F8548 for <oauth@ietf.org>; Wed,  6 Feb 2013 10:32:29 -0800 (PST)
Received: by mail-ea0-f169.google.com with SMTP id d13so799586eaa.28 for <oauth@ietf.org>; Wed, 06 Feb 2013 10:32:29 -0800 (PST)
X-Google-DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=google.com; s=20120113; h=mime-version:x-received:in-reply-to:references:date:message-id :subject:from:to:cc:content-type:x-gm-message-state; bh=JaegM0qbecKvBClI7o/Rti64268RzLgAmda5WwRDVF4=; b=LRt1Wgip7DF8iNZEok4iShnFEWxCzZKVu96o/XC/+1rxvXsCoN3Tq+/ueRcJCqrAZZ 9WI5tGL8XyaiaCZntXPax80g3bCF3FyH4KAbRIBIuy1iZLHvm3puG1P4rbVi16IN7/g9 k/5f65M5ZHarYlFuP3dljTaEOHqEeNXIiJDf8FYThFbFPfwTHzqVZNZAKtpBl+59+Hzs gcuA75qLlreYxoPLkBqJWYxnZ+fPzzOhunr0+8HKUIqMUXYHZdGp0o5d/9QWL705jhYP B3a+jQDZ4IpEOQ1guAsTPfoNc06lPipgELM2xL5TQMbHivcuKOFCCL3Hu1hzoAbshwHQ 8stQ==
MIME-Version: 1.0
X-Received: by 10.14.178.196 with SMTP id f44mr99792474eem.14.1360175548693; Wed, 06 Feb 2013 10:32:28 -0800 (PST)
Received: by 10.223.175.134 with HTTP; Wed, 6 Feb 2013 10:32:28 -0800 (PST)
In-Reply-To: <611639B1-8B4B-4010-A1DF-A0A8057F3EA8@lodderstedt.net>
References: <CAJV9qO8UgLV6SdegZSk4KT3Qyb-M2KmPFPV9xDht_WjibeUWrg@mail.gmail.com> <51126D65.2090707@mitre.org> <CAJV9qO-ZNVcbzNvb---CmXv+vo0jZHKQaDon8OqrPJCfAXKTRQ@mail.gmail.com> <5112746B.70403@mitre.org> <CAJV9qO-mz=K_fJHO8g8XH8DtUxFPvN8hRF7K=gn0etAAqeb0zg@mail.gmail.com> <OF8CC0704A.7E320CB4-ON85257B0A.0055661B-85257B0A.00558648@us.ibm.com> <CAJV9qO-fM6JgHRzKOzJi00AcsnZCqO-i-YCM_uoRuB=HqWDg7A@mail.gmail.com> <611639B1-8B4B-4010-A1DF-A0A8057F3EA8@lodderstedt.net>
Date: Thu, 7 Feb 2013 00:02:28 +0530
Message-ID: <CAJV9qO8oW=5nTVH2YpotL0ZUfJaX31GHJoZXeFyntkdnKHhGRw@mail.gmail.com>
From: Prabath Siriwardena <prabath@wso2.com>
To: Torsten Lodderstedt <torsten@lodderstedt.net>
Content-Type: multipart/alternative; boundary=047d7b622520697dcb04d5128c89
X-Gm-Message-State: ALoCoQle1IVPaCqPQaNe1CkFzB4j2s6+wAwuExwc7O4Jc5ZQXOidGkD2KH0r2lyd/oe3gGJKghuE
Cc: "oauth-bounces@ietf.org" <oauth-bounces@ietf.org>, "oauth@ietf.org WG" <oauth@ietf.org>
Subject: Re: [OAUTH-WG] A question on token revocation.
X-BeenThere: oauth@ietf.org
X-Mailman-Version: 2.1.12
Precedence: list
List-Id: OAUTH WG <oauth.ietf.org>
List-Unsubscribe: <https://www.ietf.org/mailman/options/oauth>, <mailto:oauth-request@ietf.org?subject=unsubscribe>
List-Archive: <http://www.ietf.org/mail-archive/web/oauth>
List-Post: <mailto:oauth@ietf.org>
List-Help: <mailto:oauth-request@ietf.org?subject=help>
List-Subscribe: <https://www.ietf.org/mailman/listinfo/oauth>, <mailto:oauth-request@ietf.org?subject=subscribe>
X-List-Received-Date: Wed, 06 Feb 2013 18:32:32 -0000

--047d7b622520697dcb04d5128c89
Content-Type: text/plain; charset=ISO-8859-1

Hi Torsten,

Thanks for your feedback.. I will submit a draft...

Thanks & regards,
-Prabath

On Wed, Feb 6, 2013 at 11:55 PM, Torsten Lodderstedt <
torsten@lodderstedt.net> wrote:

> Hi Prabath,
>
> we tried to address both use cases in the first revisions of the draft.
> The API was well suited for client-driven revocation but not the resource
> owner - driven use case. There are definitely differences with respect to
> the protocol design, at least regarding authentication and authorization
> of the respective actors. This made the spec more complex and caused
> ambiguities and confusion. Moreover, the working group seemed not convinced
> by the the latter use case.
>
> Therefore the working group decided to focus on the single use cases of
> the revocation by clients. This makes a lot of sense since this interface
> is most important with respect to interoperability.
>
> I'm focusing right now on finishing this draft. And the open issues
> discussed on the list in the last couple of weeks illustrate that even this
> poses a considerable amount of work. So I'm very reluctant to add support
> for a whole new use case at that point of the process.
>
> If you feel this is an important use case worth an RFC, don't hesitate to
> publish a new I-D.
>
> regards,
> Torsten.
>
> Am 06.02.2013 um 16:37 schrieb Prabath Siriwardena <prabath@wso2.com>:
>
>
>
> On Wed, Feb 6, 2013 at 9:04 PM, Todd W Lainhart <lainhart@us.ibm.com>wrote:
>
>> > Resource owner needs to know the consumer key (represents the OAuth
>> Client app) & scope to revoke the access token for a given client.
>>
>> I see - you're saying that requiring client credentials on the end point
>> is the problem?
>>
>
> In fact what I meant was - when RO authorizes the an access token for
> client for particular scope. Those information are kept at the AS.
>
> Now - if the RO want to revoke access from the client - the RO needs to
> authenticate him self to the AS and pass the consumer key and the scope. So
> AS can revoke access.
>
> Thanks & regards,
> -Prabath
>
>
>>
>>  *
>>
>>
>> Todd Lainhart
>> Rational software
>> IBM Corporation
>> 550 King Street, Littleton, MA 01460-1250**
>> 1-978-899-4705
>> 2-276-4705 (T/L)
>> lainhart@us.ibm.com*
>>
>>
>>
>>
>> From:        Prabath Siriwardena <prabath@wso2.com>
>> To:        Justin Richer <jricher@mitre.org>,
>> Cc:        "oauth@ietf.org WG" <oauth@ietf.org>
>> Date:        02/06/2013 10:31 AM
>> Subject:        Re: [OAUTH-WG] A question on token revocation.
>> Sent by:        oauth-bounces@ietf.org
>> ------------------------------
>>
>>
>>
>>
>>
>> On Wed, Feb 6, 2013 at 8:49 PM, Justin Richer <*jricher@mitre.org*<jricher@mitre.org>>
>> wrote:
>>
>> On 02/06/2013 10:13 AM, Prabath Siriwardena wrote:
>>
>>
>> On Wed, Feb 6, 2013 at 8:19 PM, Justin Richer <*jricher@mitre.org*<jricher@mitre.org>>
>> wrote:
>> These are generally handled through a user interface where the RO is
>> authenticated directly to the AS, and there's not much need for a
>> "protocol" here, in practice.
>>
>> Why do you think leaving access token revocation by RO to a proprietary
>> API is a good practice ? IMO this an essential requirement in API security.
>> I think it makes more sense in the same way that having a "proprietary"
>> UI/API for managing the user consent makes sense: unless you're doing a
>> fully dynamic end-to-end system like UMA, then there's not much value in
>> trying to squeeze disparate systems into the same mold, since they won't be
>> talking to each other anyway.
>>
>> This is required in distributed setup for each API platform from
>> different vendors to perform in an interop manner.
>>
>>
>> And since you refer to it as an "API", what will the RO be using to call
>> this API? Is there a token management client that's separate from the OAuth
>> client?
>>
>> I didn't get your question right... If you meant the how to invoke
>> revocation end point, the the resource owner needs to know the consumer key
>> (represents the OAuth Client app) & scope to revoke the access token for a
>> given client.
>>
>>
>>
>> IMHO token revocation done my RO is more practical than token revocation
>> done by the Client.
>> They're both valid but require different kinds of protocols and
>> considerations. This token revocation draft is meant to solve one problem,
>> and that doesn't mean it can or should solve other seemingly related
>> problems.
>>
>> If you would like to see the RO-initiated token revocation go through
>> (not grant revocation, mind you -- that's related, but different), then I
>> would suggest that you start specifying exactly how that works. I predict
>> it will be problematic in practice, though, as the RO often doesn't
>> actually have direct access to the token itself.
>>
>> Resource owner needs to know the consumer key (represents the OAuth
>> Client app) & scope to revoke the access token for a given client.
>>
>>
>>
>>
>> There are larger applications, like UMA, that have client and PR
>> provisioning that would allow for this to be managed somewhat
>> programmatically, but even in that case you're still generally doing token
>> revocation by a "client" in some fashion. In UMA, though, several different
>> pieces can play the role of a "client" at different parts of the process.
>>
>> Revoking a scope is a whole different mess. Generally, you'd want to just
>> revoke an existing token and make a new authorization grant with lower
>> access if you don't want that client getting that scope anymore. If you
>> just want to downscope for a single transaction, you can already do that
>> with either the refresh token or token chaining approaches, depending on
>> where in the process you are. The latter of these are both client-focused,
>> though, and the RO doesn't have a direct hand in it at this point.
>>
>> Why do you think it a mess. If you revoke the entire token then Client
>> needs to go through the complete OAuth flow - and also needs to get the
>> user consent. If RO can  downgrade the scope, then we restrict API access
>> by the client at RS end and its transparent to the client.
>>
>>
>> Downgrading the scope of tokens in the wild is hardly transparent to the
>> client (stuff that it expects to work will suddenly start to fail, meaning
>> that most clients will throw out the token and try to get a new one), and
>> in a distributed system you've got to propagate that change to the RS. If
>> you bake the scopes into the token itself (which many do) then you actually
>> *can't* downgrade a single token, anyway.
>>
>> Yes.. that is the expected behavior. I mean the process is transparent.
>> Client will notice at runtime.
>>
>> Thanks & regards,
>> -Prabath
>>
>>
>>  -- Justin
>>
>>
>> Thanks & regards,
>> -Prabath
>>
>>
>>
>>  -- Justin
>>
>>
>> On 02/06/2013 04:35 AM, Prabath Siriwardena wrote:
>> I am sorry if this was already discussed in this list..
>>
>> Looking at [1] it only talks about revoking the access token from the
>> client.
>>
>> How about the resource owner..?
>>
>> There can be cases where resource owner needs to revoke an authorized
>> access token from a given client. Or revoke an scope..
>>
>> How are we going to address these requirements..? Thoughts appreciated...
>>
>> [1] *http://tools.ietf.org/html/draft-ietf-oauth-revocation-04*<http://tools.ietf.org/html/draft-ietf-oauth-revocation-04>
>>
>> --
>> Thanks & Regards,
>> Prabath
>>
>> Mobile : *+94 71 809 6732* <%2B94%2071%20809%206732>
>> *
>> **http://blog.facilelogin.com* <http://blog.facilelogin.com/>*
>> **http://RampartFAQ.com* <http://rampartfaq.com/>
>>
>>
>> _______________________________________________
>> OAuth mailing list
>> *OAuth@ietf.org* <OAuth@ietf.org>
>> *https://www.ietf.org/mailman/listinfo/oauth*<https://www.ietf.org/mailman/listinfo/oauth>
>>
>>
>>
>>
>>
>> --
>> Thanks & Regards,
>> Prabath
>>
>> Mobile : *+94 71 809 6732* <%2B94%2071%20809%206732>
>> *
>> **http://blog.facilelogin.com* <http://blog.facilelogin.com/>*
>> **http://RampartFAQ.com* <http://rampartfaq.com/>
>>
>>
>>
>>
>> --
>> Thanks & Regards,
>> Prabath
>>
>> Mobile : +94 71 809 6732
>> *
>> **http://blog.facilelogin.com* <http://blog.facilelogin.com/>*
>> *
>> *http://RampartFAQ.com* <http://rampartfaq.com/>
>> _______________________________________________
>> OAuth mailing list
>> OAuth@ietf.org
>> https://www.ietf.org/mailman/listinfo/oauth
>>
>>
>
>
> --
> Thanks & Regards,
> Prabath
>
> Mobile : +94 71 809 6732
>
> http://blog.facilelogin.com
> http://RampartFAQ.com
>
> _______________________________________________
> OAuth mailing list
> OAuth@ietf.org
> https://www.ietf.org/mailman/listinfo/oauth
>
>


-- 
Thanks & Regards,
Prabath

Mobile : +94 71 809 6732

http://blog.facilelogin.com
http://RampartFAQ.com

--047d7b622520697dcb04d5128c89
Content-Type: text/html; charset=ISO-8859-1
Content-Transfer-Encoding: quoted-printable

Hi=A0Torsten,<div><br></div><div>Thanks for your feedback.. I will submit a=
 draft...</div><div><br></div><div>Thanks &amp; regards,</div><div>-Prabath=
<br><br><div class=3D"gmail_quote">On Wed, Feb 6, 2013 at 11:55 PM, Torsten=
 Lodderstedt <span dir=3D"ltr">&lt;<a href=3D"mailto:torsten@lodderstedt.ne=
t" target=3D"_blank">torsten@lodderstedt.net</a>&gt;</span> wrote:<br>
<blockquote class=3D"gmail_quote" style=3D"margin:0 0 0 .8ex;border-left:1p=
x #ccc solid;padding-left:1ex"><div dir=3D"auto"><div>Hi Prabath,</div><div=
><br></div><div>we tried to address both use cases in the first revisions o=
f the draft. The API was well suited for client-driven revocation but not t=
he resource owner - driven use case. There are definitely differences with =
respect to the protocol design, at least regarding <span>authentication and=
 authorization of the respective actors.=A0</span>This made the spec more c=
omplex and<span>=A0caused ambiguities and confusion. Moreover, the working =
group seemed not convinced by the the latter use case.</span></div>
<div><br></div><div>Therefore the working group decided to focus on the sin=
gle use cases of the revocation by clients. This makes a lot of sense since=
 this interface is most important with respect to interoperability.</div>
<div><br></div><div>I&#39;m focusing right now on finishing this draft. And=
 the open issues discussed on the list in the last couple of weeks illustra=
te that even this poses a considerable amount of work. So I&#39;m very relu=
ctant to add support for a whole new use case at that point of the process.=
</div>
<div><br></div><div>If you feel this is an important use case worth an RFC,=
 don&#39;t hesitate to publish a new I-D.</div><div><br></div><div>regards,=
</div><div>Torsten.</div><div><br></div><div>Am 06.02.2013 um 16:37 schrieb=
 Prabath Siriwardena &lt;<a href=3D"mailto:prabath@wso2.com" target=3D"_bla=
nk">prabath@wso2.com</a>&gt;:<br>
<br></div><div><div class=3D"h5"><blockquote type=3D"cite"><div><br><br><di=
v class=3D"gmail_quote">On Wed, Feb 6, 2013 at 9:04 PM, Todd W Lainhart <sp=
an dir=3D"ltr">&lt;<a href=3D"mailto:lainhart@us.ibm.com" target=3D"_blank"=
>lainhart@us.ibm.com</a>&gt;</span> wrote:<br>
<blockquote class=3D"gmail_quote" style=3D"margin:0 0 0 .8ex;border-left:1p=
x #ccc solid;padding-left:1ex">
<div><font face=3D"sans-serif">&gt; </font><font size=3D"3">Resource owner
needs to know the consumer key (represents the OAuth Client app) &amp;
scope to revoke the access token for a given client.=A0</font>
<br>
<br></div><font face=3D"sans-serif">I see - you&#39;re saying that requirin=
g
client credentials on the end point is the problem?<br></font></blockquote>=
<div><br></div><div>In fact what I meant was - when RO authorizes the an ac=
cess token for client for particular scope. Those information are kept at t=
he AS.</div>

<div><br></div><div>Now - if the RO want to revoke access from the client -=
 the RO needs to authenticate him self to the AS and pass the consumer key =
and the scope. So AS can revoke access.</div><div><br></div><div>Thanks &am=
p; regards,</div>

<div>-Prabath</div><div>=A0</div><blockquote class=3D"gmail_quote" style=3D=
"margin:0 0 0 .8ex;border-left:1px #ccc solid;padding-left:1ex"><font face=
=3D"sans-serif">
</font><div>
<br>
<table width=3D"223" style=3D"border-collapse:collapse">
<tbody><tr height=3D"8">
<td width=3D"223" bgcolor=3D"white" style=3D"border-style:solid;border-colo=
r:#000000;border-width:0px 0px 0px 0px;padding:0px 0px"><font size=3D"1" fa=
ce=3D"Verdana"><b><br>
<br>
<br>
Todd Lainhart<br>
Rational software<br>
IBM Corporation<br>
550 King Street, Littleton, MA 01460-1250</b></font><font size=3D"1" face=
=3D"Arial"><b><br>
1-978-899-4705<br>
2-276-4705 (T/L)<br>
<a href=3D"mailto:lainhart@us.ibm.com" target=3D"_blank">lainhart@us.ibm.co=
m</a></b></font></td></tr></tbody></table>
<br>
<br>
<br>
<br>
<br></div><font size=3D"1" color=3D"#5f5f5f" face=3D"sans-serif">From: =A0 =
=A0 =A0
=A0</font><font size=3D"1" face=3D"sans-serif">Prabath Siriwardena
&lt;<a href=3D"mailto:prabath@wso2.com" target=3D"_blank">prabath@wso2.com<=
/a>&gt;</font>
<br><font size=3D"1" color=3D"#5f5f5f" face=3D"sans-serif">To: =A0 =A0 =A0
=A0</font><font size=3D"1" face=3D"sans-serif">Justin Richer &lt;<a href=3D=
"mailto:jricher@mitre.org" target=3D"_blank">jricher@mitre.org</a>&gt;,
</font>
<br><font size=3D"1" color=3D"#5f5f5f" face=3D"sans-serif">Cc: =A0 =A0 =A0
=A0</font><font size=3D"1" face=3D"sans-serif">&quot;<a href=3D"mailto:oaut=
h@ietf.org" target=3D"_blank">oauth@ietf.org</a>
WG&quot; &lt;<a href=3D"mailto:oauth@ietf.org" target=3D"_blank">oauth@ietf=
.org</a>&gt;</font>
<br><font size=3D"1" color=3D"#5f5f5f" face=3D"sans-serif">Date: =A0 =A0 =
=A0
=A0</font><font size=3D"1" face=3D"sans-serif">02/06/2013 10:31 AM</font>
<br><div><font size=3D"1" color=3D"#5f5f5f" face=3D"sans-serif">Subject: =
=A0 =A0
=A0 =A0</font><font size=3D"1" face=3D"sans-serif">Re: [OAUTH-WG]
A question on token revocation.</font>
<br><font size=3D"1" color=3D"#5f5f5f" face=3D"sans-serif">Sent by: =A0 =A0
=A0 =A0</font><font size=3D"1" face=3D"sans-serif"><a href=3D"mailto:oauth-=
bounces@ietf.org" target=3D"_blank">oauth-bounces@ietf.org</a></font>
<br>
<hr noshade>
<br>
<br>
<br><font size=3D"3"><br>
</font>
<br></div><div><div><font size=3D"3">On Wed, Feb 6, 2013 at 8:49 PM, Justin=
 Richer &lt;</font><a href=3D"mailto:jricher@mitre.org" target=3D"_blank"><=
font size=3D"3" color=3D"blue"><u>jricher@mitre.org</u></font></a><font siz=
e=3D"3">&gt;
wrote:</font>
<br>
<br><font size=3D"3">On 02/06/2013 10:13 AM, Prabath Siriwardena wrote:</fo=
nt>
<br><font size=3D"3"><br>
</font>
<br><font size=3D"3">On Wed, Feb 6, 2013 at 8:19 PM, Justin Richer &lt;</fo=
nt><a href=3D"mailto:jricher@mitre.org" target=3D"_blank"><font size=3D"3" =
color=3D"blue"><u>jricher@mitre.org</u></font></a><font size=3D"3">&gt;
wrote:</font>
<br><font size=3D"3">These are generally handled through a user interface w=
here
the RO is authenticated directly to the AS, and there&#39;s not much need f=
or
a &quot;protocol&quot; here, in practice. </font>
<br>
<br><font size=3D"3">Why do you think leaving access token revocation by RO
to a proprietary API is a good practice ? IMO this an essential requirement
in API security.</font>
<br><font size=3D"3">I think it makes more sense in the same way that havin=
g
a &quot;proprietary&quot; UI/API for managing the user consent makes sense:
unless you&#39;re doing a fully dynamic end-to-end system like UMA, then th=
ere&#39;s
not much value in trying to squeeze disparate systems into the same mold,
since they won&#39;t be talking to each other anyway. </font>
<br>
<br><font size=3D"3">This is required in distributed setup for each API pla=
tform
from different vendors to perform in an interop manner.</font>
<br><font size=3D"3">=A0</font>
<br><font size=3D"3"><br>
And since you refer to it as an &quot;API&quot;, what will the RO be using
to call this API? Is there a token management client that&#39;s separate fr=
om
the OAuth client? </font>
<br>
<br><font size=3D"3">I didn&#39;t get your question right... If you meant t=
he how
to invoke revocation end point, the the resource owner needs to know the
consumer key (represents the OAuth Client app) &amp; scope to revoke the
access token for a given client.=A0</font>
<br>
<br>
<br>
<br><font size=3D"3">IMHO token revocation done my RO is more practical tha=
n
token revocation done by the Client.</font>
<br><font size=3D"3">They&#39;re both valid but require different kinds of =
protocols
and considerations. This token revocation draft is meant to solve one probl=
em,
and that doesn&#39;t mean it can or should solve other seemingly related pr=
oblems.<br>
<br>
If you would like to see the RO-initiated token revocation go through (not
grant revocation, mind you -- that&#39;s related, but different), then I wo=
uld
suggest that you start specifying exactly how that works. I predict it
will be problematic in practice, though, as the RO often doesn&#39;t actual=
ly
have direct access to the token itself. </font>
<br>
<br><font size=3D"3">Resource owner needs to know the consumer key (represe=
nts
the OAuth Client app) &amp; scope to revoke the access token for a given
client.=A0</font>
<br>
<br><font size=3D"3">=A0</font>
<br>
<br><font size=3D"3">=A0</font>
<br><font size=3D"3">There are larger applications, like UMA, that have cli=
ent
and PR provisioning that would allow for this to be managed somewhat progra=
mmatically,
but even in that case you&#39;re still generally doing token revocation by
a &quot;client&quot; in some fashion. In UMA, though, several different
pieces can play the role of a &quot;client&quot; at different parts of
the process.<br>
<br>
Revoking a scope is a whole different mess. Generally, you&#39;d want to ju=
st
revoke an existing token and make a new authorization grant with lower
access if you don&#39;t want that client getting that scope anymore. If you
just want to downscope for a single transaction, you can already do that
with either the refresh token or token chaining approaches, depending on
where in the process you are. The latter of these are both client-focused,
though, and the RO doesn&#39;t have a direct hand in it at this point.</fon=
t>
<br>
<br><font size=3D"3">Why do you think it a mess. If you revoke the entire t=
oken
then Client needs to go through the complete OAuth flow - and also needs
to get the user consent. If RO can =A0downgrade the scope, then we restrict
API access by the client at RS end and its transparent to the client.</font=
>
<br>
<br>
<br><font size=3D"3">Downgrading the scope of tokens in the wild is hardly
transparent to the client (stuff that it expects to work will suddenly
start to fail, meaning that most clients will throw out the token and try
to get a new one), and in a distributed system you&#39;ve got to propagate
that change to the RS. If you bake the scopes into the token itself (which
many do) then you actually *can&#39;t* downgrade a single token, anyway. </=
font>
<br>
<br><font size=3D"3">Yes.. that is the expected behavior. I mean the proces=
s
is transparent. Client will notice at runtime.</font>
<br>
<br><font size=3D"3">Thanks &amp; regards,</font>
<br><font size=3D"3">-Prabath</font>
<br><font size=3D"3">=A0</font>
<br><font size=3D"3" color=3D"#8f8f8f"><br>
=A0-- Justin</font>
<br><font size=3D"3"><br>
</font>
<br><font size=3D"3">Thanks &amp; regards,</font>
<br><font size=3D"3">-Prabath</font>
<br><font size=3D"3">=A0</font>
<br><font size=3D"3" color=3D"#8f8f8f"><br>
<br>
=A0-- Justin</font><font size=3D"3"> </font>
<br><font size=3D"3"><br>
</font>
<br><font size=3D"3">On 02/06/2013 04:35 AM, Prabath Siriwardena wrote:</fo=
nt>
<br><font size=3D"3">I am sorry if this was already discussed in this list.=
.=A0</font>
<br>
<br><font size=3D"3">Looking at [1] it only talks about revoking the access
token from the client.</font>
<br>
<br><font size=3D"3">How about the resource owner..?</font>
<br>
<br><font size=3D"3">There can be cases where resource owner needs to revok=
e
an authorized access token from a given client. Or revoke an scope..</font>
<br>
<br><font size=3D"3">How are we going to address these requirements..? Thou=
ghts
appreciated...</font>
<br>
<br><font size=3D"3">[1] </font><a href=3D"http://tools.ietf.org/html/draft=
-ietf-oauth-revocation-04" target=3D"_blank"><font size=3D"3" color=3D"blue=
"><u>http://tools.ietf.org/html/draft-ietf-oauth-revocation-04</u></font></=
a>
<br>
<br><font size=3D"3">-- <br>
Thanks &amp; Regards,<br>
Prabath </font>
<br>
<br><font size=3D"3">Mobile : </font><a href=3D"tel:%2B94%2071%20809%206732=
" target=3D"_blank"><font size=3D"3" color=3D"blue"><u>+94
71 809 6732</u></font></a><font size=3D"3">=A0<br>
</font><font size=3D"3" color=3D"blue"><u><br>
</u></font><a href=3D"http://blog.facilelogin.com/" target=3D"_blank"><font=
 size=3D"3" color=3D"blue"><u>http://blog.facilelogin.com</u></font></a><fo=
nt size=3D"3" color=3D"blue"><u><br>
</u></font><a href=3D"http://rampartfaq.com/" target=3D"_blank"><font size=
=3D"3" color=3D"blue"><u>http://RampartFAQ.com</u></font></a>
<br><font size=3D"3"><br>
</font>
<br><tt><font size=3D"3">_______________________________________________<br=
>
OAuth mailing list<br>
</font></tt><a href=3D"mailto:OAuth@ietf.org" target=3D"_blank"><tt><font s=
ize=3D"3" color=3D"blue"><u>OAuth@ietf.org</u></font></tt></a><tt><font siz=
e=3D"3"><br>
</font></tt><a href=3D"https://www.ietf.org/mailman/listinfo/oauth" target=
=3D"_blank"><tt><font size=3D"3" color=3D"blue"><u>https://www.ietf.org/mai=
lman/listinfo/oauth</u></font></tt></a><tt><font size=3D"3"><br>
</font></tt>
<br>
<br><font size=3D"3"><br>
</font>
<br>
<br><font size=3D"3">-- <br>
Thanks &amp; Regards,<br>
Prabath </font>
<br>
<br><font size=3D"3">Mobile : </font><a href=3D"tel:%2B94%2071%20809%206732=
" target=3D"_blank"><font size=3D"3" color=3D"blue"><u>+94
71 809 6732</u></font></a><font size=3D"3">=A0<br>
</font><font size=3D"3" color=3D"blue"><u><br>
</u></font><a href=3D"http://blog.facilelogin.com/" target=3D"_blank"><font=
 size=3D"3" color=3D"blue"><u>http://blog.facilelogin.com</u></font></a><fo=
nt size=3D"3" color=3D"blue"><u><br>
</u></font><a href=3D"http://rampartfaq.com/" target=3D"_blank"><font size=
=3D"3" color=3D"blue"><u>http://RampartFAQ.com</u></font></a>
<br>
<br><font size=3D"3"><br>
</font>
<br>
<br><font size=3D"3">-- <br>
Thanks &amp; Regards,<br>
Prabath</font>
<br>
<br><font size=3D"3">Mobile : <a href=3D"tel:%2B94%2071%20809%206732" value=
=3D"+94718096732" target=3D"_blank">+94 71 809 6732</a>=A0<br>
</font><font size=3D"3" color=3D"blue"><u><br>
</u></font><a href=3D"http://blog.facilelogin.com/" target=3D"_blank"><font=
 size=3D"3" color=3D"blue"><u>http://blog.facilelogin.com</u></font></a><fo=
nt size=3D"3" color=3D"blue"><u><br>
</u></font></div></div><a href=3D"http://rampartfaq.com/" target=3D"_blank"=
><font size=3D"3" color=3D"blue"><u>http://RampartFAQ.com</u></font></a><tt=
><font>_______________________________________________<br>
OAuth mailing list<br>
<a href=3D"mailto:OAuth@ietf.org" target=3D"_blank">OAuth@ietf.org</a><br>
</font></tt><a href=3D"https://www.ietf.org/mailman/listinfo/oauth" target=
=3D"_blank"><tt><font>https://www.ietf.org/mailman/listinfo/oauth</font></t=
t></a><tt><font><br>
</font></tt>
<br></blockquote></div><br><br clear=3D"all"><div><br></div>-- <br>Thanks &=
amp; Regards,<br>Prabath<div><br></div><div>Mobile : <a href=3D"tel:%2B94%2=
071%20809%206732" value=3D"+94718096732" target=3D"_blank">+94 71 809 6732<=
/a>=A0<br>
<br><a href=3D"http://blog.facilelogin.com" target=3D"_blank">http://blog.f=
acilelogin.com</a><br>
<a href=3D"http://RampartFAQ.com" target=3D"_blank">http://RampartFAQ.com</=
a></div>
</div></blockquote><blockquote type=3D"cite"><div><span>___________________=
____________________________</span><br><span>OAuth mailing list</span><br><=
span><a href=3D"mailto:OAuth@ietf.org" target=3D"_blank">OAuth@ietf.org</a>=
</span><br>
<span><a href=3D"https://www.ietf.org/mailman/listinfo/oauth" target=3D"_bl=
ank">https://www.ietf.org/mailman/listinfo/oauth</a></span><br></div></bloc=
kquote></div></div></div></blockquote></div><br><br clear=3D"all"><div><br>=
</div>
-- <br>Thanks &amp; Regards,<br>Prabath<div><br></div><div>Mobile : +94 71 =
809 6732=A0<br><br><a href=3D"http://blog.facilelogin.com" target=3D"_blank=
">http://blog.facilelogin.com</a><br><a href=3D"http://RampartFAQ.com" targ=
et=3D"_blank">http://RampartFAQ.com</a></div>

</div>

--047d7b622520697dcb04d5128c89--

From jricher@mitre.org  Wed Feb  6 11:25:56 2013
Return-Path: <jricher@mitre.org>
X-Original-To: oauth@ietfa.amsl.com
Delivered-To: oauth@ietfa.amsl.com
Received: from localhost (localhost [127.0.0.1]) by ietfa.amsl.com (Postfix) with ESMTP id 2500221F8A42 for <oauth@ietfa.amsl.com>; Wed,  6 Feb 2013 11:25:56 -0800 (PST)
X-Virus-Scanned: amavisd-new at amsl.com
X-Spam-Flag: NO
X-Spam-Score: -6.573
X-Spam-Level: 
X-Spam-Status: No, score=-6.573 tagged_above=-999 required=5 tests=[AWL=0.025,  BAYES_00=-2.599, HTML_MESSAGE=0.001, RCVD_IN_DNSWL_MED=-4]
Received: from mail.ietf.org ([64.170.98.30]) by localhost (ietfa.amsl.com [127.0.0.1]) (amavisd-new, port 10024) with ESMTP id xq4tF3DPBFLr for <oauth@ietfa.amsl.com>; Wed,  6 Feb 2013 11:25:43 -0800 (PST)
Received: from smtpksrv1.mitre.org (smtpksrv1.mitre.org [198.49.146.77]) by ietfa.amsl.com (Postfix) with ESMTP id 2B8C921F8556 for <oauth@ietf.org>; Wed,  6 Feb 2013 11:25:39 -0800 (PST)
Received: from smtpksrv1.mitre.org (localhost.localdomain [127.0.0.1]) by localhost (Postfix) with SMTP id 33BE51F13F2 for <oauth@ietf.org>; Wed,  6 Feb 2013 14:25:36 -0500 (EST)
Received: from IMCCAS04.MITRE.ORG (imccas04.mitre.org [129.83.29.81]) by smtpksrv1.mitre.org (Postfix) with ESMTP id 0D71E1F0780 for <oauth@ietf.org>; Wed,  6 Feb 2013 14:25:36 -0500 (EST)
Received: from [10.146.15.29] (129.83.31.58) by IMCCAS04.MITRE.ORG (129.83.29.81) with Microsoft SMTP Server (TLS) id 14.2.318.4; Wed, 6 Feb 2013 14:25:35 -0500
Message-ID: <5112AE0B.1080501@mitre.org>
Date: Wed, 6 Feb 2013 14:24:59 -0500
From: Justin Richer <jricher@mitre.org>
User-Agent: Mozilla/5.0 (X11; Linux i686; rv:17.0) Gecko/20130106 Thunderbird/17.0.2
MIME-Version: 1.0
To: "oauth@ietf.org" <oauth@ietf.org>
References: <20130206192420.32698.21027.idtracker@ietfa.amsl.com>
In-Reply-To: <20130206192420.32698.21027.idtracker@ietfa.amsl.com>
X-Forwarded-Message-Id: <20130206192420.32698.21027.idtracker@ietfa.amsl.com>
Content-Type: multipart/alternative; boundary="------------020909060905060508070501"
X-Originating-IP: [129.83.31.58]
Subject: [OAUTH-WG] Fwd: New Version Notification for draft-richer-oauth-introspection-02.txt
X-BeenThere: oauth@ietf.org
X-Mailman-Version: 2.1.12
Precedence: list
List-Id: OAUTH WG <oauth.ietf.org>
List-Unsubscribe: <https://www.ietf.org/mailman/options/oauth>, <mailto:oauth-request@ietf.org?subject=unsubscribe>
List-Archive: <http://www.ietf.org/mail-archive/web/oauth>
List-Post: <mailto:oauth@ietf.org>
List-Help: <mailto:oauth-request@ietf.org?subject=help>
List-Subscribe: <https://www.ietf.org/mailman/listinfo/oauth>, <mailto:oauth-request@ietf.org?subject=subscribe>
X-List-Received-Date: Wed, 06 Feb 2013 19:25:56 -0000

--------------020909060905060508070501
Content-Type: text/plain; charset="UTF-8"; format=flowed
Content-Transfer-Encoding: 7bit

Updated introspection draft based on recent comments. Changes include:

  - "scope" return parameter now follows RFC6749 format instead of JSON 
array
  - "subject" -> "sub", and "audience" -> "aud", to be parallel with JWT 
claims
  - clarified what happens if the authentication is bad

  -- Justin


-------- Original Message --------
Subject: 	New Version Notification for 
draft-richer-oauth-introspection-02.txt
Date: 	Wed, 6 Feb 2013 11:24:20 -0800
From: 	<internet-drafts@ietf.org>
To: 	<jricher@mitre.org>



A new version of I-D, draft-richer-oauth-introspection-02.txt
has been successfully submitted by Justin Richer and posted to the
IETF repository.

Filename:	 draft-richer-oauth-introspection
Revision:	 02
Title:		 OAuth Token Introspection
Creation date:	 2013-02-06
WG ID:		 Individual Submission
Number of pages: 6
URL:             http://www.ietf.org/internet-drafts/draft-richer-oauth-introspection-02.txt
Status:          http://datatracker.ietf.org/doc/draft-richer-oauth-introspection
Htmlized:        http://tools.ietf.org/html/draft-richer-oauth-introspection-02
Diff:            http://www.ietf.org/rfcdiff?url2=draft-richer-oauth-introspection-02

Abstract:
    This specification defines a method for a client or protected
    resource to query an OAuth authorization server to determine meta-
    information about an OAuth token.


                                                                                   


The IETF Secretariat




--------------020909060905060508070501
Content-Type: text/html; charset="UTF-8"
Content-Transfer-Encoding: 8bit

<html>
  <head>

    <meta http-equiv="content-type" content="text/html; charset=UTF-8">
  </head>
  <body bgcolor="#FFFFFF" text="#000000">
    Updated introspection draft based on recent comments. Changes
    include:<br>
    <br>
    Â - "scope" return parameter now follows RFC6749 format instead of
    JSON array<br>
    Â - "subject" -&gt; "sub", and "audience" -&gt; "aud", to be parallel
    with JWT claims<br>
    Â - clarified what happens if the authentication is bad<br>
    <br>
    Â -- Justin<br>
    <div class="moz-forward-container"><br>
      <br>
      -------- Original Message --------
      <table class="moz-email-headers-table" border="0" cellpadding="0"
        cellspacing="0">
        <tbody>
          <tr>
            <th align="RIGHT" nowrap="nowrap" valign="BASELINE">Subject:
            </th>
            <td>New Version Notification for
              draft-richer-oauth-introspection-02.txt</td>
          </tr>
          <tr>
            <th align="RIGHT" nowrap="nowrap" valign="BASELINE">Date: </th>
            <td>Wed, 6 Feb 2013 11:24:20 -0800</td>
          </tr>
          <tr>
            <th align="RIGHT" nowrap="nowrap" valign="BASELINE">From: </th>
            <td><a class="moz-txt-link-rfc2396E" href="mailto:internet-drafts@ietf.org">&lt;internet-drafts@ietf.org&gt;</a></td>
          </tr>
          <tr>
            <th align="RIGHT" nowrap="nowrap" valign="BASELINE">To: </th>
            <td><a class="moz-txt-link-rfc2396E" href="mailto:jricher@mitre.org">&lt;jricher@mitre.org&gt;</a></td>
          </tr>
        </tbody>
      </table>
      <br>
      <br>
      <pre>A new version of I-D, draft-richer-oauth-introspection-02.txt
has been successfully submitted by Justin Richer and posted to the
IETF repository.

Filename:	 draft-richer-oauth-introspection
Revision:	 02
Title:		 OAuth Token Introspection
Creation date:	 2013-02-06
WG ID:		 Individual Submission
Number of pages: 6
URL:             <a class="moz-txt-link-freetext" href="http://www.ietf.org/internet-drafts/draft-richer-oauth-introspection-02.txt">http://www.ietf.org/internet-drafts/draft-richer-oauth-introspection-02.txt</a>
Status:          <a class="moz-txt-link-freetext" href="http://datatracker.ietf.org/doc/draft-richer-oauth-introspection">http://datatracker.ietf.org/doc/draft-richer-oauth-introspection</a>
Htmlized:        <a class="moz-txt-link-freetext" href="http://tools.ietf.org/html/draft-richer-oauth-introspection-02">http://tools.ietf.org/html/draft-richer-oauth-introspection-02</a>
Diff:            <a class="moz-txt-link-freetext" href="http://www.ietf.org/rfcdiff?url2=draft-richer-oauth-introspection-02">http://www.ietf.org/rfcdiff?url2=draft-richer-oauth-introspection-02</a>

Abstract:
   This specification defines a method for a client or protected
   resource to query an OAuth authorization server to determine meta-
   information about an OAuth token.


                                                                                  


The IETF Secretariat

</pre>
      <br>
    </div>
    <br>
  </body>
</html>

--------------020909060905060508070501--

From internet-drafts@ietf.org  Wed Feb  6 12:15:36 2013
Return-Path: <internet-drafts@ietf.org>
X-Original-To: oauth@ietfa.amsl.com
Delivered-To: oauth@ietfa.amsl.com
Received: from localhost (localhost [127.0.0.1]) by ietfa.amsl.com (Postfix) with ESMTP id 87FD921E803F; Wed,  6 Feb 2013 12:15:36 -0800 (PST)
X-Virus-Scanned: amavisd-new at amsl.com
X-Spam-Flag: NO
X-Spam-Score: -102.599
X-Spam-Level: 
X-Spam-Status: No, score=-102.599 tagged_above=-999 required=5 tests=[AWL=0.000, BAYES_00=-2.599, USER_IN_WHITELIST=-100]
Received: from mail.ietf.org ([64.170.98.30]) by localhost (ietfa.amsl.com [127.0.0.1]) (amavisd-new, port 10024) with ESMTP id mzsfXO5TADsv; Wed,  6 Feb 2013 12:15:36 -0800 (PST)
Received: from ietfa.amsl.com (localhost [127.0.0.1]) by ietfa.amsl.com (Postfix) with ESMTP id 5661621E8041; Wed,  6 Feb 2013 12:15:34 -0800 (PST)
MIME-Version: 1.0
Content-Type: text/plain; charset="utf-8"
Content-Transfer-Encoding: quoted-printable
From: internet-drafts@ietf.org
To: i-d-announce@ietf.org
X-Test-IDTracker: no
X-IETF-IDTracker: 4.37
Message-ID: <20130206201534.13236.6681.idtracker@ietfa.amsl.com>
Date: Wed, 06 Feb 2013 12:15:34 -0800
Cc: oauth@ietf.org
Subject: [OAUTH-WG] I-D Action: draft-ietf-oauth-dyn-reg-05.txt
X-BeenThere: oauth@ietf.org
X-Mailman-Version: 2.1.12
Precedence: list
List-Id: OAUTH WG <oauth.ietf.org>
List-Unsubscribe: <https://www.ietf.org/mailman/options/oauth>, <mailto:oauth-request@ietf.org?subject=unsubscribe>
List-Archive: <http://www.ietf.org/mail-archive/web/oauth>
List-Post: <mailto:oauth@ietf.org>
List-Help: <mailto:oauth-request@ietf.org?subject=help>
List-Subscribe: <https://www.ietf.org/mailman/listinfo/oauth>, <mailto:oauth-request@ietf.org?subject=subscribe>
X-List-Received-Date: Wed, 06 Feb 2013 20:15:36 -0000

A New Internet-Draft is available from the on-line Internet-Drafts director=
ies.
 This draft is a work item of the Web Authorization Protocol Working Group =
of the IETF.

	Title           : OAuth Dynamic Client Registration Protocol
	Author(s)       : Justin Richer
                          John Bradley
                          Michael B. Jones
                          Maciej Machulak
	Filename        : draft-ietf-oauth-dyn-reg-05.txt
	Pages           : 21
	Date            : 2013-02-06

Abstract:
   This specification defines an endpoint and protocol for dynamic
   registration of OAuth Clients at an Authorization Server.


The IETF datatracker status page for this draft is:
https://datatracker.ietf.org/doc/draft-ietf-oauth-dyn-reg

There's also a htmlized version available at:
http://tools.ietf.org/html/draft-ietf-oauth-dyn-reg-05

A diff from the previous version is available at:
http://www.ietf.org/rfcdiff?url2=3Ddraft-ietf-oauth-dyn-reg-05


Internet-Drafts are also available by anonymous FTP at:
ftp://ftp.ietf.org/internet-drafts/


From jricher@mitre.org  Wed Feb  6 12:35:51 2013
Return-Path: <jricher@mitre.org>
X-Original-To: oauth@ietfa.amsl.com
Delivered-To: oauth@ietfa.amsl.com
Received: from localhost (localhost [127.0.0.1]) by ietfa.amsl.com (Postfix) with ESMTP id CDAC421E8043 for <oauth@ietfa.amsl.com>; Wed,  6 Feb 2013 12:35:50 -0800 (PST)
X-Virus-Scanned: amavisd-new at amsl.com
X-Spam-Flag: NO
X-Spam-Score: -6.574
X-Spam-Level: 
X-Spam-Status: No, score=-6.574 tagged_above=-999 required=5 tests=[AWL=0.025,  BAYES_00=-2.599, RCVD_IN_DNSWL_MED=-4]
Received: from mail.ietf.org ([64.170.98.30]) by localhost (ietfa.amsl.com [127.0.0.1]) (amavisd-new, port 10024) with ESMTP id zV5bAxV5JoVs for <oauth@ietfa.amsl.com>; Wed,  6 Feb 2013 12:35:49 -0800 (PST)
Received: from smtpksrv1.mitre.org (smtpksrv1.mitre.org [198.49.146.77]) by ietfa.amsl.com (Postfix) with ESMTP id 6FF0D21E8042 for <oauth@ietf.org>; Wed,  6 Feb 2013 12:35:36 -0800 (PST)
Received: from smtpksrv1.mitre.org (localhost.localdomain [127.0.0.1]) by localhost (Postfix) with SMTP id F29BC1F13DB for <oauth@ietf.org>; Wed,  6 Feb 2013 15:35:35 -0500 (EST)
Received: from IMCCAS03.MITRE.ORG (imccas03.mitre.org [129.83.29.80]) by smtpksrv1.mitre.org (Postfix) with ESMTP id B012E1F077D for <oauth@ietf.org>; Wed,  6 Feb 2013 15:35:35 -0500 (EST)
Received: from [10.146.15.29] (129.83.31.58) by IMCCAS03.MITRE.ORG (129.83.29.80) with Microsoft SMTP Server (TLS) id 14.2.318.4; Wed, 6 Feb 2013 15:35:35 -0500
Message-ID: <5112BE73.2070003@mitre.org>
Date: Wed, 6 Feb 2013 15:34:59 -0500
From: Justin Richer <jricher@mitre.org>
User-Agent: Mozilla/5.0 (X11; Linux i686; rv:17.0) Gecko/20130106 Thunderbird/17.0.2
MIME-Version: 1.0
To: <oauth@ietf.org>
References: <20130206201534.13236.6681.idtracker@ietfa.amsl.com>
In-Reply-To: <20130206201534.13236.6681.idtracker@ietfa.amsl.com>
Content-Type: text/plain; charset="ISO-8859-1"; format=flowed
Content-Transfer-Encoding: 7bit
X-Originating-IP: [129.83.31.58]
Subject: Re: [OAUTH-WG] I-D Action: draft-ietf-oauth-dyn-reg-05.txt
X-BeenThere: oauth@ietf.org
X-Mailman-Version: 2.1.12
Precedence: list
List-Id: OAUTH WG <oauth.ietf.org>
List-Unsubscribe: <https://www.ietf.org/mailman/options/oauth>, <mailto:oauth-request@ietf.org?subject=unsubscribe>
List-Archive: <http://www.ietf.org/mail-archive/web/oauth>
List-Post: <mailto:oauth@ietf.org>
List-Help: <mailto:oauth-request@ietf.org?subject=help>
List-Subscribe: <https://www.ietf.org/mailman/listinfo/oauth>, <mailto:oauth-request@ietf.org?subject=subscribe>
X-List-Received-Date: Wed, 06 Feb 2013 20:35:51 -0000

Thanks to all of the discussion over the last few weeks and some key 
input from Nat Sakimura, Eve Maler, and others, I've put out a revision 
of the DynReg specification that is a major change from recent 
revisions, but actually brings it back closer to the original -01 draft. 
The "operation" parameter is now gone and there are instead several 
logical endpoints for different kinds of operations. These endpoints are 
communicated to the client through a well-defined link structure.

It basically works like this:

1. client shows up at the Client Registration Endpoint, posts a JSON 
object with a few bits of metadata about itself (and potentially 
presents an Access Token that it got from some out of band process that 
acts as a "class registration" or "developer key", important to several 
known real-world use cases)

2. client gets back a JSON object filled with whatever metadata the 
server has about it, including a newly-minted client_id and (possibly) 
client_secret. The client also gets back a registration access token and 
a fully qualified URL that points to the "update endpoint". This url can 
take any form (the server can't count on the client being able to 
generate it from parts), but it's recommended that it follow a 
REST-style URL template of the form 
"https://server/registration_base_url/client_id".

3. client sends updates to this update URL, authenticated by the 
registration access token, by PUTting a JSON object with all of its 
parameters. Any fields the client leaves off the JSON object, the server 
leaves alone. Anything with a "null" value, the server deletes the 
value. The server remains free to override *any* field the client 
requests setting a particular value for. The client is not allowed to 
request a particular value for the client_secret or 
registration_access_token, for obvious reasons -- but see part 7 below.

4. The server responds back with the current state of the client as a 
JSON object, including any fields the server has provisioned on the 
client's behalf (defaults, for instance). Any fields the server has 
overridden, it currently MUST respond with. So if the client asks for 
"scope: A B C" and the server can only give it "scope: A B", then the 
server has to tell that to the client by including the field "scope: A 
B" in its response.

5. client can send an HTTP GET to the update URL to get its current 
state as a JSON object as in 4.

6. client can send an HTTP DELETE to the update URL to deprovision itself.

7. there's also a parallel endpoint for rotating the registration access 
token and client secret, since these are both security values that are 
provisioned by the server. There is some open debate of whether the 
client actually needs to be able to trigger this operation, or if the 
server should just do this as part of normal update/get requests to the 
update endpoint.

It's a major functionality change on the wire, and there's still sawdust 
on the spec language. By going with a JSON-based data model and a 
RESTful update protocol, we're getting away from core OAuth patterns, 
but I think that ultimately this can be a good thing. There have been a 
few proposals that would go somewhere between what OAuth does on other 
endpoints and what a real RESTful system would do, but I didn't see much 
purpose in going half way when the results would end up *more* complicated.

I request that everyone read it over to see if this will work for their 
use cases. The idea here remains that application protocols like OIDC 
and UMA would use this mechanism as-is with nearly all customizations in 
the client metadata table.

I hope that this all actually makes sense...

  -- Justin

On 02/06/2013 03:15 PM, internet-drafts@ietf.org wrote:
> A New Internet-Draft is available from the on-line Internet-Drafts directories.
>   This draft is a work item of the Web Authorization Protocol Working Group of the IETF.
>
> 	Title           : OAuth Dynamic Client Registration Protocol
> 	Author(s)       : Justin Richer
>                            John Bradley
>                            Michael B. Jones
>                            Maciej Machulak
> 	Filename        : draft-ietf-oauth-dyn-reg-05.txt
> 	Pages           : 21
> 	Date            : 2013-02-06
>
> Abstract:
>     This specification defines an endpoint and protocol for dynamic
>     registration of OAuth Clients at an Authorization Server.
>
>
> The IETF datatracker status page for this draft is:
> https://datatracker.ietf.org/doc/draft-ietf-oauth-dyn-reg
>
> There's also a htmlized version available at:
> http://tools.ietf.org/html/draft-ietf-oauth-dyn-reg-05
>
> A diff from the previous version is available at:
> http://www.ietf.org/rfcdiff?url2=draft-ietf-oauth-dyn-reg-05
>
>
> Internet-Drafts are also available by anonymous FTP at:
> ftp://ftp.ietf.org/internet-drafts/
>
> _______________________________________________
> OAuth mailing list
> OAuth@ietf.org
> https://www.ietf.org/mailman/listinfo/oauth


From sberyozkin@gmail.com  Wed Feb  6 13:48:51 2013
Return-Path: <sberyozkin@gmail.com>
X-Original-To: oauth@ietfa.amsl.com
Delivered-To: oauth@ietfa.amsl.com
Received: from localhost (localhost [127.0.0.1]) by ietfa.amsl.com (Postfix) with ESMTP id 0CA5E21F85DF for <oauth@ietfa.amsl.com>; Wed,  6 Feb 2013 13:48:51 -0800 (PST)
X-Virus-Scanned: amavisd-new at amsl.com
X-Spam-Flag: NO
X-Spam-Score: -3.333
X-Spam-Level: 
X-Spam-Status: No, score=-3.333 tagged_above=-999 required=5 tests=[AWL=0.266,  BAYES_00=-2.599, RCVD_IN_DNSWL_LOW=-1]
Received: from mail.ietf.org ([64.170.98.30]) by localhost (ietfa.amsl.com [127.0.0.1]) (amavisd-new, port 10024) with ESMTP id W-CD4tgtpO6E for <oauth@ietfa.amsl.com>; Wed,  6 Feb 2013 13:48:50 -0800 (PST)
Received: from mail-wi0-f173.google.com (mail-wi0-f173.google.com [209.85.212.173]) by ietfa.amsl.com (Postfix) with ESMTP id 0D0E021F84D8 for <oauth@ietf.org>; Wed,  6 Feb 2013 13:48:49 -0800 (PST)
Received: by mail-wi0-f173.google.com with SMTP id hq4so6124427wib.6 for <oauth@ietf.org>; Wed, 06 Feb 2013 13:48:49 -0800 (PST)
DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=gmail.com; s=20120113; h=x-received:message-id:date:from:user-agent:mime-version:to:subject :references:in-reply-to:content-type:content-transfer-encoding; bh=ZYXI5uko7xFjZNCQGtjBTp0Y+lA8adqjqeS6AyjKRtg=; b=C8s4cVilo0zb+Nem86peo2dVuM0QI2x0DSBQQ0TjPcu3fCEOPyrCWXteHQCz22ruCw mh54HdXsvpbNWEXEF7AS9S8blNSHl7maeOACoCHKD/Ntmhlh/Jiim+bvio5b4ZPwXnzH q6OmY/KLsAB5TD4eMUccgxVC/+Z3/4+qnmzfaFlx3BLosmOc1qbN3Pju1Gf7+xmtGLlb LWmrLIUsBJ2EUet3tqVAH5SVmc6UDneMXKRszJy7KhbYl2i67y20G7y8T245gmqO/dD6 V/Io6E26F0lM4PRX50LNm8C2sRbCF1ilBbw4OnHI6sUg98kG/JL1jjyjF6l5riVfNbD+ XrdA==
X-Received: by 10.180.108.3 with SMTP id hg3mr7267542wib.33.1360187328965; Wed, 06 Feb 2013 13:48:48 -0800 (PST)
Received: from [192.168.2.5] ([89.100.140.13]) by mx.google.com with ESMTPS id j9sm5416834wia.5.2013.02.06.13.48.47 (version=TLSv1 cipher=ECDHE-RSA-RC4-SHA bits=128/128); Wed, 06 Feb 2013 13:48:48 -0800 (PST)
Message-ID: <5112CFAF.4000609@gmail.com>
Date: Wed, 06 Feb 2013 21:48:31 +0000
From: Sergey Beryozkin <sberyozkin@gmail.com>
User-Agent: Mozilla/5.0 (X11; Linux x86_64; rv:12.0) Gecko/20120430 Thunderbird/12.0.1
MIME-Version: 1.0
To: oauth@ietf.org
References: <CAEeqsMat2_zoSCyx7uN373m1SMNGAz=QxEmVYWOYax=Ppt2LnQ@mail.gmail.com> <1359995273.56871.YahooMailNeo@web31809.mail.mud.yahoo.com> <CAJV9qO_Zw3bO2L=m6AzhPGQF0B6T5_HOyuTzLTDiKGJGM=Wi7A@mail.gmail.com> <1360173369.63130.YahooMailNeo@web31810.mail.mud.yahoo.com>
In-Reply-To: <1360173369.63130.YahooMailNeo@web31810.mail.mud.yahoo.com>
Content-Type: text/plain; charset=ISO-8859-1; format=flowed
Content-Transfer-Encoding: 7bit
Subject: Re: [OAUTH-WG] I'm concerned about how the sniffability of oauth2 requests
X-BeenThere: oauth@ietf.org
X-Mailman-Version: 2.1.12
Precedence: list
List-Id: OAUTH WG <oauth.ietf.org>
List-Unsubscribe: <https://www.ietf.org/mailman/options/oauth>, <mailto:oauth-request@ietf.org?subject=unsubscribe>
List-Archive: <http://www.ietf.org/mail-archive/web/oauth>
List-Post: <mailto:oauth@ietf.org>
List-Help: <mailto:oauth-request@ietf.org?subject=help>
List-Subscribe: <https://www.ietf.org/mailman/listinfo/oauth>, <mailto:oauth-request@ietf.org?subject=subscribe>
X-List-Received-Date: Wed, 06 Feb 2013 21:48:51 -0000

On 06/02/13 17:56, William Mills wrote:
> Yes, MAC relies on SSL for transport security. But you have bigger
> problems than that if SSL is broken, because your primary authentication
> credential is compromised now.
>
+1
> Do we need to address sslstrip here if it's a general attack on SSL
> transport for the browser?
When MAC is passed back to the client requesting a token in exchange for 
a grant, no browser is even involved, right ? Besides, one can exchange 
MAC token over two-way TLS in order to authenticate and I guess it is 
much much trickier to have a man in the middle attack with two-way TLS

Cheers, Sergey

>
> ------------------------------------------------------------------------
> *From:* Prabath Siriwardena <prabath@wso2.com>
> *To:* William Mills <wmills_92105@yahoo.com>
> *Cc:* L. Preston Sego III <LPSego3@gmail.com>; "oauth@ietf.org"
> <oauth@ietf.org>
> *Sent:* Wednesday, February 6, 2013 8:23 AM
> *Subject:* Re: [OAUTH-WG] I'm concerned about how the sniffability of
> oauth2 requests
>
>
>
> On Mon, Feb 4, 2013 at 9:57 PM, William Mills <wmills_92105@yahoo.com
> <mailto:wmills_92105@yahoo.com>> wrote:
>
>     There are two efforts at signed token types: MAC which is still a
>     possibility if we wake up and do it, and the "Holder Of Key" type
>     tokens.
>
>
> If someone can use sslstrip then even MAC is not safe - since MAC key
> needs to be transferred over SSL to the Client from the AS.
>
> There are standard ways in HTTP to avoid or protect from sslstrip - IMHO
> we need to occupy those best practices...
>
> Thanks & regards,
> -Prabath
>
>
>     There are a lot of folks that agree with you.
>
>     ------------------------------------------------------------------------
>     *From:* L. Preston Sego III <LPSego3@gmail.com
>     <mailto:LPSego3@gmail.com>>
>     *To:* oauth@ietf.org <mailto:oauth@ietf.org>
>     *Sent:* Friday, February 1, 2013 7:37 AM
>     *Subject:* [OAUTH-WG] I'm concerned about how the sniffability of
>     oauth2 requests
>
>     In an oauth2 request, the access token is passed along in the
>     header, with nothing else.
>
>     As I understand it, oauth2 was designed to be simple for everyone to
>     use. And while, that's true, I don't really like how all of the
>     security is reliant on SSL.
>
>     what if an attack can strip away SSL using a tool such as sslstrip
>     (or whatever else would be more suitable for modern https)? They
>     would be able to see the access token and start forging whatever
>     request he or she wants to.
>
>     Why not do some sort of RSA-type public-private key thing like back
>     in Oauth1, where there is verification of the payload on each
>     request? Just use a better algorithm?
>
>     _______________________________________________
>     OAuth mailing list
>     OAuth@ietf.org <mailto:OAuth@ietf.org>
>     https://www.ietf.org/mailman/listinfo/oauth
>
>
>
>     _______________________________________________
>     OAuth mailing list
>     OAuth@ietf.org <mailto:OAuth@ietf.org>
>     https://www.ietf.org/mailman/listinfo/oauth
>
>
>
>
> --
> Thanks & Regards,
> Prabath
>
> Mobile : +94 71 809 6732
>
> http://blog.facilelogin.com
> http://RampartFAQ.com
>
>
>
>
> _______________________________________________
> OAuth mailing list
> OAuth@ietf.org
> https://www.ietf.org/mailman/listinfo/oauth

From sakimura@gmail.com  Wed Feb  6 17:49:23 2013
Return-Path: <sakimura@gmail.com>
X-Original-To: oauth@ietfa.amsl.com
Delivered-To: oauth@ietfa.amsl.com
Received: from localhost (localhost [127.0.0.1]) by ietfa.amsl.com (Postfix) with ESMTP id 8B61D21F8546 for <oauth@ietfa.amsl.com>; Wed,  6 Feb 2013 17:49:23 -0800 (PST)
X-Virus-Scanned: amavisd-new at amsl.com
X-Spam-Flag: NO
X-Spam-Score: -1.466
X-Spam-Level: 
X-Spam-Status: No, score=-1.466 tagged_above=-999 required=5 tests=[AWL=0.533,  BAYES_00=-2.599, HTML_MESSAGE=0.001, J_CHICKENPOX_210=0.6, NO_RELAYS=-0.001]
Received: from mail.ietf.org ([64.170.98.30]) by localhost (ietfa.amsl.com [127.0.0.1]) (amavisd-new, port 10024) with ESMTP id D7ViYSnpORWB for <oauth@ietfa.amsl.com>; Wed,  6 Feb 2013 17:49:22 -0800 (PST)
Received: from mail-la0-x236.google.com (mail-la0-x236.google.com [IPv6:2a00:1450:4010:c03::236]) by ietfa.amsl.com (Postfix) with ESMTP id 62A4821F8545 for <oauth@ietf.org>; Wed,  6 Feb 2013 17:49:21 -0800 (PST)
Received: by mail-la0-f54.google.com with SMTP id gw10so2033353lab.41 for <oauth@ietf.org>; Wed, 06 Feb 2013 17:49:20 -0800 (PST)
DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=gmail.com; s=20120113; h=mime-version:x-received:in-reply-to:references:date:message-id :subject:from:to:cc:content-type; bh=jIxmrultPAQ09IV2MgIhEknkdZddU/nB1KcsrBI6Lr0=; b=0Q+8YbWRv6PVB5FX9YuMsnp9Qw6PDF29Vu9nbL9Ove+7/+OW83zmAJltfuR9CN3KvZ iWlse44hpdq95qqwPqIkn6YzqNEPrIF2AbQ1UVjEn39RfHJYdZCRLqcVNETv6lzj7atL IdKhC+MooVd/DoZv4LV80u6enU1klD21aCnbIaislrNMPZiDXefmf3HY8sB5CFo6y2Q9 RpitULqYTMv65WmyiK5RgAi4sSzcKUSW2Wly4Yx0y+UoEfpGotWj75QO+2Kuq0xdd7om 6So884ZIG5y9n9MjTKNVofX/LPfGG6hmpx7/u3EZB2Yw3vyd1vzj1P9+WmRnkss19bVW mQCg==
MIME-Version: 1.0
X-Received: by 10.152.133.52 with SMTP id oz20mr28586785lab.30.1360201759885;  Wed, 06 Feb 2013 17:49:19 -0800 (PST)
Received: by 10.112.6.70 with HTTP; Wed, 6 Feb 2013 17:49:19 -0800 (PST)
In-Reply-To: <E52E0947-31AE-4F33-BE7E-4D3D6E8D2FFB@ve7jtb.com>
References: <CAJV9qO_J1-AhGB=XST0R-kwAd-9hjUbCJ4ieBPoE_OMe760mqg@mail.gmail.com> <73B7EC23-AA93-42EE-B3EB-35BA1B82558F@ve7jtb.com> <511175AA.9030301@gmail.com> <1360099372.47338.YahooMailNeo@web31807.mail.mud.yahoo.com> <CA+ZpN27GnnU6w5Dnth4zfsa+nMhi6Rsyqmq-tYOqG54+Sh-9ww@mail.gmail.com> <59E470B10C4630419ED717AC79FCF9A9483E7B3D@BY2PRD0411MB441.namprd04.prod.outlook.com> <1360111712.54487.YahooMailNeo@web31812.mail.mud.yahoo.com> <59E470B10C4630419ED717AC79FCF9A9483E7E50@BY2PRD0411MB441.namprd04.prod.outlook.com> <E52E0947-31AE-4F33-BE7E-4D3D6E8D2FFB@ve7jtb.com>
Date: Wed, 6 Feb 2013 18:49:19 -0700
Message-ID: <CABzCy2DN9UhRJ61+mdbs3ARLAeKv+Yfp6BmeAHAVDGYNauu+BA@mail.gmail.com>
From: Nat Sakimura <sakimura@gmail.com>
To: John Bradley <ve7jtb@ve7jtb.com>
Content-Type: multipart/alternative; boundary=f46d0435c24cb888eb04d518a664
Cc: "oauth@ietf.org WG" <oauth@ietf.org>
Subject: Re: [OAUTH-WG] Why OAuth it self is not an authentication framework ?
X-BeenThere: oauth@ietf.org
X-Mailman-Version: 2.1.12
Precedence: list
List-Id: OAUTH WG <oauth.ietf.org>
List-Unsubscribe: <https://www.ietf.org/mailman/options/oauth>, <mailto:oauth-request@ietf.org?subject=unsubscribe>
List-Archive: <http://www.ietf.org/mail-archive/web/oauth>
List-Post: <mailto:oauth@ietf.org>
List-Help: <mailto:oauth-request@ietf.org?subject=help>
List-Subscribe: <https://www.ietf.org/mailman/listinfo/oauth>, <mailto:oauth-request@ietf.org?subject=subscribe>
X-List-Received-Date: Thu, 07 Feb 2013 01:49:23 -0000

--f46d0435c24cb888eb04d518a664
Content-Type: text/plain; charset=windows-1252
Content-Transfer-Encoding: quoted-printable

Lewis,

Specifically, we have defined the following to the id_token.

issREQUIRED. Issuer Identifier for the Issuer of the response.subREQUIRED.
Subject identifier. A locally unique and never reassigned identifier within
the Issuer for the End-User, which is intended to be consumed by the
Client. e.g. 24400320 or AItOawmwtWwcT0k51BayewNvutrJUqsvl6qs7A4. It MUST
NOT exceed 255 ASCII characters in length.audREQUIRED. Audience that this
ID Token is intended for. It MUST contain the OAuth 2.0 client_id of the
Client.azpOPTIONAL. Authorized Party. This member identifies an OAuth 2.0
client authorized to use this ID Token as an OAuth access token. This Claim
is only needed when the Authorized Party is different than the Client that
requested the ID Token. It MUST contain the client_id of the authorized
party.
This 'azp' is the new thing. I proposed it as 'reg' (after 'registered
instrument/token) and Google is using 'cid' (client id) but it ended up
'azp' (authorized party, which I have a hard time remembering :-) So, if
you want to use id_token to authenticate the client to a resource server,
then you put the client_id (that the resource server understands) into azp,
and the identifier of the resource server into aud.

Best,

Nat


2013/2/6 John Bradley <ve7jtb@ve7jtb.com>

> Adam,
>
> We have made some changes in the latest draft to address some input from
> Google that I think may also address your need to using the id_token in a=
n
> assertion or possibly as an access token to a federated RS.
>
> I can go over it with you if you like.
>
> John B.
>
> On 2013-02-06, at 9:05 AM, Lewis Adam-CAL022 <
> Adam.Lewis@motorolasolutions.com> wrote:
>
> Hi Bill,****
>
> My reason for using OAuth rather than OIDC is because the id_token in OID=
C
> is audience restricted to the client.  This was clearly intended for WebS=
SO
> / authentication to a client running on a web server.  It does not help t=
he
> case where the user of a RESTful native client want to authenticate to a
> RESTful web service. ****
>
> I agree that OAuth lacks a =93defined=94 way to communicate what is in th=
e AT
> (as OAuth does not define the content of the AT), but within an enterpris=
e
> domain this is easy to solve by profiling.  And in any implementation of
> OAuth on the Internet, the AT must at some level identify the user to the
> RS.  Otherwise how else would the RS know who=92s protected resources the
> client is trying to access?  Now whether the RS learns that through
> introspection or by parsing a JWT-structured AT is of course not defined.
> But at the end of the day, the AT definitely (in all cases that I can thi=
nk
> of) identifies the user. ****
>
> I am open minded to using OIDC if in the future if the client can request
> an id_token that is audience restricted to the RS it is going to
> communicate.  In other words, yes I agree that OIDC is the preferred
> mechanism for performing =93user authentication to a client,=94 but I als=
o
> argue that OAuth is the best method to perform =93user authentication to =
an
> RS=94 (if you want to get your RS out of the password consumption busines=
s).
> I am not at all advocating OAuth for authentication to a client. ****
>
> -adam****
>
> *From:* William Mills [mailto:wmills_92105@yahoo.com]
> *Sent:* Tuesday, February 05, 2013 6:49 PM
> *To:* Lewis Adam-CAL022; Tim Bray
> *Cc:* "WG <oauth@ietf.org>"@il06exr02.mot.com
> *Subject:* Re: [OAUTH-WG] Why OAuth it self is not an authentication
> framework ?****
> ** **
> Why use OAuth when OpenID does everything that OAuth can do as an
> authentication method and does a few things much better?****
>
> Specifically OAuth lacks any defined way to:****
>
> -    feed back any additional information like the real user ID (as
> opposed to what the entered)****
> -    bound an authentication event in time****
> -    provide any form of additional SSO payload like a display name for
> the user****
>
> there's probably other things.****
>
> It'll mostly work but there are things it doesn't do.  Could you solve
> some of the rest of this with token introspection or a user API that the =
RP
> could use to fetch user info, sure, but why rebuild OpenID when OpenID
> exists?****
>
> -bill****
>
>
> ------------------------------
> *From:* Lewis Adam-CAL022 <Adam.Lewis@motorolasolutions.com>
> *To:* Tim Bray <twbray@google.com>; William Mills <wmills_92105@yahoo.com=
>
>
> *Cc:* "oauth@ietf.org WG" <oauth@ietf.org>
> *Sent:* Tuesday, February 5, 2013 2:27 PM
> *Subject:* RE: [OAUTH-WG] Why OAuth it self is not an authentication
> framework ?****
>
> I think this is becoming a largely academic / philosophical argument by
> this time.  The people who designed OAuth will likely point out that it w=
as
> conceptualized as an authorization protocol to enable a RO to delegate
> access to a client to access its protected resources on some RS.  And of
> course this is the history of it.  And the RO and end-user were typically
> the same entity.  But get caught up in what it was envisioned to do vs.
> real life use cases that OAuth can solve (and is solving) beyond its
> initial use cases misses the point =85 because OAuth is gaining traction =
in
> the enterprise and will be used in all different sorts of ways, including
> authentication. ****
>  ****
> This is especially true of RESTful APIs within an enterprise where the RO
> and end-user are **not** the same: e.g. RO=3Denterprise and
> end-user=3Demployee.  In this model the end-user is not authorizing anyth=
ing
> when their client requests a token from the AS =85 they authenticate to t=
he
> AS and the client gets an AT, which will likely be profiled by most
> enterprise deployments to look something like an OIDC id_token.  The AT
> will be presented to the RS which will examine the claims (user identity,
> LOA, etc.) and make authorization decisions based on business logic.  The
> AT has not authorized the user to do anything, it has only made an
> assertion that the user has been authenticated by the AS (sort of sounds =
a
> lot like an IdP now).****
>  ****
> All this talked of OAuth being authorization and not authentication was
> extremely confusing to me when I first started looking at OAuth for my us=
e
> cases, and I think at some point the authors of OAuth are going to have t=
o
> recognize that their baby has grown up to be multi-faceted (and I mean th=
is
> as a complement).  The abstractions left in the OAuth spec (while some ha=
ve
> claimed of the lack of interoperability it will cause) will also enable i=
t
> to be used in ways possibly still not envisioned by any of us.  I think a=
s
> soon as we can stop trying to draw the artificial line around OAuth being
> =93an authorization protocol=94 the better things will be.****
>  ****
> I like to say that they authors had it right when they named it =93OAuth=
=94
> and not =93OAuthR=94 J****
>  ****
> -adam****
>  ****
> *From:* oauth-bounces@ietf.org [mailto:oauth-bounces@ietf.org] *On Behalf
> Of *Tim Bray
> *Sent:* Tuesday, February 05, 2013 3:28 PM
> *To:* William Mills
> *Cc:* oauth@ietf.org WG
> *Subject:* Re: [OAUTH-WG] Why OAuth it self is not an authentication
> framework ?****
>  ****
> OIDC seems about the most plausible candidate for a =93good general
> solution=94 that I=92m aware of.   -T****
> On Tue, Feb 5, 2013 at 1:22 PM, William Mills <wmills_92105@yahoo.com>
> wrote:****
> There are some specific design mis-matches for OAuth as an authentication
> protocol, it's not what it's designed for and there are some problems you
> will run into.  Some have used it as such, but it's not a good general
> solution.****
>  ****
> -bill****
>  ****
> ------------------------------
> *From:* Paul Madsen <paul.madsen@gmail.com>
> *To:* John Bradley <ve7jtb@ve7jtb.com>
> *Cc:* "oauth@ietf.org WG" <oauth@ietf.org>
> *Sent:* Tuesday, February 5, 2013 1:12 PM
> *Subject:* Re: [OAUTH-WG] Why OAuth it self is not an authentication
> framework ?****
>  ****
> why pigeonhole it?
>
> OAuth can be deployed with no authz semantics at all (or at least as
> little as any authn mechanism), e.g client creds grant type with no scope=
s
>
> I agree that OAuth is not an *SSO* protocol.****
> On 2/5/13 3:36 PM, John Bradley wrote:****
>
> OAuth is an Authorization protocol as many of us have pointed out.****
>  ****
> The post is largely correct and based on one of mine.****
>  ****
> John B.****
>  ****
> On 2013-02-05, at 12:52 PM, Prabath Siriwardena <prabath@wso2.com> wrote:=
*
> ***
>  ****
>
> FYI and for your comments..****
>  ****
>
> http://blog.facilelogin.com/2013/02/why-oauth-it-self-is-not-authenticati=
on.html
> ****
>  ****
> Thanks & Regards,
> Prabath****
>  ****
> Mobile : +94 71 809 6732 ****
> http://blog.facilelogin.com/
> http://rampartfaq.com/****
> _______________________________________________
> OAuth mailing list
> OAuth@ietf.org
> https://www.ietf.org/mailman/listinfo/oauth****
>
>  ****
>  ****
>
> _______________________________________________****
>
> OAuth mailing list****
>
> OAuth@ietf.org****
>
> https://www.ietf.org/mailman/listinfo/oauth****
>
>  ****
>
>
> _______________________________________________
> OAuth mailing list
> OAuth@ietf.org
> https://www.ietf.org/mailman/listinfo/oauth****
>
> _______________________________________________
> OAuth mailing list
> OAuth@ietf.org
> https://www.ietf.org/mailman/listinfo/oauth****
>  ****
>
>
> _______________________________________________
> OAuth mailing list
> OAuth@ietf.org
> https://www.ietf.org/mailman/listinfo/oauth
>
>
>
> _______________________________________________
> OAuth mailing list
> OAuth@ietf.org
> https://www.ietf.org/mailman/listinfo/oauth
>
>


--=20
Nat Sakimura (=3Dnat)
Chairman, OpenID Foundation
http://nat.sakimura.org/
@_nat_en

--f46d0435c24cb888eb04d518a664
Content-Type: text/html; charset=windows-1252
Content-Transfer-Encoding: quoted-printable

Lewis,=A0<div><br></div><div>Specifically, we have defined the following to=
 the id_token.=A0</div><div><br></div><div><dt style=3D"font-family:verdana=
,charcoal,helvetica,arial,sans-serif;background-color:rgb(255,255,255)">iss=
</dt>
<dd style=3D"font-family:verdana,charcoal,helvetica,arial,sans-serif;backgr=
ound-color:rgb(255,255,255)">REQUIRED. Issuer Identifier for the Issuer of =
the response.</dd><dt style=3D"font-family:verdana,charcoal,helvetica,arial=
,sans-serif;background-color:rgb(255,255,255)">
sub</dt><dd style=3D"font-family:verdana,charcoal,helvetica,arial,sans-seri=
f;background-color:rgb(255,255,255)">REQUIRED. Subject identifier. A locall=
y unique and never reassigned identifier within the Issuer for the End-User=
, which is intended to be consumed by the Client. e.g.=A0<tt style=3D"color=
:rgb(0,51,102);font-family:&#39;Courier New&#39;,Courier,monospace">2440032=
0</tt>=A0or=A0<tt style=3D"color:rgb(0,51,102);font-family:&#39;Courier New=
&#39;,Courier,monospace">AItOawmwtWwcT0k51BayewNvutrJUqsvl6qs7A4</tt>. It M=
UST NOT exceed 255 ASCII characters in length.</dd>
<dt style=3D"font-family:verdana,charcoal,helvetica,arial,sans-serif;backgr=
ound-color:rgb(255,255,255)">aud</dt><dd style=3D"font-family:verdana,charc=
oal,helvetica,arial,sans-serif;background-color:rgb(255,255,255)">REQUIRED.=
 Audience that this ID Token is intended for. It MUST contain the OAuth 2.0=
=A0<tt style=3D"color:rgb(0,51,102);font-family:&#39;Courier New&#39;,Couri=
er,monospace">client_id</tt>=A0of the Client.</dd>
<dt style=3D"font-family:verdana,charcoal,helvetica,arial,sans-serif;backgr=
ound-color:rgb(255,255,255)">azp</dt><dd style=3D"font-family:verdana,charc=
oal,helvetica,arial,sans-serif;background-color:rgb(255,255,255)">OPTIONAL.=
 Authorized Party. This member identifies an OAuth 2.0 client authorized to=
 use this ID Token as an OAuth access token. This Claim is only needed when=
 the Authorized Party is different than the Client that requested the ID To=
ken. It MUST contain the=A0<tt style=3D"color:rgb(0,51,102);font-family:&#3=
9;Courier New&#39;,Courier,monospace">client_id</tt>=A0of the authorized pa=
rty.</dd>
<br><div class=3D"gmail_quote">This &#39;azp&#39; is the new thing. I propo=
sed it as &#39;reg&#39; (after &#39;registered instrument/token) and Google=
 is using &#39;cid&#39; (client id) but it ended up &#39;azp&#39; (authoriz=
ed party, which I have a hard time remembering :-) So, if you want to use i=
d_token to authenticate the client to a resource server, then you put the c=
lient_id (that the resource server understands) into azp, and the identifie=
r of the resource server into aud.=A0</div>
<div class=3D"gmail_quote"><br></div><div class=3D"gmail_quote">Best,=A0</d=
iv><div class=3D"gmail_quote"><br></div><div class=3D"gmail_quote">Nat</div=
><div class=3D"gmail_quote"><br></div><div class=3D"gmail_quote"><br></div>=
<div class=3D"gmail_quote">
2013/2/6 John Bradley <span dir=3D"ltr">&lt;<a href=3D"mailto:ve7jtb@ve7jtb=
.com" target=3D"_blank">ve7jtb@ve7jtb.com</a>&gt;</span><br><blockquote cla=
ss=3D"gmail_quote" style=3D"margin:0 0 0 .8ex;border-left:1px #ccc solid;pa=
dding-left:1ex">
<div style=3D"word-wrap:break-word">Adam,<div><br></div><div>We have made s=
ome changes in the latest draft to address some input from Google that I th=
ink may also address your need to using the id_token in an assertion or pos=
sibly as an access token to a federated RS.</div>
<div><br></div><div>I can go over it with you if you like.</div><div><br></=
div><div>John B.</div><div><div class=3D"h5"><div><br><div><div>On 2013-02-=
06, at 9:05 AM, Lewis Adam-CAL022 &lt;<a href=3D"mailto:Adam.Lewis@motorola=
solutions.com" target=3D"_blank">Adam.Lewis@motorolasolutions.com</a>&gt; w=
rote:</div>
<br><blockquote type=3D"cite"><div lang=3D"EN-US" link=3D"blue" vlink=3D"pu=
rple" style=3D"font-family:Helvetica;font-size:medium;font-style:normal;fon=
t-variant:normal;font-weight:normal;letter-spacing:normal;line-height:norma=
l;text-align:-webkit-auto;text-indent:0px;text-transform:none;white-space:n=
ormal;word-spacing:0px">
<div><div style=3D"margin:0in 0in 0.0001pt;font-size:12pt;font-family:&#39;=
Times New Roman&#39;,serif"><span style=3D"font-size:10.5pt;font-family:&#3=
9;Book Antiqua&#39;,serif;color:olive">Hi Bill,<u></u><u></u></span></div><=
div style=3D"margin:0in 0in 0.0001pt;font-size:12pt;font-family:&#39;Times =
New Roman&#39;,serif">
<span style=3D"font-size:10.5pt;font-family:&#39;Book Antiqua&#39;,serif;co=
lor:olive">=A0</span></div><div style=3D"margin:0in 0in 0.0001pt;font-size:=
12pt;font-family:&#39;Times New Roman&#39;,serif"><span style=3D"font-size:=
10.5pt;font-family:&#39;Book Antiqua&#39;,serif;color:olive">My reason for =
using OAuth rather than OIDC is because the id_token in OIDC is audience re=
stricted to the client.=A0 This was clearly intended for WebSSO / authentic=
ation to a client running on a web server.=A0 It does not help the case whe=
re the user of a RESTful native client want to authenticate to a RESTful we=
b service.=A0<u></u><u></u></span></div>
<div style=3D"margin:0in 0in 0.0001pt;font-size:12pt;font-family:&#39;Times=
 New Roman&#39;,serif"><span style=3D"font-size:10.5pt;font-family:&#39;Boo=
k Antiqua&#39;,serif;color:olive">=A0</span></div><div style=3D"margin:0in =
0in 0.0001pt;font-size:12pt;font-family:&#39;Times New Roman&#39;,serif">
<span style=3D"font-size:10.5pt;font-family:&#39;Book Antiqua&#39;,serif;co=
lor:olive">I agree that OAuth lacks a =93defined=94 way to communicate what=
 is in the AT (as OAuth does not define the content of the AT), but within =
an enterprise domain this is easy to solve by profiling.=A0 And in any impl=
ementation of OAuth on the Internet, the AT must at some level identify the=
 user to the RS.=A0 Otherwise how else would the RS know who=92s protected =
resources the client is trying to access?=A0 Now whether the RS learns that=
 through introspection or by parsing a JWT-structured AT is of course not d=
efined.=A0 But at the end of the day, the AT definitely (in all cases that =
I can think of) identifies the user.=A0<u></u><u></u></span></div>
<div style=3D"margin:0in 0in 0.0001pt;font-size:12pt;font-family:&#39;Times=
 New Roman&#39;,serif"><span style=3D"font-size:10.5pt;font-family:&#39;Boo=
k Antiqua&#39;,serif;color:olive">=A0</span></div><div style=3D"margin:0in =
0in 0.0001pt;font-size:12pt;font-family:&#39;Times New Roman&#39;,serif">
<span style=3D"font-size:10.5pt;font-family:&#39;Book Antiqua&#39;,serif;co=
lor:olive">I am open minded to using OIDC if in the future if the client ca=
n request an id_token that is audience restricted to the RS it is going to =
communicate.=A0 In other words, yes I agree that OIDC is the preferred mech=
anism for performing =93user authentication to a client,=94 but I also argu=
e that OAuth is the best method to perform =93user authentication to an RS=
=94 (if you want to get your RS out of the password consumption business).=
=A0 I am not at all advocating OAuth for authentication to a client.=A0<u><=
/u><u></u></span></div>
<div style=3D"margin:0in 0in 0.0001pt;font-size:12pt;font-family:&#39;Times=
 New Roman&#39;,serif"><span style=3D"font-size:10.5pt;font-family:&#39;Boo=
k Antiqua&#39;,serif;color:olive">=A0</span></div><div style=3D"margin:0in =
0in 0.0001pt;font-size:12pt;font-family:&#39;Times New Roman&#39;,serif">
<span style=3D"font-size:10.5pt;font-family:&#39;Book Antiqua&#39;,serif;co=
lor:olive">-adam<u></u><u></u></span></div><div style=3D"margin:0in 0in 0.0=
001pt;font-size:12pt;font-family:&#39;Times New Roman&#39;,serif"><span sty=
le=3D"font-size:10.5pt;font-family:&#39;Book Antiqua&#39;,serif;color:olive=
">=A0</span></div>
<div><div style=3D"border-style:solid none none;border-top-width:1pt;border=
-top-color:rgb(181,196,223);padding:3pt 0in 0in"><div style=3D"margin:0in 0=
in 0.0001pt;font-size:12pt;font-family:&#39;Times New Roman&#39;,serif"><b>=
<span style=3D"font-size:10pt;font-family:Tahoma,sans-serif">From:</span></=
b><span style=3D"font-size:10pt;font-family:Tahoma,sans-serif"><span>=A0</s=
pan>William Mills [mailto:<a href=3D"mailto:wmills_92105@" target=3D"_blank=
">wmills_92105@</a><a href=3D"http://yahoo.com" target=3D"_blank">yahoo.com=
</a>]<span>=A0</span><br>
<b>Sent:</b><span>=A0</span>Tuesday, February 05, 2013 6:49 PM<br><b>To:</b=
><span>=A0</span>Lewis Adam-CAL022; Tim Bray<br><b>Cc:</b><span>=A0</span>&=
quot;WG &lt;<a href=3D"mailto:oauth@ietf.org" target=3D"_blank">oauth@ietf.=
org</a>&gt;&quot;@<a href=3D"http://il06exr02.mot.com" target=3D"_blank">il=
06exr02.mot.com</a><br>
<b>Subject:</b><span>=A0</span>Re: [OAUTH-WG] Why OAuth it self is not an a=
uthentication framework ?<u></u><u></u></span></div></div></div><div style=
=3D"margin:0in 0in 0.0001pt;font-size:12pt;font-family:&#39;Times New Roman=
&#39;,serif">
<u></u>=A0<u></u></div><div><div><div style=3D"font-size:12pt;font-family:&=
#39;Times New Roman&#39;,serif;margin:0in 0in 0.0001pt"><span style=3D"font=
-family:&#39;Courier New&#39;,serif">Why use OAuth when OpenID does everyth=
ing that OAuth can do as an authentication method and does a few things muc=
h better?<u></u><u></u></span></div>
</div><div><div style=3D"font-size:12pt;font-family:&#39;Times New Roman&#3=
9;,serif;margin:0in 0in 0.0001pt"><span style=3D"font-family:&#39;Courier N=
ew&#39;,serif">=A0</span></div></div><div><div style=3D"margin:0in 0in 0.00=
01pt;font-size:12pt;font-family:&#39;Times New Roman&#39;,serif">
<span style=3D"font-family:&#39;Courier New&#39;,serif">Specifically OAuth =
lacks any defined way to:<u></u><u></u></span></div></div><div><div style=
=3D"margin:0in 0in 0.0001pt;font-size:12pt;font-family:&#39;Times New Roman=
&#39;,serif">
<span style=3D"font-family:&#39;Courier New&#39;,serif">=A0</span></div></d=
iv><div><div style=3D"margin:0in 0in 0.0001pt;font-size:12pt;font-family:&#=
39;Times New Roman&#39;,serif"><span style=3D"font-family:&#39;Courier New&=
#39;,serif">-<span>=A0=A0=A0<span>=A0</span></span>feed back any additional=
 information like the real user ID (as opposed to what the entered)<u></u><=
u></u></span></div>
</div><div><div style=3D"margin:0in 0in 0.0001pt;font-size:12pt;font-family=
:&#39;Times New Roman&#39;,serif"><span style=3D"font-family:&#39;Courier N=
ew&#39;,serif">-<span>=A0=A0=A0<span>=A0</span></span>bound an authenticati=
on event in time<u></u><u></u></span></div>
</div><div><div style=3D"margin:0in 0in 0.0001pt;font-size:12pt;font-family=
:&#39;Times New Roman&#39;,serif"><span style=3D"font-family:&#39;Courier N=
ew&#39;,serif">-<span>=A0=A0=A0<span>=A0</span></span>provide any form of a=
dditional SSO payload like a display name for the user<u></u><u></u></span>=
</div>
</div><div><div style=3D"margin:0in 0in 0.0001pt;font-size:12pt;font-family=
:&#39;Times New Roman&#39;,serif"><span style=3D"font-family:&#39;Courier N=
ew&#39;,serif">=A0</span></div></div><div><div style=3D"margin:0in 0in 0.00=
01pt;font-size:12pt;font-family:&#39;Times New Roman&#39;,serif">
<span style=3D"font-family:&#39;Courier New&#39;,serif">there&#39;s probabl=
y other things.<u></u><u></u></span></div></div><div><div style=3D"margin:0=
in 0in 0.0001pt;font-size:12pt;font-family:&#39;Times New Roman&#39;,serif"=
>
<span style=3D"font-family:&#39;Courier New&#39;,serif">=A0</span></div></d=
iv><div><div style=3D"margin:0in 0in 0.0001pt;font-size:12pt;font-family:&#=
39;Times New Roman&#39;,serif"><span style=3D"font-family:&#39;Courier New&=
#39;,serif">It&#39;ll mostly work but there are things it doesn&#39;t do. =
=A0Could you solve some of the rest of this with token introspection or a u=
ser API that the RP could use to fetch user info, sure, but why rebuild Ope=
nID when OpenID exists?<u></u><u></u></span></div>
</div><div><div style=3D"margin:0in 0in 0.0001pt;font-size:12pt;font-family=
:&#39;Times New Roman&#39;,serif"><span style=3D"font-family:&#39;Courier N=
ew&#39;,serif">=A0</span></div></div><div><div style=3D"margin:0in 0in 0.00=
01pt;font-size:12pt;font-family:&#39;Times New Roman&#39;,serif">
<span style=3D"font-family:&#39;Courier New&#39;,serif">-bill<u></u><u></u>=
</span></div></div><div><div style=3D"margin:0in 0in 0.0001pt;font-size:12p=
t;font-family:&#39;Times New Roman&#39;,serif"><span style=3D"font-family:&=
#39;Courier New&#39;,serif">=A0</span></div>
</div><div><div style=3D"margin:0in 0in 0.0001pt;font-size:12pt;font-family=
:&#39;Times New Roman&#39;,serif"><span style=3D"font-family:&#39;Courier N=
ew&#39;,serif">=A0</span></div></div><div><div><div class=3D"MsoNormal" ali=
gn=3D"center" style=3D"text-align:center;font-size:12pt;font-family:&#39;Ti=
mes New Roman&#39;,serif;margin:0in 0in 0.0001pt;background-repeat:initial =
initial">
<span style=3D"font-size:10pt;font-family:Arial,sans-serif"><hr size=3D"1" =
width=3D"100%" align=3D"center"></span></div><div style=3D"font-size:12pt;f=
ont-family:&#39;Times New Roman&#39;,serif;margin:0in 0in 0.0001pt"><b><spa=
n style=3D"font-size:10pt;font-family:Arial,sans-serif">From:</span></b><sp=
an style=3D"font-size:10pt;font-family:Arial,sans-serif"><span>=A0</span>Le=
wis Adam-CAL022 &lt;<a href=3D"mailto:Adam.Lewis@motorolasolutions.com" tar=
get=3D"_blank">Adam.Lewis@motorolasolutions.com</a>&gt;<br>
<b>To:</b><span>=A0</span>Tim Bray &lt;<a href=3D"mailto:twbray@google.com"=
 target=3D"_blank">twbray@google.com</a>&gt;; William Mills &lt;<a href=3D"=
mailto:wmills_92105@yahoo.com" target=3D"_blank">wmills_92105@yahoo.com</a>=
&gt;<span>=A0</span><br>
<b>Cc:</b><span>=A0</span>&quot;<a href=3D"mailto:oauth@ietf.org" target=3D=
"_blank">oauth@ietf.org</a> WG&quot; &lt;<a href=3D"mailto:oauth@ietf.org" =
target=3D"_blank">oauth@ietf.org</a>&gt;<span>=A0</span><br><b>Sent:</b><sp=
an>=A0</span>Tuesday, February 5, 2013 2:27 PM<br>
<b>Subject:</b><span>=A0</span>RE: [OAUTH-WG] Why OAuth it self is not an a=
uthentication framework ?</span><span><u></u><u></u></span></div></div><div=
 style=3D"font-size:12pt;font-family:&#39;Times New Roman&#39;,serif;margin=
:0in 0in 0.0001pt">
<span>=A0</span></div><div><div><div style=3D"font-size:12pt;font-family:&#=
39;Times New Roman&#39;,serif;margin:0in 0in 0.0001pt"><span style=3D"font-=
size:10.5pt;color:olive">I think this is becoming a largely academic / phil=
osophical argument by this time.=A0 The people who designed OAuth will like=
ly point out that it was conceptualized as an authorization protocol to ena=
ble a RO to delegate access to a client to access its protected resources o=
n some RS.=A0 And of course this is the history of it.=A0 And the RO and en=
d-user were typically the same entity.=A0 But get caught up in what it was =
envisioned to do vs. real life use cases that OAuth can solve (and is solvi=
ng) beyond its initial use cases misses the point =85 because OAuth is gain=
ing traction in the enterprise and will be used in all different sorts of w=
ays, including authentication.=A0</span><span><u></u><u></u></span></div>
</div><div><div style=3D"font-size:12pt;font-family:&#39;Times New Roman&#3=
9;,serif;margin:0in 0in 0.0001pt"><span style=3D"font-size:10.5pt;color:oli=
ve">=A0</span><span><u></u><u></u></span></div></div><div><div style=3D"fon=
t-size:12pt;font-family:&#39;Times New Roman&#39;,serif;margin:0in 0in 0.00=
01pt">
<span style=3D"font-size:10.5pt;color:olive">This is especially true of RES=
Tful APIs within an enterprise where the RO and end-user are *<b>not</b>* t=
he same: e.g. RO=3Denterprise and end-user=3Demployee.=A0 In this model the=
 end-user is not authorizing anything when their client requests a token fr=
om the AS =85 they authenticate to the AS and the client gets an AT, which =
will likely be profiled by most enterprise deployments to look something li=
ke an OIDC id_token.=A0 The AT will be presented to the RS which will exami=
ne the claims (user identity, LOA, etc.) and make authorization decisions b=
ased on business logic.=A0 The AT has not authorized the user to do anythin=
g, it has only made an assertion that the user has been authenticated by th=
e AS (sort of sounds a lot like an IdP now).</span><span><u></u><u></u></sp=
an></div>
</div><div><div style=3D"font-size:12pt;font-family:&#39;Times New Roman&#3=
9;,serif;margin:0in 0in 0.0001pt"><span style=3D"font-size:10.5pt;color:oli=
ve">=A0</span><span><u></u><u></u></span></div></div><div><div style=3D"fon=
t-size:12pt;font-family:&#39;Times New Roman&#39;,serif;margin:0in 0in 0.00=
01pt">
<span style=3D"font-size:10.5pt;color:olive">All this talked of OAuth being=
 authorization and not authentication was extremely confusing to me when I =
first started looking at OAuth for my use cases, and I think at some point =
the authors of OAuth are going to have to recognize that their baby has gro=
wn up to be multi-faceted (and I mean this as a complement).=A0 The abstrac=
tions left in the OAuth spec (while some have claimed of the lack of intero=
perability it will cause) will also enable it to be used in ways possibly s=
till not envisioned by any of us.=A0 I think as soon as we can stop trying =
to draw the artificial line around OAuth being =93an authorization protocol=
=94 the better things will be.</span><span><u></u><u></u></span></div>
</div><div><div style=3D"font-size:12pt;font-family:&#39;Times New Roman&#3=
9;,serif;margin:0in 0in 0.0001pt"><span style=3D"font-size:10.5pt;color:oli=
ve">=A0</span><span><u></u><u></u></span></div></div><div><div style=3D"fon=
t-size:12pt;font-family:&#39;Times New Roman&#39;,serif;margin:0in 0in 0.00=
01pt">
<span style=3D"font-size:10.5pt;color:olive">I like to say that they author=
s had it right when they named it =93OAuth=94 and not =93OAuthR=94<span>=A0=
</span></span><span style=3D"font-size:10.5pt;font-family:Wingdings;color:o=
live">J</span><span><u></u><u></u></span></div>
</div><div><div style=3D"font-size:12pt;font-family:&#39;Times New Roman&#3=
9;,serif;margin:0in 0in 0.0001pt"><span style=3D"font-size:10.5pt;color:oli=
ve">=A0</span><span><u></u><u></u></span></div></div><div><div style=3D"fon=
t-size:12pt;font-family:&#39;Times New Roman&#39;,serif;margin:0in 0in 0.00=
01pt">
<span style=3D"font-size:10.5pt;color:olive">-adam</span><span><u></u><u></=
u></span></div></div><div><div style=3D"font-size:12pt;font-family:&#39;Tim=
es New Roman&#39;,serif;margin:0in 0in 0.0001pt"><span style=3D"font-size:1=
0.5pt;color:olive">=A0</span><span><u></u><u></u></span></div>
</div><div style=3D"border-style:solid none none;border-top-width:1pt;borde=
r-top-color:rgb(181,196,223);padding:3pt 0in 0in"><div style=3D"font-size:1=
2pt;font-family:&#39;Times New Roman&#39;,serif;margin:0in 0in 0.0001pt"><b=
><span style=3D"font-size:10pt">From:</span></b><span style=3D"font-size:10=
pt"><span>=A0</span><a href=3D"mailto:oauth-bounces@ietf.org" target=3D"_bl=
ank">oauth-bounces@ietf.org</a> [mailto:<a href=3D"mailto:oauth-" target=3D=
"_blank">oauth-</a><a href=3D"mailto:bounces@ietf.org" target=3D"_blank">bo=
unces@ietf.org</a>]<span>=A0</span><b>On Behalf Of<span>=A0</span></b>Tim B=
ray<br>
<b>Sent:</b><span>=A0</span>Tuesday, February 05, 2013 3:28 PM<br><b>To:</b=
><span>=A0</span>William Mills<br><b>Cc:</b><span>=A0</span><a href=3D"mail=
to:oauth@ietf.org" target=3D"_blank">oauth@ietf.org</a> WG<br><b>Subject:</=
b><span>=A0</span>Re: [OAUTH-WG] Why OAuth it self is not an authentication=
 framework ?</span><span><u></u><u></u></span></div>
</div><div><div style=3D"font-size:12pt;font-family:&#39;Times New Roman&#3=
9;,serif;margin:0in 0in 0.0001pt"><span>=A0<u></u><u></u></span></div></div=
><div style=3D"margin-bottom:12pt"><div style=3D"font-size:12pt;font-family=
:&#39;Times New Roman&#39;,serif;margin:0in 0in 0.0001pt">
<span>OIDC seems about the most plausible candidate for a =93good general s=
olution=94 that I=92m aware of. =A0 -T<u></u><u></u></span></div></div><div=
><div><div style=3D"font-size:12pt;font-family:&#39;Times New Roman&#39;,se=
rif;margin:0in 0in 0.0001pt">
<span>On Tue, Feb 5, 2013 at 1:22 PM, William Mills &lt;<a href=3D"mailto:w=
mills_92105@yahoo.com" style=3D"color:purple;text-decoration:underline" tar=
get=3D"_blank">wmills_92105@yahoo.com</a>&gt; wrote:<u></u><u></u></span></=
div>
</div><div><div><div style=3D"font-size:12pt;font-family:&#39;Times New Rom=
an&#39;,serif;margin:0in 0in 0.0001pt"><span>There are some specific design=
 mis-matches for OAuth as an authentication protocol, it&#39;s not what it&=
#39;s designed for and there are some problems you will run into. =A0Some h=
ave used it as such, but it&#39;s not a good general solution.<u></u><u></u=
></span></div>
</div><div><div style=3D"font-size:12pt;font-family:&#39;Times New Roman&#3=
9;,serif;margin:0in 0in 0.0001pt"><span>=A0<u></u><u></u></span></div></div=
><div><div style=3D"font-size:12pt;font-family:&#39;Times New Roman&#39;,se=
rif;margin:0in 0in 0.0001pt">
<span>-bill<u></u><u></u></span></div></div><div><div style=3D"font-size:12=
pt;font-family:&#39;Times New Roman&#39;,serif;margin:0in 0in 0.0001pt"><sp=
an>=A0<u></u><u></u></span></div></div><div><div><div class=3D"MsoNormal" a=
lign=3D"center" style=3D"text-align:center;font-size:12pt;font-family:&#39;=
Times New Roman&#39;,serif;margin:0in 0in 0.0001pt;background-repeat:initia=
l initial">
<span><hr size=3D"1" width=3D"100%" align=3D"center"></span></div><div><div=
 style=3D"font-size:12pt;font-family:&#39;Times New Roman&#39;,serif;margin=
:0in 0in 0.0001pt"><b>From:</b><span><span>=A0</span>Paul Madsen &lt;<a hre=
f=3D"mailto:paul.madsen@gmail.com" style=3D"color:purple;text-decoration:un=
derline" target=3D"_blank">paul.madsen@gmail.com</a>&gt;<br>
<b>To:</b><span>=A0</span>John Bradley &lt;<a href=3D"mailto:ve7jtb@ve7jtb.=
com" style=3D"color:purple;text-decoration:underline" target=3D"_blank">ve7=
jtb@ve7jtb.com</a>&gt;<span>=A0</span><br><b>Cc:</b><span>=A0</span>&quot;<=
a href=3D"mailto:oauth@ietf.org" style=3D"color:purple;text-decoration:unde=
rline" target=3D"_blank">oauth@ietf.org</a><span>=A0</span>WG&quot; &lt;<a =
href=3D"mailto:oauth@ietf.org" style=3D"color:purple;text-decoration:underl=
ine" target=3D"_blank">oauth@ietf.org</a>&gt;<span>=A0</span><br>
<b>Sent:</b><span>=A0</span>Tuesday, February 5, 2013 1:12 PM<br><b>Subject=
:</b><span>=A0</span>Re: [OAUTH-WG] Why OAuth it self is not an authenticat=
ion framework ?<u></u><u></u></span></div></div></div><div><div style=3D"fo=
nt-size:12pt;font-family:&#39;Times New Roman&#39;,serif;margin:0in 0in 0.0=
001pt">
<span>=A0<u></u><u></u></span></div></div><div><div><div style=3D"margin-bo=
ttom:12pt"><div style=3D"font-size:12pt;font-family:&#39;Times New Roman&#3=
9;,serif;margin:0in 0in 0.0001pt"><span>why pigeonhole it?<span>=A0</span><=
br><br>
OAuth can be deployed with no authz semantics at all (or at least as little=
 as any authn mechanism), e.g client creds grant type with no scopes<br><br=
>I agree that OAuth is not an *SSO* protocol.<u></u><u></u></span></div>
</div><div><div style=3D"font-size:12pt;font-family:&#39;Times New Roman&#3=
9;,serif;margin:0in 0in 0.0001pt"><span>On 2/5/13 3:36 PM, John Bradley wro=
te:<u></u><u></u></span></div></div></div><blockquote style=3D"margin-top:5=
pt;margin-bottom:5pt">
<div><div><div style=3D"font-size:12pt;font-family:&#39;Times New Roman&#39=
;,serif;margin:0in 0in 0.0001pt"><span>OAuth is an Authorization protocol a=
s many of us have pointed out.<u></u><u></u></span></div></div><div><div st=
yle=3D"font-size:12pt;font-family:&#39;Times New Roman&#39;,serif;margin:0i=
n 0in 0.0001pt">
<span>=A0<u></u><u></u></span></div></div><div><div style=3D"font-size:12pt=
;font-family:&#39;Times New Roman&#39;,serif;margin:0in 0in 0.0001pt"><span=
>The post is largely correct and based on one of mine.<u></u><u></u></span>=
</div>
</div><div><div style=3D"font-size:12pt;font-family:&#39;Times New Roman&#3=
9;,serif;margin:0in 0in 0.0001pt"><span>=A0<u></u><u></u></span></div></div=
><div><div style=3D"font-size:12pt;font-family:&#39;Times New Roman&#39;,se=
rif;margin:0in 0in 0.0001pt">
<span>John B.<u></u><u></u></span></div></div></div><div><div><div style=3D=
"font-size:12pt;font-family:&#39;Times New Roman&#39;,serif;margin:0in 0in =
0.0001pt"><span>=A0<u></u><u></u></span></div></div><div><div><div><div sty=
le=3D"font-size:12pt;font-family:&#39;Times New Roman&#39;,serif;margin:0in=
 0in 0.0001pt">
<span>On 2013-02-05, at 12:52 PM, Prabath Siriwardena &lt;<a href=3D"mailto=
:prabath@wso2.com" style=3D"color:purple;text-decoration:underline" target=
=3D"_blank">prabath@wso2.com</a>&gt; wrote:<u></u><u></u></span></div></div=
><div>
<div style=3D"font-size:12pt;font-family:&#39;Times New Roman&#39;,serif;ma=
rgin:0in 0in 0.0001pt"><span>=A0<u></u><u></u></span></div></div></div><blo=
ckquote style=3D"margin-top:5pt;margin-bottom:5pt"><div><div><div style=3D"=
font-size:12pt;font-family:&#39;Times New Roman&#39;,serif;margin:0in 0in 0=
.0001pt">
<span>FYI and for your comments..<u></u><u></u></span></div></div><div><div=
 style=3D"font-size:12pt;font-family:&#39;Times New Roman&#39;,serif;margin=
:0in 0in 0.0001pt"><span>=A0<u></u><u></u></span></div></div></div><div><di=
v>
<div><div style=3D"font-size:12pt;font-family:&#39;Times New Roman&#39;,ser=
if;margin:0in 0in 0.0001pt"><span><a href=3D"http://blog.facilelogin.com/20=
13/02/why-oauth-it-self-is-not-authentication.html" target=3D"_blank">http:=
//blog.facilelogin.com/2013/02/why-oauth-it-self-is-not-authentication.html=
</a><br clear=3D"all">
<u></u><u></u></span></div></div><div><div style=3D"font-size:12pt;font-fam=
ily:&#39;Times New Roman&#39;,serif;margin:0in 0in 0.0001pt"><span>=A0<u></=
u><u></u></span></div></div><div><div style=3D"font-size:12pt;font-family:&=
#39;Times New Roman&#39;,serif;margin:0in 0in 0.0001pt">
<span>Thanks &amp; Regards,<br>Prabath<u></u><u></u></span></div></div><div=
><div style=3D"font-size:12pt;font-family:&#39;Times New Roman&#39;,serif;m=
argin:0in 0in 0.0001pt"><span>=A0<u></u><u></u></span></div></div></div><di=
v>
<div><div style=3D"margin-bottom:12pt"><div style=3D"font-size:12pt;font-fa=
mily:&#39;Times New Roman&#39;,serif;margin:0in 0in 0.0001pt"><span>Mobile =
:<span>=A0</span></span><span style=3D"color:blue;text-decoration:underline=
"><a href=3D"tel:%2B94%2071%20809%206732" value=3D"+94718096732" target=3D"=
_blank">+94 71 809 6732</a></span><span>=A0<u></u><u></u></span></div>
</div></div><div><div style=3D"font-size:12pt;font-family:&#39;Times New Ro=
man&#39;,serif;margin:0in 0in 0.0001pt"><span><a href=3D"http://blog.facile=
login.com/" target=3D"_blank">http://blog.facilelogin.com/</a><br><a href=
=3D"http://rampartfaq.com/" target=3D"_blank">http://rampartfaq.com/</a><u>=
</u><u></u></span></div>
</div></div></div><div><div style=3D"font-size:12pt;font-family:&#39;Times =
New Roman&#39;,serif;margin:0in 0in 0.0001pt"><span>_______________________=
________________________<br>OAuth mailing list<br><a href=3D"mailto:OAuth@i=
etf.org" style=3D"color:purple;text-decoration:underline" target=3D"_blank"=
>OAuth@ietf.org</a><br>
<a href=3D"https://www.ietf.org/mailman/listinfo/oauth" style=3D"color:purp=
le;text-decoration:underline" target=3D"_blank">https://www.ietf.org/mailma=
n/listinfo/oauth</a><u></u><u></u></span></div></div></blockquote></div><di=
v>
<div style=3D"font-size:12pt;font-family:&#39;Times New Roman&#39;,serif;ma=
rgin:0in 0in 0.0001pt"><span>=A0<u></u><u></u></span></div></div></div><div=
><div style=3D"margin-bottom:12pt"><div style=3D"font-size:12pt;font-family=
:&#39;Times New Roman&#39;,serif;margin:0in 0in 0.0001pt">
<span>=A0<u></u><u></u></span></div></div><pre style=3D"font-size:10pt;font=
-family:&#39;Courier New&#39;,serif;margin:0in 0in 0.0001pt;background-repe=
at:initial initial"><span>_______________________________________________<u=
></u><u></u></span></pre>
<pre style=3D"font-size:10pt;font-family:&#39;Courier New&#39;,serif;margin=
:0in 0in 0.0001pt;background-repeat:initial initial"><span>OAuth mailing li=
st<u></u><u></u></span></pre><pre style=3D"font-size:10pt;font-family:&#39;=
Courier New&#39;,serif;margin:0in 0in 0.0001pt;background-repeat:initial in=
itial">
<span><a href=3D"mailto:OAuth@ietf.org" style=3D"color:purple;text-decorati=
on:underline" target=3D"_blank">OAuth@ietf.org</a><u></u><u></u></span></pr=
e><pre style=3D"font-size:10pt;font-family:&#39;Courier New&#39;,serif;marg=
in:0in 0in 0.0001pt;background-repeat:initial initial">
<span><a href=3D"https://www.ietf.org/mailman/listinfo/oauth" style=3D"colo=
r:purple;text-decoration:underline" target=3D"_blank">https://www.ietf.org/=
mailman/listinfo/oauth</a><u></u><u></u></span></pre></div></blockquote><di=
v>
<div style=3D"font-size:12pt;font-family:&#39;Times New Roman&#39;,serif;ma=
rgin:0in 0in 0.0001pt"><span>=A0<u></u><u></u></span></div></div></div><div=
><div style=3D"margin-bottom:12pt"><p class=3D"MsoNormal" style=3D"font-siz=
e:12pt;font-family:&#39;Times New Roman&#39;,serif;margin:0in 0in 12pt;back=
ground-repeat:initial initial">
<span><br>_______________________________________________<br>OAuth mailing =
list<br><a href=3D"mailto:OAuth@ietf.org" style=3D"color:purple;text-decora=
tion:underline" target=3D"_blank">OAuth@ietf.org</a><br><a href=3D"https://=
www.ietf.org/mailman/listinfo/oauth" style=3D"color:purple;text-decoration:=
underline" target=3D"_blank">https://www.ietf.org/mailman/listinfo/oauth</a=
><u></u><u></u></span></p>
</div></div></div></div><div style=3D"margin-bottom:12pt"><div style=3D"fon=
t-size:12pt;font-family:&#39;Times New Roman&#39;,serif;margin:0in 0in 0.00=
01pt"><span><br>_______________________________________________<br>OAuth ma=
iling list<br>
<a href=3D"mailto:OAuth@ietf.org" style=3D"color:purple;text-decoration:und=
erline" target=3D"_blank">OAuth@ietf.org</a><br><a href=3D"https://www.ietf=
.org/mailman/listinfo/oauth" style=3D"color:purple;text-decoration:underlin=
e" target=3D"_blank">https://www.ietf.org/mailman/listinfo/oauth</a><u></u>=
<u></u></span></div>
</div></div><div><div style=3D"font-size:12pt;font-family:&#39;Times New Ro=
man&#39;,serif;margin:0in 0in 0.0001pt"><span>=A0<u></u><u></u></span></div=
></div></div><p class=3D"MsoNormal" style=3D"font-size:12pt;font-family:&#3=
9;Times New Roman&#39;,serif;margin:0in 0in 12pt;background-repeat:initial =
initial">
<span>=A0</span></p></div></div></div>_____________________________________=
__________<br>OAuth mailing list<br><a href=3D"mailto:OAuth@ietf.org" targe=
t=3D"_blank">OAuth@ietf.org</a><br><a href=3D"https://www.ietf.org/mailman/=
listinfo/oauth" target=3D"_blank">https://www.ietf.org/mailman/listinfo/oau=
th</a></div>
</blockquote></div><br></div></div></div></div><br>________________________=
_______________________<br>
OAuth mailing list<br>
<a href=3D"mailto:OAuth@ietf.org">OAuth@ietf.org</a><br>
<a href=3D"https://www.ietf.org/mailman/listinfo/oauth" target=3D"_blank">h=
ttps://www.ietf.org/mailman/listinfo/oauth</a><br>
<br></blockquote></div><br><br clear=3D"all"><div><br></div>-- <br>Nat Saki=
mura (=3Dnat)<div>Chairman, OpenID Foundation<br><a href=3D"http://nat.saki=
mura.org/" target=3D"_blank">http://nat.sakimura.org/</a><br>@_nat_en</div>
</div>

--f46d0435c24cb888eb04d518a664--

From Michael.Jones@microsoft.com  Wed Feb  6 18:10:21 2013
Return-Path: <Michael.Jones@microsoft.com>
X-Original-To: oauth@ietfa.amsl.com
Delivered-To: oauth@ietfa.amsl.com
Received: from localhost (localhost [127.0.0.1]) by ietfa.amsl.com (Postfix) with ESMTP id 1181D21F84F2 for <oauth@ietfa.amsl.com>; Wed,  6 Feb 2013 18:10:21 -0800 (PST)
X-Virus-Scanned: amavisd-new at amsl.com
X-Spam-Flag: NO
X-Spam-Score: -2.599
X-Spam-Level: 
X-Spam-Status: No, score=-2.599 tagged_above=-999 required=5 tests=[AWL=0.000,  BAYES_00=-2.599]
Received: from mail.ietf.org ([64.170.98.30]) by localhost (ietfa.amsl.com [127.0.0.1]) (amavisd-new, port 10024) with ESMTP id uOe0ECDAq-b2 for <oauth@ietfa.amsl.com>; Wed,  6 Feb 2013 18:10:20 -0800 (PST)
Received: from na01-by2-obe.outbound.protection.outlook.com (na01-by2-obe.ptr.protection.outlook.com [207.46.100.31]) by ietfa.amsl.com (Postfix) with ESMTP id 044E521F84ED for <oauth@ietf.org>; Wed,  6 Feb 2013 18:10:19 -0800 (PST)
Received: from BL2FFO11FD005.protection.gbl (10.173.161.201) by BL2FFO11HUB015.protection.gbl (10.173.160.107) with Microsoft SMTP Server (TLS) id 15.0.609.9; Thu, 7 Feb 2013 02:10:16 +0000
Received: from TK5EX14HUBC104.redmond.corp.microsoft.com (131.107.125.37) by BL2FFO11FD005.mail.protection.outlook.com (10.173.161.1) with Microsoft SMTP Server (TLS) id 15.0.609.9 via Frontend Transport; Thu, 7 Feb 2013 02:10:16 +0000
Received: from TK5EX14MBXC284.redmond.corp.microsoft.com ([169.254.1.132]) by TK5EX14HUBC104.redmond.corp.microsoft.com ([157.54.80.25]) with mapi id 14.02.0318.003; Thu, 7 Feb 2013 02:09:55 +0000
From: Mike Jones <Michael.Jones@microsoft.com>
To: Justin Richer <jricher@mitre.org>, "oauth@ietf.org" <oauth@ietf.org>
Thread-Topic: [OAUTH-WG] I-D Action: draft-ietf-oauth-dyn-reg-05.txt
Thread-Index: AQHOBKbqNr9jMiD4C0es77r/sOJcE5htSY+AgABS7aA=
Date: Thu, 7 Feb 2013 02:09:55 +0000
Message-ID: <4E1F6AAD24975D4BA5B168042967394367418E35@TK5EX14MBXC284.redmond.corp.microsoft.com>
References: <20130206201534.13236.6681.idtracker@ietfa.amsl.com> <5112BE73.2070003@mitre.org>
In-Reply-To: <5112BE73.2070003@mitre.org>
Accept-Language: en-US
Content-Language: en-US
X-MS-Has-Attach: 
X-MS-TNEF-Correlator: 
x-originating-ip: [157.54.51.35]
Content-Type: text/plain; charset="us-ascii"
Content-Transfer-Encoding: quoted-printable
MIME-Version: 1.0
X-Forefront-Antispam-Report: CIP:131.107.125.37; CTRY:US; IPV:CAL; IPV:NLI; EFV:NLI; SFV:NSPM; SFS:(479174001)(377454001)(377424002)(52604002)(51704002)(13464002)(51444002)(54164002)(189002)(24454001)(199002)(33656001)(54356001)(77982001)(47446002)(59766001)(74502001)(79102001)(46102001)(65816001)(74662001)(66066001)(46406002)(47776003)(53806001)(16406001)(56816002)(80022001)(47736001)(44976002)(56776001)(54316002)(23726001)(55846006)(76482001)(15202345001)(50986001)(31966008)(47976001)(49866001)(20776003)(63696002)(4396001)(5343655001)(51856001)(50466001); DIR:OUT; SFP:; SCL:1; SRVR:BL2FFO11HUB015; H:TK5EX14HUBC104.redmond.corp.microsoft.com; RD:ErrorRetry; MX:1; A:1; LANG:en; 
X-OriginatorOrg: microsoft.onmicrosoft.com
X-Forefront-PRVS: 0750463DC9
Subject: Re: [OAUTH-WG] I-D Action: draft-ietf-oauth-dyn-reg-05.txt
X-BeenThere: oauth@ietf.org
X-Mailman-Version: 2.1.12
Precedence: list
List-Id: OAUTH WG <oauth.ietf.org>
List-Unsubscribe: <https://www.ietf.org/mailman/options/oauth>, <mailto:oauth-request@ietf.org?subject=unsubscribe>
List-Archive: <http://www.ietf.org/mail-archive/web/oauth>
List-Post: <mailto:oauth@ietf.org>
List-Help: <mailto:oauth-request@ietf.org?subject=help>
List-Subscribe: <https://www.ietf.org/mailman/listinfo/oauth>, <mailto:oauth-request@ietf.org?subject=subscribe>
X-List-Received-Date: Thu, 07 Feb 2013 02:10:21 -0000

Hi Justin,

Thanks for working to make progress on the OAuth Registration draft.  Readi=
ng through the changes, it seems to me that a number of changes were made t=
hat there wasn't yet working consensus for - in fact, some of which I don't=
 recall being discussed by the working group at all.  These changes include=
:

  - Splitting the registration endpoint into multiple endpoints
  - Changing from form-encoded to JSON registration representation
  - Adding Get and Delete operations
  - Adding the Self URI concept and representation

My point is separate from whether some of those changes might be good ideas=
.  (Some may be.)  I would hope that in the future, before changes are made=
 to working group drafts, that sufficient time will be first be given to th=
e working group to adequately discuss them and come to agreement on them.

				Thank you,
				-- Mike

-----Original Message-----
From: oauth-bounces@ietf.org [mailto:oauth-bounces@ietf.org] On Behalf Of J=
ustin Richer
Sent: Wednesday, February 06, 2013 12:35 PM
To: oauth@ietf.org
Subject: Re: [OAUTH-WG] I-D Action: draft-ietf-oauth-dyn-reg-05.txt

Thanks to all of the discussion over the last few weeks and some key input =
from Nat Sakimura, Eve Maler, and others, I've put out a revision of the Dy=
nReg specification that is a major change from recent revisions, but actual=
ly brings it back closer to the original -01 draft.=20
The "operation" parameter is now gone and there are instead several logical=
 endpoints for different kinds of operations. These endpoints are communica=
ted to the client through a well-defined link structure.

It basically works like this:

1. client shows up at the Client Registration Endpoint, posts a JSON object=
 with a few bits of metadata about itself (and potentially presents an Acce=
ss Token that it got from some out of band process that acts as a "class re=
gistration" or "developer key", important to several known real-world use c=
ases)

2. client gets back a JSON object filled with whatever metadata the server =
has about it, including a newly-minted client_id and (possibly) client_secr=
et. The client also gets back a registration access token and a fully quali=
fied URL that points to the "update endpoint". This url can take any form (=
the server can't count on the client being able to generate it from parts),=
 but it's recommended that it follow a REST-style URL template of the form =
"https://server/registration_base_url/client_id".

3. client sends updates to this update URL, authenticated by the registrati=
on access token, by PUTting a JSON object with all of its parameters. Any f=
ields the client leaves off the JSON object, the server leaves alone. Anyth=
ing with a "null" value, the server deletes the value. The server remains f=
ree to override *any* field the client requests setting a particular value =
for. The client is not allowed to request a particular value for the client=
_secret or registration_access_token, for obvious reasons -- but see part 7=
 below.

4. The server responds back with the current state of the client as a JSON =
object, including any fields the server has provisioned on the client's beh=
alf (defaults, for instance). Any fields the server has overridden, it curr=
ently MUST respond with. So if the client asks for
"scope: A B C" and the server can only give it "scope: A B", then the serve=
r has to tell that to the client by including the field "scope: A B" in its=
 response.

5. client can send an HTTP GET to the update URL to get its current state a=
s a JSON object as in 4.

6. client can send an HTTP DELETE to the update URL to deprovision itself.

7. there's also a parallel endpoint for rotating the registration access to=
ken and client secret, since these are both security values that are provis=
ioned by the server. There is some open debate of whether the client actual=
ly needs to be able to trigger this operation, or if the server should just=
 do this as part of normal update/get requests to the update endpoint.

It's a major functionality change on the wire, and there's still sawdust on=
 the spec language. By going with a JSON-based data model and a RESTful upd=
ate protocol, we're getting away from core OAuth patterns, but I think that=
 ultimately this can be a good thing. There have been a few proposals that =
would go somewhere between what OAuth does on other endpoints and what a re=
al RESTful system would do, but I didn't see much purpose in going half way=
 when the results would end up *more* complicated.

I request that everyone read it over to see if this will work for their use=
 cases. The idea here remains that application protocols like OIDC and UMA =
would use this mechanism as-is with nearly all customizations in the client=
 metadata table.

I hope that this all actually makes sense...

  -- Justin

On 02/06/2013 03:15 PM, internet-drafts@ietf.org wrote:
> A New Internet-Draft is available from the on-line Internet-Drafts direct=
ories.
>   This draft is a work item of the Web Authorization Protocol Working Gro=
up of the IETF.
>
> 	Title           : OAuth Dynamic Client Registration Protocol
> 	Author(s)       : Justin Richer
>                            John Bradley
>                            Michael B. Jones
>                            Maciej Machulak
> 	Filename        : draft-ietf-oauth-dyn-reg-05.txt
> 	Pages           : 21
> 	Date            : 2013-02-06
>
> Abstract:
>     This specification defines an endpoint and protocol for dynamic
>     registration of OAuth Clients at an Authorization Server.
>
>
> The IETF datatracker status page for this draft is:
> https://datatracker.ietf.org/doc/draft-ietf-oauth-dyn-reg
>
> There's also a htmlized version available at:
> http://tools.ietf.org/html/draft-ietf-oauth-dyn-reg-05
>
> A diff from the previous version is available at:
> http://www.ietf.org/rfcdiff?url2=3Ddraft-ietf-oauth-dyn-reg-05
>
>
> Internet-Drafts are also available by anonymous FTP at:
> ftp://ftp.ietf.org/internet-drafts/
>
> _______________________________________________
> OAuth mailing list
> OAuth@ietf.org
> https://www.ietf.org/mailman/listinfo/oauth

_______________________________________________
OAuth mailing list
OAuth@ietf.org
https://www.ietf.org/mailman/listinfo/oauth

From prabath@wso2.com  Wed Feb  6 19:47:09 2013
Return-Path: <prabath@wso2.com>
X-Original-To: oauth@ietfa.amsl.com
Delivered-To: oauth@ietfa.amsl.com
Received: from localhost (localhost [127.0.0.1]) by ietfa.amsl.com (Postfix) with ESMTP id 69CE721E8049 for <oauth@ietfa.amsl.com>; Wed,  6 Feb 2013 19:47:09 -0800 (PST)
X-Virus-Scanned: amavisd-new at amsl.com
X-Spam-Flag: NO
X-Spam-Score: -2.801
X-Spam-Level: 
X-Spam-Status: No, score=-2.801 tagged_above=-999 required=5 tests=[AWL=0.175,  BAYES_00=-2.599, FM_FORGED_GMAIL=0.622, HTML_MESSAGE=0.001, RCVD_IN_DNSWL_LOW=-1]
Received: from mail.ietf.org ([64.170.98.30]) by localhost (ietfa.amsl.com [127.0.0.1]) (amavisd-new, port 10024) with ESMTP id v4d2aVTm3CDt for <oauth@ietfa.amsl.com>; Wed,  6 Feb 2013 19:47:07 -0800 (PST)
Received: from mail-ee0-f52.google.com (mail-ee0-f52.google.com [74.125.83.52]) by ietfa.amsl.com (Postfix) with ESMTP id 7BD3821E8034 for <oauth@ietf.org>; Wed,  6 Feb 2013 19:47:06 -0800 (PST)
Received: by mail-ee0-f52.google.com with SMTP id b15so1040326eek.11 for <oauth@ietf.org>; Wed, 06 Feb 2013 19:47:05 -0800 (PST)
X-Google-DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=google.com; s=20120113; h=mime-version:x-received:in-reply-to:references:date:message-id :subject:from:to:cc:content-type:x-gm-message-state; bh=pkub1qxZfr6JnmW6a8u2eu5Jeabw5l/acE6mlhMgFCo=; b=J8WpdCSyqlS6prxWrOh9R/GWvJ3xeUT1g/p+d3TyQGBduSG86am0JlPR16u+nKAakl ZWamXs3tpm2akGfI4S0QVtX5YO5ibMZ/ZVmJqsENgvD/L7bydxYVckUNwBI61TZ5Zgox fk+DXs132BV7z/i/yj5mA7iy/ehiMm32uKLJz450d7ro7AScUZFmHZDSjybrsDreFDVf FHV0Mm7PrypTDxXWEBpLwWosrXfBl2UKG4cQ8Q4vVS3Bmt2SpxBEzho7sVGBoxJmcyVO Fwqx+2/pEHFdKPkIwMrVQCMmFph0EjFiPP+RJQPL26MTzn0VsYZo4ydlGZo3FgQhl9Ot M2qQ==
MIME-Version: 1.0
X-Received: by 10.14.202.197 with SMTP id d45mr58932569eeo.1.1360208825032; Wed, 06 Feb 2013 19:47:05 -0800 (PST)
Received: by 10.223.175.134 with HTTP; Wed, 6 Feb 2013 19:47:04 -0800 (PST)
In-Reply-To: <5112AE0B.1080501@mitre.org>
References: <20130206192420.32698.21027.idtracker@ietfa.amsl.com> <5112AE0B.1080501@mitre.org>
Date: Thu, 7 Feb 2013 09:17:04 +0530
Message-ID: <CAJV9qO_8-4FowrXK=ae-+xMjiJFP04ryVMLQ8SGUH8kp3PHrLg@mail.gmail.com>
From: Prabath Siriwardena <prabath@wso2.com>
To: Justin Richer <jricher@mitre.org>
Content-Type: multipart/alternative; boundary=047d7b343b06d61fc704d51a4b4f
X-Gm-Message-State: ALoCoQnEy6hGb15ITVgHThV71NHnlJ/Vta4Sf/Z4GohezNexo0/+1yEc3JcYrJBwqIlo6Ujo2MSS
Cc: "oauth@ietf.org" <oauth@ietf.org>
Subject: Re: [OAUTH-WG] Fwd: New Version Notification for draft-richer-oauth-introspection-02.txt
X-BeenThere: oauth@ietf.org
X-Mailman-Version: 2.1.12
Precedence: list
List-Id: OAUTH WG <oauth.ietf.org>
List-Unsubscribe: <https://www.ietf.org/mailman/options/oauth>, <mailto:oauth-request@ietf.org?subject=unsubscribe>
List-Archive: <http://www.ietf.org/mail-archive/web/oauth>
List-Post: <mailto:oauth@ietf.org>
List-Help: <mailto:oauth-request@ietf.org?subject=help>
List-Subscribe: <https://www.ietf.org/mailman/listinfo/oauth>, <mailto:oauth-request@ietf.org?subject=subscribe>
X-List-Received-Date: Thu, 07 Feb 2013 03:47:09 -0000

--047d7b343b06d61fc704d51a4b4f
Content-Type: text/plain; charset=ISO-8859-1

Hi Justin,

I believe this is addressing one of the key missing part in OAuth 2.0...

One question - I guess this was discussed already...

In the spec - in the introspection response it has the attribute "valid" -
this is basically the validity of the token provided in the request.

Validation criteria depends on the token and well as token type ( Bearer,
MAC..).

In the spec it seems like it's coupled with Bearer token type... But I
guess, by adding "token_type" to the request we can remove this dependency.

WDYT..?

Thanks & regards,
-Prabath

On Thu, Feb 7, 2013 at 12:54 AM, Justin Richer <jricher@mitre.org> wrote:

>  Updated introspection draft based on recent comments. Changes include:
>
>  - "scope" return parameter now follows RFC6749 format instead of JSON
> array
>  - "subject" -> "sub", and "audience" -> "aud", to be parallel with JWT
> claims
>  - clarified what happens if the authentication is bad
>
>  -- Justin
>
>
> -------- Original Message --------  Subject: New Version Notification for
> draft-richer-oauth-introspection-02.txt  Date: Wed, 6 Feb 2013 11:24:20
> -0800  From: <internet-drafts@ietf.org> <internet-drafts@ietf.org>  To:
> <jricher@mitre.org> <jricher@mitre.org>
>
> A new version of I-D, draft-richer-oauth-introspection-02.txt
> has been successfully submitted by Justin Richer and posted to the
> IETF repository.
>
> Filename:	 draft-richer-oauth-introspection
> Revision:	 02
> Title:		 OAuth Token Introspection
> Creation date:	 2013-02-06
> WG ID:		 Individual Submission
> Number of pages: 6
> URL:             http://www.ietf.org/internet-drafts/draft-richer-oauth-introspection-02.txt
> Status:          http://datatracker.ietf.org/doc/draft-richer-oauth-introspection
> Htmlized:        http://tools.ietf.org/html/draft-richer-oauth-introspection-02
> Diff:            http://www.ietf.org/rfcdiff?url2=draft-richer-oauth-introspection-02
>
> Abstract:
>    This specification defines a method for a client or protected
>    resource to query an OAuth authorization server to determine meta-
>    information about an OAuth token.
>
>
>
>
>
> The IETF Secretariat
>
>
>
>
>
> _______________________________________________
> OAuth mailing list
> OAuth@ietf.org
> https://www.ietf.org/mailman/listinfo/oauth
>
>


-- 
Thanks & Regards,
Prabath

Mobile : +94 71 809 6732

http://blog.facilelogin.com
http://RampartFAQ.com

--047d7b343b06d61fc704d51a4b4f
Content-Type: text/html; charset=ISO-8859-1
Content-Transfer-Encoding: quoted-printable

Hi Justin,<div><br></div><div>I believe this is addressing one of the key m=
issing part in OAuth 2.0...</div><div><br></div><div>One question - I guess=
 this was discussed already...</div><div><br></div><div>In the spec - in th=
e introspection response it has the attribute &quot;valid&quot; - this is b=
asically the validity of the token provided in the request.</div>
<div><br></div><div>Validation=A0criteria depends on the token and well as =
token type ( Bearer, MAC..).</div><div><br></div><div>In the spec it seems =
like it&#39;s coupled with Bearer token type... But I guess, by adding &quo=
t;token_type&quot; to the request we can remove this dependency.</div>
<div><br></div><div>WDYT..?</div><div><br></div><div>Thanks &amp; regards,<=
/div><div>-Prabath=A0</div><div><br><div class=3D"gmail_quote">On Thu, Feb =
7, 2013 at 12:54 AM, Justin Richer <span dir=3D"ltr">&lt;<a href=3D"mailto:=
jricher@mitre.org" target=3D"_blank">jricher@mitre.org</a>&gt;</span> wrote=
:<br>
<blockquote class=3D"gmail_quote" style=3D"margin:0 0 0 .8ex;border-left:1p=
x #ccc solid;padding-left:1ex">
 =20

   =20
 =20
  <div bgcolor=3D"#FFFFFF" text=3D"#000000">
    Updated introspection draft based on recent comments. Changes
    include:<br>
    <br>
    =A0- &quot;scope&quot; return parameter now follows RFC6749 format inst=
ead of
    JSON array<br>
    =A0- &quot;subject&quot; -&gt; &quot;sub&quot;, and &quot;audience&quot=
; -&gt; &quot;aud&quot;, to be parallel
    with JWT claims<br>
    =A0- clarified what happens if the authentication is bad<br>
    <br>
    =A0-- Justin<br>
    <div><br>
      <br>
      -------- Original Message --------
      <table border=3D"0" cellpadding=3D"0" cellspacing=3D"0">
        <tbody>
          <tr>
            <th align=3D"RIGHT" nowrap valign=3D"BASELINE">Subject:
            </th>
            <td>New Version Notification for
              draft-richer-oauth-introspection-02.txt</td>
          </tr>
          <tr>
            <th align=3D"RIGHT" nowrap valign=3D"BASELINE">Date: </th>
            <td>Wed, 6 Feb 2013 11:24:20 -0800</td>
          </tr>
          <tr>
            <th align=3D"RIGHT" nowrap valign=3D"BASELINE">From: </th>
            <td><a href=3D"mailto:internet-drafts@ietf.org" target=3D"_blan=
k">&lt;internet-drafts@ietf.org&gt;</a></td>
          </tr>
          <tr>
            <th align=3D"RIGHT" nowrap valign=3D"BASELINE">To: </th>
            <td><a href=3D"mailto:jricher@mitre.org" target=3D"_blank">&lt;=
jricher@mitre.org&gt;</a></td>
          </tr>
        </tbody>
      </table>
      <br>
      <br>
      <pre>A new version of I-D, draft-richer-oauth-introspection-02.txt
has been successfully submitted by Justin Richer and posted to the
IETF repository.

Filename:	 draft-richer-oauth-introspection
Revision:	 02
Title:		 OAuth Token Introspection
Creation date:	 2013-02-06
WG ID:		 Individual Submission
Number of pages: 6
URL:             <a href=3D"http://www.ietf.org/internet-drafts/draft-riche=
r-oauth-introspection-02.txt" target=3D"_blank">http://www.ietf.org/interne=
t-drafts/draft-richer-oauth-introspection-02.txt</a>
Status:          <a href=3D"http://datatracker.ietf.org/doc/draft-richer-oa=
uth-introspection" target=3D"_blank">http://datatracker.ietf.org/doc/draft-=
richer-oauth-introspection</a>
Htmlized:        <a href=3D"http://tools.ietf.org/html/draft-richer-oauth-i=
ntrospection-02" target=3D"_blank">http://tools.ietf.org/html/draft-richer-=
oauth-introspection-02</a>
Diff:            <a href=3D"http://www.ietf.org/rfcdiff?url2=3Ddraft-richer=
-oauth-introspection-02" target=3D"_blank">http://www.ietf.org/rfcdiff?url2=
=3Ddraft-richer-oauth-introspection-02</a>

Abstract:
   This specification defines a method for a client or protected
   resource to query an OAuth authorization server to determine meta-
   information about an OAuth token.


                                                                           =
      =20


The IETF Secretariat

</pre>
      <br>
    </div>
    <br>
  </div>

<br>_______________________________________________<br>
OAuth mailing list<br>
<a href=3D"mailto:OAuth@ietf.org">OAuth@ietf.org</a><br>
<a href=3D"https://www.ietf.org/mailman/listinfo/oauth" target=3D"_blank">h=
ttps://www.ietf.org/mailman/listinfo/oauth</a><br>
<br></blockquote></div><br><br clear=3D"all"><div><br></div>-- <br>Thanks &=
amp; Regards,<br>Prabath<div><br></div><div>Mobile : +94 71 809 6732=A0<br>=
<br><a href=3D"http://blog.facilelogin.com" target=3D"_blank">http://blog.f=
acilelogin.com</a><br>
<a href=3D"http://RampartFAQ.com" target=3D"_blank">http://RampartFAQ.com</=
a></div>
</div>

--047d7b343b06d61fc704d51a4b4f--

From zhou.sujing@zte.com.cn  Wed Feb  6 23:20:29 2013
Return-Path: <zhou.sujing@zte.com.cn>
X-Original-To: oauth@ietfa.amsl.com
Delivered-To: oauth@ietfa.amsl.com
Received: from localhost (localhost [127.0.0.1]) by ietfa.amsl.com (Postfix) with ESMTP id 87A6521F868B; Wed,  6 Feb 2013 23:20:29 -0800 (PST)
X-Virus-Scanned: amavisd-new at amsl.com
X-Spam-Flag: NO
X-Spam-Score: -98.395
X-Spam-Level: 
X-Spam-Status: No, score=-98.395 tagged_above=-999 required=5 tests=[BAYES_00=-2.599, HTML_MESSAGE=0.001, MIME_BASE64_TEXT=1.753, MIME_CHARSET_FARAWAY=2.45, USER_IN_WHITELIST=-100]
Received: from mail.ietf.org ([64.170.98.30]) by localhost (ietfa.amsl.com [127.0.0.1]) (amavisd-new, port 10024) with ESMTP id V2kHH6fhXwXD; Wed,  6 Feb 2013 23:20:28 -0800 (PST)
Received: from zte.com.cn (mx6.zte.com.cn [95.130.199.165]) by ietfa.amsl.com (Postfix) with ESMTP id 931C521F8684; Wed,  6 Feb 2013 23:20:27 -0800 (PST)
Received: from zte.com.cn (unknown [192.168.168.119]) by Websense Email Security Gateway with ESMTP id 748DD192AE99; Thu,  7 Feb 2013 15:19:57 +0800 (CST)
Received: from mse01.zte.com.cn (unknown [10.30.3.20]) by Websense Email Security Gateway with ESMTPS id D4278174A4C3; Thu,  7 Feb 2013 15:20:04 +0800 (CST)
Received: from notes_smtp.zte.com.cn ([10.30.1.239]) by mse01.zte.com.cn with ESMTP id r177JxID084759; Thu, 7 Feb 2013 15:19:59 +0800 (GMT-8) (envelope-from zhou.sujing@zte.com.cn)
In-Reply-To: <CAJV9qO8oW=5nTVH2YpotL0ZUfJaX31GHJoZXeFyntkdnKHhGRw@mail.gmail.com>
To: Prabath Siriwardena <prabath@wso2.com>
MIME-Version: 1.0
X-Mailer: Lotus Notes Release 6.5.6 March 06, 2007
Message-ID: <OF2900504B.C8F8626A-ON48257B0B.00282556-48257B0B.0028506D@zte.com.cn>
From: zhou.sujing@zte.com.cn
Date: Thu, 7 Feb 2013 15:19:48 +0800
X-MIMETrack: Serialize by Router on notes_smtp/zte_ltd(Release 8.5.3FP1 HF212|May 23, 2012) at 2013-02-07 15:19:54, Serialize complete at 2013-02-07 15:19:54
Content-Type: multipart/alternative; boundary="=_alternative 0028506D48257B0B_="
X-MAIL: mse01.zte.com.cn r177JxID084759
Cc: "oauth@ietf.org WG" <oauth@ietf.org>, "oauth-bounces@ietf.org" <oauth-bounces@ietf.org>
Subject: Re: [OAUTH-WG] A question on token revocation.
X-BeenThere: oauth@ietf.org
X-Mailman-Version: 2.1.12
Precedence: list
List-Id: OAUTH WG <oauth.ietf.org>
List-Unsubscribe: <https://www.ietf.org/mailman/options/oauth>, <mailto:oauth-request@ietf.org?subject=unsubscribe>
List-Archive: <http://www.ietf.org/mail-archive/web/oauth>
List-Post: <mailto:oauth@ietf.org>
List-Help: <mailto:oauth-request@ietf.org?subject=help>
List-Subscribe: <https://www.ietf.org/mailman/listinfo/oauth>, <mailto:oauth-request@ietf.org?subject=subscribe>
X-List-Received-Date: Thu, 07 Feb 2013 07:20:29 -0000

This is a multipart message in MIME format.
--=_alternative 0028506D48257B0B_=
Content-Type: text/plain; charset="GB2312"
Content-Transfer-Encoding: base64
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--=_alternative 0028506D48257B0B_=
Content-Type: text/html; charset="UTF-8"
Content-Transfer-Encoding: base64
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--=_alternative 0028506D48257B0B_=--

From prabath@wso2.com  Wed Feb  6 23:25:05 2013
Return-Path: <prabath@wso2.com>
X-Original-To: oauth@ietfa.amsl.com
Delivered-To: oauth@ietfa.amsl.com
Received: from localhost (localhost [127.0.0.1]) by ietfa.amsl.com (Postfix) with ESMTP id AF86C21F871D for <oauth@ietfa.amsl.com>; Wed,  6 Feb 2013 23:25:05 -0800 (PST)
X-Virus-Scanned: amavisd-new at amsl.com
X-Spam-Flag: NO
X-Spam-Score: -1.388
X-Spam-Level: 
X-Spam-Status: No, score=-1.388 tagged_above=-999 required=5 tests=[AWL=-0.862, BAYES_00=-2.599, FM_FORGED_GMAIL=0.622, HTML_MESSAGE=0.001, MIME_CHARSET_FARAWAY=2.45, RCVD_IN_DNSWL_LOW=-1]
Received: from mail.ietf.org ([64.170.98.30]) by localhost (ietfa.amsl.com [127.0.0.1]) (amavisd-new, port 10024) with ESMTP id f6Kc+j8qJlBy for <oauth@ietfa.amsl.com>; Wed,  6 Feb 2013 23:25:04 -0800 (PST)
Received: from mail-ea0-f174.google.com (mail-ea0-f174.google.com [209.85.215.174]) by ietfa.amsl.com (Postfix) with ESMTP id 8C7B321F8715 for <oauth@ietf.org>; Wed,  6 Feb 2013 23:25:03 -0800 (PST)
Received: by mail-ea0-f174.google.com with SMTP id 1so985929eaa.33 for <oauth@ietf.org>; Wed, 06 Feb 2013 23:25:02 -0800 (PST)
X-Google-DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=google.com; s=20120113; h=mime-version:x-received:in-reply-to:references:date:message-id :subject:from:to:cc:content-type:x-gm-message-state; bh=ut/eoFgW+xm3i6SPW8i6XOhTC72LCYYyUoZVo/Rm8RY=; b=eeXuzX3zg9Nao4E59yvGiDWeF9QcXL8Me8KiEBHQPUgfs4y73kleDYELARm17Akk5G /OIQMWSOuVnUdAHpXbE3YZIoB9GJ90zYJd+HQr4NSejOPBXqGYrcdry/TXcWWfSdwc/u WBuGIWQuTKseJkHR/Dbt/5geAg8CWM3qr3xfX767Y5m6TXpci8RNNNN9zZ2PTD3vVBrr Y2mkvpI9GxG1gto9l/4+Mo8NEUNtVCkoMz4leEMdZsFxj2120ue1RwYSgRUE6Mkioav4 NimXzwyY5JB3GNh3TkValPmUZxldCwsUtO1QtUm9AMzSbYypqIhAf6/kru0BrV7kugkd KlKA==
MIME-Version: 1.0
X-Received: by 10.14.202.197 with SMTP id d45mr1481803eeo.1.1360221902365; Wed, 06 Feb 2013 23:25:02 -0800 (PST)
Received: by 10.223.175.134 with HTTP; Wed, 6 Feb 2013 23:25:02 -0800 (PST)
In-Reply-To: <OF2900504B.C8F8626A-ON48257B0B.00282556-48257B0B.0028506D@zte.com.cn>
References: <CAJV9qO8oW=5nTVH2YpotL0ZUfJaX31GHJoZXeFyntkdnKHhGRw@mail.gmail.com> <OF2900504B.C8F8626A-ON48257B0B.00282556-48257B0B.0028506D@zte.com.cn>
Date: Thu, 7 Feb 2013 12:55:02 +0530
Message-ID: <CAJV9qO_bvPYNioB0yOr0Qo6MgOPTjmMAn4at_YbXzqVPTgkxTg@mail.gmail.com>
From: Prabath Siriwardena <prabath@wso2.com>
To: zhou.sujing@zte.com.cn
Content-Type: multipart/alternative; boundary=047d7b343b064e620f04d51d574c
X-Gm-Message-State: ALoCoQlXz/3KNboYx6DCD4bdWB9e+7VrJqzLkouUuYxq+XsmzXwqrAP0W+HBUWL+0z2ugkpnfE4p
Cc: "oauth@ietf.org WG" <oauth@ietf.org>, "oauth-bounces@ietf.org" <oauth-bounces@ietf.org>
Subject: Re: [OAUTH-WG] A question on token revocation.
X-BeenThere: oauth@ietf.org
X-Mailman-Version: 2.1.12
Precedence: list
List-Id: OAUTH WG <oauth.ietf.org>
List-Unsubscribe: <https://www.ietf.org/mailman/options/oauth>, <mailto:oauth-request@ietf.org?subject=unsubscribe>
List-Archive: <http://www.ietf.org/mail-archive/web/oauth>
List-Post: <mailto:oauth@ietf.org>
List-Help: <mailto:oauth-request@ietf.org?subject=help>
List-Subscribe: <https://www.ietf.org/mailman/listinfo/oauth>, <mailto:oauth-request@ietf.org?subject=subscribe>
X-List-Received-Date: Thu, 07 Feb 2013 07:25:05 -0000

--047d7b343b064e620f04d51d574c
Content-Type: text/plain; charset=GB2312
Content-Transfer-Encoding: quoted-printable

On Thu, Feb 7, 2013 at 12:49 PM, <zhou.sujing@zte.com.cn> wrote:

>
> I guess RO could initiate access token revocation for a client by
> including authorization code in the request to AS.
> Comments?


That creates a dependency on the grant type.

Thanks & regards,
-Prabath


>
>
>
>
> oauth-bounces@ietf.org =D0=B4=D3=DA 2013-02-07 02:32:28:
>
> > Hi Torsten,
> >
> > Thanks for your feedback.. I will submit a draft...
> >
> > Thanks & regards,
> > -Prabath
>
> > On Wed, Feb 6, 2013 at 11:55 PM, Torsten Lodderstedt <
> torsten@lodderstedt.net
> > > wrote:
> > Hi Prabath,
> >
> > we tried to address both use cases in the first revisions of the
> > draft. The API was well suited for client-driven revocation but not
> > the resource owner - driven use case. There are definitely
> > differences with respect to the protocol design, at least regarding
> > authentication and authorization of the respective actors. This made
> > the spec more complex and caused ambiguities and confusion.
> > Moreover, the working group seemed not convinced by the the latter use
> case.
> >
> > Therefore the working group decided to focus on the single use cases
> > of the revocation by clients. This makes a lot of sense since this
> > interface is most important with respect to interoperability.
> >
> > I'm focusing right now on finishing this draft. And the open issues
> > discussed on the list in the last couple of weeks illustrate that
> > even this poses a considerable amount of work. So I'm very reluctant
> > to add support for a whole new use case at that point of the process.
> >
> > If you feel this is an important use case worth an RFC, don't
> > hesitate to publish a new I-D.
> >
> > regards,
> > Torsten.
> >
> > Am 06.02.2013 um 16:37 schrieb Prabath Siriwardena <prabath@wso2.com>:
>
> >
>
> > On Wed, Feb 6, 2013 at 9:04 PM, Todd W Lainhart <lainhart@us.ibm.com>
> wrote:
> > > Resource owner needs to know the consumer key (represents the
> > OAuth Client app) & scope to revoke the access token for a given
> client.
>
> > I see - you're saying that requiring client credentials on the end
> > point is the problem?
> >
> > In fact what I meant was - when RO authorizes the an access token
> > for client for particular scope. Those information are kept at the AS.
> >
> > Now - if the RO want to revoke access from the client - the RO needs
> > to authenticate him self to the AS and pass the consumer key and the
> > scope. So AS can revoke access.
> >
> > Thanks & regards,
> > -Prabath
> >
> >
> >
> >
> >
> > Todd Lainhart
> > Rational software
> > IBM Corporation
> > 550 King Street, Littleton, MA 01460-1250
> > 1-978-899-4705
> > 2-276-4705 (T/L)
> > lainhart@us.ibm.com
> >
> >
> >
> >
> >
>
> > From:        Prabath Siriwardena <prabath@wso2.com>
> > To:        Justin Richer <jricher@mitre.org>,
> > Cc:        "oauth@ietf.org WG" <oauth@ietf.org>
> > Date:        02/06/2013 10:31 AM
> > Subject:        Re: [OAUTH-WG] A question on token revocation.
> > Sent by:        oauth-bounces@ietf.org
> >
> >
> >
> >
>
> > On Wed, Feb 6, 2013 at 8:49 PM, Justin Richer <jricher@mitre.org>
> wrote:
> >
> > On 02/06/2013 10:13 AM, Prabath Siriwardena wrote:
> >
> >
> > On Wed, Feb 6, 2013 at 8:19 PM, Justin Richer <jricher@mitre.org>
> wrote:
> > These are generally handled through a user interface where the RO is
> > authenticated directly to the AS, and there's not much need for a
> > "protocol" here, in practice.
> >
> > Why do you think leaving access token revocation by RO to a
> > proprietary API is a good practice ? IMO this an essential
> > requirement in API security.
> > I think it makes more sense in the same way that having a
> > "proprietary" UI/API for managing the user consent makes sense:
> > unless you're doing a fully dynamic end-to-end system like UMA, then
> > there's not much value in trying to squeeze disparate systems into
> > the same mold, since they won't be talking to each other anyway.
> >
> > This is required in distributed setup for each API platform from
> > different vendors to perform in an interop manner.
> >
> >
> > And since you refer to it as an "API", what will the RO be using to
> > call this API? Is there a token management client that's separate
> > from the OAuth client?
> >
> > I didn't get your question right... If you meant the how to invoke
> > revocation end point, the the resource owner needs to know the
> > consumer key (represents the OAuth Client app) & scope to revoke the
> > access token for a given client.
> >
> >
> >
> > IMHO token revocation done my RO is more practical than token
> > revocation done by the Client.
> > They're both valid but require different kinds of protocols and
> > considerations. This token revocation draft is meant to solve one
> > problem, and that doesn't mean it can or should solve other
> > seemingly related problems.
> >
> > If you would like to see the RO-initiated token revocation go
> > through (not grant revocation, mind you -- that's related, but
> > different), then I would suggest that you start specifying exactly
> > how that works. I predict it will be problematic in practice,
> > though, as the RO often doesn't actually have direct access to the
> > token itself.
> >
> > Resource owner needs to know the consumer key (represents the OAuth
> > Client app) & scope to revoke the access token for a given client.
> >
> >
> >
> >
> > There are larger applications, like UMA, that have client and PR
> > provisioning that would allow for this to be managed somewhat
> > programmatically, but even in that case you're still generally doing
> > token revocation by a "client" in some fashion. In UMA, though,
> > several different pieces can play the role of a "client" at
> > different parts of the process.
> >
> > Revoking a scope is a whole different mess. Generally, you'd want to
> > just revoke an existing token and make a new authorization grant
> > with lower access if you don't want that client getting that scope
> > anymore. If you just want to downscope for a single transaction, you
> > can already do that with either the refresh token or token chaining
> > approaches, depending on where in the process you are. The latter of
> > these are both client-focused, though, and the RO doesn't have a
> > direct hand in it at this point.
> >
> > Why do you think it a mess. If you revoke the entire token then
> > Client needs to go through the complete OAuth flow - and also needs
> > to get the user consent. If RO can  downgrade the scope, then we
> > restrict API access by the client at RS end and its transparent to
> > the client.
> >
> >
> > Downgrading the scope of tokens in the wild is hardly transparent to
> > the client (stuff that it expects to work will suddenly start to
> > fail, meaning that most clients will throw out the token and try to
> > get a new one), and in a distributed system you've got to propagate
> > that change to the RS. If you bake the scopes into the token itself
> > (which many do) then you actually *can't* downgrade a single token,
> anyway.
> >
> > Yes.. that is the expected behavior. I mean the process is
> > transparent. Client will notice at runtime.
> >
> > Thanks & regards,
> > -Prabath
> >
> >
> >  -- Justin
> >
> >
> > Thanks & regards,
> > -Prabath
> >
> >
> >
> >  -- Justin
> >
> >
> > On 02/06/2013 04:35 AM, Prabath Siriwardena wrote:
> > I am sorry if this was already discussed in this list..
> >
> > Looking at [1] it only talks about revoking the access token from the
> client.
> >
> > How about the resource owner..?
> >
> > There can be cases where resource owner needs to revoke an
> > authorized access token from a given client. Or revoke an scope..
> >
> > How are we going to address these requirements..? Thoughts
> appreciated...
> >
> > [1] http://tools.ietf.org/html/draft-ietf-oauth-revocation-04
> >
> > --
> > Thanks & Regards,
> > Prabath
> >
> > Mobile : +94 71 809 6732
> >
> > http://blog.facilelogin.com
> > http://RampartFAQ.com
> >
> >
> > _______________________________________________
> > OAuth mailing list
> > OAuth@ietf.org
> > https://www.ietf.org/mailman/listinfo/oauth
> >
> >
> >
> >
> >
> > --
> > Thanks & Regards,
> > Prabath
> >
> > Mobile : +94 71 809 6732
> >
> > http://blog.facilelogin.com
> > http://RampartFAQ.com
> >
> >
> >
> >
> > --
> > Thanks & Regards,
> > Prabath
> >
> > Mobile : +94 71 809 6732
> >
> > http://blog.facilelogin.com
> > http://RampartFAQ.com_______________________________________________
> > OAuth mailing list
> > OAuth@ietf.org
> > https://www.ietf.org/mailman/listinfo/oauth
>
> >
>
> >
> > --
> > Thanks & Regards,
> > Prabath
> >
> > Mobile : +94 71 809 6732
> >
> > http://blog.facilelogin.com
> > http://RampartFAQ.com
> > _______________________________________________
> > OAuth mailing list
> > OAuth@ietf.org
> > https://www.ietf.org/mailman/listinfo/oauth
> >
>
> >
> > --
> > Thanks & Regards,
> > Prabath
> >
> > Mobile : +94 71 809 6732
> >
> > http://blog.facilelogin.com
> > http://RampartFAQ.com_______________________________________________
> > OAuth mailing list
> > OAuth@ietf.org
> > https://www.ietf.org/mailman/listinfo/oauth
>



--=20
Thanks & Regards,
Prabath

Mobile : +94 71 809 6732

http://blog.facilelogin.com
http://RampartFAQ.com

--047d7b343b064e620f04d51d574c
Content-Type: text/html; charset=GB2312
Content-Transfer-Encoding: quoted-printable

<br><br><div class=3D"gmail_quote">On Thu, Feb 7, 2013 at 12:49 PM,  <span =
dir=3D"ltr">&lt;<a href=3D"mailto:zhou.sujing@zte.com.cn" target=3D"_blank"=
>zhou.sujing@zte.com.cn</a>&gt;</span> wrote:<br><blockquote class=3D"gmail=
_quote" style=3D"margin:0 0 0 .8ex;border-left:1px #ccc solid;padding-left:=
1ex">

<br><font face=3D"sans-serif">I guess RO could initiate access token
revocation for a client by including authorization code in the request
to AS.</font>
<br><font face=3D"sans-serif">Comments? </font></blockquote><div><br></div>=
<div>That creates a dependency on the grant type.</div><div><br></div><div>=
Thanks &amp; regards,</div><div>-Prabath</div><div>&nbsp;</div><blockquote =
class=3D"gmail_quote" style=3D"margin:0 0 0 .8ex;border-left:1px #ccc solid=
;padding-left:1ex">

<br>
<br>
<br>
<br><tt><font><a href=3D"mailto:oauth-bounces@ietf.org" target=3D"_blank">o=
auth-bounces@ietf.org</a> =D0=B4=D3=DA 2013-02-07 02:32:28:<br>
<br>
&gt; Hi&nbsp;Torsten,</font></tt>
<br><div class=3D"HOEnZb"><div class=3D"h5"><tt><font>&gt; <br>
&gt; Thanks for your feedback.. I will submit a draft...</font></tt>
<br><tt><font>&gt; <br>
&gt; Thanks &amp; regards,</font></tt>
<br><tt><font>&gt; -Prabath<br>
</font></tt>
<br><tt><font>&gt; On Wed, Feb 6, 2013 at 11:55 PM, Torsten Lodderstedt
&lt;<a href=3D"mailto:torsten@lodderstedt.net" target=3D"_blank">torsten@lo=
dderstedt.net</a><br>
&gt; &gt; wrote:</font></tt>
<br><tt><font>&gt; Hi Prabath,</font></tt>
<br><tt><font>&gt; <br>
&gt; we tried to address both use cases in the first revisions of the <br>
&gt; draft. The API was well suited for client-driven revocation but not
<br>
&gt; the resource owner - driven use case. There are definitely <br>
&gt; differences with respect to the protocol design, at least regarding
<br>
&gt; authentication and authorization of the respective actors.&nbsp;This
made<br>
&gt; the spec more complex and&nbsp;caused ambiguities and confusion. <br>
&gt; Moreover, the working group seemed not convinced by the the latter
use case.</font></tt>
<br><tt><font>&gt; <br>
&gt; Therefore the working group decided to focus on the single use cases<b=
r>
&gt; of the revocation by clients. This makes a lot of sense since this
<br>
&gt; interface is most important with respect to interoperability.</font></=
tt>
<br><tt><font>&gt; <br>
&gt; I&#39;m focusing right now on finishing this draft. And the open issue=
s
<br>
&gt; discussed on the list in the last couple of weeks illustrate that
<br>
&gt; even this poses a considerable amount of work. So I&#39;m very relucta=
nt<br>
&gt; to add support for a whole new use case at that point of the process.<=
/font></tt>
<br><tt><font>&gt; <br>
&gt; If you feel this is an important use case worth an RFC, don&#39;t <br>
&gt; hesitate to publish a new I-D.</font></tt>
<br><tt><font>&gt; <br>
&gt; regards,</font></tt>
<br><tt><font>&gt; Torsten.</font></tt>
<br><tt><font>&gt; <br>
&gt; Am 06.02.2013 um 16:37 schrieb Prabath Siriwardena &lt;<a href=3D"mail=
to:prabath@wso2.com" target=3D"_blank">prabath@wso2.com</a>&gt;:<br>
</font></tt>
<br><tt><font>&gt; <br>
</font></tt>
<br><tt><font>&gt; On Wed, Feb 6, 2013 at 9:04 PM, Todd W Lainhart
&lt;<a href=3D"mailto:lainhart@us.ibm.com" target=3D"_blank">lainhart@us.ib=
m.com</a>&gt; wrote:</font></tt>
<br><tt><font>&gt; &gt; Resource owner needs to know the consumer
key (represents the <br>
&gt; OAuth Client app) &amp; scope to revoke the access token for a given
client.&nbsp; <br>
</font></tt>
<br><tt><font>&gt; I see - you&#39;re saying that requiring client credenti=
als
on the end <br>
&gt; point is the problem?</font></tt>
<br><tt><font>&gt; <br>
&gt; In fact what I meant was - when RO authorizes the an access token
<br>
&gt; for client for particular scope. Those information are kept at the
AS.</font></tt>
<br><tt><font>&gt; <br>
&gt; Now - if the RO want to revoke access from the client - the RO needs<b=
r>
&gt; to authenticate him self to the AS and pass the consumer key and the<b=
r>
&gt; scope. So AS can revoke access.</font></tt>
<br><tt><font>&gt; <br>
&gt; Thanks &amp; regards,</font></tt>
<br><tt><font>&gt; -Prabath</font></tt>
<br><tt><font>&gt; &nbsp;</font></tt>
<br><tt><font>&gt; <br>
&gt; <br>
&gt; <br>
&gt; <br>
&gt; Todd Lainhart<br>
&gt; Rational software<br>
&gt; IBM Corporation<br>
&gt; 550 King Street, Littleton, MA 01460-1250<br>
&gt; 1-978-899-4705<br>
&gt; 2-276-4705 (T/L)<br>
&gt; <a href=3D"mailto:lainhart@us.ibm.com" target=3D"_blank">lainhart@us.i=
bm.com</a></font></tt>
<br><tt><font>&gt; <br>
&gt; <br>
&gt; <br>
&gt; <br>
&gt; <br>
</font></tt>
<br><tt><font>&gt; From: &nbsp; &nbsp; &nbsp; &nbsp;Prabath Siriwardena
&lt;<a href=3D"mailto:prabath@wso2.com" target=3D"_blank">prabath@wso2.com<=
/a>&gt; <br>
&gt; To: &nbsp; &nbsp; &nbsp; &nbsp;Justin Richer &lt;<a href=3D"mailto:jri=
cher@mitre.org" target=3D"_blank">jricher@mitre.org</a>&gt;,
<br>
&gt; Cc: &nbsp; &nbsp; &nbsp; &nbsp;&quot;<a href=3D"mailto:oauth@ietf.org"=
 target=3D"_blank">oauth@ietf.org</a> WG&quot; &lt;<a href=3D"mailto:oauth@=
ietf.org" target=3D"_blank">oauth@ietf.org</a>&gt;
<br>
&gt; Date: &nbsp; &nbsp; &nbsp; &nbsp;02/06/2013 10:31 AM </font></tt>
<br><tt><font>&gt; Subject: &nbsp; &nbsp; &nbsp; &nbsp;Re: [OAUTH-WG]
A question on token revocation. <br>
&gt; Sent by: &nbsp; &nbsp; &nbsp; &nbsp;<a href=3D"mailto:oauth-bounces@ie=
tf.org" target=3D"_blank">oauth-bounces@ietf.org</a> <br>
&gt; <br>
&gt; <br>
&gt; <br>
&gt; <br>
</font></tt>
<br></div></div><div class=3D"HOEnZb"><div class=3D"h5"><tt><font>&gt; On W=
ed, Feb 6, 2013 at 8:49 PM, Justin Richer
&lt;<a href=3D"mailto:jricher@mitre.org" target=3D"_blank">jricher@mitre.or=
g</a>&gt; wrote: <br>
&gt; <br>
&gt; On 02/06/2013 10:13 AM, Prabath Siriwardena wrote: <br>
&gt; <br>
&gt; <br>
&gt; On Wed, Feb 6, 2013 at 8:19 PM, Justin Richer &lt;<a href=3D"mailto:jr=
icher@mitre.org" target=3D"_blank">jricher@mitre.org</a>&gt;
wrote: <br>
&gt; These are generally handled through a user interface where the RO
is<br>
&gt; authenticated directly to the AS, and there&#39;s not much need for a
<br>
&gt; &quot;protocol&quot; here, in practice. <br>
&gt; <br>
&gt; Why do you think leaving access token revocation by RO to a <br>
&gt; proprietary API is a good practice ? IMO this an essential <br>
&gt; requirement in API security. <br>
&gt; I think it makes more sense in the same way that having a <br>
&gt; &quot;proprietary&quot; UI/API for managing the user consent makes
sense: <br>
&gt; unless you&#39;re doing a fully dynamic end-to-end system like UMA, th=
en<br>
&gt; there&#39;s not much value in trying to squeeze disparate systems into
<br>
&gt; the same mold, since they won&#39;t be talking to each other anyway. <=
br>
&gt; <br>
&gt; This is required in distributed setup for each API platform from <br>
&gt; different vendors to perform in an interop manner. <br>
&gt; &nbsp; <br>
&gt; <br>
&gt; And since you refer to it as an &quot;API&quot;, what will the RO
be using to <br>
&gt; call this API? Is there a token management client that&#39;s separate
<br>
&gt; from the OAuth client? <br>
&gt; <br>
&gt; I didn&#39;t get your question right... If you meant the how to invoke
<br>
&gt; revocation end point, the the resource owner needs to know the <br>
&gt; consumer key (represents the OAuth Client app) &amp; scope to revoke
the<br>
&gt; access token for a given client.&nbsp; <br>
&gt; <br>
&gt; <br>
&gt; <br>
&gt; IMHO token revocation done my RO is more practical than token <br>
&gt; revocation done by the Client. <br>
&gt; They&#39;re both valid but require different kinds of protocols and <b=
r>
&gt; considerations. This token revocation draft is meant to solve one
<br>
&gt; problem, and that doesn&#39;t mean it can or should solve other <br>
&gt; seemingly related problems.<br>
&gt; <br>
&gt; If you would like to see the RO-initiated token revocation go <br>
&gt; through (not grant revocation, mind you -- that&#39;s related, but <br=
>
&gt; different), then I would suggest that you start specifying exactly
<br>
&gt; how that works. I predict it will be problematic in practice, <br>
&gt; though, as the RO often doesn&#39;t actually have direct access to the
<br>
&gt; token itself. <br>
&gt; <br>
&gt; Resource owner needs to know the consumer key (represents the OAuth
<br>
&gt; Client app) &amp; scope to revoke the access token for a given client.=
&nbsp;
<br>
&gt; <br>
&gt; &nbsp; <br>
&gt; <br>
&gt; &nbsp; <br>
&gt; There are larger applications, like UMA, that have client and PR <br>
&gt; provisioning that would allow for this to be managed somewhat <br>
&gt; programmatically, but even in that case you&#39;re still generally doi=
ng<br>
&gt; token revocation by a &quot;client&quot; in some fashion. In UMA,
though, <br>
&gt; several different pieces can play the role of a &quot;client&quot;
at <br>
&gt; different parts of the process.<br>
&gt; <br>
&gt; Revoking a scope is a whole different mess. Generally, you&#39;d want
to<br>
&gt; just revoke an existing token and make a new authorization grant <br>
&gt; with lower access if you don&#39;t want that client getting that scope
<br>
&gt; anymore. If you just want to downscope for a single transaction, you<b=
r>
&gt; can already do that with either the refresh token or token chaining
<br>
&gt; approaches, depending on where in the process you are. The latter
of<br>
&gt; these are both client-focused, though, and the RO doesn&#39;t have a <=
br>
&gt; direct hand in it at this point. <br>
&gt; <br>
&gt; Why do you think it a mess. If you revoke the entire token then <br>
&gt; Client needs to go through the complete OAuth flow - and also needs
<br>
&gt; to get the user consent. If RO can &nbsp;downgrade the scope, then
we <br>
&gt; restrict API access by the client at RS end and its transparent to
<br>
&gt; the client. <br>
&gt; <br>
&gt; <br>
&gt; Downgrading the scope of tokens in the wild is hardly transparent
to<br>
&gt; the client (stuff that it expects to work will suddenly start to <br>
&gt; fail, meaning that most clients will throw out the token and try to
<br>
&gt; get a new one), and in a distributed system you&#39;ve got to propagat=
e
<br>
&gt; that change to the RS. If you bake the scopes into the token itself
<br>
&gt; (which many do) then you actually *can&#39;t* downgrade a single token=
,
anyway. <br>
&gt; <br>
&gt; Yes.. that is the expected behavior. I mean the process is <br>
&gt; transparent. Client will notice at runtime. <br>
&gt; <br>
&gt; Thanks &amp; regards, <br>
&gt; -Prabath <br>
&gt; &nbsp; <br>
&gt; <br>
&gt; &nbsp;-- Justin <br>
&gt; <br>
&gt; <br>
&gt; Thanks &amp; regards, <br>
&gt; -Prabath <br>
&gt; &nbsp; <br>
&gt; <br>
&gt; <br>
&gt; &nbsp;-- Justin <br>
&gt; <br>
&gt; <br>
&gt; On 02/06/2013 04:35 AM, Prabath Siriwardena wrote: <br>
&gt; I am sorry if this was already discussed in this list..&nbsp; <br>
&gt; <br>
&gt; Looking at [1] it only talks about revoking the access token from
the client. <br>
&gt; <br>
&gt; How about the resource owner..? <br>
&gt; <br>
&gt; There can be cases where resource owner needs to revoke an <br>
&gt; authorized access token from a given client. Or revoke an scope..
<br>
&gt; <br>
&gt; How are we going to address these requirements..? Thoughts appreciated=
...
<br>
&gt; <br>
&gt; [1] <a href=3D"http://tools.ietf.org/html/draft-ietf-oauth-revocation-=
04" target=3D"_blank">http://tools.ietf.org/html/draft-ietf-oauth-revocatio=
n-04</a> <br>
&gt; <br>
&gt; -- <br>
&gt; Thanks &amp; Regards,<br>
&gt; Prabath <br>
&gt; <br>
&gt; Mobile : <a href=3D"tel:%2B94%2071%20809%206732" value=3D"+94718096732=
" target=3D"_blank">+94 71 809 6732</a>&nbsp;<br>
&gt; <br>
&gt; <a href=3D"http://blog.facilelogin.com" target=3D"_blank">http://blog.=
facilelogin.com</a><br>
&gt; <a href=3D"http://RampartFAQ.com" target=3D"_blank">http://RampartFAQ.=
com</a> <br>
&gt; <br>
&gt; <br>
&gt; _______________________________________________<br>
&gt; OAuth mailing list<br>
&gt; <a href=3D"mailto:OAuth@ietf.org" target=3D"_blank">OAuth@ietf.org</a>=
<br>
&gt; <a href=3D"https://www.ietf.org/mailman/listinfo/oauth" target=3D"_bla=
nk">https://www.ietf.org/mailman/listinfo/oauth</a><br>
&gt; <br>
&gt; <br>
&gt; <br>
&gt; <br>
&gt; <br>
&gt; -- <br>
&gt; Thanks &amp; Regards,<br>
&gt; Prabath <br>
&gt; <br>
&gt; Mobile : <a href=3D"tel:%2B94%2071%20809%206732" value=3D"+94718096732=
" target=3D"_blank">+94 71 809 6732</a>&nbsp;<br>
&gt; <br>
&gt; <a href=3D"http://blog.facilelogin.com" target=3D"_blank">http://blog.=
facilelogin.com</a><br>
&gt; <a href=3D"http://RampartFAQ.com" target=3D"_blank">http://RampartFAQ.=
com</a> <br>
&gt; <br>
&gt; <br>
&gt; <br>
&gt; <br>
&gt; -- <br>
&gt; Thanks &amp; Regards,<br>
&gt; Prabath <br>
&gt; <br>
&gt; Mobile : <a href=3D"tel:%2B94%2071%20809%206732" value=3D"+94718096732=
" target=3D"_blank">+94 71 809 6732</a>&nbsp;<br>
&gt; <br>
&gt; <a href=3D"http://blog.facilelogin.com" target=3D"_blank">http://blog.=
facilelogin.com</a></font></tt>
<br><tt><font>&gt; <a href=3D"http://RampartFAQ.com________________________=
_______________________" target=3D"_blank">http://RampartFAQ.com___________=
____________________________________</a><br>
&gt; OAuth mailing list<br>
&gt; <a href=3D"mailto:OAuth@ietf.org" target=3D"_blank">OAuth@ietf.org</a>=
<br>
&gt; <a href=3D"https://www.ietf.org/mailman/listinfo/oauth" target=3D"_bla=
nk">https://www.ietf.org/mailman/listinfo/oauth</a><br>
</font></tt>
<br><tt><font>&gt; <br>
</font></tt>
<br><tt><font>&gt; <br>
&gt; -- <br>
&gt; Thanks &amp; Regards,<br>
&gt; Prabath</font></tt>
<br><tt><font>&gt; <br>
&gt; Mobile : <a href=3D"tel:%2B94%2071%20809%206732" value=3D"+94718096732=
" target=3D"_blank">+94 71 809 6732</a>&nbsp;<br>
&gt; <br>
&gt; <a href=3D"http://blog.facilelogin.com" target=3D"_blank">http://blog.=
facilelogin.com</a><br>
&gt; <a href=3D"http://RampartFAQ.com" target=3D"_blank">http://RampartFAQ.=
com</a></font></tt>
<br><tt><font>&gt; _______________________________________________<br>
&gt; OAuth mailing list<br>
&gt; <a href=3D"mailto:OAuth@ietf.org" target=3D"_blank">OAuth@ietf.org</a>=
<br>
&gt; <a href=3D"https://www.ietf.org/mailman/listinfo/oauth" target=3D"_bla=
nk">https://www.ietf.org/mailman/listinfo/oauth</a></font></tt>
<br><tt><font>&gt; <br>
</font></tt>
<br><tt><font>&gt; <br>
&gt; -- <br>
&gt; Thanks &amp; Regards,<br>
&gt; Prabath</font></tt>
<br><tt><font>&gt; <br>
&gt; Mobile : <a href=3D"tel:%2B94%2071%20809%206732" value=3D"+94718096732=
" target=3D"_blank">+94 71 809 6732</a>&nbsp;<br>
&gt; <br>
&gt; <a href=3D"http://blog.facilelogin.com" target=3D"_blank">http://blog.=
facilelogin.com</a><br>
&gt; <a href=3D"http://RampartFAQ.com______________________________________=
_________" target=3D"_blank">http://RampartFAQ.com_________________________=
______________________</a><br>
&gt; OAuth mailing list<br>
&gt; <a href=3D"mailto:OAuth@ietf.org" target=3D"_blank">OAuth@ietf.org</a>=
<br>
&gt; <a href=3D"https://www.ietf.org/mailman/listinfo/oauth" target=3D"_bla=
nk">https://www.ietf.org/mailman/listinfo/oauth</a><br>
</font></tt>
</div></div></blockquote></div><br><br clear=3D"all"><div><br></div>-- <br>=
Thanks &amp; Regards,<br>Prabath<div><br></div><div>Mobile : +94 71 809 673=
2&nbsp;<br><br><a href=3D"http://blog.facilelogin.com" target=3D"_blank">ht=
tp://blog.facilelogin.com</a><br>
<a href=3D"http://RampartFAQ.com" target=3D"_blank">http://RampartFAQ.com</=
a></div>

--047d7b343b064e620f04d51d574c--

From zhou.sujing@zte.com.cn  Thu Feb  7 00:47:08 2013
Return-Path: <zhou.sujing@zte.com.cn>
X-Original-To: oauth@ietfa.amsl.com
Delivered-To: oauth@ietfa.amsl.com
Received: from localhost (localhost [127.0.0.1]) by ietfa.amsl.com (Postfix) with ESMTP id 1638121F8639; Thu,  7 Feb 2013 00:47:08 -0800 (PST)
X-Virus-Scanned: amavisd-new at amsl.com
X-Spam-Flag: NO
X-Spam-Score: -98.395
X-Spam-Level: 
X-Spam-Status: No, score=-98.395 tagged_above=-999 required=5 tests=[BAYES_00=-2.599, HTML_MESSAGE=0.001, MIME_BASE64_TEXT=1.753, MIME_CHARSET_FARAWAY=2.45, USER_IN_WHITELIST=-100]
Received: from mail.ietf.org ([64.170.98.30]) by localhost (ietfa.amsl.com [127.0.0.1]) (amavisd-new, port 10024) with ESMTP id 50yyqEywujxe; Thu,  7 Feb 2013 00:47:06 -0800 (PST)
Received: from zte.com.cn (mx5.zte.com.cn [63.217.80.70]) by ietfa.amsl.com (Postfix) with ESMTP id CA79C21F8635; Thu,  7 Feb 2013 00:47:05 -0800 (PST)
Received: from mse02.zte.com.cn (unknown [10.30.3.21]) by Websense Email Security Gateway with ESMTPS id 8D09F124518A; Thu,  7 Feb 2013 16:45:37 +0800 (CST)
Received: from notes_smtp.zte.com.cn ([10.30.1.239]) by mse02.zte.com.cn with ESMTP id r178kbqf022381; Thu, 7 Feb 2013 16:46:37 +0800 (GMT-8) (envelope-from zhou.sujing@zte.com.cn)
In-Reply-To: <CAJV9qO_bvPYNioB0yOr0Qo6MgOPTjmMAn4at_YbXzqVPTgkxTg@mail.gmail.com>
To: Prabath Siriwardena <prabath@wso2.com>
MIME-Version: 1.0
X-Mailer: Lotus Notes Release 6.5.6 March 06, 2007
Message-ID: <OF5AEA0CD4.64C3AFAA-ON48257B0B.00303A67-48257B0B.00303F27@zte.com.cn>
From: zhou.sujing@zte.com.cn
Date: Thu, 7 Feb 2013 16:46:26 +0800
X-MIMETrack: Serialize by Router on notes_smtp/zte_ltd(Release 8.5.3FP1 HF212|May 23, 2012) at 2013-02-07 16:46:33, Serialize complete at 2013-02-07 16:46:33
Content-Type: multipart/alternative; boundary="=_alternative 00303F2748257B0B_="
X-MAIL: mse02.zte.com.cn r178kbqf022381
Cc: "oauth@ietf.org WG" <oauth@ietf.org>, "oauth-bounces@ietf.org" <oauth-bounces@ietf.org>
Subject: Re: [OAUTH-WG] A question on token revocation.
X-BeenThere: oauth@ietf.org
X-Mailman-Version: 2.1.12
Precedence: list
List-Id: OAUTH WG <oauth.ietf.org>
List-Unsubscribe: <https://www.ietf.org/mailman/options/oauth>, <mailto:oauth-request@ietf.org?subject=unsubscribe>
List-Archive: <http://www.ietf.org/mail-archive/web/oauth>
List-Post: <mailto:oauth@ietf.org>
List-Help: <mailto:oauth-request@ietf.org?subject=help>
List-Subscribe: <https://www.ietf.org/mailman/listinfo/oauth>, <mailto:oauth-request@ietf.org?subject=subscribe>
X-List-Received-Date: Thu, 07 Feb 2013 08:47:08 -0000

This is a multipart message in MIME format.
--=_alternative 00303F2748257B0B_=
Content-Type: text/plain; charset="GB2312"
Content-Transfer-Encoding: base64
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--=_alternative 00303F2748257B0B_=
Content-Type: text/html; charset="GB2312"
Content-Transfer-Encoding: base64
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--=_alternative 00303F2748257B0B_=--

From hannes.tschofenig@gmx.net  Thu Feb  7 01:33:51 2013
Return-Path: <hannes.tschofenig@gmx.net>
X-Original-To: oauth@ietfa.amsl.com
Delivered-To: oauth@ietfa.amsl.com
Received: from localhost (localhost [127.0.0.1]) by ietfa.amsl.com (Postfix) with ESMTP id 7B65F21F85A4 for <oauth@ietfa.amsl.com>; Thu,  7 Feb 2013 01:33:51 -0800 (PST)
X-Virus-Scanned: amavisd-new at amsl.com
X-Spam-Flag: NO
X-Spam-Score: -102.094
X-Spam-Level: 
X-Spam-Status: No, score=-102.094 tagged_above=-999 required=5 tests=[AWL=0.506, BAYES_00=-2.599, USER_IN_WHITELIST=-100]
Received: from mail.ietf.org ([64.170.98.30]) by localhost (ietfa.amsl.com [127.0.0.1]) (amavisd-new, port 10024) with ESMTP id AEHFjYXoxML1 for <oauth@ietfa.amsl.com>; Thu,  7 Feb 2013 01:33:51 -0800 (PST)
Received: from mout.gmx.net (mout.gmx.net [212.227.15.18]) by ietfa.amsl.com (Postfix) with ESMTP id C320021F8599 for <oauth@ietf.org>; Thu,  7 Feb 2013 01:33:50 -0800 (PST)
Received: from mailout-de.gmx.net ([10.1.76.27]) by mrigmx.server.lan (mrigmx002) with ESMTP (Nemesis) id 0M8cOb-1Up0fO3x47-00wBVC for <oauth@ietf.org>; Thu, 07 Feb 2013 10:33:49 +0100
Received: (qmail 21682 invoked by uid 0); 7 Feb 2013 09:33:49 -0000
Received: from 194.251.119.197 by www038.gmx.net with HTTP; Thu, 07 Feb 2013 10:33:49 +0100 (CET)
Content-Type: text/plain; charset="utf-8"
Date: Thu, 07 Feb 2013 10:33:49 +0100
From: "Hannes Tschofenig" <Hannes.Tschofenig@gmx.net>
Message-ID: <20130207093349.51030@gmx.net>
MIME-Version: 1.0
To: oauth@ietf.org
X-Authenticated: #29516787
X-Flags: 0001
X-Mailer: WWW-Mail 6100 (Global Message Exchange)
X-Priority: 3
X-Provags-ID: V01U2FsdGVkX184R805wKo44wtjLC3TIcaCFC8KvZjxRqm+nUsPQY hk2kSNVB+Bpep4L0X5sW7zqnD+Cki9AE6m+g== 
Content-Transfer-Encoding: 8bit
X-GMX-UID: qhFhcYtyeSEqZJIAqXUhtEt+IGRvb4Ch
Subject: [OAUTH-WG] Agenda Topics for IETF#86
X-BeenThere: oauth@ietf.org
X-Mailman-Version: 2.1.12
Precedence: list
List-Id: OAUTH WG <oauth.ietf.org>
List-Unsubscribe: <https://www.ietf.org/mailman/options/oauth>, <mailto:oauth-request@ietf.org?subject=unsubscribe>
List-Archive: <http://www.ietf.org/mail-archive/web/oauth>
List-Post: <mailto:oauth@ietf.org>
List-Help: <mailto:oauth-request@ietf.org?subject=help>
List-Subscribe: <https://www.ietf.org/mailman/listinfo/oauth>, <mailto:oauth-request@ietf.org?subject=subscribe>
X-List-Received-Date: Thu, 07 Feb 2013 09:33:51 -0000

Hi all, 

if you plan to present your document at the next IETF meeting please drop us a note. 

We would like to start compiling the agenda.

Ciao
Hannes & Derek

From jricher@mitre.org  Thu Feb  7 06:59:36 2013
Return-Path: <jricher@mitre.org>
X-Original-To: oauth@ietfa.amsl.com
Delivered-To: oauth@ietfa.amsl.com
Received: from localhost (localhost [127.0.0.1]) by ietfa.amsl.com (Postfix) with ESMTP id 7BDF921F8735 for <oauth@ietfa.amsl.com>; Thu,  7 Feb 2013 06:59:36 -0800 (PST)
X-Virus-Scanned: amavisd-new at amsl.com
X-Spam-Flag: NO
X-Spam-Score: -6.575
X-Spam-Level: 
X-Spam-Status: No, score=-6.575 tagged_above=-999 required=5 tests=[AWL=0.024,  BAYES_00=-2.599, RCVD_IN_DNSWL_MED=-4]
Received: from mail.ietf.org ([64.170.98.30]) by localhost (ietfa.amsl.com [127.0.0.1]) (amavisd-new, port 10024) with ESMTP id O3fJL5I8rvhb for <oauth@ietfa.amsl.com>; Thu,  7 Feb 2013 06:59:35 -0800 (PST)
Received: from smtpksrv1.mitre.org (smtpksrv1.mitre.org [198.49.146.77]) by ietfa.amsl.com (Postfix) with ESMTP id 32C7F21F84D5 for <oauth@ietf.org>; Thu,  7 Feb 2013 06:59:35 -0800 (PST)
Received: from smtpksrv1.mitre.org (localhost.localdomain [127.0.0.1]) by localhost (Postfix) with SMTP id 7EBC45310862; Thu,  7 Feb 2013 09:59:34 -0500 (EST)
Received: from IMCCAS01.MITRE.ORG (imccas01.mitre.org [129.83.29.78]) by smtpksrv1.mitre.org (Postfix) with ESMTP id 70AFA531085F; Thu,  7 Feb 2013 09:59:34 -0500 (EST)
Received: from [10.146.15.29] (129.83.31.58) by IMCCAS01.MITRE.ORG (129.83.29.78) with Microsoft SMTP Server (TLS) id 14.2.318.4; Thu, 7 Feb 2013 09:59:34 -0500
Message-ID: <5113C131.5000808@mitre.org>
Date: Thu, 7 Feb 2013 09:58:57 -0500
From: Justin Richer <jricher@mitre.org>
User-Agent: Mozilla/5.0 (X11; Linux i686; rv:17.0) Gecko/20130106 Thunderbird/17.0.2
MIME-Version: 1.0
To: Mike Jones <Michael.Jones@microsoft.com>
References: <20130206201534.13236.6681.idtracker@ietfa.amsl.com> <5112BE73.2070003@mitre.org> <4E1F6AAD24975D4BA5B168042967394367418E35@TK5EX14MBXC284.redmond.corp.microsoft.com>
In-Reply-To: <4E1F6AAD24975D4BA5B168042967394367418E35@TK5EX14MBXC284.redmond.corp.microsoft.com>
Content-Type: text/plain; charset="ISO-8859-1"; format=flowed
Content-Transfer-Encoding: 7bit
X-Originating-IP: [129.83.31.58]
Cc: "oauth@ietf.org" <oauth@ietf.org>
Subject: Re: [OAUTH-WG] I-D Action: draft-ietf-oauth-dyn-reg-05.txt
X-BeenThere: oauth@ietf.org
X-Mailman-Version: 2.1.12
Precedence: list
List-Id: OAUTH WG <oauth.ietf.org>
List-Unsubscribe: <https://www.ietf.org/mailman/options/oauth>, <mailto:oauth-request@ietf.org?subject=unsubscribe>
List-Archive: <http://www.ietf.org/mail-archive/web/oauth>
List-Post: <mailto:oauth@ietf.org>
List-Help: <mailto:oauth-request@ietf.org?subject=help>
List-Subscribe: <https://www.ietf.org/mailman/listinfo/oauth>, <mailto:oauth-request@ietf.org?subject=subscribe>
X-List-Received-Date: Thu, 07 Feb 2013 14:59:36 -0000

Mike,

Thanks for reviewing the latest draft.

First, it's my understanding that the role of the editor is not merely 
to express the gestalt of the working group (though that's a very 
important part of it) but also to drive that discussion to it's best 
technical end. I put this revision together because it's easier to 
discuss things when there's actual text on the table. If it's just a 
suggested idea, I find that people tend to get very scared of imagined 
horrors that have little to do with the actual proposals. There's an air 
of "if we do something it's going to be the worst thing" that hang 
around as long as parts are still unknown.

So I took a step out on a limb and got things down on paper. I told 
people that I was going to do this the other day. [1] Since it's easy to 
roll back any changes that the working group doesn't want, and revisions 
are cheap, I'm not afraid to pull out things that make the WG cringe. 
But at least now we have something real, and not imagined, to cringe at.

That said, there have been several discussions about the changes that 
went into this revision. The original UMA draft from which this grew was 
much JSON based, though it didn't define actions beyond the initial 
registration. From the time I took over and moved it to form-based 
actions inspired by the OIDC registration draft, I've had people asking 
me why the registration endpoint wasn't a RESTful API: why didn't it use 
HTTP verbs, why wasn't it JSON-in/JSON-out, etc. My argument at the time 
was that OAuth wasn't RESTful (because it isn't), and that the 
parallelism with the rest of OAuth would be good for DynReg. But several 
people argued, several times now, that registration could be a really 
good place to do something different without breaking the expectations 
and flavor of the rest of the OAuth framework. I still hold that's it's 
*different*, but after I saw Nat's elegant rewrite of the OIDC 
registration spec [2], I was convinced that this could actually work in 
a reasonable, non-hackish manner.

And so I decided, as editor, to take the many discussions about this 
along with the best ideas and practices that I was aware of and put them 
into a document that we could discuss and use.

I welcome discussion on the document on its merits, and not the actions 
of its editor.

  -- Justin


[1] http://www.ietf.org/mail-archive/web/oauth/current/msg10690.html
[2] 
http://nat.sakimura.org/wp-content/uploads/2013/02/draft-openid-connect-registration-1_0.html

On 02/06/2013 09:09 PM, Mike Jones wrote:
> Hi Justin,
>
> Thanks for working to make progress on the OAuth Registration draft.  Reading through the changes, it seems to me that a number of changes were made that there wasn't yet working consensus for - in fact, some of which I don't recall being discussed by the working group at all.  These changes include:
>
>    - Splitting the registration endpoint into multiple endpoints
>    - Changing from form-encoded to JSON registration representation
>    - Adding Get and Delete operations
>    - Adding the Self URI concept and representation
>
> My point is separate from whether some of those changes might be good ideas.  (Some may be.)  I would hope that in the future, before changes are made to working group drafts, that sufficient time will be first be given to the working group to adequately discuss them and come to agreement on them.
>
> 				Thank you,
> 				-- Mike
>
> -----Original Message-----
> From: oauth-bounces@ietf.org [mailto:oauth-bounces@ietf.org] On Behalf Of Justin Richer
> Sent: Wednesday, February 06, 2013 12:35 PM
> To: oauth@ietf.org
> Subject: Re: [OAUTH-WG] I-D Action: draft-ietf-oauth-dyn-reg-05.txt
>
> Thanks to all of the discussion over the last few weeks and some key input from Nat Sakimura, Eve Maler, and others, I've put out a revision of the DynReg specification that is a major change from recent revisions, but actually brings it back closer to the original -01 draft.
> The "operation" parameter is now gone and there are instead several logical endpoints for different kinds of operations. These endpoints are communicated to the client through a well-defined link structure.
>
> It basically works like this:
>
> 1. client shows up at the Client Registration Endpoint, posts a JSON object with a few bits of metadata about itself (and potentially presents an Access Token that it got from some out of band process that acts as a "class registration" or "developer key", important to several known real-world use cases)
>
> 2. client gets back a JSON object filled with whatever metadata the server has about it, including a newly-minted client_id and (possibly) client_secret. The client also gets back a registration access token and a fully qualified URL that points to the "update endpoint". This url can take any form (the server can't count on the client being able to generate it from parts), but it's recommended that it follow a REST-style URL template of the form "https://server/registration_base_url/client_id".
>
> 3. client sends updates to this update URL, authenticated by the registration access token, by PUTting a JSON object with all of its parameters. Any fields the client leaves off the JSON object, the server leaves alone. Anything with a "null" value, the server deletes the value. The server remains free to override *any* field the client requests setting a particular value for. The client is not allowed to request a particular value for the client_secret or registration_access_token, for obvious reasons -- but see part 7 below.
>
> 4. The server responds back with the current state of the client as a JSON object, including any fields the server has provisioned on the client's behalf (defaults, for instance). Any fields the server has overridden, it currently MUST respond with. So if the client asks for
> "scope: A B C" and the server can only give it "scope: A B", then the server has to tell that to the client by including the field "scope: A B" in its response.
>
> 5. client can send an HTTP GET to the update URL to get its current state as a JSON object as in 4.
>
> 6. client can send an HTTP DELETE to the update URL to deprovision itself.
>
> 7. there's also a parallel endpoint for rotating the registration access token and client secret, since these are both security values that are provisioned by the server. There is some open debate of whether the client actually needs to be able to trigger this operation, or if the server should just do this as part of normal update/get requests to the update endpoint.
>
> It's a major functionality change on the wire, and there's still sawdust on the spec language. By going with a JSON-based data model and a RESTful update protocol, we're getting away from core OAuth patterns, but I think that ultimately this can be a good thing. There have been a few proposals that would go somewhere between what OAuth does on other endpoints and what a real RESTful system would do, but I didn't see much purpose in going half way when the results would end up *more* complicated.
>
> I request that everyone read it over to see if this will work for their use cases. The idea here remains that application protocols like OIDC and UMA would use this mechanism as-is with nearly all customizations in the client metadata table.
>
> I hope that this all actually makes sense...
>
>    -- Justin
>
> On 02/06/2013 03:15 PM, internet-drafts@ietf.org wrote:
>> A New Internet-Draft is available from the on-line Internet-Drafts directories.
>>    This draft is a work item of the Web Authorization Protocol Working Group of the IETF.
>>
>> 	Title           : OAuth Dynamic Client Registration Protocol
>> 	Author(s)       : Justin Richer
>>                             John Bradley
>>                             Michael B. Jones
>>                             Maciej Machulak
>> 	Filename        : draft-ietf-oauth-dyn-reg-05.txt
>> 	Pages           : 21
>> 	Date            : 2013-02-06
>>
>> Abstract:
>>      This specification defines an endpoint and protocol for dynamic
>>      registration of OAuth Clients at an Authorization Server.
>>
>>
>> The IETF datatracker status page for this draft is:
>> https://datatracker.ietf.org/doc/draft-ietf-oauth-dyn-reg
>>
>> There's also a htmlized version available at:
>> http://tools.ietf.org/html/draft-ietf-oauth-dyn-reg-05
>>
>> A diff from the previous version is available at:
>> http://www.ietf.org/rfcdiff?url2=draft-ietf-oauth-dyn-reg-05
>>
>>
>> Internet-Drafts are also available by anonymous FTP at:
>> ftp://ftp.ietf.org/internet-drafts/
>>
>> _______________________________________________
>> OAuth mailing list
>> OAuth@ietf.org
>> https://www.ietf.org/mailman/listinfo/oauth
> _______________________________________________
> OAuth mailing list
> OAuth@ietf.org
> https://www.ietf.org/mailman/listinfo/oauth


From jricher@mitre.org  Thu Feb  7 07:10:16 2013
Return-Path: <jricher@mitre.org>
X-Original-To: oauth@ietfa.amsl.com
Delivered-To: oauth@ietfa.amsl.com
Received: from localhost (localhost [127.0.0.1]) by ietfa.amsl.com (Postfix) with ESMTP id B625321F853E for <oauth@ietfa.amsl.com>; Thu,  7 Feb 2013 07:10:16 -0800 (PST)
X-Virus-Scanned: amavisd-new at amsl.com
X-Spam-Flag: NO
X-Spam-Score: -6.575
X-Spam-Level: 
X-Spam-Status: No, score=-6.575 tagged_above=-999 required=5 tests=[AWL=0.023,  BAYES_00=-2.599, HTML_MESSAGE=0.001, RCVD_IN_DNSWL_MED=-4]
Received: from mail.ietf.org ([64.170.98.30]) by localhost (ietfa.amsl.com [127.0.0.1]) (amavisd-new, port 10024) with ESMTP id rYN+Znjgi8Yr for <oauth@ietfa.amsl.com>; Thu,  7 Feb 2013 07:10:16 -0800 (PST)
Received: from smtpksrv1.mitre.org (smtpksrv1.mitre.org [198.49.146.77]) by ietfa.amsl.com (Postfix) with ESMTP id C68B421F84CA for <oauth@ietf.org>; Thu,  7 Feb 2013 07:10:15 -0800 (PST)
Received: from smtpksrv1.mitre.org (localhost.localdomain [127.0.0.1]) by localhost (Postfix) with SMTP id B522143900EE; Thu,  7 Feb 2013 10:10:14 -0500 (EST)
Received: from IMCCAS03.MITRE.ORG (imccas03.mitre.org [129.83.29.80]) by smtpksrv1.mitre.org (Postfix) with ESMTP id CB8391F1805; Thu,  7 Feb 2013 10:10:07 -0500 (EST)
Received: from [10.146.15.29] (129.83.31.58) by IMCCAS03.MITRE.ORG (129.83.29.80) with Microsoft SMTP Server (TLS) id 14.2.318.4; Thu, 7 Feb 2013 10:10:07 -0500
Message-ID: <5113C3AA.1040701@mitre.org>
Date: Thu, 7 Feb 2013 10:09:30 -0500
From: Justin Richer <jricher@mitre.org>
User-Agent: Mozilla/5.0 (X11; Linux i686; rv:17.0) Gecko/20130106 Thunderbird/17.0.2
MIME-Version: 1.0
To: Prabath Siriwardena <prabath@wso2.com>
References: <20130206192420.32698.21027.idtracker@ietfa.amsl.com> <5112AE0B.1080501@mitre.org> <CAJV9qO_8-4FowrXK=ae-+xMjiJFP04ryVMLQ8SGUH8kp3PHrLg@mail.gmail.com>
In-Reply-To: <CAJV9qO_8-4FowrXK=ae-+xMjiJFP04ryVMLQ8SGUH8kp3PHrLg@mail.gmail.com>
Content-Type: multipart/alternative; boundary="------------080203080402010103050601"
X-Originating-IP: [129.83.31.58]
Cc: "oauth@ietf.org" <oauth@ietf.org>
Subject: Re: [OAUTH-WG] Fwd: New Version Notification for draft-richer-oauth-introspection-02.txt
X-BeenThere: oauth@ietf.org
X-Mailman-Version: 2.1.12
Precedence: list
List-Id: OAUTH WG <oauth.ietf.org>
List-Unsubscribe: <https://www.ietf.org/mailman/options/oauth>, <mailto:oauth-request@ietf.org?subject=unsubscribe>
List-Archive: <http://www.ietf.org/mail-archive/web/oauth>
List-Post: <mailto:oauth@ietf.org>
List-Help: <mailto:oauth-request@ietf.org?subject=help>
List-Subscribe: <https://www.ietf.org/mailman/listinfo/oauth>, <mailto:oauth-request@ietf.org?subject=subscribe>
X-List-Received-Date: Thu, 07 Feb 2013 15:10:16 -0000

--------------080203080402010103050601
Content-Type: text/plain; charset="ISO-8859-1"; format=flowed
Content-Transfer-Encoding: 7bit

"valid" might not be the best term, but it's meant to be a field where 
the server says "yes this token is still good" or "no this token isn't 
good anymore". We could instead do this with HTTP codes or something but 
I went with a pure JSON response.

  -- Justin

On 02/06/2013 10:47 PM, Prabath Siriwardena wrote:
> Hi Justin,
>
> I believe this is addressing one of the key missing part in OAuth 2.0...
>
> One question - I guess this was discussed already...
>
> In the spec - in the introspection response it has the attribute 
> "valid" - this is basically the validity of the token provided in the 
> request.
>
> Validation criteria depends on the token and well as token type ( 
> Bearer, MAC..).
>
> In the spec it seems like it's coupled with Bearer token type... But I 
> guess, by adding "token_type" to the request we can remove this 
> dependency.
>
> WDYT..?
>
> Thanks & regards,
> -Prabath
>
> On Thu, Feb 7, 2013 at 12:54 AM, Justin Richer <jricher@mitre.org 
> <mailto:jricher@mitre.org>> wrote:
>
>     Updated introspection draft based on recent comments. Changes include:
>
>      - "scope" return parameter now follows RFC6749 format instead of
>     JSON array
>      - "subject" -> "sub", and "audience" -> "aud", to be parallel
>     with JWT claims
>      - clarified what happens if the authentication is bad
>
>      -- Justin
>
>
>     -------- Original Message --------
>     Subject: 	New Version Notification for
>     draft-richer-oauth-introspection-02.txt
>     Date: 	Wed, 6 Feb 2013 11:24:20 -0800
>     From: 	<internet-drafts@ietf.org> <mailto:internet-drafts@ietf.org>
>     To: 	<jricher@mitre.org> <mailto:jricher@mitre.org>
>
>
>
>     A new version of I-D, draft-richer-oauth-introspection-02.txt
>     has been successfully submitted by Justin Richer and posted to the
>     IETF repository.
>
>     Filename:	 draft-richer-oauth-introspection
>     Revision:	 02
>     Title:		 OAuth Token Introspection
>     Creation date:	 2013-02-06
>     WG ID:		 Individual Submission
>     Number of pages: 6
>     URL:http://www.ietf.org/internet-drafts/draft-richer-oauth-introspection-02.txt
>     Status:http://datatracker.ietf.org/doc/draft-richer-oauth-introspection
>     Htmlized:http://tools.ietf.org/html/draft-richer-oauth-introspection-02
>     Diff:http://www.ietf.org/rfcdiff?url2=draft-richer-oauth-introspection-02
>
>     Abstract:
>         This specification defines a method for a client or protected
>         resource to query an OAuth authorization server to determine meta-
>         information about an OAuth token.
>
>
>                                                                                        
>
>
>     The IETF Secretariat
>
>
>
>
>     _______________________________________________
>     OAuth mailing list
>     OAuth@ietf.org <mailto:OAuth@ietf.org>
>     https://www.ietf.org/mailman/listinfo/oauth
>
>
>
>
> -- 
> Thanks & Regards,
> Prabath
>
> Mobile : +94 71 809 6732
>
> http://blog.facilelogin.com
> http://RampartFAQ.com


--------------080203080402010103050601
Content-Type: text/html; charset="ISO-8859-1"
Content-Transfer-Encoding: 7bit

<html>
  <head>
    <meta content="text/html; charset=ISO-8859-1"
      http-equiv="Content-Type">
  </head>
  <body bgcolor="#FFFFFF" text="#000000">
    "valid" might not be the best term, but it's meant to be a field
    where the server says "yes this token is still good" or "no this
    token isn't good anymore". We could instead do this with HTTP codes
    or something but I went with a pure JSON response.<br>
    <br>
    &nbsp;-- Justin<br>
    <br>
    <div class="moz-cite-prefix">On 02/06/2013 10:47 PM, Prabath
      Siriwardena wrote:<br>
    </div>
    <blockquote
cite="mid:CAJV9qO_8-4FowrXK=ae-+xMjiJFP04ryVMLQ8SGUH8kp3PHrLg@mail.gmail.com"
      type="cite">
      <meta http-equiv="Content-Type" content="text/html;
        charset=ISO-8859-1">
      Hi Justin,
      <div><br>
      </div>
      <div>I believe this is addressing one of the key missing part in
        OAuth 2.0...</div>
      <div><br>
      </div>
      <div>One question - I guess this was discussed already...</div>
      <div><br>
      </div>
      <div>In the spec - in the introspection response it has the
        attribute "valid" - this is basically the validity of the token
        provided in the request.</div>
      <div><br>
      </div>
      <div>Validation&nbsp;criteria depends on the token and well as token
        type ( Bearer, MAC..).</div>
      <div><br>
      </div>
      <div>In the spec it seems like it's coupled with Bearer token
        type... But I guess, by adding "token_type" to the request we
        can remove this dependency.</div>
      <div><br>
      </div>
      <div>WDYT..?</div>
      <div><br>
      </div>
      <div>Thanks &amp; regards,</div>
      <div>-Prabath&nbsp;</div>
      <div><br>
        <div class="gmail_quote">On Thu, Feb 7, 2013 at 12:54 AM, Justin
          Richer <span dir="ltr">&lt;<a moz-do-not-send="true"
              href="mailto:jricher@mitre.org" target="_blank">jricher@mitre.org</a>&gt;</span>
          wrote:<br>
          <blockquote class="gmail_quote" style="margin:0 0 0
            .8ex;border-left:1px #ccc solid;padding-left:1ex">
            <div bgcolor="#FFFFFF" text="#000000"> Updated introspection
              draft based on recent comments. Changes include:<br>
              <br>
              &nbsp;- "scope" return parameter now follows RFC6749 format
              instead of JSON array<br>
              &nbsp;- "subject" -&gt; "sub", and "audience" -&gt; "aud", to
              be parallel with JWT claims<br>
              &nbsp;- clarified what happens if the authentication is bad<br>
              <br>
              &nbsp;-- Justin<br>
              <div><br>
                <br>
                -------- Original Message --------
                <table border="0" cellpadding="0" cellspacing="0">
                  <tbody>
                    <tr>
                      <th align="RIGHT" nowrap="nowrap"
                        valign="BASELINE">Subject: </th>
                      <td>New Version Notification for
                        draft-richer-oauth-introspection-02.txt</td>
                    </tr>
                    <tr>
                      <th align="RIGHT" nowrap="nowrap"
                        valign="BASELINE">Date: </th>
                      <td>Wed, 6 Feb 2013 11:24:20 -0800</td>
                    </tr>
                    <tr>
                      <th align="RIGHT" nowrap="nowrap"
                        valign="BASELINE">From: </th>
                      <td><a moz-do-not-send="true"
                          href="mailto:internet-drafts@ietf.org"
                          target="_blank">&lt;internet-drafts@ietf.org&gt;</a></td>
                    </tr>
                    <tr>
                      <th align="RIGHT" nowrap="nowrap"
                        valign="BASELINE">To: </th>
                      <td><a moz-do-not-send="true"
                          href="mailto:jricher@mitre.org"
                          target="_blank">&lt;jricher@mitre.org&gt;</a></td>
                    </tr>
                  </tbody>
                </table>
                <br>
                <br>
                <pre>A new version of I-D, draft-richer-oauth-introspection-02.txt
has been successfully submitted by Justin Richer and posted to the
IETF repository.

Filename:	 draft-richer-oauth-introspection
Revision:	 02
Title:		 OAuth Token Introspection
Creation date:	 2013-02-06
WG ID:		 Individual Submission
Number of pages: 6
URL:             <a moz-do-not-send="true" href="http://www.ietf.org/internet-drafts/draft-richer-oauth-introspection-02.txt" target="_blank">http://www.ietf.org/internet-drafts/draft-richer-oauth-introspection-02.txt</a>
Status:          <a moz-do-not-send="true" href="http://datatracker.ietf.org/doc/draft-richer-oauth-introspection" target="_blank">http://datatracker.ietf.org/doc/draft-richer-oauth-introspection</a>
Htmlized:        <a moz-do-not-send="true" href="http://tools.ietf.org/html/draft-richer-oauth-introspection-02" target="_blank">http://tools.ietf.org/html/draft-richer-oauth-introspection-02</a>
Diff:            <a moz-do-not-send="true" href="http://www.ietf.org/rfcdiff?url2=draft-richer-oauth-introspection-02" target="_blank">http://www.ietf.org/rfcdiff?url2=draft-richer-oauth-introspection-02</a>

Abstract:
   This specification defines a method for a client or protected
   resource to query an OAuth authorization server to determine meta-
   information about an OAuth token.


                                                                                  


The IETF Secretariat

</pre>
                <br>
              </div>
              <br>
            </div>
            <br>
            _______________________________________________<br>
            OAuth mailing list<br>
            <a moz-do-not-send="true" href="mailto:OAuth@ietf.org">OAuth@ietf.org</a><br>
            <a moz-do-not-send="true"
              href="https://www.ietf.org/mailman/listinfo/oauth"
              target="_blank">https://www.ietf.org/mailman/listinfo/oauth</a><br>
            <br>
          </blockquote>
        </div>
        <br>
        <br clear="all">
        <div><br>
        </div>
        -- <br>
        Thanks &amp; Regards,<br>
        Prabath
        <div><br>
        </div>
        <div>Mobile : +94 71 809 6732&nbsp;<br>
          <br>
          <a moz-do-not-send="true" href="http://blog.facilelogin.com"
            target="_blank">http://blog.facilelogin.com</a><br>
          <a moz-do-not-send="true" href="http://RampartFAQ.com"
            target="_blank">http://RampartFAQ.com</a></div>
      </div>
    </blockquote>
    <br>
  </body>
</html>

--------------080203080402010103050601--

From jricher@mitre.org  Thu Feb  7 08:06:53 2013
Return-Path: <jricher@mitre.org>
X-Original-To: oauth@ietfa.amsl.com
Delivered-To: oauth@ietfa.amsl.com
Received: from localhost (localhost [127.0.0.1]) by ietfa.amsl.com (Postfix) with ESMTP id 8EBE021F8751 for <oauth@ietfa.amsl.com>; Thu,  7 Feb 2013 08:06:53 -0800 (PST)
X-Virus-Scanned: amavisd-new at amsl.com
X-Spam-Flag: NO
X-Spam-Score: -6.276
X-Spam-Level: 
X-Spam-Status: No, score=-6.276 tagged_above=-999 required=5 tests=[AWL=-0.278, BAYES_00=-2.599, HTML_MESSAGE=0.001, J_CHICKENPOX_23=0.6, RCVD_IN_DNSWL_MED=-4]
Received: from mail.ietf.org ([64.170.98.30]) by localhost (ietfa.amsl.com [127.0.0.1]) (amavisd-new, port 10024) with ESMTP id ee5EDRIj2rcy for <oauth@ietfa.amsl.com>; Thu,  7 Feb 2013 08:06:46 -0800 (PST)
Received: from smtpksrv1.mitre.org (smtpksrv1.mitre.org [198.49.146.77]) by ietfa.amsl.com (Postfix) with ESMTP id 26DAF21F874C for <oauth@ietf.org>; Thu,  7 Feb 2013 08:06:46 -0800 (PST)
Received: from smtpksrv1.mitre.org (localhost.localdomain [127.0.0.1]) by localhost (Postfix) with SMTP id 797731F0308; Thu,  7 Feb 2013 11:06:45 -0500 (EST)
Received: from IMCCAS03.MITRE.ORG (imccas03.mitre.org [129.83.29.80]) by smtpksrv1.mitre.org (Postfix) with ESMTP id 3DDC11F18AA; Thu,  7 Feb 2013 11:06:45 -0500 (EST)
Received: from [10.146.15.29] (129.83.31.58) by IMCCAS03.MITRE.ORG (129.83.29.80) with Microsoft SMTP Server (TLS) id 14.2.318.4; Thu, 7 Feb 2013 11:06:44 -0500
Message-ID: <5113D0EF.9070806@mitre.org>
Date: Thu, 7 Feb 2013 11:06:07 -0500
From: Justin Richer <jricher@mitre.org>
User-Agent: Mozilla/5.0 (X11; Linux i686; rv:17.0) Gecko/20130106 Thunderbird/17.0.2
MIME-Version: 1.0
To: <zhou.sujing@zte.com.cn>
References: <OF5AEA0CD4.64C3AFAA-ON48257B0B.00303A67-48257B0B.00303F27@zte.com.cn>
In-Reply-To: <OF5AEA0CD4.64C3AFAA-ON48257B0B.00303A67-48257B0B.00303F27@zte.com.cn>
Content-Type: multipart/alternative; boundary="------------000004030707080301060508"
X-Originating-IP: [129.83.31.58]
Cc: "oauth@ietf.org WG" <oauth@ietf.org>
Subject: Re: [OAUTH-WG] A question on token revocation.
X-BeenThere: oauth@ietf.org
X-Mailman-Version: 2.1.12
Precedence: list
List-Id: OAUTH WG <oauth.ietf.org>
List-Unsubscribe: <https://www.ietf.org/mailman/options/oauth>, <mailto:oauth-request@ietf.org?subject=unsubscribe>
List-Archive: <http://www.ietf.org/mail-archive/web/oauth>
List-Post: <mailto:oauth@ietf.org>
List-Help: <mailto:oauth-request@ietf.org?subject=help>
List-Subscribe: <https://www.ietf.org/mailman/listinfo/oauth>, <mailto:oauth-request@ietf.org?subject=subscribe>
X-List-Received-Date: Thu, 07 Feb 2013 16:06:53 -0000

--------------000004030707080301060508
Content-Type: text/plain; charset="ISO-8859-1"; format=flowed
Content-Transfer-Encoding: 7bit

This, I think, points out that the RO is generally more concerned with 
revoking an authorization grant than a token itself, with the latter 
potentially encompassing several tokens. The revocation draft isn't 
really intended to solve that problem, as Torsten points out below.

  -- Justin

On 02/07/2013 03:46 AM, zhou.sujing@zte.com.cn wrote:
>
> During the four grant types of Oauth,
>   1. authorization code: RO knows the authorization code upon which 
> access-tokens-to-be-revoked are issued
>   2. implicite flow: RO knows the access-tokens-to-be-revoked
>   3. password and client credential types: RO has no way of knowing 
> access tokens.
>
> So,IMO,  it is not proper for RO to revoke an each access token 
> individually,
> rather it could revoke some access tokens by specifying conditions, 
> such as client_id, time_period, scope
> Comments?
>
> Prabath Siriwardena <prabath@wso2.com> ?? 2013-02-07 15:25:02:
>
> >
>
> > On Thu, Feb 7, 2013 at 12:49 PM, <zhou.sujing@zte.com.cn> wrote:
> >
> > I guess RO could initiate access token revocation for a client by
> > including authorization code in the request to AS.
> > Comments?
> >
> > That creates a dependency on the grant type.
> >
> > Thanks & regards,
> > -Prabath
> >
> >
> >
> >
> >
> > oauth-bounces@ietf.org ?? 2013-02-07 02:32:28:
> >
> > > Hi Torsten,
> > >
> > > Thanks for your feedback.. I will submit a draft...
> > >
> > > Thanks & regards,
> > > -Prabath
> >
> > > On Wed, Feb 6, 2013 at 11:55 PM, Torsten Lodderstedt <
> > torsten@lodderstedt.net
> > > > wrote:
> > > Hi Prabath,
> > >
> > > we tried to address both use cases in the first revisions of the
> > > draft. The API was well suited for client-driven revocation but not
> > > the resource owner - driven use case. There are definitely
> > > differences with respect to the protocol design, at least regarding
> > > authentication and authorization of the respective actors. This made
> > > the spec more complex and caused ambiguities and confusion.
> > > Moreover, the working group seemed not convinced by the the 
> latteruse case.
> > >
> > > Therefore the working group decided to focus on the single use cases
> > > of the revocation by clients. This makes a lot of sense since this
> > > interface is most important with respect to interoperability.
> > >
> > > I'm focusing right now on finishing this draft. And the open issues
> > > discussed on the list in the last couple of weeks illustrate that
> > > even this poses a considerable amount of work. So I'm very reluctant
> > > to add support for a whole new use case at that point of the process.
> > >
> > > If you feel this is an important use case worth an RFC, don't
> > > hesitate to publish a new I-D.
> > >
> > > regards,
> > > Torsten.
> > >
> > > Am 06.02.2013 um 16:37 schrieb Prabath Siriwardena <prabath@wso2.com>:
> >
> > >
> >
> > > On Wed, Feb 6, 2013 at 9:04 PM, Todd W Lainhart 
> <lainhart@us.ibm.com> wrote:
> > > > Resource owner needs to know the consumer key (represents the
> > > OAuth Client app) & scope to revoke the access token for a given 
> client.
> >
> > > I see - you're saying that requiring client credentials on the end
> > > point is the problem?
> > >
> > > In fact what I meant was - when RO authorizes the an access token
> > > for client for particular scope. Those information are kept at the 
> AS.
> > >
> > > Now - if the RO want to revoke access from the client - the RO needs
> > > to authenticate him self to the AS and pass the consumer key and the
> > > scope. So AS can revoke access.
> > >
> > > Thanks & regards,
> > > -Prabath
> > >
> > >
> > >
> > >
> > >
> > > Todd Lainhart
> > > Rational software
> > > IBM Corporation
> > > 550 King Street, Littleton, MA 01460-1250
> > > 1-978-899-4705
> > > 2-276-4705 (T/L)
> > > lainhart@us.ibm.com
> > >
> > >
> > >
> > >
> > >
> >
> > > From:        Prabath Siriwardena <prabath@wso2.com>
> > > To:        Justin Richer <jricher@mitre.org>,
> > > Cc:        "oauth@ietf.org WG" <oauth@ietf.org>
> > > Date:        02/06/2013 10:31 AM
> > > Subject:        Re: [OAUTH-WG] A question on token revocation.
> > > Sent by:        oauth-bounces@ietf.org
> > >
> > >
> > >
> > >
>
> > > On Wed, Feb 6, 2013 at 8:49 PM, Justin Richer <jricher@mitre.org> 
> wrote:
> > >
> > > On 02/06/2013 10:13 AM, Prabath Siriwardena wrote:
> > >
> > >
> > > On Wed, Feb 6, 2013 at 8:19 PM, Justin Richer <jricher@mitre.org> 
> wrote:
> > > These are generally handled through a user interface where the RO is
> > > authenticated directly to the AS, and there's not much need for a
> > > "protocol" here, in practice.
> > >
> > > Why do you think leaving access token revocation by RO to a
> > > proprietary API is a good practice ? IMO this an essential
> > > requirement in API security.
> > > I think it makes more sense in the same way that having a
> > > "proprietary" UI/API for managing the user consent makes sense:
> > > unless you're doing a fully dynamic end-to-end system like UMA, then
> > > there's not much value in trying to squeeze disparate systems into
> > > the same mold, since they won't be talking to each other anyway.
> > >
> > > This is required in distributed setup for each API platform from
> > > different vendors to perform in an interop manner.
> > >
> > >
> > > And since you refer to it as an "API", what will the RO be using to
> > > call this API? Is there a token management client that's separate
> > > from the OAuth client?
> > >
> > > I didn't get your question right... If you meant the how to invoke
> > > revocation end point, the the resource owner needs to know the
> > > consumer key (represents the OAuth Client app) & scope to revoke the
> > > access token for a given client.
> > >
> > >
> > >
> > > IMHO token revocation done my RO is more practical than token
> > > revocation done by the Client.
> > > They're both valid but require different kinds of protocols and
> > > considerations. This token revocation draft is meant to solve one
> > > problem, and that doesn't mean it can or should solve other
> > > seemingly related problems.
> > >
> > > If you would like to see the RO-initiated token revocation go
> > > through (not grant revocation, mind you -- that's related, but
> > > different), then I would suggest that you start specifying exactly
> > > how that works. I predict it will be problematic in practice,
> > > though, as the RO often doesn't actually have direct access to the
> > > token itself.
> > >
> > > Resource owner needs to know the consumer key (represents the OAuth
> > > Client app) & scope to revoke the access token for a given client.
> > >
> > >
> > >
> > >
> > > There are larger applications, like UMA, that have client and PR
> > > provisioning that would allow for this to be managed somewhat
> > > programmatically, but even in that case you're still generally doing
> > > token revocation by a "client" in some fashion. In UMA, though,
> > > several different pieces can play the role of a "client" at
> > > different parts of the process.
> > >
> > > Revoking a scope is a whole different mess. Generally, you'd want to
> > > just revoke an existing token and make a new authorization grant
> > > with lower access if you don't want that client getting that scope
> > > anymore. If you just want to downscope for a single transaction, you
> > > can already do that with either the refresh token or token chaining
> > > approaches, depending on where in the process you are. The latter of
> > > these are both client-focused, though, and the RO doesn't have a
> > > direct hand in it at this point.
> > >
> > > Why do you think it a mess. If you revoke the entire token then
> > > Client needs to go through the complete OAuth flow - and also needs
> > > to get the user consent. If RO can  downgrade the scope, then we
> > > restrict API access by the client at RS end and its transparent to
> > > the client.
> > >
> > >
> > > Downgrading the scope of tokens in the wild is hardly transparent to
> > > the client (stuff that it expects to work will suddenly start to
> > > fail, meaning that most clients will throw out the token and try to
> > > get a new one), and in a distributed system you've got to propagate
> > > that change to the RS. If you bake the scopes into the token itself
> > > (which many do) then you actually *can't* downgrade a single 
> token, anyway.
> > >
> > > Yes.. that is the expected behavior. I mean the process is
> > > transparent. Client will notice at runtime.
> > >
> > > Thanks & regards,
> > > -Prabath
> > >
> > >
> > >  -- Justin
> > >
> > >
> > > Thanks & regards,
> > > -Prabath
> > >
> > >
> > >
> > >  -- Justin
> > >
> > >
> > > On 02/06/2013 04:35 AM, Prabath Siriwardena wrote:
> > > I am sorry if this was already discussed in this list..
> > >
> > > Looking at [1] it only talks about revoking the access token from
> > the client.
> > >
> > > How about the resource owner..?
> > >
> > > There can be cases where resource owner needs to revoke an
> > > authorized access token from a given client. Or revoke an scope..
> > >
> > > How are we going to address these requirements..? Thoughts 
> appreciated...
> > >
> > > [1] http://tools.ietf.org/html/draft-ietf-oauth-revocation-04
> > >
> > > --
> > > Thanks & Regards,
> > > Prabath
> > >
> > > Mobile : +94 71 809 6732
> > >
> > > http://blog.facilelogin.com
> > > http://RampartFAQ.com
> > >
> > >
> > > _______________________________________________
> > > OAuth mailing list
> > > OAuth@ietf.org
> > > https://www.ietf.org/mailman/listinfo/oauth
> > >
> > >
> > >
> > >
> > >
> > > --
> > > Thanks & Regards,
> > > Prabath
> > >
> > > Mobile : +94 71 809 6732
> > >
> > > http://blog.facilelogin.com
> > > http://RampartFAQ.com
> > >
> > >
> > >
> > >
> > > --
> > > Thanks & Regards,
> > > Prabath
> > >
> > > Mobile : +94 71 809 6732
> > >
> > > http://blog.facilelogin.com
> > > http://RampartFAQ.com_______________________________________________
> > > OAuth mailing list
> > > OAuth@ietf.org
> > > https://www.ietf.org/mailman/listinfo/oauth
> >
> > >
> >
> > >
> > > --
> > > Thanks & Regards,
> > > Prabath
> > >
> > > Mobile : +94 71 809 6732
> > >
> > > http://blog.facilelogin.com
> > > http://RampartFAQ.com
> > > _______________________________________________
> > > OAuth mailing list
> > > OAuth@ietf.org
> > > https://www.ietf.org/mailman/listinfo/oauth
> > >
> >
> > >
> > > --
> > > Thanks & Regards,
> > > Prabath
> > >
> > > Mobile : +94 71 809 6732
> > >
> > > http://blog.facilelogin.com
> > > http://RampartFAQ.com_______________________________________________
> > > OAuth mailing list
> > > OAuth@ietf.org
> > > https://www.ietf.org/mailman/listinfo/oauth
> >
>
> >
> > --
> > Thanks & Regards,
> > Prabath
> >
> > Mobile : +94 71 809 6732
> >
> > http://blog.facilelogin.com
> > http://RampartFAQ.com
>
>
> _______________________________________________
> OAuth mailing list
> OAuth@ietf.org
> https://www.ietf.org/mailman/listinfo/oauth


--------------000004030707080301060508
Content-Type: text/html; charset="ISO-8859-1"
Content-Transfer-Encoding: 7bit

<html>
  <head>
    <meta content="text/html; charset=ISO-8859-1"
      http-equiv="Content-Type">
  </head>
  <body bgcolor="#FFFFFF" text="#000000">
    This, I think, points out that the RO is generally more concerned
    with revoking an authorization grant than a token itself, with the
    latter potentially encompassing several tokens. The revocation draft
    isn't really intended to solve that problem, as Torsten points out
    below.<br>
    <br>
    &nbsp;-- Justin<br>
    <br>
    <div class="moz-cite-prefix">On 02/07/2013 03:46 AM,
      <a class="moz-txt-link-abbreviated" href="mailto:zhou.sujing@zte.com.cn">zhou.sujing@zte.com.cn</a> wrote:<br>
    </div>
    <blockquote
cite="mid:OF5AEA0CD4.64C3AFAA-ON48257B0B.00303A67-48257B0B.00303F27@zte.com.cn"
      type="cite">
      <meta http-equiv="Content-Type" content="text/html;
        charset=ISO-8859-1">
      <br>
      <font size="2">During the four grant types of Oauth,</font>
      <br>
      <font size="2">&nbsp; 1. authorization code: RO knows the authorization
        code upon which access-tokens-to-be-revoked are issued &nbsp;</font>
      <br>
      <font size="2">&nbsp; 2. implicite flow: RO knows the
        access-tokens-to-be-revoked</font>
      <br>
      <font size="2">&nbsp; 3. password and client credential types: RO has
        no way of knowing access tokens. &nbsp; </font>
      <br>
      <br>
      <font size="2">So,IMO, &nbsp;it is not proper for RO to revoke an each
        access token individually,</font>
      <br>
      <font size="2">rather it could revoke some access tokens by
        specifying
        conditions, such as client_id, time_period, scope </font>
      <br>
      <font size="2">Comments? </font>
      <br>
      <br>
      <tt><font size="2">Prabath Siriwardena <a class="moz-txt-link-rfc2396E" href="mailto:prabath@wso2.com">&lt;prabath@wso2.com&gt;</a> &#20889;&#20110;
          2013-02-07 15:25:02:<br>
          <br>
          &gt; <br>
        </font></tt>
      <br>
      <tt><font size="2">&gt; On Thu, Feb 7, 2013 at 12:49 PM,
          <a class="moz-txt-link-rfc2396E" href="mailto:zhou.sujing@zte.com.cn">&lt;zhou.sujing@zte.com.cn&gt;</a>
          wrote:</font></tt>
      <br>
      <tt><font size="2">&gt; <br>
          &gt; I guess RO could initiate access token revocation for a
          client by
          <br>
          &gt; including authorization code in the request to AS. <br>
          &gt; Comments? </font></tt>
      <br>
      <tt><font size="2">&gt; <br>
          &gt; That creates a dependency on the grant type.</font></tt>
      <br>
      <tt><font size="2">&gt; <br>
          &gt; Thanks &amp; regards,</font></tt>
      <br>
      <tt><font size="2">&gt; -Prabath</font></tt>
      <br>
      <tt><font size="2">&gt; &nbsp;</font></tt>
      <br>
      <tt><font size="2">&gt; <br>
          &gt; <br>
          &gt; <br>
          &gt; <br>
          &gt; <a class="moz-txt-link-abbreviated" href="mailto:oauth-bounces@ietf.org">oauth-bounces@ietf.org</a> &#20889;&#20110; 2013-02-07 02:32:28:<br>
          &gt; <br>
          &gt; &gt; Hi Torsten, </font></tt>
      <br>
      <tt><font size="2">&gt; &gt; <br>
          &gt; &gt; Thanks for your feedback.. I will submit a draft...
          <br>
          &gt; &gt; <br>
          &gt; &gt; Thanks &amp; regards, <br>
          &gt; &gt; -Prabath<br>
          &gt; <br>
          &gt; &gt; On Wed, Feb 6, 2013 at 11:55 PM, Torsten Lodderstedt
          &lt;<br>
          &gt; <a class="moz-txt-link-abbreviated" href="mailto:torsten@lodderstedt.net">torsten@lodderstedt.net</a><br>
          &gt; &gt; &gt; wrote: <br>
          &gt; &gt; Hi Prabath, <br>
          &gt; &gt; <br>
          &gt; &gt; we tried to address both use cases in the first
          revisions of
          the <br>
          &gt; &gt; draft. The API was well suited for client-driven
          revocation but
          not <br>
          &gt; &gt; the resource owner - driven use case. There are
          definitely <br>
          &gt; &gt; differences with respect to the protocol design, at
          least regarding
          <br>
          &gt; &gt; authentication and authorization of the respective
          actors. This
          made<br>
          &gt; &gt; the spec more complex and caused ambiguities and
          confusion. <br>
          &gt; &gt; Moreover, the working group seemed not convinced by
          the the latteruse
          case.<br>
          &gt; &gt; <br>
          &gt; &gt; Therefore the working group decided to focus on the
          single use
          cases<br>
          &gt; &gt; of the revocation by clients. This makes a lot of
          sense since
          this <br>
          &gt; &gt; interface is most important with respect to
          interoperability.
          <br>
          &gt; &gt; <br>
          &gt; &gt; I'm focusing right now on finishing this draft. And
          the open
          issues <br>
          &gt; &gt; discussed on the list in the last couple of weeks
          illustrate
          that <br>
          &gt; &gt; even this poses a considerable amount of work. So
          I'm very reluctant<br>
          &gt; &gt; to add support for a whole new use case at that
          point of the
          process. <br>
          &gt; &gt; <br>
          &gt; &gt; If you feel this is an important use case worth an
          RFC, don't
          <br>
          &gt; &gt; hesitate to publish a new I-D. <br>
          &gt; &gt; <br>
          &gt; &gt; regards, <br>
          &gt; &gt; Torsten. <br>
          &gt; &gt; <br>
          &gt; &gt; Am 06.02.2013 um 16:37 schrieb Prabath Siriwardena
          <a class="moz-txt-link-rfc2396E" href="mailto:prabath@wso2.com">&lt;prabath@wso2.com&gt;</a>:<br>
          &gt; <br>
          &gt; &gt; <br>
          &gt; <br>
          &gt; &gt; On Wed, Feb 6, 2013 at 9:04 PM, Todd W Lainhart
          <a class="moz-txt-link-rfc2396E" href="mailto:lainhart@us.ibm.com">&lt;lainhart@us.ibm.com&gt;</a>
          wrote:<br>
          &gt; &gt; &gt; Resource owner needs to know the consumer key
          (represents
          the <br>
          &gt; &gt; OAuth Client app) &amp; scope to revoke the access
          token for
          a given client. &nbsp;<br>
          &gt; <br>
          &gt; &gt; I see - you're saying that requiring client
          credentials on the
          end <br>
          &gt; &gt; point is the problem? <br>
          &gt; &gt; <br>
          &gt; &gt; In fact what I meant was - when RO authorizes the an
          access token
          <br>
          &gt; &gt; for client for particular scope. Those information
          are kept at
          the AS. <br>
          &gt; &gt; <br>
          &gt; &gt; Now - if the RO want to revoke access from the
          client - the RO
          needs<br>
          &gt; &gt; to authenticate him self to the AS and pass the
          consumer key
          and the<br>
          &gt; &gt; scope. So AS can revoke access. <br>
          &gt; &gt; <br>
          &gt; &gt; Thanks &amp; regards, <br>
          &gt; &gt; -Prabath <br>
          &gt; &gt; &nbsp; <br>
          &gt; &gt; <br>
          &gt; &gt; <br>
          &gt; &gt; <br>
          &gt; &gt; <br>
          &gt; &gt; Todd Lainhart<br>
          &gt; &gt; Rational software<br>
          &gt; &gt; IBM Corporation<br>
          &gt; &gt; 550 King Street, Littleton, MA 01460-1250<br>
          &gt; &gt; 1-978-899-4705<br>
          &gt; &gt; 2-276-4705 (T/L)<br>
          &gt; &gt; <a class="moz-txt-link-abbreviated" href="mailto:lainhart@us.ibm.com">lainhart@us.ibm.com</a> <br>
          &gt; &gt; <br>
          &gt; &gt; <br>
          &gt; &gt; <br>
          &gt; &gt; <br>
          &gt; &gt; <br>
          &gt; <br>
          &gt; &gt; From: &nbsp; &nbsp; &nbsp; &nbsp;Prabath Siriwardena
          <a class="moz-txt-link-rfc2396E" href="mailto:prabath@wso2.com">&lt;prabath@wso2.com&gt;</a>
          <br>
          &gt; &gt; To: &nbsp; &nbsp; &nbsp; &nbsp;Justin Richer <a class="moz-txt-link-rfc2396E" href="mailto:jricher@mitre.org">&lt;jricher@mitre.org&gt;</a>,
          <br>
          &gt; &gt; Cc: &nbsp; &nbsp; &nbsp; &nbsp;<a class="moz-txt-link-rfc2396E" href="mailto:oauth@ietf.orgWG">"oauth@ietf.org WG"</a>
          <a class="moz-txt-link-rfc2396E" href="mailto:oauth@ietf.org">&lt;oauth@ietf.org&gt;</a> <br>
          &gt; &gt; Date: &nbsp; &nbsp; &nbsp; &nbsp;02/06/2013 10:31 AM <br>
          &gt; &gt; Subject: &nbsp; &nbsp; &nbsp; &nbsp;Re: [OAUTH-WG] A question
          on token revocation. <br>
          &gt; &gt; Sent by: &nbsp; &nbsp; &nbsp; &nbsp;<a class="moz-txt-link-abbreviated" href="mailto:oauth-bounces@ietf.org">oauth-bounces@ietf.org</a> <br>
          &gt; &gt; <br>
          &gt; &gt; <br>
          &gt; &gt; <br>
          &gt; &gt; <br>
        </font></tt>
      <br>
      <tt><font size="2">&gt; &gt; On Wed, Feb 6, 2013 at 8:49 PM,
          Justin Richer
          <a class="moz-txt-link-rfc2396E" href="mailto:jricher@mitre.org">&lt;jricher@mitre.org&gt;</a> wrote: <br>
          &gt; &gt; <br>
          &gt; &gt; On 02/06/2013 10:13 AM, Prabath Siriwardena wrote: <br>
          &gt; &gt; <br>
          &gt; &gt; <br>
          &gt; &gt; On Wed, Feb 6, 2013 at 8:19 PM, Justin Richer
          <a class="moz-txt-link-rfc2396E" href="mailto:jricher@mitre.org">&lt;jricher@mitre.org&gt;</a>
          wrote: <br>
          &gt; &gt; These are generally handled through a user interface
          where the
          RO is<br>
          &gt; &gt; authenticated directly to the AS, and there's not
          much need for
          a <br>
          &gt; &gt; "protocol" here, in practice. <br>
          &gt; &gt; <br>
          &gt; &gt; Why do you think leaving access token revocation by
          RO to a <br>
          &gt; &gt; proprietary API is a good practice ? IMO this an
          essential <br>
          &gt; &gt; requirement in API security. <br>
          &gt; &gt; I think it makes more sense in the same way that
          having a <br>
          &gt; &gt; "proprietary" UI/API for managing the user consent
          makes sense: <br>
          &gt; &gt; unless you're doing a fully dynamic end-to-end
          system like UMA,
          then<br>
          &gt; &gt; there's not much value in trying to squeeze
          disparate systems
          into <br>
          &gt; &gt; the same mold, since they won't be talking to each
          other anyway.
          <br>
          &gt; &gt; <br>
          &gt; &gt; This is required in distributed setup for each API
          platform from
          <br>
          &gt; &gt; different vendors to perform in an interop manner. <br>
          &gt; &gt; &nbsp; <br>
          &gt; &gt; <br>
          &gt; &gt; And since you refer to it as an "API", what will the
          RO be using to <br>
          &gt; &gt; call this API? Is there a token management client
          that's separate
          <br>
          &gt; &gt; from the OAuth client? <br>
          &gt; &gt; <br>
          &gt; &gt; I didn't get your question right... If you meant the
          how to invoke
          <br>
          &gt; &gt; revocation end point, the the resource owner needs
          to know the
          <br>
          &gt; &gt; consumer key (represents the OAuth Client app) &amp;
          scope to
          revoke the<br>
          &gt; &gt; access token for a given client. &nbsp;<br>
          &gt; &gt; <br>
          &gt; &gt; <br>
          &gt; &gt; <br>
          &gt; &gt; IMHO token revocation done my RO is more practical
          than token
          <br>
          &gt; &gt; revocation done by the Client. <br>
          &gt; &gt; They're both valid but require different kinds of
          protocols and
          <br>
          &gt; &gt; considerations. This token revocation draft is meant
          to solve
          one <br>
          &gt; &gt; problem, and that doesn't mean it can or should
          solve other <br>
          &gt; &gt; seemingly related problems.<br>
          &gt; &gt; <br>
          &gt; &gt; If you would like to see the RO-initiated token
          revocation go
          <br>
          &gt; &gt; through (not grant revocation, mind you -- that's
          related, but
          <br>
          &gt; &gt; different), then I would suggest that you start
          specifying exactly
          <br>
          &gt; &gt; how that works. I predict it will be problematic in
          practice,
          <br>
          &gt; &gt; though, as the RO often doesn't actually have direct
          access to
          the <br>
          &gt; &gt; token itself. <br>
          &gt; &gt; <br>
          &gt; &gt; Resource owner needs to know the consumer key
          (represents the
          OAuth <br>
          &gt; &gt; Client app) &amp; scope to revoke the access token
          for a given
          client. &nbsp;<br>
          &gt; &gt; <br>
          &gt; &gt; &nbsp; <br>
          &gt; &gt; <br>
          &gt; &gt; &nbsp; <br>
          &gt; &gt; There are larger applications, like UMA, that have
          client and
          PR <br>
          &gt; &gt; provisioning that would allow for this to be managed
          somewhat
          <br>
          &gt; &gt; programmatically, but even in that case you're still
          generally
          doing<br>
          &gt; &gt; token revocation by a "client" in some fashion. In
          UMA, though, <br>
          &gt; &gt; several different pieces can play the role of a
          "client"
          at <br>
          &gt; &gt; different parts of the process.<br>
          &gt; &gt; <br>
          &gt; &gt; Revoking a scope is a whole different mess.
          Generally, you'd
          want to<br>
          &gt; &gt; just revoke an existing token and make a new
          authorization grant
          <br>
          &gt; &gt; with lower access if you don't want that client
          getting that
          scope <br>
          &gt; &gt; anymore. If you just want to downscope for a single
          transaction,
          you<br>
          &gt; &gt; can already do that with either the refresh token or
          token chaining
          <br>
          &gt; &gt; approaches, depending on where in the process you
          are. The latter
          of<br>
          &gt; &gt; these are both client-focused, though, and the RO
          doesn't have
          a <br>
          &gt; &gt; direct hand in it at this point. <br>
          &gt; &gt; <br>
          &gt; &gt; Why do you think it a mess. If you revoke the entire
          token then
          <br>
          &gt; &gt; Client needs to go through the complete OAuth flow -
          and also
          needs <br>
          &gt; &gt; to get the user consent. If RO can &nbsp;downgrade the
          scope,
          then we <br>
          &gt; &gt; restrict API access by the client at RS end and its
          transparent
          to <br>
          &gt; &gt; the client. <br>
          &gt; &gt; <br>
          &gt; &gt; <br>
          &gt; &gt; Downgrading the scope of tokens in the wild is
          hardly transparent
          to<br>
          &gt; &gt; the client (stuff that it expects to work will
          suddenly start
          to <br>
          &gt; &gt; fail, meaning that most clients will throw out the
          token and
          try to <br>
          &gt; &gt; get a new one), and in a distributed system you've
          got to propagate
          <br>
          &gt; &gt; that change to the RS. If you bake the scopes into
          the token
          itself <br>
          &gt; &gt; (which many do) then you actually *can't* downgrade
          a single
          token, anyway. <br>
          &gt; &gt; <br>
          &gt; &gt; Yes.. that is the expected behavior. I mean the
          process is <br>
          &gt; &gt; transparent. Client will notice at runtime. <br>
          &gt; &gt; <br>
          &gt; &gt; Thanks &amp; regards, <br>
          &gt; &gt; -Prabath <br>
          &gt; &gt; &nbsp; <br>
          &gt; &gt; <br>
          &gt; &gt; &nbsp;-- Justin <br>
          &gt; &gt; <br>
          &gt; &gt; <br>
          &gt; &gt; Thanks &amp; regards, <br>
          &gt; &gt; -Prabath <br>
          &gt; &gt; &nbsp; <br>
          &gt; &gt; <br>
          &gt; &gt; <br>
          &gt; &gt; &nbsp;-- Justin <br>
          &gt; &gt; <br>
          &gt; &gt; <br>
          &gt; &gt; On 02/06/2013 04:35 AM, Prabath Siriwardena wrote: <br>
          &gt; &gt; I am sorry if this was already discussed in this
          list.. &nbsp;<br>
          &gt; &gt; <br>
          &gt; &gt; Looking at [1] it only talks about revoking the
          access token
          from <br>
          &gt; the client. <br>
          &gt; &gt; <br>
          &gt; &gt; How about the resource owner..? <br>
          &gt; &gt; <br>
          &gt; &gt; There can be cases where resource owner needs to
          revoke an <br>
          &gt; &gt; authorized access token from a given client. Or
          revoke an scope..
          <br>
          &gt; &gt; <br>
          &gt; &gt; How are we going to address these requirements..?
          Thoughts appreciated...
          <br>
          &gt; &gt; <br>
          &gt; &gt; [1]
          <a class="moz-txt-link-freetext" href="http://tools.ietf.org/html/draft-ietf-oauth-revocation-04">http://tools.ietf.org/html/draft-ietf-oauth-revocation-04</a>
          <br>
          &gt; &gt; <br>
          &gt; &gt; -- <br>
          &gt; &gt; Thanks &amp; Regards,<br>
          &gt; &gt; Prabath <br>
          &gt; &gt; <br>
          &gt; &gt; Mobile : +94 71 809 6732 <br>
          &gt; &gt; <br>
          &gt; &gt; <a class="moz-txt-link-freetext" href="http://blog.facilelogin.com">http://blog.facilelogin.com</a><br>
          &gt; &gt; <a class="moz-txt-link-freetext" href="http://RampartFAQ.com">http://RampartFAQ.com</a> <br>
          &gt; &gt; <br>
          &gt; &gt; <br>
          &gt; &gt; _______________________________________________<br>
          &gt; &gt; OAuth mailing list<br>
          &gt; &gt; <a class="moz-txt-link-abbreviated" href="mailto:OAuth@ietf.org">OAuth@ietf.org</a><br>
          &gt; &gt; <a class="moz-txt-link-freetext" href="https://www.ietf.org/mailman/listinfo/oauth">https://www.ietf.org/mailman/listinfo/oauth</a><br>
          &gt; &gt; <br>
          &gt; &gt; <br>
          &gt; &gt; <br>
          &gt; &gt; <br>
          &gt; &gt; <br>
          &gt; &gt; -- <br>
          &gt; &gt; Thanks &amp; Regards,<br>
          &gt; &gt; Prabath <br>
          &gt; &gt; <br>
          &gt; &gt; Mobile : +94 71 809 6732 <br>
          &gt; &gt; <br>
          &gt; &gt; <a class="moz-txt-link-freetext" href="http://blog.facilelogin.com">http://blog.facilelogin.com</a><br>
          &gt; &gt; <a class="moz-txt-link-freetext" href="http://RampartFAQ.com">http://RampartFAQ.com</a> <br>
          &gt; &gt; <br>
          &gt; &gt; <br>
          &gt; &gt; <br>
          &gt; &gt; <br>
          &gt; &gt; -- <br>
          &gt; &gt; Thanks &amp; Regards,<br>
          &gt; &gt; Prabath <br>
          &gt; &gt; <br>
          &gt; &gt; Mobile : +94 71 809 6732 <br>
          &gt; &gt; <br>
          &gt; &gt; <a class="moz-txt-link-freetext" href="http://blog.facilelogin.com">http://blog.facilelogin.com</a> <br>
          &gt; &gt;
          <a class="moz-txt-link-freetext" href="http://RampartFAQ.com_______________________________________________">http://RampartFAQ.com_______________________________________________</a><br>
          &gt; &gt; OAuth mailing list<br>
          &gt; &gt; <a class="moz-txt-link-abbreviated" href="mailto:OAuth@ietf.org">OAuth@ietf.org</a><br>
          &gt; &gt; <a class="moz-txt-link-freetext" href="https://www.ietf.org/mailman/listinfo/oauth">https://www.ietf.org/mailman/listinfo/oauth</a><br>
          &gt; <br>
          &gt; &gt; <br>
          &gt; <br>
          &gt; &gt; <br>
          &gt; &gt; -- <br>
          &gt; &gt; Thanks &amp; Regards,<br>
          &gt; &gt; Prabath <br>
          &gt; &gt; <br>
          &gt; &gt; Mobile : +94 71 809 6732 <br>
          &gt; &gt; <br>
          &gt; &gt; <a class="moz-txt-link-freetext" href="http://blog.facilelogin.com">http://blog.facilelogin.com</a><br>
          &gt; &gt; <a class="moz-txt-link-freetext" href="http://RampartFAQ.com">http://RampartFAQ.com</a> <br>
          &gt; &gt; _______________________________________________<br>
          &gt; &gt; OAuth mailing list<br>
          &gt; &gt; <a class="moz-txt-link-abbreviated" href="mailto:OAuth@ietf.org">OAuth@ietf.org</a><br>
          &gt; &gt; <a class="moz-txt-link-freetext" href="https://www.ietf.org/mailman/listinfo/oauth">https://www.ietf.org/mailman/listinfo/oauth</a> <br>
          &gt; &gt; <br>
          &gt; <br>
          &gt; &gt; <br>
          &gt; &gt; -- <br>
          &gt; &gt; Thanks &amp; Regards,<br>
          &gt; &gt; Prabath <br>
          &gt; &gt; <br>
          &gt; &gt; Mobile : +94 71 809 6732 <br>
          &gt; &gt; <br>
          &gt; &gt; <a class="moz-txt-link-freetext" href="http://blog.facilelogin.com">http://blog.facilelogin.com</a><br>
          &gt; &gt;
          <a class="moz-txt-link-freetext" href="http://RampartFAQ.com_______________________________________________">http://RampartFAQ.com_______________________________________________</a><br>
          &gt; &gt; OAuth mailing list<br>
          &gt; &gt; <a class="moz-txt-link-abbreviated" href="mailto:OAuth@ietf.org">OAuth@ietf.org</a><br>
          &gt; &gt; <a class="moz-txt-link-freetext" href="https://www.ietf.org/mailman/listinfo/oauth">https://www.ietf.org/mailman/listinfo/oauth</a></font></tt>
      <br>
      <tt><font size="2">&gt; <br>
        </font></tt>
      <br>
      <tt><font size="2">&gt; <br>
          &gt; -- <br>
          &gt; Thanks &amp; Regards,<br>
          &gt; Prabath</font></tt>
      <br>
      <tt><font size="2">&gt; <br>
          &gt; Mobile : +94 71 809 6732 <br>
          &gt; <br>
          &gt; <a class="moz-txt-link-freetext" href="http://blog.facilelogin.com">http://blog.facilelogin.com</a><br>
          &gt; <a class="moz-txt-link-freetext" href="http://RampartFAQ.com">http://RampartFAQ.com</a></font></tt>
      <br>
      <fieldset class="mimeAttachmentHeader"></fieldset>
      <br>
      <pre wrap="">_______________________________________________
OAuth mailing list
<a class="moz-txt-link-abbreviated" href="mailto:OAuth@ietf.org">OAuth@ietf.org</a>
<a class="moz-txt-link-freetext" href="https://www.ietf.org/mailman/listinfo/oauth">https://www.ietf.org/mailman/listinfo/oauth</a>
</pre>
    </blockquote>
    <br>
  </body>
</html>

--------------000004030707080301060508--

From prabath@wso2.com  Thu Feb  7 08:26:31 2013
Return-Path: <prabath@wso2.com>
X-Original-To: oauth@ietfa.amsl.com
Delivered-To: oauth@ietfa.amsl.com
Received: from localhost (localhost [127.0.0.1]) by ietfa.amsl.com (Postfix) with ESMTP id 4D78F21F842D for <oauth@ietfa.amsl.com>; Thu,  7 Feb 2013 08:26:31 -0800 (PST)
X-Virus-Scanned: amavisd-new at amsl.com
X-Spam-Flag: NO
X-Spam-Score: -2.823
X-Spam-Level: 
X-Spam-Status: No, score=-2.823 tagged_above=-999 required=5 tests=[AWL=0.153,  BAYES_00=-2.599, FM_FORGED_GMAIL=0.622, HTML_MESSAGE=0.001, RCVD_IN_DNSWL_LOW=-1]
Received: from mail.ietf.org ([64.170.98.30]) by localhost (ietfa.amsl.com [127.0.0.1]) (amavisd-new, port 10024) with ESMTP id GMsHdUgBvhu1 for <oauth@ietfa.amsl.com>; Thu,  7 Feb 2013 08:26:30 -0800 (PST)
Received: from mail-ee0-f50.google.com (mail-ee0-f50.google.com [74.125.83.50]) by ietfa.amsl.com (Postfix) with ESMTP id DAF8121F81FF for <oauth@ietf.org>; Thu,  7 Feb 2013 08:26:29 -0800 (PST)
Received: by mail-ee0-f50.google.com with SMTP id e51so1525136eek.23 for <oauth@ietf.org>; Thu, 07 Feb 2013 08:26:29 -0800 (PST)
X-Google-DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=google.com; s=20120113; h=mime-version:x-received:in-reply-to:references:date:message-id :subject:from:to:cc:content-type:x-gm-message-state; bh=wXD/BolpUDUFKFZHli94v9GyyW6+VGdfjxFWfEZUIRU=; b=ggv4HxuGpE4HtmW1Yw30SU+HMGuMlbTQuRGlyLgvqyA1DD/EjP1fA6wNDVKfT5Jijo u3GkTjs30uNFRZPMFEuRAejjX7skCaRPAfLxAYXhkQjRbWhxPeFCHk7/bIEqB3gtztqL /UIgO4goN0SnmzNRQezwYjgHsE7xAl02BHm8bkHGHDmPd99do0BsTsRVjkErv2WBbx9o Pqgm8oi8MyH2GEnZpOXwvKpRbiO4SbCRkMRpRUzdqdI55qxGKOaK6pawn0TjNcVmmeAE 8bDhP0pzKIiby1j/ZmBofDdIXM3m/e43skP7ssHHa5O5wbGA61iJrYy6vlq8dYftF1Zv Xh0w==
MIME-Version: 1.0
X-Received: by 10.14.194.195 with SMTP id m43mr5409058een.44.1360254388588; Thu, 07 Feb 2013 08:26:28 -0800 (PST)
Received: by 10.223.175.134 with HTTP; Thu, 7 Feb 2013 08:26:28 -0800 (PST)
In-Reply-To: <5113C3AA.1040701@mitre.org>
References: <20130206192420.32698.21027.idtracker@ietfa.amsl.com> <5112AE0B.1080501@mitre.org> <CAJV9qO_8-4FowrXK=ae-+xMjiJFP04ryVMLQ8SGUH8kp3PHrLg@mail.gmail.com> <5113C3AA.1040701@mitre.org>
Date: Thu, 7 Feb 2013 21:56:28 +0530
Message-ID: <CAJV9qO8BVV57eAb5kUNes15AYOpUKqw5XWQswh-FJA=b1pPgSA@mail.gmail.com>
From: Prabath Siriwardena <prabath@wso2.com>
To: Justin Richer <jricher@mitre.org>
Content-Type: multipart/alternative; boundary=047d7b342c4ca2d27b04d524e790
X-Gm-Message-State: ALoCoQmtJDCEY0gxu6NAiKjg/2FxsP7TcUGKulxAmK4LrjX3yG92g94APqKK6h/OTwFhpk1QttX5
Cc: "oauth@ietf.org" <oauth@ietf.org>
Subject: Re: [OAUTH-WG] Fwd: New Version Notification for draft-richer-oauth-introspection-02.txt
X-BeenThere: oauth@ietf.org
X-Mailman-Version: 2.1.12
Precedence: list
List-Id: OAUTH WG <oauth.ietf.org>
List-Unsubscribe: <https://www.ietf.org/mailman/options/oauth>, <mailto:oauth-request@ietf.org?subject=unsubscribe>
List-Archive: <http://www.ietf.org/mail-archive/web/oauth>
List-Post: <mailto:oauth@ietf.org>
List-Help: <mailto:oauth-request@ietf.org?subject=help>
List-Subscribe: <https://www.ietf.org/mailman/listinfo/oauth>, <mailto:oauth-request@ietf.org?subject=subscribe>
X-List-Received-Date: Thu, 07 Feb 2013 16:26:31 -0000

--047d7b342c4ca2d27b04d524e790
Content-Type: text/plain; charset=ISO-8859-1

Okay.. I was thinking this could be used as a way to validate the token as
well. BTW even in this case shouldn't communicate the type of token to AS?
For example in the case of SAML profile - it could be SAML token..

Thanks & regards,
-Prabath

On Thu, Feb 7, 2013 at 8:39 PM, Justin Richer <jricher@mitre.org> wrote:

>  "valid" might not be the best term, but it's meant to be a field where
> the server says "yes this token is still good" or "no this token isn't good
> anymore". We could instead do this with HTTP codes or something but I went
> with a pure JSON response.
>
>  -- Justin
>
>
> On 02/06/2013 10:47 PM, Prabath Siriwardena wrote:
>
> Hi Justin,
>
>  I believe this is addressing one of the key missing part in OAuth 2.0...
>
>  One question - I guess this was discussed already...
>
>  In the spec - in the introspection response it has the attribute "valid"
> - this is basically the validity of the token provided in the request.
>
>  Validation criteria depends on the token and well as token type (
> Bearer, MAC..).
>
>  In the spec it seems like it's coupled with Bearer token type... But I
> guess, by adding "token_type" to the request we can remove this dependency.
>
>  WDYT..?
>
>  Thanks & regards,
> -Prabath
>
> On Thu, Feb 7, 2013 at 12:54 AM, Justin Richer <jricher@mitre.org> wrote:
>
>>  Updated introspection draft based on recent comments. Changes include:
>>
>>  - "scope" return parameter now follows RFC6749 format instead of JSON
>> array
>>  - "subject" -> "sub", and "audience" -> "aud", to be parallel with JWT
>> claims
>>  - clarified what happens if the authentication is bad
>>
>>  -- Justin
>>
>>
>> -------- Original Message --------  Subject: New Version Notification
>> for draft-richer-oauth-introspection-02.txt  Date: Wed, 6 Feb 2013
>> 11:24:20 -0800  From: <internet-drafts@ietf.org><internet-drafts@ietf.org>  To:
>> <jricher@mitre.org> <jricher@mitre.org>
>>
>> A new version of I-D, draft-richer-oauth-introspection-02.txt
>> has been successfully submitted by Justin Richer and posted to the
>> IETF repository.
>>
>> Filename:	 draft-richer-oauth-introspection
>> Revision:	 02
>> Title:		 OAuth Token Introspection
>> Creation date:	 2013-02-06
>> WG ID:		 Individual Submission
>> Number of pages: 6
>> URL:             http://www.ietf.org/internet-drafts/draft-richer-oauth-introspection-02.txt
>> Status:          http://datatracker.ietf.org/doc/draft-richer-oauth-introspection
>> Htmlized:        http://tools.ietf.org/html/draft-richer-oauth-introspection-02
>> Diff:            http://www.ietf.org/rfcdiff?url2=draft-richer-oauth-introspection-02
>>
>> Abstract:
>>    This specification defines a method for a client or protected
>>    resource to query an OAuth authorization server to determine meta-
>>    information about an OAuth token.
>>
>>
>>
>>
>>
>> The IETF Secretariat
>>
>>
>>
>>
>>
>> _______________________________________________
>> OAuth mailing list
>> OAuth@ietf.org
>> https://www.ietf.org/mailman/listinfo/oauth
>>
>>
>
>
>  --
> Thanks & Regards,
> Prabath
>
>  Mobile : +94 71 809 6732
>
> http://blog.facilelogin.com
> http://RampartFAQ.com
>
>
>


-- 
Thanks & Regards,
Prabath

Mobile : +94 71 809 6732

http://blog.facilelogin.com
http://RampartFAQ.com

--047d7b342c4ca2d27b04d524e790
Content-Type: text/html; charset=ISO-8859-1
Content-Transfer-Encoding: quoted-printable

Okay.. I was thinking this could be used as a way to validate the token as =
well. BTW even in this case shouldn&#39;t communicate the type of token to =
AS? For example in the case of SAML profile - it could be SAML token..<div>
<br></div><div>Thanks &amp; regards,</div><div>-Prabath<br><br><div class=
=3D"gmail_quote">On Thu, Feb 7, 2013 at 8:39 PM, Justin Richer <span dir=3D=
"ltr">&lt;<a href=3D"mailto:jricher@mitre.org" target=3D"_blank">jricher@mi=
tre.org</a>&gt;</span> wrote:<br>
<blockquote class=3D"gmail_quote" style=3D"margin:0 0 0 .8ex;border-left:1p=
x #ccc solid;padding-left:1ex">
 =20
   =20
 =20
  <div bgcolor=3D"#FFFFFF" text=3D"#000000">
    &quot;valid&quot; might not be the best term, but it&#39;s meant to be =
a field
    where the server says &quot;yes this token is still good&quot; or &quot=
;no this
    token isn&#39;t good anymore&quot;. We could instead do this with HTTP =
codes
    or something but I went with a pure JSON response.<span class=3D"HOEnZb=
"><font color=3D"#888888"><br>
    <br>
    =A0-- Justin</font></span><div><div class=3D"h5"><br>
    <br>
    <div>On 02/06/2013 10:47 PM, Prabath
      Siriwardena wrote:<br>
    </div>
    <blockquote type=3D"cite">
     =20
      Hi Justin,
      <div><br>
      </div>
      <div>I believe this is addressing one of the key missing part in
        OAuth 2.0...</div>
      <div><br>
      </div>
      <div>One question - I guess this was discussed already...</div>
      <div><br>
      </div>
      <div>In the spec - in the introspection response it has the
        attribute &quot;valid&quot; - this is basically the validity of the=
 token
        provided in the request.</div>
      <div><br>
      </div>
      <div>Validation=A0criteria depends on the token and well as token
        type ( Bearer, MAC..).</div>
      <div><br>
      </div>
      <div>In the spec it seems like it&#39;s coupled with Bearer token
        type... But I guess, by adding &quot;token_type&quot; to the reques=
t we
        can remove this dependency.</div>
      <div><br>
      </div>
      <div>WDYT..?</div>
      <div><br>
      </div>
      <div>Thanks &amp; regards,</div>
      <div>-Prabath=A0</div>
      <div><br>
        <div class=3D"gmail_quote">On Thu, Feb 7, 2013 at 12:54 AM, Justin
          Richer <span dir=3D"ltr">&lt;<a href=3D"mailto:jricher@mitre.org"=
 target=3D"_blank">jricher@mitre.org</a>&gt;</span>
          wrote:<br>
          <blockquote class=3D"gmail_quote" style=3D"margin:0 0 0 .8ex;bord=
er-left:1px #ccc solid;padding-left:1ex">
            <div bgcolor=3D"#FFFFFF" text=3D"#000000"> Updated introspectio=
n
              draft based on recent comments. Changes include:<br>
              <br>
              =A0- &quot;scope&quot; return parameter now follows RFC6749 f=
ormat
              instead of JSON array<br>
              =A0- &quot;subject&quot; -&gt; &quot;sub&quot;, and &quot;aud=
ience&quot; -&gt; &quot;aud&quot;, to
              be parallel with JWT claims<br>
              =A0- clarified what happens if the authentication is bad<br>
              <br>
              =A0-- Justin<br>
              <div><br>
                <br>
                -------- Original Message --------
                <table border=3D"0" cellpadding=3D"0" cellspacing=3D"0">
                  <tbody>
                    <tr>
                      <th align=3D"RIGHT" nowrap valign=3D"BASELINE">Subjec=
t: </th>
                      <td>New Version Notification for
                        draft-richer-oauth-introspection-02.txt</td>
                    </tr>
                    <tr>
                      <th align=3D"RIGHT" nowrap valign=3D"BASELINE">Date: =
</th>
                      <td>Wed, 6 Feb 2013 11:24:20 -0800</td>
                    </tr>
                    <tr>
                      <th align=3D"RIGHT" nowrap valign=3D"BASELINE">From: =
</th>
                      <td><a href=3D"mailto:internet-drafts@ietf.org" targe=
t=3D"_blank">&lt;internet-drafts@ietf.org&gt;</a></td>
                    </tr>
                    <tr>
                      <th align=3D"RIGHT" nowrap valign=3D"BASELINE">To: </=
th>
                      <td><a href=3D"mailto:jricher@mitre.org" target=3D"_b=
lank">&lt;jricher@mitre.org&gt;</a></td>
                    </tr>
                  </tbody>
                </table>
                <br>
                <br>
                <pre>A new version of I-D, draft-richer-oauth-introspection=
-02.txt
has been successfully submitted by Justin Richer and posted to the
IETF repository.

Filename:	 draft-richer-oauth-introspection
Revision:	 02
Title:		 OAuth Token Introspection
Creation date:	 2013-02-06
WG ID:		 Individual Submission
Number of pages: 6
URL:             <a href=3D"http://www.ietf.org/internet-drafts/draft-riche=
r-oauth-introspection-02.txt" target=3D"_blank">http://www.ietf.org/interne=
t-drafts/draft-richer-oauth-introspection-02.txt</a>
Status:          <a href=3D"http://datatracker.ietf.org/doc/draft-richer-oa=
uth-introspection" target=3D"_blank">http://datatracker.ietf.org/doc/draft-=
richer-oauth-introspection</a>
Htmlized:        <a href=3D"http://tools.ietf.org/html/draft-richer-oauth-i=
ntrospection-02" target=3D"_blank">http://tools.ietf.org/html/draft-richer-=
oauth-introspection-02</a>
Diff:            <a href=3D"http://www.ietf.org/rfcdiff?url2=3Ddraft-richer=
-oauth-introspection-02" target=3D"_blank">http://www.ietf.org/rfcdiff?url2=
=3Ddraft-richer-oauth-introspection-02</a>

Abstract:
   This specification defines a method for a client or protected
   resource to query an OAuth authorization server to determine meta-
   information about an OAuth token.


                                                                           =
      =20


The IETF Secretariat

</pre>
                <br>
              </div>
              <br>
            </div>
            <br>
            _______________________________________________<br>
            OAuth mailing list<br>
            <a href=3D"mailto:OAuth@ietf.org" target=3D"_blank">OAuth@ietf.=
org</a><br>
            <a href=3D"https://www.ietf.org/mailman/listinfo/oauth" target=
=3D"_blank">https://www.ietf.org/mailman/listinfo/oauth</a><br>
            <br>
          </blockquote>
        </div>
        <br>
        <br clear=3D"all">
        <div><br>
        </div>
        -- <br>
        Thanks &amp; Regards,<br>
        Prabath
        <div><br>
        </div>
        <div>Mobile : <a href=3D"tel:%2B94%2071%20809%206732" value=3D"+947=
18096732" target=3D"_blank">+94 71 809 6732</a>=A0<br>
          <br>
          <a href=3D"http://blog.facilelogin.com" target=3D"_blank">http://=
blog.facilelogin.com</a><br>
          <a href=3D"http://RampartFAQ.com" target=3D"_blank">http://Rampar=
tFAQ.com</a></div>
      </div>
    </blockquote>
    <br>
  </div></div></div>

</blockquote></div><br><br clear=3D"all"><div><br></div>-- <br>Thanks &amp;=
 Regards,<br>Prabath<div><br></div><div>Mobile : +94 71 809 6732=A0<br><br>=
<a href=3D"http://blog.facilelogin.com" target=3D"_blank">http://blog.facil=
elogin.com</a><br>
<a href=3D"http://RampartFAQ.com" target=3D"_blank">http://RampartFAQ.com</=
a></div>
</div>

--047d7b342c4ca2d27b04d524e790--

From jricher@mitre.org  Thu Feb  7 09:01:13 2013
Return-Path: <jricher@mitre.org>
X-Original-To: oauth@ietfa.amsl.com
Delivered-To: oauth@ietfa.amsl.com
Received: from localhost (localhost [127.0.0.1]) by ietfa.amsl.com (Postfix) with ESMTP id D11E921F8786 for <oauth@ietfa.amsl.com>; Thu,  7 Feb 2013 09:01:13 -0800 (PST)
X-Virus-Scanned: amavisd-new at amsl.com
X-Spam-Flag: NO
X-Spam-Score: -6.568
X-Spam-Level: 
X-Spam-Status: No, score=-6.568 tagged_above=-999 required=5 tests=[AWL=0.030,  BAYES_00=-2.599, HTML_MESSAGE=0.001, RCVD_IN_DNSWL_MED=-4]
Received: from mail.ietf.org ([64.170.98.30]) by localhost (ietfa.amsl.com [127.0.0.1]) (amavisd-new, port 10024) with ESMTP id eITFxFcuhM9W for <oauth@ietfa.amsl.com>; Thu,  7 Feb 2013 09:01:12 -0800 (PST)
Received: from smtpksrv1.mitre.org (smtpksrv1.mitre.org [198.49.146.77]) by ietfa.amsl.com (Postfix) with ESMTP id 552C221F87C3 for <oauth@ietf.org>; Thu,  7 Feb 2013 09:01:12 -0800 (PST)
Received: from smtpksrv1.mitre.org (localhost.localdomain [127.0.0.1]) by localhost (Postfix) with SMTP id B96851F185F; Thu,  7 Feb 2013 12:01:11 -0500 (EST)
Received: from IMCCAS04.MITRE.ORG (imccas04.mitre.org [129.83.29.81]) by smtpksrv1.mitre.org (Postfix) with ESMTP id 9FD211F1874; Thu,  7 Feb 2013 12:01:11 -0500 (EST)
Received: from [10.146.15.29] (129.83.31.58) by IMCCAS04.MITRE.ORG (129.83.29.81) with Microsoft SMTP Server (TLS) id 14.2.318.4; Thu, 7 Feb 2013 12:01:11 -0500
Message-ID: <5113DDB2.7060805@mitre.org>
Date: Thu, 7 Feb 2013 12:00:34 -0500
From: Justin Richer <jricher@mitre.org>
User-Agent: Mozilla/5.0 (X11; Linux i686; rv:17.0) Gecko/20130106 Thunderbird/17.0.2
MIME-Version: 1.0
To: Prabath Siriwardena <prabath@wso2.com>
References: <20130206192420.32698.21027.idtracker@ietfa.amsl.com> <5112AE0B.1080501@mitre.org> <CAJV9qO_8-4FowrXK=ae-+xMjiJFP04ryVMLQ8SGUH8kp3PHrLg@mail.gmail.com> <5113C3AA.1040701@mitre.org> <CAJV9qO8BVV57eAb5kUNes15AYOpUKqw5XWQswh-FJA=b1pPgSA@mail.gmail.com>
In-Reply-To: <CAJV9qO8BVV57eAb5kUNes15AYOpUKqw5XWQswh-FJA=b1pPgSA@mail.gmail.com>
Content-Type: multipart/alternative; boundary="------------090404040503090007010707"
X-Originating-IP: [129.83.31.58]
Cc: "oauth@ietf.org" <oauth@ietf.org>
Subject: Re: [OAUTH-WG] Fwd: New Version Notification for draft-richer-oauth-introspection-02.txt
X-BeenThere: oauth@ietf.org
X-Mailman-Version: 2.1.12
Precedence: list
List-Id: OAUTH WG <oauth.ietf.org>
List-Unsubscribe: <https://www.ietf.org/mailman/options/oauth>, <mailto:oauth-request@ietf.org?subject=unsubscribe>
List-Archive: <http://www.ietf.org/mail-archive/web/oauth>
List-Post: <mailto:oauth@ietf.org>
List-Help: <mailto:oauth-request@ietf.org?subject=help>
List-Subscribe: <https://www.ietf.org/mailman/listinfo/oauth>, <mailto:oauth-request@ietf.org?subject=subscribe>
X-List-Received-Date: Thu, 07 Feb 2013 17:01:14 -0000

--------------090404040503090007010707
Content-Type: text/plain; charset="ISO-8859-1"; format=flowed
Content-Transfer-Encoding: 7bit

It validates the token, which would be either the token itself in the 
case of Bearer or the token "id" part of something more complex like 
MAC. It doesn't directly validate the usage of the token, that's still 
up to the PR to do that.

I nearly added a "token type" field in this draft, but held back because 
there are several kinds of "token type" that people talk about in OAuth. 
First, there's "Bearer" vs. "MAC" vs. "HOK", or what have you. Then 
within Bearer you have "JWT" or "SAML" or "unstructured blob". Then 
you've also got "access" vs. "refresh" and other flavors of token, like 
the id_token in OpenID Connect.

Thing is, the server running the introspection endpoint will probably 
know *all* of these. But should it tell the client? If so, which of the 
three, and what names should the fields be?

  -- Justin

On 02/07/2013 11:26 AM, Prabath Siriwardena wrote:
> Okay.. I was thinking this could be used as a way to validate the 
> token as well. BTW even in this case shouldn't communicate the type of 
> token to AS? For example in the case of SAML profile - it could be 
> SAML token..
>
> Thanks & regards,
> -Prabath
>
> On Thu, Feb 7, 2013 at 8:39 PM, Justin Richer <jricher@mitre.org 
> <mailto:jricher@mitre.org>> wrote:
>
>     "valid" might not be the best term, but it's meant to be a field
>     where the server says "yes this token is still good" or "no this
>     token isn't good anymore". We could instead do this with HTTP
>     codes or something but I went with a pure JSON response.
>
>      -- Justin
>
>
>     On 02/06/2013 10:47 PM, Prabath Siriwardena wrote:
>>     Hi Justin,
>>
>>     I believe this is addressing one of the key missing part in OAuth
>>     2.0...
>>
>>     One question - I guess this was discussed already...
>>
>>     In the spec - in the introspection response it has the attribute
>>     "valid" - this is basically the validity of the token provided in
>>     the request.
>>
>>     Validation criteria depends on the token and well as token type (
>>     Bearer, MAC..).
>>
>>     In the spec it seems like it's coupled with Bearer token type...
>>     But I guess, by adding "token_type" to the request we can remove
>>     this dependency.
>>
>>     WDYT..?
>>
>>     Thanks & regards,
>>     -Prabath
>>
>>     On Thu, Feb 7, 2013 at 12:54 AM, Justin Richer <jricher@mitre.org
>>     <mailto:jricher@mitre.org>> wrote:
>>
>>         Updated introspection draft based on recent comments. Changes
>>         include:
>>
>>          - "scope" return parameter now follows RFC6749 format
>>         instead of JSON array
>>          - "subject" -> "sub", and "audience" -> "aud", to be
>>         parallel with JWT claims
>>          - clarified what happens if the authentication is bad
>>
>>          -- Justin
>>
>>
>>         -------- Original Message --------
>>         Subject: 	New Version Notification for
>>         draft-richer-oauth-introspection-02.txt
>>         Date: 	Wed, 6 Feb 2013 11:24:20 -0800
>>         From: 	<internet-drafts@ietf.org>
>>         <mailto:internet-drafts@ietf.org>
>>         To: 	<jricher@mitre.org> <mailto:jricher@mitre.org>
>>
>>
>>
>>         A new version of I-D, draft-richer-oauth-introspection-02.txt
>>         has been successfully submitted by Justin Richer and posted to the
>>         IETF repository.
>>
>>         Filename:	 draft-richer-oauth-introspection
>>         Revision:	 02
>>         Title:		 OAuth Token Introspection
>>         Creation date:	 2013-02-06
>>         WG ID:		 Individual Submission
>>         Number of pages: 6
>>         URL:http://www.ietf.org/internet-drafts/draft-richer-oauth-introspection-02.txt
>>         Status:http://datatracker.ietf.org/doc/draft-richer-oauth-introspection
>>         Htmlized:http://tools.ietf.org/html/draft-richer-oauth-introspection-02
>>         Diff:http://www.ietf.org/rfcdiff?url2=draft-richer-oauth-introspection-02
>>
>>         Abstract:
>>             This specification defines a method for a client or protected
>>             resource to query an OAuth authorization server to determine meta-
>>             information about an OAuth token.
>>
>>
>>                                                                                            
>>
>>
>>         The IETF Secretariat
>>
>>
>>
>>
>>         _______________________________________________
>>         OAuth mailing list
>>         OAuth@ietf.org <mailto:OAuth@ietf.org>
>>         https://www.ietf.org/mailman/listinfo/oauth
>>
>>
>>
>>
>>     -- 
>>     Thanks & Regards,
>>     Prabath
>>
>>     Mobile : +94 71 809 6732 <tel:%2B94%2071%20809%206732>
>>
>>     http://blog.facilelogin.com
>>     http://RampartFAQ.com
>
>
>
>
> -- 
> Thanks & Regards,
> Prabath
>
> Mobile : +94 71 809 6732
>
> http://blog.facilelogin.com
> http://RampartFAQ.com


--------------090404040503090007010707
Content-Type: text/html; charset="ISO-8859-1"
Content-Transfer-Encoding: 7bit

<html>
  <head>
    <meta content="text/html; charset=ISO-8859-1"
      http-equiv="Content-Type">
  </head>
  <body bgcolor="#FFFFFF" text="#000000">
    It validates the token, which would be either the token itself in
    the case of Bearer or the token "id" part of something more complex
    like MAC. It doesn't directly validate the usage of the token,
    that's still up to the PR to do that.<br>
    <br>
    I nearly added a "token type" field in this draft, but held back
    because there are several kinds of "token type" that people talk
    about in OAuth. First, there's "Bearer" vs. "MAC" vs. "HOK", or what
    have you. Then within Bearer you have "JWT" or "SAML" or
    "unstructured blob". Then you've also got "access" vs. "refresh" and
    other flavors of token, like the id_token in OpenID Connect. <br>
    <br>
    Thing is, the server running the introspection endpoint will
    probably know *all* of these. But should it tell the client? If so,
    which of the three, and what names should the fields be?<br>
    <br>
    &nbsp;-- Justin<br>
    <br>
    <div class="moz-cite-prefix">On 02/07/2013 11:26 AM, Prabath
      Siriwardena wrote:<br>
    </div>
    <blockquote
cite="mid:CAJV9qO8BVV57eAb5kUNes15AYOpUKqw5XWQswh-FJA=b1pPgSA@mail.gmail.com"
      type="cite">
      <meta http-equiv="Content-Type" content="text/html;
        charset=ISO-8859-1">
      Okay.. I was thinking this could be used as a way to validate the
      token as well. BTW even in this case shouldn't communicate the
      type of token to AS? For example in the case of SAML profile - it
      could be SAML token..
      <div>
        <br>
      </div>
      <div>Thanks &amp; regards,</div>
      <div>-Prabath<br>
        <br>
        <div class="gmail_quote">On Thu, Feb 7, 2013 at 8:39 PM, Justin
          Richer <span dir="ltr">&lt;<a moz-do-not-send="true"
              href="mailto:jricher@mitre.org" target="_blank">jricher@mitre.org</a>&gt;</span>
          wrote:<br>
          <blockquote class="gmail_quote" style="margin:0 0 0
            .8ex;border-left:1px #ccc solid;padding-left:1ex">
            <div bgcolor="#FFFFFF" text="#000000"> "valid" might not be
              the best term, but it's meant to be a field where the
              server says "yes this token is still good" or "no this
              token isn't good anymore". We could instead do this with
              HTTP codes or something but I went with a pure JSON
              response.<span class="HOEnZb"><font color="#888888"><br>
                  <br>
                  &nbsp;-- Justin</font></span>
              <div>
                <div class="h5"><br>
                  <br>
                  <div>On 02/06/2013 10:47 PM, Prabath Siriwardena
                    wrote:<br>
                  </div>
                  <blockquote type="cite"> Hi Justin,
                    <div><br>
                    </div>
                    <div>I believe this is addressing one of the key
                      missing part in OAuth 2.0...</div>
                    <div><br>
                    </div>
                    <div>One question - I guess this was discussed
                      already...</div>
                    <div><br>
                    </div>
                    <div>In the spec - in the introspection response it
                      has the attribute "valid" - this is basically the
                      validity of the token provided in the request.</div>
                    <div><br>
                    </div>
                    <div>Validation&nbsp;criteria depends on the token and
                      well as token type ( Bearer, MAC..).</div>
                    <div><br>
                    </div>
                    <div>In the spec it seems like it's coupled with
                      Bearer token type... But I guess, by adding
                      "token_type" to the request we can remove this
                      dependency.</div>
                    <div><br>
                    </div>
                    <div>WDYT..?</div>
                    <div><br>
                    </div>
                    <div>Thanks &amp; regards,</div>
                    <div>-Prabath&nbsp;</div>
                    <div><br>
                      <div class="gmail_quote">On Thu, Feb 7, 2013 at
                        12:54 AM, Justin Richer <span dir="ltr">&lt;<a
                            moz-do-not-send="true"
                            href="mailto:jricher@mitre.org"
                            target="_blank">jricher@mitre.org</a>&gt;</span>
                        wrote:<br>
                        <blockquote class="gmail_quote" style="margin:0
                          0 0 .8ex;border-left:1px #ccc
                          solid;padding-left:1ex">
                          <div bgcolor="#FFFFFF" text="#000000"> Updated
                            introspection draft based on recent
                            comments. Changes include:<br>
                            <br>
                            &nbsp;- "scope" return parameter now follows
                            RFC6749 format instead of JSON array<br>
                            &nbsp;- "subject" -&gt; "sub", and "audience"
                            -&gt; "aud", to be parallel with JWT claims<br>
                            &nbsp;- clarified what happens if the
                            authentication is bad<br>
                            <br>
                            &nbsp;-- Justin<br>
                            <div><br>
                              <br>
                              -------- Original Message --------
                              <table border="0" cellpadding="0"
                                cellspacing="0">
                                <tbody>
                                  <tr>
                                    <th align="RIGHT" nowrap="nowrap"
                                      valign="BASELINE">Subject: </th>
                                    <td>New Version Notification for
                                      draft-richer-oauth-introspection-02.txt</td>
                                  </tr>
                                  <tr>
                                    <th align="RIGHT" nowrap="nowrap"
                                      valign="BASELINE">Date: </th>
                                    <td>Wed, 6 Feb 2013 11:24:20 -0800</td>
                                  </tr>
                                  <tr>
                                    <th align="RIGHT" nowrap="nowrap"
                                      valign="BASELINE">From: </th>
                                    <td><a moz-do-not-send="true"
                                        href="mailto:internet-drafts@ietf.org"
                                        target="_blank">&lt;internet-drafts@ietf.org&gt;</a></td>
                                  </tr>
                                  <tr>
                                    <th align="RIGHT" nowrap="nowrap"
                                      valign="BASELINE">To: </th>
                                    <td><a moz-do-not-send="true"
                                        href="mailto:jricher@mitre.org"
                                        target="_blank">&lt;jricher@mitre.org&gt;</a></td>
                                  </tr>
                                </tbody>
                              </table>
                              <br>
                              <br>
                              <pre>A new version of I-D, draft-richer-oauth-introspection-02.txt
has been successfully submitted by Justin Richer and posted to the
IETF repository.

Filename:	 draft-richer-oauth-introspection
Revision:	 02
Title:		 OAuth Token Introspection
Creation date:	 2013-02-06
WG ID:		 Individual Submission
Number of pages: 6
URL:             <a moz-do-not-send="true" href="http://www.ietf.org/internet-drafts/draft-richer-oauth-introspection-02.txt" target="_blank">http://www.ietf.org/internet-drafts/draft-richer-oauth-introspection-02.txt</a>
Status:          <a moz-do-not-send="true" href="http://datatracker.ietf.org/doc/draft-richer-oauth-introspection" target="_blank">http://datatracker.ietf.org/doc/draft-richer-oauth-introspection</a>
Htmlized:        <a moz-do-not-send="true" href="http://tools.ietf.org/html/draft-richer-oauth-introspection-02" target="_blank">http://tools.ietf.org/html/draft-richer-oauth-introspection-02</a>
Diff:            <a moz-do-not-send="true" href="http://www.ietf.org/rfcdiff?url2=draft-richer-oauth-introspection-02" target="_blank">http://www.ietf.org/rfcdiff?url2=draft-richer-oauth-introspection-02</a>

Abstract:
   This specification defines a method for a client or protected
   resource to query an OAuth authorization server to determine meta-
   information about an OAuth token.


                                                                                  


The IETF Secretariat

</pre>
                              <br>
                            </div>
                            <br>
                          </div>
                          <br>
_______________________________________________<br>
                          OAuth mailing list<br>
                          <a moz-do-not-send="true"
                            href="mailto:OAuth@ietf.org" target="_blank">OAuth@ietf.org</a><br>
                          <a moz-do-not-send="true"
                            href="https://www.ietf.org/mailman/listinfo/oauth"
                            target="_blank">https://www.ietf.org/mailman/listinfo/oauth</a><br>
                          <br>
                        </blockquote>
                      </div>
                      <br>
                      <br clear="all">
                      <div><br>
                      </div>
                      -- <br>
                      Thanks &amp; Regards,<br>
                      Prabath
                      <div><br>
                      </div>
                      <div>Mobile : <a moz-do-not-send="true"
                          href="tel:%2B94%2071%20809%206732"
                          value="+94718096732" target="_blank">+94 71
                          809 6732</a>&nbsp;<br>
                        <br>
                        <a moz-do-not-send="true"
                          href="http://blog.facilelogin.com"
                          target="_blank">http://blog.facilelogin.com</a><br>
                        <a moz-do-not-send="true"
                          href="http://RampartFAQ.com" target="_blank">http://RampartFAQ.com</a></div>
                    </div>
                  </blockquote>
                  <br>
                </div>
              </div>
            </div>
          </blockquote>
        </div>
        <br>
        <br clear="all">
        <div><br>
        </div>
        -- <br>
        Thanks &amp; Regards,<br>
        Prabath
        <div><br>
        </div>
        <div>Mobile : +94 71 809 6732&nbsp;<br>
          <br>
          <a moz-do-not-send="true" href="http://blog.facilelogin.com"
            target="_blank">http://blog.facilelogin.com</a><br>
          <a moz-do-not-send="true" href="http://RampartFAQ.com"
            target="_blank">http://RampartFAQ.com</a></div>
      </div>
    </blockquote>
    <br>
  </body>
</html>

--------------090404040503090007010707--

From zhou.sujing@zte.com.cn  Thu Feb  7 16:05:28 2013
Return-Path: <zhou.sujing@zte.com.cn>
X-Original-To: oauth@ietfa.amsl.com
Delivered-To: oauth@ietfa.amsl.com
Received: from localhost (localhost [127.0.0.1]) by ietfa.amsl.com (Postfix) with ESMTP id E40FD21F89E8 for <oauth@ietfa.amsl.com>; Thu,  7 Feb 2013 16:05:28 -0800 (PST)
X-Virus-Scanned: amavisd-new at amsl.com
X-Spam-Flag: NO
X-Spam-Score: -98.095
X-Spam-Level: 
X-Spam-Status: No, score=-98.095 tagged_above=-999 required=5 tests=[AWL=-0.300, BAYES_00=-2.599, HTML_MESSAGE=0.001, J_CHICKENPOX_23=0.6, MIME_BASE64_TEXT=1.753, MIME_CHARSET_FARAWAY=2.45, USER_IN_WHITELIST=-100]
Received: from mail.ietf.org ([64.170.98.30]) by localhost (ietfa.amsl.com [127.0.0.1]) (amavisd-new, port 10024) with ESMTP id n90mOgExFt+S for <oauth@ietfa.amsl.com>; Thu,  7 Feb 2013 16:05:27 -0800 (PST)
Received: from zte.com.cn (mx5.zte.com.cn [63.217.80.70]) by ietfa.amsl.com (Postfix) with ESMTP id 1998D21F89E1 for <oauth@ietf.org>; Thu,  7 Feb 2013 16:05:26 -0800 (PST)
Received: from mse02.zte.com.cn (unknown [10.30.3.21]) by Websense Email Security Gateway with ESMTPS id 341D73D0BD0; Fri,  8 Feb 2013 08:03:47 +0800 (CST)
Received: from notes_smtp.zte.com.cn ([10.30.1.239]) by mse02.zte.com.cn with ESMTP id r18055Be044951; Fri, 8 Feb 2013 08:05:05 +0800 (GMT-8) (envelope-from zhou.sujing@zte.com.cn)
In-Reply-To: <5113D0EF.9070806@mitre.org>
To: Justin Richer <jricher@mitre.org>
MIME-Version: 1.0
X-KeepSent: 113436E9:A88FFC54-48257B0C:000054CA; type=4; name=$KeepSent
X-Mailer: Lotus Notes Release 6.5.6 March 06, 2007
Message-ID: <OF113436E9.A88FFC54-ON48257B0C.000054CA-48257B0C.00007F27@zte.com.cn>
From: zhou.sujing@zte.com.cn
Date: Fri, 8 Feb 2013 08:04:51 +0800
X-MIMETrack: Serialize by Router on notes_smtp/zte_ltd(Release 8.5.3FP1 HF212|May 23, 2012) at 2013-02-08 08:04:59, Serialize complete at 2013-02-08 08:04:59
Content-Type: multipart/alternative; boundary="=_alternative 00007F2448257B0C_="
X-MAIL: mse02.zte.com.cn r18055Be044951
Cc: "oauth@ietf.org WG" <oauth@ietf.org>
Subject: Re: [OAUTH-WG] A question on token revocation.
X-BeenThere: oauth@ietf.org
X-Mailman-Version: 2.1.12
Precedence: list
List-Id: OAUTH WG <oauth.ietf.org>
List-Unsubscribe: <https://www.ietf.org/mailman/options/oauth>, <mailto:oauth-request@ietf.org?subject=unsubscribe>
List-Archive: <http://www.ietf.org/mail-archive/web/oauth>
List-Post: <mailto:oauth@ietf.org>
List-Help: <mailto:oauth-request@ietf.org?subject=help>
List-Subscribe: <https://www.ietf.org/mailman/listinfo/oauth>, <mailto:oauth-request@ietf.org?subject=subscribe>
X-List-Received-Date: Fri, 08 Feb 2013 00:05:29 -0000

This is a multipart message in MIME format.
--=_alternative 00007F2448257B0C_=
Content-Type: text/plain; charset="GB2312"
Content-Transfer-Encoding: base64

QnV0IHdoYXQgaXMgdGhlIG1vdGl2YXRpb24gZm9yIGEgbWFsaWNvdXMgY2xpZW50IHRvIHJlcXVl
c3QgdG8gcmV2b2tlIA0KcmVtYWluaW5nIGFjY2VzcyB0b2tlbnM/DQoNCg0KSnVzdGluIFJpY2hl
ciA8anJpY2hlckBtaXRyZS5vcmc+INC009ogMjAxMy0wMi0wOCAwMDowNjowNzoNCg0KPiBUaGlz
LCBJIHRoaW5rLCBwb2ludHMgb3V0IHRoYXQgdGhlIFJPIGlzIGdlbmVyYWxseSBtb3JlIGNvbmNl
cm5lZCANCj4gd2l0aCByZXZva2luZyBhbiBhdXRob3JpemF0aW9uIGdyYW50IHRoYW4gYSB0b2tl
biBpdHNlbGYsIHdpdGggdGhlIA0KPiBsYXR0ZXIgcG90ZW50aWFsbHkgZW5jb21wYXNzaW5nIHNl
dmVyYWwgdG9rZW5zLiBUaGUgcmV2b2NhdGlvbiBkcmFmdA0KPiBpc24ndCByZWFsbHkgaW50ZW5k
ZWQgdG8gc29sdmUgdGhhdCBwcm9ibGVtLCBhcyBUb3JzdGVuIHBvaW50cyBvdXQgDQpiZWxvdy4N
Cj4gDQo+ICAtLSBKdXN0aW4NCg0KPiBPbiAwMi8wNy8yMDEzIDAzOjQ2IEFNLCB6aG91LnN1amlu
Z0B6dGUuY29tLmNuIHdyb3RlOg0KPiANCj4gRHVyaW5nIHRoZSBmb3VyIGdyYW50IHR5cGVzIG9m
IE9hdXRoLCANCj4gICAxLiBhdXRob3JpemF0aW9uIGNvZGU6IFJPIGtub3dzIHRoZSBhdXRob3Jp
emF0aW9uIGNvZGUgdXBvbiB3aGljaCANCj4gYWNjZXNzLXRva2Vucy10by1iZS1yZXZva2VkIGFy
ZSBpc3N1ZWQgDQo+ICAgMi4gaW1wbGljaXRlIGZsb3c6IFJPIGtub3dzIHRoZSBhY2Nlc3MtdG9r
ZW5zLXRvLWJlLXJldm9rZWQgDQo+ICAgMy4gcGFzc3dvcmQgYW5kIGNsaWVudCBjcmVkZW50aWFs
IHR5cGVzOiBSTyBoYXMgbm8gd2F5IG9mIGtub3dpbmcgDQo+IGFjY2VzcyB0b2tlbnMuIA0KPiAN
Cj4gU28sSU1PLCAgaXQgaXMgbm90IHByb3BlciBmb3IgUk8gdG8gcmV2b2tlIGFuIGVhY2ggYWNj
ZXNzIHRva2VuIA0KaW5kaXZpZHVhbGx5LA0KPiByYXRoZXIgaXQgY291bGQgcmV2b2tlIHNvbWUg
YWNjZXNzIHRva2VucyBieSBzcGVjaWZ5aW5nIGNvbmRpdGlvbnMsIA0KPiBzdWNoIGFzIGNsaWVu
dF9pZCwgdGltZV9wZXJpb2QsIHNjb3BlIA0KPiBDb21tZW50cz8gDQo+IA0KPiBQcmFiYXRoIFNp
cml3YXJkZW5hIDxwcmFiYXRoQHdzbzIuY29tPiDQtNPaIDIwMTMtMDItMDcgMTU6MjU6MDI6DQo+
IA0KPiA+IA0KPiANCj4gPiBPbiBUaHUsIEZlYiA3LCAyMDEzIGF0IDEyOjQ5IFBNLCA8emhvdS5z
dWppbmdAenRlLmNvbS5jbj4gd3JvdGU6IA0KPiA+IA0KPiA+IEkgZ3Vlc3MgUk8gY291bGQgaW5p
dGlhdGUgYWNjZXNzIHRva2VuIHJldm9jYXRpb24gZm9yIGEgY2xpZW50IGJ5IA0KPiA+IGluY2x1
ZGluZyBhdXRob3JpemF0aW9uIGNvZGUgaW4gdGhlIHJlcXVlc3QgdG8gQVMuIA0KPiA+IENvbW1l
bnRzPyANCj4gPiANCj4gPiBUaGF0IGNyZWF0ZXMgYSBkZXBlbmRlbmN5IG9uIHRoZSBncmFudCB0
eXBlLiANCj4gPiANCj4gPiBUaGFua3MgJiByZWdhcmRzLCANCj4gPiAtUHJhYmF0aCANCj4gPiAN
Cj4gPiANCj4gPiANCj4gPiANCj4gPiANCj4gPiBvYXV0aC1ib3VuY2VzQGlldGYub3JnINC009og
MjAxMy0wMi0wNyAwMjozMjoyODoNCj4gPiANCj4gPiA+IEhpIFRvcnN0ZW4sIA0KPiA+ID4gDQo+
ID4gPiBUaGFua3MgZm9yIHlvdXIgZmVlZGJhY2suLiBJIHdpbGwgc3VibWl0IGEgZHJhZnQuLi4g
DQo+ID4gPiANCj4gPiA+IFRoYW5rcyAmIHJlZ2FyZHMsIA0KPiA+ID4gLVByYWJhdGgNCj4gPiAN
Cj4gPiA+IE9uIFdlZCwgRmViIDYsIDIwMTMgYXQgMTE6NTUgUE0sIFRvcnN0ZW4gTG9kZGVyc3Rl
ZHQgPA0KPiA+IHRvcnN0ZW5AbG9kZGVyc3RlZHQubmV0DQo+ID4gPiA+IHdyb3RlOiANCj4gPiA+
IEhpIFByYWJhdGgsIA0KPiA+ID4gDQo+ID4gPiB3ZSB0cmllZCB0byBhZGRyZXNzIGJvdGggdXNl
IGNhc2VzIGluIHRoZSBmaXJzdCByZXZpc2lvbnMgb2YgdGhlIA0KPiA+ID4gZHJhZnQuIFRoZSBB
UEkgd2FzIHdlbGwgc3VpdGVkIGZvciBjbGllbnQtZHJpdmVuIHJldm9jYXRpb24gYnV0IG5vdCAN
Cj4gPiA+IHRoZSByZXNvdXJjZSBvd25lciAtIGRyaXZlbiB1c2UgY2FzZS4gVGhlcmUgYXJlIGRl
ZmluaXRlbHkgDQo+ID4gPiBkaWZmZXJlbmNlcyB3aXRoIHJlc3BlY3QgdG8gdGhlIHByb3RvY29s
IGRlc2lnbiwgYXQgbGVhc3QgcmVnYXJkaW5nIA0KPiA+ID4gYXV0aGVudGljYXRpb24gYW5kIGF1
dGhvcml6YXRpb24gb2YgdGhlIHJlc3BlY3RpdmUgYWN0b3JzLiBUaGlzIG1hZGUNCj4gPiA+IHRo
ZSBzcGVjIG1vcmUgY29tcGxleCBhbmQgY2F1c2VkIGFtYmlndWl0aWVzIGFuZCBjb25mdXNpb24u
IA0KPiA+ID4gTW9yZW92ZXIsIHRoZSB3b3JraW5nIGdyb3VwIHNlZW1lZCBub3QgY29udmluY2Vk
IGJ5IHRoZSB0aGUgDQo+IGxhdHRlcnVzZSBjYXNlLg0KPiA+ID4gDQo+ID4gPiBUaGVyZWZvcmUg
dGhlIHdvcmtpbmcgZ3JvdXAgZGVjaWRlZCB0byBmb2N1cyBvbiB0aGUgc2luZ2xlIHVzZSBjYXNl
cw0KPiA+ID4gb2YgdGhlIHJldm9jYXRpb24gYnkgY2xpZW50cy4gVGhpcyBtYWtlcyBhIGxvdCBv
ZiBzZW5zZSBzaW5jZSB0aGlzIA0KPiA+ID4gaW50ZXJmYWNlIGlzIG1vc3QgaW1wb3J0YW50IHdp
dGggcmVzcGVjdCB0byBpbnRlcm9wZXJhYmlsaXR5LiANCj4gPiA+IA0KPiA+ID4gSSdtIGZvY3Vz
aW5nIHJpZ2h0IG5vdyBvbiBmaW5pc2hpbmcgdGhpcyBkcmFmdC4gQW5kIHRoZSBvcGVuIGlzc3Vl
cyANCj4gPiA+IGRpc2N1c3NlZCBvbiB0aGUgbGlzdCBpbiB0aGUgbGFzdCBjb3VwbGUgb2Ygd2Vl
a3MgaWxsdXN0cmF0ZSB0aGF0IA0KPiA+ID4gZXZlbiB0aGlzIHBvc2VzIGEgY29uc2lkZXJhYmxl
IGFtb3VudCBvZiB3b3JrLiBTbyBJJ20gdmVyeSByZWx1Y3RhbnQNCj4gPiA+IHRvIGFkZCBzdXBw
b3J0IGZvciBhIHdob2xlIG5ldyB1c2UgY2FzZSBhdCB0aGF0IHBvaW50IG9mIHRoZSANCnByb2Nl
c3MuIA0KPiA+ID4gDQo+ID4gPiBJZiB5b3UgZmVlbCB0aGlzIGlzIGFuIGltcG9ydGFudCB1c2Ug
Y2FzZSB3b3J0aCBhbiBSRkMsIGRvbid0IA0KPiA+ID4gaGVzaXRhdGUgdG8gcHVibGlzaCBhIG5l
dyBJLUQuIA0KPiA+ID4gDQo+ID4gPiByZWdhcmRzLCANCj4gPiA+IFRvcnN0ZW4uIA0KPiA+ID4g
DQo+ID4gPiBBbSAwNi4wMi4yMDEzIHVtIDE2OjM3IHNjaHJpZWIgUHJhYmF0aCBTaXJpd2FyZGVu
YSANCjxwcmFiYXRoQHdzbzIuY29tPjoNCj4gPiANCj4gPiA+IA0KPiA+IA0KPiA+ID4gT24gV2Vk
LCBGZWIgNiwgMjAxMyBhdCA5OjA0IFBNLCBUb2RkIFcgTGFpbmhhcnQgDQo8bGFpbmhhcnRAdXMu
aWJtLmNvbT4NCj4gd3JvdGU6DQo+ID4gPiA+IFJlc291cmNlIG93bmVyIG5lZWRzIHRvIGtub3cg
dGhlIGNvbnN1bWVyIGtleSAocmVwcmVzZW50cyB0aGUgDQo+ID4gPiBPQXV0aCBDbGllbnQgYXBw
KSAmIHNjb3BlIHRvIHJldm9rZSB0aGUgYWNjZXNzIHRva2VuIGZvciBhIA0KZ2l2ZW5jbGllbnQu
IA0KPiA+IA0KPiA+ID4gSSBzZWUgLSB5b3UncmUgc2F5aW5nIHRoYXQgcmVxdWlyaW5nIGNsaWVu
dCBjcmVkZW50aWFscyBvbiB0aGUgZW5kIA0KPiA+ID4gcG9pbnQgaXMgdGhlIHByb2JsZW0/IA0K
PiA+ID4gDQo+ID4gPiBJbiBmYWN0IHdoYXQgSSBtZWFudCB3YXMgLSB3aGVuIFJPIGF1dGhvcml6
ZXMgdGhlIGFuIGFjY2VzcyB0b2tlbiANCj4gPiA+IGZvciBjbGllbnQgZm9yIHBhcnRpY3VsYXIg
c2NvcGUuIFRob3NlIGluZm9ybWF0aW9uIGFyZSBrZXB0IGF0IHRoZSANCkFTLiANCj4gPiA+IA0K
PiA+ID4gTm93IC0gaWYgdGhlIFJPIHdhbnQgdG8gcmV2b2tlIGFjY2VzcyBmcm9tIHRoZSBjbGll
bnQgLSB0aGUgUk8gbmVlZHMNCj4gPiA+IHRvIGF1dGhlbnRpY2F0ZSBoaW0gc2VsZiB0byB0aGUg
QVMgYW5kIHBhc3MgdGhlIGNvbnN1bWVyIGtleSBhbmQgdGhlDQo+ID4gPiBzY29wZS4gU28gQVMg
Y2FuIHJldm9rZSBhY2Nlc3MuIA0KPiA+ID4gDQo+ID4gPiBUaGFua3MgJiByZWdhcmRzLCANCj4g
PiA+IC1QcmFiYXRoIA0KPiA+ID4gDQo+ID4gPiANCj4gPiA+IA0KPiA+ID4gDQo+ID4gPiANCj4g
PiA+IFRvZGQgTGFpbmhhcnQNCj4gPiA+IFJhdGlvbmFsIHNvZnR3YXJlDQo+ID4gPiBJQk0gQ29y
cG9yYXRpb24NCj4gPiA+IDU1MCBLaW5nIFN0cmVldCwgTGl0dGxldG9uLCBNQSAwMTQ2MC0xMjUw
DQo+ID4gPiAxLTk3OC04OTktNDcwNQ0KPiA+ID4gMi0yNzYtNDcwNSAoVC9MKQ0KPiA+ID4gbGFp
bmhhcnRAdXMuaWJtLmNvbSANCj4gPiA+IA0KPiA+ID4gDQo+ID4gPiANCj4gPiA+IA0KPiA+ID4g
DQo+ID4gDQo+ID4gPiBGcm9tOiAgICAgICAgUHJhYmF0aCBTaXJpd2FyZGVuYSA8cHJhYmF0aEB3
c28yLmNvbT4gDQo+ID4gPiBUbzogICAgICAgIEp1c3RpbiBSaWNoZXIgPGpyaWNoZXJAbWl0cmUu
b3JnPiwgDQo+ID4gPiBDYzogICAgICAgICJvYXV0aEBpZXRmLm9yZyBXRyIgPG9hdXRoQGlldGYu
b3JnPiANCj4gPiA+IERhdGU6ICAgICAgICAwMi8wNi8yMDEzIDEwOjMxIEFNIA0KPiA+ID4gU3Vi
amVjdDogICAgICAgIFJlOiBbT0FVVEgtV0ddIEEgcXVlc3Rpb24gb24gdG9rZW4gcmV2b2NhdGlv
bi4gDQo+ID4gPiBTZW50IGJ5OiAgICAgICAgb2F1dGgtYm91bmNlc0BpZXRmLm9yZyANCj4gPiA+
IA0KPiA+ID4gDQo+ID4gPiANCj4gPiA+IA0KPiANCj4gPiA+IE9uIFdlZCwgRmViIDYsIDIwMTMg
YXQgODo0OSBQTSwgSnVzdGluIFJpY2hlciA8anJpY2hlckBtaXRyZS5vcmc+IA0Kd3JvdGU6IA0K
PiA+ID4gDQo+ID4gPiBPbiAwMi8wNi8yMDEzIDEwOjEzIEFNLCBQcmFiYXRoIFNpcml3YXJkZW5h
IHdyb3RlOiANCj4gPiA+IA0KPiA+ID4gDQo+ID4gPiBPbiBXZWQsIEZlYiA2LCAyMDEzIGF0IDg6
MTkgUE0sIEp1c3RpbiBSaWNoZXIgPGpyaWNoZXJAbWl0cmUub3JnPiANCndyb3RlOiANCj4gPiA+
IFRoZXNlIGFyZSBnZW5lcmFsbHkgaGFuZGxlZCB0aHJvdWdoIGEgdXNlciBpbnRlcmZhY2Ugd2hl
cmUgdGhlIFJPIGlzDQo+ID4gPiBhdXRoZW50aWNhdGVkIGRpcmVjdGx5IHRvIHRoZSBBUywgYW5k
IHRoZXJlJ3Mgbm90IG11Y2ggbmVlZCBmb3IgYSANCj4gPiA+ICJwcm90b2NvbCIgaGVyZSwgaW4g
cHJhY3RpY2UuIA0KPiA+ID4gDQo+ID4gPiBXaHkgZG8geW91IHRoaW5rIGxlYXZpbmcgYWNjZXNz
IHRva2VuIHJldm9jYXRpb24gYnkgUk8gdG8gYSANCj4gPiA+IHByb3ByaWV0YXJ5IEFQSSBpcyBh
IGdvb2QgcHJhY3RpY2UgPyBJTU8gdGhpcyBhbiBlc3NlbnRpYWwgDQo+ID4gPiByZXF1aXJlbWVu
dCBpbiBBUEkgc2VjdXJpdHkuIA0KPiA+ID4gSSB0aGluayBpdCBtYWtlcyBtb3JlIHNlbnNlIGlu
IHRoZSBzYW1lIHdheSB0aGF0IGhhdmluZyBhIA0KPiA+ID4gInByb3ByaWV0YXJ5IiBVSS9BUEkg
Zm9yIG1hbmFnaW5nIHRoZSB1c2VyIGNvbnNlbnQgbWFrZXMgc2Vuc2U6IA0KPiA+ID4gdW5sZXNz
IHlvdSdyZSBkb2luZyBhIGZ1bGx5IGR5bmFtaWMgZW5kLXRvLWVuZCBzeXN0ZW0gbGlrZSBVTUEs
IHRoZW4NCj4gPiA+IHRoZXJlJ3Mgbm90IG11Y2ggdmFsdWUgaW4gdHJ5aW5nIHRvIHNxdWVlemUg
ZGlzcGFyYXRlIHN5c3RlbXMgaW50byANCj4gPiA+IHRoZSBzYW1lIG1vbGQsIHNpbmNlIHRoZXkg
d29uJ3QgYmUgdGFsa2luZyB0byBlYWNoIG90aGVyIGFueXdheS4gDQo+ID4gPiANCj4gPiA+IFRo
aXMgaXMgcmVxdWlyZWQgaW4gZGlzdHJpYnV0ZWQgc2V0dXAgZm9yIGVhY2ggQVBJIHBsYXRmb3Jt
IGZyb20gDQo+ID4gPiBkaWZmZXJlbnQgdmVuZG9ycyB0byBwZXJmb3JtIGluIGFuIGludGVyb3Ag
bWFubmVyLiANCj4gPiA+IA0KPiA+ID4gDQo+ID4gPiBBbmQgc2luY2UgeW91IHJlZmVyIHRvIGl0
IGFzIGFuICJBUEkiLCB3aGF0IHdpbGwgdGhlIFJPIGJlIHVzaW5nIHRvIA0KPiA+ID4gY2FsbCB0
aGlzIEFQST8gSXMgdGhlcmUgYSB0b2tlbiBtYW5hZ2VtZW50IGNsaWVudCB0aGF0J3Mgc2VwYXJh
dGUgDQo+ID4gPiBmcm9tIHRoZSBPQXV0aCBjbGllbnQ/IA0KPiA+ID4gDQo+ID4gPiBJIGRpZG4n
dCBnZXQgeW91ciBxdWVzdGlvbiByaWdodC4uLiBJZiB5b3UgbWVhbnQgdGhlIGhvdyB0byBpbnZv
a2UgDQo+ID4gPiByZXZvY2F0aW9uIGVuZCBwb2ludCwgdGhlIHRoZSByZXNvdXJjZSBvd25lciBu
ZWVkcyB0byBrbm93IHRoZSANCj4gPiA+IGNvbnN1bWVyIGtleSAocmVwcmVzZW50cyB0aGUgT0F1
dGggQ2xpZW50IGFwcCkgJiBzY29wZSB0byByZXZva2UgdGhlDQo+ID4gPiBhY2Nlc3MgdG9rZW4g
Zm9yIGEgZ2l2ZW4gY2xpZW50LiANCj4gPiA+IA0KPiA+ID4gDQo+ID4gPiANCj4gPiA+IElNSE8g
dG9rZW4gcmV2b2NhdGlvbiBkb25lIG15IFJPIGlzIG1vcmUgcHJhY3RpY2FsIHRoYW4gdG9rZW4g
DQo+ID4gPiByZXZvY2F0aW9uIGRvbmUgYnkgdGhlIENsaWVudC4gDQo+ID4gPiBUaGV5J3JlIGJv
dGggdmFsaWQgYnV0IHJlcXVpcmUgZGlmZmVyZW50IGtpbmRzIG9mIHByb3RvY29scyBhbmQgDQo+
ID4gPiBjb25zaWRlcmF0aW9ucy4gVGhpcyB0b2tlbiByZXZvY2F0aW9uIGRyYWZ0IGlzIG1lYW50
IHRvIHNvbHZlIG9uZSANCj4gPiA+IHByb2JsZW0sIGFuZCB0aGF0IGRvZXNuJ3QgbWVhbiBpdCBj
YW4gb3Igc2hvdWxkIHNvbHZlIG90aGVyIA0KPiA+ID4gc2VlbWluZ2x5IHJlbGF0ZWQgcHJvYmxl
bXMuDQo+ID4gPiANCj4gPiA+IElmIHlvdSB3b3VsZCBsaWtlIHRvIHNlZSB0aGUgUk8taW5pdGlh
dGVkIHRva2VuIHJldm9jYXRpb24gZ28gDQo+ID4gPiB0aHJvdWdoIChub3QgZ3JhbnQgcmV2b2Nh
dGlvbiwgbWluZCB5b3UgLS0gdGhhdCdzIHJlbGF0ZWQsIGJ1dCANCj4gPiA+IGRpZmZlcmVudCks
IHRoZW4gSSB3b3VsZCBzdWdnZXN0IHRoYXQgeW91IHN0YXJ0IHNwZWNpZnlpbmcgZXhhY3RseSAN
Cj4gPiA+IGhvdyB0aGF0IHdvcmtzLiBJIHByZWRpY3QgaXQgd2lsbCBiZSBwcm9ibGVtYXRpYyBp
biBwcmFjdGljZSwgDQo+ID4gPiB0aG91Z2gsIGFzIHRoZSBSTyBvZnRlbiBkb2Vzbid0IGFjdHVh
bGx5IGhhdmUgZGlyZWN0IGFjY2VzcyB0byB0aGUgDQo+ID4gPiB0b2tlbiBpdHNlbGYuIA0KPiA+
ID4gDQo+ID4gPiBSZXNvdXJjZSBvd25lciBuZWVkcyB0byBrbm93IHRoZSBjb25zdW1lciBrZXkg
KHJlcHJlc2VudHMgdGhlIE9BdXRoIA0KPiA+ID4gQ2xpZW50IGFwcCkgJiBzY29wZSB0byByZXZv
a2UgdGhlIGFjY2VzcyB0b2tlbiBmb3IgYSBnaXZlbiBjbGllbnQuIA0KPiA+ID4gDQo+ID4gPiAN
Cj4gPiA+IA0KPiA+ID4gDQo+ID4gPiBUaGVyZSBhcmUgbGFyZ2VyIGFwcGxpY2F0aW9ucywgbGlr
ZSBVTUEsIHRoYXQgaGF2ZSBjbGllbnQgYW5kIFBSIA0KPiA+ID4gcHJvdmlzaW9uaW5nIHRoYXQg
d291bGQgYWxsb3cgZm9yIHRoaXMgdG8gYmUgbWFuYWdlZCBzb21ld2hhdCANCj4gPiA+IHByb2dy
YW1tYXRpY2FsbHksIGJ1dCBldmVuIGluIHRoYXQgY2FzZSB5b3UncmUgc3RpbGwgZ2VuZXJhbGx5
IGRvaW5nDQo+ID4gPiB0b2tlbiByZXZvY2F0aW9uIGJ5IGEgImNsaWVudCIgaW4gc29tZSBmYXNo
aW9uLiBJbiBVTUEsIHRob3VnaCwgDQo+ID4gPiBzZXZlcmFsIGRpZmZlcmVudCBwaWVjZXMgY2Fu
IHBsYXkgdGhlIHJvbGUgb2YgYSAiY2xpZW50IiBhdCANCj4gPiA+IGRpZmZlcmVudCBwYXJ0cyBv
ZiB0aGUgcHJvY2Vzcy4NCj4gPiA+IA0KPiA+ID4gUmV2b2tpbmcgYSBzY29wZSBpcyBhIHdob2xl
IGRpZmZlcmVudCBtZXNzLiBHZW5lcmFsbHksIHlvdSdkIHdhbnQgdG8NCj4gPiA+IGp1c3QgcmV2
b2tlIGFuIGV4aXN0aW5nIHRva2VuIGFuZCBtYWtlIGEgbmV3IGF1dGhvcml6YXRpb24gZ3JhbnQg
DQo+ID4gPiB3aXRoIGxvd2VyIGFjY2VzcyBpZiB5b3UgZG9uJ3Qgd2FudCB0aGF0IGNsaWVudCBn
ZXR0aW5nIHRoYXQgc2NvcGUgDQo+ID4gPiBhbnltb3JlLiBJZiB5b3UganVzdCB3YW50IHRvIGRv
d25zY29wZSBmb3IgYSBzaW5nbGUgdHJhbnNhY3Rpb24sIHlvdQ0KPiA+ID4gY2FuIGFscmVhZHkg
ZG8gdGhhdCB3aXRoIGVpdGhlciB0aGUgcmVmcmVzaCB0b2tlbiBvciB0b2tlbiBjaGFpbmluZyAN
Cj4gPiA+IGFwcHJvYWNoZXMsIGRlcGVuZGluZyBvbiB3aGVyZSBpbiB0aGUgcHJvY2VzcyB5b3Ug
YXJlLiBUaGUgbGF0dGVyIG9mDQo+ID4gPiB0aGVzZSBhcmUgYm90aCBjbGllbnQtZm9jdXNlZCwg
dGhvdWdoLCBhbmQgdGhlIFJPIGRvZXNuJ3QgaGF2ZSBhIA0KPiA+ID4gZGlyZWN0IGhhbmQgaW4g
aXQgYXQgdGhpcyBwb2ludC4gDQo+ID4gPiANCj4gPiA+IFdoeSBkbyB5b3UgdGhpbmsgaXQgYSBt
ZXNzLiBJZiB5b3UgcmV2b2tlIHRoZSBlbnRpcmUgdG9rZW4gdGhlbiANCj4gPiA+IENsaWVudCBu
ZWVkcyB0byBnbyB0aHJvdWdoIHRoZSBjb21wbGV0ZSBPQXV0aCBmbG93IC0gYW5kIGFsc28gbmVl
ZHMgDQo+ID4gPiB0byBnZXQgdGhlIHVzZXIgY29uc2VudC4gSWYgUk8gY2FuICBkb3duZ3JhZGUg
dGhlIHNjb3BlLCB0aGVuIHdlIA0KPiA+ID4gcmVzdHJpY3QgQVBJIGFjY2VzcyBieSB0aGUgY2xp
ZW50IGF0IFJTIGVuZCBhbmQgaXRzIHRyYW5zcGFyZW50IHRvIA0KPiA+ID4gdGhlIGNsaWVudC4g
DQo+ID4gPiANCj4gPiA+IA0KPiA+ID4gRG93bmdyYWRpbmcgdGhlIHNjb3BlIG9mIHRva2VucyBp
biB0aGUgd2lsZCBpcyBoYXJkbHkgdHJhbnNwYXJlbnQgdG8NCj4gPiA+IHRoZSBjbGllbnQgKHN0
dWZmIHRoYXQgaXQgZXhwZWN0cyB0byB3b3JrIHdpbGwgc3VkZGVubHkgc3RhcnQgdG8gDQo+ID4g
PiBmYWlsLCBtZWFuaW5nIHRoYXQgbW9zdCBjbGllbnRzIHdpbGwgdGhyb3cgb3V0IHRoZSB0b2tl
biBhbmQgdHJ5IHRvIA0KPiA+ID4gZ2V0IGEgbmV3IG9uZSksIGFuZCBpbiBhIGRpc3RyaWJ1dGVk
IHN5c3RlbSB5b3UndmUgZ290IHRvIHByb3BhZ2F0ZSANCj4gPiA+IHRoYXQgY2hhbmdlIHRvIHRo
ZSBSUy4gSWYgeW91IGJha2UgdGhlIHNjb3BlcyBpbnRvIHRoZSB0b2tlbiBpdHNlbGYgDQo+ID4g
PiAod2hpY2ggbWFueSBkbykgdGhlbiB5b3UgYWN0dWFsbHkgKmNhbid0KiBkb3duZ3JhZGUgYSBz
aW5nbGUgDQo+IHRva2VuLCBhbnl3YXkuIA0KPiA+ID4gDQo+ID4gPiBZZXMuLiB0aGF0IGlzIHRo
ZSBleHBlY3RlZCBiZWhhdmlvci4gSSBtZWFuIHRoZSBwcm9jZXNzIGlzIA0KPiA+ID4gdHJhbnNw
YXJlbnQuIENsaWVudCB3aWxsIG5vdGljZSBhdCBydW50aW1lLiANCj4gPiA+IA0KPiA+ID4gVGhh
bmtzICYgcmVnYXJkcywgDQo+ID4gPiAtUHJhYmF0aCANCj4gPiA+IA0KPiA+ID4gDQo+ID4gPiAg
LS0gSnVzdGluIA0KPiA+ID4gDQo+ID4gPiANCj4gPiA+IFRoYW5rcyAmIHJlZ2FyZHMsIA0KPiA+
ID4gLVByYWJhdGggDQo+ID4gPiANCj4gPiA+IA0KPiA+ID4gDQo+ID4gPiAgLS0gSnVzdGluIA0K
PiA+ID4gDQo+ID4gPiANCj4gPiA+IE9uIDAyLzA2LzIwMTMgMDQ6MzUgQU0sIFByYWJhdGggU2ly
aXdhcmRlbmEgd3JvdGU6IA0KPiA+ID4gSSBhbSBzb3JyeSBpZiB0aGlzIHdhcyBhbHJlYWR5IGRp
c2N1c3NlZCBpbiB0aGlzIGxpc3QuLiANCj4gPiA+IA0KPiA+ID4gTG9va2luZyBhdCBbMV0gaXQg
b25seSB0YWxrcyBhYm91dCByZXZva2luZyB0aGUgYWNjZXNzIHRva2VuIGZyb20gDQo+ID4gdGhl
IGNsaWVudC4gDQo+ID4gPiANCj4gPiA+IEhvdyBhYm91dCB0aGUgcmVzb3VyY2Ugb3duZXIuLj8g
DQo+ID4gPiANCj4gPiA+IFRoZXJlIGNhbiBiZSBjYXNlcyB3aGVyZSByZXNvdXJjZSBvd25lciBu
ZWVkcyB0byByZXZva2UgYW4gDQo+ID4gPiBhdXRob3JpemVkIGFjY2VzcyB0b2tlbiBmcm9tIGEg
Z2l2ZW4gY2xpZW50LiBPciByZXZva2UgYW4gc2NvcGUuLiANCj4gPiA+IA0KPiA+ID4gSG93IGFy
ZSB3ZSBnb2luZyB0byBhZGRyZXNzIHRoZXNlIHJlcXVpcmVtZW50cy4uPyBUaG91Z2h0cyANCmFw
cHJlY2lhdGVkLi4uIA0KPiA+ID4gDQo+ID4gPiBbMV0gaHR0cDovL3Rvb2xzLmlldGYub3JnL2h0
bWwvZHJhZnQtaWV0Zi1vYXV0aC1yZXZvY2F0aW9uLTA0IA0KPiA+ID4gDQo+ID4gPiAtLSANCj4g
PiA+IFRoYW5rcyAmIFJlZ2FyZHMsDQo+ID4gPiBQcmFiYXRoIA0KPiA+ID4gDQo+ID4gPiBNb2Jp
bGUgOiArOTQgNzEgODA5IDY3MzIgDQo+ID4gPiANCj4gPiA+IGh0dHA6Ly9ibG9nLmZhY2lsZWxv
Z2luLmNvbQ0KPiA+ID4gaHR0cDovL1JhbXBhcnRGQVEuY29tIA0KPiA+ID4gDQo+ID4gPiANCj4g
PiA+IF9fX19fX19fX19fX19fX19fX19fX19fX19fX19fX19fX19fX19fX19fX19fX19fDQo+ID4g
PiBPQXV0aCBtYWlsaW5nIGxpc3QNCj4gPiA+IE9BdXRoQGlldGYub3JnDQo+ID4gPiBodHRwczov
L3d3dy5pZXRmLm9yZy9tYWlsbWFuL2xpc3RpbmZvL29hdXRoDQo+ID4gPiANCj4gPiA+IA0KPiA+
ID4gDQo+ID4gPiANCj4gPiA+IA0KPiA+ID4gLS0gDQo+ID4gPiBUaGFua3MgJiBSZWdhcmRzLA0K
PiA+ID4gUHJhYmF0aCANCj4gPiA+IA0KPiA+ID4gTW9iaWxlIDogKzk0IDcxIDgwOSA2NzMyIA0K
PiA+ID4gDQo+ID4gPiBodHRwOi8vYmxvZy5mYWNpbGVsb2dpbi5jb20NCj4gPiA+IGh0dHA6Ly9S
YW1wYXJ0RkFRLmNvbSANCj4gPiA+IA0KPiA+ID4gDQo+ID4gPiANCj4gPiA+IA0KPiA+ID4gLS0g
DQo+ID4gPiBUaGFua3MgJiBSZWdhcmRzLA0KPiA+ID4gUHJhYmF0aCANCj4gPiA+IA0KPiA+ID4g
TW9iaWxlIDogKzk0IDcxIDgwOSA2NzMyIA0KPiA+ID4gDQo+ID4gPiBodHRwOi8vYmxvZy5mYWNp
bGVsb2dpbi5jb20gDQo+ID4gPiBodHRwOi8vUmFtcGFydEZBUS5jb21fX19fX19fX19fX19fX19f
X19fX19fX19fX19fX19fX19fX19fX19fX19fX19fXw0KPiA+ID4gT0F1dGggbWFpbGluZyBsaXN0
DQo+ID4gPiBPQXV0aEBpZXRmLm9yZw0KPiA+ID4gaHR0cHM6Ly93d3cuaWV0Zi5vcmcvbWFpbG1h
bi9saXN0aW5mby9vYXV0aA0KPiA+IA0KPiA+ID4gDQo+ID4gDQo+ID4gPiANCj4gPiA+IC0tIA0K
PiA+ID4gVGhhbmtzICYgUmVnYXJkcywNCj4gPiA+IFByYWJhdGggDQo+ID4gPiANCj4gPiA+IE1v
YmlsZSA6ICs5NCA3MSA4MDkgNjczMiANCj4gPiA+IA0KPiA+ID4gaHR0cDovL2Jsb2cuZmFjaWxl
bG9naW4uY29tDQo+ID4gPiBodHRwOi8vUmFtcGFydEZBUS5jb20gDQo+ID4gPiBfX19fX19fX19f
X19fX19fX19fX19fX19fX19fX19fX19fX19fX19fX19fX19fXw0KPiA+ID4gT0F1dGggbWFpbGlu
ZyBsaXN0DQo+ID4gPiBPQXV0aEBpZXRmLm9yZw0KPiA+ID4gaHR0cHM6Ly93d3cuaWV0Zi5vcmcv
bWFpbG1hbi9saXN0aW5mby9vYXV0aCANCj4gPiA+IA0KPiA+IA0KPiA+ID4gDQo+ID4gPiAtLSAN
Cj4gPiA+IFRoYW5rcyAmIFJlZ2FyZHMsDQo+ID4gPiBQcmFiYXRoIA0KPiA+ID4gDQo+ID4gPiBN
b2JpbGUgOiArOTQgNzEgODA5IDY3MzIgDQo+ID4gPiANCj4gPiA+IGh0dHA6Ly9ibG9nLmZhY2ls
ZWxvZ2luLmNvbQ0KPiA+ID4gaHR0cDovL1JhbXBhcnRGQVEuY29tX19fX19fX19fX19fX19fX19f
X19fX19fX19fX19fX19fX19fX19fX19fX19fX18NCj4gPiA+IE9BdXRoIG1haWxpbmcgbGlzdA0K
PiA+ID4gT0F1dGhAaWV0Zi5vcmcNCj4gPiA+IGh0dHBzOi8vd3d3LmlldGYub3JnL21haWxtYW4v
bGlzdGluZm8vb2F1dGggDQo+ID4gDQo+IA0KPiA+IA0KPiA+IC0tIA0KPiA+IFRoYW5rcyAmIFJl
Z2FyZHMsDQo+ID4gUHJhYmF0aCANCj4gPiANCj4gPiBNb2JpbGUgOiArOTQgNzEgODA5IDY3MzIg
DQo+ID4gDQo+ID4gaHR0cDovL2Jsb2cuZmFjaWxlbG9naW4uY29tDQo+ID4gaHR0cDovL1JhbXBh
cnRGQVEuY29tIA0KDQo+IF9fX19fX19fX19fX19fX19fX19fX19fX19fX19fX19fX19fX19fX19f
X19fX19fDQo+IE9BdXRoIG1haWxpbmcgbGlzdA0KPiBPQXV0aEBpZXRmLm9yZw0KPiBodHRwczov
L3d3dy5pZXRmLm9yZy9tYWlsbWFuL2xpc3RpbmZvL29hdXRoDQoNCg==
--=_alternative 00007F2448257B0C_=
Content-Type: text/html; charset="GB2312"
Content-Transfer-Encoding: base64
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--=_alternative 00007F2448257B0C_=--

From prabath@wso2.com  Thu Feb  7 21:51:04 2013
Return-Path: <prabath@wso2.com>
X-Original-To: oauth@ietfa.amsl.com
Delivered-To: oauth@ietfa.amsl.com
Received: from localhost (localhost [127.0.0.1]) by ietfa.amsl.com (Postfix) with ESMTP id 7F96321F88E4 for <oauth@ietfa.amsl.com>; Thu,  7 Feb 2013 21:51:04 -0800 (PST)
X-Virus-Scanned: amavisd-new at amsl.com
X-Spam-Flag: NO
X-Spam-Score: -2.84
X-Spam-Level: 
X-Spam-Status: No, score=-2.84 tagged_above=-999 required=5 tests=[AWL=0.136,  BAYES_00=-2.599, FM_FORGED_GMAIL=0.622, HTML_MESSAGE=0.001, RCVD_IN_DNSWL_LOW=-1]
Received: from mail.ietf.org ([64.170.98.30]) by localhost (ietfa.amsl.com [127.0.0.1]) (amavisd-new, port 10024) with ESMTP id g4UuyJ+V5HLP for <oauth@ietfa.amsl.com>; Thu,  7 Feb 2013 21:51:03 -0800 (PST)
Received: from mail-ee0-f48.google.com (mail-ee0-f48.google.com [74.125.83.48]) by ietfa.amsl.com (Postfix) with ESMTP id 9A5AD21F8D1F for <oauth@ietf.org>; Thu,  7 Feb 2013 21:51:01 -0800 (PST)
Received: by mail-ee0-f48.google.com with SMTP id t10so1858683eei.21 for <oauth@ietf.org>; Thu, 07 Feb 2013 21:51:00 -0800 (PST)
X-Google-DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=google.com; s=20120113; h=mime-version:x-received:in-reply-to:references:date:message-id :subject:from:to:cc:content-type:x-gm-message-state; bh=ezOwYD3kvEMMgN7gixMIRl7fdmAKW58PQm1RTTfQKlc=; b=R/KH621BFhDalvsZpGAGNQrcO2NU24mLZh+B9wol53H3l9mNQW5ITHdliQDvN0YVFc yqHawIl506KqBg3WNyJpPBeDU06FeyUHkP9nU4SP8UEq5rTCk4MdzfyDQbi87+yjp/kn kWjDsZkoK6mW5f/hWU4fzCbLSbQpr67dld94XnGYdVvhZMqWGfy1rpifNPU23U2FNSu6 DXtGXYFBqkbh5zmlrKO4Wnze3LQlzJF+Xt0A0ORRrVi76kHZmdg0mmH1yMT3zq1D7NFO FyYtcvcZshJzM9o5Uz6/r15uAX5jmAp0zcycTpcdnRp7fglXPMRJdLsKNlh/F5R8s2QX N7MQ==
MIME-Version: 1.0
X-Received: by 10.14.202.197 with SMTP id d45mr12645073eeo.1.1360302660692; Thu, 07 Feb 2013 21:51:00 -0800 (PST)
Received: by 10.223.194.134 with HTTP; Thu, 7 Feb 2013 21:51:00 -0800 (PST)
In-Reply-To: <5113DDB2.7060805@mitre.org>
References: <20130206192420.32698.21027.idtracker@ietfa.amsl.com> <5112AE0B.1080501@mitre.org> <CAJV9qO_8-4FowrXK=ae-+xMjiJFP04ryVMLQ8SGUH8kp3PHrLg@mail.gmail.com> <5113C3AA.1040701@mitre.org> <CAJV9qO8BVV57eAb5kUNes15AYOpUKqw5XWQswh-FJA=b1pPgSA@mail.gmail.com> <5113DDB2.7060805@mitre.org>
Date: Fri, 8 Feb 2013 11:21:00 +0530
Message-ID: <CAJV9qO_gM1oera9ae9sqh9n17e-ZLKuC2pmsZwhq-RmFcMyqHA@mail.gmail.com>
From: Prabath Siriwardena <prabath@wso2.com>
To: Justin Richer <jricher@mitre.org>
Content-Type: multipart/alternative; boundary=047d7b343b06e0aaaf04d53024df
X-Gm-Message-State: ALoCoQkrW1scWZVAO0fPMRY52F1JS2nyROoWVYJMxywbCqntDvqFZlPnOLyuVtfEZgmFj/FajOmH
Cc: "oauth@ietf.org" <oauth@ietf.org>
Subject: Re: [OAUTH-WG] Fwd: New Version Notification for draft-richer-oauth-introspection-02.txt
X-BeenThere: oauth@ietf.org
X-Mailman-Version: 2.1.12
Precedence: list
List-Id: OAUTH WG <oauth.ietf.org>
List-Unsubscribe: <https://www.ietf.org/mailman/options/oauth>, <mailto:oauth-request@ietf.org?subject=unsubscribe>
List-Archive: <http://www.ietf.org/mail-archive/web/oauth>
List-Post: <mailto:oauth@ietf.org>
List-Help: <mailto:oauth-request@ietf.org?subject=help>
List-Subscribe: <https://www.ietf.org/mailman/listinfo/oauth>, <mailto:oauth-request@ietf.org?subject=subscribe>
X-List-Received-Date: Fri, 08 Feb 2013 05:51:04 -0000

--047d7b343b06e0aaaf04d53024df
Content-Type: text/plain; charset=ISO-8859-1

Hi Justin,

I have couple of questions related to "valid" parameter...

This endpoint can be invoked by the Resource Server in runtime...

In that case what is exactly meant by the "resource_id" in request ?

IMO a token to be valid depends on set of criteria based on it's type..

For a Bearer token..

1. Token should not be expired
2. Token should not be revoked.
3. The scope the token issued should match with the scope required for the
resource.

For a MAC token...

1. Token not expired (mac id)
2. Token should not be revoked
3. The scope the token issued should match with the scope required for the
resource.
4. HMAC check should be valid

There are similar conditions for SAML bearer too..

Thanks & regards,
-Prabath


On Thu, Feb 7, 2013 at 10:30 PM, Justin Richer <jricher@mitre.org> wrote:

>  It validates the token, which would be either the token itself in the
> case of Bearer or the token "id" part of something more complex like MAC.
> It doesn't directly validate the usage of the token, that's still up to the
> PR to do that.
>
> I nearly added a "token type" field in this draft, but held back because
> there are several kinds of "token type" that people talk about in OAuth.
> First, there's "Bearer" vs. "MAC" vs. "HOK", or what have you. Then within
> Bearer you have "JWT" or "SAML" or "unstructured blob". Then you've also
> got "access" vs. "refresh" and other flavors of token, like the id_token in
> OpenID Connect.
>
> Thing is, the server running the introspection endpoint will probably know
> *all* of these. But should it tell the client? If so, which of the three,
> and what names should the fields be?
>
>  -- Justin
>
>
> On 02/07/2013 11:26 AM, Prabath Siriwardena wrote:
>
> Okay.. I was thinking this could be used as a way to validate the token as
> well. BTW even in this case shouldn't communicate the type of token to AS?
> For example in the case of SAML profile - it could be SAML token..
>
>  Thanks & regards,
> -Prabath
>
> On Thu, Feb 7, 2013 at 8:39 PM, Justin Richer <jricher@mitre.org> wrote:
>
>>  "valid" might not be the best term, but it's meant to be a field where
>> the server says "yes this token is still good" or "no this token isn't good
>> anymore". We could instead do this with HTTP codes or something but I went
>> with a pure JSON response.
>>
>>  -- Justin
>>
>>
>> On 02/06/2013 10:47 PM, Prabath Siriwardena wrote:
>>
>> Hi Justin,
>>
>>  I believe this is addressing one of the key missing part in OAuth 2.0...
>>
>>  One question - I guess this was discussed already...
>>
>>  In the spec - in the introspection response it has the attribute
>> "valid" - this is basically the validity of the token provided in the
>> request.
>>
>>  Validation criteria depends on the token and well as token type (
>> Bearer, MAC..).
>>
>>  In the spec it seems like it's coupled with Bearer token type... But I
>> guess, by adding "token_type" to the request we can remove this dependency.
>>
>>  WDYT..?
>>
>>  Thanks & regards,
>> -Prabath
>>
>> On Thu, Feb 7, 2013 at 12:54 AM, Justin Richer <jricher@mitre.org> wrote:
>>
>>>  Updated introspection draft based on recent comments. Changes include:
>>>
>>>  - "scope" return parameter now follows RFC6749 format instead of JSON
>>> array
>>>  - "subject" -> "sub", and "audience" -> "aud", to be parallel with JWT
>>> claims
>>>  - clarified what happens if the authentication is bad
>>>
>>>  -- Justin
>>>
>>>
>>> -------- Original Message --------  Subject: New Version Notification
>>> for draft-richer-oauth-introspection-02.txt  Date: Wed, 6 Feb 2013
>>> 11:24:20 -0800  From: <internet-drafts@ietf.org><internet-drafts@ietf.org>  To:
>>> <jricher@mitre.org> <jricher@mitre.org>
>>>
>>> A new version of I-D, draft-richer-oauth-introspection-02.txt
>>> has been successfully submitted by Justin Richer and posted to the
>>> IETF repository.
>>>
>>> Filename:	 draft-richer-oauth-introspection
>>> Revision:	 02
>>> Title:		 OAuth Token Introspection
>>> Creation date:	 2013-02-06
>>> WG ID:		 Individual Submission
>>> Number of pages: 6
>>> URL:             http://www.ietf.org/internet-drafts/draft-richer-oauth-introspection-02.txt
>>> Status:          http://datatracker.ietf.org/doc/draft-richer-oauth-introspection
>>> Htmlized:        http://tools.ietf.org/html/draft-richer-oauth-introspection-02
>>> Diff:            http://www.ietf.org/rfcdiff?url2=draft-richer-oauth-introspection-02
>>>
>>> Abstract:
>>>    This specification defines a method for a client or protected
>>>    resource to query an OAuth authorization server to determine meta-
>>>    information about an OAuth token.
>>>
>>>
>>>
>>>
>>>
>>> The IETF Secretariat
>>>
>>>
>>>
>>>
>>>
>>> _______________________________________________
>>> OAuth mailing list
>>> OAuth@ietf.org
>>> https://www.ietf.org/mailman/listinfo/oauth
>>>
>>>
>>
>>
>>  --
>> Thanks & Regards,
>> Prabath
>>
>>  Mobile : +94 71 809 6732 <%2B94%2071%20809%206732>
>>
>> http://blog.facilelogin.com
>> http://RampartFAQ.com
>>
>>
>>
>
>
>  --
> Thanks & Regards,
> Prabath
>
>  Mobile : +94 71 809 6732
>
> http://blog.facilelogin.com
> http://RampartFAQ.com
>
>
>


-- 
Thanks & Regards,
Prabath

Mobile : +94 71 809 6732

http://blog.facilelogin.com
http://RampartFAQ.com

--047d7b343b06e0aaaf04d53024df
Content-Type: text/html; charset=ISO-8859-1
Content-Transfer-Encoding: quoted-printable

Hi=A0Justin,<div><br></div><div>I have couple of questions related to &quot=
;valid&quot; parameter...</div><div><br></div><div>This endpoint can be inv=
oked by the Resource Server in runtime...</div><div><br></div><div>In that =
case what is exactly meant by the &quot;resource_id&quot; in request ?</div=
>
<div><br></div><div>IMO a token to be valid depends on set of criteria base=
d on it&#39;s type..</div><div><br></div><div>For a Bearer token..</div><di=
v><br></div><div>1. Token should not be expired</div><div>2. Token should n=
ot be revoked.</div>
<div>3. The scope the token issued should match with the scope required for=
 the resource.</div><div><br></div><div>For a MAC token...</div><div><br></=
div><div>1. Token not expired (mac id)</div><div>2. Token should not be rev=
oked</div>
<div>3. The scope the token issued should match with the scope required for=
 the resource.</div><div>4. HMAC check should be valid</div><div><br></div>=
<div>There are similar conditions for SAML bearer too..</div><div><br></div=
>
<div>Thanks &amp; regards,</div><div>-Prabath</div><div><br></div><div><br>=
<div class=3D"gmail_quote">On Thu, Feb 7, 2013 at 10:30 PM, Justin Richer <=
span dir=3D"ltr">&lt;<a href=3D"mailto:jricher@mitre.org" target=3D"_blank"=
>jricher@mitre.org</a>&gt;</span> wrote:<br>
<blockquote class=3D"gmail_quote" style=3D"margin:0 0 0 .8ex;border-left:1p=
x #ccc solid;padding-left:1ex">
 =20
   =20
 =20
  <div bgcolor=3D"#FFFFFF" text=3D"#000000">
    It validates the token, which would be either the token itself in
    the case of Bearer or the token &quot;id&quot; part of something more c=
omplex
    like MAC. It doesn&#39;t directly validate the usage of the token,
    that&#39;s still up to the PR to do that.<br>
    <br>
    I nearly added a &quot;token type&quot; field in this draft, but held b=
ack
    because there are several kinds of &quot;token type&quot; that people t=
alk
    about in OAuth. First, there&#39;s &quot;Bearer&quot; vs. &quot;MAC&quo=
t; vs. &quot;HOK&quot;, or what
    have you. Then within Bearer you have &quot;JWT&quot; or &quot;SAML&quo=
t; or
    &quot;unstructured blob&quot;. Then you&#39;ve also got &quot;access&qu=
ot; vs. &quot;refresh&quot; and
    other flavors of token, like the id_token in OpenID Connect. <br>
    <br>
    Thing is, the server running the introspection endpoint will
    probably know *all* of these. But should it tell the client? If so,
    which of the three, and what names should the fields be?<span class=3D"=
HOEnZb"><font color=3D"#888888"><br>
    <br>
    =A0-- Justin</font></span><div><div class=3D"h5"><br>
    <br>
    <div>On 02/07/2013 11:26 AM, Prabath
      Siriwardena wrote:<br>
    </div>
    <blockquote type=3D"cite">
     =20
      Okay.. I was thinking this could be used as a way to validate the
      token as well. BTW even in this case shouldn&#39;t communicate the
      type of token to AS? For example in the case of SAML profile - it
      could be SAML token..
      <div>
        <br>
      </div>
      <div>Thanks &amp; regards,</div>
      <div>-Prabath<br>
        <br>
        <div class=3D"gmail_quote">On Thu, Feb 7, 2013 at 8:39 PM, Justin
          Richer <span dir=3D"ltr">&lt;<a href=3D"mailto:jricher@mitre.org"=
 target=3D"_blank">jricher@mitre.org</a>&gt;</span>
          wrote:<br>
          <blockquote class=3D"gmail_quote" style=3D"margin:0 0 0 .8ex;bord=
er-left:1px #ccc solid;padding-left:1ex">
            <div bgcolor=3D"#FFFFFF" text=3D"#000000"> &quot;valid&quot; mi=
ght not be
              the best term, but it&#39;s meant to be a field where the
              server says &quot;yes this token is still good&quot; or &quot=
;no this
              token isn&#39;t good anymore&quot;. We could instead do this =
with
              HTTP codes or something but I went with a pure JSON
              response.<span><font color=3D"#888888"><br>
                  <br>
                  =A0-- Justin</font></span>
              <div>
                <div><br>
                  <br>
                  <div>On 02/06/2013 10:47 PM, Prabath Siriwardena
                    wrote:<br>
                  </div>
                  <blockquote type=3D"cite"> Hi Justin,
                    <div><br>
                    </div>
                    <div>I believe this is addressing one of the key
                      missing part in OAuth 2.0...</div>
                    <div><br>
                    </div>
                    <div>One question - I guess this was discussed
                      already...</div>
                    <div><br>
                    </div>
                    <div>In the spec - in the introspection response it
                      has the attribute &quot;valid&quot; - this is basical=
ly the
                      validity of the token provided in the request.</div>
                    <div><br>
                    </div>
                    <div>Validation=A0criteria depends on the token and
                      well as token type ( Bearer, MAC..).</div>
                    <div><br>
                    </div>
                    <div>In the spec it seems like it&#39;s coupled with
                      Bearer token type... But I guess, by adding
                      &quot;token_type&quot; to the request we can remove t=
his
                      dependency.</div>
                    <div><br>
                    </div>
                    <div>WDYT..?</div>
                    <div><br>
                    </div>
                    <div>Thanks &amp; regards,</div>
                    <div>-Prabath=A0</div>
                    <div><br>
                      <div class=3D"gmail_quote">On Thu, Feb 7, 2013 at
                        12:54 AM, Justin Richer <span dir=3D"ltr">&lt;<a hr=
ef=3D"mailto:jricher@mitre.org" target=3D"_blank">jricher@mitre.org</a>&gt;=
</span>
                        wrote:<br>
                        <blockquote class=3D"gmail_quote" style=3D"margin:0=
 0 0 .8ex;border-left:1px #ccc solid;padding-left:1ex">
                          <div bgcolor=3D"#FFFFFF" text=3D"#000000"> Update=
d
                            introspection draft based on recent
                            comments. Changes include:<br>
                            <br>
                            =A0- &quot;scope&quot; return parameter now fol=
lows
                            RFC6749 format instead of JSON array<br>
                            =A0- &quot;subject&quot; -&gt; &quot;sub&quot;,=
 and &quot;audience&quot;
                            -&gt; &quot;aud&quot;, to be parallel with JWT =
claims<br>
                            =A0- clarified what happens if the
                            authentication is bad<br>
                            <br>
                            =A0-- Justin<br>
                            <div><br>
                              <br>
                              -------- Original Message --------
                              <table border=3D"0" cellpadding=3D"0" cellspa=
cing=3D"0">
                                <tbody>
                                  <tr>
                                    <th align=3D"RIGHT" nowrap valign=3D"BA=
SELINE">Subject: </th>
                                    <td>New Version Notification for
                                      draft-richer-oauth-introspection-02.t=
xt</td>
                                  </tr>
                                  <tr>
                                    <th align=3D"RIGHT" nowrap valign=3D"BA=
SELINE">Date: </th>
                                    <td>Wed, 6 Feb 2013 11:24:20 -0800</td>
                                  </tr>
                                  <tr>
                                    <th align=3D"RIGHT" nowrap valign=3D"BA=
SELINE">From: </th>
                                    <td><a href=3D"mailto:internet-drafts@i=
etf.org" target=3D"_blank">&lt;internet-drafts@ietf.org&gt;</a></td>
                                  </tr>
                                  <tr>
                                    <th align=3D"RIGHT" nowrap valign=3D"BA=
SELINE">To: </th>
                                    <td><a href=3D"mailto:jricher@mitre.org=
" target=3D"_blank">&lt;jricher@mitre.org&gt;</a></td>
                                  </tr>
                                </tbody>
                              </table>
                              <br>
                              <br>
                              <pre>A new version of I-D, draft-richer-oauth=
-introspection-02.txt
has been successfully submitted by Justin Richer and posted to the
IETF repository.

Filename:	 draft-richer-oauth-introspection
Revision:	 02
Title:		 OAuth Token Introspection
Creation date:	 2013-02-06
WG ID:		 Individual Submission
Number of pages: 6
URL:             <a href=3D"http://www.ietf.org/internet-drafts/draft-riche=
r-oauth-introspection-02.txt" target=3D"_blank">http://www.ietf.org/interne=
t-drafts/draft-richer-oauth-introspection-02.txt</a>
Status:          <a href=3D"http://datatracker.ietf.org/doc/draft-richer-oa=
uth-introspection" target=3D"_blank">http://datatracker.ietf.org/doc/draft-=
richer-oauth-introspection</a>
Htmlized:        <a href=3D"http://tools.ietf.org/html/draft-richer-oauth-i=
ntrospection-02" target=3D"_blank">http://tools.ietf.org/html/draft-richer-=
oauth-introspection-02</a>
Diff:            <a href=3D"http://www.ietf.org/rfcdiff?url2=3Ddraft-richer=
-oauth-introspection-02" target=3D"_blank">http://www.ietf.org/rfcdiff?url2=
=3Ddraft-richer-oauth-introspection-02</a>

Abstract:
   This specification defines a method for a client or protected
   resource to query an OAuth authorization server to determine meta-
   information about an OAuth token.


                                                                           =
      =20


The IETF Secretariat

</pre>
                              <br>
                            </div>
                            <br>
                          </div>
                          <br>
_______________________________________________<br>
                          OAuth mailing list<br>
                          <a href=3D"mailto:OAuth@ietf.org" target=3D"_blan=
k">OAuth@ietf.org</a><br>
                          <a href=3D"https://www.ietf.org/mailman/listinfo/=
oauth" target=3D"_blank">https://www.ietf.org/mailman/listinfo/oauth</a><br=
>
                          <br>
                        </blockquote>
                      </div>
                      <br>
                      <br clear=3D"all">
                      <div><br>
                      </div>
                      -- <br>
                      Thanks &amp; Regards,<br>
                      Prabath
                      <div><br>
                      </div>
                      <div>Mobile : <a href=3D"tel:%2B94%2071%20809%206732"=
 value=3D"+94718096732" target=3D"_blank">+94 71
                          809 6732</a>=A0<br>
                        <br>
                        <a href=3D"http://blog.facilelogin.com" target=3D"_=
blank">http://blog.facilelogin.com</a><br>
                        <a href=3D"http://RampartFAQ.com" target=3D"_blank"=
>http://RampartFAQ.com</a></div>
                    </div>
                  </blockquote>
                  <br>
                </div>
              </div>
            </div>
          </blockquote>
        </div>
        <br>
        <br clear=3D"all">
        <div><br>
        </div>
        -- <br>
        Thanks &amp; Regards,<br>
        Prabath
        <div><br>
        </div>
        <div>Mobile : <a href=3D"tel:%2B94%2071%20809%206732" value=3D"+947=
18096732" target=3D"_blank">+94 71 809 6732</a>=A0<br>
          <br>
          <a href=3D"http://blog.facilelogin.com" target=3D"_blank">http://=
blog.facilelogin.com</a><br>
          <a href=3D"http://RampartFAQ.com" target=3D"_blank">http://Rampar=
tFAQ.com</a></div>
      </div>
    </blockquote>
    <br>
  </div></div></div>

</blockquote></div><br><br clear=3D"all"><div><br></div>-- <br>Thanks &amp;=
 Regards,<br>Prabath<div><br></div><div>Mobile : +94 71 809 6732=A0<br><br>=
<a href=3D"http://blog.facilelogin.com" target=3D"_blank">http://blog.facil=
elogin.com</a><br>
<a href=3D"http://RampartFAQ.com" target=3D"_blank">http://RampartFAQ.com</=
a></div>
</div>

--047d7b343b06e0aaaf04d53024df--

From eve@xmlgrrl.com  Thu Feb  7 21:54:55 2013
Return-Path: <eve@xmlgrrl.com>
X-Original-To: oauth@ietfa.amsl.com
Delivered-To: oauth@ietfa.amsl.com
Received: from localhost (localhost [127.0.0.1]) by ietfa.amsl.com (Postfix) with ESMTP id 26AC321F8943 for <oauth@ietfa.amsl.com>; Thu,  7 Feb 2013 21:54:55 -0800 (PST)
X-Virus-Scanned: amavisd-new at amsl.com
X-Spam-Flag: NO
X-Spam-Score: -0.692
X-Spam-Level: 
X-Spam-Status: No, score=-0.692 tagged_above=-999 required=5 tests=[BAYES_00=-2.599, FROM_DOMAIN_NOVOWEL=0.5, HTML_MESSAGE=0.001, J_CHICKENPOX_43=0.6, SARE_URI_CONS7=0.306, URI_NOVOWEL=0.5]
Received: from mail.ietf.org ([64.170.98.30]) by localhost (ietfa.amsl.com [127.0.0.1]) (amavisd-new, port 10024) with ESMTP id 5pVzgRTbR4YA for <oauth@ietfa.amsl.com>; Thu,  7 Feb 2013 21:54:54 -0800 (PST)
Received: from mail.promanage-inc.com (eliasisrael.com [50.47.36.5]) by ietfa.amsl.com (Postfix) with ESMTP id B56CE21F8921 for <oauth@ietf.org>; Thu,  7 Feb 2013 21:54:53 -0800 (PST)
Received: from localhost (localhost [127.0.0.1]) by mail.promanage-inc.com (Postfix) with ESMTP id EFFE4B1DA53; Thu,  7 Feb 2013 21:54:52 -0800 (PST)
X-Virus-Scanned: amavisd-new at promanage-inc.com
Received: from mail.promanage-inc.com ([127.0.0.1]) by localhost (greendome.promanage-inc.com [127.0.0.1]) (amavisd-new, port 10024) with ESMTP id z-HV67u4KnIh; Thu,  7 Feb 2013 21:54:48 -0800 (PST)
Received: from [192.168.0.28] (s01060026f3e16488.vc.shawcable.net [24.84.235.32]) by mail.promanage-inc.com (Postfix) with ESMTPSA id 22380B1DA3A; Thu,  7 Feb 2013 21:54:48 -0800 (PST)
Mime-Version: 1.0 (Mac OS X Mail 6.2 \(1499\))
Content-Type: multipart/alternative; boundary="Apple-Mail=_EDEA92BF-EA0E-409C-A2AD-98C7DB184394"
From: Eve Maler <eve@xmlgrrl.com>
In-Reply-To: <5113DDB2.7060805@mitre.org>
Date: Thu, 7 Feb 2013 21:54:46 -0800
Message-Id: <7E230B91-90A5-45B1-B306-5ED07B60AF8E@xmlgrrl.com>
References: <20130206192420.32698.21027.idtracker@ietfa.amsl.com> <5112AE0B.1080501@mitre.org> <CAJV9qO_8-4FowrXK=ae-+xMjiJFP04ryVMLQ8SGUH8kp3PHrLg@mail.gmail.com> <5113C3AA.1040701@mitre.org> <CAJV9qO8BVV57eAb5kUNes15AYOpUKqw5XWQswh-FJA=b1pPgSA@mail.gmail.com> <5113DDB2.7060805@mitre.org>
To: Justin Richer <jricher@mitre.org>
X-Mailer: Apple Mail (2.1499)
Cc: "oauth@ietf.org" <oauth@ietf.org>
Subject: Re: [OAUTH-WG] New Version Notification for draft-richer-oauth-introspection-02.txt
X-BeenThere: oauth@ietf.org
X-Mailman-Version: 2.1.12
Precedence: list
List-Id: OAUTH WG <oauth.ietf.org>
List-Unsubscribe: <https://www.ietf.org/mailman/options/oauth>, <mailto:oauth-request@ietf.org?subject=unsubscribe>
List-Archive: <http://www.ietf.org/mail-archive/web/oauth>
List-Post: <mailto:oauth@ietf.org>
List-Help: <mailto:oauth-request@ietf.org?subject=help>
List-Subscribe: <https://www.ietf.org/mailman/listinfo/oauth>, <mailto:oauth-request@ietf.org?subject=subscribe>
X-List-Received-Date: Fri, 08 Feb 2013 05:54:55 -0000

--Apple-Mail=_EDEA92BF-EA0E-409C-A2AD-98C7DB184394
Content-Transfer-Encoding: quoted-printable
Content-Type: text/plain;
	charset=iso-8859-1

This discussion seems to take one step into the territory that I think =
of as "deep" AS/RS communications. Solving token introspection all by =
itself means that a whole bunch of stuff must have been settled out of =
band/statically/in proprietary fashion. It's for this reason that UMA =
spec'd out "deep" communications, calling out to the token introspection =
spec for one "shallow" piece. The additional pieces include:

- Machine-readable AS config data that specifies the token profiles it =
supports (in this case, an UMA "requesting party token" profile that =
participates in its unique "get a token/use a token" flows)
- An MTI token profile
- An extensible mechanism for defining token profiles
- An extensible mechanism for requiring, allowing, and/or disallowing =
use of the token introspection endpoint for token profiles other than =
the MTI one

UMA calls the data associated with the token "authorization data". The =
spec always says "associated with", and not "contained within", since =
then it covers both structured and "artifact" token use cases. I've been =
thinking for some time that it would be useful to characterize token =
types/profiles along two axes: the format of the data and whether the =
data is locally accessible to the RS (e.g. through verifying a signature =
or decrypting a blob or whatever) vs. must be retrieved from the AS at =
run time by dereferencing an artifact. Justin, your note below hints at =
both of these.

I'm a bit wary of spec'ing some of the "deep" pieces in the token =
introspection spec unless we take a global view of what may really be =
required.

	Eve


On 7 Feb 2013, at 9:00 AM, Justin Richer <jricher@mitre.org> wrote:

> It validates the token, which would be either the token itself in the =
case of Bearer or the token "id" part of something more complex like =
MAC. It doesn't directly validate the usage of the token, that's still =
up to the PR to do that.
>=20
> I nearly added a "token type" field in this draft, but held back =
because there are several kinds of "token type" that people talk about =
in OAuth. First, there's "Bearer" vs. "MAC" vs. "HOK", or what have you. =
Then within Bearer you have "JWT" or "SAML" or "unstructured blob". Then =
you've also got "access" vs. "refresh" and other flavors of token, like =
the id_token in OpenID Connect.=20
>=20
> Thing is, the server running the introspection endpoint will probably =
know *all* of these. But should it tell the client? If so, which of the =
three, and what names should the fields be?
>=20
>  -- Justin
>=20
> On 02/07/2013 11:26 AM, Prabath Siriwardena wrote:
>> Okay.. I was thinking this could be used as a way to validate the =
token as well. BTW even in this case shouldn't communicate the type of =
token to AS? For example in the case of SAML profile - it could be SAML =
token..
>>=20
>> Thanks & regards,
>> -Prabath
>>=20
>> On Thu, Feb 7, 2013 at 8:39 PM, Justin Richer <jricher@mitre.org> =
wrote:
>> "valid" might not be the best term, but it's meant to be a field =
where the server says "yes this token is still good" or "no this token =
isn't good anymore". We could instead do this with HTTP codes or =
something but I went with a pure JSON response.
>>=20
>>  -- Justin
>>=20
>>=20
>> On 02/06/2013 10:47 PM, Prabath Siriwardena wrote:
>>> Hi Justin,
>>>=20
>>> I believe this is addressing one of the key missing part in OAuth =
2.0...
>>>=20
>>> One question - I guess this was discussed already...
>>>=20
>>> In the spec - in the introspection response it has the attribute =
"valid" - this is basically the validity of the token provided in the =
request.
>>>=20
>>> Validation criteria depends on the token and well as token type ( =
Bearer, MAC..).
>>>=20
>>> In the spec it seems like it's coupled with Bearer token type... But =
I guess, by adding "token_type" to the request we can remove this =
dependency.
>>>=20
>>> WDYT..?
>>>=20
>>> Thanks & regards,
>>> -Prabath=20
>>>=20
>>> On Thu, Feb 7, 2013 at 12:54 AM, Justin Richer <jricher@mitre.org> =
wrote:
>>> Updated introspection draft based on recent comments. Changes =
include:
>>>=20
>>>  - "scope" return parameter now follows RFC6749 format instead of =
JSON array
>>>  - "subject" -> "sub", and "audience" -> "aud", to be parallel with =
JWT claims
>>>  - clarified what happens if the authentication is bad
>>>=20
>>>  -- Justin
>>>=20
>>>=20
>>> -------- Original Message --------
>>> Subject:	New Version Notification for =
draft-richer-oauth-introspection-02.txt
>>> Date:	Wed, 6 Feb 2013 11:24:20 -0800
>>> From:	<internet-drafts@ietf.org>
>>> To:	<jricher@mitre.org>
>>>=20
>>> A new version of I-D, draft-richer-oauth-introspection-02.txt
>>> has been successfully submitted by Justin Richer and posted to the
>>> IETF repository.
>>>=20
>>> Filename:	 draft-richer-oauth-introspection
>>> Revision:	 02
>>> Title:		 OAuth Token Introspection
>>> Creation date:	 2013-02-06
>>> WG ID:		 Individual Submission
>>> Number of pages: 6
>>> URL:             =
http://www.ietf.org/internet-drafts/draft-richer-oauth-introspection-02.tx=
t
>>> Status:          =
http://datatracker.ietf.org/doc/draft-richer-oauth-introspection
>>> Htmlized:        =
http://tools.ietf.org/html/draft-richer-oauth-introspection-02
>>> Diff:            =
http://www.ietf.org/rfcdiff?url2=3Ddraft-richer-oauth-introspection-02
>>>=20
>>> Abstract:
>>>    This specification defines a method for a client or protected
>>>    resource to query an OAuth authorization server to determine =
meta-
>>>    information about an OAuth token.
>>>=20
>>>=20
>>>                                                                      =
            =20
>>>=20
>>>=20
>>> The IETF Secretariat
>>>=20
>>>=20
>>>=20
>>>=20
>>> _______________________________________________
>>> OAuth mailing list
>>> OAuth@ietf.org
>>> https://www.ietf.org/mailman/listinfo/oauth
>>>=20
>>>=20
>>>=20
>>>=20
>>> --=20
>>> Thanks & Regards,
>>> Prabath
>>>=20
>>> Mobile : +94 71 809 6732=20
>>>=20
>>> http://blog.facilelogin.com
>>> http://RampartFAQ.com
>>=20
>>=20
>>=20
>>=20
>> --=20
>> Thanks & Regards,
>> Prabath
>>=20
>> Mobile : +94 71 809 6732=20
>>=20
>> http://blog.facilelogin.com
>> http://RampartFAQ.com
>=20
> _______________________________________________
> OAuth mailing list
> OAuth@ietf.org
> https://www.ietf.org/mailman/listinfo/oauth


Eve Maler                                  http://www.xmlgrrl.com/blog
+1 425 345 6756                         http://www.twitter.com/xmlgrrl


--Apple-Mail=_EDEA92BF-EA0E-409C-A2AD-98C7DB184394
Content-Transfer-Encoding: quoted-printable
Content-Type: text/html;
	charset=iso-8859-1

<html><head><meta http-equiv=3D"Content-Type" content=3D"text/html =
charset=3Diso-8859-1"></head><body style=3D"word-wrap: break-word; =
-webkit-nbsp-mode: space; -webkit-line-break: after-white-space; =
"><div>This discussion seems to take one step into the territory that I =
think of as "deep" AS/RS communications. Solving token introspection all =
by itself means that a whole bunch of stuff must have been settled out =
of band/statically/in proprietary fashion. It's for this reason that UMA =
spec'd out "deep" communications, calling out to the token introspection =
spec for one "shallow" piece. The additional pieces =
include:</div><div><br></div><div>- Machine-readable AS config data that =
specifies the token profiles it supports (in this case, an UMA =
"requesting party token" profile that participates in its unique "get a =
token/use a token" flows)</div><div>- An MTI token profile</div><div>- =
An extensible mechanism for defining token profiles</div><div>- An =
extensible mechanism for requiring, allowing, and/or disallowing use of =
the token introspection endpoint for token profiles other than the MTI =
one</div><div><br></div><div>UMA calls the data associated with the =
token "authorization data". The spec always says "associated with", and =
not "contained within", since then it covers both structured and =
"artifact" token use cases. I've been thinking for some time that it =
would be useful to characterize token types/profiles along two axes: the =
format of the data and whether the data is locally accessible to the RS =
(e.g. through verifying a signature or decrypting a blob or whatever) =
vs. must be retrieved from the AS at run time by dereferencing an =
artifact. Justin, your note below hints at both of =
these.</div><div><br></div><div>I'm a bit wary of spec'ing some of the =
"deep" pieces in the token introspection spec unless we take a global =
view of what may really be required.</div><div><br></div><div><span =
class=3D"Apple-tab-span" style=3D"white-space:pre">	=
</span>Eve</div><div><br></div><div><br></div><div><div>On 7 Feb 2013, =
at 9:00 AM, Justin Richer &lt;<a =
href=3D"mailto:jricher@mitre.org">jricher@mitre.org</a>&gt; =
wrote:</div><br class=3D"Apple-interchange-newline"><blockquote =
type=3D"cite">
 =20
    <meta content=3D"text/html; charset=3DISO-8859-1" =
http-equiv=3D"Content-Type">
 =20
  <div bgcolor=3D"#FFFFFF" text=3D"#000000">
    It validates the token, which would be either the token itself in
    the case of Bearer or the token "id" part of something more complex
    like MAC. It doesn't directly validate the usage of the token,
    that's still up to the PR to do that.<br>
    <br>
    I nearly added a "token type" field in this draft, but held back
    because there are several kinds of "token type" that people talk
    about in OAuth. First, there's "Bearer" vs. "MAC" vs. "HOK", or what
    have you. Then within Bearer you have "JWT" or "SAML" or
    "unstructured blob". Then you've also got "access" vs. "refresh" and
    other flavors of token, like the id_token in OpenID Connect. <br>
    <br>
    Thing is, the server running the introspection endpoint will
    probably know *all* of these. But should it tell the client? If so,
    which of the three, and what names should the fields be?<br>
    <br>
    &nbsp;-- Justin<br>
    <br>
    <div class=3D"moz-cite-prefix">On 02/07/2013 11:26 AM, Prabath
      Siriwardena wrote:<br>
    </div>
    <blockquote =
cite=3D"mid:CAJV9qO8BVV57eAb5kUNes15AYOpUKqw5XWQswh-FJA=3Db1pPgSA@mail.gma=
il.com" type=3D"cite">
      <meta http-equiv=3D"Content-Type" content=3D"text/html;
        charset=3DISO-8859-1">
      Okay.. I was thinking this could be used as a way to validate the
      token as well. BTW even in this case shouldn't communicate the
      type of token to AS? For example in the case of SAML profile - it
      could be SAML token..
      <div>
        <br>
      </div>
      <div>Thanks &amp; regards,</div>
      <div>-Prabath<br>
        <br>
        <div class=3D"gmail_quote">On Thu, Feb 7, 2013 at 8:39 PM, =
Justin
          Richer <span dir=3D"ltr">&lt;<a moz-do-not-send=3D"true" =
href=3D"mailto:jricher@mitre.org" =
target=3D"_blank">jricher@mitre.org</a>&gt;</span>
          wrote:<br>
          <blockquote class=3D"gmail_quote" style=3D"margin:0 0 0
            .8ex;border-left:1px #ccc solid;padding-left:1ex">
            <div bgcolor=3D"#FFFFFF" text=3D"#000000"> "valid" might not =
be
              the best term, but it's meant to be a field where the
              server says "yes this token is still good" or "no this
              token isn't good anymore". We could instead do this with
              HTTP codes or something but I went with a pure JSON
              response.<span class=3D"HOEnZb"><font color=3D"#888888"><br>=

                  <br>
                  &nbsp;-- Justin</font></span>
              <div>
                <div class=3D"h5"><br>
                  <br>
                  <div>On 02/06/2013 10:47 PM, Prabath Siriwardena
                    wrote:<br>
                  </div>
                  <blockquote type=3D"cite"> Hi Justin,
                    <div><br>
                    </div>
                    <div>I believe this is addressing one of the key
                      missing part in OAuth 2.0...</div>
                    <div><br>
                    </div>
                    <div>One question - I guess this was discussed
                      already...</div>
                    <div><br>
                    </div>
                    <div>In the spec - in the introspection response it
                      has the attribute "valid" - this is basically the
                      validity of the token provided in the =
request.</div>
                    <div><br>
                    </div>
                    <div>Validation&nbsp;criteria depends on the token =
and
                      well as token type ( Bearer, MAC..).</div>
                    <div><br>
                    </div>
                    <div>In the spec it seems like it's coupled with
                      Bearer token type... But I guess, by adding
                      "token_type" to the request we can remove this
                      dependency.</div>
                    <div><br>
                    </div>
                    <div>WDYT..?</div>
                    <div><br>
                    </div>
                    <div>Thanks &amp; regards,</div>
                    <div>-Prabath&nbsp;</div>
                    <div><br>
                      <div class=3D"gmail_quote">On Thu, Feb 7, 2013 at
                        12:54 AM, Justin Richer <span dir=3D"ltr">&lt;<a =
moz-do-not-send=3D"true" href=3D"mailto:jricher@mitre.org" =
target=3D"_blank">jricher@mitre.org</a>&gt;</span>
                        wrote:<br>
                        <blockquote class=3D"gmail_quote" =
style=3D"margin:0
                          0 0 .8ex;border-left:1px #ccc
                          solid;padding-left:1ex">
                          <div bgcolor=3D"#FFFFFF" text=3D"#000000"> =
Updated
                            introspection draft based on recent
                            comments. Changes include:<br>
                            <br>
                            &nbsp;- "scope" return parameter now follows
                            RFC6749 format instead of JSON array<br>
                            &nbsp;- "subject" -&gt; "sub", and =
"audience"
                            -&gt; "aud", to be parallel with JWT =
claims<br>
                            &nbsp;- clarified what happens if the
                            authentication is bad<br>
                            <br>
                            &nbsp;-- Justin<br>
                            <div><br>
                              <br>
                              -------- Original Message --------
                              <table border=3D"0" cellpadding=3D"0" =
cellspacing=3D"0">
                                <tbody>
                                  <tr>
                                    <th align=3D"RIGHT" nowrap=3D"nowrap" =
valign=3D"BASELINE">Subject: </th>
                                    <td>New Version Notification for
                                      =
draft-richer-oauth-introspection-02.txt</td>
                                  </tr>
                                  <tr>
                                    <th align=3D"RIGHT" nowrap=3D"nowrap" =
valign=3D"BASELINE">Date: </th>
                                    <td>Wed, 6 Feb 2013 11:24:20 =
-0800</td>
                                  </tr>
                                  <tr>
                                    <th align=3D"RIGHT" nowrap=3D"nowrap" =
valign=3D"BASELINE">From: </th>
                                    <td><a moz-do-not-send=3D"true" =
href=3D"mailto:internet-drafts@ietf.org" =
target=3D"_blank">&lt;internet-drafts@ietf.org&gt;</a></td>
                                  </tr>
                                  <tr>
                                    <th align=3D"RIGHT" nowrap=3D"nowrap" =
valign=3D"BASELINE">To: </th>
                                    <td><a moz-do-not-send=3D"true" =
href=3D"mailto:jricher@mitre.org" =
target=3D"_blank">&lt;jricher@mitre.org&gt;</a></td>
                                  </tr>
                                </tbody>
                              </table>
                              <br>
                              <br>
                              <pre>A new version of I-D, =
draft-richer-oauth-introspection-02.txt
has been successfully submitted by Justin Richer and posted to the
IETF repository.

Filename:	 draft-richer-oauth-introspection
Revision:	 02
Title:		 OAuth Token Introspection
Creation date:	 2013-02-06
WG ID:		 Individual Submission
Number of pages: 6
URL:             <a moz-do-not-send=3D"true" =
href=3D"http://www.ietf.org/internet-drafts/draft-richer-oauth-introspecti=
on-02.txt" =
target=3D"_blank">http://www.ietf.org/internet-drafts/draft-richer-oauth-i=
ntrospection-02.txt</a>
Status:          <a moz-do-not-send=3D"true" =
href=3D"http://datatracker.ietf.org/doc/draft-richer-oauth-introspection" =
target=3D"_blank">http://datatracker.ietf.org/doc/draft-richer-oauth-intro=
spection</a>
Htmlized:        <a moz-do-not-send=3D"true" =
href=3D"http://tools.ietf.org/html/draft-richer-oauth-introspection-02" =
target=3D"_blank">http://tools.ietf.org/html/draft-richer-oauth-introspect=
ion-02</a>
Diff:            <a moz-do-not-send=3D"true" =
href=3D"http://www.ietf.org/rfcdiff?url2=3Ddraft-richer-oauth-introspectio=
n-02" =
target=3D"_blank">http://www.ietf.org/rfcdiff?url2=3Ddraft-richer-oauth-in=
trospection-02</a>

Abstract:
   This specification defines a method for a client or protected
   resource to query an OAuth authorization server to determine meta-
   information about an OAuth token.


                                                                         =
        =20


The IETF Secretariat

</pre>
                              <br>
                            </div>
                            <br>
                          </div>
                          <br>
_______________________________________________<br>
                          OAuth mailing list<br>
                          <a moz-do-not-send=3D"true" =
href=3D"mailto:OAuth@ietf.org" target=3D"_blank">OAuth@ietf.org</a><br>
                          <a moz-do-not-send=3D"true" =
href=3D"https://www.ietf.org/mailman/listinfo/oauth" =
target=3D"_blank">https://www.ietf.org/mailman/listinfo/oauth</a><br>
                          <br>
                        </blockquote>
                      </div>
                      <br>
                      <br clear=3D"all">
                      <div><br>
                      </div>
                      -- <br>
                      Thanks &amp; Regards,<br>
                      Prabath
                      <div><br>
                      </div>
                      <div>Mobile : <a moz-do-not-send=3D"true" =
href=3D"tel:%2B94%2071%20809%206732" value=3D"+94718096732" =
target=3D"_blank">+94 71
                          809 6732</a>&nbsp;<br>
                        <br>
                        <a moz-do-not-send=3D"true" =
href=3D"http://blog.facilelogin.com/" =
target=3D"_blank">http://blog.facilelogin.com</a><br>
                        <a moz-do-not-send=3D"true" =
href=3D"http://rampartfaq.com/" =
target=3D"_blank">http://RampartFAQ.com</a></div>
                    </div>
                  </blockquote>
                  <br>
                </div>
              </div>
            </div>
          </blockquote>
        </div>
        <br>
        <br clear=3D"all">
        <div><br>
        </div>
        -- <br>
        Thanks &amp; Regards,<br>
        Prabath
        <div><br>
        </div>
        <div>Mobile : +94 71 809 6732&nbsp;<br>
          <br>
          <a moz-do-not-send=3D"true" =
href=3D"http://blog.facilelogin.com/" =
target=3D"_blank">http://blog.facilelogin.com</a><br>
          <a moz-do-not-send=3D"true" href=3D"http://rampartfaq.com/" =
target=3D"_blank">http://RampartFAQ.com</a></div>
      </div>
    </blockquote>
    <br>
  </div>

_______________________________________________<br>OAuth mailing =
list<br><a =
href=3D"mailto:OAuth@ietf.org">OAuth@ietf.org</a><br>https://www.ietf.org/=
mailman/listinfo/oauth<br></blockquote></div><br><div =
apple-content-edited=3D"true">
<div style=3D"color: rgb(0, 0, 0); font-family: Helvetica; font-size: =
medium; font-style: normal; font-variant: normal; font-weight: normal; =
letter-spacing: normal; line-height: normal; orphans: 2; text-align: =
-webkit-auto; text-indent: 0px; text-transform: none; white-space: =
normal; widows: 2; word-spacing: 0px; -webkit-text-size-adjust: auto; =
-webkit-text-stroke-width: 0px; word-wrap: break-word; =
-webkit-nbsp-mode: space; -webkit-line-break: after-white-space; "><span =
class=3D"Apple-style-span" style=3D"border-collapse: separate; color: =
rgb(0, 0, 0); font-family: Helvetica; font-style: normal; font-variant: =
normal; font-weight: normal; letter-spacing: normal; line-height: =
normal; orphans: 2; text-align: -webkit-auto; text-indent: 0px; =
text-transform: none; white-space: normal; widows: 2; word-spacing: 0px; =
border-spacing: 0px; -webkit-text-decorations-in-effect: none; =
-webkit-text-size-adjust: auto; -webkit-text-stroke-width: 0px; =
font-size: medium; "><span class=3D"Apple-style-span" =
style=3D"font-family: Courier; "><br =
class=3D"Apple-interchange-newline">Eve Maler &nbsp; &nbsp; &nbsp; =
&nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; =
&nbsp; &nbsp; &nbsp; &nbsp;<a =
href=3D"http://www.xmlgrrl.com/blog">http://www.xmlgrrl.com/blog</a><br>+1=
 425 345 6756 &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; =
&nbsp; &nbsp; &nbsp; &nbsp;&nbsp;<a =
href=3D"http://www.twitter.com/xmlgrrl">http://www.twitter.com/xmlgrrl</a>=
</span></span></div>
</div>
<br></body></html>=

--Apple-Mail=_EDEA92BF-EA0E-409C-A2AD-98C7DB184394--

From hannes.tschofenig@gmx.net  Thu Feb  7 23:47:12 2013
Return-Path: <hannes.tschofenig@gmx.net>
X-Original-To: oauth@ietfa.amsl.com
Delivered-To: oauth@ietfa.amsl.com
Received: from localhost (localhost [127.0.0.1]) by ietfa.amsl.com (Postfix) with ESMTP id C912F21F8971 for <oauth@ietfa.amsl.com>; Thu,  7 Feb 2013 23:47:12 -0800 (PST)
X-Virus-Scanned: amavisd-new at amsl.com
X-Spam-Flag: NO
X-Spam-Score: -101.835
X-Spam-Level: 
X-Spam-Status: No, score=-101.835 tagged_above=-999 required=5 tests=[AWL=0.145, BAYES_00=-2.599, RCVD_IN_SORBS_WEB=0.619, USER_IN_WHITELIST=-100]
Received: from mail.ietf.org ([64.170.98.30]) by localhost (ietfa.amsl.com [127.0.0.1]) (amavisd-new, port 10024) with ESMTP id 6PA+ShbeOTnO for <oauth@ietfa.amsl.com>; Thu,  7 Feb 2013 23:47:12 -0800 (PST)
Received: from mout.gmx.net (mout.gmx.net [212.227.15.19]) by ietfa.amsl.com (Postfix) with ESMTP id AA54B21F895B for <oauth@ietf.org>; Thu,  7 Feb 2013 23:47:11 -0800 (PST)
Received: from mailout-de.gmx.net ([10.1.76.19]) by mrigmx.server.lan (mrigmx002) with ESMTP (Nemesis) id 0LwTpp-1V0k8A3nx9-018JjR for <oauth@ietf.org>; Fri, 08 Feb 2013 08:47:09 +0100
Received: (qmail invoked by alias); 08 Feb 2013 07:47:09 -0000
Received: from unknown (EHLO [10.255.135.8]) [194.251.119.201] by mail.gmx.net (mp019) with SMTP; 08 Feb 2013 08:47:09 +0100
X-Authenticated: #29516787
X-Provags-ID: V01U2FsdGVkX18TOINlQJ0TYF5s1eHehaRdNRwRmqNSsNKShMZ7l+ NvBV9aArfPGbrG
From: Hannes Tschofenig <hannes.tschofenig@gmx.net>
Content-Type: text/plain; charset=us-ascii
Content-Transfer-Encoding: 7bit
Date: Fri, 8 Feb 2013 09:47:05 +0200
Message-Id: <A970A7A4-E34E-433E-91B4-77B95401606A@gmx.net>
To: IETF oauth WG <oauth@ietf.org>
Mime-Version: 1.0 (Apple Message framework v1085)
X-Mailer: Apple Mail (2.1085)
X-Y-GMX-Trusted: 0
Subject: [OAUTH-WG] Reminder: Design Team Conference Call - Feb. 11th at 1pm EST
X-BeenThere: oauth@ietf.org
X-Mailman-Version: 2.1.12
Precedence: list
List-Id: OAUTH WG <oauth.ietf.org>
List-Unsubscribe: <https://www.ietf.org/mailman/options/oauth>, <mailto:oauth-request@ietf.org?subject=unsubscribe>
List-Archive: <http://www.ietf.org/mail-archive/web/oauth>
List-Post: <mailto:oauth@ietf.org>
List-Help: <mailto:oauth-request@ietf.org?subject=help>
List-Subscribe: <https://www.ietf.org/mailman/listinfo/oauth>, <mailto:oauth-request@ietf.org?subject=subscribe>
X-List-Received-Date: Fri, 08 Feb 2013 07:47:13 -0000

We are using John's/Nat's conference bridge again:
https://www3.gotomeeting.com/join/695548174 

From asanso@adobe.com  Fri Feb  8 01:16:10 2013
Return-Path: <asanso@adobe.com>
X-Original-To: oauth@ietfa.amsl.com
Delivered-To: oauth@ietfa.amsl.com
Received: from localhost (localhost [127.0.0.1]) by ietfa.amsl.com (Postfix) with ESMTP id 6A3DA21F86AA for <oauth@ietfa.amsl.com>; Fri,  8 Feb 2013 01:16:09 -0800 (PST)
X-Virus-Scanned: amavisd-new at amsl.com
X-Spam-Flag: NO
X-Spam-Score: -106.598
X-Spam-Level: 
X-Spam-Status: No, score=-106.598 tagged_above=-999 required=5 tests=[BAYES_00=-2.599, HTML_MESSAGE=0.001, RCVD_IN_DNSWL_MED=-4, USER_IN_WHITELIST=-100]
Received: from mail.ietf.org ([64.170.98.30]) by localhost (ietfa.amsl.com [127.0.0.1]) (amavisd-new, port 10024) with ESMTP id 6sRWwDFdqM78 for <oauth@ietfa.amsl.com>; Fri,  8 Feb 2013 01:16:08 -0800 (PST)
Received: from exprod6og112.obsmtp.com (exprod6og112.obsmtp.com [64.18.1.29]) by ietfa.amsl.com (Postfix) with ESMTP id 18DBA21F85D7 for <oauth@ietf.org>; Fri,  8 Feb 2013 01:16:05 -0800 (PST)
Received: from outbound-smtp-2.corp.adobe.com ([193.104.215.16]) by exprod6ob112.postini.com ([64.18.5.12]) with SMTP ID DSNKURTCVeiuQYrMXHGYJQ0HUSd2WddCZ7BO@postini.com; Fri, 08 Feb 2013 01:16:07 PST
Received: from inner-relay-4.eur.adobe.com (inner-relay-4b [10.128.4.237]) by outbound-smtp-2.corp.adobe.com (8.12.10/8.12.10) with ESMTP id r189G4C9014800; Fri, 8 Feb 2013 01:16:04 -0800 (PST)
Received: from nacas03.corp.adobe.com (nacas03.corp.adobe.com [10.8.189.121]) by inner-relay-4.eur.adobe.com (8.12.10/8.12.9) with ESMTP id r189FpXQ001684; Fri, 8 Feb 2013 01:16:03 -0800 (PST)
Received: from eurcas01.eur.adobe.com (10.128.4.27) by nacas03.corp.adobe.com (10.8.189.121) with Microsoft SMTP Server (TLS) id 8.3.297.1; Fri, 8 Feb 2013 01:15:57 -0800
Received: from eurmbx01.eur.adobe.com ([10.128.4.32]) by eurcas01.eur.adobe.com ([10.128.4.27]) with mapi; Fri, 8 Feb 2013 09:15:55 +0000
From: Antonio Sanso <asanso@adobe.com>
To: Prabath Siriwardena <prabath@wso2.com>
Date: Fri, 8 Feb 2013 09:15:53 +0000
Thread-Topic: [OAUTH-WG] Does Facebook login OAuth 2.0 compatible ?
Thread-Index: Ac4F3OWI8QeEnqbASlm5YQQvO0zdeQ==
Message-ID: <12A74B80-1846-4F98-AFB6-7FC305EB050B@adobe.com>
References: <CAJV9qO-Qh=0_2ipAnnwunLiWrq0+LiRcmg=s=bxih9VercobAw@mail.gmail.com>
In-Reply-To: <CAJV9qO-Qh=0_2ipAnnwunLiWrq0+LiRcmg=s=bxih9VercobAw@mail.gmail.com>
Accept-Language: en-US
Content-Language: en-US
X-MS-Has-Attach: 
X-MS-TNEF-Correlator: 
acceptlanguage: en-US
Content-Type: multipart/alternative; boundary="_000_12A74B8018464F98AFB67FC305EB050Badobecom_"
MIME-Version: 1.0
Cc: "oauth@ietf.org WG" <oauth@ietf.org>
Subject: Re: [OAUTH-WG] Does Facebook login OAuth 2.0 compatible ?
X-BeenThere: oauth@ietf.org
X-Mailman-Version: 2.1.12
Precedence: list
List-Id: OAUTH WG <oauth.ietf.org>
List-Unsubscribe: <https://www.ietf.org/mailman/options/oauth>, <mailto:oauth-request@ietf.org?subject=unsubscribe>
List-Archive: <http://www.ietf.org/mail-archive/web/oauth>
List-Post: <mailto:oauth@ietf.org>
List-Help: <mailto:oauth-request@ietf.org?subject=help>
List-Subscribe: <https://www.ietf.org/mailman/listinfo/oauth>, <mailto:oauth-request@ietf.org?subject=subscribe>
X-List-Received-Date: Fri, 08 Feb 2013 09:16:10 -0000

--_000_12A74B8018464F98AFB67FC305EB050Badobecom_
Content-Type: text/plain; charset="us-ascii"
Content-Transfer-Encoding: quoted-printable

Hi Prabath,

As long as I know Facebook implement OAuth 2.0 draft 10 (so a pretty old ve=
rsion of the spec).
The RFC was based on draft 31.

Regards

Antonio


On Feb 5, 2013, at 5:54 PM, Prabath Siriwardena wrote:

Here are some references that I found they do not.. thoughts appreciated...

1. https://developers.facebook.com/docs/howtos/login/login-as-app/
2. https://developers.facebook.com/docs/howtos/login/extending-tokens/
3. https://developers.facebook.com/docs/howtos/login/login-as-page/

Thanks & Regards,
Prabath

Mobile : +94 71 809 6732

http://blog.facilelogin.com<http://blog.facilelogin.com/>
http://RampartFAQ.com<http://RampartFAQ.com/>
_______________________________________________
OAuth mailing list
OAuth@ietf.org<mailto:OAuth@ietf.org>
https://www.ietf.org/mailman/listinfo/oauth


--_000_12A74B8018464F98AFB67FC305EB050Badobecom_
Content-Type: text/html; charset="us-ascii"
Content-Transfer-Encoding: quoted-printable

<html><head></head><body style=3D"word-wrap: break-word; -webkit-nbsp-mode:=
 space; -webkit-line-break: after-white-space; "><div>Hi Prabath,</div><div=
><br></div>As long as I know Facebook implement OAuth 2.0 draft 10 (so a pr=
etty old version of the spec).<div>The RFC was based on draft 31.</div><div=
><br></div><div>Regards</div><div><br></div><div>Antonio<br><div><br></div>=
<div><br><div><div>On Feb 5, 2013, at 5:54 PM, Prabath Siriwardena wrote:</=
div><br class=3D"Apple-interchange-newline"><blockquote type=3D"cite">Here =
are some references that I found they do not.. thoughts appreciated...<div>=
<br></div><div>1.&nbsp;<a href=3D"https://developers.facebook.com/docs/howt=
os/login/login-as-app/">https://developers.facebook.com/docs/howtos/login/l=
ogin-as-app/</a></div>
<div>2.&nbsp;<a href=3D"https://developers.facebook.com/docs/howtos/login/e=
xtending-tokens/">https://developers.facebook.com/docs/howtos/login/extendi=
ng-tokens/</a></div><div>3.&nbsp;<a href=3D"https://developers.facebook.com=
/docs/howtos/login/login-as-page/">https://developers.facebook.com/docs/how=
tos/login/login-as-page/</a><br clear=3D"all">
<div><br></div>Thanks &amp; Regards,<br>Prabath<div><br></div><div>Mobile :=
 +94 71 809 6732&nbsp;<br><br><a href=3D"http://blog.facilelogin.com/" targ=
et=3D"_blank">http://blog.facilelogin.com</a><br><a href=3D"http://RampartF=
AQ.com/" target=3D"_blank">http://RampartFAQ.com</a></div>

</div>
_______________________________________________<br>OAuth mailing list<br><a=
 href=3D"mailto:OAuth@ietf.org">OAuth@ietf.org</a><br>https://www.ietf.org/=
mailman/listinfo/oauth<br></blockquote></div><br></div></div></body></html>=

--_000_12A74B8018464F98AFB67FC305EB050Badobecom_--

From hannes.tschofenig@gmx.net  Mon Feb 11 09:28:57 2013
Return-Path: <hannes.tschofenig@gmx.net>
X-Original-To: oauth@ietfa.amsl.com
Delivered-To: oauth@ietfa.amsl.com
Received: from localhost (localhost [127.0.0.1]) by ietfa.amsl.com (Postfix) with ESMTP id C7FD321F883C for <oauth@ietfa.amsl.com>; Mon, 11 Feb 2013 09:28:57 -0800 (PST)
X-Virus-Scanned: amavisd-new at amsl.com
X-Spam-Flag: NO
X-Spam-Score: -102.472
X-Spam-Level: 
X-Spam-Status: No, score=-102.472 tagged_above=-999 required=5 tests=[AWL=0.127, BAYES_00=-2.599, USER_IN_WHITELIST=-100]
Received: from mail.ietf.org ([64.170.98.30]) by localhost (ietfa.amsl.com [127.0.0.1]) (amavisd-new, port 10024) with ESMTP id R29NLCbdALew for <oauth@ietfa.amsl.com>; Mon, 11 Feb 2013 09:28:56 -0800 (PST)
Received: from mout.gmx.net (mout.gmx.net [212.227.17.21]) by ietfa.amsl.com (Postfix) with ESMTP id 79EF721F8826 for <oauth@ietf.org>; Mon, 11 Feb 2013 09:28:56 -0800 (PST)
Received: from mailout-de.gmx.net ([10.1.76.20]) by mrigmx.server.lan (mrigmx002) with ESMTP (Nemesis) id 0MhOyy-1UImnt2bJq-00Ma2q for <oauth@ietf.org>; Mon, 11 Feb 2013 18:28:55 +0100
Received: (qmail invoked by alias); 11 Feb 2013 17:28:55 -0000
Received: from a88-115-219-140.elisa-laajakaista.fi (EHLO [192.168.100.100]) [88.115.219.140] by mail.gmx.net (mp020) with SMTP; 11 Feb 2013 18:28:55 +0100
X-Authenticated: #29516787
X-Provags-ID: V01U2FsdGVkX19h0X4OYvthpTS+JtV3VwI9z5HQCFQ33WqSF1qKkn hH5RkEw1J/mrcr
Mime-Version: 1.0 (Apple Message framework v1085)
Content-Type: text/plain; charset=us-ascii
From: Hannes Tschofenig <hannes.tschofenig@gmx.net>
In-Reply-To: <5112BE73.2070003@mitre.org>
Date: Mon, 11 Feb 2013 19:28:53 +0200
Content-Transfer-Encoding: quoted-printable
Message-Id: <5FDE6412-5892-4840-935A-20A8A3BC49A0@gmx.net>
References: <20130206201534.13236.6681.idtracker@ietfa.amsl.com> <5112BE73.2070003@mitre.org>
To: Justin Richer <jricher@mitre.org>
X-Mailer: Apple Mail (2.1085)
X-Y-GMX-Trusted: 0
Cc: oauth@ietf.org
Subject: Re: [OAUTH-WG] I-D Action: draft-ietf-oauth-dyn-reg-05.txt
X-BeenThere: oauth@ietf.org
X-Mailman-Version: 2.1.12
Precedence: list
List-Id: OAUTH WG <oauth.ietf.org>
List-Unsubscribe: <https://www.ietf.org/mailman/options/oauth>, <mailto:oauth-request@ietf.org?subject=unsubscribe>
List-Archive: <http://www.ietf.org/mail-archive/web/oauth>
List-Post: <mailto:oauth@ietf.org>
List-Help: <mailto:oauth-request@ietf.org?subject=help>
List-Subscribe: <https://www.ietf.org/mailman/listinfo/oauth>, <mailto:oauth-request@ietf.org?subject=subscribe>
X-List-Received-Date: Mon, 11 Feb 2013 17:28:57 -0000

Hi Justin,=20

just one comment on this specific issue:=20

On Feb 6, 2013, at 10:34 PM, Justin Richer wrote:

> 1. client shows up at the Client Registration Endpoint, posts a JSON =
object with a few bits of metadata about itself (and potentially =
presents an Access Token that it got from some out of band process that =
acts as a "class registration" or "developer key", important to several =
known real-world use cases)

The starting point of the dynamic registry document was that the client =
does not yet have some secret with the authorization server and for that =
reason it does all this dance.=20
Now, you write that it may have some "developer key" (which is sort of =
similar to what the client id/client secret is).=20

That cannot be right.=20

Ciao
Hannes
=20=

From ve7jtb@ve7jtb.com  Mon Feb 11 09:40:12 2013
Return-Path: <ve7jtb@ve7jtb.com>
X-Original-To: oauth@ietfa.amsl.com
Delivered-To: oauth@ietfa.amsl.com
Received: from localhost (localhost [127.0.0.1]) by ietfa.amsl.com (Postfix) with ESMTP id 97C9221F867B for <oauth@ietfa.amsl.com>; Mon, 11 Feb 2013 09:40:12 -0800 (PST)
X-Virus-Scanned: amavisd-new at amsl.com
X-Spam-Flag: NO
X-Spam-Score: -1.36
X-Spam-Level: 
X-Spam-Status: No, score=-1.36 tagged_above=-999 required=5 tests=[AWL=-2.038,  BAYES_00=-2.599, FH_HOST_EQ_D_D_D_D=0.765, FH_HOST_EQ_D_D_D_DB=0.888,  RCVD_IN_PBL=0.905, RCVD_IN_SORBS_WEB=0.619, RDNS_DYNAMIC=0.1]
Received: from mail.ietf.org ([64.170.98.30]) by localhost (ietfa.amsl.com [127.0.0.1]) (amavisd-new, port 10024) with ESMTP id qNp7PlQCTrXT for <oauth@ietfa.amsl.com>; Mon, 11 Feb 2013 09:40:11 -0800 (PST)
Received: from mail-gg0-x22d.google.com (gg-in-x022d.1e100.net [IPv6:2607:f8b0:4002:c02::22d]) by ietfa.amsl.com (Postfix) with ESMTP id 6D94121F865B for <oauth@ietf.org>; Mon, 11 Feb 2013 09:40:11 -0800 (PST)
Received: by mail-gg0-f173.google.com with SMTP id b6so731906ggm.18 for <oauth@ietf.org>; Mon, 11 Feb 2013 09:40:10 -0800 (PST)
X-Google-DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=google.com; s=20120113; h=x-received:content-type:mime-version:subject:from:in-reply-to:date :cc:content-transfer-encoding:message-id:references:to:x-mailer :x-gm-message-state; bh=LoEmFd/z28kLnZ/UtkAE9xa9J7QAE6moXUORpLskJsM=; b=B241svJ74w4ELKxLjX4DAGv7IRghDWaLtw0eoBdZqg6+XK4Eqh6LvjyDY2zAuy9dES OCDY/c8rpTJzMO6rbghzJ8uInOpTam4jec6pyQaQjjo5ezF9y4OD2zsJAiAVVzx8PA1A JmS+W2JWeIv+ReNX9l/teXU49kVEoXs/6FRc13Nd52xhLHXyUeUELeViOwu0toNHd74g jIaTXqTH2IpKqQTOw7tVY+y+XD/Owm7vUoLqyKKPAknPujrCsFDlfBN+ZIWIocgFOYbb EhhmXbcasDWafjj+DJZgOeRtv0KbLz0DLa9rqQ8hPK6gosE3y7kCq1iwA9pVVdM5sMi4 LZOw==
X-Received: by 10.236.131.232 with SMTP id m68mr18676967yhi.100.1360604410825;  Mon, 11 Feb 2013 09:40:10 -0800 (PST)
Received: from [192.168.1.213] (190-20-50-112.baf.movistar.cl. [190.20.50.112]) by mx.google.com with ESMTPS id d19sm37032518anm.18.2013.02.11.09.40.06 (version=TLSv1 cipher=ECDHE-RSA-RC4-SHA bits=128/128); Mon, 11 Feb 2013 09:40:08 -0800 (PST)
Content-Type: text/plain; charset=us-ascii
Mime-Version: 1.0 (Mac OS X Mail 6.2 \(1499\))
From: John Bradley <ve7jtb@ve7jtb.com>
In-Reply-To: <5FDE6412-5892-4840-935A-20A8A3BC49A0@gmx.net>
Date: Mon, 11 Feb 2013 14:40:03 -0300
Content-Transfer-Encoding: quoted-printable
Message-Id: <B910E696-7F42-4449-9F2D-5D40053B440A@ve7jtb.com>
References: <20130206201534.13236.6681.idtracker@ietfa.amsl.com> <5112BE73.2070003@mitre.org> <5FDE6412-5892-4840-935A-20A8A3BC49A0@gmx.net>
To: Hannes Tschofenig <hannes.tschofenig@gmx.net>
X-Mailer: Apple Mail (2.1499)
X-Gm-Message-State: ALoCoQkkCCH9hQi6Ou0vD3rsLkCuTpZ2cHI59DGl1XdKYf8+lN6OwU4lJPHNnZIkTu2hWqdEc+fg
Cc: oauth@ietf.org
Subject: Re: [OAUTH-WG] I-D Action: draft-ietf-oauth-dyn-reg-05.txt
X-BeenThere: oauth@ietf.org
X-Mailman-Version: 2.1.12
Precedence: list
List-Id: OAUTH WG <oauth.ietf.org>
List-Unsubscribe: <https://www.ietf.org/mailman/options/oauth>, <mailto:oauth-request@ietf.org?subject=unsubscribe>
List-Archive: <http://www.ietf.org/mail-archive/web/oauth>
List-Post: <mailto:oauth@ietf.org>
List-Help: <mailto:oauth-request@ietf.org?subject=help>
List-Subscribe: <https://www.ietf.org/mailman/listinfo/oauth>, <mailto:oauth-request@ietf.org?subject=subscribe>
X-List-Received-Date: Mon, 11 Feb 2013 17:40:12 -0000

The client may have a developer key which is a bearer token.   How it =
gets it is out of scope,  however we do see in the real world developer =
portals where developers establish accounts and get keys/tokens for =
creating clients.

Depending on the IdP this master token could be issued to a native app =
and then used to create separate client IDs for each instance.

The spec allows a client to have a token for registering or arrive =
without it.    Like OAuth punted on how the client gets a ID and secret, =
we are punting on how the developer gets its initial token if it is =
required.

There are real use cases for this in API management.   It would be nice =
if those systems could leverage this spec rather than being forced to =
create something different.

John B.


On 2013-02-11, at 2:28 PM, Hannes Tschofenig <hannes.tschofenig@gmx.net> =
wrote:

> Hi Justin,=20
>=20
> just one comment on this specific issue:=20
>=20
> On Feb 6, 2013, at 10:34 PM, Justin Richer wrote:
>=20
>> 1. client shows up at the Client Registration Endpoint, posts a JSON =
object with a few bits of metadata about itself (and potentially =
presents an Access Token that it got from some out of band process that =
acts as a "class registration" or "developer key", important to several =
known real-world use cases)
>=20
> The starting point of the dynamic registry document was that the =
client does not yet have some secret with the authorization server and =
for that reason it does all this dance.=20
> Now, you write that it may have some "developer key" (which is sort of =
similar to what the client id/client secret is).=20
>=20
> That cannot be right.=20
>=20
> Ciao
> Hannes
>=20
> _______________________________________________
> OAuth mailing list
> OAuth@ietf.org
> https://www.ietf.org/mailman/listinfo/oauth


From jricher@mitre.org  Mon Feb 11 13:11:23 2013
Return-Path: <jricher@mitre.org>
X-Original-To: oauth@ietfa.amsl.com
Delivered-To: oauth@ietfa.amsl.com
Received: from localhost (localhost [127.0.0.1]) by ietfa.amsl.com (Postfix) with ESMTP id 870A221F8972 for <oauth@ietfa.amsl.com>; Mon, 11 Feb 2013 13:11:23 -0800 (PST)
X-Virus-Scanned: amavisd-new at amsl.com
X-Spam-Flag: NO
X-Spam-Score: -6.57
X-Spam-Level: 
X-Spam-Status: No, score=-6.57 tagged_above=-999 required=5 tests=[AWL=0.029,  BAYES_00=-2.599, RCVD_IN_DNSWL_MED=-4]
Received: from mail.ietf.org ([64.170.98.30]) by localhost (ietfa.amsl.com [127.0.0.1]) (amavisd-new, port 10024) with ESMTP id WRXKVFjMA91c for <oauth@ietfa.amsl.com>; Mon, 11 Feb 2013 13:11:23 -0800 (PST)
Received: from smtpksrv1.mitre.org (smtpksrv1.mitre.org [198.49.146.77]) by ietfa.amsl.com (Postfix) with ESMTP id E475D21F8915 for <oauth@ietf.org>; Mon, 11 Feb 2013 13:11:22 -0800 (PST)
Received: from smtpksrv1.mitre.org (localhost.localdomain [127.0.0.1]) by localhost (Postfix) with SMTP id 52ED953116A2 for <oauth@ietf.org>; Mon, 11 Feb 2013 16:11:22 -0500 (EST)
Received: from IMCCAS03.MITRE.ORG (imccas03.mitre.org [129.83.29.80]) by smtpksrv1.mitre.org (Postfix) with ESMTP id 47A7453116A0 for <oauth@ietf.org>; Mon, 11 Feb 2013 16:11:22 -0500 (EST)
Received: from [10.146.15.29] (129.83.31.58) by IMCCAS03.MITRE.ORG (129.83.29.80) with Microsoft SMTP Server (TLS) id 14.2.318.4; Mon, 11 Feb 2013 16:11:22 -0500
Message-ID: <51195E50.1080103@mitre.org>
Date: Mon, 11 Feb 2013 16:10:40 -0500
From: Justin Richer <jricher@mitre.org>
User-Agent: Mozilla/5.0 (X11; Linux i686; rv:17.0) Gecko/20130106 Thunderbird/17.0.2
MIME-Version: 1.0
To: "oauth@ietf.org" <oauth@ietf.org>
Content-Type: text/plain; charset="ISO-8859-1"; format=flowed
Content-Transfer-Encoding: 7bit
X-Originating-IP: [129.83.31.58]
Subject: [OAUTH-WG] Recent changes to Registration
X-BeenThere: oauth@ietf.org
X-Mailman-Version: 2.1.12
Precedence: list
List-Id: OAUTH WG <oauth.ietf.org>
List-Unsubscribe: <https://www.ietf.org/mailman/options/oauth>, <mailto:oauth-request@ietf.org?subject=unsubscribe>
List-Archive: <http://www.ietf.org/mail-archive/web/oauth>
List-Post: <mailto:oauth@ietf.org>
List-Help: <mailto:oauth-request@ietf.org?subject=help>
List-Subscribe: <https://www.ietf.org/mailman/listinfo/oauth>, <mailto:oauth-request@ietf.org?subject=subscribe>
X-List-Received-Date: Mon, 11 Feb 2013 21:11:23 -0000

As many of you saw, last week I published a draft of the OAuth Dynamic 
Client Registration spec [1] that made some fairly serious changes to 
how the protocol works. It was my intent to distill many threads of 
conversation here on the list into a full, workable protocol with a 
concrete document that we could discuss. I believe that what I published 
did that, but I certainly don't think that all of our work and 
discussion is done. It wasn't my intent to surprise people with the 
draft (apparently I really did!), nor was it my intent to simply dictate 
where the spec was going without any input from the working group.

So to move the discussion forward in a very deliberate fashion, I'm 
going to be starting a number of new threads for discussion on 
particular changes and components to this spec so that we can discuss 
things and decide as a working group what the best courses of action 
are. I'll lay out what the issues are, what -05 says today, what the 
options are as I see them, and we I think can go from there. The topics 
will be:

  - JSON Encoding
  - Endpoint Definition (& operation parameter)
  - HAL _links structure and client self-URL
  - RESTful client lifecycle management
  - Client secret rotation

If you want to talk about the overall design and philosophy of the 
Registration document, just reply to this email.

Of course, all of these interrelate in various ways, and everything must 
be taken in the overall context, but I'm hoping that by splitting things 
up this way we can focus the conversations better. I welcome all 
constructive discussion, debate, and input. As an editor, I am 
particularly grateful for anyone who wants to provide actual text for 
inclusion in the document itself, and any pointers to implemented code 
for any of this.

The deadline for IETF86 is two weeks from now, and I want to have a 
version -06 or greater that incorporates all of the comments from these 
threads by then.

  -- Justin


[1] http://tools.ietf.org/html/draft-ietf-oauth-dyn-reg-05

From jricher@mitre.org  Mon Feb 11 13:15:13 2013
Return-Path: <jricher@mitre.org>
X-Original-To: oauth@ietfa.amsl.com
Delivered-To: oauth@ietfa.amsl.com
Received: from localhost (localhost [127.0.0.1]) by ietfa.amsl.com (Postfix) with ESMTP id ED87C21F8887 for <oauth@ietfa.amsl.com>; Mon, 11 Feb 2013 13:15:13 -0800 (PST)
X-Virus-Scanned: amavisd-new at amsl.com
X-Spam-Flag: NO
X-Spam-Score: -6.57
X-Spam-Level: 
X-Spam-Status: No, score=-6.57 tagged_above=-999 required=5 tests=[AWL=0.029,  BAYES_00=-2.599, RCVD_IN_DNSWL_MED=-4]
Received: from mail.ietf.org ([64.170.98.30]) by localhost (ietfa.amsl.com [127.0.0.1]) (amavisd-new, port 10024) with ESMTP id zeyfO3ob9Kpx for <oauth@ietfa.amsl.com>; Mon, 11 Feb 2013 13:15:13 -0800 (PST)
Received: from smtpksrv1.mitre.org (smtpksrv1.mitre.org [198.49.146.77]) by ietfa.amsl.com (Postfix) with ESMTP id EAD8321F886D for <oauth@ietf.org>; Mon, 11 Feb 2013 13:15:12 -0800 (PST)
Received: from smtpksrv1.mitre.org (localhost.localdomain [127.0.0.1]) by localhost (Postfix) with SMTP id 72976531051E for <oauth@ietf.org>; Mon, 11 Feb 2013 16:15:12 -0500 (EST)
Received: from IMCCAS01.MITRE.ORG (imccas01.mitre.org [129.83.29.78]) by smtpksrv1.mitre.org (Postfix) with ESMTP id 4C6501F1406 for <oauth@ietf.org>; Mon, 11 Feb 2013 16:15:12 -0500 (EST)
Received: from [10.146.15.29] (129.83.31.58) by IMCCAS01.MITRE.ORG (129.83.29.78) with Microsoft SMTP Server (TLS) id 14.2.318.4; Mon, 11 Feb 2013 16:15:12 -0500
Message-ID: <51195F36.6040705@mitre.org>
Date: Mon, 11 Feb 2013 16:14:30 -0500
From: Justin Richer <jricher@mitre.org>
User-Agent: Mozilla/5.0 (X11; Linux i686; rv:17.0) Gecko/20130106 Thunderbird/17.0.2
MIME-Version: 1.0
To: "oauth@ietf.org" <oauth@ietf.org>
Content-Type: text/plain; charset="ISO-8859-1"; format=flowed
Content-Transfer-Encoding: 7bit
X-Originating-IP: [129.83.31.58]
Subject: [OAUTH-WG] Registration: RESTful client lifecycle management
X-BeenThere: oauth@ietf.org
X-Mailman-Version: 2.1.12
Precedence: list
List-Id: OAUTH WG <oauth.ietf.org>
List-Unsubscribe: <https://www.ietf.org/mailman/options/oauth>, <mailto:oauth-request@ietf.org?subject=unsubscribe>
List-Archive: <http://www.ietf.org/mail-archive/web/oauth>
List-Post: <mailto:oauth@ietf.org>
List-Help: <mailto:oauth-request@ietf.org?subject=help>
List-Subscribe: <https://www.ietf.org/mailman/listinfo/oauth>, <mailto:oauth-request@ietf.org?subject=subscribe>
X-List-Received-Date: Mon, 11 Feb 2013 21:15:14 -0000

Draft -05 of OAuth Dynamic Client Registration [1] defines several 
operations that the client can take on its behalf as part of the 
registration process. These boil down to the basic CRUD operations that 
you find in many APIs: Create, Read, Update, Delete. Draft -00 defined 
only the "Create" operation, draft -01 through -04 added the "Update" 
operation, switched using the "operation=" parameter.

Following several suggestions to do so on the list, the -05 draft 
defines these operations in terms of a RESTful API for the client. Namely:

  - HTTP POST to registration endpoint => Create (register) a new client
  - HTTP PUT to update endpoint (with registration_access_token) => 
Update the registered information for this client
  - HTTP GET to update endpoint (with registration_access_token) => read 
the registered information for this client
  - HTTP DELETE to update endpoint (with registration_access_token) => 
Delete (unregister/de-provision) this client

The two main issues at stake here are: the addition of the READ and 
DELETE methods, and the use of HTTP verbs following a RESTful design 
philosophy.

Pro:
  - RESTful APIs (with HTTP verbs to differentiate functionality) are 
the norm today
  - Full lifecycle management is common and is going to be expected by 
many users of this protocol in the wild

Cons:
  - Update semantics are still under debate (full replace? patch?)
  - Somewhat increased complexity on the server to support all operations
  - Client has to understand all HTTP verbs for full access (though 
plain registration is just POST)


Alternatives include using an operational switch parameter (like the old 
drafts), defining separate endpoints for every action, or doing all 
operations on a single endpoint using verbs to switch.

  -- Justin

[1] http://tools.ietf.org/html/draft-ietf-oauth-dyn-reg-05

From jricher@mitre.org  Mon Feb 11 13:15:17 2013
Return-Path: <jricher@mitre.org>
X-Original-To: oauth@ietfa.amsl.com
Delivered-To: oauth@ietfa.amsl.com
Received: from localhost (localhost [127.0.0.1]) by ietfa.amsl.com (Postfix) with ESMTP id 096D721F8992 for <oauth@ietfa.amsl.com>; Mon, 11 Feb 2013 13:15:17 -0800 (PST)
X-Virus-Scanned: amavisd-new at amsl.com
X-Spam-Flag: NO
X-Spam-Score: -6.571
X-Spam-Level: 
X-Spam-Status: No, score=-6.571 tagged_above=-999 required=5 tests=[AWL=0.028,  BAYES_00=-2.599, RCVD_IN_DNSWL_MED=-4]
Received: from mail.ietf.org ([64.170.98.30]) by localhost (ietfa.amsl.com [127.0.0.1]) (amavisd-new, port 10024) with ESMTP id Raa2HB9MLSCP for <oauth@ietfa.amsl.com>; Mon, 11 Feb 2013 13:15:16 -0800 (PST)
Received: from smtpksrv1.mitre.org (smtpksrv1.mitre.org [198.49.146.77]) by ietfa.amsl.com (Postfix) with ESMTP id 6452121F8887 for <oauth@ietf.org>; Mon, 11 Feb 2013 13:15:16 -0800 (PST)
Received: from smtpksrv1.mitre.org (localhost.localdomain [127.0.0.1]) by localhost (Postfix) with SMTP id 8073C53105FC for <oauth@ietf.org>; Mon, 11 Feb 2013 16:15:15 -0500 (EST)
Received: from IMCCAS02.MITRE.ORG (imccas02.mitre.org [129.83.29.79]) by smtpksrv1.mitre.org (Postfix) with ESMTP id 2DE52531051F for <oauth@ietf.org>; Mon, 11 Feb 2013 16:15:15 -0500 (EST)
Received: from [10.146.15.29] (129.83.31.58) by IMCCAS02.MITRE.ORG (129.83.29.79) with Microsoft SMTP Server (TLS) id 14.2.318.4; Mon, 11 Feb 2013 16:15:14 -0500
Message-ID: <51195F39.3040809@mitre.org>
Date: Mon, 11 Feb 2013 16:14:33 -0500
From: Justin Richer <jricher@mitre.org>
User-Agent: Mozilla/5.0 (X11; Linux i686; rv:17.0) Gecko/20130106 Thunderbird/17.0.2
MIME-Version: 1.0
To: "oauth@ietf.org" <oauth@ietf.org>
Content-Type: text/plain; charset="ISO-8859-1"; format=flowed
Content-Transfer-Encoding: 7bit
X-Originating-IP: [129.83.31.58]
Subject: [OAUTH-WG] Registration: Endpoint Definition (& operation parameter)
X-BeenThere: oauth@ietf.org
X-Mailman-Version: 2.1.12
Precedence: list
List-Id: OAUTH WG <oauth.ietf.org>
List-Unsubscribe: <https://www.ietf.org/mailman/options/oauth>, <mailto:oauth-request@ietf.org?subject=unsubscribe>
List-Archive: <http://www.ietf.org/mail-archive/web/oauth>
List-Post: <mailto:oauth@ietf.org>
List-Help: <mailto:oauth-request@ietf.org?subject=help>
List-Subscribe: <https://www.ietf.org/mailman/listinfo/oauth>, <mailto:oauth-request@ietf.org?subject=subscribe>
X-List-Received-Date: Mon, 11 Feb 2013 21:15:17 -0000

Draft -05 of OAuth Dynamic Client Registration [1] defines three 
fundamental operations that a client can undertake: Client Registration, 
Client Update, and Secret Rotation. Each of these actions needs to be 
differentiated *somehow* by the client and server as part of the 
protocol. Draft -00 defined only the "register" operation, drafts -01 
through -04 made use of an "operation" parameter on a single endpoint, 
which brought up a long discussion on the list on whether or not that 
was an appropriate design. Draft -05 did away with the definition of the 
"operation" parameter on a single endpoint and instead opted for 
separating the base functionality into three different endpoints.

Pro:
  - Closer to RESTful semantics of having one URL for creation and 
another URL for management of an item (eg, most REST APIs use /object 
for creation and /object/object_id for manipulation)
  - The rest of OAuth (and its extensions) defines separate endpoints 
for different actions (Authorization, Token, Revocation, Introspection) 
as opposed to a single endpoint with a mode-switch parameter
  - Client doesn't have to generate a URL string for different endpoints 
by combining parameters with a base URL

Con:
  - Not quite exactly RESTful as the spec doesn't dictate the client_id 
be part of the update or rotate URL (though and implementor's note 
suggests this)
  - Client has to track different URLs for different actions
  - Server must be able to differentiate actions based on these 
different URLs.

Alternatives include using different HTTP verbs (see other thread) or 
defining an operational switch parameter, like older drafts, on a single 
endpoint URL. Another suggested alternative is to look for the presence 
of certain parameters, such as client_id or the registration access 
token, to indicate that a different operation is requested.

There's also question of whether the Secret Rotation action needs to 
have its own endpoint, or if it can be collapsed into one of the others. 
It has been suggested off-list that the secret rotation should never be 
initiated by the Client but instead the client should simply request its 
latest secret from the server through the update (or read) semantics.

  -- Justin

[1] http://tools.ietf.org/html/draft-ietf-oauth-dyn-reg-05

From jricher@mitre.org  Mon Feb 11 13:15:18 2013
Return-Path: <jricher@mitre.org>
X-Original-To: oauth@ietfa.amsl.com
Delivered-To: oauth@ietfa.amsl.com
Received: from localhost (localhost [127.0.0.1]) by ietfa.amsl.com (Postfix) with ESMTP id BD48421F886D for <oauth@ietfa.amsl.com>; Mon, 11 Feb 2013 13:15:18 -0800 (PST)
X-Virus-Scanned: amavisd-new at amsl.com
X-Spam-Flag: NO
X-Spam-Score: -6.572
X-Spam-Level: 
X-Spam-Status: No, score=-6.572 tagged_above=-999 required=5 tests=[AWL=0.027,  BAYES_00=-2.599, RCVD_IN_DNSWL_MED=-4]
Received: from mail.ietf.org ([64.170.98.30]) by localhost (ietfa.amsl.com [127.0.0.1]) (amavisd-new, port 10024) with ESMTP id Pq3DUHUMSS9T for <oauth@ietfa.amsl.com>; Mon, 11 Feb 2013 13:15:18 -0800 (PST)
Received: from smtpksrv1.mitre.org (smtpksrv1.mitre.org [198.49.146.77]) by ietfa.amsl.com (Postfix) with ESMTP id 3583221F8992 for <oauth@ietf.org>; Mon, 11 Feb 2013 13:15:18 -0800 (PST)
Received: from smtpksrv1.mitre.org (localhost.localdomain [127.0.0.1]) by localhost (Postfix) with SMTP id B8EA61F27EB for <oauth@ietf.org>; Mon, 11 Feb 2013 16:15:17 -0500 (EST)
Received: from IMCCAS03.MITRE.ORG (imccas03.mitre.org [129.83.29.80]) by smtpksrv1.mitre.org (Postfix) with ESMTP id 9397C1F0785 for <oauth@ietf.org>; Mon, 11 Feb 2013 16:15:17 -0500 (EST)
Received: from [10.146.15.29] (129.83.31.58) by IMCCAS03.MITRE.ORG (129.83.29.80) with Microsoft SMTP Server (TLS) id 14.2.318.4; Mon, 11 Feb 2013 16:15:17 -0500
Message-ID: <51195F3B.1010701@mitre.org>
Date: Mon, 11 Feb 2013 16:14:35 -0500
From: Justin Richer <jricher@mitre.org>
User-Agent: Mozilla/5.0 (X11; Linux i686; rv:17.0) Gecko/20130106 Thunderbird/17.0.2
MIME-Version: 1.0
To: "oauth@ietf.org" <oauth@ietf.org>
Content-Type: text/plain; charset="ISO-8859-1"; format=flowed
Content-Transfer-Encoding: 7bit
X-Originating-IP: [129.83.31.58]
Subject: [OAUTH-WG] Registration: JSON Encoded Input
X-BeenThere: oauth@ietf.org
X-Mailman-Version: 2.1.12
Precedence: list
List-Id: OAUTH WG <oauth.ietf.org>
List-Unsubscribe: <https://www.ietf.org/mailman/options/oauth>, <mailto:oauth-request@ietf.org?subject=unsubscribe>
List-Archive: <http://www.ietf.org/mail-archive/web/oauth>
List-Post: <mailto:oauth@ietf.org>
List-Help: <mailto:oauth-request@ietf.org?subject=help>
List-Subscribe: <https://www.ietf.org/mailman/listinfo/oauth>, <mailto:oauth-request@ietf.org?subject=subscribe>
X-List-Received-Date: Mon, 11 Feb 2013 21:15:18 -0000

Draft -05 of OAuth Dynamic Client Registration [1] switched from a 
form-encoded input that had been used by drafts -01 through -04 to a 
JSON encoded input that was used originally in -00. Note that all 
versions keep JSON-encoded output from all operations.

Pro:
  - JSON gives us a rich data structure so that things such as lists, 
numbers, nulls, and objects can be represented natively
  - Allows for parallelism between the input to the endpoint and output 
from the endpoint, reducing possible translation errors between the two
  - JSON specifies UTF8 encoding for all strings, forms may have many 
different encodings
  - JSON has minimal character escaping required for most strings, forms 
require escaping for common characters such as space, slash, comma, etc.

Con:
  - the rest of OAuth is form-in/JSON-out
  - nothing else in OAuth requires the Client to create a JSON object, 
merely to parse one
  - form-in/JSON-out is a very widely established pattern on the web today
  - Client information (client_name, client_id, etc.) is conflated with 
access information (registration_access_token, _links, expires_at, etc.) 
in root level of the same JSON object, leaving the client to decide what 
needs to (can?) be sent back to the server for update operations.


Alternatives include any number of data encoding schemes, including form 
(like the old drafts), XML, ASN.1, etc.


  -- Justin

[1] http://tools.ietf.org/html/draft-ietf-oauth-dyn-reg-05

From jricher@mitre.org  Mon Feb 11 13:15:20 2013
Return-Path: <jricher@mitre.org>
X-Original-To: oauth@ietfa.amsl.com
Delivered-To: oauth@ietfa.amsl.com
Received: from localhost (localhost [127.0.0.1]) by ietfa.amsl.com (Postfix) with ESMTP id CE58821F8A96 for <oauth@ietfa.amsl.com>; Mon, 11 Feb 2013 13:15:20 -0800 (PST)
X-Virus-Scanned: amavisd-new at amsl.com
X-Spam-Flag: NO
X-Spam-Score: -6.572
X-Spam-Level: 
X-Spam-Status: No, score=-6.572 tagged_above=-999 required=5 tests=[AWL=0.027,  BAYES_00=-2.599, RCVD_IN_DNSWL_MED=-4]
Received: from mail.ietf.org ([64.170.98.30]) by localhost (ietfa.amsl.com [127.0.0.1]) (amavisd-new, port 10024) with ESMTP id yerRcV4f4rNg for <oauth@ietfa.amsl.com>; Mon, 11 Feb 2013 13:15:20 -0800 (PST)
Received: from smtpksrv1.mitre.org (smtpksrv1.mitre.org [198.49.146.77]) by ietfa.amsl.com (Postfix) with ESMTP id 2EFDD21F886D for <oauth@ietf.org>; Mon, 11 Feb 2013 13:15:20 -0800 (PST)
Received: from smtpksrv1.mitre.org (localhost.localdomain [127.0.0.1]) by localhost (Postfix) with SMTP id 9A91C1F1406 for <oauth@ietf.org>; Mon, 11 Feb 2013 16:15:19 -0500 (EST)
Received: from IMCCAS01.MITRE.ORG (imccas01.mitre.org [129.83.29.78]) by smtpksrv1.mitre.org (Postfix) with ESMTP id 5C1A11F13F3 for <oauth@ietf.org>; Mon, 11 Feb 2013 16:15:19 -0500 (EST)
Received: from [10.146.15.29] (129.83.31.58) by IMCCAS01.MITRE.ORG (129.83.29.78) with Microsoft SMTP Server (TLS) id 14.2.318.4; Mon, 11 Feb 2013 16:15:19 -0500
Message-ID: <51195F3D.1050006@mitre.org>
Date: Mon, 11 Feb 2013 16:14:37 -0500
From: Justin Richer <jricher@mitre.org>
User-Agent: Mozilla/5.0 (X11; Linux i686; rv:17.0) Gecko/20130106 Thunderbird/17.0.2
MIME-Version: 1.0
To: "oauth@ietf.org" <oauth@ietf.org>
Content-Type: text/plain; charset="ISO-8859-1"; format=flowed
Content-Transfer-Encoding: 7bit
X-Originating-IP: [129.83.31.58]
Subject: [OAUTH-WG] Registration: HAL _links structure and client self-URL
X-BeenThere: oauth@ietf.org
X-Mailman-Version: 2.1.12
Precedence: list
List-Id: OAUTH WG <oauth.ietf.org>
List-Unsubscribe: <https://www.ietf.org/mailman/options/oauth>, <mailto:oauth-request@ietf.org?subject=unsubscribe>
List-Archive: <http://www.ietf.org/mail-archive/web/oauth>
List-Post: <mailto:oauth@ietf.org>
List-Help: <mailto:oauth-request@ietf.org?subject=help>
List-Subscribe: <https://www.ietf.org/mailman/listinfo/oauth>, <mailto:oauth-request@ietf.org?subject=subscribe>
X-List-Received-Date: Mon, 11 Feb 2013 21:15:21 -0000

Draft -05 of OAuth Dynamic Client Registration [1] returns a URL pointer 
for the client to perform update and secret rotation actions. This 
functionality arose from discussions on the list about moving towards a 
more RESTful pattern, and Nat Sakimura proposed this approach in the 
OpenID Connect Working Group. This URL may be distinct from the Client 
Registration Endpoint URL, but draft -05 makes no promises as to its 
content, form, or structure, though it does contain implementor's notes 
on possible methods.

Two questions arise from this change:
  - The semantics of returning the client manipulation URL
  - The syntax (derived from HAL for JSON [2], an individual I-D 
submission)

On semantics:

Pro:
  - The server has flexibility on how to define the "update" endpoint, 
sending all clients to one URL, sending different clients to different 
URLs, or sending clients to a URL with a baked-in query parameter
  - The client can take the URL as-is and use it for all management 
operations (ie, it doesn't have to generate or compose the URL based on 
component parts)

Con:
  - The client must remember one more piece of information from the 
server at runtime if it wants to do manipulation and management of 
itself at the server (in addition to client_id, client_secret, 
registration_access_token, and others)

Alternatives include specifying a URL pattern for the server to use and 
all clients to follow, specifying a query parameter for the update 
action, and specifying a separate endpoint entirely and using the 
presence of items such as client_id and the registration access token to 
differentiate the requests. Note that *all* of these alternatives can be 
accommodated using the semantics described above, with the same actions 
on the client's part.


On syntax:

Pro:
  - Follows the designs of RFC5988 for link relations
  - The HAL format is general, and allows for all kinds of other 
information to be placed inside the _links structure
  - Allows for full use of the JSON object to specify advanced 
operations on the returned endpoint if desired

Con:
  - The rest of OAuth doesn't follow link relation guidelines (though 
it's been brought up)
  - The HAL format is general, and allows for all kinds of other 
information to be placed inside the _links structure
  - The HAL-JSON document is an expired individual I-D, and it's unclear 
what wider adoption looks like right now

Alternatives include returning the URL as a separate data member 
(registration_update_url), using HTTP headers, or using JSON Schema.

  -- Justin



[1] http://tools.ietf.org/html/draft-ietf-oauth-dyn-reg-05
[2] http://tools.ietf.org/html/draft-kelly-json-hal-03

From jricher@mitre.org  Mon Feb 11 13:15:22 2013
Return-Path: <jricher@mitre.org>
X-Original-To: oauth@ietfa.amsl.com
Delivered-To: oauth@ietfa.amsl.com
Received: from localhost (localhost [127.0.0.1]) by ietfa.amsl.com (Postfix) with ESMTP id C4C3D21F8AAD for <oauth@ietfa.amsl.com>; Mon, 11 Feb 2013 13:15:22 -0800 (PST)
X-Virus-Scanned: amavisd-new at amsl.com
X-Spam-Flag: NO
X-Spam-Score: -6.573
X-Spam-Level: 
X-Spam-Status: No, score=-6.573 tagged_above=-999 required=5 tests=[AWL=0.026,  BAYES_00=-2.599, RCVD_IN_DNSWL_MED=-4]
Received: from mail.ietf.org ([64.170.98.30]) by localhost (ietfa.amsl.com [127.0.0.1]) (amavisd-new, port 10024) with ESMTP id gKzBvbaQ80AL for <oauth@ietfa.amsl.com>; Mon, 11 Feb 2013 13:15:22 -0800 (PST)
Received: from smtpksrv1.mitre.org (smtpksrv1.mitre.org [198.49.146.77]) by ietfa.amsl.com (Postfix) with ESMTP id 4A13E21F890D for <oauth@ietf.org>; Mon, 11 Feb 2013 13:15:22 -0800 (PST)
Received: from smtpksrv1.mitre.org (localhost.localdomain [127.0.0.1]) by localhost (Postfix) with SMTP id D75E91F1418 for <oauth@ietf.org>; Mon, 11 Feb 2013 16:15:21 -0500 (EST)
Received: from IMCCAS02.MITRE.ORG (imccas02.mitre.org [129.83.29.79]) by smtpksrv1.mitre.org (Postfix) with ESMTP id AD42C1F0785 for <oauth@ietf.org>; Mon, 11 Feb 2013 16:15:21 -0500 (EST)
Received: from [10.146.15.29] (129.83.31.58) by IMCCAS02.MITRE.ORG (129.83.29.79) with Microsoft SMTP Server (TLS) id 14.2.318.4; Mon, 11 Feb 2013 16:15:21 -0500
Message-ID: <51195F3F.7000704@mitre.org>
Date: Mon, 11 Feb 2013 16:14:39 -0500
From: Justin Richer <jricher@mitre.org>
User-Agent: Mozilla/5.0 (X11; Linux i686; rv:17.0) Gecko/20130106 Thunderbird/17.0.2
MIME-Version: 1.0
To: "oauth@ietf.org" <oauth@ietf.org>
Content-Type: text/plain; charset="ISO-8859-1"; format=flowed
Content-Transfer-Encoding: 7bit
X-Originating-IP: [129.83.31.58]
Subject: [OAUTH-WG] Registration: Client secret rotation
X-BeenThere: oauth@ietf.org
X-Mailman-Version: 2.1.12
Precedence: list
List-Id: OAUTH WG <oauth.ietf.org>
List-Unsubscribe: <https://www.ietf.org/mailman/options/oauth>, <mailto:oauth-request@ietf.org?subject=unsubscribe>
List-Archive: <http://www.ietf.org/mail-archive/web/oauth>
List-Post: <mailto:oauth@ietf.org>
List-Help: <mailto:oauth-request@ietf.org?subject=help>
List-Subscribe: <https://www.ietf.org/mailman/listinfo/oauth>, <mailto:oauth-request@ietf.org?subject=subscribe>
X-List-Received-Date: Mon, 11 Feb 2013 21:15:22 -0000

Draft -05 of OAuth Dynamic Client Registration [1] defines a means of 
the client requesting a new client_secret (if applicable) and a new 
registration_access_token. Client secrets MAY expire after some period 
of time, and this method allows for a refresh of that secret. Draft -00 
defined no such operation, drafts -01 through -04 defined this operation 
in terms of the operation=rotate_secret parameter, and draft -05 defines 
it through a secondary endpoint, the Client Secret Rotation Endpoint. 
This raises several questions:

  - Should the client be allowed to request rotation of its secret?
  - Would a client ever take this action of its own accord?
  - Can a server rotate the secret of the client without the client 
asking? (This seems to be an obvious "yes")

Alternatives that keep this functionality include defining the 
rotate_secret operation in terms of an HTTP verb, a query parameter, or 
separate endpoint. Alternatively, we could drop the rotate_secret 
operation all together. If we do this, we have to decide if the client 
secret can still expire. If it can, then we need a way for the client to 
get this new secret through a means that doesn't require it to request a 
change in secret, such as sending it back as part of the client READ 
operation (see other thread on RESTful verbs).

  -- Justin


[1] http://tools.ietf.org/html/draft-ietf-oauth-dyn-reg-05

From prabath@wso2.com  Mon Feb 11 13:30:20 2013
Return-Path: <prabath@wso2.com>
X-Original-To: oauth@ietfa.amsl.com
Delivered-To: oauth@ietfa.amsl.com
Received: from localhost (localhost [127.0.0.1]) by ietfa.amsl.com (Postfix) with ESMTP id 5128421F8678 for <oauth@ietfa.amsl.com>; Mon, 11 Feb 2013 13:30:20 -0800 (PST)
X-Virus-Scanned: amavisd-new at amsl.com
X-Spam-Flag: NO
X-Spam-Score: -2.562
X-Spam-Level: 
X-Spam-Status: No, score=-2.562 tagged_above=-999 required=5 tests=[AWL=0.414,  BAYES_00=-2.599, FM_FORGED_GMAIL=0.622, HTML_MESSAGE=0.001, RCVD_IN_DNSWL_LOW=-1]
Received: from mail.ietf.org ([64.170.98.30]) by localhost (ietfa.amsl.com [127.0.0.1]) (amavisd-new, port 10024) with ESMTP id IUTLP1HsHF-L for <oauth@ietfa.amsl.com>; Mon, 11 Feb 2013 13:30:18 -0800 (PST)
Received: from mail-ea0-f169.google.com (mail-ea0-f169.google.com [209.85.215.169]) by ietfa.amsl.com (Postfix) with ESMTP id 7715621F8645 for <oauth@ietf.org>; Mon, 11 Feb 2013 13:30:11 -0800 (PST)
Received: by mail-ea0-f169.google.com with SMTP id d13so2945016eaa.0 for <oauth@ietf.org>; Mon, 11 Feb 2013 13:30:10 -0800 (PST)
X-Google-DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=google.com; s=20120113; h=mime-version:x-received:in-reply-to:references:date:message-id :subject:from:to:cc:content-type:x-gm-message-state; bh=CFr7wF37V6h/r4OqgeEfX897OAp2AJX1ulU9FyLnllQ=; b=DIzylLjVaT8CYdiS51FnzQXRwtuybq5KZpOw1V/q6Gx41ORf/YKG+AwZnxi7/7uymr RzH9a6eOv3BJoqkO7i9KxeBvew9s+t7DMnIO25QLc2uKuYAbHlDmq//uKefiouLyzzzC DMFsrqjpMilKf7WXzWqQRr96ue5Er6/hAZ0B8xs58J64+Ua/i10MSakeIpYFCbhicqfI 7GhuQzKRJpiiXcqBk7LKQ3H+iwhNzZZStoVd9Fmb29jhTLWdIrsqFStJKZgk0acbNqA0 IeWUu9g6FGMHW9tXi8I9GOxtGQq5X6tbNHr1rYJVi+4KZ0S8JoTdVS8e07qsAc6hKep6 +bMQ==
MIME-Version: 1.0
X-Received: by 10.14.224.137 with SMTP id x9mr54668724eep.11.1360618210042; Mon, 11 Feb 2013 13:30:10 -0800 (PST)
Received: by 10.223.146.76 with HTTP; Mon, 11 Feb 2013 13:30:09 -0800 (PST)
In-Reply-To: <CAJV9qO_gM1oera9ae9sqh9n17e-ZLKuC2pmsZwhq-RmFcMyqHA@mail.gmail.com>
References: <20130206192420.32698.21027.idtracker@ietfa.amsl.com> <5112AE0B.1080501@mitre.org> <CAJV9qO_8-4FowrXK=ae-+xMjiJFP04ryVMLQ8SGUH8kp3PHrLg@mail.gmail.com> <5113C3AA.1040701@mitre.org> <CAJV9qO8BVV57eAb5kUNes15AYOpUKqw5XWQswh-FJA=b1pPgSA@mail.gmail.com> <5113DDB2.7060805@mitre.org> <CAJV9qO_gM1oera9ae9sqh9n17e-ZLKuC2pmsZwhq-RmFcMyqHA@mail.gmail.com>
Date: Tue, 12 Feb 2013 03:00:09 +0530
Message-ID: <CAJV9qO_B-a1RSyOW9QNyv0HAZRcMKq4-_jiUFDzmcQgs9A1Sgg@mail.gmail.com>
From: Prabath Siriwardena <prabath@wso2.com>
To: Justin Richer <jricher@mitre.org>
Content-Type: multipart/alternative; boundary=047d7b66f28115a29904d5799d74
X-Gm-Message-State: ALoCoQmfm92svEliwz57J84OySp2H3n5Nj9w7KPXIj3GAm1hHsYWFRtdX+7rcpdINEidz+JvDlR7
Cc: "oauth@ietf.org" <oauth@ietf.org>
Subject: Re: [OAUTH-WG] Fwd: New Version Notification for draft-richer-oauth-introspection-02.txt
X-BeenThere: oauth@ietf.org
X-Mailman-Version: 2.1.12
Precedence: list
List-Id: OAUTH WG <oauth.ietf.org>
List-Unsubscribe: <https://www.ietf.org/mailman/options/oauth>, <mailto:oauth-request@ietf.org?subject=unsubscribe>
List-Archive: <http://www.ietf.org/mail-archive/web/oauth>
List-Post: <mailto:oauth@ietf.org>
List-Help: <mailto:oauth-request@ietf.org?subject=help>
List-Subscribe: <https://www.ietf.org/mailman/listinfo/oauth>, <mailto:oauth-request@ietf.org?subject=subscribe>
X-List-Received-Date: Mon, 11 Feb 2013 21:30:20 -0000

--047d7b66f28115a29904d5799d74
Content-Type: text/plain; charset=ISO-8859-1

Hi Justin,

Any thoughts on the following...

Thanks & regards,
-Prabath

On Fri, Feb 8, 2013 at 11:21 AM, Prabath Siriwardena <prabath@wso2.com>wrote:

> Hi Justin,
>
> I have couple of questions related to "valid" parameter...
>
> This endpoint can be invoked by the Resource Server in runtime...
>
> In that case what is exactly meant by the "resource_id" in request ?
>
> IMO a token to be valid depends on set of criteria based on it's type..
>
> For a Bearer token..
>
> 1. Token should not be expired
> 2. Token should not be revoked.
> 3. The scope the token issued should match with the scope required for the
> resource.
>
> For a MAC token...
>
> 1. Token not expired (mac id)
> 2. Token should not be revoked
> 3. The scope the token issued should match with the scope required for the
> resource.
> 4. HMAC check should be valid
>
> There are similar conditions for SAML bearer too..
>
> Thanks & regards,
> -Prabath
>
>
> On Thu, Feb 7, 2013 at 10:30 PM, Justin Richer <jricher@mitre.org> wrote:
>
>>  It validates the token, which would be either the token itself in the
>> case of Bearer or the token "id" part of something more complex like MAC.
>> It doesn't directly validate the usage of the token, that's still up to the
>> PR to do that.
>>
>> I nearly added a "token type" field in this draft, but held back because
>> there are several kinds of "token type" that people talk about in OAuth.
>> First, there's "Bearer" vs. "MAC" vs. "HOK", or what have you. Then within
>> Bearer you have "JWT" or "SAML" or "unstructured blob". Then you've also
>> got "access" vs. "refresh" and other flavors of token, like the id_token in
>> OpenID Connect.
>>
>> Thing is, the server running the introspection endpoint will probably
>> know *all* of these. But should it tell the client? If so, which of the
>> three, and what names should the fields be?
>>
>>  -- Justin
>>
>>
>> On 02/07/2013 11:26 AM, Prabath Siriwardena wrote:
>>
>> Okay.. I was thinking this could be used as a way to validate the token
>> as well. BTW even in this case shouldn't communicate the type of token to
>> AS? For example in the case of SAML profile - it could be SAML token..
>>
>>  Thanks & regards,
>> -Prabath
>>
>> On Thu, Feb 7, 2013 at 8:39 PM, Justin Richer <jricher@mitre.org> wrote:
>>
>>>  "valid" might not be the best term, but it's meant to be a field where
>>> the server says "yes this token is still good" or "no this token isn't good
>>> anymore". We could instead do this with HTTP codes or something but I went
>>> with a pure JSON response.
>>>
>>>  -- Justin
>>>
>>>
>>> On 02/06/2013 10:47 PM, Prabath Siriwardena wrote:
>>>
>>> Hi Justin,
>>>
>>>  I believe this is addressing one of the key missing part in OAuth
>>> 2.0...
>>>
>>>  One question - I guess this was discussed already...
>>>
>>>  In the spec - in the introspection response it has the attribute
>>> "valid" - this is basically the validity of the token provided in the
>>> request.
>>>
>>>  Validation criteria depends on the token and well as token type (
>>> Bearer, MAC..).
>>>
>>>  In the spec it seems like it's coupled with Bearer token type... But I
>>> guess, by adding "token_type" to the request we can remove this dependency.
>>>
>>>  WDYT..?
>>>
>>>  Thanks & regards,
>>> -Prabath
>>>
>>> On Thu, Feb 7, 2013 at 12:54 AM, Justin Richer <jricher@mitre.org>wrote:
>>>
>>>>  Updated introspection draft based on recent comments. Changes include:
>>>>
>>>>  - "scope" return parameter now follows RFC6749 format instead of JSON
>>>> array
>>>>  - "subject" -> "sub", and "audience" -> "aud", to be parallel with JWT
>>>> claims
>>>>  - clarified what happens if the authentication is bad
>>>>
>>>>  -- Justin
>>>>
>>>>
>>>> -------- Original Message --------  Subject: New Version Notification
>>>> for draft-richer-oauth-introspection-02.txt  Date: Wed, 6 Feb 2013
>>>> 11:24:20 -0800  From: <internet-drafts@ietf.org><internet-drafts@ietf.org>  To:
>>>> <jricher@mitre.org> <jricher@mitre.org>
>>>>
>>>> A new version of I-D, draft-richer-oauth-introspection-02.txt
>>>> has been successfully submitted by Justin Richer and posted to the
>>>> IETF repository.
>>>>
>>>> Filename:	 draft-richer-oauth-introspection
>>>> Revision:	 02
>>>> Title:		 OAuth Token Introspection
>>>> Creation date:	 2013-02-06
>>>> WG ID:		 Individual Submission
>>>> Number of pages: 6
>>>> URL:             http://www.ietf.org/internet-drafts/draft-richer-oauth-introspection-02.txt
>>>> Status:          http://datatracker.ietf.org/doc/draft-richer-oauth-introspection
>>>> Htmlized:        http://tools.ietf.org/html/draft-richer-oauth-introspection-02
>>>> Diff:            http://www.ietf.org/rfcdiff?url2=draft-richer-oauth-introspection-02
>>>>
>>>> Abstract:
>>>>    This specification defines a method for a client or protected
>>>>    resource to query an OAuth authorization server to determine meta-
>>>>    information about an OAuth token.
>>>>
>>>>
>>>>
>>>>
>>>>
>>>> The IETF Secretariat
>>>>
>>>>
>>>>
>>>>
>>>>
>>>> _______________________________________________
>>>> OAuth mailing list
>>>> OAuth@ietf.org
>>>> https://www.ietf.org/mailman/listinfo/oauth
>>>>
>>>>
>>>
>>>
>>>  --
>>> Thanks & Regards,
>>> Prabath
>>>
>>>  Mobile : +94 71 809 6732 <%2B94%2071%20809%206732>
>>>
>>> http://blog.facilelogin.com
>>> http://RampartFAQ.com
>>>
>>>
>>>
>>
>>
>>  --
>> Thanks & Regards,
>> Prabath
>>
>>  Mobile : +94 71 809 6732
>>
>> http://blog.facilelogin.com
>> http://RampartFAQ.com
>>
>>
>>
>
>
> --
> Thanks & Regards,
> Prabath
>
> Mobile : +94 71 809 6732
>
> http://blog.facilelogin.com
> http://RampartFAQ.com
>



-- 
Thanks & Regards,
Prabath

Mobile : +94 71 809 6732

http://blog.facilelogin.com
http://RampartFAQ.com

--047d7b66f28115a29904d5799d74
Content-Type: text/html; charset=ISO-8859-1
Content-Transfer-Encoding: quoted-printable

Hi Justin,<div><br></div><div>Any thoughts on the following...</div><div><b=
r></div><div>Thanks &amp; regards,</div><div>-Prabath<br><br><div class=3D"=
gmail_quote">On Fri, Feb 8, 2013 at 11:21 AM, Prabath Siriwardena <span dir=
=3D"ltr">&lt;<a href=3D"mailto:prabath@wso2.com" target=3D"_blank">prabath@=
wso2.com</a>&gt;</span> wrote:<br>
<blockquote class=3D"gmail_quote" style=3D"margin:0 0 0 .8ex;border-left:1p=
x #ccc solid;padding-left:1ex">Hi=A0Justin,<div><br></div><div>I have coupl=
e of questions related to &quot;valid&quot; parameter...</div><div><br></di=
v>
<div>This endpoint can be invoked by the Resource Server in runtime...</div=
><div><br></div><div>In that case what is exactly meant by the &quot;resour=
ce_id&quot; in request ?</div>
<div><br></div><div>IMO a token to be valid depends on set of criteria base=
d on it&#39;s type..</div><div><br></div><div>For a Bearer token..</div><di=
v><br></div><div>1. Token should not be expired</div><div>2. Token should n=
ot be revoked.</div>

<div>3. The scope the token issued should match with the scope required for=
 the resource.</div><div><br></div><div>For a MAC token...</div><div><br></=
div><div>1. Token not expired (mac id)</div><div>2. Token should not be rev=
oked</div>

<div>3. The scope the token issued should match with the scope required for=
 the resource.</div><div>4. HMAC check should be valid</div><div><br></div>=
<div>There are similar conditions for SAML bearer too..</div><div><br>
</div>
<div>Thanks &amp; regards,</div><div>-Prabath</div><div class=3D"HOEnZb"><d=
iv class=3D"h5"><div><br></div><div><br><div class=3D"gmail_quote">On Thu, =
Feb 7, 2013 at 10:30 PM, Justin Richer <span dir=3D"ltr">&lt;<a href=3D"mai=
lto:jricher@mitre.org" target=3D"_blank">jricher@mitre.org</a>&gt;</span> w=
rote:<br>

<blockquote class=3D"gmail_quote" style=3D"margin:0 0 0 .8ex;border-left:1p=
x #ccc solid;padding-left:1ex">
 =20
   =20
 =20
  <div bgcolor=3D"#FFFFFF" text=3D"#000000">
    It validates the token, which would be either the token itself in
    the case of Bearer or the token &quot;id&quot; part of something more c=
omplex
    like MAC. It doesn&#39;t directly validate the usage of the token,
    that&#39;s still up to the PR to do that.<br>
    <br>
    I nearly added a &quot;token type&quot; field in this draft, but held b=
ack
    because there are several kinds of &quot;token type&quot; that people t=
alk
    about in OAuth. First, there&#39;s &quot;Bearer&quot; vs. &quot;MAC&quo=
t; vs. &quot;HOK&quot;, or what
    have you. Then within Bearer you have &quot;JWT&quot; or &quot;SAML&quo=
t; or
    &quot;unstructured blob&quot;. Then you&#39;ve also got &quot;access&qu=
ot; vs. &quot;refresh&quot; and
    other flavors of token, like the id_token in OpenID Connect. <br>
    <br>
    Thing is, the server running the introspection endpoint will
    probably know *all* of these. But should it tell the client? If so,
    which of the three, and what names should the fields be?<span><font col=
or=3D"#888888"><br>
    <br>
    =A0-- Justin</font></span><div><div><br>
    <br>
    <div>On 02/07/2013 11:26 AM, Prabath
      Siriwardena wrote:<br>
    </div>
    <blockquote type=3D"cite">
     =20
      Okay.. I was thinking this could be used as a way to validate the
      token as well. BTW even in this case shouldn&#39;t communicate the
      type of token to AS? For example in the case of SAML profile - it
      could be SAML token..
      <div>
        <br>
      </div>
      <div>Thanks &amp; regards,</div>
      <div>-Prabath<br>
        <br>
        <div class=3D"gmail_quote">On Thu, Feb 7, 2013 at 8:39 PM, Justin
          Richer <span dir=3D"ltr">&lt;<a href=3D"mailto:jricher@mitre.org"=
 target=3D"_blank">jricher@mitre.org</a>&gt;</span>
          wrote:<br>
          <blockquote class=3D"gmail_quote" style=3D"margin:0 0 0 .8ex;bord=
er-left:1px #ccc solid;padding-left:1ex">
            <div bgcolor=3D"#FFFFFF" text=3D"#000000"> &quot;valid&quot; mi=
ght not be
              the best term, but it&#39;s meant to be a field where the
              server says &quot;yes this token is still good&quot; or &quot=
;no this
              token isn&#39;t good anymore&quot;. We could instead do this =
with
              HTTP codes or something but I went with a pure JSON
              response.<span><font color=3D"#888888"><br>
                  <br>
                  =A0-- Justin</font></span>
              <div>
                <div><br>
                  <br>
                  <div>On 02/06/2013 10:47 PM, Prabath Siriwardena
                    wrote:<br>
                  </div>
                  <blockquote type=3D"cite"> Hi Justin,
                    <div><br>
                    </div>
                    <div>I believe this is addressing one of the key
                      missing part in OAuth 2.0...</div>
                    <div><br>
                    </div>
                    <div>One question - I guess this was discussed
                      already...</div>
                    <div><br>
                    </div>
                    <div>In the spec - in the introspection response it
                      has the attribute &quot;valid&quot; - this is basical=
ly the
                      validity of the token provided in the request.</div>
                    <div><br>
                    </div>
                    <div>Validation=A0criteria depends on the token and
                      well as token type ( Bearer, MAC..).</div>
                    <div><br>
                    </div>
                    <div>In the spec it seems like it&#39;s coupled with
                      Bearer token type... But I guess, by adding
                      &quot;token_type&quot; to the request we can remove t=
his
                      dependency.</div>
                    <div><br>
                    </div>
                    <div>WDYT..?</div>
                    <div><br>
                    </div>
                    <div>Thanks &amp; regards,</div>
                    <div>-Prabath=A0</div>
                    <div><br>
                      <div class=3D"gmail_quote">On Thu, Feb 7, 2013 at
                        12:54 AM, Justin Richer <span dir=3D"ltr">&lt;<a hr=
ef=3D"mailto:jricher@mitre.org" target=3D"_blank">jricher@mitre.org</a>&gt;=
</span>
                        wrote:<br>
                        <blockquote class=3D"gmail_quote" style=3D"margin:0=
 0 0 .8ex;border-left:1px #ccc solid;padding-left:1ex">
                          <div bgcolor=3D"#FFFFFF" text=3D"#000000"> Update=
d
                            introspection draft based on recent
                            comments. Changes include:<br>
                            <br>
                            =A0- &quot;scope&quot; return parameter now fol=
lows
                            RFC6749 format instead of JSON array<br>
                            =A0- &quot;subject&quot; -&gt; &quot;sub&quot;,=
 and &quot;audience&quot;
                            -&gt; &quot;aud&quot;, to be parallel with JWT =
claims<br>
                            =A0- clarified what happens if the
                            authentication is bad<br>
                            <br>
                            =A0-- Justin<br>
                            <div><br>
                              <br>
                              -------- Original Message --------
                              <table border=3D"0" cellpadding=3D"0" cellspa=
cing=3D"0">
                                <tbody>
                                  <tr>
                                    <th align=3D"RIGHT" nowrap valign=3D"BA=
SELINE">Subject: </th>
                                    <td>New Version Notification for
                                      draft-richer-oauth-introspection-02.t=
xt</td>
                                  </tr>
                                  <tr>
                                    <th align=3D"RIGHT" nowrap valign=3D"BA=
SELINE">Date: </th>
                                    <td>Wed, 6 Feb 2013 11:24:20 -0800</td>
                                  </tr>
                                  <tr>
                                    <th align=3D"RIGHT" nowrap valign=3D"BA=
SELINE">From: </th>
                                    <td><a href=3D"mailto:internet-drafts@i=
etf.org" target=3D"_blank">&lt;internet-drafts@ietf.org&gt;</a></td>
                                  </tr>
                                  <tr>
                                    <th align=3D"RIGHT" nowrap valign=3D"BA=
SELINE">To: </th>
                                    <td><a href=3D"mailto:jricher@mitre.org=
" target=3D"_blank">&lt;jricher@mitre.org&gt;</a></td>
                                  </tr>
                                </tbody>
                              </table>
                              <br>
                              <br>
                              <pre>A new version of I-D, draft-richer-oauth=
-introspection-02.txt
has been successfully submitted by Justin Richer and posted to the
IETF repository.

Filename:	 draft-richer-oauth-introspection
Revision:	 02
Title:		 OAuth Token Introspection
Creation date:	 2013-02-06
WG ID:		 Individual Submission
Number of pages: 6
URL:             <a href=3D"http://www.ietf.org/internet-drafts/draft-riche=
r-oauth-introspection-02.txt" target=3D"_blank">http://www.ietf.org/interne=
t-drafts/draft-richer-oauth-introspection-02.txt</a>
Status:          <a href=3D"http://datatracker.ietf.org/doc/draft-richer-oa=
uth-introspection" target=3D"_blank">http://datatracker.ietf.org/doc/draft-=
richer-oauth-introspection</a>
Htmlized:        <a href=3D"http://tools.ietf.org/html/draft-richer-oauth-i=
ntrospection-02" target=3D"_blank">http://tools.ietf.org/html/draft-richer-=
oauth-introspection-02</a>
Diff:            <a href=3D"http://www.ietf.org/rfcdiff?url2=3Ddraft-richer=
-oauth-introspection-02" target=3D"_blank">http://www.ietf.org/rfcdiff?url2=
=3Ddraft-richer-oauth-introspection-02</a>

Abstract:
   This specification defines a method for a client or protected
   resource to query an OAuth authorization server to determine meta-
   information about an OAuth token.


                                                                           =
      =20


The IETF Secretariat

</pre>
                              <br>
                            </div>
                            <br>
                          </div>
                          <br>
_______________________________________________<br>
                          OAuth mailing list<br>
                          <a href=3D"mailto:OAuth@ietf.org" target=3D"_blan=
k">OAuth@ietf.org</a><br>
                          <a href=3D"https://www.ietf.org/mailman/listinfo/=
oauth" target=3D"_blank">https://www.ietf.org/mailman/listinfo/oauth</a><br=
>
                          <br>
                        </blockquote>
                      </div>
                      <br>
                      <br clear=3D"all">
                      <div><br>
                      </div>
                      -- <br>
                      Thanks &amp; Regards,<br>
                      Prabath
                      <div><br>
                      </div>
                      <div>Mobile : <a href=3D"tel:%2B94%2071%20809%206732"=
 value=3D"+94718096732" target=3D"_blank">+94 71
                          809 6732</a>=A0<br>
                        <br>
                        <a href=3D"http://blog.facilelogin.com" target=3D"_=
blank">http://blog.facilelogin.com</a><br>
                        <a href=3D"http://RampartFAQ.com" target=3D"_blank"=
>http://RampartFAQ.com</a></div>
                    </div>
                  </blockquote>
                  <br>
                </div>
              </div>
            </div>
          </blockquote>
        </div>
        <br>
        <br clear=3D"all">
        <div><br>
        </div>
        -- <br>
        Thanks &amp; Regards,<br>
        Prabath
        <div><br>
        </div>
        <div>Mobile : <a href=3D"tel:%2B94%2071%20809%206732" value=3D"+947=
18096732" target=3D"_blank">+94 71 809 6732</a>=A0<br>
          <br>
          <a href=3D"http://blog.facilelogin.com" target=3D"_blank">http://=
blog.facilelogin.com</a><br>
          <a href=3D"http://RampartFAQ.com" target=3D"_blank">http://Rampar=
tFAQ.com</a></div>
      </div>
    </blockquote>
    <br>
  </div></div></div>

</blockquote></div><br><br clear=3D"all"><div><br></div>-- <br>Thanks &amp;=
 Regards,<br>Prabath<div><br></div><div>Mobile : <a href=3D"tel:%2B94%2071%=
20809%206732" value=3D"+94718096732" target=3D"_blank">+94 71 809 6732</a>=
=A0<br>
<br><a href=3D"http://blog.facilelogin.com" target=3D"_blank">http://blog.f=
acilelogin.com</a><br>
<a href=3D"http://RampartFAQ.com" target=3D"_blank">http://RampartFAQ.com</=
a></div>
</div>
</div></div></blockquote></div><br><br clear=3D"all"><div><br></div>-- <br>=
Thanks &amp; Regards,<br>Prabath<div><br></div><div>Mobile : +94 71 809 673=
2=A0<br><br><a href=3D"http://blog.facilelogin.com" target=3D"_blank">http:=
//blog.facilelogin.com</a><br>
<a href=3D"http://RampartFAQ.com" target=3D"_blank">http://RampartFAQ.com</=
a></div>
</div>

--047d7b66f28115a29904d5799d74--

From jricher@mitre.org  Mon Feb 11 13:50:29 2013
Return-Path: <jricher@mitre.org>
X-Original-To: oauth@ietfa.amsl.com
Delivered-To: oauth@ietfa.amsl.com
Received: from localhost (localhost [127.0.0.1]) by ietfa.amsl.com (Postfix) with ESMTP id 5DEA921F87FD for <oauth@ietfa.amsl.com>; Mon, 11 Feb 2013 13:50:28 -0800 (PST)
X-Virus-Scanned: amavisd-new at amsl.com
X-Spam-Flag: NO
X-Spam-Score: -6.573
X-Spam-Level: 
X-Spam-Status: No, score=-6.573 tagged_above=-999 required=5 tests=[AWL=0.025,  BAYES_00=-2.599, HTML_MESSAGE=0.001, RCVD_IN_DNSWL_MED=-4]
Received: from mail.ietf.org ([64.170.98.30]) by localhost (ietfa.amsl.com [127.0.0.1]) (amavisd-new, port 10024) with ESMTP id 7i6mekmV1qJi for <oauth@ietfa.amsl.com>; Mon, 11 Feb 2013 13:50:27 -0800 (PST)
Received: from smtpksrv1.mitre.org (smtpksrv1.mitre.org [198.49.146.77]) by ietfa.amsl.com (Postfix) with ESMTP id A8D2E21F869B for <oauth@ietf.org>; Mon, 11 Feb 2013 13:50:26 -0800 (PST)
Received: from smtpksrv1.mitre.org (localhost.localdomain [127.0.0.1]) by localhost (Postfix) with SMTP id 1647B53105B4; Mon, 11 Feb 2013 16:50:26 -0500 (EST)
Received: from IMCCAS02.MITRE.ORG (imccas02.mitre.org [129.83.29.79]) by smtpksrv1.mitre.org (Postfix) with ESMTP id E28731F13DC; Mon, 11 Feb 2013 16:50:25 -0500 (EST)
Received: from [10.146.15.29] (129.83.31.58) by IMCCAS02.MITRE.ORG (129.83.29.79) with Microsoft SMTP Server (TLS) id 14.2.318.4; Mon, 11 Feb 2013 16:50:25 -0500
Message-ID: <51196777.6000502@mitre.org>
Date: Mon, 11 Feb 2013 16:49:43 -0500
From: Justin Richer <jricher@mitre.org>
User-Agent: Mozilla/5.0 (X11; Linux i686; rv:17.0) Gecko/20130106 Thunderbird/17.0.2
MIME-Version: 1.0
To: Prabath Siriwardena <prabath@wso2.com>
References: <20130206192420.32698.21027.idtracker@ietfa.amsl.com> <5112AE0B.1080501@mitre.org> <CAJV9qO_8-4FowrXK=ae-+xMjiJFP04ryVMLQ8SGUH8kp3PHrLg@mail.gmail.com> <5113C3AA.1040701@mitre.org> <CAJV9qO8BVV57eAb5kUNes15AYOpUKqw5XWQswh-FJA=b1pPgSA@mail.gmail.com> <5113DDB2.7060805@mitre.org> <CAJV9qO_gM1oera9ae9sqh9n17e-ZLKuC2pmsZwhq-RmFcMyqHA@mail.gmail.com>
In-Reply-To: <CAJV9qO_gM1oera9ae9sqh9n17e-ZLKuC2pmsZwhq-RmFcMyqHA@mail.gmail.com>
Content-Type: multipart/alternative; boundary="------------040108080707050504020200"
X-Originating-IP: [129.83.31.58]
Cc: "oauth@ietf.org" <oauth@ietf.org>
Subject: Re: [OAUTH-WG] Fwd: New Version Notification for draft-richer-oauth-introspection-02.txt
X-BeenThere: oauth@ietf.org
X-Mailman-Version: 2.1.12
Precedence: list
List-Id: OAUTH WG <oauth.ietf.org>
List-Unsubscribe: <https://www.ietf.org/mailman/options/oauth>, <mailto:oauth-request@ietf.org?subject=unsubscribe>
List-Archive: <http://www.ietf.org/mail-archive/web/oauth>
List-Post: <mailto:oauth@ietf.org>
List-Help: <mailto:oauth-request@ietf.org?subject=help>
List-Subscribe: <https://www.ietf.org/mailman/listinfo/oauth>, <mailto:oauth-request@ietf.org?subject=subscribe>
X-List-Received-Date: Mon, 11 Feb 2013 21:50:29 -0000

--------------040108080707050504020200
Content-Type: text/plain; charset="ISO-8859-1"; format=flowed
Content-Transfer-Encoding: 7bit


On 02/08/2013 12:51 AM, Prabath Siriwardena wrote:
> Hi Justin,
>
> I have couple of questions related to "valid" parameter...
>
> This endpoint can be invoked by the Resource Server in runtime...

That's correct.

>
> In that case what is exactly meant by the "resource_id" in request ?

The resource_id field is a service-specific string that basically lets 
the resource server provide some context to the request to the auth 
server. There have been some other suggestions like client IP address, 
but I wanted to put this one in because it seemed to be a common theme. 
The client is trying to do *something* with the token, after all, and 
the rights, permissions, and metadata associated with the token could 
change based on that. Since the Introspection endpoint is all about 
getting that metadata back to the PR, this seemed like a good idea.

>
> IMO a token to be valid depends on set of criteria based on it's type..
>
> For a Bearer token..
>
> 1. Token should not be expired
> 2. Token should not be revoked.
> 3. The scope the token issued should match with the scope required for 
> the resource.
>
> For a MAC token...
>
> 1. Token not expired (mac id)
> 2. Token should not be revoked
> 3. The scope the token issued should match with the scope required for 
> the resource.
> 4. HMAC check should be valid
>
> There are similar conditions for SAML bearer too..

This isn't really true. The SAML bearer token is fully self-contained 
and doesn't change based on other parameters in the message, unlike MAC. 
Same with JWT. When it hands a SAML or JWT token to the AS, the PR has 
given *everything* the server needs to check that token's validity and use.

MAC signatures change with every message, and they're done across 
several components of the HTTP message. Therefor, the HMAC check for MAC 
style tokens will still need to be done by the protected resource. 
Introspection would help in the case that the signature validated just 
fine, but the token might have expired. Or you need to know what scopes 
apply. Introspection isn't to fully validate the call to the protected 
resource -- if that were the case, the PR would have to send some kind 
of encapsulated version of the original request. Otherwise, the AS won't 
have all of the information it needs to check the MAC.


I think what you're describing is ultimately *not* what the 
introspection endpoint is intended to do. If that's unclear from the 
document, can you please suggest text that would help clear the use case 
up? I wouldn't want it to be ambiguous.

  -- Justin

>
> Thanks & regards,
> -Prabath
>
>
> On Thu, Feb 7, 2013 at 10:30 PM, Justin Richer <jricher@mitre.org 
> <mailto:jricher@mitre.org>> wrote:
>
>     It validates the token, which would be either the token itself in
>     the case of Bearer or the token "id" part of something more
>     complex like MAC. It doesn't directly validate the usage of the
>     token, that's still up to the PR to do that.
>
>     I nearly added a "token type" field in this draft, but held back
>     because there are several kinds of "token type" that people talk
>     about in OAuth. First, there's "Bearer" vs. "MAC" vs. "HOK", or
>     what have you. Then within Bearer you have "JWT" or "SAML" or
>     "unstructured blob". Then you've also got "access" vs. "refresh"
>     and other flavors of token, like the id_token in OpenID Connect.
>
>     Thing is, the server running the introspection endpoint will
>     probably know *all* of these. But should it tell the client? If
>     so, which of the three, and what names should the fields be?
>
>      -- Justin
>
>
>     On 02/07/2013 11:26 AM, Prabath Siriwardena wrote:
>>     Okay.. I was thinking this could be used as a way to validate the
>>     token as well. BTW even in this case shouldn't communicate the
>>     type of token to AS? For example in the case of SAML profile - it
>>     could be SAML token..
>>
>>     Thanks & regards,
>>     -Prabath
>>
>>     On Thu, Feb 7, 2013 at 8:39 PM, Justin Richer <jricher@mitre.org
>>     <mailto:jricher@mitre.org>> wrote:
>>
>>         "valid" might not be the best term, but it's meant to be a
>>         field where the server says "yes this token is still good" or
>>         "no this token isn't good anymore". We could instead do this
>>         with HTTP codes or something but I went with a pure JSON
>>         response.
>>
>>          -- Justin
>>
>>
>>         On 02/06/2013 10:47 PM, Prabath Siriwardena wrote:
>>>         Hi Justin,
>>>
>>>         I believe this is addressing one of the key missing part in
>>>         OAuth 2.0...
>>>
>>>         One question - I guess this was discussed already...
>>>
>>>         In the spec - in the introspection response it has the
>>>         attribute "valid" - this is basically the validity of the
>>>         token provided in the request.
>>>
>>>         Validation criteria depends on the token and well as token
>>>         type ( Bearer, MAC..).
>>>
>>>         In the spec it seems like it's coupled with Bearer token
>>>         type... But I guess, by adding "token_type" to the request
>>>         we can remove this dependency.
>>>
>>>         WDYT..?
>>>
>>>         Thanks & regards,
>>>         -Prabath
>>>
>>>         On Thu, Feb 7, 2013 at 12:54 AM, Justin Richer
>>>         <jricher@mitre.org <mailto:jricher@mitre.org>> wrote:
>>>
>>>             Updated introspection draft based on recent comments.
>>>             Changes include:
>>>
>>>              - "scope" return parameter now follows RFC6749 format
>>>             instead of JSON array
>>>              - "subject" -> "sub", and "audience" -> "aud", to be
>>>             parallel with JWT claims
>>>              - clarified what happens if the authentication is bad
>>>
>>>              -- Justin
>>>
>>>
>>>             -------- Original Message --------
>>>             Subject: 	New Version Notification for
>>>             draft-richer-oauth-introspection-02.txt
>>>             Date: 	Wed, 6 Feb 2013 11:24:20 -0800
>>>             From: 	<internet-drafts@ietf.org>
>>>             <mailto:internet-drafts@ietf.org>
>>>             To: 	<jricher@mitre.org> <mailto:jricher@mitre.org>
>>>
>>>
>>>
>>>             A new version of I-D, draft-richer-oauth-introspection-02.txt
>>>             has been successfully submitted by Justin Richer and posted to the
>>>             IETF repository.
>>>
>>>             Filename:	 draft-richer-oauth-introspection
>>>             Revision:	 02
>>>             Title:		 OAuth Token Introspection
>>>             Creation date:	 2013-02-06
>>>             WG ID:		 Individual Submission
>>>             Number of pages: 6
>>>             URL:http://www.ietf.org/internet-drafts/draft-richer-oauth-introspection-02.txt
>>>             Status:http://datatracker.ietf.org/doc/draft-richer-oauth-introspection
>>>             Htmlized:http://tools.ietf.org/html/draft-richer-oauth-introspection-02
>>>             Diff:http://www.ietf.org/rfcdiff?url2=draft-richer-oauth-introspection-02
>>>
>>>             Abstract:
>>>                 This specification defines a method for a client or protected
>>>                 resource to query an OAuth authorization server to determine meta-
>>>                 information about an OAuth token.
>>>
>>>
>>>                                                                                                
>>>
>>>
>>>             The IETF Secretariat
>>>
>>>
>>>
>>>
>>>             _______________________________________________
>>>             OAuth mailing list
>>>             OAuth@ietf.org <mailto:OAuth@ietf.org>
>>>             https://www.ietf.org/mailman/listinfo/oauth
>>>
>>>
>>>
>>>
>>>         -- 
>>>         Thanks & Regards,
>>>         Prabath
>>>
>>>         Mobile : +94 71 809 6732 <tel:%2B94%2071%20809%206732>
>>>
>>>         http://blog.facilelogin.com
>>>         http://RampartFAQ.com
>>
>>
>>
>>
>>     -- 
>>     Thanks & Regards,
>>     Prabath
>>
>>     Mobile : +94 71 809 6732 <tel:%2B94%2071%20809%206732>
>>
>>     http://blog.facilelogin.com
>>     http://RampartFAQ.com
>
>
>
>
> -- 
> Thanks & Regards,
> Prabath
>
> Mobile : +94 71 809 6732
>
> http://blog.facilelogin.com
> http://RampartFAQ.com


--------------040108080707050504020200
Content-Type: text/html; charset="ISO-8859-1"
Content-Transfer-Encoding: 7bit

<html>
  <head>
    <meta content="text/html; charset=ISO-8859-1"
      http-equiv="Content-Type">
  </head>
  <body bgcolor="#FFFFFF" text="#000000">
    <br>
    <div class="moz-cite-prefix">On 02/08/2013 12:51 AM, Prabath
      Siriwardena wrote:<br>
    </div>
    <blockquote
cite="mid:CAJV9qO_gM1oera9ae9sqh9n17e-ZLKuC2pmsZwhq-RmFcMyqHA@mail.gmail.com"
      type="cite">
      <meta http-equiv="Content-Type" content="text/html;
        charset=ISO-8859-1">
      Hi&nbsp;Justin,
      <div><br>
      </div>
      <div>I have couple of questions related to "valid" parameter...</div>
      <div><br>
      </div>
      <div>This endpoint can be invoked by the Resource Server in
        runtime...</div>
    </blockquote>
    <br>
    That's correct.<br>
    <br>
    <blockquote
cite="mid:CAJV9qO_gM1oera9ae9sqh9n17e-ZLKuC2pmsZwhq-RmFcMyqHA@mail.gmail.com"
      type="cite">
      <div><br>
      </div>
      <div>In that case what is exactly meant by the "resource_id" in
        request ?</div>
    </blockquote>
    <br>
    The resource_id field is a service-specific string that basically
    lets the resource server provide some context to the request to the
    auth server. There have been some other suggestions like client IP
    address, but I wanted to put this one in because it seemed to be a
    common theme. The client is trying to do *something* with the token,
    after all, and the rights, permissions, and metadata associated with
    the token could change based on that. Since the Introspection
    endpoint is all about getting that metadata back to the PR, this
    seemed like a good idea.<br>
    <br>
    <blockquote
cite="mid:CAJV9qO_gM1oera9ae9sqh9n17e-ZLKuC2pmsZwhq-RmFcMyqHA@mail.gmail.com"
      type="cite">
      <div><br>
      </div>
      <div>IMO a token to be valid depends on set of criteria based on
        it's type..</div>
      <div><br>
      </div>
      <div>For a Bearer token..</div>
      <div><br>
      </div>
      <div>1. Token should not be expired</div>
      <div>2. Token should not be revoked.</div>
      <div>3. The scope the token issued should match with the scope
        required for the resource.</div>
      <div><br>
      </div>
      <div>For a MAC token...</div>
      <div><br>
      </div>
      <div>1. Token not expired (mac id)</div>
      <div>2. Token should not be revoked</div>
      <div>3. The scope the token issued should match with the scope
        required for the resource.</div>
      <div>4. HMAC check should be valid</div>
      <div><br>
      </div>
      There are similar conditions for SAML bearer too..</blockquote>
    <br>
    This isn't really true. The SAML bearer token is fully
    self-contained and doesn't change based on other parameters in the
    message, unlike MAC. Same with JWT. When it hands a SAML or JWT
    token to the AS, the PR has given *everything* the server needs to
    check that token's validity and use. <br>
    <br>
    MAC signatures change with every message, and they're done across
    several components of the HTTP message. Therefor, the HMAC check for
    MAC style tokens will still need to be done by the protected
    resource. Introspection would help in the case that the signature
    validated just fine, but the token might have expired. Or you need
    to know what scopes apply. Introspection isn't to fully validate the
    call to the protected resource -- if that were the case, the PR
    would have to send some kind of encapsulated version of the original
    request. Otherwise, the AS won't have all of the information it
    needs to check the MAC.<br>
    <br>
    <br>
    I think what you're describing is ultimately *not* what the
    introspection endpoint is intended to do. If that's unclear from the
    document, can you please suggest text that would help clear the use
    case up? I wouldn't want it to be ambiguous.<br>
    <br>
    &nbsp;-- Justin<br>
    <br>
    <blockquote
cite="mid:CAJV9qO_gM1oera9ae9sqh9n17e-ZLKuC2pmsZwhq-RmFcMyqHA@mail.gmail.com"
      type="cite">
      <div><br>
      </div>
      <div>Thanks &amp; regards,</div>
      <div>-Prabath</div>
      <div><br>
      </div>
      <div><br>
        <div class="gmail_quote">On Thu, Feb 7, 2013 at 10:30 PM, Justin
          Richer <span dir="ltr">&lt;<a moz-do-not-send="true"
              href="mailto:jricher@mitre.org" target="_blank">jricher@mitre.org</a>&gt;</span>
          wrote:<br>
          <blockquote class="gmail_quote" style="margin:0 0 0
            .8ex;border-left:1px #ccc solid;padding-left:1ex">
            <div bgcolor="#FFFFFF" text="#000000"> It validates the
              token, which would be either the token itself in the case
              of Bearer or the token "id" part of something more complex
              like MAC. It doesn't directly validate the usage of the
              token, that's still up to the PR to do that.<br>
              <br>
              I nearly added a "token type" field in this draft, but
              held back because there are several kinds of "token type"
              that people talk about in OAuth. First, there's "Bearer"
              vs. "MAC" vs. "HOK", or what have you. Then within Bearer
              you have "JWT" or "SAML" or "unstructured blob". Then
              you've also got "access" vs. "refresh" and other flavors
              of token, like the id_token in OpenID Connect. <br>
              <br>
              Thing is, the server running the introspection endpoint
              will probably know *all* of these. But should it tell the
              client? If so, which of the three, and what names should
              the fields be?<span class="HOEnZb"><font color="#888888"><br>
                  <br>
                  &nbsp;-- Justin</font></span>
              <div>
                <div class="h5"><br>
                  <br>
                  <div>On 02/07/2013 11:26 AM, Prabath Siriwardena
                    wrote:<br>
                  </div>
                  <blockquote type="cite"> Okay.. I was thinking this
                    could be used as a way to validate the token as
                    well. BTW even in this case shouldn't communicate
                    the type of token to AS? For example in the case of
                    SAML profile - it could be SAML token..
                    <div> <br>
                    </div>
                    <div>Thanks &amp; regards,</div>
                    <div>-Prabath<br>
                      <br>
                      <div class="gmail_quote">On Thu, Feb 7, 2013 at
                        8:39 PM, Justin Richer <span dir="ltr">&lt;<a
                            moz-do-not-send="true"
                            href="mailto:jricher@mitre.org"
                            target="_blank">jricher@mitre.org</a>&gt;</span>
                        wrote:<br>
                        <blockquote class="gmail_quote" style="margin:0
                          0 0 .8ex;border-left:1px #ccc
                          solid;padding-left:1ex">
                          <div bgcolor="#FFFFFF" text="#000000"> "valid"
                            might not be the best term, but it's meant
                            to be a field where the server says "yes
                            this token is still good" or "no this token
                            isn't good anymore". We could instead do
                            this with HTTP codes or something but I went
                            with a pure JSON response.<span><font
                                color="#888888"><br>
                                <br>
                                &nbsp;-- Justin</font></span>
                            <div>
                              <div><br>
                                <br>
                                <div>On 02/06/2013 10:47 PM, Prabath
                                  Siriwardena wrote:<br>
                                </div>
                                <blockquote type="cite"> Hi Justin,
                                  <div><br>
                                  </div>
                                  <div>I believe this is addressing one
                                    of the key missing part in OAuth
                                    2.0...</div>
                                  <div><br>
                                  </div>
                                  <div>One question - I guess this was
                                    discussed already...</div>
                                  <div><br>
                                  </div>
                                  <div>In the spec - in the
                                    introspection response it has the
                                    attribute "valid" - this is
                                    basically the validity of the token
                                    provided in the request.</div>
                                  <div><br>
                                  </div>
                                  <div>Validation&nbsp;criteria depends on
                                    the token and well as token type (
                                    Bearer, MAC..).</div>
                                  <div><br>
                                  </div>
                                  <div>In the spec it seems like it's
                                    coupled with Bearer token type...
                                    But I guess, by adding "token_type"
                                    to the request we can remove this
                                    dependency.</div>
                                  <div><br>
                                  </div>
                                  <div>WDYT..?</div>
                                  <div><br>
                                  </div>
                                  <div>Thanks &amp; regards,</div>
                                  <div>-Prabath&nbsp;</div>
                                  <div><br>
                                    <div class="gmail_quote">On Thu, Feb
                                      7, 2013 at 12:54 AM, Justin Richer
                                      <span dir="ltr">&lt;<a
                                          moz-do-not-send="true"
                                          href="mailto:jricher@mitre.org"
                                          target="_blank">jricher@mitre.org</a>&gt;</span>
                                      wrote:<br>
                                      <blockquote class="gmail_quote"
                                        style="margin:0 0 0
                                        .8ex;border-left:1px #ccc
                                        solid;padding-left:1ex">
                                        <div bgcolor="#FFFFFF"
                                          text="#000000"> Updated
                                          introspection draft based on
                                          recent comments. Changes
                                          include:<br>
                                          <br>
                                          &nbsp;- "scope" return parameter
                                          now follows RFC6749 format
                                          instead of JSON array<br>
                                          &nbsp;- "subject" -&gt; "sub", and
                                          "audience" -&gt; "aud", to be
                                          parallel with JWT claims<br>
                                          &nbsp;- clarified what happens if
                                          the authentication is bad<br>
                                          <br>
                                          &nbsp;-- Justin<br>
                                          <div><br>
                                            <br>
                                            -------- Original Message
                                            --------
                                            <table border="0"
                                              cellpadding="0"
                                              cellspacing="0">
                                              <tbody>
                                                <tr>
                                                  <th align="RIGHT"
                                                    nowrap="nowrap"
                                                    valign="BASELINE">Subject:
                                                  </th>
                                                  <td>New Version
                                                    Notification for
                                                    draft-richer-oauth-introspection-02.txt</td>
                                                </tr>
                                                <tr>
                                                  <th align="RIGHT"
                                                    nowrap="nowrap"
                                                    valign="BASELINE">Date:
                                                  </th>
                                                  <td>Wed, 6 Feb 2013
                                                    11:24:20 -0800</td>
                                                </tr>
                                                <tr>
                                                  <th align="RIGHT"
                                                    nowrap="nowrap"
                                                    valign="BASELINE">From:
                                                  </th>
                                                  <td><a
                                                      moz-do-not-send="true"
href="mailto:internet-drafts@ietf.org" target="_blank">&lt;internet-drafts@ietf.org&gt;</a></td>
                                                </tr>
                                                <tr>
                                                  <th align="RIGHT"
                                                    nowrap="nowrap"
                                                    valign="BASELINE">To:
                                                  </th>
                                                  <td><a
                                                      moz-do-not-send="true"
href="mailto:jricher@mitre.org" target="_blank">&lt;jricher@mitre.org&gt;</a></td>
                                                </tr>
                                              </tbody>
                                            </table>
                                            <br>
                                            <br>
                                            <pre>A new version of I-D, draft-richer-oauth-introspection-02.txt
has been successfully submitted by Justin Richer and posted to the
IETF repository.

Filename:	 draft-richer-oauth-introspection
Revision:	 02
Title:		 OAuth Token Introspection
Creation date:	 2013-02-06
WG ID:		 Individual Submission
Number of pages: 6
URL:             <a moz-do-not-send="true" href="http://www.ietf.org/internet-drafts/draft-richer-oauth-introspection-02.txt" target="_blank">http://www.ietf.org/internet-drafts/draft-richer-oauth-introspection-02.txt</a>
Status:          <a moz-do-not-send="true" href="http://datatracker.ietf.org/doc/draft-richer-oauth-introspection" target="_blank">http://datatracker.ietf.org/doc/draft-richer-oauth-introspection</a>
Htmlized:        <a moz-do-not-send="true" href="http://tools.ietf.org/html/draft-richer-oauth-introspection-02" target="_blank">http://tools.ietf.org/html/draft-richer-oauth-introspection-02</a>
Diff:            <a moz-do-not-send="true" href="http://www.ietf.org/rfcdiff?url2=draft-richer-oauth-introspection-02" target="_blank">http://www.ietf.org/rfcdiff?url2=draft-richer-oauth-introspection-02</a>

Abstract:
   This specification defines a method for a client or protected
   resource to query an OAuth authorization server to determine meta-
   information about an OAuth token.


                                                                                  


The IETF Secretariat

</pre>
                                            <br>
                                          </div>
                                          <br>
                                        </div>
                                        <br>
_______________________________________________<br>
                                        OAuth mailing list<br>
                                        <a moz-do-not-send="true"
                                          href="mailto:OAuth@ietf.org"
                                          target="_blank">OAuth@ietf.org</a><br>
                                        <a moz-do-not-send="true"
                                          href="https://www.ietf.org/mailman/listinfo/oauth"
                                          target="_blank">https://www.ietf.org/mailman/listinfo/oauth</a><br>
                                        <br>
                                      </blockquote>
                                    </div>
                                    <br>
                                    <br clear="all">
                                    <div><br>
                                    </div>
                                    -- <br>
                                    Thanks &amp; Regards,<br>
                                    Prabath
                                    <div><br>
                                    </div>
                                    <div>Mobile : <a
                                        moz-do-not-send="true"
                                        href="tel:%2B94%2071%20809%206732"
                                        value="+94718096732"
                                        target="_blank">+94 71 809 6732</a>&nbsp;<br>
                                      <br>
                                      <a moz-do-not-send="true"
                                        href="http://blog.facilelogin.com"
                                        target="_blank">http://blog.facilelogin.com</a><br>
                                      <a moz-do-not-send="true"
                                        href="http://RampartFAQ.com"
                                        target="_blank">http://RampartFAQ.com</a></div>
                                  </div>
                                </blockquote>
                                <br>
                              </div>
                            </div>
                          </div>
                        </blockquote>
                      </div>
                      <br>
                      <br clear="all">
                      <div><br>
                      </div>
                      -- <br>
                      Thanks &amp; Regards,<br>
                      Prabath
                      <div><br>
                      </div>
                      <div>Mobile : <a moz-do-not-send="true"
                          href="tel:%2B94%2071%20809%206732"
                          value="+94718096732" target="_blank">+94 71
                          809 6732</a>&nbsp;<br>
                        <br>
                        <a moz-do-not-send="true"
                          href="http://blog.facilelogin.com"
                          target="_blank">http://blog.facilelogin.com</a><br>
                        <a moz-do-not-send="true"
                          href="http://RampartFAQ.com" target="_blank">http://RampartFAQ.com</a></div>
                    </div>
                  </blockquote>
                  <br>
                </div>
              </div>
            </div>
          </blockquote>
        </div>
        <br>
        <br clear="all">
        <div><br>
        </div>
        -- <br>
        Thanks &amp; Regards,<br>
        Prabath
        <div><br>
        </div>
        <div>Mobile : +94 71 809 6732&nbsp;<br>
          <br>
          <a moz-do-not-send="true" href="http://blog.facilelogin.com"
            target="_blank">http://blog.facilelogin.com</a><br>
          <a moz-do-not-send="true" href="http://RampartFAQ.com"
            target="_blank">http://RampartFAQ.com</a></div>
      </div>
    </blockquote>
    <br>
  </body>
</html>

--------------040108080707050504020200--

From prabath@wso2.com  Mon Feb 11 13:56:29 2013
Return-Path: <prabath@wso2.com>
X-Original-To: oauth@ietfa.amsl.com
Delivered-To: oauth@ietfa.amsl.com
Received: from localhost (localhost [127.0.0.1]) by ietfa.amsl.com (Postfix) with ESMTP id A71B921F87BA for <oauth@ietfa.amsl.com>; Mon, 11 Feb 2013 13:56:29 -0800 (PST)
X-Virus-Scanned: amavisd-new at amsl.com
X-Spam-Flag: NO
X-Spam-Score: -2.854
X-Spam-Level: 
X-Spam-Status: No, score=-2.854 tagged_above=-999 required=5 tests=[AWL=0.123,  BAYES_00=-2.599, FM_FORGED_GMAIL=0.622, HTML_MESSAGE=0.001, RCVD_IN_DNSWL_LOW=-1]
Received: from mail.ietf.org ([64.170.98.30]) by localhost (ietfa.amsl.com [127.0.0.1]) (amavisd-new, port 10024) with ESMTP id egKuSOGlgf-i for <oauth@ietfa.amsl.com>; Mon, 11 Feb 2013 13:56:28 -0800 (PST)
Received: from mail-ee0-f41.google.com (mail-ee0-f41.google.com [74.125.83.41]) by ietfa.amsl.com (Postfix) with ESMTP id 9FA6B21F8790 for <oauth@ietf.org>; Mon, 11 Feb 2013 13:56:27 -0800 (PST)
Received: by mail-ee0-f41.google.com with SMTP id c13so3387001eek.14 for <oauth@ietf.org>; Mon, 11 Feb 2013 13:56:26 -0800 (PST)
X-Google-DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=google.com; s=20120113; h=mime-version:x-received:in-reply-to:references:date:message-id :subject:from:to:cc:content-type:x-gm-message-state; bh=onpX+HV5clttdcw6N43H5cepzCW1QNFvuwFQDYC50F8=; b=X8GbRIpOa27BKCJjCnfBmKNMLz1WUUxBf5wIzbjOVFRV1SWybBqIvXbkhkmW1rTvn/ KE0nD0AEInLnZOB8ecsF81H0JMRiQ7xkwTifsWcCejxRrUdxPu629s0OPY5wUw9gTbsg NNiYo9KV/3OCD/IKEG6q7flASqsUjG7wLwvI4R3T0Lr0qc9+qaehh0kVzqd6Nb43mTtW Whm/QltCYpkxpJ65pRiOpExZo1FXTm107HYxeGDTgYIvzjcPvBn9DGARaitLnFwWd2VH ZtoQN+eR+snsOc/EWXxkDNbPDoUBC4x0P12JcMHHYK0WTD69EQyUGDtknzFSCCqFT7n7 oVRA==
MIME-Version: 1.0
X-Received: by 10.14.182.137 with SMTP id o9mr19296890eem.13.1360619786304; Mon, 11 Feb 2013 13:56:26 -0800 (PST)
Received: by 10.223.146.76 with HTTP; Mon, 11 Feb 2013 13:56:26 -0800 (PST)
In-Reply-To: <51196777.6000502@mitre.org>
References: <20130206192420.32698.21027.idtracker@ietfa.amsl.com> <5112AE0B.1080501@mitre.org> <CAJV9qO_8-4FowrXK=ae-+xMjiJFP04ryVMLQ8SGUH8kp3PHrLg@mail.gmail.com> <5113C3AA.1040701@mitre.org> <CAJV9qO8BVV57eAb5kUNes15AYOpUKqw5XWQswh-FJA=b1pPgSA@mail.gmail.com> <5113DDB2.7060805@mitre.org> <CAJV9qO_gM1oera9ae9sqh9n17e-ZLKuC2pmsZwhq-RmFcMyqHA@mail.gmail.com> <51196777.6000502@mitre.org>
Date: Tue, 12 Feb 2013 03:26:26 +0530
Message-ID: <CAJV9qO-5bWZbNUfCmaqYBQoy-qwNaSZFOsO9GL3CrbSejwVTzw@mail.gmail.com>
From: Prabath Siriwardena <prabath@wso2.com>
To: Justin Richer <jricher@mitre.org>
Content-Type: multipart/alternative; boundary=047d7b343f60097bfd04d579fbad
X-Gm-Message-State: ALoCoQlSDLaNLBzXKv55YUNhoRFk65mzkmRPxwwQK3rsfpRBhw2gfnOB3a66yuGZWzkXGDIFV2Oq
Cc: "oauth@ietf.org" <oauth@ietf.org>
Subject: Re: [OAUTH-WG] Fwd: New Version Notification for draft-richer-oauth-introspection-02.txt
X-BeenThere: oauth@ietf.org
X-Mailman-Version: 2.1.12
Precedence: list
List-Id: OAUTH WG <oauth.ietf.org>
List-Unsubscribe: <https://www.ietf.org/mailman/options/oauth>, <mailto:oauth-request@ietf.org?subject=unsubscribe>
List-Archive: <http://www.ietf.org/mail-archive/web/oauth>
List-Post: <mailto:oauth@ietf.org>
List-Help: <mailto:oauth-request@ietf.org?subject=help>
List-Subscribe: <https://www.ietf.org/mailman/listinfo/oauth>, <mailto:oauth-request@ietf.org?subject=subscribe>
X-List-Received-Date: Mon, 11 Feb 2013 21:56:29 -0000

--047d7b343f60097bfd04d579fbad
Content-Type: text/plain; charset=ISO-8859-1

I guess confusion is with 'valid' parameter is in the response..

I thought this will be helpful to standardize the communication between
Resource Server and the Authorization Server..

I would suggest we completely remove "valid" from the response - or define
it much clearly..

May be can add "revoked" with a boolean attribute..

Thanks & regards,
-Prabath

On Tue, Feb 12, 2013 at 3:19 AM, Justin Richer <jricher@mitre.org> wrote:

>
> On 02/08/2013 12:51 AM, Prabath Siriwardena wrote:
>
> Hi Justin,
>
>  I have couple of questions related to "valid" parameter...
>
>  This endpoint can be invoked by the Resource Server in runtime...
>
>
> That's correct.
>
>
>
>  In that case what is exactly meant by the "resource_id" in request ?
>
>
> The resource_id field is a service-specific string that basically lets the
> resource server provide some context to the request to the auth server.
> There have been some other suggestions like client IP address, but I wanted
> to put this one in because it seemed to be a common theme. The client is
> trying to do *something* with the token, after all, and the rights,
> permissions, and metadata associated with the token could change based on
> that. Since the Introspection endpoint is all about getting that metadata
> back to the PR, this seemed like a good idea.
>
>
>
>  IMO a token to be valid depends on set of criteria based on it's type..
>
>  For a Bearer token..
>
>  1. Token should not be expired
> 2. Token should not be revoked.
> 3. The scope the token issued should match with the scope required for the
> resource.
>
>  For a MAC token...
>
>  1. Token not expired (mac id)
> 2. Token should not be revoked
> 3. The scope the token issued should match with the scope required for the
> resource.
> 4. HMAC check should be valid
>
>  There are similar conditions for SAML bearer too..
>
>
> This isn't really true. The SAML bearer token is fully self-contained and
> doesn't change based on other parameters in the message, unlike MAC. Same
> with JWT. When it hands a SAML or JWT token to the AS, the PR has given
> *everything* the server needs to check that token's validity and use.
>
> MAC signatures change with every message, and they're done across several
> components of the HTTP message. Therefor, the HMAC check for MAC style
> tokens will still need to be done by the protected resource. Introspection
> would help in the case that the signature validated just fine, but the
> token might have expired. Or you need to know what scopes apply.
> Introspection isn't to fully validate the call to the protected resource --
> if that were the case, the PR would have to send some kind of encapsulated
> version of the original request. Otherwise, the AS won't have all of the
> information it needs to check the MAC.
>
>
> I think what you're describing is ultimately *not* what the introspection
> endpoint is intended to do. If that's unclear from the document, can you
> please suggest text that would help clear the use case up? I wouldn't want
> it to be ambiguous.
>
>  -- Justin
>
>
>
>  Thanks & regards,
> -Prabath
>
>
> On Thu, Feb 7, 2013 at 10:30 PM, Justin Richer <jricher@mitre.org> wrote:
>
>>  It validates the token, which would be either the token itself in the
>> case of Bearer or the token "id" part of something more complex like MAC.
>> It doesn't directly validate the usage of the token, that's still up to the
>> PR to do that.
>>
>> I nearly added a "token type" field in this draft, but held back because
>> there are several kinds of "token type" that people talk about in OAuth.
>> First, there's "Bearer" vs. "MAC" vs. "HOK", or what have you. Then within
>> Bearer you have "JWT" or "SAML" or "unstructured blob". Then you've also
>> got "access" vs. "refresh" and other flavors of token, like the id_token in
>> OpenID Connect.
>>
>> Thing is, the server running the introspection endpoint will probably
>> know *all* of these. But should it tell the client? If so, which of the
>> three, and what names should the fields be?
>>
>>  -- Justin
>>
>>
>> On 02/07/2013 11:26 AM, Prabath Siriwardena wrote:
>>
>> Okay.. I was thinking this could be used as a way to validate the token
>> as well. BTW even in this case shouldn't communicate the type of token to
>> AS? For example in the case of SAML profile - it could be SAML token..
>>
>>  Thanks & regards,
>> -Prabath
>>
>> On Thu, Feb 7, 2013 at 8:39 PM, Justin Richer <jricher@mitre.org> wrote:
>>
>>>  "valid" might not be the best term, but it's meant to be a field where
>>> the server says "yes this token is still good" or "no this token isn't good
>>> anymore". We could instead do this with HTTP codes or something but I went
>>> with a pure JSON response.
>>>
>>>  -- Justin
>>>
>>>
>>> On 02/06/2013 10:47 PM, Prabath Siriwardena wrote:
>>>
>>> Hi Justin,
>>>
>>>  I believe this is addressing one of the key missing part in OAuth
>>> 2.0...
>>>
>>>  One question - I guess this was discussed already...
>>>
>>>  In the spec - in the introspection response it has the attribute
>>> "valid" - this is basically the validity of the token provided in the
>>> request.
>>>
>>>  Validation criteria depends on the token and well as token type (
>>> Bearer, MAC..).
>>>
>>>  In the spec it seems like it's coupled with Bearer token type... But I
>>> guess, by adding "token_type" to the request we can remove this dependency.
>>>
>>>  WDYT..?
>>>
>>>  Thanks & regards,
>>> -Prabath
>>>
>>> On Thu, Feb 7, 2013 at 12:54 AM, Justin Richer <jricher@mitre.org>wrote:
>>>
>>>>  Updated introspection draft based on recent comments. Changes include:
>>>>
>>>>  - "scope" return parameter now follows RFC6749 format instead of JSON
>>>> array
>>>>  - "subject" -> "sub", and "audience" -> "aud", to be parallel with JWT
>>>> claims
>>>>  - clarified what happens if the authentication is bad
>>>>
>>>>  -- Justin
>>>>
>>>>
>>>> -------- Original Message --------  Subject: New Version Notification
>>>> for draft-richer-oauth-introspection-02.txt  Date: Wed, 6 Feb 2013
>>>> 11:24:20 -0800  From: <internet-drafts@ietf.org><internet-drafts@ietf.org>  To:
>>>> <jricher@mitre.org> <jricher@mitre.org>
>>>>
>>>> A new version of I-D, draft-richer-oauth-introspection-02.txt
>>>> has been successfully submitted by Justin Richer and posted to the
>>>> IETF repository.
>>>>
>>>> Filename:	 draft-richer-oauth-introspection
>>>> Revision:	 02
>>>> Title:		 OAuth Token Introspection
>>>> Creation date:	 2013-02-06
>>>> WG ID:		 Individual Submission
>>>> Number of pages: 6
>>>> URL:             http://www.ietf.org/internet-drafts/draft-richer-oauth-introspection-02.txt
>>>> Status:          http://datatracker.ietf.org/doc/draft-richer-oauth-introspection
>>>> Htmlized:        http://tools.ietf.org/html/draft-richer-oauth-introspection-02
>>>> Diff:            http://www.ietf.org/rfcdiff?url2=draft-richer-oauth-introspection-02
>>>>
>>>> Abstract:
>>>>    This specification defines a method for a client or protected
>>>>    resource to query an OAuth authorization server to determine meta-
>>>>    information about an OAuth token.
>>>>
>>>>
>>>>
>>>>
>>>>
>>>> The IETF Secretariat
>>>>
>>>>
>>>>
>>>>
>>>>
>>>> _______________________________________________
>>>> OAuth mailing list
>>>> OAuth@ietf.org
>>>> https://www.ietf.org/mailman/listinfo/oauth
>>>>
>>>>
>>>
>>>
>>>  --
>>> Thanks & Regards,
>>> Prabath
>>>
>>>  Mobile : +94 71 809 6732
>>>
>>> http://blog.facilelogin.com
>>> http://RampartFAQ.com
>>>
>>>
>>>
>>
>>
>>  --
>> Thanks & Regards,
>> Prabath
>>
>>  Mobile : +94 71 809 6732 <%2B94%2071%20809%206732>
>>
>> http://blog.facilelogin.com
>> http://RampartFAQ.com
>>
>>
>>
>
>
>  --
> Thanks & Regards,
> Prabath
>
>  Mobile : +94 71 809 6732
>
> http://blog.facilelogin.com
> http://RampartFAQ.com
>
>
>


-- 
Thanks & Regards,
Prabath

Mobile : +94 71 809 6732

http://blog.facilelogin.com
http://RampartFAQ.com

--047d7b343f60097bfd04d579fbad
Content-Type: text/html; charset=ISO-8859-1
Content-Transfer-Encoding: quoted-printable

I guess confusion is with &#39;valid&#39; parameter is in the response..<di=
v><br></div><div>I thought this will be helpful to=A0standardize=A0the comm=
unication between Resource Server and the Authorization Server..</div><div>=
<br>
</div><div>I would suggest we completely remove &quot;valid&quot; from the =
response - or define it much clearly..</div><div><br></div><div>May be can =
add &quot;revoked&quot; with a boolean attribute..</div><div><br></div>
<div>Thanks &amp; regards,</div><div>-Prabath<br><br><div class=3D"gmail_qu=
ote">On Tue, Feb 12, 2013 at 3:19 AM, Justin Richer <span dir=3D"ltr">&lt;<=
a href=3D"mailto:jricher@mitre.org" target=3D"_blank">jricher@mitre.org</a>=
&gt;</span> wrote:<br>
<blockquote class=3D"gmail_quote" style=3D"margin:0 0 0 .8ex;border-left:1p=
x #ccc solid;padding-left:1ex">
 =20
   =20
 =20
  <div bgcolor=3D"#FFFFFF" text=3D"#000000"><div class=3D"im">
    <br>
    <div>On 02/08/2013 12:51 AM, Prabath
      Siriwardena wrote:<br>
    </div>
    </div><blockquote type=3D"cite">
     =20
      Hi=A0Justin,
      <div><br>
      </div><div class=3D"im">
      <div>I have couple of questions related to &quot;valid&quot; paramete=
r...</div>
      <div><br>
      </div>
      <div>This endpoint can be invoked by the Resource Server in
        runtime...</div>
    </div></blockquote>
    <br>
    That&#39;s correct.<div class=3D"im"><br>
    <br>
    <blockquote type=3D"cite">
      <div><br>
      </div>
      <div>In that case what is exactly meant by the &quot;resource_id&quot=
; in
        request ?</div>
    </blockquote>
    <br></div>
    The resource_id field is a service-specific string that basically
    lets the resource server provide some context to the request to the
    auth server. There have been some other suggestions like client IP
    address, but I wanted to put this one in because it seemed to be a
    common theme. The client is trying to do *something* with the token,
    after all, and the rights, permissions, and metadata associated with
    the token could change based on that. Since the Introspection
    endpoint is all about getting that metadata back to the PR, this
    seemed like a good idea.<div class=3D"im"><br>
    <br>
    <blockquote type=3D"cite">
      <div><br>
      </div>
      <div>IMO a token to be valid depends on set of criteria based on
        it&#39;s type..</div>
      <div><br>
      </div>
      <div>For a Bearer token..</div>
      <div><br>
      </div>
      <div>1. Token should not be expired</div>
      <div>2. Token should not be revoked.</div>
      <div>3. The scope the token issued should match with the scope
        required for the resource.</div>
      <div><br>
      </div>
      <div>For a MAC token...</div>
      <div><br>
      </div>
      <div>1. Token not expired (mac id)</div>
      <div>2. Token should not be revoked</div>
      <div>3. The scope the token issued should match with the scope
        required for the resource.</div>
      <div>4. HMAC check should be valid</div>
      <div><br>
      </div>
      There are similar conditions for SAML bearer too..</blockquote>
    <br></div>
    This isn&#39;t really true. The SAML bearer token is fully
    self-contained and doesn&#39;t change based on other parameters in the
    message, unlike MAC. Same with JWT. When it hands a SAML or JWT
    token to the AS, the PR has given *everything* the server needs to
    check that token&#39;s validity and use. <br>
    <br>
    MAC signatures change with every message, and they&#39;re done across
    several components of the HTTP message. Therefor, the HMAC check for
    MAC style tokens will still need to be done by the protected
    resource. Introspection would help in the case that the signature
    validated just fine, but the token might have expired. Or you need
    to know what scopes apply. Introspection isn&#39;t to fully validate th=
e
    call to the protected resource -- if that were the case, the PR
    would have to send some kind of encapsulated version of the original
    request. Otherwise, the AS won&#39;t have all of the information it
    needs to check the MAC.<br>
    <br>
    <br>
    I think what you&#39;re describing is ultimately *not* what the
    introspection endpoint is intended to do. If that&#39;s unclear from th=
e
    document, can you please suggest text that would help clear the use
    case up? I wouldn&#39;t want it to be ambiguous.<span class=3D"HOEnZb">=
<font color=3D"#888888"><br>
    <br>
    =A0-- Justin</font></span><div><div class=3D"h5"><br>
    <br>
    <blockquote type=3D"cite">
      <div><br>
      </div>
      <div>Thanks &amp; regards,</div>
      <div>-Prabath</div>
      <div><br>
      </div>
      <div><br>
        <div class=3D"gmail_quote">On Thu, Feb 7, 2013 at 10:30 PM, Justin
          Richer <span dir=3D"ltr">&lt;<a href=3D"mailto:jricher@mitre.org"=
 target=3D"_blank">jricher@mitre.org</a>&gt;</span>
          wrote:<br>
          <blockquote class=3D"gmail_quote" style=3D"margin:0 0 0 .8ex;bord=
er-left:1px #ccc solid;padding-left:1ex">
            <div bgcolor=3D"#FFFFFF" text=3D"#000000"> It validates the
              token, which would be either the token itself in the case
              of Bearer or the token &quot;id&quot; part of something more =
complex
              like MAC. It doesn&#39;t directly validate the usage of the
              token, that&#39;s still up to the PR to do that.<br>
              <br>
              I nearly added a &quot;token type&quot; field in this draft, =
but
              held back because there are several kinds of &quot;token type=
&quot;
              that people talk about in OAuth. First, there&#39;s &quot;Bea=
rer&quot;
              vs. &quot;MAC&quot; vs. &quot;HOK&quot;, or what have you. Th=
en within Bearer
              you have &quot;JWT&quot; or &quot;SAML&quot; or &quot;unstruc=
tured blob&quot;. Then
              you&#39;ve also got &quot;access&quot; vs. &quot;refresh&quot=
; and other flavors
              of token, like the id_token in OpenID Connect. <br>
              <br>
              Thing is, the server running the introspection endpoint
              will probably know *all* of these. But should it tell the
              client? If so, which of the three, and what names should
              the fields be?<span><font color=3D"#888888"><br>
                  <br>
                  =A0-- Justin</font></span>
              <div>
                <div><br>
                  <br>
                  <div>On 02/07/2013 11:26 AM, Prabath Siriwardena
                    wrote:<br>
                  </div>
                  <blockquote type=3D"cite"> Okay.. I was thinking this
                    could be used as a way to validate the token as
                    well. BTW even in this case shouldn&#39;t communicate
                    the type of token to AS? For example in the case of
                    SAML profile - it could be SAML token..
                    <div> <br>
                    </div>
                    <div>Thanks &amp; regards,</div>
                    <div>-Prabath<br>
                      <br>
                      <div class=3D"gmail_quote">On Thu, Feb 7, 2013 at
                        8:39 PM, Justin Richer <span dir=3D"ltr">&lt;<a hre=
f=3D"mailto:jricher@mitre.org" target=3D"_blank">jricher@mitre.org</a>&gt;<=
/span>
                        wrote:<br>
                        <blockquote class=3D"gmail_quote" style=3D"margin:0=
 0 0 .8ex;border-left:1px #ccc solid;padding-left:1ex">
                          <div bgcolor=3D"#FFFFFF" text=3D"#000000"> &quot;=
valid&quot;
                            might not be the best term, but it&#39;s meant
                            to be a field where the server says &quot;yes
                            this token is still good&quot; or &quot;no this=
 token
                            isn&#39;t good anymore&quot;. We could instead =
do
                            this with HTTP codes or something but I went
                            with a pure JSON response.<span><font color=3D"=
#888888"><br>
                                <br>
                                =A0-- Justin</font></span>
                            <div>
                              <div><br>
                                <br>
                                <div>On 02/06/2013 10:47 PM, Prabath
                                  Siriwardena wrote:<br>
                                </div>
                                <blockquote type=3D"cite"> Hi Justin,
                                  <div><br>
                                  </div>
                                  <div>I believe this is addressing one
                                    of the key missing part in OAuth
                                    2.0...</div>
                                  <div><br>
                                  </div>
                                  <div>One question - I guess this was
                                    discussed already...</div>
                                  <div><br>
                                  </div>
                                  <div>In the spec - in the
                                    introspection response it has the
                                    attribute &quot;valid&quot; - this is
                                    basically the validity of the token
                                    provided in the request.</div>
                                  <div><br>
                                  </div>
                                  <div>Validation=A0criteria depends on
                                    the token and well as token type (
                                    Bearer, MAC..).</div>
                                  <div><br>
                                  </div>
                                  <div>In the spec it seems like it&#39;s
                                    coupled with Bearer token type...
                                    But I guess, by adding &quot;token_type=
&quot;
                                    to the request we can remove this
                                    dependency.</div>
                                  <div><br>
                                  </div>
                                  <div>WDYT..?</div>
                                  <div><br>
                                  </div>
                                  <div>Thanks &amp; regards,</div>
                                  <div>-Prabath=A0</div>
                                  <div><br>
                                    <div class=3D"gmail_quote">On Thu, Feb
                                      7, 2013 at 12:54 AM, Justin Richer
                                      <span dir=3D"ltr">&lt;<a href=3D"mail=
to:jricher@mitre.org" target=3D"_blank">jricher@mitre.org</a>&gt;</span>
                                      wrote:<br>
                                      <blockquote class=3D"gmail_quote" sty=
le=3D"margin:0 0 0 .8ex;border-left:1px #ccc solid;padding-left:1ex">
                                        <div bgcolor=3D"#FFFFFF" text=3D"#0=
00000"> Updated
                                          introspection draft based on
                                          recent comments. Changes
                                          include:<br>
                                          <br>
                                          =A0- &quot;scope&quot; return par=
ameter
                                          now follows RFC6749 format
                                          instead of JSON array<br>
                                          =A0- &quot;subject&quot; -&gt; &q=
uot;sub&quot;, and
                                          &quot;audience&quot; -&gt; &quot;=
aud&quot;, to be
                                          parallel with JWT claims<br>
                                          =A0- clarified what happens if
                                          the authentication is bad<br>
                                          <br>
                                          =A0-- Justin<br>
                                          <div><br>
                                            <br>
                                            -------- Original Message
                                            --------
                                            <table border=3D"0" cellpadding=
=3D"0" cellspacing=3D"0">
                                              <tbody>
                                                <tr>
                                                  <th align=3D"RIGHT" nowra=
p valign=3D"BASELINE">Subject:
                                                  </th>
                                                  <td>New Version
                                                    Notification for
                                                    draft-richer-oauth-intr=
ospection-02.txt</td>
                                                </tr>
                                                <tr>
                                                  <th align=3D"RIGHT" nowra=
p valign=3D"BASELINE">Date:
                                                  </th>
                                                  <td>Wed, 6 Feb 2013
                                                    11:24:20 -0800</td>
                                                </tr>
                                                <tr>
                                                  <th align=3D"RIGHT" nowra=
p valign=3D"BASELINE">From:
                                                  </th>
                                                  <td><a href=3D"mailto:int=
ernet-drafts@ietf.org" target=3D"_blank">&lt;internet-drafts@ietf.org&gt;</=
a></td>
                                                </tr>
                                                <tr>
                                                  <th align=3D"RIGHT" nowra=
p valign=3D"BASELINE">To:
                                                  </th>
                                                  <td><a href=3D"mailto:jri=
cher@mitre.org" target=3D"_blank">&lt;jricher@mitre.org&gt;</a></td>
                                                </tr>
                                              </tbody>
                                            </table>
                                            <br>
                                            <br>
                                            <pre>A new version of I-D, draf=
t-richer-oauth-introspection-02.txt
has been successfully submitted by Justin Richer and posted to the
IETF repository.

Filename:	 draft-richer-oauth-introspection
Revision:	 02
Title:		 OAuth Token Introspection
Creation date:	 2013-02-06
WG ID:		 Individual Submission
Number of pages: 6
URL:             <a href=3D"http://www.ietf.org/internet-drafts/draft-riche=
r-oauth-introspection-02.txt" target=3D"_blank">http://www.ietf.org/interne=
t-drafts/draft-richer-oauth-introspection-02.txt</a>
Status:          <a href=3D"http://datatracker.ietf.org/doc/draft-richer-oa=
uth-introspection" target=3D"_blank">http://datatracker.ietf.org/doc/draft-=
richer-oauth-introspection</a>
Htmlized:        <a href=3D"http://tools.ietf.org/html/draft-richer-oauth-i=
ntrospection-02" target=3D"_blank">http://tools.ietf.org/html/draft-richer-=
oauth-introspection-02</a>
Diff:            <a href=3D"http://www.ietf.org/rfcdiff?url2=3Ddraft-richer=
-oauth-introspection-02" target=3D"_blank">http://www.ietf.org/rfcdiff?url2=
=3Ddraft-richer-oauth-introspection-02</a>

Abstract:
   This specification defines a method for a client or protected
   resource to query an OAuth authorization server to determine meta-
   information about an OAuth token.


                                                                           =
      =20


The IETF Secretariat

</pre>
                                            <br>
                                          </div>
                                          <br>
                                        </div>
                                        <br>
_______________________________________________<br>
                                        OAuth mailing list<br>
                                        <a href=3D"mailto:OAuth@ietf.org" t=
arget=3D"_blank">OAuth@ietf.org</a><br>
                                        <a href=3D"https://www.ietf.org/mai=
lman/listinfo/oauth" target=3D"_blank">https://www.ietf.org/mailman/listinf=
o/oauth</a><br>
                                        <br>
                                      </blockquote>
                                    </div>
                                    <br>
                                    <br clear=3D"all">
                                    <div><br>
                                    </div>
                                    -- <br>
                                    Thanks &amp; Regards,<br>
                                    Prabath
                                    <div><br>
                                    </div>
                                    <div>Mobile : <a href=3D"tel:%2B94%2071=
%20809%206732" value=3D"+94718096732" target=3D"_blank">+94 71 809 6732</a>=
=A0<br>
                                      <br>
                                      <a href=3D"http://blog.facilelogin.co=
m" target=3D"_blank">http://blog.facilelogin.com</a><br>
                                      <a href=3D"http://RampartFAQ.com" tar=
get=3D"_blank">http://RampartFAQ.com</a></div>
                                  </div>
                                </blockquote>
                                <br>
                              </div>
                            </div>
                          </div>
                        </blockquote>
                      </div>
                      <br>
                      <br clear=3D"all">
                      <div><br>
                      </div>
                      -- <br>
                      Thanks &amp; Regards,<br>
                      Prabath
                      <div><br>
                      </div>
                      <div>Mobile : <a href=3D"tel:%2B94%2071%20809%206732"=
 value=3D"+94718096732" target=3D"_blank">+94 71
                          809 6732</a>=A0<br>
                        <br>
                        <a href=3D"http://blog.facilelogin.com" target=3D"_=
blank">http://blog.facilelogin.com</a><br>
                        <a href=3D"http://RampartFAQ.com" target=3D"_blank"=
>http://RampartFAQ.com</a></div>
                    </div>
                  </blockquote>
                  <br>
                </div>
              </div>
            </div>
          </blockquote>
        </div>
        <br>
        <br clear=3D"all">
        <div><br>
        </div>
        -- <br>
        Thanks &amp; Regards,<br>
        Prabath
        <div><br>
        </div>
        <div>Mobile : <a href=3D"tel:%2B94%2071%20809%206732" value=3D"+947=
18096732" target=3D"_blank">+94 71 809 6732</a>=A0<br>
          <br>
          <a href=3D"http://blog.facilelogin.com" target=3D"_blank">http://=
blog.facilelogin.com</a><br>
          <a href=3D"http://RampartFAQ.com" target=3D"_blank">http://Rampar=
tFAQ.com</a></div>
      </div>
    </blockquote>
    <br>
  </div></div></div>

</blockquote></div><br><br clear=3D"all"><div><br></div>-- <br>Thanks &amp;=
 Regards,<br>Prabath<div><br></div><div>Mobile : +94 71 809 6732=A0<br><br>=
<a href=3D"http://blog.facilelogin.com" target=3D"_blank">http://blog.facil=
elogin.com</a><br>
<a href=3D"http://RampartFAQ.com" target=3D"_blank">http://RampartFAQ.com</=
a></div>
</div>

--047d7b343f60097bfd04d579fbad--

From richard@maymount.com  Mon Feb 11 15:34:05 2013
Return-Path: <richard@maymount.com>
X-Original-To: oauth@ietfa.amsl.com
Delivered-To: oauth@ietfa.amsl.com
Received: from localhost (localhost [127.0.0.1]) by ietfa.amsl.com (Postfix) with ESMTP id E1E8721F8713 for <oauth@ietfa.amsl.com>; Mon, 11 Feb 2013 15:34:03 -0800 (PST)
X-Virus-Scanned: amavisd-new at amsl.com
X-Spam-Flag: NO
X-Spam-Score: -5.202
X-Spam-Level: 
X-Spam-Status: No, score=-5.202 tagged_above=-999 required=5 tests=[BAYES_00=-2.599, HTML_MESSAGE=0.001, MIME_QP_LONG_LINE=1.396, RCVD_IN_DNSWL_MED=-4]
Received: from mail.ietf.org ([64.170.98.30]) by localhost (ietfa.amsl.com [127.0.0.1]) (amavisd-new, port 10024) with ESMTP id jq4C+oIvXrMp for <oauth@ietfa.amsl.com>; Mon, 11 Feb 2013 15:34:02 -0800 (PST)
Received: from exprod7og114.obsmtp.com (exprod7og114.obsmtp.com [64.18.2.215]) by ietfa.amsl.com (Postfix) with SMTP id A05C921F869A for <oauth@ietf.org>; Mon, 11 Feb 2013 15:34:02 -0800 (PST)
Received: from mail-pa0-f72.google.com ([209.85.220.72]) (using TLSv1) by exprod7ob114.postini.com ([64.18.6.12]) with SMTP ID DSNKURl/6r8czQIbrBDvsC55ZbgdZ9G4XJFQ@postini.com; Mon, 11 Feb 2013 15:34:02 PST
Received: by mail-pa0-f72.google.com with SMTP id bh2so5539278pad.7 for <oauth@ietf.org>; Mon, 11 Feb 2013 15:34:01 -0800 (PST)
DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=maymount.com; s=google; h=x-received:x-received:references:mime-version:in-reply-to :content-type:content-transfer-encoding:message-id:cc:x-mailer:from :subject:date:to; bh=0rqCpDouw2di/adh7cM1ACd66xqj9ISeSH1jw+A37bE=; b=ZrzkHlY6ont2gGwXqZzFI9KT5kd2IEufGtp6t4uNCW+vERzPUzToapaaIGXGBzbq4+ 6QD8hO8V+Rars2mpZ+2+Er59alrO2O7QNQyv902tvjBICHX0aXHN6ecFp0mpDBSyPMgq EfuwsA+8nv/0nTCL00cW14wwD4YRuNDZNPNp0=
X-Google-DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=google.com; s=20120113; h=x-received:x-received:references:mime-version:in-reply-to :content-type:content-transfer-encoding:message-id:cc:x-mailer:from :subject:date:to:x-gm-message-state; bh=0rqCpDouw2di/adh7cM1ACd66xqj9ISeSH1jw+A37bE=; b=QQeM6doKmcQLKC0jkdHuJCQBpdj8lipir5H+qluaQ3Y+XFnp3l2W9cLgeJr0EVLsBA vN05ZQTEoL6dcNZBOnD6GkLhKH4U/w7XmBmFlqUyIEAGY6bTO5w7Uvv+Nc/SdhaNjOnm A5A87ru8D+jGo1qRJTwwthg299VNz4hSDA7koNNAjVkAv0WD+jwlDDB3Xv49H/ENU0rq uucR6GNV9EwDUTdZWzVbQ15sLjRlDQVg8cMFlhhjUd38BzdrXb2kUAijdpSF4rs2XsqA ulL3eyuW4jCNTrB5d2pQ8uKXR4bHBxH01mzQHKoa3pbhnO6HImz3I72X0l+HGpTTzXYE tc7Q==
X-Received: by 10.66.83.8 with SMTP id m8mr45778031pay.40.1360625641915; Mon, 11 Feb 2013 15:34:01 -0800 (PST)
X-Received: by 10.66.83.8 with SMTP id m8mr45777984pay.40.1360625641583; Mon, 11 Feb 2013 15:34:01 -0800 (PST)
Received: from [192.168.1.3] (21.sub-70-199-236.myvzw.com. [70.199.236.21]) by mx.google.com with ESMTPS id q4sm69990403paz.20.2013.02.11.15.33.58 (version=TLSv1 cipher=ECDHE-RSA-RC4-SHA bits=128/128); Mon, 11 Feb 2013 15:34:00 -0800 (PST)
References: <51195F3D.1050006@mitre.org>
Mime-Version: 1.0 (1.0)
In-Reply-To: <51195F3D.1050006@mitre.org>
Content-Type: multipart/alternative; boundary=Apple-Mail-91D5C7D2-AB17-4371-B356-E59A10085065
Content-Transfer-Encoding: 7bit
Message-Id: <222C28CB-7F6F-4BC3-8692-40404C2DC2D3@maymount.com>
X-Mailer: iPad Mail (10B141)
From: Richard Harrington <richard@maymount.com>
Date: Mon, 11 Feb 2013 15:33:58 -0800
To: Justin Richer <jricher@mitre.org>
X-Gm-Message-State: ALoCoQkP4FXdrGmFhT+wxINfNByL6S7f+61+22iaYLaTzcqb1l3qAPP19nt3SH65CveNM8rSlv7xa6J795ya83tzLs8Y/YFifDVdVnWO6Zgb+bpRiwqbuhQKDmGbLambstz7AsX0SqR64AhgwCUGcyO/844VLIJGcw==
Cc: "oauth@ietf.org" <oauth@ietf.org>
Subject: Re: [OAUTH-WG] Registration: HAL _links structure and client self-URL
X-BeenThere: oauth@ietf.org
X-Mailman-Version: 2.1.12
Precedence: list
List-Id: OAUTH WG <oauth.ietf.org>
List-Unsubscribe: <https://www.ietf.org/mailman/options/oauth>, <mailto:oauth-request@ietf.org?subject=unsubscribe>
List-Archive: <http://www.ietf.org/mail-archive/web/oauth>
List-Post: <mailto:oauth@ietf.org>
List-Help: <mailto:oauth-request@ietf.org?subject=help>
List-Subscribe: <https://www.ietf.org/mailman/listinfo/oauth>, <mailto:oauth-request@ietf.org?subject=subscribe>
X-List-Received-Date: Mon, 11 Feb 2013 23:34:05 -0000

--Apple-Mail-91D5C7D2-AB17-4371-B356-E59A10085065
Content-Type: text/plain;
	charset=us-ascii
Content-Transfer-Encoding: quoted-printable

Since the request is an HTTP POST and a resource is created (http://www.w3.o=
rg/Protocols/rfc2616/rfc2616-sec9.html#sec9.5) the response should be an HTT=
P 201 Created (http://www.w3.org/Protocols/rfc2616/rfc2616-sec10.html#sec10.=
2.2) which is supposed to include the location of the newly created resource=
.

This is a good pattern to follow since, as you say, it does provide flexibil=
ity.



On Feb 11, 2013, at 1:14 PM, Justin Richer <jricher@mitre.org> wrote:

> Draft -05 of OAuth Dynamic Client Registration [1] returns a URL pointer f=
or the client to perform update and secret rotation actions. This functional=
ity arose from discussions on the list about moving towards a more RESTful p=
attern, and Nat Sakimura proposed this approach in the OpenID Connect Workin=
g Group. This URL may be distinct from the Client Registration Endpoint URL,=
 but draft -05 makes no promises as to its content, form, or structure, thou=
gh it does contain implementor's notes on possible methods.
>=20
> Two questions arise from this change:
> - The semantics of returning the client manipulation URL
> - The syntax (derived from HAL for JSON [2], an individual I-D submission)=

>=20
> On semantics:
>=20
> Pro:
> - The server has flexibility on how to define the "update" endpoint, sendi=
ng all clients to one URL, sending different clients to different URLs, or s=
ending clients to a URL with a baked-in query parameter
> - The client can take the URL as-is and use it for all management operatio=
ns (ie, it doesn't have to generate or compose the URL based on component pa=
rts)
>=20
> Con:
> - The client must remember one more piece of information from the server a=
t runtime if it wants to do manipulation and management of itself at the ser=
ver (in addition to client_id, client_secret, registration_access_token, and=
 others)
>=20
> Alternatives include specifying a URL pattern for the server to use and al=
l clients to follow, specifying a query parameter for the update action, and=
 specifying a separate endpoint entirely and using the presence of items suc=
h as client_id and the registration access token to differentiate the reques=
ts. Note that *all* of these alternatives can be accommodated using the sema=
ntics described above, with the same actions on the client's part.
>=20
>=20
> On syntax:
>=20
> Pro:
> - Follows the designs of RFC5988 for link relations
> - The HAL format is general, and allows for all kinds of other information=
 to be placed inside the _links structure
> - Allows for full use of the JSON object to specify advanced operations on=
 the returned endpoint if desired
>=20
> Con:
> - The rest of OAuth doesn't follow link relation guidelines (though it's b=
een brought up)
> - The HAL format is general, and allows for all kinds of other information=
 to be placed inside the _links structure
> - The HAL-JSON document is an expired individual I-D, and it's unclear wha=
t wider adoption looks like right now
>=20
> Alternatives include returning the URL as a separate data member (registra=
tion_update_url), using HTTP headers, or using JSON Schema.
>=20
> -- Justin
>=20
>=20
>=20
> [1] http://tools.ietf.org/html/draft-ietf-oauth-dyn-reg-05
> [2] http://tools.ietf.org/html/draft-kelly-json-hal-03
> _______________________________________________
> OAuth mailing list
> OAuth@ietf.org
> https://www.ietf.org/mailman/listinfo/oauth

--Apple-Mail-91D5C7D2-AB17-4371-B356-E59A10085065
Content-Type: text/html;
	charset=utf-8
Content-Transfer-Encoding: quoted-printable

<html><head><meta http-equiv=3D"content-type" content=3D"text/html; charset=3D=
utf-8"></head><body dir=3D"auto"><div>Since the request is an HTTP POST and a=
 resource is created (<span style=3D"font-family: '.HelveticaNeueUI'; font-s=
ize: 15px; line-height: 19px; white-space: nowrap; -webkit-tap-highlight-col=
or: rgba(26, 26, 26, 0.292969); -webkit-composition-fill-color: rgba(175, 19=
2, 227, 0.230469); -webkit-composition-frame-color: rgba(77, 128, 180, 0.230=
469); -webkit-text-size-adjust: none; "><a href=3D"http://www.w3.org/Protoco=
ls/rfc2616/rfc2616-sec9.html#sec9.5">http://www.w3.org/Protocols/rfc2616/rfc=
2616-sec9.html#sec9.5</a>)&nbsp;</span><span style=3D"font-family: '.Helveti=
caNeueUI'; font-size: 15px; line-height: 19px; white-space: nowrap; -webkit-=
tap-highlight-color: rgba(26, 26, 26, 0.292969); -webkit-composition-fill-co=
lor: rgba(175, 192, 227, 0.230469); -webkit-composition-frame-color: rgba(77=
, 128, 180, 0.230469); -webkit-text-size-adjust: none; ">the response should=
 be an HTTP 201 Created&nbsp;</span><span style=3D"font-family: '.HelveticaN=
eueUI'; font-size: 15px; line-height: 19px; white-space: nowrap; -webkit-tap=
-highlight-color: rgba(26, 26, 26, 0.292969); -webkit-composition-fill-color=
: rgba(175, 192, 227, 0.230469); -webkit-composition-frame-color: rgba(77, 1=
28, 180, 0.230469); -webkit-text-size-adjust: none; ">(<a href=3D"http://www=
.w3.org/Protocols/rfc2616/rfc2616-sec10.html#sec10.2.2">http://www.w3.org/Pr=
otocols/rfc2616/rfc2616-sec10.html#sec10.2.2</a>)&nbsp;</span><span style=3D=
"font-family: '.HelveticaNeueUI'; font-size: 15px; line-height: 19px; white-=
space: nowrap; -webkit-tap-highlight-color: rgba(26, 26, 26, 0.292969); -web=
kit-composition-fill-color: rgba(175, 192, 227, 0.230469); -webkit-compositi=
on-frame-color: rgba(77, 128, 180, 0.230469); -webkit-text-size-adjust: none=
; ">which is supposed to include the location of the newly created resource.=
</span></div><div><span style=3D"font-family: '.HelveticaNeueUI'; font-size:=
 15px; line-height: 19px; white-space: nowrap; -webkit-tap-highlight-color: r=
gba(26, 26, 26, 0.292969); -webkit-composition-fill-color: rgba(175, 192, 22=
7, 0.230469); -webkit-composition-frame-color: rgba(77, 128, 180, 0.230469);=
 -webkit-text-size-adjust: none; "><br></span></div><div><span style=3D"font=
-family: '.HelveticaNeueUI'; font-size: 15px; line-height: 19px; white-space=
: nowrap; -webkit-tap-highlight-color: rgba(26, 26, 26, 0.292969); -webkit-c=
omposition-fill-color: rgba(175, 192, 227, 0.230469); -webkit-composition-fr=
ame-color: rgba(77, 128, 180, 0.230469); -webkit-text-size-adjust: none; ">T=
his is a good pattern to follow since, as you say, it does provide flexibili=
ty.</span></div><div><span style=3D"font-family: '.HelveticaNeueUI'; font-si=
ze: 15px; line-height: 19px; white-space: nowrap; -webkit-tap-highlight-colo=
r: rgba(26, 26, 26, 0.292969); -webkit-composition-fill-color: rgba(175, 192=
, 227, 0.230469); -webkit-composition-frame-color: rgba(77, 128, 180, 0.2304=
69); -webkit-text-size-adjust: none; "><br></span></div><div><span style=3D"=
font-family: '.HelveticaNeueUI'; font-size: 15px; line-height: 19px; white-s=
pace: nowrap; -webkit-tap-highlight-color: rgba(26, 26, 26, 0.292969); -webk=
it-composition-fill-color: rgba(175, 192, 227, 0.230469); -webkit-compositio=
n-frame-color: rgba(77, 128, 180, 0.230469); -webkit-text-size-adjust: none;=
 "><br></span></div><div><br>On Feb 11, 2013, at 1:14 PM, Justin Richer &lt;=
<a href=3D"mailto:jricher@mitre.org">jricher@mitre.org</a>&gt; wrote:<br><br=
></div><blockquote type=3D"cite"><div><span>Draft -05 of OAuth Dynamic Clien=
t Registration [1] returns a URL pointer for the client to perform update an=
d secret rotation actions. This functionality arose from discussions on the l=
ist about moving towards a more RESTful pattern, and Nat Sakimura proposed t=
his approach in the OpenID Connect Working Group. This URL may be distinct f=
rom the Client Registration Endpoint URL, but draft -05 makes no promises as=
 to its content, form, or structure, though it does contain implementor's no=
tes on possible methods.</span><br><span></span><br><span>Two questions aris=
e from this change:</span><br><span> - The semantics of returning the client=
 manipulation URL</span><br><span> - The syntax (derived from HAL for JSON [=
2], an individual I-D submission)</span><br><span></span><br><span>On semant=
ics:</span><br><span></span><br><span>Pro:</span><br><span> - The server has=
 flexibility on how to define the "update" endpoint, sending all clients to o=
ne URL, sending different clients to different URLs, or sending clients to a=
 URL with a baked-in query parameter</span><br><span> - The client can take t=
he URL as-is and use it for all management operations (ie, it doesn't have t=
o generate or compose the URL based on component parts)</span><br><span></sp=
an><br><span>Con:</span><br><span> - The client must remember one more piece=
 of information from the server at runtime if it wants to do manipulation an=
d management of itself at the server (in addition to client_id, client_secre=
t, registration_access_token, and others)</span><br><span></span><br><span>A=
lternatives include specifying a URL pattern for the server to use and all c=
lients to follow, specifying a query parameter for the update action, and sp=
ecifying a separate endpoint entirely and using the presence of items such a=
s client_id and the registration access token to differentiate the requests.=
 Note that *all* of these alternatives can be accommodated using the semanti=
cs described above, with the same actions on the client's part.</span><br><s=
pan></span><br><span></span><br><span>On syntax:</span><br><span></span><br>=
<span>Pro:</span><br><span> - Follows the designs of RFC5988 for link relati=
ons</span><br><span> - The HAL format is general, and allows for all kinds o=
f other information to be placed inside the _links structure</span><br><span=
> - Allows for full use of the JSON object to specify advanced operations on=
 the returned endpoint if desired</span><br><span></span><br><span>Con:</spa=
n><br><span> - The rest of OAuth doesn't follow link relation guidelines (th=
ough it's been brought up)</span><br><span> - The HAL format is general, and=
 allows for all kinds of other information to be placed inside the _links st=
ructure</span><br><span> - The HAL-JSON document is an expired individual I-=
D, and it's unclear what wider adoption looks like right now</span><br><span=
></span><br><span>Alternatives include returning the URL as a separate data m=
ember (registration_update_url), using HTTP headers, or using JSON Schema.</=
span><br><span></span><br><span> -- Justin</span><br><span></span><br><span>=
</span><br><span></span><br><span>[1] <a href=3D"http://tools.ietf.org/html/=
draft-ietf-oauth-dyn-reg-05">http://tools.ietf.org/html/draft-ietf-oauth-dyn=
-reg-05</a></span><br><span>[2] <a href=3D"http://tools.ietf.org/html/draft-=
kelly-json-hal-03">http://tools.ietf.org/html/draft-kelly-json-hal-03</a></s=
pan><br><span>_______________________________________________</span><br><spa=
n>OAuth mailing list</span><br><span><a href=3D"mailto:OAuth@ietf.org">OAuth=
@ietf.org</a></span><br><span><a href=3D"https://www.ietf.org/mailman/listin=
fo/oauth">https://www.ietf.org/mailman/listinfo/oauth</a></span><br></div></=
blockquote></body></html>=

--Apple-Mail-91D5C7D2-AB17-4371-B356-E59A10085065--

From richard@maymount.com  Mon Feb 11 17:02:32 2013
Return-Path: <richard@maymount.com>
X-Original-To: oauth@ietfa.amsl.com
Delivered-To: oauth@ietfa.amsl.com
Received: from localhost (localhost [127.0.0.1]) by ietfa.amsl.com (Postfix) with ESMTP id 8A0E821F881D for <oauth@ietfa.amsl.com>; Mon, 11 Feb 2013 17:02:32 -0800 (PST)
X-Virus-Scanned: amavisd-new at amsl.com
X-Spam-Flag: NO
X-Spam-Score: -5.202
X-Spam-Level: 
X-Spam-Status: No, score=-5.202 tagged_above=-999 required=5 tests=[BAYES_00=-2.599, HTML_MESSAGE=0.001, MIME_QP_LONG_LINE=1.396, RCVD_IN_DNSWL_MED=-4]
Received: from mail.ietf.org ([64.170.98.30]) by localhost (ietfa.amsl.com [127.0.0.1]) (amavisd-new, port 10024) with ESMTP id SU9gxbzFDvvZ for <oauth@ietfa.amsl.com>; Mon, 11 Feb 2013 17:02:31 -0800 (PST)
Received: from exprod7og122.obsmtp.com (exprod7og122.obsmtp.com [64.18.2.22]) by ietfa.amsl.com (Postfix) with SMTP id BA68F21F87B9 for <oauth@ietf.org>; Mon, 11 Feb 2013 17:02:30 -0800 (PST)
Received: from mail-pa0-f70.google.com ([209.85.220.70]) (using TLSv1) by exprod7ob122.postini.com ([64.18.6.12]) with SMTP ID DSNKURmUpePoUWQUdw0ZafjSA/qeiaEqlfTf@postini.com; Mon, 11 Feb 2013 17:02:30 PST
Received: by mail-pa0-f70.google.com with SMTP id kp1so5586008pab.5 for <oauth@ietf.org>; Mon, 11 Feb 2013 17:02:29 -0800 (PST)
DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=maymount.com; s=google; h=x-received:x-received:references:mime-version:in-reply-to :content-type:content-transfer-encoding:message-id:cc:x-mailer:from :subject:date:to; bh=hc13t3TfHvkmGMTtMZNzb6cAKtbAoYcvVAImlQaw7Lg=; b=JLntID4S342Qx5kCcx25Hf9kscky1Wp7biy9FGVwQxElcQD+K5ydAAYFc8pimsqnf+ wOVWLrzS/HY+Vppz3KrFCz5tMw0AL/p2lJ7caZXYRUAuZWEQbHBhrClduPsdpmx9rIht /T6wywFLTZPAi3rE19chnsPy7Ob5atkRwHyFk=
X-Google-DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=google.com; s=20120113; h=x-received:x-received:references:mime-version:in-reply-to :content-type:content-transfer-encoding:message-id:cc:x-mailer:from :subject:date:to:x-gm-message-state; bh=hc13t3TfHvkmGMTtMZNzb6cAKtbAoYcvVAImlQaw7Lg=; b=GBYrilmdSFXYPvugmkjyRvHtz7cSyxDJNLUBIHNMqgYz9XZmCPgh1gv6HxuDl6Xf86 elQrUPNkKems51jTGdkBwVOiJ/RG/Fv3tw/gUkmTfyGHTcVAvZOcoAYEIlqonuVICE5J XySPaUtpETDWqF6WpaSxzEA7YNrt5orluFTI8GHnhHQE9mOYEEpJtMsa30e0rq6mBJZN BrZK7kVWQX0Br4nWUcr1w0y7Ki9JYVTQfLqpLWqK8oCpZNfe9tEQc/5m0spDGOTu2Dcw 9s+mL6n5UdZq1YjCstDgEINS/Vtm5DyZukB0xE9Rp5ifM65HAUIGgCRi0x9lyXBwCOei ESIw==
X-Received: by 10.66.82.200 with SMTP id k8mr46432976pay.56.1360630949843; Mon, 11 Feb 2013 17:02:29 -0800 (PST)
X-Received: by 10.66.82.200 with SMTP id k8mr46432932pay.56.1360630949491; Mon, 11 Feb 2013 17:02:29 -0800 (PST)
Received: from [192.168.0.17] (c-67-183-80-15.hsd1.wa.comcast.net. [67.183.80.15]) by mx.google.com with ESMTPS id g2sm14655586pav.2.2013.02.11.17.02.27 (version=TLSv1 cipher=ECDHE-RSA-RC4-SHA bits=128/128); Mon, 11 Feb 2013 17:02:28 -0800 (PST)
References: <20130206192420.32698.21027.idtracker@ietfa.amsl.com> <5112AE0B.1080501@mitre.org> <CAJV9qO_8-4FowrXK=ae-+xMjiJFP04ryVMLQ8SGUH8kp3PHrLg@mail.gmail.com> <5113C3AA.1040701@mitre.org> <CAJV9qO8BVV57eAb5kUNes15AYOpUKqw5XWQswh-FJA=b1pPgSA@mail.gmail.com> <5113DDB2.7060805@mitre.org> <CAJV9qO_gM1oera9ae9sqh9n17e-ZLKuC2pmsZwhq-RmFcMyqHA@mail.gmail.com> <51196777.6000502@mitre.org> <CAJV9qO-5bWZbNUfCmaqYBQoy-qwNaSZFOsO9GL3CrbSejwVTzw@mail.gmail.com>
Mime-Version: 1.0 (1.0)
In-Reply-To: <CAJV9qO-5bWZbNUfCmaqYBQoy-qwNaSZFOsO9GL3CrbSejwVTzw@mail.gmail.com>
Content-Type: multipart/alternative; boundary=Apple-Mail-08DD9270-46F8-460D-9FAF-F98161A4D6F8
Content-Transfer-Encoding: 7bit
Message-Id: <F6595A40-6B4E-4718-ABB5-694CA975C4DB@maymount.com>
X-Mailer: iPad Mail (10B141)
From: Richard Harrington <richard@maymount.com>
Date: Mon, 11 Feb 2013 17:02:23 -0800
To: Prabath Siriwardena <prabath@wso2.com>
X-Gm-Message-State: ALoCoQkJUC/sajcCkxZTU6DeB/SF60xgAS7EWAqGoBNmLx2+QIOeNmMAed59XkEdrzOasx1wJvLosMEqzyClUWsfl8M2yL4s95lsYgHOxLRiTOF+3376b1DlOXyG4DUJs8B9PmI4fyBKldPhNHoc4FrkHDjOcV0LOg==
Cc: "oauth@ietf.org" <oauth@ietf.org>
Subject: Re: [OAUTH-WG] Fwd: New Version Notification for draft-richer-oauth-introspection-02.txt
X-BeenThere: oauth@ietf.org
X-Mailman-Version: 2.1.12
Precedence: list
List-Id: OAUTH WG <oauth.ietf.org>
List-Unsubscribe: <https://www.ietf.org/mailman/options/oauth>, <mailto:oauth-request@ietf.org?subject=unsubscribe>
List-Archive: <http://www.ietf.org/mail-archive/web/oauth>
List-Post: <mailto:oauth@ietf.org>
List-Help: <mailto:oauth-request@ietf.org?subject=help>
List-Subscribe: <https://www.ietf.org/mailman/listinfo/oauth>, <mailto:oauth-request@ietf.org?subject=subscribe>
X-List-Received-Date: Tue, 12 Feb 2013 01:02:32 -0000

--Apple-Mail-08DD9270-46F8-460D-9FAF-F98161A4D6F8
Content-Type: text/plain;
	charset=us-ascii
Content-Transfer-Encoding: quoted-printable

Have you considered "status" instead of "valid"?  It could have values like "=
active", "expired", and "revoked".

Is it worthwhile including the status of the client also?  For example, a cl=
ient application could be disabled, temporarily or permanently, and thus dis=
abling its access tokens as well.


On Feb 11, 2013, at 1:56 PM, Prabath Siriwardena <prabath@wso2.com> wrote:

> I guess confusion is with 'valid' parameter is in the response..
>=20
> I thought this will be helpful to standardize the communication between Re=
source Server and the Authorization Server..
>=20
> I would suggest we completely remove "valid" from the response - or define=
 it much clearly..
>=20
> May be can add "revoked" with a boolean attribute..
>=20
> Thanks & regards,
> -Prabath
>=20
> On Tue, Feb 12, 2013 at 3:19 AM, Justin Richer <jricher@mitre.org> wrote:
>>=20
>> On 02/08/2013 12:51 AM, Prabath Siriwardena wrote:
>>> Hi Justin,
>>>=20
>>> I have couple of questions related to "valid" parameter...
>>>=20
>>> This endpoint can be invoked by the Resource Server in runtime...
>>=20
>> That's correct.
>>=20
>>=20
>>>=20
>>> In that case what is exactly meant by the "resource_id" in request ?
>>=20
>> The resource_id field is a service-specific string that basically lets th=
e resource server provide some context to the request to the auth server. Th=
ere have been some other suggestions like client IP address, but I wanted to=
 put this one in because it seemed to be a common theme. The client is tryin=
g to do *something* with the token, after all, and the rights, permissions, a=
nd metadata associated with the token could change based on that. Since the I=
ntrospection endpoint is all about getting that metadata back to the PR, thi=
s seemed like a good idea.
>>=20
>>=20
>>>=20
>>> IMO a token to be valid depends on set of criteria based on it's type..
>>>=20
>>> For a Bearer token..
>>>=20
>>> 1. Token should not be expired
>>> 2. Token should not be revoked.
>>> 3. The scope the token issued should match with the scope required for t=
he resource.
>>>=20
>>> For a MAC token...
>>>=20
>>> 1. Token not expired (mac id)
>>> 2. Token should not be revoked
>>> 3. The scope the token issued should match with the scope required for t=
he resource.
>>> 4. HMAC check should be valid
>>>=20
>>> There are similar conditions for SAML bearer too..
>>=20
>> This isn't really true. The SAML bearer token is fully self-contained and=
 doesn't change based on other parameters in the message, unlike MAC. Same w=
ith JWT. When it hands a SAML or JWT token to the AS, the PR has given *ever=
ything* the server needs to check that token's validity and use.=20
>>=20
>> MAC signatures change with every message, and they're done across several=
 components of the HTTP message. Therefor, the HMAC check for MAC style toke=
ns will still need to be done by the protected resource. Introspection would=
 help in the case that the signature validated just fine, but the token migh=
t have expired. Or you need to know what scopes apply. Introspection isn't t=
o fully validate the call to the protected resource -- if that were the case=
, the PR would have to send some kind of encapsulated version of the origina=
l request. Otherwise, the AS won't have all of the information it needs to c=
heck the MAC.
>>=20
>>=20
>> I think what you're describing is ultimately *not* what the introspection=
 endpoint is intended to do. If that's unclear from the document, can you pl=
ease suggest text that would help clear the use case up? I wouldn't want it t=
o be ambiguous.
>>=20
>>  -- Justin
>>=20
>>=20
>>>=20
>>> Thanks & regards,
>>> -Prabath
>>>=20
>>>=20
>>> On Thu, Feb 7, 2013 at 10:30 PM, Justin Richer <jricher@mitre.org> wrote=
:
>>>> It validates the token, which would be either the token itself in the c=
ase of Bearer or the token "id" part of something more complex like MAC. It d=
oesn't directly validate the usage of the token, that's still up to the PR t=
o do that.
>>>>=20
>>>> I nearly added a "token type" field in this draft, but held back becaus=
e there are several kinds of "token type" that people talk about in OAuth. Fi=
rst, there's "Bearer" vs. "MAC" vs. "HOK", or what have you. Then within Bea=
rer you have "JWT" or "SAML" or "unstructured blob". Then you've also got "a=
ccess" vs. "refresh" and other flavors of token, like the id_token in OpenID=
 Connect.=20
>>>>=20
>>>> Thing is, the server running the introspection endpoint will probably k=
now *all* of these. But should it tell the client? If so, which of the three=
, and what names should the fields be?
>>>>=20
>>>>  -- Justin
>>>>=20
>>>>=20
>>>> On 02/07/2013 11:26 AM, Prabath Siriwardena wrote:
>>>>> Okay.. I was thinking this could be used as a way to validate the toke=
n as well. BTW even in this case shouldn't communicate the type of token to A=
S? For example in the case of SAML profile - it could be SAML token..
>>>>>=20
>>>>> Thanks & regards,
>>>>> -Prabath
>>>>>=20
>>>>> On Thu, Feb 7, 2013 at 8:39 PM, Justin Richer <jricher@mitre.org> wrot=
e:
>>>>>> "valid" might not be the best term, but it's meant to be a field wher=
e the server says "yes this token is still good" or "no this token isn't goo=
d anymore". We could instead do this with HTTP codes or something but I went=
 with a pure JSON response.
>>>>>>=20
>>>>>>  -- Justin
>>>>>>=20
>>>>>>=20
>>>>>> On 02/06/2013 10:47 PM, Prabath Siriwardena wrote:
>>>>>>> Hi Justin,
>>>>>>>=20
>>>>>>> I believe this is addressing one of the key missing part in OAuth 2.=
0...
>>>>>>>=20
>>>>>>> One question - I guess this was discussed already...
>>>>>>>=20
>>>>>>> In the spec - in the introspection response it has the attribute "va=
lid" - this is basically the validity of the token provided in the request.
>>>>>>>=20
>>>>>>> Validation criteria depends on the token and well as token type ( Be=
arer, MAC..).
>>>>>>>=20
>>>>>>> In the spec it seems like it's coupled with Bearer token type... But=
 I guess, by adding "token_type" to the request we can remove this dependenc=
y.
>>>>>>>=20
>>>>>>> WDYT..?
>>>>>>>=20
>>>>>>> Thanks & regards,
>>>>>>> -Prabath=20
>>>>>>>=20
>>>>>>> On Thu, Feb 7, 2013 at 12:54 AM, Justin Richer <jricher@mitre.org> w=
rote:
>>>>>>>> Updated introspection draft based on recent comments. Changes inclu=
de:
>>>>>>>>=20
>>>>>>>>  - "scope" return parameter now follows RFC6749 format instead of J=
SON array
>>>>>>>>  - "subject" -> "sub", and "audience" -> "aud", to be parallel with=
 JWT claims
>>>>>>>>  - clarified what happens if the authentication is bad
>>>>>>>>=20
>>>>>>>>  -- Justin
>>>>>>>>=20
>>>>>>>>=20
>>>>>>>> -------- Original Message --------
>>>>>>>> Subject:	New Version Notification for draft-richer-oauth-int=
rospection-02.txt
>>>>>>>> Date:	Wed, 6 Feb 2013 11:24:20 -0800
>>>>>>>> From:	<internet-drafts@ietf.org>
>>>>>>>> To:	<jricher@mitre.org>
>>>>>>>>=20
>>>>>>>> A new version of I-D, draft-richer-oauth-introspection-02.txt
>>>>>>>> has been successfully submitted by Justin Richer and posted to the
>>>>>>>> IETF repository.
>>>>>>>>=20
>>>>>>>> Filename:	 draft-richer-oauth-introspection
>>>>>>>> Revision:	 02
>>>>>>>> Title:		 OAuth Token Introspection
>>>>>>>> Creation date:	 2013-02-06
>>>>>>>> WG ID:		 Individual Submission
>>>>>>>> Number of pages: 6
>>>>>>>> URL:             http://www.ietf.org/internet-drafts/draft-richer-o=
auth-introspection-02.txt
>>>>>>>> Status:          http://datatracker.ietf.org/doc/draft-richer-oauth=
-introspection
>>>>>>>> Htmlized:        http://tools.ietf.org/html/draft-richer-oauth-intr=
ospection-02
>>>>>>>> Diff:            http://www.ietf.org/rfcdiff?url2=3Ddraft-richer-oa=
uth-introspection-02
>>>>>>>>=20
>>>>>>>> Abstract:
>>>>>>>>    This specification defines a method for a client or protected
>>>>>>>>    resource to query an OAuth authorization server to determine met=
a-
>>>>>>>>    information about an OAuth token.
>>>>>>>>=20
>>>>>>>>=20
>>>>>>>>                                                                    =
              =20
>>>>>>>>=20
>>>>>>>>=20
>>>>>>>> The IETF Secretariat
>>>>>>>>=20
>>>>>>>>=20
>>>>>>>>=20
>>>>>>>>=20
>>>>>>>> _______________________________________________
>>>>>>>> OAuth mailing list
>>>>>>>> OAuth@ietf.org
>>>>>>>> https://www.ietf.org/mailman/listinfo/oauth
>>>>>>>=20
>>>>>>>=20
>>>>>>>=20
>>>>>>> --=20
>>>>>>> Thanks & Regards,
>>>>>>> Prabath
>>>>>>>=20
>>>>>>> Mobile : +94 71 809 6732=20
>>>>>>>=20
>>>>>>> http://blog.facilelogin.com
>>>>>>> http://RampartFAQ.com
>>>>>=20
>>>>>=20
>>>>>=20
>>>>> --=20
>>>>> Thanks & Regards,
>>>>> Prabath
>>>>>=20
>>>>> Mobile : +94 71 809 6732=20
>>>>>=20
>>>>> http://blog.facilelogin.com
>>>>> http://RampartFAQ.com
>>>=20
>>>=20
>>>=20
>>> --=20
>>> Thanks & Regards,
>>> Prabath
>>>=20
>>> Mobile : +94 71 809 6732=20
>>>=20
>>> http://blog.facilelogin.com
>>> http://RampartFAQ.com
>=20
>=20
>=20
> --=20
> Thanks & Regards,
> Prabath
>=20
> Mobile : +94 71 809 6732=20
>=20
> http://blog.facilelogin.com
> http://RampartFAQ.com
> _______________________________________________
> OAuth mailing list
> OAuth@ietf.org
> https://www.ietf.org/mailman/listinfo/oauth

--Apple-Mail-08DD9270-46F8-460D-9FAF-F98161A4D6F8
Content-Type: text/html;
	charset=utf-8
Content-Transfer-Encoding: 7bit

<html><head><meta http-equiv="content-type" content="text/html; charset=utf-8"></head><body dir="auto"><div>Have you considered "status" instead of "valid"? &nbsp;It could have values like "active", "expired", and "revoked".</div><div><br></div><div>Is it worthwhile including the status of the client also? &nbsp;For example, a client application could be disabled, temporarily or permanently, and thus disabling its access tokens as well.</div><div><br></div><div><br>On Feb 11, 2013, at 1:56 PM, Prabath Siriwardena &lt;<a href="mailto:prabath@wso2.com">prabath@wso2.com</a>&gt; wrote:<br><br></div><blockquote type="cite"><div>I guess confusion is with 'valid' parameter is in the response..<div><br></div><div>I thought this will be helpful to&nbsp;standardize&nbsp;the communication between Resource Server and the Authorization Server..</div><div><br>
</div><div>I would suggest we completely remove "valid" from the response - or define it much clearly..</div><div><br></div><div>May be can add "revoked" with a boolean attribute..</div><div><br></div>
<div>Thanks &amp; regards,</div><div>-Prabath<br><br><div class="gmail_quote">On Tue, Feb 12, 2013 at 3:19 AM, Justin Richer <span dir="ltr">&lt;<a href="mailto:jricher@mitre.org" target="_blank">jricher@mitre.org</a>&gt;</span> wrote:<br>
<blockquote class="gmail_quote" style="margin:0 0 0 .8ex;border-left:1px #ccc solid;padding-left:1ex">
  
    
  
  <div bgcolor="#FFFFFF" text="#000000"><div class="im">
    <br>
    <div>On 02/08/2013 12:51 AM, Prabath
      Siriwardena wrote:<br>
    </div>
    </div><blockquote type="cite">
      
      Hi&nbsp;Justin,
      <div><br>
      </div><div class="im">
      <div>I have couple of questions related to "valid" parameter...</div>
      <div><br>
      </div>
      <div>This endpoint can be invoked by the Resource Server in
        runtime...</div>
    </div></blockquote>
    <br>
    That's correct.<div class="im"><br>
    <br>
    <blockquote type="cite">
      <div><br>
      </div>
      <div>In that case what is exactly meant by the "resource_id" in
        request ?</div>
    </blockquote>
    <br></div>
    The resource_id field is a service-specific string that basically
    lets the resource server provide some context to the request to the
    auth server. There have been some other suggestions like client IP
    address, but I wanted to put this one in because it seemed to be a
    common theme. The client is trying to do *something* with the token,
    after all, and the rights, permissions, and metadata associated with
    the token could change based on that. Since the Introspection
    endpoint is all about getting that metadata back to the PR, this
    seemed like a good idea.<div class="im"><br>
    <br>
    <blockquote type="cite">
      <div><br>
      </div>
      <div>IMO a token to be valid depends on set of criteria based on
        it's type..</div>
      <div><br>
      </div>
      <div>For a Bearer token..</div>
      <div><br>
      </div>
      <div>1. Token should not be expired</div>
      <div>2. Token should not be revoked.</div>
      <div>3. The scope the token issued should match with the scope
        required for the resource.</div>
      <div><br>
      </div>
      <div>For a MAC token...</div>
      <div><br>
      </div>
      <div>1. Token not expired (mac id)</div>
      <div>2. Token should not be revoked</div>
      <div>3. The scope the token issued should match with the scope
        required for the resource.</div>
      <div>4. HMAC check should be valid</div>
      <div><br>
      </div>
      There are similar conditions for SAML bearer too..</blockquote>
    <br></div>
    This isn't really true. The SAML bearer token is fully
    self-contained and doesn't change based on other parameters in the
    message, unlike MAC. Same with JWT. When it hands a SAML or JWT
    token to the AS, the PR has given *everything* the server needs to
    check that token's validity and use. <br>
    <br>
    MAC signatures change with every message, and they're done across
    several components of the HTTP message. Therefor, the HMAC check for
    MAC style tokens will still need to be done by the protected
    resource. Introspection would help in the case that the signature
    validated just fine, but the token might have expired. Or you need
    to know what scopes apply. Introspection isn't to fully validate the
    call to the protected resource -- if that were the case, the PR
    would have to send some kind of encapsulated version of the original
    request. Otherwise, the AS won't have all of the information it
    needs to check the MAC.<br>
    <br>
    <br>
    I think what you're describing is ultimately *not* what the
    introspection endpoint is intended to do. If that's unclear from the
    document, can you please suggest text that would help clear the use
    case up? I wouldn't want it to be ambiguous.<span class="HOEnZb"><font color="#888888"><br>
    <br>
    &nbsp;-- Justin</font></span><div><div class="h5"><br>
    <br>
    <blockquote type="cite">
      <div><br>
      </div>
      <div>Thanks &amp; regards,</div>
      <div>-Prabath</div>
      <div><br>
      </div>
      <div><br>
        <div class="gmail_quote">On Thu, Feb 7, 2013 at 10:30 PM, Justin
          Richer <span dir="ltr">&lt;<a href="mailto:jricher@mitre.org" target="_blank">jricher@mitre.org</a>&gt;</span>
          wrote:<br>
          <blockquote class="gmail_quote" style="margin:0 0 0 .8ex;border-left:1px #ccc solid;padding-left:1ex">
            <div bgcolor="#FFFFFF" text="#000000"> It validates the
              token, which would be either the token itself in the case
              of Bearer or the token "id" part of something more complex
              like MAC. It doesn't directly validate the usage of the
              token, that's still up to the PR to do that.<br>
              <br>
              I nearly added a "token type" field in this draft, but
              held back because there are several kinds of "token type"
              that people talk about in OAuth. First, there's "Bearer"
              vs. "MAC" vs. "HOK", or what have you. Then within Bearer
              you have "JWT" or "SAML" or "unstructured blob". Then
              you've also got "access" vs. "refresh" and other flavors
              of token, like the id_token in OpenID Connect. <br>
              <br>
              Thing is, the server running the introspection endpoint
              will probably know *all* of these. But should it tell the
              client? If so, which of the three, and what names should
              the fields be?<span><font color="#888888"><br>
                  <br>
                  &nbsp;-- Justin</font></span>
              <div>
                <div><br>
                  <br>
                  <div>On 02/07/2013 11:26 AM, Prabath Siriwardena
                    wrote:<br>
                  </div>
                  <blockquote type="cite"> Okay.. I was thinking this
                    could be used as a way to validate the token as
                    well. BTW even in this case shouldn't communicate
                    the type of token to AS? For example in the case of
                    SAML profile - it could be SAML token..
                    <div> <br>
                    </div>
                    <div>Thanks &amp; regards,</div>
                    <div>-Prabath<br>
                      <br>
                      <div class="gmail_quote">On Thu, Feb 7, 2013 at
                        8:39 PM, Justin Richer <span dir="ltr">&lt;<a href="mailto:jricher@mitre.org" target="_blank">jricher@mitre.org</a>&gt;</span>
                        wrote:<br>
                        <blockquote class="gmail_quote" style="margin:0 0 0 .8ex;border-left:1px #ccc solid;padding-left:1ex">
                          <div bgcolor="#FFFFFF" text="#000000"> "valid"
                            might not be the best term, but it's meant
                            to be a field where the server says "yes
                            this token is still good" or "no this token
                            isn't good anymore". We could instead do
                            this with HTTP codes or something but I went
                            with a pure JSON response.<span><font color="#888888"><br>
                                <br>
                                &nbsp;-- Justin</font></span>
                            <div>
                              <div><br>
                                <br>
                                <div>On 02/06/2013 10:47 PM, Prabath
                                  Siriwardena wrote:<br>
                                </div>
                                <blockquote type="cite"> Hi Justin,
                                  <div><br>
                                  </div>
                                  <div>I believe this is addressing one
                                    of the key missing part in OAuth
                                    2.0...</div>
                                  <div><br>
                                  </div>
                                  <div>One question - I guess this was
                                    discussed already...</div>
                                  <div><br>
                                  </div>
                                  <div>In the spec - in the
                                    introspection response it has the
                                    attribute "valid" - this is
                                    basically the validity of the token
                                    provided in the request.</div>
                                  <div><br>
                                  </div>
                                  <div>Validation&nbsp;criteria depends on
                                    the token and well as token type (
                                    Bearer, MAC..).</div>
                                  <div><br>
                                  </div>
                                  <div>In the spec it seems like it's
                                    coupled with Bearer token type...
                                    But I guess, by adding "token_type"
                                    to the request we can remove this
                                    dependency.</div>
                                  <div><br>
                                  </div>
                                  <div>WDYT..?</div>
                                  <div><br>
                                  </div>
                                  <div>Thanks &amp; regards,</div>
                                  <div>-Prabath&nbsp;</div>
                                  <div><br>
                                    <div class="gmail_quote">On Thu, Feb
                                      7, 2013 at 12:54 AM, Justin Richer
                                      <span dir="ltr">&lt;<a href="mailto:jricher@mitre.org" target="_blank">jricher@mitre.org</a>&gt;</span>
                                      wrote:<br>
                                      <blockquote class="gmail_quote" style="margin:0 0 0 .8ex;border-left:1px #ccc solid;padding-left:1ex">
                                        <div bgcolor="#FFFFFF" text="#000000"> Updated
                                          introspection draft based on
                                          recent comments. Changes
                                          include:<br>
                                          <br>
                                          &nbsp;- "scope" return parameter
                                          now follows RFC6749 format
                                          instead of JSON array<br>
                                          &nbsp;- "subject" -&gt; "sub", and
                                          "audience" -&gt; "aud", to be
                                          parallel with JWT claims<br>
                                          &nbsp;- clarified what happens if
                                          the authentication is bad<br>
                                          <br>
                                          &nbsp;-- Justin<br>
                                          <div><br>
                                            <br>
                                            -------- Original Message
                                            --------
                                            <table border="0" cellpadding="0" cellspacing="0">
                                              <tbody>
                                                <tr>
                                                  <th align="RIGHT" nowrap="" valign="BASELINE">Subject:
                                                  </th>
                                                  <td>New Version
                                                    Notification for
                                                    draft-richer-oauth-introspection-02.txt</td>
                                                </tr>
                                                <tr>
                                                  <th align="RIGHT" nowrap="" valign="BASELINE">Date:
                                                  </th>
                                                  <td>Wed, 6 Feb 2013
                                                    11:24:20 -0800</td>
                                                </tr>
                                                <tr>
                                                  <th align="RIGHT" nowrap="" valign="BASELINE">From:
                                                  </th>
                                                  <td><a href="mailto:internet-drafts@ietf.org" target="_blank">&lt;internet-drafts@ietf.org&gt;</a></td>
                                                </tr>
                                                <tr>
                                                  <th align="RIGHT" nowrap="" valign="BASELINE">To:
                                                  </th>
                                                  <td><a href="mailto:jricher@mitre.org" target="_blank">&lt;jricher@mitre.org&gt;</a></td>
                                                </tr>
                                              </tbody>
                                            </table>
                                            <br>
                                            <br>
                                            <pre>A new version of I-D, draft-richer-oauth-introspection-02.txt
has been successfully submitted by Justin Richer and posted to the
IETF repository.

Filename:	 draft-richer-oauth-introspection
Revision:	 02
Title:		 OAuth Token Introspection
Creation date:	 2013-02-06
WG ID:		 Individual Submission
Number of pages: 6
URL:             <a href="http://www.ietf.org/internet-drafts/draft-richer-oauth-introspection-02.txt" target="_blank">http://www.ietf.org/internet-drafts/draft-richer-oauth-introspection-02.txt</a>
Status:          <a href="http://datatracker.ietf.org/doc/draft-richer-oauth-introspection" target="_blank">http://datatracker.ietf.org/doc/draft-richer-oauth-introspection</a>
Htmlized:        <a href="http://tools.ietf.org/html/draft-richer-oauth-introspection-02" target="_blank">http://tools.ietf.org/html/draft-richer-oauth-introspection-02</a>
Diff:            <a href="http://www.ietf.org/rfcdiff?url2=draft-richer-oauth-introspection-02" target="_blank">http://www.ietf.org/rfcdiff?url2=draft-richer-oauth-introspection-02</a>

Abstract:
   This specification defines a method for a client or protected
   resource to query an OAuth authorization server to determine meta-
   information about an OAuth token.


                                                                                  


The IETF Secretariat

</pre>
                                            <br>
                                          </div>
                                          <br>
                                        </div>
                                        <br>
_______________________________________________<br>
                                        OAuth mailing list<br>
                                        <a href="mailto:OAuth@ietf.org" target="_blank">OAuth@ietf.org</a><br>
                                        <a href="https://www.ietf.org/mailman/listinfo/oauth" target="_blank">https://www.ietf.org/mailman/listinfo/oauth</a><br>
                                        <br>
                                      </blockquote>
                                    </div>
                                    <br>
                                    <br clear="all">
                                    <div><br>
                                    </div>
                                    -- <br>
                                    Thanks &amp; Regards,<br>
                                    Prabath
                                    <div><br>
                                    </div>
                                    <div>Mobile : <a href="tel:%2B94%2071%20809%206732" value="+94718096732" target="_blank">+94 71 809 6732</a>&nbsp;<br>
                                      <br>
                                      <a href="http://blog.facilelogin.com" target="_blank">http://blog.facilelogin.com</a><br>
                                      <a href="http://RampartFAQ.com" target="_blank">http://RampartFAQ.com</a></div>
                                  </div>
                                </blockquote>
                                <br>
                              </div>
                            </div>
                          </div>
                        </blockquote>
                      </div>
                      <br>
                      <br clear="all">
                      <div><br>
                      </div>
                      -- <br>
                      Thanks &amp; Regards,<br>
                      Prabath
                      <div><br>
                      </div>
                      <div>Mobile : <a href="tel:%2B94%2071%20809%206732" value="+94718096732" target="_blank">+94 71
                          809 6732</a>&nbsp;<br>
                        <br>
                        <a href="http://blog.facilelogin.com" target="_blank">http://blog.facilelogin.com</a><br>
                        <a href="http://RampartFAQ.com" target="_blank">http://RampartFAQ.com</a></div>
                    </div>
                  </blockquote>
                  <br>
                </div>
              </div>
            </div>
          </blockquote>
        </div>
        <br>
        <br clear="all">
        <div><br>
        </div>
        -- <br>
        Thanks &amp; Regards,<br>
        Prabath
        <div><br>
        </div>
        <div>Mobile : <a href="tel:%2B94%2071%20809%206732" value="+94718096732" target="_blank">+94 71 809 6732</a>&nbsp;<br>
          <br>
          <a href="http://blog.facilelogin.com" target="_blank">http://blog.facilelogin.com</a><br>
          <a href="http://RampartFAQ.com" target="_blank">http://RampartFAQ.com</a></div>
      </div>
    </blockquote>
    <br>
  </div></div></div>

</blockquote></div><br><br clear="all"><div><br></div>-- <br>Thanks &amp; Regards,<br>Prabath<div><br></div><div>Mobile : +94 71 809 6732&nbsp;<br><br><a href="http://blog.facilelogin.com" target="_blank">http://blog.facilelogin.com</a><br>
<a href="http://RampartFAQ.com" target="_blank">http://RampartFAQ.com</a></div>
</div>
</div></blockquote><blockquote type="cite"><div><span>_______________________________________________</span><br><span>OAuth mailing list</span><br><span><a href="mailto:OAuth@ietf.org">OAuth@ietf.org</a></span><br><span><a href="https://www.ietf.org/mailman/listinfo/oauth">https://www.ietf.org/mailman/listinfo/oauth</a></span><br></div></blockquote></body></html>
--Apple-Mail-08DD9270-46F8-460D-9FAF-F98161A4D6F8--

From Michael.Jones@microsoft.com  Mon Feb 11 17:13:00 2013
Return-Path: <Michael.Jones@microsoft.com>
X-Original-To: oauth@ietfa.amsl.com
Delivered-To: oauth@ietfa.amsl.com
Received: from localhost (localhost [127.0.0.1]) by ietfa.amsl.com (Postfix) with ESMTP id 8C3ED21F86CE for <oauth@ietfa.amsl.com>; Mon, 11 Feb 2013 17:13:00 -0800 (PST)
X-Virus-Scanned: amavisd-new at amsl.com
X-Spam-Flag: NO
X-Spam-Score: -2.59
X-Spam-Level: 
X-Spam-Status: No, score=-2.59 tagged_above=-999 required=5 tests=[AWL=0.009,  BAYES_00=-2.599]
Received: from mail.ietf.org ([64.170.98.30]) by localhost (ietfa.amsl.com [127.0.0.1]) (amavisd-new, port 10024) with ESMTP id DpvIotiM3zTe for <oauth@ietfa.amsl.com>; Mon, 11 Feb 2013 17:12:59 -0800 (PST)
Received: from na01-bl2-obe.outbound.protection.outlook.com (na01-bl2-obe.ptr.protection.outlook.com [65.55.169.26]) by ietfa.amsl.com (Postfix) with ESMTP id 7F72E21F85AE for <oauth@ietf.org>; Mon, 11 Feb 2013 17:12:59 -0800 (PST)
Received: from BY2FFO11FD011.protection.gbl (10.1.15.202) by BY2FFO11HUB029.protection.gbl (10.1.14.114) with Microsoft SMTP Server (TLS) id 15.0.620.12; Tue, 12 Feb 2013 01:12:57 +0000
Received: from TK5EX14MLTC104.redmond.corp.microsoft.com (131.107.125.37) by BY2FFO11FD011.mail.protection.outlook.com (10.1.14.129) with Microsoft SMTP Server (TLS) id 15.0.620.12 via Frontend Transport; Tue, 12 Feb 2013 01:12:57 +0000
Received: from TK5EX14MBXC285.redmond.corp.microsoft.com ([169.254.3.232]) by TK5EX14MLTC104.redmond.corp.microsoft.com ([157.54.79.159]) with mapi id 14.02.0318.003; Tue, 12 Feb 2013 01:12:53 +0000
From: Mike Jones <Michael.Jones@microsoft.com>
To: Justin Richer <jricher@mitre.org>, "oauth@ietf.org" <oauth@ietf.org>
Thread-Topic: [OAUTH-WG] Registration: HAL _links structure and client self-URL
Thread-Index: AQHOCJz95koRvM6/ckWHt+2WoBlYzJh1aMDA
Date: Tue, 12 Feb 2013 01:12:52 +0000
Message-ID: <4E1F6AAD24975D4BA5B16804296739436743E33D@TK5EX14MBXC285.redmond.corp.microsoft.com>
References: <51195F3D.1050006@mitre.org>
In-Reply-To: <51195F3D.1050006@mitre.org>
Accept-Language: en-US
Content-Language: en-US
X-MS-Has-Attach: 
X-MS-TNEF-Correlator: 
x-originating-ip: [157.54.51.76]
Content-Type: text/plain; charset="us-ascii"
Content-Transfer-Encoding: quoted-printable
MIME-Version: 1.0
X-Forefront-Antispam-Report: CIP:131.107.125.37; CTRY:US; IPV:CAL; IPV:NLI; EFV:NLI; SFV:NSPM; SFS:(377454001)(55885001)(199002)(189002)(13464002)(53806001)(31966008)(51856001)(79102001)(54316002)(54356001)(80022001)(77982001)(49866001)(4396001)(47736001)(50466001)(50986001)(66066001)(16406001)(59766001)(5343635001)(56776001)(63696002)(76482001)(23726001)(5343655001)(65816001)(20776003)(47776003)(46406002)(46102001)(33656001)(55846006)(47446002)(56816002)(47976001)(74662001)(74502001)(15202345001)(44976002); DIR:OUT; SFP:; SCL:1; SRVR:BY2FFO11HUB029; H:TK5EX14MLTC104.redmond.corp.microsoft.com; RD:InfoDomainNonexistent; A:1; MX:1; LANG:en; 
X-OriginatorOrg: microsoft.onmicrosoft.com
X-Forefront-PRVS: 0755F54DD9
Subject: Re: [OAUTH-WG] Registration: HAL _links structure and client self-URL
X-BeenThere: oauth@ietf.org
X-Mailman-Version: 2.1.12
Precedence: list
List-Id: OAUTH WG <oauth.ietf.org>
List-Unsubscribe: <https://www.ietf.org/mailman/options/oauth>, <mailto:oauth-request@ietf.org?subject=unsubscribe>
List-Archive: <http://www.ietf.org/mail-archive/web/oauth>
List-Post: <mailto:oauth@ietf.org>
List-Help: <mailto:oauth-request@ietf.org?subject=help>
List-Subscribe: <https://www.ietf.org/mailman/listinfo/oauth>, <mailto:oauth-request@ietf.org?subject=subscribe>
X-List-Received-Date: Tue, 12 Feb 2013 01:13:00 -0000

It seems like significant overkill, bordering on silliness, to use the synt=
ax
  _links: {
    "self": {
      "href":
          "https://server.example.com/register/s6BhdRkqt3"
      }
  }
to represent a value that could be more straightforwardly represented as:
  "registration_access_url": "https://server.example.com/register/s6BhdRkqt=
3"

Even some of the advocates for it have called it "pedantic".  I believe tha=
t most developers would have less charitable things to say about it, and wo=
uld wonder why we're trying to foist needless complexity on them.

I'll also point out that this syntax is based upon an expired individual su=
bmission draft http://tools.ietf.org/html/draft-kelly-json-hal-03 that is n=
ot in any working group.  I don't believe we should take a dependence on th=
is draft or this syntax.

Occam's razor says that this isn't needed.

				-- Mike

-----Original Message-----
From: oauth-bounces@ietf.org [mailto:oauth-bounces@ietf.org] On Behalf Of J=
ustin Richer
Sent: Monday, February 11, 2013 1:15 PM
To: oauth@ietf.org
Subject: [OAUTH-WG] Registration: HAL _links structure and client self-URL

Draft -05 of OAuth Dynamic Client Registration [1] returns a URL pointer fo=
r the client to perform update and secret rotation actions. This functional=
ity arose from discussions on the list about moving towards a more RESTful =
pattern, and Nat Sakimura proposed this approach in the OpenID Connect Work=
ing Group. This URL may be distinct from the Client Registration Endpoint U=
RL, but draft -05 makes no promises as to its content, form, or structure, =
though it does contain implementor's notes on possible methods.

Two questions arise from this change:
  - The semantics of returning the client manipulation URL
  - The syntax (derived from HAL for JSON [2], an individual I-D
submission)

On semantics:

Pro:
  - The server has flexibility on how to define the "update" endpoint, send=
ing all clients to one URL, sending different clients to different URLs, or=
 sending clients to a URL with a baked-in query parameter
  - The client can take the URL as-is and use it for all management operati=
ons (ie, it doesn't have to generate or compose the URL based on component =
parts)

Con:
  - The client must remember one more piece of information from the server =
at runtime if it wants to do manipulation and management of itself at the s=
erver (in addition to client_id, client_secret, registration_access_token, =
and others)

Alternatives include specifying a URL pattern for the server to use and all=
 clients to follow, specifying a query parameter for the update action, and=
 specifying a separate endpoint entirely and using the presence of items su=
ch as client_id and the registration access token to differentiate the requ=
ests. Note that *all* of these alternatives can be accommodated using the s=
emantics described above, with the same actions on the client's part.


On syntax:

Pro:
  - Follows the designs of RFC5988 for link relations
  - The HAL format is general, and allows for all kinds of other informatio=
n to be placed inside the _links structure
  - Allows for full use of the JSON object to specify advanced operations o=
n the returned endpoint if desired

Con:
  - The rest of OAuth doesn't follow link relation guidelines (though it's =
been brought up)
  - The HAL format is general, and allows for all kinds of other informatio=
n to be placed inside the _links structure
  - The HAL-JSON document is an expired individual I-D, and it's unclear wh=
at wider adoption looks like right now

Alternatives include returning the URL as a separate data member (registrat=
ion_update_url), using HTTP headers, or using JSON Schema.

  -- Justin



[1] http://tools.ietf.org/html/draft-ietf-oauth-dyn-reg-05
[2] http://tools.ietf.org/html/draft-kelly-json-hal-03
_______________________________________________
OAuth mailing list
OAuth@ietf.org
https://www.ietf.org/mailman/listinfo/oauth

From Michael.Jones@microsoft.com  Mon Feb 11 17:19:49 2013
Return-Path: <Michael.Jones@microsoft.com>
X-Original-To: oauth@ietfa.amsl.com
Delivered-To: oauth@ietfa.amsl.com
Received: from localhost (localhost [127.0.0.1]) by ietfa.amsl.com (Postfix) with ESMTP id 1026E21F8767 for <oauth@ietfa.amsl.com>; Mon, 11 Feb 2013 17:19:49 -0800 (PST)
X-Virus-Scanned: amavisd-new at amsl.com
X-Spam-Flag: NO
X-Spam-Score: -2.59
X-Spam-Level: 
X-Spam-Status: No, score=-2.59 tagged_above=-999 required=5 tests=[AWL=0.009,  BAYES_00=-2.599]
Received: from mail.ietf.org ([64.170.98.30]) by localhost (ietfa.amsl.com [127.0.0.1]) (amavisd-new, port 10024) with ESMTP id Gj3HIotFXtpt for <oauth@ietfa.amsl.com>; Mon, 11 Feb 2013 17:19:48 -0800 (PST)
Received: from na01-bl2-obe.outbound.protection.outlook.com (na01-bl2-obe.ptr.protection.outlook.com [65.55.169.25]) by ietfa.amsl.com (Postfix) with ESMTP id 1FBCC21F875C for <oauth@ietf.org>; Mon, 11 Feb 2013 17:19:47 -0800 (PST)
Received: from BY2FFO11FD006.protection.gbl (10.1.15.202) by BY2FFO11HUB014.protection.gbl (10.1.14.86) with Microsoft SMTP Server (TLS) id 15.0.620.12; Tue, 12 Feb 2013 01:19:46 +0000
Received: from TK5EX14HUBC101.redmond.corp.microsoft.com (131.107.125.37) by BY2FFO11FD006.mail.protection.outlook.com (10.1.14.127) with Microsoft SMTP Server (TLS) id 15.0.620.12 via Frontend Transport; Tue, 12 Feb 2013 01:19:45 +0000
Received: from TK5EX14MBXC285.redmond.corp.microsoft.com ([169.254.3.232]) by TK5EX14HUBC101.redmond.corp.microsoft.com ([157.54.7.153]) with mapi id 14.02.0318.003; Tue, 12 Feb 2013 01:18:39 +0000
From: Mike Jones <Michael.Jones@microsoft.com>
To: Justin Richer <jricher@mitre.org>, "oauth@ietf.org" <oauth@ietf.org>
Thread-Topic: [OAUTH-WG] Registration: Client secret rotation
Thread-Index: AQHOCJ0LDzoQT/UaG0SbLONUo4RclZh1a0HA
Date: Tue, 12 Feb 2013 01:18:39 +0000
Message-ID: <4E1F6AAD24975D4BA5B16804296739436743E371@TK5EX14MBXC285.redmond.corp.microsoft.com>
References: <51195F3F.7000704@mitre.org>
In-Reply-To: <51195F3F.7000704@mitre.org>
Accept-Language: en-US
Content-Language: en-US
X-MS-Has-Attach: 
X-MS-TNEF-Correlator: 
x-originating-ip: [157.54.51.76]
Content-Type: text/plain; charset="us-ascii"
Content-Transfer-Encoding: quoted-printable
MIME-Version: 1.0
X-Forefront-Antispam-Report: CIP:131.107.125.37; CTRY:US; IPV:CAL; IPV:NLI; EFV:NLI; SFV:NSPM; SFS:(377454001)(55885001)(199002)(189002)(13464002)(63696002)(47446002)(47776003)(20776003)(53806001)(54316002)(76482001)(46102001)(46406002)(79102001)(65816001)(33656001)(44976002)(16406001)(80022001)(54356001)(56816002)(55846006)(5343655001)(51856001)(31966008)(66066001)(74662001)(4396001)(49866001)(23726001)(15202345001)(47736001)(50986001)(50466001)(47976001)(56776001)(74502001)(59766001)(77982001)(219293001); DIR:OUT; SFP:; SCL:1; SRVR:BY2FFO11HUB014; H:TK5EX14HUBC101.redmond.corp.microsoft.com; RD:InfoDomainNonexistent; A:1; MX:1; LANG:en; 
X-OriginatorOrg: microsoft.onmicrosoft.com
X-Forefront-PRVS: 0755F54DD9
Subject: Re: [OAUTH-WG] Registration: Client secret rotation
X-BeenThere: oauth@ietf.org
X-Mailman-Version: 2.1.12
Precedence: list
List-Id: OAUTH WG <oauth.ietf.org>
List-Unsubscribe: <https://www.ietf.org/mailman/options/oauth>, <mailto:oauth-request@ietf.org?subject=unsubscribe>
List-Archive: <http://www.ietf.org/mail-archive/web/oauth>
List-Post: <mailto:oauth@ietf.org>
List-Help: <mailto:oauth-request@ietf.org?subject=help>
List-Subscribe: <https://www.ietf.org/mailman/listinfo/oauth>, <mailto:oauth-request@ietf.org?subject=subscribe>
X-List-Received-Date: Tue, 12 Feb 2013 01:19:49 -0000

The rotate_secret operation was added to OpenID Connect Registration as a w=
orkaround to the fact that registration updates used to be authenticated us=
ing the client secret, so it seemed overly dangerous to have an update oper=
ation potentially return an updated secret and have the secret be lost due =
to communication problems - leaving the client stranded.  Since then, regis=
tration was changed to use a bearer token to authenticate update operations=
, and so this failure mode can't occur anymore.  It was an omission not to =
have deleted the unneeded operation then.

It's been deleted from OpenID Connect Registration and should likewise be d=
eleted from OAuth registration, since it is unneeded.  If a new client secr=
et is needed, there's nothing stopping the registration server from returni=
ng it in the result of an update operation.

				-- Mike

-----Original Message-----
From: oauth-bounces@ietf.org [mailto:oauth-bounces@ietf.org] On Behalf Of J=
ustin Richer
Sent: Monday, February 11, 2013 1:15 PM
To: oauth@ietf.org
Subject: [OAUTH-WG] Registration: Client secret rotation

Draft -05 of OAuth Dynamic Client Registration [1] defines a means of the c=
lient requesting a new client_secret (if applicable) and a new registration=
_access_token. Client secrets MAY expire after some period of time, and thi=
s method allows for a refresh of that secret. Draft -00 defined no such ope=
ration, drafts -01 through -04 defined this operation in terms of the opera=
tion=3Drotate_secret parameter, and draft -05 defines it through a secondar=
y endpoint, the Client Secret Rotation Endpoint.=20
This raises several questions:

  - Should the client be allowed to request rotation of its secret?
  - Would a client ever take this action of its own accord?
  - Can a server rotate the secret of the client without the client asking?=
 (This seems to be an obvious "yes")

Alternatives that keep this functionality include defining the rotate_secre=
t operation in terms of an HTTP verb, a query parameter, or separate endpoi=
nt. Alternatively, we could drop the rotate_secret operation all together. =
If we do this, we have to decide if the client secret can still expire. If =
it can, then we need a way for the client to get this new secret through a =
means that doesn't require it to request a change in secret, such as sendin=
g it back as part of the client READ operation (see other thread on RESTful=
 verbs).

  -- Justin


[1] http://tools.ietf.org/html/draft-ietf-oauth-dyn-reg-05
_______________________________________________
OAuth mailing list
OAuth@ietf.org
https://www.ietf.org/mailman/listinfo/oauth

From Michael.Jones@microsoft.com  Mon Feb 11 17:26:43 2013
Return-Path: <Michael.Jones@microsoft.com>
X-Original-To: oauth@ietfa.amsl.com
Delivered-To: oauth@ietfa.amsl.com
Received: from localhost (localhost [127.0.0.1]) by ietfa.amsl.com (Postfix) with ESMTP id 4FD0321F8767 for <oauth@ietfa.amsl.com>; Mon, 11 Feb 2013 17:26:43 -0800 (PST)
X-Virus-Scanned: amavisd-new at amsl.com
X-Spam-Flag: NO
X-Spam-Score: -2.59
X-Spam-Level: 
X-Spam-Status: No, score=-2.59 tagged_above=-999 required=5 tests=[AWL=0.009,  BAYES_00=-2.599]
Received: from mail.ietf.org ([64.170.98.30]) by localhost (ietfa.amsl.com [127.0.0.1]) (amavisd-new, port 10024) with ESMTP id qU0qv8awwhGV for <oauth@ietfa.amsl.com>; Mon, 11 Feb 2013 17:26:42 -0800 (PST)
Received: from na01-by2-obe.outbound.protection.outlook.com (na01-by2-obe.ptr.protection.outlook.com [207.46.100.27]) by ietfa.amsl.com (Postfix) with ESMTP id 671A521F8756 for <oauth@ietf.org>; Mon, 11 Feb 2013 17:26:42 -0800 (PST)
Received: from BL2FFO11FD020.protection.gbl (10.173.161.201) by BL2FFO11HUB029.protection.gbl (10.173.161.53) with Microsoft SMTP Server (TLS) id 15.0.620.12; Tue, 12 Feb 2013 01:26:40 +0000
Received: from TK5EX14HUBC107.redmond.corp.microsoft.com (131.107.125.37) by BL2FFO11FD020.mail.protection.outlook.com (10.173.161.38) with Microsoft SMTP Server (TLS) id 15.0.620.12 via Frontend Transport; Tue, 12 Feb 2013 01:26:39 +0000
Received: from TK5EX14MBXC285.redmond.corp.microsoft.com ([169.254.3.232]) by TK5EX14HUBC107.redmond.corp.microsoft.com ([157.54.80.67]) with mapi id 14.02.0318.003; Tue, 12 Feb 2013 01:26:17 +0000
From: Mike Jones <Michael.Jones@microsoft.com>
To: Justin Richer <jricher@mitre.org>, "oauth@ietf.org" <oauth@ietf.org>
Thread-Topic: [OAUTH-WG] Registration: Endpoint Definition (& operation parameter)
Thread-Index: AQHOCJz1W98y3MnRnUubf+tH6SXawJh1bN2Q
Date: Tue, 12 Feb 2013 01:26:16 +0000
Message-ID: <4E1F6AAD24975D4BA5B16804296739436743E3DD@TK5EX14MBXC285.redmond.corp.microsoft.com>
References: <51195F39.3040809@mitre.org>
In-Reply-To: <51195F39.3040809@mitre.org>
Accept-Language: en-US
Content-Language: en-US
X-MS-Has-Attach: 
X-MS-TNEF-Correlator: 
x-originating-ip: [157.54.51.76]
Content-Type: text/plain; charset="us-ascii"
Content-Transfer-Encoding: quoted-printable
MIME-Version: 1.0
X-Forefront-Antispam-Report: CIP:131.107.125.37; CTRY:US; IPV:CAL; IPV:NLI; EFV:NLI; SFV:NSPM; SFS:(13464002)(199002)(189002)(55885001)(377454001)(51856001)(59766001)(46102001)(77982001)(63696002)(80022001)(74502001)(15202345001)(5343655001)(50466001)(53806001)(56776001)(50986001)(47776003)(55846006)(79102001)(74662001)(31966008)(47976001)(4396001)(54316002)(49866001)(47736001)(46406002)(33656001)(20776003)(76482001)(44976002)(23726001)(66066001)(47446002)(54356001)(65816001)(16406001)(56816002); DIR:OUT; SFP:; SCL:1; SRVR:BL2FFO11HUB029; H:TK5EX14HUBC107.redmond.corp.microsoft.com; RD:InfoDomainNonexistent; A:1; MX:1; LANG:en; 
X-OriginatorOrg: microsoft.onmicrosoft.com
X-Forefront-PRVS: 0755F54DD9
Subject: Re: [OAUTH-WG] Registration: Endpoint Definition (& operation parameter)
X-BeenThere: oauth@ietf.org
X-Mailman-Version: 2.1.12
Precedence: list
List-Id: OAUTH WG <oauth.ietf.org>
List-Unsubscribe: <https://www.ietf.org/mailman/options/oauth>, <mailto:oauth-request@ietf.org?subject=unsubscribe>
List-Archive: <http://www.ietf.org/mail-archive/web/oauth>
List-Post: <mailto:oauth@ietf.org>
List-Help: <mailto:oauth-request@ietf.org?subject=help>
List-Subscribe: <https://www.ietf.org/mailman/listinfo/oauth>, <mailto:oauth-request@ietf.org?subject=subscribe>
X-List-Received-Date: Tue, 12 Feb 2013 01:26:43 -0000

At most, there should be two endpoints - creation and management - for a cl=
ient, but the protocol should be structured such that they *can* be at the =
same URL, if the server so chooses.  A simple way to accomplish this is to =
require that the client_id value be provided as an input parameter on updat=
e operations.  Then for implementations that use a single endpoint, they ca=
n distinguish "create" and "update" operations on the management endpoint b=
y the presence or absence of the client_id value.

If you want to have separate endpoints and don't need the client_id because=
 you have somehow encoded it into the management endpoint URL, that's fine.=
  It still can serve as a useful cross-check that the client (or an attacke=
r) is requesting a change to a client that matches the bearer token used.  =
But including it is necessary for implementations that want to use a single=
 registration endpoint, rather than having a proliferation of per-client en=
dpoints.

BTW, just for the record, OAuth 2.0 uses the same endpoint for initial acce=
ss token requests and requests for refreshed access tokens - with the opera=
tions being distinguished by whether a refresh_token parameter is present. =
 So there's a useful OAuth precedent for doing things this way.

				-- Mike

-----Original Message-----
From: oauth-bounces@ietf.org [mailto:oauth-bounces@ietf.org] On Behalf Of J=
ustin Richer
Sent: Monday, February 11, 2013 1:15 PM
To: oauth@ietf.org
Subject: [OAUTH-WG] Registration: Endpoint Definition (& operation paramete=
r)

Draft -05 of OAuth Dynamic Client Registration [1] defines three fundamenta=
l operations that a client can undertake: Client Registration, Client Updat=
e, and Secret Rotation. Each of these actions needs to be differentiated *s=
omehow* by the client and server as part of the protocol. Draft -00 defined=
 only the "register" operation, drafts -01 through -04 made use of an "oper=
ation" parameter on a single endpoint, which brought up a long discussion o=
n the list on whether or not that was an appropriate design. Draft -05 did =
away with the definition of the "operation" parameter on a single endpoint =
and instead opted for separating the base functionality into three differen=
t endpoints.

Pro:
  - Closer to RESTful semantics of having one URL for creation and another =
URL for management of an item (eg, most REST APIs use /object for creation =
and /object/object_id for manipulation)
  - The rest of OAuth (and its extensions) defines separate endpoints for d=
ifferent actions (Authorization, Token, Revocation, Introspection) as oppos=
ed to a single endpoint with a mode-switch parameter
  - Client doesn't have to generate a URL string for different endpoints by=
 combining parameters with a base URL

Con:
  - Not quite exactly RESTful as the spec doesn't dictate the client_id=20
be part of the update or rotate URL (though and implementor's note=20
suggests this)
  - Client has to track different URLs for different actions
  - Server must be able to differentiate actions based on these=20
different URLs.

Alternatives include using different HTTP verbs (see other thread) or=20
defining an operational switch parameter, like older drafts, on a single=20
endpoint URL. Another suggested alternative is to look for the presence=20
of certain parameters, such as client_id or the registration access=20
token, to indicate that a different operation is requested.

There's also question of whether the Secret Rotation action needs to=20
have its own endpoint, or if it can be collapsed into one of the others.=20
It has been suggested off-list that the secret rotation should never be=20
initiated by the Client but instead the client should simply request its=20
latest secret from the server through the update (or read) semantics.

  -- Justin

[1] http://tools.ietf.org/html/draft-ietf-oauth-dyn-reg-05
_______________________________________________
OAuth mailing list
OAuth@ietf.org
https://www.ietf.org/mailman/listinfo/oauth

From Michael.Jones@microsoft.com  Mon Feb 11 17:32:09 2013
Return-Path: <Michael.Jones@microsoft.com>
X-Original-To: oauth@ietfa.amsl.com
Delivered-To: oauth@ietfa.amsl.com
Received: from localhost (localhost [127.0.0.1]) by ietfa.amsl.com (Postfix) with ESMTP id 4B9DE21F87A3 for <oauth@ietfa.amsl.com>; Mon, 11 Feb 2013 17:32:09 -0800 (PST)
X-Virus-Scanned: amavisd-new at amsl.com
X-Spam-Flag: NO
X-Spam-Score: -2.59
X-Spam-Level: 
X-Spam-Status: No, score=-2.59 tagged_above=-999 required=5 tests=[AWL=0.009,  BAYES_00=-2.599]
Received: from mail.ietf.org ([64.170.98.30]) by localhost (ietfa.amsl.com [127.0.0.1]) (amavisd-new, port 10024) with ESMTP id L-2xkepYov4E for <oauth@ietfa.amsl.com>; Mon, 11 Feb 2013 17:32:08 -0800 (PST)
Received: from na01-bl2-obe.outbound.protection.outlook.com (na01-bl2-obe.ptr.protection.outlook.com [65.55.169.25]) by ietfa.amsl.com (Postfix) with ESMTP id 633F521F8767 for <oauth@ietf.org>; Mon, 11 Feb 2013 17:32:08 -0800 (PST)
Received: from BL2FFO11FD012.protection.gbl (10.173.161.204) by BL2FFO11HUB030.protection.gbl (10.173.161.54) with Microsoft SMTP Server (TLS) id 15.0.620.12; Tue, 12 Feb 2013 01:32:07 +0000
Received: from TK5EX14HUBC106.redmond.corp.microsoft.com (131.107.125.37) by BL2FFO11FD012.mail.protection.outlook.com (10.173.161.18) with Microsoft SMTP Server (TLS) id 15.0.620.12 via Frontend Transport; Tue, 12 Feb 2013 01:32:06 +0000
Received: from TK5EX14MBXC285.redmond.corp.microsoft.com ([169.254.3.232]) by TK5EX14HUBC106.redmond.corp.microsoft.com ([157.54.80.61]) with mapi id 14.02.0318.003; Tue, 12 Feb 2013 01:31:20 +0000
From: Mike Jones <Michael.Jones@microsoft.com>
To: Justin Richer <jricher@mitre.org>, "oauth@ietf.org" <oauth@ietf.org>
Thread-Topic: [OAUTH-WG] Registration: RESTful client lifecycle management
Thread-Index: AQHOCJzxVGwYODuh3UmktcEEXHrfK5h1buhg
Date: Tue, 12 Feb 2013 01:31:20 +0000
Message-ID: <4E1F6AAD24975D4BA5B16804296739436743E41B@TK5EX14MBXC285.redmond.corp.microsoft.com>
References: <51195F36.6040705@mitre.org>
In-Reply-To: <51195F36.6040705@mitre.org>
Accept-Language: en-US
Content-Language: en-US
X-MS-Has-Attach: 
X-MS-TNEF-Correlator: 
x-originating-ip: [157.54.51.76]
Content-Type: text/plain; charset="us-ascii"
Content-Transfer-Encoding: quoted-printable
MIME-Version: 1.0
X-Forefront-Antispam-Report: CIP:131.107.125.37; CTRY:US; IPV:CAL; IPV:NLI; EFV:NLI; SFV:NSPM; SFS:(189002)(199002)(377454001)(13464002)(55885001)(47776003)(23726001)(46406002)(44976002)(51856001)(77982001)(5343655001)(74502001)(74662001)(47446002)(80022001)(59766001)(33656001)(53806001)(15202345001)(20776003)(54356001)(63696002)(76482001)(50466001)(47976001)(50986001)(49866001)(54316002)(56776001)(4396001)(55846006)(31966008)(47736001)(56816002)(46102001)(16406001)(79102001)(66066001)(65816001); DIR:OUT; SFP:; SCL:1; SRVR:BL2FFO11HUB030; H:TK5EX14HUBC106.redmond.corp.microsoft.com; RD:InfoDomainNonexistent; MX:1; A:1; LANG:en; 
X-OriginatorOrg: microsoft.onmicrosoft.com
X-Forefront-PRVS: 0755F54DD9
Subject: Re: [OAUTH-WG] Registration: RESTful client lifecycle management
X-BeenThere: oauth@ietf.org
X-Mailman-Version: 2.1.12
Precedence: list
List-Id: OAUTH WG <oauth.ietf.org>
List-Unsubscribe: <https://www.ietf.org/mailman/options/oauth>, <mailto:oauth-request@ietf.org?subject=unsubscribe>
List-Archive: <http://www.ietf.org/mail-archive/web/oauth>
List-Post: <mailto:oauth@ietf.org>
List-Help: <mailto:oauth-request@ietf.org?subject=help>
List-Subscribe: <https://www.ietf.org/mailman/listinfo/oauth>, <mailto:oauth-request@ietf.org?subject=subscribe>
X-List-Received-Date: Tue, 12 Feb 2013 01:32:09 -0000

I'm fine with the use of the different verbs, provided that the client_id i=
s present to distinguish between "register" and "update" operations for imp=
lementations that want to use it in that matter, as I'd previously written.=
  (*Your* implementation is free to not use this value, if you so choose, b=
ut it's useful for many.)

If that's not acceptable, then we should restore the "operation" parameter.

I will add that "register" should be the only required operation.  It's fin=
e to support others if needed in a particular context, but enabling registr=
ation of clients shouldn't require servers to also support changing them, g=
etting state about them, and deleting them.

				-- Mike

-----Original Message-----
From: oauth-bounces@ietf.org [mailto:oauth-bounces@ietf.org] On Behalf Of J=
ustin Richer
Sent: Monday, February 11, 2013 1:15 PM
To: oauth@ietf.org
Subject: [OAUTH-WG] Registration: RESTful client lifecycle management

Draft -05 of OAuth Dynamic Client Registration [1] defines several operatio=
ns that the client can take on its behalf as part of the registration proce=
ss. These boil down to the basic CRUD operations that you find in many APIs=
: Create, Read, Update, Delete. Draft -00 defined only the "Create" operati=
on, draft -01 through -04 added the "Update"=20
operation, switched using the "operation=3D" parameter.

Following several suggestions to do so on the list, the -05 draft defines t=
hese operations in terms of a RESTful API for the client. Namely:

  - HTTP POST to registration endpoint =3D> Create (register) a new client
  - HTTP PUT to update endpoint (with registration_access_token) =3D> Updat=
e the registered information for this client
  - HTTP GET to update endpoint (with registration_access_token) =3D> read =
the registered information for this client
  - HTTP DELETE to update endpoint (with registration_access_token) =3D> De=
lete (unregister/de-provision) this client

The two main issues at stake here are: the addition of the READ and DELETE =
methods, and the use of HTTP verbs following a RESTful design philosophy.

Pro:
  - RESTful APIs (with HTTP verbs to differentiate functionality) are the n=
orm today
  - Full lifecycle management is common and is going to be expected by many=
 users of this protocol in the wild

Cons:
  - Update semantics are still under debate (full replace? patch?)
  - Somewhat increased complexity on the server to support all operations
  - Client has to understand all HTTP verbs for full access (though plain r=
egistration is just POST)


Alternatives include using an operational switch parameter (like the old=20
drafts), defining separate endpoints for every action, or doing all=20
operations on a single endpoint using verbs to switch.

  -- Justin

[1] http://tools.ietf.org/html/draft-ietf-oauth-dyn-reg-05
_______________________________________________
OAuth mailing list
OAuth@ietf.org
https://www.ietf.org/mailman/listinfo/oauth

From Michael.Jones@microsoft.com  Mon Feb 11 17:41:07 2013
Return-Path: <Michael.Jones@microsoft.com>
X-Original-To: oauth@ietfa.amsl.com
Delivered-To: oauth@ietfa.amsl.com
Received: from localhost (localhost [127.0.0.1]) by ietfa.amsl.com (Postfix) with ESMTP id 27F3121F86F2 for <oauth@ietfa.amsl.com>; Mon, 11 Feb 2013 17:41:06 -0800 (PST)
X-Virus-Scanned: amavisd-new at amsl.com
X-Spam-Flag: NO
X-Spam-Score: -2.591
X-Spam-Level: 
X-Spam-Status: No, score=-2.591 tagged_above=-999 required=5 tests=[AWL=0.008,  BAYES_00=-2.599]
Received: from mail.ietf.org ([64.170.98.30]) by localhost (ietfa.amsl.com [127.0.0.1]) (amavisd-new, port 10024) with ESMTP id xrA+rfe3eBO9 for <oauth@ietfa.amsl.com>; Mon, 11 Feb 2013 17:41:05 -0800 (PST)
Received: from na01-by2-obe.outbound.protection.outlook.com (na01-by2-obe.ptr.protection.outlook.com [207.46.100.25]) by ietfa.amsl.com (Postfix) with ESMTP id EEFE121F86FA for <oauth@ietf.org>; Mon, 11 Feb 2013 17:41:01 -0800 (PST)
Received: from BL2FFO11FD020.protection.gbl (10.173.161.202) by BL2FFO11HUB037.protection.gbl (10.173.160.241) with Microsoft SMTP Server (TLS) id 15.0.620.12; Tue, 12 Feb 2013 01:40:59 +0000
Received: from TK5EX14HUBC105.redmond.corp.microsoft.com (131.107.125.37) by BL2FFO11FD020.mail.protection.outlook.com (10.173.161.38) with Microsoft SMTP Server (TLS) id 15.0.620.12 via Frontend Transport; Tue, 12 Feb 2013 01:40:59 +0000
Received: from TK5EX14MBXC285.redmond.corp.microsoft.com ([169.254.3.232]) by TK5EX14HUBC105.redmond.corp.microsoft.com ([157.54.80.48]) with mapi id 14.02.0318.003; Tue, 12 Feb 2013 01:40:34 +0000
From: Mike Jones <Michael.Jones@microsoft.com>
To: Justin Richer <jricher@mitre.org>, "oauth@ietf.org" <oauth@ietf.org>
Thread-Topic: [OAUTH-WG] Recent changes to Registration
Thread-Index: AQHOCJxgG8ZC9nZAa0Shh+TKiEhAeJh1cG1A
Date: Tue, 12 Feb 2013 01:40:33 +0000
Message-ID: <4E1F6AAD24975D4BA5B16804296739436743E467@TK5EX14MBXC285.redmond.corp.microsoft.com>
References: <51195E50.1080103@mitre.org>
In-Reply-To: <51195E50.1080103@mitre.org>
Accept-Language: en-US
Content-Language: en-US
X-MS-Has-Attach: 
X-MS-TNEF-Correlator: 
x-originating-ip: [157.54.51.76]
Content-Type: text/plain; charset="us-ascii"
Content-Transfer-Encoding: quoted-printable
MIME-Version: 1.0
X-Forefront-Antispam-Report: CIP:131.107.125.37; CTRY:US; IPV:CAL; IPV:NLI; EFV:NLI; SFV:NSPM; SFS:(164054002)(52604002)(377454001)(189002)(199002)(13464002)(46406002)(77982001)(20776003)(51856001)(66066001)(56776001)(47776003)(54316002)(4396001)(63696002)(55846006)(65816001)(59766001)(76482001)(5343655001)(74502001)(80022001)(49866001)(50986001)(74662001)(47976001)(15202345001)(31966008)(53806001)(46102001)(56816002)(47446002)(33656001)(47736001)(50466001)(79102001)(54356001)(23726001)(16406001)(44976002); DIR:OUT; SFP:; SCL:1; SRVR:BL2FFO11HUB037; H:TK5EX14HUBC105.redmond.corp.microsoft.com; RD:InfoDomainNonexistent; MX:1; A:1; LANG:en; 
X-OriginatorOrg: microsoft.onmicrosoft.com
X-Forefront-PRVS: 0755F54DD9
Subject: Re: [OAUTH-WG] Recent changes to Registration
X-BeenThere: oauth@ietf.org
X-Mailman-Version: 2.1.12
Precedence: list
List-Id: OAUTH WG <oauth.ietf.org>
List-Unsubscribe: <https://www.ietf.org/mailman/options/oauth>, <mailto:oauth-request@ietf.org?subject=unsubscribe>
List-Archive: <http://www.ietf.org/mail-archive/web/oauth>
List-Post: <mailto:oauth@ietf.org>
List-Help: <mailto:oauth-request@ietf.org?subject=help>
List-Subscribe: <https://www.ietf.org/mailman/listinfo/oauth>, <mailto:oauth-request@ietf.org?subject=subscribe>
X-List-Received-Date: Tue, 12 Feb 2013 01:41:07 -0000

Thanks for having these conversations, Justin.  It will be interesting to s=
ee how they go.

As a co-editor, given that I was surprised that these numerous breaking cha=
nges were checked in without me or the other editors being given a chance t=
o review them first, or for adequate discussion of them to occur by the wor=
king group, I would request that the default action for any of the changes =
made for which there isn't obvious consensus to keep be to back those break=
ing changes out before the submission deadline in two weeks.  Then we can s=
tart clean and only add changes once it's clear that doing so improves cons=
ensus.  (Obviously if a change appears to have been clearly accepted by the=
 working group, there's no reason to remove it.)

				Thanks,
				-- Mike

-----Original Message-----
From: oauth-bounces@ietf.org [mailto:oauth-bounces@ietf.org] On Behalf Of J=
ustin Richer
Sent: Monday, February 11, 2013 1:11 PM
To: oauth@ietf.org
Subject: [OAUTH-WG] Recent changes to Registration

As many of you saw, last week I published a draft of the OAuth Dynamic Clie=
nt Registration spec [1] that made some fairly serious changes to how the p=
rotocol works. It was my intent to distill many threads of conversation her=
e on the list into a full, workable protocol with a concrete document that =
we could discuss. I believe that what I published did that, but I certainly=
 don't think that all of our work and discussion is done. It wasn't my inte=
nt to surprise people with the draft (apparently I really did!), nor was it=
 my intent to simply dictate where the spec was going without any input fro=
m the working group.

So to move the discussion forward in a very deliberate fashion, I'm going t=
o be starting a number of new threads for discussion on particular changes =
and components to this spec so that we can discuss things and decide as a w=
orking group what the best courses of action are. I'll lay out what the iss=
ues are, what -05 says today, what the options are as I see them, and we I =
think can go from there. The topics will be:

  - JSON Encoding
  - Endpoint Definition (& operation parameter)
  - HAL _links structure and client self-URL
  - RESTful client lifecycle management
  - Client secret rotation

If you want to talk about the overall design and philosophy of the Registra=
tion document, just reply to this email.

Of course, all of these interrelate in various ways, and everything must be=
 taken in the overall context, but I'm hoping that by splitting things up t=
his way we can focus the conversations better. I welcome all constructive d=
iscussion, debate, and input. As an editor, I am particularly grateful for =
anyone who wants to provide actual text for inclusion in the document itsel=
f, and any pointers to implemented code for any of this.

The deadline for IETF86 is two weeks from now, and I want to have a version=
 -06 or greater that incorporates all of the comments from these threads by=
 then.

  -- Justin


[1] http://tools.ietf.org/html/draft-ietf-oauth-dyn-reg-05
_______________________________________________
OAuth mailing list
OAuth@ietf.org
https://www.ietf.org/mailman/listinfo/oauth

From ve7jtb@ve7jtb.com  Mon Feb 11 17:42:35 2013
Return-Path: <ve7jtb@ve7jtb.com>
X-Original-To: oauth@ietfa.amsl.com
Delivered-To: oauth@ietfa.amsl.com
Received: from localhost (localhost [127.0.0.1]) by ietfa.amsl.com (Postfix) with ESMTP id 02CCC21F86F5 for <oauth@ietfa.amsl.com>; Mon, 11 Feb 2013 17:42:35 -0800 (PST)
X-Virus-Scanned: amavisd-new at amsl.com
X-Spam-Flag: NO
X-Spam-Score: -2.788
X-Spam-Level: 
X-Spam-Status: No, score=-2.788 tagged_above=-999 required=5 tests=[AWL=0.211,  BAYES_00=-2.599, J_CHICKENPOX_82=0.6, RCVD_IN_DNSWL_LOW=-1]
Received: from mail.ietf.org ([64.170.98.30]) by localhost (ietfa.amsl.com [127.0.0.1]) (amavisd-new, port 10024) with ESMTP id 3zfwbL2xasGC for <oauth@ietfa.amsl.com>; Mon, 11 Feb 2013 17:42:34 -0800 (PST)
Received: from mail-qa0-f54.google.com (mail-qa0-f54.google.com [209.85.216.54]) by ietfa.amsl.com (Postfix) with ESMTP id 21D9621F86F2 for <oauth@ietf.org>; Mon, 11 Feb 2013 17:42:34 -0800 (PST)
Received: by mail-qa0-f54.google.com with SMTP id hg5so1446407qab.13 for <oauth@ietf.org>; Mon, 11 Feb 2013 17:42:33 -0800 (PST)
X-Google-DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=google.com; s=20120113; h=x-received:content-type:mime-version:subject:from:in-reply-to:date :cc:content-transfer-encoding:message-id:references:to:x-mailer :x-gm-message-state; bh=j5cFxkHY6NPM/uG3JYLWRXN6mRzfkGjDTio+ThQj7p8=; b=gBdYbI71ra/gSMmQDY9T7pJpmhw6BqXPblJIf1CsHlG/bGzIoHZovWKjyscoqCH8NQ 9P8RP1xf4YxJQ1sUtmledPG5r+2houGKkgpUA/PPMv3qKrg6qEhxB7K5guHPgBjkyW/U lbJQYopCGQXPAZKQtDkLyhwSBD2uinyzuy+O443l1TGbX0eo3tUCIRcCW6Qdgl2QLTUt zQnGoMi0n5zltTDgwZg+3xV1eDvLTqLquudsSQvmZl5rkAAm+rptSvRvgFI7Af4udpfS 0NqxD5+9wKko6zpIPrBYwu8IemOlhx4neZCEI+2XE/OgSpAdb2AnvnUeSIXo3kK782HU qklA==
X-Received: by 10.229.179.18 with SMTP id bo18mr1485794qcb.24.1360633353595; Mon, 11 Feb 2013 17:42:33 -0800 (PST)
Received: from [192.168.1.213] (190-20-23-212.baf.movistar.cl. [190.20.23.212]) by mx.google.com with ESMTPS id o5sm16097763qao.12.2013.02.11.17.42.31 (version=TLSv1 cipher=ECDHE-RSA-RC4-SHA bits=128/128); Mon, 11 Feb 2013 17:42:32 -0800 (PST)
Content-Type: text/plain; charset=us-ascii
Mime-Version: 1.0 (Mac OS X Mail 6.2 \(1499\))
From: John Bradley <ve7jtb@ve7jtb.com>
In-Reply-To: <4E1F6AAD24975D4BA5B16804296739436743E371@TK5EX14MBXC285.redmond.corp.microsoft.com>
Date: Mon, 11 Feb 2013 22:42:30 -0300
Content-Transfer-Encoding: quoted-printable
Message-Id: <7FB7A108-EA9E-429A-BD86-7E09EA206748@ve7jtb.com>
References: <51195F3F.7000704@mitre.org> <4E1F6AAD24975D4BA5B16804296739436743E371@TK5EX14MBXC285.redmond.corp.microsoft.com>
To: Mike Jones <Michael.Jones@microsoft.com>
X-Mailer: Apple Mail (2.1499)
X-Gm-Message-State: ALoCoQnyDFNc+3AM04ZALzESxO3uUPL0FZ8FL50frURe8DUDOxWADZUTFAaxQD+jP1OH/zUPbGkb
Cc: "oauth@ietf.org" <oauth@ietf.org>
Subject: Re: [OAUTH-WG] Registration: Client secret rotation
X-BeenThere: oauth@ietf.org
X-Mailman-Version: 2.1.12
Precedence: list
List-Id: OAUTH WG <oauth.ietf.org>
List-Unsubscribe: <https://www.ietf.org/mailman/options/oauth>, <mailto:oauth-request@ietf.org?subject=unsubscribe>
List-Archive: <http://www.ietf.org/mail-archive/web/oauth>
List-Post: <mailto:oauth@ietf.org>
List-Help: <mailto:oauth-request@ietf.org?subject=help>
List-Subscribe: <https://www.ietf.org/mailman/listinfo/oauth>, <mailto:oauth-request@ietf.org?subject=subscribe>
X-List-Received-Date: Tue, 12 Feb 2013 01:42:35 -0000

OAuth doesn't say anything about client secrets other than they are =
provisioned in a magic realm outside the OAuth spec (Getting in the mood =
for the next IETF).

Rotating client secrets was something I made up for connect because it =
seemed like a good idea at the time given that someone breaking in to =
the registration endpoint could take over a connection.

We later separated the authentication to the token endpoint from the =
registration endpoint,in what I think was a good move.

It is sort of up to the authorization server to make decisions about =
rotating client secrets, I expect that in the real world a client would =
try access ing the token endpoint and get back a invalid_client error =
response and then heck it's registration to see if the client_secret has =
changed.

I suppose that a client could request rotating its secret if it thinks =
it has been compromised,  however the compromiser is more likely to =
quickly change the secret to lock out the legitimate clients before the =
good one notices.    I think the client wanting to rotate is enough of a =
edge case that it could deal with it out of band.

Letting the server rotate the client secret according to what ever =
policy it decides is best is probably safest.

We didn't have anything for rotating the access token.  I suspect that =
rotating it under the clients control is going to create as many =
problems as it solves.

If you want to rotate it,  make it a refresh token that is issues and =
use OAuth to provide access tokens from the token endpoint.   Creating a =
new endpoint to duplicate existing OAuth functionality is overkill.

John B.
On 2013-02-11, at 10:18 PM, Mike Jones <Michael.Jones@microsoft.com> =
wrote:

> The rotate_secret operation was added to OpenID Connect Registration =
as a workaround to the fact that registration updates used to be =
authenticated using the client secret, so it seemed overly dangerous to =
have an update operation potentially return an updated secret and have =
the secret be lost due to communication problems - leaving the client =
stranded.  Since then, registration was changed to use a bearer token to =
authenticate update operations, and so this failure mode can't occur =
anymore.  It was an omission not to have deleted the unneeded operation =
then.
>=20
> It's been deleted from OpenID Connect Registration and should likewise =
be deleted from OAuth registration, since it is unneeded.  If a new =
client secret is needed, there's nothing stopping the registration =
server from returning it in the result of an update operation.
>=20
> 				-- Mike
>=20
> -----Original Message-----
> From: oauth-bounces@ietf.org [mailto:oauth-bounces@ietf.org] On Behalf =
Of Justin Richer
> Sent: Monday, February 11, 2013 1:15 PM
> To: oauth@ietf.org
> Subject: [OAUTH-WG] Registration: Client secret rotation
>=20
> Draft -05 of OAuth Dynamic Client Registration [1] defines a means of =
the client requesting a new client_secret (if applicable) and a new =
registration_access_token. Client secrets MAY expire after some period =
of time, and this method allows for a refresh of that secret. Draft -00 =
defined no such operation, drafts -01 through -04 defined this operation =
in terms of the operation=3Drotate_secret parameter, and draft -05 =
defines it through a secondary endpoint, the Client Secret Rotation =
Endpoint.=20
> This raises several questions:
>=20
>  - Should the client be allowed to request rotation of its secret?
>  - Would a client ever take this action of its own accord?
>  - Can a server rotate the secret of the client without the client =
asking? (This seems to be an obvious "yes")
>=20
> Alternatives that keep this functionality include defining the =
rotate_secret operation in terms of an HTTP verb, a query parameter, or =
separate endpoint. Alternatively, we could drop the rotate_secret =
operation all together. If we do this, we have to decide if the client =
secret can still expire. If it can, then we need a way for the client to =
get this new secret through a means that doesn't require it to request a =
change in secret, such as sending it back as part of the client READ =
operation (see other thread on RESTful verbs).
>=20
>  -- Justin
>=20
>=20
> [1] http://tools.ietf.org/html/draft-ietf-oauth-dyn-reg-05
> _______________________________________________
> OAuth mailing list
> OAuth@ietf.org
> https://www.ietf.org/mailman/listinfo/oauth
> _______________________________________________
> OAuth mailing list
> OAuth@ietf.org
> https://www.ietf.org/mailman/listinfo/oauth


From ve7jtb@ve7jtb.com  Mon Feb 11 17:51:57 2013
Return-Path: <ve7jtb@ve7jtb.com>
X-Original-To: oauth@ietfa.amsl.com
Delivered-To: oauth@ietfa.amsl.com
Received: from localhost (localhost [127.0.0.1]) by ietfa.amsl.com (Postfix) with ESMTP id 03F5121F876E for <oauth@ietfa.amsl.com>; Mon, 11 Feb 2013 17:51:54 -0800 (PST)
X-Virus-Scanned: amavisd-new at amsl.com
X-Spam-Flag: NO
X-Spam-Score: -3.111
X-Spam-Level: 
X-Spam-Status: No, score=-3.111 tagged_above=-999 required=5 tests=[AWL=0.488,  BAYES_00=-2.599, RCVD_IN_DNSWL_LOW=-1]
Received: from mail.ietf.org ([64.170.98.30]) by localhost (ietfa.amsl.com [127.0.0.1]) (amavisd-new, port 10024) with ESMTP id 7mKhQT41GG69 for <oauth@ietfa.amsl.com>; Mon, 11 Feb 2013 17:51:53 -0800 (PST)
Received: from mail-qe0-f41.google.com (mail-qe0-f41.google.com [209.85.128.41]) by ietfa.amsl.com (Postfix) with ESMTP id 10D1721F8632 for <oauth@ietf.org>; Mon, 11 Feb 2013 17:51:52 -0800 (PST)
Received: by mail-qe0-f41.google.com with SMTP id 7so2896686qeb.28 for <oauth@ietf.org>; Mon, 11 Feb 2013 17:51:51 -0800 (PST)
X-Google-DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=google.com; s=20120113; h=x-received:content-type:mime-version:subject:from:in-reply-to:date :cc:content-transfer-encoding:message-id:references:to:x-mailer :x-gm-message-state; bh=8+25BVOMsBQX7EfSecgQpEuIz8yg7kkW9uxeXXgxpOs=; b=h2jB/sJtNpIjPMXu5oxAG36S+WULyWh2IqsS0Cc/mXcfcGptlKKhYjIA5tRm+DUaut sL844bpjVS0WnevIIXGP3QNb8ueRD39hhj+PIzH/hPE4J4a9gkgRkO7gsNdTqQJuj9UF dT5zt2y9SQ2Zlg36VhP+ejaYqPsfoPgzvZVMBzLb6WrakUBjIDUgmcRk05JDGCzHSEwI 1Ghjw/60++dE4nGKSfyCav9Wz8zoB5p4LfKKaPb5HRxVyYAwcDvVdrA22dQ1Tkngc07B XRZ0eV4mxMZwOl4Nd5hhOy0v7n3TfAYogo25kpYlT9KWNSmkMkfcpz07Udkijg5B6FyT 9+gA==
X-Received: by 10.224.96.4 with SMTP id f4mr6312646qan.79.1360633911438; Mon, 11 Feb 2013 17:51:51 -0800 (PST)
Received: from [192.168.1.213] (190-20-23-212.baf.movistar.cl. [190.20.23.212]) by mx.google.com with ESMTPS id u8sm15383037qeu.2.2013.02.11.17.51.48 (version=TLSv1 cipher=ECDHE-RSA-RC4-SHA bits=128/128); Mon, 11 Feb 2013 17:51:49 -0800 (PST)
Content-Type: text/plain; charset=us-ascii
Mime-Version: 1.0 (Mac OS X Mail 6.2 \(1499\))
From: John Bradley <ve7jtb@ve7jtb.com>
In-Reply-To: <51195F36.6040705@mitre.org>
Date: Mon, 11 Feb 2013 22:51:46 -0300
Content-Transfer-Encoding: quoted-printable
Message-Id: <780F8C26-19A4-4301-B350-307D9FFF69CD@ve7jtb.com>
References: <51195F36.6040705@mitre.org>
To: Justin Richer <jricher@mitre.org>
X-Mailer: Apple Mail (2.1499)
X-Gm-Message-State: ALoCoQlWoW+sXC1GMu517bzjBCugE3F4ByNtuKMHAh0itnM7IGpW2/Uk8v6MGuLzQE2/mQbIZW22
Cc: "oauth@ietf.org" <oauth@ietf.org>
Subject: Re: [OAUTH-WG] Registration: RESTful client lifecycle management
X-BeenThere: oauth@ietf.org
X-Mailman-Version: 2.1.12
Precedence: list
List-Id: OAUTH WG <oauth.ietf.org>
List-Unsubscribe: <https://www.ietf.org/mailman/options/oauth>, <mailto:oauth-request@ietf.org?subject=unsubscribe>
List-Archive: <http://www.ietf.org/mail-archive/web/oauth>
List-Post: <mailto:oauth@ietf.org>
List-Help: <mailto:oauth-request@ietf.org?subject=help>
List-Subscribe: <https://www.ietf.org/mailman/listinfo/oauth>, <mailto:oauth-request@ietf.org?subject=subscribe>
X-List-Received-Date: Tue, 12 Feb 2013 01:51:57 -0000

I would always include the client_id on update.

I think it is also us full to have other tokens used at the update =
endpoint.  I can see the master token used to update all the clients it =
has registered as part of API management.=20
Relying on the registration_access_token is probably a design that will =
cause trouble down the road.

I think GET and POST are relatively clear.   I don't know about =
expelling PUT to developers.  I think POST with a client_id to a =
(separate discussion) update_uri works without restricting it to PUT.

I think DELETE needs to be better understood.   I think a status that =
can be set for client lifecycle is better than letting a client delete a =
entry.   =20
In some cases there will be more than one instance of a client and =
letting them know they have been turned off for a reason is better than =
making there registration disappear. =20
So for the moment I would levee out DELETE.

John B.

On 2013-02-11, at 6:14 PM, Justin Richer <jricher@mitre.org> wrote:

> Draft -05 of OAuth Dynamic Client Registration [1] defines several =
operations that the client can take on its behalf as part of the =
registration process. These boil down to the basic CRUD operations that =
you find in many APIs: Create, Read, Update, Delete. Draft -00 defined =
only the "Create" operation, draft -01 through -04 added the "Update" =
operation, switched using the "operation=3D" parameter.
>=20
> Following several suggestions to do so on the list, the -05 draft =
defines these operations in terms of a RESTful API for the client. =
Namely:
>=20
> - HTTP POST to registration endpoint =3D> Create (register) a new =
client
> - HTTP PUT to update endpoint (with registration_access_token) =3D> =
Update the registered information for this client
> - HTTP GET to update endpoint (with registration_access_token) =3D> =
read the registered information for this client
> - HTTP DELETE to update endpoint (with registration_access_token) =3D> =
Delete (unregister/de-provision) this client
>=20
> The two main issues at stake here are: the addition of the READ and =
DELETE methods, and the use of HTTP verbs following a RESTful design =
philosophy.
>=20
> Pro:
> - RESTful APIs (with HTTP verbs to differentiate functionality) are =
the norm today
> - Full lifecycle management is common and is going to be expected by =
many users of this protocol in the wild
>=20
> Cons:
> - Update semantics are still under debate (full replace? patch?)
> - Somewhat increased complexity on the server to support all =
operations
> - Client has to understand all HTTP verbs for full access (though =
plain registration is just POST)
>=20
>=20
> Alternatives include using an operational switch parameter (like the =
old drafts), defining separate endpoints for every action, or doing all =
operations on a single endpoint using verbs to switch.
>=20
> -- Justin
>=20
> [1] http://tools.ietf.org/html/draft-ietf-oauth-dyn-reg-05
> _______________________________________________
> OAuth mailing list
> OAuth@ietf.org
> https://www.ietf.org/mailman/listinfo/oauth


From torsten@lodderstedt.net  Mon Feb 11 23:17:27 2013
Return-Path: <torsten@lodderstedt.net>
X-Original-To: oauth@ietfa.amsl.com
Delivered-To: oauth@ietfa.amsl.com
Received: from localhost (localhost [127.0.0.1]) by ietfa.amsl.com (Postfix) with ESMTP id CA7A121F8C3C for <oauth@ietfa.amsl.com>; Mon, 11 Feb 2013 23:17:27 -0800 (PST)
X-Virus-Scanned: amavisd-new at amsl.com
X-Spam-Flag: NO
X-Spam-Score: -0.234
X-Spam-Level: 
X-Spam-Status: No, score=-0.234 tagged_above=-999 required=5 tests=[BAYES_00=-2.599, HELO_EQ_DE=0.35, MIME_QP_LONG_LINE=1.396, RCVD_IN_SORBS_WEB=0.619]
Received: from mail.ietf.org ([64.170.98.30]) by localhost (ietfa.amsl.com [127.0.0.1]) (amavisd-new, port 10024) with ESMTP id GQ6MBFqAjO6P for <oauth@ietfa.amsl.com>; Mon, 11 Feb 2013 23:17:26 -0800 (PST)
Received: from smtprelay02.ispgateway.de (smtprelay02.ispgateway.de [80.67.18.14]) by ietfa.amsl.com (Postfix) with ESMTP id 7511621F8C74 for <oauth@ietf.org>; Mon, 11 Feb 2013 23:17:26 -0800 (PST)
Received: from [80.187.107.6] (helo=[192.168.44.16]) by smtprelay02.ispgateway.de with esmtpsa (TLSv1:AES128-SHA:128) (Exim 4.68) (envelope-from <torsten@lodderstedt.net>) id 1U5A7F-0008NM-KN; Tue, 12 Feb 2013 08:17:23 +0100
References: <51195F39.3040809@mitre.org> <4E1F6AAD24975D4BA5B16804296739436743E3DD@TK5EX14MBXC285.redmond.corp.microsoft.com>
Mime-Version: 1.0 (1.0)
In-Reply-To: <4E1F6AAD24975D4BA5B16804296739436743E3DD@TK5EX14MBXC285.redmond.corp.microsoft.com>
Content-Type: text/plain; charset=us-ascii
Content-Transfer-Encoding: quoted-printable
Message-Id: <BFDA9345-B4EF-4BA6-8CC6-249D82118D00@lodderstedt.net>
X-Mailer: iPad Mail (10B141)
From: Torsten Lodderstedt <torsten@lodderstedt.net>
Date: Tue, 12 Feb 2013 08:17:13 +0100
To: Mike Jones <Michael.Jones@microsoft.com>
X-Df-Sender: dG9yc3RlbkBsb2RkZXJzdGVkdC1vbmxpbmUuZGU=
Cc: "oauth@ietf.org" <oauth@ietf.org>
Subject: Re: [OAUTH-WG] Registration: Endpoint Definition (& operation parameter)
X-BeenThere: oauth@ietf.org
X-Mailman-Version: 2.1.12
Precedence: list
List-Id: OAUTH WG <oauth.ietf.org>
List-Unsubscribe: <https://www.ietf.org/mailman/options/oauth>, <mailto:oauth-request@ietf.org?subject=unsubscribe>
List-Archive: <http://www.ietf.org/mail-archive/web/oauth>
List-Post: <mailto:oauth@ietf.org>
List-Help: <mailto:oauth-request@ietf.org?subject=help>
List-Subscribe: <https://www.ietf.org/mailman/listinfo/oauth>, <mailto:oauth-request@ietf.org?subject=subscribe>
X-List-Received-Date: Tue, 12 Feb 2013 07:17:27 -0000

Hi Mike,

why do you think the protocol should allow to have two endpoints on the same=
 URL? Even the core spec does not allow to map tokens and authorization endp=
oint to the same URL.

Regards,
Torsten.

Am 12.02.2013 um 02:26 schrieb Mike Jones <Michael.Jones@microsoft.com>:

> At most, there should be two endpoints - creation and management - for a c=
lient, but the protocol should be structured such that they *can* be at the s=
ame URL, if the server so chooses.  A simple way to accomplish this is to re=
quire that the client_id value be provided as an input parameter on update o=
perations.  Then for implementations that use a single endpoint, they can di=
stinguish "create" and "update" operations on the management endpoint by the=
 presence or absence of the client_id value.
>=20
> If you want to have separate endpoints and don't need the client_id becaus=
e you have somehow encoded it into the management endpoint URL, that's fine.=
  It still can serve as a useful cross-check that the client (or an attacker=
) is requesting a change to a client that matches the bearer token used.  Bu=
t including it is necessary for implementations that want to use a single re=
gistration endpoint, rather than having a proliferation of per-client endpoi=
nts.
>=20
> BTW, just for the record, OAuth 2.0 uses the same endpoint for initial acc=
ess token requests and requests for refreshed access tokens - with the opera=
tions being distinguished by whether a refresh_token parameter is present.  S=
o there's a useful OAuth precedent for doing things this way.
>=20
>                -- Mike
>=20
> -----Original Message-----
> From: oauth-bounces@ietf.org [mailto:oauth-bounces@ietf.org] On Behalf Of J=
ustin Richer
> Sent: Monday, February 11, 2013 1:15 PM
> To: oauth@ietf.org
> Subject: [OAUTH-WG] Registration: Endpoint Definition (& operation paramet=
er)
>=20
> Draft -05 of OAuth Dynamic Client Registration [1] defines three fundament=
al operations that a client can undertake: Client Registration, Client Updat=
e, and Secret Rotation. Each of these actions needs to be differentiated *so=
mehow* by the client and server as part of the protocol. Draft -00 defined o=
nly the "register" operation, drafts -01 through -04 made use of an "operati=
on" parameter on a single endpoint, which brought up a long discussion on th=
e list on whether or not that was an appropriate design. Draft -05 did away w=
ith the definition of the "operation" parameter on a single endpoint and ins=
tead opted for separating the base functionality into three different endpoi=
nts.
>=20
> Pro:
>  - Closer to RESTful semantics of having one URL for creation and another U=
RL for management of an item (eg, most REST APIs use /object for creation an=
d /object/object_id for manipulation)
>  - The rest of OAuth (and its extensions) defines separate endpoints for d=
ifferent actions (Authorization, Token, Revocation, Introspection) as oppose=
d to a single endpoint with a mode-switch parameter
>  - Client doesn't have to generate a URL string for different endpoints by=
 combining parameters with a base URL
>=20
> Con:
>  - Not quite exactly RESTful as the spec doesn't dictate the client_id=20
> be part of the update or rotate URL (though and implementor's note=20
> suggests this)
>  - Client has to track different URLs for different actions
>  - Server must be able to differentiate actions based on these=20
> different URLs.
>=20
> Alternatives include using different HTTP verbs (see other thread) or=20
> defining an operational switch parameter, like older drafts, on a single=20=

> endpoint URL. Another suggested alternative is to look for the presence=20=

> of certain parameters, such as client_id or the registration access=20
> token, to indicate that a different operation is requested.
>=20
> There's also question of whether the Secret Rotation action needs to=20
> have its own endpoint, or if it can be collapsed into one of the others.=20=

> It has been suggested off-list that the secret rotation should never be=20=

> initiated by the Client but instead the client should simply request its=20=

> latest secret from the server through the update (or read) semantics.
>=20
>  -- Justin
>=20
> [1] http://tools.ietf.org/html/draft-ietf-oauth-dyn-reg-05
> _______________________________________________
> OAuth mailing list
> OAuth@ietf.org
> https://www.ietf.org/mailman/listinfo/oauth
> _______________________________________________
> OAuth mailing list
> OAuth@ietf.org
> https://www.ietf.org/mailman/listinfo/oauth

From torsten@lodderstedt.net  Mon Feb 11 23:23:56 2013
Return-Path: <torsten@lodderstedt.net>
X-Original-To: oauth@ietfa.amsl.com
Delivered-To: oauth@ietfa.amsl.com
Received: from localhost (localhost [127.0.0.1]) by ietfa.amsl.com (Postfix) with ESMTP id 85F2821F8C57 for <oauth@ietfa.amsl.com>; Mon, 11 Feb 2013 23:23:56 -0800 (PST)
X-Virus-Scanned: amavisd-new at amsl.com
X-Spam-Flag: NO
X-Spam-Score: -0.234
X-Spam-Level: 
X-Spam-Status: No, score=-0.234 tagged_above=-999 required=5 tests=[BAYES_00=-2.599, HELO_EQ_DE=0.35, MIME_QP_LONG_LINE=1.396, RCVD_IN_SORBS_WEB=0.619]
Received: from mail.ietf.org ([64.170.98.30]) by localhost (ietfa.amsl.com [127.0.0.1]) (amavisd-new, port 10024) with ESMTP id TX0e4uYmIlHq for <oauth@ietfa.amsl.com>; Mon, 11 Feb 2013 23:23:55 -0800 (PST)
Received: from smtprelay04.ispgateway.de (smtprelay04.ispgateway.de [80.67.31.32]) by ietfa.amsl.com (Postfix) with ESMTP id 572D821F8C55 for <oauth@ietf.org>; Mon, 11 Feb 2013 23:23:55 -0800 (PST)
Received: from [80.187.107.6] (helo=[192.168.44.16]) by smtprelay04.ispgateway.de with esmtpsa (TLSv1:AES128-SHA:128) (Exim 4.68) (envelope-from <torsten@lodderstedt.net>) id 1U5ADY-0006NG-GE; Tue, 12 Feb 2013 08:23:52 +0100
References: <51195F36.6040705@mitre.org> <780F8C26-19A4-4301-B350-307D9FFF69CD@ve7jtb.com>
Mime-Version: 1.0 (1.0)
In-Reply-To: <780F8C26-19A4-4301-B350-307D9FFF69CD@ve7jtb.com>
Content-Type: text/plain; charset=us-ascii
Content-Transfer-Encoding: quoted-printable
Message-Id: <80727F20-A830-4778-B11C-D45389310646@lodderstedt.net>
X-Mailer: iPad Mail (10B141)
From: Torsten Lodderstedt <torsten@lodderstedt.net>
Date: Tue, 12 Feb 2013 08:23:49 +0100
To: John Bradley <ve7jtb@ve7jtb.com>
X-Df-Sender: dG9yc3RlbkBsb2RkZXJzdGVkdC1vbmxpbmUuZGU=
Cc: "oauth@ietf.org" <oauth@ietf.org>
Subject: Re: [OAUTH-WG] Registration: RESTful client lifecycle management
X-BeenThere: oauth@ietf.org
X-Mailman-Version: 2.1.12
Precedence: list
List-Id: OAUTH WG <oauth.ietf.org>
List-Unsubscribe: <https://www.ietf.org/mailman/options/oauth>, <mailto:oauth-request@ietf.org?subject=unsubscribe>
List-Archive: <http://www.ietf.org/mail-archive/web/oauth>
List-Post: <mailto:oauth@ietf.org>
List-Help: <mailto:oauth-request@ietf.org?subject=help>
List-Subscribe: <https://www.ietf.org/mailman/listinfo/oauth>, <mailto:oauth-request@ietf.org?subject=subscribe>
X-List-Received-Date: Tue, 12 Feb 2013 07:23:56 -0000

+1 for always including the client_id=20

As John pointed out, there could be different entities updating client data.=
 Then one has to distinguish the resource and the credential.

Am 12.02.2013 um 02:51 schrieb John Bradley <ve7jtb@ve7jtb.com>:

> I would always include the client_id on update.
>=20
> I think it is also us full to have other tokens used at the update endpoin=
t.  I can see the master token used to update all the clients it has registe=
red as part of API management.=20
> Relying on the registration_access_token is probably a design that will ca=
use trouble down the road.
>=20
> I think GET and POST are relatively clear.   I don't know about expelling P=
UT to developers.  I think POST with a client_id to a (separate discussion) u=
pdate_uri works without restricting it to PUT.
>=20
> I think DELETE needs to be better understood.   I think a status that can b=
e set for client lifecycle is better than letting a client delete a entry.  =
 =20
> In some cases there will be more than one instance of a client and letting=
 them know they have been turned off for a reason is better than making ther=
e registration disappear. =20
> So for the moment I would levee out DELETE.
>=20
> John B.
>=20
> On 2013-02-11, at 6:14 PM, Justin Richer <jricher@mitre.org> wrote:
>=20
>> Draft -05 of OAuth Dynamic Client Registration [1] defines several operat=
ions that the client can take on its behalf as part of the registration proc=
ess. These boil down to the basic CRUD operations that you find in many APIs=
: Create, Read, Update, Delete. Draft -00 defined only the "Create" operatio=
n, draft -01 through -04 added the "Update" operation, switched using the "o=
peration=3D" parameter.
>>=20
>> Following several suggestions to do so on the list, the -05 draft defines=
 these operations in terms of a RESTful API for the client. Namely:
>>=20
>> - HTTP POST to registration endpoint =3D> Create (register) a new client
>> - HTTP PUT to update endpoint (with registration_access_token) =3D> Updat=
e the registered information for this client
>> - HTTP GET to update endpoint (with registration_access_token) =3D> read t=
he registered information for this client
>> - HTTP DELETE to update endpoint (with registration_access_token) =3D> De=
lete (unregister/de-provision) this client
>>=20
>> The two main issues at stake here are: the addition of the READ and DELET=
E methods, and the use of HTTP verbs following a RESTful design philosophy.
>>=20
>> Pro:
>> - RESTful APIs (with HTTP verbs to differentiate functionality) are the n=
orm today
>> - Full lifecycle management is common and is going to be expected by many=
 users of this protocol in the wild
>>=20
>> Cons:
>> - Update semantics are still under debate (full replace? patch?)
>> - Somewhat increased complexity on the server to support all operations
>> - Client has to understand all HTTP verbs for full access (though plain r=
egistration is just POST)
>>=20
>>=20
>> Alternatives include using an operational switch parameter (like the old d=
rafts), defining separate endpoints for every action, or doing all operation=
s on a single endpoint using verbs to switch.
>>=20
>> -- Justin
>>=20
>> [1] http://tools.ietf.org/html/draft-ietf-oauth-dyn-reg-05
>> _______________________________________________
>> OAuth mailing list
>> OAuth@ietf.org
>> https://www.ietf.org/mailman/listinfo/oauth
>=20
> _______________________________________________
> OAuth mailing list
> OAuth@ietf.org
> https://www.ietf.org/mailman/listinfo/oauth

From hannes.tschofenig@gmx.net  Tue Feb 12 01:10:36 2013
Return-Path: <hannes.tschofenig@gmx.net>
X-Original-To: oauth@ietfa.amsl.com
Delivered-To: oauth@ietfa.amsl.com
Received: from localhost (localhost [127.0.0.1]) by ietfa.amsl.com (Postfix) with ESMTP id 3359321F8C84 for <oauth@ietfa.amsl.com>; Tue, 12 Feb 2013 01:10:33 -0800 (PST)
X-Virus-Scanned: amavisd-new at amsl.com
X-Spam-Flag: NO
X-Spam-Score: -100.97
X-Spam-Level: 
X-Spam-Status: No, score=-100.97 tagged_above=-999 required=5 tests=[AWL=-0.950, BAYES_00=-2.599, RCVD_IN_BL_SPAMCOP_NET=1.96, RCVD_IN_SORBS_WEB=0.619, USER_IN_WHITELIST=-100]
Received: from mail.ietf.org ([64.170.98.30]) by localhost (ietfa.amsl.com [127.0.0.1]) (amavisd-new, port 10024) with ESMTP id jbY4O6Y3pdG6 for <oauth@ietfa.amsl.com>; Tue, 12 Feb 2013 01:10:31 -0800 (PST)
Received: from mout.gmx.net (mout.gmx.net [212.227.17.21]) by ietfa.amsl.com (Postfix) with ESMTP id B474C21F8C7D for <oauth@ietf.org>; Tue, 12 Feb 2013 01:10:30 -0800 (PST)
Received: from mailout-de.gmx.net ([10.1.76.35]) by mrigmx.server.lan (mrigmx001) with ESMTP (Nemesis) id 0MW5It-1UPOPM3MLZ-00XIdD for <oauth@ietf.org>; Tue, 12 Feb 2013 10:10:29 +0100
Received: (qmail invoked by alias); 12 Feb 2013 09:10:29 -0000
Received: from unknown (EHLO [10.255.128.222]) [194.251.119.201] by mail.gmx.net (mp035) with SMTP; 12 Feb 2013 10:10:29 +0100
X-Authenticated: #29516787
X-Provags-ID: V01U2FsdGVkX18DrWsRaMoDCW7Ho7LaCN4og5bA9aNUONqvlp3WVd qORaUF55RUerIU
From: Hannes Tschofenig <hannes.tschofenig@gmx.net>
Content-Type: text/plain; charset=us-ascii
Content-Transfer-Encoding: quoted-printable
Date: Tue, 12 Feb 2013 11:10:27 +0200
Message-Id: <0573984A-8C11-4960-9BC6-F44D4B664C19@gmx.net>
To: IETF oauth WG <oauth@ietf.org>
Mime-Version: 1.0 (Apple Message framework v1085)
X-Mailer: Apple Mail (2.1085)
X-Y-GMX-Trusted: 0
Subject: [OAUTH-WG] Minutes from the OAuth Design Team Conference Call - 11th February 2013
X-BeenThere: oauth@ietf.org
X-Mailman-Version: 2.1.12
Precedence: list
List-Id: OAUTH WG <oauth.ietf.org>
List-Unsubscribe: <https://www.ietf.org/mailman/options/oauth>, <mailto:oauth-request@ietf.org?subject=unsubscribe>
List-Archive: <http://www.ietf.org/mail-archive/web/oauth>
List-Post: <mailto:oauth@ietf.org>
List-Help: <mailto:oauth-request@ietf.org?subject=help>
List-Subscribe: <https://www.ietf.org/mailman/listinfo/oauth>, <mailto:oauth-request@ietf.org?subject=subscribe>
X-List-Received-Date: Tue, 12 Feb 2013 09:10:36 -0000

Here are my notes.=20

Participants:

* John Bradley
* Derek Atkins
* Phil Hunt
* Prateek Mishra
* Hannes Tschofenig
* Mike Jones
* Antonio Sanso
* Justin Richer

Notes:=20

My slides are available here: =
http://www.tschofenig.priv.at/OAuth2-Security-11Feb2013.ppt

Slide #2 summarizes earlier discussions during the conference calls.=20

-- HTTP vs. JSON

Phil noted that he does not like to use the MAC Token draft as a =
starting point because it does not re-use any of the work done in the =
JOSE working group and in particular all the libraries that are =
available today. He mentioned that earlier attempts to write the MAC =
Token code lead to problems for implementers.=20

Justin responded that he does not agree with using JSON as a transport =
mechanism since this would replicate a SOAP style.=20

Phil noted that he wants to send JSON but the signature shall be =
computed over the HTTP header field.=20

-- Flexibility for the keyed message digest computation

=46rom earlier discussion it was clear that the conference call =
participants wanted more flexibility regarding the keyed message digest =
computation. For this purpose Hannes presented the DKIM based approach, =
which allows selective header fields to be included in the digest. This =
is shown in slide #4.=20

After some discussion the conference call participants thought that this =
would meet their needs. Further investigations would still be useful to =
determine the degree of failed HMAC calculations due to HTTP proxies =
modifying the content.=20

-- Key Distribution

Hannes presented the open issue regarding the choice of key =
distribution. Slides #6-#8 present three techniques and Hannes asked for =
feedback regarding the preferred style. Justin and others didn't see the =
need to decide on one mechanism - they wanted to keep the choice open. =
Derek indicated that this will not be an acceptable approach. Since the =
resource server and the authorization server may, in the OAuth 2.0 =
framework, be entities produced by different vendors there is an =
interoperability need. Justin responded that he disagrees and that the =
resource server needs to understand the access token and referred to the =
recent draft submission for the token introspection endpoint. Derek =
indicated that the resource server has to understand the content of the =
access token and the token introspection endpoint just pushes the =
problem around: the resource server has to send the access token to the =
authorization server and then the resource server gets the result back =
(which he then again needs to understand) in order to make a meaningful =
authorization decision.=20

Everyone agreed that the client must receive the session key from the =
authorization server and that this approach has to be standardized. It =
was also agreed that this is a common approach among all three key =
distribution mechanisms.

Hannes asked the participants to think about their preference.=20

The questions regarding key naming and the indication for the intended =
resource server the client wants to talk to have been postponed.=20
=20
Ciao
Hannes



From hannes.tschofenig@gmx.net  Tue Feb 12 01:14:14 2013
Return-Path: <hannes.tschofenig@gmx.net>
X-Original-To: oauth@ietfa.amsl.com
Delivered-To: oauth@ietfa.amsl.com
Received: from localhost (localhost [127.0.0.1]) by ietfa.amsl.com (Postfix) with ESMTP id DFE0521F8C97 for <oauth@ietfa.amsl.com>; Tue, 12 Feb 2013 01:14:13 -0800 (PST)
X-Virus-Scanned: amavisd-new at amsl.com
X-Spam-Flag: NO
X-Spam-Score: -100.91
X-Spam-Level: 
X-Spam-Status: No, score=-100.91 tagged_above=-999 required=5 tests=[AWL=-0.890, BAYES_00=-2.599, RCVD_IN_BL_SPAMCOP_NET=1.96, RCVD_IN_SORBS_WEB=0.619, USER_IN_WHITELIST=-100]
Received: from mail.ietf.org ([64.170.98.30]) by localhost (ietfa.amsl.com [127.0.0.1]) (amavisd-new, port 10024) with ESMTP id Gym6iVmNce1c for <oauth@ietfa.amsl.com>; Tue, 12 Feb 2013 01:14:13 -0800 (PST)
Received: from mout.gmx.net (mout.gmx.net [212.227.17.20]) by ietfa.amsl.com (Postfix) with ESMTP id BBE9521F8447 for <oauth@ietf.org>; Tue, 12 Feb 2013 01:14:12 -0800 (PST)
Received: from mailout-de.gmx.net ([10.1.76.16]) by mrigmx.server.lan (mrigmx002) with ESMTP (Nemesis) id 0Lmxbm-1UZ33H1yNY-00h5KI for <oauth@ietf.org>; Tue, 12 Feb 2013 10:14:11 +0100
Received: (qmail invoked by alias); 12 Feb 2013 09:14:11 -0000
Received: from unknown (EHLO [10.255.128.222]) [194.251.119.201] by mail.gmx.net (mp016) with SMTP; 12 Feb 2013 10:14:11 +0100
X-Authenticated: #29516787
X-Provags-ID: V01U2FsdGVkX18Ntu8wXm8Ndg0WFr0QExS1d9TvqaSfybs4WBuIRw 0P3XEO9BUqRwXA
From: Hannes Tschofenig <hannes.tschofenig@gmx.net>
Content-Type: text/plain; charset=us-ascii
Content-Transfer-Encoding: quoted-printable
Date: Tue, 12 Feb 2013 11:14:10 +0200
Message-Id: <C29A22B1-0CE6-44CE-870C-02431599333F@gmx.net>
To: IETF oauth WG <oauth@ietf.org>
Mime-Version: 1.0 (Apple Message framework v1085)
X-Mailer: Apple Mail (2.1085)
X-Y-GMX-Trusted: 0
Subject: [OAUTH-WG] Draft IETF#86 Agenda
X-BeenThere: oauth@ietf.org
X-Mailman-Version: 2.1.12
Precedence: list
List-Id: OAUTH WG <oauth.ietf.org>
List-Unsubscribe: <https://www.ietf.org/mailman/options/oauth>, <mailto:oauth-request@ietf.org?subject=unsubscribe>
List-Archive: <http://www.ietf.org/mail-archive/web/oauth>
List-Post: <mailto:oauth@ietf.org>
List-Help: <mailto:oauth-request@ietf.org?subject=help>
List-Subscribe: <https://www.ietf.org/mailman/listinfo/oauth>, <mailto:oauth-request@ietf.org?subject=subscribe>
X-List-Received-Date: Tue, 12 Feb 2013 09:14:14 -0000

Hi all,=20

I just wanted to let you know that the draft agenda for the upcoming =
IETF meeting is available here:
https://datatracker.ietf.org/meeting/86/agenda.txt

There are two OAuth sessions:

* MONDAY, March 11, 2013
1540-1710  Afternoon Session II

* THURSDAY, March 14, 2013
1740-1840  Afternoon Session III

I was also told that there will be an OpenID Connect gathering on Sunday =
afternoon.=20

Additionally, there are various other security-related sessions that you =
may find useful, such as JOSE, TLS, or KITTEN.=20

Ciao
Hannes


From wmills_92105@yahoo.com  Tue Feb 12 01:27:32 2013
Return-Path: <wmills_92105@yahoo.com>
X-Original-To: oauth@ietfa.amsl.com
Delivered-To: oauth@ietfa.amsl.com
Received: from localhost (localhost [127.0.0.1]) by ietfa.amsl.com (Postfix) with ESMTP id 9358721F8BFD for <oauth@ietfa.amsl.com>; Tue, 12 Feb 2013 01:27:32 -0800 (PST)
X-Virus-Scanned: amavisd-new at amsl.com
X-Spam-Flag: NO
X-Spam-Score: -2.193
X-Spam-Level: 
X-Spam-Status: No, score=-2.193 tagged_above=-999 required=5 tests=[AWL=0.405,  BAYES_00=-2.599, HTML_MESSAGE=0.001]
Received: from mail.ietf.org ([64.170.98.30]) by localhost (ietfa.amsl.com [127.0.0.1]) (amavisd-new, port 10024) with ESMTP id 3N30lWJV79aT for <oauth@ietfa.amsl.com>; Tue, 12 Feb 2013 01:27:31 -0800 (PST)
Received: from nm20-vm1.bullet.mail.ne1.yahoo.com (nm20-vm1.bullet.mail.ne1.yahoo.com [98.138.91.21]) by ietfa.amsl.com (Postfix) with ESMTP id F271A21F8CA1 for <oauth@ietf.org>; Tue, 12 Feb 2013 01:27:30 -0800 (PST)
Received: from [98.138.90.57] by nm20.bullet.mail.ne1.yahoo.com with NNFMP; 12 Feb 2013 09:27:30 -0000
Received: from [98.138.87.3] by tm10.bullet.mail.ne1.yahoo.com with NNFMP; 12 Feb 2013 09:27:30 -0000
Received: from [127.0.0.1] by omp1003.mail.ne1.yahoo.com with NNFMP; 12 Feb 2013 09:27:30 -0000
X-Yahoo-Newman-Property: ymail-3
X-Yahoo-Newman-Id: 442931.33684.bm@omp1003.mail.ne1.yahoo.com
Received: (qmail 64395 invoked by uid 60001); 12 Feb 2013 09:27:30 -0000
DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=yahoo.com; s=s1024; t=1360661250; bh=WVewlGkLVC+vAEDH8z77yilg31R9rox7/DlCgoKVDhk=; h=X-YMail-OSG:Received:X-Rocket-MIMEInfo:X-Mailer:References:Message-ID:Date:From:Reply-To:Subject:To:In-Reply-To:MIME-Version:Content-Type; b=JW/VhcbK8QHO0wCsSuUCiOAOWuBoDgwQ4RgKWBRBiUTzr3RNJIzpKrGjgoM0clhq0Nz1M6ae8kSv90uxENRUjfEJsVH66NqLAM1TK75NFzNjLnBgqK45AbD79yirueJzYtFfMZh+bNLWl9lnXS+wuiSdctRaxNaT2PyZyDcxCxc=
DomainKey-Signature: a=rsa-sha1; q=dns; c=nofws; s=s1024; d=yahoo.com; h=X-YMail-OSG:Received:X-Rocket-MIMEInfo:X-Mailer:References:Message-ID:Date:From:Reply-To:Subject:To:In-Reply-To:MIME-Version:Content-Type; b=TnEMSAL74QJvTBz+62tsx1lBnjZ8gLQTC314ZrL5vXPjp3bCRvA0vvNEZmX6U7AtuR4ujMxKCg4Z5PVCqnhPxPDQQE9AzqB3PppPo2XpEnMSVMhqxJDeqGWappdElv43Uz32XOpq533y5vYeo2axK2ARS2cQLFo16qTTNmaM93E=;
X-YMail-OSG: g8Wfp9AVM1mOr4nwLPQdPQyZ9wQtZIcrp1qyfLVM_Ua4R6B VkvolakChmDkVUyaISrxVWL.yLK7GBsVw_S4huXrcsr61oW9DrLVbupYyAxJ l2313qs4ypaPxycOOibh0LDiiKKtRg36DImzPoraNrhNw7ObykSPruItnDYw RFCUEGYAkStq1ZLTaodc6Gx7CbciG38TKhqfhyvDJP9z2F_0ky17dfoGfw3Z ps6q_.mUnOQnSIPWLit48CRCLGHZq.dCKYYZfwGzz12.H2BKpe.Jcouur2m6 LOn0OT8UO43wZ.agF3l1BRypPVxK9G_Ebj60AYPfPWR1tCp.X.Il4g5mSazz K.tEpa60yWVBexG459kyQZzwZGjsrMV6QnRiPXmfFEGD1.qrwszMLODSW98T LRMO4so3bZxaJWg8pV89T93mlfkXTm7idTueZG6hT0FXuFo3N54BelqnujHd swQ9PX04YXRQZ4PNqm7sDkApHKa6znWJe9Hq_M_M8OFfPfIDZojSQC8Wi9cS vBOD0YHPFwU6LIK3o0YTdxSDiOjY1zDlgSNULEJIC7JddrQk2qj3noHD1Y3E QwAxVb4ccVGZ7XzBZxT0dEOZiXnsHyCT.yyM_kzRoRuqPssugFZcXWsD_Yai GceD5LKWLuHUQnHaei0seEnCn8tI-
Received: from [209.131.62.115] by web31803.mail.mud.yahoo.com via HTTP; Tue, 12 Feb 2013 01:27:29 PST
X-Rocket-MIMEInfo: 001.001, SXMga2V5IGRpc3RyaWJ1dGlvbiBob3cgQVMgYW5kIFBSIHNoYXJlIGtleXMgwqBmb3IgdG9rZW4gZW5jcnlwdGlvbi9kZWNyeXB0aW9uIG9yIHNwZWNpZmljYWxseSBhYm91dCB0aGUga2V5cyBmb3IgdGhlIEhPSyB0b2tlbnM_CgpGb3IgdGhlIE1BQyB0b2tlbiBzcGVjLCBJIGRvbid0IGFjdHVhbGx5IGNhcmUgd2hldGhlciB3ZSB1c2UgSlNPTiBvciBub3csIGJ1dCBJJ20gaW4gZnVsbCBhZ3JlZW1lbnQgdGhhdCB3ZSBkbyBOT1QgZHVwbGljYXRlIGFueSBIVFRQIGluZm8gaW50byB0aGUgSlNPTi4gwqBKdXMBMAEBAQE-
X-Mailer: YahooMailWebService/0.8.133.508
References: <0573984A-8C11-4960-9BC6-F44D4B664C19@gmx.net>
Message-ID: <1360661249.62997.YahooMailNeo@web31803.mail.mud.yahoo.com>
Date: Tue, 12 Feb 2013 01:27:29 -0800 (PST)
From: William Mills <wmills_92105@yahoo.com>
To: Hannes Tschofenig <hannes.tschofenig@gmx.net>, IETF oauth WG <oauth@ietf.org>
In-Reply-To: <0573984A-8C11-4960-9BC6-F44D4B664C19@gmx.net>
MIME-Version: 1.0
Content-Type: multipart/alternative; boundary="1502656925-992005796-1360661249=:62997"
Subject: Re: [OAUTH-WG] Minutes from the OAuth Design Team Conference Call - 11th February 2013
X-BeenThere: oauth@ietf.org
X-Mailman-Version: 2.1.12
Precedence: list
Reply-To: William Mills <wmills_92105@yahoo.com>
List-Id: OAUTH WG <oauth.ietf.org>
List-Unsubscribe: <https://www.ietf.org/mailman/options/oauth>, <mailto:oauth-request@ietf.org?subject=unsubscribe>
List-Archive: <http://www.ietf.org/mail-archive/web/oauth>
List-Post: <mailto:oauth@ietf.org>
List-Help: <mailto:oauth-request@ietf.org?subject=help>
List-Subscribe: <https://www.ietf.org/mailman/listinfo/oauth>, <mailto:oauth-request@ietf.org?subject=subscribe>
X-List-Received-Date: Tue, 12 Feb 2013 09:27:32 -0000

--1502656925-992005796-1360661249=:62997
Content-Type: text/plain; charset=iso-8859-1
Content-Transfer-Encoding: quoted-printable

Is key distribution how AS and PR share keys =A0for token encryption/decryp=
tion or specifically about the keys for the HOK tokens?=0A=0AFor the MAC to=
ken spec, I don't actually care whether we use JSON or now, but I'm in full=
 agreement that we do NOT duplicate any HTTP info into the JSON. =A0Just si=
gnatures of that stuff.=0A=0A=0A________________________________=0A From: H=
annes Tschofenig <hannes.tschofenig@gmx.net>=0ATo: IETF oauth WG <oauth@iet=
f.org> =0ASent: Tuesday, February 12, 2013 1:10 AM=0ASubject: [OAUTH-WG] Mi=
nutes from the OAuth Design Team Conference Call - 11th February 2013=0A =
=0AHere are my notes. =0A=0AParticipants:=0A=0A* John Bradley=0A* Derek Atk=
ins=0A* Phil Hunt=0A* Prateek Mishra=0A* Hannes Tschofenig=0A* Mike Jones=
=0A* Antonio Sanso=0A* Justin Richer=0A=0ANotes: =0A=0AMy slides are availa=
ble here: http://www.tschofenig.priv.at/OAuth2-Security-11Feb2013.ppt=0A=0A=
Slide #2 summarizes earlier discussions during the conference calls. =0A=0A=
-- HTTP vs. JSON=0A=0APhil noted that he does not like to use the MAC Token=
 draft as a starting point because it does not re-use any of the work done =
in the JOSE working group and in particular all the libraries that are avai=
lable today. He mentioned that earlier attempts to write the MAC Token code=
 lead to problems for implementers. =0A=0AJustin responded that he does not=
 agree with using JSON as a transport mechanism since this would replicate =
a SOAP style. =0A=0APhil noted that he wants to send JSON but the signature=
 shall be computed over the HTTP header field. =0A=0A-- Flexibility for the=
 keyed message digest computation=0A=0AFrom earlier discussion it was clear=
 that the conference call participants wanted more flexibility regarding th=
e keyed message digest computation. For this purpose Hannes presented the D=
KIM based approach, which allows selective header fields to be included in =
the digest. This is shown in slide #4. =0A=0AAfter some discussion the conf=
erence call participants thought that this would meet their needs. Further =
investigations would still be useful to determine the degree of failed HMAC=
 calculations due to HTTP proxies modifying the content. =0A=0A-- Key Distr=
ibution=0A=0AHannes presented the open issue regarding the choice of key di=
stribution. Slides #6-#8 present three techniques and Hannes asked for feed=
back regarding the preferred style. Justin and others didn't see the need t=
o decide on one mechanism - they wanted to keep the choice open. Derek indi=
cated that this will not be an acceptable approach. Since the resource serv=
er and the authorization server may, in the OAuth 2.0 framework, be entitie=
s produced by different vendors there is an interoperability need. Justin r=
esponded that he disagrees and that the resource server needs to understand=
 the access token and referred to the recent draft submission for the token=
 introspection endpoint. Derek indicated that the resource server has to un=
derstand the content of the access token and the token introspection endpoi=
nt just pushes the problem around: the resource server has to send the acce=
ss token to the authorization server and then the resource server gets the =
result
 back (which he then a=0Again needs to understand) in order to make a meani=
ngful authorization decision. =0A=0AEveryone agreed that the client must re=
ceive the session key from the authorization server and that this approach =
has to be standardized. It was also agreed that this is a common approach a=
mong all three key distribution mechanisms.=0A=0AHannes asked the participa=
nts to think about their preference. =0A=0AThe questions regarding key nami=
ng and the indication for the intended resource server the client wants to =
talk to have been postponed. =0A=0ACiao=0AHannes=0A=0A=0A__________________=
_____________________________=0AOAuth mailing list=0AOAuth@ietf.org=0Ahttps=
://www.ietf.org/mailman/listinfo/oauth
--1502656925-992005796-1360661249=:62997
Content-Type: text/html; charset=iso-8859-1
Content-Transfer-Encoding: quoted-printable

<html><body><div style=3D"color:#000; background-color:#fff; font-family:Co=
urier New, courier, monaco, monospace, sans-serif;font-size:12pt"><div><spa=
n>Is key distribution how AS and PR share keys &nbsp;for token encryption/d=
ecryption or specifically about the keys for the HOK tokens?</span></div><d=
iv style=3D"color: rgb(0, 0, 0); font-size: 16px; font-family: 'Courier New=
', courier, monaco, monospace, sans-serif; background-color: transparent; f=
ont-style: normal;"><span><br></span></div><div style=3D"color: rgb(0, 0, 0=
); font-size: 16px; font-family: 'Courier New', courier, monaco, monospace,=
 sans-serif; background-color: transparent; font-style: normal;">For the MA=
C token spec, I don't actually care whether we use JSON or now, but I'm in =
full agreement that we do NOT duplicate any HTTP info into the JSON. &nbsp;=
Just signatures of that stuff.</div><div><br></div>  <div style=3D"font-fam=
ily: 'Courier New', courier, monaco, monospace, sans-serif; font-size:
 12pt;"> <div style=3D"font-family: 'times new roman', 'new york', times, s=
erif; font-size: 12pt;"> <div dir=3D"ltr"> <font size=3D"2" face=3D"Arial">=
 <hr size=3D"1">  <b><span style=3D"font-weight:bold;">From:</span></b> Han=
nes Tschofenig &lt;hannes.tschofenig@gmx.net&gt;<br> <b><span style=3D"font=
-weight: bold;">To:</span></b> IETF oauth WG &lt;oauth@ietf.org&gt; <br> <b=
><span style=3D"font-weight: bold;">Sent:</span></b> Tuesday, February 12, =
2013 1:10 AM<br> <b><span style=3D"font-weight: bold;">Subject:</span></b> =
[OAUTH-WG] Minutes from the OAuth Design Team Conference Call - 11th Februa=
ry 2013<br> </font> </div> <br>=0AHere are my notes. <br><br>Participants:<=
br><br>* John Bradley<br>* Derek Atkins<br>* Phil Hunt<br>* Prateek Mishra<=
br>* Hannes Tschofenig<br>* Mike Jones<br>* Antonio Sanso<br>* Justin Riche=
r<br><br>Notes: <br><br>My slides are available here: http://www.tschofenig=
.priv.at/OAuth2-Security-11Feb2013.ppt<br><br>Slide #2 summarizes earlier d=
iscussions during the conference calls. <br><br>-- HTTP vs. JSON<br><br>Phi=
l noted that he does not like to use the MAC Token draft as a starting poin=
t because it does not re-use any of the work done in the JOSE working group=
 and in particular all the libraries that are available today. He mentioned=
 that earlier attempts to write the MAC Token code lead to problems for imp=
lementers. <br><br>Justin responded that he does not agree with using JSON =
as a transport mechanism since this would replicate a SOAP style. <br><br>P=
hil noted that he wants to send JSON but the signature shall be computed ov=
er the HTTP header field.
 <br><br>-- Flexibility for the keyed message digest computation<br><br>Fro=
m earlier discussion it was clear that the conference call participants wan=
ted more flexibility regarding the keyed message digest computation. For th=
is purpose Hannes presented the DKIM based approach, which allows selective=
 header fields to be included in the digest. This is shown in slide #4. <br=
><br>After some discussion the conference call participants thought that th=
is would meet their needs. Further investigations would still be useful to =
determine the degree of failed HMAC calculations due to HTTP proxies modify=
ing the content. <br><br>-- Key Distribution<br><br>Hannes presented the op=
en issue regarding the choice of key distribution. Slides #6-#8 present thr=
ee techniques and Hannes asked for feedback regarding the preferred style. =
Justin and others didn't see the need to decide on one mechanism - they wan=
ted to keep the choice open. Derek indicated that this will not be
 an acceptable approach. Since the resource server and the authorization se=
rver may, in the OAuth 2.0 framework, be entities produced by different ven=
dors there is an interoperability need. Justin responded that he disagrees =
and that the resource server needs to understand the access token and refer=
red to the recent draft submission for the token introspection endpoint. De=
rek indicated that the resource server has to understand the content of the=
 access token and the token introspection endpoint just pushes the problem =
around: the resource server has to send the access token to the authorizati=
on server and then the resource server gets the result back (which he then =
a<br> gain needs to understand) in order to make a meaningful authorization=
 decision. <br><br>Everyone agreed that the client must receive the session=
 key from the authorization server and that this approach has to be standar=
dized. It was also agreed that this is a common approach among all
 three key distribution mechanisms.<br><br>Hannes asked the participants to=
 think about their preference. <br><br>The questions regarding key naming a=
nd the indication for the intended resource server the client wants to talk=
 to have been postponed. <br> <br>Ciao<br>Hannes<br><br><br>_______________=
________________________________<br>OAuth mailing list<br><a ymailto=3D"mai=
lto:OAuth@ietf.org" href=3D"mailto:OAuth@ietf.org">OAuth@ietf.org</a><br><a=
 href=3D"https://www.ietf.org/mailman/listinfo/oauth" target=3D"_blank">htt=
ps://www.ietf.org/mailman/listinfo/oauth</a><br><br><br> </div> </div>  </d=
iv></body></html>
--1502656925-992005796-1360661249=:62997--

From hannes.tschofenig@gmx.net  Tue Feb 12 01:44:30 2013
Return-Path: <hannes.tschofenig@gmx.net>
X-Original-To: oauth@ietfa.amsl.com
Delivered-To: oauth@ietfa.amsl.com
Received: from localhost (localhost [127.0.0.1]) by ietfa.amsl.com (Postfix) with ESMTP id 6FB9E21F8BFD for <oauth@ietfa.amsl.com>; Tue, 12 Feb 2013 01:44:30 -0800 (PST)
X-Virus-Scanned: amavisd-new at amsl.com
X-Spam-Flag: NO
X-Spam-Score: -100.858
X-Spam-Level: 
X-Spam-Status: No, score=-100.858 tagged_above=-999 required=5 tests=[AWL=-0.838, BAYES_00=-2.599, RCVD_IN_BL_SPAMCOP_NET=1.96, RCVD_IN_SORBS_WEB=0.619, USER_IN_WHITELIST=-100]
Received: from mail.ietf.org ([64.170.98.30]) by localhost (ietfa.amsl.com [127.0.0.1]) (amavisd-new, port 10024) with ESMTP id VmKW-8mZC9bX for <oauth@ietfa.amsl.com>; Tue, 12 Feb 2013 01:44:29 -0800 (PST)
Received: from mout.gmx.net (mout.gmx.net [212.227.15.18]) by ietfa.amsl.com (Postfix) with ESMTP id 7DF2F21F8BF6 for <oauth@ietf.org>; Tue, 12 Feb 2013 01:44:29 -0800 (PST)
Received: from mailout-de.gmx.net ([10.1.76.24]) by mrigmx.server.lan (mrigmx001) with ESMTP (Nemesis) id 0Lnmkr-1UYlKV2jWx-00hw3S for <oauth@ietf.org>; Tue, 12 Feb 2013 10:44:28 +0100
Received: (qmail invoked by alias); 12 Feb 2013 09:44:28 -0000
Received: from unknown (EHLO [10.255.128.222]) [194.251.119.201] by mail.gmx.net (mp024) with SMTP; 12 Feb 2013 10:44:28 +0100
X-Authenticated: #29516787
X-Provags-ID: V01U2FsdGVkX199HhA5C9B9cmbbgZ6fZyopit28cl0WxuRzzXnaCE K1VNRHJr5SexI3
Mime-Version: 1.0 (Apple Message framework v1085)
Content-Type: text/plain; charset=us-ascii
From: Hannes Tschofenig <hannes.tschofenig@gmx.net>
In-Reply-To: <1360661249.62997.YahooMailNeo@web31803.mail.mud.yahoo.com>
Date: Tue, 12 Feb 2013 11:44:27 +0200
Content-Transfer-Encoding: quoted-printable
Message-Id: <103117A9-0922-4E1A-AC73-D2914743046C@gmx.net>
References: <0573984A-8C11-4960-9BC6-F44D4B664C19@gmx.net> <1360661249.62997.YahooMailNeo@web31803.mail.mud.yahoo.com>
To: William Mills <wmills_92105@yahoo.com>
X-Mailer: Apple Mail (2.1085)
X-Y-GMX-Trusted: 0
Cc: IETF oauth WG <oauth@ietf.org>
Subject: Re: [OAUTH-WG] Minutes from the OAuth Design Team Conference Call - 11th February 2013
X-BeenThere: oauth@ietf.org
X-Mailman-Version: 2.1.12
Precedence: list
List-Id: OAUTH WG <oauth.ietf.org>
List-Unsubscribe: <https://www.ietf.org/mailman/options/oauth>, <mailto:oauth-request@ietf.org?subject=unsubscribe>
List-Archive: <http://www.ietf.org/mail-archive/web/oauth>
List-Post: <mailto:oauth@ietf.org>
List-Help: <mailto:oauth-request@ietf.org?subject=help>
List-Subscribe: <https://www.ietf.org/mailman/listinfo/oauth>, <mailto:oauth-request@ietf.org?subject=subscribe>
X-List-Received-Date: Tue, 12 Feb 2013 09:44:30 -0000

Hi Bill,=20

On Feb 12, 2013, at 11:27 AM, William Mills wrote:

> Is key distribution how AS and PR share keys  for token =
encryption/decryption or specifically about the keys for the HOK tokens?
>=20
In order for the client to compute the keyed message digest it needs to =
have the session key. This session key is sent from the authorization =
server to the client and everyone on the call agreed that this has to be =
standardized.=20

The resource server who receives the message from the client also needs =
to have the session key to verify the message. How the resource server =
obtains this session key was subject for some discussion on the call. I =
presented three different ways of how the resource server is able to =
obtain that key. We have to decide on one mandatory-to-implement =
mechanism. The open issue is which one?=20
=20
> For the MAC token spec, I don't actually care whether we use JSON or =
now, but I'm in full agreement that we do NOT duplicate any HTTP info =
into the JSON.  Just signatures of that stuff.
>=20
I believe the folks on the call also agreed with you on that aspect that =
the content of the HTTP message should not be replicated in the JSON =
payload itself.=20

Ciao
Hannes

> From: Hannes Tschofenig <hannes.tschofenig@gmx.net>
> To: IETF oauth WG <oauth@ietf.org>=20
> Sent: Tuesday, February 12, 2013 1:10 AM
> Subject: [OAUTH-WG] Minutes from the OAuth Design Team Conference Call =
- 11th February 2013
>=20
> Here are my notes.=20
>=20
> Participants:
>=20
> * John Bradley
> * Derek Atkins
> * Phil Hunt
> * Prateek Mishra
> * Hannes Tschofenig
> * Mike Jones
> * Antonio Sanso
> * Justin Richer
>=20
> Notes:=20
>=20
> My slides are available here: =
http://www.tschofenig.priv.at/OAuth2-Security-11Feb2013.ppt
>=20
> Slide #2 summarizes earlier discussions during the conference calls.=20=

>=20
> -- HTTP vs. JSON
>=20
> Phil noted that he does not like to use the MAC Token draft as a =
starting point because it does not re-use any of the work done in the =
JOSE working group and in particular all the libraries that are =
available today. He mentioned that earlier attempts to write the MAC =
Token code lead to problems for implementers.=20
>=20
> Justin responded that he does not agree with using JSON as a transport =
mechanism since this would replicate a SOAP style.=20
>=20
> Phil noted that he wants to send JSON but the signature shall be =
computed over the HTTP header field.=20
>=20
> -- Flexibility for the keyed message digest computation
>=20
> =46rom earlier discussion it was clear that the conference call =
participants wanted more flexibility regarding the keyed message digest =
computation. For this purpose Hannes presented the DKIM based approach, =
which allows selective header fields to be included in the digest. This =
is shown in slide #4.=20
>=20
> After some discussion the conference call participants thought that =
this would meet their needs. Further investigations would still be =
useful to determine the degree of failed HMAC calculations due to HTTP =
proxies modifying the content.=20
>=20
> -- Key Distribution
>=20
> Hannes presented the open issue regarding the choice of key =
distribution. Slides #6-#8 present three techniques and Hannes asked for =
feedback regarding the preferred style. Justin and others didn't see the =
need to decide on one mechanism - they wanted to keep the choice open. =
Derek indicated that this will not be an acceptable approach. Since the =
resource server and the authorization server may, in the OAuth 2.0 =
framework, be entities produced by different vendors there is an =
interoperability need. Justin responded that he disagrees and that the =
resource server needs to understand the access token and referred to the =
recent draft submission for the token introspection endpoint. Derek =
indicated that the resource server has to understand the content of the =
access token and the token introspection endpoint just pushes the =
problem around: the resource server has to send the access token to the =
authorization server and then the resource server gets the result back =
(which he then a
> gain needs to understand) in order to make a meaningful authorization =
decision.=20
>=20
> Everyone agreed that the client must receive the session key from the =
authorization server and that this approach has to be standardized. It =
was also agreed that this is a common approach among all three key =
distribution mechanisms.
>=20
> Hannes asked the participants to think about their preference.=20
>=20
> The questions regarding key naming and the indication for the intended =
resource server the client wants to talk to have been postponed.=20
>=20
> Ciao
> Hannes
>=20
>=20
> _______________________________________________
> OAuth mailing list
> OAuth@ietf.org
> https://www.ietf.org/mailman/listinfo/oauth
>=20
>=20


From wmills_92105@yahoo.com  Tue Feb 12 02:07:06 2013
Return-Path: <wmills_92105@yahoo.com>
X-Original-To: oauth@ietfa.amsl.com
Delivered-To: oauth@ietfa.amsl.com
Received: from localhost (localhost [127.0.0.1]) by ietfa.amsl.com (Postfix) with ESMTP id 55C8421F8B3B for <oauth@ietfa.amsl.com>; Tue, 12 Feb 2013 02:07:06 -0800 (PST)
X-Virus-Scanned: amavisd-new at amsl.com
X-Spam-Flag: NO
X-Spam-Score: -2.234
X-Spam-Level: 
X-Spam-Status: No, score=-2.234 tagged_above=-999 required=5 tests=[AWL=0.364,  BAYES_00=-2.599, HTML_MESSAGE=0.001]
Received: from mail.ietf.org ([64.170.98.30]) by localhost (ietfa.amsl.com [127.0.0.1]) (amavisd-new, port 10024) with ESMTP id tkZYNo3VdF4P for <oauth@ietfa.amsl.com>; Tue, 12 Feb 2013 02:07:05 -0800 (PST)
Received: from nm8.bullet.mail.bf1.yahoo.com (nm8.bullet.mail.bf1.yahoo.com [98.139.212.167]) by ietfa.amsl.com (Postfix) with SMTP id 01F5F21F8B66 for <oauth@ietf.org>; Tue, 12 Feb 2013 02:06:57 -0800 (PST)
Received: from [98.139.212.149] by nm8.bullet.mail.bf1.yahoo.com with NNFMP; 12 Feb 2013 10:06:56 -0000
Received: from [98.139.212.228] by tm6.bullet.mail.bf1.yahoo.com with NNFMP; 12 Feb 2013 10:06:56 -0000
Received: from [127.0.0.1] by omp1037.mail.bf1.yahoo.com with NNFMP; 12 Feb 2013 10:06:56 -0000
X-Yahoo-Newman-Property: ymail-3
X-Yahoo-Newman-Id: 690584.8029.bm@omp1037.mail.bf1.yahoo.com
Received: (qmail 88477 invoked by uid 60001); 12 Feb 2013 10:06:56 -0000
DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=yahoo.com; s=s1024; t=1360663616; bh=5L5+xRNl6khT0LjFrWtCAGZsYHmuS5frOiXM5/y56no=; h=X-YMail-OSG:Received:X-Rocket-MIMEInfo:X-Mailer:References:Message-ID:Date:From:Reply-To:Subject:To:Cc:In-Reply-To:MIME-Version:Content-Type; b=YOkF3FbWC91yZy7vBhiRHhIZxcILYb53VUHJnkgTwSew7nPm7Z+xdhjcIUl04Bul3mkbrQ6rRa6+ayFZHMy2Xcg1PaWd8sSfG3k8dZFdHrTQ600u3Ss6JiWLJz1AeqwDN2DW0Ylm53J6qRb1M92oljlZQMdvX6kKlpRUOOEj2X4=
DomainKey-Signature: a=rsa-sha1; q=dns; c=nofws; s=s1024; d=yahoo.com; h=X-YMail-OSG:Received:X-Rocket-MIMEInfo:X-Mailer:References:Message-ID:Date:From:Reply-To:Subject:To:Cc:In-Reply-To:MIME-Version:Content-Type; b=ycl6VFw7zJOPGastpL2VdffdLZPKjrUju1jkqc/7KOwqGXp+lvdnoufiZUUcgF3sTLJDhJuIUgEjOhFljevN3im4uKsE7p1EFeTqKc3C0sAMOWoS3ge3mxpDcolgpZbJPN5x+ZdnNsKk4tLSEeeBqnMcNaN05vI6W08Lot/TVps=;
X-YMail-OSG: xGyOi70VM1mAfwZ8TE8PFB2tzmsvyhWPcRg6bwfcZGmCOZe 3cZLIKGe3q_3aPd9eTpdyETdfw3eNdINY2RAGdgOeMHOKRBwNoM1s0sC7AiW GwAyIFGzXGL6md6.3cjgSMbHwk5JUcySS1hxQ9.FP9oNapHIwPj5Hkj6c4Y1 V6bEiIZ6uE.3pH0Tix4SQukeobCQMxT3EO5A.4PnHrGCdumQfgcb9RTDZodT YFnnitwMJE9n3i12bPpZR_RC0ZPJlvmxHIfMXVSe1xvoQICNKG2Bxb62yIj7 hUbmLw4nySgrc62EYxB3pLVhGNiuNqdk1h1UphyDB.fvHCc_R3Az8Q6_Kiuo A6ibbHhlKCdjeI6Qf7kN3eyqU8_EtVF_dRSMY.Z_sog5yyK0eI8BODrTRsvo Sonayf4Jc26_TUNVEfmjxe4U4X335qJji6pUkvBAl3VlKIddOj0x.bzv_QPy 9hxHlN5lURqT0.Afpg2wzpDFkNAHPBViL0a2Tg8CFbwndMQERhmuuA3bKsKu K_7p8N3iHui88QBYxVZ1oOcuftrTblY_vkfyhBeriEA.X6AZb0YVV3XMymB8 Fhgeh5c8tY1TNYoi9JJ.MvLEXP499TNNZokS_0QlcwSbkBlgr9ky0QcDhxdR d8k7f_i0KlJalze6uKCwsB1iayNzE8_bKYt.Ff9FxKgqG
Received: from [209.131.62.115] by web31803.mail.mud.yahoo.com via HTTP; Tue, 12 Feb 2013 02:06:55 PST
X-Rocket-MIMEInfo: 001.001, Rm9yIGtleSBleGNoYW5nZSB0aGF0J3MgdHJ1ZSBmb3Igc3ltbWV0cmljIGtleSwgYnV0IG5vIGtleSBleGNoYW5nZSBpcyByZXF1aXJlZCBmb3IgcHVibGljIGtleSBzaWduaW5nIGJ5IHRoZSBjbGllbnQuCgpUaGVyZSdzIHNvIG1hbnkgcG9zc2liaWxpdGllcyBoZXJlLCBidXQgSSB0aGluayB0aGUgYmVzdCBpcyB0aGF0IHRoZSBrZXkgbWF0ZXJpZWwgaXMgY29udmV5ZWQgaW4gdGhlIHRva2VuLiDCoFRoZSBrZXkgY291bGQgYmUgaW5jbHVkZWQgZGlyZWN0bHksIG9yIGFub3RoZXIgd2F5IHRvIGltcGxlbWUBMAEBAQE-
X-Mailer: YahooMailWebService/0.8.133.508
References: <0573984A-8C11-4960-9BC6-F44D4B664C19@gmx.net> <1360661249.62997.YahooMailNeo@web31803.mail.mud.yahoo.com> <103117A9-0922-4E1A-AC73-D2914743046C@gmx.net>
Message-ID: <1360663615.75403.YahooMailNeo@web31803.mail.mud.yahoo.com>
Date: Tue, 12 Feb 2013 02:06:55 -0800 (PST)
From: William Mills <wmills_92105@yahoo.com>
To: Hannes Tschofenig <hannes.tschofenig@gmx.net>
In-Reply-To: <103117A9-0922-4E1A-AC73-D2914743046C@gmx.net>
MIME-Version: 1.0
Content-Type: multipart/alternative; boundary="1502656925-1766511797-1360663615=:75403"
Cc: IETF oauth WG <oauth@ietf.org>
Subject: Re: [OAUTH-WG] Minutes from the OAuth Design Team Conference Call - 11th February 2013
X-BeenThere: oauth@ietf.org
X-Mailman-Version: 2.1.12
Precedence: list
Reply-To: William Mills <wmills_92105@yahoo.com>
List-Id: OAUTH WG <oauth.ietf.org>
List-Unsubscribe: <https://www.ietf.org/mailman/options/oauth>, <mailto:oauth-request@ietf.org?subject=unsubscribe>
List-Archive: <http://www.ietf.org/mail-archive/web/oauth>
List-Post: <mailto:oauth@ietf.org>
List-Help: <mailto:oauth-request@ietf.org?subject=help>
List-Subscribe: <https://www.ietf.org/mailman/listinfo/oauth>, <mailto:oauth-request@ietf.org?subject=subscribe>
X-List-Received-Date: Tue, 12 Feb 2013 10:07:06 -0000

--1502656925-1766511797-1360663615=:75403
Content-Type: text/plain; charset=iso-8859-1
Content-Transfer-Encoding: quoted-printable

For key exchange that's true for symmetric key, but no key exchange is requ=
ired for public key signing by the client.=0A=0AThere's so many possibiliti=
es here, but I think the best is that the key materiel is conveyed in the t=
oken. =A0The key could be included directly, or another way to implement wo=
uld be that a salt is included in the token and then the secret is some cry=
pto hash of the token contents and a shared secret between the AS and the P=
R. =A0=0A=0AIf we we must pick one I'd say include the signing key as part =
of the encrypted token itself. =A0Completely self contained then.=0A=0A=0A_=
_______________________________=0A From: Hannes Tschofenig <hannes.tschofen=
ig@gmx.net>=0ATo: William Mills <wmills_92105@yahoo.com> =0ACc: Hannes Tsch=
ofenig <hannes.tschofenig@gmx.net>; IETF oauth WG <oauth@ietf.org> =0ASent:=
 Tuesday, February 12, 2013 1:44 AM=0ASubject: Re: [OAUTH-WG] Minutes from =
the OAuth Design Team Conference Call - 11th February 2013=0A =0AHi Bill, =
=0A=0AOn Feb 12, 2013, at 11:27 AM, William Mills wrote:=0A=0A> Is key dist=
ribution how AS and PR share keys=A0 for token encryption/decryption or spe=
cifically about the keys for the HOK tokens?=0A> =0AIn order for the client=
 to compute the keyed message digest it needs to have the session key. This=
 session key is sent from the authorization server to the client and everyo=
ne on the call agreed that this has to be standardized. =0A=0AThe resource =
server who receives the message from the client also needs to have the sess=
ion key to verify the message. How the resource server obtains this session=
 key was subject for some discussion on the call. I presented three differe=
nt ways of how the resource server is able to obtain that key. We have to d=
ecide on one mandatory-to-implement mechanism. The open issue is which one?=
 =0A=0A> For the MAC token spec, I don't actually care whether we use JSON =
or now, but I'm in full agreement that we do NOT duplicate any HTTP info in=
to the JSON.=A0 Just signatures of that stuff.=0A> =0AI believe the folks o=
n the call also agreed with you on that aspect that the content of the HTTP=
 message should not be replicated in the JSON payload itself. =0A=0ACiao=0A=
Hannes=0A=0A> From: Hannes Tschofenig <hannes.tschofenig@gmx.net>=0A> To: I=
ETF oauth WG <oauth@ietf.org> =0A> Sent: Tuesday, February 12, 2013 1:10 AM=
=0A> Subject: [OAUTH-WG] Minutes from the OAuth Design Team Conference Call=
 - 11th February 2013=0A> =0A> Here are my notes. =0A> =0A> Participants:=
=0A> =0A> * John Bradley=0A> * Derek Atkins=0A> * Phil Hunt=0A> * Prateek M=
ishra=0A> * Hannes Tschofenig=0A> * Mike Jones=0A> * Antonio Sanso=0A> * Ju=
stin Richer=0A> =0A> Notes: =0A> =0A> My slides are available here: http://=
www.tschofenig.priv.at/OAuth2-Security-11Feb2013.ppt=0A> =0A> Slide #2 summ=
arizes earlier discussions during the conference calls. =0A> =0A> -- HTTP v=
s. JSON=0A> =0A> Phil noted that he does not like to use the MAC Token draf=
t as a starting point because it does not re-use any of the work done in th=
e JOSE working group and in particular all the libraries that are available=
 today. He mentioned that earlier attempts to write the MAC Token code lead=
 to problems for implementers. =0A> =0A> Justin responded that he does not =
agree with using JSON as a transport mechanism since this would replicate a=
 SOAP style. =0A> =0A> Phil noted that he wants to send JSON but the signat=
ure shall be computed over the HTTP header field. =0A> =0A> -- Flexibility =
for the keyed message digest computation=0A> =0A> From earlier discussion i=
t was clear that the conference call participants wanted more flexibility r=
egarding the keyed message digest computation. For this purpose Hannes pres=
ented the DKIM based approach, which allows selective header fields to be i=
ncluded in the digest. This is shown in slide #4. =0A> =0A> After some disc=
ussion the conference call participants thought that this would meet their =
needs. Further investigations would still be useful to determine the degree=
 of failed HMAC calculations due to HTTP proxies modifying the content. =0A=
> =0A> -- Key Distribution=0A> =0A> Hannes presented the open issue regardi=
ng the choice of key distribution. Slides #6-#8 present three techniques an=
d Hannes asked for feedback regarding the preferred style. Justin and other=
s didn't see the need to decide on one mechanism - they wanted to keep the =
choice open. Derek indicated that this will not be an acceptable approach. =
Since the resource server and the authorization server may, in the OAuth 2.=
0 framework, be entities produced by different vendors there is an interope=
rability need. Justin responded that he disagrees and that the resource ser=
ver needs to understand the access token and referred to the recent draft s=
ubmission for the token introspection endpoint. Derek indicated that the re=
source server has to understand the content of the access token and the tok=
en introspection endpoint just pushes the problem around: the resource serv=
er has to send the access token to the authorization server and then the re=
source server gets the
 result back (which he then a=0A> gain needs to understand) in order to mak=
e a meaningful authorization decision. =0A> =0A> Everyone agreed that the c=
lient must receive the session key from the authorization server and that t=
his approach has to be standardized. It was also agreed that this is a comm=
on approach among all three key distribution mechanisms.=0A> =0A> Hannes as=
ked the participants to think about their preference. =0A> =0A> The questio=
ns regarding key naming and the indication for the intended resource server=
 the client wants to talk to have been postponed. =0A> =0A> Ciao=0A> Hannes=
=0A> =0A> =0A> _______________________________________________=0A> OAuth ma=
iling list=0A> OAuth@ietf.org=0A> https://www.ietf.org/mailman/listinfo/oau=
th=0A> =0A> 
--1502656925-1766511797-1360663615=:75403
Content-Type: text/html; charset=iso-8859-1
Content-Transfer-Encoding: quoted-printable

<html><body><div style=3D"color:#000; background-color:#fff; font-family:Co=
urier New, courier, monaco, monospace, sans-serif;font-size:12pt"><div>For =
key exchange that's true for symmetric key, but no key exchange is required=
 for public key signing by the client.</div><div><br></div><div style=3D"co=
lor: rgb(0, 0, 0); font-size: 16px; font-family: 'Courier New', courier, mo=
naco, monospace, sans-serif; background-color: transparent; font-style: nor=
mal;">There's so many possibilities here, but I think the best is that the =
key materiel is conveyed in the token. &nbsp;The key could be included dire=
ctly, or another way to implement would be that a salt is included in the t=
oken and then the secret is some crypto hash of the token contents and a sh=
ared secret between the AS and the PR. &nbsp;</div><div style=3D"color: rgb=
(0, 0, 0); font-size: 16px; font-family: 'Courier New', courier, monaco, mo=
nospace, sans-serif; background-color: transparent; font-style:
 normal;"><br></div><div style=3D"color: rgb(0, 0, 0); font-size: 16px; fon=
t-family: 'Courier New', courier, monaco, monospace, sans-serif; background=
-color: transparent; font-style: normal;">If we we must pick one I'd say in=
clude the signing key as part of the encrypted token itself. &nbsp;Complete=
ly self contained then.</div><div><br></div>  <div style=3D"font-family: 'C=
ourier New', courier, monaco, monospace, sans-serif; font-size: 12pt;"> <di=
v style=3D"font-family: 'times new roman', 'new york', times, serif; font-s=
ize: 12pt;"> <div dir=3D"ltr"> <font size=3D"2" face=3D"Arial"> <hr size=3D=
"1">  <b><span style=3D"font-weight:bold;">From:</span></b> Hannes Tschofen=
ig &lt;hannes.tschofenig@gmx.net&gt;<br> <b><span style=3D"font-weight: bol=
d;">To:</span></b> William Mills &lt;wmills_92105@yahoo.com&gt; <br><b><spa=
n style=3D"font-weight: bold;">Cc:</span></b> Hannes Tschofenig &lt;hannes.=
tschofenig@gmx.net&gt;; IETF oauth WG &lt;oauth@ietf.org&gt; <br> <b><span
 style=3D"font-weight: bold;">Sent:</span></b> Tuesday, February 12, 2013 1=
:44 AM<br> <b><span style=3D"font-weight: bold;">Subject:</span></b> Re: [O=
AUTH-WG] Minutes from the OAuth Design Team Conference Call - 11th February=
 2013<br> </font> </div> <br>=0AHi Bill, <br><br>On Feb 12, 2013, at 11:27 =
AM, William Mills wrote:<br><br>&gt; Is key distribution how AS and PR shar=
e keys&nbsp; for token encryption/decryption or specifically about the keys=
 for the HOK tokens?<br>&gt; <br>In order for the client to compute the key=
ed message digest it needs to have the session key. This session key is sen=
t from the authorization server to the client and everyone on the call agre=
ed that this has to be standardized. <br><br>The resource server who receiv=
es the message from the client also needs to have the session key to verify=
 the message. How the resource server obtains this session key was subject =
for some discussion on the call. I presented three different ways of how th=
e resource server is able to obtain that key. We have to decide on one mand=
atory-to-implement mechanism. The open issue is which one? <br> <br>&gt; Fo=
r the MAC token spec, I don't actually care whether we use JSON or now, but=
 I'm in full agreement
 that we do NOT duplicate any HTTP info into the JSON.&nbsp; Just signature=
s of that stuff.<br>&gt; <br>I believe the folks on the call also agreed wi=
th you on that aspect that the content of the HTTP message should not be re=
plicated in the JSON payload itself. <br><br>Ciao<br>Hannes<br><br>&gt; Fro=
m: Hannes Tschofenig &lt;<a ymailto=3D"mailto:hannes.tschofenig@gmx.net" hr=
ef=3D"mailto:hannes.tschofenig@gmx.net">hannes.tschofenig@gmx.net</a>&gt;<b=
r>&gt; To: IETF oauth WG &lt;<a ymailto=3D"mailto:oauth@ietf.org" href=3D"m=
ailto:oauth@ietf.org">oauth@ietf.org</a>&gt; <br>&gt; Sent: Tuesday, Februa=
ry 12, 2013 1:10 AM<br>&gt; Subject: [OAUTH-WG] Minutes from the OAuth Desi=
gn Team Conference Call - 11th February 2013<br>&gt; <br>&gt; Here are my n=
otes. <br>&gt; <br>&gt; Participants:<br>&gt; <br>&gt; * John Bradley<br>&g=
t; * Derek Atkins<br>&gt; * Phil Hunt<br>&gt; * Prateek Mishra<br>&gt; * Ha=
nnes Tschofenig<br>&gt; * Mike Jones<br>&gt; * Antonio Sanso<br>&gt; *
 Justin Richer<br>&gt; <br>&gt; Notes: <br>&gt; <br>&gt; My slides are avai=
lable here: http://www.tschofenig.priv.at/OAuth2-Security-11Feb2013.ppt<br>=
&gt; <br>&gt; Slide #2 summarizes earlier discussions during the conference=
 calls. <br>&gt; <br>&gt; -- HTTP vs. JSON<br>&gt; <br>&gt; Phil noted that=
 he does not like to use the MAC Token draft as a starting point because it=
 does not re-use any of the work done in the JOSE working group and in part=
icular all the libraries that are available today. He mentioned that earlie=
r attempts to write the MAC Token code lead to problems for implementers. <=
br>&gt; <br>&gt; Justin responded that he does not agree with using JSON as=
 a transport mechanism since this would replicate a SOAP style. <br>&gt; <b=
r>&gt; Phil noted that he wants to send JSON but the signature shall be com=
puted over the HTTP header field. <br>&gt; <br>&gt; -- Flexibility for the =
keyed message digest computation<br>&gt; <br>&gt; From earlier
 discussion it was clear that the conference call participants wanted more =
flexibility regarding the keyed message digest computation. For this purpos=
e Hannes presented the DKIM based approach, which allows selective header f=
ields to be included in the digest. This is shown in slide #4. <br>&gt; <br=
>&gt; After some discussion the conference call participants thought that t=
his would meet their needs. Further investigations would still be useful to=
 determine the degree of failed HMAC calculations due to HTTP proxies modif=
ying the content. <br>&gt; <br>&gt; -- Key Distribution<br>&gt; <br>&gt; Ha=
nnes presented the open issue regarding the choice of key distribution. Sli=
des #6-#8 present three techniques and Hannes asked for feedback regarding =
the preferred style. Justin and others didn't see the need to decide on one=
 mechanism - they wanted to keep the choice open. Derek indicated that this=
 will not be an acceptable approach. Since the resource server and
 the authorization server may, in the OAuth 2.0 framework, be entities prod=
uced by different vendors there is an interoperability need. Justin respond=
ed that he disagrees and that the resource server needs to understand the a=
ccess token and referred to the recent draft submission for the token intro=
spection endpoint. Derek indicated that the resource server has to understa=
nd the content of the access token and the token introspection endpoint jus=
t pushes the problem around: the resource server has to send the access tok=
en to the authorization server and then the resource server gets the result=
 back (which he then a<br>&gt; gain needs to understand) in order to make a=
 meaningful authorization decision. <br>&gt; <br>&gt; Everyone agreed that =
the client must receive the session key from the authorization server and t=
hat this approach has to be standardized. It was also agreed that this is a=
 common approach among all three key distribution
 mechanisms.<br>&gt; <br>&gt; Hannes asked the participants to think about =
their preference. <br>&gt; <br>&gt; The questions regarding key naming and =
the indication for the intended resource server the client wants to talk to=
 have been postponed. <br>&gt; <br>&gt; Ciao<br>&gt; Hannes<br>&gt; <br>&gt=
; <br>&gt; _______________________________________________<br>&gt; OAuth ma=
iling list<br>&gt; <a ymailto=3D"mailto:OAuth@ietf.org" href=3D"mailto:OAut=
h@ietf.org">OAuth@ietf.org</a><br>&gt; <a href=3D"https://www.ietf.org/mail=
man/listinfo/oauth" target=3D"_blank">https://www.ietf.org/mailman/listinfo=
/oauth</a><br>&gt; <br>&gt; <br><br><br><br> </div> </div>  </div></body></=
html>
--1502656925-1766511797-1360663615=:75403--

From asanso@adobe.com  Tue Feb 12 02:29:27 2013
Return-Path: <asanso@adobe.com>
X-Original-To: oauth@ietfa.amsl.com
Delivered-To: oauth@ietfa.amsl.com
Received: from localhost (localhost [127.0.0.1]) by ietfa.amsl.com (Postfix) with ESMTP id 0306721F8C0C for <oauth@ietfa.amsl.com>; Tue, 12 Feb 2013 02:29:27 -0800 (PST)
X-Virus-Scanned: amavisd-new at amsl.com
X-Spam-Flag: NO
X-Spam-Score: -106.599
X-Spam-Level: 
X-Spam-Status: No, score=-106.599 tagged_above=-999 required=5 tests=[AWL=0.001, BAYES_00=-2.599, RCVD_IN_DNSWL_MED=-4, USER_IN_WHITELIST=-100]
Received: from mail.ietf.org ([64.170.98.30]) by localhost (ietfa.amsl.com [127.0.0.1]) (amavisd-new, port 10024) with ESMTP id GpiuFvfOn+Uq for <oauth@ietfa.amsl.com>; Tue, 12 Feb 2013 02:29:25 -0800 (PST)
Received: from exprod6og117.obsmtp.com (exprod6og117.obsmtp.com [64.18.1.39]) by ietfa.amsl.com (Postfix) with ESMTP id 3C1A321F8BC9 for <oauth@ietf.org>; Tue, 12 Feb 2013 02:29:22 -0800 (PST)
Received: from outbound-smtp-2.corp.adobe.com ([193.104.215.16]) by exprod6ob117.postini.com ([64.18.5.12]) with SMTP ID DSNKURoZgp/Ga2HDYIiod18IBS9RH7zShTvC@postini.com; Tue, 12 Feb 2013 02:29:25 PST
Received: from inner-relay-4.eur.adobe.com (inner-relay-4b [10.128.4.237]) by outbound-smtp-2.corp.adobe.com (8.12.10/8.12.10) with ESMTP id r1CATLC9027794; Tue, 12 Feb 2013 02:29:21 -0800 (PST)
Received: from nahub02.corp.adobe.com (nahub02.corp.adobe.com [10.8.189.98]) by inner-relay-4.eur.adobe.com (8.12.10/8.12.9) with ESMTP id r1CAT2XO000223; Tue, 12 Feb 2013 02:29:21 -0800 (PST)
Received: from eurcas01.eur.adobe.com (10.128.4.27) by nahub02.corp.adobe.com (10.8.189.98) with Microsoft SMTP Server (TLS) id 8.3.297.1; Tue, 12 Feb 2013 02:29:02 -0800
Received: from eurmbx01.eur.adobe.com ([10.128.4.32]) by eurcas01.eur.adobe.com ([10.128.4.27]) with mapi; Tue, 12 Feb 2013 10:28:58 +0000
From: Antonio Sanso <asanso@adobe.com>
To: Hannes Tschofenig <hannes.tschofenig@gmx.net>
Date: Tue, 12 Feb 2013 10:28:56 +0000
Thread-Topic: [OAUTH-WG] Minutes from the OAuth Design Team Conference Call -	11th February 2013
Thread-Index: Ac4JC8N9QrHStA4xRQScTTHKdGjVDw==
Message-ID: <ACC68AA9-F53B-4AA1-ACD5-462DE67A6B6E@adobe.com>
References: <0573984A-8C11-4960-9BC6-F44D4B664C19@gmx.net> <1360661249.62997.YahooMailNeo@web31803.mail.mud.yahoo.com> <103117A9-0922-4E1A-AC73-D2914743046C@gmx.net>
In-Reply-To: <103117A9-0922-4E1A-AC73-D2914743046C@gmx.net>
Accept-Language: en-US
Content-Language: en-US
X-MS-Has-Attach: 
X-MS-TNEF-Correlator: 
acceptlanguage: en-US
Content-Type: text/plain; charset="us-ascii"
Content-Transfer-Encoding: quoted-printable
MIME-Version: 1.0
Cc: IETF oauth WG <oauth@ietf.org>
Subject: Re: [OAUTH-WG] Minutes from the OAuth Design Team Conference Call -	11th February 2013
X-BeenThere: oauth@ietf.org
X-Mailman-Version: 2.1.12
Precedence: list
List-Id: OAUTH WG <oauth.ietf.org>
List-Unsubscribe: <https://www.ietf.org/mailman/options/oauth>, <mailto:oauth-request@ietf.org?subject=unsubscribe>
List-Archive: <http://www.ietf.org/mail-archive/web/oauth>
List-Post: <mailto:oauth@ietf.org>
List-Help: <mailto:oauth-request@ietf.org?subject=help>
List-Subscribe: <https://www.ietf.org/mailman/listinfo/oauth>, <mailto:oauth-request@ietf.org?subject=subscribe>
X-List-Received-Date: Tue, 12 Feb 2013 10:29:27 -0000

Hi Hannes,

how this session key "differs" from the key described in the current draft =
[0]?

Thanks and regards

Antonio

[0] http://tools.ietf.org/html/draft-ietf-oauth-v2-http-mac-02

On Feb 12, 2013, at 10:44 AM, Hannes Tschofenig wrote:

> Hi Bill,=20
>=20
> On Feb 12, 2013, at 11:27 AM, William Mills wrote:
>=20
>> Is key distribution how AS and PR share keys  for token encryption/decry=
ption or specifically about the keys for the HOK tokens?
>>=20
> In order for the client to compute the keyed message digest it needs to h=
ave the session key. This session key is sent from the authorization server=
 to the client and everyone on the call agreed that this has to be standard=
ized.=20
>=20
> The resource server who receives the message from the client also needs t=
o have the session key to verify the message. How the resource server obtai=
ns this session key was subject for some discussion on the call. I presente=
d three different ways of how the resource server is able to obtain that ke=
y. We have to decide on one mandatory-to-implement mechanism. The open issu=
e is which one?=20
>=20
>> For the MAC token spec, I don't actually care whether we use JSON or now=
, but I'm in full agreement that we do NOT duplicate any HTTP info into the=
 JSON.  Just signatures of that stuff.
>>=20
> I believe the folks on the call also agreed with you on that aspect that =
the content of the HTTP message should not be replicated in the JSON payloa=
d itself.=20
>=20
> Ciao
> Hannes
>=20
>> From: Hannes Tschofenig <hannes.tschofenig@gmx.net>
>> To: IETF oauth WG <oauth@ietf.org>=20
>> Sent: Tuesday, February 12, 2013 1:10 AM
>> Subject: [OAUTH-WG] Minutes from the OAuth Design Team Conference Call -=
 11th February 2013
>>=20
>> Here are my notes.=20
>>=20
>> Participants:
>>=20
>> * John Bradley
>> * Derek Atkins
>> * Phil Hunt
>> * Prateek Mishra
>> * Hannes Tschofenig
>> * Mike Jones
>> * Antonio Sanso
>> * Justin Richer
>>=20
>> Notes:=20
>>=20
>> My slides are available here: http://www.tschofenig.priv.at/OAuth2-Secur=
ity-11Feb2013.ppt
>>=20
>> Slide #2 summarizes earlier discussions during the conference calls.=20
>>=20
>> -- HTTP vs. JSON
>>=20
>> Phil noted that he does not like to use the MAC Token draft as a startin=
g point because it does not re-use any of the work done in the JOSE working=
 group and in particular all the libraries that are available today. He men=
tioned that earlier attempts to write the MAC Token code lead to problems f=
or implementers.=20
>>=20
>> Justin responded that he does not agree with using JSON as a transport m=
echanism since this would replicate a SOAP style.=20
>>=20
>> Phil noted that he wants to send JSON but the signature shall be compute=
d over the HTTP header field.=20
>>=20
>> -- Flexibility for the keyed message digest computation
>>=20
>> From earlier discussion it was clear that the conference call participan=
ts wanted more flexibility regarding the keyed message digest computation. =
For this purpose Hannes presented the DKIM based approach, which allows sel=
ective header fields to be included in the digest. This is shown in slide #=
4.=20
>>=20
>> After some discussion the conference call participants thought that this=
 would meet their needs. Further investigations would still be useful to de=
termine the degree of failed HMAC calculations due to HTTP proxies modifyin=
g the content.=20
>>=20
>> -- Key Distribution
>>=20
>> Hannes presented the open issue regarding the choice of key distribution=
. Slides #6-#8 present three techniques and Hannes asked for feedback regar=
ding the preferred style. Justin and others didn't see the need to decide o=
n one mechanism - they wanted to keep the choice open. Derek indicated that=
 this will not be an acceptable approach. Since the resource server and the=
 authorization server may, in the OAuth 2.0 framework, be entities produced=
 by different vendors there is an interoperability need. Justin responded t=
hat he disagrees and that the resource server needs to understand the acces=
s token and referred to the recent draft submission for the token introspec=
tion endpoint. Derek indicated that the resource server has to understand t=
he content of the access token and the token introspection endpoint just pu=
shes the problem around: the resource server has to send the access token t=
o the authorization server and then the resource server gets the result bac=
k (which he then
>  a
>> gain needs to understand) in order to make a meaningful authorization de=
cision.=20
>>=20
>> Everyone agreed that the client must receive the session key from the au=
thorization server and that this approach has to be standardized. It was al=
so agreed that this is a common approach among all three key distribution m=
echanisms.
>>=20
>> Hannes asked the participants to think about their preference.=20
>>=20
>> The questions regarding key naming and the indication for the intended r=
esource server the client wants to talk to have been postponed.=20
>>=20
>> Ciao
>> Hannes
>>=20
>>=20
>> _______________________________________________
>> OAuth mailing list
>> OAuth@ietf.org
>> https://www.ietf.org/mailman/listinfo/oauth
>>=20
>>=20
>=20
> _______________________________________________
> OAuth mailing list
> OAuth@ietf.org
> https://www.ietf.org/mailman/listinfo/oauth


From sberyozkin@gmail.com  Tue Feb 12 02:37:50 2013
Return-Path: <sberyozkin@gmail.com>
X-Original-To: oauth@ietfa.amsl.com
Delivered-To: oauth@ietfa.amsl.com
Received: from localhost (localhost [127.0.0.1]) by ietfa.amsl.com (Postfix) with ESMTP id 6262E21F8778 for <oauth@ietfa.amsl.com>; Tue, 12 Feb 2013 02:37:50 -0800 (PST)
X-Virus-Scanned: amavisd-new at amsl.com
X-Spam-Flag: NO
X-Spam-Score: -3.599
X-Spam-Level: 
X-Spam-Status: No, score=-3.599 tagged_above=-999 required=5 tests=[BAYES_00=-2.599, RCVD_IN_DNSWL_LOW=-1]
Received: from mail.ietf.org ([64.170.98.30]) by localhost (ietfa.amsl.com [127.0.0.1]) (amavisd-new, port 10024) with ESMTP id 33yPygpFfiJR for <oauth@ietfa.amsl.com>; Tue, 12 Feb 2013 02:37:49 -0800 (PST)
Received: from mail-ea0-f174.google.com (mail-ea0-f174.google.com [209.85.215.174]) by ietfa.amsl.com (Postfix) with ESMTP id 5074D21F867D for <oauth@ietf.org>; Tue, 12 Feb 2013 02:37:49 -0800 (PST)
Received: by mail-ea0-f174.google.com with SMTP id 1so87636eaa.5 for <oauth@ietf.org>; Tue, 12 Feb 2013 02:37:48 -0800 (PST)
DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=gmail.com; s=20120113; h=x-received:message-id:date:from:user-agent:mime-version:to:subject :references:in-reply-to:content-type:content-transfer-encoding; bh=dHUQE2KGB7b9JmFX9a8P2VXoGU6Mh9c/LNP/PAc+PrU=; b=xK69HB7wmSyUWi5j9hNo/2YUhzKzoKIJ6WBn79a3a09Jq/7XdePzktBemLK86rKMBj 5g9A9RELFeUzOKtY9zCIwaogD/PZG2rNmsYWWl634J/ADTRNRlpCjXUAom+GZ32y5rUe sRFtgVcta85NPZXZ6ZLxDR79XDILBqMFeL/wyvZlWFkAMmoXP21+xE6WEKlMyAwXgT0o Dxu4mH3+oUMRkbk0r5LKgcS2ThYF50FPooV3UfAaam7hzrkVWWMht2oJ2Hb1cFe1n5cR gSyuncpyeSXm9DjPsz0ZIrjM7CD/Lxu+yjIcPBCwToPlerghQDD1LqnPgsqTBoy6ZJfY bTLw==
X-Received: by 10.14.193.198 with SMTP id k46mr60842721een.40.1360665468261; Tue, 12 Feb 2013 02:37:48 -0800 (PST)
Received: from [10.36.226.5] ([217.173.99.61]) by mx.google.com with ESMTPS id 44sm67090960eek.5.2013.02.12.02.37.46 (version=TLSv1 cipher=ECDHE-RSA-RC4-SHA bits=128/128); Tue, 12 Feb 2013 02:37:47 -0800 (PST)
Message-ID: <511A1B78.1050107@gmail.com>
Date: Tue, 12 Feb 2013 10:37:44 +0000
From: Sergey Beryozkin <sberyozkin@gmail.com>
User-Agent: Mozilla/5.0 (X11; Linux x86_64; rv:12.0) Gecko/20120430 Thunderbird/12.0.1
MIME-Version: 1.0
To: oauth@ietf.org
References: <0573984A-8C11-4960-9BC6-F44D4B664C19@gmx.net>
In-Reply-To: <0573984A-8C11-4960-9BC6-F44D4B664C19@gmx.net>
Content-Type: text/plain; charset=ISO-8859-1; format=flowed
Content-Transfer-Encoding: 7bit
Subject: Re: [OAUTH-WG] Minutes from the OAuth Design Team Conference Call - 11th February 2013
X-BeenThere: oauth@ietf.org
X-Mailman-Version: 2.1.12
Precedence: list
List-Id: OAUTH WG <oauth.ietf.org>
List-Unsubscribe: <https://www.ietf.org/mailman/options/oauth>, <mailto:oauth-request@ietf.org?subject=unsubscribe>
List-Archive: <http://www.ietf.org/mail-archive/web/oauth>
List-Post: <mailto:oauth@ietf.org>
List-Help: <mailto:oauth-request@ietf.org?subject=help>
List-Subscribe: <https://www.ietf.org/mailman/listinfo/oauth>, <mailto:oauth-request@ietf.org?subject=subscribe>
X-List-Received-Date: Tue, 12 Feb 2013 10:37:50 -0000

Hi Hannes, All,
On 12/02/13 09:10, Hannes Tschofenig wrote:
> Here are my notes.
>
> Participants:
>
> * John Bradley
> * Derek Atkins
> * Phil Hunt
> * Prateek Mishra
> * Hannes Tschofenig
> * Mike Jones
> * Antonio Sanso
> * Justin Richer
>
> Notes:
>
> My slides are available here: http://www.tschofenig.priv.at/OAuth2-Security-11Feb2013.ppt
>
> Slide #2 summarizes earlier discussions during the conference calls.
>
> -- HTTP vs. JSON
>
> Phil noted that he does not like to use the MAC Token draft as a starting point because it does not re-use any of the work done in the JOSE working group and in particular all the libraries that are available today. He mentioned that earlier attempts to write the MAC Token code lead to problems for implementers.
>

I'm concerned that the argument about the arguable absence of utilities 
for processing MAC tokens; it is obvious it is simpler to process MAC 
than more involved tokens and to be honest it is really not a point at 
all as the utility of a given token type should be judged on what it can 
bring to the whole system as opposed to whether it can be simpler or not 
to implement it - apologies if I've misread the above note and/or taken 
it out of context

Thanks, Sergey

> Justin responded that he does not agree with using JSON as a transport mechanism since this would replicate a SOAP style.
>
> Phil noted that he wants to send JSON but the signature shall be computed over the HTTP header field.
>
> -- Flexibility for the keyed message digest computation
>
>  From earlier discussion it was clear that the conference call participants wanted more flexibility regarding the keyed message digest computation. For this purpose Hannes presented the DKIM based approach, which allows selective header fields to be included in the digest. This is shown in slide #4.
>
> After some discussion the conference call participants thought that this would meet their needs. Further investigations would still be useful to determine the degree of failed HMAC calculations due to HTTP proxies modifying the content.
>
> -- Key Distribution
>
> Hannes presented the open issue regarding the choice of key distribution. Slides #6-#8 present three techniques and Hannes asked for feedback regarding the preferred style. Justin and others didn't see the need to decide on one mechanism - they wanted to keep the choice open. Derek indicated that this will not be an acceptable approach. Since the resource server and the authorization server may, in the OAuth 2.0 framework, be entities produced by different vendors there is an interoperability need. Justin responded that he disagrees and that the resource server needs to understand the access token and referred to the recent draft submission for the token introspection endpoint. Derek indicated that the resource server has to understand the content of the access token and the token introspection endpoint just pushes the problem around: the resource server has to send the access token to the authorization server and then the resource server gets the result back (which he then
  a
>   gain needs to understand) in order to make a meaningful authorization decision.
>
> Everyone agreed that the client must receive the session key from the authorization server and that this approach has to be standardized. It was also agreed that this is a common approach among all three key distribution mechanisms.
>
> Hannes asked the participants to think about their preference.
>
> The questions regarding key naming and the indication for the intended resource server the client wants to talk to have been postponed.
>
> Ciao
> Hannes
>
>
> _______________________________________________
> OAuth mailing list
> OAuth@ietf.org
> https://www.ietf.org/mailman/listinfo/oauth



From hannes.tschofenig@gmx.net  Tue Feb 12 03:06:56 2013
Return-Path: <hannes.tschofenig@gmx.net>
X-Original-To: oauth@ietfa.amsl.com
Delivered-To: oauth@ietfa.amsl.com
Received: from localhost (localhost [127.0.0.1]) by ietfa.amsl.com (Postfix) with ESMTP id 4E7CE21F8CEE for <oauth@ietfa.amsl.com>; Tue, 12 Feb 2013 03:06:56 -0800 (PST)
X-Virus-Scanned: amavisd-new at amsl.com
X-Spam-Flag: NO
X-Spam-Score: -100.811
X-Spam-Level: 
X-Spam-Status: No, score=-100.811 tagged_above=-999 required=5 tests=[AWL=-0.791, BAYES_00=-2.599, RCVD_IN_BL_SPAMCOP_NET=1.96, RCVD_IN_SORBS_WEB=0.619, USER_IN_WHITELIST=-100]
Received: from mail.ietf.org ([64.170.98.30]) by localhost (ietfa.amsl.com [127.0.0.1]) (amavisd-new, port 10024) with ESMTP id lTdt+FgvOaQ3 for <oauth@ietfa.amsl.com>; Tue, 12 Feb 2013 03:06:55 -0800 (PST)
Received: from mout.gmx.net (mout.gmx.net [212.227.15.19]) by ietfa.amsl.com (Postfix) with ESMTP id 5349F21F8CEB for <oauth@ietf.org>; Tue, 12 Feb 2013 03:06:55 -0800 (PST)
Received: from mailout-de.gmx.net ([10.1.76.31]) by mrigmx.server.lan (mrigmx002) with ESMTP (Nemesis) id 0MQsi0-1UU0t52N4g-00UJkh for <oauth@ietf.org>; Tue, 12 Feb 2013 12:06:49 +0100
Received: (qmail invoked by alias); 12 Feb 2013 11:06:49 -0000
Received: from unknown (EHLO [10.255.128.222]) [194.251.119.201] by mail.gmx.net (mp031) with SMTP; 12 Feb 2013 12:06:49 +0100
X-Authenticated: #29516787
X-Provags-ID: V01U2FsdGVkX19RmZFAfAFRbTwPAPS3hOwR36d8F40YwnE1EVeK1o QyFcuiKehgCR66
Mime-Version: 1.0 (Apple Message framework v1085)
Content-Type: text/plain; charset=us-ascii
From: Hannes Tschofenig <hannes.tschofenig@gmx.net>
In-Reply-To: <ACC68AA9-F53B-4AA1-ACD5-462DE67A6B6E@adobe.com>
Date: Tue, 12 Feb 2013 13:06:47 +0200
Content-Transfer-Encoding: quoted-printable
Message-Id: <49D2CAF1-61AE-4DEB-A59D-D3F8F6D9C701@gmx.net>
References: <0573984A-8C11-4960-9BC6-F44D4B664C19@gmx.net> <1360661249.62997.YahooMailNeo@web31803.mail.mud.yahoo.com> <103117A9-0922-4E1A-AC73-D2914743046C@gmx.net> <ACC68AA9-F53B-4AA1-ACD5-462DE67A6B6E@adobe.com>
To: Antonio Sanso <asanso@adobe.com>
X-Mailer: Apple Mail (2.1085)
X-Y-GMX-Trusted: 0
Cc: IETF oauth WG <oauth@ietf.org>
Subject: Re: [OAUTH-WG] Minutes from the OAuth Design Team Conference Call - 11th February 2013
X-BeenThere: oauth@ietf.org
X-Mailman-Version: 2.1.12
Precedence: list
List-Id: OAUTH WG <oauth.ietf.org>
List-Unsubscribe: <https://www.ietf.org/mailman/options/oauth>, <mailto:oauth-request@ietf.org?subject=unsubscribe>
List-Archive: <http://www.ietf.org/mail-archive/web/oauth>
List-Post: <mailto:oauth@ietf.org>
List-Help: <mailto:oauth-request@ietf.org?subject=help>
List-Subscribe: <https://www.ietf.org/mailman/listinfo/oauth>, <mailto:oauth-request@ietf.org?subject=subscribe>
X-List-Received-Date: Tue, 12 Feb 2013 11:06:56 -0000

The transport of the session key from the authorization server is =
described in Section 5.1 and is called "mac_key".=20

The mechanism to transport the session key from the authorization server =
to the resource server is not yet described in the document. This has =
historical reasons: OAuth 1.0 did not separate the authorization server =
from the resource server in the way OAuth 2.0 does.

Ciao
Hannes

On Feb 12, 2013, at 12:28 PM, Antonio Sanso wrote:

> Hi Hannes,
>=20
> how this session key "differs" from the key described in the current =
draft [0]?
>=20
> Thanks and regards
>=20
> Antonio
>=20
> [0] http://tools.ietf.org/html/draft-ietf-oauth-v2-http-mac-02
>=20
> On Feb 12, 2013, at 10:44 AM, Hannes Tschofenig wrote:
>=20
>> Hi Bill,=20
>>=20
>> On Feb 12, 2013, at 11:27 AM, William Mills wrote:
>>=20
>>> Is key distribution how AS and PR share keys  for token =
encryption/decryption or specifically about the keys for the HOK tokens?
>>>=20
>> In order for the client to compute the keyed message digest it needs =
to have the session key. This session key is sent from the authorization =
server to the client and everyone on the call agreed that this has to be =
standardized.=20
>>=20
>> The resource server who receives the message from the client also =
needs to have the session key to verify the message. How the resource =
server obtains this session key was subject for some discussion on the =
call. I presented three different ways of how the resource server is =
able to obtain that key. We have to decide on one mandatory-to-implement =
mechanism. The open issue is which one?=20
>>=20
>>> For the MAC token spec, I don't actually care whether we use JSON or =
now, but I'm in full agreement that we do NOT duplicate any HTTP info =
into the JSON.  Just signatures of that stuff.
>>>=20
>> I believe the folks on the call also agreed with you on that aspect =
that the content of the HTTP message should not be replicated in the =
JSON payload itself.=20
>>=20
>> Ciao
>> Hannes
>>=20
>>> From: Hannes Tschofenig <hannes.tschofenig@gmx.net>
>>> To: IETF oauth WG <oauth@ietf.org>=20
>>> Sent: Tuesday, February 12, 2013 1:10 AM
>>> Subject: [OAUTH-WG] Minutes from the OAuth Design Team Conference =
Call - 11th February 2013
>>>=20
>>> Here are my notes.=20
>>>=20
>>> Participants:
>>>=20
>>> * John Bradley
>>> * Derek Atkins
>>> * Phil Hunt
>>> * Prateek Mishra
>>> * Hannes Tschofenig
>>> * Mike Jones
>>> * Antonio Sanso
>>> * Justin Richer
>>>=20
>>> Notes:=20
>>>=20
>>> My slides are available here: =
http://www.tschofenig.priv.at/OAuth2-Security-11Feb2013.ppt
>>>=20
>>> Slide #2 summarizes earlier discussions during the conference calls.=20=

>>>=20
>>> -- HTTP vs. JSON
>>>=20
>>> Phil noted that he does not like to use the MAC Token draft as a =
starting point because it does not re-use any of the work done in the =
JOSE working group and in particular all the libraries that are =
available today. He mentioned that earlier attempts to write the MAC =
Token code lead to problems for implementers.=20
>>>=20
>>> Justin responded that he does not agree with using JSON as a =
transport mechanism since this would replicate a SOAP style.=20
>>>=20
>>> Phil noted that he wants to send JSON but the signature shall be =
computed over the HTTP header field.=20
>>>=20
>>> -- Flexibility for the keyed message digest computation
>>>=20
>>> =46rom earlier discussion it was clear that the conference call =
participants wanted more flexibility regarding the keyed message digest =
computation. For this purpose Hannes presented the DKIM based approach, =
which allows selective header fields to be included in the digest. This =
is shown in slide #4.=20
>>>=20
>>> After some discussion the conference call participants thought that =
this would meet their needs. Further investigations would still be =
useful to determine the degree of failed HMAC calculations due to HTTP =
proxies modifying the content.=20
>>>=20
>>> -- Key Distribution
>>>=20
>>> Hannes presented the open issue regarding the choice of key =
distribution. Slides #6-#8 present three techniques and Hannes asked for =
feedback regarding the preferred style. Justin and others didn't see the =
need to decide on one mechanism - they wanted to keep the choice open. =
Derek indicated that this will not be an acceptable approach. Since the =
resource server and the authorization server may, in the OAuth 2.0 =
framework, be entities produced by different vendors there is an =
interoperability need. Justin responded that he disagrees and that the =
resource server needs to understand the access token and referred to the =
recent draft submission for the token introspection endpoint. Derek =
indicated that the resource server has to understand the content of the =
access token and the token introspection endpoint just pushes the =
problem around: the resource server has to send the access token to the =
authorization server and then the resource server gets the result back =
(which he then
>> a
>>> gain needs to understand) in order to make a meaningful =
authorization decision.=20
>>>=20
>>> Everyone agreed that the client must receive the session key from =
the authorization server and that this approach has to be standardized. =
It was also agreed that this is a common approach among all three key =
distribution mechanisms.
>>>=20
>>> Hannes asked the participants to think about their preference.=20
>>>=20
>>> The questions regarding key naming and the indication for the =
intended resource server the client wants to talk to have been =
postponed.=20
>>>=20
>>> Ciao
>>> Hannes
>>>=20
>>>=20
>>> _______________________________________________
>>> OAuth mailing list
>>> OAuth@ietf.org
>>> https://www.ietf.org/mailman/listinfo/oauth
>>>=20
>>>=20
>>=20
>> _______________________________________________
>> OAuth mailing list
>> OAuth@ietf.org
>> https://www.ietf.org/mailman/listinfo/oauth
>=20


From sberyozkin@gmail.com  Tue Feb 12 03:25:12 2013
Return-Path: <sberyozkin@gmail.com>
X-Original-To: oauth@ietfa.amsl.com
Delivered-To: oauth@ietfa.amsl.com
Received: from localhost (localhost [127.0.0.1]) by ietfa.amsl.com (Postfix) with ESMTP id 1E58F21F8CE8 for <oauth@ietfa.amsl.com>; Tue, 12 Feb 2013 03:25:12 -0800 (PST)
X-Virus-Scanned: amavisd-new at amsl.com
X-Spam-Flag: NO
X-Spam-Score: -3.599
X-Spam-Level: 
X-Spam-Status: No, score=-3.599 tagged_above=-999 required=5 tests=[BAYES_00=-2.599, RCVD_IN_DNSWL_LOW=-1]
Received: from mail.ietf.org ([64.170.98.30]) by localhost (ietfa.amsl.com [127.0.0.1]) (amavisd-new, port 10024) with ESMTP id 72M278bIR6qb for <oauth@ietfa.amsl.com>; Tue, 12 Feb 2013 03:25:11 -0800 (PST)
Received: from mail-ee0-f53.google.com (mail-ee0-f53.google.com [74.125.83.53]) by ietfa.amsl.com (Postfix) with ESMTP id 077E021F8CDF for <oauth@ietf.org>; Tue, 12 Feb 2013 03:25:10 -0800 (PST)
Received: by mail-ee0-f53.google.com with SMTP id e53so3731000eek.12 for <oauth@ietf.org>; Tue, 12 Feb 2013 03:25:10 -0800 (PST)
DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=gmail.com; s=20120113; h=x-received:message-id:date:from:user-agent:mime-version:to:subject :references:in-reply-to:content-type:content-transfer-encoding; bh=14EyA+DQm6s//Eb0iqo+cOPc/gRXvsgIB732ao8Leto=; b=O0yFavUg8lkRjmcuyH+rteP5wBFPq0Pbi0GO8fAYnYOJ8eeVwYpzhZIZg6ZBiuIJZr a261Rb/W36xGS5uZD1xJTmC+FxC6I5dN6fK6Au+p5TCL+f8slCMeMrDVD0oPPdLZUNuW jIserObN0HEEqVMnbHSi3WnIBczJHpwNyZbibyDSJDZG44y/i9RC1LiZFX4IPtptfRwp V7ZvlSQINZsWnEBvHmJcO/K/eeo2ou4Cvbi0BC3KRCR1WKzmSmjVUCaowo78nm205BTI EZyuiQp4N/Yra9I4Hg0QwPTEBc4hsiTMeEADLYqUdFLA7fBFE5aIcb84vd9Ee6rz4nEh rTHw==
X-Received: by 10.14.200.137 with SMTP id z9mr61200670een.20.1360668310027; Tue, 12 Feb 2013 03:25:10 -0800 (PST)
Received: from [10.36.226.5] ([217.173.99.61]) by mx.google.com with ESMTPS id l8sm33277732een.10.2013.02.12.03.25.07 (version=TLSv1 cipher=ECDHE-RSA-RC4-SHA bits=128/128); Tue, 12 Feb 2013 03:25:08 -0800 (PST)
Message-ID: <511A2692.2070209@gmail.com>
Date: Tue, 12 Feb 2013 11:25:06 +0000
From: Sergey Beryozkin <sberyozkin@gmail.com>
User-Agent: Mozilla/5.0 (X11; Linux x86_64; rv:12.0) Gecko/20120430 Thunderbird/12.0.1
MIME-Version: 1.0
To: oauth@ietf.org
References: <51195F39.3040809@mitre.org> <4E1F6AAD24975D4BA5B16804296739436743E3DD@TK5EX14MBXC285.redmond.corp.microsoft.com>
In-Reply-To: <4E1F6AAD24975D4BA5B16804296739436743E3DD@TK5EX14MBXC285.redmond.corp.microsoft.com>
Content-Type: text/plain; charset=ISO-8859-1; format=flowed
Content-Transfer-Encoding: 7bit
Subject: Re: [OAUTH-WG] Registration: Endpoint Definition (& operation parameter)
X-BeenThere: oauth@ietf.org
X-Mailman-Version: 2.1.12
Precedence: list
List-Id: OAUTH WG <oauth.ietf.org>
List-Unsubscribe: <https://www.ietf.org/mailman/options/oauth>, <mailto:oauth-request@ietf.org?subject=unsubscribe>
List-Archive: <http://www.ietf.org/mail-archive/web/oauth>
List-Post: <mailto:oauth@ietf.org>
List-Help: <mailto:oauth-request@ietf.org?subject=help>
List-Subscribe: <https://www.ietf.org/mailman/listinfo/oauth>, <mailto:oauth-request@ietf.org?subject=subscribe>
X-List-Received-Date: Tue, 12 Feb 2013 11:25:12 -0000

Hi Mike,
On 12/02/13 01:26, Mike Jones wrote:
> At most, there should be two endpoints - creation and management - for a client, but the protocol should be structured such that they *can* be at the same URL, if the server so chooses.  A simple way to accomplish this is to require that the client_id value be provided as an input parameter on update operations.  Then for implementations that use a single endpoint, they can distinguish "create" and "update" operations on the management endpoint by the presence or absence of the client_id value.
>
Perhaps the text can be relaxed somehow to not refer to

/register
and
/register/{client_id}

as two different endpoints ? I think it is a single endpoint from the 
implementation point of view :-).

Or may be the spec can indeed be relaxed a bit and allow for a PUT form 
payload be sent directly to /register

Cheers, Sergey

> If you want to have separate endpoints and don't need the client_id because you have somehow encoded it into the management endpoint URL, that's fine.  It still can serve as a useful cross-check that the client (or an attacker) is requesting a change to a client that matches the bearer token used.  But including it is necessary for implementations that want to use a single registration endpoint, rather than having a proliferation of per-client endpoints.
>
> BTW, just for the record, OAuth 2.0 uses the same endpoint for initial access token requests and requests for refreshed access tokens - with the operations being distinguished by whether a refresh_token parameter is present.  So there's a useful OAuth precedent for doing things this way.
>
> 				-- Mike
>
> -----Original Message-----
> From: oauth-bounces@ietf.org [mailto:oauth-bounces@ietf.org] On Behalf Of Justin Richer
> Sent: Monday, February 11, 2013 1:15 PM
> To: oauth@ietf.org
> Subject: [OAUTH-WG] Registration: Endpoint Definition (&  operation parameter)
>
> Draft -05 of OAuth Dynamic Client Registration [1] defines three fundamental operations that a client can undertake: Client Registration, Client Update, and Secret Rotation. Each of these actions needs to be differentiated *somehow* by the client and server as part of the protocol. Draft -00 defined only the "register" operation, drafts -01 through -04 made use of an "operation" parameter on a single endpoint, which brought up a long discussion on the list on whether or not that was an appropriate design. Draft -05 did away with the definition of the "operation" parameter on a single endpoint and instead opted for separating the base functionality into three different endpoints.
>
> Pro:
>    - Closer to RESTful semantics of having one URL for creation and another URL for management of an item (eg, most REST APIs use /object for creation and /object/object_id for manipulation)
>    - The rest of OAuth (and its extensions) defines separate endpoints for different actions (Authorization, Token, Revocation, Introspection) as opposed to a single endpoint with a mode-switch parameter
>    - Client doesn't have to generate a URL string for different endpoints by combining parameters with a base URL
>
> Con:
>    - Not quite exactly RESTful as the spec doesn't dictate the client_id
> be part of the update or rotate URL (though and implementor's note
> suggests this)
>    - Client has to track different URLs for different actions
>    - Server must be able to differentiate actions based on these
> different URLs.
>
> Alternatives include using different HTTP verbs (see other thread) or
> defining an operational switch parameter, like older drafts, on a single
> endpoint URL. Another suggested alternative is to look for the presence
> of certain parameters, such as client_id or the registration access
> token, to indicate that a different operation is requested.
>
> There's also question of whether the Secret Rotation action needs to
> have its own endpoint, or if it can be collapsed into one of the others.
> It has been suggested off-list that the secret rotation should never be
> initiated by the Client but instead the client should simply request its
> latest secret from the server through the update (or read) semantics.
>
>    -- Justin
>
> [1] http://tools.ietf.org/html/draft-ietf-oauth-dyn-reg-05
> _______________________________________________
> OAuth mailing list
> OAuth@ietf.org
> https://www.ietf.org/mailman/listinfo/oauth
> _______________________________________________
> OAuth mailing list
> OAuth@ietf.org
> https://www.ietf.org/mailman/listinfo/oauth


From asanso@adobe.com  Tue Feb 12 03:53:13 2013
Return-Path: <asanso@adobe.com>
X-Original-To: oauth@ietfa.amsl.com
Delivered-To: oauth@ietfa.amsl.com
Received: from localhost (localhost [127.0.0.1]) by ietfa.amsl.com (Postfix) with ESMTP id C3C3921F88DB for <oauth@ietfa.amsl.com>; Tue, 12 Feb 2013 03:53:13 -0800 (PST)
X-Virus-Scanned: amavisd-new at amsl.com
X-Spam-Flag: NO
X-Spam-Score: -106.599
X-Spam-Level: 
X-Spam-Status: No, score=-106.599 tagged_above=-999 required=5 tests=[AWL=0.000, BAYES_00=-2.599, RCVD_IN_DNSWL_MED=-4, USER_IN_WHITELIST=-100]
Received: from mail.ietf.org ([64.170.98.30]) by localhost (ietfa.amsl.com [127.0.0.1]) (amavisd-new, port 10024) with ESMTP id gfCD-YrO-J2k for <oauth@ietfa.amsl.com>; Tue, 12 Feb 2013 03:53:12 -0800 (PST)
Received: from exprod6og125.obsmtp.com (exprod6og125.obsmtp.com [64.18.1.218]) by ietfa.amsl.com (Postfix) with ESMTP id 5789B21F88E1 for <oauth@ietf.org>; Tue, 12 Feb 2013 03:53:09 -0800 (PST)
Received: from outbound-smtp-1.corp.adobe.com ([192.150.11.134]) by exprod6ob125.postini.com ([64.18.5.12]) with SMTP ID DSNKURotJaX9F9mZ0ZevsPYmkoFUmz8leuBf@postini.com; Tue, 12 Feb 2013 03:53:12 PST
Received: from inner-relay-4.eur.adobe.com (inner-relay-4.adobe.com [193.104.215.14]) by outbound-smtp-1.corp.adobe.com (8.12.10/8.12.10) with ESMTP id r1CBo41v024724; Tue, 12 Feb 2013 03:50:04 -0800 (PST)
Received: from nacas02.corp.adobe.com (nacas02.corp.adobe.com [10.8.189.100]) by inner-relay-4.eur.adobe.com (8.12.10/8.12.9) with ESMTP id r1CBr6XL018934; Tue, 12 Feb 2013 03:53:06 -0800 (PST)
Received: from eurhub01.eur.adobe.com (10.128.4.30) by nacas02.corp.adobe.com (10.8.189.100) with Microsoft SMTP Server (TLS) id 8.3.297.1; Tue, 12 Feb 2013 03:53:05 -0800
Received: from eurmbx01.eur.adobe.com ([10.128.4.32]) by eurhub01.eur.adobe.com ([10.128.4.30]) with mapi; Tue, 12 Feb 2013 11:51:52 +0000
From: Antonio Sanso <asanso@adobe.com>
To: Hannes Tschofenig <hannes.tschofenig@gmx.net>
Date: Tue, 12 Feb 2013 11:51:51 +0000
Thread-Topic: [OAUTH-WG] Minutes from the OAuth Design Team Conference Call - 11th February 2013
Thread-Index: Ac4JF1kCLPYZ7Ba5Tjev+rm0zUjUsg==
Message-ID: <3F39ADEE-C072-4EE0-9C2A-4B0C93810449@adobe.com>
References: <0573984A-8C11-4960-9BC6-F44D4B664C19@gmx.net> <1360661249.62997.YahooMailNeo@web31803.mail.mud.yahoo.com> <103117A9-0922-4E1A-AC73-D2914743046C@gmx.net> <ACC68AA9-F53B-4AA1-ACD5-462DE67A6B6E@adobe.com> <49D2CAF1-61AE-4DEB-A59D-D3F8F6D9C701@gmx.net>
In-Reply-To: <49D2CAF1-61AE-4DEB-A59D-D3F8F6D9C701@gmx.net>
Accept-Language: en-US
Content-Language: en-US
X-MS-Has-Attach: 
X-MS-TNEF-Correlator: 
acceptlanguage: en-US
Content-Type: text/plain; charset="us-ascii"
Content-Transfer-Encoding: quoted-printable
MIME-Version: 1.0
Cc: IETF oauth WG <oauth@ietf.org>
Subject: Re: [OAUTH-WG] Minutes from the OAuth Design Team Conference Call - 11th February 2013
X-BeenThere: oauth@ietf.org
X-Mailman-Version: 2.1.12
Precedence: list
List-Id: OAUTH WG <oauth.ietf.org>
List-Unsubscribe: <https://www.ietf.org/mailman/options/oauth>, <mailto:oauth-request@ietf.org?subject=unsubscribe>
List-Archive: <http://www.ietf.org/mail-archive/web/oauth>
List-Post: <mailto:oauth@ietf.org>
List-Help: <mailto:oauth-request@ietf.org?subject=help>
List-Subscribe: <https://www.ietf.org/mailman/listinfo/oauth>, <mailto:oauth-request@ietf.org?subject=subscribe>
X-List-Received-Date: Tue, 12 Feb 2013 11:53:13 -0000

Thanks Hannes

On Feb 12, 2013, at 12:06 PM, Hannes Tschofenig wrote:

> The transport of the session key from the authorization server is describ=
ed in Section 5.1 and is called "mac_key".=20
>=20
> The mechanism to transport the session key from the authorization server =
to the resource server is not yet described in the document. This has histo=
rical reasons: OAuth 1.0 did not separate the authorization server from the=
 resource server in the way OAuth 2.0 does.

but why do not we hit this same issue in the JWS case? In this situation th=
ere is as well a key for sign... And AS and RS can be as well two different=
 entities...

Regards

Antonio



>=20
> Ciao
> Hannes
>=20
> On Feb 12, 2013, at 12:28 PM, Antonio Sanso wrote:
>=20
>> Hi Hannes,
>>=20
>> how this session key "differs" from the key described in the current dra=
ft [0]?
>>=20
>> Thanks and regards
>>=20
>> Antonio
>>=20
>> [0] http://tools.ietf.org/html/draft-ietf-oauth-v2-http-mac-02
>>=20
>> On Feb 12, 2013, at 10:44 AM, Hannes Tschofenig wrote:
>>=20
>>> Hi Bill,=20
>>>=20
>>> On Feb 12, 2013, at 11:27 AM, William Mills wrote:
>>>=20
>>>> Is key distribution how AS and PR share keys  for token encryption/dec=
ryption or specifically about the keys for the HOK tokens?
>>>>=20
>>> In order for the client to compute the keyed message digest it needs to=
 have the session key. This session key is sent from the authorization serv=
er to the client and everyone on the call agreed that this has to be standa=
rdized.=20
>>>=20
>>> The resource server who receives the message from the client also needs=
 to have the session key to verify the message. How the resource server obt=
ains this session key was subject for some discussion on the call. I presen=
ted three different ways of how the resource server is able to obtain that =
key. We have to decide on one mandatory-to-implement mechanism. The open is=
sue is which one?=20
>>>=20
>>>> For the MAC token spec, I don't actually care whether we use JSON or n=
ow, but I'm in full agreement that we do NOT duplicate any HTTP info into t=
he JSON.  Just signatures of that stuff.
>>>>=20
>>> I believe the folks on the call also agreed with you on that aspect tha=
t the content of the HTTP message should not be replicated in the JSON payl=
oad itself.=20
>>>=20
>>> Ciao
>>> Hannes
>>>=20
>>>> From: Hannes Tschofenig <hannes.tschofenig@gmx.net>
>>>> To: IETF oauth WG <oauth@ietf.org>=20
>>>> Sent: Tuesday, February 12, 2013 1:10 AM
>>>> Subject: [OAUTH-WG] Minutes from the OAuth Design Team Conference Call=
 - 11th February 2013
>>>>=20
>>>> Here are my notes.=20
>>>>=20
>>>> Participants:
>>>>=20
>>>> * John Bradley
>>>> * Derek Atkins
>>>> * Phil Hunt
>>>> * Prateek Mishra
>>>> * Hannes Tschofenig
>>>> * Mike Jones
>>>> * Antonio Sanso
>>>> * Justin Richer
>>>>=20
>>>> Notes:=20
>>>>=20
>>>> My slides are available here: http://www.tschofenig.priv.at/OAuth2-Sec=
urity-11Feb2013.ppt
>>>>=20
>>>> Slide #2 summarizes earlier discussions during the conference calls.=20
>>>>=20
>>>> -- HTTP vs. JSON
>>>>=20
>>>> Phil noted that he does not like to use the MAC Token draft as a start=
ing point because it does not re-use any of the work done in the JOSE worki=
ng group and in particular all the libraries that are available today. He m=
entioned that earlier attempts to write the MAC Token code lead to problems=
 for implementers.=20
>>>>=20
>>>> Justin responded that he does not agree with using JSON as a transport=
 mechanism since this would replicate a SOAP style.=20
>>>>=20
>>>> Phil noted that he wants to send JSON but the signature shall be compu=
ted over the HTTP header field.=20
>>>>=20
>>>> -- Flexibility for the keyed message digest computation
>>>>=20
>>>> From earlier discussion it was clear that the conference call particip=
ants wanted more flexibility regarding the keyed message digest computation=
. For this purpose Hannes presented the DKIM based approach, which allows s=
elective header fields to be included in the digest. This is shown in slide=
 #4.=20
>>>>=20
>>>> After some discussion the conference call participants thought that th=
is would meet their needs. Further investigations would still be useful to =
determine the degree of failed HMAC calculations due to HTTP proxies modify=
ing the content.=20
>>>>=20
>>>> -- Key Distribution
>>>>=20
>>>> Hannes presented the open issue regarding the choice of key distributi=
on. Slides #6-#8 present three techniques and Hannes asked for feedback reg=
arding the preferred style. Justin and others didn't see the need to decide=
 on one mechanism - they wanted to keep the choice open. Derek indicated th=
at this will not be an acceptable approach. Since the resource server and t=
he authorization server may, in the OAuth 2.0 framework, be entities produc=
ed by different vendors there is an interoperability need. Justin responded=
 that he disagrees and that the resource server needs to understand the acc=
ess token and referred to the recent draft submission for the token introsp=
ection endpoint. Derek indicated that the resource server has to understand=
 the content of the access token and the token introspection endpoint just =
pushes the problem around: the resource server has to send the access token=
 to the authorization server and then the resource server gets the result b=
ack (which he then
>>> a
>>>> gain needs to understand) in order to make a meaningful authorization =
decision.=20
>>>>=20
>>>> Everyone agreed that the client must receive the session key from the =
authorization server and that this approach has to be standardized. It was =
also agreed that this is a common approach among all three key distribution=
 mechanisms.
>>>>=20
>>>> Hannes asked the participants to think about their preference.=20
>>>>=20
>>>> The questions regarding key naming and the indication for the intended=
 resource server the client wants to talk to have been postponed.=20
>>>>=20
>>>> Ciao
>>>> Hannes
>>>>=20
>>>>=20
>>>> _______________________________________________
>>>> OAuth mailing list
>>>> OAuth@ietf.org
>>>> https://www.ietf.org/mailman/listinfo/oauth
>>>>=20
>>>>=20
>>>=20
>>> _______________________________________________
>>> OAuth mailing list
>>> OAuth@ietf.org
>>> https://www.ietf.org/mailman/listinfo/oauth
>>=20
>=20


From jricher@mitre.org  Tue Feb 12 06:24:19 2013
Return-Path: <jricher@mitre.org>
X-Original-To: oauth@ietfa.amsl.com
Delivered-To: oauth@ietfa.amsl.com
Received: from localhost (localhost [127.0.0.1]) by ietfa.amsl.com (Postfix) with ESMTP id B974621F8B6D for <oauth@ietfa.amsl.com>; Tue, 12 Feb 2013 06:24:19 -0800 (PST)
X-Virus-Scanned: amavisd-new at amsl.com
X-Spam-Flag: NO
X-Spam-Score: -6.574
X-Spam-Level: 
X-Spam-Status: No, score=-6.574 tagged_above=-999 required=5 tests=[AWL=0.024,  BAYES_00=-2.599, HTML_MESSAGE=0.001, RCVD_IN_DNSWL_MED=-4]
Received: from mail.ietf.org ([64.170.98.30]) by localhost (ietfa.amsl.com [127.0.0.1]) (amavisd-new, port 10024) with ESMTP id HiQGFP9WFNsZ for <oauth@ietfa.amsl.com>; Tue, 12 Feb 2013 06:24:18 -0800 (PST)
Received: from smtpksrv1.mitre.org (smtpksrv1.mitre.org [198.49.146.77]) by ietfa.amsl.com (Postfix) with ESMTP id 7FEC721F8B3B for <oauth@ietf.org>; Tue, 12 Feb 2013 06:24:17 -0800 (PST)
Received: from smtpksrv1.mitre.org (localhost.localdomain [127.0.0.1]) by localhost (Postfix) with SMTP id 201EB53117E2; Tue, 12 Feb 2013 09:24:14 -0500 (EST)
Received: from IMCCAS03.MITRE.ORG (imccas03.mitre.org [129.83.29.80]) by smtpksrv1.mitre.org (Postfix) with ESMTP id DE8CA1F17B1; Tue, 12 Feb 2013 09:24:13 -0500 (EST)
Received: from [10.146.15.29] (129.83.31.58) by IMCCAS03.MITRE.ORG (129.83.29.80) with Microsoft SMTP Server (TLS) id 14.2.318.4; Tue, 12 Feb 2013 09:24:13 -0500
Message-ID: <511A5062.5010108@mitre.org>
Date: Tue, 12 Feb 2013 09:23:30 -0500
From: Justin Richer <jricher@mitre.org>
User-Agent: Mozilla/5.0 (X11; Linux i686; rv:17.0) Gecko/20130106 Thunderbird/17.0.2
MIME-Version: 1.0
To: Richard Harrington <richard@maymount.com>
References: <20130206192420.32698.21027.idtracker@ietfa.amsl.com> <5112AE0B.1080501@mitre.org> <CAJV9qO_8-4FowrXK=ae-+xMjiJFP04ryVMLQ8SGUH8kp3PHrLg@mail.gmail.com> <5113C3AA.1040701@mitre.org> <CAJV9qO8BVV57eAb5kUNes15AYOpUKqw5XWQswh-FJA=b1pPgSA@mail.gmail.com> <5113DDB2.7060805@mitre.org> <CAJV9qO_gM1oera9ae9sqh9n17e-ZLKuC2pmsZwhq-RmFcMyqHA@mail.gmail.com> <51196777.6000502@mitre.org> <CAJV9qO-5bWZbNUfCmaqYBQoy-qwNaSZFOsO9GL3CrbSejwVTzw@mail.gmail.com> <F6595A40-6B4E-4718-ABB5-694CA975C4DB@maymount.com>
In-Reply-To: <F6595A40-6B4E-4718-ABB5-694CA975C4DB@maymount.com>
Content-Type: multipart/alternative; boundary="------------080204030402040100020608"
X-Originating-IP: [129.83.31.58]
Cc: "oauth@ietf.org" <oauth@ietf.org>
Subject: Re: [OAUTH-WG] Fwd: New Version Notification for draft-richer-oauth-introspection-02.txt
X-BeenThere: oauth@ietf.org
X-Mailman-Version: 2.1.12
Precedence: list
List-Id: OAUTH WG <oauth.ietf.org>
List-Unsubscribe: <https://www.ietf.org/mailman/options/oauth>, <mailto:oauth-request@ietf.org?subject=unsubscribe>
List-Archive: <http://www.ietf.org/mail-archive/web/oauth>
List-Post: <mailto:oauth@ietf.org>
List-Help: <mailto:oauth-request@ietf.org?subject=help>
List-Subscribe: <https://www.ietf.org/mailman/listinfo/oauth>, <mailto:oauth-request@ietf.org?subject=subscribe>
X-List-Received-Date: Tue, 12 Feb 2013 14:24:19 -0000

--------------080204030402040100020608
Content-Type: text/plain; charset="UTF-8"; format=flowed
Content-Transfer-Encoding: 7bit

OK, I can see the wisdom in changing this term.

I picked "valid" because I wanted a simple "boolean" value that would 
require no additional parsing or string-matching on the client's behalf, 
and I'd like to stick with that. OAuth is built with the assumption that 
clients need to be able to recover from invalid tokens at any stage, so 
I think a simple yes/no is the right step here.

That said, I think you're both right that "valid" seems to have caused a 
bit of confusion. I don't want to go with "revoked" because I'd rather 
have the "token is OK" be the positive boolean value.

Would "valid_token" be more clear? Or do we need a different adjective 
all together?

  -- Justin

On 02/11/2013 08:02 PM, Richard Harrington wrote:
> Have you considered "status" instead of "valid"?  It could have values 
> like "active", "expired", and "revoked".
>
> Is it worthwhile including the status of the client also?  For 
> example, a client application could be disabled, temporarily or 
> permanently, and thus disabling its access tokens as well.
>
>
> On Feb 11, 2013, at 1:56 PM, Prabath Siriwardena <prabath@wso2.com 
> <mailto:prabath@wso2.com>> wrote:
>
>> I guess confusion is with 'valid' parameter is in the response..
>>
>> I thought this will be helpful to standardize the communication 
>> between Resource Server and the Authorization Server..
>>
>> I would suggest we completely remove "valid" from the response - or 
>> define it much clearly..
>>
>> May be can add "revoked" with a boolean attribute..
>>
>> Thanks & regards,
>> -Prabath
>>
>> On Tue, Feb 12, 2013 at 3:19 AM, Justin Richer <jricher@mitre.org 
>> <mailto:jricher@mitre.org>> wrote:
>>
>>
>>     On 02/08/2013 12:51 AM, Prabath Siriwardena wrote:
>>>     Hi Justin,
>>>
>>>     I have couple of questions related to "valid" parameter...
>>>
>>>     This endpoint can be invoked by the Resource Server in runtime...
>>
>>     That's correct.
>>
>>
>>>
>>>     In that case what is exactly meant by the "resource_id" in request ?
>>
>>     The resource_id field is a service-specific string that basically
>>     lets the resource server provide some context to the request to
>>     the auth server. There have been some other suggestions like
>>     client IP address, but I wanted to put this one in because it
>>     seemed to be a common theme. The client is trying to do
>>     *something* with the token, after all, and the rights,
>>     permissions, and metadata associated with the token could change
>>     based on that. Since the Introspection endpoint is all about
>>     getting that metadata back to the PR, this seemed like a good idea.
>>
>>
>>>
>>>     IMO a token to be valid depends on set of criteria based on it's
>>>     type..
>>>
>>>     For a Bearer token..
>>>
>>>     1. Token should not be expired
>>>     2. Token should not be revoked.
>>>     3. The scope the token issued should match with the scope
>>>     required for the resource.
>>>
>>>     For a MAC token...
>>>
>>>     1. Token not expired (mac id)
>>>     2. Token should not be revoked
>>>     3. The scope the token issued should match with the scope
>>>     required for the resource.
>>>     4. HMAC check should be valid
>>>
>>>     There are similar conditions for SAML bearer too..
>>
>>     This isn't really true. The SAML bearer token is fully
>>     self-contained and doesn't change based on other parameters in
>>     the message, unlike MAC. Same with JWT. When it hands a SAML or
>>     JWT token to the AS, the PR has given *everything* the server
>>     needs to check that token's validity and use.
>>
>>     MAC signatures change with every message, and they're done across
>>     several components of the HTTP message. Therefor, the HMAC check
>>     for MAC style tokens will still need to be done by the protected
>>     resource. Introspection would help in the case that the signature
>>     validated just fine, but the token might have expired. Or you
>>     need to know what scopes apply. Introspection isn't to fully
>>     validate the call to the protected resource -- if that were the
>>     case, the PR would have to send some kind of encapsulated version
>>     of the original request. Otherwise, the AS won't have all of the
>>     information it needs to check the MAC.
>>
>>
>>     I think what you're describing is ultimately *not* what the
>>     introspection endpoint is intended to do. If that's unclear from
>>     the document, can you please suggest text that would help clear
>>     the use case up? I wouldn't want it to be ambiguous.
>>
>>      -- Justin
>>
>>
>>>
>>>     Thanks & regards,
>>>     -Prabath
>>>
>>>
>>>     On Thu, Feb 7, 2013 at 10:30 PM, Justin Richer
>>>     <jricher@mitre.org <mailto:jricher@mitre.org>> wrote:
>>>
>>>         It validates the token, which would be either the token
>>>         itself in the case of Bearer or the token "id" part of
>>>         something more complex like MAC. It doesn't directly
>>>         validate the usage of the token, that's still up to the PR
>>>         to do that.
>>>
>>>         I nearly added a "token type" field in this draft, but held
>>>         back because there are several kinds of "token type" that
>>>         people talk about in OAuth. First, there's "Bearer" vs.
>>>         "MAC" vs. "HOK", or what have you. Then within Bearer you
>>>         have "JWT" or "SAML" or "unstructured blob". Then you've
>>>         also got "access" vs. "refresh" and other flavors of token,
>>>         like the id_token in OpenID Connect.
>>>
>>>         Thing is, the server running the introspection endpoint will
>>>         probably know *all* of these. But should it tell the client?
>>>         If so, which of the three, and what names should the fields be?
>>>
>>>          -- Justin
>>>
>>>
>>>         On 02/07/2013 11:26 AM, Prabath Siriwardena wrote:
>>>>         Okay.. I was thinking this could be used as a way to
>>>>         validate the token as well. BTW even in this case shouldn't
>>>>         communicate the type of token to AS? For example in the
>>>>         case of SAML profile - it could be SAML token..
>>>>
>>>>         Thanks & regards,
>>>>         -Prabath
>>>>
>>>>         On Thu, Feb 7, 2013 at 8:39 PM, Justin Richer
>>>>         <jricher@mitre.org <mailto:jricher@mitre.org>> wrote:
>>>>
>>>>             "valid" might not be the best term, but it's meant to
>>>>             be a field where the server says "yes this token is
>>>>             still good" or "no this token isn't good anymore". We
>>>>             could instead do this with HTTP codes or something but
>>>>             I went with a pure JSON response.
>>>>
>>>>              -- Justin
>>>>
>>>>
>>>>             On 02/06/2013 10:47 PM, Prabath Siriwardena wrote:
>>>>>             Hi Justin,
>>>>>
>>>>>             I believe this is addressing one of the key missing
>>>>>             part in OAuth 2.0...
>>>>>
>>>>>             One question - I guess this was discussed already...
>>>>>
>>>>>             In the spec - in the introspection response it has the
>>>>>             attribute "valid" - this is basically the validity of
>>>>>             the token provided in the request.
>>>>>
>>>>>             Validation criteria depends on the token and well as
>>>>>             token type ( Bearer, MAC..).
>>>>>
>>>>>             In the spec it seems like it's coupled with Bearer
>>>>>             token type... But I guess, by adding "token_type" to
>>>>>             the request we can remove this dependency.
>>>>>
>>>>>             WDYT..?
>>>>>
>>>>>             Thanks & regards,
>>>>>             -Prabath
>>>>>
>>>>>             On Thu, Feb 7, 2013 at 12:54 AM, Justin Richer
>>>>>             <jricher@mitre.org <mailto:jricher@mitre.org>> wrote:
>>>>>
>>>>>                 Updated introspection draft based on recent
>>>>>                 comments. Changes include:
>>>>>
>>>>>                  - "scope" return parameter now follows RFC6749
>>>>>                 format instead of JSON array
>>>>>                  - "subject" -> "sub", and "audience" -> "aud", to
>>>>>                 be parallel with JWT claims
>>>>>                  - clarified what happens if the authentication is bad
>>>>>
>>>>>                  -- Justin
>>>>>
>>>>>
>>>>>                 -------- Original Message --------
>>>>>                 Subject: 	New Version Notification for
>>>>>                 draft-richer-oauth-introspection-02.txt
>>>>>                 Date: 	Wed, 6 Feb 2013 11:24:20 -0800
>>>>>                 From: 	<internet-drafts@ietf.org>
>>>>>                 <mailto:internet-drafts@ietf.org>
>>>>>                 To: 	<jricher@mitre.org> <mailto:jricher@mitre.org>
>>>>>
>>>>>
>>>>>
>>>>>                 A new version of I-D, draft-richer-oauth-introspection-02.txt
>>>>>                 has been successfully submitted by Justin Richer and posted to the
>>>>>                 IETF repository.
>>>>>
>>>>>                 Filename:	 draft-richer-oauth-introspection
>>>>>                 Revision:	 02
>>>>>                 Title:		 OAuth Token Introspection
>>>>>                 Creation date:	 2013-02-06
>>>>>                 WG ID:		 Individual Submission
>>>>>                 Number of pages: 6
>>>>>                 URL:http://www.ietf.org/internet-drafts/draft-richer-oauth-introspection-02.txt
>>>>>                 Status:http://datatracker.ietf.org/doc/draft-richer-oauth-introspection
>>>>>                 Htmlized:http://tools.ietf.org/html/draft-richer-oauth-introspection-02
>>>>>                 Diff:http://www.ietf.org/rfcdiff?url2=draft-richer-oauth-introspection-02
>>>>>
>>>>>                 Abstract:
>>>>>                     This specification defines a method for a client or protected
>>>>>                     resource to query an OAuth authorization server to determine meta-
>>>>>                     information about an OAuth token.
>>>>>
>>>>>
>>>>>                                                                                                    
>>>>>
>>>>>
>>>>>                 The IETF Secretariat
>>>>>
>>>>>
>>>>>
>>>>>
>>>>>                 _______________________________________________
>>>>>                 OAuth mailing list
>>>>>                 OAuth@ietf.org <mailto:OAuth@ietf.org>
>>>>>                 https://www.ietf.org/mailman/listinfo/oauth
>>>>>
>>>>>
>>>>>
>>>>>
>>>>>             -- 
>>>>>             Thanks & Regards,
>>>>>             Prabath
>>>>>
>>>>>             Mobile : +94 71 809 6732 <tel:%2B94%2071%20809%206732>
>>>>>
>>>>>             http://blog.facilelogin.com
>>>>>             http://RampartFAQ.com
>>>>
>>>>
>>>>
>>>>
>>>>         -- 
>>>>         Thanks & Regards,
>>>>         Prabath
>>>>
>>>>         Mobile : +94 71 809 6732 <tel:%2B94%2071%20809%206732>
>>>>
>>>>         http://blog.facilelogin.com
>>>>         http://RampartFAQ.com
>>>
>>>
>>>
>>>
>>>     -- 
>>>     Thanks & Regards,
>>>     Prabath
>>>
>>>     Mobile : +94 71 809 6732 <tel:%2B94%2071%20809%206732>
>>>
>>>     http://blog.facilelogin.com
>>>     http://RampartFAQ.com
>>
>>
>>
>>
>> -- 
>> Thanks & Regards,
>> Prabath
>>
>> Mobile : +94 71 809 6732
>>
>> http://blog.facilelogin.com
>> http://RampartFAQ.com
>> _______________________________________________
>> OAuth mailing list
>> OAuth@ietf.org <mailto:OAuth@ietf.org>
>> https://www.ietf.org/mailman/listinfo/oauth


--------------080204030402040100020608
Content-Type: text/html; charset="UTF-8"
Content-Transfer-Encoding: 8bit

<html>
  <head>
    <meta content="text/html; charset=UTF-8" http-equiv="Content-Type">
  </head>
  <body bgcolor="#FFFFFF" text="#000000">
    OK, I can see the wisdom in changing this term. <br>
    <br>
    I picked "valid" because I wanted a simple "boolean" value that
    would require no additional parsing or string-matching on the
    client's behalf, and I'd like to stick with that. OAuth is built
    with the assumption that clients need to be able to recover from
    invalid tokens at any stage, so I think a simple yes/no is the right
    step here. <br>
    <br>
    That said, I think you're both right that "valid" seems to have
    caused a bit of confusion. I don't want to go with "revoked" because
    I'd rather have the "token is OK" be the positive boolean value. <br>
    <br>
    Would "valid_token" be more clear? Or do we need a different
    adjective all together?<br>
    <br>
    Â -- Justin<br>
    <br>
    <div class="moz-cite-prefix">On 02/11/2013 08:02 PM, Richard
      Harrington wrote:<br>
    </div>
    <blockquote
      cite="mid:F6595A40-6B4E-4718-ABB5-694CA975C4DB@maymount.com"
      type="cite">
      <meta http-equiv="Content-Type" content="text/html; charset=UTF-8">
      <div>Have you considered "status" instead of "valid"? Â It could
        have values like "active", "expired", and "revoked".</div>
      <div><br>
      </div>
      <div>Is it worthwhile including the status of the client also?
        Â For example, a client application could be disabled,
        temporarily or permanently, and thus disabling its access tokens
        as well.</div>
      <div><br>
      </div>
      <div><br>
        On Feb 11, 2013, at 1:56 PM, Prabath Siriwardena &lt;<a
          moz-do-not-send="true" href="mailto:prabath@wso2.com">prabath@wso2.com</a>&gt;
        wrote:<br>
        <br>
      </div>
      <blockquote type="cite">
        <div>I guess confusion is with 'valid' parameter is in the
          response..
          <div><br>
          </div>
          <div>I thought this will be helpful toÂ standardizeÂ the
            communication between Resource Server and the Authorization
            Server..</div>
          <div><br>
          </div>
          <div>I would suggest we completely remove "valid" from the
            response - or define it much clearly..</div>
          <div><br>
          </div>
          <div>May be can add "revoked" with a boolean attribute..</div>
          <div><br>
          </div>
          <div>Thanks &amp; regards,</div>
          <div>-Prabath<br>
            <br>
            <div class="gmail_quote">On Tue, Feb 12, 2013 at 3:19 AM,
              Justin Richer <span dir="ltr">&lt;<a
                  moz-do-not-send="true" href="mailto:jricher@mitre.org"
                  target="_blank">jricher@mitre.org</a>&gt;</span>
              wrote:<br>
              <blockquote class="gmail_quote" style="margin:0 0 0
                .8ex;border-left:1px #ccc solid;padding-left:1ex">
                <div bgcolor="#FFFFFF" text="#000000">
                  <div class="im"> <br>
                    <div>On 02/08/2013 12:51 AM, Prabath Siriwardena
                      wrote:<br>
                    </div>
                  </div>
                  <blockquote type="cite"> HiÂ Justin,
                    <div><br>
                    </div>
                    <div class="im">
                      <div>I have couple of questions related to "valid"
                        parameter...</div>
                      <div><br>
                      </div>
                      <div>This endpoint can be invoked by the Resource
                        Server in runtime...</div>
                    </div>
                  </blockquote>
                  <br>
                  That's correct.
                  <div class="im"><br>
                    <br>
                    <blockquote type="cite">
                      <div><br>
                      </div>
                      <div>In that case what is exactly meant by the
                        "resource_id" in request ?</div>
                    </blockquote>
                    <br>
                  </div>
                  The resource_id field is a service-specific string
                  that basically lets the resource server provide some
                  context to the request to the auth server. There have
                  been some other suggestions like client IP address,
                  but I wanted to put this one in because it seemed to
                  be a common theme. The client is trying to do
                  *something* with the token, after all, and the rights,
                  permissions, and metadata associated with the token
                  could change based on that. Since the Introspection
                  endpoint is all about getting that metadata back to
                  the PR, this seemed like a good idea.
                  <div class="im"><br>
                    <br>
                    <blockquote type="cite">
                      <div><br>
                      </div>
                      <div>IMO a token to be valid depends on set of
                        criteria based on it's type..</div>
                      <div><br>
                      </div>
                      <div>For a Bearer token..</div>
                      <div><br>
                      </div>
                      <div>1. Token should not be expired</div>
                      <div>2. Token should not be revoked.</div>
                      <div>3. The scope the token issued should match
                        with the scope required for the resource.</div>
                      <div><br>
                      </div>
                      <div>For a MAC token...</div>
                      <div><br>
                      </div>
                      <div>1. Token not expired (mac id)</div>
                      <div>2. Token should not be revoked</div>
                      <div>3. The scope the token issued should match
                        with the scope required for the resource.</div>
                      <div>4. HMAC check should be valid</div>
                      <div><br>
                      </div>
                      There are similar conditions for SAML bearer too..</blockquote>
                    <br>
                  </div>
                  This isn't really true. The SAML bearer token is fully
                  self-contained and doesn't change based on other
                  parameters in the message, unlike MAC. Same with JWT.
                  When it hands a SAML or JWT token to the AS, the PR
                  has given *everything* the server needs to check that
                  token's validity and use. <br>
                  <br>
                  MAC signatures change with every message, and they're
                  done across several components of the HTTP message.
                  Therefor, the HMAC check for MAC style tokens will
                  still need to be done by the protected resource.
                  Introspection would help in the case that the
                  signature validated just fine, but the token might
                  have expired. Or you need to know what scopes apply.
                  Introspection isn't to fully validate the call to the
                  protected resource -- if that were the case, the PR
                  would have to send some kind of encapsulated version
                  of the original request. Otherwise, the AS won't have
                  all of the information it needs to check the MAC.<br>
                  <br>
                  <br>
                  I think what you're describing is ultimately *not*
                  what the introspection endpoint is intended to do. If
                  that's unclear from the document, can you please
                  suggest text that would help clear the use case up? I
                  wouldn't want it to be ambiguous.<span class="HOEnZb"><font
                      color="#888888"><br>
                      <br>
                      Â -- Justin</font></span>
                  <div>
                    <div class="h5"><br>
                      <br>
                      <blockquote type="cite">
                        <div><br>
                        </div>
                        <div>Thanks &amp; regards,</div>
                        <div>-Prabath</div>
                        <div><br>
                        </div>
                        <div><br>
                          <div class="gmail_quote">On Thu, Feb 7, 2013
                            at 10:30 PM, Justin Richer <span dir="ltr">&lt;<a
                                moz-do-not-send="true"
                                href="mailto:jricher@mitre.org"
                                target="_blank">jricher@mitre.org</a>&gt;</span>
                            wrote:<br>
                            <blockquote class="gmail_quote"
                              style="margin:0 0 0 .8ex;border-left:1px
                              #ccc solid;padding-left:1ex">
                              <div bgcolor="#FFFFFF" text="#000000"> It
                                validates the token, which would be
                                either the token itself in the case of
                                Bearer or the token "id" part of
                                something more complex like MAC. It
                                doesn't directly validate the usage of
                                the token, that's still up to the PR to
                                do that.<br>
                                <br>
                                I nearly added a "token type" field in
                                this draft, but held back because there
                                are several kinds of "token type" that
                                people talk about in OAuth. First,
                                there's "Bearer" vs. "MAC" vs. "HOK", or
                                what have you. Then within Bearer you
                                have "JWT" or "SAML" or "unstructured
                                blob". Then you've also got "access" vs.
                                "refresh" and other flavors of token,
                                like the id_token in OpenID Connect. <br>
                                <br>
                                Thing is, the server running the
                                introspection endpoint will probably
                                know *all* of these. But should it tell
                                the client? If so, which of the three,
                                and what names should the fields be?<span><font
                                    color="#888888"><br>
                                    <br>
                                    Â -- Justin</font></span>
                                <div>
                                  <div><br>
                                    <br>
                                    <div>On 02/07/2013 11:26 AM, Prabath
                                      Siriwardena wrote:<br>
                                    </div>
                                    <blockquote type="cite"> Okay.. I
                                      was thinking this could be used as
                                      a way to validate the token as
                                      well. BTW even in this case
                                      shouldn't communicate the type of
                                      token to AS? For example in the
                                      case of SAML profile - it could be
                                      SAML token..
                                      <div> <br>
                                      </div>
                                      <div>Thanks &amp; regards,</div>
                                      <div>-Prabath<br>
                                        <br>
                                        <div class="gmail_quote">On Thu,
                                          Feb 7, 2013 at 8:39 PM, Justin
                                          Richer <span dir="ltr">&lt;<a
                                              moz-do-not-send="true"
                                              href="mailto:jricher@mitre.org"
                                              target="_blank">jricher@mitre.org</a>&gt;</span>
                                          wrote:<br>
                                          <blockquote
                                            class="gmail_quote"
                                            style="margin:0 0 0
                                            .8ex;border-left:1px #ccc
                                            solid;padding-left:1ex">
                                            <div bgcolor="#FFFFFF"
                                              text="#000000"> "valid"
                                              might not be the best
                                              term, but it's meant to be
                                              a field where the server
                                              says "yes this token is
                                              still good" or "no this
                                              token isn't good anymore".
                                              We could instead do this
                                              with HTTP codes or
                                              something but I went with
                                              a pure JSON response.<span><font
                                                  color="#888888"><br>
                                                  <br>
                                                  Â -- Justin</font></span>
                                              <div>
                                                <div><br>
                                                  <br>
                                                  <div>On 02/06/2013
                                                    10:47 PM, Prabath
                                                    Siriwardena wrote:<br>
                                                  </div>
                                                  <blockquote
                                                    type="cite"> Hi
                                                    Justin,
                                                    <div><br>
                                                    </div>
                                                    <div>I believe this
                                                      is addressing one
                                                      of the key missing
                                                      part in OAuth
                                                      2.0...</div>
                                                    <div><br>
                                                    </div>
                                                    <div>One question -
                                                      I guess this was
                                                      discussed
                                                      already...</div>
                                                    <div><br>
                                                    </div>
                                                    <div>In the spec -
                                                      in the
                                                      introspection
                                                      response it has
                                                      the attribute
                                                      "valid" - this is
                                                      basically the
                                                      validity of the
                                                      token provided in
                                                      the request.</div>
                                                    <div><br>
                                                    </div>
                                                    <div>ValidationÂ criteria
                                                      depends on the
                                                      token and well as
                                                      token type (
                                                      Bearer, MAC..).</div>
                                                    <div><br>
                                                    </div>
                                                    <div>In the spec it
                                                      seems like it's
                                                      coupled with
                                                      Bearer token
                                                      type... But I
                                                      guess, by adding
                                                      "token_type" to
                                                      the request we can
                                                      remove this
                                                      dependency.</div>
                                                    <div><br>
                                                    </div>
                                                    <div>WDYT..?</div>
                                                    <div><br>
                                                    </div>
                                                    <div>Thanks &amp;
                                                      regards,</div>
                                                    <div>-PrabathÂ </div>
                                                    <div><br>
                                                      <div
                                                        class="gmail_quote">On
                                                        Thu, Feb 7, 2013
                                                        at 12:54 AM,
                                                        Justin Richer <span
                                                          dir="ltr">&lt;<a
moz-do-not-send="true" href="mailto:jricher@mitre.org" target="_blank">jricher@mitre.org</a>&gt;</span>
                                                        wrote:<br>
                                                        <blockquote
                                                          class="gmail_quote"
                                                          style="margin:0
                                                          0 0
                                                          .8ex;border-left:1px
                                                          #ccc
                                                          solid;padding-left:1ex">
                                                          <div
                                                          bgcolor="#FFFFFF"
                                                          text="#000000">
                                                          Updated
                                                          introspection
                                                          draft based on
                                                          recent
                                                          comments.
                                                          Changes
                                                          include:<br>
                                                          <br>
                                                          Â - "scope"
                                                          return
                                                          parameter now
                                                          follows
                                                          RFC6749 format
                                                          instead of
                                                          JSON array<br>
                                                          Â - "subject"
                                                          -&gt; "sub",
                                                          and "audience"
                                                          -&gt; "aud",
                                                          to be parallel
                                                          with JWT
                                                          claims<br>
                                                          Â - clarified
                                                          what happens
                                                          if the
                                                          authentication
                                                          is bad<br>
                                                          <br>
                                                          Â -- Justin<br>
                                                          <div><br>
                                                          <br>
                                                          --------
                                                          Original
                                                          Message
                                                          --------
                                                          <table
                                                          border="0"
                                                          cellpadding="0"
cellspacing="0">
                                                          <tbody>
                                                          <tr>
                                                          <th
                                                          align="RIGHT"
nowrap="nowrap" valign="BASELINE">Subject: </th>
                                                          <td>New
                                                          Version
                                                          Notification
                                                          for
                                                          draft-richer-oauth-introspection-02.txt</td>
                                                          </tr>
                                                          <tr>
                                                          <th
                                                          align="RIGHT"
nowrap="nowrap" valign="BASELINE">Date: </th>
                                                          <td>Wed, 6 Feb
                                                          2013 11:24:20
                                                          -0800</td>
                                                          </tr>
                                                          <tr>
                                                          <th
                                                          align="RIGHT"
nowrap="nowrap" valign="BASELINE">From: </th>
                                                          <td><a
                                                          moz-do-not-send="true"
href="mailto:internet-drafts@ietf.org" target="_blank">&lt;internet-drafts@ietf.org&gt;</a></td>
                                                          </tr>
                                                          <tr>
                                                          <th
                                                          align="RIGHT"
nowrap="nowrap" valign="BASELINE">To: </th>
                                                          <td><a
                                                          moz-do-not-send="true"
href="mailto:jricher@mitre.org" target="_blank">&lt;jricher@mitre.org&gt;</a></td>
                                                          </tr>
                                                          </tbody>
                                                          </table>
                                                          <br>
                                                          <br>
                                                          <pre>A new version of I-D, draft-richer-oauth-introspection-02.txt
has been successfully submitted by Justin Richer and posted to the
IETF repository.

Filename:	 draft-richer-oauth-introspection
Revision:	 02
Title:		 OAuth Token Introspection
Creation date:	 2013-02-06
WG ID:		 Individual Submission
Number of pages: 6
URL:             <a moz-do-not-send="true" href="http://www.ietf.org/internet-drafts/draft-richer-oauth-introspection-02.txt" target="_blank">http://www.ietf.org/internet-drafts/draft-richer-oauth-introspection-02.txt</a>
Status:          <a moz-do-not-send="true" href="http://datatracker.ietf.org/doc/draft-richer-oauth-introspection" target="_blank">http://datatracker.ietf.org/doc/draft-richer-oauth-introspection</a>
Htmlized:        <a moz-do-not-send="true" href="http://tools.ietf.org/html/draft-richer-oauth-introspection-02" target="_blank">http://tools.ietf.org/html/draft-richer-oauth-introspection-02</a>
Diff:            <a moz-do-not-send="true" href="http://www.ietf.org/rfcdiff?url2=draft-richer-oauth-introspection-02" target="_blank">http://www.ietf.org/rfcdiff?url2=draft-richer-oauth-introspection-02</a>

Abstract:
   This specification defines a method for a client or protected
   resource to query an OAuth authorization server to determine meta-
   information about an OAuth token.


                                                                                  


The IETF Secretariat

</pre>
                                                          <br>
                                                          </div>
                                                          <br>
                                                          </div>
                                                          <br>
_______________________________________________<br>
                                                          OAuth mailing
                                                          list<br>
                                                          <a
                                                          moz-do-not-send="true"
href="mailto:OAuth@ietf.org" target="_blank">OAuth@ietf.org</a><br>
                                                          <a
                                                          moz-do-not-send="true"
href="https://www.ietf.org/mailman/listinfo/oauth" target="_blank">https://www.ietf.org/mailman/listinfo/oauth</a><br>
                                                          <br>
                                                        </blockquote>
                                                      </div>
                                                      <br>
                                                      <br clear="all">
                                                      <div><br>
                                                      </div>
                                                      -- <br>
                                                      Thanks &amp;
                                                      Regards,<br>
                                                      Prabath
                                                      <div><br>
                                                      </div>
                                                      <div>Mobile : <a
moz-do-not-send="true" href="tel:%2B94%2071%20809%206732"
                                                          value="+94718096732"
target="_blank">+94 71 809 6732</a>Â <br>
                                                        <br>
                                                        <a
                                                          moz-do-not-send="true"
href="http://blog.facilelogin.com" target="_blank">http://blog.facilelogin.com</a><br>
                                                        <a
                                                          moz-do-not-send="true"
href="http://RampartFAQ.com" target="_blank">http://RampartFAQ.com</a></div>
                                                    </div>
                                                  </blockquote>
                                                  <br>
                                                </div>
                                              </div>
                                            </div>
                                          </blockquote>
                                        </div>
                                        <br>
                                        <br clear="all">
                                        <div><br>
                                        </div>
                                        -- <br>
                                        Thanks &amp; Regards,<br>
                                        Prabath
                                        <div><br>
                                        </div>
                                        <div>Mobile : <a
                                            moz-do-not-send="true"
                                            href="tel:%2B94%2071%20809%206732"
                                            value="+94718096732"
                                            target="_blank">+94 71 809
                                            6732</a>Â <br>
                                          <br>
                                          <a moz-do-not-send="true"
                                            href="http://blog.facilelogin.com"
                                            target="_blank">http://blog.facilelogin.com</a><br>
                                          <a moz-do-not-send="true"
                                            href="http://RampartFAQ.com"
                                            target="_blank">http://RampartFAQ.com</a></div>
                                      </div>
                                    </blockquote>
                                    <br>
                                  </div>
                                </div>
                              </div>
                            </blockquote>
                          </div>
                          <br>
                          <br clear="all">
                          <div><br>
                          </div>
                          -- <br>
                          Thanks &amp; Regards,<br>
                          Prabath
                          <div><br>
                          </div>
                          <div>Mobile : <a moz-do-not-send="true"
                              href="tel:%2B94%2071%20809%206732"
                              value="+94718096732" target="_blank">+94
                              71 809 6732</a>Â <br>
                            <br>
                            <a moz-do-not-send="true"
                              href="http://blog.facilelogin.com"
                              target="_blank">http://blog.facilelogin.com</a><br>
                            <a moz-do-not-send="true"
                              href="http://RampartFAQ.com"
                              target="_blank">http://RampartFAQ.com</a></div>
                        </div>
                      </blockquote>
                      <br>
                    </div>
                  </div>
                </div>
              </blockquote>
            </div>
            <br>
            <br clear="all">
            <div><br>
            </div>
            -- <br>
            Thanks &amp; Regards,<br>
            Prabath
            <div><br>
            </div>
            <div>Mobile : +94 71 809 6732Â <br>
              <br>
              <a moz-do-not-send="true"
                href="http://blog.facilelogin.com" target="_blank">http://blog.facilelogin.com</a><br>
              <a moz-do-not-send="true" href="http://RampartFAQ.com"
                target="_blank">http://RampartFAQ.com</a></div>
          </div>
        </div>
      </blockquote>
      <blockquote type="cite">
        <div><span>_______________________________________________</span><br>
          <span>OAuth mailing list</span><br>
          <span><a moz-do-not-send="true" href="mailto:OAuth@ietf.org">OAuth@ietf.org</a></span><br>
          <span><a moz-do-not-send="true"
              href="https://www.ietf.org/mailman/listinfo/oauth">https://www.ietf.org/mailman/listinfo/oauth</a></span><br>
        </div>
      </blockquote>
    </blockquote>
    <br>
  </body>
</html>

--------------080204030402040100020608--

From jricher@mitre.org  Tue Feb 12 06:25:55 2013
Return-Path: <jricher@mitre.org>
X-Original-To: oauth@ietfa.amsl.com
Delivered-To: oauth@ietfa.amsl.com
Received: from localhost (localhost [127.0.0.1]) by ietfa.amsl.com (Postfix) with ESMTP id DA29921F8B3B for <oauth@ietfa.amsl.com>; Tue, 12 Feb 2013 06:25:55 -0800 (PST)
X-Virus-Scanned: amavisd-new at amsl.com
X-Spam-Flag: NO
X-Spam-Score: -6.574
X-Spam-Level: 
X-Spam-Status: No, score=-6.574 tagged_above=-999 required=5 tests=[AWL=0.024,  BAYES_00=-2.599, HTML_MESSAGE=0.001, RCVD_IN_DNSWL_MED=-4]
Received: from mail.ietf.org ([64.170.98.30]) by localhost (ietfa.amsl.com [127.0.0.1]) (amavisd-new, port 10024) with ESMTP id PYAfIuYxZVbJ for <oauth@ietfa.amsl.com>; Tue, 12 Feb 2013 06:25:54 -0800 (PST)
Received: from smtpksrv1.mitre.org (smtpksrv1.mitre.org [198.49.146.77]) by ietfa.amsl.com (Postfix) with ESMTP id B55A921F8E70 for <oauth@ietf.org>; Tue, 12 Feb 2013 06:25:54 -0800 (PST)
Received: from smtpksrv1.mitre.org (localhost.localdomain [127.0.0.1]) by localhost (Postfix) with SMTP id 59C2B1F16FE; Tue, 12 Feb 2013 09:25:54 -0500 (EST)
Received: from IMCCAS02.MITRE.ORG (imccas02.mitre.org [129.83.29.79]) by smtpksrv1.mitre.org (Postfix) with ESMTP id 331E21F1772; Tue, 12 Feb 2013 09:25:54 -0500 (EST)
Received: from [10.146.15.29] (129.83.31.58) by IMCCAS02.MITRE.ORG (129.83.29.79) with Microsoft SMTP Server (TLS) id 14.2.318.4; Tue, 12 Feb 2013 09:25:53 -0500
Message-ID: <511A50C7.8080102@mitre.org>
Date: Tue, 12 Feb 2013 09:25:11 -0500
From: Justin Richer <jricher@mitre.org>
User-Agent: Mozilla/5.0 (X11; Linux i686; rv:17.0) Gecko/20130106 Thunderbird/17.0.2
MIME-Version: 1.0
To: Richard Harrington <richard@maymount.com>
References: <51195F3D.1050006@mitre.org> <222C28CB-7F6F-4BC3-8692-40404C2DC2D3@maymount.com>
In-Reply-To: <222C28CB-7F6F-4BC3-8692-40404C2DC2D3@maymount.com>
Content-Type: multipart/alternative; boundary="------------090702080305050905090000"
X-Originating-IP: [129.83.31.58]
Cc: "oauth@ietf.org" <oauth@ietf.org>
Subject: Re: [OAUTH-WG] Registration: HAL _links structure and client self-URL
X-BeenThere: oauth@ietf.org
X-Mailman-Version: 2.1.12
Precedence: list
List-Id: OAUTH WG <oauth.ietf.org>
List-Unsubscribe: <https://www.ietf.org/mailman/options/oauth>, <mailto:oauth-request@ietf.org?subject=unsubscribe>
List-Archive: <http://www.ietf.org/mail-archive/web/oauth>
List-Post: <mailto:oauth@ietf.org>
List-Help: <mailto:oauth-request@ietf.org?subject=help>
List-Subscribe: <https://www.ietf.org/mailman/listinfo/oauth>, <mailto:oauth-request@ietf.org?subject=subscribe>
X-List-Received-Date: Tue, 12 Feb 2013 14:25:56 -0000

--------------090702080305050905090000
Content-Type: text/plain; charset="UTF-8"; format=flowed
Content-Transfer-Encoding: 7bit

I'd be fine with the return from a creation request being a 201 instead 
of a 200.

  -- Justin

On 02/11/2013 06:33 PM, Richard Harrington wrote:
> Since the request is an HTTP POST and a resource is created 
> (http://www.w3.org/Protocols/rfc2616/rfc2616-sec9.html#sec9.5) the 
> response should be an HTTP 201 Created 
> (http://www.w3.org/Protocols/rfc2616/rfc2616-sec10.html#sec10.2.2) 
> which is supposed to include the location of the newly created resource.
>
> This is a good pattern to follow since, as you say, it does provide 
> flexibility.
>
>
>
> On Feb 11, 2013, at 1:14 PM, Justin Richer <jricher@mitre.org 
> <mailto:jricher@mitre.org>> wrote:
>
>> Draft -05 of OAuth Dynamic Client Registration [1] returns a URL 
>> pointer for the client to perform update and secret rotation actions. 
>> This functionality arose from discussions on the list about moving 
>> towards a more RESTful pattern, and Nat Sakimura proposed this 
>> approach in the OpenID Connect Working Group. This URL may be 
>> distinct from the Client Registration Endpoint URL, but draft -05 
>> makes no promises as to its content, form, or structure, though it 
>> does contain implementor's notes on possible methods.
>>
>> Two questions arise from this change:
>> - The semantics of returning the client manipulation URL
>> - The syntax (derived from HAL for JSON [2], an individual I-D 
>> submission)
>>
>> On semantics:
>>
>> Pro:
>> - The server has flexibility on how to define the "update" endpoint, 
>> sending all clients to one URL, sending different clients to 
>> different URLs, or sending clients to a URL with a baked-in query 
>> parameter
>> - The client can take the URL as-is and use it for all management 
>> operations (ie, it doesn't have to generate or compose the URL based 
>> on component parts)
>>
>> Con:
>> - The client must remember one more piece of information from the 
>> server at runtime if it wants to do manipulation and management of 
>> itself at the server (in addition to client_id, client_secret, 
>> registration_access_token, and others)
>>
>> Alternatives include specifying a URL pattern for the server to use 
>> and all clients to follow, specifying a query parameter for the 
>> update action, and specifying a separate endpoint entirely and using 
>> the presence of items such as client_id and the registration access 
>> token to differentiate the requests. Note that *all* of these 
>> alternatives can be accommodated using the semantics described above, 
>> with the same actions on the client's part.
>>
>>
>> On syntax:
>>
>> Pro:
>> - Follows the designs of RFC5988 for link relations
>> - The HAL format is general, and allows for all kinds of other 
>> information to be placed inside the _links structure
>> - Allows for full use of the JSON object to specify advanced 
>> operations on the returned endpoint if desired
>>
>> Con:
>> - The rest of OAuth doesn't follow link relation guidelines (though 
>> it's been brought up)
>> - The HAL format is general, and allows for all kinds of other 
>> information to be placed inside the _links structure
>> - The HAL-JSON document is an expired individual I-D, and it's 
>> unclear what wider adoption looks like right now
>>
>> Alternatives include returning the URL as a separate data member 
>> (registration_update_url), using HTTP headers, or using JSON Schema.
>>
>> -- Justin
>>
>>
>>
>> [1] http://tools.ietf.org/html/draft-ietf-oauth-dyn-reg-05
>> [2] http://tools.ietf.org/html/draft-kelly-json-hal-03
>> _______________________________________________
>> OAuth mailing list
>> OAuth@ietf.org <mailto:OAuth@ietf.org>
>> https://www.ietf.org/mailman/listinfo/oauth


--------------090702080305050905090000
Content-Type: text/html; charset="UTF-8"
Content-Transfer-Encoding: 8bit

<html>
  <head>
    <meta content="text/html; charset=UTF-8" http-equiv="Content-Type">
  </head>
  <body bgcolor="#FFFFFF" text="#000000">
    I'd be fine with the return from a creation request being a 201
    instead of a 200. <br>
    <br>
    Â -- Justin<br>
    <br>
    <div class="moz-cite-prefix">On 02/11/2013 06:33 PM, Richard
      Harrington wrote:<br>
    </div>
    <blockquote
      cite="mid:222C28CB-7F6F-4BC3-8692-40404C2DC2D3@maymount.com"
      type="cite">
      <meta http-equiv="Content-Type" content="text/html; charset=UTF-8">
      <div>Since the request is an HTTP POST and a resource is created (<span
          style="font-family: '.HelveticaNeueUI'; font-size: 15px;
          line-height: 19px; white-space: nowrap;
          -webkit-tap-highlight-color: rgba(26, 26, 26, 0.292969);
          -webkit-composition-fill-color: rgba(175, 192, 227, 0.230469);
          -webkit-composition-frame-color: rgba(77, 128, 180, 0.230469);
          -webkit-text-size-adjust: none; "><a moz-do-not-send="true"
            href="http://www.w3.org/Protocols/rfc2616/rfc2616-sec9.html#sec9.5">http://www.w3.org/Protocols/rfc2616/rfc2616-sec9.html#sec9.5</a>)Â </span><span
          style="font-family: '.HelveticaNeueUI'; font-size: 15px;
          line-height: 19px; white-space: nowrap;
          -webkit-tap-highlight-color: rgba(26, 26, 26, 0.292969);
          -webkit-composition-fill-color: rgba(175, 192, 227, 0.230469);
          -webkit-composition-frame-color: rgba(77, 128, 180, 0.230469);
          -webkit-text-size-adjust: none; ">the response should be an
          HTTP 201 CreatedÂ </span><span style="font-family:
          '.HelveticaNeueUI'; font-size: 15px; line-height: 19px;
          white-space: nowrap; -webkit-tap-highlight-color: rgba(26, 26,
          26, 0.292969); -webkit-composition-fill-color: rgba(175, 192,
          227, 0.230469); -webkit-composition-frame-color: rgba(77, 128,
          180, 0.230469); -webkit-text-size-adjust: none; ">(<a
            moz-do-not-send="true"
            href="http://www.w3.org/Protocols/rfc2616/rfc2616-sec10.html#sec10.2.2">http://www.w3.org/Protocols/rfc2616/rfc2616-sec10.html#sec10.2.2</a>)Â </span><span
          style="font-family: '.HelveticaNeueUI'; font-size: 15px;
          line-height: 19px; white-space: nowrap;
          -webkit-tap-highlight-color: rgba(26, 26, 26, 0.292969);
          -webkit-composition-fill-color: rgba(175, 192, 227, 0.230469);
          -webkit-composition-frame-color: rgba(77, 128, 180, 0.230469);
          -webkit-text-size-adjust: none; ">which is supposed to include
          the location of the newly created resource.</span></div>
      <div><span style="font-family: '.HelveticaNeueUI'; font-size:
          15px; line-height: 19px; white-space: nowrap;
          -webkit-tap-highlight-color: rgba(26, 26, 26, 0.292969);
          -webkit-composition-fill-color: rgba(175, 192, 227, 0.230469);
          -webkit-composition-frame-color: rgba(77, 128, 180, 0.230469);
          -webkit-text-size-adjust: none; "><br>
        </span></div>
      <div><span style="font-family: '.HelveticaNeueUI'; font-size:
          15px; line-height: 19px; white-space: nowrap;
          -webkit-tap-highlight-color: rgba(26, 26, 26, 0.292969);
          -webkit-composition-fill-color: rgba(175, 192, 227, 0.230469);
          -webkit-composition-frame-color: rgba(77, 128, 180, 0.230469);
          -webkit-text-size-adjust: none; ">This is a good pattern to
          follow since, as you say, it does provide flexibility.</span></div>
      <div><span style="font-family: '.HelveticaNeueUI'; font-size:
          15px; line-height: 19px; white-space: nowrap;
          -webkit-tap-highlight-color: rgba(26, 26, 26, 0.292969);
          -webkit-composition-fill-color: rgba(175, 192, 227, 0.230469);
          -webkit-composition-frame-color: rgba(77, 128, 180, 0.230469);
          -webkit-text-size-adjust: none; "><br>
        </span></div>
      <div><span style="font-family: '.HelveticaNeueUI'; font-size:
          15px; line-height: 19px; white-space: nowrap;
          -webkit-tap-highlight-color: rgba(26, 26, 26, 0.292969);
          -webkit-composition-fill-color: rgba(175, 192, 227, 0.230469);
          -webkit-composition-frame-color: rgba(77, 128, 180, 0.230469);
          -webkit-text-size-adjust: none; "><br>
        </span></div>
      <div><br>
        On Feb 11, 2013, at 1:14 PM, Justin Richer &lt;<a
          moz-do-not-send="true" href="mailto:jricher@mitre.org">jricher@mitre.org</a>&gt;
        wrote:<br>
        <br>
      </div>
      <blockquote type="cite">
        <div><span>Draft -05 of OAuth Dynamic Client Registration [1]
            returns a URL pointer for the client to perform update and
            secret rotation actions. This functionality arose from
            discussions on the list about moving towards a more RESTful
            pattern, and Nat Sakimura proposed this approach in the
            OpenID Connect Working Group. This URL may be distinct from
            the Client Registration Endpoint URL, but draft -05 makes no
            promises as to its content, form, or structure, though it
            does contain implementor's notes on possible methods.</span><br>
          <span></span><br>
          <span>Two questions arise from this change:</span><br>
          <span> - The semantics of returning the client manipulation
            URL</span><br>
          <span> - The syntax (derived from HAL for JSON [2], an
            individual I-D submission)</span><br>
          <span></span><br>
          <span>On semantics:</span><br>
          <span></span><br>
          <span>Pro:</span><br>
          <span> - The server has flexibility on how to define the
            "update" endpoint, sending all clients to one URL, sending
            different clients to different URLs, or sending clients to a
            URL with a baked-in query parameter</span><br>
          <span> - The client can take the URL as-is and use it for all
            management operations (ie, it doesn't have to generate or
            compose the URL based on component parts)</span><br>
          <span></span><br>
          <span>Con:</span><br>
          <span> - The client must remember one more piece of
            information from the server at runtime if it wants to do
            manipulation and management of itself at the server (in
            addition to client_id, client_secret,
            registration_access_token, and others)</span><br>
          <span></span><br>
          <span>Alternatives include specifying a URL pattern for the
            server to use and all clients to follow, specifying a query
            parameter for the update action, and specifying a separate
            endpoint entirely and using the presence of items such as
            client_id and the registration access token to differentiate
            the requests. Note that *all* of these alternatives can be
            accommodated using the semantics described above, with the
            same actions on the client's part.</span><br>
          <span></span><br>
          <span></span><br>
          <span>On syntax:</span><br>
          <span></span><br>
          <span>Pro:</span><br>
          <span> - Follows the designs of RFC5988 for link relations</span><br>
          <span> - The HAL format is general, and allows for all kinds
            of other information to be placed inside the _links
            structure</span><br>
          <span> - Allows for full use of the JSON object to specify
            advanced operations on the returned endpoint if desired</span><br>
          <span></span><br>
          <span>Con:</span><br>
          <span> - The rest of OAuth doesn't follow link relation
            guidelines (though it's been brought up)</span><br>
          <span> - The HAL format is general, and allows for all kinds
            of other information to be placed inside the _links
            structure</span><br>
          <span> - The HAL-JSON document is an expired individual I-D,
            and it's unclear what wider adoption looks like right now</span><br>
          <span></span><br>
          <span>Alternatives include returning the URL as a separate
            data member (registration_update_url), using HTTP headers,
            or using JSON Schema.</span><br>
          <span></span><br>
          <span> -- Justin</span><br>
          <span></span><br>
          <span></span><br>
          <span></span><br>
          <span>[1] <a moz-do-not-send="true"
              href="http://tools.ietf.org/html/draft-ietf-oauth-dyn-reg-05">http://tools.ietf.org/html/draft-ietf-oauth-dyn-reg-05</a></span><br>
          <span>[2] <a moz-do-not-send="true"
              href="http://tools.ietf.org/html/draft-kelly-json-hal-03">http://tools.ietf.org/html/draft-kelly-json-hal-03</a></span><br>
          <span>_______________________________________________</span><br>
          <span>OAuth mailing list</span><br>
          <span><a moz-do-not-send="true" href="mailto:OAuth@ietf.org">OAuth@ietf.org</a></span><br>
          <span><a moz-do-not-send="true"
              href="https://www.ietf.org/mailman/listinfo/oauth">https://www.ietf.org/mailman/listinfo/oauth</a></span><br>
        </div>
      </blockquote>
    </blockquote>
    <br>
  </body>
</html>

--------------090702080305050905090000--

From jricher@mitre.org  Tue Feb 12 06:30:27 2013
Return-Path: <jricher@mitre.org>
X-Original-To: oauth@ietfa.amsl.com
Delivered-To: oauth@ietfa.amsl.com
Received: from localhost (localhost [127.0.0.1]) by ietfa.amsl.com (Postfix) with ESMTP id 1D47621F8E1B for <oauth@ietfa.amsl.com>; Tue, 12 Feb 2013 06:30:27 -0800 (PST)
X-Virus-Scanned: amavisd-new at amsl.com
X-Spam-Flag: NO
X-Spam-Score: -6.275
X-Spam-Level: 
X-Spam-Status: No, score=-6.275 tagged_above=-999 required=5 tests=[AWL=-0.276, BAYES_00=-2.599, J_CHICKENPOX_82=0.6, RCVD_IN_DNSWL_MED=-4]
Received: from mail.ietf.org ([64.170.98.30]) by localhost (ietfa.amsl.com [127.0.0.1]) (amavisd-new, port 10024) with ESMTP id Mk5CnZXpX7-l for <oauth@ietfa.amsl.com>; Tue, 12 Feb 2013 06:30:26 -0800 (PST)
Received: from smtpksrv1.mitre.org (smtpksrv1.mitre.org [198.49.146.77]) by ietfa.amsl.com (Postfix) with ESMTP id 1B2F821F8E19 for <oauth@ietf.org>; Tue, 12 Feb 2013 06:30:26 -0800 (PST)
Received: from smtpksrv1.mitre.org (localhost.localdomain [127.0.0.1]) by localhost (Postfix) with SMTP id AC1171F1772; Tue, 12 Feb 2013 09:30:25 -0500 (EST)
Received: from IMCCAS01.MITRE.ORG (imccas01.mitre.org [129.83.29.78]) by smtpksrv1.mitre.org (Postfix) with ESMTP id 7D3801F1748; Tue, 12 Feb 2013 09:30:25 -0500 (EST)
Received: from [10.146.15.29] (129.83.31.58) by IMCCAS01.MITRE.ORG (129.83.29.78) with Microsoft SMTP Server (TLS) id 14.2.318.4; Tue, 12 Feb 2013 09:30:25 -0500
Message-ID: <511A51D6.9040604@mitre.org>
Date: Tue, 12 Feb 2013 09:29:42 -0500
From: Justin Richer <jricher@mitre.org>
User-Agent: Mozilla/5.0 (X11; Linux i686; rv:17.0) Gecko/20130106 Thunderbird/17.0.2
MIME-Version: 1.0
To: John Bradley <ve7jtb@ve7jtb.com>
References: <51195F3F.7000704@mitre.org> <4E1F6AAD24975D4BA5B16804296739436743E371@TK5EX14MBXC285.redmond.corp.microsoft.com> <7FB7A108-EA9E-429A-BD86-7E09EA206748@ve7jtb.com>
In-Reply-To: <7FB7A108-EA9E-429A-BD86-7E09EA206748@ve7jtb.com>
Content-Type: text/plain; charset="ISO-8859-1"; format=flowed
Content-Transfer-Encoding: 7bit
X-Originating-IP: [129.83.31.58]
Cc: "oauth@ietf.org" <oauth@ietf.org>
Subject: Re: [OAUTH-WG] Registration: Client secret rotation
X-BeenThere: oauth@ietf.org
X-Mailman-Version: 2.1.12
Precedence: list
List-Id: OAUTH WG <oauth.ietf.org>
List-Unsubscribe: <https://www.ietf.org/mailman/options/oauth>, <mailto:oauth-request@ietf.org?subject=unsubscribe>
List-Archive: <http://www.ietf.org/mail-archive/web/oauth>
List-Post: <mailto:oauth@ietf.org>
List-Help: <mailto:oauth-request@ietf.org?subject=help>
List-Subscribe: <https://www.ietf.org/mailman/listinfo/oauth>, <mailto:oauth-request@ietf.org?subject=subscribe>
X-List-Received-Date: Tue, 12 Feb 2013 14:30:27 -0000

This is actually the approach that I favor now as well -- let the server 
do the secret rotation if it wants to, and have the client be prepared 
to receive a new client_secret or registration_access_token on any read 
or update request.

This would necessitate changing the returned values, essentially 
collapsing the returns from the read/update and rotate actions into one 
structure that's closer to the one returned from initial registration. 
This has the added benefit of parallelizing the responses for these 
three actions, which I like as well.

  -- Justin

On 02/11/2013 08:42 PM, John Bradley wrote:
> OAuth doesn't say anything about client secrets other than they are provisioned in a magic realm outside the OAuth spec (Getting in the mood for the next IETF).
>
> Rotating client secrets was something I made up for connect because it seemed like a good idea at the time given that someone breaking in to the registration endpoint could take over a connection.
>
> We later separated the authentication to the token endpoint from the registration endpoint,in what I think was a good move.
>
> It is sort of up to the authorization server to make decisions about rotating client secrets, I expect that in the real world a client would try access ing the token endpoint and get back a invalid_client error response and then heck it's registration to see if the client_secret has changed.
>
> I suppose that a client could request rotating its secret if it thinks it has been compromised,  however the compromiser is more likely to quickly change the secret to lock out the legitimate clients before the good one notices.    I think the client wanting to rotate is enough of a edge case that it could deal with it out of band.
>
> Letting the server rotate the client secret according to what ever policy it decides is best is probably safest.
>
> We didn't have anything for rotating the access token.  I suspect that rotating it under the clients control is going to create as many problems as it solves.
>
> If you want to rotate it,  make it a refresh token that is issues and use OAuth to provide access tokens from the token endpoint.   Creating a new endpoint to duplicate existing OAuth functionality is overkill.
>
> John B.
> On 2013-02-11, at 10:18 PM, Mike Jones <Michael.Jones@microsoft.com> wrote:
>
>> The rotate_secret operation was added to OpenID Connect Registration as a workaround to the fact that registration updates used to be authenticated using the client secret, so it seemed overly dangerous to have an update operation potentially return an updated secret and have the secret be lost due to communication problems - leaving the client stranded.  Since then, registration was changed to use a bearer token to authenticate update operations, and so this failure mode can't occur anymore.  It was an omission not to have deleted the unneeded operation then.
>>
>> It's been deleted from OpenID Connect Registration and should likewise be deleted from OAuth registration, since it is unneeded.  If a new client secret is needed, there's nothing stopping the registration server from returning it in the result of an update operation.
>>
>> 				-- Mike
>>
>> -----Original Message-----
>> From: oauth-bounces@ietf.org [mailto:oauth-bounces@ietf.org] On Behalf Of Justin Richer
>> Sent: Monday, February 11, 2013 1:15 PM
>> To: oauth@ietf.org
>> Subject: [OAUTH-WG] Registration: Client secret rotation
>>
>> Draft -05 of OAuth Dynamic Client Registration [1] defines a means of the client requesting a new client_secret (if applicable) and a new registration_access_token. Client secrets MAY expire after some period of time, and this method allows for a refresh of that secret. Draft -00 defined no such operation, drafts -01 through -04 defined this operation in terms of the operation=rotate_secret parameter, and draft -05 defines it through a secondary endpoint, the Client Secret Rotation Endpoint.
>> This raises several questions:
>>
>>   - Should the client be allowed to request rotation of its secret?
>>   - Would a client ever take this action of its own accord?
>>   - Can a server rotate the secret of the client without the client asking? (This seems to be an obvious "yes")
>>
>> Alternatives that keep this functionality include defining the rotate_secret operation in terms of an HTTP verb, a query parameter, or separate endpoint. Alternatively, we could drop the rotate_secret operation all together. If we do this, we have to decide if the client secret can still expire. If it can, then we need a way for the client to get this new secret through a means that doesn't require it to request a change in secret, such as sending it back as part of the client READ operation (see other thread on RESTful verbs).
>>
>>   -- Justin
>>
>>
>> [1] http://tools.ietf.org/html/draft-ietf-oauth-dyn-reg-05
>> _______________________________________________
>> OAuth mailing list
>> OAuth@ietf.org
>> https://www.ietf.org/mailman/listinfo/oauth
>> _______________________________________________
>> OAuth mailing list
>> OAuth@ietf.org
>> https://www.ietf.org/mailman/listinfo/oauth


From twbray@google.com  Tue Feb 12 06:43:54 2013
Return-Path: <twbray@google.com>
X-Original-To: oauth@ietfa.amsl.com
Delivered-To: oauth@ietfa.amsl.com
Received: from localhost (localhost [127.0.0.1]) by ietfa.amsl.com (Postfix) with ESMTP id B45B221F8E8B for <oauth@ietfa.amsl.com>; Tue, 12 Feb 2013 06:43:54 -0800 (PST)
X-Virus-Scanned: amavisd-new at amsl.com
X-Spam-Flag: NO
X-Spam-Score: -101.144
X-Spam-Level: 
X-Spam-Status: No, score=-101.144 tagged_above=-999 required=5 tests=[AWL=-0.833, BAYES_00=-2.599, FM_FORGED_GMAIL=0.622, HTML_MESSAGE=0.001, NO_RELAYS=-0.001, SARE_HTML_USL_OBFU=1.666, USER_IN_WHITELIST=-100]
Received: from mail.ietf.org ([64.170.98.30]) by localhost (ietfa.amsl.com [127.0.0.1]) (amavisd-new, port 10024) with ESMTP id yW-PZiCCBZOn for <oauth@ietfa.amsl.com>; Tue, 12 Feb 2013 06:43:53 -0800 (PST)
Received: from mail-ie0-x231.google.com (ie-in-x0231.1e100.net [IPv6:2607:f8b0:4001:c03::231]) by ietfa.amsl.com (Postfix) with ESMTP id 46B5421F8E87 for <oauth@ietf.org>; Tue, 12 Feb 2013 06:43:53 -0800 (PST)
Received: by mail-ie0-f177.google.com with SMTP id 16so179083iea.36 for <oauth@ietf.org>; Tue, 12 Feb 2013 06:43:52 -0800 (PST)
DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=google.com; s=20120113; h=mime-version:x-received:in-reply-to:references:date:message-id :subject:from:to:cc:content-type; bh=hzCjzpyjRGy37joiPH3sCB42s2ZUJ/lKa8pZ9DVepIE=; b=hP4uW6QxetS6UeUGQYlDeNxJ6qGJc8zTypbAf9TWV//dXpVXhgutRQ3rY4CgWW7hgo njze/U3ZOJ5UliP/xeK8ddlGIAm6R0DrS+K5aTflcyKmhuy8UCnw/Rr4p9e7rvQHE2yd KVIGkfC4HstcUldGMwV9oMuXSBqN9jSEvGZH5MZZZYqqcvBuVY7xKHWDmkaL8ciC3EYx LAGNma/9/4H4Ege/RmTttOmK7mA+tPii2uW3HlnDSDBqwvUAoJLGZxv8rOd4D8kSNAXY JueK88vdd74fZBk0TaSiOD7e76F4CRQVazCrpIUWh/ACGKYTW3ZqKgM0WaYUmFv8ksO4 iRKg==
X-Google-DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=google.com; s=20120113; h=mime-version:x-received:in-reply-to:references:date:message-id :subject:from:to:cc:content-type:x-gm-message-state; bh=hzCjzpyjRGy37joiPH3sCB42s2ZUJ/lKa8pZ9DVepIE=; b=jnTOm04m2c0Rm26Kg3ptEEPtVokTlyAwrQWo01B3GlB7h9sZIinTH368nGFEnIaazb sbEEl0YQ+ZIk+GILB6EzMz/82X3huI/KsjpG2AabW03+dRWUCfzpJzyo3vPm+OlN5Gy0 zxcx3kxYSXv4dMSxYZoSpnjkSXiClwcbGeT3PVzu5F+VEJ4Nfl7MAhtm1ep5dCyysmhz UC5iGpwY8NtBjJgG69MN7pVLG1BFR80i74W7UGCHos1Tcs/fWWEsDM3efce+XWXfIUz7 iBiLBuJSYx0kyL5ljHjdvTMnXdvFHFia2owrHcxxC0w2l1UCn67ceGHuQVMYW4j+gEKi Fowg==
MIME-Version: 1.0
X-Received: by 10.50.208.68 with SMTP id mc4mr3766653igc.35.1360680232583; Tue, 12 Feb 2013 06:43:52 -0800 (PST)
Received: by 10.64.25.17 with HTTP; Tue, 12 Feb 2013 06:43:52 -0800 (PST)
Received: by 10.64.25.17 with HTTP; Tue, 12 Feb 2013 06:43:52 -0800 (PST)
In-Reply-To: <511A2692.2070209@gmail.com>
References: <51195F39.3040809@mitre.org> <4E1F6AAD24975D4BA5B16804296739436743E3DD@TK5EX14MBXC285.redmond.corp.microsoft.com> <511A2692.2070209@gmail.com>
Date: Tue, 12 Feb 2013 06:43:52 -0800
Message-ID: <CA+ZpN27AcxYNUObsviAdgMP2bJ=AjO9KbAjdV1As1z8=0eCjmQ@mail.gmail.com>
From: Tim Bray <twbray@google.com>
To: Sergey Beryozkin <sberyozkin@gmail.com>
Content-Type: multipart/alternative; boundary=14dae93408e7ea831504d5880d86
X-Gm-Message-State: ALoCoQmjtSJfOigh59/zAACUrgOPHrWNYZQenULraUMZcUAavGlvtQMkkjtibFsyWB4z//CcwfI2/d+CXXkFNGFDOVqdGsdMO/Ybmq4BnhPWLLZ9gehPgj3jA7umB3+CwDHoT2kRxZ/FFTCTe1dTfHH3IPCc5D58BEcHPjwgpnNInnj7ePo3bm5Jl6uEgqio35LfGVsrspgk
Cc: oauth@ietf.org
Subject: Re: [OAUTH-WG] Registration: Endpoint Definition (& operation parameter)
X-BeenThere: oauth@ietf.org
X-Mailman-Version: 2.1.12
Precedence: list
List-Id: OAUTH WG <oauth.ietf.org>
List-Unsubscribe: <https://www.ietf.org/mailman/options/oauth>, <mailto:oauth-request@ietf.org?subject=unsubscribe>
List-Archive: <http://www.ietf.org/mail-archive/web/oauth>
List-Post: <mailto:oauth@ietf.org>
List-Help: <mailto:oauth-request@ietf.org?subject=help>
List-Subscribe: <https://www.ietf.org/mailman/listinfo/oauth>, <mailto:oauth-request@ietf.org?subject=subscribe>
X-List-Received-Date: Tue, 12 Feb 2013 14:43:54 -0000

--14dae93408e7ea831504d5880d86
Content-Type: text/plain; charset=UTF-8

?! /foo and /foo/bar are obviously distinct endpoints.
On Feb 12, 2013 3:25 AM, "Sergey Beryozkin" <sberyozkin@gmail.com> wrote:

> Hi Mike,
> On 12/02/13 01:26, Mike Jones wrote:
>
>> At most, there should be two endpoints - creation and management - for a
>> client, but the protocol should be structured such that they *can* be at
>> the same URL, if the server so chooses.  A simple way to accomplish this is
>> to require that the client_id value be provided as an input parameter on
>> update operations.  Then for implementations that use a single endpoint,
>> they can distinguish "create" and "update" operations on the management
>> endpoint by the presence or absence of the client_id value.
>>
>>  Perhaps the text can be relaxed somehow to not refer to
>
> /register
> and
> /register/{client_id}
>
> as two different endpoints ? I think it is a single endpoint from the
> implementation point of view :-).
>
> Or may be the spec can indeed be relaxed a bit and allow for a PUT form
> payload be sent directly to /register
>
> Cheers, Sergey
>
>  If you want to have separate endpoints and don't need the client_id
>> because you have somehow encoded it into the management endpoint URL,
>> that's fine.  It still can serve as a useful cross-check that the client
>> (or an attacker) is requesting a change to a client that matches the bearer
>> token used.  But including it is necessary for implementations that want to
>> use a single registration endpoint, rather than having a proliferation of
>> per-client endpoints.
>>
>> BTW, just for the record, OAuth 2.0 uses the same endpoint for initial
>> access token requests and requests for refreshed access tokens - with the
>> operations being distinguished by whether a refresh_token parameter is
>> present.  So there's a useful OAuth precedent for doing things this way.
>>
>>                                 -- Mike
>>
>> -----Original Message-----
>> From: oauth-bounces@ietf.org [mailto:oauth-bounces@ietf.org**] On Behalf
>> Of Justin Richer
>> Sent: Monday, February 11, 2013 1:15 PM
>> To: oauth@ietf.org
>> Subject: [OAUTH-WG] Registration: Endpoint Definition (&  operation
>> parameter)
>>
>> Draft -05 of OAuth Dynamic Client Registration [1] defines three
>> fundamental operations that a client can undertake: Client Registration,
>> Client Update, and Secret Rotation. Each of these actions needs to be
>> differentiated *somehow* by the client and server as part of the protocol.
>> Draft -00 defined only the "register" operation, drafts -01 through -04
>> made use of an "operation" parameter on a single endpoint, which brought up
>> a long discussion on the list on whether or not that was an appropriate
>> design. Draft -05 did away with the definition of the "operation" parameter
>> on a single endpoint and instead opted for separating the base
>> functionality into three different endpoints.
>>
>> Pro:
>>    - Closer to RESTful semantics of having one URL for creation and
>> another URL for management of an item (eg, most REST APIs use /object for
>> creation and /object/object_id for manipulation)
>>    - The rest of OAuth (and its extensions) defines separate endpoints
>> for different actions (Authorization, Token, Revocation, Introspection) as
>> opposed to a single endpoint with a mode-switch parameter
>>    - Client doesn't have to generate a URL string for different endpoints
>> by combining parameters with a base URL
>>
>> Con:
>>    - Not quite exactly RESTful as the spec doesn't dictate the client_id
>> be part of the update or rotate URL (though and implementor's note
>> suggests this)
>>    - Client has to track different URLs for different actions
>>    - Server must be able to differentiate actions based on these
>> different URLs.
>>
>> Alternatives include using different HTTP verbs (see other thread) or
>> defining an operational switch parameter, like older drafts, on a single
>> endpoint URL. Another suggested alternative is to look for the presence
>> of certain parameters, such as client_id or the registration access
>> token, to indicate that a different operation is requested.
>>
>> There's also question of whether the Secret Rotation action needs to
>> have its own endpoint, or if it can be collapsed into one of the others.
>> It has been suggested off-list that the secret rotation should never be
>> initiated by the Client but instead the client should simply request its
>> latest secret from the server through the update (or read) semantics.
>>
>>    -- Justin
>>
>> [1] http://tools.ietf.org/html/**draft-ietf-oauth-dyn-reg-05<http://tools.ietf.org/html/draft-ietf-oauth-dyn-reg-05>
>> ______________________________**_________________
>> OAuth mailing list
>> OAuth@ietf.org
>> https://www.ietf.org/mailman/**listinfo/oauth<https://www.ietf.org/mailman/listinfo/oauth>
>> ______________________________**_________________
>> OAuth mailing list
>> OAuth@ietf.org
>> https://www.ietf.org/mailman/**listinfo/oauth<https://www.ietf.org/mailman/listinfo/oauth>
>>
>
> ______________________________**_________________
> OAuth mailing list
> OAuth@ietf.org
> https://www.ietf.org/mailman/**listinfo/oauth<https://www.ietf.org/mailman/listinfo/oauth>
>

--14dae93408e7ea831504d5880d86
Content-Type: text/html; charset=UTF-8
Content-Transfer-Encoding: quoted-printable

<p dir=3D"ltr">?! /foo and /foo/bar are obviously distinct endpoints.</p>
<div class=3D"gmail_quote">On Feb 12, 2013 3:25 AM, &quot;Sergey Beryozkin&=
quot; &lt;<a href=3D"mailto:sberyozkin@gmail.com">sberyozkin@gmail.com</a>&=
gt; wrote:<br type=3D"attribution"><blockquote class=3D"gmail_quote" style=
=3D"margin:0 0 0 .8ex;border-left:1px #ccc solid;padding-left:1ex">
Hi Mike,<br>
On 12/02/13 01:26, Mike Jones wrote:<br>
<blockquote class=3D"gmail_quote" style=3D"margin:0 0 0 .8ex;border-left:1p=
x #ccc solid;padding-left:1ex">
At most, there should be two endpoints - creation and management - for a cl=
ient, but the protocol should be structured such that they *can* be at the =
same URL, if the server so chooses. =C2=A0A simple way to accomplish this i=
s to require that the client_id value be provided as an input parameter on =
update operations. =C2=A0Then for implementations that use a single endpoin=
t, they can distinguish &quot;create&quot; and &quot;update&quot; operation=
s on the management endpoint by the presence or absence of the client_id va=
lue.<br>

<br>
</blockquote>
Perhaps the text can be relaxed somehow to not refer to<br>
<br>
/register<br>
and<br>
/register/{client_id}<br>
<br>
as two different endpoints ? I think it is a single endpoint from the imple=
mentation point of view :-).<br>
<br>
Or may be the spec can indeed be relaxed a bit and allow for a PUT form pay=
load be sent directly to /register<br>
<br>
Cheers, Sergey<br>
<br>
<blockquote class=3D"gmail_quote" style=3D"margin:0 0 0 .8ex;border-left:1p=
x #ccc solid;padding-left:1ex">
If you want to have separate endpoints and don&#39;t need the client_id bec=
ause you have somehow encoded it into the management endpoint URL, that&#39=
;s fine. =C2=A0It still can serve as a useful cross-check that the client (=
or an attacker) is requesting a change to a client that matches the bearer =
token used. =C2=A0But including it is necessary for implementations that wa=
nt to use a single registration endpoint, rather than having a proliferatio=
n of per-client endpoints.<br>

<br>
BTW, just for the record, OAuth 2.0 uses the same endpoint for initial acce=
ss token requests and requests for refreshed access tokens - with the opera=
tions being distinguished by whether a refresh_token parameter is present. =
=C2=A0So there&#39;s a useful OAuth precedent for doing things this way.<br=
>

<br>
=C2=A0 =C2=A0 =C2=A0 =C2=A0 =C2=A0 =C2=A0 =C2=A0 =C2=A0 =C2=A0 =C2=A0 =C2=
=A0 =C2=A0 =C2=A0 =C2=A0 =C2=A0 =C2=A0 -- Mike<br>
<br>
-----Original Message-----<br>
From: <a href=3D"mailto:oauth-bounces@ietf.org" target=3D"_blank">oauth-bou=
nces@ietf.org</a> [mailto:<a href=3D"mailto:oauth-bounces@ietf.org" target=
=3D"_blank">oauth-bounces@ietf.org</a><u></u>] On Behalf Of Justin Richer<b=
r>
Sent: Monday, February 11, 2013 1:15 PM<br>
To: <a href=3D"mailto:oauth@ietf.org" target=3D"_blank">oauth@ietf.org</a><=
br>
Subject: [OAUTH-WG] Registration: Endpoint Definition (&amp; =C2=A0operatio=
n parameter)<br>
<br>
Draft -05 of OAuth Dynamic Client Registration [1] defines three fundamenta=
l operations that a client can undertake: Client Registration, Client Updat=
e, and Secret Rotation. Each of these actions needs to be differentiated *s=
omehow* by the client and server as part of the protocol. Draft -00 defined=
 only the &quot;register&quot; operation, drafts -01 through -04 made use o=
f an &quot;operation&quot; parameter on a single endpoint, which brought up=
 a long discussion on the list on whether or not that was an appropriate de=
sign. Draft -05 did away with the definition of the &quot;operation&quot; p=
arameter on a single endpoint and instead opted for separating the base fun=
ctionality into three different endpoints.<br>

<br>
Pro:<br>
=C2=A0 =C2=A0- Closer to RESTful semantics of having one URL for creation a=
nd another URL for management of an item (eg, most REST APIs use /object fo=
r creation and /object/object_id for manipulation)<br>
=C2=A0 =C2=A0- The rest of OAuth (and its extensions) defines separate endp=
oints for different actions (Authorization, Token, Revocation, Introspectio=
n) as opposed to a single endpoint with a mode-switch parameter<br>
=C2=A0 =C2=A0- Client doesn&#39;t have to generate a URL string for differe=
nt endpoints by combining parameters with a base URL<br>
<br>
Con:<br>
=C2=A0 =C2=A0- Not quite exactly RESTful as the spec doesn&#39;t dictate th=
e client_id<br>
be part of the update or rotate URL (though and implementor&#39;s note<br>
suggests this)<br>
=C2=A0 =C2=A0- Client has to track different URLs for different actions<br>
=C2=A0 =C2=A0- Server must be able to differentiate actions based on these<=
br>
different URLs.<br>
<br>
Alternatives include using different HTTP verbs (see other thread) or<br>
defining an operational switch parameter, like older drafts, on a single<br=
>
endpoint URL. Another suggested alternative is to look for the presence<br>
of certain parameters, such as client_id or the registration access<br>
token, to indicate that a different operation is requested.<br>
<br>
There&#39;s also question of whether the Secret Rotation action needs to<br=
>
have its own endpoint, or if it can be collapsed into one of the others.<br=
>
It has been suggested off-list that the secret rotation should never be<br>
initiated by the Client but instead the client should simply request its<br=
>
latest secret from the server through the update (or read) semantics.<br>
<br>
=C2=A0 =C2=A0-- Justin<br>
<br>
[1] <a href=3D"http://tools.ietf.org/html/draft-ietf-oauth-dyn-reg-05" targ=
et=3D"_blank">http://tools.ietf.org/html/<u></u>draft-ietf-oauth-dyn-reg-05=
</a><br>
______________________________<u></u>_________________<br>
OAuth mailing list<br>
<a href=3D"mailto:OAuth@ietf.org" target=3D"_blank">OAuth@ietf.org</a><br>
<a href=3D"https://www.ietf.org/mailman/listinfo/oauth" target=3D"_blank">h=
ttps://www.ietf.org/mailman/<u></u>listinfo/oauth</a><br>
______________________________<u></u>_________________<br>
OAuth mailing list<br>
<a href=3D"mailto:OAuth@ietf.org" target=3D"_blank">OAuth@ietf.org</a><br>
<a href=3D"https://www.ietf.org/mailman/listinfo/oauth" target=3D"_blank">h=
ttps://www.ietf.org/mailman/<u></u>listinfo/oauth</a><br>
</blockquote>
<br>
______________________________<u></u>_________________<br>
OAuth mailing list<br>
<a href=3D"mailto:OAuth@ietf.org" target=3D"_blank">OAuth@ietf.org</a><br>
<a href=3D"https://www.ietf.org/mailman/listinfo/oauth" target=3D"_blank">h=
ttps://www.ietf.org/mailman/<u></u>listinfo/oauth</a><br>
</blockquote></div>

--14dae93408e7ea831504d5880d86--

From jricher@mitre.org  Tue Feb 12 06:54:08 2013
Return-Path: <jricher@mitre.org>
X-Original-To: oauth@ietfa.amsl.com
Delivered-To: oauth@ietfa.amsl.com
Received: from localhost (localhost [127.0.0.1]) by ietfa.amsl.com (Postfix) with ESMTP id C336E21F8E73 for <oauth@ietfa.amsl.com>; Tue, 12 Feb 2013 06:53:46 -0800 (PST)
X-Virus-Scanned: amavisd-new at amsl.com
X-Spam-Flag: NO
X-Spam-Score: -6.569
X-Spam-Level: 
X-Spam-Status: No, score=-6.569 tagged_above=-999 required=5 tests=[AWL=0.030,  BAYES_00=-2.599, RCVD_IN_DNSWL_MED=-4]
Received: from mail.ietf.org ([64.170.98.30]) by localhost (ietfa.amsl.com [127.0.0.1]) (amavisd-new, port 10024) with ESMTP id t381G5XIFVWu for <oauth@ietfa.amsl.com>; Tue, 12 Feb 2013 06:53:38 -0800 (PST)
Received: from smtpksrv1.mitre.org (smtpksrv1.mitre.org [198.49.146.77]) by ietfa.amsl.com (Postfix) with ESMTP id 5212721F8E75 for <oauth@ietf.org>; Tue, 12 Feb 2013 06:53:34 -0800 (PST)
Received: from smtpksrv1.mitre.org (localhost.localdomain [127.0.0.1]) by localhost (Postfix) with SMTP id 873A51F172B; Tue, 12 Feb 2013 09:53:33 -0500 (EST)
Received: from IMCCAS02.MITRE.ORG (imccas02.mitre.org [129.83.29.79]) by smtpksrv1.mitre.org (Postfix) with ESMTP id 7BEFD1F1723; Tue, 12 Feb 2013 09:53:33 -0500 (EST)
Received: from [10.146.15.29] (129.83.31.58) by IMCCAS02.MITRE.ORG (129.83.29.79) with Microsoft SMTP Server (TLS) id 14.2.318.4; Tue, 12 Feb 2013 09:53:33 -0500
Message-ID: <511A5742.30707@mitre.org>
Date: Tue, 12 Feb 2013 09:52:50 -0500
From: Justin Richer <jricher@mitre.org>
User-Agent: Mozilla/5.0 (X11; Linux i686; rv:17.0) Gecko/20130106 Thunderbird/17.0.2
MIME-Version: 1.0
To: Torsten Lodderstedt <torsten@lodderstedt.net>
References: <51195F36.6040705@mitre.org> <780F8C26-19A4-4301-B350-307D9FFF69CD@ve7jtb.com> <80727F20-A830-4778-B11C-D45389310646@lodderstedt.net>
In-Reply-To: <80727F20-A830-4778-B11C-D45389310646@lodderstedt.net>
Content-Type: text/plain; charset="ISO-8859-1"; format=flowed
Content-Transfer-Encoding: 7bit
X-Originating-IP: [129.83.31.58]
Cc: "oauth@ietf.org" <oauth@ietf.org>
Subject: Re: [OAUTH-WG] Registration: RESTful client lifecycle management
X-BeenThere: oauth@ietf.org
X-Mailman-Version: 2.1.12
Precedence: list
List-Id: OAUTH WG <oauth.ietf.org>
List-Unsubscribe: <https://www.ietf.org/mailman/options/oauth>, <mailto:oauth-request@ietf.org?subject=unsubscribe>
List-Archive: <http://www.ietf.org/mail-archive/web/oauth>
List-Post: <mailto:oauth@ietf.org>
List-Help: <mailto:oauth-request@ietf.org?subject=help>
List-Subscribe: <https://www.ietf.org/mailman/listinfo/oauth>, <mailto:oauth-request@ietf.org?subject=subscribe>
X-List-Received-Date: Tue, 12 Feb 2013 14:54:08 -0000

The problem that I have with "always including the client_id" is *where* 
to include it. Are we talking a query parameter, URI template, or 
somewhere in the request body? The latter will only work for POST and 
PUT, so it's out of the question to support GET and DELETE using that 
semantic. I think we should support all operations using parallel syntax 
-- that's just good API design.

I *really* don't like the idea of switching the action solely based on 
whether or not the client_id is present in the request body of a POST. 
This is a side-effectful mode switch, and it will only lead to pain and 
misery. Additionally, if the input is JSON (separate discussion), then a 
server would have to parse the JSON body before knowing where to route 
the request. In most web development frameworks that I've used, this is 
impossible. A query parameter or URL pattern, on the other hand, is doable.

As it stands right now, a server is free to include the client_id in the 
"update/management" URL that it returns as part of the _link structure 
(separate discussion). The current text goes as far as recommending that 
practice, but doesn't take the step of requiring it in any form, and 
leaving it up to the server to decide what form it takes. If a server 
can route better with a query parameter, it'll return a URL to the 
client that has a client_id= query parameter. If a server would rather 
use a path component with the client_id, it can do that, too. If it 
wants to put everything on one URL and differentiate through the request 
body or presence/absence of the registration_access_token, it can always 
return the same URL to every client. I think that's nuts, but you can do 
it. Interoperability is preserved because the client simply follows the 
returned URL to do its bits and pieces, and it doesn't ever have to 
create or compose this URL from component parts.

I want to continue to distinguish between the POST and PUT operations 
for create and update, respectively. This is a common pattern and the 
one described in the original REST thesis that described the 
architectural style. I'll also bring up that the semantics of PUT are 
intended to be "replace all", which is what you had originally argued 
for in the update case as well. I not convinced that developers of today 
can't handle HTTP verbs like PUT if they want to do fancier operations 
like updates. Note that the core operations, create and read, remain as 
POST and GET, which would be well within the grasp of every library and 
web developer today.

  -- Justin

On 02/12/2013 02:23 AM, Torsten Lodderstedt wrote:
> +1 for always including the client_id
>
> As John pointed out, there could be different entities updating client data. Then one has to distinguish the resource and the credential.
>
> Am 12.02.2013 um 02:51 schrieb John Bradley <ve7jtb@ve7jtb.com>:
>
>> I would always include the client_id on update.
>>
>> I think it is also us full to have other tokens used at the update endpoint.  I can see the master token used to update all the clients it has registered as part of API management.
>> Relying on the registration_access_token is probably a design that will cause trouble down the road.
>>
>> I think GET and POST are relatively clear.   I don't know about expelling PUT to developers.  I think POST with a client_id to a (separate discussion) update_uri works without restricting it to PUT.
>>
>> I think DELETE needs to be better understood.   I think a status that can be set for client lifecycle is better than letting a client delete a entry.
>> In some cases there will be more than one instance of a client and letting them know they have been turned off for a reason is better than making there registration disappear.
>> So for the moment I would levee out DELETE.
>>
>> John B.
>>
>> On 2013-02-11, at 6:14 PM, Justin Richer <jricher@mitre.org> wrote:
>>
>>> Draft -05 of OAuth Dynamic Client Registration [1] defines several operations that the client can take on its behalf as part of the registration process. These boil down to the basic CRUD operations that you find in many APIs: Create, Read, Update, Delete. Draft -00 defined only the "Create" operation, draft -01 through -04 added the "Update" operation, switched using the "operation=" parameter.
>>>
>>> Following several suggestions to do so on the list, the -05 draft defines these operations in terms of a RESTful API for the client. Namely:
>>>
>>> - HTTP POST to registration endpoint => Create (register) a new client
>>> - HTTP PUT to update endpoint (with registration_access_token) => Update the registered information for this client
>>> - HTTP GET to update endpoint (with registration_access_token) => read the registered information for this client
>>> - HTTP DELETE to update endpoint (with registration_access_token) => Delete (unregister/de-provision) this client
>>>
>>> The two main issues at stake here are: the addition of the READ and DELETE methods, and the use of HTTP verbs following a RESTful design philosophy.
>>>
>>> Pro:
>>> - RESTful APIs (with HTTP verbs to differentiate functionality) are the norm today
>>> - Full lifecycle management is common and is going to be expected by many users of this protocol in the wild
>>>
>>> Cons:
>>> - Update semantics are still under debate (full replace? patch?)
>>> - Somewhat increased complexity on the server to support all operations
>>> - Client has to understand all HTTP verbs for full access (though plain registration is just POST)
>>>
>>>
>>> Alternatives include using an operational switch parameter (like the old drafts), defining separate endpoints for every action, or doing all operations on a single endpoint using verbs to switch.
>>>
>>> -- Justin
>>>
>>> [1] http://tools.ietf.org/html/draft-ietf-oauth-dyn-reg-05
>>> _______________________________________________
>>> OAuth mailing list
>>> OAuth@ietf.org
>>> https://www.ietf.org/mailman/listinfo/oauth
>> _______________________________________________
>> OAuth mailing list
>> OAuth@ietf.org
>> https://www.ietf.org/mailman/listinfo/oauth


From jricher@mitre.org  Tue Feb 12 06:58:32 2013
Return-Path: <jricher@mitre.org>
X-Original-To: oauth@ietfa.amsl.com
Delivered-To: oauth@ietfa.amsl.com
Received: from localhost (localhost [127.0.0.1]) by ietfa.amsl.com (Postfix) with ESMTP id 042E321F8EB0 for <oauth@ietfa.amsl.com>; Tue, 12 Feb 2013 06:58:32 -0800 (PST)
X-Virus-Scanned: amavisd-new at amsl.com
X-Spam-Flag: NO
X-Spam-Score: -6.57
X-Spam-Level: 
X-Spam-Status: No, score=-6.57 tagged_above=-999 required=5 tests=[AWL=0.029,  BAYES_00=-2.599, RCVD_IN_DNSWL_MED=-4]
Received: from mail.ietf.org ([64.170.98.30]) by localhost (ietfa.amsl.com [127.0.0.1]) (amavisd-new, port 10024) with ESMTP id 2pUJK6H8Kk8H for <oauth@ietfa.amsl.com>; Tue, 12 Feb 2013 06:58:31 -0800 (PST)
Received: from smtpksrv1.mitre.org (smtpksrv1.mitre.org [198.49.146.77]) by ietfa.amsl.com (Postfix) with ESMTP id 1B26E21F8EAC for <oauth@ietf.org>; Tue, 12 Feb 2013 06:58:31 -0800 (PST)
Received: from smtpksrv1.mitre.org (localhost.localdomain [127.0.0.1]) by localhost (Postfix) with SMTP id 98FFE1F0284; Tue, 12 Feb 2013 09:58:30 -0500 (EST)
Received: from IMCCAS01.MITRE.ORG (imccas01.mitre.org [129.83.29.78]) by smtpksrv1.mitre.org (Postfix) with ESMTP id 8C0121F16E1; Tue, 12 Feb 2013 09:58:30 -0500 (EST)
Received: from [10.146.15.29] (129.83.31.58) by IMCCAS01.MITRE.ORG (129.83.29.78) with Microsoft SMTP Server (TLS) id 14.2.318.4; Tue, 12 Feb 2013 09:58:30 -0500
Message-ID: <511A586B.9060606@mitre.org>
Date: Tue, 12 Feb 2013 09:57:47 -0500
From: Justin Richer <jricher@mitre.org>
User-Agent: Mozilla/5.0 (X11; Linux i686; rv:17.0) Gecko/20130106 Thunderbird/17.0.2
MIME-Version: 1.0
To: Torsten Lodderstedt <torsten@lodderstedt.net>
References: <51195F39.3040809@mitre.org> <4E1F6AAD24975D4BA5B16804296739436743E3DD@TK5EX14MBXC285.redmond.corp.microsoft.com> <BFDA9345-B4EF-4BA6-8CC6-249D82118D00@lodderstedt.net>
In-Reply-To: <BFDA9345-B4EF-4BA6-8CC6-249D82118D00@lodderstedt.net>
Content-Type: text/plain; charset="ISO-8859-1"; format=flowed
Content-Transfer-Encoding: 7bit
X-Originating-IP: [129.83.31.58]
Cc: "oauth@ietf.org" <oauth@ietf.org>
Subject: Re: [OAUTH-WG] Registration: Endpoint Definition (& operation parameter)
X-BeenThere: oauth@ietf.org
X-Mailman-Version: 2.1.12
Precedence: list
List-Id: OAUTH WG <oauth.ietf.org>
List-Unsubscribe: <https://www.ietf.org/mailman/options/oauth>, <mailto:oauth-request@ietf.org?subject=unsubscribe>
List-Archive: <http://www.ietf.org/mail-archive/web/oauth>
List-Post: <mailto:oauth@ietf.org>
List-Help: <mailto:oauth-request@ietf.org?subject=help>
List-Subscribe: <https://www.ietf.org/mailman/listinfo/oauth>, <mailto:oauth-request@ietf.org?subject=subscribe>
X-List-Received-Date: Tue, 12 Feb 2013 14:58:32 -0000

Technically you could have your auth endpoint be:

/oauth?method=authorization

and your token endpoint be:

/oauth?method=token

and they're syntactically being served by the same URL. It's a 
deep-in-the-weeds argument of little value whether or not you consider 
these to be "separate endpoints" from the server perspective. You could 
also, if you so choose, define your endpoints to be the same URL and 
switch in a side-effectful fashion on parameters like response_type and 
grant_type. I think you'd be a bit nuts to do it that way, but you could 
pull it off.

The important thing is that because they're defined in the spec as 
"separate endpoints", all clients expect there to be one URL for authz 
and one for tokens, and so all clients have two slots for them. Clients 
are not expected to take one URL and add a parameter to *make* the other 
URL, they're expected to be given two URLs.

I think that's a very important difference.

  -- Justin

On 02/12/2013 02:17 AM, Torsten Lodderstedt wrote:
> Hi Mike,
>
> why do you think the protocol should allow to have two endpoints on the same URL? Even the core spec does not allow to map tokens and authorization endpoint to the same URL.
>
> Regards,
> Torsten.
>
> Am 12.02.2013 um 02:26 schrieb Mike Jones <Michael.Jones@microsoft.com>:
>
>> At most, there should be two endpoints - creation and management - for a client, but the protocol should be structured such that they *can* be at the same URL, if the server so chooses.  A simple way to accomplish this is to require that the client_id value be provided as an input parameter on update operations.  Then for implementations that use a single endpoint, they can distinguish "create" and "update" operations on the management endpoint by the presence or absence of the client_id value.
>>
>> If you want to have separate endpoints and don't need the client_id because you have somehow encoded it into the management endpoint URL, that's fine.  It still can serve as a useful cross-check that the client (or an attacker) is requesting a change to a client that matches the bearer token used.  But including it is necessary for implementations that want to use a single registration endpoint, rather than having a proliferation of per-client endpoints.
>>
>> BTW, just for the record, OAuth 2.0 uses the same endpoint for initial access token requests and requests for refreshed access tokens - with the operations being distinguished by whether a refresh_token parameter is present.  So there's a useful OAuth precedent for doing things this way.
>>
>>                 -- Mike
>>
>> -----Original Message-----
>> From: oauth-bounces@ietf.org [mailto:oauth-bounces@ietf.org] On Behalf Of Justin Richer
>> Sent: Monday, February 11, 2013 1:15 PM
>> To: oauth@ietf.org
>> Subject: [OAUTH-WG] Registration: Endpoint Definition (& operation parameter)
>>
>> Draft -05 of OAuth Dynamic Client Registration [1] defines three fundamental operations that a client can undertake: Client Registration, Client Update, and Secret Rotation. Each of these actions needs to be differentiated *somehow* by the client and server as part of the protocol. Draft -00 defined only the "register" operation, drafts -01 through -04 made use of an "operation" parameter on a single endpoint, which brought up a long discussion on the list on whether or not that was an appropriate design. Draft -05 did away with the definition of the "operation" parameter on a single endpoint and instead opted for separating the base functionality into three different endpoints.
>>
>> Pro:
>>   - Closer to RESTful semantics of having one URL for creation and another URL for management of an item (eg, most REST APIs use /object for creation and /object/object_id for manipulation)
>>   - The rest of OAuth (and its extensions) defines separate endpoints for different actions (Authorization, Token, Revocation, Introspection) as opposed to a single endpoint with a mode-switch parameter
>>   - Client doesn't have to generate a URL string for different endpoints by combining parameters with a base URL
>>
>> Con:
>>   - Not quite exactly RESTful as the spec doesn't dictate the client_id
>> be part of the update or rotate URL (though and implementor's note
>> suggests this)
>>   - Client has to track different URLs for different actions
>>   - Server must be able to differentiate actions based on these
>> different URLs.
>>
>> Alternatives include using different HTTP verbs (see other thread) or
>> defining an operational switch parameter, like older drafts, on a single
>> endpoint URL. Another suggested alternative is to look for the presence
>> of certain parameters, such as client_id or the registration access
>> token, to indicate that a different operation is requested.
>>
>> There's also question of whether the Secret Rotation action needs to
>> have its own endpoint, or if it can be collapsed into one of the others.
>> It has been suggested off-list that the secret rotation should never be
>> initiated by the Client but instead the client should simply request its
>> latest secret from the server through the update (or read) semantics.
>>
>>   -- Justin
>>
>> [1] http://tools.ietf.org/html/draft-ietf-oauth-dyn-reg-05
>> _______________________________________________
>> OAuth mailing list
>> OAuth@ietf.org
>> https://www.ietf.org/mailman/listinfo/oauth
>> _______________________________________________
>> OAuth mailing list
>> OAuth@ietf.org
>> https://www.ietf.org/mailman/listinfo/oauth


From ve7jtb@ve7jtb.com  Tue Feb 12 07:00:58 2013
Return-Path: <ve7jtb@ve7jtb.com>
X-Original-To: oauth@ietfa.amsl.com
Delivered-To: oauth@ietfa.amsl.com
Received: from localhost (localhost [127.0.0.1]) by ietfa.amsl.com (Postfix) with ESMTP id AD97621F8ED6 for <oauth@ietfa.amsl.com>; Tue, 12 Feb 2013 07:00:58 -0800 (PST)
X-Virus-Scanned: amavisd-new at amsl.com
X-Spam-Flag: NO
X-Spam-Score: -2.327
X-Spam-Level: 
X-Spam-Status: No, score=-2.327 tagged_above=-999 required=5 tests=[AWL=-0.395, BAYES_00=-2.599, HTML_MESSAGE=0.001, RCVD_IN_DNSWL_LOW=-1, SARE_HTML_USL_OBFU=1.666]
Received: from mail.ietf.org ([64.170.98.30]) by localhost (ietfa.amsl.com [127.0.0.1]) (amavisd-new, port 10024) with ESMTP id A7Sr70tDYIrJ for <oauth@ietfa.amsl.com>; Tue, 12 Feb 2013 07:00:57 -0800 (PST)
Received: from mail-qc0-f173.google.com (mail-qc0-f173.google.com [209.85.216.173]) by ietfa.amsl.com (Postfix) with ESMTP id 58AD321F8ED5 for <oauth@ietf.org>; Tue, 12 Feb 2013 07:00:57 -0800 (PST)
Received: by mail-qc0-f173.google.com with SMTP id b12so60393qca.18 for <oauth@ietf.org>; Tue, 12 Feb 2013 07:00:56 -0800 (PST)
X-Google-DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=google.com; s=20120113; h=x-received:content-type:mime-version:subject:from:in-reply-to:date :cc:message-id:references:to:x-mailer:x-gm-message-state; bh=bY4Oft6lvlzspW16J5EWZsLniSw5w0S3CTshNPNk6lk=; b=F+ZxR0gDZ6jGYE3Og10RM/KGCbbErmnHEFryLIOwFXU/KkvUvpEDT1cxcNUMuIRfac XUWWMMgliDS8UMPv0vvIIfTiGKetcgEFW7tvnkiyTzF/1Y+oZjKsrTbtOhwCgo1rpmr4 2ZmZYRaJr6HnUI/lMyXSM/YJHbREzMXADVOqZLMhxKTC6xhm+BaBw9lLamHafXjL2Gb8 st+87+/bLfnD88xhFdYhq2XNIJUOlJANeif4nVbYUn8sJA1NGsrXCd5+NPUa5rh0hxW2 2+k3cTvTeijROZLoCVyp2C0x5obnlR1MZ+p+7IiljoR6nlAS558GJ8GTKYGyWuegdQw9 uLzQ==
X-Received: by 10.49.128.37 with SMTP id nl5mr8168188qeb.59.1360681256582; Tue, 12 Feb 2013 07:00:56 -0800 (PST)
Received: from [192.168.1.213] (190-20-23-212.baf.movistar.cl. [190.20.23.212]) by mx.google.com with ESMTPS id f7sm16563837qap.13.2013.02.12.07.00.51 (version=TLSv1 cipher=ECDHE-RSA-RC4-SHA bits=128/128); Tue, 12 Feb 2013 07:00:54 -0800 (PST)
Content-Type: multipart/alternative; boundary="Apple-Mail=_3138D1F7-D8A6-4083-86B3-2FAC92C2D1AC"
Mime-Version: 1.0 (Mac OS X Mail 6.2 \(1499\))
From: John Bradley <ve7jtb@ve7jtb.com>
In-Reply-To: <CA+ZpN27AcxYNUObsviAdgMP2bJ=AjO9KbAjdV1As1z8=0eCjmQ@mail.gmail.com>
Date: Tue, 12 Feb 2013 12:00:48 -0300
Message-Id: <5213467D-C61A-4323-BC26-D519A1886C55@ve7jtb.com>
References: <51195F39.3040809@mitre.org> <4E1F6AAD24975D4BA5B16804296739436743E3DD@TK5EX14MBXC285.redmond.corp.microsoft.com> <511A2692.2070209@gmail.com> <CA+ZpN27AcxYNUObsviAdgMP2bJ=AjO9KbAjdV1As1z8=0eCjmQ@mail.gmail.com>
To: Tim Bray <twbray@google.com>
X-Mailer: Apple Mail (2.1499)
X-Gm-Message-State: ALoCoQk0YveTx6edjxQbz/6knGkexj1fZNkQagMOiWa2WN+/Ficx886z/l6FPZXbvoYi7TP9nFa3
Cc: oauth@ietf.org
Subject: Re: [OAUTH-WG] Registration: Endpoint Definition (& operation parameter)
X-BeenThere: oauth@ietf.org
X-Mailman-Version: 2.1.12
Precedence: list
List-Id: OAUTH WG <oauth.ietf.org>
List-Unsubscribe: <https://www.ietf.org/mailman/options/oauth>, <mailto:oauth-request@ietf.org?subject=unsubscribe>
List-Archive: <http://www.ietf.org/mail-archive/web/oauth>
List-Post: <mailto:oauth@ietf.org>
List-Help: <mailto:oauth-request@ietf.org?subject=help>
List-Subscribe: <https://www.ietf.org/mailman/listinfo/oauth>, <mailto:oauth-request@ietf.org?subject=subscribe>
X-List-Received-Date: Tue, 12 Feb 2013 15:00:58 -0000

--Apple-Mail=_3138D1F7-D8A6-4083-86B3-2FAC92C2D1AC
Content-Transfer-Encoding: quoted-printable
Content-Type: text/plain;
	charset=us-ascii

It can be argued that /foo  and /foo?provider=3Dabc  are different URI =
resources.

Nat and I were recommending that the registration return a update URI =
that can be unique per client.

In the Apps for domains or Salesforce case the hosting client could be =
encoded into the path or a parameter if required, or it could even be a =
different host name if some client's data needed to be kept in a =
particular jurisdiction like Canada. (honestly there are laws to prevent =
you hosing data in the US)=20

The update URI returned may also be exactly the same as the original =
create URI that should be left up to the Registration server.

Allowing the Registration server to set the update URI is the most =
flexible for supporting multi tenant and other use-cases. =20

the only downside is that the client needs to remember what it is.  As =
the client needs to remember a secret and the locations of the =
endpoint's I don't think that is a large burden.

In reality the only clients possibly having a issue with that are going =
to be native clients, but they are generally registered and managed by a =
developer and not by individual client instances.

The problem is a native client is not going to keep it's secret for =
updating safe.   It would work if client instances create their own =
unique client_id, but at that point managing another parameter is the =
least of your worries.

John B.


On 2013-02-12, at 11:43 AM, Tim Bray <twbray@google.com> wrote:

> ?! /foo and /foo/bar are obviously distinct endpoints.
>=20
> On Feb 12, 2013 3:25 AM, "Sergey Beryozkin" <sberyozkin@gmail.com> =
wrote:
> Hi Mike,
> On 12/02/13 01:26, Mike Jones wrote:
> At most, there should be two endpoints - creation and management - for =
a client, but the protocol should be structured such that they *can* be =
at the same URL, if the server so chooses.  A simple way to accomplish =
this is to require that the client_id value be provided as an input =
parameter on update operations.  Then for implementations that use a =
single endpoint, they can distinguish "create" and "update" operations =
on the management endpoint by the presence or absence of the client_id =
value.
>=20
> Perhaps the text can be relaxed somehow to not refer to
>=20
> /register
> and
> /register/{client_id}
>=20
> as two different endpoints ? I think it is a single endpoint from the =
implementation point of view :-).
>=20
> Or may be the spec can indeed be relaxed a bit and allow for a PUT =
form payload be sent directly to /register
>=20
> Cheers, Sergey
>=20
> If you want to have separate endpoints and don't need the client_id =
because you have somehow encoded it into the management endpoint URL, =
that's fine.  It still can serve as a useful cross-check that the client =
(or an attacker) is requesting a change to a client that matches the =
bearer token used.  But including it is necessary for implementations =
that want to use a single registration endpoint, rather than having a =
proliferation of per-client endpoints.
>=20
> BTW, just for the record, OAuth 2.0 uses the same endpoint for initial =
access token requests and requests for refreshed access tokens - with =
the operations being distinguished by whether a refresh_token parameter =
is present.  So there's a useful OAuth precedent for doing things this =
way.
>=20
>                                 -- Mike
>=20
> -----Original Message-----
> From: oauth-bounces@ietf.org [mailto:oauth-bounces@ietf.org] On Behalf =
Of Justin Richer
> Sent: Monday, February 11, 2013 1:15 PM
> To: oauth@ietf.org
> Subject: [OAUTH-WG] Registration: Endpoint Definition (&  operation =
parameter)
>=20
> Draft -05 of OAuth Dynamic Client Registration [1] defines three =
fundamental operations that a client can undertake: Client Registration, =
Client Update, and Secret Rotation. Each of these actions needs to be =
differentiated *somehow* by the client and server as part of the =
protocol. Draft -00 defined only the "register" operation, drafts -01 =
through -04 made use of an "operation" parameter on a single endpoint, =
which brought up a long discussion on the list on whether or not that =
was an appropriate design. Draft -05 did away with the definition of the =
"operation" parameter on a single endpoint and instead opted for =
separating the base functionality into three different endpoints.
>=20
> Pro:
>    - Closer to RESTful semantics of having one URL for creation and =
another URL for management of an item (eg, most REST APIs use /object =
for creation and /object/object_id for manipulation)
>    - The rest of OAuth (and its extensions) defines separate endpoints =
for different actions (Authorization, Token, Revocation, Introspection) =
as opposed to a single endpoint with a mode-switch parameter
>    - Client doesn't have to generate a URL string for different =
endpoints by combining parameters with a base URL
>=20
> Con:
>    - Not quite exactly RESTful as the spec doesn't dictate the =
client_id
> be part of the update or rotate URL (though and implementor's note
> suggests this)
>    - Client has to track different URLs for different actions
>    - Server must be able to differentiate actions based on these
> different URLs.
>=20
> Alternatives include using different HTTP verbs (see other thread) or
> defining an operational switch parameter, like older drafts, on a =
single
> endpoint URL. Another suggested alternative is to look for the =
presence
> of certain parameters, such as client_id or the registration access
> token, to indicate that a different operation is requested.
>=20
> There's also question of whether the Secret Rotation action needs to
> have its own endpoint, or if it can be collapsed into one of the =
others.
> It has been suggested off-list that the secret rotation should never =
be
> initiated by the Client but instead the client should simply request =
its
> latest secret from the server through the update (or read) semantics.
>=20
>    -- Justin
>=20
> [1] http://tools.ietf.org/html/draft-ietf-oauth-dyn-reg-05
> _______________________________________________
> OAuth mailing list
> OAuth@ietf.org
> https://www.ietf.org/mailman/listinfo/oauth
> _______________________________________________
> OAuth mailing list
> OAuth@ietf.org
> https://www.ietf.org/mailman/listinfo/oauth
>=20
> _______________________________________________
> OAuth mailing list
> OAuth@ietf.org
> https://www.ietf.org/mailman/listinfo/oauth
> _______________________________________________
> OAuth mailing list
> OAuth@ietf.org
> https://www.ietf.org/mailman/listinfo/oauth


--Apple-Mail=_3138D1F7-D8A6-4083-86B3-2FAC92C2D1AC
Content-Transfer-Encoding: quoted-printable
Content-Type: text/html;
	charset=us-ascii

<html><head><meta http-equiv=3D"Content-Type" content=3D"text/html =
charset=3Dus-ascii"></head><body style=3D"word-wrap: break-word; =
-webkit-nbsp-mode: space; -webkit-line-break: after-white-space; ">It =
can be argued that /foo &nbsp;and /foo?provider=3Dabc &nbsp;are =
different URI resources.<div><br></div><div>Nat and I were recommending =
that the registration return a update URI that can be unique per =
client.</div><div><br></div><div>In the Apps for domains or Salesforce =
case the hosting client could be encoded into the path or a parameter if =
required, or it could even be a different host name if some client's =
data needed to be kept in a particular jurisdiction like Canada. =
(honestly there are laws to prevent you hosing data in the =
US)&nbsp;</div><div><br></div><div>The update URI returned may also be =
exactly the same as the original create URI that should be left up to =
the Registration server.</div><div><br></div><div>Allowing the =
Registration server to set the update URI is the most flexible for =
supporting multi tenant and other use-cases. =
&nbsp;</div><div><br></div><div>the only downside is that the client =
needs to remember what it is. &nbsp;As the client needs to remember a =
secret and the locations of the endpoint's I don't think that is a large =
burden.</div><div><br></div><div>In reality the only clients possibly =
having a issue with that are going to be native clients, but they are =
generally registered and managed by a developer and not by individual =
client instances.</div><div><br></div><div>The problem is a native =
client is not going to keep it's secret for updating safe. &nbsp; It =
would work if client instances create their own unique client_id, but at =
that point managing another parameter is the least of your =
worries.</div><div><br></div><div>John =
B.</div><div><div><br></div><div><br><div><div>On 2013-02-12, at 11:43 =
AM, Tim Bray &lt;<a =
href=3D"mailto:twbray@google.com">twbray@google.com</a>&gt; =
wrote:</div><br class=3D"Apple-interchange-newline"><blockquote =
type=3D"cite"><p dir=3D"ltr">?! /foo and /foo/bar are obviously distinct =
endpoints.</p>
<div class=3D"gmail_quote">On Feb 12, 2013 3:25 AM, "Sergey Beryozkin" =
&lt;<a href=3D"mailto:sberyozkin@gmail.com">sberyozkin@gmail.com</a>&gt; =
wrote:<br type=3D"attribution"><blockquote class=3D"gmail_quote" =
style=3D"margin:0 0 0 .8ex;border-left:1px #ccc solid;padding-left:1ex">
Hi Mike,<br>
On 12/02/13 01:26, Mike Jones wrote:<br>
<blockquote class=3D"gmail_quote" style=3D"margin:0 0 0 =
.8ex;border-left:1px #ccc solid;padding-left:1ex">
At most, there should be two endpoints - creation and management - for a =
client, but the protocol should be structured such that they *can* be at =
the same URL, if the server so chooses. &nbsp;A simple way to accomplish =
this is to require that the client_id value be provided as an input =
parameter on update operations. &nbsp;Then for implementations that use =
a single endpoint, they can distinguish "create" and "update" operations =
on the management endpoint by the presence or absence of the client_id =
value.<br>

<br>
</blockquote>
Perhaps the text can be relaxed somehow to not refer to<br>
<br>
/register<br>
and<br>
/register/{client_id}<br>
<br>
as two different endpoints ? I think it is a single endpoint from the =
implementation point of view :-).<br>
<br>
Or may be the spec can indeed be relaxed a bit and allow for a PUT form =
payload be sent directly to /register<br>
<br>
Cheers, Sergey<br>
<br>
<blockquote class=3D"gmail_quote" style=3D"margin:0 0 0 =
.8ex;border-left:1px #ccc solid;padding-left:1ex">
If you want to have separate endpoints and don't need the client_id =
because you have somehow encoded it into the management endpoint URL, =
that's fine. &nbsp;It still can serve as a useful cross-check that the =
client (or an attacker) is requesting a change to a client that matches =
the bearer token used. &nbsp;But including it is necessary for =
implementations that want to use a single registration endpoint, rather =
than having a proliferation of per-client endpoints.<br>

<br>
BTW, just for the record, OAuth 2.0 uses the same endpoint for initial =
access token requests and requests for refreshed access tokens - with =
the operations being distinguished by whether a refresh_token parameter =
is present. &nbsp;So there's a useful OAuth precedent for doing things =
this way.<br>

<br>
&nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; =
&nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; -- Mike<br>
<br>
-----Original Message-----<br>
From: <a href=3D"mailto:oauth-bounces@ietf.org" =
target=3D"_blank">oauth-bounces@ietf.org</a> [mailto:<a =
href=3D"mailto:oauth-bounces@ietf.org" =
target=3D"_blank">oauth-bounces@ietf.org</a><u></u>] On Behalf Of Justin =
Richer<br>
Sent: Monday, February 11, 2013 1:15 PM<br>
To: <a href=3D"mailto:oauth@ietf.org" =
target=3D"_blank">oauth@ietf.org</a><br>
Subject: [OAUTH-WG] Registration: Endpoint Definition (&amp; =
&nbsp;operation parameter)<br>
<br>
Draft -05 of OAuth Dynamic Client Registration [1] defines three =
fundamental operations that a client can undertake: Client Registration, =
Client Update, and Secret Rotation. Each of these actions needs to be =
differentiated *somehow* by the client and server as part of the =
protocol. Draft -00 defined only the "register" operation, drafts -01 =
through -04 made use of an "operation" parameter on a single endpoint, =
which brought up a long discussion on the list on whether or not that =
was an appropriate design. Draft -05 did away with the definition of the =
"operation" parameter on a single endpoint and instead opted for =
separating the base functionality into three different endpoints.<br>

<br>
Pro:<br>
&nbsp; &nbsp;- Closer to RESTful semantics of having one URL for =
creation and another URL for management of an item (eg, most REST APIs =
use /object for creation and /object/object_id for manipulation)<br>
&nbsp; &nbsp;- The rest of OAuth (and its extensions) defines separate =
endpoints for different actions (Authorization, Token, Revocation, =
Introspection) as opposed to a single endpoint with a mode-switch =
parameter<br>
&nbsp; &nbsp;- Client doesn't have to generate a URL string for =
different endpoints by combining parameters with a base URL<br>
<br>
Con:<br>
&nbsp; &nbsp;- Not quite exactly RESTful as the spec doesn't dictate the =
client_id<br>
be part of the update or rotate URL (though and implementor's note<br>
suggests this)<br>
&nbsp; &nbsp;- Client has to track different URLs for different =
actions<br>
&nbsp; &nbsp;- Server must be able to differentiate actions based on =
these<br>
different URLs.<br>
<br>
Alternatives include using different HTTP verbs (see other thread) =
or<br>
defining an operational switch parameter, like older drafts, on a =
single<br>
endpoint URL. Another suggested alternative is to look for the =
presence<br>
of certain parameters, such as client_id or the registration access<br>
token, to indicate that a different operation is requested.<br>
<br>
There's also question of whether the Secret Rotation action needs to<br>
have its own endpoint, or if it can be collapsed into one of the =
others.<br>
It has been suggested off-list that the secret rotation should never =
be<br>
initiated by the Client but instead the client should simply request =
its<br>
latest secret from the server through the update (or read) =
semantics.<br>
<br>
&nbsp; &nbsp;-- Justin<br>
<br>
[1] <a href=3D"http://tools.ietf.org/html/draft-ietf-oauth-dyn-reg-05" =
target=3D"_blank">http://tools.ietf.org/html/<u></u>draft-ietf-oauth-dyn-r=
eg-05</a><br>
______________________________<u></u>_________________<br>
OAuth mailing list<br>
<a href=3D"mailto:OAuth@ietf.org" target=3D"_blank">OAuth@ietf.org</a><br>=

<a href=3D"https://www.ietf.org/mailman/listinfo/oauth" =
target=3D"_blank">https://www.ietf.org/mailman/<u></u>listinfo/oauth</a><b=
r>
______________________________<u></u>_________________<br>
OAuth mailing list<br>
<a href=3D"mailto:OAuth@ietf.org" target=3D"_blank">OAuth@ietf.org</a><br>=

<a href=3D"https://www.ietf.org/mailman/listinfo/oauth" =
target=3D"_blank">https://www.ietf.org/mailman/<u></u>listinfo/oauth</a><b=
r>
</blockquote>
<br>
______________________________<u></u>_________________<br>
OAuth mailing list<br>
<a href=3D"mailto:OAuth@ietf.org" target=3D"_blank">OAuth@ietf.org</a><br>=

<a href=3D"https://www.ietf.org/mailman/listinfo/oauth" =
target=3D"_blank">https://www.ietf.org/mailman/<u></u>listinfo/oauth</a><b=
r>
</blockquote></div>
_______________________________________________<br>OAuth mailing =
list<br><a =
href=3D"mailto:OAuth@ietf.org">OAuth@ietf.org</a><br>https://www.ietf.org/=
mailman/listinfo/oauth<br></blockquote></div><br></div></div></body></html=
>=

--Apple-Mail=_3138D1F7-D8A6-4083-86B3-2FAC92C2D1AC--

From sberyozkin@gmail.com  Tue Feb 12 07:01:50 2013
Return-Path: <sberyozkin@gmail.com>
X-Original-To: oauth@ietfa.amsl.com
Delivered-To: oauth@ietfa.amsl.com
Received: from localhost (localhost [127.0.0.1]) by ietfa.amsl.com (Postfix) with ESMTP id 3983B21F8EC4 for <oauth@ietfa.amsl.com>; Tue, 12 Feb 2013 07:01:50 -0800 (PST)
X-Virus-Scanned: amavisd-new at amsl.com
X-Spam-Flag: NO
X-Spam-Score: -3.599
X-Spam-Level: 
X-Spam-Status: No, score=-3.599 tagged_above=-999 required=5 tests=[BAYES_00=-2.599, RCVD_IN_DNSWL_LOW=-1]
Received: from mail.ietf.org ([64.170.98.30]) by localhost (ietfa.amsl.com [127.0.0.1]) (amavisd-new, port 10024) with ESMTP id wTrjaN6fSzAa for <oauth@ietfa.amsl.com>; Tue, 12 Feb 2013 07:01:49 -0800 (PST)
Received: from mail-ea0-f182.google.com (mail-ea0-f182.google.com [209.85.215.182]) by ietfa.amsl.com (Postfix) with ESMTP id 16C4721F8EBA for <oauth@ietf.org>; Tue, 12 Feb 2013 07:01:48 -0800 (PST)
Received: by mail-ea0-f182.google.com with SMTP id a12so83161eaa.13 for <oauth@ietf.org>; Tue, 12 Feb 2013 07:01:48 -0800 (PST)
DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=gmail.com; s=20120113; h=x-received:message-id:date:from:user-agent:mime-version:to:cc :subject:references:in-reply-to:content-type :content-transfer-encoding; bh=2x/zMVlhMVHTBYLUqucRy0dm7fSU+1HrYsSDHby4wN8=; b=hmaFZ2AIQwAeHDwRRVqlBIB7N1ldP7Jy1MhNloh8jHK53mZUH1R/iJLSP+AVrIa+9+ nLn4KqJWnB07y5SzvelaFKfCeWtjkGRuDNAzcCW8bPwSgCaREyxTXx2FZngnY1QQ8tpu 3pteE1j93iVo2olcR2UdnFSPmxYYVmQR9T39BTTihfdM/7ScTmA6AjjSP/hK/qQEcE9M bsnDnqHJOGcdD1kPDczolAp93X8qmycRkO7y7D+4ex463zKabCBdBuPUXIFDdcILPNcb Y8QbuH1JCHZajMccsJijDpIviJYZSIhxarWeQaH84joljYAKmOg9J3Be1oz2sPb9fx+B SK0w==
X-Received: by 10.14.4.69 with SMTP id 45mr64812061eei.0.1360681308211; Tue, 12 Feb 2013 07:01:48 -0800 (PST)
Received: from [10.36.226.5] ([217.173.99.61]) by mx.google.com with ESMTPS id j46sm64891671eeo.3.2013.02.12.07.01.46 (version=TLSv1 cipher=ECDHE-RSA-RC4-SHA bits=128/128); Tue, 12 Feb 2013 07:01:47 -0800 (PST)
Message-ID: <511A5958.7020003@gmail.com>
Date: Tue, 12 Feb 2013 15:01:44 +0000
From: Sergey Beryozkin <sberyozkin@gmail.com>
User-Agent: Mozilla/5.0 (X11; Linux x86_64; rv:12.0) Gecko/20120430 Thunderbird/12.0.1
MIME-Version: 1.0
To: Tim Bray <twbray@google.com>
References: <51195F39.3040809@mitre.org> <4E1F6AAD24975D4BA5B16804296739436743E3DD@TK5EX14MBXC285.redmond.corp.microsoft.com> <511A2692.2070209@gmail.com> <CA+ZpN27AcxYNUObsviAdgMP2bJ=AjO9KbAjdV1As1z8=0eCjmQ@mail.gmail.com>
In-Reply-To: <CA+ZpN27AcxYNUObsviAdgMP2bJ=AjO9KbAjdV1As1z8=0eCjmQ@mail.gmail.com>
Content-Type: text/plain; charset=UTF-8; format=flowed
Content-Transfer-Encoding: 7bit
Cc: oauth@ietf.org
Subject: Re: [OAUTH-WG] Registration: Endpoint Definition (& operation parameter)
X-BeenThere: oauth@ietf.org
X-Mailman-Version: 2.1.12
Precedence: list
List-Id: OAUTH WG <oauth.ietf.org>
List-Unsubscribe: <https://www.ietf.org/mailman/options/oauth>, <mailto:oauth-request@ietf.org?subject=unsubscribe>
List-Archive: <http://www.ietf.org/mail-archive/web/oauth>
List-Post: <mailto:oauth@ietf.org>
List-Help: <mailto:oauth-request@ietf.org?subject=help>
List-Subscribe: <https://www.ietf.org/mailman/listinfo/oauth>, <mailto:oauth-request@ietf.org?subject=subscribe>
X-List-Received-Date: Tue, 12 Feb 2013 15:01:50 -0000

On 12/02/13 14:43, Tim Bray wrote:
> ?! /foo and /foo/bar are obviously distinct endpoints.

definitely yes from the client's  point of view, at the implementation 
level - it is the internal detail, right ?

Cheers, Sergey

>
> On Feb 12, 2013 3:25 AM, "Sergey Beryozkin" <sberyozkin@gmail.com
> <mailto:sberyozkin@gmail.com>> wrote:
>
>     Hi Mike,
>     On 12/02/13 01:26, Mike Jones wrote:
>
>         At most, there should be two endpoints - creation and management
>         - for a client, but the protocol should be structured such that
>         they *can* be at the same URL, if the server so chooses.  A
>         simple way to accomplish this is to require that the client_id
>         value be provided as an input parameter on update operations.
>           Then for implementations that use a single endpoint, they can
>         distinguish "create" and "update" operations on the management
>         endpoint by the presence or absence of the client_id value.
>
>     Perhaps the text can be relaxed somehow to not refer to
>
>     /register
>     and
>     /register/{client_id}
>
>     as two different endpoints ? I think it is a single endpoint from
>     the implementation point of view :-).
>
>     Or may be the spec can indeed be relaxed a bit and allow for a PUT
>     form payload be sent directly to /register
>
>     Cheers, Sergey
>
>         If you want to have separate endpoints and don't need the
>         client_id because you have somehow encoded it into the
>         management endpoint URL, that's fine.  It still can serve as a
>         useful cross-check that the client (or an attacker) is
>         requesting a change to a client that matches the bearer token
>         used.  But including it is necessary for implementations that
>         want to use a single registration endpoint, rather than having a
>         proliferation of per-client endpoints.
>
>         BTW, just for the record, OAuth 2.0 uses the same endpoint for
>         initial access token requests and requests for refreshed access
>         tokens - with the operations being distinguished by whether a
>         refresh_token parameter is present.  So there's a useful OAuth
>         precedent for doing things this way.
>
>                                          -- Mike
>
>         -----Original Message-----
>         From: oauth-bounces@ietf.org <mailto:oauth-bounces@ietf.org>
>         [mailto:oauth-bounces@ietf.org
>         <mailto:oauth-bounces@ietf.org>__] On Behalf Of Justin Richer
>         Sent: Monday, February 11, 2013 1:15 PM
>         To: oauth@ietf.org <mailto:oauth@ietf.org>
>         Subject: [OAUTH-WG] Registration: Endpoint Definition (&
>           operation parameter)
>
>         Draft -05 of OAuth Dynamic Client Registration [1] defines three
>         fundamental operations that a client can undertake: Client
>         Registration, Client Update, and Secret Rotation. Each of these
>         actions needs to be differentiated *somehow* by the client and
>         server as part of the protocol. Draft -00 defined only the
>         "register" operation, drafts -01 through -04 made use of an
>         "operation" parameter on a single endpoint, which brought up a
>         long discussion on the list on whether or not that was an
>         appropriate design. Draft -05 did away with the definition of
>         the "operation" parameter on a single endpoint and instead opted
>         for separating the base functionality into three different
>         endpoints.
>
>         Pro:
>             - Closer to RESTful semantics of having one URL for creation
>         and another URL for management of an item (eg, most REST APIs
>         use /object for creation and /object/object_id for manipulation)
>             - The rest of OAuth (and its extensions) defines separate
>         endpoints for different actions (Authorization, Token,
>         Revocation, Introspection) as opposed to a single endpoint with
>         a mode-switch parameter
>             - Client doesn't have to generate a URL string for different
>         endpoints by combining parameters with a base URL
>
>         Con:
>             - Not quite exactly RESTful as the spec doesn't dictate the
>         client_id
>         be part of the update or rotate URL (though and implementor's note
>         suggests this)
>             - Client has to track different URLs for different actions
>             - Server must be able to differentiate actions based on these
>         different URLs.
>
>         Alternatives include using different HTTP verbs (see other
>         thread) or
>         defining an operational switch parameter, like older drafts, on
>         a single
>         endpoint URL. Another suggested alternative is to look for the
>         presence
>         of certain parameters, such as client_id or the registration access
>         token, to indicate that a different operation is requested.
>
>         There's also question of whether the Secret Rotation action needs to
>         have its own endpoint, or if it can be collapsed into one of the
>         others.
>         It has been suggested off-list that the secret rotation should
>         never be
>         initiated by the Client but instead the client should simply
>         request its
>         latest secret from the server through the update (or read)
>         semantics.
>
>             -- Justin
>
>         [1] http://tools.ietf.org/html/__draft-ietf-oauth-dyn-reg-05
>         <http://tools.ietf.org/html/draft-ietf-oauth-dyn-reg-05>
>         _________________________________________________
>         OAuth mailing list
>         OAuth@ietf.org <mailto:OAuth@ietf.org>
>         https://www.ietf.org/mailman/__listinfo/oauth
>         <https://www.ietf.org/mailman/listinfo/oauth>
>         _________________________________________________
>         OAuth mailing list
>         OAuth@ietf.org <mailto:OAuth@ietf.org>
>         https://www.ietf.org/mailman/__listinfo/oauth
>         <https://www.ietf.org/mailman/listinfo/oauth>
>
>
>     _________________________________________________
>     OAuth mailing list
>     OAuth@ietf.org <mailto:OAuth@ietf.org>
>     https://www.ietf.org/mailman/__listinfo/oauth
>     <https://www.ietf.org/mailman/listinfo/oauth>
>



From jricher@mitre.org  Tue Feb 12 07:10:58 2013
Return-Path: <jricher@mitre.org>
X-Original-To: oauth@ietfa.amsl.com
Delivered-To: oauth@ietfa.amsl.com
Received: from localhost (localhost [127.0.0.1]) by ietfa.amsl.com (Postfix) with ESMTP id 95A4F21F8EB1 for <oauth@ietfa.amsl.com>; Tue, 12 Feb 2013 07:10:58 -0800 (PST)
X-Virus-Scanned: amavisd-new at amsl.com
X-Spam-Flag: NO
X-Spam-Score: -6.571
X-Spam-Level: 
X-Spam-Status: No, score=-6.571 tagged_above=-999 required=5 tests=[AWL=0.028,  BAYES_00=-2.599, RCVD_IN_DNSWL_MED=-4]
Received: from mail.ietf.org ([64.170.98.30]) by localhost (ietfa.amsl.com [127.0.0.1]) (amavisd-new, port 10024) with ESMTP id iWeOEkHyT+mI for <oauth@ietfa.amsl.com>; Tue, 12 Feb 2013 07:10:57 -0800 (PST)
Received: from smtpksrv1.mitre.org (smtpksrv1.mitre.org [198.49.146.77]) by ietfa.amsl.com (Postfix) with ESMTP id 4AE9B21F8EB7 for <oauth@ietf.org>; Tue, 12 Feb 2013 07:10:57 -0800 (PST)
Received: from smtpksrv1.mitre.org (localhost.localdomain [127.0.0.1]) by localhost (Postfix) with SMTP id E17991F177C; Tue, 12 Feb 2013 10:10:56 -0500 (EST)
Received: from IMCCAS03.MITRE.ORG (imccas03.mitre.org [129.83.29.80]) by smtpksrv1.mitre.org (Postfix) with ESMTP id 7EDB25311800; Tue, 12 Feb 2013 10:10:56 -0500 (EST)
Received: from [10.146.15.29] (129.83.31.58) by IMCCAS03.MITRE.ORG (129.83.29.80) with Microsoft SMTP Server (TLS) id 14.2.318.4; Tue, 12 Feb 2013 10:10:56 -0500
Message-ID: <511A5B55.8020701@mitre.org>
Date: Tue, 12 Feb 2013 10:10:13 -0500
From: Justin Richer <jricher@mitre.org>
User-Agent: Mozilla/5.0 (X11; Linux i686; rv:17.0) Gecko/20130106 Thunderbird/17.0.2
MIME-Version: 1.0
To: Mike Jones <Michael.Jones@microsoft.com>
References: <51195F39.3040809@mitre.org> <4E1F6AAD24975D4BA5B16804296739436743E3DD@TK5EX14MBXC285.redmond.corp.microsoft.com>
In-Reply-To: <4E1F6AAD24975D4BA5B16804296739436743E3DD@TK5EX14MBXC285.redmond.corp.microsoft.com>
Content-Type: text/plain; charset="ISO-8859-1"; format=flowed
Content-Transfer-Encoding: 7bit
X-Originating-IP: [129.83.31.58]
Cc: "oauth@ietf.org" <oauth@ietf.org>
Subject: Re: [OAUTH-WG] Registration: Endpoint Definition (& operation parameter)
X-BeenThere: oauth@ietf.org
X-Mailman-Version: 2.1.12
Precedence: list
List-Id: OAUTH WG <oauth.ietf.org>
List-Unsubscribe: <https://www.ietf.org/mailman/options/oauth>, <mailto:oauth-request@ietf.org?subject=unsubscribe>
List-Archive: <http://www.ietf.org/mail-archive/web/oauth>
List-Post: <mailto:oauth@ietf.org>
List-Help: <mailto:oauth-request@ietf.org?subject=help>
List-Subscribe: <https://www.ietf.org/mailman/listinfo/oauth>, <mailto:oauth-request@ietf.org?subject=subscribe>
X-List-Received-Date: Tue, 12 Feb 2013 15:10:58 -0000

So, I think we agree in general, but to be explicit: I want a server to 
be free to include the client_id as an input parameter if it wants to, 
but I would rather not have the client be required to compose that 
parameter onto the base registration URL on its own. This is to preserve 
the flexibility on the server side to deploy things as you describe 
below, but also to have URL path components as the identifier (common in 
REST frameworks) if it so chooses. The client shouldn't ever care which 
pattern the server wants to use. This is the motivation behind providing 
the client management URL as part of the response (separate discussion).

Also, for the record, OAuth 2.0 does not use the same endpoint for 
different things in the way you describe. To refresh a token, you send a 
request to the token endpoint with grant_type=refresh_token (section 6). 
The "grant_type" parameter is explicitly designed as a mode-switch 
parameter (for instance, see the discussion in section 4.5) and the 
refresh token flow is no different. Some early drafts of the OAuth 2.0 
core document even called out refresh token as a parallel "flow" with 
the rest of them, like authorization_code and implicit, but that seemed 
to confuse people more than it helped, so Eran pulled it into a separate 
section entirely. Nevertheless, the structure and syntax remains parallel.

  -- Justin



On 02/11/2013 08:26 PM, Mike Jones wrote:
> At most, there should be two endpoints - creation and management - for a client, but the protocol should be structured such that they *can* be at the same URL, if the server so chooses.  A simple way to accomplish this is to require that the client_id value be provided as an input parameter on update operations.  Then for implementations that use a single endpoint, they can distinguish "create" and "update" operations on the management endpoint by the presence or absence of the client_id value.
>
> If you want to have separate endpoints and don't need the client_id because you have somehow encoded it into the management endpoint URL, that's fine.  It still can serve as a useful cross-check that the client (or an attacker) is requesting a change to a client that matches the bearer token used.  But including it is necessary for implementations that want to use a single registration endpoint, rather than having a proliferation of per-client endpoints.
>
> BTW, just for the record, OAuth 2.0 uses the same endpoint for initial access token requests and requests for refreshed access tokens - with the operations being distinguished by whether a refresh_token parameter is present.  So there's a useful OAuth precedent for doing things this way.
>
> 				-- Mike
>
> -----Original Message-----
> From: oauth-bounces@ietf.org [mailto:oauth-bounces@ietf.org] On Behalf Of Justin Richer
> Sent: Monday, February 11, 2013 1:15 PM
> To: oauth@ietf.org
> Subject: [OAUTH-WG] Registration: Endpoint Definition (& operation parameter)
>
> Draft -05 of OAuth Dynamic Client Registration [1] defines three fundamental operations that a client can undertake: Client Registration, Client Update, and Secret Rotation. Each of these actions needs to be differentiated *somehow* by the client and server as part of the protocol. Draft -00 defined only the "register" operation, drafts -01 through -04 made use of an "operation" parameter on a single endpoint, which brought up a long discussion on the list on whether or not that was an appropriate design. Draft -05 did away with the definition of the "operation" parameter on a single endpoint and instead opted for separating the base functionality into three different endpoints.
>
> Pro:
>    - Closer to RESTful semantics of having one URL for creation and another URL for management of an item (eg, most REST APIs use /object for creation and /object/object_id for manipulation)
>    - The rest of OAuth (and its extensions) defines separate endpoints for different actions (Authorization, Token, Revocation, Introspection) as opposed to a single endpoint with a mode-switch parameter
>    - Client doesn't have to generate a URL string for different endpoints by combining parameters with a base URL
>
> Con:
>    - Not quite exactly RESTful as the spec doesn't dictate the client_id
> be part of the update or rotate URL (though and implementor's note
> suggests this)
>    - Client has to track different URLs for different actions
>    - Server must be able to differentiate actions based on these
> different URLs.
>
> Alternatives include using different HTTP verbs (see other thread) or
> defining an operational switch parameter, like older drafts, on a single
> endpoint URL. Another suggested alternative is to look for the presence
> of certain parameters, such as client_id or the registration access
> token, to indicate that a different operation is requested.
>
> There's also question of whether the Secret Rotation action needs to
> have its own endpoint, or if it can be collapsed into one of the others.
> It has been suggested off-list that the secret rotation should never be
> initiated by the Client but instead the client should simply request its
> latest secret from the server through the update (or read) semantics.
>
>    -- Justin
>
> [1] http://tools.ietf.org/html/draft-ietf-oauth-dyn-reg-05
> _______________________________________________
> OAuth mailing list
> OAuth@ietf.org
> https://www.ietf.org/mailman/listinfo/oauth


From jricher@mitre.org  Tue Feb 12 07:22:13 2013
Return-Path: <jricher@mitre.org>
X-Original-To: oauth@ietfa.amsl.com
Delivered-To: oauth@ietfa.amsl.com
Received: from localhost (localhost [127.0.0.1]) by ietfa.amsl.com (Postfix) with ESMTP id 257C021F8EE2 for <oauth@ietfa.amsl.com>; Tue, 12 Feb 2013 07:22:13 -0800 (PST)
X-Virus-Scanned: amavisd-new at amsl.com
X-Spam-Flag: NO
X-Spam-Score: -6.571
X-Spam-Level: 
X-Spam-Status: No, score=-6.571 tagged_above=-999 required=5 tests=[AWL=0.028,  BAYES_00=-2.599, RCVD_IN_DNSWL_MED=-4]
Received: from mail.ietf.org ([64.170.98.30]) by localhost (ietfa.amsl.com [127.0.0.1]) (amavisd-new, port 10024) with ESMTP id WEMCthr2+cK1 for <oauth@ietfa.amsl.com>; Tue, 12 Feb 2013 07:22:11 -0800 (PST)
Received: from smtpksrv1.mitre.org (smtpksrv1.mitre.org [198.49.146.77]) by ietfa.amsl.com (Postfix) with ESMTP id 1030E21F8EE5 for <oauth@ietf.org>; Tue, 12 Feb 2013 07:22:10 -0800 (PST)
Received: from smtpksrv1.mitre.org (localhost.localdomain [127.0.0.1]) by localhost (Postfix) with SMTP id 0F8C91F17D5; Tue, 12 Feb 2013 10:22:08 -0500 (EST)
Received: from IMCCAS03.MITRE.ORG (imccas03.mitre.org [129.83.29.80]) by smtpksrv1.mitre.org (Postfix) with ESMTP id F22611F1772; Tue, 12 Feb 2013 10:22:07 -0500 (EST)
Received: from [10.146.15.29] (129.83.31.58) by IMCCAS03.MITRE.ORG (129.83.29.80) with Microsoft SMTP Server (TLS) id 14.2.318.4; Tue, 12 Feb 2013 10:22:07 -0500
Message-ID: <511A5DF4.5090801@mitre.org>
Date: Tue, 12 Feb 2013 10:21:24 -0500
From: Justin Richer <jricher@mitre.org>
User-Agent: Mozilla/5.0 (X11; Linux i686; rv:17.0) Gecko/20130106 Thunderbird/17.0.2
MIME-Version: 1.0
To: Mike Jones <Michael.Jones@microsoft.com>
References: <51195F3D.1050006@mitre.org> <4E1F6AAD24975D4BA5B16804296739436743E33D@TK5EX14MBXC285.redmond.corp.microsoft.com>
In-Reply-To: <4E1F6AAD24975D4BA5B16804296739436743E33D@TK5EX14MBXC285.redmond.corp.microsoft.com>
Content-Type: text/plain; charset="ISO-8859-1"; format=flowed
Content-Transfer-Encoding: 7bit
X-Originating-IP: [129.83.31.58]
Cc: "oauth@ietf.org" <oauth@ietf.org>
Subject: Re: [OAUTH-WG] Registration: HAL _links structure and client self-URL
X-BeenThere: oauth@ietf.org
X-Mailman-Version: 2.1.12
Precedence: list
List-Id: OAUTH WG <oauth.ietf.org>
List-Unsubscribe: <https://www.ietf.org/mailman/options/oauth>, <mailto:oauth-request@ietf.org?subject=unsubscribe>
List-Archive: <http://www.ietf.org/mail-archive/web/oauth>
List-Post: <mailto:oauth@ietf.org>
List-Help: <mailto:oauth-request@ietf.org?subject=help>
List-Subscribe: <https://www.ietf.org/mailman/listinfo/oauth>, <mailto:oauth-request@ietf.org?subject=subscribe>
X-List-Received-Date: Tue, 12 Feb 2013 15:22:13 -0000

I would be OK with the change to registration_access_url or something 
similar to that. The main argument against it is that we'd be inventing 
a bespoke field for something that's already covered out there by the 
HTTP Linked Data world. Nat did a good job of trying to generalize 
concepts of linked OAuth metadata with

    http://tools.ietf.org/html/draft-sakimura-oauth-meta-01

I don't think it's inherently silly to try and generalize the problem, 
but I can appreciate the argument that such generalization could be 
overkill in this instance.

  -- Justin

On 02/11/2013 08:12 PM, Mike Jones wrote:
> It seems like significant overkill, bordering on silliness, to use the syntax
>    _links: {
>      "self": {
>        "href":
>            "https://server.example.com/register/s6BhdRkqt3"
>        }
>    }
> to represent a value that could be more straightforwardly represented as:
>    "registration_access_url": "https://server.example.com/register/s6BhdRkqt3"
>
> Even some of the advocates for it have called it "pedantic".  I believe that most developers would have less charitable things to say about it, and would wonder why we're trying to foist needless complexity on them.
>
> I'll also point out that this syntax is based upon an expired individual submission draft http://tools.ietf.org/html/draft-kelly-json-hal-03 that is not in any working group.  I don't believe we should take a dependence on this draft or this syntax.
>
> Occam's razor says that this isn't needed.
>
> 				-- Mike
>
> -----Original Message-----
> From: oauth-bounces@ietf.org [mailto:oauth-bounces@ietf.org] On Behalf Of Justin Richer
> Sent: Monday, February 11, 2013 1:15 PM
> To: oauth@ietf.org
> Subject: [OAUTH-WG] Registration: HAL _links structure and client self-URL
>
> Draft -05 of OAuth Dynamic Client Registration [1] returns a URL pointer for the client to perform update and secret rotation actions. This functionality arose from discussions on the list about moving towards a more RESTful pattern, and Nat Sakimura proposed this approach in the OpenID Connect Working Group. This URL may be distinct from the Client Registration Endpoint URL, but draft -05 makes no promises as to its content, form, or structure, though it does contain implementor's notes on possible methods.
>
> Two questions arise from this change:
>    - The semantics of returning the client manipulation URL
>    - The syntax (derived from HAL for JSON [2], an individual I-D
> submission)
>
> On semantics:
>
> Pro:
>    - The server has flexibility on how to define the "update" endpoint, sending all clients to one URL, sending different clients to different URLs, or sending clients to a URL with a baked-in query parameter
>    - The client can take the URL as-is and use it for all management operations (ie, it doesn't have to generate or compose the URL based on component parts)
>
> Con:
>    - The client must remember one more piece of information from the server at runtime if it wants to do manipulation and management of itself at the server (in addition to client_id, client_secret, registration_access_token, and others)
>
> Alternatives include specifying a URL pattern for the server to use and all clients to follow, specifying a query parameter for the update action, and specifying a separate endpoint entirely and using the presence of items such as client_id and the registration access token to differentiate the requests. Note that *all* of these alternatives can be accommodated using the semantics described above, with the same actions on the client's part.
>
>
> On syntax:
>
> Pro:
>    - Follows the designs of RFC5988 for link relations
>    - The HAL format is general, and allows for all kinds of other information to be placed inside the _links structure
>    - Allows for full use of the JSON object to specify advanced operations on the returned endpoint if desired
>
> Con:
>    - The rest of OAuth doesn't follow link relation guidelines (though it's been brought up)
>    - The HAL format is general, and allows for all kinds of other information to be placed inside the _links structure
>    - The HAL-JSON document is an expired individual I-D, and it's unclear what wider adoption looks like right now
>
> Alternatives include returning the URL as a separate data member (registration_update_url), using HTTP headers, or using JSON Schema.
>
>    -- Justin
>
>
>
> [1] http://tools.ietf.org/html/draft-ietf-oauth-dyn-reg-05
> [2] http://tools.ietf.org/html/draft-kelly-json-hal-03
> _______________________________________________
> OAuth mailing list
> OAuth@ietf.org
> https://www.ietf.org/mailman/listinfo/oauth


From ve7jtb@ve7jtb.com  Tue Feb 12 07:28:26 2013
Return-Path: <ve7jtb@ve7jtb.com>
X-Original-To: oauth@ietfa.amsl.com
Delivered-To: oauth@ietfa.amsl.com
Received: from localhost (localhost [127.0.0.1]) by ietfa.amsl.com (Postfix) with ESMTP id C561B21F8F0A for <oauth@ietfa.amsl.com>; Tue, 12 Feb 2013 07:28:26 -0800 (PST)
X-Virus-Scanned: amavisd-new at amsl.com
X-Spam-Flag: NO
X-Spam-Score: -3.124
X-Spam-Level: 
X-Spam-Status: No, score=-3.124 tagged_above=-999 required=5 tests=[AWL=0.474,  BAYES_00=-2.599, HTML_MESSAGE=0.001, RCVD_IN_DNSWL_LOW=-1]
Received: from mail.ietf.org ([64.170.98.30]) by localhost (ietfa.amsl.com [127.0.0.1]) (amavisd-new, port 10024) with ESMTP id JQqfYV9B23Dx for <oauth@ietfa.amsl.com>; Tue, 12 Feb 2013 07:28:25 -0800 (PST)
Received: from mail-qc0-f170.google.com (mail-qc0-f170.google.com [209.85.216.170]) by ietfa.amsl.com (Postfix) with ESMTP id 7B87421F8EFC for <oauth@ietf.org>; Tue, 12 Feb 2013 07:28:25 -0800 (PST)
Received: by mail-qc0-f170.google.com with SMTP id d42so73391qca.1 for <oauth@ietf.org>; Tue, 12 Feb 2013 07:28:24 -0800 (PST)
X-Google-DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=google.com; s=20120113; h=x-received:content-type:mime-version:subject:from:in-reply-to:date :cc:message-id:references:to:x-mailer:x-gm-message-state; bh=TfBGYAm9RQ8JAThhAQocSzEwTenh7dT2EOfizOdkVRM=; b=XOtmU+ZAtvJCxmSHXIUILXrdMOHy5A+LqRZjMdFD+UpjHDbBVZjNRrCieyx4FpS1Dl Jpt/9dqthyue4M1Qk5jX/2D93K5o9l6DvvBTpzddGq+o2mFfHLNZNMGBS8ugwRCEw17l E85Xz7J3VY99wvmHqQFiCyWOprzy3zUD9nkpySXSviHWvuw/Ki8c4qmT55rN2FpdIQvT dwQefHyMTigsHL2D+w5epL7RLREn7VUvbW8MsRhVMIPku3bAjWj7yF/A1G1PiqwqyLAJ OKEaa3jvk5+O0HHliNMycNQCAoz0wHQJlu4cKjJSjH50kt7Tn11okjbzPapIgVXFd4wu BYqQ==
X-Received: by 10.49.121.40 with SMTP id lh8mr8227774qeb.30.1360682904589; Tue, 12 Feb 2013 07:28:24 -0800 (PST)
Received: from [192.168.1.213] (190-20-23-212.baf.movistar.cl. [190.20.23.212]) by mx.google.com with ESMTPS id dt10sm16592758qab.0.2013.02.12.07.28.20 (version=TLSv1 cipher=ECDHE-RSA-RC4-SHA bits=128/128); Tue, 12 Feb 2013 07:28:23 -0800 (PST)
Content-Type: multipart/alternative; boundary="Apple-Mail=_7C4672B2-203B-4136-BA8D-A2E7A628786C"
Mime-Version: 1.0 (Mac OS X Mail 6.2 \(1499\))
From: John Bradley <ve7jtb@ve7jtb.com>
In-Reply-To: <511A50C7.8080102@mitre.org>
Date: Tue, 12 Feb 2013 12:28:17 -0300
Message-Id: <B256FD2D-5ED7-4306-A3BF-E6A196862B2E@ve7jtb.com>
References: <51195F3D.1050006@mitre.org> <222C28CB-7F6F-4BC3-8692-40404C2DC2D3@maymount.com> <511A50C7.8080102@mitre.org>
To: Justin Richer <jricher@mitre.org>
X-Mailer: Apple Mail (2.1499)
X-Gm-Message-State: ALoCoQkxgGSt/vvm6n6L62upWdpDV38nWkrgpcUFUga7egUHvSEj0/f9r8ohrvw8qzpcL6UlyJBQ
Cc: "oauth@ietf.org" <oauth@ietf.org>
Subject: Re: [OAUTH-WG] Registration: HAL _links structure and client self-URL
X-BeenThere: oauth@ietf.org
X-Mailman-Version: 2.1.12
Precedence: list
List-Id: OAUTH WG <oauth.ietf.org>
List-Unsubscribe: <https://www.ietf.org/mailman/options/oauth>, <mailto:oauth-request@ietf.org?subject=unsubscribe>
List-Archive: <http://www.ietf.org/mail-archive/web/oauth>
List-Post: <mailto:oauth@ietf.org>
List-Help: <mailto:oauth-request@ietf.org?subject=help>
List-Subscribe: <https://www.ietf.org/mailman/listinfo/oauth>, <mailto:oauth-request@ietf.org?subject=subscribe>
X-List-Received-Date: Tue, 12 Feb 2013 15:28:27 -0000

--Apple-Mail=_7C4672B2-203B-4136-BA8D-A2E7A628786C
Content-Transfer-Encoding: quoted-printable
Content-Type: text/plain;
	charset=us-ascii

Returning a location header in the 201 ids fine as long as we also have =
the same info as a claim.

I think most clients will want to process the JSON and store all the =
parameters together.  Making them fish out a header makes the W3C happy =
and is the correct thing to do but taking it from a claim is what =
developers are more comfortable with.

John B.

On 2013-02-12, at 11:25 AM, Justin Richer <jricher@mitre.org> wrote:

> I'd be fine with the return from a creation request being a 201 =
instead of a 200.=20
>=20
>  -- Justin
>=20
> On 02/11/2013 06:33 PM, Richard Harrington wrote:
>> Since the request is an HTTP POST and a resource is created =
(http://www.w3.org/Protocols/rfc2616/rfc2616-sec9.html#sec9.5) the =
response should be an HTTP 201 Created =
(http://www.w3.org/Protocols/rfc2616/rfc2616-sec10.html#sec10.2.2) which =
is supposed to include the location of the newly created resource.
>>=20
>> This is a good pattern to follow since, as you say, it does provide =
flexibility.
>>=20
>>=20
>>=20
>> On Feb 11, 2013, at 1:14 PM, Justin Richer <jricher@mitre.org> wrote:
>>=20
>>> Draft -05 of OAuth Dynamic Client Registration [1] returns a URL =
pointer for the client to perform update and secret rotation actions. =
This functionality arose from discussions on the list about moving =
towards a more RESTful pattern, and Nat Sakimura proposed this approach =
in the OpenID Connect Working Group. This URL may be distinct from the =
Client Registration Endpoint URL, but draft -05 makes no promises as to =
its content, form, or structure, though it does contain implementor's =
notes on possible methods.
>>>=20
>>> Two questions arise from this change:
>>> - The semantics of returning the client manipulation URL
>>> - The syntax (derived from HAL for JSON [2], an individual I-D =
submission)
>>>=20
>>> On semantics:
>>>=20
>>> Pro:
>>> - The server has flexibility on how to define the "update" endpoint, =
sending all clients to one URL, sending different clients to different =
URLs, or sending clients to a URL with a baked-in query parameter
>>> - The client can take the URL as-is and use it for all management =
operations (ie, it doesn't have to generate or compose the URL based on =
component parts)
>>>=20
>>> Con:
>>> - The client must remember one more piece of information from the =
server at runtime if it wants to do manipulation and management of =
itself at the server (in addition to client_id, client_secret, =
registration_access_token, and others)
>>>=20
>>> Alternatives include specifying a URL pattern for the server to use =
and all clients to follow, specifying a query parameter for the update =
action, and specifying a separate endpoint entirely and using the =
presence of items such as client_id and the registration access token to =
differentiate the requests. Note that *all* of these alternatives can be =
accommodated using the semantics described above, with the same actions =
on the client's part.
>>>=20
>>>=20
>>> On syntax:
>>>=20
>>> Pro:
>>> - Follows the designs of RFC5988 for link relations
>>> - The HAL format is general, and allows for all kinds of other =
information to be placed inside the _links structure
>>> - Allows for full use of the JSON object to specify advanced =
operations on the returned endpoint if desired
>>>=20
>>> Con:
>>> - The rest of OAuth doesn't follow link relation guidelines (though =
it's been brought up)
>>> - The HAL format is general, and allows for all kinds of other =
information to be placed inside the _links structure
>>> - The HAL-JSON document is an expired individual I-D, and it's =
unclear what wider adoption looks like right now
>>>=20
>>> Alternatives include returning the URL as a separate data member =
(registration_update_url), using HTTP headers, or using JSON Schema.
>>>=20
>>> -- Justin
>>>=20
>>>=20
>>>=20
>>> [1] http://tools.ietf.org/html/draft-ietf-oauth-dyn-reg-05
>>> [2] http://tools.ietf.org/html/draft-kelly-json-hal-03
>>> _______________________________________________
>>> OAuth mailing list
>>> OAuth@ietf.org
>>> https://www.ietf.org/mailman/listinfo/oauth
>=20
> _______________________________________________
> OAuth mailing list
> OAuth@ietf.org
> https://www.ietf.org/mailman/listinfo/oauth


--Apple-Mail=_7C4672B2-203B-4136-BA8D-A2E7A628786C
Content-Transfer-Encoding: 7bit
Content-Type: text/html;
	charset=us-ascii

<html><head><meta http-equiv="Content-Type" content="text/html charset=us-ascii"></head><body style="word-wrap: break-word; -webkit-nbsp-mode: space; -webkit-line-break: after-white-space; "><div>Returning a location header in the 201 ids fine as long as we also have the same info as a claim.</div><div><br></div><div>I think most clients will want to process the JSON and store all the parameters together. &nbsp;Making them fish out a header makes the W3C happy and is the correct thing to do but taking it from a claim is what developers are more comfortable with.</div><div><br></div><div>John B.</div><div><br><div><div>On 2013-02-12, at 11:25 AM, Justin Richer &lt;<a href="mailto:jricher@mitre.org">jricher@mitre.org</a>&gt; wrote:</div><br class="Apple-interchange-newline"><blockquote type="cite">
  
    <meta content="text/html; charset=UTF-8" http-equiv="Content-Type">
  
  <div bgcolor="#FFFFFF" text="#000000">
    I'd be fine with the return from a creation request being a 201
    instead of a 200. <br>
    <br>
    &nbsp;-- Justin<br>
    <br>
    <div class="moz-cite-prefix">On 02/11/2013 06:33 PM, Richard
      Harrington wrote:<br>
    </div>
    <blockquote cite="mid:222C28CB-7F6F-4BC3-8692-40404C2DC2D3@maymount.com" type="cite">
      <meta http-equiv="Content-Type" content="text/html; charset=UTF-8">
      <div>Since the request is an HTTP POST and a resource is created (<span style="font-family: '.HelveticaNeueUI'; font-size: 15px;
          line-height: 19px; white-space: nowrap;
          -webkit-tap-highlight-color: rgba(26, 26, 26, 0.292969);
          -webkit-composition-fill-color: rgba(175, 192, 227, 0.230469);
          -webkit-composition-frame-color: rgba(77, 128, 180, 0.230469);
          -webkit-text-size-adjust: none; "><a moz-do-not-send="true" href="http://www.w3.org/Protocols/rfc2616/rfc2616-sec9.html#sec9.5">http://www.w3.org/Protocols/rfc2616/rfc2616-sec9.html#sec9.5</a>)&nbsp;</span><span style="font-family: '.HelveticaNeueUI'; font-size: 15px;
          line-height: 19px; white-space: nowrap;
          -webkit-tap-highlight-color: rgba(26, 26, 26, 0.292969);
          -webkit-composition-fill-color: rgba(175, 192, 227, 0.230469);
          -webkit-composition-frame-color: rgba(77, 128, 180, 0.230469);
          -webkit-text-size-adjust: none; ">the response should be an
          HTTP 201 Created&nbsp;</span><span style="font-family:
          '.HelveticaNeueUI'; font-size: 15px; line-height: 19px;
          white-space: nowrap; -webkit-tap-highlight-color: rgba(26, 26,
          26, 0.292969); -webkit-composition-fill-color: rgba(175, 192,
          227, 0.230469); -webkit-composition-frame-color: rgba(77, 128,
          180, 0.230469); -webkit-text-size-adjust: none; ">(<a moz-do-not-send="true" href="http://www.w3.org/Protocols/rfc2616/rfc2616-sec10.html#sec10.2.2">http://www.w3.org/Protocols/rfc2616/rfc2616-sec10.html#sec10.2.2</a>)&nbsp;</span><span style="font-family: '.HelveticaNeueUI'; font-size: 15px;
          line-height: 19px; white-space: nowrap;
          -webkit-tap-highlight-color: rgba(26, 26, 26, 0.292969);
          -webkit-composition-fill-color: rgba(175, 192, 227, 0.230469);
          -webkit-composition-frame-color: rgba(77, 128, 180, 0.230469);
          -webkit-text-size-adjust: none; ">which is supposed to include
          the location of the newly created resource.</span></div>
      <div><span style="font-family: '.HelveticaNeueUI'; font-size:
          15px; line-height: 19px; white-space: nowrap;
          -webkit-tap-highlight-color: rgba(26, 26, 26, 0.292969);
          -webkit-composition-fill-color: rgba(175, 192, 227, 0.230469);
          -webkit-composition-frame-color: rgba(77, 128, 180, 0.230469);
          -webkit-text-size-adjust: none; "><br>
        </span></div>
      <div><span style="font-family: '.HelveticaNeueUI'; font-size:
          15px; line-height: 19px; white-space: nowrap;
          -webkit-tap-highlight-color: rgba(26, 26, 26, 0.292969);
          -webkit-composition-fill-color: rgba(175, 192, 227, 0.230469);
          -webkit-composition-frame-color: rgba(77, 128, 180, 0.230469);
          -webkit-text-size-adjust: none; ">This is a good pattern to
          follow since, as you say, it does provide flexibility.</span></div>
      <div><span style="font-family: '.HelveticaNeueUI'; font-size:
          15px; line-height: 19px; white-space: nowrap;
          -webkit-tap-highlight-color: rgba(26, 26, 26, 0.292969);
          -webkit-composition-fill-color: rgba(175, 192, 227, 0.230469);
          -webkit-composition-frame-color: rgba(77, 128, 180, 0.230469);
          -webkit-text-size-adjust: none; "><br>
        </span></div>
      <div><span style="font-family: '.HelveticaNeueUI'; font-size:
          15px; line-height: 19px; white-space: nowrap;
          -webkit-tap-highlight-color: rgba(26, 26, 26, 0.292969);
          -webkit-composition-fill-color: rgba(175, 192, 227, 0.230469);
          -webkit-composition-frame-color: rgba(77, 128, 180, 0.230469);
          -webkit-text-size-adjust: none; "><br>
        </span></div>
      <div><br>
        On Feb 11, 2013, at 1:14 PM, Justin Richer &lt;<a moz-do-not-send="true" href="mailto:jricher@mitre.org">jricher@mitre.org</a>&gt;
        wrote:<br>
        <br>
      </div>
      <blockquote type="cite">
        <div><span>Draft -05 of OAuth Dynamic Client Registration [1]
            returns a URL pointer for the client to perform update and
            secret rotation actions. This functionality arose from
            discussions on the list about moving towards a more RESTful
            pattern, and Nat Sakimura proposed this approach in the
            OpenID Connect Working Group. This URL may be distinct from
            the Client Registration Endpoint URL, but draft -05 makes no
            promises as to its content, form, or structure, though it
            does contain implementor's notes on possible methods.</span><br>
          <span></span><br>
          <span>Two questions arise from this change:</span><br>
          <span> - The semantics of returning the client manipulation
            URL</span><br>
          <span> - The syntax (derived from HAL for JSON [2], an
            individual I-D submission)</span><br>
          <span></span><br>
          <span>On semantics:</span><br>
          <span></span><br>
          <span>Pro:</span><br>
          <span> - The server has flexibility on how to define the
            "update" endpoint, sending all clients to one URL, sending
            different clients to different URLs, or sending clients to a
            URL with a baked-in query parameter</span><br>
          <span> - The client can take the URL as-is and use it for all
            management operations (ie, it doesn't have to generate or
            compose the URL based on component parts)</span><br>
          <span></span><br>
          <span>Con:</span><br>
          <span> - The client must remember one more piece of
            information from the server at runtime if it wants to do
            manipulation and management of itself at the server (in
            addition to client_id, client_secret,
            registration_access_token, and others)</span><br>
          <span></span><br>
          <span>Alternatives include specifying a URL pattern for the
            server to use and all clients to follow, specifying a query
            parameter for the update action, and specifying a separate
            endpoint entirely and using the presence of items such as
            client_id and the registration access token to differentiate
            the requests. Note that *all* of these alternatives can be
            accommodated using the semantics described above, with the
            same actions on the client's part.</span><br>
          <span></span><br>
          <span></span><br>
          <span>On syntax:</span><br>
          <span></span><br>
          <span>Pro:</span><br>
          <span> - Follows the designs of RFC5988 for link relations</span><br>
          <span> - The HAL format is general, and allows for all kinds
            of other information to be placed inside the _links
            structure</span><br>
          <span> - Allows for full use of the JSON object to specify
            advanced operations on the returned endpoint if desired</span><br>
          <span></span><br>
          <span>Con:</span><br>
          <span> - The rest of OAuth doesn't follow link relation
            guidelines (though it's been brought up)</span><br>
          <span> - The HAL format is general, and allows for all kinds
            of other information to be placed inside the _links
            structure</span><br>
          <span> - The HAL-JSON document is an expired individual I-D,
            and it's unclear what wider adoption looks like right now</span><br>
          <span></span><br>
          <span>Alternatives include returning the URL as a separate
            data member (registration_update_url), using HTTP headers,
            or using JSON Schema.</span><br>
          <span></span><br>
          <span> -- Justin</span><br>
          <span></span><br>
          <span></span><br>
          <span></span><br>
          <span>[1] <a moz-do-not-send="true" href="http://tools.ietf.org/html/draft-ietf-oauth-dyn-reg-05">http://tools.ietf.org/html/draft-ietf-oauth-dyn-reg-05</a></span><br>
          <span>[2] <a moz-do-not-send="true" href="http://tools.ietf.org/html/draft-kelly-json-hal-03">http://tools.ietf.org/html/draft-kelly-json-hal-03</a></span><br>
          <span>_______________________________________________</span><br>
          <span>OAuth mailing list</span><br>
          <span><a moz-do-not-send="true" href="mailto:OAuth@ietf.org">OAuth@ietf.org</a></span><br>
          <span><a moz-do-not-send="true" href="https://www.ietf.org/mailman/listinfo/oauth">https://www.ietf.org/mailman/listinfo/oauth</a></span><br>
        </div>
      </blockquote>
    </blockquote>
    <br>
  </div>

_______________________________________________<br>OAuth mailing list<br><a href="mailto:OAuth@ietf.org">OAuth@ietf.org</a><br>https://www.ietf.org/mailman/listinfo/oauth<br></blockquote></div><br></div></body></html>
--Apple-Mail=_7C4672B2-203B-4136-BA8D-A2E7A628786C--

From wmills_92105@yahoo.com  Tue Feb 12 07:53:10 2013
Return-Path: <wmills_92105@yahoo.com>
X-Original-To: oauth@ietfa.amsl.com
Delivered-To: oauth@ietfa.amsl.com
Received: from localhost (localhost [127.0.0.1]) by ietfa.amsl.com (Postfix) with ESMTP id 4266C21F8E12 for <oauth@ietfa.amsl.com>; Tue, 12 Feb 2013 07:53:10 -0800 (PST)
X-Virus-Scanned: amavisd-new at amsl.com
X-Spam-Flag: NO
X-Spam-Score: -1.039
X-Spam-Level: 
X-Spam-Status: No, score=-1.039 tagged_above=-999 required=5 tests=[AWL=-0.896, BAYES_00=-2.599, FRT_ADOBE2=2.455, HTML_MESSAGE=0.001]
Received: from mail.ietf.org ([64.170.98.30]) by localhost (ietfa.amsl.com [127.0.0.1]) (amavisd-new, port 10024) with ESMTP id 3SVNnpFGIsly for <oauth@ietfa.amsl.com>; Tue, 12 Feb 2013 07:53:09 -0800 (PST)
Received: from nm5-vm0.bullet.mail.bf1.yahoo.com (nm5-vm0.bullet.mail.bf1.yahoo.com [98.139.213.150]) by ietfa.amsl.com (Postfix) with SMTP id C8DA221F8E0B for <oauth@ietf.org>; Tue, 12 Feb 2013 07:53:08 -0800 (PST)
Received: from [98.139.215.143] by nm5.bullet.mail.bf1.yahoo.com with NNFMP; 12 Feb 2013 15:53:08 -0000
Received: from [98.139.212.196] by tm14.bullet.mail.bf1.yahoo.com with NNFMP; 12 Feb 2013 15:53:08 -0000
Received: from [127.0.0.1] by omp1005.mail.bf1.yahoo.com with NNFMP; 12 Feb 2013 15:53:08 -0000
X-Yahoo-Newman-Property: ymail-3
X-Yahoo-Newman-Id: 237798.69347.bm@omp1005.mail.bf1.yahoo.com
Received: (qmail 93152 invoked by uid 60001); 12 Feb 2013 15:53:07 -0000
DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=yahoo.com; s=s1024; t=1360684387; bh=OKw5hMCjrdEBPUXysIIzemmFAQ/c/sR9rFKtrj/E594=; h=X-YMail-OSG:Received:X-Rocket-MIMEInfo:X-Mailer:References:Message-ID:Date:From:Reply-To:Subject:To:Cc:In-Reply-To:MIME-Version:Content-Type; b=5LAnNkOtCRmsDKh+PefhBCn/iKq0MrPP7mo1XJ5tbDGBdfxJ6N8/bxlhOUF6PB2Q5ZxDJqsECunng5iqVf8PrMVxUNni3hsohqIbDCius4oBd1nWqmaMmryff7AiqbsG0LExZitwjczkSska+JUC7KPo8MJhPwqKm4uR/J//7bo=
DomainKey-Signature: a=rsa-sha1; q=dns; c=nofws; s=s1024; d=yahoo.com; h=X-YMail-OSG:Received:X-Rocket-MIMEInfo:X-Mailer:References:Message-ID:Date:From:Reply-To:Subject:To:Cc:In-Reply-To:MIME-Version:Content-Type; b=UvTR5RGItW+X4Tuh2mWHVYIg/czKeoKl8DVctvCNHQUyzmNFiFfqf9vnE6QkJyhtXqnPy7+OPew8H2cHEoM3qy7QRhV14hK/LMNYF0EySKgGd6LlyAhsAS0LgghuOnsZe5uwXDD8c2eHEYsAAZ9FzUd9A+cYtZSNaIc4gHMH04s=;
X-YMail-OSG: mIlMR9IVM1mJPu4L46scrIFWxY.YvM46FdGtlDgLCL9ITtZ LDhDizn6E6i2IV1VCJ0Ff53yzsXm00wzFN5Ff22oyN6l5PTpG4c.JQRe6CLc a4uEBLdYr5JR9wsXbDP86xaDPjU0s_3X0g7K.o5IYJf7IheD.2OfBpQPA.Yv vCvjARCjaY6w8B5XWK6ZVJHD4ee38hJZepVn_W_1jA7D8VkPO7GOY8Ut4smL oMxe_g.LtFd4szkvZ8S1ssAolTJtn6p8B._unpWVy.wvMcma2qyTPNhryWyc ggRWF7WJrLYSsiLADK9NdyoGNd.Gr2tizUas1_yQte3M6kY.jkyUOQ57apSa tNtiK5gHcMLqD4bKCKTFqN6CuNp0u7dJZBXN3xuAV6VHE7ZxblDlJAlevZqd NLVV1pefTjOT_JkB3sFeTOx2XxfFjZu19nDEeT6pmxbhxvnNrF7U8Re_aCZZ gI5JCntsF1lZlyHU71VR4CKxyHW4fBFRJKkC44rdwLd1kBY8OLzlAHwf5fMA 8dgsFCI7IdGnvFY1cVUSyiLOcjHhKZhcIi8pRK5At5mjEeHcWiRuh.AKGhxu dQum0nbWkqY2jREcM58S26A5cIT8f2nbMc4odZ2.rRh2qdePhI11MPjsbWot mbUS1NM_5_z0wwDUimgeyMy4bhA--
Received: from [209.131.62.115] by web31812.mail.mud.yahoo.com via HTTP; Tue, 12 Feb 2013 07:53:07 PST
X-Rocket-MIMEInfo: 001.001, T25lIG9mIHRoZSB0aGluZ3MgSSBkbyBub3QgbGlrZSBhYm91dCBhIE1USSBrZXkgdHJhbnNwb3J0IG1lY2hhbmlzbSBpZiB3ZSBwdXQgaXQgaW4gdGhlIHRva2VuIGlzIHRoYXQgdGhlcmUgd2lsbCBiZSBzb21lIHN5c3RlbXMgdGhhdCBhbHJlYWR5IGhhdmUgYSBwZXIgdXNlciBzZWNyZXQgcHJvdmlzaW9uZWQgYW5kIHdlJ2xsIGJlIGZvcmNpbmcgZGF0YSBkdXBsaWNhdGlvbi4gwqBJZiBpZiB0aGUgZW5jcnlwdGVkIHRva2VuIGFscmVhZHkgaW5jbHVkZXMgYW55IHJhbmRvbSBjb21wb25lbnQgdGhhdCBjb3UBMAEBAQE-
X-Mailer: YahooMailWebService/0.8.133.508
References: <0573984A-8C11-4960-9BC6-F44D4B664C19@gmx.net> <1360661249.62997.YahooMailNeo@web31803.mail.mud.yahoo.com> <103117A9-0922-4E1A-AC73-D2914743046C@gmx.net> <ACC68AA9-F53B-4AA1-ACD5-462DE67A6B6E@adobe.com> <49D2CAF1-61AE-4DEB-A59D-D3F8F6D9C701@gmx.net>
Message-ID: <1360684387.88166.YahooMailNeo@web31812.mail.mud.yahoo.com>
Date: Tue, 12 Feb 2013 07:53:07 -0800 (PST)
From: William Mills <wmills_92105@yahoo.com>
To: Hannes Tschofenig <hannes.tschofenig@gmx.net>, Antonio Sanso <asanso@adobe.com>
In-Reply-To: <49D2CAF1-61AE-4DEB-A59D-D3F8F6D9C701@gmx.net>
MIME-Version: 1.0
Content-Type: multipart/alternative; boundary="1458549034-473964860-1360684387=:88166"
Cc: IETF oauth WG <oauth@ietf.org>
Subject: Re: [OAUTH-WG] Minutes from the OAuth Design Team Conference Call - 11th February 2013
X-BeenThere: oauth@ietf.org
X-Mailman-Version: 2.1.12
Precedence: list
Reply-To: William Mills <wmills_92105@yahoo.com>
List-Id: OAUTH WG <oauth.ietf.org>
List-Unsubscribe: <https://www.ietf.org/mailman/options/oauth>, <mailto:oauth-request@ietf.org?subject=unsubscribe>
List-Archive: <http://www.ietf.org/mail-archive/web/oauth>
List-Post: <mailto:oauth@ietf.org>
List-Help: <mailto:oauth-request@ietf.org?subject=help>
List-Subscribe: <https://www.ietf.org/mailman/listinfo/oauth>, <mailto:oauth-request@ietf.org?subject=subscribe>
X-List-Received-Date: Tue, 12 Feb 2013 15:53:10 -0000

--1458549034-473964860-1360684387=:88166
Content-Type: text/plain; charset=iso-8859-1
Content-Transfer-Encoding: quoted-printable

One of the things I do not like about a MTI key transport mechanism if we p=
ut it in the token is that there will be some systems that already have a p=
er user secret provisioned and we'll be forcing data duplication. =A0If if =
the encrypted token already includes any random component that could easily=
 be used as part of the signing key. =A0So I feel like this will fatten up =
the token, potentially a lot.=0A=0AIf we don't put it in the token this pro=
blem is WAY harder.=0A=0A=0A________________________________=0A From: Hanne=
s Tschofenig <hannes.tschofenig@gmx.net>=0ATo: Antonio Sanso <asanso@adobe.=
com> =0ACc: Hannes Tschofenig <hannes.tschofenig@gmx.net>; William Mills <w=
mills_92105@yahoo.com>; IETF oauth WG <oauth@ietf.org> =0ASent: Tuesday, Fe=
bruary 12, 2013 3:06 AM=0ASubject: Re: [OAUTH-WG] Minutes from the OAuth De=
sign Team Conference Call - 11th February 2013=0A =0AThe transport of the s=
ession key from the authorization server is described in Section 5.1 and is=
 called "mac_key". =0A=0AThe mechanism to transport the session key from th=
e authorization server to the resource server is not yet described in the d=
ocument. This has historical reasons: OAuth 1.0 did not separate the author=
ization server from the resource server in the way OAuth 2.0 does.=0A=0ACia=
o=0AHannes=0A=0AOn Feb 12, 2013, at 12:28 PM, Antonio Sanso wrote:=0A=0A> H=
i Hannes,=0A> =0A> how this session key "differs" from the key described in=
 the current draft [0]?=0A> =0A> Thanks and regards=0A> =0A> Antonio=0A> =
=0A> [0] http://tools.ietf.org/html/draft-ietf-oauth-v2-http-mac-02=0A> =0A=
> On Feb 12, 2013, at 10:44 AM, Hannes Tschofenig wrote:=0A> =0A>> Hi Bill,=
 =0A>> =0A>> On Feb 12, 2013, at 11:27 AM, William Mills wrote:=0A>> =0A>>>=
 Is key distribution how AS and PR share keys=A0 for token encryption/decry=
ption or specifically about the keys for the HOK tokens?=0A>>> =0A>> In ord=
er for the client to compute the keyed message digest it needs to have the =
session key. This session key is sent from the authorization server to the =
client and everyone on the call agreed that this has to be standardized. =
=0A>> =0A>> The resource server who receives the message from the client al=
so needs to have the session key to verify the message. How the resource se=
rver obtains this session key was subject for some discussion on the call. =
I presented three different ways of how the resource server is able to obta=
in that key. We have to decide on one mandatory-to-implement mechanism. The=
 open issue is which one? =0A>> =0A>>> For the MAC token spec, I don't actu=
ally care whether we use JSON or now, but I'm in full agreement that we do =
NOT duplicate any HTTP info into the JSON.=A0 Just signatures of that stuff=
.=0A>>> =0A>> I believe the folks on the call also agreed with you on that =
aspect that the content of the HTTP message should not be replicated in the=
 JSON payload itself. =0A>> =0A>> Ciao=0A>> Hannes=0A>> =0A>>> From: Hannes=
 Tschofenig <hannes.tschofenig@gmx.net>=0A>>> To: IETF oauth WG <oauth@ietf=
.org> =0A>>> Sent: Tuesday, February 12, 2013 1:10 AM=0A>>> Subject: [OAUTH=
-WG] Minutes from the OAuth Design Team Conference Call - 11th February 201=
3=0A>>> =0A>>> Here are my notes. =0A>>> =0A>>> Participants:=0A>>> =0A>>> =
* John Bradley=0A>>> * Derek Atkins=0A>>> * Phil Hunt=0A>>> * Prateek Mishr=
a=0A>>> * Hannes Tschofenig=0A>>> * Mike Jones=0A>>> * Antonio Sanso=0A>>> =
* Justin Richer=0A>>> =0A>>> Notes: =0A>>> =0A>>> My slides are available h=
ere: http://www.tschofenig.priv.at/OAuth2-Security-11Feb2013.ppt=0A>>> =0A>=
>> Slide #2 summarizes earlier discussions during the conference calls. =0A=
>>> =0A>>> -- HTTP vs. JSON=0A>>> =0A>>> Phil noted that he does not like t=
o use the MAC Token draft as a starting point because it does not re-use an=
y of the work done in the JOSE working group and in particular all the libr=
aries that are available today. He mentioned that earlier attempts to write=
 the MAC Token code lead to problems for implementers. =0A>>> =0A>>> Justin=
 responded that he does not agree with using JSON as a transport mechanism =
since this would replicate a SOAP style. =0A>>> =0A>>> Phil noted that he w=
ants to send JSON but the signature shall be computed over the HTTP header =
field. =0A>>> =0A>>> -- Flexibility for the keyed message digest computatio=
n=0A>>> =0A>>> From earlier discussion it was clear that the conference cal=
l participants wanted more flexibility regarding the keyed message digest c=
omputation. For this purpose Hannes presented the DKIM based approach, whic=
h allows selective header fields to be included in the digest. This is show=
n in slide #4. =0A>>> =0A>>> After some discussion the conference call part=
icipants thought that this would meet their needs. Further investigations w=
ould still be useful to determine the degree of failed HMAC calculations du=
e to HTTP proxies modifying the content. =0A>>> =0A>>> -- Key Distribution=
=0A>>> =0A>>> Hannes presented the open issue regarding the choice of key d=
istribution. Slides #6-#8 present three techniques and Hannes asked for fee=
dback regarding the preferred style. Justin and others didn't see the need =
to decide on one mechanism - they wanted to keep the choice open. Derek ind=
icated that this will not be an acceptable approach. Since the resource ser=
ver and the authorization server may, in the OAuth 2.0 framework, be entiti=
es produced by different vendors there is an interoperability need. Justin =
responded that he disagrees and that the resource server needs to understan=
d the access token and referred to the recent draft submission for the toke=
n introspection endpoint. Derek indicated that the resource server has to u=
nderstand the content of the access token and the token introspection endpo=
int just pushes the problem around: the resource server has to send the acc=
ess token to the authorization server and then the resource server gets the
 result back (which he then=0A>> a=0A>>> gain needs to understand) in order=
 to make a meaningful authorization decision. =0A>>> =0A>>> Everyone agreed=
 that the client must receive the session key from the authorization server=
 and that this approach has to be standardized. It was also agreed that thi=
s is a common approach among all three key distribution mechanisms.=0A>>> =
=0A>>> Hannes asked the participants to think about their preference. =0A>>=
> =0A>>> The questions regarding key naming and the indication for the inte=
nded resource server the client wants to talk to have been postponed. =0A>>=
> =0A>>> Ciao=0A>>> Hannes=0A>>> =0A>>> =0A>>> ____________________________=
___________________=0A>>> OAuth mailing list=0A>>> OAuth@ietf.org=0A>>> htt=
ps://www.ietf.org/mailman/listinfo/oauth=0A>>> =0A>>> =0A>> =0A>> _________=
______________________________________=0A>> OAuth mailing list=0A>> OAuth@i=
etf.org=0A>> https://www.ietf.org/mailman/listinfo/oauth=0A> 
--1458549034-473964860-1360684387=:88166
Content-Type: text/html; charset=iso-8859-1
Content-Transfer-Encoding: quoted-printable

<html><body><div style=3D"color:#000; background-color:#fff; font-family:Co=
urier New, courier, monaco, monospace, sans-serif;font-size:12pt"><div><spa=
n>One of the things I do not like about a MTI key transport mechanism if we=
 put it in the token is that there will be some systems that already have a=
 per user secret provisioned and we'll be forcing data duplication. &nbsp;I=
f if the encrypted token already includes any random component that could e=
asily be used as part of the signing key. &nbsp;So I feel like this will fa=
tten up the token, potentially a lot.</span></div><div style=3D"color: rgb(=
0, 0, 0); font-size: 16px; font-family: 'Courier New', courier, monaco, mon=
ospace, sans-serif; background-color: transparent; font-style: normal;"><sp=
an><br></span></div><div style=3D"color: rgb(0, 0, 0); font-size: 16px; fon=
t-family: 'Courier New', courier, monaco, monospace, sans-serif; background=
-color: transparent; font-style: normal;"><span>If we don't put it in the
 token this problem is WAY harder.</span></div><div><br></div>  <div style=
=3D"font-family: 'Courier New', courier, monaco, monospace, sans-serif; fon=
t-size: 12pt;"> <div style=3D"font-family: 'times new roman', 'new york', t=
imes, serif; font-size: 12pt;"> <div dir=3D"ltr"> <font size=3D"2" face=3D"=
Arial"> <hr size=3D"1">  <b><span style=3D"font-weight:bold;">From:</span><=
/b> Hannes Tschofenig &lt;hannes.tschofenig@gmx.net&gt;<br> <b><span style=
=3D"font-weight: bold;">To:</span></b> Antonio Sanso &lt;asanso@adobe.com&g=
t; <br><b><span style=3D"font-weight: bold;">Cc:</span></b> Hannes Tschofen=
ig &lt;hannes.tschofenig@gmx.net&gt;; William Mills &lt;wmills_92105@yahoo.=
com&gt;; IETF oauth WG &lt;oauth@ietf.org&gt; <br> <b><span style=3D"font-w=
eight: bold;">Sent:</span></b> Tuesday, February 12, 2013 3:06 AM<br> <b><s=
pan style=3D"font-weight: bold;">Subject:</span></b> Re: [OAUTH-WG] Minutes=
 from the OAuth Design Team Conference Call - 11th February 2013<br> </font=
> </div> <br>=0AThe transport of the session key from the authorization ser=
ver is described in Section 5.1 and is called "mac_key". <br><br>The mechan=
ism to transport the session key from the authorization server to the resou=
rce server is not yet described in the document. This has historical reason=
s: OAuth 1.0 did not separate the authorization server from the resource se=
rver in the way OAuth 2.0 does.<br><br>Ciao<br>Hannes<br><br>On Feb 12, 201=
3, at 12:28 PM, Antonio Sanso wrote:<br><br>&gt; Hi Hannes,<br>&gt; <br>&gt=
; how this session key "differs" from the key described in the current draf=
t [0]?<br>&gt; <br>&gt; Thanks and regards<br>&gt; <br>&gt; Antonio<br>&gt;=
 <br>&gt; [0] http://tools.ietf.org/html/draft-ietf-oauth-v2-http-mac-02<br=
>&gt; <br>&gt; On Feb 12, 2013, at 10:44 AM, Hannes Tschofenig wrote:<br>&g=
t; <br>&gt;&gt; Hi Bill, <br>&gt;&gt; <br>&gt;&gt; On Feb 12, 2013, at 11:2=
7 AM, William Mills wrote:<br>&gt;&gt; <br>&gt;&gt;&gt; Is key distribution=
 how AS
 and PR share keys&nbsp; for token encryption/decryption or specifically ab=
out the keys for the HOK tokens?<br>&gt;&gt;&gt; <br>&gt;&gt; In order for =
the client to compute the keyed message digest it needs to have the session=
 key. This session key is sent from the authorization server to the client =
and everyone on the call agreed that this has to be standardized. <br>&gt;&=
gt; <br>&gt;&gt; The resource server who receives the message from the clie=
nt also needs to have the session key to verify the message. How the resour=
ce server obtains this session key was subject for some discussion on the c=
all. I presented three different ways of how the resource server is able to=
 obtain that key. We have to decide on one mandatory-to-implement mechanism=
. The open issue is which one? <br>&gt;&gt; <br>&gt;&gt;&gt; For the MAC to=
ken spec, I don't actually care whether we use JSON or now, but I'm in full=
 agreement that we do NOT duplicate any HTTP info into the
 JSON.&nbsp; Just signatures of that stuff.<br>&gt;&gt;&gt; <br>&gt;&gt; I =
believe the folks on the call also agreed with you on that aspect that the =
content of the HTTP message should not be replicated in the JSON payload it=
self. <br>&gt;&gt; <br>&gt;&gt; Ciao<br>&gt;&gt; Hannes<br>&gt;&gt; <br>&gt=
;&gt;&gt; From: Hannes Tschofenig &lt;<a ymailto=3D"mailto:hannes.tschofeni=
g@gmx.net" href=3D"mailto:hannes.tschofenig@gmx.net">hannes.tschofenig@gmx.=
net</a>&gt;<br>&gt;&gt;&gt; To: IETF oauth WG &lt;<a ymailto=3D"mailto:oaut=
h@ietf.org" href=3D"mailto:oauth@ietf.org">oauth@ietf.org</a>&gt; <br>&gt;&=
gt;&gt; Sent: Tuesday, February 12, 2013 1:10 AM<br>&gt;&gt;&gt; Subject: [=
OAUTH-WG] Minutes from the OAuth Design Team Conference Call - 11th Februar=
y 2013<br>&gt;&gt;&gt; <br>&gt;&gt;&gt; Here are my notes. <br>&gt;&gt;&gt;=
 <br>&gt;&gt;&gt; Participants:<br>&gt;&gt;&gt; <br>&gt;&gt;&gt; * John Bra=
dley<br>&gt;&gt;&gt; * Derek Atkins<br>&gt;&gt;&gt; * Phil
 Hunt<br>&gt;&gt;&gt; * Prateek Mishra<br>&gt;&gt;&gt; * Hannes Tschofenig<=
br>&gt;&gt;&gt; * Mike Jones<br>&gt;&gt;&gt; * Antonio Sanso<br>&gt;&gt;&gt=
; * Justin Richer<br>&gt;&gt;&gt; <br>&gt;&gt;&gt; Notes: <br>&gt;&gt;&gt; =
<br>&gt;&gt;&gt; My slides are available here: http://www.tschofenig.priv.a=
t/OAuth2-Security-11Feb2013.ppt<br>&gt;&gt;&gt; <br>&gt;&gt;&gt; Slide #2 s=
ummarizes earlier discussions during the conference calls. <br>&gt;&gt;&gt;=
 <br>&gt;&gt;&gt; -- HTTP vs. JSON<br>&gt;&gt;&gt; <br>&gt;&gt;&gt; Phil no=
ted that he does not like to use the MAC Token draft as a starting point be=
cause it does not re-use any of the work done in the JOSE working group and=
 in particular all the libraries that are available today. He mentioned tha=
t earlier attempts to write the MAC Token code lead to problems for impleme=
nters. <br>&gt;&gt;&gt; <br>&gt;&gt;&gt; Justin responded that he does not =
agree with using JSON as a transport mechanism since this would
 replicate a SOAP style. <br>&gt;&gt;&gt; <br>&gt;&gt;&gt; Phil noted that =
he wants to send JSON but the signature shall be computed over the HTTP hea=
der field. <br>&gt;&gt;&gt; <br>&gt;&gt;&gt; -- Flexibility for the keyed m=
essage digest computation<br>&gt;&gt;&gt; <br>&gt;&gt;&gt; From earlier dis=
cussion it was clear that the conference call participants wanted more flex=
ibility regarding the keyed message digest computation. For this purpose Ha=
nnes presented the DKIM based approach, which allows selective header field=
s to be included in the digest. This is shown in slide #4. <br>&gt;&gt;&gt;=
 <br>&gt;&gt;&gt; After some discussion the conference call participants th=
ought that this would meet their needs. Further investigations would still =
be useful to determine the degree of failed HMAC calculations due to HTTP p=
roxies modifying the content. <br>&gt;&gt;&gt; <br>&gt;&gt;&gt; -- Key Dist=
ribution<br>&gt;&gt;&gt; <br>&gt;&gt;&gt; Hannes presented the open
 issue regarding the choice of key distribution. Slides #6-#8 present three=
 techniques and Hannes asked for feedback regarding the preferred style. Ju=
stin and others didn't see the need to decide on one mechanism - they wante=
d to keep the choice open. Derek indicated that this will not be an accepta=
ble approach. Since the resource server and the authorization server may, i=
n the OAuth 2.0 framework, be entities produced by different vendors there =
is an interoperability need. Justin responded that he disagrees and that th=
e resource server needs to understand the access token and referred to the =
recent draft submission for the token introspection endpoint. Derek indicat=
ed that the resource server has to understand the content of the access tok=
en and the token introspection endpoint just pushes the problem around: the=
 resource server has to send the access token to the authorization server a=
nd then the resource server gets the result back (which he
 then<br>&gt;&gt; a<br>&gt;&gt;&gt; gain needs to understand) in order to m=
ake a meaningful authorization decision. <br>&gt;&gt;&gt; <br>&gt;&gt;&gt; =
Everyone agreed that the client must receive the session key from the autho=
rization server and that this approach has to be standardized. It was also =
agreed that this is a common approach among all three key distribution mech=
anisms.<br>&gt;&gt;&gt; <br>&gt;&gt;&gt; Hannes asked the participants to t=
hink about their preference. <br>&gt;&gt;&gt; <br>&gt;&gt;&gt; The question=
s regarding key naming and the indication for the intended resource server =
the client wants to talk to have been postponed. <br>&gt;&gt;&gt; <br>&gt;&=
gt;&gt; Ciao<br>&gt;&gt;&gt; Hannes<br>&gt;&gt;&gt; <br>&gt;&gt;&gt; <br>&g=
t;&gt;&gt; _______________________________________________<br>&gt;&gt;&gt; =
OAuth mailing list<br>&gt;&gt;&gt; <a ymailto=3D"mailto:OAuth@ietf.org" hre=
f=3D"mailto:OAuth@ietf.org">OAuth@ietf.org</a><br>&gt;&gt;&gt; <a
 href=3D"https://www.ietf.org/mailman/listinfo/oauth" target=3D"_blank">htt=
ps://www.ietf.org/mailman/listinfo/oauth</a><br>&gt;&gt;&gt; <br>&gt;&gt;&g=
t; <br>&gt;&gt; <br>&gt;&gt; ______________________________________________=
_<br>&gt;&gt; OAuth mailing list<br>&gt;&gt; <a ymailto=3D"mailto:OAuth@iet=
f.org" href=3D"mailto:OAuth@ietf.org">OAuth@ietf.org</a><br>&gt;&gt; <a hre=
f=3D"https://www.ietf.org/mailman/listinfo/oauth" target=3D"_blank">https:/=
/www.ietf.org/mailman/listinfo/oauth</a><br>&gt; <br><br><br><br> </div> </=
div>  </div></body></html>
--1458549034-473964860-1360684387=:88166--

From prabath@wso2.com  Tue Feb 12 08:05:22 2013
Return-Path: <prabath@wso2.com>
X-Original-To: oauth@ietfa.amsl.com
Delivered-To: oauth@ietfa.amsl.com
Received: from localhost (localhost [127.0.0.1]) by ietfa.amsl.com (Postfix) with ESMTP id 0FD1F21F8F1E for <oauth@ietfa.amsl.com>; Tue, 12 Feb 2013 08:05:22 -0800 (PST)
X-Virus-Scanned: amavisd-new at amsl.com
X-Spam-Flag: NO
X-Spam-Score: -2.865
X-Spam-Level: 
X-Spam-Status: No, score=-2.865 tagged_above=-999 required=5 tests=[AWL=0.111,  BAYES_00=-2.599, FM_FORGED_GMAIL=0.622, HTML_MESSAGE=0.001, RCVD_IN_DNSWL_LOW=-1]
Received: from mail.ietf.org ([64.170.98.30]) by localhost (ietfa.amsl.com [127.0.0.1]) (amavisd-new, port 10024) with ESMTP id O5jDcozYxgnR for <oauth@ietfa.amsl.com>; Tue, 12 Feb 2013 08:05:20 -0800 (PST)
Received: from mail-ee0-f48.google.com (mail-ee0-f48.google.com [74.125.83.48]) by ietfa.amsl.com (Postfix) with ESMTP id A0F1A21F8F1B for <oauth@ietf.org>; Tue, 12 Feb 2013 08:05:19 -0800 (PST)
Received: by mail-ee0-f48.google.com with SMTP id t10so137029eei.7 for <oauth@ietf.org>; Tue, 12 Feb 2013 08:05:18 -0800 (PST)
X-Google-DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=google.com; s=20120113; h=mime-version:x-received:in-reply-to:references:date:message-id :subject:from:to:cc:content-type:x-gm-message-state; bh=it/14u1JfGU6DtGA5b4yXyzZyEf2444lhjmxeMOSRuQ=; b=iPKeiNTj2yCzDyD7eTs8sAsgXmFLQ/T4mJi4XySdMSoQd69bRJP55XU+3tiNcN5Q1B r2jUldbtMNMYNF2j2AWskGziATUWtFCpVG0qeV811LUcuEigCk20QE5PnsPVzEDOAfRg TPaiVHZGVw6W6nQQjDGADGmUB922ic7HMzmSgwg6/HxTNZLzifvkDa4i5qCfHDrClxU4 i+iHJQ+iK/YoYWufx9W7eoiYoiaocwB7NVn9jRDdnl1waRwRGkq+Q2q2bXgq9ovBNeht rr/lkGt3SL8RTnQMh+bRRaTylddkCAXZCyZjjUqK2ZWvLCH+sdDdr5e66Sz3+M+g1AHS Y3Zg==
MIME-Version: 1.0
X-Received: by 10.14.218.71 with SMTP id j47mr63953602eep.28.1360685107999; Tue, 12 Feb 2013 08:05:07 -0800 (PST)
Received: by 10.223.146.76 with HTTP; Tue, 12 Feb 2013 08:05:07 -0800 (PST)
In-Reply-To: <511A5062.5010108@mitre.org>
References: <20130206192420.32698.21027.idtracker@ietfa.amsl.com> <5112AE0B.1080501@mitre.org> <CAJV9qO_8-4FowrXK=ae-+xMjiJFP04ryVMLQ8SGUH8kp3PHrLg@mail.gmail.com> <5113C3AA.1040701@mitre.org> <CAJV9qO8BVV57eAb5kUNes15AYOpUKqw5XWQswh-FJA=b1pPgSA@mail.gmail.com> <5113DDB2.7060805@mitre.org> <CAJV9qO_gM1oera9ae9sqh9n17e-ZLKuC2pmsZwhq-RmFcMyqHA@mail.gmail.com> <51196777.6000502@mitre.org> <CAJV9qO-5bWZbNUfCmaqYBQoy-qwNaSZFOsO9GL3CrbSejwVTzw@mail.gmail.com> <F6595A40-6B4E-4718-ABB5-694CA975C4DB@maymount.com> <511A5062.5010108@mitre.org>
Date: Tue, 12 Feb 2013 21:35:07 +0530
Message-ID: <CAJV9qO_Mr87NX=KZRqCsWasQ1FuvDNBw14eS-TcPf_KRJztQFg@mail.gmail.com>
From: Prabath Siriwardena <prabath@wso2.com>
To: Justin Richer <jricher@mitre.org>
Content-Type: multipart/alternative; boundary=047d7b621afc8372fb04d5893011
X-Gm-Message-State: ALoCoQn0JigXseWdnQLW4LcVzw8mGnYCHagkUkspk5y1pEq38PoM4KL7+ALfhFbaFULqQnphzbrZ
Cc: "oauth@ietf.org" <oauth@ietf.org>
Subject: Re: [OAUTH-WG] Fwd: New Version Notification for draft-richer-oauth-introspection-02.txt
X-BeenThere: oauth@ietf.org
X-Mailman-Version: 2.1.12
Precedence: list
List-Id: OAUTH WG <oauth.ietf.org>
List-Unsubscribe: <https://www.ietf.org/mailman/options/oauth>, <mailto:oauth-request@ietf.org?subject=unsubscribe>
List-Archive: <http://www.ietf.org/mail-archive/web/oauth>
List-Post: <mailto:oauth@ietf.org>
List-Help: <mailto:oauth-request@ietf.org?subject=help>
List-Subscribe: <https://www.ietf.org/mailman/listinfo/oauth>, <mailto:oauth-request@ietf.org?subject=subscribe>
X-List-Received-Date: Tue, 12 Feb 2013 16:05:22 -0000

--047d7b621afc8372fb04d5893011
Content-Type: text/plain; charset=ISO-8859-1

Hi Justin,

I doubt whether valid_token would make a difference..?

My initial argument is what is the validation criteria..? Validation
criteria depends on the token_type..

If we are talking only about metadata - then I believe "revoked", "expired"
would be more meaningful..

Thanks & regards,
-Prabath

On Tue, Feb 12, 2013 at 7:53 PM, Justin Richer <jricher@mitre.org> wrote:

>  OK, I can see the wisdom in changing this term.
>
> I picked "valid" because I wanted a simple "boolean" value that would
> require no additional parsing or string-matching on the client's behalf,
> and I'd like to stick with that. OAuth is built with the assumption that
> clients need to be able to recover from invalid tokens at any stage, so I
> think a simple yes/no is the right step here.
>
> That said, I think you're both right that "valid" seems to have caused a
> bit of confusion. I don't want to go with "revoked" because I'd rather have
> the "token is OK" be the positive boolean value.
>
> Would "valid_token" be more clear? Or do we need a different adjective all
> together?
>
>  -- Justin
>
>
> On 02/11/2013 08:02 PM, Richard Harrington wrote:
>
> Have you considered "status" instead of "valid"?  It could have values
> like "active", "expired", and "revoked".
>
>  Is it worthwhile including the status of the client also?  For example,
> a client application could be disabled, temporarily or permanently, and
> thus disabling its access tokens as well.
>
>
> On Feb 11, 2013, at 1:56 PM, Prabath Siriwardena <prabath@wso2.com> wrote:
>
>  I guess confusion is with 'valid' parameter is in the response..
>
>  I thought this will be helpful to standardize the communication between
> Resource Server and the Authorization Server..
>
>  I would suggest we completely remove "valid" from the response - or
> define it much clearly..
>
>  May be can add "revoked" with a boolean attribute..
>
>  Thanks & regards,
> -Prabath
>
> On Tue, Feb 12, 2013 at 3:19 AM, Justin Richer <jricher@mitre.org> wrote:
>
>>
>> On 02/08/2013 12:51 AM, Prabath Siriwardena wrote:
>>
>> Hi Justin,
>>
>>  I have couple of questions related to "valid" parameter...
>>
>>  This endpoint can be invoked by the Resource Server in runtime...
>>
>>
>> That's correct.
>>
>>
>>
>>  In that case what is exactly meant by the "resource_id" in request ?
>>
>>
>>  The resource_id field is a service-specific string that basically lets
>> the resource server provide some context to the request to the auth server.
>> There have been some other suggestions like client IP address, but I wanted
>> to put this one in because it seemed to be a common theme. The client is
>> trying to do *something* with the token, after all, and the rights,
>> permissions, and metadata associated with the token could change based on
>> that. Since the Introspection endpoint is all about getting that metadata
>> back to the PR, this seemed like a good idea.
>>
>>
>>
>>  IMO a token to be valid depends on set of criteria based on it's type..
>>
>>  For a Bearer token..
>>
>>  1. Token should not be expired
>> 2. Token should not be revoked.
>> 3. The scope the token issued should match with the scope required for
>> the resource.
>>
>>  For a MAC token...
>>
>>  1. Token not expired (mac id)
>> 2. Token should not be revoked
>> 3. The scope the token issued should match with the scope required for
>> the resource.
>> 4. HMAC check should be valid
>>
>>  There are similar conditions for SAML bearer too..
>>
>>
>>  This isn't really true. The SAML bearer token is fully self-contained
>> and doesn't change based on other parameters in the message, unlike MAC.
>> Same with JWT. When it hands a SAML or JWT token to the AS, the PR has
>> given *everything* the server needs to check that token's validity and use.
>>
>> MAC signatures change with every message, and they're done across several
>> components of the HTTP message. Therefor, the HMAC check for MAC style
>> tokens will still need to be done by the protected resource. Introspection
>> would help in the case that the signature validated just fine, but the
>> token might have expired. Or you need to know what scopes apply.
>> Introspection isn't to fully validate the call to the protected resource --
>> if that were the case, the PR would have to send some kind of encapsulated
>> version of the original request. Otherwise, the AS won't have all of the
>> information it needs to check the MAC.
>>
>>
>> I think what you're describing is ultimately *not* what the introspection
>> endpoint is intended to do. If that's unclear from the document, can you
>> please suggest text that would help clear the use case up? I wouldn't want
>> it to be ambiguous.
>>
>>  -- Justin
>>
>>
>>
>>  Thanks & regards,
>> -Prabath
>>
>>
>> On Thu, Feb 7, 2013 at 10:30 PM, Justin Richer <jricher@mitre.org> wrote:
>>
>>>  It validates the token, which would be either the token itself in the
>>> case of Bearer or the token "id" part of something more complex like MAC.
>>> It doesn't directly validate the usage of the token, that's still up to the
>>> PR to do that.
>>>
>>> I nearly added a "token type" field in this draft, but held back because
>>> there are several kinds of "token type" that people talk about in OAuth.
>>> First, there's "Bearer" vs. "MAC" vs. "HOK", or what have you. Then within
>>> Bearer you have "JWT" or "SAML" or "unstructured blob". Then you've also
>>> got "access" vs. "refresh" and other flavors of token, like the id_token in
>>> OpenID Connect.
>>>
>>> Thing is, the server running the introspection endpoint will probably
>>> know *all* of these. But should it tell the client? If so, which of the
>>> three, and what names should the fields be?
>>>
>>>  -- Justin
>>>
>>>
>>> On 02/07/2013 11:26 AM, Prabath Siriwardena wrote:
>>>
>>> Okay.. I was thinking this could be used as a way to validate the token
>>> as well. BTW even in this case shouldn't communicate the type of token to
>>> AS? For example in the case of SAML profile - it could be SAML token..
>>>
>>>  Thanks & regards,
>>> -Prabath
>>>
>>> On Thu, Feb 7, 2013 at 8:39 PM, Justin Richer <jricher@mitre.org> wrote:
>>>
>>>>  "valid" might not be the best term, but it's meant to be a field where
>>>> the server says "yes this token is still good" or "no this token isn't good
>>>> anymore". We could instead do this with HTTP codes or something but I went
>>>> with a pure JSON response.
>>>>
>>>>  -- Justin
>>>>
>>>>
>>>> On 02/06/2013 10:47 PM, Prabath Siriwardena wrote:
>>>>
>>>> Hi Justin,
>>>>
>>>>  I believe this is addressing one of the key missing part in OAuth
>>>> 2.0...
>>>>
>>>>  One question - I guess this was discussed already...
>>>>
>>>>  In the spec - in the introspection response it has the attribute
>>>> "valid" - this is basically the validity of the token provided in the
>>>> request.
>>>>
>>>>  Validation criteria depends on the token and well as token type (
>>>> Bearer, MAC..).
>>>>
>>>>  In the spec it seems like it's coupled with Bearer token type... But
>>>> I guess, by adding "token_type" to the request we can remove this
>>>> dependency.
>>>>
>>>>  WDYT..?
>>>>
>>>>  Thanks & regards,
>>>> -Prabath
>>>>
>>>> On Thu, Feb 7, 2013 at 12:54 AM, Justin Richer <jricher@mitre.org>wrote:
>>>>
>>>>>  Updated introspection draft based on recent comments. Changes include:
>>>>>
>>>>>  - "scope" return parameter now follows RFC6749 format instead of JSON
>>>>> array
>>>>>  - "subject" -> "sub", and "audience" -> "aud", to be parallel with
>>>>> JWT claims
>>>>>  - clarified what happens if the authentication is bad
>>>>>
>>>>>  -- Justin
>>>>>
>>>>>
>>>>> -------- Original Message --------  Subject: New Version Notification
>>>>> for draft-richer-oauth-introspection-02.txt  Date: Wed, 6 Feb 2013
>>>>> 11:24:20 -0800  From: <internet-drafts@ietf.org><internet-drafts@ietf.org>  To:
>>>>> <jricher@mitre.org> <jricher@mitre.org>
>>>>>
>>>>> A new version of I-D, draft-richer-oauth-introspection-02.txt
>>>>> has been successfully submitted by Justin Richer and posted to the
>>>>> IETF repository.
>>>>>
>>>>> Filename:	 draft-richer-oauth-introspection
>>>>> Revision:	 02
>>>>> Title:		 OAuth Token Introspection
>>>>> Creation date:	 2013-02-06
>>>>> WG ID:		 Individual Submission
>>>>> Number of pages: 6
>>>>> URL:             http://www.ietf.org/internet-drafts/draft-richer-oauth-introspection-02.txt
>>>>> Status:          http://datatracker.ietf.org/doc/draft-richer-oauth-introspection
>>>>> Htmlized:        http://tools.ietf.org/html/draft-richer-oauth-introspection-02
>>>>> Diff:            http://www.ietf.org/rfcdiff?url2=draft-richer-oauth-introspection-02
>>>>>
>>>>> Abstract:
>>>>>    This specification defines a method for a client or protected
>>>>>    resource to query an OAuth authorization server to determine meta-
>>>>>    information about an OAuth token.
>>>>>
>>>>>
>>>>>
>>>>>
>>>>>
>>>>> The IETF Secretariat
>>>>>
>>>>>
>>>>>
>>>>>
>>>>>
>>>>> _______________________________________________
>>>>> OAuth mailing list
>>>>> OAuth@ietf.org
>>>>> https://www.ietf.org/mailman/listinfo/oauth
>>>>>
>>>>>
>>>>
>>>>
>>>>  --
>>>> Thanks & Regards,
>>>> Prabath
>>>>
>>>>  Mobile : +94 71 809 6732
>>>>
>>>> http://blog.facilelogin.com
>>>> http://RampartFAQ.com
>>>>
>>>>
>>>>
>>>
>>>
>>>  --
>>> Thanks & Regards,
>>> Prabath
>>>
>>>  Mobile : +94 71 809 6732 <%2B94%2071%20809%206732>
>>>
>>> http://blog.facilelogin.com
>>> http://RampartFAQ.com
>>>
>>>
>>>
>>
>>
>>  --
>> Thanks & Regards,
>> Prabath
>>
>>  Mobile : +94 71 809 6732 <%2B94%2071%20809%206732>
>>
>> http://blog.facilelogin.com
>> http://RampartFAQ.com
>>
>>
>>
>
>
>  --
> Thanks & Regards,
> Prabath
>
>  Mobile : +94 71 809 6732
>
> http://blog.facilelogin.com
> http://RampartFAQ.com
>
>  _______________________________________________
> OAuth mailing list
> OAuth@ietf.org
> https://www.ietf.org/mailman/listinfo/oauth
>
>
>


-- 
Thanks & Regards,
Prabath

Mobile : +94 71 809 6732

http://blog.facilelogin.com
http://RampartFAQ.com

--047d7b621afc8372fb04d5893011
Content-Type: text/html; charset=ISO-8859-1
Content-Transfer-Encoding: quoted-printable

Hi Justin,<div><br></div><div>I doubt whether valid_token would make a diff=
erence..?</div><div><br></div><div>My initial argument is what is the valid=
ation criteria..? Validation criteria depends on the token_type..</div><div=
>
<br></div><div>If we are talking only about metadata - then I believe &quot=
;revoked&quot;, &quot;expired&quot; would be more meaningful..</div><div><b=
r></div><div>Thanks &amp; regards,</div><div>-Prabath<br><br><div class=3D"=
gmail_quote">
On Tue, Feb 12, 2013 at 7:53 PM, Justin Richer <span dir=3D"ltr">&lt;<a hre=
f=3D"mailto:jricher@mitre.org" target=3D"_blank">jricher@mitre.org</a>&gt;<=
/span> wrote:<br><blockquote class=3D"gmail_quote" style=3D"margin:0 0 0 .8=
ex;border-left:1px #ccc solid;padding-left:1ex">

 =20
   =20
 =20
  <div bgcolor=3D"#FFFFFF" text=3D"#000000">
    OK, I can see the wisdom in changing this term. <br>
    <br>
    I picked &quot;valid&quot; because I wanted a simple &quot;boolean&quot=
; value that
    would require no additional parsing or string-matching on the
    client&#39;s behalf, and I&#39;d like to stick with that. OAuth is buil=
t
    with the assumption that clients need to be able to recover from
    invalid tokens at any stage, so I think a simple yes/no is the right
    step here. <br>
    <br>
    That said, I think you&#39;re both right that &quot;valid&quot; seems t=
o have
    caused a bit of confusion. I don&#39;t want to go with &quot;revoked&qu=
ot; because
    I&#39;d rather have the &quot;token is OK&quot; be the positive boolean=
 value. <br>
    <br>
    Would &quot;valid_token&quot; be more clear? Or do we need a different
    adjective all together?<span class=3D"HOEnZb"><font color=3D"#888888"><=
br>
    <br>
    =A0-- Justin</font></span><div><div class=3D"h5"><br>
    <br>
    <div>On 02/11/2013 08:02 PM, Richard
      Harrington wrote:<br>
    </div>
    <blockquote type=3D"cite">
     =20
      <div>Have you considered &quot;status&quot; instead of &quot;valid&qu=
ot;? =A0It could
        have values like &quot;active&quot;, &quot;expired&quot;, and &quot=
;revoked&quot;.</div>
      <div><br>
      </div>
      <div>Is it worthwhile including the status of the client also?
        =A0For example, a client application could be disabled,
        temporarily or permanently, and thus disabling its access tokens
        as well.</div>
      <div><br>
      </div>
      <div><br>
        On Feb 11, 2013, at 1:56 PM, Prabath Siriwardena &lt;<a href=3D"mai=
lto:prabath@wso2.com" target=3D"_blank">prabath@wso2.com</a>&gt;
        wrote:<br>
        <br>
      </div>
      <blockquote type=3D"cite">
        <div>I guess confusion is with &#39;valid&#39; parameter is in the
          response..
          <div><br>
          </div>
          <div>I thought this will be helpful to=A0standardize=A0the
            communication between Resource Server and the Authorization
            Server..</div>
          <div><br>
          </div>
          <div>I would suggest we completely remove &quot;valid&quot; from =
the
            response - or define it much clearly..</div>
          <div><br>
          </div>
          <div>May be can add &quot;revoked&quot; with a boolean attribute.=
.</div>
          <div><br>
          </div>
          <div>Thanks &amp; regards,</div>
          <div>-Prabath<br>
            <br>
            <div class=3D"gmail_quote">On Tue, Feb 12, 2013 at 3:19 AM,
              Justin Richer <span dir=3D"ltr">&lt;<a href=3D"mailto:jricher=
@mitre.org" target=3D"_blank">jricher@mitre.org</a>&gt;</span>
              wrote:<br>
              <blockquote class=3D"gmail_quote" style=3D"margin:0 0 0 .8ex;=
border-left:1px #ccc solid;padding-left:1ex">
                <div bgcolor=3D"#FFFFFF" text=3D"#000000">
                  <div> <br>
                    <div>On 02/08/2013 12:51 AM, Prabath Siriwardena
                      wrote:<br>
                    </div>
                  </div>
                  <blockquote type=3D"cite"> Hi=A0Justin,
                    <div><br>
                    </div>
                    <div>
                      <div>I have couple of questions related to &quot;vali=
d&quot;
                        parameter...</div>
                      <div><br>
                      </div>
                      <div>This endpoint can be invoked by the Resource
                        Server in runtime...</div>
                    </div>
                  </blockquote>
                  <br>
                  That&#39;s correct.
                  <div><br>
                    <br>
                    <blockquote type=3D"cite">
                      <div><br>
                      </div>
                      <div>In that case what is exactly meant by the
                        &quot;resource_id&quot; in request ?</div>
                    </blockquote>
                    <br>
                  </div>
                  The resource_id field is a service-specific string
                  that basically lets the resource server provide some
                  context to the request to the auth server. There have
                  been some other suggestions like client IP address,
                  but I wanted to put this one in because it seemed to
                  be a common theme. The client is trying to do
                  *something* with the token, after all, and the rights,
                  permissions, and metadata associated with the token
                  could change based on that. Since the Introspection
                  endpoint is all about getting that metadata back to
                  the PR, this seemed like a good idea.
                  <div><br>
                    <br>
                    <blockquote type=3D"cite">
                      <div><br>
                      </div>
                      <div>IMO a token to be valid depends on set of
                        criteria based on it&#39;s type..</div>
                      <div><br>
                      </div>
                      <div>For a Bearer token..</div>
                      <div><br>
                      </div>
                      <div>1. Token should not be expired</div>
                      <div>2. Token should not be revoked.</div>
                      <div>3. The scope the token issued should match
                        with the scope required for the resource.</div>
                      <div><br>
                      </div>
                      <div>For a MAC token...</div>
                      <div><br>
                      </div>
                      <div>1. Token not expired (mac id)</div>
                      <div>2. Token should not be revoked</div>
                      <div>3. The scope the token issued should match
                        with the scope required for the resource.</div>
                      <div>4. HMAC check should be valid</div>
                      <div><br>
                      </div>
                      There are similar conditions for SAML bearer too..</b=
lockquote>
                    <br>
                  </div>
                  This isn&#39;t really true. The SAML bearer token is full=
y
                  self-contained and doesn&#39;t change based on other
                  parameters in the message, unlike MAC. Same with JWT.
                  When it hands a SAML or JWT token to the AS, the PR
                  has given *everything* the server needs to check that
                  token&#39;s validity and use. <br>
                  <br>
                  MAC signatures change with every message, and they&#39;re
                  done across several components of the HTTP message.
                  Therefor, the HMAC check for MAC style tokens will
                  still need to be done by the protected resource.
                  Introspection would help in the case that the
                  signature validated just fine, but the token might
                  have expired. Or you need to know what scopes apply.
                  Introspection isn&#39;t to fully validate the call to the
                  protected resource -- if that were the case, the PR
                  would have to send some kind of encapsulated version
                  of the original request. Otherwise, the AS won&#39;t have
                  all of the information it needs to check the MAC.<br>
                  <br>
                  <br>
                  I think what you&#39;re describing is ultimately *not*
                  what the introspection endpoint is intended to do. If
                  that&#39;s unclear from the document, can you please
                  suggest text that would help clear the use case up? I
                  wouldn&#39;t want it to be ambiguous.<span><font color=3D=
"#888888"><br>
                      <br>
                      =A0-- Justin</font></span>
                  <div>
                    <div><br>
                      <br>
                      <blockquote type=3D"cite">
                        <div><br>
                        </div>
                        <div>Thanks &amp; regards,</div>
                        <div>-Prabath</div>
                        <div><br>
                        </div>
                        <div><br>
                          <div class=3D"gmail_quote">On Thu, Feb 7, 2013
                            at 10:30 PM, Justin Richer <span dir=3D"ltr">&l=
t;<a href=3D"mailto:jricher@mitre.org" target=3D"_blank">jricher@mitre.org<=
/a>&gt;</span>
                            wrote:<br>
                            <blockquote class=3D"gmail_quote" style=3D"marg=
in:0 0 0 .8ex;border-left:1px #ccc solid;padding-left:1ex">
                              <div bgcolor=3D"#FFFFFF" text=3D"#000000"> It
                                validates the token, which would be
                                either the token itself in the case of
                                Bearer or the token &quot;id&quot; part of
                                something more complex like MAC. It
                                doesn&#39;t directly validate the usage of
                                the token, that&#39;s still up to the PR to
                                do that.<br>
                                <br>
                                I nearly added a &quot;token type&quot; fie=
ld in
                                this draft, but held back because there
                                are several kinds of &quot;token type&quot;=
 that
                                people talk about in OAuth. First,
                                there&#39;s &quot;Bearer&quot; vs. &quot;MA=
C&quot; vs. &quot;HOK&quot;, or
                                what have you. Then within Bearer you
                                have &quot;JWT&quot; or &quot;SAML&quot; or=
 &quot;unstructured
                                blob&quot;. Then you&#39;ve also got &quot;=
access&quot; vs.
                                &quot;refresh&quot; and other flavors of to=
ken,
                                like the id_token in OpenID Connect. <br>
                                <br>
                                Thing is, the server running the
                                introspection endpoint will probably
                                know *all* of these. But should it tell
                                the client? If so, which of the three,
                                and what names should the fields be?<span><=
font color=3D"#888888"><br>
                                    <br>
                                    =A0-- Justin</font></span>
                                <div>
                                  <div><br>
                                    <br>
                                    <div>On 02/07/2013 11:26 AM, Prabath
                                      Siriwardena wrote:<br>
                                    </div>
                                    <blockquote type=3D"cite"> Okay.. I
                                      was thinking this could be used as
                                      a way to validate the token as
                                      well. BTW even in this case
                                      shouldn&#39;t communicate the type of
                                      token to AS? For example in the
                                      case of SAML profile - it could be
                                      SAML token..
                                      <div> <br>
                                      </div>
                                      <div>Thanks &amp; regards,</div>
                                      <div>-Prabath<br>
                                        <br>
                                        <div class=3D"gmail_quote">On Thu,
                                          Feb 7, 2013 at 8:39 PM, Justin
                                          Richer <span dir=3D"ltr">&lt;<a h=
ref=3D"mailto:jricher@mitre.org" target=3D"_blank">jricher@mitre.org</a>&gt=
;</span>
                                          wrote:<br>
                                          <blockquote class=3D"gmail_quote"=
 style=3D"margin:0 0 0 .8ex;border-left:1px #ccc solid;padding-left:1ex">
                                            <div bgcolor=3D"#FFFFFF" text=
=3D"#000000"> &quot;valid&quot;
                                              might not be the best
                                              term, but it&#39;s meant to b=
e
                                              a field where the server
                                              says &quot;yes this token is
                                              still good&quot; or &quot;no =
this
                                              token isn&#39;t good anymore&=
quot;.
                                              We could instead do this
                                              with HTTP codes or
                                              something but I went with
                                              a pure JSON response.<span><f=
ont color=3D"#888888"><br>
                                                  <br>
                                                  =A0-- Justin</font></span=
>
                                              <div>
                                                <div><br>
                                                  <br>
                                                  <div>On 02/06/2013
                                                    10:47 PM, Prabath
                                                    Siriwardena wrote:<br>
                                                  </div>
                                                  <blockquote type=3D"cite"=
> Hi
                                                    Justin,
                                                    <div><br>
                                                    </div>
                                                    <div>I believe this
                                                      is addressing one
                                                      of the key missing
                                                      part in OAuth
                                                      2.0...</div>
                                                    <div><br>
                                                    </div>
                                                    <div>One question -
                                                      I guess this was
                                                      discussed
                                                      already...</div>
                                                    <div><br>
                                                    </div>
                                                    <div>In the spec -
                                                      in the
                                                      introspection
                                                      response it has
                                                      the attribute
                                                      &quot;valid&quot; - t=
his is
                                                      basically the
                                                      validity of the
                                                      token provided in
                                                      the request.</div>
                                                    <div><br>
                                                    </div>
                                                    <div>Validation=A0crite=
ria
                                                      depends on the
                                                      token and well as
                                                      token type (
                                                      Bearer, MAC..).</div>
                                                    <div><br>
                                                    </div>
                                                    <div>In the spec it
                                                      seems like it&#39;s
                                                      coupled with
                                                      Bearer token
                                                      type... But I
                                                      guess, by adding
                                                      &quot;token_type&quot=
; to
                                                      the request we can
                                                      remove this
                                                      dependency.</div>
                                                    <div><br>
                                                    </div>
                                                    <div>WDYT..?</div>
                                                    <div><br>
                                                    </div>
                                                    <div>Thanks &amp;
                                                      regards,</div>
                                                    <div>-Prabath=A0</div>
                                                    <div><br>
                                                      <div class=3D"gmail_q=
uote">On
                                                        Thu, Feb 7, 2013
                                                        at 12:54 AM,
                                                        Justin Richer <span=
 dir=3D"ltr">&lt;<a href=3D"mailto:jricher@mitre.org" target=3D"_blank">jri=
cher@mitre.org</a>&gt;</span>
                                                        wrote:<br>
                                                        <blockquote class=
=3D"gmail_quote" style=3D"margin:0 0 0 .8ex;border-left:1px #ccc solid;padd=
ing-left:1ex">
                                                          <div bgcolor=3D"#=
FFFFFF" text=3D"#000000">
                                                          Updated
                                                          introspection
                                                          draft based on
                                                          recent
                                                          comments.
                                                          Changes
                                                          include:<br>
                                                          <br>
                                                          =A0- &quot;scope&=
quot;
                                                          return
                                                          parameter now
                                                          follows
                                                          RFC6749 format
                                                          instead of
                                                          JSON array<br>
                                                          =A0- &quot;subjec=
t&quot;
                                                          -&gt; &quot;sub&q=
uot;,
                                                          and &quot;audienc=
e&quot;
                                                          -&gt; &quot;aud&q=
uot;,
                                                          to be parallel
                                                          with JWT
                                                          claims<br>
                                                          =A0- clarified
                                                          what happens
                                                          if the
                                                          authentication
                                                          is bad<br>
                                                          <br>
                                                          =A0-- Justin<br>
                                                          <div><br>
                                                          <br>
                                                          --------
                                                          Original
                                                          Message
                                                          --------
                                                          <table border=3D"=
0" cellpadding=3D"0" cellspacing=3D"0">
                                                          <tbody>
                                                          <tr>
                                                          <th align=3D"RIGH=
T" nowrap valign=3D"BASELINE">Subject: </th>
                                                          <td>New
                                                          Version
                                                          Notification
                                                          for
                                                          draft-richer-oaut=
h-introspection-02.txt</td>
                                                          </tr>
                                                          <tr>
                                                          <th align=3D"RIGH=
T" nowrap valign=3D"BASELINE">Date: </th>
                                                          <td>Wed, 6 Feb
                                                          2013 11:24:20
                                                          -0800</td>
                                                          </tr>
                                                          <tr>
                                                          <th align=3D"RIGH=
T" nowrap valign=3D"BASELINE">From: </th>
                                                          <td><a href=3D"ma=
ilto:internet-drafts@ietf.org" target=3D"_blank">&lt;internet-drafts@ietf.o=
rg&gt;</a></td>
                                                          </tr>
                                                          <tr>
                                                          <th align=3D"RIGH=
T" nowrap valign=3D"BASELINE">To: </th>
                                                          <td><a href=3D"ma=
ilto:jricher@mitre.org" target=3D"_blank">&lt;jricher@mitre.org&gt;</a></td=
>
                                                          </tr>
                                                          </tbody>
                                                          </table>
                                                          <br>
                                                          <br>
                                                          <pre>A new versio=
n of I-D, draft-richer-oauth-introspection-02.txt
has been successfully submitted by Justin Richer and posted to the
IETF repository.

Filename:	 draft-richer-oauth-introspection
Revision:	 02
Title:		 OAuth Token Introspection
Creation date:	 2013-02-06
WG ID:		 Individual Submission
Number of pages: 6
URL:             <a href=3D"http://www.ietf.org/internet-drafts/draft-riche=
r-oauth-introspection-02.txt" target=3D"_blank">http://www.ietf.org/interne=
t-drafts/draft-richer-oauth-introspection-02.txt</a>
Status:          <a href=3D"http://datatracker.ietf.org/doc/draft-richer-oa=
uth-introspection" target=3D"_blank">http://datatracker.ietf.org/doc/draft-=
richer-oauth-introspection</a>
Htmlized:        <a href=3D"http://tools.ietf.org/html/draft-richer-oauth-i=
ntrospection-02" target=3D"_blank">http://tools.ietf.org/html/draft-richer-=
oauth-introspection-02</a>
Diff:            <a href=3D"http://www.ietf.org/rfcdiff?url2=3Ddraft-richer=
-oauth-introspection-02" target=3D"_blank">http://www.ietf.org/rfcdiff?url2=
=3Ddraft-richer-oauth-introspection-02</a>

Abstract:
   This specification defines a method for a client or protected
   resource to query an OAuth authorization server to determine meta-
   information about an OAuth token.


                                                                           =
      =20


The IETF Secretariat

</pre>
                                                          <br>
                                                          </div>
                                                          <br>
                                                          </div>
                                                          <br>
_______________________________________________<br>
                                                          OAuth mailing
                                                          list<br>
                                                          <a href=3D"mailto=
:OAuth@ietf.org" target=3D"_blank">OAuth@ietf.org</a><br>
                                                          <a href=3D"https:=
//www.ietf.org/mailman/listinfo/oauth" target=3D"_blank">https://www.ietf.o=
rg/mailman/listinfo/oauth</a><br>
                                                          <br>
                                                        </blockquote>
                                                      </div>
                                                      <br>
                                                      <br clear=3D"all">
                                                      <div><br>
                                                      </div>
                                                      -- <br>
                                                      Thanks &amp;
                                                      Regards,<br>
                                                      Prabath
                                                      <div><br>
                                                      </div>
                                                      <div>Mobile : <a href=
=3D"tel:%2B94%2071%20809%206732" value=3D"+94718096732" target=3D"_blank">+=
94 71 809 6732</a>=A0<br>
                                                        <br>
                                                        <a href=3D"http://b=
log.facilelogin.com" target=3D"_blank">http://blog.facilelogin.com</a><br>
                                                        <a href=3D"http://R=
ampartFAQ.com" target=3D"_blank">http://RampartFAQ.com</a></div>
                                                    </div>
                                                  </blockquote>
                                                  <br>
                                                </div>
                                              </div>
                                            </div>
                                          </blockquote>
                                        </div>
                                        <br>
                                        <br clear=3D"all">
                                        <div><br>
                                        </div>
                                        -- <br>
                                        Thanks &amp; Regards,<br>
                                        Prabath
                                        <div><br>
                                        </div>
                                        <div>Mobile : <a href=3D"tel:%2B94%=
2071%20809%206732" value=3D"+94718096732" target=3D"_blank">+94 71 809
                                            6732</a>=A0<br>
                                          <br>
                                          <a href=3D"http://blog.facilelogi=
n.com" target=3D"_blank">http://blog.facilelogin.com</a><br>
                                          <a href=3D"http://RampartFAQ.com"=
 target=3D"_blank">http://RampartFAQ.com</a></div>
                                      </div>
                                    </blockquote>
                                    <br>
                                  </div>
                                </div>
                              </div>
                            </blockquote>
                          </div>
                          <br>
                          <br clear=3D"all">
                          <div><br>
                          </div>
                          -- <br>
                          Thanks &amp; Regards,<br>
                          Prabath
                          <div><br>
                          </div>
                          <div>Mobile : <a href=3D"tel:%2B94%2071%20809%206=
732" value=3D"+94718096732" target=3D"_blank">+94
                              71 809 6732</a>=A0<br>
                            <br>
                            <a href=3D"http://blog.facilelogin.com" target=
=3D"_blank">http://blog.facilelogin.com</a><br>
                            <a href=3D"http://RampartFAQ.com" target=3D"_bl=
ank">http://RampartFAQ.com</a></div>
                        </div>
                      </blockquote>
                      <br>
                    </div>
                  </div>
                </div>
              </blockquote>
            </div>
            <br>
            <br clear=3D"all">
            <div><br>
            </div>
            -- <br>
            Thanks &amp; Regards,<br>
            Prabath
            <div><br>
            </div>
            <div>Mobile : <a href=3D"tel:%2B94%2071%20809%206732" value=3D"=
+94718096732" target=3D"_blank">+94 71 809 6732</a>=A0<br>
              <br>
              <a href=3D"http://blog.facilelogin.com" target=3D"_blank">htt=
p://blog.facilelogin.com</a><br>
              <a href=3D"http://RampartFAQ.com" target=3D"_blank">http://Ra=
mpartFAQ.com</a></div>
          </div>
        </div>
      </blockquote>
      <blockquote type=3D"cite">
        <div><span>_______________________________________________</span><b=
r>
          <span>OAuth mailing list</span><br>
          <span><a href=3D"mailto:OAuth@ietf.org" target=3D"_blank">OAuth@i=
etf.org</a></span><br>
          <span><a href=3D"https://www.ietf.org/mailman/listinfo/oauth" tar=
get=3D"_blank">https://www.ietf.org/mailman/listinfo/oauth</a></span><br>
        </div>
      </blockquote>
    </blockquote>
    <br>
  </div></div></div>

</blockquote></div><br><br clear=3D"all"><div><br></div>-- <br>Thanks &amp;=
 Regards,<br>Prabath<div><br></div><div>Mobile : +94 71 809 6732=A0<br><br>=
<a href=3D"http://blog.facilelogin.com" target=3D"_blank">http://blog.facil=
elogin.com</a><br>
<a href=3D"http://RampartFAQ.com" target=3D"_blank">http://RampartFAQ.com</=
a></div>
</div>

--047d7b621afc8372fb04d5893011--

From ve7jtb@ve7jtb.com  Tue Feb 12 08:20:43 2013
Return-Path: <ve7jtb@ve7jtb.com>
X-Original-To: oauth@ietfa.amsl.com
Delivered-To: oauth@ietfa.amsl.com
Received: from localhost (localhost [127.0.0.1]) by ietfa.amsl.com (Postfix) with ESMTP id 66FF821F8F7A for <oauth@ietfa.amsl.com>; Tue, 12 Feb 2013 08:20:43 -0800 (PST)
X-Virus-Scanned: amavisd-new at amsl.com
X-Spam-Flag: NO
X-Spam-Score: -2.864
X-Spam-Level: 
X-Spam-Status: No, score=-2.864 tagged_above=-999 required=5 tests=[AWL=0.135,  BAYES_00=-2.599, J_CHICKENPOX_82=0.6, RCVD_IN_DNSWL_LOW=-1]
Received: from mail.ietf.org ([64.170.98.30]) by localhost (ietfa.amsl.com [127.0.0.1]) (amavisd-new, port 10024) with ESMTP id cTVfvrek1qvT for <oauth@ietfa.amsl.com>; Tue, 12 Feb 2013 08:20:42 -0800 (PST)
Received: from mail-qe0-f52.google.com (mail-qe0-f52.google.com [209.85.128.52]) by ietfa.amsl.com (Postfix) with ESMTP id 4965721F8F6C for <oauth@ietf.org>; Tue, 12 Feb 2013 08:20:42 -0800 (PST)
Received: by mail-qe0-f52.google.com with SMTP id 6so116221qeb.11 for <oauth@ietf.org>; Tue, 12 Feb 2013 08:20:37 -0800 (PST)
X-Google-DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=google.com; s=20120113; h=x-received:content-type:mime-version:subject:from:in-reply-to:date :cc:content-transfer-encoding:message-id:references:to:x-mailer :x-gm-message-state; bh=+D6SVwsgVjjxYIhuD7vEwrSAn5IJ9H6hTz6JNcDjD8U=; b=bL+DbsBB9xWzTYbJIIV0s0+ifysusQhTyb0K3fXN0KrpsG0z+RXsEt4f9QdeGOPl+H C1DsLKNjOJV4J1tNjz8gY5vrhr2Rit4AWAr3EPeAv+gBUlveVn+y90WxKsRojnugIuni ZTygom4n/c4ACu1vdFIunsnX+45SqQozO81GD+N0tkr2UI6GLirO+exo/8xc2hYe/Yyd D2L13Jix20OPxUzmR9wSDASop9wL600vA4p9zzzzH15K7eEaT1AkIOJhExBKxVJarPbk GxCLzc+VafHSBagAb6LA+5rr8lkWSQgjkjPkOu4uDNlZON4DrOzr/oNEM7cKbo1CAE4h yt+g==
X-Received: by 10.49.127.145 with SMTP id ng17mr8045840qeb.25.1360686036701; Tue, 12 Feb 2013 08:20:36 -0800 (PST)
Received: from [192.168.1.213] (190-20-23-212.baf.movistar.cl. [190.20.23.212]) by mx.google.com with ESMTPS id o5sm16620858qao.12.2013.02.12.08.20.32 (version=TLSv1 cipher=ECDHE-RSA-RC4-SHA bits=128/128); Tue, 12 Feb 2013 08:20:35 -0800 (PST)
Content-Type: text/plain; charset=iso-8859-1
Mime-Version: 1.0 (Mac OS X Mail 6.2 \(1499\))
From: John Bradley <ve7jtb@ve7jtb.com>
In-Reply-To: <511A51D6.9040604@mitre.org>
Date: Tue, 12 Feb 2013 13:20:28 -0300
Content-Transfer-Encoding: quoted-printable
Message-Id: <9FC3A5CD-B4EC-4CA2-8082-FAC65C499B3B@ve7jtb.com>
References: <51195F3F.7000704@mitre.org> <4E1F6AAD24975D4BA5B16804296739436743E371@TK5EX14MBXC285.redmond.corp.microsoft.com> <7FB7A108-EA9E-429A-BD86-7E09EA206748@ve7jtb.com> <511A51D6.9040604@mitre.org>
To: Justin Richer <jricher@mitre.org>
X-Mailer: Apple Mail (2.1499)
X-Gm-Message-State: ALoCoQm4sukEqQce4mSZAStenrk9ADdWoX/Tjje6WuMXZFbN5p/JCGl/dLO/XLaNjNJ9Kx3NkOr4
Cc: "oauth@ietf.org" <oauth@ietf.org>
Subject: Re: [OAUTH-WG] Registration: Client secret rotation
X-BeenThere: oauth@ietf.org
X-Mailman-Version: 2.1.12
Precedence: list
List-Id: OAUTH WG <oauth.ietf.org>
List-Unsubscribe: <https://www.ietf.org/mailman/options/oauth>, <mailto:oauth-request@ietf.org?subject=unsubscribe>
List-Archive: <http://www.ietf.org/mail-archive/web/oauth>
List-Post: <mailto:oauth@ietf.org>
List-Help: <mailto:oauth-request@ietf.org?subject=help>
List-Subscribe: <https://www.ietf.org/mailman/listinfo/oauth>, <mailto:oauth-request@ietf.org?subject=subscribe>
X-List-Received-Date: Tue, 12 Feb 2013 16:20:43 -0000

Yes, that agrees with my thoughts on it.

John B.
On 2013-02-12, at 11:29 AM, Justin Richer <jricher@mitre.org> wrote:

> This is actually the approach that I favor now as well -- let the =
server do the secret rotation if it wants to, and have the client be =
prepared to receive a new client_secret or registration_access_token on =
any read or update request.
>=20
> This would necessitate changing the returned values, essentially =
collapsing the returns from the read/update and rotate actions into one =
structure that's closer to the one returned from initial registration. =
This has the added benefit of parallelizing the responses for these =
three actions, which I like as well.
>=20
> -- Justin
>=20
> On 02/11/2013 08:42 PM, John Bradley wrote:
>> OAuth doesn't say anything about client secrets other than they are =
provisioned in a magic realm outside the OAuth spec (Getting in the mood =
for the next IETF).
>>=20
>> Rotating client secrets was something I made up for connect because =
it seemed like a good idea at the time given that someone breaking in to =
the registration endpoint could take over a connection.
>>=20
>> We later separated the authentication to the token endpoint from the =
registration endpoint,in what I think was a good move.
>>=20
>> It is sort of up to the authorization server to make decisions about =
rotating client secrets, I expect that in the real world a client would =
try access ing the token endpoint and get back a invalid_client error =
response and then heck it's registration to see if the client_secret has =
changed.
>>=20
>> I suppose that a client could request rotating its secret if it =
thinks it has been compromised,  however the compromiser is more likely =
to quickly change the secret to lock out the legitimate clients before =
the good one notices.    I think the client wanting to rotate is enough =
of a edge case that it could deal with it out of band.
>>=20
>> Letting the server rotate the client secret according to what ever =
policy it decides is best is probably safest.
>>=20
>> We didn't have anything for rotating the access token.  I suspect =
that rotating it under the clients control is going to create as many =
problems as it solves.
>>=20
>> If you want to rotate it,  make it a refresh token that is issues and =
use OAuth to provide access tokens from the token endpoint.   Creating a =
new endpoint to duplicate existing OAuth functionality is overkill.
>>=20
>> John B.
>> On 2013-02-11, at 10:18 PM, Mike Jones <Michael.Jones@microsoft.com> =
wrote:
>>=20
>>> The rotate_secret operation was added to OpenID Connect Registration =
as a workaround to the fact that registration updates used to be =
authenticated using the client secret, so it seemed overly dangerous to =
have an update operation potentially return an updated secret and have =
the secret be lost due to communication problems - leaving the client =
stranded.  Since then, registration was changed to use a bearer token to =
authenticate update operations, and so this failure mode can't occur =
anymore.  It was an omission not to have deleted the unneeded operation =
then.
>>>=20
>>> It's been deleted from OpenID Connect Registration and should =
likewise be deleted from OAuth registration, since it is unneeded.  If a =
new client secret is needed, there's nothing stopping the registration =
server from returning it in the result of an update operation.
>>>=20
>>> 				-- Mike
>>>=20
>>> -----Original Message-----
>>> From: oauth-bounces@ietf.org [mailto:oauth-bounces@ietf.org] On =
Behalf Of Justin Richer
>>> Sent: Monday, February 11, 2013 1:15 PM
>>> To: oauth@ietf.org
>>> Subject: [OAUTH-WG] Registration: Client secret rotation
>>>=20
>>> Draft -05 of OAuth Dynamic Client Registration [1] defines a means =
of the client requesting a new client_secret (if applicable) and a new =
registration_access_token. Client secrets MAY expire after some period =
of time, and this method allows for a refresh of that secret. Draft -00 =
defined no such operation, drafts -01 through -04 defined this operation =
in terms of the operation=3Drotate_secret parameter, and draft -05 =
defines it through a secondary endpoint, the Client Secret Rotation =
Endpoint.
>>> This raises several questions:
>>>=20
>>>  - Should the client be allowed to request rotation of its secret?
>>>  - Would a client ever take this action of its own accord?
>>>  - Can a server rotate the secret of the client without the client =
asking? (This seems to be an obvious "yes")
>>>=20
>>> Alternatives that keep this functionality include defining the =
rotate_secret operation in terms of an HTTP verb, a query parameter, or =
separate endpoint. Alternatively, we could drop the rotate_secret =
operation all together. If we do this, we have to decide if the client =
secret can still expire. If it can, then we need a way for the client to =
get this new secret through a means that doesn't require it to request a =
change in secret, such as sending it back as part of the client READ =
operation (see other thread on RESTful verbs).
>>>=20
>>>  -- Justin
>>>=20
>>>=20
>>> [1] http://tools.ietf.org/html/draft-ietf-oauth-dyn-reg-05
>>> _______________________________________________
>>> OAuth mailing list
>>> OAuth@ietf.org
>>> https://www.ietf.org/mailman/listinfo/oauth
>>> _______________________________________________
>>> OAuth mailing list
>>> OAuth@ietf.org
>>> https://www.ietf.org/mailman/listinfo/oauth
>=20


From jricher@mitre.org  Tue Feb 12 08:23:21 2013
Return-Path: <jricher@mitre.org>
X-Original-To: oauth@ietfa.amsl.com
Delivered-To: oauth@ietfa.amsl.com
Received: from localhost (localhost [127.0.0.1]) by ietfa.amsl.com (Postfix) with ESMTP id CC64321F8F58 for <oauth@ietfa.amsl.com>; Tue, 12 Feb 2013 08:23:19 -0800 (PST)
X-Virus-Scanned: amavisd-new at amsl.com
X-Spam-Flag: NO
X-Spam-Score: -6.571
X-Spam-Level: 
X-Spam-Status: No, score=-6.571 tagged_above=-999 required=5 tests=[AWL=0.027,  BAYES_00=-2.599, HTML_MESSAGE=0.001, RCVD_IN_DNSWL_MED=-4]
Received: from mail.ietf.org ([64.170.98.30]) by localhost (ietfa.amsl.com [127.0.0.1]) (amavisd-new, port 10024) with ESMTP id 5T1T8ZggaN2L for <oauth@ietfa.amsl.com>; Tue, 12 Feb 2013 08:23:18 -0800 (PST)
Received: from smtpksrv1.mitre.org (smtpksrv1.mitre.org [198.49.146.77]) by ietfa.amsl.com (Postfix) with ESMTP id A78E221F8F3E for <oauth@ietf.org>; Tue, 12 Feb 2013 08:23:17 -0800 (PST)
Received: from smtpksrv1.mitre.org (localhost.localdomain [127.0.0.1]) by localhost (Postfix) with SMTP id 224DA5310839; Tue, 12 Feb 2013 11:23:17 -0500 (EST)
Received: from IMCCAS04.MITRE.ORG (imccas04.mitre.org [129.83.29.81]) by smtpksrv1.mitre.org (Postfix) with ESMTP id E4067435028F; Tue, 12 Feb 2013 11:23:16 -0500 (EST)
Received: from [10.146.15.29] (129.83.31.58) by IMCCAS04.MITRE.ORG (129.83.29.81) with Microsoft SMTP Server (TLS) id 14.2.318.4; Tue, 12 Feb 2013 11:23:16 -0500
Message-ID: <511A6C49.50801@mitre.org>
Date: Tue, 12 Feb 2013 11:22:33 -0500
From: Justin Richer <jricher@mitre.org>
User-Agent: Mozilla/5.0 (X11; Linux i686; rv:17.0) Gecko/20130106 Thunderbird/17.0.2
MIME-Version: 1.0
To: John Bradley <ve7jtb@ve7jtb.com>
References: <51195F3D.1050006@mitre.org> <222C28CB-7F6F-4BC3-8692-40404C2DC2D3@maymount.com> <511A50C7.8080102@mitre.org> <B256FD2D-5ED7-4306-A3BF-E6A196862B2E@ve7jtb.com>
In-Reply-To: <B256FD2D-5ED7-4306-A3BF-E6A196862B2E@ve7jtb.com>
Content-Type: multipart/alternative; boundary="------------060302090908010409030908"
X-Originating-IP: [129.83.31.58]
Cc: "oauth@ietf.org" <oauth@ietf.org>
Subject: Re: [OAUTH-WG] Registration: HAL _links structure and client self-URL
X-BeenThere: oauth@ietf.org
X-Mailman-Version: 2.1.12
Precedence: list
List-Id: OAUTH WG <oauth.ietf.org>
List-Unsubscribe: <https://www.ietf.org/mailman/options/oauth>, <mailto:oauth-request@ietf.org?subject=unsubscribe>
List-Archive: <http://www.ietf.org/mail-archive/web/oauth>
List-Post: <mailto:oauth@ietf.org>
List-Help: <mailto:oauth-request@ietf.org?subject=help>
List-Subscribe: <https://www.ietf.org/mailman/listinfo/oauth>, <mailto:oauth-request@ietf.org?subject=subscribe>
X-List-Received-Date: Tue, 12 Feb 2013 16:23:21 -0000

--------------060302090908010409030908
Content-Type: text/plain; charset="ISO-8859-1"; format=flowed
Content-Transfer-Encoding: 7bit

Agreed - I didn't think that header-only was the proposal, but let's be 
explicit about the returned body always containing the URL. The way I 
read the 201 definition, it suggests (SHOULD) that you use the location 
header, but also says that the entity should refer to the new resource. 
It was my assumption that the returned JSON would still have some form 
of client-entity management URL (whether it's the HAL _links structure 
or registration_management_url or something else is still up for debate).

  -- Justin


On 02/12/2013 10:28 AM, John Bradley wrote:
> Returning a location header in the 201 ids fine as long as we also 
> have the same info as a claim.
>
> I think most clients will want to process the JSON and store all the 
> parameters together.  Making them fish out a header makes the W3C 
> happy and is the correct thing to do but taking it from a claim is 
> what developers are more comfortable with.
>
> John B.
>
> On 2013-02-12, at 11:25 AM, Justin Richer <jricher@mitre.org 
> <mailto:jricher@mitre.org>> wrote:
>
>> I'd be fine with the return from a creation request being a 201 
>> instead of a 200.
>>
>>  -- Justin
>>
>> On 02/11/2013 06:33 PM, Richard Harrington wrote:
>>> Since the request is an HTTP POST and a resource is created 
>>> (http://www.w3.org/Protocols/rfc2616/rfc2616-sec9.html#sec9.5) the 
>>> response should be an HTTP 201 Created 
>>> (http://www.w3.org/Protocols/rfc2616/rfc2616-sec10.html#sec10.2.2) 
>>> which is supposed to include the location of the newly created resource.
>>>
>>> This is a good pattern to follow since, as you say, it does provide 
>>> flexibility.
>>>
>>>
>>>
>>> On Feb 11, 2013, at 1:14 PM, Justin Richer <jricher@mitre.org 
>>> <mailto:jricher@mitre.org>> wrote:
>>>
>>>> Draft -05 of OAuth Dynamic Client Registration [1] returns a URL 
>>>> pointer for the client to perform update and secret rotation 
>>>> actions. This functionality arose from discussions on the list 
>>>> about moving towards a more RESTful pattern, and Nat Sakimura 
>>>> proposed this approach in the OpenID Connect Working Group. This 
>>>> URL may be distinct from the Client Registration Endpoint URL, but 
>>>> draft -05 makes no promises as to its content, form, or structure, 
>>>> though it does contain implementor's notes on possible methods.
>>>>
>>>> Two questions arise from this change:
>>>> - The semantics of returning the client manipulation URL
>>>> - The syntax (derived from HAL for JSON [2], an individual I-D 
>>>> submission)
>>>>
>>>> On semantics:
>>>>
>>>> Pro:
>>>> - The server has flexibility on how to define the "update" 
>>>> endpoint, sending all clients to one URL, sending different clients 
>>>> to different URLs, or sending clients to a URL with a baked-in 
>>>> query parameter
>>>> - The client can take the URL as-is and use it for all management 
>>>> operations (ie, it doesn't have to generate or compose the URL 
>>>> based on component parts)
>>>>
>>>> Con:
>>>> - The client must remember one more piece of information from the 
>>>> server at runtime if it wants to do manipulation and management of 
>>>> itself at the server (in addition to client_id, client_secret, 
>>>> registration_access_token, and others)
>>>>
>>>> Alternatives include specifying a URL pattern for the server to use 
>>>> and all clients to follow, specifying a query parameter for the 
>>>> update action, and specifying a separate endpoint entirely and 
>>>> using the presence of items such as client_id and the registration 
>>>> access token to differentiate the requests. Note that *all* of 
>>>> these alternatives can be accommodated using the semantics 
>>>> described above, with the same actions on the client's part.
>>>>
>>>>
>>>> On syntax:
>>>>
>>>> Pro:
>>>> - Follows the designs of RFC5988 for link relations
>>>> - The HAL format is general, and allows for all kinds of other 
>>>> information to be placed inside the _links structure
>>>> - Allows for full use of the JSON object to specify advanced 
>>>> operations on the returned endpoint if desired
>>>>
>>>> Con:
>>>> - The rest of OAuth doesn't follow link relation guidelines (though 
>>>> it's been brought up)
>>>> - The HAL format is general, and allows for all kinds of other 
>>>> information to be placed inside the _links structure
>>>> - The HAL-JSON document is an expired individual I-D, and it's 
>>>> unclear what wider adoption looks like right now
>>>>
>>>> Alternatives include returning the URL as a separate data member 
>>>> (registration_update_url), using HTTP headers, or using JSON Schema.
>>>>
>>>> -- Justin
>>>>
>>>>
>>>>
>>>> [1] http://tools.ietf.org/html/draft-ietf-oauth-dyn-reg-05
>>>> [2] http://tools.ietf.org/html/draft-kelly-json-hal-03
>>>> _______________________________________________
>>>> OAuth mailing list
>>>> OAuth@ietf.org <mailto:OAuth@ietf.org>
>>>> https://www.ietf.org/mailman/listinfo/oauth
>>
>> _______________________________________________
>> OAuth mailing list
>> OAuth@ietf.org <mailto:OAuth@ietf.org>
>> https://www.ietf.org/mailman/listinfo/oauth
>


--------------060302090908010409030908
Content-Type: text/html; charset="ISO-8859-1"
Content-Transfer-Encoding: 7bit

<html>
  <head>
    <meta content="text/html; charset=ISO-8859-1"
      http-equiv="Content-Type">
  </head>
  <body bgcolor="#FFFFFF" text="#000000">
    Agreed - I didn't think that header-only was the proposal, but let's
    be explicit about the returned body always containing the URL. The
    way I read the 201 definition, it suggests (SHOULD) that you use the
    location header, but also says that the entity should refer to the
    new resource. It was my assumption that the returned JSON would
    still have some form of client-entity management URL (whether it's
    the HAL _links structure or registration_management_url or something
    else is still up for debate). <br>
    <br>
    &nbsp;-- Justin<br>
    <br>
    <br>
    <div class="moz-cite-prefix">On 02/12/2013 10:28 AM, John Bradley
      wrote:<br>
    </div>
    <blockquote
      cite="mid:B256FD2D-5ED7-4306-A3BF-E6A196862B2E@ve7jtb.com"
      type="cite">
      <meta http-equiv="Content-Type" content="text/html;
        charset=ISO-8859-1">
      <div>Returning a location header in the 201 ids fine as long as we
        also have the same info as a claim.</div>
      <div><br>
      </div>
      <div>I think most clients will want to process the JSON and store
        all the parameters together. &nbsp;Making them fish out a header
        makes the W3C happy and is the correct thing to do but taking it
        from a claim is what developers are more comfortable with.</div>
      <div><br>
      </div>
      <div>John B.</div>
      <div><br>
        <div>
          <div>On 2013-02-12, at 11:25 AM, Justin Richer &lt;<a
              moz-do-not-send="true" href="mailto:jricher@mitre.org">jricher@mitre.org</a>&gt;
            wrote:</div>
          <br class="Apple-interchange-newline">
          <blockquote type="cite">
            <div bgcolor="#FFFFFF" text="#000000"> I'd be fine with the
              return from a creation request being a 201 instead of a
              200. <br>
              <br>
              &nbsp;-- Justin<br>
              <br>
              <div class="moz-cite-prefix">On 02/11/2013 06:33 PM,
                Richard Harrington wrote:<br>
              </div>
              <blockquote
                cite="mid:222C28CB-7F6F-4BC3-8692-40404C2DC2D3@maymount.com"
                type="cite">
                <div>Since the request is an HTTP POST and a resource is
                  created (<span style="font-family: '.HelveticaNeueUI';
                    font-size: 15px; line-height: 19px; white-space:
                    nowrap; -webkit-tap-highlight-color: rgba(26, 26,
                    26, 0.292969); -webkit-composition-fill-color:
                    rgba(175, 192, 227, 0.230469);
                    -webkit-composition-frame-color: rgba(77, 128, 180,
                    0.230469); -webkit-text-size-adjust: none; "><a
                      moz-do-not-send="true"
                      href="http://www.w3.org/Protocols/rfc2616/rfc2616-sec9.html#sec9.5">http://www.w3.org/Protocols/rfc2616/rfc2616-sec9.html#sec9.5</a>)&nbsp;</span><span
                    style="font-family: '.HelveticaNeueUI'; font-size:
                    15px; line-height: 19px; white-space: nowrap;
                    -webkit-tap-highlight-color: rgba(26, 26, 26,
                    0.292969); -webkit-composition-fill-color: rgba(175,
                    192, 227, 0.230469);
                    -webkit-composition-frame-color: rgba(77, 128, 180,
                    0.230469); -webkit-text-size-adjust: none; ">the
                    response should be an HTTP 201 Created&nbsp;</span><span
                    style="font-family: '.HelveticaNeueUI'; font-size:
                    15px; line-height: 19px; white-space: nowrap;
                    -webkit-tap-highlight-color: rgba(26, 26, 26,
                    0.292969); -webkit-composition-fill-color: rgba(175,
                    192, 227, 0.230469);
                    -webkit-composition-frame-color: rgba(77, 128, 180,
                    0.230469); -webkit-text-size-adjust: none; ">(<a
                      moz-do-not-send="true"
                      href="http://www.w3.org/Protocols/rfc2616/rfc2616-sec10.html#sec10.2.2">http://www.w3.org/Protocols/rfc2616/rfc2616-sec10.html#sec10.2.2</a>)&nbsp;</span><span
                    style="font-family: '.HelveticaNeueUI'; font-size:
                    15px; line-height: 19px; white-space: nowrap;
                    -webkit-tap-highlight-color: rgba(26, 26, 26,
                    0.292969); -webkit-composition-fill-color: rgba(175,
                    192, 227, 0.230469);
                    -webkit-composition-frame-color: rgba(77, 128, 180,
                    0.230469); -webkit-text-size-adjust: none; ">which
                    is supposed to include the location of the newly
                    created resource.</span></div>
                <div><span style="font-family: '.HelveticaNeueUI';
                    font-size: 15px; line-height: 19px; white-space:
                    nowrap; -webkit-tap-highlight-color: rgba(26, 26,
                    26, 0.292969); -webkit-composition-fill-color:
                    rgba(175, 192, 227, 0.230469);
                    -webkit-composition-frame-color: rgba(77, 128, 180,
                    0.230469); -webkit-text-size-adjust: none; "><br>
                  </span></div>
                <div><span style="font-family: '.HelveticaNeueUI';
                    font-size: 15px; line-height: 19px; white-space:
                    nowrap; -webkit-tap-highlight-color: rgba(26, 26,
                    26, 0.292969); -webkit-composition-fill-color:
                    rgba(175, 192, 227, 0.230469);
                    -webkit-composition-frame-color: rgba(77, 128, 180,
                    0.230469); -webkit-text-size-adjust: none; ">This is
                    a good pattern to follow since, as you say, it does
                    provide flexibility.</span></div>
                <div><span style="font-family: '.HelveticaNeueUI';
                    font-size: 15px; line-height: 19px; white-space:
                    nowrap; -webkit-tap-highlight-color: rgba(26, 26,
                    26, 0.292969); -webkit-composition-fill-color:
                    rgba(175, 192, 227, 0.230469);
                    -webkit-composition-frame-color: rgba(77, 128, 180,
                    0.230469); -webkit-text-size-adjust: none; "><br>
                  </span></div>
                <div><span style="font-family: '.HelveticaNeueUI';
                    font-size: 15px; line-height: 19px; white-space:
                    nowrap; -webkit-tap-highlight-color: rgba(26, 26,
                    26, 0.292969); -webkit-composition-fill-color:
                    rgba(175, 192, 227, 0.230469);
                    -webkit-composition-frame-color: rgba(77, 128, 180,
                    0.230469); -webkit-text-size-adjust: none; "><br>
                  </span></div>
                <div><br>
                  On Feb 11, 2013, at 1:14 PM, Justin Richer &lt;<a
                    moz-do-not-send="true"
                    href="mailto:jricher@mitre.org">jricher@mitre.org</a>&gt;

                  wrote:<br>
                  <br>
                </div>
                <blockquote type="cite">
                  <div><span>Draft -05 of OAuth Dynamic Client
                      Registration [1] returns a URL pointer for the
                      client to perform update and secret rotation
                      actions. This functionality arose from discussions
                      on the list about moving towards a more RESTful
                      pattern, and Nat Sakimura proposed this approach
                      in the OpenID Connect Working Group. This URL may
                      be distinct from the Client Registration Endpoint
                      URL, but draft -05 makes no promises as to its
                      content, form, or structure, though it does
                      contain implementor's notes on possible methods.</span><br>
                    <span></span><br>
                    <span>Two questions arise from this change:</span><br>
                    <span> - The semantics of returning the client
                      manipulation URL</span><br>
                    <span> - The syntax (derived from HAL for JSON [2],
                      an individual I-D submission)</span><br>
                    <span></span><br>
                    <span>On semantics:</span><br>
                    <span></span><br>
                    <span>Pro:</span><br>
                    <span> - The server has flexibility on how to define
                      the "update" endpoint, sending all clients to one
                      URL, sending different clients to different URLs,
                      or sending clients to a URL with a baked-in query
                      parameter</span><br>
                    <span> - The client can take the URL as-is and use
                      it for all management operations (ie, it doesn't
                      have to generate or compose the URL based on
                      component parts)</span><br>
                    <span></span><br>
                    <span>Con:</span><br>
                    <span> - The client must remember one more piece of
                      information from the server at runtime if it wants
                      to do manipulation and management of itself at the
                      server (in addition to client_id, client_secret,
                      registration_access_token, and others)</span><br>
                    <span></span><br>
                    <span>Alternatives include specifying a URL pattern
                      for the server to use and all clients to follow,
                      specifying a query parameter for the update
                      action, and specifying a separate endpoint
                      entirely and using the presence of items such as
                      client_id and the registration access token to
                      differentiate the requests. Note that *all* of
                      these alternatives can be accommodated using the
                      semantics described above, with the same actions
                      on the client's part.</span><br>
                    <span></span><br>
                    <span></span><br>
                    <span>On syntax:</span><br>
                    <span></span><br>
                    <span>Pro:</span><br>
                    <span> - Follows the designs of RFC5988 for link
                      relations</span><br>
                    <span> - The HAL format is general, and allows for
                      all kinds of other information to be placed inside
                      the _links structure</span><br>
                    <span> - Allows for full use of the JSON object to
                      specify advanced operations on the returned
                      endpoint if desired</span><br>
                    <span></span><br>
                    <span>Con:</span><br>
                    <span> - The rest of OAuth doesn't follow link
                      relation guidelines (though it's been brought up)</span><br>
                    <span> - The HAL format is general, and allows for
                      all kinds of other information to be placed inside
                      the _links structure</span><br>
                    <span> - The HAL-JSON document is an expired
                      individual I-D, and it's unclear what wider
                      adoption looks like right now</span><br>
                    <span></span><br>
                    <span>Alternatives include returning the URL as a
                      separate data member (registration_update_url),
                      using HTTP headers, or using JSON Schema.</span><br>
                    <span></span><br>
                    <span> -- Justin</span><br>
                    <span></span><br>
                    <span></span><br>
                    <span></span><br>
                    <span>[1] <a moz-do-not-send="true"
                        href="http://tools.ietf.org/html/draft-ietf-oauth-dyn-reg-05">http://tools.ietf.org/html/draft-ietf-oauth-dyn-reg-05</a></span><br>
                    <span>[2] <a moz-do-not-send="true"
                        href="http://tools.ietf.org/html/draft-kelly-json-hal-03">http://tools.ietf.org/html/draft-kelly-json-hal-03</a></span><br>
                    <span>_______________________________________________</span><br>
                    <span>OAuth mailing list</span><br>
                    <span><a moz-do-not-send="true"
                        href="mailto:OAuth@ietf.org">OAuth@ietf.org</a></span><br>
                    <span><a moz-do-not-send="true"
                        href="https://www.ietf.org/mailman/listinfo/oauth">https://www.ietf.org/mailman/listinfo/oauth</a></span><br>
                  </div>
                </blockquote>
              </blockquote>
              <br>
            </div>
            _______________________________________________<br>
            OAuth mailing list<br>
            <a moz-do-not-send="true" href="mailto:OAuth@ietf.org">OAuth@ietf.org</a><br>
            <a class="moz-txt-link-freetext" href="https://www.ietf.org/mailman/listinfo/oauth">https://www.ietf.org/mailman/listinfo/oauth</a><br>
          </blockquote>
        </div>
        <br>
      </div>
    </blockquote>
    <br>
  </body>
</html>

--------------060302090908010409030908--

From ve7jtb@ve7jtb.com  Tue Feb 12 08:30:49 2013
Return-Path: <ve7jtb@ve7jtb.com>
X-Original-To: oauth@ietfa.amsl.com
Delivered-To: oauth@ietfa.amsl.com
Received: from localhost (localhost [127.0.0.1]) by ietfa.amsl.com (Postfix) with ESMTP id 95D2121F8F7E for <oauth@ietfa.amsl.com>; Tue, 12 Feb 2013 08:30:49 -0800 (PST)
X-Virus-Scanned: amavisd-new at amsl.com
X-Spam-Flag: NO
X-Spam-Score: -3.174
X-Spam-Level: 
X-Spam-Status: No, score=-3.174 tagged_above=-999 required=5 tests=[AWL=0.425,  BAYES_00=-2.599, RCVD_IN_DNSWL_LOW=-1]
Received: from mail.ietf.org ([64.170.98.30]) by localhost (ietfa.amsl.com [127.0.0.1]) (amavisd-new, port 10024) with ESMTP id IMqlSdMTAHkz for <oauth@ietfa.amsl.com>; Tue, 12 Feb 2013 08:30:48 -0800 (PST)
Received: from mail-qc0-f180.google.com (mail-qc0-f180.google.com [209.85.216.180]) by ietfa.amsl.com (Postfix) with ESMTP id 9A5A921F8F4E for <oauth@ietf.org>; Tue, 12 Feb 2013 08:30:48 -0800 (PST)
Received: by mail-qc0-f180.google.com with SMTP id v28so94529qcm.39 for <oauth@ietf.org>; Tue, 12 Feb 2013 08:30:43 -0800 (PST)
X-Google-DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=google.com; s=20120113; h=x-received:content-type:mime-version:subject:from:in-reply-to:date :cc:content-transfer-encoding:message-id:references:to:x-mailer :x-gm-message-state; bh=I/O8RaePt6fEwbg35ZDCoaLzr2DLsc5YM2zVnygm96U=; b=gMwih/m68Kt29brWdbJ3YNU5ufpnU1OYbVNZjhdLQyk9//IVc7vV/wPEfhQAm/De9v KeyDw86YshM+B1ISwU4GcffmXib+mgGarltWRF7ACfSPJhnA86Cd0tZw7smkEaF8d7UU 35I5LyyZilQp7GNZLXWIgbYyi7EzFqEyCATuIwu7u6ZzfwYC/x1ArFblWsD1A2cdmtq5 w0HpU0Cqqve6/dxGIXd4gDaRH4xRDF+4bKwQ095yiGTuQ1sSduHhk8unJpAcL3U3XgJr X6PpK707DsHw+VpFpywpXEUaGWTn8PNCbMT4JAkktcbLYcqWgbBW2PmdYlMCojAMnSyx 9Ftw==
X-Received: by 10.229.111.130 with SMTP id s2mr1717887qcp.91.1360686643606; Tue, 12 Feb 2013 08:30:43 -0800 (PST)
Received: from [192.168.1.213] (190-20-23-212.baf.movistar.cl. [190.20.23.212]) by mx.google.com with ESMTPS id dg4sm16630151qab.7.2013.02.12.08.30.39 (version=TLSv1 cipher=ECDHE-RSA-RC4-SHA bits=128/128); Tue, 12 Feb 2013 08:30:42 -0800 (PST)
Content-Type: text/plain; charset=iso-8859-1
Mime-Version: 1.0 (Mac OS X Mail 6.2 \(1499\))
From: John Bradley <ve7jtb@ve7jtb.com>
In-Reply-To: <511A5742.30707@mitre.org>
Date: Tue, 12 Feb 2013 13:30:36 -0300
Content-Transfer-Encoding: quoted-printable
Message-Id: <B054D3FD-B4F6-4C57-8ED3-402F936DE17F@ve7jtb.com>
References: <51195F36.6040705@mitre.org> <780F8C26-19A4-4301-B350-307D9FFF69CD@ve7jtb.com> <80727F20-A830-4778-B11C-D45389310646@lodderstedt.net> <511A5742.30707@mitre.org>
To: Justin Richer <jricher@mitre.org>
X-Mailer: Apple Mail (2.1499)
X-Gm-Message-State: ALoCoQmlImv6b9tPG+fkGUJJ9S/fuq1m3zgjThe6Z2/4VXCwShJhjmTbiROA3x7rfrP6JZZjqGY9
Cc: "oauth@ietf.org" <oauth@ietf.org>
Subject: Re: [OAUTH-WG] Registration: RESTful client lifecycle management
X-BeenThere: oauth@ietf.org
X-Mailman-Version: 2.1.12
Precedence: list
List-Id: OAUTH WG <oauth.ietf.org>
List-Unsubscribe: <https://www.ietf.org/mailman/options/oauth>, <mailto:oauth-request@ietf.org?subject=unsubscribe>
List-Archive: <http://www.ietf.org/mail-archive/web/oauth>
List-Post: <mailto:oauth@ietf.org>
List-Help: <mailto:oauth-request@ietf.org?subject=help>
List-Subscribe: <https://www.ietf.org/mailman/listinfo/oauth>, <mailto:oauth-request@ietf.org?subject=subscribe>
X-List-Received-Date: Tue, 12 Feb 2013 16:30:49 -0000

To some extent we want the server to have the flexibility it needs.

If the server knows it is going to need client_id for GET it needs to =
encode it in the resource URI ether as part of the path or as a query =
parameter (that is up to the server)

When doing updates the client MUST include the client_id as an =
additional integrity check.  Some servers may switch on that but that is =
up to them.

If we want incremental replace (not resetting claims not sent to there =
defaults) then we need POST for update. =20
I think if you want to do the REST thing and be pure about PUT it needs =
to reset all values not sent to there defaults.

I suppose we could have both but two ways of doing it leads to =
confusion.

John B.

On 2013-02-12, at 11:52 AM, Justin Richer <jricher@mitre.org> wrote:

> The problem that I have with "always including the client_id" is =
*where* to include it. Are we talking a query parameter, URI template, =
or somewhere in the request body? The latter will only work for POST and =
PUT, so it's out of the question to support GET and DELETE using that =
semantic. I think we should support all operations using parallel syntax =
-- that's just good API design.
>=20
> I *really* don't like the idea of switching the action solely based on =
whether or not the client_id is present in the request body of a POST. =
This is a side-effectful mode switch, and it will only lead to pain and =
misery. Additionally, if the input is JSON (separate discussion), then a =
server would have to parse the JSON body before knowing where to route =
the request. In most web development frameworks that I've used, this is =
impossible. A query parameter or URL pattern, on the other hand, is =
doable.
>=20
> As it stands right now, a server is free to include the client_id in =
the "update/management" URL that it returns as part of the _link =
structure (separate discussion). The current text goes as far as =
recommending that practice, but doesn't take the step of requiring it in =
any form, and leaving it up to the server to decide what form it takes. =
If a server can route better with a query parameter, it'll return a URL =
to the client that has a client_id=3D query parameter. If a server would =
rather use a path component with the client_id, it can do that, too. If =
it wants to put everything on one URL and differentiate through the =
request body or presence/absence of the registration_access_token, it =
can always return the same URL to every client. I think that's nuts, but =
you can do it. Interoperability is preserved because the client simply =
follows the returned URL to do its bits and pieces, and it doesn't ever =
have to create or compose this URL from component parts.
>=20
> I want to continue to distinguish between the POST and PUT operations =
for create and update, respectively. This is a common pattern and the =
one described in the original REST thesis that described the =
architectural style. I'll also bring up that the semantics of PUT are =
intended to be "replace all", which is what you had originally argued =
for in the update case as well. I not convinced that developers of today =
can't handle HTTP verbs like PUT if they want to do fancier operations =
like updates. Note that the core operations, create and read, remain as =
POST and GET, which would be well within the grasp of every library and =
web developer today.
>=20
> -- Justin
>=20
> On 02/12/2013 02:23 AM, Torsten Lodderstedt wrote:
>> +1 for always including the client_id
>>=20
>> As John pointed out, there could be different entities updating =
client data. Then one has to distinguish the resource and the =
credential.
>>=20
>> Am 12.02.2013 um 02:51 schrieb John Bradley <ve7jtb@ve7jtb.com>:
>>=20
>>> I would always include the client_id on update.
>>>=20
>>> I think it is also us full to have other tokens used at the update =
endpoint.  I can see the master token used to update all the clients it =
has registered as part of API management.
>>> Relying on the registration_access_token is probably a design that =
will cause trouble down the road.
>>>=20
>>> I think GET and POST are relatively clear.   I don't know about =
expelling PUT to developers.  I think POST with a client_id to a =
(separate discussion) update_uri works without restricting it to PUT.
>>>=20
>>> I think DELETE needs to be better understood.   I think a status =
that can be set for client lifecycle is better than letting a client =
delete a entry.
>>> In some cases there will be more than one instance of a client and =
letting them know they have been turned off for a reason is better than =
making there registration disappear.
>>> So for the moment I would levee out DELETE.
>>>=20
>>> John B.
>>>=20
>>> On 2013-02-11, at 6:14 PM, Justin Richer <jricher@mitre.org> wrote:
>>>=20
>>>> Draft -05 of OAuth Dynamic Client Registration [1] defines several =
operations that the client can take on its behalf as part of the =
registration process. These boil down to the basic CRUD operations that =
you find in many APIs: Create, Read, Update, Delete. Draft -00 defined =
only the "Create" operation, draft -01 through -04 added the "Update" =
operation, switched using the "operation=3D" parameter.
>>>>=20
>>>> Following several suggestions to do so on the list, the -05 draft =
defines these operations in terms of a RESTful API for the client. =
Namely:
>>>>=20
>>>> - HTTP POST to registration endpoint =3D> Create (register) a new =
client
>>>> - HTTP PUT to update endpoint (with registration_access_token) =3D> =
Update the registered information for this client
>>>> - HTTP GET to update endpoint (with registration_access_token) =3D> =
read the registered information for this client
>>>> - HTTP DELETE to update endpoint (with registration_access_token) =
=3D> Delete (unregister/de-provision) this client
>>>>=20
>>>> The two main issues at stake here are: the addition of the READ and =
DELETE methods, and the use of HTTP verbs following a RESTful design =
philosophy.
>>>>=20
>>>> Pro:
>>>> - RESTful APIs (with HTTP verbs to differentiate functionality) are =
the norm today
>>>> - Full lifecycle management is common and is going to be expected =
by many users of this protocol in the wild
>>>>=20
>>>> Cons:
>>>> - Update semantics are still under debate (full replace? patch?)
>>>> - Somewhat increased complexity on the server to support all =
operations
>>>> - Client has to understand all HTTP verbs for full access (though =
plain registration is just POST)
>>>>=20
>>>>=20
>>>> Alternatives include using an operational switch parameter (like =
the old drafts), defining separate endpoints for every action, or doing =
all operations on a single endpoint using verbs to switch.
>>>>=20
>>>> -- Justin
>>>>=20
>>>> [1] http://tools.ietf.org/html/draft-ietf-oauth-dyn-reg-05
>>>> _______________________________________________
>>>> OAuth mailing list
>>>> OAuth@ietf.org
>>>> https://www.ietf.org/mailman/listinfo/oauth
>>> _______________________________________________
>>> OAuth mailing list
>>> OAuth@ietf.org
>>> https://www.ietf.org/mailman/listinfo/oauth
>=20


From jricher@mitre.org  Tue Feb 12 08:40:44 2013
Return-Path: <jricher@mitre.org>
X-Original-To: oauth@ietfa.amsl.com
Delivered-To: oauth@ietfa.amsl.com
Received: from localhost (localhost [127.0.0.1]) by ietfa.amsl.com (Postfix) with ESMTP id 9D6C221F8F73 for <oauth@ietfa.amsl.com>; Tue, 12 Feb 2013 08:40:44 -0800 (PST)
X-Virus-Scanned: amavisd-new at amsl.com
X-Spam-Flag: NO
X-Spam-Score: -6.572
X-Spam-Level: 
X-Spam-Status: No, score=-6.572 tagged_above=-999 required=5 tests=[AWL=0.027,  BAYES_00=-2.599, RCVD_IN_DNSWL_MED=-4]
Received: from mail.ietf.org ([64.170.98.30]) by localhost (ietfa.amsl.com [127.0.0.1]) (amavisd-new, port 10024) with ESMTP id bygq1ayk+1fz for <oauth@ietfa.amsl.com>; Tue, 12 Feb 2013 08:40:43 -0800 (PST)
Received: from smtpksrv1.mitre.org (smtpksrv1.mitre.org [198.49.146.77]) by ietfa.amsl.com (Postfix) with ESMTP id 54D8221F8F71 for <oauth@ietf.org>; Tue, 12 Feb 2013 08:40:43 -0800 (PST)
Received: from smtpksrv1.mitre.org (localhost.localdomain [127.0.0.1]) by localhost (Postfix) with SMTP id D7C5A1F15AF; Tue, 12 Feb 2013 11:40:42 -0500 (EST)
Received: from IMCCAS03.MITRE.ORG (imccas03.mitre.org [129.83.29.80]) by smtpksrv1.mitre.org (Postfix) with ESMTP id 6A3C31F186F; Tue, 12 Feb 2013 11:40:42 -0500 (EST)
Received: from [10.146.15.29] (129.83.31.58) by IMCCAS03.MITRE.ORG (129.83.29.80) with Microsoft SMTP Server (TLS) id 14.2.318.4; Tue, 12 Feb 2013 11:40:42 -0500
Message-ID: <511A705F.4070204@mitre.org>
Date: Tue, 12 Feb 2013 11:39:59 -0500
From: Justin Richer <jricher@mitre.org>
User-Agent: Mozilla/5.0 (X11; Linux i686; rv:17.0) Gecko/20130106 Thunderbird/17.0.2
MIME-Version: 1.0
To: John Bradley <ve7jtb@ve7jtb.com>
References: <51195F36.6040705@mitre.org> <780F8C26-19A4-4301-B350-307D9FFF69CD@ve7jtb.com> <80727F20-A830-4778-B11C-D45389310646@lodderstedt.net> <511A5742.30707@mitre.org> <B054D3FD-B4F6-4C57-8ED3-402F936DE17F@ve7jtb.com>
In-Reply-To: <B054D3FD-B4F6-4C57-8ED3-402F936DE17F@ve7jtb.com>
Content-Type: text/plain; charset="ISO-8859-1"; format=flowed
Content-Transfer-Encoding: quoted-printable
X-Originating-IP: [129.83.31.58]
Cc: "oauth@ietf.org" <oauth@ietf.org>
Subject: Re: [OAUTH-WG] Registration: RESTful client lifecycle management
X-BeenThere: oauth@ietf.org
X-Mailman-Version: 2.1.12
Precedence: list
List-Id: OAUTH WG <oauth.ietf.org>
List-Unsubscribe: <https://www.ietf.org/mailman/options/oauth>, <mailto:oauth-request@ietf.org?subject=unsubscribe>
List-Archive: <http://www.ietf.org/mail-archive/web/oauth>
List-Post: <mailto:oauth@ietf.org>
List-Help: <mailto:oauth-request@ietf.org?subject=help>
List-Subscribe: <https://www.ietf.org/mailman/listinfo/oauth>, <mailto:oauth-request@ietf.org?subject=subscribe>
X-List-Received-Date: Tue, 12 Feb 2013 16:40:44 -0000

On 02/12/2013 11:30 AM, John Bradley wrote:
> To some extent we want the server to have the flexibility it needs.
>
> If the server knows it is going to need client_id for GET it needs to e=
ncode it in the resource URI ether as part of the path or as a query para=
meter (that is up to the server)
>
> When doing updates the client MUST include the client_id as an addition=
al integrity check.  Some servers may switch on that but that is up to th=
em.
So if by this you mean that the client still simply follows whatever=20
update url the server hands it (which may or may not include the=20
client_id in some form, but the client doesn't care), and that the=20
client MUST include its client_id in the request body (top-level member=20
of a JSON object, at the moment) when doing a PUT (or POST/PATCH? see=20
below) for the update action, then I'm totally fine with that. Is this=20
what you're suggesting?

> If we want incremental replace (not resetting claims not sent to there =
defaults) then we need POST for update.
> I think if you want to do the REST thing and be pure about PUT it needs=
 to reset all values not sent to there defaults.

I agree with this argument in terms of the purity, and as I would rather =

see the different verb used for different actions, I am willing to give=20
up the semantics of the not-resetting-claims that's in there right now=20
for this action. There's actually another HTTP verb, PATCH, that isn't=20
used much but is meant for partial updates, and we could transfer the=20
not-resetting-claims action to this instead.

> I suppose we could have both but two ways of doing it leads to confusio=
n.

I agree that we can't do both PUT and POST, and we can't have both=20
partial and complete replacement on the same verb/endpoint combination.=20
We need to pick one combination and have it be clear.

  -- Justin

> On 2013-02-12, at 11:52 AM, Justin Richer <jricher@mitre.org> wrote:
>
>> The problem that I have with "always including the client_id" is *wher=
e* to include it. Are we talking a query parameter, URI template, or some=
where in the request body? The latter will only work for POST and PUT, so=
 it's out of the question to support GET and DELETE using that semantic. =
I think we should support all operations using parallel syntax -- that's =
just good API design.
>>
>> I *really* don't like the idea of switching the action solely based on=
 whether or not the client_id is present in the request body of a POST. T=
his is a side-effectful mode switch, and it will only lead to pain and mi=
sery. Additionally, if the input is JSON (separate discussion), then a se=
rver would have to parse the JSON body before knowing where to route the =
request. In most web development frameworks that I've used, this is impos=
sible. A query parameter or URL pattern, on the other hand, is doable.
>>
>> As it stands right now, a server is free to include the client_id in t=
he "update/management" URL that it returns as part of the _link structure=
 (separate discussion). The current text goes as far as recommending that=
 practice, but doesn't take the step of requiring it in any form, and lea=
ving it up to the server to decide what form it takes. If a server can ro=
ute better with a query parameter, it'll return a URL to the client that =
has a client_id=3D query parameter. If a server would rather use a path c=
omponent with the client_id, it can do that, too. If it wants to put ever=
ything on one URL and differentiate through the request body or presence/=
absence of the registration_access_token, it can always return the same U=
RL to every client. I think that's nuts, but you can do it. Interoperabil=
ity is preserved because the client simply follows the returned URL to do=
 its bits and pieces, and it doesn't ever have to create or compose this =
URL from component parts.
>>
>> I want to continue to distinguish between the POST and PUT operations =
for create and update, respectively. This is a common pattern and the one=
 described in the original REST thesis that described the architectural s=
tyle. I'll also bring up that the semantics of PUT are intended to be "re=
place all", which is what you had originally argued for in the update cas=
e as well. I not convinced that developers of today can't handle HTTP ver=
bs like PUT if they want to do fancier operations like updates. Note that=
 the core operations, create and read, remain as POST and GET, which woul=
d be well within the grasp of every library and web developer today.
>>
>> -- Justin
>>
>> On 02/12/2013 02:23 AM, Torsten Lodderstedt wrote:
>>> +1 for always including the client_id
>>>
>>> As John pointed out, there could be different entities updating clien=
t data. Then one has to distinguish the resource and the credential.
>>>
>>> Am 12.02.2013 um 02:51 schrieb John Bradley <ve7jtb@ve7jtb.com>:
>>>
>>>> I would always include the client_id on update.
>>>>
>>>> I think it is also us full to have other tokens used at the update e=
ndpoint.  I can see the master token used to update all the clients it ha=
s registered as part of API management.
>>>> Relying on the registration_access_token is probably a design that w=
ill cause trouble down the road.
>>>>
>>>> I think GET and POST are relatively clear.   I don't know about expe=
lling PUT to developers.  I think POST with a client_id to a (separate di=
scussion) update_uri works without restricting it to PUT.
>>>>
>>>> I think DELETE needs to be better understood.   I think a status tha=
t can be set for client lifecycle is better than letting a client delete =
a entry.
>>>> In some cases there will be more than one instance of a client and l=
etting them know they have been turned off for a reason is better than ma=
king there registration disappear.
>>>> So for the moment I would levee out DELETE.
>>>>
>>>> John B.
>>>>
>>>> On 2013-02-11, at 6:14 PM, Justin Richer <jricher@mitre.org> wrote:
>>>>
>>>>> Draft -05 of OAuth Dynamic Client Registration [1] defines several =
operations that the client can take on its behalf as part of the registra=
tion process. These boil down to the basic CRUD operations that you find =
in many APIs: Create, Read, Update, Delete. Draft -00 defined only the "C=
reate" operation, draft -01 through -04 added the "Update" operation, swi=
tched using the "operation=3D" parameter.
>>>>>
>>>>> Following several suggestions to do so on the list, the -05 draft d=
efines these operations in terms of a RESTful API for the client. Namely:=

>>>>>
>>>>> - HTTP POST to registration endpoint =3D> Create (register) a new c=
lient
>>>>> - HTTP PUT to update endpoint (with registration_access_token) =3D>=
 Update the registered information for this client
>>>>> - HTTP GET to update endpoint (with registration_access_token) =3D>=
 read the registered information for this client
>>>>> - HTTP DELETE to update endpoint (with registration_access_token) =3D=
> Delete (unregister/de-provision) this client
>>>>>
>>>>> The two main issues at stake here are: the addition of the READ and=
 DELETE methods, and the use of HTTP verbs following a RESTful design phi=
losophy.
>>>>>
>>>>> Pro:
>>>>> - RESTful APIs (with HTTP verbs to differentiate functionality) are=
 the norm today
>>>>> - Full lifecycle management is common and is going to be expected b=
y many users of this protocol in the wild
>>>>>
>>>>> Cons:
>>>>> - Update semantics are still under debate (full replace? patch?)
>>>>> - Somewhat increased complexity on the server to support all operat=
ions
>>>>> - Client has to understand all HTTP verbs for full access (though p=
lain registration is just POST)
>>>>>
>>>>>
>>>>> Alternatives include using an operational switch parameter (like th=
e old drafts), defining separate endpoints for every action, or doing all=
 operations on a single endpoint using verbs to switch.
>>>>>
>>>>> -- Justin
>>>>>
>>>>> [1] http://tools.ietf.org/html/draft-ietf-oauth-dyn-reg-05
>>>>> _______________________________________________
>>>>> OAuth mailing list
>>>>> OAuth@ietf.org
>>>>> https://www.ietf.org/mailman/listinfo/oauth
>>>> _______________________________________________
>>>> OAuth mailing list
>>>> OAuth@ietf.org
>>>> https://www.ietf.org/mailman/listinfo/oauth



From ve7jtb@ve7jtb.com  Tue Feb 12 08:47:26 2013
Return-Path: <ve7jtb@ve7jtb.com>
X-Original-To: oauth@ietfa.amsl.com
Delivered-To: oauth@ietfa.amsl.com
Received: from localhost (localhost [127.0.0.1]) by ietfa.amsl.com (Postfix) with ESMTP id D3E0121F8F7F for <oauth@ietfa.amsl.com>; Tue, 12 Feb 2013 08:47:26 -0800 (PST)
X-Virus-Scanned: amavisd-new at amsl.com
X-Spam-Flag: NO
X-Spam-Score: -3.204
X-Spam-Level: 
X-Spam-Status: No, score=-3.204 tagged_above=-999 required=5 tests=[AWL=0.394,  BAYES_00=-2.599, HTML_MESSAGE=0.001, RCVD_IN_DNSWL_LOW=-1]
Received: from mail.ietf.org ([64.170.98.30]) by localhost (ietfa.amsl.com [127.0.0.1]) (amavisd-new, port 10024) with ESMTP id eTWaTDT1UYJq for <oauth@ietfa.amsl.com>; Tue, 12 Feb 2013 08:47:25 -0800 (PST)
Received: from mail-qa0-f50.google.com (mail-qa0-f50.google.com [209.85.216.50]) by ietfa.amsl.com (Postfix) with ESMTP id 304F421F8F7E for <oauth@ietf.org>; Tue, 12 Feb 2013 08:47:25 -0800 (PST)
Received: by mail-qa0-f50.google.com with SMTP id dx4so161062qab.2 for <oauth@ietf.org>; Tue, 12 Feb 2013 08:47:24 -0800 (PST)
X-Google-DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=google.com; s=20120113; h=x-received:content-type:mime-version:subject:from:in-reply-to:date :cc:message-id:references:to:x-mailer:x-gm-message-state; bh=rlF6dxbwufZaX2Nnm4eY+fe2kwvNTy7014NHxkipUHs=; b=h/cNhaYrOEBKJEP3P/OZFwQlUfZ+qUhqUdx44nPiVFDQW+tWIJ1FnP6eqxmHdwuOMl V6jdKw49VkKxsU6U0dQGnD7HOW4GQ93Okf5ulMCiY30NRtIiW1cbbZMdnj3FSG5CCRfz kiHp7jGjPsEzbj0l3bV8X+crdMM4FulUVVfN3+jIDvkxz63anwbrTj8nWrHASPoD1Brp Q3AdCEck/Ye/l8QLyNUMO5o+atMRdOzRYOIVX5ZcJDoyh4RnE8G5DtcBchK+A2LhDlmm Z48ULjFA/qLui/srm9GnOJRdWZxl8RyIwXjZ/pvIVvhDg4CxKuMvKDGeiuLHErlumv6N DpCw==
X-Received: by 10.229.209.232 with SMTP id gh40mr1710160qcb.69.1360687644246;  Tue, 12 Feb 2013 08:47:24 -0800 (PST)
Received: from [192.168.1.213] (190-20-23-212.baf.movistar.cl. [190.20.23.212]) by mx.google.com with ESMTPS id o5sm16641315qao.12.2013.02.12.08.47.19 (version=TLSv1 cipher=ECDHE-RSA-RC4-SHA bits=128/128); Tue, 12 Feb 2013 08:47:21 -0800 (PST)
Content-Type: multipart/alternative; boundary="Apple-Mail=_1A45EBDE-2624-4EB1-B960-26BCB62CF27C"
Mime-Version: 1.0 (Mac OS X Mail 6.2 \(1499\))
From: John Bradley <ve7jtb@ve7jtb.com>
In-Reply-To: <1360663615.75403.YahooMailNeo@web31803.mail.mud.yahoo.com>
Date: Tue, 12 Feb 2013 13:47:16 -0300
Message-Id: <E78E5752-6F51-4A04-95BE-6BD447CC7B79@ve7jtb.com>
References: <0573984A-8C11-4960-9BC6-F44D4B664C19@gmx.net> <1360661249.62997.YahooMailNeo@web31803.mail.mud.yahoo.com> <103117A9-0922-4E1A-AC73-D2914743046C@gmx.net> <1360663615.75403.YahooMailNeo@web31803.mail.mud.yahoo.com>
To: William Mills <wmills_92105@yahoo.com>
X-Mailer: Apple Mail (2.1499)
X-Gm-Message-State: ALoCoQkJtaI1aBgMzxCIaRR++wqJYkq7noyeVe4R9abfermLE9ci7dOsLU4wQwRSzno/cYA4GED+
Cc: IETF oauth WG <oauth@ietf.org>
Subject: Re: [OAUTH-WG] Minutes from the OAuth Design Team Conference Call - 11th February 2013
X-BeenThere: oauth@ietf.org
X-Mailman-Version: 2.1.12
Precedence: list
List-Id: OAUTH WG <oauth.ietf.org>
List-Unsubscribe: <https://www.ietf.org/mailman/options/oauth>, <mailto:oauth-request@ietf.org?subject=unsubscribe>
List-Archive: <http://www.ietf.org/mail-archive/web/oauth>
List-Post: <mailto:oauth@ietf.org>
List-Help: <mailto:oauth-request@ietf.org?subject=help>
List-Subscribe: <https://www.ietf.org/mailman/listinfo/oauth>, <mailto:oauth-request@ietf.org?subject=subscribe>
X-List-Received-Date: Tue, 12 Feb 2013 16:47:27 -0000

--Apple-Mail=_1A45EBDE-2624-4EB1-B960-26BCB62CF27C
Content-Transfer-Encoding: quoted-printable
Content-Type: text/plain;
	charset=iso-8859-1

The token may or may not need to be encrypted on top of being signed.  =
All tokens red to be signed.

If the Key is asymmetric or using DH key agreement it would not need to =
be encrypted.=20
If it is a symmetric key then yes you need to use encrypted key =
transport.   The JOSE working group is working on a clean method of =
using JOSE fro Key transport.
We should align with that.

In some ways ECDH-ES would be perfect for this, but I am realistic about =
adoption.

If we fall back to regular DH then if RS's have a way of communicating =
there DH info to the AS then when the client requests a token providing =
it's DH info the server can place that in the token and return the RS's =
info in a separate parameter to the client and the key is never sent =
over the wire, so no encryption needed. =20

One problem is that who the intended RS is may be a touch vague in =
OAuth. (This affects both key transport and agreement.)  so the AS may =
not know what the RS is if it is not explicit in the scope.

That may lead us to make asymmetric keys (including the public key of =
the client)  as the default as that is the only one that works with both =
known and unknown RS.

You could design a DH floe to work where the RS on request failures =
provides its DH info and then the client passes that and it's info to =
the AS in the token request.
That works but sort of messes up the flow.

John B.



On 2013-02-12, at 7:06 AM, William Mills <wmills_92105@yahoo.com> wrote:

> For key exchange that's true for symmetric key, but no key exchange is =
required for public key signing by the client.
>=20
> There's so many possibilities here, but I think the best is that the =
key materiel is conveyed in the token.  The key could be included =
directly, or another way to implement would be that a salt is included =
in the token and then the secret is some crypto hash of the token =
contents and a shared secret between the AS and the PR. =20
>=20
> If we we must pick one I'd say include the signing key as part of the =
encrypted token itself.  Completely self contained then.
>=20
> From: Hannes Tschofenig <hannes.tschofenig@gmx.net>
> To: William Mills <wmills_92105@yahoo.com>=20
> Cc: Hannes Tschofenig <hannes.tschofenig@gmx.net>; IETF oauth WG =
<oauth@ietf.org>=20
> Sent: Tuesday, February 12, 2013 1:44 AM
> Subject: Re: [OAUTH-WG] Minutes from the OAuth Design Team Conference =
Call - 11th February 2013
>=20
> Hi Bill,=20
>=20
> On Feb 12, 2013, at 11:27 AM, William Mills wrote:
>=20
> > Is key distribution how AS and PR share keys  for token =
encryption/decryption or specifically about the keys for the HOK tokens?
> >=20
> In order for the client to compute the keyed message digest it needs =
to have the session key. This session key is sent from the authorization =
server to the client and everyone on the call agreed that this has to be =
standardized.=20
>=20
> The resource server who receives the message from the client also =
needs to have the session key to verify the message. How the resource =
server obtains this session key was subject for some discussion on the =
call. I presented three different ways of how the resource server is =
able to obtain that key. We have to decide on one mandatory-to-implement =
mechanism. The open issue is which one?=20
>=20
> > For the MAC token spec, I don't actually care whether we use JSON or =
now, but I'm in full agreement that we do NOT duplicate any HTTP info =
into the JSON.  Just signatures of that stuff.
> >=20
> I believe the folks on the call also agreed with you on that aspect =
that the content of the HTTP message should not be replicated in the =
JSON payload itself.=20
>=20
> Ciao
> Hannes
>=20
> > From: Hannes Tschofenig <hannes.tschofenig@gmx.net>
> > To: IETF oauth WG <oauth@ietf.org>=20
> > Sent: Tuesday, February 12, 2013 1:10 AM
> > Subject: [OAUTH-WG] Minutes from the OAuth Design Team Conference =
Call - 11th February 2013
> >=20
> > Here are my notes.=20
> >=20
> > Participants:
> >=20
> > * John Bradley
> > * Derek Atkins
> > * Phil Hunt
> > * Prateek Mishra
> > * Hannes Tschofenig
> > * Mike Jones
> > * Antonio Sanso
> > * Justin Richer
> >=20
> > Notes:=20
> >=20
> > My slides are available here: =
http://www.tschofenig.priv.at/OAuth2-Security-11Feb2013.ppt
> >=20
> > Slide #2 summarizes earlier discussions during the conference calls.=20=

> >=20
> > -- HTTP vs. JSON
> >=20
> > Phil noted that he does not like to use the MAC Token draft as a =
starting point because it does not re-use any of the work done in the =
JOSE working group and in particular all the libraries that are =
available today. He mentioned that earlier attempts to write the MAC =
Token code lead to problems for implementers.=20
> >=20
> > Justin responded that he does not agree with using JSON as a =
transport mechanism since this would replicate a SOAP style.=20
> >=20
> > Phil noted that he wants to send JSON but the signature shall be =
computed over the HTTP header field.=20
> >=20
> > -- Flexibility for the keyed message digest computation
> >=20
> > =46rom earlier discussion it was clear that the conference call =
participants wanted more flexibility regarding the keyed message digest =
computation. For this purpose Hannes presented the DKIM based approach, =
which allows selective header fields to be included in the digest. This =
is shown in slide #4.=20
> >=20
> > After some discussion the conference call participants thought that =
this would meet their needs. Further investigations would still be =
useful to determine the degree of failed HMAC calculations due to HTTP =
proxies modifying the content.=20
> >=20
> > -- Key Distribution
> >=20
> > Hannes presented the open issue regarding the choice of key =
distribution. Slides #6-#8 present three techniques and Hannes asked for =
feedback regarding the preferred style. Justin and others didn't see the =
need to decide on one mechanism - they wanted to keep the choice open. =
Derek indicated that this will not be an acceptable approach. Since the =
resource server and the authorization server may, in the OAuth 2.0 =
framework, be entities produced by different vendors there is an =
interoperability need. Justin responded that he disagrees and that the =
resource server needs to understand the access token and referred to the =
recent draft submission for the token introspection endpoint. Derek =
indicated that the resource server has to understand the content of the =
access token and the token introspection endpoint just pushes the =
problem around: the resource server has to send the access token to the =
authorization server and then the resource server gets the result back =
(which he then a
> > gain needs to understand) in order to make a meaningful =
authorization decision.=20
> >=20
> > Everyone agreed that the client must receive the session key from =
the authorization server and that this approach has to be standardized. =
It was also agreed that this is a common approach among all three key =
distribution mechanisms.
> >=20
> > Hannes asked the participants to think about their preference.=20
> >=20
> > The questions regarding key naming and the indication for the =
intended resource server the client wants to talk to have been =
postponed.=20
> >=20
> > Ciao
> > Hannes
> >=20
> >=20
> > _______________________________________________
> > OAuth mailing list
> > OAuth@ietf.org
> > https://www.ietf.org/mailman/listinfo/oauth
> >=20
> >=20
>=20
>=20
>=20
> _______________________________________________
> OAuth mailing list
> OAuth@ietf.org
> https://www.ietf.org/mailman/listinfo/oauth


--Apple-Mail=_1A45EBDE-2624-4EB1-B960-26BCB62CF27C
Content-Transfer-Encoding: quoted-printable
Content-Type: text/html;
	charset=iso-8859-1

<html><head><meta http-equiv=3D"Content-Type" content=3D"text/html =
charset=3Diso-8859-1"></head><body style=3D"word-wrap: break-word; =
-webkit-nbsp-mode: space; -webkit-line-break: after-white-space; ">The =
token may or may not need to be encrypted on top of being signed. =
&nbsp;All tokens red to be signed.<div><br></div><div>If the Key is =
asymmetric or using DH key agreement it would not need to be =
encrypted.&nbsp;</div><div>If it is a symmetric key then yes you need to =
use encrypted key transport. &nbsp; The JOSE working group is working on =
a clean method of using JOSE fro Key transport.</div><div>We should =
align with that.</div><div><br></div><div>In some ways ECDH-ES would be =
perfect for this, but I am realistic about =
adoption.</div><div><br></div><div>If we fall back to regular DH then if =
RS's have a way of communicating there DH info to the AS then when the =
client requests a token providing it's DH info the server can place that =
in the token and return the RS's info in a separate parameter to the =
client and the key is never sent over the wire, so no encryption needed. =
&nbsp;</div><div><br></div><div>One problem is that who the intended RS =
is may be a touch vague in OAuth. (This affects both key transport and =
agreement.) &nbsp;so the AS may not know what the RS is if it is not =
explicit in the scope.</div><div><br></div><div>That may lead us to make =
asymmetric keys (including the public key of the client) &nbsp;as the =
default as that is the only one that works with both known and unknown =
RS.</div><div><br></div><div>You could design a DH floe to work where =
the RS on request failures provides its DH info and then the client =
passes that and it's info to the AS in the token request.</div><div>That =
works but sort of messes up the flow.</div><div><br></div><div>John =
B.</div><div><br></div><div><br></div><div><br><div><div>On 2013-02-12, =
at 7:06 AM, William Mills &lt;<a =
href=3D"mailto:wmills_92105@yahoo.com">wmills_92105@yahoo.com</a>&gt; =
wrote:</div><br class=3D"Apple-interchange-newline"><blockquote =
type=3D"cite"><div><div style=3D"background-color: rgb(255, 255, 255); =
font-family: 'Courier New', courier, monaco, monospace, sans-serif; =
font-size: 12pt; "><div>For key exchange that's true for symmetric key, =
but no key exchange is required for public key signing by the =
client.</div><div><br></div><div style=3D"font-size: 16px; font-family: =
'Courier New', courier, monaco, monospace, sans-serif; background-color: =
transparent; font-style: normal; ">There's so many possibilities here, =
but I think the best is that the key materiel is conveyed in the token. =
&nbsp;The key could be included directly, or another way to implement =
would be that a salt is included in the token and then the secret is =
some crypto hash of the token contents and a shared secret between the =
AS and the PR. &nbsp;</div><div style=3D"font-size: 16px; font-family: =
'Courier New', courier, monaco, monospace, sans-serif; background-color: =
transparent; font-style: normal; "><br></div><div style=3D"font-size: =
16px; font-family: 'Courier New', courier, monaco, monospace, =
sans-serif; background-color: transparent; font-style: normal; ">If we =
we must pick one I'd say include the signing key as part of the =
encrypted token itself. &nbsp;Completely self contained =
then.</div><div><br></div>  <div style=3D"font-family: 'Courier New', =
courier, monaco, monospace, sans-serif; font-size: 12pt;"> <div =
style=3D"font-family: 'times new roman', 'new york', times, serif; =
font-size: 12pt;"> <div dir=3D"ltr"> <font size=3D"2" face=3D"Arial"> =
<hr size=3D"1">  <b><span style=3D"font-weight:bold;">From:</span></b> =
Hannes Tschofenig &lt;<a =
href=3D"mailto:hannes.tschofenig@gmx.net">hannes.tschofenig@gmx.net</a>&gt=
;<br> <b><span style=3D"font-weight: bold;">To:</span></b> William Mills =
&lt;<a =
href=3D"mailto:wmills_92105@yahoo.com">wmills_92105@yahoo.com</a>&gt; =
<br><b><span style=3D"font-weight: bold;">Cc:</span></b> Hannes =
Tschofenig &lt;<a =
href=3D"mailto:hannes.tschofenig@gmx.net">hannes.tschofenig@gmx.net</a>&gt=
;; IETF oauth WG &lt;<a =
href=3D"mailto:oauth@ietf.org">oauth@ietf.org</a>&gt; <br> <b><span =
style=3D"font-weight: bold;">Sent:</span></b> Tuesday, February 12, 2013 =
1:44 AM<br> <b><span style=3D"font-weight: bold;">Subject:</span></b> =
Re: [OAUTH-WG] Minutes from the OAuth Design Team Conference Call - 11th =
February 2013<br> </font> </div> <br>
Hi Bill, <br><br>On Feb 12, 2013, at 11:27 AM, William Mills =
wrote:<br><br>&gt; Is key distribution how AS and PR share keys&nbsp; =
for token encryption/decryption or specifically about the keys for the =
HOK tokens?<br>&gt; <br>In order for the client to compute the keyed =
message digest it needs to have the session key. This session key is =
sent from the authorization server to the client and everyone on the =
call agreed that this has to be standardized. <br><br>The resource =
server who receives the message from the client also needs to have the =
session key to verify the message. How the resource server obtains this =
session key was subject for some discussion on the call. I presented =
three different ways of how the resource server is able to obtain that =
key. We have to decide on one mandatory-to-implement mechanism. The open =
issue is which one? <br> <br>&gt; For the MAC token spec, I don't =
actually care whether we use JSON or now, but I'm in full agreement
 that we do NOT duplicate any HTTP info into the JSON.&nbsp; Just =
signatures of that stuff.<br>&gt; <br>I believe the folks on the call =
also agreed with you on that aspect that the content of the HTTP message =
should not be replicated in the JSON payload itself. =
<br><br>Ciao<br>Hannes<br><br>&gt; From: Hannes Tschofenig &lt;<a =
ymailto=3D"mailto:hannes.tschofenig@gmx.net" =
href=3D"mailto:hannes.tschofenig@gmx.net">hannes.tschofenig@gmx.net</a>&gt=
;<br>&gt; To: IETF oauth WG &lt;<a ymailto=3D"mailto:oauth@ietf.org" =
href=3D"mailto:oauth@ietf.org">oauth@ietf.org</a>&gt; <br>&gt; Sent: =
Tuesday, February 12, 2013 1:10 AM<br>&gt; Subject: [OAUTH-WG] Minutes =
from the OAuth Design Team Conference Call - 11th February 2013<br>&gt; =
<br>&gt; Here are my notes. <br>&gt; <br>&gt; Participants:<br>&gt; =
<br>&gt; * John Bradley<br>&gt; * Derek Atkins<br>&gt; * Phil =
Hunt<br>&gt; * Prateek Mishra<br>&gt; * Hannes Tschofenig<br>&gt; * Mike =
Jones<br>&gt; * Antonio Sanso<br>&gt; *
 Justin Richer<br>&gt; <br>&gt; Notes: <br>&gt; <br>&gt; My slides are =
available here: <a =
href=3D"http://www.tschofenig.priv.at/OAuth2-Security-11Feb2013.ppt">http:=
//www.tschofenig.priv.at/OAuth2-Security-11Feb2013.ppt</a><br>&gt; =
<br>&gt; Slide #2 summarizes earlier discussions during the conference =
calls. <br>&gt; <br>&gt; -- HTTP vs. JSON<br>&gt; <br>&gt; Phil noted =
that he does not like to use the MAC Token draft as a starting point =
because it does not re-use any of the work done in the JOSE working =
group and in particular all the libraries that are available today. He =
mentioned that earlier attempts to write the MAC Token code lead to =
problems for implementers. <br>&gt; <br>&gt; Justin responded that he =
does not agree with using JSON as a transport mechanism since this would =
replicate a SOAP style. <br>&gt; <br>&gt; Phil noted that he wants to =
send JSON but the signature shall be computed over the HTTP header =
field. <br>&gt; <br>&gt; -- Flexibility for the keyed message digest =
computation<br>&gt; <br>&gt; =46rom earlier
 discussion it was clear that the conference call participants wanted =
more flexibility regarding the keyed message digest computation. For =
this purpose Hannes presented the DKIM based approach, which allows =
selective header fields to be included in the digest. This is shown in =
slide #4. <br>&gt; <br>&gt; After some discussion the conference call =
participants thought that this would meet their needs. Further =
investigations would still be useful to determine the degree of failed =
HMAC calculations due to HTTP proxies modifying the content. <br>&gt; =
<br>&gt; -- Key Distribution<br>&gt; <br>&gt; Hannes presented the open =
issue regarding the choice of key distribution. Slides #6-#8 present =
three techniques and Hannes asked for feedback regarding the preferred =
style. Justin and others didn't see the need to decide on one mechanism =
- they wanted to keep the choice open. Derek indicated that this will =
not be an acceptable approach. Since the resource server and
 the authorization server may, in the OAuth 2.0 framework, be entities =
produced by different vendors there is an interoperability need. Justin =
responded that he disagrees and that the resource server needs to =
understand the access token and referred to the recent draft submission =
for the token introspection endpoint. Derek indicated that the resource =
server has to understand the content of the access token and the token =
introspection endpoint just pushes the problem around: the resource =
server has to send the access token to the authorization server and then =
the resource server gets the result back (which he then a<br>&gt; gain =
needs to understand) in order to make a meaningful authorization =
decision. <br>&gt; <br>&gt; Everyone agreed that the client must receive =
the session key from the authorization server and that this approach has =
to be standardized. It was also agreed that this is a common approach =
among all three key distribution
 mechanisms.<br>&gt; <br>&gt; Hannes asked the participants to think =
about their preference. <br>&gt; <br>&gt; The questions regarding key =
naming and the indication for the intended resource server the client =
wants to talk to have been postponed. <br>&gt; <br>&gt; Ciao<br>&gt; =
Hannes<br>&gt; <br>&gt; <br>&gt; =
_______________________________________________<br>&gt; OAuth mailing =
list<br>&gt; <a ymailto=3D"mailto:OAuth@ietf.org" =
href=3D"mailto:OAuth@ietf.org">OAuth@ietf.org</a><br>&gt; <a =
href=3D"https://www.ietf.org/mailman/listinfo/oauth" =
target=3D"_blank">https://www.ietf.org/mailman/listinfo/oauth</a><br>&gt; =
<br>&gt; <br><br><br><br> </div> </div>  =
</div></div>_______________________________________________<br>OAuth =
mailing list<br><a =
href=3D"mailto:OAuth@ietf.org">OAuth@ietf.org</a><br>https://www.ietf.org/=
mailman/listinfo/oauth<br></blockquote></div><br></div></body></html>=

--Apple-Mail=_1A45EBDE-2624-4EB1-B960-26BCB62CF27C--

From sakimura@gmail.com  Tue Feb 12 09:10:51 2013
Return-Path: <sakimura@gmail.com>
X-Original-To: oauth@ietfa.amsl.com
Delivered-To: oauth@ietfa.amsl.com
Received: from localhost (localhost [127.0.0.1]) by ietfa.amsl.com (Postfix) with ESMTP id D097421F89D8 for <oauth@ietfa.amsl.com>; Tue, 12 Feb 2013 09:10:50 -0800 (PST)
X-Virus-Scanned: amavisd-new at amsl.com
X-Spam-Flag: NO
X-Spam-Score: -2.422
X-Spam-Level: 
X-Spam-Status: No, score=-2.422 tagged_above=-999 required=5 tests=[AWL=0.577,  BAYES_00=-2.599, J_CHICKENPOX_44=0.6, RCVD_IN_DNSWL_LOW=-1]
Received: from mail.ietf.org ([64.170.98.30]) by localhost (ietfa.amsl.com [127.0.0.1]) (amavisd-new, port 10024) with ESMTP id DArIk2ecg6IN for <oauth@ietfa.amsl.com>; Tue, 12 Feb 2013 09:10:49 -0800 (PST)
Received: from mail-lb0-f178.google.com (mail-lb0-f178.google.com [209.85.217.178]) by ietfa.amsl.com (Postfix) with ESMTP id 042CD21F8FAB for <oauth@ietf.org>; Tue, 12 Feb 2013 09:10:48 -0800 (PST)
Received: by mail-lb0-f178.google.com with SMTP id n1so280846lba.23 for <oauth@ietf.org>; Tue, 12 Feb 2013 09:10:46 -0800 (PST)
DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=gmail.com; s=20120113; h=mime-version:x-received:in-reply-to:references:date:message-id :subject:from:to:cc:content-type:content-transfer-encoding; bh=9hd4aA6ohUOlqEV2cTp8oFcjGvi66RzuthH5cgVRG2E=; b=n1fS4MZ4Z/vqTiS4ubqCFwtQHVJYsag0xvmStGTt1z4SrVVNmAfHb4I+3WhL3IJTZJ wGm1t77KFiv5QAeaSQWFCo471tLgxs0QjUG4wGpomLgDQubJdvZeNbtUFB0+PYDjmMbu SJGMiqYmanjByv1NROwrVP5OIj/Oqi644B0iYu0vIkaBlChkK6+RAAqIRERoI1HPVI44 VweTyxoLnOnrU3vzWm3G2KDStCm5BGGgYko3bEWcKEJ4AhlGgjeZKesQSz6dLtg7YUpE tHyjCIqKLkwtbYc1GL9d4As5opfC0aKNserSWxJza5FVAJSVrR3ckbl+Fm3BsYbJ/vwk Zk/A==
MIME-Version: 1.0
X-Received: by 10.112.41.101 with SMTP id e5mr7298247lbl.120.1360689046139; Tue, 12 Feb 2013 09:10:46 -0800 (PST)
Received: by 10.112.14.44 with HTTP; Tue, 12 Feb 2013 09:10:45 -0800 (PST)
In-Reply-To: <511A6C49.50801@mitre.org>
References: <51195F3D.1050006@mitre.org> <222C28CB-7F6F-4BC3-8692-40404C2DC2D3@maymount.com> <511A50C7.8080102@mitre.org> <B256FD2D-5ED7-4306-A3BF-E6A196862B2E@ve7jtb.com> <511A6C49.50801@mitre.org>
Date: Wed, 13 Feb 2013 02:10:45 +0900
Message-ID: <CABzCy2CdxaNOvho2uyuc83qHm4WKHVfToC_n6QqAS3fqTGzU2w@mail.gmail.com>
From: Nat Sakimura <sakimura@gmail.com>
To: Justin Richer <jricher@mitre.org>, "oauth@ietf.org" <oauth@ietf.org>
Content-Type: text/plain; charset=ISO-8859-1
Content-Transfer-Encoding: quoted-printable
Subject: Re: [OAUTH-WG] Registration: HAL _links structure and client self-URL
X-BeenThere: oauth@ietf.org
X-Mailman-Version: 2.1.12
Precedence: list
List-Id: OAUTH WG <oauth.ietf.org>
List-Unsubscribe: <https://www.ietf.org/mailman/options/oauth>, <mailto:oauth-request@ietf.org?subject=unsubscribe>
List-Archive: <http://www.ietf.org/mail-archive/web/oauth>
List-Post: <mailto:oauth@ietf.org>
List-Help: <mailto:oauth-request@ietf.org?subject=help>
List-Subscribe: <https://www.ietf.org/mailman/listinfo/oauth>, <mailto:oauth-request@ietf.org?subject=subscribe>
X-List-Received-Date: Tue, 12 Feb 2013 17:10:51 -0000

Actually, if it is to return it in the HTTP header, then it should
also use the RFC5988 Web Linking format.
Now, that is nice to have, but for many JSON programmers, I agree that
it would be a hassle to obtain the header and store them in addition
to the JSON. So, it is nicer to have it in JSON body.

Re: Is "_links.self.href" grossly complex over "registration_access_url"?

I do not think so. Accessing a flat top level parameter such
as registration_access_url and _links.self.href does not make any
difference from a
client programmers point of view. That's a beauty of JSON. Both can be
treated as a parameter name. Doing a group operation on the links makes
difference though: the structured one is easier since you can just operate
on _links while in case of the top level parameters, you have to have an
explicit list of them and do the matches. (See below for the necessity
for the grouping).

I and John discussed this for at least half an hour F2F last week, both
technically and from operation/legal point of view, for OpenID Connect
Registration.
Similar points could be made to OAuth dyn reg.

Here is what we have discussed:

When dynamically registering the client to the server,
the server probably needs to return the following:

  * terms-of-service (terms of service of the server to the client)
  * privacy-policy (privacy policy of the server to the client)

Both are defined in RFC5988/IANA Link Relations registry.


They should be returned together with

  * self.href

which is also defined in RFC5988/IANA Link Relations registry.

There are several ways to do it.

  * Return these using RFC5988 (HTTP Header)
  * Return these in entity body
      * Use HAL (or OAuth-meta)/JSON Schema
      * Use something else (e.g., a top level items)

Returning it in the entity body has several advantage over HTTP header:

  * They can be captured in one call;
  * They are protocol agnostic;

We determined that these advantages outweighs the disadvantage of creating
a new standard.

The question becomes then whether to:

  * Use HAL (or OAuth-meta)/JSON Schema
  * Use something else (e.g., a top level items)

First, we have to consider what needs to be returned in the
link/relationship category. If it were just _links.self.href, then grouping
probably does not make sense. However, since we have terms-of-service and
privacy-policy as well already, it may well make sense.

Moreover, when we think of a multi-tenant authorization server that may
want to use different OAuth authz and token endpoints for different
tennants, it would be better to be able to return those in the registration
response. Then, it would make sense to register OAuth authz and token
endpoints as rel type in the IANA registry (like Bill Mills is trying to
do) and use them in a uniform manner. Note: these per tenant endpoints may
support different scopes etc. as well. Then, these has to be coupled with
the URIs. That is why all of RFC5988/HAL/JSON Schema uses href instead of
just having the URL as the value of the parameter. The semantic
relationship would often have an associated URI, and other parameters that
goes with it.

e.g.:

{
    "_links": {
        "terms-of-service": {
            "href": "https: //server.example.com/tos"
        },
        "privacy-policy": {
            "href": "https: //server.example.com/pp"
        },
        "self": {
            "href": "https: //server.example.com/clients/1234",
            "authorize": "Bearer"
        },
        "oauth_authz": {
            "href": "https: //server.example.com/authz",
            "scopes": "openid profile email",
            "response_types": [
                "token id_token",
                "code id_token",
                "token",
                "code"
            ]
        },
        "oauth_token": {
            "href": "https: //server.example.com/token",
            "authorize": "Basic"
        }
    }
}

In short, there are bunch of link relations that needs to be returned
with additional parameters.
Grouping them seems to make sense.

Considering all these, John and I came to the conclusion that the HAL type
syntax would probably make more sense.
(Note: JSON Schema syntax does not make the parameter access as easy as HAL=
.)

In fact, Mike Kelly (the author of HAL) and I have just submit
a new version of draft-sakimura-oauth-meta

   http://tools.ietf.org/html/draft-sakimura-oauth-meta-02

The proposal was discussed at IETF 85 OAuth WG and the chairs asked to
submit the draft.
The -00 appeared in December, and this -02 has some simplification and
the addition
of the "operations" inspired by
https://tools.ietf.org/html/draft-ietf-scim-api-00#section-3.5 .
It is arguably a subset of HAL plus some OAuth specifics.
I have not added Discovery response example,
but adding them would makes even more sense, I think.

Cheers,

Nat


2013/2/13 Justin Richer <jricher@mitre.org>
>
> Agreed - I didn't think that header-only was the proposal, but let's be e=
xplicit about the returned body always containing the URL. The way I read t=
he 201 definition, it suggests (SHOULD) that you use the location header, b=
ut also says that the entity should refer to the new resource. It was my as=
sumption that the returned JSON would still have some form of client-entity=
 management URL (whether it's the HAL _links structure or registration_mana=
gement_url or something else is still up for debate).
>
>  -- Justin
>
>
>
> On 02/12/2013 10:28 AM, John Bradley wrote:
>
> Returning a location header in the 201 ids fine as long as we also have t=
he same info as a claim.
>
> I think most clients will want to process the JSON and store all the para=
meters together.  Making them fish out a header makes the W3C happy and is =
the correct thing to do but taking it from a claim is what developers are m=
ore comfortable with.
>
> John B.
>
> On 2013-02-12, at 11:25 AM, Justin Richer <jricher@mitre.org> wrote:
>
> I'd be fine with the return from a creation request being a 201 instead o=
f a 200.
>
>  -- Justin
>
> On 02/11/2013 06:33 PM, Richard Harrington wrote:
>
> Since the request is an HTTP POST and a resource is created (http://www.w=
3.org/Protocols/rfc2616/rfc2616-sec9.html#sec9.5) the response should be an=
 HTTP 201 Created (http://www.w3.org/Protocols/rfc2616/rfc2616-sec10.html#s=
ec10.2.2) which is supposed to include the location of the newly created re=
source.
>
> This is a good pattern to follow since, as you say, it does provide flexi=
bility.
>
>
>
> On Feb 11, 2013, at 1:14 PM, Justin Richer <jricher@mitre.org> wrote:
>
> Draft -05 of OAuth Dynamic Client Registration [1] returns a URL pointer =
for the client to perform update and secret rotation actions. This function=
ality arose from discussions on the list about moving towards a more RESTfu=
l pattern, and Nat Sakimura proposed this approach in the OpenID Connect Wo=
rking Group. This URL may be distinct from the Client Registration Endpoint=
 URL, but draft -05 makes no promises as to its content, form, or structure=
, though it does contain implementor's notes on possible methods.
>
> Two questions arise from this change:
> - The semantics of returning the client manipulation URL
> - The syntax (derived from HAL for JSON [2], an individual I-D submission=
)
>
> On semantics:
>
> Pro:
> - The server has flexibility on how to define the "update" endpoint, send=
ing all clients to one URL, sending different clients to different URLs, or=
 sending clients to a URL with a baked-in query parameter
> - The client can take the URL as-is and use it for all management operati=
ons (ie, it doesn't have to generate or compose the URL based on component =
parts)
>
> Con:
> - The client must remember one more piece of information from the server =
at runtime if it wants to do manipulation and management of itself at the s=
erver (in addition to client_id, client_secret, registration_access_token, =
and others)
>
> Alternatives include specifying a URL pattern for the server to use and a=
ll clients to follow, specifying a query parameter for the update action, a=
nd specifying a separate endpoint entirely and using the presence of items =
such as client_id and the registration access token to differentiate the re=
quests. Note that *all* of these alternatives can be accommodated using the=
 semantics described above, with the same actions on the client's part.
>
>
> On syntax:
>
> Pro:
> - Follows the designs of RFC5988 for link relations
> - The HAL format is general, and allows for all kinds of other informatio=
n to be placed inside the _links structure
> - Allows for full use of the JSON object to specify advanced operations o=
n the returned endpoint if desired
>
> Con:
> - The rest of OAuth doesn't follow link relation guidelines (though it's =
been brought up)
> - The HAL format is general, and allows for all kinds of other informatio=
n to be placed inside the _links structure
> - The HAL-JSON document is an expired individual I-D, and it's unclear wh=
at wider adoption looks like right now
>
> Alternatives include returning the URL as a separate data member (registr=
ation_update_url), using HTTP headers, or using JSON Schema.
>
> -- Justin
>
>
>
> [1] http://tools.ietf.org/html/draft-ietf-oauth-dyn-reg-05
> [2] http://tools.ietf.org/html/draft-kelly-json-hal-03
> _______________________________________________
> OAuth mailing list
> OAuth@ietf.org
> https://www.ietf.org/mailman/listinfo/oauth
>
>
> _______________________________________________
> OAuth mailing list
> OAuth@ietf.org
> https://www.ietf.org/mailman/listinfo/oauth
>
>
>
>
> _______________________________________________
> OAuth mailing list
> OAuth@ietf.org
> https://www.ietf.org/mailman/listinfo/oauth
>



--
Nat Sakimura (=3Dnat)
Chairman, OpenID Foundation
http://nat.sakimura.org/
@_nat_en

From sakimura@gmail.com  Tue Feb 12 09:15:05 2013
Return-Path: <sakimura@gmail.com>
X-Original-To: oauth@ietfa.amsl.com
Delivered-To: oauth@ietfa.amsl.com
Received: from localhost (localhost [127.0.0.1]) by ietfa.amsl.com (Postfix) with ESMTP id F372B21F8CF5 for <oauth@ietfa.amsl.com>; Tue, 12 Feb 2013 09:15:04 -0800 (PST)
X-Virus-Scanned: amavisd-new at amsl.com
X-Spam-Flag: NO
X-Spam-Score: -2.033
X-Spam-Level: 
X-Spam-Status: No, score=-2.033 tagged_above=-999 required=5 tests=[AWL=0.567,  BAYES_00=-2.599, NO_RELAYS=-0.001]
Received: from mail.ietf.org ([64.170.98.30]) by localhost (ietfa.amsl.com [127.0.0.1]) (amavisd-new, port 10024) with ESMTP id sY9zUoDQDGP8 for <oauth@ietfa.amsl.com>; Tue, 12 Feb 2013 09:15:04 -0800 (PST)
Received: from mail-la0-x233.google.com (la-in-x0233.1e100.net [IPv6:2a00:1450:4010:c03::233]) by ietfa.amsl.com (Postfix) with ESMTP id E762021F8945 for <oauth@ietf.org>; Tue, 12 Feb 2013 09:15:03 -0800 (PST)
Received: by mail-la0-f51.google.com with SMTP id fo13so306729lab.24 for <oauth@ietf.org>; Tue, 12 Feb 2013 09:15:02 -0800 (PST)
DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=gmail.com; s=20120113; h=mime-version:x-received:in-reply-to:references:date:message-id :subject:from:to:cc:content-type; bh=WCOU1v/sONpm430eCqD0GbIRdtlfFrWqwK34pGhzCxc=; b=Xk2Je3lq3c49tEZX9w/zhh3S6SGFGo7H7OP1YIqiLQwPbZF7M9nsG9IlewefBQRrpO b0/7ThXlBwDHnmCTWo4jA+r7CuKztpCciU/u10fZXPjEgfvmrA3fw/xvnFi6iCPaUNiA xZ0i6tUjPCJO6Hk3OecxSCrBgWgz6uRzQqxEQHdAgvWbFVD8s1U2HBClp2VkR8YpWZ80 pmh7t1RkCdmgoIMD5O31MjfHA99lZTpXwJ6Vm/aZn2EHeRFBp0zX9KNI2pMox+dCPsUn h7braraWvxtAeL8UKADEG4gQz8PjtJnpi0STXwDHxHKL3fEib87Um45GlKEReT1dpZ9M FkkQ==
MIME-Version: 1.0
X-Received: by 10.152.109.112 with SMTP id hr16mr14200127lab.38.1360689302678;  Tue, 12 Feb 2013 09:15:02 -0800 (PST)
Received: by 10.112.14.44 with HTTP; Tue, 12 Feb 2013 09:15:02 -0800 (PST)
In-Reply-To: <511A705F.4070204@mitre.org>
References: <51195F36.6040705@mitre.org> <780F8C26-19A4-4301-B350-307D9FFF69CD@ve7jtb.com> <80727F20-A830-4778-B11C-D45389310646@lodderstedt.net> <511A5742.30707@mitre.org> <B054D3FD-B4F6-4C57-8ED3-402F936DE17F@ve7jtb.com> <511A705F.4070204@mitre.org>
Date: Wed, 13 Feb 2013 02:15:02 +0900
Message-ID: <CABzCy2AaHeVQ+h18FaT8S1z9+EUbVE0WfCf63ra=7s6=f5ExLg@mail.gmail.com>
From: Nat Sakimura <sakimura@gmail.com>
To: Justin Richer <jricher@mitre.org>
Content-Type: text/plain; charset=ISO-8859-1
Cc: "oauth@ietf.org" <oauth@ietf.org>
Subject: Re: [OAUTH-WG] Registration: RESTful client lifecycle management
X-BeenThere: oauth@ietf.org
X-Mailman-Version: 2.1.12
Precedence: list
List-Id: OAUTH WG <oauth.ietf.org>
List-Unsubscribe: <https://www.ietf.org/mailman/options/oauth>, <mailto:oauth-request@ietf.org?subject=unsubscribe>
List-Archive: <http://www.ietf.org/mail-archive/web/oauth>
List-Post: <mailto:oauth@ietf.org>
List-Help: <mailto:oauth-request@ietf.org?subject=help>
List-Subscribe: <https://www.ietf.org/mailman/listinfo/oauth>, <mailto:oauth-request@ietf.org?subject=subscribe>
X-List-Received-Date: Tue, 12 Feb 2013 17:15:05 -0000

2013/2/13 Justin Richer <jricher@mitre.org>:
>
> On 02/12/2013 11:30 AM, John Bradley wrote:
>>
>> To some extent we want the server to have the flexibility it needs.
>>
>> If the server knows it is going to need client_id for GET it needs to
>> encode it in the resource URI ether as part of the path or as a query
>> parameter (that is up to the server)
>>
>> When doing updates the client MUST include the client_id as an additional
>> integrity check.  Some servers may switch on that but that is up to them.
>
> So if by this you mean that the client still simply follows whatever update
> url the server hands it (which may or may not include the client_id in some
> form, but the client doesn't care), and that the client MUST include its
> client_id in the request body (top-level member of a JSON object, at the
> moment) when doing a PUT (or POST/PATCH? see below) for the update action,
> then I'm totally fine with that. Is this what you're suggesting?

As far as I understand, yes. That is what we discussed last Thursday
face to face.


-- 
Nat Sakimura (=nat)
Chairman, OpenID Foundation
http://nat.sakimura.org/
@_nat_en

From sakimura@gmail.com  Tue Feb 12 09:17:32 2013
Return-Path: <sakimura@gmail.com>
X-Original-To: oauth@ietfa.amsl.com
Delivered-To: oauth@ietfa.amsl.com
Received: from localhost (localhost [127.0.0.1]) by ietfa.amsl.com (Postfix) with ESMTP id 3417C21F9001 for <oauth@ietfa.amsl.com>; Tue, 12 Feb 2013 09:17:32 -0800 (PST)
X-Virus-Scanned: amavisd-new at amsl.com
X-Spam-Flag: NO
X-Spam-Score: -3.011
X-Spam-Level: 
X-Spam-Status: No, score=-3.011 tagged_above=-999 required=5 tests=[AWL=0.589,  BAYES_00=-2.599, RCVD_IN_DNSWL_LOW=-1]
Received: from mail.ietf.org ([64.170.98.30]) by localhost (ietfa.amsl.com [127.0.0.1]) (amavisd-new, port 10024) with ESMTP id adNqkpI1l+LW for <oauth@ietfa.amsl.com>; Tue, 12 Feb 2013 09:17:31 -0800 (PST)
Received: from mail-lb0-f172.google.com (mail-lb0-f172.google.com [209.85.217.172]) by ietfa.amsl.com (Postfix) with ESMTP id 46EDC21F8FF6 for <oauth@ietf.org>; Tue, 12 Feb 2013 09:17:31 -0800 (PST)
Received: by mail-lb0-f172.google.com with SMTP id n8so292877lbj.31 for <oauth@ietf.org>; Tue, 12 Feb 2013 09:17:30 -0800 (PST)
DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=gmail.com; s=20120113; h=mime-version:x-received:in-reply-to:references:date:message-id :subject:from:to:content-type; bh=86I2xlyrXxu3HCS4gBDzkfXTUfp1P8bZ+dziBK2VezU=; b=u3EfS39vOqn93javUTrcAhOcTF7Aq0DgertNdGhYimKbTfUOpIMlDgiJXKWDM1y8YO uXf+krWui1FyontB/z4ZTaH78jkUJJWuNdiOsNx171rmkDQdt0rzWuluRFoQsda3zdR9 empKaYMA3ASCX19n87/U0Ovt7ubFi/xg4CMGh8XfkyJStFnLUyRnUZcA7lOiowpQcUai OqmPZGK9jkAxy2nHARHmpKfKxp309RU4v/17pH0Mwa5ERFMdt+CX6yRcrxSR1FM8+hjc kVpZEnGyhG/2oeLpzRSat+RHsHbF4MfYQG10SdVi7WuuzpJnrUHr8rR+/yRoE/067JZR 1lbQ==
MIME-Version: 1.0
X-Received: by 10.112.41.101 with SMTP id e5mr7306688lbl.120.1360689445893; Tue, 12 Feb 2013 09:17:25 -0800 (PST)
Received: by 10.112.14.44 with HTTP; Tue, 12 Feb 2013 09:17:25 -0800 (PST)
In-Reply-To: <20130212163841.4897.30278.idtracker@ietfa.amsl.com>
References: <20130212163841.4897.30278.idtracker@ietfa.amsl.com>
Date: Wed, 13 Feb 2013 02:17:25 +0900
Message-ID: <CABzCy2A2iJh9_FsNTAS+2yWaoqKaZxsYeZWhTiwXXRG14dtA1A@mail.gmail.com>
From: Nat Sakimura <sakimura@gmail.com>
To: oauth <oauth@ietf.org>
Content-Type: text/plain; charset=ISO-8859-1
Subject: [OAUTH-WG] Fwd: New Version Notification for draft-sakimura-oauth-meta-02.txt
X-BeenThere: oauth@ietf.org
X-Mailman-Version: 2.1.12
Precedence: list
List-Id: OAUTH WG <oauth.ietf.org>
List-Unsubscribe: <https://www.ietf.org/mailman/options/oauth>, <mailto:oauth-request@ietf.org?subject=unsubscribe>
List-Archive: <http://www.ietf.org/mail-archive/web/oauth>
List-Post: <mailto:oauth@ietf.org>
List-Help: <mailto:oauth-request@ietf.org?subject=help>
List-Subscribe: <https://www.ietf.org/mailman/listinfo/oauth>, <mailto:oauth-request@ietf.org?subject=subscribe>
X-List-Received-Date: Tue, 12 Feb 2013 17:17:32 -0000

This is the second rev of the metadata spec that we discussed at IETF
85 OAuth WG and subsequently the chairs asked for the draft.

Nat


---------- Forwarded message ----------
From:  <internet-drafts@ietf.org>
Date: 2013/2/13
Subject: New Version Notification for draft-sakimura-oauth-meta-02.txt
To: sakimura@gmail.com
Cc: mike@stateless.co



A new version of I-D, draft-sakimura-oauth-meta-02.txt
has been successfully submitted by Nat Sakimura and posted to the
IETF repository.

Filename:        draft-sakimura-oauth-meta
Revision:        02
Title:           JSON Metadata for OAuth Responses 1.0
Creation date:   2013-02-12
WG ID:           Individual Submission
Number of pages: 10
URL:
http://www.ietf.org/internet-drafts/draft-sakimura-oauth-meta-02.txt
Status:          http://datatracker.ietf.org/doc/draft-sakimura-oauth-meta
Htmlized:        http://tools.ietf.org/html/draft-sakimura-oauth-meta-02
Diff:            http://www.ietf.org/rfcdiff?url2=draft-sakimura-oauth-meta-02

Abstract:
   This specification defines an extensible metadata member that may be
   inserted into the OAuth 2.0 responses to assist the clients to
   process those responses.  It is expressed as a member called "_links"
   that is inserted as the top level member in the responses.  It will
   allow the client to learn where the members in the response could be
   used and how, etc.  Since it is just a member, any client that does
   not understand this extension should not break and work normally
   while supporting clients can utilize the metadata to its advantage.




The IETF Secretariat



-- 
Nat Sakimura (=nat)
Chairman, OpenID Foundation
http://nat.sakimura.org/
@_nat_en

From phil.hunt@oracle.com  Tue Feb 12 09:30:58 2013
Return-Path: <phil.hunt@oracle.com>
X-Original-To: oauth@ietfa.amsl.com
Delivered-To: oauth@ietfa.amsl.com
Received: from localhost (localhost [127.0.0.1]) by ietfa.amsl.com (Postfix) with ESMTP id BC20921F9019 for <oauth@ietfa.amsl.com>; Tue, 12 Feb 2013 09:30:58 -0800 (PST)
X-Virus-Scanned: amavisd-new at amsl.com
X-Spam-Flag: NO
X-Spam-Score: -6.355
X-Spam-Level: 
X-Spam-Status: No, score=-6.355 tagged_above=-999 required=5 tests=[AWL=0.244,  BAYES_00=-2.599, RCVD_IN_DNSWL_MED=-4]
Received: from mail.ietf.org ([64.170.98.30]) by localhost (ietfa.amsl.com [127.0.0.1]) (amavisd-new, port 10024) with ESMTP id 8HbPaC+gODAF for <oauth@ietfa.amsl.com>; Tue, 12 Feb 2013 09:30:57 -0800 (PST)
Received: from aserp1040.oracle.com (aserp1040.oracle.com [141.146.126.69]) by ietfa.amsl.com (Postfix) with ESMTP id C9FC521F9016 for <oauth@ietf.org>; Tue, 12 Feb 2013 09:30:57 -0800 (PST)
Received: from acsinet21.oracle.com (acsinet21.oracle.com [141.146.126.237]) by aserp1040.oracle.com (Sentrion-MTA-4.3.1/Sentrion-MTA-4.3.1) with ESMTP id r1CHUsAJ008432 (version=TLSv1/SSLv3 cipher=DHE-RSA-AES256-SHA bits=256 verify=OK); Tue, 12 Feb 2013 17:30:55 GMT
Received: from acsmt357.oracle.com (acsmt357.oracle.com [141.146.40.157]) by acsinet21.oracle.com (8.14.4+Sun/8.14.4) with ESMTP id r1CHUsFv009830 (version=TLSv1/SSLv3 cipher=DHE-RSA-AES256-SHA bits=256 verify=NO); Tue, 12 Feb 2013 17:30:54 GMT
Received: from abhmt118.oracle.com (abhmt118.oracle.com [141.146.116.70]) by acsmt357.oracle.com (8.12.11.20060308/8.12.11) with ESMTP id r1CHUqqs026761; Tue, 12 Feb 2013 11:30:54 -0600
Received: from [192.168.1.14] (/24.85.226.208) by default (Oracle Beehive Gateway v4.0) with ESMTP ; Tue, 12 Feb 2013 09:30:52 -0800
Mime-Version: 1.0 (Apple Message framework v1283)
Content-Type: text/plain; charset=us-ascii
From: Phil Hunt <phil.hunt@oracle.com>
In-Reply-To: <0573984A-8C11-4960-9BC6-F44D4B664C19@gmx.net>
Date: Tue, 12 Feb 2013 09:30:50 -0800
Content-Transfer-Encoding: quoted-printable
Message-Id: <E808B6AC-D5F6-479F-967D-EA6B2586BE64@oracle.com>
References: <0573984A-8C11-4960-9BC6-F44D4B664C19@gmx.net>
To: Hannes Tschofenig <hannes.tschofenig@gmx.net>
X-Mailer: Apple Mail (2.1283)
X-Source-IP: acsinet21.oracle.com [141.146.126.237]
Cc: IETF oauth WG <oauth@ietf.org>
Subject: Re: [OAUTH-WG] Minutes from the OAuth Design Team Conference Call - 11th February 2013
X-BeenThere: oauth@ietf.org
X-Mailman-Version: 2.1.12
Precedence: list
List-Id: OAUTH WG <oauth.ietf.org>
List-Unsubscribe: <https://www.ietf.org/mailman/options/oauth>, <mailto:oauth-request@ietf.org?subject=unsubscribe>
List-Archive: <http://www.ietf.org/mail-archive/web/oauth>
List-Post: <mailto:oauth@ietf.org>
List-Help: <mailto:oauth-request@ietf.org?subject=help>
List-Subscribe: <https://www.ietf.org/mailman/listinfo/oauth>, <mailto:oauth-request@ietf.org?subject=subscribe>
X-List-Received-Date: Tue, 12 Feb 2013 17:30:58 -0000

Clarification.  I think Justin and I were in agreement that we don't =
want to see a format that requires JSON payloads.  We are both =
interested in a JSON token used in the authorization header that could =
be based on a computed signature of some combination of http headers and =
body if possible.

Phil

@independentid
www.independentid.com
phil.hunt@oracle.com





On 2013-02-12, at 1:10 AM, Hannes Tschofenig wrote:

> Here are my notes.=20
>=20
> Participants:
>=20
> * John Bradley
> * Derek Atkins
> * Phil Hunt
> * Prateek Mishra
> * Hannes Tschofenig
> * Mike Jones
> * Antonio Sanso
> * Justin Richer
>=20
> Notes:=20
>=20
> My slides are available here: =
http://www.tschofenig.priv.at/OAuth2-Security-11Feb2013.ppt
>=20
> Slide #2 summarizes earlier discussions during the conference calls.=20=

>=20
> -- HTTP vs. JSON
>=20
> Phil noted that he does not like to use the MAC Token draft as a =
starting point because it does not re-use any of the work done in the =
JOSE working group and in particular all the libraries that are =
available today. He mentioned that earlier attempts to write the MAC =
Token code lead to problems for implementers.=20
>=20
> Justin responded that he does not agree with using JSON as a transport =
mechanism since this would replicate a SOAP style.=20
>=20
> Phil noted that he wants to send JSON but the signature shall be =
computed over the HTTP header field.=20
>=20
> -- Flexibility for the keyed message digest computation
>=20
> =46rom earlier discussion it was clear that the conference call =
participants wanted more flexibility regarding the keyed message digest =
computation. For this purpose Hannes presented the DKIM based approach, =
which allows selective header fields to be included in the digest. This =
is shown in slide #4.=20
>=20
> After some discussion the conference call participants thought that =
this would meet their needs. Further investigations would still be =
useful to determine the degree of failed HMAC calculations due to HTTP =
proxies modifying the content.=20
>=20
> -- Key Distribution
>=20
> Hannes presented the open issue regarding the choice of key =
distribution. Slides #6-#8 present three techniques and Hannes asked for =
feedback regarding the preferred style. Justin and others didn't see the =
need to decide on one mechanism - they wanted to keep the choice open. =
Derek indicated that this will not be an acceptable approach. Since the =
resource server and the authorization server may, in the OAuth 2.0 =
framework, be entities produced by different vendors there is an =
interoperability need. Justin responded that he disagrees and that the =
resource server needs to understand the access token and referred to the =
recent draft submission for the token introspection endpoint. Derek =
indicated that the resource server has to understand the content of the =
access token and the token introspection endpoint just pushes the =
problem around: the resource server has to send the access token to the =
authorization server and then the resource server gets the result back =
(which he then a
> gain needs to understand) in order to make a meaningful authorization =
decision.=20
>=20
> Everyone agreed that the client must receive the session key from the =
authorization server and that this approach has to be standardized. It =
was also agreed that this is a common approach among all three key =
distribution mechanisms.
>=20
> Hannes asked the participants to think about their preference.=20
>=20
> The questions regarding key naming and the indication for the intended =
resource server the client wants to talk to have been postponed.=20
>=20
> Ciao
> Hannes
>=20
>=20
> _______________________________________________
> OAuth mailing list
> OAuth@ietf.org
> https://www.ietf.org/mailman/listinfo/oauth


From jricher@mitre.org  Tue Feb 12 09:35:16 2013
Return-Path: <jricher@mitre.org>
X-Original-To: oauth@ietfa.amsl.com
Delivered-To: oauth@ietfa.amsl.com
Received: from localhost (localhost [127.0.0.1]) by ietfa.amsl.com (Postfix) with ESMTP id 880EA21F9013 for <oauth@ietfa.amsl.com>; Tue, 12 Feb 2013 09:35:16 -0800 (PST)
X-Virus-Scanned: amavisd-new at amsl.com
X-Spam-Flag: NO
X-Spam-Score: -6.573
X-Spam-Level: 
X-Spam-Status: No, score=-6.573 tagged_above=-999 required=5 tests=[AWL=0.026,  BAYES_00=-2.599, RCVD_IN_DNSWL_MED=-4]
Received: from mail.ietf.org ([64.170.98.30]) by localhost (ietfa.amsl.com [127.0.0.1]) (amavisd-new, port 10024) with ESMTP id RyXHHvDs5TmW for <oauth@ietfa.amsl.com>; Tue, 12 Feb 2013 09:35:15 -0800 (PST)
Received: from smtpksrv1.mitre.org (smtpksrv1.mitre.org [198.49.146.77]) by ietfa.amsl.com (Postfix) with ESMTP id 9549721F9011 for <oauth@ietf.org>; Tue, 12 Feb 2013 09:35:15 -0800 (PST)
Received: from smtpksrv1.mitre.org (localhost.localdomain [127.0.0.1]) by localhost (Postfix) with SMTP id 169BA1F08B4; Tue, 12 Feb 2013 12:35:15 -0500 (EST)
Received: from IMCCAS03.MITRE.ORG (imccas03.mitre.org [129.83.29.80]) by smtpksrv1.mitre.org (Postfix) with ESMTP id F2A1A1F0431; Tue, 12 Feb 2013 12:35:14 -0500 (EST)
Received: from [10.146.15.29] (129.83.31.58) by IMCCAS03.MITRE.ORG (129.83.29.80) with Microsoft SMTP Server (TLS) id 14.2.318.4; Tue, 12 Feb 2013 12:35:14 -0500
Message-ID: <511A7D27.8010209@mitre.org>
Date: Tue, 12 Feb 2013 12:34:31 -0500
From: Justin Richer <jricher@mitre.org>
User-Agent: Mozilla/5.0 (X11; Linux i686; rv:17.0) Gecko/20130106 Thunderbird/17.0.2
MIME-Version: 1.0
To: Phil Hunt <phil.hunt@oracle.com>
References: <0573984A-8C11-4960-9BC6-F44D4B664C19@gmx.net> <E808B6AC-D5F6-479F-967D-EA6B2586BE64@oracle.com>
In-Reply-To: <E808B6AC-D5F6-479F-967D-EA6B2586BE64@oracle.com>
Content-Type: text/plain; charset="ISO-8859-1"; format=flowed
Content-Transfer-Encoding: quoted-printable
X-Originating-IP: [129.83.31.58]
Cc: IETF oauth WG <oauth@ietf.org>
Subject: Re: [OAUTH-WG] Minutes from the OAuth Design Team Conference Call - 11th February 2013
X-BeenThere: oauth@ietf.org
X-Mailman-Version: 2.1.12
Precedence: list
List-Id: OAUTH WG <oauth.ietf.org>
List-Unsubscribe: <https://www.ietf.org/mailman/options/oauth>, <mailto:oauth-request@ietf.org?subject=unsubscribe>
List-Archive: <http://www.ietf.org/mail-archive/web/oauth>
List-Post: <mailto:oauth@ietf.org>
List-Help: <mailto:oauth-request@ietf.org?subject=help>
List-Subscribe: <https://www.ietf.org/mailman/listinfo/oauth>, <mailto:oauth-request@ietf.org?subject=subscribe>
X-List-Received-Date: Tue, 12 Feb 2013 17:35:16 -0000

That's my reading of it as well, Phil, thanks for providing the=20
clarification. One motivator behind using a JSON-based token is to be=20
able to re-use some of the great work that the JOSE group is doing but=20
apply it to an HTTP payload.

What neither of us want is a token type that requires stuffing all=20
query, header, and other parameters *into* the JSON object itself, which =

would be a more SOAPy approach.

  -- Justin

On 02/12/2013 12:30 PM, Phil Hunt wrote:
> Clarification.  I think Justin and I were in agreement that we don't wa=
nt to see a format that requires JSON payloads.  We are both interested i=
n a JSON token used in the authorization header that could be based on a =
computed signature of some combination of http headers and body if possib=
le.
>
> Phil
>
> @independentid
> www.independentid.com
> phil.hunt@oracle.com
>
>
>
>
>
> On 2013-02-12, at 1:10 AM, Hannes Tschofenig wrote:
>
>> Here are my notes.
>>
>> Participants:
>>
>> * John Bradley
>> * Derek Atkins
>> * Phil Hunt
>> * Prateek Mishra
>> * Hannes Tschofenig
>> * Mike Jones
>> * Antonio Sanso
>> * Justin Richer
>>
>> Notes:
>>
>> My slides are available here: http://www.tschofenig.priv.at/OAuth2-Sec=
urity-11Feb2013.ppt
>>
>> Slide #2 summarizes earlier discussions during the conference calls.
>>
>> -- HTTP vs. JSON
>>
>> Phil noted that he does not like to use the MAC Token draft as a start=
ing point because it does not re-use any of the work done in the JOSE wor=
king group and in particular all the libraries that are available today. =
He mentioned that earlier attempts to write the MAC Token code lead to pr=
oblems for implementers.
>>
>> Justin responded that he does not agree with using JSON as a transport=
 mechanism since this would replicate a SOAP style.
>>
>> Phil noted that he wants to send JSON but the signature shall be compu=
ted over the HTTP header field.
>>
>> -- Flexibility for the keyed message digest computation
>>
>>  From earlier discussion it was clear that the conference call partici=
pants wanted more flexibility regarding the keyed message digest computat=
ion. For this purpose Hannes presented the DKIM based approach, which all=
ows selective header fields to be included in the digest. This is shown i=
n slide #4.
>>
>> After some discussion the conference call participants thought that th=
is would meet their needs. Further investigations would still be useful t=
o determine the degree of failed HMAC calculations due to HTTP proxies mo=
difying the content.
>>
>> -- Key Distribution
>>
>> Hannes presented the open issue regarding the choice of key distributi=
on. Slides #6-#8 present three techniques and Hannes asked for feedback r=
egarding the preferred style. Justin and others didn't see the need to de=
cide on one mechanism - they wanted to keep the choice open. Derek indica=
ted that this will not be an acceptable approach. Since the resource serv=
er and the authorization server may, in the OAuth 2.0 framework, be entit=
ies produced by different vendors there is an interoperability need. Just=
in responded that he disagrees and that the resource server needs to unde=
rstand the access token and referred to the recent draft submission for t=
he token introspection endpoint. Derek indicated that the resource server=
 has to understand the content of the access token and the token introspe=
ction endpoint just pushes the problem around: the resource server has to=
 send the access token to the authorization server and then the resource =
server gets the result back (which he then
>    a
>> gain needs to understand) in order to make a meaningful authorization =
decision.
>>
>> Everyone agreed that the client must receive the session key from the =
authorization server and that this approach has to be standardized. It wa=
s also agreed that this is a common approach among all three key distribu=
tion mechanisms.
>>
>> Hannes asked the participants to think about their preference.
>>
>> The questions regarding key naming and the indication for the intended=
 resource server the client wants to talk to have been postponed.
>>
>> Ciao
>> Hannes
>>
>>
>> _______________________________________________
>> OAuth mailing list
>> OAuth@ietf.org
>> https://www.ietf.org/mailman/listinfo/oauth
> _______________________________________________
> OAuth mailing list
> OAuth@ietf.org
> https://www.ietf.org/mailman/listinfo/oauth



From Michael.Jones@microsoft.com  Tue Feb 12 09:57:01 2013
Return-Path: <Michael.Jones@microsoft.com>
X-Original-To: oauth@ietfa.amsl.com
Delivered-To: oauth@ietfa.amsl.com
Received: from localhost (localhost [127.0.0.1]) by ietfa.amsl.com (Postfix) with ESMTP id D4DF821F9039 for <oauth@ietfa.amsl.com>; Tue, 12 Feb 2013 09:57:01 -0800 (PST)
X-Virus-Scanned: amavisd-new at amsl.com
X-Spam-Flag: NO
X-Spam-Score: -2.164
X-Spam-Level: 
X-Spam-Status: No, score=-2.164 tagged_above=-999 required=5 tests=[AWL=-0.166, BAYES_00=-2.599, HTML_MESSAGE=0.001, J_CHICKENPOX_82=0.6]
Received: from mail.ietf.org ([64.170.98.30]) by localhost (ietfa.amsl.com [127.0.0.1]) (amavisd-new, port 10024) with ESMTP id pr6fzW7jFD9l for <oauth@ietfa.amsl.com>; Tue, 12 Feb 2013 09:57:00 -0800 (PST)
Received: from na01-by2-obe.outbound.protection.outlook.com (na01-by2-obe.ptr.protection.outlook.com [207.46.100.32]) by ietfa.amsl.com (Postfix) with ESMTP id 07C5521F9030 for <oauth@ietf.org>; Tue, 12 Feb 2013 09:56:54 -0800 (PST)
Received: from BL2FFO11FD020.protection.gbl (10.173.161.204) by BL2FFO11HUB005.protection.gbl (10.173.160.225) with Microsoft SMTP Server (TLS) id 15.0.620.12; Tue, 12 Feb 2013 17:56:52 +0000
Received: from TK5EX14HUBC106.redmond.corp.microsoft.com (131.107.125.37) by BL2FFO11FD020.mail.protection.outlook.com (10.173.161.38) with Microsoft SMTP Server (TLS) id 15.0.620.12 via Frontend Transport; Tue, 12 Feb 2013 17:56:52 +0000
Received: from TK5EX14MBXC285.redmond.corp.microsoft.com ([169.254.3.232]) by TK5EX14HUBC106.redmond.corp.microsoft.com ([157.54.80.61]) with mapi id 14.02.0318.003; Tue, 12 Feb 2013 17:56:15 +0000
From: Mike Jones <Michael.Jones@microsoft.com>
To: John Bradley <ve7jtb@ve7jtb.com>, Justin Richer <jricher@mitre.org>
Thread-Topic: [OAUTH-WG] Registration: Client secret rotation
Thread-Index: AQHOCJ0LDzoQT/UaG0SbLONUo4RclZh1a0HAgAAH9QCAANZaAIAAHvMAgAAawhw=
Date: Tue, 12 Feb 2013 17:56:14 +0000
Message-ID: <4E1F6AAD24975D4BA5B168042967394367443619@TK5EX14MBXC285.redmond.corp.microsoft.com>
References: <51195F3F.7000704@mitre.org> <4E1F6AAD24975D4BA5B16804296739436743E371@TK5EX14MBXC285.redmond.corp.microsoft.com> <7FB7A108-EA9E-429A-BD86-7E09EA206748@ve7jtb.com> <511A51D6.9040604@mitre.org>, <9FC3A5CD-B4EC-4CA2-8082-FAC65C499B3B@ve7jtb.com>
In-Reply-To: <9FC3A5CD-B4EC-4CA2-8082-FAC65C499B3B@ve7jtb.com>
Accept-Language: en-US
Content-Language: en-US
X-MS-Has-Attach: 
X-MS-TNEF-Correlator: 
Content-Type: multipart/alternative; boundary="_000_4E1F6AAD24975D4BA5B168042967394367443619TK5EX14MBXC285r_"
MIME-Version: 1.0
X-Forefront-Antispam-Report: CIP:131.107.125.37; CTRY:US; IPV:CAL; IPV:NLI; EFV:NLI; SFV:NSPM; SFS:(24454001)(51704002)(55885001)(479174001)(377424002)(377454001)(13464002)(199002)(189002)(49866001)(74662001)(16236675001)(79102001)(51856001)(44976002)(47976001)(47736001)(20776003)(512934001)(80022001)(56816002)(56776001)(65816001)(77982001)(15202345001)(47446002)(76482001)(46102001)(55846006)(16406001)(31966008)(5343655001)(63696002)(74502001)(53806001)(4396001)(54316002)(59766001)(54356001)(5343635001)(33656001)(50986001)(219293001); DIR:OUT; SFP:; SCL:1; SRVR:BL2FFO11HUB005; H:TK5EX14HUBC106.redmond.corp.microsoft.com; RD:InfoDomainNonexistent; A:1; MX:1; LANG:en; 
X-OriginatorOrg: microsoft.onmicrosoft.com
X-Forefront-PRVS: 0755F54DD9
Cc: "oauth@ietf.org" <oauth@ietf.org>
Subject: Re: [OAUTH-WG] Registration: Client secret rotation
X-BeenThere: oauth@ietf.org
X-Mailman-Version: 2.1.12
Precedence: list
List-Id: OAUTH WG <oauth.ietf.org>
List-Unsubscribe: <https://www.ietf.org/mailman/options/oauth>, <mailto:oauth-request@ietf.org?subject=unsubscribe>
List-Archive: <http://www.ietf.org/mail-archive/web/oauth>
List-Post: <mailto:oauth@ietf.org>
List-Help: <mailto:oauth-request@ietf.org?subject=help>
List-Subscribe: <https://www.ietf.org/mailman/listinfo/oauth>, <mailto:oauth-request@ietf.org?subject=subscribe>
X-List-Received-Date: Tue, 12 Feb 2013 17:57:02 -0000

--_000_4E1F6AAD24975D4BA5B168042967394367443619TK5EX14MBXC285r_
Content-Type: text/plain; charset="iso-8859-1"
Content-Transfer-Encoding: quoted-printable

+1

________________________________
From: John Bradley
Sent: 2/12/2013 8:20 AM
To: Justin Richer
Cc: Mike Jones; oauth@ietf.org
Subject: Re: [OAUTH-WG] Registration: Client secret rotation

Yes, that agrees with my thoughts on it.

John B.
On 2013-02-12, at 11:29 AM, Justin Richer <jricher@mitre.org> wrote:

> This is actually the approach that I favor now as well -- let the server =
do the secret rotation if it wants to, and have the client be prepared to r=
eceive a new client_secret or registration_access_token on any read or upda=
te request.
>
> This would necessitate changing the returned values, essentially collapsi=
ng the returns from the read/update and rotate actions into one structure t=
hat's closer to the one returned from initial registration. This has the ad=
ded benefit of parallelizing the responses for these three actions, which I=
 like as well.
>
> -- Justin
>
> On 02/11/2013 08:42 PM, John Bradley wrote:
>> OAuth doesn't say anything about client secrets other than they are prov=
isioned in a magic realm outside the OAuth spec (Getting in the mood for th=
e next IETF).
>>
>> Rotating client secrets was something I made up for connect because it s=
eemed like a good idea at the time given that someone breaking in to the re=
gistration endpoint could take over a connection.
>>
>> We later separated the authentication to the token endpoint from the reg=
istration endpoint,in what I think was a good move.
>>
>> It is sort of up to the authorization server to make decisions about rot=
ating client secrets, I expect that in the real world a client would try ac=
cess ing the token endpoint and get back a invalid_client error response an=
d then heck it's registration to see if the client_secret has changed.
>>
>> I suppose that a client could request rotating its secret if it thinks i=
t has been compromised,  however the compromiser is more likely to quickly =
change the secret to lock out the legitimate clients before the good one no=
tices.    I think the client wanting to rotate is enough of a edge case tha=
t it could deal with it out of band.
>>
>> Letting the server rotate the client secret according to what ever polic=
y it decides is best is probably safest.
>>
>> We didn't have anything for rotating the access token.  I suspect that r=
otating it under the clients control is going to create as many problems as=
 it solves.
>>
>> If you want to rotate it,  make it a refresh token that is issues and us=
e OAuth to provide access tokens from the token endpoint.   Creating a new =
endpoint to duplicate existing OAuth functionality is overkill.
>>
>> John B.
>> On 2013-02-11, at 10:18 PM, Mike Jones <Michael.Jones@microsoft.com> wro=
te:
>>
>>> The rotate_secret operation was added to OpenID Connect Registration as=
 a workaround to the fact that registration updates used to be authenticate=
d using the client secret, so it seemed overly dangerous to have an update =
operation potentially return an updated secret and have the secret be lost =
due to communication problems - leaving the client stranded.  Since then, r=
egistration was changed to use a bearer token to authenticate update operat=
ions, and so this failure mode can't occur anymore.  It was an omission not=
 to have deleted the unneeded operation then.
>>>
>>> It's been deleted from OpenID Connect Registration and should likewise =
be deleted from OAuth registration, since it is unneeded.  If a new client =
secret is needed, there's nothing stopping the registration server from ret=
urning it in the result of an update operation.
>>>
>>>                              -- Mike
>>>
>>> -----Original Message-----
>>> From: oauth-bounces@ietf.org [mailto:oauth-bounces@ietf.org] On Behalf =
Of Justin Richer
>>> Sent: Monday, February 11, 2013 1:15 PM
>>> To: oauth@ietf.org
>>> Subject: [OAUTH-WG] Registration: Client secret rotation
>>>
>>> Draft -05 of OAuth Dynamic Client Registration [1] defines a means of t=
he client requesting a new client_secret (if applicable) and a new registra=
tion_access_token. Client secrets MAY expire after some period of time, and=
 this method allows for a refresh of that secret. Draft -00 defined no such=
 operation, drafts -01 through -04 defined this operation in terms of the o=
peration=3Drotate_secret parameter, and draft -05 defines it through a seco=
ndary endpoint, the Client Secret Rotation Endpoint.
>>> This raises several questions:
>>>
>>>  - Should the client be allowed to request rotation of its secret?
>>>  - Would a client ever take this action of its own accord?
>>>  - Can a server rotate the secret of the client without the client aski=
ng? (This seems to be an obvious "yes")
>>>
>>> Alternatives that keep this functionality include defining the rotate_s=
ecret operation in terms of an HTTP verb, a query parameter, or separate en=
dpoint. Alternatively, we could drop the rotate_secret operation all togeth=
er. If we do this, we have to decide if the client secret can still expire.=
 If it can, then we need a way for the client to get this new secret throug=
h a means that doesn't require it to request a change in secret, such as se=
nding it back as part of the client READ operation (see other thread on RES=
Tful verbs).
>>>
>>>  -- Justin
>>>
>>>
>>> [1] http://tools.ietf.org/html/draft-ietf-oauth-dyn-reg-05
>>> _______________________________________________
>>> OAuth mailing list
>>> OAuth@ietf.org
>>> https://www.ietf.org/mailman/listinfo/oauth
>>> _______________________________________________
>>> OAuth mailing list
>>> OAuth@ietf.org
>>> https://www.ietf.org/mailman/listinfo/oauth
>


--_000_4E1F6AAD24975D4BA5B168042967394367443619TK5EX14MBXC285r_
Content-Type: text/html; charset="iso-8859-1"
Content-Transfer-Encoding: quoted-printable

<html>
<head>
<meta http-equiv=3D"Content-Type" content=3D"text/html; charset=3Diso-8859-=
1">
<meta name=3D"Generator" content=3D"Microsoft Exchange Server">
<!-- converted from text --><style><!-- .EmailQuote { margin-left: 1pt; pad=
ding-left: 4pt; border-left: #800000 2px solid; } --></style>
</head>
<body>
<div>
<div>
<div style=3D"font-family:Calibri,sans-serif; font-size:11pt">&#43;1<br>
<br>
</div>
</div>
<hr>
<span style=3D"font-family:Tahoma,sans-serif; font-size:10pt; font-weight:b=
old">From:
</span><span style=3D"font-family:Tahoma,sans-serif; font-size:10pt">John B=
radley</span><br>
<span style=3D"font-family:Tahoma,sans-serif; font-size:10pt; font-weight:b=
old">Sent:
</span><span style=3D"font-family:Tahoma,sans-serif; font-size:10pt">2/12/2=
013 8:20 AM</span><br>
<span style=3D"font-family:Tahoma,sans-serif; font-size:10pt; font-weight:b=
old">To:
</span><span style=3D"font-family:Tahoma,sans-serif; font-size:10pt">Justin=
 Richer</span><br>
<span style=3D"font-family:Tahoma,sans-serif; font-size:10pt; font-weight:b=
old">Cc:
</span><span style=3D"font-family:Tahoma,sans-serif; font-size:10pt">Mike J=
ones; oauth@ietf.org</span><br>
<span style=3D"font-family:Tahoma,sans-serif; font-size:10pt; font-weight:b=
old">Subject:
</span><span style=3D"font-family:Tahoma,sans-serif; font-size:10pt">Re: [O=
AUTH-WG] Registration: Client secret rotation</span><br>
<br>
</div>
<font size=3D"2"><span style=3D"font-size:10pt;">
<div class=3D"PlainText">Yes, that agrees with my thoughts on it.<br>
<br>
John B.<br>
On 2013-02-12, at 11:29 AM, Justin Richer &lt;jricher@mitre.org&gt; wrote:<=
br>
<br>
&gt; This is actually the approach that I favor now as well -- let the serv=
er do the secret rotation if it wants to, and have the client be prepared t=
o receive a new client_secret or registration_access_token on any read or u=
pdate request.<br>
&gt; <br>
&gt; This would necessitate changing the returned values, essentially colla=
psing the returns from the read/update and rotate actions into one structur=
e that's closer to the one returned from initial registration. This has the=
 added benefit of parallelizing the
 responses for these three actions, which I like as well.<br>
&gt; <br>
&gt; -- Justin<br>
&gt; <br>
&gt; On 02/11/2013 08:42 PM, John Bradley wrote:<br>
&gt;&gt; OAuth doesn't say anything about client secrets other than they ar=
e provisioned in a magic realm outside the OAuth spec (Getting in the mood =
for the next IETF).<br>
&gt;&gt; <br>
&gt;&gt; Rotating client secrets was something I made up for connect becaus=
e it seemed like a good idea at the time given that someone breaking in to =
the registration endpoint could take over a connection.<br>
&gt;&gt; <br>
&gt;&gt; We later separated the authentication to the token endpoint from t=
he registration endpoint,in what I think was a good move.<br>
&gt;&gt; <br>
&gt;&gt; It is sort of up to the authorization server to make decisions abo=
ut rotating client secrets, I expect that in the real world a client would =
try access ing the token endpoint and get back a invalid_client error respo=
nse and then heck it's registration to
 see if the client_secret has changed.<br>
&gt;&gt; <br>
&gt;&gt; I suppose that a client could request rotating its secret if it th=
inks it has been compromised,&nbsp; however the compromiser is more likely =
to quickly change the secret to lock out the legitimate clients before the =
good one notices.&nbsp;&nbsp;&nbsp; I think the client wanting
 to rotate is enough of a edge case that it could deal with it out of band.=
<br>
&gt;&gt; <br>
&gt;&gt; Letting the server rotate the client secret according to what ever=
 policy it decides is best is probably safest.<br>
&gt;&gt; <br>
&gt;&gt; We didn't have anything for rotating the access token.&nbsp; I sus=
pect that rotating it under the clients control is going to create as many =
problems as it solves.<br>
&gt;&gt; <br>
&gt;&gt; If you want to rotate it,&nbsp; make it a refresh token that is is=
sues and use OAuth to provide access tokens from the token endpoint.&nbsp;&=
nbsp; Creating a new endpoint to duplicate existing OAuth functionality is =
overkill.<br>
&gt;&gt; <br>
&gt;&gt; John B.<br>
&gt;&gt; On 2013-02-11, at 10:18 PM, Mike Jones &lt;Michael.Jones@microsoft=
.com&gt; wrote:<br>
&gt;&gt; <br>
&gt;&gt;&gt; The rotate_secret operation was added to OpenID Connect Regist=
ration as a workaround to the fact that registration updates used to be aut=
henticated using the client secret, so it seemed overly dangerous to have a=
n update operation potentially return an
 updated secret and have the secret be lost due to communication problems -=
 leaving the client stranded.&nbsp; Since then, registration was changed to=
 use a bearer token to authenticate update operations, and so this failure =
mode can't occur anymore.&nbsp; It was an
 omission not to have deleted the unneeded operation then.<br>
&gt;&gt;&gt; <br>
&gt;&gt;&gt; It's been deleted from OpenID Connect Registration and should =
likewise be deleted from OAuth registration, since it is unneeded.&nbsp; If=
 a new client secret is needed, there's nothing stopping the registration s=
erver from returning it in the result of an update
 operation.<br>
&gt;&gt;&gt; <br>
&gt;&gt;&gt;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nb=
sp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;=
&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp; -- Mike<br>
&gt;&gt;&gt; <br>
&gt;&gt;&gt; -----Original Message-----<br>
&gt;&gt;&gt; From: oauth-bounces@ietf.org [<a href=3D"mailto:oauth-bounces@=
ietf.org">mailto:oauth-bounces@ietf.org</a>] On Behalf Of Justin Richer<br>
&gt;&gt;&gt; Sent: Monday, February 11, 2013 1:15 PM<br>
&gt;&gt;&gt; To: oauth@ietf.org<br>
&gt;&gt;&gt; Subject: [OAUTH-WG] Registration: Client secret rotation<br>
&gt;&gt;&gt; <br>
&gt;&gt;&gt; Draft -05 of OAuth Dynamic Client Registration [1] defines a m=
eans of the client requesting a new client_secret (if applicable) and a new=
 registration_access_token. Client secrets MAY expire after some period of =
time, and this method allows for a refresh
 of that secret. Draft -00 defined no such operation, drafts -01 through -0=
4 defined this operation in terms of the operation=3Drotate_secret paramete=
r, and draft -05 defines it through a secondary endpoint, the Client Secret=
 Rotation Endpoint.<br>
&gt;&gt;&gt; This raises several questions:<br>
&gt;&gt;&gt; <br>
&gt;&gt;&gt;&nbsp; - Should the client be allowed to request rotation of it=
s secret?<br>
&gt;&gt;&gt;&nbsp; - Would a client ever take this action of its own accord=
?<br>
&gt;&gt;&gt;&nbsp; - Can a server rotate the secret of the client without t=
he client asking? (This seems to be an obvious &quot;yes&quot;)<br>
&gt;&gt;&gt; <br>
&gt;&gt;&gt; Alternatives that keep this functionality include defining the=
 rotate_secret operation in terms of an HTTP verb, a query parameter, or se=
parate endpoint. Alternatively, we could drop the rotate_secret operation a=
ll together. If we do this, we have to decide
 if the client secret can still expire. If it can, then we need a way for t=
he client to get this new secret through a means that doesn't require it to=
 request a change in secret, such as sending it back as part of the client =
READ operation (see other thread
 on RESTful verbs).<br>
&gt;&gt;&gt; <br>
&gt;&gt;&gt;&nbsp; -- Justin<br>
&gt;&gt;&gt; <br>
&gt;&gt;&gt; <br>
&gt;&gt;&gt; [1] <a href=3D"http://tools.ietf.org/html/draft-ietf-oauth-dyn=
-reg-05">http://tools.ietf.org/html/draft-ietf-oauth-dyn-reg-05</a><br>
&gt;&gt;&gt; _______________________________________________<br>
&gt;&gt;&gt; OAuth mailing list<br>
&gt;&gt;&gt; OAuth@ietf.org<br>
&gt;&gt;&gt; <a href=3D"https://www.ietf.org/mailman/listinfo/oauth">https:=
//www.ietf.org/mailman/listinfo/oauth</a><br>
&gt;&gt;&gt; _______________________________________________<br>
&gt;&gt;&gt; OAuth mailing list<br>
&gt;&gt;&gt; OAuth@ietf.org<br>
&gt;&gt;&gt; <a href=3D"https://www.ietf.org/mailman/listinfo/oauth">https:=
//www.ietf.org/mailman/listinfo/oauth</a><br>
&gt; <br>
<br>
</div>
</span></font>
</body>
</html>

--_000_4E1F6AAD24975D4BA5B168042967394367443619TK5EX14MBXC285r_--

From torsten@lodderstedt.net  Tue Feb 12 10:02:43 2013
Return-Path: <torsten@lodderstedt.net>
X-Original-To: oauth@ietfa.amsl.com
Delivered-To: oauth@ietfa.amsl.com
Received: from localhost (localhost [127.0.0.1]) by ietfa.amsl.com (Postfix) with ESMTP id 8CB2D21F8FFA for <oauth@ietfa.amsl.com>; Tue, 12 Feb 2013 10:02:43 -0800 (PST)
X-Virus-Scanned: amavisd-new at amsl.com
X-Spam-Flag: NO
X-Spam-Score: -1.969
X-Spam-Level: 
X-Spam-Status: No, score=-1.969 tagged_above=-999 required=5 tests=[AWL=0.280,  BAYES_00=-2.599, HELO_EQ_DE=0.35]
Received: from mail.ietf.org ([64.170.98.30]) by localhost (ietfa.amsl.com [127.0.0.1]) (amavisd-new, port 10024) with ESMTP id GrSsdo8pMbub for <oauth@ietfa.amsl.com>; Tue, 12 Feb 2013 10:02:43 -0800 (PST)
Received: from smtprelay03.ispgateway.de (smtprelay03.ispgateway.de [80.67.31.26]) by ietfa.amsl.com (Postfix) with ESMTP id F1E7621F8FDF for <oauth@ietf.org>; Tue, 12 Feb 2013 10:02:42 -0800 (PST)
Received: from [91.2.75.145] (helo=[192.168.71.56]) by smtprelay03.ispgateway.de with esmtpsa (TLSv1:AES128-SHA:128) (Exim 4.68) (envelope-from <torsten@lodderstedt.net>) id 1U5KBk-0007Ij-1h; Tue, 12 Feb 2013 19:02:40 +0100
References: <51195F39.3040809@mitre.org> <4E1F6AAD24975D4BA5B16804296739436743E3DD@TK5EX14MBXC285.redmond.corp.microsoft.com> <BFDA9345-B4EF-4BA6-8CC6-249D82118D00@lodderstedt.net> <511A586B.9060606@mitre.org>
Mime-Version: 1.0 (1.0)
In-Reply-To: <511A586B.9060606@mitre.org>
Content-Type: text/plain; charset=us-ascii
Content-Transfer-Encoding: 7bit
Message-Id: <E520E90A-D183-4944-8F7C-5DB129FDF71B@lodderstedt.net>
X-Mailer: iPad Mail (10B141)
From: Torsten Lodderstedt <torsten@lodderstedt.net>
Date: Tue, 12 Feb 2013 19:02:40 +0100
To: Justin Richer <jricher@mitre.org>
X-Df-Sender: dG9yc3RlbkBsb2RkZXJzdGVkdC1vbmxpbmUuZGU=
Cc: "oauth@ietf.org" <oauth@ietf.org>
Subject: Re: [OAUTH-WG] Registration: Endpoint Definition (& operation parameter)
X-BeenThere: oauth@ietf.org
X-Mailman-Version: 2.1.12
Precedence: list
List-Id: OAUTH WG <oauth.ietf.org>
List-Unsubscribe: <https://www.ietf.org/mailman/options/oauth>, <mailto:oauth-request@ietf.org?subject=unsubscribe>
List-Archive: <http://www.ietf.org/mail-archive/web/oauth>
List-Post: <mailto:oauth@ietf.org>
List-Help: <mailto:oauth-request@ietf.org?subject=help>
List-Subscribe: <https://www.ietf.org/mailman/listinfo/oauth>, <mailto:oauth-request@ietf.org?subject=subscribe>
X-List-Received-Date: Tue, 12 Feb 2013 18:02:43 -0000

Am 12.02.2013 um 15:57 schrieb Justin Richer <jricher@mitre.org>:

> 
> I think that's a very important difference.

I fully agree.

From Michael.Jones@microsoft.com  Tue Feb 12 10:37:21 2013
Return-Path: <Michael.Jones@microsoft.com>
X-Original-To: oauth@ietfa.amsl.com
Delivered-To: oauth@ietfa.amsl.com
Received: from localhost (localhost [127.0.0.1]) by ietfa.amsl.com (Postfix) with ESMTP id 80C4F21F905E for <oauth@ietfa.amsl.com>; Tue, 12 Feb 2013 10:37:21 -0800 (PST)
X-Virus-Scanned: amavisd-new at amsl.com
X-Spam-Flag: NO
X-Spam-Score: -2.591
X-Spam-Level: 
X-Spam-Status: No, score=-2.591 tagged_above=-999 required=5 tests=[AWL=0.008,  BAYES_00=-2.599]
Received: from mail.ietf.org ([64.170.98.30]) by localhost (ietfa.amsl.com [127.0.0.1]) (amavisd-new, port 10024) with ESMTP id U9cbDJvMkIbz for <oauth@ietfa.amsl.com>; Tue, 12 Feb 2013 10:37:20 -0800 (PST)
Received: from na01-by2-obe.outbound.protection.outlook.com (na01-by2-obe.ptr.protection.outlook.com [207.46.100.32]) by ietfa.amsl.com (Postfix) with ESMTP id 9D9B621F9042 for <oauth@ietf.org>; Tue, 12 Feb 2013 10:37:19 -0800 (PST)
Received: from BY2FFO11FD009.protection.gbl (10.1.15.201) by BY2FFO11HUB008.protection.gbl (10.1.14.166) with Microsoft SMTP Server (TLS) id 15.0.620.12; Tue, 12 Feb 2013 18:37:18 +0000
Received: from TK5EX14HUBC103.redmond.corp.microsoft.com (131.107.125.37) by BY2FFO11FD009.mail.protection.outlook.com (10.1.14.73) with Microsoft SMTP Server (TLS) id 15.0.620.12 via Frontend Transport; Tue, 12 Feb 2013 18:37:18 +0000
Received: from TK5EX14MBXC285.redmond.corp.microsoft.com ([169.254.3.232]) by TK5EX14HUBC103.redmond.corp.microsoft.com ([157.54.86.9]) with mapi id 14.02.0318.003; Tue, 12 Feb 2013 18:37:01 +0000
From: Mike Jones <Michael.Jones@microsoft.com>
To: Nat Sakimura <sakimura@gmail.com>, Justin Richer <jricher@mitre.org>
Thread-Topic: [OAUTH-WG] Registration: RESTful client lifecycle management
Thread-Index: AQHOCJzxVGwYODuh3UmktcEEXHrfK5h1dc0AgABcxoCAAH10AIAAG1EAgAACn4CAAAnLAIAAFhgg
Date: Tue, 12 Feb 2013 18:37:00 +0000
Message-ID: <4E1F6AAD24975D4BA5B168042967394367443862@TK5EX14MBXC285.redmond.corp.microsoft.com>
References: <51195F36.6040705@mitre.org> <780F8C26-19A4-4301-B350-307D9FFF69CD@ve7jtb.com> <80727F20-A830-4778-B11C-D45389310646@lodderstedt.net> <511A5742.30707@mitre.org>	<B054D3FD-B4F6-4C57-8ED3-402F936DE17F@ve7jtb.com> <511A705F.4070204@mitre.org> <CABzCy2AaHeVQ+h18FaT8S1z9+EUbVE0WfCf63ra=7s6=f5ExLg@mail.gmail.com>
In-Reply-To: <CABzCy2AaHeVQ+h18FaT8S1z9+EUbVE0WfCf63ra=7s6=f5ExLg@mail.gmail.com>
Accept-Language: en-US
Content-Language: en-US
X-MS-Has-Attach: 
X-MS-TNEF-Correlator: 
x-originating-ip: [157.54.51.33]
Content-Type: text/plain; charset="us-ascii"
Content-Transfer-Encoding: quoted-printable
MIME-Version: 1.0
X-Forefront-Antispam-Report: CIP:131.107.125.37; CTRY:US; IPV:CAL; IPV:NLI; EFV:NLI; SFV:NSPM; SFS:(51704002)(24454001)(189002)(199002)(13464002)(479174001)(55885001)(377454001)(51856001)(56776001)(16406001)(33656001)(46102001)(66066001)(4396001)(80022001)(54356001)(5343655001)(59766001)(23726001)(76482001)(46406002)(77982001)(55846006)(54316002)(44976002)(50986001)(47976001)(74502001)(47446002)(79102001)(53806001)(15202345001)(49866001)(47736001)(56816002)(47776003)(20776003)(63696002)(31966008)(65816001)(50466001)(74662001); DIR:OUT; SFP:; SCL:1; SRVR:BY2FFO11HUB008; H:TK5EX14HUBC103.redmond.corp.microsoft.com; RD:InfoDomainNonexistent; MX:1; A:1; LANG:en; 
X-OriginatorOrg: microsoft.onmicrosoft.com
X-Forefront-PRVS: 0755F54DD9
Cc: "oauth@ietf.org" <oauth@ietf.org>
Subject: Re: [OAUTH-WG] Registration: RESTful client lifecycle management
X-BeenThere: oauth@ietf.org
X-Mailman-Version: 2.1.12
Precedence: list
List-Id: OAUTH WG <oauth.ietf.org>
List-Unsubscribe: <https://www.ietf.org/mailman/options/oauth>, <mailto:oauth-request@ietf.org?subject=unsubscribe>
List-Archive: <http://www.ietf.org/mail-archive/web/oauth>
List-Post: <mailto:oauth@ietf.org>
List-Help: <mailto:oauth-request@ietf.org?subject=help>
List-Subscribe: <https://www.ietf.org/mailman/listinfo/oauth>, <mailto:oauth-request@ietf.org?subject=subscribe>
X-List-Received-Date: Tue, 12 Feb 2013 18:37:21 -0000

Then I think we've reached an acceptable resolution on this one.  By having=
 the server return the registration_access_url upon create and having the c=
lient be required to include the client_id upon update, servers are free to=
 manage their registration endpoint(s) as they see fit and clients always d=
o the same thing.

				Thanks all,
				-- Mike

-----Original Message-----
From: oauth-bounces@ietf.org [mailto:oauth-bounces@ietf.org] On Behalf Of N=
at Sakimura
Sent: Tuesday, February 12, 2013 9:15 AM
To: Justin Richer
Cc: oauth@ietf.org
Subject: Re: [OAUTH-WG] Registration: RESTful client lifecycle management

2013/2/13 Justin Richer <jricher@mitre.org>:
>
> On 02/12/2013 11:30 AM, John Bradley wrote:
>>
>> To some extent we want the server to have the flexibility it needs.
>>
>> If the server knows it is going to need client_id for GET it needs to=20
>> encode it in the resource URI ether as part of the path or as a query=20
>> parameter (that is up to the server)
>>
>> When doing updates the client MUST include the client_id as an=20
>> additional integrity check.  Some servers may switch on that but that is=
 up to them.
>
> So if by this you mean that the client still simply follows whatever=20
> update url the server hands it (which may or may not include the=20
> client_id in some form, but the client doesn't care), and that the=20
> client MUST include its client_id in the request body (top-level=20
> member of a JSON object, at the
> moment) when doing a PUT (or POST/PATCH? see below) for the update=20
> action, then I'm totally fine with that. Is this what you're suggesting?

As far as I understand, yes. That is what we discussed last Thursday face t=
o face.


--
Nat Sakimura (=3Dnat)
Chairman, OpenID Foundation
http://nat.sakimura.org/
@_nat_en
_______________________________________________
OAuth mailing list
OAuth@ietf.org
https://www.ietf.org/mailman/listinfo/oauth

From jricher@mitre.org  Tue Feb 12 10:38:40 2013
Return-Path: <jricher@mitre.org>
X-Original-To: oauth@ietfa.amsl.com
Delivered-To: oauth@ietfa.amsl.com
Received: from localhost (localhost [127.0.0.1]) by ietfa.amsl.com (Postfix) with ESMTP id 2F40D21F9086 for <oauth@ietfa.amsl.com>; Tue, 12 Feb 2013 10:38:40 -0800 (PST)
X-Virus-Scanned: amavisd-new at amsl.com
X-Spam-Flag: NO
X-Spam-Score: -6.573
X-Spam-Level: 
X-Spam-Status: No, score=-6.573 tagged_above=-999 required=5 tests=[AWL=0.026,  BAYES_00=-2.599, RCVD_IN_DNSWL_MED=-4]
Received: from mail.ietf.org ([64.170.98.30]) by localhost (ietfa.amsl.com [127.0.0.1]) (amavisd-new, port 10024) with ESMTP id zCjmlY3pD6+A for <oauth@ietfa.amsl.com>; Tue, 12 Feb 2013 10:38:39 -0800 (PST)
Received: from smtpksrv1.mitre.org (smtpksrv1.mitre.org [198.49.146.77]) by ietfa.amsl.com (Postfix) with ESMTP id 75D2421F905E for <oauth@ietf.org>; Tue, 12 Feb 2013 10:38:39 -0800 (PST)
Received: from smtpksrv1.mitre.org (localhost.localdomain [127.0.0.1]) by localhost (Postfix) with SMTP id DF611531195A; Tue, 12 Feb 2013 13:38:38 -0500 (EST)
Received: from IMCCAS04.MITRE.ORG (imccas04.mitre.org [129.83.29.81]) by smtpksrv1.mitre.org (Postfix) with ESMTP id CF7C65311958; Tue, 12 Feb 2013 13:38:38 -0500 (EST)
Received: from [10.146.15.29] (129.83.31.58) by IMCCAS04.MITRE.ORG (129.83.29.81) with Microsoft SMTP Server (TLS) id 14.2.318.4; Tue, 12 Feb 2013 13:38:38 -0500
Message-ID: <511A8C02.8000504@mitre.org>
Date: Tue, 12 Feb 2013 13:37:54 -0500
From: Justin Richer <jricher@mitre.org>
User-Agent: Mozilla/5.0 (X11; Linux i686; rv:17.0) Gecko/20130106 Thunderbird/17.0.2
MIME-Version: 1.0
To: Mike Jones <Michael.Jones@microsoft.com>
References: <51195F36.6040705@mitre.org> <780F8C26-19A4-4301-B350-307D9FFF69CD@ve7jtb.com> <80727F20-A830-4778-B11C-D45389310646@lodderstedt.net> <511A5742.30707@mitre.org>	<B054D3FD-B4F6-4C57-8ED3-402F936DE17F@ve7jtb.com> <511A705F.4070204@mitre.org> <CABzCy2AaHeVQ+h18FaT8S1z9+EUbVE0WfCf63ra=7s6=f5ExLg@mail.gmail.com> <4E1F6AAD24975D4BA5B168042967394367443862@TK5EX14MBXC285.redmond.corp.microsoft.com>
In-Reply-To: <4E1F6AAD24975D4BA5B168042967394367443862@TK5EX14MBXC285.redmond.corp.microsoft.com>
Content-Type: text/plain; charset="ISO-8859-1"; format=flowed
Content-Transfer-Encoding: 7bit
X-Originating-IP: [129.83.31.58]
Cc: "oauth@ietf.org" <oauth@ietf.org>
Subject: Re: [OAUTH-WG] Registration: RESTful client lifecycle management
X-BeenThere: oauth@ietf.org
X-Mailman-Version: 2.1.12
Precedence: list
List-Id: OAUTH WG <oauth.ietf.org>
List-Unsubscribe: <https://www.ietf.org/mailman/options/oauth>, <mailto:oauth-request@ietf.org?subject=unsubscribe>
List-Archive: <http://www.ietf.org/mail-archive/web/oauth>
List-Post: <mailto:oauth@ietf.org>
List-Help: <mailto:oauth-request@ietf.org?subject=help>
List-Subscribe: <https://www.ietf.org/mailman/listinfo/oauth>, <mailto:oauth-request@ietf.org?subject=subscribe>
X-List-Received-Date: Tue, 12 Feb 2013 18:38:40 -0000

I agree, and the "must include client_id" gels with the other discussion 
of doing a full-replace for the PUT operation for updates from another 
thread.

  -- Justin

On 02/12/2013 01:37 PM, Mike Jones wrote:
> Then I think we've reached an acceptable resolution on this one.  By having the server return the registration_access_url upon create and having the client be required to include the client_id upon update, servers are free to manage their registration endpoint(s) as they see fit and clients always do the same thing.
>
> 				Thanks all,
> 				-- Mike
>
> -----Original Message-----
> From: oauth-bounces@ietf.org [mailto:oauth-bounces@ietf.org] On Behalf Of Nat Sakimura
> Sent: Tuesday, February 12, 2013 9:15 AM
> To: Justin Richer
> Cc: oauth@ietf.org
> Subject: Re: [OAUTH-WG] Registration: RESTful client lifecycle management
>
> 2013/2/13 Justin Richer <jricher@mitre.org>:
>> On 02/12/2013 11:30 AM, John Bradley wrote:
>>> To some extent we want the server to have the flexibility it needs.
>>>
>>> If the server knows it is going to need client_id for GET it needs to
>>> encode it in the resource URI ether as part of the path or as a query
>>> parameter (that is up to the server)
>>>
>>> When doing updates the client MUST include the client_id as an
>>> additional integrity check.  Some servers may switch on that but that is up to them.
>> So if by this you mean that the client still simply follows whatever
>> update url the server hands it (which may or may not include the
>> client_id in some form, but the client doesn't care), and that the
>> client MUST include its client_id in the request body (top-level
>> member of a JSON object, at the
>> moment) when doing a PUT (or POST/PATCH? see below) for the update
>> action, then I'm totally fine with that. Is this what you're suggesting?
> As far as I understand, yes. That is what we discussed last Thursday face to face.
>
>
> --
> Nat Sakimura (=nat)
> Chairman, OpenID Foundation
> http://nat.sakimura.org/
> @_nat_en
> _______________________________________________
> OAuth mailing list
> OAuth@ietf.org
> https://www.ietf.org/mailman/listinfo/oauth


From ve7jtb@ve7jtb.com  Tue Feb 12 10:39:19 2013
Return-Path: <ve7jtb@ve7jtb.com>
X-Original-To: oauth@ietfa.amsl.com
Delivered-To: oauth@ietfa.amsl.com
Received: from localhost (localhost [127.0.0.1]) by ietfa.amsl.com (Postfix) with ESMTP id E1F1321F9094 for <oauth@ietfa.amsl.com>; Tue, 12 Feb 2013 10:39:19 -0800 (PST)
X-Virus-Scanned: amavisd-new at amsl.com
X-Spam-Flag: NO
X-Spam-Score: -3.231
X-Spam-Level: 
X-Spam-Status: No, score=-3.231 tagged_above=-999 required=5 tests=[AWL=0.368,  BAYES_00=-2.599, RCVD_IN_DNSWL_LOW=-1]
Received: from mail.ietf.org ([64.170.98.30]) by localhost (ietfa.amsl.com [127.0.0.1]) (amavisd-new, port 10024) with ESMTP id l-S2R7vvH9KD for <oauth@ietfa.amsl.com>; Tue, 12 Feb 2013 10:39:19 -0800 (PST)
Received: from mail-qa0-f53.google.com (mail-qa0-f53.google.com [209.85.216.53]) by ietfa.amsl.com (Postfix) with ESMTP id CE5C721F905E for <oauth@ietf.org>; Tue, 12 Feb 2013 10:39:18 -0800 (PST)
Received: by mail-qa0-f53.google.com with SMTP id z4so209884qan.12 for <oauth@ietf.org>; Tue, 12 Feb 2013 10:39:18 -0800 (PST)
X-Google-DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=google.com; s=20120113; h=x-received:content-type:mime-version:subject:from:in-reply-to:date :cc:content-transfer-encoding:message-id:references:to:x-mailer :x-gm-message-state; bh=tvgmsZQZO4a6y8DbH5TVGGUbmOthp3d+In7yySG71ok=; b=nWyjBUP7Ul23566yCT7WiR6AGb7bO322IVed9Ndtrl0DlNbfuzpsDh23EWUkM+VT8Y LNTjZ93Dt4andScG0OlFFl8mg/FK1+CEOtCovCOuuRY4cBhbCiU2IHkAdK2VU7Fd0oX3 yb6OGD6uMHoYBLA1bVj3jDfTzv8NmLIYotnHiPqq+hzTZijGR7Pf8js8fiZ3f+tdUzZ6 X5nhur7hyOMyVuh9iR8aq1rbnDvX3mq3Agv7tFGZOo+S4ccrjp6RM2afcSddR6OLzZce xQlcmmYhJbSZNFrQVrxQ1pqtDeX8hpmLO9asQpOI+VEbaxGtadrJ7P/F9fhPOkk77t9/ esmw==
X-Received: by 10.229.171.139 with SMTP id h11mr1719826qcz.67.1360694358137; Tue, 12 Feb 2013 10:39:18 -0800 (PST)
Received: from [192.168.1.213] (190-20-23-212.baf.movistar.cl. [190.20.23.212]) by mx.google.com with ESMTPS id hn9sm16725622qab.8.2013.02.12.10.39.13 (version=TLSv1 cipher=ECDHE-RSA-RC4-SHA bits=128/128); Tue, 12 Feb 2013 10:39:16 -0800 (PST)
Content-Type: text/plain; charset=iso-8859-1
Mime-Version: 1.0 (Mac OS X Mail 6.2 \(1499\))
From: John Bradley <ve7jtb@ve7jtb.com>
In-Reply-To: <511A705F.4070204@mitre.org>
Date: Tue, 12 Feb 2013 15:39:10 -0300
Content-Transfer-Encoding: quoted-printable
Message-Id: <265D6A19-E8CA-4CCA-B6FC-0D843BD204D5@ve7jtb.com>
References: <51195F36.6040705@mitre.org> <780F8C26-19A4-4301-B350-307D9FFF69CD@ve7jtb.com> <80727F20-A830-4778-B11C-D45389310646@lodderstedt.net> <511A5742.30707@mitre.org> <B054D3FD-B4F6-4C57-8ED3-402F936DE17F@ve7jtb.com> <511A705F.4070204@mitre.org>
To: Justin Richer <jricher@mitre.org>
X-Mailer: Apple Mail (2.1499)
X-Gm-Message-State: ALoCoQl7nkFEoxwxcDx7PByG1YffngfB87d63DP1SNhbSnOUISPonkiJyLQ/XaFGlFwoARNfZN8i
Cc: "oauth@ietf.org" <oauth@ietf.org>
Subject: Re: [OAUTH-WG] Registration: RESTful client lifecycle management
X-BeenThere: oauth@ietf.org
X-Mailman-Version: 2.1.12
Precedence: list
List-Id: OAUTH WG <oauth.ietf.org>
List-Unsubscribe: <https://www.ietf.org/mailman/options/oauth>, <mailto:oauth-request@ietf.org?subject=unsubscribe>
List-Archive: <http://www.ietf.org/mail-archive/web/oauth>
List-Post: <mailto:oauth@ietf.org>
List-Help: <mailto:oauth-request@ietf.org?subject=help>
List-Subscribe: <https://www.ietf.org/mailman/listinfo/oauth>, <mailto:oauth-request@ietf.org?subject=subscribe>
X-List-Received-Date: Tue, 12 Feb 2013 18:39:20 -0000

On 2013-02-12, at 1:39 PM, Justin Richer <jricher@mitre.org> wrote:

>=20
> On 02/12/2013 11:30 AM, John Bradley wrote:
>> To some extent we want the server to have the flexibility it needs.
>>=20
>> If the server knows it is going to need client_id for GET it needs to =
encode it in the resource URI ether as part of the path or as a query =
parameter (that is up to the server)
>>=20
>> When doing updates the client MUST include the client_id as an =
additional integrity check.  Some servers may switch on that but that is =
up to them.
> So if by this you mean that the client still simply follows whatever =
update url the server hands it (which may or may not include the =
client_id in some form, but the client doesn't care), and that the =
client MUST include its client_id in the request body (top-level member =
of a JSON object, at the moment) when doing a PUT (or POST/PATCH? see =
below) for the update action, then I'm totally fine with that. Is this =
what you're suggesting?

Yes but It is a suggestion others may still hate it.
>=20
>> If we want incremental replace (not resetting claims not sent to =
there defaults) then we need POST for update.
>> I think if you want to do the REST thing and be pure about PUT it =
needs to reset all values not sent to there defaults.
>=20
> I agree with this argument in terms of the purity, and as I would =
rather see the different verb used for different actions, I am willing =
to give up the semantics of the not-resetting-claims that's in there =
right now for this action. There's actually another HTTP verb, PATCH, =
that isn't used much but is meant for partial updates, and we could =
transfer the not-resetting-claims action to this instead.

Yes PATCH would represent the incremental update but we are getting =
further from the beaten path here.=20

>=20
>> I suppose we could have both but two ways of doing it leads to =
confusion.
>=20
> I agree that we can't do both PUT and POST, and we can't have both =
partial and complete replacement on the same verb/endpoint combination. =
We need to pick one combination and have it be clear.
>=20
> -- Justin
>=20
>> On 2013-02-12, at 11:52 AM, Justin Richer <jricher@mitre.org> wrote:
>>=20
>>> The problem that I have with "always including the client_id" is =
*where* to include it. Are we talking a query parameter, URI template, =
or somewhere in the request body? The latter will only work for POST and =
PUT, so it's out of the question to support GET and DELETE using that =
semantic. I think we should support all operations using parallel syntax =
-- that's just good API design.
>>>=20
>>> I *really* don't like the idea of switching the action solely based =
on whether or not the client_id is present in the request body of a =
POST. This is a side-effectful mode switch, and it will only lead to =
pain and misery. Additionally, if the input is JSON (separate =
discussion), then a server would have to parse the JSON body before =
knowing where to route the request. In most web development frameworks =
that I've used, this is impossible. A query parameter or URL pattern, on =
the other hand, is doable.
>>>=20
>>> As it stands right now, a server is free to include the client_id in =
the "update/management" URL that it returns as part of the _link =
structure (separate discussion). The current text goes as far as =
recommending that practice, but doesn't take the step of requiring it in =
any form, and leaving it up to the server to decide what form it takes. =
If a server can route better with a query parameter, it'll return a URL =
to the client that has a client_id=3D query parameter. If a server would =
rather use a path component with the client_id, it can do that, too. If =
it wants to put everything on one URL and differentiate through the =
request body or presence/absence of the registration_access_token, it =
can always return the same URL to every client. I think that's nuts, but =
you can do it. Interoperability is preserved because the client simply =
follows the returned URL to do its bits and pieces, and it doesn't ever =
have to create or compose this URL from component parts.
>>>=20
>>> I want to continue to distinguish between the POST and PUT =
operations for create and update, respectively. This is a common pattern =
and the one described in the original REST thesis that described the =
architectural style. I'll also bring up that the semantics of PUT are =
intended to be "replace all", which is what you had originally argued =
for in the update case as well. I not convinced that developers of today =
can't handle HTTP verbs like PUT if they want to do fancier operations =
like updates. Note that the core operations, create and read, remain as =
POST and GET, which would be well within the grasp of every library and =
web developer today.
>>>=20
>>> -- Justin
>>>=20
>>> On 02/12/2013 02:23 AM, Torsten Lodderstedt wrote:
>>>> +1 for always including the client_id
>>>>=20
>>>> As John pointed out, there could be different entities updating =
client data. Then one has to distinguish the resource and the =
credential.
>>>>=20
>>>> Am 12.02.2013 um 02:51 schrieb John Bradley <ve7jtb@ve7jtb.com>:
>>>>=20
>>>>> I would always include the client_id on update.
>>>>>=20
>>>>> I think it is also us full to have other tokens used at the update =
endpoint.  I can see the master token used to update all the clients it =
has registered as part of API management.
>>>>> Relying on the registration_access_token is probably a design that =
will cause trouble down the road.
>>>>>=20
>>>>> I think GET and POST are relatively clear.   I don't know about =
expelling PUT to developers.  I think POST with a client_id to a =
(separate discussion) update_uri works without restricting it to PUT.
>>>>>=20
>>>>> I think DELETE needs to be better understood.   I think a status =
that can be set for client lifecycle is better than letting a client =
delete a entry.
>>>>> In some cases there will be more than one instance of a client and =
letting them know they have been turned off for a reason is better than =
making there registration disappear.
>>>>> So for the moment I would levee out DELETE.
>>>>>=20
>>>>> John B.
>>>>>=20
>>>>> On 2013-02-11, at 6:14 PM, Justin Richer <jricher@mitre.org> =
wrote:
>>>>>=20
>>>>>> Draft -05 of OAuth Dynamic Client Registration [1] defines =
several operations that the client can take on its behalf as part of the =
registration process. These boil down to the basic CRUD operations that =
you find in many APIs: Create, Read, Update, Delete. Draft -00 defined =
only the "Create" operation, draft -01 through -04 added the "Update" =
operation, switched using the "operation=3D" parameter.
>>>>>>=20
>>>>>> Following several suggestions to do so on the list, the -05 draft =
defines these operations in terms of a RESTful API for the client. =
Namely:
>>>>>>=20
>>>>>> - HTTP POST to registration endpoint =3D> Create (register) a new =
client
>>>>>> - HTTP PUT to update endpoint (with registration_access_token) =3D>=
 Update the registered information for this client
>>>>>> - HTTP GET to update endpoint (with registration_access_token) =3D>=
 read the registered information for this client
>>>>>> - HTTP DELETE to update endpoint (with registration_access_token) =
=3D> Delete (unregister/de-provision) this client
>>>>>>=20
>>>>>> The two main issues at stake here are: the addition of the READ =
and DELETE methods, and the use of HTTP verbs following a RESTful design =
philosophy.
>>>>>>=20
>>>>>> Pro:
>>>>>> - RESTful APIs (with HTTP verbs to differentiate functionality) =
are the norm today
>>>>>> - Full lifecycle management is common and is going to be expected =
by many users of this protocol in the wild
>>>>>>=20
>>>>>> Cons:
>>>>>> - Update semantics are still under debate (full replace? patch?)
>>>>>> - Somewhat increased complexity on the server to support all =
operations
>>>>>> - Client has to understand all HTTP verbs for full access (though =
plain registration is just POST)
>>>>>>=20
>>>>>>=20
>>>>>> Alternatives include using an operational switch parameter (like =
the old drafts), defining separate endpoints for every action, or doing =
all operations on a single endpoint using verbs to switch.
>>>>>>=20
>>>>>> -- Justin
>>>>>>=20
>>>>>> [1] http://tools.ietf.org/html/draft-ietf-oauth-dyn-reg-05
>>>>>> _______________________________________________
>>>>>> OAuth mailing list
>>>>>> OAuth@ietf.org
>>>>>> https://www.ietf.org/mailman/listinfo/oauth
>>>>> _______________________________________________
>>>>> OAuth mailing list
>>>>> OAuth@ietf.org
>>>>> https://www.ietf.org/mailman/listinfo/oauth
>=20
>=20


From Michael.Jones@microsoft.com  Tue Feb 12 11:12:34 2013
Return-Path: <Michael.Jones@microsoft.com>
X-Original-To: oauth@ietfa.amsl.com
Delivered-To: oauth@ietfa.amsl.com
Received: from localhost (localhost [127.0.0.1]) by ietfa.amsl.com (Postfix) with ESMTP id 29AFA21F90ED for <oauth@ietfa.amsl.com>; Tue, 12 Feb 2013 11:12:34 -0800 (PST)
X-Virus-Scanned: amavisd-new at amsl.com
X-Spam-Flag: NO
X-Spam-Score: -2.591
X-Spam-Level: 
X-Spam-Status: No, score=-2.591 tagged_above=-999 required=5 tests=[AWL=0.007,  BAYES_00=-2.599, HTML_MESSAGE=0.001]
Received: from mail.ietf.org ([64.170.98.30]) by localhost (ietfa.amsl.com [127.0.0.1]) (amavisd-new, port 10024) with ESMTP id U1FdxXa1qadP for <oauth@ietfa.amsl.com>; Tue, 12 Feb 2013 11:12:32 -0800 (PST)
Received: from na01-bl2-obe.outbound.protection.outlook.com (na01-bl2-obe.ptr.protection.outlook.com [65.55.169.23]) by ietfa.amsl.com (Postfix) with ESMTP id 6BC1621F90EC for <oauth@ietf.org>; Tue, 12 Feb 2013 11:12:32 -0800 (PST)
Received: from BY2FFO11FD020.protection.gbl (10.1.15.202) by BY2FFO11HUB031.protection.gbl (10.1.14.116) with Microsoft SMTP Server (TLS) id 15.0.620.12; Tue, 12 Feb 2013 19:12:30 +0000
Received: from TK5EX14HUBC105.redmond.corp.microsoft.com (131.107.125.37) by BY2FFO11FD020.mail.protection.outlook.com (10.1.14.137) with Microsoft SMTP Server (TLS) id 15.0.620.12 via Frontend Transport; Tue, 12 Feb 2013 19:12:29 +0000
Received: from TK5EX14MBXC285.redmond.corp.microsoft.com ([169.254.3.232]) by TK5EX14HUBC105.redmond.corp.microsoft.com ([157.54.80.48]) with mapi id 14.02.0318.003; Tue, 12 Feb 2013 19:11:54 +0000
From: Mike Jones <Michael.Jones@microsoft.com>
To: Justin Richer <jricher@mitre.org>, "oauth@ietf.org" <oauth@ietf.org>
Thread-Topic: [OAUTH-WG] Registration: JSON Encoded Input
Thread-Index: AQHOCJz80LLXzcDH1EumjHxgql90R5h2l5eg
Date: Tue, 12 Feb 2013 19:11:53 +0000
Message-ID: <4E1F6AAD24975D4BA5B168042967394367443A16@TK5EX14MBXC285.redmond.corp.microsoft.com>
References: <51195F3B.1010701@mitre.org>
In-Reply-To: <51195F3B.1010701@mitre.org>
Accept-Language: en-US
Content-Language: en-US
X-MS-Has-Attach: 
X-MS-TNEF-Correlator: 
x-originating-ip: [157.54.51.33]
Content-Type: multipart/alternative; boundary="_000_4E1F6AAD24975D4BA5B168042967394367443A16TK5EX14MBXC285r_"
MIME-Version: 1.0
X-Forefront-Antispam-Report: CIP:131.107.125.37; CTRY:US; IPV:CAL; IPV:NLI; EFV:NLI; SFV:NSPM; SFS:(189002)(199002)(51444002)(377454001)(13464002)(55885001)(69234002)(15202345001)(20776003)(53806001)(33656001)(66066001)(512954001)(16236675001)(5343635001)(79102001)(16406001)(5343655001)(54356001)(63696002)(65816001)(49866001)(74502001)(80022001)(74662001)(4396001)(56776001)(44976002)(31966008)(54316002)(59766001)(47446002)(77982001)(47736001)(47976001)(55846006)(50986001)(76482001)(56816002)(51856001)(46102001); DIR:OUT; SFP:; SCL:1; SRVR:BY2FFO11HUB031; H:TK5EX14HUBC105.redmond.corp.microsoft.com; RD:InfoDomainNonexistent; MX:1; A:1; LANG:en; 
X-OriginatorOrg: microsoft.onmicrosoft.com
X-Forefront-PRVS: 0755F54DD9
Subject: Re: [OAUTH-WG] Registration: JSON Encoded Input
X-BeenThere: oauth@ietf.org
X-Mailman-Version: 2.1.12
Precedence: list
List-Id: OAUTH WG <oauth.ietf.org>
List-Unsubscribe: <https://www.ietf.org/mailman/options/oauth>, <mailto:oauth-request@ietf.org?subject=unsubscribe>
List-Archive: <http://www.ietf.org/mail-archive/web/oauth>
List-Post: <mailto:oauth@ietf.org>
List-Help: <mailto:oauth-request@ietf.org?subject=help>
List-Subscribe: <https://www.ietf.org/mailman/listinfo/oauth>, <mailto:oauth-request@ietf.org?subject=subscribe>
X-List-Received-Date: Tue, 12 Feb 2013 19:12:34 -0000

--_000_4E1F6AAD24975D4BA5B168042967394367443A16TK5EX14MBXC285r_
Content-Type: text/plain; charset="us-ascii"
Content-Transfer-Encoding: quoted-printable

FYI, this issue is also being discussed as an OpenID Connect issue at https=
://bitbucket.org/openid/connect/issue/747.  I think that Nat's recent comme=
nt there bears repeating on this list:



Nat Sakimura:



Not so sure. For example, PHP cannot get the JSON object form application/j=
son POST in $_POST.



It is OK to have a parameter like "request" that holds JSON. Then, you can =
get to it from $_POST['request']. However, if you POST the JSON as the POST=
 body, then you would have to call a low level function in the form of:





```

#!php



$file =3D file_get_contents('php://input'); $x =3D json_decode($file); ```



Not that it is harder, but it is much less known. Many PHP programmers will=
 certainly goes "???".



We need to check what would be the cases for other scripting languages befo=
re making the final decision.



                                                            -- Mike



-----Original Message-----
From: oauth-bounces@ietf.org [mailto:oauth-bounces@ietf.org] On Behalf Of J=
ustin Richer
Sent: Monday, February 11, 2013 1:15 PM
To: oauth@ietf.org
Subject: [OAUTH-WG] Registration: JSON Encoded Input



Draft -05 of OAuth Dynamic Client Registration [1] switched from a form-enc=
oded input that had been used by drafts -01 through -04 to a JSON encoded i=
nput that was used originally in -00. Note that all versions keep JSON-enco=
ded output from all operations.



Pro:

  - JSON gives us a rich data structure so that things such as lists, numbe=
rs, nulls, and objects can be represented natively

  - Allows for parallelism between the input to the endpoint and output fro=
m the endpoint, reducing possible translation errors between the two

  - JSON specifies UTF8 encoding for all strings, forms may have many diffe=
rent encodings

  - JSON has minimal character escaping required for most strings, forms re=
quire escaping for common characters such as space, slash, comma, etc.



Con:

  - the rest of OAuth is form-in/JSON-out

  - nothing else in OAuth requires the Client to create a JSON object, mere=
ly to parse one

  - form-in/JSON-out is a very widely established pattern on the web today

  - Client information (client_name, client_id, etc.) is conflated with acc=
ess information (registration_access_token, _links, expires_at, etc.) in ro=
ot level of the same JSON object, leaving the client to decide what needs t=
o (can?) be sent back to the server for update operations.





Alternatives include any number of data encoding schemes, including form (l=
ike the old drafts), XML, ASN.1, etc.





  -- Justin



[1] http://tools.ietf.org/html/draft-ietf-oauth-dyn-reg-05

_______________________________________________

OAuth mailing list

OAuth@ietf.org<mailto:OAuth@ietf.org>

https://www.ietf.org/mailman/listinfo/oauth

--_000_4E1F6AAD24975D4BA5B168042967394367443A16TK5EX14MBXC285r_
Content-Type: text/html; charset="us-ascii"
Content-Transfer-Encoding: quoted-printable

<html xmlns:v=3D"urn:schemas-microsoft-com:vml" xmlns:o=3D"urn:schemas-micr=
osoft-com:office:office" xmlns:w=3D"urn:schemas-microsoft-com:office:word" =
xmlns:m=3D"http://schemas.microsoft.com/office/2004/12/omml" xmlns=3D"http:=
//www.w3.org/TR/REC-html40">
<head>
<meta http-equiv=3D"Content-Type" content=3D"text/html; charset=3Dus-ascii"=
>
<meta name=3D"Generator" content=3D"Microsoft Word 14 (filtered medium)">
<style><!--
/* Font Definitions */
@font-face
	{font-family:Calibri;
	panose-1:2 15 5 2 2 2 4 3 2 4;}
/* Style Definitions */
p.MsoNormal, li.MsoNormal, div.MsoNormal
	{margin:0in;
	margin-bottom:.0001pt;
	font-size:11.0pt;
	font-family:"Calibri","sans-serif";}
a:link, span.MsoHyperlink
	{mso-style-priority:99;
	color:blue;
	text-decoration:underline;}
a:visited, span.MsoHyperlinkFollowed
	{mso-style-priority:99;
	color:purple;
	text-decoration:underline;}
p.MsoPlainText, li.MsoPlainText, div.MsoPlainText
	{mso-style-priority:99;
	mso-style-link:"Plain Text Char";
	margin:0in;
	margin-bottom:.0001pt;
	font-size:11.0pt;
	font-family:"Calibri","sans-serif";}
span.PlainTextChar
	{mso-style-name:"Plain Text Char";
	mso-style-priority:99;
	mso-style-link:"Plain Text";
	font-family:"Calibri","sans-serif";}
.MsoChpDefault
	{mso-style-type:export-only;
	font-family:"Calibri","sans-serif";}
@page WordSection1
	{size:8.5in 11.0in;
	margin:1.0in 1.0in 1.0in 1.0in;}
div.WordSection1
	{page:WordSection1;}
--></style><!--[if gte mso 9]><xml>
<o:shapedefaults v:ext=3D"edit" spidmax=3D"1026" />
</xml><![endif]--><!--[if gte mso 9]><xml>
<o:shapelayout v:ext=3D"edit">
<o:idmap v:ext=3D"edit" data=3D"1" />
</o:shapelayout></xml><![endif]-->
</head>
<body lang=3D"EN-US" link=3D"blue" vlink=3D"purple">
<div class=3D"WordSection1">
<p class=3D"MsoPlainText">FYI, this issue is also being discussed as an Ope=
nID Connect issue at
<a href=3D"https://bitbucket.org/openid/connect/issue/747">https://bitbucke=
t.org/openid/connect/issue/747</a>.&nbsp; I think that Nat's recent comment=
 there bears repeating on this list:<o:p></o:p></p>
<p class=3D"MsoPlainText"><o:p>&nbsp;</o:p></p>
<p class=3D"MsoPlainText" style=3D"margin-left:.5in">Nat Sakimura:<o:p></o:=
p></p>
<p class=3D"MsoPlainText" style=3D"margin-left:.5in"><o:p>&nbsp;</o:p></p>
<p class=3D"MsoPlainText" style=3D"margin-left:.5in">Not so sure. For examp=
le, PHP cannot get the JSON object form application/json POST in $_POST.
<o:p></o:p></p>
<p class=3D"MsoPlainText" style=3D"margin-left:.5in"><o:p>&nbsp;</o:p></p>
<p class=3D"MsoPlainText" style=3D"margin-left:.5in">It is OK to have a par=
ameter like &quot;request&quot; that holds JSON. Then, you can get to it fr=
om $_POST['request']. However, if you POST the JSON as the POST body, then =
you would have to call a low level function in
 the form of: <o:p></o:p></p>
<p class=3D"MsoPlainText" style=3D"margin-left:.5in"><o:p>&nbsp;</o:p></p>
<p class=3D"MsoPlainText" style=3D"margin-left:.5in"><o:p>&nbsp;</o:p></p>
<p class=3D"MsoPlainText" style=3D"margin-left:.5in">```<o:p></o:p></p>
<p class=3D"MsoPlainText" style=3D"margin-left:.5in">#!php<o:p></o:p></p>
<p class=3D"MsoPlainText" style=3D"margin-left:.5in"><o:p>&nbsp;</o:p></p>
<p class=3D"MsoPlainText" style=3D"margin-left:.5in">$file =3D file_get_con=
tents('php://input'); $x =3D json_decode($file); ```<o:p></o:p></p>
<p class=3D"MsoPlainText" style=3D"margin-left:.5in"><o:p>&nbsp;</o:p></p>
<p class=3D"MsoPlainText" style=3D"margin-left:.5in">Not that it is harder,=
 but it is much less known. Many PHP programmers will certainly goes &quot;=
???&quot;.
<o:p></o:p></p>
<p class=3D"MsoPlainText" style=3D"margin-left:.5in"><o:p>&nbsp;</o:p></p>
<p class=3D"MsoPlainText" style=3D"margin-left:.5in">We need to check what =
would be the cases for other scripting languages before making the final de=
cision.<o:p></o:p></p>
<p class=3D"MsoPlainText"><o:p>&nbsp;</o:p></p>
<p class=3D"MsoPlainText">&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&=
nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbs=
p;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&=
nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbs=
p;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&=
nbsp; -- Mike<o:p></o:p></p>
<p class=3D"MsoPlainText"><o:p>&nbsp;</o:p></p>
<p class=3D"MsoPlainText">-----Original Message-----<br>
From: oauth-bounces@ietf.org [mailto:oauth-bounces@ietf.org] On Behalf Of J=
ustin Richer<br>
Sent: Monday, February 11, 2013 1:15 PM<br>
To: oauth@ietf.org<br>
Subject: [OAUTH-WG] Registration: JSON Encoded Input</p>
<p class=3D"MsoPlainText"><o:p>&nbsp;</o:p></p>
<p class=3D"MsoPlainText">Draft -05 of OAuth Dynamic Client Registration [1=
] switched from a form-encoded input that had been used by drafts -01 throu=
gh -04 to a JSON encoded input that was used originally in -00. Note that a=
ll versions keep JSON-encoded output
 from all operations.<o:p></o:p></p>
<p class=3D"MsoPlainText"><o:p>&nbsp;</o:p></p>
<p class=3D"MsoPlainText">Pro:<o:p></o:p></p>
<p class=3D"MsoPlainText">&nbsp; - JSON gives us a rich data structure so t=
hat things such as lists, numbers, nulls, and objects can be represented na=
tively<o:p></o:p></p>
<p class=3D"MsoPlainText">&nbsp; - Allows for parallelism between the input=
 to the endpoint and output from the endpoint, reducing possible translatio=
n errors between the two<o:p></o:p></p>
<p class=3D"MsoPlainText">&nbsp; - JSON specifies UTF8 encoding for all str=
ings, forms may have many different encodings<o:p></o:p></p>
<p class=3D"MsoPlainText">&nbsp; - JSON has minimal character escaping requ=
ired for most strings, forms require escaping for common characters such as=
 space, slash, comma, etc.<o:p></o:p></p>
<p class=3D"MsoPlainText"><o:p>&nbsp;</o:p></p>
<p class=3D"MsoPlainText">Con:<o:p></o:p></p>
<p class=3D"MsoPlainText">&nbsp; - the rest of OAuth is form-in/JSON-out<o:=
p></o:p></p>
<p class=3D"MsoPlainText">&nbsp; - nothing else in OAuth requires the Clien=
t to create a JSON object, merely to parse one<o:p></o:p></p>
<p class=3D"MsoPlainText">&nbsp; - form-in/JSON-out is a very widely establ=
ished pattern on the web today<o:p></o:p></p>
<p class=3D"MsoPlainText">&nbsp; - Client information (client_name, client_=
id, etc.) is conflated with access information (registration_access_token, =
_links, expires_at, etc.) in root level of the same JSON object, leaving th=
e client to decide what needs to (can?)
 be sent back to the server for update operations.<o:p></o:p></p>
<p class=3D"MsoPlainText"><o:p>&nbsp;</o:p></p>
<p class=3D"MsoPlainText"><o:p>&nbsp;</o:p></p>
<p class=3D"MsoPlainText">Alternatives include any number of data encoding =
schemes, including form (like the old drafts), XML, ASN.1, etc.<o:p></o:p><=
/p>
<p class=3D"MsoPlainText"><o:p>&nbsp;</o:p></p>
<p class=3D"MsoPlainText"><o:p>&nbsp;</o:p></p>
<p class=3D"MsoPlainText">&nbsp; -- Justin<o:p></o:p></p>
<p class=3D"MsoPlainText"><o:p>&nbsp;</o:p></p>
<p class=3D"MsoPlainText">[1] <a href=3D"http://tools.ietf.org/html/draft-i=
etf-oauth-dyn-reg-05">
<span style=3D"color:windowtext;text-decoration:none">http://tools.ietf.org=
/html/draft-ietf-oauth-dyn-reg-05</span></a><o:p></o:p></p>
<p class=3D"MsoPlainText">_______________________________________________<o=
:p></o:p></p>
<p class=3D"MsoPlainText">OAuth mailing list<o:p></o:p></p>
<p class=3D"MsoPlainText"><a href=3D"mailto:OAuth@ietf.org"><span style=3D"=
color:windowtext;text-decoration:none">OAuth@ietf.org</span></a><o:p></o:p>=
</p>
<p class=3D"MsoPlainText"><a href=3D"https://www.ietf.org/mailman/listinfo/=
oauth"><span style=3D"color:windowtext;text-decoration:none">https://www.ie=
tf.org/mailman/listinfo/oauth</span></a><o:p></o:p></p>
</div>
</body>
</html>

--_000_4E1F6AAD24975D4BA5B168042967394367443A16TK5EX14MBXC285r_--

From Michael.Jones@microsoft.com  Tue Feb 12 11:26:04 2013
Return-Path: <Michael.Jones@microsoft.com>
X-Original-To: oauth@ietfa.amsl.com
Delivered-To: oauth@ietfa.amsl.com
Received: from localhost (localhost [127.0.0.1]) by ietfa.amsl.com (Postfix) with ESMTP id 7C14321F90FD for <oauth@ietfa.amsl.com>; Tue, 12 Feb 2013 11:26:04 -0800 (PST)
X-Virus-Scanned: amavisd-new at amsl.com
X-Spam-Flag: NO
X-Spam-Score: -2.291
X-Spam-Level: 
X-Spam-Status: No, score=-2.291 tagged_above=-999 required=5 tests=[AWL=-0.292, BAYES_00=-2.599, J_CHICKENPOX_44=0.6]
Received: from mail.ietf.org ([64.170.98.30]) by localhost (ietfa.amsl.com [127.0.0.1]) (amavisd-new, port 10024) with ESMTP id 6wMkpFhBMrDW for <oauth@ietfa.amsl.com>; Tue, 12 Feb 2013 11:26:03 -0800 (PST)
Received: from na01-by2-obe.outbound.protection.outlook.com (na01-by2-obe.ptr.protection.outlook.com [207.46.100.24]) by ietfa.amsl.com (Postfix) with ESMTP id 6F42F21F90FC for <oauth@ietf.org>; Tue, 12 Feb 2013 11:26:03 -0800 (PST)
Received: from BY2FFO11FD013.protection.gbl (10.1.15.201) by BY2FFO11HUB025.protection.gbl (10.1.14.111) with Microsoft SMTP Server (TLS) id 15.0.620.12; Tue, 12 Feb 2013 19:26:01 +0000
Received: from TK5EX14HUBC106.redmond.corp.microsoft.com (131.107.125.37) by BY2FFO11FD013.mail.protection.outlook.com (10.1.14.75) with Microsoft SMTP Server (TLS) id 15.0.620.12 via Frontend Transport; Tue, 12 Feb 2013 19:26:01 +0000
Received: from TK5EX14MBXC285.redmond.corp.microsoft.com ([169.254.3.232]) by TK5EX14HUBC106.redmond.corp.microsoft.com ([157.54.80.61]) with mapi id 14.02.0318.003; Tue, 12 Feb 2013 19:25:33 +0000
From: Mike Jones <Michael.Jones@microsoft.com>
To: Nat Sakimura <sakimura@gmail.com>, Justin Richer <jricher@mitre.org>, "oauth@ietf.org" <oauth@ietf.org>
Thread-Topic: [OAUTH-WG] Registration: HAL _links structure and client self-URL
Thread-Index: AQHOCLBZ9TwcL9HNGkSDhglPftMUBph2SCeAgAARoYCAAA8pgIAADXiAgAAjZZA=
Date: Tue, 12 Feb 2013 19:25:33 +0000
Message-ID: <4E1F6AAD24975D4BA5B168042967394367443A52@TK5EX14MBXC285.redmond.corp.microsoft.com>
References: <51195F3D.1050006@mitre.org> <222C28CB-7F6F-4BC3-8692-40404C2DC2D3@maymount.com> <511A50C7.8080102@mitre.org> <B256FD2D-5ED7-4306-A3BF-E6A196862B2E@ve7jtb.com>	<511A6C49.50801@mitre.org> <CABzCy2CdxaNOvho2uyuc83qHm4WKHVfToC_n6QqAS3fqTGzU2w@mail.gmail.com>
In-Reply-To: <CABzCy2CdxaNOvho2uyuc83qHm4WKHVfToC_n6QqAS3fqTGzU2w@mail.gmail.com>
Accept-Language: en-US
Content-Language: en-US
X-MS-Has-Attach: 
X-MS-TNEF-Correlator: 
x-originating-ip: [157.54.51.33]
Content-Type: text/plain; charset="us-ascii"
Content-Transfer-Encoding: quoted-printable
MIME-Version: 1.0
X-Forefront-Antispam-Report: CIP:131.107.125.37; CTRY:US; IPV:CAL; IPV:NLI; EFV:NLI; SFV:NSPM; SFS:(377454001)(377424002)(24454001)(189002)(199002)(15454002)(55885001)(479174001)(13464002)(51704002)(5343655001)(47446002)(77982001)(46102001)(80022001)(66066001)(47736001)(56776001)(74662001)(59766001)(54356001)(54316002)(49866001)(16406001)(56816002)(47776003)(44976002)(74502001)(20776003)(65816001)(63696002)(53806001)(46406002)(4396001)(15202345001)(79102001)(76482001)(23726001)(307094002)(50986001)(33656001)(47976001)(51856001)(50466001)(31966008)(5343635001)(55846006); DIR:OUT; SFP:; SCL:1; SRVR:BY2FFO11HUB025; H:TK5EX14HUBC106.redmond.corp.microsoft.com; RD:InfoDomainNonexistent; MX:1; A:1; LANG:en; 
X-OriginatorOrg: microsoft.onmicrosoft.com
X-Forefront-PRVS: 0755F54DD9
Subject: Re: [OAUTH-WG] Registration: HAL _links structure and client	self-URL
X-BeenThere: oauth@ietf.org
X-Mailman-Version: 2.1.12
Precedence: list
List-Id: OAUTH WG <oauth.ietf.org>
List-Unsubscribe: <https://www.ietf.org/mailman/options/oauth>, <mailto:oauth-request@ietf.org?subject=unsubscribe>
List-Archive: <http://www.ietf.org/mail-archive/web/oauth>
List-Post: <mailto:oauth@ietf.org>
List-Help: <mailto:oauth-request@ietf.org?subject=help>
List-Subscribe: <https://www.ietf.org/mailman/listinfo/oauth>, <mailto:oauth-request@ietf.org?subject=subscribe>
X-List-Received-Date: Tue, 12 Feb 2013 19:26:04 -0000

Part of the REST/JSON philosophy is that interfaces should be as simple and=
 developer-friendly as possible.  XML was rejected by developers, in part, =
because of the self-describing nature of the structure, which required extr=
a syntax that was often not useful in practice.  Trying to re-impose that s=
tructure using extra JSON syntax conventions is just asking developers to h=
ave an allergic reaction to our specs upon encountering them.  The syntacti=
c complexity and *surprise factor* isn't worth the limited semantic benefit=
s of using "_links".

Since you bring up privacy policy and terms of service, I'll note that the =
OAuth Dynamic Registration spec already has these fields to address those:
	policy_url
	tos_url

Those have been working fine for OpenID Connect too.  There's no need to li=
kewise convolve them to add the extra syntax that you describe below.

(BTW, in a private thread, John Bradley pointed out that what the two of yo=
u talked about in person was actually the possibility of adding privacy pol=
icy and terms of service declarations at *discovery time*, rather than regi=
stration time.  That's a different topic, which we should discuss separatel=
y, if you want to pursue that.)

				Best wishes,
				-- Mike

-----Original Message-----
From: oauth-bounces@ietf.org [mailto:oauth-bounces@ietf.org] On Behalf Of N=
at Sakimura
Sent: Tuesday, February 12, 2013 9:11 AM
To: Justin Richer; oauth@ietf.org
Subject: Re: [OAUTH-WG] Registration: HAL _links structure and client self-=
URL

Actually, if it is to return it in the HTTP header, then it should also use=
 the RFC5988 Web Linking format.
Now, that is nice to have, but for many JSON programmers, I agree that it w=
ould be a hassle to obtain the header and store them in addition to the JSO=
N. So, it is nicer to have it in JSON body.

Re: Is "_links.self.href" grossly complex over "registration_access_url"?

I do not think so. Accessing a flat top level parameter such as registratio=
n_access_url and _links.self.href does not make any difference from a clien=
t programmers point of view. That's a beauty of JSON. Both can be treated a=
s a parameter name. Doing a group operation on the links makes difference t=
hough: the structured one is easier since you can just operate on _links wh=
ile in case of the top level parameters, you have to have an explicit list =
of them and do the matches. (See below for the necessity for the grouping).

I and John discussed this for at least half an hour F2F last week, both tec=
hnically and from operation/legal point of view, for OpenID Connect Registr=
ation.
Similar points could be made to OAuth dyn reg.

Here is what we have discussed:

When dynamically registering the client to the server, the server probably =
needs to return the following:

  * terms-of-service (terms of service of the server to the client)
  * privacy-policy (privacy policy of the server to the client)

Both are defined in RFC5988/IANA Link Relations registry.


They should be returned together with

  * self.href

which is also defined in RFC5988/IANA Link Relations registry.

There are several ways to do it.

  * Return these using RFC5988 (HTTP Header)
  * Return these in entity body
      * Use HAL (or OAuth-meta)/JSON Schema
      * Use something else (e.g., a top level items)

Returning it in the entity body has several advantage over HTTP header:

  * They can be captured in one call;
  * They are protocol agnostic;

We determined that these advantages outweighs the disadvantage of creating =
a new standard.

The question becomes then whether to:

  * Use HAL (or OAuth-meta)/JSON Schema
  * Use something else (e.g., a top level items)

First, we have to consider what needs to be returned in the link/relationsh=
ip category. If it were just _links.self.href, then grouping probably does =
not make sense. However, since we have terms-of-service and privacy-policy =
as well already, it may well make sense.

Moreover, when we think of a multi-tenant authorization server that may wan=
t to use different OAuth authz and token endpoints for different tennants, =
it would be better to be able to return those in the registration response.=
 Then, it would make sense to register OAuth authz and token endpoints as r=
el type in the IANA registry (like Bill Mills is trying to
do) and use them in a uniform manner. Note: these per tenant endpoints may =
support different scopes etc. as well. Then, these has to be coupled with t=
he URIs. That is why all of RFC5988/HAL/JSON Schema uses href instead of ju=
st having the URL as the value of the parameter. The semantic relationship =
would often have an associated URI, and other parameters that goes with it.

e.g.:

{
    "_links": {
        "terms-of-service": {
            "href": "https: //server.example.com/tos"
        },
        "privacy-policy": {
            "href": "https: //server.example.com/pp"
        },
        "self": {
            "href": "https: //server.example.com/clients/1234",
            "authorize": "Bearer"
        },
        "oauth_authz": {
            "href": "https: //server.example.com/authz",
            "scopes": "openid profile email",
            "response_types": [
                "token id_token",
                "code id_token",
                "token",
                "code"
            ]
        },
        "oauth_token": {
            "href": "https: //server.example.com/token",
            "authorize": "Basic"
        }
    }
}

In short, there are bunch of link relations that needs to be returned with =
additional parameters.
Grouping them seems to make sense.

Considering all these, John and I came to the conclusion that the HAL type =
syntax would probably make more sense.
(Note: JSON Schema syntax does not make the parameter access as easy as HAL=
.)

In fact, Mike Kelly (the author of HAL) and I have just submit a new versio=
n of draft-sakimura-oauth-meta

   http://tools.ietf.org/html/draft-sakimura-oauth-meta-02

The proposal was discussed at IETF 85 OAuth WG and the chairs asked to subm=
it the draft.
The -00 appeared in December, and this -02 has some simplification and the =
addition of the "operations" inspired by
https://tools.ietf.org/html/draft-ietf-scim-api-00#section-3.5 .
It is arguably a subset of HAL plus some OAuth specifics.
I have not added Discovery response example, but adding them would makes ev=
en more sense, I think.

Cheers,

Nat


2013/2/13 Justin Richer <jricher@mitre.org>
>
> Agreed - I didn't think that header-only was the proposal, but let's be e=
xplicit about the returned body always containing the URL. The way I read t=
he 201 definition, it suggests (SHOULD) that you use the location header, b=
ut also says that the entity should refer to the new resource. It was my as=
sumption that the returned JSON would still have some form of client-entity=
 management URL (whether it's the HAL _links structure or registration_mana=
gement_url or something else is still up for debate).
>
>  -- Justin
>
>
>
> On 02/12/2013 10:28 AM, John Bradley wrote:
>
> Returning a location header in the 201 ids fine as long as we also have t=
he same info as a claim.
>
> I think most clients will want to process the JSON and store all the para=
meters together.  Making them fish out a header makes the W3C happy and is =
the correct thing to do but taking it from a claim is what developers are m=
ore comfortable with.
>
> John B.
>
> On 2013-02-12, at 11:25 AM, Justin Richer <jricher@mitre.org> wrote:
>
> I'd be fine with the return from a creation request being a 201 instead o=
f a 200.
>
>  -- Justin
>
> On 02/11/2013 06:33 PM, Richard Harrington wrote:
>
> Since the request is an HTTP POST and a resource is created (http://www.w=
3.org/Protocols/rfc2616/rfc2616-sec9.html#sec9.5) the response should be an=
 HTTP 201 Created (http://www.w3.org/Protocols/rfc2616/rfc2616-sec10.html#s=
ec10.2.2) which is supposed to include the location of the newly created re=
source.
>
> This is a good pattern to follow since, as you say, it does provide flexi=
bility.
>
>
>
> On Feb 11, 2013, at 1:14 PM, Justin Richer <jricher@mitre.org> wrote:
>
> Draft -05 of OAuth Dynamic Client Registration [1] returns a URL pointer =
for the client to perform update and secret rotation actions. This function=
ality arose from discussions on the list about moving towards a more RESTfu=
l pattern, and Nat Sakimura proposed this approach in the OpenID Connect Wo=
rking Group. This URL may be distinct from the Client Registration Endpoint=
 URL, but draft -05 makes no promises as to its content, form, or structure=
, though it does contain implementor's notes on possible methods.
>
> Two questions arise from this change:
> - The semantics of returning the client manipulation URL
> - The syntax (derived from HAL for JSON [2], an individual I-D=20
> submission)
>
> On semantics:
>
> Pro:
> - The server has flexibility on how to define the "update" endpoint,=20
> sending all clients to one URL, sending different clients to different=20
> URLs, or sending clients to a URL with a baked-in query parameter
> - The client can take the URL as-is and use it for all management=20
> operations (ie, it doesn't have to generate or compose the URL based=20
> on component parts)
>
> Con:
> - The client must remember one more piece of information from the=20
> server at runtime if it wants to do manipulation and management of=20
> itself at the server (in addition to client_id, client_secret,=20
> registration_access_token, and others)
>
> Alternatives include specifying a URL pattern for the server to use and a=
ll clients to follow, specifying a query parameter for the update action, a=
nd specifying a separate endpoint entirely and using the presence of items =
such as client_id and the registration access token to differentiate the re=
quests. Note that *all* of these alternatives can be accommodated using the=
 semantics described above, with the same actions on the client's part.
>
>
> On syntax:
>
> Pro:
> - Follows the designs of RFC5988 for link relations
> - The HAL format is general, and allows for all kinds of other=20
> information to be placed inside the _links structure
> - Allows for full use of the JSON object to specify advanced=20
> operations on the returned endpoint if desired
>
> Con:
> - The rest of OAuth doesn't follow link relation guidelines (though=20
> it's been brought up)
> - The HAL format is general, and allows for all kinds of other=20
> information to be placed inside the _links structure
> - The HAL-JSON document is an expired individual I-D, and it's unclear=20
> what wider adoption looks like right now
>
> Alternatives include returning the URL as a separate data member (registr=
ation_update_url), using HTTP headers, or using JSON Schema.
>
> -- Justin
>
>
>
> [1] http://tools.ietf.org/html/draft-ietf-oauth-dyn-reg-05
> [2] http://tools.ietf.org/html/draft-kelly-json-hal-03
> _______________________________________________
> OAuth mailing list
> OAuth@ietf.org
> https://www.ietf.org/mailman/listinfo/oauth
>
>
> _______________________________________________
> OAuth mailing list
> OAuth@ietf.org
> https://www.ietf.org/mailman/listinfo/oauth
>
>
>
>
> _______________________________________________
> OAuth mailing list
> OAuth@ietf.org
> https://www.ietf.org/mailman/listinfo/oauth
>



--
Nat Sakimura (=3Dnat)
Chairman, OpenID Foundation
http://nat.sakimura.org/
@_nat_en
_______________________________________________
OAuth mailing list
OAuth@ietf.org
https://www.ietf.org/mailman/listinfo/oauth

From jricher@mitre.org  Tue Feb 12 11:33:35 2013
Return-Path: <jricher@mitre.org>
X-Original-To: oauth@ietfa.amsl.com
Delivered-To: oauth@ietfa.amsl.com
Received: from localhost (localhost [127.0.0.1]) by ietfa.amsl.com (Postfix) with ESMTP id 5A85021F90B5 for <oauth@ietfa.amsl.com>; Tue, 12 Feb 2013 11:33:35 -0800 (PST)
X-Virus-Scanned: amavisd-new at amsl.com
X-Spam-Flag: NO
X-Spam-Score: -6.573
X-Spam-Level: 
X-Spam-Status: No, score=-6.573 tagged_above=-999 required=5 tests=[AWL=0.025,  BAYES_00=-2.599, HTML_MESSAGE=0.001, RCVD_IN_DNSWL_MED=-4]
Received: from mail.ietf.org ([64.170.98.30]) by localhost (ietfa.amsl.com [127.0.0.1]) (amavisd-new, port 10024) with ESMTP id 5rt0jcpnXVSJ for <oauth@ietfa.amsl.com>; Tue, 12 Feb 2013 11:33:34 -0800 (PST)
Received: from smtpksrv1.mitre.org (smtpksrv1.mitre.org [198.49.146.77]) by ietfa.amsl.com (Postfix) with ESMTP id E7AC821F903A for <oauth@ietf.org>; Tue, 12 Feb 2013 11:33:33 -0800 (PST)
Received: from smtpksrv1.mitre.org (localhost.localdomain [127.0.0.1]) by localhost (Postfix) with SMTP id 35D9D5312EFC; Tue, 12 Feb 2013 14:33:30 -0500 (EST)
Received: from IMCCAS01.MITRE.ORG (imccas01.mitre.org [129.83.29.78]) by smtpksrv1.mitre.org (Postfix) with ESMTP id DB1F21F04BB; Tue, 12 Feb 2013 14:33:29 -0500 (EST)
Received: from [10.146.15.29] (129.83.31.58) by IMCCAS01.MITRE.ORG (129.83.29.78) with Microsoft SMTP Server (TLS) id 14.2.318.4; Tue, 12 Feb 2013 14:33:29 -0500
Message-ID: <511A98DE.4030507@mitre.org>
Date: Tue, 12 Feb 2013 14:32:46 -0500
From: Justin Richer <jricher@mitre.org>
User-Agent: Mozilla/5.0 (X11; Linux i686; rv:17.0) Gecko/20130106 Thunderbird/17.0.2
MIME-Version: 1.0
To: Mike Jones <Michael.Jones@microsoft.com>
References: <51195F3B.1010701@mitre.org> <4E1F6AAD24975D4BA5B168042967394367443A16@TK5EX14MBXC285.redmond.corp.microsoft.com>
In-Reply-To: <4E1F6AAD24975D4BA5B168042967394367443A16@TK5EX14MBXC285.redmond.corp.microsoft.com>
Content-Type: multipart/alternative; boundary="------------060906090100010907020602"
X-Originating-IP: [129.83.31.58]
Cc: "oauth@ietf.org" <oauth@ietf.org>
Subject: Re: [OAUTH-WG] Registration: JSON Encoded Input
X-BeenThere: oauth@ietf.org
X-Mailman-Version: 2.1.12
Precedence: list
List-Id: OAUTH WG <oauth.ietf.org>
List-Unsubscribe: <https://www.ietf.org/mailman/options/oauth>, <mailto:oauth-request@ietf.org?subject=unsubscribe>
List-Archive: <http://www.ietf.org/mail-archive/web/oauth>
List-Post: <mailto:oauth@ietf.org>
List-Help: <mailto:oauth-request@ietf.org?subject=help>
List-Subscribe: <https://www.ietf.org/mailman/listinfo/oauth>, <mailto:oauth-request@ietf.org?subject=subscribe>
X-List-Received-Date: Tue, 12 Feb 2013 19:33:35 -0000

--------------060906090100010907020602
Content-Type: text/plain; charset="ISO-8859-1"; format=flowed
Content-Transfer-Encoding: 7bit

Thanks for forwarding that, Mike. I'll paste in my response to Nat's 
concern here as well:

    It's an increasingly well known pattern that has reasonable support
    on the server side. For PHP, I was able to find the above example
    via the top hit on Stack Overflow. In Ruby, it's a matter of
    something like:

    JSON.parse(request.body.read)

    depending on the web app framework. On Java/Spring, it's a matter of
    injecting the entity body as a string and handing it to a parser
    (Gson in this case):

    public String doApi(@RequestBody String jsonString) { JsonObject
    json = new JsonParser().parse(jsonString).getAsJsonObject();

    It's a similar read/parse setup in Node.js as well.

    It's true that in all of these cases you don't get to make use of
    the routing or data binding facilities (though in Spring you can do
    that for simpler domain objects using a ModelBinding), so you don't
    get niceities like the $_POST array in PHP handed to you. This is
    why I don't think it's a good idea at all to switch functionality
    based on the contents of the JSON object. It should be a domain
    object only, which is what it would be in this case.

    I think that the positives of using JSON from the client's
    perspective and the overall protocol design far outweigh the
    slightly increased implementation cost at the server.



  -- Justin

On 02/12/2013 02:11 PM, Mike Jones wrote:
>
> FYI, this issue is also being discussed as an OpenID Connect issue at 
> https://bitbucket.org/openid/connect/issue/747. I think that Nat's 
> recent comment there bears repeating on this list:
>
> Nat Sakimura:
>
> Not so sure. For example, PHP cannot get the JSON object form 
> application/json POST in $_POST.
>
> It is OK to have a parameter like "request" that holds JSON. Then, you 
> can get to it from $_POST['request']. However, if you POST the JSON as 
> the POST body, then you would have to call a low level function in the 
> form of:
>
> ```
>
> #!php
>
> $file = file_get_contents('php://input'); $x = json_decode($file); ```
>
> Not that it is harder, but it is much less known. Many PHP programmers 
> will certainly goes "???".
>
> We need to check what would be the cases for other scripting languages 
> before making the final decision.
>
> -- Mike
>
> -----Original Message-----
> From: oauth-bounces@ietf.org [mailto:oauth-bounces@ietf.org] On Behalf 
> Of Justin Richer
> Sent: Monday, February 11, 2013 1:15 PM
> To: oauth@ietf.org
> Subject: [OAUTH-WG] Registration: JSON Encoded Input
>
> Draft -05 of OAuth Dynamic Client Registration [1] switched from a 
> form-encoded input that had been used by drafts -01 through -04 to a 
> JSON encoded input that was used originally in -00. Note that all 
> versions keep JSON-encoded output from all operations.
>
> Pro:
>
>   - JSON gives us a rich data structure so that things such as lists, 
> numbers, nulls, and objects can be represented natively
>
>   - Allows for parallelism between the input to the endpoint and 
> output from the endpoint, reducing possible translation errors between 
> the two
>
>   - JSON specifies UTF8 encoding for all strings, forms may have many 
> different encodings
>
>   - JSON has minimal character escaping required for most strings, 
> forms require escaping for common characters such as space, slash, 
> comma, etc.
>
> Con:
>
>   - the rest of OAuth is form-in/JSON-out
>
>   - nothing else in OAuth requires the Client to create a JSON object, 
> merely to parse one
>
>   - form-in/JSON-out is a very widely established pattern on the web today
>
>   - Client information (client_name, client_id, etc.) is conflated 
> with access information (registration_access_token, _links, 
> expires_at, etc.) in root level of the same JSON object, leaving the 
> client to decide what needs to (can?) be sent back to the server for 
> update operations.
>
> Alternatives include any number of data encoding schemes, including 
> form (like the old drafts), XML, ASN.1, etc.
>
>   -- Justin
>
> [1] http://tools.ietf.org/html/draft-ietf-oauth-dyn-reg-05
>
> _______________________________________________
>
> OAuth mailing list
>
> OAuth@ietf.org <mailto:OAuth@ietf.org>
>
> https://www.ietf.org/mailman/listinfo/oauth
>


--------------060906090100010907020602
Content-Type: text/html; charset="ISO-8859-1"
Content-Transfer-Encoding: 7bit

<html>
  <head>
    <meta content="text/html; charset=ISO-8859-1"
      http-equiv="Content-Type">
  </head>
  <body bgcolor="#FFFFFF" text="#000000">
    Thanks for forwarding that, Mike. I'll paste in my response to Nat's
    concern here as well:<br>
    <blockquote>It's an increasingly well known pattern that has
      reasonable support on the server side. For PHP, I was able to find
      the above example via the top hit on Stack Overflow. In Ruby, it's
      a matter of something like:<br>
      <br>
      JSON.parse(request.body.read)<br>
      <br>
      depending on the web app framework. On Java/Spring, it's a matter
      of injecting the entity body as a string and handing it to a
      parser (Gson in this case):<br>
      <br>
      public String doApi(@RequestBody String jsonString) { JsonObject
      json = new JsonParser().parse(jsonString).getAsJsonObject();<br>
      <br>
      It's a similar read/parse setup in Node.js as well.<br>
      <br>
      It's true that in all of these cases you don't get to make use of
      the routing or data binding facilities (though in Spring you can
      do that for simpler domain objects using a ModelBinding), so you
      don't get niceities like the $_POST array in PHP handed to you.
      This is why I don't think it's a good idea at all to switch
      functionality based on the contents of the JSON object. It should
      be a domain object only, which is what it would be in this case.<br>
      <br>
      I think that the positives of using JSON from the client's
      perspective and the overall protocol design far outweigh the
      slightly increased implementation cost at the server.<br>
    </blockquote>
    <br>
    <br>
    &nbsp;-- Justin<br>
    <br>
    <div class="moz-cite-prefix">On 02/12/2013 02:11 PM, Mike Jones
      wrote:<br>
    </div>
    <blockquote
cite="mid:4E1F6AAD24975D4BA5B168042967394367443A16@TK5EX14MBXC285.redmond.corp.microsoft.com"
      type="cite">
      <meta http-equiv="Content-Type" content="text/html;
        charset=ISO-8859-1">
      <meta name="Generator" content="Microsoft Word 14 (filtered
        medium)">
      <style><!--
/* Font Definitions */
@font-face
	{font-family:Calibri;
	panose-1:2 15 5 2 2 2 4 3 2 4;}
/* Style Definitions */
p.MsoNormal, li.MsoNormal, div.MsoNormal
	{margin:0in;
	margin-bottom:.0001pt;
	font-size:11.0pt;
	font-family:"Calibri","sans-serif";}
a:link, span.MsoHyperlink
	{mso-style-priority:99;
	color:blue;
	text-decoration:underline;}
a:visited, span.MsoHyperlinkFollowed
	{mso-style-priority:99;
	color:purple;
	text-decoration:underline;}
p.MsoPlainText, li.MsoPlainText, div.MsoPlainText
	{mso-style-priority:99;
	mso-style-link:"Plain Text Char";
	margin:0in;
	margin-bottom:.0001pt;
	font-size:11.0pt;
	font-family:"Calibri","sans-serif";}
span.PlainTextChar
	{mso-style-name:"Plain Text Char";
	mso-style-priority:99;
	mso-style-link:"Plain Text";
	font-family:"Calibri","sans-serif";}
.MsoChpDefault
	{mso-style-type:export-only;
	font-family:"Calibri","sans-serif";}
@page WordSection1
	{size:8.5in 11.0in;
	margin:1.0in 1.0in 1.0in 1.0in;}
div.WordSection1
	{page:WordSection1;}
--></style><!--[if gte mso 9]><xml>
<o:shapedefaults v:ext="edit" spidmax="1026" />
</xml><![endif]--><!--[if gte mso 9]><xml>
<o:shapelayout v:ext="edit">
<o:idmap v:ext="edit" data="1" />
</o:shapelayout></xml><![endif]-->
      <div class="WordSection1">
        <p class="MsoPlainText">FYI, this issue is also being discussed
          as an OpenID Connect issue at
          <a moz-do-not-send="true"
            href="https://bitbucket.org/openid/connect/issue/747">https://bitbucket.org/openid/connect/issue/747</a>.&nbsp;
          I think that Nat's recent comment there bears repeating on
          this list:<o:p></o:p></p>
        <p class="MsoPlainText"><o:p>&nbsp;</o:p></p>
        <p class="MsoPlainText" style="margin-left:.5in">Nat Sakimura:<o:p></o:p></p>
        <p class="MsoPlainText" style="margin-left:.5in"><o:p>&nbsp;</o:p></p>
        <p class="MsoPlainText" style="margin-left:.5in">Not so sure.
          For example, PHP cannot get the JSON object form
          application/json POST in $_POST.
          <o:p></o:p></p>
        <p class="MsoPlainText" style="margin-left:.5in"><o:p>&nbsp;</o:p></p>
        <p class="MsoPlainText" style="margin-left:.5in">It is OK to
          have a parameter like "request" that holds JSON. Then, you can
          get to it from $_POST['request']. However, if you POST the
          JSON as the POST body, then you would have to call a low level
          function in the form of: <o:p></o:p></p>
        <p class="MsoPlainText" style="margin-left:.5in"><o:p>&nbsp;</o:p></p>
        <p class="MsoPlainText" style="margin-left:.5in"><o:p>&nbsp;</o:p></p>
        <p class="MsoPlainText" style="margin-left:.5in">```<o:p></o:p></p>
        <p class="MsoPlainText" style="margin-left:.5in">#!php<o:p></o:p></p>
        <p class="MsoPlainText" style="margin-left:.5in"><o:p>&nbsp;</o:p></p>
        <p class="MsoPlainText" style="margin-left:.5in">$file =
          file_get_contents('php://input'); $x = json_decode($file); ```<o:p></o:p></p>
        <p class="MsoPlainText" style="margin-left:.5in"><o:p>&nbsp;</o:p></p>
        <p class="MsoPlainText" style="margin-left:.5in">Not that it is
          harder, but it is much less known. Many PHP programmers will
          certainly goes "???".
          <o:p></o:p></p>
        <p class="MsoPlainText" style="margin-left:.5in"><o:p>&nbsp;</o:p></p>
        <p class="MsoPlainText" style="margin-left:.5in">We need to
          check what would be the cases for other scripting languages
          before making the final decision.<o:p></o:p></p>
        <p class="MsoPlainText"><o:p>&nbsp;</o:p></p>
        <p class="MsoPlainText">&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;
          -- Mike<o:p></o:p></p>
        <p class="MsoPlainText"><o:p>&nbsp;</o:p></p>
        <p class="MsoPlainText">-----Original Message-----<br>
          From: <a class="moz-txt-link-abbreviated" href="mailto:oauth-bounces@ietf.org">oauth-bounces@ietf.org</a> [<a class="moz-txt-link-freetext" href="mailto:oauth-bounces@ietf.org">mailto:oauth-bounces@ietf.org</a>]
          On Behalf Of Justin Richer<br>
          Sent: Monday, February 11, 2013 1:15 PM<br>
          To: <a class="moz-txt-link-abbreviated" href="mailto:oauth@ietf.org">oauth@ietf.org</a><br>
          Subject: [OAUTH-WG] Registration: JSON Encoded Input</p>
        <p class="MsoPlainText"><o:p>&nbsp;</o:p></p>
        <p class="MsoPlainText">Draft -05 of OAuth Dynamic Client
          Registration [1] switched from a form-encoded input that had
          been used by drafts -01 through -04 to a JSON encoded input
          that was used originally in -00. Note that all versions keep
          JSON-encoded output from all operations.<o:p></o:p></p>
        <p class="MsoPlainText"><o:p>&nbsp;</o:p></p>
        <p class="MsoPlainText">Pro:<o:p></o:p></p>
        <p class="MsoPlainText">&nbsp; - JSON gives us a rich data structure
          so that things such as lists, numbers, nulls, and objects can
          be represented natively<o:p></o:p></p>
        <p class="MsoPlainText">&nbsp; - Allows for parallelism between the
          input to the endpoint and output from the endpoint, reducing
          possible translation errors between the two<o:p></o:p></p>
        <p class="MsoPlainText">&nbsp; - JSON specifies UTF8 encoding for all
          strings, forms may have many different encodings<o:p></o:p></p>
        <p class="MsoPlainText">&nbsp; - JSON has minimal character escaping
          required for most strings, forms require escaping for common
          characters such as space, slash, comma, etc.<o:p></o:p></p>
        <p class="MsoPlainText"><o:p>&nbsp;</o:p></p>
        <p class="MsoPlainText">Con:<o:p></o:p></p>
        <p class="MsoPlainText">&nbsp; - the rest of OAuth is
          form-in/JSON-out<o:p></o:p></p>
        <p class="MsoPlainText">&nbsp; - nothing else in OAuth requires the
          Client to create a JSON object, merely to parse one<o:p></o:p></p>
        <p class="MsoPlainText">&nbsp; - form-in/JSON-out is a very widely
          established pattern on the web today<o:p></o:p></p>
        <p class="MsoPlainText">&nbsp; - Client information (client_name,
          client_id, etc.) is conflated with access information
          (registration_access_token, _links, expires_at, etc.) in root
          level of the same JSON object, leaving the client to decide
          what needs to (can?) be sent back to the server for update
          operations.<o:p></o:p></p>
        <p class="MsoPlainText"><o:p>&nbsp;</o:p></p>
        <p class="MsoPlainText"><o:p>&nbsp;</o:p></p>
        <p class="MsoPlainText">Alternatives include any number of data
          encoding schemes, including form (like the old drafts), XML,
          ASN.1, etc.<o:p></o:p></p>
        <p class="MsoPlainText"><o:p>&nbsp;</o:p></p>
        <p class="MsoPlainText"><o:p>&nbsp;</o:p></p>
        <p class="MsoPlainText">&nbsp; -- Justin<o:p></o:p></p>
        <p class="MsoPlainText"><o:p>&nbsp;</o:p></p>
        <p class="MsoPlainText">[1] <a moz-do-not-send="true"
            href="http://tools.ietf.org/html/draft-ietf-oauth-dyn-reg-05">
            <span style="color:windowtext;text-decoration:none">http://tools.ietf.org/html/draft-ietf-oauth-dyn-reg-05</span></a><o:p></o:p></p>
        <p class="MsoPlainText">_______________________________________________<o:p></o:p></p>
        <p class="MsoPlainText">OAuth mailing list<o:p></o:p></p>
        <p class="MsoPlainText"><a moz-do-not-send="true"
            href="mailto:OAuth@ietf.org"><span
              style="color:windowtext;text-decoration:none">OAuth@ietf.org</span></a><o:p></o:p></p>
        <p class="MsoPlainText"><a moz-do-not-send="true"
            href="https://www.ietf.org/mailman/listinfo/oauth"><span
              style="color:windowtext;text-decoration:none">https://www.ietf.org/mailman/listinfo/oauth</span></a><o:p></o:p></p>
      </div>
    </blockquote>
    <br>
  </body>
</html>

--------------060906090100010907020602--

From ve7jtb@ve7jtb.com  Tue Feb 12 11:45:09 2013
Return-Path: <ve7jtb@ve7jtb.com>
X-Original-To: oauth@ietfa.amsl.com
Delivered-To: oauth@ietfa.amsl.com
Received: from localhost (localhost [127.0.0.1]) by ietfa.amsl.com (Postfix) with ESMTP id 6903921F8D74 for <oauth@ietfa.amsl.com>; Tue, 12 Feb 2013 11:45:09 -0800 (PST)
X-Virus-Scanned: amavisd-new at amsl.com
X-Spam-Flag: NO
X-Spam-Score: -3.253
X-Spam-Level: 
X-Spam-Status: No, score=-3.253 tagged_above=-999 required=5 tests=[AWL=0.345,  BAYES_00=-2.599, HTML_MESSAGE=0.001, RCVD_IN_DNSWL_LOW=-1]
Received: from mail.ietf.org ([12.22.58.30]) by localhost (ietfa.amsl.com [127.0.0.1]) (amavisd-new, port 10024) with ESMTP id IESbOrnYjZVM for <oauth@ietfa.amsl.com>; Tue, 12 Feb 2013 11:45:07 -0800 (PST)
Received: from mail-qe0-f47.google.com (mail-qe0-f47.google.com [209.85.128.47]) by ietfa.amsl.com (Postfix) with ESMTP id B26D321F8D68 for <oauth@ietf.org>; Tue, 12 Feb 2013 11:45:04 -0800 (PST)
Received: by mail-qe0-f47.google.com with SMTP id 2so205991qea.20 for <oauth@ietf.org>; Tue, 12 Feb 2013 11:45:04 -0800 (PST)
X-Google-DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=google.com; s=20120113; h=x-received:content-type:mime-version:subject:from:in-reply-to:date :cc:message-id:references:to:x-mailer:x-gm-message-state; bh=6fN+axhngRRsKaEoqodHQXtdIF3t9rMvyRQVRWsgino=; b=UbkiYLwJXCEfENdlbxCM5UMm6JkpdBiq1CR6sTsaOvFderJWbxCpmh8CW1AZBqO4Ty yt1RmMenjtBExFs7rZdM3KfIGYVPh6EMtsK6nHxkQi2KuVnNw0+e6eyctUNG6qKr+fos oJCSQ4GyfxAoF9ZDpQSJfTIJfrrdfQfDPMdht+1CZfaR+IEfB6B9TgxAOBQN2mKlhDTi OHG4eaiPzRney9Fddc3o5wwhYrZeWm4c2fvzUt6IGdQXRq9y3oHbDVSpfzOJ/VUmNUeq RQDjdsE9Kr8MmPKXyPmy13RrKL8hG1DiK1PHNaIj7yAQzbP49x84GE2BIYpXB9Uk94yr 8tHQ==
X-Received: by 10.49.25.102 with SMTP id b6mr8307203qeg.27.1360698303882; Tue, 12 Feb 2013 11:45:03 -0800 (PST)
Received: from [192.168.1.213] (190-20-23-212.baf.movistar.cl. [190.20.23.212]) by mx.google.com with ESMTPS id gr8sm626136qab.9.2013.02.12.11.44.59 (version=TLSv1 cipher=ECDHE-RSA-RC4-SHA bits=128/128); Tue, 12 Feb 2013 11:45:02 -0800 (PST)
Content-Type: multipart/alternative; boundary="Apple-Mail=_CE1FBB9C-CBB0-4DE8-8DBB-46EB5E727B79"
Mime-Version: 1.0 (Mac OS X Mail 6.2 \(1499\))
From: John Bradley <ve7jtb@ve7jtb.com>
In-Reply-To: <511A98DE.4030507@mitre.org>
Date: Tue, 12 Feb 2013 16:44:56 -0300
Message-Id: <9309CDB3-8AEE-428D-A7F0-5DAC45EFD44C@ve7jtb.com>
References: <51195F3B.1010701@mitre.org> <4E1F6AAD24975D4BA5B168042967394367443A16@TK5EX14MBXC285.redmond.corp.microsoft.com> <511A98DE.4030507@mitre.org>
To: Justin Richer <jricher@mitre.org>
X-Mailer: Apple Mail (2.1499)
X-Gm-Message-State: ALoCoQlftpyFgvYE7Kw7iz5SpuyNGfQ7KP3CKUnz+c/ABr1XFXH+Oafq7xhO2i0N00zgVatGr4rM
Cc: "oauth@ietf.org" <oauth@ietf.org>
Subject: Re: [OAUTH-WG] Registration: JSON Encoded Input
X-BeenThere: oauth@ietf.org
X-Mailman-Version: 2.1.12
Precedence: list
List-Id: OAUTH WG <oauth.ietf.org>
List-Unsubscribe: <https://www.ietf.org/mailman/options/oauth>, <mailto:oauth-request@ietf.org?subject=unsubscribe>
List-Archive: <http://www.ietf.org/mail-archive/web/oauth>
List-Post: <mailto:oauth@ietf.org>
List-Help: <mailto:oauth-request@ietf.org?subject=help>
List-Subscribe: <https://www.ietf.org/mailman/listinfo/oauth>, <mailto:oauth-request@ietf.org?subject=subscribe>
X-List-Received-Date: Tue, 12 Feb 2013 19:45:09 -0000

--Apple-Mail=_CE1FBB9C-CBB0-4DE8-8DBB-46EB5E727B79
Content-Transfer-Encoding: quoted-printable
Content-Type: text/plain;
	charset=iso-8859-1

Nat and I hashed out the pro's and cons of JSON requests. =20

If we POST or PUT a JSON object we need to be specific as there rare =
several ways to do it that may work better or worse depending on the =
receiver.
This needs to be looked over and one picked.

In the other thread about the server returning the update URI and being =
able to encode the client in that if it needs to takes care of Servers =
that need that info in query parameters or the path to do the routing.

The use of structure can be used to enhance readability and parsing of =
the input, and output.

However we need to temper our urge to apply structure to everything. =20

IT needs to be applied carefully otherwise we start looking like =
crazies.

If we do it cautiously I am in favour of JSON as input.

John B.

On 2013-02-12, at 4:32 PM, Justin Richer <jricher@mitre.org> wrote:

> Thanks for forwarding that, Mike. I'll paste in my response to Nat's =
concern here as well:
> It's an increasingly well known pattern that has reasonable support on =
the server side. For PHP, I was able to find the above example via the =
top hit on Stack Overflow. In Ruby, it's a matter of something like:
>=20
> JSON.parse(request.body.read)
>=20
> depending on the web app framework. On Java/Spring, it's a matter of =
injecting the entity body as a string and handing it to a parser (Gson =
in this case):
>=20
> public String doApi(@RequestBody String jsonString) { JsonObject json =
=3D new JsonParser().parse(jsonString).getAsJsonObject();
>=20
> It's a similar read/parse setup in Node.js as well.
>=20
> It's true that in all of these cases you don't get to make use of the =
routing or data binding facilities (though in Spring you can do that for =
simpler domain objects using a ModelBinding), so you don't get niceities =
like the $_POST array in PHP handed to you. This is why I don't think =
it's a good idea at all to switch functionality based on the contents of =
the JSON object. It should be a domain object only, which is what it =
would be in this case.
>=20
> I think that the positives of using JSON from the client's perspective =
and the overall protocol design far outweigh the slightly increased =
implementation cost at the server.
>=20
>=20
>  -- Justin
>=20
> On 02/12/2013 02:11 PM, Mike Jones wrote:
>> FYI, this issue is also being discussed as an OpenID Connect issue at =
https://bitbucket.org/openid/connect/issue/747.  I think that Nat's =
recent comment there bears repeating on this list:
>> =20
>> Nat Sakimura:
>> =20
>> Not so sure. For example, PHP cannot get the JSON object form =
application/json POST in $_POST.
>> =20
>> It is OK to have a parameter like "request" that holds JSON. Then, =
you can get to it from $_POST['request']. However, if you POST the JSON =
as the POST body, then you would have to call a low level function in =
the form of:
>> =20
>> =20
>> ```
>> #!php
>> =20
>> $file =3D file_get_contents('php://input'); $x =3D =
json_decode($file); ```
>> =20
>> Not that it is harder, but it is much less known. Many PHP =
programmers will certainly goes "???".
>> =20
>> We need to check what would be the cases for other scripting =
languages before making the final decision.
>> =20
>>                                                             -- Mike
>> =20
>> -----Original Message-----
>> From: oauth-bounces@ietf.org [mailto:oauth-bounces@ietf.org] On =
Behalf Of Justin Richer
>> Sent: Monday, February 11, 2013 1:15 PM
>> To: oauth@ietf.org
>> Subject: [OAUTH-WG] Registration: JSON Encoded Input
>> =20
>> Draft -05 of OAuth Dynamic Client Registration [1] switched from a =
form-encoded input that had been used by drafts -01 through -04 to a =
JSON encoded input that was used originally in -00. Note that all =
versions keep JSON-encoded output from all operations.
>> =20
>> Pro:
>>   - JSON gives us a rich data structure so that things such as lists, =
numbers, nulls, and objects can be represented natively
>>   - Allows for parallelism between the input to the endpoint and =
output from the endpoint, reducing possible translation errors between =
the two
>>   - JSON specifies UTF8 encoding for all strings, forms may have many =
different encodings
>>   - JSON has minimal character escaping required for most strings, =
forms require escaping for common characters such as space, slash, =
comma, etc.
>> =20
>> Con:
>>   - the rest of OAuth is form-in/JSON-out
>>   - nothing else in OAuth requires the Client to create a JSON =
object, merely to parse one
>>   - form-in/JSON-out is a very widely established pattern on the web =
today
>>   - Client information (client_name, client_id, etc.) is conflated =
with access information (registration_access_token, _links, expires_at, =
etc.) in root level of the same JSON object, leaving the client to =
decide what needs to (can?) be sent back to the server for update =
operations.
>> =20
>> =20
>> Alternatives include any number of data encoding schemes, including =
form (like the old drafts), XML, ASN.1, etc.
>> =20
>> =20
>>   -- Justin
>> =20
>> [1] http://tools.ietf.org/html/draft-ietf-oauth-dyn-reg-05
>> _______________________________________________
>> OAuth mailing list
>> OAuth@ietf.org
>> https://www.ietf.org/mailman/listinfo/oauth
>=20
> _______________________________________________
> OAuth mailing list
> OAuth@ietf.org
> https://www.ietf.org/mailman/listinfo/oauth


--Apple-Mail=_CE1FBB9C-CBB0-4DE8-8DBB-46EB5E727B79
Content-Transfer-Encoding: quoted-printable
Content-Type: text/html;
	charset=iso-8859-1

<html><head><meta http-equiv=3D"Content-Type" content=3D"text/html =
charset=3Diso-8859-1"></head><body style=3D"word-wrap: break-word; =
-webkit-nbsp-mode: space; -webkit-line-break: after-white-space; ">Nat =
and I hashed out the pro's and cons of JSON requests. =
&nbsp;<div><br></div><div>If we POST or PUT a JSON object we need to be =
specific as there rare several ways to do it that may work better or =
worse depending on the receiver.</div><div>This needs to be looked over =
and one picked.</div><div><br></div><div>In the other thread about the =
server returning the update URI and being able to encode the client in =
that if it needs to takes care of Servers that need that info in query =
parameters or the path to do the routing.</div><div><br></div><div>The =
use of structure can be used to enhance readability and parsing of the =
input, and output.</div><div><br></div><div>However we need to temper =
our urge to apply structure to everything. =
&nbsp;</div><div><br></div><div>IT needs to be applied carefully =
otherwise we start looking like crazies.</div><div><br></div><div>If we =
do it cautiously I am in favour of JSON as =
input.</div><div><br></div><div>John B.</div><div><br><div><div>On =
2013-02-12, at 4:32 PM, Justin Richer &lt;<a =
href=3D"mailto:jricher@mitre.org">jricher@mitre.org</a>&gt; =
wrote:</div><br class=3D"Apple-interchange-newline"><blockquote =
type=3D"cite">
 =20
    <meta content=3D"text/html; charset=3DISO-8859-1" =
http-equiv=3D"Content-Type">
 =20
  <div bgcolor=3D"#FFFFFF" text=3D"#000000">
    Thanks for forwarding that, Mike. I'll paste in my response to Nat's
    concern here as well:<br>
    <blockquote>It's an increasingly well known pattern that has
      reasonable support on the server side. For PHP, I was able to find
      the above example via the top hit on Stack Overflow. In Ruby, it's
      a matter of something like:<br>
      <br>
      JSON.parse(request.body.read)<br>
      <br>
      depending on the web app framework. On Java/Spring, it's a matter
      of injecting the entity body as a string and handing it to a
      parser (Gson in this case):<br>
      <br>
      public String doApi(@RequestBody String jsonString) { JsonObject
      json =3D new JsonParser().parse(jsonString).getAsJsonObject();<br>
      <br>
      It's a similar read/parse setup in Node.js as well.<br>
      <br>
      It's true that in all of these cases you don't get to make use of
      the routing or data binding facilities (though in Spring you can
      do that for simpler domain objects using a ModelBinding), so you
      don't get niceities like the $_POST array in PHP handed to you.
      This is why I don't think it's a good idea at all to switch
      functionality based on the contents of the JSON object. It should
      be a domain object only, which is what it would be in this =
case.<br>
      <br>
      I think that the positives of using JSON from the client's
      perspective and the overall protocol design far outweigh the
      slightly increased implementation cost at the server.<br>
    </blockquote>
    <br>
    <br>
    &nbsp;-- Justin<br>
    <br>
    <div class=3D"moz-cite-prefix">On 02/12/2013 02:11 PM, Mike Jones
      wrote:<br>
    </div>
    <blockquote =
cite=3D"mid:4E1F6AAD24975D4BA5B168042967394367443A16@TK5EX14MBXC285.redmon=
d.corp.microsoft.com" type=3D"cite">
      <meta http-equiv=3D"Content-Type" content=3D"text/html;
        charset=3DISO-8859-1">
      <meta name=3D"Generator" content=3D"Microsoft Word 14 (filtered
        medium)">
      <style><!--
/* Font Definitions */
@font-face
	{font-family:Calibri;
	panose-1:2 15 5 2 2 2 4 3 2 4;}
/* Style Definitions */
p.MsoNormal, li.MsoNormal, div.MsoNormal
	{margin:0in;
	margin-bottom:.0001pt;
	font-size:11.0pt;
	font-family:"Calibri","sans-serif";}
a:link, span.MsoHyperlink
	{mso-style-priority:99;
	color:blue;
	text-decoration:underline;}
a:visited, span.MsoHyperlinkFollowed
	{mso-style-priority:99;
	color:purple;
	text-decoration:underline;}
p.MsoPlainText, li.MsoPlainText, div.MsoPlainText
	{mso-style-priority:99;
	mso-style-link:"Plain Text Char";
	margin:0in;
	margin-bottom:.0001pt;
	font-size:11.0pt;
	font-family:"Calibri","sans-serif";}
span.PlainTextChar
	{mso-style-name:"Plain Text Char";
	mso-style-priority:99;
	mso-style-link:"Plain Text";
	font-family:"Calibri","sans-serif";}
.MsoChpDefault
	{mso-style-type:export-only;
	font-family:"Calibri","sans-serif";}
@page WordSection1
	{size:8.5in 11.0in;
	margin:1.0in 1.0in 1.0in 1.0in;}
div.WordSection1
	{page:WordSection1;}
--></style><!--[if gte mso 9]><xml>
<o:shapedefaults v:ext=3D"edit" spidmax=3D"1026" />
</xml><![endif]--><!--[if gte mso 9]><xml>
<o:shapelayout v:ext=3D"edit">
<o:idmap v:ext=3D"edit" data=3D"1" />
</o:shapelayout></xml><![endif]-->
      <div class=3D"WordSection1"><p class=3D"MsoPlainText">FYI, this =
issue is also being discussed
          as an OpenID Connect issue at
          <a moz-do-not-send=3D"true" =
href=3D"https://bitbucket.org/openid/connect/issue/747">https://bitbucket.=
org/openid/connect/issue/747</a>.&nbsp;
          I think that Nat's recent comment there bears repeating on
          this list:<o:p></o:p></p><p =
class=3D"MsoPlainText"><o:p>&nbsp;</o:p></p><p class=3D"MsoPlainText" =
style=3D"margin-left:.5in">Nat Sakimura:<o:p></o:p></p><p =
class=3D"MsoPlainText" style=3D"margin-left:.5in"><o:p>&nbsp;</o:p></p><p =
class=3D"MsoPlainText" style=3D"margin-left:.5in">Not so sure.
          For example, PHP cannot get the JSON object form
          application/json POST in $_POST.
          <o:p></o:p></p><p class=3D"MsoPlainText" =
style=3D"margin-left:.5in"><o:p>&nbsp;</o:p></p><p class=3D"MsoPlainText" =
style=3D"margin-left:.5in">It is OK to
          have a parameter like "request" that holds JSON. Then, you can
          get to it from $_POST['request']. However, if you POST the
          JSON as the POST body, then you would have to call a low level
          function in the form of: <o:p></o:p></p><p =
class=3D"MsoPlainText" style=3D"margin-left:.5in"><o:p>&nbsp;</o:p></p><p =
class=3D"MsoPlainText" style=3D"margin-left:.5in"><o:p>&nbsp;</o:p></p><p =
class=3D"MsoPlainText" style=3D"margin-left:.5in">```<o:p></o:p></p><p =
class=3D"MsoPlainText" style=3D"margin-left:.5in">#!php<o:p></o:p></p><p =
class=3D"MsoPlainText" style=3D"margin-left:.5in"><o:p>&nbsp;</o:p></p><p =
class=3D"MsoPlainText" style=3D"margin-left:.5in">$file =3D
          file_get_contents('<a href=3D"php://input'">php://input'</a>); =
$x =3D json_decode($file); ```<o:p></o:p></p><p class=3D"MsoPlainText" =
style=3D"margin-left:.5in"><o:p>&nbsp;</o:p></p><p class=3D"MsoPlainText" =
style=3D"margin-left:.5in">Not that it is
          harder, but it is much less known. Many PHP programmers will
          certainly goes "???".
          <o:p></o:p></p><p class=3D"MsoPlainText" =
style=3D"margin-left:.5in"><o:p>&nbsp;</o:p></p><p class=3D"MsoPlainText" =
style=3D"margin-left:.5in">We need to
          check what would be the cases for other scripting languages
          before making the final decision.<o:p></o:p></p><p =
class=3D"MsoPlainText"><o:p>&nbsp;</o:p></p><p =
class=3D"MsoPlainText">&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nb=
sp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp=
;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&=
nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nb=
sp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp=
;&nbsp;
          -- Mike<o:p></o:p></p><p =
class=3D"MsoPlainText"><o:p>&nbsp;</o:p></p><p =
class=3D"MsoPlainText">-----Original Message-----<br>
          From: <a class=3D"moz-txt-link-abbreviated" =
href=3D"mailto:oauth-bounces@ietf.org">oauth-bounces@ietf.org</a> [<a =
class=3D"moz-txt-link-freetext" =
href=3D"mailto:oauth-bounces@ietf.org">mailto:oauth-bounces@ietf.org</a>]
          On Behalf Of Justin Richer<br>
          Sent: Monday, February 11, 2013 1:15 PM<br>
          To: <a class=3D"moz-txt-link-abbreviated" =
href=3D"mailto:oauth@ietf.org">oauth@ietf.org</a><br>
          Subject: [OAUTH-WG] Registration: JSON Encoded Input</p><p =
class=3D"MsoPlainText"><o:p>&nbsp;</o:p></p><p =
class=3D"MsoPlainText">Draft -05 of OAuth Dynamic Client
          Registration [1] switched from a form-encoded input that had
          been used by drafts -01 through -04 to a JSON encoded input
          that was used originally in -00. Note that all versions keep
          JSON-encoded output from all operations.<o:p></o:p></p><p =
class=3D"MsoPlainText"><o:p>&nbsp;</o:p></p><p =
class=3D"MsoPlainText">Pro:<o:p></o:p></p><p class=3D"MsoPlainText">&nbsp;=
 - JSON gives us a rich data structure
          so that things such as lists, numbers, nulls, and objects can
          be represented natively<o:p></o:p></p><p =
class=3D"MsoPlainText">&nbsp; - Allows for parallelism between the
          input to the endpoint and output from the endpoint, reducing
          possible translation errors between the two<o:p></o:p></p><p =
class=3D"MsoPlainText">&nbsp; - JSON specifies UTF8 encoding for all
          strings, forms may have many different =
encodings<o:p></o:p></p><p class=3D"MsoPlainText">&nbsp; - JSON has =
minimal character escaping
          required for most strings, forms require escaping for common
          characters such as space, slash, comma, etc.<o:p></o:p></p><p =
class=3D"MsoPlainText"><o:p>&nbsp;</o:p></p><p =
class=3D"MsoPlainText">Con:<o:p></o:p></p><p class=3D"MsoPlainText">&nbsp;=
 - the rest of OAuth is
          form-in/JSON-out<o:p></o:p></p><p class=3D"MsoPlainText">&nbsp; =
- nothing else in OAuth requires the
          Client to create a JSON object, merely to parse =
one<o:p></o:p></p><p class=3D"MsoPlainText">&nbsp; - form-in/JSON-out is =
a very widely
          established pattern on the web today<o:p></o:p></p><p =
class=3D"MsoPlainText">&nbsp; - Client information (client_name,
          client_id, etc.) is conflated with access information
          (registration_access_token, _links, expires_at, etc.) in root
          level of the same JSON object, leaving the client to decide
          what needs to (can?) be sent back to the server for update
          operations.<o:p></o:p></p><p =
class=3D"MsoPlainText"><o:p>&nbsp;</o:p></p><p =
class=3D"MsoPlainText"><o:p>&nbsp;</o:p></p><p =
class=3D"MsoPlainText">Alternatives include any number of data
          encoding schemes, including form (like the old drafts), XML,
          ASN.1, etc.<o:p></o:p></p><p =
class=3D"MsoPlainText"><o:p>&nbsp;</o:p></p><p =
class=3D"MsoPlainText"><o:p>&nbsp;</o:p></p><p =
class=3D"MsoPlainText">&nbsp; -- Justin<o:p></o:p></p><p =
class=3D"MsoPlainText"><o:p>&nbsp;</o:p></p><p class=3D"MsoPlainText">[1] =
<a moz-do-not-send=3D"true" =
href=3D"http://tools.ietf.org/html/draft-ietf-oauth-dyn-reg-05">
            <span =
style=3D"color:windowtext;text-decoration:none">http://tools.ietf.org/html=
/draft-ietf-oauth-dyn-reg-05</span></a><o:p></o:p></p><p =
class=3D"MsoPlainText">_______________________________________________<o:p=
></o:p></p><p class=3D"MsoPlainText">OAuth mailing list<o:p></o:p></p><p =
class=3D"MsoPlainText"><a moz-do-not-send=3D"true" =
href=3D"mailto:OAuth@ietf.org"><span =
style=3D"color:windowtext;text-decoration:none">OAuth@ietf.org</span></a><=
o:p></o:p></p><p class=3D"MsoPlainText"><a moz-do-not-send=3D"true" =
href=3D"https://www.ietf.org/mailman/listinfo/oauth"><span =
style=3D"color:windowtext;text-decoration:none">https://www.ietf.org/mailm=
an/listinfo/oauth</span></a><o:p></o:p></p>
      </div>
    </blockquote>
    <br>
  </div>

_______________________________________________<br>OAuth mailing =
list<br><a =
href=3D"mailto:OAuth@ietf.org">OAuth@ietf.org</a><br>https://www.ietf.org/=
mailman/listinfo/oauth<br></blockquote></div><br></div></body></html>=

--Apple-Mail=_CE1FBB9C-CBB0-4DE8-8DBB-46EB5E727B79--

From twbray@google.com  Tue Feb 12 11:49:07 2013
Return-Path: <twbray@google.com>
X-Original-To: oauth@ietfa.amsl.com
Delivered-To: oauth@ietfa.amsl.com
Received: from localhost (localhost [127.0.0.1]) by ietfa.amsl.com (Postfix) with ESMTP id 1521A21F8AD1 for <oauth@ietfa.amsl.com>; Tue, 12 Feb 2013 11:49:07 -0800 (PST)
X-Virus-Scanned: amavisd-new at amsl.com
X-Spam-Flag: NO
X-Spam-Score: -101.699
X-Spam-Level: 
X-Spam-Status: No, score=-101.699 tagged_above=-999 required=5 tests=[AWL=0.278, BAYES_00=-2.599, FM_FORGED_GMAIL=0.622, HTML_MESSAGE=0.001, NO_RELAYS=-0.001, USER_IN_WHITELIST=-100]
Received: from mail.ietf.org ([12.22.58.30]) by localhost (ietfa.amsl.com [127.0.0.1]) (amavisd-new, port 10024) with ESMTP id aeCxDO2bRnYx for <oauth@ietfa.amsl.com>; Tue, 12 Feb 2013 11:49:05 -0800 (PST)
Received: from mail-ie0-x22d.google.com (ie-in-x022d.1e100.net [IPv6:2607:f8b0:4001:c03::22d]) by ietfa.amsl.com (Postfix) with ESMTP id 79CEC21F871C for <oauth@ietf.org>; Tue, 12 Feb 2013 11:49:05 -0800 (PST)
Received: by mail-ie0-f173.google.com with SMTP id 9so637801iec.32 for <oauth@ietf.org>; Tue, 12 Feb 2013 11:49:05 -0800 (PST)
DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=google.com; s=20120113; h=x-received:mime-version:in-reply-to:references:from:date:message-id :subject:to:cc:content-type; bh=TcQMQd36ouUkpvKxW8dAi3BlQKE2sGJbXg4+8oEONDA=; b=kc6DV4y0VcnqJ1D7L0QwJcIvxvHaKncN8PFx8quFwaSz3Dv2I5Giy3gjozykUSTLum P6ISQiYKS68gcFQZlp+gwhF8PGlCbrdV9SetkQ/47B5DYEgGDUKzBnGl7pprk5Y2VVl6 GPzEBkt8X5nwWpfDYT5GK3NlWoADB/DmzHKRUwppQ0jq7wXFR3Lb0A8Suex8slQcdOh9 1+WC0R8BMErQdNYFG151pBbltH+XsByd2jDayT2F6S/YWO2vyDgdlM9SBJL7govRFzBG f8QzIX4qROuuPwoQp9l4PH5SPGAxaecu6XIp7uOU0ccTDIS1uf2NCA7zusWxYDGBgIt4 FNmA==
X-Google-DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=google.com; s=20120113; h=x-received:mime-version:in-reply-to:references:from:date:message-id :subject:to:cc:content-type:x-gm-message-state; bh=TcQMQd36ouUkpvKxW8dAi3BlQKE2sGJbXg4+8oEONDA=; b=fhIK73zH4KnC0epZ6G2B5KQe0snUThJ9FYiBU4g0paJuX2h+kfWFtkLlvSTEMJbLbu R4ylwaLx5ihi3BuFxCSPJtIN/MLACNDlHnhau36afTWOEMjm4VxFjfjRoqpxfBTOg+hV j08p1S8Fle1eI2rZ1fPJqyP5j+rSGuAy9qx9zsOP/MXwCY+pzYSPmDd8rNYAHoZjnO0A VKDMnumTirQ87/6Pze62EmdvV36ylEN8MtF0/ql8bzHxXpXRUcm8ntxKKL/snw4C9pBs Jr1zFx8I0haWgd8LrzuNMthj0gPZZqs1Iz3TwACSug6/F9/We293rTmBUC0+r4KaJyIy llPw==
X-Received: by 10.42.180.65 with SMTP id bt1mr25339617icb.41.1360698544933; Tue, 12 Feb 2013 11:49:04 -0800 (PST)
MIME-Version: 1.0
Received: by 10.64.25.17 with HTTP; Tue, 12 Feb 2013 11:48:34 -0800 (PST)
In-Reply-To: <9309CDB3-8AEE-428D-A7F0-5DAC45EFD44C@ve7jtb.com>
References: <51195F3B.1010701@mitre.org> <4E1F6AAD24975D4BA5B168042967394367443A16@TK5EX14MBXC285.redmond.corp.microsoft.com> <511A98DE.4030507@mitre.org> <9309CDB3-8AEE-428D-A7F0-5DAC45EFD44C@ve7jtb.com>
From: Tim Bray <twbray@google.com>
Date: Tue, 12 Feb 2013 11:48:34 -0800
Message-ID: <CA+ZpN27U5MB0sbEw=RdVe_YiESUnkjsAmBJezSVg2FafEi8OJQ@mail.gmail.com>
To: John Bradley <ve7jtb@ve7jtb.com>
Content-Type: multipart/alternative; boundary=90e6ba6e81d86acb7104d58c51e0
X-Gm-Message-State: ALoCoQmffeWpC0Fl5hCL23ga9HBNf29kmaCrFcmjzpfLYFPHrGohcOOxC243EOthSOYIO4rZYIdgpGrnz6rm9jVmogWR5FSLVCbh2HAfadgjAIIDGC4YR9nGMHhmlRHE5+OK66Ju9owtFxtaaJ7zd02Njc1cEFQ8dsAQ1bjfKlSlVy2GprtC3y7iFfAAiZlEHKxPR3wXuhhz
Cc: "oauth@ietf.org" <oauth@ietf.org>
Subject: Re: [OAUTH-WG] Registration: JSON Encoded Input
X-BeenThere: oauth@ietf.org
X-Mailman-Version: 2.1.12
Precedence: list
List-Id: OAUTH WG <oauth.ietf.org>
List-Unsubscribe: <https://www.ietf.org/mailman/options/oauth>, <mailto:oauth-request@ietf.org?subject=unsubscribe>
List-Archive: <http://www.ietf.org/mail-archive/web/oauth>
List-Post: <mailto:oauth@ietf.org>
List-Help: <mailto:oauth-request@ietf.org?subject=help>
List-Subscribe: <https://www.ietf.org/mailman/listinfo/oauth>, <mailto:oauth-request@ietf.org?subject=subscribe>
X-List-Received-Date: Tue, 12 Feb 2013 19:49:07 -0000

--90e6ba6e81d86acb7104d58c51e0
Content-Type: text/plain; charset=UTF-8
Content-Transfer-Encoding: quoted-printable

On Tue, Feb 12, 2013 at 11:44 AM, John Bradley <ve7jtb@ve7jtb.com> wrote:

> Nat and I hashed out the pro's and cons of JSON requests.
>
> If we POST or PUT a JSON object we need to be specific as there rare
> several ways to do it that may work better or worse depending on the
> receiver.
> This needs to be looked over and one picked.
>

Hm?  Not following on =E2=80=9Cseveral ways=E2=80=9D, I=E2=80=99d have thou=
ght that POSTing JSON is
just POSTing JSON, must be missing something. -T


>
> In the other thread about the server returning the update URI and being
> able to encode the client in that if it needs to takes care of Servers th=
at
> need that info in query parameters or the path to do the routing.
>
> The use of structure can be used to enhance readability and parsing of th=
e
> input, and output.
>
> However we need to temper our urge to apply structure to everything.
>
> IT needs to be applied carefully otherwise we start looking like crazies.
>
> If we do it cautiously I am in favour of JSON as input.
>
> John B.
>
> On 2013-02-12, at 4:32 PM, Justin Richer <jricher@mitre.org> wrote:
>
>  Thanks for forwarding that, Mike. I'll paste in my response to Nat's
> concern here as well:
>
> It's an increasingly well known pattern that has reasonable support on th=
e
> server side. For PHP, I was able to find the above example via the top hi=
t
> on Stack Overflow. In Ruby, it's a matter of something like:
>
> JSON.parse(request.body.read)
>
> depending on the web app framework. On Java/Spring, it's a matter of
> injecting the entity body as a string and handing it to a parser (Gson in
> this case):
>
> public String doApi(@RequestBody String jsonString) { JsonObject json =3D
> new JsonParser().parse(jsonString).getAsJsonObject();
>
> It's a similar read/parse setup in Node.js as well.
>
> It's true that in all of these cases you don't get to make use of the
> routing or data binding facilities (though in Spring you can do that for
> simpler domain objects using a ModelBinding), so you don't get niceities
> like the $_POST array in PHP handed to you. This is why I don't think it'=
s
> a good idea at all to switch functionality based on the contents of the
> JSON object. It should be a domain object only, which is what it would be
> in this case.
>
> I think that the positives of using JSON from the client's perspective an=
d
> the overall protocol design far outweigh the slightly increased
> implementation cost at the server.
>
>
>
>  -- Justin
>
> On 02/12/2013 02:11 PM, Mike Jones wrote:
>
> FYI, this issue is also being discussed as an OpenID Connect issue at
> https://bitbucket.org/openid/connect/issue/747.  I think that Nat's
> recent comment there bears repeating on this list:****
>
> ** **
>
> Nat Sakimura:****
>
> ** **
>
> Not so sure. For example, PHP cannot get the JSON object form
> application/json POST in $_POST. ****
>
> ** **
>
> It is OK to have a parameter like "request" that holds JSON. Then, you ca=
n
> get to it from $_POST['request']. However, if you POST the JSON as the PO=
ST
> body, then you would have to call a low level function in the form of: **=
*
> *
>
> ** **
>
> ** **
>
> ```****
>
> #!php****
>
> ** **
>
> $file =3D file_get_contents('php://input'); $x =3D json_decode($file); ``=
`****
>
> ** **
>
> Not that it is harder, but it is much less known. Many PHP programmers
> will certainly goes "???". ****
>
> ** **
>
> We need to check what would be the cases for other scripting languages
> before making the final decision.****
>
> ** **
>
>                                                             -- Mike****
>
> ** **
>
> -----Original Message-----
> From: oauth-bounces@ietf.org [mailto:oauth-bounces@ietf.org<oauth-bounces=
@ietf.org>]
> On Behalf Of Justin Richer
> Sent: Monday, February 11, 2013 1:15 PM
> To: oauth@ietf.org
> Subject: [OAUTH-WG] Registration: JSON Encoded Input
>
> ** **
>
> Draft -05 of OAuth Dynamic Client Registration [1] switched from a
> form-encoded input that had been used by drafts -01 through -04 to a JSON
> encoded input that was used originally in -00. Note that all versions kee=
p
> JSON-encoded output from all operations.****
>
> ** **
>
> Pro:****
>
>   - JSON gives us a rich data structure so that things such as lists,
> numbers, nulls, and objects can be represented natively****
>
>   - Allows for parallelism between the input to the endpoint and output
> from the endpoint, reducing possible translation errors between the two**=
*
> *
>
>   - JSON specifies UTF8 encoding for all strings, forms may have many
> different encodings****
>
>   - JSON has minimal character escaping required for most strings, forms
> require escaping for common characters such as space, slash, comma, etc.*=
*
> **
>
> ** **
>
> Con:****
>
>   - the rest of OAuth is form-in/JSON-out****
>
>   - nothing else in OAuth requires the Client to create a JSON object,
> merely to parse one****
>
>   - form-in/JSON-out is a very widely established pattern on the web toda=
y
> ****
>
>   - Client information (client_name, client_id, etc.) is conflated with
> access information (registration_access_token, _links, expires_at, etc.) =
in
> root level of the same JSON object, leaving the client to decide what nee=
ds
> to (can?) be sent back to the server for update operations.****
>
> ** **
>
> ** **
>
> Alternatives include any number of data encoding schemes, including form
> (like the old drafts), XML, ASN.1, etc.****
>
> ** **
>
> ** **
>
>   -- Justin****
>
> ** **
>
> [1] http://tools.ietf.org/html/draft-ietf-oauth-dyn-reg-05****
>
> _______________________________________________****
>
> OAuth mailing list****
>
> OAuth@ietf.org****
>
> https://www.ietf.org/mailman/listinfo/oauth****
>
>
>  _______________________________________________
> OAuth mailing list
> OAuth@ietf.org
> https://www.ietf.org/mailman/listinfo/oauth
>
>
>
> _______________________________________________
> OAuth mailing list
> OAuth@ietf.org
> https://www.ietf.org/mailman/listinfo/oauth
>
>

--90e6ba6e81d86acb7104d58c51e0
Content-Type: text/html; charset=UTF-8
Content-Transfer-Encoding: quoted-printable

<br><br><div class=3D"gmail_quote">On Tue, Feb 12, 2013 at 11:44 AM, John B=
radley <span dir=3D"ltr">&lt;<a href=3D"mailto:ve7jtb@ve7jtb.com" target=3D=
"_blank">ve7jtb@ve7jtb.com</a>&gt;</span> wrote:<br><blockquote class=3D"gm=
ail_quote" style=3D"margin:0 0 0 .8ex;border-left:1px #ccc solid;padding-le=
ft:1ex">

<div style=3D"word-wrap:break-word">Nat and I hashed out the pro&#39;s and =
cons of JSON requests. =C2=A0<div><br></div><div>If we POST or PUT a JSON o=
bject we need to be specific as there rare several ways to do it that may w=
ork better or worse depending on the receiver.</div>

<div>This needs to be looked over and one picked.</div></div></blockquote><=
div><br></div><div>Hm? =C2=A0Not following on =E2=80=9Cseveral ways=E2=80=
=9D, I=E2=80=99d have thought that POSTing JSON is just POSTing JSON, must =
be missing something. -T</div>

<div>=C2=A0</div><blockquote class=3D"gmail_quote" style=3D"margin:0 0 0 .8=
ex;border-left:1px #ccc solid;padding-left:1ex"><div style=3D"word-wrap:bre=
ak-word"><div><br></div><div>In the other thread about the server returning=
 the update URI and being able to encode the client in that if it needs to =
takes care of Servers that need that info in query parameters or the path t=
o do the routing.</div>

<div><br></div><div>The use of structure can be used to enhance readability=
 and parsing of the input, and output.</div><div><br></div><div>However we =
need to temper our urge to apply structure to everything. =C2=A0</div><div>
<br>
</div><div>IT needs to be applied carefully otherwise we start looking like=
 crazies.</div><div><br></div><div>If we do it cautiously I am in favour of=
 JSON as input.</div><div><br></div><div>John B.</div><div><div class=3D"h5=
">

<div><br><div><div>On 2013-02-12, at 4:32 PM, Justin Richer &lt;<a href=3D"=
mailto:jricher@mitre.org" target=3D"_blank">jricher@mitre.org</a>&gt; wrote=
:</div><br><blockquote type=3D"cite">
 =20
   =20
 =20
  <div bgcolor=3D"#FFFFFF" text=3D"#000000">
    Thanks for forwarding that, Mike. I&#39;ll paste in my response to Nat&=
#39;s
    concern here as well:<br>
    <blockquote>It&#39;s an increasingly well known pattern that has
      reasonable support on the server side. For PHP, I was able to find
      the above example via the top hit on Stack Overflow. In Ruby, it&#39;=
s
      a matter of something like:<br>
      <br>
      JSON.parse(request.body.read)<br>
      <br>
      depending on the web app framework. On Java/Spring, it&#39;s a matter
      of injecting the entity body as a string and handing it to a
      parser (Gson in this case):<br>
      <br>
      public String doApi(@RequestBody String jsonString) { JsonObject
      json =3D new JsonParser().parse(jsonString).getAsJsonObject();<br>
      <br>
      It&#39;s a similar read/parse setup in Node.js as well.<br>
      <br>
      It&#39;s true that in all of these cases you don&#39;t get to make us=
e of
      the routing or data binding facilities (though in Spring you can
      do that for simpler domain objects using a ModelBinding), so you
      don&#39;t get niceities like the $_POST array in PHP handed to you.
      This is why I don&#39;t think it&#39;s a good idea at all to switch
      functionality based on the contents of the JSON object. It should
      be a domain object only, which is what it would be in this case.<br>
      <br>
      I think that the positives of using JSON from the client&#39;s
      perspective and the overall protocol design far outweigh the
      slightly increased implementation cost at the server.<br>
    </blockquote>
    <br>
    <br>
    =C2=A0-- Justin<br>
    <br>
    <div>On 02/12/2013 02:11 PM, Mike Jones
      wrote:<br>
    </div>
    <blockquote type=3D"cite">
     =20
     =20
     =20
      <div><p>FYI, this issue is also being discussed
          as an OpenID Connect issue at
          <a href=3D"https://bitbucket.org/openid/connect/issue/747" target=
=3D"_blank">https://bitbucket.org/openid/connect/issue/747</a>.=C2=A0
          I think that Nat&#39;s recent comment there bears repeating on
          this list:<u></u><u></u></p><p><u></u>=C2=A0<u></u></p><p style=
=3D"margin-left:.5in">Nat Sakimura:<u></u><u></u></p><p style=3D"margin-lef=
t:.5in"><u></u>=C2=A0<u></u></p><p style=3D"margin-left:.5in">Not so sure.
          For example, PHP cannot get the JSON object form
          application/json POST in $_POST.
          <u></u><u></u></p><p style=3D"margin-left:.5in"><u></u>=C2=A0<u><=
/u></p><p style=3D"margin-left:.5in">It is OK to
          have a parameter like &quot;request&quot; that holds JSON. Then, =
you can
          get to it from $_POST[&#39;request&#39;]. However, if you POST th=
e
          JSON as the POST body, then you would have to call a low level
          function in the form of: <u></u><u></u></p><p style=3D"margin-lef=
t:.5in"><u></u>=C2=A0<u></u></p><p style=3D"margin-left:.5in"><u></u>=C2=A0=
<u></u></p><p style=3D"margin-left:.5in">```<u></u><u></u></p><p style=3D"m=
argin-left:.5in">

#!php<u></u><u></u></p><p style=3D"margin-left:.5in"><u></u>=C2=A0<u></u></=
p><p style=3D"margin-left:.5in">$file =3D
          file_get_contents(&#39;<a>php://input&#39;</a>); $x =3D json_deco=
de($file); ```<u></u><u></u></p><p style=3D"margin-left:.5in"><u></u>=C2=A0=
<u></u></p><p style=3D"margin-left:.5in">Not that it is
          harder, but it is much less known. Many PHP programmers will
          certainly goes &quot;???&quot;.
          <u></u><u></u></p><p style=3D"margin-left:.5in"><u></u>=C2=A0<u><=
/u></p><p style=3D"margin-left:.5in">We need to
          check what would be the cases for other scripting languages
          before making the final decision.<u></u><u></u></p><p><u></u>=C2=
=A0<u></u></p><p>=C2=A0=C2=A0=C2=A0=C2=A0=C2=A0=C2=A0=C2=A0=C2=A0=C2=A0=C2=
=A0=C2=A0=C2=A0=C2=A0=C2=A0=C2=A0=C2=A0=C2=A0=C2=A0=C2=A0=C2=A0=C2=A0=C2=A0=
=C2=A0=C2=A0=C2=A0=C2=A0=C2=A0=C2=A0=C2=A0=C2=A0=C2=A0=C2=A0=C2=A0=C2=A0=C2=
=A0=C2=A0=C2=A0=C2=A0=C2=A0=C2=A0=C2=A0=C2=A0=C2=A0=C2=A0=C2=A0=C2=A0=C2=A0=
=C2=A0=C2=A0=C2=A0=C2=A0=C2=A0=C2=A0=C2=A0=C2=A0=C2=A0=C2=A0=C2=A0=C2=A0
          -- Mike<u></u><u></u></p><p><u></u>=C2=A0<u></u></p><p>-----Origi=
nal Message-----<br>
          From: <a href=3D"mailto:oauth-bounces@ietf.org" target=3D"_blank"=
>oauth-bounces@ietf.org</a> [<a href=3D"mailto:oauth-bounces@ietf.org" targ=
et=3D"_blank">mailto:oauth-bounces@ietf.org</a>]
          On Behalf Of Justin Richer<br>
          Sent: Monday, February 11, 2013 1:15 PM<br>
          To: <a href=3D"mailto:oauth@ietf.org" target=3D"_blank">oauth@iet=
f.org</a><br>
          Subject: [OAUTH-WG] Registration: JSON Encoded Input</p><p><u></u=
>=C2=A0<u></u></p><p>Draft -05 of OAuth Dynamic Client
          Registration [1] switched from a form-encoded input that had
          been used by drafts -01 through -04 to a JSON encoded input
          that was used originally in -00. Note that all versions keep
          JSON-encoded output from all operations.<u></u><u></u></p><p><u><=
/u>=C2=A0<u></u></p><p>Pro:<u></u><u></u></p><p>=C2=A0 - JSON gives us a ri=
ch data structure
          so that things such as lists, numbers, nulls, and objects can
          be represented natively<u></u><u></u></p><p>=C2=A0 - Allows for p=
arallelism between the
          input to the endpoint and output from the endpoint, reducing
          possible translation errors between the two<u></u><u></u></p><p>=
=C2=A0 - JSON specifies UTF8 encoding for all
          strings, forms may have many different encodings<u></u><u></u></p=
><p>=C2=A0 - JSON has minimal character escaping
          required for most strings, forms require escaping for common
          characters such as space, slash, comma, etc.<u></u><u></u></p><p>=
<u></u>=C2=A0<u></u></p><p>Con:<u></u><u></u></p><p>=C2=A0 - the rest of OA=
uth is
          form-in/JSON-out<u></u><u></u></p><p>=C2=A0 - nothing else in OAu=
th requires the
          Client to create a JSON object, merely to parse one<u></u><u></u>=
</p><p>=C2=A0 - form-in/JSON-out is a very widely
          established pattern on the web today<u></u><u></u></p><p>=C2=A0 -=
 Client information (client_name,
          client_id, etc.) is conflated with access information
          (registration_access_token, _links, expires_at, etc.) in root
          level of the same JSON object, leaving the client to decide
          what needs to (can?) be sent back to the server for update
          operations.<u></u><u></u></p><p><u></u>=C2=A0<u></u></p><p><u></u=
>=C2=A0<u></u></p><p>Alternatives include any number of data
          encoding schemes, including form (like the old drafts), XML,
          ASN.1, etc.<u></u><u></u></p><p><u></u>=C2=A0<u></u></p><p><u></u=
>=C2=A0<u></u></p><p>=C2=A0 -- Justin<u></u><u></u></p><p><u></u>=C2=A0<u><=
/u></p><p>[1] <a href=3D"http://tools.ietf.org/html/draft-ietf-oauth-dyn-re=
g-05" target=3D"_blank">
            <span style=3D"color:windowtext;text-decoration:none">http://to=
ols.ietf.org/html/draft-ietf-oauth-dyn-reg-05</span></a><u></u><u></u></p><=
p>_______________________________________________<u></u><u></u></p><p>OAuth=
 mailing list<u></u><u></u></p>

<p><a href=3D"mailto:OAuth@ietf.org" target=3D"_blank"><span style=3D"color=
:windowtext;text-decoration:none">OAuth@ietf.org</span></a><u></u><u></u></=
p><p><a href=3D"https://www.ietf.org/mailman/listinfo/oauth" target=3D"_bla=
nk"><span style=3D"color:windowtext;text-decoration:none">https://www.ietf.=
org/mailman/listinfo/oauth</span></a><u></u><u></u></p>


      </div>
    </blockquote>
    <br>
  </div>

_______________________________________________<br>OAuth mailing list<br><a=
 href=3D"mailto:OAuth@ietf.org" target=3D"_blank">OAuth@ietf.org</a><br><a =
href=3D"https://www.ietf.org/mailman/listinfo/oauth" target=3D"_blank">http=
s://www.ietf.org/mailman/listinfo/oauth</a><br>

</blockquote></div><br></div></div></div></div><br>________________________=
_______________________<br>
OAuth mailing list<br>
<a href=3D"mailto:OAuth@ietf.org">OAuth@ietf.org</a><br>
<a href=3D"https://www.ietf.org/mailman/listinfo/oauth" target=3D"_blank">h=
ttps://www.ietf.org/mailman/listinfo/oauth</a><br>
<br></blockquote></div><br>

--90e6ba6e81d86acb7104d58c51e0--

From ve7jtb@ve7jtb.com  Tue Feb 12 11:53:07 2013
Return-Path: <ve7jtb@ve7jtb.com>
X-Original-To: oauth@ietfa.amsl.com
Delivered-To: oauth@ietfa.amsl.com
Received: from localhost (localhost [127.0.0.1]) by ietfa.amsl.com (Postfix) with ESMTP id 3E89021F8DC2 for <oauth@ietfa.amsl.com>; Tue, 12 Feb 2013 11:53:07 -0800 (PST)
X-Virus-Scanned: amavisd-new at amsl.com
X-Spam-Flag: NO
X-Spam-Score: -2.974
X-Spam-Level: 
X-Spam-Status: No, score=-2.974 tagged_above=-999 required=5 tests=[AWL=0.025,  BAYES_00=-2.599, J_CHICKENPOX_44=0.6, RCVD_IN_DNSWL_LOW=-1]
Received: from mail.ietf.org ([12.22.58.30]) by localhost (ietfa.amsl.com [127.0.0.1]) (amavisd-new, port 10024) with ESMTP id ngpcRYH+p+fF for <oauth@ietfa.amsl.com>; Tue, 12 Feb 2013 11:53:05 -0800 (PST)
Received: from mail-qe0-f46.google.com (mail-qe0-f46.google.com [209.85.128.46]) by ietfa.amsl.com (Postfix) with ESMTP id A17BB21F8DBF for <oauth@ietf.org>; Tue, 12 Feb 2013 11:52:58 -0800 (PST)
Received: by mail-qe0-f46.google.com with SMTP id 1so213904qec.33 for <oauth@ietf.org>; Tue, 12 Feb 2013 11:52:58 -0800 (PST)
X-Google-DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=google.com; s=20120113; h=x-received:content-type:mime-version:subject:from:in-reply-to:date :cc:content-transfer-encoding:message-id:references:to:x-mailer :x-gm-message-state; bh=JObg2yzsGPpwUYyT2NZGSCOk376NmadiXyGvFyoSX38=; b=iHedmIq2nHfyQyvzb2CqdaqR/LL4ne0gYtNKNdoCIbX+WYU8IC122AK1krLRifjU1+ o/zgSIB0BoRnUDDrecnO5TXI4k0eFvkhvV+gbAB+uf2bjTJrhGsaIbkTYOY+Tlbo5DvM c1RH/2+LVHlCTLedYA8y3q6mgqXqlGq8Oqd6aMfAV3UT3jArLR0EMv3Fj5w+92ULNVxd hLlzIjIcrIdlJpXV7UhHO3KW366xTgh2mUlFRr+hRRIVFKmgx0LAMnTd7uhhvv9+tx6/ j+Kc45gZBZr3bCJ9ilSDfjXI+/QQKwDTB1PXTVjKCGNP/BDj5raINADDvEZPt6ByPKzd 8iqA==
X-Received: by 10.224.177.6 with SMTP id bg6mr7410381qab.78.1360698777873; Tue, 12 Feb 2013 11:52:57 -0800 (PST)
Received: from [192.168.1.213] (190-20-23-212.baf.movistar.cl. [190.20.23.212]) by mx.google.com with ESMTPS id df6sm16781661qab.6.2013.02.12.11.52.52 (version=TLSv1 cipher=ECDHE-RSA-RC4-SHA bits=128/128); Tue, 12 Feb 2013 11:52:56 -0800 (PST)
Content-Type: text/plain; charset=us-ascii
Mime-Version: 1.0 (Mac OS X Mail 6.2 \(1499\))
From: John Bradley <ve7jtb@ve7jtb.com>
In-Reply-To: <4E1F6AAD24975D4BA5B168042967394367443A52@TK5EX14MBXC285.redmond.corp.microsoft.com>
Date: Tue, 12 Feb 2013 16:52:48 -0300
Content-Transfer-Encoding: quoted-printable
Message-Id: <9EDD79AA-5104-49CC-A528-C5A1A1777106@ve7jtb.com>
References: <51195F3D.1050006@mitre.org> <222C28CB-7F6F-4BC3-8692-40404C2DC2D3@maymount.com> <511A50C7.8080102@mitre.org> <B256FD2D-5ED7-4306-A3BF-E6A196862B2E@ve7jtb.com>	<511A6C49.50801@mitre.org> <CABzCy2CdxaNOvho2uyuc83qHm4WKHVfToC_n6QqAS3fqTGzU2w@mail.gmail.com> <4E1F6AAD24975D4BA5B168042967394367443A52@TK5EX14MBXC285.redmond.corp.microsoft.com>
To: Mike Jones <Michael.Jones@microsoft.com>
X-Mailer: Apple Mail (2.1499)
X-Gm-Message-State: ALoCoQn1kFH2jDpS37eG+SET7+K5/DV7+BuqYaZ7qQiWhUIAE1Pb6IbvhQTkWZyp5FbIgXmewi3Y
Cc: "oauth@ietf.org" <oauth@ietf.org>
Subject: Re: [OAUTH-WG] Registration: HAL _links structure and client	self-URL
X-BeenThere: oauth@ietf.org
X-Mailman-Version: 2.1.12
Precedence: list
List-Id: OAUTH WG <oauth.ietf.org>
List-Unsubscribe: <https://www.ietf.org/mailman/options/oauth>, <mailto:oauth-request@ietf.org?subject=unsubscribe>
List-Archive: <http://www.ietf.org/mail-archive/web/oauth>
List-Post: <mailto:oauth@ietf.org>
List-Help: <mailto:oauth-request@ietf.org?subject=help>
List-Subscribe: <https://www.ietf.org/mailman/listinfo/oauth>, <mailto:oauth-request@ietf.org?subject=subscribe>
X-List-Received-Date: Tue, 12 Feb 2013 19:53:07 -0000

The current privacy policy and TOS URL in registration are the ones for =
the Client.

Nat and I discussed adding ones for the Authorization server that the =
client agrees to as separate from ones that the user is agreeing to.

The Authorization servers TOS would be in discovery and perhaps in the =
registration response to indicate what the client is agreeing to.

As there rare standard relationships that cover this links Nat was =
speculating that they could be part of the _links object.=20

That aside confirming the terms of service that the client has agreed to =
in some way is probably a good thing in the registration response.

John B.

On 2013-02-12, at 4:25 PM, Mike Jones <Michael.Jones@microsoft.com> =
wrote:

> Part of the REST/JSON philosophy is that interfaces should be as =
simple and developer-friendly as possible.  XML was rejected by =
developers, in part, because of the self-describing nature of the =
structure, which required extra syntax that was often not useful in =
practice.  Trying to re-impose that structure using extra JSON syntax =
conventions is just asking developers to have an allergic reaction to =
our specs upon encountering them.  The syntactic complexity and =
*surprise factor* isn't worth the limited semantic benefits of using =
"_links".
>=20
> Since you bring up privacy policy and terms of service, I'll note that =
the OAuth Dynamic Registration spec already has these fields to address =
those:
> 	policy_url
> 	tos_url
>=20
> Those have been working fine for OpenID Connect too.  There's no need =
to likewise convolve them to add the extra syntax that you describe =
below.
>=20
> (BTW, in a private thread, John Bradley pointed out that what the two =
of you talked about in person was actually the possibility of adding =
privacy policy and terms of service declarations at *discovery time*, =
rather than registration time.  That's a different topic, which we =
should discuss separately, if you want to pursue that.)
>=20
> 				Best wishes,
> 				-- Mike
>=20
> -----Original Message-----
> From: oauth-bounces@ietf.org [mailto:oauth-bounces@ietf.org] On Behalf =
Of Nat Sakimura
> Sent: Tuesday, February 12, 2013 9:11 AM
> To: Justin Richer; oauth@ietf.org
> Subject: Re: [OAUTH-WG] Registration: HAL _links structure and client =
self-URL
>=20
> Actually, if it is to return it in the HTTP header, then it should =
also use the RFC5988 Web Linking format.
> Now, that is nice to have, but for many JSON programmers, I agree that =
it would be a hassle to obtain the header and store them in addition to =
the JSON. So, it is nicer to have it in JSON body.
>=20
> Re: Is "_links.self.href" grossly complex over =
"registration_access_url"?
>=20
> I do not think so. Accessing a flat top level parameter such as =
registration_access_url and _links.self.href does not make any =
difference from a client programmers point of view. That's a beauty of =
JSON. Both can be treated as a parameter name. Doing a group operation =
on the links makes difference though: the structured one is easier since =
you can just operate on _links while in case of the top level =
parameters, you have to have an explicit list of them and do the =
matches. (See below for the necessity for the grouping).
>=20
> I and John discussed this for at least half an hour F2F last week, =
both technically and from operation/legal point of view, for OpenID =
Connect Registration.
> Similar points could be made to OAuth dyn reg.
>=20
> Here is what we have discussed:
>=20
> When dynamically registering the client to the server, the server =
probably needs to return the following:
>=20
>  * terms-of-service (terms of service of the server to the client)
>  * privacy-policy (privacy policy of the server to the client)
>=20
> Both are defined in RFC5988/IANA Link Relations registry.
>=20
>=20
> They should be returned together with
>=20
>  * self.href
>=20
> which is also defined in RFC5988/IANA Link Relations registry.
>=20
> There are several ways to do it.
>=20
>  * Return these using RFC5988 (HTTP Header)
>  * Return these in entity body
>      * Use HAL (or OAuth-meta)/JSON Schema
>      * Use something else (e.g., a top level items)
>=20
> Returning it in the entity body has several advantage over HTTP =
header:
>=20
>  * They can be captured in one call;
>  * They are protocol agnostic;
>=20
> We determined that these advantages outweighs the disadvantage of =
creating a new standard.
>=20
> The question becomes then whether to:
>=20
>  * Use HAL (or OAuth-meta)/JSON Schema
>  * Use something else (e.g., a top level items)
>=20
> First, we have to consider what needs to be returned in the =
link/relationship category. If it were just _links.self.href, then =
grouping probably does not make sense. However, since we have =
terms-of-service and privacy-policy as well already, it may well make =
sense.
>=20
> Moreover, when we think of a multi-tenant authorization server that =
may want to use different OAuth authz and token endpoints for different =
tennants, it would be better to be able to return those in the =
registration response. Then, it would make sense to register OAuth authz =
and token endpoints as rel type in the IANA registry (like Bill Mills is =
trying to
> do) and use them in a uniform manner. Note: these per tenant endpoints =
may support different scopes etc. as well. Then, these has to be coupled =
with the URIs. That is why all of RFC5988/HAL/JSON Schema uses href =
instead of just having the URL as the value of the parameter. The =
semantic relationship would often have an associated URI, and other =
parameters that goes with it.
>=20
> e.g.:
>=20
> {
>    "_links": {
>        "terms-of-service": {
>            "href": "https: //server.example.com/tos"
>        },
>        "privacy-policy": {
>            "href": "https: //server.example.com/pp"
>        },
>        "self": {
>            "href": "https: //server.example.com/clients/1234",
>            "authorize": "Bearer"
>        },
>        "oauth_authz": {
>            "href": "https: //server.example.com/authz",
>            "scopes": "openid profile email",
>            "response_types": [
>                "token id_token",
>                "code id_token",
>                "token",
>                "code"
>            ]
>        },
>        "oauth_token": {
>            "href": "https: //server.example.com/token",
>            "authorize": "Basic"
>        }
>    }
> }
>=20
> In short, there are bunch of link relations that needs to be returned =
with additional parameters.
> Grouping them seems to make sense.
>=20
> Considering all these, John and I came to the conclusion that the HAL =
type syntax would probably make more sense.
> (Note: JSON Schema syntax does not make the parameter access as easy =
as HAL.)
>=20
> In fact, Mike Kelly (the author of HAL) and I have just submit a new =
version of draft-sakimura-oauth-meta
>=20
>   http://tools.ietf.org/html/draft-sakimura-oauth-meta-02
>=20
> The proposal was discussed at IETF 85 OAuth WG and the chairs asked to =
submit the draft.
> The -00 appeared in December, and this -02 has some simplification and =
the addition of the "operations" inspired by
> https://tools.ietf.org/html/draft-ietf-scim-api-00#section-3.5 .
> It is arguably a subset of HAL plus some OAuth specifics.
> I have not added Discovery response example, but adding them would =
makes even more sense, I think.
>=20
> Cheers,
>=20
> Nat
>=20
>=20
> 2013/2/13 Justin Richer <jricher@mitre.org>
>>=20
>> Agreed - I didn't think that header-only was the proposal, but let's =
be explicit about the returned body always containing the URL. The way I =
read the 201 definition, it suggests (SHOULD) that you use the location =
header, but also says that the entity should refer to the new resource. =
It was my assumption that the returned JSON would still have some form =
of client-entity management URL (whether it's the HAL _links structure =
or registration_management_url or something else is still up for =
debate).
>>=20
>> -- Justin
>>=20
>>=20
>>=20
>> On 02/12/2013 10:28 AM, John Bradley wrote:
>>=20
>> Returning a location header in the 201 ids fine as long as we also =
have the same info as a claim.
>>=20
>> I think most clients will want to process the JSON and store all the =
parameters together.  Making them fish out a header makes the W3C happy =
and is the correct thing to do but taking it from a claim is what =
developers are more comfortable with.
>>=20
>> John B.
>>=20
>> On 2013-02-12, at 11:25 AM, Justin Richer <jricher@mitre.org> wrote:
>>=20
>> I'd be fine with the return from a creation request being a 201 =
instead of a 200.
>>=20
>> -- Justin
>>=20
>> On 02/11/2013 06:33 PM, Richard Harrington wrote:
>>=20
>> Since the request is an HTTP POST and a resource is created =
(http://www.w3.org/Protocols/rfc2616/rfc2616-sec9.html#sec9.5) the =
response should be an HTTP 201 Created =
(http://www.w3.org/Protocols/rfc2616/rfc2616-sec10.html#sec10.2.2) which =
is supposed to include the location of the newly created resource.
>>=20
>> This is a good pattern to follow since, as you say, it does provide =
flexibility.
>>=20
>>=20
>>=20
>> On Feb 11, 2013, at 1:14 PM, Justin Richer <jricher@mitre.org> wrote:
>>=20
>> Draft -05 of OAuth Dynamic Client Registration [1] returns a URL =
pointer for the client to perform update and secret rotation actions. =
This functionality arose from discussions on the list about moving =
towards a more RESTful pattern, and Nat Sakimura proposed this approach =
in the OpenID Connect Working Group. This URL may be distinct from the =
Client Registration Endpoint URL, but draft -05 makes no promises as to =
its content, form, or structure, though it does contain implementor's =
notes on possible methods.
>>=20
>> Two questions arise from this change:
>> - The semantics of returning the client manipulation URL
>> - The syntax (derived from HAL for JSON [2], an individual I-D=20
>> submission)
>>=20
>> On semantics:
>>=20
>> Pro:
>> - The server has flexibility on how to define the "update" endpoint,=20=

>> sending all clients to one URL, sending different clients to =
different=20
>> URLs, or sending clients to a URL with a baked-in query parameter
>> - The client can take the URL as-is and use it for all management=20
>> operations (ie, it doesn't have to generate or compose the URL based=20=

>> on component parts)
>>=20
>> Con:
>> - The client must remember one more piece of information from the=20
>> server at runtime if it wants to do manipulation and management of=20
>> itself at the server (in addition to client_id, client_secret,=20
>> registration_access_token, and others)
>>=20
>> Alternatives include specifying a URL pattern for the server to use =
and all clients to follow, specifying a query parameter for the update =
action, and specifying a separate endpoint entirely and using the =
presence of items such as client_id and the registration access token to =
differentiate the requests. Note that *all* of these alternatives can be =
accommodated using the semantics described above, with the same actions =
on the client's part.
>>=20
>>=20
>> On syntax:
>>=20
>> Pro:
>> - Follows the designs of RFC5988 for link relations
>> - The HAL format is general, and allows for all kinds of other=20
>> information to be placed inside the _links structure
>> - Allows for full use of the JSON object to specify advanced=20
>> operations on the returned endpoint if desired
>>=20
>> Con:
>> - The rest of OAuth doesn't follow link relation guidelines (though=20=

>> it's been brought up)
>> - The HAL format is general, and allows for all kinds of other=20
>> information to be placed inside the _links structure
>> - The HAL-JSON document is an expired individual I-D, and it's =
unclear=20
>> what wider adoption looks like right now
>>=20
>> Alternatives include returning the URL as a separate data member =
(registration_update_url), using HTTP headers, or using JSON Schema.
>>=20
>> -- Justin
>>=20
>>=20
>>=20
>> [1] http://tools.ietf.org/html/draft-ietf-oauth-dyn-reg-05
>> [2] http://tools.ietf.org/html/draft-kelly-json-hal-03
>> _______________________________________________
>> OAuth mailing list
>> OAuth@ietf.org
>> https://www.ietf.org/mailman/listinfo/oauth
>>=20
>>=20
>> _______________________________________________
>> OAuth mailing list
>> OAuth@ietf.org
>> https://www.ietf.org/mailman/listinfo/oauth
>>=20
>>=20
>>=20
>>=20
>> _______________________________________________
>> OAuth mailing list
>> OAuth@ietf.org
>> https://www.ietf.org/mailman/listinfo/oauth
>>=20
>=20
>=20
>=20
> --
> Nat Sakimura (=3Dnat)
> Chairman, OpenID Foundation
> http://nat.sakimura.org/
> @_nat_en
> _______________________________________________
> OAuth mailing list
> OAuth@ietf.org
> https://www.ietf.org/mailman/listinfo/oauth
> _______________________________________________
> OAuth mailing list
> OAuth@ietf.org
> https://www.ietf.org/mailman/listinfo/oauth


From jricher@mitre.org  Tue Feb 12 11:53:36 2013
Return-Path: <jricher@mitre.org>
X-Original-To: oauth@ietfa.amsl.com
Delivered-To: oauth@ietfa.amsl.com
Received: from localhost (localhost [127.0.0.1]) by ietfa.amsl.com (Postfix) with ESMTP id 4D62D21F8DED for <oauth@ietfa.amsl.com>; Tue, 12 Feb 2013 11:53:36 -0800 (PST)
X-Virus-Scanned: amavisd-new at amsl.com
X-Spam-Flag: NO
X-Spam-Score: -6.574
X-Spam-Level: 
X-Spam-Status: No, score=-6.574 tagged_above=-999 required=5 tests=[AWL=0.024,  BAYES_00=-2.599, HTML_MESSAGE=0.001, RCVD_IN_DNSWL_MED=-4]
Received: from mail.ietf.org ([12.22.58.30]) by localhost (ietfa.amsl.com [127.0.0.1]) (amavisd-new, port 10024) with ESMTP id S9uUn5PGTJ1X for <oauth@ietfa.amsl.com>; Tue, 12 Feb 2013 11:53:35 -0800 (PST)
Received: from smtpksrv1.mitre.org (smtpksrv1.mitre.org [198.49.146.77]) by ietfa.amsl.com (Postfix) with ESMTP id 98C0221F8DC9 for <oauth@ietf.org>; Tue, 12 Feb 2013 11:53:34 -0800 (PST)
Received: from smtpksrv1.mitre.org (localhost.localdomain [127.0.0.1]) by localhost (Postfix) with SMTP id 39283531169E; Tue, 12 Feb 2013 14:53:34 -0500 (EST)
Received: from IMCCAS03.MITRE.ORG (imccas03.mitre.org [129.83.29.80]) by smtpksrv1.mitre.org (Postfix) with ESMTP id 2490A1F1626; Tue, 12 Feb 2013 14:53:34 -0500 (EST)
Received: from [10.146.15.29] (129.83.31.58) by IMCCAS03.MITRE.ORG (129.83.29.80) with Microsoft SMTP Server (TLS) id 14.2.318.4; Tue, 12 Feb 2013 14:53:33 -0500
Message-ID: <511A9D92.2030600@mitre.org>
Date: Tue, 12 Feb 2013 14:52:50 -0500
From: Justin Richer <jricher@mitre.org>
User-Agent: Mozilla/5.0 (X11; Linux i686; rv:17.0) Gecko/20130106 Thunderbird/17.0.2
MIME-Version: 1.0
To: John Bradley <ve7jtb@ve7jtb.com>
References: <51195F3B.1010701@mitre.org> <4E1F6AAD24975D4BA5B168042967394367443A16@TK5EX14MBXC285.redmond.corp.microsoft.com> <511A98DE.4030507@mitre.org> <9309CDB3-8AEE-428D-A7F0-5DAC45EFD44C@ve7jtb.com>
In-Reply-To: <9309CDB3-8AEE-428D-A7F0-5DAC45EFD44C@ve7jtb.com>
Content-Type: multipart/alternative; boundary="------------040308030608090303090707"
X-Originating-IP: [129.83.31.58]
Cc: "oauth@ietf.org" <oauth@ietf.org>
Subject: Re: [OAUTH-WG] Registration: JSON Encoded Input
X-BeenThere: oauth@ietf.org
X-Mailman-Version: 2.1.12
Precedence: list
List-Id: OAUTH WG <oauth.ietf.org>
List-Unsubscribe: <https://www.ietf.org/mailman/options/oauth>, <mailto:oauth-request@ietf.org?subject=unsubscribe>
List-Archive: <http://www.ietf.org/mail-archive/web/oauth>
List-Post: <mailto:oauth@ietf.org>
List-Help: <mailto:oauth-request@ietf.org?subject=help>
List-Subscribe: <https://www.ietf.org/mailman/listinfo/oauth>, <mailto:oauth-request@ietf.org?subject=subscribe>
X-List-Received-Date: Tue, 12 Feb 2013 19:53:36 -0000

--------------040308030608090303090707
Content-Type: text/plain; charset="ISO-8859-1"; format=flowed
Content-Transfer-Encoding: 7bit

In this case, I believe that it really is a fairly straightforward case 
of replacing the form-based key-value hash with a JSON-based key-value 
hash. So all the existing parameters are converted into top-level JSON 
objects, and the parameter values become the values of those members. 
This is the exact same form that the JSON output from the endpoint 
already was. The data model remains essentially identical between the 
two. Is there another reasonable way to do this? I haven't seen another 
proposal put forward, yet, though I'm sure we could dream up all kinds 
of unreasonable ones. :)

The only extra structured in the discussion draft (-05) are most of the 
lists, like redirect_uri and grant_type. An extension would want to use 
JSON numbers or booleans where it makes sense. Note that the "scope" 
parameter is still defined as a space-separated list of strings, a 
definition taken directly from OAuth Core. This is largely from feedback 
I got in regard to the Introspection draft, which tried to add JSON list 
structure to "scope" and confused folks.

  -- Justin

On 02/12/2013 02:44 PM, John Bradley wrote:
> Nat and I hashed out the pro's and cons of JSON requests.
>
> If we POST or PUT a JSON object we need to be specific as there rare 
> several ways to do it that may work better or worse depending on the 
> receiver.
> This needs to be looked over and one picked.
>
> In the other thread about the server returning the update URI and 
> being able to encode the client in that if it needs to takes care of 
> Servers that need that info in query parameters or the path to do the 
> routing.
>
> The use of structure can be used to enhance readability and parsing of 
> the input, and output.
>
> However we need to temper our urge to apply structure to everything.
>
> IT needs to be applied carefully otherwise we start looking like crazies.
>
> If we do it cautiously I am in favour of JSON as input.
>
> John B.
>
> On 2013-02-12, at 4:32 PM, Justin Richer <jricher@mitre.org 
> <mailto:jricher@mitre.org>> wrote:
>
>> Thanks for forwarding that, Mike. I'll paste in my response to Nat's 
>> concern here as well:
>>
>>     It's an increasingly well known pattern that has reasonable
>>     support on the server side. For PHP, I was able to find the above
>>     example via the top hit on Stack Overflow. In Ruby, it's a matter
>>     of something like:
>>
>>     JSON.parse(request.body.read)
>>
>>     depending on the web app framework. On Java/Spring, it's a matter
>>     of injecting the entity body as a string and handing it to a
>>     parser (Gson in this case):
>>
>>     public String doApi(@RequestBody String jsonString) { JsonObject
>>     json = new JsonParser().parse(jsonString).getAsJsonObject();
>>
>>     It's a similar read/parse setup in Node.js as well.
>>
>>     It's true that in all of these cases you don't get to make use of
>>     the routing or data binding facilities (though in Spring you can
>>     do that for simpler domain objects using a ModelBinding), so you
>>     don't get niceities like the $_POST array in PHP handed to you.
>>     This is why I don't think it's a good idea at all to switch
>>     functionality based on the contents of the JSON object. It should
>>     be a domain object only, which is what it would be in this case.
>>
>>     I think that the positives of using JSON from the client's
>>     perspective and the overall protocol design far outweigh the
>>     slightly increased implementation cost at the server.
>>
>>
>>
>>  -- Justin
>>
>> On 02/12/2013 02:11 PM, Mike Jones wrote:
>>>
>>> FYI, this issue is also being discussed as an OpenID Connect issue 
>>> at https://bitbucket.org/openid/connect/issue/747. I think that 
>>> Nat's recent comment there bears repeating on this list:
>>>
>>> Nat Sakimura:
>>>
>>> Not so sure. For example, PHP cannot get the JSON object form 
>>> application/json POST in $_POST.
>>>
>>> It is OK to have a parameter like "request" that holds JSON. Then, 
>>> you can get to it from $_POST['request']. However, if you POST the 
>>> JSON as the POST body, then you would have to call a low level 
>>> function in the form of:
>>>
>>> ```
>>>
>>> #!php
>>>
>>> $file = file_get_contents('php://input' <php://input%27>); $x = 
>>> json_decode($file); ```
>>>
>>> Not that it is harder, but it is much less known. Many PHP 
>>> programmers will certainly goes "???".
>>>
>>> We need to check what would be the cases for other scripting 
>>> languages before making the final decision.
>>>
>>> -- Mike
>>>
>>> -----Original Message-----
>>> From: oauth-bounces@ietf.org [mailto:oauth-bounces@ietf.org] On 
>>> Behalf Of Justin Richer
>>> Sent: Monday, February 11, 2013 1:15 PM
>>> To: oauth@ietf.org
>>> Subject: [OAUTH-WG] Registration: JSON Encoded Input
>>>
>>> Draft -05 of OAuth Dynamic Client Registration [1] switched from a 
>>> form-encoded input that had been used by drafts -01 through -04 to a 
>>> JSON encoded input that was used originally in -00. Note that all 
>>> versions keep JSON-encoded output from all operations.
>>>
>>> Pro:
>>>
>>>   - JSON gives us a rich data structure so that things such as 
>>> lists, numbers, nulls, and objects can be represented natively
>>>
>>>   - Allows for parallelism between the input to the endpoint and 
>>> output from the endpoint, reducing possible translation errors 
>>> between the two
>>>
>>>   - JSON specifies UTF8 encoding for all strings, forms may have 
>>> many different encodings
>>>
>>>   - JSON has minimal character escaping required for most strings, 
>>> forms require escaping for common characters such as space, slash, 
>>> comma, etc.
>>>
>>> Con:
>>>
>>>   - the rest of OAuth is form-in/JSON-out
>>>
>>>   - nothing else in OAuth requires the Client to create a JSON 
>>> object, merely to parse one
>>>
>>>   - form-in/JSON-out is a very widely established pattern on the web 
>>> today
>>>
>>>   - Client information (client_name, client_id, etc.) is conflated 
>>> with access information (registration_access_token, _links, 
>>> expires_at, etc.) in root level of the same JSON object, leaving the 
>>> client to decide what needs to (can?) be sent back to the server for 
>>> update operations.
>>>
>>> Alternatives include any number of data encoding schemes, including 
>>> form (like the old drafts), XML, ASN.1, etc.
>>>
>>>   -- Justin
>>>
>>> [1] http://tools.ietf.org/html/draft-ietf-oauth-dyn-reg-05
>>>
>>> _______________________________________________
>>>
>>> OAuth mailing list
>>>
>>> OAuth@ietf.org <mailto:OAuth@ietf.org>
>>>
>>> https://www.ietf.org/mailman/listinfo/oauth
>>>
>>
>> _______________________________________________
>> OAuth mailing list
>> OAuth@ietf.org <mailto:OAuth@ietf.org>
>> https://www.ietf.org/mailman/listinfo/oauth
>


--------------040308030608090303090707
Content-Type: text/html; charset="ISO-8859-1"
Content-Transfer-Encoding: 7bit

<html>
  <head>
    <meta content="text/html; charset=ISO-8859-1"
      http-equiv="Content-Type">
  </head>
  <body bgcolor="#FFFFFF" text="#000000">
    In this case, I believe that it really is a fairly straightforward
    case of replacing the form-based key-value hash with a JSON-based
    key-value hash. So all the existing parameters are converted into
    top-level JSON objects, and the parameter values become the values
    of those members. This is the exact same form that the JSON output
    from the endpoint already was. The data model remains essentially
    identical between the two. Is there another reasonable way to do
    this? I haven't seen another proposal put forward, yet, though I'm
    sure we could dream up all kinds of unreasonable ones. :)<br>
    <br>
    The only extra structured in the discussion draft (-05) are most of
    the lists, like redirect_uri and grant_type. An extension would want
    to use JSON numbers or booleans where it makes sense. Note that the
    "scope" parameter is still defined as a space-separated list of
    strings, a definition taken directly from OAuth Core. This is
    largely from feedback I got in regard to the Introspection draft,
    which tried to add JSON list structure to "scope" and confused
    folks.<br>
    <br>
    &nbsp;-- Justin<br>
    <br>
    <div class="moz-cite-prefix">On 02/12/2013 02:44 PM, John Bradley
      wrote:<br>
    </div>
    <blockquote
      cite="mid:9309CDB3-8AEE-428D-A7F0-5DAC45EFD44C@ve7jtb.com"
      type="cite">
      <meta http-equiv="Content-Type" content="text/html;
        charset=ISO-8859-1">
      Nat and I hashed out the pro's and cons of JSON requests. &nbsp;
      <div><br>
      </div>
      <div>If we POST or PUT a JSON object we need to be specific as
        there rare several ways to do it that may work better or worse
        depending on the receiver.</div>
      <div>This needs to be looked over and one picked.</div>
      <div><br>
      </div>
      <div>In the other thread about the server returning the update URI
        and being able to encode the client in that if it needs to takes
        care of Servers that need that info in query parameters or the
        path to do the routing.</div>
      <div><br>
      </div>
      <div>The use of structure can be used to enhance readability and
        parsing of the input, and output.</div>
      <div><br>
      </div>
      <div>However we need to temper our urge to apply structure to
        everything. &nbsp;</div>
      <div><br>
      </div>
      <div>IT needs to be applied carefully otherwise we start looking
        like crazies.</div>
      <div><br>
      </div>
      <div>If we do it cautiously I am in favour of JSON as input.</div>
      <div><br>
      </div>
      <div>John B.</div>
      <div><br>
        <div>
          <div>On 2013-02-12, at 4:32 PM, Justin Richer &lt;<a
              moz-do-not-send="true" href="mailto:jricher@mitre.org">jricher@mitre.org</a>&gt;
            wrote:</div>
          <br class="Apple-interchange-newline">
          <blockquote type="cite">
            <div bgcolor="#FFFFFF" text="#000000"> Thanks for forwarding
              that, Mike. I'll paste in my response to Nat's concern
              here as well:<br>
              <blockquote>It's an increasingly well known pattern that
                has reasonable support on the server side. For PHP, I
                was able to find the above example via the top hit on
                Stack Overflow. In Ruby, it's a matter of something
                like:<br>
                <br>
                JSON.parse(request.body.read)<br>
                <br>
                depending on the web app framework. On Java/Spring, it's
                a matter of injecting the entity body as a string and
                handing it to a parser (Gson in this case):<br>
                <br>
                public String doApi(@RequestBody String jsonString) {
                JsonObject json = new
                JsonParser().parse(jsonString).getAsJsonObject();<br>
                <br>
                It's a similar read/parse setup in Node.js as well.<br>
                <br>
                It's true that in all of these cases you don't get to
                make use of the routing or data binding facilities
                (though in Spring you can do that for simpler domain
                objects using a ModelBinding), so you don't get
                niceities like the $_POST array in PHP handed to you.
                This is why I don't think it's a good idea at all to
                switch functionality based on the contents of the JSON
                object. It should be a domain object only, which is what
                it would be in this case.<br>
                <br>
                I think that the positives of using JSON from the
                client's perspective and the overall protocol design far
                outweigh the slightly increased implementation cost at
                the server.<br>
              </blockquote>
              <br>
              <br>
              &nbsp;-- Justin<br>
              <br>
              <div class="moz-cite-prefix">On 02/12/2013 02:11 PM, Mike
                Jones wrote:<br>
              </div>
              <blockquote
cite="mid:4E1F6AAD24975D4BA5B168042967394367443A16@TK5EX14MBXC285.redmond.corp.microsoft.com"
                type="cite">
                <meta name="Generator" content="Microsoft Word 14
                  (filtered medium)">
                <style><!--
/* Font Definitions */
@font-face
	{font-family:Calibri;
	panose-1:2 15 5 2 2 2 4 3 2 4;}
/* Style Definitions */
p.MsoNormal, li.MsoNormal, div.MsoNormal
	{margin:0in;
	margin-bottom:.0001pt;
	font-size:11.0pt;
	font-family:"Calibri","sans-serif";}
a:link, span.MsoHyperlink
	{mso-style-priority:99;
	color:blue;
	text-decoration:underline;}
a:visited, span.MsoHyperlinkFollowed
	{mso-style-priority:99;
	color:purple;
	text-decoration:underline;}
p.MsoPlainText, li.MsoPlainText, div.MsoPlainText
	{mso-style-priority:99;
	mso-style-link:"Plain Text Char";
	margin:0in;
	margin-bottom:.0001pt;
	font-size:11.0pt;
	font-family:"Calibri","sans-serif";}
span.PlainTextChar
	{mso-style-name:"Plain Text Char";
	mso-style-priority:99;
	mso-style-link:"Plain Text";
	font-family:"Calibri","sans-serif";}
.MsoChpDefault
	{mso-style-type:export-only;
	font-family:"Calibri","sans-serif";}
@page WordSection1
	{size:8.5in 11.0in;
	margin:1.0in 1.0in 1.0in 1.0in;}
div.WordSection1
	{page:WordSection1;}
--></style><!--[if gte mso 9]><xml>
<o:shapedefaults v:ext="edit" spidmax="1026" />
</xml><![endif]--><!--[if gte mso 9]><xml>
<o:shapelayout v:ext="edit">
<o:idmap v:ext="edit" data="1" />
</o:shapelayout></xml><![endif]-->
                <div class="WordSection1">
                  <p class="MsoPlainText">FYI, this issue is also being
                    discussed as an OpenID Connect issue at <a
                      moz-do-not-send="true"
                      href="https://bitbucket.org/openid/connect/issue/747">https://bitbucket.org/openid/connect/issue/747</a>.&nbsp;

                    I think that Nat's recent comment there bears
                    repeating on this list:<o:p></o:p></p>
                  <p class="MsoPlainText"><o:p>&nbsp;</o:p></p>
                  <p class="MsoPlainText" style="margin-left:.5in">Nat
                    Sakimura:<o:p></o:p></p>
                  <p class="MsoPlainText" style="margin-left:.5in"><o:p>&nbsp;</o:p></p>
                  <p class="MsoPlainText" style="margin-left:.5in">Not
                    so sure. For example, PHP cannot get the JSON object
                    form application/json POST in $_POST. <o:p></o:p></p>
                  <p class="MsoPlainText" style="margin-left:.5in"><o:p>&nbsp;</o:p></p>
                  <p class="MsoPlainText" style="margin-left:.5in">It is
                    OK to have a parameter like "request" that holds
                    JSON. Then, you can get to it from
                    $_POST['request']. However, if you POST the JSON as
                    the POST body, then you would have to call a low
                    level function in the form of: <o:p></o:p></p>
                  <p class="MsoPlainText" style="margin-left:.5in"><o:p>&nbsp;</o:p></p>
                  <p class="MsoPlainText" style="margin-left:.5in"><o:p>&nbsp;</o:p></p>
                  <p class="MsoPlainText" style="margin-left:.5in">```<o:p></o:p></p>
                  <p class="MsoPlainText" style="margin-left:.5in">#!php<o:p></o:p></p>
                  <p class="MsoPlainText" style="margin-left:.5in"><o:p>&nbsp;</o:p></p>
                  <p class="MsoPlainText" style="margin-left:.5in">$file
                    = file_get_contents('<a moz-do-not-send="true"
                      href="php://input%27">php://input'</a>); $x =
                    json_decode($file); ```<o:p></o:p></p>
                  <p class="MsoPlainText" style="margin-left:.5in"><o:p>&nbsp;</o:p></p>
                  <p class="MsoPlainText" style="margin-left:.5in">Not
                    that it is harder, but it is much less known. Many
                    PHP programmers will certainly goes "???". <o:p></o:p></p>
                  <p class="MsoPlainText" style="margin-left:.5in"><o:p>&nbsp;</o:p></p>
                  <p class="MsoPlainText" style="margin-left:.5in">We
                    need to check what would be the cases for other
                    scripting languages before making the final
                    decision.<o:p></o:p></p>
                  <p class="MsoPlainText"><o:p>&nbsp;</o:p></p>
                  <p class="MsoPlainText">&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;

                    -- Mike<o:p></o:p></p>
                  <p class="MsoPlainText"><o:p>&nbsp;</o:p></p>
                  <p class="MsoPlainText">-----Original Message-----<br>
                    From: <a moz-do-not-send="true"
                      class="moz-txt-link-abbreviated"
                      href="mailto:oauth-bounces@ietf.org">oauth-bounces@ietf.org</a>
                    [<a moz-do-not-send="true"
                      class="moz-txt-link-freetext"
                      href="mailto:oauth-bounces@ietf.org">mailto:oauth-bounces@ietf.org</a>]
                    On Behalf Of Justin Richer<br>
                    Sent: Monday, February 11, 2013 1:15 PM<br>
                    To: <a moz-do-not-send="true"
                      class="moz-txt-link-abbreviated"
                      href="mailto:oauth@ietf.org">oauth@ietf.org</a><br>
                    Subject: [OAUTH-WG] Registration: JSON Encoded Input</p>
                  <p class="MsoPlainText"><o:p>&nbsp;</o:p></p>
                  <p class="MsoPlainText">Draft -05 of OAuth Dynamic
                    Client Registration [1] switched from a form-encoded
                    input that had been used by drafts -01 through -04
                    to a JSON encoded input that was used originally in
                    -00. Note that all versions keep JSON-encoded output
                    from all operations.<o:p></o:p></p>
                  <p class="MsoPlainText"><o:p>&nbsp;</o:p></p>
                  <p class="MsoPlainText">Pro:<o:p></o:p></p>
                  <p class="MsoPlainText">&nbsp; - JSON gives us a rich data
                    structure so that things such as lists, numbers,
                    nulls, and objects can be represented natively<o:p></o:p></p>
                  <p class="MsoPlainText">&nbsp; - Allows for parallelism
                    between the input to the endpoint and output from
                    the endpoint, reducing possible translation errors
                    between the two<o:p></o:p></p>
                  <p class="MsoPlainText">&nbsp; - JSON specifies UTF8
                    encoding for all strings, forms may have many
                    different encodings<o:p></o:p></p>
                  <p class="MsoPlainText">&nbsp; - JSON has minimal character
                    escaping required for most strings, forms require
                    escaping for common characters such as space, slash,
                    comma, etc.<o:p></o:p></p>
                  <p class="MsoPlainText"><o:p>&nbsp;</o:p></p>
                  <p class="MsoPlainText">Con:<o:p></o:p></p>
                  <p class="MsoPlainText">&nbsp; - the rest of OAuth is
                    form-in/JSON-out<o:p></o:p></p>
                  <p class="MsoPlainText">&nbsp; - nothing else in OAuth
                    requires the Client to create a JSON object, merely
                    to parse one<o:p></o:p></p>
                  <p class="MsoPlainText">&nbsp; - form-in/JSON-out is a very
                    widely established pattern on the web today<o:p></o:p></p>
                  <p class="MsoPlainText">&nbsp; - Client information
                    (client_name, client_id, etc.) is conflated with
                    access information (registration_access_token,
                    _links, expires_at, etc.) in root level of the same
                    JSON object, leaving the client to decide what needs
                    to (can?) be sent back to the server for update
                    operations.<o:p></o:p></p>
                  <p class="MsoPlainText"><o:p>&nbsp;</o:p></p>
                  <p class="MsoPlainText"><o:p>&nbsp;</o:p></p>
                  <p class="MsoPlainText">Alternatives include any
                    number of data encoding schemes, including form
                    (like the old drafts), XML, ASN.1, etc.<o:p></o:p></p>
                  <p class="MsoPlainText"><o:p>&nbsp;</o:p></p>
                  <p class="MsoPlainText"><o:p>&nbsp;</o:p></p>
                  <p class="MsoPlainText">&nbsp; -- Justin<o:p></o:p></p>
                  <p class="MsoPlainText"><o:p>&nbsp;</o:p></p>
                  <p class="MsoPlainText">[1] <a moz-do-not-send="true"
href="http://tools.ietf.org/html/draft-ietf-oauth-dyn-reg-05"> <span
                        style="color:windowtext;text-decoration:none">http://tools.ietf.org/html/draft-ietf-oauth-dyn-reg-05</span></a><o:p></o:p></p>
                  <p class="MsoPlainText">_______________________________________________<o:p></o:p></p>
                  <p class="MsoPlainText">OAuth mailing list<o:p></o:p></p>
                  <p class="MsoPlainText"><a moz-do-not-send="true"
                      href="mailto:OAuth@ietf.org"><span
                        style="color:windowtext;text-decoration:none">OAuth@ietf.org</span></a><o:p></o:p></p>
                  <p class="MsoPlainText"><a moz-do-not-send="true"
                      href="https://www.ietf.org/mailman/listinfo/oauth"><span
                        style="color:windowtext;text-decoration:none">https://www.ietf.org/mailman/listinfo/oauth</span></a><o:p></o:p></p>
                </div>
              </blockquote>
              <br>
            </div>
            _______________________________________________<br>
            OAuth mailing list<br>
            <a moz-do-not-send="true" href="mailto:OAuth@ietf.org">OAuth@ietf.org</a><br>
            <a class="moz-txt-link-freetext" href="https://www.ietf.org/mailman/listinfo/oauth">https://www.ietf.org/mailman/listinfo/oauth</a><br>
          </blockquote>
        </div>
        <br>
      </div>
    </blockquote>
    <br>
  </body>
</html>

--------------040308030608090303090707--

From jricher@mitre.org  Tue Feb 12 11:57:04 2013
Return-Path: <jricher@mitre.org>
X-Original-To: oauth@ietfa.amsl.com
Delivered-To: oauth@ietfa.amsl.com
Received: from localhost (localhost [127.0.0.1]) by ietfa.amsl.com (Postfix) with ESMTP id 8BB3521F8DF9 for <oauth@ietfa.amsl.com>; Tue, 12 Feb 2013 11:57:04 -0800 (PST)
X-Virus-Scanned: amavisd-new at amsl.com
X-Spam-Flag: NO
X-Spam-Score: -6.275
X-Spam-Level: 
X-Spam-Status: No, score=-6.275 tagged_above=-999 required=5 tests=[AWL=-0.276, BAYES_00=-2.599, J_CHICKENPOX_44=0.6, RCVD_IN_DNSWL_MED=-4]
Received: from mail.ietf.org ([12.22.58.30]) by localhost (ietfa.amsl.com [127.0.0.1]) (amavisd-new, port 10024) with ESMTP id vdf3GaExfIMw for <oauth@ietfa.amsl.com>; Tue, 12 Feb 2013 11:57:03 -0800 (PST)
Received: from smtpksrv1.mitre.org (smtpksrv1.mitre.org [198.49.146.77]) by ietfa.amsl.com (Postfix) with ESMTP id DEA8521F8DF7 for <oauth@ietf.org>; Tue, 12 Feb 2013 11:57:02 -0800 (PST)
Received: from smtpksrv1.mitre.org (localhost.localdomain [127.0.0.1]) by localhost (Postfix) with SMTP id B16FB5312FAD; Tue, 12 Feb 2013 14:56:51 -0500 (EST)
Received: from IMCCAS03.MITRE.ORG (imccas03.mitre.org [129.83.29.80]) by smtpksrv1.mitre.org (Postfix) with ESMTP id 9B98A5312F99; Tue, 12 Feb 2013 14:56:51 -0500 (EST)
Received: from [10.146.15.29] (129.83.31.58) by IMCCAS03.MITRE.ORG (129.83.29.80) with Microsoft SMTP Server (TLS) id 14.2.318.4; Tue, 12 Feb 2013 14:56:50 -0500
Message-ID: <511A9E58.1040606@mitre.org>
Date: Tue, 12 Feb 2013 14:56:08 -0500
From: Justin Richer <jricher@mitre.org>
User-Agent: Mozilla/5.0 (X11; Linux i686; rv:17.0) Gecko/20130106 Thunderbird/17.0.2
MIME-Version: 1.0
To: John Bradley <ve7jtb@ve7jtb.com>
References: <51195F3D.1050006@mitre.org> <222C28CB-7F6F-4BC3-8692-40404C2DC2D3@maymount.com> <511A50C7.8080102@mitre.org> <B256FD2D-5ED7-4306-A3BF-E6A196862B2E@ve7jtb.com>	<511A6C49.50801@mitre.org> <CABzCy2CdxaNOvho2uyuc83qHm4WKHVfToC_n6QqAS3fqTGzU2w@mail.gmail.com> <4E1F6AAD24975D4BA5B168042967394367443A52@TK5EX14MBXC285.redmond.corp.microsoft.com> <9EDD79AA-5104-49CC-A528-C5A1A1777106@ve7jtb.com>
In-Reply-To: <9EDD79AA-5104-49CC-A528-C5A1A1777106@ve7jtb.com>
Content-Type: text/plain; charset="ISO-8859-1"; format=flowed
Content-Transfer-Encoding: 7bit
X-Originating-IP: [129.83.31.58]
Cc: "oauth@ietf.org" <oauth@ietf.org>
Subject: Re: [OAUTH-WG] Registration: HAL _links structure and client	self-URL
X-BeenThere: oauth@ietf.org
X-Mailman-Version: 2.1.12
Precedence: list
List-Id: OAUTH WG <oauth.ietf.org>
List-Unsubscribe: <https://www.ietf.org/mailman/options/oauth>, <mailto:oauth-request@ietf.org?subject=unsubscribe>
List-Archive: <http://www.ietf.org/mail-archive/web/oauth>
List-Post: <mailto:oauth@ietf.org>
List-Help: <mailto:oauth-request@ietf.org?subject=help>
List-Subscribe: <https://www.ietf.org/mailman/listinfo/oauth>, <mailto:oauth-request@ietf.org?subject=subscribe>
X-List-Received-Date: Tue, 12 Feb 2013 19:57:04 -0000

One question though: How exactly would the client, a software 
application, agree to the TOS? Is it supposed to fetch the content of 
the tos_url and do some processing on it? I wasn't under the impression 
that the tos_url contents were machine readable. Is it supposed to 
present that to the user somehow? It seems that's a better thing for the 
server to do at Authorization time, since it's got the user's attention.

Remember, this is meant to be for *automated* registration. The 
developer of the Client has no say at this stage of the game.

So, I think this is a bit of a red herring, to be honest.

  -- Justin

On 02/12/2013 02:52 PM, John Bradley wrote:
> The current privacy policy and TOS URL in registration are the ones for the Client.
>
> Nat and I discussed adding ones for the Authorization server that the client agrees to as separate from ones that the user is agreeing to.
>
> The Authorization servers TOS would be in discovery and perhaps in the registration response to indicate what the client is agreeing to.
>
> As there rare standard relationships that cover this links Nat was speculating that they could be part of the _links object.
>
> That aside confirming the terms of service that the client has agreed to in some way is probably a good thing in the registration response.
>
> John B.
>
> On 2013-02-12, at 4:25 PM, Mike Jones <Michael.Jones@microsoft.com> wrote:
>
>> Part of the REST/JSON philosophy is that interfaces should be as simple and developer-friendly as possible.  XML was rejected by developers, in part, because of the self-describing nature of the structure, which required extra syntax that was often not useful in practice.  Trying to re-impose that structure using extra JSON syntax conventions is just asking developers to have an allergic reaction to our specs upon encountering them.  The syntactic complexity and *surprise factor* isn't worth the limited semantic benefits of using "_links".
>>
>> Since you bring up privacy policy and terms of service, I'll note that the OAuth Dynamic Registration spec already has these fields to address those:
>> 	policy_url
>> 	tos_url
>>
>> Those have been working fine for OpenID Connect too.  There's no need to likewise convolve them to add the extra syntax that you describe below.
>>
>> (BTW, in a private thread, John Bradley pointed out that what the two of you talked about in person was actually the possibility of adding privacy policy and terms of service declarations at *discovery time*, rather than registration time.  That's a different topic, which we should discuss separately, if you want to pursue that.)
>>
>> 				Best wishes,
>> 				-- Mike
>>
>> -----Original Message-----
>> From: oauth-bounces@ietf.org [mailto:oauth-bounces@ietf.org] On Behalf Of Nat Sakimura
>> Sent: Tuesday, February 12, 2013 9:11 AM
>> To: Justin Richer; oauth@ietf.org
>> Subject: Re: [OAUTH-WG] Registration: HAL _links structure and client self-URL
>>
>> Actually, if it is to return it in the HTTP header, then it should also use the RFC5988 Web Linking format.
>> Now, that is nice to have, but for many JSON programmers, I agree that it would be a hassle to obtain the header and store them in addition to the JSON. So, it is nicer to have it in JSON body.
>>
>> Re: Is "_links.self.href" grossly complex over "registration_access_url"?
>>
>> I do not think so. Accessing a flat top level parameter such as registration_access_url and _links.self.href does not make any difference from a client programmers point of view. That's a beauty of JSON. Both can be treated as a parameter name. Doing a group operation on the links makes difference though: the structured one is easier since you can just operate on _links while in case of the top level parameters, you have to have an explicit list of them and do the matches. (See below for the necessity for the grouping).
>>
>> I and John discussed this for at least half an hour F2F last week, both technically and from operation/legal point of view, for OpenID Connect Registration.
>> Similar points could be made to OAuth dyn reg.
>>
>> Here is what we have discussed:
>>
>> When dynamically registering the client to the server, the server probably needs to return the following:
>>
>>   * terms-of-service (terms of service of the server to the client)
>>   * privacy-policy (privacy policy of the server to the client)
>>
>> Both are defined in RFC5988/IANA Link Relations registry.
>>
>>
>> They should be returned together with
>>
>>   * self.href
>>
>> which is also defined in RFC5988/IANA Link Relations registry.
>>
>> There are several ways to do it.
>>
>>   * Return these using RFC5988 (HTTP Header)
>>   * Return these in entity body
>>       * Use HAL (or OAuth-meta)/JSON Schema
>>       * Use something else (e.g., a top level items)
>>
>> Returning it in the entity body has several advantage over HTTP header:
>>
>>   * They can be captured in one call;
>>   * They are protocol agnostic;
>>
>> We determined that these advantages outweighs the disadvantage of creating a new standard.
>>
>> The question becomes then whether to:
>>
>>   * Use HAL (or OAuth-meta)/JSON Schema
>>   * Use something else (e.g., a top level items)
>>
>> First, we have to consider what needs to be returned in the link/relationship category. If it were just _links.self.href, then grouping probably does not make sense. However, since we have terms-of-service and privacy-policy as well already, it may well make sense.
>>
>> Moreover, when we think of a multi-tenant authorization server that may want to use different OAuth authz and token endpoints for different tennants, it would be better to be able to return those in the registration response. Then, it would make sense to register OAuth authz and token endpoints as rel type in the IANA registry (like Bill Mills is trying to
>> do) and use them in a uniform manner. Note: these per tenant endpoints may support different scopes etc. as well. Then, these has to be coupled with the URIs. That is why all of RFC5988/HAL/JSON Schema uses href instead of just having the URL as the value of the parameter. The semantic relationship would often have an associated URI, and other parameters that goes with it.
>>
>> e.g.:
>>
>> {
>>     "_links": {
>>         "terms-of-service": {
>>             "href": "https: //server.example.com/tos"
>>         },
>>         "privacy-policy": {
>>             "href": "https: //server.example.com/pp"
>>         },
>>         "self": {
>>             "href": "https: //server.example.com/clients/1234",
>>             "authorize": "Bearer"
>>         },
>>         "oauth_authz": {
>>             "href": "https: //server.example.com/authz",
>>             "scopes": "openid profile email",
>>             "response_types": [
>>                 "token id_token",
>>                 "code id_token",
>>                 "token",
>>                 "code"
>>             ]
>>         },
>>         "oauth_token": {
>>             "href": "https: //server.example.com/token",
>>             "authorize": "Basic"
>>         }
>>     }
>> }
>>
>> In short, there are bunch of link relations that needs to be returned with additional parameters.
>> Grouping them seems to make sense.
>>
>> Considering all these, John and I came to the conclusion that the HAL type syntax would probably make more sense.
>> (Note: JSON Schema syntax does not make the parameter access as easy as HAL.)
>>
>> In fact, Mike Kelly (the author of HAL) and I have just submit a new version of draft-sakimura-oauth-meta
>>
>>    http://tools.ietf.org/html/draft-sakimura-oauth-meta-02
>>
>> The proposal was discussed at IETF 85 OAuth WG and the chairs asked to submit the draft.
>> The -00 appeared in December, and this -02 has some simplification and the addition of the "operations" inspired by
>> https://tools.ietf.org/html/draft-ietf-scim-api-00#section-3.5 .
>> It is arguably a subset of HAL plus some OAuth specifics.
>> I have not added Discovery response example, but adding them would makes even more sense, I think.
>>
>> Cheers,
>>
>> Nat
>>
>>
>> 2013/2/13 Justin Richer <jricher@mitre.org>
>>> Agreed - I didn't think that header-only was the proposal, but let's be explicit about the returned body always containing the URL. The way I read the 201 definition, it suggests (SHOULD) that you use the location header, but also says that the entity should refer to the new resource. It was my assumption that the returned JSON would still have some form of client-entity management URL (whether it's the HAL _links structure or registration_management_url or something else is still up for debate).
>>>
>>> -- Justin
>>>
>>>
>>>
>>> On 02/12/2013 10:28 AM, John Bradley wrote:
>>>
>>> Returning a location header in the 201 ids fine as long as we also have the same info as a claim.
>>>
>>> I think most clients will want to process the JSON and store all the parameters together.  Making them fish out a header makes the W3C happy and is the correct thing to do but taking it from a claim is what developers are more comfortable with.
>>>
>>> John B.
>>>
>>> On 2013-02-12, at 11:25 AM, Justin Richer <jricher@mitre.org> wrote:
>>>
>>> I'd be fine with the return from a creation request being a 201 instead of a 200.
>>>
>>> -- Justin
>>>
>>> On 02/11/2013 06:33 PM, Richard Harrington wrote:
>>>
>>> Since the request is an HTTP POST and a resource is created (http://www.w3.org/Protocols/rfc2616/rfc2616-sec9.html#sec9.5) the response should be an HTTP 201 Created (http://www.w3.org/Protocols/rfc2616/rfc2616-sec10.html#sec10.2.2) which is supposed to include the location of the newly created resource.
>>>
>>> This is a good pattern to follow since, as you say, it does provide flexibility.
>>>
>>>
>>>
>>> On Feb 11, 2013, at 1:14 PM, Justin Richer <jricher@mitre.org> wrote:
>>>
>>> Draft -05 of OAuth Dynamic Client Registration [1] returns a URL pointer for the client to perform update and secret rotation actions. This functionality arose from discussions on the list about moving towards a more RESTful pattern, and Nat Sakimura proposed this approach in the OpenID Connect Working Group. This URL may be distinct from the Client Registration Endpoint URL, but draft -05 makes no promises as to its content, form, or structure, though it does contain implementor's notes on possible methods.
>>>
>>> Two questions arise from this change:
>>> - The semantics of returning the client manipulation URL
>>> - The syntax (derived from HAL for JSON [2], an individual I-D
>>> submission)
>>>
>>> On semantics:
>>>
>>> Pro:
>>> - The server has flexibility on how to define the "update" endpoint,
>>> sending all clients to one URL, sending different clients to different
>>> URLs, or sending clients to a URL with a baked-in query parameter
>>> - The client can take the URL as-is and use it for all management
>>> operations (ie, it doesn't have to generate or compose the URL based
>>> on component parts)
>>>
>>> Con:
>>> - The client must remember one more piece of information from the
>>> server at runtime if it wants to do manipulation and management of
>>> itself at the server (in addition to client_id, client_secret,
>>> registration_access_token, and others)
>>>
>>> Alternatives include specifying a URL pattern for the server to use and all clients to follow, specifying a query parameter for the update action, and specifying a separate endpoint entirely and using the presence of items such as client_id and the registration access token to differentiate the requests. Note that *all* of these alternatives can be accommodated using the semantics described above, with the same actions on the client's part.
>>>
>>>
>>> On syntax:
>>>
>>> Pro:
>>> - Follows the designs of RFC5988 for link relations
>>> - The HAL format is general, and allows for all kinds of other
>>> information to be placed inside the _links structure
>>> - Allows for full use of the JSON object to specify advanced
>>> operations on the returned endpoint if desired
>>>
>>> Con:
>>> - The rest of OAuth doesn't follow link relation guidelines (though
>>> it's been brought up)
>>> - The HAL format is general, and allows for all kinds of other
>>> information to be placed inside the _links structure
>>> - The HAL-JSON document is an expired individual I-D, and it's unclear
>>> what wider adoption looks like right now
>>>
>>> Alternatives include returning the URL as a separate data member (registration_update_url), using HTTP headers, or using JSON Schema.
>>>
>>> -- Justin
>>>
>>>
>>>
>>> [1] http://tools.ietf.org/html/draft-ietf-oauth-dyn-reg-05
>>> [2] http://tools.ietf.org/html/draft-kelly-json-hal-03
>>> _______________________________________________
>>> OAuth mailing list
>>> OAuth@ietf.org
>>> https://www.ietf.org/mailman/listinfo/oauth
>>>
>>>
>>> _______________________________________________
>>> OAuth mailing list
>>> OAuth@ietf.org
>>> https://www.ietf.org/mailman/listinfo/oauth
>>>
>>>
>>>
>>>
>>> _______________________________________________
>>> OAuth mailing list
>>> OAuth@ietf.org
>>> https://www.ietf.org/mailman/listinfo/oauth
>>>
>>
>>
>> --
>> Nat Sakimura (=nat)
>> Chairman, OpenID Foundation
>> http://nat.sakimura.org/
>> @_nat_en
>> _______________________________________________
>> OAuth mailing list
>> OAuth@ietf.org
>> https://www.ietf.org/mailman/listinfo/oauth
>> _______________________________________________
>> OAuth mailing list
>> OAuth@ietf.org
>> https://www.ietf.org/mailman/listinfo/oauth


From ve7jtb@ve7jtb.com  Tue Feb 12 11:58:56 2013
Return-Path: <ve7jtb@ve7jtb.com>
X-Original-To: oauth@ietfa.amsl.com
Delivered-To: oauth@ietfa.amsl.com
Received: from localhost (localhost [127.0.0.1]) by ietfa.amsl.com (Postfix) with ESMTP id 49E0121F8E09 for <oauth@ietfa.amsl.com>; Tue, 12 Feb 2013 11:58:56 -0800 (PST)
X-Virus-Scanned: amavisd-new at amsl.com
X-Spam-Flag: NO
X-Spam-Score: -3.275
X-Spam-Level: 
X-Spam-Status: No, score=-3.275 tagged_above=-999 required=5 tests=[AWL=0.323,  BAYES_00=-2.599, HTML_MESSAGE=0.001, RCVD_IN_DNSWL_LOW=-1]
Received: from mail.ietf.org ([12.22.58.30]) by localhost (ietfa.amsl.com [127.0.0.1]) (amavisd-new, port 10024) with ESMTP id e5WoiqsVU9VF for <oauth@ietfa.amsl.com>; Tue, 12 Feb 2013 11:58:54 -0800 (PST)
Received: from mail-qe0-f50.google.com (mail-qe0-f50.google.com [209.85.128.50]) by ietfa.amsl.com (Postfix) with ESMTP id 99F9921F8DFC for <oauth@ietf.org>; Tue, 12 Feb 2013 11:58:54 -0800 (PST)
Received: by mail-qe0-f50.google.com with SMTP id 7so212224qea.37 for <oauth@ietf.org>; Tue, 12 Feb 2013 11:58:54 -0800 (PST)
X-Google-DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=google.com; s=20120113; h=x-received:content-type:mime-version:subject:from:in-reply-to:date :cc:message-id:references:to:x-mailer:x-gm-message-state; bh=PeAFBSTFedPFgapZJXoCw94HgkQu1iJXUsvpvM4d4Wc=; b=XHllUh+LaryLKir/oNZwbb5HPHZdrLYilhw9Jd9/RAJDd4/mqKwfBoXmRTBXVmrQuc 4sidqVVXrNqlYlC7EMSIPc+DNeXfu4/Tbq01beycyCR1B8VXl0CVLoWbkPLijd5DX2Vn vfWuen4XBMik/kJ1uKWmOiHNbXwtk6e5rOdIxBP4UPanCD3JRG2a8LxKanR14LoH/rlR EqnkqCr1Qr0+vfRHQYBf8R0tQpymTSoc8E8o9FQ9p5HDL7kPxXwjiJZIapRI/gSEl2kW ClEdc3x0JIZ5KPKUlE7E+kdW2yiXGX9ATVNeHqhODk6ZuNjUL5+/3AXq6SiYyhxsa8Em Bosw==
X-Received: by 10.49.73.232 with SMTP id o8mr8716660qev.0.1360699133688; Tue, 12 Feb 2013 11:58:53 -0800 (PST)
Received: from [192.168.1.213] (190-20-23-212.baf.movistar.cl. [190.20.23.212]) by mx.google.com with ESMTPS id o5sm16784159qao.12.2013.02.12.11.58.48 (version=TLSv1 cipher=ECDHE-RSA-RC4-SHA bits=128/128); Tue, 12 Feb 2013 11:58:52 -0800 (PST)
Content-Type: multipart/alternative; boundary="Apple-Mail=_01F9A728-ECD3-4372-8BDC-6D601FCC86D5"
Mime-Version: 1.0 (Mac OS X Mail 6.2 \(1499\))
From: John Bradley <ve7jtb@ve7jtb.com>
In-Reply-To: <CA+ZpN27U5MB0sbEw=RdVe_YiESUnkjsAmBJezSVg2FafEi8OJQ@mail.gmail.com>
Date: Tue, 12 Feb 2013 16:58:44 -0300
Message-Id: <040A3633-A51F-4B17-8019-5DEEC349F39C@ve7jtb.com>
References: <51195F3B.1010701@mitre.org> <4E1F6AAD24975D4BA5B168042967394367443A16@TK5EX14MBXC285.redmond.corp.microsoft.com> <511A98DE.4030507@mitre.org> <9309CDB3-8AEE-428D-A7F0-5DAC45EFD44C@ve7jtb.com> <CA+ZpN27U5MB0sbEw=RdVe_YiESUnkjsAmBJezSVg2FafEi8OJQ@mail.gmail.com>
To: Tim Bray <twbray@google.com>
X-Mailer: Apple Mail (2.1499)
X-Gm-Message-State: ALoCoQlnBjQzqaGsv3eJNZMfHE7htYWMRAXBMu4iBjdM6pEVndO911pH2iC0S2AFIuKMHwsPThwC
Cc: "oauth@ietf.org" <oauth@ietf.org>
Subject: Re: [OAUTH-WG] Registration: JSON Encoded Input
X-BeenThere: oauth@ietf.org
X-Mailman-Version: 2.1.12
Precedence: list
List-Id: OAUTH WG <oauth.ietf.org>
List-Unsubscribe: <https://www.ietf.org/mailman/options/oauth>, <mailto:oauth-request@ietf.org?subject=unsubscribe>
List-Archive: <http://www.ietf.org/mail-archive/web/oauth>
List-Post: <mailto:oauth@ietf.org>
List-Help: <mailto:oauth-request@ietf.org?subject=help>
List-Subscribe: <https://www.ietf.org/mailman/listinfo/oauth>, <mailto:oauth-request@ietf.org?subject=subscribe>
X-List-Received-Date: Tue, 12 Feb 2013 19:58:56 -0000

--Apple-Mail=_01F9A728-ECD3-4372-8BDC-6D601FCC86D5
Content-Transfer-Encoding: quoted-printable
Content-Type: text/plain;
	charset=windows-1252

Some people apparently encode the JSON as the key in a form POST,  some =
people do a form POST with a special key and the JSON as the value.=20

There appear to be a number of theories in the wild.   I am not an =
expert I just looked up code examples from several sources stack =
overflow and the like.

We probably need to get input from developers who have experience =
working with different frameworks.   I think the differences have to do =
with decoding it at the receiver.

We originally had registration posting JSON but we changed form encoding =
as that worked in all environments.   We just need to be sure we are not =
creating problems for people with the change back.


John B.

On 2013-02-12, at 4:48 PM, Tim Bray <twbray@google.com> wrote:

>=20
>=20
> On Tue, Feb 12, 2013 at 11:44 AM, John Bradley <ve7jtb@ve7jtb.com> =
wrote:
> Nat and I hashed out the pro's and cons of JSON requests. =20
>=20
> If we POST or PUT a JSON object we need to be specific as there rare =
several ways to do it that may work better or worse depending on the =
receiver.
> This needs to be looked over and one picked.
>=20
> Hm?  Not following on =93several ways=94, I=92d have thought that =
POSTing JSON is just POSTing JSON, must be missing something. -T
> =20
>=20
> In the other thread about the server returning the update URI and =
being able to encode the client in that if it needs to takes care of =
Servers that need that info in query parameters or the path to do the =
routing.
>=20
> The use of structure can be used to enhance readability and parsing of =
the input, and output.
>=20
> However we need to temper our urge to apply structure to everything. =20=

>=20
> IT needs to be applied carefully otherwise we start looking like =
crazies.
>=20
> If we do it cautiously I am in favour of JSON as input.
>=20
> John B.
>=20
> On 2013-02-12, at 4:32 PM, Justin Richer <jricher@mitre.org> wrote:
>=20
>> Thanks for forwarding that, Mike. I'll paste in my response to Nat's =
concern here as well:
>> It's an increasingly well known pattern that has reasonable support =
on the server side. For PHP, I was able to find the above example via =
the top hit on Stack Overflow. In Ruby, it's a matter of something like:
>>=20
>> JSON.parse(request.body.read)
>>=20
>> depending on the web app framework. On Java/Spring, it's a matter of =
injecting the entity body as a string and handing it to a parser (Gson =
in this case):
>>=20
>> public String doApi(@RequestBody String jsonString) { JsonObject json =
=3D new JsonParser().parse(jsonString).getAsJsonObject();
>>=20
>> It's a similar read/parse setup in Node.js as well.
>>=20
>> It's true that in all of these cases you don't get to make use of the =
routing or data binding facilities (though in Spring you can do that for =
simpler domain objects using a ModelBinding), so you don't get niceities =
like the $_POST array in PHP handed to you. This is why I don't think =
it's a good idea at all to switch functionality based on the contents of =
the JSON object. It should be a domain object only, which is what it =
would be in this case.
>>=20
>> I think that the positives of using JSON from the client's =
perspective and the overall protocol design far outweigh the slightly =
increased implementation cost at the server.
>>=20
>>=20
>>  -- Justin
>>=20
>> On 02/12/2013 02:11 PM, Mike Jones wrote:
>>> FYI, this issue is also being discussed as an OpenID Connect issue =
at https://bitbucket.org/openid/connect/issue/747.  I think that Nat's =
recent comment there bears repeating on this list:
>>>=20
>>> =20
>>>=20
>>> Nat Sakimura:
>>>=20
>>> =20
>>>=20
>>> Not so sure. For example, PHP cannot get the JSON object form =
application/json POST in $_POST.
>>>=20
>>> =20
>>>=20
>>> It is OK to have a parameter like "request" that holds JSON. Then, =
you can get to it from $_POST['request']. However, if you POST the JSON =
as the POST body, then you would have to call a low level function in =
the form of:
>>>=20
>>> =20
>>>=20
>>> =20
>>>=20
>>> ```
>>>=20
>>> #!php
>>>=20
>>> =20
>>>=20
>>> $file =3D file_get_contents('php://input'); $x =3D =
json_decode($file); ```
>>>=20
>>> =20
>>>=20
>>> Not that it is harder, but it is much less known. Many PHP =
programmers will certainly goes "???".
>>>=20
>>> =20
>>>=20
>>> We need to check what would be the cases for other scripting =
languages before making the final decision.
>>>=20
>>> =20
>>>=20
>>>                                                             -- Mike
>>>=20
>>> =20
>>>=20
>>> -----Original Message-----
>>> From: oauth-bounces@ietf.org [mailto:oauth-bounces@ietf.org] On =
Behalf Of Justin Richer
>>> Sent: Monday, February 11, 2013 1:15 PM
>>> To: oauth@ietf.org
>>> Subject: [OAUTH-WG] Registration: JSON Encoded Input
>>>=20
>>> =20
>>>=20
>>> Draft -05 of OAuth Dynamic Client Registration [1] switched from a =
form-encoded input that had been used by drafts -01 through -04 to a =
JSON encoded input that was used originally in -00. Note that all =
versions keep JSON-encoded output from all operations.
>>>=20
>>> =20
>>>=20
>>> Pro:
>>>=20
>>>   - JSON gives us a rich data structure so that things such as =
lists, numbers, nulls, and objects can be represented natively
>>>=20
>>>   - Allows for parallelism between the input to the endpoint and =
output from the endpoint, reducing possible translation errors between =
the two
>>>=20
>>>   - JSON specifies UTF8 encoding for all strings, forms may have =
many different encodings
>>>=20
>>>   - JSON has minimal character escaping required for most strings, =
forms require escaping for common characters such as space, slash, =
comma, etc.
>>>=20
>>> =20
>>>=20
>>> Con:
>>>=20
>>>   - the rest of OAuth is form-in/JSON-out
>>>=20
>>>   - nothing else in OAuth requires the Client to create a JSON =
object, merely to parse one
>>>=20
>>>   - form-in/JSON-out is a very widely established pattern on the web =
today
>>>=20
>>>   - Client information (client_name, client_id, etc.) is conflated =
with access information (registration_access_token, _links, expires_at, =
etc.) in root level of the same JSON object, leaving the client to =
decide what needs to (can?) be sent back to the server for update =
operations.
>>>=20
>>> =20
>>>=20
>>> =20
>>>=20
>>> Alternatives include any number of data encoding schemes, including =
form (like the old drafts), XML, ASN.1, etc.
>>>=20
>>> =20
>>>=20
>>> =20
>>>=20
>>>   -- Justin
>>>=20
>>> =20
>>>=20
>>> [1] http://tools.ietf.org/html/draft-ietf-oauth-dyn-reg-05
>>>=20
>>> _______________________________________________
>>>=20
>>> OAuth mailing list
>>>=20
>>> OAuth@ietf.org
>>>=20
>>> https://www.ietf.org/mailman/listinfo/oauth
>>>=20
>>=20
>> _______________________________________________
>> OAuth mailing list
>> OAuth@ietf.org
>> https://www.ietf.org/mailman/listinfo/oauth
>=20
>=20
> _______________________________________________
> OAuth mailing list
> OAuth@ietf.org
> https://www.ietf.org/mailman/listinfo/oauth
>=20
>=20


--Apple-Mail=_01F9A728-ECD3-4372-8BDC-6D601FCC86D5
Content-Transfer-Encoding: quoted-printable
Content-Type: text/html;
	charset=windows-1252

<html><head><meta http-equiv=3D"Content-Type" content=3D"text/html =
charset=3Dwindows-1252"></head><body style=3D"word-wrap: break-word; =
-webkit-nbsp-mode: space; -webkit-line-break: after-white-space; ">Some =
people apparently encode the JSON as the key in a form POST, &nbsp;some =
people do a form POST with a special key and the JSON as the =
value.&nbsp;<div><br></div><div>There appear to be a number of theories =
in the wild. &nbsp; I am not an expert I just looked up code examples =
from several sources stack overflow and the =
like.</div><div><br></div><div>We probably need to get input from =
developers who have experience working with different frameworks. &nbsp; =
I think the differences have to do with decoding it at the =
receiver.</div><div><br></div><div>We originally had registration =
posting JSON but we changed form encoding as that worked in all =
environments. &nbsp; We just need to be sure we are not creating =
problems for people with the change =
back.</div><div><br></div><div><br></div><div>John =
B.</div><div><br><div><div>On 2013-02-12, at 4:48 PM, Tim Bray &lt;<a =
href=3D"mailto:twbray@google.com">twbray@google.com</a>&gt; =
wrote:</div><br class=3D"Apple-interchange-newline"><blockquote =
type=3D"cite"><br><br><div class=3D"gmail_quote">On Tue, Feb 12, 2013 at =
11:44 AM, John Bradley <span dir=3D"ltr">&lt;<a =
href=3D"mailto:ve7jtb@ve7jtb.com" =
target=3D"_blank">ve7jtb@ve7jtb.com</a>&gt;</span> wrote:<br><blockquote =
class=3D"gmail_quote" style=3D"margin:0 0 0 .8ex;border-left:1px #ccc =
solid;padding-left:1ex">

<div style=3D"word-wrap:break-word">Nat and I hashed out the pro's and =
cons of JSON requests. &nbsp;<div><br></div><div>If we POST or PUT a =
JSON object we need to be specific as there rare several ways to do it =
that may work better or worse depending on the receiver.</div>

<div>This needs to be looked over and one =
picked.</div></div></blockquote><div><br></div><div>Hm? &nbsp;Not =
following on =93several ways=94, I=92d have thought that POSTing JSON is =
just POSTing JSON, must be missing something. -T</div>

<div>&nbsp;</div><blockquote class=3D"gmail_quote" style=3D"margin:0 0 0 =
.8ex;border-left:1px #ccc solid;padding-left:1ex"><div =
style=3D"word-wrap:break-word"><div><br></div><div>In the other thread =
about the server returning the update URI and being able to encode the =
client in that if it needs to takes care of Servers that need that info =
in query parameters or the path to do the routing.</div>

<div><br></div><div>The use of structure can be used to enhance =
readability and parsing of the input, and =
output.</div><div><br></div><div>However we need to temper our urge to =
apply structure to everything. &nbsp;</div><div>
<br>
</div><div>IT needs to be applied carefully otherwise we start looking =
like crazies.</div><div><br></div><div>If we do it cautiously I am in =
favour of JSON as input.</div><div><br></div><div>John B.</div><div><div =
class=3D"h5">

<div><br><div><div>On 2013-02-12, at 4:32 PM, Justin Richer &lt;<a =
href=3D"mailto:jricher@mitre.org" =
target=3D"_blank">jricher@mitre.org</a>&gt; wrote:</div><br><blockquote =
type=3D"cite">
 =20
   =20
 =20
  <div bgcolor=3D"#FFFFFF" text=3D"#000000">
    Thanks for forwarding that, Mike. I'll paste in my response to Nat's
    concern here as well:<br>
    <blockquote>It's an increasingly well known pattern that has
      reasonable support on the server side. For PHP, I was able to find
      the above example via the top hit on Stack Overflow. In Ruby, it's
      a matter of something like:<br>
      <br>
      JSON.parse(request.body.read)<br>
      <br>
      depending on the web app framework. On Java/Spring, it's a matter
      of injecting the entity body as a string and handing it to a
      parser (Gson in this case):<br>
      <br>
      public String doApi(@RequestBody String jsonString) { JsonObject
      json =3D new JsonParser().parse(jsonString).getAsJsonObject();<br>
      <br>
      It's a similar read/parse setup in Node.js as well.<br>
      <br>
      It's true that in all of these cases you don't get to make use of
      the routing or data binding facilities (though in Spring you can
      do that for simpler domain objects using a ModelBinding), so you
      don't get niceities like the $_POST array in PHP handed to you.
      This is why I don't think it's a good idea at all to switch
      functionality based on the contents of the JSON object. It should
      be a domain object only, which is what it would be in this =
case.<br>
      <br>
      I think that the positives of using JSON from the client's
      perspective and the overall protocol design far outweigh the
      slightly increased implementation cost at the server.<br>
    </blockquote>
    <br>
    <br>
    &nbsp;-- Justin<br>
    <br>
    <div>On 02/12/2013 02:11 PM, Mike Jones
      wrote:<br>
    </div>
    <blockquote type=3D"cite">
     =20
     =20
     =20
      <div><p>FYI, this issue is also being discussed
          as an OpenID Connect issue at
          <a href=3D"https://bitbucket.org/openid/connect/issue/747" =
target=3D"_blank">https://bitbucket.org/openid/connect/issue/747</a>.&nbsp=
;
          I think that Nat's recent comment there bears repeating on
          this list:<u></u><u></u></p><p><u></u>&nbsp;<u></u></p><p =
style=3D"margin-left:.5in">Nat Sakimura:<u></u><u></u></p><p =
style=3D"margin-left:.5in"><u></u>&nbsp;<u></u></p><p =
style=3D"margin-left:.5in">Not so sure.
          For example, PHP cannot get the JSON object form
          application/json POST in $_POST.
          <u></u><u></u></p><p =
style=3D"margin-left:.5in"><u></u>&nbsp;<u></u></p><p =
style=3D"margin-left:.5in">It is OK to
          have a parameter like "request" that holds JSON. Then, you can
          get to it from $_POST['request']. However, if you POST the
          JSON as the POST body, then you would have to call a low level
          function in the form of: <u></u><u></u></p><p =
style=3D"margin-left:.5in"><u></u>&nbsp;<u></u></p><p =
style=3D"margin-left:.5in"><u></u>&nbsp;<u></u></p><p =
style=3D"margin-left:.5in">```<u></u><u></u></p><p =
style=3D"margin-left:.5in">

#!php<u></u><u></u></p><p =
style=3D"margin-left:.5in"><u></u>&nbsp;<u></u></p><p =
style=3D"margin-left:.5in">$file =3D
          file_get_contents('<a>php://input'</a>); $x =3D =
json_decode($file); ```<u></u><u></u></p><p =
style=3D"margin-left:.5in"><u></u>&nbsp;<u></u></p><p =
style=3D"margin-left:.5in">Not that it is
          harder, but it is much less known. Many PHP programmers will
          certainly goes "???".
          <u></u><u></u></p><p =
style=3D"margin-left:.5in"><u></u>&nbsp;<u></u></p><p =
style=3D"margin-left:.5in">We need to
          check what would be the cases for other scripting languages
          before making the final =
decision.<u></u><u></u></p><p><u></u>&nbsp;<u></u></p><p>&nbsp;&nbsp;&nbsp=
;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&=
nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nb=
sp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp=
;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&=
nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;
          -- =
Mike<u></u><u></u></p><p><u></u>&nbsp;<u></u></p><p>-----Original =
Message-----<br>
          From: <a href=3D"mailto:oauth-bounces@ietf.org" =
target=3D"_blank">oauth-bounces@ietf.org</a> [<a =
href=3D"mailto:oauth-bounces@ietf.org" =
target=3D"_blank">mailto:oauth-bounces@ietf.org</a>]
          On Behalf Of Justin Richer<br>
          Sent: Monday, February 11, 2013 1:15 PM<br>
          To: <a href=3D"mailto:oauth@ietf.org" =
target=3D"_blank">oauth@ietf.org</a><br>
          Subject: [OAUTH-WG] Registration: JSON Encoded =
Input</p><p><u></u>&nbsp;<u></u></p><p>Draft -05 of OAuth Dynamic Client
          Registration [1] switched from a form-encoded input that had
          been used by drafts -01 through -04 to a JSON encoded input
          that was used originally in -00. Note that all versions keep
          JSON-encoded output from all =
operations.<u></u><u></u></p><p><u></u>&nbsp;<u></u></p><p>Pro:<u></u><u><=
/u></p><p>&nbsp; - JSON gives us a rich data structure
          so that things such as lists, numbers, nulls, and objects can
          be represented natively<u></u><u></u></p><p>&nbsp; - Allows =
for parallelism between the
          input to the endpoint and output from the endpoint, reducing
          possible translation errors between the =
two<u></u><u></u></p><p>&nbsp; - JSON specifies UTF8 encoding for all
          strings, forms may have many different =
encodings<u></u><u></u></p><p>&nbsp; - JSON has minimal character =
escaping
          required for most strings, forms require escaping for common
          characters such as space, slash, comma, =
etc.<u></u><u></u></p><p><u></u>&nbsp;<u></u></p><p>Con:<u></u><u></u></p>=
<p>&nbsp; - the rest of OAuth is
          form-in/JSON-out<u></u><u></u></p><p>&nbsp; - nothing else in =
OAuth requires the
          Client to create a JSON object, merely to parse =
one<u></u><u></u></p><p>&nbsp; - form-in/JSON-out is a very widely
          established pattern on the web =
today<u></u><u></u></p><p>&nbsp; - Client information (client_name,
          client_id, etc.) is conflated with access information
          (registration_access_token, _links, expires_at, etc.) in root
          level of the same JSON object, leaving the client to decide
          what needs to (can?) be sent back to the server for update
          =
operations.<u></u><u></u></p><p><u></u>&nbsp;<u></u></p><p><u></u>&nbsp;<u=
></u></p><p>Alternatives include any number of data
          encoding schemes, including form (like the old drafts), XML,
          ASN.1, =
etc.<u></u><u></u></p><p><u></u>&nbsp;<u></u></p><p><u></u>&nbsp;<u></u></=
p><p>&nbsp; -- Justin<u></u><u></u></p><p><u></u>&nbsp;<u></u></p><p>[1] =
<a href=3D"http://tools.ietf.org/html/draft-ietf-oauth-dyn-reg-05" =
target=3D"_blank">
            <span =
style=3D"color:windowtext;text-decoration:none">http://tools.ietf.org/html=
/draft-ietf-oauth-dyn-reg-05</span></a><u></u><u></u></p><p>______________=
_________________________________<u></u><u></u></p><p>OAuth mailing =
list<u></u><u></u></p><p><a href=3D"mailto:OAuth@ietf.org" =
target=3D"_blank"><span =
style=3D"color:windowtext;text-decoration:none">OAuth@ietf.org</span></a><=
u></u><u></u></p><p><a =
href=3D"https://www.ietf.org/mailman/listinfo/oauth" =
target=3D"_blank"><span =
style=3D"color:windowtext;text-decoration:none">https://www.ietf.org/mailm=
an/listinfo/oauth</span></a><u></u><u></u></p>


      </div>
    </blockquote>
    <br>
  </div>

_______________________________________________<br>OAuth mailing =
list<br><a href=3D"mailto:OAuth@ietf.org" =
target=3D"_blank">OAuth@ietf.org</a><br><a =
href=3D"https://www.ietf.org/mailman/listinfo/oauth" =
target=3D"_blank">https://www.ietf.org/mailman/listinfo/oauth</a><br>

=
</blockquote></div><br></div></div></div></div><br>_______________________=
________________________<br>
OAuth mailing list<br>
<a href=3D"mailto:OAuth@ietf.org">OAuth@ietf.org</a><br>
<a href=3D"https://www.ietf.org/mailman/listinfo/oauth" =
target=3D"_blank">https://www.ietf.org/mailman/listinfo/oauth</a><br>
<br></blockquote></div><br>
</blockquote></div><br></div></body></html>=

--Apple-Mail=_01F9A728-ECD3-4372-8BDC-6D601FCC86D5--

From jricher@mitre.org  Tue Feb 12 12:00:18 2013
Return-Path: <jricher@mitre.org>
X-Original-To: oauth@ietfa.amsl.com
Delivered-To: oauth@ietfa.amsl.com
Received: from localhost (localhost [127.0.0.1]) by ietfa.amsl.com (Postfix) with ESMTP id B946521F8E47 for <oauth@ietfa.amsl.com>; Tue, 12 Feb 2013 12:00:18 -0800 (PST)
X-Virus-Scanned: amavisd-new at amsl.com
X-Spam-Flag: NO
X-Spam-Score: -6.569
X-Spam-Level: 
X-Spam-Status: No, score=-6.569 tagged_above=-999 required=5 tests=[AWL=0.029,  BAYES_00=-2.599, HTML_MESSAGE=0.001, RCVD_IN_DNSWL_MED=-4]
Received: from mail.ietf.org ([12.22.58.30]) by localhost (ietfa.amsl.com [127.0.0.1]) (amavisd-new, port 10024) with ESMTP id ueF-W6InAdbP for <oauth@ietfa.amsl.com>; Tue, 12 Feb 2013 12:00:16 -0800 (PST)
Received: from smtpksrv1.mitre.org (smtpksrv1.mitre.org [198.49.146.77]) by ietfa.amsl.com (Postfix) with ESMTP id A9E0A21F8D94 for <oauth@ietf.org>; Tue, 12 Feb 2013 12:00:14 -0800 (PST)
Received: from smtpksrv1.mitre.org (localhost.localdomain [127.0.0.1]) by localhost (Postfix) with SMTP id 974DE531304F; Tue, 12 Feb 2013 15:00:13 -0500 (EST)
Received: from IMCCAS04.MITRE.ORG (imccas04.mitre.org [129.83.29.81]) by smtpksrv1.mitre.org (Postfix) with ESMTP id C06321F2ACE; Tue, 12 Feb 2013 15:00:07 -0500 (EST)
Received: from [10.146.15.29] (129.83.31.58) by IMCCAS04.MITRE.ORG (129.83.29.81) with Microsoft SMTP Server (TLS) id 14.2.318.4; Tue, 12 Feb 2013 15:00:07 -0500
Message-ID: <511A9F1C.1010504@mitre.org>
Date: Tue, 12 Feb 2013 14:59:24 -0500
From: Justin Richer <jricher@mitre.org>
User-Agent: Mozilla/5.0 (X11; Linux i686; rv:17.0) Gecko/20130106 Thunderbird/17.0.2
MIME-Version: 1.0
To: John Bradley <ve7jtb@ve7jtb.com>
References: <51195F3B.1010701@mitre.org> <4E1F6AAD24975D4BA5B168042967394367443A16@TK5EX14MBXC285.redmond.corp.microsoft.com> <511A98DE.4030507@mitre.org> <9309CDB3-8AEE-428D-A7F0-5DAC45EFD44C@ve7jtb.com> <CA+ZpN27U5MB0sbEw=RdVe_YiESUnkjsAmBJezSVg2FafEi8OJQ@mail.gmail.com> <040A3633-A51F-4B17-8019-5DEEC349F39C@ve7jtb.com>
In-Reply-To: <040A3633-A51F-4B17-8019-5DEEC349F39C@ve7jtb.com>
Content-Type: multipart/alternative; boundary="------------070103050401010102030600"
X-Originating-IP: [129.83.31.58]
Cc: "oauth@ietf.org" <oauth@ietf.org>
Subject: Re: [OAUTH-WG] Registration: JSON Encoded Input
X-BeenThere: oauth@ietf.org
X-Mailman-Version: 2.1.12
Precedence: list
List-Id: OAUTH WG <oauth.ietf.org>
List-Unsubscribe: <https://www.ietf.org/mailman/options/oauth>, <mailto:oauth-request@ietf.org?subject=unsubscribe>
List-Archive: <http://www.ietf.org/mail-archive/web/oauth>
List-Post: <mailto:oauth@ietf.org>
List-Help: <mailto:oauth-request@ietf.org?subject=help>
List-Subscribe: <https://www.ietf.org/mailman/listinfo/oauth>, <mailto:oauth-request@ietf.org?subject=subscribe>
X-List-Received-Date: Tue, 12 Feb 2013 20:00:18 -0000

--------------070103050401010102030600
Content-Type: text/plain; charset="windows-1252"; format=flowed
Content-Transfer-Encoding: 8bit

If that's the question, then my proposal is the Content-type is 
"application/json" and the HTTP Entity Body is the JSON document. No 
form posts or parameter names to be had here.

  -- Justin

On 02/12/2013 02:58 PM, John Bradley wrote:
> Some people apparently encode the JSON as the key in a form POST, 
>  some people do a form POST with a special key and the JSON as the value.
>
> There appear to be a number of theories in the wild.   I am not an 
> expert I just looked up code examples from several sources stack 
> overflow and the like.
>
> We probably need to get input from developers who have experience 
> working with different frameworks.   I think the differences have to 
> do with decoding it at the receiver.
>
> We originally had registration posting JSON but we changed form 
> encoding as that worked in all environments.   We just need to be sure 
> we are not creating problems for people with the change back.
>
>
> John B.
>
> On 2013-02-12, at 4:48 PM, Tim Bray <twbray@google.com 
> <mailto:twbray@google.com>> wrote:
>
>>
>>
>> On Tue, Feb 12, 2013 at 11:44 AM, John Bradley <ve7jtb@ve7jtb.com 
>> <mailto:ve7jtb@ve7jtb.com>> wrote:
>>
>>     Nat and I hashed out the pro's and cons of JSON requests.
>>
>>     If we POST or PUT a JSON object we need to be specific as there
>>     rare several ways to do it that may work better or worse
>>     depending on the receiver.
>>     This needs to be looked over and one picked.
>>
>>
>> Hm?  Not following on “several ways”, I’d have thought that POSTing 
>> JSON is just POSTing JSON, must be missing something. -T
>>
>>
>>     In the other thread about the server returning the update URI and
>>     being able to encode the client in that if it needs to takes care
>>     of Servers that need that info in query parameters or the path to
>>     do the routing.
>>
>>     The use of structure can be used to enhance readability and
>>     parsing of the input, and output.
>>
>>     However we need to temper our urge to apply structure to everything.
>>
>>     IT needs to be applied carefully otherwise we start looking like
>>     crazies.
>>
>>     If we do it cautiously I am in favour of JSON as input.
>>
>>     John B.
>>
>>     On 2013-02-12, at 4:32 PM, Justin Richer <jricher@mitre.org
>>     <mailto:jricher@mitre.org>> wrote:
>>
>>>     Thanks for forwarding that, Mike. I'll paste in my response to
>>>     Nat's concern here as well:
>>>
>>>         It's an increasingly well known pattern that has reasonable
>>>         support on the server side. For PHP, I was able to find the
>>>         above example via the top hit on Stack Overflow. In Ruby,
>>>         it's a matter of something like:
>>>
>>>         JSON.parse(request.body.read)
>>>
>>>         depending on the web app framework. On Java/Spring, it's a
>>>         matter of injecting the entity body as a string and handing
>>>         it to a parser (Gson in this case):
>>>
>>>         public String doApi(@RequestBody String jsonString) {
>>>         JsonObject json = new
>>>         JsonParser().parse(jsonString).getAsJsonObject();
>>>
>>>         It's a similar read/parse setup in Node.js as well.
>>>
>>>         It's true that in all of these cases you don't get to make
>>>         use of the routing or data binding facilities (though in
>>>         Spring you can do that for simpler domain objects using a
>>>         ModelBinding), so you don't get niceities like the $_POST
>>>         array in PHP handed to you. This is why I don't think it's a
>>>         good idea at all to switch functionality based on the
>>>         contents of the JSON object. It should be a domain object
>>>         only, which is what it would be in this case.
>>>
>>>         I think that the positives of using JSON from the client's
>>>         perspective and the overall protocol design far outweigh the
>>>         slightly increased implementation cost at the server.
>>>
>>>
>>>
>>>      -- Justin
>>>
>>>     On 02/12/2013 02:11 PM, Mike Jones wrote:
>>>>
>>>>     FYI, this issue is also being discussed as an OpenID Connect
>>>>     issue at https://bitbucket.org/openid/connect/issue/747. I
>>>>     think that Nat's recent comment there bears repeating on this list:
>>>>
>>>>     Nat Sakimura:
>>>>
>>>>     Not so sure. For example, PHP cannot get the JSON object form
>>>>     application/json POST in $_POST.
>>>>
>>>>     It is OK to have a parameter like "request" that holds JSON.
>>>>     Then, you can get to it from $_POST['request']. However, if you
>>>>     POST the JSON as the POST body, then you would have to call a
>>>>     low level function in the form of:
>>>>
>>>>     ```
>>>>
>>>>     #!php
>>>>
>>>>     $file = file_get_contents('php://input'); $x =
>>>>     json_decode($file); ```
>>>>
>>>>     Not that it is harder, but it is much less known. Many PHP
>>>>     programmers will certainly goes "???".
>>>>
>>>>     We need to check what would be the cases for other scripting
>>>>     languages before making the final decision.
>>>>
>>>>     -- Mike
>>>>
>>>>     -----Original Message-----
>>>>     From: oauth-bounces@ietf.org <mailto:oauth-bounces@ietf.org>
>>>>     [mailto:oauth-bounces@ietf.org] On Behalf Of Justin Richer
>>>>     Sent: Monday, February 11, 2013 1:15 PM
>>>>     To: oauth@ietf.org <mailto:oauth@ietf.org>
>>>>     Subject: [OAUTH-WG] Registration: JSON Encoded Input
>>>>
>>>>     Draft -05 of OAuth Dynamic Client Registration [1] switched
>>>>     from a form-encoded input that had been used by drafts -01
>>>>     through -04 to a JSON encoded input that was used originally in
>>>>     -00. Note that all versions keep JSON-encoded output from all
>>>>     operations.
>>>>
>>>>     Pro:
>>>>
>>>>       - JSON gives us a rich data structure so that things such as
>>>>     lists, numbers, nulls, and objects can be represented natively
>>>>
>>>>       - Allows for parallelism between the input to the endpoint
>>>>     and output from the endpoint, reducing possible translation
>>>>     errors between the two
>>>>
>>>>       - JSON specifies UTF8 encoding for all strings, forms may
>>>>     have many different encodings
>>>>
>>>>       - JSON has minimal character escaping required for most
>>>>     strings, forms require escaping for common characters such as
>>>>     space, slash, comma, etc.
>>>>
>>>>     Con:
>>>>
>>>>       - the rest of OAuth is form-in/JSON-out
>>>>
>>>>       - nothing else in OAuth requires the Client to create a JSON
>>>>     object, merely to parse one
>>>>
>>>>       - form-in/JSON-out is a very widely established pattern on
>>>>     the web today
>>>>
>>>>       - Client information (client_name, client_id, etc.) is
>>>>     conflated with access information (registration_access_token,
>>>>     _links, expires_at, etc.) in root level of the same JSON
>>>>     object, leaving the client to decide what needs to (can?) be
>>>>     sent back to the server for update operations.
>>>>
>>>>     Alternatives include any number of data encoding schemes,
>>>>     including form (like the old drafts), XML, ASN.1, etc.
>>>>
>>>>       -- Justin
>>>>
>>>>     [1] http://tools.ietf.org/html/draft-ietf-oauth-dyn-reg-05
>>>>
>>>>     _______________________________________________
>>>>
>>>>     OAuth mailing list
>>>>
>>>>     OAuth@ietf.org <mailto:OAuth@ietf.org>
>>>>
>>>>     https://www.ietf.org/mailman/listinfo/oauth
>>>>
>>>
>>>     _______________________________________________
>>>     OAuth mailing list
>>>     OAuth@ietf.org <mailto:OAuth@ietf.org>
>>>     https://www.ietf.org/mailman/listinfo/oauth
>>
>>
>>     _______________________________________________
>>     OAuth mailing list
>>     OAuth@ietf.org <mailto:OAuth@ietf.org>
>>     https://www.ietf.org/mailman/listinfo/oauth
>>
>>
>


--------------070103050401010102030600
Content-Type: text/html; charset="windows-1252"
Content-Transfer-Encoding: 8bit

<html>
  <head>
    <meta content="text/html; charset=windows-1252"
      http-equiv="Content-Type">
  </head>
  <body bgcolor="#FFFFFF" text="#000000">
    If that's the question, then my proposal is the Content-type is
    "application/json" and the HTTP Entity Body is the JSON document. No
    form posts or parameter names to be had here.<br>
    <br>
     -- Justin<br>
    <br>
    <div class="moz-cite-prefix">On 02/12/2013 02:58 PM, John Bradley
      wrote:<br>
    </div>
    <blockquote
      cite="mid:040A3633-A51F-4B17-8019-5DEEC349F39C@ve7jtb.com"
      type="cite">
      <meta http-equiv="Content-Type" content="text/html;
        charset=windows-1252">
      Some people apparently encode the JSON as the key in a form POST,
       some people do a form POST with a special key and the JSON as the
      value. 
      <div><br>
      </div>
      <div>There appear to be a number of theories in the wild.   I am
        not an expert I just looked up code examples from several
        sources stack overflow and the like.</div>
      <div><br>
      </div>
      <div>We probably need to get input from developers who have
        experience working with different frameworks.   I think the
        differences have to do with decoding it at the receiver.</div>
      <div><br>
      </div>
      <div>We originally had registration posting JSON but we changed
        form encoding as that worked in all environments.   We just need
        to be sure we are not creating problems for people with the
        change back.</div>
      <div><br>
      </div>
      <div><br>
      </div>
      <div>John B.</div>
      <div><br>
        <div>
          <div>On 2013-02-12, at 4:48 PM, Tim Bray &lt;<a
              moz-do-not-send="true" href="mailto:twbray@google.com">twbray@google.com</a>&gt;
            wrote:</div>
          <br class="Apple-interchange-newline">
          <blockquote type="cite"><br>
            <br>
            <div class="gmail_quote">On Tue, Feb 12, 2013 at 11:44 AM,
              John Bradley <span dir="ltr">&lt;<a
                  moz-do-not-send="true" href="mailto:ve7jtb@ve7jtb.com"
                  target="_blank">ve7jtb@ve7jtb.com</a>&gt;</span>
              wrote:<br>
              <blockquote class="gmail_quote" style="margin:0 0 0
                .8ex;border-left:1px #ccc solid;padding-left:1ex">
                <div style="word-wrap:break-word">Nat and I hashed out
                  the pro's and cons of JSON requests.  
                  <div><br>
                  </div>
                  <div>If we POST or PUT a JSON object we need to be
                    specific as there rare several ways to do it that
                    may work better or worse depending on the receiver.</div>
                  <div>This needs to be looked over and one picked.</div>
                </div>
              </blockquote>
              <div><br>
              </div>
              <div>Hm?  Not following on “several ways”, I’d have
                thought that POSTing JSON is just POSTing JSON, must be
                missing something. -T</div>
              <div> </div>
              <blockquote class="gmail_quote" style="margin:0 0 0
                .8ex;border-left:1px #ccc solid;padding-left:1ex">
                <div style="word-wrap:break-word">
                  <div><br>
                  </div>
                  <div>In the other thread about the server returning
                    the update URI and being able to encode the client
                    in that if it needs to takes care of Servers that
                    need that info in query parameters or the path to do
                    the routing.</div>
                  <div><br>
                  </div>
                  <div>The use of structure can be used to enhance
                    readability and parsing of the input, and output.</div>
                  <div><br>
                  </div>
                  <div>However we need to temper our urge to apply
                    structure to everything.  </div>
                  <div>
                    <br>
                  </div>
                  <div>IT needs to be applied carefully otherwise we
                    start looking like crazies.</div>
                  <div><br>
                  </div>
                  <div>If we do it cautiously I am in favour of JSON as
                    input.</div>
                  <div><br>
                  </div>
                  <div>John B.</div>
                  <div>
                    <div class="h5">
                      <div><br>
                        <div>
                          <div>On 2013-02-12, at 4:32 PM, Justin Richer
                            &lt;<a moz-do-not-send="true"
                              href="mailto:jricher@mitre.org"
                              target="_blank">jricher@mitre.org</a>&gt;
                            wrote:</div>
                          <br>
                          <blockquote type="cite">
                            <div bgcolor="#FFFFFF" text="#000000">
                              Thanks for forwarding that, Mike. I'll
                              paste in my response to Nat's concern here
                              as well:<br>
                              <blockquote>It's an increasingly well
                                known pattern that has reasonable
                                support on the server side. For PHP, I
                                was able to find the above example via
                                the top hit on Stack Overflow. In Ruby,
                                it's a matter of something like:<br>
                                <br>
                                JSON.parse(request.body.read)<br>
                                <br>
                                depending on the web app framework. On
                                Java/Spring, it's a matter of injecting
                                the entity body as a string and handing
                                it to a parser (Gson in this case):<br>
                                <br>
                                public String doApi(@RequestBody String
                                jsonString) { JsonObject json = new
                                JsonParser().parse(jsonString).getAsJsonObject();<br>
                                <br>
                                It's a similar read/parse setup in
                                Node.js as well.<br>
                                <br>
                                It's true that in all of these cases you
                                don't get to make use of the routing or
                                data binding facilities (though in
                                Spring you can do that for simpler
                                domain objects using a ModelBinding), so
                                you don't get niceities like the $_POST
                                array in PHP handed to you. This is why
                                I don't think it's a good idea at all to
                                switch functionality based on the
                                contents of the JSON object. It should
                                be a domain object only, which is what
                                it would be in this case.<br>
                                <br>
                                I think that the positives of using JSON
                                from the client's perspective and the
                                overall protocol design far outweigh the
                                slightly increased implementation cost
                                at the server.<br>
                              </blockquote>
                              <br>
                              <br>
                               -- Justin<br>
                              <br>
                              <div>On 02/12/2013 02:11 PM, Mike Jones
                                wrote:<br>
                              </div>
                              <blockquote type="cite">
                                <div>
                                  <p>FYI, this issue is also being
                                    discussed as an OpenID Connect issue
                                    at <a moz-do-not-send="true"
                                      href="https://bitbucket.org/openid/connect/issue/747"
                                      target="_blank">https://bitbucket.org/openid/connect/issue/747</a>. 

                                    I think that Nat's recent comment
                                    there bears repeating on this list:</p>
                                  <p> </p>
                                  <p style="margin-left:.5in">Nat
                                    Sakimura:</p>
                                  <p style="margin-left:.5in"> </p>
                                  <p style="margin-left:.5in">Not so
                                    sure. For example, PHP cannot get
                                    the JSON object form
                                    application/json POST in $_POST. </p>
                                  <p style="margin-left:.5in"> </p>
                                  <p style="margin-left:.5in">It is OK
                                    to have a parameter like "request"
                                    that holds JSON. Then, you can get
                                    to it from $_POST['request'].
                                    However, if you POST the JSON as the
                                    POST body, then you would have to
                                    call a low level function in the
                                    form of: </p>
                                  <p style="margin-left:.5in"> </p>
                                  <p style="margin-left:.5in"> </p>
                                  <p style="margin-left:.5in">```</p>
                                  <p style="margin-left:.5in">
                                    #!php</p>
                                  <p style="margin-left:.5in"> </p>
                                  <p style="margin-left:.5in">$file =
                                    file_get_contents('<a
                                      moz-do-not-send="true">php://input'</a>);
                                    $x = json_decode($file); ```</p>
                                  <p style="margin-left:.5in"> </p>
                                  <p style="margin-left:.5in">Not that
                                    it is harder, but it is much less
                                    known. Many PHP programmers will
                                    certainly goes "???". </p>
                                  <p style="margin-left:.5in"> </p>
                                  <p style="margin-left:.5in">We need to
                                    check what would be the cases for
                                    other scripting languages before
                                    making the final decision.</p>
                                  <p> </p>
                                  <p>                                                           

                                    -- Mike</p>
                                  <p> </p>
                                  <p>-----Original Message-----<br>
                                    From: <a moz-do-not-send="true"
                                      href="mailto:oauth-bounces@ietf.org"
                                      target="_blank">oauth-bounces@ietf.org</a>
                                    [<a moz-do-not-send="true"
                                      href="mailto:oauth-bounces@ietf.org"
                                      target="_blank">mailto:oauth-bounces@ietf.org</a>]
                                    On Behalf Of Justin Richer<br>
                                    Sent: Monday, February 11, 2013 1:15
                                    PM<br>
                                    To: <a moz-do-not-send="true"
                                      href="mailto:oauth@ietf.org"
                                      target="_blank">oauth@ietf.org</a><br>
                                    Subject: [OAUTH-WG] Registration:
                                    JSON Encoded Input</p>
                                  <p> </p>
                                  <p>Draft -05 of OAuth Dynamic Client
                                    Registration [1] switched from a
                                    form-encoded input that had been
                                    used by drafts -01 through -04 to a
                                    JSON encoded input that was used
                                    originally in -00. Note that all
                                    versions keep JSON-encoded output
                                    from all operations.</p>
                                  <p> </p>
                                  <p>Pro:</p>
                                  <p>  - JSON gives us a rich data
                                    structure so that things such as
                                    lists, numbers, nulls, and objects
                                    can be represented natively</p>
                                  <p>  - Allows for parallelism between
                                    the input to the endpoint and output
                                    from the endpoint, reducing possible
                                    translation errors between the two</p>
                                  <p>  - JSON specifies UTF8 encoding
                                    for all strings, forms may have many
                                    different encodings</p>
                                  <p>  - JSON has minimal character
                                    escaping required for most strings,
                                    forms require escaping for common
                                    characters such as space, slash,
                                    comma, etc.</p>
                                  <p> </p>
                                  <p>Con:</p>
                                  <p>  - the rest of OAuth is
                                    form-in/JSON-out</p>
                                  <p>  - nothing else in OAuth requires
                                    the Client to create a JSON object,
                                    merely to parse one</p>
                                  <p>  - form-in/JSON-out is a very
                                    widely established pattern on the
                                    web today</p>
                                  <p>  - Client information
                                    (client_name, client_id, etc.) is
                                    conflated with access information
                                    (registration_access_token, _links,
                                    expires_at, etc.) in root level of
                                    the same JSON object, leaving the
                                    client to decide what needs to
                                    (can?) be sent back to the server
                                    for update operations.</p>
                                  <p> </p>
                                  <p> </p>
                                  <p>Alternatives include any number of
                                    data encoding schemes, including
                                    form (like the old drafts), XML,
                                    ASN.1, etc.</p>
                                  <p> </p>
                                  <p> </p>
                                  <p>  -- Justin</p>
                                  <p> </p>
                                  <p>[1] <a moz-do-not-send="true"
                                      href="http://tools.ietf.org/html/draft-ietf-oauth-dyn-reg-05"
                                      target="_blank"> <span
                                        style="color:windowtext;text-decoration:none">http://tools.ietf.org/html/draft-ietf-oauth-dyn-reg-05</span></a></p>
                                  <p>_______________________________________________</p>
                                  <p>OAuth mailing list</p>
                                  <p><a moz-do-not-send="true"
                                      href="mailto:OAuth@ietf.org"
                                      target="_blank"><span
                                        style="color:windowtext;text-decoration:none">OAuth@ietf.org</span></a></p>
                                  <p><a moz-do-not-send="true"
                                      href="https://www.ietf.org/mailman/listinfo/oauth"
                                      target="_blank"><span
                                        style="color:windowtext;text-decoration:none">https://www.ietf.org/mailman/listinfo/oauth</span></a></p>
                                </div>
                              </blockquote>
                              <br>
                            </div>
_______________________________________________<br>
                            OAuth mailing list<br>
                            <a moz-do-not-send="true"
                              href="mailto:OAuth@ietf.org"
                              target="_blank">OAuth@ietf.org</a><br>
                            <a moz-do-not-send="true"
                              href="https://www.ietf.org/mailman/listinfo/oauth"
                              target="_blank">https://www.ietf.org/mailman/listinfo/oauth</a><br>
                          </blockquote>
                        </div>
                        <br>
                      </div>
                    </div>
                  </div>
                </div>
                <br>
                _______________________________________________<br>
                OAuth mailing list<br>
                <a moz-do-not-send="true" href="mailto:OAuth@ietf.org">OAuth@ietf.org</a><br>
                <a moz-do-not-send="true"
                  href="https://www.ietf.org/mailman/listinfo/oauth"
                  target="_blank">https://www.ietf.org/mailman/listinfo/oauth</a><br>
                <br>
              </blockquote>
            </div>
            <br>
          </blockquote>
        </div>
        <br>
      </div>
    </blockquote>
    <br>
  </body>
</html>

--------------070103050401010102030600--

From ppatterson@salesforce.com  Tue Feb 12 12:04:25 2013
Return-Path: <ppatterson@salesforce.com>
X-Original-To: oauth@ietfa.amsl.com
Delivered-To: oauth@ietfa.amsl.com
Received: from localhost (localhost [127.0.0.1]) by ietfa.amsl.com (Postfix) with ESMTP id D35BC21F9027 for <oauth@ietfa.amsl.com>; Tue, 12 Feb 2013 12:04:24 -0800 (PST)
X-Virus-Scanned: amavisd-new at amsl.com
X-Spam-Flag: NO
X-Spam-Score: -6.598
X-Spam-Level: 
X-Spam-Status: No, score=-6.598 tagged_above=-999 required=5 tests=[BAYES_00=-2.599, HTML_MESSAGE=0.001, RCVD_IN_DNSWL_MED=-4]
Received: from mail.ietf.org ([12.22.58.30]) by localhost (ietfa.amsl.com [127.0.0.1]) (amavisd-new, port 10024) with ESMTP id ZOqXNCezkDAg for <oauth@ietfa.amsl.com>; Tue, 12 Feb 2013 12:04:23 -0800 (PST)
Received: from exprod8og102.obsmtp.com (exprod8og102.obsmtp.com [64.18.3.84]) by ietfa.amsl.com (Postfix) with SMTP id 1CFE521F8E92 for <oauth@ietf.org>; Tue, 12 Feb 2013 12:04:23 -0800 (PST)
Received: from exsfm-hub5.internal.salesforce.com ([204.14.239.233]) by exprod8ob102.postini.com ([64.18.7.12]) with SMTP ID DSNKURqgRi/PG0Mm4Kofmcq8bc3m/oNYdfjN@postini.com; Tue, 12 Feb 2013 12:04:23 PST
Received: from EXSFM-MB03.internal.salesforce.com ([10.1.127.57]) by exsfm-hub5.internal.salesforce.com ([10.1.127.5]) with mapi; Tue, 12 Feb 2013 12:04:22 -0800
From: Pat Patterson <ppatterson@salesforce.com>
To: John Bradley <ve7jtb@ve7jtb.com>
Date: Tue, 12 Feb 2013 12:04:19 -0800
Thread-Topic: [OAUTH-WG] Registration: JSON Encoded Input
Thread-Index: Ac4JXCXMX29dq+jqSpiXjxPKurH6sg==
Message-ID: <07D5BBD9-15C0-4796-B944-2A3241829994@salesforce.com>
References: <51195F3B.1010701@mitre.org> <4E1F6AAD24975D4BA5B168042967394367443A16@TK5EX14MBXC285.redmond.corp.microsoft.com> <511A98DE.4030507@mitre.org> <9309CDB3-8AEE-428D-A7F0-5DAC45EFD44C@ve7jtb.com> <CA+ZpN27U5MB0sbEw=RdVe_YiESUnkjsAmBJezSVg2FafEi8OJQ@mail.gmail.com> <040A3633-A51F-4B17-8019-5DEEC349F39C@ve7jtb.com>
In-Reply-To: <040A3633-A51F-4B17-8019-5DEEC349F39C@ve7jtb.com>
Accept-Language: en-US
Content-Language: en-US
X-MS-Has-Attach: 
X-MS-TNEF-Correlator: 
acceptlanguage: en-US
Content-Type: multipart/alternative; boundary="_000_07D5BBD915C04796B9442A3241829994salesforcecom_"
MIME-Version: 1.0
Cc: "oauth@ietf.org" <oauth@ietf.org>
Subject: Re: [OAUTH-WG] Registration: JSON Encoded Input
X-BeenThere: oauth@ietf.org
X-Mailman-Version: 2.1.12
Precedence: list
List-Id: OAUTH WG <oauth.ietf.org>
List-Unsubscribe: <https://www.ietf.org/mailman/options/oauth>, <mailto:oauth-request@ietf.org?subject=unsubscribe>
List-Archive: <http://www.ietf.org/mail-archive/web/oauth>
List-Post: <mailto:oauth@ietf.org>
List-Help: <mailto:oauth-request@ietf.org?subject=help>
List-Subscribe: <https://www.ietf.org/mailman/listinfo/oauth>, <mailto:oauth-request@ietf.org?subject=subscribe>
X-List-Received-Date: Tue, 12 Feb 2013 20:04:25 -0000

--_000_07D5BBD915C04796B9442A3241829994salesforcecom_
Content-Type: text/plain; charset="Windows-1252"
Content-Transfer-Encoding: quoted-printable

Just POST the JSON as the HTTP payload with mime-type application/json:

$ curl -v -H "Content-Type: application/json" -X POST -d '{"Hello": "World"=
}' http://requestb.in/19qit4u1
* About to connect() to requestb.in port 80 (#0)
*   Trying 107.20.236.186... connected
* Connected to requestb.in (107.20.236.186) port 80 (#0)
> POST /19qit4u1 HTTP/1.1
> User-Agent: curl/7.19.7 (universal-apple-darwin10.0) libcurl/7.19.7 OpenS=
SL/0.9.8r zlib/1.2.3
> Host: requestb.in
> Accept: */*
> Content-Type: application/json
> Content-Length: 18
>
< HTTP/1.1 200 OK
< Content-Type: text/html; charset=3Dutf-8
< Date: Tue, 12 Feb 2013 20:03:39 GMT
< Content-Length: 3
< Connection: keep-alive
<
ok
* Connection #0 to host requestb.in left intact
* Closing connection #0

Cheers,

Pat
--
Pat Patterson | Principal Developer Evangelist | 408-849-4681 | http://abou=
t.me/patpatterson

On Feb 12, 2013, at 11:58 AM, John Bradley wrote:

Some people apparently encode the JSON as the key in a form POST,  some peo=
ple do a form POST with a special key and the JSON as the value.

There appear to be a number of theories in the wild.   I am not an expert I=
 just looked up code examples from several sources stack overflow and the l=
ike.

We probably need to get input from developers who have experience working w=
ith different frameworks.   I think the differences have to do with decodin=
g it at the receiver.

We originally had registration posting JSON but we changed form encoding as=
 that worked in all environments.   We just need to be sure we are not crea=
ting problems for people with the change back.


John B.

On 2013-02-12, at 4:48 PM, Tim Bray <twbray@google.com<mailto:twbray@google=
.com>> wrote:



On Tue, Feb 12, 2013 at 11:44 AM, John Bradley <ve7jtb@ve7jtb.com<mailto:ve=
7jtb@ve7jtb.com>> wrote:
Nat and I hashed out the pro's and cons of JSON requests.

If we POST or PUT a JSON object we need to be specific as there rare severa=
l ways to do it that may work better or worse depending on the receiver.
This needs to be looked over and one picked.

Hm?  Not following on =93several ways=94, I=92d have thought that POSTing J=
SON is just POSTing JSON, must be missing something. -T


In the other thread about the server returning the update URI and being abl=
e to encode the client in that if it needs to takes care of Servers that ne=
ed that info in query parameters or the path to do the routing.

The use of structure can be used to enhance readability and parsing of the =
input, and output.

However we need to temper our urge to apply structure to everything.

IT needs to be applied carefully otherwise we start looking like crazies.

If we do it cautiously I am in favour of JSON as input.

John B.

On 2013-02-12, at 4:32 PM, Justin Richer <jricher@mitre.org<mailto:jricher@=
mitre.org>> wrote:

Thanks for forwarding that, Mike. I'll paste in my response to Nat's concer=
n here as well:
It's an increasingly well known pattern that has reasonable support on the =
server side. For PHP, I was able to find the above example via the top hit =
on Stack Overflow. In Ruby, it's a matter of something like:

JSON.parse(request.body.read)

depending on the web app framework. On Java/Spring, it's a matter of inject=
ing the entity body as a string and handing it to a parser (Gson in this ca=
se):

public String doApi(@RequestBody String jsonString) { JsonObject json =3D n=
ew JsonParser().parse(jsonString).getAsJsonObject();

It's a similar read/parse setup in Node.js as well.

It's true that in all of these cases you don't get to make use of the routi=
ng or data binding facilities (though in Spring you can do that for simpler=
 domain objects using a ModelBinding), so you don't get niceities like the =
$_POST array in PHP handed to you. This is why I don't think it's a good id=
ea at all to switch functionality based on the contents of the JSON object.=
 It should be a domain object only, which is what it would be in this case.

I think that the positives of using JSON from the client's perspective and =
the overall protocol design far outweigh the slightly increased implementat=
ion cost at the server.


 -- Justin

On 02/12/2013 02:11 PM, Mike Jones wrote:

FYI, this issue is also being discussed as an OpenID Connect issue at https=
://bitbucket.org/openid/connect/issue/747.  I think that Nat's recent comme=
nt there bears repeating on this list:



Nat Sakimura:



Not so sure. For example, PHP cannot get the JSON object form application/j=
son POST in $_POST.



It is OK to have a parameter like "request" that holds JSON. Then, you can =
get to it from $_POST['request']. However, if you POST the JSON as the POST=
 body, then you would have to call a low level function in the form of:





```

#!php



$file =3D file_get_contents('php://input'); $x =3D json_decode($file); ```



Not that it is harder, but it is much less known. Many PHP programmers will=
 certainly goes "???".



We need to check what would be the cases for other scripting languages befo=
re making the final decision.



                                                            -- Mike



-----Original Message-----
From: oauth-bounces@ietf.org<mailto:oauth-bounces@ietf.org> [mailto:oauth-b=
ounces@ietf.org] On Behalf Of Justin Richer
Sent: Monday, February 11, 2013 1:15 PM
To: oauth@ietf.org<mailto:oauth@ietf.org>
Subject: [OAUTH-WG] Registration: JSON Encoded Input



Draft -05 of OAuth Dynamic Client Registration [1] switched from a form-enc=
oded input that had been used by drafts -01 through -04 to a JSON encoded i=
nput that was used originally in -00. Note that all versions keep JSON-enco=
ded output from all operations.



Pro:

  - JSON gives us a rich data structure so that things such as lists, numbe=
rs, nulls, and objects can be represented natively

  - Allows for parallelism between the input to the endpoint and output fro=
m the endpoint, reducing possible translation errors between the two

  - JSON specifies UTF8 encoding for all strings, forms may have many diffe=
rent encodings

  - JSON has minimal character escaping required for most strings, forms re=
quire escaping for common characters such as space, slash, comma, etc.



Con:

  - the rest of OAuth is form-in/JSON-out

  - nothing else in OAuth requires the Client to create a JSON object, mere=
ly to parse one

  - form-in/JSON-out is a very widely established pattern on the web today

  - Client information (client_name, client_id, etc.) is conflated with acc=
ess information (registration_access_token, _links, expires_at, etc.) in ro=
ot level of the same JSON object, leaving the client to decide what needs t=
o (can?) be sent back to the server for update operations.





Alternatives include any number of data encoding schemes, including form (l=
ike the old drafts), XML, ASN.1, etc.





  -- Justin



[1] http://tools.ietf.org/html/draft-ietf-oauth-dyn-reg-05

_______________________________________________

OAuth mailing list

OAuth@ietf.org<mailto:OAuth@ietf.org>

https://www.ietf.org/mailman/listinfo/oauth

_______________________________________________
OAuth mailing list
OAuth@ietf.org<mailto:OAuth@ietf.org>
https://www.ietf.org/mailman/listinfo/oauth


_______________________________________________
OAuth mailing list
OAuth@ietf.org<mailto:OAuth@ietf.org>
https://www.ietf.org/mailman/listinfo/oauth





--_000_07D5BBD915C04796B9442A3241829994salesforcecom_
Content-Type: text/html; charset="Windows-1252"
Content-Transfer-Encoding: quoted-printable

<html><head></head><body style=3D"word-wrap: break-word; -webkit-nbsp-mode:=
 space; -webkit-line-break: after-white-space; "><div>Just POST the JSON as=
 the HTTP payload with mime-type application/json:</div><div><br></div><div=
><div>$ curl -v -H "Content-Type: application/json" -X POST -d '{"Hello": "=
World"}' <a href=3D"http://requestb.in/19qit4u1">http://requestb.in/19qit4u=
1</a></div><div>* About to connect() to requestb.in port 80 (#0)</div><div>=
* &nbsp; Trying 107.20.236.186... connected</div><div>* Connected to reques=
tb.in (107.20.236.186) port 80 (#0)</div><div>&gt; POST /19qit4u1 HTTP/1.1<=
/div><div>&gt; User-Agent: curl/7.19.7 (universal-apple-darwin10.0) libcurl=
/7.19.7 OpenSSL/0.9.8r zlib/1.2.3</div><div>&gt; Host: requestb.in</div><di=
v>&gt; Accept: */*</div><div>&gt; Content-Type: application/json</div><div>=
&gt; Content-Length: 18</div><div>&gt;&nbsp;</div><div>&lt; HTTP/1.1 200 OK=
</div><div>&lt; Content-Type: text/html; charset=3Dutf-8</div><div>&lt; Dat=
e: Tue, 12 Feb 2013 20:03:39 GMT</div><div>&lt; Content-Length: 3</div><div=
>&lt; Connection: keep-alive</div><div>&lt;&nbsp;</div><div>ok</div><div>* =
Connection #0 to host requestb.in left intact</div><div>* Closing connectio=
n #0</div></div><br><div>
<div style=3D"word-wrap: break-word; -webkit-nbsp-mode: space; -webkit-line=
-break: after-white-space; "><span class=3D"Apple-style-span" style=3D"bord=
er-collapse: separate; color: rgb(0, 0, 0); font-family: Helvetica; font-st=
yle: normal; font-variant: normal; font-weight: normal; letter-spacing: nor=
mal; line-height: normal; orphans: 2; text-align: -webkit-auto; text-indent=
: 0px; text-transform: none; white-space: normal; widows: 2; word-spacing: =
0px; -webkit-border-horizontal-spacing: 0px; -webkit-border-vertical-spacin=
g: 0px; -webkit-text-decorations-in-effect: none; -webkit-text-size-adjust:=
 auto; -webkit-text-stroke-width: 0px; font-size: medium; "><div style=3D"w=
ord-wrap: break-word; -webkit-nbsp-mode: space; -webkit-line-break: after-w=
hite-space; ">Cheers,<br><br>Pat<br>--&nbsp;<br>Pat Patterson |&nbsp;Princi=
pal Developer Evangelist&nbsp;|&nbsp;408-849-4681 | <a href=3D"http://about=
.me/patpatterson">http://about.me/patpatterson</a></div></span></div>
</div>
<br><div><div>On Feb 12, 2013, at 11:58 AM, John Bradley wrote:</div><br cl=
ass=3D"Apple-interchange-newline"><blockquote type=3D"cite">



<meta http-equiv=3D"Content-Type" content=3D"text/html; charset=3Dutf-8">

<div style=3D"word-wrap: break-word; -webkit-nbsp-mode: space; -webkit-line=
-break: after-white-space; ">
Some people apparently encode the JSON as the key in a form POST, &nbsp;som=
e people do a form POST with a special key and the JSON as the value.&nbsp;
<div><br>
</div>
<div>There appear to be a number of theories in the wild. &nbsp; I am not a=
n expert I just looked up code examples from several sources stack overflow=
 and the like.</div>
<div><br>
</div>
<div>We probably need to get input from developers who have experience work=
ing with different frameworks. &nbsp; I think the differences have to do wi=
th decoding it at the receiver.</div>
<div><br>
</div>
<div>We originally had registration posting JSON but we changed form encodi=
ng as that worked in all environments. &nbsp; We just need to be sure we ar=
e not creating problems for people with the change back.</div>
<div><br>
</div>
<div><br>
</div>
<div>John B.</div>
<div><br>
<div>
<div>On 2013-02-12, at 4:48 PM, Tim Bray &lt;<a href=3D"mailto:twbray@googl=
e.com">twbray@google.com</a>&gt; wrote:</div>
<br class=3D"Apple-interchange-newline">
<blockquote type=3D"cite"><br>
<br>
<div class=3D"gmail_quote">On Tue, Feb 12, 2013 at 11:44 AM, John Bradley <=
span dir=3D"ltr">
&lt;<a href=3D"mailto:ve7jtb@ve7jtb.com" target=3D"_blank">ve7jtb@ve7jtb.co=
m</a>&gt;</span> wrote:<br>
<blockquote class=3D"gmail_quote" style=3D"margin:0 0 0 .8ex;border-left:1p=
x #ccc solid;padding-left:1ex">
<div style=3D"word-wrap:break-word">Nat and I hashed out the pro's and cons=
 of JSON requests. &nbsp;
<div><br>
</div>
<div>If we POST or PUT a JSON object we need to be specific as there rare s=
everal ways to do it that may work better or worse depending on the receive=
r.</div>
<div>This needs to be looked over and one picked.</div>
</div>
</blockquote>
<div><br>
</div>
<div>Hm? &nbsp;Not following on =93several ways=94, I=92d have thought that=
 POSTing JSON is just POSTing JSON, must be missing something. -T</div>
<div>&nbsp;</div>
<blockquote class=3D"gmail_quote" style=3D"margin:0 0 0 .8ex;border-left:1p=
x #ccc solid;padding-left:1ex">
<div style=3D"word-wrap:break-word">
<div><br>
</div>
<div>In the other thread about the server returning the update URI and bein=
g able to encode the client in that if it needs to takes care of Servers th=
at need that info in query parameters or the path to do the routing.</div>
<div><br>
</div>
<div>The use of structure can be used to enhance readability and parsing of=
 the input, and output.</div>
<div><br>
</div>
<div>However we need to temper our urge to apply structure to everything. &=
nbsp;</div>
<div><br>
</div>
<div>IT needs to be applied carefully otherwise we start looking like crazi=
es.</div>
<div><br>
</div>
<div>If we do it cautiously I am in favour of JSON as input.</div>
<div><br>
</div>
<div>John B.</div>
<div>
<div class=3D"h5">
<div><br>
<div>
<div>On 2013-02-12, at 4:32 PM, Justin Richer &lt;<a href=3D"mailto:jricher=
@mitre.org" target=3D"_blank">jricher@mitre.org</a>&gt; wrote:</div>
<br>
<blockquote type=3D"cite">
<div bgcolor=3D"#FFFFFF" text=3D"#000000">Thanks for forwarding that, Mike.=
 I'll paste in my response to Nat's concern here as well:<br>
<blockquote>It's an increasingly well known pattern that has reasonable sup=
port on the server side. For PHP, I was able to find the above example via =
the top hit on Stack Overflow. In Ruby, it's a matter of something like:<br=
>
<br>
JSON.parse(request.body.read)<br>
<br>
depending on the web app framework. On Java/Spring, it's a matter of inject=
ing the entity body as a string and handing it to a parser (Gson in this ca=
se):<br>
<br>
public String doApi(@RequestBody String jsonString) { JsonObject json =3D n=
ew JsonParser().parse(jsonString).getAsJsonObject();<br>
<br>
It's a similar read/parse setup in Node.js as well.<br>
<br>
It's true that in all of these cases you don't get to make use of the routi=
ng or data binding facilities (though in Spring you can do that for simpler=
 domain objects using a ModelBinding), so you don't get niceities like the =
$_POST array in PHP handed to you.
 This is why I don't think it's a good idea at all to switch functionality =
based on the contents of the JSON object. It should be a domain object only=
, which is what it would be in this case.<br>
<br>
I think that the positives of using JSON from the client's perspective and =
the overall protocol design far outweigh the slightly increased implementat=
ion cost at the server.<br>
</blockquote>
<br>
<br>
&nbsp;-- Justin<br>
<br>
<div>On 02/12/2013 02:11 PM, Mike Jones wrote:<br>
</div>
<blockquote type=3D"cite">
<div><p>FYI, this issue is also being discussed as an OpenID Connect issue =
at <a href=3D"https://bitbucket.org/openid/connect/issue/747" target=3D"_bl=
ank">
https://bitbucket.org/openid/connect/issue/747</a>.&nbsp; I think that Nat'=
s recent comment there bears repeating on this list:<u></u><u></u></p><p><u=
></u>&nbsp;<u></u></p><p style=3D"margin-left:.5in">Nat Sakimura:<u></u><u>=
</u></p><p style=3D"margin-left:.5in"><u></u>&nbsp;<u></u></p><p style=3D"m=
argin-left:.5in">Not so sure. For example, PHP cannot get the JSON object f=
orm application/json POST in $_POST.
<u></u><u></u></p><p style=3D"margin-left:.5in"><u></u>&nbsp;<u></u></p><p =
style=3D"margin-left:.5in">It is OK to have a parameter like "request" that=
 holds JSON. Then, you can get to it from $_POST['request']. However, if yo=
u POST the JSON as the POST body, then you would have to call a low level f=
unction in the form of:
<u></u><u></u></p><p style=3D"margin-left:.5in"><u></u>&nbsp;<u></u></p><p =
style=3D"margin-left:.5in"><u></u>&nbsp;<u></u></p><p style=3D"margin-left:=
.5in">```<u></u><u></u></p><p style=3D"margin-left:.5in">#!php<u></u><u></u=
></p><p style=3D"margin-left:.5in"><u></u>&nbsp;<u></u></p><p style=3D"marg=
in-left:.5in">$file =3D file_get_contents('<a>php://input'</a>); $x =3D jso=
n_decode($file); ```<u></u><u></u></p><p style=3D"margin-left:.5in"><u></u>=
&nbsp;<u></u></p><p style=3D"margin-left:.5in">Not that it is harder, but i=
t is much less known. Many PHP programmers will certainly goes "???".
<u></u><u></u></p><p style=3D"margin-left:.5in"><u></u>&nbsp;<u></u></p><p =
style=3D"margin-left:.5in">We need to check what would be the cases for oth=
er scripting languages before making the final decision.<u></u><u></u></p><=
p><u></u>&nbsp;<u></u></p><p>&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbs=
p;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&=
nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbs=
p;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&=
nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbs=
p;&nbsp; -- Mike<u></u><u></u></p><p><u></u>&nbsp;<u></u></p><p>-----Origin=
al Message-----<br>
From: <a href=3D"mailto:oauth-bounces@ietf.org" target=3D"_blank">oauth-bou=
nces@ietf.org</a> [<a href=3D"mailto:oauth-bounces@ietf.org" target=3D"_bla=
nk">mailto:oauth-bounces@ietf.org</a>] On Behalf Of Justin Richer<br>
Sent: Monday, February 11, 2013 1:15 PM<br>
To: <a href=3D"mailto:oauth@ietf.org" target=3D"_blank">oauth@ietf.org</a><=
br>
Subject: [OAUTH-WG] Registration: JSON Encoded Input</p><p><u></u>&nbsp;<u>=
</u></p><p>Draft -05 of OAuth Dynamic Client Registration [1] switched from=
 a form-encoded input that had been used by drafts -01 through -04 to a JSO=
N encoded input that was used originally in -00. Note that all versions kee=
p JSON-encoded output from all operations.<u></u><u></u></p><p><u></u>&nbsp=
;<u></u></p><p>Pro:<u></u><u></u></p><p>&nbsp; - JSON gives us a rich data =
structure so that things such as lists, numbers, nulls, and objects can be =
represented natively<u></u><u></u></p><p>&nbsp; - Allows for parallelism be=
tween the input to the endpoint and output from the endpoint, reducing poss=
ible translation errors between the two<u></u><u></u></p><p>&nbsp; - JSON s=
pecifies UTF8 encoding for all strings, forms may have many different encod=
ings<u></u><u></u></p><p>&nbsp; - JSON has minimal character escaping requi=
red for most strings, forms require escaping for common characters such as =
space, slash, comma, etc.<u></u><u></u></p><p><u></u>&nbsp;<u></u></p><p>Co=
n:<u></u><u></u></p><p>&nbsp; - the rest of OAuth is form-in/JSON-out<u></u=
><u></u></p><p>&nbsp; - nothing else in OAuth requires the Client to create=
 a JSON object, merely to parse one<u></u><u></u></p><p>&nbsp; - form-in/JS=
ON-out is a very widely established pattern on the web today<u></u><u></u><=
/p><p>&nbsp; - Client information (client_name, client_id, etc.) is conflat=
ed with access information (registration_access_token, _links, expires_at, =
etc.) in root level of the same JSON object, leaving the client to decide w=
hat needs to (can?) be sent back to the
 server for update operations.<u></u><u></u></p><p><u></u>&nbsp;<u></u></p>=
<p><u></u>&nbsp;<u></u></p><p>Alternatives include any number of data encod=
ing schemes, including form (like the old drafts), XML, ASN.1, etc.<u></u><=
u></u></p><p><u></u>&nbsp;<u></u></p><p><u></u>&nbsp;<u></u></p><p>&nbsp; -=
- Justin<u></u><u></u></p><p><u></u>&nbsp;<u></u></p><p>[1] <a href=3D"http=
://tools.ietf.org/html/draft-ietf-oauth-dyn-reg-05" target=3D"_blank">
<span style=3D"color:windowtext;text-decoration:none">http://tools.ietf.org=
/html/draft-ietf-oauth-dyn-reg-05</span></a><u></u><u></u></p><p>__________=
_____________________________________<u></u><u></u></p><p>OAuth mailing lis=
t<u></u><u></u></p><p><a href=3D"mailto:OAuth@ietf.org" target=3D"_blank"><=
span style=3D"color:windowtext;text-decoration:none">OAuth@ietf.org</span><=
/a><u></u><u></u></p><p><a href=3D"https://www.ietf.org/mailman/listinfo/oa=
uth" target=3D"_blank"><span style=3D"color:windowtext;text-decoration:none=
">https://www.ietf.org/mailman/listinfo/oauth</span></a><u></u><u></u></p>
</div>
</blockquote>
<br>
</div>
_______________________________________________<br>
OAuth mailing list<br>
<a href=3D"mailto:OAuth@ietf.org" target=3D"_blank">OAuth@ietf.org</a><br>
<a href=3D"https://www.ietf.org/mailman/listinfo/oauth" target=3D"_blank">h=
ttps://www.ietf.org/mailman/listinfo/oauth</a><br>
</blockquote>
</div>
<br>
</div>
</div>
</div>
</div>
<br>
_______________________________________________<br>
OAuth mailing list<br>
<a href=3D"mailto:OAuth@ietf.org">OAuth@ietf.org</a><br>
<a href=3D"https://www.ietf.org/mailman/listinfo/oauth" target=3D"_blank">h=
ttps://www.ietf.org/mailman/listinfo/oauth</a><br>
<br>
</blockquote>
</div>
<br>
</blockquote>
</div>
<br>
</div>
</div>

</blockquote></div><br></body></html>=

--_000_07D5BBD915C04796B9442A3241829994salesforcecom_--

From ve7jtb@ve7jtb.com  Tue Feb 12 12:05:16 2013
Return-Path: <ve7jtb@ve7jtb.com>
X-Original-To: oauth@ietfa.amsl.com
Delivered-To: oauth@ietfa.amsl.com
Received: from localhost (localhost [127.0.0.1]) by ietfa.amsl.com (Postfix) with ESMTP id E666F21F8DCF for <oauth@ietfa.amsl.com>; Tue, 12 Feb 2013 12:05:16 -0800 (PST)
X-Virus-Scanned: amavisd-new at amsl.com
X-Spam-Flag: NO
X-Spam-Score: -2.992
X-Spam-Level: 
X-Spam-Status: No, score=-2.992 tagged_above=-999 required=5 tests=[AWL=0.007,  BAYES_00=-2.599, J_CHICKENPOX_44=0.6, RCVD_IN_DNSWL_LOW=-1]
Received: from mail.ietf.org ([12.22.58.30]) by localhost (ietfa.amsl.com [127.0.0.1]) (amavisd-new, port 10024) with ESMTP id Qubef9Fwxnje for <oauth@ietfa.amsl.com>; Tue, 12 Feb 2013 12:05:15 -0800 (PST)
Received: from mail-qc0-f180.google.com (mail-qc0-f180.google.com [209.85.216.180]) by ietfa.amsl.com (Postfix) with ESMTP id 2143821F8B97 for <oauth@ietf.org>; Tue, 12 Feb 2013 12:05:14 -0800 (PST)
Received: by mail-qc0-f180.google.com with SMTP id v28so171577qcm.39 for <oauth@ietf.org>; Tue, 12 Feb 2013 12:05:14 -0800 (PST)
X-Google-DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=google.com; s=20120113; h=x-received:content-type:mime-version:subject:from:in-reply-to:date :cc:content-transfer-encoding:message-id:references:to:x-mailer :x-gm-message-state; bh=UxqjvZEITYImXg6ESgteREmhA4Lnd8IE0JXawg6u+dg=; b=Rgr56RXwFD/bYfiO6JZq/MOyXub2BT7BLMFfpWDYrujFL8OtFKD2cH7i/MNyci/+oA LZ05joW1VZWwYs7OVR/X1QBJTlKNfeZ85HhjddRVtNwmDlW/oNgXmvh0xv2ZniNB0Ig4 CUmED72ZvpiFf0drq92ZCg9Szm8B5zoZqTPilrz9rAldpvMfHat4jPevq37Z+qZnV/AJ YeWxsIFNmEutv5lkRSMRQgu6fhCl8pqHtMAr5s0xsjuPwAcOGRFPVuYZwIo1epcJCRU7 Ez95KcFQT7m85V0QOa4qBMsn169P1AhnN75y5v0c3o8EYhAd8IHAQ8R2t82Yp4WaHDu7 Crxg==
X-Received: by 10.49.107.4 with SMTP id gy4mr8580233qeb.63.1360699514093; Tue, 12 Feb 2013 12:05:14 -0800 (PST)
Received: from [192.168.1.213] (190-20-23-212.baf.movistar.cl. [190.20.23.212]) by mx.google.com with ESMTPS id t2sm16800043qav.1.2013.02.12.12.05.09 (version=TLSv1 cipher=ECDHE-RSA-RC4-SHA bits=128/128); Tue, 12 Feb 2013 12:05:12 -0800 (PST)
Content-Type: text/plain; charset=iso-8859-1
Mime-Version: 1.0 (Mac OS X Mail 6.2 \(1499\))
From: John Bradley <ve7jtb@ve7jtb.com>
In-Reply-To: <511A9E58.1040606@mitre.org>
Date: Tue, 12 Feb 2013 17:04:44 -0300
Content-Transfer-Encoding: quoted-printable
Message-Id: <715762BE-886B-4E93-8E35-6356F0A18224@ve7jtb.com>
References: <51195F3D.1050006@mitre.org> <222C28CB-7F6F-4BC3-8692-40404C2DC2D3@maymount.com> <511A50C7.8080102@mitre.org> <B256FD2D-5ED7-4306-A3BF-E6A196862B2E@ve7jtb.com>	<511A6C49.50801@mitre.org> <CABzCy2CdxaNOvho2uyuc83qHm4WKHVfToC_n6QqAS3fqTGzU2w@mail.gmail.com> <4E1F6AAD24975D4BA5B168042967394367443A52@TK5EX14MBXC285.redmond.corp.microsoft.com> <9EDD79AA-5104-49CC-A528-C5A1A1777106@ve7jtb.com> <511A9E58.1040606@mitre.org>
To: Justin Richer <jricher@mitre.org>
X-Mailer: Apple Mail (2.1499)
X-Gm-Message-State: ALoCoQncT2+oT/iQ9mVO8RNObg+yHM3I5wgiGYgTxS/GGx1jOcwHMbqQ3RDoHZdD85V2UMpnNNYn
Cc: "oauth@ietf.org" <oauth@ietf.org>
Subject: Re: [OAUTH-WG] Registration: HAL _links structure and client	self-URL
X-BeenThere: oauth@ietf.org
X-Mailman-Version: 2.1.12
Precedence: list
List-Id: OAUTH WG <oauth.ietf.org>
List-Unsubscribe: <https://www.ietf.org/mailman/options/oauth>, <mailto:oauth-request@ietf.org?subject=unsubscribe>
List-Archive: <http://www.ietf.org/mail-archive/web/oauth>
List-Post: <mailto:oauth@ietf.org>
List-Help: <mailto:oauth-request@ietf.org?subject=help>
List-Subscribe: <https://www.ietf.org/mailman/listinfo/oauth>, <mailto:oauth-request@ietf.org?subject=subscribe>
X-List-Received-Date: Tue, 12 Feb 2013 20:05:17 -0000

There are two TOS and privacy policies.

One for the AS that the client is agreeing to by registering.  Will it =
hold up in court?  don't know Facebook is doing this.
The link would be a reference to a human readable file that the client =
(RP) can have someone look over before using the connection.
This policy may relate to how long the client can cache info etc.

The other is the privacy policy of the client that may be presented as a =
click through from the Authorization server.  In general the user is not =
explicitly accepting this, only implicitly accepting it by continuing to =
the RP after having been given a chance to look at it if they want.

These are very US fuse on privacy but ignoring them is probably a =
mistake.

John B.
On 2013-02-12, at 4:56 PM, Justin Richer <jricher@mitre.org> wrote:

> One question though: How exactly would the client, a software =
application, agree to the TOS? Is it supposed to fetch the content of =
the tos_url and do some processing on it? I wasn't under the impression =
that the tos_url contents were machine readable. Is it supposed to =
present that to the user somehow? It seems that's a better thing for the =
server to do at Authorization time, since it's got the user's attention.
>=20
> Remember, this is meant to be for *automated* registration. The =
developer of the Client has no say at this stage of the game.
>=20
> So, I think this is a bit of a red herring, to be honest.
>=20
> -- Justin
>=20
> On 02/12/2013 02:52 PM, John Bradley wrote:
>> The current privacy policy and TOS URL in registration are the ones =
for the Client.
>>=20
>> Nat and I discussed adding ones for the Authorization server that the =
client agrees to as separate from ones that the user is agreeing to.
>>=20
>> The Authorization servers TOS would be in discovery and perhaps in =
the registration response to indicate what the client is agreeing to.
>>=20
>> As there rare standard relationships that cover this links Nat was =
speculating that they could be part of the _links object.
>>=20
>> That aside confirming the terms of service that the client has agreed =
to in some way is probably a good thing in the registration response.
>>=20
>> John B.
>>=20
>> On 2013-02-12, at 4:25 PM, Mike Jones <Michael.Jones@microsoft.com> =
wrote:
>>=20
>>> Part of the REST/JSON philosophy is that interfaces should be as =
simple and developer-friendly as possible.  XML was rejected by =
developers, in part, because of the self-describing nature of the =
structure, which required extra syntax that was often not useful in =
practice.  Trying to re-impose that structure using extra JSON syntax =
conventions is just asking developers to have an allergic reaction to =
our specs upon encountering them.  The syntactic complexity and =
*surprise factor* isn't worth the limited semantic benefits of using =
"_links".
>>>=20
>>> Since you bring up privacy policy and terms of service, I'll note =
that the OAuth Dynamic Registration spec already has these fields to =
address those:
>>> 	policy_url
>>> 	tos_url
>>>=20
>>> Those have been working fine for OpenID Connect too.  There's no =
need to likewise convolve them to add the extra syntax that you describe =
below.
>>>=20
>>> (BTW, in a private thread, John Bradley pointed out that what the =
two of you talked about in person was actually the possibility of adding =
privacy policy and terms of service declarations at *discovery time*, =
rather than registration time.  That's a different topic, which we =
should discuss separately, if you want to pursue that.)
>>>=20
>>> 				Best wishes,
>>> 				-- Mike
>>>=20
>>> -----Original Message-----
>>> From: oauth-bounces@ietf.org [mailto:oauth-bounces@ietf.org] On =
Behalf Of Nat Sakimura
>>> Sent: Tuesday, February 12, 2013 9:11 AM
>>> To: Justin Richer; oauth@ietf.org
>>> Subject: Re: [OAUTH-WG] Registration: HAL _links structure and =
client self-URL
>>>=20
>>> Actually, if it is to return it in the HTTP header, then it should =
also use the RFC5988 Web Linking format.
>>> Now, that is nice to have, but for many JSON programmers, I agree =
that it would be a hassle to obtain the header and store them in =
addition to the JSON. So, it is nicer to have it in JSON body.
>>>=20
>>> Re: Is "_links.self.href" grossly complex over =
"registration_access_url"?
>>>=20
>>> I do not think so. Accessing a flat top level parameter such as =
registration_access_url and _links.self.href does not make any =
difference from a client programmers point of view. That's a beauty of =
JSON. Both can be treated as a parameter name. Doing a group operation =
on the links makes difference though: the structured one is easier since =
you can just operate on _links while in case of the top level =
parameters, you have to have an explicit list of them and do the =
matches. (See below for the necessity for the grouping).
>>>=20
>>> I and John discussed this for at least half an hour F2F last week, =
both technically and from operation/legal point of view, for OpenID =
Connect Registration.
>>> Similar points could be made to OAuth dyn reg.
>>>=20
>>> Here is what we have discussed:
>>>=20
>>> When dynamically registering the client to the server, the server =
probably needs to return the following:
>>>=20
>>>  * terms-of-service (terms of service of the server to the client)
>>>  * privacy-policy (privacy policy of the server to the client)
>>>=20
>>> Both are defined in RFC5988/IANA Link Relations registry.
>>>=20
>>>=20
>>> They should be returned together with
>>>=20
>>>  * self.href
>>>=20
>>> which is also defined in RFC5988/IANA Link Relations registry.
>>>=20
>>> There are several ways to do it.
>>>=20
>>>  * Return these using RFC5988 (HTTP Header)
>>>  * Return these in entity body
>>>      * Use HAL (or OAuth-meta)/JSON Schema
>>>      * Use something else (e.g., a top level items)
>>>=20
>>> Returning it in the entity body has several advantage over HTTP =
header:
>>>=20
>>>  * They can be captured in one call;
>>>  * They are protocol agnostic;
>>>=20
>>> We determined that these advantages outweighs the disadvantage of =
creating a new standard.
>>>=20
>>> The question becomes then whether to:
>>>=20
>>>  * Use HAL (or OAuth-meta)/JSON Schema
>>>  * Use something else (e.g., a top level items)
>>>=20
>>> First, we have to consider what needs to be returned in the =
link/relationship category. If it were just _links.self.href, then =
grouping probably does not make sense. However, since we have =
terms-of-service and privacy-policy as well already, it may well make =
sense.
>>>=20
>>> Moreover, when we think of a multi-tenant authorization server that =
may want to use different OAuth authz and token endpoints for different =
tennants, it would be better to be able to return those in the =
registration response. Then, it would make sense to register OAuth authz =
and token endpoints as rel type in the IANA registry (like Bill Mills is =
trying to
>>> do) and use them in a uniform manner. Note: these per tenant =
endpoints may support different scopes etc. as well. Then, these has to =
be coupled with the URIs. That is why all of RFC5988/HAL/JSON Schema =
uses href instead of just having the URL as the value of the parameter. =
The semantic relationship would often have an associated URI, and other =
parameters that goes with it.
>>>=20
>>> e.g.:
>>>=20
>>> {
>>>    "_links": {
>>>        "terms-of-service": {
>>>            "href": "https: //server.example.com/tos"
>>>        },
>>>        "privacy-policy": {
>>>            "href": "https: //server.example.com/pp"
>>>        },
>>>        "self": {
>>>            "href": "https: //server.example.com/clients/1234",
>>>            "authorize": "Bearer"
>>>        },
>>>        "oauth_authz": {
>>>            "href": "https: //server.example.com/authz",
>>>            "scopes": "openid profile email",
>>>            "response_types": [
>>>                "token id_token",
>>>                "code id_token",
>>>                "token",
>>>                "code"
>>>            ]
>>>        },
>>>        "oauth_token": {
>>>            "href": "https: //server.example.com/token",
>>>            "authorize": "Basic"
>>>        }
>>>    }
>>> }
>>>=20
>>> In short, there are bunch of link relations that needs to be =
returned with additional parameters.
>>> Grouping them seems to make sense.
>>>=20
>>> Considering all these, John and I came to the conclusion that the =
HAL type syntax would probably make more sense.
>>> (Note: JSON Schema syntax does not make the parameter access as easy =
as HAL.)
>>>=20
>>> In fact, Mike Kelly (the author of HAL) and I have just submit a new =
version of draft-sakimura-oauth-meta
>>>=20
>>>   http://tools.ietf.org/html/draft-sakimura-oauth-meta-02
>>>=20
>>> The proposal was discussed at IETF 85 OAuth WG and the chairs asked =
to submit the draft.
>>> The -00 appeared in December, and this -02 has some simplification =
and the addition of the "operations" inspired by
>>> https://tools.ietf.org/html/draft-ietf-scim-api-00#section-3.5 .
>>> It is arguably a subset of HAL plus some OAuth specifics.
>>> I have not added Discovery response example, but adding them would =
makes even more sense, I think.
>>>=20
>>> Cheers,
>>>=20
>>> Nat
>>>=20
>>>=20
>>> 2013/2/13 Justin Richer <jricher@mitre.org>
>>>> Agreed - I didn't think that header-only was the proposal, but =
let's be explicit about the returned body always containing the URL. The =
way I read the 201 definition, it suggests (SHOULD) that you use the =
location header, but also says that the entity should refer to the new =
resource. It was my assumption that the returned JSON would still have =
some form of client-entity management URL (whether it's the HAL _links =
structure or registration_management_url or something else is still up =
for debate).
>>>>=20
>>>> -- Justin
>>>>=20
>>>>=20
>>>>=20
>>>> On 02/12/2013 10:28 AM, John Bradley wrote:
>>>>=20
>>>> Returning a location header in the 201 ids fine as long as we also =
have the same info as a claim.
>>>>=20
>>>> I think most clients will want to process the JSON and store all =
the parameters together.  Making them fish out a header makes the W3C =
happy and is the correct thing to do but taking it from a claim is what =
developers are more comfortable with.
>>>>=20
>>>> John B.
>>>>=20
>>>> On 2013-02-12, at 11:25 AM, Justin Richer <jricher@mitre.org> =
wrote:
>>>>=20
>>>> I'd be fine with the return from a creation request being a 201 =
instead of a 200.
>>>>=20
>>>> -- Justin
>>>>=20
>>>> On 02/11/2013 06:33 PM, Richard Harrington wrote:
>>>>=20
>>>> Since the request is an HTTP POST and a resource is created =
(http://www.w3.org/Protocols/rfc2616/rfc2616-sec9.html#sec9.5) the =
response should be an HTTP 201 Created =
(http://www.w3.org/Protocols/rfc2616/rfc2616-sec10.html#sec10.2.2) which =
is supposed to include the location of the newly created resource.
>>>>=20
>>>> This is a good pattern to follow since, as you say, it does provide =
flexibility.
>>>>=20
>>>>=20
>>>>=20
>>>> On Feb 11, 2013, at 1:14 PM, Justin Richer <jricher@mitre.org> =
wrote:
>>>>=20
>>>> Draft -05 of OAuth Dynamic Client Registration [1] returns a URL =
pointer for the client to perform update and secret rotation actions. =
This functionality arose from discussions on the list about moving =
towards a more RESTful pattern, and Nat Sakimura proposed this approach =
in the OpenID Connect Working Group. This URL may be distinct from the =
Client Registration Endpoint URL, but draft -05 makes no promises as to =
its content, form, or structure, though it does contain implementor's =
notes on possible methods.
>>>>=20
>>>> Two questions arise from this change:
>>>> - The semantics of returning the client manipulation URL
>>>> - The syntax (derived from HAL for JSON [2], an individual I-D
>>>> submission)
>>>>=20
>>>> On semantics:
>>>>=20
>>>> Pro:
>>>> - The server has flexibility on how to define the "update" =
endpoint,
>>>> sending all clients to one URL, sending different clients to =
different
>>>> URLs, or sending clients to a URL with a baked-in query parameter
>>>> - The client can take the URL as-is and use it for all management
>>>> operations (ie, it doesn't have to generate or compose the URL =
based
>>>> on component parts)
>>>>=20
>>>> Con:
>>>> - The client must remember one more piece of information from the
>>>> server at runtime if it wants to do manipulation and management of
>>>> itself at the server (in addition to client_id, client_secret,
>>>> registration_access_token, and others)
>>>>=20
>>>> Alternatives include specifying a URL pattern for the server to use =
and all clients to follow, specifying a query parameter for the update =
action, and specifying a separate endpoint entirely and using the =
presence of items such as client_id and the registration access token to =
differentiate the requests. Note that *all* of these alternatives can be =
accommodated using the semantics described above, with the same actions =
on the client's part.
>>>>=20
>>>>=20
>>>> On syntax:
>>>>=20
>>>> Pro:
>>>> - Follows the designs of RFC5988 for link relations
>>>> - The HAL format is general, and allows for all kinds of other
>>>> information to be placed inside the _links structure
>>>> - Allows for full use of the JSON object to specify advanced
>>>> operations on the returned endpoint if desired
>>>>=20
>>>> Con:
>>>> - The rest of OAuth doesn't follow link relation guidelines (though
>>>> it's been brought up)
>>>> - The HAL format is general, and allows for all kinds of other
>>>> information to be placed inside the _links structure
>>>> - The HAL-JSON document is an expired individual I-D, and it's =
unclear
>>>> what wider adoption looks like right now
>>>>=20
>>>> Alternatives include returning the URL as a separate data member =
(registration_update_url), using HTTP headers, or using JSON Schema.
>>>>=20
>>>> -- Justin
>>>>=20
>>>>=20
>>>>=20
>>>> [1] http://tools.ietf.org/html/draft-ietf-oauth-dyn-reg-05
>>>> [2] http://tools.ietf.org/html/draft-kelly-json-hal-03
>>>> _______________________________________________
>>>> OAuth mailing list
>>>> OAuth@ietf.org
>>>> https://www.ietf.org/mailman/listinfo/oauth
>>>>=20
>>>>=20
>>>> _______________________________________________
>>>> OAuth mailing list
>>>> OAuth@ietf.org
>>>> https://www.ietf.org/mailman/listinfo/oauth
>>>>=20
>>>>=20
>>>>=20
>>>>=20
>>>> _______________________________________________
>>>> OAuth mailing list
>>>> OAuth@ietf.org
>>>> https://www.ietf.org/mailman/listinfo/oauth
>>>>=20
>>>=20
>>>=20
>>> --
>>> Nat Sakimura (=3Dnat)
>>> Chairman, OpenID Foundation
>>> http://nat.sakimura.org/
>>> @_nat_en
>>> _______________________________________________
>>> OAuth mailing list
>>> OAuth@ietf.org
>>> https://www.ietf.org/mailman/listinfo/oauth
>>> _______________________________________________
>>> OAuth mailing list
>>> OAuth@ietf.org
>>> https://www.ietf.org/mailman/listinfo/oauth
>=20


From jricher@mitre.org  Tue Feb 12 12:06:45 2013
Return-Path: <jricher@mitre.org>
X-Original-To: oauth@ietfa.amsl.com
Delivered-To: oauth@ietfa.amsl.com
Received: from localhost (localhost [127.0.0.1]) by ietfa.amsl.com (Postfix) with ESMTP id B609921F9033 for <oauth@ietfa.amsl.com>; Tue, 12 Feb 2013 12:06:45 -0800 (PST)
X-Virus-Scanned: amavisd-new at amsl.com
X-Spam-Flag: NO
X-Spam-Score: -6.27
X-Spam-Level: 
X-Spam-Status: No, score=-6.27 tagged_above=-999 required=5 tests=[AWL=-0.271,  BAYES_00=-2.599, J_CHICKENPOX_44=0.6, RCVD_IN_DNSWL_MED=-4]
Received: from mail.ietf.org ([12.22.58.30]) by localhost (ietfa.amsl.com [127.0.0.1]) (amavisd-new, port 10024) with ESMTP id GRC8wrmaGpZg for <oauth@ietfa.amsl.com>; Tue, 12 Feb 2013 12:06:44 -0800 (PST)
Received: from smtpksrv1.mitre.org (smtpksrv1.mitre.org [198.49.146.77]) by ietfa.amsl.com (Postfix) with ESMTP id 116E821F8DCF for <oauth@ietf.org>; Tue, 12 Feb 2013 12:06:44 -0800 (PST)
Received: from smtpksrv1.mitre.org (localhost.localdomain [127.0.0.1]) by localhost (Postfix) with SMTP id 8E0955313053; Tue, 12 Feb 2013 15:06:43 -0500 (EST)
Received: from IMCCAS03.MITRE.ORG (imccas03.mitre.org [129.83.29.80]) by smtpksrv1.mitre.org (Postfix) with ESMTP id 75BBC531304C; Tue, 12 Feb 2013 15:06:43 -0500 (EST)
Received: from [10.146.15.29] (129.83.31.58) by IMCCAS03.MITRE.ORG (129.83.29.80) with Microsoft SMTP Server (TLS) id 14.2.318.4; Tue, 12 Feb 2013 15:06:42 -0500
Message-ID: <511AA0A7.30302@mitre.org>
Date: Tue, 12 Feb 2013 15:05:59 -0500
From: Justin Richer <jricher@mitre.org>
User-Agent: Mozilla/5.0 (X11; Linux i686; rv:17.0) Gecko/20130106 Thunderbird/17.0.2
MIME-Version: 1.0
To: John Bradley <ve7jtb@ve7jtb.com>
References: <51195F3D.1050006@mitre.org> <222C28CB-7F6F-4BC3-8692-40404C2DC2D3@maymount.com> <511A50C7.8080102@mitre.org> <B256FD2D-5ED7-4306-A3BF-E6A196862B2E@ve7jtb.com>	<511A6C49.50801@mitre.org> <CABzCy2CdxaNOvho2uyuc83qHm4WKHVfToC_n6QqAS3fqTGzU2w@mail.gmail.com> <4E1F6AAD24975D4BA5B168042967394367443A52@TK5EX14MBXC285.redmond.corp.microsoft.com> <9EDD79AA-5104-49CC-A528-C5A1A1777106@ve7jtb.com> <511A9E58.1040606@mitre.org> <715762BE-886B-4E93-8E35-6356F0A18224@ve7jtb.com>
In-Reply-To: <715762BE-886B-4E93-8E35-6356F0A18224@ve7jtb.com>
Content-Type: text/plain; charset="ISO-8859-1"; format=flowed
Content-Transfer-Encoding: 7bit
X-Originating-IP: [129.83.31.58]
Cc: "oauth@ietf.org" <oauth@ietf.org>
Subject: Re: [OAUTH-WG] Registration: HAL _links structure and client	self-URL
X-BeenThere: oauth@ietf.org
X-Mailman-Version: 2.1.12
Precedence: list
List-Id: OAUTH WG <oauth.ietf.org>
List-Unsubscribe: <https://www.ietf.org/mailman/options/oauth>, <mailto:oauth-request@ietf.org?subject=unsubscribe>
List-Archive: <http://www.ietf.org/mail-archive/web/oauth>
List-Post: <mailto:oauth@ietf.org>
List-Help: <mailto:oauth-request@ietf.org?subject=help>
List-Subscribe: <https://www.ietf.org/mailman/listinfo/oauth>, <mailto:oauth-request@ietf.org?subject=subscribe>
X-List-Received-Date: Tue, 12 Feb 2013 20:06:45 -0000

I agree with the previous statement that the AS's privacy/TOS would be 
better handled through discovery, since it's not likely to change per 
client instance.

  -- Justin

On 02/12/2013 03:04 PM, John Bradley wrote:
> There are two TOS and privacy policies.
>
> One for the AS that the client is agreeing to by registering.  Will it hold up in court?  don't know Facebook is doing this.
> The link would be a reference to a human readable file that the client (RP) can have someone look over before using the connection.
> This policy may relate to how long the client can cache info etc.
>
> The other is the privacy policy of the client that may be presented as a click through from the Authorization server.  In general the user is not explicitly accepting this, only implicitly accepting it by continuing to the RP after having been given a chance to look at it if they want.
>
> These are very US fuse on privacy but ignoring them is probably a mistake.
>
> John B.
> On 2013-02-12, at 4:56 PM, Justin Richer <jricher@mitre.org> wrote:
>
>> One question though: How exactly would the client, a software application, agree to the TOS? Is it supposed to fetch the content of the tos_url and do some processing on it? I wasn't under the impression that the tos_url contents were machine readable. Is it supposed to present that to the user somehow? It seems that's a better thing for the server to do at Authorization time, since it's got the user's attention.
>>
>> Remember, this is meant to be for *automated* registration. The developer of the Client has no say at this stage of the game.
>>
>> So, I think this is a bit of a red herring, to be honest.
>>
>> -- Justin
>>
>> On 02/12/2013 02:52 PM, John Bradley wrote:
>>> The current privacy policy and TOS URL in registration are the ones for the Client.
>>>
>>> Nat and I discussed adding ones for the Authorization server that the client agrees to as separate from ones that the user is agreeing to.
>>>
>>> The Authorization servers TOS would be in discovery and perhaps in the registration response to indicate what the client is agreeing to.
>>>
>>> As there rare standard relationships that cover this links Nat was speculating that they could be part of the _links object.
>>>
>>> That aside confirming the terms of service that the client has agreed to in some way is probably a good thing in the registration response.
>>>
>>> John B.
>>>
>>> On 2013-02-12, at 4:25 PM, Mike Jones <Michael.Jones@microsoft.com> wrote:
>>>
>>>> Part of the REST/JSON philosophy is that interfaces should be as simple and developer-friendly as possible.  XML was rejected by developers, in part, because of the self-describing nature of the structure, which required extra syntax that was often not useful in practice.  Trying to re-impose that structure using extra JSON syntax conventions is just asking developers to have an allergic reaction to our specs upon encountering them.  The syntactic complexity and *surprise factor* isn't worth the limited semantic benefits of using "_links".
>>>>
>>>> Since you bring up privacy policy and terms of service, I'll note that the OAuth Dynamic Registration spec already has these fields to address those:
>>>> 	policy_url
>>>> 	tos_url
>>>>
>>>> Those have been working fine for OpenID Connect too.  There's no need to likewise convolve them to add the extra syntax that you describe below.
>>>>
>>>> (BTW, in a private thread, John Bradley pointed out that what the two of you talked about in person was actually the possibility of adding privacy policy and terms of service declarations at *discovery time*, rather than registration time.  That's a different topic, which we should discuss separately, if you want to pursue that.)
>>>>
>>>> 				Best wishes,
>>>> 				-- Mike
>>>>
>>>> -----Original Message-----
>>>> From: oauth-bounces@ietf.org [mailto:oauth-bounces@ietf.org] On Behalf Of Nat Sakimura
>>>> Sent: Tuesday, February 12, 2013 9:11 AM
>>>> To: Justin Richer; oauth@ietf.org
>>>> Subject: Re: [OAUTH-WG] Registration: HAL _links structure and client self-URL
>>>>
>>>> Actually, if it is to return it in the HTTP header, then it should also use the RFC5988 Web Linking format.
>>>> Now, that is nice to have, but for many JSON programmers, I agree that it would be a hassle to obtain the header and store them in addition to the JSON. So, it is nicer to have it in JSON body.
>>>>
>>>> Re: Is "_links.self.href" grossly complex over "registration_access_url"?
>>>>
>>>> I do not think so. Accessing a flat top level parameter such as registration_access_url and _links.self.href does not make any difference from a client programmers point of view. That's a beauty of JSON. Both can be treated as a parameter name. Doing a group operation on the links makes difference though: the structured one is easier since you can just operate on _links while in case of the top level parameters, you have to have an explicit list of them and do the matches. (See below for the necessity for the grouping).
>>>>
>>>> I and John discussed this for at least half an hour F2F last week, both technically and from operation/legal point of view, for OpenID Connect Registration.
>>>> Similar points could be made to OAuth dyn reg.
>>>>
>>>> Here is what we have discussed:
>>>>
>>>> When dynamically registering the client to the server, the server probably needs to return the following:
>>>>
>>>>   * terms-of-service (terms of service of the server to the client)
>>>>   * privacy-policy (privacy policy of the server to the client)
>>>>
>>>> Both are defined in RFC5988/IANA Link Relations registry.
>>>>
>>>>
>>>> They should be returned together with
>>>>
>>>>   * self.href
>>>>
>>>> which is also defined in RFC5988/IANA Link Relations registry.
>>>>
>>>> There are several ways to do it.
>>>>
>>>>   * Return these using RFC5988 (HTTP Header)
>>>>   * Return these in entity body
>>>>       * Use HAL (or OAuth-meta)/JSON Schema
>>>>       * Use something else (e.g., a top level items)
>>>>
>>>> Returning it in the entity body has several advantage over HTTP header:
>>>>
>>>>   * They can be captured in one call;
>>>>   * They are protocol agnostic;
>>>>
>>>> We determined that these advantages outweighs the disadvantage of creating a new standard.
>>>>
>>>> The question becomes then whether to:
>>>>
>>>>   * Use HAL (or OAuth-meta)/JSON Schema
>>>>   * Use something else (e.g., a top level items)
>>>>
>>>> First, we have to consider what needs to be returned in the link/relationship category. If it were just _links.self.href, then grouping probably does not make sense. However, since we have terms-of-service and privacy-policy as well already, it may well make sense.
>>>>
>>>> Moreover, when we think of a multi-tenant authorization server that may want to use different OAuth authz and token endpoints for different tennants, it would be better to be able to return those in the registration response. Then, it would make sense to register OAuth authz and token endpoints as rel type in the IANA registry (like Bill Mills is trying to
>>>> do) and use them in a uniform manner. Note: these per tenant endpoints may support different scopes etc. as well. Then, these has to be coupled with the URIs. That is why all of RFC5988/HAL/JSON Schema uses href instead of just having the URL as the value of the parameter. The semantic relationship would often have an associated URI, and other parameters that goes with it.
>>>>
>>>> e.g.:
>>>>
>>>> {
>>>>     "_links": {
>>>>         "terms-of-service": {
>>>>             "href": "https: //server.example.com/tos"
>>>>         },
>>>>         "privacy-policy": {
>>>>             "href": "https: //server.example.com/pp"
>>>>         },
>>>>         "self": {
>>>>             "href": "https: //server.example.com/clients/1234",
>>>>             "authorize": "Bearer"
>>>>         },
>>>>         "oauth_authz": {
>>>>             "href": "https: //server.example.com/authz",
>>>>             "scopes": "openid profile email",
>>>>             "response_types": [
>>>>                 "token id_token",
>>>>                 "code id_token",
>>>>                 "token",
>>>>                 "code"
>>>>             ]
>>>>         },
>>>>         "oauth_token": {
>>>>             "href": "https: //server.example.com/token",
>>>>             "authorize": "Basic"
>>>>         }
>>>>     }
>>>> }
>>>>
>>>> In short, there are bunch of link relations that needs to be returned with additional parameters.
>>>> Grouping them seems to make sense.
>>>>
>>>> Considering all these, John and I came to the conclusion that the HAL type syntax would probably make more sense.
>>>> (Note: JSON Schema syntax does not make the parameter access as easy as HAL.)
>>>>
>>>> In fact, Mike Kelly (the author of HAL) and I have just submit a new version of draft-sakimura-oauth-meta
>>>>
>>>>    http://tools.ietf.org/html/draft-sakimura-oauth-meta-02
>>>>
>>>> The proposal was discussed at IETF 85 OAuth WG and the chairs asked to submit the draft.
>>>> The -00 appeared in December, and this -02 has some simplification and the addition of the "operations" inspired by
>>>> https://tools.ietf.org/html/draft-ietf-scim-api-00#section-3.5 .
>>>> It is arguably a subset of HAL plus some OAuth specifics.
>>>> I have not added Discovery response example, but adding them would makes even more sense, I think.
>>>>
>>>> Cheers,
>>>>
>>>> Nat
>>>>
>>>>
>>>> 2013/2/13 Justin Richer <jricher@mitre.org>
>>>>> Agreed - I didn't think that header-only was the proposal, but let's be explicit about the returned body always containing the URL. The way I read the 201 definition, it suggests (SHOULD) that you use the location header, but also says that the entity should refer to the new resource. It was my assumption that the returned JSON would still have some form of client-entity management URL (whether it's the HAL _links structure or registration_management_url or something else is still up for debate).
>>>>>
>>>>> -- Justin
>>>>>
>>>>>
>>>>>
>>>>> On 02/12/2013 10:28 AM, John Bradley wrote:
>>>>>
>>>>> Returning a location header in the 201 ids fine as long as we also have the same info as a claim.
>>>>>
>>>>> I think most clients will want to process the JSON and store all the parameters together.  Making them fish out a header makes the W3C happy and is the correct thing to do but taking it from a claim is what developers are more comfortable with.
>>>>>
>>>>> John B.
>>>>>
>>>>> On 2013-02-12, at 11:25 AM, Justin Richer <jricher@mitre.org> wrote:
>>>>>
>>>>> I'd be fine with the return from a creation request being a 201 instead of a 200.
>>>>>
>>>>> -- Justin
>>>>>
>>>>> On 02/11/2013 06:33 PM, Richard Harrington wrote:
>>>>>
>>>>> Since the request is an HTTP POST and a resource is created (http://www.w3.org/Protocols/rfc2616/rfc2616-sec9.html#sec9.5) the response should be an HTTP 201 Created (http://www.w3.org/Protocols/rfc2616/rfc2616-sec10.html#sec10.2.2) which is supposed to include the location of the newly created resource.
>>>>>
>>>>> This is a good pattern to follow since, as you say, it does provide flexibility.
>>>>>
>>>>>
>>>>>
>>>>> On Feb 11, 2013, at 1:14 PM, Justin Richer <jricher@mitre.org> wrote:
>>>>>
>>>>> Draft -05 of OAuth Dynamic Client Registration [1] returns a URL pointer for the client to perform update and secret rotation actions. This functionality arose from discussions on the list about moving towards a more RESTful pattern, and Nat Sakimura proposed this approach in the OpenID Connect Working Group. This URL may be distinct from the Client Registration Endpoint URL, but draft -05 makes no promises as to its content, form, or structure, though it does contain implementor's notes on possible methods.
>>>>>
>>>>> Two questions arise from this change:
>>>>> - The semantics of returning the client manipulation URL
>>>>> - The syntax (derived from HAL for JSON [2], an individual I-D
>>>>> submission)
>>>>>
>>>>> On semantics:
>>>>>
>>>>> Pro:
>>>>> - The server has flexibility on how to define the "update" endpoint,
>>>>> sending all clients to one URL, sending different clients to different
>>>>> URLs, or sending clients to a URL with a baked-in query parameter
>>>>> - The client can take the URL as-is and use it for all management
>>>>> operations (ie, it doesn't have to generate or compose the URL based
>>>>> on component parts)
>>>>>
>>>>> Con:
>>>>> - The client must remember one more piece of information from the
>>>>> server at runtime if it wants to do manipulation and management of
>>>>> itself at the server (in addition to client_id, client_secret,
>>>>> registration_access_token, and others)
>>>>>
>>>>> Alternatives include specifying a URL pattern for the server to use and all clients to follow, specifying a query parameter for the update action, and specifying a separate endpoint entirely and using the presence of items such as client_id and the registration access token to differentiate the requests. Note that *all* of these alternatives can be accommodated using the semantics described above, with the same actions on the client's part.
>>>>>
>>>>>
>>>>> On syntax:
>>>>>
>>>>> Pro:
>>>>> - Follows the designs of RFC5988 for link relations
>>>>> - The HAL format is general, and allows for all kinds of other
>>>>> information to be placed inside the _links structure
>>>>> - Allows for full use of the JSON object to specify advanced
>>>>> operations on the returned endpoint if desired
>>>>>
>>>>> Con:
>>>>> - The rest of OAuth doesn't follow link relation guidelines (though
>>>>> it's been brought up)
>>>>> - The HAL format is general, and allows for all kinds of other
>>>>> information to be placed inside the _links structure
>>>>> - The HAL-JSON document is an expired individual I-D, and it's unclear
>>>>> what wider adoption looks like right now
>>>>>
>>>>> Alternatives include returning the URL as a separate data member (registration_update_url), using HTTP headers, or using JSON Schema.
>>>>>
>>>>> -- Justin
>>>>>
>>>>>
>>>>>
>>>>> [1] http://tools.ietf.org/html/draft-ietf-oauth-dyn-reg-05
>>>>> [2] http://tools.ietf.org/html/draft-kelly-json-hal-03
>>>>> _______________________________________________
>>>>> OAuth mailing list
>>>>> OAuth@ietf.org
>>>>> https://www.ietf.org/mailman/listinfo/oauth
>>>>>
>>>>>
>>>>> _______________________________________________
>>>>> OAuth mailing list
>>>>> OAuth@ietf.org
>>>>> https://www.ietf.org/mailman/listinfo/oauth
>>>>>
>>>>>
>>>>>
>>>>>
>>>>> _______________________________________________
>>>>> OAuth mailing list
>>>>> OAuth@ietf.org
>>>>> https://www.ietf.org/mailman/listinfo/oauth
>>>>>
>>>>
>>>> --
>>>> Nat Sakimura (=nat)
>>>> Chairman, OpenID Foundation
>>>> http://nat.sakimura.org/
>>>> @_nat_en
>>>> _______________________________________________
>>>> OAuth mailing list
>>>> OAuth@ietf.org
>>>> https://www.ietf.org/mailman/listinfo/oauth
>>>> _______________________________________________
>>>> OAuth mailing list
>>>> OAuth@ietf.org
>>>> https://www.ietf.org/mailman/listinfo/oauth


From ve7jtb@ve7jtb.com  Tue Feb 12 12:07:57 2013
Return-Path: <ve7jtb@ve7jtb.com>
X-Original-To: oauth@ietfa.amsl.com
Delivered-To: oauth@ietfa.amsl.com
Received: from localhost (localhost [127.0.0.1]) by ietfa.amsl.com (Postfix) with ESMTP id 77F2121F9059 for <oauth@ietfa.amsl.com>; Tue, 12 Feb 2013 12:07:57 -0800 (PST)
X-Virus-Scanned: amavisd-new at amsl.com
X-Spam-Flag: NO
X-Spam-Score: -3.292
X-Spam-Level: 
X-Spam-Status: No, score=-3.292 tagged_above=-999 required=5 tests=[AWL=0.306,  BAYES_00=-2.599, HTML_MESSAGE=0.001, RCVD_IN_DNSWL_LOW=-1]
Received: from mail.ietf.org ([12.22.58.30]) by localhost (ietfa.amsl.com [127.0.0.1]) (amavisd-new, port 10024) with ESMTP id MCdKRenQfqre for <oauth@ietfa.amsl.com>; Tue, 12 Feb 2013 12:07:56 -0800 (PST)
Received: from mail-qa0-f47.google.com (mail-qa0-f47.google.com [209.85.216.47]) by ietfa.amsl.com (Postfix) with ESMTP id C6B4B21F9058 for <oauth@ietf.org>; Tue, 12 Feb 2013 12:07:55 -0800 (PST)
Received: by mail-qa0-f47.google.com with SMTP id j8so1829105qah.20 for <oauth@ietf.org>; Tue, 12 Feb 2013 12:07:55 -0800 (PST)
X-Google-DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=google.com; s=20120113; h=x-received:content-type:mime-version:subject:from:in-reply-to:date :cc:message-id:references:to:x-mailer:x-gm-message-state; bh=xe0Y8z8QNrrKxLCrg+b1nEb0RAen0rIKgxpyJNqOorY=; b=Tbn5wvYULfvIqKFKj4kyGavre0cVDdYwpBRnIE2IHrubvWlWZ150VvXrWBffr1PuS1 +KEy0z2eXi0+kG96mTF4C/eFnzyD/lv/06Z9+BRJrBFpQMHIYDHpUSGuT60MZQ9RsoHB MAouy40W9LqeH2WspqlEcaYODlKESNBzINEZgANVMotWTPnEpz8/ZNoq+spRsJRGHS2Y ZMjA/kq360mld2k9l+qE2J9E1L1+O6y8xywaR2aDJ1MXt+oALTxu5KbLr48/3dOvZtjK 1b366THQiKYJRy/+q/eer1XyqsYwIlmo9ZVkKbEyS8vg1PBlz9X2JhI7J/gQ1SS5dQZV bWFg==
X-Received: by 10.229.176.216 with SMTP id bf24mr357345qcb.110.1360699675029;  Tue, 12 Feb 2013 12:07:55 -0800 (PST)
Received: from [192.168.1.213] (190-20-23-212.baf.movistar.cl. [190.20.23.212]) by mx.google.com with ESMTPS id u8sm16051616qeu.2.2013.02.12.12.07.51 (version=TLSv1 cipher=ECDHE-RSA-RC4-SHA bits=128/128); Tue, 12 Feb 2013 12:07:53 -0800 (PST)
Content-Type: multipart/alternative; boundary="Apple-Mail=_5A8A8034-ECD6-424D-B487-6E68310DC5B2"
Mime-Version: 1.0 (Mac OS X Mail 6.2 \(1499\))
From: John Bradley <ve7jtb@ve7jtb.com>
In-Reply-To: <511A9F1C.1010504@mitre.org>
Date: Tue, 12 Feb 2013 17:07:46 -0300
Message-Id: <025E3AC8-7F84-410A-A4FF-5FBBD305EA83@ve7jtb.com>
References: <51195F3B.1010701@mitre.org> <4E1F6AAD24975D4BA5B168042967394367443A16@TK5EX14MBXC285.redmond.corp.microsoft.com> <511A98DE.4030507@mitre.org> <9309CDB3-8AEE-428D-A7F0-5DAC45EFD44C@ve7jtb.com> <CA+ZpN27U5MB0sbEw=RdVe_YiESUnkjsAmBJezSVg2FafEi8OJQ@mail.gmail.com> <040A3633-A51F-4B17-8019-5DEEC349F39C@ve7jtb.com> <511A9F1C.1010504@mitre.org>
To: Justin Richer <jricher@mitre.org>
X-Mailer: Apple Mail (2.1499)
X-Gm-Message-State: ALoCoQnt7I66Tpf6BwNkewy9FYvNWD4eaGlovMreFsP9wkaZKWgj7sIGZNGo9FspGAqeYAKDWlv7
Cc: "oauth@ietf.org" <oauth@ietf.org>
Subject: Re: [OAUTH-WG] Registration: JSON Encoded Input
X-BeenThere: oauth@ietf.org
X-Mailman-Version: 2.1.12
Precedence: list
List-Id: OAUTH WG <oauth.ietf.org>
List-Unsubscribe: <https://www.ietf.org/mailman/options/oauth>, <mailto:oauth-request@ietf.org?subject=unsubscribe>
List-Archive: <http://www.ietf.org/mail-archive/web/oauth>
List-Post: <mailto:oauth@ietf.org>
List-Help: <mailto:oauth-request@ietf.org?subject=help>
List-Subscribe: <https://www.ietf.org/mailman/listinfo/oauth>, <mailto:oauth-request@ietf.org?subject=subscribe>
X-List-Received-Date: Tue, 12 Feb 2013 20:07:57 -0000

--Apple-Mail=_5A8A8034-ECD6-424D-B487-6E68310DC5B2
Content-Transfer-Encoding: quoted-printable
Content-Type: text/plain;
	charset=windows-1252

I am fine with that as long as all the IdP tools have access to the =
entity body in some reasonable way.   That seems like the most sensible =
thing.

However given the number of people talking about encoding it in a form =
to get access to it,  we should check that it works for everyone.

John B.
On 2013-02-12, at 4:59 PM, Justin Richer <jricher@mitre.org> wrote:

> If that's the question, then my proposal is the Content-type is =
"application/json" and the HTTP Entity Body is the JSON document. No =
form posts or parameter names to be had here.
>=20
>  -- Justin
>=20
> On 02/12/2013 02:58 PM, John Bradley wrote:
>> Some people apparently encode the JSON as the key in a form POST,  =
some people do a form POST with a special key and the JSON as the value.=20=

>>=20
>> There appear to be a number of theories in the wild.   I am not an =
expert I just looked up code examples from several sources stack =
overflow and the like.
>>=20
>> We probably need to get input from developers who have experience =
working with different frameworks.   I think the differences have to do =
with decoding it at the receiver.
>>=20
>> We originally had registration posting JSON but we changed form =
encoding as that worked in all environments.   We just need to be sure =
we are not creating problems for people with the change back.
>>=20
>>=20
>> John B.
>>=20
>> On 2013-02-12, at 4:48 PM, Tim Bray <twbray@google.com> wrote:
>>=20
>>>=20
>>>=20
>>> On Tue, Feb 12, 2013 at 11:44 AM, John Bradley <ve7jtb@ve7jtb.com> =
wrote:
>>> Nat and I hashed out the pro's and cons of JSON requests. =20
>>>=20
>>> If we POST or PUT a JSON object we need to be specific as there rare =
several ways to do it that may work better or worse depending on the =
receiver.
>>> This needs to be looked over and one picked.
>>>=20
>>> Hm?  Not following on =93several ways=94, I=92d have thought that =
POSTing JSON is just POSTing JSON, must be missing something. -T
>>> =20
>>>=20
>>> In the other thread about the server returning the update URI and =
being able to encode the client in that if it needs to takes care of =
Servers that need that info in query parameters or the path to do the =
routing.
>>>=20
>>> The use of structure can be used to enhance readability and parsing =
of the input, and output.
>>>=20
>>> However we need to temper our urge to apply structure to everything. =
=20
>>>=20
>>> IT needs to be applied carefully otherwise we start looking like =
crazies.
>>>=20
>>> If we do it cautiously I am in favour of JSON as input.
>>>=20
>>> John B.
>>>=20
>>> On 2013-02-12, at 4:32 PM, Justin Richer <jricher@mitre.org> wrote:
>>>=20
>>>> Thanks for forwarding that, Mike. I'll paste in my response to =
Nat's concern here as well:
>>>> It's an increasingly well known pattern that has reasonable support =
on the server side. For PHP, I was able to find the above example via =
the top hit on Stack Overflow. In Ruby, it's a matter of something like:
>>>>=20
>>>> JSON.parse(request.body.read)
>>>>=20
>>>> depending on the web app framework. On Java/Spring, it's a matter =
of injecting the entity body as a string and handing it to a parser =
(Gson in this case):
>>>>=20
>>>> public String doApi(@RequestBody String jsonString) { JsonObject =
json =3D new JsonParser().parse(jsonString).getAsJsonObject();
>>>>=20
>>>> It's a similar read/parse setup in Node.js as well.
>>>>=20
>>>> It's true that in all of these cases you don't get to make use of =
the routing or data binding facilities (though in Spring you can do that =
for simpler domain objects using a ModelBinding), so you don't get =
niceities like the $_POST array in PHP handed to you. This is why I =
don't think it's a good idea at all to switch functionality based on the =
contents of the JSON object. It should be a domain object only, which is =
what it would be in this case.
>>>>=20
>>>> I think that the positives of using JSON from the client's =
perspective and the overall protocol design far outweigh the slightly =
increased implementation cost at the server.
>>>>=20
>>>>=20
>>>>  -- Justin
>>>>=20
>>>> On 02/12/2013 02:11 PM, Mike Jones wrote:
>>>>> FYI, this issue is also being discussed as an OpenID Connect issue =
at https://bitbucket.org/openid/connect/issue/747.  I think that Nat's =
recent comment there bears repeating on this list:
>>>>>=20
>>>>> =20
>>>>> Nat Sakimura:
>>>>>=20
>>>>> =20
>>>>> Not so sure. For example, PHP cannot get the JSON object form =
application/json POST in $_POST.
>>>>>=20
>>>>> =20
>>>>> It is OK to have a parameter like "request" that holds JSON. Then, =
you can get to it from $_POST['request']. However, if you POST the JSON =
as the POST body, then you would have to call a low level function in =
the form of:
>>>>>=20
>>>>> =20
>>>>> =20
>>>>> ```
>>>>>=20
>>>>> #!php
>>>>>=20
>>>>> =20
>>>>> $file =3D file_get_contents('php://input'); $x =3D =
json_decode($file); ```
>>>>>=20
>>>>> =20
>>>>> Not that it is harder, but it is much less known. Many PHP =
programmers will certainly goes "???".
>>>>>=20
>>>>> =20
>>>>> We need to check what would be the cases for other scripting =
languages before making the final decision.
>>>>>=20
>>>>> =20
>>>>>                                                             -- =
Mike
>>>>>=20
>>>>> =20
>>>>> -----Original Message-----
>>>>> From: oauth-bounces@ietf.org [mailto:oauth-bounces@ietf.org] On =
Behalf Of Justin Richer
>>>>> Sent: Monday, February 11, 2013 1:15 PM
>>>>> To: oauth@ietf.org
>>>>> Subject: [OAUTH-WG] Registration: JSON Encoded Input
>>>>>=20
>>>>> =20
>>>>> Draft -05 of OAuth Dynamic Client Registration [1] switched from a =
form-encoded input that had been used by drafts -01 through -04 to a =
JSON encoded input that was used originally in -00. Note that all =
versions keep JSON-encoded output from all operations.
>>>>>=20
>>>>> =20
>>>>> Pro:
>>>>>=20
>>>>>   - JSON gives us a rich data structure so that things such as =
lists, numbers, nulls, and objects can be represented natively
>>>>>=20
>>>>>   - Allows for parallelism between the input to the endpoint and =
output from the endpoint, reducing possible translation errors between =
the two
>>>>>=20
>>>>>   - JSON specifies UTF8 encoding for all strings, forms may have =
many different encodings
>>>>>=20
>>>>>   - JSON has minimal character escaping required for most strings, =
forms require escaping for common characters such as space, slash, =
comma, etc.
>>>>>=20
>>>>> =20
>>>>> Con:
>>>>>=20
>>>>>   - the rest of OAuth is form-in/JSON-out
>>>>>=20
>>>>>   - nothing else in OAuth requires the Client to create a JSON =
object, merely to parse one
>>>>>=20
>>>>>   - form-in/JSON-out is a very widely established pattern on the =
web today
>>>>>=20
>>>>>   - Client information (client_name, client_id, etc.) is conflated =
with access information (registration_access_token, _links, expires_at, =
etc.) in root level of the same JSON object, leaving the client to =
decide what needs to (can?) be sent back to the server for update =
operations.
>>>>>=20
>>>>> =20
>>>>> =20
>>>>> Alternatives include any number of data encoding schemes, =
including form (like the old drafts), XML, ASN.1, etc.
>>>>>=20
>>>>> =20
>>>>> =20
>>>>>   -- Justin
>>>>>=20
>>>>> =20
>>>>> [1] http://tools.ietf.org/html/draft-ietf-oauth-dyn-reg-05
>>>>>=20
>>>>> _______________________________________________
>>>>>=20
>>>>> OAuth mailing list
>>>>>=20
>>>>> OAuth@ietf.org
>>>>>=20
>>>>> https://www.ietf.org/mailman/listinfo/oauth
>>>>>=20
>>>>=20
>>>> _______________________________________________
>>>> OAuth mailing list
>>>> OAuth@ietf.org
>>>> https://www.ietf.org/mailman/listinfo/oauth
>>>=20
>>>=20
>>> _______________________________________________
>>> OAuth mailing list
>>> OAuth@ietf.org
>>> https://www.ietf.org/mailman/listinfo/oauth
>>>=20
>>>=20
>>=20
>=20


--Apple-Mail=_5A8A8034-ECD6-424D-B487-6E68310DC5B2
Content-Transfer-Encoding: quoted-printable
Content-Type: text/html;
	charset=windows-1252

<html><head><meta http-equiv=3D"Content-Type" content=3D"text/html =
charset=3Dwindows-1252"></head><body style=3D"word-wrap: break-word; =
-webkit-nbsp-mode: space; -webkit-line-break: after-white-space; ">I am =
fine with that as long as all the IdP tools have access to the entity =
body in some reasonable way. &nbsp; That seems like the most sensible =
thing.<div><br></div><div>However given the number of people talking =
about encoding it in a form to get access to it, &nbsp;we should check =
that it works for everyone.</div><div><br></div><div>John =
B.<br><div><div>On 2013-02-12, at 4:59 PM, Justin Richer &lt;<a =
href=3D"mailto:jricher@mitre.org">jricher@mitre.org</a>&gt; =
wrote:</div><br class=3D"Apple-interchange-newline"><blockquote =
type=3D"cite">
 =20
    <meta content=3D"text/html; charset=3Dwindows-1252" =
http-equiv=3D"Content-Type">
 =20
  <div bgcolor=3D"#FFFFFF" text=3D"#000000">
    If that's the question, then my proposal is the Content-type is
    "application/json" and the HTTP Entity Body is the JSON document. No
    form posts or parameter names to be had here.<br>
    <br>
    &nbsp;-- Justin<br>
    <br>
    <div class=3D"moz-cite-prefix">On 02/12/2013 02:58 PM, John Bradley
      wrote:<br>
    </div>
    <blockquote =
cite=3D"mid:040A3633-A51F-4B17-8019-5DEEC349F39C@ve7jtb.com" =
type=3D"cite">
      <meta http-equiv=3D"Content-Type" content=3D"text/html;
        charset=3Dwindows-1252">
      Some people apparently encode the JSON as the key in a form POST,
      &nbsp;some people do a form POST with a special key and the JSON =
as the
      value.&nbsp;
      <div><br>
      </div>
      <div>There appear to be a number of theories in the wild. &nbsp; I =
am
        not an expert I just looked up code examples from several
        sources stack overflow and the like.</div>
      <div><br>
      </div>
      <div>We probably need to get input from developers who have
        experience working with different frameworks. &nbsp; I think the
        differences have to do with decoding it at the receiver.</div>
      <div><br>
      </div>
      <div>We originally had registration posting JSON but we changed
        form encoding as that worked in all environments. &nbsp; We just =
need
        to be sure we are not creating problems for people with the
        change back.</div>
      <div><br>
      </div>
      <div><br>
      </div>
      <div>John B.</div>
      <div><br>
        <div>
          <div>On 2013-02-12, at 4:48 PM, Tim Bray &lt;<a =
moz-do-not-send=3D"true" =
href=3D"mailto:twbray@google.com">twbray@google.com</a>&gt;
            wrote:</div>
          <br class=3D"Apple-interchange-newline">
          <blockquote type=3D"cite"><br>
            <br>
            <div class=3D"gmail_quote">On Tue, Feb 12, 2013 at 11:44 AM,
              John Bradley <span dir=3D"ltr">&lt;<a =
moz-do-not-send=3D"true" href=3D"mailto:ve7jtb@ve7jtb.com" =
target=3D"_blank">ve7jtb@ve7jtb.com</a>&gt;</span>
              wrote:<br>
              <blockquote class=3D"gmail_quote" style=3D"margin:0 0 0
                .8ex;border-left:1px #ccc solid;padding-left:1ex">
                <div style=3D"word-wrap:break-word">Nat and I hashed out
                  the pro's and cons of JSON requests. &nbsp;
                  <div><br>
                  </div>
                  <div>If we POST or PUT a JSON object we need to be
                    specific as there rare several ways to do it that
                    may work better or worse depending on the =
receiver.</div>
                  <div>This needs to be looked over and one =
picked.</div>
                </div>
              </blockquote>
              <div><br>
              </div>
              <div>Hm? &nbsp;Not following on =93several ways=94, I=92d =
have
                thought that POSTing JSON is just POSTing JSON, must be
                missing something. -T</div>
              <div>&nbsp;</div>
              <blockquote class=3D"gmail_quote" style=3D"margin:0 0 0
                .8ex;border-left:1px #ccc solid;padding-left:1ex">
                <div style=3D"word-wrap:break-word">
                  <div><br>
                  </div>
                  <div>In the other thread about the server returning
                    the update URI and being able to encode the client
                    in that if it needs to takes care of Servers that
                    need that info in query parameters or the path to do
                    the routing.</div>
                  <div><br>
                  </div>
                  <div>The use of structure can be used to enhance
                    readability and parsing of the input, and =
output.</div>
                  <div><br>
                  </div>
                  <div>However we need to temper our urge to apply
                    structure to everything. &nbsp;</div>
                  <div>
                    <br>
                  </div>
                  <div>IT needs to be applied carefully otherwise we
                    start looking like crazies.</div>
                  <div><br>
                  </div>
                  <div>If we do it cautiously I am in favour of JSON as
                    input.</div>
                  <div><br>
                  </div>
                  <div>John B.</div>
                  <div>
                    <div class=3D"h5">
                      <div><br>
                        <div>
                          <div>On 2013-02-12, at 4:32 PM, Justin Richer
                            &lt;<a moz-do-not-send=3D"true" =
href=3D"mailto:jricher@mitre.org" =
target=3D"_blank">jricher@mitre.org</a>&gt;
                            wrote:</div>
                          <br>
                          <blockquote type=3D"cite">
                            <div bgcolor=3D"#FFFFFF" text=3D"#000000">
                              Thanks for forwarding that, Mike. I'll
                              paste in my response to Nat's concern here
                              as well:<br>
                              <blockquote>It's an increasingly well
                                known pattern that has reasonable
                                support on the server side. For PHP, I
                                was able to find the above example via
                                the top hit on Stack Overflow. In Ruby,
                                it's a matter of something like:<br>
                                <br>
                                JSON.parse(request.body.read)<br>
                                <br>
                                depending on the web app framework. On
                                Java/Spring, it's a matter of injecting
                                the entity body as a string and handing
                                it to a parser (Gson in this case):<br>
                                <br>
                                public String doApi(@RequestBody String
                                jsonString) { JsonObject json =3D new
                                =
JsonParser().parse(jsonString).getAsJsonObject();<br>
                                <br>
                                It's a similar read/parse setup in
                                Node.js as well.<br>
                                <br>
                                It's true that in all of these cases you
                                don't get to make use of the routing or
                                data binding facilities (though in
                                Spring you can do that for simpler
                                domain objects using a ModelBinding), so
                                you don't get niceities like the $_POST
                                array in PHP handed to you. This is why
                                I don't think it's a good idea at all to
                                switch functionality based on the
                                contents of the JSON object. It should
                                be a domain object only, which is what
                                it would be in this case.<br>
                                <br>
                                I think that the positives of using JSON
                                from the client's perspective and the
                                overall protocol design far outweigh the
                                slightly increased implementation cost
                                at the server.<br>
                              </blockquote>
                              <br>
                              <br>
                              &nbsp;-- Justin<br>
                              <br>
                              <div>On 02/12/2013 02:11 PM, Mike Jones
                                wrote:<br>
                              </div>
                              <blockquote type=3D"cite">
                                <div><p>FYI, this issue is also being
                                    discussed as an OpenID Connect issue
                                    at <a moz-do-not-send=3D"true" =
href=3D"https://bitbucket.org/openid/connect/issue/747" =
target=3D"_blank">https://bitbucket.org/openid/connect/issue/747</a>.&nbsp=
;

                                    I think that Nat's recent comment
                                    there bears repeating on this =
list:</p><div>&nbsp;<br class=3D"webkit-block-placeholder"></div><p =
style=3D"margin-left:.5in">Nat
                                    Sakimura:</p><div =
style=3D"margin-left: 0.5in; ">&nbsp;<br =
class=3D"webkit-block-placeholder"></div><p style=3D"margin-left:.5in">Not=
 so
                                    sure. For example, PHP cannot get
                                    the JSON object form
                                    application/json POST in $_POST. =
</p><div style=3D"margin-left: 0.5in; ">&nbsp;<br =
class=3D"webkit-block-placeholder"></div><p style=3D"margin-left:.5in">It =
is OK
                                    to have a parameter like "request"
                                    that holds JSON. Then, you can get
                                    to it from $_POST['request'].
                                    However, if you POST the JSON as the
                                    POST body, then you would have to
                                    call a low level function in the
                                    form of: </p><div =
style=3D"margin-left: 0.5in; ">&nbsp;<br =
class=3D"webkit-block-placeholder"></div><div style=3D"margin-left: =
0.5in; ">&nbsp;<br class=3D"webkit-block-placeholder"></div><p =
style=3D"margin-left:.5in">```</p><p style=3D"margin-left:.5in">
                                    #!php</p><div style=3D"margin-left: =
0.5in; ">&nbsp;<br class=3D"webkit-block-placeholder"></div><p =
style=3D"margin-left:.5in">$file =3D
                                    file_get_contents('<a =
moz-do-not-send=3D"true">php://input'</a>);
                                    $x =3D json_decode($file); =
```</p><div style=3D"margin-left: 0.5in; ">&nbsp;<br =
class=3D"webkit-block-placeholder"></div><p style=3D"margin-left:.5in">Not=
 that
                                    it is harder, but it is much less
                                    known. Many PHP programmers will
                                    certainly goes "???". </p><div =
style=3D"margin-left: 0.5in; ">&nbsp;<br =
class=3D"webkit-block-placeholder"></div><p style=3D"margin-left:.5in">We =
need to
                                    check what would be the cases for
                                    other scripting languages before
                                    making the final =
decision.</p><div>&nbsp;<br =
class=3D"webkit-block-placeholder"></div><p>&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;=
&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&n=
bsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbs=
p;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;=
&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&n=
bsp;&nbsp;&nbsp;&nbsp;&nbsp;

                                    -- Mike</p><div>&nbsp;<br =
class=3D"webkit-block-placeholder"></div><p>-----Original =
Message-----<br>
                                    From: <a moz-do-not-send=3D"true" =
href=3D"mailto:oauth-bounces@ietf.org" =
target=3D"_blank">oauth-bounces@ietf.org</a>
                                    [<a moz-do-not-send=3D"true" =
href=3D"mailto:oauth-bounces@ietf.org" =
target=3D"_blank">mailto:oauth-bounces@ietf.org</a>]
                                    On Behalf Of Justin Richer<br>
                                    Sent: Monday, February 11, 2013 1:15
                                    PM<br>
                                    To: <a moz-do-not-send=3D"true" =
href=3D"mailto:oauth@ietf.org" target=3D"_blank">oauth@ietf.org</a><br>
                                    Subject: [OAUTH-WG] Registration:
                                    JSON Encoded Input</p><div>&nbsp;<br =
class=3D"webkit-block-placeholder"></div><p>Draft -05 of OAuth Dynamic =
Client
                                    Registration [1] switched from a
                                    form-encoded input that had been
                                    used by drafts -01 through -04 to a
                                    JSON encoded input that was used
                                    originally in -00. Note that all
                                    versions keep JSON-encoded output
                                    from all =
operations.</p><div>&nbsp;<br =
class=3D"webkit-block-placeholder"></div><p>Pro:</p><p>&nbsp; - JSON =
gives us a rich data
                                    structure so that things such as
                                    lists, numbers, nulls, and objects
                                    can be represented =
natively</p><p>&nbsp; - Allows for parallelism between
                                    the input to the endpoint and output
                                    from the endpoint, reducing possible
                                    translation errors between the =
two</p><p>&nbsp; - JSON specifies UTF8 encoding
                                    for all strings, forms may have many
                                    different encodings</p><p>&nbsp; - =
JSON has minimal character
                                    escaping required for most strings,
                                    forms require escaping for common
                                    characters such as space, slash,
                                    comma, etc.</p><div>&nbsp;<br =
class=3D"webkit-block-placeholder"></div><p>Con:</p><p>&nbsp; - the rest =
of OAuth is
                                    form-in/JSON-out</p><p>&nbsp; - =
nothing else in OAuth requires
                                    the Client to create a JSON object,
                                    merely to parse one</p><p>&nbsp; - =
form-in/JSON-out is a very
                                    widely established pattern on the
                                    web today</p><p>&nbsp; - Client =
information
                                    (client_name, client_id, etc.) is
                                    conflated with access information
                                    (registration_access_token, _links,
                                    expires_at, etc.) in root level of
                                    the same JSON object, leaving the
                                    client to decide what needs to
                                    (can?) be sent back to the server
                                    for update =
operations.</p><div>&nbsp;<br =
class=3D"webkit-block-placeholder"></div><div>&nbsp;<br =
class=3D"webkit-block-placeholder"></div><p>Alternatives include any =
number of
                                    data encoding schemes, including
                                    form (like the old drafts), XML,
                                    ASN.1, etc.</p><div>&nbsp;<br =
class=3D"webkit-block-placeholder"></div><div>&nbsp;<br =
class=3D"webkit-block-placeholder"></div><p>&nbsp; -- =
Justin</p><div>&nbsp;<br class=3D"webkit-block-placeholder"></div><p>[1] =
<a moz-do-not-send=3D"true" =
href=3D"http://tools.ietf.org/html/draft-ietf-oauth-dyn-reg-05" =
target=3D"_blank"> <span =
style=3D"color:windowtext;text-decoration:none">http://tools.ietf.org/html=
/draft-ietf-oauth-dyn-reg-05</span></a></p><p>____________________________=
___________________</p><p>OAuth mailing list</p><p><a =
moz-do-not-send=3D"true" href=3D"mailto:OAuth@ietf.org" =
target=3D"_blank"><span =
style=3D"color:windowtext;text-decoration:none">OAuth@ietf.org</span></a><=
/p><p><a moz-do-not-send=3D"true" =
href=3D"https://www.ietf.org/mailman/listinfo/oauth" =
target=3D"_blank"><span =
style=3D"color:windowtext;text-decoration:none">https://www.ietf.org/mailm=
an/listinfo/oauth</span></a></p>
                                </div>
                              </blockquote>
                              <br>
                            </div>
_______________________________________________<br>
                            OAuth mailing list<br>
                            <a moz-do-not-send=3D"true" =
href=3D"mailto:OAuth@ietf.org" target=3D"_blank">OAuth@ietf.org</a><br>
                            <a moz-do-not-send=3D"true" =
href=3D"https://www.ietf.org/mailman/listinfo/oauth" =
target=3D"_blank">https://www.ietf.org/mailman/listinfo/oauth</a><br>
                          </blockquote>
                        </div>
                        <br>
                      </div>
                    </div>
                  </div>
                </div>
                <br>
                _______________________________________________<br>
                OAuth mailing list<br>
                <a moz-do-not-send=3D"true" =
href=3D"mailto:OAuth@ietf.org">OAuth@ietf.org</a><br>
                <a moz-do-not-send=3D"true" =
href=3D"https://www.ietf.org/mailman/listinfo/oauth" =
target=3D"_blank">https://www.ietf.org/mailman/listinfo/oauth</a><br>
                <br>
              </blockquote>
            </div>
            <br>
          </blockquote>
        </div>
        <br>
      </div>
    </blockquote>
    <br>
  </div>

</blockquote></div><br></div></body></html>=

--Apple-Mail=_5A8A8034-ECD6-424D-B487-6E68310DC5B2--

From bcampbell@pingidentity.com  Tue Feb 12 12:15:05 2013
Return-Path: <bcampbell@pingidentity.com>
X-Original-To: oauth@ietfa.amsl.com
Delivered-To: oauth@ietfa.amsl.com
Received: from localhost (localhost [127.0.0.1]) by ietfa.amsl.com (Postfix) with ESMTP id D6ECC21F86DA for <oauth@ietfa.amsl.com>; Tue, 12 Feb 2013 12:15:05 -0800 (PST)
X-Virus-Scanned: amavisd-new at amsl.com
X-Spam-Flag: NO
X-Spam-Score: -5.986
X-Spam-Level: 
X-Spam-Status: No, score=-5.986 tagged_above=-999 required=5 tests=[AWL=-0.010, BAYES_00=-2.599, FM_FORGED_GMAIL=0.622, HTML_MESSAGE=0.001, RCVD_IN_DNSWL_MED=-4]
Received: from mail.ietf.org ([12.22.58.30]) by localhost (ietfa.amsl.com [127.0.0.1]) (amavisd-new, port 10024) with ESMTP id 1Y7bLrQ5x0CU for <oauth@ietfa.amsl.com>; Tue, 12 Feb 2013 12:15:04 -0800 (PST)
Received: from na3sys009aog106.obsmtp.com (na3sys009aob106.obsmtp.com [74.125.149.76]) by ietfa.amsl.com (Postfix) with ESMTP id 5568921F86F2 for <oauth@ietf.org>; Tue, 12 Feb 2013 12:14:45 -0800 (PST)
Received: from mail-ie0-f198.google.com ([209.85.223.198]) (using TLSv1) by na3sys009aob106.postini.com ([74.125.148.12]) with SMTP ID DSNKURqitbJ/mw3/GXyVwmXhPAv/KH/TUxXL@postini.com; Tue, 12 Feb 2013 12:14:45 PST
Received: by mail-ie0-f198.google.com with SMTP id 17so2169677iea.5 for <oauth@ietf.org>; Tue, 12 Feb 2013 12:14:44 -0800 (PST)
X-Google-DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=google.com; s=20120113; h=x-received:x-received:mime-version:in-reply-to:references:from:date :message-id:subject:to:cc:content-type:x-gm-message-state; bh=F0692LZSvlS/8FSHDtZBxqv76VTB65rg9NqGxLnvhhw=; b=bq+5p+wizP96D1P9cO598JGM8RD+/mB9lXeKHSpKKW7rb0PujJkUhoZoc+6dNg3+0K oERWLOWu0on2vXBVrsmcZ91rLhuiwXbRdKjvj8DC7eb8ROuTLjpaLQ7NnkSuqUoWCw9N pebkf2EaARhNnvDA6C7pkkJhXK+DbzHgyy6UF4PohihorNKik0a+r4rgieViibsSmgVO Kj7G1wywEGhW8bO8UdCbUkwK83/qrcptlzpaZkM+JdzVJQ3ZysxkOxMUnwhcMnC07whK Q+OsenpYzKlPj69Suk6LJ8FLoVuHecJzom23jMjAhU1RW0+SDRaXdIxYVaPSw/v43IsP IMrQ==
X-Received: by 10.50.169.106 with SMTP id ad10mr5931044igc.88.1360699780553; Tue, 12 Feb 2013 12:09:40 -0800 (PST)
X-Received: by 10.50.169.106 with SMTP id ad10mr5931011igc.88.1360699780376; Tue, 12 Feb 2013 12:09:40 -0800 (PST)
MIME-Version: 1.0
Received: by 10.64.139.8 with HTTP; Tue, 12 Feb 2013 12:09:10 -0800 (PST)
In-Reply-To: <511A9F1C.1010504@mitre.org>
References: <51195F3B.1010701@mitre.org> <4E1F6AAD24975D4BA5B168042967394367443A16@TK5EX14MBXC285.redmond.corp.microsoft.com> <511A98DE.4030507@mitre.org> <9309CDB3-8AEE-428D-A7F0-5DAC45EFD44C@ve7jtb.com> <CA+ZpN27U5MB0sbEw=RdVe_YiESUnkjsAmBJezSVg2FafEi8OJQ@mail.gmail.com> <040A3633-A51F-4B17-8019-5DEEC349F39C@ve7jtb.com> <511A9F1C.1010504@mitre.org>
From: Brian Campbell <bcampbell@pingidentity.com>
Date: Tue, 12 Feb 2013 13:09:10 -0700
Message-ID: <CA+k3eCQSu_2x5xf_6yvPRBnY1HGZGTxD=sZhAgPe2LSugyw1ZQ@mail.gmail.com>
To: Justin Richer <jricher@mitre.org>
Content-Type: multipart/alternative; boundary=e89a8f2346bb0e27d904d58c9b66
X-Gm-Message-State: ALoCoQnC5Gjif5iJLzaasYacDke7yT1Y8P14LvSAhHnZDodtViwmO3zqhhQBVAdoxwNnB2vkPT4zc6B9aLQRPDQHOLvUNwf3Ki0fYK6ydJxpqU8wnP1yhSqsnA81gwQGUrIe7yfjutod
Cc: "oauth@ietf.org" <oauth@ietf.org>
Subject: Re: [OAUTH-WG] Registration: JSON Encoded Input
X-BeenThere: oauth@ietf.org
X-Mailman-Version: 2.1.12
Precedence: list
List-Id: OAUTH WG <oauth.ietf.org>
List-Unsubscribe: <https://www.ietf.org/mailman/options/oauth>, <mailto:oauth-request@ietf.org?subject=unsubscribe>
List-Archive: <http://www.ietf.org/mail-archive/web/oauth>
List-Post: <mailto:oauth@ietf.org>
List-Help: <mailto:oauth-request@ietf.org?subject=help>
List-Subscribe: <https://www.ietf.org/mailman/listinfo/oauth>, <mailto:oauth-request@ietf.org?subject=subscribe>
X-List-Received-Date: Tue, 12 Feb 2013 20:15:06 -0000

--e89a8f2346bb0e27d904d58c9b66
Content-Type: text/plain; charset=windows-1252
Content-Transfer-Encoding: quoted-printable

+1 to what Pat and Justin said.




On Tue, Feb 12, 2013 at 12:59 PM, Justin Richer <jricher@mitre.org> wrote:

>  If that's the question, then my proposal is the Content-type is
> "application/json" and the HTTP Entity Body is the JSON document. No form
> posts or parameter names to be had here.
>
>  -- Justin
>
>
> On 02/12/2013 02:58 PM, John Bradley wrote:
>
> Some people apparently encode the JSON as the key in a form POST,  some
> people do a form POST with a special key and the JSON as the value.
>
>  There appear to be a number of theories in the wild.   I am not an
> expert I just looked up code examples from several sources stack overflow
> and the like.
>
>  We probably need to get input from developers who have experience
> working with different frameworks.   I think the differences have to do
> with decoding it at the receiver.
>
>  We originally had registration posting JSON but we changed form encoding
> as that worked in all environments.   We just need to be sure we are not
> creating problems for people with the change back.
>
>
>  John B.
>
>  On 2013-02-12, at 4:48 PM, Tim Bray <twbray@google.com> wrote:
>
>
>
> On Tue, Feb 12, 2013 at 11:44 AM, John Bradley <ve7jtb@ve7jtb.com> wrote:
>
>> Nat and I hashed out the pro's and cons of JSON requests.
>>
>>  If we POST or PUT a JSON object we need to be specific as there rare
>> several ways to do it that may work better or worse depending on the
>> receiver.
>> This needs to be looked over and one picked.
>>
>
>  Hm?  Not following on =93several ways=94, I=92d have thought that POSTin=
g JSON
> is just POSTing JSON, must be missing something. -T
>
>
>>
>>  In the other thread about the server returning the update URI and being
>> able to encode the client in that if it needs to takes care of Servers t=
hat
>> need that info in query parameters or the path to do the routing.
>>
>>  The use of structure can be used to enhance readability and parsing of
>> the input, and output.
>>
>>  However we need to temper our urge to apply structure to everything.
>>
>>  IT needs to be applied carefully otherwise we start looking like
>> crazies.
>>
>>  If we do it cautiously I am in favour of JSON as input.
>>
>>  John B.
>>
>>  On 2013-02-12, at 4:32 PM, Justin Richer <jricher@mitre.org> wrote:
>>
>>  Thanks for forwarding that, Mike. I'll paste in my response to Nat's
>> concern here as well:
>>
>> It's an increasingly well known pattern that has reasonable support on
>> the server side. For PHP, I was able to find the above example via the t=
op
>> hit on Stack Overflow. In Ruby, it's a matter of something like:
>>
>> JSON.parse(request.body.read)
>>
>> depending on the web app framework. On Java/Spring, it's a matter of
>> injecting the entity body as a string and handing it to a parser (Gson i=
n
>> this case):
>>
>> public String doApi(@RequestBody String jsonString) { JsonObject json =
=3D
>> new JsonParser().parse(jsonString).getAsJsonObject();
>>
>> It's a similar read/parse setup in Node.js as well.
>>
>> It's true that in all of these cases you don't get to make use of the
>> routing or data binding facilities (though in Spring you can do that for
>> simpler domain objects using a ModelBinding), so you don't get niceities
>> like the $_POST array in PHP handed to you. This is why I don't think it=
's
>> a good idea at all to switch functionality based on the contents of the
>> JSON object. It should be a domain object only, which is what it would b=
e
>> in this case.
>>
>> I think that the positives of using JSON from the client's perspective
>> and the overall protocol design far outweigh the slightly increased
>> implementation cost at the server.
>>
>>
>>
>>  -- Justin
>>
>> On 02/12/2013 02:11 PM, Mike Jones wrote:
>>
>>  FYI, this issue is also being discussed as an OpenID Connect issue at
>> https://bitbucket.org/openid/connect/issue/747.  I think that Nat's
>> recent comment there bears repeating on this list:
>>
>>
>>
>> Nat Sakimura:
>>
>>
>>
>> Not so sure. For example, PHP cannot get the JSON object form
>> application/json POST in $_POST.
>>
>>
>>
>> It is OK to have a parameter like "request" that holds JSON. Then, you
>> can get to it from $_POST['request']. However, if you POST the JSON as t=
he
>> POST body, then you would have to call a low level function in the form =
of:
>>
>>
>>
>>
>>
>> ```
>>
>> #!php
>>
>>
>>
>> $file =3D file_get_contents('php://input'); $x =3D json_decode($file); `=
``
>>
>>
>>
>> Not that it is harder, but it is much less known. Many PHP programmers
>> will certainly goes "???".
>>
>>
>>
>> We need to check what would be the cases for other scripting languages
>> before making the final decision.
>>
>>
>>
>>                                                             -- Mike
>>
>>
>>
>> -----Original Message-----
>> From: oauth-bounces@ietf.org [mailto:oauth-bounces@ietf.org<oauth-bounce=
s@ietf.org>]
>> On Behalf Of Justin Richer
>> Sent: Monday, February 11, 2013 1:15 PM
>> To: oauth@ietf.org
>> Subject: [OAUTH-WG] Registration: JSON Encoded Input
>>
>>
>>
>> Draft -05 of OAuth Dynamic Client Registration [1] switched from a
>> form-encoded input that had been used by drafts -01 through -04 to a JSO=
N
>> encoded input that was used originally in -00. Note that all versions ke=
ep
>> JSON-encoded output from all operations.
>>
>>
>>
>> Pro:
>>
>>   - JSON gives us a rich data structure so that things such as lists,
>> numbers, nulls, and objects can be represented natively
>>
>>   - Allows for parallelism between the input to the endpoint and output
>> from the endpoint, reducing possible translation errors between the two
>>
>>   - JSON specifies UTF8 encoding for all strings, forms may have many
>> different encodings
>>
>>   - JSON has minimal character escaping required for most strings, forms
>> require escaping for common characters such as space, slash, comma, etc.
>>
>>
>>
>> Con:
>>
>>   - the rest of OAuth is form-in/JSON-out
>>
>>   - nothing else in OAuth requires the Client to create a JSON object,
>> merely to parse one
>>
>>   - form-in/JSON-out is a very widely established pattern on the web tod=
ay
>>
>>   - Client information (client_name, client_id, etc.) is conflated with
>> access information (registration_access_token, _links, expires_at, etc.)=
 in
>> root level of the same JSON object, leaving the client to decide what ne=
eds
>> to (can?) be sent back to the server for update operations.
>>
>>
>>
>>
>>
>> Alternatives include any number of data encoding schemes, including form
>> (like the old drafts), XML, ASN.1, etc.
>>
>>
>>
>>
>>
>>   -- Justin
>>
>>
>>
>> [1] http://tools.ietf.org/html/draft-ietf-oauth-dyn-reg-05
>>
>> _______________________________________________
>>
>> OAuth mailing list
>>
>> OAuth@ietf.org
>>
>> https://www.ietf.org/mailman/listinfo/oauth
>>
>>
>>  _______________________________________________
>> OAuth mailing list
>> OAuth@ietf.org
>> https://www.ietf.org/mailman/listinfo/oauth
>>
>>
>>
>> _______________________________________________
>> OAuth mailing list
>> OAuth@ietf.org
>> https://www.ietf.org/mailman/listinfo/oauth
>>
>>
>
>
>
> _______________________________________________
> OAuth mailing list
> OAuth@ietf.org
> https://www.ietf.org/mailman/listinfo/oauth
>
>

--e89a8f2346bb0e27d904d58c9b66
Content-Type: text/html; charset=windows-1252
Content-Transfer-Encoding: quoted-printable

<div dir=3D"ltr"><div>+1 to what Pat and Justin said.=A0 <br><br></div><br>=
</div><div class=3D"gmail_extra"><br><br><div class=3D"gmail_quote">On Tue,=
 Feb 12, 2013 at 12:59 PM, Justin Richer <span dir=3D"ltr">&lt;<a href=3D"m=
ailto:jricher@mitre.org" target=3D"_blank">jricher@mitre.org</a>&gt;</span>=
 wrote:<br>

<blockquote class=3D"gmail_quote" style=3D"margin:0 0 0 .8ex;border-left:1p=
x #ccc solid;padding-left:1ex">
 =20
   =20
 =20
  <div bgcolor=3D"#FFFFFF" text=3D"#000000">
    If that&#39;s the question, then my proposal is the Content-type is
    &quot;application/json&quot; and the HTTP Entity Body is the JSON docum=
ent. No
    form posts or parameter names to be had here.<span class=3D"HOEnZb"><fo=
nt color=3D"#888888"><br>
    <br>
    =A0-- Justin</font></span><div><div class=3D"h5"><br>
    <br>
    <div>On 02/12/2013 02:58 PM, John Bradley
      wrote:<br>
    </div>
    <blockquote type=3D"cite">
     =20
      Some people apparently encode the JSON as the key in a form POST,
      =A0some people do a form POST with a special key and the JSON as the
      value.=A0
      <div><br>
      </div>
      <div>There appear to be a number of theories in the wild. =A0 I am
        not an expert I just looked up code examples from several
        sources stack overflow and the like.</div>
      <div><br>
      </div>
      <div>We probably need to get input from developers who have
        experience working with different frameworks. =A0 I think the
        differences have to do with decoding it at the receiver.</div>
      <div><br>
      </div>
      <div>We originally had registration posting JSON but we changed
        form encoding as that worked in all environments. =A0 We just need
        to be sure we are not creating problems for people with the
        change back.</div>
      <div><br>
      </div>
      <div><br>
      </div>
      <div>John B.</div>
      <div><br>
        <div>
          <div>On 2013-02-12, at 4:48 PM, Tim Bray &lt;<a href=3D"mailto:tw=
bray@google.com" target=3D"_blank">twbray@google.com</a>&gt;
            wrote:</div>
          <br>
          <blockquote type=3D"cite"><br>
            <br>
            <div class=3D"gmail_quote">On Tue, Feb 12, 2013 at 11:44 AM,
              John Bradley <span dir=3D"ltr">&lt;<a href=3D"mailto:ve7jtb@v=
e7jtb.com" target=3D"_blank">ve7jtb@ve7jtb.com</a>&gt;</span>
              wrote:<br>
              <blockquote class=3D"gmail_quote" style=3D"margin:0 0 0 .8ex;=
border-left:1px #ccc solid;padding-left:1ex">
                <div style=3D"word-wrap:break-word">Nat and I hashed out
                  the pro&#39;s and cons of JSON requests. =A0
                  <div><br>
                  </div>
                  <div>If we POST or PUT a JSON object we need to be
                    specific as there rare several ways to do it that
                    may work better or worse depending on the receiver.</di=
v>
                  <div>This needs to be looked over and one picked.</div>
                </div>
              </blockquote>
              <div><br>
              </div>
              <div>Hm? =A0Not following on =93several ways=94, I=92d have
                thought that POSTing JSON is just POSTing JSON, must be
                missing something. -T</div>
              <div>=A0</div>
              <blockquote class=3D"gmail_quote" style=3D"margin:0 0 0 .8ex;=
border-left:1px #ccc solid;padding-left:1ex">
                <div style=3D"word-wrap:break-word">
                  <div><br>
                  </div>
                  <div>In the other thread about the server returning
                    the update URI and being able to encode the client
                    in that if it needs to takes care of Servers that
                    need that info in query parameters or the path to do
                    the routing.</div>
                  <div><br>
                  </div>
                  <div>The use of structure can be used to enhance
                    readability and parsing of the input, and output.</div>
                  <div><br>
                  </div>
                  <div>However we need to temper our urge to apply
                    structure to everything. =A0</div>
                  <div>
                    <br>
                  </div>
                  <div>IT needs to be applied carefully otherwise we
                    start looking like crazies.</div>
                  <div><br>
                  </div>
                  <div>If we do it cautiously I am in favour of JSON as
                    input.</div>
                  <div><br>
                  </div>
                  <div>John B.</div>
                  <div>
                    <div>
                      <div><br>
                        <div>
                          <div>On 2013-02-12, at 4:32 PM, Justin Richer
                            &lt;<a href=3D"mailto:jricher@mitre.org" target=
=3D"_blank">jricher@mitre.org</a>&gt;
                            wrote:</div>
                          <br>
                          <blockquote type=3D"cite">
                            <div bgcolor=3D"#FFFFFF" text=3D"#000000">
                              Thanks for forwarding that, Mike. I&#39;ll
                              paste in my response to Nat&#39;s concern her=
e
                              as well:<br>
                              <blockquote>It&#39;s an increasingly well
                                known pattern that has reasonable
                                support on the server side. For PHP, I
                                was able to find the above example via
                                the top hit on Stack Overflow. In Ruby,
                                it&#39;s a matter of something like:<br>
                                <br>
                                JSON.parse(request.body.read)<br>
                                <br>
                                depending on the web app framework. On
                                Java/Spring, it&#39;s a matter of injecting
                                the entity body as a string and handing
                                it to a parser (Gson in this case):<br>
                                <br>
                                public String doApi(@RequestBody String
                                jsonString) { JsonObject json =3D new
                                JsonParser().parse(jsonString).getAsJsonObj=
ect();<br>
                                <br>
                                It&#39;s a similar read/parse setup in
                                Node.js as well.<br>
                                <br>
                                It&#39;s true that in all of these cases yo=
u
                                don&#39;t get to make use of the routing or
                                data binding facilities (though in
                                Spring you can do that for simpler
                                domain objects using a ModelBinding), so
                                you don&#39;t get niceities like the $_POST
                                array in PHP handed to you. This is why
                                I don&#39;t think it&#39;s a good idea at a=
ll to
                                switch functionality based on the
                                contents of the JSON object. It should
                                be a domain object only, which is what
                                it would be in this case.<br>
                                <br>
                                I think that the positives of using JSON
                                from the client&#39;s perspective and the
                                overall protocol design far outweigh the
                                slightly increased implementation cost
                                at the server.<br>
                              </blockquote>
                              <br>
                              <br>
                              =A0-- Justin<br>
                              <br>
                              <div>On 02/12/2013 02:11 PM, Mike Jones
                                wrote:<br>
                              </div>
                              <blockquote type=3D"cite">
                                <div>
                                  <p>FYI, this issue is also being
                                    discussed as an OpenID Connect issue
                                    at <a href=3D"https://bitbucket.org/ope=
nid/connect/issue/747" target=3D"_blank">https://bitbucket.org/openid/conne=
ct/issue/747</a>.=A0

                                    I think that Nat&#39;s recent comment
                                    there bears repeating on this list:</p>
                                  <p>=A0</p>
                                  <p style=3D"margin-left:.5in">Nat
                                    Sakimura:</p>
                                  <p style=3D"margin-left:.5in">=A0</p>
                                  <p style=3D"margin-left:.5in">Not so
                                    sure. For example, PHP cannot get
                                    the JSON object form
                                    application/json POST in $_POST. </p>
                                  <p style=3D"margin-left:.5in">=A0</p>
                                  <p style=3D"margin-left:.5in">It is OK
                                    to have a parameter like &quot;request&=
quot;
                                    that holds JSON. Then, you can get
                                    to it from $_POST[&#39;request&#39;].
                                    However, if you POST the JSON as the
                                    POST body, then you would have to
                                    call a low level function in the
                                    form of: </p>
                                  <p style=3D"margin-left:.5in">=A0</p>
                                  <p style=3D"margin-left:.5in">=A0</p>
                                  <p style=3D"margin-left:.5in">```</p>
                                  <p style=3D"margin-left:.5in">
                                    #!php</p>
                                  <p style=3D"margin-left:.5in">=A0</p>
                                  <p style=3D"margin-left:.5in">$file =3D
                                    file_get_contents(&#39;<a>php://input&#=
39;</a>);
                                    $x =3D json_decode($file); ```</p>
                                  <p style=3D"margin-left:.5in">=A0</p>
                                  <p style=3D"margin-left:.5in">Not that
                                    it is harder, but it is much less
                                    known. Many PHP programmers will
                                    certainly goes &quot;???&quot;. </p>
                                  <p style=3D"margin-left:.5in">=A0</p>
                                  <p style=3D"margin-left:.5in">We need to
                                    check what would be the cases for
                                    other scripting languages before
                                    making the final decision.</p>
                                  <p>=A0</p>
                                  <p>=A0=A0=A0=A0=A0=A0=A0=A0=A0=A0=A0=A0=
=A0=A0=A0=A0=A0=A0=A0=A0=A0=A0=A0=A0=A0=A0=A0=A0=A0=A0=A0=A0=A0=A0=A0=A0=A0=
=A0=A0=A0=A0=A0=A0=A0=A0=A0=A0=A0=A0=A0=A0=A0=A0=A0=A0=A0=A0=A0=A0

                                    -- Mike</p>
                                  <p>=A0</p>
                                  <p>-----Original Message-----<br>
                                    From: <a href=3D"mailto:oauth-bounces@i=
etf.org" target=3D"_blank">oauth-bounces@ietf.org</a>
                                    [<a href=3D"mailto:oauth-bounces@ietf.o=
rg" target=3D"_blank">mailto:oauth-bounces@ietf.org</a>]
                                    On Behalf Of Justin Richer<br>
                                    Sent: Monday, February 11, 2013 1:15
                                    PM<br>
                                    To: <a href=3D"mailto:oauth@ietf.org" t=
arget=3D"_blank">oauth@ietf.org</a><br>
                                    Subject: [OAUTH-WG] Registration:
                                    JSON Encoded Input</p>
                                  <p>=A0</p>
                                  <p>Draft -05 of OAuth Dynamic Client
                                    Registration [1] switched from a
                                    form-encoded input that had been
                                    used by drafts -01 through -04 to a
                                    JSON encoded input that was used
                                    originally in -00. Note that all
                                    versions keep JSON-encoded output
                                    from all operations.</p>
                                  <p>=A0</p>
                                  <p>Pro:</p>
                                  <p>=A0 - JSON gives us a rich data
                                    structure so that things such as
                                    lists, numbers, nulls, and objects
                                    can be represented natively</p>
                                  <p>=A0 - Allows for parallelism between
                                    the input to the endpoint and output
                                    from the endpoint, reducing possible
                                    translation errors between the two</p>
                                  <p>=A0 - JSON specifies UTF8 encoding
                                    for all strings, forms may have many
                                    different encodings</p>
                                  <p>=A0 - JSON has minimal character
                                    escaping required for most strings,
                                    forms require escaping for common
                                    characters such as space, slash,
                                    comma, etc.</p>
                                  <p>=A0</p>
                                  <p>Con:</p>
                                  <p>=A0 - the rest of OAuth is
                                    form-in/JSON-out</p>
                                  <p>=A0 - nothing else in OAuth requires
                                    the Client to create a JSON object,
                                    merely to parse one</p>
                                  <p>=A0 - form-in/JSON-out is a very
                                    widely established pattern on the
                                    web today</p>
                                  <p>=A0 - Client information
                                    (client_name, client_id, etc.) is
                                    conflated with access information
                                    (registration_access_token, _links,
                                    expires_at, etc.) in root level of
                                    the same JSON object, leaving the
                                    client to decide what needs to
                                    (can?) be sent back to the server
                                    for update operations.</p>
                                  <p>=A0</p>
                                  <p>=A0</p>
                                  <p>Alternatives include any number of
                                    data encoding schemes, including
                                    form (like the old drafts), XML,
                                    ASN.1, etc.</p>
                                  <p>=A0</p>
                                  <p>=A0</p>
                                  <p>=A0 -- Justin</p>
                                  <p>=A0</p>
                                  <p>[1] <a href=3D"http://tools.ietf.org/h=
tml/draft-ietf-oauth-dyn-reg-05" target=3D"_blank"> <span style=3D"color:wi=
ndowtext;text-decoration:none">http://tools.ietf.org/html/draft-ietf-oauth-=
dyn-reg-05</span></a></p>


                                  <p>______________________________________=
_________</p>
                                  <p>OAuth mailing list</p>
                                  <p><a href=3D"mailto:OAuth@ietf.org" targ=
et=3D"_blank"><span style=3D"color:windowtext;text-decoration:none">OAuth@i=
etf.org</span></a></p>
                                  <p><a href=3D"https://www.ietf.org/mailma=
n/listinfo/oauth" target=3D"_blank"><span style=3D"color:windowtext;text-de=
coration:none">https://www.ietf.org/mailman/listinfo/oauth</span></a></p>
                                </div>
                              </blockquote>
                              <br>
                            </div>
_______________________________________________<br>
                            OAuth mailing list<br>
                            <a href=3D"mailto:OAuth@ietf.org" target=3D"_bl=
ank">OAuth@ietf.org</a><br>
                            <a href=3D"https://www.ietf.org/mailman/listinf=
o/oauth" target=3D"_blank">https://www.ietf.org/mailman/listinfo/oauth</a><=
br>
                          </blockquote>
                        </div>
                        <br>
                      </div>
                    </div>
                  </div>
                </div>
                <br>
                _______________________________________________<br>
                OAuth mailing list<br>
                <a href=3D"mailto:OAuth@ietf.org" target=3D"_blank">OAuth@i=
etf.org</a><br>
                <a href=3D"https://www.ietf.org/mailman/listinfo/oauth" tar=
get=3D"_blank">https://www.ietf.org/mailman/listinfo/oauth</a><br>
                <br>
              </blockquote>
            </div>
            <br>
          </blockquote>
        </div>
        <br>
      </div>
    </blockquote>
    <br>
  </div></div></div>

<br>_______________________________________________<br>
OAuth mailing list<br>
<a href=3D"mailto:OAuth@ietf.org">OAuth@ietf.org</a><br>
<a href=3D"https://www.ietf.org/mailman/listinfo/oauth" target=3D"_blank">h=
ttps://www.ietf.org/mailman/listinfo/oauth</a><br>
<br></blockquote></div><br></div>

--e89a8f2346bb0e27d904d58c9b66--

From jricher@mitre.org  Tue Feb 12 12:17:35 2013
Return-Path: <jricher@mitre.org>
X-Original-To: oauth@ietfa.amsl.com
Delivered-To: oauth@ietfa.amsl.com
Received: from localhost (localhost [127.0.0.1]) by ietfa.amsl.com (Postfix) with ESMTP id A903C21F8AED for <oauth@ietfa.amsl.com>; Tue, 12 Feb 2013 12:17:35 -0800 (PST)
X-Virus-Scanned: amavisd-new at amsl.com
X-Spam-Flag: NO
X-Spam-Score: -6.565
X-Spam-Level: 
X-Spam-Status: No, score=-6.565 tagged_above=-999 required=5 tests=[AWL=0.033,  BAYES_00=-2.599, HTML_MESSAGE=0.001, RCVD_IN_DNSWL_MED=-4]
Received: from mail.ietf.org ([12.22.58.30]) by localhost (ietfa.amsl.com [127.0.0.1]) (amavisd-new, port 10024) with ESMTP id iJCCljJxU0bn for <oauth@ietfa.amsl.com>; Tue, 12 Feb 2013 12:17:34 -0800 (PST)
Received: from smtpksrv1.mitre.org (smtpksrv1.mitre.org [198.49.146.77]) by ietfa.amsl.com (Postfix) with ESMTP id 9004F21F8AC1 for <oauth@ietf.org>; Tue, 12 Feb 2013 12:17:33 -0800 (PST)
Received: from smtpksrv1.mitre.org (localhost.localdomain [127.0.0.1]) by localhost (Postfix) with SMTP id 1EDD05313053; Tue, 12 Feb 2013 15:17:33 -0500 (EST)
Received: from IMCCAS01.MITRE.ORG (imccas01.mitre.org [129.83.29.78]) by smtpksrv1.mitre.org (Postfix) with ESMTP id 007725313061; Tue, 12 Feb 2013 15:17:32 -0500 (EST)
Received: from [10.146.15.29] (129.83.31.58) by IMCCAS01.MITRE.ORG (129.83.29.78) with Microsoft SMTP Server (TLS) id 14.2.318.4; Tue, 12 Feb 2013 15:17:32 -0500
Message-ID: <511AA331.2060207@mitre.org>
Date: Tue, 12 Feb 2013 15:16:49 -0500
From: Justin Richer <jricher@mitre.org>
User-Agent: Mozilla/5.0 (X11; Linux i686; rv:17.0) Gecko/20130106 Thunderbird/17.0.2
MIME-Version: 1.0
To: John Bradley <ve7jtb@ve7jtb.com>
References: <51195F3B.1010701@mitre.org> <4E1F6AAD24975D4BA5B168042967394367443A16@TK5EX14MBXC285.redmond.corp.microsoft.com> <511A98DE.4030507@mitre.org> <9309CDB3-8AEE-428D-A7F0-5DAC45EFD44C@ve7jtb.com> <CA+ZpN27U5MB0sbEw=RdVe_YiESUnkjsAmBJezSVg2FafEi8OJQ@mail.gmail.com> <040A3633-A51F-4B17-8019-5DEEC349F39C@ve7jtb.com> <511A9F1C.1010504@mitre.org> <025E3AC8-7F84-410A-A4FF-5FBBD305EA83@ve7jtb.com>
In-Reply-To: <025E3AC8-7F84-410A-A4FF-5FBBD305EA83@ve7jtb.com>
Content-Type: multipart/alternative; boundary="------------060702060607070906070901"
X-Originating-IP: [129.83.31.58]
Cc: "oauth@ietf.org" <oauth@ietf.org>
Subject: Re: [OAUTH-WG] Registration: JSON Encoded Input
X-BeenThere: oauth@ietf.org
X-Mailman-Version: 2.1.12
Precedence: list
List-Id: OAUTH WG <oauth.ietf.org>
List-Unsubscribe: <https://www.ietf.org/mailman/options/oauth>, <mailto:oauth-request@ietf.org?subject=unsubscribe>
List-Archive: <http://www.ietf.org/mail-archive/web/oauth>
List-Post: <mailto:oauth@ietf.org>
List-Help: <mailto:oauth-request@ietf.org?subject=help>
List-Subscribe: <https://www.ietf.org/mailman/listinfo/oauth>, <mailto:oauth-request@ietf.org?subject=subscribe>
X-List-Received-Date: Tue, 12 Feb 2013 20:17:35 -0000

--------------060702060607070906070901
Content-Type: text/plain; charset="windows-1252"; format=flowed
Content-Transfer-Encoding: 8bit

I would then request that people come up with a real example of where it 
*won't* work. I've seen workable solutions, and even some automagic 
ones, on several major platforms in which one would write a web 
server/AS: PHP, Java (Spring and raw servlets), Ruby (rails and 
sinatra), and Node.js can all do it.

I would suggest the following text (adapted from what's in -05 right 
now) to address this:

    The Client sends an HTTP POST to the Client Registration Endpoint
    with a content type of "application/json". The HTTP Entity Payload is
    a JSON document consisting of a JSON object and all parameters as top-
    level members of that JSON object.


(Would have to be tweaked for the PUT/PATCH verbs but it's effectively 
the same.)


  -- Justin

On 02/12/2013 03:07 PM, John Bradley wrote:
> I am fine with that as long as all the IdP tools have access to the 
> entity body in some reasonable way.   That seems like the most 
> sensible thing.
>
> However given the number of people talking about encoding it in a form 
> to get access to it,  we should check that it works for everyone.
>
> John B.
> On 2013-02-12, at 4:59 PM, Justin Richer <jricher@mitre.org 
> <mailto:jricher@mitre.org>> wrote:
>
>> If that's the question, then my proposal is the Content-type is 
>> "application/json" and the HTTP Entity Body is the JSON document. No 
>> form posts or parameter names to be had here.
>>
>>  -- Justin
>>
>> On 02/12/2013 02:58 PM, John Bradley wrote:
>>> Some people apparently encode the JSON as the key in a form POST, 
>>>  some people do a form POST with a special key and the JSON as the 
>>> value.
>>>
>>> There appear to be a number of theories in the wild.   I am not an 
>>> expert I just looked up code examples from several sources stack 
>>> overflow and the like.
>>>
>>> We probably need to get input from developers who have experience 
>>> working with different frameworks.   I think the differences have to 
>>> do with decoding it at the receiver.
>>>
>>> We originally had registration posting JSON but we changed form 
>>> encoding as that worked in all environments.   We just need to be 
>>> sure we are not creating problems for people with the change back.
>>>
>>>
>>> John B.
>>>
>>> On 2013-02-12, at 4:48 PM, Tim Bray <twbray@google.com 
>>> <mailto:twbray@google.com>> wrote:
>>>
>>>>
>>>>
>>>> On Tue, Feb 12, 2013 at 11:44 AM, John Bradley <ve7jtb@ve7jtb.com 
>>>> <mailto:ve7jtb@ve7jtb.com>> wrote:
>>>>
>>>>     Nat and I hashed out the pro's and cons of JSON requests.
>>>>
>>>>     If we POST or PUT a JSON object we need to be specific as there
>>>>     rare several ways to do it that may work better or worse
>>>>     depending on the receiver.
>>>>     This needs to be looked over and one picked.
>>>>
>>>>
>>>> Hm?  Not following on “several ways”, I’d have thought that POSTing 
>>>> JSON is just POSTing JSON, must be missing something. -T
>>>>
>>>>
>>>>     In the other thread about the server returning the update URI
>>>>     and being able to encode the client in that if it needs to
>>>>     takes care of Servers that need that info in query parameters
>>>>     or the path to do the routing.
>>>>
>>>>     The use of structure can be used to enhance readability and
>>>>     parsing of the input, and output.
>>>>
>>>>     However we need to temper our urge to apply structure to
>>>>     everything.
>>>>
>>>>     IT needs to be applied carefully otherwise we start looking
>>>>     like crazies.
>>>>
>>>>     If we do it cautiously I am in favour of JSON as input.
>>>>
>>>>     John B.
>>>>
>>>>     On 2013-02-12, at 4:32 PM, Justin Richer <jricher@mitre.org
>>>>     <mailto:jricher@mitre.org>> wrote:
>>>>
>>>>>     Thanks for forwarding that, Mike. I'll paste in my response to
>>>>>     Nat's concern here as well:
>>>>>
>>>>>         It's an increasingly well known pattern that has
>>>>>         reasonable support on the server side. For PHP, I was able
>>>>>         to find the above example via the top hit on Stack
>>>>>         Overflow. In Ruby, it's a matter of something like:
>>>>>
>>>>>         JSON.parse(request.body.read)
>>>>>
>>>>>         depending on the web app framework. On Java/Spring, it's a
>>>>>         matter of injecting the entity body as a string and
>>>>>         handing it to a parser (Gson in this case):
>>>>>
>>>>>         public String doApi(@RequestBody String jsonString) {
>>>>>         JsonObject json = new
>>>>>         JsonParser().parse(jsonString).getAsJsonObject();
>>>>>
>>>>>         It's a similar read/parse setup in Node.js as well.
>>>>>
>>>>>         It's true that in all of these cases you don't get to make
>>>>>         use of the routing or data binding facilities (though in
>>>>>         Spring you can do that for simpler domain objects using a
>>>>>         ModelBinding), so you don't get niceities like the $_POST
>>>>>         array in PHP handed to you. This is why I don't think it's
>>>>>         a good idea at all to switch functionality based on the
>>>>>         contents of the JSON object. It should be a domain object
>>>>>         only, which is what it would be in this case.
>>>>>
>>>>>         I think that the positives of using JSON from the client's
>>>>>         perspective and the overall protocol design far outweigh
>>>>>         the slightly increased implementation cost at the server.
>>>>>
>>>>>
>>>>>
>>>>>      -- Justin
>>>>>
>>>>>     On 02/12/2013 02:11 PM, Mike Jones wrote:
>>>>>>
>>>>>>     FYI, this issue is also being discussed as an OpenID Connect
>>>>>>     issue at https://bitbucket.org/openid/connect/issue/747. I
>>>>>>     think that Nat's recent comment there bears repeating on this
>>>>>>     list:
>>>>>>
>>>>>>
>>>>>>     Nat Sakimura:
>>>>>>
>>>>>>
>>>>>>     Not so sure. For example, PHP cannot get the JSON object form
>>>>>>     application/json POST in $_POST.
>>>>>>
>>>>>>
>>>>>>     It is OK to have a parameter like "request" that holds JSON.
>>>>>>     Then, you can get to it from $_POST['request']. However, if
>>>>>>     you POST the JSON as the POST body, then you would have to
>>>>>>     call a low level function in the form of:
>>>>>>
>>>>>>
>>>>>>
>>>>>>     ```
>>>>>>
>>>>>>     #!php
>>>>>>
>>>>>>
>>>>>>     $file = file_get_contents('php://input'); $x =
>>>>>>     json_decode($file); ```
>>>>>>
>>>>>>
>>>>>>     Not that it is harder, but it is much less known. Many PHP
>>>>>>     programmers will certainly goes "???".
>>>>>>
>>>>>>
>>>>>>     We need to check what would be the cases for other scripting
>>>>>>     languages before making the final decision.
>>>>>>
>>>>>>
>>>>>>     -- Mike
>>>>>>
>>>>>>
>>>>>>     -----Original Message-----
>>>>>>     From: oauth-bounces@ietf.org <mailto:oauth-bounces@ietf.org>
>>>>>>     [mailto:oauth-bounces@ietf.org] On Behalf Of Justin Richer
>>>>>>     Sent: Monday, February 11, 2013 1:15 PM
>>>>>>     To: oauth@ietf.org <mailto:oauth@ietf.org>
>>>>>>     Subject: [OAUTH-WG] Registration: JSON Encoded Input
>>>>>>
>>>>>>
>>>>>>     Draft -05 of OAuth Dynamic Client Registration [1] switched
>>>>>>     from a form-encoded input that had been used by drafts -01
>>>>>>     through -04 to a JSON encoded input that was used originally
>>>>>>     in -00. Note that all versions keep JSON-encoded output from
>>>>>>     all operations.
>>>>>>
>>>>>>
>>>>>>     Pro:
>>>>>>
>>>>>>       - JSON gives us a rich data structure so that things such
>>>>>>     as lists, numbers, nulls, and objects can be represented natively
>>>>>>
>>>>>>       - Allows for parallelism between the input to the endpoint
>>>>>>     and output from the endpoint, reducing possible translation
>>>>>>     errors between the two
>>>>>>
>>>>>>       - JSON specifies UTF8 encoding for all strings, forms may
>>>>>>     have many different encodings
>>>>>>
>>>>>>       - JSON has minimal character escaping required for most
>>>>>>     strings, forms require escaping for common characters such as
>>>>>>     space, slash, comma, etc.
>>>>>>
>>>>>>
>>>>>>     Con:
>>>>>>
>>>>>>       - the rest of OAuth is form-in/JSON-out
>>>>>>
>>>>>>       - nothing else in OAuth requires the Client to create a
>>>>>>     JSON object, merely to parse one
>>>>>>
>>>>>>       - form-in/JSON-out is a very widely established pattern on
>>>>>>     the web today
>>>>>>
>>>>>>       - Client information (client_name, client_id, etc.) is
>>>>>>     conflated with access information (registration_access_token,
>>>>>>     _links, expires_at, etc.) in root level of the same JSON
>>>>>>     object, leaving the client to decide what needs to (can?) be
>>>>>>     sent back to the server for update operations.
>>>>>>
>>>>>>
>>>>>>
>>>>>>     Alternatives include any number of data encoding schemes,
>>>>>>     including form (like the old drafts), XML, ASN.1, etc.
>>>>>>
>>>>>>
>>>>>>
>>>>>>       -- Justin
>>>>>>
>>>>>>
>>>>>>     [1] http://tools.ietf.org/html/draft-ietf-oauth-dyn-reg-05
>>>>>>
>>>>>>     _______________________________________________
>>>>>>
>>>>>>     OAuth mailing list
>>>>>>
>>>>>>     OAuth@ietf.org <mailto:OAuth@ietf.org>
>>>>>>
>>>>>>     https://www.ietf.org/mailman/listinfo/oauth
>>>>>>
>>>>>
>>>>>     _______________________________________________
>>>>>     OAuth mailing list
>>>>>     OAuth@ietf.org <mailto:OAuth@ietf.org>
>>>>>     https://www.ietf.org/mailman/listinfo/oauth
>>>>
>>>>
>>>>     _______________________________________________
>>>>     OAuth mailing list
>>>>     OAuth@ietf.org <mailto:OAuth@ietf.org>
>>>>     https://www.ietf.org/mailman/listinfo/oauth
>>>>
>>>>
>>>
>>
>


--------------060702060607070906070901
Content-Type: text/html; charset="windows-1252"
Content-Transfer-Encoding: 8bit

<html>
  <head>
    <meta content="text/html; charset=windows-1252"
      http-equiv="Content-Type">
  </head>
  <body bgcolor="#FFFFFF" text="#000000">
    I would then request that people come up with a real example of
    where it *won't* work. I've seen workable solutions, and even some
    automagic ones, on several major platforms in which one would write
    a web server/AS: PHP, Java (Spring and raw servlets), Ruby (rails
    and sinatra), and Node.js can all do it.<br>
    <br>
    I would suggest the following text (adapted from what's in -05 right
    now) to address this:<br>
    <br>
    <pre class="newpage">   The Client sends an HTTP POST to the Client Registration Endpoint
   with a content type of "application/json". The HTTP Entity Payload is
   a JSON document consisting of a JSON object and all parameters as top-
   level members of that JSON object.</pre>
    <br>
    (Would have to be tweaked for the PUT/PATCH verbs but it's
    effectively the same.)<br>
    <br>
    <br>
     -- Justin<br>
    <br>
    <div class="moz-cite-prefix">On 02/12/2013 03:07 PM, John Bradley
      wrote:<br>
    </div>
    <blockquote
      cite="mid:025E3AC8-7F84-410A-A4FF-5FBBD305EA83@ve7jtb.com"
      type="cite">
      <meta http-equiv="Content-Type" content="text/html;
        charset=windows-1252">
      I am fine with that as long as all the IdP tools have access to
      the entity body in some reasonable way.   That seems like the most
      sensible thing.
      <div><br>
      </div>
      <div>However given the number of people talking about encoding it
        in a form to get access to it,  we should check that it works
        for everyone.</div>
      <div><br>
      </div>
      <div>John B.<br>
        <div>
          <div>On 2013-02-12, at 4:59 PM, Justin Richer &lt;<a
              moz-do-not-send="true" href="mailto:jricher@mitre.org">jricher@mitre.org</a>&gt;
            wrote:</div>
          <br class="Apple-interchange-newline">
          <blockquote type="cite">
            <div bgcolor="#FFFFFF" text="#000000"> If that's the
              question, then my proposal is the Content-type is
              "application/json" and the HTTP Entity Body is the JSON
              document. No form posts or parameter names to be had here.<br>
              <br>
               -- Justin<br>
              <br>
              <div class="moz-cite-prefix">On 02/12/2013 02:58 PM, John
                Bradley wrote:<br>
              </div>
              <blockquote
                cite="mid:040A3633-A51F-4B17-8019-5DEEC349F39C@ve7jtb.com"
                type="cite"> Some people apparently encode the JSON as
                the key in a form POST,  some people do a form POST with
                a special key and the JSON as the value. 
                <div><br>
                </div>
                <div>There appear to be a number of theories in the
                  wild.   I am not an expert I just looked up code
                  examples from several sources stack overflow and the
                  like.</div>
                <div><br>
                </div>
                <div>We probably need to get input from developers who
                  have experience working with different frameworks.   I
                  think the differences have to do with decoding it at
                  the receiver.</div>
                <div><br>
                </div>
                <div>We originally had registration posting JSON but we
                  changed form encoding as that worked in all
                  environments.   We just need to be sure we are not
                  creating problems for people with the change back.</div>
                <div><br>
                </div>
                <div><br>
                </div>
                <div>John B.</div>
                <div><br>
                  <div>
                    <div>On 2013-02-12, at 4:48 PM, Tim Bray &lt;<a
                        moz-do-not-send="true"
                        href="mailto:twbray@google.com">twbray@google.com</a>&gt;

                      wrote:</div>
                    <br class="Apple-interchange-newline">
                    <blockquote type="cite"><br>
                      <br>
                      <div class="gmail_quote">On Tue, Feb 12, 2013 at
                        11:44 AM, John Bradley <span dir="ltr">&lt;<a
                            moz-do-not-send="true"
                            href="mailto:ve7jtb@ve7jtb.com"
                            target="_blank">ve7jtb@ve7jtb.com</a>&gt;</span>
                        wrote:<br>
                        <blockquote class="gmail_quote" style="margin:0
                          0 0 .8ex;border-left:1px #ccc
                          solid;padding-left:1ex">
                          <div style="word-wrap:break-word">Nat and I
                            hashed out the pro's and cons of JSON
                            requests.  
                            <div><br>
                            </div>
                            <div>If we POST or PUT a JSON object we need
                              to be specific as there rare several ways
                              to do it that may work better or worse
                              depending on the receiver.</div>
                            <div>This needs to be looked over and one
                              picked.</div>
                          </div>
                        </blockquote>
                        <div><br>
                        </div>
                        <div>Hm?  Not following on “several ways”, I’d
                          have thought that POSTing JSON is just POSTing
                          JSON, must be missing something. -T</div>
                        <div> </div>
                        <blockquote class="gmail_quote" style="margin:0
                          0 0 .8ex;border-left:1px #ccc
                          solid;padding-left:1ex">
                          <div style="word-wrap:break-word">
                            <div><br>
                            </div>
                            <div>In the other thread about the server
                              returning the update URI and being able to
                              encode the client in that if it needs to
                              takes care of Servers that need that info
                              in query parameters or the path to do the
                              routing.</div>
                            <div><br>
                            </div>
                            <div>The use of structure can be used to
                              enhance readability and parsing of the
                              input, and output.</div>
                            <div><br>
                            </div>
                            <div>However we need to temper our urge to
                              apply structure to everything.  </div>
                            <div> <br>
                            </div>
                            <div>IT needs to be applied carefully
                              otherwise we start looking like crazies.</div>
                            <div><br>
                            </div>
                            <div>If we do it cautiously I am in favour
                              of JSON as input.</div>
                            <div><br>
                            </div>
                            <div>John B.</div>
                            <div>
                              <div class="h5">
                                <div><br>
                                  <div>
                                    <div>On 2013-02-12, at 4:32 PM,
                                      Justin Richer &lt;<a
                                        moz-do-not-send="true"
                                        href="mailto:jricher@mitre.org"
                                        target="_blank">jricher@mitre.org</a>&gt;

                                      wrote:</div>
                                    <br>
                                    <blockquote type="cite">
                                      <div bgcolor="#FFFFFF"
                                        text="#000000"> Thanks for
                                        forwarding that, Mike. I'll
                                        paste in my response to Nat's
                                        concern here as well:<br>
                                        <blockquote>It's an increasingly
                                          well known pattern that has
                                          reasonable support on the
                                          server side. For PHP, I was
                                          able to find the above example
                                          via the top hit on Stack
                                          Overflow. In Ruby, it's a
                                          matter of something like:<br>
                                          <br>
                                          JSON.parse(request.body.read)<br>
                                          <br>
                                          depending on the web app
                                          framework. On Java/Spring,
                                          it's a matter of injecting the
                                          entity body as a string and
                                          handing it to a parser (Gson
                                          in this case):<br>
                                          <br>
                                          public String
                                          doApi(@RequestBody String
                                          jsonString) { JsonObject json
                                          = new
                                          JsonParser().parse(jsonString).getAsJsonObject();<br>
                                          <br>
                                          It's a similar read/parse
                                          setup in Node.js as well.<br>
                                          <br>
                                          It's true that in all of these
                                          cases you don't get to make
                                          use of the routing or data
                                          binding facilities (though in
                                          Spring you can do that for
                                          simpler domain objects using a
                                          ModelBinding), so you don't
                                          get niceities like the $_POST
                                          array in PHP handed to you.
                                          This is why I don't think it's
                                          a good idea at all to switch
                                          functionality based on the
                                          contents of the JSON object.
                                          It should be a domain object
                                          only, which is what it would
                                          be in this case.<br>
                                          <br>
                                          I think that the positives of
                                          using JSON from the client's
                                          perspective and the overall
                                          protocol design far outweigh
                                          the slightly increased
                                          implementation cost at the
                                          server.<br>
                                        </blockquote>
                                        <br>
                                        <br>
                                         -- Justin<br>
                                        <br>
                                        <div>On 02/12/2013 02:11 PM,
                                          Mike Jones wrote:<br>
                                        </div>
                                        <blockquote type="cite">
                                          <div>
                                            <p>FYI, this issue is also
                                              being discussed as an
                                              OpenID Connect issue at <a
                                                moz-do-not-send="true"
                                                href="https://bitbucket.org/openid/connect/issue/747"
                                                target="_blank">https://bitbucket.org/openid/connect/issue/747</a>. 


                                              I think that Nat's recent
                                              comment there bears
                                              repeating on this list:</p>
                                            <div> <br
                                                class="webkit-block-placeholder">
                                            </div>
                                            <p style="margin-left:.5in">Nat

                                              Sakimura:</p>
                                            <div style="margin-left:
                                              0.5in; "> <br
                                                class="webkit-block-placeholder">
                                            </div>
                                            <p style="margin-left:.5in">Not
                                              so sure. For example, PHP
                                              cannot get the JSON object
                                              form application/json POST
                                              in $_POST. </p>
                                            <div style="margin-left:
                                              0.5in; "> <br
                                                class="webkit-block-placeholder">
                                            </div>
                                            <p style="margin-left:.5in">It
                                              is OK to have a parameter
                                              like "request" that holds
                                              JSON. Then, you can get to
                                              it from $_POST['request'].
                                              However, if you POST the
                                              JSON as the POST body,
                                              then you would have to
                                              call a low level function
                                              in the form of: </p>
                                            <div style="margin-left:
                                              0.5in; "> <br
                                                class="webkit-block-placeholder">
                                            </div>
                                            <div style="margin-left:
                                              0.5in; "> <br
                                                class="webkit-block-placeholder">
                                            </div>
                                            <p style="margin-left:.5in">```</p>
                                            <p style="margin-left:.5in">
                                              #!php</p>
                                            <div style="margin-left:
                                              0.5in; "> <br
                                                class="webkit-block-placeholder">
                                            </div>
                                            <p style="margin-left:.5in">$file
                                              = file_get_contents('<a
                                                moz-do-not-send="true">php://input'</a>);

                                              $x = json_decode($file);
                                              ```</p>
                                            <div style="margin-left:
                                              0.5in; "> <br
                                                class="webkit-block-placeholder">
                                            </div>
                                            <p style="margin-left:.5in">Not
                                              that it is harder, but it
                                              is much less known. Many
                                              PHP programmers will
                                              certainly goes "???". </p>
                                            <div style="margin-left:
                                              0.5in; "> <br
                                                class="webkit-block-placeholder">
                                            </div>
                                            <p style="margin-left:.5in">We
                                              need to check what would
                                              be the cases for other
                                              scripting languages before
                                              making the final decision.</p>
                                            <div> <br
                                                class="webkit-block-placeholder">
                                            </div>
                                            <p>                                                           


                                              -- Mike</p>
                                            <div> <br
                                                class="webkit-block-placeholder">
                                            </div>
                                            <p>-----Original
                                              Message-----<br>
                                              From: <a
                                                moz-do-not-send="true"
                                                href="mailto:oauth-bounces@ietf.org"
                                                target="_blank">oauth-bounces@ietf.org</a>
                                              [<a moz-do-not-send="true"
href="mailto:oauth-bounces@ietf.org" target="_blank">mailto:oauth-bounces@ietf.org</a>]
                                              On Behalf Of Justin Richer<br>
                                              Sent: Monday, February 11,
                                              2013 1:15 PM<br>
                                              To: <a
                                                moz-do-not-send="true"
                                                href="mailto:oauth@ietf.org"
                                                target="_blank">oauth@ietf.org</a><br>
                                              Subject: [OAUTH-WG]
                                              Registration: JSON Encoded
                                              Input</p>
                                            <div> <br
                                                class="webkit-block-placeholder">
                                            </div>
                                            <p>Draft -05 of OAuth
                                              Dynamic Client
                                              Registration [1] switched
                                              from a form-encoded input
                                              that had been used by
                                              drafts -01 through -04 to
                                              a JSON encoded input that
                                              was used originally in
                                              -00. Note that all
                                              versions keep JSON-encoded
                                              output from all
                                              operations.</p>
                                            <div> <br
                                                class="webkit-block-placeholder">
                                            </div>
                                            <p>Pro:</p>
                                            <p>  - JSON gives us a rich
                                              data structure so that
                                              things such as lists,
                                              numbers, nulls, and
                                              objects can be represented
                                              natively</p>
                                            <p>  - Allows for
                                              parallelism between the
                                              input to the endpoint and
                                              output from the endpoint,
                                              reducing possible
                                              translation errors between
                                              the two</p>
                                            <p>  - JSON specifies UTF8
                                              encoding for all strings,
                                              forms may have many
                                              different encodings</p>
                                            <p>  - JSON has minimal
                                              character escaping
                                              required for most strings,
                                              forms require escaping for
                                              common characters such as
                                              space, slash, comma, etc.</p>
                                            <div> <br
                                                class="webkit-block-placeholder">
                                            </div>
                                            <p>Con:</p>
                                            <p>  - the rest of OAuth is
                                              form-in/JSON-out</p>
                                            <p>  - nothing else in OAuth
                                              requires the Client to
                                              create a JSON object,
                                              merely to parse one</p>
                                            <p>  - form-in/JSON-out is a
                                              very widely established
                                              pattern on the web today</p>
                                            <p>  - Client information
                                              (client_name, client_id,
                                              etc.) is conflated with
                                              access information
                                              (registration_access_token,
                                              _links, expires_at, etc.)
                                              in root level of the same
                                              JSON object, leaving the
                                              client to decide what
                                              needs to (can?) be sent
                                              back to the server for
                                              update operations.</p>
                                            <div> <br
                                                class="webkit-block-placeholder">
                                            </div>
                                            <div> <br
                                                class="webkit-block-placeholder">
                                            </div>
                                            <p>Alternatives include any
                                              number of data encoding
                                              schemes, including form
                                              (like the old drafts),
                                              XML, ASN.1, etc.</p>
                                            <div> <br
                                                class="webkit-block-placeholder">
                                            </div>
                                            <div> <br
                                                class="webkit-block-placeholder">
                                            </div>
                                            <p>  -- Justin</p>
                                            <div> <br
                                                class="webkit-block-placeholder">
                                            </div>
                                            <p>[1] <a
                                                moz-do-not-send="true"
                                                href="http://tools.ietf.org/html/draft-ietf-oauth-dyn-reg-05"
                                                target="_blank"> <span
style="color:windowtext;text-decoration:none">http://tools.ietf.org/html/draft-ietf-oauth-dyn-reg-05</span></a></p>
                                            <p>_______________________________________________</p>
                                            <p>OAuth mailing list</p>
                                            <p><a moz-do-not-send="true"
href="mailto:OAuth@ietf.org" target="_blank"><span
                                                  style="color:windowtext;text-decoration:none">OAuth@ietf.org</span></a></p>
                                            <p><a moz-do-not-send="true"
href="https://www.ietf.org/mailman/listinfo/oauth" target="_blank"><span
style="color:windowtext;text-decoration:none">https://www.ietf.org/mailman/listinfo/oauth</span></a></p>
                                          </div>
                                        </blockquote>
                                        <br>
                                      </div>
_______________________________________________<br>
                                      OAuth mailing list<br>
                                      <a moz-do-not-send="true"
                                        href="mailto:OAuth@ietf.org"
                                        target="_blank">OAuth@ietf.org</a><br>
                                      <a moz-do-not-send="true"
                                        href="https://www.ietf.org/mailman/listinfo/oauth"
                                        target="_blank">https://www.ietf.org/mailman/listinfo/oauth</a><br>
                                    </blockquote>
                                  </div>
                                  <br>
                                </div>
                              </div>
                            </div>
                          </div>
                          <br>
_______________________________________________<br>
                          OAuth mailing list<br>
                          <a moz-do-not-send="true"
                            href="mailto:OAuth@ietf.org">OAuth@ietf.org</a><br>
                          <a moz-do-not-send="true"
                            href="https://www.ietf.org/mailman/listinfo/oauth"
                            target="_blank">https://www.ietf.org/mailman/listinfo/oauth</a><br>
                          <br>
                        </blockquote>
                      </div>
                      <br>
                    </blockquote>
                  </div>
                  <br>
                </div>
              </blockquote>
              <br>
            </div>
          </blockquote>
        </div>
        <br>
      </div>
    </blockquote>
    <br>
  </body>
</html>

--------------060702060607070906070901--

From sakimura@gmail.com  Tue Feb 12 12:26:40 2013
Return-Path: <sakimura@gmail.com>
X-Original-To: oauth@ietfa.amsl.com
Delivered-To: oauth@ietfa.amsl.com
Received: from localhost (localhost [127.0.0.1]) by ietfa.amsl.com (Postfix) with ESMTP id 796C821F8B6D for <oauth@ietfa.amsl.com>; Tue, 12 Feb 2013 12:26:40 -0800 (PST)
X-Virus-Scanned: amavisd-new at amsl.com
X-Spam-Flag: NO
X-Spam-Score: -2.907
X-Spam-Level: 
X-Spam-Status: No, score=-2.907 tagged_above=-999 required=5 tests=[AWL=0.092,  BAYES_00=-2.599, J_CHICKENPOX_44=0.6, RCVD_IN_DNSWL_LOW=-1]
Received: from mail.ietf.org ([12.22.58.30]) by localhost (ietfa.amsl.com [127.0.0.1]) (amavisd-new, port 10024) with ESMTP id x6NXeZsHmd4j for <oauth@ietfa.amsl.com>; Tue, 12 Feb 2013 12:26:38 -0800 (PST)
Received: from mail-lb0-f179.google.com (mail-lb0-f179.google.com [209.85.217.179]) by ietfa.amsl.com (Postfix) with ESMTP id 1079421F8B69 for <oauth@ietf.org>; Tue, 12 Feb 2013 12:26:37 -0800 (PST)
Received: by mail-lb0-f179.google.com with SMTP id j14so419966lbo.38 for <oauth@ietf.org>; Tue, 12 Feb 2013 12:26:32 -0800 (PST)
DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=gmail.com; s=20120113; h=mime-version:x-received:in-reply-to:references:date:message-id :subject:from:to:cc:content-type; bh=Wh2DMVGkXL/0dUdTftaiB2sdu0symN/I88hJuTti02U=; b=Bhea13ggeGyI1sPSlemfW3Dfz2kITbnlaBqbAEMm4qk0g2WbbTo5MFUkYs/sfAnGQW 31I8u6HNJ8aIGjwH3I0osNzRnMH8iUVtD3N+NagwegmpBKBL23Qi9eVzoXge9RGPS++a T1TKByju2vpK4xUuXmWY9n7JJZqHTIyDemGTqThkKWle0Lo6Mk/lib6QigGXlX3fVyZM rPl6mVxQcroGKj4FJRLem2PDiK2aC2Y1Yu93106U2ZWoXmkaXM9RoHmnSWhry5/3MfYO Rqo0A8idGYXTD3HgdTi840JOv3mU1TGhtvNoOSLJfsvtQFcKbTsTDivJDgFb2SjoduJH pFWw==
MIME-Version: 1.0
X-Received: by 10.152.109.112 with SMTP id hr16mr14732034lab.38.1360700791995;  Tue, 12 Feb 2013 12:26:31 -0800 (PST)
Received: by 10.112.14.44 with HTTP; Tue, 12 Feb 2013 12:26:31 -0800 (PST)
In-Reply-To: <511AA0A7.30302@mitre.org>
References: <51195F3D.1050006@mitre.org> <222C28CB-7F6F-4BC3-8692-40404C2DC2D3@maymount.com> <511A50C7.8080102@mitre.org> <B256FD2D-5ED7-4306-A3BF-E6A196862B2E@ve7jtb.com> <511A6C49.50801@mitre.org> <CABzCy2CdxaNOvho2uyuc83qHm4WKHVfToC_n6QqAS3fqTGzU2w@mail.gmail.com> <4E1F6AAD24975D4BA5B168042967394367443A52@TK5EX14MBXC285.redmond.corp.microsoft.com> <9EDD79AA-5104-49CC-A528-C5A1A1777106@ve7jtb.com> <511A9E58.1040606@mitre.org> <715762BE-886B-4E93-8E35-6356F0A18224@ve7jtb.com> <511AA0A7.30302@mitre.org>
Date: Wed, 13 Feb 2013 05:26:31 +0900
Message-ID: <CABzCy2B1dA0dHMv1hWfBXLdqqKqJ0CD1bPcMOEQBCH6-OggZmA@mail.gmail.com>
From: Nat Sakimura <sakimura@gmail.com>
To: Justin Richer <jricher@mitre.org>
Content-Type: text/plain; charset=ISO-8859-1
Cc: "oauth@ietf.org" <oauth@ietf.org>
Subject: Re: [OAUTH-WG] Registration: HAL _links structure and client self-URL
X-BeenThere: oauth@ietf.org
X-Mailman-Version: 2.1.12
Precedence: list
List-Id: OAUTH WG <oauth.ietf.org>
List-Unsubscribe: <https://www.ietf.org/mailman/options/oauth>, <mailto:oauth-request@ietf.org?subject=unsubscribe>
List-Archive: <http://www.ietf.org/mail-archive/web/oauth>
List-Post: <mailto:oauth@ietf.org>
List-Help: <mailto:oauth-request@ietf.org?subject=help>
List-Subscribe: <https://www.ietf.org/mailman/listinfo/oauth>, <mailto:oauth-request@ietf.org?subject=subscribe>
X-List-Received-Date: Tue, 12 Feb 2013 20:26:42 -0000

Let me explain a bit more.

A trust framework may supply several ToS and Privacy Policy options
much like CC licenses.
If we want to really automate the things, you really need it.
Otherwise, the service's owner need to go read the ToS and Privacy
Policy in person and makes the dynamic registration not so dynamic.
Those option should be available through Discovery.

In Discovery, the server may provide multiple options,
out of which the client picks one. Think of something like Basic and
Premium service. In the Registration response, then, should be
the one that was picked by the client / assigned by the server.

(The notion is closely related to the implicit consent model for the
end users, which is in active discussion in bunch of places, by the way.)

Nat

2013/2/13 Justin Richer <jricher@mitre.org>:
> I agree with the previous statement that the AS's privacy/TOS would be
> better handled through discovery, since it's not likely to change per client
> instance.
>
>  -- Justin
>
>
> On 02/12/2013 03:04 PM, John Bradley wrote:
>>
>> There are two TOS and privacy policies.
>>
>> One for the AS that the client is agreeing to by registering.  Will it
>> hold up in court?  don't know Facebook is doing this.
>> The link would be a reference to a human readable file that the client
>> (RP) can have someone look over before using the connection.
>> This policy may relate to how long the client can cache info etc.
>>
>> The other is the privacy policy of the client that may be presented as a
>> click through from the Authorization server.  In general the user is not
>> explicitly accepting this, only implicitly accepting it by continuing to the
>> RP after having been given a chance to look at it if they want.
>>
>> These are very US fuse on privacy but ignoring them is probably a mistake.
>>
>> John B.
>> On 2013-02-12, at 4:56 PM, Justin Richer <jricher@mitre.org> wrote:
>>
>>> One question though: How exactly would the client, a software
>>> application, agree to the TOS? Is it supposed to fetch the content of the
>>> tos_url and do some processing on it? I wasn't under the impression that the
>>> tos_url contents were machine readable. Is it supposed to present that to
>>> the user somehow? It seems that's a better thing for the server to do at
>>> Authorization time, since it's got the user's attention.
>>>
>>> Remember, this is meant to be for *automated* registration. The developer
>>> of the Client has no say at this stage of the game.
>>>
>>> So, I think this is a bit of a red herring, to be honest.
>>>
>>> -- Justin
>>>
>>> On 02/12/2013 02:52 PM, John Bradley wrote:
>>>>
>>>> The current privacy policy and TOS URL in registration are the ones for
>>>> the Client.
>>>>
>>>> Nat and I discussed adding ones for the Authorization server that the
>>>> client agrees to as separate from ones that the user is agreeing to.
>>>>
>>>> The Authorization servers TOS would be in discovery and perhaps in the
>>>> registration response to indicate what the client is agreeing to.
>>>>
>>>> As there rare standard relationships that cover this links Nat was
>>>> speculating that they could be part of the _links object.
>>>>
>>>> That aside confirming the terms of service that the client has agreed to
>>>> in some way is probably a good thing in the registration response.
>>>>
>>>> John B.
>>>>
>>>> On 2013-02-12, at 4:25 PM, Mike Jones <Michael.Jones@microsoft.com>
>>>> wrote:
>>>>
>>>>> Part of the REST/JSON philosophy is that interfaces should be as simple
>>>>> and developer-friendly as possible.  XML was rejected by developers, in
>>>>> part, because of the self-describing nature of the structure, which required
>>>>> extra syntax that was often not useful in practice.  Trying to re-impose
>>>>> that structure using extra JSON syntax conventions is just asking developers
>>>>> to have an allergic reaction to our specs upon encountering them.  The
>>>>> syntactic complexity and *surprise factor* isn't worth the limited semantic
>>>>> benefits of using "_links".
>>>>>
>>>>> Since you bring up privacy policy and terms of service, I'll note that
>>>>> the OAuth Dynamic Registration spec already has these fields to address
>>>>> those:
>>>>>         policy_url
>>>>>         tos_url
>>>>>
>>>>> Those have been working fine for OpenID Connect too.  There's no need
>>>>> to likewise convolve them to add the extra syntax that you describe below.
>>>>>
>>>>> (BTW, in a private thread, John Bradley pointed out that what the two
>>>>> of you talked about in person was actually the possibility of adding privacy
>>>>> policy and terms of service declarations at *discovery time*, rather than
>>>>> registration time.  That's a different topic, which we should discuss
>>>>> separately, if you want to pursue that.)
>>>>>
>>>>>                                 Best wishes,
>>>>>                                 -- Mike
>>>>>
>>>>> -----Original Message-----
>>>>> From: oauth-bounces@ietf.org [mailto:oauth-bounces@ietf.org] On Behalf
>>>>> Of Nat Sakimura
>>>>> Sent: Tuesday, February 12, 2013 9:11 AM
>>>>> To: Justin Richer; oauth@ietf.org
>>>>> Subject: Re: [OAUTH-WG] Registration: HAL _links structure and client
>>>>> self-URL
>>>>>
>>>>> Actually, if it is to return it in the HTTP header, then it should also
>>>>> use the RFC5988 Web Linking format.
>>>>> Now, that is nice to have, but for many JSON programmers, I agree that
>>>>> it would be a hassle to obtain the header and store them in addition to the
>>>>> JSON. So, it is nicer to have it in JSON body.
>>>>>
>>>>> Re: Is "_links.self.href" grossly complex over
>>>>> "registration_access_url"?
>>>>>
>>>>> I do not think so. Accessing a flat top level parameter such as
>>>>> registration_access_url and _links.self.href does not make any difference
>>>>> from a client programmers point of view. That's a beauty of JSON. Both can
>>>>> be treated as a parameter name. Doing a group operation on the links makes
>>>>> difference though: the structured one is easier since you can just operate
>>>>> on _links while in case of the top level parameters, you have to have an
>>>>> explicit list of them and do the matches. (See below for the necessity for
>>>>> the grouping).
>>>>>
>>>>> I and John discussed this for at least half an hour F2F last week, both
>>>>> technically and from operation/legal point of view, for OpenID Connect
>>>>> Registration.
>>>>> Similar points could be made to OAuth dyn reg.
>>>>>
>>>>> Here is what we have discussed:
>>>>>
>>>>> When dynamically registering the client to the server, the server
>>>>> probably needs to return the following:
>>>>>
>>>>>   * terms-of-service (terms of service of the server to the client)
>>>>>   * privacy-policy (privacy policy of the server to the client)
>>>>>
>>>>> Both are defined in RFC5988/IANA Link Relations registry.
>>>>>
>>>>>
>>>>> They should be returned together with
>>>>>
>>>>>   * self.href
>>>>>
>>>>> which is also defined in RFC5988/IANA Link Relations registry.
>>>>>
>>>>> There are several ways to do it.
>>>>>
>>>>>   * Return these using RFC5988 (HTTP Header)
>>>>>   * Return these in entity body
>>>>>       * Use HAL (or OAuth-meta)/JSON Schema
>>>>>       * Use something else (e.g., a top level items)
>>>>>
>>>>> Returning it in the entity body has several advantage over HTTP header:
>>>>>
>>>>>   * They can be captured in one call;
>>>>>   * They are protocol agnostic;
>>>>>
>>>>> We determined that these advantages outweighs the disadvantage of
>>>>> creating a new standard.
>>>>>
>>>>> The question becomes then whether to:
>>>>>
>>>>>   * Use HAL (or OAuth-meta)/JSON Schema
>>>>>   * Use something else (e.g., a top level items)
>>>>>
>>>>> First, we have to consider what needs to be returned in the
>>>>> link/relationship category. If it were just _links.self.href, then grouping
>>>>> probably does not make sense. However, since we have terms-of-service and
>>>>> privacy-policy as well already, it may well make sense.
>>>>>
>>>>> Moreover, when we think of a multi-tenant authorization server that may
>>>>> want to use different OAuth authz and token endpoints for different
>>>>> tennants, it would be better to be able to return those in the registration
>>>>> response. Then, it would make sense to register OAuth authz and token
>>>>> endpoints as rel type in the IANA registry (like Bill Mills is trying to
>>>>> do) and use them in a uniform manner. Note: these per tenant endpoints
>>>>> may support different scopes etc. as well. Then, these has to be coupled
>>>>> with the URIs. That is why all of RFC5988/HAL/JSON Schema uses href instead
>>>>> of just having the URL as the value of the parameter. The semantic
>>>>> relationship would often have an associated URI, and other parameters that
>>>>> goes with it.
>>>>>
>>>>> e.g.:
>>>>>
>>>>> {
>>>>>     "_links": {
>>>>>         "terms-of-service": {
>>>>>             "href": "https: //server.example.com/tos"
>>>>>         },
>>>>>         "privacy-policy": {
>>>>>             "href": "https: //server.example.com/pp"
>>>>>         },
>>>>>         "self": {
>>>>>             "href": "https: //server.example.com/clients/1234",
>>>>>             "authorize": "Bearer"
>>>>>         },
>>>>>         "oauth_authz": {
>>>>>             "href": "https: //server.example.com/authz",
>>>>>             "scopes": "openid profile email",
>>>>>             "response_types": [
>>>>>                 "token id_token",
>>>>>                 "code id_token",
>>>>>                 "token",
>>>>>                 "code"
>>>>>             ]
>>>>>         },
>>>>>         "oauth_token": {
>>>>>             "href": "https: //server.example.com/token",
>>>>>             "authorize": "Basic"
>>>>>         }
>>>>>     }
>>>>> }
>>>>>
>>>>> In short, there are bunch of link relations that needs to be returned
>>>>> with additional parameters.
>>>>> Grouping them seems to make sense.
>>>>>
>>>>> Considering all these, John and I came to the conclusion that the HAL
>>>>> type syntax would probably make more sense.
>>>>> (Note: JSON Schema syntax does not make the parameter access as easy as
>>>>> HAL.)
>>>>>
>>>>> In fact, Mike Kelly (the author of HAL) and I have just submit a new
>>>>> version of draft-sakimura-oauth-meta
>>>>>
>>>>>    http://tools.ietf.org/html/draft-sakimura-oauth-meta-02
>>>>>
>>>>> The proposal was discussed at IETF 85 OAuth WG and the chairs asked to
>>>>> submit the draft.
>>>>> The -00 appeared in December, and this -02 has some simplification and
>>>>> the addition of the "operations" inspired by
>>>>> https://tools.ietf.org/html/draft-ietf-scim-api-00#section-3.5 .
>>>>> It is arguably a subset of HAL plus some OAuth specifics.
>>>>> I have not added Discovery response example, but adding them would
>>>>> makes even more sense, I think.
>>>>>
>>>>> Cheers,
>>>>>
>>>>> Nat
>>>>>
>>>>>
>>>>> 2013/2/13 Justin Richer <jricher@mitre.org>
>>>>>>
>>>>>> Agreed - I didn't think that header-only was the proposal, but let's
>>>>>> be explicit about the returned body always containing the URL. The way I
>>>>>> read the 201 definition, it suggests (SHOULD) that you use the location
>>>>>> header, but also says that the entity should refer to the new resource. It
>>>>>> was my assumption that the returned JSON would still have some form of
>>>>>> client-entity management URL (whether it's the HAL _links structure or
>>>>>> registration_management_url or something else is still up for debate).
>>>>>>
>>>>>> -- Justin
>>>>>>
>>>>>>
>>>>>>
>>>>>> On 02/12/2013 10:28 AM, John Bradley wrote:
>>>>>>
>>>>>> Returning a location header in the 201 ids fine as long as we also
>>>>>> have the same info as a claim.
>>>>>>
>>>>>> I think most clients will want to process the JSON and store all the
>>>>>> parameters together.  Making them fish out a header makes the W3C happy and
>>>>>> is the correct thing to do but taking it from a claim is what developers are
>>>>>> more comfortable with.
>>>>>>
>>>>>> John B.
>>>>>>
>>>>>> On 2013-02-12, at 11:25 AM, Justin Richer <jricher@mitre.org> wrote:
>>>>>>
>>>>>> I'd be fine with the return from a creation request being a 201
>>>>>> instead of a 200.
>>>>>>
>>>>>> -- Justin
>>>>>>
>>>>>> On 02/11/2013 06:33 PM, Richard Harrington wrote:
>>>>>>
>>>>>> Since the request is an HTTP POST and a resource is created
>>>>>> (http://www.w3.org/Protocols/rfc2616/rfc2616-sec9.html#sec9.5) the response
>>>>>> should be an HTTP 201 Created
>>>>>> (http://www.w3.org/Protocols/rfc2616/rfc2616-sec10.html#sec10.2.2) which is
>>>>>> supposed to include the location of the newly created resource.
>>>>>>
>>>>>> This is a good pattern to follow since, as you say, it does provide
>>>>>> flexibility.
>>>>>>
>>>>>>
>>>>>>
>>>>>> On Feb 11, 2013, at 1:14 PM, Justin Richer <jricher@mitre.org> wrote:
>>>>>>
>>>>>> Draft -05 of OAuth Dynamic Client Registration [1] returns a URL
>>>>>> pointer for the client to perform update and secret rotation actions. This
>>>>>> functionality arose from discussions on the list about moving towards a more
>>>>>> RESTful pattern, and Nat Sakimura proposed this approach in the OpenID
>>>>>> Connect Working Group. This URL may be distinct from the Client Registration
>>>>>> Endpoint URL, but draft -05 makes no promises as to its content, form, or
>>>>>> structure, though it does contain implementor's notes on possible methods.
>>>>>>
>>>>>> Two questions arise from this change:
>>>>>> - The semantics of returning the client manipulation URL
>>>>>> - The syntax (derived from HAL for JSON [2], an individual I-D
>>>>>> submission)
>>>>>>
>>>>>> On semantics:
>>>>>>
>>>>>> Pro:
>>>>>> - The server has flexibility on how to define the "update" endpoint,
>>>>>> sending all clients to one URL, sending different clients to different
>>>>>> URLs, or sending clients to a URL with a baked-in query parameter
>>>>>> - The client can take the URL as-is and use it for all management
>>>>>> operations (ie, it doesn't have to generate or compose the URL based
>>>>>> on component parts)
>>>>>>
>>>>>> Con:
>>>>>> - The client must remember one more piece of information from the
>>>>>> server at runtime if it wants to do manipulation and management of
>>>>>> itself at the server (in addition to client_id, client_secret,
>>>>>> registration_access_token, and others)
>>>>>>
>>>>>> Alternatives include specifying a URL pattern for the server to use
>>>>>> and all clients to follow, specifying a query parameter for the update
>>>>>> action, and specifying a separate endpoint entirely and using the presence
>>>>>> of items such as client_id and the registration access token to
>>>>>> differentiate the requests. Note that *all* of these alternatives can be
>>>>>> accommodated using the semantics described above, with the same actions on
>>>>>> the client's part.
>>>>>>
>>>>>>
>>>>>> On syntax:
>>>>>>
>>>>>> Pro:
>>>>>> - Follows the designs of RFC5988 for link relations
>>>>>> - The HAL format is general, and allows for all kinds of other
>>>>>> information to be placed inside the _links structure
>>>>>> - Allows for full use of the JSON object to specify advanced
>>>>>> operations on the returned endpoint if desired
>>>>>>
>>>>>> Con:
>>>>>> - The rest of OAuth doesn't follow link relation guidelines (though
>>>>>> it's been brought up)
>>>>>> - The HAL format is general, and allows for all kinds of other
>>>>>> information to be placed inside the _links structure
>>>>>> - The HAL-JSON document is an expired individual I-D, and it's unclear
>>>>>> what wider adoption looks like right now
>>>>>>
>>>>>> Alternatives include returning the URL as a separate data member
>>>>>> (registration_update_url), using HTTP headers, or using JSON Schema.
>>>>>>
>>>>>> -- Justin
>>>>>>
>>>>>>
>>>>>>
>>>>>> [1] http://tools.ietf.org/html/draft-ietf-oauth-dyn-reg-05
>>>>>> [2] http://tools.ietf.org/html/draft-kelly-json-hal-03
>>>>>> _______________________________________________
>>>>>> OAuth mailing list
>>>>>> OAuth@ietf.org
>>>>>> https://www.ietf.org/mailman/listinfo/oauth
>>>>>>
>>>>>>
>>>>>> _______________________________________________
>>>>>> OAuth mailing list
>>>>>> OAuth@ietf.org
>>>>>> https://www.ietf.org/mailman/listinfo/oauth
>>>>>>
>>>>>>
>>>>>>
>>>>>>
>>>>>> _______________________________________________
>>>>>> OAuth mailing list
>>>>>> OAuth@ietf.org
>>>>>> https://www.ietf.org/mailman/listinfo/oauth
>>>>>>
>>>>>
>>>>> --
>>>>> Nat Sakimura (=nat)
>>>>> Chairman, OpenID Foundation
>>>>> http://nat.sakimura.org/
>>>>> @_nat_en
>>>>> _______________________________________________
>>>>> OAuth mailing list
>>>>> OAuth@ietf.org
>>>>> https://www.ietf.org/mailman/listinfo/oauth
>>>>> _______________________________________________
>>>>> OAuth mailing list
>>>>> OAuth@ietf.org
>>>>> https://www.ietf.org/mailman/listinfo/oauth
>
>



-- 
Nat Sakimura (=nat)
Chairman, OpenID Foundation
http://nat.sakimura.org/
@_nat_en

From ve7jtb@ve7jtb.com  Tue Feb 12 12:35:54 2013
Return-Path: <ve7jtb@ve7jtb.com>
X-Original-To: oauth@ietfa.amsl.com
Delivered-To: oauth@ietfa.amsl.com
Received: from localhost (localhost [127.0.0.1]) by ietfa.amsl.com (Postfix) with ESMTP id 7638921F8B0E for <oauth@ietfa.amsl.com>; Tue, 12 Feb 2013 12:35:54 -0800 (PST)
X-Virus-Scanned: amavisd-new at amsl.com
X-Spam-Flag: NO
X-Spam-Score: -3.307
X-Spam-Level: 
X-Spam-Status: No, score=-3.307 tagged_above=-999 required=5 tests=[AWL=0.291,  BAYES_00=-2.599, HTML_MESSAGE=0.001, RCVD_IN_DNSWL_LOW=-1]
Received: from mail.ietf.org ([12.22.58.30]) by localhost (ietfa.amsl.com [127.0.0.1]) (amavisd-new, port 10024) with ESMTP id ORXYYd5VwDtC for <oauth@ietfa.amsl.com>; Tue, 12 Feb 2013 12:35:52 -0800 (PST)
Received: from mail-qa0-f54.google.com (mail-qa0-f54.google.com [209.85.216.54]) by ietfa.amsl.com (Postfix) with ESMTP id 7297221F8AC1 for <oauth@ietf.org>; Tue, 12 Feb 2013 12:35:52 -0800 (PST)
Received: by mail-qa0-f54.google.com with SMTP id hg5so255098qab.13 for <oauth@ietf.org>; Tue, 12 Feb 2013 12:35:51 -0800 (PST)
X-Google-DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=google.com; s=20120113; h=x-received:content-type:mime-version:subject:from:in-reply-to:date :cc:message-id:references:to:x-mailer:x-gm-message-state; bh=S3ottP8JdjNDPi0IU6orLs+57B8RiZtbjpUnDB0o+Wk=; b=OUxw1i3WL43CIMmHlRAW38v3nOjedSh6O4acN1MJfPI1eeMMEGmn2EQf5dq8x/H+i3 VfPfqqfCUva05iJ8jQOMzwUigXSlq7epGL5s2Bm4xNI81k1kWMXrUtzvLqPqM4FnP9Od AuCAXmu+9RbSa4IlVssWvxL7/762gCkCt/fd9+KZZY8qzJbul44B75JWWG1CEDDEr0Lh GuL0PB5BarSl5gwzKFCYa+VDio+T+QD5M23gya9dxAKesqnOGNxL3lTOzapFUyIWkqzG GBgWkrehfu42s10eaiXAW7hEJhZ06j388JrfT0NbqB80PAneuvHLAzPeJAQkxeObTfqo G/Wg==
X-Received: by 10.224.216.65 with SMTP id hh1mr7160432qab.43.1360701351361; Tue, 12 Feb 2013 12:35:51 -0800 (PST)
Received: from [192.168.1.213] (190-20-23-212.baf.movistar.cl. [190.20.23.212]) by mx.google.com with ESMTPS id 8sm16098713qed.6.2013.02.12.12.35.45 (version=TLSv1 cipher=ECDHE-RSA-RC4-SHA bits=128/128); Tue, 12 Feb 2013 12:35:49 -0800 (PST)
Content-Type: multipart/alternative; boundary="Apple-Mail=_F02EC937-EB24-4D0F-818B-A78F8B8E522F"
Mime-Version: 1.0 (Mac OS X Mail 6.2 \(1499\))
From: John Bradley <ve7jtb@ve7jtb.com>
In-Reply-To: <511AA331.2060207@mitre.org>
Date: Tue, 12 Feb 2013 17:35:42 -0300
Message-Id: <498782B5-9FFA-47F2-A21D-5FDF842C7B6B@ve7jtb.com>
References: <51195F3B.1010701@mitre.org> <4E1F6AAD24975D4BA5B168042967394367443A16@TK5EX14MBXC285.redmond.corp.microsoft.com> <511A98DE.4030507@mitre.org> <9309CDB3-8AEE-428D-A7F0-5DAC45EFD44C@ve7jtb.com> <CA+ZpN27U5MB0sbEw=RdVe_YiESUnkjsAmBJezSVg2FafEi8OJQ@mail.gmail.com> <040A3633-A51F-4B17-8019-5DEEC349F39C@ve7jtb.com> <511A9F1C.1010504@mitre.org> <025E3AC8-7F84-410A-A4FF-5FBBD305EA83@ve7jtb.com> <511AA331.2060207@mitre.org>
To: Justin Richer <jricher@mitre.org>
X-Mailer: Apple Mail (2.1499)
X-Gm-Message-State: ALoCoQlDy5o9A/QRky47Galmeu72kg27TR+VOLdMIMMiKbEyF48CRwehd3WFRB+WPOrdmSgsEUrZ
Cc: "oauth@ietf.org" <oauth@ietf.org>
Subject: Re: [OAUTH-WG] Registration: JSON Encoded Input
X-BeenThere: oauth@ietf.org
X-Mailman-Version: 2.1.12
Precedence: list
List-Id: OAUTH WG <oauth.ietf.org>
List-Unsubscribe: <https://www.ietf.org/mailman/options/oauth>, <mailto:oauth-request@ietf.org?subject=unsubscribe>
List-Archive: <http://www.ietf.org/mail-archive/web/oauth>
List-Post: <mailto:oauth@ietf.org>
List-Help: <mailto:oauth-request@ietf.org?subject=help>
List-Subscribe: <https://www.ietf.org/mailman/listinfo/oauth>, <mailto:oauth-request@ietf.org?subject=subscribe>
X-List-Received-Date: Tue, 12 Feb 2013 20:35:54 -0000

--Apple-Mail=_F02EC937-EB24-4D0F-818B-A78F8B8E522F
Content-Transfer-Encoding: quoted-printable
Content-Type: text/plain;
	charset=windows-1252

I am OK with that language.

On 2013-02-12, at 5:16 PM, Justin Richer <jricher@mitre.org> wrote:

> I would then request that people come up with a real example of where =
it *won't* work. I've seen workable solutions, and even some automagic =
ones, on several major platforms in which one would write a web =
server/AS: PHP, Java (Spring and raw servlets), Ruby (rails and =
sinatra), and Node.js can all do it.
>=20
> I would suggest the following text (adapted from what's in -05 right =
now) to address this:
>=20
>    The Client sends an HTTP POST to the Client Registration Endpoint
>    with a content type of "application/json". The HTTP Entity Payload =
is
>    a JSON document consisting of a JSON object and all parameters as =
top-
>    level members of that JSON object.
>=20
> (Would have to be tweaked for the PUT/PATCH verbs but it's effectively =
the same.)
>=20
>=20
>  -- Justin
>=20
> On 02/12/2013 03:07 PM, John Bradley wrote:
>> I am fine with that as long as all the IdP tools have access to the =
entity body in some reasonable way.   That seems like the most sensible =
thing.
>>=20
>> However given the number of people talking about encoding it in a =
form to get access to it,  we should check that it works for everyone.
>>=20
>> John B.
>> On 2013-02-12, at 4:59 PM, Justin Richer <jricher@mitre.org> wrote:
>>=20
>>> If that's the question, then my proposal is the Content-type is =
"application/json" and the HTTP Entity Body is the JSON document. No =
form posts or parameter names to be had here.
>>>=20
>>>  -- Justin
>>>=20
>>> On 02/12/2013 02:58 PM, John Bradley wrote:
>>>> Some people apparently encode the JSON as the key in a form POST,  =
some people do a form POST with a special key and the JSON as the value.=20=

>>>>=20
>>>> There appear to be a number of theories in the wild.   I am not an =
expert I just looked up code examples from several sources stack =
overflow and the like.
>>>>=20
>>>> We probably need to get input from developers who have experience =
working with different frameworks.   I think the differences have to do =
with decoding it at the receiver.
>>>>=20
>>>> We originally had registration posting JSON but we changed form =
encoding as that worked in all environments.   We just need to be sure =
we are not creating problems for people with the change back.
>>>>=20
>>>>=20
>>>> John B.
>>>>=20
>>>> On 2013-02-12, at 4:48 PM, Tim Bray <twbray@google.com> wrote:
>>>>=20
>>>>>=20
>>>>>=20
>>>>> On Tue, Feb 12, 2013 at 11:44 AM, John Bradley <ve7jtb@ve7jtb.com> =
wrote:
>>>>> Nat and I hashed out the pro's and cons of JSON requests. =20
>>>>>=20
>>>>> If we POST or PUT a JSON object we need to be specific as there =
rare several ways to do it that may work better or worse depending on =
the receiver.
>>>>> This needs to be looked over and one picked.
>>>>>=20
>>>>> Hm?  Not following on =93several ways=94, I=92d have thought that =
POSTing JSON is just POSTing JSON, must be missing something. -T
>>>>> =20
>>>>>=20
>>>>> In the other thread about the server returning the update URI and =
being able to encode the client in that if it needs to takes care of =
Servers that need that info in query parameters or the path to do the =
routing.
>>>>>=20
>>>>> The use of structure can be used to enhance readability and =
parsing of the input, and output.
>>>>>=20
>>>>> However we need to temper our urge to apply structure to =
everything. =20
>>>>>=20
>>>>> IT needs to be applied carefully otherwise we start looking like =
crazies.
>>>>>=20
>>>>> If we do it cautiously I am in favour of JSON as input.
>>>>>=20
>>>>> John B.
>>>>>=20
>>>>> On 2013-02-12, at 4:32 PM, Justin Richer <jricher@mitre.org> =
wrote:
>>>>>=20
>>>>>> Thanks for forwarding that, Mike. I'll paste in my response to =
Nat's concern here as well:
>>>>>> It's an increasingly well known pattern that has reasonable =
support on the server side. For PHP, I was able to find the above =
example via the top hit on Stack Overflow. In Ruby, it's a matter of =
something like:
>>>>>>=20
>>>>>> JSON.parse(request.body.read)
>>>>>>=20
>>>>>> depending on the web app framework. On Java/Spring, it's a matter =
of injecting the entity body as a string and handing it to a parser =
(Gson in this case):
>>>>>>=20
>>>>>> public String doApi(@RequestBody String jsonString) { JsonObject =
json =3D new JsonParser().parse(jsonString).getAsJsonObject();
>>>>>>=20
>>>>>> It's a similar read/parse setup in Node.js as well.
>>>>>>=20
>>>>>> It's true that in all of these cases you don't get to make use of =
the routing or data binding facilities (though in Spring you can do that =
for simpler domain objects using a ModelBinding), so you don't get =
niceities like the $_POST array in PHP handed to you. This is why I =
don't think it's a good idea at all to switch functionality based on the =
contents of the JSON object. It should be a domain object only, which is =
what it would be in this case.
>>>>>>=20
>>>>>> I think that the positives of using JSON from the client's =
perspective and the overall protocol design far outweigh the slightly =
increased implementation cost at the server.
>>>>>>=20
>>>>>>=20
>>>>>>  -- Justin
>>>>>>=20
>>>>>> On 02/12/2013 02:11 PM, Mike Jones wrote:
>>>>>>> FYI, this issue is also being discussed as an OpenID Connect =
issue at https://bitbucket.org/openid/connect/issue/747.  I think that =
Nat's recent comment there bears repeating on this list:
>>>>>>>=20
>>>>>>> =20
>>>>>>> Nat Sakimura:
>>>>>>>=20
>>>>>>> =20
>>>>>>> Not so sure. For example, PHP cannot get the JSON object form =
application/json POST in $_POST.
>>>>>>>=20
>>>>>>> =20
>>>>>>> It is OK to have a parameter like "request" that holds JSON. =
Then, you can get to it from $_POST['request']. However, if you POST the =
JSON as the POST body, then you would have to call a low level function =
in the form of:
>>>>>>>=20
>>>>>>> =20
>>>>>>> =20
>>>>>>> ```
>>>>>>>=20
>>>>>>> #!php
>>>>>>>=20
>>>>>>> =20
>>>>>>> $file =3D file_get_contents('php://input'); $x =3D =
json_decode($file); ```
>>>>>>>=20
>>>>>>> =20
>>>>>>> Not that it is harder, but it is much less known. Many PHP =
programmers will certainly goes "???".
>>>>>>>=20
>>>>>>> =20
>>>>>>> We need to check what would be the cases for other scripting =
languages before making the final decision.
>>>>>>>=20
>>>>>>> =20
>>>>>>>                                                             -- =
Mike
>>>>>>>=20
>>>>>>> =20
>>>>>>> -----Original Message-----
>>>>>>> From: oauth-bounces@ietf.org [mailto:oauth-bounces@ietf.org] On =
Behalf Of Justin Richer
>>>>>>> Sent: Monday, February 11, 2013 1:15 PM
>>>>>>> To: oauth@ietf.org
>>>>>>> Subject: [OAUTH-WG] Registration: JSON Encoded Input
>>>>>>>=20
>>>>>>> =20
>>>>>>> Draft -05 of OAuth Dynamic Client Registration [1] switched from =
a form-encoded input that had been used by drafts -01 through -04 to a =
JSON encoded input that was used originally in -00. Note that all =
versions keep JSON-encoded output from all operations.
>>>>>>>=20
>>>>>>> =20
>>>>>>> Pro:
>>>>>>>=20
>>>>>>>   - JSON gives us a rich data structure so that things such as =
lists, numbers, nulls, and objects can be represented natively
>>>>>>>=20
>>>>>>>   - Allows for parallelism between the input to the endpoint and =
output from the endpoint, reducing possible translation errors between =
the two
>>>>>>>=20
>>>>>>>   - JSON specifies UTF8 encoding for all strings, forms may have =
many different encodings
>>>>>>>=20
>>>>>>>   - JSON has minimal character escaping required for most =
strings, forms require escaping for common characters such as space, =
slash, comma, etc.
>>>>>>>=20
>>>>>>> =20
>>>>>>> Con:
>>>>>>>=20
>>>>>>>   - the rest of OAuth is form-in/JSON-out
>>>>>>>=20
>>>>>>>   - nothing else in OAuth requires the Client to create a JSON =
object, merely to parse one
>>>>>>>=20
>>>>>>>   - form-in/JSON-out is a very widely established pattern on the =
web today
>>>>>>>=20
>>>>>>>   - Client information (client_name, client_id, etc.) is =
conflated with access information (registration_access_token, _links, =
expires_at, etc.) in root level of the same JSON object, leaving the =
client to decide what needs to (can?) be sent back to the server for =
update operations.
>>>>>>>=20
>>>>>>> =20
>>>>>>> =20
>>>>>>> Alternatives include any number of data encoding schemes, =
including form (like the old drafts), XML, ASN.1, etc.
>>>>>>>=20
>>>>>>> =20
>>>>>>> =20
>>>>>>>   -- Justin
>>>>>>>=20
>>>>>>> =20
>>>>>>> [1] http://tools.ietf.org/html/draft-ietf-oauth-dyn-reg-05
>>>>>>>=20
>>>>>>> _______________________________________________
>>>>>>>=20
>>>>>>> OAuth mailing list
>>>>>>>=20
>>>>>>> OAuth@ietf.org
>>>>>>>=20
>>>>>>> https://www.ietf.org/mailman/listinfo/oauth
>>>>>>>=20
>>>>>>=20
>>>>>> _______________________________________________
>>>>>> OAuth mailing list
>>>>>> OAuth@ietf.org
>>>>>> https://www.ietf.org/mailman/listinfo/oauth
>>>>>=20
>>>>>=20
>>>>> _______________________________________________
>>>>> OAuth mailing list
>>>>> OAuth@ietf.org
>>>>> https://www.ietf.org/mailman/listinfo/oauth
>>>>>=20
>>>>>=20
>>>>=20
>>>=20
>>=20
>=20


--Apple-Mail=_F02EC937-EB24-4D0F-818B-A78F8B8E522F
Content-Transfer-Encoding: quoted-printable
Content-Type: text/html;
	charset=windows-1252

<html><head><meta http-equiv=3D"Content-Type" content=3D"text/html =
charset=3Dwindows-1252"></head><body style=3D"word-wrap: break-word; =
-webkit-nbsp-mode: space; -webkit-line-break: after-white-space; ">I am =
OK with that language.<div><br><div><div>On 2013-02-12, at 5:16 PM, =
Justin Richer &lt;<a =
href=3D"mailto:jricher@mitre.org">jricher@mitre.org</a>&gt; =
wrote:</div><br class=3D"Apple-interchange-newline"><blockquote =
type=3D"cite">
 =20
    <meta content=3D"text/html; charset=3Dwindows-1252" =
http-equiv=3D"Content-Type">
 =20
  <div bgcolor=3D"#FFFFFF" text=3D"#000000">
    I would then request that people come up with a real example of
    where it *won't* work. I've seen workable solutions, and even some
    automagic ones, on several major platforms in which one would write
    a web server/AS: PHP, Java (Spring and raw servlets), Ruby (rails
    and sinatra), and Node.js can all do it.<br>
    <br>
    I would suggest the following text (adapted from what's in -05 right
    now) to address this:<br>
    <br>
    <pre class=3D"newpage">   The Client sends an HTTP POST to the =
Client Registration Endpoint
   with a content type of "application/json". The HTTP Entity Payload is
   a JSON document consisting of a JSON object and all parameters as =
top-
   level members of that JSON object.</pre>
    <br>
    (Would have to be tweaked for the PUT/PATCH verbs but it's
    effectively the same.)<br>
    <br>
    <br>
    &nbsp;-- Justin<br>
    <br>
    <div class=3D"moz-cite-prefix">On 02/12/2013 03:07 PM, John Bradley
      wrote:<br>
    </div>
    <blockquote =
cite=3D"mid:025E3AC8-7F84-410A-A4FF-5FBBD305EA83@ve7jtb.com" =
type=3D"cite">
      <meta http-equiv=3D"Content-Type" content=3D"text/html;
        charset=3Dwindows-1252">
      I am fine with that as long as all the IdP tools have access to
      the entity body in some reasonable way. &nbsp; That seems like the =
most
      sensible thing.
      <div><br>
      </div>
      <div>However given the number of people talking about encoding it
        in a form to get access to it, &nbsp;we should check that it =
works
        for everyone.</div>
      <div><br>
      </div>
      <div>John B.<br>
        <div>
          <div>On 2013-02-12, at 4:59 PM, Justin Richer &lt;<a =
moz-do-not-send=3D"true" =
href=3D"mailto:jricher@mitre.org">jricher@mitre.org</a>&gt;
            wrote:</div>
          <br class=3D"Apple-interchange-newline">
          <blockquote type=3D"cite">
            <div bgcolor=3D"#FFFFFF" text=3D"#000000"> If that's the
              question, then my proposal is the Content-type is
              "application/json" and the HTTP Entity Body is the JSON
              document. No form posts or parameter names to be had =
here.<br>
              <br>
              &nbsp;-- Justin<br>
              <br>
              <div class=3D"moz-cite-prefix">On 02/12/2013 02:58 PM, =
John
                Bradley wrote:<br>
              </div>
              <blockquote =
cite=3D"mid:040A3633-A51F-4B17-8019-5DEEC349F39C@ve7jtb.com" =
type=3D"cite"> Some people apparently encode the JSON as
                the key in a form POST, &nbsp;some people do a form POST =
with
                a special key and the JSON as the value.&nbsp;
                <div><br>
                </div>
                <div>There appear to be a number of theories in the
                  wild. &nbsp; I am not an expert I just looked up code
                  examples from several sources stack overflow and the
                  like.</div>
                <div><br>
                </div>
                <div>We probably need to get input from developers who
                  have experience working with different frameworks. =
&nbsp; I
                  think the differences have to do with decoding it at
                  the receiver.</div>
                <div><br>
                </div>
                <div>We originally had registration posting JSON but we
                  changed form encoding as that worked in all
                  environments. &nbsp; We just need to be sure we are =
not
                  creating problems for people with the change =
back.</div>
                <div><br>
                </div>
                <div><br>
                </div>
                <div>John B.</div>
                <div><br>
                  <div>
                    <div>On 2013-02-12, at 4:48 PM, Tim Bray &lt;<a =
moz-do-not-send=3D"true" =
href=3D"mailto:twbray@google.com">twbray@google.com</a>&gt;

                      wrote:</div>
                    <br class=3D"Apple-interchange-newline">
                    <blockquote type=3D"cite"><br>
                      <br>
                      <div class=3D"gmail_quote">On Tue, Feb 12, 2013 at
                        11:44 AM, John Bradley <span dir=3D"ltr">&lt;<a =
moz-do-not-send=3D"true" href=3D"mailto:ve7jtb@ve7jtb.com" =
target=3D"_blank">ve7jtb@ve7jtb.com</a>&gt;</span>
                        wrote:<br>
                        <blockquote class=3D"gmail_quote" =
style=3D"margin:0
                          0 0 .8ex;border-left:1px #ccc
                          solid;padding-left:1ex">
                          <div style=3D"word-wrap:break-word">Nat and I
                            hashed out the pro's and cons of JSON
                            requests. &nbsp;
                            <div><br>
                            </div>
                            <div>If we POST or PUT a JSON object we need
                              to be specific as there rare several ways
                              to do it that may work better or worse
                              depending on the receiver.</div>
                            <div>This needs to be looked over and one
                              picked.</div>
                          </div>
                        </blockquote>
                        <div><br>
                        </div>
                        <div>Hm? &nbsp;Not following on =93several =
ways=94, I=92d
                          have thought that POSTing JSON is just POSTing
                          JSON, must be missing something. -T</div>
                        <div>&nbsp;</div>
                        <blockquote class=3D"gmail_quote" =
style=3D"margin:0
                          0 0 .8ex;border-left:1px #ccc
                          solid;padding-left:1ex">
                          <div style=3D"word-wrap:break-word">
                            <div><br>
                            </div>
                            <div>In the other thread about the server
                              returning the update URI and being able to
                              encode the client in that if it needs to
                              takes care of Servers that need that info
                              in query parameters or the path to do the
                              routing.</div>
                            <div><br>
                            </div>
                            <div>The use of structure can be used to
                              enhance readability and parsing of the
                              input, and output.</div>
                            <div><br>
                            </div>
                            <div>However we need to temper our urge to
                              apply structure to everything. =
&nbsp;</div>
                            <div> <br>
                            </div>
                            <div>IT needs to be applied carefully
                              otherwise we start looking like =
crazies.</div>
                            <div><br>
                            </div>
                            <div>If we do it cautiously I am in favour
                              of JSON as input.</div>
                            <div><br>
                            </div>
                            <div>John B.</div>
                            <div>
                              <div class=3D"h5">
                                <div><br>
                                  <div>
                                    <div>On 2013-02-12, at 4:32 PM,
                                      Justin Richer &lt;<a =
moz-do-not-send=3D"true" href=3D"mailto:jricher@mitre.org" =
target=3D"_blank">jricher@mitre.org</a>&gt;

                                      wrote:</div>
                                    <br>
                                    <blockquote type=3D"cite">
                                      <div bgcolor=3D"#FFFFFF" =
text=3D"#000000"> Thanks for
                                        forwarding that, Mike. I'll
                                        paste in my response to Nat's
                                        concern here as well:<br>
                                        <blockquote>It's an increasingly
                                          well known pattern that has
                                          reasonable support on the
                                          server side. For PHP, I was
                                          able to find the above example
                                          via the top hit on Stack
                                          Overflow. In Ruby, it's a
                                          matter of something like:<br>
                                          <br>
                                          =
JSON.parse(request.body.read)<br>
                                          <br>
                                          depending on the web app
                                          framework. On Java/Spring,
                                          it's a matter of injecting the
                                          entity body as a string and
                                          handing it to a parser (Gson
                                          in this case):<br>
                                          <br>
                                          public String
                                          doApi(@RequestBody String
                                          jsonString) { JsonObject json
                                          =3D new
                                          =
JsonParser().parse(jsonString).getAsJsonObject();<br>
                                          <br>
                                          It's a similar read/parse
                                          setup in Node.js as well.<br>
                                          <br>
                                          It's true that in all of these
                                          cases you don't get to make
                                          use of the routing or data
                                          binding facilities (though in
                                          Spring you can do that for
                                          simpler domain objects using a
                                          ModelBinding), so you don't
                                          get niceities like the $_POST
                                          array in PHP handed to you.
                                          This is why I don't think it's
                                          a good idea at all to switch
                                          functionality based on the
                                          contents of the JSON object.
                                          It should be a domain object
                                          only, which is what it would
                                          be in this case.<br>
                                          <br>
                                          I think that the positives of
                                          using JSON from the client's
                                          perspective and the overall
                                          protocol design far outweigh
                                          the slightly increased
                                          implementation cost at the
                                          server.<br>
                                        </blockquote>
                                        <br>
                                        <br>
                                        &nbsp;-- Justin<br>
                                        <br>
                                        <div>On 02/12/2013 02:11 PM,
                                          Mike Jones wrote:<br>
                                        </div>
                                        <blockquote type=3D"cite">
                                          <div><p>FYI, this issue is =
also
                                              being discussed as an
                                              OpenID Connect issue at <a =
moz-do-not-send=3D"true" =
href=3D"https://bitbucket.org/openid/connect/issue/747" =
target=3D"_blank">https://bitbucket.org/openid/connect/issue/747</a>.&nbsp=
;


                                              I think that Nat's recent
                                              comment there bears
                                              repeating on this =
list:</p>
                                            <div>&nbsp;<br =
class=3D"webkit-block-placeholder">
                                            </div><p =
style=3D"margin-left:.5in">Nat

                                              Sakimura:</p>
                                            <div style=3D"margin-left:
                                              0.5in; ">&nbsp;<br =
class=3D"webkit-block-placeholder">
                                            </div><p =
style=3D"margin-left:.5in">Not
                                              so sure. For example, PHP
                                              cannot get the JSON object
                                              form application/json POST
                                              in $_POST. </p>
                                            <div style=3D"margin-left:
                                              0.5in; ">&nbsp;<br =
class=3D"webkit-block-placeholder">
                                            </div><p =
style=3D"margin-left:.5in">It
                                              is OK to have a parameter
                                              like "request" that holds
                                              JSON. Then, you can get to
                                              it from $_POST['request'].
                                              However, if you POST the
                                              JSON as the POST body,
                                              then you would have to
                                              call a low level function
                                              in the form of: </p>
                                            <div style=3D"margin-left:
                                              0.5in; ">&nbsp;<br =
class=3D"webkit-block-placeholder">
                                            </div>
                                            <div style=3D"margin-left:
                                              0.5in; ">&nbsp;<br =
class=3D"webkit-block-placeholder">
                                            </div><p =
style=3D"margin-left:.5in">```</p><p style=3D"margin-left:.5in">
                                              #!php</p>
                                            <div style=3D"margin-left:
                                              0.5in; ">&nbsp;<br =
class=3D"webkit-block-placeholder">
                                            </div><p =
style=3D"margin-left:.5in">$file
                                              =3D file_get_contents('<a =
moz-do-not-send=3D"true">php://input'</a>);

                                              $x =3D json_decode($file);
                                              ```</p>
                                            <div style=3D"margin-left:
                                              0.5in; ">&nbsp;<br =
class=3D"webkit-block-placeholder">
                                            </div><p =
style=3D"margin-left:.5in">Not
                                              that it is harder, but it
                                              is much less known. Many
                                              PHP programmers will
                                              certainly goes "???". </p>
                                            <div style=3D"margin-left:
                                              0.5in; ">&nbsp;<br =
class=3D"webkit-block-placeholder">
                                            </div><p =
style=3D"margin-left:.5in">We
                                              need to check what would
                                              be the cases for other
                                              scripting languages before
                                              making the final =
decision.</p>
                                            <div>&nbsp;<br =
class=3D"webkit-block-placeholder">
                                            =
</div><p>&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp=
;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&=
nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nb=
sp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp=
;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;


                                              -- Mike</p>
                                            <div>&nbsp;<br =
class=3D"webkit-block-placeholder">
                                            </div><p>-----Original
                                              Message-----<br>
                                              From: <a =
moz-do-not-send=3D"true" href=3D"mailto:oauth-bounces@ietf.org" =
target=3D"_blank">oauth-bounces@ietf.org</a>
                                              [<a moz-do-not-send=3D"true"=
 href=3D"mailto:oauth-bounces@ietf.org" =
target=3D"_blank">mailto:oauth-bounces@ietf.org</a>]
                                              On Behalf Of Justin =
Richer<br>
                                              Sent: Monday, February 11,
                                              2013 1:15 PM<br>
                                              To: <a =
moz-do-not-send=3D"true" href=3D"mailto:oauth@ietf.org" =
target=3D"_blank">oauth@ietf.org</a><br>
                                              Subject: [OAUTH-WG]
                                              Registration: JSON Encoded
                                              Input</p>
                                            <div>&nbsp;<br =
class=3D"webkit-block-placeholder">
                                            </div><p>Draft -05 of OAuth
                                              Dynamic Client
                                              Registration [1] switched
                                              from a form-encoded input
                                              that had been used by
                                              drafts -01 through -04 to
                                              a JSON encoded input that
                                              was used originally in
                                              -00. Note that all
                                              versions keep JSON-encoded
                                              output from all
                                              operations.</p>
                                            <div>&nbsp;<br =
class=3D"webkit-block-placeholder">
                                            </div><p>Pro:</p><p>&nbsp; - =
JSON gives us a rich
                                              data structure so that
                                              things such as lists,
                                              numbers, nulls, and
                                              objects can be represented
                                              natively</p><p>&nbsp; - =
Allows for
                                              parallelism between the
                                              input to the endpoint and
                                              output from the endpoint,
                                              reducing possible
                                              translation errors between
                                              the two</p><p>&nbsp; - =
JSON specifies UTF8
                                              encoding for all strings,
                                              forms may have many
                                              different =
encodings</p><p>&nbsp; - JSON has minimal
                                              character escaping
                                              required for most strings,
                                              forms require escaping for
                                              common characters such as
                                              space, slash, comma, =
etc.</p>
                                            <div>&nbsp;<br =
class=3D"webkit-block-placeholder">
                                            </div><p>Con:</p><p>&nbsp; - =
the rest of OAuth is
                                              =
form-in/JSON-out</p><p>&nbsp; - nothing else in OAuth
                                              requires the Client to
                                              create a JSON object,
                                              merely to parse =
one</p><p>&nbsp; - form-in/JSON-out is a
                                              very widely established
                                              pattern on the web =
today</p><p>&nbsp; - Client information
                                              (client_name, client_id,
                                              etc.) is conflated with
                                              access information
                                              =
(registration_access_token,
                                              _links, expires_at, etc.)
                                              in root level of the same
                                              JSON object, leaving the
                                              client to decide what
                                              needs to (can?) be sent
                                              back to the server for
                                              update operations.</p>
                                            <div>&nbsp;<br =
class=3D"webkit-block-placeholder">
                                            </div>
                                            <div>&nbsp;<br =
class=3D"webkit-block-placeholder">
                                            </div><p>Alternatives =
include any
                                              number of data encoding
                                              schemes, including form
                                              (like the old drafts),
                                              XML, ASN.1, etc.</p>
                                            <div>&nbsp;<br =
class=3D"webkit-block-placeholder">
                                            </div>
                                            <div>&nbsp;<br =
class=3D"webkit-block-placeholder">
                                            </div><p>&nbsp; -- =
Justin</p>
                                            <div>&nbsp;<br =
class=3D"webkit-block-placeholder">
                                            </div><p>[1] <a =
moz-do-not-send=3D"true" =
href=3D"http://tools.ietf.org/html/draft-ietf-oauth-dyn-reg-05" =
target=3D"_blank"> <span =
style=3D"color:windowtext;text-decoration:none">http://tools.ietf.org/html=
/draft-ietf-oauth-dyn-reg-05</span></a></p><p>____________________________=
___________________</p><p>OAuth mailing list</p><p><a =
moz-do-not-send=3D"true" href=3D"mailto:OAuth@ietf.org" =
target=3D"_blank"><span =
style=3D"color:windowtext;text-decoration:none">OAuth@ietf.org</span></a><=
/p><p><a moz-do-not-send=3D"true" =
href=3D"https://www.ietf.org/mailman/listinfo/oauth" =
target=3D"_blank"><span =
style=3D"color:windowtext;text-decoration:none">https://www.ietf.org/mailm=
an/listinfo/oauth</span></a></p>
                                          </div>
                                        </blockquote>
                                        <br>
                                      </div>
_______________________________________________<br>
                                      OAuth mailing list<br>
                                      <a moz-do-not-send=3D"true" =
href=3D"mailto:OAuth@ietf.org" target=3D"_blank">OAuth@ietf.org</a><br>
                                      <a moz-do-not-send=3D"true" =
href=3D"https://www.ietf.org/mailman/listinfo/oauth" =
target=3D"_blank">https://www.ietf.org/mailman/listinfo/oauth</a><br>
                                    </blockquote>
                                  </div>
                                  <br>
                                </div>
                              </div>
                            </div>
                          </div>
                          <br>
_______________________________________________<br>
                          OAuth mailing list<br>
                          <a moz-do-not-send=3D"true" =
href=3D"mailto:OAuth@ietf.org">OAuth@ietf.org</a><br>
                          <a moz-do-not-send=3D"true" =
href=3D"https://www.ietf.org/mailman/listinfo/oauth" =
target=3D"_blank">https://www.ietf.org/mailman/listinfo/oauth</a><br>
                          <br>
                        </blockquote>
                      </div>
                      <br>
                    </blockquote>
                  </div>
                  <br>
                </div>
              </blockquote>
              <br>
            </div>
          </blockquote>
        </div>
        <br>
      </div>
    </blockquote>
    <br>
  </div>

</blockquote></div><br></div></body></html>=

--Apple-Mail=_F02EC937-EB24-4D0F-818B-A78F8B8E522F--

From sakimura@gmail.com  Tue Feb 12 12:49:00 2013
Return-Path: <sakimura@gmail.com>
X-Original-To: oauth@ietfa.amsl.com
Delivered-To: oauth@ietfa.amsl.com
Received: from localhost (localhost [127.0.0.1]) by ietfa.amsl.com (Postfix) with ESMTP id E6EA521F8BB9 for <oauth@ietfa.amsl.com>; Tue, 12 Feb 2013 12:49:00 -0800 (PST)
X-Virus-Scanned: amavisd-new at amsl.com
X-Spam-Flag: NO
X-Spam-Score: -2.93
X-Spam-Level: 
X-Spam-Status: No, score=-2.93 tagged_above=-999 required=5 tests=[AWL=0.069,  BAYES_00=-2.599, J_CHICKENPOX_44=0.6, RCVD_IN_DNSWL_LOW=-1]
Received: from mail.ietf.org ([12.22.58.30]) by localhost (ietfa.amsl.com [127.0.0.1]) (amavisd-new, port 10024) with ESMTP id iteXFkfnWM8S for <oauth@ietfa.amsl.com>; Tue, 12 Feb 2013 12:48:59 -0800 (PST)
Received: from mail-lb0-f179.google.com (mail-lb0-f179.google.com [209.85.217.179]) by ietfa.amsl.com (Postfix) with ESMTP id 11A4421F8BAF for <oauth@ietf.org>; Tue, 12 Feb 2013 12:48:58 -0800 (PST)
Received: by mail-lb0-f179.google.com with SMTP id j14so434342lbo.38 for <oauth@ietf.org>; Tue, 12 Feb 2013 12:48:58 -0800 (PST)
DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=gmail.com; s=20120113; h=mime-version:x-received:in-reply-to:references:date:message-id :subject:from:to:cc:content-type:content-transfer-encoding; bh=JQ1/bmcB7VSbyPOfUONSEPuEel89N8QUFqf8OLNrL98=; b=CluRZNRwZwL/zUdQD/QMde/pCZxNgzB5sxaXhXFYJDIN4VGXHNjbz7ajsVqblUBFXf 5fslp2irc+2U2AFAIMsdvKlHziGQ5e+gRWfpVZQj0hy2ARGvGIgZRLSZmORfHXE/67eH KOQfxyb1eKXFBMqX1xhWEVl3xugxaflpDlNZLE3a24CZL4zq2t2qy57b2NC2ADuF/TOh rLvDQuL2zbTT7BJ+L39dDAzb8sIefPwo7n+icpC1woJ3Yv0vc0RRJjs/i0sAtxkInf0i xjOgogoaUyUnpAgv9Pp5BhnVYDnxWnpbx+cbA1lp4RM6VdMFN8h+AcnQiKLZLrJmRLWH 9tsw==
MIME-Version: 1.0
X-Received: by 10.152.48.45 with SMTP id i13mr7744191lan.11.1360702137789; Tue, 12 Feb 2013 12:48:57 -0800 (PST)
Received: by 10.112.14.44 with HTTP; Tue, 12 Feb 2013 12:48:57 -0800 (PST)
In-Reply-To: <4E1F6AAD24975D4BA5B168042967394367443A52@TK5EX14MBXC285.redmond.corp.microsoft.com>
References: <51195F3D.1050006@mitre.org> <222C28CB-7F6F-4BC3-8692-40404C2DC2D3@maymount.com> <511A50C7.8080102@mitre.org> <B256FD2D-5ED7-4306-A3BF-E6A196862B2E@ve7jtb.com> <511A6C49.50801@mitre.org> <CABzCy2CdxaNOvho2uyuc83qHm4WKHVfToC_n6QqAS3fqTGzU2w@mail.gmail.com> <4E1F6AAD24975D4BA5B168042967394367443A52@TK5EX14MBXC285.redmond.corp.microsoft.com>
Date: Wed, 13 Feb 2013 05:48:57 +0900
Message-ID: <CABzCy2B3CGeKBkCNczG_SNchBqMX5dnkFj1RexJac_Z3JTcCjg@mail.gmail.com>
From: Nat Sakimura <sakimura@gmail.com>
To: Mike Jones <Michael.Jones@microsoft.com>
Content-Type: text/plain; charset=ISO-8859-1
Content-Transfer-Encoding: quoted-printable
Cc: "oauth@ietf.org" <oauth@ietf.org>
Subject: Re: [OAUTH-WG] Registration: HAL _links structure and client self-URL
X-BeenThere: oauth@ietf.org
X-Mailman-Version: 2.1.12
Precedence: list
List-Id: OAUTH WG <oauth.ietf.org>
List-Unsubscribe: <https://www.ietf.org/mailman/options/oauth>, <mailto:oauth-request@ietf.org?subject=unsubscribe>
List-Archive: <http://www.ietf.org/mail-archive/web/oauth>
List-Post: <mailto:oauth@ietf.org>
List-Help: <mailto:oauth-request@ietf.org?subject=help>
List-Subscribe: <https://www.ietf.org/mailman/listinfo/oauth>, <mailto:oauth-request@ietf.org?subject=subscribe>
X-List-Received-Date: Tue, 12 Feb 2013 20:49:01 -0000

Like bunch of people expressed their opinion in the Thursday's OpenID
call, I honestly do not understand why you think this is complex.
It is JSON.
It is not a surprise.

Compare

obj =3D {
  "registration_access_url":"http://example.com/"
};

obj =3D {
  "_links":{"self":{"href":"http://example.com/"}}
};

In the former case, the client accesses it as obj.registration_access_url.
In the later case, the client accesses it as obj._links.self.href.

As far as programming easiness is concerned, they are more or less the same=
.

Now, introduce other link relationships.
Say you want to store the link/rel metadata in one table and other
data in another table.
The flat one (the former) gets significantly harder.

We human being categorizes things into buckets, and we handle those buckets=
.
If we do not need those categorization power, then why do we use JSON?

One of the beauty of JSON is that while it has the categorization power,
you can just access as if you are in a flat name space when you are
accessing individual items.

So, while you characterize it as "complex", "hard", etc., in fact it
is "simpler" and "easier".

Also, I think you misquote the REST/JSON philosophy.

One of the most fundamental philosophy of REST is to drive the states
through hyper-links and media-types.
As a result, it also asks for a uniform interface. JSON lacks this
hyper-link and uniform interface capability.
Proposals like HAL/OAuth-meta and JSON Hyper-Schema are attempts to
address this shortcoming.
It is trying to provide a uniform interface over hyper-links.
Ad-hoc variable like registration_access_url fails this test because
it is only useable in this particular instance.
(I dislike the name as well as it does not represent the resource
representation that it returns, but that is another issue.)


2013/2/13 Mike Jones <Michael.Jones@microsoft.com>:
> Part of the REST/JSON philosophy is that interfaces should be as simple a=
nd developer-friendly as possible.  XML was rejected by developers, in part=
, because of the self-describing nature of the structure, which required ex=
tra syntax that was often not useful in practice.  Trying to re-impose that=
 structure using extra JSON syntax conventions is just asking developers to=
 have an allergic reaction to our specs upon encountering them.  The syntac=
tic complexity and *surprise factor* isn't worth the limited semantic benef=
its of using "_links".
>
> Since you bring up privacy policy and terms of service, I'll note that th=
e OAuth Dynamic Registration spec already has these fields to address those=
:
>         policy_url
>         tos_url
>
> Those have been working fine for OpenID Connect too.  There's no need to =
likewise convolve them to add the extra syntax that you describe below.

As John said, and as I said in the private email yesterday, they are
totally different.

>
> (BTW, in a private thread, John Bradley pointed out that what the two of =
you talked about in person was actually the possibility of adding privacy p=
olicy and terms of service declarations at *discovery time*, rather than re=
gistration time.  That's a different topic, which we should discuss separat=
ely, if you want to pursue that.)

No, that is not right, as John's previous mail indicates. There are
ones for discovery and the ones in registration responses.

Nat

>
>                                 Best wishes,
>                                 -- Mike
>
> -----Original Message-----
> From: oauth-bounces@ietf.org [mailto:oauth-bounces@ietf.org] On Behalf Of=
 Nat Sakimura
> Sent: Tuesday, February 12, 2013 9:11 AM
> To: Justin Richer; oauth@ietf.org
> Subject: Re: [OAUTH-WG] Registration: HAL _links structure and client sel=
f-URL
>
> Actually, if it is to return it in the HTTP header, then it should also u=
se the RFC5988 Web Linking format.
> Now, that is nice to have, but for many JSON programmers, I agree that it=
 would be a hassle to obtain the header and store them in addition to the J=
SON. So, it is nicer to have it in JSON body.
>
> Re: Is "_links.self.href" grossly complex over "registration_access_url"?
>
> I do not think so. Accessing a flat top level parameter such as registrat=
ion_access_url and _links.self.href does not make any difference from a cli=
ent programmers point of view. That's a beauty of JSON. Both can be treated=
 as a parameter name. Doing a group operation on the links makes difference=
 though: the structured one is easier since you can just operate on _links =
while in case of the top level parameters, you have to have an explicit lis=
t of them and do the matches. (See below for the necessity for the grouping=
).
>
> I and John discussed this for at least half an hour F2F last week, both t=
echnically and from operation/legal point of view, for OpenID Connect Regis=
tration.
> Similar points could be made to OAuth dyn reg.
>
> Here is what we have discussed:
>
> When dynamically registering the client to the server, the server probabl=
y needs to return the following:
>
>   * terms-of-service (terms of service of the server to the client)
>   * privacy-policy (privacy policy of the server to the client)
>
> Both are defined in RFC5988/IANA Link Relations registry.
>
>
> They should be returned together with
>
>   * self.href
>
> which is also defined in RFC5988/IANA Link Relations registry.
>
> There are several ways to do it.
>
>   * Return these using RFC5988 (HTTP Header)
>   * Return these in entity body
>       * Use HAL (or OAuth-meta)/JSON Schema
>       * Use something else (e.g., a top level items)
>
> Returning it in the entity body has several advantage over HTTP header:
>
>   * They can be captured in one call;
>   * They are protocol agnostic;
>
> We determined that these advantages outweighs the disadvantage of creatin=
g a new standard.
>
> The question becomes then whether to:
>
>   * Use HAL (or OAuth-meta)/JSON Schema
>   * Use something else (e.g., a top level items)
>
> First, we have to consider what needs to be returned in the link/relation=
ship category. If it were just _links.self.href, then grouping probably doe=
s not make sense. However, since we have terms-of-service and privacy-polic=
y as well already, it may well make sense.
>
> Moreover, when we think of a multi-tenant authorization server that may w=
ant to use different OAuth authz and token endpoints for different tennants=
, it would be better to be able to return those in the registration respons=
e. Then, it would make sense to register OAuth authz and token endpoints as=
 rel type in the IANA registry (like Bill Mills is trying to
> do) and use them in a uniform manner. Note: these per tenant endpoints ma=
y support different scopes etc. as well. Then, these has to be coupled with=
 the URIs. That is why all of RFC5988/HAL/JSON Schema uses href instead of =
just having the URL as the value of the parameter. The semantic relationshi=
p would often have an associated URI, and other parameters that goes with i=
t.
>
> e.g.:
>
> {
>     "_links": {
>         "terms-of-service": {
>             "href": "https: //server.example.com/tos"
>         },
>         "privacy-policy": {
>             "href": "https: //server.example.com/pp"
>         },
>         "self": {
>             "href": "https: //server.example.com/clients/1234",
>             "authorize": "Bearer"
>         },
>         "oauth_authz": {
>             "href": "https: //server.example.com/authz",
>             "scopes": "openid profile email",
>             "response_types": [
>                 "token id_token",
>                 "code id_token",
>                 "token",
>                 "code"
>             ]
>         },
>         "oauth_token": {
>             "href": "https: //server.example.com/token",
>             "authorize": "Basic"
>         }
>     }
> }
>
> In short, there are bunch of link relations that needs to be returned wit=
h additional parameters.
> Grouping them seems to make sense.
>
> Considering all these, John and I came to the conclusion that the HAL typ=
e syntax would probably make more sense.
> (Note: JSON Schema syntax does not make the parameter access as easy as H=
AL.)
>
> In fact, Mike Kelly (the author of HAL) and I have just submit a new vers=
ion of draft-sakimura-oauth-meta
>
>    http://tools.ietf.org/html/draft-sakimura-oauth-meta-02
>
> The proposal was discussed at IETF 85 OAuth WG and the chairs asked to su=
bmit the draft.
> The -00 appeared in December, and this -02 has some simplification and th=
e addition of the "operations" inspired by
> https://tools.ietf.org/html/draft-ietf-scim-api-00#section-3.5 .
> It is arguably a subset of HAL plus some OAuth specifics.
> I have not added Discovery response example, but adding them would makes =
even more sense, I think.
>
> Cheers,
>
> Nat
>
>
> 2013/2/13 Justin Richer <jricher@mitre.org>
>>
>> Agreed - I didn't think that header-only was the proposal, but let's be =
explicit about the returned body always containing the URL. The way I read =
the 201 definition, it suggests (SHOULD) that you use the location header, =
but also says that the entity should refer to the new resource. It was my a=
ssumption that the returned JSON would still have some form of client-entit=
y management URL (whether it's the HAL _links structure or registration_man=
agement_url or something else is still up for debate).
>>
>>  -- Justin
>>
>>
>>
>> On 02/12/2013 10:28 AM, John Bradley wrote:
>>
>> Returning a location header in the 201 ids fine as long as we also have =
the same info as a claim.
>>
>> I think most clients will want to process the JSON and store all the par=
ameters together.  Making them fish out a header makes the W3C happy and is=
 the correct thing to do but taking it from a claim is what developers are =
more comfortable with.
>>
>> John B.
>>
>> On 2013-02-12, at 11:25 AM, Justin Richer <jricher@mitre.org> wrote:
>>
>> I'd be fine with the return from a creation request being a 201 instead =
of a 200.
>>
>>  -- Justin
>>
>> On 02/11/2013 06:33 PM, Richard Harrington wrote:
>>
>> Since the request is an HTTP POST and a resource is created (http://www.=
w3.org/Protocols/rfc2616/rfc2616-sec9.html#sec9.5) the response should be a=
n HTTP 201 Created (http://www.w3.org/Protocols/rfc2616/rfc2616-sec10.html#=
sec10.2.2) which is supposed to include the location of the newly created r=
esource.
>>
>> This is a good pattern to follow since, as you say, it does provide flex=
ibility.
>>
>>
>>
>> On Feb 11, 2013, at 1:14 PM, Justin Richer <jricher@mitre.org> wrote:
>>
>> Draft -05 of OAuth Dynamic Client Registration [1] returns a URL pointer=
 for the client to perform update and secret rotation actions. This functio=
nality arose from discussions on the list about moving towards a more RESTf=
ul pattern, and Nat Sakimura proposed this approach in the OpenID Connect W=
orking Group. This URL may be distinct from the Client Registration Endpoin=
t URL, but draft -05 makes no promises as to its content, form, or structur=
e, though it does contain implementor's notes on possible methods.
>>
>> Two questions arise from this change:
>> - The semantics of returning the client manipulation URL
>> - The syntax (derived from HAL for JSON [2], an individual I-D
>> submission)
>>
>> On semantics:
>>
>> Pro:
>> - The server has flexibility on how to define the "update" endpoint,
>> sending all clients to one URL, sending different clients to different
>> URLs, or sending clients to a URL with a baked-in query parameter
>> - The client can take the URL as-is and use it for all management
>> operations (ie, it doesn't have to generate or compose the URL based
>> on component parts)
>>
>> Con:
>> - The client must remember one more piece of information from the
>> server at runtime if it wants to do manipulation and management of
>> itself at the server (in addition to client_id, client_secret,
>> registration_access_token, and others)
>>
>> Alternatives include specifying a URL pattern for the server to use and =
all clients to follow, specifying a query parameter for the update action, =
and specifying a separate endpoint entirely and using the presence of items=
 such as client_id and the registration access token to differentiate the r=
equests. Note that *all* of these alternatives can be accommodated using th=
e semantics described above, with the same actions on the client's part.
>>
>>
>> On syntax:
>>
>> Pro:
>> - Follows the designs of RFC5988 for link relations
>> - The HAL format is general, and allows for all kinds of other
>> information to be placed inside the _links structure
>> - Allows for full use of the JSON object to specify advanced
>> operations on the returned endpoint if desired
>>
>> Con:
>> - The rest of OAuth doesn't follow link relation guidelines (though
>> it's been brought up)
>> - The HAL format is general, and allows for all kinds of other
>> information to be placed inside the _links structure
>> - The HAL-JSON document is an expired individual I-D, and it's unclear
>> what wider adoption looks like right now
>>
>> Alternatives include returning the URL as a separate data member (regist=
ration_update_url), using HTTP headers, or using JSON Schema.
>>
>> -- Justin
>>
>>
>>
>> [1] http://tools.ietf.org/html/draft-ietf-oauth-dyn-reg-05
>> [2] http://tools.ietf.org/html/draft-kelly-json-hal-03
>> _______________________________________________
>> OAuth mailing list
>> OAuth@ietf.org
>> https://www.ietf.org/mailman/listinfo/oauth
>>
>>
>> _______________________________________________
>> OAuth mailing list
>> OAuth@ietf.org
>> https://www.ietf.org/mailman/listinfo/oauth
>>
>>
>>
>>
>> _______________________________________________
>> OAuth mailing list
>> OAuth@ietf.org
>> https://www.ietf.org/mailman/listinfo/oauth
>>
>
>
>
> --
> Nat Sakimura (=3Dnat)
> Chairman, OpenID Foundation
> http://nat.sakimura.org/
> @_nat_en
> _______________________________________________
> OAuth mailing list
> OAuth@ietf.org
> https://www.ietf.org/mailman/listinfo/oauth



--=20
Nat Sakimura (=3Dnat)
Chairman, OpenID Foundation
http://nat.sakimura.org/
@_nat_en

From sakimura@gmail.com  Tue Feb 12 13:07:52 2013
Return-Path: <sakimura@gmail.com>
X-Original-To: oauth@ietfa.amsl.com
Delivered-To: oauth@ietfa.amsl.com
Received: from localhost (localhost [127.0.0.1]) by ietfa.amsl.com (Postfix) with ESMTP id A58A521F8C2B for <oauth@ietfa.amsl.com>; Tue, 12 Feb 2013 13:07:52 -0800 (PST)
X-Virus-Scanned: amavisd-new at amsl.com
X-Spam-Flag: NO
X-Spam-Score: -2.222
X-Spam-Level: 
X-Spam-Status: No, score=-2.222 tagged_above=-999 required=5 tests=[AWL=0.378,  BAYES_00=-2.599, NO_RELAYS=-0.001]
Received: from mail.ietf.org ([12.22.58.30]) by localhost (ietfa.amsl.com [127.0.0.1]) (amavisd-new, port 10024) with ESMTP id kCmtrbpvYhYN for <oauth@ietfa.amsl.com>; Tue, 12 Feb 2013 13:07:51 -0800 (PST)
Received: from mail-la0-x236.google.com (la-in-x0236.1e100.net [IPv6:2a00:1450:4010:c03::236]) by ietfa.amsl.com (Postfix) with ESMTP id 24A3821F8BC9 for <oauth@ietf.org>; Tue, 12 Feb 2013 13:07:49 -0800 (PST)
Received: by mail-la0-f54.google.com with SMTP id gw10so510705lab.41 for <oauth@ietf.org>; Tue, 12 Feb 2013 13:07:47 -0800 (PST)
DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=gmail.com; s=20120113; h=mime-version:x-received:in-reply-to:references:date:message-id :subject:from:to:cc:content-type:content-transfer-encoding; bh=3RNR2N51prPHMxN7g53F8VM1pxxGCi0XK1OinFb9TpQ=; b=N2foU8G+zHwP/oNdIa5vAuKRCrbb6GdVDt/Rg3cr1uWxGI6ESjGVP7t0S1QTzVtv8w +6+vuKD3A79/4b04miP75YE9h5n4ZRrimeZEou7nr3zdKTwj3Cxk6nK0S09TEqytyVLb 4Ge/BoZkpYqUWfZJwv5qYfvR4UFE+GsTPJvdt3I/CGZRcSekQqeKivTrlrY3WSDCCWZ1 3savqKECGoh1fjnAqXbT7bldFZpoAKuc8odUS5MflEVUZtBc9amSH2b5C9i0sVB4fEGb y1M06RZ04LIhyY+cascGlaUWL0lDjrD+NyrBdQRMz3lpJ71voreXDs2YxgQ3y7dNcUVk X3VA==
MIME-Version: 1.0
X-Received: by 10.112.29.1 with SMTP id f1mr4892462lbh.30.1360703267349; Tue, 12 Feb 2013 13:07:47 -0800 (PST)
Received: by 10.112.14.44 with HTTP; Tue, 12 Feb 2013 13:07:47 -0800 (PST)
In-Reply-To: <498782B5-9FFA-47F2-A21D-5FDF842C7B6B@ve7jtb.com>
References: <51195F3B.1010701@mitre.org> <4E1F6AAD24975D4BA5B168042967394367443A16@TK5EX14MBXC285.redmond.corp.microsoft.com> <511A98DE.4030507@mitre.org> <9309CDB3-8AEE-428D-A7F0-5DAC45EFD44C@ve7jtb.com> <CA+ZpN27U5MB0sbEw=RdVe_YiESUnkjsAmBJezSVg2FafEi8OJQ@mail.gmail.com> <040A3633-A51F-4B17-8019-5DEEC349F39C@ve7jtb.com> <511A9F1C.1010504@mitre.org> <025E3AC8-7F84-410A-A4FF-5FBBD305EA83@ve7jtb.com> <511AA331.2060207@mitre.org> <498782B5-9FFA-47F2-A21D-5FDF842C7B6B@ve7jtb.com>
Date: Wed, 13 Feb 2013 06:07:47 +0900
Message-ID: <CABzCy2DZgsF29B3UUFGk24EY+h34aHnTLYL87jaHn+D8=QkP_Q@mail.gmail.com>
From: Nat Sakimura <sakimura@gmail.com>
To: John Bradley <ve7jtb@ve7jtb.com>
Content-Type: text/plain; charset=windows-1252
Content-Transfer-Encoding: quoted-printable
Cc: "oauth@ietf.org" <oauth@ietf.org>
Subject: Re: [OAUTH-WG] Registration: JSON Encoded Input
X-BeenThere: oauth@ietf.org
X-Mailman-Version: 2.1.12
Precedence: list
List-Id: OAUTH WG <oauth.ietf.org>
List-Unsubscribe: <https://www.ietf.org/mailman/options/oauth>, <mailto:oauth-request@ietf.org?subject=unsubscribe>
List-Archive: <http://www.ietf.org/mail-archive/web/oauth>
List-Post: <mailto:oauth@ietf.org>
List-Help: <mailto:oauth-request@ietf.org?subject=help>
List-Subscribe: <https://www.ietf.org/mailman/listinfo/oauth>, <mailto:oauth-request@ietf.org?subject=subscribe>
X-List-Received-Date: Tue, 12 Feb 2013 21:07:52 -0000

If we are sending JSON, then the content-type should be application/json, o=
r
some variant of it if needed be (e.g. application/oauthreg+json etc.
-- I do not think we need it, though.)

I do not like posting it with other content-type unless we explicitly
create a variable and
define a serialization method (such as JWT).

My original comment was just asking to get some feedback from the developer=
s.
Depending on the answer, we may want to put some explanatory notes on it.

My preference is to send JSON.

BTW, would there be a need for signing the registration data?

Nat

2013/2/13 John Bradley <ve7jtb@ve7jtb.com>:
> I am OK with that language.
>
> On 2013-02-12, at 5:16 PM, Justin Richer <jricher@mitre.org> wrote:
>
> I would then request that people come up with a real example of where it
> *won't* work. I've seen workable solutions, and even some automagic ones,=
 on
> several major platforms in which one would write a web server/AS: PHP, Ja=
va
> (Spring and raw servlets), Ruby (rails and sinatra), and Node.js can all =
do
> it.
>
> I would suggest the following text (adapted from what's in -05 right now)=
 to
> address this:
>
>    The Client sends an HTTP POST to the Client Registration Endpoint
>    with a content type of "application/json". The HTTP Entity Payload is
>    a JSON document consisting of a JSON object and all parameters as top-
>    level members of that JSON object.
>
>
> (Would have to be tweaked for the PUT/PATCH verbs but it's effectively th=
e
> same.)
>
>
>  -- Justin
>
> On 02/12/2013 03:07 PM, John Bradley wrote:
>
> I am fine with that as long as all the IdP tools have access to the entit=
y
> body in some reasonable way.   That seems like the most sensible thing.
>
> However given the number of people talking about encoding it in a form to
> get access to it,  we should check that it works for everyone.
>
> John B.
> On 2013-02-12, at 4:59 PM, Justin Richer <jricher@mitre.org> wrote:
>
> If that's the question, then my proposal is the Content-type is
> "application/json" and the HTTP Entity Body is the JSON document. No form
> posts or parameter names to be had here.
>
>  -- Justin
>
> On 02/12/2013 02:58 PM, John Bradley wrote:
>
> Some people apparently encode the JSON as the key in a form POST,  some
> people do a form POST with a special key and the JSON as the value.
>
> There appear to be a number of theories in the wild.   I am not an expert=
 I
> just looked up code examples from several sources stack overflow and the
> like.
>
> We probably need to get input from developers who have experience working
> with different frameworks.   I think the differences have to do with
> decoding it at the receiver.
>
> We originally had registration posting JSON but we changed form encoding =
as
> that worked in all environments.   We just need to be sure we are not
> creating problems for people with the change back.
>
>
> John B.
>
> On 2013-02-12, at 4:48 PM, Tim Bray <twbray@google.com> wrote:
>
>
>
> On Tue, Feb 12, 2013 at 11:44 AM, John Bradley <ve7jtb@ve7jtb.com> wrote:
>>
>> Nat and I hashed out the pro's and cons of JSON requests.
>>
>> If we POST or PUT a JSON object we need to be specific as there rare
>> several ways to do it that may work better or worse depending on the
>> receiver.
>> This needs to be looked over and one picked.
>
>
> Hm?  Not following on =93several ways=94, I=92d have thought that POSTing=
 JSON is
> just POSTing JSON, must be missing something. -T
>
>>
>>
>> In the other thread about the server returning the update URI and being
>> able to encode the client in that if it needs to takes care of Servers t=
hat
>> need that info in query parameters or the path to do the routing.
>>
>> The use of structure can be used to enhance readability and parsing of t=
he
>> input, and output.
>>
>> However we need to temper our urge to apply structure to everything.
>>
>> IT needs to be applied carefully otherwise we start looking like crazies=
.
>>
>> If we do it cautiously I am in favour of JSON as input.
>>
>> John B.
>>
>> On 2013-02-12, at 4:32 PM, Justin Richer <jricher@mitre.org> wrote:
>>
>> Thanks for forwarding that, Mike. I'll paste in my response to Nat's
>> concern here as well:
>>
>> It's an increasingly well known pattern that has reasonable support on t=
he
>> server side. For PHP, I was able to find the above example via the top h=
it
>> on Stack Overflow. In Ruby, it's a matter of something like:
>>
>> JSON.parse(request.body.read)
>>
>> depending on the web app framework. On Java/Spring, it's a matter of
>> injecting the entity body as a string and handing it to a parser (Gson i=
n
>> this case):
>>
>> public String doApi(@RequestBody String jsonString) { JsonObject json =
=3D
>> new JsonParser().parse(jsonString).getAsJsonObject();
>>
>> It's a similar read/parse setup in Node.js as well.
>>
>> It's true that in all of these cases you don't get to make use of the
>> routing or data binding facilities (though in Spring you can do that for
>> simpler domain objects using a ModelBinding), so you don't get niceities
>> like the $_POST array in PHP handed to you. This is why I don't think it=
's a
>> good idea at all to switch functionality based on the contents of the JS=
ON
>> object. It should be a domain object only, which is what it would be in =
this
>> case.
>>
>> I think that the positives of using JSON from the client's perspective a=
nd
>> the overall protocol design far outweigh the slightly increased
>> implementation cost at the server.
>>
>>
>>
>>  -- Justin
>>
>> On 02/12/2013 02:11 PM, Mike Jones wrote:
>>
>> FYI, this issue is also being discussed as an OpenID Connect issue at
>> https://bitbucket.org/openid/connect/issue/747.  I think that Nat's rece=
nt
>> comment there bears repeating on this list:
>>
>>
>>
>> Nat Sakimura:
>>
>>
>>
>> Not so sure. For example, PHP cannot get the JSON object form
>> application/json POST in $_POST.
>>
>>
>>
>> It is OK to have a parameter like "request" that holds JSON. Then, you c=
an
>> get to it from $_POST['request']. However, if you POST the JSON as the P=
OST
>> body, then you would have to call a low level function in the form of:
>>
>>
>>
>>
>> ```
>>
>> #!php
>>
>>
>>
>> $file =3D file_get_contents('php://input'); $x =3D json_decode($file); `=
``
>>
>>
>>
>> Not that it is harder, but it is much less known. Many PHP programmers
>> will certainly goes "???".
>>
>>
>>
>> We need to check what would be the cases for other scripting languages
>> before making the final decision.
>>
>>
>>
>>                                                             -- Mike
>>
>>
>>
>> -----Original Message-----
>> From: oauth-bounces@ietf.org [mailto:oauth-bounces@ietf.org] On Behalf O=
f
>> Justin Richer
>> Sent: Monday, February 11, 2013 1:15 PM
>> To: oauth@ietf.org
>> Subject: [OAUTH-WG] Registration: JSON Encoded Input
>>
>>
>>
>> Draft -05 of OAuth Dynamic Client Registration [1] switched from a
>> form-encoded input that had been used by drafts -01 through -04 to a JSO=
N
>> encoded input that was used originally in -00. Note that all versions ke=
ep
>> JSON-encoded output from all operations.
>>
>>
>>
>> Pro:
>>
>>   - JSON gives us a rich data structure so that things such as lists,
>> numbers, nulls, and objects can be represented natively
>>
>>   - Allows for parallelism between the input to the endpoint and output
>> from the endpoint, reducing possible translation errors between the two
>>
>>   - JSON specifies UTF8 encoding for all strings, forms may have many
>> different encodings
>>
>>   - JSON has minimal character escaping required for most strings, forms
>> require escaping for common characters such as space, slash, comma, etc.
>>
>>
>>
>> Con:
>>
>>   - the rest of OAuth is form-in/JSON-out
>>
>>   - nothing else in OAuth requires the Client to create a JSON object,
>> merely to parse one
>>
>>   - form-in/JSON-out is a very widely established pattern on the web tod=
ay
>>
>>   - Client information (client_name, client_id, etc.) is conflated with
>> access information (registration_access_token, _links, expires_at, etc.)=
 in
>> root level of the same JSON object, leaving the client to decide what ne=
eds
>> to (can?) be sent back to the server for update operations.
>>
>>
>>
>>
>> Alternatives include any number of data encoding schemes, including form
>> (like the old drafts), XML, ASN.1, etc.
>>
>>
>>
>>
>>   -- Justin
>>
>>
>>
>> [1] http://tools.ietf.org/html/draft-ietf-oauth-dyn-reg-05
>>
>> _______________________________________________
>>
>> OAuth mailing list
>>
>> OAuth@ietf.org
>>
>> https://www.ietf.org/mailman/listinfo/oauth
>>
>>
>> _______________________________________________
>> OAuth mailing list
>> OAuth@ietf.org
>> https://www.ietf.org/mailman/listinfo/oauth
>>
>>
>>
>> _______________________________________________
>> OAuth mailing list
>> OAuth@ietf.org
>> https://www.ietf.org/mailman/listinfo/oauth
>>
>
>
>
>
>
>
>
> _______________________________________________
> OAuth mailing list
> OAuth@ietf.org
> https://www.ietf.org/mailman/listinfo/oauth
>



--=20
Nat Sakimura (=3Dnat)
Chairman, OpenID Foundation
http://nat.sakimura.org/
@_nat_en

From tonynad@microsoft.com  Tue Feb 12 14:52:32 2013
Return-Path: <tonynad@microsoft.com>
X-Original-To: oauth@ietfa.amsl.com
Delivered-To: oauth@ietfa.amsl.com
Received: from localhost (localhost [127.0.0.1]) by ietfa.amsl.com (Postfix) with ESMTP id 3651E21F8BC5 for <oauth@ietfa.amsl.com>; Tue, 12 Feb 2013 14:52:32 -0800 (PST)
X-Virus-Scanned: amavisd-new at amsl.com
X-Spam-Flag: NO
X-Spam-Score: 0.833
X-Spam-Level: 
X-Spam-Status: No, score=0.833 tagged_above=-999 required=5 tests=[AWL=-0.300,  BAYES_00=-2.599, J_CHICKENPOX_44=0.6, UNRESOLVED_TEMPLATE=3.132]
Received: from mail.ietf.org ([12.22.58.30]) by localhost (ietfa.amsl.com [127.0.0.1]) (amavisd-new, port 10024) with ESMTP id SZGls5-o3S3n for <oauth@ietfa.amsl.com>; Tue, 12 Feb 2013 14:52:30 -0800 (PST)
Received: from na01-by2-obe.outbound.protection.outlook.com (na01-by2-obe.ptr.protection.outlook.com [207.46.100.25]) by ietfa.amsl.com (Postfix) with ESMTP id A299B21F89D5 for <oauth@ietf.org>; Tue, 12 Feb 2013 14:52:20 -0800 (PST)
Received: from BY2FFO11FD006.protection.gbl (10.1.15.204) by BY2FFO11HUB021.protection.gbl (10.1.14.108) with Microsoft SMTP Server (TLS) id 15.0.620.12; Tue, 12 Feb 2013 22:51:33 +0000
Received: from TK5EX14HUBC101.redmond.corp.microsoft.com (131.107.125.37) by BY2FFO11FD006.mail.protection.outlook.com (10.1.14.127) with Microsoft SMTP Server (TLS) id 15.0.620.12 via Frontend Transport; Tue, 12 Feb 2013 22:51:26 +0000
Received: from db3outboundpool.messaging.microsoft.com (157.54.51.112) by mail.microsoft.com (157.54.7.153) with Microsoft SMTP Server (TLS) id 14.2.318.3; Tue, 12 Feb 2013 22:43:31 +0000
Received: from mail50-db3-R.bigfish.com (10.3.81.229) by DB3EHSOBE004.bigfish.com (10.3.84.24) with Microsoft SMTP Server id 14.1.225.23; Tue, 12 Feb 2013 22:42:09 +0000
Received: from mail50-db3 (localhost [127.0.0.1])	by mail50-db3-R.bigfish.com (Postfix) with ESMTP id C670C48030F	for <oauth@ietf.org.FOPE.CONNECTOR.OVERRIDE>; Tue, 12 Feb 2013 22:42:09 +0000 (UTC)
X-Forefront-Antispam-Report-Untrusted: CIP:157.56.240.21; KIP:(null); UIP:(null); (null); H:BL2PRD0310HT005.namprd03.prod.outlook.com; R:internal; EFV:INT
X-SpamScore: -24
X-BigFish: PS-24(zzbb2dIdb82h98dI9371I936eI542I1432I1453I77f5h609Izz1f42h1ee6h1de0h1202h1e76h1d1ah1d2ah1082kzz1033IL17326ah8275bh8275dh15d4Iz31h2a8h668h839h944hd24hf0ah1220h1288h12a5h12a9h12bdh137ah13b6h1441h1504h1537h153bh162dh1631h1758h18e1h1946h19b5h9a9j1155h)
Received-SPF: softfail (mail50-db3: transitioning domain of microsoft.com does not designate 157.56.240.21 as permitted sender) client-ip=157.56.240.21; envelope-from=tonynad@microsoft.com; helo=BL2PRD0310HT005.namprd03.prod.outlook.com ; .outlook.com ; 
X-Forefront-Antispam-Report-Untrusted: SFV:SKI; SFS:; DIR:OUT; SFP:; SCL:-1; SRVR:BY2PR03MB043; H:BY2PR03MB041.namprd03.prod.outlook.com; LANG:en; 
Received: from mail50-db3 (localhost.localdomain [127.0.0.1]) by mail50-db3 (MessageSwitch) id 1360708927901266_24579; Tue, 12 Feb 2013 22:42:07 +0000 (UTC)
Received: from DB3EHSMHS007.bigfish.com (unknown [10.3.81.245])	by mail50-db3.bigfish.com (Postfix) with ESMTP id D83D6200065; Tue, 12 Feb 2013 22:42:07 +0000 (UTC)
Received: from BL2PRD0310HT005.namprd03.prod.outlook.com (157.56.240.21) by DB3EHSMHS007.bigfish.com (10.3.87.107) with Microsoft SMTP Server (TLS) id 14.1.225.23; Tue, 12 Feb 2013 22:42:06 +0000
Received: from BY2PR03MB043.namprd03.prod.outlook.com (10.255.241.147) by BL2PRD0310HT005.namprd03.prod.outlook.com (10.255.97.40) with Microsoft SMTP Server (TLS) id 14.16.263.1; Tue, 12 Feb 2013 22:42:05 +0000
Received: from BY2PR03MB041.namprd03.prod.outlook.com (10.255.241.145) by BY2PR03MB043.namprd03.prod.outlook.com (10.255.241.147) with Microsoft SMTP Server (TLS) id 15.0.620.10; Tue, 12 Feb 2013 22:42:02 +0000
Received: from BY2PR03MB041.namprd03.prod.outlook.com ([169.254.8.69]) by BY2PR03MB041.namprd03.prod.outlook.com ([169.254.8.69]) with mapi id 15.00.0620.005; Tue, 12 Feb 2013 22:42:02 +0000
From: Anthony Nadalin <tonynad@microsoft.com>
To: Nat Sakimura <sakimura@gmail.com>, Justin Richer <jricher@mitre.org>
Thread-Topic: [OAUTH-WG] Registration: HAL _links structure and client self-URL
Thread-Index: AQHOCV96qns/IysTqUmgABLfw3CUSph20RhQ
Date: Tue, 12 Feb 2013 22:42:01 +0000
Message-ID: <0100c90514ff45a2b1a659784c992c91@BY2PR03MB041.namprd03.prod.outlook.com>
References: <51195F3D.1050006@mitre.org> <222C28CB-7F6F-4BC3-8692-40404C2DC2D3@maymount.com> <511A50C7.8080102@mitre.org> <B256FD2D-5ED7-4306-A3BF-E6A196862B2E@ve7jtb.com>	<511A6C49.50801@mitre.org> <CABzCy2CdxaNOvho2uyuc83qHm4WKHVfToC_n6QqAS3fqTGzU2w@mail.gmail.com> <4E1F6AAD24975D4BA5B168042967394367443A52@TK5EX14MBXC285.redmond.corp.microsoft.com> <9EDD79AA-5104-49CC-A528-C5A1A1777106@ve7jtb.com> <511A9E58.1040606@mitre.org> <715762BE-886B-4E93-8E35-6356F0A18224@ve7jtb.com>	<511AA0A7.30302@mitre.org> <CABzCy2B1dA0dHMv1hWfBXLdqqKqJ0CD1bPcMOEQBCH6-OggZmA@mail.gmail.com>
In-Reply-To: <CABzCy2B1dA0dHMv1hWfBXLdqqKqJ0CD1bPcMOEQBCH6-OggZmA@mail.gmail.com>
Accept-Language: en-US
Content-Language: en-US
X-MS-Has-Attach: 
X-MS-TNEF-Correlator: 
x-originating-ip: [10.255.124.4]
Content-Type: text/plain; charset="us-ascii"
Content-Transfer-Encoding: quoted-printable
MIME-Version: 1.0
X-OrganizationHeadersPreserved: BY2PR03MB043.namprd03.prod.outlook.com
X-FOPE-CONNECTOR: Id%0$Dn%*$RO%0$TLS%0$FQDN%$TlsDn%
X-FOPE-CONNECTOR: Id%59$Dn%IETF.ORG$RO%2$TLS%6$FQDN%corpf5vips-237160.customer.frontbridge.com$TlsDn%
X-FOPE-CONNECTOR: Id%59$Dn%MITRE.ORG$RO%2$TLS%6$FQDN%corpf5vips-237160.customer.frontbridge.com$TlsDn%
X-FOPE-CONNECTOR: Id%59$Dn%GMAIL.COM$RO%2$TLS%6$FQDN%corpf5vips-237160.customer.frontbridge.com$TlsDn%
X-CrossPremisesHeadersPromoted: TK5EX14HUBC101.redmond.corp.microsoft.com
X-CrossPremisesHeadersFiltered: TK5EX14HUBC101.redmond.corp.microsoft.com
X-Forefront-Antispam-Report: CIP:131.107.125.37; CTRY:US; IPV:CAL; IPV:NLI; EFV:NLI; SFV:NSPM; SFS:(189002)(24454001)(15454002)(52034002)(199002)(55885001)(377454001)(377424002)(479174001)(13464002)(51704002)(16676001)(79102001)(44976002)(33646001)(15202345001)(20776003)(23726001)(74502001)(47446002)(4396001)(49866001)(47736001)(76482001)(74662001)(46102001)(80022001)(47976001)(46406002)(47776003)(65816001)(50986001)(54356001)(63696002)(51856001)(50466001)(56816002)(307094002)(6806001)(56776001)(31966008)(5343635001)(5343655001)(54316002)(53806001)(59766001)(77982001)(561944001)(42262001)(24736002); DIR:OUT; SFP:; SCL:1; SRVR:BY2FFO11HUB021; H:TK5EX14HUBC101.redmond.corp.microsoft.com; RD:InfoDomainNonexistent; MX:1; A:1; LANG:; 
X-OriginatorOrg: microsoft.onmicrosoft.com
X-Forefront-PRVS: 0755F54DD9
Cc: "oauth@ietf.org" <oauth@ietf.org>
Subject: Re: [OAUTH-WG] Registration: HAL _links structure and client	self-URL
X-BeenThere: oauth@ietf.org
X-Mailman-Version: 2.1.12
Precedence: list
List-Id: OAUTH WG <oauth.ietf.org>
List-Unsubscribe: <https://www.ietf.org/mailman/options/oauth>, <mailto:oauth-request@ietf.org?subject=unsubscribe>
List-Archive: <http://www.ietf.org/mail-archive/web/oauth>
List-Post: <mailto:oauth@ietf.org>
List-Help: <mailto:oauth-request@ietf.org?subject=help>
List-Subscribe: <https://www.ietf.org/mailman/listinfo/oauth>, <mailto:oauth-request@ietf.org?subject=subscribe>
X-List-Received-Date: Tue, 12 Feb 2013 22:52:32 -0000

I doubt that the ToS and Privacy Policy will be different for a given Trust=
 Framework provider, as these are all bilateral agreements, I do expect the=
se to be different between trust framework providers though

-----Original Message-----
From: oauth-bounces@ietf.org [mailto:oauth-bounces@ietf.org] On Behalf Of N=
at Sakimura
Sent: Tuesday, February 12, 2013 12:27 PM
To: Justin Richer
Cc: oauth@ietf.org
Subject: Re: [OAUTH-WG] Registration: HAL _links structure and client self-=
URL

Let me explain a bit more.

A trust framework may supply several ToS and Privacy Policy options much li=
ke CC licenses.
If we want to really automate the things, you really need it.
Otherwise, the service's owner need to go read the ToS and Privacy Policy i=
n person and makes the dynamic registration not so dynamic.
Those option should be available through Discovery.

In Discovery, the server may provide multiple options, out of which the cli=
ent picks one. Think of something like Basic and Premium service. In the Re=
gistration response, then, should be the one that was picked by the client =
/ assigned by the server.

(The notion is closely related to the implicit consent model for the end us=
ers, which is in active discussion in bunch of places, by the way.)

Nat

2013/2/13 Justin Richer <jricher@mitre.org>:
> I agree with the previous statement that the AS's privacy/TOS would be=20
> better handled through discovery, since it's not likely to change per=20
> client instance.
>
>  -- Justin
>
>
> On 02/12/2013 03:04 PM, John Bradley wrote:
>>
>> There are two TOS and privacy policies.
>>
>> One for the AS that the client is agreeing to by registering.  Will=20
>> it hold up in court?  don't know Facebook is doing this.
>> The link would be a reference to a human readable file that the=20
>> client
>> (RP) can have someone look over before using the connection.
>> This policy may relate to how long the client can cache info etc.
>>
>> The other is the privacy policy of the client that may be presented=20
>> as a click through from the Authorization server.  In general the=20
>> user is not explicitly accepting this, only implicitly accepting it=20
>> by continuing to the RP after having been given a chance to look at it i=
f they want.
>>
>> These are very US fuse on privacy but ignoring them is probably a mistak=
e.
>>
>> John B.
>> On 2013-02-12, at 4:56 PM, Justin Richer <jricher@mitre.org> wrote:
>>
>>> One question though: How exactly would the client, a software=20
>>> application, agree to the TOS? Is it supposed to fetch the content=20
>>> of the tos_url and do some processing on it? I wasn't under the=20
>>> impression that the tos_url contents were machine readable. Is it=20
>>> supposed to present that to the user somehow? It seems that's a=20
>>> better thing for the server to do at Authorization time, since it's got=
 the user's attention.
>>>
>>> Remember, this is meant to be for *automated* registration. The=20
>>> developer of the Client has no say at this stage of the game.
>>>
>>> So, I think this is a bit of a red herring, to be honest.
>>>
>>> -- Justin
>>>
>>> On 02/12/2013 02:52 PM, John Bradley wrote:
>>>>
>>>> The current privacy policy and TOS URL in registration are the ones=20
>>>> for the Client.
>>>>
>>>> Nat and I discussed adding ones for the Authorization server that=20
>>>> the client agrees to as separate from ones that the user is agreeing t=
o.
>>>>
>>>> The Authorization servers TOS would be in discovery and perhaps in=20
>>>> the registration response to indicate what the client is agreeing to.
>>>>
>>>> As there rare standard relationships that cover this links Nat was=20
>>>> speculating that they could be part of the _links object.
>>>>
>>>> That aside confirming the terms of service that the client has=20
>>>> agreed to in some way is probably a good thing in the registration res=
ponse.
>>>>
>>>> John B.
>>>>
>>>> On 2013-02-12, at 4:25 PM, Mike Jones <Michael.Jones@microsoft.com>
>>>> wrote:
>>>>
>>>>> Part of the REST/JSON philosophy is that interfaces should be as=20
>>>>> simple and developer-friendly as possible.  XML was rejected by=20
>>>>> developers, in part, because of the self-describing nature of the=20
>>>>> structure, which required extra syntax that was often not useful=20
>>>>> in practice.  Trying to re-impose that structure using extra JSON=20
>>>>> syntax conventions is just asking developers to have an allergic=20
>>>>> reaction to our specs upon encountering them.  The syntactic=20
>>>>> complexity and *surprise factor* isn't worth the limited semantic ben=
efits of using "_links".
>>>>>
>>>>> Since you bring up privacy policy and terms of service, I'll note=20
>>>>> that the OAuth Dynamic Registration spec already has these fields=20
>>>>> to address
>>>>> those:
>>>>>         policy_url
>>>>>         tos_url
>>>>>
>>>>> Those have been working fine for OpenID Connect too.  There's no=20
>>>>> need to likewise convolve them to add the extra syntax that you descr=
ibe below.
>>>>>
>>>>> (BTW, in a private thread, John Bradley pointed out that what the=20
>>>>> two of you talked about in person was actually the possibility of=20
>>>>> adding privacy policy and terms of service declarations at=20
>>>>> *discovery time*, rather than registration time.  That's a=20
>>>>> different topic, which we should discuss separately, if you want=20
>>>>> to pursue that.)
>>>>>
>>>>>                                 Best wishes,
>>>>>                                 -- Mike
>>>>>
>>>>> -----Original Message-----
>>>>> From: oauth-bounces@ietf.org [mailto:oauth-bounces@ietf.org] On=20
>>>>> Behalf Of Nat Sakimura
>>>>> Sent: Tuesday, February 12, 2013 9:11 AM
>>>>> To: Justin Richer; oauth@ietf.org
>>>>> Subject: Re: [OAUTH-WG] Registration: HAL _links structure and=20
>>>>> client self-URL
>>>>>
>>>>> Actually, if it is to return it in the HTTP header, then it should=20
>>>>> also use the RFC5988 Web Linking format.
>>>>> Now, that is nice to have, but for many JSON programmers, I agree=20
>>>>> that it would be a hassle to obtain the header and store them in=20
>>>>> addition to the JSON. So, it is nicer to have it in JSON body.
>>>>>
>>>>> Re: Is "_links.self.href" grossly complex over=20
>>>>> "registration_access_url"?
>>>>>
>>>>> I do not think so. Accessing a flat top level parameter such as=20
>>>>> registration_access_url and _links.self.href does not make any=20
>>>>> difference from a client programmers point of view. That's a=20
>>>>> beauty of JSON. Both can be treated as a parameter name. Doing a=20
>>>>> group operation on the links makes difference though: the=20
>>>>> structured one is easier since you can just operate on _links=20
>>>>> while in case of the top level parameters, you have to have an=20
>>>>> explicit list of them and do the matches. (See below for the necessit=
y for the grouping).
>>>>>
>>>>> I and John discussed this for at least half an hour F2F last week,=20
>>>>> both technically and from operation/legal point of view, for=20
>>>>> OpenID Connect Registration.
>>>>> Similar points could be made to OAuth dyn reg.
>>>>>
>>>>> Here is what we have discussed:
>>>>>
>>>>> When dynamically registering the client to the server, the server=20
>>>>> probably needs to return the following:
>>>>>
>>>>>   * terms-of-service (terms of service of the server to the client)
>>>>>   * privacy-policy (privacy policy of the server to the client)
>>>>>
>>>>> Both are defined in RFC5988/IANA Link Relations registry.
>>>>>
>>>>>
>>>>> They should be returned together with
>>>>>
>>>>>   * self.href
>>>>>
>>>>> which is also defined in RFC5988/IANA Link Relations registry.
>>>>>
>>>>> There are several ways to do it.
>>>>>
>>>>>   * Return these using RFC5988 (HTTP Header)
>>>>>   * Return these in entity body
>>>>>       * Use HAL (or OAuth-meta)/JSON Schema
>>>>>       * Use something else (e.g., a top level items)
>>>>>
>>>>> Returning it in the entity body has several advantage over HTTP heade=
r:
>>>>>
>>>>>   * They can be captured in one call;
>>>>>   * They are protocol agnostic;
>>>>>
>>>>> We determined that these advantages outweighs the disadvantage of=20
>>>>> creating a new standard.
>>>>>
>>>>> The question becomes then whether to:
>>>>>
>>>>>   * Use HAL (or OAuth-meta)/JSON Schema
>>>>>   * Use something else (e.g., a top level items)
>>>>>
>>>>> First, we have to consider what needs to be returned in the=20
>>>>> link/relationship category. If it were just _links.self.href, then=20
>>>>> grouping probably does not make sense. However, since we have=20
>>>>> terms-of-service and privacy-policy as well already, it may well make=
 sense.
>>>>>
>>>>> Moreover, when we think of a multi-tenant authorization server=20
>>>>> that may want to use different OAuth authz and token endpoints for=20
>>>>> different tennants, it would be better to be able to return those=20
>>>>> in the registration response. Then, it would make sense to=20
>>>>> register OAuth authz and token endpoints as rel type in the IANA=20
>>>>> registry (like Bill Mills is trying to
>>>>> do) and use them in a uniform manner. Note: these per tenant=20
>>>>> endpoints may support different scopes etc. as well. Then, these=20
>>>>> has to be coupled with the URIs. That is why all of=20
>>>>> RFC5988/HAL/JSON Schema uses href instead of just having the URL=20
>>>>> as the value of the parameter. The semantic relationship would=20
>>>>> often have an associated URI, and other parameters that goes with it.
>>>>>
>>>>> e.g.:
>>>>>
>>>>> {
>>>>>     "_links": {
>>>>>         "terms-of-service": {
>>>>>             "href": "https: //server.example.com/tos"
>>>>>         },
>>>>>         "privacy-policy": {
>>>>>             "href": "https: //server.example.com/pp"
>>>>>         },
>>>>>         "self": {
>>>>>             "href": "https: //server.example.com/clients/1234",
>>>>>             "authorize": "Bearer"
>>>>>         },
>>>>>         "oauth_authz": {
>>>>>             "href": "https: //server.example.com/authz",
>>>>>             "scopes": "openid profile email",
>>>>>             "response_types": [
>>>>>                 "token id_token",
>>>>>                 "code id_token",
>>>>>                 "token",
>>>>>                 "code"
>>>>>             ]
>>>>>         },
>>>>>         "oauth_token": {
>>>>>             "href": "https: //server.example.com/token",
>>>>>             "authorize": "Basic"
>>>>>         }
>>>>>     }
>>>>> }
>>>>>
>>>>> In short, there are bunch of link relations that needs to be=20
>>>>> returned with additional parameters.
>>>>> Grouping them seems to make sense.
>>>>>
>>>>> Considering all these, John and I came to the conclusion that the=20
>>>>> HAL type syntax would probably make more sense.
>>>>> (Note: JSON Schema syntax does not make the parameter access as=20
>>>>> easy as
>>>>> HAL.)
>>>>>
>>>>> In fact, Mike Kelly (the author of HAL) and I have just submit a=20
>>>>> new version of draft-sakimura-oauth-meta
>>>>>
>>>>>    http://tools.ietf.org/html/draft-sakimura-oauth-meta-02
>>>>>
>>>>> The proposal was discussed at IETF 85 OAuth WG and the chairs=20
>>>>> asked to submit the draft.
>>>>> The -00 appeared in December, and this -02 has some simplification=20
>>>>> and the addition of the "operations" inspired by
>>>>> https://tools.ietf.org/html/draft-ietf-scim-api-00#section-3.5 .
>>>>> It is arguably a subset of HAL plus some OAuth specifics.
>>>>> I have not added Discovery response example, but adding them would=20
>>>>> makes even more sense, I think.
>>>>>
>>>>> Cheers,
>>>>>
>>>>> Nat
>>>>>
>>>>>
>>>>> 2013/2/13 Justin Richer <jricher@mitre.org>
>>>>>>
>>>>>> Agreed - I didn't think that header-only was the proposal, but=20
>>>>>> let's be explicit about the returned body always containing the=20
>>>>>> URL. The way I read the 201 definition, it suggests (SHOULD) that=20
>>>>>> you use the location header, but also says that the entity should=20
>>>>>> refer to the new resource. It was my assumption that the returned=20
>>>>>> JSON would still have some form of client-entity management URL=20
>>>>>> (whether it's the HAL _links structure or registration_management_ur=
l or something else is still up for debate).
>>>>>>
>>>>>> -- Justin
>>>>>>
>>>>>>
>>>>>>
>>>>>> On 02/12/2013 10:28 AM, John Bradley wrote:
>>>>>>
>>>>>> Returning a location header in the 201 ids fine as long as we=20
>>>>>> also have the same info as a claim.
>>>>>>
>>>>>> I think most clients will want to process the JSON and store all=20
>>>>>> the parameters together.  Making them fish out a header makes the=20
>>>>>> W3C happy and is the correct thing to do but taking it from a=20
>>>>>> claim is what developers are more comfortable with.
>>>>>>
>>>>>> John B.
>>>>>>
>>>>>> On 2013-02-12, at 11:25 AM, Justin Richer <jricher@mitre.org> wrote:
>>>>>>
>>>>>> I'd be fine with the return from a creation request being a 201=20
>>>>>> instead of a 200.
>>>>>>
>>>>>> -- Justin
>>>>>>
>>>>>> On 02/11/2013 06:33 PM, Richard Harrington wrote:
>>>>>>
>>>>>> Since the request is an HTTP POST and a resource is created
>>>>>> (http://www.w3.org/Protocols/rfc2616/rfc2616-sec9.html#sec9.5)=20
>>>>>> the response should be an HTTP 201 Created
>>>>>> (http://www.w3.org/Protocols/rfc2616/rfc2616-sec10.html#sec10.2.2
>>>>>> ) which is supposed to include the location of the newly created res=
ource.
>>>>>>
>>>>>> This is a good pattern to follow since, as you say, it does=20
>>>>>> provide flexibility.
>>>>>>
>>>>>>
>>>>>>
>>>>>> On Feb 11, 2013, at 1:14 PM, Justin Richer <jricher@mitre.org> wrote=
:
>>>>>>
>>>>>> Draft -05 of OAuth Dynamic Client Registration [1] returns a URL=20
>>>>>> pointer for the client to perform update and secret rotation=20
>>>>>> actions. This functionality arose from discussions on the list=20
>>>>>> about moving towards a more RESTful pattern, and Nat Sakimura=20
>>>>>> proposed this approach in the OpenID Connect Working Group. This=20
>>>>>> URL may be distinct from the Client Registration Endpoint URL,=20
>>>>>> but draft -05 makes no promises as to its content, form, or structur=
e, though it does contain implementor's notes on possible methods.
>>>>>>
>>>>>> Two questions arise from this change:
>>>>>> - The semantics of returning the client manipulation URL
>>>>>> - The syntax (derived from HAL for JSON [2], an individual I-D
>>>>>> submission)
>>>>>>
>>>>>> On semantics:
>>>>>>
>>>>>> Pro:
>>>>>> - The server has flexibility on how to define the "update"=20
>>>>>> endpoint, sending all clients to one URL, sending different=20
>>>>>> clients to different URLs, or sending clients to a URL with a=20
>>>>>> baked-in query parameter
>>>>>> - The client can take the URL as-is and use it for all management=20
>>>>>> operations (ie, it doesn't have to generate or compose the URL=20
>>>>>> based on component parts)
>>>>>>
>>>>>> Con:
>>>>>> - The client must remember one more piece of information from the=20
>>>>>> server at runtime if it wants to do manipulation and management=20
>>>>>> of itself at the server (in addition to client_id, client_secret,=20
>>>>>> registration_access_token, and others)
>>>>>>
>>>>>> Alternatives include specifying a URL pattern for the server to=20
>>>>>> use and all clients to follow, specifying a query parameter for=20
>>>>>> the update action, and specifying a separate endpoint entirely=20
>>>>>> and using the presence of items such as client_id and the=20
>>>>>> registration access token to differentiate the requests. Note=20
>>>>>> that *all* of these alternatives can be accommodated using the=20
>>>>>> semantics described above, with the same actions on the client's par=
t.
>>>>>>
>>>>>>
>>>>>> On syntax:
>>>>>>
>>>>>> Pro:
>>>>>> - Follows the designs of RFC5988 for link relations
>>>>>> - The HAL format is general, and allows for all kinds of other=20
>>>>>> information to be placed inside the _links structure
>>>>>> - Allows for full use of the JSON object to specify advanced=20
>>>>>> operations on the returned endpoint if desired
>>>>>>
>>>>>> Con:
>>>>>> - The rest of OAuth doesn't follow link relation guidelines=20
>>>>>> (though it's been brought up)
>>>>>> - The HAL format is general, and allows for all kinds of other=20
>>>>>> information to be placed inside the _links structure
>>>>>> - The HAL-JSON document is an expired individual I-D, and it's=20
>>>>>> unclear what wider adoption looks like right now
>>>>>>
>>>>>> Alternatives include returning the URL as a separate data member=20
>>>>>> (registration_update_url), using HTTP headers, or using JSON Schema.
>>>>>>
>>>>>> -- Justin
>>>>>>
>>>>>>
>>>>>>
>>>>>> [1] http://tools.ietf.org/html/draft-ietf-oauth-dyn-reg-05
>>>>>> [2] http://tools.ietf.org/html/draft-kelly-json-hal-03
>>>>>> _______________________________________________
>>>>>> OAuth mailing list
>>>>>> OAuth@ietf.org
>>>>>> https://www.ietf.org/mailman/listinfo/oauth
>>>>>>
>>>>>>
>>>>>> _______________________________________________
>>>>>> OAuth mailing list
>>>>>> OAuth@ietf.org
>>>>>> https://www.ietf.org/mailman/listinfo/oauth
>>>>>>
>>>>>>
>>>>>>
>>>>>>
>>>>>> _______________________________________________
>>>>>> OAuth mailing list
>>>>>> OAuth@ietf.org
>>>>>> https://www.ietf.org/mailman/listinfo/oauth
>>>>>>
>>>>>
>>>>> --
>>>>> Nat Sakimura (=3Dnat)
>>>>> Chairman, OpenID Foundation
>>>>> http://nat.sakimura.org/
>>>>> @_nat_en
>>>>> _______________________________________________
>>>>> OAuth mailing list
>>>>> OAuth@ietf.org
>>>>> https://www.ietf.org/mailman/listinfo/oauth
>>>>> _______________________________________________
>>>>> OAuth mailing list
>>>>> OAuth@ietf.org
>>>>> https://www.ietf.org/mailman/listinfo/oauth
>
>



--
Nat Sakimura (=3Dnat)
Chairman, OpenID Foundation
http://nat.sakimura.org/
@_nat_en
_______________________________________________
OAuth mailing list
OAuth@ietf.org
https://www.ietf.org/mailman/listinfo/oauth




From jricher@mitre.org  Wed Feb 13 07:01:21 2013
Return-Path: <jricher@mitre.org>
X-Original-To: oauth@ietfa.amsl.com
Delivered-To: oauth@ietfa.amsl.com
Received: from localhost (localhost [127.0.0.1]) by ietfa.amsl.com (Postfix) with ESMTP id 516AF21F8639 for <oauth@ietfa.amsl.com>; Wed, 13 Feb 2013 07:01:21 -0800 (PST)
X-Virus-Scanned: amavisd-new at amsl.com
X-Spam-Flag: NO
X-Spam-Score: -6.566
X-Spam-Level: 
X-Spam-Status: No, score=-6.566 tagged_above=-999 required=5 tests=[AWL=0.033,  BAYES_00=-2.599, RCVD_IN_DNSWL_MED=-4]
Received: from mail.ietf.org ([12.22.58.30]) by localhost (ietfa.amsl.com [127.0.0.1]) (amavisd-new, port 10024) with ESMTP id oWX-WbuP5Vnm for <oauth@ietfa.amsl.com>; Wed, 13 Feb 2013 07:01:18 -0800 (PST)
Received: from smtpksrv1.mitre.org (smtpksrv1.mitre.org [198.49.146.77]) by ietfa.amsl.com (Postfix) with ESMTP id BD3D321F862E for <oauth@ietf.org>; Wed, 13 Feb 2013 07:01:17 -0800 (PST)
Received: from smtpksrv1.mitre.org (localhost.localdomain [127.0.0.1]) by localhost (Postfix) with SMTP id E64671F1DB7; Wed, 13 Feb 2013 10:01:14 -0500 (EST)
Received: from IMCCAS04.MITRE.ORG (imccas04.mitre.org [129.83.29.81]) by smtpksrv1.mitre.org (Postfix) with ESMTP id B291A531325E; Wed, 13 Feb 2013 10:01:12 -0500 (EST)
Received: from [10.146.15.29] (129.83.31.58) by IMCCAS04.MITRE.ORG (129.83.29.81) with Microsoft SMTP Server (TLS) id 14.2.318.4; Wed, 13 Feb 2013 10:01:12 -0500
Message-ID: <511BAA8B.8030309@mitre.org>
Date: Wed, 13 Feb 2013 10:00:27 -0500
From: Justin Richer <jricher@mitre.org>
User-Agent: Mozilla/5.0 (X11; Linux i686; rv:17.0) Gecko/20130106 Thunderbird/17.0.2
MIME-Version: 1.0
To: John Bradley <ve7jtb@ve7jtb.com>
References: <51195F36.6040705@mitre.org> <780F8C26-19A4-4301-B350-307D9FFF69CD@ve7jtb.com>
In-Reply-To: <780F8C26-19A4-4301-B350-307D9FFF69CD@ve7jtb.com>
Content-Type: text/plain; charset="ISO-8859-1"; format=flowed
Content-Transfer-Encoding: 7bit
X-Originating-IP: [129.83.31.58]
Cc: "oauth@ietf.org" <oauth@ietf.org>
Subject: Re: [OAUTH-WG] Registration: RESTful client lifecycle management
X-BeenThere: oauth@ietf.org
X-Mailman-Version: 2.1.12
Precedence: list
List-Id: OAUTH WG <oauth.ietf.org>
List-Unsubscribe: <https://www.ietf.org/mailman/options/oauth>, <mailto:oauth-request@ietf.org?subject=unsubscribe>
List-Archive: <http://www.ietf.org/mail-archive/web/oauth>
List-Post: <mailto:oauth@ietf.org>
List-Help: <mailto:oauth-request@ietf.org?subject=help>
List-Subscribe: <https://www.ietf.org/mailman/listinfo/oauth>, <mailto:oauth-request@ietf.org?subject=subscribe>
X-List-Received-Date: Wed, 13 Feb 2013 15:01:21 -0000

Would it be reasonable to mark the PUT and DELETE methods as optional 
for the server to implement, but with defined semantics if they do? I 
want to keep GET and POST(create) as mandatory, as I think that's the 
minimal set of functionality required.

  -- Justin

On 02/11/2013 08:51 PM, John Bradley wrote:
> I would always include the client_id on update.
>
> I think it is also us full to have other tokens used at the update endpoint.  I can see the master token used to update all the clients it has registered as part of API management.
> Relying on the registration_access_token is probably a design that will cause trouble down the road.
>
> I think GET and POST are relatively clear.   I don't know about expelling PUT to developers.  I think POST with a client_id to a (separate discussion) update_uri works without restricting it to PUT.
>
> I think DELETE needs to be better understood.   I think a status that can be set for client lifecycle is better than letting a client delete a entry.
> In some cases there will be more than one instance of a client and letting them know they have been turned off for a reason is better than making there registration disappear.
> So for the moment I would levee out DELETE.
>
> John B.
>
> On 2013-02-11, at 6:14 PM, Justin Richer <jricher@mitre.org> wrote:
>
>> Draft -05 of OAuth Dynamic Client Registration [1] defines several operations that the client can take on its behalf as part of the registration process. These boil down to the basic CRUD operations that you find in many APIs: Create, Read, Update, Delete. Draft -00 defined only the "Create" operation, draft -01 through -04 added the "Update" operation, switched using the "operation=" parameter.
>>
>> Following several suggestions to do so on the list, the -05 draft defines these operations in terms of a RESTful API for the client. Namely:
>>
>> - HTTP POST to registration endpoint => Create (register) a new client
>> - HTTP PUT to update endpoint (with registration_access_token) => Update the registered information for this client
>> - HTTP GET to update endpoint (with registration_access_token) => read the registered information for this client
>> - HTTP DELETE to update endpoint (with registration_access_token) => Delete (unregister/de-provision) this client
>>
>> The two main issues at stake here are: the addition of the READ and DELETE methods, and the use of HTTP verbs following a RESTful design philosophy.
>>
>> Pro:
>> - RESTful APIs (with HTTP verbs to differentiate functionality) are the norm today
>> - Full lifecycle management is common and is going to be expected by many users of this protocol in the wild
>>
>> Cons:
>> - Update semantics are still under debate (full replace? patch?)
>> - Somewhat increased complexity on the server to support all operations
>> - Client has to understand all HTTP verbs for full access (though plain registration is just POST)
>>
>>
>> Alternatives include using an operational switch parameter (like the old drafts), defining separate endpoints for every action, or doing all operations on a single endpoint using verbs to switch.
>>
>> -- Justin
>>
>> [1] http://tools.ietf.org/html/draft-ietf-oauth-dyn-reg-05
>> _______________________________________________
>> OAuth mailing list
>> OAuth@ietf.org
>> https://www.ietf.org/mailman/listinfo/oauth


From ve7jtb@ve7jtb.com  Wed Feb 13 07:10:01 2013
Return-Path: <ve7jtb@ve7jtb.com>
X-Original-To: oauth@ietfa.amsl.com
Delivered-To: oauth@ietfa.amsl.com
Received: from localhost (localhost [127.0.0.1]) by ietfa.amsl.com (Postfix) with ESMTP id 9E66321F8821 for <oauth@ietfa.amsl.com>; Wed, 13 Feb 2013 07:10:01 -0800 (PST)
X-Virus-Scanned: amavisd-new at amsl.com
X-Spam-Flag: NO
X-Spam-Score: -3.333
X-Spam-Level: 
X-Spam-Status: No, score=-3.333 tagged_above=-999 required=5 tests=[AWL=0.266,  BAYES_00=-2.599, RCVD_IN_DNSWL_LOW=-1]
Received: from mail.ietf.org ([12.22.58.30]) by localhost (ietfa.amsl.com [127.0.0.1]) (amavisd-new, port 10024) with ESMTP id Zx0XnhXKSNVN for <oauth@ietfa.amsl.com>; Wed, 13 Feb 2013 07:09:59 -0800 (PST)
Received: from mail-qa0-f41.google.com (mail-qa0-f41.google.com [209.85.216.41]) by ietfa.amsl.com (Postfix) with ESMTP id 582FE21F87CE for <oauth@ietf.org>; Wed, 13 Feb 2013 07:09:59 -0800 (PST)
Received: by mail-qa0-f41.google.com with SMTP id hy16so2185137qab.0 for <oauth@ietf.org>; Wed, 13 Feb 2013 07:09:58 -0800 (PST)
X-Google-DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=google.com; s=20120113; h=x-received:content-type:mime-version:subject:from:in-reply-to:date :cc:content-transfer-encoding:message-id:references:to:x-mailer :x-gm-message-state; bh=ES2snSYkH8a8PE77iVs7HDwFrhFmvlT03Uk6jDF0u5s=; b=F1trEoWRgk1SNWg6eC582jjpmC64ruta9mcoN5egxgxrNkeH/RQ1cmo7z2FDNxtCwV gzYVhbtgLla3fJiLoMZYlzxaNEebvDDf2y12st1KHPs0y746UEfoJ2nMiEsXd2GVPCoy a1RPbtj8ZGedskX4HBrQ9wQPtmrRUV3ayCwfJ3beyRg6FBE65Aob77QeZINJqu87DHTt VH2AzntIma3qLMaQjjQY+WsemWsMbiNlq8wjFUGuM7AilGrsdy1O8bA01MZTm/ZOkrPm nx+z6MhYjAyiseHWL1Nn2m4rRMoepuuYOaDwM30PP6PSVrTh+jRpinRJXD9L2THS6f6q lg7w==
X-Received: by 10.49.71.178 with SMTP id w18mr10021588qeu.11.1360768190753; Wed, 13 Feb 2013 07:09:50 -0800 (PST)
Received: from [192.168.1.213] ([190.20.26.0]) by mx.google.com with ESMTPS id hn9sm17500864qab.8.2013.02.13.07.09.46 (version=TLSv1 cipher=ECDHE-RSA-RC4-SHA bits=128/128); Wed, 13 Feb 2013 07:09:49 -0800 (PST)
Content-Type: text/plain; charset=iso-8859-1
Mime-Version: 1.0 (Mac OS X Mail 6.2 \(1499\))
From: John Bradley <ve7jtb@ve7jtb.com>
In-Reply-To: <511BAA8B.8030309@mitre.org>
Date: Wed, 13 Feb 2013 12:09:42 -0300
Content-Transfer-Encoding: quoted-printable
Message-Id: <BEBDAFAC-28B0-4959-9FE5-34EC17FC318C@ve7jtb.com>
References: <51195F36.6040705@mitre.org> <780F8C26-19A4-4301-B350-307D9FFF69CD@ve7jtb.com> <511BAA8B.8030309@mitre.org>
To: Justin Richer <jricher@mitre.org>
X-Mailer: Apple Mail (2.1499)
X-Gm-Message-State: ALoCoQnihivgkiSRZN7YGU6ZZYAnjUNptDlc5fA8kEjfkmoOETaw3DxBPbOd1wc85/6cVMTqnFbY
Cc: "oauth@ietf.org" <oauth@ietf.org>
Subject: Re: [OAUTH-WG] Registration: RESTful client lifecycle management
X-BeenThere: oauth@ietf.org
X-Mailman-Version: 2.1.12
Precedence: list
List-Id: OAUTH WG <oauth.ietf.org>
List-Unsubscribe: <https://www.ietf.org/mailman/options/oauth>, <mailto:oauth-request@ietf.org?subject=unsubscribe>
List-Archive: <http://www.ietf.org/mail-archive/web/oauth>
List-Post: <mailto:oauth@ietf.org>
List-Help: <mailto:oauth-request@ietf.org?subject=help>
List-Subscribe: <https://www.ietf.org/mailman/listinfo/oauth>, <mailto:oauth-request@ietf.org?subject=subscribe>
X-List-Received-Date: Wed, 13 Feb 2013 15:10:01 -0000

I am not violently opposed to PUT as a option that completely replaces =
the resource setting all unsent claims back to the defaults. =20

I don't have a good feeling about DELETE,  I think we still need more =
discussion on what it means, what privileges it takes to invoke it etc.
It could be a bad thing if we get wrong or is not implemented =
consistently.

Personally I don't think a client should ever be able to DELETE it's =
record.  =20

I think marking a client_id as pending provisioning, suspended,  revoked =
etc is better and that can be done with a claim in the update endpoint.

It should only be the server that deletes a record after satisfying it's =
audit requirements.

John B.=20

On 2013-02-13, at 12:00 PM, Justin Richer <jricher@mitre.org> wrote:

> Would it be reasonable to mark the PUT and DELETE methods as optional =
for the server to implement, but with defined semantics if they do? I =
want to keep GET and POST(create) as mandatory, as I think that's the =
minimal set of functionality required.
>=20
> -- Justin
>=20
> On 02/11/2013 08:51 PM, John Bradley wrote:
>> I would always include the client_id on update.
>>=20
>> I think it is also us full to have other tokens used at the update =
endpoint.  I can see the master token used to update all the clients it =
has registered as part of API management.
>> Relying on the registration_access_token is probably a design that =
will cause trouble down the road.
>>=20
>> I think GET and POST are relatively clear.   I don't know about =
expelling PUT to developers.  I think POST with a client_id to a =
(separate discussion) update_uri works without restricting it to PUT.
>>=20
>> I think DELETE needs to be better understood.   I think a status that =
can be set for client lifecycle is better than letting a client delete a =
entry.
>> In some cases there will be more than one instance of a client and =
letting them know they have been turned off for a reason is better than =
making there registration disappear.
>> So for the moment I would levee out DELETE.
>>=20
>> John B.
>>=20
>> On 2013-02-11, at 6:14 PM, Justin Richer <jricher@mitre.org> wrote:
>>=20
>>> Draft -05 of OAuth Dynamic Client Registration [1] defines several =
operations that the client can take on its behalf as part of the =
registration process. These boil down to the basic CRUD operations that =
you find in many APIs: Create, Read, Update, Delete. Draft -00 defined =
only the "Create" operation, draft -01 through -04 added the "Update" =
operation, switched using the "operation=3D" parameter.
>>>=20
>>> Following several suggestions to do so on the list, the -05 draft =
defines these operations in terms of a RESTful API for the client. =
Namely:
>>>=20
>>> - HTTP POST to registration endpoint =3D> Create (register) a new =
client
>>> - HTTP PUT to update endpoint (with registration_access_token) =3D> =
Update the registered information for this client
>>> - HTTP GET to update endpoint (with registration_access_token) =3D> =
read the registered information for this client
>>> - HTTP DELETE to update endpoint (with registration_access_token) =3D>=
 Delete (unregister/de-provision) this client
>>>=20
>>> The two main issues at stake here are: the addition of the READ and =
DELETE methods, and the use of HTTP verbs following a RESTful design =
philosophy.
>>>=20
>>> Pro:
>>> - RESTful APIs (with HTTP verbs to differentiate functionality) are =
the norm today
>>> - Full lifecycle management is common and is going to be expected by =
many users of this protocol in the wild
>>>=20
>>> Cons:
>>> - Update semantics are still under debate (full replace? patch?)
>>> - Somewhat increased complexity on the server to support all =
operations
>>> - Client has to understand all HTTP verbs for full access (though =
plain registration is just POST)
>>>=20
>>>=20
>>> Alternatives include using an operational switch parameter (like the =
old drafts), defining separate endpoints for every action, or doing all =
operations on a single endpoint using verbs to switch.
>>>=20
>>> -- Justin
>>>=20
>>> [1] http://tools.ietf.org/html/draft-ietf-oauth-dyn-reg-05
>>> _______________________________________________
>>> OAuth mailing list
>>> OAuth@ietf.org
>>> https://www.ietf.org/mailman/listinfo/oauth
>=20


From Michael.Jones@microsoft.com  Wed Feb 13 07:32:53 2013
Return-Path: <Michael.Jones@microsoft.com>
X-Original-To: oauth@ietfa.amsl.com
Delivered-To: oauth@ietfa.amsl.com
Received: from localhost (localhost [127.0.0.1]) by ietfa.amsl.com (Postfix) with ESMTP id B6BBF21F87D2 for <oauth@ietfa.amsl.com>; Wed, 13 Feb 2013 07:32:53 -0800 (PST)
X-Virus-Scanned: amavisd-new at amsl.com
X-Spam-Flag: NO
X-Spam-Score: -2.584
X-Spam-Level: 
X-Spam-Status: No, score=-2.584 tagged_above=-999 required=5 tests=[AWL=0.015,  BAYES_00=-2.599]
Received: from mail.ietf.org ([12.22.58.30]) by localhost (ietfa.amsl.com [127.0.0.1]) (amavisd-new, port 10024) with ESMTP id HeUyOf8F-7wg for <oauth@ietfa.amsl.com>; Wed, 13 Feb 2013 07:32:52 -0800 (PST)
Received: from na01-by2-obe.outbound.protection.outlook.com (na01-by2-obe.ptr.protection.outlook.com [207.46.100.26]) by ietfa.amsl.com (Postfix) with ESMTP id 8B96421F86BE for <oauth@ietf.org>; Wed, 13 Feb 2013 07:32:52 -0800 (PST)
Received: from BY2FFO11FD001.protection.gbl (10.1.15.201) by BY2FFO11HUB039.protection.gbl (10.1.14.122) with Microsoft SMTP Server (TLS) id 15.0.620.12; Wed, 13 Feb 2013 15:32:50 +0000
Received: from TK5EX14HUBC107.redmond.corp.microsoft.com (131.107.125.37) by BY2FFO11FD001.mail.protection.outlook.com (10.1.14.123) with Microsoft SMTP Server (TLS) id 15.0.620.12 via Frontend Transport; Wed, 13 Feb 2013 15:32:50 +0000
Received: from TK5EX14MBXC285.redmond.corp.microsoft.com ([169.254.3.232]) by TK5EX14HUBC107.redmond.corp.microsoft.com ([157.54.80.67]) with mapi id 14.02.0318.003; Wed, 13 Feb 2013 15:32:30 +0000
From: Mike Jones <Michael.Jones@microsoft.com>
To: John Bradley <ve7jtb@ve7jtb.com>, Justin Richer <jricher@mitre.org>
Thread-Topic: [OAUTH-WG] Registration: RESTful client lifecycle management
Thread-Index: AQHOCJzxVGwYODuh3UmktcEEXHrfK5h1dc0AgAJusICAAAKVAIAABf2Q
Date: Wed, 13 Feb 2013 15:32:29 +0000
Message-ID: <4E1F6AAD24975D4BA5B168042967394367445EBC@TK5EX14MBXC285.redmond.corp.microsoft.com>
References: <51195F36.6040705@mitre.org> <780F8C26-19A4-4301-B350-307D9FFF69CD@ve7jtb.com> <511BAA8B.8030309@mitre.org> <BEBDAFAC-28B0-4959-9FE5-34EC17FC318C@ve7jtb.com>
In-Reply-To: <BEBDAFAC-28B0-4959-9FE5-34EC17FC318C@ve7jtb.com>
Accept-Language: en-US
Content-Language: en-US
X-MS-Has-Attach: 
X-MS-TNEF-Correlator: 
x-originating-ip: [157.54.51.34]
Content-Type: text/plain; charset="us-ascii"
Content-Transfer-Encoding: quoted-printable
MIME-Version: 1.0
X-Forefront-Antispam-Report: CIP:131.107.125.37; CTRY:US; IPV:CAL; IPV:NLI; EFV:NLI; SFV:NSPM; SFS:(55885001)(24454001)(51444002)(51704002)(189002)(199002)(479174001)(377424002)(13464002)(377454001)(63696002)(76482001)(66066001)(54316002)(79102001)(46102001)(56776001)(33656001)(20776003)(53806001)(15202345001)(46406002)(74502001)(54356001)(47776003)(47446002)(5343655001)(51856001)(47736001)(74662001)(47976001)(44976002)(80022001)(4396001)(50466001)(55846006)(49866001)(23726001)(56816002)(31966008)(16406001)(50986001)(77982001)(65816001)(59766001); DIR:OUT; SFP:; SCL:1; SRVR:BY2FFO11HUB039; H:TK5EX14HUBC107.redmond.corp.microsoft.com; RD:InfoDomainNonexistent; MX:1; A:1; LANG:en; 
X-OriginatorOrg: microsoft.onmicrosoft.com
X-Forefront-PRVS: 07562C22DA
Cc: "oauth@ietf.org" <oauth@ietf.org>
Subject: Re: [OAUTH-WG] Registration: RESTful client lifecycle management
X-BeenThere: oauth@ietf.org
X-Mailman-Version: 2.1.12
Precedence: list
List-Id: OAUTH WG <oauth.ietf.org>
List-Unsubscribe: <https://www.ietf.org/mailman/options/oauth>, <mailto:oauth-request@ietf.org?subject=unsubscribe>
List-Archive: <http://www.ietf.org/mail-archive/web/oauth>
List-Post: <mailto:oauth@ietf.org>
List-Help: <mailto:oauth-request@ietf.org?subject=help>
List-Subscribe: <https://www.ietf.org/mailman/listinfo/oauth>, <mailto:oauth-request@ietf.org?subject=subscribe>
X-List-Received-Date: Wed, 13 Feb 2013 15:32:53 -0000

I agree that DELETE is potentially problematic.  I'd leave it out.

				-- Mike

-----Original Message-----
From: oauth-bounces@ietf.org [mailto:oauth-bounces@ietf.org] On Behalf Of J=
ohn Bradley
Sent: Wednesday, February 13, 2013 7:10 AM
To: Justin Richer
Cc: oauth@ietf.org
Subject: Re: [OAUTH-WG] Registration: RESTful client lifecycle management

I am not violently opposed to PUT as a option that completely replaces the =
resource setting all unsent claims back to the defaults. =20

I don't have a good feeling about DELETE,  I think we still need more discu=
ssion on what it means, what privileges it takes to invoke it etc.
It could be a bad thing if we get wrong or is not implemented consistently.

Personally I don't think a client should ever be able to DELETE it's record=
.  =20

I think marking a client_id as pending provisioning, suspended,  revoked et=
c is better and that can be done with a claim in the update endpoint.

It should only be the server that deletes a record after satisfying it's au=
dit requirements.

John B.=20

On 2013-02-13, at 12:00 PM, Justin Richer <jricher@mitre.org> wrote:

> Would it be reasonable to mark the PUT and DELETE methods as optional for=
 the server to implement, but with defined semantics if they do? I want to =
keep GET and POST(create) as mandatory, as I think that's the minimal set o=
f functionality required.
>=20
> -- Justin
>=20
> On 02/11/2013 08:51 PM, John Bradley wrote:
>> I would always include the client_id on update.
>>=20
>> I think it is also us full to have other tokens used at the update endpo=
int.  I can see the master token used to update all the clients it has regi=
stered as part of API management.
>> Relying on the registration_access_token is probably a design that will =
cause trouble down the road.
>>=20
>> I think GET and POST are relatively clear.   I don't know about expellin=
g PUT to developers.  I think POST with a client_id to a (separate discussi=
on) update_uri works without restricting it to PUT.
>>=20
>> I think DELETE needs to be better understood.   I think a status that ca=
n be set for client lifecycle is better than letting a client delete a entr=
y.
>> In some cases there will be more than one instance of a client and letti=
ng them know they have been turned off for a reason is better than making t=
here registration disappear.
>> So for the moment I would levee out DELETE.
>>=20
>> John B.
>>=20
>> On 2013-02-11, at 6:14 PM, Justin Richer <jricher@mitre.org> wrote:
>>=20
>>> Draft -05 of OAuth Dynamic Client Registration [1] defines several oper=
ations that the client can take on its behalf as part of the registration p=
rocess. These boil down to the basic CRUD operations that you find in many =
APIs: Create, Read, Update, Delete. Draft -00 defined only the "Create" ope=
ration, draft -01 through -04 added the "Update" operation, switched using =
the "operation=3D" parameter.
>>>=20
>>> Following several suggestions to do so on the list, the -05 draft defin=
es these operations in terms of a RESTful API for the client. Namely:
>>>=20
>>> - HTTP POST to registration endpoint =3D> Create (register) a new clien=
t
>>> - HTTP PUT to update endpoint (with registration_access_token) =3D> Upd=
ate the registered information for this client
>>> - HTTP GET to update endpoint (with registration_access_token) =3D> rea=
d the registered information for this client
>>> - HTTP DELETE to update endpoint (with registration_access_token) =3D> =
Delete (unregister/de-provision) this client
>>>=20
>>> The two main issues at stake here are: the addition of the READ and DEL=
ETE methods, and the use of HTTP verbs following a RESTful design philosoph=
y.
>>>=20
>>> Pro:
>>> - RESTful APIs (with HTTP verbs to differentiate functionality) are the=
 norm today
>>> - Full lifecycle management is common and is going to be expected by ma=
ny users of this protocol in the wild
>>>=20
>>> Cons:
>>> - Update semantics are still under debate (full replace? patch?)
>>> - Somewhat increased complexity on the server to support all operations
>>> - Client has to understand all HTTP verbs for full access (though plain=
 registration is just POST)
>>>=20
>>>=20
>>> Alternatives include using an operational switch parameter (like the ol=
d drafts), defining separate endpoints for every action, or doing all opera=
tions on a single endpoint using verbs to switch.
>>>=20
>>> -- Justin
>>>=20
>>> [1] http://tools.ietf.org/html/draft-ietf-oauth-dyn-reg-05
>>> _______________________________________________
>>> OAuth mailing list
>>> OAuth@ietf.org
>>> https://www.ietf.org/mailman/listinfo/oauth
>=20

_______________________________________________
OAuth mailing list
OAuth@ietf.org
https://www.ietf.org/mailman/listinfo/oauth

From prateek.mishra@oracle.com  Wed Feb 13 08:13:43 2013
Return-Path: <prateek.mishra@oracle.com>
X-Original-To: oauth@ietfa.amsl.com
Delivered-To: oauth@ietfa.amsl.com
Received: from localhost (localhost [127.0.0.1]) by ietfa.amsl.com (Postfix) with ESMTP id 74F0521F8869 for <oauth@ietfa.amsl.com>; Wed, 13 Feb 2013 08:13:43 -0800 (PST)
X-Virus-Scanned: amavisd-new at amsl.com
X-Spam-Flag: NO
X-Spam-Score: -6.599
X-Spam-Level: 
X-Spam-Status: No, score=-6.599 tagged_above=-999 required=5 tests=[AWL=0.000,  BAYES_00=-2.599, RCVD_IN_DNSWL_MED=-4]
Received: from mail.ietf.org ([64.170.98.30]) by localhost (ietfa.amsl.com [127.0.0.1]) (amavisd-new, port 10024) with ESMTP id fnP4MiPJYjIn for <oauth@ietfa.amsl.com>; Wed, 13 Feb 2013 08:13:42 -0800 (PST)
Received: from userp1040.oracle.com (userp1040.oracle.com [156.151.31.81]) by ietfa.amsl.com (Postfix) with ESMTP id 0637921F877B for <oauth@ietf.org>; Wed, 13 Feb 2013 08:13:38 -0800 (PST)
Received: from acsinet22.oracle.com (acsinet22.oracle.com [141.146.126.238]) by userp1040.oracle.com (Sentrion-MTA-4.3.1/Sentrion-MTA-4.3.1) with ESMTP id r1DGDZCS021041 (version=TLSv1/SSLv3 cipher=DHE-RSA-AES256-SHA bits=256 verify=OK); Wed, 13 Feb 2013 16:13:36 GMT
Received: from acsmt356.oracle.com (acsmt356.oracle.com [141.146.40.156]) by acsinet22.oracle.com (8.14.4+Sun/8.14.4) with ESMTP id r1DGDZbX000979 (version=TLSv1/SSLv3 cipher=DHE-RSA-AES256-SHA bits=256 verify=NO); Wed, 13 Feb 2013 16:13:35 GMT
Received: from abhmt107.oracle.com (abhmt107.oracle.com [141.146.116.59]) by acsmt356.oracle.com (8.12.11.20060308/8.12.11) with ESMTP id r1DGDY2W023219; Wed, 13 Feb 2013 10:13:34 -0600
Received: from [192.168.1.4] (/71.184.95.145) by default (Oracle Beehive Gateway v4.0) with ESMTP ; Wed, 13 Feb 2013 08:13:34 -0800
Message-ID: <511BBBAC.9060502@oracle.com>
Date: Wed, 13 Feb 2013 11:13:32 -0500
From: Prateek Mishra <prateek.mishra@oracle.com>
Organization: Oracle Corporation
User-Agent: Mozilla/5.0 (Windows NT 5.1; rv:17.0) Gecko/20130107 Thunderbird/17.0.2
MIME-Version: 1.0
To: oauth@ietf.org
References: <0573984A-8C11-4960-9BC6-F44D4B664C19@gmx.net>
In-Reply-To: <0573984A-8C11-4960-9BC6-F44D4B664C19@gmx.net>
Content-Type: text/plain; charset=ISO-8859-1; format=flowed
Content-Transfer-Encoding: quoted-printable
X-Source-IP: acsinet22.oracle.com [141.146.126.238]
Subject: Re: [OAUTH-WG] Minutes from the OAuth Design Team Conference Call - 11th February 2013
X-BeenThere: oauth@ietf.org
X-Mailman-Version: 2.1.12
Precedence: list
List-Id: OAUTH WG <oauth.ietf.org>
List-Unsubscribe: <https://www.ietf.org/mailman/options/oauth>, <mailto:oauth-request@ietf.org?subject=unsubscribe>
List-Archive: <http://www.ietf.org/mail-archive/web/oauth>
List-Post: <mailto:oauth@ietf.org>
List-Help: <mailto:oauth-request@ietf.org?subject=help>
List-Subscribe: <https://www.ietf.org/mailman/listinfo/oauth>, <mailto:oauth-request@ietf.org?subject=subscribe>
X-List-Received-Date: Wed, 13 Feb 2013 16:13:43 -0000

Hannes,

1) Its not clear to me that we need  to specify exchanges between the AS =

and the RS as part of this work. The core specification leaves this
unspecified. There could be many different ways that the AS and RS=20
collaborate to validate signatures in messages received from the client.

2) Regarding (symmetric) key distribution, dont we need some kind of=20
existing trust relationship between the client and AS to make this=20
possible? I guess it
would be enough to require use of a "confidential" client, that would=20
make it possible for the two parties to agree on a session key at the=20
point where an access token
is  issued by the AS.

3) I think do need an MTI key distribution protocol as part of the=20
specification, leaving that as a choice would hurt interoperability.

- prateek

> Here are my notes.
>
> Participants:
>
> * John Bradley
> * Derek Atkins
> * Phil Hunt
> * Prateek Mishra
> * Hannes Tschofenig
> * Mike Jones
> * Antonio Sanso
> * Justin Richer
>
> Notes:
>
> My slides are available here: http://www.tschofenig.priv.at/OAuth2-Secu=
rity-11Feb2013.ppt
>
> Slide #2 summarizes earlier discussions during the conference calls.
>
> -- HTTP vs. JSON
>
> Phil noted that he does not like to use the MAC Token draft as a starti=
ng point because it does not re-use any of the work done in the JOSE work=
ing group and in particular all the libraries that are available today. H=
e mentioned that earlier attempts to write the MAC Token code lead to pro=
blems for implementers.
>
> Justin responded that he does not agree with using JSON as a transport =
mechanism since this would replicate a SOAP style.
>
> Phil noted that he wants to send JSON but the signature shall be comput=
ed over the HTTP header field.
>
> -- Flexibility for the keyed message digest computation
>
>  From earlier discussion it was clear that the conference call particip=
ants wanted more flexibility regarding the keyed message digest computati=
on. For this purpose Hannes presented the DKIM based approach, which allo=
ws selective header fields to be included in the digest. This is shown in=
 slide #4.
>
> After some discussion the conference call participants thought that thi=
s would meet their needs. Further investigations would still be useful to=
 determine the degree of failed HMAC calculations due to HTTP proxies mod=
ifying the content.
>
> -- Key Distribution
>
> Hannes presented the open issue regarding the choice of key distributio=
n. Slides #6-#8 present three techniques and Hannes asked for feedback re=
garding the preferred style. Justin and others didn't see the need to dec=
ide on one mechanism - they wanted to keep the choice open. Derek indicat=
ed that this will not be an acceptable approach. Since the resource serve=
r and the authorization server may, in the OAuth 2.0 framework, be entiti=
es produced by different vendors there is an interoperability need. Justi=
n responded that he disagrees and that the resource server needs to under=
stand the access token and referred to the recent draft submission for th=
e token introspection endpoint. Derek indicated that the resource server =
has to understand the content of the access token and the token introspec=
tion endpoint just pushes the problem around: the resource server has to =
send the access token to the authorization server and then the resource s=
erver gets the result back (which he then a
>   gain needs to understand) in order to make a meaningful authorization=
 decision.
>
> Everyone agreed that the client must receive the session key from the a=
uthorization server and that this approach has to be standardized. It was=
 also agreed that this is a common approach among all three key distribut=
ion mechanisms.
>
> Hannes asked the participants to think about their preference.
>
> The questions regarding key naming and the indication for the intended =
resource server the client wants to talk to have been postponed.
>  =20
> Ciao
> Hannes
>
>
> _______________________________________________
> OAuth mailing list
> OAuth@ietf.org
> https://www.ietf.org/mailman/listinfo/oauth



From sakimura@gmail.com  Wed Feb 13 10:27:43 2013
Return-Path: <sakimura@gmail.com>
X-Original-To: oauth@ietfa.amsl.com
Delivered-To: oauth@ietfa.amsl.com
Received: from localhost (localhost [127.0.0.1]) by ietfa.amsl.com (Postfix) with ESMTP id 1C0B821E8030 for <oauth@ietfa.amsl.com>; Wed, 13 Feb 2013 10:27:43 -0800 (PST)
X-Virus-Scanned: amavisd-new at amsl.com
X-Spam-Flag: NO
X-Spam-Score: -2.367
X-Spam-Level: 
X-Spam-Status: No, score=-2.367 tagged_above=-999 required=5 tests=[AWL=-0.521, BAYES_00=-2.599, MIME_BASE64_TEXT=1.753, RCVD_IN_DNSWL_LOW=-1]
Received: from mail.ietf.org ([64.170.98.30]) by localhost (ietfa.amsl.com [127.0.0.1]) (amavisd-new, port 10024) with ESMTP id y3S0khd1kr5w for <oauth@ietfa.amsl.com>; Wed, 13 Feb 2013 10:27:42 -0800 (PST)
Received: from mail-qa0-f48.google.com (mail-qa0-f48.google.com [209.85.216.48]) by ietfa.amsl.com (Postfix) with ESMTP id 4DF0D21F84FD for <oauth@ietf.org>; Wed, 13 Feb 2013 10:27:42 -0800 (PST)
Received: by mail-qa0-f48.google.com with SMTP id j8so688592qah.0 for <oauth@ietf.org>; Wed, 13 Feb 2013 10:27:41 -0800 (PST)
DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=gmail.com; s=20120113; h=x-received:references:from:mime-version:in-reply-to:date:message-id :subject:to:cc:content-type:content-transfer-encoding; bh=SnP+UZRQENtsIZi+Gxt+DTCIA78Z1AylxTo4hC1izoc=; b=KPoM7SWtJvhTYyFDbIy4AkrFEWdeZ8GTO+ecHlHEdUVtdBBdc88hErvP+6Rcugn+OV CbrrGBlU4A9eFDpaoCzqpKZRIzyowTSiqtO5KWto1poUkd4WsAbDryrwW49m9XBTUXOd aBnADrkDRviehgPcPWgjj56wZuIP84XVzzo9+Ob6QKDIE+W8vaqULi/o/18+HgfzTxsV POQYGn5EfK0Iyrx/ch5yHDQzJ80Svb/fA23WM+Eeq5qaQrfoXq9oP5c+8/zGijAe4JXe O8UsGRrzPwxfI5xuKxuYKmmGXnQIKpEVFYH+pnWCv1xMohh6dYXHY0WYeG/kslkg4Sbh hYUw==
X-Received: by 10.49.121.40 with SMTP id lh8mr10286443qeb.30.1360780061696; Wed, 13 Feb 2013 10:27:41 -0800 (PST)
References: <51195F36.6040705@mitre.org> <780F8C26-19A4-4301-B350-307D9FFF69CD@ve7jtb.com> <80727F20-A830-4778-B11C-D45389310646@lodderstedt.net> <511A5742.30707@mitre.org> <B054D3FD-B4F6-4C57-8ED3-402F936DE17F@ve7jtb.com> <511A705F.4070204@mitre.org> <CABzCy2AaHeVQ+h18FaT8S1z9+EUbVE0WfCf63ra=7s6=f5ExLg@mail.gmail.com> <4E1F6AAD24975D4BA5B168042967394367443862@TK5EX14MBXC285.redmond.corp.microsoft.com>
From: Nat Sakimura <sakimura@gmail.com>
Mime-Version: 1.0 (1.0)
In-Reply-To: <4E1F6AAD24975D4BA5B168042967394367443862@TK5EX14MBXC285.redmond.corp.microsoft.com>
Date: Thu, 14 Feb 2013 03:27:40 +0900
Message-ID: <-7739255357185893925@unknownmsgid>
To: Mike Jones <Michael.Jones@microsoft.com>
Content-Type: text/plain; charset=ISO-2022-JP
Content-Transfer-Encoding: base64
Cc: "oauth@ietf.org" <oauth@ietf.org>
Subject: Re: [OAUTH-WG] Registration: RESTful client lifecycle management
X-BeenThere: oauth@ietf.org
X-Mailman-Version: 2.1.12
Precedence: list
List-Id: OAUTH WG <oauth.ietf.org>
List-Unsubscribe: <https://www.ietf.org/mailman/options/oauth>, <mailto:oauth-request@ietf.org?subject=unsubscribe>
List-Archive: <http://www.ietf.org/mail-archive/web/oauth>
List-Post: <mailto:oauth@ietf.org>
List-Help: <mailto:oauth-request@ietf.org?subject=help>
List-Subscribe: <https://www.ietf.org/mailman/listinfo/oauth>, <mailto:oauth-request@ietf.org?subject=subscribe>
X-List-Received-Date: Wed, 13 Feb 2013 18:27:43 -0000

SSBhbSBhZ2FpbnN0IHRoZSBzeW50YXggb2YgcmVnaXN0cmF0aW9uX2FjY2Vzc191cmwgLg0KDQo9
bmF0IHZpYSBpUGhvbmUNCg0KRmViIDEzLCAyMDEzIDM6MzcbJEIhIhsoQk1pa2UgSm9uZXMgPE1p
Y2hhZWwuSm9uZXNAbWljcm9zb2Z0LmNvbT4gGyRCJE4lYSVDJTshPCU4GyhCOg0KDQo+IFRoZW4g
SSB0aGluayB3ZSd2ZSByZWFjaGVkIGFuIGFjY2VwdGFibGUgcmVzb2x1dGlvbiBvbiB0aGlzIG9u
ZS4gIEJ5IGhhdmluZyB0aGUgc2VydmVyIHJldHVybiB0aGUgcmVnaXN0cmF0aW9uX2FjY2Vzc191
cmwgdXBvbiBjcmVhdGUgYW5kIGhhdmluZyB0aGUgY2xpZW50IGJlIHJlcXVpcmVkIHRvIGluY2x1
ZGUgdGhlIGNsaWVudF9pZCB1cG9uIHVwZGF0ZSwgc2VydmVycyBhcmUgZnJlZSB0byBtYW5hZ2Ug
dGhlaXIgcmVnaXN0cmF0aW9uIGVuZHBvaW50KHMpIGFzIHRoZXkgc2VlIGZpdCBhbmQgY2xpZW50
cyBhbHdheXMgZG8gdGhlIHNhbWUgdGhpbmcuDQo+DQo+ICAgICAgICAgICAgICAgIFRoYW5rcyBh
bGwsDQo+ICAgICAgICAgICAgICAgIC0tIE1pa2UNCj4NCj4gLS0tLS1PcmlnaW5hbCBNZXNzYWdl
LS0tLS0NCj4gRnJvbTogb2F1dGgtYm91bmNlc0BpZXRmLm9yZyBbbWFpbHRvOm9hdXRoLWJvdW5j
ZXNAaWV0Zi5vcmddIE9uIEJlaGFsZiBPZiBOYXQgU2FraW11cmENCj4gU2VudDogVHVlc2RheSwg
RmVicnVhcnkgMTIsIDIwMTMgOToxNSBBTQ0KPiBUbzogSnVzdGluIFJpY2hlcg0KPiBDYzogb2F1
dGhAaWV0Zi5vcmcNCj4gU3ViamVjdDogUmU6IFtPQVVUSC1XR10gUmVnaXN0cmF0aW9uOiBSRVNU
ZnVsIGNsaWVudCBsaWZlY3ljbGUgbWFuYWdlbWVudA0KPg0KPiAyMDEzLzIvMTMgSnVzdGluIFJp
Y2hlciA8anJpY2hlckBtaXRyZS5vcmc+Og0KPj4NCj4+IE9uIDAyLzEyLzIwMTMgMTE6MzAgQU0s
IEpvaG4gQnJhZGxleSB3cm90ZToNCj4+Pg0KPj4+IFRvIHNvbWUgZXh0ZW50IHdlIHdhbnQgdGhl
IHNlcnZlciB0byBoYXZlIHRoZSBmbGV4aWJpbGl0eSBpdCBuZWVkcy4NCj4+Pg0KPj4+IElmIHRo
ZSBzZXJ2ZXIga25vd3MgaXQgaXMgZ29pbmcgdG8gbmVlZCBjbGllbnRfaWQgZm9yIEdFVCBpdCBu
ZWVkcyB0bw0KPj4+IGVuY29kZSBpdCBpbiB0aGUgcmVzb3VyY2UgVVJJIGV0aGVyIGFzIHBhcnQg
b2YgdGhlIHBhdGggb3IgYXMgYSBxdWVyeQ0KPj4+IHBhcmFtZXRlciAodGhhdCBpcyB1cCB0byB0
aGUgc2VydmVyKQ0KPj4+DQo+Pj4gV2hlbiBkb2luZyB1cGRhdGVzIHRoZSBjbGllbnQgTVVTVCBp
bmNsdWRlIHRoZSBjbGllbnRfaWQgYXMgYW4NCj4+PiBhZGRpdGlvbmFsIGludGVncml0eSBjaGVj
ay4gIFNvbWUgc2VydmVycyBtYXkgc3dpdGNoIG9uIHRoYXQgYnV0IHRoYXQgaXMgdXAgdG8gdGhl
bS4NCj4+DQo+PiBTbyBpZiBieSB0aGlzIHlvdSBtZWFuIHRoYXQgdGhlIGNsaWVudCBzdGlsbCBz
aW1wbHkgZm9sbG93cyB3aGF0ZXZlcg0KPj4gdXBkYXRlIHVybCB0aGUgc2VydmVyIGhhbmRzIGl0
ICh3aGljaCBtYXkgb3IgbWF5IG5vdCBpbmNsdWRlIHRoZQ0KPj4gY2xpZW50X2lkIGluIHNvbWUg
Zm9ybSwgYnV0IHRoZSBjbGllbnQgZG9lc24ndCBjYXJlKSwgYW5kIHRoYXQgdGhlDQo+PiBjbGll
bnQgTVVTVCBpbmNsdWRlIGl0cyBjbGllbnRfaWQgaW4gdGhlIHJlcXVlc3QgYm9keSAodG9wLWxl
dmVsDQo+PiBtZW1iZXIgb2YgYSBKU09OIG9iamVjdCwgYXQgdGhlDQo+PiBtb21lbnQpIHdoZW4g
ZG9pbmcgYSBQVVQgKG9yIFBPU1QvUEFUQ0g/IHNlZSBiZWxvdykgZm9yIHRoZSB1cGRhdGUNCj4+
IGFjdGlvbiwgdGhlbiBJJ20gdG90YWxseSBmaW5lIHdpdGggdGhhdC4gSXMgdGhpcyB3aGF0IHlv
dSdyZSBzdWdnZXN0aW5nPw0KPg0KPiBBcyBmYXIgYXMgSSB1bmRlcnN0YW5kLCB5ZXMuIFRoYXQg
aXMgd2hhdCB3ZSBkaXNjdXNzZWQgbGFzdCBUaHVyc2RheSBmYWNlIHRvIGZhY2UuDQo+DQo+DQo+
IC0tDQo+IE5hdCBTYWtpbXVyYSAoPW5hdCkNCj4gQ2hhaXJtYW4sIE9wZW5JRCBGb3VuZGF0aW9u
DQo+IGh0dHA6Ly9uYXQuc2FraW11cmEub3JnLw0KPiBAX25hdF9lbg0KPiBfX19fX19fX19fX19f
X19fX19fX19fX19fX19fX19fX19fX19fX19fX19fX19fXw0KPiBPQXV0aCBtYWlsaW5nIGxpc3QN
Cj4gT0F1dGhAaWV0Zi5vcmcNCj4gaHR0cHM6Ly93d3cuaWV0Zi5vcmcvbWFpbG1hbi9saXN0aW5m
by9vYXV0aA0K

From sakimura@gmail.com  Wed Feb 13 10:31:25 2013
Return-Path: <sakimura@gmail.com>
X-Original-To: oauth@ietfa.amsl.com
Delivered-To: oauth@ietfa.amsl.com
Received: from localhost (localhost [127.0.0.1]) by ietfa.amsl.com (Postfix) with ESMTP id C84A621E8030 for <oauth@ietfa.amsl.com>; Wed, 13 Feb 2013 10:31:25 -0800 (PST)
X-Virus-Scanned: amavisd-new at amsl.com
X-Spam-Flag: NO
X-Spam-Score: -3.157
X-Spam-Level: 
X-Spam-Status: No, score=-3.157 tagged_above=-999 required=5 tests=[AWL=0.442,  BAYES_00=-2.599, RCVD_IN_DNSWL_LOW=-1]
Received: from mail.ietf.org ([64.170.98.30]) by localhost (ietfa.amsl.com [127.0.0.1]) (amavisd-new, port 10024) with ESMTP id 568jkU1NrOpY for <oauth@ietfa.amsl.com>; Wed, 13 Feb 2013 10:31:25 -0800 (PST)
Received: from mail-qe0-f53.google.com (mail-qe0-f53.google.com [209.85.128.53]) by ietfa.amsl.com (Postfix) with ESMTP id E7EB721F8468 for <oauth@ietf.org>; Wed, 13 Feb 2013 10:31:24 -0800 (PST)
Received: by mail-qe0-f53.google.com with SMTP id 1so681068qee.40 for <oauth@ietf.org>; Wed, 13 Feb 2013 10:31:24 -0800 (PST)
DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=gmail.com; s=20120113; h=x-received:references:from:mime-version:in-reply-to:date:message-id :subject:to:cc:content-type:content-transfer-encoding; bh=8WrMB23TjVBrap2ixB3pfqADoCIiV3DUnBFiz4IVjSU=; b=OSlQG2qLG3dXPQ718thGRjMjWMRBnf1jLYhvQ+HKsW5JxIfBOiCZULOzAUUWMLJ5fH 4BubzaiLxs30xLU5bWrShe/98ff94eb1Bjh2LitI28s0hTNDCGRgPXawu14neJ7guMIj D/XEwf3+MnPEWIVmA6phDA286+2nS4lYEjqDbR8WoEbwMei4v+lRvXIuTomg16dCfqTi yT4GwWwkEJOAVIXTKA0LAFhHhSrcI9lS6hT9ytWxqdwS/MGPnHoavUKZ3pz51aWsWlX8 aoyqYax6bzgluJ9bMFD5BnoE9gHjjFTE3CRCo71+yDV28phTWlpMiLTiPEJLjP6VE+eR ULVQ==
X-Received: by 10.224.39.210 with SMTP id h18mr8765410qae.15.1360780284085; Wed, 13 Feb 2013 10:31:24 -0800 (PST)
References: <51195F36.6040705@mitre.org> <780F8C26-19A4-4301-B350-307D9FFF69CD@ve7jtb.com> <511BAA8B.8030309@mitre.org> <BEBDAFAC-28B0-4959-9FE5-34EC17FC318C@ve7jtb.com>
From: Nat Sakimura <sakimura@gmail.com>
Mime-Version: 1.0 (1.0)
In-Reply-To: <BEBDAFAC-28B0-4959-9FE5-34EC17FC318C@ve7jtb.com>
Date: Thu, 14 Feb 2013 03:31:22 +0900
Message-ID: <-4554688250617930935@unknownmsgid>
To: John Bradley <ve7jtb@ve7jtb.com>
Content-Type: text/plain; charset=UTF-8
Content-Transfer-Encoding: quoted-printable
Cc: "oauth@ietf.org" <oauth@ietf.org>
Subject: Re: [OAUTH-WG] Registration: RESTful client lifecycle management
X-BeenThere: oauth@ietf.org
X-Mailman-Version: 2.1.12
Precedence: list
List-Id: OAUTH WG <oauth.ietf.org>
List-Unsubscribe: <https://www.ietf.org/mailman/options/oauth>, <mailto:oauth-request@ietf.org?subject=unsubscribe>
List-Archive: <http://www.ietf.org/mail-archive/web/oauth>
List-Post: <mailto:oauth@ietf.org>
List-Help: <mailto:oauth-request@ietf.org?subject=help>
List-Subscribe: <https://www.ietf.org/mailman/listinfo/oauth>, <mailto:oauth-request@ietf.org?subject=subscribe>
X-List-Received-Date: Wed, 13 Feb 2013 18:31:25 -0000

Generally speaking, mapping PUT to replace and POST to change is an
acceptable practice so I am fine with it.

Now, what I still do not understand is why you think it is fine to do
PUT or POST and not DELETE. Doing PUT with empty content is almost the
same as DELETE. Could you explain?

=3Dnat via iPhone

Feb 14, 2013 0:10=E3=80=81John Bradley <ve7jtb@ve7jtb.com> =E3=81=AE=E3=83=
=A1=E3=83=83=E3=82=BB=E3=83=BC=E3=82=B8:

> I am not violently opposed to PUT as a option that completely replaces th=
e resource setting all unsent claims back to the defaults.
>
> I don't have a good feeling about DELETE,  I think we still need more dis=
cussion on what it means, what privileges it takes to invoke it etc.
> It could be a bad thing if we get wrong or is not implemented consistentl=
y.
>
> Personally I don't think a client should ever be able to DELETE it's reco=
rd.
>
> I think marking a client_id as pending provisioning, suspended,  revoked =
etc is better and that can be done with a claim in the update endpoint.
>
> It should only be the server that deletes a record after satisfying it's =
audit requirements.
>
> John B.
>
> On 2013-02-13, at 12:00 PM, Justin Richer <jricher@mitre.org> wrote:
>
>> Would it be reasonable to mark the PUT and DELETE methods as optional fo=
r the server to implement, but with defined semantics if they do? I want to=
 keep GET and POST(create) as mandatory, as I think that's the minimal set =
of functionality required.
>>
>> -- Justin
>>
>> On 02/11/2013 08:51 PM, John Bradley wrote:
>>> I would always include the client_id on update.
>>>
>>> I think it is also us full to have other tokens used at the update endp=
oint.  I can see the master token used to update all the clients it has reg=
istered as part of API management.
>>> Relying on the registration_access_token is probably a design that will=
 cause trouble down the road.
>>>
>>> I think GET and POST are relatively clear.   I don't know about expelli=
ng PUT to developers.  I think POST with a client_id to a (separate discuss=
ion) update_uri works without restricting it to PUT.
>>>
>>> I think DELETE needs to be better understood.   I think a status that c=
an be set for client lifecycle is better than letting a client delete a ent=
ry.
>>> In some cases there will be more than one instance of a client and lett=
ing them know they have been turned off for a reason is better than making =
there registration disappear.
>>> So for the moment I would levee out DELETE.
>>>
>>> John B.
>>>
>>> On 2013-02-11, at 6:14 PM, Justin Richer <jricher@mitre.org> wrote:
>>>
>>>> Draft -05 of OAuth Dynamic Client Registration [1] defines several ope=
rations that the client can take on its behalf as part of the registration =
process. These boil down to the basic CRUD operations that you find in many=
 APIs: Create, Read, Update, Delete. Draft -00 defined only the "Create" op=
eration, draft -01 through -04 added the "Update" operation, switched using=
 the "operation=3D" parameter.
>>>>
>>>> Following several suggestions to do so on the list, the -05 draft defi=
nes these operations in terms of a RESTful API for the client. Namely:
>>>>
>>>> - HTTP POST to registration endpoint =3D> Create (register) a new clie=
nt
>>>> - HTTP PUT to update endpoint (with registration_access_token) =3D> Up=
date the registered information for this client
>>>> - HTTP GET to update endpoint (with registration_access_token) =3D> re=
ad the registered information for this client
>>>> - HTTP DELETE to update endpoint (with registration_access_token) =3D>=
 Delete (unregister/de-provision) this client
>>>>
>>>> The two main issues at stake here are: the addition of the READ and DE=
LETE methods, and the use of HTTP verbs following a RESTful design philosop=
hy.
>>>>
>>>> Pro:
>>>> - RESTful APIs (with HTTP verbs to differentiate functionality) are th=
e norm today
>>>> - Full lifecycle management is common and is going to be expected by m=
any users of this protocol in the wild
>>>>
>>>> Cons:
>>>> - Update semantics are still under debate (full replace? patch?)
>>>> - Somewhat increased complexity on the server to support all operation=
s
>>>> - Client has to understand all HTTP verbs for full access (though plai=
n registration is just POST)
>>>>
>>>>
>>>> Alternatives include using an operational switch parameter (like the o=
ld drafts), defining separate endpoints for every action, or doing all oper=
ations on a single endpoint using verbs to switch.
>>>>
>>>> -- Justin
>>>>
>>>> [1] http://tools.ietf.org/html/draft-ietf-oauth-dyn-reg-05
>>>> _______________________________________________
>>>> OAuth mailing list
>>>> OAuth@ietf.org
>>>> https://www.ietf.org/mailman/listinfo/oauth
>
> _______________________________________________
> OAuth mailing list
> OAuth@ietf.org
> https://www.ietf.org/mailman/listinfo/oauth

From jricher@mitre.org  Wed Feb 13 10:41:14 2013
Return-Path: <jricher@mitre.org>
X-Original-To: oauth@ietfa.amsl.com
Delivered-To: oauth@ietfa.amsl.com
Received: from localhost (localhost [127.0.0.1]) by ietfa.amsl.com (Postfix) with ESMTP id 8849621F85A2 for <oauth@ietfa.amsl.com>; Wed, 13 Feb 2013 10:41:14 -0800 (PST)
X-Virus-Scanned: amavisd-new at amsl.com
X-Spam-Flag: NO
X-Spam-Score: -6.567
X-Spam-Level: 
X-Spam-Status: No, score=-6.567 tagged_above=-999 required=5 tests=[AWL=0.032,  BAYES_00=-2.599, RCVD_IN_DNSWL_MED=-4]
Received: from mail.ietf.org ([64.170.98.30]) by localhost (ietfa.amsl.com [127.0.0.1]) (amavisd-new, port 10024) with ESMTP id 0UPNfDvxXyxv for <oauth@ietfa.amsl.com>; Wed, 13 Feb 2013 10:41:10 -0800 (PST)
Received: from smtpksrv1.mitre.org (smtpksrv1.mitre.org [198.49.146.77]) by ietfa.amsl.com (Postfix) with ESMTP id 361B021F85A0 for <oauth@ietf.org>; Wed, 13 Feb 2013 10:41:09 -0800 (PST)
Received: from smtpksrv1.mitre.org (localhost.localdomain [127.0.0.1]) by localhost (Postfix) with SMTP id 968A41F09E7; Wed, 13 Feb 2013 13:41:08 -0500 (EST)
Received: from IMCCAS01.MITRE.ORG (imccas01.mitre.org [129.83.29.78]) by smtpksrv1.mitre.org (Postfix) with ESMTP id 7F55E1F054A; Wed, 13 Feb 2013 13:41:08 -0500 (EST)
Received: from [10.146.15.29] (129.83.31.58) by IMCCAS01.MITRE.ORG (129.83.29.78) with Microsoft SMTP Server (TLS) id 14.2.318.4; Wed, 13 Feb 2013 13:41:08 -0500
Message-ID: <511BDE17.7060503@mitre.org>
Date: Wed, 13 Feb 2013 13:40:23 -0500
From: Justin Richer <jricher@mitre.org>
User-Agent: Mozilla/5.0 (X11; Linux i686; rv:17.0) Gecko/20130106 Thunderbird/17.0.2
MIME-Version: 1.0
To: Nat Sakimura <sakimura@gmail.com>
References: <51195F36.6040705@mitre.org> <780F8C26-19A4-4301-B350-307D9FFF69CD@ve7jtb.com> <80727F20-A830-4778-B11C-D45389310646@lodderstedt.net> <511A5742.30707@mitre.org> <B054D3FD-B4F6-4C57-8ED3-402F936DE17F@ve7jtb.com> <511A705F.4070204@mitre.org> <CABzCy2AaHeVQ+h18FaT8S1z9+EUbVE0WfCf63ra=7s6=f5ExLg@mail.gmail.com> <4E1F6AAD24975D4BA5B168042967394367443862@TK5EX14MBXC285.redmond.corp.microsoft.com> <-7739255357185893925@unknownmsgid>
In-Reply-To: <-7739255357185893925@unknownmsgid>
Content-Type: text/plain; charset="ISO-2022-JP"
Content-Transfer-Encoding: 7bit
X-Originating-IP: [129.83.31.58]
Cc: "oauth@ietf.org" <oauth@ietf.org>
Subject: Re: [OAUTH-WG] Registration: RESTful client lifecycle management
X-BeenThere: oauth@ietf.org
X-Mailman-Version: 2.1.12
Precedence: list
List-Id: OAUTH WG <oauth.ietf.org>
List-Unsubscribe: <https://www.ietf.org/mailman/options/oauth>, <mailto:oauth-request@ietf.org?subject=unsubscribe>
List-Archive: <http://www.ietf.org/mail-archive/web/oauth>
List-Post: <mailto:oauth@ietf.org>
List-Help: <mailto:oauth-request@ietf.org?subject=help>
List-Subscribe: <https://www.ietf.org/mailman/listinfo/oauth>, <mailto:oauth-request@ietf.org?subject=subscribe>
X-List-Received-Date: Wed, 13 Feb 2013 18:41:14 -0000

Duly noted, and while there seems to be solid support behind the
semantics of returning a URL, I'm not convinced the syntax argument is
over yet either. I have seen support and good arguments from both sides
and there isn't a clear winner there (see the other thread). Speaking as
an individual member, I could go with either approach and I'd like to
see what the rest of the WG wants.

Speaking now as an editor: It's been suggested off-list that we adopt
the simplified (bespoke) mechanism of the "registration_access_url"
syntax for the next draft and continue to move discussion forward for
the inclusion of the more-general mechanism (beit HAL based or something
similar like JSON-LD) here on the list. Would you and the other HAL
supporters be amenable to this solution? I wouldn't be opposed to adding
a kind of "note for discussion" section to the -06 draft to help
facilitate moving forward in a concrete manner, with the assumption that
the text would be either removed or incorporated in a later draft. I
just have to put a stake down somewhere on the syntax, and I'm leaning
towards the one that doesn't add a normative dependency on an unfinished
(as of right now) work.

-- Justin

On 02/13/2013 01:27 PM, Nat Sakimura wrote:
> I am against the syntax of registration_access_url .
>
> =nat via iPhone
>
> Feb 13, 2013 3:37$B!"(BMike Jones <Michael.Jones@microsoft.com> $B$N%a%C%;!<%8(B:
>
>> Then I think we've reached an acceptable resolution on this one.  By having the server return the registration_access_url upon create and having the client be required to include the client_id upon update, servers are free to manage their registration endpoint(s) as they see fit and clients always do the same thing.
>>
>>                Thanks all,
>>                -- Mike
>>
>> -----Original Message-----
>> From: oauth-bounces@ietf.org [mailto:oauth-bounces@ietf.org] On Behalf Of Nat Sakimura
>> Sent: Tuesday, February 12, 2013 9:15 AM
>> To: Justin Richer
>> Cc: oauth@ietf.org
>> Subject: Re: [OAUTH-WG] Registration: RESTful client lifecycle management
>>
>> 2013/2/13 Justin Richer <jricher@mitre.org>:
>>> On 02/12/2013 11:30 AM, John Bradley wrote:
>>>> To some extent we want the server to have the flexibility it needs.
>>>>
>>>> If the server knows it is going to need client_id for GET it needs to
>>>> encode it in the resource URI ether as part of the path or as a query
>>>> parameter (that is up to the server)
>>>>
>>>> When doing updates the client MUST include the client_id as an
>>>> additional integrity check.  Some servers may switch on that but that is up to them.
>>> So if by this you mean that the client still simply follows whatever
>>> update url the server hands it (which may or may not include the
>>> client_id in some form, but the client doesn't care), and that the
>>> client MUST include its client_id in the request body (top-level
>>> member of a JSON object, at the
>>> moment) when doing a PUT (or POST/PATCH? see below) for the update
>>> action, then I'm totally fine with that. Is this what you're suggesting?
>> As far as I understand, yes. That is what we discussed last Thursday face to face.
>>
>>
>> --
>> Nat Sakimura (=nat)
>> Chairman, OpenID Foundation
>> http://nat.sakimura.org/
>> @_nat_en
>> _______________________________________________
>> OAuth mailing list
>> OAuth@ietf.org
>> https://www.ietf.org/mailman/listinfo/oauth


From Michael.Jones@microsoft.com  Wed Feb 13 12:11:23 2013
Return-Path: <Michael.Jones@microsoft.com>
X-Original-To: oauth@ietfa.amsl.com
Delivered-To: oauth@ietfa.amsl.com
Received: from localhost (localhost [127.0.0.1]) by ietfa.amsl.com (Postfix) with ESMTP id 573D621F86B8 for <oauth@ietfa.amsl.com>; Wed, 13 Feb 2013 12:11:23 -0800 (PST)
X-Virus-Scanned: amavisd-new at amsl.com
X-Spam-Flag: NO
X-Spam-Score: -2.422
X-Spam-Level: 
X-Spam-Status: No, score=-2.422 tagged_above=-999 required=5 tests=[AWL=0.176,  BAYES_00=-2.599, HTML_MESSAGE=0.001]
Received: from mail.ietf.org ([64.170.98.30]) by localhost (ietfa.amsl.com [127.0.0.1]) (amavisd-new, port 10024) with ESMTP id Iqh+fnsequ6V for <oauth@ietfa.amsl.com>; Wed, 13 Feb 2013 12:11:16 -0800 (PST)
Received: from na01-bl2-obe.outbound.protection.outlook.com (na01-bl2-obe.ptr.protection.outlook.com [65.55.169.28]) by ietfa.amsl.com (Postfix) with ESMTP id 0A78121F8688 for <oauth@ietf.org>; Wed, 13 Feb 2013 12:11:15 -0800 (PST)
Received: from BL2FFO11FD011.protection.gbl (10.173.161.202) by BL2FFO11HUB028.protection.gbl (10.173.161.52) with Microsoft SMTP Server (TLS) id 15.0.620.12; Wed, 13 Feb 2013 20:08:46 +0000
Received: from TK5EX14MLTC104.redmond.corp.microsoft.com (131.107.125.37) by BL2FFO11FD011.mail.protection.outlook.com (10.173.161.17) with Microsoft SMTP Server (TLS) id 15.0.620.12 via Frontend Transport; Wed, 13 Feb 2013 20:08:44 +0000
Received: from TK5EX14MBXC285.redmond.corp.microsoft.com ([169.254.3.232]) by TK5EX14MLTC104.redmond.corp.microsoft.com ([157.54.79.159]) with mapi id 14.02.0318.003; Wed, 13 Feb 2013 20:04:01 +0000
From: Mike Jones <Michael.Jones@microsoft.com>
To: Justin Richer <jricher@mitre.org>, Nat Sakimura <sakimura@gmail.com>
Thread-Topic: [OAUTH-WG] Registration: RESTful client lifecycle management
Thread-Index: AQHOCJzxVGwYODuh3UmktcEEXHrfK5h1dc0AgABcxoCAAH10AIAAG1EAgAACn4CAAAnLAIAAFhgggAGQiACAAAOOgIAAF12M
Date: Wed, 13 Feb 2013 20:04:00 +0000
Message-ID: <4E1F6AAD24975D4BA5B1680429673943674465F3@TK5EX14MBXC285.redmond.corp.microsoft.com>
References: <51195F36.6040705@mitre.org> <780F8C26-19A4-4301-B350-307D9FFF69CD@ve7jtb.com> <80727F20-A830-4778-B11C-D45389310646@lodderstedt.net> <511A5742.30707@mitre.org> <B054D3FD-B4F6-4C57-8ED3-402F936DE17F@ve7jtb.com> <511A705F.4070204@mitre.org> <CABzCy2AaHeVQ+h18FaT8S1z9+EUbVE0WfCf63ra=7s6=f5ExLg@mail.gmail.com> <4E1F6AAD24975D4BA5B168042967394367443862@TK5EX14MBXC285.redmond.corp.microsoft.com> <-7739255357185893925@unknownmsgid>,<511BDE17.7060503@mitre.org>
In-Reply-To: <511BDE17.7060503@mitre.org>
Accept-Language: en-US
Content-Language: en-US
X-MS-Has-Attach: 
X-MS-TNEF-Correlator: 
Content-Type: multipart/alternative; boundary="_000_4E1F6AAD24975D4BA5B1680429673943674465F3TK5EX14MBXC285r_"
MIME-Version: 1.0
X-Forefront-Antispam-Report: CIP:131.107.125.37; CTRY:US; IPV:CAL; IPV:NLI; EFV:NLI; SFV:NSPM; SFS:(199002)(189002)(479174001)(24454001)(55885001)(377454001)(51704002)(13464002)(33656001)(47446002)(63696002)(44976002)(31966008)(55846006)(53806001)(80022001)(5343635001)(16236675001)(5343655001)(16406001)(74662001)(15202345001)(74502001)(56816002)(65816001)(54356001)(512904001)(79102001)(50986001)(47976001)(56776001)(54316002)(77982001)(51856001)(59766001)(46102001)(76482001)(20776003)(4396001)(47736001)(49866001); DIR:OUT; SFP:; SCL:1; SRVR:BL2FFO11HUB028; H:TK5EX14MLTC104.redmond.corp.microsoft.com; RD:InfoDomainNonexistent; A:1; MX:1; LANG:; 
X-OriginatorOrg: microsoft.onmicrosoft.com
X-Forefront-PRVS: 07562C22DA
Cc: "oauth@ietf.org" <oauth@ietf.org>
Subject: Re: [OAUTH-WG] Registration: RESTful client lifecycle management
X-BeenThere: oauth@ietf.org
X-Mailman-Version: 2.1.12
Precedence: list
List-Id: OAUTH WG <oauth.ietf.org>
List-Unsubscribe: <https://www.ietf.org/mailman/options/oauth>, <mailto:oauth-request@ietf.org?subject=unsubscribe>
List-Archive: <http://www.ietf.org/mail-archive/web/oauth>
List-Post: <mailto:oauth@ietf.org>
List-Help: <mailto:oauth-request@ietf.org?subject=help>
List-Subscribe: <https://www.ietf.org/mailman/listinfo/oauth>, <mailto:oauth-request@ietf.org?subject=subscribe>
X-List-Received-Date: Wed, 13 Feb 2013 20:11:23 -0000

--_000_4E1F6AAD24975D4BA5B1680429673943674465F3TK5EX14MBXC285r_
Content-Type: text/plain; charset="iso-2022-jp"
Content-Transfer-Encoding: quoted-printable

+1

________________________________
From: Justin Richer
Sent: 2/13/2013 10:41 AM
To: Nat Sakimura
Cc: Mike Jones; oauth@ietf.org
Subject: Re: [OAUTH-WG] Registration: RESTful client lifecycle management

Duly noted, and while there seems to be solid support behind the
semantics of returning a URL, I'm not convinced the syntax argument is
over yet either. I have seen support and good arguments from both sides
and there isn't a clear winner there (see the other thread). Speaking as
an individual member, I could go with either approach and I'd like to
see what the rest of the WG wants.

Speaking now as an editor: It's been suggested off-list that we adopt
the simplified (bespoke) mechanism of the "registration_access_url"
syntax for the next draft and continue to move discussion forward for
the inclusion of the more-general mechanism (beit HAL based or something
similar like JSON-LD) here on the list. Would you and the other HAL
supporters be amenable to this solution? I wouldn't be opposed to adding
a kind of "note for discussion" section to the -06 draft to help
facilitate moving forward in a concrete manner, with the assumption that
the text would be either removed or incorporated in a later draft. I
just have to put a stake down somewhere on the syntax, and I'm leaning
towards the one that doesn't add a normative dependency on an unfinished
(as of right now) work.

-- Justin

On 02/13/2013 01:27 PM, Nat Sakimura wrote:
> I am against the syntax of registration_access_url .
>
> =3Dnat via iPhone
>
> Feb 13, 2013 3:37=1B$B!"=1B(BMike Jones <Michael.Jones@microsoft.com> =1B=
$B$N%a%C%;!<%8=1B(B:
>
>> Then I think we've reached an acceptable resolution on this one.  By hav=
ing the server return the registration_access_url upon create and having th=
e client be required to include the client_id upon update, servers are free=
 to manage their registration endpoint(s) as they see fit and clients alway=
s do the same thing.
>>
>>                Thanks all,
>>                -- Mike
>>
>> -----Original Message-----
>> From: oauth-bounces@ietf.org [mailto:oauth-bounces@ietf.org] On Behalf O=
f Nat Sakimura
>> Sent: Tuesday, February 12, 2013 9:15 AM
>> To: Justin Richer
>> Cc: oauth@ietf.org
>> Subject: Re: [OAUTH-WG] Registration: RESTful client lifecycle managemen=
t
>>
>> 2013/2/13 Justin Richer <jricher@mitre.org>:
>>> On 02/12/2013 11:30 AM, John Bradley wrote:
>>>> To some extent we want the server to have the flexibility it needs.
>>>>
>>>> If the server knows it is going to need client_id for GET it needs to
>>>> encode it in the resource URI ether as part of the path or as a query
>>>> parameter (that is up to the server)
>>>>
>>>> When doing updates the client MUST include the client_id as an
>>>> additional integrity check.  Some servers may switch on that but that =
is up to them.
>>> So if by this you mean that the client still simply follows whatever
>>> update url the server hands it (which may or may not include the
>>> client_id in some form, but the client doesn't care), and that the
>>> client MUST include its client_id in the request body (top-level
>>> member of a JSON object, at the
>>> moment) when doing a PUT (or POST/PATCH? see below) for the update
>>> action, then I'm totally fine with that. Is this what you're suggesting=
?
>> As far as I understand, yes. That is what we discussed last Thursday fac=
e to face.
>>
>>
>> --
>> Nat Sakimura (=3Dnat)
>> Chairman, OpenID Foundation
>> http://nat.sakimura.org/
>> @_nat_en
>> _______________________________________________
>> OAuth mailing list
>> OAuth@ietf.org
>> https://www.ietf.org/mailman/listinfo/oauth


--_000_4E1F6AAD24975D4BA5B1680429673943674465F3TK5EX14MBXC285r_
Content-Type: text/html; charset="iso-2022-jp"
Content-Transfer-Encoding: quoted-printable

<html>
<head>
<meta http-equiv=3D"Content-Type" content=3D"text/html; charset=3Diso-2022-=
jp">
<meta name=3D"Generator" content=3D"Microsoft Exchange Server">
<!-- converted from text --><style><!-- .EmailQuote { margin-left: 1pt; pad=
ding-left: 4pt; border-left: #800000 2px solid; } --></style>
</head>
<body>
<div>
<div>
<div style=3D"font-family:Calibri,sans-serif; font-size:11pt">&#43;1<br>
<br>
</div>
</div>
<hr>
<span style=3D"font-family:Tahoma,sans-serif; font-size:10pt; font-weight:b=
old">From:
</span><span style=3D"font-family:Tahoma,sans-serif; font-size:10pt">Justin=
 Richer</span><br>
<span style=3D"font-family:Tahoma,sans-serif; font-size:10pt; font-weight:b=
old">Sent:
</span><span style=3D"font-family:Tahoma,sans-serif; font-size:10pt">2/13/2=
013 10:41 AM</span><br>
<span style=3D"font-family:Tahoma,sans-serif; font-size:10pt; font-weight:b=
old">To:
</span><span style=3D"font-family:Tahoma,sans-serif; font-size:10pt">Nat Sa=
kimura</span><br>
<span style=3D"font-family:Tahoma,sans-serif; font-size:10pt; font-weight:b=
old">Cc:
</span><span style=3D"font-family:Tahoma,sans-serif; font-size:10pt">Mike J=
ones; oauth@ietf.org</span><br>
<span style=3D"font-family:Tahoma,sans-serif; font-size:10pt; font-weight:b=
old">Subject:
</span><span style=3D"font-family:Tahoma,sans-serif; font-size:10pt">Re: [O=
AUTH-WG] Registration: RESTful client lifecycle management</span><br>
<br>
</div>
<font size=3D"2"><span style=3D"font-size:10pt;">
<div class=3D"PlainText">Duly noted, and while there seems to be solid supp=
ort behind the<br>
semantics of returning a URL, I'm not convinced the syntax argument is<br>
over yet either. I have seen support and good arguments from both sides<br>
and there isn't a clear winner there (see the other thread). Speaking as<br=
>
an individual member, I could go with either approach and I'd like to<br>
see what the rest of the WG wants.<br>
<br>
Speaking now as an editor: It's been suggested off-list that we adopt<br>
the simplified (bespoke) mechanism of the &quot;registration_access_url&quo=
t;<br>
syntax for the next draft and continue to move discussion forward for<br>
the inclusion of the more-general mechanism (beit HAL based or something<br=
>
similar like JSON-LD) here on the list. Would you and the other HAL<br>
supporters be amenable to this solution? I wouldn't be opposed to adding<br=
>
a kind of &quot;note for discussion&quot; section to the -06 draft to help<=
br>
facilitate moving forward in a concrete manner, with the assumption that<br=
>
the text would be either removed or incorporated in a later draft. I<br>
just have to put a stake down somewhere on the syntax, and I'm leaning<br>
towards the one that doesn't add a normative dependency on an unfinished<br=
>
(as of right now) work.<br>
<br>
-- Justin<br>
<br>
On 02/13/2013 01:27 PM, Nat Sakimura wrote:<br>
&gt; I am against the syntax of registration_access_url .<br>
&gt;<br>
&gt; =3Dnat via iPhone<br>
&gt;<br>
&gt; Feb 13, 2013 3:37=1B$B!"=1B(BMike Jones &lt;Michael.Jones@microsoft.co=
m&gt; =1B$B$N%a%C%;!<%8=1B(B:<br>
&gt;<br>
&gt;&gt; Then I think we've reached an acceptable resolution on this one.&n=
bsp; By having the server return the registration_access_url upon create an=
d having the client be required to include the client_id upon update, serve=
rs are free to manage their registration endpoint(s)
 as they see fit and clients always do the same thing.<br>
&gt;&gt;<br>
&gt;&gt;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&=
nbsp;&nbsp;&nbsp;&nbsp; Thanks all,<br>
&gt;&gt;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&=
nbsp;&nbsp;&nbsp;&nbsp; -- Mike<br>
&gt;&gt;<br>
&gt;&gt; -----Original Message-----<br>
&gt;&gt; From: oauth-bounces@ietf.org [<a href=3D"mailto:oauth-bounces@ietf=
.org">mailto:oauth-bounces@ietf.org</a>] On Behalf Of Nat Sakimura<br>
&gt;&gt; Sent: Tuesday, February 12, 2013 9:15 AM<br>
&gt;&gt; To: Justin Richer<br>
&gt;&gt; Cc: oauth@ietf.org<br>
&gt;&gt; Subject: Re: [OAUTH-WG] Registration: RESTful client lifecycle man=
agement<br>
&gt;&gt;<br>
&gt;&gt; 2013/2/13 Justin Richer &lt;jricher@mitre.org&gt;:<br>
&gt;&gt;&gt; On 02/12/2013 11:30 AM, John Bradley wrote:<br>
&gt;&gt;&gt;&gt; To some extent we want the server to have the flexibility =
it needs.<br>
&gt;&gt;&gt;&gt;<br>
&gt;&gt;&gt;&gt; If the server knows it is going to need client_id for GET =
it needs to<br>
&gt;&gt;&gt;&gt; encode it in the resource URI ether as part of the path or=
 as a query<br>
&gt;&gt;&gt;&gt; parameter (that is up to the server)<br>
&gt;&gt;&gt;&gt;<br>
&gt;&gt;&gt;&gt; When doing updates the client MUST include the client_id a=
s an<br>
&gt;&gt;&gt;&gt; additional integrity check.&nbsp; Some servers may switch =
on that but that is up to them.<br>
&gt;&gt;&gt; So if by this you mean that the client still simply follows wh=
atever<br>
&gt;&gt;&gt; update url the server hands it (which may or may not include t=
he<br>
&gt;&gt;&gt; client_id in some form, but the client doesn't care), and that=
 the<br>
&gt;&gt;&gt; client MUST include its client_id in the request body (top-lev=
el<br>
&gt;&gt;&gt; member of a JSON object, at the<br>
&gt;&gt;&gt; moment) when doing a PUT (or POST/PATCH? see below) for the up=
date<br>
&gt;&gt;&gt; action, then I'm totally fine with that. Is this what you're s=
uggesting?<br>
&gt;&gt; As far as I understand, yes. That is what we discussed last Thursd=
ay face to face.<br>
&gt;&gt;<br>
&gt;&gt;<br>
&gt;&gt; --<br>
&gt;&gt; Nat Sakimura (=3Dnat)<br>
&gt;&gt; Chairman, OpenID Foundation<br>
&gt;&gt; <a href=3D"http://nat.sakimura.org/">http://nat.sakimura.org/</a><=
br>
&gt;&gt; @_nat_en<br>
&gt;&gt; _______________________________________________<br>
&gt;&gt; OAuth mailing list<br>
&gt;&gt; OAuth@ietf.org<br>
&gt;&gt; <a href=3D"https://www.ietf.org/mailman/listinfo/oauth">https://ww=
w.ietf.org/mailman/listinfo/oauth</a><br>
<br>
</div>
</span></font>
</body>
</html>

--_000_4E1F6AAD24975D4BA5B1680429673943674465F3TK5EX14MBXC285r_--

From ve7jtb@ve7jtb.com  Wed Feb 13 12:18:21 2013
Return-Path: <ve7jtb@ve7jtb.com>
X-Original-To: oauth@ietfa.amsl.com
Delivered-To: oauth@ietfa.amsl.com
Received: from localhost (localhost [127.0.0.1]) by ietfa.amsl.com (Postfix) with ESMTP id 3DD1821F84B6 for <oauth@ietfa.amsl.com>; Wed, 13 Feb 2013 12:18:21 -0800 (PST)
X-Virus-Scanned: amavisd-new at amsl.com
X-Spam-Flag: NO
X-Spam-Score: -3.344
X-Spam-Level: 
X-Spam-Status: No, score=-3.344 tagged_above=-999 required=5 tests=[AWL=0.255,  BAYES_00=-2.599, RCVD_IN_DNSWL_LOW=-1]
Received: from mail.ietf.org ([64.170.98.30]) by localhost (ietfa.amsl.com [127.0.0.1]) (amavisd-new, port 10024) with ESMTP id eu19D52SFgcK for <oauth@ietfa.amsl.com>; Wed, 13 Feb 2013 12:18:20 -0800 (PST)
Received: from mail-qe0-f52.google.com (mail-qe0-f52.google.com [209.85.128.52]) by ietfa.amsl.com (Postfix) with ESMTP id 1073321F8488 for <oauth@ietf.org>; Wed, 13 Feb 2013 12:18:19 -0800 (PST)
Received: by mail-qe0-f52.google.com with SMTP id 6so748097qeb.11 for <oauth@ietf.org>; Wed, 13 Feb 2013 12:18:19 -0800 (PST)
X-Google-DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=google.com; s=20120113; h=x-received:content-type:mime-version:subject:from:in-reply-to:date :cc:content-transfer-encoding:message-id:references:to:x-mailer :x-gm-message-state; bh=g2IFdhgFHNySmJ90J/O6am+OWq2HLQY8gQZZPj6+uVY=; b=ZvXPqvDWs+3NVsKv1kPdLDylVzi34rkQuwu0sjoMvdmAatZbKM99J1UdB8JP5V8MNH SKWnQopFMAceWM8uyYvey7lnNWvse73G7CzxNpERqRTlOhzt3fPbgvZUYH5ju0hx2jue XUmL848ExZhaTx7VlnT3mumVXcqglFMQf3W2BtDAvBaM0cHW0VNdFL3480JjWWM8E5lK 4lI2MRlwGR5BwM7cZsnliInKi2S4eb6l8pxBVkQiyJcLiZBHsA1VflVoGAnHse/Lshml 8kDTbF6jDPiwAExWi63dje0u6s/P2php3EpmBh0lY9eTCJGnxrKYf6MZkJRlGR6W84ee 1+fw==
X-Received: by 10.49.37.226 with SMTP id b2mr10476697qek.31.1360786699230; Wed, 13 Feb 2013 12:18:19 -0800 (PST)
Received: from [192.168.1.213] ([190.20.26.0]) by mx.google.com with ESMTPS id f5sm17775184qac.5.2013.02.13.12.18.15 (version=TLSv1 cipher=ECDHE-RSA-RC4-SHA bits=128/128); Wed, 13 Feb 2013 12:18:18 -0800 (PST)
Content-Type: text/plain; charset=utf-8
Mime-Version: 1.0 (Mac OS X Mail 6.2 \(1499\))
From: John Bradley <ve7jtb@ve7jtb.com>
In-Reply-To: <-4554688250617930935@unknownmsgid>
Date: Wed, 13 Feb 2013 17:18:12 -0300
Content-Transfer-Encoding: quoted-printable
Message-Id: <AF401161-0C7C-4E49-9F44-9982B312FF6D@ve7jtb.com>
References: <51195F36.6040705@mitre.org> <780F8C26-19A4-4301-B350-307D9FFF69CD@ve7jtb.com> <511BAA8B.8030309@mitre.org> <BEBDAFAC-28B0-4959-9FE5-34EC17FC318C@ve7jtb.com> <-4554688250617930935@unknownmsgid>
To: Nat Sakimura <sakimura@gmail.com>
X-Mailer: Apple Mail (2.1499)
X-Gm-Message-State: ALoCoQkFVRlFNUUcxuVItC+UvZsqf1FRHVjVtQjQ2vc8rpizNpXvH9sX7RLTHn4ZMSnw95Xw4U0h
Cc: "oauth@ietf.org" <oauth@ietf.org>
Subject: Re: [OAUTH-WG] Registration: RESTful client lifecycle management
X-BeenThere: oauth@ietf.org
X-Mailman-Version: 2.1.12
Precedence: list
List-Id: OAUTH WG <oauth.ietf.org>
List-Unsubscribe: <https://www.ietf.org/mailman/options/oauth>, <mailto:oauth-request@ietf.org?subject=unsubscribe>
List-Archive: <http://www.ietf.org/mail-archive/web/oauth>
List-Post: <mailto:oauth@ietf.org>
List-Help: <mailto:oauth-request@ietf.org?subject=help>
List-Subscribe: <https://www.ietf.org/mailman/listinfo/oauth>, <mailto:oauth-request@ietf.org?subject=subscribe>
X-List-Received-Date: Wed, 13 Feb 2013 20:18:21 -0000

DELETE is removing the record not resetting it to defaults.  They are =
quite diffrent.

I want to agree on what the expected behaviour of DELETE is.   I think =
we have agreement on PUT and POST.

The general not in that a client can DELETE it's record is a implication =
I don't like.  I think that is for the server to decide and if it is not =
actually deleting it then DELETE is the wrong verb to use.

John B.

On 2013-02-13, at 3:31 PM, Nat Sakimura <sakimura@gmail.com> wrote:

> Generally speaking, mapping PUT to replace and POST to change is an
> acceptable practice so I am fine with it.
>=20
> Now, what I still do not understand is why you think it is fine to do
> PUT or POST and not DELETE. Doing PUT with empty content is almost the
> same as DELETE. Could you explain?
>=20
> =3Dnat via iPhone
>=20
> Feb 14, 2013 0:10=E3=80=81John Bradley <ve7jtb@ve7jtb.com> =
=E3=81=AE=E3=83=A1=E3=83=83=E3=82=BB=E3=83=BC=E3=82=B8:
>=20
>> I am not violently opposed to PUT as a option that completely =
replaces the resource setting all unsent claims back to the defaults.
>>=20
>> I don't have a good feeling about DELETE,  I think we still need more =
discussion on what it means, what privileges it takes to invoke it etc.
>> It could be a bad thing if we get wrong or is not implemented =
consistently.
>>=20
>> Personally I don't think a client should ever be able to DELETE it's =
record.
>>=20
>> I think marking a client_id as pending provisioning, suspended,  =
revoked etc is better and that can be done with a claim in the update =
endpoint.
>>=20
>> It should only be the server that deletes a record after satisfying =
it's audit requirements.
>>=20
>> John B.
>>=20
>> On 2013-02-13, at 12:00 PM, Justin Richer <jricher@mitre.org> wrote:
>>=20
>>> Would it be reasonable to mark the PUT and DELETE methods as =
optional for the server to implement, but with defined semantics if they =
do? I want to keep GET and POST(create) as mandatory, as I think that's =
the minimal set of functionality required.
>>>=20
>>> -- Justin
>>>=20
>>> On 02/11/2013 08:51 PM, John Bradley wrote:
>>>> I would always include the client_id on update.
>>>>=20
>>>> I think it is also us full to have other tokens used at the update =
endpoint.  I can see the master token used to update all the clients it =
has registered as part of API management.
>>>> Relying on the registration_access_token is probably a design that =
will cause trouble down the road.
>>>>=20
>>>> I think GET and POST are relatively clear.   I don't know about =
expelling PUT to developers.  I think POST with a client_id to a =
(separate discussion) update_uri works without restricting it to PUT.
>>>>=20
>>>> I think DELETE needs to be better understood.   I think a status =
that can be set for client lifecycle is better than letting a client =
delete a entry.
>>>> In some cases there will be more than one instance of a client and =
letting them know they have been turned off for a reason is better than =
making there registration disappear.
>>>> So for the moment I would levee out DELETE.
>>>>=20
>>>> John B.
>>>>=20
>>>> On 2013-02-11, at 6:14 PM, Justin Richer <jricher@mitre.org> wrote:
>>>>=20
>>>>> Draft -05 of OAuth Dynamic Client Registration [1] defines several =
operations that the client can take on its behalf as part of the =
registration process. These boil down to the basic CRUD operations that =
you find in many APIs: Create, Read, Update, Delete. Draft -00 defined =
only the "Create" operation, draft -01 through -04 added the "Update" =
operation, switched using the "operation=3D" parameter.
>>>>>=20
>>>>> Following several suggestions to do so on the list, the -05 draft =
defines these operations in terms of a RESTful API for the client. =
Namely:
>>>>>=20
>>>>> - HTTP POST to registration endpoint =3D> Create (register) a new =
client
>>>>> - HTTP PUT to update endpoint (with registration_access_token) =3D> =
Update the registered information for this client
>>>>> - HTTP GET to update endpoint (with registration_access_token) =3D> =
read the registered information for this client
>>>>> - HTTP DELETE to update endpoint (with registration_access_token) =
=3D> Delete (unregister/de-provision) this client
>>>>>=20
>>>>> The two main issues at stake here are: the addition of the READ =
and DELETE methods, and the use of HTTP verbs following a RESTful design =
philosophy.
>>>>>=20
>>>>> Pro:
>>>>> - RESTful APIs (with HTTP verbs to differentiate functionality) =
are the norm today
>>>>> - Full lifecycle management is common and is going to be expected =
by many users of this protocol in the wild
>>>>>=20
>>>>> Cons:
>>>>> - Update semantics are still under debate (full replace? patch?)
>>>>> - Somewhat increased complexity on the server to support all =
operations
>>>>> - Client has to understand all HTTP verbs for full access (though =
plain registration is just POST)
>>>>>=20
>>>>>=20
>>>>> Alternatives include using an operational switch parameter (like =
the old drafts), defining separate endpoints for every action, or doing =
all operations on a single endpoint using verbs to switch.
>>>>>=20
>>>>> -- Justin
>>>>>=20
>>>>> [1] http://tools.ietf.org/html/draft-ietf-oauth-dyn-reg-05
>>>>> _______________________________________________
>>>>> OAuth mailing list
>>>>> OAuth@ietf.org
>>>>> https://www.ietf.org/mailman/listinfo/oauth
>>=20
>> _______________________________________________
>> OAuth mailing list
>> OAuth@ietf.org
>> https://www.ietf.org/mailman/listinfo/oauth


From twbray@google.com  Wed Feb 13 13:27:06 2013
Return-Path: <twbray@google.com>
X-Original-To: oauth@ietfa.amsl.com
Delivered-To: oauth@ietfa.amsl.com
Received: from localhost (localhost [127.0.0.1]) by ietfa.amsl.com (Postfix) with ESMTP id 2E18021E8084 for <oauth@ietfa.amsl.com>; Wed, 13 Feb 2013 13:27:05 -0800 (PST)
X-Virus-Scanned: amavisd-new at amsl.com
X-Spam-Flag: NO
X-Spam-Score: -101.769
X-Spam-Level: 
X-Spam-Status: No, score=-101.769 tagged_above=-999 required=5 tests=[AWL=0.208, BAYES_00=-2.599, FM_FORGED_GMAIL=0.622, HTML_MESSAGE=0.001, NO_RELAYS=-0.001, USER_IN_WHITELIST=-100]
Received: from mail.ietf.org ([64.170.98.30]) by localhost (ietfa.amsl.com [127.0.0.1]) (amavisd-new, port 10024) with ESMTP id Xie3Qh39jbbf for <oauth@ietfa.amsl.com>; Wed, 13 Feb 2013 13:27:03 -0800 (PST)
Received: from mail-ie0-x22f.google.com (ie-in-x022f.1e100.net [IPv6:2607:f8b0:4001:c03::22f]) by ietfa.amsl.com (Postfix) with ESMTP id B436A21E803D for <oauth@ietf.org>; Wed, 13 Feb 2013 13:27:03 -0800 (PST)
Received: by mail-ie0-f175.google.com with SMTP id c12so2330115ieb.6 for <oauth@ietf.org>; Wed, 13 Feb 2013 13:27:03 -0800 (PST)
DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=google.com; s=20120113; h=x-received:mime-version:in-reply-to:references:from:date:message-id :subject:to:cc:content-type; bh=39WoTEOKujqj2qjNQQchF/J7CrflEkMSdISeL5QFjvQ=; b=TGj9QW5t0obh+1Pautyoc1mg4aquFg/Lbz0xnx0ismX5v9dxm3utkhA7h8/cOp4La+ 5H4YFPzwKZhZ44khom3pJT5IVuMF69xK44tHbNO+7ZLYb1KI5NpaHNaedc237cz1ofMe 47viWdEySnggV1CorwZq4WswqpZIBzn2gqQh1bmgJppWQL0kkpxi3Dn4bpiwctSpufm4 EgiH+SGaYKw7J6Iy0LMw+7fTWW2IKwp8xigKUjhBHEr1KUpGcPe401yUoC6E1toNZUEs pbcZmNMzP/qKooR//YhKf0BKCUhVgZhbkLBdHaaBptCk+9/Dwt93/nAhh22G/Xnzdel+ hyEg==
X-Google-DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=google.com; s=20120113; h=x-received:mime-version:in-reply-to:references:from:date:message-id :subject:to:cc:content-type:x-gm-message-state; bh=39WoTEOKujqj2qjNQQchF/J7CrflEkMSdISeL5QFjvQ=; b=Y3K5wH0zKI1eL79YurgdQIIaim9kEXgUXV2LBAeK+YVyFA4x7BJPj4gIgbul5fXAnM uCfhDGChL1CoknfmmGSLmycQekEq3LtLVvPWKXw+Kqnp6g5cOdeN55RpHB0GrPQZw67D 4LYsfEWvfGns7Y/CwguSfRAo6Zb4lZDYUg5bG2qWBSSwmHIRGmrcR/3BnRpxJ8OZpdB7 K/lY2ENT11b7QM4Z3XuVKInWYq3BY+0MjWL9FzsTXvUbXv/+gDO6yZmUps42zeXlzhJN WS+YyFsyzqQHiVfa6AVYc0LSnPl0RMs/gRXxGuNg+GPRHiYq9RNGmzCHG5De9y6rtr+s OezA==
X-Received: by 10.50.182.234 with SMTP id eh10mr9856695igc.40.1360790823060; Wed, 13 Feb 2013 13:27:03 -0800 (PST)
MIME-Version: 1.0
Received: by 10.64.16.199 with HTTP; Wed, 13 Feb 2013 13:26:32 -0800 (PST)
In-Reply-To: <AF401161-0C7C-4E49-9F44-9982B312FF6D@ve7jtb.com>
References: <51195F36.6040705@mitre.org> <780F8C26-19A4-4301-B350-307D9FFF69CD@ve7jtb.com> <511BAA8B.8030309@mitre.org> <BEBDAFAC-28B0-4959-9FE5-34EC17FC318C@ve7jtb.com> <-4554688250617930935@unknownmsgid> <AF401161-0C7C-4E49-9F44-9982B312FF6D@ve7jtb.com>
From: Tim Bray <twbray@google.com>
Date: Wed, 13 Feb 2013 13:26:32 -0800
Message-ID: <CA+ZpN24+zBbYh0BV+yUQ2WprxFjSVa9hJ8qJ4t9HZx+u5HHM4w@mail.gmail.com>
To: John Bradley <ve7jtb@ve7jtb.com>
Content-Type: multipart/alternative; boundary=14dae9340ae99f438504d5a1cd62
X-Gm-Message-State: ALoCoQkw3Evsg5frerDshrXaJhKMZrKnSjbs6pLmeHbM3PiwzLHjkmEpRSp3uWpwPqeU+4pfJ+3DmpB9xvyMO34Sh0NLKc4PvzoCWIlP6sHWUd/AMXfSPccRdAVK9teRdqzyNB08KVz3BdxpZr5Z7gN3oNgHBGaekql20xuppULYJwv6NntJqvSFMPQpEAYhWSBrDZjTp8my
Cc: "oauth@ietf.org" <oauth@ietf.org>
Subject: Re: [OAUTH-WG] Registration: RESTful client lifecycle management
X-BeenThere: oauth@ietf.org
X-Mailman-Version: 2.1.12
Precedence: list
List-Id: OAUTH WG <oauth.ietf.org>
List-Unsubscribe: <https://www.ietf.org/mailman/options/oauth>, <mailto:oauth-request@ietf.org?subject=unsubscribe>
List-Archive: <http://www.ietf.org/mail-archive/web/oauth>
List-Post: <mailto:oauth@ietf.org>
List-Help: <mailto:oauth-request@ietf.org?subject=help>
List-Subscribe: <https://www.ietf.org/mailman/listinfo/oauth>, <mailto:oauth-request@ietf.org?subject=subscribe>
X-List-Received-Date: Wed, 13 Feb 2013 21:27:07 -0000

--14dae9340ae99f438504d5a1cd62
Content-Type: text/plain; charset=UTF-8
Content-Transfer-Encoding: quoted-printable

A DELETE is an http request that asks the server to delete something.  We
probably would want to avoid writing a requirement into the standard that
the server has to comply.  So you get back a 204 if it worked, a 404 if
there is no such registration, a 403 if there is but the server declines to
delete, etc. Seems pretty straightforward. -T

On Wed, Feb 13, 2013 at 12:18 PM, John Bradley <ve7jtb@ve7jtb.com> wrote:

> DELETE is removing the record not resetting it to defaults.  They are
> quite diffrent.
>
> I want to agree on what the expected behaviour of DELETE is.   I think we
> have agreement on PUT and POST.
>
> The general not in that a client can DELETE it's record is a implication =
I
> don't like.  I think that is for the server to decide and if it is not
> actually deleting it then DELETE is the wrong verb to use.
>
> John B.
>
> On 2013-02-13, at 3:31 PM, Nat Sakimura <sakimura@gmail.com> wrote:
>
> > Generally speaking, mapping PUT to replace and POST to change is an
> > acceptable practice so I am fine with it.
> >
> > Now, what I still do not understand is why you think it is fine to do
> > PUT or POST and not DELETE. Doing PUT with empty content is almost the
> > same as DELETE. Could you explain?
> >
> > =3Dnat via iPhone
> >
> > Feb 14, 2013 0:10=E3=80=81John Bradley <ve7jtb@ve7jtb.com> =E3=81=AE=E3=
=83=A1=E3=83=83=E3=82=BB=E3=83=BC=E3=82=B8:
> >
> >> I am not violently opposed to PUT as a option that completely replaces
> the resource setting all unsent claims back to the defaults.
> >>
> >> I don't have a good feeling about DELETE,  I think we still need more
> discussion on what it means, what privileges it takes to invoke it etc.
> >> It could be a bad thing if we get wrong or is not implemented
> consistently.
> >>
> >> Personally I don't think a client should ever be able to DELETE it's
> record.
> >>
> >> I think marking a client_id as pending provisioning, suspended,
>  revoked etc is better and that can be done with a claim in the update
> endpoint.
> >>
> >> It should only be the server that deletes a record after satisfying
> it's audit requirements.
> >>
> >> John B.
> >>
> >> On 2013-02-13, at 12:00 PM, Justin Richer <jricher@mitre.org> wrote:
> >>
> >>> Would it be reasonable to mark the PUT and DELETE methods as optional
> for the server to implement, but with defined semantics if they do? I wan=
t
> to keep GET and POST(create) as mandatory, as I think that's the minimal
> set of functionality required.
> >>>
> >>> -- Justin
> >>>
> >>> On 02/11/2013 08:51 PM, John Bradley wrote:
> >>>> I would always include the client_id on update.
> >>>>
> >>>> I think it is also us full to have other tokens used at the update
> endpoint.  I can see the master token used to update all the clients it h=
as
> registered as part of API management.
> >>>> Relying on the registration_access_token is probably a design that
> will cause trouble down the road.
> >>>>
> >>>> I think GET and POST are relatively clear.   I don't know about
> expelling PUT to developers.  I think POST with a client_id to a (separat=
e
> discussion) update_uri works without restricting it to PUT.
> >>>>
> >>>> I think DELETE needs to be better understood.   I think a status tha=
t
> can be set for client lifecycle is better than letting a client delete a
> entry.
> >>>> In some cases there will be more than one instance of a client and
> letting them know they have been turned off for a reason is better than
> making there registration disappear.
> >>>> So for the moment I would levee out DELETE.
> >>>>
> >>>> John B.
> >>>>
> >>>> On 2013-02-11, at 6:14 PM, Justin Richer <jricher@mitre.org> wrote:
> >>>>
> >>>>> Draft -05 of OAuth Dynamic Client Registration [1] defines several
> operations that the client can take on its behalf as part of the
> registration process. These boil down to the basic CRUD operations that y=
ou
> find in many APIs: Create, Read, Update, Delete. Draft -00 defined only t=
he
> "Create" operation, draft -01 through -04 added the "Update" operation,
> switched using the "operation=3D" parameter.
> >>>>>
> >>>>> Following several suggestions to do so on the list, the -05 draft
> defines these operations in terms of a RESTful API for the client. Namely=
:
> >>>>>
> >>>>> - HTTP POST to registration endpoint =3D> Create (register) a new
> client
> >>>>> - HTTP PUT to update endpoint (with registration_access_token) =3D>
> Update the registered information for this client
> >>>>> - HTTP GET to update endpoint (with registration_access_token) =3D>
> read the registered information for this client
> >>>>> - HTTP DELETE to update endpoint (with registration_access_token) =
=3D>
> Delete (unregister/de-provision) this client
> >>>>>
> >>>>> The two main issues at stake here are: the addition of the READ and
> DELETE methods, and the use of HTTP verbs following a RESTful design
> philosophy.
> >>>>>
> >>>>> Pro:
> >>>>> - RESTful APIs (with HTTP verbs to differentiate functionality) are
> the norm today
> >>>>> - Full lifecycle management is common and is going to be expected b=
y
> many users of this protocol in the wild
> >>>>>
> >>>>> Cons:
> >>>>> - Update semantics are still under debate (full replace? patch?)
> >>>>> - Somewhat increased complexity on the server to support all
> operations
> >>>>> - Client has to understand all HTTP verbs for full access (though
> plain registration is just POST)
> >>>>>
> >>>>>
> >>>>> Alternatives include using an operational switch parameter (like th=
e
> old drafts), defining separate endpoints for every action, or doing all
> operations on a single endpoint using verbs to switch.
> >>>>>
> >>>>> -- Justin
> >>>>>
> >>>>> [1] http://tools.ietf.org/html/draft-ietf-oauth-dyn-reg-05
> >>>>> _______________________________________________
> >>>>> OAuth mailing list
> >>>>> OAuth@ietf.org
> >>>>> https://www.ietf.org/mailman/listinfo/oauth
> >>
> >> _______________________________________________
> >> OAuth mailing list
> >> OAuth@ietf.org
> >> https://www.ietf.org/mailman/listinfo/oauth
>
> _______________________________________________
> OAuth mailing list
> OAuth@ietf.org
> https://www.ietf.org/mailman/listinfo/oauth
>

--14dae9340ae99f438504d5a1cd62
Content-Type: text/html; charset=UTF-8
Content-Transfer-Encoding: quoted-printable

A DELETE is an http request that asks the server to delete something. =C2=
=A0We probably would want to avoid writing a requirement into the standard =
that the server has to comply. =C2=A0So you get back a 204 if it worked, a =
404 if there is no such registration, a 403 if there is but the server decl=
ines to delete, etc. Seems pretty straightforward. -T<br>


<br><div class=3D"gmail_quote">On Wed, Feb 13, 2013 at 12:18 PM, John Bradl=
ey <span dir=3D"ltr">&lt;<a href=3D"mailto:ve7jtb@ve7jtb.com" target=3D"_bl=
ank">ve7jtb@ve7jtb.com</a>&gt;</span> wrote:<br><blockquote class=3D"gmail_=
quote" style=3D"margin:0 0 0 .8ex;border-left:1px #ccc solid;padding-left:1=
ex">


DELETE is removing the record not resetting it to defaults. =C2=A0They are =
quite diffrent.<br>
<br>
I want to agree on what the expected behaviour of DELETE is. =C2=A0 I think=
 we have agreement on PUT and POST.<br>
<br>
The general not in that a client can DELETE it&#39;s record is a implicatio=
n I don&#39;t like. =C2=A0I think that is for the server to decide and if i=
t is not actually deleting it then DELETE is the wrong verb to use.<br>
<br>
John B.<br>
<div><div><br>
On 2013-02-13, at 3:31 PM, Nat Sakimura &lt;<a href=3D"mailto:sakimura@gmai=
l.com" target=3D"_blank">sakimura@gmail.com</a>&gt; wrote:<br>
<br>
&gt; Generally speaking, mapping PUT to replace and POST to change is an<br=
>
&gt; acceptable practice so I am fine with it.<br>
&gt;<br>
&gt; Now, what I still do not understand is why you think it is fine to do<=
br>
&gt; PUT or POST and not DELETE. Doing PUT with empty content is almost the=
<br>
&gt; same as DELETE. Could you explain?<br>
&gt;<br>
&gt; =3Dnat via iPhone<br>
&gt;<br>
&gt; Feb 14, 2013 0:10=E3=80=81John Bradley &lt;<a href=3D"mailto:ve7jtb@ve=
7jtb.com" target=3D"_blank">ve7jtb@ve7jtb.com</a>&gt; =E3=81=AE=E3=83=A1=E3=
=83=83=E3=82=BB=E3=83=BC=E3=82=B8:<br>
&gt;<br>
&gt;&gt; I am not violently opposed to PUT as a option that completely repl=
aces the resource setting all unsent claims back to the defaults.<br>
&gt;&gt;<br>
&gt;&gt; I don&#39;t have a good feeling about DELETE, =C2=A0I think we sti=
ll need more discussion on what it means, what privileges it takes to invok=
e it etc.<br>
&gt;&gt; It could be a bad thing if we get wrong or is not implemented cons=
istently.<br>
&gt;&gt;<br>
&gt;&gt; Personally I don&#39;t think a client should ever be able to DELET=
E it&#39;s record.<br>
&gt;&gt;<br>
&gt;&gt; I think marking a client_id as pending provisioning, suspended, =
=C2=A0revoked etc is better and that can be done with a claim in the update=
 endpoint.<br>
&gt;&gt;<br>
&gt;&gt; It should only be the server that deletes a record after satisfyin=
g it&#39;s audit requirements.<br>
&gt;&gt;<br>
&gt;&gt; John B.<br>
&gt;&gt;<br>
&gt;&gt; On 2013-02-13, at 12:00 PM, Justin Richer &lt;<a href=3D"mailto:jr=
icher@mitre.org" target=3D"_blank">jricher@mitre.org</a>&gt; wrote:<br>
&gt;&gt;<br>
&gt;&gt;&gt; Would it be reasonable to mark the PUT and DELETE methods as o=
ptional for the server to implement, but with defined semantics if they do?=
 I want to keep GET and POST(create) as mandatory, as I think that&#39;s th=
e minimal set of functionality required.<br>



&gt;&gt;&gt;<br>
&gt;&gt;&gt; -- Justin<br>
&gt;&gt;&gt;<br>
&gt;&gt;&gt; On 02/11/2013 08:51 PM, John Bradley wrote:<br>
&gt;&gt;&gt;&gt; I would always include the client_id on update.<br>
&gt;&gt;&gt;&gt;<br>
&gt;&gt;&gt;&gt; I think it is also us full to have other tokens used at th=
e update endpoint. =C2=A0I can see the master token used to update all the =
clients it has registered as part of API management.<br>
&gt;&gt;&gt;&gt; Relying on the registration_access_token is probably a des=
ign that will cause trouble down the road.<br>
&gt;&gt;&gt;&gt;<br>
&gt;&gt;&gt;&gt; I think GET and POST are relatively clear. =C2=A0 I don&#3=
9;t know about expelling PUT to developers. =C2=A0I think POST with a clien=
t_id to a (separate discussion) update_uri works without restricting it to =
PUT.<br>



&gt;&gt;&gt;&gt;<br>
&gt;&gt;&gt;&gt; I think DELETE needs to be better understood. =C2=A0 I thi=
nk a status that can be set for client lifecycle is better than letting a c=
lient delete a entry.<br>
&gt;&gt;&gt;&gt; In some cases there will be more than one instance of a cl=
ient and letting them know they have been turned off for a reason is better=
 than making there registration disappear.<br>
&gt;&gt;&gt;&gt; So for the moment I would levee out DELETE.<br>
&gt;&gt;&gt;&gt;<br>
&gt;&gt;&gt;&gt; John B.<br>
&gt;&gt;&gt;&gt;<br>
&gt;&gt;&gt;&gt; On 2013-02-11, at 6:14 PM, Justin Richer &lt;<a href=3D"ma=
ilto:jricher@mitre.org" target=3D"_blank">jricher@mitre.org</a>&gt; wrote:<=
br>
&gt;&gt;&gt;&gt;<br>
&gt;&gt;&gt;&gt;&gt; Draft -05 of OAuth Dynamic Client Registration [1] def=
ines several operations that the client can take on its behalf as part of t=
he registration process. These boil down to the basic CRUD operations that =
you find in many APIs: Create, Read, Update, Delete. Draft -00 defined only=
 the &quot;Create&quot; operation, draft -01 through -04 added the &quot;Up=
date&quot; operation, switched using the &quot;operation=3D&quot; parameter=
.<br>



&gt;&gt;&gt;&gt;&gt;<br>
&gt;&gt;&gt;&gt;&gt; Following several suggestions to do so on the list, th=
e -05 draft defines these operations in terms of a RESTful API for the clie=
nt. Namely:<br>
&gt;&gt;&gt;&gt;&gt;<br>
&gt;&gt;&gt;&gt;&gt; - HTTP POST to registration endpoint =3D&gt; Create (r=
egister) a new client<br>
&gt;&gt;&gt;&gt;&gt; - HTTP PUT to update endpoint (with registration_acces=
s_token) =3D&gt; Update the registered information for this client<br>
&gt;&gt;&gt;&gt;&gt; - HTTP GET to update endpoint (with registration_acces=
s_token) =3D&gt; read the registered information for this client<br>
&gt;&gt;&gt;&gt;&gt; - HTTP DELETE to update endpoint (with registration_ac=
cess_token) =3D&gt; Delete (unregister/de-provision) this client<br>
&gt;&gt;&gt;&gt;&gt;<br>
&gt;&gt;&gt;&gt;&gt; The two main issues at stake here are: the addition of=
 the READ and DELETE methods, and the use of HTTP verbs following a RESTful=
 design philosophy.<br>
&gt;&gt;&gt;&gt;&gt;<br>
&gt;&gt;&gt;&gt;&gt; Pro:<br>
&gt;&gt;&gt;&gt;&gt; - RESTful APIs (with HTTP verbs to differentiate funct=
ionality) are the norm today<br>
&gt;&gt;&gt;&gt;&gt; - Full lifecycle management is common and is going to =
be expected by many users of this protocol in the wild<br>
&gt;&gt;&gt;&gt;&gt;<br>
&gt;&gt;&gt;&gt;&gt; Cons:<br>
&gt;&gt;&gt;&gt;&gt; - Update semantics are still under debate (full replac=
e? patch?)<br>
&gt;&gt;&gt;&gt;&gt; - Somewhat increased complexity on the server to suppo=
rt all operations<br>
&gt;&gt;&gt;&gt;&gt; - Client has to understand all HTTP verbs for full acc=
ess (though plain registration is just POST)<br>
&gt;&gt;&gt;&gt;&gt;<br>
&gt;&gt;&gt;&gt;&gt;<br>
&gt;&gt;&gt;&gt;&gt; Alternatives include using an operational switch param=
eter (like the old drafts), defining separate endpoints for every action, o=
r doing all operations on a single endpoint using verbs to switch.<br>



&gt;&gt;&gt;&gt;&gt;<br>
&gt;&gt;&gt;&gt;&gt; -- Justin<br>
&gt;&gt;&gt;&gt;&gt;<br>
&gt;&gt;&gt;&gt;&gt; [1] <a href=3D"http://tools.ietf.org/html/draft-ietf-o=
auth-dyn-reg-05" target=3D"_blank">http://tools.ietf.org/html/draft-ietf-oa=
uth-dyn-reg-05</a><br>
&gt;&gt;&gt;&gt;&gt; _______________________________________________<br>
&gt;&gt;&gt;&gt;&gt; OAuth mailing list<br>
&gt;&gt;&gt;&gt;&gt; <a href=3D"mailto:OAuth@ietf.org" target=3D"_blank">OA=
uth@ietf.org</a><br>
&gt;&gt;&gt;&gt;&gt; <a href=3D"https://www.ietf.org/mailman/listinfo/oauth=
" target=3D"_blank">https://www.ietf.org/mailman/listinfo/oauth</a><br>
&gt;&gt;<br>
&gt;&gt; _______________________________________________<br>
&gt;&gt; OAuth mailing list<br>
&gt;&gt; <a href=3D"mailto:OAuth@ietf.org" target=3D"_blank">OAuth@ietf.org=
</a><br>
&gt;&gt; <a href=3D"https://www.ietf.org/mailman/listinfo/oauth" target=3D"=
_blank">https://www.ietf.org/mailman/listinfo/oauth</a><br>
<br>
_______________________________________________<br>
OAuth mailing list<br>
<a href=3D"mailto:OAuth@ietf.org" target=3D"_blank">OAuth@ietf.org</a><br>
<a href=3D"https://www.ietf.org/mailman/listinfo/oauth" target=3D"_blank">h=
ttps://www.ietf.org/mailman/listinfo/oauth</a><br>
</div></div></blockquote></div><br>

--14dae9340ae99f438504d5a1cd62--

From ve7jtb@ve7jtb.com  Wed Feb 13 13:38:03 2013
Return-Path: <ve7jtb@ve7jtb.com>
X-Original-To: oauth@ietfa.amsl.com
Delivered-To: oauth@ietfa.amsl.com
Received: from localhost (localhost [127.0.0.1]) by ietfa.amsl.com (Postfix) with ESMTP id CE99521F8578 for <oauth@ietfa.amsl.com>; Wed, 13 Feb 2013 13:38:03 -0800 (PST)
X-Virus-Scanned: amavisd-new at amsl.com
X-Spam-Flag: NO
X-Spam-Score: -3.353
X-Spam-Level: 
X-Spam-Status: No, score=-3.353 tagged_above=-999 required=5 tests=[AWL=0.245,  BAYES_00=-2.599, HTML_MESSAGE=0.001, RCVD_IN_DNSWL_LOW=-1]
Received: from mail.ietf.org ([64.170.98.30]) by localhost (ietfa.amsl.com [127.0.0.1]) (amavisd-new, port 10024) with ESMTP id 3liDh0EfB9Hj for <oauth@ietfa.amsl.com>; Wed, 13 Feb 2013 13:38:02 -0800 (PST)
Received: from mail-qe0-f42.google.com (mail-qe0-f42.google.com [209.85.128.42]) by ietfa.amsl.com (Postfix) with ESMTP id 7436721F8576 for <oauth@ietf.org>; Wed, 13 Feb 2013 13:38:02 -0800 (PST)
Received: by mail-qe0-f42.google.com with SMTP id 2so786268qeb.1 for <oauth@ietf.org>; Wed, 13 Feb 2013 13:38:01 -0800 (PST)
X-Google-DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=google.com; s=20120113; h=x-received:content-type:mime-version:subject:from:in-reply-to:date :cc:message-id:references:to:x-mailer:x-gm-message-state; bh=ZYzP7qaDnUZX9B3aoKrha0m/G1/RlB4aHg3n40OEOFI=; b=JuX+RMYpRJAJ0mdPjzeM+QT619MHfcWv6dIIoxwQZ7/6cLRGD0VCmUcI8++3BQC/1C PmEUcsDoD2htJ+JT3NoZg18Qz2Yd0gkt8heTNBx4Fx3nzoNu1R3BR3DCYiHjSdJFkMcP tsnF5C8I/to1CRBSzzXEHaPkxGxlJEddkINKNZugtV0+RO5ZLEy8Biqq0dnFrok9Ikss PROhY7nVJcY1QmqqSTJ4g+IlRCNrrP+O0m5wDy3qe8DYtnsYlqGl425OwEwzniWm04Dl KbPk7klOrdeZxcPB8tMUDV+KjAFZqC2PVTsPcb7cpaGpXivrQryGOtK3pXVagD7mFIns PvEw==
X-Received: by 10.224.185.148 with SMTP id co20mr9139829qab.94.1360791481706;  Wed, 13 Feb 2013 13:38:01 -0800 (PST)
Received: from [192.168.1.213] ([190.20.26.0]) by mx.google.com with ESMTPS id ei2sm17844325qab.3.2013.02.13.13.37.37 (version=TLSv1 cipher=ECDHE-RSA-RC4-SHA bits=128/128); Wed, 13 Feb 2013 13:38:00 -0800 (PST)
Content-Type: multipart/alternative; boundary="Apple-Mail=_0753F585-C3C2-4096-9752-9C6453E02329"
Mime-Version: 1.0 (Mac OS X Mail 6.2 \(1499\))
From: John Bradley <ve7jtb@ve7jtb.com>
In-Reply-To: <CA+ZpN24+zBbYh0BV+yUQ2WprxFjSVa9hJ8qJ4t9HZx+u5HHM4w@mail.gmail.com>
Date: Wed, 13 Feb 2013 18:37:07 -0300
Message-Id: <BA04B78C-E53A-4FFD-85BC-ABC92FE3462E@ve7jtb.com>
References: <51195F36.6040705@mitre.org> <780F8C26-19A4-4301-B350-307D9FFF69CD@ve7jtb.com> <511BAA8B.8030309@mitre.org> <BEBDAFAC-28B0-4959-9FE5-34EC17FC318C@ve7jtb.com> <-4554688250617930935@unknownmsgid> <AF401161-0C7C-4E49-9F44-9982B312FF6D@ve7jtb.com> <CA+ZpN24+zBbYh0BV+yUQ2WprxFjSVa9hJ8qJ4t9HZx+u5HHM4w@mail.gmail.com>
To: Tim Bray <twbray@google.com>
X-Mailer: Apple Mail (2.1499)
X-Gm-Message-State: ALoCoQnfXNCJ8+n0fMsQalABzdXc6BZh6ialcrELwYrILJ/9zdEuz5ZoOf9haB9LfRsIY6AyuFFr
Cc: "oauth@ietf.org" <oauth@ietf.org>
Subject: Re: [OAUTH-WG] Registration: RESTful client lifecycle management
X-BeenThere: oauth@ietf.org
X-Mailman-Version: 2.1.12
Precedence: list
List-Id: OAUTH WG <oauth.ietf.org>
List-Unsubscribe: <https://www.ietf.org/mailman/options/oauth>, <mailto:oauth-request@ietf.org?subject=unsubscribe>
List-Archive: <http://www.ietf.org/mail-archive/web/oauth>
List-Post: <mailto:oauth@ietf.org>
List-Help: <mailto:oauth-request@ietf.org?subject=help>
List-Subscribe: <https://www.ietf.org/mailman/listinfo/oauth>, <mailto:oauth-request@ietf.org?subject=subscribe>
X-List-Received-Date: Wed, 13 Feb 2013 21:38:03 -0000

--Apple-Mail=_0753F585-C3C2-4096-9752-9C6453E02329
Content-Transfer-Encoding: quoted-printable
Content-Type: text/plain;
	charset=utf-8

OK Tim do you think DELETE is a feature that:
a) developers would use
b) that Authorization servers like google would implement.

If we put it in and than have people say you have a bunch of extra stuff =
no line is going to use just to be semantically pure.  I will not be a =
happy bunny.

Just because HTTP has a verb we don't need to use it if we don't have a =
concrete use case.

If you say Google would implement it and use it for x or y than I would =
feel differently about it.

I don't hate DELETE though I think it is probably a bad power to give to =
clients. =20

Feedback on your use case please.

John B.

On 2013-02-13, at 6:26 PM, Tim Bray <twbray@google.com> wrote:

> A DELETE is an http request that asks the server to delete something.  =
We probably would want to avoid writing a requirement into the standard =
that the server has to comply.  So you get back a 204 if it worked, a =
404 if there is no such registration, a 403 if there is but the server =
declines to delete, etc. Seems pretty straightforward. -T
>=20
> On Wed, Feb 13, 2013 at 12:18 PM, John Bradley <ve7jtb@ve7jtb.com> =
wrote:
> DELETE is removing the record not resetting it to defaults.  They are =
quite diffrent.
>=20
> I want to agree on what the expected behaviour of DELETE is.   I think =
we have agreement on PUT and POST.
>=20
> The general not in that a client can DELETE it's record is a =
implication I don't like.  I think that is for the server to decide and =
if it is not actually deleting it then DELETE is the wrong verb to use.
>=20
> John B.
>=20
> On 2013-02-13, at 3:31 PM, Nat Sakimura <sakimura@gmail.com> wrote:
>=20
> > Generally speaking, mapping PUT to replace and POST to change is an
> > acceptable practice so I am fine with it.
> >
> > Now, what I still do not understand is why you think it is fine to =
do
> > PUT or POST and not DELETE. Doing PUT with empty content is almost =
the
> > same as DELETE. Could you explain?
> >
> > =3Dnat via iPhone
> >
> > Feb 14, 2013 0:10=E3=80=81John Bradley <ve7jtb@ve7jtb.com> =
=E3=81=AE=E3=83=A1=E3=83=83=E3=82=BB=E3=83=BC=E3=82=B8:
> >
> >> I am not violently opposed to PUT as a option that completely =
replaces the resource setting all unsent claims back to the defaults.
> >>
> >> I don't have a good feeling about DELETE,  I think we still need =
more discussion on what it means, what privileges it takes to invoke it =
etc.
> >> It could be a bad thing if we get wrong or is not implemented =
consistently.
> >>
> >> Personally I don't think a client should ever be able to DELETE =
it's record.
> >>
> >> I think marking a client_id as pending provisioning, suspended,  =
revoked etc is better and that can be done with a claim in the update =
endpoint.
> >>
> >> It should only be the server that deletes a record after satisfying =
it's audit requirements.
> >>
> >> John B.
> >>
> >> On 2013-02-13, at 12:00 PM, Justin Richer <jricher@mitre.org> =
wrote:
> >>
> >>> Would it be reasonable to mark the PUT and DELETE methods as =
optional for the server to implement, but with defined semantics if they =
do? I want to keep GET and POST(create) as mandatory, as I think that's =
the minimal set of functionality required.
> >>>
> >>> -- Justin
> >>>
> >>> On 02/11/2013 08:51 PM, John Bradley wrote:
> >>>> I would always include the client_id on update.
> >>>>
> >>>> I think it is also us full to have other tokens used at the =
update endpoint.  I can see the master token used to update all the =
clients it has registered as part of API management.
> >>>> Relying on the registration_access_token is probably a design =
that will cause trouble down the road.
> >>>>
> >>>> I think GET and POST are relatively clear.   I don't know about =
expelling PUT to developers.  I think POST with a client_id to a =
(separate discussion) update_uri works without restricting it to PUT.
> >>>>
> >>>> I think DELETE needs to be better understood.   I think a status =
that can be set for client lifecycle is better than letting a client =
delete a entry.
> >>>> In some cases there will be more than one instance of a client =
and letting them know they have been turned off for a reason is better =
than making there registration disappear.
> >>>> So for the moment I would levee out DELETE.
> >>>>
> >>>> John B.
> >>>>
> >>>> On 2013-02-11, at 6:14 PM, Justin Richer <jricher@mitre.org> =
wrote:
> >>>>
> >>>>> Draft -05 of OAuth Dynamic Client Registration [1] defines =
several operations that the client can take on its behalf as part of the =
registration process. These boil down to the basic CRUD operations that =
you find in many APIs: Create, Read, Update, Delete. Draft -00 defined =
only the "Create" operation, draft -01 through -04 added the "Update" =
operation, switched using the "operation=3D" parameter.
> >>>>>
> >>>>> Following several suggestions to do so on the list, the -05 =
draft defines these operations in terms of a RESTful API for the client. =
Namely:
> >>>>>
> >>>>> - HTTP POST to registration endpoint =3D> Create (register) a =
new client
> >>>>> - HTTP PUT to update endpoint (with registration_access_token) =
=3D> Update the registered information for this client
> >>>>> - HTTP GET to update endpoint (with registration_access_token) =
=3D> read the registered information for this client
> >>>>> - HTTP DELETE to update endpoint (with =
registration_access_token) =3D> Delete (unregister/de-provision) this =
client
> >>>>>
> >>>>> The two main issues at stake here are: the addition of the READ =
and DELETE methods, and the use of HTTP verbs following a RESTful design =
philosophy.
> >>>>>
> >>>>> Pro:
> >>>>> - RESTful APIs (with HTTP verbs to differentiate functionality) =
are the norm today
> >>>>> - Full lifecycle management is common and is going to be =
expected by many users of this protocol in the wild
> >>>>>
> >>>>> Cons:
> >>>>> - Update semantics are still under debate (full replace? patch?)
> >>>>> - Somewhat increased complexity on the server to support all =
operations
> >>>>> - Client has to understand all HTTP verbs for full access =
(though plain registration is just POST)
> >>>>>
> >>>>>
> >>>>> Alternatives include using an operational switch parameter (like =
the old drafts), defining separate endpoints for every action, or doing =
all operations on a single endpoint using verbs to switch.
> >>>>>
> >>>>> -- Justin
> >>>>>
> >>>>> [1] http://tools.ietf.org/html/draft-ietf-oauth-dyn-reg-05
> >>>>> _______________________________________________
> >>>>> OAuth mailing list
> >>>>> OAuth@ietf.org
> >>>>> https://www.ietf.org/mailman/listinfo/oauth
> >>
> >> _______________________________________________
> >> OAuth mailing list
> >> OAuth@ietf.org
> >> https://www.ietf.org/mailman/listinfo/oauth
>=20
> _______________________________________________
> OAuth mailing list
> OAuth@ietf.org
> https://www.ietf.org/mailman/listinfo/oauth
>=20


--Apple-Mail=_0753F585-C3C2-4096-9752-9C6453E02329
Content-Transfer-Encoding: quoted-printable
Content-Type: text/html;
	charset=utf-8

<html><head><meta http-equiv=3D"Content-Type" content=3D"text/html =
charset=3Dutf-8"></head><body style=3D"word-wrap: break-word; =
-webkit-nbsp-mode: space; -webkit-line-break: after-white-space; ">OK =
Tim do you think DELETE is a feature that:<div>a) developers would =
use</div><div>b) that Authorization servers like google would =
implement.</div><div><br></div><div>If we put it in and than have people =
say you have a bunch of extra stuff no line is going to use just to be =
semantically pure. &nbsp;I will not be a happy =
bunny.</div><div><br></div><div>Just because HTTP has a verb we don't =
need to use it if we don't have a concrete use =
case.</div><div><br></div><div>If you say Google would implement it and =
use it for x or y than I would feel differently about =
it.</div><div><br></div><div>I don't hate DELETE though I think it is =
probably a bad power to give to clients. =
&nbsp;</div><div><br></div><div>Feedback on your use case =
please.</div><div><br></div><div>John =
B.</div><div><br></div><div><div><div>On 2013-02-13, at 6:26 PM, Tim =
Bray &lt;<a href=3D"mailto:twbray@google.com">twbray@google.com</a>&gt; =
wrote:</div><br class=3D"Apple-interchange-newline"><blockquote =
type=3D"cite">A DELETE is an http request that asks the server to delete =
something. &nbsp;We probably would want to avoid writing a requirement =
into the standard that the server has to comply. &nbsp;So you get back a =
204 if it worked, a 404 if there is no such registration, a 403 if there =
is but the server declines to delete, etc. Seems pretty straightforward. =
-T<br>


<br><div class=3D"gmail_quote">On Wed, Feb 13, 2013 at 12:18 PM, John =
Bradley <span dir=3D"ltr">&lt;<a href=3D"mailto:ve7jtb@ve7jtb.com" =
target=3D"_blank">ve7jtb@ve7jtb.com</a>&gt;</span> wrote:<br><blockquote =
class=3D"gmail_quote" style=3D"margin:0 0 0 .8ex;border-left:1px #ccc =
solid;padding-left:1ex">


DELETE is removing the record not resetting it to defaults. &nbsp;They =
are quite diffrent.<br>
<br>
I want to agree on what the expected behaviour of DELETE is. &nbsp; I =
think we have agreement on PUT and POST.<br>
<br>
The general not in that a client can DELETE it's record is a implication =
I don't like. &nbsp;I think that is for the server to decide and if it =
is not actually deleting it then DELETE is the wrong verb to use.<br>
<br>
John B.<br>
<div><br>
On 2013-02-13, at 3:31 PM, Nat Sakimura &lt;<a =
href=3D"mailto:sakimura@gmail.com" =
target=3D"_blank">sakimura@gmail.com</a>&gt; wrote:<br>
<br>
&gt; Generally speaking, mapping PUT to replace and POST to change is =
an<br>
&gt; acceptable practice so I am fine with it.<br>
&gt;<br>
&gt; Now, what I still do not understand is why you think it is fine to =
do<br>
&gt; PUT or POST and not DELETE. Doing PUT with empty content is almost =
the<br>
&gt; same as DELETE. Could you explain?<br>
&gt;<br>
&gt; =3Dnat via iPhone<br>
&gt;<br>
&gt; Feb 14, 2013 0:10=E3=80=81John Bradley &lt;<a =
href=3D"mailto:ve7jtb@ve7jtb.com" =
target=3D"_blank">ve7jtb@ve7jtb.com</a>&gt; =E3=81=AE=E3=83=A1=E3=83=83=E3=
=82=BB=E3=83=BC=E3=82=B8:<br>
&gt;<br>
&gt;&gt; I am not violently opposed to PUT as a option that completely =
replaces the resource setting all unsent claims back to the =
defaults.<br>
&gt;&gt;<br>
&gt;&gt; I don't have a good feeling about DELETE, &nbsp;I think we =
still need more discussion on what it means, what privileges it takes to =
invoke it etc.<br>
&gt;&gt; It could be a bad thing if we get wrong or is not implemented =
consistently.<br>
&gt;&gt;<br>
&gt;&gt; Personally I don't think a client should ever be able to DELETE =
it's record.<br>
&gt;&gt;<br>
&gt;&gt; I think marking a client_id as pending provisioning, suspended, =
&nbsp;revoked etc is better and that can be done with a claim in the =
update endpoint.<br>
&gt;&gt;<br>
&gt;&gt; It should only be the server that deletes a record after =
satisfying it's audit requirements.<br>
&gt;&gt;<br>
&gt;&gt; John B.<br>
&gt;&gt;<br>
&gt;&gt; On 2013-02-13, at 12:00 PM, Justin Richer &lt;<a =
href=3D"mailto:jricher@mitre.org" =
target=3D"_blank">jricher@mitre.org</a>&gt; wrote:<br>
&gt;&gt;<br>
&gt;&gt;&gt; Would it be reasonable to mark the PUT and DELETE methods =
as optional for the server to implement, but with defined semantics if =
they do? I want to keep GET and POST(create) as mandatory, as I think =
that's the minimal set of functionality required.<br>



&gt;&gt;&gt;<br>
&gt;&gt;&gt; -- Justin<br>
&gt;&gt;&gt;<br>
&gt;&gt;&gt; On 02/11/2013 08:51 PM, John Bradley wrote:<br>
&gt;&gt;&gt;&gt; I would always include the client_id on update.<br>
&gt;&gt;&gt;&gt;<br>
&gt;&gt;&gt;&gt; I think it is also us full to have other tokens used at =
the update endpoint. &nbsp;I can see the master token used to update all =
the clients it has registered as part of API management.<br>
&gt;&gt;&gt;&gt; Relying on the registration_access_token is probably a =
design that will cause trouble down the road.<br>
&gt;&gt;&gt;&gt;<br>
&gt;&gt;&gt;&gt; I think GET and POST are relatively clear. &nbsp; I =
don't know about expelling PUT to developers. &nbsp;I think POST with a =
client_id to a (separate discussion) update_uri works without =
restricting it to PUT.<br>



&gt;&gt;&gt;&gt;<br>
&gt;&gt;&gt;&gt; I think DELETE needs to be better understood. &nbsp; I =
think a status that can be set for client lifecycle is better than =
letting a client delete a entry.<br>
&gt;&gt;&gt;&gt; In some cases there will be more than one instance of a =
client and letting them know they have been turned off for a reason is =
better than making there registration disappear.<br>
&gt;&gt;&gt;&gt; So for the moment I would levee out DELETE.<br>
&gt;&gt;&gt;&gt;<br>
&gt;&gt;&gt;&gt; John B.<br>
&gt;&gt;&gt;&gt;<br>
&gt;&gt;&gt;&gt; On 2013-02-11, at 6:14 PM, Justin Richer &lt;<a =
href=3D"mailto:jricher@mitre.org" =
target=3D"_blank">jricher@mitre.org</a>&gt; wrote:<br>
&gt;&gt;&gt;&gt;<br>
&gt;&gt;&gt;&gt;&gt; Draft -05 of OAuth Dynamic Client Registration [1] =
defines several operations that the client can take on its behalf as =
part of the registration process. These boil down to the basic CRUD =
operations that you find in many APIs: Create, Read, Update, Delete. =
Draft -00 defined only the "Create" operation, draft -01 through -04 =
added the "Update" operation, switched using the "operation=3D" =
parameter.<br>



&gt;&gt;&gt;&gt;&gt;<br>
&gt;&gt;&gt;&gt;&gt; Following several suggestions to do so on the list, =
the -05 draft defines these operations in terms of a RESTful API for the =
client. Namely:<br>
&gt;&gt;&gt;&gt;&gt;<br>
&gt;&gt;&gt;&gt;&gt; - HTTP POST to registration endpoint =3D&gt; Create =
(register) a new client<br>
&gt;&gt;&gt;&gt;&gt; - HTTP PUT to update endpoint (with =
registration_access_token) =3D&gt; Update the registered information for =
this client<br>
&gt;&gt;&gt;&gt;&gt; - HTTP GET to update endpoint (with =
registration_access_token) =3D&gt; read the registered information for =
this client<br>
&gt;&gt;&gt;&gt;&gt; - HTTP DELETE to update endpoint (with =
registration_access_token) =3D&gt; Delete (unregister/de-provision) this =
client<br>
&gt;&gt;&gt;&gt;&gt;<br>
&gt;&gt;&gt;&gt;&gt; The two main issues at stake here are: the addition =
of the READ and DELETE methods, and the use of HTTP verbs following a =
RESTful design philosophy.<br>
&gt;&gt;&gt;&gt;&gt;<br>
&gt;&gt;&gt;&gt;&gt; Pro:<br>
&gt;&gt;&gt;&gt;&gt; - RESTful APIs (with HTTP verbs to differentiate =
functionality) are the norm today<br>
&gt;&gt;&gt;&gt;&gt; - Full lifecycle management is common and is going =
to be expected by many users of this protocol in the wild<br>
&gt;&gt;&gt;&gt;&gt;<br>
&gt;&gt;&gt;&gt;&gt; Cons:<br>
&gt;&gt;&gt;&gt;&gt; - Update semantics are still under debate (full =
replace? patch?)<br>
&gt;&gt;&gt;&gt;&gt; - Somewhat increased complexity on the server to =
support all operations<br>
&gt;&gt;&gt;&gt;&gt; - Client has to understand all HTTP verbs for full =
access (though plain registration is just POST)<br>
&gt;&gt;&gt;&gt;&gt;<br>
&gt;&gt;&gt;&gt;&gt;<br>
&gt;&gt;&gt;&gt;&gt; Alternatives include using an operational switch =
parameter (like the old drafts), defining separate endpoints for every =
action, or doing all operations on a single endpoint using verbs to =
switch.<br>



&gt;&gt;&gt;&gt;&gt;<br>
&gt;&gt;&gt;&gt;&gt; -- Justin<br>
&gt;&gt;&gt;&gt;&gt;<br>
&gt;&gt;&gt;&gt;&gt; [1] <a =
href=3D"http://tools.ietf.org/html/draft-ietf-oauth-dyn-reg-05" =
target=3D"_blank">http://tools.ietf.org/html/draft-ietf-oauth-dyn-reg-05</=
a><br>
&gt;&gt;&gt;&gt;&gt; _______________________________________________<br>
&gt;&gt;&gt;&gt;&gt; OAuth mailing list<br>
&gt;&gt;&gt;&gt;&gt; <a href=3D"mailto:OAuth@ietf.org" =
target=3D"_blank">OAuth@ietf.org</a><br>
&gt;&gt;&gt;&gt;&gt; <a =
href=3D"https://www.ietf.org/mailman/listinfo/oauth" =
target=3D"_blank">https://www.ietf.org/mailman/listinfo/oauth</a><br>
&gt;&gt;<br>
&gt;&gt; _______________________________________________<br>
&gt;&gt; OAuth mailing list<br>
&gt;&gt; <a href=3D"mailto:OAuth@ietf.org" =
target=3D"_blank">OAuth@ietf.org</a><br>
&gt;&gt; <a href=3D"https://www.ietf.org/mailman/listinfo/oauth" =
target=3D"_blank">https://www.ietf.org/mailman/listinfo/oauth</a><br>
<br>
_______________________________________________<br>
OAuth mailing list<br>
<a href=3D"mailto:OAuth@ietf.org" target=3D"_blank">OAuth@ietf.org</a><br>=

<a href=3D"https://www.ietf.org/mailman/listinfo/oauth" =
target=3D"_blank">https://www.ietf.org/mailman/listinfo/oauth</a><br>
</div></blockquote></div><br>
</blockquote></div><br></div></body></html>=

--Apple-Mail=_0753F585-C3C2-4096-9752-9C6453E02329--

From internet-drafts@ietf.org  Wed Feb 13 14:13:27 2013
Return-Path: <internet-drafts@ietf.org>
X-Original-To: oauth@ietfa.amsl.com
Delivered-To: oauth@ietfa.amsl.com
Received: from localhost (localhost [127.0.0.1]) by ietfa.amsl.com (Postfix) with ESMTP id 5F7F121F8576; Wed, 13 Feb 2013 14:13:27 -0800 (PST)
X-Virus-Scanned: amavisd-new at amsl.com
X-Spam-Flag: NO
X-Spam-Score: -102.599
X-Spam-Level: 
X-Spam-Status: No, score=-102.599 tagged_above=-999 required=5 tests=[BAYES_00=-2.599, USER_IN_WHITELIST=-100]
Received: from mail.ietf.org ([64.170.98.30]) by localhost (ietfa.amsl.com [127.0.0.1]) (amavisd-new, port 10024) with ESMTP id WhgUEDb6Pl6K; Wed, 13 Feb 2013 14:13:26 -0800 (PST)
Received: from ietfa.amsl.com (localhost [127.0.0.1]) by ietfa.amsl.com (Postfix) with ESMTP id 9128221F8589; Wed, 13 Feb 2013 14:13:26 -0800 (PST)
MIME-Version: 1.0
Content-Type: text/plain; charset="utf-8"
Content-Transfer-Encoding: quoted-printable
From: internet-drafts@ietf.org
To: i-d-announce@ietf.org
X-Test-IDTracker: no
X-IETF-IDTracker: 4.40
Message-ID: <20130213221326.3987.20729.idtracker@ietfa.amsl.com>
Date: Wed, 13 Feb 2013 14:13:26 -0800
Cc: oauth@ietf.org
Subject: [OAUTH-WG] I-D Action: draft-ietf-oauth-revocation-05.txt
X-BeenThere: oauth@ietf.org
X-Mailman-Version: 2.1.12
Precedence: list
List-Id: OAUTH WG <oauth.ietf.org>
List-Unsubscribe: <https://www.ietf.org/mailman/options/oauth>, <mailto:oauth-request@ietf.org?subject=unsubscribe>
List-Archive: <http://www.ietf.org/mail-archive/web/oauth>
List-Post: <mailto:oauth@ietf.org>
List-Help: <mailto:oauth-request@ietf.org?subject=help>
List-Subscribe: <https://www.ietf.org/mailman/listinfo/oauth>, <mailto:oauth-request@ietf.org?subject=subscribe>
X-List-Received-Date: Wed, 13 Feb 2013 22:13:27 -0000

A New Internet-Draft is available from the on-line Internet-Drafts director=
ies.
 This draft is a work item of the Web Authorization Protocol Working Group =
of the IETF.

	Title           : Token Revocation
	Author(s)       : Torsten Lodderstedt
                          Stefanie Dronia
                          Marius Scurtescu
	Filename        : draft-ietf-oauth-revocation-05.txt
	Pages           : 9
	Date            : 2013-02-13

Abstract:
   This document proposes an additional endpoint for OAuth authorization
   servers, which allows clients to notify the authorization server that
   a previously obtained refresh or access token is no longer needed.
   This allows the authorization server to cleanup security credentials.
   A revocation request will invalidate the actual token and, if
   applicable, other tokens based on the same authorization grant.



The IETF datatracker status page for this draft is:
https://datatracker.ietf.org/doc/draft-ietf-oauth-revocation

There's also a htmlized version available at:
http://tools.ietf.org/html/draft-ietf-oauth-revocation-05

A diff from the previous version is available at:
http://www.ietf.org/rfcdiff?url2=3Ddraft-ietf-oauth-revocation-05


Internet-Drafts are also available by anonymous FTP at:
ftp://ftp.ietf.org/internet-drafts/


From torsten@lodderstedt.net  Wed Feb 13 14:19:06 2013
Return-Path: <torsten@lodderstedt.net>
X-Original-To: oauth@ietfa.amsl.com
Delivered-To: oauth@ietfa.amsl.com
Received: from localhost (localhost [127.0.0.1]) by ietfa.amsl.com (Postfix) with ESMTP id 15D8F21E8054 for <oauth@ietfa.amsl.com>; Wed, 13 Feb 2013 14:19:06 -0800 (PST)
X-Virus-Scanned: amavisd-new at amsl.com
X-Spam-Flag: NO
X-Spam-Score: -1.37
X-Spam-Level: 
X-Spam-Status: No, score=-1.37 tagged_above=-999 required=5 tests=[AWL=-0.413,  BAYES_00=-2.599, HELO_EQ_DE=0.35, MISSING_HEADERS=1.292]
Received: from mail.ietf.org ([64.170.98.30]) by localhost (ietfa.amsl.com [127.0.0.1]) (amavisd-new, port 10024) with ESMTP id VFU9CgTRT4As for <oauth@ietfa.amsl.com>; Wed, 13 Feb 2013 14:19:05 -0800 (PST)
Received: from smtprelay06.ispgateway.de (smtprelay06.ispgateway.de [80.67.31.101]) by ietfa.amsl.com (Postfix) with ESMTP id F0DC421E803D for <oauth@ietf.org>; Wed, 13 Feb 2013 14:19:04 -0800 (PST)
Received: from [91.2.85.204] (helo=[192.168.71.42]) by smtprelay06.ispgateway.de with esmtpsa (TLSv1:AES256-SHA:256) (Exim 4.68) (envelope-from <torsten@lodderstedt.net>) id 1U5kfP-0007b6-D6 for oauth@ietf.org; Wed, 13 Feb 2013 23:19:03 +0100
Message-ID: <511C1155.6050709@lodderstedt.net>
Date: Wed, 13 Feb 2013 23:19:01 +0100
From: Torsten Lodderstedt <torsten@lodderstedt.net>
User-Agent: Mozilla/5.0 (Windows NT 6.2; rv:17.0) Gecko/20130107 Thunderbird/17.0.2
MIME-Version: 1.0
CC: oauth@ietf.org
References: <20130213221326.3987.20729.idtracker@ietfa.amsl.com>
In-Reply-To: <20130213221326.3987.20729.idtracker@ietfa.amsl.com>
Content-Type: text/plain; charset=ISO-8859-1; format=flowed
Content-Transfer-Encoding: 7bit
X-Df-Sender: dG9yc3RlbkBsb2RkZXJzdGVkdC1vbmxpbmUuZGU=
Subject: Re: [OAUTH-WG] I-D Action: draft-ietf-oauth-revocation-05.txt
X-BeenThere: oauth@ietf.org
X-Mailman-Version: 2.1.12
Precedence: list
List-Id: OAUTH WG <oauth.ietf.org>
List-Unsubscribe: <https://www.ietf.org/mailman/options/oauth>, <mailto:oauth-request@ietf.org?subject=unsubscribe>
List-Archive: <http://www.ietf.org/mail-archive/web/oauth>
List-Post: <mailto:oauth@ietf.org>
List-Help: <mailto:oauth-request@ietf.org?subject=help>
List-Subscribe: <https://www.ietf.org/mailman/listinfo/oauth>, <mailto:oauth-request@ietf.org?subject=subscribe>
X-List-Received-Date: Wed, 13 Feb 2013 22:19:06 -0000

Hi all,

I just published a new revision, which should cover all the issues 
raised/dicussed during WGLC.

I applied the following changes:
- introduced a new parameter "token_type_hint", which a client may use 
to give the authorization server a hint about the type of the token to 
be revoked
- replaced "authorization" by "authorization grant"
- an attempt to revoke an invalid token is now handled like a successful 
revocation request (status code 200)
- CORS is now a MAY instead of SHOULD
- extended description of how developer/client may obtain endpoint location
- Improved wording regarding expected client behavior after sucessful 
processing of the revocation request -> "The client must assume the 
revocation is immediate upon the return of the request."
- Explanation of different policies and why having different server 
policies should not cause interop problems
- aligned structure with core spec by introducing sub-sections for 
request and response

regards,
Torsten.

Am 13.02.2013 23:13, schrieb internet-drafts@ietf.org:
> A New Internet-Draft is available from the on-line Internet-Drafts directories.
>   This draft is a work item of the Web Authorization Protocol Working Group of the IETF.
>
> 	Title           : Token Revocation
> 	Author(s)       : Torsten Lodderstedt
>                            Stefanie Dronia
>                            Marius Scurtescu
> 	Filename        : draft-ietf-oauth-revocation-05.txt
> 	Pages           : 9
> 	Date            : 2013-02-13
>
> Abstract:
>     This document proposes an additional endpoint for OAuth authorization
>     servers, which allows clients to notify the authorization server that
>     a previously obtained refresh or access token is no longer needed.
>     This allows the authorization server to cleanup security credentials.
>     A revocation request will invalidate the actual token and, if
>     applicable, other tokens based on the same authorization grant.
>
>
>
> The IETF datatracker status page for this draft is:
> https://datatracker.ietf.org/doc/draft-ietf-oauth-revocation
>
> There's also a htmlized version available at:
> http://tools.ietf.org/html/draft-ietf-oauth-revocation-05
>
> A diff from the previous version is available at:
> http://www.ietf.org/rfcdiff?url2=draft-ietf-oauth-revocation-05
>
>
> Internet-Drafts are also available by anonymous FTP at:
> ftp://ftp.ietf.org/internet-drafts/
>
> _______________________________________________
> OAuth mailing list
> OAuth@ietf.org
> https://www.ietf.org/mailman/listinfo/oauth


From prateek.mishra@oracle.com  Wed Feb 13 14:53:57 2013
Return-Path: <prateek.mishra@oracle.com>
X-Original-To: oauth@ietfa.amsl.com
Delivered-To: oauth@ietfa.amsl.com
Received: from localhost (localhost [127.0.0.1]) by ietfa.amsl.com (Postfix) with ESMTP id BE56C21F8778 for <oauth@ietfa.amsl.com>; Wed, 13 Feb 2013 14:53:57 -0800 (PST)
X-Virus-Scanned: amavisd-new at amsl.com
X-Spam-Flag: NO
X-Spam-Score: -6.599
X-Spam-Level: 
X-Spam-Status: No, score=-6.599 tagged_above=-999 required=5 tests=[AWL=0.000,  BAYES_00=-2.599, RCVD_IN_DNSWL_MED=-4]
Received: from mail.ietf.org ([64.170.98.30]) by localhost (ietfa.amsl.com [127.0.0.1]) (amavisd-new, port 10024) with ESMTP id aob8Jcvb4A6q for <oauth@ietfa.amsl.com>; Wed, 13 Feb 2013 14:53:57 -0800 (PST)
Received: from userp1040.oracle.com (userp1040.oracle.com [156.151.31.81]) by ietfa.amsl.com (Postfix) with ESMTP id 2EE8921F8775 for <oauth@ietf.org>; Wed, 13 Feb 2013 14:53:57 -0800 (PST)
Received: from acsinet21.oracle.com (acsinet21.oracle.com [141.146.126.237]) by userp1040.oracle.com (Sentrion-MTA-4.3.1/Sentrion-MTA-4.3.1) with ESMTP id r1DMrtXa020617 (version=TLSv1/SSLv3 cipher=DHE-RSA-AES256-SHA bits=256 verify=OK); Wed, 13 Feb 2013 22:53:56 GMT
Received: from acsmt357.oracle.com (acsmt357.oracle.com [141.146.40.157]) by acsinet21.oracle.com (8.14.4+Sun/8.14.4) with ESMTP id r1DMrtI3010659 (version=TLSv1/SSLv3 cipher=DHE-RSA-AES256-SHA bits=256 verify=NO); Wed, 13 Feb 2013 22:53:55 GMT
Received: from abhmt104.oracle.com (abhmt104.oracle.com [141.146.116.56]) by acsmt357.oracle.com (8.12.11.20060308/8.12.11) with ESMTP id r1DMrt3A027694; Wed, 13 Feb 2013 16:53:55 -0600
Received: from [10.154.116.110] (/10.154.116.110) by default (Oracle Beehive Gateway v4.0) with ESMTP ; Wed, 13 Feb 2013 14:53:54 -0800
Message-ID: <511C1980.6030603@oracle.com>
Date: Wed, 13 Feb 2013 17:53:52 -0500
From: Prateek Mishra <prateek.mishra@oracle.com>
Organization: Oracle Corporation
User-Agent: Mozilla/5.0 (Windows NT 5.1; rv:17.0) Gecko/20130107 Thunderbird/17.0.2
MIME-Version: 1.0
To: oauth@ietf.org
References: <51195F36.6040705@mitre.org> <780F8C26-19A4-4301-B350-307D9FFF69CD@ve7jtb.com> <511BAA8B.8030309@mitre.org> <BEBDAFAC-28B0-4959-9FE5-34EC17FC318C@ve7jtb.com> <-4554688250617930935@unknownmsgid> <AF401161-0C7C-4E49-9F44-9982B312FF6D@ve7jtb.com> <CA+ZpN24+zBbYh0BV+yUQ2WprxFjSVa9hJ8qJ4t9HZx+u5HHM4w@mail.gmail.com> <BA04B78C-E53A-4FFD-85BC-ABC92FE3462E@ve7jtb.com>
In-Reply-To: <BA04B78C-E53A-4FFD-85BC-ABC92FE3462E@ve7jtb.com>
Content-Type: text/plain; charset=ISO-8859-1; format=flowed
Content-Transfer-Encoding: 7bit
X-Source-IP: acsinet21.oracle.com [141.146.126.237]
Subject: [OAUTH-WG] comments on draft-ietf-oauth-saml2-bearer-15
X-BeenThere: oauth@ietf.org
X-Mailman-Version: 2.1.12
Precedence: list
List-Id: OAUTH WG <oauth.ietf.org>
List-Unsubscribe: <https://www.ietf.org/mailman/options/oauth>, <mailto:oauth-request@ietf.org?subject=unsubscribe>
List-Archive: <http://www.ietf.org/mail-archive/web/oauth>
List-Post: <mailto:oauth@ietf.org>
List-Help: <mailto:oauth-request@ietf.org?subject=help>
List-Subscribe: <https://www.ietf.org/mailman/listinfo/oauth>, <mailto:oauth-request@ietf.org?subject=subscribe>
X-List-Received-Date: Wed, 13 Feb 2013 22:53:58 -0000

It would be helpful if the draft identified the various cases that are 
intended to be supported. For example,
in draft-ietf-oauth-assertions-10, there is a helpful distinction made 
between "Client acting on behalf of a user" vs.
"Client Action on behalf of an anonymous user" (vs. even more advanced 
use-cases). Otherwise, folks
have a hard time figuring out the pieces they need to implement and the 
required behavior.

It feels like Section 3 speaks to all of these cases simultaneously. I 
think this is confusing and
our developers have raised some questions about it.

BTW, it would also help if the rules in Section 3 were numbered.

1) For the case where we have "Client acting on behalf of user" - this 
case seems to be where we
have something like a SAML SSO assertion - complete with Subject 
identifying the
"authorized accessor or delegate". The Client offers this bearer 
instrument as an access grant and the Authorization
server understands that its "acting on behalf a user".

a) As the SAML assertion is a bearer instrument and can be stolen, the 
authorization server should insist on client credentials being present.
In other words, the client should be confidential. What is the value in 
permitting a public client to participate in this exchange?

b) Further, as part of its processing rules, once the client has been 
authenticated
the authorization server should determine whether the particular client 
has the right to present the SAML bearer assertion.

c)  What is the value of including an AuthNStatement? Specifically, what 
does the Authorization server understand by its
presence or absence? What is the guidance to deployers? Should they 
require end-user authentication to have taken place?

2) Bullet 5 (counting from the bottom of Section 3) references a more 
advanced use case based on a SAML delegation
model. Is this the ONLY case where AuthNStatement's are allowed to be 
omitted? If so, that should be stated clearly.

  I think this bullet refers to an advanced use-case and should be moved 
to an independent section.

I think by "the presenter act autonomously on behalf of the subject" you 
mean something like "Client acts on Behalf of Anonymous Users".
as identified in draft-ietf-oauth-assertions-10.

I also found the sentence "The presented SHOULD be identified in the 
<NameID> or similar element,.." problematic. Its pretty open ended
and it seems to me it will be difficult to have an interoperable 
implementation based on this text.

Finally, what are the additional processing rules that the authorization 
server needs to implement when processing this class of SAML assertions?

3) Has there been any interoperability testing of this profile? This is 
an activity we would be interested in.

From sakimura@gmail.com  Wed Feb 13 19:26:21 2013
Return-Path: <sakimura@gmail.com>
X-Original-To: oauth@ietfa.amsl.com
Delivered-To: oauth@ietfa.amsl.com
Received: from localhost (localhost [127.0.0.1]) by ietfa.amsl.com (Postfix) with ESMTP id F062F21F8778 for <oauth@ietfa.amsl.com>; Wed, 13 Feb 2013 19:26:21 -0800 (PST)
X-Virus-Scanned: amavisd-new at amsl.com
X-Spam-Flag: NO
X-Spam-Score: -2.343
X-Spam-Level: 
X-Spam-Status: No, score=-2.343 tagged_above=-999 required=5 tests=[AWL=-0.497, BAYES_00=-2.599, MIME_BASE64_TEXT=1.753, RCVD_IN_DNSWL_LOW=-1]
Received: from mail.ietf.org ([64.170.98.30]) by localhost (ietfa.amsl.com [127.0.0.1]) (amavisd-new, port 10024) with ESMTP id sPa9tvIB5hpy for <oauth@ietfa.amsl.com>; Wed, 13 Feb 2013 19:26:21 -0800 (PST)
Received: from mail-lb0-f173.google.com (mail-lb0-f173.google.com [209.85.217.173]) by ietfa.amsl.com (Postfix) with ESMTP id AAA6421F8775 for <oauth@ietf.org>; Wed, 13 Feb 2013 19:26:17 -0800 (PST)
Received: by mail-lb0-f173.google.com with SMTP id gf7so1449047lbb.4 for <oauth@ietf.org>; Wed, 13 Feb 2013 19:26:16 -0800 (PST)
DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=gmail.com; s=20120113; h=mime-version:x-received:in-reply-to:references:date:message-id :subject:from:to:cc:content-type:content-transfer-encoding; bh=Jzz6LwujXKqg6QBJzB4xMJsk5MEmatgn6qNcpNAksRk=; b=GtA1hAnG/MBlO9S1lCKspCGhdK3Yoxe56tmZQaOLf3F9qxeXre4p9PS9XtTE7UCngU amysHBIRRIzU8gjHZ3Kornr+EbOXIMLX36QObNV64IvbmH3ijnjygYoM/4305CK9l9lt XQM3qsknm65yKviSnn8SyV0K7Ncp4YGhBQ4gTZgaorHmkT00JwVJJnAgFk166YS6bePi T9Bdhc217N7f2KdlsvlK8hVoT6CjA88tu6Bq07RR790Kek1UrZw70H7zTFw0Y93x8Te8 NRLZUmzeHKqgr6hgiTAIAscGcd+Whk4JXIJHc6kHwBPiYIHKYA0/IV1+zoWHiUa7606W vKLw==
MIME-Version: 1.0
X-Received: by 10.112.29.1 with SMTP id f1mr6792563lbh.30.1360812376624; Wed, 13 Feb 2013 19:26:16 -0800 (PST)
Received: by 10.112.14.44 with HTTP; Wed, 13 Feb 2013 19:26:16 -0800 (PST)
In-Reply-To: <511BDE17.7060503@mitre.org>
References: <51195F36.6040705@mitre.org> <780F8C26-19A4-4301-B350-307D9FFF69CD@ve7jtb.com> <80727F20-A830-4778-B11C-D45389310646@lodderstedt.net> <511A5742.30707@mitre.org> <B054D3FD-B4F6-4C57-8ED3-402F936DE17F@ve7jtb.com> <511A705F.4070204@mitre.org> <CABzCy2AaHeVQ+h18FaT8S1z9+EUbVE0WfCf63ra=7s6=f5ExLg@mail.gmail.com> <4E1F6AAD24975D4BA5B168042967394367443862@TK5EX14MBXC285.redmond.corp.microsoft.com> <-7739255357185893925@unknownmsgid> <511BDE17.7060503@mitre.org>
Date: Thu, 14 Feb 2013 12:26:16 +0900
Message-ID: <CABzCy2DN8wueCMYuG6QGVhhjQPhi7Sibt0S+_eFVFwum6_BoCg@mail.gmail.com>
From: Nat Sakimura <sakimura@gmail.com>
To: Justin Richer <jricher@mitre.org>
Content-Type: text/plain; charset=ISO-2022-JP
Content-Transfer-Encoding: base64
Cc: "oauth@ietf.org" <oauth@ietf.org>
Subject: Re: [OAUTH-WG] Registration: RESTful client lifecycle management
X-BeenThere: oauth@ietf.org
X-Mailman-Version: 2.1.12
Precedence: list
List-Id: OAUTH WG <oauth.ietf.org>
List-Unsubscribe: <https://www.ietf.org/mailman/options/oauth>, <mailto:oauth-request@ietf.org?subject=unsubscribe>
List-Archive: <http://www.ietf.org/mail-archive/web/oauth>
List-Post: <mailto:oauth@ietf.org>
List-Help: <mailto:oauth-request@ietf.org?subject=help>
List-Subscribe: <https://www.ietf.org/mailman/listinfo/oauth>, <mailto:oauth-request@ietf.org?subject=subscribe>
X-List-Received-Date: Thu, 14 Feb 2013 03:26:22 -0000

MjAxMy8yLzE0IEp1c3RpbiBSaWNoZXIgPGpyaWNoZXJAbWl0cmUub3JnPjoNCj4gRHVseSBub3Rl
ZCwgYW5kIHdoaWxlIHRoZXJlIHNlZW1zIHRvIGJlIHNvbGlkIHN1cHBvcnQgYmVoaW5kIHRoZQ0K
PiBzZW1hbnRpY3Mgb2YgcmV0dXJuaW5nIGEgVVJMLCBJJ20gbm90IGNvbnZpbmNlZCB0aGUgc3lu
dGF4IGFyZ3VtZW50IGlzDQo+IG92ZXIgeWV0IGVpdGhlci4gSSBoYXZlIHNlZW4gc3VwcG9ydCBh
bmQgZ29vZCBhcmd1bWVudHMgZnJvbSBib3RoIHNpZGVzDQo+IGFuZCB0aGVyZSBpc24ndCBhIGNs
ZWFyIHdpbm5lciB0aGVyZSAoc2VlIHRoZSBvdGhlciB0aHJlYWQpLiBTcGVha2luZyBhcw0KPiBh
biBpbmRpdmlkdWFsIG1lbWJlciwgSSBjb3VsZCBnbyB3aXRoIGVpdGhlciBhcHByb2FjaCBhbmQg
SSdkIGxpa2UgdG8NCj4gc2VlIHdoYXQgdGhlIHJlc3Qgb2YgdGhlIFdHIHdhbnRzLg0KDQpUaGFu
ayB5b3UuIEkgd2FudGVkIHRvIHJhaXNlIGEgdm9pY2UgdGhhdCB3aGlsZSB0aGUgbmVlZCBmb3Ig
dGhlDQpyZXR1cm5pbmcgdGhlIFVSTA0Kc2VlbWVkIHRvIGhhdmUgY29tZSB0byBhIGNvbnNlbnN1
cywgdGhlIHN5bnRheCBoYXMgbm90LCB1bmxpa2UgTWlrZSB3cm90ZS4NCg0KPg0KPiBTcGVha2lu
ZyBub3cgYXMgYW4gZWRpdG9yOiBJdCdzIGJlZW4gc3VnZ2VzdGVkIG9mZi1saXN0IHRoYXQgd2Ug
YWRvcHQNCj4gdGhlIHNpbXBsaWZpZWQgKGJlc3Bva2UpIG1lY2hhbmlzbSBvZiB0aGUgInJlZ2lz
dHJhdGlvbl9hY2Nlc3NfdXJsIg0KPiBzeW50YXggZm9yIHRoZSBuZXh0IGRyYWZ0IGFuZCBjb250
aW51ZSB0byBtb3ZlIGRpc2N1c3Npb24gZm9yd2FyZCBmb3INCj4gdGhlIGluY2x1c2lvbiBvZiB0
aGUgbW9yZS1nZW5lcmFsIG1lY2hhbmlzbSAoYmVpdCBIQUwgYmFzZWQgb3Igc29tZXRoaW5nDQo+
IHNpbWlsYXIgbGlrZSBKU09OLUxEKSBoZXJlIG9uIHRoZSBsaXN0LiBXb3VsZCB5b3UgYW5kIHRo
ZSBvdGhlciBIQUwNCj4gc3VwcG9ydGVycyBiZSBhbWVuYWJsZSB0byB0aGlzIHNvbHV0aW9uPyBJ
IHdvdWxkbid0IGJlIG9wcG9zZWQgdG8gYWRkaW5nDQo+IGEga2luZCBvZiAibm90ZSBmb3IgZGlz
Y3Vzc2lvbiIgc2VjdGlvbiB0byB0aGUgLTA2IGRyYWZ0IHRvIGhlbHANCj4gZmFjaWxpdGF0ZSBt
b3ZpbmcgZm9yd2FyZCBpbiBhIGNvbmNyZXRlIG1hbm5lciwgd2l0aCB0aGUgYXNzdW1wdGlvbiB0
aGF0DQo+IHRoZSB0ZXh0IHdvdWxkIGJlIGVpdGhlciByZW1vdmVkIG9yIGluY29ycG9yYXRlZCBp
biBhIGxhdGVyIGRyYWZ0LiBJDQo+IGp1c3QgaGF2ZSB0byBwdXQgYSBzdGFrZSBkb3duIHNvbWV3
aGVyZSBvbiB0aGUgc3ludGF4LCBhbmQgSSdtIGxlYW5pbmcNCj4gdG93YXJkcyB0aGUgb25lIHRo
YXQgZG9lc24ndCBhZGQgYSBub3JtYXRpdmUgZGVwZW5kZW5jeSBvbiBhbiB1bmZpbmlzaGVkDQo+
IChhcyBvZiByaWdodCBub3cpIHdvcmsuDQoNCkZZSSwgSSBoYXZlIG5vdCBzdWdnZXN0ZWQgdG8g
cmVmZXJlbmNlIEhBTCBvciBvdGhlciB1bmZpbmlzaGVkIHNwZWNpZmljYXRpb25zLA0KYnV0IGlu
Y29ycG9yYXRlIHRoZSBzeW50YXguIElmIHRoZXJlIGlzIHRvIGJlIGEgcmVmZXJlbmNlLCB0aGVu
IHRoYXQgaXMgZm9yIHRoZQ0KY3VydGVzeSBhbmQgd2lsbCBiZSBhbiBpbmZvcm1hdGlvbmFsIHJl
ZmVyZW5jZS4NCg0KQXMgdG8gdGhlIGFjdHVhbCBlZGl0aW5nIGlzIGNvbmNlcm5lZCwgbWF5IEkg
c3VnZ2VzdCB0aGUgcmV2ZXJzZTogaS5lLiwNCmtlZXAgdGhlIGN1cnJlbnQgdGV4dCAoLTA1KSBh
bmQgYWRkIGEgbm90ZSBmb3IgZGlzY3Vzc2lvbi4NCkl0IGlzIGN1c3RvbWFyeSBpbiB0aGUgc3Rh
bmRhcmRpemF0aW9uIHByb2Nlc3MgdGhhdCB0aGUgY2hhbmdlIHRvIHRoZSB0ZXh0DQppcyBub3Qg
dG8gYmUgaW5jb3Jwb3JhdGVkIHVudGlsIHRoZSByZXNvbHV0aW9uIGZyb20gdGhlIGNvbW1lbnRz
IGFyZSByZWFjaGVkLg0KSWYgdGhlIHRleHQgaXMgY2hhbmdlZCwgdGhlbiBpdCBtZWFucyB0aGF0
IHRoZSByZXNvbHV0aW9uIGlzIHJlYWNoZWQsDQp3aGljaCBpcyBub3QgdGhlIGNhc2UuIEV2ZW4g
Im5lIGJpcyBpbiBpZGVtIiBtYXkga2ljayBpbiwgd2hpY2ggZWZmZWN0aXZlbHkNCnByb2hpYml0
IHRoZSBjaGFuZ2UgYmFjay4NCg0KTmF0DQoNCj4NCj4gLS0gSnVzdGluDQo+DQo+IE9uIDAyLzEz
LzIwMTMgMDE6MjcgUE0sIE5hdCBTYWtpbXVyYSB3cm90ZToNCj4+IEkgYW0gYWdhaW5zdCB0aGUg
c3ludGF4IG9mIHJlZ2lzdHJhdGlvbl9hY2Nlc3NfdXJsIC4NCj4+DQo+PiA9bmF0IHZpYSBpUGhv
bmUNCj4+DQo+PiBGZWIgMTMsIDIwMTMgMzozNxskQiEiGyhCTWlrZSBKb25lcyA8TWljaGFlbC5K
b25lc0BtaWNyb3NvZnQuY29tPiAbJEIkTiVhJUMlOyE8JTgbKEI6DQo+Pg0KPj4+IFRoZW4gSSB0
aGluayB3ZSd2ZSByZWFjaGVkIGFuIGFjY2VwdGFibGUgcmVzb2x1dGlvbiBvbiB0aGlzIG9uZS4g
IEJ5IGhhdmluZyB0aGUgc2VydmVyIHJldHVybiB0aGUgcmVnaXN0cmF0aW9uX2FjY2Vzc191cmwg
dXBvbiBjcmVhdGUgYW5kIGhhdmluZyB0aGUgY2xpZW50IGJlIHJlcXVpcmVkIHRvIGluY2x1ZGUg
dGhlIGNsaWVudF9pZCB1cG9uIHVwZGF0ZSwgc2VydmVycyBhcmUgZnJlZSB0byBtYW5hZ2UgdGhl
aXIgcmVnaXN0cmF0aW9uIGVuZHBvaW50KHMpIGFzIHRoZXkgc2VlIGZpdCBhbmQgY2xpZW50cyBh
bHdheXMgZG8gdGhlIHNhbWUgdGhpbmcuDQo+Pj4NCj4+PiAgICAgICAgICAgICAgICBUaGFua3Mg
YWxsLA0KPj4+ICAgICAgICAgICAgICAgIC0tIE1pa2UNCj4+Pg0KPj4+IC0tLS0tT3JpZ2luYWwg
TWVzc2FnZS0tLS0tDQo+Pj4gRnJvbTogb2F1dGgtYm91bmNlc0BpZXRmLm9yZyBbbWFpbHRvOm9h
dXRoLWJvdW5jZXNAaWV0Zi5vcmddIE9uIEJlaGFsZiBPZiBOYXQgU2FraW11cmENCj4+PiBTZW50
OiBUdWVzZGF5LCBGZWJydWFyeSAxMiwgMjAxMyA5OjE1IEFNDQo+Pj4gVG86IEp1c3RpbiBSaWNo
ZXINCj4+PiBDYzogb2F1dGhAaWV0Zi5vcmcNCj4+PiBTdWJqZWN0OiBSZTogW09BVVRILVdHXSBS
ZWdpc3RyYXRpb246IFJFU1RmdWwgY2xpZW50IGxpZmVjeWNsZSBtYW5hZ2VtZW50DQo+Pj4NCj4+
PiAyMDEzLzIvMTMgSnVzdGluIFJpY2hlciA8anJpY2hlckBtaXRyZS5vcmc+Og0KPj4+PiBPbiAw
Mi8xMi8yMDEzIDExOjMwIEFNLCBKb2huIEJyYWRsZXkgd3JvdGU6DQo+Pj4+PiBUbyBzb21lIGV4
dGVudCB3ZSB3YW50IHRoZSBzZXJ2ZXIgdG8gaGF2ZSB0aGUgZmxleGliaWxpdHkgaXQgbmVlZHMu
DQo+Pj4+Pg0KPj4+Pj4gSWYgdGhlIHNlcnZlciBrbm93cyBpdCBpcyBnb2luZyB0byBuZWVkIGNs
aWVudF9pZCBmb3IgR0VUIGl0IG5lZWRzIHRvDQo+Pj4+PiBlbmNvZGUgaXQgaW4gdGhlIHJlc291
cmNlIFVSSSBldGhlciBhcyBwYXJ0IG9mIHRoZSBwYXRoIG9yIGFzIGEgcXVlcnkNCj4+Pj4+IHBh
cmFtZXRlciAodGhhdCBpcyB1cCB0byB0aGUgc2VydmVyKQ0KPj4+Pj4NCj4+Pj4+IFdoZW4gZG9p
bmcgdXBkYXRlcyB0aGUgY2xpZW50IE1VU1QgaW5jbHVkZSB0aGUgY2xpZW50X2lkIGFzIGFuDQo+
Pj4+PiBhZGRpdGlvbmFsIGludGVncml0eSBjaGVjay4gIFNvbWUgc2VydmVycyBtYXkgc3dpdGNo
IG9uIHRoYXQgYnV0IHRoYXQgaXMgdXAgdG8gdGhlbS4NCj4+Pj4gU28gaWYgYnkgdGhpcyB5b3Ug
bWVhbiB0aGF0IHRoZSBjbGllbnQgc3RpbGwgc2ltcGx5IGZvbGxvd3Mgd2hhdGV2ZXINCj4+Pj4g
dXBkYXRlIHVybCB0aGUgc2VydmVyIGhhbmRzIGl0ICh3aGljaCBtYXkgb3IgbWF5IG5vdCBpbmNs
dWRlIHRoZQ0KPj4+PiBjbGllbnRfaWQgaW4gc29tZSBmb3JtLCBidXQgdGhlIGNsaWVudCBkb2Vz
bid0IGNhcmUpLCBhbmQgdGhhdCB0aGUNCj4+Pj4gY2xpZW50IE1VU1QgaW5jbHVkZSBpdHMgY2xp
ZW50X2lkIGluIHRoZSByZXF1ZXN0IGJvZHkgKHRvcC1sZXZlbA0KPj4+PiBtZW1iZXIgb2YgYSBK
U09OIG9iamVjdCwgYXQgdGhlDQo+Pj4+IG1vbWVudCkgd2hlbiBkb2luZyBhIFBVVCAob3IgUE9T
VC9QQVRDSD8gc2VlIGJlbG93KSBmb3IgdGhlIHVwZGF0ZQ0KPj4+PiBhY3Rpb24sIHRoZW4gSSdt
IHRvdGFsbHkgZmluZSB3aXRoIHRoYXQuIElzIHRoaXMgd2hhdCB5b3UncmUgc3VnZ2VzdGluZz8N
Cj4+PiBBcyBmYXIgYXMgSSB1bmRlcnN0YW5kLCB5ZXMuIFRoYXQgaXMgd2hhdCB3ZSBkaXNjdXNz
ZWQgbGFzdCBUaHVyc2RheSBmYWNlIHRvIGZhY2UuDQo+Pj4NCj4+Pg0KPj4+IC0tDQo+Pj4gTmF0
IFNha2ltdXJhICg9bmF0KQ0KPj4+IENoYWlybWFuLCBPcGVuSUQgRm91bmRhdGlvbg0KPj4+IGh0
dHA6Ly9uYXQuc2FraW11cmEub3JnLw0KPj4+IEBfbmF0X2VuDQo+Pj4gX19fX19fX19fX19fX19f
X19fX19fX19fX19fX19fX19fX19fX19fX19fX19fX18NCj4+PiBPQXV0aCBtYWlsaW5nIGxpc3QN
Cj4+PiBPQXV0aEBpZXRmLm9yZw0KPj4+IGh0dHBzOi8vd3d3LmlldGYub3JnL21haWxtYW4vbGlz
dGluZm8vb2F1dGgNCj4NCg0KDQoNCi0tIA0KTmF0IFNha2ltdXJhICg9bmF0KQ0KQ2hhaXJtYW4s
IE9wZW5JRCBGb3VuZGF0aW9uDQpodHRwOi8vbmF0LnNha2ltdXJhLm9yZy8NCkBfbmF0X2VuDQo=

From sakimura@gmail.com  Wed Feb 13 19:31:18 2013
Return-Path: <sakimura@gmail.com>
X-Original-To: oauth@ietfa.amsl.com
Delivered-To: oauth@ietfa.amsl.com
Received: from localhost (localhost [127.0.0.1]) by ietfa.amsl.com (Postfix) with ESMTP id AC70421E80D6 for <oauth@ietfa.amsl.com>; Wed, 13 Feb 2013 19:31:18 -0800 (PST)
X-Virus-Scanned: amavisd-new at amsl.com
X-Spam-Flag: NO
X-Spam-Score: -2.281
X-Spam-Level: 
X-Spam-Status: No, score=-2.281 tagged_above=-999 required=5 tests=[AWL=-0.435, BAYES_00=-2.599, MIME_BASE64_TEXT=1.753, RCVD_IN_DNSWL_LOW=-1]
Received: from mail.ietf.org ([64.170.98.30]) by localhost (ietfa.amsl.com [127.0.0.1]) (amavisd-new, port 10024) with ESMTP id FPdlz81Xrzjq for <oauth@ietfa.amsl.com>; Wed, 13 Feb 2013 19:31:17 -0800 (PST)
Received: from mail-lb0-f175.google.com (mail-lb0-f175.google.com [209.85.217.175]) by ietfa.amsl.com (Postfix) with ESMTP id 59E2D21E80D0 for <oauth@ietf.org>; Wed, 13 Feb 2013 19:31:17 -0800 (PST)
Received: by mail-lb0-f175.google.com with SMTP id n3so1435943lbo.6 for <oauth@ietf.org>; Wed, 13 Feb 2013 19:31:16 -0800 (PST)
DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=gmail.com; s=20120113; h=mime-version:x-received:in-reply-to:references:date:message-id :subject:from:to:cc:content-type:content-transfer-encoding; bh=UqfNcsUIGEAXZFeZ25B5mKbX8lKTOc5AByGyN/zGVHw=; b=jpq9gRFX4lKU4klapPLJSWEXr2MSVdgwhkr1WdnUzY/gjJ8QzxGN4CClxLVvwoQJuO 0t8AoJxIwCTiVJe3kieHlen0Z2WRKwfg/zIFth1o+tc1L7UI92KTBgf8X4QKD/9cYBUa grn7lOA7Bct66GwAUpOMSRr3/l+fwqKWuH/EhO4t2P9tO864BzDQWdz4eDKT6enAhLCQ fHyWwhs2ip9NuwjqEwL+zMVOXBNRZxGz9pnWGn9SiFzgEGwsvcHnCPnWmH6jP8LD0XHC gKgPvFvXKLyfIE4gK7wHIVAU4Pp2ImMkUSmVxYVzD5tlqI81Em5XkabyOkBJaa+66ZUU 7tuQ==
MIME-Version: 1.0
X-Received: by 10.152.148.133 with SMTP id ts5mr10599038lab.2.1360812675948; Wed, 13 Feb 2013 19:31:15 -0800 (PST)
Received: by 10.112.14.44 with HTTP; Wed, 13 Feb 2013 19:31:15 -0800 (PST)
In-Reply-To: <AF401161-0C7C-4E49-9F44-9982B312FF6D@ve7jtb.com>
References: <51195F36.6040705@mitre.org> <780F8C26-19A4-4301-B350-307D9FFF69CD@ve7jtb.com> <511BAA8B.8030309@mitre.org> <BEBDAFAC-28B0-4959-9FE5-34EC17FC318C@ve7jtb.com> <-4554688250617930935@unknownmsgid> <AF401161-0C7C-4E49-9F44-9982B312FF6D@ve7jtb.com>
Date: Thu, 14 Feb 2013 12:31:15 +0900
Message-ID: <CABzCy2BtzA-DJofpSkKJWrwfYtM8a+44VWe1Lx+f_ow=mW8kwg@mail.gmail.com>
From: Nat Sakimura <sakimura@gmail.com>
To: John Bradley <ve7jtb@ve7jtb.com>
Content-Type: text/plain; charset=ISO-2022-JP
Content-Transfer-Encoding: base64
Cc: "oauth@ietf.org" <oauth@ietf.org>
Subject: Re: [OAUTH-WG] Registration: RESTful client lifecycle management
X-BeenThere: oauth@ietf.org
X-Mailman-Version: 2.1.12
Precedence: list
List-Id: OAUTH WG <oauth.ietf.org>
List-Unsubscribe: <https://www.ietf.org/mailman/options/oauth>, <mailto:oauth-request@ietf.org?subject=unsubscribe>
List-Archive: <http://www.ietf.org/mail-archive/web/oauth>
List-Post: <mailto:oauth@ietf.org>
List-Help: <mailto:oauth-request@ietf.org?subject=help>
List-Subscribe: <https://www.ietf.org/mailman/listinfo/oauth>, <mailto:oauth-request@ietf.org?subject=subscribe>
X-List-Received-Date: Thu, 14 Feb 2013 03:31:18 -0000
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From Michael.Jones@microsoft.com  Wed Feb 13 19:46:10 2013
Return-Path: <Michael.Jones@microsoft.com>
X-Original-To: oauth@ietfa.amsl.com
Delivered-To: oauth@ietfa.amsl.com
Received: from localhost (localhost [127.0.0.1]) by ietfa.amsl.com (Postfix) with ESMTP id 9BADD21E80D5 for <oauth@ietfa.amsl.com>; Wed, 13 Feb 2013 19:46:10 -0800 (PST)
X-Virus-Scanned: amavisd-new at amsl.com
X-Spam-Flag: NO
X-Spam-Score: -2.457
X-Spam-Level: 
X-Spam-Status: No, score=-2.457 tagged_above=-999 required=5 tests=[AWL=0.141,  BAYES_00=-2.599, HTML_MESSAGE=0.001]
Received: from mail.ietf.org ([64.170.98.30]) by localhost (ietfa.amsl.com [127.0.0.1]) (amavisd-new, port 10024) with ESMTP id VZpxF5HK41cS for <oauth@ietfa.amsl.com>; Wed, 13 Feb 2013 19:46:09 -0800 (PST)
Received: from na01-bl2-obe.outbound.protection.outlook.com (na01-bl2-obe.ptr.protection.outlook.com [65.55.169.28]) by ietfa.amsl.com (Postfix) with ESMTP id 377B221E80CD for <oauth@ietf.org>; Wed, 13 Feb 2013 19:46:08 -0800 (PST)
Received: from BL2FFO11FD024.protection.gbl (10.173.161.201) by BL2FFO11HUB019.protection.gbl (10.173.160.111) with Microsoft SMTP Server (TLS) id 15.0.620.12; Thu, 14 Feb 2013 03:45:59 +0000
Received: from TK5EX14HUBC107.redmond.corp.microsoft.com (131.107.125.37) by BL2FFO11FD024.mail.protection.outlook.com (10.173.161.103) with Microsoft SMTP Server (TLS) id 15.0.620.12 via Frontend Transport; Thu, 14 Feb 2013 03:45:58 +0000
Received: from TK5EX14MBXC285.redmond.corp.microsoft.com ([169.254.3.232]) by TK5EX14HUBC107.redmond.corp.microsoft.com ([157.54.80.67]) with mapi id 14.02.0318.003; Thu, 14 Feb 2013 03:45:38 +0000
From: Mike Jones <Michael.Jones@microsoft.com>
To: Nat Sakimura <sakimura@gmail.com>, Justin Richer <jricher@mitre.org>
Thread-Topic: [OAUTH-WG] Registration: RESTful client lifecycle management
Thread-Index: AQHOCJzxVGwYODuh3UmktcEEXHrfK5h1dc0AgABcxoCAAH10AIAAG1EAgAACn4CAAAnLAIAAFhgggAGQiACAAAOOgIAAku4AgAAFacU=
Date: Thu, 14 Feb 2013 03:45:38 +0000
Message-ID: <4E1F6AAD24975D4BA5B168042967394367447CC3@TK5EX14MBXC285.redmond.corp.microsoft.com>
References: <51195F36.6040705@mitre.org> <780F8C26-19A4-4301-B350-307D9FFF69CD@ve7jtb.com> <80727F20-A830-4778-B11C-D45389310646@lodderstedt.net> <511A5742.30707@mitre.org>	<B054D3FD-B4F6-4C57-8ED3-402F936DE17F@ve7jtb.com> <511A705F.4070204@mitre.org> <CABzCy2AaHeVQ+h18FaT8S1z9+EUbVE0WfCf63ra=7s6=f5ExLg@mail.gmail.com> <4E1F6AAD24975D4BA5B168042967394367443862@TK5EX14MBXC285.redmond.corp.microsoft.com> <-7739255357185893925@unknownmsgid> <511BDE17.7060503@mitre.org>, <CABzCy2DN8wueCMYuG6QGVhhjQPhi7Sibt0S+_eFVFwum6_BoCg@mail.gmail.com>
In-Reply-To: <CABzCy2DN8wueCMYuG6QGVhhjQPhi7Sibt0S+_eFVFwum6_BoCg@mail.gmail.com>
Accept-Language: en-US
Content-Language: en-US
X-MS-Has-Attach: 
X-MS-TNEF-Correlator: 
Content-Type: multipart/alternative; boundary="_000_4E1F6AAD24975D4BA5B168042967394367447CC3TK5EX14MBXC285r_"
MIME-Version: 1.0
X-Forefront-Antispam-Report: CIP:131.107.125.37; CTRY:US; IPV:CAL; IPV:NLI; EFV:NLI; SFV:NSPM; SFS:(24454001)(199002)(51704002)(189002)(479174001)(69234002)(55885001)(13464002)(377454001)(54356001)(59766001)(50986001)(80022001)(74502001)(53806001)(15202345001)(16236675001)(31966008)(65816001)(74662001)(55846006)(44976002)(5343655001)(47446002)(16406001)(77982001)(4396001)(49866001)(47976001)(5343635001)(54316002)(512904001)(56816002)(56776001)(79102001)(63696002)(76482001)(33656001)(20776003)(51856001)(46102001)(47736001); DIR:OUT; SFP:; SCL:1; SRVR:BL2FFO11HUB019; H:TK5EX14HUBC107.redmond.corp.microsoft.com; RD:InfoDomainNonexistent; A:1; MX:1; LANG:en; 
X-OriginatorOrg: microsoft.onmicrosoft.com
X-Forefront-PRVS: 0757EEBDCA
Cc: "oauth@ietf.org" <oauth@ietf.org>
Subject: Re: [OAUTH-WG] Registration: RESTful client lifecycle management
X-BeenThere: oauth@ietf.org
X-Mailman-Version: 2.1.12
Precedence: list
List-Id: OAUTH WG <oauth.ietf.org>
List-Unsubscribe: <https://www.ietf.org/mailman/options/oauth>, <mailto:oauth-request@ietf.org?subject=unsubscribe>
List-Archive: <http://www.ietf.org/mail-archive/web/oauth>
List-Post: <mailto:oauth@ietf.org>
List-Help: <mailto:oauth-request@ietf.org?subject=help>
List-Subscribe: <https://www.ietf.org/mailman/listinfo/oauth>, <mailto:oauth-request@ietf.org?subject=subscribe>
X-List-Received-Date: Thu, 14 Feb 2013 03:46:10 -0000

--_000_4E1F6AAD24975D4BA5B168042967394367447CC3TK5EX14MBXC285r_
Content-Type: text/plain; charset="iso-2022-jp"
Content-Transfer-Encoding: quoted-printable

I agree with you that in the standards process, changes should not be intro=
duced until there is consensus on them. However in this particular case, th=
e problem is that in -05, many changes were introduced without consensus, o=
r even prior review by the working group.  Thus, as previously discussed, u=
nless consensus becomes apparent for those changes, the default action shou=
ld be to revert those changes.

The introduction of the baroque _links syntax was one such change.

-- Mike
________________________________
From: Nat Sakimura
Sent: 2/13/2013 7:26 PM
To: Justin Richer
Cc: Mike Jones; oauth@ietf.org
Subject: Re: [OAUTH-WG] Registration: RESTful client lifecycle management

2013/2/14 Justin Richer <jricher@mitre.org>:
> Duly noted, and while there seems to be solid support behind the
> semantics of returning a URL, I'm not convinced the syntax argument is
> over yet either. I have seen support and good arguments from both sides
> and there isn't a clear winner there (see the other thread). Speaking as
> an individual member, I could go with either approach and I'd like to
> see what the rest of the WG wants.

Thank you. I wanted to raise a voice that while the need for the
returning the URL
seemed to have come to a consensus, the syntax has not, unlike Mike wrote.

>
> Speaking now as an editor: It's been suggested off-list that we adopt
> the simplified (bespoke) mechanism of the "registration_access_url"
> syntax for the next draft and continue to move discussion forward for
> the inclusion of the more-general mechanism (beit HAL based or something
> similar like JSON-LD) here on the list. Would you and the other HAL
> supporters be amenable to this solution? I wouldn't be opposed to adding
> a kind of "note for discussion" section to the -06 draft to help
> facilitate moving forward in a concrete manner, with the assumption that
> the text would be either removed or incorporated in a later draft. I
> just have to put a stake down somewhere on the syntax, and I'm leaning
> towards the one that doesn't add a normative dependency on an unfinished
> (as of right now) work.

FYI, I have not suggested to reference HAL or other unfinished specificatio=
ns,
but incorporate the syntax. If there is to be a reference, then that is for=
 the
curtesy and will be an informational reference.

As to the actual editing is concerned, may I suggest the reverse: i.e.,
keep the current text (-05) and add a note for discussion.
It is customary in the standardization process that the change to the text
is not to be incorporated until the resolution from the comments are reache=
d.
If the text is changed, then it means that the resolution is reached,
which is not the case. Even "ne bis in idem" may kick in, which effectively
prohibit the change back.

Nat

>
> -- Justin
>
> On 02/13/2013 01:27 PM, Nat Sakimura wrote:
>> I am against the syntax of registration_access_url .
>>
>> =3Dnat via iPhone
>>
>> Feb 13, 2013 3:37=1B$B!"=1B(BMike Jones <Michael.Jones@microsoft.com> =
=1B$B$N%a%C%;!<%8=1B(B:
>>
>>> Then I think we've reached an acceptable resolution on this one.  By ha=
ving the server return the registration_access_url upon create and having t=
he client be required to include the client_id upon update, servers are fre=
e to manage their registration endpoint(s) as they see fit and clients alwa=
ys do the same thing.
>>>
>>>                Thanks all,
>>>                -- Mike
>>>
>>> -----Original Message-----
>>> From: oauth-bounces@ietf.org [mailto:oauth-bounces@ietf.org] On Behalf =
Of Nat Sakimura
>>> Sent: Tuesday, February 12, 2013 9:15 AM
>>> To: Justin Richer
>>> Cc: oauth@ietf.org
>>> Subject: Re: [OAUTH-WG] Registration: RESTful client lifecycle manageme=
nt
>>>
>>> 2013/2/13 Justin Richer <jricher@mitre.org>:
>>>> On 02/12/2013 11:30 AM, John Bradley wrote:
>>>>> To some extent we want the server to have the flexibility it needs.
>>>>>
>>>>> If the server knows it is going to need client_id for GET it needs to
>>>>> encode it in the resource URI ether as part of the path or as a query
>>>>> parameter (that is up to the server)
>>>>>
>>>>> When doing updates the client MUST include the client_id as an
>>>>> additional integrity check.  Some servers may switch on that but that=
 is up to them.
>>>> So if by this you mean that the client still simply follows whatever
>>>> update url the server hands it (which may or may not include the
>>>> client_id in some form, but the client doesn't care), and that the
>>>> client MUST include its client_id in the request body (top-level
>>>> member of a JSON object, at the
>>>> moment) when doing a PUT (or POST/PATCH? see below) for the update
>>>> action, then I'm totally fine with that. Is this what you're suggestin=
g?
>>> As far as I understand, yes. That is what we discussed last Thursday fa=
ce to face.
>>>
>>>
>>> --
>>> Nat Sakimura (=3Dnat)
>>> Chairman, OpenID Foundation
>>> http://nat.sakimura.org/
>>> @_nat_en
>>> _______________________________________________
>>> OAuth mailing list
>>> OAuth@ietf.org
>>> https://www.ietf.org/mailman/listinfo/oauth
>



--
Nat Sakimura (=3Dnat)
Chairman, OpenID Foundation
http://nat.sakimura.org/
@_nat_en

--_000_4E1F6AAD24975D4BA5B168042967394367447CC3TK5EX14MBXC285r_
Content-Type: text/html; charset="iso-2022-jp"
Content-Transfer-Encoding: quoted-printable

<html>
<head>
<meta http-equiv=3D"Content-Type" content=3D"text/html; charset=3Diso-2022-=
jp">
<meta name=3D"Generator" content=3D"Microsoft Exchange Server">
<!-- converted from text --><style><!-- .EmailQuote { margin-left: 1pt; pad=
ding-left: 4pt; border-left: #800000 2px solid; } --></style>
</head>
<body>
<div>
<div>
<div style=3D"font-family:Calibri,sans-serif; font-size:11pt">I agree with =
you that in the standards process, changes should not be introduced until t=
here is consensus on them. However in this particular case, the problem is =
that in -05, many changes were introduced
 without consensus, or even prior review by the working group.&nbsp; Thus, =
as previously discussed, unless consensus becomes apparent for those change=
s, the default action should be to revert those changes.<br>
<br>
The introduction of the baroque _links syntax was one such change.<br>
<br>
-- Mike<br>
</div>
</div>
<hr>
<span style=3D"font-family:Tahoma,sans-serif; font-size:10pt; font-weight:b=
old">From:
</span><span style=3D"font-family:Tahoma,sans-serif; font-size:10pt">Nat Sa=
kimura</span><br>
<span style=3D"font-family:Tahoma,sans-serif; font-size:10pt; font-weight:b=
old">Sent:
</span><span style=3D"font-family:Tahoma,sans-serif; font-size:10pt">2/13/2=
013 7:26 PM</span><br>
<span style=3D"font-family:Tahoma,sans-serif; font-size:10pt; font-weight:b=
old">To:
</span><span style=3D"font-family:Tahoma,sans-serif; font-size:10pt">Justin=
 Richer</span><br>
<span style=3D"font-family:Tahoma,sans-serif; font-size:10pt; font-weight:b=
old">Cc:
</span><span style=3D"font-family:Tahoma,sans-serif; font-size:10pt">Mike J=
ones; oauth@ietf.org</span><br>
<span style=3D"font-family:Tahoma,sans-serif; font-size:10pt; font-weight:b=
old">Subject:
</span><span style=3D"font-family:Tahoma,sans-serif; font-size:10pt">Re: [O=
AUTH-WG] Registration: RESTful client lifecycle management</span><br>
<br>
</div>
<font size=3D"2"><span style=3D"font-size:10pt;">
<div class=3D"PlainText">2013/2/14 Justin Richer &lt;jricher@mitre.org&gt;:=
<br>
&gt; Duly noted, and while there seems to be solid support behind the<br>
&gt; semantics of returning a URL, I'm not convinced the syntax argument is=
<br>
&gt; over yet either. I have seen support and good arguments from both side=
s<br>
&gt; and there isn't a clear winner there (see the other thread). Speaking =
as<br>
&gt; an individual member, I could go with either approach and I'd like to<=
br>
&gt; see what the rest of the WG wants.<br>
<br>
Thank you. I wanted to raise a voice that while the need for the<br>
returning the URL<br>
seemed to have come to a consensus, the syntax has not, unlike Mike wrote.<=
br>
<br>
&gt;<br>
&gt; Speaking now as an editor: It's been suggested off-list that we adopt<=
br>
&gt; the simplified (bespoke) mechanism of the &quot;registration_access_ur=
l&quot;<br>
&gt; syntax for the next draft and continue to move discussion forward for<=
br>
&gt; the inclusion of the more-general mechanism (beit HAL based or somethi=
ng<br>
&gt; similar like JSON-LD) here on the list. Would you and the other HAL<br=
>
&gt; supporters be amenable to this solution? I wouldn't be opposed to addi=
ng<br>
&gt; a kind of &quot;note for discussion&quot; section to the -06 draft to =
help<br>
&gt; facilitate moving forward in a concrete manner, with the assumption th=
at<br>
&gt; the text would be either removed or incorporated in a later draft. I<b=
r>
&gt; just have to put a stake down somewhere on the syntax, and I'm leaning=
<br>
&gt; towards the one that doesn't add a normative dependency on an unfinish=
ed<br>
&gt; (as of right now) work.<br>
<br>
FYI, I have not suggested to reference HAL or other unfinished specificatio=
ns,<br>
but incorporate the syntax. If there is to be a reference, then that is for=
 the<br>
curtesy and will be an informational reference.<br>
<br>
As to the actual editing is concerned, may I suggest the reverse: i.e.,<br>
keep the current text (-05) and add a note for discussion.<br>
It is customary in the standardization process that the change to the text<=
br>
is not to be incorporated until the resolution from the comments are reache=
d.<br>
If the text is changed, then it means that the resolution is reached,<br>
which is not the case. Even &quot;ne bis in idem&quot; may kick in, which e=
ffectively<br>
prohibit the change back.<br>
<br>
Nat<br>
<br>
&gt;<br>
&gt; -- Justin<br>
&gt;<br>
&gt; On 02/13/2013 01:27 PM, Nat Sakimura wrote:<br>
&gt;&gt; I am against the syntax of registration_access_url .<br>
&gt;&gt;<br>
&gt;&gt; =3Dnat via iPhone<br>
&gt;&gt;<br>
&gt;&gt; Feb 13, 2013 3:37=1B$B!"=1B(BMike Jones &lt;Michael.Jones@microsof=
t.com&gt; =1B$B$N%a%C%;!<%8=1B(B:<br>
&gt;&gt;<br>
&gt;&gt;&gt; Then I think we've reached an acceptable resolution on this on=
e.&nbsp; By having the server return the registration_access_url upon creat=
e and having the client be required to include the client_id upon update, s=
ervers are free to manage their registration endpoint(s)
 as they see fit and clients always do the same thing.<br>
&gt;&gt;&gt;<br>
&gt;&gt;&gt;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nb=
sp;&nbsp;&nbsp;&nbsp;&nbsp; Thanks all,<br>
&gt;&gt;&gt;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nb=
sp;&nbsp;&nbsp;&nbsp;&nbsp; -- Mike<br>
&gt;&gt;&gt;<br>
&gt;&gt;&gt; -----Original Message-----<br>
&gt;&gt;&gt; From: oauth-bounces@ietf.org [<a href=3D"mailto:oauth-bounces@=
ietf.org">mailto:oauth-bounces@ietf.org</a>] On Behalf Of Nat Sakimura<br>
&gt;&gt;&gt; Sent: Tuesday, February 12, 2013 9:15 AM<br>
&gt;&gt;&gt; To: Justin Richer<br>
&gt;&gt;&gt; Cc: oauth@ietf.org<br>
&gt;&gt;&gt; Subject: Re: [OAUTH-WG] Registration: RESTful client lifecycle=
 management<br>
&gt;&gt;&gt;<br>
&gt;&gt;&gt; 2013/2/13 Justin Richer &lt;jricher@mitre.org&gt;:<br>
&gt;&gt;&gt;&gt; On 02/12/2013 11:30 AM, John Bradley wrote:<br>
&gt;&gt;&gt;&gt;&gt; To some extent we want the server to have the flexibil=
ity it needs.<br>
&gt;&gt;&gt;&gt;&gt;<br>
&gt;&gt;&gt;&gt;&gt; If the server knows it is going to need client_id for =
GET it needs to<br>
&gt;&gt;&gt;&gt;&gt; encode it in the resource URI ether as part of the pat=
h or as a query<br>
&gt;&gt;&gt;&gt;&gt; parameter (that is up to the server)<br>
&gt;&gt;&gt;&gt;&gt;<br>
&gt;&gt;&gt;&gt;&gt; When doing updates the client MUST include the client_=
id as an<br>
&gt;&gt;&gt;&gt;&gt; additional integrity check.&nbsp; Some servers may swi=
tch on that but that is up to them.<br>
&gt;&gt;&gt;&gt; So if by this you mean that the client still simply follow=
s whatever<br>
&gt;&gt;&gt;&gt; update url the server hands it (which may or may not inclu=
de the<br>
&gt;&gt;&gt;&gt; client_id in some form, but the client doesn't care), and =
that the<br>
&gt;&gt;&gt;&gt; client MUST include its client_id in the request body (top=
-level<br>
&gt;&gt;&gt;&gt; member of a JSON object, at the<br>
&gt;&gt;&gt;&gt; moment) when doing a PUT (or POST/PATCH? see below) for th=
e update<br>
&gt;&gt;&gt;&gt; action, then I'm totally fine with that. Is this what you'=
re suggesting?<br>
&gt;&gt;&gt; As far as I understand, yes. That is what we discussed last Th=
ursday face to face.<br>
&gt;&gt;&gt;<br>
&gt;&gt;&gt;<br>
&gt;&gt;&gt; --<br>
&gt;&gt;&gt; Nat Sakimura (=3Dnat)<br>
&gt;&gt;&gt; Chairman, OpenID Foundation<br>
&gt;&gt;&gt; <a href=3D"http://nat.sakimura.org/">http://nat.sakimura.org/<=
/a><br>
&gt;&gt;&gt; @_nat_en<br>
&gt;&gt;&gt; _______________________________________________<br>
&gt;&gt;&gt; OAuth mailing list<br>
&gt;&gt;&gt; OAuth@ietf.org<br>
&gt;&gt;&gt; <a href=3D"https://www.ietf.org/mailman/listinfo/oauth">https:=
//www.ietf.org/mailman/listinfo/oauth</a><br>
&gt;<br>
<br>
<br>
<br>
-- <br>
Nat Sakimura (=3Dnat)<br>
Chairman, OpenID Foundation<br>
<a href=3D"http://nat.sakimura.org/">http://nat.sakimura.org/</a><br>
@_nat_en<br>
</div>
</span></font>
</body>
</html>

--_000_4E1F6AAD24975D4BA5B168042967394367447CC3TK5EX14MBXC285r_--

From wmills_92105@yahoo.com  Wed Feb 13 21:41:31 2013
Return-Path: <wmills_92105@yahoo.com>
X-Original-To: oauth@ietfa.amsl.com
Delivered-To: oauth@ietfa.amsl.com
Received: from localhost (localhost [127.0.0.1]) by ietfa.amsl.com (Postfix) with ESMTP id 5F77E21E8040 for <oauth@ietfa.amsl.com>; Wed, 13 Feb 2013 21:41:31 -0800 (PST)
X-Virus-Scanned: amavisd-new at amsl.com
X-Spam-Flag: NO
X-Spam-Score: -1.948
X-Spam-Level: 
X-Spam-Status: No, score=-1.948 tagged_above=-999 required=5 tests=[AWL=0.650,  BAYES_00=-2.599, HTML_MESSAGE=0.001]
Received: from mail.ietf.org ([64.170.98.30]) by localhost (ietfa.amsl.com [127.0.0.1]) (amavisd-new, port 10024) with ESMTP id AdWPRAig7m5l for <oauth@ietfa.amsl.com>; Wed, 13 Feb 2013 21:41:30 -0800 (PST)
Received: from nm13-vm0.bullet.mail.ne1.yahoo.com (nm13-vm0.bullet.mail.ne1.yahoo.com [98.138.91.48]) by ietfa.amsl.com (Postfix) with ESMTP id C8D2F21E8042 for <oauth@ietf.org>; Wed, 13 Feb 2013 21:41:29 -0800 (PST)
Received: from [98.138.90.53] by nm13.bullet.mail.ne1.yahoo.com with NNFMP; 14 Feb 2013 05:41:26 -0000
Received: from [98.138.89.199] by tm6.bullet.mail.ne1.yahoo.com with NNFMP; 14 Feb 2013 05:41:26 -0000
Received: from [127.0.0.1] by omp1057.mail.ne1.yahoo.com with NNFMP; 14 Feb 2013 05:41:26 -0000
X-Yahoo-Newman-Property: ymail-3
X-Yahoo-Newman-Id: 96579.95611.bm@omp1057.mail.ne1.yahoo.com
Received: (qmail 70560 invoked by uid 60001); 14 Feb 2013 05:41:25 -0000
DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=yahoo.com; s=s1024; t=1360820485; bh=RZbmWvEOxYQzm9g6Oprqd7RvGOOc+2xJSLn2JH73jEY=; h=X-YMail-OSG:Received:X-Rocket-MIMEInfo:X-Mailer:References:Message-ID:Date:From:Reply-To:Subject:To:In-Reply-To:MIME-Version:Content-Type; b=UjPIPKaRKLGTNAEhtJXZNId667mdJlpYiXU+U9vr8+77ORKIzEsGZ4EP0h5cZilwLEm9CKejHbbtuKF7mGDoHtbs0A2Vmo0L9IHwoUXk1xeY10rOzB1vKKM1YHA630HN930UOqYoE76T1xfR5pzi7DlYvR+5aLOF0WJdF7Ib1EU=
DomainKey-Signature: a=rsa-sha1; q=dns; c=nofws; s=s1024; d=yahoo.com; h=X-YMail-OSG:Received:X-Rocket-MIMEInfo:X-Mailer:References:Message-ID:Date:From:Reply-To:Subject:To:In-Reply-To:MIME-Version:Content-Type; b=BRNxUSAp6Z64to4xCLFADxCXnMwMthjld7vsQ4epf2zjD4kVz5HUxRGuyxbSvLSgbcIFYBdD/Bt6XusCuUtX8GqWNSKizbDbHrWpwhwlipDL9TErxo1wZs1jOyR9ZW6zAplNDiP6LsWqpWD2VfNcWPVSolrKsasXmE/MeiqyeEg=;
X-YMail-OSG: sBcaOQEVM1lrvxpGHsHdLsfn91xOZvNO1gfYYESqK2_ZDhU t09soryyQxep6mb10Hrxv8o5etnPKALxXzt1Kq8jXklytxrTvvxdiP7Lyn0Z blBXrArjdfJP2l_Qs0Nt.u886XDBEaVsebc0x_.vlqUR6EvB8PY_h_y13QwC 8mUjcp4D1IGVoLl_ZwwN1CoC2cNFjPnlyOCx1vWXkq1OXjeub6eTCas3lBg8 tDx96UcHQc3KQNJ2wyGg_RZMG8EURn1XU4fL19WmPAXFyvHf3b.tRn84pe0W 2QZWErTvp656af5QLIEvhw88In9.2Bb3fviS8Om36qFO9CLLCqAH1eA0agiR bru_LUQuVLVzQBUSqDbs0Fhw3v63cBN1i9tp0YT_9f8AH6gUM79_afssBsS1 e1I5GhfjiESOk3UE4gvp8HZR4xfeFJOg.uN7tgEiLoy6L7Wr9.KET5VWxUaa isPRJdiWNk08MwIfL7hMaOtIt4OGL41MgYJtfMoDBZ4FjWxZH4k6ED3eP5jD Ob86Zii8BfED9LkGcPKGjVYQbcvhqWT74Lwro4DDe3KOAuz8tLB5M3PhM5AZ gtUlH4vHazVBDr1ROXsojvgVhTmMjZKdwnmd3WgKjRqM5PFWimTz_rDbS2DZ zf2I-
Received: from [99.31.212.42] by web31805.mail.mud.yahoo.com via HTTP; Wed, 13 Feb 2013 21:41:24 PST
X-Rocket-MIMEInfo: 001.001, WW91IGhhdmUgYSB0cnVzdCByZWxhdGlvbnNoaXAgd2l0aCB0aGUgdXNlciBhbmQgcGVyaGFwcyB3aXRoIHRoZSBjbGllbnQuCgoKX19fX19fX19fX19fX19fX19fX19fX19fX19fX19fX18KIEZyb206IFByYXRlZWsgTWlzaHJhIDxwcmF0ZWVrLm1pc2hyYUBvcmFjbGUuY29tPgpUbzogb2F1dGhAaWV0Zi5vcmcgClNlbnQ6IFdlZG5lc2RheSwgRmVicnVhcnkgMTMsIDIwMTMgODoxMyBBTQpTdWJqZWN0OiBSZTogW09BVVRILVdHXSBNaW51dGVzIGZyb20gdGhlIE9BdXRoIERlc2lnbiBUZWFtIENvbmZlcmVuY2UBMAEBAQE-
X-Mailer: YahooMailWebService/0.8.134.513
References: <0573984A-8C11-4960-9BC6-F44D4B664C19@gmx.net> <511BBBAC.9060502@oracle.com>
Message-ID: <1360820484.70102.YahooMailNeo@web31805.mail.mud.yahoo.com>
Date: Wed, 13 Feb 2013 21:41:24 -0800 (PST)
From: William Mills <wmills_92105@yahoo.com>
To: Prateek Mishra <prateek.mishra@oracle.com>, "oauth@ietf.org" <oauth@ietf.org>
In-Reply-To: <511BBBAC.9060502@oracle.com>
MIME-Version: 1.0
Content-Type: multipart/alternative; boundary="-551393103-99213868-1360820484=:70102"
Subject: Re: [OAUTH-WG] Minutes from the OAuth Design Team Conference Call - 11th February 2013
X-BeenThere: oauth@ietf.org
X-Mailman-Version: 2.1.12
Precedence: list
Reply-To: William Mills <wmills_92105@yahoo.com>
List-Id: OAUTH WG <oauth.ietf.org>
List-Unsubscribe: <https://www.ietf.org/mailman/options/oauth>, <mailto:oauth-request@ietf.org?subject=unsubscribe>
List-Archive: <http://www.ietf.org/mail-archive/web/oauth>
List-Post: <mailto:oauth@ietf.org>
List-Help: <mailto:oauth-request@ietf.org?subject=help>
List-Subscribe: <https://www.ietf.org/mailman/listinfo/oauth>, <mailto:oauth-request@ietf.org?subject=subscribe>
X-List-Received-Date: Thu, 14 Feb 2013 05:41:31 -0000

---551393103-99213868-1360820484=:70102
Content-Type: text/plain; charset=iso-8859-1
Content-Transfer-Encoding: quoted-printable

You have a trust relationship with the user and perhaps with the client.=0A=
=0A=0A________________________________=0A From: Prateek Mishra <prateek.mis=
hra@oracle.com>=0ATo: oauth@ietf.org =0ASent: Wednesday, February 13, 2013 =
8:13 AM=0ASubject: Re: [OAUTH-WG] Minutes from the OAuth Design Team Confer=
ence Call - 11th February 2013=0A =0AHannes,=0A=0A1) Its not clear to me th=
at we need=A0 to specify exchanges between the AS =0Aand the RS as part of =
this work. The core specification leaves this=0Aunspecified. There could be=
 many different ways that the AS and RS =0Acollaborate to validate signatur=
es in messages received from the client.=0A=0A2) Regarding (symmetric) key =
distribution, dont we need some kind of =0Aexisting trust relationship betw=
een the client and AS to make this =0Apossible? I guess it=0Awould be enoug=
h to require use of a "confidential" client, that would =0Amake it possible=
 for the two parties to agree on a session key at the =0Apoint where an acc=
ess token=0Ais=A0 issued by the AS.=0A=0A3) I think do need an MTI key dist=
ribution protocol as part of the =0Aspecification, leaving that as a choice=
 would hurt interoperability.=0A=0A- prateek=0A=0A> Here are my notes.=0A>=
=0A> Participants:=0A>=0A> * John Bradley=0A> * Derek Atkins=0A> * Phil Hun=
t=0A> * Prateek Mishra=0A> * Hannes Tschofenig=0A> * Mike Jones=0A> * Anton=
io Sanso=0A> * Justin Richer=0A>=0A> Notes:=0A>=0A> My slides are available=
 here: http://www.tschofenig.priv.at/OAuth2-Security-11Feb2013.ppt=0A>=0A> =
Slide #2 summarizes earlier discussions during the conference calls.=0A>=0A=
> -- HTTP vs. JSON=0A>=0A> Phil noted that he does not like to use the MAC =
Token draft as a starting point because it does not re-use any of the work =
done in the JOSE working group and in particular all the libraries that are=
 available today. He mentioned that earlier attempts to write the MAC Token=
 code lead to problems for implementers.=0A>=0A> Justin responded that he d=
oes not agree with using JSON as a transport mechanism since this would rep=
licate a SOAP style.=0A>=0A> Phil noted that he wants to send JSON but the =
signature shall be computed over the HTTP header field.=0A>=0A> -- Flexibil=
ity for the keyed message digest computation=0A>=0A>=A0 From earlier discus=
sion it was clear that the conference call participants wanted more flexibi=
lity regarding the keyed message digest computation. For this purpose Hanne=
s presented the DKIM based approach, which allows selective header fields t=
o be included in the digest. This is shown in slide #4.=0A>=0A> After some =
discussion the conference call participants thought that this would meet th=
eir needs. Further investigations would still be useful to determine the de=
gree of failed HMAC calculations due to HTTP proxies modifying the content.=
=0A>=0A> -- Key Distribution=0A>=0A> Hannes presented the open issue regard=
ing the choice of key distribution. Slides #6-#8 present three techniques a=
nd Hannes asked for feedback regarding the preferred style. Justin and othe=
rs didn't see the need to decide on one mechanism - they wanted to keep the=
 choice open. Derek indicated that this will not be an acceptable approach.=
 Since the resource server and the authorization server may, in the OAuth 2=
.0 framework, be entities produced by different vendors there is an interop=
erability need. Justin responded that he disagrees and that the resource se=
rver needs to understand the access token and referred to the recent draft =
submission for the token introspection endpoint. Derek indicated that the r=
esource server has to understand the content of the access token and the to=
ken introspection endpoint just pushes the problem around: the resource ser=
ver has to send the access token to the authorization server and then the r=
esource server gets the
 result back (which he then=0A=A0 a=0A>=A0  gain needs to understand) in or=
der to make a meaningful authorization decision.=0A>=0A> Everyone agreed th=
at the client must receive the session key from the authorization server an=
d that this approach has to be standardized. It was also agreed that this i=
s a common approach among all three key distribution mechanisms.=0A>=0A> Ha=
nnes asked the participants to think about their preference.=0A>=0A> The qu=
estions regarding key naming and the indication for the intended resource s=
erver the client wants to talk to have been postponed.=0A>=A0 =0A> Ciao=0A>=
 Hannes=0A>=0A>=0A> _______________________________________________=0A> OAu=
th mailing list=0A> OAuth@ietf.org=0A> https://www.ietf.org/mailman/listinf=
o/oauth=0A=0A=0A_______________________________________________=0AOAuth mai=
ling list=0AOAuth@ietf.org=0Ahttps://www.ietf.org/mailman/listinfo/oauth
---551393103-99213868-1360820484=:70102
Content-Type: text/html; charset=iso-8859-1
Content-Transfer-Encoding: quoted-printable

<html><body><div style=3D"color:#000; background-color:#fff; font-family:Co=
urier New, courier, monaco, monospace, sans-serif;font-size:12pt"><div><spa=
n>You have a trust relationship with the user and perhaps with the client.<=
/span></div><div><br></div>  <div style=3D"font-family: 'Courier New', cour=
ier, monaco, monospace, sans-serif; font-size: 12pt;"> <div style=3D"font-f=
amily: 'times new roman', 'new york', times, serif; font-size: 12pt;"> <div=
 dir=3D"ltr"> <font size=3D"2" face=3D"Arial"> <hr size=3D"1">  <b><span st=
yle=3D"font-weight:bold;">From:</span></b> Prateek Mishra &lt;prateek.mishr=
a@oracle.com&gt;<br> <b><span style=3D"font-weight: bold;">To:</span></b> o=
auth@ietf.org <br> <b><span style=3D"font-weight: bold;">Sent:</span></b> W=
ednesday, February 13, 2013 8:13 AM<br> <b><span style=3D"font-weight: bold=
;">Subject:</span></b> Re: [OAUTH-WG] Minutes from the OAuth Design Team Co=
nference Call - 11th February 2013<br> </font> </div> <br>=0AHannes,<br><br=
>1) Its not clear to me that we need&nbsp; to specify exchanges between the=
 AS <br>and the RS as part of this work. The core specification leaves this=
<br>unspecified. There could be many different ways that the AS and RS <br>=
collaborate to validate signatures in messages received from the client.<br=
><br>2) Regarding (symmetric) key distribution, dont we need some kind of <=
br>existing trust relationship between the client and AS to make this <br>p=
ossible? I guess it<br>would be enough to require use of a "confidential" c=
lient, that would <br>make it possible for the two parties to agree on a se=
ssion key at the <br>point where an access token<br>is&nbsp; issued by the =
AS.<br><br>3) I think do need an MTI key distribution protocol as part of t=
he <br>specification, leaving that as a choice would hurt interoperability.=
<br><br>- prateek<br><br>&gt; Here are my notes.<br>&gt;<br>&gt; Participan=
ts:<br>&gt;<br>&gt; * John Bradley<br>&gt; * Derek
 Atkins<br>&gt; * Phil Hunt<br>&gt; * Prateek Mishra<br>&gt; * Hannes Tscho=
fenig<br>&gt; * Mike Jones<br>&gt; * Antonio Sanso<br>&gt; * Justin Richer<=
br>&gt;<br>&gt; Notes:<br>&gt;<br>&gt; My slides are available here: http:/=
/www.tschofenig.priv.at/OAuth2-Security-11Feb2013.ppt<br>&gt;<br>&gt; Slide=
 #2 summarizes earlier discussions during the conference calls.<br>&gt;<br>=
&gt; -- HTTP vs. JSON<br>&gt;<br>&gt; Phil noted that he does not like to u=
se the MAC Token draft as a starting point because it does not re-use any o=
f the work done in the JOSE working group and in particular all the librari=
es that are available today. He mentioned that earlier attempts to write th=
e MAC Token code lead to problems for implementers.<br>&gt;<br>&gt; Justin =
responded that he does not agree with using JSON as a transport mechanism s=
ince this would replicate a SOAP style.<br>&gt;<br>&gt; Phil noted that he =
wants to send JSON but the signature shall be computed over the HTTP
 header field.<br>&gt;<br>&gt; -- Flexibility for the keyed message digest =
computation<br>&gt;<br>&gt;&nbsp; From earlier discussion it was clear that=
 the conference call participants wanted more flexibility regarding the key=
ed message digest computation. For this purpose Hannes presented the DKIM b=
ased approach, which allows selective header fields to be included in the d=
igest. This is shown in slide #4.<br>&gt;<br>&gt; After some discussion the=
 conference call participants thought that this would meet their needs. Fur=
ther investigations would still be useful to determine the degree of failed=
 HMAC calculations due to HTTP proxies modifying the content.<br>&gt;<br>&g=
t; -- Key Distribution<br>&gt;<br>&gt; Hannes presented the open issue rega=
rding the choice of key distribution. Slides #6-#8 present three techniques=
 and Hannes asked for feedback regarding the preferred style. Justin and ot=
hers didn't see the need to decide on one mechanism - they wanted to
 keep the choice open. Derek indicated that this will not be an acceptable =
approach. Since the resource server and the authorization server may, in th=
e OAuth 2.0 framework, be entities produced by different vendors there is a=
n interoperability need. Justin responded that he disagrees and that the re=
source server needs to understand the access token and referred to the rece=
nt draft submission for the token introspection endpoint. Derek indicated t=
hat the resource server has to understand the content of the access token a=
nd the token introspection endpoint just pushes the problem around: the res=
ource server has to send the access token to the authorization server and t=
hen the resource server gets the result back (which he then<br>&nbsp; a<br>=
&gt;&nbsp;  gain needs to understand) in order to make a meaningful authori=
zation decision.<br>&gt;<br>&gt; Everyone agreed that the client must recei=
ve the session key from the authorization server and that this
 approach has to be standardized. It was also agreed that this is a common =
approach among all three key distribution mechanisms.<br>&gt;<br>&gt; Hanne=
s asked the participants to think about their preference.<br>&gt;<br>&gt; T=
he questions regarding key naming and the indication for the intended resou=
rce server the client wants to talk to have been postponed.<br>&gt;&nbsp;  =
<br>&gt; Ciao<br>&gt; Hannes<br>&gt;<br>&gt;<br>&gt; ______________________=
_________________________<br>&gt; OAuth mailing list<br>&gt; <a ymailto=3D"=
mailto:OAuth@ietf.org" href=3D"mailto:OAuth@ietf.org">OAuth@ietf.org</a><br=
>&gt; <a href=3D"https://www.ietf.org/mailman/listinfo/oauth" target=3D"_bl=
ank">https://www.ietf.org/mailman/listinfo/oauth</a><br><br><br>___________=
____________________________________<br>OAuth mailing list<br><a ymailto=3D=
"mailto:OAuth@ietf.org" href=3D"mailto:OAuth@ietf.org">OAuth@ietf.org</a><b=
r><a href=3D"https://www.ietf.org/mailman/listinfo/oauth"
 target=3D"_blank">https://www.ietf.org/mailman/listinfo/oauth</a><br><br><=
br> </div> </div>  </div></body></html>
---551393103-99213868-1360820484=:70102--

From hannes.tschofenig@gmx.net  Wed Feb 13 23:45:45 2013
Return-Path: <hannes.tschofenig@gmx.net>
X-Original-To: oauth@ietfa.amsl.com
Delivered-To: oauth@ietfa.amsl.com
Received: from localhost (localhost [127.0.0.1]) by ietfa.amsl.com (Postfix) with ESMTP id 0F8DF21F8871 for <oauth@ietfa.amsl.com>; Wed, 13 Feb 2013 23:45:45 -0800 (PST)
X-Virus-Scanned: amavisd-new at amsl.com
X-Spam-Flag: NO
X-Spam-Score: -100.77
X-Spam-Level: 
X-Spam-Status: No, score=-100.77 tagged_above=-999 required=5 tests=[AWL=-0.750, BAYES_00=-2.599, RCVD_IN_BL_SPAMCOP_NET=1.96, RCVD_IN_SORBS_WEB=0.619, USER_IN_WHITELIST=-100]
Received: from mail.ietf.org ([64.170.98.30]) by localhost (ietfa.amsl.com [127.0.0.1]) (amavisd-new, port 10024) with ESMTP id VXYlWV0ivQID for <oauth@ietfa.amsl.com>; Wed, 13 Feb 2013 23:45:44 -0800 (PST)
Received: from mout.gmx.net (mout.gmx.net [212.227.15.18]) by ietfa.amsl.com (Postfix) with ESMTP id 03E3221F886D for <oauth@ietf.org>; Wed, 13 Feb 2013 23:45:43 -0800 (PST)
Received: from mailout-de.gmx.net ([10.1.76.27]) by mrigmx.server.lan (mrigmx001) with ESMTP (Nemesis) id 0Lflzw-1UhjES3wGA-00pOXi for <oauth@ietf.org>; Thu, 14 Feb 2013 08:45:42 +0100
Received: (qmail invoked by alias); 14 Feb 2013 07:45:42 -0000
Received: from unknown (EHLO [10.255.133.10]) [194.251.119.201] by mail.gmx.net (mp027) with SMTP; 14 Feb 2013 08:45:42 +0100
X-Authenticated: #29516787
X-Provags-ID: V01U2FsdGVkX18M0/tkvTgMTy4Wx95kJkCVsCXYDx4mJX1Mj7SU5b NxY+qY1JCtUhT+
Mime-Version: 1.0 (Apple Message framework v1085)
Content-Type: text/plain; charset=us-ascii
From: Hannes Tschofenig <hannes.tschofenig@gmx.net>
In-Reply-To: <511BBBAC.9060502@oracle.com>
Date: Thu, 14 Feb 2013 09:45:38 +0200
Content-Transfer-Encoding: quoted-printable
Message-Id: <0DF3F088-7F15-4C0F-85C4-35DE80CB01E0@gmx.net>
References: <0573984A-8C11-4960-9BC6-F44D4B664C19@gmx.net> <511BBBAC.9060502@oracle.com>
To: Prateek Mishra <prateek.mishra@oracle.com>
X-Mailer: Apple Mail (2.1085)
X-Y-GMX-Trusted: 0
Cc: oauth@ietf.org
Subject: Re: [OAUTH-WG] Minutes from the OAuth Design Team Conference Call - 11th February 2013
X-BeenThere: oauth@ietf.org
X-Mailman-Version: 2.1.12
Precedence: list
List-Id: OAUTH WG <oauth.ietf.org>
List-Unsubscribe: <https://www.ietf.org/mailman/options/oauth>, <mailto:oauth-request@ietf.org?subject=unsubscribe>
List-Archive: <http://www.ietf.org/mail-archive/web/oauth>
List-Post: <mailto:oauth@ietf.org>
List-Help: <mailto:oauth-request@ietf.org?subject=help>
List-Subscribe: <https://www.ietf.org/mailman/listinfo/oauth>, <mailto:oauth-request@ietf.org?subject=subscribe>
X-List-Received-Date: Thu, 14 Feb 2013 07:45:45 -0000

Hi Prateek,=20


thanks for your questions.=20


On Feb 13, 2013, at 6:13 PM, Prateek Mishra wrote:

> Hannes,
>=20
> 1) Its not clear to me that we need  to specify exchanges between the =
AS and the RS as part of this work. The core specification leaves this
> unspecified. There could be many different ways that the AS and RS =
collaborate to validate signatures in messages received from the client.

It depends what the group wants to accomplish. So far, I thought that =
the goal was to offer the ability to provide a sufficient description in =
our specifications so that the authorization server and the resource =
server can be provided by different vendors and that they still =
interoperate.=20

The group may have changed their mind in the meanwhile.=20

What is your view?=20

>=20
> 2) Regarding (symmetric) key distribution, dont we need some kind of =
existing trust relationship between the client and AS to make this =
possible? I guess it
> would be enough to require use of a "confidential" client, that would =
make it possible for the two parties to agree on a session key at the =
point where an access token
> is  issued by the AS.

That's a very good question. I have not formed an option about this =
issue yet particularly given the recent capability to dynamically =
register clients.


>=20
> 3) I think do need an MTI key distribution protocol as part of the =
specification, leaving that as a choice would hurt interoperability.

That's my impression as well. =20

Ciao
Hannes

>=20
> - prateek
>=20
>> Here are my notes.
>>=20
>> Participants:
>>=20
>> * John Bradley
>> * Derek Atkins
>> * Phil Hunt
>> * Prateek Mishra
>> * Hannes Tschofenig
>> * Mike Jones
>> * Antonio Sanso
>> * Justin Richer
>>=20
>> Notes:
>>=20
>> My slides are available here: =
http://www.tschofenig.priv.at/OAuth2-Security-11Feb2013.ppt
>>=20
>> Slide #2 summarizes earlier discussions during the conference calls.
>>=20
>> -- HTTP vs. JSON
>>=20
>> Phil noted that he does not like to use the MAC Token draft as a =
starting point because it does not re-use any of the work done in the =
JOSE working group and in particular all the libraries that are =
available today. He mentioned that earlier attempts to write the MAC =
Token code lead to problems for implementers.
>>=20
>> Justin responded that he does not agree with using JSON as a =
transport mechanism since this would replicate a SOAP style.
>>=20
>> Phil noted that he wants to send JSON but the signature shall be =
computed over the HTTP header field.
>>=20
>> -- Flexibility for the keyed message digest computation
>>=20
>> =46rom earlier discussion it was clear that the conference call =
participants wanted more flexibility regarding the keyed message digest =
computation. For this purpose Hannes presented the DKIM based approach, =
which allows selective header fields to be included in the digest. This =
is shown in slide #4.
>>=20
>> After some discussion the conference call participants thought that =
this would meet their needs. Further investigations would still be =
useful to determine the degree of failed HMAC calculations due to HTTP =
proxies modifying the content.
>>=20
>> -- Key Distribution
>>=20
>> Hannes presented the open issue regarding the choice of key =
distribution. Slides #6-#8 present three techniques and Hannes asked for =
feedback regarding the preferred style. Justin and others didn't see the =
need to decide on one mechanism - they wanted to keep the choice open. =
Derek indicated that this will not be an acceptable approach. Since the =
resource server and the authorization server may, in the OAuth 2.0 =
framework, be entities produced by different vendors there is an =
interoperability need. Justin responded that he disagrees and that the =
resource server needs to understand the access token and referred to the =
recent draft submission for the token introspection endpoint. Derek =
indicated that the resource server has to understand the content of the =
access token and the token introspection endpoint just pushes the =
problem around: the resource server has to send the access token to the =
authorization server and then the resource server gets the result back =
(which he then a
>>  gain needs to understand) in order to make a meaningful =
authorization decision.
>>=20
>> Everyone agreed that the client must receive the session key from the =
authorization server and that this approach has to be standardized. It =
was also agreed that this is a common approach among all three key =
distribution mechanisms.
>>=20
>> Hannes asked the participants to think about their preference.
>>=20
>> The questions regarding key naming and the indication for the =
intended resource server the client wants to talk to have been =
postponed.
>>  Ciao
>> Hannes
>>=20
>>=20
>> _______________________________________________
>> OAuth mailing list
>> OAuth@ietf.org
>> https://www.ietf.org/mailman/listinfo/oauth
>=20
>=20


From sberyozkin@gmail.com  Thu Feb 14 02:32:16 2013
Return-Path: <sberyozkin@gmail.com>
X-Original-To: oauth@ietfa.amsl.com
Delivered-To: oauth@ietfa.amsl.com
Received: from localhost (localhost [127.0.0.1]) by ietfa.amsl.com (Postfix) with ESMTP id 072D321F8461 for <oauth@ietfa.amsl.com>; Thu, 14 Feb 2013 02:32:16 -0800 (PST)
X-Virus-Scanned: amavisd-new at amsl.com
X-Spam-Flag: NO
X-Spam-Score: -3.362
X-Spam-Level: 
X-Spam-Status: No, score=-3.362 tagged_above=-999 required=5 tests=[AWL=0.237,  BAYES_00=-2.599, RCVD_IN_DNSWL_LOW=-1]
Received: from mail.ietf.org ([64.170.98.30]) by localhost (ietfa.amsl.com [127.0.0.1]) (amavisd-new, port 10024) with ESMTP id 2nNCaIV9hWOm for <oauth@ietfa.amsl.com>; Thu, 14 Feb 2013 02:32:15 -0800 (PST)
Received: from mail-ea0-f176.google.com (mail-ea0-f176.google.com [209.85.215.176]) by ietfa.amsl.com (Postfix) with ESMTP id 1DFD321F87AA for <oauth@ietf.org>; Thu, 14 Feb 2013 02:32:14 -0800 (PST)
Received: by mail-ea0-f176.google.com with SMTP id a13so887268eaa.21 for <oauth@ietf.org>; Thu, 14 Feb 2013 02:32:14 -0800 (PST)
DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=gmail.com; s=20120113; h=x-received:message-id:date:from:user-agent:mime-version:to:subject :references:in-reply-to:content-type:content-transfer-encoding; bh=VAHctCwNpt7Z4I3vWNc97zhfqQfVBK8Zg1YrRwE64og=; b=mw0bR8UdsVkjsaEpb4VTCKGNuB/24VoYE10dCsjwXy/GWINW2qTajPW5Uk3TgSsP4c UruZV25FGhAkBLl1FGvPJ+Fqj0zjjeCu0NpjWF4XvHY1j8eQOa3u/Sj4IZggZWBvVt7A rPb94GOVEKUKeoFa2q2YL5u/zWJadCdouF0YgzIqgFa5sbDqwGSdDWJV+ypTbrFiVuT2 3TAEAfziB/YjWklcaVvA1s1c2IthsfyntNA8LiuZPo1wiufhr7b5+fwXL48flbGv+7/p 7nafDdELNOKu2BtKccMq1e5j2hMZJJ0IriTC8vy769wBUmuk+rZ/BFtwcO4Hmrx2yjXE gb7A==
X-Received: by 10.14.200.137 with SMTP id z9mr86312886een.20.1360837934168; Thu, 14 Feb 2013 02:32:14 -0800 (PST)
Received: from [192.168.2.5] ([89.100.138.67]) by mx.google.com with ESMTPS id o3sm77762703eem.15.2013.02.14.02.32.12 (version=TLSv1 cipher=ECDHE-RSA-RC4-SHA bits=128/128); Thu, 14 Feb 2013 02:32:13 -0800 (PST)
Message-ID: <511CBD2B.3080000@gmail.com>
Date: Thu, 14 Feb 2013 10:32:11 +0000
From: Sergey Beryozkin <sberyozkin@gmail.com>
User-Agent: Mozilla/5.0 (X11; Linux x86_64; rv:12.0) Gecko/20120430 Thunderbird/12.0.1
MIME-Version: 1.0
To: oauth@ietf.org
References: <20130213221326.3987.20729.idtracker@ietfa.amsl.com> <511C1155.6050709@lodderstedt.net>
In-Reply-To: <511C1155.6050709@lodderstedt.net>
Content-Type: text/plain; charset=ISO-8859-1; format=flowed
Content-Transfer-Encoding: 7bit
Subject: Re: [OAUTH-WG] I-D Action: draft-ietf-oauth-revocation-05.txt
X-BeenThere: oauth@ietf.org
X-Mailman-Version: 2.1.12
Precedence: list
List-Id: OAUTH WG <oauth.ietf.org>
List-Unsubscribe: <https://www.ietf.org/mailman/options/oauth>, <mailto:oauth-request@ietf.org?subject=unsubscribe>
List-Archive: <http://www.ietf.org/mail-archive/web/oauth>
List-Post: <mailto:oauth@ietf.org>
List-Help: <mailto:oauth-request@ietf.org?subject=help>
List-Subscribe: <https://www.ietf.org/mailman/listinfo/oauth>, <mailto:oauth-request@ietf.org?subject=subscribe>
X-List-Received-Date: Thu, 14 Feb 2013 10:32:16 -0000

Hi
On 13/02/13 22:19, Torsten Lodderstedt wrote:
> Hi all,
>
> I just published a new revision, which should cover all the issues
> raised/dicussed during WGLC.
>
> I applied the following changes:
> - introduced a new parameter "token_type_hint", which a client may use
> to give the authorization server a hint about the type of the token to
> be revoked
> - replaced "authorization" by "authorization grant"
> - an attempt to revoke an invalid token is now handled like a successful
> revocation request (status code 200)
Does it create some precedent, meaning that while people suggest using 
4xx statuses to indicate different sort of failures in this case 200 is 
returned, to eliminate a potential security attack. I mean, should it 
become the recommended practice ?

For example, in the discussion about DELETE, should it be 204 that is 
returned all the time ?

Sergey
> - CORS is now a MAY instead of SHOULD
> - extended description of how developer/client may obtain endpoint location
> - Improved wording regarding expected client behavior after sucessful
> processing of the revocation request -> "The client must assume the
> revocation is immediate upon the return of the request."
> - Explanation of different policies and why having different server
> policies should not cause interop problems
> - aligned structure with core spec by introducing sub-sections for
> request and response
>
> regards,
> Torsten.
>
> Am 13.02.2013 23:13, schrieb internet-drafts@ietf.org:
>> A New Internet-Draft is available from the on-line Internet-Drafts
>> directories.
>> This draft is a work item of the Web Authorization Protocol Working
>> Group of the IETF.
>>
>> Title : Token Revocation
>> Author(s) : Torsten Lodderstedt
>> Stefanie Dronia
>> Marius Scurtescu
>> Filename : draft-ietf-oauth-revocation-05.txt
>> Pages : 9
>> Date : 2013-02-13
>>
>> Abstract:
>> This document proposes an additional endpoint for OAuth authorization
>> servers, which allows clients to notify the authorization server that
>> a previously obtained refresh or access token is no longer needed.
>> This allows the authorization server to cleanup security credentials.
>> A revocation request will invalidate the actual token and, if
>> applicable, other tokens based on the same authorization grant.
>>
>>
>>
>> The IETF datatracker status page for this draft is:
>> https://datatracker.ietf.org/doc/draft-ietf-oauth-revocation
>>
>> There's also a htmlized version available at:
>> http://tools.ietf.org/html/draft-ietf-oauth-revocation-05
>>
>> A diff from the previous version is available at:
>> http://www.ietf.org/rfcdiff?url2=draft-ietf-oauth-revocation-05
>>
>>
>> Internet-Drafts are also available by anonymous FTP at:
>> ftp://ftp.ietf.org/internet-drafts/
>>
>> _______________________________________________
>> OAuth mailing list
>> OAuth@ietf.org
>> https://www.ietf.org/mailman/listinfo/oauth
>
> _______________________________________________
> OAuth mailing list
> OAuth@ietf.org
> https://www.ietf.org/mailman/listinfo/oauth



From prabath@wso2.com  Thu Feb 14 03:59:55 2013
Return-Path: <prabath@wso2.com>
X-Original-To: oauth@ietfa.amsl.com
Delivered-To: oauth@ietfa.amsl.com
Received: from localhost (localhost [127.0.0.1]) by ietfa.amsl.com (Postfix) with ESMTP id 3FE7421F84DC for <oauth@ietfa.amsl.com>; Thu, 14 Feb 2013 03:59:55 -0800 (PST)
X-Virus-Scanned: amavisd-new at amsl.com
X-Spam-Flag: NO
X-Spam-Score: -2.585
X-Spam-Level: 
X-Spam-Status: No, score=-2.585 tagged_above=-999 required=5 tests=[AWL=0.391,  BAYES_00=-2.599, FM_FORGED_GMAIL=0.622, HTML_MESSAGE=0.001, RCVD_IN_DNSWL_LOW=-1]
Received: from mail.ietf.org ([64.170.98.30]) by localhost (ietfa.amsl.com [127.0.0.1]) (amavisd-new, port 10024) with ESMTP id KIcVO+BKxJD3 for <oauth@ietfa.amsl.com>; Thu, 14 Feb 2013 03:59:52 -0800 (PST)
Received: from mail-ea0-f178.google.com (mail-ea0-f178.google.com [209.85.215.178]) by ietfa.amsl.com (Postfix) with ESMTP id E5C6721F84B9 for <oauth@ietf.org>; Thu, 14 Feb 2013 03:59:51 -0800 (PST)
Received: by mail-ea0-f178.google.com with SMTP id a14so985727eaa.37 for <oauth@ietf.org>; Thu, 14 Feb 2013 03:59:50 -0800 (PST)
X-Google-DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=google.com; s=20120113; h=mime-version:x-received:in-reply-to:references:date:message-id :subject:from:to:cc:content-type:x-gm-message-state; bh=rnCJrVEi2WYEU1CdsSBb5u5tZ+lZ9ogji5VAvuel/N8=; b=G5aF/kHXvwTurVAdDlvIpdCNIdf3n5hfVqIeLJXtGUIgGfw0hqUdBycsIuF4w9uZmZ zifMymV2yeQ8ELodY2iqITvr2S+EqMsfhG0f173t3T97wx4DCO31Jw+06IAemWrYm4uH ZOirtfAZ0JdZToDo9oVtpDKY+7VaCDeYg4p3Sk5E9cFBWYDpx3RIK9lYI5eK/ik/JKBE 8MJc/lYpg6KMaL7eYCUUHHe7VuSALRgBrh1ywhUVzEv9pWjFfwy1EygxJuWIV9rf2OGb qkQCW6wtV8xIc4POPGjY0n/ivSIYlMSwEoW7CRenWRKBpGnUNB4Koa3hnqMubLj+sl1I e7Tg==
MIME-Version: 1.0
X-Received: by 10.14.215.193 with SMTP id e41mr18289520eep.32.1360843190598; Thu, 14 Feb 2013 03:59:50 -0800 (PST)
Received: by 10.223.37.77 with HTTP; Thu, 14 Feb 2013 03:59:50 -0800 (PST)
In-Reply-To: <CAJV9qO_Mr87NX=KZRqCsWasQ1FuvDNBw14eS-TcPf_KRJztQFg@mail.gmail.com>
References: <20130206192420.32698.21027.idtracker@ietfa.amsl.com> <5112AE0B.1080501@mitre.org> <CAJV9qO_8-4FowrXK=ae-+xMjiJFP04ryVMLQ8SGUH8kp3PHrLg@mail.gmail.com> <5113C3AA.1040701@mitre.org> <CAJV9qO8BVV57eAb5kUNes15AYOpUKqw5XWQswh-FJA=b1pPgSA@mail.gmail.com> <5113DDB2.7060805@mitre.org> <CAJV9qO_gM1oera9ae9sqh9n17e-ZLKuC2pmsZwhq-RmFcMyqHA@mail.gmail.com> <51196777.6000502@mitre.org> <CAJV9qO-5bWZbNUfCmaqYBQoy-qwNaSZFOsO9GL3CrbSejwVTzw@mail.gmail.com> <F6595A40-6B4E-4718-ABB5-694CA975C4DB@maymount.com> <511A5062.5010108@mitre.org> <CAJV9qO_Mr87NX=KZRqCsWasQ1FuvDNBw14eS-TcPf_KRJztQFg@mail.gmail.com>
Date: Thu, 14 Feb 2013 17:29:50 +0530
Message-ID: <CAJV9qO-71-sM6kXOB6Fb_bvVkDBQ5JBbs8E5X=f-K=iEmGezRA@mail.gmail.com>
From: Prabath Siriwardena <prabath@wso2.com>
To: Justin Richer <jricher@mitre.org>
Content-Type: multipart/alternative; boundary=e89a8f647ac3f87ae304d5adfea3
X-Gm-Message-State: ALoCoQmJentJRXfqjY6vpIAzLPjCwmC+axAvbobX7o+sB+GtuM5EFasZJDKaT6ek9/tIHEnAnwR8
Cc: "oauth@ietf.org" <oauth@ietf.org>
Subject: Re: [OAUTH-WG] Fwd: New Version Notification for draft-richer-oauth-introspection-02.txt
X-BeenThere: oauth@ietf.org
X-Mailman-Version: 2.1.12
Precedence: list
List-Id: OAUTH WG <oauth.ietf.org>
List-Unsubscribe: <https://www.ietf.org/mailman/options/oauth>, <mailto:oauth-request@ietf.org?subject=unsubscribe>
List-Archive: <http://www.ietf.org/mail-archive/web/oauth>
List-Post: <mailto:oauth@ietf.org>
List-Help: <mailto:oauth-request@ietf.org?subject=help>
List-Subscribe: <https://www.ietf.org/mailman/listinfo/oauth>, <mailto:oauth-request@ietf.org?subject=subscribe>
X-List-Received-Date: Thu, 14 Feb 2013 11:59:55 -0000

--e89a8f647ac3f87ae304d5adfea3
Content-Type: text/plain; charset=ISO-8859-1

I noticed that the latest Token Revocation draft [1] has introduced the
parameter "token_type_hint". I would suggest the same here, as that would
make what is meant by "valid" much clear..

[1]: http://tools.ietf.org/html/draft-ietf-oauth-revocation-05

Thanks & regards,
-Prabath

On Tue, Feb 12, 2013 at 9:35 PM, Prabath Siriwardena <prabath@wso2.com>wrote:

> Hi Justin,
>
> I doubt whether valid_token would make a difference..?
>
> My initial argument is what is the validation criteria..? Validation
> criteria depends on the token_type..
>
> If we are talking only about metadata - then I believe "revoked",
> "expired" would be more meaningful..
>
> Thanks & regards,
> -Prabath
>
>
> On Tue, Feb 12, 2013 at 7:53 PM, Justin Richer <jricher@mitre.org> wrote:
>
>>  OK, I can see the wisdom in changing this term.
>>
>> I picked "valid" because I wanted a simple "boolean" value that would
>> require no additional parsing or string-matching on the client's behalf,
>> and I'd like to stick with that. OAuth is built with the assumption that
>> clients need to be able to recover from invalid tokens at any stage, so I
>> think a simple yes/no is the right step here.
>>
>> That said, I think you're both right that "valid" seems to have caused a
>> bit of confusion. I don't want to go with "revoked" because I'd rather have
>> the "token is OK" be the positive boolean value.
>>
>> Would "valid_token" be more clear? Or do we need a different adjective
>> all together?
>>
>>  -- Justin
>>
>>
>> On 02/11/2013 08:02 PM, Richard Harrington wrote:
>>
>> Have you considered "status" instead of "valid"?  It could have values
>> like "active", "expired", and "revoked".
>>
>>  Is it worthwhile including the status of the client also?  For example,
>> a client application could be disabled, temporarily or permanently, and
>> thus disabling its access tokens as well.
>>
>>
>> On Feb 11, 2013, at 1:56 PM, Prabath Siriwardena <prabath@wso2.com>
>> wrote:
>>
>>  I guess confusion is with 'valid' parameter is in the response..
>>
>>  I thought this will be helpful to standardize the communication between
>> Resource Server and the Authorization Server..
>>
>>  I would suggest we completely remove "valid" from the response - or
>> define it much clearly..
>>
>>  May be can add "revoked" with a boolean attribute..
>>
>>  Thanks & regards,
>> -Prabath
>>
>> On Tue, Feb 12, 2013 at 3:19 AM, Justin Richer <jricher@mitre.org> wrote:
>>
>>>
>>> On 02/08/2013 12:51 AM, Prabath Siriwardena wrote:
>>>
>>> Hi Justin,
>>>
>>>  I have couple of questions related to "valid" parameter...
>>>
>>>  This endpoint can be invoked by the Resource Server in runtime...
>>>
>>>
>>> That's correct.
>>>
>>>
>>>
>>>  In that case what is exactly meant by the "resource_id" in request ?
>>>
>>>
>>>  The resource_id field is a service-specific string that basically lets
>>> the resource server provide some context to the request to the auth server.
>>> There have been some other suggestions like client IP address, but I wanted
>>> to put this one in because it seemed to be a common theme. The client is
>>> trying to do *something* with the token, after all, and the rights,
>>> permissions, and metadata associated with the token could change based on
>>> that. Since the Introspection endpoint is all about getting that metadata
>>> back to the PR, this seemed like a good idea.
>>>
>>>
>>>
>>>  IMO a token to be valid depends on set of criteria based on it's type..
>>>
>>>  For a Bearer token..
>>>
>>>  1. Token should not be expired
>>> 2. Token should not be revoked.
>>> 3. The scope the token issued should match with the scope required for
>>> the resource.
>>>
>>>  For a MAC token...
>>>
>>>  1. Token not expired (mac id)
>>> 2. Token should not be revoked
>>> 3. The scope the token issued should match with the scope required for
>>> the resource.
>>> 4. HMAC check should be valid
>>>
>>>  There are similar conditions for SAML bearer too..
>>>
>>>
>>>  This isn't really true. The SAML bearer token is fully self-contained
>>> and doesn't change based on other parameters in the message, unlike MAC.
>>> Same with JWT. When it hands a SAML or JWT token to the AS, the PR has
>>> given *everything* the server needs to check that token's validity and use.
>>>
>>> MAC signatures change with every message, and they're done across
>>> several components of the HTTP message. Therefor, the HMAC check for MAC
>>> style tokens will still need to be done by the protected resource.
>>> Introspection would help in the case that the signature validated just
>>> fine, but the token might have expired. Or you need to know what scopes
>>> apply. Introspection isn't to fully validate the call to the protected
>>> resource -- if that were the case, the PR would have to send some kind of
>>> encapsulated version of the original request. Otherwise, the AS won't have
>>> all of the information it needs to check the MAC.
>>>
>>>
>>> I think what you're describing is ultimately *not* what the
>>> introspection endpoint is intended to do. If that's unclear from the
>>> document, can you please suggest text that would help clear the use case
>>> up? I wouldn't want it to be ambiguous.
>>>
>>>  -- Justin
>>>
>>>
>>>
>>>  Thanks & regards,
>>> -Prabath
>>>
>>>
>>> On Thu, Feb 7, 2013 at 10:30 PM, Justin Richer <jricher@mitre.org>wrote:
>>>
>>>>  It validates the token, which would be either the token itself in the
>>>> case of Bearer or the token "id" part of something more complex like MAC.
>>>> It doesn't directly validate the usage of the token, that's still up to the
>>>> PR to do that.
>>>>
>>>> I nearly added a "token type" field in this draft, but held back
>>>> because there are several kinds of "token type" that people talk about in
>>>> OAuth. First, there's "Bearer" vs. "MAC" vs. "HOK", or what have you. Then
>>>> within Bearer you have "JWT" or "SAML" or "unstructured blob". Then you've
>>>> also got "access" vs. "refresh" and other flavors of token, like the
>>>> id_token in OpenID Connect.
>>>>
>>>> Thing is, the server running the introspection endpoint will probably
>>>> know *all* of these. But should it tell the client? If so, which of the
>>>> three, and what names should the fields be?
>>>>
>>>>  -- Justin
>>>>
>>>>
>>>> On 02/07/2013 11:26 AM, Prabath Siriwardena wrote:
>>>>
>>>> Okay.. I was thinking this could be used as a way to validate the token
>>>> as well. BTW even in this case shouldn't communicate the type of token to
>>>> AS? For example in the case of SAML profile - it could be SAML token..
>>>>
>>>>  Thanks & regards,
>>>> -Prabath
>>>>
>>>> On Thu, Feb 7, 2013 at 8:39 PM, Justin Richer <jricher@mitre.org>wrote:
>>>>
>>>>>  "valid" might not be the best term, but it's meant to be a field
>>>>> where the server says "yes this token is still good" or "no this token
>>>>> isn't good anymore". We could instead do this with HTTP codes or something
>>>>> but I went with a pure JSON response.
>>>>>
>>>>>  -- Justin
>>>>>
>>>>>
>>>>> On 02/06/2013 10:47 PM, Prabath Siriwardena wrote:
>>>>>
>>>>> Hi Justin,
>>>>>
>>>>>  I believe this is addressing one of the key missing part in OAuth
>>>>> 2.0...
>>>>>
>>>>>  One question - I guess this was discussed already...
>>>>>
>>>>>  In the spec - in the introspection response it has the attribute
>>>>> "valid" - this is basically the validity of the token provided in the
>>>>> request.
>>>>>
>>>>>  Validation criteria depends on the token and well as token type (
>>>>> Bearer, MAC..).
>>>>>
>>>>>  In the spec it seems like it's coupled with Bearer token type... But
>>>>> I guess, by adding "token_type" to the request we can remove this
>>>>> dependency.
>>>>>
>>>>>  WDYT..?
>>>>>
>>>>>  Thanks & regards,
>>>>> -Prabath
>>>>>
>>>>> On Thu, Feb 7, 2013 at 12:54 AM, Justin Richer <jricher@mitre.org>wrote:
>>>>>
>>>>>>  Updated introspection draft based on recent comments. Changes
>>>>>> include:
>>>>>>
>>>>>>  - "scope" return parameter now follows RFC6749 format instead of
>>>>>> JSON array
>>>>>>  - "subject" -> "sub", and "audience" -> "aud", to be parallel with
>>>>>> JWT claims
>>>>>>  - clarified what happens if the authentication is bad
>>>>>>
>>>>>>  -- Justin
>>>>>>
>>>>>>
>>>>>> -------- Original Message --------  Subject: New Version
>>>>>> Notification for draft-richer-oauth-introspection-02.txt  Date: Wed,
>>>>>> 6 Feb 2013 11:24:20 -0800  From: <internet-drafts@ietf.org><internet-drafts@ietf.org>  To:
>>>>>> <jricher@mitre.org> <jricher@mitre.org>
>>>>>>
>>>>>> A new version of I-D, draft-richer-oauth-introspection-02.txt
>>>>>> has been successfully submitted by Justin Richer and posted to the
>>>>>> IETF repository.
>>>>>>
>>>>>> Filename:	 draft-richer-oauth-introspection
>>>>>> Revision:	 02
>>>>>> Title:		 OAuth Token Introspection
>>>>>> Creation date:	 2013-02-06
>>>>>> WG ID:		 Individual Submission
>>>>>> Number of pages: 6
>>>>>> URL:             http://www.ietf.org/internet-drafts/draft-richer-oauth-introspection-02.txt
>>>>>> Status:          http://datatracker.ietf.org/doc/draft-richer-oauth-introspection
>>>>>> Htmlized:        http://tools.ietf.org/html/draft-richer-oauth-introspection-02
>>>>>> Diff:            http://www.ietf.org/rfcdiff?url2=draft-richer-oauth-introspection-02
>>>>>>
>>>>>> Abstract:
>>>>>>    This specification defines a method for a client or protected
>>>>>>    resource to query an OAuth authorization server to determine meta-
>>>>>>    information about an OAuth token.
>>>>>>
>>>>>>
>>>>>>
>>>>>>
>>>>>>
>>>>>> The IETF Secretariat
>>>>>>
>>>>>>
>>>>>>
>>>>>>
>>>>>>
>>>>>> _______________________________________________
>>>>>> OAuth mailing list
>>>>>> OAuth@ietf.org
>>>>>> https://www.ietf.org/mailman/listinfo/oauth
>>>>>>
>>>>>>
>>>>>
>>>>>
>>>>>  --
>>>>> Thanks & Regards,
>>>>> Prabath
>>>>>
>>>>>  Mobile : +94 71 809 6732
>>>>>
>>>>> http://blog.facilelogin.com
>>>>> http://RampartFAQ.com
>>>>>
>>>>>
>>>>>
>>>>
>>>>
>>>>  --
>>>> Thanks & Regards,
>>>> Prabath
>>>>
>>>>  Mobile : +94 71 809 6732 <%2B94%2071%20809%206732>
>>>>
>>>> http://blog.facilelogin.com
>>>> http://RampartFAQ.com
>>>>
>>>>
>>>>
>>>
>>>
>>>  --
>>> Thanks & Regards,
>>> Prabath
>>>
>>>  Mobile : +94 71 809 6732 <%2B94%2071%20809%206732>
>>>
>>> http://blog.facilelogin.com
>>> http://RampartFAQ.com
>>>
>>>
>>>
>>
>>
>>  --
>> Thanks & Regards,
>> Prabath
>>
>>  Mobile : +94 71 809 6732
>>
>> http://blog.facilelogin.com
>> http://RampartFAQ.com
>>
>>  _______________________________________________
>> OAuth mailing list
>> OAuth@ietf.org
>> https://www.ietf.org/mailman/listinfo/oauth
>>
>>
>>
>
>
> --
> Thanks & Regards,
> Prabath
>
> Mobile : +94 71 809 6732
>
> http://blog.facilelogin.com
> http://RampartFAQ.com
>



-- 
Thanks & Regards,
Prabath

Mobile : +94 71 809 6732

http://blog.facilelogin.com
http://RampartFAQ.com

--e89a8f647ac3f87ae304d5adfea3
Content-Type: text/html; charset=ISO-8859-1
Content-Transfer-Encoding: quoted-printable

I noticed that the latest Token Revocation draft [1] has introduced the par=
ameter &quot;token_type_hint&quot;. I would suggest the same here, as that =
would make what is meant by &quot;valid&quot; much clear..<div><br></div>
<div>[1]:=A0<a href=3D"http://tools.ietf.org/html/draft-ietf-oauth-revocati=
on-05" target=3D"_blank" style=3D"color:rgb(17,85,204);font-family:arial,sa=
ns-serif;font-size:12.727272033691406px;background-color:rgb(255,255,255)">=
http://tools.ietf.org/html/draft-ietf-oauth-revocation-05</a></div>
<div><br></div><div>Thanks &amp; regards,</div><div>-Prabath<br><br><div cl=
ass=3D"gmail_quote">On Tue, Feb 12, 2013 at 9:35 PM, Prabath Siriwardena <s=
pan dir=3D"ltr">&lt;<a href=3D"mailto:prabath@wso2.com" target=3D"_blank">p=
rabath@wso2.com</a>&gt;</span> wrote:<br>
<blockquote class=3D"gmail_quote" style=3D"margin:0 0 0 .8ex;border-left:1p=
x #ccc solid;padding-left:1ex">Hi Justin,<div><br></div><div>I doubt whethe=
r valid_token would make a difference..?</div><div><br></div><div>My initia=
l argument is what is the validation criteria..? Validation criteria depend=
s on the token_type..</div>
<div>
<br></div><div>If we are talking only about metadata - then I believe &quot=
;revoked&quot;, &quot;expired&quot; would be more meaningful..</div><div><b=
r></div><div>Thanks &amp; regards,</div><div>-Prabath<div><div class=3D"h5"=
>
<br><br><div class=3D"gmail_quote">
On Tue, Feb 12, 2013 at 7:53 PM, Justin Richer <span dir=3D"ltr">&lt;<a hre=
f=3D"mailto:jricher@mitre.org" target=3D"_blank">jricher@mitre.org</a>&gt;<=
/span> wrote:<br><blockquote class=3D"gmail_quote" style=3D"margin:0 0 0 .8=
ex;border-left:1px #ccc solid;padding-left:1ex">


 =20
   =20
 =20
  <div bgcolor=3D"#FFFFFF" text=3D"#000000">
    OK, I can see the wisdom in changing this term. <br>
    <br>
    I picked &quot;valid&quot; because I wanted a simple &quot;boolean&quot=
; value that
    would require no additional parsing or string-matching on the
    client&#39;s behalf, and I&#39;d like to stick with that. OAuth is buil=
t
    with the assumption that clients need to be able to recover from
    invalid tokens at any stage, so I think a simple yes/no is the right
    step here. <br>
    <br>
    That said, I think you&#39;re both right that &quot;valid&quot; seems t=
o have
    caused a bit of confusion. I don&#39;t want to go with &quot;revoked&qu=
ot; because
    I&#39;d rather have the &quot;token is OK&quot; be the positive boolean=
 value. <br>
    <br>
    Would &quot;valid_token&quot; be more clear? Or do we need a different
    adjective all together?<span><font color=3D"#888888"><br>
    <br>
    =A0-- Justin</font></span><div><div><br>
    <br>
    <div>On 02/11/2013 08:02 PM, Richard
      Harrington wrote:<br>
    </div>
    <blockquote type=3D"cite">
     =20
      <div>Have you considered &quot;status&quot; instead of &quot;valid&qu=
ot;? =A0It could
        have values like &quot;active&quot;, &quot;expired&quot;, and &quot=
;revoked&quot;.</div>
      <div><br>
      </div>
      <div>Is it worthwhile including the status of the client also?
        =A0For example, a client application could be disabled,
        temporarily or permanently, and thus disabling its access tokens
        as well.</div>
      <div><br>
      </div>
      <div><br>
        On Feb 11, 2013, at 1:56 PM, Prabath Siriwardena &lt;<a href=3D"mai=
lto:prabath@wso2.com" target=3D"_blank">prabath@wso2.com</a>&gt;
        wrote:<br>
        <br>
      </div>
      <blockquote type=3D"cite">
        <div>I guess confusion is with &#39;valid&#39; parameter is in the
          response..
          <div><br>
          </div>
          <div>I thought this will be helpful to=A0standardize=A0the
            communication between Resource Server and the Authorization
            Server..</div>
          <div><br>
          </div>
          <div>I would suggest we completely remove &quot;valid&quot; from =
the
            response - or define it much clearly..</div>
          <div><br>
          </div>
          <div>May be can add &quot;revoked&quot; with a boolean attribute.=
.</div>
          <div><br>
          </div>
          <div>Thanks &amp; regards,</div>
          <div>-Prabath<br>
            <br>
            <div class=3D"gmail_quote">On Tue, Feb 12, 2013 at 3:19 AM,
              Justin Richer <span dir=3D"ltr">&lt;<a href=3D"mailto:jricher=
@mitre.org" target=3D"_blank">jricher@mitre.org</a>&gt;</span>
              wrote:<br>
              <blockquote class=3D"gmail_quote" style=3D"margin:0 0 0 .8ex;=
border-left:1px #ccc solid;padding-left:1ex">
                <div bgcolor=3D"#FFFFFF" text=3D"#000000">
                  <div> <br>
                    <div>On 02/08/2013 12:51 AM, Prabath Siriwardena
                      wrote:<br>
                    </div>
                  </div>
                  <blockquote type=3D"cite"> Hi=A0Justin,
                    <div><br>
                    </div>
                    <div>
                      <div>I have couple of questions related to &quot;vali=
d&quot;
                        parameter...</div>
                      <div><br>
                      </div>
                      <div>This endpoint can be invoked by the Resource
                        Server in runtime...</div>
                    </div>
                  </blockquote>
                  <br>
                  That&#39;s correct.
                  <div><br>
                    <br>
                    <blockquote type=3D"cite">
                      <div><br>
                      </div>
                      <div>In that case what is exactly meant by the
                        &quot;resource_id&quot; in request ?</div>
                    </blockquote>
                    <br>
                  </div>
                  The resource_id field is a service-specific string
                  that basically lets the resource server provide some
                  context to the request to the auth server. There have
                  been some other suggestions like client IP address,
                  but I wanted to put this one in because it seemed to
                  be a common theme. The client is trying to do
                  *something* with the token, after all, and the rights,
                  permissions, and metadata associated with the token
                  could change based on that. Since the Introspection
                  endpoint is all about getting that metadata back to
                  the PR, this seemed like a good idea.
                  <div><br>
                    <br>
                    <blockquote type=3D"cite">
                      <div><br>
                      </div>
                      <div>IMO a token to be valid depends on set of
                        criteria based on it&#39;s type..</div>
                      <div><br>
                      </div>
                      <div>For a Bearer token..</div>
                      <div><br>
                      </div>
                      <div>1. Token should not be expired</div>
                      <div>2. Token should not be revoked.</div>
                      <div>3. The scope the token issued should match
                        with the scope required for the resource.</div>
                      <div><br>
                      </div>
                      <div>For a MAC token...</div>
                      <div><br>
                      </div>
                      <div>1. Token not expired (mac id)</div>
                      <div>2. Token should not be revoked</div>
                      <div>3. The scope the token issued should match
                        with the scope required for the resource.</div>
                      <div>4. HMAC check should be valid</div>
                      <div><br>
                      </div>
                      There are similar conditions for SAML bearer too..</b=
lockquote>
                    <br>
                  </div>
                  This isn&#39;t really true. The SAML bearer token is full=
y
                  self-contained and doesn&#39;t change based on other
                  parameters in the message, unlike MAC. Same with JWT.
                  When it hands a SAML or JWT token to the AS, the PR
                  has given *everything* the server needs to check that
                  token&#39;s validity and use. <br>
                  <br>
                  MAC signatures change with every message, and they&#39;re
                  done across several components of the HTTP message.
                  Therefor, the HMAC check for MAC style tokens will
                  still need to be done by the protected resource.
                  Introspection would help in the case that the
                  signature validated just fine, but the token might
                  have expired. Or you need to know what scopes apply.
                  Introspection isn&#39;t to fully validate the call to the
                  protected resource -- if that were the case, the PR
                  would have to send some kind of encapsulated version
                  of the original request. Otherwise, the AS won&#39;t have
                  all of the information it needs to check the MAC.<br>
                  <br>
                  <br>
                  I think what you&#39;re describing is ultimately *not*
                  what the introspection endpoint is intended to do. If
                  that&#39;s unclear from the document, can you please
                  suggest text that would help clear the use case up? I
                  wouldn&#39;t want it to be ambiguous.<span><font color=3D=
"#888888"><br>
                      <br>
                      =A0-- Justin</font></span>
                  <div>
                    <div><br>
                      <br>
                      <blockquote type=3D"cite">
                        <div><br>
                        </div>
                        <div>Thanks &amp; regards,</div>
                        <div>-Prabath</div>
                        <div><br>
                        </div>
                        <div><br>
                          <div class=3D"gmail_quote">On Thu, Feb 7, 2013
                            at 10:30 PM, Justin Richer <span dir=3D"ltr">&l=
t;<a href=3D"mailto:jricher@mitre.org" target=3D"_blank">jricher@mitre.org<=
/a>&gt;</span>
                            wrote:<br>
                            <blockquote class=3D"gmail_quote" style=3D"marg=
in:0 0 0 .8ex;border-left:1px #ccc solid;padding-left:1ex">
                              <div bgcolor=3D"#FFFFFF" text=3D"#000000"> It
                                validates the token, which would be
                                either the token itself in the case of
                                Bearer or the token &quot;id&quot; part of
                                something more complex like MAC. It
                                doesn&#39;t directly validate the usage of
                                the token, that&#39;s still up to the PR to
                                do that.<br>
                                <br>
                                I nearly added a &quot;token type&quot; fie=
ld in
                                this draft, but held back because there
                                are several kinds of &quot;token type&quot;=
 that
                                people talk about in OAuth. First,
                                there&#39;s &quot;Bearer&quot; vs. &quot;MA=
C&quot; vs. &quot;HOK&quot;, or
                                what have you. Then within Bearer you
                                have &quot;JWT&quot; or &quot;SAML&quot; or=
 &quot;unstructured
                                blob&quot;. Then you&#39;ve also got &quot;=
access&quot; vs.
                                &quot;refresh&quot; and other flavors of to=
ken,
                                like the id_token in OpenID Connect. <br>
                                <br>
                                Thing is, the server running the
                                introspection endpoint will probably
                                know *all* of these. But should it tell
                                the client? If so, which of the three,
                                and what names should the fields be?<span><=
font color=3D"#888888"><br>
                                    <br>
                                    =A0-- Justin</font></span>
                                <div>
                                  <div><br>
                                    <br>
                                    <div>On 02/07/2013 11:26 AM, Prabath
                                      Siriwardena wrote:<br>
                                    </div>
                                    <blockquote type=3D"cite"> Okay.. I
                                      was thinking this could be used as
                                      a way to validate the token as
                                      well. BTW even in this case
                                      shouldn&#39;t communicate the type of
                                      token to AS? For example in the
                                      case of SAML profile - it could be
                                      SAML token..
                                      <div> <br>
                                      </div>
                                      <div>Thanks &amp; regards,</div>
                                      <div>-Prabath<br>
                                        <br>
                                        <div class=3D"gmail_quote">On Thu,
                                          Feb 7, 2013 at 8:39 PM, Justin
                                          Richer <span dir=3D"ltr">&lt;<a h=
ref=3D"mailto:jricher@mitre.org" target=3D"_blank">jricher@mitre.org</a>&gt=
;</span>
                                          wrote:<br>
                                          <blockquote class=3D"gmail_quote"=
 style=3D"margin:0 0 0 .8ex;border-left:1px #ccc solid;padding-left:1ex">
                                            <div bgcolor=3D"#FFFFFF" text=
=3D"#000000"> &quot;valid&quot;
                                              might not be the best
                                              term, but it&#39;s meant to b=
e
                                              a field where the server
                                              says &quot;yes this token is
                                              still good&quot; or &quot;no =
this
                                              token isn&#39;t good anymore&=
quot;.
                                              We could instead do this
                                              with HTTP codes or
                                              something but I went with
                                              a pure JSON response.<span><f=
ont color=3D"#888888"><br>
                                                  <br>
                                                  =A0-- Justin</font></span=
>
                                              <div>
                                                <div><br>
                                                  <br>
                                                  <div>On 02/06/2013
                                                    10:47 PM, Prabath
                                                    Siriwardena wrote:<br>
                                                  </div>
                                                  <blockquote type=3D"cite"=
> Hi
                                                    Justin,
                                                    <div><br>
                                                    </div>
                                                    <div>I believe this
                                                      is addressing one
                                                      of the key missing
                                                      part in OAuth
                                                      2.0...</div>
                                                    <div><br>
                                                    </div>
                                                    <div>One question -
                                                      I guess this was
                                                      discussed
                                                      already...</div>
                                                    <div><br>
                                                    </div>
                                                    <div>In the spec -
                                                      in the
                                                      introspection
                                                      response it has
                                                      the attribute
                                                      &quot;valid&quot; - t=
his is
                                                      basically the
                                                      validity of the
                                                      token provided in
                                                      the request.</div>
                                                    <div><br>
                                                    </div>
                                                    <div>Validation=A0crite=
ria
                                                      depends on the
                                                      token and well as
                                                      token type (
                                                      Bearer, MAC..).</div>
                                                    <div><br>
                                                    </div>
                                                    <div>In the spec it
                                                      seems like it&#39;s
                                                      coupled with
                                                      Bearer token
                                                      type... But I
                                                      guess, by adding
                                                      &quot;token_type&quot=
; to
                                                      the request we can
                                                      remove this
                                                      dependency.</div>
                                                    <div><br>
                                                    </div>
                                                    <div>WDYT..?</div>
                                                    <div><br>
                                                    </div>
                                                    <div>Thanks &amp;
                                                      regards,</div>
                                                    <div>-Prabath=A0</div>
                                                    <div><br>
                                                      <div class=3D"gmail_q=
uote">On
                                                        Thu, Feb 7, 2013
                                                        at 12:54 AM,
                                                        Justin Richer <span=
 dir=3D"ltr">&lt;<a href=3D"mailto:jricher@mitre.org" target=3D"_blank">jri=
cher@mitre.org</a>&gt;</span>
                                                        wrote:<br>
                                                        <blockquote class=
=3D"gmail_quote" style=3D"margin:0 0 0 .8ex;border-left:1px #ccc solid;padd=
ing-left:1ex">
                                                          <div bgcolor=3D"#=
FFFFFF" text=3D"#000000">
                                                          Updated
                                                          introspection
                                                          draft based on
                                                          recent
                                                          comments.
                                                          Changes
                                                          include:<br>
                                                          <br>
                                                          =A0- &quot;scope&=
quot;
                                                          return
                                                          parameter now
                                                          follows
                                                          RFC6749 format
                                                          instead of
                                                          JSON array<br>
                                                          =A0- &quot;subjec=
t&quot;
                                                          -&gt; &quot;sub&q=
uot;,
                                                          and &quot;audienc=
e&quot;
                                                          -&gt; &quot;aud&q=
uot;,
                                                          to be parallel
                                                          with JWT
                                                          claims<br>
                                                          =A0- clarified
                                                          what happens
                                                          if the
                                                          authentication
                                                          is bad<br>
                                                          <br>
                                                          =A0-- Justin<br>
                                                          <div><br>
                                                          <br>
                                                          --------
                                                          Original
                                                          Message
                                                          --------
                                                          <table border=3D"=
0" cellpadding=3D"0" cellspacing=3D"0">
                                                          <tbody>
                                                          <tr>
                                                          <th align=3D"RIGH=
T" nowrap valign=3D"BASELINE">Subject: </th>
                                                          <td>New
                                                          Version
                                                          Notification
                                                          for
                                                          draft-richer-oaut=
h-introspection-02.txt</td>
                                                          </tr>
                                                          <tr>
                                                          <th align=3D"RIGH=
T" nowrap valign=3D"BASELINE">Date: </th>
                                                          <td>Wed, 6 Feb
                                                          2013 11:24:20
                                                          -0800</td>
                                                          </tr>
                                                          <tr>
                                                          <th align=3D"RIGH=
T" nowrap valign=3D"BASELINE">From: </th>
                                                          <td><a href=3D"ma=
ilto:internet-drafts@ietf.org" target=3D"_blank">&lt;internet-drafts@ietf.o=
rg&gt;</a></td>
                                                          </tr>
                                                          <tr>
                                                          <th align=3D"RIGH=
T" nowrap valign=3D"BASELINE">To: </th>
                                                          <td><a href=3D"ma=
ilto:jricher@mitre.org" target=3D"_blank">&lt;jricher@mitre.org&gt;</a></td=
>
                                                          </tr>
                                                          </tbody>
                                                          </table>
                                                          <br>
                                                          <br>
                                                          <pre>A new versio=
n of I-D, draft-richer-oauth-introspection-02.txt
has been successfully submitted by Justin Richer and posted to the
IETF repository.

Filename:	 draft-richer-oauth-introspection
Revision:	 02
Title:		 OAuth Token Introspection
Creation date:	 2013-02-06
WG ID:		 Individual Submission
Number of pages: 6
URL:             <a href=3D"http://www.ietf.org/internet-drafts/draft-riche=
r-oauth-introspection-02.txt" target=3D"_blank">http://www.ietf.org/interne=
t-drafts/draft-richer-oauth-introspection-02.txt</a>
Status:          <a href=3D"http://datatracker.ietf.org/doc/draft-richer-oa=
uth-introspection" target=3D"_blank">http://datatracker.ietf.org/doc/draft-=
richer-oauth-introspection</a>
Htmlized:        <a href=3D"http://tools.ietf.org/html/draft-richer-oauth-i=
ntrospection-02" target=3D"_blank">http://tools.ietf.org/html/draft-richer-=
oauth-introspection-02</a>
Diff:            <a href=3D"http://www.ietf.org/rfcdiff?url2=3Ddraft-richer=
-oauth-introspection-02" target=3D"_blank">http://www.ietf.org/rfcdiff?url2=
=3Ddraft-richer-oauth-introspection-02</a>

Abstract:
   This specification defines a method for a client or protected
   resource to query an OAuth authorization server to determine meta-
   information about an OAuth token.


                                                                           =
      =20


The IETF Secretariat

</pre>
                                                          <br>
                                                          </div>
                                                          <br>
                                                          </div>
                                                          <br>
_______________________________________________<br>
                                                          OAuth mailing
                                                          list<br>
                                                          <a href=3D"mailto=
:OAuth@ietf.org" target=3D"_blank">OAuth@ietf.org</a><br>
                                                          <a href=3D"https:=
//www.ietf.org/mailman/listinfo/oauth" target=3D"_blank">https://www.ietf.o=
rg/mailman/listinfo/oauth</a><br>
                                                          <br>
                                                        </blockquote>
                                                      </div>
                                                      <br>
                                                      <br clear=3D"all">
                                                      <div><br>
                                                      </div>
                                                      -- <br>
                                                      Thanks &amp;
                                                      Regards,<br>
                                                      Prabath
                                                      <div><br>
                                                      </div>
                                                      <div>Mobile : <a href=
=3D"tel:%2B94%2071%20809%206732" value=3D"+94718096732" target=3D"_blank">+=
94 71 809 6732</a>=A0<br>
                                                        <br>
                                                        <a href=3D"http://b=
log.facilelogin.com" target=3D"_blank">http://blog.facilelogin.com</a><br>
                                                        <a href=3D"http://R=
ampartFAQ.com" target=3D"_blank">http://RampartFAQ.com</a></div>
                                                    </div>
                                                  </blockquote>
                                                  <br>
                                                </div>
                                              </div>
                                            </div>
                                          </blockquote>
                                        </div>
                                        <br>
                                        <br clear=3D"all">
                                        <div><br>
                                        </div>
                                        -- <br>
                                        Thanks &amp; Regards,<br>
                                        Prabath
                                        <div><br>
                                        </div>
                                        <div>Mobile : <a href=3D"tel:%2B94%=
2071%20809%206732" value=3D"+94718096732" target=3D"_blank">+94 71 809
                                            6732</a>=A0<br>
                                          <br>
                                          <a href=3D"http://blog.facilelogi=
n.com" target=3D"_blank">http://blog.facilelogin.com</a><br>
                                          <a href=3D"http://RampartFAQ.com"=
 target=3D"_blank">http://RampartFAQ.com</a></div>
                                      </div>
                                    </blockquote>
                                    <br>
                                  </div>
                                </div>
                              </div>
                            </blockquote>
                          </div>
                          <br>
                          <br clear=3D"all">
                          <div><br>
                          </div>
                          -- <br>
                          Thanks &amp; Regards,<br>
                          Prabath
                          <div><br>
                          </div>
                          <div>Mobile : <a href=3D"tel:%2B94%2071%20809%206=
732" value=3D"+94718096732" target=3D"_blank">+94
                              71 809 6732</a>=A0<br>
                            <br>
                            <a href=3D"http://blog.facilelogin.com" target=
=3D"_blank">http://blog.facilelogin.com</a><br>
                            <a href=3D"http://RampartFAQ.com" target=3D"_bl=
ank">http://RampartFAQ.com</a></div>
                        </div>
                      </blockquote>
                      <br>
                    </div>
                  </div>
                </div>
              </blockquote>
            </div>
            <br>
            <br clear=3D"all">
            <div><br>
            </div>
            -- <br>
            Thanks &amp; Regards,<br>
            Prabath
            <div><br>
            </div>
            <div>Mobile : <a href=3D"tel:%2B94%2071%20809%206732" value=3D"=
+94718096732" target=3D"_blank">+94 71 809 6732</a>=A0<br>
              <br>
              <a href=3D"http://blog.facilelogin.com" target=3D"_blank">htt=
p://blog.facilelogin.com</a><br>
              <a href=3D"http://RampartFAQ.com" target=3D"_blank">http://Ra=
mpartFAQ.com</a></div>
          </div>
        </div>
      </blockquote>
      <blockquote type=3D"cite">
        <div><span>_______________________________________________</span><b=
r>
          <span>OAuth mailing list</span><br>
          <span><a href=3D"mailto:OAuth@ietf.org" target=3D"_blank">OAuth@i=
etf.org</a></span><br>
          <span><a href=3D"https://www.ietf.org/mailman/listinfo/oauth" tar=
get=3D"_blank">https://www.ietf.org/mailman/listinfo/oauth</a></span><br>
        </div>
      </blockquote>
    </blockquote>
    <br>
  </div></div></div>

</blockquote></div><br><br clear=3D"all"><div><br></div>-- <br>Thanks &amp;=
 Regards,<br>Prabath<div><br></div><div>Mobile : <a href=3D"tel:%2B94%2071%=
20809%206732" value=3D"+94718096732" target=3D"_blank">+94 71 809 6732</a>=
=A0<br>
<br><a href=3D"http://blog.facilelogin.com" target=3D"_blank">http://blog.f=
acilelogin.com</a><br>
<a href=3D"http://RampartFAQ.com" target=3D"_blank">http://RampartFAQ.com</=
a></div>
</div></div></div>
</blockquote></div><br><br clear=3D"all"><div><br></div>-- <br>Thanks &amp;=
 Regards,<br>Prabath<div><br></div><div>Mobile : +94 71 809 6732=A0<br><br>=
<a href=3D"http://blog.facilelogin.com" target=3D"_blank">http://blog.facil=
elogin.com</a><br>
<a href=3D"http://RampartFAQ.com" target=3D"_blank">http://RampartFAQ.com</=
a></div>
</div>

--e89a8f647ac3f87ae304d5adfea3--

From jricher@mitre.org  Thu Feb 14 05:54:29 2013
Return-Path: <jricher@mitre.org>
X-Original-To: oauth@ietfa.amsl.com
Delivered-To: oauth@ietfa.amsl.com
Received: from localhost (localhost [127.0.0.1]) by ietfa.amsl.com (Postfix) with ESMTP id 0F7BD21F84E7 for <oauth@ietfa.amsl.com>; Thu, 14 Feb 2013 05:54:29 -0800 (PST)
X-Virus-Scanned: amavisd-new at amsl.com
X-Spam-Flag: NO
X-Spam-Score: -6.567
X-Spam-Level: 
X-Spam-Status: No, score=-6.567 tagged_above=-999 required=5 tests=[AWL=0.031,  BAYES_00=-2.599, HTML_MESSAGE=0.001, RCVD_IN_DNSWL_MED=-4]
Received: from mail.ietf.org ([64.170.98.30]) by localhost (ietfa.amsl.com [127.0.0.1]) (amavisd-new, port 10024) with ESMTP id B91OZoauqYNd for <oauth@ietfa.amsl.com>; Thu, 14 Feb 2013 05:54:26 -0800 (PST)
Received: from smtpksrv1.mitre.org (smtpksrv1.mitre.org [198.49.146.77]) by ietfa.amsl.com (Postfix) with ESMTP id C3E5621F8461 for <oauth@ietf.org>; Thu, 14 Feb 2013 05:54:25 -0800 (PST)
Received: from smtpksrv1.mitre.org (localhost.localdomain [127.0.0.1]) by localhost (Postfix) with SMTP id A9CC51F2222; Thu, 14 Feb 2013 08:54:24 -0500 (EST)
Received: from IMCCAS04.MITRE.ORG (imccas04.mitre.org [129.83.29.81]) by smtpksrv1.mitre.org (Postfix) with ESMTP id 936DB1F21F6; Thu, 14 Feb 2013 08:54:24 -0500 (EST)
Received: from [10.146.15.29] (129.83.31.58) by IMCCAS04.MITRE.ORG (129.83.29.81) with Microsoft SMTP Server (TLS) id 14.2.318.4; Thu, 14 Feb 2013 08:54:24 -0500
Message-ID: <511CEC63.6090801@mitre.org>
Date: Thu, 14 Feb 2013 08:53:39 -0500
From: Justin Richer <jricher@mitre.org>
User-Agent: Mozilla/5.0 (X11; Linux i686; rv:17.0) Gecko/20130106 Thunderbird/17.0.2
MIME-Version: 1.0
To: Tim Bray <twbray@google.com>
References: <51195F36.6040705@mitre.org> <780F8C26-19A4-4301-B350-307D9FFF69CD@ve7jtb.com> <511BAA8B.8030309@mitre.org> <BEBDAFAC-28B0-4959-9FE5-34EC17FC318C@ve7jtb.com> <-4554688250617930935@unknownmsgid> <AF401161-0C7C-4E49-9F44-9982B312FF6D@ve7jtb.com> <CA+ZpN24+zBbYh0BV+yUQ2WprxFjSVa9hJ8qJ4t9HZx+u5HHM4w@mail.gmail.com>
In-Reply-To: <CA+ZpN24+zBbYh0BV+yUQ2WprxFjSVa9hJ8qJ4t9HZx+u5HHM4w@mail.gmail.com>
Content-Type: multipart/alternative; boundary="------------010208090306030804040906"
X-Originating-IP: [129.83.31.58]
Cc: "oauth@ietf.org" <oauth@ietf.org>
Subject: Re: [OAUTH-WG] Registration: RESTful client lifecycle management
X-BeenThere: oauth@ietf.org
X-Mailman-Version: 2.1.12
Precedence: list
List-Id: OAUTH WG <oauth.ietf.org>
List-Unsubscribe: <https://www.ietf.org/mailman/options/oauth>, <mailto:oauth-request@ietf.org?subject=unsubscribe>
List-Archive: <http://www.ietf.org/mail-archive/web/oauth>
List-Post: <mailto:oauth@ietf.org>
List-Help: <mailto:oauth-request@ietf.org?subject=help>
List-Subscribe: <https://www.ietf.org/mailman/listinfo/oauth>, <mailto:oauth-request@ietf.org?subject=subscribe>
X-List-Received-Date: Thu, 14 Feb 2013 13:54:29 -0000

--------------010208090306030804040906
Content-Type: text/plain; charset="ISO-8859-1"; format=flowed
Content-Transfer-Encoding: 7bit

+1 to this. And I'd also be fine if it wasn't MTI (server returns a 405 
Method Not Allowed) for servers that don't want to do it at all.

  -- Justin


On 02/13/2013 04:26 PM, Tim Bray wrote:
> A DELETE is an http request that asks the server to delete something. 
>  We probably would want to avoid writing a requirement into the 
> standard that the server has to comply.  So you get back a 204 if it 
> worked, a 404 if there is no such registration, a 403 if there is but 
> the server declines to delete, etc. Seems pretty straightforward. -T
>
> On Wed, Feb 13, 2013 at 12:18 PM, John Bradley <ve7jtb@ve7jtb.com 
> <mailto:ve7jtb@ve7jtb.com>> wrote:
>
>     DELETE is removing the record not resetting it to defaults.  They
>     are quite diffrent.
>
>     I want to agree on what the expected behaviour of DELETE is. I
>     think we have agreement on PUT and POST.
>
>     The general not in that a client can DELETE it's record is a
>     implication I don't like.  I think that is for the server to
>     decide and if it is not actually deleting it then DELETE is the
>     wrong verb to use.
>
>     John B.
>
>     On 2013-02-13, at 3:31 PM, Nat Sakimura <sakimura@gmail.com
>     <mailto:sakimura@gmail.com>> wrote:
>
>     > Generally speaking, mapping PUT to replace and POST to change is an
>     > acceptable practice so I am fine with it.
>     >
>     > Now, what I still do not understand is why you think it is fine
>     to do
>     > PUT or POST and not DELETE. Doing PUT with empty content is
>     almost the
>     > same as DELETE. Could you explain?
>     >
>     > =nat via iPhone
>     >
>     > Feb 14, 2013 0:10?John Bradley <ve7jtb@ve7jtb.com
>     <mailto:ve7jtb@ve7jtb.com>> ??????:
>     >
>     >> I am not violently opposed to PUT as a option that completely
>     replaces the resource setting all unsent claims back to the defaults.
>     >>
>     >> I don't have a good feeling about DELETE,  I think we still
>     need more discussion on what it means, what privileges it takes to
>     invoke it etc.
>     >> It could be a bad thing if we get wrong or is not implemented
>     consistently.
>     >>
>     >> Personally I don't think a client should ever be able to DELETE
>     it's record.
>     >>
>     >> I think marking a client_id as pending provisioning, suspended,
>      revoked etc is better and that can be done with a claim in the
>     update endpoint.
>     >>
>     >> It should only be the server that deletes a record after
>     satisfying it's audit requirements.
>     >>
>     >> John B.
>     >>
>     >> On 2013-02-13, at 12:00 PM, Justin Richer <jricher@mitre.org
>     <mailto:jricher@mitre.org>> wrote:
>     >>
>     >>> Would it be reasonable to mark the PUT and DELETE methods as
>     optional for the server to implement, but with defined semantics
>     if they do? I want to keep GET and POST(create) as mandatory, as I
>     think that's the minimal set of functionality required.
>     >>>
>     >>> -- Justin
>     >>>
>     >>> On 02/11/2013 08:51 PM, John Bradley wrote:
>     >>>> I would always include the client_id on update.
>     >>>>
>     >>>> I think it is also us full to have other tokens used at the
>     update endpoint.  I can see the master token used to update all
>     the clients it has registered as part of API management.
>     >>>> Relying on the registration_access_token is probably a design
>     that will cause trouble down the road.
>     >>>>
>     >>>> I think GET and POST are relatively clear.   I don't know
>     about expelling PUT to developers.  I think POST with a client_id
>     to a (separate discussion) update_uri works without restricting it
>     to PUT.
>     >>>>
>     >>>> I think DELETE needs to be better understood.   I think a
>     status that can be set for client lifecycle is better than letting
>     a client delete a entry.
>     >>>> In some cases there will be more than one instance of a
>     client and letting them know they have been turned off for a
>     reason is better than making there registration disappear.
>     >>>> So for the moment I would levee out DELETE.
>     >>>>
>     >>>> John B.
>     >>>>
>     >>>> On 2013-02-11, at 6:14 PM, Justin Richer <jricher@mitre.org
>     <mailto:jricher@mitre.org>> wrote:
>     >>>>
>     >>>>> Draft -05 of OAuth Dynamic Client Registration [1] defines
>     several operations that the client can take on its behalf as part
>     of the registration process. These boil down to the basic CRUD
>     operations that you find in many APIs: Create, Read, Update,
>     Delete. Draft -00 defined only the "Create" operation, draft -01
>     through -04 added the "Update" operation, switched using the
>     "operation=" parameter.
>     >>>>>
>     >>>>> Following several suggestions to do so on the list, the -05
>     draft defines these operations in terms of a RESTful API for the
>     client. Namely:
>     >>>>>
>     >>>>> - HTTP POST to registration endpoint => Create (register) a
>     new client
>     >>>>> - HTTP PUT to update endpoint (with
>     registration_access_token) => Update the registered information
>     for this client
>     >>>>> - HTTP GET to update endpoint (with
>     registration_access_token) => read the registered information for
>     this client
>     >>>>> - HTTP DELETE to update endpoint (with
>     registration_access_token) => Delete (unregister/de-provision)
>     this client
>     >>>>>
>     >>>>> The two main issues at stake here are: the addition of the
>     READ and DELETE methods, and the use of HTTP verbs following a
>     RESTful design philosophy.
>     >>>>>
>     >>>>> Pro:
>     >>>>> - RESTful APIs (with HTTP verbs to differentiate
>     functionality) are the norm today
>     >>>>> - Full lifecycle management is common and is going to be
>     expected by many users of this protocol in the wild
>     >>>>>
>     >>>>> Cons:
>     >>>>> - Update semantics are still under debate (full replace? patch?)
>     >>>>> - Somewhat increased complexity on the server to support all
>     operations
>     >>>>> - Client has to understand all HTTP verbs for full access
>     (though plain registration is just POST)
>     >>>>>
>     >>>>>
>     >>>>> Alternatives include using an operational switch parameter
>     (like the old drafts), defining separate endpoints for every
>     action, or doing all operations on a single endpoint using verbs
>     to switch.
>     >>>>>
>     >>>>> -- Justin
>     >>>>>
>     >>>>> [1] http://tools.ietf.org/html/draft-ietf-oauth-dyn-reg-05
>     >>>>> _______________________________________________
>     >>>>> OAuth mailing list
>     >>>>> OAuth@ietf.org <mailto:OAuth@ietf.org>
>     >>>>> https://www.ietf.org/mailman/listinfo/oauth
>     >>
>     >> _______________________________________________
>     >> OAuth mailing list
>     >> OAuth@ietf.org <mailto:OAuth@ietf.org>
>     >> https://www.ietf.org/mailman/listinfo/oauth
>
>     _______________________________________________
>     OAuth mailing list
>     OAuth@ietf.org <mailto:OAuth@ietf.org>
>     https://www.ietf.org/mailman/listinfo/oauth
>
>
>
>
> _______________________________________________
> OAuth mailing list
> OAuth@ietf.org
> https://www.ietf.org/mailman/listinfo/oauth


--------------010208090306030804040906
Content-Type: text/html; charset="ISO-8859-1"
Content-Transfer-Encoding: 7bit

<html>
  <head>
    <meta content="text/html; charset=ISO-8859-1"
      http-equiv="Content-Type">
  </head>
  <body bgcolor="#FFFFFF" text="#000000">
    +1 to this. And I'd also be fine if it wasn't MTI (server returns a
    405 Method Not Allowed) for servers that don't want to do it at all.<br>
    <br>
    &nbsp;-- Justin<br>
    <br>
    <br>
    <div class="moz-cite-prefix">On 02/13/2013 04:26 PM, Tim Bray wrote:<br>
    </div>
    <blockquote
cite="mid:CA+ZpN24+zBbYh0BV+yUQ2WprxFjSVa9hJ8qJ4t9HZx+u5HHM4w@mail.gmail.com"
      type="cite">
      <meta http-equiv="Content-Type" content="text/html;
        charset=ISO-8859-1">
      A DELETE is an http request that asks the server to delete
      something. &nbsp;We probably would want to avoid writing a requirement
      into the standard that the server has to comply. &nbsp;So you get back
      a 204 if it worked, a 404 if there is no such registration, a 403
      if there is but the server declines to delete, etc. Seems pretty
      straightforward. -T<br>
      <br>
      <div class="gmail_quote">On Wed, Feb 13, 2013 at 12:18 PM, John
        Bradley <span dir="ltr">&lt;<a moz-do-not-send="true"
            href="mailto:ve7jtb@ve7jtb.com" target="_blank">ve7jtb@ve7jtb.com</a>&gt;</span>
        wrote:<br>
        <blockquote class="gmail_quote" style="margin:0 0 0
          .8ex;border-left:1px #ccc solid;padding-left:1ex">
          DELETE is removing the record not resetting it to defaults.
          &nbsp;They are quite diffrent.<br>
          <br>
          I want to agree on what the expected behaviour of DELETE is. &nbsp;
          I think we have agreement on PUT and POST.<br>
          <br>
          The general not in that a client can DELETE it's record is a
          implication I don't like. &nbsp;I think that is for the server to
          decide and if it is not actually deleting it then DELETE is
          the wrong verb to use.<br>
          <br>
          John B.<br>
          <div>
            <div><br>
              On 2013-02-13, at 3:31 PM, Nat Sakimura &lt;<a
                moz-do-not-send="true" href="mailto:sakimura@gmail.com"
                target="_blank">sakimura@gmail.com</a>&gt; wrote:<br>
              <br>
              &gt; Generally speaking, mapping PUT to replace and POST
              to change is an<br>
              &gt; acceptable practice so I am fine with it.<br>
              &gt;<br>
              &gt; Now, what I still do not understand is why you think
              it is fine to do<br>
              &gt; PUT or POST and not DELETE. Doing PUT with empty
              content is almost the<br>
              &gt; same as DELETE. Could you explain?<br>
              &gt;<br>
              &gt; =nat via iPhone<br>
              &gt;<br>
              &gt; Feb 14, 2013 0:10&#12289;John Bradley &lt;<a
                moz-do-not-send="true" href="mailto:ve7jtb@ve7jtb.com"
                target="_blank">ve7jtb@ve7jtb.com</a>&gt; &#12398;&#12513;&#12483;&#12475;&#12540;&#12472;:<br>
              &gt;<br>
              &gt;&gt; I am not violently opposed to PUT as a option
              that completely replaces the resource setting all unsent
              claims back to the defaults.<br>
              &gt;&gt;<br>
              &gt;&gt; I don't have a good feeling about DELETE, &nbsp;I
              think we still need more discussion on what it means, what
              privileges it takes to invoke it etc.<br>
              &gt;&gt; It could be a bad thing if we get wrong or is not
              implemented consistently.<br>
              &gt;&gt;<br>
              &gt;&gt; Personally I don't think a client should ever be
              able to DELETE it's record.<br>
              &gt;&gt;<br>
              &gt;&gt; I think marking a client_id as pending
              provisioning, suspended, &nbsp;revoked etc is better and that
              can be done with a claim in the update endpoint.<br>
              &gt;&gt;<br>
              &gt;&gt; It should only be the server that deletes a
              record after satisfying it's audit requirements.<br>
              &gt;&gt;<br>
              &gt;&gt; John B.<br>
              &gt;&gt;<br>
              &gt;&gt; On 2013-02-13, at 12:00 PM, Justin Richer &lt;<a
                moz-do-not-send="true" href="mailto:jricher@mitre.org"
                target="_blank">jricher@mitre.org</a>&gt; wrote:<br>
              &gt;&gt;<br>
              &gt;&gt;&gt; Would it be reasonable to mark the PUT and
              DELETE methods as optional for the server to implement,
              but with defined semantics if they do? I want to keep GET
              and POST(create) as mandatory, as I think that's the
              minimal set of functionality required.<br>
              &gt;&gt;&gt;<br>
              &gt;&gt;&gt; -- Justin<br>
              &gt;&gt;&gt;<br>
              &gt;&gt;&gt; On 02/11/2013 08:51 PM, John Bradley wrote:<br>
              &gt;&gt;&gt;&gt; I would always include the client_id on
              update.<br>
              &gt;&gt;&gt;&gt;<br>
              &gt;&gt;&gt;&gt; I think it is also us full to have other
              tokens used at the update endpoint. &nbsp;I can see the master
              token used to update all the clients it has registered as
              part of API management.<br>
              &gt;&gt;&gt;&gt; Relying on the registration_access_token
              is probably a design that will cause trouble down the
              road.<br>
              &gt;&gt;&gt;&gt;<br>
              &gt;&gt;&gt;&gt; I think GET and POST are relatively
              clear. &nbsp; I don't know about expelling PUT to developers.
              &nbsp;I think POST with a client_id to a (separate discussion)
              update_uri works without restricting it to PUT.<br>
              &gt;&gt;&gt;&gt;<br>
              &gt;&gt;&gt;&gt; I think DELETE needs to be better
              understood. &nbsp; I think a status that can be set for client
              lifecycle is better than letting a client delete a entry.<br>
              &gt;&gt;&gt;&gt; In some cases there will be more than one
              instance of a client and letting them know they have been
              turned off for a reason is better than making there
              registration disappear.<br>
              &gt;&gt;&gt;&gt; So for the moment I would levee out
              DELETE.<br>
              &gt;&gt;&gt;&gt;<br>
              &gt;&gt;&gt;&gt; John B.<br>
              &gt;&gt;&gt;&gt;<br>
              &gt;&gt;&gt;&gt; On 2013-02-11, at 6:14 PM, Justin Richer
              &lt;<a moz-do-not-send="true"
                href="mailto:jricher@mitre.org" target="_blank">jricher@mitre.org</a>&gt;
              wrote:<br>
              &gt;&gt;&gt;&gt;<br>
              &gt;&gt;&gt;&gt;&gt; Draft -05 of OAuth Dynamic Client
              Registration [1] defines several operations that the
              client can take on its behalf as part of the registration
              process. These boil down to the basic CRUD operations that
              you find in many APIs: Create, Read, Update, Delete. Draft
              -00 defined only the "Create" operation, draft -01 through
              -04 added the "Update" operation, switched using the
              "operation=" parameter.<br>
              &gt;&gt;&gt;&gt;&gt;<br>
              &gt;&gt;&gt;&gt;&gt; Following several suggestions to do
              so on the list, the -05 draft defines these operations in
              terms of a RESTful API for the client. Namely:<br>
              &gt;&gt;&gt;&gt;&gt;<br>
              &gt;&gt;&gt;&gt;&gt; - HTTP POST to registration endpoint
              =&gt; Create (register) a new client<br>
              &gt;&gt;&gt;&gt;&gt; - HTTP PUT to update endpoint (with
              registration_access_token) =&gt; Update the registered
              information for this client<br>
              &gt;&gt;&gt;&gt;&gt; - HTTP GET to update endpoint (with
              registration_access_token) =&gt; read the registered
              information for this client<br>
              &gt;&gt;&gt;&gt;&gt; - HTTP DELETE to update endpoint
              (with registration_access_token) =&gt; Delete
              (unregister/de-provision) this client<br>
              &gt;&gt;&gt;&gt;&gt;<br>
              &gt;&gt;&gt;&gt;&gt; The two main issues at stake here
              are: the addition of the READ and DELETE methods, and the
              use of HTTP verbs following a RESTful design philosophy.<br>
              &gt;&gt;&gt;&gt;&gt;<br>
              &gt;&gt;&gt;&gt;&gt; Pro:<br>
              &gt;&gt;&gt;&gt;&gt; - RESTful APIs (with HTTP verbs to
              differentiate functionality) are the norm today<br>
              &gt;&gt;&gt;&gt;&gt; - Full lifecycle management is common
              and is going to be expected by many users of this protocol
              in the wild<br>
              &gt;&gt;&gt;&gt;&gt;<br>
              &gt;&gt;&gt;&gt;&gt; Cons:<br>
              &gt;&gt;&gt;&gt;&gt; - Update semantics are still under
              debate (full replace? patch?)<br>
              &gt;&gt;&gt;&gt;&gt; - Somewhat increased complexity on
              the server to support all operations<br>
              &gt;&gt;&gt;&gt;&gt; - Client has to understand all HTTP
              verbs for full access (though plain registration is just
              POST)<br>
              &gt;&gt;&gt;&gt;&gt;<br>
              &gt;&gt;&gt;&gt;&gt;<br>
              &gt;&gt;&gt;&gt;&gt; Alternatives include using an
              operational switch parameter (like the old drafts),
              defining separate endpoints for every action, or doing all
              operations on a single endpoint using verbs to switch.<br>
              &gt;&gt;&gt;&gt;&gt;<br>
              &gt;&gt;&gt;&gt;&gt; -- Justin<br>
              &gt;&gt;&gt;&gt;&gt;<br>
              &gt;&gt;&gt;&gt;&gt; [1] <a moz-do-not-send="true"
                href="http://tools.ietf.org/html/draft-ietf-oauth-dyn-reg-05"
                target="_blank">http://tools.ietf.org/html/draft-ietf-oauth-dyn-reg-05</a><br>
              &gt;&gt;&gt;&gt;&gt;
              _______________________________________________<br>
              &gt;&gt;&gt;&gt;&gt; OAuth mailing list<br>
              &gt;&gt;&gt;&gt;&gt; <a moz-do-not-send="true"
                href="mailto:OAuth@ietf.org" target="_blank">OAuth@ietf.org</a><br>
              &gt;&gt;&gt;&gt;&gt; <a moz-do-not-send="true"
                href="https://www.ietf.org/mailman/listinfo/oauth"
                target="_blank">https://www.ietf.org/mailman/listinfo/oauth</a><br>
              &gt;&gt;<br>
              &gt;&gt; _______________________________________________<br>
              &gt;&gt; OAuth mailing list<br>
              &gt;&gt; <a moz-do-not-send="true"
                href="mailto:OAuth@ietf.org" target="_blank">OAuth@ietf.org</a><br>
              &gt;&gt; <a moz-do-not-send="true"
                href="https://www.ietf.org/mailman/listinfo/oauth"
                target="_blank">https://www.ietf.org/mailman/listinfo/oauth</a><br>
              <br>
              _______________________________________________<br>
              OAuth mailing list<br>
              <a moz-do-not-send="true" href="mailto:OAuth@ietf.org"
                target="_blank">OAuth@ietf.org</a><br>
              <a moz-do-not-send="true"
                href="https://www.ietf.org/mailman/listinfo/oauth"
                target="_blank">https://www.ietf.org/mailman/listinfo/oauth</a><br>
            </div>
          </div>
        </blockquote>
      </div>
      <br>
      <br>
      <fieldset class="mimeAttachmentHeader"></fieldset>
      <br>
      <pre wrap="">_______________________________________________
OAuth mailing list
<a class="moz-txt-link-abbreviated" href="mailto:OAuth@ietf.org">OAuth@ietf.org</a>
<a class="moz-txt-link-freetext" href="https://www.ietf.org/mailman/listinfo/oauth">https://www.ietf.org/mailman/listinfo/oauth</a>
</pre>
    </blockquote>
    <br>
  </body>
</html>

--------------010208090306030804040906--

From jricher@mitre.org  Thu Feb 14 06:01:18 2013
Return-Path: <jricher@mitre.org>
X-Original-To: oauth@ietfa.amsl.com
Delivered-To: oauth@ietfa.amsl.com
Received: from localhost (localhost [127.0.0.1]) by ietfa.amsl.com (Postfix) with ESMTP id 91EC021F87C4 for <oauth@ietfa.amsl.com>; Thu, 14 Feb 2013 06:01:18 -0800 (PST)
X-Virus-Scanned: amavisd-new at amsl.com
X-Spam-Flag: NO
X-Spam-Score: -6.568
X-Spam-Level: 
X-Spam-Status: No, score=-6.568 tagged_above=-999 required=5 tests=[AWL=0.031,  BAYES_00=-2.599, RCVD_IN_DNSWL_MED=-4]
Received: from mail.ietf.org ([64.170.98.30]) by localhost (ietfa.amsl.com [127.0.0.1]) (amavisd-new, port 10024) with ESMTP id QBXXVYN2hk3Y for <oauth@ietfa.amsl.com>; Thu, 14 Feb 2013 06:01:17 -0800 (PST)
Received: from smtpksrv1.mitre.org (smtpksrv1.mitre.org [198.49.146.77]) by ietfa.amsl.com (Postfix) with ESMTP id 8CFF721F87AA for <oauth@ietf.org>; Thu, 14 Feb 2013 06:01:13 -0800 (PST)
Received: from smtpksrv1.mitre.org (localhost.localdomain [127.0.0.1]) by localhost (Postfix) with SMTP id D24515310908; Thu, 14 Feb 2013 09:01:12 -0500 (EST)
Received: from IMCCAS01.MITRE.ORG (imccas01.mitre.org [129.83.29.78]) by smtpksrv1.mitre.org (Postfix) with ESMTP id 9947B1F2200; Thu, 14 Feb 2013 09:01:12 -0500 (EST)
Received: from [10.146.15.29] (129.83.31.58) by IMCCAS01.MITRE.ORG (129.83.29.78) with Microsoft SMTP Server (TLS) id 14.2.318.4; Thu, 14 Feb 2013 09:01:12 -0500
Message-ID: <511CEDFB.6010908@mitre.org>
Date: Thu, 14 Feb 2013 09:00:27 -0500
From: Justin Richer <jricher@mitre.org>
User-Agent: Mozilla/5.0 (X11; Linux i686; rv:17.0) Gecko/20130106 Thunderbird/17.0.2
MIME-Version: 1.0
To: Hannes Tschofenig <hannes.tschofenig@gmx.net>
References: <0573984A-8C11-4960-9BC6-F44D4B664C19@gmx.net> <511BBBAC.9060502@oracle.com> <0DF3F088-7F15-4C0F-85C4-35DE80CB01E0@gmx.net>
In-Reply-To: <0DF3F088-7F15-4C0F-85C4-35DE80CB01E0@gmx.net>
Content-Type: text/plain; charset="ISO-8859-1"; format=flowed
Content-Transfer-Encoding: quoted-printable
X-Originating-IP: [129.83.31.58]
Cc: oauth@ietf.org
Subject: Re: [OAUTH-WG] Minutes from the OAuth Design Team Conference Call - 11th February 2013
X-BeenThere: oauth@ietf.org
X-Mailman-Version: 2.1.12
Precedence: list
List-Id: OAUTH WG <oauth.ietf.org>
List-Unsubscribe: <https://www.ietf.org/mailman/options/oauth>, <mailto:oauth-request@ietf.org?subject=unsubscribe>
List-Archive: <http://www.ietf.org/mail-archive/web/oauth>
List-Post: <mailto:oauth@ietf.org>
List-Help: <mailto:oauth-request@ietf.org?subject=help>
List-Subscribe: <https://www.ietf.org/mailman/listinfo/oauth>, <mailto:oauth-request@ietf.org?subject=subscribe>
X-List-Received-Date: Thu, 14 Feb 2013 14:01:18 -0000

On 02/14/2013 02:45 AM, Hannes Tschofenig wrote:
> Hi Prateek,
>
>
> thanks for your questions.
>
>
> On Feb 13, 2013, at 6:13 PM, Prateek Mishra wrote:
>
>> Hannes,
>>
>> 1) Its not clear to me that we need  to specify exchanges between the =
AS and the RS as part of this work. The core specification leaves this
>> unspecified. There could be many different ways that the AS and RS col=
laborate to validate signatures in messages received from the client.
> It depends what the group wants to accomplish. So far, I thought that t=
he goal was to offer the ability to provide a sufficient description in o=
ur specifications so that the authorization server and the resource serve=
r can be provided by different vendors and that they still interoperate.
>
> The group may have changed their mind in the meanwhile.
>
> What is your view?

My view on this, as expressed in the call, is that the interoperability=20
be between the Client and AS and between the Client and RS.=20
Interoperability between AS and RS from different vendors is a different =

question all together, and I don't think it really ought to be in scope=20
for this. I think that with this signed token component we should build=20
something that doesn't *preclude* this kind of AS/RS interop, but that=20
the solution to that is a more general question. This is the motivation=20
behind things like the token introspection draft.

>> 2) Regarding (symmetric) key distribution, dont we need some kind of e=
xisting trust relationship between the client and AS to make this possibl=
e? I guess it
>> would be enough to require use of a "confidential" client, that would =
make it possible for the two parties to agree on a session key at the poi=
nt where an access token
>> is  issued by the AS.
> That's a very good question. I have not formed an option about this iss=
ue yet particularly given the recent capability to dynamically register c=
lients.

I don't think that signing tokens should require confidential clients.=20
This was one of the implementation issues with OAuth 1, as it required a =

"consumer_secret" at all times. This led to Google telling people to use =

"anonymous" as the "consumer_secret" for what were effectively public=20
clients. Even with dynamic registration, there's still a place for=20
public clients, in my opinion.

>> 3) I think do need an MTI key distribution protocol as part of the spe=
cification, leaving that as a choice would hurt interoperability.
> That's my impression as well.

I agree that we need to pick one style that assumes which party needs=20
access to which keys and what time. I disagree that we need to define=20
exactly how all of those keys get there.

  -- Justin

> Ciao
> Hannes
>
>> - prateek
>>
>>> Here are my notes.
>>>
>>> Participants:
>>>
>>> * John Bradley
>>> * Derek Atkins
>>> * Phil Hunt
>>> * Prateek Mishra
>>> * Hannes Tschofenig
>>> * Mike Jones
>>> * Antonio Sanso
>>> * Justin Richer
>>>
>>> Notes:
>>>
>>> My slides are available here: http://www.tschofenig.priv.at/OAuth2-Se=
curity-11Feb2013.ppt
>>>
>>> Slide #2 summarizes earlier discussions during the conference calls.
>>>
>>> -- HTTP vs. JSON
>>>
>>> Phil noted that he does not like to use the MAC Token draft as a star=
ting point because it does not re-use any of the work done in the JOSE wo=
rking group and in particular all the libraries that are available today.=
 He mentioned that earlier attempts to write the MAC Token code lead to p=
roblems for implementers.
>>>
>>> Justin responded that he does not agree with using JSON as a transpor=
t mechanism since this would replicate a SOAP style.
>>>
>>> Phil noted that he wants to send JSON but the signature shall be comp=
uted over the HTTP header field.
>>>
>>> -- Flexibility for the keyed message digest computation
>>>
>>>  From earlier discussion it was clear that the conference call partic=
ipants wanted more flexibility regarding the keyed message digest computa=
tion. For this purpose Hannes presented the DKIM based approach, which al=
lows selective header fields to be included in the digest. This is shown =
in slide #4.
>>>
>>> After some discussion the conference call participants thought that t=
his would meet their needs. Further investigations would still be useful =
to determine the degree of failed HMAC calculations due to HTTP proxies m=
odifying the content.
>>>
>>> -- Key Distribution
>>>
>>> Hannes presented the open issue regarding the choice of key distribut=
ion. Slides #6-#8 present three techniques and Hannes asked for feedback =
regarding the preferred style. Justin and others didn't see the need to d=
ecide on one mechanism - they wanted to keep the choice open. Derek indic=
ated that this will not be an acceptable approach. Since the resource ser=
ver and the authorization server may, in the OAuth 2.0 framework, be enti=
ties produced by different vendors there is an interoperability need. Jus=
tin responded that he disagrees and that the resource server needs to und=
erstand the access token and referred to the recent draft submission for =
the token introspection endpoint. Derek indicated that the resource serve=
r has to understand the content of the access token and the token introsp=
ection endpoint just pushes the problem around: the resource server has t=
o send the access token to the authorization server and then the resource=
 server gets the result back (which he the
>   n a
>>>   gain needs to understand) in order to make a meaningful authorizati=
on decision.
>>>
>>> Everyone agreed that the client must receive the session key from the=
 authorization server and that this approach has to be standardized. It w=
as also agreed that this is a common approach among all three key distrib=
ution mechanisms.
>>>
>>> Hannes asked the participants to think about their preference.
>>>
>>> The questions regarding key naming and the indication for the intende=
d resource server the client wants to talk to have been postponed.
>>>   Ciao
>>> Hannes
>>>
>>>
>>> _______________________________________________
>>> OAuth mailing list
>>> OAuth@ietf.org
>>> https://www.ietf.org/mailman/listinfo/oauth
>>
> _______________________________________________
> OAuth mailing list
> OAuth@ietf.org
> https://www.ietf.org/mailman/listinfo/oauth



From jricher@mitre.org  Thu Feb 14 06:04:11 2013
Return-Path: <jricher@mitre.org>
X-Original-To: oauth@ietfa.amsl.com
Delivered-To: oauth@ietfa.amsl.com
Received: from localhost (localhost [127.0.0.1]) by ietfa.amsl.com (Postfix) with ESMTP id 7475E21F87C4 for <oauth@ietfa.amsl.com>; Thu, 14 Feb 2013 06:04:11 -0800 (PST)
X-Virus-Scanned: amavisd-new at amsl.com
X-Spam-Flag: NO
X-Spam-Score: -6.568
X-Spam-Level: 
X-Spam-Status: No, score=-6.568 tagged_above=-999 required=5 tests=[AWL=0.030,  BAYES_00=-2.599, HTML_MESSAGE=0.001, RCVD_IN_DNSWL_MED=-4]
Received: from mail.ietf.org ([64.170.98.30]) by localhost (ietfa.amsl.com [127.0.0.1]) (amavisd-new, port 10024) with ESMTP id QaukNOdCp1OL for <oauth@ietfa.amsl.com>; Thu, 14 Feb 2013 06:04:09 -0800 (PST)
Received: from smtpksrv1.mitre.org (smtpksrv1.mitre.org [198.49.146.77]) by ietfa.amsl.com (Postfix) with ESMTP id 0DB6D21F87DF for <oauth@ietf.org>; Thu, 14 Feb 2013 06:04:09 -0800 (PST)
Received: from smtpksrv1.mitre.org (localhost.localdomain [127.0.0.1]) by localhost (Postfix) with SMTP id 9BBCD1F2C9F; Thu, 14 Feb 2013 09:04:08 -0500 (EST)
Received: from IMCCAS04.MITRE.ORG (imccas04.mitre.org [129.83.29.81]) by smtpksrv1.mitre.org (Postfix) with ESMTP id 706481F21F6; Thu, 14 Feb 2013 09:04:08 -0500 (EST)
Received: from [10.146.15.29] (129.83.31.58) by IMCCAS04.MITRE.ORG (129.83.29.81) with Microsoft SMTP Server (TLS) id 14.2.318.4; Thu, 14 Feb 2013 09:04:08 -0500
Message-ID: <511CEEAA.3030801@mitre.org>
Date: Thu, 14 Feb 2013 09:03:22 -0500
From: Justin Richer <jricher@mitre.org>
User-Agent: Mozilla/5.0 (X11; Linux i686; rv:17.0) Gecko/20130106 Thunderbird/17.0.2
MIME-Version: 1.0
To: Prabath Siriwardena <prabath@wso2.com>
References: <20130206192420.32698.21027.idtracker@ietfa.amsl.com> <5112AE0B.1080501@mitre.org> <CAJV9qO_8-4FowrXK=ae-+xMjiJFP04ryVMLQ8SGUH8kp3PHrLg@mail.gmail.com> <5113C3AA.1040701@mitre.org> <CAJV9qO8BVV57eAb5kUNes15AYOpUKqw5XWQswh-FJA=b1pPgSA@mail.gmail.com> <5113DDB2.7060805@mitre.org> <CAJV9qO_gM1oera9ae9sqh9n17e-ZLKuC2pmsZwhq-RmFcMyqHA@mail.gmail.com> <51196777.6000502@mitre.org> <CAJV9qO-5bWZbNUfCmaqYBQoy-qwNaSZFOsO9GL3CrbSejwVTzw@mail.gmail.com> <F6595A40-6B4E-4718-ABB5-694CA975C4DB@maymount.com> <511A5062.5010108@mitre.org> <CAJV9qO_Mr87NX=KZRqCsWasQ1FuvDNBw14eS-TcPf_KRJztQFg@mail.gmail.com> <CAJV9qO-71-sM6kXOB6Fb_bvVkDBQ5JBbs8E5X=f-K=iEmGezRA@mail.gmail.com>
In-Reply-To: <CAJV9qO-71-sM6kXOB6Fb_bvVkDBQ5JBbs8E5X=f-K=iEmGezRA@mail.gmail.com>
Content-Type: multipart/alternative; boundary="------------020305030005000806030609"
X-Originating-IP: [129.83.31.58]
Cc: "oauth@ietf.org" <oauth@ietf.org>
Subject: Re: [OAUTH-WG] Fwd: New Version Notification for draft-richer-oauth-introspection-02.txt
X-BeenThere: oauth@ietf.org
X-Mailman-Version: 2.1.12
Precedence: list
List-Id: OAUTH WG <oauth.ietf.org>
List-Unsubscribe: <https://www.ietf.org/mailman/options/oauth>, <mailto:oauth-request@ietf.org?subject=unsubscribe>
List-Archive: <http://www.ietf.org/mail-archive/web/oauth>
List-Post: <mailto:oauth@ietf.org>
List-Help: <mailto:oauth-request@ietf.org?subject=help>
List-Subscribe: <https://www.ietf.org/mailman/listinfo/oauth>, <mailto:oauth-request@ietf.org?subject=subscribe>
X-List-Received-Date: Thu, 14 Feb 2013 14:04:11 -0000

--------------020305030005000806030609
Content-Type: text/plain; charset="ISO-8859-1"; format=flowed
Content-Transfer-Encoding: 7bit

What exactly are you suggesting be added to introspection? The 
"token_type_hint" is from the client to the server, but what you've 
asked for in terms of "token type" is from the server to the client. And 
there was never an answer to what exactly is meant by "token type" in 
this case, particularly because you seem to want to call out things like 
SAML and Bearer as separate types.

  -- Justin


On 02/14/2013 06:59 AM, Prabath Siriwardena wrote:
> I noticed that the latest Token Revocation draft [1] has introduced 
> the parameter "token_type_hint". I would suggest the same here, as 
> that would make what is meant by "valid" much clear..
>
> [1]: http://tools.ietf.org/html/draft-ietf-oauth-revocation-05
>
> Thanks & regards,
> -Prabath
>
> On Tue, Feb 12, 2013 at 9:35 PM, Prabath Siriwardena <prabath@wso2.com 
> <mailto:prabath@wso2.com>> wrote:
>
>     Hi Justin,
>
>     I doubt whether valid_token would make a difference..?
>
>     My initial argument is what is the validation criteria..?
>     Validation criteria depends on the token_type..
>
>     If we are talking only about metadata - then I believe "revoked",
>     "expired" would be more meaningful..
>
>     Thanks & regards,
>     -Prabath
>
>
>     On Tue, Feb 12, 2013 at 7:53 PM, Justin Richer <jricher@mitre.org
>     <mailto:jricher@mitre.org>> wrote:
>
>         OK, I can see the wisdom in changing this term.
>
>         I picked "valid" because I wanted a simple "boolean" value
>         that would require no additional parsing or string-matching on
>         the client's behalf, and I'd like to stick with that. OAuth is
>         built with the assumption that clients need to be able to
>         recover from invalid tokens at any stage, so I think a simple
>         yes/no is the right step here.
>
>         That said, I think you're both right that "valid" seems to
>         have caused a bit of confusion. I don't want to go with
>         "revoked" because I'd rather have the "token is OK" be the
>         positive boolean value.
>
>         Would "valid_token" be more clear? Or do we need a different
>         adjective all together?
>
>          -- Justin
>
>
>         On 02/11/2013 08:02 PM, Richard Harrington wrote:
>>         Have you considered "status" instead of "valid"?  It could
>>         have values like "active", "expired", and "revoked".
>>
>>         Is it worthwhile including the status of the client also?
>>          For example, a client application could be disabled,
>>         temporarily or permanently, and thus disabling its access
>>         tokens as well.
>>
>>
>>         On Feb 11, 2013, at 1:56 PM, Prabath Siriwardena
>>         <prabath@wso2.com <mailto:prabath@wso2.com>> wrote:
>>
>>>         I guess confusion is with 'valid' parameter is in the
>>>         response..
>>>
>>>         I thought this will be helpful to standardize the
>>>         communication between Resource Server and the Authorization
>>>         Server..
>>>
>>>         I would suggest we completely remove "valid" from the
>>>         response - or define it much clearly..
>>>
>>>         May be can add "revoked" with a boolean attribute..
>>>
>>>         Thanks & regards,
>>>         -Prabath
>>>
>>>         On Tue, Feb 12, 2013 at 3:19 AM, Justin Richer
>>>         <jricher@mitre.org <mailto:jricher@mitre.org>> wrote:
>>>
>>>
>>>             On 02/08/2013 12:51 AM, Prabath Siriwardena wrote:
>>>>             Hi Justin,
>>>>
>>>>             I have couple of questions related to "valid" parameter...
>>>>
>>>>             This endpoint can be invoked by the Resource Server in
>>>>             runtime...
>>>
>>>             That's correct.
>>>
>>>
>>>>
>>>>             In that case what is exactly meant by the "resource_id"
>>>>             in request ?
>>>
>>>             The resource_id field is a service-specific string that
>>>             basically lets the resource server provide some context
>>>             to the request to the auth server. There have been some
>>>             other suggestions like client IP address, but I wanted
>>>             to put this one in because it seemed to be a common
>>>             theme. The client is trying to do *something* with the
>>>             token, after all, and the rights, permissions, and
>>>             metadata associated with the token could change based on
>>>             that. Since the Introspection endpoint is all about
>>>             getting that metadata back to the PR, this seemed like a
>>>             good idea.
>>>
>>>
>>>>
>>>>             IMO a token to be valid depends on set of criteria
>>>>             based on it's type..
>>>>
>>>>             For a Bearer token..
>>>>
>>>>             1. Token should not be expired
>>>>             2. Token should not be revoked.
>>>>             3. The scope the token issued should match with the
>>>>             scope required for the resource.
>>>>
>>>>             For a MAC token...
>>>>
>>>>             1. Token not expired (mac id)
>>>>             2. Token should not be revoked
>>>>             3. The scope the token issued should match with the
>>>>             scope required for the resource.
>>>>             4. HMAC check should be valid
>>>>
>>>>             There are similar conditions for SAML bearer too..
>>>
>>>             This isn't really true. The SAML bearer token is fully
>>>             self-contained and doesn't change based on other
>>>             parameters in the message, unlike MAC. Same with JWT.
>>>             When it hands a SAML or JWT token to the AS, the PR has
>>>             given *everything* the server needs to check that
>>>             token's validity and use.
>>>
>>>             MAC signatures change with every message, and they're
>>>             done across several components of the HTTP message.
>>>             Therefor, the HMAC check for MAC style tokens will still
>>>             need to be done by the protected resource. Introspection
>>>             would help in the case that the signature validated just
>>>             fine, but the token might have expired. Or you need to
>>>             know what scopes apply. Introspection isn't to fully
>>>             validate the call to the protected resource -- if that
>>>             were the case, the PR would have to send some kind of
>>>             encapsulated version of the original request. Otherwise,
>>>             the AS won't have all of the information it needs to
>>>             check the MAC.
>>>
>>>
>>>             I think what you're describing is ultimately *not* what
>>>             the introspection endpoint is intended to do. If that's
>>>             unclear from the document, can you please suggest text
>>>             that would help clear the use case up? I wouldn't want
>>>             it to be ambiguous.
>>>
>>>              -- Justin
>>>
>>>
>>>>
>>>>             Thanks & regards,
>>>>             -Prabath
>>>>
>>>>
>>>>             On Thu, Feb 7, 2013 at 10:30 PM, Justin Richer
>>>>             <jricher@mitre.org <mailto:jricher@mitre.org>> wrote:
>>>>
>>>>                 It validates the token, which would be either the
>>>>                 token itself in the case of Bearer or the token
>>>>                 "id" part of something more complex like MAC. It
>>>>                 doesn't directly validate the usage of the token,
>>>>                 that's still up to the PR to do that.
>>>>
>>>>                 I nearly added a "token type" field in this draft,
>>>>                 but held back because there are several kinds of
>>>>                 "token type" that people talk about in OAuth.
>>>>                 First, there's "Bearer" vs. "MAC" vs. "HOK", or
>>>>                 what have you. Then within Bearer you have "JWT" or
>>>>                 "SAML" or "unstructured blob". Then you've also got
>>>>                 "access" vs. "refresh" and other flavors of token,
>>>>                 like the id_token in OpenID Connect.
>>>>
>>>>                 Thing is, the server running the introspection
>>>>                 endpoint will probably know *all* of these. But
>>>>                 should it tell the client? If so, which of the
>>>>                 three, and what names should the fields be?
>>>>
>>>>                  -- Justin
>>>>
>>>>
>>>>                 On 02/07/2013 11:26 AM, Prabath Siriwardena wrote:
>>>>>                 Okay.. I was thinking this could be used as a way
>>>>>                 to validate the token as well. BTW even in this
>>>>>                 case shouldn't communicate the type of token to
>>>>>                 AS? For example in the case of SAML profile - it
>>>>>                 could be SAML token..
>>>>>
>>>>>                 Thanks & regards,
>>>>>                 -Prabath
>>>>>
>>>>>                 On Thu, Feb 7, 2013 at 8:39 PM, Justin Richer
>>>>>                 <jricher@mitre.org <mailto:jricher@mitre.org>> wrote:
>>>>>
>>>>>                     "valid" might not be the best term, but it's
>>>>>                     meant to be a field where the server says "yes
>>>>>                     this token is still good" or "no this token
>>>>>                     isn't good anymore". We could instead do this
>>>>>                     with HTTP codes or something but I went with a
>>>>>                     pure JSON response.
>>>>>
>>>>>                      -- Justin
>>>>>
>>>>>
>>>>>                     On 02/06/2013 10:47 PM, Prabath Siriwardena wrote:
>>>>>>                     Hi Justin,
>>>>>>
>>>>>>                     I believe this is addressing one of the key
>>>>>>                     missing part in OAuth 2.0...
>>>>>>
>>>>>>                     One question - I guess this was discussed
>>>>>>                     already...
>>>>>>
>>>>>>                     In the spec - in the introspection response
>>>>>>                     it has the attribute "valid" - this is
>>>>>>                     basically the validity of the token provided
>>>>>>                     in the request.
>>>>>>
>>>>>>                     Validation criteria depends on the token and
>>>>>>                     well as token type ( Bearer, MAC..).
>>>>>>
>>>>>>                     In the spec it seems like it's coupled with
>>>>>>                     Bearer token type... But I guess, by adding
>>>>>>                     "token_type" to the request we can remove
>>>>>>                     this dependency.
>>>>>>
>>>>>>                     WDYT..?
>>>>>>
>>>>>>                     Thanks & regards,
>>>>>>                     -Prabath
>>>>>>
>>>>>>                     On Thu, Feb 7, 2013 at 12:54 AM, Justin
>>>>>>                     Richer <jricher@mitre.org
>>>>>>                     <mailto:jricher@mitre.org>> wrote:
>>>>>>
>>>>>>                         Updated introspection draft based on
>>>>>>                         recent comments. Changes include:
>>>>>>
>>>>>>                          - "scope" return parameter now follows
>>>>>>                         RFC6749 format instead of JSON array
>>>>>>                          - "subject" -> "sub", and "audience" ->
>>>>>>                         "aud", to be parallel with JWT claims
>>>>>>                          - clarified what happens if the
>>>>>>                         authentication is bad
>>>>>>
>>>>>>                          -- Justin
>>>>>>
>>>>>>
>>>>>>                         -------- Original Message --------
>>>>>>                         Subject: 	New Version Notification for
>>>>>>                         draft-richer-oauth-introspection-02.txt
>>>>>>                         Date: 	Wed, 6 Feb 2013 11:24:20 -0800
>>>>>>                         From: 	<internet-drafts@ietf.org>
>>>>>>                         <mailto:internet-drafts@ietf.org>
>>>>>>                         To: 	<jricher@mitre.org>
>>>>>>                         <mailto:jricher@mitre.org>
>>>>>>
>>>>>>
>>>>>>
>>>>>>                         A new version of I-D, draft-richer-oauth-introspection-02.txt
>>>>>>                         has been successfully submitted by Justin Richer and posted to the
>>>>>>                         IETF repository.
>>>>>>
>>>>>>                         Filename:	 draft-richer-oauth-introspection
>>>>>>                         Revision:	 02
>>>>>>                         Title:		 OAuth Token Introspection
>>>>>>                         Creation date:	 2013-02-06
>>>>>>                         WG ID:		 Individual Submission
>>>>>>                         Number of pages: 6
>>>>>>                         URL:http://www.ietf.org/internet-drafts/draft-richer-oauth-introspection-02.txt
>>>>>>                         Status:http://datatracker.ietf.org/doc/draft-richer-oauth-introspection
>>>>>>                         Htmlized:http://tools.ietf.org/html/draft-richer-oauth-introspection-02
>>>>>>                         Diff:http://www.ietf.org/rfcdiff?url2=draft-richer-oauth-introspection-02
>>>>>>
>>>>>>                         Abstract:
>>>>>>                             This specification defines a method for a client or protected
>>>>>>                             resource to query an OAuth authorization server to determine meta-
>>>>>>                             information about an OAuth token.
>>>>>>
>>>>>>
>>>>>>                                                                                                            
>>>>>>
>>>>>>
>>>>>>                         The IETF Secretariat
>>>>>>
>>>>>>
>>>>>>
>>>>>>
>>>>>>                         _______________________________________________
>>>>>>                         OAuth mailing list
>>>>>>                         OAuth@ietf.org <mailto:OAuth@ietf.org>
>>>>>>                         https://www.ietf.org/mailman/listinfo/oauth
>>>>>>
>>>>>>
>>>>>>
>>>>>>
>>>>>>                     -- 
>>>>>>                     Thanks & Regards,
>>>>>>                     Prabath
>>>>>>
>>>>>>                     Mobile : +94 71 809 6732
>>>>>>                     <tel:%2B94%2071%20809%206732>
>>>>>>
>>>>>>                     http://blog.facilelogin.com
>>>>>>                     http://RampartFAQ.com
>>>>>
>>>>>
>>>>>
>>>>>
>>>>>                 -- 
>>>>>                 Thanks & Regards,
>>>>>                 Prabath
>>>>>
>>>>>                 Mobile : +94 71 809 6732
>>>>>                 <tel:%2B94%2071%20809%206732>
>>>>>
>>>>>                 http://blog.facilelogin.com
>>>>>                 http://RampartFAQ.com
>>>>
>>>>
>>>>
>>>>
>>>>             -- 
>>>>             Thanks & Regards,
>>>>             Prabath
>>>>
>>>>             Mobile : +94 71 809 6732 <tel:%2B94%2071%20809%206732>
>>>>
>>>>             http://blog.facilelogin.com
>>>>             http://RampartFAQ.com
>>>
>>>
>>>
>>>
>>>         -- 
>>>         Thanks & Regards,
>>>         Prabath
>>>
>>>         Mobile : +94 71 809 6732 <tel:%2B94%2071%20809%206732>
>>>
>>>         http://blog.facilelogin.com
>>>         http://RampartFAQ.com
>>>         _______________________________________________
>>>         OAuth mailing list
>>>         OAuth@ietf.org <mailto:OAuth@ietf.org>
>>>         https://www.ietf.org/mailman/listinfo/oauth
>
>
>
>
>     -- 
>     Thanks & Regards,
>     Prabath
>
>     Mobile : +94 71 809 6732 <tel:%2B94%2071%20809%206732>
>
>     http://blog.facilelogin.com
>     http://RampartFAQ.com
>
>
>
>
> -- 
> Thanks & Regards,
> Prabath
>
> Mobile : +94 71 809 6732
>
> http://blog.facilelogin.com
> http://RampartFAQ.com


--------------020305030005000806030609
Content-Type: text/html; charset="ISO-8859-1"
Content-Transfer-Encoding: 7bit

<html>
  <head>
    <meta content="text/html; charset=ISO-8859-1"
      http-equiv="Content-Type">
  </head>
  <body bgcolor="#FFFFFF" text="#000000">
    What exactly are you suggesting be added to introspection? The
    "token_type_hint" is from the client to the server, but what you've
    asked for in terms of "token type" is from the server to the client.
    And there was never an answer to what exactly is meant by "token
    type" in this case, particularly because you seem to want to call
    out things like SAML and Bearer as separate types. <br>
    <br>
    &nbsp;-- Justin<br>
    <br>
    <br>
    <div class="moz-cite-prefix">On 02/14/2013 06:59 AM, Prabath
      Siriwardena wrote:<br>
    </div>
    <blockquote
cite="mid:CAJV9qO-71-sM6kXOB6Fb_bvVkDBQ5JBbs8E5X=f-K=iEmGezRA@mail.gmail.com"
      type="cite">
      <meta http-equiv="Content-Type" content="text/html;
        charset=ISO-8859-1">
      I noticed that the latest Token Revocation draft [1] has
      introduced the parameter "token_type_hint". I would suggest the
      same here, as that would make what is meant by "valid" much
      clear..
      <div><br>
      </div>
      <div>[1]:&nbsp;<a moz-do-not-send="true"
          href="http://tools.ietf.org/html/draft-ietf-oauth-revocation-05"
          target="_blank"
style="color:rgb(17,85,204);font-family:arial,sans-serif;font-size:12.727272033691406px;background-color:rgb(255,255,255)">http://tools.ietf.org/html/draft-ietf-oauth-revocation-05</a></div>
      <div><br>
      </div>
      <div>Thanks &amp; regards,</div>
      <div>-Prabath<br>
        <br>
        <div class="gmail_quote">On Tue, Feb 12, 2013 at 9:35 PM,
          Prabath Siriwardena <span dir="ltr">&lt;<a
              moz-do-not-send="true" href="mailto:prabath@wso2.com"
              target="_blank">prabath@wso2.com</a>&gt;</span> wrote:<br>
          <blockquote class="gmail_quote" style="margin:0 0 0
            .8ex;border-left:1px #ccc solid;padding-left:1ex">Hi Justin,
            <div><br>
            </div>
            <div>I doubt whether valid_token would make a difference..?</div>
            <div><br>
            </div>
            <div>My initial argument is what is the validation
              criteria..? Validation criteria depends on the
              token_type..</div>
            <div>
              <br>
            </div>
            <div>If we are talking only about metadata - then I believe
              "revoked", "expired" would be more meaningful..</div>
            <div><br>
            </div>
            <div>Thanks &amp; regards,</div>
            <div>-Prabath
              <div>
                <div class="h5">
                  <br>
                  <br>
                  <div class="gmail_quote">
                    On Tue, Feb 12, 2013 at 7:53 PM, Justin Richer <span
                      dir="ltr">&lt;<a moz-do-not-send="true"
                        href="mailto:jricher@mitre.org" target="_blank">jricher@mitre.org</a>&gt;</span>
                    wrote:<br>
                    <blockquote class="gmail_quote" style="margin:0 0 0
                      .8ex;border-left:1px #ccc solid;padding-left:1ex">
                      <div bgcolor="#FFFFFF" text="#000000"> OK, I can
                        see the wisdom in changing this term. <br>
                        <br>
                        I picked "valid" because I wanted a simple
                        "boolean" value that would require no additional
                        parsing or string-matching on the client's
                        behalf, and I'd like to stick with that. OAuth
                        is built with the assumption that clients need
                        to be able to recover from invalid tokens at any
                        stage, so I think a simple yes/no is the right
                        step here. <br>
                        <br>
                        That said, I think you're both right that
                        "valid" seems to have caused a bit of confusion.
                        I don't want to go with "revoked" because I'd
                        rather have the "token is OK" be the positive
                        boolean value. <br>
                        <br>
                        Would "valid_token" be more clear? Or do we need
                        a different adjective all together?<span><font
                            color="#888888"><br>
                            <br>
                            &nbsp;-- Justin</font></span>
                        <div>
                          <div><br>
                            <br>
                            <div>On 02/11/2013 08:02 PM, Richard
                              Harrington wrote:<br>
                            </div>
                            <blockquote type="cite">
                              <div>Have you considered "status" instead
                                of "valid"? &nbsp;It could have values like
                                "active", "expired", and "revoked".</div>
                              <div><br>
                              </div>
                              <div>Is it worthwhile including the status
                                of the client also? &nbsp;For example, a
                                client application could be disabled,
                                temporarily or permanently, and thus
                                disabling its access tokens as well.</div>
                              <div><br>
                              </div>
                              <div><br>
                                On Feb 11, 2013, at 1:56 PM, Prabath
                                Siriwardena &lt;<a
                                  moz-do-not-send="true"
                                  href="mailto:prabath@wso2.com"
                                  target="_blank">prabath@wso2.com</a>&gt;

                                wrote:<br>
                                <br>
                              </div>
                              <blockquote type="cite">
                                <div>I guess confusion is with 'valid'
                                  parameter is in the response..
                                  <div><br>
                                  </div>
                                  <div>I thought this will be helpful
                                    to&nbsp;standardize&nbsp;the communication
                                    between Resource Server and the
                                    Authorization Server..</div>
                                  <div><br>
                                  </div>
                                  <div>I would suggest we completely
                                    remove "valid" from the response -
                                    or define it much clearly..</div>
                                  <div><br>
                                  </div>
                                  <div>May be can add "revoked" with a
                                    boolean attribute..</div>
                                  <div><br>
                                  </div>
                                  <div>Thanks &amp; regards,</div>
                                  <div>-Prabath<br>
                                    <br>
                                    <div class="gmail_quote">On Tue, Feb
                                      12, 2013 at 3:19 AM, Justin Richer
                                      <span dir="ltr">&lt;<a
                                          moz-do-not-send="true"
                                          href="mailto:jricher@mitre.org"
                                          target="_blank">jricher@mitre.org</a>&gt;</span>
                                      wrote:<br>
                                      <blockquote class="gmail_quote"
                                        style="margin:0 0 0
                                        .8ex;border-left:1px #ccc
                                        solid;padding-left:1ex">
                                        <div bgcolor="#FFFFFF"
                                          text="#000000">
                                          <div> <br>
                                            <div>On 02/08/2013 12:51 AM,
                                              Prabath Siriwardena wrote:<br>
                                            </div>
                                          </div>
                                          <blockquote type="cite">
                                            Hi&nbsp;Justin,
                                            <div><br>
                                            </div>
                                            <div>
                                              <div>I have couple of
                                                questions related to
                                                "valid" parameter...</div>
                                              <div><br>
                                              </div>
                                              <div>This endpoint can be
                                                invoked by the Resource
                                                Server in runtime...</div>
                                            </div>
                                          </blockquote>
                                          <br>
                                          That's correct.
                                          <div><br>
                                            <br>
                                            <blockquote type="cite">
                                              <div><br>
                                              </div>
                                              <div>In that case what is
                                                exactly meant by the
                                                "resource_id" in request
                                                ?</div>
                                            </blockquote>
                                            <br>
                                          </div>
                                          The resource_id field is a
                                          service-specific string that
                                          basically lets the resource
                                          server provide some context to
                                          the request to the auth
                                          server. There have been some
                                          other suggestions like client
                                          IP address, but I wanted to
                                          put this one in because it
                                          seemed to be a common theme.
                                          The client is trying to do
                                          *something* with the token,
                                          after all, and the rights,
                                          permissions, and metadata
                                          associated with the token
                                          could change based on that.
                                          Since the Introspection
                                          endpoint is all about getting
                                          that metadata back to the PR,
                                          this seemed like a good idea.
                                          <div><br>
                                            <br>
                                            <blockquote type="cite">
                                              <div><br>
                                              </div>
                                              <div>IMO a token to be
                                                valid depends on set of
                                                criteria based on it's
                                                type..</div>
                                              <div><br>
                                              </div>
                                              <div>For a Bearer token..</div>
                                              <div><br>
                                              </div>
                                              <div>1. Token should not
                                                be expired</div>
                                              <div>2. Token should not
                                                be revoked.</div>
                                              <div>3. The scope the
                                                token issued should
                                                match with the scope
                                                required for the
                                                resource.</div>
                                              <div><br>
                                              </div>
                                              <div>For a MAC token...</div>
                                              <div><br>
                                              </div>
                                              <div>1. Token not expired
                                                (mac id)</div>
                                              <div>2. Token should not
                                                be revoked</div>
                                              <div>3. The scope the
                                                token issued should
                                                match with the scope
                                                required for the
                                                resource.</div>
                                              <div>4. HMAC check should
                                                be valid</div>
                                              <div><br>
                                              </div>
                                              There are similar
                                              conditions for SAML bearer
                                              too..</blockquote>
                                            <br>
                                          </div>
                                          This isn't really true. The
                                          SAML bearer token is fully
                                          self-contained and doesn't
                                          change based on other
                                          parameters in the message,
                                          unlike MAC. Same with JWT.
                                          When it hands a SAML or JWT
                                          token to the AS, the PR has
                                          given *everything* the server
                                          needs to check that token's
                                          validity and use. <br>
                                          <br>
                                          MAC signatures change with
                                          every message, and they're
                                          done across several components
                                          of the HTTP message. Therefor,
                                          the HMAC check for MAC style
                                          tokens will still need to be
                                          done by the protected
                                          resource. Introspection would
                                          help in the case that the
                                          signature validated just fine,
                                          but the token might have
                                          expired. Or you need to know
                                          what scopes apply.
                                          Introspection isn't to fully
                                          validate the call to the
                                          protected resource -- if that
                                          were the case, the PR would
                                          have to send some kind of
                                          encapsulated version of the
                                          original request. Otherwise,
                                          the AS won't have all of the
                                          information it needs to check
                                          the MAC.<br>
                                          <br>
                                          <br>
                                          I think what you're describing
                                          is ultimately *not* what the
                                          introspection endpoint is
                                          intended to do. If that's
                                          unclear from the document, can
                                          you please suggest text that
                                          would help clear the use case
                                          up? I wouldn't want it to be
                                          ambiguous.<span><font
                                              color="#888888"><br>
                                              <br>
                                              &nbsp;-- Justin</font></span>
                                          <div>
                                            <div><br>
                                              <br>
                                              <blockquote type="cite">
                                                <div><br>
                                                </div>
                                                <div>Thanks &amp;
                                                  regards,</div>
                                                <div>-Prabath</div>
                                                <div><br>
                                                </div>
                                                <div><br>
                                                  <div
                                                    class="gmail_quote">On
                                                    Thu, Feb 7, 2013 at
                                                    10:30 PM, Justin
                                                    Richer <span
                                                      dir="ltr">&lt;<a
                                                        moz-do-not-send="true"
href="mailto:jricher@mitre.org" target="_blank">jricher@mitre.org</a>&gt;</span>
                                                    wrote:<br>
                                                    <blockquote
                                                      class="gmail_quote"
                                                      style="margin:0 0
                                                      0
                                                      .8ex;border-left:1px
                                                      #ccc
                                                      solid;padding-left:1ex">
                                                      <div
                                                        bgcolor="#FFFFFF"
                                                        text="#000000">
                                                        It validates the
                                                        token, which
                                                        would be either
                                                        the token itself
                                                        in the case of
                                                        Bearer or the
                                                        token "id" part
                                                        of something
                                                        more complex
                                                        like MAC. It
                                                        doesn't directly
                                                        validate the
                                                        usage of the
                                                        token, that's
                                                        still up to the
                                                        PR to do that.<br>
                                                        <br>
                                                        I nearly added a
                                                        "token type"
                                                        field in this
                                                        draft, but held
                                                        back because
                                                        there are
                                                        several kinds of
                                                        "token type"
                                                        that people talk
                                                        about in OAuth.
                                                        First, there's
                                                        "Bearer" vs.
                                                        "MAC" vs. "HOK",
                                                        or what have
                                                        you. Then within
                                                        Bearer you have
                                                        "JWT" or "SAML"
                                                        or "unstructured
                                                        blob". Then
                                                        you've also got
                                                        "access" vs.
                                                        "refresh" and
                                                        other flavors of
                                                        token, like the
                                                        id_token in
                                                        OpenID Connect.
                                                        <br>
                                                        <br>
                                                        Thing is, the
                                                        server running
                                                        the
                                                        introspection
                                                        endpoint will
                                                        probably know
                                                        *all* of these.
                                                        But should it
                                                        tell the client?
                                                        If so, which of
                                                        the three, and
                                                        what names
                                                        should the
                                                        fields be?<span><font
color="#888888"><br>
                                                          <br>
                                                          &nbsp;-- Justin</font></span>
                                                        <div>
                                                          <div><br>
                                                          <br>
                                                          <div>On
                                                          02/07/2013
                                                          11:26 AM,
                                                          Prabath
                                                          Siriwardena
                                                          wrote:<br>
                                                          </div>
                                                          <blockquote
                                                          type="cite">
                                                          Okay.. I was
                                                          thinking this
                                                          could be used
                                                          as a way to
                                                          validate the
                                                          token as well.
                                                          BTW even in
                                                          this case
                                                          shouldn't
                                                          communicate
                                                          the type of
                                                          token to AS?
                                                          For example in
                                                          the case of
                                                          SAML profile -
                                                          it could be
                                                          SAML token..
                                                          <div> <br>
                                                          </div>
                                                          <div>Thanks
                                                          &amp; regards,</div>
                                                          <div>-Prabath<br>
                                                          <br>
                                                          <div
                                                          class="gmail_quote">On
                                                          Thu, Feb 7,
                                                          2013 at 8:39
                                                          PM, Justin
                                                          Richer <span
                                                          dir="ltr">&lt;<a
moz-do-not-send="true" href="mailto:jricher@mitre.org" target="_blank">jricher@mitre.org</a>&gt;</span>
                                                          wrote:<br>
                                                          <blockquote
                                                          class="gmail_quote"
                                                          style="margin:0
                                                          0 0
                                                          .8ex;border-left:1px
                                                          #ccc
                                                          solid;padding-left:1ex">
                                                          <div
                                                          bgcolor="#FFFFFF"
                                                          text="#000000">
                                                          "valid" might
                                                          not be the
                                                          best term, but
                                                          it's meant to
                                                          be a field
                                                          where the
                                                          server says
                                                          "yes this
                                                          token is still
                                                          good" or "no
                                                          this token
                                                          isn't good
                                                          anymore". We
                                                          could instead
                                                          do this with
                                                          HTTP codes or
                                                          something but
                                                          I went with a
                                                          pure JSON
                                                          response.<span><font
color="#888888"><br>
                                                          <br>
                                                          &nbsp;-- Justin</font></span>
                                                          <div>
                                                          <div><br>
                                                          <br>
                                                          <div>On
                                                          02/06/2013
                                                          10:47 PM,
                                                          Prabath
                                                          Siriwardena
                                                          wrote:<br>
                                                          </div>
                                                          <blockquote
                                                          type="cite">
                                                          Hi Justin,
                                                          <div><br>
                                                          </div>
                                                          <div>I believe
                                                          this is
                                                          addressing one
                                                          of the key
                                                          missing part
                                                          in OAuth
                                                          2.0...</div>
                                                          <div><br>
                                                          </div>
                                                          <div>One
                                                          question - I
                                                          guess this was
                                                          discussed
                                                          already...</div>
                                                          <div><br>
                                                          </div>
                                                          <div>In the
                                                          spec - in the
                                                          introspection
                                                          response it
                                                          has the
                                                          attribute
                                                          "valid" - this
                                                          is basically
                                                          the validity
                                                          of the token
                                                          provided in
                                                          the request.</div>
                                                          <div><br>
                                                          </div>
                                                          <div>Validation&nbsp;criteria

                                                          depends on the
                                                          token and well
                                                          as token type
                                                          ( Bearer,
                                                          MAC..).</div>
                                                          <div><br>
                                                          </div>
                                                          <div>In the
                                                          spec it seems
                                                          like it's
                                                          coupled with
                                                          Bearer token
                                                          type... But I
                                                          guess, by
                                                          adding
                                                          "token_type"
                                                          to the request
                                                          we can remove
                                                          this
                                                          dependency.</div>
                                                          <div><br>
                                                          </div>
                                                          <div>WDYT..?</div>
                                                          <div><br>
                                                          </div>
                                                          <div>Thanks
                                                          &amp; regards,</div>
                                                          <div>-Prabath&nbsp;</div>
                                                          <div><br>
                                                          <div
                                                          class="gmail_quote">On

                                                          Thu, Feb 7,
                                                          2013 at 12:54
                                                          AM, Justin
                                                          Richer <span
                                                          dir="ltr">&lt;<a
moz-do-not-send="true" href="mailto:jricher@mitre.org" target="_blank">jricher@mitre.org</a>&gt;</span>
                                                          wrote:<br>
                                                          <blockquote
                                                          class="gmail_quote"
                                                          style="margin:0
                                                          0 0
                                                          .8ex;border-left:1px
                                                          #ccc
                                                          solid;padding-left:1ex">
                                                          <div
                                                          bgcolor="#FFFFFF"
                                                          text="#000000">
                                                          Updated
                                                          introspection
                                                          draft based on
                                                          recent
                                                          comments.
                                                          Changes
                                                          include:<br>
                                                          <br>
                                                          &nbsp;- "scope"
                                                          return
                                                          parameter now
                                                          follows
                                                          RFC6749 format
                                                          instead of
                                                          JSON array<br>
                                                          &nbsp;- "subject"
                                                          -&gt; "sub",
                                                          and "audience"
                                                          -&gt; "aud",
                                                          to be parallel
                                                          with JWT
                                                          claims<br>
                                                          &nbsp;- clarified
                                                          what happens
                                                          if the
                                                          authentication
                                                          is bad<br>
                                                          <br>
                                                          &nbsp;-- Justin<br>
                                                          <div><br>
                                                          <br>
                                                          --------
                                                          Original
                                                          Message
                                                          --------
                                                          <table
                                                          border="0"
                                                          cellpadding="0"
cellspacing="0">
                                                          <tbody>
                                                          <tr>
                                                          <th
                                                          align="RIGHT"
nowrap="nowrap" valign="BASELINE">Subject: </th>
                                                          <td>New
                                                          Version
                                                          Notification
                                                          for
                                                          draft-richer-oauth-introspection-02.txt</td>
                                                          </tr>
                                                          <tr>
                                                          <th
                                                          align="RIGHT"
nowrap="nowrap" valign="BASELINE">Date: </th>
                                                          <td>Wed, 6 Feb
                                                          2013 11:24:20
                                                          -0800</td>
                                                          </tr>
                                                          <tr>
                                                          <th
                                                          align="RIGHT"
nowrap="nowrap" valign="BASELINE">From: </th>
                                                          <td><a
                                                          moz-do-not-send="true"
href="mailto:internet-drafts@ietf.org" target="_blank">&lt;internet-drafts@ietf.org&gt;</a></td>
                                                          </tr>
                                                          <tr>
                                                          <th
                                                          align="RIGHT"
nowrap="nowrap" valign="BASELINE">To: </th>
                                                          <td><a
                                                          moz-do-not-send="true"
href="mailto:jricher@mitre.org" target="_blank">&lt;jricher@mitre.org&gt;</a></td>
                                                          </tr>
                                                          </tbody>
                                                          </table>
                                                          <br>
                                                          <br>
                                                          <pre>A new version of I-D, draft-richer-oauth-introspection-02.txt
has been successfully submitted by Justin Richer and posted to the
IETF repository.

Filename:	 draft-richer-oauth-introspection
Revision:	 02
Title:		 OAuth Token Introspection
Creation date:	 2013-02-06
WG ID:		 Individual Submission
Number of pages: 6
URL:             <a moz-do-not-send="true" href="http://www.ietf.org/internet-drafts/draft-richer-oauth-introspection-02.txt" target="_blank">http://www.ietf.org/internet-drafts/draft-richer-oauth-introspection-02.txt</a>
Status:          <a moz-do-not-send="true" href="http://datatracker.ietf.org/doc/draft-richer-oauth-introspection" target="_blank">http://datatracker.ietf.org/doc/draft-richer-oauth-introspection</a>
Htmlized:        <a moz-do-not-send="true" href="http://tools.ietf.org/html/draft-richer-oauth-introspection-02" target="_blank">http://tools.ietf.org/html/draft-richer-oauth-introspection-02</a>
Diff:            <a moz-do-not-send="true" href="http://www.ietf.org/rfcdiff?url2=draft-richer-oauth-introspection-02" target="_blank">http://www.ietf.org/rfcdiff?url2=draft-richer-oauth-introspection-02</a>

Abstract:
   This specification defines a method for a client or protected
   resource to query an OAuth authorization server to determine meta-
   information about an OAuth token.


                                                                                  


The IETF Secretariat

</pre>
                                                          <br>
                                                          </div>
                                                          <br>
                                                          </div>
                                                          <br>
_______________________________________________<br>
                                                          OAuth mailing
                                                          list<br>
                                                          <a
                                                          moz-do-not-send="true"
href="mailto:OAuth@ietf.org" target="_blank">OAuth@ietf.org</a><br>
                                                          <a
                                                          moz-do-not-send="true"
href="https://www.ietf.org/mailman/listinfo/oauth" target="_blank">https://www.ietf.org/mailman/listinfo/oauth</a><br>
                                                          <br>
                                                          </blockquote>
                                                          </div>
                                                          <br>
                                                          <br
                                                          clear="all">
                                                          <div><br>
                                                          </div>
                                                          -- <br>
                                                          Thanks &amp;
                                                          Regards,<br>
                                                          Prabath
                                                          <div><br>
                                                          </div>
                                                          <div>Mobile :
                                                          <a
                                                          moz-do-not-send="true"
href="tel:%2B94%2071%20809%206732" value="+94718096732" target="_blank">+94
                                                          71 809 6732</a>&nbsp;<br>
                                                          <br>
                                                          <a
                                                          moz-do-not-send="true"
href="http://blog.facilelogin.com" target="_blank">http://blog.facilelogin.com</a><br>
                                                          <a
                                                          moz-do-not-send="true"
href="http://RampartFAQ.com" target="_blank">http://RampartFAQ.com</a></div>
                                                          </div>
                                                          </blockquote>
                                                          <br>
                                                          </div>
                                                          </div>
                                                          </div>
                                                          </blockquote>
                                                          </div>
                                                          <br>
                                                          <br
                                                          clear="all">
                                                          <div><br>
                                                          </div>
                                                          -- <br>
                                                          Thanks &amp;
                                                          Regards,<br>
                                                          Prabath
                                                          <div><br>
                                                          </div>
                                                          <div>Mobile :
                                                          <a
                                                          moz-do-not-send="true"
href="tel:%2B94%2071%20809%206732" value="+94718096732" target="_blank">+94
                                                          71 809 6732</a>&nbsp;<br>
                                                          <br>
                                                          <a
                                                          moz-do-not-send="true"
href="http://blog.facilelogin.com" target="_blank">http://blog.facilelogin.com</a><br>
                                                          <a
                                                          moz-do-not-send="true"
href="http://RampartFAQ.com" target="_blank">http://RampartFAQ.com</a></div>
                                                          </div>
                                                          </blockquote>
                                                          <br>
                                                          </div>
                                                        </div>
                                                      </div>
                                                    </blockquote>
                                                  </div>
                                                  <br>
                                                  <br clear="all">
                                                  <div><br>
                                                  </div>
                                                  -- <br>
                                                  Thanks &amp; Regards,<br>
                                                  Prabath
                                                  <div><br>
                                                  </div>
                                                  <div>Mobile : <a
                                                      moz-do-not-send="true"
href="tel:%2B94%2071%20809%206732" value="+94718096732" target="_blank">+94

                                                      71 809 6732</a>&nbsp;<br>
                                                    <br>
                                                    <a
                                                      moz-do-not-send="true"
href="http://blog.facilelogin.com" target="_blank">http://blog.facilelogin.com</a><br>
                                                    <a
                                                      moz-do-not-send="true"
href="http://RampartFAQ.com" target="_blank">http://RampartFAQ.com</a></div>
                                                </div>
                                              </blockquote>
                                              <br>
                                            </div>
                                          </div>
                                        </div>
                                      </blockquote>
                                    </div>
                                    <br>
                                    <br clear="all">
                                    <div><br>
                                    </div>
                                    -- <br>
                                    Thanks &amp; Regards,<br>
                                    Prabath
                                    <div><br>
                                    </div>
                                    <div>Mobile : <a
                                        moz-do-not-send="true"
                                        href="tel:%2B94%2071%20809%206732"
                                        value="+94718096732"
                                        target="_blank">+94 71 809 6732</a>&nbsp;<br>
                                      <br>
                                      <a moz-do-not-send="true"
                                        href="http://blog.facilelogin.com"
                                        target="_blank">http://blog.facilelogin.com</a><br>
                                      <a moz-do-not-send="true"
                                        href="http://RampartFAQ.com"
                                        target="_blank">http://RampartFAQ.com</a></div>
                                  </div>
                                </div>
                              </blockquote>
                              <blockquote type="cite">
                                <div><span>_______________________________________________</span><br>
                                  <span>OAuth mailing list</span><br>
                                  <span><a moz-do-not-send="true"
                                      href="mailto:OAuth@ietf.org"
                                      target="_blank">OAuth@ietf.org</a></span><br>
                                  <span><a moz-do-not-send="true"
                                      href="https://www.ietf.org/mailman/listinfo/oauth"
                                      target="_blank">https://www.ietf.org/mailman/listinfo/oauth</a></span><br>
                                </div>
                              </blockquote>
                            </blockquote>
                            <br>
                          </div>
                        </div>
                      </div>
                    </blockquote>
                  </div>
                  <br>
                  <br clear="all">
                  <div><br>
                  </div>
                  -- <br>
                  Thanks &amp; Regards,<br>
                  Prabath
                  <div><br>
                  </div>
                  <div>Mobile : <a moz-do-not-send="true"
                      href="tel:%2B94%2071%20809%206732"
                      value="+94718096732" target="_blank">+94 71 809
                      6732</a>&nbsp;<br>
                    <br>
                    <a moz-do-not-send="true"
                      href="http://blog.facilelogin.com" target="_blank">http://blog.facilelogin.com</a><br>
                    <a moz-do-not-send="true"
                      href="http://RampartFAQ.com" target="_blank">http://RampartFAQ.com</a></div>
                </div>
              </div>
            </div>
          </blockquote>
        </div>
        <br>
        <br clear="all">
        <div><br>
        </div>
        -- <br>
        Thanks &amp; Regards,<br>
        Prabath
        <div><br>
        </div>
        <div>Mobile : +94 71 809 6732&nbsp;<br>
          <br>
          <a moz-do-not-send="true" href="http://blog.facilelogin.com"
            target="_blank">http://blog.facilelogin.com</a><br>
          <a moz-do-not-send="true" href="http://RampartFAQ.com"
            target="_blank">http://RampartFAQ.com</a></div>
      </div>
    </blockquote>
    <br>
  </body>
</html>

--------------020305030005000806030609--

From ve7jtb@ve7jtb.com  Thu Feb 14 06:05:40 2013
Return-Path: <ve7jtb@ve7jtb.com>
X-Original-To: oauth@ietfa.amsl.com
Delivered-To: oauth@ietfa.amsl.com
Received: from localhost (localhost [127.0.0.1]) by ietfa.amsl.com (Postfix) with ESMTP id 2B65D21F87C4 for <oauth@ietfa.amsl.com>; Thu, 14 Feb 2013 06:05:40 -0800 (PST)
X-Virus-Scanned: amavisd-new at amsl.com
X-Spam-Flag: NO
X-Spam-Score: -3.372
X-Spam-Level: 
X-Spam-Status: No, score=-3.372 tagged_above=-999 required=5 tests=[AWL=0.227,  BAYES_00=-2.599, RCVD_IN_DNSWL_LOW=-1]
Received: from mail.ietf.org ([64.170.98.30]) by localhost (ietfa.amsl.com [127.0.0.1]) (amavisd-new, port 10024) with ESMTP id LkUKXxDJi4TA for <oauth@ietfa.amsl.com>; Thu, 14 Feb 2013 06:05:39 -0800 (PST)
Received: from mail-qc0-f176.google.com (mail-qc0-f176.google.com [209.85.216.176]) by ietfa.amsl.com (Postfix) with ESMTP id D983421F8488 for <oauth@ietf.org>; Thu, 14 Feb 2013 06:05:38 -0800 (PST)
Received: by mail-qc0-f176.google.com with SMTP id n41so868875qco.7 for <oauth@ietf.org>; Thu, 14 Feb 2013 06:05:38 -0800 (PST)
X-Google-DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=google.com; s=20120113; h=x-received:content-type:mime-version:subject:from:in-reply-to:date :cc:content-transfer-encoding:message-id:references:to:x-mailer :x-gm-message-state; bh=oLKFYbjyeT58FDGttp+n+IrzohKSeAjAsKw3/bPJBWI=; b=D/1t4+w3hWFFK3+uchh9TVHxKbZCmmCbWL6ZmGEOifpLV5MZaox7YKsgJh5HZT2CxT G1Qd28AwrU1of9dQZQDhsbN8b357/LCEv+U++wJg+aPc4DdgdpdT3e2LvCnhwiwKpTa+ jxvEW0aFHpwLqcjNJ0eI19/gw9UPyeNDMpclrnwmBubTI1Osa1M0veFYu2Mk976Vjsso 6+Z+iEt5glhEgdJ4+8N52cQSUBrtwdqVfbX30E2mRJOvI7vqGwgfvujjat/NPfTr5tLP 9R3bcvGkViNYlgpGmtpwN0H9d5LKutwoq9giqnvsB3NShS3I84H20p779fzcdwzG2VGx kxyg==
X-Received: by 10.224.168.144 with SMTP id u16mr652814qay.18.1360850738118; Thu, 14 Feb 2013 06:05:38 -0800 (PST)
Received: from [192.168.1.213] (190-20-16-126.baf.movistar.cl. [190.20.16.126]) by mx.google.com with ESMTPS id dt10sm18480046qab.0.2013.02.14.06.05.29 (version=TLSv1 cipher=ECDHE-RSA-RC4-SHA bits=128/128); Thu, 14 Feb 2013 06:05:36 -0800 (PST)
Content-Type: text/plain; charset=iso-2022-jp
Mime-Version: 1.0 (Mac OS X Mail 6.2 \(1499\))
From: John Bradley <ve7jtb@ve7jtb.com>
In-Reply-To: <CABzCy2BtzA-DJofpSkKJWrwfYtM8a+44VWe1Lx+f_ow=mW8kwg@mail.gmail.com>
Date: Thu, 14 Feb 2013 11:05:19 -0300
Content-Transfer-Encoding: quoted-printable
Message-Id: <4687F290-4855-49DE-892F-F9694BB211D4@ve7jtb.com>
References: <51195F36.6040705@mitre.org> <780F8C26-19A4-4301-B350-307D9FFF69CD@ve7jtb.com> <511BAA8B.8030309@mitre.org> <BEBDAFAC-28B0-4959-9FE5-34EC17FC318C@ve7jtb.com> <-4554688250617930935@unknownmsgid> <AF401161-0C7C-4E49-9F44-9982B312FF6D@ve7jtb.com> <CABzCy2BtzA-DJofpSkKJWrwfYtM8a+44VWe1Lx+f_ow=mW8kwg@mail.gmail.com>
To: Nat Sakimura <sakimura@gmail.com>
X-Mailer: Apple Mail (2.1499)
X-Gm-Message-State: ALoCoQmtKWzQRK3Pn7J8xemjm5012Cs+9NbSUB/Ka8neAMsxpOE9oHeulJs+v5gRYOUQLYMNSJlC
Cc: "oauth@ietf.org" <oauth@ietf.org>
Subject: Re: [OAUTH-WG] Registration: RESTful client lifecycle management
X-BeenThere: oauth@ietf.org
X-Mailman-Version: 2.1.12
Precedence: list
List-Id: OAUTH WG <oauth.ietf.org>
List-Unsubscribe: <https://www.ietf.org/mailman/options/oauth>, <mailto:oauth-request@ietf.org?subject=unsubscribe>
List-Archive: <http://www.ietf.org/mail-archive/web/oauth>
List-Post: <mailto:oauth@ietf.org>
List-Help: <mailto:oauth-request@ietf.org?subject=help>
List-Subscribe: <https://www.ietf.org/mailman/listinfo/oauth>, <mailto:oauth-request@ietf.org?subject=subscribe>
X-List-Received-Date: Thu, 14 Feb 2013 14:05:40 -0000

I agree with Tim that is the behaviour I would  expect to see with =
DELETE though I have a rd time seeing a server ever honouring it.

I guess that we need to clarify what happens with PUT and claims the =
server has defaults for, perhaps some that are not changeable by the =
client.  =20

Is not including a claim in a PUT the same as not including it in =
registration, and it is set to the default. =20
If you want to set a claim to null then you must explicitly include the =
claim with null as the value. That is the previous logic we had for =
replace as the client wasn't getting back all the config in the response =
and couldn't know about defaults it wasn't setting.

Perhaps PUT causes unsent claims to be interpreted as if they are sent =
with a null value (I think that is a likely to cause tears personally).

In ether case the client is not deleted and can still be recovered and =
the client_id and associated permissions are still active.

DELETE to be used correctly is I think going to delete the client_id and =
all associated tokens and cause a ripple effect in removing grants =
associated with that client_id. =20

It is a big difference and understanding what a AS is supposed to do to =
delete a client still seems a touch vague to me.   I understand the http =
verb but there is more to it than that if we want interoperability.

John

On 2013-02-14, at 12:31 AM, Nat Sakimura <sakimura@gmail.com> wrote:

> I thought your concern about DELETE was whether the client should be
> allowed to erase the registration data.
> I thought PUT with an empty values would achieve a similar effect.
> Or did you mean that with PUT, the server default kicks in and
> parameters are set to the defaults?
> If that is the case, they are quite different, I agree.
>=20
> On the effect of DELETE, +1 to Tim's comment.
>=20
> Nat
>=20
> 2013/2/14 John Bradley <ve7jtb@ve7jtb.com>:
>> DELETE is removing the record not resetting it to defaults.  They are =
quite diffrent.
>>=20
>> I want to agree on what the expected behaviour of DELETE is.   I =
think we have agreement on PUT and POST.
>>=20
>> The general not in that a client can DELETE it's record is a =
implication I don't like.  I think that is for the server to decide and =
if it is not actually deleting it then DELETE is the wrong verb to use.
>>=20
>> John B.
>>=20
>> On 2013-02-13, at 3:31 PM, Nat Sakimura <sakimura@gmail.com> wrote:
>>=20
>>> Generally speaking, mapping PUT to replace and POST to change is an
>>> acceptable practice so I am fine with it.
>>>=20
>>> Now, what I still do not understand is why you think it is fine to =
do
>>> PUT or POST and not DELETE. Doing PUT with empty content is almost =
the
>>> same as DELETE. Could you explain?
>>>=20
>>> =3Dnat via iPhone
>>>=20
>>> Feb 14, 2013 0:10=1B$B!"=1B(BJohn Bradley <ve7jtb@ve7jtb.com> =
=1B$B$N%a%C%;!<%8=1B(B:
>>>=20
>>>> I am not violently opposed to PUT as a option that completely =
replaces the resource setting all unsent claims back to the defaults.
>>>>=20
>>>> I don't have a good feeling about DELETE,  I think we still need =
more discussion on what it means, what privileges it takes to invoke it =
etc.
>>>> It could be a bad thing if we get wrong or is not implemented =
consistently.
>>>>=20
>>>> Personally I don't think a client should ever be able to DELETE =
it's record.
>>>>=20
>>>> I think marking a client_id as pending provisioning, suspended,  =
revoked etc is better and that can be done with a claim in the update =
endpoint.
>>>>=20
>>>> It should only be the server that deletes a record after satisfying =
it's audit requirements.
>>>>=20
>>>> John B.
>>>>=20
>>>> On 2013-02-13, at 12:00 PM, Justin Richer <jricher@mitre.org> =
wrote:
>>>>=20
>>>>> Would it be reasonable to mark the PUT and DELETE methods as =
optional for the server to implement, but with defined semantics if they =
do? I want to keep GET and POST(create) as mandatory, as I think that's =
the minimal set of functionality required.
>>>>>=20
>>>>> -- Justin
>>>>>=20
>>>>> On 02/11/2013 08:51 PM, John Bradley wrote:
>>>>>> I would always include the client_id on update.
>>>>>>=20
>>>>>> I think it is also us full to have other tokens used at the =
update endpoint.  I can see the master token used to update all the =
clients it has registered as part of API management.
>>>>>> Relying on the registration_access_token is probably a design =
that will cause trouble down the road.
>>>>>>=20
>>>>>> I think GET and POST are relatively clear.   I don't know about =
expelling PUT to developers.  I think POST with a client_id to a =
(separate discussion) update_uri works without restricting it to PUT.
>>>>>>=20
>>>>>> I think DELETE needs to be better understood.   I think a status =
that can be set for client lifecycle is better than letting a client =
delete a entry.
>>>>>> In some cases there will be more than one instance of a client =
and letting them know they have been turned off for a reason is better =
than making there registration disappear.
>>>>>> So for the moment I would levee out DELETE.
>>>>>>=20
>>>>>> John B.
>>>>>>=20
>>>>>> On 2013-02-11, at 6:14 PM, Justin Richer <jricher@mitre.org> =
wrote:
>>>>>>=20
>>>>>>> Draft -05 of OAuth Dynamic Client Registration [1] defines =
several operations that the client can take on its behalf as part of the =
registration process. These boil down to the basic CRUD operations that =
you find in many APIs: Create, Read, Update, Delete. Draft -00 defined =
only the "Create" operation, draft -01 through -04 added the "Update" =
operation, switched using the "operation=3D" parameter.
>>>>>>>=20
>>>>>>> Following several suggestions to do so on the list, the -05 =
draft defines these operations in terms of a RESTful API for the client. =
Namely:
>>>>>>>=20
>>>>>>> - HTTP POST to registration endpoint =3D> Create (register) a =
new client
>>>>>>> - HTTP PUT to update endpoint (with registration_access_token) =
=3D> Update the registered information for this client
>>>>>>> - HTTP GET to update endpoint (with registration_access_token) =
=3D> read the registered information for this client
>>>>>>> - HTTP DELETE to update endpoint (with =
registration_access_token) =3D> Delete (unregister/de-provision) this =
client
>>>>>>>=20
>>>>>>> The two main issues at stake here are: the addition of the READ =
and DELETE methods, and the use of HTTP verbs following a RESTful design =
philosophy.
>>>>>>>=20
>>>>>>> Pro:
>>>>>>> - RESTful APIs (with HTTP verbs to differentiate functionality) =
are the norm today
>>>>>>> - Full lifecycle management is common and is going to be =
expected by many users of this protocol in the wild
>>>>>>>=20
>>>>>>> Cons:
>>>>>>> - Update semantics are still under debate (full replace? patch?)
>>>>>>> - Somewhat increased complexity on the server to support all =
operations
>>>>>>> - Client has to understand all HTTP verbs for full access =
(though plain registration is just POST)
>>>>>>>=20
>>>>>>>=20
>>>>>>> Alternatives include using an operational switch parameter (like =
the old drafts), defining separate endpoints for every action, or doing =
all operations on a single endpoint using verbs to switch.
>>>>>>>=20
>>>>>>> -- Justin
>>>>>>>=20
>>>>>>> [1] http://tools.ietf.org/html/draft-ietf-oauth-dyn-reg-05
>>>>>>> _______________________________________________
>>>>>>> OAuth mailing list
>>>>>>> OAuth@ietf.org
>>>>>>> https://www.ietf.org/mailman/listinfo/oauth
>>>>=20
>>>> _______________________________________________
>>>> OAuth mailing list
>>>> OAuth@ietf.org
>>>> https://www.ietf.org/mailman/listinfo/oauth
>>=20
>=20
>=20
>=20
> --=20
> Nat Sakimura (=3Dnat)
> Chairman, OpenID Foundation
> http://nat.sakimura.org/
> @_nat_en


From jricher@mitre.org  Thu Feb 14 06:21:45 2013
Return-Path: <jricher@mitre.org>
X-Original-To: oauth@ietfa.amsl.com
Delivered-To: oauth@ietfa.amsl.com
Received: from localhost (localhost [127.0.0.1]) by ietfa.amsl.com (Postfix) with ESMTP id 1C98A21F87DF for <oauth@ietfa.amsl.com>; Thu, 14 Feb 2013 06:21:45 -0800 (PST)
X-Virus-Scanned: amavisd-new at amsl.com
X-Spam-Flag: NO
X-Spam-Score: -6.569
X-Spam-Level: 
X-Spam-Status: No, score=-6.569 tagged_above=-999 required=5 tests=[AWL=0.030,  BAYES_00=-2.599, RCVD_IN_DNSWL_MED=-4]
Received: from mail.ietf.org ([64.170.98.30]) by localhost (ietfa.amsl.com [127.0.0.1]) (amavisd-new, port 10024) with ESMTP id Qvo6JjfynSUr for <oauth@ietfa.amsl.com>; Thu, 14 Feb 2013 06:21:44 -0800 (PST)
Received: from smtpksrv1.mitre.org (smtpksrv1.mitre.org [198.49.146.77]) by ietfa.amsl.com (Postfix) with ESMTP id EE1EE21F863C for <oauth@ietf.org>; Thu, 14 Feb 2013 06:21:42 -0800 (PST)
Received: from smtpksrv1.mitre.org (localhost.localdomain [127.0.0.1]) by localhost (Postfix) with SMTP id 87BA61F2200; Thu, 14 Feb 2013 09:21:42 -0500 (EST)
Received: from IMCCAS04.MITRE.ORG (imccas04.mitre.org [129.83.29.81]) by smtpksrv1.mitre.org (Postfix) with ESMTP id 77FBA1F0535; Thu, 14 Feb 2013 09:21:42 -0500 (EST)
Received: from [10.146.15.29] (129.83.31.58) by IMCCAS04.MITRE.ORG (129.83.29.81) with Microsoft SMTP Server (TLS) id 14.2.318.4; Thu, 14 Feb 2013 09:21:42 -0500
Message-ID: <511CF2C9.9040604@mitre.org>
Date: Thu, 14 Feb 2013 09:20:57 -0500
From: Justin Richer <jricher@mitre.org>
User-Agent: Mozilla/5.0 (X11; Linux i686; rv:17.0) Gecko/20130106 Thunderbird/17.0.2
MIME-Version: 1.0
To: John Bradley <ve7jtb@ve7jtb.com>
References: <51195F36.6040705@mitre.org> <780F8C26-19A4-4301-B350-307D9FFF69CD@ve7jtb.com> <511BAA8B.8030309@mitre.org> <BEBDAFAC-28B0-4959-9FE5-34EC17FC318C@ve7jtb.com> <-4554688250617930935@unknownmsgid> <AF401161-0C7C-4E49-9F44-9982B312FF6D@ve7jtb.com> <CABzCy2BtzA-DJofpSkKJWrwfYtM8a+44VWe1Lx+f_ow=mW8kwg@mail.gmail.com> <4687F290-4855-49DE-892F-F9694BB211D4@ve7jtb.com>
In-Reply-To: <4687F290-4855-49DE-892F-F9694BB211D4@ve7jtb.com>
Content-Type: text/plain; charset="ISO-2022-JP"
Content-Transfer-Encoding: 7bit
X-Originating-IP: [129.83.31.58]
Cc: "oauth@ietf.org" <oauth@ietf.org>
Subject: Re: [OAUTH-WG] Registration: RESTful client lifecycle management
X-BeenThere: oauth@ietf.org
X-Mailman-Version: 2.1.12
Precedence: list
List-Id: OAUTH WG <oauth.ietf.org>
List-Unsubscribe: <https://www.ietf.org/mailman/options/oauth>, <mailto:oauth-request@ietf.org?subject=unsubscribe>
List-Archive: <http://www.ietf.org/mail-archive/web/oauth>
List-Post: <mailto:oauth@ietf.org>
List-Help: <mailto:oauth-request@ietf.org?subject=help>
List-Subscribe: <https://www.ietf.org/mailman/listinfo/oauth>, <mailto:oauth-request@ietf.org?subject=subscribe>
X-List-Received-Date: Thu, 14 Feb 2013 14:21:45 -0000

On 02/14/2013 09:05 AM, John Bradley wrote:
> I agree with Tim that is the behaviour I would  expect to see with DELETE though I have a rd time seeing a server ever honouring it.
>
> I guess that we need to clarify what happens with PUT and claims the server has defaults for, perhaps some that are not changeable by the client.   
>
> Is not including a claim in a PUT the same as not including it in registration, and it is set to the default.  
> If you want to set a claim to null then you must explicitly include the claim with null as the value. That is the previous logic we had for replace as the client wasn't getting back all the config in the response and couldn't know about defaults it wasn't setting.
>
> Perhaps PUT causes unsent claims to be interpreted as if they are sent with a null value (I think that is a likely to cause tears personally).
>
> In ether case the client is not deleted and can still be recovered and the client_id and associated permissions are still active.

What I had in mind from this conversation is something like this:

When sending an update, a client MUST send all metadata fields returned
from the server in its initial registration or previous read or update
call, including its client_id. A server MAY replace any missing or
invalid fields with default values, or it MAY return an error as
described in the Error Response section. A server MUST return all
provisioned fields in its response. A server MUST NOT change the
client_id field. A server MAY change the client_secret and/or
refresh_access_token fields.

>
> DELETE to be used correctly is I think going to delete the client_id and all associated tokens and cause a ripple effect in removing grants associated with that client_id.  

This is how I would interpret it as well. It's de-provisioning the
client, not resetting it.

-- Justin

>
> It is a big difference and understanding what a AS is supposed to do to delete a client still seems a touch vague to me.   I understand the http verb but there is more to it than that if we want interoperability.
>
> John
>
> On 2013-02-14, at 12:31 AM, Nat Sakimura <sakimura@gmail.com> wrote:
>
>> I thought your concern about DELETE was whether the client should be
>> allowed to erase the registration data.
>> I thought PUT with an empty values would achieve a similar effect.
>> Or did you mean that with PUT, the server default kicks in and
>> parameters are set to the defaults?
>> If that is the case, they are quite different, I agree.
>>
>> On the effect of DELETE, +1 to Tim's comment.
>>
>> Nat
>>
>> 2013/2/14 John Bradley <ve7jtb@ve7jtb.com>:
>>> DELETE is removing the record not resetting it to defaults.  They are quite diffrent.
>>>
>>> I want to agree on what the expected behaviour of DELETE is.   I think we have agreement on PUT and POST.
>>>
>>> The general not in that a client can DELETE it's record is a implication I don't like.  I think that is for the server to decide and if it is not actually deleting it then DELETE is the wrong verb to use.
>>>
>>> John B.
>>>
>>> On 2013-02-13, at 3:31 PM, Nat Sakimura <sakimura@gmail.com> wrote:
>>>
>>>> Generally speaking, mapping PUT to replace and POST to change is an
>>>> acceptable practice so I am fine with it.
>>>>
>>>> Now, what I still do not understand is why you think it is fine to do
>>>> PUT or POST and not DELETE. Doing PUT with empty content is almost the
>>>> same as DELETE. Could you explain?
>>>>
>>>> =nat via iPhone
>>>>
>>>> Feb 14, 2013 0:10$B!"(BJohn Bradley <ve7jtb@ve7jtb.com> $B$N%a%C%;!<%8(B:
>>>>
>>>>> I am not violently opposed to PUT as a option that completely replaces the resource setting all unsent claims back to the defaults.
>>>>>
>>>>> I don't have a good feeling about DELETE,  I think we still need more discussion on what it means, what privileges it takes to invoke it etc.
>>>>> It could be a bad thing if we get wrong or is not implemented consistently.
>>>>>
>>>>> Personally I don't think a client should ever be able to DELETE it's record.
>>>>>
>>>>> I think marking a client_id as pending provisioning, suspended,  revoked etc is better and that can be done with a claim in the update endpoint.
>>>>>
>>>>> It should only be the server that deletes a record after satisfying it's audit requirements.
>>>>>
>>>>> John B.
>>>>>
>>>>> On 2013-02-13, at 12:00 PM, Justin Richer <jricher@mitre.org> wrote:
>>>>>
>>>>>> Would it be reasonable to mark the PUT and DELETE methods as optional for the server to implement, but with defined semantics if they do? I want to keep GET and POST(create) as mandatory, as I think that's the minimal set of functionality required.
>>>>>>
>>>>>> -- Justin
>>>>>>
>>>>>> On 02/11/2013 08:51 PM, John Bradley wrote:
>>>>>>> I would always include the client_id on update.
>>>>>>>
>>>>>>> I think it is also us full to have other tokens used at the update endpoint.  I can see the master token used to update all the clients it has registered as part of API management.
>>>>>>> Relying on the registration_access_token is probably a design that will cause trouble down the road.
>>>>>>>
>>>>>>> I think GET and POST are relatively clear.   I don't know about expelling PUT to developers.  I think POST with a client_id to a (separate discussion) update_uri works without restricting it to PUT.
>>>>>>>
>>>>>>> I think DELETE needs to be better understood.   I think a status that can be set for client lifecycle is better than letting a client delete a entry.
>>>>>>> In some cases there will be more than one instance of a client and letting them know they have been turned off for a reason is better than making there registration disappear.
>>>>>>> So for the moment I would levee out DELETE.
>>>>>>>
>>>>>>> John B.
>>>>>>>
>>>>>>> On 2013-02-11, at 6:14 PM, Justin Richer <jricher@mitre.org> wrote:
>>>>>>>
>>>>>>>> Draft -05 of OAuth Dynamic Client Registration [1] defines several operations that the client can take on its behalf as part of the registration process. These boil down to the basic CRUD operations that you find in many APIs: Create, Read, Update, Delete. Draft -00 defined only the "Create" operation, draft -01 through -04 added the "Update" operation, switched using the "operation=" parameter.
>>>>>>>>
>>>>>>>> Following several suggestions to do so on the list, the -05 draft defines these operations in terms of a RESTful API for the client. Namely:
>>>>>>>>
>>>>>>>> - HTTP POST to registration endpoint => Create (register) a new client
>>>>>>>> - HTTP PUT to update endpoint (with registration_access_token) => Update the registered information for this client
>>>>>>>> - HTTP GET to update endpoint (with registration_access_token) => read the registered information for this client
>>>>>>>> - HTTP DELETE to update endpoint (with registration_access_token) => Delete (unregister/de-provision) this client
>>>>>>>>
>>>>>>>> The two main issues at stake here are: the addition of the READ and DELETE methods, and the use of HTTP verbs following a RESTful design philosophy.
>>>>>>>>
>>>>>>>> Pro:
>>>>>>>> - RESTful APIs (with HTTP verbs to differentiate functionality) are the norm today
>>>>>>>> - Full lifecycle management is common and is going to be expected by many users of this protocol in the wild
>>>>>>>>
>>>>>>>> Cons:
>>>>>>>> - Update semantics are still under debate (full replace? patch?)
>>>>>>>> - Somewhat increased complexity on the server to support all operations
>>>>>>>> - Client has to understand all HTTP verbs for full access (though plain registration is just POST)
>>>>>>>>
>>>>>>>>
>>>>>>>> Alternatives include using an operational switch parameter (like the old drafts), defining separate endpoints for every action, or doing all operations on a single endpoint using verbs to switch.
>>>>>>>>
>>>>>>>> -- Justin
>>>>>>>>
>>>>>>>> [1] http://tools.ietf.org/html/draft-ietf-oauth-dyn-reg-05
>>>>>>>> _______________________________________________
>>>>>>>> OAuth mailing list
>>>>>>>> OAuth@ietf.org
>>>>>>>> https://www.ietf.org/mailman/listinfo/oauth
>>>>> _______________________________________________
>>>>> OAuth mailing list
>>>>> OAuth@ietf.org
>>>>> https://www.ietf.org/mailman/listinfo/oauth
>>
>>
>> -- 
>> Nat Sakimura (=nat)
>> Chairman, OpenID Foundation
>> http://nat.sakimura.org/
>> @_nat_en


From prabath@wso2.com  Thu Feb 14 06:22:31 2013
Return-Path: <prabath@wso2.com>
X-Original-To: oauth@ietfa.amsl.com
Delivered-To: oauth@ietfa.amsl.com
Received: from localhost (localhost [127.0.0.1]) by ietfa.amsl.com (Postfix) with ESMTP id 8EA9E21F8802 for <oauth@ietfa.amsl.com>; Thu, 14 Feb 2013 06:22:29 -0800 (PST)
X-Virus-Scanned: amavisd-new at amsl.com
X-Spam-Flag: NO
X-Spam-Score: -2.606
X-Spam-Level: 
X-Spam-Status: No, score=-2.606 tagged_above=-999 required=5 tests=[AWL=0.370,  BAYES_00=-2.599, FM_FORGED_GMAIL=0.622, HTML_MESSAGE=0.001, RCVD_IN_DNSWL_LOW=-1]
Received: from mail.ietf.org ([64.170.98.30]) by localhost (ietfa.amsl.com [127.0.0.1]) (amavisd-new, port 10024) with ESMTP id 9V3Aj-qxccVp for <oauth@ietfa.amsl.com>; Thu, 14 Feb 2013 06:22:27 -0800 (PST)
Received: from mail-ea0-f171.google.com (mail-ea0-f171.google.com [209.85.215.171]) by ietfa.amsl.com (Postfix) with ESMTP id 8FDF421F863C for <oauth@ietf.org>; Thu, 14 Feb 2013 06:22:24 -0800 (PST)
Received: by mail-ea0-f171.google.com with SMTP id c13so925098eaa.30 for <oauth@ietf.org>; Thu, 14 Feb 2013 06:22:23 -0800 (PST)
X-Google-DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=google.com; s=20120113; h=mime-version:x-received:in-reply-to:references:date:message-id :subject:from:to:cc:content-type:x-gm-message-state; bh=noBQPz+oLzJh+xNWkGYTWIFqgxuAvJMhuK50y49uqj0=; b=iXsAtY546BUd1+ESVrwcgLqV7ROh3UNqF/mOcQqzVrPP3/5m2d2WlUdiFD/kMQadoe +vueETHhEOZbT7Yq/6GYy7hQHLe7OkbqajLdG3GWmdmfcBaa1vqpwK8QvphaqCkyWXXC JF3Hxkb/Bp0KCZOSSiAQzIC9pvn8wwcvncLg3aZWlHpp3fB6Jn4FrO65bFzMwzjjGUOu 2wP46Az+NqXW9iHUnO5HfiL3RUCFJ3G8G0rBtgWPe3ul+BpqNRDy0MuoSyqC4Xb7Ojxx Y0ALs+cRGBJ0LMJKS2jTTgvLEWZO0nMbAvVIUs8D4pKmhOqwHCq/xwFfw5O058LN0x9t 3RZA==
MIME-Version: 1.0
X-Received: by 10.14.207.73 with SMTP id m49mr18341794eeo.24.1360851743473; Thu, 14 Feb 2013 06:22:23 -0800 (PST)
Received: by 10.223.37.77 with HTTP; Thu, 14 Feb 2013 06:22:23 -0800 (PST)
In-Reply-To: <511CEEAA.3030801@mitre.org>
References: <20130206192420.32698.21027.idtracker@ietfa.amsl.com> <5112AE0B.1080501@mitre.org> <CAJV9qO_8-4FowrXK=ae-+xMjiJFP04ryVMLQ8SGUH8kp3PHrLg@mail.gmail.com> <5113C3AA.1040701@mitre.org> <CAJV9qO8BVV57eAb5kUNes15AYOpUKqw5XWQswh-FJA=b1pPgSA@mail.gmail.com> <5113DDB2.7060805@mitre.org> <CAJV9qO_gM1oera9ae9sqh9n17e-ZLKuC2pmsZwhq-RmFcMyqHA@mail.gmail.com> <51196777.6000502@mitre.org> <CAJV9qO-5bWZbNUfCmaqYBQoy-qwNaSZFOsO9GL3CrbSejwVTzw@mail.gmail.com> <F6595A40-6B4E-4718-ABB5-694CA975C4DB@maymount.com> <511A5062.5010108@mitre.org> <CAJV9qO_Mr87NX=KZRqCsWasQ1FuvDNBw14eS-TcPf_KRJztQFg@mail.gmail.com> <CAJV9qO-71-sM6kXOB6Fb_bvVkDBQ5JBbs8E5X=f-K=iEmGezRA@mail.gmail.com> <511CEEAA.3030801@mitre.org>
Date: Thu, 14 Feb 2013 19:52:23 +0530
Message-ID: <CAJV9qO-JSXgSTkw2_pdH0D-o-xDWGDqxx=PAWYtnTj4hOQXW4Q@mail.gmail.com>
From: Prabath Siriwardena <prabath@wso2.com>
To: Justin Richer <jricher@mitre.org>
Content-Type: multipart/alternative; boundary=047d7b343a7cc2fe8e04d5affc91
X-Gm-Message-State: ALoCoQn76MyRyuFlEuoiPJ9qxpveMg+DD6KYp1X68oVtj/HU1WXmxlyeUyfBmzLQq5uH+5O4P2mm
Cc: "oauth@ietf.org" <oauth@ietf.org>
Subject: Re: [OAUTH-WG] Fwd: New Version Notification for draft-richer-oauth-introspection-02.txt
X-BeenThere: oauth@ietf.org
X-Mailman-Version: 2.1.12
Precedence: list
List-Id: OAUTH WG <oauth.ietf.org>
List-Unsubscribe: <https://www.ietf.org/mailman/options/oauth>, <mailto:oauth-request@ietf.org?subject=unsubscribe>
List-Archive: <http://www.ietf.org/mail-archive/web/oauth>
List-Post: <mailto:oauth@ietf.org>
List-Help: <mailto:oauth-request@ietf.org?subject=help>
List-Subscribe: <https://www.ietf.org/mailman/listinfo/oauth>, <mailto:oauth-request@ietf.org?subject=subscribe>
X-List-Received-Date: Thu, 14 Feb 2013 14:22:31 -0000

--047d7b343a7cc2fe8e04d5affc91
Content-Type: text/plain; charset=ISO-8859-1

Both the client and the resource owner should be aware of the token type.

My argument is, if the authorization server to decide whether the token is
valid or not ( irrespective of who asked the question) - AS needs to know
the token type - because to validate a token AS should know the token type.

The token type could be, bearer or MAC or any other token type.

Thanks & regards,
-Prabath

On Thu, Feb 14, 2013 at 7:33 PM, Justin Richer <jricher@mitre.org> wrote:

>  What exactly are you suggesting be added to introspection? The
> "token_type_hint" is from the client to the server, but what you've asked
> for in terms of "token type" is from the server to the client. And there
> was never an answer to what exactly is meant by "token type" in this case,
> particularly because you seem to want to call out things like SAML and
> Bearer as separate types.
>
>  -- Justin
>
>
>
> On 02/14/2013 06:59 AM, Prabath Siriwardena wrote:
>
> I noticed that the latest Token Revocation draft [1] has introduced the
> parameter "token_type_hint". I would suggest the same here, as that would
> make what is meant by "valid" much clear..
>
>  [1]: http://tools.ietf.org/html/draft-ietf-oauth-revocation-05
>
>  Thanks & regards,
> -Prabath
>
> On Tue, Feb 12, 2013 at 9:35 PM, Prabath Siriwardena <prabath@wso2.com>wrote:
>
>> Hi Justin,
>>
>>  I doubt whether valid_token would make a difference..?
>>
>>  My initial argument is what is the validation criteria..? Validation
>> criteria depends on the token_type..
>>
>>  If we are talking only about metadata - then I believe "revoked",
>> "expired" would be more meaningful..
>>
>>  Thanks & regards,
>> -Prabath
>>
>>
>>  On Tue, Feb 12, 2013 at 7:53 PM, Justin Richer <jricher@mitre.org>wrote:
>>
>>>  OK, I can see the wisdom in changing this term.
>>>
>>> I picked "valid" because I wanted a simple "boolean" value that would
>>> require no additional parsing or string-matching on the client's behalf,
>>> and I'd like to stick with that. OAuth is built with the assumption that
>>> clients need to be able to recover from invalid tokens at any stage, so I
>>> think a simple yes/no is the right step here.
>>>
>>> That said, I think you're both right that "valid" seems to have caused a
>>> bit of confusion. I don't want to go with "revoked" because I'd rather have
>>> the "token is OK" be the positive boolean value.
>>>
>>> Would "valid_token" be more clear? Or do we need a different adjective
>>> all together?
>>>
>>>  -- Justin
>>>
>>>
>>> On 02/11/2013 08:02 PM, Richard Harrington wrote:
>>>
>>> Have you considered "status" instead of "valid"?  It could have values
>>> like "active", "expired", and "revoked".
>>>
>>>  Is it worthwhile including the status of the client also?  For
>>> example, a client application could be disabled, temporarily or
>>> permanently, and thus disabling its access tokens as well.
>>>
>>>
>>> On Feb 11, 2013, at 1:56 PM, Prabath Siriwardena <prabath@wso2.com>
>>> wrote:
>>>
>>>  I guess confusion is with 'valid' parameter is in the response..
>>>
>>>  I thought this will be helpful to standardize the communication
>>> between Resource Server and the Authorization Server..
>>>
>>>  I would suggest we completely remove "valid" from the response - or
>>> define it much clearly..
>>>
>>>  May be can add "revoked" with a boolean attribute..
>>>
>>>  Thanks & regards,
>>> -Prabath
>>>
>>> On Tue, Feb 12, 2013 at 3:19 AM, Justin Richer <jricher@mitre.org>wrote:
>>>
>>>>
>>>> On 02/08/2013 12:51 AM, Prabath Siriwardena wrote:
>>>>
>>>> Hi Justin,
>>>>
>>>>  I have couple of questions related to "valid" parameter...
>>>>
>>>>  This endpoint can be invoked by the Resource Server in runtime...
>>>>
>>>>
>>>> That's correct.
>>>>
>>>>
>>>>
>>>>  In that case what is exactly meant by the "resource_id" in request ?
>>>>
>>>>
>>>>  The resource_id field is a service-specific string that basically lets
>>>> the resource server provide some context to the request to the auth server.
>>>> There have been some other suggestions like client IP address, but I wanted
>>>> to put this one in because it seemed to be a common theme. The client is
>>>> trying to do *something* with the token, after all, and the rights,
>>>> permissions, and metadata associated with the token could change based on
>>>> that. Since the Introspection endpoint is all about getting that metadata
>>>> back to the PR, this seemed like a good idea.
>>>>
>>>>
>>>>
>>>>  IMO a token to be valid depends on set of criteria based on it's
>>>> type..
>>>>
>>>>  For a Bearer token..
>>>>
>>>>  1. Token should not be expired
>>>> 2. Token should not be revoked.
>>>> 3. The scope the token issued should match with the scope required for
>>>> the resource.
>>>>
>>>>  For a MAC token...
>>>>
>>>>  1. Token not expired (mac id)
>>>> 2. Token should not be revoked
>>>> 3. The scope the token issued should match with the scope required for
>>>> the resource.
>>>> 4. HMAC check should be valid
>>>>
>>>>  There are similar conditions for SAML bearer too..
>>>>
>>>>
>>>>  This isn't really true. The SAML bearer token is fully self-contained
>>>> and doesn't change based on other parameters in the message, unlike MAC.
>>>> Same with JWT. When it hands a SAML or JWT token to the AS, the PR has
>>>> given *everything* the server needs to check that token's validity and use.
>>>>
>>>> MAC signatures change with every message, and they're done across
>>>> several components of the HTTP message. Therefor, the HMAC check for MAC
>>>> style tokens will still need to be done by the protected resource.
>>>> Introspection would help in the case that the signature validated just
>>>> fine, but the token might have expired. Or you need to know what scopes
>>>> apply. Introspection isn't to fully validate the call to the protected
>>>> resource -- if that were the case, the PR would have to send some kind of
>>>> encapsulated version of the original request. Otherwise, the AS won't have
>>>> all of the information it needs to check the MAC.
>>>>
>>>>
>>>> I think what you're describing is ultimately *not* what the
>>>> introspection endpoint is intended to do. If that's unclear from the
>>>> document, can you please suggest text that would help clear the use case
>>>> up? I wouldn't want it to be ambiguous.
>>>>
>>>>  -- Justin
>>>>
>>>>
>>>>
>>>>  Thanks & regards,
>>>> -Prabath
>>>>
>>>>
>>>> On Thu, Feb 7, 2013 at 10:30 PM, Justin Richer <jricher@mitre.org>wrote:
>>>>
>>>>>  It validates the token, which would be either the token itself in the
>>>>> case of Bearer or the token "id" part of something more complex like MAC.
>>>>> It doesn't directly validate the usage of the token, that's still up to the
>>>>> PR to do that.
>>>>>
>>>>> I nearly added a "token type" field in this draft, but held back
>>>>> because there are several kinds of "token type" that people talk about in
>>>>> OAuth. First, there's "Bearer" vs. "MAC" vs. "HOK", or what have you. Then
>>>>> within Bearer you have "JWT" or "SAML" or "unstructured blob". Then you've
>>>>> also got "access" vs. "refresh" and other flavors of token, like the
>>>>> id_token in OpenID Connect.
>>>>>
>>>>> Thing is, the server running the introspection endpoint will probably
>>>>> know *all* of these. But should it tell the client? If so, which of the
>>>>> three, and what names should the fields be?
>>>>>
>>>>>  -- Justin
>>>>>
>>>>>
>>>>> On 02/07/2013 11:26 AM, Prabath Siriwardena wrote:
>>>>>
>>>>> Okay.. I was thinking this could be used as a way to validate the
>>>>> token as well. BTW even in this case shouldn't communicate the type of
>>>>> token to AS? For example in the case of SAML profile - it could be SAML
>>>>> token..
>>>>>
>>>>>  Thanks & regards,
>>>>> -Prabath
>>>>>
>>>>> On Thu, Feb 7, 2013 at 8:39 PM, Justin Richer <jricher@mitre.org>wrote:
>>>>>
>>>>>>  "valid" might not be the best term, but it's meant to be a field
>>>>>> where the server says "yes this token is still good" or "no this token
>>>>>> isn't good anymore". We could instead do this with HTTP codes or something
>>>>>> but I went with a pure JSON response.
>>>>>>
>>>>>>  -- Justin
>>>>>>
>>>>>>
>>>>>> On 02/06/2013 10:47 PM, Prabath Siriwardena wrote:
>>>>>>
>>>>>> Hi Justin,
>>>>>>
>>>>>>  I believe this is addressing one of the key missing part in OAuth
>>>>>> 2.0...
>>>>>>
>>>>>>  One question - I guess this was discussed already...
>>>>>>
>>>>>>  In the spec - in the introspection response it has the attribute
>>>>>> "valid" - this is basically the validity of the token provided in the
>>>>>> request.
>>>>>>
>>>>>>  Validation criteria depends on the token and well as token type (
>>>>>> Bearer, MAC..).
>>>>>>
>>>>>>  In the spec it seems like it's coupled with Bearer token type...
>>>>>> But I guess, by adding "token_type" to the request we can remove this
>>>>>> dependency.
>>>>>>
>>>>>>  WDYT..?
>>>>>>
>>>>>>  Thanks & regards,
>>>>>> -Prabath
>>>>>>
>>>>>> On Thu, Feb 7, 2013 at 12:54 AM, Justin Richer <jricher@mitre.org>wrote:
>>>>>>
>>>>>>>  Updated introspection draft based on recent comments. Changes
>>>>>>> include:
>>>>>>>
>>>>>>>  - "scope" return parameter now follows RFC6749 format instead of
>>>>>>> JSON array
>>>>>>>  - "subject" -> "sub", and "audience" -> "aud", to be parallel with
>>>>>>> JWT claims
>>>>>>>  - clarified what happens if the authentication is bad
>>>>>>>
>>>>>>>  -- Justin
>>>>>>>
>>>>>>>
>>>>>>> -------- Original Message --------  Subject: New Version
>>>>>>> Notification for draft-richer-oauth-introspection-02.txt  Date: Wed,
>>>>>>> 6 Feb 2013 11:24:20 -0800  From: <internet-drafts@ietf.org><internet-drafts@ietf.org>  To:
>>>>>>> <jricher@mitre.org> <jricher@mitre.org>
>>>>>>>
>>>>>>> A new version of I-D, draft-richer-oauth-introspection-02.txt
>>>>>>> has been successfully submitted by Justin Richer and posted to the
>>>>>>> IETF repository.
>>>>>>>
>>>>>>> Filename:	 draft-richer-oauth-introspection
>>>>>>> Revision:	 02
>>>>>>> Title:		 OAuth Token Introspection
>>>>>>> Creation date:	 2013-02-06
>>>>>>> WG ID:		 Individual Submission
>>>>>>> Number of pages: 6
>>>>>>> URL:             http://www.ietf.org/internet-drafts/draft-richer-oauth-introspection-02.txt
>>>>>>> Status:          http://datatracker.ietf.org/doc/draft-richer-oauth-introspection
>>>>>>> Htmlized:        http://tools.ietf.org/html/draft-richer-oauth-introspection-02
>>>>>>> Diff:            http://www.ietf.org/rfcdiff?url2=draft-richer-oauth-introspection-02
>>>>>>>
>>>>>>> Abstract:
>>>>>>>    This specification defines a method for a client or protected
>>>>>>>    resource to query an OAuth authorization server to determine meta-
>>>>>>>    information about an OAuth token.
>>>>>>>
>>>>>>>
>>>>>>>
>>>>>>>
>>>>>>>
>>>>>>> The IETF Secretariat
>>>>>>>
>>>>>>>
>>>>>>>
>>>>>>>
>>>>>>>
>>>>>>> _______________________________________________
>>>>>>> OAuth mailing list
>>>>>>> OAuth@ietf.org
>>>>>>> https://www.ietf.org/mailman/listinfo/oauth
>>>>>>>
>>>>>>>
>>>>>>
>>>>>>
>>>>>>  --
>>>>>> Thanks & Regards,
>>>>>> Prabath
>>>>>>
>>>>>>  Mobile : +94 71 809 6732 <%2B94%2071%20809%206732>
>>>>>>
>>>>>> http://blog.facilelogin.com
>>>>>> http://RampartFAQ.com
>>>>>>
>>>>>>
>>>>>>
>>>>>
>>>>>
>>>>>  --
>>>>> Thanks & Regards,
>>>>> Prabath
>>>>>
>>>>>  Mobile : +94 71 809 6732 <%2B94%2071%20809%206732>
>>>>>
>>>>> http://blog.facilelogin.com
>>>>> http://RampartFAQ.com
>>>>>
>>>>>
>>>>>
>>>>
>>>>
>>>>  --
>>>> Thanks & Regards,
>>>> Prabath
>>>>
>>>>  Mobile : +94 71 809 6732 <%2B94%2071%20809%206732>
>>>>
>>>> http://blog.facilelogin.com
>>>> http://RampartFAQ.com
>>>>
>>>>
>>>>
>>>
>>>
>>>  --
>>> Thanks & Regards,
>>> Prabath
>>>
>>>  Mobile : +94 71 809 6732
>>>
>>> http://blog.facilelogin.com
>>> http://RampartFAQ.com
>>>
>>>  _______________________________________________
>>> OAuth mailing list
>>> OAuth@ietf.org
>>> https://www.ietf.org/mailman/listinfo/oauth
>>>
>>>
>>>
>>
>>
>>  --
>> Thanks & Regards,
>> Prabath
>>
>>  Mobile : +94 71 809 6732 <%2B94%2071%20809%206732>
>>
>> http://blog.facilelogin.com
>> http://RampartFAQ.com
>>
>
>
>
>  --
> Thanks & Regards,
> Prabath
>
>  Mobile : +94 71 809 6732
>
> http://blog.facilelogin.com
> http://RampartFAQ.com
>
>
>


-- 
Thanks & Regards,
Prabath

Mobile : +94 71 809 6732

http://blog.facilelogin.com
http://RampartFAQ.com

--047d7b343a7cc2fe8e04d5affc91
Content-Type: text/html; charset=ISO-8859-1
Content-Transfer-Encoding: quoted-printable

Both the client and the resource owner should be aware of the token type.<d=
iv><br></div><div>My argument is, if the authorization server to decide whe=
ther the token is valid or not ( irrespective of who asked the question) - =
AS needs to know the token type - because to validate a token AS should kno=
w the token type.</div>
<div><br></div><div>The token type could be, bearer or MAC or any other tok=
en type.</div><div><br></div><div>Thanks &amp; regards,</div><div>-Prabath<=
br><br><div class=3D"gmail_quote">On Thu, Feb 14, 2013 at 7:33 PM, Justin R=
icher <span dir=3D"ltr">&lt;<a href=3D"mailto:jricher@mitre.org" target=3D"=
_blank">jricher@mitre.org</a>&gt;</span> wrote:<br>
<blockquote class=3D"gmail_quote" style=3D"margin:0 0 0 .8ex;border-left:1p=
x #ccc solid;padding-left:1ex">
 =20
   =20
 =20
  <div bgcolor=3D"#FFFFFF" text=3D"#000000">
    What exactly are you suggesting be added to introspection? The
    &quot;token_type_hint&quot; is from the client to the server, but what =
you&#39;ve
    asked for in terms of &quot;token type&quot; is from the server to the =
client.
    And there was never an answer to what exactly is meant by &quot;token
    type&quot; in this case, particularly because you seem to want to call
    out things like SAML and Bearer as separate types. <br><span class=3D"H=
OEnZb"><font color=3D"#888888">
    <br>
    =A0-- Justin</font></span><div><div class=3D"h5"><br>
    <br>
    <br>
    <div>On 02/14/2013 06:59 AM, Prabath
      Siriwardena wrote:<br>
    </div>
    <blockquote type=3D"cite">
     =20
      I noticed that the latest Token Revocation draft [1] has
      introduced the parameter &quot;token_type_hint&quot;. I would suggest=
 the
      same here, as that would make what is meant by &quot;valid&quot; much
      clear..
      <div><br>
      </div>
      <div>[1]:=A0<a href=3D"http://tools.ietf.org/html/draft-ietf-oauth-re=
vocation-05" style=3D"color:rgb(17,85,204);font-size:12.727272033691406px;f=
ont-family:arial,sans-serif" target=3D"_blank">http://tools.ietf.org/html/d=
raft-ietf-oauth-revocation-05</a></div>

      <div><br>
      </div>
      <div>Thanks &amp; regards,</div>
      <div>-Prabath<br>
        <br>
        <div class=3D"gmail_quote">On Tue, Feb 12, 2013 at 9:35 PM,
          Prabath Siriwardena <span dir=3D"ltr">&lt;<a href=3D"mailto:praba=
th@wso2.com" target=3D"_blank">prabath@wso2.com</a>&gt;</span> wrote:<br>
          <blockquote class=3D"gmail_quote" style=3D"margin:0 0 0 .8ex;bord=
er-left:1px #ccc solid;padding-left:1ex">Hi Justin,
            <div><br>
            </div>
            <div>I doubt whether valid_token would make a difference..?</di=
v>
            <div><br>
            </div>
            <div>My initial argument is what is the validation
              criteria..? Validation criteria depends on the
              token_type..</div>
            <div>
              <br>
            </div>
            <div>If we are talking only about metadata - then I believe
              &quot;revoked&quot;, &quot;expired&quot; would be more meanin=
gful..</div>
            <div><br>
            </div>
            <div>Thanks &amp; regards,</div>
            <div>-Prabath
              <div>
                <div>
                  <br>
                  <br>
                  <div class=3D"gmail_quote">
                    On Tue, Feb 12, 2013 at 7:53 PM, Justin Richer <span di=
r=3D"ltr">&lt;<a href=3D"mailto:jricher@mitre.org" target=3D"_blank">jriche=
r@mitre.org</a>&gt;</span>
                    wrote:<br>
                    <blockquote class=3D"gmail_quote" style=3D"margin:0 0 0=
 .8ex;border-left:1px #ccc solid;padding-left:1ex">
                      <div bgcolor=3D"#FFFFFF" text=3D"#000000"> OK, I can
                        see the wisdom in changing this term. <br>
                        <br>
                        I picked &quot;valid&quot; because I wanted a simpl=
e
                        &quot;boolean&quot; value that would require no add=
itional
                        parsing or string-matching on the client&#39;s
                        behalf, and I&#39;d like to stick with that. OAuth
                        is built with the assumption that clients need
                        to be able to recover from invalid tokens at any
                        stage, so I think a simple yes/no is the right
                        step here. <br>
                        <br>
                        That said, I think you&#39;re both right that
                        &quot;valid&quot; seems to have caused a bit of con=
fusion.
                        I don&#39;t want to go with &quot;revoked&quot; bec=
ause I&#39;d
                        rather have the &quot;token is OK&quot; be the posi=
tive
                        boolean value. <br>
                        <br>
                        Would &quot;valid_token&quot; be more clear? Or do =
we need
                        a different adjective all together?<span><font colo=
r=3D"#888888"><br>
                            <br>
                            =A0-- Justin</font></span>
                        <div>
                          <div><br>
                            <br>
                            <div>On 02/11/2013 08:02 PM, Richard
                              Harrington wrote:<br>
                            </div>
                            <blockquote type=3D"cite">
                              <div>Have you considered &quot;status&quot; i=
nstead
                                of &quot;valid&quot;? =A0It could have valu=
es like
                                &quot;active&quot;, &quot;expired&quot;, an=
d &quot;revoked&quot;.</div>
                              <div><br>
                              </div>
                              <div>Is it worthwhile including the status
                                of the client also? =A0For example, a
                                client application could be disabled,
                                temporarily or permanently, and thus
                                disabling its access tokens as well.</div>
                              <div><br>
                              </div>
                              <div><br>
                                On Feb 11, 2013, at 1:56 PM, Prabath
                                Siriwardena &lt;<a href=3D"mailto:prabath@w=
so2.com" target=3D"_blank">prabath@wso2.com</a>&gt;

                                wrote:<br>
                                <br>
                              </div>
                              <blockquote type=3D"cite">
                                <div>I guess confusion is with &#39;valid&#=
39;
                                  parameter is in the response..
                                  <div><br>
                                  </div>
                                  <div>I thought this will be helpful
                                    to=A0standardize=A0the communication
                                    between Resource Server and the
                                    Authorization Server..</div>
                                  <div><br>
                                  </div>
                                  <div>I would suggest we completely
                                    remove &quot;valid&quot; from the respo=
nse -
                                    or define it much clearly..</div>
                                  <div><br>
                                  </div>
                                  <div>May be can add &quot;revoked&quot; w=
ith a
                                    boolean attribute..</div>
                                  <div><br>
                                  </div>
                                  <div>Thanks &amp; regards,</div>
                                  <div>-Prabath<br>
                                    <br>
                                    <div class=3D"gmail_quote">On Tue, Feb
                                      12, 2013 at 3:19 AM, Justin Richer
                                      <span dir=3D"ltr">&lt;<a href=3D"mail=
to:jricher@mitre.org" target=3D"_blank">jricher@mitre.org</a>&gt;</span>
                                      wrote:<br>
                                      <blockquote class=3D"gmail_quote" sty=
le=3D"margin:0 0 0 .8ex;border-left:1px #ccc solid;padding-left:1ex">
                                        <div bgcolor=3D"#FFFFFF" text=3D"#0=
00000">
                                          <div> <br>
                                            <div>On 02/08/2013 12:51 AM,
                                              Prabath Siriwardena wrote:<br=
>
                                            </div>
                                          </div>
                                          <blockquote type=3D"cite">
                                            Hi=A0Justin,
                                            <div><br>
                                            </div>
                                            <div>
                                              <div>I have couple of
                                                questions related to
                                                &quot;valid&quot; parameter=
...</div>
                                              <div><br>
                                              </div>
                                              <div>This endpoint can be
                                                invoked by the Resource
                                                Server in runtime...</div>
                                            </div>
                                          </blockquote>
                                          <br>
                                          That&#39;s correct.
                                          <div><br>
                                            <br>
                                            <blockquote type=3D"cite">
                                              <div><br>
                                              </div>
                                              <div>In that case what is
                                                exactly meant by the
                                                &quot;resource_id&quot; in =
request
                                                ?</div>
                                            </blockquote>
                                            <br>
                                          </div>
                                          The resource_id field is a
                                          service-specific string that
                                          basically lets the resource
                                          server provide some context to
                                          the request to the auth
                                          server. There have been some
                                          other suggestions like client
                                          IP address, but I wanted to
                                          put this one in because it
                                          seemed to be a common theme.
                                          The client is trying to do
                                          *something* with the token,
                                          after all, and the rights,
                                          permissions, and metadata
                                          associated with the token
                                          could change based on that.
                                          Since the Introspection
                                          endpoint is all about getting
                                          that metadata back to the PR,
                                          this seemed like a good idea.
                                          <div><br>
                                            <br>
                                            <blockquote type=3D"cite">
                                              <div><br>
                                              </div>
                                              <div>IMO a token to be
                                                valid depends on set of
                                                criteria based on it&#39;s
                                                type..</div>
                                              <div><br>
                                              </div>
                                              <div>For a Bearer token..</di=
v>
                                              <div><br>
                                              </div>
                                              <div>1. Token should not
                                                be expired</div>
                                              <div>2. Token should not
                                                be revoked.</div>
                                              <div>3. The scope the
                                                token issued should
                                                match with the scope
                                                required for the
                                                resource.</div>
                                              <div><br>
                                              </div>
                                              <div>For a MAC token...</div>
                                              <div><br>
                                              </div>
                                              <div>1. Token not expired
                                                (mac id)</div>
                                              <div>2. Token should not
                                                be revoked</div>
                                              <div>3. The scope the
                                                token issued should
                                                match with the scope
                                                required for the
                                                resource.</div>
                                              <div>4. HMAC check should
                                                be valid</div>
                                              <div><br>
                                              </div>
                                              There are similar
                                              conditions for SAML bearer
                                              too..</blockquote>
                                            <br>
                                          </div>
                                          This isn&#39;t really true. The
                                          SAML bearer token is fully
                                          self-contained and doesn&#39;t
                                          change based on other
                                          parameters in the message,
                                          unlike MAC. Same with JWT.
                                          When it hands a SAML or JWT
                                          token to the AS, the PR has
                                          given *everything* the server
                                          needs to check that token&#39;s
                                          validity and use. <br>
                                          <br>
                                          MAC signatures change with
                                          every message, and they&#39;re
                                          done across several components
                                          of the HTTP message. Therefor,
                                          the HMAC check for MAC style
                                          tokens will still need to be
                                          done by the protected
                                          resource. Introspection would
                                          help in the case that the
                                          signature validated just fine,
                                          but the token might have
                                          expired. Or you need to know
                                          what scopes apply.
                                          Introspection isn&#39;t to fully
                                          validate the call to the
                                          protected resource -- if that
                                          were the case, the PR would
                                          have to send some kind of
                                          encapsulated version of the
                                          original request. Otherwise,
                                          the AS won&#39;t have all of the
                                          information it needs to check
                                          the MAC.<br>
                                          <br>
                                          <br>
                                          I think what you&#39;re describin=
g
                                          is ultimately *not* what the
                                          introspection endpoint is
                                          intended to do. If that&#39;s
                                          unclear from the document, can
                                          you please suggest text that
                                          would help clear the use case
                                          up? I wouldn&#39;t want it to be
                                          ambiguous.<span><font color=3D"#8=
88888"><br>
                                              <br>
                                              =A0-- Justin</font></span>
                                          <div>
                                            <div><br>
                                              <br>
                                              <blockquote type=3D"cite">
                                                <div><br>
                                                </div>
                                                <div>Thanks &amp;
                                                  regards,</div>
                                                <div>-Prabath</div>
                                                <div><br>
                                                </div>
                                                <div><br>
                                                  <div class=3D"gmail_quote=
">On
                                                    Thu, Feb 7, 2013 at
                                                    10:30 PM, Justin
                                                    Richer <span dir=3D"ltr=
">&lt;<a href=3D"mailto:jricher@mitre.org" target=3D"_blank">jricher@mitre.=
org</a>&gt;</span>
                                                    wrote:<br>
                                                    <blockquote class=3D"gm=
ail_quote" style=3D"margin:0 0 0 .8ex;border-left:1px #ccc solid;padding-le=
ft:1ex">
                                                      <div bgcolor=3D"#FFFF=
FF" text=3D"#000000">
                                                        It validates the
                                                        token, which
                                                        would be either
                                                        the token itself
                                                        in the case of
                                                        Bearer or the
                                                        token &quot;id&quot=
; part
                                                        of something
                                                        more complex
                                                        like MAC. It
                                                        doesn&#39;t directl=
y
                                                        validate the
                                                        usage of the
                                                        token, that&#39;s
                                                        still up to the
                                                        PR to do that.<br>
                                                        <br>
                                                        I nearly added a
                                                        &quot;token type&qu=
ot;
                                                        field in this
                                                        draft, but held
                                                        back because
                                                        there are
                                                        several kinds of
                                                        &quot;token type&qu=
ot;
                                                        that people talk
                                                        about in OAuth.
                                                        First, there&#39;s
                                                        &quot;Bearer&quot; =
vs.
                                                        &quot;MAC&quot; vs.=
 &quot;HOK&quot;,
                                                        or what have
                                                        you. Then within
                                                        Bearer you have
                                                        &quot;JWT&quot; or =
&quot;SAML&quot;
                                                        or &quot;unstructur=
ed
                                                        blob&quot;. Then
                                                        you&#39;ve also got
                                                        &quot;access&quot; =
vs.
                                                        &quot;refresh&quot;=
 and
                                                        other flavors of
                                                        token, like the
                                                        id_token in
                                                        OpenID Connect.
                                                        <br>
                                                        <br>
                                                        Thing is, the
                                                        server running
                                                        the
                                                        introspection
                                                        endpoint will
                                                        probably know
                                                        *all* of these.
                                                        But should it
                                                        tell the client?
                                                        If so, which of
                                                        the three, and
                                                        what names
                                                        should the
                                                        fields be?<span><fo=
nt color=3D"#888888"><br>
                                                          <br>
                                                          =A0-- Justin</fon=
t></span>
                                                        <div>
                                                          <div><br>
                                                          <br>
                                                          <div>On
                                                          02/07/2013
                                                          11:26 AM,
                                                          Prabath
                                                          Siriwardena
                                                          wrote:<br>
                                                          </div>
                                                          <blockquote type=
=3D"cite">
                                                          Okay.. I was
                                                          thinking this
                                                          could be used
                                                          as a way to
                                                          validate the
                                                          token as well.
                                                          BTW even in
                                                          this case
                                                          shouldn&#39;t
                                                          communicate
                                                          the type of
                                                          token to AS?
                                                          For example in
                                                          the case of
                                                          SAML profile -
                                                          it could be
                                                          SAML token..
                                                          <div> <br>
                                                          </div>
                                                          <div>Thanks
                                                          &amp; regards,</d=
iv>
                                                          <div>-Prabath<br>
                                                          <br>
                                                          <div class=3D"gma=
il_quote">On
                                                          Thu, Feb 7,
                                                          2013 at 8:39
                                                          PM, Justin
                                                          Richer <span dir=
=3D"ltr">&lt;<a href=3D"mailto:jricher@mitre.org" target=3D"_blank">jricher=
@mitre.org</a>&gt;</span>
                                                          wrote:<br>
                                                          <blockquote class=
=3D"gmail_quote" style=3D"margin:0 0 0 .8ex;border-left:1px #ccc solid;padd=
ing-left:1ex">
                                                          <div bgcolor=3D"#=
FFFFFF" text=3D"#000000">
                                                          &quot;valid&quot;=
 might
                                                          not be the
                                                          best term, but
                                                          it&#39;s meant to
                                                          be a field
                                                          where the
                                                          server says
                                                          &quot;yes this
                                                          token is still
                                                          good&quot; or &qu=
ot;no
                                                          this token
                                                          isn&#39;t good
                                                          anymore&quot;. We
                                                          could instead
                                                          do this with
                                                          HTTP codes or
                                                          something but
                                                          I went with a
                                                          pure JSON
                                                          response.<span><f=
ont color=3D"#888888"><br>
                                                          <br>
                                                          =A0-- Justin</fon=
t></span>
                                                          <div>
                                                          <div><br>
                                                          <br>
                                                          <div>On
                                                          02/06/2013
                                                          10:47 PM,
                                                          Prabath
                                                          Siriwardena
                                                          wrote:<br>
                                                          </div>
                                                          <blockquote type=
=3D"cite">
                                                          Hi Justin,
                                                          <div><br>
                                                          </div>
                                                          <div>I believe
                                                          this is
                                                          addressing one
                                                          of the key
                                                          missing part
                                                          in OAuth
                                                          2.0...</div>
                                                          <div><br>
                                                          </div>
                                                          <div>One
                                                          question - I
                                                          guess this was
                                                          discussed
                                                          already...</div>
                                                          <div><br>
                                                          </div>
                                                          <div>In the
                                                          spec - in the
                                                          introspection
                                                          response it
                                                          has the
                                                          attribute
                                                          &quot;valid&quot;=
 - this
                                                          is basically
                                                          the validity
                                                          of the token
                                                          provided in
                                                          the request.</div=
>
                                                          <div><br>
                                                          </div>
                                                          <div>Validation=
=A0criteria

                                                          depends on the
                                                          token and well
                                                          as token type
                                                          ( Bearer,
                                                          MAC..).</div>
                                                          <div><br>
                                                          </div>
                                                          <div>In the
                                                          spec it seems
                                                          like it&#39;s
                                                          coupled with
                                                          Bearer token
                                                          type... But I
                                                          guess, by
                                                          adding
                                                          &quot;token_type&=
quot;
                                                          to the request
                                                          we can remove
                                                          this
                                                          dependency.</div>
                                                          <div><br>
                                                          </div>
                                                          <div>WDYT..?</div=
>
                                                          <div><br>
                                                          </div>
                                                          <div>Thanks
                                                          &amp; regards,</d=
iv>
                                                          <div>-Prabath=A0<=
/div>
                                                          <div><br>
                                                          <div class=3D"gma=
il_quote">On

                                                          Thu, Feb 7,
                                                          2013 at 12:54
                                                          AM, Justin
                                                          Richer <span dir=
=3D"ltr">&lt;<a href=3D"mailto:jricher@mitre.org" target=3D"_blank">jricher=
@mitre.org</a>&gt;</span>
                                                          wrote:<br>
                                                          <blockquote class=
=3D"gmail_quote" style=3D"margin:0 0 0 .8ex;border-left:1px #ccc solid;padd=
ing-left:1ex">
                                                          <div bgcolor=3D"#=
FFFFFF" text=3D"#000000">
                                                          Updated
                                                          introspection
                                                          draft based on
                                                          recent
                                                          comments.
                                                          Changes
                                                          include:<br>
                                                          <br>
                                                          =A0- &quot;scope&=
quot;
                                                          return
                                                          parameter now
                                                          follows
                                                          RFC6749 format
                                                          instead of
                                                          JSON array<br>
                                                          =A0- &quot;subjec=
t&quot;
                                                          -&gt; &quot;sub&q=
uot;,
                                                          and &quot;audienc=
e&quot;
                                                          -&gt; &quot;aud&q=
uot;,
                                                          to be parallel
                                                          with JWT
                                                          claims<br>
                                                          =A0- clarified
                                                          what happens
                                                          if the
                                                          authentication
                                                          is bad<br>
                                                          <br>
                                                          =A0-- Justin<br>
                                                          <div><br>
                                                          <br>
                                                          --------
                                                          Original
                                                          Message
                                                          --------
                                                          <table border=3D"=
0" cellpadding=3D"0" cellspacing=3D"0">
                                                          <tbody>
                                                          <tr>
                                                          <th align=3D"RIGH=
T" nowrap valign=3D"BASELINE">Subject: </th>
                                                          <td>New
                                                          Version
                                                          Notification
                                                          for
                                                          draft-richer-oaut=
h-introspection-02.txt</td>
                                                          </tr>
                                                          <tr>
                                                          <th align=3D"RIGH=
T" nowrap valign=3D"BASELINE">Date: </th>
                                                          <td>Wed, 6 Feb
                                                          2013 11:24:20
                                                          -0800</td>
                                                          </tr>
                                                          <tr>
                                                          <th align=3D"RIGH=
T" nowrap valign=3D"BASELINE">From: </th>
                                                          <td><a href=3D"ma=
ilto:internet-drafts@ietf.org" target=3D"_blank">&lt;internet-drafts@ietf.o=
rg&gt;</a></td>
                                                          </tr>
                                                          <tr>
                                                          <th align=3D"RIGH=
T" nowrap valign=3D"BASELINE">To: </th>
                                                          <td><a href=3D"ma=
ilto:jricher@mitre.org" target=3D"_blank">&lt;jricher@mitre.org&gt;</a></td=
>
                                                          </tr>
                                                          </tbody>
                                                          </table>
                                                          <br>
                                                          <br>
                                                          <pre>A new versio=
n of I-D, draft-richer-oauth-introspection-02.txt
has been successfully submitted by Justin Richer and posted to the
IETF repository.

Filename:	 draft-richer-oauth-introspection
Revision:	 02
Title:		 OAuth Token Introspection
Creation date:	 2013-02-06
WG ID:		 Individual Submission
Number of pages: 6
URL:             <a href=3D"http://www.ietf.org/internet-drafts/draft-riche=
r-oauth-introspection-02.txt" target=3D"_blank">http://www.ietf.org/interne=
t-drafts/draft-richer-oauth-introspection-02.txt</a>
Status:          <a href=3D"http://datatracker.ietf.org/doc/draft-richer-oa=
uth-introspection" target=3D"_blank">http://datatracker.ietf.org/doc/draft-=
richer-oauth-introspection</a>
Htmlized:        <a href=3D"http://tools.ietf.org/html/draft-richer-oauth-i=
ntrospection-02" target=3D"_blank">http://tools.ietf.org/html/draft-richer-=
oauth-introspection-02</a>
Diff:            <a href=3D"http://www.ietf.org/rfcdiff?url2=3Ddraft-richer=
-oauth-introspection-02" target=3D"_blank">http://www.ietf.org/rfcdiff?url2=
=3Ddraft-richer-oauth-introspection-02</a>

Abstract:
   This specification defines a method for a client or protected
   resource to query an OAuth authorization server to determine meta-
   information about an OAuth token.


                                                                           =
      =20


The IETF Secretariat

</pre>
                                                          <br>
                                                          </div>
                                                          <br>
                                                          </div>
                                                          <br>
_______________________________________________<br>
                                                          OAuth mailing
                                                          list<br>
                                                          <a href=3D"mailto=
:OAuth@ietf.org" target=3D"_blank">OAuth@ietf.org</a><br>
                                                          <a href=3D"https:=
//www.ietf.org/mailman/listinfo/oauth" target=3D"_blank">https://www.ietf.o=
rg/mailman/listinfo/oauth</a><br>
                                                          <br>
                                                          </blockquote>
                                                          </div>
                                                          <br>
                                                          <br clear=3D"all"=
>
                                                          <div><br>
                                                          </div>
                                                          -- <br>
                                                          Thanks &amp;
                                                          Regards,<br>
                                                          Prabath
                                                          <div><br>
                                                          </div>
                                                          <div>Mobile :
                                                          <a href=3D"tel:%2=
B94%2071%20809%206732" value=3D"+94718096732" target=3D"_blank">+94
                                                          71 809 6732</a>=
=A0<br>
                                                          <br>
                                                          <a href=3D"http:/=
/blog.facilelogin.com" target=3D"_blank">http://blog.facilelogin.com</a><br=
>
                                                          <a href=3D"http:/=
/RampartFAQ.com" target=3D"_blank">http://RampartFAQ.com</a></div>
                                                          </div>
                                                          </blockquote>
                                                          <br>
                                                          </div>
                                                          </div>
                                                          </div>
                                                          </blockquote>
                                                          </div>
                                                          <br>
                                                          <br clear=3D"all"=
>
                                                          <div><br>
                                                          </div>
                                                          -- <br>
                                                          Thanks &amp;
                                                          Regards,<br>
                                                          Prabath
                                                          <div><br>
                                                          </div>
                                                          <div>Mobile :
                                                          <a href=3D"tel:%2=
B94%2071%20809%206732" value=3D"+94718096732" target=3D"_blank">+94
                                                          71 809 6732</a>=
=A0<br>
                                                          <br>
                                                          <a href=3D"http:/=
/blog.facilelogin.com" target=3D"_blank">http://blog.facilelogin.com</a><br=
>
                                                          <a href=3D"http:/=
/RampartFAQ.com" target=3D"_blank">http://RampartFAQ.com</a></div>
                                                          </div>
                                                          </blockquote>
                                                          <br>
                                                          </div>
                                                        </div>
                                                      </div>
                                                    </blockquote>
                                                  </div>
                                                  <br>
                                                  <br clear=3D"all">
                                                  <div><br>
                                                  </div>
                                                  -- <br>
                                                  Thanks &amp; Regards,<br>
                                                  Prabath
                                                  <div><br>
                                                  </div>
                                                  <div>Mobile : <a href=3D"=
tel:%2B94%2071%20809%206732" value=3D"+94718096732" target=3D"_blank">+94

                                                      71 809 6732</a>=A0<br=
>
                                                    <br>
                                                    <a href=3D"http://blog.=
facilelogin.com" target=3D"_blank">http://blog.facilelogin.com</a><br>
                                                    <a href=3D"http://Rampa=
rtFAQ.com" target=3D"_blank">http://RampartFAQ.com</a></div>
                                                </div>
                                              </blockquote>
                                              <br>
                                            </div>
                                          </div>
                                        </div>
                                      </blockquote>
                                    </div>
                                    <br>
                                    <br clear=3D"all">
                                    <div><br>
                                    </div>
                                    -- <br>
                                    Thanks &amp; Regards,<br>
                                    Prabath
                                    <div><br>
                                    </div>
                                    <div>Mobile : <a href=3D"tel:%2B94%2071=
%20809%206732" value=3D"+94718096732" target=3D"_blank">+94 71 809 6732</a>=
=A0<br>
                                      <br>
                                      <a href=3D"http://blog.facilelogin.co=
m" target=3D"_blank">http://blog.facilelogin.com</a><br>
                                      <a href=3D"http://RampartFAQ.com" tar=
get=3D"_blank">http://RampartFAQ.com</a></div>
                                  </div>
                                </div>
                              </blockquote>
                              <blockquote type=3D"cite">
                                <div><span>________________________________=
_______________</span><br>
                                  <span>OAuth mailing list</span><br>
                                  <span><a href=3D"mailto:OAuth@ietf.org" t=
arget=3D"_blank">OAuth@ietf.org</a></span><br>
                                  <span><a href=3D"https://www.ietf.org/mai=
lman/listinfo/oauth" target=3D"_blank">https://www.ietf.org/mailman/listinf=
o/oauth</a></span><br>
                                </div>
                              </blockquote>
                            </blockquote>
                            <br>
                          </div>
                        </div>
                      </div>
                    </blockquote>
                  </div>
                  <br>
                  <br clear=3D"all">
                  <div><br>
                  </div>
                  -- <br>
                  Thanks &amp; Regards,<br>
                  Prabath
                  <div><br>
                  </div>
                  <div>Mobile : <a href=3D"tel:%2B94%2071%20809%206732" val=
ue=3D"+94718096732" target=3D"_blank">+94 71 809
                      6732</a>=A0<br>
                    <br>
                    <a href=3D"http://blog.facilelogin.com" target=3D"_blan=
k">http://blog.facilelogin.com</a><br>
                    <a href=3D"http://RampartFAQ.com" target=3D"_blank">htt=
p://RampartFAQ.com</a></div>
                </div>
              </div>
            </div>
          </blockquote>
        </div>
        <br>
        <br clear=3D"all">
        <div><br>
        </div>
        -- <br>
        Thanks &amp; Regards,<br>
        Prabath
        <div><br>
        </div>
        <div>Mobile : <a href=3D"tel:%2B94%2071%20809%206732" value=3D"+947=
18096732" target=3D"_blank">+94 71 809 6732</a>=A0<br>
          <br>
          <a href=3D"http://blog.facilelogin.com" target=3D"_blank">http://=
blog.facilelogin.com</a><br>
          <a href=3D"http://RampartFAQ.com" target=3D"_blank">http://Rampar=
tFAQ.com</a></div>
      </div>
    </blockquote>
    <br>
  </div></div></div>

</blockquote></div><br><br clear=3D"all"><div><br></div>-- <br>Thanks &amp;=
 Regards,<br>Prabath<div><br></div><div>Mobile : +94 71 809 6732=A0<br><br>=
<a href=3D"http://blog.facilelogin.com" target=3D"_blank">http://blog.facil=
elogin.com</a><br>
<a href=3D"http://RampartFAQ.com" target=3D"_blank">http://RampartFAQ.com</=
a></div>
</div>

--047d7b343a7cc2fe8e04d5affc91--

From prabath@wso2.com  Thu Feb 14 06:25:26 2013
Return-Path: <prabath@wso2.com>
X-Original-To: oauth@ietfa.amsl.com
Delivered-To: oauth@ietfa.amsl.com
Received: from localhost (localhost [127.0.0.1]) by ietfa.amsl.com (Postfix) with ESMTP id 32C4621F87FA for <oauth@ietfa.amsl.com>; Thu, 14 Feb 2013 06:25:26 -0800 (PST)
X-Virus-Scanned: amavisd-new at amsl.com
X-Spam-Flag: NO
X-Spam-Score: -2.874
X-Spam-Level: 
X-Spam-Status: No, score=-2.874 tagged_above=-999 required=5 tests=[AWL=0.102,  BAYES_00=-2.599, FM_FORGED_GMAIL=0.622, HTML_MESSAGE=0.001, RCVD_IN_DNSWL_LOW=-1]
Received: from mail.ietf.org ([64.170.98.30]) by localhost (ietfa.amsl.com [127.0.0.1]) (amavisd-new, port 10024) with ESMTP id o-PbecqchC5r for <oauth@ietfa.amsl.com>; Thu, 14 Feb 2013 06:25:24 -0800 (PST)
Received: from mail-ee0-f45.google.com (mail-ee0-f45.google.com [74.125.83.45]) by ietfa.amsl.com (Postfix) with ESMTP id 5A2D121F8201 for <oauth@ietf.org>; Thu, 14 Feb 2013 06:25:23 -0800 (PST)
Received: by mail-ee0-f45.google.com with SMTP id b57so1290788eek.18 for <oauth@ietf.org>; Thu, 14 Feb 2013 06:25:22 -0800 (PST)
X-Google-DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=google.com; s=20120113; h=mime-version:x-received:in-reply-to:references:date:message-id :subject:from:to:cc:content-type:x-gm-message-state; bh=qd9UoBSVV3s4N4NHfb4Ol6Xfb5zm2+af64nC3SQdV/A=; b=FoiFFYI6ALP+XCFJquUN64vj4qG4f2LGLrUzl6PUSvQo0uupwxS1K3n/020a92k9pw qlZw2qCvZB9MFCez5IsNtahznXudBBIuPYZ5Nq1aY1ur+OYzf9X0tgGjPlcp5IwmXfhP QlMtsH7n7SkwIx9b9w1eyvUWik9eDf4zVvv5NSqCmuTKQ4HL5VFRFFAWRo2U9rgA6rbh 5YAV339JsqsNXK98xbhLz6D5BoRPfCmpAsVQqHobwbyGB7I471z+AGbRzA7VJpqLCkgA oLSuMqYWeWkXbKX4qfQF82JFWzFzukGRjkEkiX896I+iDcmbMNIrqftjoJjP+s/91Zow 2bBg==
MIME-Version: 1.0
X-Received: by 10.14.204.3 with SMTP id g3mr18279142eeo.27.1360851922193; Thu, 14 Feb 2013 06:25:22 -0800 (PST)
Received: by 10.223.37.77 with HTTP; Thu, 14 Feb 2013 06:25:21 -0800 (PST)
In-Reply-To: <CAJV9qO-JSXgSTkw2_pdH0D-o-xDWGDqxx=PAWYtnTj4hOQXW4Q@mail.gmail.com>
References: <20130206192420.32698.21027.idtracker@ietfa.amsl.com> <5112AE0B.1080501@mitre.org> <CAJV9qO_8-4FowrXK=ae-+xMjiJFP04ryVMLQ8SGUH8kp3PHrLg@mail.gmail.com> <5113C3AA.1040701@mitre.org> <CAJV9qO8BVV57eAb5kUNes15AYOpUKqw5XWQswh-FJA=b1pPgSA@mail.gmail.com> <5113DDB2.7060805@mitre.org> <CAJV9qO_gM1oera9ae9sqh9n17e-ZLKuC2pmsZwhq-RmFcMyqHA@mail.gmail.com> <51196777.6000502@mitre.org> <CAJV9qO-5bWZbNUfCmaqYBQoy-qwNaSZFOsO9GL3CrbSejwVTzw@mail.gmail.com> <F6595A40-6B4E-4718-ABB5-694CA975C4DB@maymount.com> <511A5062.5010108@mitre.org> <CAJV9qO_Mr87NX=KZRqCsWasQ1FuvDNBw14eS-TcPf_KRJztQFg@mail.gmail.com> <CAJV9qO-71-sM6kXOB6Fb_bvVkDBQ5JBbs8E5X=f-K=iEmGezRA@mail.gmail.com> <511CEEAA.3030801@mitre.org> <CAJV9qO-JSXgSTkw2_pdH0D-o-xDWGDqxx=PAWYtnTj4hOQXW4Q@mail.gmail.com>
Date: Thu, 14 Feb 2013 19:55:21 +0530
Message-ID: <CAJV9qO9=+kiO-s7vH_ewr7XjfVdDU24F0kuif504bP53dBr1TA@mail.gmail.com>
From: Prabath Siriwardena <prabath@wso2.com>
To: Justin Richer <jricher@mitre.org>
Content-Type: multipart/alternative; boundary=047d7b3440f86a0b6104d5b007fb
X-Gm-Message-State: ALoCoQkFmJZzSJESleKVC8L4c+rmj+XJUreLMW4SGfK/vab5wjpvSGu7lOj+ldAvtBJ7vO5KjQx9
Cc: "oauth@ietf.org" <oauth@ietf.org>
Subject: Re: [OAUTH-WG] Fwd: New Version Notification for draft-richer-oauth-introspection-02.txt
X-BeenThere: oauth@ietf.org
X-Mailman-Version: 2.1.12
Precedence: list
List-Id: OAUTH WG <oauth.ietf.org>
List-Unsubscribe: <https://www.ietf.org/mailman/options/oauth>, <mailto:oauth-request@ietf.org?subject=unsubscribe>
List-Archive: <http://www.ietf.org/mail-archive/web/oauth>
List-Post: <mailto:oauth@ietf.org>
List-Help: <mailto:oauth-request@ietf.org?subject=help>
List-Subscribe: <https://www.ietf.org/mailman/listinfo/oauth>, <mailto:oauth-request@ietf.org?subject=subscribe>
X-List-Received-Date: Thu, 14 Feb 2013 14:25:26 -0000

--047d7b3440f86a0b6104d5b007fb
Content-Type: text/plain; charset=ISO-8859-1

To make it clear - my suggestion is to add token_type_hint to the
introspection request. It can be from client to AS or from RS to AS.

Then AS can decide whether the provided token is valid or not and include
"valid" attribute in the introspection response.

Thanks & regards,
-Prabath

On Thu, Feb 14, 2013 at 7:52 PM, Prabath Siriwardena <prabath@wso2.com>wrote:

> Both the client and the resource owner should be aware of the token type.
>
> My argument is, if the authorization server to decide whether the token is
> valid or not ( irrespective of who asked the question) - AS needs to know
> the token type - because to validate a token AS should know the token type.
>
> The token type could be, bearer or MAC or any other token type.
>
> Thanks & regards,
> -Prabath
>
>
> On Thu, Feb 14, 2013 at 7:33 PM, Justin Richer <jricher@mitre.org> wrote:
>
>>  What exactly are you suggesting be added to introspection? The
>> "token_type_hint" is from the client to the server, but what you've asked
>> for in terms of "token type" is from the server to the client. And there
>> was never an answer to what exactly is meant by "token type" in this case,
>> particularly because you seem to want to call out things like SAML and
>> Bearer as separate types.
>>
>>  -- Justin
>>
>>
>>
>> On 02/14/2013 06:59 AM, Prabath Siriwardena wrote:
>>
>> I noticed that the latest Token Revocation draft [1] has introduced the
>> parameter "token_type_hint". I would suggest the same here, as that would
>> make what is meant by "valid" much clear..
>>
>>  [1]: http://tools.ietf.org/html/draft-ietf-oauth-revocation-05
>>
>>  Thanks & regards,
>> -Prabath
>>
>> On Tue, Feb 12, 2013 at 9:35 PM, Prabath Siriwardena <prabath@wso2.com>wrote:
>>
>>> Hi Justin,
>>>
>>>  I doubt whether valid_token would make a difference..?
>>>
>>>  My initial argument is what is the validation criteria..? Validation
>>> criteria depends on the token_type..
>>>
>>>  If we are talking only about metadata - then I believe "revoked",
>>> "expired" would be more meaningful..
>>>
>>>  Thanks & regards,
>>> -Prabath
>>>
>>>
>>>  On Tue, Feb 12, 2013 at 7:53 PM, Justin Richer <jricher@mitre.org>wrote:
>>>
>>>>  OK, I can see the wisdom in changing this term.
>>>>
>>>> I picked "valid" because I wanted a simple "boolean" value that would
>>>> require no additional parsing or string-matching on the client's behalf,
>>>> and I'd like to stick with that. OAuth is built with the assumption that
>>>> clients need to be able to recover from invalid tokens at any stage, so I
>>>> think a simple yes/no is the right step here.
>>>>
>>>> That said, I think you're both right that "valid" seems to have caused
>>>> a bit of confusion. I don't want to go with "revoked" because I'd rather
>>>> have the "token is OK" be the positive boolean value.
>>>>
>>>> Would "valid_token" be more clear? Or do we need a different adjective
>>>> all together?
>>>>
>>>>  -- Justin
>>>>
>>>>
>>>> On 02/11/2013 08:02 PM, Richard Harrington wrote:
>>>>
>>>> Have you considered "status" instead of "valid"?  It could have values
>>>> like "active", "expired", and "revoked".
>>>>
>>>>  Is it worthwhile including the status of the client also?  For
>>>> example, a client application could be disabled, temporarily or
>>>> permanently, and thus disabling its access tokens as well.
>>>>
>>>>
>>>> On Feb 11, 2013, at 1:56 PM, Prabath Siriwardena <prabath@wso2.com>
>>>> wrote:
>>>>
>>>>  I guess confusion is with 'valid' parameter is in the response..
>>>>
>>>>  I thought this will be helpful to standardize the communication
>>>> between Resource Server and the Authorization Server..
>>>>
>>>>  I would suggest we completely remove "valid" from the response - or
>>>> define it much clearly..
>>>>
>>>>  May be can add "revoked" with a boolean attribute..
>>>>
>>>>  Thanks & regards,
>>>> -Prabath
>>>>
>>>> On Tue, Feb 12, 2013 at 3:19 AM, Justin Richer <jricher@mitre.org>wrote:
>>>>
>>>>>
>>>>> On 02/08/2013 12:51 AM, Prabath Siriwardena wrote:
>>>>>
>>>>> Hi Justin,
>>>>>
>>>>>  I have couple of questions related to "valid" parameter...
>>>>>
>>>>>  This endpoint can be invoked by the Resource Server in runtime...
>>>>>
>>>>>
>>>>> That's correct.
>>>>>
>>>>>
>>>>>
>>>>>  In that case what is exactly meant by the "resource_id" in request ?
>>>>>
>>>>>
>>>>>  The resource_id field is a service-specific string that basically
>>>>> lets the resource server provide some context to the request to the auth
>>>>> server. There have been some other suggestions like client IP address, but
>>>>> I wanted to put this one in because it seemed to be a common theme. The
>>>>> client is trying to do *something* with the token, after all, and the
>>>>> rights, permissions, and metadata associated with the token could change
>>>>> based on that. Since the Introspection endpoint is all about getting that
>>>>> metadata back to the PR, this seemed like a good idea.
>>>>>
>>>>>
>>>>>
>>>>>  IMO a token to be valid depends on set of criteria based on it's
>>>>> type..
>>>>>
>>>>>  For a Bearer token..
>>>>>
>>>>>  1. Token should not be expired
>>>>> 2. Token should not be revoked.
>>>>> 3. The scope the token issued should match with the scope required for
>>>>> the resource.
>>>>>
>>>>>  For a MAC token...
>>>>>
>>>>>  1. Token not expired (mac id)
>>>>> 2. Token should not be revoked
>>>>> 3. The scope the token issued should match with the scope required for
>>>>> the resource.
>>>>> 4. HMAC check should be valid
>>>>>
>>>>>  There are similar conditions for SAML bearer too..
>>>>>
>>>>>
>>>>>  This isn't really true. The SAML bearer token is fully self-contained
>>>>> and doesn't change based on other parameters in the message, unlike MAC.
>>>>> Same with JWT. When it hands a SAML or JWT token to the AS, the PR has
>>>>> given *everything* the server needs to check that token's validity and use.
>>>>>
>>>>> MAC signatures change with every message, and they're done across
>>>>> several components of the HTTP message. Therefor, the HMAC check for MAC
>>>>> style tokens will still need to be done by the protected resource.
>>>>> Introspection would help in the case that the signature validated just
>>>>> fine, but the token might have expired. Or you need to know what scopes
>>>>> apply. Introspection isn't to fully validate the call to the protected
>>>>> resource -- if that were the case, the PR would have to send some kind of
>>>>> encapsulated version of the original request. Otherwise, the AS won't have
>>>>> all of the information it needs to check the MAC.
>>>>>
>>>>>
>>>>> I think what you're describing is ultimately *not* what the
>>>>> introspection endpoint is intended to do. If that's unclear from the
>>>>> document, can you please suggest text that would help clear the use case
>>>>> up? I wouldn't want it to be ambiguous.
>>>>>
>>>>>  -- Justin
>>>>>
>>>>>
>>>>>
>>>>>  Thanks & regards,
>>>>> -Prabath
>>>>>
>>>>>
>>>>> On Thu, Feb 7, 2013 at 10:30 PM, Justin Richer <jricher@mitre.org>wrote:
>>>>>
>>>>>>  It validates the token, which would be either the token itself in
>>>>>> the case of Bearer or the token "id" part of something more complex like
>>>>>> MAC. It doesn't directly validate the usage of the token, that's still up
>>>>>> to the PR to do that.
>>>>>>
>>>>>> I nearly added a "token type" field in this draft, but held back
>>>>>> because there are several kinds of "token type" that people talk about in
>>>>>> OAuth. First, there's "Bearer" vs. "MAC" vs. "HOK", or what have you. Then
>>>>>> within Bearer you have "JWT" or "SAML" or "unstructured blob". Then you've
>>>>>> also got "access" vs. "refresh" and other flavors of token, like the
>>>>>> id_token in OpenID Connect.
>>>>>>
>>>>>> Thing is, the server running the introspection endpoint will probably
>>>>>> know *all* of these. But should it tell the client? If so, which of the
>>>>>> three, and what names should the fields be?
>>>>>>
>>>>>>  -- Justin
>>>>>>
>>>>>>
>>>>>> On 02/07/2013 11:26 AM, Prabath Siriwardena wrote:
>>>>>>
>>>>>> Okay.. I was thinking this could be used as a way to validate the
>>>>>> token as well. BTW even in this case shouldn't communicate the type of
>>>>>> token to AS? For example in the case of SAML profile - it could be SAML
>>>>>> token..
>>>>>>
>>>>>>  Thanks & regards,
>>>>>> -Prabath
>>>>>>
>>>>>> On Thu, Feb 7, 2013 at 8:39 PM, Justin Richer <jricher@mitre.org>wrote:
>>>>>>
>>>>>>>  "valid" might not be the best term, but it's meant to be a field
>>>>>>> where the server says "yes this token is still good" or "no this token
>>>>>>> isn't good anymore". We could instead do this with HTTP codes or something
>>>>>>> but I went with a pure JSON response.
>>>>>>>
>>>>>>>  -- Justin
>>>>>>>
>>>>>>>
>>>>>>> On 02/06/2013 10:47 PM, Prabath Siriwardena wrote:
>>>>>>>
>>>>>>> Hi Justin,
>>>>>>>
>>>>>>>  I believe this is addressing one of the key missing part in OAuth
>>>>>>> 2.0...
>>>>>>>
>>>>>>>  One question - I guess this was discussed already...
>>>>>>>
>>>>>>>  In the spec - in the introspection response it has the attribute
>>>>>>> "valid" - this is basically the validity of the token provided in the
>>>>>>> request.
>>>>>>>
>>>>>>>  Validation criteria depends on the token and well as token type (
>>>>>>> Bearer, MAC..).
>>>>>>>
>>>>>>>  In the spec it seems like it's coupled with Bearer token type...
>>>>>>> But I guess, by adding "token_type" to the request we can remove this
>>>>>>> dependency.
>>>>>>>
>>>>>>>  WDYT..?
>>>>>>>
>>>>>>>  Thanks & regards,
>>>>>>> -Prabath
>>>>>>>
>>>>>>> On Thu, Feb 7, 2013 at 12:54 AM, Justin Richer <jricher@mitre.org>wrote:
>>>>>>>
>>>>>>>>  Updated introspection draft based on recent comments. Changes
>>>>>>>> include:
>>>>>>>>
>>>>>>>>  - "scope" return parameter now follows RFC6749 format instead of
>>>>>>>> JSON array
>>>>>>>>  - "subject" -> "sub", and "audience" -> "aud", to be parallel with
>>>>>>>> JWT claims
>>>>>>>>  - clarified what happens if the authentication is bad
>>>>>>>>
>>>>>>>>  -- Justin
>>>>>>>>
>>>>>>>>
>>>>>>>> -------- Original Message --------  Subject: New Version
>>>>>>>> Notification for draft-richer-oauth-introspection-02.txt  Date: Wed,
>>>>>>>> 6 Feb 2013 11:24:20 -0800  From: <internet-drafts@ietf.org><internet-drafts@ietf.org>  To:
>>>>>>>> <jricher@mitre.org> <jricher@mitre.org>
>>>>>>>>
>>>>>>>> A new version of I-D, draft-richer-oauth-introspection-02.txt
>>>>>>>> has been successfully submitted by Justin Richer and posted to the
>>>>>>>> IETF repository.
>>>>>>>>
>>>>>>>> Filename:	 draft-richer-oauth-introspection
>>>>>>>> Revision:	 02
>>>>>>>> Title:		 OAuth Token Introspection
>>>>>>>> Creation date:	 2013-02-06
>>>>>>>> WG ID:		 Individual Submission
>>>>>>>> Number of pages: 6
>>>>>>>> URL:             http://www.ietf.org/internet-drafts/draft-richer-oauth-introspection-02.txt
>>>>>>>> Status:          http://datatracker.ietf.org/doc/draft-richer-oauth-introspection
>>>>>>>> Htmlized:        http://tools.ietf.org/html/draft-richer-oauth-introspection-02
>>>>>>>> Diff:            http://www.ietf.org/rfcdiff?url2=draft-richer-oauth-introspection-02
>>>>>>>>
>>>>>>>> Abstract:
>>>>>>>>    This specification defines a method for a client or protected
>>>>>>>>    resource to query an OAuth authorization server to determine meta-
>>>>>>>>    information about an OAuth token.
>>>>>>>>
>>>>>>>>
>>>>>>>>
>>>>>>>>
>>>>>>>>
>>>>>>>> The IETF Secretariat
>>>>>>>>
>>>>>>>>
>>>>>>>>
>>>>>>>>
>>>>>>>>
>>>>>>>> _______________________________________________
>>>>>>>> OAuth mailing list
>>>>>>>> OAuth@ietf.org
>>>>>>>> https://www.ietf.org/mailman/listinfo/oauth
>>>>>>>>
>>>>>>>>
>>>>>>>
>>>>>>>
>>>>>>>  --
>>>>>>> Thanks & Regards,
>>>>>>> Prabath
>>>>>>>
>>>>>>>  Mobile : +94 71 809 6732 <%2B94%2071%20809%206732>
>>>>>>>
>>>>>>> http://blog.facilelogin.com
>>>>>>> http://RampartFAQ.com
>>>>>>>
>>>>>>>
>>>>>>>
>>>>>>
>>>>>>
>>>>>>  --
>>>>>> Thanks & Regards,
>>>>>> Prabath
>>>>>>
>>>>>>  Mobile : +94 71 809 6732 <%2B94%2071%20809%206732>
>>>>>>
>>>>>> http://blog.facilelogin.com
>>>>>> http://RampartFAQ.com
>>>>>>
>>>>>>
>>>>>>
>>>>>
>>>>>
>>>>>  --
>>>>> Thanks & Regards,
>>>>> Prabath
>>>>>
>>>>>  Mobile : +94 71 809 6732 <%2B94%2071%20809%206732>
>>>>>
>>>>> http://blog.facilelogin.com
>>>>> http://RampartFAQ.com
>>>>>
>>>>>
>>>>>
>>>>
>>>>
>>>>  --
>>>> Thanks & Regards,
>>>> Prabath
>>>>
>>>>  Mobile : +94 71 809 6732
>>>>
>>>> http://blog.facilelogin.com
>>>> http://RampartFAQ.com
>>>>
>>>>  _______________________________________________
>>>> OAuth mailing list
>>>> OAuth@ietf.org
>>>> https://www.ietf.org/mailman/listinfo/oauth
>>>>
>>>>
>>>>
>>>
>>>
>>>  --
>>> Thanks & Regards,
>>> Prabath
>>>
>>>  Mobile : +94 71 809 6732 <%2B94%2071%20809%206732>
>>>
>>> http://blog.facilelogin.com
>>> http://RampartFAQ.com
>>>
>>
>>
>>
>>  --
>> Thanks & Regards,
>> Prabath
>>
>>  Mobile : +94 71 809 6732
>>
>> http://blog.facilelogin.com
>> http://RampartFAQ.com
>>
>>
>>
>
>
> --
> Thanks & Regards,
> Prabath
>
> Mobile : +94 71 809 6732
>
> http://blog.facilelogin.com
> http://RampartFAQ.com
>



-- 
Thanks & Regards,
Prabath

Mobile : +94 71 809 6732

http://blog.facilelogin.com
http://RampartFAQ.com

--047d7b3440f86a0b6104d5b007fb
Content-Type: text/html; charset=ISO-8859-1
Content-Transfer-Encoding: quoted-printable

To make it clear - my suggestion is to add token_type_hint to the introspec=
tion request. It can be from client to AS or from RS to AS.<div><br></div><=
div>Then AS can decide whether the provided token is valid or not and inclu=
de &quot;valid&quot; attribute in the introspection response.</div>
<div><br></div><div>Thanks &amp; regards,</div><div>-Prabath<br><br><div cl=
ass=3D"gmail_quote">On Thu, Feb 14, 2013 at 7:52 PM, Prabath Siriwardena <s=
pan dir=3D"ltr">&lt;<a href=3D"mailto:prabath@wso2.com" target=3D"_blank">p=
rabath@wso2.com</a>&gt;</span> wrote:<br>
<blockquote class=3D"gmail_quote" style=3D"margin:0 0 0 .8ex;border-left:1p=
x #ccc solid;padding-left:1ex">Both the client and the resource owner shoul=
d be aware of the token type.<div><br></div><div>My argument is, if the aut=
horization server to decide whether the token is valid or not ( irrespectiv=
e of who asked the question) - AS needs to know the token type - because to=
 validate a token AS should know the token type.</div>

<div><br></div><div>The token type could be, bearer or MAC or any other tok=
en type.</div><div><br></div><div>Thanks &amp; regards,</div><div>-Prabath<=
div><div class=3D"h5"><br><br><div class=3D"gmail_quote">On Thu, Feb 14, 20=
13 at 7:33 PM, Justin Richer <span dir=3D"ltr">&lt;<a href=3D"mailto:jriche=
r@mitre.org" target=3D"_blank">jricher@mitre.org</a>&gt;</span> wrote:<br>

<blockquote class=3D"gmail_quote" style=3D"margin:0 0 0 .8ex;border-left:1p=
x #ccc solid;padding-left:1ex">
 =20
   =20
 =20
  <div bgcolor=3D"#FFFFFF" text=3D"#000000">
    What exactly are you suggesting be added to introspection? The
    &quot;token_type_hint&quot; is from the client to the server, but what =
you&#39;ve
    asked for in terms of &quot;token type&quot; is from the server to the =
client.
    And there was never an answer to what exactly is meant by &quot;token
    type&quot; in this case, particularly because you seem to want to call
    out things like SAML and Bearer as separate types. <br><span><font colo=
r=3D"#888888">
    <br>
    =A0-- Justin</font></span><div><div><br>
    <br>
    <br>
    <div>On 02/14/2013 06:59 AM, Prabath
      Siriwardena wrote:<br>
    </div>
    <blockquote type=3D"cite">
     =20
      I noticed that the latest Token Revocation draft [1] has
      introduced the parameter &quot;token_type_hint&quot;. I would suggest=
 the
      same here, as that would make what is meant by &quot;valid&quot; much
      clear..
      <div><br>
      </div>
      <div>[1]:=A0<a href=3D"http://tools.ietf.org/html/draft-ietf-oauth-re=
vocation-05" style=3D"color:rgb(17,85,204);font-size:12.727272033691406px;f=
ont-family:arial,sans-serif" target=3D"_blank">http://tools.ietf.org/html/d=
raft-ietf-oauth-revocation-05</a></div>


      <div><br>
      </div>
      <div>Thanks &amp; regards,</div>
      <div>-Prabath<br>
        <br>
        <div class=3D"gmail_quote">On Tue, Feb 12, 2013 at 9:35 PM,
          Prabath Siriwardena <span dir=3D"ltr">&lt;<a href=3D"mailto:praba=
th@wso2.com" target=3D"_blank">prabath@wso2.com</a>&gt;</span> wrote:<br>
          <blockquote class=3D"gmail_quote" style=3D"margin:0 0 0 .8ex;bord=
er-left:1px #ccc solid;padding-left:1ex">Hi Justin,
            <div><br>
            </div>
            <div>I doubt whether valid_token would make a difference..?</di=
v>
            <div><br>
            </div>
            <div>My initial argument is what is the validation
              criteria..? Validation criteria depends on the
              token_type..</div>
            <div>
              <br>
            </div>
            <div>If we are talking only about metadata - then I believe
              &quot;revoked&quot;, &quot;expired&quot; would be more meanin=
gful..</div>
            <div><br>
            </div>
            <div>Thanks &amp; regards,</div>
            <div>-Prabath
              <div>
                <div>
                  <br>
                  <br>
                  <div class=3D"gmail_quote">
                    On Tue, Feb 12, 2013 at 7:53 PM, Justin Richer <span di=
r=3D"ltr">&lt;<a href=3D"mailto:jricher@mitre.org" target=3D"_blank">jriche=
r@mitre.org</a>&gt;</span>
                    wrote:<br>
                    <blockquote class=3D"gmail_quote" style=3D"margin:0 0 0=
 .8ex;border-left:1px #ccc solid;padding-left:1ex">
                      <div bgcolor=3D"#FFFFFF" text=3D"#000000"> OK, I can
                        see the wisdom in changing this term. <br>
                        <br>
                        I picked &quot;valid&quot; because I wanted a simpl=
e
                        &quot;boolean&quot; value that would require no add=
itional
                        parsing or string-matching on the client&#39;s
                        behalf, and I&#39;d like to stick with that. OAuth
                        is built with the assumption that clients need
                        to be able to recover from invalid tokens at any
                        stage, so I think a simple yes/no is the right
                        step here. <br>
                        <br>
                        That said, I think you&#39;re both right that
                        &quot;valid&quot; seems to have caused a bit of con=
fusion.
                        I don&#39;t want to go with &quot;revoked&quot; bec=
ause I&#39;d
                        rather have the &quot;token is OK&quot; be the posi=
tive
                        boolean value. <br>
                        <br>
                        Would &quot;valid_token&quot; be more clear? Or do =
we need
                        a different adjective all together?<span><font colo=
r=3D"#888888"><br>
                            <br>
                            =A0-- Justin</font></span>
                        <div>
                          <div><br>
                            <br>
                            <div>On 02/11/2013 08:02 PM, Richard
                              Harrington wrote:<br>
                            </div>
                            <blockquote type=3D"cite">
                              <div>Have you considered &quot;status&quot; i=
nstead
                                of &quot;valid&quot;? =A0It could have valu=
es like
                                &quot;active&quot;, &quot;expired&quot;, an=
d &quot;revoked&quot;.</div>
                              <div><br>
                              </div>
                              <div>Is it worthwhile including the status
                                of the client also? =A0For example, a
                                client application could be disabled,
                                temporarily or permanently, and thus
                                disabling its access tokens as well.</div>
                              <div><br>
                              </div>
                              <div><br>
                                On Feb 11, 2013, at 1:56 PM, Prabath
                                Siriwardena &lt;<a href=3D"mailto:prabath@w=
so2.com" target=3D"_blank">prabath@wso2.com</a>&gt;

                                wrote:<br>
                                <br>
                              </div>
                              <blockquote type=3D"cite">
                                <div>I guess confusion is with &#39;valid&#=
39;
                                  parameter is in the response..
                                  <div><br>
                                  </div>
                                  <div>I thought this will be helpful
                                    to=A0standardize=A0the communication
                                    between Resource Server and the
                                    Authorization Server..</div>
                                  <div><br>
                                  </div>
                                  <div>I would suggest we completely
                                    remove &quot;valid&quot; from the respo=
nse -
                                    or define it much clearly..</div>
                                  <div><br>
                                  </div>
                                  <div>May be can add &quot;revoked&quot; w=
ith a
                                    boolean attribute..</div>
                                  <div><br>
                                  </div>
                                  <div>Thanks &amp; regards,</div>
                                  <div>-Prabath<br>
                                    <br>
                                    <div class=3D"gmail_quote">On Tue, Feb
                                      12, 2013 at 3:19 AM, Justin Richer
                                      <span dir=3D"ltr">&lt;<a href=3D"mail=
to:jricher@mitre.org" target=3D"_blank">jricher@mitre.org</a>&gt;</span>
                                      wrote:<br>
                                      <blockquote class=3D"gmail_quote" sty=
le=3D"margin:0 0 0 .8ex;border-left:1px #ccc solid;padding-left:1ex">
                                        <div bgcolor=3D"#FFFFFF" text=3D"#0=
00000">
                                          <div> <br>
                                            <div>On 02/08/2013 12:51 AM,
                                              Prabath Siriwardena wrote:<br=
>
                                            </div>
                                          </div>
                                          <blockquote type=3D"cite">
                                            Hi=A0Justin,
                                            <div><br>
                                            </div>
                                            <div>
                                              <div>I have couple of
                                                questions related to
                                                &quot;valid&quot; parameter=
...</div>
                                              <div><br>
                                              </div>
                                              <div>This endpoint can be
                                                invoked by the Resource
                                                Server in runtime...</div>
                                            </div>
                                          </blockquote>
                                          <br>
                                          That&#39;s correct.
                                          <div><br>
                                            <br>
                                            <blockquote type=3D"cite">
                                              <div><br>
                                              </div>
                                              <div>In that case what is
                                                exactly meant by the
                                                &quot;resource_id&quot; in =
request
                                                ?</div>
                                            </blockquote>
                                            <br>
                                          </div>
                                          The resource_id field is a
                                          service-specific string that
                                          basically lets the resource
                                          server provide some context to
                                          the request to the auth
                                          server. There have been some
                                          other suggestions like client
                                          IP address, but I wanted to
                                          put this one in because it
                                          seemed to be a common theme.
                                          The client is trying to do
                                          *something* with the token,
                                          after all, and the rights,
                                          permissions, and metadata
                                          associated with the token
                                          could change based on that.
                                          Since the Introspection
                                          endpoint is all about getting
                                          that metadata back to the PR,
                                          this seemed like a good idea.
                                          <div><br>
                                            <br>
                                            <blockquote type=3D"cite">
                                              <div><br>
                                              </div>
                                              <div>IMO a token to be
                                                valid depends on set of
                                                criteria based on it&#39;s
                                                type..</div>
                                              <div><br>
                                              </div>
                                              <div>For a Bearer token..</di=
v>
                                              <div><br>
                                              </div>
                                              <div>1. Token should not
                                                be expired</div>
                                              <div>2. Token should not
                                                be revoked.</div>
                                              <div>3. The scope the
                                                token issued should
                                                match with the scope
                                                required for the
                                                resource.</div>
                                              <div><br>
                                              </div>
                                              <div>For a MAC token...</div>
                                              <div><br>
                                              </div>
                                              <div>1. Token not expired
                                                (mac id)</div>
                                              <div>2. Token should not
                                                be revoked</div>
                                              <div>3. The scope the
                                                token issued should
                                                match with the scope
                                                required for the
                                                resource.</div>
                                              <div>4. HMAC check should
                                                be valid</div>
                                              <div><br>
                                              </div>
                                              There are similar
                                              conditions for SAML bearer
                                              too..</blockquote>
                                            <br>
                                          </div>
                                          This isn&#39;t really true. The
                                          SAML bearer token is fully
                                          self-contained and doesn&#39;t
                                          change based on other
                                          parameters in the message,
                                          unlike MAC. Same with JWT.
                                          When it hands a SAML or JWT
                                          token to the AS, the PR has
                                          given *everything* the server
                                          needs to check that token&#39;s
                                          validity and use. <br>
                                          <br>
                                          MAC signatures change with
                                          every message, and they&#39;re
                                          done across several components
                                          of the HTTP message. Therefor,
                                          the HMAC check for MAC style
                                          tokens will still need to be
                                          done by the protected
                                          resource. Introspection would
                                          help in the case that the
                                          signature validated just fine,
                                          but the token might have
                                          expired. Or you need to know
                                          what scopes apply.
                                          Introspection isn&#39;t to fully
                                          validate the call to the
                                          protected resource -- if that
                                          were the case, the PR would
                                          have to send some kind of
                                          encapsulated version of the
                                          original request. Otherwise,
                                          the AS won&#39;t have all of the
                                          information it needs to check
                                          the MAC.<br>
                                          <br>
                                          <br>
                                          I think what you&#39;re describin=
g
                                          is ultimately *not* what the
                                          introspection endpoint is
                                          intended to do. If that&#39;s
                                          unclear from the document, can
                                          you please suggest text that
                                          would help clear the use case
                                          up? I wouldn&#39;t want it to be
                                          ambiguous.<span><font color=3D"#8=
88888"><br>
                                              <br>
                                              =A0-- Justin</font></span>
                                          <div>
                                            <div><br>
                                              <br>
                                              <blockquote type=3D"cite">
                                                <div><br>
                                                </div>
                                                <div>Thanks &amp;
                                                  regards,</div>
                                                <div>-Prabath</div>
                                                <div><br>
                                                </div>
                                                <div><br>
                                                  <div class=3D"gmail_quote=
">On
                                                    Thu, Feb 7, 2013 at
                                                    10:30 PM, Justin
                                                    Richer <span dir=3D"ltr=
">&lt;<a href=3D"mailto:jricher@mitre.org" target=3D"_blank">jricher@mitre.=
org</a>&gt;</span>
                                                    wrote:<br>
                                                    <blockquote class=3D"gm=
ail_quote" style=3D"margin:0 0 0 .8ex;border-left:1px #ccc solid;padding-le=
ft:1ex">
                                                      <div bgcolor=3D"#FFFF=
FF" text=3D"#000000">
                                                        It validates the
                                                        token, which
                                                        would be either
                                                        the token itself
                                                        in the case of
                                                        Bearer or the
                                                        token &quot;id&quot=
; part
                                                        of something
                                                        more complex
                                                        like MAC. It
                                                        doesn&#39;t directl=
y
                                                        validate the
                                                        usage of the
                                                        token, that&#39;s
                                                        still up to the
                                                        PR to do that.<br>
                                                        <br>
                                                        I nearly added a
                                                        &quot;token type&qu=
ot;
                                                        field in this
                                                        draft, but held
                                                        back because
                                                        there are
                                                        several kinds of
                                                        &quot;token type&qu=
ot;
                                                        that people talk
                                                        about in OAuth.
                                                        First, there&#39;s
                                                        &quot;Bearer&quot; =
vs.
                                                        &quot;MAC&quot; vs.=
 &quot;HOK&quot;,
                                                        or what have
                                                        you. Then within
                                                        Bearer you have
                                                        &quot;JWT&quot; or =
&quot;SAML&quot;
                                                        or &quot;unstructur=
ed
                                                        blob&quot;. Then
                                                        you&#39;ve also got
                                                        &quot;access&quot; =
vs.
                                                        &quot;refresh&quot;=
 and
                                                        other flavors of
                                                        token, like the
                                                        id_token in
                                                        OpenID Connect.
                                                        <br>
                                                        <br>
                                                        Thing is, the
                                                        server running
                                                        the
                                                        introspection
                                                        endpoint will
                                                        probably know
                                                        *all* of these.
                                                        But should it
                                                        tell the client?
                                                        If so, which of
                                                        the three, and
                                                        what names
                                                        should the
                                                        fields be?<span><fo=
nt color=3D"#888888"><br>
                                                          <br>
                                                          =A0-- Justin</fon=
t></span>
                                                        <div>
                                                          <div><br>
                                                          <br>
                                                          <div>On
                                                          02/07/2013
                                                          11:26 AM,
                                                          Prabath
                                                          Siriwardena
                                                          wrote:<br>
                                                          </div>
                                                          <blockquote type=
=3D"cite">
                                                          Okay.. I was
                                                          thinking this
                                                          could be used
                                                          as a way to
                                                          validate the
                                                          token as well.
                                                          BTW even in
                                                          this case
                                                          shouldn&#39;t
                                                          communicate
                                                          the type of
                                                          token to AS?
                                                          For example in
                                                          the case of
                                                          SAML profile -
                                                          it could be
                                                          SAML token..
                                                          <div> <br>
                                                          </div>
                                                          <div>Thanks
                                                          &amp; regards,</d=
iv>
                                                          <div>-Prabath<br>
                                                          <br>
                                                          <div class=3D"gma=
il_quote">On
                                                          Thu, Feb 7,
                                                          2013 at 8:39
                                                          PM, Justin
                                                          Richer <span dir=
=3D"ltr">&lt;<a href=3D"mailto:jricher@mitre.org" target=3D"_blank">jricher=
@mitre.org</a>&gt;</span>
                                                          wrote:<br>
                                                          <blockquote class=
=3D"gmail_quote" style=3D"margin:0 0 0 .8ex;border-left:1px #ccc solid;padd=
ing-left:1ex">
                                                          <div bgcolor=3D"#=
FFFFFF" text=3D"#000000">
                                                          &quot;valid&quot;=
 might
                                                          not be the
                                                          best term, but
                                                          it&#39;s meant to
                                                          be a field
                                                          where the
                                                          server says
                                                          &quot;yes this
                                                          token is still
                                                          good&quot; or &qu=
ot;no
                                                          this token
                                                          isn&#39;t good
                                                          anymore&quot;. We
                                                          could instead
                                                          do this with
                                                          HTTP codes or
                                                          something but
                                                          I went with a
                                                          pure JSON
                                                          response.<span><f=
ont color=3D"#888888"><br>
                                                          <br>
                                                          =A0-- Justin</fon=
t></span>
                                                          <div>
                                                          <div><br>
                                                          <br>
                                                          <div>On
                                                          02/06/2013
                                                          10:47 PM,
                                                          Prabath
                                                          Siriwardena
                                                          wrote:<br>
                                                          </div>
                                                          <blockquote type=
=3D"cite">
                                                          Hi Justin,
                                                          <div><br>
                                                          </div>
                                                          <div>I believe
                                                          this is
                                                          addressing one
                                                          of the key
                                                          missing part
                                                          in OAuth
                                                          2.0...</div>
                                                          <div><br>
                                                          </div>
                                                          <div>One
                                                          question - I
                                                          guess this was
                                                          discussed
                                                          already...</div>
                                                          <div><br>
                                                          </div>
                                                          <div>In the
                                                          spec - in the
                                                          introspection
                                                          response it
                                                          has the
                                                          attribute
                                                          &quot;valid&quot;=
 - this
                                                          is basically
                                                          the validity
                                                          of the token
                                                          provided in
                                                          the request.</div=
>
                                                          <div><br>
                                                          </div>
                                                          <div>Validation=
=A0criteria

                                                          depends on the
                                                          token and well
                                                          as token type
                                                          ( Bearer,
                                                          MAC..).</div>
                                                          <div><br>
                                                          </div>
                                                          <div>In the
                                                          spec it seems
                                                          like it&#39;s
                                                          coupled with
                                                          Bearer token
                                                          type... But I
                                                          guess, by
                                                          adding
                                                          &quot;token_type&=
quot;
                                                          to the request
                                                          we can remove
                                                          this
                                                          dependency.</div>
                                                          <div><br>
                                                          </div>
                                                          <div>WDYT..?</div=
>
                                                          <div><br>
                                                          </div>
                                                          <div>Thanks
                                                          &amp; regards,</d=
iv>
                                                          <div>-Prabath=A0<=
/div>
                                                          <div><br>
                                                          <div class=3D"gma=
il_quote">On

                                                          Thu, Feb 7,
                                                          2013 at 12:54
                                                          AM, Justin
                                                          Richer <span dir=
=3D"ltr">&lt;<a href=3D"mailto:jricher@mitre.org" target=3D"_blank">jricher=
@mitre.org</a>&gt;</span>
                                                          wrote:<br>
                                                          <blockquote class=
=3D"gmail_quote" style=3D"margin:0 0 0 .8ex;border-left:1px #ccc solid;padd=
ing-left:1ex">
                                                          <div bgcolor=3D"#=
FFFFFF" text=3D"#000000">
                                                          Updated
                                                          introspection
                                                          draft based on
                                                          recent
                                                          comments.
                                                          Changes
                                                          include:<br>
                                                          <br>
                                                          =A0- &quot;scope&=
quot;
                                                          return
                                                          parameter now
                                                          follows
                                                          RFC6749 format
                                                          instead of
                                                          JSON array<br>
                                                          =A0- &quot;subjec=
t&quot;
                                                          -&gt; &quot;sub&q=
uot;,
                                                          and &quot;audienc=
e&quot;
                                                          -&gt; &quot;aud&q=
uot;,
                                                          to be parallel
                                                          with JWT
                                                          claims<br>
                                                          =A0- clarified
                                                          what happens
                                                          if the
                                                          authentication
                                                          is bad<br>
                                                          <br>
                                                          =A0-- Justin<br>
                                                          <div><br>
                                                          <br>
                                                          --------
                                                          Original
                                                          Message
                                                          --------
                                                          <table border=3D"=
0" cellpadding=3D"0" cellspacing=3D"0">
                                                          <tbody>
                                                          <tr>
                                                          <th align=3D"RIGH=
T" nowrap valign=3D"BASELINE">Subject: </th>
                                                          <td>New
                                                          Version
                                                          Notification
                                                          for
                                                          draft-richer-oaut=
h-introspection-02.txt</td>
                                                          </tr>
                                                          <tr>
                                                          <th align=3D"RIGH=
T" nowrap valign=3D"BASELINE">Date: </th>
                                                          <td>Wed, 6 Feb
                                                          2013 11:24:20
                                                          -0800</td>
                                                          </tr>
                                                          <tr>
                                                          <th align=3D"RIGH=
T" nowrap valign=3D"BASELINE">From: </th>
                                                          <td><a href=3D"ma=
ilto:internet-drafts@ietf.org" target=3D"_blank">&lt;internet-drafts@ietf.o=
rg&gt;</a></td>
                                                          </tr>
                                                          <tr>
                                                          <th align=3D"RIGH=
T" nowrap valign=3D"BASELINE">To: </th>
                                                          <td><a href=3D"ma=
ilto:jricher@mitre.org" target=3D"_blank">&lt;jricher@mitre.org&gt;</a></td=
>
                                                          </tr>
                                                          </tbody>
                                                          </table>
                                                          <br>
                                                          <br>
                                                          <pre>A new versio=
n of I-D, draft-richer-oauth-introspection-02.txt
has been successfully submitted by Justin Richer and posted to the
IETF repository.

Filename:	 draft-richer-oauth-introspection
Revision:	 02
Title:		 OAuth Token Introspection
Creation date:	 2013-02-06
WG ID:		 Individual Submission
Number of pages: 6
URL:             <a href=3D"http://www.ietf.org/internet-drafts/draft-riche=
r-oauth-introspection-02.txt" target=3D"_blank">http://www.ietf.org/interne=
t-drafts/draft-richer-oauth-introspection-02.txt</a>
Status:          <a href=3D"http://datatracker.ietf.org/doc/draft-richer-oa=
uth-introspection" target=3D"_blank">http://datatracker.ietf.org/doc/draft-=
richer-oauth-introspection</a>
Htmlized:        <a href=3D"http://tools.ietf.org/html/draft-richer-oauth-i=
ntrospection-02" target=3D"_blank">http://tools.ietf.org/html/draft-richer-=
oauth-introspection-02</a>
Diff:            <a href=3D"http://www.ietf.org/rfcdiff?url2=3Ddraft-richer=
-oauth-introspection-02" target=3D"_blank">http://www.ietf.org/rfcdiff?url2=
=3Ddraft-richer-oauth-introspection-02</a>

Abstract:
   This specification defines a method for a client or protected
   resource to query an OAuth authorization server to determine meta-
   information about an OAuth token.


                                                                           =
      =20


The IETF Secretariat

</pre>
                                                          <br>
                                                          </div>
                                                          <br>
                                                          </div>
                                                          <br>
_______________________________________________<br>
                                                          OAuth mailing
                                                          list<br>
                                                          <a href=3D"mailto=
:OAuth@ietf.org" target=3D"_blank">OAuth@ietf.org</a><br>
                                                          <a href=3D"https:=
//www.ietf.org/mailman/listinfo/oauth" target=3D"_blank">https://www.ietf.o=
rg/mailman/listinfo/oauth</a><br>
                                                          <br>
                                                          </blockquote>
                                                          </div>
                                                          <br>
                                                          <br clear=3D"all"=
>
                                                          <div><br>
                                                          </div>
                                                          -- <br>
                                                          Thanks &amp;
                                                          Regards,<br>
                                                          Prabath
                                                          <div><br>
                                                          </div>
                                                          <div>Mobile :
                                                          <a href=3D"tel:%2=
B94%2071%20809%206732" value=3D"+94718096732" target=3D"_blank">+94
                                                          71 809 6732</a>=
=A0<br>
                                                          <br>
                                                          <a href=3D"http:/=
/blog.facilelogin.com" target=3D"_blank">http://blog.facilelogin.com</a><br=
>
                                                          <a href=3D"http:/=
/RampartFAQ.com" target=3D"_blank">http://RampartFAQ.com</a></div>
                                                          </div>
                                                          </blockquote>
                                                          <br>
                                                          </div>
                                                          </div>
                                                          </div>
                                                          </blockquote>
                                                          </div>
                                                          <br>
                                                          <br clear=3D"all"=
>
                                                          <div><br>
                                                          </div>
                                                          -- <br>
                                                          Thanks &amp;
                                                          Regards,<br>
                                                          Prabath
                                                          <div><br>
                                                          </div>
                                                          <div>Mobile :
                                                          <a href=3D"tel:%2=
B94%2071%20809%206732" value=3D"+94718096732" target=3D"_blank">+94
                                                          71 809 6732</a>=
=A0<br>
                                                          <br>
                                                          <a href=3D"http:/=
/blog.facilelogin.com" target=3D"_blank">http://blog.facilelogin.com</a><br=
>
                                                          <a href=3D"http:/=
/RampartFAQ.com" target=3D"_blank">http://RampartFAQ.com</a></div>
                                                          </div>
                                                          </blockquote>
                                                          <br>
                                                          </div>
                                                        </div>
                                                      </div>
                                                    </blockquote>
                                                  </div>
                                                  <br>
                                                  <br clear=3D"all">
                                                  <div><br>
                                                  </div>
                                                  -- <br>
                                                  Thanks &amp; Regards,<br>
                                                  Prabath
                                                  <div><br>
                                                  </div>
                                                  <div>Mobile : <a href=3D"=
tel:%2B94%2071%20809%206732" value=3D"+94718096732" target=3D"_blank">+94

                                                      71 809 6732</a>=A0<br=
>
                                                    <br>
                                                    <a href=3D"http://blog.=
facilelogin.com" target=3D"_blank">http://blog.facilelogin.com</a><br>
                                                    <a href=3D"http://Rampa=
rtFAQ.com" target=3D"_blank">http://RampartFAQ.com</a></div>
                                                </div>
                                              </blockquote>
                                              <br>
                                            </div>
                                          </div>
                                        </div>
                                      </blockquote>
                                    </div>
                                    <br>
                                    <br clear=3D"all">
                                    <div><br>
                                    </div>
                                    -- <br>
                                    Thanks &amp; Regards,<br>
                                    Prabath
                                    <div><br>
                                    </div>
                                    <div>Mobile : <a href=3D"tel:%2B94%2071=
%20809%206732" value=3D"+94718096732" target=3D"_blank">+94 71 809 6732</a>=
=A0<br>
                                      <br>
                                      <a href=3D"http://blog.facilelogin.co=
m" target=3D"_blank">http://blog.facilelogin.com</a><br>
                                      <a href=3D"http://RampartFAQ.com" tar=
get=3D"_blank">http://RampartFAQ.com</a></div>
                                  </div>
                                </div>
                              </blockquote>
                              <blockquote type=3D"cite">
                                <div><span>________________________________=
_______________</span><br>
                                  <span>OAuth mailing list</span><br>
                                  <span><a href=3D"mailto:OAuth@ietf.org" t=
arget=3D"_blank">OAuth@ietf.org</a></span><br>
                                  <span><a href=3D"https://www.ietf.org/mai=
lman/listinfo/oauth" target=3D"_blank">https://www.ietf.org/mailman/listinf=
o/oauth</a></span><br>
                                </div>
                              </blockquote>
                            </blockquote>
                            <br>
                          </div>
                        </div>
                      </div>
                    </blockquote>
                  </div>
                  <br>
                  <br clear=3D"all">
                  <div><br>
                  </div>
                  -- <br>
                  Thanks &amp; Regards,<br>
                  Prabath
                  <div><br>
                  </div>
                  <div>Mobile : <a href=3D"tel:%2B94%2071%20809%206732" val=
ue=3D"+94718096732" target=3D"_blank">+94 71 809
                      6732</a>=A0<br>
                    <br>
                    <a href=3D"http://blog.facilelogin.com" target=3D"_blan=
k">http://blog.facilelogin.com</a><br>
                    <a href=3D"http://RampartFAQ.com" target=3D"_blank">htt=
p://RampartFAQ.com</a></div>
                </div>
              </div>
            </div>
          </blockquote>
        </div>
        <br>
        <br clear=3D"all">
        <div><br>
        </div>
        -- <br>
        Thanks &amp; Regards,<br>
        Prabath
        <div><br>
        </div>
        <div>Mobile : <a href=3D"tel:%2B94%2071%20809%206732" value=3D"+947=
18096732" target=3D"_blank">+94 71 809 6732</a>=A0<br>
          <br>
          <a href=3D"http://blog.facilelogin.com" target=3D"_blank">http://=
blog.facilelogin.com</a><br>
          <a href=3D"http://RampartFAQ.com" target=3D"_blank">http://Rampar=
tFAQ.com</a></div>
      </div>
    </blockquote>
    <br>
  </div></div></div>

</blockquote></div><br><br clear=3D"all"><div><br></div>-- <br>Thanks &amp;=
 Regards,<br>Prabath<div><br></div><div>Mobile : <a href=3D"tel:%2B94%2071%=
20809%206732" value=3D"+94718096732" target=3D"_blank">+94 71 809 6732</a>=
=A0<br>
<br><a href=3D"http://blog.facilelogin.com" target=3D"_blank">http://blog.f=
acilelogin.com</a><br>
<a href=3D"http://RampartFAQ.com" target=3D"_blank">http://RampartFAQ.com</=
a></div>
</div></div></div>
</blockquote></div><br><br clear=3D"all"><div><br></div>-- <br>Thanks &amp;=
 Regards,<br>Prabath<div><br></div><div>Mobile : +94 71 809 6732=A0<br><br>=
<a href=3D"http://blog.facilelogin.com" target=3D"_blank">http://blog.facil=
elogin.com</a><br>
<a href=3D"http://RampartFAQ.com" target=3D"_blank">http://RampartFAQ.com</=
a></div>
</div>

--047d7b3440f86a0b6104d5b007fb--

From jricher@mitre.org  Thu Feb 14 06:25:46 2013
Return-Path: <jricher@mitre.org>
X-Original-To: oauth@ietfa.amsl.com
Delivered-To: oauth@ietfa.amsl.com
Received: from localhost (localhost [127.0.0.1]) by ietfa.amsl.com (Postfix) with ESMTP id F2ECE21F882C for <oauth@ietfa.amsl.com>; Thu, 14 Feb 2013 06:25:45 -0800 (PST)
X-Virus-Scanned: amavisd-new at amsl.com
X-Spam-Flag: NO
X-Spam-Score: -6.569
X-Spam-Level: 
X-Spam-Status: No, score=-6.569 tagged_above=-999 required=5 tests=[AWL=0.029,  BAYES_00=-2.599, HTML_MESSAGE=0.001, RCVD_IN_DNSWL_MED=-4]
Received: from mail.ietf.org ([64.170.98.30]) by localhost (ietfa.amsl.com [127.0.0.1]) (amavisd-new, port 10024) with ESMTP id gs2W6alkdcr8 for <oauth@ietfa.amsl.com>; Thu, 14 Feb 2013 06:25:40 -0800 (PST)
Received: from smtpksrv1.mitre.org (smtpksrv1.mitre.org [198.49.146.77]) by ietfa.amsl.com (Postfix) with ESMTP id 9D86D21F882E for <oauth@ietf.org>; Thu, 14 Feb 2013 06:25:39 -0800 (PST)
Received: from smtpksrv1.mitre.org (localhost.localdomain [127.0.0.1]) by localhost (Postfix) with SMTP id 55ED51F2C9F; Thu, 14 Feb 2013 09:25:38 -0500 (EST)
Received: from IMCCAS02.MITRE.ORG (imccas02.mitre.org [129.83.29.79]) by smtpksrv1.mitre.org (Postfix) with ESMTP id 39CC41F2C88; Thu, 14 Feb 2013 09:25:38 -0500 (EST)
Received: from [10.146.15.29] (129.83.31.58) by IMCCAS02.MITRE.ORG (129.83.29.79) with Microsoft SMTP Server (TLS) id 14.2.318.4; Thu, 14 Feb 2013 09:25:36 -0500
Message-ID: <511CF3B3.7010502@mitre.org>
Date: Thu, 14 Feb 2013 09:24:51 -0500
From: Justin Richer <jricher@mitre.org>
User-Agent: Mozilla/5.0 (X11; Linux i686; rv:17.0) Gecko/20130106 Thunderbird/17.0.2
MIME-Version: 1.0
To: Prabath Siriwardena <prabath@wso2.com>
References: <20130206192420.32698.21027.idtracker@ietfa.amsl.com> <5112AE0B.1080501@mitre.org> <CAJV9qO_8-4FowrXK=ae-+xMjiJFP04ryVMLQ8SGUH8kp3PHrLg@mail.gmail.com> <5113C3AA.1040701@mitre.org> <CAJV9qO8BVV57eAb5kUNes15AYOpUKqw5XWQswh-FJA=b1pPgSA@mail.gmail.com> <5113DDB2.7060805@mitre.org> <CAJV9qO_gM1oera9ae9sqh9n17e-ZLKuC2pmsZwhq-RmFcMyqHA@mail.gmail.com> <51196777.6000502@mitre.org> <CAJV9qO-5bWZbNUfCmaqYBQoy-qwNaSZFOsO9GL3CrbSejwVTzw@mail.gmail.com> <F6595A40-6B4E-4718-ABB5-694CA975C4DB@maymount.com> <511A5062.5010108@mitre.org> <CAJV9qO_Mr87NX=KZRqCsWasQ1FuvDNBw14eS-TcPf_KRJztQFg@mail.gmail.com> <CAJV9qO-71-sM6kXOB6Fb_bvVkDBQ5JBbs8E5X=f-K=iEmGezRA@mail.gmail.com> <511CEEAA.3030801@mitre.org> <CAJV9qO-JSXgSTkw2_pdH0D-o-xDWGDqxx=PAWYtnTj4hOQXW4Q@mail.gmail.com>
In-Reply-To: <CAJV9qO-JSXgSTkw2_pdH0D-o-xDWGDqxx=PAWYtnTj4hOQXW4Q@mail.gmail.com>
Content-Type: multipart/alternative; boundary="------------030105000502060207030806"
X-Originating-IP: [129.83.31.58]
Cc: "oauth@ietf.org" <oauth@ietf.org>
Subject: Re: [OAUTH-WG] Fwd: New Version Notification for draft-richer-oauth-introspection-02.txt
X-BeenThere: oauth@ietf.org
X-Mailman-Version: 2.1.12
Precedence: list
List-Id: OAUTH WG <oauth.ietf.org>
List-Unsubscribe: <https://www.ietf.org/mailman/options/oauth>, <mailto:oauth-request@ietf.org?subject=unsubscribe>
List-Archive: <http://www.ietf.org/mail-archive/web/oauth>
List-Post: <mailto:oauth@ietf.org>
List-Help: <mailto:oauth-request@ietf.org?subject=help>
List-Subscribe: <https://www.ietf.org/mailman/listinfo/oauth>, <mailto:oauth-request@ietf.org?subject=subscribe>
X-List-Received-Date: Thu, 14 Feb 2013 14:25:46 -0000

--------------030105000502060207030806
Content-Type: text/plain; charset="ISO-8859-1"; format=flowed
Content-Transfer-Encoding: 7bit

OK, so you mean "token type" as defined by the "token_type" field coming 
back from the Token Endpoint, and *not* as defined by the 
"token_type_hint" in the revocation draft. Right?

The RO probably won't know or care about the token type. The client and 
AS have to know because they need to know how to use and provision it, 
respectively. The RS needs to know the type to be able to validate the 
call at some level.

I'm not opposed to token types being returned, I just want people to be 
very clear about what they mean by "token type" when they say it.

  -- Justin

On 02/14/2013 09:22 AM, Prabath Siriwardena wrote:
> Both the client and the resource owner should be aware of the token type.
>
> My argument is, if the authorization server to decide whether the 
> token is valid or not ( irrespective of who asked the question) - AS 
> needs to know the token type - because to validate a token AS should 
> know the token type.
>
> The token type could be, bearer or MAC or any other token type.
>
> Thanks & regards,
> -Prabath
>
> On Thu, Feb 14, 2013 at 7:33 PM, Justin Richer <jricher@mitre.org 
> <mailto:jricher@mitre.org>> wrote:
>
>     What exactly are you suggesting be added to introspection? The
>     "token_type_hint" is from the client to the server, but what
>     you've asked for in terms of "token type" is from the server to
>     the client. And there was never an answer to what exactly is meant
>     by "token type" in this case, particularly because you seem to
>     want to call out things like SAML and Bearer as separate types.
>
>      -- Justin
>
>
>
>     On 02/14/2013 06:59 AM, Prabath Siriwardena wrote:
>>     I noticed that the latest Token Revocation draft [1] has
>>     introduced the parameter "token_type_hint". I would suggest the
>>     same here, as that would make what is meant by "valid" much clear..
>>
>>     [1]: http://tools.ietf.org/html/draft-ietf-oauth-revocation-05
>>
>>     Thanks & regards,
>>     -Prabath
>>
>>     On Tue, Feb 12, 2013 at 9:35 PM, Prabath Siriwardena
>>     <prabath@wso2.com <mailto:prabath@wso2.com>> wrote:
>>
>>         Hi Justin,
>>
>>         I doubt whether valid_token would make a difference..?
>>
>>         My initial argument is what is the validation criteria..?
>>         Validation criteria depends on the token_type..
>>
>>         If we are talking only about metadata - then I believe
>>         "revoked", "expired" would be more meaningful..
>>
>>         Thanks & regards,
>>         -Prabath
>>
>>
>>         On Tue, Feb 12, 2013 at 7:53 PM, Justin Richer
>>         <jricher@mitre.org <mailto:jricher@mitre.org>> wrote:
>>
>>             OK, I can see the wisdom in changing this term.
>>
>>             I picked "valid" because I wanted a simple "boolean"
>>             value that would require no additional parsing or
>>             string-matching on the client's behalf, and I'd like to
>>             stick with that. OAuth is built with the assumption that
>>             clients need to be able to recover from invalid tokens at
>>             any stage, so I think a simple yes/no is the right step
>>             here.
>>
>>             That said, I think you're both right that "valid" seems
>>             to have caused a bit of confusion. I don't want to go
>>             with "revoked" because I'd rather have the "token is OK"
>>             be the positive boolean value.
>>
>>             Would "valid_token" be more clear? Or do we need a
>>             different adjective all together?
>>
>>              -- Justin
>>
>>
>>             On 02/11/2013 08:02 PM, Richard Harrington wrote:
>>>             Have you considered "status" instead of "valid"?  It
>>>             could have values like "active", "expired", and "revoked".
>>>
>>>             Is it worthwhile including the status of the client
>>>             also?  For example, a client application could be
>>>             disabled, temporarily or permanently, and thus disabling
>>>             its access tokens as well.
>>>
>>>
>>>             On Feb 11, 2013, at 1:56 PM, Prabath Siriwardena
>>>             <prabath@wso2.com <mailto:prabath@wso2.com>> wrote:
>>>
>>>>             I guess confusion is with 'valid' parameter is in the
>>>>             response..
>>>>
>>>>             I thought this will be helpful to standardize the
>>>>             communication between Resource Server and the
>>>>             Authorization Server..
>>>>
>>>>             I would suggest we completely remove "valid" from the
>>>>             response - or define it much clearly..
>>>>
>>>>             May be can add "revoked" with a boolean attribute..
>>>>
>>>>             Thanks & regards,
>>>>             -Prabath
>>>>
>>>>             On Tue, Feb 12, 2013 at 3:19 AM, Justin Richer
>>>>             <jricher@mitre.org <mailto:jricher@mitre.org>> wrote:
>>>>
>>>>
>>>>                 On 02/08/2013 12:51 AM, Prabath Siriwardena wrote:
>>>>>                 Hi Justin,
>>>>>
>>>>>                 I have couple of questions related to "valid"
>>>>>                 parameter...
>>>>>
>>>>>                 This endpoint can be invoked by the Resource
>>>>>                 Server in runtime...
>>>>
>>>>                 That's correct.
>>>>
>>>>
>>>>>
>>>>>                 In that case what is exactly meant by the
>>>>>                 "resource_id" in request ?
>>>>
>>>>                 The resource_id field is a service-specific string
>>>>                 that basically lets the resource server provide
>>>>                 some context to the request to the auth server.
>>>>                 There have been some other suggestions like client
>>>>                 IP address, but I wanted to put this one in because
>>>>                 it seemed to be a common theme. The client is
>>>>                 trying to do *something* with the token, after all,
>>>>                 and the rights, permissions, and metadata
>>>>                 associated with the token could change based on
>>>>                 that. Since the Introspection endpoint is all about
>>>>                 getting that metadata back to the PR, this seemed
>>>>                 like a good idea.
>>>>
>>>>
>>>>>
>>>>>                 IMO a token to be valid depends on set of criteria
>>>>>                 based on it's type..
>>>>>
>>>>>                 For a Bearer token..
>>>>>
>>>>>                 1. Token should not be expired
>>>>>                 2. Token should not be revoked.
>>>>>                 3. The scope the token issued should match with
>>>>>                 the scope required for the resource.
>>>>>
>>>>>                 For a MAC token...
>>>>>
>>>>>                 1. Token not expired (mac id)
>>>>>                 2. Token should not be revoked
>>>>>                 3. The scope the token issued should match with
>>>>>                 the scope required for the resource.
>>>>>                 4. HMAC check should be valid
>>>>>
>>>>>                 There are similar conditions for SAML bearer too..
>>>>
>>>>                 This isn't really true. The SAML bearer token is
>>>>                 fully self-contained and doesn't change based on
>>>>                 other parameters in the message, unlike MAC. Same
>>>>                 with JWT. When it hands a SAML or JWT token to the
>>>>                 AS, the PR has given *everything* the server needs
>>>>                 to check that token's validity and use.
>>>>
>>>>                 MAC signatures change with every message, and
>>>>                 they're done across several components of the HTTP
>>>>                 message. Therefor, the HMAC check for MAC style
>>>>                 tokens will still need to be done by the protected
>>>>                 resource. Introspection would help in the case that
>>>>                 the signature validated just fine, but the token
>>>>                 might have expired. Or you need to know what scopes
>>>>                 apply. Introspection isn't to fully validate the
>>>>                 call to the protected resource -- if that were the
>>>>                 case, the PR would have to send some kind of
>>>>                 encapsulated version of the original request.
>>>>                 Otherwise, the AS won't have all of the information
>>>>                 it needs to check the MAC.
>>>>
>>>>
>>>>                 I think what you're describing is ultimately *not*
>>>>                 what the introspection endpoint is intended to do.
>>>>                 If that's unclear from the document, can you please
>>>>                 suggest text that would help clear the use case up?
>>>>                 I wouldn't want it to be ambiguous.
>>>>
>>>>                  -- Justin
>>>>
>>>>
>>>>>
>>>>>                 Thanks & regards,
>>>>>                 -Prabath
>>>>>
>>>>>
>>>>>                 On Thu, Feb 7, 2013 at 10:30 PM, Justin Richer
>>>>>                 <jricher@mitre.org <mailto:jricher@mitre.org>> wrote:
>>>>>
>>>>>                     It validates the token, which would be either
>>>>>                     the token itself in the case of Bearer or the
>>>>>                     token "id" part of something more complex like
>>>>>                     MAC. It doesn't directly validate the usage of
>>>>>                     the token, that's still up to the PR to do that.
>>>>>
>>>>>                     I nearly added a "token type" field in this
>>>>>                     draft, but held back because there are several
>>>>>                     kinds of "token type" that people talk about
>>>>>                     in OAuth. First, there's "Bearer" vs. "MAC"
>>>>>                     vs. "HOK", or what have you. Then within
>>>>>                     Bearer you have "JWT" or "SAML" or
>>>>>                     "unstructured blob". Then you've also got
>>>>>                     "access" vs. "refresh" and other flavors of
>>>>>                     token, like the id_token in OpenID Connect.
>>>>>
>>>>>                     Thing is, the server running the introspection
>>>>>                     endpoint will probably know *all* of these.
>>>>>                     But should it tell the client? If so, which of
>>>>>                     the three, and what names should the fields be?
>>>>>
>>>>>                      -- Justin
>>>>>
>>>>>
>>>>>                     On 02/07/2013 11:26 AM, Prabath Siriwardena wrote:
>>>>>>                     Okay.. I was thinking this could be used as a
>>>>>>                     way to validate the token as well. BTW even
>>>>>>                     in this case shouldn't communicate the type
>>>>>>                     of token to AS? For example in the case of
>>>>>>                     SAML profile - it could be SAML token..
>>>>>>
>>>>>>                     Thanks & regards,
>>>>>>                     -Prabath
>>>>>>
>>>>>>                     On Thu, Feb 7, 2013 at 8:39 PM, Justin Richer
>>>>>>                     <jricher@mitre.org
>>>>>>                     <mailto:jricher@mitre.org>> wrote:
>>>>>>
>>>>>>                         "valid" might not be the best term, but
>>>>>>                         it's meant to be a field where the server
>>>>>>                         says "yes this token is still good" or
>>>>>>                         "no this token isn't good anymore". We
>>>>>>                         could instead do this with HTTP codes or
>>>>>>                         something but I went with a pure JSON
>>>>>>                         response.
>>>>>>
>>>>>>                          -- Justin
>>>>>>
>>>>>>
>>>>>>                         On 02/06/2013 10:47 PM, Prabath
>>>>>>                         Siriwardena wrote:
>>>>>>>                         Hi Justin,
>>>>>>>
>>>>>>>                         I believe this is addressing one of the
>>>>>>>                         key missing part in OAuth 2.0...
>>>>>>>
>>>>>>>                         One question - I guess this was
>>>>>>>                         discussed already...
>>>>>>>
>>>>>>>                         In the spec - in the introspection
>>>>>>>                         response it has the attribute "valid" -
>>>>>>>                         this is basically the validity of the
>>>>>>>                         token provided in the request.
>>>>>>>
>>>>>>>                         Validation criteria depends on the token
>>>>>>>                         and well as token type ( Bearer, MAC..).
>>>>>>>
>>>>>>>                         In the spec it seems like it's coupled
>>>>>>>                         with Bearer token type... But I guess,
>>>>>>>                         by adding "token_type" to the request we
>>>>>>>                         can remove this dependency.
>>>>>>>
>>>>>>>                         WDYT..?
>>>>>>>
>>>>>>>                         Thanks & regards,
>>>>>>>                         -Prabath
>>>>>>>
>>>>>>>                         On Thu, Feb 7, 2013 at 12:54 AM, Justin
>>>>>>>                         Richer <jricher@mitre.org
>>>>>>>                         <mailto:jricher@mitre.org>> wrote:
>>>>>>>
>>>>>>>                             Updated introspection draft based on
>>>>>>>                             recent comments. Changes include:
>>>>>>>
>>>>>>>                              - "scope" return parameter now
>>>>>>>                             follows RFC6749 format instead of
>>>>>>>                             JSON array
>>>>>>>                              - "subject" -> "sub", and
>>>>>>>                             "audience" -> "aud", to be parallel
>>>>>>>                             with JWT claims
>>>>>>>                              - clarified what happens if the
>>>>>>>                             authentication is bad
>>>>>>>
>>>>>>>                              -- Justin
>>>>>>>
>>>>>>>
>>>>>>>                             -------- Original Message --------
>>>>>>>                             Subject: 	New Version Notification
>>>>>>>                             for
>>>>>>>                             draft-richer-oauth-introspection-02.txt
>>>>>>>                             Date: 	Wed, 6 Feb 2013 11:24:20 -0800
>>>>>>>                             From: 	<internet-drafts@ietf.org>
>>>>>>>                             <mailto:internet-drafts@ietf.org>
>>>>>>>                             To: 	<jricher@mitre.org>
>>>>>>>                             <mailto:jricher@mitre.org>
>>>>>>>
>>>>>>>
>>>>>>>
>>>>>>>                             A new version of I-D, draft-richer-oauth-introspection-02.txt
>>>>>>>                             has been successfully submitted by Justin Richer and posted to the
>>>>>>>                             IETF repository.
>>>>>>>
>>>>>>>                             Filename:	 draft-richer-oauth-introspection
>>>>>>>                             Revision:	 02
>>>>>>>                             Title:		 OAuth Token Introspection
>>>>>>>                             Creation date:	 2013-02-06
>>>>>>>                             WG ID:		 Individual Submission
>>>>>>>                             Number of pages: 6
>>>>>>>                             URL:http://www.ietf.org/internet-drafts/draft-richer-oauth-introspection-02.txt
>>>>>>>                             Status:http://datatracker.ietf.org/doc/draft-richer-oauth-introspection
>>>>>>>                             Htmlized:http://tools.ietf.org/html/draft-richer-oauth-introspection-02
>>>>>>>                             Diff:http://www.ietf.org/rfcdiff?url2=draft-richer-oauth-introspection-02
>>>>>>>
>>>>>>>                             Abstract:
>>>>>>>                                 This specification defines a method for a client or protected
>>>>>>>                                 resource to query an OAuth authorization server to determine meta-
>>>>>>>                                 information about an OAuth token.
>>>>>>>
>>>>>>>
>>>>>>>                                                                                                                
>>>>>>>
>>>>>>>
>>>>>>>                             The IETF Secretariat
>>>>>>>
>>>>>>>
>>>>>>>
>>>>>>>
>>>>>>>                             _______________________________________________
>>>>>>>                             OAuth mailing list
>>>>>>>                             OAuth@ietf.org <mailto:OAuth@ietf.org>
>>>>>>>                             https://www.ietf.org/mailman/listinfo/oauth
>>>>>>>
>>>>>>>
>>>>>>>
>>>>>>>
>>>>>>>                         -- 
>>>>>>>                         Thanks & Regards,
>>>>>>>                         Prabath
>>>>>>>
>>>>>>>                         Mobile : +94 71 809 6732
>>>>>>>                         <tel:%2B94%2071%20809%206732>
>>>>>>>
>>>>>>>                         http://blog.facilelogin.com
>>>>>>>                         http://RampartFAQ.com
>>>>>>
>>>>>>
>>>>>>
>>>>>>
>>>>>>                     -- 
>>>>>>                     Thanks & Regards,
>>>>>>                     Prabath
>>>>>>
>>>>>>                     Mobile : +94 71 809 6732
>>>>>>                     <tel:%2B94%2071%20809%206732>
>>>>>>
>>>>>>                     http://blog.facilelogin.com
>>>>>>                     http://RampartFAQ.com
>>>>>
>>>>>
>>>>>
>>>>>
>>>>>                 -- 
>>>>>                 Thanks & Regards,
>>>>>                 Prabath
>>>>>
>>>>>                 Mobile : +94 71 809 6732
>>>>>                 <tel:%2B94%2071%20809%206732>
>>>>>
>>>>>                 http://blog.facilelogin.com
>>>>>                 http://RampartFAQ.com
>>>>
>>>>
>>>>
>>>>
>>>>             -- 
>>>>             Thanks & Regards,
>>>>             Prabath
>>>>
>>>>             Mobile : +94 71 809 6732 <tel:%2B94%2071%20809%206732>
>>>>
>>>>             http://blog.facilelogin.com
>>>>             http://RampartFAQ.com
>>>>             _______________________________________________
>>>>             OAuth mailing list
>>>>             OAuth@ietf.org <mailto:OAuth@ietf.org>
>>>>             https://www.ietf.org/mailman/listinfo/oauth
>>
>>
>>
>>
>>         -- 
>>         Thanks & Regards,
>>         Prabath
>>
>>         Mobile : +94 71 809 6732 <tel:%2B94%2071%20809%206732>
>>
>>         http://blog.facilelogin.com
>>         http://RampartFAQ.com
>>
>>
>>
>>
>>     -- 
>>     Thanks & Regards,
>>     Prabath
>>
>>     Mobile : +94 71 809 6732 <tel:%2B94%2071%20809%206732>
>>
>>     http://blog.facilelogin.com
>>     http://RampartFAQ.com
>
>
>
>
> -- 
> Thanks & Regards,
> Prabath
>
> Mobile : +94 71 809 6732
>
> http://blog.facilelogin.com
> http://RampartFAQ.com


--------------030105000502060207030806
Content-Type: text/html; charset="ISO-8859-1"
Content-Transfer-Encoding: 7bit

<html>
  <head>
    <meta content="text/html; charset=ISO-8859-1"
      http-equiv="Content-Type">
  </head>
  <body bgcolor="#FFFFFF" text="#000000">
    OK, so you mean "token type" as defined by the "token_type" field
    coming back from the Token Endpoint, and *not* as defined by the
    "token_type_hint" in the revocation draft. Right?<br>
    <br>
    The RO probably won't know or care about the token type. The client
    and AS have to know because they need to know how to use and
    provision it, respectively. The RS needs to know the type to be able
    to validate the call at some level.<br>
    <br>
    I'm not opposed to token types being returned, I just want people to
    be very clear about what they mean by "token type" when they say it.<br>
    <br>
    &nbsp;-- Justin<br>
    <br>
    <div class="moz-cite-prefix">On 02/14/2013 09:22 AM, Prabath
      Siriwardena wrote:<br>
    </div>
    <blockquote
cite="mid:CAJV9qO-JSXgSTkw2_pdH0D-o-xDWGDqxx=PAWYtnTj4hOQXW4Q@mail.gmail.com"
      type="cite">
      <meta http-equiv="Content-Type" content="text/html;
        charset=ISO-8859-1">
      Both the client and the resource owner should be aware of the
      token type.
      <div><br>
      </div>
      <div>My argument is, if the authorization server to decide whether
        the token is valid or not ( irrespective of who asked the
        question) - AS needs to know the token type - because to
        validate a token AS should know the token type.</div>
      <div><br>
      </div>
      <div>The token type could be, bearer or MAC or any other token
        type.</div>
      <div><br>
      </div>
      <div>Thanks &amp; regards,</div>
      <div>-Prabath<br>
        <br>
        <div class="gmail_quote">On Thu, Feb 14, 2013 at 7:33 PM, Justin
          Richer <span dir="ltr">&lt;<a moz-do-not-send="true"
              href="mailto:jricher@mitre.org" target="_blank">jricher@mitre.org</a>&gt;</span>
          wrote:<br>
          <blockquote class="gmail_quote" style="margin:0 0 0
            .8ex;border-left:1px #ccc solid;padding-left:1ex">
            <div bgcolor="#FFFFFF" text="#000000"> What exactly are you
              suggesting be added to introspection? The
              "token_type_hint" is from the client to the server, but
              what you've asked for in terms of "token type" is from the
              server to the client. And there was never an answer to
              what exactly is meant by "token type" in this case,
              particularly because you seem to want to call out things
              like SAML and Bearer as separate types. <br>
              <span class="HOEnZb"><font color="#888888"> <br>
                  &nbsp;-- Justin</font></span>
              <div>
                <div class="h5"><br>
                  <br>
                  <br>
                  <div>On 02/14/2013 06:59 AM, Prabath Siriwardena
                    wrote:<br>
                  </div>
                  <blockquote type="cite"> I noticed that the latest
                    Token Revocation draft [1] has introduced the
                    parameter "token_type_hint". I would suggest the
                    same here, as that would make what is meant by
                    "valid" much clear..
                    <div><br>
                    </div>
                    <div>[1]:&nbsp;<a moz-do-not-send="true"
                        href="http://tools.ietf.org/html/draft-ietf-oauth-revocation-05"
style="color:rgb(17,85,204);font-size:12.727272033691406px;font-family:arial,sans-serif"
                        target="_blank">http://tools.ietf.org/html/draft-ietf-oauth-revocation-05</a></div>
                    <div><br>
                    </div>
                    <div>Thanks &amp; regards,</div>
                    <div>-Prabath<br>
                      <br>
                      <div class="gmail_quote">On Tue, Feb 12, 2013 at
                        9:35 PM, Prabath Siriwardena <span dir="ltr">&lt;<a
                            moz-do-not-send="true"
                            href="mailto:prabath@wso2.com"
                            target="_blank">prabath@wso2.com</a>&gt;</span>
                        wrote:<br>
                        <blockquote class="gmail_quote" style="margin:0
                          0 0 .8ex;border-left:1px #ccc
                          solid;padding-left:1ex">Hi Justin,
                          <div><br>
                          </div>
                          <div>I doubt whether valid_token would make a
                            difference..?</div>
                          <div><br>
                          </div>
                          <div>My initial argument is what is the
                            validation criteria..? Validation criteria
                            depends on the token_type..</div>
                          <div> <br>
                          </div>
                          <div>If we are talking only about metadata -
                            then I believe "revoked", "expired" would be
                            more meaningful..</div>
                          <div><br>
                          </div>
                          <div>Thanks &amp; regards,</div>
                          <div>-Prabath
                            <div>
                              <div> <br>
                                <br>
                                <div class="gmail_quote"> On Tue, Feb
                                  12, 2013 at 7:53 PM, Justin Richer <span
                                    dir="ltr">&lt;<a
                                      moz-do-not-send="true"
                                      href="mailto:jricher@mitre.org"
                                      target="_blank">jricher@mitre.org</a>&gt;</span>
                                  wrote:<br>
                                  <blockquote class="gmail_quote"
                                    style="margin:0 0 0
                                    .8ex;border-left:1px #ccc
                                    solid;padding-left:1ex">
                                    <div bgcolor="#FFFFFF"
                                      text="#000000"> OK, I can see the
                                      wisdom in changing this term. <br>
                                      <br>
                                      I picked "valid" because I wanted
                                      a simple "boolean" value that
                                      would require no additional
                                      parsing or string-matching on the
                                      client's behalf, and I'd like to
                                      stick with that. OAuth is built
                                      with the assumption that clients
                                      need to be able to recover from
                                      invalid tokens at any stage, so I
                                      think a simple yes/no is the right
                                      step here. <br>
                                      <br>
                                      That said, I think you're both
                                      right that "valid" seems to have
                                      caused a bit of confusion. I don't
                                      want to go with "revoked" because
                                      I'd rather have the "token is OK"
                                      be the positive boolean value. <br>
                                      <br>
                                      Would "valid_token" be more clear?
                                      Or do we need a different
                                      adjective all together?<span><font
                                          color="#888888"><br>
                                          <br>
                                          &nbsp;-- Justin</font></span>
                                      <div>
                                        <div><br>
                                          <br>
                                          <div>On 02/11/2013 08:02 PM,
                                            Richard Harrington wrote:<br>
                                          </div>
                                          <blockquote type="cite">
                                            <div>Have you considered
                                              "status" instead of
                                              "valid"? &nbsp;It could have
                                              values like "active",
                                              "expired", and "revoked".</div>
                                            <div><br>
                                            </div>
                                            <div>Is it worthwhile
                                              including the status of
                                              the client also? &nbsp;For
                                              example, a client
                                              application could be
                                              disabled, temporarily or
                                              permanently, and thus
                                              disabling its access
                                              tokens as well.</div>
                                            <div><br>
                                            </div>
                                            <div><br>
                                              On Feb 11, 2013, at 1:56
                                              PM, Prabath Siriwardena
                                              &lt;<a
                                                moz-do-not-send="true"
                                                href="mailto:prabath@wso2.com"
                                                target="_blank">prabath@wso2.com</a>&gt;


                                              wrote:<br>
                                              <br>
                                            </div>
                                            <blockquote type="cite">
                                              <div>I guess confusion is
                                                with 'valid' parameter
                                                is in the response..
                                                <div><br>
                                                </div>
                                                <div>I thought this will
                                                  be helpful
                                                  to&nbsp;standardize&nbsp;the
                                                  communication between
                                                  Resource Server and
                                                  the Authorization
                                                  Server..</div>
                                                <div><br>
                                                </div>
                                                <div>I would suggest we
                                                  completely remove
                                                  "valid" from the
                                                  response - or define
                                                  it much clearly..</div>
                                                <div><br>
                                                </div>
                                                <div>May be can add
                                                  "revoked" with a
                                                  boolean attribute..</div>
                                                <div><br>
                                                </div>
                                                <div>Thanks &amp;
                                                  regards,</div>
                                                <div>-Prabath<br>
                                                  <br>
                                                  <div
                                                    class="gmail_quote">On
                                                    Tue, Feb 12, 2013 at
                                                    3:19 AM, Justin
                                                    Richer <span
                                                      dir="ltr">&lt;<a
                                                        moz-do-not-send="true"
href="mailto:jricher@mitre.org" target="_blank">jricher@mitre.org</a>&gt;</span>
                                                    wrote:<br>
                                                    <blockquote
                                                      class="gmail_quote"
                                                      style="margin:0 0
                                                      0
                                                      .8ex;border-left:1px
                                                      #ccc
                                                      solid;padding-left:1ex">
                                                      <div
                                                        bgcolor="#FFFFFF"
                                                        text="#000000">
                                                        <div> <br>
                                                          <div>On
                                                          02/08/2013
                                                          12:51 AM,
                                                          Prabath
                                                          Siriwardena
                                                          wrote:<br>
                                                          </div>
                                                        </div>
                                                        <blockquote
                                                          type="cite">
                                                          Hi&nbsp;Justin,
                                                          <div><br>
                                                          </div>
                                                          <div>
                                                          <div>I have
                                                          couple of
                                                          questions
                                                          related to
                                                          "valid"
                                                          parameter...</div>
                                                          <div><br>
                                                          </div>
                                                          <div>This
                                                          endpoint can
                                                          be invoked by
                                                          the Resource
                                                          Server in
                                                          runtime...</div>
                                                          </div>
                                                        </blockquote>
                                                        <br>
                                                        That's correct.
                                                        <div><br>
                                                          <br>
                                                          <blockquote
                                                          type="cite">
                                                          <div><br>
                                                          </div>
                                                          <div>In that
                                                          case what is
                                                          exactly meant
                                                          by the
                                                          "resource_id"
                                                          in request ?</div>
                                                          </blockquote>
                                                          <br>
                                                        </div>
                                                        The resource_id
                                                        field is a
                                                        service-specific
                                                        string that
                                                        basically lets
                                                        the resource
                                                        server provide
                                                        some context to
                                                        the request to
                                                        the auth server.
                                                        There have been
                                                        some other
                                                        suggestions like
                                                        client IP
                                                        address, but I
                                                        wanted to put
                                                        this one in
                                                        because it
                                                        seemed to be a
                                                        common theme.
                                                        The client is
                                                        trying to do
                                                        *something* with
                                                        the token, after
                                                        all, and the
                                                        rights,
                                                        permissions, and
                                                        metadata
                                                        associated with
                                                        the token could
                                                        change based on
                                                        that. Since the
                                                        Introspection
                                                        endpoint is all
                                                        about getting
                                                        that metadata
                                                        back to the PR,
                                                        this seemed like
                                                        a good idea.
                                                        <div><br>
                                                          <br>
                                                          <blockquote
                                                          type="cite">
                                                          <div><br>
                                                          </div>
                                                          <div>IMO a
                                                          token to be
                                                          valid depends
                                                          on set of
                                                          criteria based
                                                          on it's type..</div>
                                                          <div><br>
                                                          </div>
                                                          <div>For a
                                                          Bearer token..</div>
                                                          <div><br>
                                                          </div>
                                                          <div>1. Token
                                                          should not be
                                                          expired</div>
                                                          <div>2. Token
                                                          should not be
                                                          revoked.</div>
                                                          <div>3. The
                                                          scope the
                                                          token issued
                                                          should match
                                                          with the scope
                                                          required for
                                                          the resource.</div>
                                                          <div><br>
                                                          </div>
                                                          <div>For a MAC
                                                          token...</div>
                                                          <div><br>
                                                          </div>
                                                          <div>1. Token
                                                          not expired
                                                          (mac id)</div>
                                                          <div>2. Token
                                                          should not be
                                                          revoked</div>
                                                          <div>3. The
                                                          scope the
                                                          token issued
                                                          should match
                                                          with the scope
                                                          required for
                                                          the resource.</div>
                                                          <div>4. HMAC
                                                          check should
                                                          be valid</div>
                                                          <div><br>
                                                          </div>
                                                          There are
                                                          similar
                                                          conditions for
                                                          SAML bearer
                                                          too..</blockquote>
                                                          <br>
                                                        </div>
                                                        This isn't
                                                        really true. The
                                                        SAML bearer
                                                        token is fully
                                                        self-contained
                                                        and doesn't
                                                        change based on
                                                        other parameters
                                                        in the message,
                                                        unlike MAC. Same
                                                        with JWT. When
                                                        it hands a SAML
                                                        or JWT token to
                                                        the AS, the PR
                                                        has given
                                                        *everything* the
                                                        server needs to
                                                        check that
                                                        token's validity
                                                        and use. <br>
                                                        <br>
                                                        MAC signatures
                                                        change with
                                                        every message,
                                                        and they're done
                                                        across several
                                                        components of
                                                        the HTTP
                                                        message.
                                                        Therefor, the
                                                        HMAC check for
                                                        MAC style tokens
                                                        will still need
                                                        to be done by
                                                        the protected
                                                        resource.
                                                        Introspection
                                                        would help in
                                                        the case that
                                                        the signature
                                                        validated just
                                                        fine, but the
                                                        token might have
                                                        expired. Or you
                                                        need to know
                                                        what scopes
                                                        apply.
                                                        Introspection
                                                        isn't to fully
                                                        validate the
                                                        call to the
                                                        protected
                                                        resource -- if
                                                        that were the
                                                        case, the PR
                                                        would have to
                                                        send some kind
                                                        of encapsulated
                                                        version of the
                                                        original
                                                        request.
                                                        Otherwise, the
                                                        AS won't have
                                                        all of the
                                                        information it
                                                        needs to check
                                                        the MAC.<br>
                                                        <br>
                                                        <br>
                                                        I think what
                                                        you're
                                                        describing is
                                                        ultimately *not*
                                                        what the
                                                        introspection
                                                        endpoint is
                                                        intended to do.
                                                        If that's
                                                        unclear from the
                                                        document, can
                                                        you please
                                                        suggest text
                                                        that would help
                                                        clear the use
                                                        case up? I
                                                        wouldn't want it
                                                        to be ambiguous.<span><font
color="#888888"><br>
                                                          <br>
                                                          &nbsp;-- Justin</font></span>
                                                        <div>
                                                          <div><br>
                                                          <br>
                                                          <blockquote
                                                          type="cite">
                                                          <div><br>
                                                          </div>
                                                          <div>Thanks
                                                          &amp; regards,</div>
                                                          <div>-Prabath</div>
                                                          <div><br>
                                                          </div>
                                                          <div><br>
                                                          <div
                                                          class="gmail_quote">On

                                                          Thu, Feb 7,
                                                          2013 at 10:30
                                                          PM, Justin
                                                          Richer <span
                                                          dir="ltr">&lt;<a
moz-do-not-send="true" href="mailto:jricher@mitre.org" target="_blank">jricher@mitre.org</a>&gt;</span>
                                                          wrote:<br>
                                                          <blockquote
                                                          class="gmail_quote"
                                                          style="margin:0
                                                          0 0
                                                          .8ex;border-left:1px
                                                          #ccc
                                                          solid;padding-left:1ex">
                                                          <div
                                                          bgcolor="#FFFFFF"
                                                          text="#000000">
                                                          It validates
                                                          the token,
                                                          which would be
                                                          either the
                                                          token itself
                                                          in the case of
                                                          Bearer or the
                                                          token "id"
                                                          part of
                                                          something more
                                                          complex like
                                                          MAC. It
                                                          doesn't
                                                          directly
                                                          validate the
                                                          usage of the
                                                          token, that's
                                                          still up to
                                                          the PR to do
                                                          that.<br>
                                                          <br>
                                                          I nearly added
                                                          a "token type"
                                                          field in this
                                                          draft, but
                                                          held back
                                                          because there
                                                          are several
                                                          kinds of
                                                          "token type"
                                                          that people
                                                          talk about in
                                                          OAuth. First,
                                                          there's
                                                          "Bearer" vs.
                                                          "MAC" vs.
                                                          "HOK", or what
                                                          have you. Then
                                                          within Bearer
                                                          you have "JWT"
                                                          or "SAML" or
                                                          "unstructured
                                                          blob". Then
                                                          you've also
                                                          got "access"
                                                          vs. "refresh"
                                                          and other
                                                          flavors of
                                                          token, like
                                                          the id_token
                                                          in OpenID
                                                          Connect. <br>
                                                          <br>
                                                          Thing is, the
                                                          server running
                                                          the
                                                          introspection
                                                          endpoint will
                                                          probably know
                                                          *all* of
                                                          these. But
                                                          should it tell
                                                          the client? If
                                                          so, which of
                                                          the three, and
                                                          what names
                                                          should the
                                                          fields be?<span><font
color="#888888"><br>
                                                          <br>
                                                          &nbsp;-- Justin</font></span>
                                                          <div>
                                                          <div><br>
                                                          <br>
                                                          <div>On
                                                          02/07/2013
                                                          11:26 AM,
                                                          Prabath
                                                          Siriwardena
                                                          wrote:<br>
                                                          </div>
                                                          <blockquote
                                                          type="cite">
                                                          Okay.. I was
                                                          thinking this
                                                          could be used
                                                          as a way to
                                                          validate the
                                                          token as well.
                                                          BTW even in
                                                          this case
                                                          shouldn't
                                                          communicate
                                                          the type of
                                                          token to AS?
                                                          For example in
                                                          the case of
                                                          SAML profile -
                                                          it could be
                                                          SAML token..
                                                          <div> <br>
                                                          </div>
                                                          <div>Thanks
                                                          &amp; regards,</div>
                                                          <div>-Prabath<br>
                                                          <br>
                                                          <div
                                                          class="gmail_quote">On

                                                          Thu, Feb 7,
                                                          2013 at 8:39
                                                          PM, Justin
                                                          Richer <span
                                                          dir="ltr">&lt;<a
moz-do-not-send="true" href="mailto:jricher@mitre.org" target="_blank">jricher@mitre.org</a>&gt;</span>
                                                          wrote:<br>
                                                          <blockquote
                                                          class="gmail_quote"
                                                          style="margin:0
                                                          0 0
                                                          .8ex;border-left:1px
                                                          #ccc
                                                          solid;padding-left:1ex">
                                                          <div
                                                          bgcolor="#FFFFFF"
                                                          text="#000000">
                                                          "valid" might
                                                          not be the
                                                          best term, but
                                                          it's meant to
                                                          be a field
                                                          where the
                                                          server says
                                                          "yes this
                                                          token is still
                                                          good" or "no
                                                          this token
                                                          isn't good
                                                          anymore". We
                                                          could instead
                                                          do this with
                                                          HTTP codes or
                                                          something but
                                                          I went with a
                                                          pure JSON
                                                          response.<span><font
color="#888888"><br>
                                                          <br>
                                                          &nbsp;-- Justin</font></span>
                                                          <div>
                                                          <div><br>
                                                          <br>
                                                          <div>On
                                                          02/06/2013
                                                          10:47 PM,
                                                          Prabath
                                                          Siriwardena
                                                          wrote:<br>
                                                          </div>
                                                          <blockquote
                                                          type="cite">
                                                          Hi Justin,
                                                          <div><br>
                                                          </div>
                                                          <div>I believe
                                                          this is
                                                          addressing one
                                                          of the key
                                                          missing part
                                                          in OAuth
                                                          2.0...</div>
                                                          <div><br>
                                                          </div>
                                                          <div>One
                                                          question - I
                                                          guess this was
                                                          discussed
                                                          already...</div>
                                                          <div><br>
                                                          </div>
                                                          <div>In the
                                                          spec - in the
                                                          introspection
                                                          response it
                                                          has the
                                                          attribute
                                                          "valid" - this
                                                          is basically
                                                          the validity
                                                          of the token
                                                          provided in
                                                          the request.</div>
                                                          <div><br>
                                                          </div>
                                                          <div>Validation&nbsp;criteria


                                                          depends on the
                                                          token and well
                                                          as token type
                                                          ( Bearer,
                                                          MAC..).</div>
                                                          <div><br>
                                                          </div>
                                                          <div>In the
                                                          spec it seems
                                                          like it's
                                                          coupled with
                                                          Bearer token
                                                          type... But I
                                                          guess, by
                                                          adding
                                                          "token_type"
                                                          to the request
                                                          we can remove
                                                          this
                                                          dependency.</div>
                                                          <div><br>
                                                          </div>
                                                          <div>WDYT..?</div>
                                                          <div><br>
                                                          </div>
                                                          <div>Thanks
                                                          &amp; regards,</div>
                                                          <div>-Prabath&nbsp;</div>
                                                          <div><br>
                                                          <div
                                                          class="gmail_quote">On


                                                          Thu, Feb 7,
                                                          2013 at 12:54
                                                          AM, Justin
                                                          Richer <span
                                                          dir="ltr">&lt;<a
moz-do-not-send="true" href="mailto:jricher@mitre.org" target="_blank">jricher@mitre.org</a>&gt;</span>
                                                          wrote:<br>
                                                          <blockquote
                                                          class="gmail_quote"
                                                          style="margin:0
                                                          0 0
                                                          .8ex;border-left:1px
                                                          #ccc
                                                          solid;padding-left:1ex">
                                                          <div
                                                          bgcolor="#FFFFFF"
                                                          text="#000000">
                                                          Updated
                                                          introspection
                                                          draft based on
                                                          recent
                                                          comments.
                                                          Changes
                                                          include:<br>
                                                          <br>
                                                          &nbsp;- "scope"
                                                          return
                                                          parameter now
                                                          follows
                                                          RFC6749 format
                                                          instead of
                                                          JSON array<br>
                                                          &nbsp;- "subject"
                                                          -&gt; "sub",
                                                          and "audience"
                                                          -&gt; "aud",
                                                          to be parallel
                                                          with JWT
                                                          claims<br>
                                                          &nbsp;- clarified
                                                          what happens
                                                          if the
                                                          authentication
                                                          is bad<br>
                                                          <br>
                                                          &nbsp;-- Justin<br>
                                                          <div><br>
                                                          <br>
                                                          --------
                                                          Original
                                                          Message
                                                          --------
                                                          <table
                                                          border="0"
                                                          cellpadding="0"
cellspacing="0">
                                                          <tbody>
                                                          <tr>
                                                          <th
                                                          align="RIGHT"
nowrap="nowrap" valign="BASELINE">Subject: </th>
                                                          <td>New
                                                          Version
                                                          Notification
                                                          for
                                                          draft-richer-oauth-introspection-02.txt</td>
                                                          </tr>
                                                          <tr>
                                                          <th
                                                          align="RIGHT"
nowrap="nowrap" valign="BASELINE">Date: </th>
                                                          <td>Wed, 6 Feb
                                                          2013 11:24:20
                                                          -0800</td>
                                                          </tr>
                                                          <tr>
                                                          <th
                                                          align="RIGHT"
nowrap="nowrap" valign="BASELINE">From: </th>
                                                          <td><a
                                                          moz-do-not-send="true"
href="mailto:internet-drafts@ietf.org" target="_blank">&lt;internet-drafts@ietf.org&gt;</a></td>
                                                          </tr>
                                                          <tr>
                                                          <th
                                                          align="RIGHT"
nowrap="nowrap" valign="BASELINE">To: </th>
                                                          <td><a
                                                          moz-do-not-send="true"
href="mailto:jricher@mitre.org" target="_blank">&lt;jricher@mitre.org&gt;</a></td>
                                                          </tr>
                                                          </tbody>
                                                          </table>
                                                          <br>
                                                          <br>
                                                          <pre>A new version of I-D, draft-richer-oauth-introspection-02.txt
has been successfully submitted by Justin Richer and posted to the
IETF repository.

Filename:	 draft-richer-oauth-introspection
Revision:	 02
Title:		 OAuth Token Introspection
Creation date:	 2013-02-06
WG ID:		 Individual Submission
Number of pages: 6
URL:             <a moz-do-not-send="true" href="http://www.ietf.org/internet-drafts/draft-richer-oauth-introspection-02.txt" target="_blank">http://www.ietf.org/internet-drafts/draft-richer-oauth-introspection-02.txt</a>
Status:          <a moz-do-not-send="true" href="http://datatracker.ietf.org/doc/draft-richer-oauth-introspection" target="_blank">http://datatracker.ietf.org/doc/draft-richer-oauth-introspection</a>
Htmlized:        <a moz-do-not-send="true" href="http://tools.ietf.org/html/draft-richer-oauth-introspection-02" target="_blank">http://tools.ietf.org/html/draft-richer-oauth-introspection-02</a>
Diff:            <a moz-do-not-send="true" href="http://www.ietf.org/rfcdiff?url2=draft-richer-oauth-introspection-02" target="_blank">http://www.ietf.org/rfcdiff?url2=draft-richer-oauth-introspection-02</a>

Abstract:
   This specification defines a method for a client or protected
   resource to query an OAuth authorization server to determine meta-
   information about an OAuth token.


                                                                                  


The IETF Secretariat

</pre>
                                                          <br>
                                                          </div>
                                                          <br>
                                                          </div>
                                                          <br>
_______________________________________________<br>
                                                          OAuth mailing
                                                          list<br>
                                                          <a
                                                          moz-do-not-send="true"
href="mailto:OAuth@ietf.org" target="_blank">OAuth@ietf.org</a><br>
                                                          <a
                                                          moz-do-not-send="true"
href="https://www.ietf.org/mailman/listinfo/oauth" target="_blank">https://www.ietf.org/mailman/listinfo/oauth</a><br>
                                                          <br>
                                                          </blockquote>
                                                          </div>
                                                          <br>
                                                          <br
                                                          clear="all">
                                                          <div><br>
                                                          </div>
                                                          -- <br>
                                                          Thanks &amp;
                                                          Regards,<br>
                                                          Prabath
                                                          <div><br>
                                                          </div>
                                                          <div>Mobile :
                                                          <a
                                                          moz-do-not-send="true"
href="tel:%2B94%2071%20809%206732" value="+94718096732" target="_blank">+94

                                                          71 809 6732</a>&nbsp;<br>
                                                          <br>
                                                          <a
                                                          moz-do-not-send="true"
href="http://blog.facilelogin.com" target="_blank">http://blog.facilelogin.com</a><br>
                                                          <a
                                                          moz-do-not-send="true"
href="http://RampartFAQ.com" target="_blank">http://RampartFAQ.com</a></div>
                                                          </div>
                                                          </blockquote>
                                                          <br>
                                                          </div>
                                                          </div>
                                                          </div>
                                                          </blockquote>
                                                          </div>
                                                          <br>
                                                          <br
                                                          clear="all">
                                                          <div><br>
                                                          </div>
                                                          -- <br>
                                                          Thanks &amp;
                                                          Regards,<br>
                                                          Prabath
                                                          <div><br>
                                                          </div>
                                                          <div>Mobile :
                                                          <a
                                                          moz-do-not-send="true"
href="tel:%2B94%2071%20809%206732" value="+94718096732" target="_blank">+94

                                                          71 809 6732</a>&nbsp;<br>
                                                          <br>
                                                          <a
                                                          moz-do-not-send="true"
href="http://blog.facilelogin.com" target="_blank">http://blog.facilelogin.com</a><br>
                                                          <a
                                                          moz-do-not-send="true"
href="http://RampartFAQ.com" target="_blank">http://RampartFAQ.com</a></div>
                                                          </div>
                                                          </blockquote>
                                                          <br>
                                                          </div>
                                                          </div>
                                                          </div>
                                                          </blockquote>
                                                          </div>
                                                          <br>
                                                          <br
                                                          clear="all">
                                                          <div><br>
                                                          </div>
                                                          -- <br>
                                                          Thanks &amp;
                                                          Regards,<br>
                                                          Prabath
                                                          <div><br>
                                                          </div>
                                                          <div>Mobile :
                                                          <a
                                                          moz-do-not-send="true"
href="tel:%2B94%2071%20809%206732" value="+94718096732" target="_blank">+94


                                                          71 809 6732</a>&nbsp;<br>
                                                          <br>
                                                          <a
                                                          moz-do-not-send="true"
href="http://blog.facilelogin.com" target="_blank">http://blog.facilelogin.com</a><br>
                                                          <a
                                                          moz-do-not-send="true"
href="http://RampartFAQ.com" target="_blank">http://RampartFAQ.com</a></div>
                                                          </div>
                                                          </blockquote>
                                                          <br>
                                                          </div>
                                                        </div>
                                                      </div>
                                                    </blockquote>
                                                  </div>
                                                  <br>
                                                  <br clear="all">
                                                  <div><br>
                                                  </div>
                                                  -- <br>
                                                  Thanks &amp; Regards,<br>
                                                  Prabath
                                                  <div><br>
                                                  </div>
                                                  <div>Mobile : <a
                                                      moz-do-not-send="true"
href="tel:%2B94%2071%20809%206732" value="+94718096732" target="_blank">+94
                                                      71 809 6732</a>&nbsp;<br>
                                                    <br>
                                                    <a
                                                      moz-do-not-send="true"
href="http://blog.facilelogin.com" target="_blank">http://blog.facilelogin.com</a><br>
                                                    <a
                                                      moz-do-not-send="true"
href="http://RampartFAQ.com" target="_blank">http://RampartFAQ.com</a></div>
                                                </div>
                                              </div>
                                            </blockquote>
                                            <blockquote type="cite">
                                              <div><span>_______________________________________________</span><br>
                                                <span>OAuth mailing list</span><br>
                                                <span><a
                                                    moz-do-not-send="true"
href="mailto:OAuth@ietf.org" target="_blank">OAuth@ietf.org</a></span><br>
                                                <span><a
                                                    moz-do-not-send="true"
href="https://www.ietf.org/mailman/listinfo/oauth" target="_blank">https://www.ietf.org/mailman/listinfo/oauth</a></span><br>
                                              </div>
                                            </blockquote>
                                          </blockquote>
                                          <br>
                                        </div>
                                      </div>
                                    </div>
                                  </blockquote>
                                </div>
                                <br>
                                <br clear="all">
                                <div><br>
                                </div>
                                -- <br>
                                Thanks &amp; Regards,<br>
                                Prabath
                                <div><br>
                                </div>
                                <div>Mobile : <a moz-do-not-send="true"
                                    href="tel:%2B94%2071%20809%206732"
                                    value="+94718096732" target="_blank">+94
                                    71 809 6732</a>&nbsp;<br>
                                  <br>
                                  <a moz-do-not-send="true"
                                    href="http://blog.facilelogin.com"
                                    target="_blank">http://blog.facilelogin.com</a><br>
                                  <a moz-do-not-send="true"
                                    href="http://RampartFAQ.com"
                                    target="_blank">http://RampartFAQ.com</a></div>
                              </div>
                            </div>
                          </div>
                        </blockquote>
                      </div>
                      <br>
                      <br clear="all">
                      <div><br>
                      </div>
                      -- <br>
                      Thanks &amp; Regards,<br>
                      Prabath
                      <div><br>
                      </div>
                      <div>Mobile : <a moz-do-not-send="true"
                          href="tel:%2B94%2071%20809%206732"
                          value="+94718096732" target="_blank">+94 71
                          809 6732</a>&nbsp;<br>
                        <br>
                        <a moz-do-not-send="true"
                          href="http://blog.facilelogin.com"
                          target="_blank">http://blog.facilelogin.com</a><br>
                        <a moz-do-not-send="true"
                          href="http://RampartFAQ.com" target="_blank">http://RampartFAQ.com</a></div>
                    </div>
                  </blockquote>
                  <br>
                </div>
              </div>
            </div>
          </blockquote>
        </div>
        <br>
        <br clear="all">
        <div><br>
        </div>
        -- <br>
        Thanks &amp; Regards,<br>
        Prabath
        <div><br>
        </div>
        <div>Mobile : +94 71 809 6732&nbsp;<br>
          <br>
          <a moz-do-not-send="true" href="http://blog.facilelogin.com"
            target="_blank">http://blog.facilelogin.com</a><br>
          <a moz-do-not-send="true" href="http://RampartFAQ.com"
            target="_blank">http://RampartFAQ.com</a></div>
      </div>
    </blockquote>
    <br>
  </body>
</html>

--------------030105000502060207030806--

From jricher@mitre.org  Thu Feb 14 06:26:40 2013
Return-Path: <jricher@mitre.org>
X-Original-To: oauth@ietfa.amsl.com
Delivered-To: oauth@ietfa.amsl.com
Received: from localhost (localhost [127.0.0.1]) by ietfa.amsl.com (Postfix) with ESMTP id 7AB9F21F8840 for <oauth@ietfa.amsl.com>; Thu, 14 Feb 2013 06:26:40 -0800 (PST)
X-Virus-Scanned: amavisd-new at amsl.com
X-Spam-Flag: NO
X-Spam-Score: -6.569
X-Spam-Level: 
X-Spam-Status: No, score=-6.569 tagged_above=-999 required=5 tests=[AWL=0.029,  BAYES_00=-2.599, HTML_MESSAGE=0.001, RCVD_IN_DNSWL_MED=-4]
Received: from mail.ietf.org ([64.170.98.30]) by localhost (ietfa.amsl.com [127.0.0.1]) (amavisd-new, port 10024) with ESMTP id mySPXMZL3a5M for <oauth@ietfa.amsl.com>; Thu, 14 Feb 2013 06:26:38 -0800 (PST)
Received: from smtpksrv1.mitre.org (smtpksrv1.mitre.org [198.49.146.77]) by ietfa.amsl.com (Postfix) with ESMTP id 9A02921F8201 for <oauth@ietf.org>; Thu, 14 Feb 2013 06:26:37 -0800 (PST)
Received: from smtpksrv1.mitre.org (localhost.localdomain [127.0.0.1]) by localhost (Postfix) with SMTP id 26D981F2CAA; Thu, 14 Feb 2013 09:26:37 -0500 (EST)
Received: from IMCCAS02.MITRE.ORG (imccas02.mitre.org [129.83.29.79]) by smtpksrv1.mitre.org (Postfix) with ESMTP id 0C6961F2C9A; Thu, 14 Feb 2013 09:26:37 -0500 (EST)
Received: from [10.146.15.29] (129.83.31.58) by IMCCAS02.MITRE.ORG (129.83.29.79) with Microsoft SMTP Server (TLS) id 14.2.318.4; Thu, 14 Feb 2013 09:26:36 -0500
Message-ID: <511CF3EF.8040008@mitre.org>
Date: Thu, 14 Feb 2013 09:25:51 -0500
From: Justin Richer <jricher@mitre.org>
User-Agent: Mozilla/5.0 (X11; Linux i686; rv:17.0) Gecko/20130106 Thunderbird/17.0.2
MIME-Version: 1.0
To: Prabath Siriwardena <prabath@wso2.com>
References: <20130206192420.32698.21027.idtracker@ietfa.amsl.com> <5112AE0B.1080501@mitre.org> <CAJV9qO_8-4FowrXK=ae-+xMjiJFP04ryVMLQ8SGUH8kp3PHrLg@mail.gmail.com> <5113C3AA.1040701@mitre.org> <CAJV9qO8BVV57eAb5kUNes15AYOpUKqw5XWQswh-FJA=b1pPgSA@mail.gmail.com> <5113DDB2.7060805@mitre.org> <CAJV9qO_gM1oera9ae9sqh9n17e-ZLKuC2pmsZwhq-RmFcMyqHA@mail.gmail.com> <51196777.6000502@mitre.org> <CAJV9qO-5bWZbNUfCmaqYBQoy-qwNaSZFOsO9GL3CrbSejwVTzw@mail.gmail.com> <F6595A40-6B4E-4718-ABB5-694CA975C4DB@maymount.com> <511A5062.5010108@mitre.org> <CAJV9qO_Mr87NX=KZRqCsWasQ1FuvDNBw14eS-TcPf_KRJztQFg@mail.gmail.com> <CAJV9qO-71-sM6kXOB6Fb_bvVkDBQ5JBbs8E5X=f-K=iEmGezRA@mail.gmail.com> <511CEEAA.3030801@mitre.org> <CAJV9qO-JSXgSTkw2_pdH0D-o-xDWGDqxx=PAWYtnTj4hOQXW4Q@mail.gmail.com> <CAJV9qO9=+kiO-s7vH_ewr7XjfVdDU24F0kuif504bP53dBr1TA@mail.gmail.com>
In-Reply-To: <CAJV9qO9=+kiO-s7vH_ewr7XjfVdDU24F0kuif504bP53dBr1TA@mail.gmail.com>
Content-Type: multipart/alternative; boundary="------------050907000800000603080505"
X-Originating-IP: [129.83.31.58]
Cc: "oauth@ietf.org" <oauth@ietf.org>
Subject: Re: [OAUTH-WG] Fwd: New Version Notification for draft-richer-oauth-introspection-02.txt
X-BeenThere: oauth@ietf.org
X-Mailman-Version: 2.1.12
Precedence: list
List-Id: OAUTH WG <oauth.ietf.org>
List-Unsubscribe: <https://www.ietf.org/mailman/options/oauth>, <mailto:oauth-request@ietf.org?subject=unsubscribe>
List-Archive: <http://www.ietf.org/mail-archive/web/oauth>
List-Post: <mailto:oauth@ietf.org>
List-Help: <mailto:oauth-request@ietf.org?subject=help>
List-Subscribe: <https://www.ietf.org/mailman/listinfo/oauth>, <mailto:oauth-request@ietf.org?subject=subscribe>
X-List-Received-Date: Thu, 14 Feb 2013 14:26:40 -0000

--------------050907000800000603080505
Content-Type: text/plain; charset="ISO-8859-1"; format=flowed
Content-Transfer-Encoding: 7bit

OK, I don't see the utility in that at all. What would it accomplish?

  -- Justin

On 02/14/2013 09:25 AM, Prabath Siriwardena wrote:
> To make it clear - my suggestion is to add token_type_hint to the 
> introspection request. It can be from client to AS or from RS to AS.
>
> Then AS can decide whether the provided token is valid or not and 
> include "valid" attribute in the introspection response.
>
> Thanks & regards,
> -Prabath
>
> On Thu, Feb 14, 2013 at 7:52 PM, Prabath Siriwardena <prabath@wso2.com 
> <mailto:prabath@wso2.com>> wrote:
>
>     Both the client and the resource owner should be aware of the
>     token type.
>
>     My argument is, if the authorization server to decide whether the
>     token is valid or not ( irrespective of who asked the question) -
>     AS needs to know the token type - because to validate a token AS
>     should know the token type.
>
>     The token type could be, bearer or MAC or any other token type.
>
>     Thanks & regards,
>     -Prabath
>
>
>     On Thu, Feb 14, 2013 at 7:33 PM, Justin Richer <jricher@mitre.org
>     <mailto:jricher@mitre.org>> wrote:
>
>         What exactly are you suggesting be added to introspection? The
>         "token_type_hint" is from the client to the server, but what
>         you've asked for in terms of "token type" is from the server
>         to the client. And there was never an answer to what exactly
>         is meant by "token type" in this case, particularly because
>         you seem to want to call out things like SAML and Bearer as
>         separate types.
>
>          -- Justin
>
>
>
>         On 02/14/2013 06:59 AM, Prabath Siriwardena wrote:
>>         I noticed that the latest Token Revocation draft [1] has
>>         introduced the parameter "token_type_hint". I would suggest
>>         the same here, as that would make what is meant by "valid"
>>         much clear..
>>
>>         [1]: http://tools.ietf.org/html/draft-ietf-oauth-revocation-05
>>
>>         Thanks & regards,
>>         -Prabath
>>
>>         On Tue, Feb 12, 2013 at 9:35 PM, Prabath Siriwardena
>>         <prabath@wso2.com <mailto:prabath@wso2.com>> wrote:
>>
>>             Hi Justin,
>>
>>             I doubt whether valid_token would make a difference..?
>>
>>             My initial argument is what is the validation criteria..?
>>             Validation criteria depends on the token_type..
>>
>>             If we are talking only about metadata - then I believe
>>             "revoked", "expired" would be more meaningful..
>>
>>             Thanks & regards,
>>             -Prabath
>>
>>
>>             On Tue, Feb 12, 2013 at 7:53 PM, Justin Richer
>>             <jricher@mitre.org <mailto:jricher@mitre.org>> wrote:
>>
>>                 OK, I can see the wisdom in changing this term.
>>
>>                 I picked "valid" because I wanted a simple "boolean"
>>                 value that would require no additional parsing or
>>                 string-matching on the client's behalf, and I'd like
>>                 to stick with that. OAuth is built with the
>>                 assumption that clients need to be able to recover
>>                 from invalid tokens at any stage, so I think a simple
>>                 yes/no is the right step here.
>>
>>                 That said, I think you're both right that "valid"
>>                 seems to have caused a bit of confusion. I don't want
>>                 to go with "revoked" because I'd rather have the
>>                 "token is OK" be the positive boolean value.
>>
>>                 Would "valid_token" be more clear? Or do we need a
>>                 different adjective all together?
>>
>>                  -- Justin
>>
>>
>>                 On 02/11/2013 08:02 PM, Richard Harrington wrote:
>>>                 Have you considered "status" instead of "valid"?  It
>>>                 could have values like "active", "expired", and
>>>                 "revoked".
>>>
>>>                 Is it worthwhile including the status of the client
>>>                 also?  For example, a client application could be
>>>                 disabled, temporarily or permanently, and thus
>>>                 disabling its access tokens as well.
>>>
>>>
>>>                 On Feb 11, 2013, at 1:56 PM, Prabath Siriwardena
>>>                 <prabath@wso2.com <mailto:prabath@wso2.com>> wrote:
>>>
>>>>                 I guess confusion is with 'valid' parameter is in
>>>>                 the response..
>>>>
>>>>                 I thought this will be helpful to standardize the
>>>>                 communication between Resource Server and the
>>>>                 Authorization Server..
>>>>
>>>>                 I would suggest we completely remove "valid" from
>>>>                 the response - or define it much clearly..
>>>>
>>>>                 May be can add "revoked" with a boolean attribute..
>>>>
>>>>                 Thanks & regards,
>>>>                 -Prabath
>>>>
>>>>                 On Tue, Feb 12, 2013 at 3:19 AM, Justin Richer
>>>>                 <jricher@mitre.org <mailto:jricher@mitre.org>> wrote:
>>>>
>>>>
>>>>                     On 02/08/2013 12:51 AM, Prabath Siriwardena wrote:
>>>>>                     Hi Justin,
>>>>>
>>>>>                     I have couple of questions related to "valid"
>>>>>                     parameter...
>>>>>
>>>>>                     This endpoint can be invoked by the Resource
>>>>>                     Server in runtime...
>>>>
>>>>                     That's correct.
>>>>
>>>>
>>>>>
>>>>>                     In that case what is exactly meant by the
>>>>>                     "resource_id" in request ?
>>>>
>>>>                     The resource_id field is a service-specific
>>>>                     string that basically lets the resource server
>>>>                     provide some context to the request to the auth
>>>>                     server. There have been some other suggestions
>>>>                     like client IP address, but I wanted to put
>>>>                     this one in because it seemed to be a common
>>>>                     theme. The client is trying to do *something*
>>>>                     with the token, after all, and the rights,
>>>>                     permissions, and metadata associated with the
>>>>                     token could change based on that. Since the
>>>>                     Introspection endpoint is all about getting
>>>>                     that metadata back to the PR, this seemed like
>>>>                     a good idea.
>>>>
>>>>
>>>>>
>>>>>                     IMO a token to be valid depends on set of
>>>>>                     criteria based on it's type..
>>>>>
>>>>>                     For a Bearer token..
>>>>>
>>>>>                     1. Token should not be expired
>>>>>                     2. Token should not be revoked.
>>>>>                     3. The scope the token issued should match
>>>>>                     with the scope required for the resource.
>>>>>
>>>>>                     For a MAC token...
>>>>>
>>>>>                     1. Token not expired (mac id)
>>>>>                     2. Token should not be revoked
>>>>>                     3. The scope the token issued should match
>>>>>                     with the scope required for the resource.
>>>>>                     4. HMAC check should be valid
>>>>>
>>>>>                     There are similar conditions for SAML bearer too..
>>>>
>>>>                     This isn't really true. The SAML bearer token
>>>>                     is fully self-contained and doesn't change
>>>>                     based on other parameters in the message,
>>>>                     unlike MAC. Same with JWT. When it hands a SAML
>>>>                     or JWT token to the AS, the PR has given
>>>>                     *everything* the server needs to check that
>>>>                     token's validity and use.
>>>>
>>>>                     MAC signatures change with every message, and
>>>>                     they're done across several components of the
>>>>                     HTTP message. Therefor, the HMAC check for MAC
>>>>                     style tokens will still need to be done by the
>>>>                     protected resource. Introspection would help in
>>>>                     the case that the signature validated just
>>>>                     fine, but the token might have expired. Or you
>>>>                     need to know what scopes apply. Introspection
>>>>                     isn't to fully validate the call to the
>>>>                     protected resource -- if that were the case,
>>>>                     the PR would have to send some kind of
>>>>                     encapsulated version of the original request.
>>>>                     Otherwise, the AS won't have all of the
>>>>                     information it needs to check the MAC.
>>>>
>>>>
>>>>                     I think what you're describing is ultimately
>>>>                     *not* what the introspection endpoint is
>>>>                     intended to do. If that's unclear from the
>>>>                     document, can you please suggest text that
>>>>                     would help clear the use case up? I wouldn't
>>>>                     want it to be ambiguous.
>>>>
>>>>                      -- Justin
>>>>
>>>>
>>>>>
>>>>>                     Thanks & regards,
>>>>>                     -Prabath
>>>>>
>>>>>
>>>>>                     On Thu, Feb 7, 2013 at 10:30 PM, Justin Richer
>>>>>                     <jricher@mitre.org <mailto:jricher@mitre.org>>
>>>>>                     wrote:
>>>>>
>>>>>                         It validates the token, which would be
>>>>>                         either the token itself in the case of
>>>>>                         Bearer or the token "id" part of something
>>>>>                         more complex like MAC. It doesn't directly
>>>>>                         validate the usage of the token, that's
>>>>>                         still up to the PR to do that.
>>>>>
>>>>>                         I nearly added a "token type" field in
>>>>>                         this draft, but held back because there
>>>>>                         are several kinds of "token type" that
>>>>>                         people talk about in OAuth. First, there's
>>>>>                         "Bearer" vs. "MAC" vs. "HOK", or what have
>>>>>                         you. Then within Bearer you have "JWT" or
>>>>>                         "SAML" or "unstructured blob". Then you've
>>>>>                         also got "access" vs. "refresh" and other
>>>>>                         flavors of token, like the id_token in
>>>>>                         OpenID Connect.
>>>>>
>>>>>                         Thing is, the server running the
>>>>>                         introspection endpoint will probably know
>>>>>                         *all* of these. But should it tell the
>>>>>                         client? If so, which of the three, and
>>>>>                         what names should the fields be?
>>>>>
>>>>>                          -- Justin
>>>>>
>>>>>
>>>>>                         On 02/07/2013 11:26 AM, Prabath
>>>>>                         Siriwardena wrote:
>>>>>>                         Okay.. I was thinking this could be used
>>>>>>                         as a way to validate the token as well.
>>>>>>                         BTW even in this case shouldn't
>>>>>>                         communicate the type of token to AS? For
>>>>>>                         example in the case of SAML profile - it
>>>>>>                         could be SAML token..
>>>>>>
>>>>>>                         Thanks & regards,
>>>>>>                         -Prabath
>>>>>>
>>>>>>                         On Thu, Feb 7, 2013 at 8:39 PM, Justin
>>>>>>                         Richer <jricher@mitre.org
>>>>>>                         <mailto:jricher@mitre.org>> wrote:
>>>>>>
>>>>>>                             "valid" might not be the best term,
>>>>>>                             but it's meant to be a field where
>>>>>>                             the server says "yes this token is
>>>>>>                             still good" or "no this token isn't
>>>>>>                             good anymore". We could instead do
>>>>>>                             this with HTTP codes or something but
>>>>>>                             I went with a pure JSON response.
>>>>>>
>>>>>>                              -- Justin
>>>>>>
>>>>>>
>>>>>>                             On 02/06/2013 10:47 PM, Prabath
>>>>>>                             Siriwardena wrote:
>>>>>>>                             Hi Justin,
>>>>>>>
>>>>>>>                             I believe this is addressing one of
>>>>>>>                             the key missing part in OAuth 2.0...
>>>>>>>
>>>>>>>                             One question - I guess this was
>>>>>>>                             discussed already...
>>>>>>>
>>>>>>>                             In the spec - in the introspection
>>>>>>>                             response it has the attribute
>>>>>>>                             "valid" - this is basically the
>>>>>>>                             validity of the token provided in
>>>>>>>                             the request.
>>>>>>>
>>>>>>>                             Validation criteria depends on the
>>>>>>>                             token and well as token type (
>>>>>>>                             Bearer, MAC..).
>>>>>>>
>>>>>>>                             In the spec it seems like it's
>>>>>>>                             coupled with Bearer token type...
>>>>>>>                             But I guess, by adding "token_type"
>>>>>>>                             to the request we can remove this
>>>>>>>                             dependency.
>>>>>>>
>>>>>>>                             WDYT..?
>>>>>>>
>>>>>>>                             Thanks & regards,
>>>>>>>                             -Prabath
>>>>>>>
>>>>>>>                             On Thu, Feb 7, 2013 at 12:54 AM,
>>>>>>>                             Justin Richer <jricher@mitre.org
>>>>>>>                             <mailto:jricher@mitre.org>> wrote:
>>>>>>>
>>>>>>>                                 Updated introspection draft
>>>>>>>                                 based on recent comments.
>>>>>>>                                 Changes include:
>>>>>>>
>>>>>>>                                  - "scope" return parameter now
>>>>>>>                                 follows RFC6749 format instead
>>>>>>>                                 of JSON array
>>>>>>>                                  - "subject" -> "sub", and
>>>>>>>                                 "audience" -> "aud", to be
>>>>>>>                                 parallel with JWT claims
>>>>>>>                                  - clarified what happens if the
>>>>>>>                                 authentication is bad
>>>>>>>
>>>>>>>                                  -- Justin
>>>>>>>
>>>>>>>
>>>>>>>                                 -------- Original Message --------
>>>>>>>                                 Subject: 	New Version
>>>>>>>                                 Notification for
>>>>>>>                                 draft-richer-oauth-introspection-02.txt
>>>>>>>
>>>>>>>                                 Date: 	Wed, 6 Feb 2013 11:24:20
>>>>>>>                                 -0800
>>>>>>>                                 From:
>>>>>>>                                 <internet-drafts@ietf.org>
>>>>>>>                                 <mailto:internet-drafts@ietf.org>
>>>>>>>                                 To: 	<jricher@mitre.org>
>>>>>>>                                 <mailto:jricher@mitre.org>
>>>>>>>
>>>>>>>
>>>>>>>
>>>>>>>                                 A new version of I-D, draft-richer-oauth-introspection-02.txt
>>>>>>>                                 has been successfully submitted by Justin Richer and posted to the
>>>>>>>                                 IETF repository.
>>>>>>>
>>>>>>>                                 Filename:	 draft-richer-oauth-introspection
>>>>>>>                                 Revision:	 02
>>>>>>>                                 Title:		 OAuth Token Introspection
>>>>>>>                                 Creation date:	 2013-02-06
>>>>>>>                                 WG ID:		 Individual Submission
>>>>>>>                                 Number of pages: 6
>>>>>>>                                 URL:http://www.ietf.org/internet-drafts/draft-richer-oauth-introspection-02.txt
>>>>>>>                                 Status:http://datatracker.ietf.org/doc/draft-richer-oauth-introspection
>>>>>>>                                 Htmlized:http://tools.ietf.org/html/draft-richer-oauth-introspection-02
>>>>>>>                                 Diff:http://www.ietf.org/rfcdiff?url2=draft-richer-oauth-introspection-02
>>>>>>>
>>>>>>>                                 Abstract:
>>>>>>>                                     This specification defines a method for a client or protected
>>>>>>>                                     resource to query an OAuth authorization server to determine meta-
>>>>>>>                                     information about an OAuth token.
>>>>>>>
>>>>>>>
>>>>>>>                                                                                                                    
>>>>>>>
>>>>>>>
>>>>>>>                                 The IETF Secretariat
>>>>>>>
>>>>>>>
>>>>>>>
>>>>>>>
>>>>>>>                                 _______________________________________________
>>>>>>>                                 OAuth mailing list
>>>>>>>                                 OAuth@ietf.org
>>>>>>>                                 <mailto:OAuth@ietf.org>
>>>>>>>                                 https://www.ietf.org/mailman/listinfo/oauth
>>>>>>>
>>>>>>>
>>>>>>>
>>>>>>>
>>>>>>>                             -- 
>>>>>>>                             Thanks & Regards,
>>>>>>>                             Prabath
>>>>>>>
>>>>>>>                             Mobile : +94 71 809 6732
>>>>>>>                             <tel:%2B94%2071%20809%206732>
>>>>>>>
>>>>>>>                             http://blog.facilelogin.com
>>>>>>>                             http://RampartFAQ.com
>>>>>>
>>>>>>
>>>>>>
>>>>>>
>>>>>>                         -- 
>>>>>>                         Thanks & Regards,
>>>>>>                         Prabath
>>>>>>
>>>>>>                         Mobile : +94 71 809 6732
>>>>>>                         <tel:%2B94%2071%20809%206732>
>>>>>>
>>>>>>                         http://blog.facilelogin.com
>>>>>>                         http://RampartFAQ.com
>>>>>
>>>>>
>>>>>
>>>>>
>>>>>                     -- 
>>>>>                     Thanks & Regards,
>>>>>                     Prabath
>>>>>
>>>>>                     Mobile : +94 71 809 6732
>>>>>                     <tel:%2B94%2071%20809%206732>
>>>>>
>>>>>                     http://blog.facilelogin.com
>>>>>                     http://RampartFAQ.com
>>>>
>>>>
>>>>
>>>>
>>>>                 -- 
>>>>                 Thanks & Regards,
>>>>                 Prabath
>>>>
>>>>                 Mobile : +94 71 809 6732 <tel:%2B94%2071%20809%206732>
>>>>
>>>>                 http://blog.facilelogin.com
>>>>                 http://RampartFAQ.com
>>>>                 _______________________________________________
>>>>                 OAuth mailing list
>>>>                 OAuth@ietf.org <mailto:OAuth@ietf.org>
>>>>                 https://www.ietf.org/mailman/listinfo/oauth
>>
>>
>>
>>
>>             -- 
>>             Thanks & Regards,
>>             Prabath
>>
>>             Mobile : +94 71 809 6732 <tel:%2B94%2071%20809%206732>
>>
>>             http://blog.facilelogin.com
>>             http://RampartFAQ.com
>>
>>
>>
>>
>>         -- 
>>         Thanks & Regards,
>>         Prabath
>>
>>         Mobile : +94 71 809 6732 <tel:%2B94%2071%20809%206732>
>>
>>         http://blog.facilelogin.com
>>         http://RampartFAQ.com
>
>
>
>
>     -- 
>     Thanks & Regards,
>     Prabath
>
>     Mobile : +94 71 809 6732 <tel:%2B94%2071%20809%206732>
>
>     http://blog.facilelogin.com
>     http://RampartFAQ.com
>
>
>
>
> -- 
> Thanks & Regards,
> Prabath
>
> Mobile : +94 71 809 6732
>
> http://blog.facilelogin.com
> http://RampartFAQ.com


--------------050907000800000603080505
Content-Type: text/html; charset="ISO-8859-1"
Content-Transfer-Encoding: 7bit

<html>
  <head>
    <meta content="text/html; charset=ISO-8859-1"
      http-equiv="Content-Type">
  </head>
  <body bgcolor="#FFFFFF" text="#000000">
    OK, I don't see the utility in that at all. What would it
    accomplish?<br>
    <br>
    &nbsp;-- Justin<br>
    <br>
    <div class="moz-cite-prefix">On 02/14/2013 09:25 AM, Prabath
      Siriwardena wrote:<br>
    </div>
    <blockquote
cite="mid:CAJV9qO9=+kiO-s7vH_ewr7XjfVdDU24F0kuif504bP53dBr1TA@mail.gmail.com"
      type="cite">
      <meta http-equiv="Content-Type" content="text/html;
        charset=ISO-8859-1">
      To make it clear - my suggestion is to add token_type_hint to the
      introspection request. It can be from client to AS or from RS to
      AS.
      <div><br>
      </div>
      <div>Then AS can decide whether the provided token is valid or not
        and include "valid" attribute in the introspection response.</div>
      <div><br>
      </div>
      <div>Thanks &amp; regards,</div>
      <div>-Prabath<br>
        <br>
        <div class="gmail_quote">On Thu, Feb 14, 2013 at 7:52 PM,
          Prabath Siriwardena <span dir="ltr">&lt;<a
              moz-do-not-send="true" href="mailto:prabath@wso2.com"
              target="_blank">prabath@wso2.com</a>&gt;</span> wrote:<br>
          <blockquote class="gmail_quote" style="margin:0 0 0
            .8ex;border-left:1px #ccc solid;padding-left:1ex">Both the
            client and the resource owner should be aware of the token
            type.
            <div><br>
            </div>
            <div>My argument is, if the authorization server to decide
              whether the token is valid or not ( irrespective of who
              asked the question) - AS needs to know the token type -
              because to validate a token AS should know the token type.</div>
            <div><br>
            </div>
            <div>The token type could be, bearer or MAC or any other
              token type.</div>
            <div><br>
            </div>
            <div>Thanks &amp; regards,</div>
            <div>-Prabath
              <div>
                <div class="h5"><br>
                  <br>
                  <div class="gmail_quote">On Thu, Feb 14, 2013 at 7:33
                    PM, Justin Richer <span dir="ltr">&lt;<a
                        moz-do-not-send="true"
                        href="mailto:jricher@mitre.org" target="_blank">jricher@mitre.org</a>&gt;</span>
                    wrote:<br>
                    <blockquote class="gmail_quote" style="margin:0 0 0
                      .8ex;border-left:1px #ccc solid;padding-left:1ex">
                      <div bgcolor="#FFFFFF" text="#000000"> What
                        exactly are you suggesting be added to
                        introspection? The "token_type_hint" is from the
                        client to the server, but what you've asked for
                        in terms of "token type" is from the server to
                        the client. And there was never an answer to
                        what exactly is meant by "token type" in this
                        case, particularly because you seem to want to
                        call out things like SAML and Bearer as separate
                        types. <br>
                        <span><font color="#888888"> <br>
                            &nbsp;-- Justin</font></span>
                        <div>
                          <div><br>
                            <br>
                            <br>
                            <div>On 02/14/2013 06:59 AM, Prabath
                              Siriwardena wrote:<br>
                            </div>
                            <blockquote type="cite"> I noticed that the
                              latest Token Revocation draft [1] has
                              introduced the parameter
                              "token_type_hint". I would suggest the
                              same here, as that would make what is
                              meant by "valid" much clear..
                              <div><br>
                              </div>
                              <div>[1]:&nbsp;<a moz-do-not-send="true"
                                  href="http://tools.ietf.org/html/draft-ietf-oauth-revocation-05"
style="color:rgb(17,85,204);font-size:12.727272033691406px;font-family:arial,sans-serif"
                                  target="_blank">http://tools.ietf.org/html/draft-ietf-oauth-revocation-05</a></div>
                              <div><br>
                              </div>
                              <div>Thanks &amp; regards,</div>
                              <div>-Prabath<br>
                                <br>
                                <div class="gmail_quote">On Tue, Feb 12,
                                  2013 at 9:35 PM, Prabath Siriwardena <span
                                    dir="ltr">&lt;<a
                                      moz-do-not-send="true"
                                      href="mailto:prabath@wso2.com"
                                      target="_blank">prabath@wso2.com</a>&gt;</span>
                                  wrote:<br>
                                  <blockquote class="gmail_quote"
                                    style="margin:0 0 0
                                    .8ex;border-left:1px #ccc
                                    solid;padding-left:1ex">Hi Justin,
                                    <div><br>
                                    </div>
                                    <div>I doubt whether valid_token
                                      would make a difference..?</div>
                                    <div><br>
                                    </div>
                                    <div>My initial argument is what is
                                      the validation criteria..?
                                      Validation criteria depends on the
                                      token_type..</div>
                                    <div> <br>
                                    </div>
                                    <div>If we are talking only about
                                      metadata - then I believe
                                      "revoked", "expired" would be more
                                      meaningful..</div>
                                    <div><br>
                                    </div>
                                    <div>Thanks &amp; regards,</div>
                                    <div>-Prabath
                                      <div>
                                        <div> <br>
                                          <br>
                                          <div class="gmail_quote"> On
                                            Tue, Feb 12, 2013 at 7:53
                                            PM, Justin Richer <span
                                              dir="ltr">&lt;<a
                                                moz-do-not-send="true"
                                                href="mailto:jricher@mitre.org"
                                                target="_blank">jricher@mitre.org</a>&gt;</span>
                                            wrote:<br>
                                            <blockquote
                                              class="gmail_quote"
                                              style="margin:0 0 0
                                              .8ex;border-left:1px #ccc
                                              solid;padding-left:1ex">
                                              <div bgcolor="#FFFFFF"
                                                text="#000000"> OK, I
                                                can see the wisdom in
                                                changing this term. <br>
                                                <br>
                                                I picked "valid" because
                                                I wanted a simple
                                                "boolean" value that
                                                would require no
                                                additional parsing or
                                                string-matching on the
                                                client's behalf, and I'd
                                                like to stick with that.
                                                OAuth is built with the
                                                assumption that clients
                                                need to be able to
                                                recover from invalid
                                                tokens at any stage, so
                                                I think a simple yes/no
                                                is the right step here.
                                                <br>
                                                <br>
                                                That said, I think
                                                you're both right that
                                                "valid" seems to have
                                                caused a bit of
                                                confusion. I don't want
                                                to go with "revoked"
                                                because I'd rather have
                                                the "token is OK" be the
                                                positive boolean value.
                                                <br>
                                                <br>
                                                Would "valid_token" be
                                                more clear? Or do we
                                                need a different
                                                adjective all together?<span><font
                                                    color="#888888"><br>
                                                    <br>
                                                    &nbsp;-- Justin</font></span>
                                                <div>
                                                  <div><br>
                                                    <br>
                                                    <div>On 02/11/2013
                                                      08:02 PM, Richard
                                                      Harrington wrote:<br>
                                                    </div>
                                                    <blockquote
                                                      type="cite">
                                                      <div>Have you
                                                        considered
                                                        "status" instead
                                                        of "valid"? &nbsp;It
                                                        could have
                                                        values like
                                                        "active",
                                                        "expired", and
                                                        "revoked".</div>
                                                      <div><br>
                                                      </div>
                                                      <div>Is it
                                                        worthwhile
                                                        including the
                                                        status of the
                                                        client also?
                                                        &nbsp;For example, a
                                                        client
                                                        application
                                                        could be
                                                        disabled,
                                                        temporarily or
                                                        permanently, and
                                                        thus disabling
                                                        its access
                                                        tokens as well.</div>
                                                      <div><br>
                                                      </div>
                                                      <div><br>
                                                        On Feb 11, 2013,
                                                        at 1:56 PM,
                                                        Prabath
                                                        Siriwardena &lt;<a
moz-do-not-send="true" href="mailto:prabath@wso2.com" target="_blank">prabath@wso2.com</a>&gt;


                                                        wrote:<br>
                                                        <br>
                                                      </div>
                                                      <blockquote
                                                        type="cite">
                                                        <div>I guess
                                                          confusion is
                                                          with 'valid'
                                                          parameter is
                                                          in the
                                                          response..
                                                          <div><br>
                                                          </div>
                                                          <div>I thought
                                                          this will be
                                                          helpful
                                                          to&nbsp;standardize&nbsp;the
                                                          communication
                                                          between
                                                          Resource
                                                          Server and the
                                                          Authorization
                                                          Server..</div>
                                                          <div><br>
                                                          </div>
                                                          <div>I would
                                                          suggest we
                                                          completely
                                                          remove "valid"
                                                          from the
                                                          response - or
                                                          define it much
                                                          clearly..</div>
                                                          <div><br>
                                                          </div>
                                                          <div>May be
                                                          can add
                                                          "revoked" with
                                                          a boolean
                                                          attribute..</div>
                                                          <div><br>
                                                          </div>
                                                          <div>Thanks
                                                          &amp; regards,</div>
                                                          <div>-Prabath<br>
                                                          <br>
                                                          <div
                                                          class="gmail_quote">On
                                                          Tue, Feb 12,
                                                          2013 at 3:19
                                                          AM, Justin
                                                          Richer <span
                                                          dir="ltr">&lt;<a
moz-do-not-send="true" href="mailto:jricher@mitre.org" target="_blank">jricher@mitre.org</a>&gt;</span>
                                                          wrote:<br>
                                                          <blockquote
                                                          class="gmail_quote"
                                                          style="margin:0
                                                          0 0
                                                          .8ex;border-left:1px
                                                          #ccc
                                                          solid;padding-left:1ex">
                                                          <div
                                                          bgcolor="#FFFFFF"
                                                          text="#000000">
                                                          <div> <br>
                                                          <div>On
                                                          02/08/2013
                                                          12:51 AM,
                                                          Prabath
                                                          Siriwardena
                                                          wrote:<br>
                                                          </div>
                                                          </div>
                                                          <blockquote
                                                          type="cite">
                                                          Hi&nbsp;Justin,
                                                          <div><br>
                                                          </div>
                                                          <div>
                                                          <div>I have
                                                          couple of
                                                          questions
                                                          related to
                                                          "valid"
                                                          parameter...</div>
                                                          <div><br>
                                                          </div>
                                                          <div>This
                                                          endpoint can
                                                          be invoked by
                                                          the Resource
                                                          Server in
                                                          runtime...</div>
                                                          </div>
                                                          </blockquote>
                                                          <br>
                                                          That's
                                                          correct.
                                                          <div><br>
                                                          <br>
                                                          <blockquote
                                                          type="cite">
                                                          <div><br>
                                                          </div>
                                                          <div>In that
                                                          case what is
                                                          exactly meant
                                                          by the
                                                          "resource_id"
                                                          in request ?</div>
                                                          </blockquote>
                                                          <br>
                                                          </div>
                                                          The
                                                          resource_id
                                                          field is a
                                                          service-specific
                                                          string that
                                                          basically lets
                                                          the resource
                                                          server provide
                                                          some context
                                                          to the request
                                                          to the auth
                                                          server. There
                                                          have been some
                                                          other
                                                          suggestions
                                                          like client IP
                                                          address, but I
                                                          wanted to put
                                                          this one in
                                                          because it
                                                          seemed to be a
                                                          common theme.
                                                          The client is
                                                          trying to do
                                                          *something*
                                                          with the
                                                          token, after
                                                          all, and the
                                                          rights,
                                                          permissions,
                                                          and metadata
                                                          associated
                                                          with the token
                                                          could change
                                                          based on that.
                                                          Since the
                                                          Introspection
                                                          endpoint is
                                                          all about
                                                          getting that
                                                          metadata back
                                                          to the PR,
                                                          this seemed
                                                          like a good
                                                          idea.
                                                          <div><br>
                                                          <br>
                                                          <blockquote
                                                          type="cite">
                                                          <div><br>
                                                          </div>
                                                          <div>IMO a
                                                          token to be
                                                          valid depends
                                                          on set of
                                                          criteria based
                                                          on it's type..</div>
                                                          <div><br>
                                                          </div>
                                                          <div>For a
                                                          Bearer token..</div>
                                                          <div><br>
                                                          </div>
                                                          <div>1. Token
                                                          should not be
                                                          expired</div>
                                                          <div>2. Token
                                                          should not be
                                                          revoked.</div>
                                                          <div>3. The
                                                          scope the
                                                          token issued
                                                          should match
                                                          with the scope
                                                          required for
                                                          the resource.</div>
                                                          <div><br>
                                                          </div>
                                                          <div>For a MAC
                                                          token...</div>
                                                          <div><br>
                                                          </div>
                                                          <div>1. Token
                                                          not expired
                                                          (mac id)</div>
                                                          <div>2. Token
                                                          should not be
                                                          revoked</div>
                                                          <div>3. The
                                                          scope the
                                                          token issued
                                                          should match
                                                          with the scope
                                                          required for
                                                          the resource.</div>
                                                          <div>4. HMAC
                                                          check should
                                                          be valid</div>
                                                          <div><br>
                                                          </div>
                                                          There are
                                                          similar
                                                          conditions for
                                                          SAML bearer
                                                          too..</blockquote>
                                                          <br>
                                                          </div>
                                                          This isn't
                                                          really true.
                                                          The SAML
                                                          bearer token
                                                          is fully
                                                          self-contained
                                                          and doesn't
                                                          change based
                                                          on other
                                                          parameters in
                                                          the message,
                                                          unlike MAC.
                                                          Same with JWT.
                                                          When it hands
                                                          a SAML or JWT
                                                          token to the
                                                          AS, the PR has
                                                          given
                                                          *everything*
                                                          the server
                                                          needs to check
                                                          that token's
                                                          validity and
                                                          use. <br>
                                                          <br>
                                                          MAC signatures
                                                          change with
                                                          every message,
                                                          and they're
                                                          done across
                                                          several
                                                          components of
                                                          the HTTP
                                                          message.
                                                          Therefor, the
                                                          HMAC check for
                                                          MAC style
                                                          tokens will
                                                          still need to
                                                          be done by the
                                                          protected
                                                          resource.
                                                          Introspection
                                                          would help in
                                                          the case that
                                                          the signature
                                                          validated just
                                                          fine, but the
                                                          token might
                                                          have expired.
                                                          Or you need to
                                                          know what
                                                          scopes apply.
                                                          Introspection
                                                          isn't to fully
                                                          validate the
                                                          call to the
                                                          protected
                                                          resource -- if
                                                          that were the
                                                          case, the PR
                                                          would have to
                                                          send some kind
                                                          of
                                                          encapsulated
                                                          version of the
                                                          original
                                                          request.
                                                          Otherwise, the
                                                          AS won't have
                                                          all of the
                                                          information it
                                                          needs to check
                                                          the MAC.<br>
                                                          <br>
                                                          <br>
                                                          I think what
                                                          you're
                                                          describing is
                                                          ultimately
                                                          *not* what the
                                                          introspection
                                                          endpoint is
                                                          intended to
                                                          do. If that's
                                                          unclear from
                                                          the document,
                                                          can you please
                                                          suggest text
                                                          that would
                                                          help clear the
                                                          use case up? I
                                                          wouldn't want
                                                          it to be
                                                          ambiguous.<span><font
color="#888888"><br>
                                                          <br>
                                                          &nbsp;-- Justin</font></span>
                                                          <div>
                                                          <div><br>
                                                          <br>
                                                          <blockquote
                                                          type="cite">
                                                          <div><br>
                                                          </div>
                                                          <div>Thanks
                                                          &amp; regards,</div>
                                                          <div>-Prabath</div>
                                                          <div><br>
                                                          </div>
                                                          <div><br>
                                                          <div
                                                          class="gmail_quote">On

                                                          Thu, Feb 7,
                                                          2013 at 10:30
                                                          PM, Justin
                                                          Richer <span
                                                          dir="ltr">&lt;<a
moz-do-not-send="true" href="mailto:jricher@mitre.org" target="_blank">jricher@mitre.org</a>&gt;</span>
                                                          wrote:<br>
                                                          <blockquote
                                                          class="gmail_quote"
                                                          style="margin:0
                                                          0 0
                                                          .8ex;border-left:1px
                                                          #ccc
                                                          solid;padding-left:1ex">
                                                          <div
                                                          bgcolor="#FFFFFF"
                                                          text="#000000">
                                                          It validates
                                                          the token,
                                                          which would be
                                                          either the
                                                          token itself
                                                          in the case of
                                                          Bearer or the
                                                          token "id"
                                                          part of
                                                          something more
                                                          complex like
                                                          MAC. It
                                                          doesn't
                                                          directly
                                                          validate the
                                                          usage of the
                                                          token, that's
                                                          still up to
                                                          the PR to do
                                                          that.<br>
                                                          <br>
                                                          I nearly added
                                                          a "token type"
                                                          field in this
                                                          draft, but
                                                          held back
                                                          because there
                                                          are several
                                                          kinds of
                                                          "token type"
                                                          that people
                                                          talk about in
                                                          OAuth. First,
                                                          there's
                                                          "Bearer" vs.
                                                          "MAC" vs.
                                                          "HOK", or what
                                                          have you. Then
                                                          within Bearer
                                                          you have "JWT"
                                                          or "SAML" or
                                                          "unstructured
                                                          blob". Then
                                                          you've also
                                                          got "access"
                                                          vs. "refresh"
                                                          and other
                                                          flavors of
                                                          token, like
                                                          the id_token
                                                          in OpenID
                                                          Connect. <br>
                                                          <br>
                                                          Thing is, the
                                                          server running
                                                          the
                                                          introspection
                                                          endpoint will
                                                          probably know
                                                          *all* of
                                                          these. But
                                                          should it tell
                                                          the client? If
                                                          so, which of
                                                          the three, and
                                                          what names
                                                          should the
                                                          fields be?<span><font
color="#888888"><br>
                                                          <br>
                                                          &nbsp;-- Justin</font></span>
                                                          <div>
                                                          <div><br>
                                                          <br>
                                                          <div>On
                                                          02/07/2013
                                                          11:26 AM,
                                                          Prabath
                                                          Siriwardena
                                                          wrote:<br>
                                                          </div>
                                                          <blockquote
                                                          type="cite">
                                                          Okay.. I was
                                                          thinking this
                                                          could be used
                                                          as a way to
                                                          validate the
                                                          token as well.
                                                          BTW even in
                                                          this case
                                                          shouldn't
                                                          communicate
                                                          the type of
                                                          token to AS?
                                                          For example in
                                                          the case of
                                                          SAML profile -
                                                          it could be
                                                          SAML token..
                                                          <div> <br>
                                                          </div>
                                                          <div>Thanks
                                                          &amp; regards,</div>
                                                          <div>-Prabath<br>
                                                          <br>
                                                          <div
                                                          class="gmail_quote">On

                                                          Thu, Feb 7,
                                                          2013 at 8:39
                                                          PM, Justin
                                                          Richer <span
                                                          dir="ltr">&lt;<a
moz-do-not-send="true" href="mailto:jricher@mitre.org" target="_blank">jricher@mitre.org</a>&gt;</span>
                                                          wrote:<br>
                                                          <blockquote
                                                          class="gmail_quote"
                                                          style="margin:0
                                                          0 0
                                                          .8ex;border-left:1px
                                                          #ccc
                                                          solid;padding-left:1ex">
                                                          <div
                                                          bgcolor="#FFFFFF"
                                                          text="#000000">
                                                          "valid" might
                                                          not be the
                                                          best term, but
                                                          it's meant to
                                                          be a field
                                                          where the
                                                          server says
                                                          "yes this
                                                          token is still
                                                          good" or "no
                                                          this token
                                                          isn't good
                                                          anymore". We
                                                          could instead
                                                          do this with
                                                          HTTP codes or
                                                          something but
                                                          I went with a
                                                          pure JSON
                                                          response.<span><font
color="#888888"><br>
                                                          <br>
                                                          &nbsp;-- Justin</font></span>
                                                          <div>
                                                          <div><br>
                                                          <br>
                                                          <div>On
                                                          02/06/2013
                                                          10:47 PM,
                                                          Prabath
                                                          Siriwardena
                                                          wrote:<br>
                                                          </div>
                                                          <blockquote
                                                          type="cite">
                                                          Hi Justin,
                                                          <div><br>
                                                          </div>
                                                          <div>I believe
                                                          this is
                                                          addressing one
                                                          of the key
                                                          missing part
                                                          in OAuth
                                                          2.0...</div>
                                                          <div><br>
                                                          </div>
                                                          <div>One
                                                          question - I
                                                          guess this was
                                                          discussed
                                                          already...</div>
                                                          <div><br>
                                                          </div>
                                                          <div>In the
                                                          spec - in the
                                                          introspection
                                                          response it
                                                          has the
                                                          attribute
                                                          "valid" - this
                                                          is basically
                                                          the validity
                                                          of the token
                                                          provided in
                                                          the request.</div>
                                                          <div><br>
                                                          </div>
                                                          <div>Validation&nbsp;criteria


                                                          depends on the
                                                          token and well
                                                          as token type
                                                          ( Bearer,
                                                          MAC..).</div>
                                                          <div><br>
                                                          </div>
                                                          <div>In the
                                                          spec it seems
                                                          like it's
                                                          coupled with
                                                          Bearer token
                                                          type... But I
                                                          guess, by
                                                          adding
                                                          "token_type"
                                                          to the request
                                                          we can remove
                                                          this
                                                          dependency.</div>
                                                          <div><br>
                                                          </div>
                                                          <div>WDYT..?</div>
                                                          <div><br>
                                                          </div>
                                                          <div>Thanks
                                                          &amp; regards,</div>
                                                          <div>-Prabath&nbsp;</div>
                                                          <div><br>
                                                          <div
                                                          class="gmail_quote">On


                                                          Thu, Feb 7,
                                                          2013 at 12:54
                                                          AM, Justin
                                                          Richer <span
                                                          dir="ltr">&lt;<a
moz-do-not-send="true" href="mailto:jricher@mitre.org" target="_blank">jricher@mitre.org</a>&gt;</span>
                                                          wrote:<br>
                                                          <blockquote
                                                          class="gmail_quote"
                                                          style="margin:0
                                                          0 0
                                                          .8ex;border-left:1px
                                                          #ccc
                                                          solid;padding-left:1ex">
                                                          <div
                                                          bgcolor="#FFFFFF"
                                                          text="#000000">
                                                          Updated
                                                          introspection
                                                          draft based on
                                                          recent
                                                          comments.
                                                          Changes
                                                          include:<br>
                                                          <br>
                                                          &nbsp;- "scope"
                                                          return
                                                          parameter now
                                                          follows
                                                          RFC6749 format
                                                          instead of
                                                          JSON array<br>
                                                          &nbsp;- "subject"
                                                          -&gt; "sub",
                                                          and "audience"
                                                          -&gt; "aud",
                                                          to be parallel
                                                          with JWT
                                                          claims<br>
                                                          &nbsp;- clarified
                                                          what happens
                                                          if the
                                                          authentication
                                                          is bad<br>
                                                          <br>
                                                          &nbsp;-- Justin<br>
                                                          <div><br>
                                                          <br>
                                                          --------
                                                          Original
                                                          Message
                                                          --------
                                                          <table
                                                          border="0"
                                                          cellpadding="0"
cellspacing="0">
                                                          <tbody>
                                                          <tr>
                                                          <th
                                                          align="RIGHT"
nowrap="nowrap" valign="BASELINE">Subject: </th>
                                                          <td>New
                                                          Version
                                                          Notification
                                                          for
                                                          draft-richer-oauth-introspection-02.txt</td>
                                                          </tr>
                                                          <tr>
                                                          <th
                                                          align="RIGHT"
nowrap="nowrap" valign="BASELINE">Date: </th>
                                                          <td>Wed, 6 Feb
                                                          2013 11:24:20
                                                          -0800</td>
                                                          </tr>
                                                          <tr>
                                                          <th
                                                          align="RIGHT"
nowrap="nowrap" valign="BASELINE">From: </th>
                                                          <td><a
                                                          moz-do-not-send="true"
href="mailto:internet-drafts@ietf.org" target="_blank">&lt;internet-drafts@ietf.org&gt;</a></td>
                                                          </tr>
                                                          <tr>
                                                          <th
                                                          align="RIGHT"
nowrap="nowrap" valign="BASELINE">To: </th>
                                                          <td><a
                                                          moz-do-not-send="true"
href="mailto:jricher@mitre.org" target="_blank">&lt;jricher@mitre.org&gt;</a></td>
                                                          </tr>
                                                          </tbody>
                                                          </table>
                                                          <br>
                                                          <br>
                                                          <pre>A new version of I-D, draft-richer-oauth-introspection-02.txt
has been successfully submitted by Justin Richer and posted to the
IETF repository.

Filename:	 draft-richer-oauth-introspection
Revision:	 02
Title:		 OAuth Token Introspection
Creation date:	 2013-02-06
WG ID:		 Individual Submission
Number of pages: 6
URL:             <a moz-do-not-send="true" href="http://www.ietf.org/internet-drafts/draft-richer-oauth-introspection-02.txt" target="_blank">http://www.ietf.org/internet-drafts/draft-richer-oauth-introspection-02.txt</a>
Status:          <a moz-do-not-send="true" href="http://datatracker.ietf.org/doc/draft-richer-oauth-introspection" target="_blank">http://datatracker.ietf.org/doc/draft-richer-oauth-introspection</a>
Htmlized:        <a moz-do-not-send="true" href="http://tools.ietf.org/html/draft-richer-oauth-introspection-02" target="_blank">http://tools.ietf.org/html/draft-richer-oauth-introspection-02</a>
Diff:            <a moz-do-not-send="true" href="http://www.ietf.org/rfcdiff?url2=draft-richer-oauth-introspection-02" target="_blank">http://www.ietf.org/rfcdiff?url2=draft-richer-oauth-introspection-02</a>

Abstract:
   This specification defines a method for a client or protected
   resource to query an OAuth authorization server to determine meta-
   information about an OAuth token.


                                                                                  


The IETF Secretariat

</pre>
                                                          <br>
                                                          </div>
                                                          <br>
                                                          </div>
                                                          <br>
_______________________________________________<br>
                                                          OAuth mailing
                                                          list<br>
                                                          <a
                                                          moz-do-not-send="true"
href="mailto:OAuth@ietf.org" target="_blank">OAuth@ietf.org</a><br>
                                                          <a
                                                          moz-do-not-send="true"
href="https://www.ietf.org/mailman/listinfo/oauth" target="_blank">https://www.ietf.org/mailman/listinfo/oauth</a><br>
                                                          <br>
                                                          </blockquote>
                                                          </div>
                                                          <br>
                                                          <br
                                                          clear="all">
                                                          <div><br>
                                                          </div>
                                                          -- <br>
                                                          Thanks &amp;
                                                          Regards,<br>
                                                          Prabath
                                                          <div><br>
                                                          </div>
                                                          <div>Mobile :
                                                          <a
                                                          moz-do-not-send="true"
href="tel:%2B94%2071%20809%206732" value="+94718096732" target="_blank">+94

                                                          71 809 6732</a>&nbsp;<br>
                                                          <br>
                                                          <a
                                                          moz-do-not-send="true"
href="http://blog.facilelogin.com" target="_blank">http://blog.facilelogin.com</a><br>
                                                          <a
                                                          moz-do-not-send="true"
href="http://RampartFAQ.com" target="_blank">http://RampartFAQ.com</a></div>
                                                          </div>
                                                          </blockquote>
                                                          <br>
                                                          </div>
                                                          </div>
                                                          </div>
                                                          </blockquote>
                                                          </div>
                                                          <br>
                                                          <br
                                                          clear="all">
                                                          <div><br>
                                                          </div>
                                                          -- <br>
                                                          Thanks &amp;
                                                          Regards,<br>
                                                          Prabath
                                                          <div><br>
                                                          </div>
                                                          <div>Mobile :
                                                          <a
                                                          moz-do-not-send="true"
href="tel:%2B94%2071%20809%206732" value="+94718096732" target="_blank">+94

                                                          71 809 6732</a>&nbsp;<br>
                                                          <br>
                                                          <a
                                                          moz-do-not-send="true"
href="http://blog.facilelogin.com" target="_blank">http://blog.facilelogin.com</a><br>
                                                          <a
                                                          moz-do-not-send="true"
href="http://RampartFAQ.com" target="_blank">http://RampartFAQ.com</a></div>
                                                          </div>
                                                          </blockquote>
                                                          <br>
                                                          </div>
                                                          </div>
                                                          </div>
                                                          </blockquote>
                                                          </div>
                                                          <br>
                                                          <br
                                                          clear="all">
                                                          <div><br>
                                                          </div>
                                                          -- <br>
                                                          Thanks &amp;
                                                          Regards,<br>
                                                          Prabath
                                                          <div><br>
                                                          </div>
                                                          <div>Mobile :
                                                          <a
                                                          moz-do-not-send="true"
href="tel:%2B94%2071%20809%206732" value="+94718096732" target="_blank">+94


                                                          71 809 6732</a>&nbsp;<br>
                                                          <br>
                                                          <a
                                                          moz-do-not-send="true"
href="http://blog.facilelogin.com" target="_blank">http://blog.facilelogin.com</a><br>
                                                          <a
                                                          moz-do-not-send="true"
href="http://RampartFAQ.com" target="_blank">http://RampartFAQ.com</a></div>
                                                          </div>
                                                          </blockquote>
                                                          <br>
                                                          </div>
                                                          </div>
                                                          </div>
                                                          </blockquote>
                                                          </div>
                                                          <br>
                                                          <br
                                                          clear="all">
                                                          <div><br>
                                                          </div>
                                                          -- <br>
                                                          Thanks &amp;
                                                          Regards,<br>
                                                          Prabath
                                                          <div><br>
                                                          </div>
                                                          <div>Mobile :
                                                          <a
                                                          moz-do-not-send="true"
href="tel:%2B94%2071%20809%206732" value="+94718096732" target="_blank">+94
                                                          71 809 6732</a>&nbsp;<br>
                                                          <br>
                                                          <a
                                                          moz-do-not-send="true"
href="http://blog.facilelogin.com" target="_blank">http://blog.facilelogin.com</a><br>
                                                          <a
                                                          moz-do-not-send="true"
href="http://RampartFAQ.com" target="_blank">http://RampartFAQ.com</a></div>
                                                          </div>
                                                        </div>
                                                      </blockquote>
                                                      <blockquote
                                                        type="cite">
                                                        <div><span>_______________________________________________</span><br>
                                                          <span>OAuth
                                                          mailing list</span><br>
                                                          <span><a
                                                          moz-do-not-send="true"
href="mailto:OAuth@ietf.org" target="_blank">OAuth@ietf.org</a></span><br>
                                                          <span><a
                                                          moz-do-not-send="true"
href="https://www.ietf.org/mailman/listinfo/oauth" target="_blank">https://www.ietf.org/mailman/listinfo/oauth</a></span><br>
                                                        </div>
                                                      </blockquote>
                                                    </blockquote>
                                                    <br>
                                                  </div>
                                                </div>
                                              </div>
                                            </blockquote>
                                          </div>
                                          <br>
                                          <br clear="all">
                                          <div><br>
                                          </div>
                                          -- <br>
                                          Thanks &amp; Regards,<br>
                                          Prabath
                                          <div><br>
                                          </div>
                                          <div>Mobile : <a
                                              moz-do-not-send="true"
                                              href="tel:%2B94%2071%20809%206732"
                                              value="+94718096732"
                                              target="_blank">+94 71 809
                                              6732</a>&nbsp;<br>
                                            <br>
                                            <a moz-do-not-send="true"
                                              href="http://blog.facilelogin.com"
                                              target="_blank">http://blog.facilelogin.com</a><br>
                                            <a moz-do-not-send="true"
                                              href="http://RampartFAQ.com"
                                              target="_blank">http://RampartFAQ.com</a></div>
                                        </div>
                                      </div>
                                    </div>
                                  </blockquote>
                                </div>
                                <br>
                                <br clear="all">
                                <div><br>
                                </div>
                                -- <br>
                                Thanks &amp; Regards,<br>
                                Prabath
                                <div><br>
                                </div>
                                <div>Mobile : <a moz-do-not-send="true"
                                    href="tel:%2B94%2071%20809%206732"
                                    value="+94718096732" target="_blank">+94
                                    71 809 6732</a>&nbsp;<br>
                                  <br>
                                  <a moz-do-not-send="true"
                                    href="http://blog.facilelogin.com"
                                    target="_blank">http://blog.facilelogin.com</a><br>
                                  <a moz-do-not-send="true"
                                    href="http://RampartFAQ.com"
                                    target="_blank">http://RampartFAQ.com</a></div>
                              </div>
                            </blockquote>
                            <br>
                          </div>
                        </div>
                      </div>
                    </blockquote>
                  </div>
                  <br>
                  <br clear="all">
                  <div><br>
                  </div>
                  -- <br>
                  Thanks &amp; Regards,<br>
                  Prabath
                  <div><br>
                  </div>
                  <div>Mobile : <a moz-do-not-send="true"
                      href="tel:%2B94%2071%20809%206732"
                      value="+94718096732" target="_blank">+94 71 809
                      6732</a>&nbsp;<br>
                    <br>
                    <a moz-do-not-send="true"
                      href="http://blog.facilelogin.com" target="_blank">http://blog.facilelogin.com</a><br>
                    <a moz-do-not-send="true"
                      href="http://RampartFAQ.com" target="_blank">http://RampartFAQ.com</a></div>
                </div>
              </div>
            </div>
          </blockquote>
        </div>
        <br>
        <br clear="all">
        <div><br>
        </div>
        -- <br>
        Thanks &amp; Regards,<br>
        Prabath
        <div><br>
        </div>
        <div>Mobile : +94 71 809 6732&nbsp;<br>
          <br>
          <a moz-do-not-send="true" href="http://blog.facilelogin.com"
            target="_blank">http://blog.facilelogin.com</a><br>
          <a moz-do-not-send="true" href="http://RampartFAQ.com"
            target="_blank">http://RampartFAQ.com</a></div>
      </div>
    </blockquote>
    <br>
  </body>
</html>

--------------050907000800000603080505--

From prabath@wso2.com  Thu Feb 14 06:28:24 2013
Return-Path: <prabath@wso2.com>
X-Original-To: oauth@ietfa.amsl.com
Delivered-To: oauth@ietfa.amsl.com
Received: from localhost (localhost [127.0.0.1]) by ietfa.amsl.com (Postfix) with ESMTP id 48B8B21F893D for <oauth@ietfa.amsl.com>; Thu, 14 Feb 2013 06:28:24 -0800 (PST)
X-Virus-Scanned: amavisd-new at amsl.com
X-Spam-Flag: NO
X-Spam-Score: -2.882
X-Spam-Level: 
X-Spam-Status: No, score=-2.882 tagged_above=-999 required=5 tests=[AWL=0.094,  BAYES_00=-2.599, FM_FORGED_GMAIL=0.622, HTML_MESSAGE=0.001, RCVD_IN_DNSWL_LOW=-1]
Received: from mail.ietf.org ([64.170.98.30]) by localhost (ietfa.amsl.com [127.0.0.1]) (amavisd-new, port 10024) with ESMTP id 3m+XYV9o6y6p for <oauth@ietfa.amsl.com>; Thu, 14 Feb 2013 06:28:22 -0800 (PST)
Received: from mail-ee0-f53.google.com (mail-ee0-f53.google.com [74.125.83.53]) by ietfa.amsl.com (Postfix) with ESMTP id EEFC721F892C for <oauth@ietf.org>; Thu, 14 Feb 2013 06:28:04 -0800 (PST)
Received: by mail-ee0-f53.google.com with SMTP id e53so1260177eek.26 for <oauth@ietf.org>; Thu, 14 Feb 2013 06:28:04 -0800 (PST)
X-Google-DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=google.com; s=20120113; h=mime-version:x-received:in-reply-to:references:date:message-id :subject:from:to:cc:content-type:x-gm-message-state; bh=M0NEqoQzbqL4/EjV2TnRRKX3KH4FBllm6E/f0F6lUqU=; b=K1ghAkVvaSX7Rv+WmKs84YtRSUlfKZZZULHcNDvDKXYhpfk87QhesxFkoFgVVGqlE2 Ba4ETNrphDJfmpdqi0aZuZAMLx2g7RMm4Akp9hDrNUlkXxHkfOGyAHSUm8dsm/Bmaa9v iSGQEqqhBu5t+0RUSf3nlvQLrI3zogk/8GNyueTICl/98TUhWVmGy8RXNW7rdXz1rvib e3m4qscMc5qgZrged9sKTGVIhUXcrvY+QPPbasHbSkau1zXEoFWGmo1oByRW6G2I/ntf JWyK0cmI7BOdVusPsooXud+qcQ9lCZTF3FCYwIsLioKzeNh5cZtsFTHrDMxj8TuKsYhv wR4g==
MIME-Version: 1.0
X-Received: by 10.14.194.198 with SMTP id m46mr18423773een.8.1360852083737; Thu, 14 Feb 2013 06:28:03 -0800 (PST)
Received: by 10.223.37.77 with HTTP; Thu, 14 Feb 2013 06:28:03 -0800 (PST)
In-Reply-To: <511CF3EF.8040008@mitre.org>
References: <20130206192420.32698.21027.idtracker@ietfa.amsl.com> <5112AE0B.1080501@mitre.org> <CAJV9qO_8-4FowrXK=ae-+xMjiJFP04ryVMLQ8SGUH8kp3PHrLg@mail.gmail.com> <5113C3AA.1040701@mitre.org> <CAJV9qO8BVV57eAb5kUNes15AYOpUKqw5XWQswh-FJA=b1pPgSA@mail.gmail.com> <5113DDB2.7060805@mitre.org> <CAJV9qO_gM1oera9ae9sqh9n17e-ZLKuC2pmsZwhq-RmFcMyqHA@mail.gmail.com> <51196777.6000502@mitre.org> <CAJV9qO-5bWZbNUfCmaqYBQoy-qwNaSZFOsO9GL3CrbSejwVTzw@mail.gmail.com> <F6595A40-6B4E-4718-ABB5-694CA975C4DB@maymount.com> <511A5062.5010108@mitre.org> <CAJV9qO_Mr87NX=KZRqCsWasQ1FuvDNBw14eS-TcPf_KRJztQFg@mail.gmail.com> <CAJV9qO-71-sM6kXOB6Fb_bvVkDBQ5JBbs8E5X=f-K=iEmGezRA@mail.gmail.com> <511CEEAA.3030801@mitre.org> <CAJV9qO-JSXgSTkw2_pdH0D-o-xDWGDqxx=PAWYtnTj4hOQXW4Q@mail.gmail.com> <CAJV9qO9=+kiO-s7vH_ewr7XjfVdDU24F0kuif504bP53dBr1TA@mail.gmail.com> <511CF3EF.8040008@mitre.org>
Date: Thu, 14 Feb 2013 19:58:03 +0530
Message-ID: <CAJV9qO8yKkrsV7d9JtDmbLY-fb5phh=ssKbEUuutkY53PgY8Vg@mail.gmail.com>
From: Prabath Siriwardena <prabath@wso2.com>
To: Justin Richer <jricher@mitre.org>
Content-Type: multipart/alternative; boundary=047d7b343a9e0b048704d5b0116e
X-Gm-Message-State: ALoCoQmDqfZDDT7wLLF49NsebDlhV8a/IAzh2duvK4sDtjVwXNOlw/pfO2mvEo6k0s/SQ3OgWrgD
Cc: "oauth@ietf.org" <oauth@ietf.org>
Subject: Re: [OAUTH-WG] Fwd: New Version Notification for draft-richer-oauth-introspection-02.txt
X-BeenThere: oauth@ietf.org
X-Mailman-Version: 2.1.12
Precedence: list
List-Id: OAUTH WG <oauth.ietf.org>
List-Unsubscribe: <https://www.ietf.org/mailman/options/oauth>, <mailto:oauth-request@ietf.org?subject=unsubscribe>
List-Archive: <http://www.ietf.org/mail-archive/web/oauth>
List-Post: <mailto:oauth@ietf.org>
List-Help: <mailto:oauth-request@ietf.org?subject=help>
List-Subscribe: <https://www.ietf.org/mailman/listinfo/oauth>, <mailto:oauth-request@ietf.org?subject=subscribe>
X-List-Received-Date: Thu, 14 Feb 2013 14:28:24 -0000

--047d7b343a9e0b048704d5b0116e
Content-Type: text/plain; charset=ISO-8859-1

Okay. With out knowing the type of the token how can the AS validate the
token ? What is meant by the validity there?

Thanks & regards,
-Prabath

On Thu, Feb 14, 2013 at 7:55 PM, Justin Richer <jricher@mitre.org> wrote:

>  OK, I don't see the utility in that at all. What would it accomplish?
>
>  -- Justin
>
>
> On 02/14/2013 09:25 AM, Prabath Siriwardena wrote:
>
> To make it clear - my suggestion is to add token_type_hint to the
> introspection request. It can be from client to AS or from RS to AS.
>
>  Then AS can decide whether the provided token is valid or not and
> include "valid" attribute in the introspection response.
>
>  Thanks & regards,
> -Prabath
>
> On Thu, Feb 14, 2013 at 7:52 PM, Prabath Siriwardena <prabath@wso2.com>wrote:
>
>> Both the client and the resource owner should be aware of the token type.
>>
>>  My argument is, if the authorization server to decide whether the token
>> is valid or not ( irrespective of who asked the question) - AS needs to
>> know the token type - because to validate a token AS should know the token
>> type.
>>
>>  The token type could be, bearer or MAC or any other token type.
>>
>>  Thanks & regards,
>> -Prabath
>>
>>
>> On Thu, Feb 14, 2013 at 7:33 PM, Justin Richer <jricher@mitre.org> wrote:
>>
>>>  What exactly are you suggesting be added to introspection? The
>>> "token_type_hint" is from the client to the server, but what you've asked
>>> for in terms of "token type" is from the server to the client. And there
>>> was never an answer to what exactly is meant by "token type" in this case,
>>> particularly because you seem to want to call out things like SAML and
>>> Bearer as separate types.
>>>
>>>  -- Justin
>>>
>>>
>>>
>>> On 02/14/2013 06:59 AM, Prabath Siriwardena wrote:
>>>
>>> I noticed that the latest Token Revocation draft [1] has introduced the
>>> parameter "token_type_hint". I would suggest the same here, as that would
>>> make what is meant by "valid" much clear..
>>>
>>>  [1]: http://tools.ietf.org/html/draft-ietf-oauth-revocation-05
>>>
>>>  Thanks & regards,
>>> -Prabath
>>>
>>> On Tue, Feb 12, 2013 at 9:35 PM, Prabath Siriwardena <prabath@wso2.com>wrote:
>>>
>>>> Hi Justin,
>>>>
>>>>  I doubt whether valid_token would make a difference..?
>>>>
>>>>  My initial argument is what is the validation criteria..? Validation
>>>> criteria depends on the token_type..
>>>>
>>>>  If we are talking only about metadata - then I believe "revoked",
>>>> "expired" would be more meaningful..
>>>>
>>>>  Thanks & regards,
>>>> -Prabath
>>>>
>>>>
>>>>  On Tue, Feb 12, 2013 at 7:53 PM, Justin Richer <jricher@mitre.org>wrote:
>>>>
>>>>>  OK, I can see the wisdom in changing this term.
>>>>>
>>>>> I picked "valid" because I wanted a simple "boolean" value that would
>>>>> require no additional parsing or string-matching on the client's behalf,
>>>>> and I'd like to stick with that. OAuth is built with the assumption that
>>>>> clients need to be able to recover from invalid tokens at any stage, so I
>>>>> think a simple yes/no is the right step here.
>>>>>
>>>>> That said, I think you're both right that "valid" seems to have caused
>>>>> a bit of confusion. I don't want to go with "revoked" because I'd rather
>>>>> have the "token is OK" be the positive boolean value.
>>>>>
>>>>> Would "valid_token" be more clear? Or do we need a different adjective
>>>>> all together?
>>>>>
>>>>>  -- Justin
>>>>>
>>>>>
>>>>> On 02/11/2013 08:02 PM, Richard Harrington wrote:
>>>>>
>>>>> Have you considered "status" instead of "valid"?  It could have values
>>>>> like "active", "expired", and "revoked".
>>>>>
>>>>>  Is it worthwhile including the status of the client also?  For
>>>>> example, a client application could be disabled, temporarily or
>>>>> permanently, and thus disabling its access tokens as well.
>>>>>
>>>>>
>>>>> On Feb 11, 2013, at 1:56 PM, Prabath Siriwardena <prabath@wso2.com>
>>>>> wrote:
>>>>>
>>>>>  I guess confusion is with 'valid' parameter is in the response..
>>>>>
>>>>>  I thought this will be helpful to standardize the communication
>>>>> between Resource Server and the Authorization Server..
>>>>>
>>>>>  I would suggest we completely remove "valid" from the response - or
>>>>> define it much clearly..
>>>>>
>>>>>  May be can add "revoked" with a boolean attribute..
>>>>>
>>>>>  Thanks & regards,
>>>>> -Prabath
>>>>>
>>>>> On Tue, Feb 12, 2013 at 3:19 AM, Justin Richer <jricher@mitre.org>wrote:
>>>>>
>>>>>>
>>>>>> On 02/08/2013 12:51 AM, Prabath Siriwardena wrote:
>>>>>>
>>>>>> Hi Justin,
>>>>>>
>>>>>>  I have couple of questions related to "valid" parameter...
>>>>>>
>>>>>>  This endpoint can be invoked by the Resource Server in runtime...
>>>>>>
>>>>>>
>>>>>> That's correct.
>>>>>>
>>>>>>
>>>>>>
>>>>>>  In that case what is exactly meant by the "resource_id" in request ?
>>>>>>
>>>>>>
>>>>>>  The resource_id field is a service-specific string that basically
>>>>>> lets the resource server provide some context to the request to the auth
>>>>>> server. There have been some other suggestions like client IP address, but
>>>>>> I wanted to put this one in because it seemed to be a common theme. The
>>>>>> client is trying to do *something* with the token, after all, and the
>>>>>> rights, permissions, and metadata associated with the token could change
>>>>>> based on that. Since the Introspection endpoint is all about getting that
>>>>>> metadata back to the PR, this seemed like a good idea.
>>>>>>
>>>>>>
>>>>>>
>>>>>>  IMO a token to be valid depends on set of criteria based on it's
>>>>>> type..
>>>>>>
>>>>>>  For a Bearer token..
>>>>>>
>>>>>>  1. Token should not be expired
>>>>>> 2. Token should not be revoked.
>>>>>> 3. The scope the token issued should match with the scope required
>>>>>> for the resource.
>>>>>>
>>>>>>  For a MAC token...
>>>>>>
>>>>>>  1. Token not expired (mac id)
>>>>>> 2. Token should not be revoked
>>>>>> 3. The scope the token issued should match with the scope required
>>>>>> for the resource.
>>>>>> 4. HMAC check should be valid
>>>>>>
>>>>>>  There are similar conditions for SAML bearer too..
>>>>>>
>>>>>>
>>>>>>  This isn't really true. The SAML bearer token is fully
>>>>>> self-contained and doesn't change based on other parameters in the message,
>>>>>> unlike MAC. Same with JWT. When it hands a SAML or JWT token to the AS, the
>>>>>> PR has given *everything* the server needs to check that token's validity
>>>>>> and use.
>>>>>>
>>>>>> MAC signatures change with every message, and they're done across
>>>>>> several components of the HTTP message. Therefor, the HMAC check for MAC
>>>>>> style tokens will still need to be done by the protected resource.
>>>>>> Introspection would help in the case that the signature validated just
>>>>>> fine, but the token might have expired. Or you need to know what scopes
>>>>>> apply. Introspection isn't to fully validate the call to the protected
>>>>>> resource -- if that were the case, the PR would have to send some kind of
>>>>>> encapsulated version of the original request. Otherwise, the AS won't have
>>>>>> all of the information it needs to check the MAC.
>>>>>>
>>>>>>
>>>>>> I think what you're describing is ultimately *not* what the
>>>>>> introspection endpoint is intended to do. If that's unclear from the
>>>>>> document, can you please suggest text that would help clear the use case
>>>>>> up? I wouldn't want it to be ambiguous.
>>>>>>
>>>>>>  -- Justin
>>>>>>
>>>>>>
>>>>>>
>>>>>>  Thanks & regards,
>>>>>> -Prabath
>>>>>>
>>>>>>
>>>>>> On Thu, Feb 7, 2013 at 10:30 PM, Justin Richer <jricher@mitre.org>wrote:
>>>>>>
>>>>>>>  It validates the token, which would be either the token itself in
>>>>>>> the case of Bearer or the token "id" part of something more complex like
>>>>>>> MAC. It doesn't directly validate the usage of the token, that's still up
>>>>>>> to the PR to do that.
>>>>>>>
>>>>>>> I nearly added a "token type" field in this draft, but held back
>>>>>>> because there are several kinds of "token type" that people talk about in
>>>>>>> OAuth. First, there's "Bearer" vs. "MAC" vs. "HOK", or what have you. Then
>>>>>>> within Bearer you have "JWT" or "SAML" or "unstructured blob". Then you've
>>>>>>> also got "access" vs. "refresh" and other flavors of token, like the
>>>>>>> id_token in OpenID Connect.
>>>>>>>
>>>>>>> Thing is, the server running the introspection endpoint will
>>>>>>> probably know *all* of these. But should it tell the client? If so, which
>>>>>>> of the three, and what names should the fields be?
>>>>>>>
>>>>>>>  -- Justin
>>>>>>>
>>>>>>>
>>>>>>> On 02/07/2013 11:26 AM, Prabath Siriwardena wrote:
>>>>>>>
>>>>>>> Okay.. I was thinking this could be used as a way to validate the
>>>>>>> token as well. BTW even in this case shouldn't communicate the type of
>>>>>>> token to AS? For example in the case of SAML profile - it could be SAML
>>>>>>> token..
>>>>>>>
>>>>>>>  Thanks & regards,
>>>>>>> -Prabath
>>>>>>>
>>>>>>> On Thu, Feb 7, 2013 at 8:39 PM, Justin Richer <jricher@mitre.org>wrote:
>>>>>>>
>>>>>>>>  "valid" might not be the best term, but it's meant to be a field
>>>>>>>> where the server says "yes this token is still good" or "no this token
>>>>>>>> isn't good anymore". We could instead do this with HTTP codes or something
>>>>>>>> but I went with a pure JSON response.
>>>>>>>>
>>>>>>>>  -- Justin
>>>>>>>>
>>>>>>>>
>>>>>>>> On 02/06/2013 10:47 PM, Prabath Siriwardena wrote:
>>>>>>>>
>>>>>>>> Hi Justin,
>>>>>>>>
>>>>>>>>  I believe this is addressing one of the key missing part in OAuth
>>>>>>>> 2.0...
>>>>>>>>
>>>>>>>>  One question - I guess this was discussed already...
>>>>>>>>
>>>>>>>>  In the spec - in the introspection response it has the attribute
>>>>>>>> "valid" - this is basically the validity of the token provided in the
>>>>>>>> request.
>>>>>>>>
>>>>>>>>  Validation criteria depends on the token and well as token type (
>>>>>>>> Bearer, MAC..).
>>>>>>>>
>>>>>>>>  In the spec it seems like it's coupled with Bearer token type...
>>>>>>>> But I guess, by adding "token_type" to the request we can remove this
>>>>>>>> dependency.
>>>>>>>>
>>>>>>>>  WDYT..?
>>>>>>>>
>>>>>>>>  Thanks & regards,
>>>>>>>> -Prabath
>>>>>>>>
>>>>>>>> On Thu, Feb 7, 2013 at 12:54 AM, Justin Richer <jricher@mitre.org>wrote:
>>>>>>>>
>>>>>>>>>  Updated introspection draft based on recent comments. Changes
>>>>>>>>> include:
>>>>>>>>>
>>>>>>>>>  - "scope" return parameter now follows RFC6749 format instead of
>>>>>>>>> JSON array
>>>>>>>>>  - "subject" -> "sub", and "audience" -> "aud", to be parallel
>>>>>>>>> with JWT claims
>>>>>>>>>  - clarified what happens if the authentication is bad
>>>>>>>>>
>>>>>>>>>  -- Justin
>>>>>>>>>
>>>>>>>>>
>>>>>>>>> -------- Original Message --------  Subject: New Version
>>>>>>>>> Notification for draft-richer-oauth-introspection-02.txt  Date: Wed,
>>>>>>>>> 6 Feb 2013 11:24:20 -0800  From: <internet-drafts@ietf.org><internet-drafts@ietf.org>  To:
>>>>>>>>> <jricher@mitre.org> <jricher@mitre.org>
>>>>>>>>>
>>>>>>>>> A new version of I-D, draft-richer-oauth-introspection-02.txt
>>>>>>>>> has been successfully submitted by Justin Richer and posted to the
>>>>>>>>> IETF repository.
>>>>>>>>>
>>>>>>>>> Filename:	 draft-richer-oauth-introspection
>>>>>>>>> Revision:	 02
>>>>>>>>> Title:		 OAuth Token Introspection
>>>>>>>>> Creation date:	 2013-02-06
>>>>>>>>> WG ID:		 Individual Submission
>>>>>>>>> Number of pages: 6
>>>>>>>>> URL:             http://www.ietf.org/internet-drafts/draft-richer-oauth-introspection-02.txt
>>>>>>>>> Status:          http://datatracker.ietf.org/doc/draft-richer-oauth-introspection
>>>>>>>>> Htmlized:        http://tools.ietf.org/html/draft-richer-oauth-introspection-02
>>>>>>>>> Diff:            http://www.ietf.org/rfcdiff?url2=draft-richer-oauth-introspection-02
>>>>>>>>>
>>>>>>>>> Abstract:
>>>>>>>>>    This specification defines a method for a client or protected
>>>>>>>>>    resource to query an OAuth authorization server to determine meta-
>>>>>>>>>    information about an OAuth token.
>>>>>>>>>
>>>>>>>>>
>>>>>>>>>
>>>>>>>>>
>>>>>>>>>
>>>>>>>>> The IETF Secretariat
>>>>>>>>>
>>>>>>>>>
>>>>>>>>>
>>>>>>>>>
>>>>>>>>>
>>>>>>>>> _______________________________________________
>>>>>>>>> OAuth mailing list
>>>>>>>>> OAuth@ietf.org
>>>>>>>>> https://www.ietf.org/mailman/listinfo/oauth
>>>>>>>>>
>>>>>>>>>
>>>>>>>>
>>>>>>>>
>>>>>>>>  --
>>>>>>>> Thanks & Regards,
>>>>>>>> Prabath
>>>>>>>>
>>>>>>>>  Mobile : +94 71 809 6732 <%2B94%2071%20809%206732>
>>>>>>>>
>>>>>>>> http://blog.facilelogin.com
>>>>>>>> http://RampartFAQ.com
>>>>>>>>
>>>>>>>>
>>>>>>>>
>>>>>>>
>>>>>>>
>>>>>>>  --
>>>>>>> Thanks & Regards,
>>>>>>> Prabath
>>>>>>>
>>>>>>>  Mobile : +94 71 809 6732 <%2B94%2071%20809%206732>
>>>>>>>
>>>>>>> http://blog.facilelogin.com
>>>>>>> http://RampartFAQ.com
>>>>>>>
>>>>>>>
>>>>>>>
>>>>>>
>>>>>>
>>>>>>  --
>>>>>> Thanks & Regards,
>>>>>> Prabath
>>>>>>
>>>>>>  Mobile : +94 71 809 6732 <%2B94%2071%20809%206732>
>>>>>>
>>>>>> http://blog.facilelogin.com
>>>>>> http://RampartFAQ.com
>>>>>>
>>>>>>
>>>>>>
>>>>>
>>>>>
>>>>>  --
>>>>> Thanks & Regards,
>>>>> Prabath
>>>>>
>>>>>  Mobile : +94 71 809 6732 <%2B94%2071%20809%206732>
>>>>>
>>>>> http://blog.facilelogin.com
>>>>> http://RampartFAQ.com
>>>>>
>>>>>  _______________________________________________
>>>>> OAuth mailing list
>>>>> OAuth@ietf.org
>>>>> https://www.ietf.org/mailman/listinfo/oauth
>>>>>
>>>>>
>>>>>
>>>>
>>>>
>>>>  --
>>>> Thanks & Regards,
>>>> Prabath
>>>>
>>>>  Mobile : +94 71 809 6732 <%2B94%2071%20809%206732>
>>>>
>>>> http://blog.facilelogin.com
>>>> http://RampartFAQ.com
>>>>
>>>
>>>
>>>
>>>  --
>>> Thanks & Regards,
>>> Prabath
>>>
>>>  Mobile : +94 71 809 6732 <%2B94%2071%20809%206732>
>>>
>>> http://blog.facilelogin.com
>>> http://RampartFAQ.com
>>>
>>>
>>>
>>
>>
>>  --
>> Thanks & Regards,
>> Prabath
>>
>>  Mobile : +94 71 809 6732 <%2B94%2071%20809%206732>
>>
>> http://blog.facilelogin.com
>> http://RampartFAQ.com
>>
>
>
>
>  --
> Thanks & Regards,
> Prabath
>
>  Mobile : +94 71 809 6732
>
> http://blog.facilelogin.com
> http://RampartFAQ.com
>
>
>


-- 
Thanks & Regards,
Prabath

Mobile : +94 71 809 6732

http://blog.facilelogin.com
http://RampartFAQ.com

--047d7b343a9e0b048704d5b0116e
Content-Type: text/html; charset=ISO-8859-1
Content-Transfer-Encoding: quoted-printable

Okay. With out knowing the type of the token how can the AS validate the to=
ken ? What is meant by the validity there?<div><br></div><div>Thanks &amp; =
regards,</div><div>-Prabath<br><br><div class=3D"gmail_quote">On Thu, Feb 1=
4, 2013 at 7:55 PM, Justin Richer <span dir=3D"ltr">&lt;<a href=3D"mailto:j=
richer@mitre.org" target=3D"_blank">jricher@mitre.org</a>&gt;</span> wrote:=
<br>
<blockquote class=3D"gmail_quote" style=3D"margin:0 0 0 .8ex;border-left:1p=
x #ccc solid;padding-left:1ex">
 =20
   =20
 =20
  <div bgcolor=3D"#FFFFFF" text=3D"#000000">
    OK, I don&#39;t see the utility in that at all. What would it
    accomplish?<span class=3D"HOEnZb"><font color=3D"#888888"><br>
    <br>
    =A0-- Justin</font></span><div><div class=3D"h5"><br>
    <br>
    <div>On 02/14/2013 09:25 AM, Prabath
      Siriwardena wrote:<br>
    </div>
    <blockquote type=3D"cite">
     =20
      To make it clear - my suggestion is to add token_type_hint to the
      introspection request. It can be from client to AS or from RS to
      AS.
      <div><br>
      </div>
      <div>Then AS can decide whether the provided token is valid or not
        and include &quot;valid&quot; attribute in the introspection respon=
se.</div>
      <div><br>
      </div>
      <div>Thanks &amp; regards,</div>
      <div>-Prabath<br>
        <br>
        <div class=3D"gmail_quote">On Thu, Feb 14, 2013 at 7:52 PM,
          Prabath Siriwardena <span dir=3D"ltr">&lt;<a href=3D"mailto:praba=
th@wso2.com" target=3D"_blank">prabath@wso2.com</a>&gt;</span> wrote:<br>
          <blockquote class=3D"gmail_quote" style=3D"margin:0 0 0 .8ex;bord=
er-left:1px #ccc solid;padding-left:1ex">Both the
            client and the resource owner should be aware of the token
            type.
            <div><br>
            </div>
            <div>My argument is, if the authorization server to decide
              whether the token is valid or not ( irrespective of who
              asked the question) - AS needs to know the token type -
              because to validate a token AS should know the token type.</d=
iv>
            <div><br>
            </div>
            <div>The token type could be, bearer or MAC or any other
              token type.</div>
            <div><br>
            </div>
            <div>Thanks &amp; regards,</div>
            <div>-Prabath
              <div>
                <div><br>
                  <br>
                  <div class=3D"gmail_quote">On Thu, Feb 14, 2013 at 7:33
                    PM, Justin Richer <span dir=3D"ltr">&lt;<a href=3D"mail=
to:jricher@mitre.org" target=3D"_blank">jricher@mitre.org</a>&gt;</span>
                    wrote:<br>
                    <blockquote class=3D"gmail_quote" style=3D"margin:0 0 0=
 .8ex;border-left:1px #ccc solid;padding-left:1ex">
                      <div bgcolor=3D"#FFFFFF" text=3D"#000000"> What
                        exactly are you suggesting be added to
                        introspection? The &quot;token_type_hint&quot; is f=
rom the
                        client to the server, but what you&#39;ve asked for
                        in terms of &quot;token type&quot; is from the serv=
er to
                        the client. And there was never an answer to
                        what exactly is meant by &quot;token type&quot; in =
this
                        case, particularly because you seem to want to
                        call out things like SAML and Bearer as separate
                        types. <br>
                        <span><font color=3D"#888888"> <br>
                            =A0-- Justin</font></span>
                        <div>
                          <div><br>
                            <br>
                            <br>
                            <div>On 02/14/2013 06:59 AM, Prabath
                              Siriwardena wrote:<br>
                            </div>
                            <blockquote type=3D"cite"> I noticed that the
                              latest Token Revocation draft [1] has
                              introduced the parameter
                              &quot;token_type_hint&quot;. I would suggest =
the
                              same here, as that would make what is
                              meant by &quot;valid&quot; much clear..
                              <div><br>
                              </div>
                              <div>[1]:=A0<a href=3D"http://tools.ietf.org/=
html/draft-ietf-oauth-revocation-05" style=3D"color:rgb(17,85,204);font-siz=
e:12.727272033691406px;font-family:arial,sans-serif" target=3D"_blank">http=
://tools.ietf.org/html/draft-ietf-oauth-revocation-05</a></div>

                              <div><br>
                              </div>
                              <div>Thanks &amp; regards,</div>
                              <div>-Prabath<br>
                                <br>
                                <div class=3D"gmail_quote">On Tue, Feb 12,
                                  2013 at 9:35 PM, Prabath Siriwardena <spa=
n dir=3D"ltr">&lt;<a href=3D"mailto:prabath@wso2.com" target=3D"_blank">pra=
bath@wso2.com</a>&gt;</span>
                                  wrote:<br>
                                  <blockquote class=3D"gmail_quote" style=
=3D"margin:0 0 0 .8ex;border-left:1px #ccc solid;padding-left:1ex">Hi Justi=
n,
                                    <div><br>
                                    </div>
                                    <div>I doubt whether valid_token
                                      would make a difference..?</div>
                                    <div><br>
                                    </div>
                                    <div>My initial argument is what is
                                      the validation criteria..?
                                      Validation criteria depends on the
                                      token_type..</div>
                                    <div> <br>
                                    </div>
                                    <div>If we are talking only about
                                      metadata - then I believe
                                      &quot;revoked&quot;, &quot;expired&qu=
ot; would be more
                                      meaningful..</div>
                                    <div><br>
                                    </div>
                                    <div>Thanks &amp; regards,</div>
                                    <div>-Prabath
                                      <div>
                                        <div> <br>
                                          <br>
                                          <div class=3D"gmail_quote"> On
                                            Tue, Feb 12, 2013 at 7:53
                                            PM, Justin Richer <span dir=3D"=
ltr">&lt;<a href=3D"mailto:jricher@mitre.org" target=3D"_blank">jricher@mit=
re.org</a>&gt;</span>
                                            wrote:<br>
                                            <blockquote class=3D"gmail_quot=
e" style=3D"margin:0 0 0 .8ex;border-left:1px #ccc solid;padding-left:1ex">
                                              <div bgcolor=3D"#FFFFFF" text=
=3D"#000000"> OK, I
                                                can see the wisdom in
                                                changing this term. <br>
                                                <br>
                                                I picked &quot;valid&quot; =
because
                                                I wanted a simple
                                                &quot;boolean&quot; value t=
hat
                                                would require no
                                                additional parsing or
                                                string-matching on the
                                                client&#39;s behalf, and I&=
#39;d
                                                like to stick with that.
                                                OAuth is built with the
                                                assumption that clients
                                                need to be able to
                                                recover from invalid
                                                tokens at any stage, so
                                                I think a simple yes/no
                                                is the right step here.
                                                <br>
                                                <br>
                                                That said, I think
                                                you&#39;re both right that
                                                &quot;valid&quot; seems to =
have
                                                caused a bit of
                                                confusion. I don&#39;t want
                                                to go with &quot;revoked&qu=
ot;
                                                because I&#39;d rather have
                                                the &quot;token is OK&quot;=
 be the
                                                positive boolean value.
                                                <br>
                                                <br>
                                                Would &quot;valid_token&quo=
t; be
                                                more clear? Or do we
                                                need a different
                                                adjective all together?<spa=
n><font color=3D"#888888"><br>
                                                    <br>
                                                    =A0-- Justin</font></sp=
an>
                                                <div>
                                                  <div><br>
                                                    <br>
                                                    <div>On 02/11/2013
                                                      08:02 PM, Richard
                                                      Harrington wrote:<br>
                                                    </div>
                                                    <blockquote type=3D"cit=
e">
                                                      <div>Have you
                                                        considered
                                                        &quot;status&quot; =
instead
                                                        of &quot;valid&quot=
;? =A0It
                                                        could have
                                                        values like
                                                        &quot;active&quot;,
                                                        &quot;expired&quot;=
, and
                                                        &quot;revoked&quot;=
.</div>
                                                      <div><br>
                                                      </div>
                                                      <div>Is it
                                                        worthwhile
                                                        including the
                                                        status of the
                                                        client also?
                                                        =A0For example, a
                                                        client
                                                        application
                                                        could be
                                                        disabled,
                                                        temporarily or
                                                        permanently, and
                                                        thus disabling
                                                        its access
                                                        tokens as well.</di=
v>
                                                      <div><br>
                                                      </div>
                                                      <div><br>
                                                        On Feb 11, 2013,
                                                        at 1:56 PM,
                                                        Prabath
                                                        Siriwardena &lt;<a =
href=3D"mailto:prabath@wso2.com" target=3D"_blank">prabath@wso2.com</a>&gt;


                                                        wrote:<br>
                                                        <br>
                                                      </div>
                                                      <blockquote type=3D"c=
ite">
                                                        <div>I guess
                                                          confusion is
                                                          with &#39;valid&#=
39;
                                                          parameter is
                                                          in the
                                                          response..
                                                          <div><br>
                                                          </div>
                                                          <div>I thought
                                                          this will be
                                                          helpful
                                                          to=A0standardize=
=A0the
                                                          communication
                                                          between
                                                          Resource
                                                          Server and the
                                                          Authorization
                                                          Server..</div>
                                                          <div><br>
                                                          </div>
                                                          <div>I would
                                                          suggest we
                                                          completely
                                                          remove &quot;vali=
d&quot;
                                                          from the
                                                          response - or
                                                          define it much
                                                          clearly..</div>
                                                          <div><br>
                                                          </div>
                                                          <div>May be
                                                          can add
                                                          &quot;revoked&quo=
t; with
                                                          a boolean
                                                          attribute..</div>
                                                          <div><br>
                                                          </div>
                                                          <div>Thanks
                                                          &amp; regards,</d=
iv>
                                                          <div>-Prabath<br>
                                                          <br>
                                                          <div class=3D"gma=
il_quote">On
                                                          Tue, Feb 12,
                                                          2013 at 3:19
                                                          AM, Justin
                                                          Richer <span dir=
=3D"ltr">&lt;<a href=3D"mailto:jricher@mitre.org" target=3D"_blank">jricher=
@mitre.org</a>&gt;</span>
                                                          wrote:<br>
                                                          <blockquote class=
=3D"gmail_quote" style=3D"margin:0 0 0 .8ex;border-left:1px #ccc solid;padd=
ing-left:1ex">
                                                          <div bgcolor=3D"#=
FFFFFF" text=3D"#000000">
                                                          <div> <br>
                                                          <div>On
                                                          02/08/2013
                                                          12:51 AM,
                                                          Prabath
                                                          Siriwardena
                                                          wrote:<br>
                                                          </div>
                                                          </div>
                                                          <blockquote type=
=3D"cite">
                                                          Hi=A0Justin,
                                                          <div><br>
                                                          </div>
                                                          <div>
                                                          <div>I have
                                                          couple of
                                                          questions
                                                          related to
                                                          &quot;valid&quot;
                                                          parameter...</div=
>
                                                          <div><br>
                                                          </div>
                                                          <div>This
                                                          endpoint can
                                                          be invoked by
                                                          the Resource
                                                          Server in
                                                          runtime...</div>
                                                          </div>
                                                          </blockquote>
                                                          <br>
                                                          That&#39;s
                                                          correct.
                                                          <div><br>
                                                          <br>
                                                          <blockquote type=
=3D"cite">
                                                          <div><br>
                                                          </div>
                                                          <div>In that
                                                          case what is
                                                          exactly meant
                                                          by the
                                                          &quot;resource_id=
&quot;
                                                          in request ?</div=
>
                                                          </blockquote>
                                                          <br>
                                                          </div>
                                                          The
                                                          resource_id
                                                          field is a
                                                          service-specific
                                                          string that
                                                          basically lets
                                                          the resource
                                                          server provide
                                                          some context
                                                          to the request
                                                          to the auth
                                                          server. There
                                                          have been some
                                                          other
                                                          suggestions
                                                          like client IP
                                                          address, but I
                                                          wanted to put
                                                          this one in
                                                          because it
                                                          seemed to be a
                                                          common theme.
                                                          The client is
                                                          trying to do
                                                          *something*
                                                          with the
                                                          token, after
                                                          all, and the
                                                          rights,
                                                          permissions,
                                                          and metadata
                                                          associated
                                                          with the token
                                                          could change
                                                          based on that.
                                                          Since the
                                                          Introspection
                                                          endpoint is
                                                          all about
                                                          getting that
                                                          metadata back
                                                          to the PR,
                                                          this seemed
                                                          like a good
                                                          idea.
                                                          <div><br>
                                                          <br>
                                                          <blockquote type=
=3D"cite">
                                                          <div><br>
                                                          </div>
                                                          <div>IMO a
                                                          token to be
                                                          valid depends
                                                          on set of
                                                          criteria based
                                                          on it&#39;s type.=
.</div>
                                                          <div><br>
                                                          </div>
                                                          <div>For a
                                                          Bearer token..</d=
iv>
                                                          <div><br>
                                                          </div>
                                                          <div>1. Token
                                                          should not be
                                                          expired</div>
                                                          <div>2. Token
                                                          should not be
                                                          revoked.</div>
                                                          <div>3. The
                                                          scope the
                                                          token issued
                                                          should match
                                                          with the scope
                                                          required for
                                                          the resource.</di=
v>
                                                          <div><br>
                                                          </div>
                                                          <div>For a MAC
                                                          token...</div>
                                                          <div><br>
                                                          </div>
                                                          <div>1. Token
                                                          not expired
                                                          (mac id)</div>
                                                          <div>2. Token
                                                          should not be
                                                          revoked</div>
                                                          <div>3. The
                                                          scope the
                                                          token issued
                                                          should match
                                                          with the scope
                                                          required for
                                                          the resource.</di=
v>
                                                          <div>4. HMAC
                                                          check should
                                                          be valid</div>
                                                          <div><br>
                                                          </div>
                                                          There are
                                                          similar
                                                          conditions for
                                                          SAML bearer
                                                          too..</blockquote=
>
                                                          <br>
                                                          </div>
                                                          This isn&#39;t
                                                          really true.
                                                          The SAML
                                                          bearer token
                                                          is fully
                                                          self-contained
                                                          and doesn&#39;t
                                                          change based
                                                          on other
                                                          parameters in
                                                          the message,
                                                          unlike MAC.
                                                          Same with JWT.
                                                          When it hands
                                                          a SAML or JWT
                                                          token to the
                                                          AS, the PR has
                                                          given
                                                          *everything*
                                                          the server
                                                          needs to check
                                                          that token&#39;s
                                                          validity and
                                                          use. <br>
                                                          <br>
                                                          MAC signatures
                                                          change with
                                                          every message,
                                                          and they&#39;re
                                                          done across
                                                          several
                                                          components of
                                                          the HTTP
                                                          message.
                                                          Therefor, the
                                                          HMAC check for
                                                          MAC style
                                                          tokens will
                                                          still need to
                                                          be done by the
                                                          protected
                                                          resource.
                                                          Introspection
                                                          would help in
                                                          the case that
                                                          the signature
                                                          validated just
                                                          fine, but the
                                                          token might
                                                          have expired.
                                                          Or you need to
                                                          know what
                                                          scopes apply.
                                                          Introspection
                                                          isn&#39;t to full=
y
                                                          validate the
                                                          call to the
                                                          protected
                                                          resource -- if
                                                          that were the
                                                          case, the PR
                                                          would have to
                                                          send some kind
                                                          of
                                                          encapsulated
                                                          version of the
                                                          original
                                                          request.
                                                          Otherwise, the
                                                          AS won&#39;t have
                                                          all of the
                                                          information it
                                                          needs to check
                                                          the MAC.<br>
                                                          <br>
                                                          <br>
                                                          I think what
                                                          you&#39;re
                                                          describing is
                                                          ultimately
                                                          *not* what the
                                                          introspection
                                                          endpoint is
                                                          intended to
                                                          do. If that&#39;s
                                                          unclear from
                                                          the document,
                                                          can you please
                                                          suggest text
                                                          that would
                                                          help clear the
                                                          use case up? I
                                                          wouldn&#39;t want
                                                          it to be
                                                          ambiguous.<span><=
font color=3D"#888888"><br>
                                                          <br>
                                                          =A0-- Justin</fon=
t></span>
                                                          <div>
                                                          <div><br>
                                                          <br>
                                                          <blockquote type=
=3D"cite">
                                                          <div><br>
                                                          </div>
                                                          <div>Thanks
                                                          &amp; regards,</d=
iv>
                                                          <div>-Prabath</di=
v>
                                                          <div><br>
                                                          </div>
                                                          <div><br>
                                                          <div class=3D"gma=
il_quote">On

                                                          Thu, Feb 7,
                                                          2013 at 10:30
                                                          PM, Justin
                                                          Richer <span dir=
=3D"ltr">&lt;<a href=3D"mailto:jricher@mitre.org" target=3D"_blank">jricher=
@mitre.org</a>&gt;</span>
                                                          wrote:<br>
                                                          <blockquote class=
=3D"gmail_quote" style=3D"margin:0 0 0 .8ex;border-left:1px #ccc solid;padd=
ing-left:1ex">
                                                          <div bgcolor=3D"#=
FFFFFF" text=3D"#000000">
                                                          It validates
                                                          the token,
                                                          which would be
                                                          either the
                                                          token itself
                                                          in the case of
                                                          Bearer or the
                                                          token &quot;id&qu=
ot;
                                                          part of
                                                          something more
                                                          complex like
                                                          MAC. It
                                                          doesn&#39;t
                                                          directly
                                                          validate the
                                                          usage of the
                                                          token, that&#39;s
                                                          still up to
                                                          the PR to do
                                                          that.<br>
                                                          <br>
                                                          I nearly added
                                                          a &quot;token typ=
e&quot;
                                                          field in this
                                                          draft, but
                                                          held back
                                                          because there
                                                          are several
                                                          kinds of
                                                          &quot;token type&=
quot;
                                                          that people
                                                          talk about in
                                                          OAuth. First,
                                                          there&#39;s
                                                          &quot;Bearer&quot=
; vs.
                                                          &quot;MAC&quot; v=
s.
                                                          &quot;HOK&quot;, =
or what
                                                          have you. Then
                                                          within Bearer
                                                          you have &quot;JW=
T&quot;
                                                          or &quot;SAML&quo=
t; or
                                                          &quot;unstructure=
d
                                                          blob&quot;. Then
                                                          you&#39;ve also
                                                          got &quot;access&=
quot;
                                                          vs. &quot;refresh=
&quot;
                                                          and other
                                                          flavors of
                                                          token, like
                                                          the id_token
                                                          in OpenID
                                                          Connect. <br>
                                                          <br>
                                                          Thing is, the
                                                          server running
                                                          the
                                                          introspection
                                                          endpoint will
                                                          probably know
                                                          *all* of
                                                          these. But
                                                          should it tell
                                                          the client? If
                                                          so, which of
                                                          the three, and
                                                          what names
                                                          should the
                                                          fields be?<span><=
font color=3D"#888888"><br>
                                                          <br>
                                                          =A0-- Justin</fon=
t></span>
                                                          <div>
                                                          <div><br>
                                                          <br>
                                                          <div>On
                                                          02/07/2013
                                                          11:26 AM,
                                                          Prabath
                                                          Siriwardena
                                                          wrote:<br>
                                                          </div>
                                                          <blockquote type=
=3D"cite">
                                                          Okay.. I was
                                                          thinking this
                                                          could be used
                                                          as a way to
                                                          validate the
                                                          token as well.
                                                          BTW even in
                                                          this case
                                                          shouldn&#39;t
                                                          communicate
                                                          the type of
                                                          token to AS?
                                                          For example in
                                                          the case of
                                                          SAML profile -
                                                          it could be
                                                          SAML token..
                                                          <div> <br>
                                                          </div>
                                                          <div>Thanks
                                                          &amp; regards,</d=
iv>
                                                          <div>-Prabath<br>
                                                          <br>
                                                          <div class=3D"gma=
il_quote">On

                                                          Thu, Feb 7,
                                                          2013 at 8:39
                                                          PM, Justin
                                                          Richer <span dir=
=3D"ltr">&lt;<a href=3D"mailto:jricher@mitre.org" target=3D"_blank">jricher=
@mitre.org</a>&gt;</span>
                                                          wrote:<br>
                                                          <blockquote class=
=3D"gmail_quote" style=3D"margin:0 0 0 .8ex;border-left:1px #ccc solid;padd=
ing-left:1ex">
                                                          <div bgcolor=3D"#=
FFFFFF" text=3D"#000000">
                                                          &quot;valid&quot;=
 might
                                                          not be the
                                                          best term, but
                                                          it&#39;s meant to
                                                          be a field
                                                          where the
                                                          server says
                                                          &quot;yes this
                                                          token is still
                                                          good&quot; or &qu=
ot;no
                                                          this token
                                                          isn&#39;t good
                                                          anymore&quot;. We
                                                          could instead
                                                          do this with
                                                          HTTP codes or
                                                          something but
                                                          I went with a
                                                          pure JSON
                                                          response.<span><f=
ont color=3D"#888888"><br>
                                                          <br>
                                                          =A0-- Justin</fon=
t></span>
                                                          <div>
                                                          <div><br>
                                                          <br>
                                                          <div>On
                                                          02/06/2013
                                                          10:47 PM,
                                                          Prabath
                                                          Siriwardena
                                                          wrote:<br>
                                                          </div>
                                                          <blockquote type=
=3D"cite">
                                                          Hi Justin,
                                                          <div><br>
                                                          </div>
                                                          <div>I believe
                                                          this is
                                                          addressing one
                                                          of the key
                                                          missing part
                                                          in OAuth
                                                          2.0...</div>
                                                          <div><br>
                                                          </div>
                                                          <div>One
                                                          question - I
                                                          guess this was
                                                          discussed
                                                          already...</div>
                                                          <div><br>
                                                          </div>
                                                          <div>In the
                                                          spec - in the
                                                          introspection
                                                          response it
                                                          has the
                                                          attribute
                                                          &quot;valid&quot;=
 - this
                                                          is basically
                                                          the validity
                                                          of the token
                                                          provided in
                                                          the request.</div=
>
                                                          <div><br>
                                                          </div>
                                                          <div>Validation=
=A0criteria


                                                          depends on the
                                                          token and well
                                                          as token type
                                                          ( Bearer,
                                                          MAC..).</div>
                                                          <div><br>
                                                          </div>
                                                          <div>In the
                                                          spec it seems
                                                          like it&#39;s
                                                          coupled with
                                                          Bearer token
                                                          type... But I
                                                          guess, by
                                                          adding
                                                          &quot;token_type&=
quot;
                                                          to the request
                                                          we can remove
                                                          this
                                                          dependency.</div>
                                                          <div><br>
                                                          </div>
                                                          <div>WDYT..?</div=
>
                                                          <div><br>
                                                          </div>
                                                          <div>Thanks
                                                          &amp; regards,</d=
iv>
                                                          <div>-Prabath=A0<=
/div>
                                                          <div><br>
                                                          <div class=3D"gma=
il_quote">On


                                                          Thu, Feb 7,
                                                          2013 at 12:54
                                                          AM, Justin
                                                          Richer <span dir=
=3D"ltr">&lt;<a href=3D"mailto:jricher@mitre.org" target=3D"_blank">jricher=
@mitre.org</a>&gt;</span>
                                                          wrote:<br>
                                                          <blockquote class=
=3D"gmail_quote" style=3D"margin:0 0 0 .8ex;border-left:1px #ccc solid;padd=
ing-left:1ex">
                                                          <div bgcolor=3D"#=
FFFFFF" text=3D"#000000">
                                                          Updated
                                                          introspection
                                                          draft based on
                                                          recent
                                                          comments.
                                                          Changes
                                                          include:<br>
                                                          <br>
                                                          =A0- &quot;scope&=
quot;
                                                          return
                                                          parameter now
                                                          follows
                                                          RFC6749 format
                                                          instead of
                                                          JSON array<br>
                                                          =A0- &quot;subjec=
t&quot;
                                                          -&gt; &quot;sub&q=
uot;,
                                                          and &quot;audienc=
e&quot;
                                                          -&gt; &quot;aud&q=
uot;,
                                                          to be parallel
                                                          with JWT
                                                          claims<br>
                                                          =A0- clarified
                                                          what happens
                                                          if the
                                                          authentication
                                                          is bad<br>
                                                          <br>
                                                          =A0-- Justin<br>
                                                          <div><br>
                                                          <br>
                                                          --------
                                                          Original
                                                          Message
                                                          --------
                                                          <table border=3D"=
0" cellpadding=3D"0" cellspacing=3D"0">
                                                          <tbody>
                                                          <tr>
                                                          <th align=3D"RIGH=
T" nowrap valign=3D"BASELINE">Subject: </th>
                                                          <td>New
                                                          Version
                                                          Notification
                                                          for
                                                          draft-richer-oaut=
h-introspection-02.txt</td>
                                                          </tr>
                                                          <tr>
                                                          <th align=3D"RIGH=
T" nowrap valign=3D"BASELINE">Date: </th>
                                                          <td>Wed, 6 Feb
                                                          2013 11:24:20
                                                          -0800</td>
                                                          </tr>
                                                          <tr>
                                                          <th align=3D"RIGH=
T" nowrap valign=3D"BASELINE">From: </th>
                                                          <td><a href=3D"ma=
ilto:internet-drafts@ietf.org" target=3D"_blank">&lt;internet-drafts@ietf.o=
rg&gt;</a></td>
                                                          </tr>
                                                          <tr>
                                                          <th align=3D"RIGH=
T" nowrap valign=3D"BASELINE">To: </th>
                                                          <td><a href=3D"ma=
ilto:jricher@mitre.org" target=3D"_blank">&lt;jricher@mitre.org&gt;</a></td=
>
                                                          </tr>
                                                          </tbody>
                                                          </table>
                                                          <br>
                                                          <br>
                                                          <pre>A new versio=
n of I-D, draft-richer-oauth-introspection-02.txt
has been successfully submitted by Justin Richer and posted to the
IETF repository.

Filename:	 draft-richer-oauth-introspection
Revision:	 02
Title:		 OAuth Token Introspection
Creation date:	 2013-02-06
WG ID:		 Individual Submission
Number of pages: 6
URL:             <a href=3D"http://www.ietf.org/internet-drafts/draft-riche=
r-oauth-introspection-02.txt" target=3D"_blank">http://www.ietf.org/interne=
t-drafts/draft-richer-oauth-introspection-02.txt</a>
Status:          <a href=3D"http://datatracker.ietf.org/doc/draft-richer-oa=
uth-introspection" target=3D"_blank">http://datatracker.ietf.org/doc/draft-=
richer-oauth-introspection</a>
Htmlized:        <a href=3D"http://tools.ietf.org/html/draft-richer-oauth-i=
ntrospection-02" target=3D"_blank">http://tools.ietf.org/html/draft-richer-=
oauth-introspection-02</a>
Diff:            <a href=3D"http://www.ietf.org/rfcdiff?url2=3Ddraft-richer=
-oauth-introspection-02" target=3D"_blank">http://www.ietf.org/rfcdiff?url2=
=3Ddraft-richer-oauth-introspection-02</a>

Abstract:
   This specification defines a method for a client or protected
   resource to query an OAuth authorization server to determine meta-
   information about an OAuth token.


                                                                           =
      =20


The IETF Secretariat

</pre>
                                                          <br>
                                                          </div>
                                                          <br>
                                                          </div>
                                                          <br>
_______________________________________________<br>
                                                          OAuth mailing
                                                          list<br>
                                                          <a href=3D"mailto=
:OAuth@ietf.org" target=3D"_blank">OAuth@ietf.org</a><br>
                                                          <a href=3D"https:=
//www.ietf.org/mailman/listinfo/oauth" target=3D"_blank">https://www.ietf.o=
rg/mailman/listinfo/oauth</a><br>
                                                          <br>
                                                          </blockquote>
                                                          </div>
                                                          <br>
                                                          <br clear=3D"all"=
>
                                                          <div><br>
                                                          </div>
                                                          -- <br>
                                                          Thanks &amp;
                                                          Regards,<br>
                                                          Prabath
                                                          <div><br>
                                                          </div>
                                                          <div>Mobile :
                                                          <a href=3D"tel:%2=
B94%2071%20809%206732" value=3D"+94718096732" target=3D"_blank">+94

                                                          71 809 6732</a>=
=A0<br>
                                                          <br>
                                                          <a href=3D"http:/=
/blog.facilelogin.com" target=3D"_blank">http://blog.facilelogin.com</a><br=
>
                                                          <a href=3D"http:/=
/RampartFAQ.com" target=3D"_blank">http://RampartFAQ.com</a></div>
                                                          </div>
                                                          </blockquote>
                                                          <br>
                                                          </div>
                                                          </div>
                                                          </div>
                                                          </blockquote>
                                                          </div>
                                                          <br>
                                                          <br clear=3D"all"=
>
                                                          <div><br>
                                                          </div>
                                                          -- <br>
                                                          Thanks &amp;
                                                          Regards,<br>
                                                          Prabath
                                                          <div><br>
                                                          </div>
                                                          <div>Mobile :
                                                          <a href=3D"tel:%2=
B94%2071%20809%206732" value=3D"+94718096732" target=3D"_blank">+94

                                                          71 809 6732</a>=
=A0<br>
                                                          <br>
                                                          <a href=3D"http:/=
/blog.facilelogin.com" target=3D"_blank">http://blog.facilelogin.com</a><br=
>
                                                          <a href=3D"http:/=
/RampartFAQ.com" target=3D"_blank">http://RampartFAQ.com</a></div>
                                                          </div>
                                                          </blockquote>
                                                          <br>
                                                          </div>
                                                          </div>
                                                          </div>
                                                          </blockquote>
                                                          </div>
                                                          <br>
                                                          <br clear=3D"all"=
>
                                                          <div><br>
                                                          </div>
                                                          -- <br>
                                                          Thanks &amp;
                                                          Regards,<br>
                                                          Prabath
                                                          <div><br>
                                                          </div>
                                                          <div>Mobile :
                                                          <a href=3D"tel:%2=
B94%2071%20809%206732" value=3D"+94718096732" target=3D"_blank">+94


                                                          71 809 6732</a>=
=A0<br>
                                                          <br>
                                                          <a href=3D"http:/=
/blog.facilelogin.com" target=3D"_blank">http://blog.facilelogin.com</a><br=
>
                                                          <a href=3D"http:/=
/RampartFAQ.com" target=3D"_blank">http://RampartFAQ.com</a></div>
                                                          </div>
                                                          </blockquote>
                                                          <br>
                                                          </div>
                                                          </div>
                                                          </div>
                                                          </blockquote>
                                                          </div>
                                                          <br>
                                                          <br clear=3D"all"=
>
                                                          <div><br>
                                                          </div>
                                                          -- <br>
                                                          Thanks &amp;
                                                          Regards,<br>
                                                          Prabath
                                                          <div><br>
                                                          </div>
                                                          <div>Mobile :
                                                          <a href=3D"tel:%2=
B94%2071%20809%206732" value=3D"+94718096732" target=3D"_blank">+94
                                                          71 809 6732</a>=
=A0<br>
                                                          <br>
                                                          <a href=3D"http:/=
/blog.facilelogin.com" target=3D"_blank">http://blog.facilelogin.com</a><br=
>
                                                          <a href=3D"http:/=
/RampartFAQ.com" target=3D"_blank">http://RampartFAQ.com</a></div>
                                                          </div>
                                                        </div>
                                                      </blockquote>
                                                      <blockquote type=3D"c=
ite">
                                                        <div><span>________=
_______________________________________</span><br>
                                                          <span>OAuth
                                                          mailing list</spa=
n><br>
                                                          <span><a href=3D"=
mailto:OAuth@ietf.org" target=3D"_blank">OAuth@ietf.org</a></span><br>
                                                          <span><a href=3D"=
https://www.ietf.org/mailman/listinfo/oauth" target=3D"_blank">https://www.=
ietf.org/mailman/listinfo/oauth</a></span><br>
                                                        </div>
                                                      </blockquote>
                                                    </blockquote>
                                                    <br>
                                                  </div>
                                                </div>
                                              </div>
                                            </blockquote>
                                          </div>
                                          <br>
                                          <br clear=3D"all">
                                          <div><br>
                                          </div>
                                          -- <br>
                                          Thanks &amp; Regards,<br>
                                          Prabath
                                          <div><br>
                                          </div>
                                          <div>Mobile : <a href=3D"tel:%2B9=
4%2071%20809%206732" value=3D"+94718096732" target=3D"_blank">+94 71 809
                                              6732</a>=A0<br>
                                            <br>
                                            <a href=3D"http://blog.facilelo=
gin.com" target=3D"_blank">http://blog.facilelogin.com</a><br>
                                            <a href=3D"http://RampartFAQ.co=
m" target=3D"_blank">http://RampartFAQ.com</a></div>
                                        </div>
                                      </div>
                                    </div>
                                  </blockquote>
                                </div>
                                <br>
                                <br clear=3D"all">
                                <div><br>
                                </div>
                                -- <br>
                                Thanks &amp; Regards,<br>
                                Prabath
                                <div><br>
                                </div>
                                <div>Mobile : <a href=3D"tel:%2B94%2071%208=
09%206732" value=3D"+94718096732" target=3D"_blank">+94
                                    71 809 6732</a>=A0<br>
                                  <br>
                                  <a href=3D"http://blog.facilelogin.com" t=
arget=3D"_blank">http://blog.facilelogin.com</a><br>
                                  <a href=3D"http://RampartFAQ.com" target=
=3D"_blank">http://RampartFAQ.com</a></div>
                              </div>
                            </blockquote>
                            <br>
                          </div>
                        </div>
                      </div>
                    </blockquote>
                  </div>
                  <br>
                  <br clear=3D"all">
                  <div><br>
                  </div>
                  -- <br>
                  Thanks &amp; Regards,<br>
                  Prabath
                  <div><br>
                  </div>
                  <div>Mobile : <a href=3D"tel:%2B94%2071%20809%206732" val=
ue=3D"+94718096732" target=3D"_blank">+94 71 809
                      6732</a>=A0<br>
                    <br>
                    <a href=3D"http://blog.facilelogin.com" target=3D"_blan=
k">http://blog.facilelogin.com</a><br>
                    <a href=3D"http://RampartFAQ.com" target=3D"_blank">htt=
p://RampartFAQ.com</a></div>
                </div>
              </div>
            </div>
          </blockquote>
        </div>
        <br>
        <br clear=3D"all">
        <div><br>
        </div>
        -- <br>
        Thanks &amp; Regards,<br>
        Prabath
        <div><br>
        </div>
        <div>Mobile : <a href=3D"tel:%2B94%2071%20809%206732" value=3D"+947=
18096732" target=3D"_blank">+94 71 809 6732</a>=A0<br>
          <br>
          <a href=3D"http://blog.facilelogin.com" target=3D"_blank">http://=
blog.facilelogin.com</a><br>
          <a href=3D"http://RampartFAQ.com" target=3D"_blank">http://Rampar=
tFAQ.com</a></div>
      </div>
    </blockquote>
    <br>
  </div></div></div>

</blockquote></div><br><br clear=3D"all"><div><br></div>-- <br>Thanks &amp;=
 Regards,<br>Prabath<div><br></div><div>Mobile : +94 71 809 6732=A0<br><br>=
<a href=3D"http://blog.facilelogin.com" target=3D"_blank">http://blog.facil=
elogin.com</a><br>
<a href=3D"http://RampartFAQ.com" target=3D"_blank">http://RampartFAQ.com</=
a></div>
</div>

--047d7b343a9e0b048704d5b0116e--

From jricher@mitre.org  Thu Feb 14 06:29:49 2013
Return-Path: <jricher@mitre.org>
X-Original-To: oauth@ietfa.amsl.com
Delivered-To: oauth@ietfa.amsl.com
Received: from localhost (localhost [127.0.0.1]) by ietfa.amsl.com (Postfix) with ESMTP id 9383921F8682 for <oauth@ietfa.amsl.com>; Thu, 14 Feb 2013 06:29:49 -0800 (PST)
X-Virus-Scanned: amavisd-new at amsl.com
X-Spam-Flag: NO
X-Spam-Score: -6.57
X-Spam-Level: 
X-Spam-Status: No, score=-6.57 tagged_above=-999 required=5 tests=[AWL=0.028,  BAYES_00=-2.599, HTML_MESSAGE=0.001, RCVD_IN_DNSWL_MED=-4]
Received: from mail.ietf.org ([64.170.98.30]) by localhost (ietfa.amsl.com [127.0.0.1]) (amavisd-new, port 10024) with ESMTP id ZmR+gI+oEL0C for <oauth@ietfa.amsl.com>; Thu, 14 Feb 2013 06:29:47 -0800 (PST)
Received: from smtpksrv1.mitre.org (smtpksrv1.mitre.org [198.49.146.77]) by ietfa.amsl.com (Postfix) with ESMTP id 1148521F8691 for <oauth@ietf.org>; Thu, 14 Feb 2013 06:29:46 -0800 (PST)
Received: from smtpksrv1.mitre.org (localhost.localdomain [127.0.0.1]) by localhost (Postfix) with SMTP id 917A45310DC7; Thu, 14 Feb 2013 09:29:45 -0500 (EST)
Received: from IMCCAS01.MITRE.ORG (imccas01.mitre.org [129.83.29.78]) by smtpksrv1.mitre.org (Postfix) with ESMTP id 7D20E5310DC5; Thu, 14 Feb 2013 09:29:45 -0500 (EST)
Received: from [10.146.15.29] (129.83.31.58) by IMCCAS01.MITRE.ORG (129.83.29.78) with Microsoft SMTP Server (TLS) id 14.2.318.4; Thu, 14 Feb 2013 09:29:45 -0500
Message-ID: <511CF4AB.5010700@mitre.org>
Date: Thu, 14 Feb 2013 09:28:59 -0500
From: Justin Richer <jricher@mitre.org>
User-Agent: Mozilla/5.0 (X11; Linux i686; rv:17.0) Gecko/20130106 Thunderbird/17.0.2
MIME-Version: 1.0
To: Prabath Siriwardena <prabath@wso2.com>
References: <20130206192420.32698.21027.idtracker@ietfa.amsl.com> <5112AE0B.1080501@mitre.org> <CAJV9qO_8-4FowrXK=ae-+xMjiJFP04ryVMLQ8SGUH8kp3PHrLg@mail.gmail.com> <5113C3AA.1040701@mitre.org> <CAJV9qO8BVV57eAb5kUNes15AYOpUKqw5XWQswh-FJA=b1pPgSA@mail.gmail.com> <5113DDB2.7060805@mitre.org> <CAJV9qO_gM1oera9ae9sqh9n17e-ZLKuC2pmsZwhq-RmFcMyqHA@mail.gmail.com> <51196777.6000502@mitre.org> <CAJV9qO-5bWZbNUfCmaqYBQoy-qwNaSZFOsO9GL3CrbSejwVTzw@mail.gmail.com> <F6595A40-6B4E-4718-ABB5-694CA975C4DB@maymount.com> <511A5062.5010108@mitre.org> <CAJV9qO_Mr87NX=KZRqCsWasQ1FuvDNBw14eS-TcPf_KRJztQFg@mail.gmail.com> <CAJV9qO-71-sM6kXOB6Fb_bvVkDBQ5JBbs8E5X=f-K=iEmGezRA@mail.gmail.com> <511CEEAA.3030801@mitre.org> <CAJV9qO-JSXgSTkw2_pdH0D-o-xDWGDqxx=PAWYtnTj4hOQXW4Q@mail.gmail.com> <CAJV9qO9=+kiO-s7vH_ewr7XjfVdDU24F0kuif504bP53dBr1TA@mail.gmail.com> <511CF3EF.8040008@mitre.org> <CAJV9qO8yKkrsV7d9JtDmbLY-fb5phh=ssKbEUuutkY53PgY8Vg@mail.gmail.com>
In-Reply-To: <CAJV9qO8yKkrsV7d9JtDmbLY-fb5phh=ssKbEUuutkY53PgY8Vg@mail.gmail.com>
Content-Type: multipart/alternative; boundary="------------090306090907080103010008"
X-Originating-IP: [129.83.31.58]
Cc: "oauth@ietf.org" <oauth@ietf.org>
Subject: Re: [OAUTH-WG] Fwd: New Version Notification for draft-richer-oauth-introspection-02.txt
X-BeenThere: oauth@ietf.org
X-Mailman-Version: 2.1.12
Precedence: list
List-Id: OAUTH WG <oauth.ietf.org>
List-Unsubscribe: <https://www.ietf.org/mailman/options/oauth>, <mailto:oauth-request@ietf.org?subject=unsubscribe>
List-Archive: <http://www.ietf.org/mail-archive/web/oauth>
List-Post: <mailto:oauth@ietf.org>
List-Help: <mailto:oauth-request@ietf.org?subject=help>
List-Subscribe: <https://www.ietf.org/mailman/listinfo/oauth>, <mailto:oauth-request@ietf.org?subject=subscribe>
X-List-Received-Date: Thu, 14 Feb 2013 14:29:49 -0000

--------------090306090907080103010008
Content-Type: text/plain; charset="ISO-8859-1"; format=flowed
Content-Transfer-Encoding: 7bit

Because it will be the one that issued the token in the first place.

Validity means "token was issued from here, it hasn't been revoked, it 
hasn't expired".

  -- Justin

On 02/14/2013 09:28 AM, Prabath Siriwardena wrote:
> Okay. With out knowing the type of the token how can the AS validate 
> the token ? What is meant by the validity there?
>
> Thanks & regards,
> -Prabath
>
> On Thu, Feb 14, 2013 at 7:55 PM, Justin Richer <jricher@mitre.org 
> <mailto:jricher@mitre.org>> wrote:
>
>     OK, I don't see the utility in that at all. What would it accomplish?
>
>      -- Justin
>
>
>     On 02/14/2013 09:25 AM, Prabath Siriwardena wrote:
>>     To make it clear - my suggestion is to add token_type_hint to the
>>     introspection request. It can be from client to AS or from RS to AS.
>>
>>     Then AS can decide whether the provided token is valid or not and
>>     include "valid" attribute in the introspection response.
>>
>>     Thanks & regards,
>>     -Prabath
>>
>>     On Thu, Feb 14, 2013 at 7:52 PM, Prabath Siriwardena
>>     <prabath@wso2.com <mailto:prabath@wso2.com>> wrote:
>>
>>         Both the client and the resource owner should be aware of the
>>         token type.
>>
>>         My argument is, if the authorization server to decide whether
>>         the token is valid or not ( irrespective of who asked the
>>         question) - AS needs to know the token type - because to
>>         validate a token AS should know the token type.
>>
>>         The token type could be, bearer or MAC or any other token type.
>>
>>         Thanks & regards,
>>         -Prabath
>>
>>
>>         On Thu, Feb 14, 2013 at 7:33 PM, Justin Richer
>>         <jricher@mitre.org <mailto:jricher@mitre.org>> wrote:
>>
>>             What exactly are you suggesting be added to
>>             introspection? The "token_type_hint" is from the client
>>             to the server, but what you've asked for in terms of
>>             "token type" is from the server to the client. And there
>>             was never an answer to what exactly is meant by "token
>>             type" in this case, particularly because you seem to want
>>             to call out things like SAML and Bearer as separate types.
>>
>>              -- Justin
>>
>>
>>
>>             On 02/14/2013 06:59 AM, Prabath Siriwardena wrote:
>>>             I noticed that the latest Token Revocation draft [1] has
>>>             introduced the parameter "token_type_hint". I would
>>>             suggest the same here, as that would make what is meant
>>>             by "valid" much clear..
>>>
>>>             [1]:
>>>             http://tools.ietf.org/html/draft-ietf-oauth-revocation-05
>>>
>>>             Thanks & regards,
>>>             -Prabath
>>>
>>>             On Tue, Feb 12, 2013 at 9:35 PM, Prabath Siriwardena
>>>             <prabath@wso2.com <mailto:prabath@wso2.com>> wrote:
>>>
>>>                 Hi Justin,
>>>
>>>                 I doubt whether valid_token would make a difference..?
>>>
>>>                 My initial argument is what is the validation
>>>                 criteria..? Validation criteria depends on the
>>>                 token_type..
>>>
>>>                 If we are talking only about metadata - then I
>>>                 believe "revoked", "expired" would be more meaningful..
>>>
>>>                 Thanks & regards,
>>>                 -Prabath
>>>
>>>
>>>                 On Tue, Feb 12, 2013 at 7:53 PM, Justin Richer
>>>                 <jricher@mitre.org <mailto:jricher@mitre.org>> wrote:
>>>
>>>                     OK, I can see the wisdom in changing this term.
>>>
>>>                     I picked "valid" because I wanted a simple
>>>                     "boolean" value that would require no additional
>>>                     parsing or string-matching on the client's
>>>                     behalf, and I'd like to stick with that. OAuth
>>>                     is built with the assumption that clients need
>>>                     to be able to recover from invalid tokens at any
>>>                     stage, so I think a simple yes/no is the right
>>>                     step here.
>>>
>>>                     That said, I think you're both right that
>>>                     "valid" seems to have caused a bit of confusion.
>>>                     I don't want to go with "revoked" because I'd
>>>                     rather have the "token is OK" be the positive
>>>                     boolean value.
>>>
>>>                     Would "valid_token" be more clear? Or do we need
>>>                     a different adjective all together?
>>>
>>>                      -- Justin
>>>
>>>
>>>                     On 02/11/2013 08:02 PM, Richard Harrington wrote:
>>>>                     Have you considered "status" instead of
>>>>                     "valid"?  It could have values like "active",
>>>>                     "expired", and "revoked".
>>>>
>>>>                     Is it worthwhile including the status of the
>>>>                     client also?  For example, a client application
>>>>                     could be disabled, temporarily or permanently,
>>>>                     and thus disabling its access tokens as well.
>>>>
>>>>
>>>>                     On Feb 11, 2013, at 1:56 PM, Prabath
>>>>                     Siriwardena <prabath@wso2.com
>>>>                     <mailto:prabath@wso2.com>> wrote:
>>>>
>>>>>                     I guess confusion is with 'valid' parameter is
>>>>>                     in the response..
>>>>>
>>>>>                     I thought this will be helpful
>>>>>                     to standardize the communication between
>>>>>                     Resource Server and the Authorization Server..
>>>>>
>>>>>                     I would suggest we completely remove "valid"
>>>>>                     from the response - or define it much clearly..
>>>>>
>>>>>                     May be can add "revoked" with a boolean
>>>>>                     attribute..
>>>>>
>>>>>                     Thanks & regards,
>>>>>                     -Prabath
>>>>>
>>>>>                     On Tue, Feb 12, 2013 at 3:19 AM, Justin Richer
>>>>>                     <jricher@mitre.org <mailto:jricher@mitre.org>>
>>>>>                     wrote:
>>>>>
>>>>>
>>>>>                         On 02/08/2013 12:51 AM, Prabath
>>>>>                         Siriwardena wrote:
>>>>>>                         Hi Justin,
>>>>>>
>>>>>>                         I have couple of questions related to
>>>>>>                         "valid" parameter...
>>>>>>
>>>>>>                         This endpoint can be invoked by the
>>>>>>                         Resource Server in runtime...
>>>>>
>>>>>                         That's correct.
>>>>>
>>>>>
>>>>>>
>>>>>>                         In that case what is exactly meant by the
>>>>>>                         "resource_id" in request ?
>>>>>
>>>>>                         The resource_id field is a
>>>>>                         service-specific string that basically
>>>>>                         lets the resource server provide some
>>>>>                         context to the request to the auth server.
>>>>>                         There have been some other suggestions
>>>>>                         like client IP address, but I wanted to
>>>>>                         put this one in because it seemed to be a
>>>>>                         common theme. The client is trying to do
>>>>>                         *something* with the token, after all, and
>>>>>                         the rights, permissions, and metadata
>>>>>                         associated with the token could change
>>>>>                         based on that. Since the Introspection
>>>>>                         endpoint is all about getting that
>>>>>                         metadata back to the PR, this seemed like
>>>>>                         a good idea.
>>>>>
>>>>>
>>>>>>
>>>>>>                         IMO a token to be valid depends on set of
>>>>>>                         criteria based on it's type..
>>>>>>
>>>>>>                         For a Bearer token..
>>>>>>
>>>>>>                         1. Token should not be expired
>>>>>>                         2. Token should not be revoked.
>>>>>>                         3. The scope the token issued should
>>>>>>                         match with the scope required for the
>>>>>>                         resource.
>>>>>>
>>>>>>                         For a MAC token...
>>>>>>
>>>>>>                         1. Token not expired (mac id)
>>>>>>                         2. Token should not be revoked
>>>>>>                         3. The scope the token issued should
>>>>>>                         match with the scope required for the
>>>>>>                         resource.
>>>>>>                         4. HMAC check should be valid
>>>>>>
>>>>>>                         There are similar conditions for SAML
>>>>>>                         bearer too..
>>>>>
>>>>>                         This isn't really true. The SAML bearer
>>>>>                         token is fully self-contained and doesn't
>>>>>                         change based on other parameters in the
>>>>>                         message, unlike MAC. Same with JWT. When
>>>>>                         it hands a SAML or JWT token to the AS,
>>>>>                         the PR has given *everything* the server
>>>>>                         needs to check that token's validity and use.
>>>>>
>>>>>                         MAC signatures change with every message,
>>>>>                         and they're done across several components
>>>>>                         of the HTTP message. Therefor, the HMAC
>>>>>                         check for MAC style tokens will still need
>>>>>                         to be done by the protected resource.
>>>>>                         Introspection would help in the case that
>>>>>                         the signature validated just fine, but the
>>>>>                         token might have expired. Or you need to
>>>>>                         know what scopes apply. Introspection
>>>>>                         isn't to fully validate the call to the
>>>>>                         protected resource -- if that were the
>>>>>                         case, the PR would have to send some kind
>>>>>                         of encapsulated version of the original
>>>>>                         request. Otherwise, the AS won't have all
>>>>>                         of the information it needs to check the MAC.
>>>>>
>>>>>
>>>>>                         I think what you're describing is
>>>>>                         ultimately *not* what the introspection
>>>>>                         endpoint is intended to do. If that's
>>>>>                         unclear from the document, can you please
>>>>>                         suggest text that would help clear the use
>>>>>                         case up? I wouldn't want it to be ambiguous.
>>>>>
>>>>>                          -- Justin
>>>>>
>>>>>
>>>>>>
>>>>>>                         Thanks & regards,
>>>>>>                         -Prabath
>>>>>>
>>>>>>
>>>>>>                         On Thu, Feb 7, 2013 at 10:30 PM, Justin
>>>>>>                         Richer <jricher@mitre.org
>>>>>>                         <mailto:jricher@mitre.org>> wrote:
>>>>>>
>>>>>>                             It validates the token, which would
>>>>>>                             be either the token itself in the
>>>>>>                             case of Bearer or the token "id" part
>>>>>>                             of something more complex like MAC.
>>>>>>                             It doesn't directly validate the
>>>>>>                             usage of the token, that's still up
>>>>>>                             to the PR to do that.
>>>>>>
>>>>>>                             I nearly added a "token type" field
>>>>>>                             in this draft, but held back because
>>>>>>                             there are several kinds of "token
>>>>>>                             type" that people talk about in
>>>>>>                             OAuth. First, there's "Bearer" vs.
>>>>>>                             "MAC" vs. "HOK", or what have you.
>>>>>>                             Then within Bearer you have "JWT" or
>>>>>>                             "SAML" or "unstructured blob". Then
>>>>>>                             you've also got "access" vs.
>>>>>>                             "refresh" and other flavors of token,
>>>>>>                             like the id_token in OpenID Connect.
>>>>>>
>>>>>>                             Thing is, the server running the
>>>>>>                             introspection endpoint will probably
>>>>>>                             know *all* of these. But should it
>>>>>>                             tell the client? If so, which of the
>>>>>>                             three, and what names should the
>>>>>>                             fields be?
>>>>>>
>>>>>>                              -- Justin
>>>>>>
>>>>>>
>>>>>>                             On 02/07/2013 11:26 AM, Prabath
>>>>>>                             Siriwardena wrote:
>>>>>>>                             Okay.. I was thinking this could be
>>>>>>>                             used as a way to validate the token
>>>>>>>                             as well. BTW even in this case
>>>>>>>                             shouldn't communicate the type of
>>>>>>>                             token to AS? For example in the case
>>>>>>>                             of SAML profile - it could be SAML
>>>>>>>                             token..
>>>>>>>
>>>>>>>                             Thanks & regards,
>>>>>>>                             -Prabath
>>>>>>>
>>>>>>>                             On Thu, Feb 7, 2013 at 8:39 PM,
>>>>>>>                             Justin Richer <jricher@mitre.org
>>>>>>>                             <mailto:jricher@mitre.org>> wrote:
>>>>>>>
>>>>>>>                                 "valid" might not be the best
>>>>>>>                                 term, but it's meant to be a
>>>>>>>                                 field where the server says "yes
>>>>>>>                                 this token is still good" or "no
>>>>>>>                                 this token isn't good anymore".
>>>>>>>                                 We could instead do this with
>>>>>>>                                 HTTP codes or something but I
>>>>>>>                                 went with a pure JSON response.
>>>>>>>
>>>>>>>                                  -- Justin
>>>>>>>
>>>>>>>
>>>>>>>                                 On 02/06/2013 10:47 PM, Prabath
>>>>>>>                                 Siriwardena wrote:
>>>>>>>>                                 Hi Justin,
>>>>>>>>
>>>>>>>>                                 I believe this is addressing
>>>>>>>>                                 one of the key missing part in
>>>>>>>>                                 OAuth 2.0...
>>>>>>>>
>>>>>>>>                                 One question - I guess this was
>>>>>>>>                                 discussed already...
>>>>>>>>
>>>>>>>>                                 In the spec - in the
>>>>>>>>                                 introspection response it has
>>>>>>>>                                 the attribute "valid" - this is
>>>>>>>>                                 basically the validity of the
>>>>>>>>                                 token provided in the request.
>>>>>>>>
>>>>>>>>                                 Validation criteria depends on
>>>>>>>>                                 the token and well as token
>>>>>>>>                                 type ( Bearer, MAC..).
>>>>>>>>
>>>>>>>>                                 In the spec it seems like it's
>>>>>>>>                                 coupled with Bearer token
>>>>>>>>                                 type... But I guess, by adding
>>>>>>>>                                 "token_type" to the request we
>>>>>>>>                                 can remove this dependency.
>>>>>>>>
>>>>>>>>                                 WDYT..?
>>>>>>>>
>>>>>>>>                                 Thanks & regards,
>>>>>>>>                                 -Prabath
>>>>>>>>
>>>>>>>>                                 On Thu, Feb 7, 2013 at 12:54
>>>>>>>>                                 AM, Justin Richer
>>>>>>>>                                 <jricher@mitre.org
>>>>>>>>                                 <mailto:jricher@mitre.org>> wrote:
>>>>>>>>
>>>>>>>>                                     Updated introspection draft
>>>>>>>>                                     based on recent comments.
>>>>>>>>                                     Changes include:
>>>>>>>>
>>>>>>>>                                      - "scope" return parameter
>>>>>>>>                                     now follows RFC6749 format
>>>>>>>>                                     instead of JSON array
>>>>>>>>                                      - "subject" -> "sub", and
>>>>>>>>                                     "audience" -> "aud", to be
>>>>>>>>                                     parallel with JWT claims
>>>>>>>>                                      - clarified what happens
>>>>>>>>                                     if the authentication is bad
>>>>>>>>
>>>>>>>>                                      -- Justin
>>>>>>>>
>>>>>>>>
>>>>>>>>                                     -------- Original Message
>>>>>>>>                                     --------
>>>>>>>>                                     Subject: 	New Version
>>>>>>>>                                     Notification for
>>>>>>>>                                     draft-richer-oauth-introspection-02.txt
>>>>>>>>
>>>>>>>>                                     Date: 	Wed, 6 Feb 2013
>>>>>>>>                                     11:24:20 -0800
>>>>>>>>                                     From:
>>>>>>>>                                     <internet-drafts@ietf.org>
>>>>>>>>                                     <mailto:internet-drafts@ietf.org>
>>>>>>>>
>>>>>>>>                                     To: 	<jricher@mitre.org>
>>>>>>>>                                     <mailto:jricher@mitre.org>
>>>>>>>>
>>>>>>>>
>>>>>>>>
>>>>>>>>                                     A new version of I-D, draft-richer-oauth-introspection-02.txt
>>>>>>>>                                     has been successfully submitted by Justin Richer and posted to the
>>>>>>>>                                     IETF repository.
>>>>>>>>
>>>>>>>>                                     Filename:	 draft-richer-oauth-introspection
>>>>>>>>                                     Revision:	 02
>>>>>>>>                                     Title:		 OAuth Token Introspection
>>>>>>>>                                     Creation date:	 2013-02-06
>>>>>>>>                                     WG ID:		 Individual Submission
>>>>>>>>                                     Number of pages: 6
>>>>>>>>                                     URL:http://www.ietf.org/internet-drafts/draft-richer-oauth-introspection-02.txt
>>>>>>>>                                     Status:http://datatracker.ietf.org/doc/draft-richer-oauth-introspection
>>>>>>>>                                     Htmlized:http://tools.ietf.org/html/draft-richer-oauth-introspection-02
>>>>>>>>                                     Diff:http://www.ietf.org/rfcdiff?url2=draft-richer-oauth-introspection-02
>>>>>>>>
>>>>>>>>                                     Abstract:
>>>>>>>>                                         This specification defines a method for a client or protected
>>>>>>>>                                         resource to query an OAuth authorization server to determine meta-
>>>>>>>>                                         information about an OAuth token.
>>>>>>>>
>>>>>>>>
>>>>>>>>                                                                                                                        
>>>>>>>>
>>>>>>>>
>>>>>>>>                                     The IETF Secretariat
>>>>>>>>
>>>>>>>>
>>>>>>>>
>>>>>>>>
>>>>>>>>                                     _______________________________________________
>>>>>>>>                                     OAuth mailing list
>>>>>>>>                                     OAuth@ietf.org
>>>>>>>>                                     <mailto:OAuth@ietf.org>
>>>>>>>>                                     https://www.ietf.org/mailman/listinfo/oauth
>>>>>>>>
>>>>>>>>
>>>>>>>>
>>>>>>>>
>>>>>>>>                                 -- 
>>>>>>>>                                 Thanks & Regards,
>>>>>>>>                                 Prabath
>>>>>>>>
>>>>>>>>                                 Mobile : +94 71 809 6732
>>>>>>>>                                 <tel:%2B94%2071%20809%206732>
>>>>>>>>
>>>>>>>>                                 http://blog.facilelogin.com
>>>>>>>>                                 http://RampartFAQ.com
>>>>>>>
>>>>>>>
>>>>>>>
>>>>>>>
>>>>>>>                             -- 
>>>>>>>                             Thanks & Regards,
>>>>>>>                             Prabath
>>>>>>>
>>>>>>>                             Mobile : +94 71 809 6732
>>>>>>>                             <tel:%2B94%2071%20809%206732>
>>>>>>>
>>>>>>>                             http://blog.facilelogin.com
>>>>>>>                             http://RampartFAQ.com
>>>>>>
>>>>>>
>>>>>>
>>>>>>
>>>>>>                         -- 
>>>>>>                         Thanks & Regards,
>>>>>>                         Prabath
>>>>>>
>>>>>>                         Mobile : +94 71 809 6732
>>>>>>                         <tel:%2B94%2071%20809%206732>
>>>>>>
>>>>>>                         http://blog.facilelogin.com
>>>>>>                         http://RampartFAQ.com
>>>>>
>>>>>
>>>>>
>>>>>
>>>>>                     -- 
>>>>>                     Thanks & Regards,
>>>>>                     Prabath
>>>>>
>>>>>                     Mobile : +94 71 809 6732
>>>>>                     <tel:%2B94%2071%20809%206732>
>>>>>
>>>>>                     http://blog.facilelogin.com
>>>>>                     http://RampartFAQ.com
>>>>>                     _______________________________________________
>>>>>                     OAuth mailing list
>>>>>                     OAuth@ietf.org <mailto:OAuth@ietf.org>
>>>>>                     https://www.ietf.org/mailman/listinfo/oauth
>>>
>>>
>>>
>>>
>>>                 -- 
>>>                 Thanks & Regards,
>>>                 Prabath
>>>
>>>                 Mobile : +94 71 809 6732 <tel:%2B94%2071%20809%206732>
>>>
>>>                 http://blog.facilelogin.com
>>>                 http://RampartFAQ.com
>>>
>>>
>>>
>>>
>>>             -- 
>>>             Thanks & Regards,
>>>             Prabath
>>>
>>>             Mobile : +94 71 809 6732 <tel:%2B94%2071%20809%206732>
>>>
>>>             http://blog.facilelogin.com
>>>             http://RampartFAQ.com
>>
>>
>>
>>
>>         -- 
>>         Thanks & Regards,
>>         Prabath
>>
>>         Mobile : +94 71 809 6732 <tel:%2B94%2071%20809%206732>
>>
>>         http://blog.facilelogin.com
>>         http://RampartFAQ.com
>>
>>
>>
>>
>>     -- 
>>     Thanks & Regards,
>>     Prabath
>>
>>     Mobile : +94 71 809 6732 <tel:%2B94%2071%20809%206732>
>>
>>     http://blog.facilelogin.com
>>     http://RampartFAQ.com
>
>
>
>
> -- 
> Thanks & Regards,
> Prabath
>
> Mobile : +94 71 809 6732
>
> http://blog.facilelogin.com
> http://RampartFAQ.com


--------------090306090907080103010008
Content-Type: text/html; charset="ISO-8859-1"
Content-Transfer-Encoding: 7bit

<html>
  <head>
    <meta content="text/html; charset=ISO-8859-1"
      http-equiv="Content-Type">
  </head>
  <body bgcolor="#FFFFFF" text="#000000">
    Because it will be the one that issued the token in the first place.
    <br>
    <br>
    Validity means "token was issued from here, it hasn't been revoked,
    it hasn't expired". <br>
    <br>
    &nbsp;-- Justin<br>
    <br>
    <div class="moz-cite-prefix">On 02/14/2013 09:28 AM, Prabath
      Siriwardena wrote:<br>
    </div>
    <blockquote
cite="mid:CAJV9qO8yKkrsV7d9JtDmbLY-fb5phh=ssKbEUuutkY53PgY8Vg@mail.gmail.com"
      type="cite">
      <meta http-equiv="Content-Type" content="text/html;
        charset=ISO-8859-1">
      Okay. With out knowing the type of the token how can the AS
      validate the token ? What is meant by the validity there?
      <div><br>
      </div>
      <div>Thanks &amp; regards,</div>
      <div>-Prabath<br>
        <br>
        <div class="gmail_quote">On Thu, Feb 14, 2013 at 7:55 PM, Justin
          Richer <span dir="ltr">&lt;<a moz-do-not-send="true"
              href="mailto:jricher@mitre.org" target="_blank">jricher@mitre.org</a>&gt;</span>
          wrote:<br>
          <blockquote class="gmail_quote" style="margin:0 0 0
            .8ex;border-left:1px #ccc solid;padding-left:1ex">
            <div bgcolor="#FFFFFF" text="#000000"> OK, I don't see the
              utility in that at all. What would it accomplish?<span
                class="HOEnZb"><font color="#888888"><br>
                  <br>
                  &nbsp;-- Justin</font></span>
              <div>
                <div class="h5"><br>
                  <br>
                  <div>On 02/14/2013 09:25 AM, Prabath Siriwardena
                    wrote:<br>
                  </div>
                  <blockquote type="cite"> To make it clear - my
                    suggestion is to add token_type_hint to the
                    introspection request. It can be from client to AS
                    or from RS to AS.
                    <div><br>
                    </div>
                    <div>Then AS can decide whether the provided token
                      is valid or not and include "valid" attribute in
                      the introspection response.</div>
                    <div><br>
                    </div>
                    <div>Thanks &amp; regards,</div>
                    <div>-Prabath<br>
                      <br>
                      <div class="gmail_quote">On Thu, Feb 14, 2013 at
                        7:52 PM, Prabath Siriwardena <span dir="ltr">&lt;<a
                            moz-do-not-send="true"
                            href="mailto:prabath@wso2.com"
                            target="_blank">prabath@wso2.com</a>&gt;</span>
                        wrote:<br>
                        <blockquote class="gmail_quote" style="margin:0
                          0 0 .8ex;border-left:1px #ccc
                          solid;padding-left:1ex">Both the client and
                          the resource owner should be aware of the
                          token type.
                          <div><br>
                          </div>
                          <div>My argument is, if the authorization
                            server to decide whether the token is valid
                            or not ( irrespective of who asked the
                            question) - AS needs to know the token type
                            - because to validate a token AS should know
                            the token type.</div>
                          <div><br>
                          </div>
                          <div>The token type could be, bearer or MAC or
                            any other token type.</div>
                          <div><br>
                          </div>
                          <div>Thanks &amp; regards,</div>
                          <div>-Prabath
                            <div>
                              <div><br>
                                <br>
                                <div class="gmail_quote">On Thu, Feb 14,
                                  2013 at 7:33 PM, Justin Richer <span
                                    dir="ltr">&lt;<a
                                      moz-do-not-send="true"
                                      href="mailto:jricher@mitre.org"
                                      target="_blank">jricher@mitre.org</a>&gt;</span>
                                  wrote:<br>
                                  <blockquote class="gmail_quote"
                                    style="margin:0 0 0
                                    .8ex;border-left:1px #ccc
                                    solid;padding-left:1ex">
                                    <div bgcolor="#FFFFFF"
                                      text="#000000"> What exactly are
                                      you suggesting be added to
                                      introspection? The
                                      "token_type_hint" is from the
                                      client to the server, but what
                                      you've asked for in terms of
                                      "token type" is from the server to
                                      the client. And there was never an
                                      answer to what exactly is meant by
                                      "token type" in this case,
                                      particularly because you seem to
                                      want to call out things like SAML
                                      and Bearer as separate types. <br>
                                      <span><font color="#888888"> <br>
                                          &nbsp;-- Justin</font></span>
                                      <div>
                                        <div><br>
                                          <br>
                                          <br>
                                          <div>On 02/14/2013 06:59 AM,
                                            Prabath Siriwardena wrote:<br>
                                          </div>
                                          <blockquote type="cite"> I
                                            noticed that the latest
                                            Token Revocation draft [1]
                                            has introduced the parameter
                                            "token_type_hint". I would
                                            suggest the same here, as
                                            that would make what is
                                            meant by "valid" much
                                            clear..
                                            <div><br>
                                            </div>
                                            <div>[1]:&nbsp;<a
                                                moz-do-not-send="true"
                                                href="http://tools.ietf.org/html/draft-ietf-oauth-revocation-05"
style="color:rgb(17,85,204);font-size:12.727272033691406px;font-family:arial,sans-serif"
                                                target="_blank">http://tools.ietf.org/html/draft-ietf-oauth-revocation-05</a></div>
                                            <div><br>
                                            </div>
                                            <div>Thanks &amp; regards,</div>
                                            <div>-Prabath<br>
                                              <br>
                                              <div class="gmail_quote">On
                                                Tue, Feb 12, 2013 at
                                                9:35 PM, Prabath
                                                Siriwardena <span
                                                  dir="ltr">&lt;<a
                                                    moz-do-not-send="true"
href="mailto:prabath@wso2.com" target="_blank">prabath@wso2.com</a>&gt;</span>
                                                wrote:<br>
                                                <blockquote
                                                  class="gmail_quote"
                                                  style="margin:0 0 0
                                                  .8ex;border-left:1px
                                                  #ccc
                                                  solid;padding-left:1ex">Hi
                                                  Justin,
                                                  <div><br>
                                                  </div>
                                                  <div>I doubt whether
                                                    valid_token would
                                                    make a difference..?</div>
                                                  <div><br>
                                                  </div>
                                                  <div>My initial
                                                    argument is what is
                                                    the validation
                                                    criteria..?
                                                    Validation criteria
                                                    depends on the
                                                    token_type..</div>
                                                  <div> <br>
                                                  </div>
                                                  <div>If we are talking
                                                    only about metadata
                                                    - then I believe
                                                    "revoked", "expired"
                                                    would be more
                                                    meaningful..</div>
                                                  <div><br>
                                                  </div>
                                                  <div>Thanks &amp;
                                                    regards,</div>
                                                  <div>-Prabath
                                                    <div>
                                                      <div> <br>
                                                        <br>
                                                        <div
                                                          class="gmail_quote">
                                                          On Tue, Feb
                                                          12, 2013 at
                                                          7:53 PM,
                                                          Justin Richer
                                                          <span
                                                          dir="ltr">&lt;<a
moz-do-not-send="true" href="mailto:jricher@mitre.org" target="_blank">jricher@mitre.org</a>&gt;</span>
                                                          wrote:<br>
                                                          <blockquote
                                                          class="gmail_quote"
                                                          style="margin:0
                                                          0 0
                                                          .8ex;border-left:1px
                                                          #ccc
                                                          solid;padding-left:1ex">
                                                          <div
                                                          bgcolor="#FFFFFF"
                                                          text="#000000">
                                                          OK, I can see
                                                          the wisdom in
                                                          changing this
                                                          term. <br>
                                                          <br>
                                                          I picked
                                                          "valid"
                                                          because I
                                                          wanted a
                                                          simple
                                                          "boolean"
                                                          value that
                                                          would require
                                                          no additional
                                                          parsing or
                                                          string-matching
                                                          on the
                                                          client's
                                                          behalf, and
                                                          I'd like to
                                                          stick with
                                                          that. OAuth is
                                                          built with the
                                                          assumption
                                                          that clients
                                                          need to be
                                                          able to
                                                          recover from
                                                          invalid tokens
                                                          at any stage,
                                                          so I think a
                                                          simple yes/no
                                                          is the right
                                                          step here. <br>
                                                          <br>
                                                          That said, I
                                                          think you're
                                                          both right
                                                          that "valid"
                                                          seems to have
                                                          caused a bit
                                                          of confusion.
                                                          I don't want
                                                          to go with
                                                          "revoked"
                                                          because I'd
                                                          rather have
                                                          the "token is
                                                          OK" be the
                                                          positive
                                                          boolean value.
                                                          <br>
                                                          <br>
                                                          Would
                                                          "valid_token"
                                                          be more clear?
                                                          Or do we need
                                                          a different
                                                          adjective all
                                                          together?<span><font
color="#888888"><br>
                                                          <br>
                                                          &nbsp;-- Justin</font></span>
                                                          <div>
                                                          <div><br>
                                                          <br>
                                                          <div>On
                                                          02/11/2013
                                                          08:02 PM,
                                                          Richard
                                                          Harrington
                                                          wrote:<br>
                                                          </div>
                                                          <blockquote
                                                          type="cite">
                                                          <div>Have you
                                                          considered
                                                          "status"
                                                          instead of
                                                          "valid"? &nbsp;It
                                                          could have
                                                          values like
                                                          "active",
                                                          "expired", and
                                                          "revoked".</div>
                                                          <div><br>
                                                          </div>
                                                          <div>Is it
                                                          worthwhile
                                                          including the
                                                          status of the
                                                          client also?
                                                          &nbsp;For example,
                                                          a client
                                                          application
                                                          could be
                                                          disabled,
                                                          temporarily or
                                                          permanently,
                                                          and thus
                                                          disabling its
                                                          access tokens
                                                          as well.</div>
                                                          <div><br>
                                                          </div>
                                                          <div><br>
                                                          On Feb 11,
                                                          2013, at 1:56
                                                          PM, Prabath
                                                          Siriwardena
                                                          &lt;<a
                                                          moz-do-not-send="true"
href="mailto:prabath@wso2.com" target="_blank">prabath@wso2.com</a>&gt;
                                                          wrote:<br>
                                                          <br>
                                                          </div>
                                                          <blockquote
                                                          type="cite">
                                                          <div>I guess
                                                          confusion is
                                                          with 'valid'
                                                          parameter is
                                                          in the
                                                          response..
                                                          <div><br>
                                                          </div>
                                                          <div>I thought
                                                          this will be
                                                          helpful
                                                          to&nbsp;standardize&nbsp;the
                                                          communication
                                                          between
                                                          Resource
                                                          Server and the
                                                          Authorization
                                                          Server..</div>
                                                          <div><br>
                                                          </div>
                                                          <div>I would
                                                          suggest we
                                                          completely
                                                          remove "valid"
                                                          from the
                                                          response - or
                                                          define it much
                                                          clearly..</div>
                                                          <div><br>
                                                          </div>
                                                          <div>May be
                                                          can add
                                                          "revoked" with
                                                          a boolean
                                                          attribute..</div>
                                                          <div><br>
                                                          </div>
                                                          <div>Thanks
                                                          &amp; regards,</div>
                                                          <div>-Prabath<br>
                                                          <br>
                                                          <div
                                                          class="gmail_quote">On

                                                          Tue, Feb 12,
                                                          2013 at 3:19
                                                          AM, Justin
                                                          Richer <span
                                                          dir="ltr">&lt;<a
moz-do-not-send="true" href="mailto:jricher@mitre.org" target="_blank">jricher@mitre.org</a>&gt;</span>
                                                          wrote:<br>
                                                          <blockquote
                                                          class="gmail_quote"
                                                          style="margin:0
                                                          0 0
                                                          .8ex;border-left:1px
                                                          #ccc
                                                          solid;padding-left:1ex">
                                                          <div
                                                          bgcolor="#FFFFFF"
                                                          text="#000000">
                                                          <div> <br>
                                                          <div>On
                                                          02/08/2013
                                                          12:51 AM,
                                                          Prabath
                                                          Siriwardena
                                                          wrote:<br>
                                                          </div>
                                                          </div>
                                                          <blockquote
                                                          type="cite">
                                                          Hi&nbsp;Justin,
                                                          <div><br>
                                                          </div>
                                                          <div>
                                                          <div>I have
                                                          couple of
                                                          questions
                                                          related to
                                                          "valid"
                                                          parameter...</div>
                                                          <div><br>
                                                          </div>
                                                          <div>This
                                                          endpoint can
                                                          be invoked by
                                                          the Resource
                                                          Server in
                                                          runtime...</div>
                                                          </div>
                                                          </blockquote>
                                                          <br>
                                                          That's
                                                          correct.
                                                          <div><br>
                                                          <br>
                                                          <blockquote
                                                          type="cite">
                                                          <div><br>
                                                          </div>
                                                          <div>In that
                                                          case what is
                                                          exactly meant
                                                          by the
                                                          "resource_id"
                                                          in request ?</div>
                                                          </blockquote>
                                                          <br>
                                                          </div>
                                                          The
                                                          resource_id
                                                          field is a
                                                          service-specific
                                                          string that
                                                          basically lets
                                                          the resource
                                                          server provide
                                                          some context
                                                          to the request
                                                          to the auth
                                                          server. There
                                                          have been some
                                                          other
                                                          suggestions
                                                          like client IP
                                                          address, but I
                                                          wanted to put
                                                          this one in
                                                          because it
                                                          seemed to be a
                                                          common theme.
                                                          The client is
                                                          trying to do
                                                          *something*
                                                          with the
                                                          token, after
                                                          all, and the
                                                          rights,
                                                          permissions,
                                                          and metadata
                                                          associated
                                                          with the token
                                                          could change
                                                          based on that.
                                                          Since the
                                                          Introspection
                                                          endpoint is
                                                          all about
                                                          getting that
                                                          metadata back
                                                          to the PR,
                                                          this seemed
                                                          like a good
                                                          idea.
                                                          <div><br>
                                                          <br>
                                                          <blockquote
                                                          type="cite">
                                                          <div><br>
                                                          </div>
                                                          <div>IMO a
                                                          token to be
                                                          valid depends
                                                          on set of
                                                          criteria based
                                                          on it's type..</div>
                                                          <div><br>
                                                          </div>
                                                          <div>For a
                                                          Bearer token..</div>
                                                          <div><br>
                                                          </div>
                                                          <div>1. Token
                                                          should not be
                                                          expired</div>
                                                          <div>2. Token
                                                          should not be
                                                          revoked.</div>
                                                          <div>3. The
                                                          scope the
                                                          token issued
                                                          should match
                                                          with the scope
                                                          required for
                                                          the resource.</div>
                                                          <div><br>
                                                          </div>
                                                          <div>For a MAC
                                                          token...</div>
                                                          <div><br>
                                                          </div>
                                                          <div>1. Token
                                                          not expired
                                                          (mac id)</div>
                                                          <div>2. Token
                                                          should not be
                                                          revoked</div>
                                                          <div>3. The
                                                          scope the
                                                          token issued
                                                          should match
                                                          with the scope
                                                          required for
                                                          the resource.</div>
                                                          <div>4. HMAC
                                                          check should
                                                          be valid</div>
                                                          <div><br>
                                                          </div>
                                                          There are
                                                          similar
                                                          conditions for
                                                          SAML bearer
                                                          too..</blockquote>
                                                          <br>
                                                          </div>
                                                          This isn't
                                                          really true.
                                                          The SAML
                                                          bearer token
                                                          is fully
                                                          self-contained
                                                          and doesn't
                                                          change based
                                                          on other
                                                          parameters in
                                                          the message,
                                                          unlike MAC.
                                                          Same with JWT.
                                                          When it hands
                                                          a SAML or JWT
                                                          token to the
                                                          AS, the PR has
                                                          given
                                                          *everything*
                                                          the server
                                                          needs to check
                                                          that token's
                                                          validity and
                                                          use. <br>
                                                          <br>
                                                          MAC signatures
                                                          change with
                                                          every message,
                                                          and they're
                                                          done across
                                                          several
                                                          components of
                                                          the HTTP
                                                          message.
                                                          Therefor, the
                                                          HMAC check for
                                                          MAC style
                                                          tokens will
                                                          still need to
                                                          be done by the
                                                          protected
                                                          resource.
                                                          Introspection
                                                          would help in
                                                          the case that
                                                          the signature
                                                          validated just
                                                          fine, but the
                                                          token might
                                                          have expired.
                                                          Or you need to
                                                          know what
                                                          scopes apply.
                                                          Introspection
                                                          isn't to fully
                                                          validate the
                                                          call to the
                                                          protected
                                                          resource -- if
                                                          that were the
                                                          case, the PR
                                                          would have to
                                                          send some kind
                                                          of
                                                          encapsulated
                                                          version of the
                                                          original
                                                          request.
                                                          Otherwise, the
                                                          AS won't have
                                                          all of the
                                                          information it
                                                          needs to check
                                                          the MAC.<br>
                                                          <br>
                                                          <br>
                                                          I think what
                                                          you're
                                                          describing is
                                                          ultimately
                                                          *not* what the
                                                          introspection
                                                          endpoint is
                                                          intended to
                                                          do. If that's
                                                          unclear from
                                                          the document,
                                                          can you please
                                                          suggest text
                                                          that would
                                                          help clear the
                                                          use case up? I
                                                          wouldn't want
                                                          it to be
                                                          ambiguous.<span><font
color="#888888"><br>
                                                          <br>
                                                          &nbsp;-- Justin</font></span>
                                                          <div>
                                                          <div><br>
                                                          <br>
                                                          <blockquote
                                                          type="cite">
                                                          <div><br>
                                                          </div>
                                                          <div>Thanks
                                                          &amp; regards,</div>
                                                          <div>-Prabath</div>
                                                          <div><br>
                                                          </div>
                                                          <div><br>
                                                          <div
                                                          class="gmail_quote">On


                                                          Thu, Feb 7,
                                                          2013 at 10:30
                                                          PM, Justin
                                                          Richer <span
                                                          dir="ltr">&lt;<a
moz-do-not-send="true" href="mailto:jricher@mitre.org" target="_blank">jricher@mitre.org</a>&gt;</span>
                                                          wrote:<br>
                                                          <blockquote
                                                          class="gmail_quote"
                                                          style="margin:0
                                                          0 0
                                                          .8ex;border-left:1px
                                                          #ccc
                                                          solid;padding-left:1ex">
                                                          <div
                                                          bgcolor="#FFFFFF"
                                                          text="#000000">
                                                          It validates
                                                          the token,
                                                          which would be
                                                          either the
                                                          token itself
                                                          in the case of
                                                          Bearer or the
                                                          token "id"
                                                          part of
                                                          something more
                                                          complex like
                                                          MAC. It
                                                          doesn't
                                                          directly
                                                          validate the
                                                          usage of the
                                                          token, that's
                                                          still up to
                                                          the PR to do
                                                          that.<br>
                                                          <br>
                                                          I nearly added
                                                          a "token type"
                                                          field in this
                                                          draft, but
                                                          held back
                                                          because there
                                                          are several
                                                          kinds of
                                                          "token type"
                                                          that people
                                                          talk about in
                                                          OAuth. First,
                                                          there's
                                                          "Bearer" vs.
                                                          "MAC" vs.
                                                          "HOK", or what
                                                          have you. Then
                                                          within Bearer
                                                          you have "JWT"
                                                          or "SAML" or
                                                          "unstructured
                                                          blob". Then
                                                          you've also
                                                          got "access"
                                                          vs. "refresh"
                                                          and other
                                                          flavors of
                                                          token, like
                                                          the id_token
                                                          in OpenID
                                                          Connect. <br>
                                                          <br>
                                                          Thing is, the
                                                          server running
                                                          the
                                                          introspection
                                                          endpoint will
                                                          probably know
                                                          *all* of
                                                          these. But
                                                          should it tell
                                                          the client? If
                                                          so, which of
                                                          the three, and
                                                          what names
                                                          should the
                                                          fields be?<span><font
color="#888888"><br>
                                                          <br>
                                                          &nbsp;-- Justin</font></span>
                                                          <div>
                                                          <div><br>
                                                          <br>
                                                          <div>On
                                                          02/07/2013
                                                          11:26 AM,
                                                          Prabath
                                                          Siriwardena
                                                          wrote:<br>
                                                          </div>
                                                          <blockquote
                                                          type="cite">
                                                          Okay.. I was
                                                          thinking this
                                                          could be used
                                                          as a way to
                                                          validate the
                                                          token as well.
                                                          BTW even in
                                                          this case
                                                          shouldn't
                                                          communicate
                                                          the type of
                                                          token to AS?
                                                          For example in
                                                          the case of
                                                          SAML profile -
                                                          it could be
                                                          SAML token..
                                                          <div> <br>
                                                          </div>
                                                          <div>Thanks
                                                          &amp; regards,</div>
                                                          <div>-Prabath<br>
                                                          <br>
                                                          <div
                                                          class="gmail_quote">On


                                                          Thu, Feb 7,
                                                          2013 at 8:39
                                                          PM, Justin
                                                          Richer <span
                                                          dir="ltr">&lt;<a
moz-do-not-send="true" href="mailto:jricher@mitre.org" target="_blank">jricher@mitre.org</a>&gt;</span>
                                                          wrote:<br>
                                                          <blockquote
                                                          class="gmail_quote"
                                                          style="margin:0
                                                          0 0
                                                          .8ex;border-left:1px
                                                          #ccc
                                                          solid;padding-left:1ex">
                                                          <div
                                                          bgcolor="#FFFFFF"
                                                          text="#000000">
                                                          "valid" might
                                                          not be the
                                                          best term, but
                                                          it's meant to
                                                          be a field
                                                          where the
                                                          server says
                                                          "yes this
                                                          token is still
                                                          good" or "no
                                                          this token
                                                          isn't good
                                                          anymore". We
                                                          could instead
                                                          do this with
                                                          HTTP codes or
                                                          something but
                                                          I went with a
                                                          pure JSON
                                                          response.<span><font
color="#888888"><br>
                                                          <br>
                                                          &nbsp;-- Justin</font></span>
                                                          <div>
                                                          <div><br>
                                                          <br>
                                                          <div>On
                                                          02/06/2013
                                                          10:47 PM,
                                                          Prabath
                                                          Siriwardena
                                                          wrote:<br>
                                                          </div>
                                                          <blockquote
                                                          type="cite">
                                                          Hi Justin,
                                                          <div><br>
                                                          </div>
                                                          <div>I believe
                                                          this is
                                                          addressing one
                                                          of the key
                                                          missing part
                                                          in OAuth
                                                          2.0...</div>
                                                          <div><br>
                                                          </div>
                                                          <div>One
                                                          question - I
                                                          guess this was
                                                          discussed
                                                          already...</div>
                                                          <div><br>
                                                          </div>
                                                          <div>In the
                                                          spec - in the
                                                          introspection
                                                          response it
                                                          has the
                                                          attribute
                                                          "valid" - this
                                                          is basically
                                                          the validity
                                                          of the token
                                                          provided in
                                                          the request.</div>
                                                          <div><br>
                                                          </div>
                                                          <div>Validation&nbsp;criteria



                                                          depends on the
                                                          token and well
                                                          as token type
                                                          ( Bearer,
                                                          MAC..).</div>
                                                          <div><br>
                                                          </div>
                                                          <div>In the
                                                          spec it seems
                                                          like it's
                                                          coupled with
                                                          Bearer token
                                                          type... But I
                                                          guess, by
                                                          adding
                                                          "token_type"
                                                          to the request
                                                          we can remove
                                                          this
                                                          dependency.</div>
                                                          <div><br>
                                                          </div>
                                                          <div>WDYT..?</div>
                                                          <div><br>
                                                          </div>
                                                          <div>Thanks
                                                          &amp; regards,</div>
                                                          <div>-Prabath&nbsp;</div>
                                                          <div><br>
                                                          <div
                                                          class="gmail_quote">On



                                                          Thu, Feb 7,
                                                          2013 at 12:54
                                                          AM, Justin
                                                          Richer <span
                                                          dir="ltr">&lt;<a
moz-do-not-send="true" href="mailto:jricher@mitre.org" target="_blank">jricher@mitre.org</a>&gt;</span>
                                                          wrote:<br>
                                                          <blockquote
                                                          class="gmail_quote"
                                                          style="margin:0
                                                          0 0
                                                          .8ex;border-left:1px
                                                          #ccc
                                                          solid;padding-left:1ex">
                                                          <div
                                                          bgcolor="#FFFFFF"
                                                          text="#000000">
                                                          Updated
                                                          introspection
                                                          draft based on
                                                          recent
                                                          comments.
                                                          Changes
                                                          include:<br>
                                                          <br>
                                                          &nbsp;- "scope"
                                                          return
                                                          parameter now
                                                          follows
                                                          RFC6749 format
                                                          instead of
                                                          JSON array<br>
                                                          &nbsp;- "subject"
                                                          -&gt; "sub",
                                                          and "audience"
                                                          -&gt; "aud",
                                                          to be parallel
                                                          with JWT
                                                          claims<br>
                                                          &nbsp;- clarified
                                                          what happens
                                                          if the
                                                          authentication
                                                          is bad<br>
                                                          <br>
                                                          &nbsp;-- Justin<br>
                                                          <div><br>
                                                          <br>
                                                          --------
                                                          Original
                                                          Message
                                                          --------
                                                          <table
                                                          border="0"
                                                          cellpadding="0"
cellspacing="0">
                                                          <tbody>
                                                          <tr>
                                                          <th
                                                          align="RIGHT"
nowrap="nowrap" valign="BASELINE">Subject: </th>
                                                          <td>New
                                                          Version
                                                          Notification
                                                          for
                                                          draft-richer-oauth-introspection-02.txt</td>
                                                          </tr>
                                                          <tr>
                                                          <th
                                                          align="RIGHT"
nowrap="nowrap" valign="BASELINE">Date: </th>
                                                          <td>Wed, 6 Feb
                                                          2013 11:24:20
                                                          -0800</td>
                                                          </tr>
                                                          <tr>
                                                          <th
                                                          align="RIGHT"
nowrap="nowrap" valign="BASELINE">From: </th>
                                                          <td><a
                                                          moz-do-not-send="true"
href="mailto:internet-drafts@ietf.org" target="_blank">&lt;internet-drafts@ietf.org&gt;</a></td>
                                                          </tr>
                                                          <tr>
                                                          <th
                                                          align="RIGHT"
nowrap="nowrap" valign="BASELINE">To: </th>
                                                          <td><a
                                                          moz-do-not-send="true"
href="mailto:jricher@mitre.org" target="_blank">&lt;jricher@mitre.org&gt;</a></td>
                                                          </tr>
                                                          </tbody>
                                                          </table>
                                                          <br>
                                                          <br>
                                                          <pre>A new version of I-D, draft-richer-oauth-introspection-02.txt
has been successfully submitted by Justin Richer and posted to the
IETF repository.

Filename:	 draft-richer-oauth-introspection
Revision:	 02
Title:		 OAuth Token Introspection
Creation date:	 2013-02-06
WG ID:		 Individual Submission
Number of pages: 6
URL:             <a moz-do-not-send="true" href="http://www.ietf.org/internet-drafts/draft-richer-oauth-introspection-02.txt" target="_blank">http://www.ietf.org/internet-drafts/draft-richer-oauth-introspection-02.txt</a>
Status:          <a moz-do-not-send="true" href="http://datatracker.ietf.org/doc/draft-richer-oauth-introspection" target="_blank">http://datatracker.ietf.org/doc/draft-richer-oauth-introspection</a>
Htmlized:        <a moz-do-not-send="true" href="http://tools.ietf.org/html/draft-richer-oauth-introspection-02" target="_blank">http://tools.ietf.org/html/draft-richer-oauth-introspection-02</a>
Diff:            <a moz-do-not-send="true" href="http://www.ietf.org/rfcdiff?url2=draft-richer-oauth-introspection-02" target="_blank">http://www.ietf.org/rfcdiff?url2=draft-richer-oauth-introspection-02</a>

Abstract:
   This specification defines a method for a client or protected
   resource to query an OAuth authorization server to determine meta-
   information about an OAuth token.


                                                                                  


The IETF Secretariat

</pre>
                                                          <br>
                                                          </div>
                                                          <br>
                                                          </div>
                                                          <br>
_______________________________________________<br>
                                                          OAuth mailing
                                                          list<br>
                                                          <a
                                                          moz-do-not-send="true"
href="mailto:OAuth@ietf.org" target="_blank">OAuth@ietf.org</a><br>
                                                          <a
                                                          moz-do-not-send="true"
href="https://www.ietf.org/mailman/listinfo/oauth" target="_blank">https://www.ietf.org/mailman/listinfo/oauth</a><br>
                                                          <br>
                                                          </blockquote>
                                                          </div>
                                                          <br>
                                                          <br
                                                          clear="all">
                                                          <div><br>
                                                          </div>
                                                          -- <br>
                                                          Thanks &amp;
                                                          Regards,<br>
                                                          Prabath
                                                          <div><br>
                                                          </div>
                                                          <div>Mobile :
                                                          <a
                                                          moz-do-not-send="true"
href="tel:%2B94%2071%20809%206732" value="+94718096732" target="_blank">+94


                                                          71 809 6732</a>&nbsp;<br>
                                                          <br>
                                                          <a
                                                          moz-do-not-send="true"
href="http://blog.facilelogin.com" target="_blank">http://blog.facilelogin.com</a><br>
                                                          <a
                                                          moz-do-not-send="true"
href="http://RampartFAQ.com" target="_blank">http://RampartFAQ.com</a></div>
                                                          </div>
                                                          </blockquote>
                                                          <br>
                                                          </div>
                                                          </div>
                                                          </div>
                                                          </blockquote>
                                                          </div>
                                                          <br>
                                                          <br
                                                          clear="all">
                                                          <div><br>
                                                          </div>
                                                          -- <br>
                                                          Thanks &amp;
                                                          Regards,<br>
                                                          Prabath
                                                          <div><br>
                                                          </div>
                                                          <div>Mobile :
                                                          <a
                                                          moz-do-not-send="true"
href="tel:%2B94%2071%20809%206732" value="+94718096732" target="_blank">+94


                                                          71 809 6732</a>&nbsp;<br>
                                                          <br>
                                                          <a
                                                          moz-do-not-send="true"
href="http://blog.facilelogin.com" target="_blank">http://blog.facilelogin.com</a><br>
                                                          <a
                                                          moz-do-not-send="true"
href="http://RampartFAQ.com" target="_blank">http://RampartFAQ.com</a></div>
                                                          </div>
                                                          </blockquote>
                                                          <br>
                                                          </div>
                                                          </div>
                                                          </div>
                                                          </blockquote>
                                                          </div>
                                                          <br>
                                                          <br
                                                          clear="all">
                                                          <div><br>
                                                          </div>
                                                          -- <br>
                                                          Thanks &amp;
                                                          Regards,<br>
                                                          Prabath
                                                          <div><br>
                                                          </div>
                                                          <div>Mobile :
                                                          <a
                                                          moz-do-not-send="true"
href="tel:%2B94%2071%20809%206732" value="+94718096732" target="_blank">+94



                                                          71 809 6732</a>&nbsp;<br>
                                                          <br>
                                                          <a
                                                          moz-do-not-send="true"
href="http://blog.facilelogin.com" target="_blank">http://blog.facilelogin.com</a><br>
                                                          <a
                                                          moz-do-not-send="true"
href="http://RampartFAQ.com" target="_blank">http://RampartFAQ.com</a></div>
                                                          </div>
                                                          </blockquote>
                                                          <br>
                                                          </div>
                                                          </div>
                                                          </div>
                                                          </blockquote>
                                                          </div>
                                                          <br>
                                                          <br
                                                          clear="all">
                                                          <div><br>
                                                          </div>
                                                          -- <br>
                                                          Thanks &amp;
                                                          Regards,<br>
                                                          Prabath
                                                          <div><br>
                                                          </div>
                                                          <div>Mobile :
                                                          <a
                                                          moz-do-not-send="true"
href="tel:%2B94%2071%20809%206732" value="+94718096732" target="_blank">+94

                                                          71 809 6732</a>&nbsp;<br>
                                                          <br>
                                                          <a
                                                          moz-do-not-send="true"
href="http://blog.facilelogin.com" target="_blank">http://blog.facilelogin.com</a><br>
                                                          <a
                                                          moz-do-not-send="true"
href="http://RampartFAQ.com" target="_blank">http://RampartFAQ.com</a></div>
                                                          </div>
                                                          </div>
                                                          </blockquote>
                                                          <blockquote
                                                          type="cite">
                                                          <div><span>_______________________________________________</span><br>
                                                          <span>OAuth
                                                          mailing list</span><br>
                                                          <span><a
                                                          moz-do-not-send="true"
href="mailto:OAuth@ietf.org" target="_blank">OAuth@ietf.org</a></span><br>
                                                          <span><a
                                                          moz-do-not-send="true"
href="https://www.ietf.org/mailman/listinfo/oauth" target="_blank">https://www.ietf.org/mailman/listinfo/oauth</a></span><br>
                                                          </div>
                                                          </blockquote>
                                                          </blockquote>
                                                          <br>
                                                          </div>
                                                          </div>
                                                          </div>
                                                          </blockquote>
                                                        </div>
                                                        <br>
                                                        <br clear="all">
                                                        <div><br>
                                                        </div>
                                                        -- <br>
                                                        Thanks &amp;
                                                        Regards,<br>
                                                        Prabath
                                                        <div><br>
                                                        </div>
                                                        <div>Mobile : <a
moz-do-not-send="true" href="tel:%2B94%2071%20809%206732"
                                                          value="+94718096732"
target="_blank">+94 71 809 6732</a>&nbsp;<br>
                                                          <br>
                                                          <a
                                                          moz-do-not-send="true"
href="http://blog.facilelogin.com" target="_blank">http://blog.facilelogin.com</a><br>
                                                          <a
                                                          moz-do-not-send="true"
href="http://RampartFAQ.com" target="_blank">http://RampartFAQ.com</a></div>
                                                      </div>
                                                    </div>
                                                  </div>
                                                </blockquote>
                                              </div>
                                              <br>
                                              <br clear="all">
                                              <div><br>
                                              </div>
                                              -- <br>
                                              Thanks &amp; Regards,<br>
                                              Prabath
                                              <div><br>
                                              </div>
                                              <div>Mobile : <a
                                                  moz-do-not-send="true"
href="tel:%2B94%2071%20809%206732" value="+94718096732" target="_blank">+94

                                                  71 809 6732</a>&nbsp;<br>
                                                <br>
                                                <a
                                                  moz-do-not-send="true"
href="http://blog.facilelogin.com" target="_blank">http://blog.facilelogin.com</a><br>
                                                <a
                                                  moz-do-not-send="true"
href="http://RampartFAQ.com" target="_blank">http://RampartFAQ.com</a></div>
                                            </div>
                                          </blockquote>
                                          <br>
                                        </div>
                                      </div>
                                    </div>
                                  </blockquote>
                                </div>
                                <br>
                                <br clear="all">
                                <div><br>
                                </div>
                                -- <br>
                                Thanks &amp; Regards,<br>
                                Prabath
                                <div><br>
                                </div>
                                <div>Mobile : <a moz-do-not-send="true"
                                    href="tel:%2B94%2071%20809%206732"
                                    value="+94718096732" target="_blank">+94
                                    71 809 6732</a>&nbsp;<br>
                                  <br>
                                  <a moz-do-not-send="true"
                                    href="http://blog.facilelogin.com"
                                    target="_blank">http://blog.facilelogin.com</a><br>
                                  <a moz-do-not-send="true"
                                    href="http://RampartFAQ.com"
                                    target="_blank">http://RampartFAQ.com</a></div>
                              </div>
                            </div>
                          </div>
                        </blockquote>
                      </div>
                      <br>
                      <br clear="all">
                      <div><br>
                      </div>
                      -- <br>
                      Thanks &amp; Regards,<br>
                      Prabath
                      <div><br>
                      </div>
                      <div>Mobile : <a moz-do-not-send="true"
                          href="tel:%2B94%2071%20809%206732"
                          value="+94718096732" target="_blank">+94 71
                          809 6732</a>&nbsp;<br>
                        <br>
                        <a moz-do-not-send="true"
                          href="http://blog.facilelogin.com"
                          target="_blank">http://blog.facilelogin.com</a><br>
                        <a moz-do-not-send="true"
                          href="http://RampartFAQ.com" target="_blank">http://RampartFAQ.com</a></div>
                    </div>
                  </blockquote>
                  <br>
                </div>
              </div>
            </div>
          </blockquote>
        </div>
        <br>
        <br clear="all">
        <div><br>
        </div>
        -- <br>
        Thanks &amp; Regards,<br>
        Prabath
        <div><br>
        </div>
        <div>Mobile : +94 71 809 6732&nbsp;<br>
          <br>
          <a moz-do-not-send="true" href="http://blog.facilelogin.com"
            target="_blank">http://blog.facilelogin.com</a><br>
          <a moz-do-not-send="true" href="http://RampartFAQ.com"
            target="_blank">http://RampartFAQ.com</a></div>
      </div>
    </blockquote>
    <br>
  </body>
</html>

--------------090306090907080103010008--

From ve7jtb@ve7jtb.com  Thu Feb 14 06:35:32 2013
Return-Path: <ve7jtb@ve7jtb.com>
X-Original-To: oauth@ietfa.amsl.com
Delivered-To: oauth@ietfa.amsl.com
Received: from localhost (localhost [127.0.0.1]) by ietfa.amsl.com (Postfix) with ESMTP id 5B61A21F8806 for <oauth@ietfa.amsl.com>; Thu, 14 Feb 2013 06:35:32 -0800 (PST)
X-Virus-Scanned: amavisd-new at amsl.com
X-Spam-Flag: NO
X-Spam-Score: -3.388
X-Spam-Level: 
X-Spam-Status: No, score=-3.388 tagged_above=-999 required=5 tests=[AWL=0.211,  BAYES_00=-2.599, RCVD_IN_DNSWL_LOW=-1]
Received: from mail.ietf.org ([64.170.98.30]) by localhost (ietfa.amsl.com [127.0.0.1]) (amavisd-new, port 10024) with ESMTP id s-ymjLj7UUN7 for <oauth@ietfa.amsl.com>; Thu, 14 Feb 2013 06:35:31 -0800 (PST)
Received: from mail-qa0-f51.google.com (mail-qa0-f51.google.com [209.85.216.51]) by ietfa.amsl.com (Postfix) with ESMTP id 4032721F871F for <oauth@ietf.org>; Thu, 14 Feb 2013 06:35:31 -0800 (PST)
Received: by mail-qa0-f51.google.com with SMTP id cr7so1070927qab.10 for <oauth@ietf.org>; Thu, 14 Feb 2013 06:35:30 -0800 (PST)
X-Google-DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=google.com; s=20120113; h=x-received:content-type:mime-version:subject:from:in-reply-to:date :cc:content-transfer-encoding:message-id:references:to:x-mailer :x-gm-message-state; bh=/vuqJQIbDMQYS9H7Pf26NQpkWSqKkoE7ALL9OEj94mE=; b=ScbexGbljiyjAlxZi+GPZttwHC2JDMBrtckCoDFwdJlbS02BycRvAqOC/GFJAV5CTB VqyEO0CsqyIXyvAuatxesNoHxDuXcw2gVOtAAgtYrqnr3CUdr1J6aFXSgZdeEYVrcuzw t2iPTOWGaJy7FuLJ4EeVzz7XqzXuxS/feLhphCsnUAYpi9LyqHX6z1GLqhf6NXTLpwM8 cTz1daSKRARiR47brYtLL0ytkbz3VNgCyZh8m72MdMGYrjuIPVxWZsTbj/JiHBT6OwIu K8jCiID5xAcCo2OEFE3t6O2O+UlJL20MXUwJrP2eG2xvsfsN/iDLHh5xZYdFm4SRRgv1 g+nw==
X-Received: by 10.224.33.140 with SMTP id h12mr682388qad.73.1360852530651; Thu, 14 Feb 2013 06:35:30 -0800 (PST)
Received: from [192.168.1.213] (190-20-16-126.baf.movistar.cl. [190.20.16.126]) by mx.google.com with ESMTPS id o5sm18495545qao.12.2013.02.14.06.35.26 (version=TLSv1 cipher=ECDHE-RSA-RC4-SHA bits=128/128); Thu, 14 Feb 2013 06:35:29 -0800 (PST)
Content-Type: text/plain; charset=iso-2022-jp
Mime-Version: 1.0 (Mac OS X Mail 6.2 \(1499\))
From: John Bradley <ve7jtb@ve7jtb.com>
In-Reply-To: <511CF2C9.9040604@mitre.org>
Date: Thu, 14 Feb 2013 11:35:16 -0300
Content-Transfer-Encoding: quoted-printable
Message-Id: <F93467E8-6196-4A65-8A0E-B3897E47FBEB@ve7jtb.com>
References: <51195F36.6040705@mitre.org> <780F8C26-19A4-4301-B350-307D9FFF69CD@ve7jtb.com> <511BAA8B.8030309@mitre.org> <BEBDAFAC-28B0-4959-9FE5-34EC17FC318C@ve7jtb.com> <-4554688250617930935@unknownmsgid> <AF401161-0C7C-4E49-9F44-9982B312FF6D@ve7jtb.com> <CABzCy2BtzA-DJofpSkKJWrwfYtM8a+44VWe1Lx+f_ow=mW8kwg@mail.gmail.com> <4687F290-4855-49DE-892F-F9694BB211D4@ve7jtb.com> <511CF2C9.9040604@mitre.org>
To: Justin Richer <jricher@mitre.org>
X-Mailer: Apple Mail (2.1499)
X-Gm-Message-State: ALoCoQlOdioMRTLvfP/d4Xjf7OPRnEBEHgpR6Ces/pyYVcmQagnU7IrVomCN7CZUYBP8jOCWpqdA
Cc: "oauth@ietf.org" <oauth@ietf.org>
Subject: Re: [OAUTH-WG] Registration: RESTful client lifecycle management
X-BeenThere: oauth@ietf.org
X-Mailman-Version: 2.1.12
Precedence: list
List-Id: OAUTH WG <oauth.ietf.org>
List-Unsubscribe: <https://www.ietf.org/mailman/options/oauth>, <mailto:oauth-request@ietf.org?subject=unsubscribe>
List-Archive: <http://www.ietf.org/mail-archive/web/oauth>
List-Post: <mailto:oauth@ietf.org>
List-Help: <mailto:oauth-request@ietf.org?subject=help>
List-Subscribe: <https://www.ietf.org/mailman/listinfo/oauth>, <mailto:oauth-request@ietf.org?subject=subscribe>
X-List-Received-Date: Thu, 14 Feb 2013 14:35:32 -0000

On 2013-02-14, at 11:20 AM, Justin Richer <jricher@mitre.org> wrote:

>=20
> On 02/14/2013 09:05 AM, John Bradley wrote:
>> I agree with Tim that is the behaviour I would  expect to see with =
DELETE though I have a rd time seeing a server ever honouring it.
>>=20
>> I guess that we need to clarify what happens with PUT and claims the =
server has defaults for, perhaps some that are not changeable by the =
client.  =20
>>=20
>> Is not including a claim in a PUT the same as not including it in =
registration, and it is set to the default. =20
>> If you want to set a claim to null then you must explicitly include =
the claim with null as the value. That is the previous logic we had for =
replace as the client wasn't getting back all the config in the response =
and couldn't know about defaults it wasn't setting.
>>=20
>> Perhaps PUT causes unsent claims to be interpreted as if they are =
sent with a null value (I think that is a likely to cause tears =
personally).
>>=20
>> In ether case the client is not deleted and can still be recovered =
and the client_id and associated permissions are still active.
>=20
> What I had in mind from this conversation is something like this:
>=20
> When sending an update, a client MUST send all metadata fields =
returned
> from the server in its initial registration or previous read or update
> call, including its client_id. A server MAY replace any missing or
> invalid fields with default values, or it MAY return an error as
> described in the Error Response section. A server MUST return all
> provisioned fields in its response. A server MUST NOT change the
> client_id field. A server MAY change the client_secret and/or
> refresh_access_token fields.

Yes that covers it.
>=20
>>=20
>> DELETE to be used correctly is I think going to delete the client_id =
and all associated tokens and cause a ripple effect in removing grants =
associated with that client_id. =20
>=20
> This is how I would interpret it as well. It's de-provisioning the
> client, not resetting it.

That is what I would expect I don't know if it is a good idea, and adds =
to the size of the spec.   Having a not supported response is better =
but, I don't have a good feeling about it yet.


>=20
> -- Justin
>=20
>>=20
>> It is a big difference and understanding what a AS is supposed to do =
to delete a client still seems a touch vague to me.   I understand the =
http verb but there is more to it than that if we want interoperability.
>>=20
>> John
>>=20
>> On 2013-02-14, at 12:31 AM, Nat Sakimura <sakimura@gmail.com> wrote:
>>=20
>>> I thought your concern about DELETE was whether the client should be
>>> allowed to erase the registration data.
>>> I thought PUT with an empty values would achieve a similar effect.
>>> Or did you mean that with PUT, the server default kicks in and
>>> parameters are set to the defaults?
>>> If that is the case, they are quite different, I agree.
>>>=20
>>> On the effect of DELETE, +1 to Tim's comment.
>>>=20
>>> Nat
>>>=20
>>> 2013/2/14 John Bradley <ve7jtb@ve7jtb.com>:
>>>> DELETE is removing the record not resetting it to defaults.  They =
are quite diffrent.
>>>>=20
>>>> I want to agree on what the expected behaviour of DELETE is.   I =
think we have agreement on PUT and POST.
>>>>=20
>>>> The general not in that a client can DELETE it's record is a =
implication I don't like.  I think that is for the server to decide and =
if it is not actually deleting it then DELETE is the wrong verb to use.
>>>>=20
>>>> John B.
>>>>=20
>>>> On 2013-02-13, at 3:31 PM, Nat Sakimura <sakimura@gmail.com> wrote:
>>>>=20
>>>>> Generally speaking, mapping PUT to replace and POST to change is =
an
>>>>> acceptable practice so I am fine with it.
>>>>>=20
>>>>> Now, what I still do not understand is why you think it is fine to =
do
>>>>> PUT or POST and not DELETE. Doing PUT with empty content is almost =
the
>>>>> same as DELETE. Could you explain?
>>>>>=20
>>>>> =3Dnat via iPhone
>>>>>=20
>>>>> Feb 14, 2013 0:10=1B$B!"=1B(BJohn Bradley <ve7jtb@ve7jtb.com> =
=1B$B$N%a%C%;!<%8=1B(B:
>>>>>=20
>>>>>> I am not violently opposed to PUT as a option that completely =
replaces the resource setting all unsent claims back to the defaults.
>>>>>>=20
>>>>>> I don't have a good feeling about DELETE,  I think we still need =
more discussion on what it means, what privileges it takes to invoke it =
etc.
>>>>>> It could be a bad thing if we get wrong or is not implemented =
consistently.
>>>>>>=20
>>>>>> Personally I don't think a client should ever be able to DELETE =
it's record.
>>>>>>=20
>>>>>> I think marking a client_id as pending provisioning, suspended,  =
revoked etc is better and that can be done with a claim in the update =
endpoint.
>>>>>>=20
>>>>>> It should only be the server that deletes a record after =
satisfying it's audit requirements.
>>>>>>=20
>>>>>> John B.
>>>>>>=20
>>>>>> On 2013-02-13, at 12:00 PM, Justin Richer <jricher@mitre.org> =
wrote:
>>>>>>=20
>>>>>>> Would it be reasonable to mark the PUT and DELETE methods as =
optional for the server to implement, but with defined semantics if they =
do? I want to keep GET and POST(create) as mandatory, as I think that's =
the minimal set of functionality required.
>>>>>>>=20
>>>>>>> -- Justin
>>>>>>>=20
>>>>>>> On 02/11/2013 08:51 PM, John Bradley wrote:
>>>>>>>> I would always include the client_id on update.
>>>>>>>>=20
>>>>>>>> I think it is also us full to have other tokens used at the =
update endpoint.  I can see the master token used to update all the =
clients it has registered as part of API management.
>>>>>>>> Relying on the registration_access_token is probably a design =
that will cause trouble down the road.
>>>>>>>>=20
>>>>>>>> I think GET and POST are relatively clear.   I don't know about =
expelling PUT to developers.  I think POST with a client_id to a =
(separate discussion) update_uri works without restricting it to PUT.
>>>>>>>>=20
>>>>>>>> I think DELETE needs to be better understood.   I think a =
status that can be set for client lifecycle is better than letting a =
client delete a entry.
>>>>>>>> In some cases there will be more than one instance of a client =
and letting them know they have been turned off for a reason is better =
than making there registration disappear.
>>>>>>>> So for the moment I would levee out DELETE.
>>>>>>>>=20
>>>>>>>> John B.
>>>>>>>>=20
>>>>>>>> On 2013-02-11, at 6:14 PM, Justin Richer <jricher@mitre.org> =
wrote:
>>>>>>>>=20
>>>>>>>>> Draft -05 of OAuth Dynamic Client Registration [1] defines =
several operations that the client can take on its behalf as part of the =
registration process. These boil down to the basic CRUD operations that =
you find in many APIs: Create, Read, Update, Delete. Draft -00 defined =
only the "Create" operation, draft -01 through -04 added the "Update" =
operation, switched using the "operation=3D" parameter.
>>>>>>>>>=20
>>>>>>>>> Following several suggestions to do so on the list, the -05 =
draft defines these operations in terms of a RESTful API for the client. =
Namely:
>>>>>>>>>=20
>>>>>>>>> - HTTP POST to registration endpoint =3D> Create (register) a =
new client
>>>>>>>>> - HTTP PUT to update endpoint (with registration_access_token) =
=3D> Update the registered information for this client
>>>>>>>>> - HTTP GET to update endpoint (with registration_access_token) =
=3D> read the registered information for this client
>>>>>>>>> - HTTP DELETE to update endpoint (with =
registration_access_token) =3D> Delete (unregister/de-provision) this =
client
>>>>>>>>>=20
>>>>>>>>> The two main issues at stake here are: the addition of the =
READ and DELETE methods, and the use of HTTP verbs following a RESTful =
design philosophy.
>>>>>>>>>=20
>>>>>>>>> Pro:
>>>>>>>>> - RESTful APIs (with HTTP verbs to differentiate =
functionality) are the norm today
>>>>>>>>> - Full lifecycle management is common and is going to be =
expected by many users of this protocol in the wild
>>>>>>>>>=20
>>>>>>>>> Cons:
>>>>>>>>> - Update semantics are still under debate (full replace? =
patch?)
>>>>>>>>> - Somewhat increased complexity on the server to support all =
operations
>>>>>>>>> - Client has to understand all HTTP verbs for full access =
(though plain registration is just POST)
>>>>>>>>>=20
>>>>>>>>>=20
>>>>>>>>> Alternatives include using an operational switch parameter =
(like the old drafts), defining separate endpoints for every action, or =
doing all operations on a single endpoint using verbs to switch.
>>>>>>>>>=20
>>>>>>>>> -- Justin
>>>>>>>>>=20
>>>>>>>>> [1] http://tools.ietf.org/html/draft-ietf-oauth-dyn-reg-05
>>>>>>>>> _______________________________________________
>>>>>>>>> OAuth mailing list
>>>>>>>>> OAuth@ietf.org
>>>>>>>>> https://www.ietf.org/mailman/listinfo/oauth
>>>>>> _______________________________________________
>>>>>> OAuth mailing list
>>>>>> OAuth@ietf.org
>>>>>> https://www.ietf.org/mailman/listinfo/oauth
>>>=20
>>>=20
>>> --=20
>>> Nat Sakimura (=3Dnat)
>>> Chairman, OpenID Foundation
>>> http://nat.sakimura.org/
>>> @_nat_en
>=20


From prabath@wso2.com  Thu Feb 14 06:37:30 2013
Return-Path: <prabath@wso2.com>
X-Original-To: oauth@ietfa.amsl.com
Delivered-To: oauth@ietfa.amsl.com
Received: from localhost (localhost [127.0.0.1]) by ietfa.amsl.com (Postfix) with ESMTP id 48C7D21F884B for <oauth@ietfa.amsl.com>; Thu, 14 Feb 2013 06:37:30 -0800 (PST)
X-Virus-Scanned: amavisd-new at amsl.com
X-Spam-Flag: NO
X-Spam-Score: -2.624
X-Spam-Level: 
X-Spam-Status: No, score=-2.624 tagged_above=-999 required=5 tests=[AWL=0.352,  BAYES_00=-2.599, FM_FORGED_GMAIL=0.622, HTML_MESSAGE=0.001, RCVD_IN_DNSWL_LOW=-1]
Received: from mail.ietf.org ([64.170.98.30]) by localhost (ietfa.amsl.com [127.0.0.1]) (amavisd-new, port 10024) with ESMTP id M0MWGFpXiLbI for <oauth@ietfa.amsl.com>; Thu, 14 Feb 2013 06:37:24 -0800 (PST)
Received: from mail-ea0-f180.google.com (mail-ea0-f180.google.com [209.85.215.180]) by ietfa.amsl.com (Postfix) with ESMTP id 47CD421F8836 for <oauth@ietf.org>; Thu, 14 Feb 2013 06:37:23 -0800 (PST)
Received: by mail-ea0-f180.google.com with SMTP id c1so934407eaa.11 for <oauth@ietf.org>; Thu, 14 Feb 2013 06:37:22 -0800 (PST)
X-Google-DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=google.com; s=20120113; h=mime-version:x-received:in-reply-to:references:date:message-id :subject:from:to:cc:content-type:x-gm-message-state; bh=xM3ZuXORS1QjpZBCf70tcYndrBB9gaLAN70RAGhXDQY=; b=GVMlxywTM5pt+x93+J1bImIfUxi8qelWabWG/1IS4ANxtxyDRbu+OYkHnc2nu4cHkE mHvZm845xLG5gmS3w6GPav/F7wS5mRJ21e90ML6zffCEevtSRHCngThGl5bS+xzdPhp4 KX1/tDzsXQHbhcalScLjk+hKc7CvC8QKxsVzhkbfdYUyfWkhiaECrjKiF2rXIcNUCRD7 idEnovnMYwyhvL9kU+zDQIT6AYGdY2w0IWPr7Xy1N7PaJ/n28w6o6YdUZHIZMPywBR2F vDMxn57N+9zAs7+niwEE89KRvprnMmpOXu6DNxXVbw6w+XrPcgfM21Y9C40W/PLL9pvy hozA==
MIME-Version: 1.0
X-Received: by 10.14.210.8 with SMTP id t8mr20493307eeo.35.1360852641981; Thu, 14 Feb 2013 06:37:21 -0800 (PST)
Received: by 10.223.37.77 with HTTP; Thu, 14 Feb 2013 06:37:21 -0800 (PST)
In-Reply-To: <511CF4AB.5010700@mitre.org>
References: <20130206192420.32698.21027.idtracker@ietfa.amsl.com> <5112AE0B.1080501@mitre.org> <CAJV9qO_8-4FowrXK=ae-+xMjiJFP04ryVMLQ8SGUH8kp3PHrLg@mail.gmail.com> <5113C3AA.1040701@mitre.org> <CAJV9qO8BVV57eAb5kUNes15AYOpUKqw5XWQswh-FJA=b1pPgSA@mail.gmail.com> <5113DDB2.7060805@mitre.org> <CAJV9qO_gM1oera9ae9sqh9n17e-ZLKuC2pmsZwhq-RmFcMyqHA@mail.gmail.com> <51196777.6000502@mitre.org> <CAJV9qO-5bWZbNUfCmaqYBQoy-qwNaSZFOsO9GL3CrbSejwVTzw@mail.gmail.com> <F6595A40-6B4E-4718-ABB5-694CA975C4DB@maymount.com> <511A5062.5010108@mitre.org> <CAJV9qO_Mr87NX=KZRqCsWasQ1FuvDNBw14eS-TcPf_KRJztQFg@mail.gmail.com> <CAJV9qO-71-sM6kXOB6Fb_bvVkDBQ5JBbs8E5X=f-K=iEmGezRA@mail.gmail.com> <511CEEAA.3030801@mitre.org> <CAJV9qO-JSXgSTkw2_pdH0D-o-xDWGDqxx=PAWYtnTj4hOQXW4Q@mail.gmail.com> <CAJV9qO9=+kiO-s7vH_ewr7XjfVdDU24F0kuif504bP53dBr1TA@mail.gmail.com> <511CF3EF.8040008@mitre.org> <CAJV9qO8yKkrsV7d9JtDmbLY-fb5phh=ssKbEUuutkY53PgY8Vg@mail.gmail.com> <511CF4AB.5010700@mitre.org>
Date: Thu, 14 Feb 2013 20:07:21 +0530
Message-ID: <CAJV9qO9VmjSQnWKU3kF11x35ut=AsvQ8bjuz_CKpyCScGRiA2Q@mail.gmail.com>
From: Prabath Siriwardena <prabath@wso2.com>
To: Justin Richer <jricher@mitre.org>
Content-Type: multipart/alternative; boundary=047d7b603fe251265604d5b032c0
X-Gm-Message-State: ALoCoQmWhXVQOxykBBNRRyejKyFmt2dl5H6Z7jdvA5RoYYke+eaAfPM5kdbaCCI0k2uoBDwzlk15
Cc: "oauth@ietf.org" <oauth@ietf.org>
Subject: Re: [OAUTH-WG] Fwd: New Version Notification for draft-richer-oauth-introspection-02.txt
X-BeenThere: oauth@ietf.org
X-Mailman-Version: 2.1.12
Precedence: list
List-Id: OAUTH WG <oauth.ietf.org>
List-Unsubscribe: <https://www.ietf.org/mailman/options/oauth>, <mailto:oauth-request@ietf.org?subject=unsubscribe>
List-Archive: <http://www.ietf.org/mail-archive/web/oauth>
List-Post: <mailto:oauth@ietf.org>
List-Help: <mailto:oauth-request@ietf.org?subject=help>
List-Subscribe: <https://www.ietf.org/mailman/listinfo/oauth>, <mailto:oauth-request@ietf.org?subject=subscribe>
X-List-Received-Date: Thu, 14 Feb 2013 14:37:30 -0000

--047d7b603fe251265604d5b032c0
Content-Type: text/plain; charset=ISO-8859-1

The definition of valid is bit ambiguous in the draft...

Okay.. If that is the definition... and if we beak that in to parts...

"it hasn't expired" : In the response it self we have parameter for
issued_at and and expires_at - so whether the token is not expired or not
can even be derived at the requestor's end.

"token was issued from here" : For this IMO we need to send an error code.
Requestor has picked the wrong AS.

The remaining is  "revoked".. That is why I proposed earlier - we better
have an attribute "revoked" - instead of "valid" in the response..

WDYT...?

Thanks & regards,
-Prabath


On Thu, Feb 14, 2013 at 7:58 PM, Justin Richer <jricher@mitre.org> wrote:

>  Because it will be the one that issued the token in the first place.
>
> Validity means "token was issued from here, it hasn't been revoked, it
> hasn't expired".
>
>  -- Justin
>
>
> On 02/14/2013 09:28 AM, Prabath Siriwardena wrote:
>
> Okay. With out knowing the type of the token how can the AS validate the
> token ? What is meant by the validity there?
>
>  Thanks & regards,
> -Prabath
>
> On Thu, Feb 14, 2013 at 7:55 PM, Justin Richer <jricher@mitre.org> wrote:
>
>>  OK, I don't see the utility in that at all. What would it accomplish?
>>
>>  -- Justin
>>
>>
>> On 02/14/2013 09:25 AM, Prabath Siriwardena wrote:
>>
>> To make it clear - my suggestion is to add token_type_hint to the
>> introspection request. It can be from client to AS or from RS to AS.
>>
>>  Then AS can decide whether the provided token is valid or not and
>> include "valid" attribute in the introspection response.
>>
>>  Thanks & regards,
>> -Prabath
>>
>> On Thu, Feb 14, 2013 at 7:52 PM, Prabath Siriwardena <prabath@wso2.com>wrote:
>>
>>> Both the client and the resource owner should be aware of the token
>>> type.
>>>
>>>  My argument is, if the authorization server to decide whether the
>>> token is valid or not ( irrespective of who asked the question) - AS needs
>>> to know the token type - because to validate a token AS should know the
>>> token type.
>>>
>>>  The token type could be, bearer or MAC or any other token type.
>>>
>>>  Thanks & regards,
>>> -Prabath
>>>
>>>
>>> On Thu, Feb 14, 2013 at 7:33 PM, Justin Richer <jricher@mitre.org>wrote:
>>>
>>>>  What exactly are you suggesting be added to introspection? The
>>>> "token_type_hint" is from the client to the server, but what you've asked
>>>> for in terms of "token type" is from the server to the client. And there
>>>> was never an answer to what exactly is meant by "token type" in this case,
>>>> particularly because you seem to want to call out things like SAML and
>>>> Bearer as separate types.
>>>>
>>>>  -- Justin
>>>>
>>>>
>>>>
>>>> On 02/14/2013 06:59 AM, Prabath Siriwardena wrote:
>>>>
>>>> I noticed that the latest Token Revocation draft [1] has introduced the
>>>> parameter "token_type_hint". I would suggest the same here, as that would
>>>> make what is meant by "valid" much clear..
>>>>
>>>>  [1]: http://tools.ietf.org/html/draft-ietf-oauth-revocation-05
>>>>
>>>>  Thanks & regards,
>>>> -Prabath
>>>>
>>>> On Tue, Feb 12, 2013 at 9:35 PM, Prabath Siriwardena <prabath@wso2.com>wrote:
>>>>
>>>>> Hi Justin,
>>>>>
>>>>>  I doubt whether valid_token would make a difference..?
>>>>>
>>>>>  My initial argument is what is the validation criteria..? Validation
>>>>> criteria depends on the token_type..
>>>>>
>>>>>  If we are talking only about metadata - then I believe "revoked",
>>>>> "expired" would be more meaningful..
>>>>>
>>>>>  Thanks & regards,
>>>>> -Prabath
>>>>>
>>>>>
>>>>>  On Tue, Feb 12, 2013 at 7:53 PM, Justin Richer <jricher@mitre.org>wrote:
>>>>>
>>>>>>  OK, I can see the wisdom in changing this term.
>>>>>>
>>>>>> I picked "valid" because I wanted a simple "boolean" value that would
>>>>>> require no additional parsing or string-matching on the client's behalf,
>>>>>> and I'd like to stick with that. OAuth is built with the assumption that
>>>>>> clients need to be able to recover from invalid tokens at any stage, so I
>>>>>> think a simple yes/no is the right step here.
>>>>>>
>>>>>> That said, I think you're both right that "valid" seems to have
>>>>>> caused a bit of confusion. I don't want to go with "revoked" because I'd
>>>>>> rather have the "token is OK" be the positive boolean value.
>>>>>>
>>>>>> Would "valid_token" be more clear? Or do we need a different
>>>>>> adjective all together?
>>>>>>
>>>>>>  -- Justin
>>>>>>
>>>>>>
>>>>>> On 02/11/2013 08:02 PM, Richard Harrington wrote:
>>>>>>
>>>>>> Have you considered "status" instead of "valid"?  It could have
>>>>>> values like "active", "expired", and "revoked".
>>>>>>
>>>>>>  Is it worthwhile including the status of the client also?  For
>>>>>> example, a client application could be disabled, temporarily or
>>>>>> permanently, and thus disabling its access tokens as well.
>>>>>>
>>>>>>
>>>>>> On Feb 11, 2013, at 1:56 PM, Prabath Siriwardena <prabath@wso2.com>
>>>>>> wrote:
>>>>>>
>>>>>>  I guess confusion is with 'valid' parameter is in the response..
>>>>>>
>>>>>>  I thought this will be helpful to standardize the communication
>>>>>> between Resource Server and the Authorization Server..
>>>>>>
>>>>>>  I would suggest we completely remove "valid" from the response - or
>>>>>> define it much clearly..
>>>>>>
>>>>>>  May be can add "revoked" with a boolean attribute..
>>>>>>
>>>>>>  Thanks & regards,
>>>>>> -Prabath
>>>>>>
>>>>>> On Tue, Feb 12, 2013 at 3:19 AM, Justin Richer <jricher@mitre.org>wrote:
>>>>>>
>>>>>>>
>>>>>>> On 02/08/2013 12:51 AM, Prabath Siriwardena wrote:
>>>>>>>
>>>>>>> Hi Justin,
>>>>>>>
>>>>>>>  I have couple of questions related to "valid" parameter...
>>>>>>>
>>>>>>>  This endpoint can be invoked by the Resource Server in runtime...
>>>>>>>
>>>>>>>
>>>>>>> That's correct.
>>>>>>>
>>>>>>>
>>>>>>>
>>>>>>>  In that case what is exactly meant by the "resource_id" in request
>>>>>>> ?
>>>>>>>
>>>>>>>
>>>>>>>  The resource_id field is a service-specific string that basically
>>>>>>> lets the resource server provide some context to the request to the auth
>>>>>>> server. There have been some other suggestions like client IP address, but
>>>>>>> I wanted to put this one in because it seemed to be a common theme. The
>>>>>>> client is trying to do *something* with the token, after all, and the
>>>>>>> rights, permissions, and metadata associated with the token could change
>>>>>>> based on that. Since the Introspection endpoint is all about getting that
>>>>>>> metadata back to the PR, this seemed like a good idea.
>>>>>>>
>>>>>>>
>>>>>>>
>>>>>>>  IMO a token to be valid depends on set of criteria based on it's
>>>>>>> type..
>>>>>>>
>>>>>>>  For a Bearer token..
>>>>>>>
>>>>>>>  1. Token should not be expired
>>>>>>> 2. Token should not be revoked.
>>>>>>> 3. The scope the token issued should match with the scope required
>>>>>>> for the resource.
>>>>>>>
>>>>>>>  For a MAC token...
>>>>>>>
>>>>>>>  1. Token not expired (mac id)
>>>>>>> 2. Token should not be revoked
>>>>>>> 3. The scope the token issued should match with the scope required
>>>>>>> for the resource.
>>>>>>> 4. HMAC check should be valid
>>>>>>>
>>>>>>>  There are similar conditions for SAML bearer too..
>>>>>>>
>>>>>>>
>>>>>>>  This isn't really true. The SAML bearer token is fully
>>>>>>> self-contained and doesn't change based on other parameters in the message,
>>>>>>> unlike MAC. Same with JWT. When it hands a SAML or JWT token to the AS, the
>>>>>>> PR has given *everything* the server needs to check that token's validity
>>>>>>> and use.
>>>>>>>
>>>>>>> MAC signatures change with every message, and they're done across
>>>>>>> several components of the HTTP message. Therefor, the HMAC check for MAC
>>>>>>> style tokens will still need to be done by the protected resource.
>>>>>>> Introspection would help in the case that the signature validated just
>>>>>>> fine, but the token might have expired. Or you need to know what scopes
>>>>>>> apply. Introspection isn't to fully validate the call to the protected
>>>>>>> resource -- if that were the case, the PR would have to send some kind of
>>>>>>> encapsulated version of the original request. Otherwise, the AS won't have
>>>>>>> all of the information it needs to check the MAC.
>>>>>>>
>>>>>>>
>>>>>>> I think what you're describing is ultimately *not* what the
>>>>>>> introspection endpoint is intended to do. If that's unclear from the
>>>>>>> document, can you please suggest text that would help clear the use case
>>>>>>> up? I wouldn't want it to be ambiguous.
>>>>>>>
>>>>>>>  -- Justin
>>>>>>>
>>>>>>>
>>>>>>>
>>>>>>>  Thanks & regards,
>>>>>>> -Prabath
>>>>>>>
>>>>>>>
>>>>>>> On Thu, Feb 7, 2013 at 10:30 PM, Justin Richer <jricher@mitre.org>wrote:
>>>>>>>
>>>>>>>>  It validates the token, which would be either the token itself in
>>>>>>>> the case of Bearer or the token "id" part of something more complex like
>>>>>>>> MAC. It doesn't directly validate the usage of the token, that's still up
>>>>>>>> to the PR to do that.
>>>>>>>>
>>>>>>>> I nearly added a "token type" field in this draft, but held back
>>>>>>>> because there are several kinds of "token type" that people talk about in
>>>>>>>> OAuth. First, there's "Bearer" vs. "MAC" vs. "HOK", or what have you. Then
>>>>>>>> within Bearer you have "JWT" or "SAML" or "unstructured blob". Then you've
>>>>>>>> also got "access" vs. "refresh" and other flavors of token, like the
>>>>>>>> id_token in OpenID Connect.
>>>>>>>>
>>>>>>>> Thing is, the server running the introspection endpoint will
>>>>>>>> probably know *all* of these. But should it tell the client? If so, which
>>>>>>>> of the three, and what names should the fields be?
>>>>>>>>
>>>>>>>>  -- Justin
>>>>>>>>
>>>>>>>>
>>>>>>>> On 02/07/2013 11:26 AM, Prabath Siriwardena wrote:
>>>>>>>>
>>>>>>>> Okay.. I was thinking this could be used as a way to validate the
>>>>>>>> token as well. BTW even in this case shouldn't communicate the type of
>>>>>>>> token to AS? For example in the case of SAML profile - it could be SAML
>>>>>>>> token..
>>>>>>>>
>>>>>>>>  Thanks & regards,
>>>>>>>> -Prabath
>>>>>>>>
>>>>>>>> On Thu, Feb 7, 2013 at 8:39 PM, Justin Richer <jricher@mitre.org>wrote:
>>>>>>>>
>>>>>>>>>  "valid" might not be the best term, but it's meant to be a field
>>>>>>>>> where the server says "yes this token is still good" or "no this token
>>>>>>>>> isn't good anymore". We could instead do this with HTTP codes or something
>>>>>>>>> but I went with a pure JSON response.
>>>>>>>>>
>>>>>>>>>  -- Justin
>>>>>>>>>
>>>>>>>>>
>>>>>>>>> On 02/06/2013 10:47 PM, Prabath Siriwardena wrote:
>>>>>>>>>
>>>>>>>>> Hi Justin,
>>>>>>>>>
>>>>>>>>>  I believe this is addressing one of the key missing part in
>>>>>>>>> OAuth 2.0...
>>>>>>>>>
>>>>>>>>>  One question - I guess this was discussed already...
>>>>>>>>>
>>>>>>>>>  In the spec - in the introspection response it has the attribute
>>>>>>>>> "valid" - this is basically the validity of the token provided in the
>>>>>>>>> request.
>>>>>>>>>
>>>>>>>>>  Validation criteria depends on the token and well as token type
>>>>>>>>> ( Bearer, MAC..).
>>>>>>>>>
>>>>>>>>>  In the spec it seems like it's coupled with Bearer token type...
>>>>>>>>> But I guess, by adding "token_type" to the request we can remove this
>>>>>>>>> dependency.
>>>>>>>>>
>>>>>>>>>  WDYT..?
>>>>>>>>>
>>>>>>>>>  Thanks & regards,
>>>>>>>>> -Prabath
>>>>>>>>>
>>>>>>>>> On Thu, Feb 7, 2013 at 12:54 AM, Justin Richer <jricher@mitre.org>wrote:
>>>>>>>>>
>>>>>>>>>>  Updated introspection draft based on recent comments. Changes
>>>>>>>>>> include:
>>>>>>>>>>
>>>>>>>>>>  - "scope" return parameter now follows RFC6749 format instead of
>>>>>>>>>> JSON array
>>>>>>>>>>  - "subject" -> "sub", and "audience" -> "aud", to be parallel
>>>>>>>>>> with JWT claims
>>>>>>>>>>  - clarified what happens if the authentication is bad
>>>>>>>>>>
>>>>>>>>>>  -- Justin
>>>>>>>>>>
>>>>>>>>>>
>>>>>>>>>> -------- Original Message --------  Subject: New Version
>>>>>>>>>> Notification for draft-richer-oauth-introspection-02.txt  Date: Wed,
>>>>>>>>>> 6 Feb 2013 11:24:20 -0800  From: <internet-drafts@ietf.org><internet-drafts@ietf.org>  To:
>>>>>>>>>> <jricher@mitre.org> <jricher@mitre.org>
>>>>>>>>>>
>>>>>>>>>> A new version of I-D, draft-richer-oauth-introspection-02.txt
>>>>>>>>>> has been successfully submitted by Justin Richer and posted to the
>>>>>>>>>> IETF repository.
>>>>>>>>>>
>>>>>>>>>> Filename:	 draft-richer-oauth-introspection
>>>>>>>>>> Revision:	 02
>>>>>>>>>> Title:		 OAuth Token Introspection
>>>>>>>>>> Creation date:	 2013-02-06
>>>>>>>>>> WG ID:		 Individual Submission
>>>>>>>>>> Number of pages: 6
>>>>>>>>>> URL:             http://www.ietf.org/internet-drafts/draft-richer-oauth-introspection-02.txt
>>>>>>>>>> Status:          http://datatracker.ietf.org/doc/draft-richer-oauth-introspection
>>>>>>>>>> Htmlized:        http://tools.ietf.org/html/draft-richer-oauth-introspection-02
>>>>>>>>>> Diff:            http://www.ietf.org/rfcdiff?url2=draft-richer-oauth-introspection-02
>>>>>>>>>>
>>>>>>>>>> Abstract:
>>>>>>>>>>    This specification defines a method for a client or protected
>>>>>>>>>>    resource to query an OAuth authorization server to determine meta-
>>>>>>>>>>    information about an OAuth token.
>>>>>>>>>>
>>>>>>>>>>
>>>>>>>>>>
>>>>>>>>>>
>>>>>>>>>>
>>>>>>>>>> The IETF Secretariat
>>>>>>>>>>
>>>>>>>>>>
>>>>>>>>>>
>>>>>>>>>>
>>>>>>>>>>
>>>>>>>>>> _______________________________________________
>>>>>>>>>> OAuth mailing list
>>>>>>>>>> OAuth@ietf.org
>>>>>>>>>> https://www.ietf.org/mailman/listinfo/oauth
>>>>>>>>>>
>>>>>>>>>>
>>>>>>>>>
>>>>>>>>>
>>>>>>>>>  --
>>>>>>>>> Thanks & Regards,
>>>>>>>>> Prabath
>>>>>>>>>
>>>>>>>>>  Mobile : +94 71 809 6732 <%2B94%2071%20809%206732>
>>>>>>>>>
>>>>>>>>> http://blog.facilelogin.com
>>>>>>>>> http://RampartFAQ.com
>>>>>>>>>
>>>>>>>>>
>>>>>>>>>
>>>>>>>>
>>>>>>>>
>>>>>>>>  --
>>>>>>>> Thanks & Regards,
>>>>>>>> Prabath
>>>>>>>>
>>>>>>>>  Mobile : +94 71 809 6732 <%2B94%2071%20809%206732>
>>>>>>>>
>>>>>>>> http://blog.facilelogin.com
>>>>>>>> http://RampartFAQ.com
>>>>>>>>
>>>>>>>>
>>>>>>>>
>>>>>>>
>>>>>>>
>>>>>>>  --
>>>>>>> Thanks & Regards,
>>>>>>> Prabath
>>>>>>>
>>>>>>>  Mobile : +94 71 809 6732 <%2B94%2071%20809%206732>
>>>>>>>
>>>>>>> http://blog.facilelogin.com
>>>>>>> http://RampartFAQ.com
>>>>>>>
>>>>>>>
>>>>>>>
>>>>>>
>>>>>>
>>>>>>  --
>>>>>> Thanks & Regards,
>>>>>> Prabath
>>>>>>
>>>>>>  Mobile : +94 71 809 6732 <%2B94%2071%20809%206732>
>>>>>>
>>>>>> http://blog.facilelogin.com
>>>>>> http://RampartFAQ.com
>>>>>>
>>>>>>  _______________________________________________
>>>>>> OAuth mailing list
>>>>>> OAuth@ietf.org
>>>>>> https://www.ietf.org/mailman/listinfo/oauth
>>>>>>
>>>>>>
>>>>>>
>>>>>
>>>>>
>>>>>  --
>>>>> Thanks & Regards,
>>>>> Prabath
>>>>>
>>>>>  Mobile : +94 71 809 6732
>>>>>
>>>>> http://blog.facilelogin.com
>>>>> http://RampartFAQ.com
>>>>>
>>>>
>>>>
>>>>
>>>>  --
>>>> Thanks & Regards,
>>>> Prabath
>>>>
>>>>  Mobile : +94 71 809 6732 <%2B94%2071%20809%206732>
>>>>
>>>> http://blog.facilelogin.com
>>>> http://RampartFAQ.com
>>>>
>>>>
>>>>
>>>
>>>
>>>  --
>>> Thanks & Regards,
>>> Prabath
>>>
>>>  Mobile : +94 71 809 6732 <%2B94%2071%20809%206732>
>>>
>>> http://blog.facilelogin.com
>>> http://RampartFAQ.com
>>>
>>
>>
>>
>>  --
>> Thanks & Regards,
>> Prabath
>>
>>  Mobile : +94 71 809 6732 <%2B94%2071%20809%206732>
>>
>> http://blog.facilelogin.com
>> http://RampartFAQ.com
>>
>>
>>
>
>
>  --
> Thanks & Regards,
> Prabath
>
>  Mobile : +94 71 809 6732
>
> http://blog.facilelogin.com
> http://RampartFAQ.com
>
>
>


-- 
Thanks & Regards,
Prabath

Mobile : +94 71 809 6732

http://blog.facilelogin.com
http://RampartFAQ.com

--047d7b603fe251265604d5b032c0
Content-Type: text/html; charset=ISO-8859-1
Content-Transfer-Encoding: quoted-printable

<div>The definition of valid is bit ambiguous=A0in the draft...</div><div><=
br></div><div>Okay.. If that is the definition... and if we beak that in to=
 parts...</div><div><br></div><div>&quot;it hasn&#39;t expired&quot; : In t=
he response it self we have parameter for issued_at and and expires_at - so=
 whether the token is not expired or not can even be derived at the request=
or&#39;s end.</div>
<div><br></div><div>&quot;token was issued from here&quot; : For this IMO w=
e need to send an error code. Requestor has picked the wrong AS.</div><div>=
<br></div><div>The remaining is =A0&quot;revoked&quot;.. That is why I prop=
osed=A0earlier=A0- we better have an attribute &quot;revoked&quot; - instea=
d of &quot;valid&quot; in the response..</div>
<div><br></div><div>WDYT...?</div><div><br></div><div>Thanks &amp; regards,=
</div><div>-Prabath</div><div><br></div><div><br><div class=3D"gmail_quote"=
>On Thu, Feb 14, 2013 at 7:58 PM, Justin Richer <span dir=3D"ltr">&lt;<a hr=
ef=3D"mailto:jricher@mitre.org" target=3D"_blank">jricher@mitre.org</a>&gt;=
</span> wrote:<br>
<blockquote class=3D"gmail_quote" style=3D"margin:0 0 0 .8ex;border-left:1p=
x #ccc solid;padding-left:1ex">
 =20
   =20
 =20
  <div bgcolor=3D"#FFFFFF" text=3D"#000000">
    Because it will be the one that issued the token in the first place.
    <br>
    <br>
    Validity means &quot;token was issued from here, it hasn&#39;t been rev=
oked,
    it hasn&#39;t expired&quot;. <br><span class=3D"HOEnZb"><font color=3D"=
#888888">
    <br>
    =A0-- Justin</font></span><div><div class=3D"h5"><br>
    <br>
    <div>On 02/14/2013 09:28 AM, Prabath
      Siriwardena wrote:<br>
    </div>
    <blockquote type=3D"cite">
     =20
      Okay. With out knowing the type of the token how can the AS
      validate the token ? What is meant by the validity there?
      <div><br>
      </div>
      <div>Thanks &amp; regards,</div>
      <div>-Prabath<br>
        <br>
        <div class=3D"gmail_quote">On Thu, Feb 14, 2013 at 7:55 PM, Justin
          Richer <span dir=3D"ltr">&lt;<a href=3D"mailto:jricher@mitre.org"=
 target=3D"_blank">jricher@mitre.org</a>&gt;</span>
          wrote:<br>
          <blockquote class=3D"gmail_quote" style=3D"margin:0 0 0 .8ex;bord=
er-left:1px #ccc solid;padding-left:1ex">
            <div bgcolor=3D"#FFFFFF" text=3D"#000000"> OK, I don&#39;t see =
the
              utility in that at all. What would it accomplish?<span><font =
color=3D"#888888"><br>
                  <br>
                  =A0-- Justin</font></span>
              <div>
                <div><br>
                  <br>
                  <div>On 02/14/2013 09:25 AM, Prabath Siriwardena
                    wrote:<br>
                  </div>
                  <blockquote type=3D"cite"> To make it clear - my
                    suggestion is to add token_type_hint to the
                    introspection request. It can be from client to AS
                    or from RS to AS.
                    <div><br>
                    </div>
                    <div>Then AS can decide whether the provided token
                      is valid or not and include &quot;valid&quot; attribu=
te in
                      the introspection response.</div>
                    <div><br>
                    </div>
                    <div>Thanks &amp; regards,</div>
                    <div>-Prabath<br>
                      <br>
                      <div class=3D"gmail_quote">On Thu, Feb 14, 2013 at
                        7:52 PM, Prabath Siriwardena <span dir=3D"ltr">&lt;=
<a href=3D"mailto:prabath@wso2.com" target=3D"_blank">prabath@wso2.com</a>&=
gt;</span>
                        wrote:<br>
                        <blockquote class=3D"gmail_quote" style=3D"margin:0=
 0 0 .8ex;border-left:1px #ccc solid;padding-left:1ex">Both the client and
                          the resource owner should be aware of the
                          token type.
                          <div><br>
                          </div>
                          <div>My argument is, if the authorization
                            server to decide whether the token is valid
                            or not ( irrespective of who asked the
                            question) - AS needs to know the token type
                            - because to validate a token AS should know
                            the token type.</div>
                          <div><br>
                          </div>
                          <div>The token type could be, bearer or MAC or
                            any other token type.</div>
                          <div><br>
                          </div>
                          <div>Thanks &amp; regards,</div>
                          <div>-Prabath
                            <div>
                              <div><br>
                                <br>
                                <div class=3D"gmail_quote">On Thu, Feb 14,
                                  2013 at 7:33 PM, Justin Richer <span dir=
=3D"ltr">&lt;<a href=3D"mailto:jricher@mitre.org" target=3D"_blank">jricher=
@mitre.org</a>&gt;</span>
                                  wrote:<br>
                                  <blockquote class=3D"gmail_quote" style=
=3D"margin:0 0 0 .8ex;border-left:1px #ccc solid;padding-left:1ex">
                                    <div bgcolor=3D"#FFFFFF" text=3D"#00000=
0"> What exactly are
                                      you suggesting be added to
                                      introspection? The
                                      &quot;token_type_hint&quot; is from t=
he
                                      client to the server, but what
                                      you&#39;ve asked for in terms of
                                      &quot;token type&quot; is from the se=
rver to
                                      the client. And there was never an
                                      answer to what exactly is meant by
                                      &quot;token type&quot; in this case,
                                      particularly because you seem to
                                      want to call out things like SAML
                                      and Bearer as separate types. <br>
                                      <span><font color=3D"#888888"> <br>
                                          =A0-- Justin</font></span>
                                      <div>
                                        <div><br>
                                          <br>
                                          <br>
                                          <div>On 02/14/2013 06:59 AM,
                                            Prabath Siriwardena wrote:<br>
                                          </div>
                                          <blockquote type=3D"cite"> I
                                            noticed that the latest
                                            Token Revocation draft [1]
                                            has introduced the parameter
                                            &quot;token_type_hint&quot;. I =
would
                                            suggest the same here, as
                                            that would make what is
                                            meant by &quot;valid&quot; much
                                            clear..
                                            <div><br>
                                            </div>
                                            <div>[1]:=A0<a href=3D"http://t=
ools.ietf.org/html/draft-ietf-oauth-revocation-05" style=3D"color:rgb(17,85=
,204);font-size:12.727272033691406px;font-family:arial,sans-serif" target=
=3D"_blank">http://tools.ietf.org/html/draft-ietf-oauth-revocation-05</a></=
div>

                                            <div><br>
                                            </div>
                                            <div>Thanks &amp; regards,</div=
>
                                            <div>-Prabath<br>
                                              <br>
                                              <div class=3D"gmail_quote">On
                                                Tue, Feb 12, 2013 at
                                                9:35 PM, Prabath
                                                Siriwardena <span dir=3D"lt=
r">&lt;<a href=3D"mailto:prabath@wso2.com" target=3D"_blank">prabath@wso2.c=
om</a>&gt;</span>
                                                wrote:<br>
                                                <blockquote class=3D"gmail_=
quote" style=3D"margin:0 0 0 .8ex;border-left:1px #ccc solid;padding-left:1=
ex">Hi
                                                  Justin,
                                                  <div><br>
                                                  </div>
                                                  <div>I doubt whether
                                                    valid_token would
                                                    make a difference..?</d=
iv>
                                                  <div><br>
                                                  </div>
                                                  <div>My initial
                                                    argument is what is
                                                    the validation
                                                    criteria..?
                                                    Validation criteria
                                                    depends on the
                                                    token_type..</div>
                                                  <div> <br>
                                                  </div>
                                                  <div>If we are talking
                                                    only about metadata
                                                    - then I believe
                                                    &quot;revoked&quot;, &q=
uot;expired&quot;
                                                    would be more
                                                    meaningful..</div>
                                                  <div><br>
                                                  </div>
                                                  <div>Thanks &amp;
                                                    regards,</div>
                                                  <div>-Prabath
                                                    <div>
                                                      <div> <br>
                                                        <br>
                                                        <div class=3D"gmail=
_quote">
                                                          On Tue, Feb
                                                          12, 2013 at
                                                          7:53 PM,
                                                          Justin Richer
                                                          <span dir=3D"ltr"=
>&lt;<a href=3D"mailto:jricher@mitre.org" target=3D"_blank">jricher@mitre.o=
rg</a>&gt;</span>
                                                          wrote:<br>
                                                          <blockquote class=
=3D"gmail_quote" style=3D"margin:0 0 0 .8ex;border-left:1px #ccc solid;padd=
ing-left:1ex">
                                                          <div bgcolor=3D"#=
FFFFFF" text=3D"#000000">
                                                          OK, I can see
                                                          the wisdom in
                                                          changing this
                                                          term. <br>
                                                          <br>
                                                          I picked
                                                          &quot;valid&quot;
                                                          because I
                                                          wanted a
                                                          simple
                                                          &quot;boolean&quo=
t;
                                                          value that
                                                          would require
                                                          no additional
                                                          parsing or
                                                          string-matching
                                                          on the
                                                          client&#39;s
                                                          behalf, and
                                                          I&#39;d like to
                                                          stick with
                                                          that. OAuth is
                                                          built with the
                                                          assumption
                                                          that clients
                                                          need to be
                                                          able to
                                                          recover from
                                                          invalid tokens
                                                          at any stage,
                                                          so I think a
                                                          simple yes/no
                                                          is the right
                                                          step here. <br>
                                                          <br>
                                                          That said, I
                                                          think you&#39;re
                                                          both right
                                                          that &quot;valid&=
quot;
                                                          seems to have
                                                          caused a bit
                                                          of confusion.
                                                          I don&#39;t want
                                                          to go with
                                                          &quot;revoked&quo=
t;
                                                          because I&#39;d
                                                          rather have
                                                          the &quot;token i=
s
                                                          OK&quot; be the
                                                          positive
                                                          boolean value.
                                                          <br>
                                                          <br>
                                                          Would
                                                          &quot;valid_token=
&quot;
                                                          be more clear?
                                                          Or do we need
                                                          a different
                                                          adjective all
                                                          together?<span><f=
ont color=3D"#888888"><br>
                                                          <br>
                                                          =A0-- Justin</fon=
t></span>
                                                          <div>
                                                          <div><br>
                                                          <br>
                                                          <div>On
                                                          02/11/2013
                                                          08:02 PM,
                                                          Richard
                                                          Harrington
                                                          wrote:<br>
                                                          </div>
                                                          <blockquote type=
=3D"cite">
                                                          <div>Have you
                                                          considered
                                                          &quot;status&quot=
;
                                                          instead of
                                                          &quot;valid&quot;=
? =A0It
                                                          could have
                                                          values like
                                                          &quot;active&quot=
;,
                                                          &quot;expired&quo=
t;, and
                                                          &quot;revoked&quo=
t;.</div>
                                                          <div><br>
                                                          </div>
                                                          <div>Is it
                                                          worthwhile
                                                          including the
                                                          status of the
                                                          client also?
                                                          =A0For example,
                                                          a client
                                                          application
                                                          could be
                                                          disabled,
                                                          temporarily or
                                                          permanently,
                                                          and thus
                                                          disabling its
                                                          access tokens
                                                          as well.</div>
                                                          <div><br>
                                                          </div>
                                                          <div><br>
                                                          On Feb 11,
                                                          2013, at 1:56
                                                          PM, Prabath
                                                          Siriwardena
                                                          &lt;<a href=3D"ma=
ilto:prabath@wso2.com" target=3D"_blank">prabath@wso2.com</a>&gt;
                                                          wrote:<br>
                                                          <br>
                                                          </div>
                                                          <blockquote type=
=3D"cite">
                                                          <div>I guess
                                                          confusion is
                                                          with &#39;valid&#=
39;
                                                          parameter is
                                                          in the
                                                          response..
                                                          <div><br>
                                                          </div>
                                                          <div>I thought
                                                          this will be
                                                          helpful
                                                          to=A0standardize=
=A0the
                                                          communication
                                                          between
                                                          Resource
                                                          Server and the
                                                          Authorization
                                                          Server..</div>
                                                          <div><br>
                                                          </div>
                                                          <div>I would
                                                          suggest we
                                                          completely
                                                          remove &quot;vali=
d&quot;
                                                          from the
                                                          response - or
                                                          define it much
                                                          clearly..</div>
                                                          <div><br>
                                                          </div>
                                                          <div>May be
                                                          can add
                                                          &quot;revoked&quo=
t; with
                                                          a boolean
                                                          attribute..</div>
                                                          <div><br>
                                                          </div>
                                                          <div>Thanks
                                                          &amp; regards,</d=
iv>
                                                          <div>-Prabath<br>
                                                          <br>
                                                          <div class=3D"gma=
il_quote">On

                                                          Tue, Feb 12,
                                                          2013 at 3:19
                                                          AM, Justin
                                                          Richer <span dir=
=3D"ltr">&lt;<a href=3D"mailto:jricher@mitre.org" target=3D"_blank">jricher=
@mitre.org</a>&gt;</span>
                                                          wrote:<br>
                                                          <blockquote class=
=3D"gmail_quote" style=3D"margin:0 0 0 .8ex;border-left:1px #ccc solid;padd=
ing-left:1ex">
                                                          <div bgcolor=3D"#=
FFFFFF" text=3D"#000000">
                                                          <div> <br>
                                                          <div>On
                                                          02/08/2013
                                                          12:51 AM,
                                                          Prabath
                                                          Siriwardena
                                                          wrote:<br>
                                                          </div>
                                                          </div>
                                                          <blockquote type=
=3D"cite">
                                                          Hi=A0Justin,
                                                          <div><br>
                                                          </div>
                                                          <div>
                                                          <div>I have
                                                          couple of
                                                          questions
                                                          related to
                                                          &quot;valid&quot;
                                                          parameter...</div=
>
                                                          <div><br>
                                                          </div>
                                                          <div>This
                                                          endpoint can
                                                          be invoked by
                                                          the Resource
                                                          Server in
                                                          runtime...</div>
                                                          </div>
                                                          </blockquote>
                                                          <br>
                                                          That&#39;s
                                                          correct.
                                                          <div><br>
                                                          <br>
                                                          <blockquote type=
=3D"cite">
                                                          <div><br>
                                                          </div>
                                                          <div>In that
                                                          case what is
                                                          exactly meant
                                                          by the
                                                          &quot;resource_id=
&quot;
                                                          in request ?</div=
>
                                                          </blockquote>
                                                          <br>
                                                          </div>
                                                          The
                                                          resource_id
                                                          field is a
                                                          service-specific
                                                          string that
                                                          basically lets
                                                          the resource
                                                          server provide
                                                          some context
                                                          to the request
                                                          to the auth
                                                          server. There
                                                          have been some
                                                          other
                                                          suggestions
                                                          like client IP
                                                          address, but I
                                                          wanted to put
                                                          this one in
                                                          because it
                                                          seemed to be a
                                                          common theme.
                                                          The client is
                                                          trying to do
                                                          *something*
                                                          with the
                                                          token, after
                                                          all, and the
                                                          rights,
                                                          permissions,
                                                          and metadata
                                                          associated
                                                          with the token
                                                          could change
                                                          based on that.
                                                          Since the
                                                          Introspection
                                                          endpoint is
                                                          all about
                                                          getting that
                                                          metadata back
                                                          to the PR,
                                                          this seemed
                                                          like a good
                                                          idea.
                                                          <div><br>
                                                          <br>
                                                          <blockquote type=
=3D"cite">
                                                          <div><br>
                                                          </div>
                                                          <div>IMO a
                                                          token to be
                                                          valid depends
                                                          on set of
                                                          criteria based
                                                          on it&#39;s type.=
.</div>
                                                          <div><br>
                                                          </div>
                                                          <div>For a
                                                          Bearer token..</d=
iv>
                                                          <div><br>
                                                          </div>
                                                          <div>1. Token
                                                          should not be
                                                          expired</div>
                                                          <div>2. Token
                                                          should not be
                                                          revoked.</div>
                                                          <div>3. The
                                                          scope the
                                                          token issued
                                                          should match
                                                          with the scope
                                                          required for
                                                          the resource.</di=
v>
                                                          <div><br>
                                                          </div>
                                                          <div>For a MAC
                                                          token...</div>
                                                          <div><br>
                                                          </div>
                                                          <div>1. Token
                                                          not expired
                                                          (mac id)</div>
                                                          <div>2. Token
                                                          should not be
                                                          revoked</div>
                                                          <div>3. The
                                                          scope the
                                                          token issued
                                                          should match
                                                          with the scope
                                                          required for
                                                          the resource.</di=
v>
                                                          <div>4. HMAC
                                                          check should
                                                          be valid</div>
                                                          <div><br>
                                                          </div>
                                                          There are
                                                          similar
                                                          conditions for
                                                          SAML bearer
                                                          too..</blockquote=
>
                                                          <br>
                                                          </div>
                                                          This isn&#39;t
                                                          really true.
                                                          The SAML
                                                          bearer token
                                                          is fully
                                                          self-contained
                                                          and doesn&#39;t
                                                          change based
                                                          on other
                                                          parameters in
                                                          the message,
                                                          unlike MAC.
                                                          Same with JWT.
                                                          When it hands
                                                          a SAML or JWT
                                                          token to the
                                                          AS, the PR has
                                                          given
                                                          *everything*
                                                          the server
                                                          needs to check
                                                          that token&#39;s
                                                          validity and
                                                          use. <br>
                                                          <br>
                                                          MAC signatures
                                                          change with
                                                          every message,
                                                          and they&#39;re
                                                          done across
                                                          several
                                                          components of
                                                          the HTTP
                                                          message.
                                                          Therefor, the
                                                          HMAC check for
                                                          MAC style
                                                          tokens will
                                                          still need to
                                                          be done by the
                                                          protected
                                                          resource.
                                                          Introspection
                                                          would help in
                                                          the case that
                                                          the signature
                                                          validated just
                                                          fine, but the
                                                          token might
                                                          have expired.
                                                          Or you need to
                                                          know what
                                                          scopes apply.
                                                          Introspection
                                                          isn&#39;t to full=
y
                                                          validate the
                                                          call to the
                                                          protected
                                                          resource -- if
                                                          that were the
                                                          case, the PR
                                                          would have to
                                                          send some kind
                                                          of
                                                          encapsulated
                                                          version of the
                                                          original
                                                          request.
                                                          Otherwise, the
                                                          AS won&#39;t have
                                                          all of the
                                                          information it
                                                          needs to check
                                                          the MAC.<br>
                                                          <br>
                                                          <br>
                                                          I think what
                                                          you&#39;re
                                                          describing is
                                                          ultimately
                                                          *not* what the
                                                          introspection
                                                          endpoint is
                                                          intended to
                                                          do. If that&#39;s
                                                          unclear from
                                                          the document,
                                                          can you please
                                                          suggest text
                                                          that would
                                                          help clear the
                                                          use case up? I
                                                          wouldn&#39;t want
                                                          it to be
                                                          ambiguous.<span><=
font color=3D"#888888"><br>
                                                          <br>
                                                          =A0-- Justin</fon=
t></span>
                                                          <div>
                                                          <div><br>
                                                          <br>
                                                          <blockquote type=
=3D"cite">
                                                          <div><br>
                                                          </div>
                                                          <div>Thanks
                                                          &amp; regards,</d=
iv>
                                                          <div>-Prabath</di=
v>
                                                          <div><br>
                                                          </div>
                                                          <div><br>
                                                          <div class=3D"gma=
il_quote">On


                                                          Thu, Feb 7,
                                                          2013 at 10:30
                                                          PM, Justin
                                                          Richer <span dir=
=3D"ltr">&lt;<a href=3D"mailto:jricher@mitre.org" target=3D"_blank">jricher=
@mitre.org</a>&gt;</span>
                                                          wrote:<br>
                                                          <blockquote class=
=3D"gmail_quote" style=3D"margin:0 0 0 .8ex;border-left:1px #ccc solid;padd=
ing-left:1ex">
                                                          <div bgcolor=3D"#=
FFFFFF" text=3D"#000000">
                                                          It validates
                                                          the token,
                                                          which would be
                                                          either the
                                                          token itself
                                                          in the case of
                                                          Bearer or the
                                                          token &quot;id&qu=
ot;
                                                          part of
                                                          something more
                                                          complex like
                                                          MAC. It
                                                          doesn&#39;t
                                                          directly
                                                          validate the
                                                          usage of the
                                                          token, that&#39;s
                                                          still up to
                                                          the PR to do
                                                          that.<br>
                                                          <br>
                                                          I nearly added
                                                          a &quot;token typ=
e&quot;
                                                          field in this
                                                          draft, but
                                                          held back
                                                          because there
                                                          are several
                                                          kinds of
                                                          &quot;token type&=
quot;
                                                          that people
                                                          talk about in
                                                          OAuth. First,
                                                          there&#39;s
                                                          &quot;Bearer&quot=
; vs.
                                                          &quot;MAC&quot; v=
s.
                                                          &quot;HOK&quot;, =
or what
                                                          have you. Then
                                                          within Bearer
                                                          you have &quot;JW=
T&quot;
                                                          or &quot;SAML&quo=
t; or
                                                          &quot;unstructure=
d
                                                          blob&quot;. Then
                                                          you&#39;ve also
                                                          got &quot;access&=
quot;
                                                          vs. &quot;refresh=
&quot;
                                                          and other
                                                          flavors of
                                                          token, like
                                                          the id_token
                                                          in OpenID
                                                          Connect. <br>
                                                          <br>
                                                          Thing is, the
                                                          server running
                                                          the
                                                          introspection
                                                          endpoint will
                                                          probably know
                                                          *all* of
                                                          these. But
                                                          should it tell
                                                          the client? If
                                                          so, which of
                                                          the three, and
                                                          what names
                                                          should the
                                                          fields be?<span><=
font color=3D"#888888"><br>
                                                          <br>
                                                          =A0-- Justin</fon=
t></span>
                                                          <div>
                                                          <div><br>
                                                          <br>
                                                          <div>On
                                                          02/07/2013
                                                          11:26 AM,
                                                          Prabath
                                                          Siriwardena
                                                          wrote:<br>
                                                          </div>
                                                          <blockquote type=
=3D"cite">
                                                          Okay.. I was
                                                          thinking this
                                                          could be used
                                                          as a way to
                                                          validate the
                                                          token as well.
                                                          BTW even in
                                                          this case
                                                          shouldn&#39;t
                                                          communicate
                                                          the type of
                                                          token to AS?
                                                          For example in
                                                          the case of
                                                          SAML profile -
                                                          it could be
                                                          SAML token..
                                                          <div> <br>
                                                          </div>
                                                          <div>Thanks
                                                          &amp; regards,</d=
iv>
                                                          <div>-Prabath<br>
                                                          <br>
                                                          <div class=3D"gma=
il_quote">On


                                                          Thu, Feb 7,
                                                          2013 at 8:39
                                                          PM, Justin
                                                          Richer <span dir=
=3D"ltr">&lt;<a href=3D"mailto:jricher@mitre.org" target=3D"_blank">jricher=
@mitre.org</a>&gt;</span>
                                                          wrote:<br>
                                                          <blockquote class=
=3D"gmail_quote" style=3D"margin:0 0 0 .8ex;border-left:1px #ccc solid;padd=
ing-left:1ex">
                                                          <div bgcolor=3D"#=
FFFFFF" text=3D"#000000">
                                                          &quot;valid&quot;=
 might
                                                          not be the
                                                          best term, but
                                                          it&#39;s meant to
                                                          be a field
                                                          where the
                                                          server says
                                                          &quot;yes this
                                                          token is still
                                                          good&quot; or &qu=
ot;no
                                                          this token
                                                          isn&#39;t good
                                                          anymore&quot;. We
                                                          could instead
                                                          do this with
                                                          HTTP codes or
                                                          something but
                                                          I went with a
                                                          pure JSON
                                                          response.<span><f=
ont color=3D"#888888"><br>
                                                          <br>
                                                          =A0-- Justin</fon=
t></span>
                                                          <div>
                                                          <div><br>
                                                          <br>
                                                          <div>On
                                                          02/06/2013
                                                          10:47 PM,
                                                          Prabath
                                                          Siriwardena
                                                          wrote:<br>
                                                          </div>
                                                          <blockquote type=
=3D"cite">
                                                          Hi Justin,
                                                          <div><br>
                                                          </div>
                                                          <div>I believe
                                                          this is
                                                          addressing one
                                                          of the key
                                                          missing part
                                                          in OAuth
                                                          2.0...</div>
                                                          <div><br>
                                                          </div>
                                                          <div>One
                                                          question - I
                                                          guess this was
                                                          discussed
                                                          already...</div>
                                                          <div><br>
                                                          </div>
                                                          <div>In the
                                                          spec - in the
                                                          introspection
                                                          response it
                                                          has the
                                                          attribute
                                                          &quot;valid&quot;=
 - this
                                                          is basically
                                                          the validity
                                                          of the token
                                                          provided in
                                                          the request.</div=
>
                                                          <div><br>
                                                          </div>
                                                          <div>Validation=
=A0criteria



                                                          depends on the
                                                          token and well
                                                          as token type
                                                          ( Bearer,
                                                          MAC..).</div>
                                                          <div><br>
                                                          </div>
                                                          <div>In the
                                                          spec it seems
                                                          like it&#39;s
                                                          coupled with
                                                          Bearer token
                                                          type... But I
                                                          guess, by
                                                          adding
                                                          &quot;token_type&=
quot;
                                                          to the request
                                                          we can remove
                                                          this
                                                          dependency.</div>
                                                          <div><br>
                                                          </div>
                                                          <div>WDYT..?</div=
>
                                                          <div><br>
                                                          </div>
                                                          <div>Thanks
                                                          &amp; regards,</d=
iv>
                                                          <div>-Prabath=A0<=
/div>
                                                          <div><br>
                                                          <div class=3D"gma=
il_quote">On



                                                          Thu, Feb 7,
                                                          2013 at 12:54
                                                          AM, Justin
                                                          Richer <span dir=
=3D"ltr">&lt;<a href=3D"mailto:jricher@mitre.org" target=3D"_blank">jricher=
@mitre.org</a>&gt;</span>
                                                          wrote:<br>
                                                          <blockquote class=
=3D"gmail_quote" style=3D"margin:0 0 0 .8ex;border-left:1px #ccc solid;padd=
ing-left:1ex">
                                                          <div bgcolor=3D"#=
FFFFFF" text=3D"#000000">
                                                          Updated
                                                          introspection
                                                          draft based on
                                                          recent
                                                          comments.
                                                          Changes
                                                          include:<br>
                                                          <br>
                                                          =A0- &quot;scope&=
quot;
                                                          return
                                                          parameter now
                                                          follows
                                                          RFC6749 format
                                                          instead of
                                                          JSON array<br>
                                                          =A0- &quot;subjec=
t&quot;
                                                          -&gt; &quot;sub&q=
uot;,
                                                          and &quot;audienc=
e&quot;
                                                          -&gt; &quot;aud&q=
uot;,
                                                          to be parallel
                                                          with JWT
                                                          claims<br>
                                                          =A0- clarified
                                                          what happens
                                                          if the
                                                          authentication
                                                          is bad<br>
                                                          <br>
                                                          =A0-- Justin<br>
                                                          <div><br>
                                                          <br>
                                                          --------
                                                          Original
                                                          Message
                                                          --------
                                                          <table border=3D"=
0" cellpadding=3D"0" cellspacing=3D"0">
                                                          <tbody>
                                                          <tr>
                                                          <th align=3D"RIGH=
T" nowrap valign=3D"BASELINE">Subject: </th>
                                                          <td>New
                                                          Version
                                                          Notification
                                                          for
                                                          draft-richer-oaut=
h-introspection-02.txt</td>
                                                          </tr>
                                                          <tr>
                                                          <th align=3D"RIGH=
T" nowrap valign=3D"BASELINE">Date: </th>
                                                          <td>Wed, 6 Feb
                                                          2013 11:24:20
                                                          -0800</td>
                                                          </tr>
                                                          <tr>
                                                          <th align=3D"RIGH=
T" nowrap valign=3D"BASELINE">From: </th>
                                                          <td><a href=3D"ma=
ilto:internet-drafts@ietf.org" target=3D"_blank">&lt;internet-drafts@ietf.o=
rg&gt;</a></td>
                                                          </tr>
                                                          <tr>
                                                          <th align=3D"RIGH=
T" nowrap valign=3D"BASELINE">To: </th>
                                                          <td><a href=3D"ma=
ilto:jricher@mitre.org" target=3D"_blank">&lt;jricher@mitre.org&gt;</a></td=
>
                                                          </tr>
                                                          </tbody>
                                                          </table>
                                                          <br>
                                                          <br>
                                                          <pre>A new versio=
n of I-D, draft-richer-oauth-introspection-02.txt
has been successfully submitted by Justin Richer and posted to the
IETF repository.

Filename:	 draft-richer-oauth-introspection
Revision:	 02
Title:		 OAuth Token Introspection
Creation date:	 2013-02-06
WG ID:		 Individual Submission
Number of pages: 6
URL:             <a href=3D"http://www.ietf.org/internet-drafts/draft-riche=
r-oauth-introspection-02.txt" target=3D"_blank">http://www.ietf.org/interne=
t-drafts/draft-richer-oauth-introspection-02.txt</a>
Status:          <a href=3D"http://datatracker.ietf.org/doc/draft-richer-oa=
uth-introspection" target=3D"_blank">http://datatracker.ietf.org/doc/draft-=
richer-oauth-introspection</a>
Htmlized:        <a href=3D"http://tools.ietf.org/html/draft-richer-oauth-i=
ntrospection-02" target=3D"_blank">http://tools.ietf.org/html/draft-richer-=
oauth-introspection-02</a>
Diff:            <a href=3D"http://www.ietf.org/rfcdiff?url2=3Ddraft-richer=
-oauth-introspection-02" target=3D"_blank">http://www.ietf.org/rfcdiff?url2=
=3Ddraft-richer-oauth-introspection-02</a>

Abstract:
   This specification defines a method for a client or protected
   resource to query an OAuth authorization server to determine meta-
   information about an OAuth token.


                                                                           =
      =20


The IETF Secretariat

</pre>
                                                          <br>
                                                          </div>
                                                          <br>
                                                          </div>
                                                          <br>
_______________________________________________<br>
                                                          OAuth mailing
                                                          list<br>
                                                          <a href=3D"mailto=
:OAuth@ietf.org" target=3D"_blank">OAuth@ietf.org</a><br>
                                                          <a href=3D"https:=
//www.ietf.org/mailman/listinfo/oauth" target=3D"_blank">https://www.ietf.o=
rg/mailman/listinfo/oauth</a><br>
                                                          <br>
                                                          </blockquote>
                                                          </div>
                                                          <br>
                                                          <br clear=3D"all"=
>
                                                          <div><br>
                                                          </div>
                                                          -- <br>
                                                          Thanks &amp;
                                                          Regards,<br>
                                                          Prabath
                                                          <div><br>
                                                          </div>
                                                          <div>Mobile :
                                                          <a href=3D"tel:%2=
B94%2071%20809%206732" value=3D"+94718096732" target=3D"_blank">+94


                                                          71 809 6732</a>=
=A0<br>
                                                          <br>
                                                          <a href=3D"http:/=
/blog.facilelogin.com" target=3D"_blank">http://blog.facilelogin.com</a><br=
>
                                                          <a href=3D"http:/=
/RampartFAQ.com" target=3D"_blank">http://RampartFAQ.com</a></div>
                                                          </div>
                                                          </blockquote>
                                                          <br>
                                                          </div>
                                                          </div>
                                                          </div>
                                                          </blockquote>
                                                          </div>
                                                          <br>
                                                          <br clear=3D"all"=
>
                                                          <div><br>
                                                          </div>
                                                          -- <br>
                                                          Thanks &amp;
                                                          Regards,<br>
                                                          Prabath
                                                          <div><br>
                                                          </div>
                                                          <div>Mobile :
                                                          <a href=3D"tel:%2=
B94%2071%20809%206732" value=3D"+94718096732" target=3D"_blank">+94


                                                          71 809 6732</a>=
=A0<br>
                                                          <br>
                                                          <a href=3D"http:/=
/blog.facilelogin.com" target=3D"_blank">http://blog.facilelogin.com</a><br=
>
                                                          <a href=3D"http:/=
/RampartFAQ.com" target=3D"_blank">http://RampartFAQ.com</a></div>
                                                          </div>
                                                          </blockquote>
                                                          <br>
                                                          </div>
                                                          </div>
                                                          </div>
                                                          </blockquote>
                                                          </div>
                                                          <br>
                                                          <br clear=3D"all"=
>
                                                          <div><br>
                                                          </div>
                                                          -- <br>
                                                          Thanks &amp;
                                                          Regards,<br>
                                                          Prabath
                                                          <div><br>
                                                          </div>
                                                          <div>Mobile :
                                                          <a href=3D"tel:%2=
B94%2071%20809%206732" value=3D"+94718096732" target=3D"_blank">+94



                                                          71 809 6732</a>=
=A0<br>
                                                          <br>
                                                          <a href=3D"http:/=
/blog.facilelogin.com" target=3D"_blank">http://blog.facilelogin.com</a><br=
>
                                                          <a href=3D"http:/=
/RampartFAQ.com" target=3D"_blank">http://RampartFAQ.com</a></div>
                                                          </div>
                                                          </blockquote>
                                                          <br>
                                                          </div>
                                                          </div>
                                                          </div>
                                                          </blockquote>
                                                          </div>
                                                          <br>
                                                          <br clear=3D"all"=
>
                                                          <div><br>
                                                          </div>
                                                          -- <br>
                                                          Thanks &amp;
                                                          Regards,<br>
                                                          Prabath
                                                          <div><br>
                                                          </div>
                                                          <div>Mobile :
                                                          <a href=3D"tel:%2=
B94%2071%20809%206732" value=3D"+94718096732" target=3D"_blank">+94

                                                          71 809 6732</a>=
=A0<br>
                                                          <br>
                                                          <a href=3D"http:/=
/blog.facilelogin.com" target=3D"_blank">http://blog.facilelogin.com</a><br=
>
                                                          <a href=3D"http:/=
/RampartFAQ.com" target=3D"_blank">http://RampartFAQ.com</a></div>
                                                          </div>
                                                          </div>
                                                          </blockquote>
                                                          <blockquote type=
=3D"cite">
                                                          <div><span>______=
_________________________________________</span><br>
                                                          <span>OAuth
                                                          mailing list</spa=
n><br>
                                                          <span><a href=3D"=
mailto:OAuth@ietf.org" target=3D"_blank">OAuth@ietf.org</a></span><br>
                                                          <span><a href=3D"=
https://www.ietf.org/mailman/listinfo/oauth" target=3D"_blank">https://www.=
ietf.org/mailman/listinfo/oauth</a></span><br>
                                                          </div>
                                                          </blockquote>
                                                          </blockquote>
                                                          <br>
                                                          </div>
                                                          </div>
                                                          </div>
                                                          </blockquote>
                                                        </div>
                                                        <br>
                                                        <br clear=3D"all">
                                                        <div><br>
                                                        </div>
                                                        -- <br>
                                                        Thanks &amp;
                                                        Regards,<br>
                                                        Prabath
                                                        <div><br>
                                                        </div>
                                                        <div>Mobile : <a hr=
ef=3D"tel:%2B94%2071%20809%206732" value=3D"+94718096732" target=3D"_blank"=
>+94 71 809 6732</a>=A0<br>
                                                          <br>
                                                          <a href=3D"http:/=
/blog.facilelogin.com" target=3D"_blank">http://blog.facilelogin.com</a><br=
>
                                                          <a href=3D"http:/=
/RampartFAQ.com" target=3D"_blank">http://RampartFAQ.com</a></div>
                                                      </div>
                                                    </div>
                                                  </div>
                                                </blockquote>
                                              </div>
                                              <br>
                                              <br clear=3D"all">
                                              <div><br>
                                              </div>
                                              -- <br>
                                              Thanks &amp; Regards,<br>
                                              Prabath
                                              <div><br>
                                              </div>
                                              <div>Mobile : <a href=3D"tel:=
%2B94%2071%20809%206732" value=3D"+94718096732" target=3D"_blank">+94

                                                  71 809 6732</a>=A0<br>
                                                <br>
                                                <a href=3D"http://blog.faci=
lelogin.com" target=3D"_blank">http://blog.facilelogin.com</a><br>
                                                <a href=3D"http://RampartFA=
Q.com" target=3D"_blank">http://RampartFAQ.com</a></div>
                                            </div>
                                          </blockquote>
                                          <br>
                                        </div>
                                      </div>
                                    </div>
                                  </blockquote>
                                </div>
                                <br>
                                <br clear=3D"all">
                                <div><br>
                                </div>
                                -- <br>
                                Thanks &amp; Regards,<br>
                                Prabath
                                <div><br>
                                </div>
                                <div>Mobile : <a href=3D"tel:%2B94%2071%208=
09%206732" value=3D"+94718096732" target=3D"_blank">+94
                                    71 809 6732</a>=A0<br>
                                  <br>
                                  <a href=3D"http://blog.facilelogin.com" t=
arget=3D"_blank">http://blog.facilelogin.com</a><br>
                                  <a href=3D"http://RampartFAQ.com" target=
=3D"_blank">http://RampartFAQ.com</a></div>
                              </div>
                            </div>
                          </div>
                        </blockquote>
                      </div>
                      <br>
                      <br clear=3D"all">
                      <div><br>
                      </div>
                      -- <br>
                      Thanks &amp; Regards,<br>
                      Prabath
                      <div><br>
                      </div>
                      <div>Mobile : <a href=3D"tel:%2B94%2071%20809%206732"=
 value=3D"+94718096732" target=3D"_blank">+94 71
                          809 6732</a>=A0<br>
                        <br>
                        <a href=3D"http://blog.facilelogin.com" target=3D"_=
blank">http://blog.facilelogin.com</a><br>
                        <a href=3D"http://RampartFAQ.com" target=3D"_blank"=
>http://RampartFAQ.com</a></div>
                    </div>
                  </blockquote>
                  <br>
                </div>
              </div>
            </div>
          </blockquote>
        </div>
        <br>
        <br clear=3D"all">
        <div><br>
        </div>
        -- <br>
        Thanks &amp; Regards,<br>
        Prabath
        <div><br>
        </div>
        <div>Mobile : <a href=3D"tel:%2B94%2071%20809%206732" value=3D"+947=
18096732" target=3D"_blank">+94 71 809 6732</a>=A0<br>
          <br>
          <a href=3D"http://blog.facilelogin.com" target=3D"_blank">http://=
blog.facilelogin.com</a><br>
          <a href=3D"http://RampartFAQ.com" target=3D"_blank">http://Rampar=
tFAQ.com</a></div>
      </div>
    </blockquote>
    <br>
  </div></div></div>

</blockquote></div><br><br clear=3D"all"><div><br></div>-- <br>Thanks &amp;=
 Regards,<br>Prabath<div><br></div><div>Mobile : +94 71 809 6732=A0<br><br>=
<a href=3D"http://blog.facilelogin.com" target=3D"_blank">http://blog.facil=
elogin.com</a><br>
<a href=3D"http://RampartFAQ.com" target=3D"_blank">http://RampartFAQ.com</=
a></div>
</div>

--047d7b603fe251265604d5b032c0--

From jricher@mitre.org  Thu Feb 14 06:47:18 2013
Return-Path: <jricher@mitre.org>
X-Original-To: oauth@ietfa.amsl.com
Delivered-To: oauth@ietfa.amsl.com
Received: from localhost (localhost [127.0.0.1]) by ietfa.amsl.com (Postfix) with ESMTP id C915D21F8499 for <oauth@ietfa.amsl.com>; Thu, 14 Feb 2013 06:47:18 -0800 (PST)
X-Virus-Scanned: amavisd-new at amsl.com
X-Spam-Flag: NO
X-Spam-Score: -6.57
X-Spam-Level: 
X-Spam-Status: No, score=-6.57 tagged_above=-999 required=5 tests=[AWL=0.028,  BAYES_00=-2.599, HTML_MESSAGE=0.001, RCVD_IN_DNSWL_MED=-4]
Received: from mail.ietf.org ([64.170.98.30]) by localhost (ietfa.amsl.com [127.0.0.1]) (amavisd-new, port 10024) with ESMTP id BwXFoWXq1JiO for <oauth@ietfa.amsl.com>; Thu, 14 Feb 2013 06:47:16 -0800 (PST)
Received: from smtpksrv1.mitre.org (smtpksrv1.mitre.org [198.49.146.77]) by ietfa.amsl.com (Postfix) with ESMTP id 7A6BA21F8461 for <oauth@ietf.org>; Thu, 14 Feb 2013 06:47:15 -0800 (PST)
Received: from smtpksrv1.mitre.org (localhost.localdomain [127.0.0.1]) by localhost (Postfix) with SMTP id 258081F2CB5; Thu, 14 Feb 2013 09:47:15 -0500 (EST)
Received: from IMCCAS02.MITRE.ORG (imccas02.mitre.org [129.83.29.79]) by smtpksrv1.mitre.org (Postfix) with ESMTP id D1D4C1F2CAA; Thu, 14 Feb 2013 09:47:14 -0500 (EST)
Received: from [10.146.15.29] (129.83.31.58) by IMCCAS02.MITRE.ORG (129.83.29.79) with Microsoft SMTP Server (TLS) id 14.2.318.4; Thu, 14 Feb 2013 09:47:14 -0500
Message-ID: <511CF8C5.70301@mitre.org>
Date: Thu, 14 Feb 2013 09:46:29 -0500
From: Justin Richer <jricher@mitre.org>
User-Agent: Mozilla/5.0 (X11; Linux i686; rv:17.0) Gecko/20130106 Thunderbird/17.0.2
MIME-Version: 1.0
To: Prabath Siriwardena <prabath@wso2.com>
References: <20130206192420.32698.21027.idtracker@ietfa.amsl.com> <5113C3AA.1040701@mitre.org> <CAJV9qO8BVV57eAb5kUNes15AYOpUKqw5XWQswh-FJA=b1pPgSA@mail.gmail.com> <5113DDB2.7060805@mitre.org> <CAJV9qO_gM1oera9ae9sqh9n17e-ZLKuC2pmsZwhq-RmFcMyqHA@mail.gmail.com> <51196777.6000502@mitre.org> <CAJV9qO-5bWZbNUfCmaqYBQoy-qwNaSZFOsO9GL3CrbSejwVTzw@mail.gmail.com> <F6595A40-6B4E-4718-ABB5-694CA975C4DB@maymount.com> <511A5062.5010108@mitre.org> <CAJV9qO_Mr87NX=KZRqCsWasQ1FuvDNBw14eS-TcPf_KRJztQFg@mail.gmail.com> <CAJV9qO-71-sM6kXOB6Fb_bvVkDBQ5JBbs8E5X=f-K=iEmGezRA@mail.gmail.com> <511CEEAA.3030801@mitre.org> <CAJV9qO-JSXgSTkw2_pdH0D-o-xDWGDqxx=PAWYtnTj4hOQXW4Q@mail.gmail.com> <CAJV9qO9=+kiO-s7vH_ewr7XjfVdDU24F0kuif504bP53dBr1TA@mail.gmail.com> <511CF3EF.8040008@mitre.org> <CAJV9qO8yKkrsV7d9JtDmbLY-fb5phh=ssKbEUuutkY53PgY8Vg@mail.gmail.com> <511CF4AB.5010700@mitre.org> <CAJV9qO9VmjSQnWKU3kF11x35ut=AsvQ8bjuz_CKpyCScGRiA2Q@mail.gmail.com>
In-Reply-To: <CAJV9qO9VmjSQnWKU3kF11x35ut=AsvQ8bjuz_CKpyCScGRiA2Q@mail.gmail.com>
Content-Type: multipart/alternative; boundary="------------050307080309090507000504"
X-Originating-IP: [129.83.31.58]
Cc: "oauth@ietf.org" <oauth@ietf.org>
Subject: Re: [OAUTH-WG] Fwd: New Version Notification for draft-richer-oauth-introspection-02.txt
X-BeenThere: oauth@ietf.org
X-Mailman-Version: 2.1.12
Precedence: list
List-Id: OAUTH WG <oauth.ietf.org>
List-Unsubscribe: <https://www.ietf.org/mailman/options/oauth>, <mailto:oauth-request@ietf.org?subject=unsubscribe>
List-Archive: <http://www.ietf.org/mail-archive/web/oauth>
List-Post: <mailto:oauth@ietf.org>
List-Help: <mailto:oauth-request@ietf.org?subject=help>
List-Subscribe: <https://www.ietf.org/mailman/listinfo/oauth>, <mailto:oauth-request@ietf.org?subject=subscribe>
X-List-Received-Date: Thu, 14 Feb 2013 14:47:18 -0000

--------------050307080309090507000504
Content-Type: text/plain; charset="ISO-8859-1"; format=flowed
Content-Transfer-Encoding: 7bit


On 02/14/2013 09:37 AM, Prabath Siriwardena wrote:
> The definition of valid is bit ambiguous in the draft...
>
> Okay.. If that is the definition... and if we beak that in to parts...
>
> "it hasn't expired" : In the response it self we have parameter for 
> issued_at and and expires_at - so whether the token is not expired or 
> not can even be derived at the requestor's end.

If the token isn't good anymore, it doesn't matter when it was issued or 
when it was expired, just that it has.

>
> "token was issued from here" : For this IMO we need to send an error 
> code. Requestor has picked the wrong AS.
We don't know if it came from another AS or if someone's just making 
things up. Either way it's not a good token.

>
> The remaining is  "revoked".. That is why I proposed earlier - we 
> better have an attribute "revoked" - instead of "valid" in the response..

The end result of all three is the same: either the token is good, or it 
isn't. I think it's much simpler and more useful to leave it at that.

  -- Justin

>
> WDYT...?
>
> Thanks & regards,
> -Prabath
>
>
> On Thu, Feb 14, 2013 at 7:58 PM, Justin Richer <jricher@mitre.org 
> <mailto:jricher@mitre.org>> wrote:
>
>     Because it will be the one that issued the token in the first place.
>
>     Validity means "token was issued from here, it hasn't been
>     revoked, it hasn't expired".
>
>      -- Justin
>
>
>     On 02/14/2013 09:28 AM, Prabath Siriwardena wrote:
>>     Okay. With out knowing the type of the token how can the AS
>>     validate the token ? What is meant by the validity there?
>>
>>     Thanks & regards,
>>     -Prabath
>>
>>     On Thu, Feb 14, 2013 at 7:55 PM, Justin Richer <jricher@mitre.org
>>     <mailto:jricher@mitre.org>> wrote:
>>
>>         OK, I don't see the utility in that at all. What would it
>>         accomplish?
>>
>>          -- Justin
>>
>>
>>         On 02/14/2013 09:25 AM, Prabath Siriwardena wrote:
>>>         To make it clear - my suggestion is to add token_type_hint
>>>         to the introspection request. It can be from client to AS or
>>>         from RS to AS.
>>>
>>>         Then AS can decide whether the provided token is valid or
>>>         not and include "valid" attribute in the introspection response.
>>>
>>>         Thanks & regards,
>>>         -Prabath
>>>
>>>         On Thu, Feb 14, 2013 at 7:52 PM, Prabath Siriwardena
>>>         <prabath@wso2.com <mailto:prabath@wso2.com>> wrote:
>>>
>>>             Both the client and the resource owner should be aware
>>>             of the token type.
>>>
>>>             My argument is, if the authorization server to decide
>>>             whether the token is valid or not ( irrespective of who
>>>             asked the question) - AS needs to know the token type -
>>>             because to validate a token AS should know the token type.
>>>
>>>             The token type could be, bearer or MAC or any other
>>>             token type.
>>>
>>>             Thanks & regards,
>>>             -Prabath
>>>
>>>
>>>             On Thu, Feb 14, 2013 at 7:33 PM, Justin Richer
>>>             <jricher@mitre.org <mailto:jricher@mitre.org>> wrote:
>>>
>>>                 What exactly are you suggesting be added to
>>>                 introspection? The "token_type_hint" is from the
>>>                 client to the server, but what you've asked for in
>>>                 terms of "token type" is from the server to the
>>>                 client. And there was never an answer to what
>>>                 exactly is meant by "token type" in this case,
>>>                 particularly because you seem to want to call out
>>>                 things like SAML and Bearer as separate types.
>>>
>>>                  -- Justin
>>>
>>>
>>>
>>>                 On 02/14/2013 06:59 AM, Prabath Siriwardena wrote:
>>>>                 I noticed that the latest Token Revocation draft
>>>>                 [1] has introduced the parameter "token_type_hint".
>>>>                 I would suggest the same here, as that would make
>>>>                 what is meant by "valid" much clear..
>>>>
>>>>                 [1]:
>>>>                 http://tools.ietf.org/html/draft-ietf-oauth-revocation-05
>>>>
>>>>                 Thanks & regards,
>>>>                 -Prabath
>>>>
>>>>                 On Tue, Feb 12, 2013 at 9:35 PM, Prabath
>>>>                 Siriwardena <prabath@wso2.com
>>>>                 <mailto:prabath@wso2.com>> wrote:
>>>>
>>>>                     Hi Justin,
>>>>
>>>>                     I doubt whether valid_token would make a
>>>>                     difference..?
>>>>
>>>>                     My initial argument is what is the validation
>>>>                     criteria..? Validation criteria depends on the
>>>>                     token_type..
>>>>
>>>>                     If we are talking only about metadata - then I
>>>>                     believe "revoked", "expired" would be more
>>>>                     meaningful..
>>>>
>>>>                     Thanks & regards,
>>>>                     -Prabath
>>>>
>>>>
>>>>                     On Tue, Feb 12, 2013 at 7:53 PM, Justin Richer
>>>>                     <jricher@mitre.org <mailto:jricher@mitre.org>>
>>>>                     wrote:
>>>>
>>>>                         OK, I can see the wisdom in changing this
>>>>                         term.
>>>>
>>>>                         I picked "valid" because I wanted a simple
>>>>                         "boolean" value that would require no
>>>>                         additional parsing or string-matching on
>>>>                         the client's behalf, and I'd like to stick
>>>>                         with that. OAuth is built with the
>>>>                         assumption that clients need to be able to
>>>>                         recover from invalid tokens at any stage,
>>>>                         so I think a simple yes/no is the right
>>>>                         step here.
>>>>
>>>>                         That said, I think you're both right that
>>>>                         "valid" seems to have caused a bit of
>>>>                         confusion. I don't want to go with
>>>>                         "revoked" because I'd rather have the
>>>>                         "token is OK" be the positive boolean value.
>>>>
>>>>                         Would "valid_token" be more clear? Or do we
>>>>                         need a different adjective all together?
>>>>
>>>>                          -- Justin
>>>>
>>>>
>>>>                         On 02/11/2013 08:02 PM, Richard Harrington
>>>>                         wrote:
>>>>>                         Have you considered "status" instead of
>>>>>                         "valid"?  It could have values like
>>>>>                         "active", "expired", and "revoked".
>>>>>
>>>>>                         Is it worthwhile including the status of
>>>>>                         the client also?  For example, a client
>>>>>                         application could be disabled, temporarily
>>>>>                         or permanently, and thus disabling its
>>>>>                         access tokens as well.
>>>>>
>>>>>
>>>>>                         On Feb 11, 2013, at 1:56 PM, Prabath
>>>>>                         Siriwardena <prabath@wso2.com
>>>>>                         <mailto:prabath@wso2.com>> wrote:
>>>>>
>>>>>>                         I guess confusion is with 'valid'
>>>>>>                         parameter is in the response..
>>>>>>
>>>>>>                         I thought this will be helpful
>>>>>>                         to standardize the communication between
>>>>>>                         Resource Server and the Authorization
>>>>>>                         Server..
>>>>>>
>>>>>>                         I would suggest we completely remove
>>>>>>                         "valid" from the response - or define it
>>>>>>                         much clearly..
>>>>>>
>>>>>>                         May be can add "revoked" with a boolean
>>>>>>                         attribute..
>>>>>>
>>>>>>                         Thanks & regards,
>>>>>>                         -Prabath
>>>>>>
>>>>>>                         On Tue, Feb 12, 2013 at 3:19 AM, Justin
>>>>>>                         Richer <jricher@mitre.org
>>>>>>                         <mailto:jricher@mitre.org>> wrote:
>>>>>>
>>>>>>
>>>>>>                             On 02/08/2013 12:51 AM, Prabath
>>>>>>                             Siriwardena wrote:
>>>>>>>                             Hi Justin,
>>>>>>>
>>>>>>>                             I have couple of questions related
>>>>>>>                             to "valid" parameter...
>>>>>>>
>>>>>>>                             This endpoint can be invoked by the
>>>>>>>                             Resource Server in runtime...
>>>>>>
>>>>>>                             That's correct.
>>>>>>
>>>>>>
>>>>>>>
>>>>>>>                             In that case what is exactly meant
>>>>>>>                             by the "resource_id" in request ?
>>>>>>
>>>>>>                             The resource_id field is a
>>>>>>                             service-specific string that
>>>>>>                             basically lets the resource server
>>>>>>                             provide some context to the request
>>>>>>                             to the auth server. There have been
>>>>>>                             some other suggestions like client IP
>>>>>>                             address, but I wanted to put this one
>>>>>>                             in because it seemed to be a common
>>>>>>                             theme. The client is trying to do
>>>>>>                             *something* with the token, after
>>>>>>                             all, and the rights, permissions, and
>>>>>>                             metadata associated with the token
>>>>>>                             could change based on that. Since the
>>>>>>                             Introspection endpoint is all about
>>>>>>                             getting that metadata back to the PR,
>>>>>>                             this seemed like a good idea.
>>>>>>
>>>>>>
>>>>>>>
>>>>>>>                             IMO a token to be valid depends on
>>>>>>>                             set of criteria based on it's type..
>>>>>>>
>>>>>>>                             For a Bearer token..
>>>>>>>
>>>>>>>                             1. Token should not be expired
>>>>>>>                             2. Token should not be revoked.
>>>>>>>                             3. The scope the token issued should
>>>>>>>                             match with the scope required for
>>>>>>>                             the resource.
>>>>>>>
>>>>>>>                             For a MAC token...
>>>>>>>
>>>>>>>                             1. Token not expired (mac id)
>>>>>>>                             2. Token should not be revoked
>>>>>>>                             3. The scope the token issued should
>>>>>>>                             match with the scope required for
>>>>>>>                             the resource.
>>>>>>>                             4. HMAC check should be valid
>>>>>>>
>>>>>>>                             There are similar conditions for
>>>>>>>                             SAML bearer too..
>>>>>>
>>>>>>                             This isn't really true. The SAML
>>>>>>                             bearer token is fully self-contained
>>>>>>                             and doesn't change based on other
>>>>>>                             parameters in the message, unlike
>>>>>>                             MAC. Same with JWT. When it hands a
>>>>>>                             SAML or JWT token to the AS, the PR
>>>>>>                             has given *everything* the server
>>>>>>                             needs to check that token's validity
>>>>>>                             and use.
>>>>>>
>>>>>>                             MAC signatures change with every
>>>>>>                             message, and they're done across
>>>>>>                             several components of the HTTP
>>>>>>                             message. Therefor, the HMAC check for
>>>>>>                             MAC style tokens will still need to
>>>>>>                             be done by the protected resource.
>>>>>>                             Introspection would help in the case
>>>>>>                             that the signature validated just
>>>>>>                             fine, but the token might have
>>>>>>                             expired. Or you need to know what
>>>>>>                             scopes apply. Introspection isn't to
>>>>>>                             fully validate the call to the
>>>>>>                             protected resource -- if that were
>>>>>>                             the case, the PR would have to send
>>>>>>                             some kind of encapsulated version of
>>>>>>                             the original request. Otherwise, the
>>>>>>                             AS won't have all of the information
>>>>>>                             it needs to check the MAC.
>>>>>>
>>>>>>
>>>>>>                             I think what you're describing is
>>>>>>                             ultimately *not* what the
>>>>>>                             introspection endpoint is intended to
>>>>>>                             do. If that's unclear from the
>>>>>>                             document, can you please suggest text
>>>>>>                             that would help clear the use case
>>>>>>                             up? I wouldn't want it to be ambiguous.
>>>>>>
>>>>>>                              -- Justin
>>>>>>
>>>>>>
>>>>>>>
>>>>>>>                             Thanks & regards,
>>>>>>>                             -Prabath
>>>>>>>
>>>>>>>
>>>>>>>                             On Thu, Feb 7, 2013 at 10:30 PM,
>>>>>>>                             Justin Richer <jricher@mitre.org
>>>>>>>                             <mailto:jricher@mitre.org>> wrote:
>>>>>>>
>>>>>>>                                 It validates the token, which
>>>>>>>                                 would be either the token itself
>>>>>>>                                 in the case of Bearer or the
>>>>>>>                                 token "id" part of something
>>>>>>>                                 more complex like MAC. It
>>>>>>>                                 doesn't directly validate the
>>>>>>>                                 usage of the token, that's still
>>>>>>>                                 up to the PR to do that.
>>>>>>>
>>>>>>>                                 I nearly added a "token type"
>>>>>>>                                 field in this draft, but held
>>>>>>>                                 back because there are several
>>>>>>>                                 kinds of "token type" that
>>>>>>>                                 people talk about in OAuth.
>>>>>>>                                 First, there's "Bearer" vs.
>>>>>>>                                 "MAC" vs. "HOK", or what have
>>>>>>>                                 you. Then within Bearer you have
>>>>>>>                                 "JWT" or "SAML" or "unstructured
>>>>>>>                                 blob". Then you've also got
>>>>>>>                                 "access" vs. "refresh" and other
>>>>>>>                                 flavors of token, like the
>>>>>>>                                 id_token in OpenID Connect.
>>>>>>>
>>>>>>>                                 Thing is, the server running the
>>>>>>>                                 introspection endpoint will
>>>>>>>                                 probably know *all* of these.
>>>>>>>                                 But should it tell the client?
>>>>>>>                                 If so, which of the three, and
>>>>>>>                                 what names should the fields be?
>>>>>>>
>>>>>>>                                  -- Justin
>>>>>>>
>>>>>>>
>>>>>>>                                 On 02/07/2013 11:26 AM, Prabath
>>>>>>>                                 Siriwardena wrote:
>>>>>>>>                                 Okay.. I was thinking this
>>>>>>>>                                 could be used as a way to
>>>>>>>>                                 validate the token as well. BTW
>>>>>>>>                                 even in this case shouldn't
>>>>>>>>                                 communicate the type of token
>>>>>>>>                                 to AS? For example in the case
>>>>>>>>                                 of SAML profile - it could be
>>>>>>>>                                 SAML token..
>>>>>>>>
>>>>>>>>                                 Thanks & regards,
>>>>>>>>                                 -Prabath
>>>>>>>>
>>>>>>>>                                 On Thu, Feb 7, 2013 at 8:39 PM,
>>>>>>>>                                 Justin Richer
>>>>>>>>                                 <jricher@mitre.org
>>>>>>>>                                 <mailto:jricher@mitre.org>> wrote:
>>>>>>>>
>>>>>>>>                                     "valid" might not be the
>>>>>>>>                                     best term, but it's meant
>>>>>>>>                                     to be a field where the
>>>>>>>>                                     server says "yes this token
>>>>>>>>                                     is still good" or "no this
>>>>>>>>                                     token isn't good anymore".
>>>>>>>>                                     We could instead do this
>>>>>>>>                                     with HTTP codes or
>>>>>>>>                                     something but I went with a
>>>>>>>>                                     pure JSON response.
>>>>>>>>
>>>>>>>>                                      -- Justin
>>>>>>>>
>>>>>>>>
>>>>>>>>                                     On 02/06/2013 10:47 PM,
>>>>>>>>                                     Prabath Siriwardena wrote:
>>>>>>>>>                                     Hi Justin,
>>>>>>>>>
>>>>>>>>>                                     I believe this is
>>>>>>>>>                                     addressing one of the key
>>>>>>>>>                                     missing part in OAuth 2.0...
>>>>>>>>>
>>>>>>>>>                                     One question - I guess
>>>>>>>>>                                     this was discussed already...
>>>>>>>>>
>>>>>>>>>                                     In the spec - in the
>>>>>>>>>                                     introspection response it
>>>>>>>>>                                     has the attribute "valid"
>>>>>>>>>                                     - this is basically the
>>>>>>>>>                                     validity of the token
>>>>>>>>>                                     provided in the request.
>>>>>>>>>
>>>>>>>>>                                     Validation criteria
>>>>>>>>>                                     depends on the token and
>>>>>>>>>                                     well as token type (
>>>>>>>>>                                     Bearer, MAC..).
>>>>>>>>>
>>>>>>>>>                                     In the spec it seems like
>>>>>>>>>                                     it's coupled with Bearer
>>>>>>>>>                                     token type... But I guess,
>>>>>>>>>                                     by adding "token_type" to
>>>>>>>>>                                     the request we can remove
>>>>>>>>>                                     this dependency.
>>>>>>>>>
>>>>>>>>>                                     WDYT..?
>>>>>>>>>
>>>>>>>>>                                     Thanks & regards,
>>>>>>>>>                                     -Prabath
>>>>>>>>>
>>>>>>>>>                                     On Thu, Feb 7, 2013 at
>>>>>>>>>                                     12:54 AM, Justin Richer
>>>>>>>>>                                     <jricher@mitre.org
>>>>>>>>>                                     <mailto:jricher@mitre.org>> wrote:
>>>>>>>>>
>>>>>>>>>                                         Updated introspection
>>>>>>>>>                                         draft based on recent
>>>>>>>>>                                         comments. Changes include:
>>>>>>>>>
>>>>>>>>>                                          - "scope" return
>>>>>>>>>                                         parameter now follows
>>>>>>>>>                                         RFC6749 format instead
>>>>>>>>>                                         of JSON array
>>>>>>>>>                                          - "subject" -> "sub",
>>>>>>>>>                                         and "audience" ->
>>>>>>>>>                                         "aud", to be parallel
>>>>>>>>>                                         with JWT claims
>>>>>>>>>                                          - clarified what
>>>>>>>>>                                         happens if the
>>>>>>>>>                                         authentication is bad
>>>>>>>>>
>>>>>>>>>                                          -- Justin
>>>>>>>>>
>>>>>>>>>
>>>>>>>>>                                         -------- Original
>>>>>>>>>                                         Message --------
>>>>>>>>>                                         Subject: 	New Version
>>>>>>>>>                                         Notification for
>>>>>>>>>                                         draft-richer-oauth-introspection-02.txt
>>>>>>>>>
>>>>>>>>>                                         Date: 	Wed, 6 Feb 2013
>>>>>>>>>                                         11:24:20 -0800
>>>>>>>>>                                         From:
>>>>>>>>>                                         <internet-drafts@ietf.org>
>>>>>>>>>                                         <mailto:internet-drafts@ietf.org>
>>>>>>>>>
>>>>>>>>>                                         To:
>>>>>>>>>                                         <jricher@mitre.org>
>>>>>>>>>                                         <mailto:jricher@mitre.org>
>>>>>>>>>
>>>>>>>>>
>>>>>>>>>
>>>>>>>>>
>>>>>>>>>                                         A new version of I-D, draft-richer-oauth-introspection-02.txt
>>>>>>>>>                                         has been successfully submitted by Justin Richer and posted to the
>>>>>>>>>                                         IETF repository.
>>>>>>>>>
>>>>>>>>>                                         Filename:	 draft-richer-oauth-introspection
>>>>>>>>>                                         Revision:	 02
>>>>>>>>>                                         Title:		 OAuth Token Introspection
>>>>>>>>>                                         Creation date:	 2013-02-06
>>>>>>>>>                                         WG ID:		 Individual Submission
>>>>>>>>>                                         Number of pages: 6
>>>>>>>>>                                         URL:http://www.ietf.org/internet-drafts/draft-richer-oauth-introspection-02.txt
>>>>>>>>>                                         Status:http://datatracker.ietf.org/doc/draft-richer-oauth-introspection
>>>>>>>>>                                         Htmlized:http://tools.ietf.org/html/draft-richer-oauth-introspection-02
>>>>>>>>>                                         Diff:http://www.ietf.org/rfcdiff?url2=draft-richer-oauth-introspection-02
>>>>>>>>>
>>>>>>>>>                                         Abstract:
>>>>>>>>>                                             This specification defines a method for a client or protected
>>>>>>>>>                                             resource to query an OAuth authorization server to determine meta-
>>>>>>>>>                                             information about an OAuth token.
>>>>>>>>>
>>>>>>>>>
>>>>>>>>>                                                                                                                            
>>>>>>>>>
>>>>>>>>>
>>>>>>>>>                                         The IETF Secretariat
>>>>>>>>>
>>>>>>>>>
>>>>>>>>>
>>>>>>>>>
>>>>>>>>>                                         _______________________________________________
>>>>>>>>>                                         OAuth mailing list
>>>>>>>>>                                         OAuth@ietf.org
>>>>>>>>>                                         <mailto:OAuth@ietf.org>
>>>>>>>>>                                         https://www.ietf.org/mailman/listinfo/oauth
>>>>>>>>>
>>>>>>>>>
>>>>>>>>>
>>>>>>>>>
>>>>>>>>>                                     -- 
>>>>>>>>>                                     Thanks & Regards,
>>>>>>>>>                                     Prabath
>>>>>>>>>
>>>>>>>>>                                     Mobile : +94 71 809 6732
>>>>>>>>>                                     <tel:%2B94%2071%20809%206732>
>>>>>>>>>
>>>>>>>>>                                     http://blog.facilelogin.com
>>>>>>>>>                                     http://RampartFAQ.com
>>>>>>>>
>>>>>>>>
>>>>>>>>
>>>>>>>>
>>>>>>>>                                 -- 
>>>>>>>>                                 Thanks & Regards,
>>>>>>>>                                 Prabath
>>>>>>>>
>>>>>>>>                                 Mobile : +94 71 809 6732
>>>>>>>>                                 <tel:%2B94%2071%20809%206732>
>>>>>>>>
>>>>>>>>                                 http://blog.facilelogin.com
>>>>>>>>                                 http://RampartFAQ.com
>>>>>>>
>>>>>>>
>>>>>>>
>>>>>>>
>>>>>>>                             -- 
>>>>>>>                             Thanks & Regards,
>>>>>>>                             Prabath
>>>>>>>
>>>>>>>                             Mobile : +94 71 809 6732
>>>>>>>                             <tel:%2B94%2071%20809%206732>
>>>>>>>
>>>>>>>                             http://blog.facilelogin.com
>>>>>>>                             http://RampartFAQ.com
>>>>>>
>>>>>>
>>>>>>
>>>>>>
>>>>>>                         -- 
>>>>>>                         Thanks & Regards,
>>>>>>                         Prabath
>>>>>>
>>>>>>                         Mobile : +94 71 809 6732
>>>>>>                         <tel:%2B94%2071%20809%206732>
>>>>>>
>>>>>>                         http://blog.facilelogin.com
>>>>>>                         http://RampartFAQ.com
>>>>>>                         _______________________________________________
>>>>>>                         OAuth mailing list
>>>>>>                         OAuth@ietf.org <mailto:OAuth@ietf.org>
>>>>>>                         https://www.ietf.org/mailman/listinfo/oauth
>>>>
>>>>
>>>>
>>>>
>>>>                     -- 
>>>>                     Thanks & Regards,
>>>>                     Prabath
>>>>
>>>>                     Mobile : +94 71 809 6732
>>>>                     <tel:%2B94%2071%20809%206732>
>>>>
>>>>                     http://blog.facilelogin.com
>>>>                     http://RampartFAQ.com
>>>>
>>>>
>>>>
>>>>
>>>>                 -- 
>>>>                 Thanks & Regards,
>>>>                 Prabath
>>>>
>>>>                 Mobile : +94 71 809 6732 <tel:%2B94%2071%20809%206732>
>>>>
>>>>                 http://blog.facilelogin.com
>>>>                 http://RampartFAQ.com
>>>
>>>
>>>
>>>
>>>             -- 
>>>             Thanks & Regards,
>>>             Prabath
>>>
>>>             Mobile : +94 71 809 6732 <tel:%2B94%2071%20809%206732>
>>>
>>>             http://blog.facilelogin.com
>>>             http://RampartFAQ.com
>>>
>>>
>>>
>>>
>>>         -- 
>>>         Thanks & Regards,
>>>         Prabath
>>>
>>>         Mobile : +94 71 809 6732 <tel:%2B94%2071%20809%206732>
>>>
>>>         http://blog.facilelogin.com
>>>         http://RampartFAQ.com
>>
>>
>>
>>
>>     -- 
>>     Thanks & Regards,
>>     Prabath
>>
>>     Mobile : +94 71 809 6732 <tel:%2B94%2071%20809%206732>
>>
>>     http://blog.facilelogin.com
>>     http://RampartFAQ.com
>
>
>
>
> -- 
> Thanks & Regards,
> Prabath
>
> Mobile : +94 71 809 6732
>
> http://blog.facilelogin.com
> http://RampartFAQ.com


--------------050307080309090507000504
Content-Type: text/html; charset="ISO-8859-1"
Content-Transfer-Encoding: 7bit

<html>
  <head>
    <meta content="text/html; charset=ISO-8859-1"
      http-equiv="Content-Type">
  </head>
  <body bgcolor="#FFFFFF" text="#000000">
    <br>
    <div class="moz-cite-prefix">On 02/14/2013 09:37 AM, Prabath
      Siriwardena wrote:<br>
    </div>
    <blockquote
cite="mid:CAJV9qO9VmjSQnWKU3kF11x35ut=AsvQ8bjuz_CKpyCScGRiA2Q@mail.gmail.com"
      type="cite">
      <meta http-equiv="Content-Type" content="text/html;
        charset=ISO-8859-1">
      <div>The definition of valid is bit ambiguous&nbsp;in the draft...</div>
      <div><br>
      </div>
      <div>Okay.. If that is the definition... and if we beak that in to
        parts...</div>
      <div><br>
      </div>
      <div>"it hasn't expired" : In the response it self we have
        parameter for issued_at and and expires_at - so whether the
        token is not expired or not can even be derived at the
        requestor's end.</div>
    </blockquote>
    <br>
    If the token isn't good anymore, it doesn't matter when it was
    issued or when it was expired, just that it has.<br>
    <br>
    <blockquote
cite="mid:CAJV9qO9VmjSQnWKU3kF11x35ut=AsvQ8bjuz_CKpyCScGRiA2Q@mail.gmail.com"
      type="cite">
      <div><br>
      </div>
      <div>"token was issued from here" : For this IMO we need to send
        an error code. Requestor has picked the wrong AS.</div>
    </blockquote>
    We don't know if it came from another AS or if someone's just making
    things up. Either way it's not a good token.<br>
    <br>
    <blockquote
cite="mid:CAJV9qO9VmjSQnWKU3kF11x35ut=AsvQ8bjuz_CKpyCScGRiA2Q@mail.gmail.com"
      type="cite">
      <div><br>
      </div>
      <div>The remaining is &nbsp;"revoked".. That is why I
        proposed&nbsp;earlier&nbsp;- we better have an attribute "revoked" -
        instead of "valid" in the response..</div>
    </blockquote>
    <br>
    The end result of all three is the same: either the token is good,
    or it isn't. I think it's much simpler and more useful to leave it
    at that.<br>
    <br>
    &nbsp;-- Justin<br>
    <br>
    <blockquote
cite="mid:CAJV9qO9VmjSQnWKU3kF11x35ut=AsvQ8bjuz_CKpyCScGRiA2Q@mail.gmail.com"
      type="cite">
      <div><br>
      </div>
      <div>WDYT...?</div>
      <div><br>
      </div>
      <div>Thanks &amp; regards,</div>
      <div>-Prabath</div>
      <div><br>
      </div>
      <div><br>
        <div class="gmail_quote">On Thu, Feb 14, 2013 at 7:58 PM, Justin
          Richer <span dir="ltr">&lt;<a moz-do-not-send="true"
              href="mailto:jricher@mitre.org" target="_blank">jricher@mitre.org</a>&gt;</span>
          wrote:<br>
          <blockquote class="gmail_quote" style="margin:0 0 0
            .8ex;border-left:1px #ccc solid;padding-left:1ex">
            <div bgcolor="#FFFFFF" text="#000000"> Because it will be
              the one that issued the token in the first place. <br>
              <br>
              Validity means "token was issued from here, it hasn't been
              revoked, it hasn't expired". <br>
              <span class="HOEnZb"><font color="#888888"> <br>
                  &nbsp;-- Justin</font></span>
              <div>
                <div class="h5"><br>
                  <br>
                  <div>On 02/14/2013 09:28 AM, Prabath Siriwardena
                    wrote:<br>
                  </div>
                  <blockquote type="cite"> Okay. With out knowing the
                    type of the token how can the AS validate the token
                    ? What is meant by the validity there?
                    <div><br>
                    </div>
                    <div>Thanks &amp; regards,</div>
                    <div>-Prabath<br>
                      <br>
                      <div class="gmail_quote">On Thu, Feb 14, 2013 at
                        7:55 PM, Justin Richer <span dir="ltr">&lt;<a
                            moz-do-not-send="true"
                            href="mailto:jricher@mitre.org"
                            target="_blank">jricher@mitre.org</a>&gt;</span>
                        wrote:<br>
                        <blockquote class="gmail_quote" style="margin:0
                          0 0 .8ex;border-left:1px #ccc
                          solid;padding-left:1ex">
                          <div bgcolor="#FFFFFF" text="#000000"> OK, I
                            don't see the utility in that at all. What
                            would it accomplish?<span><font
                                color="#888888"><br>
                                <br>
                                &nbsp;-- Justin</font></span>
                            <div>
                              <div><br>
                                <br>
                                <div>On 02/14/2013 09:25 AM, Prabath
                                  Siriwardena wrote:<br>
                                </div>
                                <blockquote type="cite"> To make it
                                  clear - my suggestion is to add
                                  token_type_hint to the introspection
                                  request. It can be from client to AS
                                  or from RS to AS.
                                  <div><br>
                                  </div>
                                  <div>Then AS can decide whether the
                                    provided token is valid or not and
                                    include "valid" attribute in the
                                    introspection response.</div>
                                  <div><br>
                                  </div>
                                  <div>Thanks &amp; regards,</div>
                                  <div>-Prabath<br>
                                    <br>
                                    <div class="gmail_quote">On Thu, Feb
                                      14, 2013 at 7:52 PM, Prabath
                                      Siriwardena <span dir="ltr">&lt;<a
                                          moz-do-not-send="true"
                                          href="mailto:prabath@wso2.com"
                                          target="_blank">prabath@wso2.com</a>&gt;</span>
                                      wrote:<br>
                                      <blockquote class="gmail_quote"
                                        style="margin:0 0 0
                                        .8ex;border-left:1px #ccc
                                        solid;padding-left:1ex">Both the
                                        client and the resource owner
                                        should be aware of the token
                                        type.
                                        <div><br>
                                        </div>
                                        <div>My argument is, if the
                                          authorization server to decide
                                          whether the token is valid or
                                          not ( irrespective of who
                                          asked the question) - AS needs
                                          to know the token type -
                                          because to validate a token AS
                                          should know the token type.</div>
                                        <div><br>
                                        </div>
                                        <div>The token type could be,
                                          bearer or MAC or any other
                                          token type.</div>
                                        <div><br>
                                        </div>
                                        <div>Thanks &amp; regards,</div>
                                        <div>-Prabath
                                          <div>
                                            <div><br>
                                              <br>
                                              <div class="gmail_quote">On
                                                Thu, Feb 14, 2013 at
                                                7:33 PM, Justin Richer <span
                                                  dir="ltr">&lt;<a
                                                    moz-do-not-send="true"
href="mailto:jricher@mitre.org" target="_blank">jricher@mitre.org</a>&gt;</span>
                                                wrote:<br>
                                                <blockquote
                                                  class="gmail_quote"
                                                  style="margin:0 0 0
                                                  .8ex;border-left:1px
                                                  #ccc
                                                  solid;padding-left:1ex">
                                                  <div bgcolor="#FFFFFF"
                                                    text="#000000"> What
                                                    exactly are you
                                                    suggesting be added
                                                    to introspection?
                                                    The
                                                    "token_type_hint" is
                                                    from the client to
                                                    the server, but what
                                                    you've asked for in
                                                    terms of "token
                                                    type" is from the
                                                    server to the
                                                    client. And there
                                                    was never an answer
                                                    to what exactly is
                                                    meant by "token
                                                    type" in this case,
                                                    particularly because
                                                    you seem to want to
                                                    call out things like
                                                    SAML and Bearer as
                                                    separate types. <br>
                                                    <span><font
                                                        color="#888888">
                                                        <br>
                                                        &nbsp;-- Justin</font></span>
                                                    <div>
                                                      <div><br>
                                                        <br>
                                                        <br>
                                                        <div>On
                                                          02/14/2013
                                                          06:59 AM,
                                                          Prabath
                                                          Siriwardena
                                                          wrote:<br>
                                                        </div>
                                                        <blockquote
                                                          type="cite"> I
                                                          noticed that
                                                          the latest
                                                          Token
                                                          Revocation
                                                          draft [1] has
                                                          introduced the
                                                          parameter
                                                          "token_type_hint".
                                                          I would
                                                          suggest the
                                                          same here, as
                                                          that would
                                                          make what is
                                                          meant by
                                                          "valid" much
                                                          clear..
                                                          <div><br>
                                                          </div>
                                                          <div>[1]:&nbsp;<a
                                                          moz-do-not-send="true"
href="http://tools.ietf.org/html/draft-ietf-oauth-revocation-05"
style="color:rgb(17,85,204);font-size:12.727272033691406px;font-family:arial,sans-serif"
target="_blank">http://tools.ietf.org/html/draft-ietf-oauth-revocation-05</a></div>
                                                          <div><br>
                                                          </div>
                                                          <div>Thanks
                                                          &amp; regards,</div>
                                                          <div>-Prabath<br>
                                                          <br>
                                                          <div
                                                          class="gmail_quote">On

                                                          Tue, Feb 12,
                                                          2013 at 9:35
                                                          PM, Prabath
                                                          Siriwardena <span
                                                          dir="ltr">&lt;<a
moz-do-not-send="true" href="mailto:prabath@wso2.com" target="_blank">prabath@wso2.com</a>&gt;</span>
                                                          wrote:<br>
                                                          <blockquote
                                                          class="gmail_quote"
                                                          style="margin:0
                                                          0 0
                                                          .8ex;border-left:1px
                                                          #ccc
                                                          solid;padding-left:1ex">Hi

                                                          Justin,
                                                          <div><br>
                                                          </div>
                                                          <div>I doubt
                                                          whether
                                                          valid_token
                                                          would make a
                                                          difference..?</div>
                                                          <div><br>
                                                          </div>
                                                          <div>My
                                                          initial
                                                          argument is
                                                          what is the
                                                          validation
                                                          criteria..?
                                                          Validation
                                                          criteria
                                                          depends on the
                                                          token_type..</div>
                                                          <div> <br>
                                                          </div>
                                                          <div>If we are
                                                          talking only
                                                          about metadata
                                                          - then I
                                                          believe
                                                          "revoked",
                                                          "expired"
                                                          would be more
                                                          meaningful..</div>
                                                          <div><br>
                                                          </div>
                                                          <div>Thanks
                                                          &amp; regards,</div>
                                                          <div>-Prabath
                                                          <div>
                                                          <div> <br>
                                                          <br>
                                                          <div
                                                          class="gmail_quote">
                                                          On Tue, Feb
                                                          12, 2013 at
                                                          7:53 PM,
                                                          Justin Richer
                                                          <span
                                                          dir="ltr">&lt;<a
moz-do-not-send="true" href="mailto:jricher@mitre.org" target="_blank">jricher@mitre.org</a>&gt;</span>
                                                          wrote:<br>
                                                          <blockquote
                                                          class="gmail_quote"
                                                          style="margin:0
                                                          0 0
                                                          .8ex;border-left:1px
                                                          #ccc
                                                          solid;padding-left:1ex">
                                                          <div
                                                          bgcolor="#FFFFFF"
                                                          text="#000000">
                                                          OK, I can see
                                                          the wisdom in
                                                          changing this
                                                          term. <br>
                                                          <br>
                                                          I picked
                                                          "valid"
                                                          because I
                                                          wanted a
                                                          simple
                                                          "boolean"
                                                          value that
                                                          would require
                                                          no additional
                                                          parsing or
                                                          string-matching
                                                          on the
                                                          client's
                                                          behalf, and
                                                          I'd like to
                                                          stick with
                                                          that. OAuth is
                                                          built with the
                                                          assumption
                                                          that clients
                                                          need to be
                                                          able to
                                                          recover from
                                                          invalid tokens
                                                          at any stage,
                                                          so I think a
                                                          simple yes/no
                                                          is the right
                                                          step here. <br>
                                                          <br>
                                                          That said, I
                                                          think you're
                                                          both right
                                                          that "valid"
                                                          seems to have
                                                          caused a bit
                                                          of confusion.
                                                          I don't want
                                                          to go with
                                                          "revoked"
                                                          because I'd
                                                          rather have
                                                          the "token is
                                                          OK" be the
                                                          positive
                                                          boolean value.
                                                          <br>
                                                          <br>
                                                          Would
                                                          "valid_token"
                                                          be more clear?
                                                          Or do we need
                                                          a different
                                                          adjective all
                                                          together?<span><font
color="#888888"><br>
                                                          <br>
                                                          &nbsp;-- Justin</font></span>
                                                          <div>
                                                          <div><br>
                                                          <br>
                                                          <div>On
                                                          02/11/2013
                                                          08:02 PM,
                                                          Richard
                                                          Harrington
                                                          wrote:<br>
                                                          </div>
                                                          <blockquote
                                                          type="cite">
                                                          <div>Have you
                                                          considered
                                                          "status"
                                                          instead of
                                                          "valid"? &nbsp;It
                                                          could have
                                                          values like
                                                          "active",
                                                          "expired", and
                                                          "revoked".</div>
                                                          <div><br>
                                                          </div>
                                                          <div>Is it
                                                          worthwhile
                                                          including the
                                                          status of the
                                                          client also?
                                                          &nbsp;For example,
                                                          a client
                                                          application
                                                          could be
                                                          disabled,
                                                          temporarily or
                                                          permanently,
                                                          and thus
                                                          disabling its
                                                          access tokens
                                                          as well.</div>
                                                          <div><br>
                                                          </div>
                                                          <div><br>
                                                          On Feb 11,
                                                          2013, at 1:56
                                                          PM, Prabath
                                                          Siriwardena
                                                          &lt;<a
                                                          moz-do-not-send="true"
href="mailto:prabath@wso2.com" target="_blank">prabath@wso2.com</a>&gt;
                                                          wrote:<br>
                                                          <br>
                                                          </div>
                                                          <blockquote
                                                          type="cite">
                                                          <div>I guess
                                                          confusion is
                                                          with 'valid'
                                                          parameter is
                                                          in the
                                                          response..
                                                          <div><br>
                                                          </div>
                                                          <div>I thought
                                                          this will be
                                                          helpful
                                                          to&nbsp;standardize&nbsp;the
                                                          communication
                                                          between
                                                          Resource
                                                          Server and the
                                                          Authorization
                                                          Server..</div>
                                                          <div><br>
                                                          </div>
                                                          <div>I would
                                                          suggest we
                                                          completely
                                                          remove "valid"
                                                          from the
                                                          response - or
                                                          define it much
                                                          clearly..</div>
                                                          <div><br>
                                                          </div>
                                                          <div>May be
                                                          can add
                                                          "revoked" with
                                                          a boolean
                                                          attribute..</div>
                                                          <div><br>
                                                          </div>
                                                          <div>Thanks
                                                          &amp; regards,</div>
                                                          <div>-Prabath<br>
                                                          <br>
                                                          <div
                                                          class="gmail_quote">On


                                                          Tue, Feb 12,
                                                          2013 at 3:19
                                                          AM, Justin
                                                          Richer <span
                                                          dir="ltr">&lt;<a
moz-do-not-send="true" href="mailto:jricher@mitre.org" target="_blank">jricher@mitre.org</a>&gt;</span>
                                                          wrote:<br>
                                                          <blockquote
                                                          class="gmail_quote"
                                                          style="margin:0
                                                          0 0
                                                          .8ex;border-left:1px
                                                          #ccc
                                                          solid;padding-left:1ex">
                                                          <div
                                                          bgcolor="#FFFFFF"
                                                          text="#000000">
                                                          <div> <br>
                                                          <div>On
                                                          02/08/2013
                                                          12:51 AM,
                                                          Prabath
                                                          Siriwardena
                                                          wrote:<br>
                                                          </div>
                                                          </div>
                                                          <blockquote
                                                          type="cite">
                                                          Hi&nbsp;Justin,
                                                          <div><br>
                                                          </div>
                                                          <div>
                                                          <div>I have
                                                          couple of
                                                          questions
                                                          related to
                                                          "valid"
                                                          parameter...</div>
                                                          <div><br>
                                                          </div>
                                                          <div>This
                                                          endpoint can
                                                          be invoked by
                                                          the Resource
                                                          Server in
                                                          runtime...</div>
                                                          </div>
                                                          </blockquote>
                                                          <br>
                                                          That's
                                                          correct.
                                                          <div><br>
                                                          <br>
                                                          <blockquote
                                                          type="cite">
                                                          <div><br>
                                                          </div>
                                                          <div>In that
                                                          case what is
                                                          exactly meant
                                                          by the
                                                          "resource_id"
                                                          in request ?</div>
                                                          </blockquote>
                                                          <br>
                                                          </div>
                                                          The
                                                          resource_id
                                                          field is a
                                                          service-specific
                                                          string that
                                                          basically lets
                                                          the resource
                                                          server provide
                                                          some context
                                                          to the request
                                                          to the auth
                                                          server. There
                                                          have been some
                                                          other
                                                          suggestions
                                                          like client IP
                                                          address, but I
                                                          wanted to put
                                                          this one in
                                                          because it
                                                          seemed to be a
                                                          common theme.
                                                          The client is
                                                          trying to do
                                                          *something*
                                                          with the
                                                          token, after
                                                          all, and the
                                                          rights,
                                                          permissions,
                                                          and metadata
                                                          associated
                                                          with the token
                                                          could change
                                                          based on that.
                                                          Since the
                                                          Introspection
                                                          endpoint is
                                                          all about
                                                          getting that
                                                          metadata back
                                                          to the PR,
                                                          this seemed
                                                          like a good
                                                          idea.
                                                          <div><br>
                                                          <br>
                                                          <blockquote
                                                          type="cite">
                                                          <div><br>
                                                          </div>
                                                          <div>IMO a
                                                          token to be
                                                          valid depends
                                                          on set of
                                                          criteria based
                                                          on it's type..</div>
                                                          <div><br>
                                                          </div>
                                                          <div>For a
                                                          Bearer token..</div>
                                                          <div><br>
                                                          </div>
                                                          <div>1. Token
                                                          should not be
                                                          expired</div>
                                                          <div>2. Token
                                                          should not be
                                                          revoked.</div>
                                                          <div>3. The
                                                          scope the
                                                          token issued
                                                          should match
                                                          with the scope
                                                          required for
                                                          the resource.</div>
                                                          <div><br>
                                                          </div>
                                                          <div>For a MAC
                                                          token...</div>
                                                          <div><br>
                                                          </div>
                                                          <div>1. Token
                                                          not expired
                                                          (mac id)</div>
                                                          <div>2. Token
                                                          should not be
                                                          revoked</div>
                                                          <div>3. The
                                                          scope the
                                                          token issued
                                                          should match
                                                          with the scope
                                                          required for
                                                          the resource.</div>
                                                          <div>4. HMAC
                                                          check should
                                                          be valid</div>
                                                          <div><br>
                                                          </div>
                                                          There are
                                                          similar
                                                          conditions for
                                                          SAML bearer
                                                          too..</blockquote>
                                                          <br>
                                                          </div>
                                                          This isn't
                                                          really true.
                                                          The SAML
                                                          bearer token
                                                          is fully
                                                          self-contained
                                                          and doesn't
                                                          change based
                                                          on other
                                                          parameters in
                                                          the message,
                                                          unlike MAC.
                                                          Same with JWT.
                                                          When it hands
                                                          a SAML or JWT
                                                          token to the
                                                          AS, the PR has
                                                          given
                                                          *everything*
                                                          the server
                                                          needs to check
                                                          that token's
                                                          validity and
                                                          use. <br>
                                                          <br>
                                                          MAC signatures
                                                          change with
                                                          every message,
                                                          and they're
                                                          done across
                                                          several
                                                          components of
                                                          the HTTP
                                                          message.
                                                          Therefor, the
                                                          HMAC check for
                                                          MAC style
                                                          tokens will
                                                          still need to
                                                          be done by the
                                                          protected
                                                          resource.
                                                          Introspection
                                                          would help in
                                                          the case that
                                                          the signature
                                                          validated just
                                                          fine, but the
                                                          token might
                                                          have expired.
                                                          Or you need to
                                                          know what
                                                          scopes apply.
                                                          Introspection
                                                          isn't to fully
                                                          validate the
                                                          call to the
                                                          protected
                                                          resource -- if
                                                          that were the
                                                          case, the PR
                                                          would have to
                                                          send some kind
                                                          of
                                                          encapsulated
                                                          version of the
                                                          original
                                                          request.
                                                          Otherwise, the
                                                          AS won't have
                                                          all of the
                                                          information it
                                                          needs to check
                                                          the MAC.<br>
                                                          <br>
                                                          <br>
                                                          I think what
                                                          you're
                                                          describing is
                                                          ultimately
                                                          *not* what the
                                                          introspection
                                                          endpoint is
                                                          intended to
                                                          do. If that's
                                                          unclear from
                                                          the document,
                                                          can you please
                                                          suggest text
                                                          that would
                                                          help clear the
                                                          use case up? I
                                                          wouldn't want
                                                          it to be
                                                          ambiguous.<span><font
color="#888888"><br>
                                                          <br>
                                                          &nbsp;-- Justin</font></span>
                                                          <div>
                                                          <div><br>
                                                          <br>
                                                          <blockquote
                                                          type="cite">
                                                          <div><br>
                                                          </div>
                                                          <div>Thanks
                                                          &amp; regards,</div>
                                                          <div>-Prabath</div>
                                                          <div><br>
                                                          </div>
                                                          <div><br>
                                                          <div
                                                          class="gmail_quote">On



                                                          Thu, Feb 7,
                                                          2013 at 10:30
                                                          PM, Justin
                                                          Richer <span
                                                          dir="ltr">&lt;<a
moz-do-not-send="true" href="mailto:jricher@mitre.org" target="_blank">jricher@mitre.org</a>&gt;</span>
                                                          wrote:<br>
                                                          <blockquote
                                                          class="gmail_quote"
                                                          style="margin:0
                                                          0 0
                                                          .8ex;border-left:1px
                                                          #ccc
                                                          solid;padding-left:1ex">
                                                          <div
                                                          bgcolor="#FFFFFF"
                                                          text="#000000">
                                                          It validates
                                                          the token,
                                                          which would be
                                                          either the
                                                          token itself
                                                          in the case of
                                                          Bearer or the
                                                          token "id"
                                                          part of
                                                          something more
                                                          complex like
                                                          MAC. It
                                                          doesn't
                                                          directly
                                                          validate the
                                                          usage of the
                                                          token, that's
                                                          still up to
                                                          the PR to do
                                                          that.<br>
                                                          <br>
                                                          I nearly added
                                                          a "token type"
                                                          field in this
                                                          draft, but
                                                          held back
                                                          because there
                                                          are several
                                                          kinds of
                                                          "token type"
                                                          that people
                                                          talk about in
                                                          OAuth. First,
                                                          there's
                                                          "Bearer" vs.
                                                          "MAC" vs.
                                                          "HOK", or what
                                                          have you. Then
                                                          within Bearer
                                                          you have "JWT"
                                                          or "SAML" or
                                                          "unstructured
                                                          blob". Then
                                                          you've also
                                                          got "access"
                                                          vs. "refresh"
                                                          and other
                                                          flavors of
                                                          token, like
                                                          the id_token
                                                          in OpenID
                                                          Connect. <br>
                                                          <br>
                                                          Thing is, the
                                                          server running
                                                          the
                                                          introspection
                                                          endpoint will
                                                          probably know
                                                          *all* of
                                                          these. But
                                                          should it tell
                                                          the client? If
                                                          so, which of
                                                          the three, and
                                                          what names
                                                          should the
                                                          fields be?<span><font
color="#888888"><br>
                                                          <br>
                                                          &nbsp;-- Justin</font></span>
                                                          <div>
                                                          <div><br>
                                                          <br>
                                                          <div>On
                                                          02/07/2013
                                                          11:26 AM,
                                                          Prabath
                                                          Siriwardena
                                                          wrote:<br>
                                                          </div>
                                                          <blockquote
                                                          type="cite">
                                                          Okay.. I was
                                                          thinking this
                                                          could be used
                                                          as a way to
                                                          validate the
                                                          token as well.
                                                          BTW even in
                                                          this case
                                                          shouldn't
                                                          communicate
                                                          the type of
                                                          token to AS?
                                                          For example in
                                                          the case of
                                                          SAML profile -
                                                          it could be
                                                          SAML token..
                                                          <div> <br>
                                                          </div>
                                                          <div>Thanks
                                                          &amp; regards,</div>
                                                          <div>-Prabath<br>
                                                          <br>
                                                          <div
                                                          class="gmail_quote">On



                                                          Thu, Feb 7,
                                                          2013 at 8:39
                                                          PM, Justin
                                                          Richer <span
                                                          dir="ltr">&lt;<a
moz-do-not-send="true" href="mailto:jricher@mitre.org" target="_blank">jricher@mitre.org</a>&gt;</span>
                                                          wrote:<br>
                                                          <blockquote
                                                          class="gmail_quote"
                                                          style="margin:0
                                                          0 0
                                                          .8ex;border-left:1px
                                                          #ccc
                                                          solid;padding-left:1ex">
                                                          <div
                                                          bgcolor="#FFFFFF"
                                                          text="#000000">
                                                          "valid" might
                                                          not be the
                                                          best term, but
                                                          it's meant to
                                                          be a field
                                                          where the
                                                          server says
                                                          "yes this
                                                          token is still
                                                          good" or "no
                                                          this token
                                                          isn't good
                                                          anymore". We
                                                          could instead
                                                          do this with
                                                          HTTP codes or
                                                          something but
                                                          I went with a
                                                          pure JSON
                                                          response.<span><font
color="#888888"><br>
                                                          <br>
                                                          &nbsp;-- Justin</font></span>
                                                          <div>
                                                          <div><br>
                                                          <br>
                                                          <div>On
                                                          02/06/2013
                                                          10:47 PM,
                                                          Prabath
                                                          Siriwardena
                                                          wrote:<br>
                                                          </div>
                                                          <blockquote
                                                          type="cite">
                                                          Hi Justin,
                                                          <div><br>
                                                          </div>
                                                          <div>I believe
                                                          this is
                                                          addressing one
                                                          of the key
                                                          missing part
                                                          in OAuth
                                                          2.0...</div>
                                                          <div><br>
                                                          </div>
                                                          <div>One
                                                          question - I
                                                          guess this was
                                                          discussed
                                                          already...</div>
                                                          <div><br>
                                                          </div>
                                                          <div>In the
                                                          spec - in the
                                                          introspection
                                                          response it
                                                          has the
                                                          attribute
                                                          "valid" - this
                                                          is basically
                                                          the validity
                                                          of the token
                                                          provided in
                                                          the request.</div>
                                                          <div><br>
                                                          </div>
                                                          <div>Validation&nbsp;criteria




                                                          depends on the
                                                          token and well
                                                          as token type
                                                          ( Bearer,
                                                          MAC..).</div>
                                                          <div><br>
                                                          </div>
                                                          <div>In the
                                                          spec it seems
                                                          like it's
                                                          coupled with
                                                          Bearer token
                                                          type... But I
                                                          guess, by
                                                          adding
                                                          "token_type"
                                                          to the request
                                                          we can remove
                                                          this
                                                          dependency.</div>
                                                          <div><br>
                                                          </div>
                                                          <div>WDYT..?</div>
                                                          <div><br>
                                                          </div>
                                                          <div>Thanks
                                                          &amp; regards,</div>
                                                          <div>-Prabath&nbsp;</div>
                                                          <div><br>
                                                          <div
                                                          class="gmail_quote">On




                                                          Thu, Feb 7,
                                                          2013 at 12:54
                                                          AM, Justin
                                                          Richer <span
                                                          dir="ltr">&lt;<a
moz-do-not-send="true" href="mailto:jricher@mitre.org" target="_blank">jricher@mitre.org</a>&gt;</span>
                                                          wrote:<br>
                                                          <blockquote
                                                          class="gmail_quote"
                                                          style="margin:0
                                                          0 0
                                                          .8ex;border-left:1px
                                                          #ccc
                                                          solid;padding-left:1ex">
                                                          <div
                                                          bgcolor="#FFFFFF"
                                                          text="#000000">
                                                          Updated
                                                          introspection
                                                          draft based on
                                                          recent
                                                          comments.
                                                          Changes
                                                          include:<br>
                                                          <br>
                                                          &nbsp;- "scope"
                                                          return
                                                          parameter now
                                                          follows
                                                          RFC6749 format
                                                          instead of
                                                          JSON array<br>
                                                          &nbsp;- "subject"
                                                          -&gt; "sub",
                                                          and "audience"
                                                          -&gt; "aud",
                                                          to be parallel
                                                          with JWT
                                                          claims<br>
                                                          &nbsp;- clarified
                                                          what happens
                                                          if the
                                                          authentication
                                                          is bad<br>
                                                          <br>
                                                          &nbsp;-- Justin<br>
                                                          <div><br>
                                                          <br>
                                                          --------
                                                          Original
                                                          Message
                                                          --------
                                                          <table
                                                          border="0"
                                                          cellpadding="0"
cellspacing="0">
                                                          <tbody>
                                                          <tr>
                                                          <th
                                                          align="RIGHT"
nowrap="nowrap" valign="BASELINE">Subject: </th>
                                                          <td>New
                                                          Version
                                                          Notification
                                                          for
                                                          draft-richer-oauth-introspection-02.txt</td>
                                                          </tr>
                                                          <tr>
                                                          <th
                                                          align="RIGHT"
nowrap="nowrap" valign="BASELINE">Date: </th>
                                                          <td>Wed, 6 Feb
                                                          2013 11:24:20
                                                          -0800</td>
                                                          </tr>
                                                          <tr>
                                                          <th
                                                          align="RIGHT"
nowrap="nowrap" valign="BASELINE">From: </th>
                                                          <td><a
                                                          moz-do-not-send="true"
href="mailto:internet-drafts@ietf.org" target="_blank">&lt;internet-drafts@ietf.org&gt;</a></td>
                                                          </tr>
                                                          <tr>
                                                          <th
                                                          align="RIGHT"
nowrap="nowrap" valign="BASELINE">To: </th>
                                                          <td><a
                                                          moz-do-not-send="true"
href="mailto:jricher@mitre.org" target="_blank">&lt;jricher@mitre.org&gt;</a></td>
                                                          </tr>
                                                          </tbody>
                                                          </table>
                                                          <br>
                                                          <br>
                                                          <pre>A new version of I-D, draft-richer-oauth-introspection-02.txt
has been successfully submitted by Justin Richer and posted to the
IETF repository.

Filename:	 draft-richer-oauth-introspection
Revision:	 02
Title:		 OAuth Token Introspection
Creation date:	 2013-02-06
WG ID:		 Individual Submission
Number of pages: 6
URL:             <a moz-do-not-send="true" href="http://www.ietf.org/internet-drafts/draft-richer-oauth-introspection-02.txt" target="_blank">http://www.ietf.org/internet-drafts/draft-richer-oauth-introspection-02.txt</a>
Status:          <a moz-do-not-send="true" href="http://datatracker.ietf.org/doc/draft-richer-oauth-introspection" target="_blank">http://datatracker.ietf.org/doc/draft-richer-oauth-introspection</a>
Htmlized:        <a moz-do-not-send="true" href="http://tools.ietf.org/html/draft-richer-oauth-introspection-02" target="_blank">http://tools.ietf.org/html/draft-richer-oauth-introspection-02</a>
Diff:            <a moz-do-not-send="true" href="http://www.ietf.org/rfcdiff?url2=draft-richer-oauth-introspection-02" target="_blank">http://www.ietf.org/rfcdiff?url2=draft-richer-oauth-introspection-02</a>

Abstract:
   This specification defines a method for a client or protected
   resource to query an OAuth authorization server to determine meta-
   information about an OAuth token.


                                                                                  


The IETF Secretariat

</pre>
                                                          <br>
                                                          </div>
                                                          <br>
                                                          </div>
                                                          <br>
_______________________________________________<br>
                                                          OAuth mailing
                                                          list<br>
                                                          <a
                                                          moz-do-not-send="true"
href="mailto:OAuth@ietf.org" target="_blank">OAuth@ietf.org</a><br>
                                                          <a
                                                          moz-do-not-send="true"
href="https://www.ietf.org/mailman/listinfo/oauth" target="_blank">https://www.ietf.org/mailman/listinfo/oauth</a><br>
                                                          <br>
                                                          </blockquote>
                                                          </div>
                                                          <br>
                                                          <br
                                                          clear="all">
                                                          <div><br>
                                                          </div>
                                                          -- <br>
                                                          Thanks &amp;
                                                          Regards,<br>
                                                          Prabath
                                                          <div><br>
                                                          </div>
                                                          <div>Mobile :
                                                          <a
                                                          moz-do-not-send="true"
href="tel:%2B94%2071%20809%206732" value="+94718096732" target="_blank">+94



                                                          71 809 6732</a>&nbsp;<br>
                                                          <br>
                                                          <a
                                                          moz-do-not-send="true"
href="http://blog.facilelogin.com" target="_blank">http://blog.facilelogin.com</a><br>
                                                          <a
                                                          moz-do-not-send="true"
href="http://RampartFAQ.com" target="_blank">http://RampartFAQ.com</a></div>
                                                          </div>
                                                          </blockquote>
                                                          <br>
                                                          </div>
                                                          </div>
                                                          </div>
                                                          </blockquote>
                                                          </div>
                                                          <br>
                                                          <br
                                                          clear="all">
                                                          <div><br>
                                                          </div>
                                                          -- <br>
                                                          Thanks &amp;
                                                          Regards,<br>
                                                          Prabath
                                                          <div><br>
                                                          </div>
                                                          <div>Mobile :
                                                          <a
                                                          moz-do-not-send="true"
href="tel:%2B94%2071%20809%206732" value="+94718096732" target="_blank">+94



                                                          71 809 6732</a>&nbsp;<br>
                                                          <br>
                                                          <a
                                                          moz-do-not-send="true"
href="http://blog.facilelogin.com" target="_blank">http://blog.facilelogin.com</a><br>
                                                          <a
                                                          moz-do-not-send="true"
href="http://RampartFAQ.com" target="_blank">http://RampartFAQ.com</a></div>
                                                          </div>
                                                          </blockquote>
                                                          <br>
                                                          </div>
                                                          </div>
                                                          </div>
                                                          </blockquote>
                                                          </div>
                                                          <br>
                                                          <br
                                                          clear="all">
                                                          <div><br>
                                                          </div>
                                                          -- <br>
                                                          Thanks &amp;
                                                          Regards,<br>
                                                          Prabath
                                                          <div><br>
                                                          </div>
                                                          <div>Mobile :
                                                          <a
                                                          moz-do-not-send="true"
href="tel:%2B94%2071%20809%206732" value="+94718096732" target="_blank">+94




                                                          71 809 6732</a>&nbsp;<br>
                                                          <br>
                                                          <a
                                                          moz-do-not-send="true"
href="http://blog.facilelogin.com" target="_blank">http://blog.facilelogin.com</a><br>
                                                          <a
                                                          moz-do-not-send="true"
href="http://RampartFAQ.com" target="_blank">http://RampartFAQ.com</a></div>
                                                          </div>
                                                          </blockquote>
                                                          <br>
                                                          </div>
                                                          </div>
                                                          </div>
                                                          </blockquote>
                                                          </div>
                                                          <br>
                                                          <br
                                                          clear="all">
                                                          <div><br>
                                                          </div>
                                                          -- <br>
                                                          Thanks &amp;
                                                          Regards,<br>
                                                          Prabath
                                                          <div><br>
                                                          </div>
                                                          <div>Mobile :
                                                          <a
                                                          moz-do-not-send="true"
href="tel:%2B94%2071%20809%206732" value="+94718096732" target="_blank">+94


                                                          71 809 6732</a>&nbsp;<br>
                                                          <br>
                                                          <a
                                                          moz-do-not-send="true"
href="http://blog.facilelogin.com" target="_blank">http://blog.facilelogin.com</a><br>
                                                          <a
                                                          moz-do-not-send="true"
href="http://RampartFAQ.com" target="_blank">http://RampartFAQ.com</a></div>
                                                          </div>
                                                          </div>
                                                          </blockquote>
                                                          <blockquote
                                                          type="cite">
                                                          <div><span>_______________________________________________</span><br>
                                                          <span>OAuth
                                                          mailing list</span><br>
                                                          <span><a
                                                          moz-do-not-send="true"
href="mailto:OAuth@ietf.org" target="_blank">OAuth@ietf.org</a></span><br>
                                                          <span><a
                                                          moz-do-not-send="true"
href="https://www.ietf.org/mailman/listinfo/oauth" target="_blank">https://www.ietf.org/mailman/listinfo/oauth</a></span><br>
                                                          </div>
                                                          </blockquote>
                                                          </blockquote>
                                                          <br>
                                                          </div>
                                                          </div>
                                                          </div>
                                                          </blockquote>
                                                          </div>
                                                          <br>
                                                          <br
                                                          clear="all">
                                                          <div><br>
                                                          </div>
                                                          -- <br>
                                                          Thanks &amp;
                                                          Regards,<br>
                                                          Prabath
                                                          <div><br>
                                                          </div>
                                                          <div>Mobile :
                                                          <a
                                                          moz-do-not-send="true"
href="tel:%2B94%2071%20809%206732" value="+94718096732" target="_blank">+94
                                                          71 809 6732</a>&nbsp;<br>
                                                          <br>
                                                          <a
                                                          moz-do-not-send="true"
href="http://blog.facilelogin.com" target="_blank">http://blog.facilelogin.com</a><br>
                                                          <a
                                                          moz-do-not-send="true"
href="http://RampartFAQ.com" target="_blank">http://RampartFAQ.com</a></div>
                                                          </div>
                                                          </div>
                                                          </div>
                                                          </blockquote>
                                                          </div>
                                                          <br>
                                                          <br
                                                          clear="all">
                                                          <div><br>
                                                          </div>
                                                          -- <br>
                                                          Thanks &amp;
                                                          Regards,<br>
                                                          Prabath
                                                          <div><br>
                                                          </div>
                                                          <div>Mobile :
                                                          <a
                                                          moz-do-not-send="true"
href="tel:%2B94%2071%20809%206732" value="+94718096732" target="_blank">+94


                                                          71 809 6732</a>&nbsp;<br>
                                                          <br>
                                                          <a
                                                          moz-do-not-send="true"
href="http://blog.facilelogin.com" target="_blank">http://blog.facilelogin.com</a><br>
                                                          <a
                                                          moz-do-not-send="true"
href="http://RampartFAQ.com" target="_blank">http://RampartFAQ.com</a></div>
                                                          </div>
                                                        </blockquote>
                                                        <br>
                                                      </div>
                                                    </div>
                                                  </div>
                                                </blockquote>
                                              </div>
                                              <br>
                                              <br clear="all">
                                              <div><br>
                                              </div>
                                              -- <br>
                                              Thanks &amp; Regards,<br>
                                              Prabath
                                              <div><br>
                                              </div>
                                              <div>Mobile : <a
                                                  moz-do-not-send="true"
href="tel:%2B94%2071%20809%206732" value="+94718096732" target="_blank">+94

                                                  71 809 6732</a>&nbsp;<br>
                                                <br>
                                                <a
                                                  moz-do-not-send="true"
href="http://blog.facilelogin.com" target="_blank">http://blog.facilelogin.com</a><br>
                                                <a
                                                  moz-do-not-send="true"
href="http://RampartFAQ.com" target="_blank">http://RampartFAQ.com</a></div>
                                            </div>
                                          </div>
                                        </div>
                                      </blockquote>
                                    </div>
                                    <br>
                                    <br clear="all">
                                    <div><br>
                                    </div>
                                    -- <br>
                                    Thanks &amp; Regards,<br>
                                    Prabath
                                    <div><br>
                                    </div>
                                    <div>Mobile : <a
                                        moz-do-not-send="true"
                                        href="tel:%2B94%2071%20809%206732"
                                        value="+94718096732"
                                        target="_blank">+94 71 809 6732</a>&nbsp;<br>
                                      <br>
                                      <a moz-do-not-send="true"
                                        href="http://blog.facilelogin.com"
                                        target="_blank">http://blog.facilelogin.com</a><br>
                                      <a moz-do-not-send="true"
                                        href="http://RampartFAQ.com"
                                        target="_blank">http://RampartFAQ.com</a></div>
                                  </div>
                                </blockquote>
                                <br>
                              </div>
                            </div>
                          </div>
                        </blockquote>
                      </div>
                      <br>
                      <br clear="all">
                      <div><br>
                      </div>
                      -- <br>
                      Thanks &amp; Regards,<br>
                      Prabath
                      <div><br>
                      </div>
                      <div>Mobile : <a moz-do-not-send="true"
                          href="tel:%2B94%2071%20809%206732"
                          value="+94718096732" target="_blank">+94 71
                          809 6732</a>&nbsp;<br>
                        <br>
                        <a moz-do-not-send="true"
                          href="http://blog.facilelogin.com"
                          target="_blank">http://blog.facilelogin.com</a><br>
                        <a moz-do-not-send="true"
                          href="http://RampartFAQ.com" target="_blank">http://RampartFAQ.com</a></div>
                    </div>
                  </blockquote>
                  <br>
                </div>
              </div>
            </div>
          </blockquote>
        </div>
        <br>
        <br clear="all">
        <div><br>
        </div>
        -- <br>
        Thanks &amp; Regards,<br>
        Prabath
        <div><br>
        </div>
        <div>Mobile : +94 71 809 6732&nbsp;<br>
          <br>
          <a moz-do-not-send="true" href="http://blog.facilelogin.com"
            target="_blank">http://blog.facilelogin.com</a><br>
          <a moz-do-not-send="true" href="http://RampartFAQ.com"
            target="_blank">http://RampartFAQ.com</a></div>
      </div>
    </blockquote>
    <br>
  </body>
</html>

--------------050307080309090507000504--

From prabath@wso2.com  Thu Feb 14 07:57:23 2013
Return-Path: <prabath@wso2.com>
X-Original-To: oauth@ietfa.amsl.com
Delivered-To: oauth@ietfa.amsl.com
Received: from localhost (localhost [127.0.0.1]) by ietfa.amsl.com (Postfix) with ESMTP id 56B7121F8802 for <oauth@ietfa.amsl.com>; Thu, 14 Feb 2013 07:57:23 -0800 (PST)
X-Virus-Scanned: amavisd-new at amsl.com
X-Spam-Flag: NO
X-Spam-Score: -2.889
X-Spam-Level: 
X-Spam-Status: No, score=-2.889 tagged_above=-999 required=5 tests=[AWL=0.088,  BAYES_00=-2.599, FM_FORGED_GMAIL=0.622, HTML_MESSAGE=0.001, RCVD_IN_DNSWL_LOW=-1]
Received: from mail.ietf.org ([64.170.98.30]) by localhost (ietfa.amsl.com [127.0.0.1]) (amavisd-new, port 10024) with ESMTP id KXWVyfBfFgRz for <oauth@ietfa.amsl.com>; Thu, 14 Feb 2013 07:57:20 -0800 (PST)
Received: from mail-ee0-f52.google.com (mail-ee0-f52.google.com [74.125.83.52]) by ietfa.amsl.com (Postfix) with ESMTP id 073C621F8561 for <oauth@ietf.org>; Thu, 14 Feb 2013 07:57:19 -0800 (PST)
Received: by mail-ee0-f52.google.com with SMTP id b15so1304743eek.25 for <oauth@ietf.org>; Thu, 14 Feb 2013 07:57:19 -0800 (PST)
X-Google-DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=google.com; s=20120113; h=mime-version:x-received:in-reply-to:references:date:message-id :subject:from:to:cc:content-type:x-gm-message-state; bh=wxfe81zS4yudK7Je/SdlRhMJVHkYUUdzp1n2fxNjl8Q=; b=kvZcUnlQsWDYvseRpqaBZWFVPVdGgi55T32z9Z6W0sCWTDZKf5O31QPtTCJ6RYaj82 pqvSbnrNSQbiETyWYpxAEFPUuZHXgk4jaFV8RhHeh+LJEDNh1YsLjsIGhYn7pPT8k0SM 08RwDJ19iZfTd57etXy3lQJOU2htlNF4x72K4j/SX3A2CCqEBwZp7QcO2VFG3wk52l2x jWcwlQCikglntVXB5/hy/edLwvHFCoLzhrNgpvFlyHiQ3VYDCFfwFDlakfHKRDN0ctYF VMMW8D1qdr/nrjpG1zr4aN+B2YlFAbA6TplEgv6dPHgO/nNemwaVHUBIodPVLp6eK4Ej ZJ2A==
MIME-Version: 1.0
X-Received: by 10.14.215.193 with SMTP id e41mr20568623eep.32.1360857439003; Thu, 14 Feb 2013 07:57:19 -0800 (PST)
Received: by 10.223.37.77 with HTTP; Thu, 14 Feb 2013 07:57:18 -0800 (PST)
In-Reply-To: <511CF8C5.70301@mitre.org>
References: <20130206192420.32698.21027.idtracker@ietfa.amsl.com> <5113C3AA.1040701@mitre.org> <CAJV9qO8BVV57eAb5kUNes15AYOpUKqw5XWQswh-FJA=b1pPgSA@mail.gmail.com> <5113DDB2.7060805@mitre.org> <CAJV9qO_gM1oera9ae9sqh9n17e-ZLKuC2pmsZwhq-RmFcMyqHA@mail.gmail.com> <51196777.6000502@mitre.org> <CAJV9qO-5bWZbNUfCmaqYBQoy-qwNaSZFOsO9GL3CrbSejwVTzw@mail.gmail.com> <F6595A40-6B4E-4718-ABB5-694CA975C4DB@maymount.com> <511A5062.5010108@mitre.org> <CAJV9qO_Mr87NX=KZRqCsWasQ1FuvDNBw14eS-TcPf_KRJztQFg@mail.gmail.com> <CAJV9qO-71-sM6kXOB6Fb_bvVkDBQ5JBbs8E5X=f-K=iEmGezRA@mail.gmail.com> <511CEEAA.3030801@mitre.org> <CAJV9qO-JSXgSTkw2_pdH0D-o-xDWGDqxx=PAWYtnTj4hOQXW4Q@mail.gmail.com> <CAJV9qO9=+kiO-s7vH_ewr7XjfVdDU24F0kuif504bP53dBr1TA@mail.gmail.com> <511CF3EF.8040008@mitre.org> <CAJV9qO8yKkrsV7d9JtDmbLY-fb5phh=ssKbEUuutkY53PgY8Vg@mail.gmail.com> <511CF4AB.5010700@mitre.org> <CAJV9qO9VmjSQnWKU3kF11x35ut=AsvQ8bjuz_CKpyCScGRiA2Q@mail.gmail.com> <511CF8C5.70301@mitre.org>
Date: Thu, 14 Feb 2013 21:27:18 +0530
Message-ID: <CAJV9qO_-kFsWxoJwTP_RWFrb6+3frg-36JocQoo8SrpyNBMSoA@mail.gmail.com>
From: Prabath Siriwardena <prabath@wso2.com>
To: Justin Richer <jricher@mitre.org>
Content-Type: multipart/alternative; boundary=e89a8f647ac33de3d904d5b1501f
X-Gm-Message-State: ALoCoQlIyfIMfyjun037PXg2MMp7NTmKGzBdjV3lc5bSqxbyu+8AVa4YZ2bWnQuR9cQb45WCe061
Cc: "oauth@ietf.org" <oauth@ietf.org>
Subject: Re: [OAUTH-WG] Fwd: New Version Notification for draft-richer-oauth-introspection-02.txt
X-BeenThere: oauth@ietf.org
X-Mailman-Version: 2.1.12
Precedence: list
List-Id: OAUTH WG <oauth.ietf.org>
List-Unsubscribe: <https://www.ietf.org/mailman/options/oauth>, <mailto:oauth-request@ietf.org?subject=unsubscribe>
List-Archive: <http://www.ietf.org/mail-archive/web/oauth>
List-Post: <mailto:oauth@ietf.org>
List-Help: <mailto:oauth-request@ietf.org?subject=help>
List-Subscribe: <https://www.ietf.org/mailman/listinfo/oauth>, <mailto:oauth-request@ietf.org?subject=subscribe>
X-List-Received-Date: Thu, 14 Feb 2013 15:57:23 -0000

--e89a8f647ac33de3d904d5b1501f
Content-Type: text/plain; charset=ISO-8859-1

Not quite convinced :-) Valid has a meaning attached to that..

In case we are going ahead with this please define it clearly in the draft
- with the one you shared in this thread.

Thanks & regards,
-Prabath

On Thu, Feb 14, 2013 at 8:16 PM, Justin Richer <jricher@mitre.org> wrote:

>
> On 02/14/2013 09:37 AM, Prabath Siriwardena wrote:
>
> The definition of valid is bit ambiguous in the draft...
>
>  Okay.. If that is the definition... and if we beak that in to parts...
>
>  "it hasn't expired" : In the response it self we have parameter for
> issued_at and and expires_at - so whether the token is not expired or not
> can even be derived at the requestor's end.
>
>
> If the token isn't good anymore, it doesn't matter when it was issued or
> when it was expired, just that it has.
>
>
>
>  "token was issued from here" : For this IMO we need to send an error
> code. Requestor has picked the wrong AS.
>
> We don't know if it came from another AS or if someone's just making
> things up. Either way it's not a good token.
>
>
>
>  The remaining is  "revoked".. That is why I proposed earlier - we better
> have an attribute "revoked" - instead of "valid" in the response..
>
>
> The end result of all three is the same: either the token is good, or it
> isn't. I think it's much simpler and more useful to leave it at that.
>
>  -- Justin
>
>
>
>  WDYT...?
>
>  Thanks & regards,
> -Prabath
>
>
> On Thu, Feb 14, 2013 at 7:58 PM, Justin Richer <jricher@mitre.org> wrote:
>
>>  Because it will be the one that issued the token in the first place.
>>
>> Validity means "token was issued from here, it hasn't been revoked, it
>> hasn't expired".
>>
>>  -- Justin
>>
>>
>> On 02/14/2013 09:28 AM, Prabath Siriwardena wrote:
>>
>> Okay. With out knowing the type of the token how can the AS validate the
>> token ? What is meant by the validity there?
>>
>>  Thanks & regards,
>> -Prabath
>>
>> On Thu, Feb 14, 2013 at 7:55 PM, Justin Richer <jricher@mitre.org> wrote:
>>
>>>  OK, I don't see the utility in that at all. What would it accomplish?
>>>
>>>  -- Justin
>>>
>>>
>>> On 02/14/2013 09:25 AM, Prabath Siriwardena wrote:
>>>
>>> To make it clear - my suggestion is to add token_type_hint to the
>>> introspection request. It can be from client to AS or from RS to AS.
>>>
>>>  Then AS can decide whether the provided token is valid or not and
>>> include "valid" attribute in the introspection response.
>>>
>>>  Thanks & regards,
>>> -Prabath
>>>
>>> On Thu, Feb 14, 2013 at 7:52 PM, Prabath Siriwardena <prabath@wso2.com>wrote:
>>>
>>>> Both the client and the resource owner should be aware of the token
>>>> type.
>>>>
>>>>  My argument is, if the authorization server to decide whether the
>>>> token is valid or not ( irrespective of who asked the question) - AS needs
>>>> to know the token type - because to validate a token AS should know the
>>>> token type.
>>>>
>>>>  The token type could be, bearer or MAC or any other token type.
>>>>
>>>>  Thanks & regards,
>>>> -Prabath
>>>>
>>>>
>>>> On Thu, Feb 14, 2013 at 7:33 PM, Justin Richer <jricher@mitre.org>wrote:
>>>>
>>>>>  What exactly are you suggesting be added to introspection? The
>>>>> "token_type_hint" is from the client to the server, but what you've asked
>>>>> for in terms of "token type" is from the server to the client. And there
>>>>> was never an answer to what exactly is meant by "token type" in this case,
>>>>> particularly because you seem to want to call out things like SAML and
>>>>> Bearer as separate types.
>>>>>
>>>>>  -- Justin
>>>>>
>>>>>
>>>>>
>>>>> On 02/14/2013 06:59 AM, Prabath Siriwardena wrote:
>>>>>
>>>>> I noticed that the latest Token Revocation draft [1] has introduced
>>>>> the parameter "token_type_hint". I would suggest the same here, as that
>>>>> would make what is meant by "valid" much clear..
>>>>>
>>>>>  [1]: http://tools.ietf.org/html/draft-ietf-oauth-revocation-05
>>>>>
>>>>>  Thanks & regards,
>>>>> -Prabath
>>>>>
>>>>> On Tue, Feb 12, 2013 at 9:35 PM, Prabath Siriwardena <prabath@wso2.com
>>>>> > wrote:
>>>>>
>>>>>> Hi Justin,
>>>>>>
>>>>>>  I doubt whether valid_token would make a difference..?
>>>>>>
>>>>>>  My initial argument is what is the validation criteria..?
>>>>>> Validation criteria depends on the token_type..
>>>>>>
>>>>>>  If we are talking only about metadata - then I believe "revoked",
>>>>>> "expired" would be more meaningful..
>>>>>>
>>>>>>  Thanks & regards,
>>>>>> -Prabath
>>>>>>
>>>>>>
>>>>>>  On Tue, Feb 12, 2013 at 7:53 PM, Justin Richer <jricher@mitre.org>wrote:
>>>>>>
>>>>>>>  OK, I can see the wisdom in changing this term.
>>>>>>>
>>>>>>> I picked "valid" because I wanted a simple "boolean" value that
>>>>>>> would require no additional parsing or string-matching on the client's
>>>>>>> behalf, and I'd like to stick with that. OAuth is built with the assumption
>>>>>>> that clients need to be able to recover from invalid tokens at any stage,
>>>>>>> so I think a simple yes/no is the right step here.
>>>>>>>
>>>>>>> That said, I think you're both right that "valid" seems to have
>>>>>>> caused a bit of confusion. I don't want to go with "revoked" because I'd
>>>>>>> rather have the "token is OK" be the positive boolean value.
>>>>>>>
>>>>>>> Would "valid_token" be more clear? Or do we need a different
>>>>>>> adjective all together?
>>>>>>>
>>>>>>>  -- Justin
>>>>>>>
>>>>>>>
>>>>>>> On 02/11/2013 08:02 PM, Richard Harrington wrote:
>>>>>>>
>>>>>>> Have you considered "status" instead of "valid"?  It could have
>>>>>>> values like "active", "expired", and "revoked".
>>>>>>>
>>>>>>>  Is it worthwhile including the status of the client also?  For
>>>>>>> example, a client application could be disabled, temporarily or
>>>>>>> permanently, and thus disabling its access tokens as well.
>>>>>>>
>>>>>>>
>>>>>>> On Feb 11, 2013, at 1:56 PM, Prabath Siriwardena <prabath@wso2.com>
>>>>>>> wrote:
>>>>>>>
>>>>>>>  I guess confusion is with 'valid' parameter is in the response..
>>>>>>>
>>>>>>>  I thought this will be helpful to standardize the communication
>>>>>>> between Resource Server and the Authorization Server..
>>>>>>>
>>>>>>>  I would suggest we completely remove "valid" from the response -
>>>>>>> or define it much clearly..
>>>>>>>
>>>>>>>  May be can add "revoked" with a boolean attribute..
>>>>>>>
>>>>>>>  Thanks & regards,
>>>>>>> -Prabath
>>>>>>>
>>>>>>> On Tue, Feb 12, 2013 at 3:19 AM, Justin Richer <jricher@mitre.org>wrote:
>>>>>>>
>>>>>>>>
>>>>>>>> On 02/08/2013 12:51 AM, Prabath Siriwardena wrote:
>>>>>>>>
>>>>>>>> Hi Justin,
>>>>>>>>
>>>>>>>>  I have couple of questions related to "valid" parameter...
>>>>>>>>
>>>>>>>>  This endpoint can be invoked by the Resource Server in runtime...
>>>>>>>>
>>>>>>>>
>>>>>>>> That's correct.
>>>>>>>>
>>>>>>>>
>>>>>>>>
>>>>>>>>  In that case what is exactly meant by the "resource_id" in
>>>>>>>> request ?
>>>>>>>>
>>>>>>>>
>>>>>>>>  The resource_id field is a service-specific string that basically
>>>>>>>> lets the resource server provide some context to the request to the auth
>>>>>>>> server. There have been some other suggestions like client IP address, but
>>>>>>>> I wanted to put this one in because it seemed to be a common theme. The
>>>>>>>> client is trying to do *something* with the token, after all, and the
>>>>>>>> rights, permissions, and metadata associated with the token could change
>>>>>>>> based on that. Since the Introspection endpoint is all about getting that
>>>>>>>> metadata back to the PR, this seemed like a good idea.
>>>>>>>>
>>>>>>>>
>>>>>>>>
>>>>>>>>  IMO a token to be valid depends on set of criteria based on it's
>>>>>>>> type..
>>>>>>>>
>>>>>>>>  For a Bearer token..
>>>>>>>>
>>>>>>>>  1. Token should not be expired
>>>>>>>> 2. Token should not be revoked.
>>>>>>>> 3. The scope the token issued should match with the scope required
>>>>>>>> for the resource.
>>>>>>>>
>>>>>>>>  For a MAC token...
>>>>>>>>
>>>>>>>>  1. Token not expired (mac id)
>>>>>>>> 2. Token should not be revoked
>>>>>>>> 3. The scope the token issued should match with the scope required
>>>>>>>> for the resource.
>>>>>>>> 4. HMAC check should be valid
>>>>>>>>
>>>>>>>>  There are similar conditions for SAML bearer too..
>>>>>>>>
>>>>>>>>
>>>>>>>>  This isn't really true. The SAML bearer token is fully
>>>>>>>> self-contained and doesn't change based on other parameters in the message,
>>>>>>>> unlike MAC. Same with JWT. When it hands a SAML or JWT token to the AS, the
>>>>>>>> PR has given *everything* the server needs to check that token's validity
>>>>>>>> and use.
>>>>>>>>
>>>>>>>> MAC signatures change with every message, and they're done across
>>>>>>>> several components of the HTTP message. Therefor, the HMAC check for MAC
>>>>>>>> style tokens will still need to be done by the protected resource.
>>>>>>>> Introspection would help in the case that the signature validated just
>>>>>>>> fine, but the token might have expired. Or you need to know what scopes
>>>>>>>> apply. Introspection isn't to fully validate the call to the protected
>>>>>>>> resource -- if that were the case, the PR would have to send some kind of
>>>>>>>> encapsulated version of the original request. Otherwise, the AS won't have
>>>>>>>> all of the information it needs to check the MAC.
>>>>>>>>
>>>>>>>>
>>>>>>>> I think what you're describing is ultimately *not* what the
>>>>>>>> introspection endpoint is intended to do. If that's unclear from the
>>>>>>>> document, can you please suggest text that would help clear the use case
>>>>>>>> up? I wouldn't want it to be ambiguous.
>>>>>>>>
>>>>>>>>  -- Justin
>>>>>>>>
>>>>>>>>
>>>>>>>>
>>>>>>>>  Thanks & regards,
>>>>>>>> -Prabath
>>>>>>>>
>>>>>>>>
>>>>>>>> On Thu, Feb 7, 2013 at 10:30 PM, Justin Richer <jricher@mitre.org>wrote:
>>>>>>>>
>>>>>>>>>  It validates the token, which would be either the token itself in
>>>>>>>>> the case of Bearer or the token "id" part of something more complex like
>>>>>>>>> MAC. It doesn't directly validate the usage of the token, that's still up
>>>>>>>>> to the PR to do that.
>>>>>>>>>
>>>>>>>>> I nearly added a "token type" field in this draft, but held back
>>>>>>>>> because there are several kinds of "token type" that people talk about in
>>>>>>>>> OAuth. First, there's "Bearer" vs. "MAC" vs. "HOK", or what have you. Then
>>>>>>>>> within Bearer you have "JWT" or "SAML" or "unstructured blob". Then you've
>>>>>>>>> also got "access" vs. "refresh" and other flavors of token, like the
>>>>>>>>> id_token in OpenID Connect.
>>>>>>>>>
>>>>>>>>> Thing is, the server running the introspection endpoint will
>>>>>>>>> probably know *all* of these. But should it tell the client? If so, which
>>>>>>>>> of the three, and what names should the fields be?
>>>>>>>>>
>>>>>>>>>  -- Justin
>>>>>>>>>
>>>>>>>>>
>>>>>>>>> On 02/07/2013 11:26 AM, Prabath Siriwardena wrote:
>>>>>>>>>
>>>>>>>>> Okay.. I was thinking this could be used as a way to validate the
>>>>>>>>> token as well. BTW even in this case shouldn't communicate the type of
>>>>>>>>> token to AS? For example in the case of SAML profile - it could be SAML
>>>>>>>>> token..
>>>>>>>>>
>>>>>>>>>  Thanks & regards,
>>>>>>>>> -Prabath
>>>>>>>>>
>>>>>>>>> On Thu, Feb 7, 2013 at 8:39 PM, Justin Richer <jricher@mitre.org>wrote:
>>>>>>>>>
>>>>>>>>>>  "valid" might not be the best term, but it's meant to be a field
>>>>>>>>>> where the server says "yes this token is still good" or "no this token
>>>>>>>>>> isn't good anymore". We could instead do this with HTTP codes or something
>>>>>>>>>> but I went with a pure JSON response.
>>>>>>>>>>
>>>>>>>>>>  -- Justin
>>>>>>>>>>
>>>>>>>>>>
>>>>>>>>>> On 02/06/2013 10:47 PM, Prabath Siriwardena wrote:
>>>>>>>>>>
>>>>>>>>>> Hi Justin,
>>>>>>>>>>
>>>>>>>>>>  I believe this is addressing one of the key missing part in
>>>>>>>>>> OAuth 2.0...
>>>>>>>>>>
>>>>>>>>>>  One question - I guess this was discussed already...
>>>>>>>>>>
>>>>>>>>>>  In the spec - in the introspection response it has the
>>>>>>>>>> attribute "valid" - this is basically the validity of the token provided in
>>>>>>>>>> the request.
>>>>>>>>>>
>>>>>>>>>>  Validation criteria depends on the token and well as token type
>>>>>>>>>> ( Bearer, MAC..).
>>>>>>>>>>
>>>>>>>>>>  In the spec it seems like it's coupled with Bearer token
>>>>>>>>>> type... But I guess, by adding "token_type" to the request we can remove
>>>>>>>>>> this dependency.
>>>>>>>>>>
>>>>>>>>>>  WDYT..?
>>>>>>>>>>
>>>>>>>>>>  Thanks & regards,
>>>>>>>>>> -Prabath
>>>>>>>>>>
>>>>>>>>>> On Thu, Feb 7, 2013 at 12:54 AM, Justin Richer <jricher@mitre.org
>>>>>>>>>> > wrote:
>>>>>>>>>>
>>>>>>>>>>>  Updated introspection draft based on recent comments. Changes
>>>>>>>>>>> include:
>>>>>>>>>>>
>>>>>>>>>>>  - "scope" return parameter now follows RFC6749 format instead
>>>>>>>>>>> of JSON array
>>>>>>>>>>>  - "subject" -> "sub", and "audience" -> "aud", to be parallel
>>>>>>>>>>> with JWT claims
>>>>>>>>>>>  - clarified what happens if the authentication is bad
>>>>>>>>>>>
>>>>>>>>>>>  -- Justin
>>>>>>>>>>>
>>>>>>>>>>>
>>>>>>>>>>> -------- Original Message --------  Subject: New Version
>>>>>>>>>>> Notification for draft-richer-oauth-introspection-02.txt  Date: Wed,
>>>>>>>>>>> 6 Feb 2013 11:24:20 -0800  From: <internet-drafts@ietf.org><internet-drafts@ietf.org>  To:
>>>>>>>>>>> <jricher@mitre.org> <jricher@mitre.org>
>>>>>>>>>>>
>>>>>>>>>>> A new version of I-D, draft-richer-oauth-introspection-02.txt
>>>>>>>>>>> has been successfully submitted by Justin Richer and posted to the
>>>>>>>>>>> IETF repository.
>>>>>>>>>>>
>>>>>>>>>>> Filename:	 draft-richer-oauth-introspection
>>>>>>>>>>> Revision:	 02
>>>>>>>>>>> Title:		 OAuth Token Introspection
>>>>>>>>>>> Creation date:	 2013-02-06
>>>>>>>>>>> WG ID:		 Individual Submission
>>>>>>>>>>> Number of pages: 6
>>>>>>>>>>> URL:             http://www.ietf.org/internet-drafts/draft-richer-oauth-introspection-02.txt
>>>>>>>>>>> Status:          http://datatracker.ietf.org/doc/draft-richer-oauth-introspection
>>>>>>>>>>> Htmlized:        http://tools.ietf.org/html/draft-richer-oauth-introspection-02
>>>>>>>>>>> Diff:            http://www.ietf.org/rfcdiff?url2=draft-richer-oauth-introspection-02
>>>>>>>>>>>
>>>>>>>>>>> Abstract:
>>>>>>>>>>>    This specification defines a method for a client or protected
>>>>>>>>>>>    resource to query an OAuth authorization server to determine meta-
>>>>>>>>>>>    information about an OAuth token.
>>>>>>>>>>>
>>>>>>>>>>>
>>>>>>>>>>>
>>>>>>>>>>>
>>>>>>>>>>>
>>>>>>>>>>> The IETF Secretariat
>>>>>>>>>>>
>>>>>>>>>>>
>>>>>>>>>>>
>>>>>>>>>>>
>>>>>>>>>>>
>>>>>>>>>>> _______________________________________________
>>>>>>>>>>> OAuth mailing list
>>>>>>>>>>> OAuth@ietf.org
>>>>>>>>>>> https://www.ietf.org/mailman/listinfo/oauth
>>>>>>>>>>>
>>>>>>>>>>>
>>>>>>>>>>
>>>>>>>>>>
>>>>>>>>>>  --
>>>>>>>>>> Thanks & Regards,
>>>>>>>>>> Prabath
>>>>>>>>>>
>>>>>>>>>>  Mobile : +94 71 809 6732 <%2B94%2071%20809%206732>
>>>>>>>>>>
>>>>>>>>>> http://blog.facilelogin.com
>>>>>>>>>> http://RampartFAQ.com
>>>>>>>>>>
>>>>>>>>>>
>>>>>>>>>>
>>>>>>>>>
>>>>>>>>>
>>>>>>>>>  --
>>>>>>>>> Thanks & Regards,
>>>>>>>>> Prabath
>>>>>>>>>
>>>>>>>>>  Mobile : +94 71 809 6732 <%2B94%2071%20809%206732>
>>>>>>>>>
>>>>>>>>> http://blog.facilelogin.com
>>>>>>>>> http://RampartFAQ.com
>>>>>>>>>
>>>>>>>>>
>>>>>>>>>
>>>>>>>>
>>>>>>>>
>>>>>>>>  --
>>>>>>>> Thanks & Regards,
>>>>>>>> Prabath
>>>>>>>>
>>>>>>>>  Mobile : +94 71 809 6732 <%2B94%2071%20809%206732>
>>>>>>>>
>>>>>>>> http://blog.facilelogin.com
>>>>>>>> http://RampartFAQ.com
>>>>>>>>
>>>>>>>>
>>>>>>>>
>>>>>>>
>>>>>>>
>>>>>>>  --
>>>>>>> Thanks & Regards,
>>>>>>> Prabath
>>>>>>>
>>>>>>>  Mobile : +94 71 809 6732 <%2B94%2071%20809%206732>
>>>>>>>
>>>>>>> http://blog.facilelogin.com
>>>>>>> http://RampartFAQ.com
>>>>>>>
>>>>>>>  _______________________________________________
>>>>>>> OAuth mailing list
>>>>>>> OAuth@ietf.org
>>>>>>> https://www.ietf.org/mailman/listinfo/oauth
>>>>>>>
>>>>>>>
>>>>>>>
>>>>>>
>>>>>>
>>>>>>  --
>>>>>> Thanks & Regards,
>>>>>> Prabath
>>>>>>
>>>>>>  Mobile : +94 71 809 6732 <%2B94%2071%20809%206732>
>>>>>>
>>>>>> http://blog.facilelogin.com
>>>>>> http://RampartFAQ.com
>>>>>>
>>>>>
>>>>>
>>>>>
>>>>>  --
>>>>> Thanks & Regards,
>>>>> Prabath
>>>>>
>>>>>  Mobile : +94 71 809 6732 <%2B94%2071%20809%206732>
>>>>>
>>>>> http://blog.facilelogin.com
>>>>> http://RampartFAQ.com
>>>>>
>>>>>
>>>>>
>>>>
>>>>
>>>>  --
>>>> Thanks & Regards,
>>>> Prabath
>>>>
>>>>  Mobile : +94 71 809 6732 <%2B94%2071%20809%206732>
>>>>
>>>> http://blog.facilelogin.com
>>>> http://RampartFAQ.com
>>>>
>>>
>>>
>>>
>>>  --
>>> Thanks & Regards,
>>> Prabath
>>>
>>>  Mobile : +94 71 809 6732
>>>
>>> http://blog.facilelogin.com
>>> http://RampartFAQ.com
>>>
>>>
>>>
>>
>>
>>  --
>> Thanks & Regards,
>> Prabath
>>
>>  Mobile : +94 71 809 6732 <%2B94%2071%20809%206732>
>>
>> http://blog.facilelogin.com
>> http://RampartFAQ.com
>>
>>
>>
>
>
>  --
> Thanks & Regards,
> Prabath
>
>  Mobile : +94 71 809 6732
>
> http://blog.facilelogin.com
> http://RampartFAQ.com
>
>
>


-- 
Thanks & Regards,
Prabath

Mobile : +94 71 809 6732

http://blog.facilelogin.com
http://RampartFAQ.com

--e89a8f647ac33de3d904d5b1501f
Content-Type: text/html; charset=ISO-8859-1
Content-Transfer-Encoding: quoted-printable

Not quite convinced :-) Valid has a meaning attached to that..<div><br></di=
v><div>In case we are going ahead with this please define it clearly in the=
 draft - with the one you shared in this thread.</div><div><br></div><div>
Thanks &amp; regards,</div><div>-Prabath<br><br><div class=3D"gmail_quote">=
On Thu, Feb 14, 2013 at 8:16 PM, Justin Richer <span dir=3D"ltr">&lt;<a hre=
f=3D"mailto:jricher@mitre.org" target=3D"_blank">jricher@mitre.org</a>&gt;<=
/span> wrote:<br>
<blockquote class=3D"gmail_quote" style=3D"margin:0 0 0 .8ex;border-left:1p=
x #ccc solid;padding-left:1ex">
 =20
   =20
 =20
  <div bgcolor=3D"#FFFFFF" text=3D"#000000"><div class=3D"im">
    <br>
    <div>On 02/14/2013 09:37 AM, Prabath
      Siriwardena wrote:<br>
    </div>
    <blockquote type=3D"cite">
     =20
      <div>The definition of valid is bit ambiguous=A0in the draft...</div>
      <div><br>
      </div>
      <div>Okay.. If that is the definition... and if we beak that in to
        parts...</div>
      <div><br>
      </div>
      <div>&quot;it hasn&#39;t expired&quot; : In the response it self we h=
ave
        parameter for issued_at and and expires_at - so whether the
        token is not expired or not can even be derived at the
        requestor&#39;s end.</div>
    </blockquote>
    <br></div>
    If the token isn&#39;t good anymore, it doesn&#39;t matter when it was
    issued or when it was expired, just that it has.<div class=3D"im"><br>
    <br>
    <blockquote type=3D"cite">
      <div><br>
      </div>
      <div>&quot;token was issued from here&quot; : For this IMO we need to=
 send
        an error code. Requestor has picked the wrong AS.</div>
    </blockquote></div>
    We don&#39;t know if it came from another AS or if someone&#39;s just m=
aking
    things up. Either way it&#39;s not a good token.<div class=3D"im"><br>
    <br>
    <blockquote type=3D"cite">
      <div><br>
      </div>
      <div>The remaining is =A0&quot;revoked&quot;.. That is why I
        proposed=A0earlier=A0- we better have an attribute &quot;revoked&qu=
ot; -
        instead of &quot;valid&quot; in the response..</div>
    </blockquote>
    <br></div>
    The end result of all three is the same: either the token is good,
    or it isn&#39;t. I think it&#39;s much simpler and more useful to leave=
 it
    at that.<span class=3D"HOEnZb"><font color=3D"#888888"><br>
    <br>
    =A0-- Justin</font></span><div><div class=3D"h5"><br>
    <br>
    <blockquote type=3D"cite">
      <div><br>
      </div>
      <div>WDYT...?</div>
      <div><br>
      </div>
      <div>Thanks &amp; regards,</div>
      <div>-Prabath</div>
      <div><br>
      </div>
      <div><br>
        <div class=3D"gmail_quote">On Thu, Feb 14, 2013 at 7:58 PM, Justin
          Richer <span dir=3D"ltr">&lt;<a href=3D"mailto:jricher@mitre.org"=
 target=3D"_blank">jricher@mitre.org</a>&gt;</span>
          wrote:<br>
          <blockquote class=3D"gmail_quote" style=3D"margin:0 0 0 .8ex;bord=
er-left:1px #ccc solid;padding-left:1ex">
            <div bgcolor=3D"#FFFFFF" text=3D"#000000"> Because it will be
              the one that issued the token in the first place. <br>
              <br>
              Validity means &quot;token was issued from here, it hasn&#39;=
t been
              revoked, it hasn&#39;t expired&quot;. <br>
              <span><font color=3D"#888888"> <br>
                  =A0-- Justin</font></span>
              <div>
                <div><br>
                  <br>
                  <div>On 02/14/2013 09:28 AM, Prabath Siriwardena
                    wrote:<br>
                  </div>
                  <blockquote type=3D"cite"> Okay. With out knowing the
                    type of the token how can the AS validate the token
                    ? What is meant by the validity there?
                    <div><br>
                    </div>
                    <div>Thanks &amp; regards,</div>
                    <div>-Prabath<br>
                      <br>
                      <div class=3D"gmail_quote">On Thu, Feb 14, 2013 at
                        7:55 PM, Justin Richer <span dir=3D"ltr">&lt;<a hre=
f=3D"mailto:jricher@mitre.org" target=3D"_blank">jricher@mitre.org</a>&gt;<=
/span>
                        wrote:<br>
                        <blockquote class=3D"gmail_quote" style=3D"margin:0=
 0 0 .8ex;border-left:1px #ccc solid;padding-left:1ex">
                          <div bgcolor=3D"#FFFFFF" text=3D"#000000"> OK, I
                            don&#39;t see the utility in that at all. What
                            would it accomplish?<span><font color=3D"#88888=
8"><br>
                                <br>
                                =A0-- Justin</font></span>
                            <div>
                              <div><br>
                                <br>
                                <div>On 02/14/2013 09:25 AM, Prabath
                                  Siriwardena wrote:<br>
                                </div>
                                <blockquote type=3D"cite"> To make it
                                  clear - my suggestion is to add
                                  token_type_hint to the introspection
                                  request. It can be from client to AS
                                  or from RS to AS.
                                  <div><br>
                                  </div>
                                  <div>Then AS can decide whether the
                                    provided token is valid or not and
                                    include &quot;valid&quot; attribute in =
the
                                    introspection response.</div>
                                  <div><br>
                                  </div>
                                  <div>Thanks &amp; regards,</div>
                                  <div>-Prabath<br>
                                    <br>
                                    <div class=3D"gmail_quote">On Thu, Feb
                                      14, 2013 at 7:52 PM, Prabath
                                      Siriwardena <span dir=3D"ltr">&lt;<a =
href=3D"mailto:prabath@wso2.com" target=3D"_blank">prabath@wso2.com</a>&gt;=
</span>
                                      wrote:<br>
                                      <blockquote class=3D"gmail_quote" sty=
le=3D"margin:0 0 0 .8ex;border-left:1px #ccc solid;padding-left:1ex">Both t=
he
                                        client and the resource owner
                                        should be aware of the token
                                        type.
                                        <div><br>
                                        </div>
                                        <div>My argument is, if the
                                          authorization server to decide
                                          whether the token is valid or
                                          not ( irrespective of who
                                          asked the question) - AS needs
                                          to know the token type -
                                          because to validate a token AS
                                          should know the token type.</div>
                                        <div><br>
                                        </div>
                                        <div>The token type could be,
                                          bearer or MAC or any other
                                          token type.</div>
                                        <div><br>
                                        </div>
                                        <div>Thanks &amp; regards,</div>
                                        <div>-Prabath
                                          <div>
                                            <div><br>
                                              <br>
                                              <div class=3D"gmail_quote">On
                                                Thu, Feb 14, 2013 at
                                                7:33 PM, Justin Richer <spa=
n dir=3D"ltr">&lt;<a href=3D"mailto:jricher@mitre.org" target=3D"_blank">jr=
icher@mitre.org</a>&gt;</span>
                                                wrote:<br>
                                                <blockquote class=3D"gmail_=
quote" style=3D"margin:0 0 0 .8ex;border-left:1px #ccc solid;padding-left:1=
ex">
                                                  <div bgcolor=3D"#FFFFFF" =
text=3D"#000000"> What
                                                    exactly are you
                                                    suggesting be added
                                                    to introspection?
                                                    The
                                                    &quot;token_type_hint&q=
uot; is
                                                    from the client to
                                                    the server, but what
                                                    you&#39;ve asked for in
                                                    terms of &quot;token
                                                    type&quot; is from the
                                                    server to the
                                                    client. And there
                                                    was never an answer
                                                    to what exactly is
                                                    meant by &quot;token
                                                    type&quot; in this case=
,
                                                    particularly because
                                                    you seem to want to
                                                    call out things like
                                                    SAML and Bearer as
                                                    separate types. <br>
                                                    <span><font color=3D"#8=
88888">
                                                        <br>
                                                        =A0-- Justin</font>=
</span>
                                                    <div>
                                                      <div><br>
                                                        <br>
                                                        <br>
                                                        <div>On
                                                          02/14/2013
                                                          06:59 AM,
                                                          Prabath
                                                          Siriwardena
                                                          wrote:<br>
                                                        </div>
                                                        <blockquote type=3D=
"cite"> I
                                                          noticed that
                                                          the latest
                                                          Token
                                                          Revocation
                                                          draft [1] has
                                                          introduced the
                                                          parameter
                                                          &quot;token_type_=
hint&quot;.
                                                          I would
                                                          suggest the
                                                          same here, as
                                                          that would
                                                          make what is
                                                          meant by
                                                          &quot;valid&quot;=
 much
                                                          clear..
                                                          <div><br>
                                                          </div>
                                                          <div>[1]:=A0<a hr=
ef=3D"http://tools.ietf.org/html/draft-ietf-oauth-revocation-05" style=3D"c=
olor:rgb(17,85,204);font-size:12.727272033691406px;font-family:arial,sans-s=
erif" target=3D"_blank">http://tools.ietf.org/html/draft-ietf-oauth-revocat=
ion-05</a></div>

                                                          <div><br>
                                                          </div>
                                                          <div>Thanks
                                                          &amp; regards,</d=
iv>
                                                          <div>-Prabath<br>
                                                          <br>
                                                          <div class=3D"gma=
il_quote">On

                                                          Tue, Feb 12,
                                                          2013 at 9:35
                                                          PM, Prabath
                                                          Siriwardena <span=
 dir=3D"ltr">&lt;<a href=3D"mailto:prabath@wso2.com" target=3D"_blank">prab=
ath@wso2.com</a>&gt;</span>
                                                          wrote:<br>
                                                          <blockquote class=
=3D"gmail_quote" style=3D"margin:0 0 0 .8ex;border-left:1px #ccc solid;padd=
ing-left:1ex">Hi

                                                          Justin,
                                                          <div><br>
                                                          </div>
                                                          <div>I doubt
                                                          whether
                                                          valid_token
                                                          would make a
                                                          difference..?</di=
v>
                                                          <div><br>
                                                          </div>
                                                          <div>My
                                                          initial
                                                          argument is
                                                          what is the
                                                          validation
                                                          criteria..?
                                                          Validation
                                                          criteria
                                                          depends on the
                                                          token_type..</div=
>
                                                          <div> <br>
                                                          </div>
                                                          <div>If we are
                                                          talking only
                                                          about metadata
                                                          - then I
                                                          believe
                                                          &quot;revoked&quo=
t;,
                                                          &quot;expired&quo=
t;
                                                          would be more
                                                          meaningful..</div=
>
                                                          <div><br>
                                                          </div>
                                                          <div>Thanks
                                                          &amp; regards,</d=
iv>
                                                          <div>-Prabath
                                                          <div>
                                                          <div> <br>
                                                          <br>
                                                          <div class=3D"gma=
il_quote">
                                                          On Tue, Feb
                                                          12, 2013 at
                                                          7:53 PM,
                                                          Justin Richer
                                                          <span dir=3D"ltr"=
>&lt;<a href=3D"mailto:jricher@mitre.org" target=3D"_blank">jricher@mitre.o=
rg</a>&gt;</span>
                                                          wrote:<br>
                                                          <blockquote class=
=3D"gmail_quote" style=3D"margin:0 0 0 .8ex;border-left:1px #ccc solid;padd=
ing-left:1ex">
                                                          <div bgcolor=3D"#=
FFFFFF" text=3D"#000000">
                                                          OK, I can see
                                                          the wisdom in
                                                          changing this
                                                          term. <br>
                                                          <br>
                                                          I picked
                                                          &quot;valid&quot;
                                                          because I
                                                          wanted a
                                                          simple
                                                          &quot;boolean&quo=
t;
                                                          value that
                                                          would require
                                                          no additional
                                                          parsing or
                                                          string-matching
                                                          on the
                                                          client&#39;s
                                                          behalf, and
                                                          I&#39;d like to
                                                          stick with
                                                          that. OAuth is
                                                          built with the
                                                          assumption
                                                          that clients
                                                          need to be
                                                          able to
                                                          recover from
                                                          invalid tokens
                                                          at any stage,
                                                          so I think a
                                                          simple yes/no
                                                          is the right
                                                          step here. <br>
                                                          <br>
                                                          That said, I
                                                          think you&#39;re
                                                          both right
                                                          that &quot;valid&=
quot;
                                                          seems to have
                                                          caused a bit
                                                          of confusion.
                                                          I don&#39;t want
                                                          to go with
                                                          &quot;revoked&quo=
t;
                                                          because I&#39;d
                                                          rather have
                                                          the &quot;token i=
s
                                                          OK&quot; be the
                                                          positive
                                                          boolean value.
                                                          <br>
                                                          <br>
                                                          Would
                                                          &quot;valid_token=
&quot;
                                                          be more clear?
                                                          Or do we need
                                                          a different
                                                          adjective all
                                                          together?<span><f=
ont color=3D"#888888"><br>
                                                          <br>
                                                          =A0-- Justin</fon=
t></span>
                                                          <div>
                                                          <div><br>
                                                          <br>
                                                          <div>On
                                                          02/11/2013
                                                          08:02 PM,
                                                          Richard
                                                          Harrington
                                                          wrote:<br>
                                                          </div>
                                                          <blockquote type=
=3D"cite">
                                                          <div>Have you
                                                          considered
                                                          &quot;status&quot=
;
                                                          instead of
                                                          &quot;valid&quot;=
? =A0It
                                                          could have
                                                          values like
                                                          &quot;active&quot=
;,
                                                          &quot;expired&quo=
t;, and
                                                          &quot;revoked&quo=
t;.</div>
                                                          <div><br>
                                                          </div>
                                                          <div>Is it
                                                          worthwhile
                                                          including the
                                                          status of the
                                                          client also?
                                                          =A0For example,
                                                          a client
                                                          application
                                                          could be
                                                          disabled,
                                                          temporarily or
                                                          permanently,
                                                          and thus
                                                          disabling its
                                                          access tokens
                                                          as well.</div>
                                                          <div><br>
                                                          </div>
                                                          <div><br>
                                                          On Feb 11,
                                                          2013, at 1:56
                                                          PM, Prabath
                                                          Siriwardena
                                                          &lt;<a href=3D"ma=
ilto:prabath@wso2.com" target=3D"_blank">prabath@wso2.com</a>&gt;
                                                          wrote:<br>
                                                          <br>
                                                          </div>
                                                          <blockquote type=
=3D"cite">
                                                          <div>I guess
                                                          confusion is
                                                          with &#39;valid&#=
39;
                                                          parameter is
                                                          in the
                                                          response..
                                                          <div><br>
                                                          </div>
                                                          <div>I thought
                                                          this will be
                                                          helpful
                                                          to=A0standardize=
=A0the
                                                          communication
                                                          between
                                                          Resource
                                                          Server and the
                                                          Authorization
                                                          Server..</div>
                                                          <div><br>
                                                          </div>
                                                          <div>I would
                                                          suggest we
                                                          completely
                                                          remove &quot;vali=
d&quot;
                                                          from the
                                                          response - or
                                                          define it much
                                                          clearly..</div>
                                                          <div><br>
                                                          </div>
                                                          <div>May be
                                                          can add
                                                          &quot;revoked&quo=
t; with
                                                          a boolean
                                                          attribute..</div>
                                                          <div><br>
                                                          </div>
                                                          <div>Thanks
                                                          &amp; regards,</d=
iv>
                                                          <div>-Prabath<br>
                                                          <br>
                                                          <div class=3D"gma=
il_quote">On


                                                          Tue, Feb 12,
                                                          2013 at 3:19
                                                          AM, Justin
                                                          Richer <span dir=
=3D"ltr">&lt;<a href=3D"mailto:jricher@mitre.org" target=3D"_blank">jricher=
@mitre.org</a>&gt;</span>
                                                          wrote:<br>
                                                          <blockquote class=
=3D"gmail_quote" style=3D"margin:0 0 0 .8ex;border-left:1px #ccc solid;padd=
ing-left:1ex">
                                                          <div bgcolor=3D"#=
FFFFFF" text=3D"#000000">
                                                          <div> <br>
                                                          <div>On
                                                          02/08/2013
                                                          12:51 AM,
                                                          Prabath
                                                          Siriwardena
                                                          wrote:<br>
                                                          </div>
                                                          </div>
                                                          <blockquote type=
=3D"cite">
                                                          Hi=A0Justin,
                                                          <div><br>
                                                          </div>
                                                          <div>
                                                          <div>I have
                                                          couple of
                                                          questions
                                                          related to
                                                          &quot;valid&quot;
                                                          parameter...</div=
>
                                                          <div><br>
                                                          </div>
                                                          <div>This
                                                          endpoint can
                                                          be invoked by
                                                          the Resource
                                                          Server in
                                                          runtime...</div>
                                                          </div>
                                                          </blockquote>
                                                          <br>
                                                          That&#39;s
                                                          correct.
                                                          <div><br>
                                                          <br>
                                                          <blockquote type=
=3D"cite">
                                                          <div><br>
                                                          </div>
                                                          <div>In that
                                                          case what is
                                                          exactly meant
                                                          by the
                                                          &quot;resource_id=
&quot;
                                                          in request ?</div=
>
                                                          </blockquote>
                                                          <br>
                                                          </div>
                                                          The
                                                          resource_id
                                                          field is a
                                                          service-specific
                                                          string that
                                                          basically lets
                                                          the resource
                                                          server provide
                                                          some context
                                                          to the request
                                                          to the auth
                                                          server. There
                                                          have been some
                                                          other
                                                          suggestions
                                                          like client IP
                                                          address, but I
                                                          wanted to put
                                                          this one in
                                                          because it
                                                          seemed to be a
                                                          common theme.
                                                          The client is
                                                          trying to do
                                                          *something*
                                                          with the
                                                          token, after
                                                          all, and the
                                                          rights,
                                                          permissions,
                                                          and metadata
                                                          associated
                                                          with the token
                                                          could change
                                                          based on that.
                                                          Since the
                                                          Introspection
                                                          endpoint is
                                                          all about
                                                          getting that
                                                          metadata back
                                                          to the PR,
                                                          this seemed
                                                          like a good
                                                          idea.
                                                          <div><br>
                                                          <br>
                                                          <blockquote type=
=3D"cite">
                                                          <div><br>
                                                          </div>
                                                          <div>IMO a
                                                          token to be
                                                          valid depends
                                                          on set of
                                                          criteria based
                                                          on it&#39;s type.=
.</div>
                                                          <div><br>
                                                          </div>
                                                          <div>For a
                                                          Bearer token..</d=
iv>
                                                          <div><br>
                                                          </div>
                                                          <div>1. Token
                                                          should not be
                                                          expired</div>
                                                          <div>2. Token
                                                          should not be
                                                          revoked.</div>
                                                          <div>3. The
                                                          scope the
                                                          token issued
                                                          should match
                                                          with the scope
                                                          required for
                                                          the resource.</di=
v>
                                                          <div><br>
                                                          </div>
                                                          <div>For a MAC
                                                          token...</div>
                                                          <div><br>
                                                          </div>
                                                          <div>1. Token
                                                          not expired
                                                          (mac id)</div>
                                                          <div>2. Token
                                                          should not be
                                                          revoked</div>
                                                          <div>3. The
                                                          scope the
                                                          token issued
                                                          should match
                                                          with the scope
                                                          required for
                                                          the resource.</di=
v>
                                                          <div>4. HMAC
                                                          check should
                                                          be valid</div>
                                                          <div><br>
                                                          </div>
                                                          There are
                                                          similar
                                                          conditions for
                                                          SAML bearer
                                                          too..</blockquote=
>
                                                          <br>
                                                          </div>
                                                          This isn&#39;t
                                                          really true.
                                                          The SAML
                                                          bearer token
                                                          is fully
                                                          self-contained
                                                          and doesn&#39;t
                                                          change based
                                                          on other
                                                          parameters in
                                                          the message,
                                                          unlike MAC.
                                                          Same with JWT.
                                                          When it hands
                                                          a SAML or JWT
                                                          token to the
                                                          AS, the PR has
                                                          given
                                                          *everything*
                                                          the server
                                                          needs to check
                                                          that token&#39;s
                                                          validity and
                                                          use. <br>
                                                          <br>
                                                          MAC signatures
                                                          change with
                                                          every message,
                                                          and they&#39;re
                                                          done across
                                                          several
                                                          components of
                                                          the HTTP
                                                          message.
                                                          Therefor, the
                                                          HMAC check for
                                                          MAC style
                                                          tokens will
                                                          still need to
                                                          be done by the
                                                          protected
                                                          resource.
                                                          Introspection
                                                          would help in
                                                          the case that
                                                          the signature
                                                          validated just
                                                          fine, but the
                                                          token might
                                                          have expired.
                                                          Or you need to
                                                          know what
                                                          scopes apply.
                                                          Introspection
                                                          isn&#39;t to full=
y
                                                          validate the
                                                          call to the
                                                          protected
                                                          resource -- if
                                                          that were the
                                                          case, the PR
                                                          would have to
                                                          send some kind
                                                          of
                                                          encapsulated
                                                          version of the
                                                          original
                                                          request.
                                                          Otherwise, the
                                                          AS won&#39;t have
                                                          all of the
                                                          information it
                                                          needs to check
                                                          the MAC.<br>
                                                          <br>
                                                          <br>
                                                          I think what
                                                          you&#39;re
                                                          describing is
                                                          ultimately
                                                          *not* what the
                                                          introspection
                                                          endpoint is
                                                          intended to
                                                          do. If that&#39;s
                                                          unclear from
                                                          the document,
                                                          can you please
                                                          suggest text
                                                          that would
                                                          help clear the
                                                          use case up? I
                                                          wouldn&#39;t want
                                                          it to be
                                                          ambiguous.<span><=
font color=3D"#888888"><br>
                                                          <br>
                                                          =A0-- Justin</fon=
t></span>
                                                          <div>
                                                          <div><br>
                                                          <br>
                                                          <blockquote type=
=3D"cite">
                                                          <div><br>
                                                          </div>
                                                          <div>Thanks
                                                          &amp; regards,</d=
iv>
                                                          <div>-Prabath</di=
v>
                                                          <div><br>
                                                          </div>
                                                          <div><br>
                                                          <div class=3D"gma=
il_quote">On



                                                          Thu, Feb 7,
                                                          2013 at 10:30
                                                          PM, Justin
                                                          Richer <span dir=
=3D"ltr">&lt;<a href=3D"mailto:jricher@mitre.org" target=3D"_blank">jricher=
@mitre.org</a>&gt;</span>
                                                          wrote:<br>
                                                          <blockquote class=
=3D"gmail_quote" style=3D"margin:0 0 0 .8ex;border-left:1px #ccc solid;padd=
ing-left:1ex">
                                                          <div bgcolor=3D"#=
FFFFFF" text=3D"#000000">
                                                          It validates
                                                          the token,
                                                          which would be
                                                          either the
                                                          token itself
                                                          in the case of
                                                          Bearer or the
                                                          token &quot;id&qu=
ot;
                                                          part of
                                                          something more
                                                          complex like
                                                          MAC. It
                                                          doesn&#39;t
                                                          directly
                                                          validate the
                                                          usage of the
                                                          token, that&#39;s
                                                          still up to
                                                          the PR to do
                                                          that.<br>
                                                          <br>
                                                          I nearly added
                                                          a &quot;token typ=
e&quot;
                                                          field in this
                                                          draft, but
                                                          held back
                                                          because there
                                                          are several
                                                          kinds of
                                                          &quot;token type&=
quot;
                                                          that people
                                                          talk about in
                                                          OAuth. First,
                                                          there&#39;s
                                                          &quot;Bearer&quot=
; vs.
                                                          &quot;MAC&quot; v=
s.
                                                          &quot;HOK&quot;, =
or what
                                                          have you. Then
                                                          within Bearer
                                                          you have &quot;JW=
T&quot;
                                                          or &quot;SAML&quo=
t; or
                                                          &quot;unstructure=
d
                                                          blob&quot;. Then
                                                          you&#39;ve also
                                                          got &quot;access&=
quot;
                                                          vs. &quot;refresh=
&quot;
                                                          and other
                                                          flavors of
                                                          token, like
                                                          the id_token
                                                          in OpenID
                                                          Connect. <br>
                                                          <br>
                                                          Thing is, the
                                                          server running
                                                          the
                                                          introspection
                                                          endpoint will
                                                          probably know
                                                          *all* of
                                                          these. But
                                                          should it tell
                                                          the client? If
                                                          so, which of
                                                          the three, and
                                                          what names
                                                          should the
                                                          fields be?<span><=
font color=3D"#888888"><br>
                                                          <br>
                                                          =A0-- Justin</fon=
t></span>
                                                          <div>
                                                          <div><br>
                                                          <br>
                                                          <div>On
                                                          02/07/2013
                                                          11:26 AM,
                                                          Prabath
                                                          Siriwardena
                                                          wrote:<br>
                                                          </div>
                                                          <blockquote type=
=3D"cite">
                                                          Okay.. I was
                                                          thinking this
                                                          could be used
                                                          as a way to
                                                          validate the
                                                          token as well.
                                                          BTW even in
                                                          this case
                                                          shouldn&#39;t
                                                          communicate
                                                          the type of
                                                          token to AS?
                                                          For example in
                                                          the case of
                                                          SAML profile -
                                                          it could be
                                                          SAML token..
                                                          <div> <br>
                                                          </div>
                                                          <div>Thanks
                                                          &amp; regards,</d=
iv>
                                                          <div>-Prabath<br>
                                                          <br>
                                                          <div class=3D"gma=
il_quote">On



                                                          Thu, Feb 7,
                                                          2013 at 8:39
                                                          PM, Justin
                                                          Richer <span dir=
=3D"ltr">&lt;<a href=3D"mailto:jricher@mitre.org" target=3D"_blank">jricher=
@mitre.org</a>&gt;</span>
                                                          wrote:<br>
                                                          <blockquote class=
=3D"gmail_quote" style=3D"margin:0 0 0 .8ex;border-left:1px #ccc solid;padd=
ing-left:1ex">
                                                          <div bgcolor=3D"#=
FFFFFF" text=3D"#000000">
                                                          &quot;valid&quot;=
 might
                                                          not be the
                                                          best term, but
                                                          it&#39;s meant to
                                                          be a field
                                                          where the
                                                          server says
                                                          &quot;yes this
                                                          token is still
                                                          good&quot; or &qu=
ot;no
                                                          this token
                                                          isn&#39;t good
                                                          anymore&quot;. We
                                                          could instead
                                                          do this with
                                                          HTTP codes or
                                                          something but
                                                          I went with a
                                                          pure JSON
                                                          response.<span><f=
ont color=3D"#888888"><br>
                                                          <br>
                                                          =A0-- Justin</fon=
t></span>
                                                          <div>
                                                          <div><br>
                                                          <br>
                                                          <div>On
                                                          02/06/2013
                                                          10:47 PM,
                                                          Prabath
                                                          Siriwardena
                                                          wrote:<br>
                                                          </div>
                                                          <blockquote type=
=3D"cite">
                                                          Hi Justin,
                                                          <div><br>
                                                          </div>
                                                          <div>I believe
                                                          this is
                                                          addressing one
                                                          of the key
                                                          missing part
                                                          in OAuth
                                                          2.0...</div>
                                                          <div><br>
                                                          </div>
                                                          <div>One
                                                          question - I
                                                          guess this was
                                                          discussed
                                                          already...</div>
                                                          <div><br>
                                                          </div>
                                                          <div>In the
                                                          spec - in the
                                                          introspection
                                                          response it
                                                          has the
                                                          attribute
                                                          &quot;valid&quot;=
 - this
                                                          is basically
                                                          the validity
                                                          of the token
                                                          provided in
                                                          the request.</div=
>
                                                          <div><br>
                                                          </div>
                                                          <div>Validation=
=A0criteria




                                                          depends on the
                                                          token and well
                                                          as token type
                                                          ( Bearer,
                                                          MAC..).</div>
                                                          <div><br>
                                                          </div>
                                                          <div>In the
                                                          spec it seems
                                                          like it&#39;s
                                                          coupled with
                                                          Bearer token
                                                          type... But I
                                                          guess, by
                                                          adding
                                                          &quot;token_type&=
quot;
                                                          to the request
                                                          we can remove
                                                          this
                                                          dependency.</div>
                                                          <div><br>
                                                          </div>
                                                          <div>WDYT..?</div=
>
                                                          <div><br>
                                                          </div>
                                                          <div>Thanks
                                                          &amp; regards,</d=
iv>
                                                          <div>-Prabath=A0<=
/div>
                                                          <div><br>
                                                          <div class=3D"gma=
il_quote">On




                                                          Thu, Feb 7,
                                                          2013 at 12:54
                                                          AM, Justin
                                                          Richer <span dir=
=3D"ltr">&lt;<a href=3D"mailto:jricher@mitre.org" target=3D"_blank">jricher=
@mitre.org</a>&gt;</span>
                                                          wrote:<br>
                                                          <blockquote class=
=3D"gmail_quote" style=3D"margin:0 0 0 .8ex;border-left:1px #ccc solid;padd=
ing-left:1ex">
                                                          <div bgcolor=3D"#=
FFFFFF" text=3D"#000000">
                                                          Updated
                                                          introspection
                                                          draft based on
                                                          recent
                                                          comments.
                                                          Changes
                                                          include:<br>
                                                          <br>
                                                          =A0- &quot;scope&=
quot;
                                                          return
                                                          parameter now
                                                          follows
                                                          RFC6749 format
                                                          instead of
                                                          JSON array<br>
                                                          =A0- &quot;subjec=
t&quot;
                                                          -&gt; &quot;sub&q=
uot;,
                                                          and &quot;audienc=
e&quot;
                                                          -&gt; &quot;aud&q=
uot;,
                                                          to be parallel
                                                          with JWT
                                                          claims<br>
                                                          =A0- clarified
                                                          what happens
                                                          if the
                                                          authentication
                                                          is bad<br>
                                                          <br>
                                                          =A0-- Justin<br>
                                                          <div><br>
                                                          <br>
                                                          --------
                                                          Original
                                                          Message
                                                          --------
                                                          <table border=3D"=
0" cellpadding=3D"0" cellspacing=3D"0">
                                                          <tbody>
                                                          <tr>
                                                          <th align=3D"RIGH=
T" nowrap valign=3D"BASELINE">Subject: </th>
                                                          <td>New
                                                          Version
                                                          Notification
                                                          for
                                                          draft-richer-oaut=
h-introspection-02.txt</td>
                                                          </tr>
                                                          <tr>
                                                          <th align=3D"RIGH=
T" nowrap valign=3D"BASELINE">Date: </th>
                                                          <td>Wed, 6 Feb
                                                          2013 11:24:20
                                                          -0800</td>
                                                          </tr>
                                                          <tr>
                                                          <th align=3D"RIGH=
T" nowrap valign=3D"BASELINE">From: </th>
                                                          <td><a href=3D"ma=
ilto:internet-drafts@ietf.org" target=3D"_blank">&lt;internet-drafts@ietf.o=
rg&gt;</a></td>
                                                          </tr>
                                                          <tr>
                                                          <th align=3D"RIGH=
T" nowrap valign=3D"BASELINE">To: </th>
                                                          <td><a href=3D"ma=
ilto:jricher@mitre.org" target=3D"_blank">&lt;jricher@mitre.org&gt;</a></td=
>
                                                          </tr>
                                                          </tbody>
                                                          </table>
                                                          <br>
                                                          <br>
                                                          <pre>A new versio=
n of I-D, draft-richer-oauth-introspection-02.txt
has been successfully submitted by Justin Richer and posted to the
IETF repository.

Filename:	 draft-richer-oauth-introspection
Revision:	 02
Title:		 OAuth Token Introspection
Creation date:	 2013-02-06
WG ID:		 Individual Submission
Number of pages: 6
URL:             <a href=3D"http://www.ietf.org/internet-drafts/draft-riche=
r-oauth-introspection-02.txt" target=3D"_blank">http://www.ietf.org/interne=
t-drafts/draft-richer-oauth-introspection-02.txt</a>
Status:          <a href=3D"http://datatracker.ietf.org/doc/draft-richer-oa=
uth-introspection" target=3D"_blank">http://datatracker.ietf.org/doc/draft-=
richer-oauth-introspection</a>
Htmlized:        <a href=3D"http://tools.ietf.org/html/draft-richer-oauth-i=
ntrospection-02" target=3D"_blank">http://tools.ietf.org/html/draft-richer-=
oauth-introspection-02</a>
Diff:            <a href=3D"http://www.ietf.org/rfcdiff?url2=3Ddraft-richer=
-oauth-introspection-02" target=3D"_blank">http://www.ietf.org/rfcdiff?url2=
=3Ddraft-richer-oauth-introspection-02</a>

Abstract:
   This specification defines a method for a client or protected
   resource to query an OAuth authorization server to determine meta-
   information about an OAuth token.


                                                                           =
      =20


The IETF Secretariat

</pre>
                                                          <br>
                                                          </div>
                                                          <br>
                                                          </div>
                                                          <br>
_______________________________________________<br>
                                                          OAuth mailing
                                                          list<br>
                                                          <a href=3D"mailto=
:OAuth@ietf.org" target=3D"_blank">OAuth@ietf.org</a><br>
                                                          <a href=3D"https:=
//www.ietf.org/mailman/listinfo/oauth" target=3D"_blank">https://www.ietf.o=
rg/mailman/listinfo/oauth</a><br>
                                                          <br>
                                                          </blockquote>
                                                          </div>
                                                          <br>
                                                          <br clear=3D"all"=
>
                                                          <div><br>
                                                          </div>
                                                          -- <br>
                                                          Thanks &amp;
                                                          Regards,<br>
                                                          Prabath
                                                          <div><br>
                                                          </div>
                                                          <div>Mobile :
                                                          <a href=3D"tel:%2=
B94%2071%20809%206732" value=3D"+94718096732" target=3D"_blank">+94



                                                          71 809 6732</a>=
=A0<br>
                                                          <br>
                                                          <a href=3D"http:/=
/blog.facilelogin.com" target=3D"_blank">http://blog.facilelogin.com</a><br=
>
                                                          <a href=3D"http:/=
/RampartFAQ.com" target=3D"_blank">http://RampartFAQ.com</a></div>
                                                          </div>
                                                          </blockquote>
                                                          <br>
                                                          </div>
                                                          </div>
                                                          </div>
                                                          </blockquote>
                                                          </div>
                                                          <br>
                                                          <br clear=3D"all"=
>
                                                          <div><br>
                                                          </div>
                                                          -- <br>
                                                          Thanks &amp;
                                                          Regards,<br>
                                                          Prabath
                                                          <div><br>
                                                          </div>
                                                          <div>Mobile :
                                                          <a href=3D"tel:%2=
B94%2071%20809%206732" value=3D"+94718096732" target=3D"_blank">+94



                                                          71 809 6732</a>=
=A0<br>
                                                          <br>
                                                          <a href=3D"http:/=
/blog.facilelogin.com" target=3D"_blank">http://blog.facilelogin.com</a><br=
>
                                                          <a href=3D"http:/=
/RampartFAQ.com" target=3D"_blank">http://RampartFAQ.com</a></div>
                                                          </div>
                                                          </blockquote>
                                                          <br>
                                                          </div>
                                                          </div>
                                                          </div>
                                                          </blockquote>
                                                          </div>
                                                          <br>
                                                          <br clear=3D"all"=
>
                                                          <div><br>
                                                          </div>
                                                          -- <br>
                                                          Thanks &amp;
                                                          Regards,<br>
                                                          Prabath
                                                          <div><br>
                                                          </div>
                                                          <div>Mobile :
                                                          <a href=3D"tel:%2=
B94%2071%20809%206732" value=3D"+94718096732" target=3D"_blank">+94




                                                          71 809 6732</a>=
=A0<br>
                                                          <br>
                                                          <a href=3D"http:/=
/blog.facilelogin.com" target=3D"_blank">http://blog.facilelogin.com</a><br=
>
                                                          <a href=3D"http:/=
/RampartFAQ.com" target=3D"_blank">http://RampartFAQ.com</a></div>
                                                          </div>
                                                          </blockquote>
                                                          <br>
                                                          </div>
                                                          </div>
                                                          </div>
                                                          </blockquote>
                                                          </div>
                                                          <br>
                                                          <br clear=3D"all"=
>
                                                          <div><br>
                                                          </div>
                                                          -- <br>
                                                          Thanks &amp;
                                                          Regards,<br>
                                                          Prabath
                                                          <div><br>
                                                          </div>
                                                          <div>Mobile :
                                                          <a href=3D"tel:%2=
B94%2071%20809%206732" value=3D"+94718096732" target=3D"_blank">+94


                                                          71 809 6732</a>=
=A0<br>
                                                          <br>
                                                          <a href=3D"http:/=
/blog.facilelogin.com" target=3D"_blank">http://blog.facilelogin.com</a><br=
>
                                                          <a href=3D"http:/=
/RampartFAQ.com" target=3D"_blank">http://RampartFAQ.com</a></div>
                                                          </div>
                                                          </div>
                                                          </blockquote>
                                                          <blockquote type=
=3D"cite">
                                                          <div><span>______=
_________________________________________</span><br>
                                                          <span>OAuth
                                                          mailing list</spa=
n><br>
                                                          <span><a href=3D"=
mailto:OAuth@ietf.org" target=3D"_blank">OAuth@ietf.org</a></span><br>
                                                          <span><a href=3D"=
https://www.ietf.org/mailman/listinfo/oauth" target=3D"_blank">https://www.=
ietf.org/mailman/listinfo/oauth</a></span><br>
                                                          </div>
                                                          </blockquote>
                                                          </blockquote>
                                                          <br>
                                                          </div>
                                                          </div>
                                                          </div>
                                                          </blockquote>
                                                          </div>
                                                          <br>
                                                          <br clear=3D"all"=
>
                                                          <div><br>
                                                          </div>
                                                          -- <br>
                                                          Thanks &amp;
                                                          Regards,<br>
                                                          Prabath
                                                          <div><br>
                                                          </div>
                                                          <div>Mobile :
                                                          <a href=3D"tel:%2=
B94%2071%20809%206732" value=3D"+94718096732" target=3D"_blank">+94
                                                          71 809 6732</a>=
=A0<br>
                                                          <br>
                                                          <a href=3D"http:/=
/blog.facilelogin.com" target=3D"_blank">http://blog.facilelogin.com</a><br=
>
                                                          <a href=3D"http:/=
/RampartFAQ.com" target=3D"_blank">http://RampartFAQ.com</a></div>
                                                          </div>
                                                          </div>
                                                          </div>
                                                          </blockquote>
                                                          </div>
                                                          <br>
                                                          <br clear=3D"all"=
>
                                                          <div><br>
                                                          </div>
                                                          -- <br>
                                                          Thanks &amp;
                                                          Regards,<br>
                                                          Prabath
                                                          <div><br>
                                                          </div>
                                                          <div>Mobile :
                                                          <a href=3D"tel:%2=
B94%2071%20809%206732" value=3D"+94718096732" target=3D"_blank">+94


                                                          71 809 6732</a>=
=A0<br>
                                                          <br>
                                                          <a href=3D"http:/=
/blog.facilelogin.com" target=3D"_blank">http://blog.facilelogin.com</a><br=
>
                                                          <a href=3D"http:/=
/RampartFAQ.com" target=3D"_blank">http://RampartFAQ.com</a></div>
                                                          </div>
                                                        </blockquote>
                                                        <br>
                                                      </div>
                                                    </div>
                                                  </div>
                                                </blockquote>
                                              </div>
                                              <br>
                                              <br clear=3D"all">
                                              <div><br>
                                              </div>
                                              -- <br>
                                              Thanks &amp; Regards,<br>
                                              Prabath
                                              <div><br>
                                              </div>
                                              <div>Mobile : <a href=3D"tel:=
%2B94%2071%20809%206732" value=3D"+94718096732" target=3D"_blank">+94

                                                  71 809 6732</a>=A0<br>
                                                <br>
                                                <a href=3D"http://blog.faci=
lelogin.com" target=3D"_blank">http://blog.facilelogin.com</a><br>
                                                <a href=3D"http://RampartFA=
Q.com" target=3D"_blank">http://RampartFAQ.com</a></div>
                                            </div>
                                          </div>
                                        </div>
                                      </blockquote>
                                    </div>
                                    <br>
                                    <br clear=3D"all">
                                    <div><br>
                                    </div>
                                    -- <br>
                                    Thanks &amp; Regards,<br>
                                    Prabath
                                    <div><br>
                                    </div>
                                    <div>Mobile : <a href=3D"tel:%2B94%2071=
%20809%206732" value=3D"+94718096732" target=3D"_blank">+94 71 809 6732</a>=
=A0<br>
                                      <br>
                                      <a href=3D"http://blog.facilelogin.co=
m" target=3D"_blank">http://blog.facilelogin.com</a><br>
                                      <a href=3D"http://RampartFAQ.com" tar=
get=3D"_blank">http://RampartFAQ.com</a></div>
                                  </div>
                                </blockquote>
                                <br>
                              </div>
                            </div>
                          </div>
                        </blockquote>
                      </div>
                      <br>
                      <br clear=3D"all">
                      <div><br>
                      </div>
                      -- <br>
                      Thanks &amp; Regards,<br>
                      Prabath
                      <div><br>
                      </div>
                      <div>Mobile : <a href=3D"tel:%2B94%2071%20809%206732"=
 value=3D"+94718096732" target=3D"_blank">+94 71
                          809 6732</a>=A0<br>
                        <br>
                        <a href=3D"http://blog.facilelogin.com" target=3D"_=
blank">http://blog.facilelogin.com</a><br>
                        <a href=3D"http://RampartFAQ.com" target=3D"_blank"=
>http://RampartFAQ.com</a></div>
                    </div>
                  </blockquote>
                  <br>
                </div>
              </div>
            </div>
          </blockquote>
        </div>
        <br>
        <br clear=3D"all">
        <div><br>
        </div>
        -- <br>
        Thanks &amp; Regards,<br>
        Prabath
        <div><br>
        </div>
        <div>Mobile : <a href=3D"tel:%2B94%2071%20809%206732" value=3D"+947=
18096732" target=3D"_blank">+94 71 809 6732</a>=A0<br>
          <br>
          <a href=3D"http://blog.facilelogin.com" target=3D"_blank">http://=
blog.facilelogin.com</a><br>
          <a href=3D"http://RampartFAQ.com" target=3D"_blank">http://Rampar=
tFAQ.com</a></div>
      </div>
    </blockquote>
    <br>
  </div></div></div>

</blockquote></div><br><br clear=3D"all"><div><br></div>-- <br>Thanks &amp;=
 Regards,<br>Prabath<div><br></div><div>Mobile : +94 71 809 6732=A0<br><br>=
<a href=3D"http://blog.facilelogin.com" target=3D"_blank">http://blog.facil=
elogin.com</a><br>
<a href=3D"http://RampartFAQ.com" target=3D"_blank">http://RampartFAQ.com</=
a></div>
</div>

--e89a8f647ac33de3d904d5b1501f--

From jricher@mitre.org  Thu Feb 14 08:16:53 2013
Return-Path: <jricher@mitre.org>
X-Original-To: oauth@ietfa.amsl.com
Delivered-To: oauth@ietfa.amsl.com
Received: from localhost (localhost [127.0.0.1]) by ietfa.amsl.com (Postfix) with ESMTP id B2E8321F8861 for <oauth@ietfa.amsl.com>; Thu, 14 Feb 2013 08:16:53 -0800 (PST)
X-Virus-Scanned: amavisd-new at amsl.com
X-Spam-Flag: NO
X-Spam-Score: -6.57
X-Spam-Level: 
X-Spam-Status: No, score=-6.57 tagged_above=-999 required=5 tests=[AWL=0.028,  BAYES_00=-2.599, HTML_MESSAGE=0.001, RCVD_IN_DNSWL_MED=-4]
Received: from mail.ietf.org ([64.170.98.30]) by localhost (ietfa.amsl.com [127.0.0.1]) (amavisd-new, port 10024) with ESMTP id HbN4p385sBYC for <oauth@ietfa.amsl.com>; Thu, 14 Feb 2013 08:16:50 -0800 (PST)
Received: from smtpksrv1.mitre.org (smtpksrv1.mitre.org [198.49.146.77]) by ietfa.amsl.com (Postfix) with ESMTP id 10F9121F886A for <oauth@ietf.org>; Thu, 14 Feb 2013 08:16:50 -0800 (PST)
Received: from smtpksrv1.mitre.org (localhost.localdomain [127.0.0.1]) by localhost (Postfix) with SMTP id 8DB8F1F2CEE; Thu, 14 Feb 2013 11:16:49 -0500 (EST)
Received: from IMCCAS02.MITRE.ORG (imccas02.mitre.org [129.83.29.79]) by smtpksrv1.mitre.org (Postfix) with ESMTP id 6FCBD1F07F7; Thu, 14 Feb 2013 11:16:49 -0500 (EST)
Received: from [10.146.15.29] (129.83.31.58) by IMCCAS02.MITRE.ORG (129.83.29.79) with Microsoft SMTP Server (TLS) id 14.2.318.4; Thu, 14 Feb 2013 11:16:48 -0500
Message-ID: <511D0DC3.7000607@mitre.org>
Date: Thu, 14 Feb 2013 11:16:03 -0500
From: Justin Richer <jricher@mitre.org>
User-Agent: Mozilla/5.0 (X11; Linux i686; rv:17.0) Gecko/20130106 Thunderbird/17.0.2
MIME-Version: 1.0
To: Prabath Siriwardena <prabath@wso2.com>
References: <20130206192420.32698.21027.idtracker@ietfa.amsl.com> <5113DDB2.7060805@mitre.org> <CAJV9qO_gM1oera9ae9sqh9n17e-ZLKuC2pmsZwhq-RmFcMyqHA@mail.gmail.com> <51196777.6000502@mitre.org> <CAJV9qO-5bWZbNUfCmaqYBQoy-qwNaSZFOsO9GL3CrbSejwVTzw@mail.gmail.com> <F6595A40-6B4E-4718-ABB5-694CA975C4DB@maymount.com> <511A5062.5010108@mitre.org> <CAJV9qO_Mr87NX=KZRqCsWasQ1FuvDNBw14eS-TcPf_KRJztQFg@mail.gmail.com> <CAJV9qO-71-sM6kXOB6Fb_bvVkDBQ5JBbs8E5X=f-K=iEmGezRA@mail.gmail.com> <511CEEAA.3030801@mitre.org> <CAJV9qO-JSXgSTkw2_pdH0D-o-xDWGDqxx=PAWYtnTj4hOQXW4Q@mail.gmail.com> <CAJV9qO9=+kiO-s7vH_ewr7XjfVdDU24F0kuif504bP53dBr1TA@mail.gmail.com> <511CF3EF.8040008@mitre.org> <CAJV9qO8yKkrsV7d9JtDmbLY-fb5phh=ssKbEUuutkY53PgY8Vg@mail.gmail.com> <511CF4AB.5010700@mitre.org> <CAJV9qO9VmjSQnWKU3kF11x35ut=AsvQ8bjuz_CKpyCScGRiA2Q@mail.gmail.com> <511CF8C5.70301@mitre.org> <CAJV9qO_-kFsWxoJwTP_RWFrb6+3frg-36JocQoo8SrpyNBMSoA@mail.gmail.com>
In-Reply-To: <CAJV9qO_-kFsWxoJwTP_RWFrb6+3frg-36JocQoo8SrpyNBMSoA@mail.gmail.com>
Content-Type: multipart/alternative; boundary="------------000109060609020608000502"
X-Originating-IP: [129.83.31.58]
Cc: "oauth@ietf.org" <oauth@ietf.org>
Subject: Re: [OAUTH-WG] Fwd: New Version Notification for draft-richer-oauth-introspection-02.txt
X-BeenThere: oauth@ietf.org
X-Mailman-Version: 2.1.12
Precedence: list
List-Id: OAUTH WG <oauth.ietf.org>
List-Unsubscribe: <https://www.ietf.org/mailman/options/oauth>, <mailto:oauth-request@ietf.org?subject=unsubscribe>
List-Archive: <http://www.ietf.org/mail-archive/web/oauth>
List-Post: <mailto:oauth@ietf.org>
List-Help: <mailto:oauth-request@ietf.org?subject=help>
List-Subscribe: <https://www.ietf.org/mailman/listinfo/oauth>, <mailto:oauth-request@ietf.org?subject=subscribe>
X-List-Received-Date: Thu, 14 Feb 2013 16:16:53 -0000

--------------000109060609020608000502
Content-Type: text/plain; charset="ISO-8859-1"; format=flowed
Content-Transfer-Encoding: 7bit

That much I can at least do. I'd be happy with another term if there was 
a good one we could drop in its place without changing the intended 
semantics.

  -- Justin

On 02/14/2013 10:57 AM, Prabath Siriwardena wrote:
> Not quite convinced :-) Valid has a meaning attached to that..
>
> In case we are going ahead with this please define it clearly in the 
> draft - with the one you shared in this thread.
>
> Thanks & regards,
> -Prabath
>
> On Thu, Feb 14, 2013 at 8:16 PM, Justin Richer <jricher@mitre.org 
> <mailto:jricher@mitre.org>> wrote:
>
>
>     On 02/14/2013 09:37 AM, Prabath Siriwardena wrote:
>>     The definition of valid is bit ambiguous in the draft...
>>
>>     Okay.. If that is the definition... and if we beak that in to
>>     parts...
>>
>>     "it hasn't expired" : In the response it self we have parameter
>>     for issued_at and and expires_at - so whether the token is not
>>     expired or not can even be derived at the requestor's end.
>
>     If the token isn't good anymore, it doesn't matter when it was
>     issued or when it was expired, just that it has.
>
>
>>
>>     "token was issued from here" : For this IMO we need to send an
>>     error code. Requestor has picked the wrong AS.
>     We don't know if it came from another AS or if someone's just
>     making things up. Either way it's not a good token.
>
>
>>
>>     The remaining is  "revoked".. That is why I proposed earlier - we
>>     better have an attribute "revoked" - instead of "valid" in the
>>     response..
>
>     The end result of all three is the same: either the token is good,
>     or it isn't. I think it's much simpler and more useful to leave it
>     at that.
>
>      -- Justin
>
>
>>
>>     WDYT...?
>>
>>     Thanks & regards,
>>     -Prabath
>>
>>
>>     On Thu, Feb 14, 2013 at 7:58 PM, Justin Richer <jricher@mitre.org
>>     <mailto:jricher@mitre.org>> wrote:
>>
>>         Because it will be the one that issued the token in the first
>>         place.
>>
>>         Validity means "token was issued from here, it hasn't been
>>         revoked, it hasn't expired".
>>
>>          -- Justin
>>
>>
>>         On 02/14/2013 09:28 AM, Prabath Siriwardena wrote:
>>>         Okay. With out knowing the type of the token how can the AS
>>>         validate the token ? What is meant by the validity there?
>>>
>>>         Thanks & regards,
>>>         -Prabath
>>>
>>>         On Thu, Feb 14, 2013 at 7:55 PM, Justin Richer
>>>         <jricher@mitre.org <mailto:jricher@mitre.org>> wrote:
>>>
>>>             OK, I don't see the utility in that at all. What would
>>>             it accomplish?
>>>
>>>              -- Justin
>>>
>>>
>>>             On 02/14/2013 09:25 AM, Prabath Siriwardena wrote:
>>>>             To make it clear - my suggestion is to add
>>>>             token_type_hint to the introspection request. It can be
>>>>             from client to AS or from RS to AS.
>>>>
>>>>             Then AS can decide whether the provided token is valid
>>>>             or not and include "valid" attribute in the
>>>>             introspection response.
>>>>
>>>>             Thanks & regards,
>>>>             -Prabath
>>>>
>>>>             On Thu, Feb 14, 2013 at 7:52 PM, Prabath Siriwardena
>>>>             <prabath@wso2.com <mailto:prabath@wso2.com>> wrote:
>>>>
>>>>                 Both the client and the resource owner should be
>>>>                 aware of the token type.
>>>>
>>>>                 My argument is, if the authorization server to
>>>>                 decide whether the token is valid or not (
>>>>                 irrespective of who asked the question) - AS needs
>>>>                 to know the token type - because to validate a
>>>>                 token AS should know the token type.
>>>>
>>>>                 The token type could be, bearer or MAC or any other
>>>>                 token type.
>>>>
>>>>                 Thanks & regards,
>>>>                 -Prabath
>>>>
>>>>
>>>>                 On Thu, Feb 14, 2013 at 7:33 PM, Justin Richer
>>>>                 <jricher@mitre.org <mailto:jricher@mitre.org>> wrote:
>>>>
>>>>                     What exactly are you suggesting be added to
>>>>                     introspection? The "token_type_hint" is from
>>>>                     the client to the server, but what you've asked
>>>>                     for in terms of "token type" is from the server
>>>>                     to the client. And there was never an answer to
>>>>                     what exactly is meant by "token type" in this
>>>>                     case, particularly because you seem to want to
>>>>                     call out things like SAML and Bearer as
>>>>                     separate types.
>>>>
>>>>                      -- Justin
>>>>
>>>>
>>>>
>>>>                     On 02/14/2013 06:59 AM, Prabath Siriwardena wrote:
>>>>>                     I noticed that the latest Token Revocation
>>>>>                     draft [1] has introduced the parameter
>>>>>                     "token_type_hint". I would suggest the same
>>>>>                     here, as that would make what is meant by
>>>>>                     "valid" much clear..
>>>>>
>>>>>                     [1]:
>>>>>                     http://tools.ietf.org/html/draft-ietf-oauth-revocation-05
>>>>>
>>>>>                     Thanks & regards,
>>>>>                     -Prabath
>>>>>
>>>>>                     On Tue, Feb 12, 2013 at 9:35 PM, Prabath
>>>>>                     Siriwardena <prabath@wso2.com
>>>>>                     <mailto:prabath@wso2.com>> wrote:
>>>>>
>>>>>                         Hi Justin,
>>>>>
>>>>>                         I doubt whether valid_token would make a
>>>>>                         difference..?
>>>>>
>>>>>                         My initial argument is what is the
>>>>>                         validation criteria..? Validation criteria
>>>>>                         depends on the token_type..
>>>>>
>>>>>                         If we are talking only about metadata -
>>>>>                         then I believe "revoked", "expired" would
>>>>>                         be more meaningful..
>>>>>
>>>>>                         Thanks & regards,
>>>>>                         -Prabath
>>>>>
>>>>>
>>>>>                         On Tue, Feb 12, 2013 at 7:53 PM, Justin
>>>>>                         Richer <jricher@mitre.org
>>>>>                         <mailto:jricher@mitre.org>> wrote:
>>>>>
>>>>>                             OK, I can see the wisdom in changing
>>>>>                             this term.
>>>>>
>>>>>                             I picked "valid" because I wanted a
>>>>>                             simple "boolean" value that would
>>>>>                             require no additional parsing or
>>>>>                             string-matching on the client's
>>>>>                             behalf, and I'd like to stick with
>>>>>                             that. OAuth is built with the
>>>>>                             assumption that clients need to be
>>>>>                             able to recover from invalid tokens at
>>>>>                             any stage, so I think a simple yes/no
>>>>>                             is the right step here.
>>>>>
>>>>>                             That said, I think you're both right
>>>>>                             that "valid" seems to have caused a
>>>>>                             bit of confusion. I don't want to go
>>>>>                             with "revoked" because I'd rather have
>>>>>                             the "token is OK" be the positive
>>>>>                             boolean value.
>>>>>
>>>>>                             Would "valid_token" be more clear? Or
>>>>>                             do we need a different adjective all
>>>>>                             together?
>>>>>
>>>>>                              -- Justin
>>>>>
>>>>>
>>>>>                             On 02/11/2013 08:02 PM, Richard
>>>>>                             Harrington wrote:
>>>>>>                             Have you considered "status" instead
>>>>>>                             of "valid"?  It could have values
>>>>>>                             like "active", "expired", and "revoked".
>>>>>>
>>>>>>                             Is it worthwhile including the status
>>>>>>                             of the client also?  For example, a
>>>>>>                             client application could be disabled,
>>>>>>                             temporarily or permanently, and thus
>>>>>>                             disabling its access tokens as well.
>>>>>>
>>>>>>
>>>>>>                             On Feb 11, 2013, at 1:56 PM, Prabath
>>>>>>                             Siriwardena <prabath@wso2.com
>>>>>>                             <mailto:prabath@wso2.com>> wrote:
>>>>>>
>>>>>>>                             I guess confusion is with 'valid'
>>>>>>>                             parameter is in the response..
>>>>>>>
>>>>>>>                             I thought this will be helpful
>>>>>>>                             to standardize the communication
>>>>>>>                             between Resource Server and the
>>>>>>>                             Authorization Server..
>>>>>>>
>>>>>>>                             I would suggest we completely remove
>>>>>>>                             "valid" from the response - or
>>>>>>>                             define it much clearly..
>>>>>>>
>>>>>>>                             May be can add "revoked" with a
>>>>>>>                             boolean attribute..
>>>>>>>
>>>>>>>                             Thanks & regards,
>>>>>>>                             -Prabath
>>>>>>>
>>>>>>>                             On Tue, Feb 12, 2013 at 3:19 AM,
>>>>>>>                             Justin Richer <jricher@mitre.org
>>>>>>>                             <mailto:jricher@mitre.org>> wrote:
>>>>>>>
>>>>>>>
>>>>>>>                                 On 02/08/2013 12:51 AM, Prabath
>>>>>>>                                 Siriwardena wrote:
>>>>>>>>                                 Hi Justin,
>>>>>>>>
>>>>>>>>                                 I have couple of questions
>>>>>>>>                                 related to "valid" parameter...
>>>>>>>>
>>>>>>>>                                 This endpoint can be invoked by
>>>>>>>>                                 the Resource Server in runtime...
>>>>>>>
>>>>>>>                                 That's correct.
>>>>>>>
>>>>>>>
>>>>>>>>
>>>>>>>>                                 In that case what is exactly
>>>>>>>>                                 meant by the "resource_id" in
>>>>>>>>                                 request ?
>>>>>>>
>>>>>>>                                 The resource_id field is a
>>>>>>>                                 service-specific string that
>>>>>>>                                 basically lets the resource
>>>>>>>                                 server provide some context to
>>>>>>>                                 the request to the auth server.
>>>>>>>                                 There have been some other
>>>>>>>                                 suggestions like client IP
>>>>>>>                                 address, but I wanted to put
>>>>>>>                                 this one in because it seemed to
>>>>>>>                                 be a common theme. The client is
>>>>>>>                                 trying to do *something* with
>>>>>>>                                 the token, after all, and the
>>>>>>>                                 rights, permissions, and
>>>>>>>                                 metadata associated with the
>>>>>>>                                 token could change based on
>>>>>>>                                 that. Since the Introspection
>>>>>>>                                 endpoint is all about getting
>>>>>>>                                 that metadata back to the PR,
>>>>>>>                                 this seemed like a good idea.
>>>>>>>
>>>>>>>
>>>>>>>>
>>>>>>>>                                 IMO a token to be valid depends
>>>>>>>>                                 on set of criteria based on
>>>>>>>>                                 it's type..
>>>>>>>>
>>>>>>>>                                 For a Bearer token..
>>>>>>>>
>>>>>>>>                                 1. Token should not be expired
>>>>>>>>                                 2. Token should not be revoked.
>>>>>>>>                                 3. The scope the token issued
>>>>>>>>                                 should match with the scope
>>>>>>>>                                 required for the resource.
>>>>>>>>
>>>>>>>>                                 For a MAC token...
>>>>>>>>
>>>>>>>>                                 1. Token not expired (mac id)
>>>>>>>>                                 2. Token should not be revoked
>>>>>>>>                                 3. The scope the token issued
>>>>>>>>                                 should match with the scope
>>>>>>>>                                 required for the resource.
>>>>>>>>                                 4. HMAC check should be valid
>>>>>>>>
>>>>>>>>                                 There are similar conditions
>>>>>>>>                                 for SAML bearer too..
>>>>>>>
>>>>>>>                                 This isn't really true. The SAML
>>>>>>>                                 bearer token is fully
>>>>>>>                                 self-contained and doesn't
>>>>>>>                                 change based on other parameters
>>>>>>>                                 in the message, unlike MAC. Same
>>>>>>>                                 with JWT. When it hands a SAML
>>>>>>>                                 or JWT token to the AS, the PR
>>>>>>>                                 has given *everything* the
>>>>>>>                                 server needs to check that
>>>>>>>                                 token's validity and use.
>>>>>>>
>>>>>>>                                 MAC signatures change with every
>>>>>>>                                 message, and they're done across
>>>>>>>                                 several components of the HTTP
>>>>>>>                                 message. Therefor, the HMAC
>>>>>>>                                 check for MAC style tokens will
>>>>>>>                                 still need to be done by the
>>>>>>>                                 protected resource.
>>>>>>>                                 Introspection would help in the
>>>>>>>                                 case that the signature
>>>>>>>                                 validated just fine, but the
>>>>>>>                                 token might have expired. Or you
>>>>>>>                                 need to know what scopes apply.
>>>>>>>                                 Introspection isn't to fully
>>>>>>>                                 validate the call to the
>>>>>>>                                 protected resource -- if that
>>>>>>>                                 were the case, the PR would have
>>>>>>>                                 to send some kind of
>>>>>>>                                 encapsulated version of the
>>>>>>>                                 original request. Otherwise, the
>>>>>>>                                 AS won't have all of the
>>>>>>>                                 information it needs to check
>>>>>>>                                 the MAC.
>>>>>>>
>>>>>>>
>>>>>>>                                 I think what you're describing
>>>>>>>                                 is ultimately *not* what the
>>>>>>>                                 introspection endpoint is
>>>>>>>                                 intended to do. If that's
>>>>>>>                                 unclear from the document, can
>>>>>>>                                 you please suggest text that
>>>>>>>                                 would help clear the use case
>>>>>>>                                 up? I wouldn't want it to be
>>>>>>>                                 ambiguous.
>>>>>>>
>>>>>>>                                  -- Justin
>>>>>>>
>>>>>>>
>>>>>>>>
>>>>>>>>                                 Thanks & regards,
>>>>>>>>                                 -Prabath
>>>>>>>>
>>>>>>>>
>>>>>>>>                                 On Thu, Feb 7, 2013 at 10:30
>>>>>>>>                                 PM, Justin Richer
>>>>>>>>                                 <jricher@mitre.org
>>>>>>>>                                 <mailto:jricher@mitre.org>> wrote:
>>>>>>>>
>>>>>>>>                                     It validates the token,
>>>>>>>>                                     which would be either the
>>>>>>>>                                     token itself in the case of
>>>>>>>>                                     Bearer or the token "id"
>>>>>>>>                                     part of something more
>>>>>>>>                                     complex like MAC. It
>>>>>>>>                                     doesn't directly validate
>>>>>>>>                                     the usage of the token,
>>>>>>>>                                     that's still up to the PR
>>>>>>>>                                     to do that.
>>>>>>>>
>>>>>>>>                                     I nearly added a "token
>>>>>>>>                                     type" field in this draft,
>>>>>>>>                                     but held back because there
>>>>>>>>                                     are several kinds of "token
>>>>>>>>                                     type" that people talk
>>>>>>>>                                     about in OAuth. First,
>>>>>>>>                                     there's "Bearer" vs. "MAC"
>>>>>>>>                                     vs. "HOK", or what have
>>>>>>>>                                     you. Then within Bearer you
>>>>>>>>                                     have "JWT" or "SAML" or
>>>>>>>>                                     "unstructured blob". Then
>>>>>>>>                                     you've also got "access"
>>>>>>>>                                     vs. "refresh" and other
>>>>>>>>                                     flavors of token, like the
>>>>>>>>                                     id_token in OpenID Connect.
>>>>>>>>
>>>>>>>>                                     Thing is, the server
>>>>>>>>                                     running the introspection
>>>>>>>>                                     endpoint will probably know
>>>>>>>>                                     *all* of these. But should
>>>>>>>>                                     it tell the client? If so,
>>>>>>>>                                     which of the three, and
>>>>>>>>                                     what names should the
>>>>>>>>                                     fields be?
>>>>>>>>
>>>>>>>>                                      -- Justin
>>>>>>>>
>>>>>>>>
>>>>>>>>                                     On 02/07/2013 11:26 AM,
>>>>>>>>                                     Prabath Siriwardena wrote:
>>>>>>>>>                                     Okay.. I was thinking this
>>>>>>>>>                                     could be used as a way to
>>>>>>>>>                                     validate the token as
>>>>>>>>>                                     well. BTW even in this
>>>>>>>>>                                     case shouldn't communicate
>>>>>>>>>                                     the type of token to AS?
>>>>>>>>>                                     For example in the case of
>>>>>>>>>                                     SAML profile - it could be
>>>>>>>>>                                     SAML token..
>>>>>>>>>
>>>>>>>>>                                     Thanks & regards,
>>>>>>>>>                                     -Prabath
>>>>>>>>>
>>>>>>>>>                                     On Thu, Feb 7, 2013 at
>>>>>>>>>                                     8:39 PM, Justin Richer
>>>>>>>>>                                     <jricher@mitre.org
>>>>>>>>>                                     <mailto:jricher@mitre.org>> wrote:
>>>>>>>>>
>>>>>>>>>                                         "valid" might not be
>>>>>>>>>                                         the best term, but
>>>>>>>>>                                         it's meant to be a
>>>>>>>>>                                         field where the server
>>>>>>>>>                                         says "yes this token
>>>>>>>>>                                         is still good" or "no
>>>>>>>>>                                         this token isn't good
>>>>>>>>>                                         anymore". We could
>>>>>>>>>                                         instead do this with
>>>>>>>>>                                         HTTP codes or
>>>>>>>>>                                         something but I went
>>>>>>>>>                                         with a pure JSON response.
>>>>>>>>>
>>>>>>>>>                                          -- Justin
>>>>>>>>>
>>>>>>>>>
>>>>>>>>>                                         On 02/06/2013 10:47
>>>>>>>>>                                         PM, Prabath
>>>>>>>>>                                         Siriwardena wrote:
>>>>>>>>>>                                         Hi Justin,
>>>>>>>>>>
>>>>>>>>>>                                         I believe this is
>>>>>>>>>>                                         addressing one of the
>>>>>>>>>>                                         key missing part in
>>>>>>>>>>                                         OAuth 2.0...
>>>>>>>>>>
>>>>>>>>>>                                         One question - I
>>>>>>>>>>                                         guess this was
>>>>>>>>>>                                         discussed already...
>>>>>>>>>>
>>>>>>>>>>                                         In the spec - in the
>>>>>>>>>>                                         introspection
>>>>>>>>>>                                         response it has the
>>>>>>>>>>                                         attribute "valid" -
>>>>>>>>>>                                         this is basically the
>>>>>>>>>>                                         validity of the token
>>>>>>>>>>                                         provided in the request.
>>>>>>>>>>
>>>>>>>>>>                                         Validation criteria
>>>>>>>>>>                                         depends on the token
>>>>>>>>>>                                         and well as token
>>>>>>>>>>                                         type ( Bearer, MAC..).
>>>>>>>>>>
>>>>>>>>>>                                         In the spec it seems
>>>>>>>>>>                                         like it's coupled
>>>>>>>>>>                                         with Bearer token
>>>>>>>>>>                                         type... But I guess,
>>>>>>>>>>                                         by adding
>>>>>>>>>>                                         "token_type" to the
>>>>>>>>>>                                         request we can remove
>>>>>>>>>>                                         this dependency.
>>>>>>>>>>
>>>>>>>>>>                                         WDYT..?
>>>>>>>>>>
>>>>>>>>>>                                         Thanks & regards,
>>>>>>>>>>                                         -Prabath
>>>>>>>>>>
>>>>>>>>>>                                         On Thu, Feb 7, 2013
>>>>>>>>>>                                         at 12:54 AM, Justin
>>>>>>>>>>                                         Richer
>>>>>>>>>>                                         <jricher@mitre.org
>>>>>>>>>>                                         <mailto:jricher@mitre.org>>
>>>>>>>>>>                                         wrote:
>>>>>>>>>>
>>>>>>>>>>                                             Updated
>>>>>>>>>>                                             introspection
>>>>>>>>>>                                             draft based on
>>>>>>>>>>                                             recent comments.
>>>>>>>>>>                                             Changes include:
>>>>>>>>>>
>>>>>>>>>>                                              - "scope" return
>>>>>>>>>>                                             parameter now
>>>>>>>>>>                                             follows RFC6749
>>>>>>>>>>                                             format instead of
>>>>>>>>>>                                             JSON array
>>>>>>>>>>                                              - "subject" ->
>>>>>>>>>>                                             "sub", and
>>>>>>>>>>                                             "audience" ->
>>>>>>>>>>                                             "aud", to be
>>>>>>>>>>                                             parallel with JWT
>>>>>>>>>>                                             claims
>>>>>>>>>>                                              - clarified what
>>>>>>>>>>                                             happens if the
>>>>>>>>>>                                             authentication is bad
>>>>>>>>>>
>>>>>>>>>>                                              -- Justin
>>>>>>>>>>
>>>>>>>>>>
>>>>>>>>>>                                             -------- Original
>>>>>>>>>>                                             Message --------
>>>>>>>>>>                                             Subject: 	New
>>>>>>>>>>                                             Version
>>>>>>>>>>                                             Notification for
>>>>>>>>>>                                             draft-richer-oauth-introspection-02.txt
>>>>>>>>>>
>>>>>>>>>>                                             Date: 	Wed, 6 Feb
>>>>>>>>>>                                             2013 11:24:20 -0800
>>>>>>>>>>                                             From:
>>>>>>>>>>                                             <internet-drafts@ietf.org>
>>>>>>>>>>                                             <mailto:internet-drafts@ietf.org>
>>>>>>>>>>
>>>>>>>>>>                                             To:
>>>>>>>>>>                                             <jricher@mitre.org>
>>>>>>>>>>                                             <mailto:jricher@mitre.org>
>>>>>>>>>>
>>>>>>>>>>
>>>>>>>>>>
>>>>>>>>>>
>>>>>>>>>>                                             A new version of I-D, draft-richer-oauth-introspection-02.txt
>>>>>>>>>>                                             has been successfully submitted by Justin Richer and posted to the
>>>>>>>>>>                                             IETF repository.
>>>>>>>>>>
>>>>>>>>>>                                             Filename:	 draft-richer-oauth-introspection
>>>>>>>>>>                                             Revision:	 02
>>>>>>>>>>                                             Title:		 OAuth Token Introspection
>>>>>>>>>>                                             Creation date:	 2013-02-06
>>>>>>>>>>                                             WG ID:		 Individual Submission
>>>>>>>>>>                                             Number of pages: 6
>>>>>>>>>>                                             URL:http://www.ietf.org/internet-drafts/draft-richer-oauth-introspection-02.txt
>>>>>>>>>>                                             Status:http://datatracker.ietf.org/doc/draft-richer-oauth-introspection
>>>>>>>>>>                                             Htmlized:http://tools.ietf.org/html/draft-richer-oauth-introspection-02
>>>>>>>>>>                                             Diff:http://www.ietf.org/rfcdiff?url2=draft-richer-oauth-introspection-02
>>>>>>>>>>
>>>>>>>>>>                                             Abstract:
>>>>>>>>>>                                                 This specification defines a method for a client or protected
>>>>>>>>>>                                                 resource to query an OAuth authorization server to determine meta-
>>>>>>>>>>                                                 information about an OAuth token.
>>>>>>>>>>
>>>>>>>>>>
>>>>>>>>>>                                                                                                                                
>>>>>>>>>>
>>>>>>>>>>
>>>>>>>>>>                                             The IETF Secretariat
>>>>>>>>>>
>>>>>>>>>>
>>>>>>>>>>
>>>>>>>>>>
>>>>>>>>>>                                             _______________________________________________
>>>>>>>>>>                                             OAuth mailing list
>>>>>>>>>>                                             OAuth@ietf.org
>>>>>>>>>>                                             <mailto:OAuth@ietf.org>
>>>>>>>>>>                                             https://www.ietf.org/mailman/listinfo/oauth
>>>>>>>>>>
>>>>>>>>>>
>>>>>>>>>>
>>>>>>>>>>
>>>>>>>>>>                                         -- 
>>>>>>>>>>                                         Thanks & Regards,
>>>>>>>>>>                                         Prabath
>>>>>>>>>>
>>>>>>>>>>                                         Mobile : +94 71 809
>>>>>>>>>>                                         6732
>>>>>>>>>>                                         <tel:%2B94%2071%20809%206732>
>>>>>>>>>>
>>>>>>>>>>
>>>>>>>>>>                                         http://blog.facilelogin.com
>>>>>>>>>>                                         http://RampartFAQ.com
>>>>>>>>>
>>>>>>>>>
>>>>>>>>>
>>>>>>>>>
>>>>>>>>>                                     -- 
>>>>>>>>>                                     Thanks & Regards,
>>>>>>>>>                                     Prabath
>>>>>>>>>
>>>>>>>>>                                     Mobile : +94 71 809 6732
>>>>>>>>>                                     <tel:%2B94%2071%20809%206732>
>>>>>>>>>
>>>>>>>>>                                     http://blog.facilelogin.com
>>>>>>>>>                                     http://RampartFAQ.com
>>>>>>>>
>>>>>>>>
>>>>>>>>
>>>>>>>>
>>>>>>>>                                 -- 
>>>>>>>>                                 Thanks & Regards,
>>>>>>>>                                 Prabath
>>>>>>>>
>>>>>>>>                                 Mobile : +94 71 809 6732
>>>>>>>>                                 <tel:%2B94%2071%20809%206732>
>>>>>>>>
>>>>>>>>                                 http://blog.facilelogin.com
>>>>>>>>                                 http://RampartFAQ.com
>>>>>>>
>>>>>>>
>>>>>>>
>>>>>>>
>>>>>>>                             -- 
>>>>>>>                             Thanks & Regards,
>>>>>>>                             Prabath
>>>>>>>
>>>>>>>                             Mobile : +94 71 809 6732
>>>>>>>                             <tel:%2B94%2071%20809%206732>
>>>>>>>
>>>>>>>                             http://blog.facilelogin.com
>>>>>>>                             http://RampartFAQ.com
>>>>>>>                             _______________________________________________
>>>>>>>                             OAuth mailing list
>>>>>>>                             OAuth@ietf.org <mailto:OAuth@ietf.org>
>>>>>>>                             https://www.ietf.org/mailman/listinfo/oauth
>>>>>
>>>>>
>>>>>
>>>>>
>>>>>                         -- 
>>>>>                         Thanks & Regards,
>>>>>                         Prabath
>>>>>
>>>>>                         Mobile : +94 71 809 6732
>>>>>                         <tel:%2B94%2071%20809%206732>
>>>>>
>>>>>                         http://blog.facilelogin.com
>>>>>                         http://RampartFAQ.com
>>>>>
>>>>>
>>>>>
>>>>>
>>>>>                     -- 
>>>>>                     Thanks & Regards,
>>>>>                     Prabath
>>>>>
>>>>>                     Mobile : +94 71 809 6732
>>>>>                     <tel:%2B94%2071%20809%206732>
>>>>>
>>>>>                     http://blog.facilelogin.com
>>>>>                     http://RampartFAQ.com
>>>>
>>>>
>>>>
>>>>
>>>>                 -- 
>>>>                 Thanks & Regards,
>>>>                 Prabath
>>>>
>>>>                 Mobile : +94 71 809 6732 <tel:%2B94%2071%20809%206732>
>>>>
>>>>                 http://blog.facilelogin.com
>>>>                 http://RampartFAQ.com
>>>>
>>>>
>>>>
>>>>
>>>>             -- 
>>>>             Thanks & Regards,
>>>>             Prabath
>>>>
>>>>             Mobile : +94 71 809 6732 <tel:%2B94%2071%20809%206732>
>>>>
>>>>             http://blog.facilelogin.com
>>>>             http://RampartFAQ.com
>>>
>>>
>>>
>>>
>>>         -- 
>>>         Thanks & Regards,
>>>         Prabath
>>>
>>>         Mobile : +94 71 809 6732 <tel:%2B94%2071%20809%206732>
>>>
>>>         http://blog.facilelogin.com
>>>         http://RampartFAQ.com
>>
>>
>>
>>
>>     -- 
>>     Thanks & Regards,
>>     Prabath
>>
>>     Mobile : +94 71 809 6732 <tel:%2B94%2071%20809%206732>
>>
>>     http://blog.facilelogin.com
>>     http://RampartFAQ.com
>
>
>
>
> -- 
> Thanks & Regards,
> Prabath
>
> Mobile : +94 71 809 6732
>
> http://blog.facilelogin.com
> http://RampartFAQ.com


--------------000109060609020608000502
Content-Type: text/html; charset="ISO-8859-1"
Content-Transfer-Encoding: 7bit

<html>
  <head>
    <meta content="text/html; charset=ISO-8859-1"
      http-equiv="Content-Type">
  </head>
  <body bgcolor="#FFFFFF" text="#000000">
    That much I can at least do. I'd be happy with another term if there
    was a good one we could drop in its place without changing the
    intended semantics.<br>
    <br>
    &nbsp;-- Justin<br>
    <br>
    <div class="moz-cite-prefix">On 02/14/2013 10:57 AM, Prabath
      Siriwardena wrote:<br>
    </div>
    <blockquote
cite="mid:CAJV9qO_-kFsWxoJwTP_RWFrb6+3frg-36JocQoo8SrpyNBMSoA@mail.gmail.com"
      type="cite">
      <meta http-equiv="Content-Type" content="text/html;
        charset=ISO-8859-1">
      Not quite convinced :-) Valid has a meaning attached to that..
      <div><br>
      </div>
      <div>In case we are going ahead with this please define it clearly
        in the draft - with the one you shared in this thread.</div>
      <div><br>
      </div>
      <div>
        Thanks &amp; regards,</div>
      <div>-Prabath<br>
        <br>
        <div class="gmail_quote">On Thu, Feb 14, 2013 at 8:16 PM, Justin
          Richer <span dir="ltr">&lt;<a moz-do-not-send="true"
              href="mailto:jricher@mitre.org" target="_blank">jricher@mitre.org</a>&gt;</span>
          wrote:<br>
          <blockquote class="gmail_quote" style="margin:0 0 0
            .8ex;border-left:1px #ccc solid;padding-left:1ex">
            <div bgcolor="#FFFFFF" text="#000000">
              <div class="im"> <br>
                <div>On 02/14/2013 09:37 AM, Prabath Siriwardena wrote:<br>
                </div>
                <blockquote type="cite">
                  <div>The definition of valid is bit ambiguous&nbsp;in the
                    draft...</div>
                  <div><br>
                  </div>
                  <div>Okay.. If that is the definition... and if we
                    beak that in to parts...</div>
                  <div><br>
                  </div>
                  <div>"it hasn't expired" : In the response it self we
                    have parameter for issued_at and and expires_at - so
                    whether the token is not expired or not can even be
                    derived at the requestor's end.</div>
                </blockquote>
                <br>
              </div>
              If the token isn't good anymore, it doesn't matter when it
              was issued or when it was expired, just that it has.
              <div class="im"><br>
                <br>
                <blockquote type="cite">
                  <div><br>
                  </div>
                  <div>"token was issued from here" : For this IMO we
                    need to send an error code. Requestor has picked the
                    wrong AS.</div>
                </blockquote>
              </div>
              We don't know if it came from another AS or if someone's
              just making things up. Either way it's not a good token.
              <div class="im"><br>
                <br>
                <blockquote type="cite">
                  <div><br>
                  </div>
                  <div>The remaining is &nbsp;"revoked".. That is why I
                    proposed&nbsp;earlier&nbsp;- we better have an attribute
                    "revoked" - instead of "valid" in the response..</div>
                </blockquote>
                <br>
              </div>
              The end result of all three is the same: either the token
              is good, or it isn't. I think it's much simpler and more
              useful to leave it at that.<span class="HOEnZb"><font
                  color="#888888"><br>
                  <br>
                  &nbsp;-- Justin</font></span>
              <div>
                <div class="h5"><br>
                  <br>
                  <blockquote type="cite">
                    <div><br>
                    </div>
                    <div>WDYT...?</div>
                    <div><br>
                    </div>
                    <div>Thanks &amp; regards,</div>
                    <div>-Prabath</div>
                    <div><br>
                    </div>
                    <div><br>
                      <div class="gmail_quote">On Thu, Feb 14, 2013 at
                        7:58 PM, Justin Richer <span dir="ltr">&lt;<a
                            moz-do-not-send="true"
                            href="mailto:jricher@mitre.org"
                            target="_blank">jricher@mitre.org</a>&gt;</span>
                        wrote:<br>
                        <blockquote class="gmail_quote" style="margin:0
                          0 0 .8ex;border-left:1px #ccc
                          solid;padding-left:1ex">
                          <div bgcolor="#FFFFFF" text="#000000"> Because
                            it will be the one that issued the token in
                            the first place. <br>
                            <br>
                            Validity means "token was issued from here,
                            it hasn't been revoked, it hasn't expired".
                            <br>
                            <span><font color="#888888"> <br>
                                &nbsp;-- Justin</font></span>
                            <div>
                              <div><br>
                                <br>
                                <div>On 02/14/2013 09:28 AM, Prabath
                                  Siriwardena wrote:<br>
                                </div>
                                <blockquote type="cite"> Okay. With out
                                  knowing the type of the token how can
                                  the AS validate the token ? What is
                                  meant by the validity there?
                                  <div><br>
                                  </div>
                                  <div>Thanks &amp; regards,</div>
                                  <div>-Prabath<br>
                                    <br>
                                    <div class="gmail_quote">On Thu, Feb
                                      14, 2013 at 7:55 PM, Justin Richer
                                      <span dir="ltr">&lt;<a
                                          moz-do-not-send="true"
                                          href="mailto:jricher@mitre.org"
                                          target="_blank">jricher@mitre.org</a>&gt;</span>
                                      wrote:<br>
                                      <blockquote class="gmail_quote"
                                        style="margin:0 0 0
                                        .8ex;border-left:1px #ccc
                                        solid;padding-left:1ex">
                                        <div bgcolor="#FFFFFF"
                                          text="#000000"> OK, I don't
                                          see the utility in that at
                                          all. What would it accomplish?<span><font
                                              color="#888888"><br>
                                              <br>
                                              &nbsp;-- Justin</font></span>
                                          <div>
                                            <div><br>
                                              <br>
                                              <div>On 02/14/2013 09:25
                                                AM, Prabath Siriwardena
                                                wrote:<br>
                                              </div>
                                              <blockquote type="cite">
                                                To make it clear - my
                                                suggestion is to add
                                                token_type_hint to the
                                                introspection request.
                                                It can be from client to
                                                AS or from RS to AS.
                                                <div><br>
                                                </div>
                                                <div>Then AS can decide
                                                  whether the provided
                                                  token is valid or not
                                                  and include "valid"
                                                  attribute in the
                                                  introspection
                                                  response.</div>
                                                <div><br>
                                                </div>
                                                <div>Thanks &amp;
                                                  regards,</div>
                                                <div>-Prabath<br>
                                                  <br>
                                                  <div
                                                    class="gmail_quote">On
                                                    Thu, Feb 14, 2013 at
                                                    7:52 PM, Prabath
                                                    Siriwardena <span
                                                      dir="ltr">&lt;<a
                                                        moz-do-not-send="true"
href="mailto:prabath@wso2.com" target="_blank">prabath@wso2.com</a>&gt;</span>
                                                    wrote:<br>
                                                    <blockquote
                                                      class="gmail_quote"
                                                      style="margin:0 0
                                                      0
                                                      .8ex;border-left:1px
                                                      #ccc
                                                      solid;padding-left:1ex">Both
                                                      the client and the
                                                      resource owner
                                                      should be aware of
                                                      the token type.
                                                      <div><br>
                                                      </div>
                                                      <div>My argument
                                                        is, if the
                                                        authorization
                                                        server to decide
                                                        whether the
                                                        token is valid
                                                        or not (
                                                        irrespective of
                                                        who asked the
                                                        question) - AS
                                                        needs to know
                                                        the token type -
                                                        because to
                                                        validate a token
                                                        AS should know
                                                        the token type.</div>
                                                      <div><br>
                                                      </div>
                                                      <div>The token
                                                        type could be,
                                                        bearer or MAC or
                                                        any other token
                                                        type.</div>
                                                      <div><br>
                                                      </div>
                                                      <div>Thanks &amp;
                                                        regards,</div>
                                                      <div>-Prabath
                                                        <div>
                                                          <div><br>
                                                          <br>
                                                          <div
                                                          class="gmail_quote">On

                                                          Thu, Feb 14,
                                                          2013 at 7:33
                                                          PM, Justin
                                                          Richer <span
                                                          dir="ltr">&lt;<a
moz-do-not-send="true" href="mailto:jricher@mitre.org" target="_blank">jricher@mitre.org</a>&gt;</span>
                                                          wrote:<br>
                                                          <blockquote
                                                          class="gmail_quote"
                                                          style="margin:0
                                                          0 0
                                                          .8ex;border-left:1px
                                                          #ccc
                                                          solid;padding-left:1ex">
                                                          <div
                                                          bgcolor="#FFFFFF"
                                                          text="#000000">
                                                          What exactly
                                                          are you
                                                          suggesting be
                                                          added to
                                                          introspection?
                                                          The
                                                          "token_type_hint"
                                                          is from the
                                                          client to the
                                                          server, but
                                                          what you've
                                                          asked for in
                                                          terms of
                                                          "token type"
                                                          is from the
                                                          server to the
                                                          client. And
                                                          there was
                                                          never an
                                                          answer to what
                                                          exactly is
                                                          meant by
                                                          "token type"
                                                          in this case,
                                                          particularly
                                                          because you
                                                          seem to want
                                                          to call out
                                                          things like
                                                          SAML and
                                                          Bearer as
                                                          separate
                                                          types. <br>
                                                          <span><font
                                                          color="#888888">
                                                          <br>
                                                          &nbsp;-- Justin</font></span>
                                                          <div>
                                                          <div><br>
                                                          <br>
                                                          <br>
                                                          <div>On
                                                          02/14/2013
                                                          06:59 AM,
                                                          Prabath
                                                          Siriwardena
                                                          wrote:<br>
                                                          </div>
                                                          <blockquote
                                                          type="cite"> I
                                                          noticed that
                                                          the latest
                                                          Token
                                                          Revocation
                                                          draft [1] has
                                                          introduced the
                                                          parameter
                                                          "token_type_hint".
                                                          I would
                                                          suggest the
                                                          same here, as
                                                          that would
                                                          make what is
                                                          meant by
                                                          "valid" much
                                                          clear..
                                                          <div><br>
                                                          </div>
                                                          <div>[1]:&nbsp;<a
                                                          moz-do-not-send="true"
href="http://tools.ietf.org/html/draft-ietf-oauth-revocation-05"
style="color:rgb(17,85,204);font-size:12.727272033691406px;font-family:arial,sans-serif"
target="_blank">http://tools.ietf.org/html/draft-ietf-oauth-revocation-05</a></div>
                                                          <div><br>
                                                          </div>
                                                          <div>Thanks
                                                          &amp; regards,</div>
                                                          <div>-Prabath<br>
                                                          <br>
                                                          <div
                                                          class="gmail_quote">On


                                                          Tue, Feb 12,
                                                          2013 at 9:35
                                                          PM, Prabath
                                                          Siriwardena <span
                                                          dir="ltr">&lt;<a
moz-do-not-send="true" href="mailto:prabath@wso2.com" target="_blank">prabath@wso2.com</a>&gt;</span>
                                                          wrote:<br>
                                                          <blockquote
                                                          class="gmail_quote"
                                                          style="margin:0
                                                          0 0
                                                          .8ex;border-left:1px
                                                          #ccc
                                                          solid;padding-left:1ex">Hi


                                                          Justin,
                                                          <div><br>
                                                          </div>
                                                          <div>I doubt
                                                          whether
                                                          valid_token
                                                          would make a
                                                          difference..?</div>
                                                          <div><br>
                                                          </div>
                                                          <div>My
                                                          initial
                                                          argument is
                                                          what is the
                                                          validation
                                                          criteria..?
                                                          Validation
                                                          criteria
                                                          depends on the
                                                          token_type..</div>
                                                          <div> <br>
                                                          </div>
                                                          <div>If we are
                                                          talking only
                                                          about metadata
                                                          - then I
                                                          believe
                                                          "revoked",
                                                          "expired"
                                                          would be more
                                                          meaningful..</div>
                                                          <div><br>
                                                          </div>
                                                          <div>Thanks
                                                          &amp; regards,</div>
                                                          <div>-Prabath
                                                          <div>
                                                          <div> <br>
                                                          <br>
                                                          <div
                                                          class="gmail_quote">
                                                          On Tue, Feb
                                                          12, 2013 at
                                                          7:53 PM,
                                                          Justin Richer
                                                          <span
                                                          dir="ltr">&lt;<a
moz-do-not-send="true" href="mailto:jricher@mitre.org" target="_blank">jricher@mitre.org</a>&gt;</span>
                                                          wrote:<br>
                                                          <blockquote
                                                          class="gmail_quote"
                                                          style="margin:0
                                                          0 0
                                                          .8ex;border-left:1px
                                                          #ccc
                                                          solid;padding-left:1ex">
                                                          <div
                                                          bgcolor="#FFFFFF"
                                                          text="#000000">
                                                          OK, I can see
                                                          the wisdom in
                                                          changing this
                                                          term. <br>
                                                          <br>
                                                          I picked
                                                          "valid"
                                                          because I
                                                          wanted a
                                                          simple
                                                          "boolean"
                                                          value that
                                                          would require
                                                          no additional
                                                          parsing or
                                                          string-matching
                                                          on the
                                                          client's
                                                          behalf, and
                                                          I'd like to
                                                          stick with
                                                          that. OAuth is
                                                          built with the
                                                          assumption
                                                          that clients
                                                          need to be
                                                          able to
                                                          recover from
                                                          invalid tokens
                                                          at any stage,
                                                          so I think a
                                                          simple yes/no
                                                          is the right
                                                          step here. <br>
                                                          <br>
                                                          That said, I
                                                          think you're
                                                          both right
                                                          that "valid"
                                                          seems to have
                                                          caused a bit
                                                          of confusion.
                                                          I don't want
                                                          to go with
                                                          "revoked"
                                                          because I'd
                                                          rather have
                                                          the "token is
                                                          OK" be the
                                                          positive
                                                          boolean value.
                                                          <br>
                                                          <br>
                                                          Would
                                                          "valid_token"
                                                          be more clear?
                                                          Or do we need
                                                          a different
                                                          adjective all
                                                          together?<span><font
color="#888888"><br>
                                                          <br>
                                                          &nbsp;-- Justin</font></span>
                                                          <div>
                                                          <div><br>
                                                          <br>
                                                          <div>On
                                                          02/11/2013
                                                          08:02 PM,
                                                          Richard
                                                          Harrington
                                                          wrote:<br>
                                                          </div>
                                                          <blockquote
                                                          type="cite">
                                                          <div>Have you
                                                          considered
                                                          "status"
                                                          instead of
                                                          "valid"? &nbsp;It
                                                          could have
                                                          values like
                                                          "active",
                                                          "expired", and
                                                          "revoked".</div>
                                                          <div><br>
                                                          </div>
                                                          <div>Is it
                                                          worthwhile
                                                          including the
                                                          status of the
                                                          client also?
                                                          &nbsp;For example,
                                                          a client
                                                          application
                                                          could be
                                                          disabled,
                                                          temporarily or
                                                          permanently,
                                                          and thus
                                                          disabling its
                                                          access tokens
                                                          as well.</div>
                                                          <div><br>
                                                          </div>
                                                          <div><br>
                                                          On Feb 11,
                                                          2013, at 1:56
                                                          PM, Prabath
                                                          Siriwardena
                                                          &lt;<a
                                                          moz-do-not-send="true"
href="mailto:prabath@wso2.com" target="_blank">prabath@wso2.com</a>&gt;
                                                          wrote:<br>
                                                          <br>
                                                          </div>
                                                          <blockquote
                                                          type="cite">
                                                          <div>I guess
                                                          confusion is
                                                          with 'valid'
                                                          parameter is
                                                          in the
                                                          response..
                                                          <div><br>
                                                          </div>
                                                          <div>I thought
                                                          this will be
                                                          helpful
                                                          to&nbsp;standardize&nbsp;the
                                                          communication
                                                          between
                                                          Resource
                                                          Server and the
                                                          Authorization
                                                          Server..</div>
                                                          <div><br>
                                                          </div>
                                                          <div>I would
                                                          suggest we
                                                          completely
                                                          remove "valid"
                                                          from the
                                                          response - or
                                                          define it much
                                                          clearly..</div>
                                                          <div><br>
                                                          </div>
                                                          <div>May be
                                                          can add
                                                          "revoked" with
                                                          a boolean
                                                          attribute..</div>
                                                          <div><br>
                                                          </div>
                                                          <div>Thanks
                                                          &amp; regards,</div>
                                                          <div>-Prabath<br>
                                                          <br>
                                                          <div
                                                          class="gmail_quote">On



                                                          Tue, Feb 12,
                                                          2013 at 3:19
                                                          AM, Justin
                                                          Richer <span
                                                          dir="ltr">&lt;<a
moz-do-not-send="true" href="mailto:jricher@mitre.org" target="_blank">jricher@mitre.org</a>&gt;</span>
                                                          wrote:<br>
                                                          <blockquote
                                                          class="gmail_quote"
                                                          style="margin:0
                                                          0 0
                                                          .8ex;border-left:1px
                                                          #ccc
                                                          solid;padding-left:1ex">
                                                          <div
                                                          bgcolor="#FFFFFF"
                                                          text="#000000">
                                                          <div> <br>
                                                          <div>On
                                                          02/08/2013
                                                          12:51 AM,
                                                          Prabath
                                                          Siriwardena
                                                          wrote:<br>
                                                          </div>
                                                          </div>
                                                          <blockquote
                                                          type="cite">
                                                          Hi&nbsp;Justin,
                                                          <div><br>
                                                          </div>
                                                          <div>
                                                          <div>I have
                                                          couple of
                                                          questions
                                                          related to
                                                          "valid"
                                                          parameter...</div>
                                                          <div><br>
                                                          </div>
                                                          <div>This
                                                          endpoint can
                                                          be invoked by
                                                          the Resource
                                                          Server in
                                                          runtime...</div>
                                                          </div>
                                                          </blockquote>
                                                          <br>
                                                          That's
                                                          correct.
                                                          <div><br>
                                                          <br>
                                                          <blockquote
                                                          type="cite">
                                                          <div><br>
                                                          </div>
                                                          <div>In that
                                                          case what is
                                                          exactly meant
                                                          by the
                                                          "resource_id"
                                                          in request ?</div>
                                                          </blockquote>
                                                          <br>
                                                          </div>
                                                          The
                                                          resource_id
                                                          field is a
                                                          service-specific
                                                          string that
                                                          basically lets
                                                          the resource
                                                          server provide
                                                          some context
                                                          to the request
                                                          to the auth
                                                          server. There
                                                          have been some
                                                          other
                                                          suggestions
                                                          like client IP
                                                          address, but I
                                                          wanted to put
                                                          this one in
                                                          because it
                                                          seemed to be a
                                                          common theme.
                                                          The client is
                                                          trying to do
                                                          *something*
                                                          with the
                                                          token, after
                                                          all, and the
                                                          rights,
                                                          permissions,
                                                          and metadata
                                                          associated
                                                          with the token
                                                          could change
                                                          based on that.
                                                          Since the
                                                          Introspection
                                                          endpoint is
                                                          all about
                                                          getting that
                                                          metadata back
                                                          to the PR,
                                                          this seemed
                                                          like a good
                                                          idea.
                                                          <div><br>
                                                          <br>
                                                          <blockquote
                                                          type="cite">
                                                          <div><br>
                                                          </div>
                                                          <div>IMO a
                                                          token to be
                                                          valid depends
                                                          on set of
                                                          criteria based
                                                          on it's type..</div>
                                                          <div><br>
                                                          </div>
                                                          <div>For a
                                                          Bearer token..</div>
                                                          <div><br>
                                                          </div>
                                                          <div>1. Token
                                                          should not be
                                                          expired</div>
                                                          <div>2. Token
                                                          should not be
                                                          revoked.</div>
                                                          <div>3. The
                                                          scope the
                                                          token issued
                                                          should match
                                                          with the scope
                                                          required for
                                                          the resource.</div>
                                                          <div><br>
                                                          </div>
                                                          <div>For a MAC
                                                          token...</div>
                                                          <div><br>
                                                          </div>
                                                          <div>1. Token
                                                          not expired
                                                          (mac id)</div>
                                                          <div>2. Token
                                                          should not be
                                                          revoked</div>
                                                          <div>3. The
                                                          scope the
                                                          token issued
                                                          should match
                                                          with the scope
                                                          required for
                                                          the resource.</div>
                                                          <div>4. HMAC
                                                          check should
                                                          be valid</div>
                                                          <div><br>
                                                          </div>
                                                          There are
                                                          similar
                                                          conditions for
                                                          SAML bearer
                                                          too..</blockquote>
                                                          <br>
                                                          </div>
                                                          This isn't
                                                          really true.
                                                          The SAML
                                                          bearer token
                                                          is fully
                                                          self-contained
                                                          and doesn't
                                                          change based
                                                          on other
                                                          parameters in
                                                          the message,
                                                          unlike MAC.
                                                          Same with JWT.
                                                          When it hands
                                                          a SAML or JWT
                                                          token to the
                                                          AS, the PR has
                                                          given
                                                          *everything*
                                                          the server
                                                          needs to check
                                                          that token's
                                                          validity and
                                                          use. <br>
                                                          <br>
                                                          MAC signatures
                                                          change with
                                                          every message,
                                                          and they're
                                                          done across
                                                          several
                                                          components of
                                                          the HTTP
                                                          message.
                                                          Therefor, the
                                                          HMAC check for
                                                          MAC style
                                                          tokens will
                                                          still need to
                                                          be done by the
                                                          protected
                                                          resource.
                                                          Introspection
                                                          would help in
                                                          the case that
                                                          the signature
                                                          validated just
                                                          fine, but the
                                                          token might
                                                          have expired.
                                                          Or you need to
                                                          know what
                                                          scopes apply.
                                                          Introspection
                                                          isn't to fully
                                                          validate the
                                                          call to the
                                                          protected
                                                          resource -- if
                                                          that were the
                                                          case, the PR
                                                          would have to
                                                          send some kind
                                                          of
                                                          encapsulated
                                                          version of the
                                                          original
                                                          request.
                                                          Otherwise, the
                                                          AS won't have
                                                          all of the
                                                          information it
                                                          needs to check
                                                          the MAC.<br>
                                                          <br>
                                                          <br>
                                                          I think what
                                                          you're
                                                          describing is
                                                          ultimately
                                                          *not* what the
                                                          introspection
                                                          endpoint is
                                                          intended to
                                                          do. If that's
                                                          unclear from
                                                          the document,
                                                          can you please
                                                          suggest text
                                                          that would
                                                          help clear the
                                                          use case up? I
                                                          wouldn't want
                                                          it to be
                                                          ambiguous.<span><font
color="#888888"><br>
                                                          <br>
                                                          &nbsp;-- Justin</font></span>
                                                          <div>
                                                          <div><br>
                                                          <br>
                                                          <blockquote
                                                          type="cite">
                                                          <div><br>
                                                          </div>
                                                          <div>Thanks
                                                          &amp; regards,</div>
                                                          <div>-Prabath</div>
                                                          <div><br>
                                                          </div>
                                                          <div><br>
                                                          <div
                                                          class="gmail_quote">On




                                                          Thu, Feb 7,
                                                          2013 at 10:30
                                                          PM, Justin
                                                          Richer <span
                                                          dir="ltr">&lt;<a
moz-do-not-send="true" href="mailto:jricher@mitre.org" target="_blank">jricher@mitre.org</a>&gt;</span>
                                                          wrote:<br>
                                                          <blockquote
                                                          class="gmail_quote"
                                                          style="margin:0
                                                          0 0
                                                          .8ex;border-left:1px
                                                          #ccc
                                                          solid;padding-left:1ex">
                                                          <div
                                                          bgcolor="#FFFFFF"
                                                          text="#000000">
                                                          It validates
                                                          the token,
                                                          which would be
                                                          either the
                                                          token itself
                                                          in the case of
                                                          Bearer or the
                                                          token "id"
                                                          part of
                                                          something more
                                                          complex like
                                                          MAC. It
                                                          doesn't
                                                          directly
                                                          validate the
                                                          usage of the
                                                          token, that's
                                                          still up to
                                                          the PR to do
                                                          that.<br>
                                                          <br>
                                                          I nearly added
                                                          a "token type"
                                                          field in this
                                                          draft, but
                                                          held back
                                                          because there
                                                          are several
                                                          kinds of
                                                          "token type"
                                                          that people
                                                          talk about in
                                                          OAuth. First,
                                                          there's
                                                          "Bearer" vs.
                                                          "MAC" vs.
                                                          "HOK", or what
                                                          have you. Then
                                                          within Bearer
                                                          you have "JWT"
                                                          or "SAML" or
                                                          "unstructured
                                                          blob". Then
                                                          you've also
                                                          got "access"
                                                          vs. "refresh"
                                                          and other
                                                          flavors of
                                                          token, like
                                                          the id_token
                                                          in OpenID
                                                          Connect. <br>
                                                          <br>
                                                          Thing is, the
                                                          server running
                                                          the
                                                          introspection
                                                          endpoint will
                                                          probably know
                                                          *all* of
                                                          these. But
                                                          should it tell
                                                          the client? If
                                                          so, which of
                                                          the three, and
                                                          what names
                                                          should the
                                                          fields be?<span><font
color="#888888"><br>
                                                          <br>
                                                          &nbsp;-- Justin</font></span>
                                                          <div>
                                                          <div><br>
                                                          <br>
                                                          <div>On
                                                          02/07/2013
                                                          11:26 AM,
                                                          Prabath
                                                          Siriwardena
                                                          wrote:<br>
                                                          </div>
                                                          <blockquote
                                                          type="cite">
                                                          Okay.. I was
                                                          thinking this
                                                          could be used
                                                          as a way to
                                                          validate the
                                                          token as well.
                                                          BTW even in
                                                          this case
                                                          shouldn't
                                                          communicate
                                                          the type of
                                                          token to AS?
                                                          For example in
                                                          the case of
                                                          SAML profile -
                                                          it could be
                                                          SAML token..
                                                          <div> <br>
                                                          </div>
                                                          <div>Thanks
                                                          &amp; regards,</div>
                                                          <div>-Prabath<br>
                                                          <br>
                                                          <div
                                                          class="gmail_quote">On




                                                          Thu, Feb 7,
                                                          2013 at 8:39
                                                          PM, Justin
                                                          Richer <span
                                                          dir="ltr">&lt;<a
moz-do-not-send="true" href="mailto:jricher@mitre.org" target="_blank">jricher@mitre.org</a>&gt;</span>
                                                          wrote:<br>
                                                          <blockquote
                                                          class="gmail_quote"
                                                          style="margin:0
                                                          0 0
                                                          .8ex;border-left:1px
                                                          #ccc
                                                          solid;padding-left:1ex">
                                                          <div
                                                          bgcolor="#FFFFFF"
                                                          text="#000000">
                                                          "valid" might
                                                          not be the
                                                          best term, but
                                                          it's meant to
                                                          be a field
                                                          where the
                                                          server says
                                                          "yes this
                                                          token is still
                                                          good" or "no
                                                          this token
                                                          isn't good
                                                          anymore". We
                                                          could instead
                                                          do this with
                                                          HTTP codes or
                                                          something but
                                                          I went with a
                                                          pure JSON
                                                          response.<span><font
color="#888888"><br>
                                                          <br>
                                                          &nbsp;-- Justin</font></span>
                                                          <div>
                                                          <div><br>
                                                          <br>
                                                          <div>On
                                                          02/06/2013
                                                          10:47 PM,
                                                          Prabath
                                                          Siriwardena
                                                          wrote:<br>
                                                          </div>
                                                          <blockquote
                                                          type="cite">
                                                          Hi Justin,
                                                          <div><br>
                                                          </div>
                                                          <div>I believe
                                                          this is
                                                          addressing one
                                                          of the key
                                                          missing part
                                                          in OAuth
                                                          2.0...</div>
                                                          <div><br>
                                                          </div>
                                                          <div>One
                                                          question - I
                                                          guess this was
                                                          discussed
                                                          already...</div>
                                                          <div><br>
                                                          </div>
                                                          <div>In the
                                                          spec - in the
                                                          introspection
                                                          response it
                                                          has the
                                                          attribute
                                                          "valid" - this
                                                          is basically
                                                          the validity
                                                          of the token
                                                          provided in
                                                          the request.</div>
                                                          <div><br>
                                                          </div>
                                                          <div>Validation&nbsp;criteria





                                                          depends on the
                                                          token and well
                                                          as token type
                                                          ( Bearer,
                                                          MAC..).</div>
                                                          <div><br>
                                                          </div>
                                                          <div>In the
                                                          spec it seems
                                                          like it's
                                                          coupled with
                                                          Bearer token
                                                          type... But I
                                                          guess, by
                                                          adding
                                                          "token_type"
                                                          to the request
                                                          we can remove
                                                          this
                                                          dependency.</div>
                                                          <div><br>
                                                          </div>
                                                          <div>WDYT..?</div>
                                                          <div><br>
                                                          </div>
                                                          <div>Thanks
                                                          &amp; regards,</div>
                                                          <div>-Prabath&nbsp;</div>
                                                          <div><br>
                                                          <div
                                                          class="gmail_quote">On





                                                          Thu, Feb 7,
                                                          2013 at 12:54
                                                          AM, Justin
                                                          Richer <span
                                                          dir="ltr">&lt;<a
moz-do-not-send="true" href="mailto:jricher@mitre.org" target="_blank">jricher@mitre.org</a>&gt;</span>
                                                          wrote:<br>
                                                          <blockquote
                                                          class="gmail_quote"
                                                          style="margin:0
                                                          0 0
                                                          .8ex;border-left:1px
                                                          #ccc
                                                          solid;padding-left:1ex">
                                                          <div
                                                          bgcolor="#FFFFFF"
                                                          text="#000000">
                                                          Updated
                                                          introspection
                                                          draft based on
                                                          recent
                                                          comments.
                                                          Changes
                                                          include:<br>
                                                          <br>
                                                          &nbsp;- "scope"
                                                          return
                                                          parameter now
                                                          follows
                                                          RFC6749 format
                                                          instead of
                                                          JSON array<br>
                                                          &nbsp;- "subject"
                                                          -&gt; "sub",
                                                          and "audience"
                                                          -&gt; "aud",
                                                          to be parallel
                                                          with JWT
                                                          claims<br>
                                                          &nbsp;- clarified
                                                          what happens
                                                          if the
                                                          authentication
                                                          is bad<br>
                                                          <br>
                                                          &nbsp;-- Justin<br>
                                                          <div><br>
                                                          <br>
                                                          --------
                                                          Original
                                                          Message
                                                          --------
                                                          <table
                                                          border="0"
                                                          cellpadding="0"
cellspacing="0">
                                                          <tbody>
                                                          <tr>
                                                          <th
                                                          align="RIGHT"
nowrap="nowrap" valign="BASELINE">Subject: </th>
                                                          <td>New
                                                          Version
                                                          Notification
                                                          for
                                                          draft-richer-oauth-introspection-02.txt</td>
                                                          </tr>
                                                          <tr>
                                                          <th
                                                          align="RIGHT"
nowrap="nowrap" valign="BASELINE">Date: </th>
                                                          <td>Wed, 6 Feb
                                                          2013 11:24:20
                                                          -0800</td>
                                                          </tr>
                                                          <tr>
                                                          <th
                                                          align="RIGHT"
nowrap="nowrap" valign="BASELINE">From: </th>
                                                          <td><a
                                                          moz-do-not-send="true"
href="mailto:internet-drafts@ietf.org" target="_blank">&lt;internet-drafts@ietf.org&gt;</a></td>
                                                          </tr>
                                                          <tr>
                                                          <th
                                                          align="RIGHT"
nowrap="nowrap" valign="BASELINE">To: </th>
                                                          <td><a
                                                          moz-do-not-send="true"
href="mailto:jricher@mitre.org" target="_blank">&lt;jricher@mitre.org&gt;</a></td>
                                                          </tr>
                                                          </tbody>
                                                          </table>
                                                          <br>
                                                          <br>
                                                          <pre>A new version of I-D, draft-richer-oauth-introspection-02.txt
has been successfully submitted by Justin Richer and posted to the
IETF repository.

Filename:	 draft-richer-oauth-introspection
Revision:	 02
Title:		 OAuth Token Introspection
Creation date:	 2013-02-06
WG ID:		 Individual Submission
Number of pages: 6
URL:             <a moz-do-not-send="true" href="http://www.ietf.org/internet-drafts/draft-richer-oauth-introspection-02.txt" target="_blank">http://www.ietf.org/internet-drafts/draft-richer-oauth-introspection-02.txt</a>
Status:          <a moz-do-not-send="true" href="http://datatracker.ietf.org/doc/draft-richer-oauth-introspection" target="_blank">http://datatracker.ietf.org/doc/draft-richer-oauth-introspection</a>
Htmlized:        <a moz-do-not-send="true" href="http://tools.ietf.org/html/draft-richer-oauth-introspection-02" target="_blank">http://tools.ietf.org/html/draft-richer-oauth-introspection-02</a>
Diff:            <a moz-do-not-send="true" href="http://www.ietf.org/rfcdiff?url2=draft-richer-oauth-introspection-02" target="_blank">http://www.ietf.org/rfcdiff?url2=draft-richer-oauth-introspection-02</a>

Abstract:
   This specification defines a method for a client or protected
   resource to query an OAuth authorization server to determine meta-
   information about an OAuth token.


                                                                                  


The IETF Secretariat

</pre>
                                                          <br>
                                                          </div>
                                                          <br>
                                                          </div>
                                                          <br>
_______________________________________________<br>
                                                          OAuth mailing
                                                          list<br>
                                                          <a
                                                          moz-do-not-send="true"
href="mailto:OAuth@ietf.org" target="_blank">OAuth@ietf.org</a><br>
                                                          <a
                                                          moz-do-not-send="true"
href="https://www.ietf.org/mailman/listinfo/oauth" target="_blank">https://www.ietf.org/mailman/listinfo/oauth</a><br>
                                                          <br>
                                                          </blockquote>
                                                          </div>
                                                          <br>
                                                          <br
                                                          clear="all">
                                                          <div><br>
                                                          </div>
                                                          -- <br>
                                                          Thanks &amp;
                                                          Regards,<br>
                                                          Prabath
                                                          <div><br>
                                                          </div>
                                                          <div>Mobile :
                                                          <a
                                                          moz-do-not-send="true"
href="tel:%2B94%2071%20809%206732" value="+94718096732" target="_blank">+94




                                                          71 809 6732</a>&nbsp;<br>
                                                          <br>
                                                          <a
                                                          moz-do-not-send="true"
href="http://blog.facilelogin.com" target="_blank">http://blog.facilelogin.com</a><br>
                                                          <a
                                                          moz-do-not-send="true"
href="http://RampartFAQ.com" target="_blank">http://RampartFAQ.com</a></div>
                                                          </div>
                                                          </blockquote>
                                                          <br>
                                                          </div>
                                                          </div>
                                                          </div>
                                                          </blockquote>
                                                          </div>
                                                          <br>
                                                          <br
                                                          clear="all">
                                                          <div><br>
                                                          </div>
                                                          -- <br>
                                                          Thanks &amp;
                                                          Regards,<br>
                                                          Prabath
                                                          <div><br>
                                                          </div>
                                                          <div>Mobile :
                                                          <a
                                                          moz-do-not-send="true"
href="tel:%2B94%2071%20809%206732" value="+94718096732" target="_blank">+94




                                                          71 809 6732</a>&nbsp;<br>
                                                          <br>
                                                          <a
                                                          moz-do-not-send="true"
href="http://blog.facilelogin.com" target="_blank">http://blog.facilelogin.com</a><br>
                                                          <a
                                                          moz-do-not-send="true"
href="http://RampartFAQ.com" target="_blank">http://RampartFAQ.com</a></div>
                                                          </div>
                                                          </blockquote>
                                                          <br>
                                                          </div>
                                                          </div>
                                                          </div>
                                                          </blockquote>
                                                          </div>
                                                          <br>
                                                          <br
                                                          clear="all">
                                                          <div><br>
                                                          </div>
                                                          -- <br>
                                                          Thanks &amp;
                                                          Regards,<br>
                                                          Prabath
                                                          <div><br>
                                                          </div>
                                                          <div>Mobile :
                                                          <a
                                                          moz-do-not-send="true"
href="tel:%2B94%2071%20809%206732" value="+94718096732" target="_blank">+94





                                                          71 809 6732</a>&nbsp;<br>
                                                          <br>
                                                          <a
                                                          moz-do-not-send="true"
href="http://blog.facilelogin.com" target="_blank">http://blog.facilelogin.com</a><br>
                                                          <a
                                                          moz-do-not-send="true"
href="http://RampartFAQ.com" target="_blank">http://RampartFAQ.com</a></div>
                                                          </div>
                                                          </blockquote>
                                                          <br>
                                                          </div>
                                                          </div>
                                                          </div>
                                                          </blockquote>
                                                          </div>
                                                          <br>
                                                          <br
                                                          clear="all">
                                                          <div><br>
                                                          </div>
                                                          -- <br>
                                                          Thanks &amp;
                                                          Regards,<br>
                                                          Prabath
                                                          <div><br>
                                                          </div>
                                                          <div>Mobile :
                                                          <a
                                                          moz-do-not-send="true"
href="tel:%2B94%2071%20809%206732" value="+94718096732" target="_blank">+94



                                                          71 809 6732</a>&nbsp;<br>
                                                          <br>
                                                          <a
                                                          moz-do-not-send="true"
href="http://blog.facilelogin.com" target="_blank">http://blog.facilelogin.com</a><br>
                                                          <a
                                                          moz-do-not-send="true"
href="http://RampartFAQ.com" target="_blank">http://RampartFAQ.com</a></div>
                                                          </div>
                                                          </div>
                                                          </blockquote>
                                                          <blockquote
                                                          type="cite">
                                                          <div><span>_______________________________________________</span><br>
                                                          <span>OAuth
                                                          mailing list</span><br>
                                                          <span><a
                                                          moz-do-not-send="true"
href="mailto:OAuth@ietf.org" target="_blank">OAuth@ietf.org</a></span><br>
                                                          <span><a
                                                          moz-do-not-send="true"
href="https://www.ietf.org/mailman/listinfo/oauth" target="_blank">https://www.ietf.org/mailman/listinfo/oauth</a></span><br>
                                                          </div>
                                                          </blockquote>
                                                          </blockquote>
                                                          <br>
                                                          </div>
                                                          </div>
                                                          </div>
                                                          </blockquote>
                                                          </div>
                                                          <br>
                                                          <br
                                                          clear="all">
                                                          <div><br>
                                                          </div>
                                                          -- <br>
                                                          Thanks &amp;
                                                          Regards,<br>
                                                          Prabath
                                                          <div><br>
                                                          </div>
                                                          <div>Mobile :
                                                          <a
                                                          moz-do-not-send="true"
href="tel:%2B94%2071%20809%206732" value="+94718096732" target="_blank">+94

                                                          71 809 6732</a>&nbsp;<br>
                                                          <br>
                                                          <a
                                                          moz-do-not-send="true"
href="http://blog.facilelogin.com" target="_blank">http://blog.facilelogin.com</a><br>
                                                          <a
                                                          moz-do-not-send="true"
href="http://RampartFAQ.com" target="_blank">http://RampartFAQ.com</a></div>
                                                          </div>
                                                          </div>
                                                          </div>
                                                          </blockquote>
                                                          </div>
                                                          <br>
                                                          <br
                                                          clear="all">
                                                          <div><br>
                                                          </div>
                                                          -- <br>
                                                          Thanks &amp;
                                                          Regards,<br>
                                                          Prabath
                                                          <div><br>
                                                          </div>
                                                          <div>Mobile :
                                                          <a
                                                          moz-do-not-send="true"
href="tel:%2B94%2071%20809%206732" value="+94718096732" target="_blank">+94



                                                          71 809 6732</a>&nbsp;<br>
                                                          <br>
                                                          <a
                                                          moz-do-not-send="true"
href="http://blog.facilelogin.com" target="_blank">http://blog.facilelogin.com</a><br>
                                                          <a
                                                          moz-do-not-send="true"
href="http://RampartFAQ.com" target="_blank">http://RampartFAQ.com</a></div>
                                                          </div>
                                                          </blockquote>
                                                          <br>
                                                          </div>
                                                          </div>
                                                          </div>
                                                          </blockquote>
                                                          </div>
                                                          <br>
                                                          <br
                                                          clear="all">
                                                          <div><br>
                                                          </div>
                                                          -- <br>
                                                          Thanks &amp;
                                                          Regards,<br>
                                                          Prabath
                                                          <div><br>
                                                          </div>
                                                          <div>Mobile :
                                                          <a
                                                          moz-do-not-send="true"
href="tel:%2B94%2071%20809%206732" value="+94718096732" target="_blank">+94


                                                          71 809 6732</a>&nbsp;<br>
                                                          <br>
                                                          <a
                                                          moz-do-not-send="true"
href="http://blog.facilelogin.com" target="_blank">http://blog.facilelogin.com</a><br>
                                                          <a
                                                          moz-do-not-send="true"
href="http://RampartFAQ.com" target="_blank">http://RampartFAQ.com</a></div>
                                                          </div>
                                                        </div>
                                                      </div>
                                                    </blockquote>
                                                  </div>
                                                  <br>
                                                  <br clear="all">
                                                  <div><br>
                                                  </div>
                                                  -- <br>
                                                  Thanks &amp; Regards,<br>
                                                  Prabath
                                                  <div><br>
                                                  </div>
                                                  <div>Mobile : <a
                                                      moz-do-not-send="true"
href="tel:%2B94%2071%20809%206732" value="+94718096732" target="_blank">+94
                                                      71 809 6732</a>&nbsp;<br>
                                                    <br>
                                                    <a
                                                      moz-do-not-send="true"
href="http://blog.facilelogin.com" target="_blank">http://blog.facilelogin.com</a><br>
                                                    <a
                                                      moz-do-not-send="true"
href="http://RampartFAQ.com" target="_blank">http://RampartFAQ.com</a></div>
                                                </div>
                                              </blockquote>
                                              <br>
                                            </div>
                                          </div>
                                        </div>
                                      </blockquote>
                                    </div>
                                    <br>
                                    <br clear="all">
                                    <div><br>
                                    </div>
                                    -- <br>
                                    Thanks &amp; Regards,<br>
                                    Prabath
                                    <div><br>
                                    </div>
                                    <div>Mobile : <a
                                        moz-do-not-send="true"
                                        href="tel:%2B94%2071%20809%206732"
                                        value="+94718096732"
                                        target="_blank">+94 71 809 6732</a>&nbsp;<br>
                                      <br>
                                      <a moz-do-not-send="true"
                                        href="http://blog.facilelogin.com"
                                        target="_blank">http://blog.facilelogin.com</a><br>
                                      <a moz-do-not-send="true"
                                        href="http://RampartFAQ.com"
                                        target="_blank">http://RampartFAQ.com</a></div>
                                  </div>
                                </blockquote>
                                <br>
                              </div>
                            </div>
                          </div>
                        </blockquote>
                      </div>
                      <br>
                      <br clear="all">
                      <div><br>
                      </div>
                      -- <br>
                      Thanks &amp; Regards,<br>
                      Prabath
                      <div><br>
                      </div>
                      <div>Mobile : <a moz-do-not-send="true"
                          href="tel:%2B94%2071%20809%206732"
                          value="+94718096732" target="_blank">+94 71
                          809 6732</a>&nbsp;<br>
                        <br>
                        <a moz-do-not-send="true"
                          href="http://blog.facilelogin.com"
                          target="_blank">http://blog.facilelogin.com</a><br>
                        <a moz-do-not-send="true"
                          href="http://RampartFAQ.com" target="_blank">http://RampartFAQ.com</a></div>
                    </div>
                  </blockquote>
                  <br>
                </div>
              </div>
            </div>
          </blockquote>
        </div>
        <br>
        <br clear="all">
        <div><br>
        </div>
        -- <br>
        Thanks &amp; Regards,<br>
        Prabath
        <div><br>
        </div>
        <div>Mobile : +94 71 809 6732&nbsp;<br>
          <br>
          <a moz-do-not-send="true" href="http://blog.facilelogin.com"
            target="_blank">http://blog.facilelogin.com</a><br>
          <a moz-do-not-send="true" href="http://RampartFAQ.com"
            target="_blank">http://RampartFAQ.com</a></div>
      </div>
    </blockquote>
    <br>
  </body>
</html>

--------------000109060609020608000502--

From prateek.mishra@oracle.com  Thu Feb 14 10:59:49 2013
Return-Path: <prateek.mishra@oracle.com>
X-Original-To: oauth@ietfa.amsl.com
Delivered-To: oauth@ietfa.amsl.com
Received: from localhost (localhost [127.0.0.1]) by ietfa.amsl.com (Postfix) with ESMTP id 5A64F21F8570 for <oauth@ietfa.amsl.com>; Thu, 14 Feb 2013 10:59:49 -0800 (PST)
X-Virus-Scanned: amavisd-new at amsl.com
X-Spam-Flag: NO
X-Spam-Score: -6.599
X-Spam-Level: 
X-Spam-Status: No, score=-6.599 tagged_above=-999 required=5 tests=[AWL=0.000,  BAYES_00=-2.599, RCVD_IN_DNSWL_MED=-4]
Received: from mail.ietf.org ([64.170.98.30]) by localhost (ietfa.amsl.com [127.0.0.1]) (amavisd-new, port 10024) with ESMTP id NcKqXmpUedME for <oauth@ietfa.amsl.com>; Thu, 14 Feb 2013 10:59:48 -0800 (PST)
Received: from userp1040.oracle.com (userp1040.oracle.com [156.151.31.81]) by ietfa.amsl.com (Postfix) with ESMTP id C593021F856F for <oauth@ietf.org>; Thu, 14 Feb 2013 10:59:48 -0800 (PST)
Received: from acsinet21.oracle.com (acsinet21.oracle.com [141.146.126.237]) by userp1040.oracle.com (Sentrion-MTA-4.3.1/Sentrion-MTA-4.3.1) with ESMTP id r1EIxjci007790 (version=TLSv1/SSLv3 cipher=DHE-RSA-AES256-SHA bits=256 verify=OK); Thu, 14 Feb 2013 18:59:46 GMT
Received: from acsmt356.oracle.com (acsmt356.oracle.com [141.146.40.156]) by acsinet21.oracle.com (8.14.4+Sun/8.14.4) with ESMTP id r1EIxjnP001453 (version=TLSv1/SSLv3 cipher=DHE-RSA-AES256-SHA bits=256 verify=NO); Thu, 14 Feb 2013 18:59:45 GMT
Received: from abhmt117.oracle.com (abhmt117.oracle.com [141.146.116.69]) by acsmt356.oracle.com (8.12.11.20060308/8.12.11) with ESMTP id r1EIxhhR008969; Thu, 14 Feb 2013 12:59:44 -0600
Received: from [10.152.53.230] (/10.152.53.230) by default (Oracle Beehive Gateway v4.0) with ESMTP ; Thu, 14 Feb 2013 10:59:43 -0800
Message-ID: <511D341F.6080405@oracle.com>
Date: Thu, 14 Feb 2013 13:59:43 -0500
From: Prateek Mishra <prateek.mishra@oracle.com>
Organization: Oracle Corporation
User-Agent: Mozilla/5.0 (Windows NT 5.1; rv:17.0) Gecko/20130107 Thunderbird/17.0.2
MIME-Version: 1.0
To: Hannes Tschofenig <hannes.tschofenig@gmx.net>
References: <0573984A-8C11-4960-9BC6-F44D4B664C19@gmx.net> <511BBBAC.9060502@oracle.com> <0DF3F088-7F15-4C0F-85C4-35DE80CB01E0@gmx.net>
In-Reply-To: <0DF3F088-7F15-4C0F-85C4-35DE80CB01E0@gmx.net>
Content-Type: text/plain; charset=ISO-8859-1; format=flowed
Content-Transfer-Encoding: 7bit
X-Source-IP: acsinet21.oracle.com [141.146.126.237]
Cc: oauth@ietf.org
Subject: Re: [OAUTH-WG] Minutes from the OAuth Design Team Conference Call - 11th February 2013
X-BeenThere: oauth@ietf.org
X-Mailman-Version: 2.1.12
Precedence: list
List-Id: OAUTH WG <oauth.ietf.org>
List-Unsubscribe: <https://www.ietf.org/mailman/options/oauth>, <mailto:oauth-request@ietf.org?subject=unsubscribe>
List-Archive: <http://www.ietf.org/mail-archive/web/oauth>
List-Post: <mailto:oauth@ietf.org>
List-Help: <mailto:oauth-request@ietf.org?subject=help>
List-Subscribe: <https://www.ietf.org/mailman/listinfo/oauth>, <mailto:oauth-request@ietf.org?subject=subscribe>
X-List-Received-Date: Thu, 14 Feb 2013 18:59:49 -0000

Regarding the question of AS to RS communication, I think capturing it 
is a reasonable task but not one essential to this activity.

So my view would be to exclude it from consideration in this groups 
activity. We have many use-cases where support for confirmation that goes
beyond the currently supported bearer model would be valuable. In these 
cases, the AS and RS belong to the same administrative domain.

- prateek
> Hi Prateek,
>
>
> thanks for your questions.
>
>
> On Feb 13, 2013, at 6:13 PM, Prateek Mishra wrote:
>
>> Hannes,
>>
>> 1) Its not clear to me that we need  to specify exchanges between the AS and the RS as part of this work. The core specification leaves this
>> unspecified. There could be many different ways that the AS and RS collaborate to validate signatures in messages received from the client.
> It depends what the group wants to accomplish. So far, I thought that the goal was to offer the ability to provide a sufficient description in our specifications so that the authorization server and the resource server can be provided by different vendors and that they still interoperate.
>
> The group may have changed their mind in the meanwhile.
>
> What is your view?
>


From prateek.mishra@oracle.com  Thu Feb 14 11:21:15 2013
Return-Path: <prateek.mishra@oracle.com>
X-Original-To: oauth@ietfa.amsl.com
Delivered-To: oauth@ietfa.amsl.com
Received: from localhost (localhost [127.0.0.1]) by ietfa.amsl.com (Postfix) with ESMTP id 2BC7921F8681 for <oauth@ietfa.amsl.com>; Thu, 14 Feb 2013 11:21:08 -0800 (PST)
X-Virus-Scanned: amavisd-new at amsl.com
X-Spam-Flag: NO
X-Spam-Score: -6.599
X-Spam-Level: 
X-Spam-Status: No, score=-6.599 tagged_above=-999 required=5 tests=[AWL=0.000,  BAYES_00=-2.599, RCVD_IN_DNSWL_MED=-4]
Received: from mail.ietf.org ([64.170.98.30]) by localhost (ietfa.amsl.com [127.0.0.1]) (amavisd-new, port 10024) with ESMTP id 6mDx9t1NLm50 for <oauth@ietfa.amsl.com>; Thu, 14 Feb 2013 11:21:05 -0800 (PST)
Received: from aserp1040.oracle.com (aserp1040.oracle.com [141.146.126.69]) by ietfa.amsl.com (Postfix) with ESMTP id D64C121F8610 for <oauth@ietf.org>; Thu, 14 Feb 2013 11:21:04 -0800 (PST)
Received: from acsinet22.oracle.com (acsinet22.oracle.com [141.146.126.238]) by aserp1040.oracle.com (Sentrion-MTA-4.3.1/Sentrion-MTA-4.3.1) with ESMTP id r1EJL1tL008043 (version=TLSv1/SSLv3 cipher=DHE-RSA-AES256-SHA bits=256 verify=OK); Thu, 14 Feb 2013 19:21:02 GMT
Received: from acsmt358.oracle.com (acsmt358.oracle.com [141.146.40.158]) by acsinet22.oracle.com (8.14.4+Sun/8.14.4) with ESMTP id r1EJL0rO013391 (version=TLSv1/SSLv3 cipher=DHE-RSA-AES256-SHA bits=256 verify=NO); Thu, 14 Feb 2013 19:21:01 GMT
Received: from abhmt106.oracle.com (abhmt106.oracle.com [141.146.116.58]) by acsmt358.oracle.com (8.12.11.20060308/8.12.11) with ESMTP id r1EJL0HV021389; Thu, 14 Feb 2013 13:21:00 -0600
Received: from [10.152.53.230] (/10.152.53.230) by default (Oracle Beehive Gateway v4.0) with ESMTP ; Thu, 14 Feb 2013 11:21:00 -0800
Message-ID: <511D3919.4090906@oracle.com>
Date: Thu, 14 Feb 2013 14:20:57 -0500
From: Prateek Mishra <prateek.mishra@oracle.com>
Organization: Oracle Corporation
User-Agent: Mozilla/5.0 (Windows NT 5.1; rv:17.0) Gecko/20130107 Thunderbird/17.0.2
MIME-Version: 1.0
To: Justin Richer <jricher@mitre.org>
References: <0573984A-8C11-4960-9BC6-F44D4B664C19@gmx.net> <511BBBAC.9060502@oracle.com> <0DF3F088-7F15-4C0F-85C4-35DE80CB01E0@gmx.net> <511CEDFB.6010908@mitre.org>
In-Reply-To: <511CEDFB.6010908@mitre.org>
Content-Type: text/plain; charset=ISO-8859-1; format=flowed
Content-Transfer-Encoding: 7bit
X-Source-IP: acsinet22.oracle.com [141.146.126.238]
Cc: oauth@ietf.org
Subject: Re: [OAUTH-WG] Minutes from the OAuth Design Team Conference Call - 11th February 2013
X-BeenThere: oauth@ietf.org
X-Mailman-Version: 2.1.12
Precedence: list
List-Id: OAUTH WG <oauth.ietf.org>
List-Unsubscribe: <https://www.ietf.org/mailman/options/oauth>, <mailto:oauth-request@ietf.org?subject=unsubscribe>
List-Archive: <http://www.ietf.org/mail-archive/web/oauth>
List-Post: <mailto:oauth@ietf.org>
List-Help: <mailto:oauth-request@ietf.org?subject=help>
List-Subscribe: <https://www.ietf.org/mailman/listinfo/oauth>, <mailto:oauth-request@ietf.org?subject=subscribe>
X-List-Received-Date: Thu, 14 Feb 2013 19:21:17 -0000

Justin - my comment was scoped to *key distribution* - not to the 
general use of public clients.

I was wondering how one can distribute keys or have key agreement 
between an AS and a client, if there is no existing trust relationship 
between them. Maybe there is some
clever crypto way of achieving this, but I personally dont understand 
how this might happen.

- prateek

>
>>> 2) Regarding (symmetric) key distribution, dont we need some kind of 
>>> existing trust relationship between the client and AS to make this 
>>> possible? I guess it
>>> would be enough to require use of a "confidential" client, that 
>>> would make it possible for the two parties to agree on a session key 
>>> at the point where an access token
>>> is  issued by the AS.
>> That's a very good question. I have not formed an option about this 
>> issue yet particularly given the recent capability to dynamically 
>> register clients.
>
> I don't think that signing tokens should require confidential clients. 
> This was one of the implementation issues with OAuth 1, as it required 
> a "consumer_secret" at all times. This led to Google telling people to 
> use "anonymous" as the "consumer_secret" for what were effectively 
> public clients. Even with dynamic registration, there's still a place 
> for public clients, in my opinion.
>


From jricher@mitre.org  Thu Feb 14 11:25:26 2013
Return-Path: <jricher@mitre.org>
X-Original-To: oauth@ietfa.amsl.com
Delivered-To: oauth@ietfa.amsl.com
Received: from localhost (localhost [127.0.0.1]) by ietfa.amsl.com (Postfix) with ESMTP id E4B2321F88CC for <oauth@ietfa.amsl.com>; Thu, 14 Feb 2013 11:25:23 -0800 (PST)
X-Virus-Scanned: amavisd-new at amsl.com
X-Spam-Flag: NO
X-Spam-Score: -6.571
X-Spam-Level: 
X-Spam-Status: No, score=-6.571 tagged_above=-999 required=5 tests=[AWL=0.028,  BAYES_00=-2.599, RCVD_IN_DNSWL_MED=-4]
Received: from mail.ietf.org ([64.170.98.30]) by localhost (ietfa.amsl.com [127.0.0.1]) (amavisd-new, port 10024) with ESMTP id 0Lo3Yg-Qm8TQ for <oauth@ietfa.amsl.com>; Thu, 14 Feb 2013 11:25:20 -0800 (PST)
Received: from smtpksrv1.mitre.org (smtpksrv1.mitre.org [198.49.146.77]) by ietfa.amsl.com (Postfix) with ESMTP id ACF6A21F86AD for <oauth@ietf.org>; Thu, 14 Feb 2013 11:25:17 -0800 (PST)
Received: from smtpksrv1.mitre.org (localhost.localdomain [127.0.0.1]) by localhost (Postfix) with SMTP id 1E37E1F05EF; Thu, 14 Feb 2013 14:25:17 -0500 (EST)
Received: from IMCCAS02.MITRE.ORG (imccas02.mitre.org [129.83.29.79]) by smtpksrv1.mitre.org (Postfix) with ESMTP id EDF0B1F0254; Thu, 14 Feb 2013 14:25:16 -0500 (EST)
Received: from [10.146.15.29] (129.83.31.58) by IMCCAS02.MITRE.ORG (129.83.29.79) with Microsoft SMTP Server (TLS) id 14.2.318.4; Thu, 14 Feb 2013 14:25:16 -0500
Message-ID: <511D39EF.8010403@mitre.org>
Date: Thu, 14 Feb 2013 14:24:31 -0500
From: Justin Richer <jricher@mitre.org>
User-Agent: Mozilla/5.0 (X11; Linux i686; rv:17.0) Gecko/20130106 Thunderbird/17.0.2
MIME-Version: 1.0
To: Prateek Mishra <prateek.mishra@oracle.com>
References: <0573984A-8C11-4960-9BC6-F44D4B664C19@gmx.net> <511BBBAC.9060502@oracle.com> <0DF3F088-7F15-4C0F-85C4-35DE80CB01E0@gmx.net> <511CEDFB.6010908@mitre.org> <511D3919.4090906@oracle.com>
In-Reply-To: <511D3919.4090906@oracle.com>
Content-Type: text/plain; charset="ISO-8859-1"; format=flowed
Content-Transfer-Encoding: 7bit
X-Originating-IP: [129.83.31.58]
Cc: oauth@ietf.org
Subject: Re: [OAUTH-WG] Minutes from the OAuth Design Team Conference Call - 11th February 2013
X-BeenThere: oauth@ietf.org
X-Mailman-Version: 2.1.12
Precedence: list
List-Id: OAUTH WG <oauth.ietf.org>
List-Unsubscribe: <https://www.ietf.org/mailman/options/oauth>, <mailto:oauth-request@ietf.org?subject=unsubscribe>
List-Archive: <http://www.ietf.org/mail-archive/web/oauth>
List-Post: <mailto:oauth@ietf.org>
List-Help: <mailto:oauth-request@ietf.org?subject=help>
List-Subscribe: <https://www.ietf.org/mailman/listinfo/oauth>, <mailto:oauth-request@ietf.org?subject=subscribe>
X-List-Received-Date: Thu, 14 Feb 2013 19:25:26 -0000

Prateek,

My point was that a public client could very easily and safely be issued 
a secret in the form of an OAuth token. This includes any type of 
signing key that the MAC/etc token would want to use. What public 
client's can't have are configuration-time keys, like a client_secret. 
It's important to not conflate the two.

  -- Justin

On 02/14/2013 02:20 PM, Prateek Mishra wrote:
> Justin - my comment was scoped to *key distribution* - not to the 
> general use of public clients.
>
> I was wondering how one can distribute keys or have key agreement 
> between an AS and a client, if there is no existing trust relationship 
> between them. Maybe there is some
> clever crypto way of achieving this, but I personally dont understand 
> how this might happen.
>
> - prateek
>
>>
>>>> 2) Regarding (symmetric) key distribution, dont we need some kind 
>>>> of existing trust relationship between the client and AS to make 
>>>> this possible? I guess it
>>>> would be enough to require use of a "confidential" client, that 
>>>> would make it possible for the two parties to agree on a session 
>>>> key at the point where an access token
>>>> is  issued by the AS.
>>> That's a very good question. I have not formed an option about this 
>>> issue yet particularly given the recent capability to dynamically 
>>> register clients.
>>
>> I don't think that signing tokens should require confidential 
>> clients. This was one of the implementation issues with OAuth 1, as 
>> it required a "consumer_secret" at all times. This led to Google 
>> telling people to use "anonymous" as the "consumer_secret" for what 
>> were effectively public clients. Even with dynamic registration, 
>> there's still a place for public clients, in my opinion.
>>
>


From donald.coffin@reminetworks.com  Thu Feb 14 13:21:46 2013
Return-Path: <donald.coffin@reminetworks.com>
X-Original-To: oauth@ietfa.amsl.com
Delivered-To: oauth@ietfa.amsl.com
Received: from localhost (localhost [127.0.0.1]) by ietfa.amsl.com (Postfix) with ESMTP id 5A57621F8878 for <oauth@ietfa.amsl.com>; Thu, 14 Feb 2013 13:21:35 -0800 (PST)
X-Virus-Scanned: amavisd-new at amsl.com
X-Spam-Flag: NO
X-Spam-Score: -1.41
X-Spam-Level: 
X-Spam-Status: No, score=-1.41 tagged_above=-999 required=5 tests=[AWL=0.855,  BAYES_00=-2.599, HTML_MESSAGE=0.001, IP_NOT_FRIENDLY=0.334]
Received: from mail.ietf.org ([64.170.98.30]) by localhost (ietfa.amsl.com [127.0.0.1]) (amavisd-new, port 10024) with ESMTP id j90nmsSmi9AN for <oauth@ietfa.amsl.com>; Thu, 14 Feb 2013 13:21:16 -0800 (PST)
Received: from oproxy5-pub.bluehost.com (oproxy5-pub.bluehost.com [67.222.38.55]) by ietfa.amsl.com (Postfix) with SMTP id ECAD921F85AC for <oauth@ietf.org>; Thu, 14 Feb 2013 13:21:12 -0800 (PST)
Received: (qmail 29308 invoked by uid 0); 14 Feb 2013 21:20:47 -0000
Received: from unknown (HELO host125.hostmonster.com) (74.220.207.125) by cpoproxy2.bluehost.com with SMTP; 14 Feb 2013 21:20:47 -0000
DKIM-Signature: v=1; a=rsa-sha256; q=dns/txt; c=relaxed/relaxed; d=reminetworks.com; s=default;  h=Content-Type:MIME-Version:Message-ID:Date:Subject:In-Reply-To:References:Cc:To:From; bh=yGlhsnnKV/15sJn8CxuxK6xLXUjs7127pCXEk7s1WD8=;  b=NubQ+B31JmzYiHowWyhIV5jvNEezZVUUe3P6xeuSnzmBgJaFGXpqtMb5LReiO+3QtKTyM3lwcNes0spUGR6qFiFjasd6VgtGopel8UVuRCaBx8hknKAtA9Q2x9LUGqlq;
Received: from [68.4.207.246] (port=4202 helo=HPPavilionElite) by host125.hostmonster.com with esmtpa (Exim 4.80) (envelope-from <donald.coffin@reminetworks.com>) id 1U66EZ-0001TR-5O; Thu, 14 Feb 2013 14:20:47 -0700
From: "Donald F Coffin" <donald.coffin@reminetworks.com>
To: "'Justin Richer'" <jricher@mitre.org>, "'Prabath Siriwardena'" <prabath@wso2.com>
References: <20130206192420.32698.21027.idtracker@ietfa.amsl.com>	<5113DDB2.7060805@mitre.org>	<CAJV9qO_gM1oera9ae9sqh9n17e-ZLKuC2pmsZwhq-RmFcMyqHA@mail.gmail.com>	<51196777.6000502@mitre.org>	<CAJV9qO-5bWZbNUfCmaqYBQoy-qwNaSZFOsO9GL3CrbSejwVTzw@mail.gmail.com>	<F6595A40-6B4E-4718-ABB5-694CA975C4DB@maymount.com>	<511A5062.5010108@mitre.org>	<CAJV9qO_Mr87NX=KZRqCsWasQ1FuvDNBw14eS-TcPf_KRJztQFg@mail.gmail.com>	<CAJV9qO-71-sM6kXOB6Fb_bvVkDBQ5JBbs8E5X=f-K=iEmGezRA@mail.gmail.com>	<511CEEAA.3030801@mitre.org>	<CAJV9qO-JSXgSTkw2_pdH0D-o-xDWGDqxx=PAWYtnTj4hOQXW4Q@mail.gmail.com>	<CAJV9qO9=+kiO-s7vH_ewr7XjfVdDU24F0kuif504bP53dBr1TA@mail.gmail.com>	<511CF3EF.8040008@mitre.org>	<CAJV9qO8yKkrsV7d9JtDmbLY-fb5phh=ssKbEUuutkY53PgY8Vg@mail.gmail.com>	<511CF4AB.5010700@mitre.org>	<CAJV9qO9VmjSQnWKU3kF11x35ut=AsvQ8bjuz_CKpyCScGRiA2Q@mail.gmail.com>	<511CF8C5.70301@mitre.org>	<CAJV9qO_-kFsWxoJwTP_RWFrb6+3frg-36JocQoo8SrpyNBMSoA@mail.gmail.com> <511D0DC3.7000607@mitre.org>
In-Reply-To: <511D0DC3.7000607@mitre.org>
Date: Thu, 14 Feb 2013 13:19:08 -0800
Message-ID: <00ef01ce0af8$ed591ad0$c80b5070$@reminetworks.com>
MIME-Version: 1.0
Content-Type: multipart/alternative; boundary="----=_NextPart_000_00F0_01CE0AB5.DF3D54E0"
X-Mailer: Microsoft Outlook 14.0
Thread-Index: AQKDOKkKu6yMl3x1pM1nhfntlxrFNAIjEZUMAE2AgncDUno3igJSz0GQAgVlQCcCxP9CmwE/IqWjAg3xqC8BYatj8wLMSpeZAquJYigCgHFF8QFxkfy7AgxfqA8B+ueWagJI6UCwAQ9iy3QCP8zfgpXqvpnw
Content-Language: en-us
X-Identified-User: {1395:host125.hostmonster.com:reminetw:reminetworks.com} {sentby:smtp auth 68.4.207.246 authed with donald.coffin@reminetworks.com}
Cc: oauth@ietf.org
Subject: Re: [OAUTH-WG] Fwd: New Version Notification for	draft-richer-oauth-introspection-02.txt
X-BeenThere: oauth@ietf.org
X-Mailman-Version: 2.1.12
Precedence: list
List-Id: OAUTH WG <oauth.ietf.org>
List-Unsubscribe: <https://www.ietf.org/mailman/options/oauth>, <mailto:oauth-request@ietf.org?subject=unsubscribe>
List-Archive: <http://www.ietf.org/mail-archive/web/oauth>
List-Post: <mailto:oauth@ietf.org>
List-Help: <mailto:oauth-request@ietf.org?subject=help>
List-Subscribe: <https://www.ietf.org/mailman/listinfo/oauth>, <mailto:oauth-request@ietf.org?subject=subscribe>
X-List-Received-Date: Thu, 14 Feb 2013 21:21:46 -0000

This is a multipart message in MIME format.

------=_NextPart_000_00F0_01CE0AB5.DF3D54E0
Content-Type: text/plain;
	charset="us-ascii"
Content-Transfer-Encoding: 7bit

Does the term "Active" help clarify the meaning but still confirm to your
intention, Justin?

 

Best regards,

Don

Donald F. Coffin

Founder/CTO

 

REMI Networks

22751 El Prado Suite 6216

Rancho Santa Margarita, CA  92688-3836

 

Phone:      (949) 636-8571

Email:        <mailto:donald.coffin@reminetworks.com>
donald.coffin@reminetworks.com

 

From: Justin Richer [mailto:jricher@mitre.org] 
Sent: Thursday, February 14, 2013 8:16 AM
To: Prabath Siriwardena
Cc: oauth@ietf.org
Subject: Re: [OAUTH-WG] Fwd: New Version Notification for
draft-richer-oauth-introspection-02.txt

 

That much I can at least do. I'd be happy with another term if there was a
good one we could drop in its place without changing the intended semantics.

 -- Justin

On 02/14/2013 10:57 AM, Prabath Siriwardena wrote:

Not quite convinced :-) Valid has a meaning attached to that.. 

 

In case we are going ahead with this please define it clearly in the draft -
with the one you shared in this thread.

 

Thanks & regards,

-Prabath

On Thu, Feb 14, 2013 at 8:16 PM, Justin Richer <jricher@mitre.org> wrote:

 

On 02/14/2013 09:37 AM, Prabath Siriwardena wrote:

The definition of valid is bit ambiguous in the draft...

 

Okay.. If that is the definition... and if we beak that in to parts...

 

"it hasn't expired" : In the response it self we have parameter for
issued_at and and expires_at - so whether the token is not expired or not
can even be derived at the requestor's end.

 

If the token isn't good anymore, it doesn't matter when it was issued or
when it was expired, just that it has. 






 

"token was issued from here" : For this IMO we need to send an error code.
Requestor has picked the wrong AS.

We don't know if it came from another AS or if someone's just making things
up. Either way it's not a good token. 






 

The remaining is  "revoked".. That is why I proposed earlier - we better
have an attribute "revoked" - instead of "valid" in the response..

 

The end result of all three is the same: either the token is good, or it
isn't. I think it's much simpler and more useful to leave it at that.

 -- Justin 






 

WDYT...?

 

Thanks & regards,

-Prabath

 

 

On Thu, Feb 14, 2013 at 7:58 PM, Justin Richer <jricher@mitre.org> wrote:

Because it will be the one that issued the token in the first place. 

Validity means "token was issued from here, it hasn't been revoked, it
hasn't expired". 

 -- Justin 

 

On 02/14/2013 09:28 AM, Prabath Siriwardena wrote:

Okay. With out knowing the type of the token how can the AS validate the
token ? What is meant by the validity there? 

 

Thanks & regards,

-Prabath

On Thu, Feb 14, 2013 at 7:55 PM, Justin Richer <jricher@mitre.org> wrote:

OK, I don't see the utility in that at all. What would it accomplish?

 -- Justin 

 

On 02/14/2013 09:25 AM, Prabath Siriwardena wrote:

To make it clear - my suggestion is to add token_type_hint to the
introspection request. It can be from client to AS or from RS to AS. 

 

Then AS can decide whether the provided token is valid or not and include
"valid" attribute in the introspection response.

 

Thanks & regards,

-Prabath

On Thu, Feb 14, 2013 at 7:52 PM, Prabath Siriwardena <prabath@wso2.com>
wrote:

Both the client and the resource owner should be aware of the token type. 

 

My argument is, if the authorization server to decide whether the token is
valid or not ( irrespective of who asked the question) - AS needs to know
the token type - because to validate a token AS should know the token type.

 

The token type could be, bearer or MAC or any other token type.

 

Thanks & regards,

-Prabath 

 

On Thu, Feb 14, 2013 at 7:33 PM, Justin Richer <jricher@mitre.org> wrote:

What exactly are you suggesting be added to introspection? The
"token_type_hint" is from the client to the server, but what you've asked
for in terms of "token type" is from the server to the client. And there was
never an answer to what exactly is meant by "token type" in this case,
particularly because you seem to want to call out things like SAML and
Bearer as separate types. 

 -- Justin 





On 02/14/2013 06:59 AM, Prabath Siriwardena wrote:

I noticed that the latest Token Revocation draft [1] has introduced the
parameter "token_type_hint". I would suggest the same here, as that would
make what is meant by "valid" much clear.. 

 

[1]:  <http://tools.ietf.org/html/draft-ietf-oauth-revocation-05>
http://tools.ietf.org/html/draft-ietf-oauth-revocation-05

 

Thanks & regards,

-Prabath

On Tue, Feb 12, 2013 at 9:35 PM, Prabath Siriwardena <prabath@wso2.com>
wrote:

Hi Justin, 

 

I doubt whether valid_token would make a difference..?

 

My initial argument is what is the validation criteria..? Validation
criteria depends on the token_type..

 

If we are talking only about metadata - then I believe "revoked", "expired"
would be more meaningful..

 

Thanks & regards,

-Prabath 

 

On Tue, Feb 12, 2013 at 7:53 PM, Justin Richer <jricher@mitre.org> wrote:

OK, I can see the wisdom in changing this term. 

I picked "valid" because I wanted a simple "boolean" value that would
require no additional parsing or string-matching on the client's behalf, and
I'd like to stick with that. OAuth is built with the assumption that clients
need to be able to recover from invalid tokens at any stage, so I think a
simple yes/no is the right step here. 

That said, I think you're both right that "valid" seems to have caused a bit
of confusion. I don't want to go with "revoked" because I'd rather have the
"token is OK" be the positive boolean value. 

Would "valid_token" be more clear? Or do we need a different adjective all
together?

 -- Justin 

 

On 02/11/2013 08:02 PM, Richard Harrington wrote:

Have you considered "status" instead of "valid"?  It could have values like
"active", "expired", and "revoked".

 

Is it worthwhile including the status of the client also?  For example, a
client application could be disabled, temporarily or permanently, and thus
disabling its access tokens as well.

 


On Feb 11, 2013, at 1:56 PM, Prabath Siriwardena <prabath@wso2.com> wrote:

I guess confusion is with 'valid' parameter is in the response.. 

 

I thought this will be helpful to standardize the communication between
Resource Server and the Authorization Server..

 

I would suggest we completely remove "valid" from the response - or define
it much clearly..

 

May be can add "revoked" with a boolean attribute..

 

Thanks & regards,

-Prabath

On Tue, Feb 12, 2013 at 3:19 AM, Justin Richer <jricher@mitre.org> wrote:

 

On 02/08/2013 12:51 AM, Prabath Siriwardena wrote:

Hi Justin, 

 

I have couple of questions related to "valid" parameter...

 

This endpoint can be invoked by the Resource Server in runtime...


That's correct. 






 

In that case what is exactly meant by the "resource_id" in request ?

 

The resource_id field is a service-specific string that basically lets the
resource server provide some context to the request to the auth server.
There have been some other suggestions like client IP address, but I wanted
to put this one in because it seemed to be a common theme. The client is
trying to do *something* with the token, after all, and the rights,
permissions, and metadata associated with the token could change based on
that. Since the Introspection endpoint is all about getting that metadata
back to the PR, this seemed like a good idea. 






 

IMO a token to be valid depends on set of criteria based on it's type..

 

For a Bearer token..

 

1. Token should not be expired

2. Token should not be revoked.

3. The scope the token issued should match with the scope required for the
resource.

 

For a MAC token...

 

1. Token not expired (mac id)

2. Token should not be revoked

3. The scope the token issued should match with the scope required for the
resource.

4. HMAC check should be valid

 

There are similar conditions for SAML bearer too..

 

This isn't really true. The SAML bearer token is fully self-contained and
doesn't change based on other parameters in the message, unlike MAC. Same
with JWT. When it hands a SAML or JWT token to the AS, the PR has given
*everything* the server needs to check that token's validity and use. 

MAC signatures change with every message, and they're done across several
components of the HTTP message. Therefor, the HMAC check for MAC style
tokens will still need to be done by the protected resource. Introspection
would help in the case that the signature validated just fine, but the token
might have expired. Or you need to know what scopes apply. Introspection
isn't to fully validate the call to the protected resource -- if that were
the case, the PR would have to send some kind of encapsulated version of the
original request. Otherwise, the AS won't have all of the information it
needs to check the MAC.


I think what you're describing is ultimately *not* what the introspection
endpoint is intended to do. If that's unclear from the document, can you
please suggest text that would help clear the use case up? I wouldn't want
it to be ambiguous.

 -- Justin 






 

Thanks & regards,

-Prabath

 

 

On Thu, Feb 7, 2013 at 10:30 PM, Justin Richer <jricher@mitre.org> wrote:

It validates the token, which would be either the token itself in the case
of Bearer or the token "id" part of something more complex like MAC. It
doesn't directly validate the usage of the token, that's still up to the PR
to do that.

I nearly added a "token type" field in this draft, but held back because
there are several kinds of "token type" that people talk about in OAuth.
First, there's "Bearer" vs. "MAC" vs. "HOK", or what have you. Then within
Bearer you have "JWT" or "SAML" or "unstructured blob". Then you've also got
"access" vs. "refresh" and other flavors of token, like the id_token in
OpenID Connect. 

Thing is, the server running the introspection endpoint will probably know
*all* of these. But should it tell the client? If so, which of the three,
and what names should the fields be?

 -- Justin 

 

On 02/07/2013 11:26 AM, Prabath Siriwardena wrote:

Okay.. I was thinking this could be used as a way to validate the token as
well. BTW even in this case shouldn't communicate the type of token to AS?
For example in the case of SAML profile - it could be SAML token.. 

 

Thanks & regards,

-Prabath

On Thu, Feb 7, 2013 at 8:39 PM, Justin Richer <jricher@mitre.org> wrote:

"valid" might not be the best term, but it's meant to be a field where the
server says "yes this token is still good" or "no this token isn't good
anymore". We could instead do this with HTTP codes or something but I went
with a pure JSON response.

 -- Justin 

 

On 02/06/2013 10:47 PM, Prabath Siriwardena wrote:

Hi Justin, 

 

I believe this is addressing one of the key missing part in OAuth 2.0...

 

One question - I guess this was discussed already...

 

In the spec - in the introspection response it has the attribute "valid" -
this is basically the validity of the token provided in the request.

 

Validation criteria depends on the token and well as token type ( Bearer,
MAC..).

 

In the spec it seems like it's coupled with Bearer token type... But I
guess, by adding "token_type" to the request we can remove this dependency.

 

WDYT..?

 

Thanks & regards,

-Prabath 

 

On Thu, Feb 7, 2013 at 12:54 AM, Justin Richer <jricher@mitre.org> wrote:

Updated introspection draft based on recent comments. Changes include:

 - "scope" return parameter now follows RFC6749 format instead of JSON array
 - "subject" -> "sub", and "audience" -> "aud", to be parallel with JWT
claims
 - clarified what happens if the authentication is bad

 -- Justin



-------- Original Message -------- 


Subject: 

New Version Notification for draft-richer-oauth-introspection-02.txt


Date: 

Wed, 6 Feb 2013 11:24:20 -0800


From: 

 <mailto:internet-drafts@ietf.org> <internet-drafts@ietf.org>


To: 

 <mailto:jricher@mitre.org> <jricher@mitre.org>

 

A new version of I-D, draft-richer-oauth-introspection-02.txt
has been successfully submitted by Justin Richer and posted to the
IETF repository.
 
Filename:       draft-richer-oauth-introspection
Revision:       02
Title:             OAuth Token Introspection
Creation date:       2013-02-06
WG ID:             Individual Submission
Number of pages: 6
URL:
http://www.ietf.org/internet-drafts/draft-richer-oauth-introspection-02.txt
Status:
http://datatracker.ietf.org/doc/draft-richer-oauth-introspection
Htmlized:
http://tools.ietf.org/html/draft-richer-oauth-introspection-02
Diff:
http://www.ietf.org/rfcdiff?url2=draft-richer-oauth-introspection-02
 
Abstract:
   This specification defines a method for a client or protected
   resource to query an OAuth authorization server to determine meta-
   information about an OAuth token.
 
 
 

 
 
The IETF Secretariat
 

 

 


_______________________________________________
OAuth mailing list
OAuth@ietf.org
https://www.ietf.org/mailman/listinfo/oauth





 

-- 
Thanks & Regards,
Prabath 

 

Mobile : +94 71 809 6732 <tel:%2B94%2071%20809%206732>  

http://blog.facilelogin.com
http://RampartFAQ.com

 





 

-- 
Thanks & Regards,
Prabath 

 

Mobile : +94 71 809 6732 <tel:%2B94%2071%20809%206732>  

http://blog.facilelogin.com
http://RampartFAQ.com

 





 

-- 
Thanks & Regards,
Prabath 

 

Mobile : +94 71 809 6732 <tel:%2B94%2071%20809%206732>  

http://blog.facilelogin.com
http://RampartFAQ.com

 





 

-- 
Thanks & Regards,
Prabath 

 

Mobile : +94 71 809 6732 <tel:%2B94%2071%20809%206732>  

http://blog.facilelogin.com
http://RampartFAQ.com

_______________________________________________
OAuth mailing list
OAuth@ietf.org
https://www.ietf.org/mailman/listinfo/oauth

 





 

-- 
Thanks & Regards,
Prabath 

 

Mobile : +94 71 809 6732 <tel:%2B94%2071%20809%206732>  

http://blog.facilelogin.com
http://RampartFAQ.com





 

-- 
Thanks & Regards,
Prabath 

 

Mobile : +94 71 809 6732 <tel:%2B94%2071%20809%206732>  

http://blog.facilelogin.com
http://RampartFAQ.com

 





 

-- 
Thanks & Regards,
Prabath 

 

Mobile : +94 71 809 6732 <tel:%2B94%2071%20809%206732>  

http://blog.facilelogin.com
http://RampartFAQ.com





 

-- 
Thanks & Regards,
Prabath 

 

Mobile : +94 71 809 6732 <tel:%2B94%2071%20809%206732>  

http://blog.facilelogin.com
http://RampartFAQ.com

 





 

-- 
Thanks & Regards,
Prabath 

 

Mobile : +94 71 809 6732 <tel:%2B94%2071%20809%206732>  

http://blog.facilelogin.com
http://RampartFAQ.com

 





 

-- 
Thanks & Regards,
Prabath 

 

Mobile : +94 71 809 6732 <tel:%2B94%2071%20809%206732>  

http://blog.facilelogin.com
http://RampartFAQ.com

 





 

-- 
Thanks & Regards,
Prabath 

 

Mobile : +94 71 809 6732 

http://blog.facilelogin.com
http://RampartFAQ.com

 


------=_NextPart_000_00F0_01CE0AB5.DF3D54E0
Content-Type: text/html;
	charset="us-ascii"
Content-Transfer-Encoding: quoted-printable

<html xmlns:v=3D"urn:schemas-microsoft-com:vml" =
xmlns:o=3D"urn:schemas-microsoft-com:office:office" =
xmlns:w=3D"urn:schemas-microsoft-com:office:word" =
xmlns:m=3D"http://schemas.microsoft.com/office/2004/12/omml" =
xmlns=3D"http://www.w3.org/TR/REC-html40"><head><meta =
http-equiv=3DContent-Type content=3D"text/html; =
charset=3Dus-ascii"><meta name=3DGenerator content=3D"Microsoft Word 14 =
(filtered medium)"><style><!--
/* Font Definitions */
@font-face
	{font-family:"Cambria Math";
	panose-1:2 4 5 3 5 4 6 3 2 4;}
@font-face
	{font-family:Cambria;
	panose-1:2 4 5 3 5 4 6 3 2 4;}
@font-face
	{font-family:Calibri;
	panose-1:2 15 5 2 2 2 4 3 2 4;}
@font-face
	{font-family:Tahoma;
	panose-1:2 11 6 4 3 5 4 4 2 4;}
@font-face
	{font-family:Consolas;
	panose-1:2 11 6 9 2 2 4 3 2 4;}
@font-face
	{font-family:"Brush Script MT";
	panose-1:3 6 8 2 4 4 6 7 3 4;}
/* Style Definitions */
p.MsoNormal, li.MsoNormal, div.MsoNormal
	{margin:0in;
	margin-bottom:.0001pt;
	font-size:12.0pt;
	font-family:"Times New Roman","serif";
	color:black;}
a:link, span.MsoHyperlink
	{mso-style-priority:99;
	color:blue;
	text-decoration:underline;}
a:visited, span.MsoHyperlinkFollowed
	{mso-style-priority:99;
	color:purple;
	text-decoration:underline;}
pre
	{mso-style-priority:99;
	mso-style-link:"HTML Preformatted Char";
	margin:0in;
	margin-bottom:.0001pt;
	font-size:10.0pt;
	font-family:"Courier New";
	color:black;}
span.hoenzb
	{mso-style-name:hoenzb;}
span.HTMLPreformattedChar
	{mso-style-name:"HTML Preformatted Char";
	mso-style-priority:99;
	mso-style-link:"HTML Preformatted";
	font-family:"Consolas","serif";
	color:black;}
span.EmailStyle20
	{mso-style-type:personal-reply;
	font-family:"Cambria","serif";
	color:windowtext;
	font-weight:normal;
	font-style:normal;}
.MsoChpDefault
	{mso-style-type:export-only;
	font-size:10.0pt;}
@page WordSection1
	{size:8.5in 11.0in;
	margin:1.0in 1.0in 1.0in 1.0in;}
div.WordSection1
	{page:WordSection1;}
--></style><!--[if gte mso 9]><xml>
<o:shapedefaults v:ext=3D"edit" spidmax=3D"1026" />
</xml><![endif]--><!--[if gte mso 9]><xml>
<o:shapelayout v:ext=3D"edit">
<o:idmap v:ext=3D"edit" data=3D"1" />
</o:shapelayout></xml><![endif]--></head><body bgcolor=3Dwhite =
lang=3DEN-US link=3Dblue vlink=3Dpurple><div class=3DWordSection1><p =
class=3DMsoNormal><span =
style=3D'font-family:"Cambria","serif";color:windowtext'>Does the term =
&#8220;Active&#8221; help clarify the meaning but still confirm to your =
intention, Justin?<o:p></o:p></span></p><p class=3DMsoNormal><span =
style=3D'font-family:"Cambria","serif";color:windowtext'><o:p>&nbsp;</o:p=
></span></p><div><p class=3DMsoNormal><span =
style=3D'font-family:"Calibri","sans-serif";color:windowtext'>Best =
regards,<o:p></o:p></span></p><p class=3DMsoNormal><span =
style=3D'font-size:24.0pt;font-family:"Brush Script =
MT";color:windowtext'>Don<o:p></o:p></span></p><p =
class=3DMsoNormal><span =
style=3D'font-family:"Calibri","sans-serif";color:windowtext'>Donald F. =
Coffin<o:p></o:p></span></p><p class=3DMsoNormal><span =
style=3D'font-family:"Calibri","sans-serif";color:windowtext'>Founder/CTO=
<o:p></o:p></span></p><p class=3DMsoNormal><span =
style=3D'font-family:"Calibri","sans-serif";color:windowtext'><o:p>&nbsp;=
</o:p></span></p><p class=3DMsoNormal><span =
style=3D'font-family:"Calibri","sans-serif";color:windowtext'>REMI =
Networks<o:p></o:p></span></p><p class=3DMsoNormal><span =
style=3D'font-family:"Calibri","sans-serif";color:windowtext'>22751 El =
Prado Suite 6216<o:p></o:p></span></p><p class=3DMsoNormal><span =
style=3D'font-family:"Calibri","sans-serif";color:windowtext'>Rancho =
Santa Margarita, CA&nbsp; 92688-3836<o:p></o:p></span></p><p =
class=3DMsoNormal><span =
style=3D'font-family:"Calibri","sans-serif";color:windowtext'><o:p>&nbsp;=
</o:p></span></p><p class=3DMsoNormal><span =
style=3D'font-family:"Calibri","sans-serif";color:windowtext'>Phone:&nbsp=
;&nbsp;&nbsp;&nbsp;&nbsp; (949) 636-8571<o:p></o:p></span></p><p =
class=3DMsoNormal><span =
style=3D'font-family:"Calibri","sans-serif";color:windowtext'>Email:&nbsp=
;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp; <a =
href=3D"mailto:donald.coffin@reminetworks.com"><span =
style=3D'color:blue'>donald.coffin@reminetworks.com</span></a><o:p></o:p>=
</span></p></div><p class=3DMsoNormal><span =
style=3D'font-family:"Cambria","serif";color:windowtext'><o:p>&nbsp;</o:p=
></span></p><div><div style=3D'border:none;border-top:solid #B5C4DF =
1.0pt;padding:3.0pt 0in 0in 0in'><p class=3DMsoNormal><b><span =
style=3D'font-size:10.0pt;font-family:"Tahoma","sans-serif";color:windowt=
ext'>From:</span></b><span =
style=3D'font-size:10.0pt;font-family:"Tahoma","sans-serif";color:windowt=
ext'> Justin Richer [mailto:jricher@mitre.org] <br><b>Sent:</b> =
Thursday, February 14, 2013 8:16 AM<br><b>To:</b> Prabath =
Siriwardena<br><b>Cc:</b> oauth@ietf.org<br><b>Subject:</b> Re: =
[OAUTH-WG] Fwd: New Version Notification for =
draft-richer-oauth-introspection-02.txt<o:p></o:p></span></p></div></div>=
<p class=3DMsoNormal><o:p>&nbsp;</o:p></p><p class=3DMsoNormal =
style=3D'margin-bottom:12.0pt'>That much I can at least do. I'd be happy =
with another term if there was a good one we could drop in its place =
without changing the intended semantics.<br><br>&nbsp;-- =
Justin<o:p></o:p></p><div><p class=3DMsoNormal>On 02/14/2013 10:57 AM, =
Prabath Siriwardena wrote:<o:p></o:p></p></div><blockquote =
style=3D'margin-top:5.0pt;margin-bottom:5.0pt'><p class=3DMsoNormal>Not =
quite convinced :-) Valid has a meaning attached to that.. =
<o:p></o:p></p><div><p =
class=3DMsoNormal><o:p>&nbsp;</o:p></p></div><div><p =
class=3DMsoNormal>In case we are going ahead with this please define it =
clearly in the draft - with the one you shared in this =
thread.<o:p></o:p></p></div><div><p =
class=3DMsoNormal><o:p>&nbsp;</o:p></p></div><div><p =
class=3DMsoNormal>Thanks &amp; regards,<o:p></o:p></p></div><div><p =
class=3DMsoNormal =
style=3D'margin-bottom:12.0pt'>-Prabath<o:p></o:p></p><div><p =
class=3DMsoNormal>On Thu, Feb 14, 2013 at 8:16 PM, Justin Richer &lt;<a =
href=3D"mailto:jricher@mitre.org" =
target=3D"_blank">jricher@mitre.org</a>&gt; =
wrote:<o:p></o:p></p><div><div><p =
class=3DMsoNormal><o:p>&nbsp;</o:p></p><div><p class=3DMsoNormal>On =
02/14/2013 09:37 AM, Prabath Siriwardena =
wrote:<o:p></o:p></p></div><blockquote =
style=3D'margin-top:5.0pt;margin-bottom:5.0pt'><div><p =
class=3DMsoNormal>The definition of valid is bit ambiguous&nbsp;in the =
draft...<o:p></o:p></p></div><div><p =
class=3DMsoNormal><o:p>&nbsp;</o:p></p></div><div><p =
class=3DMsoNormal>Okay.. If that is the definition... and if we beak =
that in to parts...<o:p></o:p></p></div><div><p =
class=3DMsoNormal><o:p>&nbsp;</o:p></p></div><div><p =
class=3DMsoNormal>&quot;it hasn't expired&quot; : In the response it =
self we have parameter for issued_at and and expires_at - so whether the =
token is not expired or not can even be derived at the requestor's =
end.<o:p></o:p></p></div></blockquote><p =
class=3DMsoNormal><o:p>&nbsp;</o:p></p></div><p class=3DMsoNormal>If the =
token isn't good anymore, it doesn't matter when it was issued or when =
it was expired, just that it has. <o:p></o:p></p><div><p =
class=3DMsoNormal><br><br><br><o:p></o:p></p><div><p =
class=3DMsoNormal><o:p>&nbsp;</o:p></p></div><div><p =
class=3DMsoNormal>&quot;token was issued from here&quot; : For this IMO =
we need to send an error code. Requestor has picked the wrong =
AS.<o:p></o:p></p></div></div><p class=3DMsoNormal>We don't know if it =
came from another AS or if someone's just making things up. Either way =
it's not a good token. <o:p></o:p></p><div><p =
class=3DMsoNormal><br><br><br><o:p></o:p></p><div><p =
class=3DMsoNormal><o:p>&nbsp;</o:p></p></div><div><p =
class=3DMsoNormal>The remaining is &nbsp;&quot;revoked&quot;.. That is =
why I proposed&nbsp;earlier&nbsp;- we better have an attribute =
&quot;revoked&quot; - instead of &quot;valid&quot; in the =
response..<o:p></o:p></p></div><p =
class=3DMsoNormal><o:p>&nbsp;</o:p></p></div><p class=3DMsoNormal>The =
end result of all three is the same: either the token is good, or it =
isn't. I think it's much simpler and more useful to leave it at =
that.<span style=3D'color:#888888'><br><br><span class=3Dhoenzb>&nbsp;-- =
Justin</span></span> <o:p></o:p></p><div><div><p =
class=3DMsoNormal><br><br><br><o:p></o:p></p><div><p =
class=3DMsoNormal><o:p>&nbsp;</o:p></p></div><div><p =
class=3DMsoNormal>WDYT...?<o:p></o:p></p></div><div><p =
class=3DMsoNormal><o:p>&nbsp;</o:p></p></div><div><p =
class=3DMsoNormal>Thanks &amp; regards,<o:p></o:p></p></div><div><p =
class=3DMsoNormal>-Prabath<o:p></o:p></p></div><div><p =
class=3DMsoNormal><o:p>&nbsp;</o:p></p></div><div><p =
class=3DMsoNormal><o:p>&nbsp;</o:p></p><div><p class=3DMsoNormal>On Thu, =
Feb 14, 2013 at 7:58 PM, Justin Richer &lt;<a =
href=3D"mailto:jricher@mitre.org" =
target=3D"_blank">jricher@mitre.org</a>&gt; wrote:<o:p></o:p></p><div><p =
class=3DMsoNormal>Because it will be the one that issued the token in =
the first place. <br><br>Validity means &quot;token was issued from =
here, it hasn't been revoked, it hasn't expired&quot;. <br><span =
style=3D'color:#888888'><br>&nbsp;-- Justin</span> =
<o:p></o:p></p><div><div><p class=3DMsoNormal =
style=3D'margin-bottom:12.0pt'><o:p>&nbsp;</o:p></p><div><p =
class=3DMsoNormal>On 02/14/2013 09:28 AM, Prabath Siriwardena =
wrote:<o:p></o:p></p></div><blockquote =
style=3D'margin-top:5.0pt;margin-bottom:5.0pt'><p =
class=3DMsoNormal>Okay. With out knowing the type of the token how can =
the AS validate the token ? What is meant by the validity there? =
<o:p></o:p></p><div><p =
class=3DMsoNormal><o:p>&nbsp;</o:p></p></div><div><p =
class=3DMsoNormal>Thanks &amp; regards,<o:p></o:p></p></div><div><p =
class=3DMsoNormal =
style=3D'margin-bottom:12.0pt'>-Prabath<o:p></o:p></p><div><p =
class=3DMsoNormal>On Thu, Feb 14, 2013 at 7:55 PM, Justin Richer &lt;<a =
href=3D"mailto:jricher@mitre.org" =
target=3D"_blank">jricher@mitre.org</a>&gt; wrote:<o:p></o:p></p><div><p =
class=3DMsoNormal>OK, I don't see the utility in that at all. What would =
it accomplish?<span style=3D'color:#888888'><br><br>&nbsp;-- =
Justin</span> <o:p></o:p></p><div><div><p class=3DMsoNormal =
style=3D'margin-bottom:12.0pt'><o:p>&nbsp;</o:p></p><div><p =
class=3DMsoNormal>On 02/14/2013 09:25 AM, Prabath Siriwardena =
wrote:<o:p></o:p></p></div><blockquote =
style=3D'margin-top:5.0pt;margin-bottom:5.0pt'><p class=3DMsoNormal>To =
make it clear - my suggestion is to add token_type_hint to the =
introspection request. It can be from client to AS or from RS to AS. =
<o:p></o:p></p><div><p =
class=3DMsoNormal><o:p>&nbsp;</o:p></p></div><div><p =
class=3DMsoNormal>Then AS can decide whether the provided token is valid =
or not and include &quot;valid&quot; attribute in the introspection =
response.<o:p></o:p></p></div><div><p =
class=3DMsoNormal><o:p>&nbsp;</o:p></p></div><div><p =
class=3DMsoNormal>Thanks &amp; regards,<o:p></o:p></p></div><div><p =
class=3DMsoNormal =
style=3D'margin-bottom:12.0pt'>-Prabath<o:p></o:p></p><div><p =
class=3DMsoNormal>On Thu, Feb 14, 2013 at 7:52 PM, Prabath Siriwardena =
&lt;<a href=3D"mailto:prabath@wso2.com" =
target=3D"_blank">prabath@wso2.com</a>&gt; wrote:<o:p></o:p></p><p =
class=3DMsoNormal>Both the client and the resource owner should be aware =
of the token type. <o:p></o:p></p><div><p =
class=3DMsoNormal><o:p>&nbsp;</o:p></p></div><div><p =
class=3DMsoNormal>My argument is, if the authorization server to decide =
whether the token is valid or not ( irrespective of who asked the =
question) - AS needs to know the token type - because to validate a =
token AS should know the token type.<o:p></o:p></p></div><div><p =
class=3DMsoNormal><o:p>&nbsp;</o:p></p></div><div><p =
class=3DMsoNormal>The token type could be, bearer or MAC or any other =
token type.<o:p></o:p></p></div><div><p =
class=3DMsoNormal><o:p>&nbsp;</o:p></p></div><div><p =
class=3DMsoNormal>Thanks &amp; regards,<o:p></o:p></p></div><div><p =
class=3DMsoNormal>-Prabath <o:p></o:p></p><div><div><p class=3DMsoNormal =
style=3D'margin-bottom:12.0pt'><o:p>&nbsp;</o:p></p><div><p =
class=3DMsoNormal>On Thu, Feb 14, 2013 at 7:33 PM, Justin Richer &lt;<a =
href=3D"mailto:jricher@mitre.org" =
target=3D"_blank">jricher@mitre.org</a>&gt; wrote:<o:p></o:p></p><div><p =
class=3DMsoNormal>What exactly are you suggesting be added to =
introspection? The &quot;token_type_hint&quot; is from the client to the =
server, but what you've asked for in terms of &quot;token type&quot; is =
from the server to the client. And there was never an answer to what =
exactly is meant by &quot;token type&quot; in this case, particularly =
because you seem to want to call out things like SAML and Bearer as =
separate types. <br><span style=3D'color:#888888'><br>&nbsp;-- =
Justin</span> <o:p></o:p></p><div><div><p class=3DMsoNormal =
style=3D'margin-bottom:12.0pt'><br><br><o:p></o:p></p><div><p =
class=3DMsoNormal>On 02/14/2013 06:59 AM, Prabath Siriwardena =
wrote:<o:p></o:p></p></div><blockquote =
style=3D'margin-top:5.0pt;margin-bottom:5.0pt'><p class=3DMsoNormal>I =
noticed that the latest Token Revocation draft [1] has introduced the =
parameter &quot;token_type_hint&quot;. I would suggest the same here, as =
that would make what is meant by &quot;valid&quot; much clear.. =
<o:p></o:p></p><div><p =
class=3DMsoNormal><o:p>&nbsp;</o:p></p></div><div><p =
class=3DMsoNormal>[1]:&nbsp;<a =
href=3D"http://tools.ietf.org/html/draft-ietf-oauth-revocation-05" =
target=3D"_blank"><span =
style=3D'font-size:9.5pt;font-family:"Arial","sans-serif";color:#1155CC'>=
http://tools.ietf.org/html/draft-ietf-oauth-revocation-05</span></a><o:p>=
</o:p></p></div><div><p =
class=3DMsoNormal><o:p>&nbsp;</o:p></p></div><div><p =
class=3DMsoNormal>Thanks &amp; regards,<o:p></o:p></p></div><div><p =
class=3DMsoNormal =
style=3D'margin-bottom:12.0pt'>-Prabath<o:p></o:p></p><div><p =
class=3DMsoNormal>On Tue, Feb 12, 2013 at 9:35 PM, Prabath Siriwardena =
&lt;<a href=3D"mailto:prabath@wso2.com" =
target=3D"_blank">prabath@wso2.com</a>&gt; wrote:<o:p></o:p></p><p =
class=3DMsoNormal>Hi Justin, <o:p></o:p></p><div><p =
class=3DMsoNormal><o:p>&nbsp;</o:p></p></div><div><p class=3DMsoNormal>I =
doubt whether valid_token would make a =
difference..?<o:p></o:p></p></div><div><p =
class=3DMsoNormal><o:p>&nbsp;</o:p></p></div><div><p =
class=3DMsoNormal>My initial argument is what is the validation =
criteria..? Validation criteria depends on the =
token_type..<o:p></o:p></p></div><div><p =
class=3DMsoNormal><o:p>&nbsp;</o:p></p></div><div><p =
class=3DMsoNormal>If we are talking only about metadata - then I believe =
&quot;revoked&quot;, &quot;expired&quot; would be more =
meaningful..<o:p></o:p></p></div><div><p =
class=3DMsoNormal><o:p>&nbsp;</o:p></p></div><div><p =
class=3DMsoNormal>Thanks &amp; regards,<o:p></o:p></p></div><div><p =
class=3DMsoNormal>-Prabath <o:p></o:p></p><div><div><p class=3DMsoNormal =
style=3D'margin-bottom:12.0pt'><o:p>&nbsp;</o:p></p><div><p =
class=3DMsoNormal>On Tue, Feb 12, 2013 at 7:53 PM, Justin Richer &lt;<a =
href=3D"mailto:jricher@mitre.org" =
target=3D"_blank">jricher@mitre.org</a>&gt; wrote:<o:p></o:p></p><div><p =
class=3DMsoNormal>OK, I can see the wisdom in changing this term. =
<br><br>I picked &quot;valid&quot; because I wanted a simple =
&quot;boolean&quot; value that would require no additional parsing or =
string-matching on the client's behalf, and I'd like to stick with that. =
OAuth is built with the assumption that clients need to be able to =
recover from invalid tokens at any stage, so I think a simple yes/no is =
the right step here. <br><br>That said, I think you're both right that =
&quot;valid&quot; seems to have caused a bit of confusion. I don't want =
to go with &quot;revoked&quot; because I'd rather have the &quot;token =
is OK&quot; be the positive boolean value. <br><br>Would =
&quot;valid_token&quot; be more clear? Or do we need a different =
adjective all together?<span style=3D'color:#888888'><br><br>&nbsp;-- =
Justin</span> <o:p></o:p></p><div><div><p class=3DMsoNormal =
style=3D'margin-bottom:12.0pt'><o:p>&nbsp;</o:p></p><div><p =
class=3DMsoNormal>On 02/11/2013 08:02 PM, Richard Harrington =
wrote:<o:p></o:p></p></div><blockquote =
style=3D'margin-top:5.0pt;margin-bottom:5.0pt'><div><p =
class=3DMsoNormal>Have you considered &quot;status&quot; instead of =
&quot;valid&quot;? &nbsp;It could have values like &quot;active&quot;, =
&quot;expired&quot;, and =
&quot;revoked&quot;.<o:p></o:p></p></div><div><p =
class=3DMsoNormal><o:p>&nbsp;</o:p></p></div><div><p =
class=3DMsoNormal>Is it worthwhile including the status of the client =
also? &nbsp;For example, a client application could be disabled, =
temporarily or permanently, and thus disabling its access tokens as =
well.<o:p></o:p></p></div><div><p =
class=3DMsoNormal><o:p>&nbsp;</o:p></p></div><div><p class=3DMsoNormal =
style=3D'margin-bottom:12.0pt'><br>On Feb 11, 2013, at 1:56 PM, Prabath =
Siriwardena &lt;<a href=3D"mailto:prabath@wso2.com" =
target=3D"_blank">prabath@wso2.com</a>&gt; =
wrote:<o:p></o:p></p></div><blockquote =
style=3D'margin-top:5.0pt;margin-bottom:5.0pt'><div><p =
class=3DMsoNormal>I guess confusion is with 'valid' parameter is in the =
response.. <o:p></o:p></p><div><p =
class=3DMsoNormal><o:p>&nbsp;</o:p></p></div><div><p class=3DMsoNormal>I =
thought this will be helpful to&nbsp;standardize&nbsp;the communication =
between Resource Server and the Authorization =
Server..<o:p></o:p></p></div><div><p =
class=3DMsoNormal><o:p>&nbsp;</o:p></p></div><div><p class=3DMsoNormal>I =
would suggest we completely remove &quot;valid&quot; from the response - =
or define it much clearly..<o:p></o:p></p></div><div><p =
class=3DMsoNormal><o:p>&nbsp;</o:p></p></div><div><p =
class=3DMsoNormal>May be can add &quot;revoked&quot; with a boolean =
attribute..<o:p></o:p></p></div><div><p =
class=3DMsoNormal><o:p>&nbsp;</o:p></p></div><div><p =
class=3DMsoNormal>Thanks &amp; regards,<o:p></o:p></p></div><div><p =
class=3DMsoNormal =
style=3D'margin-bottom:12.0pt'>-Prabath<o:p></o:p></p><div><p =
class=3DMsoNormal>On Tue, Feb 12, 2013 at 3:19 AM, Justin Richer &lt;<a =
href=3D"mailto:jricher@mitre.org" =
target=3D"_blank">jricher@mitre.org</a>&gt; =
wrote:<o:p></o:p></p><div><div><p =
class=3DMsoNormal><o:p>&nbsp;</o:p></p><div><p class=3DMsoNormal>On =
02/08/2013 12:51 AM, Prabath Siriwardena =
wrote:<o:p></o:p></p></div></div><blockquote =
style=3D'margin-top:5.0pt;margin-bottom:5.0pt'><p =
class=3DMsoNormal>Hi&nbsp;Justin, <o:p></o:p></p><div><p =
class=3DMsoNormal><o:p>&nbsp;</o:p></p></div><div><div><p =
class=3DMsoNormal>I have couple of questions related to =
&quot;valid&quot; parameter...<o:p></o:p></p></div><div><p =
class=3DMsoNormal><o:p>&nbsp;</o:p></p></div><div><p =
class=3DMsoNormal>This endpoint can be invoked by the Resource Server in =
runtime...<o:p></o:p></p></div></div></blockquote><p =
class=3DMsoNormal><br>That's correct. <o:p></o:p></p><div><p =
class=3DMsoNormal><br><br><br><o:p></o:p></p><div><p =
class=3DMsoNormal><o:p>&nbsp;</o:p></p></div><div><p =
class=3DMsoNormal>In that case what is exactly meant by the =
&quot;resource_id&quot; in request ?<o:p></o:p></p></div><p =
class=3DMsoNormal><o:p>&nbsp;</o:p></p></div><p class=3DMsoNormal>The =
resource_id field is a service-specific string that basically lets the =
resource server provide some context to the request to the auth server. =
There have been some other suggestions like client IP address, but I =
wanted to put this one in because it seemed to be a common theme. The =
client is trying to do *something* with the token, after all, and the =
rights, permissions, and metadata associated with the token could change =
based on that. Since the Introspection endpoint is all about getting =
that metadata back to the PR, this seemed like a good idea. =
<o:p></o:p></p><div><p =
class=3DMsoNormal><br><br><br><o:p></o:p></p><div><p =
class=3DMsoNormal><o:p>&nbsp;</o:p></p></div><div><p =
class=3DMsoNormal>IMO a token to be valid depends on set of criteria =
based on it's type..<o:p></o:p></p></div><div><p =
class=3DMsoNormal><o:p>&nbsp;</o:p></p></div><div><p =
class=3DMsoNormal>For a Bearer token..<o:p></o:p></p></div><div><p =
class=3DMsoNormal><o:p>&nbsp;</o:p></p></div><div><p =
class=3DMsoNormal>1. Token should not be =
expired<o:p></o:p></p></div><div><p class=3DMsoNormal>2. Token should =
not be revoked.<o:p></o:p></p></div><div><p class=3DMsoNormal>3. The =
scope the token issued should match with the scope required for the =
resource.<o:p></o:p></p></div><div><p =
class=3DMsoNormal><o:p>&nbsp;</o:p></p></div><div><p =
class=3DMsoNormal>For a MAC token...<o:p></o:p></p></div><div><p =
class=3DMsoNormal><o:p>&nbsp;</o:p></p></div><div><p =
class=3DMsoNormal>1. Token not expired (mac =
id)<o:p></o:p></p></div><div><p class=3DMsoNormal>2. Token should not be =
revoked<o:p></o:p></p></div><div><p class=3DMsoNormal>3. The scope the =
token issued should match with the scope required for the =
resource.<o:p></o:p></p></div><div><p class=3DMsoNormal>4. HMAC check =
should be valid<o:p></o:p></p></div><div><p =
class=3DMsoNormal><o:p>&nbsp;</o:p></p></div><p class=3DMsoNormal>There =
are similar conditions for SAML bearer too..<o:p></o:p></p><p =
class=3DMsoNormal><o:p>&nbsp;</o:p></p></div><p class=3DMsoNormal>This =
isn't really true. The SAML bearer token is fully self-contained and =
doesn't change based on other parameters in the message, unlike MAC. =
Same with JWT. When it hands a SAML or JWT token to the AS, the PR has =
given *everything* the server needs to check that token's validity and =
use. <br><br>MAC signatures change with every message, and they're done =
across several components of the HTTP message. Therefor, the HMAC check =
for MAC style tokens will still need to be done by the protected =
resource. Introspection would help in the case that the signature =
validated just fine, but the token might have expired. Or you need to =
know what scopes apply. Introspection isn't to fully validate the call =
to the protected resource -- if that were the case, the PR would have to =
send some kind of encapsulated version of the original request. =
Otherwise, the AS won't have all of the information it needs to check =
the MAC.<br><br><br>I think what you're describing is ultimately *not* =
what the introspection endpoint is intended to do. If that's unclear =
from the document, can you please suggest text that would help clear the =
use case up? I wouldn't want it to be ambiguous.<span =
style=3D'color:#888888'><br><br>&nbsp;-- Justin</span> =
<o:p></o:p></p><div><div><p =
class=3DMsoNormal><br><br><br><o:p></o:p></p><div><p =
class=3DMsoNormal><o:p>&nbsp;</o:p></p></div><div><p =
class=3DMsoNormal>Thanks &amp; regards,<o:p></o:p></p></div><div><p =
class=3DMsoNormal>-Prabath<o:p></o:p></p></div><div><p =
class=3DMsoNormal><o:p>&nbsp;</o:p></p></div><div><p =
class=3DMsoNormal><o:p>&nbsp;</o:p></p><div><p class=3DMsoNormal>On Thu, =
Feb 7, 2013 at 10:30 PM, Justin Richer &lt;<a =
href=3D"mailto:jricher@mitre.org" =
target=3D"_blank">jricher@mitre.org</a>&gt; wrote:<o:p></o:p></p><div><p =
class=3DMsoNormal>It validates the token, which would be either the =
token itself in the case of Bearer or the token &quot;id&quot; part of =
something more complex like MAC. It doesn't directly validate the usage =
of the token, that's still up to the PR to do that.<br><br>I nearly =
added a &quot;token type&quot; field in this draft, but held back =
because there are several kinds of &quot;token type&quot; that people =
talk about in OAuth. First, there's &quot;Bearer&quot; vs. =
&quot;MAC&quot; vs. &quot;HOK&quot;, or what have you. Then within =
Bearer you have &quot;JWT&quot; or &quot;SAML&quot; or =
&quot;unstructured blob&quot;. Then you've also got &quot;access&quot; =
vs. &quot;refresh&quot; and other flavors of token, like the id_token in =
OpenID Connect. <br><br>Thing is, the server running the introspection =
endpoint will probably know *all* of these. But should it tell the =
client? If so, which of the three, and what names should the fields =
be?<span style=3D'color:#888888'><br><br>&nbsp;-- Justin</span> =
<o:p></o:p></p><div><div><p class=3DMsoNormal =
style=3D'margin-bottom:12.0pt'><o:p>&nbsp;</o:p></p><div><p =
class=3DMsoNormal>On 02/07/2013 11:26 AM, Prabath Siriwardena =
wrote:<o:p></o:p></p></div><blockquote =
style=3D'margin-top:5.0pt;margin-bottom:5.0pt'><p =
class=3DMsoNormal>Okay.. I was thinking this could be used as a way to =
validate the token as well. BTW even in this case shouldn't communicate =
the type of token to AS? For example in the case of SAML profile - it =
could be SAML token.. <o:p></o:p></p><div><p =
class=3DMsoNormal><o:p>&nbsp;</o:p></p></div><div><p =
class=3DMsoNormal>Thanks &amp; regards,<o:p></o:p></p></div><div><p =
class=3DMsoNormal =
style=3D'margin-bottom:12.0pt'>-Prabath<o:p></o:p></p><div><p =
class=3DMsoNormal>On Thu, Feb 7, 2013 at 8:39 PM, Justin Richer &lt;<a =
href=3D"mailto:jricher@mitre.org" =
target=3D"_blank">jricher@mitre.org</a>&gt; wrote:<o:p></o:p></p><div><p =
class=3DMsoNormal>&quot;valid&quot; might not be the best term, but it's =
meant to be a field where the server says &quot;yes this token is still =
good&quot; or &quot;no this token isn't good anymore&quot;. We could =
instead do this with HTTP codes or something but I went with a pure JSON =
response.<span style=3D'color:#888888'><br><br>&nbsp;-- Justin</span> =
<o:p></o:p></p><div><div><p class=3DMsoNormal =
style=3D'margin-bottom:12.0pt'><o:p>&nbsp;</o:p></p><div><p =
class=3DMsoNormal>On 02/06/2013 10:47 PM, Prabath Siriwardena =
wrote:<o:p></o:p></p></div><blockquote =
style=3D'margin-top:5.0pt;margin-bottom:5.0pt'><p class=3DMsoNormal>Hi =
Justin, <o:p></o:p></p><div><p =
class=3DMsoNormal><o:p>&nbsp;</o:p></p></div><div><p class=3DMsoNormal>I =
believe this is addressing one of the key missing part in OAuth =
2.0...<o:p></o:p></p></div><div><p =
class=3DMsoNormal><o:p>&nbsp;</o:p></p></div><div><p =
class=3DMsoNormal>One question - I guess this was discussed =
already...<o:p></o:p></p></div><div><p =
class=3DMsoNormal><o:p>&nbsp;</o:p></p></div><div><p =
class=3DMsoNormal>In the spec - in the introspection response it has the =
attribute &quot;valid&quot; - this is basically the validity of the =
token provided in the request.<o:p></o:p></p></div><div><p =
class=3DMsoNormal><o:p>&nbsp;</o:p></p></div><div><p =
class=3DMsoNormal>Validation&nbsp;criteria depends on the token and well =
as token type ( Bearer, MAC..).<o:p></o:p></p></div><div><p =
class=3DMsoNormal><o:p>&nbsp;</o:p></p></div><div><p =
class=3DMsoNormal>In the spec it seems like it's coupled with Bearer =
token type... But I guess, by adding &quot;token_type&quot; to the =
request we can remove this dependency.<o:p></o:p></p></div><div><p =
class=3DMsoNormal><o:p>&nbsp;</o:p></p></div><div><p =
class=3DMsoNormal>WDYT..?<o:p></o:p></p></div><div><p =
class=3DMsoNormal><o:p>&nbsp;</o:p></p></div><div><p =
class=3DMsoNormal>Thanks &amp; regards,<o:p></o:p></p></div><div><p =
class=3DMsoNormal>-Prabath&nbsp;<o:p></o:p></p></div><div><p =
class=3DMsoNormal><o:p>&nbsp;</o:p></p><div><p class=3DMsoNormal>On Thu, =
Feb 7, 2013 at 12:54 AM, Justin Richer &lt;<a =
href=3D"mailto:jricher@mitre.org" =
target=3D"_blank">jricher@mitre.org</a>&gt; wrote:<o:p></o:p></p><div><p =
class=3DMsoNormal>Updated introspection draft based on recent comments. =
Changes include:<br><br>&nbsp;- &quot;scope&quot; return parameter now =
follows RFC6749 format instead of JSON array<br>&nbsp;- =
&quot;subject&quot; -&gt; &quot;sub&quot;, and &quot;audience&quot; =
-&gt; &quot;aud&quot;, to be parallel with JWT claims<br>&nbsp;- =
clarified what happens if the authentication is bad<br><br>&nbsp;-- =
Justin<o:p></o:p></p><div><p class=3DMsoNormal><br><br>-------- Original =
Message -------- <o:p></o:p></p><table class=3DMsoNormalTable border=3D0 =
cellspacing=3D0 cellpadding=3D0><tr><td nowrap valign=3Dtop =
style=3D'padding:0in 0in 0in 0in'><p class=3DMsoNormal align=3Dright =
style=3D'text-align:right'><b>Subject: <o:p></o:p></b></p></td><td =
style=3D'padding:0in 0in 0in 0in'><p class=3DMsoNormal>New Version =
Notification for =
draft-richer-oauth-introspection-02.txt<o:p></o:p></p></td></tr><tr><td =
nowrap valign=3Dtop style=3D'padding:0in 0in 0in 0in'><p =
class=3DMsoNormal align=3Dright style=3D'text-align:right'><b>Date: =
<o:p></o:p></b></p></td><td style=3D'padding:0in 0in 0in 0in'><p =
class=3DMsoNormal>Wed, 6 Feb 2013 11:24:20 =
-0800<o:p></o:p></p></td></tr><tr><td nowrap valign=3Dtop =
style=3D'padding:0in 0in 0in 0in'><p class=3DMsoNormal align=3Dright =
style=3D'text-align:right'><b>From: <o:p></o:p></b></p></td><td =
style=3D'padding:0in 0in 0in 0in'><p class=3DMsoNormal><a =
href=3D"mailto:internet-drafts@ietf.org" =
target=3D"_blank">&lt;internet-drafts@ietf.org&gt;</a><o:p></o:p></p></td=
></tr><tr><td nowrap valign=3Dtop style=3D'padding:0in 0in 0in 0in'><p =
class=3DMsoNormal align=3Dright style=3D'text-align:right'><b>To: =
<o:p></o:p></b></p></td><td style=3D'padding:0in 0in 0in 0in'><p =
class=3DMsoNormal><a href=3D"mailto:jricher@mitre.org" =
target=3D"_blank">&lt;jricher@mitre.org&gt;</a><o:p></o:p></p></td></tr><=
/table><p class=3DMsoNormal =
style=3D'margin-bottom:12.0pt'><o:p>&nbsp;</o:p></p><pre>A new version =
of I-D, draft-richer-oauth-introspection-02.txt<o:p></o:p></pre><pre>has =
been successfully submitted by Justin Richer and posted to =
the<o:p></o:p></pre><pre>IETF =
repository.<o:p></o:p></pre><pre><o:p>&nbsp;</o:p></pre><pre>Filename:&nb=
sp;&nbsp;&nbsp;&nbsp;&nbsp;  =
draft-richer-oauth-introspection<o:p></o:p></pre><pre>Revision:&nbsp;&nbs=
p;&nbsp;&nbsp;&nbsp;  =
02<o:p></o:p></pre><pre>Title:&nbsp;&nbsp;&nbsp;&nbsp;&nbsp; =
&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;  OAuth Token =
Introspection<o:p></o:p></pre><pre>Creation =
date:&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;  2013-02-06<o:p></o:p></pre><pre>WG =
ID:&nbsp;&nbsp;&nbsp;&nbsp;&nbsp; &nbsp;&nbsp;&nbsp;&nbsp;&nbsp;  =
Individual Submission<o:p></o:p></pre><pre>Number of pages: =
6<o:p></o:p></pre><pre>URL:&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbs=
p;&nbsp;&nbsp;&nbsp; &nbsp;<a =
href=3D"http://www.ietf.org/internet-drafts/draft-richer-oauth-introspect=
ion-02.txt" =
target=3D"_blank">http://www.ietf.org/internet-drafts/draft-richer-oauth-=
introspection-02.txt</a><o:p></o:p></pre><pre>Status:&nbsp;&nbsp;&nbsp;&n=
bsp;&nbsp;&nbsp;&nbsp;&nbsp; &nbsp;<a =
href=3D"http://datatracker.ietf.org/doc/draft-richer-oauth-introspection"=
 =
target=3D"_blank">http://datatracker.ietf.org/doc/draft-richer-oauth-intr=
ospection</a><o:p></o:p></pre><pre>Htmlized:&nbsp;&nbsp;&nbsp;&nbsp;&nbsp=
;&nbsp; &nbsp;<a =
href=3D"http://tools.ietf.org/html/draft-richer-oauth-introspection-02" =
target=3D"_blank">http://tools.ietf.org/html/draft-richer-oauth-introspec=
tion-02</a><o:p></o:p></pre><pre>Diff:&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp=
;&nbsp;&nbsp;&nbsp;&nbsp; &nbsp;<a =
href=3D"http://www.ietf.org/rfcdiff?url2=3Ddraft-richer-oauth-introspecti=
on-02" =
target=3D"_blank">http://www.ietf.org/rfcdiff?url2=3Ddraft-richer-oauth-i=
ntrospection-02</a><o:p></o:p></pre><pre><o:p>&nbsp;</o:p></pre><pre>Abst=
ract:<o:p></o:p></pre><pre>&nbsp;&nbsp; This specification defines a =
method for a client or protected<o:p></o:p></pre><pre>&nbsp;&nbsp; =
resource to query an OAuth authorization server to determine =
meta-<o:p></o:p></pre><pre>&nbsp;&nbsp; information about an OAuth =
token.<o:p></o:p></pre><pre><o:p>&nbsp;</o:p></pre><pre><o:p>&nbsp;</o:p>=
</pre><pre>&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&n=
bsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nb=
sp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbs=
p;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp=
;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;=
&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&=
nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp; =
<o:p></o:p></pre><pre><o:p>&nbsp;</o:p></pre><pre><o:p>&nbsp;</o:p></pre>=
<pre>The IETF Secretariat<o:p></o:p></pre><pre><o:p>&nbsp;</o:p></pre><p =
class=3DMsoNormal><o:p>&nbsp;</o:p></p></div><p =
class=3DMsoNormal><o:p>&nbsp;</o:p></p></div><p class=3DMsoNormal =
style=3D'margin-bottom:12.0pt'><br>______________________________________=
_________<br>OAuth mailing list<br><a href=3D"mailto:OAuth@ietf.org" =
target=3D"_blank">OAuth@ietf.org</a><br><a =
href=3D"https://www.ietf.org/mailman/listinfo/oauth" =
target=3D"_blank">https://www.ietf.org/mailman/listinfo/oauth</a><o:p></o=
:p></p></div><p class=3DMsoNormal><br><br =
clear=3Dall><o:p></o:p></p><div><p =
class=3DMsoNormal><o:p>&nbsp;</o:p></p></div><p class=3DMsoNormal>-- =
<br>Thanks &amp; Regards,<br>Prabath <o:p></o:p></p><div><p =
class=3DMsoNormal><o:p>&nbsp;</o:p></p></div><div><p =
class=3DMsoNormal>Mobile : <a href=3D"tel:%2B94%2071%20809%206732" =
target=3D"_blank">+94 71 809 6732</a>&nbsp;<br><br><a =
href=3D"http://blog.facilelogin.com" =
target=3D"_blank">http://blog.facilelogin.com</a><br><a =
href=3D"http://RampartFAQ.com" =
target=3D"_blank">http://RampartFAQ.com</a><o:p></o:p></p></div></div></b=
lockquote><p =
class=3DMsoNormal><o:p>&nbsp;</o:p></p></div></div></div></div><p =
class=3DMsoNormal><br><br clear=3Dall><o:p></o:p></p><div><p =
class=3DMsoNormal><o:p>&nbsp;</o:p></p></div><p class=3DMsoNormal>-- =
<br>Thanks &amp; Regards,<br>Prabath <o:p></o:p></p><div><p =
class=3DMsoNormal><o:p>&nbsp;</o:p></p></div><div><p =
class=3DMsoNormal>Mobile : <a href=3D"tel:%2B94%2071%20809%206732" =
target=3D"_blank">+94 71 809 6732</a>&nbsp;<br><br><a =
href=3D"http://blog.facilelogin.com" =
target=3D"_blank">http://blog.facilelogin.com</a><br><a =
href=3D"http://RampartFAQ.com" =
target=3D"_blank">http://RampartFAQ.com</a><o:p></o:p></p></div></div></b=
lockquote><p =
class=3DMsoNormal><o:p>&nbsp;</o:p></p></div></div></div></div><p =
class=3DMsoNormal><br><br clear=3Dall><o:p></o:p></p><div><p =
class=3DMsoNormal><o:p>&nbsp;</o:p></p></div><p class=3DMsoNormal>-- =
<br>Thanks &amp; Regards,<br>Prabath <o:p></o:p></p><div><p =
class=3DMsoNormal><o:p>&nbsp;</o:p></p></div><div><p =
class=3DMsoNormal>Mobile : <a href=3D"tel:%2B94%2071%20809%206732" =
target=3D"_blank">+94 71 809 6732</a>&nbsp;<br><br><a =
href=3D"http://blog.facilelogin.com" =
target=3D"_blank">http://blog.facilelogin.com</a><br><a =
href=3D"http://RampartFAQ.com" =
target=3D"_blank">http://RampartFAQ.com</a><o:p></o:p></p></div></div><p =
class=3DMsoNormal><o:p>&nbsp;</o:p></p></div></div></div></div><p =
class=3DMsoNormal><br><br clear=3Dall><o:p></o:p></p><div><p =
class=3DMsoNormal><o:p>&nbsp;</o:p></p></div><p class=3DMsoNormal>-- =
<br>Thanks &amp; Regards,<br>Prabath <o:p></o:p></p><div><p =
class=3DMsoNormal><o:p>&nbsp;</o:p></p></div><div><p =
class=3DMsoNormal>Mobile : <a href=3D"tel:%2B94%2071%20809%206732" =
target=3D"_blank">+94 71 809 6732</a>&nbsp;<br><br><a =
href=3D"http://blog.facilelogin.com" =
target=3D"_blank">http://blog.facilelogin.com</a><br><a =
href=3D"http://RampartFAQ.com" =
target=3D"_blank">http://RampartFAQ.com</a><o:p></o:p></p></div></div></d=
iv></blockquote><blockquote =
style=3D'margin-top:5.0pt;margin-bottom:5.0pt'><div><p =
class=3DMsoNormal>_______________________________________________<br>OAut=
h mailing list<br><a href=3D"mailto:OAuth@ietf.org" =
target=3D"_blank">OAuth@ietf.org</a><br><a =
href=3D"https://www.ietf.org/mailman/listinfo/oauth" =
target=3D"_blank">https://www.ietf.org/mailman/listinfo/oauth</a><o:p></o=
:p></p></div></blockquote></blockquote><p =
class=3DMsoNormal><o:p>&nbsp;</o:p></p></div></div></div></div><p =
class=3DMsoNormal><br><br clear=3Dall><o:p></o:p></p><div><p =
class=3DMsoNormal><o:p>&nbsp;</o:p></p></div><p class=3DMsoNormal>-- =
<br>Thanks &amp; Regards,<br>Prabath <o:p></o:p></p><div><p =
class=3DMsoNormal><o:p>&nbsp;</o:p></p></div><div><p =
class=3DMsoNormal>Mobile : <a href=3D"tel:%2B94%2071%20809%206732" =
target=3D"_blank">+94 71 809 6732</a>&nbsp;<br><br><a =
href=3D"http://blog.facilelogin.com" =
target=3D"_blank">http://blog.facilelogin.com</a><br><a =
href=3D"http://RampartFAQ.com" =
target=3D"_blank">http://RampartFAQ.com</a><o:p></o:p></p></div></div></d=
iv></div></div><p class=3DMsoNormal><br><br =
clear=3Dall><o:p></o:p></p><div><p =
class=3DMsoNormal><o:p>&nbsp;</o:p></p></div><p class=3DMsoNormal>-- =
<br>Thanks &amp; Regards,<br>Prabath <o:p></o:p></p><div><p =
class=3DMsoNormal><o:p>&nbsp;</o:p></p></div><div><p =
class=3DMsoNormal>Mobile : <a href=3D"tel:%2B94%2071%20809%206732" =
target=3D"_blank">+94 71 809 6732</a>&nbsp;<br><br><a =
href=3D"http://blog.facilelogin.com" =
target=3D"_blank">http://blog.facilelogin.com</a><br><a =
href=3D"http://RampartFAQ.com" =
target=3D"_blank">http://RampartFAQ.com</a><o:p></o:p></p></div></div></b=
lockquote><p =
class=3DMsoNormal><o:p>&nbsp;</o:p></p></div></div></div></div><p =
class=3DMsoNormal><br><br clear=3Dall><o:p></o:p></p><div><p =
class=3DMsoNormal><o:p>&nbsp;</o:p></p></div><p class=3DMsoNormal>-- =
<br>Thanks &amp; Regards,<br>Prabath <o:p></o:p></p><div><p =
class=3DMsoNormal><o:p>&nbsp;</o:p></p></div><div><p =
class=3DMsoNormal>Mobile : <a href=3D"tel:%2B94%2071%20809%206732" =
target=3D"_blank">+94 71 809 6732</a>&nbsp;<br><br><a =
href=3D"http://blog.facilelogin.com" =
target=3D"_blank">http://blog.facilelogin.com</a><br><a =
href=3D"http://RampartFAQ.com" =
target=3D"_blank">http://RampartFAQ.com</a><o:p></o:p></p></div></div></d=
iv></div></div><p class=3DMsoNormal><br><br =
clear=3Dall><o:p></o:p></p><div><p =
class=3DMsoNormal><o:p>&nbsp;</o:p></p></div><p class=3DMsoNormal>-- =
<br>Thanks &amp; Regards,<br>Prabath <o:p></o:p></p><div><p =
class=3DMsoNormal><o:p>&nbsp;</o:p></p></div><div><p =
class=3DMsoNormal>Mobile : <a href=3D"tel:%2B94%2071%20809%206732" =
target=3D"_blank">+94 71 809 6732</a>&nbsp;<br><br><a =
href=3D"http://blog.facilelogin.com" =
target=3D"_blank">http://blog.facilelogin.com</a><br><a =
href=3D"http://RampartFAQ.com" =
target=3D"_blank">http://RampartFAQ.com</a><o:p></o:p></p></div></div></b=
lockquote><p =
class=3DMsoNormal><o:p>&nbsp;</o:p></p></div></div></div></div><p =
class=3DMsoNormal><br><br clear=3Dall><o:p></o:p></p><div><p =
class=3DMsoNormal><o:p>&nbsp;</o:p></p></div><p class=3DMsoNormal>-- =
<br>Thanks &amp; Regards,<br>Prabath <o:p></o:p></p><div><p =
class=3DMsoNormal><o:p>&nbsp;</o:p></p></div><div><p =
class=3DMsoNormal>Mobile : <a href=3D"tel:%2B94%2071%20809%206732" =
target=3D"_blank">+94 71 809 6732</a>&nbsp;<br><br><a =
href=3D"http://blog.facilelogin.com" =
target=3D"_blank">http://blog.facilelogin.com</a><br><a =
href=3D"http://RampartFAQ.com" =
target=3D"_blank">http://RampartFAQ.com</a><o:p></o:p></p></div></div></b=
lockquote><p =
class=3DMsoNormal><o:p>&nbsp;</o:p></p></div></div></div></div><p =
class=3DMsoNormal><br><br clear=3Dall><o:p></o:p></p><div><p =
class=3DMsoNormal><o:p>&nbsp;</o:p></p></div><p class=3DMsoNormal>-- =
<br>Thanks &amp; Regards,<br>Prabath <o:p></o:p></p><div><p =
class=3DMsoNormal><o:p>&nbsp;</o:p></p></div><div><p =
class=3DMsoNormal>Mobile : <a href=3D"tel:%2B94%2071%20809%206732" =
target=3D"_blank">+94 71 809 6732</a>&nbsp;<br><br><a =
href=3D"http://blog.facilelogin.com" =
target=3D"_blank">http://blog.facilelogin.com</a><br><a =
href=3D"http://RampartFAQ.com" =
target=3D"_blank">http://RampartFAQ.com</a><o:p></o:p></p></div></div><p =
class=3DMsoNormal><o:p>&nbsp;</o:p></p></div></div></div></div><p =
class=3DMsoNormal><br><br clear=3Dall><o:p></o:p></p><div><p =
class=3DMsoNormal><o:p>&nbsp;</o:p></p></div><p class=3DMsoNormal>-- =
<br>Thanks &amp; Regards,<br>Prabath <o:p></o:p></p><div><p =
class=3DMsoNormal><o:p>&nbsp;</o:p></p></div><div><p =
class=3DMsoNormal>Mobile : +94 71 809 6732&nbsp;<br><br><a =
href=3D"http://blog.facilelogin.com" =
target=3D"_blank">http://blog.facilelogin.com</a><br><a =
href=3D"http://RampartFAQ.com" =
target=3D"_blank">http://RampartFAQ.com</a><o:p></o:p></p></div></div></b=
lockquote><p class=3DMsoNormal><o:p>&nbsp;</o:p></p></div></body></html>
------=_NextPart_000_00F0_01CE0AB5.DF3D54E0--


From jricher@mitre.org  Thu Feb 14 13:24:33 2013
Return-Path: <jricher@mitre.org>
X-Original-To: oauth@ietfa.amsl.com
Delivered-To: oauth@ietfa.amsl.com
Received: from localhost (localhost [127.0.0.1]) by ietfa.amsl.com (Postfix) with ESMTP id EA60321F88B5 for <oauth@ietfa.amsl.com>; Thu, 14 Feb 2013 13:24:25 -0800 (PST)
X-Virus-Scanned: amavisd-new at amsl.com
X-Spam-Flag: NO
X-Spam-Score: -6.571
X-Spam-Level: 
X-Spam-Status: No, score=-6.571 tagged_above=-999 required=5 tests=[AWL=0.027,  BAYES_00=-2.599, HTML_MESSAGE=0.001, RCVD_IN_DNSWL_MED=-4]
Received: from mail.ietf.org ([64.170.98.30]) by localhost (ietfa.amsl.com [127.0.0.1]) (amavisd-new, port 10024) with ESMTP id gdiLRyKmtCOn for <oauth@ietfa.amsl.com>; Thu, 14 Feb 2013 13:24:14 -0800 (PST)
Received: from smtpksrv1.mitre.org (smtpksrv1.mitre.org [198.49.146.77]) by ietfa.amsl.com (Postfix) with ESMTP id 8A3AF21F85AC for <oauth@ietf.org>; Thu, 14 Feb 2013 13:24:04 -0800 (PST)
Received: from smtpksrv1.mitre.org (localhost.localdomain [127.0.0.1]) by localhost (Postfix) with SMTP id 13946150118; Thu, 14 Feb 2013 16:24:04 -0500 (EST)
Received: from IMCCAS01.MITRE.ORG (imccas01.mitre.org [129.83.29.78]) by smtpksrv1.mitre.org (Postfix) with ESMTP id E039E15011C; Thu, 14 Feb 2013 16:24:03 -0500 (EST)
Received: from [10.146.15.29] (129.83.31.58) by IMCCAS01.MITRE.ORG (129.83.29.78) with Microsoft SMTP Server (TLS) id 14.2.318.4; Thu, 14 Feb 2013 16:24:03 -0500
Message-ID: <511D55C5.4080503@mitre.org>
Date: Thu, 14 Feb 2013 16:23:17 -0500
From: Justin Richer <jricher@mitre.org>
User-Agent: Mozilla/5.0 (X11; Linux i686; rv:17.0) Gecko/20130106 Thunderbird/17.0.2
MIME-Version: 1.0
To: Donald F Coffin <donald.coffin@reminetworks.com>
References: <20130206192420.32698.21027.idtracker@ietfa.amsl.com>	<CAJV9qO_gM1oera9ae9sqh9n17e-ZLKuC2pmsZwhq-RmFcMyqHA@mail.gmail.com>	<51196777.6000502@mitre.org>	<CAJV9qO-5bWZbNUfCmaqYBQoy-qwNaSZFOsO9GL3CrbSejwVTzw@mail.gmail.com>	<F6595A40-6B4E-4718-ABB5-694CA975C4DB@maymount.com>	<511A5062.5010108@mitre.org>	<CAJV9qO_Mr87NX=KZRqCsWasQ1FuvDNBw14eS-TcPf_KRJztQFg@mail.gmail.com>	<CAJV9qO-71-sM6kXOB6Fb_bvVkDBQ5JBbs8E5X=f-K=iEmGezRA@mail.gmail.com>	<511CEEAA.3030801@mitre.org>	<CAJV9qO-JSXgSTkw2_pdH0D-o-xDWGDqxx=PAWYtnTj4hOQXW4Q@mail.gmail.com>	<CAJV9qO9=+kiO-s7vH_ewr7XjfVdDU24F0kuif504bP53dBr1TA@mail.gmail.com>	<511CF3EF.8040008@mitre.org>	<CAJV9qO8yKkrsV7d9JtDmbLY-fb5phh=ssKbEUuutkY53PgY8Vg@mail.gmail.com>	<511CF4AB.5010700@mitre.org>	<CAJV9qO9VmjSQnWKU3kF11x35ut=AsvQ8bjuz_CKpyCScGRiA2Q@mail.gmail.com>	<511CF8C5.70301@mitre.org>	<CAJV9qO_-kFsWxoJwTP_RWFrb6+3frg-36JocQoo8SrpyNBMSoA@mail.gmail.com> <511D0DC3.7000607@mitre.org> <00ef01ce0af8$ed591ad0$c80b5070$@reminetworks.com>
In-Reply-To: <00ef01ce0af8$ed591ad0$c80b5070$@reminetworks.com>
Content-Type: multipart/alternative; boundary="------------040709040705020505060806"
X-Originating-IP: [129.83.31.58]
Cc: oauth@ietf.org
Subject: Re: [OAUTH-WG] Fwd: New Version Notification for	draft-richer-oauth-introspection-02.txt
X-BeenThere: oauth@ietf.org
X-Mailman-Version: 2.1.12
Precedence: list
List-Id: OAUTH WG <oauth.ietf.org>
List-Unsubscribe: <https://www.ietf.org/mailman/options/oauth>, <mailto:oauth-request@ietf.org?subject=unsubscribe>
List-Archive: <http://www.ietf.org/mail-archive/web/oauth>
List-Post: <mailto:oauth@ietf.org>
List-Help: <mailto:oauth-request@ietf.org?subject=help>
List-Subscribe: <https://www.ietf.org/mailman/listinfo/oauth>, <mailto:oauth-request@ietf.org?subject=subscribe>
X-List-Received-Date: Thu, 14 Feb 2013 21:24:33 -0000

--------------040709040705020505060806
Content-Type: text/plain; charset="ISO-8859-1"; format=flowed
Content-Transfer-Encoding: 7bit

That could work for me. Anyone else?

  -- Justin

On 02/14/2013 04:19 PM, Donald F Coffin wrote:
>
> Does the term "Active" help clarify the meaning but still confirm to 
> your intention, Justin?
>
> Best regards,
>
> Don
>
> Donald F. Coffin
>
> Founder/CTO
>
> REMI Networks
>
> 22751 El Prado Suite 6216
>
> Rancho Santa Margarita, CA  92688-3836
>
> Phone: (949) 636-8571
>
> Email: donald.coffin@reminetworks.com 
> <mailto:donald.coffin@reminetworks.com>
>
> *From:*Justin Richer [mailto:jricher@mitre.org]
> *Sent:* Thursday, February 14, 2013 8:16 AM
> *To:* Prabath Siriwardena
> *Cc:* oauth@ietf.org
> *Subject:* Re: [OAUTH-WG] Fwd: New Version Notification for 
> draft-richer-oauth-introspection-02.txt
>
> That much I can at least do. I'd be happy with another term if there 
> was a good one we could drop in its place without changing the 
> intended semantics.
>
>  -- Justin
>
> On 02/14/2013 10:57 AM, Prabath Siriwardena wrote:
>
>     Not quite convinced :-) Valid has a meaning attached to that..
>
>     In case we are going ahead with this please define it clearly in
>     the draft - with the one you shared in this thread.
>
>     Thanks & regards,
>
>     -Prabath
>
>     On Thu, Feb 14, 2013 at 8:16 PM, Justin Richer <jricher@mitre.org
>     <mailto:jricher@mitre.org>> wrote:
>
>     On 02/14/2013 09:37 AM, Prabath Siriwardena wrote:
>
>         The definition of valid is bit ambiguous in the draft...
>
>         Okay.. If that is the definition... and if we beak that in to
>         parts...
>
>         "it hasn't expired" : In the response it self we have
>         parameter for issued_at and and expires_at - so whether the
>         token is not expired or not can even be derived at the
>         requestor's end.
>
>     If the token isn't good anymore, it doesn't matter when it was
>     issued or when it was expired, just that it has.
>
>
>
>
>     "token was issued from here" : For this IMO we need to send an
>     error code. Requestor has picked the wrong AS.
>
>     We don't know if it came from another AS or if someone's just
>     making things up. Either way it's not a good token.
>
>
>
>
>     The remaining is  "revoked".. That is why I proposed earlier - we
>     better have an attribute "revoked" - instead of "valid" in the
>     response..
>
>     The end result of all three is the same: either the token is good,
>     or it isn't. I think it's much simpler and more useful to leave it
>     at that.
>
>      -- Justin
>
>
>
>
>     WDYT...?
>
>     Thanks & regards,
>
>     -Prabath
>
>     On Thu, Feb 14, 2013 at 7:58 PM, Justin Richer <jricher@mitre.org
>     <mailto:jricher@mitre.org>> wrote:
>
>     Because it will be the one that issued the token in the first place.
>
>     Validity means "token was issued from here, it hasn't been
>     revoked, it hasn't expired".
>
>      -- Justin
>
>     On 02/14/2013 09:28 AM, Prabath Siriwardena wrote:
>
>         Okay. With out knowing the type of the token how can the AS
>         validate the token ? What is meant by the validity there?
>
>         Thanks & regards,
>
>         -Prabath
>
>         On Thu, Feb 14, 2013 at 7:55 PM, Justin Richer
>         <jricher@mitre.org <mailto:jricher@mitre.org>> wrote:
>
>         OK, I don't see the utility in that at all. What would it
>         accomplish?
>
>          -- Justin
>
>         On 02/14/2013 09:25 AM, Prabath Siriwardena wrote:
>
>             To make it clear - my suggestion is to add token_type_hint
>             to the introspection request. It can be from client to AS
>             or from RS to AS.
>
>             Then AS can decide whether the provided token is valid or
>             not and include "valid" attribute in the introspection
>             response.
>
>             Thanks & regards,
>
>             -Prabath
>
>             On Thu, Feb 14, 2013 at 7:52 PM, Prabath Siriwardena
>             <prabath@wso2.com <mailto:prabath@wso2.com>> wrote:
>
>             Both the client and the resource owner should be aware of
>             the token type.
>
>             My argument is, if the authorization server to decide
>             whether the token is valid or not ( irrespective of who
>             asked the question) - AS needs to know the token type -
>             because to validate a token AS should know the token type.
>
>             The token type could be, bearer or MAC or any other token
>             type.
>
>             Thanks & regards,
>
>             -Prabath
>
>             On Thu, Feb 14, 2013 at 7:33 PM, Justin Richer
>             <jricher@mitre.org <mailto:jricher@mitre.org>> wrote:
>
>             What exactly are you suggesting be added to introspection?
>             The "token_type_hint" is from the client to the server,
>             but what you've asked for in terms of "token type" is from
>             the server to the client. And there was never an answer to
>             what exactly is meant by "token type" in this case,
>             particularly because you seem to want to call out things
>             like SAML and Bearer as separate types.
>
>              -- Justin
>
>
>
>             On 02/14/2013 06:59 AM, Prabath Siriwardena wrote:
>
>                 I noticed that the latest Token Revocation draft [1]
>                 has introduced the parameter "token_type_hint". I
>                 would suggest the same here, as that would make what
>                 is meant by "valid" much clear..
>
>                 [1]:
>                 http://tools.ietf.org/html/draft-ietf-oauth-revocation-05
>
>                 Thanks & regards,
>
>                 -Prabath
>
>                 On Tue, Feb 12, 2013 at 9:35 PM, Prabath Siriwardena
>                 <prabath@wso2.com <mailto:prabath@wso2.com>> wrote:
>
>                 Hi Justin,
>
>                 I doubt whether valid_token would make a difference..?
>
>                 My initial argument is what is the validation
>                 criteria..? Validation criteria depends on the
>                 token_type..
>
>                 If we are talking only about metadata - then I believe
>                 "revoked", "expired" would be more meaningful..
>
>                 Thanks & regards,
>
>                 -Prabath
>
>                 On Tue, Feb 12, 2013 at 7:53 PM, Justin Richer
>                 <jricher@mitre.org <mailto:jricher@mitre.org>> wrote:
>
>                 OK, I can see the wisdom in changing this term.
>
>                 I picked "valid" because I wanted a simple "boolean"
>                 value that would require no additional parsing or
>                 string-matching on the client's behalf, and I'd like
>                 to stick with that. OAuth is built with the assumption
>                 that clients need to be able to recover from invalid
>                 tokens at any stage, so I think a simple yes/no is the
>                 right step here.
>
>                 That said, I think you're both right that "valid"
>                 seems to have caused a bit of confusion. I don't want
>                 to go with "revoked" because I'd rather have the
>                 "token is OK" be the positive boolean value.
>
>                 Would "valid_token" be more clear? Or do we need a
>                 different adjective all together?
>
>                  -- Justin
>
>                 On 02/11/2013 08:02 PM, Richard Harrington wrote:
>
>                     Have you considered "status" instead of "valid"?
>                      It could have values like "active", "expired",
>                     and "revoked".
>
>                     Is it worthwhile including the status of the
>                     client also?  For example, a client application
>                     could be disabled, temporarily or permanently, and
>                     thus disabling its access tokens as well.
>
>
>                     On Feb 11, 2013, at 1:56 PM, Prabath Siriwardena
>                     <prabath@wso2.com <mailto:prabath@wso2.com>> wrote:
>
>                         I guess confusion is with 'valid' parameter is
>                         in the response..
>
>                         I thought this will be helpful
>                         to standardize the communication between
>                         Resource Server and the Authorization Server..
>
>                         I would suggest we completely remove "valid"
>                         from the response - or define it much clearly..
>
>                         May be can add "revoked" with a boolean
>                         attribute..
>
>                         Thanks & regards,
>
>                         -Prabath
>
>                         On Tue, Feb 12, 2013 at 3:19 AM, Justin Richer
>                         <jricher@mitre.org <mailto:jricher@mitre.org>>
>                         wrote:
>
>                         On 02/08/2013 12:51 AM, Prabath Siriwardena wrote:
>
>                             Hi Justin,
>
>                             I have couple of questions related to
>                             "valid" parameter...
>
>                             This endpoint can be invoked by the
>                             Resource Server in runtime...
>
>
>                         That's correct.
>
>
>
>
>                         In that case what is exactly meant by the
>                         "resource_id" in request ?
>
>                         The resource_id field is a service-specific
>                         string that basically lets the resource server
>                         provide some context to the request to the
>                         auth server. There have been some other
>                         suggestions like client IP address, but I
>                         wanted to put this one in because it seemed to
>                         be a common theme. The client is trying to do
>                         *something* with the token, after all, and the
>                         rights, permissions, and metadata associated
>                         with the token could change based on that.
>                         Since the Introspection endpoint is all about
>                         getting that metadata back to the PR, this
>                         seemed like a good idea.
>
>
>
>
>                         IMO a token to be valid depends on set of
>                         criteria based on it's type..
>
>                         For a Bearer token..
>
>                         1. Token should not be expired
>
>                         2. Token should not be revoked.
>
>                         3. The scope the token issued should match
>                         with the scope required for the resource.
>
>                         For a MAC token...
>
>                         1. Token not expired (mac id)
>
>                         2. Token should not be revoked
>
>                         3. The scope the token issued should match
>                         with the scope required for the resource.
>
>                         4. HMAC check should be valid
>
>                         There are similar conditions for SAML bearer too..
>
>                         This isn't really true. The SAML bearer token
>                         is fully self-contained and doesn't change
>                         based on other parameters in the message,
>                         unlike MAC. Same with JWT. When it hands a
>                         SAML or JWT token to the AS, the PR has given
>                         *everything* the server needs to check that
>                         token's validity and use.
>
>                         MAC signatures change with every message, and
>                         they're done across several components of the
>                         HTTP message. Therefor, the HMAC check for MAC
>                         style tokens will still need to be done by the
>                         protected resource. Introspection would help
>                         in the case that the signature validated just
>                         fine, but the token might have expired. Or you
>                         need to know what scopes apply. Introspection
>                         isn't to fully validate the call to the
>                         protected resource -- if that were the case,
>                         the PR would have to send some kind of
>                         encapsulated version of the original request.
>                         Otherwise, the AS won't have all of the
>                         information it needs to check the MAC.
>
>
>                         I think what you're describing is ultimately
>                         *not* what the introspection endpoint is
>                         intended to do. If that's unclear from the
>                         document, can you please suggest text that
>                         would help clear the use case up? I wouldn't
>                         want it to be ambiguous.
>
>                          -- Justin
>
>
>
>
>                         Thanks & regards,
>
>                         -Prabath
>
>                         On Thu, Feb 7, 2013 at 10:30 PM, Justin Richer
>                         <jricher@mitre.org <mailto:jricher@mitre.org>>
>                         wrote:
>
>                         It validates the token, which would be either
>                         the token itself in the case of Bearer or the
>                         token "id" part of something more complex like
>                         MAC. It doesn't directly validate the usage of
>                         the token, that's still up to the PR to do that.
>
>                         I nearly added a "token type" field in this
>                         draft, but held back because there are several
>                         kinds of "token type" that people talk about
>                         in OAuth. First, there's "Bearer" vs. "MAC"
>                         vs. "HOK", or what have you. Then within
>                         Bearer you have "JWT" or "SAML" or
>                         "unstructured blob". Then you've also got
>                         "access" vs. "refresh" and other flavors of
>                         token, like the id_token in OpenID Connect.
>
>                         Thing is, the server running the introspection
>                         endpoint will probably know *all* of these.
>                         But should it tell the client? If so, which of
>                         the three, and what names should the fields be?
>
>                          -- Justin
>
>                         On 02/07/2013 11:26 AM, Prabath Siriwardena wrote:
>
>                             Okay.. I was thinking this could be used
>                             as a way to validate the token as well.
>                             BTW even in this case shouldn't
>                             communicate the type of token to AS? For
>                             example in the case of SAML profile - it
>                             could be SAML token..
>
>                             Thanks & regards,
>
>                             -Prabath
>
>                             On Thu, Feb 7, 2013 at 8:39 PM, Justin
>                             Richer <jricher@mitre.org
>                             <mailto:jricher@mitre.org>> wrote:
>
>                             "valid" might not be the best term, but
>                             it's meant to be a field where the server
>                             says "yes this token is still good" or "no
>                             this token isn't good anymore". We could
>                             instead do this with HTTP codes or
>                             something but I went with a pure JSON
>                             response.
>
>                              -- Justin
>
>                             On 02/06/2013 10:47 PM, Prabath
>                             Siriwardena wrote:
>
>                                 Hi Justin,
>
>                                 I believe this is addressing one of
>                                 the key missing part in OAuth 2.0...
>
>                                 One question - I guess this was
>                                 discussed already...
>
>                                 In the spec - in the introspection
>                                 response it has the attribute "valid"
>                                 - this is basically the validity of
>                                 the token provided in the request.
>
>                                 Validation criteria depends on the
>                                 token and well as token type ( Bearer,
>                                 MAC..).
>
>                                 In the spec it seems like it's coupled
>                                 with Bearer token type... But I guess,
>                                 by adding "token_type" to the request
>                                 we can remove this dependency.
>
>                                 WDYT..?
>
>                                 Thanks & regards,
>
>                                 -Prabath
>
>                                 On Thu, Feb 7, 2013 at 12:54 AM,
>                                 Justin Richer <jricher@mitre.org
>                                 <mailto:jricher@mitre.org>> wrote:
>
>                                 Updated introspection draft based on
>                                 recent comments. Changes include:
>
>                                  - "scope" return parameter now
>                                 follows RFC6749 format instead of JSON
>                                 array
>                                  - "subject" -> "sub", and "audience"
>                                 -> "aud", to be parallel with JWT claims
>                                  - clarified what happens if the
>                                 authentication is bad
>
>                                  -- Justin
>
>
>
>                                 -------- Original Message --------
>
>                                 *Subject: *
>
>                                 	
>
>                                 New Version Notification for
>                                 draft-richer-oauth-introspection-02.txt
>
>                                 *Date: *
>
>                                 	
>
>                                 Wed, 6 Feb 2013 11:24:20 -0800
>
>                                 *From: *
>
>                                 	
>
>                                 <internet-drafts@ietf.org>
>                                 <mailto:internet-drafts@ietf.org>
>
>                                 *To: *
>
>                                 	
>
>                                 <jricher@mitre.org>
>                                 <mailto:jricher@mitre.org>
>
>                                 A new version of I-D, draft-richer-oauth-introspection-02.txt
>
>                                 has been successfully submitted by Justin Richer and posted to the
>
>                                 IETF repository.
>
>                                   
>
>                                 Filename:       draft-richer-oauth-introspection
>
>                                 Revision:       02
>
>                                 Title:             OAuth Token Introspection
>
>                                 Creation date:       2013-02-06
>
>                                 WG ID:             Individual Submission
>
>                                 Number of pages: 6
>
>                                 URL:http://www.ietf.org/internet-drafts/draft-richer-oauth-introspection-02.txt
>
>                                 Status:http://datatracker.ietf.org/doc/draft-richer-oauth-introspection
>
>                                 Htmlized:http://tools.ietf.org/html/draft-richer-oauth-introspection-02
>
>                                 Diff:http://www.ietf.org/rfcdiff?url2=draft-richer-oauth-introspection-02
>
>                                   
>
>                                 Abstract:
>
>                                     This specification defines a method for a client or protected
>
>                                     resource to query an OAuth authorization server to determine meta-
>
>                                     information about an OAuth token.
>
>                                   
>
>                                   
>
>                                                                                                                    
>
>                                   
>
>                                   
>
>                                 The IETF Secretariat
>
>                                   
>
>
>                                 _______________________________________________
>                                 OAuth mailing list
>                                 OAuth@ietf.org <mailto:OAuth@ietf.org>
>                                 https://www.ietf.org/mailman/listinfo/oauth
>
>
>
>                                 -- 
>                                 Thanks & Regards,
>                                 Prabath
>
>                                 Mobile : +94 71 809 6732
>                                 <tel:%2B94%2071%20809%206732>
>
>                                 http://blog.facilelogin.com
>                                 http://RampartFAQ.com
>
>
>
>                             -- 
>                             Thanks & Regards,
>                             Prabath
>
>                             Mobile : +94 71 809 6732
>                             <tel:%2B94%2071%20809%206732>
>
>                             http://blog.facilelogin.com
>                             http://RampartFAQ.com
>
>
>
>                         -- 
>                         Thanks & Regards,
>                         Prabath
>
>                         Mobile : +94 71 809 6732
>                         <tel:%2B94%2071%20809%206732>
>
>                         http://blog.facilelogin.com
>                         http://RampartFAQ.com
>
>
>
>                         -- 
>                         Thanks & Regards,
>                         Prabath
>
>                         Mobile : +94 71 809 6732
>                         <tel:%2B94%2071%20809%206732>
>
>                         http://blog.facilelogin.com
>                         http://RampartFAQ.com
>
>                         _______________________________________________
>                         OAuth mailing list
>                         OAuth@ietf.org <mailto:OAuth@ietf.org>
>                         https://www.ietf.org/mailman/listinfo/oauth
>
>
>
>                 -- 
>                 Thanks & Regards,
>                 Prabath
>
>                 Mobile : +94 71 809 6732 <tel:%2B94%2071%20809%206732>
>
>                 http://blog.facilelogin.com
>                 http://RampartFAQ.com
>
>
>
>                 -- 
>                 Thanks & Regards,
>                 Prabath
>
>                 Mobile : +94 71 809 6732 <tel:%2B94%2071%20809%206732>
>
>                 http://blog.facilelogin.com
>                 http://RampartFAQ.com
>
>
>
>             -- 
>             Thanks & Regards,
>             Prabath
>
>             Mobile : +94 71 809 6732 <tel:%2B94%2071%20809%206732>
>
>             http://blog.facilelogin.com
>             http://RampartFAQ.com
>
>
>
>             -- 
>             Thanks & Regards,
>             Prabath
>
>             Mobile : +94 71 809 6732 <tel:%2B94%2071%20809%206732>
>
>             http://blog.facilelogin.com
>             http://RampartFAQ.com
>
>
>
>         -- 
>         Thanks & Regards,
>         Prabath
>
>         Mobile : +94 71 809 6732 <tel:%2B94%2071%20809%206732>
>
>         http://blog.facilelogin.com
>         http://RampartFAQ.com
>
>
>
>     -- 
>     Thanks & Regards,
>     Prabath
>
>     Mobile : +94 71 809 6732 <tel:%2B94%2071%20809%206732>
>
>     http://blog.facilelogin.com
>     http://RampartFAQ.com
>
>
>
>     -- 
>     Thanks & Regards,
>     Prabath
>
>     Mobile : +94 71 809 6732
>
>     http://blog.facilelogin.com
>     http://RampartFAQ.com
>


--------------040709040705020505060806
Content-Type: text/html; charset="ISO-8859-1"
Content-Transfer-Encoding: 7bit

<html>
  <head>
    <meta content="text/html; charset=ISO-8859-1"
      http-equiv="Content-Type">
  </head>
  <body bgcolor="#FFFFFF" text="#000000">
    That could work for me. Anyone else?<br>
    <br>
    &nbsp;-- Justin<br>
    <br>
    <div class="moz-cite-prefix">On 02/14/2013 04:19 PM, Donald F Coffin
      wrote:<br>
    </div>
    <blockquote
      cite="mid:00ef01ce0af8$ed591ad0$c80b5070$@reminetworks.com"
      type="cite">
      <meta http-equiv="Content-Type" content="text/html;
        charset=ISO-8859-1">
      <meta name="Generator" content="Microsoft Word 14 (filtered
        medium)">
      <style><!--
/* Font Definitions */
@font-face
	{font-family:"Cambria Math";
	panose-1:2 4 5 3 5 4 6 3 2 4;}
@font-face
	{font-family:Cambria;
	panose-1:2 4 5 3 5 4 6 3 2 4;}
@font-face
	{font-family:Calibri;
	panose-1:2 15 5 2 2 2 4 3 2 4;}
@font-face
	{font-family:Tahoma;
	panose-1:2 11 6 4 3 5 4 4 2 4;}
@font-face
	{font-family:Consolas;
	panose-1:2 11 6 9 2 2 4 3 2 4;}
@font-face
	{font-family:"Brush Script MT";
	panose-1:3 6 8 2 4 4 6 7 3 4;}
/* Style Definitions */
p.MsoNormal, li.MsoNormal, div.MsoNormal
	{margin:0in;
	margin-bottom:.0001pt;
	font-size:12.0pt;
	font-family:"Times New Roman","serif";
	color:black;}
a:link, span.MsoHyperlink
	{mso-style-priority:99;
	color:blue;
	text-decoration:underline;}
a:visited, span.MsoHyperlinkFollowed
	{mso-style-priority:99;
	color:purple;
	text-decoration:underline;}
pre
	{mso-style-priority:99;
	mso-style-link:"HTML Preformatted Char";
	margin:0in;
	margin-bottom:.0001pt;
	font-size:10.0pt;
	font-family:"Courier New";
	color:black;}
span.hoenzb
	{mso-style-name:hoenzb;}
span.HTMLPreformattedChar
	{mso-style-name:"HTML Preformatted Char";
	mso-style-priority:99;
	mso-style-link:"HTML Preformatted";
	font-family:"Consolas","serif";
	color:black;}
span.EmailStyle20
	{mso-style-type:personal-reply;
	font-family:"Cambria","serif";
	color:windowtext;
	font-weight:normal;
	font-style:normal;}
.MsoChpDefault
	{mso-style-type:export-only;
	font-size:10.0pt;}
@page WordSection1
	{size:8.5in 11.0in;
	margin:1.0in 1.0in 1.0in 1.0in;}
div.WordSection1
	{page:WordSection1;}
--></style><!--[if gte mso 9]><xml>
<o:shapedefaults v:ext="edit" spidmax="1026" />
</xml><![endif]--><!--[if gte mso 9]><xml>
<o:shapelayout v:ext="edit">
<o:idmap v:ext="edit" data="1" />
</o:shapelayout></xml><![endif]-->
      <div class="WordSection1">
        <p class="MsoNormal"><span
style="font-family:&quot;Cambria&quot;,&quot;serif&quot;;color:windowtext">Does
            the term &#8220;Active&#8221; help clarify the meaning but still confirm
            to your intention, Justin?<o:p></o:p></span></p>
        <p class="MsoNormal"><span
style="font-family:&quot;Cambria&quot;,&quot;serif&quot;;color:windowtext"><o:p>&nbsp;</o:p></span></p>
        <div>
          <p class="MsoNormal"><span
style="font-family:&quot;Calibri&quot;,&quot;sans-serif&quot;;color:windowtext">Best
              regards,<o:p></o:p></span></p>
          <p class="MsoNormal"><span
              style="font-size:24.0pt;font-family:&quot;Brush Script
              MT&quot;;color:windowtext">Don<o:p></o:p></span></p>
          <p class="MsoNormal"><span
style="font-family:&quot;Calibri&quot;,&quot;sans-serif&quot;;color:windowtext">Donald
              F. Coffin<o:p></o:p></span></p>
          <p class="MsoNormal"><span
style="font-family:&quot;Calibri&quot;,&quot;sans-serif&quot;;color:windowtext">Founder/CTO<o:p></o:p></span></p>
          <p class="MsoNormal"><span
style="font-family:&quot;Calibri&quot;,&quot;sans-serif&quot;;color:windowtext"><o:p>&nbsp;</o:p></span></p>
          <p class="MsoNormal"><span
style="font-family:&quot;Calibri&quot;,&quot;sans-serif&quot;;color:windowtext">REMI
              Networks<o:p></o:p></span></p>
          <p class="MsoNormal"><span
style="font-family:&quot;Calibri&quot;,&quot;sans-serif&quot;;color:windowtext">22751
              El Prado Suite 6216<o:p></o:p></span></p>
          <p class="MsoNormal"><span
style="font-family:&quot;Calibri&quot;,&quot;sans-serif&quot;;color:windowtext">Rancho
              Santa Margarita, CA&nbsp; 92688-3836<o:p></o:p></span></p>
          <p class="MsoNormal"><span
style="font-family:&quot;Calibri&quot;,&quot;sans-serif&quot;;color:windowtext"><o:p>&nbsp;</o:p></span></p>
          <p class="MsoNormal"><span
style="font-family:&quot;Calibri&quot;,&quot;sans-serif&quot;;color:windowtext">Phone:&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;
              (949) 636-8571<o:p></o:p></span></p>
          <p class="MsoNormal"><span
style="font-family:&quot;Calibri&quot;,&quot;sans-serif&quot;;color:windowtext">Email:&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;
              <a moz-do-not-send="true"
                href="mailto:donald.coffin@reminetworks.com"><span
                  style="color:blue">donald.coffin@reminetworks.com</span></a><o:p></o:p></span></p>
        </div>
        <p class="MsoNormal"><span
style="font-family:&quot;Cambria&quot;,&quot;serif&quot;;color:windowtext"><o:p>&nbsp;</o:p></span></p>
        <div>
          <div style="border:none;border-top:solid #B5C4DF
            1.0pt;padding:3.0pt 0in 0in 0in">
            <p class="MsoNormal"><b><span
style="font-size:10.0pt;font-family:&quot;Tahoma&quot;,&quot;sans-serif&quot;;color:windowtext">From:</span></b><span
style="font-size:10.0pt;font-family:&quot;Tahoma&quot;,&quot;sans-serif&quot;;color:windowtext">
                Justin Richer [<a class="moz-txt-link-freetext" href="mailto:jricher@mitre.org">mailto:jricher@mitre.org</a>] <br>
                <b>Sent:</b> Thursday, February 14, 2013 8:16 AM<br>
                <b>To:</b> Prabath Siriwardena<br>
                <b>Cc:</b> <a class="moz-txt-link-abbreviated" href="mailto:oauth@ietf.org">oauth@ietf.org</a><br>
                <b>Subject:</b> Re: [OAUTH-WG] Fwd: New Version
                Notification for draft-richer-oauth-introspection-02.txt<o:p></o:p></span></p>
          </div>
        </div>
        <p class="MsoNormal"><o:p>&nbsp;</o:p></p>
        <p class="MsoNormal" style="margin-bottom:12.0pt">That much I
          can at least do. I'd be happy with another term if there was a
          good one we could drop in its place without changing the
          intended semantics.<br>
          <br>
          &nbsp;-- Justin<o:p></o:p></p>
        <div>
          <p class="MsoNormal">On 02/14/2013 10:57 AM, Prabath
            Siriwardena wrote:<o:p></o:p></p>
        </div>
        <blockquote style="margin-top:5.0pt;margin-bottom:5.0pt">
          <p class="MsoNormal">Not quite convinced :-) Valid has a
            meaning attached to that.. <o:p></o:p></p>
          <div>
            <p class="MsoNormal"><o:p>&nbsp;</o:p></p>
          </div>
          <div>
            <p class="MsoNormal">In case we are going ahead with this
              please define it clearly in the draft - with the one you
              shared in this thread.<o:p></o:p></p>
          </div>
          <div>
            <p class="MsoNormal"><o:p>&nbsp;</o:p></p>
          </div>
          <div>
            <p class="MsoNormal">Thanks &amp; regards,<o:p></o:p></p>
          </div>
          <div>
            <p class="MsoNormal" style="margin-bottom:12.0pt">-Prabath<o:p></o:p></p>
            <div>
              <p class="MsoNormal">On Thu, Feb 14, 2013 at 8:16 PM,
                Justin Richer &lt;<a moz-do-not-send="true"
                  href="mailto:jricher@mitre.org" target="_blank">jricher@mitre.org</a>&gt;
                wrote:<o:p></o:p></p>
              <div>
                <div>
                  <p class="MsoNormal"><o:p>&nbsp;</o:p></p>
                  <div>
                    <p class="MsoNormal">On 02/14/2013 09:37 AM, Prabath
                      Siriwardena wrote:<o:p></o:p></p>
                  </div>
                  <blockquote
                    style="margin-top:5.0pt;margin-bottom:5.0pt">
                    <div>
                      <p class="MsoNormal">The definition of valid is
                        bit ambiguous&nbsp;in the draft...<o:p></o:p></p>
                    </div>
                    <div>
                      <p class="MsoNormal"><o:p>&nbsp;</o:p></p>
                    </div>
                    <div>
                      <p class="MsoNormal">Okay.. If that is the
                        definition... and if we beak that in to parts...<o:p></o:p></p>
                    </div>
                    <div>
                      <p class="MsoNormal"><o:p>&nbsp;</o:p></p>
                    </div>
                    <div>
                      <p class="MsoNormal">"it hasn't expired" : In the
                        response it self we have parameter for issued_at
                        and and expires_at - so whether the token is not
                        expired or not can even be derived at the
                        requestor's end.<o:p></o:p></p>
                    </div>
                  </blockquote>
                  <p class="MsoNormal"><o:p>&nbsp;</o:p></p>
                </div>
                <p class="MsoNormal">If the token isn't good anymore, it
                  doesn't matter when it was issued or when it was
                  expired, just that it has. <o:p></o:p></p>
                <div>
                  <p class="MsoNormal"><br>
                    <br>
                    <br>
                    <o:p></o:p></p>
                  <div>
                    <p class="MsoNormal"><o:p>&nbsp;</o:p></p>
                  </div>
                  <div>
                    <p class="MsoNormal">"token was issued from here" :
                      For this IMO we need to send an error code.
                      Requestor has picked the wrong AS.<o:p></o:p></p>
                  </div>
                </div>
                <p class="MsoNormal">We don't know if it came from
                  another AS or if someone's just making things up.
                  Either way it's not a good token. <o:p></o:p></p>
                <div>
                  <p class="MsoNormal"><br>
                    <br>
                    <br>
                    <o:p></o:p></p>
                  <div>
                    <p class="MsoNormal"><o:p>&nbsp;</o:p></p>
                  </div>
                  <div>
                    <p class="MsoNormal">The remaining is &nbsp;"revoked"..
                      That is why I proposed&nbsp;earlier&nbsp;- we better have an
                      attribute "revoked" - instead of "valid" in the
                      response..<o:p></o:p></p>
                  </div>
                  <p class="MsoNormal"><o:p>&nbsp;</o:p></p>
                </div>
                <p class="MsoNormal">The end result of all three is the
                  same: either the token is good, or it isn't. I think
                  it's much simpler and more useful to leave it at that.<span
                    style="color:#888888"><br>
                    <br>
                    <span class="hoenzb">&nbsp;-- Justin</span></span> <o:p></o:p></p>
                <div>
                  <div>
                    <p class="MsoNormal"><br>
                      <br>
                      <br>
                      <o:p></o:p></p>
                    <div>
                      <p class="MsoNormal"><o:p>&nbsp;</o:p></p>
                    </div>
                    <div>
                      <p class="MsoNormal">WDYT...?<o:p></o:p></p>
                    </div>
                    <div>
                      <p class="MsoNormal"><o:p>&nbsp;</o:p></p>
                    </div>
                    <div>
                      <p class="MsoNormal">Thanks &amp; regards,<o:p></o:p></p>
                    </div>
                    <div>
                      <p class="MsoNormal">-Prabath<o:p></o:p></p>
                    </div>
                    <div>
                      <p class="MsoNormal"><o:p>&nbsp;</o:p></p>
                    </div>
                    <div>
                      <p class="MsoNormal"><o:p>&nbsp;</o:p></p>
                      <div>
                        <p class="MsoNormal">On Thu, Feb 14, 2013 at
                          7:58 PM, Justin Richer &lt;<a
                            moz-do-not-send="true"
                            href="mailto:jricher@mitre.org"
                            target="_blank">jricher@mitre.org</a>&gt;
                          wrote:<o:p></o:p></p>
                        <div>
                          <p class="MsoNormal">Because it will be the
                            one that issued the token in the first
                            place. <br>
                            <br>
                            Validity means "token was issued from here,
                            it hasn't been revoked, it hasn't expired".
                            <br>
                            <span style="color:#888888"><br>
                              &nbsp;-- Justin</span> <o:p></o:p></p>
                          <div>
                            <div>
                              <p class="MsoNormal"
                                style="margin-bottom:12.0pt"><o:p>&nbsp;</o:p></p>
                              <div>
                                <p class="MsoNormal">On 02/14/2013 09:28
                                  AM, Prabath Siriwardena wrote:<o:p></o:p></p>
                              </div>
                              <blockquote
                                style="margin-top:5.0pt;margin-bottom:5.0pt">
                                <p class="MsoNormal">Okay. With out
                                  knowing the type of the token how can
                                  the AS validate the token ? What is
                                  meant by the validity there? <o:p></o:p></p>
                                <div>
                                  <p class="MsoNormal"><o:p>&nbsp;</o:p></p>
                                </div>
                                <div>
                                  <p class="MsoNormal">Thanks &amp;
                                    regards,<o:p></o:p></p>
                                </div>
                                <div>
                                  <p class="MsoNormal"
                                    style="margin-bottom:12.0pt">-Prabath<o:p></o:p></p>
                                  <div>
                                    <p class="MsoNormal">On Thu, Feb 14,
                                      2013 at 7:55 PM, Justin Richer
                                      &lt;<a moz-do-not-send="true"
                                        href="mailto:jricher@mitre.org"
                                        target="_blank">jricher@mitre.org</a>&gt;
                                      wrote:<o:p></o:p></p>
                                    <div>
                                      <p class="MsoNormal">OK, I don't
                                        see the utility in that at all.
                                        What would it accomplish?<span
                                          style="color:#888888"><br>
                                          <br>
                                          &nbsp;-- Justin</span> <o:p></o:p></p>
                                      <div>
                                        <div>
                                          <p class="MsoNormal"
                                            style="margin-bottom:12.0pt"><o:p>&nbsp;</o:p></p>
                                          <div>
                                            <p class="MsoNormal">On
                                              02/14/2013 09:25 AM,
                                              Prabath Siriwardena wrote:<o:p></o:p></p>
                                          </div>
                                          <blockquote
                                            style="margin-top:5.0pt;margin-bottom:5.0pt">
                                            <p class="MsoNormal">To make
                                              it clear - my suggestion
                                              is to add token_type_hint
                                              to the introspection
                                              request. It can be from
                                              client to AS or from RS to
                                              AS. <o:p></o:p></p>
                                            <div>
                                              <p class="MsoNormal"><o:p>&nbsp;</o:p></p>
                                            </div>
                                            <div>
                                              <p class="MsoNormal">Then
                                                AS can decide whether
                                                the provided token is
                                                valid or not and include
                                                "valid" attribute in the
                                                introspection response.<o:p></o:p></p>
                                            </div>
                                            <div>
                                              <p class="MsoNormal"><o:p>&nbsp;</o:p></p>
                                            </div>
                                            <div>
                                              <p class="MsoNormal">Thanks
                                                &amp; regards,<o:p></o:p></p>
                                            </div>
                                            <div>
                                              <p class="MsoNormal"
                                                style="margin-bottom:12.0pt">-Prabath<o:p></o:p></p>
                                              <div>
                                                <p class="MsoNormal">On
                                                  Thu, Feb 14, 2013 at
                                                  7:52 PM, Prabath
                                                  Siriwardena &lt;<a
                                                    moz-do-not-send="true"
href="mailto:prabath@wso2.com" target="_blank">prabath@wso2.com</a>&gt;
                                                  wrote:<o:p></o:p></p>
                                                <p class="MsoNormal">Both
                                                  the client and the
                                                  resource owner should
                                                  be aware of the token
                                                  type. <o:p></o:p></p>
                                                <div>
                                                  <p class="MsoNormal"><o:p>&nbsp;</o:p></p>
                                                </div>
                                                <div>
                                                  <p class="MsoNormal">My
                                                    argument is, if the
                                                    authorization server
                                                    to decide whether
                                                    the token is valid
                                                    or not (
                                                    irrespective of who
                                                    asked the question)
                                                    - AS needs to know
                                                    the token type -
                                                    because to validate
                                                    a token AS should
                                                    know the token type.<o:p></o:p></p>
                                                </div>
                                                <div>
                                                  <p class="MsoNormal"><o:p>&nbsp;</o:p></p>
                                                </div>
                                                <div>
                                                  <p class="MsoNormal">The
                                                    token type could be,
                                                    bearer or MAC or any
                                                    other token type.<o:p></o:p></p>
                                                </div>
                                                <div>
                                                  <p class="MsoNormal"><o:p>&nbsp;</o:p></p>
                                                </div>
                                                <div>
                                                  <p class="MsoNormal">Thanks
                                                    &amp; regards,<o:p></o:p></p>
                                                </div>
                                                <div>
                                                  <p class="MsoNormal">-Prabath
                                                    <o:p></o:p></p>
                                                  <div>
                                                    <div>
                                                      <p
                                                        class="MsoNormal"
style="margin-bottom:12.0pt"><o:p>&nbsp;</o:p></p>
                                                      <div>
                                                        <p
                                                          class="MsoNormal">On
                                                          Thu, Feb 14,
                                                          2013 at 7:33
                                                          PM, Justin
                                                          Richer &lt;<a
moz-do-not-send="true" href="mailto:jricher@mitre.org" target="_blank">jricher@mitre.org</a>&gt;
                                                          wrote:<o:p></o:p></p>
                                                        <div>
                                                          <p
                                                          class="MsoNormal">What
                                                          exactly are
                                                          you suggesting
                                                          be added to
                                                          introspection?
                                                          The
                                                          "token_type_hint"
                                                          is from the
                                                          client to the
                                                          server, but
                                                          what you've
                                                          asked for in
                                                          terms of
                                                          "token type"
                                                          is from the
                                                          server to the
                                                          client. And
                                                          there was
                                                          never an
                                                          answer to what
                                                          exactly is
                                                          meant by
                                                          "token type"
                                                          in this case,
                                                          particularly
                                                          because you
                                                          seem to want
                                                          to call out
                                                          things like
                                                          SAML and
                                                          Bearer as
                                                          separate
                                                          types. <br>
                                                          <span
                                                          style="color:#888888"><br>
                                                          &nbsp;-- Justin</span>
                                                          <o:p></o:p></p>
                                                          <div>
                                                          <div>
                                                          <p
                                                          class="MsoNormal"
style="margin-bottom:12.0pt"><br>
                                                          <br>
                                                          <o:p></o:p></p>
                                                          <div>
                                                          <p
                                                          class="MsoNormal">On
                                                          02/14/2013
                                                          06:59 AM,
                                                          Prabath
                                                          Siriwardena
                                                          wrote:<o:p></o:p></p>
                                                          </div>
                                                          <blockquote
                                                          style="margin-top:5.0pt;margin-bottom:5.0pt">
                                                          <p
                                                          class="MsoNormal">I
                                                          noticed that
                                                          the latest
                                                          Token
                                                          Revocation
                                                          draft [1] has
                                                          introduced the
                                                          parameter
                                                          "token_type_hint".
                                                          I would
                                                          suggest the
                                                          same here, as
                                                          that would
                                                          make what is
                                                          meant by
                                                          "valid" much
                                                          clear.. <o:p></o:p></p>
                                                          <div>
                                                          <p
                                                          class="MsoNormal"><o:p>&nbsp;</o:p></p>
                                                          </div>
                                                          <div>
                                                          <p
                                                          class="MsoNormal">[1]:&nbsp;<a
moz-do-not-send="true"
                                                          href="http://tools.ietf.org/html/draft-ietf-oauth-revocation-05"
target="_blank"><span
style="font-size:9.5pt;font-family:&quot;Arial&quot;,&quot;sans-serif&quot;;color:#1155CC">http://tools.ietf.org/html/draft-ietf-oauth-revocation-05</span></a><o:p></o:p></p>
                                                          </div>
                                                          <div>
                                                          <p
                                                          class="MsoNormal"><o:p>&nbsp;</o:p></p>
                                                          </div>
                                                          <div>
                                                          <p
                                                          class="MsoNormal">Thanks
                                                          &amp; regards,<o:p></o:p></p>
                                                          </div>
                                                          <div>
                                                          <p
                                                          class="MsoNormal"
style="margin-bottom:12.0pt">-Prabath<o:p></o:p></p>
                                                          <div>
                                                          <p
                                                          class="MsoNormal">On
                                                          Tue, Feb 12,
                                                          2013 at 9:35
                                                          PM, Prabath
                                                          Siriwardena
                                                          &lt;<a
                                                          moz-do-not-send="true"
href="mailto:prabath@wso2.com" target="_blank">prabath@wso2.com</a>&gt;
                                                          wrote:<o:p></o:p></p>
                                                          <p
                                                          class="MsoNormal">Hi
                                                          Justin, <o:p></o:p></p>
                                                          <div>
                                                          <p
                                                          class="MsoNormal"><o:p>&nbsp;</o:p></p>
                                                          </div>
                                                          <div>
                                                          <p
                                                          class="MsoNormal">I
                                                          doubt whether
                                                          valid_token
                                                          would make a
                                                          difference..?<o:p></o:p></p>
                                                          </div>
                                                          <div>
                                                          <p
                                                          class="MsoNormal"><o:p>&nbsp;</o:p></p>
                                                          </div>
                                                          <div>
                                                          <p
                                                          class="MsoNormal">My
                                                          initial
                                                          argument is
                                                          what is the
                                                          validation
                                                          criteria..?
                                                          Validation
                                                          criteria
                                                          depends on the
                                                          token_type..<o:p></o:p></p>
                                                          </div>
                                                          <div>
                                                          <p
                                                          class="MsoNormal"><o:p>&nbsp;</o:p></p>
                                                          </div>
                                                          <div>
                                                          <p
                                                          class="MsoNormal">If
                                                          we are talking
                                                          only about
                                                          metadata -
                                                          then I believe
                                                          "revoked",
                                                          "expired"
                                                          would be more
                                                          meaningful..<o:p></o:p></p>
                                                          </div>
                                                          <div>
                                                          <p
                                                          class="MsoNormal"><o:p>&nbsp;</o:p></p>
                                                          </div>
                                                          <div>
                                                          <p
                                                          class="MsoNormal">Thanks
                                                          &amp; regards,<o:p></o:p></p>
                                                          </div>
                                                          <div>
                                                          <p
                                                          class="MsoNormal">-Prabath
                                                          <o:p></o:p></p>
                                                          <div>
                                                          <div>
                                                          <p
                                                          class="MsoNormal"
style="margin-bottom:12.0pt"><o:p>&nbsp;</o:p></p>
                                                          <div>
                                                          <p
                                                          class="MsoNormal">On
                                                          Tue, Feb 12,
                                                          2013 at 7:53
                                                          PM, Justin
                                                          Richer &lt;<a
moz-do-not-send="true" href="mailto:jricher@mitre.org" target="_blank">jricher@mitre.org</a>&gt;
                                                          wrote:<o:p></o:p></p>
                                                          <div>
                                                          <p
                                                          class="MsoNormal">OK,
                                                          I can see the
                                                          wisdom in
                                                          changing this
                                                          term. <br>
                                                          <br>
                                                          I picked
                                                          "valid"
                                                          because I
                                                          wanted a
                                                          simple
                                                          "boolean"
                                                          value that
                                                          would require
                                                          no additional
                                                          parsing or
                                                          string-matching
                                                          on the
                                                          client's
                                                          behalf, and
                                                          I'd like to
                                                          stick with
                                                          that. OAuth is
                                                          built with the
                                                          assumption
                                                          that clients
                                                          need to be
                                                          able to
                                                          recover from
                                                          invalid tokens
                                                          at any stage,
                                                          so I think a
                                                          simple yes/no
                                                          is the right
                                                          step here. <br>
                                                          <br>
                                                          That said, I
                                                          think you're
                                                          both right
                                                          that "valid"
                                                          seems to have
                                                          caused a bit
                                                          of confusion.
                                                          I don't want
                                                          to go with
                                                          "revoked"
                                                          because I'd
                                                          rather have
                                                          the "token is
                                                          OK" be the
                                                          positive
                                                          boolean value.
                                                          <br>
                                                          <br>
                                                          Would
                                                          "valid_token"
                                                          be more clear?
                                                          Or do we need
                                                          a different
                                                          adjective all
                                                          together?<span
style="color:#888888"><br>
                                                          <br>
                                                          &nbsp;-- Justin</span>
                                                          <o:p></o:p></p>
                                                          <div>
                                                          <div>
                                                          <p
                                                          class="MsoNormal"
style="margin-bottom:12.0pt"><o:p>&nbsp;</o:p></p>
                                                          <div>
                                                          <p
                                                          class="MsoNormal">On
                                                          02/11/2013
                                                          08:02 PM,
                                                          Richard
                                                          Harrington
                                                          wrote:<o:p></o:p></p>
                                                          </div>
                                                          <blockquote
                                                          style="margin-top:5.0pt;margin-bottom:5.0pt">
                                                          <div>
                                                          <p
                                                          class="MsoNormal">Have
                                                          you considered
                                                          "status"
                                                          instead of
                                                          "valid"? &nbsp;It
                                                          could have
                                                          values like
                                                          "active",
                                                          "expired", and
                                                          "revoked".<o:p></o:p></p>
                                                          </div>
                                                          <div>
                                                          <p
                                                          class="MsoNormal"><o:p>&nbsp;</o:p></p>
                                                          </div>
                                                          <div>
                                                          <p
                                                          class="MsoNormal">Is
                                                          it worthwhile
                                                          including the
                                                          status of the
                                                          client also?
                                                          &nbsp;For example,
                                                          a client
                                                          application
                                                          could be
                                                          disabled,
                                                          temporarily or
                                                          permanently,
                                                          and thus
                                                          disabling its
                                                          access tokens
                                                          as well.<o:p></o:p></p>
                                                          </div>
                                                          <div>
                                                          <p
                                                          class="MsoNormal"><o:p>&nbsp;</o:p></p>
                                                          </div>
                                                          <div>
                                                          <p
                                                          class="MsoNormal"
style="margin-bottom:12.0pt"><br>
                                                          On Feb 11,
                                                          2013, at 1:56
                                                          PM, Prabath
                                                          Siriwardena
                                                          &lt;<a
                                                          moz-do-not-send="true"
href="mailto:prabath@wso2.com" target="_blank">prabath@wso2.com</a>&gt;
                                                          wrote:<o:p></o:p></p>
                                                          </div>
                                                          <blockquote
                                                          style="margin-top:5.0pt;margin-bottom:5.0pt">
                                                          <div>
                                                          <p
                                                          class="MsoNormal">I
                                                          guess
                                                          confusion is
                                                          with 'valid'
                                                          parameter is
                                                          in the
                                                          response.. <o:p></o:p></p>
                                                          <div>
                                                          <p
                                                          class="MsoNormal"><o:p>&nbsp;</o:p></p>
                                                          </div>
                                                          <div>
                                                          <p
                                                          class="MsoNormal">I
                                                          thought this
                                                          will be
                                                          helpful
                                                          to&nbsp;standardize&nbsp;the
                                                          communication
                                                          between
                                                          Resource
                                                          Server and the
                                                          Authorization
                                                          Server..<o:p></o:p></p>
                                                          </div>
                                                          <div>
                                                          <p
                                                          class="MsoNormal"><o:p>&nbsp;</o:p></p>
                                                          </div>
                                                          <div>
                                                          <p
                                                          class="MsoNormal">I
                                                          would suggest
                                                          we completely
                                                          remove "valid"
                                                          from the
                                                          response - or
                                                          define it much
                                                          clearly..<o:p></o:p></p>
                                                          </div>
                                                          <div>
                                                          <p
                                                          class="MsoNormal"><o:p>&nbsp;</o:p></p>
                                                          </div>
                                                          <div>
                                                          <p
                                                          class="MsoNormal">May
                                                          be can add
                                                          "revoked" with
                                                          a boolean
                                                          attribute..<o:p></o:p></p>
                                                          </div>
                                                          <div>
                                                          <p
                                                          class="MsoNormal"><o:p>&nbsp;</o:p></p>
                                                          </div>
                                                          <div>
                                                          <p
                                                          class="MsoNormal">Thanks
                                                          &amp; regards,<o:p></o:p></p>
                                                          </div>
                                                          <div>
                                                          <p
                                                          class="MsoNormal"
style="margin-bottom:12.0pt">-Prabath<o:p></o:p></p>
                                                          <div>
                                                          <p
                                                          class="MsoNormal">On
                                                          Tue, Feb 12,
                                                          2013 at 3:19
                                                          AM, Justin
                                                          Richer &lt;<a
moz-do-not-send="true" href="mailto:jricher@mitre.org" target="_blank">jricher@mitre.org</a>&gt;
                                                          wrote:<o:p></o:p></p>
                                                          <div>
                                                          <div>
                                                          <p
                                                          class="MsoNormal"><o:p>&nbsp;</o:p></p>
                                                          <div>
                                                          <p
                                                          class="MsoNormal">On
                                                          02/08/2013
                                                          12:51 AM,
                                                          Prabath
                                                          Siriwardena
                                                          wrote:<o:p></o:p></p>
                                                          </div>
                                                          </div>
                                                          <blockquote
                                                          style="margin-top:5.0pt;margin-bottom:5.0pt">
                                                          <p
                                                          class="MsoNormal">Hi&nbsp;Justin,
                                                          <o:p></o:p></p>
                                                          <div>
                                                          <p
                                                          class="MsoNormal"><o:p>&nbsp;</o:p></p>
                                                          </div>
                                                          <div>
                                                          <div>
                                                          <p
                                                          class="MsoNormal">I
                                                          have couple of
                                                          questions
                                                          related to
                                                          "valid"
                                                          parameter...<o:p></o:p></p>
                                                          </div>
                                                          <div>
                                                          <p
                                                          class="MsoNormal"><o:p>&nbsp;</o:p></p>
                                                          </div>
                                                          <div>
                                                          <p
                                                          class="MsoNormal">This
                                                          endpoint can
                                                          be invoked by
                                                          the Resource
                                                          Server in
                                                          runtime...<o:p></o:p></p>
                                                          </div>
                                                          </div>
                                                          </blockquote>
                                                          <p
                                                          class="MsoNormal"><br>
                                                          That's
                                                          correct. <o:p></o:p></p>
                                                          <div>
                                                          <p
                                                          class="MsoNormal"><br>
                                                          <br>
                                                          <br>
                                                          <o:p></o:p></p>
                                                          <div>
                                                          <p
                                                          class="MsoNormal"><o:p>&nbsp;</o:p></p>
                                                          </div>
                                                          <div>
                                                          <p
                                                          class="MsoNormal">In
                                                          that case what
                                                          is exactly
                                                          meant by the
                                                          "resource_id"
                                                          in request ?<o:p></o:p></p>
                                                          </div>
                                                          <p
                                                          class="MsoNormal"><o:p>&nbsp;</o:p></p>
                                                          </div>
                                                          <p
                                                          class="MsoNormal">The
                                                          resource_id
                                                          field is a
                                                          service-specific
                                                          string that
                                                          basically lets
                                                          the resource
                                                          server provide
                                                          some context
                                                          to the request
                                                          to the auth
                                                          server. There
                                                          have been some
                                                          other
                                                          suggestions
                                                          like client IP
                                                          address, but I
                                                          wanted to put
                                                          this one in
                                                          because it
                                                          seemed to be a
                                                          common theme.
                                                          The client is
                                                          trying to do
                                                          *something*
                                                          with the
                                                          token, after
                                                          all, and the
                                                          rights,
                                                          permissions,
                                                          and metadata
                                                          associated
                                                          with the token
                                                          could change
                                                          based on that.
                                                          Since the
                                                          Introspection
                                                          endpoint is
                                                          all about
                                                          getting that
                                                          metadata back
                                                          to the PR,
                                                          this seemed
                                                          like a good
                                                          idea. <o:p></o:p></p>
                                                          <div>
                                                          <p
                                                          class="MsoNormal"><br>
                                                          <br>
                                                          <br>
                                                          <o:p></o:p></p>
                                                          <div>
                                                          <p
                                                          class="MsoNormal"><o:p>&nbsp;</o:p></p>
                                                          </div>
                                                          <div>
                                                          <p
                                                          class="MsoNormal">IMO
                                                          a token to be
                                                          valid depends
                                                          on set of
                                                          criteria based
                                                          on it's type..<o:p></o:p></p>
                                                          </div>
                                                          <div>
                                                          <p
                                                          class="MsoNormal"><o:p>&nbsp;</o:p></p>
                                                          </div>
                                                          <div>
                                                          <p
                                                          class="MsoNormal">For
                                                          a Bearer
                                                          token..<o:p></o:p></p>
                                                          </div>
                                                          <div>
                                                          <p
                                                          class="MsoNormal"><o:p>&nbsp;</o:p></p>
                                                          </div>
                                                          <div>
                                                          <p
                                                          class="MsoNormal">1.
                                                          Token should
                                                          not be expired<o:p></o:p></p>
                                                          </div>
                                                          <div>
                                                          <p
                                                          class="MsoNormal">2.
                                                          Token should
                                                          not be
                                                          revoked.<o:p></o:p></p>
                                                          </div>
                                                          <div>
                                                          <p
                                                          class="MsoNormal">3.
                                                          The scope the
                                                          token issued
                                                          should match
                                                          with the scope
                                                          required for
                                                          the resource.<o:p></o:p></p>
                                                          </div>
                                                          <div>
                                                          <p
                                                          class="MsoNormal"><o:p>&nbsp;</o:p></p>
                                                          </div>
                                                          <div>
                                                          <p
                                                          class="MsoNormal">For
                                                          a MAC token...<o:p></o:p></p>
                                                          </div>
                                                          <div>
                                                          <p
                                                          class="MsoNormal"><o:p>&nbsp;</o:p></p>
                                                          </div>
                                                          <div>
                                                          <p
                                                          class="MsoNormal">1.
                                                          Token not
                                                          expired (mac
                                                          id)<o:p></o:p></p>
                                                          </div>
                                                          <div>
                                                          <p
                                                          class="MsoNormal">2.
                                                          Token should
                                                          not be revoked<o:p></o:p></p>
                                                          </div>
                                                          <div>
                                                          <p
                                                          class="MsoNormal">3.
                                                          The scope the
                                                          token issued
                                                          should match
                                                          with the scope
                                                          required for
                                                          the resource.<o:p></o:p></p>
                                                          </div>
                                                          <div>
                                                          <p
                                                          class="MsoNormal">4.
                                                          HMAC check
                                                          should be
                                                          valid<o:p></o:p></p>
                                                          </div>
                                                          <div>
                                                          <p
                                                          class="MsoNormal"><o:p>&nbsp;</o:p></p>
                                                          </div>
                                                          <p
                                                          class="MsoNormal">There
                                                          are similar
                                                          conditions for
                                                          SAML bearer
                                                          too..<o:p></o:p></p>
                                                          <p
                                                          class="MsoNormal"><o:p>&nbsp;</o:p></p>
                                                          </div>
                                                          <p
                                                          class="MsoNormal">This
                                                          isn't really
                                                          true. The SAML
                                                          bearer token
                                                          is fully
                                                          self-contained
                                                          and doesn't
                                                          change based
                                                          on other
                                                          parameters in
                                                          the message,
                                                          unlike MAC.
                                                          Same with JWT.
                                                          When it hands
                                                          a SAML or JWT
                                                          token to the
                                                          AS, the PR has
                                                          given
                                                          *everything*
                                                          the server
                                                          needs to check
                                                          that token's
                                                          validity and
                                                          use. <br>
                                                          <br>
                                                          MAC signatures
                                                          change with
                                                          every message,
                                                          and they're
                                                          done across
                                                          several
                                                          components of
                                                          the HTTP
                                                          message.
                                                          Therefor, the
                                                          HMAC check for
                                                          MAC style
                                                          tokens will
                                                          still need to
                                                          be done by the
                                                          protected
                                                          resource.
                                                          Introspection
                                                          would help in
                                                          the case that
                                                          the signature
                                                          validated just
                                                          fine, but the
                                                          token might
                                                          have expired.
                                                          Or you need to
                                                          know what
                                                          scopes apply.
                                                          Introspection
                                                          isn't to fully
                                                          validate the
                                                          call to the
                                                          protected
                                                          resource -- if
                                                          that were the
                                                          case, the PR
                                                          would have to
                                                          send some kind
                                                          of
                                                          encapsulated
                                                          version of the
                                                          original
                                                          request.
                                                          Otherwise, the
                                                          AS won't have
                                                          all of the
                                                          information it
                                                          needs to check
                                                          the MAC.<br>
                                                          <br>
                                                          <br>
                                                          I think what
                                                          you're
                                                          describing is
                                                          ultimately
                                                          *not* what the
                                                          introspection
                                                          endpoint is
                                                          intended to
                                                          do. If that's
                                                          unclear from
                                                          the document,
                                                          can you please
                                                          suggest text
                                                          that would
                                                          help clear the
                                                          use case up? I
                                                          wouldn't want
                                                          it to be
                                                          ambiguous.<span
style="color:#888888"><br>
                                                          <br>
                                                          &nbsp;-- Justin</span>
                                                          <o:p></o:p></p>
                                                          <div>
                                                          <div>
                                                          <p
                                                          class="MsoNormal"><br>
                                                          <br>
                                                          <br>
                                                          <o:p></o:p></p>
                                                          <div>
                                                          <p
                                                          class="MsoNormal"><o:p>&nbsp;</o:p></p>
                                                          </div>
                                                          <div>
                                                          <p
                                                          class="MsoNormal">Thanks
                                                          &amp; regards,<o:p></o:p></p>
                                                          </div>
                                                          <div>
                                                          <p
                                                          class="MsoNormal">-Prabath<o:p></o:p></p>
                                                          </div>
                                                          <div>
                                                          <p
                                                          class="MsoNormal"><o:p>&nbsp;</o:p></p>
                                                          </div>
                                                          <div>
                                                          <p
                                                          class="MsoNormal"><o:p>&nbsp;</o:p></p>
                                                          <div>
                                                          <p
                                                          class="MsoNormal">On
                                                          Thu, Feb 7,
                                                          2013 at 10:30
                                                          PM, Justin
                                                          Richer &lt;<a
moz-do-not-send="true" href="mailto:jricher@mitre.org" target="_blank">jricher@mitre.org</a>&gt;
                                                          wrote:<o:p></o:p></p>
                                                          <div>
                                                          <p
                                                          class="MsoNormal">It
                                                          validates the
                                                          token, which
                                                          would be
                                                          either the
                                                          token itself
                                                          in the case of
                                                          Bearer or the
                                                          token "id"
                                                          part of
                                                          something more
                                                          complex like
                                                          MAC. It
                                                          doesn't
                                                          directly
                                                          validate the
                                                          usage of the
                                                          token, that's
                                                          still up to
                                                          the PR to do
                                                          that.<br>
                                                          <br>
                                                          I nearly added
                                                          a "token type"
                                                          field in this
                                                          draft, but
                                                          held back
                                                          because there
                                                          are several
                                                          kinds of
                                                          "token type"
                                                          that people
                                                          talk about in
                                                          OAuth. First,
                                                          there's
                                                          "Bearer" vs.
                                                          "MAC" vs.
                                                          "HOK", or what
                                                          have you. Then
                                                          within Bearer
                                                          you have "JWT"
                                                          or "SAML" or
                                                          "unstructured
                                                          blob". Then
                                                          you've also
                                                          got "access"
                                                          vs. "refresh"
                                                          and other
                                                          flavors of
                                                          token, like
                                                          the id_token
                                                          in OpenID
                                                          Connect. <br>
                                                          <br>
                                                          Thing is, the
                                                          server running
                                                          the
                                                          introspection
                                                          endpoint will
                                                          probably know
                                                          *all* of
                                                          these. But
                                                          should it tell
                                                          the client? If
                                                          so, which of
                                                          the three, and
                                                          what names
                                                          should the
                                                          fields be?<span
style="color:#888888"><br>
                                                          <br>
                                                          &nbsp;-- Justin</span>
                                                          <o:p></o:p></p>
                                                          <div>
                                                          <div>
                                                          <p
                                                          class="MsoNormal"
style="margin-bottom:12.0pt"><o:p>&nbsp;</o:p></p>
                                                          <div>
                                                          <p
                                                          class="MsoNormal">On
                                                          02/07/2013
                                                          11:26 AM,
                                                          Prabath
                                                          Siriwardena
                                                          wrote:<o:p></o:p></p>
                                                          </div>
                                                          <blockquote
                                                          style="margin-top:5.0pt;margin-bottom:5.0pt">
                                                          <p
                                                          class="MsoNormal">Okay..
                                                          I was thinking
                                                          this could be
                                                          used as a way
                                                          to validate
                                                          the token as
                                                          well. BTW even
                                                          in this case
                                                          shouldn't
                                                          communicate
                                                          the type of
                                                          token to AS?
                                                          For example in
                                                          the case of
                                                          SAML profile -
                                                          it could be
                                                          SAML token.. <o:p></o:p></p>
                                                          <div>
                                                          <p
                                                          class="MsoNormal"><o:p>&nbsp;</o:p></p>
                                                          </div>
                                                          <div>
                                                          <p
                                                          class="MsoNormal">Thanks
                                                          &amp; regards,<o:p></o:p></p>
                                                          </div>
                                                          <div>
                                                          <p
                                                          class="MsoNormal"
style="margin-bottom:12.0pt">-Prabath<o:p></o:p></p>
                                                          <div>
                                                          <p
                                                          class="MsoNormal">On
                                                          Thu, Feb 7,
                                                          2013 at 8:39
                                                          PM, Justin
                                                          Richer &lt;<a
moz-do-not-send="true" href="mailto:jricher@mitre.org" target="_blank">jricher@mitre.org</a>&gt;
                                                          wrote:<o:p></o:p></p>
                                                          <div>
                                                          <p
                                                          class="MsoNormal">"valid"
                                                          might not be
                                                          the best term,
                                                          but it's meant
                                                          to be a field
                                                          where the
                                                          server says
                                                          "yes this
                                                          token is still
                                                          good" or "no
                                                          this token
                                                          isn't good
                                                          anymore". We
                                                          could instead
                                                          do this with
                                                          HTTP codes or
                                                          something but
                                                          I went with a
                                                          pure JSON
                                                          response.<span
style="color:#888888"><br>
                                                          <br>
                                                          &nbsp;-- Justin</span>
                                                          <o:p></o:p></p>
                                                          <div>
                                                          <div>
                                                          <p
                                                          class="MsoNormal"
style="margin-bottom:12.0pt"><o:p>&nbsp;</o:p></p>
                                                          <div>
                                                          <p
                                                          class="MsoNormal">On
                                                          02/06/2013
                                                          10:47 PM,
                                                          Prabath
                                                          Siriwardena
                                                          wrote:<o:p></o:p></p>
                                                          </div>
                                                          <blockquote
                                                          style="margin-top:5.0pt;margin-bottom:5.0pt">
                                                          <p
                                                          class="MsoNormal">Hi
                                                          Justin, <o:p></o:p></p>
                                                          <div>
                                                          <p
                                                          class="MsoNormal"><o:p>&nbsp;</o:p></p>
                                                          </div>
                                                          <div>
                                                          <p
                                                          class="MsoNormal">I
                                                          believe this
                                                          is addressing
                                                          one of the key
                                                          missing part
                                                          in OAuth
                                                          2.0...<o:p></o:p></p>
                                                          </div>
                                                          <div>
                                                          <p
                                                          class="MsoNormal"><o:p>&nbsp;</o:p></p>
                                                          </div>
                                                          <div>
                                                          <p
                                                          class="MsoNormal">One
                                                          question - I
                                                          guess this was
                                                          discussed
                                                          already...<o:p></o:p></p>
                                                          </div>
                                                          <div>
                                                          <p
                                                          class="MsoNormal"><o:p>&nbsp;</o:p></p>
                                                          </div>
                                                          <div>
                                                          <p
                                                          class="MsoNormal">In
                                                          the spec - in
                                                          the
                                                          introspection
                                                          response it
                                                          has the
                                                          attribute
                                                          "valid" - this
                                                          is basically
                                                          the validity
                                                          of the token
                                                          provided in
                                                          the request.<o:p></o:p></p>
                                                          </div>
                                                          <div>
                                                          <p
                                                          class="MsoNormal"><o:p>&nbsp;</o:p></p>
                                                          </div>
                                                          <div>
                                                          <p
                                                          class="MsoNormal">Validation&nbsp;criteria
                                                          depends on the
                                                          token and well
                                                          as token type
                                                          ( Bearer,
                                                          MAC..).<o:p></o:p></p>
                                                          </div>
                                                          <div>
                                                          <p
                                                          class="MsoNormal"><o:p>&nbsp;</o:p></p>
                                                          </div>
                                                          <div>
                                                          <p
                                                          class="MsoNormal">In
                                                          the spec it
                                                          seems like
                                                          it's coupled
                                                          with Bearer
                                                          token type...
                                                          But I guess,
                                                          by adding
                                                          "token_type"
                                                          to the request
                                                          we can remove
                                                          this
                                                          dependency.<o:p></o:p></p>
                                                          </div>
                                                          <div>
                                                          <p
                                                          class="MsoNormal"><o:p>&nbsp;</o:p></p>
                                                          </div>
                                                          <div>
                                                          <p
                                                          class="MsoNormal">WDYT..?<o:p></o:p></p>
                                                          </div>
                                                          <div>
                                                          <p
                                                          class="MsoNormal"><o:p>&nbsp;</o:p></p>
                                                          </div>
                                                          <div>
                                                          <p
                                                          class="MsoNormal">Thanks
                                                          &amp; regards,<o:p></o:p></p>
                                                          </div>
                                                          <div>
                                                          <p
                                                          class="MsoNormal">-Prabath&nbsp;<o:p></o:p></p>
                                                          </div>
                                                          <div>
                                                          <p
                                                          class="MsoNormal"><o:p>&nbsp;</o:p></p>
                                                          <div>
                                                          <p
                                                          class="MsoNormal">On
                                                          Thu, Feb 7,
                                                          2013 at 12:54
                                                          AM, Justin
                                                          Richer &lt;<a
moz-do-not-send="true" href="mailto:jricher@mitre.org" target="_blank">jricher@mitre.org</a>&gt;
                                                          wrote:<o:p></o:p></p>
                                                          <div>
                                                          <p
                                                          class="MsoNormal">Updated
                                                          introspection
                                                          draft based on
                                                          recent
                                                          comments.
                                                          Changes
                                                          include:<br>
                                                          <br>
                                                          &nbsp;- "scope"
                                                          return
                                                          parameter now
                                                          follows
                                                          RFC6749 format
                                                          instead of
                                                          JSON array<br>
                                                          &nbsp;- "subject"
                                                          -&gt; "sub",
                                                          and "audience"
                                                          -&gt; "aud",
                                                          to be parallel
                                                          with JWT
                                                          claims<br>
                                                          &nbsp;- clarified
                                                          what happens
                                                          if the
                                                          authentication
                                                          is bad<br>
                                                          <br>
                                                          &nbsp;-- Justin<o:p></o:p></p>
                                                          <div>
                                                          <p
                                                          class="MsoNormal"><br>
                                                          <br>
                                                          --------
                                                          Original
                                                          Message
                                                          -------- <o:p></o:p></p>
                                                          <table
                                                          class="MsoNormalTable"
                                                          border="0"
                                                          cellpadding="0"
cellspacing="0">
                                                          <tbody>
                                                          <tr>
                                                          <td
                                                          style="padding:0in
                                                          0in 0in 0in"
                                                          nowrap="nowrap"
                                                          valign="top">
                                                          <p
                                                          class="MsoNormal"
style="text-align:right" align="right"><b>Subject: <o:p></o:p></b></p>
                                                          </td>
                                                          <td
                                                          style="padding:0in
                                                          0in 0in 0in">
                                                          <p
                                                          class="MsoNormal">New
                                                          Version
                                                          Notification
                                                          for
                                                          draft-richer-oauth-introspection-02.txt<o:p></o:p></p>
                                                          </td>
                                                          </tr>
                                                          <tr>
                                                          <td
                                                          style="padding:0in
                                                          0in 0in 0in"
                                                          nowrap="nowrap"
                                                          valign="top">
                                                          <p
                                                          class="MsoNormal"
style="text-align:right" align="right"><b>Date: <o:p></o:p></b></p>
                                                          </td>
                                                          <td
                                                          style="padding:0in
                                                          0in 0in 0in">
                                                          <p
                                                          class="MsoNormal">Wed,
                                                          6 Feb 2013
                                                          11:24:20 -0800<o:p></o:p></p>
                                                          </td>
                                                          </tr>
                                                          <tr>
                                                          <td
                                                          style="padding:0in
                                                          0in 0in 0in"
                                                          nowrap="nowrap"
                                                          valign="top">
                                                          <p
                                                          class="MsoNormal"
style="text-align:right" align="right"><b>From: <o:p></o:p></b></p>
                                                          </td>
                                                          <td
                                                          style="padding:0in
                                                          0in 0in 0in">
                                                          <p
                                                          class="MsoNormal"><a
moz-do-not-send="true" href="mailto:internet-drafts@ietf.org"
                                                          target="_blank">&lt;internet-drafts@ietf.org&gt;</a><o:p></o:p></p>
                                                          </td>
                                                          </tr>
                                                          <tr>
                                                          <td
                                                          style="padding:0in
                                                          0in 0in 0in"
                                                          nowrap="nowrap"
                                                          valign="top">
                                                          <p
                                                          class="MsoNormal"
style="text-align:right" align="right"><b>To: <o:p></o:p></b></p>
                                                          </td>
                                                          <td
                                                          style="padding:0in
                                                          0in 0in 0in">
                                                          <p
                                                          class="MsoNormal"><a
moz-do-not-send="true" href="mailto:jricher@mitre.org" target="_blank">&lt;jricher@mitre.org&gt;</a><o:p></o:p></p>
                                                          </td>
                                                          </tr>
                                                          </tbody>
                                                          </table>
                                                          <p
                                                          class="MsoNormal"
style="margin-bottom:12.0pt"><o:p>&nbsp;</o:p></p>
                                                          <pre>A new version of I-D, draft-richer-oauth-introspection-02.txt<o:p></o:p></pre>
                                                          <pre>has been successfully submitted by Justin Richer and posted to the<o:p></o:p></pre>
                                                          <pre>IETF repository.<o:p></o:p></pre>
                                                          <pre><o:p>&nbsp;</o:p></pre>
                                                          <pre>Filename:&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;  draft-richer-oauth-introspection<o:p></o:p></pre>
                                                          <pre>Revision:&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;  02<o:p></o:p></pre>
                                                          <pre>Title:&nbsp;&nbsp;&nbsp;&nbsp;&nbsp; &nbsp;&nbsp;&nbsp;&nbsp;&nbsp;  OAuth Token Introspection<o:p></o:p></pre>
                                                          <pre>Creation date:&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;  2013-02-06<o:p></o:p></pre>
                                                          <pre>WG ID:&nbsp;&nbsp;&nbsp;&nbsp;&nbsp; &nbsp;&nbsp;&nbsp;&nbsp;&nbsp;  Individual Submission<o:p></o:p></pre>
                                                          <pre>Number of pages: 6<o:p></o:p></pre>
                                                          <pre>URL:&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp; &nbsp;<a moz-do-not-send="true" href="http://www.ietf.org/internet-drafts/draft-richer-oauth-introspection-02.txt" target="_blank">http://www.ietf.org/internet-drafts/draft-richer-oauth-introspection-02.txt</a><o:p></o:p></pre>
                                                          <pre>Status:&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp; &nbsp;<a moz-do-not-send="true" href="http://datatracker.ietf.org/doc/draft-richer-oauth-introspection" target="_blank">http://datatracker.ietf.org/doc/draft-richer-oauth-introspection</a><o:p></o:p></pre>
                                                          <pre>Htmlized:&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp; &nbsp;<a moz-do-not-send="true" href="http://tools.ietf.org/html/draft-richer-oauth-introspection-02" target="_blank">http://tools.ietf.org/html/draft-richer-oauth-introspection-02</a><o:p></o:p></pre>
                                                          <pre>Diff:&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp; &nbsp;<a moz-do-not-send="true" href="http://www.ietf.org/rfcdiff?url2=draft-richer-oauth-introspection-02" target="_blank">http://www.ietf.org/rfcdiff?url2=draft-richer-oauth-introspection-02</a><o:p></o:p></pre>
                                                          <pre><o:p>&nbsp;</o:p></pre>
                                                          <pre>Abstract:<o:p></o:p></pre>
                                                          <pre>&nbsp;&nbsp; This specification defines a method for a client or protected<o:p></o:p></pre>
                                                          <pre>&nbsp;&nbsp; resource to query an OAuth authorization server to determine meta-<o:p></o:p></pre>
                                                          <pre>&nbsp;&nbsp; information about an OAuth token.<o:p></o:p></pre>
                                                          <pre><o:p>&nbsp;</o:p></pre>
                                                          <pre><o:p>&nbsp;</o:p></pre>
                                                          <pre>&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp; <o:p></o:p></pre>
                                                          <pre><o:p>&nbsp;</o:p></pre>
                                                          <pre><o:p>&nbsp;</o:p></pre>
                                                          <pre>The IETF Secretariat<o:p></o:p></pre>
                                                          <pre><o:p>&nbsp;</o:p></pre>
                                                          <p
                                                          class="MsoNormal"><o:p>&nbsp;</o:p></p>
                                                          </div>
                                                          <p
                                                          class="MsoNormal"><o:p>&nbsp;</o:p></p>
                                                          </div>
                                                          <p
                                                          class="MsoNormal"
style="margin-bottom:12.0pt"><br>
_______________________________________________<br>
                                                          OAuth mailing
                                                          list<br>
                                                          <a
                                                          moz-do-not-send="true"
href="mailto:OAuth@ietf.org" target="_blank">OAuth@ietf.org</a><br>
                                                          <a
                                                          moz-do-not-send="true"
href="https://www.ietf.org/mailman/listinfo/oauth" target="_blank">https://www.ietf.org/mailman/listinfo/oauth</a><o:p></o:p></p>
                                                          </div>
                                                          <p
                                                          class="MsoNormal"><br>
                                                          <br
                                                          clear="all">
                                                          <o:p></o:p></p>
                                                          <div>
                                                          <p
                                                          class="MsoNormal"><o:p>&nbsp;</o:p></p>
                                                          </div>
                                                          <p
                                                          class="MsoNormal">--
                                                          <br>
                                                          Thanks &amp;
                                                          Regards,<br>
                                                          Prabath <o:p></o:p></p>
                                                          <div>
                                                          <p
                                                          class="MsoNormal"><o:p>&nbsp;</o:p></p>
                                                          </div>
                                                          <div>
                                                          <p
                                                          class="MsoNormal">Mobile
                                                          : <a
                                                          moz-do-not-send="true"
href="tel:%2B94%2071%20809%206732" target="_blank">+94 71 809 6732</a>&nbsp;<br>
                                                          <br>
                                                          <a
                                                          moz-do-not-send="true"
href="http://blog.facilelogin.com" target="_blank">http://blog.facilelogin.com</a><br>
                                                          <a
                                                          moz-do-not-send="true"
href="http://RampartFAQ.com" target="_blank">http://RampartFAQ.com</a><o:p></o:p></p>
                                                          </div>
                                                          </div>
                                                          </blockquote>
                                                          <p
                                                          class="MsoNormal"><o:p>&nbsp;</o:p></p>
                                                          </div>
                                                          </div>
                                                          </div>
                                                          </div>
                                                          <p
                                                          class="MsoNormal"><br>
                                                          <br
                                                          clear="all">
                                                          <o:p></o:p></p>
                                                          <div>
                                                          <p
                                                          class="MsoNormal"><o:p>&nbsp;</o:p></p>
                                                          </div>
                                                          <p
                                                          class="MsoNormal">--
                                                          <br>
                                                          Thanks &amp;
                                                          Regards,<br>
                                                          Prabath <o:p></o:p></p>
                                                          <div>
                                                          <p
                                                          class="MsoNormal"><o:p>&nbsp;</o:p></p>
                                                          </div>
                                                          <div>
                                                          <p
                                                          class="MsoNormal">Mobile
                                                          : <a
                                                          moz-do-not-send="true"
href="tel:%2B94%2071%20809%206732" target="_blank">+94 71 809 6732</a>&nbsp;<br>
                                                          <br>
                                                          <a
                                                          moz-do-not-send="true"
href="http://blog.facilelogin.com" target="_blank">http://blog.facilelogin.com</a><br>
                                                          <a
                                                          moz-do-not-send="true"
href="http://RampartFAQ.com" target="_blank">http://RampartFAQ.com</a><o:p></o:p></p>
                                                          </div>
                                                          </div>
                                                          </blockquote>
                                                          <p
                                                          class="MsoNormal"><o:p>&nbsp;</o:p></p>
                                                          </div>
                                                          </div>
                                                          </div>
                                                          </div>
                                                          <p
                                                          class="MsoNormal"><br>
                                                          <br
                                                          clear="all">
                                                          <o:p></o:p></p>
                                                          <div>
                                                          <p
                                                          class="MsoNormal"><o:p>&nbsp;</o:p></p>
                                                          </div>
                                                          <p
                                                          class="MsoNormal">--
                                                          <br>
                                                          Thanks &amp;
                                                          Regards,<br>
                                                          Prabath <o:p></o:p></p>
                                                          <div>
                                                          <p
                                                          class="MsoNormal"><o:p>&nbsp;</o:p></p>
                                                          </div>
                                                          <div>
                                                          <p
                                                          class="MsoNormal">Mobile
                                                          : <a
                                                          moz-do-not-send="true"
href="tel:%2B94%2071%20809%206732" target="_blank">+94 71 809 6732</a>&nbsp;<br>
                                                          <br>
                                                          <a
                                                          moz-do-not-send="true"
href="http://blog.facilelogin.com" target="_blank">http://blog.facilelogin.com</a><br>
                                                          <a
                                                          moz-do-not-send="true"
href="http://RampartFAQ.com" target="_blank">http://RampartFAQ.com</a><o:p></o:p></p>
                                                          </div>
                                                          </div>
                                                          <p
                                                          class="MsoNormal"><o:p>&nbsp;</o:p></p>
                                                          </div>
                                                          </div>
                                                          </div>
                                                          </div>
                                                          <p
                                                          class="MsoNormal"><br>
                                                          <br
                                                          clear="all">
                                                          <o:p></o:p></p>
                                                          <div>
                                                          <p
                                                          class="MsoNormal"><o:p>&nbsp;</o:p></p>
                                                          </div>
                                                          <p
                                                          class="MsoNormal">--
                                                          <br>
                                                          Thanks &amp;
                                                          Regards,<br>
                                                          Prabath <o:p></o:p></p>
                                                          <div>
                                                          <p
                                                          class="MsoNormal"><o:p>&nbsp;</o:p></p>
                                                          </div>
                                                          <div>
                                                          <p
                                                          class="MsoNormal">Mobile
                                                          : <a
                                                          moz-do-not-send="true"
href="tel:%2B94%2071%20809%206732" target="_blank">+94 71 809 6732</a>&nbsp;<br>
                                                          <br>
                                                          <a
                                                          moz-do-not-send="true"
href="http://blog.facilelogin.com" target="_blank">http://blog.facilelogin.com</a><br>
                                                          <a
                                                          moz-do-not-send="true"
href="http://RampartFAQ.com" target="_blank">http://RampartFAQ.com</a><o:p></o:p></p>
                                                          </div>
                                                          </div>
                                                          </div>
                                                          </blockquote>
                                                          <blockquote
                                                          style="margin-top:5.0pt;margin-bottom:5.0pt">
                                                          <div>
                                                          <p
                                                          class="MsoNormal">_______________________________________________<br>
                                                          OAuth mailing
                                                          list<br>
                                                          <a
                                                          moz-do-not-send="true"
href="mailto:OAuth@ietf.org" target="_blank">OAuth@ietf.org</a><br>
                                                          <a
                                                          moz-do-not-send="true"
href="https://www.ietf.org/mailman/listinfo/oauth" target="_blank">https://www.ietf.org/mailman/listinfo/oauth</a><o:p></o:p></p>
                                                          </div>
                                                          </blockquote>
                                                          </blockquote>
                                                          <p
                                                          class="MsoNormal"><o:p>&nbsp;</o:p></p>
                                                          </div>
                                                          </div>
                                                          </div>
                                                          </div>
                                                          <p
                                                          class="MsoNormal"><br>
                                                          <br
                                                          clear="all">
                                                          <o:p></o:p></p>
                                                          <div>
                                                          <p
                                                          class="MsoNormal"><o:p>&nbsp;</o:p></p>
                                                          </div>
                                                          <p
                                                          class="MsoNormal">--
                                                          <br>
                                                          Thanks &amp;
                                                          Regards,<br>
                                                          Prabath <o:p></o:p></p>
                                                          <div>
                                                          <p
                                                          class="MsoNormal"><o:p>&nbsp;</o:p></p>
                                                          </div>
                                                          <div>
                                                          <p
                                                          class="MsoNormal">Mobile
                                                          : <a
                                                          moz-do-not-send="true"
href="tel:%2B94%2071%20809%206732" target="_blank">+94 71 809 6732</a>&nbsp;<br>
                                                          <br>
                                                          <a
                                                          moz-do-not-send="true"
href="http://blog.facilelogin.com" target="_blank">http://blog.facilelogin.com</a><br>
                                                          <a
                                                          moz-do-not-send="true"
href="http://RampartFAQ.com" target="_blank">http://RampartFAQ.com</a><o:p></o:p></p>
                                                          </div>
                                                          </div>
                                                          </div>
                                                          </div>
                                                          </div>
                                                          <p
                                                          class="MsoNormal"><br>
                                                          <br
                                                          clear="all">
                                                          <o:p></o:p></p>
                                                          <div>
                                                          <p
                                                          class="MsoNormal"><o:p>&nbsp;</o:p></p>
                                                          </div>
                                                          <p
                                                          class="MsoNormal">--
                                                          <br>
                                                          Thanks &amp;
                                                          Regards,<br>
                                                          Prabath <o:p></o:p></p>
                                                          <div>
                                                          <p
                                                          class="MsoNormal"><o:p>&nbsp;</o:p></p>
                                                          </div>
                                                          <div>
                                                          <p
                                                          class="MsoNormal">Mobile
                                                          : <a
                                                          moz-do-not-send="true"
href="tel:%2B94%2071%20809%206732" target="_blank">+94 71 809 6732</a>&nbsp;<br>
                                                          <br>
                                                          <a
                                                          moz-do-not-send="true"
href="http://blog.facilelogin.com" target="_blank">http://blog.facilelogin.com</a><br>
                                                          <a
                                                          moz-do-not-send="true"
href="http://RampartFAQ.com" target="_blank">http://RampartFAQ.com</a><o:p></o:p></p>
                                                          </div>
                                                          </div>
                                                          </blockquote>
                                                          <p
                                                          class="MsoNormal"><o:p>&nbsp;</o:p></p>
                                                          </div>
                                                          </div>
                                                        </div>
                                                      </div>
                                                      <p
                                                        class="MsoNormal"><br>
                                                        <br clear="all">
                                                        <o:p></o:p></p>
                                                      <div>
                                                        <p
                                                          class="MsoNormal"><o:p>&nbsp;</o:p></p>
                                                      </div>
                                                      <p
                                                        class="MsoNormal">--
                                                        <br>
                                                        Thanks &amp;
                                                        Regards,<br>
                                                        Prabath <o:p></o:p></p>
                                                      <div>
                                                        <p
                                                          class="MsoNormal"><o:p>&nbsp;</o:p></p>
                                                      </div>
                                                      <div>
                                                        <p
                                                          class="MsoNormal">Mobile
                                                          : <a
                                                          moz-do-not-send="true"
href="tel:%2B94%2071%20809%206732" target="_blank">+94 71 809 6732</a>&nbsp;<br>
                                                          <br>
                                                          <a
                                                          moz-do-not-send="true"
href="http://blog.facilelogin.com" target="_blank">http://blog.facilelogin.com</a><br>
                                                          <a
                                                          moz-do-not-send="true"
href="http://RampartFAQ.com" target="_blank">http://RampartFAQ.com</a><o:p></o:p></p>
                                                      </div>
                                                    </div>
                                                  </div>
                                                </div>
                                              </div>
                                              <p class="MsoNormal"><br>
                                                <br clear="all">
                                                <o:p></o:p></p>
                                              <div>
                                                <p class="MsoNormal"><o:p>&nbsp;</o:p></p>
                                              </div>
                                              <p class="MsoNormal">-- <br>
                                                Thanks &amp; Regards,<br>
                                                Prabath <o:p></o:p></p>
                                              <div>
                                                <p class="MsoNormal"><o:p>&nbsp;</o:p></p>
                                              </div>
                                              <div>
                                                <p class="MsoNormal">Mobile
                                                  : <a
                                                    moz-do-not-send="true"
href="tel:%2B94%2071%20809%206732" target="_blank">+94 71 809 6732</a>&nbsp;<br>
                                                  <br>
                                                  <a
                                                    moz-do-not-send="true"
href="http://blog.facilelogin.com" target="_blank">http://blog.facilelogin.com</a><br>
                                                  <a
                                                    moz-do-not-send="true"
href="http://RampartFAQ.com" target="_blank">http://RampartFAQ.com</a><o:p></o:p></p>
                                              </div>
                                            </div>
                                          </blockquote>
                                          <p class="MsoNormal"><o:p>&nbsp;</o:p></p>
                                        </div>
                                      </div>
                                    </div>
                                  </div>
                                  <p class="MsoNormal"><br>
                                    <br clear="all">
                                    <o:p></o:p></p>
                                  <div>
                                    <p class="MsoNormal"><o:p>&nbsp;</o:p></p>
                                  </div>
                                  <p class="MsoNormal">-- <br>
                                    Thanks &amp; Regards,<br>
                                    Prabath <o:p></o:p></p>
                                  <div>
                                    <p class="MsoNormal"><o:p>&nbsp;</o:p></p>
                                  </div>
                                  <div>
                                    <p class="MsoNormal">Mobile : <a
                                        moz-do-not-send="true"
                                        href="tel:%2B94%2071%20809%206732"
                                        target="_blank">+94 71 809 6732</a>&nbsp;<br>
                                      <br>
                                      <a moz-do-not-send="true"
                                        href="http://blog.facilelogin.com"
                                        target="_blank">http://blog.facilelogin.com</a><br>
                                      <a moz-do-not-send="true"
                                        href="http://RampartFAQ.com"
                                        target="_blank">http://RampartFAQ.com</a><o:p></o:p></p>
                                  </div>
                                </div>
                              </blockquote>
                              <p class="MsoNormal"><o:p>&nbsp;</o:p></p>
                            </div>
                          </div>
                        </div>
                      </div>
                      <p class="MsoNormal"><br>
                        <br clear="all">
                        <o:p></o:p></p>
                      <div>
                        <p class="MsoNormal"><o:p>&nbsp;</o:p></p>
                      </div>
                      <p class="MsoNormal">-- <br>
                        Thanks &amp; Regards,<br>
                        Prabath <o:p></o:p></p>
                      <div>
                        <p class="MsoNormal"><o:p>&nbsp;</o:p></p>
                      </div>
                      <div>
                        <p class="MsoNormal">Mobile : <a
                            moz-do-not-send="true"
                            href="tel:%2B94%2071%20809%206732"
                            target="_blank">+94 71 809 6732</a>&nbsp;<br>
                          <br>
                          <a moz-do-not-send="true"
                            href="http://blog.facilelogin.com"
                            target="_blank">http://blog.facilelogin.com</a><br>
                          <a moz-do-not-send="true"
                            href="http://RampartFAQ.com" target="_blank">http://RampartFAQ.com</a><o:p></o:p></p>
                      </div>
                    </div>
                    <p class="MsoNormal"><o:p>&nbsp;</o:p></p>
                  </div>
                </div>
              </div>
            </div>
            <p class="MsoNormal"><br>
              <br clear="all">
              <o:p></o:p></p>
            <div>
              <p class="MsoNormal"><o:p>&nbsp;</o:p></p>
            </div>
            <p class="MsoNormal">-- <br>
              Thanks &amp; Regards,<br>
              Prabath <o:p></o:p></p>
            <div>
              <p class="MsoNormal"><o:p>&nbsp;</o:p></p>
            </div>
            <div>
              <p class="MsoNormal">Mobile : +94 71 809 6732&nbsp;<br>
                <br>
                <a moz-do-not-send="true"
                  href="http://blog.facilelogin.com" target="_blank">http://blog.facilelogin.com</a><br>
                <a moz-do-not-send="true" href="http://RampartFAQ.com"
                  target="_blank">http://RampartFAQ.com</a><o:p></o:p></p>
            </div>
          </div>
        </blockquote>
        <p class="MsoNormal"><o:p>&nbsp;</o:p></p>
      </div>
    </blockquote>
    <br>
  </body>
</html>

--------------040709040705020505060806--

From prabath@wso2.com  Thu Feb 14 13:33:31 2013
Return-Path: <prabath@wso2.com>
X-Original-To: oauth@ietfa.amsl.com
Delivered-To: oauth@ietfa.amsl.com
Received: from localhost (localhost [127.0.0.1]) by ietfa.amsl.com (Postfix) with ESMTP id 2B17421F866F for <oauth@ietfa.amsl.com>; Thu, 14 Feb 2013 13:33:31 -0800 (PST)
X-Virus-Scanned: amavisd-new at amsl.com
X-Spam-Flag: NO
X-Spam-Score: -2.894
X-Spam-Level: 
X-Spam-Status: No, score=-2.894 tagged_above=-999 required=5 tests=[AWL=0.082,  BAYES_00=-2.599, FM_FORGED_GMAIL=0.622, HTML_MESSAGE=0.001, RCVD_IN_DNSWL_LOW=-1]
Received: from mail.ietf.org ([64.170.98.30]) by localhost (ietfa.amsl.com [127.0.0.1]) (amavisd-new, port 10024) with ESMTP id LNFhYpg6vdnZ for <oauth@ietfa.amsl.com>; Thu, 14 Feb 2013 13:33:28 -0800 (PST)
Received: from mail-ee0-f52.google.com (mail-ee0-f52.google.com [74.125.83.52]) by ietfa.amsl.com (Postfix) with ESMTP id 259D321F8654 for <oauth@ietf.org>; Thu, 14 Feb 2013 13:33:26 -0800 (PST)
Received: by mail-ee0-f52.google.com with SMTP id b15so1356358eek.39 for <oauth@ietf.org>; Thu, 14 Feb 2013 13:33:26 -0800 (PST)
X-Google-DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=google.com; s=20120113; h=mime-version:x-received:in-reply-to:references:date:message-id :subject:from:to:cc:content-type:x-gm-message-state; bh=r+ERsgxzTu8h9lsFxhRiO2sQgTbpymDNz5J0gvwiOWg=; b=cYRjO6iDxIwS9kBLzKpAk+TnMy1pL3CObGrJYFaTSt5JjyABSOAM191tE7GFOLG8KB +/WFJmO8AaVFQ+Lpl8KZ7gCdsfcbByroSytSFjfO5GnaBJr5ViC6FIXJIs100lP3dL5T L3kHEkHXow7XBRpjlWf8Wf5t2HbCAwxkstKFKBAMORUNuo/HPEFMDBZ2OgrITgAIIv/O 4myn0GpnTw+WaG44i2blTZOQg5Obq4MInfunWTdPPnplKHad1aMK2AGjX5w2qU/n+CSz GtBzwOFKvoeif3HQ1731GCo31JVmEJYpKMsziJfqjT4YYA/bUtFV/en/ITk8GxZwHNMx IxAA==
MIME-Version: 1.0
X-Received: by 10.14.194.198 with SMTP id m46mr699345een.8.1360877594287; Thu, 14 Feb 2013 13:33:14 -0800 (PST)
Received: by 10.223.37.77 with HTTP; Thu, 14 Feb 2013 13:33:13 -0800 (PST)
In-Reply-To: <511D55C5.4080503@mitre.org>
References: <20130206192420.32698.21027.idtracker@ietfa.amsl.com> <CAJV9qO_gM1oera9ae9sqh9n17e-ZLKuC2pmsZwhq-RmFcMyqHA@mail.gmail.com> <51196777.6000502@mitre.org> <CAJV9qO-5bWZbNUfCmaqYBQoy-qwNaSZFOsO9GL3CrbSejwVTzw@mail.gmail.com> <F6595A40-6B4E-4718-ABB5-694CA975C4DB@maymount.com> <511A5062.5010108@mitre.org> <CAJV9qO_Mr87NX=KZRqCsWasQ1FuvDNBw14eS-TcPf_KRJztQFg@mail.gmail.com> <CAJV9qO-71-sM6kXOB6Fb_bvVkDBQ5JBbs8E5X=f-K=iEmGezRA@mail.gmail.com> <511CEEAA.3030801@mitre.org> <CAJV9qO-JSXgSTkw2_pdH0D-o-xDWGDqxx=PAWYtnTj4hOQXW4Q@mail.gmail.com> <CAJV9qO9=+kiO-s7vH_ewr7XjfVdDU24F0kuif504bP53dBr1TA@mail.gmail.com> <511CF3EF.8040008@mitre.org> <CAJV9qO8yKkrsV7d9JtDmbLY-fb5phh=ssKbEUuutkY53PgY8Vg@mail.gmail.com> <511CF4AB.5010700@mitre.org> <CAJV9qO9VmjSQnWKU3kF11x35ut=AsvQ8bjuz_CKpyCScGRiA2Q@mail.gmail.com> <511CF8C5.70301@mitre.org> <CAJV9qO_-kFsWxoJwTP_RWFrb6+3frg-36JocQoo8SrpyNBMSoA@mail.gmail.com> <511D0DC3.7000607@mitre.org> <00ef01ce0af8$ed591ad0$c80b5070$@reminetworks.com> <511D55C5.4080503@mitre.org>
Date: Fri, 15 Feb 2013 03:03:13 +0530
Message-ID: <CAJV9qO-sGDwQ9Lr_74K0H3-fEFwXe4P_TRLDDX+0xRjhjJR9ww@mail.gmail.com>
From: Prabath Siriwardena <prabath@wso2.com>
To: Justin Richer <jricher@mitre.org>
Content-Type: multipart/alternative; boundary=047d7b343a9e971d2f04d5b601ea
X-Gm-Message-State: ALoCoQlEH4AvdBHEhQ2DtkpkfKbul6y9IEvoaaErrxdyHJVyfDelG4jD3tVJeDPmMU6vB+8TVddn
Cc: Donald F Coffin <donald.coffin@reminetworks.com>, oauth@ietf.org
Subject: Re: [OAUTH-WG] Fwd: New Version Notification for draft-richer-oauth-introspection-02.txt
X-BeenThere: oauth@ietf.org
X-Mailman-Version: 2.1.12
Precedence: list
List-Id: OAUTH WG <oauth.ietf.org>
List-Unsubscribe: <https://www.ietf.org/mailman/options/oauth>, <mailto:oauth-request@ietf.org?subject=unsubscribe>
List-Archive: <http://www.ietf.org/mail-archive/web/oauth>
List-Post: <mailto:oauth@ietf.org>
List-Help: <mailto:oauth-request@ietf.org?subject=help>
List-Subscribe: <https://www.ietf.org/mailman/listinfo/oauth>, <mailto:oauth-request@ietf.org?subject=subscribe>
X-List-Received-Date: Thu, 14 Feb 2013 21:33:31 -0000

--047d7b343a9e971d2f04d5b601ea
Content-Type: text/plain; charset=windows-1252
Content-Transfer-Encoding: quoted-printable

+1 for active.

Thanks & regards,
-Prabath

On Fri, Feb 15, 2013 at 2:53 AM, Justin Richer <jricher@mitre.org> wrote:

>  That could work for me. Anyone else?
>
>  -- Justin
>
> On 02/14/2013 04:19 PM, Donald F Coffin wrote:
>
>  Does the term =93Active=94 help clarify the meaning but still confirm to
> your intention, Justin?****
>
> ** **
>
> Best regards,****
>
> Don****
>
> Donald F. Coffin****
>
> Founder/CTO****
>
> ** **
>
> REMI Networks****
>
> 22751 El Prado Suite 6216****
>
> Rancho Santa Margarita, CA  92688-3836****
>
> ** **
>
> Phone:      (949) 636-8571****
>
> Email:       donald.coffin@reminetworks.com****
>
> ** **
>
> *From:* Justin Richer [mailto:jricher@mitre.org <jricher@mitre.org>]
> *Sent:* Thursday, February 14, 2013 8:16 AM
> *To:* Prabath Siriwardena
> *Cc:* oauth@ietf.org
> *Subject:* Re: [OAUTH-WG] Fwd: New Version Notification for
> draft-richer-oauth-introspection-02.txt****
>
> ** **
>
> That much I can at least do. I'd be happy with another term if there was =
a
> good one we could drop in its place without changing the intended semanti=
cs.
>
>  -- Justin****
>
> On 02/14/2013 10:57 AM, Prabath Siriwardena wrote:****
>
> Not quite convinced :-) Valid has a meaning attached to that.. ****
>
> ** **
>
> In case we are going ahead with this please define it clearly in the draf=
t
> - with the one you shared in this thread.****
>
> ** **
>
> Thanks & regards,****
>
> -Prabath****
>
> On Thu, Feb 14, 2013 at 8:16 PM, Justin Richer <jricher@mitre.org> wrote:=
*
> ***
>
> ** **
>
> On 02/14/2013 09:37 AM, Prabath Siriwardena wrote:****
>
>  The definition of valid is bit ambiguous in the draft...****
>
> ** **
>
> Okay.. If that is the definition... and if we beak that in to parts...***=
*
>
> ** **
>
> "it hasn't expired" : In the response it self we have parameter for
> issued_at and and expires_at - so whether the token is not expired or not
> can even be derived at the requestor's end.****
>
> ** **
>
> If the token isn't good anymore, it doesn't matter when it was issued or
> when it was expired, just that it has. ****
>
>
>
>
> ****
>
> ** **
>
> "token was issued from here" : For this IMO we need to send an error code=
.
> Requestor has picked the wrong AS.****
>
> We don't know if it came from another AS or if someone's just making
> things up. Either way it's not a good token. ****
>
>
>
>
> ****
>
> ** **
>
> The remaining is  "revoked".. That is why I proposed earlier - we better
> have an attribute "revoked" - instead of "valid" in the response..****
>
> ** **
>
> The end result of all three is the same: either the token is good, or it
> isn't. I think it's much simpler and more useful to leave it at that.
>
>  -- Justin ****
>
>
>
>
> ****
>
> ** **
>
> WDYT...?****
>
> ** **
>
> Thanks & regards,****
>
> -Prabath****
>
> ** **
>
> ** **
>
> On Thu, Feb 14, 2013 at 7:58 PM, Justin Richer <jricher@mitre.org> wrote:=
*
> ***
>
> Because it will be the one that issued the token in the first place.
>
> Validity means "token was issued from here, it hasn't been revoked, it
> hasn't expired".
>
>  -- Justin ****
>
> ** **
>
> On 02/14/2013 09:28 AM, Prabath Siriwardena wrote:****
>
> Okay. With out knowing the type of the token how can the AS validate the
> token ? What is meant by the validity there? ****
>
> ** **
>
> Thanks & regards,****
>
> -Prabath****
>
> On Thu, Feb 14, 2013 at 7:55 PM, Justin Richer <jricher@mitre.org> wrote:=
*
> ***
>
> OK, I don't see the utility in that at all. What would it accomplish?
>
>  -- Justin ****
>
> ** **
>
> On 02/14/2013 09:25 AM, Prabath Siriwardena wrote:****
>
> To make it clear - my suggestion is to add token_type_hint to the
> introspection request. It can be from client to AS or from RS to AS. ****
>
> ** **
>
> Then AS can decide whether the provided token is valid or not and include
> "valid" attribute in the introspection response.****
>
> ** **
>
> Thanks & regards,****
>
> -Prabath****
>
> On Thu, Feb 14, 2013 at 7:52 PM, Prabath Siriwardena <prabath@wso2.com>
> wrote:****
>
> Both the client and the resource owner should be aware of the token type.
> ****
>
> ** **
>
> My argument is, if the authorization server to decide whether the token i=
s
> valid or not ( irrespective of who asked the question) - AS needs to know
> the token type - because to validate a token AS should know the token typ=
e.
> ****
>
> ** **
>
> The token type could be, bearer or MAC or any other token type.****
>
> ** **
>
> Thanks & regards,****
>
> -Prabath ****
>
> ** **
>
> On Thu, Feb 14, 2013 at 7:33 PM, Justin Richer <jricher@mitre.org> wrote:=
*
> ***
>
> What exactly are you suggesting be added to introspection? The
> "token_type_hint" is from the client to the server, but what you've asked
> for in terms of "token type" is from the server to the client. And there
> was never an answer to what exactly is meant by "token type" in this case=
,
> particularly because you seem to want to call out things like SAML and
> Bearer as separate types.
>
>  -- Justin ****
>
>
>
> ****
>
> On 02/14/2013 06:59 AM, Prabath Siriwardena wrote:****
>
> I noticed that the latest Token Revocation draft [1] has introduced the
> parameter "token_type_hint". I would suggest the same here, as that would
> make what is meant by "valid" much clear.. ****
>
> ** **
>
> [1]: http://tools.ietf.org/html/draft-ietf-oauth-revocation-05****
>
> ** **
>
> Thanks & regards,****
>
> -Prabath****
>
> On Tue, Feb 12, 2013 at 9:35 PM, Prabath Siriwardena <prabath@wso2.com>
> wrote:****
>
> Hi Justin, ****
>
> ** **
>
> I doubt whether valid_token would make a difference..?****
>
> ** **
>
> My initial argument is what is the validation criteria..? Validation
> criteria depends on the token_type..****
>
> ** **
>
> If we are talking only about metadata - then I believe "revoked",
> "expired" would be more meaningful..****
>
> ** **
>
> Thanks & regards,****
>
> -Prabath ****
>
> ** **
>
> On Tue, Feb 12, 2013 at 7:53 PM, Justin Richer <jricher@mitre.org> wrote:=
*
> ***
>
> OK, I can see the wisdom in changing this term.
>
> I picked "valid" because I wanted a simple "boolean" value that would
> require no additional parsing or string-matching on the client's behalf,
> and I'd like to stick with that. OAuth is built with the assumption that
> clients need to be able to recover from invalid tokens at any stage, so I
> think a simple yes/no is the right step here.
>
> That said, I think you're both right that "valid" seems to have caused a
> bit of confusion. I don't want to go with "revoked" because I'd rather ha=
ve
> the "token is OK" be the positive boolean value.
>
> Would "valid_token" be more clear? Or do we need a different adjective al=
l
> together?
>
>  -- Justin ****
>
> ** **
>
> On 02/11/2013 08:02 PM, Richard Harrington wrote:****
>
>  Have you considered "status" instead of "valid"?  It could have values
> like "active", "expired", and "revoked".****
>
> ** **
>
> Is it worthwhile including the status of the client also?  For example, a
> client application could be disabled, temporarily or permanently, and thu=
s
> disabling its access tokens as well.****
>
> ** **
>
>
> On Feb 11, 2013, at 1:56 PM, Prabath Siriwardena <prabath@wso2.com> wrote=
:
> ****
>
>  I guess confusion is with 'valid' parameter is in the response.. ****
>
> ** **
>
> I thought this will be helpful to standardize the communication between
> Resource Server and the Authorization Server..****
>
> ** **
>
> I would suggest we completely remove "valid" from the response - or defin=
e
> it much clearly..****
>
> ** **
>
> May be can add "revoked" with a boolean attribute..****
>
> ** **
>
> Thanks & regards,****
>
> -Prabath****
>
> On Tue, Feb 12, 2013 at 3:19 AM, Justin Richer <jricher@mitre.org> wrote:=
*
> ***
>
> ** **
>
> On 02/08/2013 12:51 AM, Prabath Siriwardena wrote:****
>
> Hi Justin, ****
>
> ** **
>
> I have couple of questions related to "valid" parameter...****
>
> ** **
>
> This endpoint can be invoked by the Resource Server in runtime...****
>
>
> That's correct. ****
>
>
>
>
> ****
>
> ** **
>
> In that case what is exactly meant by the "resource_id" in request ?****
>
> ** **
>
> The resource_id field is a service-specific string that basically lets th=
e
> resource server provide some context to the request to the auth server.
> There have been some other suggestions like client IP address, but I want=
ed
> to put this one in because it seemed to be a common theme. The client is
> trying to do *something* with the token, after all, and the rights,
> permissions, and metadata associated with the token could change based on
> that. Since the Introspection endpoint is all about getting that metadata
> back to the PR, this seemed like a good idea. ****
>
>
>
>
> ****
>
> ** **
>
> IMO a token to be valid depends on set of criteria based on it's type..**=
*
> *
>
> ** **
>
> For a Bearer token..****
>
> ** **
>
> 1. Token should not be expired****
>
> 2. Token should not be revoked.****
>
> 3. The scope the token issued should match with the scope required for th=
e
> resource.****
>
> ** **
>
> For a MAC token...****
>
> ** **
>
> 1. Token not expired (mac id)****
>
> 2. Token should not be revoked****
>
> 3. The scope the token issued should match with the scope required for th=
e
> resource.****
>
> 4. HMAC check should be valid****
>
> ** **
>
> There are similar conditions for SAML bearer too..****
>
> ** **
>
> This isn't really true. The SAML bearer token is fully self-contained and
> doesn't change based on other parameters in the message, unlike MAC. Same
> with JWT. When it hands a SAML or JWT token to the AS, the PR has given
> *everything* the server needs to check that token's validity and use.
>
> MAC signatures change with every message, and they're done across several
> components of the HTTP message. Therefor, the HMAC check for MAC style
> tokens will still need to be done by the protected resource. Introspectio=
n
> would help in the case that the signature validated just fine, but the
> token might have expired. Or you need to know what scopes apply.
> Introspection isn't to fully validate the call to the protected resource =
--
> if that were the case, the PR would have to send some kind of encapsulate=
d
> version of the original request. Otherwise, the AS won't have all of the
> information it needs to check the MAC.
>
>
> I think what you're describing is ultimately *not* what the introspection
> endpoint is intended to do. If that's unclear from the document, can you
> please suggest text that would help clear the use case up? I wouldn't wan=
t
> it to be ambiguous.
>
>  -- Justin ****
>
>
>
>
> ****
>
> ** **
>
> Thanks & regards,****
>
> -Prabath****
>
> ** **
>
> ** **
>
> On Thu, Feb 7, 2013 at 10:30 PM, Justin Richer <jricher@mitre.org> wrote:=
*
> ***
>
> It validates the token, which would be either the token itself in the cas=
e
> of Bearer or the token "id" part of something more complex like MAC. It
> doesn't directly validate the usage of the token, that's still up to the =
PR
> to do that.
>
> I nearly added a "token type" field in this draft, but held back because
> there are several kinds of "token type" that people talk about in OAuth.
> First, there's "Bearer" vs. "MAC" vs. "HOK", or what have you. Then withi=
n
> Bearer you have "JWT" or "SAML" or "unstructured blob". Then you've also
> got "access" vs. "refresh" and other flavors of token, like the id_token =
in
> OpenID Connect.
>
> Thing is, the server running the introspection endpoint will probably kno=
w
> *all* of these. But should it tell the client? If so, which of the three,
> and what names should the fields be?
>
>  -- Justin ****
>
> ** **
>
> On 02/07/2013 11:26 AM, Prabath Siriwardena wrote:****
>
> Okay.. I was thinking this could be used as a way to validate the token a=
s
> well. BTW even in this case shouldn't communicate the type of token to AS=
?
> For example in the case of SAML profile - it could be SAML token.. ****
>
> ** **
>
> Thanks & regards,****
>
> -Prabath****
>
> On Thu, Feb 7, 2013 at 8:39 PM, Justin Richer <jricher@mitre.org> wrote:*=
*
> **
>
> "valid" might not be the best term, but it's meant to be a field where th=
e
> server says "yes this token is still good" or "no this token isn't good
> anymore". We could instead do this with HTTP codes or something but I wen=
t
> with a pure JSON response.
>
>  -- Justin ****
>
> ** **
>
> On 02/06/2013 10:47 PM, Prabath Siriwardena wrote:****
>
> Hi Justin, ****
>
> ** **
>
> I believe this is addressing one of the key missing part in OAuth 2.0...*=
*
> **
>
> ** **
>
> One question - I guess this was discussed already...****
>
> ** **
>
> In the spec - in the introspection response it has the attribute "valid" =
-
> this is basically the validity of the token provided in the request.****
>
> ** **
>
> Validation criteria depends on the token and well as token type ( Bearer,
> MAC..).****
>
> ** **
>
> In the spec it seems like it's coupled with Bearer token type... But I
> guess, by adding "token_type" to the request we can remove this dependenc=
y.
> ****
>
> ** **
>
> WDYT..?****
>
> ** **
>
> Thanks & regards,****
>
> -Prabath ****
>
> ** **
>
> On Thu, Feb 7, 2013 at 12:54 AM, Justin Richer <jricher@mitre.org> wrote:=
*
> ***
>
> Updated introspection draft based on recent comments. Changes include:
>
>  - "scope" return parameter now follows RFC6749 format instead of JSON
> array
>  - "subject" -> "sub", and "audience" -> "aud", to be parallel with JWT
> claims
>  - clarified what happens if the authentication is bad
>
>  -- Justin****
>
>
>
> -------- Original Message -------- ****
>
> *Subject: *
>
> New Version Notification for draft-richer-oauth-introspection-02.txt****
>
> *Date: *
>
> Wed, 6 Feb 2013 11:24:20 -0800****
>
> *From: *
>
> <internet-drafts@ietf.org> <internet-drafts@ietf.org>****
>
> *To: *
>
> <jricher@mitre.org> <jricher@mitre.org>****
>
> ** **
>
> A new version of I-D, draft-richer-oauth-introspection-02.txt****
>
> has been successfully submitted by Justin Richer and posted to the****
>
> IETF repository.****
>
> ** **
>
> Filename:       draft-richer-oauth-introspection****
>
> Revision:       02****
>
> Title:             OAuth Token Introspection****
>
> Creation date:       2013-02-06****
>
> WG ID:             Individual Submission****
>
> Number of pages: 6****
>
> URL:             http://www.ietf.org/internet-drafts/draft-richer-oauth-i=
ntrospection-02.txt****
>
> Status:          http://datatracker.ietf.org/doc/draft-richer-oauth-intro=
spection****
>
> Htmlized:        http://tools.ietf.org/html/draft-richer-oauth-introspect=
ion-02****
>
> Diff:            http://www.ietf.org/rfcdiff?url2=3Ddraft-richer-oauth-in=
trospection-02****
>
> ** **
>
> Abstract:****
>
>    This specification defines a method for a client or protected****
>
>    resource to query an OAuth authorization server to determine meta-****
>
>    information about an OAuth token.****
>
> ** **
>
> ** **
>
>                                                                          =
         ****
>
> ** **
>
> ** **
>
> The IETF Secretariat****
>
> ** **
>
> ** **
>
> ** **
>
>
> _______________________________________________
> OAuth mailing list
> OAuth@ietf.org
> https://www.ietf.org/mailman/listinfo/oauth****
>
>
>
> ****
>
> ** **
>
> --
> Thanks & Regards,
> Prabath ****
>
> ** **
>
> Mobile : +94 71 809 6732
>
> http://blog.facilelogin.com
> http://RampartFAQ.com****
>
> ** **
>
>
>
> ****
>
> ** **
>
> --
> Thanks & Regards,
> Prabath ****
>
> ** **
>
> Mobile : +94 71 809 6732
>
> http://blog.facilelogin.com
> http://RampartFAQ.com****
>
> ** **
>
>
>
> ****
>
> ** **
>
> --
> Thanks & Regards,
> Prabath ****
>
> ** **
>
> Mobile : +94 71 809 6732
>
> http://blog.facilelogin.com
> http://RampartFAQ.com****
>
> ** **
>
>
>
> ****
>
> ** **
>
> --
> Thanks & Regards,
> Prabath ****
>
> ** **
>
> Mobile : +94 71 809 6732
>
> http://blog.facilelogin.com
> http://RampartFAQ.com****
>
>  _______________________________________________
> OAuth mailing list
> OAuth@ietf.org
> https://www.ietf.org/mailman/listinfo/oauth****
>
>  ** **
>
>
>
> ****
>
> ** **
>
> --
> Thanks & Regards,
> Prabath ****
>
> ** **
>
> Mobile : +94 71 809 6732
>
> http://blog.facilelogin.com
> http://RampartFAQ.com****
>
>
>
> ****
>
> ** **
>
> --
> Thanks & Regards,
> Prabath ****
>
> ** **
>
> Mobile : +94 71 809 6732
>
> http://blog.facilelogin.com
> http://RampartFAQ.com****
>
> ** **
>
>
>
> ****
>
> ** **
>
> --
> Thanks & Regards,
> Prabath ****
>
> ** **
>
> Mobile : +94 71 809 6732
>
> http://blog.facilelogin.com
> http://RampartFAQ.com****
>
>
>
> ****
>
> ** **
>
> --
> Thanks & Regards,
> Prabath ****
>
> ** **
>
> Mobile : +94 71 809 6732
>
> http://blog.facilelogin.com
> http://RampartFAQ.com****
>
> ** **
>
>
>
> ****
>
> ** **
>
> --
> Thanks & Regards,
> Prabath ****
>
> ** **
>
> Mobile : +94 71 809 6732
>
> http://blog.facilelogin.com
> http://RampartFAQ.com****
>
> ** **
>
>
>
> ****
>
> ** **
>
> --
> Thanks & Regards,
> Prabath ****
>
> ** **
>
> Mobile : +94 71 809 6732
>
> http://blog.facilelogin.com
> http://RampartFAQ.com****
>
> ** **
>
>
>
> ****
>
> ** **
>
> --
> Thanks & Regards,
> Prabath ****
>
> ** **
>
> Mobile : +94 71 809 6732
>
> http://blog.facilelogin.com
> http://RampartFAQ.com****
>
> ** **
>
>
>


--=20
Thanks & Regards,
Prabath

Mobile : +94 71 809 6732

http://blog.facilelogin.com
http://RampartFAQ.com

--047d7b343a9e971d2f04d5b601ea
Content-Type: text/html; charset=windows-1252
Content-Transfer-Encoding: quoted-printable

+1 for active.<div><br></div><div>Thanks &amp; regards,</div><div>-Prabath<=
br><br><div class=3D"gmail_quote">On Fri, Feb 15, 2013 at 2:53 AM, Justin R=
icher <span dir=3D"ltr">&lt;<a href=3D"mailto:jricher@mitre.org" target=3D"=
_blank">jricher@mitre.org</a>&gt;</span> wrote:<br>
<blockquote class=3D"gmail_quote" style=3D"margin:0 0 0 .8ex;border-left:1p=
x #ccc solid;padding-left:1ex">
 =20
   =20
 =20
  <div bgcolor=3D"#FFFFFF" text=3D"#000000">
    That could work for me. Anyone else?<br>
    <br>
    =A0-- Justin<br>
    <br>
    <div>On 02/14/2013 04:19 PM, Donald F Coffin
      wrote:<br>
    </div>
    <blockquote type=3D"cite">
     =20
     =20
     =20
      <div>
        <p class=3D"MsoNormal"><span style=3D"font-family:&quot;Cambria&quo=
t;,&quot;serif&quot;;color:windowtext">Does
            the term =93Active=94 help clarify the meaning but still confir=
m
            to your intention, Justin?<u></u><u></u></span></p>
        <p class=3D"MsoNormal"><span style=3D"font-family:&quot;Cambria&quo=
t;,&quot;serif&quot;;color:windowtext"><u></u>=A0<u></u></span></p>
        <div>
          <p class=3D"MsoNormal"><span style=3D"font-family:&quot;Calibri&q=
uot;,&quot;sans-serif&quot;;color:windowtext">Best
              regards,<u></u><u></u></span></p>
          <p class=3D"MsoNormal"><span>Don<u></u><u></u></span></p>
          <p class=3D"MsoNormal"><span style=3D"font-family:&quot;Calibri&q=
uot;,&quot;sans-serif&quot;;color:windowtext">Donald
              F. Coffin<u></u><u></u></span></p>
          <p class=3D"MsoNormal"><span style=3D"font-family:&quot;Calibri&q=
uot;,&quot;sans-serif&quot;;color:windowtext">Founder/CTO<u></u><u></u></sp=
an></p>
          <p class=3D"MsoNormal"><span style=3D"font-family:&quot;Calibri&q=
uot;,&quot;sans-serif&quot;;color:windowtext"><u></u>=A0<u></u></span></p>
          <p class=3D"MsoNormal"><span style=3D"font-family:&quot;Calibri&q=
uot;,&quot;sans-serif&quot;;color:windowtext">REMI
              Networks<u></u><u></u></span></p>
          <p class=3D"MsoNormal"><span style=3D"font-family:&quot;Calibri&q=
uot;,&quot;sans-serif&quot;;color:windowtext">22751
              El Prado Suite 6216<u></u><u></u></span></p>
          <p class=3D"MsoNormal"><span style=3D"font-family:&quot;Calibri&q=
uot;,&quot;sans-serif&quot;;color:windowtext">Rancho
              Santa Margarita, CA=A0 92688-3836<u></u><u></u></span></p>
          <p class=3D"MsoNormal"><span style=3D"font-family:&quot;Calibri&q=
uot;,&quot;sans-serif&quot;;color:windowtext"><u></u>=A0<u></u></span></p>
          <p class=3D"MsoNormal"><span style=3D"font-family:&quot;Calibri&q=
uot;,&quot;sans-serif&quot;;color:windowtext">Phone:=A0=A0=A0=A0=A0
              (949) 636-8571<u></u><u></u></span></p>
          <p class=3D"MsoNormal"><span style=3D"font-family:&quot;Calibri&q=
uot;,&quot;sans-serif&quot;;color:windowtext">Email:=A0=A0=A0=A0=A0=A0
              <a href=3D"mailto:donald.coffin@reminetworks.com" target=3D"_=
blank"><span style=3D"color:blue">donald.coffin@reminetworks.com</span></a>=
<u></u><u></u></span></p>
        </div>
        <p class=3D"MsoNormal"><span style=3D"font-family:&quot;Cambria&quo=
t;,&quot;serif&quot;;color:windowtext"><u></u>=A0<u></u></span></p>
        <div>
          <div style=3D"border:none;border-top:solid #b5c4df 1.0pt;padding:=
3.0pt 0in 0in 0in">
            <p class=3D"MsoNormal"><b><span style=3D"font-size:10.0pt;font-=
family:&quot;Tahoma&quot;,&quot;sans-serif&quot;;color:windowtext">From:</s=
pan></b><span style=3D"font-size:10.0pt;font-family:&quot;Tahoma&quot;,&quo=
t;sans-serif&quot;;color:windowtext">
                Justin Richer [<a href=3D"mailto:jricher@mitre.org" target=
=3D"_blank">mailto:jricher@mitre.org</a>] <br>
                <b>Sent:</b> Thursday, February 14, 2013 8:16 AM<br>
                <b>To:</b> Prabath Siriwardena<br>
                <b>Cc:</b> <a href=3D"mailto:oauth@ietf.org" target=3D"_bla=
nk">oauth@ietf.org</a><br>
                <b>Subject:</b> Re: [OAUTH-WG] Fwd: New Version
                Notification for draft-richer-oauth-introspection-02.txt<u>=
</u><u></u></span></p>
          </div>
        </div>
        <p class=3D"MsoNormal"><u></u>=A0<u></u></p>
        <p class=3D"MsoNormal" style=3D"margin-bottom:12.0pt">That much I
          can at least do. I&#39;d be happy with another term if there was =
a
          good one we could drop in its place without changing the
          intended semantics.<br>
          <br>
          =A0-- Justin<u></u><u></u></p>
        <div>
          <p class=3D"MsoNormal">On 02/14/2013 10:57 AM, Prabath
            Siriwardena wrote:<u></u><u></u></p>
        </div>
        <blockquote style=3D"margin-top:5.0pt;margin-bottom:5.0pt">
          <p class=3D"MsoNormal">Not quite convinced :-) Valid has a
            meaning attached to that.. <u></u><u></u></p>
          <div>
            <p class=3D"MsoNormal"><u></u>=A0<u></u></p>
          </div>
          <div>
            <p class=3D"MsoNormal">In case we are going ahead with this
              please define it clearly in the draft - with the one you
              shared in this thread.<u></u><u></u></p>
          </div>
          <div>
            <p class=3D"MsoNormal"><u></u>=A0<u></u></p>
          </div>
          <div>
            <p class=3D"MsoNormal">Thanks &amp; regards,<u></u><u></u></p>
          </div>
          <div>
            <p class=3D"MsoNormal" style=3D"margin-bottom:12.0pt">-Prabath<=
u></u><u></u></p>
            <div>
              <p class=3D"MsoNormal">On Thu, Feb 14, 2013 at 8:16 PM,
                Justin Richer &lt;<a href=3D"mailto:jricher@mitre.org" targ=
et=3D"_blank">jricher@mitre.org</a>&gt;
                wrote:<u></u><u></u></p>
              <div>
                <div>
                  <p class=3D"MsoNormal"><u></u>=A0<u></u></p>
                  <div>
                    <p class=3D"MsoNormal">On 02/14/2013 09:37 AM, Prabath
                      Siriwardena wrote:<u></u><u></u></p>
                  </div>
                  <blockquote style=3D"margin-top:5.0pt;margin-bottom:5.0pt=
">
                    <div>
                      <p class=3D"MsoNormal">The definition of valid is
                        bit ambiguous=A0in the draft...<u></u><u></u></p>
                    </div>
                    <div>
                      <p class=3D"MsoNormal"><u></u>=A0<u></u></p>
                    </div>
                    <div>
                      <p class=3D"MsoNormal">Okay.. If that is the
                        definition... and if we beak that in to parts...<u>=
</u><u></u></p>
                    </div>
                    <div>
                      <p class=3D"MsoNormal"><u></u>=A0<u></u></p>
                    </div>
                    <div>
                      <p class=3D"MsoNormal">&quot;it hasn&#39;t expired&qu=
ot; : In the
                        response it self we have parameter for issued_at
                        and and expires_at - so whether the token is not
                        expired or not can even be derived at the
                        requestor&#39;s end.<u></u><u></u></p>
                    </div>
                  </blockquote>
                  <p class=3D"MsoNormal"><u></u>=A0<u></u></p>
                </div>
                <p class=3D"MsoNormal">If the token isn&#39;t good anymore,=
 it
                  doesn&#39;t matter when it was issued or when it was
                  expired, just that it has. <u></u><u></u></p>
                <div>
                  <p class=3D"MsoNormal"><br>
                    <br>
                    <br>
                    <u></u><u></u></p>
                  <div>
                    <p class=3D"MsoNormal"><u></u>=A0<u></u></p>
                  </div>
                  <div>
                    <p class=3D"MsoNormal">&quot;token was issued from here=
&quot; :
                      For this IMO we need to send an error code.
                      Requestor has picked the wrong AS.<u></u><u></u></p>
                  </div>
                </div>
                <p class=3D"MsoNormal">We don&#39;t know if it came from
                  another AS or if someone&#39;s just making things up.
                  Either way it&#39;s not a good token. <u></u><u></u></p>
                <div>
                  <p class=3D"MsoNormal"><br>
                    <br>
                    <br>
                    <u></u><u></u></p>
                  <div>
                    <p class=3D"MsoNormal"><u></u>=A0<u></u></p>
                  </div>
                  <div>
                    <p class=3D"MsoNormal">The remaining is =A0&quot;revoke=
d&quot;..
                      That is why I proposed=A0earlier=A0- we better have a=
n
                      attribute &quot;revoked&quot; - instead of &quot;vali=
d&quot; in the
                      response..<u></u><u></u></p>
                  </div>
                  <p class=3D"MsoNormal"><u></u>=A0<u></u></p>
                </div>
                <p class=3D"MsoNormal">The end result of all three is the
                  same: either the token is good, or it isn&#39;t. I think
                  it&#39;s much simpler and more useful to leave it at that=
.<span style=3D"color:#888888"><br>
                    <br>
                    <span>=A0-- Justin</span></span> <u></u><u></u></p>
                <div>
                  <div>
                    <p class=3D"MsoNormal"><br>
                      <br>
                      <br>
                      <u></u><u></u></p>
                    <div>
                      <p class=3D"MsoNormal"><u></u>=A0<u></u></p>
                    </div>
                    <div>
                      <p class=3D"MsoNormal">WDYT...?<u></u><u></u></p>
                    </div>
                    <div>
                      <p class=3D"MsoNormal"><u></u>=A0<u></u></p>
                    </div>
                    <div>
                      <p class=3D"MsoNormal">Thanks &amp; regards,<u></u><u=
></u></p>
                    </div>
                    <div>
                      <p class=3D"MsoNormal">-Prabath<u></u><u></u></p>
                    </div>
                    <div>
                      <p class=3D"MsoNormal"><u></u>=A0<u></u></p>
                    </div>
                    <div>
                      <p class=3D"MsoNormal"><u></u>=A0<u></u></p>
                      <div>
                        <p class=3D"MsoNormal">On Thu, Feb 14, 2013 at
                          7:58 PM, Justin Richer &lt;<a href=3D"mailto:jric=
her@mitre.org" target=3D"_blank">jricher@mitre.org</a>&gt;
                          wrote:<u></u><u></u></p>
                        <div>
                          <p class=3D"MsoNormal">Because it will be the
                            one that issued the token in the first
                            place. <br>
                            <br>
                            Validity means &quot;token was issued from here=
,
                            it hasn&#39;t been revoked, it hasn&#39;t expir=
ed&quot;.
                            <br>
                            <span style=3D"color:#888888"><br>
                              =A0-- Justin</span> <u></u><u></u></p>
                          <div>
                            <div>
                              <p class=3D"MsoNormal" style=3D"margin-bottom=
:12.0pt"><u></u>=A0<u></u></p>
                              <div>
                                <p class=3D"MsoNormal">On 02/14/2013 09:28
                                  AM, Prabath Siriwardena wrote:<u></u><u><=
/u></p>
                              </div>
                              <blockquote style=3D"margin-top:5.0pt;margin-=
bottom:5.0pt">
                                <p class=3D"MsoNormal">Okay. With out
                                  knowing the type of the token how can
                                  the AS validate the token ? What is
                                  meant by the validity there? <u></u><u></=
u></p>
                                <div>
                                  <p class=3D"MsoNormal"><u></u>=A0<u></u><=
/p>
                                </div>
                                <div>
                                  <p class=3D"MsoNormal">Thanks &amp;
                                    regards,<u></u><u></u></p>
                                </div>
                                <div>
                                  <p class=3D"MsoNormal" style=3D"margin-bo=
ttom:12.0pt">-Prabath<u></u><u></u></p>
                                  <div>
                                    <p class=3D"MsoNormal">On Thu, Feb 14,
                                      2013 at 7:55 PM, Justin Richer
                                      &lt;<a href=3D"mailto:jricher@mitre.o=
rg" target=3D"_blank">jricher@mitre.org</a>&gt;
                                      wrote:<u></u><u></u></p>
                                    <div>
                                      <p class=3D"MsoNormal">OK, I don&#39;=
t
                                        see the utility in that at all.
                                        What would it accomplish?<span styl=
e=3D"color:#888888"><br>
                                          <br>
                                          =A0-- Justin</span> <u></u><u></u=
></p>
                                      <div>
                                        <div>
                                          <p class=3D"MsoNormal" style=3D"m=
argin-bottom:12.0pt"><u></u>=A0<u></u></p>
                                          <div>
                                            <p class=3D"MsoNormal">On
                                              02/14/2013 09:25 AM,
                                              Prabath Siriwardena wrote:<u>=
</u><u></u></p>
                                          </div>
                                          <blockquote style=3D"margin-top:5=
.0pt;margin-bottom:5.0pt">
                                            <p class=3D"MsoNormal">To make
                                              it clear - my suggestion
                                              is to add token_type_hint
                                              to the introspection
                                              request. It can be from
                                              client to AS or from RS to
                                              AS. <u></u><u></u></p>
                                            <div>
                                              <p class=3D"MsoNormal"><u></u=
>=A0<u></u></p>
                                            </div>
                                            <div>
                                              <p class=3D"MsoNormal">Then
                                                AS can decide whether
                                                the provided token is
                                                valid or not and include
                                                &quot;valid&quot; attribute=
 in the
                                                introspection response.<u><=
/u><u></u></p>
                                            </div>
                                            <div>
                                              <p class=3D"MsoNormal"><u></u=
>=A0<u></u></p>
                                            </div>
                                            <div>
                                              <p class=3D"MsoNormal">Thanks
                                                &amp; regards,<u></u><u></u=
></p>
                                            </div>
                                            <div>
                                              <p class=3D"MsoNormal" style=
=3D"margin-bottom:12.0pt">-Prabath<u></u><u></u></p>
                                              <div>
                                                <p class=3D"MsoNormal">On
                                                  Thu, Feb 14, 2013 at
                                                  7:52 PM, Prabath
                                                  Siriwardena &lt;<a href=
=3D"mailto:prabath@wso2.com" target=3D"_blank">prabath@wso2.com</a>&gt;
                                                  wrote:<u></u><u></u></p>
                                                <p class=3D"MsoNormal">Both
                                                  the client and the
                                                  resource owner should
                                                  be aware of the token
                                                  type. <u></u><u></u></p>
                                                <div>
                                                  <p class=3D"MsoNormal"><u=
></u>=A0<u></u></p>
                                                </div>
                                                <div>
                                                  <p class=3D"MsoNormal">My
                                                    argument is, if the
                                                    authorization server
                                                    to decide whether
                                                    the token is valid
                                                    or not (
                                                    irrespective of who
                                                    asked the question)
                                                    - AS needs to know
                                                    the token type -
                                                    because to validate
                                                    a token AS should
                                                    know the token type.<u>=
</u><u></u></p>
                                                </div>
                                                <div>
                                                  <p class=3D"MsoNormal"><u=
></u>=A0<u></u></p>
                                                </div>
                                                <div>
                                                  <p class=3D"MsoNormal">Th=
e
                                                    token type could be,
                                                    bearer or MAC or any
                                                    other token type.<u></u=
><u></u></p>
                                                </div>
                                                <div>
                                                  <p class=3D"MsoNormal"><u=
></u>=A0<u></u></p>
                                                </div>
                                                <div>
                                                  <p class=3D"MsoNormal">Th=
anks
                                                    &amp; regards,<u></u><u=
></u></p>
                                                </div>
                                                <div>
                                                  <p class=3D"MsoNormal">-P=
rabath
                                                    <u></u><u></u></p>
                                                  <div>
                                                    <div>
                                                      <p class=3D"MsoNormal=
" style=3D"margin-bottom:12.0pt"><u></u>=A0<u></u></p>
                                                      <div>
                                                        <p class=3D"MsoNorm=
al">On
                                                          Thu, Feb 14,
                                                          2013 at 7:33
                                                          PM, Justin
                                                          Richer &lt;<a hre=
f=3D"mailto:jricher@mitre.org" target=3D"_blank">jricher@mitre.org</a>&gt;
                                                          wrote:<u></u><u><=
/u></p>
                                                        <div>
                                                          <p class=3D"MsoNo=
rmal">What
                                                          exactly are
                                                          you suggesting
                                                          be added to
                                                          introspection?
                                                          The
                                                          &quot;token_type_=
hint&quot;
                                                          is from the
                                                          client to the
                                                          server, but
                                                          what you&#39;ve
                                                          asked for in
                                                          terms of
                                                          &quot;token type&=
quot;
                                                          is from the
                                                          server to the
                                                          client. And
                                                          there was
                                                          never an
                                                          answer to what
                                                          exactly is
                                                          meant by
                                                          &quot;token type&=
quot;
                                                          in this case,
                                                          particularly
                                                          because you
                                                          seem to want
                                                          to call out
                                                          things like
                                                          SAML and
                                                          Bearer as
                                                          separate
                                                          types. <br>
                                                          <span style=3D"co=
lor:#888888"><br>
                                                          =A0-- Justin</spa=
n>
                                                          <u></u><u></u></p=
>
                                                          <div>
                                                          <div>
                                                          <p class=3D"MsoNo=
rmal" style=3D"margin-bottom:12.0pt"><br>
                                                          <br>
                                                          <u></u><u></u></p=
>
                                                          <div>
                                                          <p class=3D"MsoNo=
rmal">On
                                                          02/14/2013
                                                          06:59 AM,
                                                          Prabath
                                                          Siriwardena
                                                          wrote:<u></u><u><=
/u></p>
                                                          </div>
                                                          <blockquote style=
=3D"margin-top:5.0pt;margin-bottom:5.0pt">
                                                          <p class=3D"MsoNo=
rmal">I
                                                          noticed that
                                                          the latest
                                                          Token
                                                          Revocation
                                                          draft [1] has
                                                          introduced the
                                                          parameter
                                                          &quot;token_type_=
hint&quot;.
                                                          I would
                                                          suggest the
                                                          same here, as
                                                          that would
                                                          make what is
                                                          meant by
                                                          &quot;valid&quot;=
 much
                                                          clear.. <u></u><u=
></u></p>
                                                          <div>
                                                          <p class=3D"MsoNo=
rmal"><u></u>=A0<u></u></p>
                                                          </div>
                                                          <div>
                                                          <p class=3D"MsoNo=
rmal">[1]:=A0<a href=3D"http://tools.ietf.org/html/draft-ietf-oauth-revocat=
ion-05" target=3D"_blank"><span style=3D"font-size:9.5pt;font-family:&quot;=
Arial&quot;,&quot;sans-serif&quot;;color:#1155cc">http://tools.ietf.org/htm=
l/draft-ietf-oauth-revocation-05</span></a><u></u><u></u></p>

                                                          </div>
                                                          <div>
                                                          <p class=3D"MsoNo=
rmal"><u></u>=A0<u></u></p>
                                                          </div>
                                                          <div>
                                                          <p class=3D"MsoNo=
rmal">Thanks
                                                          &amp; regards,<u>=
</u><u></u></p>
                                                          </div>
                                                          <div>
                                                          <p class=3D"MsoNo=
rmal" style=3D"margin-bottom:12.0pt">-Prabath<u></u><u></u></p>
                                                          <div>
                                                          <p class=3D"MsoNo=
rmal">On
                                                          Tue, Feb 12,
                                                          2013 at 9:35
                                                          PM, Prabath
                                                          Siriwardena
                                                          &lt;<a href=3D"ma=
ilto:prabath@wso2.com" target=3D"_blank">prabath@wso2.com</a>&gt;
                                                          wrote:<u></u><u><=
/u></p>
                                                          <p class=3D"MsoNo=
rmal">Hi
                                                          Justin, <u></u><u=
></u></p>
                                                          <div>
                                                          <p class=3D"MsoNo=
rmal"><u></u>=A0<u></u></p>
                                                          </div>
                                                          <div>
                                                          <p class=3D"MsoNo=
rmal">I
                                                          doubt whether
                                                          valid_token
                                                          would make a
                                                          difference..?<u><=
/u><u></u></p>
                                                          </div>
                                                          <div>
                                                          <p class=3D"MsoNo=
rmal"><u></u>=A0<u></u></p>
                                                          </div>
                                                          <div>
                                                          <p class=3D"MsoNo=
rmal">My
                                                          initial
                                                          argument is
                                                          what is the
                                                          validation
                                                          criteria..?
                                                          Validation
                                                          criteria
                                                          depends on the
                                                          token_type..<u></=
u><u></u></p>
                                                          </div>
                                                          <div>
                                                          <p class=3D"MsoNo=
rmal"><u></u>=A0<u></u></p>
                                                          </div>
                                                          <div>
                                                          <p class=3D"MsoNo=
rmal">If
                                                          we are talking
                                                          only about
                                                          metadata -
                                                          then I believe
                                                          &quot;revoked&quo=
t;,
                                                          &quot;expired&quo=
t;
                                                          would be more
                                                          meaningful..<u></=
u><u></u></p>
                                                          </div>
                                                          <div>
                                                          <p class=3D"MsoNo=
rmal"><u></u>=A0<u></u></p>
                                                          </div>
                                                          <div>
                                                          <p class=3D"MsoNo=
rmal">Thanks
                                                          &amp; regards,<u>=
</u><u></u></p>
                                                          </div>
                                                          <div>
                                                          <p class=3D"MsoNo=
rmal">-Prabath
                                                          <u></u><u></u></p=
>
                                                          <div>
                                                          <div>
                                                          <p class=3D"MsoNo=
rmal" style=3D"margin-bottom:12.0pt"><u></u>=A0<u></u></p>
                                                          <div>
                                                          <p class=3D"MsoNo=
rmal">On
                                                          Tue, Feb 12,
                                                          2013 at 7:53
                                                          PM, Justin
                                                          Richer &lt;<a hre=
f=3D"mailto:jricher@mitre.org" target=3D"_blank">jricher@mitre.org</a>&gt;
                                                          wrote:<u></u><u><=
/u></p>
                                                          <div>
                                                          <p class=3D"MsoNo=
rmal">OK,
                                                          I can see the
                                                          wisdom in
                                                          changing this
                                                          term. <br>
                                                          <br>
                                                          I picked
                                                          &quot;valid&quot;
                                                          because I
                                                          wanted a
                                                          simple
                                                          &quot;boolean&quo=
t;
                                                          value that
                                                          would require
                                                          no additional
                                                          parsing or
                                                          string-matching
                                                          on the
                                                          client&#39;s
                                                          behalf, and
                                                          I&#39;d like to
                                                          stick with
                                                          that. OAuth is
                                                          built with the
                                                          assumption
                                                          that clients
                                                          need to be
                                                          able to
                                                          recover from
                                                          invalid tokens
                                                          at any stage,
                                                          so I think a
                                                          simple yes/no
                                                          is the right
                                                          step here. <br>
                                                          <br>
                                                          That said, I
                                                          think you&#39;re
                                                          both right
                                                          that &quot;valid&=
quot;
                                                          seems to have
                                                          caused a bit
                                                          of confusion.
                                                          I don&#39;t want
                                                          to go with
                                                          &quot;revoked&quo=
t;
                                                          because I&#39;d
                                                          rather have
                                                          the &quot;token i=
s
                                                          OK&quot; be the
                                                          positive
                                                          boolean value.
                                                          <br>
                                                          <br>
                                                          Would
                                                          &quot;valid_token=
&quot;
                                                          be more clear?
                                                          Or do we need
                                                          a different
                                                          adjective all
                                                          together?<span st=
yle=3D"color:#888888"><br>
                                                          <br>
                                                          =A0-- Justin</spa=
n>
                                                          <u></u><u></u></p=
>
                                                          <div>
                                                          <div>
                                                          <p class=3D"MsoNo=
rmal" style=3D"margin-bottom:12.0pt"><u></u>=A0<u></u></p>
                                                          <div>
                                                          <p class=3D"MsoNo=
rmal">On
                                                          02/11/2013
                                                          08:02 PM,
                                                          Richard
                                                          Harrington
                                                          wrote:<u></u><u><=
/u></p>
                                                          </div>
                                                          <blockquote style=
=3D"margin-top:5.0pt;margin-bottom:5.0pt">
                                                          <div>
                                                          <p class=3D"MsoNo=
rmal">Have
                                                          you considered
                                                          &quot;status&quot=
;
                                                          instead of
                                                          &quot;valid&quot;=
? =A0It
                                                          could have
                                                          values like
                                                          &quot;active&quot=
;,
                                                          &quot;expired&quo=
t;, and
                                                          &quot;revoked&quo=
t;.<u></u><u></u></p>
                                                          </div>
                                                          <div>
                                                          <p class=3D"MsoNo=
rmal"><u></u>=A0<u></u></p>
                                                          </div>
                                                          <div>
                                                          <p class=3D"MsoNo=
rmal">Is
                                                          it worthwhile
                                                          including the
                                                          status of the
                                                          client also?
                                                          =A0For example,
                                                          a client
                                                          application
                                                          could be
                                                          disabled,
                                                          temporarily or
                                                          permanently,
                                                          and thus
                                                          disabling its
                                                          access tokens
                                                          as well.<u></u><u=
></u></p>
                                                          </div>
                                                          <div>
                                                          <p class=3D"MsoNo=
rmal"><u></u>=A0<u></u></p>
                                                          </div>
                                                          <div>
                                                          <p class=3D"MsoNo=
rmal" style=3D"margin-bottom:12.0pt"><br>
                                                          On Feb 11,
                                                          2013, at 1:56
                                                          PM, Prabath
                                                          Siriwardena
                                                          &lt;<a href=3D"ma=
ilto:prabath@wso2.com" target=3D"_blank">prabath@wso2.com</a>&gt;
                                                          wrote:<u></u><u><=
/u></p>
                                                          </div>
                                                          <blockquote style=
=3D"margin-top:5.0pt;margin-bottom:5.0pt">
                                                          <div>
                                                          <p class=3D"MsoNo=
rmal">I
                                                          guess
                                                          confusion is
                                                          with &#39;valid&#=
39;
                                                          parameter is
                                                          in the
                                                          response.. <u></u=
><u></u></p>
                                                          <div>
                                                          <p class=3D"MsoNo=
rmal"><u></u>=A0<u></u></p>
                                                          </div>
                                                          <div>
                                                          <p class=3D"MsoNo=
rmal">I
                                                          thought this
                                                          will be
                                                          helpful
                                                          to=A0standardize=
=A0the
                                                          communication
                                                          between
                                                          Resource
                                                          Server and the
                                                          Authorization
                                                          Server..<u></u><u=
></u></p>
                                                          </div>
                                                          <div>
                                                          <p class=3D"MsoNo=
rmal"><u></u>=A0<u></u></p>
                                                          </div>
                                                          <div>
                                                          <p class=3D"MsoNo=
rmal">I
                                                          would suggest
                                                          we completely
                                                          remove &quot;vali=
d&quot;
                                                          from the
                                                          response - or
                                                          define it much
                                                          clearly..<u></u><=
u></u></p>
                                                          </div>
                                                          <div>
                                                          <p class=3D"MsoNo=
rmal"><u></u>=A0<u></u></p>
                                                          </div>
                                                          <div>
                                                          <p class=3D"MsoNo=
rmal">May
                                                          be can add
                                                          &quot;revoked&quo=
t; with
                                                          a boolean
                                                          attribute..<u></u=
><u></u></p>
                                                          </div>
                                                          <div>
                                                          <p class=3D"MsoNo=
rmal"><u></u>=A0<u></u></p>
                                                          </div>
                                                          <div>
                                                          <p class=3D"MsoNo=
rmal">Thanks
                                                          &amp; regards,<u>=
</u><u></u></p>
                                                          </div>
                                                          <div>
                                                          <p class=3D"MsoNo=
rmal" style=3D"margin-bottom:12.0pt">-Prabath<u></u><u></u></p>
                                                          <div>
                                                          <p class=3D"MsoNo=
rmal">On
                                                          Tue, Feb 12,
                                                          2013 at 3:19
                                                          AM, Justin
                                                          Richer &lt;<a hre=
f=3D"mailto:jricher@mitre.org" target=3D"_blank">jricher@mitre.org</a>&gt;
                                                          wrote:<u></u><u><=
/u></p>
                                                          <div>
                                                          <div>
                                                          <p class=3D"MsoNo=
rmal"><u></u>=A0<u></u></p>
                                                          <div>
                                                          <p class=3D"MsoNo=
rmal">On
                                                          02/08/2013
                                                          12:51 AM,
                                                          Prabath
                                                          Siriwardena
                                                          wrote:<u></u><u><=
/u></p>
                                                          </div>
                                                          </div>
                                                          <blockquote style=
=3D"margin-top:5.0pt;margin-bottom:5.0pt">
                                                          <p class=3D"MsoNo=
rmal">Hi=A0Justin,
                                                          <u></u><u></u></p=
>
                                                          <div>
                                                          <p class=3D"MsoNo=
rmal"><u></u>=A0<u></u></p>
                                                          </div>
                                                          <div>
                                                          <div>
                                                          <p class=3D"MsoNo=
rmal">I
                                                          have couple of
                                                          questions
                                                          related to
                                                          &quot;valid&quot;
                                                          parameter...<u></=
u><u></u></p>
                                                          </div>
                                                          <div>
                                                          <p class=3D"MsoNo=
rmal"><u></u>=A0<u></u></p>
                                                          </div>
                                                          <div>
                                                          <p class=3D"MsoNo=
rmal">This
                                                          endpoint can
                                                          be invoked by
                                                          the Resource
                                                          Server in
                                                          runtime...<u></u>=
<u></u></p>
                                                          </div>
                                                          </div>
                                                          </blockquote>
                                                          <p class=3D"MsoNo=
rmal"><br>
                                                          That&#39;s
                                                          correct. <u></u><=
u></u></p>
                                                          <div>
                                                          <p class=3D"MsoNo=
rmal"><br>
                                                          <br>
                                                          <br>
                                                          <u></u><u></u></p=
>
                                                          <div>
                                                          <p class=3D"MsoNo=
rmal"><u></u>=A0<u></u></p>
                                                          </div>
                                                          <div>
                                                          <p class=3D"MsoNo=
rmal">In
                                                          that case what
                                                          is exactly
                                                          meant by the
                                                          &quot;resource_id=
&quot;
                                                          in request ?<u></=
u><u></u></p>
                                                          </div>
                                                          <p class=3D"MsoNo=
rmal"><u></u>=A0<u></u></p>
                                                          </div>
                                                          <p class=3D"MsoNo=
rmal">The
                                                          resource_id
                                                          field is a
                                                          service-specific
                                                          string that
                                                          basically lets
                                                          the resource
                                                          server provide
                                                          some context
                                                          to the request
                                                          to the auth
                                                          server. There
                                                          have been some
                                                          other
                                                          suggestions
                                                          like client IP
                                                          address, but I
                                                          wanted to put
                                                          this one in
                                                          because it
                                                          seemed to be a
                                                          common theme.
                                                          The client is
                                                          trying to do
                                                          *something*
                                                          with the
                                                          token, after
                                                          all, and the
                                                          rights,
                                                          permissions,
                                                          and metadata
                                                          associated
                                                          with the token
                                                          could change
                                                          based on that.
                                                          Since the
                                                          Introspection
                                                          endpoint is
                                                          all about
                                                          getting that
                                                          metadata back
                                                          to the PR,
                                                          this seemed
                                                          like a good
                                                          idea. <u></u><u><=
/u></p>
                                                          <div>
                                                          <p class=3D"MsoNo=
rmal"><br>
                                                          <br>
                                                          <br>
                                                          <u></u><u></u></p=
>
                                                          <div>
                                                          <p class=3D"MsoNo=
rmal"><u></u>=A0<u></u></p>
                                                          </div>
                                                          <div>
                                                          <p class=3D"MsoNo=
rmal">IMO
                                                          a token to be
                                                          valid depends
                                                          on set of
                                                          criteria based
                                                          on it&#39;s type.=
.<u></u><u></u></p>
                                                          </div>
                                                          <div>
                                                          <p class=3D"MsoNo=
rmal"><u></u>=A0<u></u></p>
                                                          </div>
                                                          <div>
                                                          <p class=3D"MsoNo=
rmal">For
                                                          a Bearer
                                                          token..<u></u><u>=
</u></p>
                                                          </div>
                                                          <div>
                                                          <p class=3D"MsoNo=
rmal"><u></u>=A0<u></u></p>
                                                          </div>
                                                          <div>
                                                          <p class=3D"MsoNo=
rmal">1.
                                                          Token should
                                                          not be expired<u>=
</u><u></u></p>
                                                          </div>
                                                          <div>
                                                          <p class=3D"MsoNo=
rmal">2.
                                                          Token should
                                                          not be
                                                          revoked.<u></u><u=
></u></p>
                                                          </div>
                                                          <div>
                                                          <p class=3D"MsoNo=
rmal">3.
                                                          The scope the
                                                          token issued
                                                          should match
                                                          with the scope
                                                          required for
                                                          the resource.<u><=
/u><u></u></p>
                                                          </div>
                                                          <div>
                                                          <p class=3D"MsoNo=
rmal"><u></u>=A0<u></u></p>
                                                          </div>
                                                          <div>
                                                          <p class=3D"MsoNo=
rmal">For
                                                          a MAC token...<u>=
</u><u></u></p>
                                                          </div>
                                                          <div>
                                                          <p class=3D"MsoNo=
rmal"><u></u>=A0<u></u></p>
                                                          </div>
                                                          <div>
                                                          <p class=3D"MsoNo=
rmal">1.
                                                          Token not
                                                          expired (mac
                                                          id)<u></u><u></u>=
</p>
                                                          </div>
                                                          <div>
                                                          <p class=3D"MsoNo=
rmal">2.
                                                          Token should
                                                          not be revoked<u>=
</u><u></u></p>
                                                          </div>
                                                          <div>
                                                          <p class=3D"MsoNo=
rmal">3.
                                                          The scope the
                                                          token issued
                                                          should match
                                                          with the scope
                                                          required for
                                                          the resource.<u><=
/u><u></u></p>
                                                          </div>
                                                          <div>
                                                          <p class=3D"MsoNo=
rmal">4.
                                                          HMAC check
                                                          should be
                                                          valid<u></u><u></=
u></p>
                                                          </div>
                                                          <div>
                                                          <p class=3D"MsoNo=
rmal"><u></u>=A0<u></u></p>
                                                          </div>
                                                          <p class=3D"MsoNo=
rmal">There
                                                          are similar
                                                          conditions for
                                                          SAML bearer
                                                          too..<u></u><u></=
u></p>
                                                          <p class=3D"MsoNo=
rmal"><u></u>=A0<u></u></p>
                                                          </div>
                                                          <p class=3D"MsoNo=
rmal">This
                                                          isn&#39;t really
                                                          true. The SAML
                                                          bearer token
                                                          is fully
                                                          self-contained
                                                          and doesn&#39;t
                                                          change based
                                                          on other
                                                          parameters in
                                                          the message,
                                                          unlike MAC.
                                                          Same with JWT.
                                                          When it hands
                                                          a SAML or JWT
                                                          token to the
                                                          AS, the PR has
                                                          given
                                                          *everything*
                                                          the server
                                                          needs to check
                                                          that token&#39;s
                                                          validity and
                                                          use. <br>
                                                          <br>
                                                          MAC signatures
                                                          change with
                                                          every message,
                                                          and they&#39;re
                                                          done across
                                                          several
                                                          components of
                                                          the HTTP
                                                          message.
                                                          Therefor, the
                                                          HMAC check for
                                                          MAC style
                                                          tokens will
                                                          still need to
                                                          be done by the
                                                          protected
                                                          resource.
                                                          Introspection
                                                          would help in
                                                          the case that
                                                          the signature
                                                          validated just
                                                          fine, but the
                                                          token might
                                                          have expired.
                                                          Or you need to
                                                          know what
                                                          scopes apply.
                                                          Introspection
                                                          isn&#39;t to full=
y
                                                          validate the
                                                          call to the
                                                          protected
                                                          resource -- if
                                                          that were the
                                                          case, the PR
                                                          would have to
                                                          send some kind
                                                          of
                                                          encapsulated
                                                          version of the
                                                          original
                                                          request.
                                                          Otherwise, the
                                                          AS won&#39;t have
                                                          all of the
                                                          information it
                                                          needs to check
                                                          the MAC.<br>
                                                          <br>
                                                          <br>
                                                          I think what
                                                          you&#39;re
                                                          describing is
                                                          ultimately
                                                          *not* what the
                                                          introspection
                                                          endpoint is
                                                          intended to
                                                          do. If that&#39;s
                                                          unclear from
                                                          the document,
                                                          can you please
                                                          suggest text
                                                          that would
                                                          help clear the
                                                          use case up? I
                                                          wouldn&#39;t want
                                                          it to be
                                                          ambiguous.<span s=
tyle=3D"color:#888888"><br>
                                                          <br>
                                                          =A0-- Justin</spa=
n>
                                                          <u></u><u></u></p=
>
                                                          <div>
                                                          <div>
                                                          <p class=3D"MsoNo=
rmal"><br>
                                                          <br>
                                                          <br>
                                                          <u></u><u></u></p=
>
                                                          <div>
                                                          <p class=3D"MsoNo=
rmal"><u></u>=A0<u></u></p>
                                                          </div>
                                                          <div>
                                                          <p class=3D"MsoNo=
rmal">Thanks
                                                          &amp; regards,<u>=
</u><u></u></p>
                                                          </div>
                                                          <div>
                                                          <p class=3D"MsoNo=
rmal">-Prabath<u></u><u></u></p>
                                                          </div>
                                                          <div>
                                                          <p class=3D"MsoNo=
rmal"><u></u>=A0<u></u></p>
                                                          </div>
                                                          <div>
                                                          <p class=3D"MsoNo=
rmal"><u></u>=A0<u></u></p>
                                                          <div>
                                                          <p class=3D"MsoNo=
rmal">On
                                                          Thu, Feb 7,
                                                          2013 at 10:30
                                                          PM, Justin
                                                          Richer &lt;<a hre=
f=3D"mailto:jricher@mitre.org" target=3D"_blank">jricher@mitre.org</a>&gt;
                                                          wrote:<u></u><u><=
/u></p>
                                                          <div>
                                                          <p class=3D"MsoNo=
rmal">It
                                                          validates the
                                                          token, which
                                                          would be
                                                          either the
                                                          token itself
                                                          in the case of
                                                          Bearer or the
                                                          token &quot;id&qu=
ot;
                                                          part of
                                                          something more
                                                          complex like
                                                          MAC. It
                                                          doesn&#39;t
                                                          directly
                                                          validate the
                                                          usage of the
                                                          token, that&#39;s
                                                          still up to
                                                          the PR to do
                                                          that.<br>
                                                          <br>
                                                          I nearly added
                                                          a &quot;token typ=
e&quot;
                                                          field in this
                                                          draft, but
                                                          held back
                                                          because there
                                                          are several
                                                          kinds of
                                                          &quot;token type&=
quot;
                                                          that people
                                                          talk about in
                                                          OAuth. First,
                                                          there&#39;s
                                                          &quot;Bearer&quot=
; vs.
                                                          &quot;MAC&quot; v=
s.
                                                          &quot;HOK&quot;, =
or what
                                                          have you. Then
                                                          within Bearer
                                                          you have &quot;JW=
T&quot;
                                                          or &quot;SAML&quo=
t; or
                                                          &quot;unstructure=
d
                                                          blob&quot;. Then
                                                          you&#39;ve also
                                                          got &quot;access&=
quot;
                                                          vs. &quot;refresh=
&quot;
                                                          and other
                                                          flavors of
                                                          token, like
                                                          the id_token
                                                          in OpenID
                                                          Connect. <br>
                                                          <br>
                                                          Thing is, the
                                                          server running
                                                          the
                                                          introspection
                                                          endpoint will
                                                          probably know
                                                          *all* of
                                                          these. But
                                                          should it tell
                                                          the client? If
                                                          so, which of
                                                          the three, and
                                                          what names
                                                          should the
                                                          fields be?<span s=
tyle=3D"color:#888888"><br>
                                                          <br>
                                                          =A0-- Justin</spa=
n>
                                                          <u></u><u></u></p=
>
                                                          <div>
                                                          <div>
                                                          <p class=3D"MsoNo=
rmal" style=3D"margin-bottom:12.0pt"><u></u>=A0<u></u></p>
                                                          <div>
                                                          <p class=3D"MsoNo=
rmal">On
                                                          02/07/2013
                                                          11:26 AM,
                                                          Prabath
                                                          Siriwardena
                                                          wrote:<u></u><u><=
/u></p>
                                                          </div>
                                                          <blockquote style=
=3D"margin-top:5.0pt;margin-bottom:5.0pt">
                                                          <p class=3D"MsoNo=
rmal">Okay..
                                                          I was thinking
                                                          this could be
                                                          used as a way
                                                          to validate
                                                          the token as
                                                          well. BTW even
                                                          in this case
                                                          shouldn&#39;t
                                                          communicate
                                                          the type of
                                                          token to AS?
                                                          For example in
                                                          the case of
                                                          SAML profile -
                                                          it could be
                                                          SAML token.. <u><=
/u><u></u></p>
                                                          <div>
                                                          <p class=3D"MsoNo=
rmal"><u></u>=A0<u></u></p>
                                                          </div>
                                                          <div>
                                                          <p class=3D"MsoNo=
rmal">Thanks
                                                          &amp; regards,<u>=
</u><u></u></p>
                                                          </div>
                                                          <div>
                                                          <p class=3D"MsoNo=
rmal" style=3D"margin-bottom:12.0pt">-Prabath<u></u><u></u></p>
                                                          <div>
                                                          <p class=3D"MsoNo=
rmal">On
                                                          Thu, Feb 7,
                                                          2013 at 8:39
                                                          PM, Justin
                                                          Richer &lt;<a hre=
f=3D"mailto:jricher@mitre.org" target=3D"_blank">jricher@mitre.org</a>&gt;
                                                          wrote:<u></u><u><=
/u></p>
                                                          <div>
                                                          <p class=3D"MsoNo=
rmal">&quot;valid&quot;
                                                          might not be
                                                          the best term,
                                                          but it&#39;s mean=
t
                                                          to be a field
                                                          where the
                                                          server says
                                                          &quot;yes this
                                                          token is still
                                                          good&quot; or &qu=
ot;no
                                                          this token
                                                          isn&#39;t good
                                                          anymore&quot;. We
                                                          could instead
                                                          do this with
                                                          HTTP codes or
                                                          something but
                                                          I went with a
                                                          pure JSON
                                                          response.<span st=
yle=3D"color:#888888"><br>
                                                          <br>
                                                          =A0-- Justin</spa=
n>
                                                          <u></u><u></u></p=
>
                                                          <div>
                                                          <div>
                                                          <p class=3D"MsoNo=
rmal" style=3D"margin-bottom:12.0pt"><u></u>=A0<u></u></p>
                                                          <div>
                                                          <p class=3D"MsoNo=
rmal">On
                                                          02/06/2013
                                                          10:47 PM,
                                                          Prabath
                                                          Siriwardena
                                                          wrote:<u></u><u><=
/u></p>
                                                          </div>
                                                          <blockquote style=
=3D"margin-top:5.0pt;margin-bottom:5.0pt">
                                                          <p class=3D"MsoNo=
rmal">Hi
                                                          Justin, <u></u><u=
></u></p>
                                                          <div>
                                                          <p class=3D"MsoNo=
rmal"><u></u>=A0<u></u></p>
                                                          </div>
                                                          <div>
                                                          <p class=3D"MsoNo=
rmal">I
                                                          believe this
                                                          is addressing
                                                          one of the key
                                                          missing part
                                                          in OAuth
                                                          2.0...<u></u><u><=
/u></p>
                                                          </div>
                                                          <div>
                                                          <p class=3D"MsoNo=
rmal"><u></u>=A0<u></u></p>
                                                          </div>
                                                          <div>
                                                          <p class=3D"MsoNo=
rmal">One
                                                          question - I
                                                          guess this was
                                                          discussed
                                                          already...<u></u>=
<u></u></p>
                                                          </div>
                                                          <div>
                                                          <p class=3D"MsoNo=
rmal"><u></u>=A0<u></u></p>
                                                          </div>
                                                          <div>
                                                          <p class=3D"MsoNo=
rmal">In
                                                          the spec - in
                                                          the
                                                          introspection
                                                          response it
                                                          has the
                                                          attribute
                                                          &quot;valid&quot;=
 - this
                                                          is basically
                                                          the validity
                                                          of the token
                                                          provided in
                                                          the request.<u></=
u><u></u></p>
                                                          </div>
                                                          <div>
                                                          <p class=3D"MsoNo=
rmal"><u></u>=A0<u></u></p>
                                                          </div>
                                                          <div>
                                                          <p class=3D"MsoNo=
rmal">Validation=A0criteria
                                                          depends on the
                                                          token and well
                                                          as token type
                                                          ( Bearer,
                                                          MAC..).<u></u><u>=
</u></p>
                                                          </div>
                                                          <div>
                                                          <p class=3D"MsoNo=
rmal"><u></u>=A0<u></u></p>
                                                          </div>
                                                          <div>
                                                          <p class=3D"MsoNo=
rmal">In
                                                          the spec it
                                                          seems like
                                                          it&#39;s coupled
                                                          with Bearer
                                                          token type...
                                                          But I guess,
                                                          by adding
                                                          &quot;token_type&=
quot;
                                                          to the request
                                                          we can remove
                                                          this
                                                          dependency.<u></u=
><u></u></p>
                                                          </div>
                                                          <div>
                                                          <p class=3D"MsoNo=
rmal"><u></u>=A0<u></u></p>
                                                          </div>
                                                          <div>
                                                          <p class=3D"MsoNo=
rmal">WDYT..?<u></u><u></u></p>
                                                          </div>
                                                          <div>
                                                          <p class=3D"MsoNo=
rmal"><u></u>=A0<u></u></p>
                                                          </div>
                                                          <div>
                                                          <p class=3D"MsoNo=
rmal">Thanks
                                                          &amp; regards,<u>=
</u><u></u></p>
                                                          </div>
                                                          <div>
                                                          <p class=3D"MsoNo=
rmal">-Prabath=A0<u></u><u></u></p>
                                                          </div>
                                                          <div>
                                                          <p class=3D"MsoNo=
rmal"><u></u>=A0<u></u></p>
                                                          <div>
                                                          <p class=3D"MsoNo=
rmal">On
                                                          Thu, Feb 7,
                                                          2013 at 12:54
                                                          AM, Justin
                                                          Richer &lt;<a hre=
f=3D"mailto:jricher@mitre.org" target=3D"_blank">jricher@mitre.org</a>&gt;
                                                          wrote:<u></u><u><=
/u></p>
                                                          <div>
                                                          <p class=3D"MsoNo=
rmal">Updated
                                                          introspection
                                                          draft based on
                                                          recent
                                                          comments.
                                                          Changes
                                                          include:<br>
                                                          <br>
                                                          =A0- &quot;scope&=
quot;
                                                          return
                                                          parameter now
                                                          follows
                                                          RFC6749 format
                                                          instead of
                                                          JSON array<br>
                                                          =A0- &quot;subjec=
t&quot;
                                                          -&gt; &quot;sub&q=
uot;,
                                                          and &quot;audienc=
e&quot;
                                                          -&gt; &quot;aud&q=
uot;,
                                                          to be parallel
                                                          with JWT
                                                          claims<br>
                                                          =A0- clarified
                                                          what happens
                                                          if the
                                                          authentication
                                                          is bad<br>
                                                          <br>
                                                          =A0-- Justin<u></=
u><u></u></p>
                                                          <div>
                                                          <p class=3D"MsoNo=
rmal"><br>
                                                          <br>
                                                          --------
                                                          Original
                                                          Message
                                                          -------- <u></u><=
u></u></p>
                                                          <table border=3D"=
0" cellpadding=3D"0" cellspacing=3D"0">
                                                          <tbody>
                                                          <tr>
                                                          <td style=3D"padd=
ing:0in 0in 0in 0in" nowrap valign=3D"top">
                                                          <p class=3D"MsoNo=
rmal" style=3D"text-align:right" align=3D"right"><b>Subject: <u></u><u></u>=
</b></p>
                                                          </td>
                                                          <td style=3D"padd=
ing:0in 0in 0in 0in">
                                                          <p class=3D"MsoNo=
rmal">New
                                                          Version
                                                          Notification
                                                          for
                                                          draft-richer-oaut=
h-introspection-02.txt<u></u><u></u></p>
                                                          </td>
                                                          </tr>
                                                          <tr>
                                                          <td style=3D"padd=
ing:0in 0in 0in 0in" nowrap valign=3D"top">
                                                          <p class=3D"MsoNo=
rmal" style=3D"text-align:right" align=3D"right"><b>Date: <u></u><u></u></b=
></p>
                                                          </td>
                                                          <td style=3D"padd=
ing:0in 0in 0in 0in">
                                                          <p class=3D"MsoNo=
rmal">Wed,
                                                          6 Feb 2013
                                                          11:24:20 -0800<u>=
</u><u></u></p>
                                                          </td>
                                                          </tr>
                                                          <tr>
                                                          <td style=3D"padd=
ing:0in 0in 0in 0in" nowrap valign=3D"top">
                                                          <p class=3D"MsoNo=
rmal" style=3D"text-align:right" align=3D"right"><b>From: <u></u><u></u></b=
></p>
                                                          </td>
                                                          <td style=3D"padd=
ing:0in 0in 0in 0in">
                                                          <p class=3D"MsoNo=
rmal"><a href=3D"mailto:internet-drafts@ietf.org" target=3D"_blank">&lt;int=
ernet-drafts@ietf.org&gt;</a><u></u><u></u></p>
                                                          </td>
                                                          </tr>
                                                          <tr>
                                                          <td style=3D"padd=
ing:0in 0in 0in 0in" nowrap valign=3D"top">
                                                          <p class=3D"MsoNo=
rmal" style=3D"text-align:right" align=3D"right"><b>To: <u></u><u></u></b><=
/p>
                                                          </td>
                                                          <td style=3D"padd=
ing:0in 0in 0in 0in">
                                                          <p class=3D"MsoNo=
rmal"><a href=3D"mailto:jricher@mitre.org" target=3D"_blank">&lt;jricher@mi=
tre.org&gt;</a><u></u><u></u></p>
                                                          </td>
                                                          </tr>
                                                          </tbody>
                                                          </table>
                                                          <p class=3D"MsoNo=
rmal" style=3D"margin-bottom:12.0pt"><u></u>=A0<u></u></p>
                                                          <pre>A new versio=
n of I-D, draft-richer-oauth-introspection-02.txt<u></u><u></u></pre>
                                                          <pre>has been suc=
cessfully submitted by Justin Richer and posted to the<u></u><u></u></pre>
                                                          <pre>IETF reposit=
ory.<u></u><u></u></pre>
                                                          <pre><u></u>=A0<u=
></u></pre>
                                                          <pre>Filename:=A0=
=A0=A0=A0=A0  draft-richer-oauth-introspection<u></u><u></u></pre>
                                                          <pre>Revision:=A0=
=A0=A0=A0=A0  02<u></u><u></u></pre>
                                                          <pre>Title:=A0=A0=
=A0=A0=A0 =A0=A0=A0=A0=A0  OAuth Token Introspection<u></u><u></u></pre>
                                                          <pre>Creation dat=
e:=A0=A0=A0=A0=A0  2013-02-06<u></u><u></u></pre>
                                                          <pre>WG ID:=A0=A0=
=A0=A0=A0 =A0=A0=A0=A0=A0  Individual Submission<u></u><u></u></pre>
                                                          <pre>Number of pa=
ges: 6<u></u><u></u></pre>
                                                          <pre>URL:=A0=A0=
=A0=A0=A0=A0=A0=A0=A0=A0=A0 =A0<a href=3D"http://www.ietf.org/internet-draf=
ts/draft-richer-oauth-introspection-02.txt" target=3D"_blank">http://www.ie=
tf.org/internet-drafts/draft-richer-oauth-introspection-02.txt</a><u></u><u=
></u></pre>

                                                          <pre>Status:=A0=
=A0=A0=A0=A0=A0=A0=A0 =A0<a href=3D"http://datatracker.ietf.org/doc/draft-r=
icher-oauth-introspection" target=3D"_blank">http://datatracker.ietf.org/do=
c/draft-richer-oauth-introspection</a><u></u><u></u></pre>

                                                          <pre>Htmlized:=A0=
=A0=A0=A0=A0=A0 =A0<a href=3D"http://tools.ietf.org/html/draft-richer-oauth=
-introspection-02" target=3D"_blank">http://tools.ietf.org/html/draft-riche=
r-oauth-introspection-02</a><u></u><u></u></pre>

                                                          <pre>Diff:=A0=A0=
=A0=A0=A0=A0=A0=A0=A0=A0 =A0<a href=3D"http://www.ietf.org/rfcdiff?url2=3Dd=
raft-richer-oauth-introspection-02" target=3D"_blank">http://www.ietf.org/r=
fcdiff?url2=3Ddraft-richer-oauth-introspection-02</a><u></u><u></u></pre>

                                                          <pre><u></u>=A0<u=
></u></pre>
                                                          <pre>Abstract:<u>=
</u><u></u></pre>
                                                          <pre>=A0=A0 This =
specification defines a method for a client or protected<u></u><u></u></pre=
>
                                                          <pre>=A0=A0 resou=
rce to query an OAuth authorization server to determine meta-<u></u><u></u>=
</pre>
                                                          <pre>=A0=A0 infor=
mation about an OAuth token.<u></u><u></u></pre>
                                                          <pre><u></u>=A0<u=
></u></pre>
                                                          <pre><u></u>=A0<u=
></u></pre>
                                                          <pre>=A0=A0=A0=A0=
=A0=A0=A0=A0=A0=A0=A0=A0=A0=A0=A0=A0=A0=A0=A0=A0=A0=A0=A0=A0=A0=A0=A0=A0=A0=
=A0=A0=A0=A0=A0=A0=A0=A0=A0=A0=A0=A0=A0=A0=A0=A0=A0=A0=A0=A0=A0=A0=A0=A0=A0=
=A0=A0=A0=A0=A0=A0=A0=A0=A0=A0=A0=A0=A0=A0=A0=A0=A0=A0=A0=A0=A0=A0=A0=A0=A0=
=A0=A0 <u></u><u></u></pre>
                                                          <pre><u></u>=A0<u=
></u></pre>
                                                          <pre><u></u>=A0<u=
></u></pre>
                                                          <pre>The IETF Sec=
retariat<u></u><u></u></pre>
                                                          <pre><u></u>=A0<u=
></u></pre>
                                                          <p class=3D"MsoNo=
rmal"><u></u>=A0<u></u></p>
                                                          </div>
                                                          <p class=3D"MsoNo=
rmal"><u></u>=A0<u></u></p>
                                                          </div>
                                                          <p class=3D"MsoNo=
rmal" style=3D"margin-bottom:12.0pt"><br>
_______________________________________________<br>
                                                          OAuth mailing
                                                          list<br>
                                                          <a href=3D"mailto=
:OAuth@ietf.org" target=3D"_blank">OAuth@ietf.org</a><br>
                                                          <a href=3D"https:=
//www.ietf.org/mailman/listinfo/oauth" target=3D"_blank">https://www.ietf.o=
rg/mailman/listinfo/oauth</a><u></u><u></u></p>
                                                          </div>
                                                          <p class=3D"MsoNo=
rmal"><br>
                                                          <br clear=3D"all"=
>
                                                          <u></u><u></u></p=
>
                                                          <div>
                                                          <p class=3D"MsoNo=
rmal"><u></u>=A0<u></u></p>
                                                          </div>
                                                          <p class=3D"MsoNo=
rmal">--
                                                          <br>
                                                          Thanks &amp;
                                                          Regards,<br>
                                                          Prabath <u></u><u=
></u></p>
                                                          <div>
                                                          <p class=3D"MsoNo=
rmal"><u></u>=A0<u></u></p>
                                                          </div>
                                                          <div>
                                                          <p class=3D"MsoNo=
rmal">Mobile
                                                          : <a href=3D"tel:=
%2B94%2071%20809%206732" target=3D"_blank">+94 71 809 6732</a>=A0<br>
                                                          <br>
                                                          <a href=3D"http:/=
/blog.facilelogin.com" target=3D"_blank">http://blog.facilelogin.com</a><br=
>
                                                          <a href=3D"http:/=
/RampartFAQ.com" target=3D"_blank">http://RampartFAQ.com</a><u></u><u></u><=
/p>
                                                          </div>
                                                          </div>
                                                          </blockquote>
                                                          <p class=3D"MsoNo=
rmal"><u></u>=A0<u></u></p>
                                                          </div>
                                                          </div>
                                                          </div>
                                                          </div>
                                                          <p class=3D"MsoNo=
rmal"><br>
                                                          <br clear=3D"all"=
>
                                                          <u></u><u></u></p=
>
                                                          <div>
                                                          <p class=3D"MsoNo=
rmal"><u></u>=A0<u></u></p>
                                                          </div>
                                                          <p class=3D"MsoNo=
rmal">--
                                                          <br>
                                                          Thanks &amp;
                                                          Regards,<br>
                                                          Prabath <u></u><u=
></u></p>
                                                          <div>
                                                          <p class=3D"MsoNo=
rmal"><u></u>=A0<u></u></p>
                                                          </div>
                                                          <div>
                                                          <p class=3D"MsoNo=
rmal">Mobile
                                                          : <a href=3D"tel:=
%2B94%2071%20809%206732" target=3D"_blank">+94 71 809 6732</a>=A0<br>
                                                          <br>
                                                          <a href=3D"http:/=
/blog.facilelogin.com" target=3D"_blank">http://blog.facilelogin.com</a><br=
>
                                                          <a href=3D"http:/=
/RampartFAQ.com" target=3D"_blank">http://RampartFAQ.com</a><u></u><u></u><=
/p>
                                                          </div>
                                                          </div>
                                                          </blockquote>
                                                          <p class=3D"MsoNo=
rmal"><u></u>=A0<u></u></p>
                                                          </div>
                                                          </div>
                                                          </div>
                                                          </div>
                                                          <p class=3D"MsoNo=
rmal"><br>
                                                          <br clear=3D"all"=
>
                                                          <u></u><u></u></p=
>
                                                          <div>
                                                          <p class=3D"MsoNo=
rmal"><u></u>=A0<u></u></p>
                                                          </div>
                                                          <p class=3D"MsoNo=
rmal">--
                                                          <br>
                                                          Thanks &amp;
                                                          Regards,<br>
                                                          Prabath <u></u><u=
></u></p>
                                                          <div>
                                                          <p class=3D"MsoNo=
rmal"><u></u>=A0<u></u></p>
                                                          </div>
                                                          <div>
                                                          <p class=3D"MsoNo=
rmal">Mobile
                                                          : <a href=3D"tel:=
%2B94%2071%20809%206732" target=3D"_blank">+94 71 809 6732</a>=A0<br>
                                                          <br>
                                                          <a href=3D"http:/=
/blog.facilelogin.com" target=3D"_blank">http://blog.facilelogin.com</a><br=
>
                                                          <a href=3D"http:/=
/RampartFAQ.com" target=3D"_blank">http://RampartFAQ.com</a><u></u><u></u><=
/p>
                                                          </div>
                                                          </div>
                                                          <p class=3D"MsoNo=
rmal"><u></u>=A0<u></u></p>
                                                          </div>
                                                          </div>
                                                          </div>
                                                          </div>
                                                          <p class=3D"MsoNo=
rmal"><br>
                                                          <br clear=3D"all"=
>
                                                          <u></u><u></u></p=
>
                                                          <div>
                                                          <p class=3D"MsoNo=
rmal"><u></u>=A0<u></u></p>
                                                          </div>
                                                          <p class=3D"MsoNo=
rmal">--
                                                          <br>
                                                          Thanks &amp;
                                                          Regards,<br>
                                                          Prabath <u></u><u=
></u></p>
                                                          <div>
                                                          <p class=3D"MsoNo=
rmal"><u></u>=A0<u></u></p>
                                                          </div>
                                                          <div>
                                                          <p class=3D"MsoNo=
rmal">Mobile
                                                          : <a href=3D"tel:=
%2B94%2071%20809%206732" target=3D"_blank">+94 71 809 6732</a>=A0<br>
                                                          <br>
                                                          <a href=3D"http:/=
/blog.facilelogin.com" target=3D"_blank">http://blog.facilelogin.com</a><br=
>
                                                          <a href=3D"http:/=
/RampartFAQ.com" target=3D"_blank">http://RampartFAQ.com</a><u></u><u></u><=
/p>
                                                          </div>
                                                          </div>
                                                          </div>
                                                          </blockquote>
                                                          <blockquote style=
=3D"margin-top:5.0pt;margin-bottom:5.0pt">
                                                          <div>
                                                          <p class=3D"MsoNo=
rmal">_______________________________________________<br>
                                                          OAuth mailing
                                                          list<br>
                                                          <a href=3D"mailto=
:OAuth@ietf.org" target=3D"_blank">OAuth@ietf.org</a><br>
                                                          <a href=3D"https:=
//www.ietf.org/mailman/listinfo/oauth" target=3D"_blank">https://www.ietf.o=
rg/mailman/listinfo/oauth</a><u></u><u></u></p>
                                                          </div>
                                                          </blockquote>
                                                          </blockquote>
                                                          <p class=3D"MsoNo=
rmal"><u></u>=A0<u></u></p>
                                                          </div>
                                                          </div>
                                                          </div>
                                                          </div>
                                                          <p class=3D"MsoNo=
rmal"><br>
                                                          <br clear=3D"all"=
>
                                                          <u></u><u></u></p=
>
                                                          <div>
                                                          <p class=3D"MsoNo=
rmal"><u></u>=A0<u></u></p>
                                                          </div>
                                                          <p class=3D"MsoNo=
rmal">--
                                                          <br>
                                                          Thanks &amp;
                                                          Regards,<br>
                                                          Prabath <u></u><u=
></u></p>
                                                          <div>
                                                          <p class=3D"MsoNo=
rmal"><u></u>=A0<u></u></p>
                                                          </div>
                                                          <div>
                                                          <p class=3D"MsoNo=
rmal">Mobile
                                                          : <a href=3D"tel:=
%2B94%2071%20809%206732" target=3D"_blank">+94 71 809 6732</a>=A0<br>
                                                          <br>
                                                          <a href=3D"http:/=
/blog.facilelogin.com" target=3D"_blank">http://blog.facilelogin.com</a><br=
>
                                                          <a href=3D"http:/=
/RampartFAQ.com" target=3D"_blank">http://RampartFAQ.com</a><u></u><u></u><=
/p>
                                                          </div>
                                                          </div>
                                                          </div>
                                                          </div>
                                                          </div>
                                                          <p class=3D"MsoNo=
rmal"><br>
                                                          <br clear=3D"all"=
>
                                                          <u></u><u></u></p=
>
                                                          <div>
                                                          <p class=3D"MsoNo=
rmal"><u></u>=A0<u></u></p>
                                                          </div>
                                                          <p class=3D"MsoNo=
rmal">--
                                                          <br>
                                                          Thanks &amp;
                                                          Regards,<br>
                                                          Prabath <u></u><u=
></u></p>
                                                          <div>
                                                          <p class=3D"MsoNo=
rmal"><u></u>=A0<u></u></p>
                                                          </div>
                                                          <div>
                                                          <p class=3D"MsoNo=
rmal">Mobile
                                                          : <a href=3D"tel:=
%2B94%2071%20809%206732" target=3D"_blank">+94 71 809 6732</a>=A0<br>
                                                          <br>
                                                          <a href=3D"http:/=
/blog.facilelogin.com" target=3D"_blank">http://blog.facilelogin.com</a><br=
>
                                                          <a href=3D"http:/=
/RampartFAQ.com" target=3D"_blank">http://RampartFAQ.com</a><u></u><u></u><=
/p>
                                                          </div>
                                                          </div>
                                                          </blockquote>
                                                          <p class=3D"MsoNo=
rmal"><u></u>=A0<u></u></p>
                                                          </div>
                                                          </div>
                                                        </div>
                                                      </div>
                                                      <p class=3D"MsoNormal=
"><br>
                                                        <br clear=3D"all">
                                                        <u></u><u></u></p>
                                                      <div>
                                                        <p class=3D"MsoNorm=
al"><u></u>=A0<u></u></p>
                                                      </div>
                                                      <p class=3D"MsoNormal=
">--
                                                        <br>
                                                        Thanks &amp;
                                                        Regards,<br>
                                                        Prabath <u></u><u><=
/u></p>
                                                      <div>
                                                        <p class=3D"MsoNorm=
al"><u></u>=A0<u></u></p>
                                                      </div>
                                                      <div>
                                                        <p class=3D"MsoNorm=
al">Mobile
                                                          : <a href=3D"tel:=
%2B94%2071%20809%206732" target=3D"_blank">+94 71 809 6732</a>=A0<br>
                                                          <br>
                                                          <a href=3D"http:/=
/blog.facilelogin.com" target=3D"_blank">http://blog.facilelogin.com</a><br=
>
                                                          <a href=3D"http:/=
/RampartFAQ.com" target=3D"_blank">http://RampartFAQ.com</a><u></u><u></u><=
/p>
                                                      </div>
                                                    </div>
                                                  </div>
                                                </div>
                                              </div>
                                              <p class=3D"MsoNormal"><br>
                                                <br clear=3D"all">
                                                <u></u><u></u></p>
                                              <div>
                                                <p class=3D"MsoNormal"><u><=
/u>=A0<u></u></p>
                                              </div>
                                              <p class=3D"MsoNormal">-- <br=
>
                                                Thanks &amp; Regards,<br>
                                                Prabath <u></u><u></u></p>
                                              <div>
                                                <p class=3D"MsoNormal"><u><=
/u>=A0<u></u></p>
                                              </div>
                                              <div>
                                                <p class=3D"MsoNormal">Mobi=
le
                                                  : <a href=3D"tel:%2B94%20=
71%20809%206732" target=3D"_blank">+94 71 809 6732</a>=A0<br>
                                                  <br>
                                                  <a href=3D"http://blog.fa=
cilelogin.com" target=3D"_blank">http://blog.facilelogin.com</a><br>
                                                  <a href=3D"http://Rampart=
FAQ.com" target=3D"_blank">http://RampartFAQ.com</a><u></u><u></u></p>
                                              </div>
                                            </div>
                                          </blockquote>
                                          <p class=3D"MsoNormal"><u></u>=A0=
<u></u></p>
                                        </div>
                                      </div>
                                    </div>
                                  </div>
                                  <p class=3D"MsoNormal"><br>
                                    <br clear=3D"all">
                                    <u></u><u></u></p>
                                  <div>
                                    <p class=3D"MsoNormal"><u></u>=A0<u></u=
></p>
                                  </div>
                                  <p class=3D"MsoNormal">-- <br>
                                    Thanks &amp; Regards,<br>
                                    Prabath <u></u><u></u></p>
                                  <div>
                                    <p class=3D"MsoNormal"><u></u>=A0<u></u=
></p>
                                  </div>
                                  <div>
                                    <p class=3D"MsoNormal">Mobile : <a href=
=3D"tel:%2B94%2071%20809%206732" target=3D"_blank">+94 71 809 6732</a>=A0<b=
r>
                                      <br>
                                      <a href=3D"http://blog.facilelogin.co=
m" target=3D"_blank">http://blog.facilelogin.com</a><br>
                                      <a href=3D"http://RampartFAQ.com" tar=
get=3D"_blank">http://RampartFAQ.com</a><u></u><u></u></p>
                                  </div>
                                </div>
                              </blockquote>
                              <p class=3D"MsoNormal"><u></u>=A0<u></u></p>
                            </div>
                          </div>
                        </div>
                      </div>
                      <p class=3D"MsoNormal"><br>
                        <br clear=3D"all">
                        <u></u><u></u></p>
                      <div>
                        <p class=3D"MsoNormal"><u></u>=A0<u></u></p>
                      </div>
                      <p class=3D"MsoNormal">-- <br>
                        Thanks &amp; Regards,<br>
                        Prabath <u></u><u></u></p>
                      <div>
                        <p class=3D"MsoNormal"><u></u>=A0<u></u></p>
                      </div>
                      <div>
                        <p class=3D"MsoNormal">Mobile : <a href=3D"tel:%2B9=
4%2071%20809%206732" target=3D"_blank">+94 71 809 6732</a>=A0<br>
                          <br>
                          <a href=3D"http://blog.facilelogin.com" target=3D=
"_blank">http://blog.facilelogin.com</a><br>
                          <a href=3D"http://RampartFAQ.com" target=3D"_blan=
k">http://RampartFAQ.com</a><u></u><u></u></p>
                      </div>
                    </div>
                    <p class=3D"MsoNormal"><u></u>=A0<u></u></p>
                  </div>
                </div>
              </div>
            </div>
            <p class=3D"MsoNormal"><br>
              <br clear=3D"all">
              <u></u><u></u></p>
            <div>
              <p class=3D"MsoNormal"><u></u>=A0<span class=3D"HOEnZb"><font=
 color=3D"#888888"><u></u></font></span></p><span class=3D"HOEnZb"><font co=
lor=3D"#888888">
            </font></span></div><span class=3D"HOEnZb"><font color=3D"#8888=
88">
            <p class=3D"MsoNormal">-- <br>
              Thanks &amp; Regards,<br>
              Prabath <u></u><u></u></p>
            <div>
              <p class=3D"MsoNormal"><u></u>=A0<u></u></p>
            </div>
            <div>
              <p class=3D"MsoNormal">Mobile : <a href=3D"tel:%2B94%2071%208=
09%206732" value=3D"+94718096732" target=3D"_blank">+94 71 809 6732</a>=A0<=
br>
                <br>
                <a href=3D"http://blog.facilelogin.com" target=3D"_blank">h=
ttp://blog.facilelogin.com</a><br>
                <a href=3D"http://RampartFAQ.com" target=3D"_blank">http://=
RampartFAQ.com</a><u></u><u></u></p>
            </div>
          </font></span></div><span class=3D"HOEnZb"><font color=3D"#888888=
">
        </font></span></blockquote><span class=3D"HOEnZb"><font color=3D"#8=
88888">
        <p class=3D"MsoNormal"><u></u>=A0<u></u></p>
      </font></span></div>
    </blockquote>
    <br>
  </div>

</blockquote></div><br><br clear=3D"all"><div><br></div>-- <br>Thanks &amp;=
 Regards,<br>Prabath<div><br></div><div>Mobile : +94 71 809 6732=A0<br><br>=
<a href=3D"http://blog.facilelogin.com" target=3D"_blank">http://blog.facil=
elogin.com</a><br>
<a href=3D"http://RampartFAQ.com" target=3D"_blank">http://RampartFAQ.com</=
a></div>
</div>

--047d7b343a9e971d2f04d5b601ea--

From Michael.Jones@microsoft.com  Thu Feb 14 13:44:44 2013
Return-Path: <Michael.Jones@microsoft.com>
X-Original-To: oauth@ietfa.amsl.com
Delivered-To: oauth@ietfa.amsl.com
Received: from localhost (localhost [127.0.0.1]) by ietfa.amsl.com (Postfix) with ESMTP id 8EAC121F855C for <oauth@ietfa.amsl.com>; Thu, 14 Feb 2013 13:44:43 -0800 (PST)
X-Virus-Scanned: amavisd-new at amsl.com
X-Spam-Flag: NO
X-Spam-Score: -2.585
X-Spam-Level: 
X-Spam-Status: No, score=-2.585 tagged_above=-999 required=5 tests=[AWL=0.014,  BAYES_00=-2.599]
Received: from mail.ietf.org ([64.170.98.30]) by localhost (ietfa.amsl.com [127.0.0.1]) (amavisd-new, port 10024) with ESMTP id BfHnVRpkzEwx for <oauth@ietfa.amsl.com>; Thu, 14 Feb 2013 13:44:41 -0800 (PST)
Received: from na01-bl2-obe.outbound.protection.outlook.com (na01-bl2-obe.ptr.protection.outlook.com [65.55.169.26]) by ietfa.amsl.com (Postfix) with ESMTP id 7ACE721F84C7 for <oauth@ietf.org>; Thu, 14 Feb 2013 13:44:40 -0800 (PST)
Received: from BL2FFO11FD022.protection.gbl (10.173.161.202) by BL2FFO11HUB003.protection.gbl (10.173.161.21) with Microsoft SMTP Server (TLS) id 15.0.620.12; Thu, 14 Feb 2013 21:44:31 +0000
Received: from TK5EX14HUBC107.redmond.corp.microsoft.com (131.107.125.37) by BL2FFO11FD022.mail.protection.outlook.com (10.173.161.101) with Microsoft SMTP Server (TLS) id 15.0.620.12 via Frontend Transport; Thu, 14 Feb 2013 21:44:31 +0000
Received: from TK5EX14MBXC285.redmond.corp.microsoft.com ([169.254.3.232]) by TK5EX14HUBC107.redmond.corp.microsoft.com ([157.54.80.67]) with mapi id 14.02.0318.003; Thu, 14 Feb 2013 21:44:11 +0000
From: Mike Jones <Michael.Jones@microsoft.com>
To: Justin Richer <jricher@mitre.org>, Phil Hunt <phil.hunt@oracle.com>
Thread-Topic: [OAUTH-WG] Minutes from the OAuth Design Team Conference Call - 11th February 2013
Thread-Index: AQHOCUdbOV5B7lAK3kmkqyu4eMgvZZh55eFg
Date: Thu, 14 Feb 2013 21:44:10 +0000
Message-ID: <4E1F6AAD24975D4BA5B16804296739436744BD23@TK5EX14MBXC285.redmond.corp.microsoft.com>
References: <0573984A-8C11-4960-9BC6-F44D4B664C19@gmx.net> <E808B6AC-D5F6-479F-967D-EA6B2586BE64@oracle.com> <511A7D27.8010209@mitre.org>
In-Reply-To: <511A7D27.8010209@mitre.org>
Accept-Language: en-US
Content-Language: en-US
X-MS-Has-Attach: 
X-MS-TNEF-Correlator: 
x-originating-ip: [157.54.51.71]
Content-Type: text/plain; charset="us-ascii"
Content-Transfer-Encoding: quoted-printable
MIME-Version: 1.0
X-Forefront-Antispam-Report: CIP:131.107.125.37; CTRY:US; IPV:CAL; IPV:NLI; EFV:NLI; SFV:NSPM; SFS:(199002)(189002)(24454001)(377424002)(377454001)(479174001)(13464002)(51704002)(30513003)(52604002)(79102001)(53806001)(66066001)(63696002)(80022001)(31966008)(15202345001)(47736001)(47446002)(65816001)(33656001)(55846006)(20776003)(56776001)(46406002)(5343655001)(15974865001)(51856001)(49866001)(5343635001)(74502001)(4396001)(47976001)(77982001)(47776003)(74662001)(50466001)(50986001)(56816002)(59766001)(54356001)(54316002)(46102001)(23726001)(16406001)(76482001)(44976002); DIR:OUT; SFP:; SCL:1; SRVR:BL2FFO11HUB003; H:TK5EX14HUBC107.redmond.corp.microsoft.com; RD:InfoDomainNonexistent; A:1; MX:1; LANG:en; 
X-OriginatorOrg: microsoft.onmicrosoft.com
X-Forefront-PRVS: 0757EEBDCA
Cc: IETF oauth WG <oauth@ietf.org>
Subject: Re: [OAUTH-WG] Minutes from the OAuth Design Team Conference Call - 11th February 2013
X-BeenThere: oauth@ietf.org
X-Mailman-Version: 2.1.12
Precedence: list
List-Id: OAUTH WG <oauth.ietf.org>
List-Unsubscribe: <https://www.ietf.org/mailman/options/oauth>, <mailto:oauth-request@ietf.org?subject=unsubscribe>
List-Archive: <http://www.ietf.org/mail-archive/web/oauth>
List-Post: <mailto:oauth@ietf.org>
List-Help: <mailto:oauth-request@ietf.org?subject=help>
List-Subscribe: <https://www.ietf.org/mailman/listinfo/oauth>, <mailto:oauth-request@ietf.org?subject=subscribe>
X-List-Received-Date: Thu, 14 Feb 2013 21:44:44 -0000

I'm in favor of reusing the JWT work that this WG is also doing. :-)

I'm pretty skeptical of us inventing another custom scheme for signing HTTP=
 headers.  That was the impediment to OAuth 1.0 adoption that OAuth 2.0 sol=
ved in the first place.

				-- Mike

-----Original Message-----
From: oauth-bounces@ietf.org [mailto:oauth-bounces@ietf.org] On Behalf Of J=
ustin Richer
Sent: Tuesday, February 12, 2013 9:35 AM
To: Phil Hunt
Cc: IETF oauth WG
Subject: Re: [OAUTH-WG] Minutes from the OAuth Design Team Conference Call =
- 11th February 2013

That's my reading of it as well, Phil, thanks for providing the clarificati=
on. One motivator behind using a JSON-based token is to be able to re-use s=
ome of the great work that the JOSE group is doing but apply it to an HTTP =
payload.

What neither of us want is a token type that requires stuffing all query, h=
eader, and other parameters *into* the JSON object itself, which would be a=
 more SOAPy approach.

  -- Justin

On 02/12/2013 12:30 PM, Phil Hunt wrote:
> Clarification.  I think Justin and I were in agreement that we don't want=
 to see a format that requires JSON payloads.  We are both interested in a =
JSON token used in the authorization header that could be based on a comput=
ed signature of some combination of http headers and body if possible.
>
> Phil
>
> @independentid
> www.independentid.com
> phil.hunt@oracle.com
>
>
>
>
>
> On 2013-02-12, at 1:10 AM, Hannes Tschofenig wrote:
>
>> Here are my notes.
>>
>> Participants:
>>
>> * John Bradley
>> * Derek Atkins
>> * Phil Hunt
>> * Prateek Mishra
>> * Hannes Tschofenig
>> * Mike Jones
>> * Antonio Sanso
>> * Justin Richer
>>
>> Notes:
>>
>> My slides are available here:=20
>> http://www.tschofenig.priv.at/OAuth2-Security-11Feb2013.ppt
>>
>> Slide #2 summarizes earlier discussions during the conference calls.
>>
>> -- HTTP vs. JSON
>>
>> Phil noted that he does not like to use the MAC Token draft as a startin=
g point because it does not re-use any of the work done in the JOSE working=
 group and in particular all the libraries that are available today. He men=
tioned that earlier attempts to write the MAC Token code lead to problems f=
or implementers.
>>
>> Justin responded that he does not agree with using JSON as a transport m=
echanism since this would replicate a SOAP style.
>>
>> Phil noted that he wants to send JSON but the signature shall be compute=
d over the HTTP header field.
>>
>> -- Flexibility for the keyed message digest computation
>>
>>  From earlier discussion it was clear that the conference call participa=
nts wanted more flexibility regarding the keyed message digest computation.=
 For this purpose Hannes presented the DKIM based approach, which allows se=
lective header fields to be included in the digest. This is shown in slide =
#4.
>>
>> After some discussion the conference call participants thought that this=
 would meet their needs. Further investigations would still be useful to de=
termine the degree of failed HMAC calculations due to HTTP proxies modifyin=
g the content.
>>
>> -- Key Distribution
>>
>> Hannes presented the open issue regarding the choice of key=20
>> distribution. Slides #6-#8 present three techniques and Hannes asked=20
>> for feedback regarding the preferred style. Justin and others didn't=20
>> see the need to decide on one mechanism - they wanted to keep the=20
>> choice open. Derek indicated that this will not be an acceptable=20
>> approach. Since the resource server and the authorization server may,=20
>> in the OAuth 2.0 framework, be entities produced by different vendors=20
>> there is an interoperability need. Justin responded that he disagrees=20
>> and that the resource server needs to understand the access token and=20
>> referred to the recent draft submission for the token introspection=20
>> endpoint. Derek indicated that the resource server has to understand=20
>> the content of the access token and the token introspection endpoint=20
>> just pushes the problem around: the resource server has to send the=20
>> access token to the authorization server and then the resource server=20
>> gets the result back (which he the
 n
>    a
>> gain needs to understand) in order to make a meaningful authorization de=
cision.
>>
>> Everyone agreed that the client must receive the session key from the au=
thorization server and that this approach has to be standardized. It was al=
so agreed that this is a common approach among all three key distribution m=
echanisms.
>>
>> Hannes asked the participants to think about their preference.
>>
>> The questions regarding key naming and the indication for the intended r=
esource server the client wants to talk to have been postponed.
>>
>> Ciao
>> Hannes
>>
>>
>> _______________________________________________
>> OAuth mailing list
>> OAuth@ietf.org
>> https://www.ietf.org/mailman/listinfo/oauth
> _______________________________________________
> OAuth mailing list
> OAuth@ietf.org
> https://www.ietf.org/mailman/listinfo/oauth


_______________________________________________
OAuth mailing list
OAuth@ietf.org
https://www.ietf.org/mailman/listinfo/oauth

From wmills_92105@yahoo.com  Thu Feb 14 17:31:41 2013
Return-Path: <wmills_92105@yahoo.com>
X-Original-To: oauth@ietfa.amsl.com
Delivered-To: oauth@ietfa.amsl.com
Received: from localhost (localhost [127.0.0.1]) by ietfa.amsl.com (Postfix) with ESMTP id 9C91721F866F for <oauth@ietfa.amsl.com>; Thu, 14 Feb 2013 17:31:41 -0800 (PST)
X-Virus-Scanned: amavisd-new at amsl.com
X-Spam-Flag: NO
X-Spam-Score: -2.192
X-Spam-Level: 
X-Spam-Status: No, score=-2.192 tagged_above=-999 required=5 tests=[AWL=0.406,  BAYES_00=-2.599, HTML_MESSAGE=0.001]
Received: from mail.ietf.org ([64.170.98.30]) by localhost (ietfa.amsl.com [127.0.0.1]) (amavisd-new, port 10024) with ESMTP id zIUZdJGZ8I8z for <oauth@ietfa.amsl.com>; Thu, 14 Feb 2013 17:31:40 -0800 (PST)
Received: from nm34-vm5.bullet.mail.ne1.yahoo.com (nm34-vm5.bullet.mail.ne1.yahoo.com [98.138.229.85]) by ietfa.amsl.com (Postfix) with ESMTP id 1D26F21F8654 for <oauth@ietf.org>; Thu, 14 Feb 2013 17:31:40 -0800 (PST)
Received: from [98.138.90.49] by nm34.bullet.mail.ne1.yahoo.com with NNFMP; 15 Feb 2013 01:31:39 -0000
Received: from [98.138.89.174] by tm2.bullet.mail.ne1.yahoo.com with NNFMP; 15 Feb 2013 01:31:39 -0000
Received: from [127.0.0.1] by omp1030.mail.ne1.yahoo.com with NNFMP; 15 Feb 2013 01:31:39 -0000
X-Yahoo-Newman-Property: ymail-3
X-Yahoo-Newman-Id: 415033.12072.bm@omp1030.mail.ne1.yahoo.com
Received: (qmail 18835 invoked by uid 60001); 15 Feb 2013 01:31:39 -0000
DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=yahoo.com; s=s1024; t=1360891898; bh=U6HZpJ/bZRbUAvt6Op3gxHSmiRCqS0PFx46IKw1EEzQ=; h=X-YMail-OSG:Received:X-Rocket-MIMEInfo:X-Mailer:References:Message-ID:Date:From:Reply-To:Subject:To:Cc:In-Reply-To:MIME-Version:Content-Type; b=lo/m/q8hCvmA/NV3U5rVSHvoqdkWjMSCWUCt1uAWGOGZx3Y1t7draR5K8LIelA4JI505kKoBjjCV2tdutH1M3jqJOn+lLf4RRsH8t020xCUqGkVP6cDygHJPsqVEeK2h3lxncKdAcLrMq+ut/6zlEySaLG1TFlsXTH/jDxP0w1I=
DomainKey-Signature: a=rsa-sha1; q=dns; c=nofws; s=s1024; d=yahoo.com; h=X-YMail-OSG:Received:X-Rocket-MIMEInfo:X-Mailer:References:Message-ID:Date:From:Reply-To:Subject:To:Cc:In-Reply-To:MIME-Version:Content-Type; b=iO3R6ItvUg0bRI91bZMX9w352dILfesDfVu+5y9PLwlfMAX2tlDNMuE5z9pbu+ThbtkZZQ7tDrCSzJHe8PuVo3Mn3gysfK8mwZ2Map3JC77R8De4RoauKEUCfwLFNotibKZf9cTqPQ32aHbEYXtKDULP8Wz+CzoXrrPU3S/W+TI=;
X-YMail-OSG: e6DdfREVM1n_UXQ2UyYm0s2dZrRqV.wla6m1KQtCpy2L2T8 DCKqnNmGqErKKtDI5EIlCrrOxK3Z2ZTfDGswfLvhv.Ps06r6X5bO0BxxZa23 SxzjO6NwiS6fwFPMl9n8di0ndsB9uulYpqxrbTrtQ_8n4mspe.Q4cM59pUC8 _6wWyb37pVS1lQZyGJoxH6B3IfOM3O2Trx9IpwlHe7YX2VkTEPyWrGH3xmZz vB6fwlSCXa0lm6sVp5v_T6Kf_A76__Hq1Ky301DCRxMIEEjt7NOJ5kUHGzIc QenUCdUZs7qyBCqTly6oAKXEjyw0WTDsToTSh0OSazj8Vwg45DFYmXFtTvKP WI13VCJlimtL7bPA1w4_ETL89tT1CBNSyOkwGA4aRbUC9NiJn7XescC1._PC CFUkXeGVtwVWLdvZJV8k8E7epHd1rsGbgweqL.2if6ZnI7IjGhwXFS2tk1j5 RkrCji.23pGxtbVymb4GeAoARXrMzPG9KOPkLL6_kKSJOKcBn_zwRZTLn6iE UQcga0U6G6a6z2Z0xOhyn9XqWTuC.0X4UNQbYFc4kZYdtPMBm5wvM9DsJPp9 hCdL81zSpwgNN7Zr2N1lrZC1rfmsErT3PS0hGNf0svQsl6DB8yawBhPBIoow OYdrXX30PYaWXVZFb9HLhkU5I7V.yTIVzg.ZSTdlfZleENlUZeLGR1klC.0_ LGHUXLwC7MvSY.54_XvjM40c9Uj.9W4d.9dl.huhw7b0hsnQ-
Received: from [209.131.62.145] by web31811.mail.mud.yahoo.com via HTTP; Thu, 14 Feb 2013 17:31:37 PST
X-Rocket-MIMEInfo: 001.001, SSBkaXNhZ3JlZSB3aXRoICJUaGF0IHdhcyB0aGUgaW1wZWRpbWVudCB0byBPQXV0aCAxLjAgYWRvcHRpb24gdGhhdCBPQXV0aCAyLjAgc29sdmVkIGluIHRoZSBmaXJzdCBwbGFjZS4iLCB1bmxlc3MgInNvbHZpbmciIG1lYW5zIGRvZXMgbm90IGFkZHJlc3MgdGhlIG5lZWQgZm9yIGl0IGF0IGFsbC4KCk9BdXRoIDIgZG9lcyBzZXZlcmFsIGdvb2QgdGhpbmdzLCBidXQgaXQgc3RpbGwgbGFja3MgYSBkZWZpbmVkIHRva2VuIHR5cGUgdGhhdCBpcyBzYWZlIHRvIHVzZXIgb3ZlciBwbGFpbiB0ZXh0IEhUVFAuIAEwAQEBAQ--
X-Mailer: YahooMailWebService/0.8.134.513
References: <0573984A-8C11-4960-9BC6-F44D4B664C19@gmx.net> <E808B6AC-D5F6-479F-967D-EA6B2586BE64@oracle.com> <511A7D27.8010209@mitre.org> <4E1F6AAD24975D4BA5B16804296739436744BD23@TK5EX14MBXC285.redmond.corp.microsoft.com>
Message-ID: <1360891897.14004.YahooMailNeo@web31811.mail.mud.yahoo.com>
Date: Thu, 14 Feb 2013 17:31:37 -0800 (PST)
From: William Mills <wmills_92105@yahoo.com>
To: Mike Jones <Michael.Jones@microsoft.com>, Justin Richer <jricher@mitre.org>, Phil Hunt <phil.hunt@oracle.com>
In-Reply-To: <4E1F6AAD24975D4BA5B16804296739436744BD23@TK5EX14MBXC285.redmond.corp.microsoft.com>
MIME-Version: 1.0
Content-Type: multipart/alternative; boundary="764183289-1761209499-1360891897=:14004"
Cc: IETF oauth WG <oauth@ietf.org>
Subject: Re: [OAUTH-WG] Minutes from the OAuth Design Team Conference Call - 11th February 2013
X-BeenThere: oauth@ietf.org
X-Mailman-Version: 2.1.12
Precedence: list
Reply-To: William Mills <wmills_92105@yahoo.com>
List-Id: OAUTH WG <oauth.ietf.org>
List-Unsubscribe: <https://www.ietf.org/mailman/options/oauth>, <mailto:oauth-request@ietf.org?subject=unsubscribe>
List-Archive: <http://www.ietf.org/mail-archive/web/oauth>
List-Post: <mailto:oauth@ietf.org>
List-Help: <mailto:oauth-request@ietf.org?subject=help>
List-Subscribe: <https://www.ietf.org/mailman/listinfo/oauth>, <mailto:oauth-request@ietf.org?subject=subscribe>
X-List-Received-Date: Fri, 15 Feb 2013 01:31:41 -0000

--764183289-1761209499-1360891897=:14004
Content-Type: text/plain; charset=iso-8859-1
Content-Transfer-Encoding: quoted-printable

I disagree with "That was the impediment to OAuth 1.0 adoption that OAuth 2=
.0 solved in the first place.", unless "solving" means does not address the=
 need for it at all.=0A=0AOAuth 2 does several good things, but it still la=
cks a defined token type that is safe to user over plain text HTTP. =A01.0a=
 solved that.=0A=0A=0A________________________________=0A From: Mike Jones =
<Michael.Jones@microsoft.com>=0ATo: Justin Richer <jricher@mitre.org>; Phil=
 Hunt <phil.hunt@oracle.com> =0ACc: IETF oauth WG <oauth@ietf.org> =0ASent:=
 Thursday, February 14, 2013 1:44 PM=0ASubject: Re: [OAUTH-WG] Minutes from=
 the OAuth Design Team Conference Call - 11th February 2013=0A =0AI'm in fa=
vor of reusing the JWT work that this WG is also doing. :-)=0A=0AI'm pretty=
 skeptical of us inventing another custom scheme for signing HTTP headers.=
=A0 That was the impediment to OAuth 1.0 adoption that OAuth 2.0 solved in =
the first place.=0A=0A=A0=A0=A0 =A0=A0=A0 =A0=A0=A0 =A0=A0=A0 -- Mike=0A=0A=
-----Original Message-----=0AFrom: oauth-bounces@ietf.org [mailto:oauth-bou=
nces@ietf.org] On Behalf Of Justin Richer=0ASent: Tuesday, February 12, 201=
3 9:35 AM=0ATo: Phil Hunt=0ACc: IETF oauth WG=0ASubject: Re: [OAUTH-WG] Min=
utes from the OAuth Design Team Conference Call - 11th February 2013=0A=0AT=
hat's my reading of it as well, Phil, thanks for providing the clarificatio=
n. One motivator behind using a JSON-based token is to be able to re-use so=
me of the great work that the JOSE group is doing but apply it to an HTTP p=
ayload.=0A=0AWhat neither of us want is a token type that requires stuffing=
 all query, header, and other parameters *into* the JSON object itself, whi=
ch would be a more SOAPy approach.=0A=0A=A0 -- Justin=0A=0AOn 02/12/2013 12=
:30 PM, Phil Hunt wrote:=0A> Clarification.=A0 I think Justin and I were in=
 agreement that we don't want to see a format that requires JSON payloads.=
=A0 We are both interested in a JSON token used in the authorization header=
 that could be based on a computed signature of some combination of http he=
aders and body if possible.=0A>=0A> Phil=0A>=0A> @independentid=0A> www.ind=
ependentid.com=0A> phil.hunt@oracle.com=0A>=0A>=0A>=0A>=0A>=0A> On 2013-02-=
12, at 1:10 AM, Hannes Tschofenig wrote:=0A>=0A>> Here are my notes.=0A>>=
=0A>> Participants:=0A>>=0A>> * John Bradley=0A>> * Derek Atkins=0A>> * Phi=
l Hunt=0A>> * Prateek Mishra=0A>> * Hannes Tschofenig=0A>> * Mike Jones=0A>=
> * Antonio Sanso=0A>> * Justin Richer=0A>>=0A>> Notes:=0A>>=0A>> My slides=
 are available here: =0A>> http://www.tschofenig.priv.at/OAuth2-Security-11=
Feb2013.ppt=0A>>=0A>> Slide #2 summarizes earlier discussions during the co=
nference calls.=0A>>=0A>> -- HTTP vs. JSON=0A>>=0A>> Phil noted that he doe=
s not like to use the MAC Token draft as a starting point because it does n=
ot re-use any of the work done in the JOSE working group and in particular =
all the libraries that are available today. He mentioned that earlier attem=
pts to write the MAC Token code lead to problems for implementers.=0A>>=0A>=
> Justin responded that he does not agree with using JSON as a transport me=
chanism since this would replicate a SOAP style.=0A>>=0A>> Phil noted that =
he wants to send JSON but the signature shall be computed over the HTTP hea=
der field.=0A>>=0A>> -- Flexibility for the keyed message digest computatio=
n=0A>>=0A>>=A0 From earlier discussion it was clear that the conference cal=
l participants wanted more flexibility regarding the keyed message digest c=
omputation. For this purpose Hannes presented the DKIM based approach, whic=
h allows selective header fields to be included in the digest. This is show=
n in slide #4.=0A>>=0A>> After some discussion the conference call particip=
ants thought that this would meet their needs. Further investigations would=
 still be useful to determine the degree of failed HMAC calculations due to=
 HTTP proxies modifying the content.=0A>>=0A>> -- Key Distribution=0A>>=0A>=
> Hannes presented the open issue regarding the choice of key =0A>> distrib=
ution. Slides #6-#8 present three techniques and Hannes asked =0A>> for fee=
dback regarding the preferred style. Justin and others didn't =0A>> see the=
 need to decide on one mechanism - they wanted to keep the =0A>> choice ope=
n. Derek indicated that this will not be an acceptable =0A>> approach. Sinc=
e the resource server and the authorization server may, =0A>> in the OAuth =
2.0 framework, be entities produced by different vendors =0A>> there is an =
interoperability need. Justin responded that he disagrees =0A>> and that th=
e resource server needs to understand the access token and =0A>> referred t=
o the recent draft submission for the token introspection =0A>> endpoint. D=
erek indicated that the resource server has to understand =0A>> the content=
 of the access token and the token introspection endpoint =0A>> just pushes=
 the problem around: the resource server has to send the =0A>> access token=
 to the authorization server and then the resource server =0A>> gets the re=
sult back (which he the=0An=0A>=A0 =A0 a=0A>> gain needs to understand) in =
order to make a meaningful authorization decision.=0A>>=0A>> Everyone agree=
d that the client must receive the session key from the authorization serve=
r and that this approach has to be standardized. It was also agreed that th=
is is a common approach among all three key distribution mechanisms.=0A>>=
=0A>> Hannes asked the participants to think about their preference.=0A>>=
=0A>> The questions regarding key naming and the indication for the intende=
d resource server the client wants to talk to have been postponed.=0A>>=0A>=
> Ciao=0A>> Hannes=0A>>=0A>>=0A>> _________________________________________=
______=0A>> OAuth mailing list=0A>> OAuth@ietf.org=0A>> https://www.ietf.or=
g/mailman/listinfo/oauth=0A> ______________________________________________=
_=0A> OAuth mailing list=0A> OAuth@ietf.org=0A> https://www.ietf.org/mailma=
n/listinfo/oauth=0A=0A=0A_______________________________________________=0A=
OAuth mailing list=0AOAuth@ietf.org=0Ahttps://www.ietf.org/mailman/listinfo=
/oauth=0A_______________________________________________=0AOAuth mailing li=
st=0AOAuth@ietf.org=0Ahttps://www.ietf.org/mailman/listinfo/oauth
--764183289-1761209499-1360891897=:14004
Content-Type: text/html; charset=iso-8859-1
Content-Transfer-Encoding: quoted-printable

<html><body><div style=3D"color:#000; background-color:#fff; font-family:Co=
urier New, courier, monaco, monospace, sans-serif;font-size:12pt"><div><spa=
n>I disagree with "</span><span style=3D"font-family: 'times new roman', 'n=
ew york', times, serif; font-size: 12pt;">That was the impediment to OAuth =
1.0 adoption that OAuth 2.0 solved in the first place.", unless "solving" m=
eans does not address the need for it at all.</span></div><div style=3D"col=
or: rgb(0, 0, 0); font-size: 12pt; font-family: 'times new roman', 'new yor=
k', times, serif; background-color: transparent; font-style: normal;"><span=
 style=3D"font-family: 'times new roman', 'new york', times, serif; font-si=
ze: 12pt;"><br></span></div><div style=3D"color: rgb(0, 0, 0); font-size: 1=
6px; font-family: 'times new roman', 'new york', times, serif; background-c=
olor: transparent; font-style: normal;"><span style=3D"font-family: 'times =
new roman', 'new york', times, serif; font-size: 12pt;">OAuth 2 does severa=
l
 good things, but it still lacks a defined token type that is safe to user =
over plain text HTTP. &nbsp;1.0a solved that.</span></div><div><br></div>  =
<div style=3D"font-family: 'Courier New', courier, monaco, monospace, sans-=
serif; font-size: 12pt;"> <div style=3D"font-family: 'times new roman', 'ne=
w york', times, serif; font-size: 12pt;"> <div dir=3D"ltr"> <font size=3D"2=
" face=3D"Arial"> <hr size=3D"1">  <b><span style=3D"font-weight:bold;">Fro=
m:</span></b> Mike Jones &lt;Michael.Jones@microsoft.com&gt;<br> <b><span s=
tyle=3D"font-weight: bold;">To:</span></b> Justin Richer &lt;jricher@mitre.=
org&gt;; Phil Hunt &lt;phil.hunt@oracle.com&gt; <br><b><span style=3D"font-=
weight: bold;">Cc:</span></b> IETF oauth WG &lt;oauth@ietf.org&gt; <br> <b>=
<span style=3D"font-weight: bold;">Sent:</span></b> Thursday, February 14, =
2013 1:44 PM<br> <b><span style=3D"font-weight: bold;">Subject:</span></b> =
Re: [OAUTH-WG] Minutes from the OAuth Design Team Conference Call - 11th Fe=
bruary 2013<br>
 </font> </div> <br>=0AI'm in favor of reusing the JWT work that this WG is=
 also doing. :-)<br><br>I'm pretty skeptical of us inventing another custom=
 scheme for signing HTTP headers.&nbsp; That was the impediment to OAuth 1.=
0 adoption that OAuth 2.0 solved in the first place.<br><br>&nbsp;&nbsp;&nb=
sp; &nbsp;&nbsp;&nbsp; &nbsp;&nbsp;&nbsp; &nbsp;&nbsp;&nbsp; -- Mike<br><br=
>-----Original Message-----<br>From: <a ymailto=3D"mailto:oauth-bounces@iet=
f.org" href=3D"mailto:oauth-bounces@ietf.org">oauth-bounces@ietf.org</a> [m=
ailto:<a ymailto=3D"mailto:oauth-bounces@ietf.org" href=3D"mailto:oauth-bou=
nces@ietf.org">oauth-bounces@ietf.org</a>] On Behalf Of Justin Richer<br>Se=
nt: Tuesday, February 12, 2013 9:35 AM<br>To: Phil Hunt<br>Cc: IETF oauth W=
G<br>Subject: Re: [OAUTH-WG] Minutes from the OAuth Design Team Conference =
Call - 11th February 2013<br><br>That's my reading of it as well, Phil, tha=
nks for providing the clarification. One motivator behind using a JSON-base=
d token is to be able to
 re-use some of the great work that the JOSE group is doing but apply it to=
 an HTTP payload.<br><br>What neither of us want is a token type that requi=
res stuffing all query, header, and other parameters *into* the JSON object=
 itself, which would be a more SOAPy approach.<br><br>&nbsp; -- Justin<br><=
br>On 02/12/2013 12:30 PM, Phil Hunt wrote:<br>&gt; Clarification.&nbsp; I =
think Justin and I were in agreement that we don't want to see a format tha=
t requires JSON payloads.&nbsp; We are both interested in a JSON token used=
 in the authorization header that could be based on a computed signature of=
 some combination of http headers and body if possible.<br>&gt;<br>&gt; Phi=
l<br>&gt;<br>&gt; @independentid<br>&gt; <a target=3D"_blank" href=3D"http:=
//www.independentid.com/">www.independentid.com</a><br>&gt; <a ymailto=3D"m=
ailto:phil.hunt@oracle.com" href=3D"mailto:phil.hunt@oracle.com">phil.hunt@=
oracle.com</a><br>&gt;<br>&gt;<br>&gt;<br>&gt;<br>&gt;<br>&gt; On
 2013-02-12, at 1:10 AM, Hannes Tschofenig wrote:<br>&gt;<br>&gt;&gt; Here =
are my notes.<br>&gt;&gt;<br>&gt;&gt; Participants:<br>&gt;&gt;<br>&gt;&gt;=
 * John Bradley<br>&gt;&gt; * Derek Atkins<br>&gt;&gt; * Phil Hunt<br>&gt;&=
gt; * Prateek Mishra<br>&gt;&gt; * Hannes Tschofenig<br>&gt;&gt; * Mike Jon=
es<br>&gt;&gt; * Antonio Sanso<br>&gt;&gt; * Justin Richer<br>&gt;&gt;<br>&=
gt;&gt; Notes:<br>&gt;&gt;<br>&gt;&gt; My slides are available here: <br>&g=
t;&gt; http://www.tschofenig.priv.at/OAuth2-Security-11Feb2013.ppt<br>&gt;&=
gt;<br>&gt;&gt; Slide #2 summarizes earlier discussions during the conferen=
ce calls.<br>&gt;&gt;<br>&gt;&gt; -- HTTP vs. JSON<br>&gt;&gt;<br>&gt;&gt; =
Phil noted that he does not like to use the MAC Token draft as a starting p=
oint because it does not re-use any of the work done in the JOSE working gr=
oup and in particular all the libraries that are available today. He mentio=
ned that earlier attempts to write the MAC Token code lead to
 problems for implementers.<br>&gt;&gt;<br>&gt;&gt; Justin responded that h=
e does not agree with using JSON as a transport mechanism since this would =
replicate a SOAP style.<br>&gt;&gt;<br>&gt;&gt; Phil noted that he wants to=
 send JSON but the signature shall be computed over the HTTP header field.<=
br>&gt;&gt;<br>&gt;&gt; -- Flexibility for the keyed message digest computa=
tion<br>&gt;&gt;<br>&gt;&gt;&nbsp; From earlier discussion it was clear tha=
t the conference call participants wanted more flexibility regarding the ke=
yed message digest computation. For this purpose Hannes presented the DKIM =
based approach, which allows selective header fields to be included in the =
digest. This is shown in slide #4.<br>&gt;&gt;<br>&gt;&gt; After some discu=
ssion the conference call participants thought that this would meet their n=
eeds. Further investigations would still be useful to determine the degree =
of failed HMAC calculations due to HTTP proxies modifying the
 content.<br>&gt;&gt;<br>&gt;&gt; -- Key Distribution<br>&gt;&gt;<br>&gt;&g=
t; Hannes presented the open issue regarding the choice of key <br>&gt;&gt;=
 distribution. Slides #6-#8 present three techniques and Hannes asked <br>&=
gt;&gt; for feedback regarding the preferred style. Justin and others didn'=
t <br>&gt;&gt; see the need to decide on one mechanism - they wanted to kee=
p the <br>&gt;&gt; choice open. Derek indicated that this will not be an ac=
ceptable <br>&gt;&gt; approach. Since the resource server and the authoriza=
tion server may, <br>&gt;&gt; in the OAuth 2.0 framework, be entities produ=
ced by different vendors <br>&gt;&gt; there is an interoperability need. Ju=
stin responded that he disagrees <br>&gt;&gt; and that the resource server =
needs to understand the access token and <br>&gt;&gt; referred to the recen=
t draft submission for the token introspection <br>&gt;&gt; endpoint. Derek=
 indicated that the resource server has to understand <br>&gt;&gt;
 the content of the access token and the token introspection endpoint <br>&=
gt;&gt; just pushes the problem around: the resource server has to send the=
 <br>&gt;&gt; access token to the authorization server and then the resourc=
e server <br>&gt;&gt; gets the result back (which he the<br> n<br>&gt;&nbsp=
; &nbsp; a<br>&gt;&gt; gain needs to understand) in order to make a meaning=
ful authorization decision.<br>&gt;&gt;<br>&gt;&gt; Everyone agreed that th=
e client must receive the session key from the authorization server and tha=
t this approach has to be standardized. It was also agreed that this is a c=
ommon approach among all three key distribution mechanisms.<br>&gt;&gt;<br>=
&gt;&gt; Hannes asked the participants to think about their preference.<br>=
&gt;&gt;<br>&gt;&gt; The questions regarding key naming and the indication =
for the intended resource server the client wants to talk to have been post=
poned.<br>&gt;&gt;<br>&gt;&gt; Ciao<br>&gt;&gt;
 Hannes<br>&gt;&gt;<br>&gt;&gt;<br>&gt;&gt; _______________________________=
________________<br>&gt;&gt; OAuth mailing list<br>&gt;&gt; <a ymailto=3D"m=
ailto:OAuth@ietf.org" href=3D"mailto:OAuth@ietf.org">OAuth@ietf.org</a><br>=
&gt;&gt; <a href=3D"https://www.ietf.org/mailman/listinfo/oauth" target=3D"=
_blank">https://www.ietf.org/mailman/listinfo/oauth</a><br>&gt; ___________=
____________________________________<br>&gt; OAuth mailing list<br>&gt; <a =
ymailto=3D"mailto:OAuth@ietf.org" href=3D"mailto:OAuth@ietf.org">OAuth@ietf=
.org</a><br>&gt; <a href=3D"https://www.ietf.org/mailman/listinfo/oauth" ta=
rget=3D"_blank">https://www.ietf.org/mailman/listinfo/oauth</a><br><br><br>=
_______________________________________________<br>OAuth mailing list<br><a=
 ymailto=3D"mailto:OAuth@ietf.org" href=3D"mailto:OAuth@ietf.org">OAuth@iet=
f.org</a><br><a href=3D"https://www.ietf.org/mailman/listinfo/oauth"
 target=3D"_blank">https://www.ietf.org/mailman/listinfo/oauth</a><br>_____=
__________________________________________<br>OAuth mailing list<br><a ymai=
lto=3D"mailto:OAuth@ietf.org" href=3D"mailto:OAuth@ietf.org">OAuth@ietf.org=
</a><br><a href=3D"https://www.ietf.org/mailman/listinfo/oauth" target=3D"_=
blank">https://www.ietf.org/mailman/listinfo/oauth</a><br><br><br> </div> <=
/div>  </div></body></html>
--764183289-1761209499-1360891897=:14004--

From bcampbell@pingidentity.com  Thu Feb 14 18:47:35 2013
Return-Path: <bcampbell@pingidentity.com>
X-Original-To: oauth@ietfa.amsl.com
Delivered-To: oauth@ietfa.amsl.com
Received: from localhost (localhost [127.0.0.1]) by ietfa.amsl.com (Postfix) with ESMTP id 6E53C21F8464 for <oauth@ietfa.amsl.com>; Thu, 14 Feb 2013 18:47:35 -0800 (PST)
X-Virus-Scanned: amavisd-new at amsl.com
X-Spam-Flag: NO
X-Spam-Score: -5.984
X-Spam-Level: 
X-Spam-Status: No, score=-5.984 tagged_above=-999 required=5 tests=[AWL=-0.008, BAYES_00=-2.599, FM_FORGED_GMAIL=0.622, HTML_MESSAGE=0.001, RCVD_IN_DNSWL_MED=-4]
Received: from mail.ietf.org ([64.170.98.30]) by localhost (ietfa.amsl.com [127.0.0.1]) (amavisd-new, port 10024) with ESMTP id n4g2yMDFtgm3 for <oauth@ietfa.amsl.com>; Thu, 14 Feb 2013 18:47:34 -0800 (PST)
Received: from na3sys009aog135.obsmtp.com (na3sys009aog135.obsmtp.com [74.125.149.84]) by ietfa.amsl.com (Postfix) with ESMTP id 65D5121F844C for <oauth@ietf.org>; Thu, 14 Feb 2013 18:47:33 -0800 (PST)
Received: from mail-la0-f71.google.com ([209.85.215.71]) (using TLSv1) by na3sys009aob135.postini.com ([74.125.148.12]) with SMTP ID DSNKUR2hxJEiuCR+TGhndVKHpWOLoaM3KJcj@postini.com; Thu, 14 Feb 2013 18:47:33 PST
Received: by mail-la0-f71.google.com with SMTP id fr10so3830808lab.2 for <oauth@ietf.org>; Thu, 14 Feb 2013 18:47:31 -0800 (PST)
X-Google-DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=google.com; s=20120113; h=x-received:x-received:mime-version:in-reply-to:references:from:date :message-id:subject:to:cc:content-type:x-gm-message-state; bh=gWYHNBxgvBNHiZuexWIpk5g5MsSBzkJRphsABX/9j1Y=; b=b+56VT8ST9hzbyutzFrGM4CAsXhoC5CcrZNYASrb3BuBQdYArjnP9hh74q4lCtqyFG 2m5iXEygtTdHCEMx/KNbVa5nz9Pq1CrjCtU2ox32NJUc2hTyTBD2g2YF7Ta1JWk3/exC xVV6eQbG2cheTOOh6cRWPf6GXb/DJn6podVfaZP4/jQtEZzA5cWJdBqiv/bEzmP0X05m bRcScueOA10CzCJ82odAE7+LnRSEtXDY34eSMQNG1voP5/ABtC5x0uNvVaHNVVN9SjvR Vp/04QEhkuPC7JKwGPjcmG1aqFB/kR0Q/Dh91yO37mf0JmUEtixjO6R0ZcrezDUkQvMU 3sJQ==
X-Received: by 10.14.182.71 with SMTP id n47mr3301123eem.11.1360896450781; Thu, 14 Feb 2013 18:47:30 -0800 (PST)
X-Received: by 10.14.182.71 with SMTP id n47mr3301076eem.11.1360896450472; Thu, 14 Feb 2013 18:47:30 -0800 (PST)
MIME-Version: 1.0
Received: by 10.14.173.9 with HTTP; Thu, 14 Feb 2013 18:47:00 -0800 (PST)
In-Reply-To: <511C1980.6030603@oracle.com>
References: <51195F36.6040705@mitre.org> <780F8C26-19A4-4301-B350-307D9FFF69CD@ve7jtb.com> <511BAA8B.8030309@mitre.org> <BEBDAFAC-28B0-4959-9FE5-34EC17FC318C@ve7jtb.com> <-4554688250617930935@unknownmsgid> <AF401161-0C7C-4E49-9F44-9982B312FF6D@ve7jtb.com> <CA+ZpN24+zBbYh0BV+yUQ2WprxFjSVa9hJ8qJ4t9HZx+u5HHM4w@mail.gmail.com> <BA04B78C-E53A-4FFD-85BC-ABC92FE3462E@ve7jtb.com> <511C1980.6030603@oracle.com>
From: Brian Campbell <bcampbell@pingidentity.com>
Date: Thu, 14 Feb 2013 19:47:00 -0700
Message-ID: <CA+k3eCTWn4aH1P09DsbENWTgQe3AfveP0v6WhYrdQQF0h-9fNA@mail.gmail.com>
To: Prateek Mishra <prateek.mishra@oracle.com>
Content-Type: multipart/alternative; boundary=047d7b34389681aca504d5ba6529
X-Gm-Message-State: ALoCoQmnqI7NzfpRWII9obkenbdKH/Tl3RtoTWLg1A4OG3ZzoTQBjYnBu1N7FzgWeTTUq1MY5klOMSHtrWOK/mrinLSFxoTQxqcTL0rb2SyDUqMsmq4uyWzL6JATBT08JBd6Zinf6Lu7
Cc: oauth <oauth@ietf.org>
Subject: Re: [OAUTH-WG] comments on draft-ietf-oauth-saml2-bearer-15
X-BeenThere: oauth@ietf.org
X-Mailman-Version: 2.1.12
Precedence: list
List-Id: OAUTH WG <oauth.ietf.org>
List-Unsubscribe: <https://www.ietf.org/mailman/options/oauth>, <mailto:oauth-request@ietf.org?subject=unsubscribe>
List-Archive: <http://www.ietf.org/mail-archive/web/oauth>
List-Post: <mailto:oauth@ietf.org>
List-Help: <mailto:oauth-request@ietf.org?subject=help>
List-Subscribe: <https://www.ietf.org/mailman/listinfo/oauth>, <mailto:oauth-request@ietf.org?subject=subscribe>
X-List-Received-Date: Fri, 15 Feb 2013 02:47:35 -0000

--047d7b34389681aca504d5ba6529
Content-Type: text/plain; charset=ISO-8859-1
Content-Transfer-Encoding: quoted-printable

Thanks for the feedback Prateek. I've tried to address some of you comments
and questions inline below.


On Wed, Feb 13, 2013 at 3:53 PM, Prateek Mishra
<prateek.mishra@oracle.com>wrote:

> It would be helpful if the draft identified the various cases that are
> intended to be supported. For example,
> in draft-ietf-oauth-assertions-**10, there is a helpful distinction made
> between "Client acting on behalf of a user" vs.
> "Client Action on behalf of an anonymous user" (vs. even more advanced
> use-cases). Otherwise, folks
> have a hard time figuring out the pieces they need to implement and the
> required behavior.
>

The guidance in =A76 of draft-ietf-oauth-assertions-10 provides some
particular details of the more general general cases and they apply here as
well as the JWT draft. I'd like to avoid repeating the text and bloating
the documents.


>
> It feels like Section 3 speaks to all of these cases simultaneously. I
> think this is confusing and
> our developers have raised some questions about it.
>

It's not really intended to speak to the cases so much as provide the
required processing rules to validate the assertion in a reasonably secure
way. There is some simultaneous treatment of the client authentication case
and the authorization grant case because they have much more in common than
they have that's different. I can make a pass at better pointing out where
the differences are.


>
> BTW, it would also help if the rules in Section 3 were numbered.
>

I'll see what I can do. I assume it's possible with the xml2rfc markup but
have never done it.


>
> 1) For the case where we have "Client acting on behalf of user" - this
> case seems to be where we
> have something like a SAML SSO assertion - complete with Subject
> identifying the
> "authorized accessor or delegate". The Client offers this bearer
> instrument as an access grant and the Authorization
> server understands that its "acting on behalf a user".
>
> a) As the SAML assertion is a bearer instrument and can be stolen, the
> authorization server should insist on client credentials being present.
> In other words, the client should be confidential. What is the value in
> permitting a public client to participate in this exchange?
>

Very similar to SAML Web SSO where the client (HTTP user agent browser in
that case) is unidentified and the bearer assertion is the sole token
provided to identify/authenticate the subject and gain access. In some
cases there is a quite a bit of value in not having to provision or manage
the clients.


>
> b) Further, as part of its processing rules, once the client has been
> authenticated
> the authorization server should determine whether the particular client
> has the right to present the SAML bearer assertion.
>

An AS is free to deploy that kind of policy as needed for the deployment or
product. But the spec intentionally does not dictate any such policy.  And
intentionally allows for unidentified clients.


>
> c)  What is the value of including an AuthNStatement? Specifically, what
> does the Authorization server understand by its
> presence or absence? What is the guidance to deployers? Should they
> require end-user authentication to have taken place?
>
>
It's intended to convey whether or not the issuer actually authenticated
the subject or not. It's a distinction that, based on some conversations
I'd had, seemed like it might be useful for some. But much existing SAML
software doesn't work that way currently, which is why there's not a MUST
there. I'm trying to accommodate existing practice, within reason, while
also provide potentially useful functionality.


> 2) Bullet 5 (counting from the bottom of Section 3) references a more
> advanced use case based on a SAML delegation
> model. Is this the ONLY case where AuthNStatement's are allowed to be
> omitted? If so, that should be stated clearly.
>

I've got a SHOULD NOT there. I don't think a MUST is reasonable based on
what I've seen actual deployments do. Please suggest some text, if you
think it can be improved.


>
>  I think this bullet refers to an advanced use-case and should be moved t=
o
> an independent section.
>

I think it's pretty common actually.


>
> I think by "the presenter act autonomously on behalf of the subject" you
> mean something like "Client acts on Behalf of Anonymous Users".
> as identified in draft-ietf-oauth-assertions-**10.
>

No. I mean that the presenter (client) is acting on behalf of the user.
And the user probably isn't present for the transactions. "Autonomous" is a
word that kind of got inherited from the very early OAuth 2.0 drafts (
http://tools.ietf.org/html/draft-ietf-oauth-v2-08#section-1.4.4) and maybe
causes more trouble than it's worth here?


>
> I also found the sentence "The presented SHOULD be identified in the
> <NameID> or similar element,.." problematic. Its pretty open ended
> and it seems to me it will be difficult to have an interoperable
> implementation based on this text.
>

I agree that it's confusing and I believe it's partly because there's a
mistake in that text. It should say something more like "The presenter
SHOULD be identified in the <NameID> or similar element *within* the
<SubjectConfirmation> element, or by other available means like [
OASIS.saml-deleg-cs<http://tools.ietf.org/html/draft-ietf-oauth-saml2-beare=
r-15#ref-OASIS.saml-deleg-cs>
]"

Which is less open ended but still pretty open. The <NameID> or similar
text is becasue there can be a <BaseID>, <NameID>, or <EncryptedID> child
of the <SubjectConfirmation> and I was trying to avoid writing all that
out. The "SAML V2.0 Condition for Delegation Restriction" reference (which
probably should be expanded) is to a document that came along well after
regular SAML 2 and isn't widely supported, as far as I know. Neither of
these ways of expressing delegation is really used much in practice, as far
as I know, which makes it difficult to dictate particular requirements here=
.


>
> Finally, what are the additional processing rules that the authorization
> server needs to implement when processing this class of SAML assertions?
>

I don't understand? That's what 3 is all about. Or should be.


>
> 3) Has there been any interoperability testing of this profile? This is a=
n
> activity we would be interested in.
>

Nothing official that I know of. I'd probably be worthwhile. But of course,
there's a lot involved in something like that.

--047d7b34389681aca504d5ba6529
Content-Type: text/html; charset=ISO-8859-1
Content-Transfer-Encoding: quoted-printable

<div dir=3D"ltr">Thanks for the feedback Prateek. I&#39;ve tried to address=
 some of you comments and questions inline below.<br><div><div class=3D"gma=
il_extra"><br></div><div class=3D"gmail_extra"><br><div class=3D"gmail_quot=
e">On Wed, Feb 13, 2013 at 3:53 PM, Prateek Mishra <span dir=3D"ltr">&lt;<a=
 href=3D"mailto:prateek.mishra@oracle.com" target=3D"_blank">prateek.mishra=
@oracle.com</a>&gt;</span> wrote:<br>


<blockquote class=3D"gmail_quote" style=3D"margin:0px 0px 0px 0.8ex;border-=
left:1px solid rgb(204,204,204);padding-left:1ex">It would be helpful if th=
e draft identified the various cases that are intended to be supported. For=
 example,<br>



in draft-ietf-oauth-assertions-<u></u>10, there is a helpful distinction ma=
de between &quot;Client acting on behalf of a user&quot; vs.<br>
&quot;Client Action on behalf of an anonymous user&quot; (vs. even more adv=
anced use-cases). Otherwise, folks<br>
have a hard time figuring out the pieces they need to implement and the req=
uired behavior.<br></blockquote><div><br></div><div>The guidance in =A76 of=
 draft-ietf-oauth-assertions-10 provides some particular details of the mor=
e general general cases and they apply here as well as the JWT draft. I&#39=
;d like to avoid repeating the text and bloating the documents.<br>


</div><div>=A0</div><blockquote class=3D"gmail_quote" style=3D"margin:0px 0=
px 0px 0.8ex;border-left:1px solid rgb(204,204,204);padding-left:1ex">
<br>
It feels like Section 3 speaks to all of these cases simultaneously. I thin=
k this is confusing and<br>
our developers have raised some questions about it.<br></blockquote><div><b=
r></div><div>It&#39;s not really intended to speak to the cases so much as =
provide the required processing rules to validate the assertion in a reason=
ably secure way. There is some simultaneous treatment of the client authent=
ication case and the authorization grant case because they have much more i=
n common than they have that&#39;s different. I can make a pass at better p=
ointing out where the differences are.<br>

</div><div>=A0</div><blockquote class=3D"gmail_quote" style=3D"margin:0px 0=
px 0px 0.8ex;border-left:1px solid rgb(204,204,204);padding-left:1ex">
<br>
BTW, it would also help if the rules in Section 3 were numbered.<br></block=
quote><div><br></div><div>I&#39;ll see what I can do. I assume it&#39;s pos=
sible with the xml2rfc markup but have never done it.<br></div><div>=A0</di=
v>

<blockquote class=3D"gmail_quote" style=3D"margin:0px 0px 0px 0.8ex;border-=
left:1px solid rgb(204,204,204);padding-left:1ex">
<br>
1) For the case where we have &quot;Client acting on behalf of user&quot; -=
 this case seems to be where we<br>
have something like a SAML SSO assertion - complete with Subject identifyin=
g the<br>
&quot;authorized accessor or delegate&quot;. The Client offers this bearer =
instrument as an access grant and the Authorization<br>
server understands that its &quot;acting on behalf a user&quot;.<br>
<br>
a) As the SAML assertion is a bearer instrument and can be stolen, the auth=
orization server should insist on client credentials being present.<br>
In other words, the client should be confidential. What is the value in per=
mitting a public client to participate in this exchange?<br></blockquote><d=
iv><br></div><div>Very similar to SAML Web SSO where the client (HTTP user =
agent browser in that case) is unidentified and the bearer assertion is the=
 sole token provided to identify/authenticate the subject and gain access. =
In some cases there is a quite a bit of value in not having to provision or=
 manage the clients.<br>

</div><div>=A0</div><blockquote class=3D"gmail_quote" style=3D"margin:0px 0=
px 0px 0.8ex;border-left:1px solid rgb(204,204,204);padding-left:1ex">
<br>
b) Further, as part of its processing rules, once the client has been authe=
nticated<br>
the authorization server should determine whether the particular client has=
 the right to present the SAML bearer assertion.<br></blockquote><div><br><=
/div><div>An AS is free to deploy that kind of policy as needed for the dep=
loyment or product. But the spec intentionally does not dictate any such po=
licy.=A0 And intentionally allows for unidentified clients.<br>

</div><div>=A0</div><blockquote class=3D"gmail_quote" style=3D"margin:0px 0=
px 0px 0.8ex;border-left:1px solid rgb(204,204,204);padding-left:1ex">
<br>
c) =A0What is the value of including an AuthNStatement? Specifically, what =
does the Authorization server understand by its<br>
presence or absence? What is the guidance to deployers? Should they require=
 end-user authentication to have taken place?<br>
<br></blockquote><div><br></div><div>It&#39;s intended to convey whether or=
 not the issuer actually authenticated the subject or not. It&#39;s a disti=
nction that, based on some conversations I&#39;d had, seemed like it might =
be useful for some. But much existing SAML software doesn&#39;t work that w=
ay currently, which is why there&#39;s not a MUST there. I&#39;m trying to =
accommodate existing practice, within reason, while also provide potentiall=
y useful functionality.<br>

</div><div>=A0</div><blockquote class=3D"gmail_quote" style=3D"margin:0px 0=
px 0px 0.8ex;border-left:1px solid rgb(204,204,204);padding-left:1ex">
2) Bullet 5 (counting from the bottom of Section 3) references a more advan=
ced use case based on a SAML delegation<br>
model. Is this the ONLY case where AuthNStatement&#39;s are allowed to be o=
mitted? If so, that should be stated clearly.<br></blockquote><div><br></di=
v><div>I&#39;ve got a SHOULD NOT there. I don&#39;t think a MUST is reasona=
ble based on what I&#39;ve seen actual deployments do. Please suggest some =
text, if you think it can be improved.<br>

</div><div>=A0</div><blockquote class=3D"gmail_quote" style=3D"margin:0px 0=
px 0px 0.8ex;border-left:1px solid rgb(204,204,204);padding-left:1ex">
<br>
=A0I think this bullet refers to an advanced use-case and should be moved t=
o an independent section.<br></blockquote><div><br></div><div>I think it&#3=
9;s pretty common actually.<br></div><div>=A0</div><blockquote class=3D"gma=
il_quote" style=3D"margin:0px 0px 0px 0.8ex;border-left:1px solid rgb(204,2=
04,204);padding-left:1ex">


<br>
I think by &quot;the presenter act autonomously on behalf of the subject&qu=
ot; you mean something like &quot;Client acts on Behalf of Anonymous Users&=
quot;.<br>
as identified in draft-ietf-oauth-assertions-<u></u>10.<br></blockquote><di=
v><br></div><div>No. I mean that the presenter (client) is acting on behalf=
 of the user.=A0 And the user probably isn&#39;t present for the transactio=
ns. &quot;Autonomous&quot; is a word that kind of got inherited from the ve=
ry early OAuth 2.0 drafts (<a href=3D"http://tools.ietf.org/html/draft-ietf=
-oauth-v2-08#section-1.4.4">http://tools.ietf.org/html/draft-ietf-oauth-v2-=
08#section-1.4.4</a>) and maybe causes more trouble than it&#39;s worth her=
e?<br>

</div><div>=A0</div><blockquote class=3D"gmail_quote" style=3D"margin:0px 0=
px 0px 0.8ex;border-left:1px solid rgb(204,204,204);padding-left:1ex">
<br>
I also found the sentence &quot;The presented SHOULD be identified in the &=
lt;NameID&gt; or similar element,..&quot; problematic. Its pretty open ende=
d<br>
and it seems to me it will be difficult to have an interoperable implementa=
tion based on this text.<br></blockquote><div><br></div><div>I agree that i=
t&#39;s confusing and I believe it&#39;s partly because there&#39;s a mista=
ke in that text. It should say something more like &quot;The presenter SHOU=
LD be identified in the
      &lt;NameID&gt; or similar element *within* the &lt;SubjectConfirmatio=
n&gt; element, or
      by other available means like [<a href=3D"http://tools.ietf.org/html/=
draft-ietf-oauth-saml2-bearer-15#ref-OASIS.saml-deleg-cs">OASIS.saml-deleg-=
cs</a>]&quot;<br><br></div><div>Which is less open ended but still pretty o=
pen. The &lt;NameID&gt; or similar text is becasue there can be a &lt;BaseI=
D&gt;, &lt;NameID&gt;, or &lt;EncryptedID&gt; child of the &lt;SubjectConfi=
rmation&gt; and I was trying to avoid writing all that out. The &quot;SAML =
V2.0 Condition for Delegation
              Restriction&quot; reference (which probably should be expande=
d) is to a document that came along well after regular SAML 2 and isn&#39;t=
 widely supported, as far as I know. Neither of these ways of expressing de=
legation is really used much in practice, as far as I know, which makes it =
difficult to dictate particular requirements here.<span style=3D"font-size:=
10pt;font-family:&#39;CourierNewPSMT&#39;">
</span>
			=09
		=09
	=09
=09
</div><div>=A0</div><blockquote class=3D"gmail_quote" style=3D"margin:0px 0=
px 0px 0.8ex;border-left:1px solid rgb(204,204,204);padding-left:1ex">
<br>
Finally, what are the additional processing rules that the authorization se=
rver needs to implement when processing this class of SAML assertions?<br><=
/blockquote><div><br></div><div>I don&#39;t understand? That&#39;s what 3 i=
s all about. Or should be.<br>

</div><div>=A0</div><blockquote class=3D"gmail_quote" style=3D"margin:0px 0=
px 0px 0.8ex;border-left:1px solid rgb(204,204,204);padding-left:1ex">
<br>
3) Has there been any interoperability testing of this profile? This is an =
activity we would be interested in.<br></blockquote><div><br></div><div>Not=
hing official that I know of. I&#39;d probably be worthwhile. But of course=
, there&#39;s a lot involved in something like that.<br>

</div><div>=A0</div></div><br></div></div></div>

--047d7b34389681aca504d5ba6529--

From torsten@lodderstedt.net  Thu Feb 14 22:05:38 2013
Return-Path: <torsten@lodderstedt.net>
X-Original-To: oauth@ietfa.amsl.com
Delivered-To: oauth@ietfa.amsl.com
Received: from localhost (localhost [127.0.0.1]) by ietfa.amsl.com (Postfix) with ESMTP id 436FE21F8717 for <oauth@ietfa.amsl.com>; Thu, 14 Feb 2013 22:05:38 -0800 (PST)
X-Virus-Scanned: amavisd-new at amsl.com
X-Spam-Flag: NO
X-Spam-Score: -1.258
X-Spam-Level: 
X-Spam-Status: No, score=-1.258 tagged_above=-999 required=5 tests=[AWL=-0.406, BAYES_00=-2.599, HELO_EQ_DE=0.35, HTML_MESSAGE=0.001, MIME_QP_LONG_LINE=1.396]
Received: from mail.ietf.org ([64.170.98.30]) by localhost (ietfa.amsl.com [127.0.0.1]) (amavisd-new, port 10024) with ESMTP id TTdbdS0l6eY7 for <oauth@ietfa.amsl.com>; Thu, 14 Feb 2013 22:05:36 -0800 (PST)
Received: from smtprelay03.ispgateway.de (smtprelay03.ispgateway.de [80.67.18.15]) by ietfa.amsl.com (Postfix) with ESMTP id 4081821F8B2E for <oauth@ietf.org>; Thu, 14 Feb 2013 22:05:35 -0800 (PST)
Received: from [91.2.95.252] (helo=[192.168.71.56]) by smtprelay03.ispgateway.de with esmtpsa (TLSv1:AES128-SHA:128) (Exim 4.68) (envelope-from <torsten@lodderstedt.net>) id 1U6EQP-0000By-B8; Fri, 15 Feb 2013 07:05:33 +0100
References: <0573984A-8C11-4960-9BC6-F44D4B664C19@gmx.net> <E808B6AC-D5F6-479F-967D-EA6B2586BE64@oracle.com> <511A7D27.8010209@mitre.org> <4E1F6AAD24975D4BA5B16804296739436744BD23@TK5EX14MBXC285.redmond.corp.microsoft.com> <1360891897.14004.YahooMailNeo@web31811.mail.mud.yahoo.com>
Mime-Version: 1.0 (1.0)
In-Reply-To: <1360891897.14004.YahooMailNeo@web31811.mail.mud.yahoo.com>
Content-Type: multipart/alternative; boundary=Apple-Mail-B66DAEAC-1D9A-4813-8A97-C9FAC28EB1B1
Content-Transfer-Encoding: 7bit
Message-Id: <E7EBF78C-37EB-4737-8DD5-0F24C9FACA60@lodderstedt.net>
X-Mailer: iPad Mail (10B141)
From: Torsten Lodderstedt <torsten@lodderstedt.net>
Date: Fri, 15 Feb 2013 07:05:34 +0100
To: William Mills <wmills_92105@yahoo.com>
X-Df-Sender: dG9yc3RlbkBsb2RkZXJzdGVkdC1vbmxpbmUuZGU=
Cc: IETF oauth WG <oauth@ietf.org>
Subject: Re: [OAUTH-WG] Minutes from the OAuth Design Team Conference Call - 11th February 2013
X-BeenThere: oauth@ietf.org
X-Mailman-Version: 2.1.12
Precedence: list
List-Id: OAUTH WG <oauth.ietf.org>
List-Unsubscribe: <https://www.ietf.org/mailman/options/oauth>, <mailto:oauth-request@ietf.org?subject=unsubscribe>
List-Archive: <http://www.ietf.org/mail-archive/web/oauth>
List-Post: <mailto:oauth@ietf.org>
List-Help: <mailto:oauth-request@ietf.org?subject=help>
List-Subscribe: <https://www.ietf.org/mailman/listinfo/oauth>, <mailto:oauth-request@ietf.org?subject=subscribe>
X-List-Received-Date: Fri, 15 Feb 2013 06:05:38 -0000

--Apple-Mail-B66DAEAC-1D9A-4813-8A97-C9FAC28EB1B1
Content-Type: text/plain;
	charset=us-ascii
Content-Transfer-Encoding: quoted-printable

Hi Bill,

OAuth 2.0 took a different direction by relying on HTTPS to provide the basi=
c protection. So the need to have a token, which can be used for service req=
uests over plain HTTP is arguable. My understanding of this activity was, th=
e intend is to provide additional protection on top of HTTPS.

regards,
Torsten.

Am 15.02.2013 um 02:31 schrieb William Mills <wmills_92105@yahoo.com>:

> I disagree with "That was the impediment to OAuth 1.0 adoption that OAuth 2=
.0 solved in the first place.", unless "solving" means does not address the n=
eed for it at all.
>=20
> OAuth 2 does several good things, but it still lacks a defined token type t=
hat is safe to user over plain text HTTP.  1.0a solved that.
>=20
> From: Mike Jones <Michael.Jones@microsoft.com>
> To: Justin Richer <jricher@mitre.org>; Phil Hunt <phil.hunt@oracle.com>=20=

> Cc: IETF oauth WG <oauth@ietf.org>=20
> Sent: Thursday, February 14, 2013 1:44 PM
> Subject: Re: [OAUTH-WG] Minutes from the OAuth Design Team Conference Call=
 - 11th February 2013
>=20
> I'm in favor of reusing the JWT work that this WG is also doing. :-)
>=20
> I'm pretty skeptical of us inventing another custom scheme for signing HTT=
P headers.  That was the impediment to OAuth 1.0 adoption that OAuth 2.0 sol=
ved in the first place.
>=20
>                 -- Mike
>=20
> -----Original Message-----
> From: oauth-bounces@ietf.org [mailto:oauth-bounces@ietf.org] On Behalf Of J=
ustin Richer
> Sent: Tuesday, February 12, 2013 9:35 AM
> To: Phil Hunt
> Cc: IETF oauth WG
> Subject: Re: [OAUTH-WG] Minutes from the OAuth Design Team Conference Call=
 - 11th February 2013
>=20
> That's my reading of it as well, Phil, thanks for providing the clarificat=
ion. One motivator behind using a JSON-based token is to be able to re-use s=
ome of the great work that the JOSE group is doing but apply it to an HTTP p=
ayload.
>=20
> What neither of us want is a token type that requires stuffing all query, h=
eader, and other parameters *into* the JSON object itself, which would be a m=
ore SOAPy approach.
>=20
>   -- Justin
>=20
> On 02/12/2013 12:30 PM, Phil Hunt wrote:
> > Clarification.  I think Justin and I were in agreement that we don't wan=
t to see a format that requires JSON payloads.  We are both interested in a J=
SON token used in the authorization header that could be based on a computed=
 signature of some combination of http headers and body if possible.
> >
> > Phil
> >
> > @independentid
> > www.independentid.com
> > phil.hunt@oracle.com
> >
> >
> >
> >
> >
> > On 2013-02-12, at 1:10 AM, Hannes Tschofenig wrote:
> >
> >> Here are my notes.
> >>
> >> Participants:
> >>
> >> * John Bradley
> >> * Derek Atkins
> >> * Phil Hunt
> >> * Prateek Mishra
> >> * Hannes Tschofenig
> >> * Mike Jones
> >> * Antonio Sanso
> >> * Justin Richer
> >>
> >> Notes:
> >>
> >> My slides are available here:=20
> >> http://www.tschofenig.priv.at/OAuth2-Security-11Feb2013.ppt
> >>
> >> Slide #2 summarizes earlier discussions during the conference calls.
> >>
> >> -- HTTP vs. JSON
> >>
> >> Phil noted that he does not like to use the MAC Token draft as a starti=
ng point because it does not re-use any of the work done in the JOSE working=
 group and in particular all the libraries that are available today. He ment=
ioned that earlier attempts to write the MAC Token code lead to problems for=
 implementers.
> >>
> >> Justin responded that he does not agree with using JSON as a transport m=
echanism since this would replicate a SOAP style.
> >>
> >> Phil noted that he wants to send JSON but the signature shall be comput=
ed over the HTTP header field.
> >>
> >> -- Flexibility for the keyed message digest computation
> >>
> >>  =46rom earlier discussion it was clear that the conference call partic=
ipants wanted more flexibility regarding the keyed message digest computatio=
n. For this purpose Hannes presented the DKIM based approach, which allows s=
elective header fields to be included in the digest. This is shown in slide #=
4.
> >>
> >> After some discussion the conference call participants thought that thi=
s would meet their needs. Further investigations would still be useful to de=
termine the degree of failed HMAC calculations due to HTTP proxies modifying=
 the content.
> >>
> >> -- Key Distribution
> >>
> >> Hannes presented the open issue regarding the choice of key=20
> >> distribution. Slides #6-#8 present three techniques and Hannes asked=20=

> >> for feedback regarding the preferred style. Justin and others didn't=20=

> >> see the need to decide on one mechanism - they wanted to keep the=20
> >> choice open. Derek indicated that this will not be an acceptable=20
> >> approach. Since the resource server and the authorization server may,=20=

> >> in the OAuth 2.0 framework, be entities produced by different vendors=20=

> >> there is an interoperability need. Justin responded that he disagrees=20=

> >> and that the resource server needs to understand the access token and=20=

> >> referred to the recent draft submission for the token introspection=20
> >> endpoint. Derek indicated that the resource server has to understand=20=

> >> the content of the access token and the token introspection endpoint=20=

> >> just pushes the problem around: the resource server has to send the=20
> >> access token to the authorization server and then the resource server=20=

> >> gets the result back (which he the
> n
> >    a
> >> gain needs to understand) in order to make a meaningful authorization d=
ecision.
> >>
> >> Everyone agreed that the client must receive the session key from the a=
uthorization server and that this approach has to be standardized. It was al=
so agreed that this is a common approach among all three key distribution me=
chanisms.
> >>
> >> Hannes asked the participants to think about their preference.
> >>
> >> The questions regarding key naming and the indication for the intended r=
esource server the client wants to talk to have been postponed.
> >>
> >> Ciao
> >> Hannes
> >>
> >>
> >> _______________________________________________
> >> OAuth mailing list
> >> OAuth@ietf.org
> >> https://www.ietf.org/mailman/listinfo/oauth
> > _______________________________________________
> > OAuth mailing list
> > OAuth@ietf.org
> > https://www.ietf.org/mailman/listinfo/oauth
>=20
>=20
> _______________________________________________
> OAuth mailing list
> OAuth@ietf.org
> https://www.ietf.org/mailman/listinfo/oauth
> _______________________________________________
> OAuth mailing list
> OAuth@ietf.org
> https://www.ietf.org/mailman/listinfo/oauth
>=20
>=20
> _______________________________________________
> OAuth mailing list
> OAuth@ietf.org
> https://www.ietf.org/mailman/listinfo/oauth

--Apple-Mail-B66DAEAC-1D9A-4813-8A97-C9FAC28EB1B1
Content-Type: text/html;
	charset=utf-8
Content-Transfer-Encoding: quoted-printable

<html><head><meta http-equiv=3D"content-type" content=3D"text/html; charset=3D=
utf-8"></head><body dir=3D"auto"><div>Hi Bill,</div><div><br></div><div>OAut=
h 2.0 took a different direction by relying on HTTPS to provide the basic pr=
otection. So the need to have a token, which can be used for service request=
s over plain HTTP is arguable. My understanding of this activity was, the in=
tend is to provide additional protection on top of HTTPS.</div><div><br></di=
v><div>regards,</div><div>Torsten.</div><div><br>Am 15.02.2013 um 02:31 schr=
ieb William Mills &lt;<a href=3D"mailto:wmills_92105@yahoo.com">wmills_92105=
@yahoo.com</a>&gt;:<br><br></div><blockquote type=3D"cite"><div><div style=3D=
"color:#000; background-color:#fff; font-family:Courier New, courier, monaco=
, monospace, sans-serif;font-size:12pt"><div><span>I disagree with "</span><=
span style=3D"font-family: 'times new roman', 'new york', times, serif; font=
-size: 12pt;">That was the impediment to OAuth 1.0 adoption that OAuth 2.0 s=
olved in the first place.", unless "solving" means does not address the need=
 for it at all.</span></div><div style=3D"color: rgb(0, 0, 0); font-size: 12=
pt; font-family: 'times new roman', 'new york', times, serif; background-col=
or: transparent; font-style: normal;"><span style=3D"font-family: 'times new=
 roman', 'new york', times, serif; font-size: 12pt;"><br></span></div><div s=
tyle=3D"color: rgb(0, 0, 0); font-size: 16px; font-family: 'times new roman'=
, 'new york', times, serif; background-color: transparent; font-style: norma=
l;"><span style=3D"font-family: 'times new roman', 'new york', times, serif;=
 font-size: 12pt;">OAuth 2 does several
 good things, but it still lacks a defined token type that is safe to user o=
ver plain text HTTP. &nbsp;1.0a solved that.</span></div><div><br></div>  <d=
iv style=3D"font-family: 'Courier New', courier, monaco, monospace, sans-ser=
if; font-size: 12pt;"> <div style=3D"font-family: 'times new roman', 'new yo=
rk', times, serif; font-size: 12pt;"> <div dir=3D"ltr"> <font size=3D"2" fac=
e=3D"Arial"> <hr size=3D"1">  <b><span style=3D"font-weight:bold;">From:</sp=
an></b> Mike Jones &lt;<a href=3D"mailto:Michael.Jones@microsoft.com">Michae=
l.Jones@microsoft.com</a>&gt;<br> <b><span style=3D"font-weight: bold;">To:<=
/span></b> Justin Richer &lt;<a href=3D"mailto:jricher@mitre.org">jricher@mi=
tre.org</a>&gt;; Phil Hunt &lt;<a href=3D"mailto:phil.hunt@oracle.com">phil.=
hunt@oracle.com</a>&gt; <br><b><span style=3D"font-weight: bold;">Cc:</span>=
</b> IETF oauth WG &lt;<a href=3D"mailto:oauth@ietf.org">oauth@ietf.org</a>&=
gt; <br> <b><span style=3D"font-weight: bold;">Sent:</span></b> Thursday, Fe=
bruary 14, 2013 1:44 PM<br> <b><span style=3D"font-weight: bold;">Subject:</=
span></b> Re: [OAUTH-WG] Minutes from the OAuth Design Team Conference Call -=
 11th February 2013<br>
 </font> </div> <br>
I'm in favor of reusing the JWT work that this WG is also doing. :-)<br><br>=
I'm pretty skeptical of us inventing another custom scheme for signing HTTP h=
eaders.&nbsp; That was the impediment to OAuth 1.0 adoption that OAuth 2.0 s=
olved in the first place.<br><br>&nbsp;&nbsp;&nbsp; &nbsp;&nbsp;&nbsp; &nbsp=
;&nbsp;&nbsp; &nbsp;&nbsp;&nbsp; -- Mike<br><br>-----Original Message-----<b=
r>From: <a ymailto=3D"mailto:oauth-bounces@ietf.org" href=3D"mailto:oauth-bo=
unces@ietf.org">oauth-bounces@ietf.org</a> [mailto:<a ymailto=3D"mailto:oaut=
h-bounces@ietf.org" href=3D"mailto:oauth-bounces@ietf.org">oauth-bounces@iet=
f.org</a>] On Behalf Of Justin Richer<br>Sent: Tuesday, February 12, 2013 9:=
35 AM<br>To: Phil Hunt<br>Cc: IETF oauth WG<br>Subject: Re: [OAUTH-WG] Minut=
es from the OAuth Design Team Conference Call - 11th February 2013<br><br>Th=
at's my reading of it as well, Phil, thanks for providing the clarification.=
 One motivator behind using a JSON-based token is to be able to
 re-use some of the great work that the JOSE group is doing but apply it to a=
n HTTP payload.<br><br>What neither of us want is a token type that requires=
 stuffing all query, header, and other parameters *into* the JSON object its=
elf, which would be a more SOAPy approach.<br><br>&nbsp; -- Justin<br><br>On=
 02/12/2013 12:30 PM, Phil Hunt wrote:<br>&gt; Clarification.&nbsp; I think J=
ustin and I were in agreement that we don't want to see a format that requir=
es JSON payloads.&nbsp; We are both interested in a JSON token used in the a=
uthorization header that could be based on a computed signature of some comb=
ination of http headers and body if possible.<br>&gt;<br>&gt; Phil<br>&gt;<b=
r>&gt; @independentid<br>&gt; <a target=3D"_blank" href=3D"http://www.indepe=
ndentid.com/">www.independentid.com</a><br>&gt; <a ymailto=3D"mailto:phil.hu=
nt@oracle.com" href=3D"mailto:phil.hunt@oracle.com">phil.hunt@oracle.com</a>=
<br>&gt;<br>&gt;<br>&gt;<br>&gt;<br>&gt;<br>&gt; On
 2013-02-12, at 1:10 AM, Hannes Tschofenig wrote:<br>&gt;<br>&gt;&gt; Here a=
re my notes.<br>&gt;&gt;<br>&gt;&gt; Participants:<br>&gt;&gt;<br>&gt;&gt; *=
 John Bradley<br>&gt;&gt; * Derek Atkins<br>&gt;&gt; * Phil Hunt<br>&gt;&gt;=
 * Prateek Mishra<br>&gt;&gt; * Hannes Tschofenig<br>&gt;&gt; * Mike Jones<b=
r>&gt;&gt; * Antonio Sanso<br>&gt;&gt; * Justin Richer<br>&gt;&gt;<br>&gt;&g=
t; Notes:<br>&gt;&gt;<br>&gt;&gt; My slides are available here: <br>&gt;&gt;=
 <a href=3D"http://www.tschofenig.priv.at/OAuth2-Security-11Feb2013.ppt">htt=
p://www.tschofenig.priv.at/OAuth2-Security-11Feb2013.ppt</a><br>&gt;&gt;<br>=
&gt;&gt; Slide #2 summarizes earlier discussions during the conference calls=
.<br>&gt;&gt;<br>&gt;&gt; -- HTTP vs. JSON<br>&gt;&gt;<br>&gt;&gt; Phil note=
d that he does not like to use the MAC Token draft as a starting point becau=
se it does not re-use any of the work done in the JOSE working group and in p=
articular all the libraries that are available today. He mentioned that earl=
ier attempts to write the MAC Token code lead to
 problems for implementers.<br>&gt;&gt;<br>&gt;&gt; Justin responded that he=
 does not agree with using JSON as a transport mechanism since this would re=
plicate a SOAP style.<br>&gt;&gt;<br>&gt;&gt; Phil noted that he wants to se=
nd JSON but the signature shall be computed over the HTTP header field.<br>&=
gt;&gt;<br>&gt;&gt; -- Flexibility for the keyed message digest computation<=
br>&gt;&gt;<br>&gt;&gt;&nbsp; =46rom earlier discussion it was clear that th=
e conference call participants wanted more flexibility regarding the keyed m=
essage digest computation. For this purpose Hannes presented the DKIM based a=
pproach, which allows selective header fields to be included in the digest. T=
his is shown in slide #4.<br>&gt;&gt;<br>&gt;&gt; After some discussion the c=
onference call participants thought that this would meet their needs. Furthe=
r investigations would still be useful to determine the degree of failed HMA=
C calculations due to HTTP proxies modifying the
 content.<br>&gt;&gt;<br>&gt;&gt; -- Key Distribution<br>&gt;&gt;<br>&gt;&gt=
; Hannes presented the open issue regarding the choice of key <br>&gt;&gt; d=
istribution. Slides #6-#8 present three techniques and Hannes asked <br>&gt;=
&gt; for feedback regarding the preferred style. Justin and others didn't <b=
r>&gt;&gt; see the need to decide on one mechanism - they wanted to keep the=
 <br>&gt;&gt; choice open. Derek indicated that this will not be an acceptab=
le <br>&gt;&gt; approach. Since the resource server and the authorization se=
rver may, <br>&gt;&gt; in the OAuth 2.0 framework, be entities produced by d=
ifferent vendors <br>&gt;&gt; there is an interoperability need. Justin resp=
onded that he disagrees <br>&gt;&gt; and that the resource server needs to u=
nderstand the access token and <br>&gt;&gt; referred to the recent draft sub=
mission for the token introspection <br>&gt;&gt; endpoint. Derek indicated t=
hat the resource server has to understand <br>&gt;&gt;
 the content of the access token and the token introspection endpoint <br>&g=
t;&gt; just pushes the problem around: the resource server has to send the <=
br>&gt;&gt; access token to the authorization server and then the resource s=
erver <br>&gt;&gt; gets the result back (which he the<br> n<br>&gt;&nbsp; &n=
bsp; a<br>&gt;&gt; gain needs to understand) in order to make a meaningful a=
uthorization decision.<br>&gt;&gt;<br>&gt;&gt; Everyone agreed that the clie=
nt must receive the session key from the authorization server and that this a=
pproach has to be standardized. It was also agreed that this is a common app=
roach among all three key distribution mechanisms.<br>&gt;&gt;<br>&gt;&gt; H=
annes asked the participants to think about their preference.<br>&gt;&gt;<br=
>&gt;&gt; The questions regarding key naming and the indication for the inte=
nded resource server the client wants to talk to have been postponed.<br>&gt=
;&gt;<br>&gt;&gt; Ciao<br>&gt;&gt;
 Hannes<br>&gt;&gt;<br>&gt;&gt;<br>&gt;&gt; ________________________________=
_______________<br>&gt;&gt; OAuth mailing list<br>&gt;&gt; <a ymailto=3D"mai=
lto:OAuth@ietf.org" href=3D"mailto:OAuth@ietf.org">OAuth@ietf.org</a><br>&gt=
;&gt; <a href=3D"https://www.ietf.org/mailman/listinfo/oauth" target=3D"_bla=
nk">https://www.ietf.org/mailman/listinfo/oauth</a><br>&gt; ________________=
_______________________________<br>&gt; OAuth mailing list<br>&gt; <a ymailt=
o=3D"mailto:OAuth@ietf.org" href=3D"mailto:OAuth@ietf.org">OAuth@ietf.org</a=
><br>&gt; <a href=3D"https://www.ietf.org/mailman/listinfo/oauth" target=3D"=
_blank">https://www.ietf.org/mailman/listinfo/oauth</a><br><br><br>_________=
______________________________________<br>OAuth mailing list<br><a ymailto=3D=
"mailto:OAuth@ietf.org" href=3D"mailto:OAuth@ietf.org">OAuth@ietf.org</a><br=
><a href=3D"https://www.ietf.org/mailman/listinfo/oauth" target=3D"_blank">h=
ttps://www.ietf.org/mailman/listinfo/oauth</a><br>__________________________=
_____________________<br>OAuth mailing list<br><a ymailto=3D"mailto:OAuth@ie=
tf.org" href=3D"mailto:OAuth@ietf.org">OAuth@ietf.org</a><br><a href=3D"http=
s://www.ietf.org/mailman/listinfo/oauth" target=3D"_blank">https://www.ietf.=
org/mailman/listinfo/oauth</a><br><br><br> </div> </div>  </div></div></bloc=
kquote><blockquote type=3D"cite"><div><span>________________________________=
_______________</span><br><span>OAuth mailing list</span><br><span><a href=3D=
"mailto:OAuth@ietf.org">OAuth@ietf.org</a></span><br><span><a href=3D"https:=
//www.ietf.org/mailman/listinfo/oauth">https://www.ietf.org/mailman/listinfo=
/oauth</a></span><br></div></blockquote></body></html>=

--Apple-Mail-B66DAEAC-1D9A-4813-8A97-C9FAC28EB1B1--

From wmills_92105@yahoo.com  Thu Feb 14 23:08:39 2013
Return-Path: <wmills_92105@yahoo.com>
X-Original-To: oauth@ietfa.amsl.com
Delivered-To: oauth@ietfa.amsl.com
Received: from localhost (localhost [127.0.0.1]) by ietfa.amsl.com (Postfix) with ESMTP id A1AB921F86D9 for <oauth@ietfa.amsl.com>; Thu, 14 Feb 2013 23:08:39 -0800 (PST)
X-Virus-Scanned: amavisd-new at amsl.com
X-Spam-Flag: NO
X-Spam-Score: -2.078
X-Spam-Level: 
X-Spam-Status: No, score=-2.078 tagged_above=-999 required=5 tests=[AWL=0.520,  BAYES_00=-2.599, HTML_MESSAGE=0.001]
Received: from mail.ietf.org ([64.170.98.30]) by localhost (ietfa.amsl.com [127.0.0.1]) (amavisd-new, port 10024) with ESMTP id E3+icQtyxCZW for <oauth@ietfa.amsl.com>; Thu, 14 Feb 2013 23:08:38 -0800 (PST)
Received: from nm40.bullet.mail.bf1.yahoo.com (nm40.bullet.mail.bf1.yahoo.com [72.30.239.128]) by ietfa.amsl.com (Postfix) with ESMTP id C785521F85D8 for <oauth@ietf.org>; Thu, 14 Feb 2013 23:08:37 -0800 (PST)
Received: from [98.139.214.32] by nm40.bullet.mail.bf1.yahoo.com with NNFMP; 15 Feb 2013 07:08:37 -0000
Received: from [98.139.215.228] by tm15.bullet.mail.bf1.yahoo.com with NNFMP; 15 Feb 2013 07:08:37 -0000
Received: from [127.0.0.1] by omp1068.mail.bf1.yahoo.com with NNFMP; 15 Feb 2013 07:08:37 -0000
X-Yahoo-Newman-Property: ymail-3
X-Yahoo-Newman-Id: 264797.62767.bm@omp1068.mail.bf1.yahoo.com
Received: (qmail 65058 invoked by uid 60001); 15 Feb 2013 07:08:36 -0000
DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=yahoo.com; s=s1024; t=1360912116; bh=alSOdBK5sm8jcni55nRtclWnzQ2qu7hL4QRT1mGSDaY=; h=X-YMail-OSG:Received:X-Rocket-MIMEInfo:X-Mailer:References:Message-ID:Date:From:Reply-To:Subject:To:Cc:In-Reply-To:MIME-Version:Content-Type; b=1cqJZWkr3Y2KrSmpHTIT0mZuiqaEcr5k93O33RbXy9eEwOzlE76LyQdYyjib4CB8hXOhw6FAyOlvyKI7Q20U6CgctKX768gAmXQjC5wa36FID9C6xQKt6VWwiZZNDN9uz9bu/1noq1qIgO7+RQi61eSLx8mCO92wW1O/LugP3oc=
DomainKey-Signature: a=rsa-sha1; q=dns; c=nofws; s=s1024; d=yahoo.com; h=X-YMail-OSG:Received:X-Rocket-MIMEInfo:X-Mailer:References:Message-ID:Date:From:Reply-To:Subject:To:Cc:In-Reply-To:MIME-Version:Content-Type; b=diaf/dpG0mrGk6SkPQEGYDDz50M0oGHzeytEDaJbvRsP5N/FSxW0HZKMnqdENLPAWFo7JioItiq91MXt+9LEa9+Q05Px+nmwWUdbrZ/lrk33WLN2nBMGkAwb7WDelqELhUAlfGsl5Pn+zsdh5c1BIwangFSGCG+TaBZQ2twbe7g=;
X-YMail-OSG: g3b_TFYVM1kdpXkVf4IXEjzdhtnltA4hKo6fGK_RplxCjXJ LNb8Vd9dtgLSShOkAusaqbwe3oRcrbIova0tbxBpBDEvvK4SVd91JePvouDp .oPn8sOQ4SNu3aRDiUdqUkAfKefPfW3s0_PSA44JLmQVO6jQt26NfCFj4UbX wRcTcZ16gpHUuGnaHth9FSBu3SYC6EwEatvYJP5pf8yaaL3aASvucNf4hkdK U0MRXyv163rTcJGVSaoT5NFLYwXSwh0JrqDJr_HCimNbfagha1umE0SxGbhZ hgl5s2apDs83qcELJxYarPDVOKDynhPitBtdfX7NihhW4U6TC2WFYUSckWZB zuLLkNxN0mgngOLCSouSQgW0HFkT5UjCMsvzfCmuOJ1MSMemjLi6BGIGsbHu cGP3LOqwIugO26WUntCWUSy5Dt.hxwcYadjsYRSL.TrzS5oVrrqudX_btdsz rZX3B_ugK7Wt.Freli7598XaOoyoEkkTtbGFwb4jOh4hJaNgkHfzHJF0knes tDbKu5sMJcWsmGTtpSiP.7lfjUv03OBakIOTz8ayC.D7H8mSUY5Sng4PbXBl JS4PLqlPRlqsuSe8Rb9A0MyouJ1dH8LD0F3G1ScrvB7JdN9PXHOh90z9zVvf qQk.NNuKmrqvN3s8trH9_EXhEsIkKKKLbv3jF9sLnCE.7Eo7S9n3BA_lTlyL _bzmAKg--
Received: from [99.31.212.42] by web31811.mail.mud.yahoo.com via HTTP; Thu, 14 Feb 2013 23:08:35 PST
X-Rocket-MIMEInfo: 001.001, SSBmdW5kYW1lbnRhbGx5IGRpc2FncmVlIHdpdGggdGhhdCB0b28uIMKgT0F1dGggMiBpcyB0aGUgKmZyYW1ld29yayosIG9uZSB3aGljaCBzdXBwb3J0cyBtdWx0aXBsZSB0b2tlbiB0eXBlcy4gwqBCZWFyZXIgdG9rZW5zIHdlcmUgdGhlIGZpcnN0IGNyZWRlbnRpYWwgdHlwZSBkZWZpbmVkLgoKT0F1dGggMS4wYSBhbHNvIHJlcXVpcmVzIEhUVFBTIHRyYW5zcG9ydCBmb3IgYXV0aGVudGljYXRpb24gYW5kIGdldHRpbmcgdGhlIHRva2VuLgoKVGhlcmUgYXJlIMKgcmVhbCB1c2UgY2FzZXMgZm9yIHRva2VucyABMAEBAQE-
X-Mailer: YahooMailWebService/0.8.134.513
References: <0573984A-8C11-4960-9BC6-F44D4B664C19@gmx.net> <E808B6AC-D5F6-479F-967D-EA6B2586BE64@oracle.com> <511A7D27.8010209@mitre.org> <4E1F6AAD24975D4BA5B16804296739436744BD23@TK5EX14MBXC285.redmond.corp.microsoft.com> <1360891897.14004.YahooMailNeo@web31811.mail.mud.yahoo.com> <E7EBF78C-37EB-4737-8DD5-0F24C9FACA60@lodderstedt.net>
Message-ID: <1360912115.36543.YahooMailNeo@web31811.mail.mud.yahoo.com>
Date: Thu, 14 Feb 2013 23:08:35 -0800 (PST)
From: William Mills <wmills_92105@yahoo.com>
To: Torsten Lodderstedt <torsten@lodderstedt.net>
In-Reply-To: <E7EBF78C-37EB-4737-8DD5-0F24C9FACA60@lodderstedt.net>
MIME-Version: 1.0
Content-Type: multipart/alternative; boundary="764183289-258296331-1360912115=:36543"
Cc: IETF oauth WG <oauth@ietf.org>
Subject: Re: [OAUTH-WG] Minutes from the OAuth Design Team Conference Call - 11th February 2013
X-BeenThere: oauth@ietf.org
X-Mailman-Version: 2.1.12
Precedence: list
Reply-To: William Mills <wmills_92105@yahoo.com>
List-Id: OAUTH WG <oauth.ietf.org>
List-Unsubscribe: <https://www.ietf.org/mailman/options/oauth>, <mailto:oauth-request@ietf.org?subject=unsubscribe>
List-Archive: <http://www.ietf.org/mail-archive/web/oauth>
List-Post: <mailto:oauth@ietf.org>
List-Help: <mailto:oauth-request@ietf.org?subject=help>
List-Subscribe: <https://www.ietf.org/mailman/listinfo/oauth>, <mailto:oauth-request@ietf.org?subject=subscribe>
X-List-Received-Date: Fri, 15 Feb 2013 07:08:39 -0000

--764183289-258296331-1360912115=:36543
Content-Type: text/plain; charset=iso-8859-1
Content-Transfer-Encoding: quoted-printable

I fundamentally disagree with that too. =A0OAuth 2 is the *framework*, one =
which supports multiple token types. =A0Bearer tokens were the first creden=
tial type defined.=0A=0AOAuth 1.0a also requires HTTPS transport for authen=
tication and getting the token.=0A=0AThere are =A0real use cases for tokens=
 usable over plain text with integrity protection.=0A=0A-bill=0A=0A=0A_____=
___________________________=0A From: Torsten Lodderstedt <torsten@lodderste=
dt.net>=0ATo: William Mills <wmills_92105@yahoo.com> =0ACc: Mike Jones <Mic=
hael.Jones@microsoft.com>; Justin Richer <jricher@mitre.org>; Phil Hunt <ph=
il.hunt@oracle.com>; IETF oauth WG <oauth@ietf.org> =0ASent: Thursday, Febr=
uary 14, 2013 10:05 PM=0ASubject: Re: [OAUTH-WG] Minutes from the OAuth Des=
ign Team Conference Call - 11th February 2013=0A =0A=0AHi Bill,=0A=0AOAuth =
2.0 took a different direction by relying on HTTPS to provide the basic pro=
tection. So the need to have a token, which can be used for service request=
s over plain HTTP is arguable. My understanding of this activity was, the i=
ntend is to provide additional protection on top of HTTPS.=0A=0Aregards,=0A=
Torsten.=0A=0AAm 15.02.2013 um 02:31 schrieb William Mills <wmills_92105@ya=
hoo.com>:=0A=0A=0AI disagree with "That was the impediment to OAuth 1.0 ado=
ption that OAuth 2.0 solved in the first place.", unless "solving" means do=
es not address the need for it at all.=0A>=0A>=0A>OAuth 2 does several good=
 things, but it still lacks a defined token type that is safe to user over =
plain text HTTP. =A01.0a solved that.=0A>=0A>=0A>=0A>______________________=
__________=0A> From: Mike Jones <Michael.Jones@microsoft.com>=0A>To: Justin=
 Richer <jricher@mitre.org>; Phil Hunt <phil.hunt@oracle.com> =0A>Cc: IETF =
oauth WG <oauth@ietf.org> =0A>Sent: Thursday, February 14, 2013 1:44 PM=0A>=
Subject: Re: [OAUTH-WG] Minutes from the OAuth Design Team Conference Call =
- 11th February 2013=0A> =0A>I'm in favor of reusing the JWT work that this=
 WG is also doing. :-)=0A>=0A>I'm pretty skeptical of us inventing another =
custom scheme for signing HTTP headers.=A0 That was the impediment to OAuth=
 1.0 adoption that OAuth 2.0 solved in the first place.=0A>=0A>=A0=A0=A0 =
=A0=A0=A0 =A0=A0=A0 =A0=A0=A0 -- Mike=0A>=0A>-----Original Message-----=0A>=
From: oauth-bounces@ietf.org [mailto:oauth-bounces@ietf.org] On Behalf Of J=
ustin Richer=0A>Sent: Tuesday, February 12, 2013 9:35 AM=0A>To: Phil Hunt=
=0A>Cc: IETF oauth WG=0A>Subject: Re: [OAUTH-WG] Minutes from the OAuth Des=
ign Team Conference Call - 11th February 2013=0A>=0A>That's my reading of i=
t as well, Phil, thanks for providing the clarification. One motivator behi=
nd using a JSON-based token is to be able to=0A re-use some of the great wo=
rk that the JOSE group is doing but apply it to an HTTP payload.=0A>=0A>Wha=
t neither of us want is a token type that requires stuffing all query, head=
er, and other parameters *into* the JSON object itself, which would be a mo=
re SOAPy approach.=0A>=0A>=A0 -- Justin=0A>=0A>On 02/12/2013 12:30 PM, Phil=
 Hunt wrote:=0A>> Clarification.=A0 I think Justin and I were in agreement =
that we don't want to see a format that requires JSON payloads.=A0 We are b=
oth interested in a JSON token used in the authorization header that could =
be based on a computed signature of some combination of http headers and bo=
dy if possible.=0A>>=0A>> Phil=0A>>=0A>> @independentid=0A>> www.independen=
tid.com=0A>> phil.hunt@oracle.com=0A>>=0A>>=0A>>=0A>>=0A>>=0A>> On=0A 2013-=
02-12, at 1:10 AM, Hannes Tschofenig wrote:=0A>>=0A>>> Here are my notes.=
=0A>>>=0A>>> Participants:=0A>>>=0A>>> * John Bradley=0A>>> * Derek Atkins=
=0A>>> * Phil Hunt=0A>>> * Prateek Mishra=0A>>> * Hannes Tschofenig=0A>>> *=
 Mike Jones=0A>>> * Antonio Sanso=0A>>> * Justin Richer=0A>>>=0A>>> Notes:=
=0A>>>=0A>>> My slides are available here: =0A>>> http://www.tschofenig.pri=
v.at/OAuth2-Security-11Feb2013.ppt=0A>>>=0A>>> Slide #2 summarizes earlier =
discussions during the conference calls.=0A>>>=0A>>> -- HTTP vs. JSON=0A>>>=
=0A>>> Phil noted that he does not like to use the MAC Token draft as a sta=
rting point because it does not re-use any of the work done in the JOSE wor=
king group and in particular all the libraries that are available today. He=
 mentioned that earlier attempts to write the MAC Token code lead to=0A pro=
blems for implementers.=0A>>>=0A>>> Justin responded that he does not agree=
 with using JSON as a transport mechanism since this would replicate a SOAP=
 style.=0A>>>=0A>>> Phil noted that he wants to send JSON but the signature=
 shall be computed over the HTTP header field.=0A>>>=0A>>> -- Flexibility f=
or the keyed message digest computation=0A>>>=0A>>>=A0 From earlier discuss=
ion it was clear that the conference call participants wanted more flexibil=
ity regarding the keyed message digest computation. For this purpose Hannes=
 presented the DKIM based approach, which allows selective header fields to=
 be included in the digest. This is shown in slide #4.=0A>>>=0A>>> After so=
me discussion the conference call participants thought that this would meet=
 their needs. Further investigations would still be useful to determine the=
 degree of failed HMAC calculations due to HTTP proxies modifying the=0A co=
ntent.=0A>>>=0A>>> -- Key Distribution=0A>>>=0A>>> Hannes presented the ope=
n issue regarding the choice of key =0A>>> distribution. Slides #6-#8 prese=
nt three techniques and Hannes asked =0A>>> for feedback regarding the pref=
erred style. Justin and others didn't =0A>>> see the need to decide on one =
mechanism - they wanted to keep the =0A>>> choice open. Derek indicated tha=
t this will not be an acceptable =0A>>> approach. Since the resource server=
 and the authorization server may, =0A>>> in the OAuth 2.0 framework, be en=
tities produced by different vendors =0A>>> there is an interoperability ne=
ed. Justin responded that he disagrees =0A>>> and that the resource server =
needs to understand the access token and =0A>>> referred to the recent draf=
t submission for the token introspection =0A>>> endpoint. Derek indicated t=
hat the resource server has to understand =0A>>>=0A the content of the acce=
ss token and the token introspection endpoint =0A>>> just pushes the proble=
m around: the resource server has to send the =0A>>> access token to the au=
thorization server and then the resource server =0A>>> gets the result back=
 (which he the=0A>n=0A>>=A0 =A0 a=0A>>> gain needs to understand) in order =
to make a meaningful authorization decision.=0A>>>=0A>>> Everyone agreed th=
at the client must receive the session key from the authorization server an=
d that this approach has to be standardized. It was also agreed that this i=
s a common approach among all three key distribution mechanisms.=0A>>>=0A>>=
> Hannes asked the participants to think about their preference.=0A>>>=0A>>=
> The questions regarding key naming and the indication for the intended re=
source server the client wants to talk to have been postponed.=0A>>>=0A>>> =
Ciao=0A>>>=0A Hannes=0A>>>=0A>>>=0A>>> ____________________________________=
___________=0A>>> OAuth mailing list=0A>>> OAuth@ietf.org=0A>>> https://www=
.ietf.org/mailman/listinfo/oauth=0A>> _____________________________________=
__________=0A>> OAuth mailing list=0A>> OAuth@ietf.org=0A>> https://www.iet=
f.org/mailman/listinfo/oauth=0A>=0A>=0A>___________________________________=
____________=0A>OAuth mailing list=0A>OAuth@ietf.org=0A>https://www.ietf.or=
g/mailman/listinfo/oauth=0A>_______________________________________________=
=0A>OAuth mailing list=0A>OAuth@ietf.org=0A>https://www.ietf.org/mailman/li=
stinfo/oauth=0A>=0A>=0A>=0A_______________________________________________=
=0A>OAuth mailing list=0A>OAuth@ietf.org=0A>https://www.ietf.org/mailman/li=
stinfo/oauth=0A>
--764183289-258296331-1360912115=:36543
Content-Type: text/html; charset=iso-8859-1
Content-Transfer-Encoding: quoted-printable

<html><body><div style=3D"color:#000; background-color:#fff; font-family:Co=
urier New, courier, monaco, monospace, sans-serif;font-size:12pt"><div><spa=
n>I fundamentally disagree with that too. &nbsp;OAuth 2 is the *framework*,=
 one which supports multiple token types. &nbsp;Bearer tokens were the firs=
t credential type defined.</span></div><div style=3D"color: rgb(0, 0, 0); f=
ont-size: 16px; font-family: 'Courier New', courier, monaco, monospace, san=
s-serif; background-color: transparent; font-style: normal;"><span><br></sp=
an></div><div style=3D"color: rgb(0, 0, 0); font-size: 16px; font-family: '=
Courier New', courier, monaco, monospace, sans-serif; background-color: tra=
nsparent; font-style: normal;"><span>OAuth 1.0a also requires HTTPS transpo=
rt for authentication and getting the token.</span></div><div style=3D"colo=
r: rgb(0, 0, 0); font-size: 16px; font-family: 'Courier New', courier, mona=
co, monospace, sans-serif; background-color: transparent; font-style:
 normal;"><span><br></span></div><div style=3D"color: rgb(0, 0, 0); font-si=
ze: 16px; font-family: 'Courier New', courier, monaco, monospace, sans-seri=
f; background-color: transparent; font-style: normal;"><span>There are &nbs=
p;real use cases for tokens usable over plain text with integrity protectio=
n.</span></div><div style=3D"color: rgb(0, 0, 0); font-size: 16px; font-fam=
ily: 'Courier New', courier, monaco, monospace, sans-serif; background-colo=
r: transparent; font-style: normal;"><span><br></span></div><div style=3D"c=
olor: rgb(0, 0, 0); font-size: 16px; font-family: 'Courier New', courier, m=
onaco, monospace, sans-serif; background-color: transparent; font-style: no=
rmal;"><span>-bill</span></div><div><br></div>  <div style=3D"font-family: =
'Courier New', courier, monaco, monospace, sans-serif; font-size: 12pt;"> <=
div style=3D"font-family: 'times new roman', 'new york', times, serif; font=
-size: 12pt;"> <div dir=3D"ltr"> <font size=3D"2" face=3D"Arial"> <hr size=
=3D"1">=20
 <b><span style=3D"font-weight:bold;">From:</span></b> Torsten Lodderstedt =
&lt;torsten@lodderstedt.net&gt;<br> <b><span style=3D"font-weight: bold;">T=
o:</span></b> William Mills &lt;wmills_92105@yahoo.com&gt; <br><b><span sty=
le=3D"font-weight: bold;">Cc:</span></b> Mike Jones &lt;Michael.Jones@micro=
soft.com&gt;; Justin Richer &lt;jricher@mitre.org&gt;; Phil Hunt &lt;phil.h=
unt@oracle.com&gt;; IETF oauth WG &lt;oauth@ietf.org&gt; <br> <b><span styl=
e=3D"font-weight: bold;">Sent:</span></b> Thursday, February 14, 2013 10:05=
 PM<br> <b><span style=3D"font-weight: bold;">Subject:</span></b> Re: [OAUT=
H-WG] Minutes from the OAuth Design Team Conference Call - 11th February 20=
13<br> </font> </div> <br>=0A<div id=3D"yiv1891138081"><div><div>Hi Bill,</=
div><div><br></div><div>OAuth 2.0 took a different direction by relying on =
HTTPS to provide the basic protection. So the need to have a token, which c=
an be used for service requests over plain HTTP is arguable. My understandi=
ng of this activity was, the intend is to provide additional protection on =
top of HTTPS.</div><div><br></div><div>regards,</div><div>Torsten.</div><di=
v><br>Am 15.02.2013 um 02:31 schrieb William Mills &lt;<a rel=3D"nofollow" =
ymailto=3D"mailto:wmills_92105@yahoo.com" target=3D"_blank" href=3D"mailto:=
wmills_92105@yahoo.com">wmills_92105@yahoo.com</a>&gt;:<br><br></div><block=
quote type=3D"cite"><div><div style=3D"color: rgb(0, 0, 0); background-colo=
r: rgb(255, 255, 255); font-family: 'Courier New', courier, monaco, monospa=
ce, sans-serif; font-size: 12pt;"><div><span>I disagree with "</span><span =
style=3D"font-family: 'times new roman', 'new york', times, serif; font-siz=
e: 12pt;">That was the impediment to
 OAuth 1.0 adoption that OAuth 2.0 solved in the first place.", unless "sol=
ving" means does not address the need for it at all.</span></div><div style=
=3D"color: rgb(0, 0, 0); font-size: 12pt; font-family: 'times new roman', '=
new york', times, serif; background-color: transparent; font-style: normal;=
"><span style=3D"font-family: 'times new roman', 'new york', times, serif; =
font-size: 12pt;"><br></span></div><div style=3D"color: rgb(0, 0, 0); font-=
size: 16px; font-family: 'times new roman', 'new york', times, serif; backg=
round-color: transparent; font-style: normal;"><span style=3D"font-family: =
'times new roman', 'new york', times, serif; font-size: 12pt;">OAuth 2 does=
 several=0A good things, but it still lacks a defined token type that is sa=
fe to user over plain text HTTP. &nbsp;1.0a solved that.</span></div><div><=
br></div>  <div style=3D"font-family: 'Courier New', courier, monaco, monos=
pace, sans-serif; font-size: 12pt;"> <div style=3D"font-family: 'times new =
roman', 'new york', times, serif; font-size: 12pt;"> <div dir=3D"ltr"> <fon=
t size=3D"2" face=3D"Arial"> <hr size=3D"1">  <b><span style=3D"font-weight=
:bold;">From:</span></b> Mike Jones &lt;<a rel=3D"nofollow" ymailto=3D"mail=
to:Michael.Jones@microsoft.com" target=3D"_blank" href=3D"mailto:Michael.Jo=
nes@microsoft.com">Michael.Jones@microsoft.com</a>&gt;<br> <b><span style=
=3D"font-weight:bold;">To:</span></b> Justin Richer &lt;<a rel=3D"nofollow"=
 ymailto=3D"mailto:jricher@mitre.org" target=3D"_blank" href=3D"mailto:jric=
her@mitre.org">jricher@mitre.org</a>&gt;; Phil Hunt &lt;<a rel=3D"nofollow"=
 ymailto=3D"mailto:phil.hunt@oracle.com" target=3D"_blank"
 href=3D"mailto:phil.hunt@oracle.com">phil.hunt@oracle.com</a>&gt; <br><b><=
span style=3D"font-weight:bold;">Cc:</span></b> IETF oauth WG &lt;<a rel=3D=
"nofollow" ymailto=3D"mailto:oauth@ietf.org" target=3D"_blank" href=3D"mail=
to:oauth@ietf.org">oauth@ietf.org</a>&gt; <br> <b><span style=3D"font-weigh=
t:bold;">Sent:</span></b> Thursday, February 14, 2013 1:44 PM<br> <b><span =
style=3D"font-weight:bold;">Subject:</span></b> Re: [OAUTH-WG] Minutes from=
 the OAuth Design Team Conference Call - 11th February 2013<br>=0A </font> =
</div> <br>=0AI'm in favor of reusing the JWT work that this WG is also doi=
ng. :-)<br><br>I'm pretty skeptical of us inventing another custom scheme f=
or signing HTTP headers.&nbsp; That was the impediment to OAuth 1.0 adoptio=
n that OAuth 2.0 solved in the first place.<br><br>&nbsp;&nbsp;&nbsp; &nbsp=
;&nbsp;&nbsp; &nbsp;&nbsp;&nbsp; &nbsp;&nbsp;&nbsp; -- Mike<br><br>-----Ori=
ginal Message-----<br>From: <a rel=3D"nofollow" ymailto=3D"mailto:oauth-bou=
nces@ietf.org" target=3D"_blank" href=3D"mailto:oauth-bounces@ietf.org">oau=
th-bounces@ietf.org</a> [mailto:<a rel=3D"nofollow" ymailto=3D"mailto:oauth=
-bounces@ietf.org" target=3D"_blank" href=3D"mailto:oauth-bounces@ietf.org"=
>oauth-bounces@ietf.org</a>] On Behalf Of Justin Richer<br>Sent: Tuesday, F=
ebruary 12, 2013 9:35 AM<br>To: Phil Hunt<br>Cc: IETF oauth WG<br>Subject: =
Re: [OAUTH-WG] Minutes from the OAuth Design Team Conference Call - 11th Fe=
bruary 2013<br><br>That's my reading of it as well, Phil, thanks for provid=
ing the clarification.
 One motivator behind using a JSON-based token is to be able to=0A re-use s=
ome of the great work that the JOSE group is doing but apply it to an HTTP =
payload.<br><br>What neither of us want is a token type that requires stuff=
ing all query, header, and other parameters *into* the JSON object itself, =
which would be a more SOAPy approach.<br><br>&nbsp; -- Justin<br><br>On 02/=
12/2013 12:30 PM, Phil Hunt wrote:<br>&gt; Clarification.&nbsp; I think Jus=
tin and I were in agreement that we don't want to see a format that require=
s JSON payloads.&nbsp; We are both interested in a JSON token used in the a=
uthorization header that could be based on a computed signature of some com=
bination of http headers and body if possible.<br>&gt;<br>&gt; Phil<br>&gt;=
<br>&gt; @independentid<br>&gt; <a rel=3D"nofollow" target=3D"_blank" href=
=3D"http://www.independentid.com/">www.independentid.com</a><br>&gt; <a rel=
=3D"nofollow" ymailto=3D"mailto:phil.hunt@oracle.com" target=3D"_blank"
 href=3D"mailto:phil.hunt@oracle.com">phil.hunt@oracle.com</a><br>&gt;<br>&=
gt;<br>&gt;<br>&gt;<br>&gt;<br>&gt; On=0A 2013-02-12, at 1:10 AM, Hannes Ts=
chofenig wrote:<br>&gt;<br>&gt;&gt; Here are my notes.<br>&gt;&gt;<br>&gt;&=
gt; Participants:<br>&gt;&gt;<br>&gt;&gt; * John Bradley<br>&gt;&gt; * Dere=
k Atkins<br>&gt;&gt; * Phil Hunt<br>&gt;&gt; * Prateek Mishra<br>&gt;&gt; *=
 Hannes Tschofenig<br>&gt;&gt; * Mike Jones<br>&gt;&gt; * Antonio Sanso<br>=
&gt;&gt; * Justin Richer<br>&gt;&gt;<br>&gt;&gt; Notes:<br>&gt;&gt;<br>&gt;=
&gt; My slides are available here: <br>&gt;&gt; http://www.tschofenig.priv.=
at/OAuth2-Security-11Feb2013.ppt<br>&gt;&gt;<br>&gt;&gt; Slide #2 summarize=
s earlier discussions during the conference calls.<br>&gt;&gt;<br>&gt;&gt; =
-- HTTP vs. JSON<br>&gt;&gt;<br>&gt;&gt; Phil noted that he does not like t=
o use the MAC Token draft as a starting point because it does not re-use an=
y of the work done in the JOSE working group and in particular all the libr=
aries that are available today. He mentioned that earlier attempts to write=
 the MAC Token code lead to=0A problems for implementers.<br>&gt;&gt;<br>&g=
t;&gt; Justin responded that he does not agree with using JSON as a transpo=
rt mechanism since this would replicate a SOAP style.<br>&gt;&gt;<br>&gt;&g=
t; Phil noted that he wants to send JSON but the signature shall be compute=
d over the HTTP header field.<br>&gt;&gt;<br>&gt;&gt; -- Flexibility for th=
e keyed message digest computation<br>&gt;&gt;<br>&gt;&gt;&nbsp; From earli=
er discussion it was clear that the conference call participants wanted mor=
e flexibility regarding the keyed message digest computation. For this purp=
ose Hannes presented the DKIM based approach, which allows selective header=
 fields to be included in the digest. This is shown in slide #4.<br>&gt;&gt=
;<br>&gt;&gt; After some discussion the conference call participants though=
t that this would meet their needs. Further investigations would still be u=
seful to determine the degree of failed HMAC calculations due to HTTP proxi=
es modifying the=0A content.<br>&gt;&gt;<br>&gt;&gt; -- Key Distribution<br=
>&gt;&gt;<br>&gt;&gt; Hannes presented the open issue regarding the choice =
of key <br>&gt;&gt; distribution. Slides #6-#8 present three techniques and=
 Hannes asked <br>&gt;&gt; for feedback regarding the preferred style. Just=
in and others didn't <br>&gt;&gt; see the need to decide on one mechanism -=
 they wanted to keep the <br>&gt;&gt; choice open. Derek indicated that thi=
s will not be an acceptable <br>&gt;&gt; approach. Since the resource serve=
r and the authorization server may, <br>&gt;&gt; in the OAuth 2.0 framework=
, be entities produced by different vendors <br>&gt;&gt; there is an intero=
perability need. Justin responded that he disagrees <br>&gt;&gt; and that t=
he resource server needs to understand the access token and <br>&gt;&gt; re=
ferred to the recent draft submission for the token introspection <br>&gt;&=
gt; endpoint. Derek indicated that the resource server has to understand <b=
r>&gt;&gt;=0A the content of the access token and the token introspection e=
ndpoint <br>&gt;&gt; just pushes the problem around: the resource server ha=
s to send the <br>&gt;&gt; access token to the authorization server and the=
n the resource server <br>&gt;&gt; gets the result back (which he the<br> n=
<br>&gt;&nbsp; &nbsp; a<br>&gt;&gt; gain needs to understand) in order to m=
ake a meaningful authorization decision.<br>&gt;&gt;<br>&gt;&gt; Everyone a=
greed that the client must receive the session key from the authorization s=
erver and that this approach has to be standardized. It was also agreed tha=
t this is a common approach among all three key distribution mechanisms.<br=
>&gt;&gt;<br>&gt;&gt; Hannes asked the participants to think about their pr=
eference.<br>&gt;&gt;<br>&gt;&gt; The questions regarding key naming and th=
e indication for the intended resource server the client wants to talk to h=
ave been postponed.<br>&gt;&gt;<br>&gt;&gt; Ciao<br>&gt;&gt;=0A Hannes<br>&=
gt;&gt;<br>&gt;&gt;<br>&gt;&gt; ___________________________________________=
____<br>&gt;&gt; OAuth mailing list<br>&gt;&gt; <a rel=3D"nofollow" ymailto=
=3D"mailto:OAuth@ietf.org" target=3D"_blank" href=3D"mailto:OAuth@ietf.org"=
>OAuth@ietf.org</a><br>&gt;&gt; <a rel=3D"nofollow" target=3D"_blank" href=
=3D"https://www.ietf.org/mailman/listinfo/oauth">https://www.ietf.org/mailm=
an/listinfo/oauth</a><br>&gt; _____________________________________________=
__<br>&gt; OAuth mailing list<br>&gt; <a rel=3D"nofollow" ymailto=3D"mailto=
:OAuth@ietf.org" target=3D"_blank" href=3D"mailto:OAuth@ietf.org">OAuth@iet=
f.org</a><br>&gt; <a rel=3D"nofollow" target=3D"_blank" href=3D"https://www=
.ietf.org/mailman/listinfo/oauth">https://www.ietf.org/mailman/listinfo/oau=
th</a><br><br><br>_______________________________________________<br>OAuth =
mailing list<br><a rel=3D"nofollow" ymailto=3D"mailto:OAuth@ietf.org" targe=
t=3D"_blank" href=3D"mailto:OAuth@ietf.org">OAuth@ietf.org</a><br><a rel=3D=
"nofollow"
 target=3D"_blank" href=3D"https://www.ietf.org/mailman/listinfo/oauth">htt=
ps://www.ietf.org/mailman/listinfo/oauth</a><br>___________________________=
____________________<br>OAuth mailing list<br><a rel=3D"nofollow" ymailto=
=3D"mailto:OAuth@ietf.org" target=3D"_blank" href=3D"mailto:OAuth@ietf.org"=
>OAuth@ietf.org</a><br><a rel=3D"nofollow" target=3D"_blank" href=3D"https:=
//www.ietf.org/mailman/listinfo/oauth">https://www.ietf.org/mailman/listinf=
o/oauth</a><br><br><br> </div> </div>  </div></div></blockquote><blockquote=
 type=3D"cite"><div><span>_______________________________________________</=
span><br><span>OAuth mailing list</span><br><span><a rel=3D"nofollow" ymail=
to=3D"mailto:OAuth@ietf.org" target=3D"_blank" href=3D"mailto:OAuth@ietf.or=
g">OAuth@ietf.org</a></span><br><span><a rel=3D"nofollow" target=3D"_blank"=
 href=3D"https://www.ietf.org/mailman/listinfo/oauth">https://www.ietf.org/=
mailman/listinfo/oauth</a></span><br></div></blockquote></div></div><br><br=
> </div> </div>=20
 </div></body></html>
--764183289-258296331-1360912115=:36543--

From jricher@mitre.org  Fri Feb 15 06:59:19 2013
Return-Path: <jricher@mitre.org>
X-Original-To: oauth@ietfa.amsl.com
Delivered-To: oauth@ietfa.amsl.com
Received: from localhost (localhost [127.0.0.1]) by ietfa.amsl.com (Postfix) with ESMTP id 65D8F21F85C3 for <oauth@ietfa.amsl.com>; Fri, 15 Feb 2013 06:59:19 -0800 (PST)
X-Virus-Scanned: amavisd-new at amsl.com
X-Spam-Flag: NO
X-Spam-Score: -6.572
X-Spam-Level: 
X-Spam-Status: No, score=-6.572 tagged_above=-999 required=5 tests=[AWL=0.027,  BAYES_00=-2.599, RCVD_IN_DNSWL_MED=-4]
Received: from mail.ietf.org ([64.170.98.30]) by localhost (ietfa.amsl.com [127.0.0.1]) (amavisd-new, port 10024) with ESMTP id F8tZs0w-kIEl for <oauth@ietfa.amsl.com>; Fri, 15 Feb 2013 06:59:18 -0800 (PST)
Received: from smtpksrv1.mitre.org (smtpksrv1.mitre.org [198.49.146.77]) by ietfa.amsl.com (Postfix) with ESMTP id B1AC121F8803 for <oauth@ietf.org>; Fri, 15 Feb 2013 06:59:18 -0800 (PST)
Received: from smtpksrv1.mitre.org (localhost.localdomain [127.0.0.1]) by localhost (Postfix) with SMTP id 102C55310093 for <oauth@ietf.org>; Fri, 15 Feb 2013 09:59:18 -0500 (EST)
Received: from IMCCAS01.MITRE.ORG (imccas01.mitre.org [129.83.29.78]) by smtpksrv1.mitre.org (Postfix) with ESMTP id C56C1439002F for <oauth@ietf.org>; Fri, 15 Feb 2013 09:59:17 -0500 (EST)
Received: from [10.146.15.29] (129.83.31.58) by IMCCAS01.MITRE.ORG (129.83.29.78) with Microsoft SMTP Server (TLS) id 14.2.318.4; Fri, 15 Feb 2013 09:59:17 -0500
Message-ID: <511E4D17.1020805@mitre.org>
Date: Fri, 15 Feb 2013 09:58:31 -0500
From: Justin Richer <jricher@mitre.org>
User-Agent: Mozilla/5.0 (X11; Linux i686; rv:17.0) Gecko/20130106 Thunderbird/17.0.2
MIME-Version: 1.0
To: "oauth@ietf.org" <oauth@ietf.org>
References: <MLQM-20130211165153754-71682@mlite.mitre.org>
In-Reply-To: <MLQM-20130211165153754-71682@mlite.mitre.org>
Content-Type: text/plain; charset="ISO-8859-1"; format=flowed
Content-Transfer-Encoding: 7bit
X-Originating-IP: [129.83.31.58]
Subject: Re: [OAUTH-WG] Registration: JSON Encoded Input
X-BeenThere: oauth@ietf.org
X-Mailman-Version: 2.1.12
Precedence: list
List-Id: OAUTH WG <oauth.ietf.org>
List-Unsubscribe: <https://www.ietf.org/mailman/options/oauth>, <mailto:oauth-request@ietf.org?subject=unsubscribe>
List-Archive: <http://www.ietf.org/mail-archive/web/oauth>
List-Post: <mailto:oauth@ietf.org>
List-Help: <mailto:oauth-request@ietf.org?subject=help>
List-Subscribe: <https://www.ietf.org/mailman/listinfo/oauth>, <mailto:oauth-request@ietf.org?subject=subscribe>
X-List-Received-Date: Fri, 15 Feb 2013 14:59:19 -0000

In case people missed a subtle change, I wanted to bring it to the 
group's attention:

The metadata parameters "request_uri" and "grant_type" are now JSON 
lists instead of space-separated lists of strings. The "scope" parameter 
remains a space-separated string, taking its definition from RFC6749 
section 3.3. This is due to a conversation that came up around the use 
of the "scope" parameter in the introspection endpoint, and folks 
generally thought that the definitions should match.

If we do JSON input (which there seems to be overwhelming support for), 
then I believe we should at the very least split up lists that are lists 
instead of forcing clients and servers to do string parsing.

  -- Justin

On 02/11/2013 04:14 PM, Justin Richer wrote:
> Draft -05 of OAuth Dynamic Client Registration [1] switched from a 
> form-encoded input that had been used by drafts -01 through -04 to a 
> JSON encoded input that was used originally in -00. Note that all 
> versions keep JSON-encoded output from all operations.
>
> Pro:
>  - JSON gives us a rich data structure so that things such as lists, 
> numbers, nulls, and objects can be represented natively
>  - Allows for parallelism between the input to the endpoint and output 
> from the endpoint, reducing possible translation errors between the two
>  - JSON specifies UTF8 encoding for all strings, forms may have many 
> different encodings
>  - JSON has minimal character escaping required for most strings, 
> forms require escaping for common characters such as space, slash, 
> comma, etc.
>
> Con:
>  - the rest of OAuth is form-in/JSON-out
>  - nothing else in OAuth requires the Client to create a JSON object, 
> merely to parse one
>  - form-in/JSON-out is a very widely established pattern on the web today
>  - Client information (client_name, client_id, etc.) is conflated with 
> access information (registration_access_token, _links, expires_at, 
> etc.) in root level of the same JSON object, leaving the client to 
> decide what needs to (can?) be sent back to the server for update 
> operations.
>
>
> Alternatives include any number of data encoding schemes, including 
> form (like the old drafts), XML, ASN.1, etc.
>
>
>  -- Justin
>
> [1] http://tools.ietf.org/html/draft-ietf-oauth-dyn-reg-05
> _______________________________________________
> OAuth mailing list
> OAuth@ietf.org
> https://www.ietf.org/mailman/listinfo/oauth
>


From ve7jtb@ve7jtb.com  Fri Feb 15 07:11:15 2013
Return-Path: <ve7jtb@ve7jtb.com>
X-Original-To: oauth@ietfa.amsl.com
Delivered-To: oauth@ietfa.amsl.com
Received: from localhost (localhost [127.0.0.1]) by ietfa.amsl.com (Postfix) with ESMTP id 8597B21F8839 for <oauth@ietfa.amsl.com>; Fri, 15 Feb 2013 07:11:15 -0800 (PST)
X-Virus-Scanned: amavisd-new at amsl.com
X-Spam-Flag: NO
X-Spam-Score: -3.395
X-Spam-Level: 
X-Spam-Status: No, score=-3.395 tagged_above=-999 required=5 tests=[AWL=0.204,  BAYES_00=-2.599, RCVD_IN_DNSWL_LOW=-1]
Received: from mail.ietf.org ([64.170.98.30]) by localhost (ietfa.amsl.com [127.0.0.1]) (amavisd-new, port 10024) with ESMTP id ClNQcHjaMn+P for <oauth@ietfa.amsl.com>; Fri, 15 Feb 2013 07:11:14 -0800 (PST)
Received: from mail-gh0-f175.google.com (mail-gh0-f175.google.com [209.85.160.175]) by ietfa.amsl.com (Postfix) with ESMTP id B3E2D21F8824 for <oauth@ietf.org>; Fri, 15 Feb 2013 07:11:14 -0800 (PST)
Received: by mail-gh0-f175.google.com with SMTP id g18so107156ghb.34 for <oauth@ietf.org>; Fri, 15 Feb 2013 07:11:14 -0800 (PST)
X-Google-DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=google.com; s=20120113; h=x-received:content-type:mime-version:subject:from:in-reply-to:date :cc:content-transfer-encoding:message-id:references:to:x-mailer :x-gm-message-state; bh=RU2kHDLbkMIKNc4/SgCVnaFu/AtZ8/yknJbaX3HTRsY=; b=Z9f8qXWdRTCEpdxKJUEWbf7RqME5VbWnHH5CL+8rsLJtV/1TSbmNJ+so+V9UKaN9Za iPkyvOzj0HvhD72NbNIGy9WMkbunNQDcdl0k2gXVqycK0JrBU16/aMEpURSylXDpcqyx Vy9jriwxuqrB388SprUZJgp7a+WUYwzcoR0huSJH7Xtv3ID5yPy6MjMbiGwT90whR3cv WL/oSaQWa5F9qORbMVAkLDYiIDKX26mB/D0RIHcVHe/pNKB5QaJSz+JCkJq2fiDgnmPO 8lML1dcxrHTscNPC8r2DKJX4zO1i4d8pNPqfVOJ2ehfVH8tZ8r9is3SYsplIQw14KxbI fGYw==
X-Received: by 10.101.180.21 with SMTP id h21mr874693anp.71.1360941074019; Fri, 15 Feb 2013 07:11:14 -0800 (PST)
Received: from [192.168.1.213] (190-20-20-115.baf.movistar.cl. [190.20.20.115]) by mx.google.com with ESMTPS id v43sm90068294yhm.11.2013.02.15.07.11.11 (version=TLSv1 cipher=ECDHE-RSA-RC4-SHA bits=128/128); Fri, 15 Feb 2013 07:11:12 -0800 (PST)
Content-Type: text/plain; charset=us-ascii
Mime-Version: 1.0 (Mac OS X Mail 6.2 \(1499\))
From: John Bradley <ve7jtb@ve7jtb.com>
In-Reply-To: <511E4D17.1020805@mitre.org>
Date: Fri, 15 Feb 2013 12:11:04 -0300
Content-Transfer-Encoding: quoted-printable
Message-Id: <D550C3DB-E0AA-4FBF-91F7-0C7137109FAB@ve7jtb.com>
References: <MLQM-20130211165153754-71682@mlite.mitre.org> <511E4D17.1020805@mitre.org>
To: Justin Richer <jricher@mitre.org>
X-Mailer: Apple Mail (2.1499)
X-Gm-Message-State: ALoCoQm2qYWRCO4hUVdA1xvFt2OU7P37zGYxT2xIZ9nOwIBNkJZDJ0qfzuUxTcDAwb2DJslDCUS9
Cc: "oauth@ietf.org" <oauth@ietf.org>
Subject: Re: [OAUTH-WG] Registration: JSON Encoded Input
X-BeenThere: oauth@ietf.org
X-Mailman-Version: 2.1.12
Precedence: list
List-Id: OAUTH WG <oauth.ietf.org>
List-Unsubscribe: <https://www.ietf.org/mailman/options/oauth>, <mailto:oauth-request@ietf.org?subject=unsubscribe>
List-Archive: <http://www.ietf.org/mail-archive/web/oauth>
List-Post: <mailto:oauth@ietf.org>
List-Help: <mailto:oauth-request@ietf.org?subject=help>
List-Subscribe: <https://www.ietf.org/mailman/listinfo/oauth>, <mailto:oauth-request@ietf.org?subject=subscribe>
X-List-Received-Date: Fri, 15 Feb 2013 15:11:15 -0000

Parameters that can be JSON lists rather than space separated sting s =
probably should be unless there is some compelling reason as in scopes =
to keep them space separated.   May as well save unnecessary string =
parsing.
=20
John B.

On 2013-02-15, at 11:58 AM, Justin Richer <jricher@mitre.org> wrote:

> In case people missed a subtle change, I wanted to bring it to the =
group's attention:
>=20
> The metadata parameters "request_uri" and "grant_type" are now JSON =
lists instead of space-separated lists of strings. The "scope" parameter =
remains a space-separated string, taking its definition from RFC6749 =
section 3.3. This is due to a conversation that came up around the use =
of the "scope" parameter in the introspection endpoint, and folks =
generally thought that the definitions should match.
>=20
> If we do JSON input (which there seems to be overwhelming support =
for), then I believe we should at the very least split up lists that are =
lists instead of forcing clients and servers to do string parsing.
>=20
> -- Justin
>=20
> On 02/11/2013 04:14 PM, Justin Richer wrote:
>> Draft -05 of OAuth Dynamic Client Registration [1] switched from a =
form-encoded input that had been used by drafts -01 through -04 to a =
JSON encoded input that was used originally in -00. Note that all =
versions keep JSON-encoded output from all operations.
>>=20
>> Pro:
>> - JSON gives us a rich data structure so that things such as lists, =
numbers, nulls, and objects can be represented natively
>> - Allows for parallelism between the input to the endpoint and output =
from the endpoint, reducing possible translation errors between the two
>> - JSON specifies UTF8 encoding for all strings, forms may have many =
different encodings
>> - JSON has minimal character escaping required for most strings, =
forms require escaping for common characters such as space, slash, =
comma, etc.
>>=20
>> Con:
>> - the rest of OAuth is form-in/JSON-out
>> - nothing else in OAuth requires the Client to create a JSON object, =
merely to parse one
>> - form-in/JSON-out is a very widely established pattern on the web =
today
>> - Client information (client_name, client_id, etc.) is conflated with =
access information (registration_access_token, _links, expires_at, etc.) =
in root level of the same JSON object, leaving the client to decide what =
needs to (can?) be sent back to the server for update operations.
>>=20
>>=20
>> Alternatives include any number of data encoding schemes, including =
form (like the old drafts), XML, ASN.1, etc.
>>=20
>>=20
>> -- Justin
>>=20
>> [1] http://tools.ietf.org/html/draft-ietf-oauth-dyn-reg-05
>> _______________________________________________
>> OAuth mailing list
>> OAuth@ietf.org
>> https://www.ietf.org/mailman/listinfo/oauth
>>=20
>=20
> _______________________________________________
> OAuth mailing list
> OAuth@ietf.org
> https://www.ietf.org/mailman/listinfo/oauth


From torsten@lodderstedt.net  Fri Feb 15 07:22:39 2013
Return-Path: <torsten@lodderstedt.net>
X-Original-To: oauth@ietfa.amsl.com
Delivered-To: oauth@ietfa.amsl.com
Received: from localhost (localhost [127.0.0.1]) by ietfa.amsl.com (Postfix) with ESMTP id 3963821F8A49 for <oauth@ietfa.amsl.com>; Fri, 15 Feb 2013 07:22:39 -0800 (PST)
X-Virus-Scanned: amavisd-new at amsl.com
X-Spam-Flag: NO
X-Spam-Score: -1.208
X-Spam-Level: 
X-Spam-Status: No, score=-1.208 tagged_above=-999 required=5 tests=[AWL=-0.356, BAYES_00=-2.599, HELO_EQ_DE=0.35, HTML_MESSAGE=0.001, MIME_QP_LONG_LINE=1.396]
Received: from mail.ietf.org ([64.170.98.30]) by localhost (ietfa.amsl.com [127.0.0.1]) (amavisd-new, port 10024) with ESMTP id XzdJeDfa9BCg for <oauth@ietfa.amsl.com>; Fri, 15 Feb 2013 07:22:37 -0800 (PST)
Received: from smtprelay03.ispgateway.de (smtprelay03.ispgateway.de [80.67.31.30]) by ietfa.amsl.com (Postfix) with ESMTP id DD44221F8A47 for <oauth@ietf.org>; Fri, 15 Feb 2013 07:22:36 -0800 (PST)
Received: from [91.2.95.252] (helo=[192.168.71.56]) by smtprelay03.ispgateway.de with esmtpsa (TLSv1:AES128-SHA:128) (Exim 4.68) (envelope-from <torsten@lodderstedt.net>) id 1U6N7S-0007LE-Gv; Fri, 15 Feb 2013 16:22:34 +0100
References: <0573984A-8C11-4960-9BC6-F44D4B664C19@gmx.net> <E808B6AC-D5F6-479F-967D-EA6B2586BE64@oracle.com> <511A7D27.8010209@mitre.org> <4E1F6AAD24975D4BA5B16804296739436744BD23@TK5EX14MBXC285.redmond.corp.microsoft.com> <1360891897.14004.YahooMailNeo@web31811.mail.mud.yahoo.com> <E7EBF78C-37EB-4737-8DD5-0F24C9FACA60@lodderstedt.net> <1360912115.36543.YahooMailNeo@web31811.mail.mud.yahoo.com>
Mime-Version: 1.0 (1.0)
In-Reply-To: <1360912115.36543.YahooMailNeo@web31811.mail.mud.yahoo.com>
Content-Type: multipart/alternative; boundary=Apple-Mail-1E6E942E-DD8B-48EB-B86A-D13097EF24A5
Content-Transfer-Encoding: 7bit
Message-Id: <2A0F585F-2CEF-418D-9654-5084E6C9BD0D@lodderstedt.net>
X-Mailer: iPad Mail (10B141)
From: Torsten Lodderstedt <torsten@lodderstedt.net>
Date: Fri, 15 Feb 2013 16:22:34 +0100
To: William Mills <wmills_92105@yahoo.com>
X-Df-Sender: dG9yc3RlbkBsb2RkZXJzdGVkdC1vbmxpbmUuZGU=
Cc: IETF oauth WG <oauth@ietf.org>
Subject: Re: [OAUTH-WG] Minutes from the OAuth Design Team Conference Call - 11th February 2013
X-BeenThere: oauth@ietf.org
X-Mailman-Version: 2.1.12
Precedence: list
List-Id: OAUTH WG <oauth.ietf.org>
List-Unsubscribe: <https://www.ietf.org/mailman/options/oauth>, <mailto:oauth-request@ietf.org?subject=unsubscribe>
List-Archive: <http://www.ietf.org/mail-archive/web/oauth>
List-Post: <mailto:oauth@ietf.org>
List-Help: <mailto:oauth-request@ietf.org?subject=help>
List-Subscribe: <https://www.ietf.org/mailman/listinfo/oauth>, <mailto:oauth-request@ietf.org?subject=subscribe>
X-List-Received-Date: Fri, 15 Feb 2013 15:22:39 -0000

--Apple-Mail-1E6E942E-DD8B-48EB-B86A-D13097EF24A5
Content-Type: text/plain;
	charset=us-ascii
Content-Transfer-Encoding: quoted-printable

Hi Bill,

I think one needs to compare the costs/impact of HTTPS on one side and the i=
mplementation of integrity protection and replay detection on the other. We h=
ad this discussion several times.

regards,
Torsten.

Am 15.02.2013 um 08:08 schrieb William Mills <wmills_92105@yahoo.com>:

> I fundamentally disagree with that too.  OAuth 2 is the *framework*, one w=
hich supports multiple token types.  Bearer tokens were the first credential=
 type defined.
>=20
> OAuth 1.0a also requires HTTPS transport for authentication and getting th=
e token.
>=20
> There are  real use cases for tokens usable over plain text with integrity=
 protection.
>=20
> -bill
>=20
> From: Torsten Lodderstedt <torsten@lodderstedt.net>
> To: William Mills <wmills_92105@yahoo.com>=20
> Cc: Mike Jones <Michael.Jones@microsoft.com>; Justin Richer <jricher@mitre=
.org>; Phil Hunt <phil.hunt@oracle.com>; IETF oauth WG <oauth@ietf.org>=20
> Sent: Thursday, February 14, 2013 10:05 PM
> Subject: Re: [OAUTH-WG] Minutes from the OAuth Design Team Conference Call=
 - 11th February 2013
>=20
> Hi Bill,
>=20
> OAuth 2.0 took a different direction by relying on HTTPS to provide the ba=
sic protection. So the need to have a token, which can be used for service r=
equests over plain HTTP is arguable. My understanding of this activity was, t=
he intend is to provide additional protection on top of HTTPS.
>=20
> regards,
> Torsten.
>=20
> Am 15.02.2013 um 02:31 schrieb William Mills <wmills_92105@yahoo.com>:
>=20
>> I disagree with "That was the impediment to OAuth 1.0 adoption that OAuth=
 2.0 solved in the first place.", unless "solving" means does not address th=
e need for it at all.
>>=20
>> OAuth 2 does several good things, but it still lacks a defined token type=
 that is safe to user over plain text HTTP.  1.0a solved that.
>>=20
>> From: Mike Jones <Michael.Jones@microsoft.com>
>> To: Justin Richer <jricher@mitre.org>; Phil Hunt <phil.hunt@oracle.com>=20=

>> Cc: IETF oauth WG <oauth@ietf.org>=20
>> Sent: Thursday, February 14, 2013 1:44 PM
>> Subject: Re: [OAUTH-WG] Minutes from the OAuth Design Team Conference Cal=
l - 11th February 2013
>>=20
>> I'm in favor of reusing the JWT work that this WG is also doing. :-)
>>=20
>> I'm pretty skeptical of us inventing another custom scheme for signing HT=
TP headers.  That was the impediment to OAuth 1.0 adoption that OAuth 2.0 so=
lved in the first place.
>>=20
>>                 -- Mike
>>=20
>> -----Original Message-----
>> From: oauth-bounces@ietf.org [mailto:oauth-bounces@ietf.org] On Behalf Of=
 Justin Richer
>> Sent: Tuesday, February 12, 2013 9:35 AM
>> To: Phil Hunt
>> Cc: IETF oauth WG
>> Subject: Re: [OAUTH-WG] Minutes from the OAuth Design Team Conference Cal=
l - 11th February 2013
>>=20
>> That's my reading of it as well, Phil, thanks for providing the clarifica=
tion. One motivator behind using a JSON-based token is to be able to re-use s=
ome of the great work that the JOSE group is doing but apply it to an HTTP p=
ayload.
>>=20
>> What neither of us want is a token type that requires stuffing all query,=
 header, and other parameters *into* the JSON object itself, which would be a=
 more SOAPy approach.
>>=20
>>   -- Justin
>>=20
>> On 02/12/2013 12:30 PM, Phil Hunt wrote:
>> > Clarification.  I think Justin and I were in agreement that we don't wa=
nt to see a format that requires JSON payloads.  We are both interested in a=
 JSON token used in the authorization header that could be based on a comput=
ed signature of some combination of http headers and body if possible.
>> >
>> > Phil
>> >
>> > @independentid
>> > www.independentid.com
>> > phil.hunt@oracle.com
>> >
>> >
>> >
>> >
>> >
>> > On 2013-02-12, at 1:10 AM, Hannes Tschofenig wrote:
>> >
>> >> Here are my notes.
>> >>
>> >> Participants:
>> >>
>> >> * John Bradley
>> >> * Derek Atkins
>> >> * Phil Hunt
>> >> * Prateek Mishra
>> >> * Hannes Tschofenig
>> >> * Mike Jones
>> >> * Antonio Sanso
>> >> * Justin Richer
>> >>
>> >> Notes:
>> >>
>> >> My slides are available here:=20
>> >> http://www.tschofenig.priv.at/OAuth2-Security-11Feb2013.ppt
>> >>
>> >> Slide #2 summarizes earlier discussions during the conference calls.
>> >>
>> >> -- HTTP vs. JSON
>> >>
>> >> Phil noted that he does not like to use the MAC Token draft as a start=
ing point because it does not re-use any of the work done in the JOSE workin=
g group and in particular all the libraries that are available today. He men=
tioned that earlier attempts to write the MAC Token code lead to problems fo=
r implementers.
>> >>
>> >> Justin responded that he does not agree with using JSON as a transport=
 mechanism since this would replicate a SOAP style.
>> >>
>> >> Phil noted that he wants to send JSON but the signature shall be compu=
ted over the HTTP header field.
>> >>
>> >> -- Flexibility for the keyed message digest computation
>> >>
>> >>  =46rom earlier discussion it was clear that the conference call parti=
cipants wanted more flexibility regarding the keyed message digest computati=
on. For this purpose Hannes presented the DKIM based approach, which allows s=
elective header fields to be included in the digest. This is shown in slide #=
4.
>> >>
>> >> After some discussion the conference call participants thought that th=
is would meet their needs. Further investigations would still be useful to d=
etermine the degree of failed HMAC calculations due to HTTP proxies modifyin=
g the content.
>> >>
>> >> -- Key Distribution
>> >>
>> >> Hannes presented the open issue regarding the choice of key=20
>> >> distribution. Slides #6-#8 present three techniques and Hannes asked=20=

>> >> for feedback regarding the preferred style. Justin and others didn't=20=

>> >> see the need to decide on one mechanism - they wanted to keep the=20
>> >> choice open. Derek indicated that this will not be an acceptable=20
>> >> approach. Since the resource server and the authorization server may,=20=

>> >> in the OAuth 2.0 framework, be entities produced by different vendors=20=

>> >> there is an interoperability need. Justin responded that he disagrees=20=

>> >> and that the resource server needs to understand the access token and=20=

>> >> referred to the recent draft submission for the token introspection=20=

>> >> endpoint. Derek indicated that the resource server has to understand=20=

>> >> the content of the access token and the token introspection endpoint=20=

>> >> just pushes the problem around: the resource server has to send the=20=

>> >> access token to the authorization server and then the resource server=20=

>> >> gets the result back (which he the
>> n
>> >    a
>> >> gain needs to understand) in order to make a meaningful authorization d=
ecision.
>> >>
>> >> Everyone agreed that the client must receive the session key from the a=
uthorization server and that this approach has to be standardized. It was al=
so agreed that this is a common approach among all three key distribution me=
chanisms.
>> >>
>> >> Hannes asked the participants to think about their preference.
>> >>
>> >> The questions regarding key naming and the indication for the intended=
 resource server the client wants to talk to have been postponed.
>> >>
>> >> Ciao
>> >> Hannes
>> >>
>> >>
>> >> _______________________________________________
>> >> OAuth mailing list
>> >> OAuth@ietf.org
>> >> https://www.ietf.org/mailman/listinfo/oauth
>> > _______________________________________________
>> > OAuth mailing list
>> > OAuth@ietf.org
>> > https://www.ietf.org/mailman/listinfo/oauth
>>=20
>>=20
>> _______________________________________________
>> OAuth mailing list
>> OAuth@ietf.org
>> https://www.ietf.org/mailman/listinfo/oauth
>> _______________________________________________
>> OAuth mailing list
>> OAuth@ietf.org
>> https://www.ietf.org/mailman/listinfo/oauth
>>=20
>>=20
>> _______________________________________________
>> OAuth mailing list
>> OAuth@ietf.org
>> https://www.ietf.org/mailman/listinfo/oauth
>=20
>=20

--Apple-Mail-1E6E942E-DD8B-48EB-B86A-D13097EF24A5
Content-Type: text/html;
	charset=utf-8
Content-Transfer-Encoding: quoted-printable

<html><head><meta http-equiv=3D"content-type" content=3D"text/html; charset=3D=
utf-8"></head><body dir=3D"auto"><div>Hi Bill,</div><div><br></div><div>I th=
ink one needs to compare the costs/impact of HTTPS on one side and the imple=
mentation of integrity protection and replay detection on the other. We had t=
his discussion several times.</div><div><br></div><div>regards,</div><div>To=
rsten.</div><div><br>Am 15.02.2013 um 08:08 schrieb William Mills &lt;<a hre=
f=3D"mailto:wmills_92105@yahoo.com">wmills_92105@yahoo.com</a>&gt;:<br><br><=
/div><blockquote type=3D"cite"><div><div style=3D"color:#000; background-col=
or:#fff; font-family:Courier New, courier, monaco, monospace, sans-serif;fon=
t-size:12pt"><div><span>I fundamentally disagree with that too. &nbsp;OAuth 2=
 is the *framework*, one which supports multiple token types. &nbsp;Bearer t=
okens were the first credential type defined.</span></div><div style=3D"colo=
r: rgb(0, 0, 0); font-size: 16px; font-family: 'Courier New', courier, monac=
o, monospace, sans-serif; background-color: transparent; font-style: normal;=
"><span><br></span></div><div style=3D"color: rgb(0, 0, 0); font-size: 16px;=
 font-family: 'Courier New', courier, monaco, monospace, sans-serif; backgro=
und-color: transparent; font-style: normal;"><span>OAuth 1.0a also requires H=
TTPS transport for authentication and getting the token.</span></div><div st=
yle=3D"color: rgb(0, 0, 0); font-size: 16px; font-family: 'Courier New', cou=
rier, monaco, monospace, sans-serif; background-color: transparent; font-sty=
le:
 normal;"><span><br></span></div><div style=3D"color: rgb(0, 0, 0); font-siz=
e: 16px; font-family: 'Courier New', courier, monaco, monospace, sans-serif;=
 background-color: transparent; font-style: normal;"><span>There are &nbsp;r=
eal use cases for tokens usable over plain text with integrity protection.</=
span></div><div style=3D"color: rgb(0, 0, 0); font-size: 16px; font-family: '=
Courier New', courier, monaco, monospace, sans-serif; background-color: tran=
sparent; font-style: normal;"><span><br></span></div><div style=3D"color: rg=
b(0, 0, 0); font-size: 16px; font-family: 'Courier New', courier, monaco, mo=
nospace, sans-serif; background-color: transparent; font-style: normal;"><sp=
an>-bill</span></div><div><br></div>  <div style=3D"font-family: 'Courier Ne=
w', courier, monaco, monospace, sans-serif; font-size: 12pt;"> <div style=3D=
"font-family: 'times new roman', 'new york', times, serif; font-size: 12pt;"=
> <div dir=3D"ltr"> <font size=3D"2" face=3D"Arial"> <hr size=3D"1">=20
 <b><span style=3D"font-weight:bold;">From:</span></b> Torsten Lodderstedt &=
lt;<a href=3D"mailto:torsten@lodderstedt.net">torsten@lodderstedt.net</a>&gt=
;<br> <b><span style=3D"font-weight: bold;">To:</span></b> William Mills &lt=
;<a href=3D"mailto:wmills_92105@yahoo.com">wmills_92105@yahoo.com</a>&gt; <b=
r><b><span style=3D"font-weight: bold;">Cc:</span></b> Mike Jones &lt;<a hre=
f=3D"mailto:Michael.Jones@microsoft.com">Michael.Jones@microsoft.com</a>&gt;=
; Justin Richer &lt;<a href=3D"mailto:jricher@mitre.org">jricher@mitre.org</=
a>&gt;; Phil Hunt &lt;<a href=3D"mailto:phil.hunt@oracle.com">phil.hunt@orac=
le.com</a>&gt;; IETF oauth WG &lt;<a href=3D"mailto:oauth@ietf.org">oauth@ie=
tf.org</a>&gt; <br> <b><span style=3D"font-weight: bold;">Sent:</span></b> T=
hursday, February 14, 2013 10:05 PM<br> <b><span style=3D"font-weight: bold;=
">Subject:</span></b> Re: [OAUTH-WG] Minutes from the OAuth Design Team Conf=
erence Call - 11th February 2013<br> </font> </div> <br>
<div id=3D"yiv1891138081"><div><div>Hi Bill,</div><div><br></div><div>OAuth 2=
.0 took a different direction by relying on HTTPS to provide the basic prote=
ction. So the need to have a token, which can be used for service requests o=
ver plain HTTP is arguable. My understanding of this activity was, the inten=
d is to provide additional protection on top of HTTPS.</div><div><br></div><=
div>regards,</div><div>Torsten.</div><div><br>Am 15.02.2013 um 02:31 schrieb=
 William Mills &lt;<a rel=3D"nofollow" ymailto=3D"mailto:wmills_92105@yahoo.=
com" target=3D"_blank" href=3D"mailto:wmills_92105@yahoo.com">wmills_92105@y=
ahoo.com</a>&gt;:<br><br></div><blockquote type=3D"cite"><div><div style=3D"=
color: rgb(0, 0, 0); background-color: rgb(255, 255, 255); font-family: 'Cou=
rier New', courier, monaco, monospace, sans-serif; font-size: 12pt;"><div><s=
pan>I disagree with "</span><span style=3D"font-family: 'times new roman', '=
new york', times, serif; font-size: 12pt;">That was the impediment to
 OAuth 1.0 adoption that OAuth 2.0 solved in the first place.", unless "solv=
ing" means does not address the need for it at all.</span></div><div style=3D=
"color: rgb(0, 0, 0); font-size: 12pt; font-family: 'times new roman', 'new y=
ork', times, serif; background-color: transparent; font-style: normal;"><spa=
n style=3D"font-family: 'times new roman', 'new york', times, serif; font-si=
ze: 12pt;"><br></span></div><div style=3D"color: rgb(0, 0, 0); font-size: 16=
px; font-family: 'times new roman', 'new york', times, serif; background-col=
or: transparent; font-style: normal;"><span style=3D"font-family: 'times new=
 roman', 'new york', times, serif; font-size: 12pt;">OAuth 2 does several
 good things, but it still lacks a defined token type that is safe to user o=
ver plain text HTTP. &nbsp;1.0a solved that.</span></div><div><br></div>  <d=
iv style=3D"font-family: 'Courier New', courier, monaco, monospace, sans-ser=
if; font-size: 12pt;"> <div style=3D"font-family: 'times new roman', 'new yo=
rk', times, serif; font-size: 12pt;"> <div dir=3D"ltr"> <font size=3D"2" fac=
e=3D"Arial"> <hr size=3D"1">  <b><span style=3D"font-weight:bold;">From:</sp=
an></b> Mike Jones &lt;<a rel=3D"nofollow" ymailto=3D"mailto:Michael.Jones@m=
icrosoft.com" target=3D"_blank" href=3D"mailto:Michael.Jones@microsoft.com">=
Michael.Jones@microsoft.com</a>&gt;<br> <b><span style=3D"font-weight:bold;"=
>To:</span></b> Justin Richer &lt;<a rel=3D"nofollow" ymailto=3D"mailto:jric=
her@mitre.org" target=3D"_blank" href=3D"mailto:jricher@mitre.org">jricher@m=
itre.org</a>&gt;; Phil Hunt &lt;<a rel=3D"nofollow" ymailto=3D"mailto:phil.h=
unt@oracle.com" target=3D"_blank" href=3D"mailto:phil.hunt@oracle.com">phil.=
hunt@oracle.com</a>&gt; <br><b><span style=3D"font-weight:bold;">Cc:</span><=
/b> IETF oauth WG &lt;<a rel=3D"nofollow" ymailto=3D"mailto:oauth@ietf.org" t=
arget=3D"_blank" href=3D"mailto:oauth@ietf.org">oauth@ietf.org</a>&gt; <br> <=
b><span style=3D"font-weight:bold;">Sent:</span></b> Thursday, February 14, 2=
013 1:44 PM<br> <b><span style=3D"font-weight:bold;">Subject:</span></b> Re:=
 [OAUTH-WG] Minutes from the OAuth Design Team Conference Call - 11th Februa=
ry 2013<br>
 </font> </div> <br>
I'm in favor of reusing the JWT work that this WG is also doing. :-)<br><br>=
I'm pretty skeptical of us inventing another custom scheme for signing HTTP h=
eaders.&nbsp; That was the impediment to OAuth 1.0 adoption that OAuth 2.0 s=
olved in the first place.<br><br>&nbsp;&nbsp;&nbsp; &nbsp;&nbsp;&nbsp; &nbsp=
;&nbsp;&nbsp; &nbsp;&nbsp;&nbsp; -- Mike<br><br>-----Original Message-----<b=
r>From: <a rel=3D"nofollow" ymailto=3D"mailto:oauth-bounces@ietf.org" target=
=3D"_blank" href=3D"mailto:oauth-bounces@ietf.org">oauth-bounces@ietf.org</a=
> [mailto:<a rel=3D"nofollow" ymailto=3D"mailto:oauth-bounces@ietf.org" targ=
et=3D"_blank" href=3D"mailto:oauth-bounces@ietf.org">oauth-bounces@ietf.org<=
/a>] On Behalf Of Justin Richer<br>Sent: Tuesday, February 12, 2013 9:35 AM<=
br>To: Phil Hunt<br>Cc: IETF oauth WG<br>Subject: Re: [OAUTH-WG] Minutes fro=
m the OAuth Design Team Conference Call - 11th February 2013<br><br>That's m=
y reading of it as well, Phil, thanks for providing the clarification.
 One motivator behind using a JSON-based token is to be able to
 re-use some of the great work that the JOSE group is doing but apply it to a=
n HTTP payload.<br><br>What neither of us want is a token type that requires=
 stuffing all query, header, and other parameters *into* the JSON object its=
elf, which would be a more SOAPy approach.<br><br>&nbsp; -- Justin<br><br>On=
 02/12/2013 12:30 PM, Phil Hunt wrote:<br>&gt; Clarification.&nbsp; I think J=
ustin and I were in agreement that we don't want to see a format that requir=
es JSON payloads.&nbsp; We are both interested in a JSON token used in the a=
uthorization header that could be based on a computed signature of some comb=
ination of http headers and body if possible.<br>&gt;<br>&gt; Phil<br>&gt;<b=
r>&gt; @independentid<br>&gt; <a rel=3D"nofollow" target=3D"_blank" href=3D"=
http://www.independentid.com/">www.independentid.com</a><br>&gt; <a rel=3D"n=
ofollow" ymailto=3D"mailto:phil.hunt@oracle.com" target=3D"_blank" href=3D"m=
ailto:phil.hunt@oracle.com">phil.hunt@oracle.com</a><br>&gt;<br>&gt;<br>&gt;=
<br>&gt;<br>&gt;<br>&gt; On
 2013-02-12, at 1:10 AM, Hannes Tschofenig wrote:<br>&gt;<br>&gt;&gt; Here a=
re my notes.<br>&gt;&gt;<br>&gt;&gt; Participants:<br>&gt;&gt;<br>&gt;&gt; *=
 John Bradley<br>&gt;&gt; * Derek Atkins<br>&gt;&gt; * Phil Hunt<br>&gt;&gt;=
 * Prateek Mishra<br>&gt;&gt; * Hannes Tschofenig<br>&gt;&gt; * Mike Jones<b=
r>&gt;&gt; * Antonio Sanso<br>&gt;&gt; * Justin Richer<br>&gt;&gt;<br>&gt;&g=
t; Notes:<br>&gt;&gt;<br>&gt;&gt; My slides are available here: <br>&gt;&gt;=
 <a href=3D"http://www.tschofenig.priv.at/OAuth2-Security-11Feb2013.ppt">htt=
p://www.tschofenig.priv.at/OAuth2-Security-11Feb2013.ppt</a><br>&gt;&gt;<br>=
&gt;&gt; Slide #2 summarizes earlier discussions during the conference calls=
.<br>&gt;&gt;<br>&gt;&gt; -- HTTP vs. JSON<br>&gt;&gt;<br>&gt;&gt; Phil note=
d that he does not like to use the MAC Token draft as a starting point becau=
se it does not re-use any of the work done in the JOSE working group and in p=
articular all the libraries that are available today. He mentioned that earl=
ier attempts to write the MAC Token code lead to
 problems for implementers.<br>&gt;&gt;<br>&gt;&gt; Justin responded that he=
 does not agree with using JSON as a transport mechanism since this would re=
plicate a SOAP style.<br>&gt;&gt;<br>&gt;&gt; Phil noted that he wants to se=
nd JSON but the signature shall be computed over the HTTP header field.<br>&=
gt;&gt;<br>&gt;&gt; -- Flexibility for the keyed message digest computation<=
br>&gt;&gt;<br>&gt;&gt;&nbsp; =46rom earlier discussion it was clear that th=
e conference call participants wanted more flexibility regarding the keyed m=
essage digest computation. For this purpose Hannes presented the DKIM based a=
pproach, which allows selective header fields to be included in the digest. T=
his is shown in slide #4.<br>&gt;&gt;<br>&gt;&gt; After some discussion the c=
onference call participants thought that this would meet their needs. Furthe=
r investigations would still be useful to determine the degree of failed HMA=
C calculations due to HTTP proxies modifying the
 content.<br>&gt;&gt;<br>&gt;&gt; -- Key Distribution<br>&gt;&gt;<br>&gt;&gt=
; Hannes presented the open issue regarding the choice of key <br>&gt;&gt; d=
istribution. Slides #6-#8 present three techniques and Hannes asked <br>&gt;=
&gt; for feedback regarding the preferred style. Justin and others didn't <b=
r>&gt;&gt; see the need to decide on one mechanism - they wanted to keep the=
 <br>&gt;&gt; choice open. Derek indicated that this will not be an acceptab=
le <br>&gt;&gt; approach. Since the resource server and the authorization se=
rver may, <br>&gt;&gt; in the OAuth 2.0 framework, be entities produced by d=
ifferent vendors <br>&gt;&gt; there is an interoperability need. Justin resp=
onded that he disagrees <br>&gt;&gt; and that the resource server needs to u=
nderstand the access token and <br>&gt;&gt; referred to the recent draft sub=
mission for the token introspection <br>&gt;&gt; endpoint. Derek indicated t=
hat the resource server has to understand <br>&gt;&gt;
 the content of the access token and the token introspection endpoint <br>&g=
t;&gt; just pushes the problem around: the resource server has to send the <=
br>&gt;&gt; access token to the authorization server and then the resource s=
erver <br>&gt;&gt; gets the result back (which he the<br> n<br>&gt;&nbsp; &n=
bsp; a<br>&gt;&gt; gain needs to understand) in order to make a meaningful a=
uthorization decision.<br>&gt;&gt;<br>&gt;&gt; Everyone agreed that the clie=
nt must receive the session key from the authorization server and that this a=
pproach has to be standardized. It was also agreed that this is a common app=
roach among all three key distribution mechanisms.<br>&gt;&gt;<br>&gt;&gt; H=
annes asked the participants to think about their preference.<br>&gt;&gt;<br=
>&gt;&gt; The questions regarding key naming and the indication for the inte=
nded resource server the client wants to talk to have been postponed.<br>&gt=
;&gt;<br>&gt;&gt; Ciao<br>&gt;&gt;
 Hannes<br>&gt;&gt;<br>&gt;&gt;<br>&gt;&gt; ________________________________=
_______________<br>&gt;&gt; OAuth mailing list<br>&gt;&gt; <a rel=3D"nofollo=
w" ymailto=3D"mailto:OAuth@ietf.org" target=3D"_blank" href=3D"mailto:OAuth@=
ietf.org">OAuth@ietf.org</a><br>&gt;&gt; <a rel=3D"nofollow" target=3D"_blan=
k" href=3D"https://www.ietf.org/mailman/listinfo/oauth">https://www.ietf.org=
/mailman/listinfo/oauth</a><br>&gt; ________________________________________=
_______<br>&gt; OAuth mailing list<br>&gt; <a rel=3D"nofollow" ymailto=3D"ma=
ilto:OAuth@ietf.org" target=3D"_blank" href=3D"mailto:OAuth@ietf.org">OAuth@=
ietf.org</a><br>&gt; <a rel=3D"nofollow" target=3D"_blank" href=3D"https://w=
ww.ietf.org/mailman/listinfo/oauth">https://www.ietf.org/mailman/listinfo/oa=
uth</a><br><br><br>_______________________________________________<br>OAuth m=
ailing list<br><a rel=3D"nofollow" ymailto=3D"mailto:OAuth@ietf.org" target=3D=
"_blank" href=3D"mailto:OAuth@ietf.org">OAuth@ietf.org</a><br><a rel=3D"nofo=
llow" target=3D"_blank" href=3D"https://www.ietf.org/mailman/listinfo/oauth"=
>https://www.ietf.org/mailman/listinfo/oauth</a><br>________________________=
_______________________<br>OAuth mailing list<br><a rel=3D"nofollow" ymailto=
=3D"mailto:OAuth@ietf.org" target=3D"_blank" href=3D"mailto:OAuth@ietf.org">=
OAuth@ietf.org</a><br><a rel=3D"nofollow" target=3D"_blank" href=3D"https://=
www.ietf.org/mailman/listinfo/oauth">https://www.ietf.org/mailman/listinfo/o=
auth</a><br><br><br> </div> </div>  </div></div></blockquote><blockquote typ=
e=3D"cite"><div><span>_______________________________________________</span>=
<br><span>OAuth mailing list</span><br><span><a rel=3D"nofollow" ymailto=3D"=
mailto:OAuth@ietf.org" target=3D"_blank" href=3D"mailto:OAuth@ietf.org">OAut=
h@ietf.org</a></span><br><span><a rel=3D"nofollow" target=3D"_blank" href=3D=
"https://www.ietf.org/mailman/listinfo/oauth">https://www.ietf.org/mailman/l=
istinfo/oauth</a></span><br></div></blockquote></div></div><br><br> </div> <=
/div>=20
 </div></div></blockquote></body></html>=

--Apple-Mail-1E6E942E-DD8B-48EB-B86A-D13097EF24A5--

From ve7jtb@ve7jtb.com  Fri Feb 15 07:46:23 2013
Return-Path: <ve7jtb@ve7jtb.com>
X-Original-To: oauth@ietfa.amsl.com
Delivered-To: oauth@ietfa.amsl.com
Received: from localhost (localhost [127.0.0.1]) by ietfa.amsl.com (Postfix) with ESMTP id 16F3921F878F for <oauth@ietfa.amsl.com>; Fri, 15 Feb 2013 07:46:23 -0800 (PST)
X-Virus-Scanned: amavisd-new at amsl.com
X-Spam-Flag: NO
X-Spam-Score: -3.101
X-Spam-Level: 
X-Spam-Status: No, score=-3.101 tagged_above=-999 required=5 tests=[AWL=-0.102, BAYES_00=-2.599, J_CHICKENPOX_48=0.6, RCVD_IN_DNSWL_LOW=-1]
Received: from mail.ietf.org ([64.170.98.30]) by localhost (ietfa.amsl.com [127.0.0.1]) (amavisd-new, port 10024) with ESMTP id vzsuGzcmi-ot for <oauth@ietfa.amsl.com>; Fri, 15 Feb 2013 07:46:21 -0800 (PST)
Received: from mail-gh0-f181.google.com (mail-gh0-f181.google.com [209.85.160.181]) by ietfa.amsl.com (Postfix) with ESMTP id 8137121F8650 for <oauth@ietf.org>; Fri, 15 Feb 2013 07:46:21 -0800 (PST)
Received: by mail-gh0-f181.google.com with SMTP id y8so120132ghb.26 for <oauth@ietf.org>; Fri, 15 Feb 2013 07:46:20 -0800 (PST)
X-Google-DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=google.com; s=20120113; h=x-received:content-type:mime-version:subject:from:in-reply-to:date :cc:message-id:references:to:x-mailer:x-gm-message-state; bh=kuiWQmz5E+KuaN7c3Ko73yOCcDIZrtKExQhFEJWqujw=; b=OWkvx5sKp1LSo8ED2XEQZIhdc4bcuDKSXcK1s5ghMmdv2yU03eL6oJbYn4F0q6yAgJ E0hiCKXffJVJZDfzuQqqkwb522rk1ns5LVvvhUk6ZwziiVCZgPliHrSFuJLW3bMxIMoV gQld6c7SXliF5EEWRHDf9RcZ0b+nD0GfI3SKg9HKme5oITQahLHc+e7P28oYEu8AUlPq B/hyVZNnzmxSXENAIJNp+HZ4/FMVhIUOLtfcetw7sGI+6EtOERrB2t21ash/kbeovw8D rcJvtB5IzmBEVlEjKj9+FRnwQK/0nV46k7FTrQmO1nZM0Mm6zr3/V+0fqJYoGvPYXWUX 3C9w==
X-Received: by 10.236.123.109 with SMTP id u73mr3177923yhh.108.1360943180699;  Fri, 15 Feb 2013 07:46:20 -0800 (PST)
Received: from [192.168.1.213] (190-20-20-115.baf.movistar.cl. [190.20.20.115]) by mx.google.com with ESMTPS id p7sm11837226anl.20.2013.02.15.07.46.16 (version=TLSv1 cipher=ECDHE-RSA-RC4-SHA bits=128/128); Fri, 15 Feb 2013 07:46:19 -0800 (PST)
Content-Type: multipart/signed; boundary="Apple-Mail=_76435579-B0FA-450E-A9F6-934B00462EFA"; protocol="application/pkcs7-signature"; micalg=sha1
Mime-Version: 1.0 (Mac OS X Mail 6.2 \(1499\))
From: John Bradley <ve7jtb@ve7jtb.com>
In-Reply-To: <511D3919.4090906@oracle.com>
Date: Fri, 15 Feb 2013 12:45:30 -0300
Message-Id: <31EAE509-0850-4F09-B29B-D02FB1156936@ve7jtb.com>
References: <0573984A-8C11-4960-9BC6-F44D4B664C19@gmx.net> <511BBBAC.9060502@oracle.com> <0DF3F088-7F15-4C0F-85C4-35DE80CB01E0@gmx.net> <511CEDFB.6010908@mitre.org> <511D3919.4090906@oracle.com>
To: Prateek Mishra <prateek.mishra@oracle.com>
X-Mailer: Apple Mail (2.1499)
X-Gm-Message-State: ALoCoQmxL02pHAO7pduAEc0CGcIqKmeroj1qFBEOmvWI8qxVJtUPD6EBkyPKi99xkObRpVRmtluT
Cc: oauth@ietf.org
Subject: Re: [OAUTH-WG] Minutes from the OAuth Design Team Conference Call - 11th February 2013
X-BeenThere: oauth@ietf.org
X-Mailman-Version: 2.1.12
Precedence: list
List-Id: OAUTH WG <oauth.ietf.org>
List-Unsubscribe: <https://www.ietf.org/mailman/options/oauth>, <mailto:oauth-request@ietf.org?subject=unsubscribe>
List-Archive: <http://www.ietf.org/mail-archive/web/oauth>
List-Post: <mailto:oauth@ietf.org>
List-Help: <mailto:oauth-request@ietf.org?subject=help>
List-Subscribe: <https://www.ietf.org/mailman/listinfo/oauth>, <mailto:oauth-request@ietf.org?subject=subscribe>
X-List-Received-Date: Fri, 15 Feb 2013 15:46:23 -0000

--Apple-Mail=_76435579-B0FA-450E-A9F6-934B00462EFA
Content-Transfer-Encoding: quoted-printable
Content-Type: text/plain;
	charset=us-ascii

Remember that proof of possession is intended to prove that the client =
that was issued the token is the one presenting it.  =20
We tend to mix that up with replay and other protection issues.

To do this you don't need to authenticate the client. =20
The client can prove it controls a key by signing something for the =
Authorization server,  the AS then includes the public key in the JWS =
access token.   The client then produces a hash over some number of =
elements and signs that with its private key in a JWS.

With asymmetric there is no need for the AS to produce the key.    =
Having the client produce the key pair is quite traditional proof of =
possession.

The RS only needs to verify the access token in the way a RS would =
normally all the key distribution can be public as it is public keys.

I have always found the symmetric proof of possession mechanisms to be =
painfully complex to do properly with DH etc.

Encrypting the symmetric key to the RS would work but relays on an =
implicit assumption about what RS the client may present the token to =
otherwise all the RS have to share private keys(probably a bad thing)

John B.

On 2013-02-14, at 4:20 PM, Prateek Mishra <prateek.mishra@oracle.com> =
wrote:

> Justin - my comment was scoped to *key distribution* - not to the =
general use of public clients.
>=20
> I was wondering how one can distribute keys or have key agreement =
between an AS and a client, if there is no existing trust relationship =
between them. Maybe there is some
> clever crypto way of achieving this, but I personally dont understand =
how this might happen.
>=20
> - prateek
>=20
>>=20
>>>> 2) Regarding (symmetric) key distribution, dont we need some kind =
of existing trust relationship between the client and AS to make this =
possible? I guess it
>>>> would be enough to require use of a "confidential" client, that =
would make it possible for the two parties to agree on a session key at =
the point where an access token
>>>> is  issued by the AS.
>>> That's a very good question. I have not formed an option about this =
issue yet particularly given the recent capability to dynamically =
register clients.
>>=20
>> I don't think that signing tokens should require confidential =
clients. This was one of the implementation issues with OAuth 1, as it =
required a "consumer_secret" at all times. This led to Google telling =
people to use "anonymous" as the "consumer_secret" for what were =
effectively public clients. Even with dynamic registration, there's =
still a place for public clients, in my opinion.
>>=20
>=20
> _______________________________________________
> OAuth mailing list
> OAuth@ietf.org
> https://www.ietf.org/mailman/listinfo/oauth


--Apple-Mail=_76435579-B0FA-450E-A9F6-934B00462EFA
Content-Disposition: attachment;
	filename=smime.p7s
Content-Type: application/pkcs7-signature;
	name=smime.p7s
Content-Transfer-Encoding: base64
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--Apple-Mail=_76435579-B0FA-450E-A9F6-934B00462EFA--

From prateek.mishra@oracle.com  Fri Feb 15 08:00:57 2013
Return-Path: <prateek.mishra@oracle.com>
X-Original-To: oauth@ietfa.amsl.com
Delivered-To: oauth@ietfa.amsl.com
Received: from localhost (localhost [127.0.0.1]) by ietfa.amsl.com (Postfix) with ESMTP id 9C70621F8522 for <oauth@ietfa.amsl.com>; Fri, 15 Feb 2013 08:00:57 -0800 (PST)
X-Virus-Scanned: amavisd-new at amsl.com
X-Spam-Flag: NO
X-Spam-Score: -6.299
X-Spam-Level: 
X-Spam-Status: No, score=-6.299 tagged_above=-999 required=5 tests=[AWL=-0.300, BAYES_00=-2.599, J_CHICKENPOX_48=0.6, RCVD_IN_DNSWL_MED=-4]
Received: from mail.ietf.org ([64.170.98.30]) by localhost (ietfa.amsl.com [127.0.0.1]) (amavisd-new, port 10024) with ESMTP id Xd76bfvkXIa4 for <oauth@ietfa.amsl.com>; Fri, 15 Feb 2013 08:00:55 -0800 (PST)
Received: from aserp1040.oracle.com (aserp1040.oracle.com [141.146.126.69]) by ietfa.amsl.com (Postfix) with ESMTP id B05E721F8519 for <oauth@ietf.org>; Fri, 15 Feb 2013 08:00:55 -0800 (PST)
Received: from acsinet22.oracle.com (acsinet22.oracle.com [141.146.126.238]) by aserp1040.oracle.com (Sentrion-MTA-4.3.1/Sentrion-MTA-4.3.1) with ESMTP id r1FG0svj003724 (version=TLSv1/SSLv3 cipher=DHE-RSA-AES256-SHA bits=256 verify=OK); Fri, 15 Feb 2013 16:00:55 GMT
Received: from acsmt357.oracle.com (acsmt357.oracle.com [141.146.40.157]) by acsinet22.oracle.com (8.14.4+Sun/8.14.4) with ESMTP id r1FG0rhG016984 (version=TLSv1/SSLv3 cipher=DHE-RSA-AES256-SHA bits=256 verify=NO); Fri, 15 Feb 2013 16:00:53 GMT
Received: from abhmt105.oracle.com (abhmt105.oracle.com [141.146.116.57]) by acsmt357.oracle.com (8.12.11.20060308/8.12.11) with ESMTP id r1FG0qf7026140; Fri, 15 Feb 2013 10:00:53 -0600
Received: from [192.168.1.4] (/71.184.95.145) by default (Oracle Beehive Gateway v4.0) with ESMTP ; Fri, 15 Feb 2013 08:00:53 -0800
Message-ID: <511E5BB7.9060104@oracle.com>
Date: Fri, 15 Feb 2013 11:00:55 -0500
From: Prateek Mishra <prateek.mishra@oracle.com>
Organization: Oracle Corporation
User-Agent: Mozilla/5.0 (Windows NT 5.1; rv:17.0) Gecko/20130107 Thunderbird/17.0.2
MIME-Version: 1.0
To: John Bradley <ve7jtb@ve7jtb.com>
References: <0573984A-8C11-4960-9BC6-F44D4B664C19@gmx.net> <511BBBAC.9060502@oracle.com> <0DF3F088-7F15-4C0F-85C4-35DE80CB01E0@gmx.net> <511CEDFB.6010908@mitre.org> <511D3919.4090906@oracle.com> <31EAE509-0850-4F09-B29B-D02FB1156936@ve7jtb.com>
In-Reply-To: <31EAE509-0850-4F09-B29B-D02FB1156936@ve7jtb.com>
Content-Type: text/plain; charset=ISO-8859-1; format=flowed
Content-Transfer-Encoding: 7bit
X-Source-IP: acsinet22.oracle.com [141.146.126.238]
Cc: oauth@ietf.org
Subject: Re: [OAUTH-WG] Minutes from the OAuth Design Team Conference Call - 11th February 2013
X-BeenThere: oauth@ietf.org
X-Mailman-Version: 2.1.12
Precedence: list
List-Id: OAUTH WG <oauth.ietf.org>
List-Unsubscribe: <https://www.ietf.org/mailman/options/oauth>, <mailto:oauth-request@ietf.org?subject=unsubscribe>
List-Archive: <http://www.ietf.org/mail-archive/web/oauth>
List-Post: <mailto:oauth@ietf.org>
List-Help: <mailto:oauth-request@ietf.org?subject=help>
List-Subscribe: <https://www.ietf.org/mailman/listinfo/oauth>, <mailto:oauth-request@ietf.org?subject=subscribe>
X-List-Received-Date: Fri, 15 Feb 2013 16:00:57 -0000

John - two separate issues here -

(i) for the symmetric key case, whether we need a key distribution 
method for the client and AS/RS, and if so, what form should it take?

(ii) asymmetric case is quite different, I agree with your point - the 
client could be pre-provisioned with a managed key pair (many enterprise 
cases)
or generate them ephemerally. We dont need a key distribution method here.

Unfortunately, its hard to get away from the symmetric key case, maybe 
this will change once we have widespread support for ecc.


- prateek
> Remember that proof of possession is intended to prove that the client that was issued the token is the one presenting it.
> We tend to mix that up with replay and other protection issues.
>
> To do this you don't need to authenticate the client.
> The client can prove it controls a key by signing something for the Authorization server,  the AS then includes the public key in the JWS access token.   The client then produces a hash over some number of elements and signs that with its private key in a JWS.
>
> With asymmetric there is no need for the AS to produce the key.    Having the client produce the key pair is quite traditional proof of possession.
>
> The RS only needs to verify the access token in the way a RS would normally all the key distribution can be public as it is public keys.
>
> I have always found the symmetric proof of possession mechanisms to be painfully complex to do properly with DH etc.
>
> Encrypting the symmetric key to the RS would work but relays on an implicit assumption about what RS the client may present the token to otherwise all the RS have to share private keys(probably a bad thing)
>
> John B.
>
> On 2013-02-14, at 4:20 PM, Prateek Mishra <prateek.mishra@oracle.com> wrote:
>
>> Justin - my comment was scoped to *key distribution* - not to the general use of public clients.
>>
>> I was wondering how one can distribute keys or have key agreement between an AS and a client, if there is no existing trust relationship between them. Maybe there is some
>> clever crypto way of achieving this, but I personally dont understand how this might happen.
>>
>> - prateek
>>
>>>>> 2) Regarding (symmetric) key distribution, dont we need some kind of existing trust relationship between the client and AS to make this possible? I guess it
>>>>> would be enough to require use of a "confidential" client, that would make it possible for the two parties to agree on a session key at the point where an access token
>>>>> is  issued by the AS.
>>>> That's a very good question. I have not formed an option about this issue yet particularly given the recent capability to dynamically register clients.
>>> I don't think that signing tokens should require confidential clients. This was one of the implementation issues with OAuth 1, as it required a "consumer_secret" at all times. This led to Google telling people to use "anonymous" as the "consumer_secret" for what were effectively public clients. Even with dynamic registration, there's still a place for public clients, in my opinion.
>>>
>> _______________________________________________
>> OAuth mailing list
>> OAuth@ietf.org
>> https://www.ietf.org/mailman/listinfo/oauth


From wmills_92105@yahoo.com  Fri Feb 15 08:09:53 2013
Return-Path: <wmills_92105@yahoo.com>
X-Original-To: oauth@ietfa.amsl.com
Delivered-To: oauth@ietfa.amsl.com
Received: from localhost (localhost [127.0.0.1]) by ietfa.amsl.com (Postfix) with ESMTP id A85B421F84E2 for <oauth@ietfa.amsl.com>; Fri, 15 Feb 2013 08:09:53 -0800 (PST)
X-Virus-Scanned: amavisd-new at amsl.com
X-Spam-Flag: NO
X-Spam-Score: -2.223
X-Spam-Level: 
X-Spam-Status: No, score=-2.223 tagged_above=-999 required=5 tests=[AWL=0.375,  BAYES_00=-2.599, HTML_MESSAGE=0.001]
Received: from mail.ietf.org ([64.170.98.30]) by localhost (ietfa.amsl.com [127.0.0.1]) (amavisd-new, port 10024) with ESMTP id 60XXIBltmFOS for <oauth@ietfa.amsl.com>; Fri, 15 Feb 2013 08:09:52 -0800 (PST)
Received: from nm37-vm3.bullet.mail.ne1.yahoo.com (nm37-vm3.bullet.mail.ne1.yahoo.com [98.138.229.131]) by ietfa.amsl.com (Postfix) with ESMTP id F32ED21F8438 for <oauth@ietf.org>; Fri, 15 Feb 2013 08:09:51 -0800 (PST)
Received: from [98.138.90.51] by nm37.bullet.mail.ne1.yahoo.com with NNFMP; 15 Feb 2013 16:09:51 -0000
Received: from [98.138.89.198] by tm4.bullet.mail.ne1.yahoo.com with NNFMP; 15 Feb 2013 16:09:51 -0000
Received: from [127.0.0.1] by omp1056.mail.ne1.yahoo.com with NNFMP; 15 Feb 2013 16:09:51 -0000
X-Yahoo-Newman-Property: ymail-3
X-Yahoo-Newman-Id: 331015.13184.bm@omp1056.mail.ne1.yahoo.com
Received: (qmail 52388 invoked by uid 60001); 15 Feb 2013 16:09:50 -0000
DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=yahoo.com; s=s1024; t=1360944590; bh=qswXL470pyXxOV8TxuIlv1yJd+cipf6phFf9m+715ck=; h=X-YMail-OSG:Received:X-Rocket-MIMEInfo:X-Mailer:References:Message-ID:Date:From:Reply-To:Subject:To:Cc:In-Reply-To:MIME-Version:Content-Type; b=2Yk80yLWShATyXSIJk/SHOp10umC4d64bkwKEPin6VL78Zn8YrJHy3epFPGo/Qf6kILqgr9jy9hfIEsocGY39CpnfrN7ihfl0Pnnpu+9EZOGENzJNmId9T0fs9DdlqQQva8yalGN4QVn3Y/VRfjsbJ9WeKtSbubgWYw2nPXwyg4=
DomainKey-Signature: a=rsa-sha1; q=dns; c=nofws; s=s1024; d=yahoo.com; h=X-YMail-OSG:Received:X-Rocket-MIMEInfo:X-Mailer:References:Message-ID:Date:From:Reply-To:Subject:To:Cc:In-Reply-To:MIME-Version:Content-Type; b=hLgkyVnutIIU1v48LVR6Wc+hMd2FEOLbOTbNVHJOPXQLBEgzQKFaOvosd9UJnJS1Fq/odabQFJoLJFEpEws8X2Rvmvv9n8GkXJ+ov/M13DXOxcuBoXq/FTSu1FttIspeVj3pwKHt2Kwbz/twI1RvHkxA2Hv3Z1fZ1OZonmcT5oA=;
X-YMail-OSG: R_2tXvwVM1mI.ZSWKikn4gEhuJ33diPPKbEuP3HVyRiGIys Gkpo5Y3Lraa7Yhes2n82ZcEnpobpl2fFcPWc41BsezStoL0QnJ6pOG7FWMSt 3sp53DhzhxctooBkve4b962R8sV1KNiJzdb.oed9axdfTM7K0k9OVmd0WjxN 7OSmpffeeKO2pZGtrMKzkegQOt184W63CL5XUOTBUK2q0XZ_25igCJkCqvSN q0RIiAWi9VS_fDtdb3dHQAnuylA9vaPzsqQK2i7xytQS4vbW2.woRGRW1Xms EWpf.EQjJhz0p8fbfbbDKpCuRadNShuziCtpZeM87Yyscvog3vHQ7fjDHq3_ .Vtnm9CVnZ0Ljzc6SIaspZNcEV6sguODMti9kWIWoGqXhdTxm4RvXlx50HXu UH11QCwm9Tg9u3fY5RtM6bNOjbOmjDuwjuZqX5duoZHdTSo6x431c6fb.GkO NgZ4PGo_KibpBlPKrSscvtKkUoYvkQCRkff0Mou75h8qD5y_ygH5wbBC7mFi hIrEQS.DW9FFs9.l16C0gNtlY2DKahx3ksdnLaEV5ub7cuzs0rocJ3xk3bpT z8ROlHlL3ar4OCpiK1QQehdymWn1Imy8JbIEr8lfbwNUHy_83r0v8Mir.5wI oXn1aDQlUHPDEGC.OAMmHb2VEjuWNfPbTWguuF60H8PgHyC4ykHCbW_Vu9Oz c8P7nuNhgzoV6l_pS686t44EdwMlZywuLJC3Pb6MybTcnFP8-
Received: from [209.131.62.115] by web31808.mail.mud.yahoo.com via HTTP; Fri, 15 Feb 2013 08:09:49 PST
X-Rocket-MIMEInfo: 001.001, SSdsbCByZXBlYXQgdGhlIHVzZSBjYXNlIGZvciBGbGlja3IsIHdoaWNoIHJlcXVpcmVzIE9BdXRoIDEuMGEgdHlwZSBjYXBhYmlsaXRlcyB0aGF0IE9BdXRoIDIgZG9lcyBub3QgcHJvdmlkZS4gwqBTaW1wbHkgc3RhdGluZyAibW92ZSB0byBIVFRQUyIgaXMgbm90IGEgdmlhYmxlIHJlc3BvbnNlIGhlcmUuIMKgCgoKX19fX19fX19fX19fX19fX19fX19fX19fX19fX19fX18KIEZyb206IFRvcnN0ZW4gTG9kZGVyc3RlZHQgPHRvcnN0ZW5AbG9kZGVyc3RlZHQubmV0PgpUbzogV2lsbGlhbSBNaWxscyA8d21pbGwBMAEBAQE-
X-Mailer: YahooMailWebService/0.8.134.513
References: <0573984A-8C11-4960-9BC6-F44D4B664C19@gmx.net> <E808B6AC-D5F6-479F-967D-EA6B2586BE64@oracle.com> <511A7D27.8010209@mitre.org> <4E1F6AAD24975D4BA5B16804296739436744BD23@TK5EX14MBXC285.redmond.corp.microsoft.com> <1360891897.14004.YahooMailNeo@web31811.mail.mud.yahoo.com> <E7EBF78C-37EB-4737-8DD5-0F24C9FACA60@lodderstedt.net> <1360912115.36543.YahooMailNeo@web31811.mail.mud.yahoo.com> <2A0F585F-2CEF-418D-9654-5084E6C9BD0D@lodderstedt.net>
Message-ID: <1360944589.51724.YahooMailNeo@web31808.mail.mud.yahoo.com>
Date: Fri, 15 Feb 2013 08:09:49 -0800 (PST)
From: William Mills <wmills_92105@yahoo.com>
To: Torsten Lodderstedt <torsten@lodderstedt.net>
In-Reply-To: <2A0F585F-2CEF-418D-9654-5084E6C9BD0D@lodderstedt.net>
MIME-Version: 1.0
Content-Type: multipart/alternative; boundary="258328648-134066345-1360944589=:51724"
Cc: IETF oauth WG <oauth@ietf.org>
Subject: Re: [OAUTH-WG] Minutes from the OAuth Design Team Conference Call - 11th February 2013
X-BeenThere: oauth@ietf.org
X-Mailman-Version: 2.1.12
Precedence: list
Reply-To: William Mills <wmills_92105@yahoo.com>
List-Id: OAUTH WG <oauth.ietf.org>
List-Unsubscribe: <https://www.ietf.org/mailman/options/oauth>, <mailto:oauth-request@ietf.org?subject=unsubscribe>
List-Archive: <http://www.ietf.org/mail-archive/web/oauth>
List-Post: <mailto:oauth@ietf.org>
List-Help: <mailto:oauth-request@ietf.org?subject=help>
List-Subscribe: <https://www.ietf.org/mailman/listinfo/oauth>, <mailto:oauth-request@ietf.org?subject=subscribe>
X-List-Received-Date: Fri, 15 Feb 2013 16:09:53 -0000

--258328648-134066345-1360944589=:51724
Content-Type: text/plain; charset=iso-8859-1
Content-Transfer-Encoding: quoted-printable

I'll repeat the use case for Flickr, which requires OAuth 1.0a type capabil=
ites that OAuth 2 does not provide. =A0Simply stating "move to HTTPS" is no=
t a viable response here. =A0=0A=0A=0A________________________________=0A F=
rom: Torsten Lodderstedt <torsten@lodderstedt.net>=0ATo: William Mills <wmi=
lls_92105@yahoo.com> =0ACc: Mike Jones <Michael.Jones@microsoft.com>; Justi=
n Richer <jricher@mitre.org>; Phil Hunt <phil.hunt@oracle.com>; IETF oauth =
WG <oauth@ietf.org> =0ASent: Friday, February 15, 2013 7:22 AM=0ASubject: R=
e: [OAUTH-WG] Minutes from the OAuth Design Team Conference Call - 11th Feb=
ruary 2013=0A =0A=0AHi Bill,=0A=0AI think one needs to compare the costs/im=
pact of HTTPS on one side and the implementation of integrity protection an=
d replay detection on the other. We had this discussion several times.=0A=
=0Aregards,=0ATorsten.=0A=0AAm 15.02.2013 um 08:08 schrieb William Mills <w=
mills_92105@yahoo.com>:=0A=0A=0AI fundamentally disagree with that too. =A0=
OAuth 2 is the *framework*, one which supports multiple token types. =A0Bea=
rer tokens were the first credential type defined.=0A>=0A>=0A>OAuth 1.0a al=
so requires HTTPS transport for authentication and getting the token.=0A>=
=0A>=0A>There are =A0real use cases for tokens usable over plain text with =
integrity protection.=0A>=0A>=0A>-bill=0A>=0A>=0A>=0A>_____________________=
___________=0A> From: Torsten Lodderstedt <torsten@lodderstedt.net>=0A>To: =
William Mills <wmills_92105@yahoo.com> =0A>Cc: Mike Jones <Michael.Jones@mi=
crosoft.com>; Justin Richer <jricher@mitre.org>; Phil Hunt <phil.hunt@oracl=
e.com>; IETF oauth WG <oauth@ietf.org> =0A>Sent: Thursday, February 14, 201=
3 10:05 PM=0A>Subject: Re: [OAUTH-WG] Minutes from the OAuth Design Team Co=
nference Call - 11th February 2013=0A> =0A>=0A>Hi Bill,=0A>=0A>=0A>OAuth 2.=
0 took a different direction by relying on HTTPS to provide the basic prote=
ction. So the need to have a token, which can be used for service requests =
over plain HTTP is arguable. My understanding of this activity was, the int=
end is to provide additional protection on top of HTTPS.=0A>=0A>=0A>regards=
,=0A>Torsten.=0A>=0A>Am 15.02.2013 um 02:31 schrieb William Mills <wmills_9=
2105@yahoo.com>:=0A>=0A>=0A>I disagree with "That was the impediment to OAu=
th 1.0 adoption that OAuth 2.0 solved in the first place.", unless "solving=
" means does not address the need for it at all.=0A>>=0A>>=0A>>OAuth 2 does=
 several good things, but it still lacks a defined token type that is safe =
to user over plain text HTTP. =A01.0a solved that.=0A>>=0A>>=0A>>=0A>>_____=
___________________________=0A>> From: Mike Jones <Michael.Jones@microsoft.=
com>=0A>>To: Justin Richer <jricher@mitre.org>; Phil Hunt <phil.hunt@oracle=
.com> =0A>>Cc: IETF oauth WG <oauth@ietf.org> =0A>>Sent: Thursday, February=
 14, 2013 1:44 PM=0A>>Subject: Re: [OAUTH-WG] Minutes from the OAuth Design=
 Team Conference Call - 11th February 2013=0A>> =0A>>I'm in favor of reusin=
g the JWT work that this WG is also doing. :-)=0A>>=0A>>I'm pretty skeptica=
l of us inventing another custom scheme for signing HTTP headers.=A0 That w=
as the impediment to OAuth 1.0 adoption that OAuth 2.0 solved in the first =
place.=0A>>=0A>>=A0=A0=A0 =A0=A0=A0 =A0=A0=A0 =A0=A0=A0 -- Mike=0A>>=0A>>--=
---Original Message-----=0A>>From: oauth-bounces@ietf.org [mailto:oauth-bou=
nces@ietf.org] On Behalf Of Justin Richer=0A>>Sent: Tuesday, February 12, 2=
013 9:35 AM=0A>>To: Phil Hunt=0A>>Cc: IETF oauth WG=0A>>Subject: Re: [OAUTH=
-WG] Minutes from the OAuth Design Team Conference Call - 11th February 201=
3=0A>>=0A>>That's my reading of it as well, Phil, thanks for providing the =
clarification.=0A One motivator behind using a JSON-based token is to be ab=
le to=0A re-use some of the great work that the JOSE group is doing but app=
ly it to an HTTP payload.=0A>>=0A>>What neither of us want is a token type =
that requires stuffing all query, header, and other parameters *into* the J=
SON object itself, which would be a more SOAPy approach.=0A>>=0A>>=A0 -- Ju=
stin=0A>>=0A>>On 02/12/2013 12:30 PM, Phil Hunt wrote:=0A>>> Clarification.=
=A0 I think Justin and I were in agreement that we don't want to see a form=
at that requires JSON payloads.=A0 We are both interested in a JSON token u=
sed in the authorization header that could be based on a computed signature=
 of some combination of http headers and body if possible.=0A>>>=0A>>> Phil=
=0A>>>=0A>>> @independentid=0A>>> www.independentid.com=0A>>> phil.hunt@ora=
cle.com=0A>>>=0A>>>=0A>>>=0A>>>=0A>>>=0A>>> On=0A 2013-02-12, at 1:10 AM, H=
annes Tschofenig wrote:=0A>>>=0A>>>> Here are my notes.=0A>>>>=0A>>>> Parti=
cipants:=0A>>>>=0A>>>> * John Bradley=0A>>>> * Derek Atkins=0A>>>> * Phil H=
unt=0A>>>> * Prateek Mishra=0A>>>> * Hannes Tschofenig=0A>>>> * Mike Jones=
=0A>>>> * Antonio Sanso=0A>>>> * Justin Richer=0A>>>>=0A>>>> Notes:=0A>>>>=
=0A>>>> My slides are available here: =0A>>>> http://www.tschofenig.priv.at=
/OAuth2-Security-11Feb2013.ppt=0A>>>>=0A>>>> Slide #2 summarizes earlier di=
scussions during the conference calls.=0A>>>>=0A>>>> -- HTTP vs. JSON=0A>>>=
>=0A>>>> Phil noted that he does not like to use the MAC Token draft as a s=
tarting point because it does not re-use any of the work done in the JOSE w=
orking group and in particular all the libraries that are available today. =
He mentioned that earlier attempts to write the MAC Token code lead to=0A p=
roblems for implementers.=0A>>>>=0A>>>> Justin responded that he does not a=
gree with using JSON as a transport mechanism since this would replicate a =
SOAP style.=0A>>>>=0A>>>> Phil noted that he wants to send JSON but the sig=
nature shall be computed over the HTTP header field.=0A>>>>=0A>>>> -- Flexi=
bility for the keyed message digest computation=0A>>>>=0A>>>>=A0 From earli=
er discussion it was clear that the conference call participants wanted mor=
e flexibility regarding the keyed message digest computation. For this purp=
ose Hannes presented the DKIM based approach, which allows selective header=
 fields to be included in the digest. This is shown in slide #4.=0A>>>>=0A>=
>>> After some discussion the conference call participants thought that thi=
s would meet their needs. Further investigations would still be useful to d=
etermine the degree of failed HMAC calculations due to HTTP proxies modifyi=
ng the=0A content.=0A>>>>=0A>>>> -- Key Distribution=0A>>>>=0A>>>> Hannes p=
resented the open issue regarding the choice of key =0A>>>> distribution. S=
lides #6-#8 present three techniques and Hannes asked =0A>>>> for feedback =
regarding the preferred style. Justin and others didn't =0A>>>> see the nee=
d to decide on one mechanism - they wanted to keep the =0A>>>> choice open.=
 Derek indicated that this will not be an acceptable =0A>>>> approach. Sinc=
e the resource server and the authorization server may, =0A>>>> in the OAut=
h 2.0 framework, be entities produced by different vendors =0A>>>> there is=
 an interoperability need. Justin responded that he disagrees =0A>>>> and t=
hat the resource server needs to understand the access token and =0A>>>> re=
ferred to the recent draft submission for the token introspection =0A>>>> e=
ndpoint. Derek indicated that the resource server has to understand =0A>>>>=
=0A the content of the access token and the token introspection endpoint =
=0A>>>> just pushes the problem around: the resource server has to send the=
 =0A>>>> access token to the authorization server and then the resource ser=
ver =0A>>>> gets the result back (which he the=0A>>n=0A>>>=A0 =A0 a=0A>>>> =
gain needs to understand) in order to make a meaningful authorization decis=
ion.=0A>>>>=0A>>>> Everyone agreed that the client must receive the session=
 key from the authorization server and that this approach has to be standar=
dized. It was also agreed that this is a common approach among all three ke=
y distribution mechanisms.=0A>>>>=0A>>>> Hannes asked the participants to t=
hink about their preference.=0A>>>>=0A>>>> The questions regarding key nami=
ng and the indication for the intended resource server the client wants to =
talk to have been postponed.=0A>>>>=0A>>>> Ciao=0A>>>>=0A Hannes=0A>>>>=0A>=
>>>=0A>>>> _______________________________________________=0A>>>> OAuth mai=
ling list=0A>>>> OAuth@ietf.org=0A>>>> https://www.ietf.org/mailman/listinf=
o/oauth=0A>>> _______________________________________________=0A>>> OAuth m=
ailing list=0A>>> OAuth@ietf.org=0A>>> https://www.ietf.org/mailman/listinf=
o/oauth=0A>>=0A>>=0A>>_______________________________________________=0A>>O=
Auth mailing list=0A>>OAuth@ietf.org=0A>>https://www.ietf.org/mailman/listi=
nfo/oauth=0A>>_______________________________________________=0A>>OAuth mai=
ling list=0A>>OAuth@ietf.org=0A>>https://www.ietf.org/mailman/listinfo/oaut=
h=0A>>=0A>>=0A>>=0A>_______________________________________________=0A>>OAu=
th mailing list=0A>>OAuth@ietf.org=0A>>https://www.ietf.org/mailman/listinf=
o/oauth=0A>>=0A>=0A>
--258328648-134066345-1360944589=:51724
Content-Type: text/html; charset=iso-8859-1
Content-Transfer-Encoding: quoted-printable

<html><body><div style=3D"color:#000; background-color:#fff; font-family:Co=
urier New, courier, monaco, monospace, sans-serif;font-size:12pt"><div><spa=
n>I'll repeat the use case for Flickr, which requires OAuth 1.0a type capab=
ilites that OAuth 2 does not provide. &nbsp;Simply stating "move to HTTPS" =
is not a viable response here. &nbsp;</span></div><div><br></div>  <div sty=
le=3D"font-family: 'Courier New', courier, monaco, monospace, sans-serif; f=
ont-size: 12pt;"> <div style=3D"font-family: 'times new roman', 'new york',=
 times, serif; font-size: 12pt;"> <div dir=3D"ltr"> <font size=3D"2" face=
=3D"Arial"> <hr size=3D"1">  <b><span style=3D"font-weight:bold;">From:</sp=
an></b> Torsten Lodderstedt &lt;torsten@lodderstedt.net&gt;<br> <b><span st=
yle=3D"font-weight: bold;">To:</span></b> William Mills &lt;wmills_92105@ya=
hoo.com&gt; <br><b><span style=3D"font-weight: bold;">Cc:</span></b> Mike J=
ones &lt;Michael.Jones@microsoft.com&gt;; Justin Richer &lt;jricher@mitre.o=
rg&gt;; Phil
 Hunt &lt;phil.hunt@oracle.com&gt;; IETF oauth WG &lt;oauth@ietf.org&gt; <b=
r> <b><span style=3D"font-weight: bold;">Sent:</span></b> Friday, February =
15, 2013 7:22 AM<br> <b><span style=3D"font-weight: bold;">Subject:</span><=
/b> Re: [OAUTH-WG] Minutes from the OAuth Design Team Conference Call - 11t=
h February 2013<br> </font> </div> <br>=0A<div id=3D"yiv301966391"><div><di=
v>Hi Bill,</div><div><br></div><div>I think one needs to compare the costs/=
impact of HTTPS on one side and the implementation of integrity protection =
and replay detection on the other. We had this discussion several times.</d=
iv><div><br></div><div>regards,</div><div>Torsten.</div><div><br>Am 15.02.2=
013 um 08:08 schrieb William Mills &lt;<a rel=3D"nofollow" ymailto=3D"mailt=
o:wmills_92105@yahoo.com" target=3D"_blank" href=3D"mailto:wmills_92105@yah=
oo.com">wmills_92105@yahoo.com</a>&gt;:<br><br></div><blockquote type=3D"ci=
te"><div><div style=3D"color: rgb(0, 0, 0); background-color: rgb(255, 255,=
 255); font-family: 'Courier New', courier, monaco, monospace, sans-serif; =
font-size: 12pt;"><div><span>I fundamentally disagree with that too. &nbsp;=
OAuth 2 is the *framework*, one which supports multiple token types. &nbsp;=
Bearer tokens were the first credential type defined.</span></div><div styl=
e=3D"color: rgb(0, 0, 0); font-size: 16px;
 font-family: 'Courier New', courier, monaco, monospace, sans-serif; backgr=
ound-color: transparent; font-style: normal;"><span><br></span></div><div s=
tyle=3D"color: rgb(0, 0, 0); font-size: 16px; font-family: 'Courier New', c=
ourier, monaco, monospace, sans-serif; background-color: transparent; font-=
style: normal;"><span>OAuth 1.0a also requires HTTPS transport for authenti=
cation and getting the token.</span></div><div style=3D"color: rgb(0, 0, 0)=
; font-size: 16px; font-family: 'Courier New', courier, monaco, monospace, =
sans-serif; background-color: transparent; font-style: normal;"><span><br><=
/span></div><div style=3D"color: rgb(0, 0, 0); font-size: 16px; font-family=
: 'Courier New', courier, monaco, monospace, sans-serif; background-color: =
transparent; font-style: normal;"><span>There are &nbsp;real use cases for =
tokens usable over plain text with integrity protection.</span></div><div s=
tyle=3D"color: rgb(0, 0, 0); font-size: 16px; font-family: 'Courier New',
 courier, monaco, monospace, sans-serif; background-color: transparent; fon=
t-style: normal;"><span><br></span></div><div style=3D"color: rgb(0, 0, 0);=
 font-size: 16px; font-family: 'Courier New', courier, monaco, monospace, s=
ans-serif; background-color: transparent; font-style: normal;"><span>-bill<=
/span></div><div><br></div>  <div style=3D"font-family: 'Courier New', cour=
ier, monaco, monospace, sans-serif; font-size: 12pt;"> <div style=3D"font-f=
amily: 'times new roman', 'new york', times, serif; font-size: 12pt;"> <div=
 dir=3D"ltr"> <font size=3D"2" face=3D"Arial"> <hr size=3D"1"> =0A <b><span=
 style=3D"font-weight:bold;">From:</span></b> Torsten Lodderstedt &lt;<a re=
l=3D"nofollow" ymailto=3D"mailto:torsten@lodderstedt.net" target=3D"_blank"=
 href=3D"mailto:torsten@lodderstedt.net">torsten@lodderstedt.net</a>&gt;<br=
> <b><span style=3D"font-weight:bold;">To:</span></b> William Mills &lt;<a =
rel=3D"nofollow" ymailto=3D"mailto:wmills_92105@yahoo.com" target=3D"_blank=
" href=3D"mailto:wmills_92105@yahoo.com">wmills_92105@yahoo.com</a>&gt; <br=
><b><span style=3D"font-weight:bold;">Cc:</span></b> Mike Jones &lt;<a rel=
=3D"nofollow" ymailto=3D"mailto:Michael.Jones@microsoft.com" target=3D"_bla=
nk" href=3D"mailto:Michael.Jones@microsoft.com">Michael.Jones@microsoft.com=
</a>&gt;; Justin Richer &lt;<a rel=3D"nofollow" ymailto=3D"mailto:jricher@m=
itre.org" target=3D"_blank" href=3D"mailto:jricher@mitre.org">jricher@mitre=
.org</a>&gt;; Phil Hunt &lt;<a rel=3D"nofollow" ymailto=3D"mailto:phil.hunt=
@oracle.com" target=3D"_blank" href=3D"mailto:phil.hunt@oracle.com">phil.hu=
nt@oracle.com</a>&gt;; IETF
 oauth WG &lt;<a rel=3D"nofollow" ymailto=3D"mailto:oauth@ietf.org" target=
=3D"_blank" href=3D"mailto:oauth@ietf.org">oauth@ietf.org</a>&gt; <br> <b><=
span style=3D"font-weight:bold;">Sent:</span></b> Thursday, February 14, 20=
13 10:05 PM<br> <b><span style=3D"font-weight:bold;">Subject:</span></b> Re=
: [OAUTH-WG] Minutes from the OAuth Design Team Conference Call - 11th Febr=
uary 2013<br> </font> </div> <br>=0A<div id=3D"yiv301966391"><div><div>Hi B=
ill,</div><div><br></div><div>OAuth 2.0 took a different direction by relyi=
ng on HTTPS to provide the basic protection. So the need to have a token, w=
hich can be used for service requests over plain HTTP is arguable. My under=
standing of this activity was, the intend is to provide additional protecti=
on on top of HTTPS.</div><div><br></div><div>regards,</div><div>Torsten.</d=
iv><div><br>Am 15.02.2013 um 02:31 schrieb William Mills &lt;<a rel=3D"nofo=
llow" ymailto=3D"mailto:wmills_92105@yahoo.com" target=3D"_blank" href=3D"m=
ailto:wmills_92105@yahoo.com">wmills_92105@yahoo.com</a>&gt;:<br><br></div>=
<blockquote type=3D"cite"><div><div style=3D"color: rgb(0, 0, 0); backgroun=
d-color: rgb(255, 255, 255); font-family: 'Courier New', courier, monaco, m=
onospace, sans-serif; font-size: 12pt;"><div><span>I disagree with "</span>=
<span style=3D"font-family: 'times new roman', 'new york', times, serif; fo=
nt-size: 12pt;">That was the impediment to=0A OAuth 1.0 adoption that OAuth=
 2.0 solved in the first place.", unless "solving" means does not address t=
he need for it at all.</span></div><div style=3D"color: rgb(0, 0, 0); font-=
size: 12pt; font-family: 'times new roman', 'new york', times, serif; backg=
round-color: transparent; font-style: normal;"><span style=3D"font-family: =
'times new roman', 'new york', times, serif; font-size: 12pt;"><br></span><=
/div><div style=3D"color: rgb(0, 0, 0); font-size: 16px; font-family: 'time=
s new roman', 'new york', times, serif; background-color: transparent; font=
-style: normal;"><span style=3D"font-family: 'times new roman', 'new york',=
 times, serif; font-size: 12pt;">OAuth 2 does several=0A good things, but i=
t still lacks a defined token type that is safe to user over plain text HTT=
P. &nbsp;1.0a solved that.</span></div><div><br></div>  <div style=3D"font-=
family: 'Courier New', courier, monaco, monospace, sans-serif; font-size: 1=
2pt;"> <div style=3D"font-family: 'times new roman', 'new york', times, ser=
if; font-size: 12pt;"> <div dir=3D"ltr"> <font size=3D"2" face=3D"Arial"> <=
hr size=3D"1">  <b><span style=3D"font-weight:bold;">From:</span></b> Mike =
Jones &lt;<a rel=3D"nofollow" ymailto=3D"mailto:Michael.Jones@microsoft.com=
" target=3D"_blank" href=3D"mailto:Michael.Jones@microsoft.com">Michael.Jon=
es@microsoft.com</a>&gt;<br> <b><span style=3D"font-weight:bold;">To:</span=
></b> Justin Richer &lt;<a rel=3D"nofollow" ymailto=3D"mailto:jricher@mitre=
.org" target=3D"_blank" href=3D"mailto:jricher@mitre.org">jricher@mitre.org=
</a>&gt;; Phil Hunt &lt;<a rel=3D"nofollow" ymailto=3D"mailto:phil.hunt@ora=
cle.com" target=3D"_blank"
 href=3D"mailto:phil.hunt@oracle.com">phil.hunt@oracle.com</a>&gt; <br><b><=
span style=3D"font-weight:bold;">Cc:</span></b> IETF oauth WG &lt;<a rel=3D=
"nofollow" ymailto=3D"mailto:oauth@ietf.org" target=3D"_blank" href=3D"mail=
to:oauth@ietf.org">oauth@ietf.org</a>&gt; <br> <b><span style=3D"font-weigh=
t:bold;">Sent:</span></b> Thursday, February 14, 2013 1:44 PM<br> <b><span =
style=3D"font-weight:bold;">Subject:</span></b> Re: [OAUTH-WG] Minutes from=
 the OAuth Design Team Conference Call - 11th February 2013<br>=0A </font> =
</div> <br>=0AI'm in favor of reusing the JWT work that this WG is also doi=
ng. :-)<br><br>I'm pretty skeptical of us inventing another custom scheme f=
or signing HTTP headers.&nbsp; That was the impediment to OAuth 1.0 adoptio=
n that OAuth 2.0 solved in the first place.<br><br>&nbsp;&nbsp;&nbsp; &nbsp=
;&nbsp;&nbsp; &nbsp;&nbsp;&nbsp; &nbsp;&nbsp;&nbsp; -- Mike<br><br>-----Ori=
ginal Message-----<br>From: <a rel=3D"nofollow" ymailto=3D"mailto:oauth-bou=
nces@ietf.org" target=3D"_blank" href=3D"mailto:oauth-bounces@ietf.org">oau=
th-bounces@ietf.org</a> [mailto:<a rel=3D"nofollow" ymailto=3D"mailto:oauth=
-bounces@ietf.org" target=3D"_blank" href=3D"mailto:oauth-bounces@ietf.org"=
>oauth-bounces@ietf.org</a>] On Behalf Of Justin Richer<br>Sent: Tuesday, F=
ebruary 12, 2013 9:35 AM<br>To: Phil Hunt<br>Cc: IETF oauth WG<br>Subject: =
Re: [OAUTH-WG] Minutes from the OAuth Design Team Conference Call - 11th Fe=
bruary 2013<br><br>That's my reading of it as well, Phil, thanks for provid=
ing the clarification.=0A One motivator behind using a JSON-based token is =
to be able to=0A re-use some of the great work that the JOSE group is doing=
 but apply it to an HTTP payload.<br><br>What neither of us want is a token=
 type that requires stuffing all query, header, and other parameters *into*=
 the JSON object itself, which would be a more SOAPy approach.<br><br>&nbsp=
; -- Justin<br><br>On 02/12/2013 12:30 PM, Phil Hunt wrote:<br>&gt; Clarifi=
cation.&nbsp; I think Justin and I were in agreement that we don't want to =
see a format that requires JSON payloads.&nbsp; We are both interested in a=
 JSON token used in the authorization header that could be based on a compu=
ted signature of some combination of http headers and body if possible.<br>=
&gt;<br>&gt; Phil<br>&gt;<br>&gt; @independentid<br>&gt; <a rel=3D"nofollow=
" target=3D"_blank" href=3D"http://www.independentid.com/">www.independenti=
d.com</a><br>&gt; <a rel=3D"nofollow" ymailto=3D"mailto:phil.hunt@oracle.co=
m" target=3D"_blank"
 href=3D"mailto:phil.hunt@oracle.com">phil.hunt@oracle.com</a><br>&gt;<br>&=
gt;<br>&gt;<br>&gt;<br>&gt;<br>&gt; On=0A 2013-02-12, at 1:10 AM, Hannes Ts=
chofenig wrote:<br>&gt;<br>&gt;&gt; Here are my notes.<br>&gt;&gt;<br>&gt;&=
gt; Participants:<br>&gt;&gt;<br>&gt;&gt; * John Bradley<br>&gt;&gt; * Dere=
k Atkins<br>&gt;&gt; * Phil Hunt<br>&gt;&gt; * Prateek Mishra<br>&gt;&gt; *=
 Hannes Tschofenig<br>&gt;&gt; * Mike Jones<br>&gt;&gt; * Antonio Sanso<br>=
&gt;&gt; * Justin Richer<br>&gt;&gt;<br>&gt;&gt; Notes:<br>&gt;&gt;<br>&gt;=
&gt; My slides are available here: <br>&gt;&gt; http://www.tschofenig.priv.=
at/OAuth2-Security-11Feb2013.ppt<br>&gt;&gt;<br>&gt;&gt; Slide #2 summarize=
s earlier discussions during the conference calls.<br>&gt;&gt;<br>&gt;&gt; =
-- HTTP vs. JSON<br>&gt;&gt;<br>&gt;&gt; Phil noted that he does not like t=
o use the MAC Token draft as a starting point because it does not re-use an=
y of the work done in the JOSE working group and in particular all the libr=
aries that are available today. He mentioned that earlier attempts to write=
 the MAC Token code lead to=0A problems for implementers.<br>&gt;&gt;<br>&g=
t;&gt; Justin responded that he does not agree with using JSON as a transpo=
rt mechanism since this would replicate a SOAP style.<br>&gt;&gt;<br>&gt;&g=
t; Phil noted that he wants to send JSON but the signature shall be compute=
d over the HTTP header field.<br>&gt;&gt;<br>&gt;&gt; -- Flexibility for th=
e keyed message digest computation<br>&gt;&gt;<br>&gt;&gt;&nbsp; From earli=
er discussion it was clear that the conference call participants wanted mor=
e flexibility regarding the keyed message digest computation. For this purp=
ose Hannes presented the DKIM based approach, which allows selective header=
 fields to be included in the digest. This is shown in slide #4.<br>&gt;&gt=
;<br>&gt;&gt; After some discussion the conference call participants though=
t that this would meet their needs. Further investigations would still be u=
seful to determine the degree of failed HMAC calculations due to HTTP proxi=
es modifying the=0A content.<br>&gt;&gt;<br>&gt;&gt; -- Key Distribution<br=
>&gt;&gt;<br>&gt;&gt; Hannes presented the open issue regarding the choice =
of key <br>&gt;&gt; distribution. Slides #6-#8 present three techniques and=
 Hannes asked <br>&gt;&gt; for feedback regarding the preferred style. Just=
in and others didn't <br>&gt;&gt; see the need to decide on one mechanism -=
 they wanted to keep the <br>&gt;&gt; choice open. Derek indicated that thi=
s will not be an acceptable <br>&gt;&gt; approach. Since the resource serve=
r and the authorization server may, <br>&gt;&gt; in the OAuth 2.0 framework=
, be entities produced by different vendors <br>&gt;&gt; there is an intero=
perability need. Justin responded that he disagrees <br>&gt;&gt; and that t=
he resource server needs to understand the access token and <br>&gt;&gt; re=
ferred to the recent draft submission for the token introspection <br>&gt;&=
gt; endpoint. Derek indicated that the resource server has to understand <b=
r>&gt;&gt;=0A the content of the access token and the token introspection e=
ndpoint <br>&gt;&gt; just pushes the problem around: the resource server ha=
s to send the <br>&gt;&gt; access token to the authorization server and the=
n the resource server <br>&gt;&gt; gets the result back (which he the<br> n=
<br>&gt;&nbsp; &nbsp; a<br>&gt;&gt; gain needs to understand) in order to m=
ake a meaningful authorization decision.<br>&gt;&gt;<br>&gt;&gt; Everyone a=
greed that the client must receive the session key from the authorization s=
erver and that this approach has to be standardized. It was also agreed tha=
t this is a common approach among all three key distribution mechanisms.<br=
>&gt;&gt;<br>&gt;&gt; Hannes asked the participants to think about their pr=
eference.<br>&gt;&gt;<br>&gt;&gt; The questions regarding key naming and th=
e indication for the intended resource server the client wants to talk to h=
ave been postponed.<br>&gt;&gt;<br>&gt;&gt; Ciao<br>&gt;&gt;=0A Hannes<br>&=
gt;&gt;<br>&gt;&gt;<br>&gt;&gt; ___________________________________________=
____<br>&gt;&gt; OAuth mailing list<br>&gt;&gt; <a rel=3D"nofollow" ymailto=
=3D"mailto:OAuth@ietf.org" target=3D"_blank" href=3D"mailto:OAuth@ietf.org"=
>OAuth@ietf.org</a><br>&gt;&gt; <a rel=3D"nofollow" target=3D"_blank" href=
=3D"https://www.ietf.org/mailman/listinfo/oauth">https://www.ietf.org/mailm=
an/listinfo/oauth</a><br>&gt; _____________________________________________=
__<br>&gt; OAuth mailing list<br>&gt; <a rel=3D"nofollow" ymailto=3D"mailto=
:OAuth@ietf.org" target=3D"_blank" href=3D"mailto:OAuth@ietf.org">OAuth@iet=
f.org</a><br>&gt; <a rel=3D"nofollow" target=3D"_blank" href=3D"https://www=
.ietf.org/mailman/listinfo/oauth">https://www.ietf.org/mailman/listinfo/oau=
th</a><br><br><br>_______________________________________________<br>OAuth =
mailing list<br><a rel=3D"nofollow" ymailto=3D"mailto:OAuth@ietf.org" targe=
t=3D"_blank" href=3D"mailto:OAuth@ietf.org">OAuth@ietf.org</a><br><a rel=3D=
"nofollow"
 target=3D"_blank" href=3D"https://www.ietf.org/mailman/listinfo/oauth">htt=
ps://www.ietf.org/mailman/listinfo/oauth</a><br>___________________________=
____________________<br>OAuth mailing list<br><a rel=3D"nofollow" ymailto=
=3D"mailto:OAuth@ietf.org" target=3D"_blank" href=3D"mailto:OAuth@ietf.org"=
>OAuth@ietf.org</a><br><a rel=3D"nofollow" target=3D"_blank" href=3D"https:=
//www.ietf.org/mailman/listinfo/oauth">https://www.ietf.org/mailman/listinf=
o/oauth</a><br><br><br> </div> </div>  </div></div></blockquote><blockquote=
 type=3D"cite"><div><span>_______________________________________________</=
span><br><span>OAuth mailing list</span><br><span><a rel=3D"nofollow" ymail=
to=3D"mailto:OAuth@ietf.org" target=3D"_blank" href=3D"mailto:OAuth@ietf.or=
g">OAuth@ietf.org</a></span><br><span><a rel=3D"nofollow" target=3D"_blank"=
 href=3D"https://www.ietf.org/mailman/listinfo/oauth">https://www.ietf.org/=
mailman/listinfo/oauth</a></span><br></div></blockquote></div></div><br><br=
> </div> </div> =0A </div></div></blockquote></div></div><br><br> </div> </=
div>  </div></body></html>
--258328648-134066345-1360944589=:51724--

From phil.hunt@oracle.com  Fri Feb 15 08:19:38 2013
Return-Path: <phil.hunt@oracle.com>
X-Original-To: oauth@ietfa.amsl.com
Delivered-To: oauth@ietfa.amsl.com
Received: from localhost (localhost [127.0.0.1]) by ietfa.amsl.com (Postfix) with ESMTP id 4B9D121F896B for <oauth@ietfa.amsl.com>; Fri, 15 Feb 2013 08:19:38 -0800 (PST)
X-Virus-Scanned: amavisd-new at amsl.com
X-Spam-Flag: NO
X-Spam-Score: -5.684
X-Spam-Level: 
X-Spam-Status: No, score=-5.684 tagged_above=-999 required=5 tests=[AWL=-0.482, BAYES_00=-2.599, HTML_MESSAGE=0.001, MIME_QP_LONG_LINE=1.396, RCVD_IN_DNSWL_MED=-4]
Received: from mail.ietf.org ([64.170.98.30]) by localhost (ietfa.amsl.com [127.0.0.1]) (amavisd-new, port 10024) with ESMTP id AyQ0qfCdi1B1 for <oauth@ietfa.amsl.com>; Fri, 15 Feb 2013 08:19:36 -0800 (PST)
Received: from userp1040.oracle.com (userp1040.oracle.com [156.151.31.81]) by ietfa.amsl.com (Postfix) with ESMTP id 81CB921F8900 for <oauth@ietf.org>; Fri, 15 Feb 2013 08:19:36 -0800 (PST)
Received: from ucsinet21.oracle.com (ucsinet21.oracle.com [156.151.31.93]) by userp1040.oracle.com (Sentrion-MTA-4.3.1/Sentrion-MTA-4.3.1) with ESMTP id r1FGJZTk004891 (version=TLSv1/SSLv3 cipher=DHE-RSA-AES256-SHA bits=256 verify=OK); Fri, 15 Feb 2013 16:19:35 GMT
Received: from acsmt357.oracle.com (acsmt357.oracle.com [141.146.40.157]) by ucsinet21.oracle.com (8.14.4+Sun/8.14.4) with ESMTP id r1FGJY4q006620 (version=TLSv1/SSLv3 cipher=DHE-RSA-AES256-SHA bits=256 verify=NO); Fri, 15 Feb 2013 16:19:34 GMT
Received: from abhmt108.oracle.com (abhmt108.oracle.com [141.146.116.60]) by acsmt357.oracle.com (8.12.11.20060308/8.12.11) with ESMTP id r1FGJYuK009037; Fri, 15 Feb 2013 10:19:34 -0600
Received: from [192.168.1.125] (/174.7.250.104) by default (Oracle Beehive Gateway v4.0) with ESMTP ; Fri, 15 Feb 2013 08:19:33 -0800
References: <0573984A-8C11-4960-9BC6-F44D4B664C19@gmx.net> <E808B6AC-D5F6-479F-967D-EA6B2586BE64@oracle.com> <511A7D27.8010209@mitre.org> <4E1F6AAD24975D4BA5B16804296739436744BD23@TK5EX14MBXC285.redmond.corp.microsoft.com> <1360891897.14004.YahooMailNeo@web31811.mail.mud.yahoo.com> <E7EBF78C-37EB-4737-8DD5-0F24C9FACA60@lodderstedt.net> <1360912115.36543.YahooMailNeo@web31811.mail.mud.yahoo.com> <2A0F585F-2CEF-418D-9654-5084E6C9BD0D@lodderstedt.net> <1360944589.51724.YahooMailNeo@web31808.mail.mud.yahoo.com>
Mime-Version: 1.0 (1.0)
In-Reply-To: <1360944589.51724.YahooMailNeo@web31808.mail.mud.yahoo.com>
Content-Type: multipart/alternative; boundary=Apple-Mail-14B1C5F1-F4AD-4183-8034-4DBE141D4104
Content-Transfer-Encoding: 7bit
Message-Id: <2DD050E1-DD8B-4788-B373-CDBED10C8048@oracle.com>
X-Mailer: iPhone Mail (10B142)
From: Phil Hunt <phil.hunt@oracle.com>
Date: Fri, 15 Feb 2013 08:19:32 -0800
To: William Mills <wmills_92105@yahoo.com>
X-Source-IP: ucsinet21.oracle.com [156.151.31.93]
Cc: IETF oauth WG <oauth@ietf.org>
Subject: Re: [OAUTH-WG] Minutes from the OAuth Design Team Conference Call - 11th February 2013
X-BeenThere: oauth@ietf.org
X-Mailman-Version: 2.1.12
Precedence: list
List-Id: OAUTH WG <oauth.ietf.org>
List-Unsubscribe: <https://www.ietf.org/mailman/options/oauth>, <mailto:oauth-request@ietf.org?subject=unsubscribe>
List-Archive: <http://www.ietf.org/mail-archive/web/oauth>
List-Post: <mailto:oauth@ietf.org>
List-Help: <mailto:oauth-request@ietf.org?subject=help>
List-Subscribe: <https://www.ietf.org/mailman/listinfo/oauth>, <mailto:oauth-request@ietf.org?subject=subscribe>
X-List-Received-Date: Fri, 15 Feb 2013 16:19:38 -0000

--Apple-Mail-14B1C5F1-F4AD-4183-8034-4DBE141D4104
Content-Type: text/plain;
	charset=us-ascii
Content-Transfer-Encoding: quoted-printable

Bill

You aren't objecting to https in the as communications correct?  It is the r=
s comms which is plain http where you want to protect the credential from th=
eft. =20

Even replay is not the primary issue here.=20

Phil

Sent from my phone.

On 2013-02-15, at 8:09, William Mills <wmills_92105@yahoo.com> wrote:

> I'll repeat the use case for Flickr, which requires OAuth 1.0a type capabi=
lites that OAuth 2 does not provide.  Simply stating "move to HTTPS" is not a=
 viable response here. =20
>=20
> From: Torsten Lodderstedt <torsten@lodderstedt.net>
> To: William Mills <wmills_92105@yahoo.com>=20
> Cc: Mike Jones <Michael.Jones@microsoft.com>; Justin Richer <jricher@mitre=
.org>; Phil Hunt <phil.hunt@oracle.com>; IETF oauth WG <oauth@ietf.org>=20
> Sent: Friday, February 15, 2013 7:22 AM
> Subject: Re: [OAUTH-WG] Minutes from the OAuth Design Team Conference Call=
 - 11th February 2013
>=20
> Hi Bill,
>=20
> I think one needs to compare the costs/impact of HTTPS on one side and the=
 implementation of integrity protection and replay detection on the other. W=
e had this discussion several times.
>=20
> regards,
> Torsten.
>=20
> Am 15.02.2013 um 08:08 schrieb William Mills <wmills_92105@yahoo.com>:
>=20
>> I fundamentally disagree with that too.  OAuth 2 is the *framework*, one w=
hich supports multiple token types.  Bearer tokens were the first credential=
 type defined.
>>=20
>> OAuth 1.0a also requires HTTPS transport for authentication and getting t=
he token.
>>=20
>> There are  real use cases for tokens usable over plain text with integrit=
y protection.
>>=20
>> -bill
>>=20
>> From: Torsten Lodderstedt <torsten@lodderstedt.net>
>> To: William Mills <wmills_92105@yahoo.com>=20
>> Cc: Mike Jones <Michael.Jones@microsoft.com>; Justin Richer <jricher@mitr=
e.org>; Phil Hunt <phil.hunt@oracle.com>; IETF oauth WG <oauth@ietf.org>=20
>> Sent: Thursday, February 14, 2013 10:05 PM
>> Subject: Re: [OAUTH-WG] Minutes from the OAuth Design Team Conference Cal=
l - 11th February 2013
>>=20
>> Hi Bill,
>>=20
>> OAuth 2.0 took a different direction by relying on HTTPS to provide the b=
asic protection. So the need to have a token, which can be used for service r=
equests over plain HTTP is arguable. My understanding of this activity was, t=
he intend is to provide additional protection on top of HTTPS.
>>=20
>> regards,
>> Torsten.
>>=20
>> Am 15.02.2013 um 02:31 schrieb William Mills <wmills_92105@yahoo.com>:
>>=20
>>> I disagree with "That was the impediment to OAuth 1.0 adoption that OAut=
h 2.0 solved in the first place.", unless "solving" means does not address t=
he need for it at all.
>>>=20
>>> OAuth 2 does several good things, but it still lacks a defined token typ=
e that is safe to user over plain text HTTP.  1.0a solved that.
>>>=20
>>> From: Mike Jones <Michael.Jones@microsoft.com>
>>> To: Justin Richer <jricher@mitre.org>; Phil Hunt <phil.hunt@oracle.com>=20=

>>> Cc: IETF oauth WG <oauth@ietf.org>=20
>>> Sent: Thursday, February 14, 2013 1:44 PM
>>> Subject: Re: [OAUTH-WG] Minutes from the OAuth Design Team Conference Ca=
ll - 11th February 2013
>>>=20
>>> I'm in favor of reusing the JWT work that this WG is also doing. :-)
>>>=20
>>> I'm pretty skeptical of us inventing another custom scheme for signing H=
TTP headers.  That was the impediment to OAuth 1.0 adoption that OAuth 2.0 s=
olved in the first place.
>>>=20
>>>                 -- Mike
>>>=20
>>> -----Original Message-----
>>> From: oauth-bounces@ietf.org [mailto:oauth-bounces@ietf.org] On Behalf O=
f Justin Richer
>>> Sent: Tuesday, February 12, 2013 9:35 AM
>>> To: Phil Hunt
>>> Cc: IETF oauth WG
>>> Subject: Re: [OAUTH-WG] Minutes from the OAuth Design Team Conference Ca=
ll - 11th February 2013
>>>=20
>>> That's my reading of it as well, Phil, thanks for providing the clarific=
ation. One motivator behind using a JSON-based token is to be able to re-use=
 some of the great work that the JOSE group is doing but apply it to an HTTP=
 payload.
>>>=20
>>> What neither of us want is a token type that requires stuffing all query=
, header, and other parameters *into* the JSON object itself, which would be=
 a more SOAPy approach.
>>>=20
>>>   -- Justin
>>>=20
>>> On 02/12/2013 12:30 PM, Phil Hunt wrote:
>>> > Clarification.  I think Justin and I were in agreement that we don't w=
ant to see a format that requires JSON payloads.  We are both interested in a=
 JSON token used in the authorization header that could be based on a comput=
ed signature of some combination of http headers and body if possible.
>>> >
>>> > Phil
>>> >
>>> > @independentid
>>> > www.independentid.com
>>> > phil.hunt@oracle.com
>>> >
>>> >
>>> >
>>> >
>>> >
>>> > On 2013-02-12, at 1:10 AM, Hannes Tschofenig wrote:
>>> >
>>> >> Here are my notes.
>>> >>
>>> >> Participants:
>>> >>
>>> >> * John Bradley
>>> >> * Derek Atkins
>>> >> * Phil Hunt
>>> >> * Prateek Mishra
>>> >> * Hannes Tschofenig
>>> >> * Mike Jones
>>> >> * Antonio Sanso
>>> >> * Justin Richer
>>> >>
>>> >> Notes:
>>> >>
>>> >> My slides are available here:=20
>>> >> http://www.tschofenig.priv.at/OAuth2-Security-11Feb2013.ppt
>>> >>
>>> >> Slide #2 summarizes earlier discussions during the conference calls.
>>> >>
>>> >> -- HTTP vs. JSON
>>> >>
>>> >> Phil noted that he does not like to use the MAC Token draft as a star=
ting point because it does not re-use any of the work done in the JOSE worki=
ng group and in particular all the libraries that are available today. He me=
ntioned that earlier attempts to write the MAC Token code lead to problems f=
or implementers.
>>> >>
>>> >> Justin responded that he does not agree with using JSON as a transpor=
t mechanism since this would replicate a SOAP style.
>>> >>
>>> >> Phil noted that he wants to send JSON but the signature shall be comp=
uted over the HTTP header field.
>>> >>
>>> >> -- Flexibility for the keyed message digest computation
>>> >>
>>> >>  =46rom earlier discussion it was clear that the conference call part=
icipants wanted more flexibility regarding the keyed message digest computat=
ion. For this purpose Hannes presented the DKIM based approach, which allows=
 selective header fields to be included in the digest. This is shown in slid=
e #4.
>>> >>
>>> >> After some discussion the conference call participants thought that t=
his would meet their needs. Further investigations would still be useful to d=
etermine the degree of failed HMAC calculations due to HTTP proxies modifyin=
g the content.
>>> >>
>>> >> -- Key Distribution
>>> >>
>>> >> Hannes presented the open issue regarding the choice of key=20
>>> >> distribution. Slides #6-#8 present three techniques and Hannes asked=20=

>>> >> for feedback regarding the preferred style. Justin and others didn't=20=

>>> >> see the need to decide on one mechanism - they wanted to keep the=20
>>> >> choice open. Derek indicated that this will not be an acceptable=20
>>> >> approach. Since the resource server and the authorization server may,=
=20
>>> >> in the OAuth 2.0 framework, be entities produced by different vendors=
=20
>>> >> there is an interoperability need. Justin responded that he disagrees=
=20
>>> >> and that the resource server needs to understand the access token and=
=20
>>> >> referred to the recent draft submission for the token introspection=20=

>>> >> endpoint. Derek indicated that the resource server has to understand=20=

>>> >> the content of the access token and the token introspection endpoint=20=

>>> >> just pushes the problem around: the resource server has to send the=20=

>>> >> access token to the authorization server and then the resource server=
=20
>>> >> gets the result back (which he the
>>> n
>>> >    a
>>> >> gain needs to understand) in order to make a meaningful authorization=
 decision.
>>> >>
>>> >> Everyone agreed that the client must receive the session key from the=
 authorization server and that this approach has to be standardized. It was a=
lso agreed that this is a common approach among all three key distribution m=
echanisms.
>>> >>
>>> >> Hannes asked the participants to think about their preference.
>>> >>
>>> >> The questions regarding key naming and the indication for the intende=
d resource server the client wants to talk to have been postponed.
>>> >>
>>> >> Ciao
>>> >> Hannes
>>> >>
>>> >>
>>> >> _______________________________________________
>>> >> OAuth mailing list
>>> >> OAuth@ietf.org
>>> >> https://www.ietf.org/mailman/listinfo/oauth
>>> > _______________________________________________
>>> > OAuth mailing list
>>> > OAuth@ietf.org
>>> > https://www.ietf.org/mailman/listinfo/oauth
>>>=20
>>>=20
>>> _______________________________________________
>>> OAuth mailing list
>>> OAuth@ietf.org
>>> https://www.ietf.org/mailman/listinfo/oauth
>>> _______________________________________________
>>> OAuth mailing list
>>> OAuth@ietf.org
>>> https://www.ietf.org/mailman/listinfo/oauth
>>>=20
>>>=20
>>> _______________________________________________
>>> OAuth mailing list
>>> OAuth@ietf.org
>>> https://www.ietf.org/mailman/listinfo/oauth
>=20
>=20

--Apple-Mail-14B1C5F1-F4AD-4183-8034-4DBE141D4104
Content-Type: text/html;
	charset=utf-8
Content-Transfer-Encoding: quoted-printable

<html><head><meta http-equiv=3D"content-type" content=3D"text/html; charset=3D=
utf-8"></head><body dir=3D"auto"><div>Bill</div><div><br></div><div>You aren=
't objecting to https in the as communications correct? &nbsp;It is the rs c=
omms which is plain http where you want to protect the credential from theft=
. &nbsp;</div><div><br></div><div>Even replay is not the primary issue here.=
&nbsp;<br><br>Phil<div><br></div><div>Sent from my phone.</div></div><div><b=
r>On 2013-02-15, at 8:09, William Mills &lt;<a href=3D"mailto:wmills_92105@y=
ahoo.com">wmills_92105@yahoo.com</a>&gt; wrote:<br><br></div><blockquote typ=
e=3D"cite"><div><div style=3D"color:#000; background-color:#fff; font-family=
:Courier New, courier, monaco, monospace, sans-serif;font-size:12pt"><div><s=
pan>I'll repeat the use case for Flickr, which requires OAuth 1.0a type capa=
bilites that OAuth 2 does not provide. &nbsp;Simply stating "move to HTTPS" i=
s not a viable response here. &nbsp;</span></div><div><br></div>  <div style=
=3D"font-family: 'Courier New', courier, monaco, monospace, sans-serif; font=
-size: 12pt;"> <div style=3D"font-family: 'times new roman', 'new york', tim=
es, serif; font-size: 12pt;"> <div dir=3D"ltr"> <font size=3D"2" face=3D"Ari=
al"> <hr size=3D"1">  <b><span style=3D"font-weight:bold;">From:</span></b> T=
orsten Lodderstedt &lt;<a href=3D"mailto:torsten@lodderstedt.net">torsten@lo=
dderstedt.net</a>&gt;<br> <b><span style=3D"font-weight: bold;">To:</span></=
b> William Mills &lt;<a href=3D"mailto:wmills_92105@yahoo.com">wmills_92105@=
yahoo.com</a>&gt; <br><b><span style=3D"font-weight: bold;">Cc:</span></b> M=
ike Jones &lt;<a href=3D"mailto:Michael.Jones@microsoft.com">Michael.Jones@m=
icrosoft.com</a>&gt;; Justin Richer &lt;<a href=3D"mailto:jricher@mitre.org"=
>jricher@mitre.org</a>&gt;; Phil
 Hunt &lt;<a href=3D"mailto:phil.hunt@oracle.com">phil.hunt@oracle.com</a>&g=
t;; IETF oauth WG &lt;<a href=3D"mailto:oauth@ietf.org">oauth@ietf.org</a>&g=
t; <br> <b><span style=3D"font-weight: bold;">Sent:</span></b> Friday, Febru=
ary 15, 2013 7:22 AM<br> <b><span style=3D"font-weight: bold;">Subject:</spa=
n></b> Re: [OAUTH-WG] Minutes from the OAuth Design Team Conference Call - 1=
1th February 2013<br> </font> </div> <br>
<div id=3D"yiv301966391"><div><div>Hi Bill,</div><div><br></div><div>I think=
 one needs to compare the costs/impact of HTTPS on one side and the implemen=
tation of integrity protection and replay detection on the other. We had thi=
s discussion several times.</div><div><br></div><div>regards,</div><div>Tors=
ten.</div><div><br>Am 15.02.2013 um 08:08 schrieb William Mills &lt;<a rel=3D=
"nofollow" ymailto=3D"mailto:wmills_92105@yahoo.com" target=3D"_blank" href=3D=
"mailto:wmills_92105@yahoo.com">wmills_92105@yahoo.com</a>&gt;:<br><br></div=
><blockquote type=3D"cite"><div><div style=3D"color: rgb(0, 0, 0); backgroun=
d-color: rgb(255, 255, 255); font-family: 'Courier New', courier, monaco, mo=
nospace, sans-serif; font-size: 12pt;"><div><span>I fundamentally disagree w=
ith that too. &nbsp;OAuth 2 is the *framework*, one which supports multiple t=
oken types. &nbsp;Bearer tokens were the first credential type defined.</spa=
n></div><div style=3D"color: rgb(0, 0, 0); font-size: 16px;
 font-family: 'Courier New', courier, monaco, monospace, sans-serif; backgro=
und-color: transparent; font-style: normal;"><span><br></span></div><div sty=
le=3D"color: rgb(0, 0, 0); font-size: 16px; font-family: 'Courier New', cour=
ier, monaco, monospace, sans-serif; background-color: transparent; font-styl=
e: normal;"><span>OAuth 1.0a also requires HTTPS transport for authenticatio=
n and getting the token.</span></div><div style=3D"color: rgb(0, 0, 0); font=
-size: 16px; font-family: 'Courier New', courier, monaco, monospace, sans-se=
rif; background-color: transparent; font-style: normal;"><span><br></span></=
div><div style=3D"color: rgb(0, 0, 0); font-size: 16px; font-family: 'Courie=
r New', courier, monaco, monospace, sans-serif; background-color: transparen=
t; font-style: normal;"><span>There are &nbsp;real use cases for tokens usab=
le over plain text with integrity protection.</span></div><div style=3D"colo=
r: rgb(0, 0, 0); font-size: 16px; font-family: 'Courier New',
 courier, monaco, monospace, sans-serif; background-color: transparent; font=
-style: normal;"><span><br></span></div><div style=3D"color: rgb(0, 0, 0); f=
ont-size: 16px; font-family: 'Courier New', courier, monaco, monospace, sans=
-serif; background-color: transparent; font-style: normal;"><span>-bill</spa=
n></div><div><br></div>  <div style=3D"font-family: 'Courier New', courier, m=
onaco, monospace, sans-serif; font-size: 12pt;"> <div style=3D"font-family: '=
times new roman', 'new york', times, serif; font-size: 12pt;"> <div dir=3D"l=
tr"> <font size=3D"2" face=3D"Arial"> <hr size=3D"1">=20
 <b><span style=3D"font-weight:bold;">From:</span></b> Torsten Lodderstedt &=
lt;<a rel=3D"nofollow" ymailto=3D"mailto:torsten@lodderstedt.net" target=3D"=
_blank" href=3D"mailto:torsten@lodderstedt.net">torsten@lodderstedt.net</a>&=
gt;<br> <b><span style=3D"font-weight:bold;">To:</span></b> William Mills &l=
t;<a rel=3D"nofollow" ymailto=3D"mailto:wmills_92105@yahoo.com" target=3D"_b=
lank" href=3D"mailto:wmills_92105@yahoo.com">wmills_92105@yahoo.com</a>&gt; <=
br><b><span style=3D"font-weight:bold;">Cc:</span></b> Mike Jones &lt;<a rel=
=3D"nofollow" ymailto=3D"mailto:Michael.Jones@microsoft.com" target=3D"_blan=
k" href=3D"mailto:Michael.Jones@microsoft.com">Michael.Jones@microsoft.com</=
a>&gt;; Justin Richer &lt;<a rel=3D"nofollow" ymailto=3D"mailto:jricher@mitr=
e.org" target=3D"_blank" href=3D"mailto:jricher@mitre.org">jricher@mitre.org=
</a>&gt;; Phil Hunt &lt;<a rel=3D"nofollow" ymailto=3D"mailto:phil.hunt@orac=
le.com" target=3D"_blank" href=3D"mailto:phil.hunt@oracle.com">phil.hunt@ora=
cle.com</a>&gt;; IETF
 oauth WG &lt;<a rel=3D"nofollow" ymailto=3D"mailto:oauth@ietf.org" target=3D=
"_blank" href=3D"mailto:oauth@ietf.org">oauth@ietf.org</a>&gt; <br> <b><span=
 style=3D"font-weight:bold;">Sent:</span></b> Thursday, February 14, 2013 10=
:05 PM<br> <b><span style=3D"font-weight:bold;">Subject:</span></b> Re: [OAU=
TH-WG] Minutes from the OAuth Design Team Conference Call - 11th February 20=
13<br> </font> </div> <br>
<div id=3D"yiv301966391"><div><div>Hi Bill,</div><div><br></div><div>OAuth 2=
.0 took a different direction by relying on HTTPS to provide the basic prote=
ction. So the need to have a token, which can be used for service requests o=
ver plain HTTP is arguable. My understanding of this activity was, the inten=
d is to provide additional protection on top of HTTPS.</div><div><br></div><=
div>regards,</div><div>Torsten.</div><div><br>Am 15.02.2013 um 02:31 schrieb=
 William Mills &lt;<a rel=3D"nofollow" ymailto=3D"mailto:wmills_92105@yahoo.=
com" target=3D"_blank" href=3D"mailto:wmills_92105@yahoo.com">wmills_92105@y=
ahoo.com</a>&gt;:<br><br></div><blockquote type=3D"cite"><div><div style=3D"=
color: rgb(0, 0, 0); background-color: rgb(255, 255, 255); font-family: 'Cou=
rier New', courier, monaco, monospace, sans-serif; font-size: 12pt;"><div><s=
pan>I disagree with "</span><span style=3D"font-family: 'times new roman', '=
new york', times, serif; font-size: 12pt;">That was the impediment to
 OAuth 1.0 adoption that OAuth 2.0 solved in the first place.", unless "solv=
ing" means does not address the need for it at all.</span></div><div style=3D=
"color: rgb(0, 0, 0); font-size: 12pt; font-family: 'times new roman', 'new y=
ork', times, serif; background-color: transparent; font-style: normal;"><spa=
n style=3D"font-family: 'times new roman', 'new york', times, serif; font-si=
ze: 12pt;"><br></span></div><div style=3D"color: rgb(0, 0, 0); font-size: 16=
px; font-family: 'times new roman', 'new york', times, serif; background-col=
or: transparent; font-style: normal;"><span style=3D"font-family: 'times new=
 roman', 'new york', times, serif; font-size: 12pt;">OAuth 2 does several
 good things, but it still lacks a defined token type that is safe to user o=
ver plain text HTTP. &nbsp;1.0a solved that.</span></div><div><br></div>  <d=
iv style=3D"font-family: 'Courier New', courier, monaco, monospace, sans-ser=
if; font-size: 12pt;"> <div style=3D"font-family: 'times new roman', 'new yo=
rk', times, serif; font-size: 12pt;"> <div dir=3D"ltr"> <font size=3D"2" fac=
e=3D"Arial"> <hr size=3D"1">  <b><span style=3D"font-weight:bold;">From:</sp=
an></b> Mike Jones &lt;<a rel=3D"nofollow" ymailto=3D"mailto:Michael.Jones@m=
icrosoft.com" target=3D"_blank" href=3D"mailto:Michael.Jones@microsoft.com">=
Michael.Jones@microsoft.com</a>&gt;<br> <b><span style=3D"font-weight:bold;"=
>To:</span></b> Justin Richer &lt;<a rel=3D"nofollow" ymailto=3D"mailto:jric=
her@mitre.org" target=3D"_blank" href=3D"mailto:jricher@mitre.org">jricher@m=
itre.org</a>&gt;; Phil Hunt &lt;<a rel=3D"nofollow" ymailto=3D"mailto:phil.h=
unt@oracle.com" target=3D"_blank" href=3D"mailto:phil.hunt@oracle.com">phil.=
hunt@oracle.com</a>&gt; <br><b><span style=3D"font-weight:bold;">Cc:</span><=
/b> IETF oauth WG &lt;<a rel=3D"nofollow" ymailto=3D"mailto:oauth@ietf.org" t=
arget=3D"_blank" href=3D"mailto:oauth@ietf.org">oauth@ietf.org</a>&gt; <br> <=
b><span style=3D"font-weight:bold;">Sent:</span></b> Thursday, February 14, 2=
013 1:44 PM<br> <b><span style=3D"font-weight:bold;">Subject:</span></b> Re:=
 [OAUTH-WG] Minutes from the OAuth Design Team Conference Call - 11th Februa=
ry 2013<br>
 </font> </div> <br>
I'm in favor of reusing the JWT work that this WG is also doing. :-)<br><br>=
I'm pretty skeptical of us inventing another custom scheme for signing HTTP h=
eaders.&nbsp; That was the impediment to OAuth 1.0 adoption that OAuth 2.0 s=
olved in the first place.<br><br>&nbsp;&nbsp;&nbsp; &nbsp;&nbsp;&nbsp; &nbsp=
;&nbsp;&nbsp; &nbsp;&nbsp;&nbsp; -- Mike<br><br>-----Original Message-----<b=
r>From: <a rel=3D"nofollow" ymailto=3D"mailto:oauth-bounces@ietf.org" target=
=3D"_blank" href=3D"mailto:oauth-bounces@ietf.org">oauth-bounces@ietf.org</a=
> [mailto:<a rel=3D"nofollow" ymailto=3D"mailto:oauth-bounces@ietf.org" targ=
et=3D"_blank" href=3D"mailto:oauth-bounces@ietf.org">oauth-bounces@ietf.org<=
/a>] On Behalf Of Justin Richer<br>Sent: Tuesday, February 12, 2013 9:35 AM<=
br>To: Phil Hunt<br>Cc: IETF oauth WG<br>Subject: Re: [OAUTH-WG] Minutes fro=
m the OAuth Design Team Conference Call - 11th February 2013<br><br>That's m=
y reading of it as well, Phil, thanks for providing the clarification.
 One motivator behind using a JSON-based token is to be able to
 re-use some of the great work that the JOSE group is doing but apply it to a=
n HTTP payload.<br><br>What neither of us want is a token type that requires=
 stuffing all query, header, and other parameters *into* the JSON object its=
elf, which would be a more SOAPy approach.<br><br>&nbsp; -- Justin<br><br>On=
 02/12/2013 12:30 PM, Phil Hunt wrote:<br>&gt; Clarification.&nbsp; I think J=
ustin and I were in agreement that we don't want to see a format that requir=
es JSON payloads.&nbsp; We are both interested in a JSON token used in the a=
uthorization header that could be based on a computed signature of some comb=
ination of http headers and body if possible.<br>&gt;<br>&gt; Phil<br>&gt;<b=
r>&gt; @independentid<br>&gt; <a rel=3D"nofollow" target=3D"_blank" href=3D"=
http://www.independentid.com/">www.independentid.com</a><br>&gt; <a rel=3D"n=
ofollow" ymailto=3D"mailto:phil.hunt@oracle.com" target=3D"_blank" href=3D"m=
ailto:phil.hunt@oracle.com">phil.hunt@oracle.com</a><br>&gt;<br>&gt;<br>&gt;=
<br>&gt;<br>&gt;<br>&gt; On
 2013-02-12, at 1:10 AM, Hannes Tschofenig wrote:<br>&gt;<br>&gt;&gt; Here a=
re my notes.<br>&gt;&gt;<br>&gt;&gt; Participants:<br>&gt;&gt;<br>&gt;&gt; *=
 John Bradley<br>&gt;&gt; * Derek Atkins<br>&gt;&gt; * Phil Hunt<br>&gt;&gt;=
 * Prateek Mishra<br>&gt;&gt; * Hannes Tschofenig<br>&gt;&gt; * Mike Jones<b=
r>&gt;&gt; * Antonio Sanso<br>&gt;&gt; * Justin Richer<br>&gt;&gt;<br>&gt;&g=
t; Notes:<br>&gt;&gt;<br>&gt;&gt; My slides are available here: <br>&gt;&gt;=
 <a href=3D"http://www.tschofenig.priv.at/OAuth2-Security-11Feb2013.ppt">htt=
p://www.tschofenig.priv.at/OAuth2-Security-11Feb2013.ppt</a><br>&gt;&gt;<br>=
&gt;&gt; Slide #2 summarizes earlier discussions during the conference calls=
.<br>&gt;&gt;<br>&gt;&gt; -- HTTP vs. JSON<br>&gt;&gt;<br>&gt;&gt; Phil note=
d that he does not like to use the MAC Token draft as a starting point becau=
se it does not re-use any of the work done in the JOSE working group and in p=
articular all the libraries that are available today. He mentioned that earl=
ier attempts to write the MAC Token code lead to
 problems for implementers.<br>&gt;&gt;<br>&gt;&gt; Justin responded that he=
 does not agree with using JSON as a transport mechanism since this would re=
plicate a SOAP style.<br>&gt;&gt;<br>&gt;&gt; Phil noted that he wants to se=
nd JSON but the signature shall be computed over the HTTP header field.<br>&=
gt;&gt;<br>&gt;&gt; -- Flexibility for the keyed message digest computation<=
br>&gt;&gt;<br>&gt;&gt;&nbsp; =46rom earlier discussion it was clear that th=
e conference call participants wanted more flexibility regarding the keyed m=
essage digest computation. For this purpose Hannes presented the DKIM based a=
pproach, which allows selective header fields to be included in the digest. T=
his is shown in slide #4.<br>&gt;&gt;<br>&gt;&gt; After some discussion the c=
onference call participants thought that this would meet their needs. Furthe=
r investigations would still be useful to determine the degree of failed HMA=
C calculations due to HTTP proxies modifying the
 content.<br>&gt;&gt;<br>&gt;&gt; -- Key Distribution<br>&gt;&gt;<br>&gt;&gt=
; Hannes presented the open issue regarding the choice of key <br>&gt;&gt; d=
istribution. Slides #6-#8 present three techniques and Hannes asked <br>&gt;=
&gt; for feedback regarding the preferred style. Justin and others didn't <b=
r>&gt;&gt; see the need to decide on one mechanism - they wanted to keep the=
 <br>&gt;&gt; choice open. Derek indicated that this will not be an acceptab=
le <br>&gt;&gt; approach. Since the resource server and the authorization se=
rver may, <br>&gt;&gt; in the OAuth 2.0 framework, be entities produced by d=
ifferent vendors <br>&gt;&gt; there is an interoperability need. Justin resp=
onded that he disagrees <br>&gt;&gt; and that the resource server needs to u=
nderstand the access token and <br>&gt;&gt; referred to the recent draft sub=
mission for the token introspection <br>&gt;&gt; endpoint. Derek indicated t=
hat the resource server has to understand <br>&gt;&gt;
 the content of the access token and the token introspection endpoint <br>&g=
t;&gt; just pushes the problem around: the resource server has to send the <=
br>&gt;&gt; access token to the authorization server and then the resource s=
erver <br>&gt;&gt; gets the result back (which he the<br> n<br>&gt;&nbsp; &n=
bsp; a<br>&gt;&gt; gain needs to understand) in order to make a meaningful a=
uthorization decision.<br>&gt;&gt;<br>&gt;&gt; Everyone agreed that the clie=
nt must receive the session key from the authorization server and that this a=
pproach has to be standardized. It was also agreed that this is a common app=
roach among all three key distribution mechanisms.<br>&gt;&gt;<br>&gt;&gt; H=
annes asked the participants to think about their preference.<br>&gt;&gt;<br=
>&gt;&gt; The questions regarding key naming and the indication for the inte=
nded resource server the client wants to talk to have been postponed.<br>&gt=
;&gt;<br>&gt;&gt; Ciao<br>&gt;&gt;
 Hannes<br>&gt;&gt;<br>&gt;&gt;<br>&gt;&gt; ________________________________=
_______________<br>&gt;&gt; OAuth mailing list<br>&gt;&gt; <a rel=3D"nofollo=
w" ymailto=3D"mailto:OAuth@ietf.org" target=3D"_blank" href=3D"mailto:OAuth@=
ietf.org">OAuth@ietf.org</a><br>&gt;&gt; <a rel=3D"nofollow" target=3D"_blan=
k" href=3D"https://www.ietf.org/mailman/listinfo/oauth">https://www.ietf.org=
/mailman/listinfo/oauth</a><br>&gt; ________________________________________=
_______<br>&gt; OAuth mailing list<br>&gt; <a rel=3D"nofollow" ymailto=3D"ma=
ilto:OAuth@ietf.org" target=3D"_blank" href=3D"mailto:OAuth@ietf.org">OAuth@=
ietf.org</a><br>&gt; <a rel=3D"nofollow" target=3D"_blank" href=3D"https://w=
ww.ietf.org/mailman/listinfo/oauth">https://www.ietf.org/mailman/listinfo/oa=
uth</a><br><br><br>_______________________________________________<br>OAuth m=
ailing list<br><a rel=3D"nofollow" ymailto=3D"mailto:OAuth@ietf.org" target=3D=
"_blank" href=3D"mailto:OAuth@ietf.org">OAuth@ietf.org</a><br><a rel=3D"nofo=
llow" target=3D"_blank" href=3D"https://www.ietf.org/mailman/listinfo/oauth"=
>https://www.ietf.org/mailman/listinfo/oauth</a><br>________________________=
_______________________<br>OAuth mailing list<br><a rel=3D"nofollow" ymailto=
=3D"mailto:OAuth@ietf.org" target=3D"_blank" href=3D"mailto:OAuth@ietf.org">=
OAuth@ietf.org</a><br><a rel=3D"nofollow" target=3D"_blank" href=3D"https://=
www.ietf.org/mailman/listinfo/oauth">https://www.ietf.org/mailman/listinfo/o=
auth</a><br><br><br> </div> </div>  </div></div></blockquote><blockquote typ=
e=3D"cite"><div><span>_______________________________________________</span>=
<br><span>OAuth mailing list</span><br><span><a rel=3D"nofollow" ymailto=3D"=
mailto:OAuth@ietf.org" target=3D"_blank" href=3D"mailto:OAuth@ietf.org">OAut=
h@ietf.org</a></span><br><span><a rel=3D"nofollow" target=3D"_blank" href=3D=
"https://www.ietf.org/mailman/listinfo/oauth">https://www.ietf.org/mailman/l=
istinfo/oauth</a></span><br></div></blockquote></div></div><br><br> </div> <=
/div>=20
 </div></div></blockquote></div></div><br><br> </div> </div>  </div></div></=
blockquote></body></html>=

--Apple-Mail-14B1C5F1-F4AD-4183-8034-4DBE141D4104--

From wmills_92105@yahoo.com  Fri Feb 15 08:21:58 2013
Return-Path: <wmills_92105@yahoo.com>
X-Original-To: oauth@ietfa.amsl.com
Delivered-To: oauth@ietfa.amsl.com
Received: from localhost (localhost [127.0.0.1]) by ietfa.amsl.com (Postfix) with ESMTP id B1A3921F87D2 for <oauth@ietfa.amsl.com>; Fri, 15 Feb 2013 08:21:58 -0800 (PST)
X-Virus-Scanned: amavisd-new at amsl.com
X-Spam-Flag: NO
X-Spam-Score: -2.25
X-Spam-Level: 
X-Spam-Status: No, score=-2.25 tagged_above=-999 required=5 tests=[AWL=0.348,  BAYES_00=-2.599, HTML_MESSAGE=0.001]
Received: from mail.ietf.org ([64.170.98.30]) by localhost (ietfa.amsl.com [127.0.0.1]) (amavisd-new, port 10024) with ESMTP id eNguVf6ukVRA for <oauth@ietfa.amsl.com>; Fri, 15 Feb 2013 08:21:57 -0800 (PST)
Received: from nm18-vm1.bullet.mail.ne1.yahoo.com (nm18-vm1.bullet.mail.ne1.yahoo.com [98.138.91.64]) by ietfa.amsl.com (Postfix) with ESMTP id D04CF21F8467 for <oauth@ietf.org>; Fri, 15 Feb 2013 08:21:56 -0800 (PST)
Received: from [98.138.226.179] by nm18.bullet.mail.ne1.yahoo.com with NNFMP; 15 Feb 2013 16:21:56 -0000
Received: from [98.138.88.232] by tm14.bullet.mail.ne1.yahoo.com with NNFMP; 15 Feb 2013 16:21:56 -0000
Received: from [127.0.0.1] by omp1032.mail.ne1.yahoo.com with NNFMP; 15 Feb 2013 16:21:56 -0000
X-Yahoo-Newman-Property: ymail-3
X-Yahoo-Newman-Id: 358203.440.bm@omp1032.mail.ne1.yahoo.com
Received: (qmail 73873 invoked by uid 60001); 15 Feb 2013 16:21:55 -0000
DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=yahoo.com; s=s1024; t=1360945315; bh=Pap3peOoLL4cxQP8AzL/9wsb/I3codcdif3gA6993kM=; h=X-YMail-OSG:Received:X-Rocket-MIMEInfo:X-Mailer:References:Message-ID:Date:From:Reply-To:Subject:To:Cc:In-Reply-To:MIME-Version:Content-Type; b=oa1lmENhCD/M4nYeD7ZTSpOFUtPnAZNeo9sjB/LkiMYAL4Bqsf49Cn56OZC5p955P8g8lNngjhpyygBuiA+/xVHWlDIpgD3kpCJO+lbABOLez/lmPVOj3cCtdHzRJcZ9PzYGPdVuzm/+HxwAAyi3aF2jRVM9lxciDuWH1AnHum0=
DomainKey-Signature: a=rsa-sha1; q=dns; c=nofws; s=s1024; d=yahoo.com; h=X-YMail-OSG:Received:X-Rocket-MIMEInfo:X-Mailer:References:Message-ID:Date:From:Reply-To:Subject:To:Cc:In-Reply-To:MIME-Version:Content-Type; b=bf+6G6biGxUu2u7n3lTJdoBeY03u1vn9nzsfRuE9R2qdEAR6692NPLJlWCkWNtp4SO53Dfs6XZp4kW29FxaRmmg4zHaJtawPj1oJGQjakGSeoMD/l9x07tJZprA8a0MXhijQgoQ8L/632f2M5NO0vZYx6DHEHX9W7u8xtuiEtdA=;
X-YMail-OSG: .TqT3KIVM1lPQ87TzWD6eT6QT_4CjW0P13jMrG2aLJ7nnQ4 0h3fSWZNx_Cnav.4JrpCmLMDdCpO5L6RJpBxL0VhJr55NOQbYWZr6twOtAVh HlFeNP9lr7ZWYNjx0t9lUntUlY0Wfz1JZ.e.0ZwFJNF68o561_LFx5b0xeye 9GzBgx5nbo0ogKvO.WrVBMn5wPPNw5GUNGn8OdZEnMjLAiyE8iEJRNrIyM4M dOj8l22NfvDGwssgzOhS_aNCPOCbcmSWeVhYCr4a1JkJaFd_OYKWiIuKGKcv SgRuXNPw.TwxXjLyzsZj21tgwNo0p5P6OVqfMNSarFpXOZQ8l4RCThPTE.at 9gpX2Ej7VxKRwhQ5evu.rSmzuNB0W5.1_JV.ARy2cp3beYL8R6L5iqU0ZZmd Y7TJCaEeeLGpjA4VWxABlOq7jjhtQboks9vVX_jQGrRGk_wnMv5KFLJmHtbl 0TymwC938E8Yn1mN6v7CPPQ0H9x9BYU4XMPk7dtX3fSNwNQA3tpmkXNe.Eze JhzqBr6F5oybx4gCVIBjokn_U1tn0aMJJpkvlqXBtFe0Ng6qUfmVDJMLgJ8t mrhpRCTvd_ulfBCTga1G4dGepaDLWhJVsFXhmvdry8FsrlwzI1cEFWAaz3ri n243q9DCzsUJozDZtNSyCkWR5KpDAa2Xf6t5NmTMHj4kjUPtebQKH0k2ZbAO GIAvldAd8NgnfD3ID5E4ko5xJw5Ef
Received: from [209.131.62.115] by web31811.mail.mud.yahoo.com via HTTP; Fri, 15 Feb 2013 08:21:55 PST
X-Rocket-MIMEInfo: 001.001, RXhhY3RseS4gwqBBbmQgaW4gdGhlIEZsaWNrciBjYXNlIHJlcGxheSBvZiB0aGUgc2FtZSBldmVudCBpcyBub3QgYSBwcm9ibGVtLiDCoFRoYW5rcyBmb3Iga2VlcGluZyBtZSBob25lc3QsIHdvcmsganVzdCBjcmFua2VkIHRoZSBkaWFsIHVwIHRvIDExLjUgc28gSSdtIGEgYml0IGRpc3RyYWN0ZWQuCgoKX19fX19fX19fX19fX19fX19fX19fX19fX19fX19fX18KIEZyb206IFBoaWwgSHVudCA8cGhpbC5odW50QG9yYWNsZS5jb20.ClRvOiBXaWxsaWFtIE1pbGxzIDx3bWlsbHNfOTIxMDVAeWFob28uY29tPiABMAEBAQE-
X-Mailer: YahooMailWebService/0.8.134.513
References: <0573984A-8C11-4960-9BC6-F44D4B664C19@gmx.net> <E808B6AC-D5F6-479F-967D-EA6B2586BE64@oracle.com> <511A7D27.8010209@mitre.org> <4E1F6AAD24975D4BA5B16804296739436744BD23@TK5EX14MBXC285.redmond.corp.microsoft.com> <1360891897.14004.YahooMailNeo@web31811.mail.mud.yahoo.com> <E7EBF78C-37EB-4737-8DD5-0F24C9FACA60@lodderstedt.net> <1360912115.36543.YahooMailNeo@web31811.mail.mud.yahoo.com> <2A0F585F-2CEF-418D-9654-5084E6C9BD0D@lodderstedt.net> <1360944589.51724.YahooMailNeo@web31808.mail.mud.yahoo.com> <2DD050E1-DD8B-4788-B373-CDBED10C8048@oracle.com>
Message-ID: <1360945315.70386.YahooMailNeo@web31811.mail.mud.yahoo.com>
Date: Fri, 15 Feb 2013 08:21:55 -0800 (PST)
From: William Mills <wmills_92105@yahoo.com>
To: Phil Hunt <phil.hunt@oracle.com>
In-Reply-To: <2DD050E1-DD8B-4788-B373-CDBED10C8048@oracle.com>
MIME-Version: 1.0
Content-Type: multipart/alternative; boundary="764183289-1875840522-1360945315=:70386"
Cc: IETF oauth WG <oauth@ietf.org>
Subject: Re: [OAUTH-WG] Minutes from the OAuth Design Team Conference Call - 11th February 2013
X-BeenThere: oauth@ietf.org
X-Mailman-Version: 2.1.12
Precedence: list
Reply-To: William Mills <wmills_92105@yahoo.com>
List-Id: OAUTH WG <oauth.ietf.org>
List-Unsubscribe: <https://www.ietf.org/mailman/options/oauth>, <mailto:oauth-request@ietf.org?subject=unsubscribe>
List-Archive: <http://www.ietf.org/mail-archive/web/oauth>
List-Post: <mailto:oauth@ietf.org>
List-Help: <mailto:oauth-request@ietf.org?subject=help>
List-Subscribe: <https://www.ietf.org/mailman/listinfo/oauth>, <mailto:oauth-request@ietf.org?subject=subscribe>
X-List-Received-Date: Fri, 15 Feb 2013 16:21:58 -0000

--764183289-1875840522-1360945315=:70386
Content-Type: text/plain; charset=iso-8859-1
Content-Transfer-Encoding: quoted-printable

Exactly. =A0And in the Flickr case replay of the same event is not a proble=
m. =A0Thanks for keeping me honest, work just cranked the dial up to 11.5 s=
o I'm a bit distracted.=0A=0A=0A________________________________=0A From: P=
hil Hunt <phil.hunt@oracle.com>=0ATo: William Mills <wmills_92105@yahoo.com=
> =0ACc: Torsten Lodderstedt <torsten@lodderstedt.net>; Mike Jones <Michael=
.Jones@microsoft.com>; Justin Richer <jricher@mitre.org>; IETF oauth WG <oa=
uth@ietf.org> =0ASent: Friday, February 15, 2013 8:19 AM=0ASubject: Re: [OA=
UTH-WG] Minutes from the OAuth Design Team Conference Call - 11th February =
2013=0A =0A=0ABill=0A=0AYou aren't objecting to https in the as communicati=
ons correct? =A0It is the rs comms which is plain http where you want to pr=
otect the credential from theft. =A0=0A=0AEven replay is not the primary is=
sue here.=A0=0A=0APhil=0A=0ASent from my phone.=0A=0AOn 2013-02-15, at 8:09=
, William Mills <wmills_92105@yahoo.com> wrote:=0A=0A=0AI'll repeat the use=
 case for Flickr, which requires OAuth 1.0a type capabilites that OAuth 2 d=
oes not provide. =A0Simply stating "move to HTTPS" is not a viable response=
 here. =A0=0A>=0A>=0A>=0A>________________________________=0A> From: Torste=
n Lodderstedt <torsten@lodderstedt.net>=0A>To: William Mills <wmills_92105@=
yahoo.com> =0A>Cc: Mike Jones <Michael.Jones@microsoft.com>; Justin Richer =
<jricher@mitre.org>; Phil Hunt <phil.hunt@oracle.com>; IETF oauth WG <oauth=
@ietf.org> =0A>Sent: Friday, February 15, 2013 7:22 AM=0A>Subject: Re: [OAU=
TH-WG] Minutes from the OAuth Design Team Conference Call - 11th February 2=
013=0A> =0A>=0A>Hi Bill,=0A>=0A>=0A>I think one needs to compare the costs/=
impact of HTTPS on one side and the implementation of integrity protection =
and replay detection on the other. We had this discussion several times.=0A=
>=0A>=0A>regards,=0A>Torsten.=0A>=0A>Am 15.02.2013 um 08:08 schrieb William=
 Mills <wmills_92105@yahoo.com>:=0A>=0A>=0A>I fundamentally disagree with t=
hat too. =A0OAuth 2 is the *framework*, one which supports multiple token t=
ypes. =A0Bearer tokens were the first credential type defined.=0A>>=0A>>=0A=
>>OAuth 1.0a also requires HTTPS transport for authentication and getting t=
he token.=0A>>=0A>>=0A>>There are =A0real use cases for tokens usable over =
plain text with integrity protection.=0A>>=0A>>=0A>>-bill=0A>>=0A>>=0A>>=0A=
>>________________________________=0A>> From: Torsten Lodderstedt <torsten@=
lodderstedt.net>=0A>>To: William Mills <wmills_92105@yahoo.com> =0A>>Cc: Mi=
ke Jones <Michael.Jones@microsoft.com>; Justin Richer <jricher@mitre.org>; =
Phil Hunt <phil.hunt@oracle.com>; IETF oauth WG <oauth@ietf.org> =0A>>Sent:=
 Thursday, February 14, 2013 10:05 PM=0A>>Subject: Re: [OAUTH-WG] Minutes f=
rom the OAuth Design Team Conference Call - 11th February 2013=0A>> =0A>>=
=0A>>Hi Bill,=0A>>=0A>>=0A>>OAuth 2.0 took a different direction by relying=
 on HTTPS to provide the basic protection. So the need to have a token, whi=
ch can be used for service requests over plain HTTP is arguable. My underst=
anding of this activity was, the intend is to provide additional protection=
 on top of HTTPS.=0A>>=0A>>=0A>>regards,=0A>>Torsten.=0A>>=0A>>Am 15.02.201=
3 um 02:31 schrieb William Mills <wmills_92105@yahoo.com>:=0A>>=0A>>=0A>>I =
disagree with "That was the impediment to OAuth 1.0 adoption that OAuth 2.0=
 solved in the first place.", unless "solving" means does not address the n=
eed for it at all.=0A>>>=0A>>>=0A>>>OAuth 2 does several good things, but i=
t still lacks a defined token type that is safe to user over plain text HTT=
P. =A01.0a solved that.=0A>>>=0A>>>=0A>>>=0A>>>____________________________=
____=0A>>> From: Mike Jones <Michael.Jones@microsoft.com>=0A>>>To: Justin R=
icher <jricher@mitre.org>; Phil Hunt <phil.hunt@oracle.com> =0A>>>Cc: IETF =
oauth WG <oauth@ietf.org> =0A>>>Sent: Thursday, February 14, 2013 1:44 PM=
=0A>>>Subject: Re: [OAUTH-WG] Minutes from the OAuth Design Team Conference=
 Call - 11th February 2013=0A>>> =0A>>>I'm in favor of reusing the JWT work=
 that this WG is also doing. :-)=0A>>>=0A>>>I'm pretty skeptical of us inve=
nting another custom scheme for signing HTTP headers.=A0 That was the imped=
iment to OAuth 1.0 adoption that OAuth 2.0 solved in the first place.=0A>>>=
=0A>>>=A0=A0=A0 =A0=A0=A0 =A0=A0=A0 =A0=A0=A0 -- Mike=0A>>>=0A>>>-----Origi=
nal Message-----=0A>>>From: oauth-bounces@ietf.org [mailto:oauth-bounces@ie=
tf.org] On Behalf Of Justin Richer=0A>>>Sent: Tuesday, February 12, 2013 9:=
35 AM=0A>>>To: Phil Hunt=0A>>>Cc: IETF oauth WG=0A>>>Subject: Re: [OAUTH-WG=
] Minutes from the OAuth Design Team Conference Call - 11th February 2013=
=0A>>>=0A>>>That's my reading of it as well, Phil, thanks for providing the=
 clarification.=0A One motivator behind using a JSON-based token is to be a=
ble to=0A re-use some of the great work that the JOSE group is doing but ap=
ply it to an HTTP payload.=0A>>>=0A>>>What neither of us want is a token ty=
pe that requires stuffing all query, header, and other parameters *into* th=
e JSON object itself, which would be a more SOAPy approach.=0A>>>=0A>>>=A0 =
-- Justin=0A>>>=0A>>>On 02/12/2013 12:30 PM, Phil Hunt wrote:=0A>>>> Clarif=
ication.=A0 I think Justin and I were in agreement that we don't want to se=
e a format that requires JSON payloads.=A0 We are both interested in a JSON=
 token used in the authorization header that could be based on a computed s=
ignature of some combination of http headers and body if possible.=0A>>>>=
=0A>>>> Phil=0A>>>>=0A>>>> @independentid=0A>>>> www.independentid.com=0A>>=
>> phil.hunt@oracle.com=0A>>>>=0A>>>>=0A>>>>=0A>>>>=0A>>>>=0A>>>> On=0A 201=
3-02-12, at 1:10 AM, Hannes Tschofenig wrote:=0A>>>>=0A>>>>> Here are my no=
tes.=0A>>>>>=0A>>>>> Participants:=0A>>>>>=0A>>>>> * John Bradley=0A>>>>> *=
 Derek Atkins=0A>>>>> * Phil Hunt=0A>>>>> * Prateek Mishra=0A>>>>> * Hannes=
 Tschofenig=0A>>>>> * Mike Jones=0A>>>>> * Antonio Sanso=0A>>>>> * Justin R=
icher=0A>>>>>=0A>>>>> Notes:=0A>>>>>=0A>>>>> My slides are available here: =
=0A>>>>> http://www.tschofenig.priv.at/OAuth2-Security-11Feb2013.ppt=0A>>>>=
>=0A>>>>> Slide #2 summarizes earlier discussions during the conference cal=
ls.=0A>>>>>=0A>>>>> -- HTTP vs. JSON=0A>>>>>=0A>>>>> Phil noted that he doe=
s not like to use the MAC Token draft as a starting point because it does n=
ot re-use any of the work done in the JOSE working group and in particular =
all the libraries that are available today. He mentioned that earlier attem=
pts to write the MAC Token code lead to=0A problems for implementers.=0A>>>=
>>=0A>>>>> Justin responded that he does not agree with using JSON as a tra=
nsport mechanism since this would replicate a SOAP style.=0A>>>>>=0A>>>>> P=
hil noted that he wants to send JSON but the signature shall be computed ov=
er the HTTP header field.=0A>>>>>=0A>>>>> -- Flexibility for the keyed mess=
age digest computation=0A>>>>>=0A>>>>>=A0 From earlier discussion it was cl=
ear that the conference call participants wanted more flexibility regarding=
 the keyed message digest computation. For this purpose Hannes presented th=
e DKIM based approach, which allows selective header fields to be included =
in the digest. This is shown in slide #4.=0A>>>>>=0A>>>>> After some discus=
sion the conference call participants thought that this would meet their ne=
eds. Further investigations would still be useful to determine the degree o=
f failed HMAC calculations due to HTTP proxies modifying the=0A content.=0A=
>>>>>=0A>>>>> -- Key Distribution=0A>>>>>=0A>>>>> Hannes presented the open=
 issue regarding the choice of key =0A>>>>> distribution. Slides #6-#8 pres=
ent three techniques and Hannes asked =0A>>>>> for feedback regarding the p=
referred style. Justin and others didn't =0A>>>>> see the need to decide on=
 one mechanism - they wanted to keep the =0A>>>>> choice open. Derek indica=
ted that this will not be an acceptable =0A>>>>> approach. Since the resour=
ce server and the authorization server may, =0A>>>>> in the OAuth 2.0 frame=
work, be entities produced by different vendors =0A>>>>> there is an intero=
perability need. Justin responded that he disagrees =0A>>>>> and that the r=
esource server needs to understand the access token and =0A>>>>> referred t=
o the recent draft submission for the token introspection =0A>>>>> endpoint=
. Derek indicated that the resource server has to understand =0A>>>>>=0A th=
e content of the access token and the token introspection endpoint =0A>>>>>=
 just pushes the problem around: the resource server has to send the =0A>>>=
>> access token to the authorization server and then the resource server =
=0A>>>>> gets the result back (which he the=0A>>>n=0A>>>>=A0 =A0 a=0A>>>>> =
gain needs to understand) in order to make a meaningful authorization decis=
ion.=0A>>>>>=0A>>>>> Everyone agreed that the client must receive the sessi=
on key from the authorization server and that this approach has to be stand=
ardized. It was also agreed that this is a common approach among all three =
key distribution mechanisms.=0A>>>>>=0A>>>>> Hannes asked the participants =
to think about their preference.=0A>>>>>=0A>>>>> The questions regarding ke=
y naming and the indication for the intended resource server the client wan=
ts to talk to have been postponed.=0A>>>>>=0A>>>>> Ciao=0A>>>>>=0A Hannes=
=0A>>>>>=0A>>>>>=0A>>>>> _______________________________________________=0A=
>>>>> OAuth mailing list=0A>>>>> OAuth@ietf.org=0A>>>>> https://www.ietf.or=
g/mailman/listinfo/oauth=0A>>>> ___________________________________________=
____=0A>>>> OAuth mailing list=0A>>>> OAuth@ietf.org=0A>>>> https://www.iet=
f.org/mailman/listinfo/oauth=0A>>>=0A>>>=0A>>>_____________________________=
__________________=0A>>>OAuth mailing list=0A>>>OAuth@ietf.org=0A>>>https:/=
/www.ietf.org/mailman/listinfo/oauth=0A>>>_________________________________=
______________=0A>>>OAuth mailing list=0A>>>OAuth@ietf.org=0A>>>https://www=
.ietf.org/mailman/listinfo/oauth=0A>>>=0A>>>=0A>>>=0A>>____________________=
___________________________=0A>>>OAuth mailing list=0A>>>OAuth@ietf.org=0A>=
>>https://www.ietf.org/mailman/listinfo/oauth=0A>>>=0A>>=0A>>=0A>=0A>
--764183289-1875840522-1360945315=:70386
Content-Type: text/html; charset=iso-8859-1
Content-Transfer-Encoding: quoted-printable

<html><body><div style=3D"color:#000; background-color:#fff; font-family:Co=
urier New, courier, monaco, monospace, sans-serif;font-size:12pt"><div><spa=
n>Exactly. &nbsp;And in the Flickr case replay of the same event is not a p=
roblem. &nbsp;Thanks for keeping me honest, work just cranked the dial up t=
o 11.5 so I'm a bit distracted.</span></div><div><br></div>  <div style=3D"=
font-family: 'Courier New', courier, monaco, monospace, sans-serif; font-si=
ze: 12pt;"> <div style=3D"font-family: 'times new roman', 'new york', times=
, serif; font-size: 12pt;"> <div dir=3D"ltr"> <font size=3D"2" face=3D"Aria=
l"> <hr size=3D"1">  <b><span style=3D"font-weight:bold;">From:</span></b> =
Phil Hunt &lt;phil.hunt@oracle.com&gt;<br> <b><span style=3D"font-weight: b=
old;">To:</span></b> William Mills &lt;wmills_92105@yahoo.com&gt; <br><b><s=
pan style=3D"font-weight: bold;">Cc:</span></b> Torsten Lodderstedt &lt;tor=
sten@lodderstedt.net&gt;; Mike Jones &lt;Michael.Jones@microsoft.com&gt;; J=
ustin Richer
 &lt;jricher@mitre.org&gt;; IETF oauth WG &lt;oauth@ietf.org&gt; <br> <b><s=
pan style=3D"font-weight: bold;">Sent:</span></b> Friday, February 15, 2013=
 8:19 AM<br> <b><span style=3D"font-weight: bold;">Subject:</span></b> Re: =
[OAUTH-WG] Minutes from the OAuth Design Team Conference Call - 11th Februa=
ry 2013<br> </font> </div> <br>=0A<div id=3D"yiv1113840034"><div><div>Bill<=
/div><div><br></div><div>You aren't objecting to https in the as communicat=
ions correct? &nbsp;It is the rs comms which is plain http where you want t=
o protect the credential from theft. &nbsp;</div><div><br></div><div>Even r=
eplay is not the primary issue here.&nbsp;<br><br>Phil<div><br></div><div>S=
ent from my phone.</div></div><div><br>On 2013-02-15, at 8:09, William Mill=
s &lt;<a rel=3D"nofollow" ymailto=3D"mailto:wmills_92105@yahoo.com" target=
=3D"_blank" href=3D"mailto:wmills_92105@yahoo.com">wmills_92105@yahoo.com</=
a>&gt; wrote:<br><br></div><blockquote type=3D"cite"><div><div style=3D"col=
or: rgb(0, 0, 0); background-color: rgb(255, 255, 255); font-family: 'Couri=
er New', courier, monaco, monospace, sans-serif; font-size: 12pt;"><div><sp=
an>I'll repeat the use case for Flickr, which requires OAuth 1.0a type capa=
bilites that OAuth 2 does not provide. &nbsp;Simply stating "move to HTTPS"=
 is not a viable response here.
 &nbsp;</span></div><div><br></div>  <div style=3D"font-family: 'Courier Ne=
w', courier, monaco, monospace, sans-serif; font-size: 12pt;"> <div style=
=3D"font-family: 'times new roman', 'new york', times, serif; font-size: 12=
pt;"> <div dir=3D"ltr"> <font size=3D"2" face=3D"Arial"> <hr size=3D"1">  <=
b><span style=3D"font-weight:bold;">From:</span></b> Torsten Lodderstedt &l=
t;<a rel=3D"nofollow" ymailto=3D"mailto:torsten@lodderstedt.net" target=3D"=
_blank" href=3D"mailto:torsten@lodderstedt.net">torsten@lodderstedt.net</a>=
&gt;<br> <b><span style=3D"font-weight:bold;">To:</span></b> William Mills =
&lt;<a rel=3D"nofollow" ymailto=3D"mailto:wmills_92105@yahoo.com" target=3D=
"_blank" href=3D"mailto:wmills_92105@yahoo.com">wmills_92105@yahoo.com</a>&=
gt; <br><b><span style=3D"font-weight:bold;">Cc:</span></b> Mike Jones &lt;=
<a rel=3D"nofollow" ymailto=3D"mailto:Michael.Jones@microsoft.com" target=
=3D"_blank" href=3D"mailto:Michael.Jones@microsoft.com">Michael.Jones@micro=
soft.com</a>&gt;; Justin Richer &lt;<a
 rel=3D"nofollow" ymailto=3D"mailto:jricher@mitre.org" target=3D"_blank" hr=
ef=3D"mailto:jricher@mitre.org">jricher@mitre.org</a>&gt;; Phil=0A Hunt &lt=
;<a rel=3D"nofollow" ymailto=3D"mailto:phil.hunt@oracle.com" target=3D"_bla=
nk" href=3D"mailto:phil.hunt@oracle.com">phil.hunt@oracle.com</a>&gt;; IETF=
 oauth WG &lt;<a rel=3D"nofollow" ymailto=3D"mailto:oauth@ietf.org" target=
=3D"_blank" href=3D"mailto:oauth@ietf.org">oauth@ietf.org</a>&gt; <br> <b><=
span style=3D"font-weight:bold;">Sent:</span></b> Friday, February 15, 2013=
 7:22 AM<br> <b><span style=3D"font-weight:bold;">Subject:</span></b> Re: [=
OAUTH-WG] Minutes from the OAuth Design Team Conference Call - 11th Februar=
y 2013<br> </font> </div> <br>=0A<div id=3D"yiv1113840034"><div><div>Hi Bil=
l,</div><div><br></div><div>I think one needs to compare the costs/impact o=
f HTTPS on one side and the implementation of integrity protection and repl=
ay detection on the other. We had this discussion several times.</div><div>=
<br></div><div>regards,</div><div>Torsten.</div><div><br>Am 15.02.2013 um 0=
8:08 schrieb William Mills &lt;<a rel=3D"nofollow" ymailto=3D"mailto:wmills=
_92105@yahoo.com" target=3D"_blank" href=3D"mailto:wmills_92105@yahoo.com">=
wmills_92105@yahoo.com</a>&gt;:<br><br></div><blockquote type=3D"cite"><div=
><div style=3D"color: rgb(0, 0, 0); background-color: rgb(255, 255, 255); f=
ont-family: 'Courier New', courier, monaco, monospace, sans-serif; font-siz=
e: 12pt;"><div><span>I fundamentally disagree with that too. &nbsp;OAuth 2 =
is the *framework*, one which supports multiple token types. &nbsp;Bearer t=
okens were the first credential type defined.</span></div><div style=3D"col=
or: rgb(0, 0, 0); font-size: 16px;
 font-family: 'Courier New', courier, monaco, monospace, sans-serif; backgr=
ound-color: transparent; font-style: normal;"><span><br></span></div><div s=
tyle=3D"color: rgb(0, 0, 0); font-size: 16px; font-family: 'Courier New', c=
ourier, monaco, monospace, sans-serif; background-color: transparent; font-=
style: normal;"><span>OAuth 1.0a also requires HTTPS transport for authenti=
cation and getting the token.</span></div><div style=3D"color: rgb(0, 0, 0)=
; font-size: 16px; font-family: 'Courier New', courier, monaco, monospace, =
sans-serif; background-color: transparent; font-style: normal;"><span><br><=
/span></div><div style=3D"color: rgb(0, 0, 0); font-size: 16px; font-family=
: 'Courier New', courier, monaco, monospace, sans-serif; background-color: =
transparent; font-style: normal;"><span>There are &nbsp;real use cases for =
tokens usable over plain text with integrity protection.</span></div><div s=
tyle=3D"color: rgb(0, 0, 0); font-size: 16px; font-family: 'Courier New',
 courier, monaco, monospace, sans-serif; background-color: transparent; fon=
t-style: normal;"><span><br></span></div><div style=3D"color: rgb(0, 0, 0);=
 font-size: 16px; font-family: 'Courier New', courier, monaco, monospace, s=
ans-serif; background-color: transparent; font-style: normal;"><span>-bill<=
/span></div><div><br></div>  <div style=3D"font-family: 'Courier New', cour=
ier, monaco, monospace, sans-serif; font-size: 12pt;"> <div style=3D"font-f=
amily: 'times new roman', 'new york', times, serif; font-size: 12pt;"> <div=
 dir=3D"ltr"> <font size=3D"2" face=3D"Arial"> <hr size=3D"1"> =0A <b><span=
 style=3D"font-weight:bold;">From:</span></b> Torsten Lodderstedt &lt;<a re=
l=3D"nofollow" ymailto=3D"mailto:torsten@lodderstedt.net" target=3D"_blank"=
 href=3D"mailto:torsten@lodderstedt.net">torsten@lodderstedt.net</a>&gt;<br=
> <b><span style=3D"font-weight:bold;">To:</span></b> William Mills &lt;<a =
rel=3D"nofollow" ymailto=3D"mailto:wmills_92105@yahoo.com" target=3D"_blank=
" href=3D"mailto:wmills_92105@yahoo.com">wmills_92105@yahoo.com</a>&gt; <br=
><b><span style=3D"font-weight:bold;">Cc:</span></b> Mike Jones &lt;<a rel=
=3D"nofollow" ymailto=3D"mailto:Michael.Jones@microsoft.com" target=3D"_bla=
nk" href=3D"mailto:Michael.Jones@microsoft.com">Michael.Jones@microsoft.com=
</a>&gt;; Justin Richer &lt;<a rel=3D"nofollow" ymailto=3D"mailto:jricher@m=
itre.org" target=3D"_blank" href=3D"mailto:jricher@mitre.org">jricher@mitre=
.org</a>&gt;; Phil Hunt &lt;<a rel=3D"nofollow" ymailto=3D"mailto:phil.hunt=
@oracle.com" target=3D"_blank" href=3D"mailto:phil.hunt@oracle.com">phil.hu=
nt@oracle.com</a>&gt;; IETF=0A oauth WG &lt;<a rel=3D"nofollow" ymailto=3D"=
mailto:oauth@ietf.org" target=3D"_blank" href=3D"mailto:oauth@ietf.org">oau=
th@ietf.org</a>&gt; <br> <b><span style=3D"font-weight:bold;">Sent:</span><=
/b> Thursday, February 14, 2013 10:05 PM<br> <b><span style=3D"font-weight:=
bold;">Subject:</span></b> Re: [OAUTH-WG] Minutes from the OAuth Design Tea=
m Conference Call - 11th February 2013<br> </font> </div> <br>=0A<div id=3D=
"yiv1113840034"><div><div>Hi Bill,</div><div><br></div><div>OAuth 2.0 took =
a different direction by relying on HTTPS to provide the basic protection. =
So the need to have a token, which can be used for service requests over pl=
ain HTTP is arguable. My understanding of this activity was, the intend is =
to provide additional protection on top of HTTPS.</div><div><br></div><div>=
regards,</div><div>Torsten.</div><div><br>Am 15.02.2013 um 02:31 schrieb Wi=
lliam Mills &lt;<a rel=3D"nofollow" ymailto=3D"mailto:wmills_92105@yahoo.co=
m" target=3D"_blank" href=3D"mailto:wmills_92105@yahoo.com">wmills_92105@ya=
hoo.com</a>&gt;:<br><br></div><blockquote type=3D"cite"><div><div style=3D"=
color: rgb(0, 0, 0); background-color: rgb(255, 255, 255); font-family: 'Co=
urier New', courier, monaco, monospace, sans-serif; font-size: 12pt;"><div>=
<span>I disagree with "</span><span style=3D"font-family: 'times new roman'=
, 'new york', times, serif; font-size: 12pt;">That was the impediment to=0A=
 OAuth 1.0 adoption that OAuth 2.0 solved in the first place.", unless "sol=
ving" means does not address the need for it at all.</span></div><div style=
=3D"color: rgb(0, 0, 0); font-size: 12pt; font-family: 'times new roman', '=
new york', times, serif; background-color: transparent; font-style: normal;=
"><span style=3D"font-family: 'times new roman', 'new york', times, serif; =
font-size: 12pt;"><br></span></div><div style=3D"color: rgb(0, 0, 0); font-=
size: 16px; font-family: 'times new roman', 'new york', times, serif; backg=
round-color: transparent; font-style: normal;"><span style=3D"font-family: =
'times new roman', 'new york', times, serif; font-size: 12pt;">OAuth 2 does=
 several=0A good things, but it still lacks a defined token type that is sa=
fe to user over plain text HTTP. &nbsp;1.0a solved that.</span></div><div><=
br></div>  <div style=3D"font-family: 'Courier New', courier, monaco, monos=
pace, sans-serif; font-size: 12pt;"> <div style=3D"font-family: 'times new =
roman', 'new york', times, serif; font-size: 12pt;"> <div dir=3D"ltr"> <fon=
t size=3D"2" face=3D"Arial"> <hr size=3D"1">  <b><span style=3D"font-weight=
:bold;">From:</span></b> Mike Jones &lt;<a rel=3D"nofollow" ymailto=3D"mail=
to:Michael.Jones@microsoft.com" target=3D"_blank" href=3D"mailto:Michael.Jo=
nes@microsoft.com">Michael.Jones@microsoft.com</a>&gt;<br> <b><span style=
=3D"font-weight:bold;">To:</span></b> Justin Richer &lt;<a rel=3D"nofollow"=
 ymailto=3D"mailto:jricher@mitre.org" target=3D"_blank" href=3D"mailto:jric=
her@mitre.org">jricher@mitre.org</a>&gt;; Phil Hunt &lt;<a rel=3D"nofollow"=
 ymailto=3D"mailto:phil.hunt@oracle.com" target=3D"_blank"
 href=3D"mailto:phil.hunt@oracle.com">phil.hunt@oracle.com</a>&gt; <br><b><=
span style=3D"font-weight:bold;">Cc:</span></b> IETF oauth WG &lt;<a rel=3D=
"nofollow" ymailto=3D"mailto:oauth@ietf.org" target=3D"_blank" href=3D"mail=
to:oauth@ietf.org">oauth@ietf.org</a>&gt; <br> <b><span style=3D"font-weigh=
t:bold;">Sent:</span></b> Thursday, February 14, 2013 1:44 PM<br> <b><span =
style=3D"font-weight:bold;">Subject:</span></b> Re: [OAUTH-WG] Minutes from=
 the OAuth Design Team Conference Call - 11th February 2013<br>=0A </font> =
</div> <br>=0AI'm in favor of reusing the JWT work that this WG is also doi=
ng. :-)<br><br>I'm pretty skeptical of us inventing another custom scheme f=
or signing HTTP headers.&nbsp; That was the impediment to OAuth 1.0 adoptio=
n that OAuth 2.0 solved in the first place.<br><br>&nbsp;&nbsp;&nbsp; &nbsp=
;&nbsp;&nbsp; &nbsp;&nbsp;&nbsp; &nbsp;&nbsp;&nbsp; -- Mike<br><br>-----Ori=
ginal Message-----<br>From: <a rel=3D"nofollow" ymailto=3D"mailto:oauth-bou=
nces@ietf.org" target=3D"_blank" href=3D"mailto:oauth-bounces@ietf.org">oau=
th-bounces@ietf.org</a> [mailto:<a rel=3D"nofollow" ymailto=3D"mailto:oauth=
-bounces@ietf.org" target=3D"_blank" href=3D"mailto:oauth-bounces@ietf.org"=
>oauth-bounces@ietf.org</a>] On Behalf Of Justin Richer<br>Sent: Tuesday, F=
ebruary 12, 2013 9:35 AM<br>To: Phil Hunt<br>Cc: IETF oauth WG<br>Subject: =
Re: [OAUTH-WG] Minutes from the OAuth Design Team Conference Call - 11th Fe=
bruary 2013<br><br>That's my reading of it as well, Phil, thanks for provid=
ing the clarification.=0A One motivator behind using a JSON-based token is =
to be able to=0A re-use some of the great work that the JOSE group is doing=
 but apply it to an HTTP payload.<br><br>What neither of us want is a token=
 type that requires stuffing all query, header, and other parameters *into*=
 the JSON object itself, which would be a more SOAPy approach.<br><br>&nbsp=
; -- Justin<br><br>On 02/12/2013 12:30 PM, Phil Hunt wrote:<br>&gt; Clarifi=
cation.&nbsp; I think Justin and I were in agreement that we don't want to =
see a format that requires JSON payloads.&nbsp; We are both interested in a=
 JSON token used in the authorization header that could be based on a compu=
ted signature of some combination of http headers and body if possible.<br>=
&gt;<br>&gt; Phil<br>&gt;<br>&gt; @independentid<br>&gt; <a rel=3D"nofollow=
" target=3D"_blank" href=3D"http://www.independentid.com/">www.independenti=
d.com</a><br>&gt; <a rel=3D"nofollow" ymailto=3D"mailto:phil.hunt@oracle.co=
m" target=3D"_blank"
 href=3D"mailto:phil.hunt@oracle.com">phil.hunt@oracle.com</a><br>&gt;<br>&=
gt;<br>&gt;<br>&gt;<br>&gt;<br>&gt; On=0A 2013-02-12, at 1:10 AM, Hannes Ts=
chofenig wrote:<br>&gt;<br>&gt;&gt; Here are my notes.<br>&gt;&gt;<br>&gt;&=
gt; Participants:<br>&gt;&gt;<br>&gt;&gt; * John Bradley<br>&gt;&gt; * Dere=
k Atkins<br>&gt;&gt; * Phil Hunt<br>&gt;&gt; * Prateek Mishra<br>&gt;&gt; *=
 Hannes Tschofenig<br>&gt;&gt; * Mike Jones<br>&gt;&gt; * Antonio Sanso<br>=
&gt;&gt; * Justin Richer<br>&gt;&gt;<br>&gt;&gt; Notes:<br>&gt;&gt;<br>&gt;=
&gt; My slides are available here: <br>&gt;&gt; <a rel=3D"nofollow" target=
=3D"_blank" href=3D"http://www.tschofenig.priv.at/OAuth2-Security-11Feb2013=
.ppt">http://www.tschofenig.priv.at/OAuth2-Security-11Feb2013.ppt</a><br>&g=
t;&gt;<br>&gt;&gt; Slide #2 summarizes earlier discussions during the confe=
rence calls.<br>&gt;&gt;<br>&gt;&gt; -- HTTP vs. JSON<br>&gt;&gt;<br>&gt;&g=
t; Phil noted that he does not like to use the MAC Token draft as a startin=
g point because it does not re-use any of the work done in the JOSE working=
 group and in particular all the
 libraries that are available today. He mentioned that earlier attempts to =
write the MAC Token code lead to=0A problems for implementers.<br>&gt;&gt;<=
br>&gt;&gt; Justin responded that he does not agree with using JSON as a tr=
ansport mechanism since this would replicate a SOAP style.<br>&gt;&gt;<br>&=
gt;&gt; Phil noted that he wants to send JSON but the signature shall be co=
mputed over the HTTP header field.<br>&gt;&gt;<br>&gt;&gt; -- Flexibility f=
or the keyed message digest computation<br>&gt;&gt;<br>&gt;&gt;&nbsp; From =
earlier discussion it was clear that the conference call participants wante=
d more flexibility regarding the keyed message digest computation. For this=
 purpose Hannes presented the DKIM based approach, which allows selective h=
eader fields to be included in the digest. This is shown in slide #4.<br>&g=
t;&gt;<br>&gt;&gt; After some discussion the conference call participants t=
hought that this would meet their needs. Further investigations would still=
 be useful to determine the degree of failed HMAC calculations due to HTTP =
proxies modifying the=0A content.<br>&gt;&gt;<br>&gt;&gt; -- Key Distributi=
on<br>&gt;&gt;<br>&gt;&gt; Hannes presented the open issue regarding the ch=
oice of key <br>&gt;&gt; distribution. Slides #6-#8 present three technique=
s and Hannes asked <br>&gt;&gt; for feedback regarding the preferred style.=
 Justin and others didn't <br>&gt;&gt; see the need to decide on one mechan=
ism - they wanted to keep the <br>&gt;&gt; choice open. Derek indicated tha=
t this will not be an acceptable <br>&gt;&gt; approach. Since the resource =
server and the authorization server may, <br>&gt;&gt; in the OAuth 2.0 fram=
ework, be entities produced by different vendors <br>&gt;&gt; there is an i=
nteroperability need. Justin responded that he disagrees <br>&gt;&gt; and t=
hat the resource server needs to understand the access token and <br>&gt;&g=
t; referred to the recent draft submission for the token introspection <br>=
&gt;&gt; endpoint. Derek indicated that the resource server has to understa=
nd <br>&gt;&gt;=0A the content of the access token and the token introspect=
ion endpoint <br>&gt;&gt; just pushes the problem around: the resource serv=
er has to send the <br>&gt;&gt; access token to the authorization server an=
d then the resource server <br>&gt;&gt; gets the result back (which he the<=
br> n<br>&gt;&nbsp; &nbsp; a<br>&gt;&gt; gain needs to understand) in order=
 to make a meaningful authorization decision.<br>&gt;&gt;<br>&gt;&gt; Every=
one agreed that the client must receive the session key from the authorizat=
ion server and that this approach has to be standardized. It was also agree=
d that this is a common approach among all three key distribution mechanism=
s.<br>&gt;&gt;<br>&gt;&gt; Hannes asked the participants to think about the=
ir preference.<br>&gt;&gt;<br>&gt;&gt; The questions regarding key naming a=
nd the indication for the intended resource server the client wants to talk=
 to have been postponed.<br>&gt;&gt;<br>&gt;&gt; Ciao<br>&gt;&gt;=0A Hannes=
<br>&gt;&gt;<br>&gt;&gt;<br>&gt;&gt; ______________________________________=
_________<br>&gt;&gt; OAuth mailing list<br>&gt;&gt; <a rel=3D"nofollow" ym=
ailto=3D"mailto:OAuth@ietf.org" target=3D"_blank" href=3D"mailto:OAuth@ietf=
.org">OAuth@ietf.org</a><br>&gt;&gt; <a rel=3D"nofollow" target=3D"_blank" =
href=3D"https://www.ietf.org/mailman/listinfo/oauth">https://www.ietf.org/m=
ailman/listinfo/oauth</a><br>&gt; _________________________________________=
______<br>&gt; OAuth mailing list<br>&gt; <a rel=3D"nofollow" ymailto=3D"ma=
ilto:OAuth@ietf.org" target=3D"_blank" href=3D"mailto:OAuth@ietf.org">OAuth=
@ietf.org</a><br>&gt; <a rel=3D"nofollow" target=3D"_blank" href=3D"https:/=
/www.ietf.org/mailman/listinfo/oauth">https://www.ietf.org/mailman/listinfo=
/oauth</a><br><br><br>_______________________________________________<br>OA=
uth mailing list<br><a rel=3D"nofollow" ymailto=3D"mailto:OAuth@ietf.org" t=
arget=3D"_blank" href=3D"mailto:OAuth@ietf.org">OAuth@ietf.org</a><br><a re=
l=3D"nofollow"
 target=3D"_blank" href=3D"https://www.ietf.org/mailman/listinfo/oauth">htt=
ps://www.ietf.org/mailman/listinfo/oauth</a><br>___________________________=
____________________<br>OAuth mailing list<br><a rel=3D"nofollow" ymailto=
=3D"mailto:OAuth@ietf.org" target=3D"_blank" href=3D"mailto:OAuth@ietf.org"=
>OAuth@ietf.org</a><br><a rel=3D"nofollow" target=3D"_blank" href=3D"https:=
//www.ietf.org/mailman/listinfo/oauth">https://www.ietf.org/mailman/listinf=
o/oauth</a><br><br><br> </div> </div>  </div></div></blockquote><blockquote=
 type=3D"cite"><div><span>_______________________________________________</=
span><br><span>OAuth mailing list</span><br><span><a rel=3D"nofollow" ymail=
to=3D"mailto:OAuth@ietf.org" target=3D"_blank" href=3D"mailto:OAuth@ietf.or=
g">OAuth@ietf.org</a></span><br><span><a rel=3D"nofollow" target=3D"_blank"=
 href=3D"https://www.ietf.org/mailman/listinfo/oauth">https://www.ietf.org/=
mailman/listinfo/oauth</a></span><br></div></blockquote></div></div><br><br=
> </div> </div> =0A </div></div></blockquote></div></div><br><br> </div> </=
div>  </div></div></blockquote></div></div><br><br> </div> </div>  </div></=
body></html>
--764183289-1875840522-1360945315=:70386--

From sberyozkin@gmail.com  Fri Feb 15 08:25:40 2013
Return-Path: <sberyozkin@gmail.com>
X-Original-To: oauth@ietfa.amsl.com
Delivered-To: oauth@ietfa.amsl.com
Received: from localhost (localhost [127.0.0.1]) by ietfa.amsl.com (Postfix) with ESMTP id 3BF8C21F888F for <oauth@ietfa.amsl.com>; Fri, 15 Feb 2013 08:25:40 -0800 (PST)
X-Virus-Scanned: amavisd-new at amsl.com
X-Spam-Flag: NO
X-Spam-Score: -2.324
X-Spam-Level: 
X-Spam-Status: No, score=-2.324 tagged_above=-999 required=5 tests=[AWL=-1.276, BAYES_00=-2.599, FH_RELAY_NODNS=1.451, RDNS_NONE=0.1]
Received: from mail.ietf.org ([64.170.98.30]) by localhost (ietfa.amsl.com [127.0.0.1]) (amavisd-new, port 10024) with ESMTP id Cx3-bfj5bMG4 for <oauth@ietfa.amsl.com>; Fri, 15 Feb 2013 08:25:39 -0800 (PST)
Received: from mail-we0-x233.google.com (mail-we0-x233.google.com [IPv6:2a00:1450:400c:c03::233]) by ietfa.amsl.com (Postfix) with ESMTP id 090AC21F8887 for <oauth@ietf.org>; Fri, 15 Feb 2013 08:25:34 -0800 (PST)
Received: by mail-we0-f179.google.com with SMTP id p43so1271676wea.10 for <oauth@ietf.org>; Fri, 15 Feb 2013 08:25:34 -0800 (PST)
DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=gmail.com; s=20120113; h=x-received:message-id:date:from:user-agent:mime-version:to:subject :references:in-reply-to:content-type:content-transfer-encoding; bh=V1CSdCJNps3ynHx0DJ7941DfASEMO3RGnaXLKkOMc4Q=; b=jaXB3ulGX7dK+ZP15A/MVVNxXHN8O6xNG39HfO1s0BBgCelV+P5qreZRh1enZo3OJY CDCi9HXLdmY7zj8T1ZOgLHF6kXkKF2NtTPWMGLI0KiuWz5SoC1zysoM5shI+UhM/qojE CdxexaJka3VWw0mbSi7fxon6Vc/ZZP8fpNVAOTL0lnMPQUK8+Sq/+J2Jc2SBT3CPiLlA EWh5H+xGaZ9yCSgtQwa8TRcb/rtuo5d2L8X8gQRkVQwY1q4PnFXFw+o5LtGB5+qtrDo1 04TNgzwzuvuJLBpR7GRN4wzjH7IwDBbJO6j9EZYz4SdtQFfqa8bNYG1ZlLx2twdSiiAN P3Zg==
X-Received: by 10.180.94.69 with SMTP id da5mr7026254wib.30.1360945533910; Fri, 15 Feb 2013 08:25:33 -0800 (PST)
Received: from [10.36.226.5] ([217.173.99.61]) by mx.google.com with ESMTPS id bg5sm6253685wib.8.2013.02.15.08.25.32 (version=TLSv1 cipher=ECDHE-RSA-RC4-SHA bits=128/128); Fri, 15 Feb 2013 08:25:33 -0800 (PST)
Message-ID: <511E617A.4000302@gmail.com>
Date: Fri, 15 Feb 2013 16:25:30 +0000
From: Sergey Beryozkin <sberyozkin@gmail.com>
User-Agent: Mozilla/5.0 (X11; Linux x86_64; rv:12.0) Gecko/20120430 Thunderbird/12.0.1
MIME-Version: 1.0
To: oauth@ietf.org
References: <0573984A-8C11-4960-9BC6-F44D4B664C19@gmx.net> <E808B6AC-D5F6-479F-967D-EA6B2586BE64@oracle.com> <511A7D27.8010209@mitre.org> <4E1F6AAD24975D4BA5B16804296739436744BD23@TK5EX14MBXC285.redmond.corp.microsoft.com> <1360891897.14004.YahooMailNeo@web31811.mail.mud.yahoo.com> <E7EBF78C-37EB-4737-8DD5-0F24C9FACA60@lodderstedt.net> <1360912115.36543.YahooMailNeo@web31811.mail.mud.yahoo.com> <2A0F585F-2CEF-418D-9654-5084E6C9BD0D@lodderstedt.net> <1360944589.51724.YahooMailNeo@web31808.mail.mud.yahoo.com>
In-Reply-To: <1360944589.51724.YahooMailNeo@web31808.mail.mud.yahoo.com>
Content-Type: text/plain; charset=ISO-8859-1; format=flowed
Content-Transfer-Encoding: 7bit
Subject: Re: [OAUTH-WG] Minutes from the OAuth Design Team Conference Call - 11th February 2013
X-BeenThere: oauth@ietf.org
X-Mailman-Version: 2.1.12
Precedence: list
List-Id: OAUTH WG <oauth.ietf.org>
List-Unsubscribe: <https://www.ietf.org/mailman/options/oauth>, <mailto:oauth-request@ietf.org?subject=unsubscribe>
List-Archive: <http://www.ietf.org/mail-archive/web/oauth>
List-Post: <mailto:oauth@ietf.org>
List-Help: <mailto:oauth-request@ietf.org?subject=help>
List-Subscribe: <https://www.ietf.org/mailman/listinfo/oauth>, <mailto:oauth-request@ietf.org?subject=subscribe>
X-List-Received-Date: Fri, 15 Feb 2013 16:25:40 -0000

I wonder why it is proving so difficult to get a nearly completed MAC 
draft completed ?
Is it because:
1. JWT was first in OAuth2 and thus it wins ?
2. MAC is not 'capable' enough as JWT is ?
3. Not enough motivation for some vendors to push MAC ?

Example, in cases where not a product but a development framework is 
shipped (as with us for example), IMHO is it a big motivation to get MAC 
done for the reasons repeated many times. Or in case of migrating Flickr 
users to OAuth2.
I think I can see why no interest is there where nothing is really 
achieved if JWT is used from the get go, no particular need to get OAuth 
1.0 developers out there migrating to the particular products.

This is 3. Re 2, I think there was enough expressed to suggest that it 
can complement JWT nicely. So far I'm inclined to think it is 3. and 2. 
which stop it from being completed, with 3. 'contributing' indirectly 
but significantly,

Just my 2c
Thanks, Sergey


On 15/02/13 16:09, William Mills wrote:
> I'll repeat the use case for Flickr, which requires OAuth 1.0a type
> capabilites that OAuth 2 does not provide. Simply stating "move to
> HTTPS" is not a viable response here.
>
> ------------------------------------------------------------------------
> *From:* Torsten Lodderstedt <torsten@lodderstedt.net>
> *To:* William Mills <wmills_92105@yahoo.com>
> *Cc:* Mike Jones <Michael.Jones@microsoft.com>; Justin Richer
> <jricher@mitre.org>; Phil Hunt <phil.hunt@oracle.com>; IETF oauth WG
> <oauth@ietf.org>
> *Sent:* Friday, February 15, 2013 7:22 AM
> *Subject:* Re: [OAUTH-WG] Minutes from the OAuth Design Team Conference
> Call - 11th February 2013
>
> Hi Bill,
>
> I think one needs to compare the costs/impact of HTTPS on one side and
> the implementation of integrity protection and replay detection on the
> other. We had this discussion several times.
>
> regards,
> Torsten.
>
> Am 15.02.2013 um 08:08 schrieb William Mills <wmills_92105@yahoo.com
> <mailto:wmills_92105@yahoo.com>>:
>
>> I fundamentally disagree with that too. OAuth 2 is the *framework*,
>> one which supports multiple token types. Bearer tokens were the first
>> credential type defined.
>>
>> OAuth 1.0a also requires HTTPS transport for authentication and
>> getting the token.
>>
>> There are real use cases for tokens usable over plain text with
>> integrity protection.
>>
>> -bill
>>
>> ------------------------------------------------------------------------
>> *From:* Torsten Lodderstedt <torsten@lodderstedt.net
>> <mailto:torsten@lodderstedt.net>>
>> *To:* William Mills <wmills_92105@yahoo.com
>> <mailto:wmills_92105@yahoo.com>>
>> *Cc:* Mike Jones <Michael.Jones@microsoft.com
>> <mailto:Michael.Jones@microsoft.com>>; Justin Richer
>> <jricher@mitre.org <mailto:jricher@mitre.org>>; Phil Hunt
>> <phil.hunt@oracle.com <mailto:phil.hunt@oracle.com>>; IETF oauth WG
>> <oauth@ietf.org <mailto:oauth@ietf.org>>
>> *Sent:* Thursday, February 14, 2013 10:05 PM
>> *Subject:* Re: [OAUTH-WG] Minutes from the OAuth Design Team
>> Conference Call - 11th February 2013
>>
>> Hi Bill,
>>
>> OAuth 2.0 took a different direction by relying on HTTPS to provide
>> the basic protection. So the need to have a token, which can be used
>> for service requests over plain HTTP is arguable. My understanding of
>> this activity was, the intend is to provide additional protection on
>> top of HTTPS.
>>
>> regards,
>> Torsten.
>>
>> Am 15.02.2013 um 02:31 schrieb William Mills <wmills_92105@yahoo.com
>> <mailto:wmills_92105@yahoo.com>>:
>>
>>> I disagree with "That was the impediment to OAuth 1.0 adoption that
>>> OAuth 2.0 solved in the first place.", unless "solving" means does
>>> not address the need for it at all.
>>>
>>> OAuth 2 does several good things, but it still lacks a defined token
>>> type that is safe to user over plain text HTTP. 1.0a solved that.
>>>
>>> ------------------------------------------------------------------------
>>> *From:* Mike Jones <Michael.Jones@microsoft.com
>>> <mailto:Michael.Jones@microsoft.com>>
>>> *To:* Justin Richer <jricher@mitre.org <mailto:jricher@mitre.org>>;
>>> Phil Hunt <phil.hunt@oracle.com <mailto:phil.hunt@oracle.com>>
>>> *Cc:* IETF oauth WG <oauth@ietf.org <mailto:oauth@ietf.org>>
>>> *Sent:* Thursday, February 14, 2013 1:44 PM
>>> *Subject:* Re: [OAUTH-WG] Minutes from the OAuth Design Team
>>> Conference Call - 11th February 2013
>>>
>>> I'm in favor of reusing the JWT work that this WG is also doing. :-)
>>>
>>> I'm pretty skeptical of us inventing another custom scheme for
>>> signing HTTP headers. That was the impediment to OAuth 1.0 adoption
>>> that OAuth 2.0 solved in the first place.
>>>
>>> -- Mike
>>>
>>> -----Original Message-----
>>> From: oauth-bounces@ietf.org <mailto:oauth-bounces@ietf.org>
>>> [mailto:oauth-bounces@ietf.org <mailto:oauth-bounces@ietf.org>] On
>>> Behalf Of Justin Richer
>>> Sent: Tuesday, February 12, 2013 9:35 AM
>>> To: Phil Hunt
>>> Cc: IETF oauth WG
>>> Subject: Re: [OAUTH-WG] Minutes from the OAuth Design Team Conference
>>> Call - 11th February 2013
>>>
>>> That's my reading of it as well, Phil, thanks for providing the
>>> clarification. One motivator behind using a JSON-based token is to be
>>> able to re-use some of the great work that the JOSE group is doing
>>> but apply it to an HTTP payload.
>>>
>>> What neither of us want is a token type that requires stuffing all
>>> query, header, and other parameters *into* the JSON object itself,
>>> which would be a more SOAPy approach.
>>>
>>> -- Justin
>>>
>>> On 02/12/2013 12:30 PM, Phil Hunt wrote:
>>> > Clarification. I think Justin and I were in agreement that we don't
>>> want to see a format that requires JSON payloads. We are both
>>> interested in a JSON token used in the authorization header that
>>> could be based on a computed signature of some combination of http
>>> headers and body if possible.
>>> >
>>> > Phil
>>> >
>>> > @independentid
>>> > www.independentid.com <http://www.independentid.com/>
>>> > phil.hunt@oracle.com <mailto:phil.hunt@oracle.com>
>>> >
>>> >
>>> >
>>> >
>>> >
>>> > On 2013-02-12, at 1:10 AM, Hannes Tschofenig wrote:
>>> >
>>> >> Here are my notes.
>>> >>
>>> >> Participants:
>>> >>
>>> >> * John Bradley
>>> >> * Derek Atkins
>>> >> * Phil Hunt
>>> >> * Prateek Mishra
>>> >> * Hannes Tschofenig
>>> >> * Mike Jones
>>> >> * Antonio Sanso
>>> >> * Justin Richer
>>> >>
>>> >> Notes:
>>> >>
>>> >> My slides are available here:
>>> >> http://www.tschofenig.priv.at/OAuth2-Security-11Feb2013.ppt
>>> >>
>>> >> Slide #2 summarizes earlier discussions during the conference calls.
>>> >>
>>> >> -- HTTP vs. JSON
>>> >>
>>> >> Phil noted that he does not like to use the MAC Token draft as a
>>> starting point because it does not re-use any of the work done in the
>>> JOSE working group and in particular all the libraries that are
>>> available today. He mentioned that earlier attempts to write the MAC
>>> Token code lead to problems for implementers.
>>> >>
>>> >> Justin responded that he does not agree with using JSON as a
>>> transport mechanism since this would replicate a SOAP style.
>>> >>
>>> >> Phil noted that he wants to send JSON but the signature shall be
>>> computed over the HTTP header field.
>>> >>
>>> >> -- Flexibility for the keyed message digest computation
>>> >>
>>> >> From earlier discussion it was clear that the conference call
>>> participants wanted more flexibility regarding the keyed message
>>> digest computation. For this purpose Hannes presented the DKIM based
>>> approach, which allows selective header fields to be included in the
>>> digest. This is shown in slide #4.
>>> >>
>>> >> After some discussion the conference call participants thought
>>> that this would meet their needs. Further investigations would still
>>> be useful to determine the degree of failed HMAC calculations due to
>>> HTTP proxies modifying the content.
>>> >>
>>> >> -- Key Distribution
>>> >>
>>> >> Hannes presented the open issue regarding the choice of key
>>> >> distribution. Slides #6-#8 present three techniques and Hannes asked
>>> >> for feedback regarding the preferred style. Justin and others didn't
>>> >> see the need to decide on one mechanism - they wanted to keep the
>>> >> choice open. Derek indicated that this will not be an acceptable
>>> >> approach. Since the resource server and the authorization server may,
>>> >> in the OAuth 2.0 framework, be entities produced by different vendors
>>> >> there is an interoperability need. Justin responded that he disagrees
>>> >> and that the resource server needs to understand the access token and
>>> >> referred to the recent draft submission for the token introspection
>>> >> endpoint. Derek indicated that the resource server has to understand
>>> >> the content of the access token and the token introspection endpoint
>>> >> just pushes the problem around: the resource server has to send the
>>> >> access token to the authorization server and then the resource server
>>> >> gets the result back (which he the
>>> n
>>> > a
>>> >> gain needs to understand) in order to make a meaningful
>>> authorization decision.
>>> >>
>>> >> Everyone agreed that the client must receive the session key from
>>> the authorization server and that this approach has to be
>>> standardized. It was also agreed that this is a common approach among
>>> all three key distribution mechanisms.
>>> >>
>>> >> Hannes asked the participants to think about their preference.
>>> >>
>>> >> The questions regarding key naming and the indication for the
>>> intended resource server the client wants to talk to have been postponed.
>>> >>
>>> >> Ciao
>>> >> Hannes
>>> >>
>>> >>
>>> >> _______________________________________________
>>> >> OAuth mailing list
>>> >> OAuth@ietf.org <mailto:OAuth@ietf.org>
>>> >> https://www.ietf.org/mailman/listinfo/oauth
>>> > _______________________________________________
>>> > OAuth mailing list
>>> > OAuth@ietf.org <mailto:OAuth@ietf.org>
>>> > https://www.ietf.org/mailman/listinfo/oauth
>>>
>>>
>>> _______________________________________________
>>> OAuth mailing list
>>> OAuth@ietf.org <mailto:OAuth@ietf.org>
>>> https://www.ietf.org/mailman/listinfo/oauth
>>> _______________________________________________
>>> OAuth mailing list
>>> OAuth@ietf.org <mailto:OAuth@ietf.org>
>>> https://www.ietf.org/mailman/listinfo/oauth
>>>
>>>
>>> _______________________________________________
>>> OAuth mailing list
>>> OAuth@ietf.org <mailto:OAuth@ietf.org>
>>> https://www.ietf.org/mailman/listinfo/oauth
>>
>>
>
>
>
>
> _______________________________________________
> OAuth mailing list
> OAuth@ietf.org
> https://www.ietf.org/mailman/listinfo/oauth

From twbray@google.com  Fri Feb 15 08:50:04 2013
Return-Path: <twbray@google.com>
X-Original-To: oauth@ietfa.amsl.com
Delivered-To: oauth@ietfa.amsl.com
Received: from localhost (localhost [127.0.0.1]) by ietfa.amsl.com (Postfix) with ESMTP id 3AA6D21F855F for <oauth@ietfa.amsl.com>; Fri, 15 Feb 2013 08:50:04 -0800 (PST)
X-Virus-Scanned: amavisd-new at amsl.com
X-Spam-Flag: NO
X-Spam-Score: -101.81
X-Spam-Level: 
X-Spam-Status: No, score=-101.81 tagged_above=-999 required=5 tests=[AWL=0.167, BAYES_00=-2.599, FM_FORGED_GMAIL=0.622, HTML_MESSAGE=0.001, NO_RELAYS=-0.001, USER_IN_WHITELIST=-100]
Received: from mail.ietf.org ([64.170.98.30]) by localhost (ietfa.amsl.com [127.0.0.1]) (amavisd-new, port 10024) with ESMTP id bS1vAiLwgeba for <oauth@ietfa.amsl.com>; Fri, 15 Feb 2013 08:50:00 -0800 (PST)
Received: from mail-ia0-x22f.google.com (mail-ia0-x22f.google.com [IPv6:2607:f8b0:4001:c02::22f]) by ietfa.amsl.com (Postfix) with ESMTP id 6C7B021F8869 for <oauth@ietf.org>; Fri, 15 Feb 2013 08:50:00 -0800 (PST)
Received: by mail-ia0-f175.google.com with SMTP id r4so3412383iaj.20 for <oauth@ietf.org>; Fri, 15 Feb 2013 08:50:00 -0800 (PST)
DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=google.com; s=20120113; h=x-received:mime-version:in-reply-to:references:from:date:message-id :subject:to:cc:content-type; bh=IDMxY+v9lchWnkOPV6gi3oh0D6LuYe0QeT2b2MLsXts=; b=W2FfYpUpHMr8+nYXEjqHoO2xxwqJue4inTBIQNTdS+yB9OVtwAuLXHhxZpLS7mRzRO sdtU0zjgVMiZrB9zxPEtcFoiw3NTu2sYHlNK6zLb0XtzML84IGktS+GV4yfD10fHQ3y9 z/PZ7qzQ8dFaIUBPkVJLO+WeEwEdqK/6m//dRe9Iz7lsaFqhzADpCpMRGwvD7v3+V/Ex pSyWukjfM20ICQcIZSUehI4/UE0QNVtnJwOSiT5sJEVBIEIUA/ODRwoSB2/9UmAO1Xeh 2lSxQWvpVd4zWtjG8MiIfYdVw9PBIR42204RSd8dUGUAigz482yIgxCwhUfwW+GGKD8s dTLA==
X-Google-DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=google.com; s=20120113; h=x-received:mime-version:in-reply-to:references:from:date:message-id :subject:to:cc:content-type:x-gm-message-state; bh=IDMxY+v9lchWnkOPV6gi3oh0D6LuYe0QeT2b2MLsXts=; b=C0OS0g+h1qtfhVhJAPXrr/iL2yG3+oRDg+pqrED9eewqGlF1K+j8eqtSrJgErj2npM Cc1g8VCzA5CNfva5zGCBjtOFANloPmto/1P7rj+L3Wik1ZX2yOrG2JZl75fnHVVlRrB/ /ehwRl3RIVWObZ9pgn+dhEbOI0LL2z2c2xj6GSm2UY46dKggdqz0zEsKDjCJGZZZGLRz PsmrGz4MqsP1T+IvLiG4t789klw8Dnq9qDwkTA92wIxAZRPeJOVk+B62rJZOkddoDdhl 4vymEw4WZnod98iUwg5K8vNjIkMiWBzEgH4bTXYTLUalgQvNUOLJ7SmbMLldiohz0VOQ WPGA==
X-Received: by 10.50.196.234 with SMTP id ip10mr2297728igc.27.1360946989711; Fri, 15 Feb 2013 08:49:49 -0800 (PST)
MIME-Version: 1.0
Received: by 10.64.16.199 with HTTP; Fri, 15 Feb 2013 08:49:19 -0800 (PST)
In-Reply-To: <1360944589.51724.YahooMailNeo@web31808.mail.mud.yahoo.com>
References: <0573984A-8C11-4960-9BC6-F44D4B664C19@gmx.net> <E808B6AC-D5F6-479F-967D-EA6B2586BE64@oracle.com> <511A7D27.8010209@mitre.org> <4E1F6AAD24975D4BA5B16804296739436744BD23@TK5EX14MBXC285.redmond.corp.microsoft.com> <1360891897.14004.YahooMailNeo@web31811.mail.mud.yahoo.com> <E7EBF78C-37EB-4737-8DD5-0F24C9FACA60@lodderstedt.net> <1360912115.36543.YahooMailNeo@web31811.mail.mud.yahoo.com> <2A0F585F-2CEF-418D-9654-5084E6C9BD0D@lodderstedt.net> <1360944589.51724.YahooMailNeo@web31808.mail.mud.yahoo.com>
From: Tim Bray <twbray@google.com>
Date: Fri, 15 Feb 2013 08:49:19 -0800
Message-ID: <CA+ZpN24dWAGtZR2aQcqC_N+sHsp7zBVe42LDbrkAsqNVqQPv0w@mail.gmail.com>
To: William Mills <wmills_92105@yahoo.com>
Content-Type: multipart/alternative; boundary=14dae9341213e1403c04d5c6294d
X-Gm-Message-State: ALoCoQm9mnvqCwvZmL2lydI/mpvNhOx1tPVtO0HQ9w2AgHzCZVPmxJfHfHYw8L/vvCxq2OiV6v24/u1+6sgmUqXYIFUfswrptS/krj5kGYQOV+Z1GYbLFSMtYuWlWAHgkZkH8yhw+O0QwR3zT9Okhcx+/OGFaASVsjQgrVv9x1g0ltiPhvjCafkuBS8r5IX3u5xCiOKlKAGE
Cc: IETF oauth WG <oauth@ietf.org>
Subject: Re: [OAUTH-WG] Minutes from the OAuth Design Team Conference Call - 11th February 2013
X-BeenThere: oauth@ietf.org
X-Mailman-Version: 2.1.12
Precedence: list
List-Id: OAUTH WG <oauth.ietf.org>
List-Unsubscribe: <https://www.ietf.org/mailman/options/oauth>, <mailto:oauth-request@ietf.org?subject=unsubscribe>
List-Archive: <http://www.ietf.org/mail-archive/web/oauth>
List-Post: <mailto:oauth@ietf.org>
List-Help: <mailto:oauth-request@ietf.org?subject=help>
List-Subscribe: <https://www.ietf.org/mailman/listinfo/oauth>, <mailto:oauth-request@ietf.org?subject=subscribe>
X-List-Received-Date: Fri, 15 Feb 2013 16:50:04 -0000

--14dae9341213e1403c04d5c6294d
Content-Type: text/plain; charset=UTF-8
Content-Transfer-Encoding: quoted-printable

Not deeply acquainted with the Flickr scenario, but it occurs to me to ask:
If OAuth 1.0 is working well for them, why don=E2=80=99t they just keep usi=
ng it?
 I.e. if there=E2=80=99s already a good solution in place for people who re=
quire
secure authn/authz over insecure channels, why would we go the extra work
of duplicating that in OAuth 2 territory? -T

On Fri, Feb 15, 2013 at 8:09 AM, William Mills <wmills_92105@yahoo.com>wrot=
e:

> I'll repeat the use case for Flickr, which requires OAuth 1.0a type
> capabilites that OAuth 2 does not provide.  Simply stating "move to HTTPS=
"
> is not a viable response here.
>
>   ------------------------------
> *From:* Torsten Lodderstedt <torsten@lodderstedt.net>
> *To:* William Mills <wmills_92105@yahoo.com>
> *Cc:* Mike Jones <Michael.Jones@microsoft.com>; Justin Richer <
> jricher@mitre.org>; Phil Hunt <phil.hunt@oracle.com>; IETF oauth WG <
> oauth@ietf.org>
> *Sent:* Friday, February 15, 2013 7:22 AM
> *Subject:* Re: [OAUTH-WG] Minutes from the OAuth Design Team Conference
> Call - 11th February 2013
>
> Hi Bill,
>
> I think one needs to compare the costs/impact of HTTPS on one side and th=
e
> implementation of integrity protection and replay detection on the other.
> We had this discussion several times.
>
> regards,
> Torsten.
>
> Am 15.02.2013 um 08:08 schrieb William Mills <wmills_92105@yahoo.com>:
>
> I fundamentally disagree with that too.  OAuth 2 is the *framework*, one
> which supports multiple token types.  Bearer tokens were the first
> credential type defined.
>
> OAuth 1.0a also requires HTTPS transport for authentication and getting
> the token.
>
> There are  real use cases for tokens usable over plain text with integrit=
y
> protection.
>
> -bill
>
>   ------------------------------
> *From:* Torsten Lodderstedt <torsten@lodderstedt.net>
> *To:* William Mills <wmills_92105@yahoo.com>
> *Cc:* Mike Jones <Michael.Jones@microsoft.com>; Justin Richer <
> jricher@mitre.org>; Phil Hunt <phil.hunt@oracle.com>; IETF oauth WG <
> oauth@ietf.org>
> *Sent:* Thursday, February 14, 2013 10:05 PM
> *Subject:* Re: [OAUTH-WG] Minutes from the OAuth Design Team Conference
> Call - 11th February 2013
>
> Hi Bill,
>
> OAuth 2.0 took a different direction by relying on HTTPS to provide the
> basic protection. So the need to have a token, which can be used for
> service requests over plain HTTP is arguable. My understanding of this
> activity was, the intend is to provide additional protection on top of
> HTTPS.
>
> regards,
> Torsten.
>
> Am 15.02.2013 um 02:31 schrieb William Mills <wmills_92105@yahoo.com>:
>
> I disagree with "That was the impediment to OAuth 1.0 adoption that OAuth
> 2.0 solved in the first place.", unless "solving" means does not address
> the need for it at all.
>
> OAuth 2 does several good things, but it still lacks a defined token type
> that is safe to user over plain text HTTP.  1.0a solved that.
>
>   ------------------------------
> *From:* Mike Jones <Michael.Jones@microsoft.com>
> *To:* Justin Richer <jricher@mitre.org>; Phil Hunt <phil.hunt@oracle.com>
> *Cc:* IETF oauth WG <oauth@ietf.org>
> *Sent:* Thursday, February 14, 2013 1:44 PM
> *Subject:* Re: [OAUTH-WG] Minutes from the OAuth Design Team Conference
> Call - 11th February 2013
>
> I'm in favor of reusing the JWT work that this WG is also doing. :-)
>
> I'm pretty skeptical of us inventing another custom scheme for signing
> HTTP headers.  That was the impediment to OAuth 1.0 adoption that OAuth 2=
.0
> solved in the first place.
>
>                 -- Mike
>
> -----Original Message-----
> From: oauth-bounces@ietf.org [mailto:oauth-bounces@ietf.org] On Behalf Of
> Justin Richer
> Sent: Tuesday, February 12, 2013 9:35 AM
> To: Phil Hunt
> Cc: IETF oauth WG
> Subject: Re: [OAUTH-WG] Minutes from the OAuth Design Team Conference Cal=
l
> - 11th February 2013
>
> That's my reading of it as well, Phil, thanks for providing the
> clarification. One motivator behind using a JSON-based token is to be abl=
e
> to re-use some of the great work that the JOSE group is doing but apply i=
t
> to an HTTP payload.
>
> What neither of us want is a token type that requires stuffing all query,
> header, and other parameters *into* the JSON object itself, which would b=
e
> a more SOAPy approach.
>
>   -- Justin
>
> On 02/12/2013 12:30 PM, Phil Hunt wrote:
> > Clarification.  I think Justin and I were in agreement that we don't
> want to see a format that requires JSON payloads.  We are both interested
> in a JSON token used in the authorization header that could be based on a
> computed signature of some combination of http headers and body if possib=
le.
> >
> > Phil
> >
> > @independentid
> > www.independentid.com
> > phil.hunt@oracle.com
> >
> >
> >
> >
> >
> > On 2013-02-12, at 1:10 AM, Hannes Tschofenig wrote:
> >
> >> Here are my notes.
> >>
> >> Participants:
> >>
> >> * John Bradley
> >> * Derek Atkins
> >> * Phil Hunt
> >> * Prateek Mishra
> >> * Hannes Tschofenig
> >> * Mike Jones
> >> * Antonio Sanso
> >> * Justin Richer
> >>
> >> Notes:
> >>
> >> My slides are available here:
> >> http://www.tschofenig.priv.at/OAuth2-Security-11Feb2013.ppt
> >>
> >> Slide #2 summarizes earlier discussions during the conference calls.
> >>
> >> -- HTTP vs. JSON
> >>
> >> Phil noted that he does not like to use the MAC Token draft as a
> starting point because it does not re-use any of the work done in the JOS=
E
> working group and in particular all the libraries that are available toda=
y.
> He mentioned that earlier attempts to write the MAC Token code lead to
> problems for implementers.
> >>
> >> Justin responded that he does not agree with using JSON as a transport
> mechanism since this would replicate a SOAP style.
> >>
> >> Phil noted that he wants to send JSON but the signature shall be
> computed over the HTTP header field.
> >>
> >> -- Flexibility for the keyed message digest computation
> >>
> >>  From earlier discussion it was clear that the conference call
> participants wanted more flexibility regarding the keyed message digest
> computation. For this purpose Hannes presented the DKIM based approach,
> which allows selective header fields to be included in the digest. This i=
s
> shown in slide #4.
> >>
> >> After some discussion the conference call participants thought that
> this would meet their needs. Further investigations would still be useful
> to determine the degree of failed HMAC calculations due to HTTP proxies
> modifying the content.
> >>
> >> -- Key Distribution
> >>
> >> Hannes presented the open issue regarding the choice of key
> >> distribution. Slides #6-#8 present three techniques and Hannes asked
> >> for feedback regarding the preferred style. Justin and others didn't
> >> see the need to decide on one mechanism - they wanted to keep the
> >> choice open. Derek indicated that this will not be an acceptable
> >> approach. Since the resource server and the authorization server may,
> >> in the OAuth 2.0 framework, be entities produced by different vendors
> >> there is an interoperability need. Justin responded that he disagrees
> >> and that the resource server needs to understand the access token and
> >> referred to the recent draft submission for the token introspection
> >> endpoint. Derek indicated that the resource server has to understand
> >> the content of the access token and the token introspection endpoint
> >> just pushes the problem around: the resource server has to send the
> >> access token to the authorization server and then the resource server
> >> gets the result back (which he the
> n
> >    a
> >> gain needs to understand) in order to make a meaningful authorization
> decision.
> >>
> >> Everyone agreed that the client must receive the session key from the
> authorization server and that this approach has to be standardized. It wa=
s
> also agreed that this is a common approach among all three key distributi=
on
> mechanisms.
> >>
> >> Hannes asked the participants to think about their preference.
> >>
> >> The questions regarding key naming and the indication for the intended
> resource server the client wants to talk to have been postponed.
> >>
> >> Ciao
> >> Hannes
> >>
> >>
> >> _______________________________________________
> >> OAuth mailing list
> >> OAuth@ietf.org
> >> https://www.ietf.org/mailman/listinfo/oauth
> > _______________________________________________
> > OAuth mailing list
> > OAuth@ietf.org
> > https://www.ietf.org/mailman/listinfo/oauth
>
>
> _______________________________________________
> OAuth mailing list
> OAuth@ietf.org
> https://www.ietf.org/mailman/listinfo/oauth
> _______________________________________________
> OAuth mailing list
> OAuth@ietf.org
> https://www.ietf.org/mailman/listinfo/oauth
>
>
>  _______________________________________________
> OAuth mailing list
> OAuth@ietf.org
> https://www.ietf.org/mailman/listinfo/oauth
>
>
>
>
>
>
> _______________________________________________
> OAuth mailing list
> OAuth@ietf.org
> https://www.ietf.org/mailman/listinfo/oauth
>
>

--14dae9341213e1403c04d5c6294d
Content-Type: text/html; charset=UTF-8
Content-Transfer-Encoding: quoted-printable

Not deeply acquainted with the Flickr scenario, but it occurs to me to ask:=
 If OAuth 1.0 is working well for them, why don=E2=80=99t they just keep us=
ing it? =C2=A0I.e. if there=E2=80=99s already a good solution in place for =
people who require secure authn/authz over insecure channels, why would we =
go the extra work of duplicating that in OAuth 2 territory? -T<br>

<br><div class=3D"gmail_quote">On Fri, Feb 15, 2013 at 8:09 AM, William Mil=
ls <span dir=3D"ltr">&lt;<a href=3D"mailto:wmills_92105@yahoo.com" target=
=3D"_blank">wmills_92105@yahoo.com</a>&gt;</span> wrote:<br><blockquote cla=
ss=3D"gmail_quote" style=3D"margin:0 0 0 .8ex;border-left:1px #ccc solid;pa=
dding-left:1ex">

<div><div style=3D"font-size:12pt;font-family:Courier New,courier,monaco,mo=
nospace,sans-serif"><div><span>I&#39;ll repeat the use case for Flickr, whi=
ch requires OAuth 1.0a type capabilites that OAuth 2 does not provide. =C2=
=A0Simply stating &quot;move to HTTPS&quot; is not a viable response here. =
=C2=A0</span></div>

<div><br></div>  <div style=3D"font-family:&#39;Courier New&#39;,courier,mo=
naco,monospace,sans-serif;font-size:12pt"> <div style=3D"font-family:&#39;t=
imes new roman&#39;,&#39;new york&#39;,times,serif;font-size:12pt"> <div di=
r=3D"ltr">

 <font face=3D"Arial"> <hr size=3D"1">  <b><span style=3D"font-weight:bold"=
>From:</span></b> Torsten Lodderstedt &lt;<a href=3D"mailto:torsten@lodders=
tedt.net" target=3D"_blank">torsten@lodderstedt.net</a>&gt;<br> <b><span st=
yle=3D"font-weight:bold">To:</span></b> William Mills &lt;<a href=3D"mailto=
:wmills_92105@yahoo.com" target=3D"_blank">wmills_92105@yahoo.com</a>&gt; <=
br>

<b><span style=3D"font-weight:bold">Cc:</span></b> Mike Jones &lt;<a href=
=3D"mailto:Michael.Jones@microsoft.com" target=3D"_blank">Michael.Jones@mic=
rosoft.com</a>&gt;; Justin Richer &lt;<a href=3D"mailto:jricher@mitre.org" =
target=3D"_blank">jricher@mitre.org</a>&gt;; Phil
 Hunt &lt;<a href=3D"mailto:phil.hunt@oracle.com" target=3D"_blank">phil.hu=
nt@oracle.com</a>&gt;; IETF oauth WG &lt;<a href=3D"mailto:oauth@ietf.org" =
target=3D"_blank">oauth@ietf.org</a>&gt; <br> <b><span style=3D"font-weight=
:bold">Sent:</span></b> Friday, February 15, 2013 7:22 AM<br>

 <b><span style=3D"font-weight:bold">Subject:</span></b> Re: [OAUTH-WG] Min=
utes from the OAuth Design Team Conference Call - 11th February 2013<br> </=
font> </div> <br>
<div><div><div>Hi Bill,</div><div><br></div><div>I think one needs to compa=
re the costs/impact of HTTPS on one side and the implementation of integrit=
y protection and replay detection on the other. We had this discussion seve=
ral times.</div>

<div><br></div><div>regards,</div><div>Torsten.</div><div><br>Am 15.02.2013=
 um 08:08 schrieb William Mills &lt;<a rel=3D"nofollow" href=3D"mailto:wmil=
ls_92105@yahoo.com" target=3D"_blank">wmills_92105@yahoo.com</a>&gt;:<br><b=
r>

</div><blockquote type=3D"cite"><div><div style=3D"font-size:12pt;font-fami=
ly:&#39;Courier New&#39;,courier,monaco,monospace,sans-serif"><div><span>I =
fundamentally disagree with that too. =C2=A0OAuth 2 is the *framework*, one=
 which supports multiple token types. =C2=A0Bearer tokens were the first cr=
edential type defined.</span></div>

<div style=3D"font-style:normal;font-size:16px;background-color:transparent=
;font-family:&#39;Courier New&#39;,courier,monaco,monospace,sans-serif"><sp=
an><br></span></div><div style=3D"font-style:normal;font-size:16px;backgrou=
nd-color:transparent;font-family:&#39;Courier New&#39;,courier,monaco,monos=
pace,sans-serif">

<span>OAuth 1.0a also requires HTTPS transport for authentication and getti=
ng the token.</span></div><div style=3D"font-style:normal;font-size:16px;ba=
ckground-color:transparent;font-family:&#39;Courier New&#39;,courier,monaco=
,monospace,sans-serif">

<span><br></span></div><div style=3D"font-style:normal;font-size:16px;backg=
round-color:transparent;font-family:&#39;Courier New&#39;,courier,monaco,mo=
nospace,sans-serif"><span>There are =C2=A0real use cases for tokens usable =
over plain text with integrity protection.</span></div>

<div style=3D"font-style:normal;font-size:16px;background-color:transparent=
;font-family:&#39;Courier New&#39;,courier,monaco,monospace,sans-serif"><sp=
an><br></span></div><div style=3D"font-style:normal;font-size:16px;backgrou=
nd-color:transparent;font-family:&#39;Courier New&#39;,courier,monaco,monos=
pace,sans-serif">

<span>-bill</span></div><div><br></div>  <div style=3D"font-family:&#39;Cou=
rier New&#39;,courier,monaco,monospace,sans-serif;font-size:12pt"> <div sty=
le=3D"font-family:&#39;times new roman&#39;,&#39;new york&#39;,times,serif;=
font-size:12pt">

 <div dir=3D"ltr"> <font face=3D"Arial"> <hr size=3D"1">=20
 <b><span style=3D"font-weight:bold">From:</span></b> Torsten Lodderstedt &=
lt;<a rel=3D"nofollow" href=3D"mailto:torsten@lodderstedt.net" target=3D"_b=
lank">torsten@lodderstedt.net</a>&gt;<br> <b><span style=3D"font-weight:bol=
d">To:</span></b> William Mills &lt;<a rel=3D"nofollow" href=3D"mailto:wmil=
ls_92105@yahoo.com" target=3D"_blank">wmills_92105@yahoo.com</a>&gt; <br>

<b><span style=3D"font-weight:bold">Cc:</span></b> Mike Jones &lt;<a rel=3D=
"nofollow" href=3D"mailto:Michael.Jones@microsoft.com" target=3D"_blank">Mi=
chael.Jones@microsoft.com</a>&gt;; Justin Richer &lt;<a rel=3D"nofollow" hr=
ef=3D"mailto:jricher@mitre.org" target=3D"_blank">jricher@mitre.org</a>&gt;=
; Phil Hunt &lt;<a rel=3D"nofollow" href=3D"mailto:phil.hunt@oracle.com" ta=
rget=3D"_blank">phil.hunt@oracle.com</a>&gt;; IETF
 oauth WG &lt;<a rel=3D"nofollow" href=3D"mailto:oauth@ietf.org" target=3D"=
_blank">oauth@ietf.org</a>&gt; <br> <b><span style=3D"font-weight:bold">Sen=
t:</span></b> Thursday, February 14, 2013 10:05 PM<br> <b><span style=3D"fo=
nt-weight:bold">Subject:</span></b> Re: [OAUTH-WG] Minutes from the OAuth D=
esign Team Conference Call - 11th February 2013<br>

 </font> </div> <br>
<div><div><div>Hi Bill,</div><div><br></div><div>OAuth 2.0 took a different=
 direction by relying on HTTPS to provide the basic protection. So the need=
 to have a token, which can be used for service requests over plain HTTP is=
 arguable. My understanding of this activity was, the intend is to provide =
additional protection on top of HTTPS.</div>

<div><br></div><div>regards,</div><div>Torsten.</div><div><br>Am 15.02.2013=
 um 02:31 schrieb William Mills &lt;<a rel=3D"nofollow" href=3D"mailto:wmil=
ls_92105@yahoo.com" target=3D"_blank">wmills_92105@yahoo.com</a>&gt;:<br><b=
r>

</div><blockquote type=3D"cite"><div><div style=3D"font-size:12pt;font-fami=
ly:&#39;Courier New&#39;,courier,monaco,monospace,sans-serif"><div><span>I =
disagree with &quot;</span><span style=3D"font-family:&#39;times new roman&=
#39;,&#39;new york&#39;,times,serif;font-size:12pt">That was the impediment=
 to
 OAuth 1.0 adoption that OAuth 2.0 solved in the first place.&quot;, unless=
 &quot;solving&quot; means does not address the need for it at all.</span><=
/div><div style=3D"font-style:normal;font-size:12pt;background-color:transp=
arent;font-family:&#39;times new roman&#39;,&#39;new york&#39;,times,serif"=
>

<span style=3D"font-family:&#39;times new roman&#39;,&#39;new york&#39;,tim=
es,serif;font-size:12pt"><br></span></div><div style=3D"font-style:normal;f=
ont-size:16px;background-color:transparent;font-family:&#39;times new roman=
&#39;,&#39;new york&#39;,times,serif">

<span style=3D"font-family:&#39;times new roman&#39;,&#39;new york&#39;,tim=
es,serif;font-size:12pt">OAuth 2 does several
 good things, but it still lacks a defined token type that is safe to user =
over plain text HTTP. =C2=A01.0a solved that.</span></div><div><br></div>  =
<div style=3D"font-family:&#39;Courier New&#39;,courier,monaco,monospace,sa=
ns-serif;font-size:12pt">

 <div style=3D"font-family:&#39;times new roman&#39;,&#39;new york&#39;,tim=
es,serif;font-size:12pt"> <div dir=3D"ltr"> <font face=3D"Arial"> <hr size=
=3D"1">  <b><span style=3D"font-weight:bold">From:</span></b> Mike Jones &l=
t;<a rel=3D"nofollow" href=3D"mailto:Michael.Jones@microsoft.com" target=3D=
"_blank">Michael.Jones@microsoft.com</a>&gt;<br>

 <b><span style=3D"font-weight:bold">To:</span></b> Justin Richer &lt;<a re=
l=3D"nofollow" href=3D"mailto:jricher@mitre.org" target=3D"_blank">jricher@=
mitre.org</a>&gt;; Phil Hunt &lt;<a rel=3D"nofollow" href=3D"mailto:phil.hu=
nt@oracle.com" target=3D"_blank">phil.hunt@oracle.com</a>&gt; <br>

<b><span style=3D"font-weight:bold">Cc:</span></b> IETF oauth WG &lt;<a rel=
=3D"nofollow" href=3D"mailto:oauth@ietf.org" target=3D"_blank">oauth@ietf.o=
rg</a>&gt; <br> <b><span style=3D"font-weight:bold">Sent:</span></b> Thursd=
ay, February 14, 2013 1:44 PM<br>

 <b><span style=3D"font-weight:bold">Subject:</span></b> Re: [OAUTH-WG] Min=
utes from the OAuth Design Team Conference Call - 11th February 2013<br>
 </font> </div> <br>
I&#39;m in favor of reusing the JWT work that this WG is also doing. :-)<br=
><br>I&#39;m pretty skeptical of us inventing another custom scheme for sig=
ning HTTP headers.=C2=A0 That was the impediment to OAuth 1.0 adoption that=
 OAuth 2.0 solved in the first place.<br>

<br>=C2=A0=C2=A0=C2=A0 =C2=A0=C2=A0=C2=A0 =C2=A0=C2=A0=C2=A0 =C2=A0=C2=A0=
=C2=A0 -- Mike<br><br>-----Original Message-----<br>From: <a rel=3D"nofollo=
w" href=3D"mailto:oauth-bounces@ietf.org" target=3D"_blank">oauth-bounces@i=
etf.org</a> [mailto:<a rel=3D"nofollow" href=3D"mailto:oauth-bounces@ietf.o=
rg" target=3D"_blank">oauth-bounces@ietf.org</a>] On Behalf Of Justin Riche=
r<br>

Sent: Tuesday, February 12, 2013 9:35 AM<br>To: Phil Hunt<br>Cc: IETF oauth=
 WG<br>Subject: Re: [OAUTH-WG] Minutes from the OAuth Design Team Conferenc=
e Call - 11th February 2013<br><br>That&#39;s my reading of it as well, Phi=
l, thanks for providing the clarification.
 One motivator behind using a JSON-based token is to be able to
 re-use some of the great work that the JOSE group is doing but apply it to=
 an HTTP payload.<br><br>What neither of us want is a token type that requi=
res stuffing all query, header, and other parameters *into* the JSON object=
 itself, which would be a more SOAPy approach.<br>

<br>=C2=A0 -- Justin<br><br>On 02/12/2013 12:30 PM, Phil Hunt wrote:<br>&gt=
; Clarification.=C2=A0 I think Justin and I were in agreement that we don&#=
39;t want to see a format that requires JSON payloads.=C2=A0 We are both in=
terested in a JSON token used in the authorization header that could be bas=
ed on a computed signature of some combination of http headers and body if =
possible.<br>

&gt;<br>&gt; Phil<br>&gt;<br>&gt; @independentid<br>&gt; <a rel=3D"nofollow=
" href=3D"http://www.independentid.com/" target=3D"_blank">www.independenti=
d.com</a><br>&gt; <a rel=3D"nofollow" href=3D"mailto:phil.hunt@oracle.com" =
target=3D"_blank">phil.hunt@oracle.com</a><br>

&gt;<br>&gt;<br>&gt;<br>&gt;<br>&gt;<br>&gt; On
 2013-02-12, at 1:10 AM, Hannes Tschofenig wrote:<br>&gt;<br>&gt;&gt; Here =
are my notes.<br>&gt;&gt;<br>&gt;&gt; Participants:<br>&gt;&gt;<br>&gt;&gt;=
 * John Bradley<br>&gt;&gt; * Derek Atkins<br>&gt;&gt; * Phil Hunt<br>

&gt;&gt; * Prateek Mishra<br>&gt;&gt; * Hannes Tschofenig<br>&gt;&gt; * Mik=
e Jones<br>&gt;&gt; * Antonio Sanso<br>&gt;&gt; * Justin Richer<br>&gt;&gt;=
<br>&gt;&gt; Notes:<br>&gt;&gt;<br>&gt;&gt; My slides are available here: <=
br>

&gt;&gt; <a href=3D"http://www.tschofenig.priv.at/OAuth2-Security-11Feb2013=
.ppt" target=3D"_blank">http://www.tschofenig.priv.at/OAuth2-Security-11Feb=
2013.ppt</a><br>&gt;&gt;<br>&gt;&gt; Slide #2 summarizes earlier discussion=
s during the conference calls.<br>

&gt;&gt;<br>&gt;&gt; -- HTTP vs. JSON<br>&gt;&gt;<br>&gt;&gt; Phil noted th=
at he does not like to use the MAC Token draft as a starting point because =
it does not re-use any of the work done in the JOSE working group and in pa=
rticular all the libraries that are available today. He mentioned that earl=
ier attempts to write the MAC Token code lead to
 problems for implementers.<br>&gt;&gt;<br>&gt;&gt; Justin responded that h=
e does not agree with using JSON as a transport mechanism since this would =
replicate a SOAP style.<br>&gt;&gt;<br>&gt;&gt; Phil noted that he wants to=
 send JSON but the signature shall be computed over the HTTP header field.<=
br>

&gt;&gt;<br>&gt;&gt; -- Flexibility for the keyed message digest computatio=
n<br>&gt;&gt;<br>&gt;&gt;=C2=A0 From earlier discussion it was clear that t=
he conference call participants wanted more flexibility regarding the keyed=
 message digest computation. For this purpose Hannes presented the DKIM bas=
ed approach, which allows selective header fields to be included in the dig=
est. This is shown in slide #4.<br>

&gt;&gt;<br>&gt;&gt; After some discussion the conference call participants=
 thought that this would meet their needs. Further investigations would sti=
ll be useful to determine the degree of failed HMAC calculations due to HTT=
P proxies modifying the
 content.<br>&gt;&gt;<br>&gt;&gt; -- Key Distribution<br>&gt;&gt;<br>&gt;&g=
t; Hannes presented the open issue regarding the choice of key <br>&gt;&gt;=
 distribution. Slides #6-#8 present three techniques and Hannes asked <br>

&gt;&gt; for feedback regarding the preferred style. Justin and others didn=
&#39;t <br>&gt;&gt; see the need to decide on one mechanism - they wanted t=
o keep the <br>&gt;&gt; choice open. Derek indicated that this will not be =
an acceptable <br>

&gt;&gt; approach. Since the resource server and the authorization server m=
ay, <br>&gt;&gt; in the OAuth 2.0 framework, be entities produced by differ=
ent vendors <br>&gt;&gt; there is an interoperability need. Justin responde=
d that he disagrees <br>

&gt;&gt; and that the resource server needs to understand the access token =
and <br>&gt;&gt; referred to the recent draft submission for the token intr=
ospection <br>&gt;&gt; endpoint. Derek indicated that the resource server h=
as to understand <br>

&gt;&gt;
 the content of the access token and the token introspection endpoint <br>&=
gt;&gt; just pushes the problem around: the resource server has to send the=
 <br>&gt;&gt; access token to the authorization server and then the resourc=
e server <br>

&gt;&gt; gets the result back (which he the<br> n<br>&gt;=C2=A0 =C2=A0 a<br=
>&gt;&gt; gain needs to understand) in order to make a meaningful authoriza=
tion decision.<br>&gt;&gt;<br>&gt;&gt; Everyone agreed that the client must=
 receive the session key from the authorization server and that this approa=
ch has to be standardized. It was also agreed that this is a common approac=
h among all three key distribution mechanisms.<br>

&gt;&gt;<br>&gt;&gt; Hannes asked the participants to think about their pre=
ference.<br>&gt;&gt;<br>&gt;&gt; The questions regarding key naming and the=
 indication for the intended resource server the client wants to talk to ha=
ve been postponed.<br>

&gt;&gt;<br>&gt;&gt; Ciao<br>&gt;&gt;
 Hannes<br>&gt;&gt;<br>&gt;&gt;<br>&gt;&gt; _______________________________=
________________<br>&gt;&gt; OAuth mailing list<br>&gt;&gt; <a rel=3D"nofol=
low" href=3D"mailto:OAuth@ietf.org" target=3D"_blank">OAuth@ietf.org</a><br=
>

&gt;&gt; <a rel=3D"nofollow" href=3D"https://www.ietf.org/mailman/listinfo/=
oauth" target=3D"_blank">https://www.ietf.org/mailman/listinfo/oauth</a><br=
>&gt; _______________________________________________<br>&gt; OAuth mailing=
 list<br>

&gt; <a rel=3D"nofollow" href=3D"mailto:OAuth@ietf.org" target=3D"_blank">O=
Auth@ietf.org</a><br>&gt; <a rel=3D"nofollow" href=3D"https://www.ietf.org/=
mailman/listinfo/oauth" target=3D"_blank">https://www.ietf.org/mailman/list=
info/oauth</a><br>

<br><br>_______________________________________________<br>OAuth mailing li=
st<br><a rel=3D"nofollow" href=3D"mailto:OAuth@ietf.org" target=3D"_blank">=
OAuth@ietf.org</a><br><a rel=3D"nofollow" href=3D"https://www.ietf.org/mail=
man/listinfo/oauth" target=3D"_blank">https://www.ietf.org/mailman/listinfo=
/oauth</a><br>

_______________________________________________<br>OAuth mailing list<br><a=
 rel=3D"nofollow" href=3D"mailto:OAuth@ietf.org" target=3D"_blank">OAuth@ie=
tf.org</a><br><a rel=3D"nofollow" href=3D"https://www.ietf.org/mailman/list=
info/oauth" target=3D"_blank">https://www.ietf.org/mailman/listinfo/oauth</=
a><br>

<br><br> </div> </div>  </div></div></blockquote><blockquote type=3D"cite">=
<div><span>_______________________________________________</span><br><span>=
OAuth mailing list</span><br><span><a rel=3D"nofollow" href=3D"mailto:OAuth=
@ietf.org" target=3D"_blank">OAuth@ietf.org</a></span><br>

<span><a rel=3D"nofollow" href=3D"https://www.ietf.org/mailman/listinfo/oau=
th" target=3D"_blank">https://www.ietf.org/mailman/listinfo/oauth</a></span=
><br></div></blockquote></div></div><br><br> </div> </div>=20
 </div></div></blockquote></div></div><br><br> </div> </div>  </div></div><=
br>_______________________________________________<br>
OAuth mailing list<br>
<a href=3D"mailto:OAuth@ietf.org">OAuth@ietf.org</a><br>
<a href=3D"https://www.ietf.org/mailman/listinfo/oauth" target=3D"_blank">h=
ttps://www.ietf.org/mailman/listinfo/oauth</a><br>
<br></blockquote></div><br>

--14dae9341213e1403c04d5c6294d--

From wmills_92105@yahoo.com  Fri Feb 15 10:29:16 2013
Return-Path: <wmills_92105@yahoo.com>
X-Original-To: oauth@ietfa.amsl.com
Delivered-To: oauth@ietfa.amsl.com
Received: from localhost (localhost [127.0.0.1]) by ietfa.amsl.com (Postfix) with ESMTP id D7B9D21F87DF for <oauth@ietfa.amsl.com>; Fri, 15 Feb 2013 10:29:16 -0800 (PST)
X-Virus-Scanned: amavisd-new at amsl.com
X-Spam-Flag: NO
X-Spam-Score: -2.273
X-Spam-Level: 
X-Spam-Status: No, score=-2.273 tagged_above=-999 required=5 tests=[AWL=0.325,  BAYES_00=-2.599, HTML_MESSAGE=0.001]
Received: from mail.ietf.org ([64.170.98.30]) by localhost (ietfa.amsl.com [127.0.0.1]) (amavisd-new, port 10024) with ESMTP id VWV3WnxwDwvk for <oauth@ietfa.amsl.com>; Fri, 15 Feb 2013 10:29:15 -0800 (PST)
Received: from nm9-vm2.bullet.mail.ne1.yahoo.com (nm9-vm2.bullet.mail.ne1.yahoo.com [98.138.90.157]) by ietfa.amsl.com (Postfix) with ESMTP id EE3D721F8563 for <oauth@ietf.org>; Fri, 15 Feb 2013 10:29:14 -0800 (PST)
Received: from [98.138.226.179] by nm9.bullet.mail.ne1.yahoo.com with NNFMP; 15 Feb 2013 18:29:14 -0000
Received: from [98.138.89.198] by tm14.bullet.mail.ne1.yahoo.com with NNFMP; 15 Feb 2013 18:29:14 -0000
Received: from [127.0.0.1] by omp1056.mail.ne1.yahoo.com with NNFMP; 15 Feb 2013 18:29:14 -0000
X-Yahoo-Newman-Property: ymail-3
X-Yahoo-Newman-Id: 449998.9493.bm@omp1056.mail.ne1.yahoo.com
Received: (qmail 69340 invoked by uid 60001); 15 Feb 2013 18:29:13 -0000
DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=yahoo.com; s=s1024; t=1360952953; bh=ve54Teb/nSt3o9+Q0MTrgKlLsSmzN9Kl0yrG7tO8liI=; h=X-YMail-OSG:Received:X-Rocket-MIMEInfo:X-Mailer:References:Message-ID:Date:From:Reply-To:Subject:To:In-Reply-To:MIME-Version:Content-Type; b=HHFtrbvaq1cbjJfuK4PiFonZ/VKL5l26xs2KMak4yC8ZIAlbqJQ1PqSzQwj0WI8H8RWv4PdV/DcZuKIydk5VtanU3/4okJNzJO/OXAa9BaefwHdTGh5VQpiFeuv4Qa5z0Wqvvdi7FOeM7RMq1S0LKTHsXhJnhIkrXQKF7r3gicQ=
DomainKey-Signature: a=rsa-sha1; q=dns; c=nofws; s=s1024; d=yahoo.com; h=X-YMail-OSG:Received:X-Rocket-MIMEInfo:X-Mailer:References:Message-ID:Date:From:Reply-To:Subject:To:In-Reply-To:MIME-Version:Content-Type; b=k8ajYIJIOWLCblcRYgWM8+vQk+iHOO/8asjPYZrc6wTEaTDYYGzw/yVDs9jUJPeYp5BghkRLxCQiiPw4rh4dPj7MXTwcPyL3bMADkgoWgx1DP6hZzDBVKw50fe+Y1qvh4P+N+TM/waYP9vEGvV12bnlVxGcRFE0RkCyJPj5riNY=;
X-YMail-OSG: eu6iupkVM1n1qkj7XDpVRc2CfhLQxSwQrtj4EZguOnJEmhq 5UxdJBX1sGjk7amV5E7kUACTWbuVNciXNVEahH61lMoIzIOaqwHDs43LrsJF 1BmTt9k0XJxZVelefz4dRk5OugTbQjw02nSgifjo3.ITs6s2I7l6KOrm1ucX KGIKJmheK9PyJyEC2WELBukNtxly4GJU.N4TjmUjm1RhaFcOd0TKC7Nd5xFT O9P3WolFKrTuZ4ZU3flaPIXjRuT5uSoMOS59V.ntDK_DnIbEJd9sA41dsaJa D5QUz7u13iqGQXnZ2gVbhW6KFCnTzEv2pAbpmybcoqSbBxaPRpgo3K7i3y3D ZzCsK_SVzdGiHnT_nucn65DH5Jy.YelYH41TlDDSqocAVQFXm6fkGnhTDfz6 JdxwpKe6NPmRPXl2jZHt.fqJCZH9plmjx_H43_08rh.tY4Ooh3u0Gqi_ywOH V9p1BcEvCt73cp1JOBqLeRDB1uhyou72FLDTGNXnP9PkCzhGqW6tIdIneS1i d7qgHkKmVoopnTkkUHZjV17G75LbriGySlJEf2ScjnICQNaqU0iH4DSHBtbR yNyJh_hFx6lfgOm2wADhvkyqn4u_0eq4ev3RS68yMBPgs1IRkEVJC7q5uJav 5K72KN5MF.dO3JFcCTELGAEVEUAitjNYNauyYXutacZo5Puou0diefGPBs9s BVQhMtsx9yPrZydW.1gbVLlXSXYfrgkwtsFmmf3gzXfO6ios-
Received: from [209.131.62.145] by web31804.mail.mud.yahoo.com via HTTP; Fri, 15 Feb 2013 10:29:13 PST
X-Rocket-MIMEInfo: 001.001, QXQgdGhpcyBwb2ludCBJIGFtIG1vcmUgaW4gZmF2b3IgY29udmVydGluZyB0aGUgTUFDIHRva2VuIGZvcm1hdCB0byBKV1QgYW5kIGdldHRpbmcgdGhlIHNpZ25hdHVyZSBlbnZlbG9wZSBhZGRlZCB0aGF0IHdheS4gwqBJdCdzIHJlYWxseSBhIG1hdHRlciBvZiB0aW1lLgoKTUFDIHN0YWxsZWQgYmVjYXVzZSBmb2xrcyBzZWUgdGhlIEhPSyB0b2tlbnMgYXMgYSByZXBsYWNlbWVudC4gwqAKCkl0J3MgYWxzbyBiZWVuIGEgbWF0dGVyIG9mIEp1c3RpbiBhbmQgSSBoYXZpbmcgdGhlIHRpbWUgdG8gdGFrZSBpdCABMAEBAQE-
X-Mailer: YahooMailWebService/0.8.134.513
References: <0573984A-8C11-4960-9BC6-F44D4B664C19@gmx.net> <E808B6AC-D5F6-479F-967D-EA6B2586BE64@oracle.com> <511A7D27.8010209@mitre.org> <4E1F6AAD24975D4BA5B16804296739436744BD23@TK5EX14MBXC285.redmond.corp.microsoft.com> <1360891897.14004.YahooMailNeo@web31811.mail.mud.yahoo.com> <E7EBF78C-37EB-4737-8DD5-0F24C9FACA60@lodderstedt.net> <1360912115.36543.YahooMailNeo@web31811.mail.mud.yahoo.com> <2A0F585F-2CEF-418D-9654-5084E6C9BD0D@lodderstedt.net> <1360944589.51724.YahooMailNeo@web31808.mail.mud.yahoo.com> <511E617A.4000302@gmail.com>
Message-ID: <1360952953.58617.YahooMailNeo@web31804.mail.mud.yahoo.com>
Date: Fri, 15 Feb 2013 10:29:13 -0800 (PST)
From: William Mills <wmills_92105@yahoo.com>
To: Sergey Beryozkin <sberyozkin@gmail.com>, "oauth@ietf.org" <oauth@ietf.org>
In-Reply-To: <511E617A.4000302@gmail.com>
MIME-Version: 1.0
Content-Type: multipart/alternative; boundary="835683298-2140817601-1360952953=:58617"
Subject: Re: [OAUTH-WG] Minutes from the OAuth Design Team Conference Call - 11th February 2013
X-BeenThere: oauth@ietf.org
X-Mailman-Version: 2.1.12
Precedence: list
Reply-To: William Mills <wmills_92105@yahoo.com>
List-Id: OAUTH WG <oauth.ietf.org>
List-Unsubscribe: <https://www.ietf.org/mailman/options/oauth>, <mailto:oauth-request@ietf.org?subject=unsubscribe>
List-Archive: <http://www.ietf.org/mail-archive/web/oauth>
List-Post: <mailto:oauth@ietf.org>
List-Help: <mailto:oauth-request@ietf.org?subject=help>
List-Subscribe: <https://www.ietf.org/mailman/listinfo/oauth>, <mailto:oauth-request@ietf.org?subject=subscribe>
X-List-Received-Date: Fri, 15 Feb 2013 18:29:17 -0000

--835683298-2140817601-1360952953=:58617
Content-Type: text/plain; charset=iso-8859-1
Content-Transfer-Encoding: quoted-printable

At this point I am more in favor converting the MAC token format to JWT and=
 getting the signature envelope added that way. =A0It's really a matter of =
time.=0A=0AMAC stalled because folks see the HOK tokens as a replacement. =
=A0=0A=0AIt's also been a matter of Justin and I having the time to take it=
 up again.=0A=0A=0A=0A________________________________=0A From: Sergey Bery=
ozkin <sberyozkin@gmail.com>=0ATo: oauth@ietf.org =0ASent: Friday, February=
 15, 2013 8:25 AM=0ASubject: Re: [OAUTH-WG] Minutes from the OAuth Design T=
eam Conference Call - 11th February 2013=0A =0AI wonder why it is proving s=
o difficult to get a nearly completed MAC =0Adraft completed ?=0AIs it beca=
use:=0A1. JWT was first in OAuth2 and thus it wins ?=0A2. MAC is not 'capab=
le' enough as JWT is ?=0A3. Not enough motivation for some vendors to push =
MAC ?=0A=0AExample, in cases where not a product but a development framewor=
k is =0Ashipped (as with us for example), IMHO is it a big motivation to ge=
t MAC =0Adone for the reasons repeated many times. Or in case of migrating =
Flickr =0Ausers to OAuth2.=0AI think I can see why no interest is there whe=
re nothing is really =0Aachieved if JWT is used from the get go, no particu=
lar need to get OAuth =0A1.0 developers out there migrating to the particul=
ar products.=0A=0AThis is 3. Re 2, I think there was enough expressed to su=
ggest that it =0Acan complement JWT nicely. So far I'm inclined to think it=
 is 3. and 2. =0Awhich stop it from being completed, with 3. 'contributing'=
 indirectly =0Abut significantly,=0A=0AJust my 2c=0AThanks, Sergey=0A=0A=0A=
On 15/02/13 16:09, William Mills wrote:=0A> I'll repeat the use case for Fl=
ickr, which requires OAuth 1.0a type=0A> capabilites that OAuth 2 does not =
provide. Simply stating "move to=0A> HTTPS" is not a viable response here.=
=0A>=0A> ------------------------------------------------------------------=
------=0A> *From:* Torsten Lodderstedt <torsten@lodderstedt.net>=0A> *To:* =
William Mills <wmills_92105@yahoo.com>=0A> *Cc:* Mike Jones <Michael.Jones@=
microsoft.com>; Justin Richer=0A> <jricher@mitre.org>; Phil Hunt <phil.hunt=
@oracle.com>; IETF oauth WG=0A> <oauth@ietf.org>=0A> *Sent:* Friday, Februa=
ry 15, 2013 7:22 AM=0A> *Subject:* Re: [OAUTH-WG] Minutes from the OAuth De=
sign Team Conference=0A> Call - 11th February 2013=0A>=0A> Hi Bill,=0A>=0A>=
 I think one needs to compare the costs/impact of HTTPS on one side and=0A>=
 the implementation of integrity protection and replay detection on the=0A>=
 other. We had this discussion several times.=0A>=0A> regards,=0A> Torsten.=
=0A>=0A> Am 15.02.2013 um 08:08 schrieb William Mills <wmills_92105@yahoo.c=
om=0A> <mailto:wmills_92105@yahoo.com>>:=0A>=0A>> I fundamentally disagree =
with that too. OAuth 2 is the *framework*,=0A>> one which supports multiple=
 token types. Bearer tokens were the first=0A>> credential type defined.=0A=
>>=0A>> OAuth 1.0a also requires HTTPS transport for authentication and=0A>=
> getting the token.=0A>>=0A>> There are real use cases for tokens usable o=
ver plain text with=0A>> integrity protection.=0A>>=0A>> -bill=0A>>=0A>> --=
----------------------------------------------------------------------=0A>>=
 *From:* Torsten Lodderstedt <torsten@lodderstedt.net=0A>> <mailto:torsten@=
lodderstedt.net>>=0A>> *To:* William Mills <wmills_92105@yahoo.com=0A>> <ma=
ilto:wmills_92105@yahoo.com>>=0A>> *Cc:* Mike Jones <Michael.Jones@microsof=
t.com=0A>> <mailto:Michael.Jones@microsoft.com>>; Justin Richer=0A>> <jrich=
er@mitre.org <mailto:jricher@mitre.org>>; Phil Hunt=0A>> <phil.hunt@oracle.=
com <mailto:phil.hunt@oracle.com>>; IETF oauth WG=0A>> <oauth@ietf.org <mai=
lto:oauth@ietf.org>>=0A>> *Sent:* Thursday, February 14, 2013 10:05 PM=0A>>=
 *Subject:* Re: [OAUTH-WG] Minutes from the OAuth Design Team=0A>> Conferen=
ce Call - 11th February 2013=0A>>=0A>> Hi Bill,=0A>>=0A>> OAuth 2.0 took a =
different direction by relying on HTTPS to provide=0A>> the basic protectio=
n. So the need to have a token, which can be used=0A>> for service requests=
 over plain HTTP is arguable. My understanding of=0A>> this activity was, t=
he intend is to provide additional protection on=0A>> top of HTTPS.=0A>>=0A=
>> regards,=0A>> Torsten.=0A>>=0A>> Am 15.02.2013 um 02:31 schrieb William =
Mills <wmills_92105@yahoo.com=0A>> <mailto:wmills_92105@yahoo.com>>:=0A>>=
=0A>>> I disagree with "That was the impediment to OAuth 1.0 adoption that=
=0A>>> OAuth 2.0 solved in the first place.", unless "solving" means does=
=0A>>> not address the need for it at all.=0A>>>=0A>>> OAuth 2 does several=
 good things, but it still lacks a defined token=0A>>> type that is safe to=
 user over plain text HTTP. 1.0a solved that.=0A>>>=0A>>> -----------------=
-------------------------------------------------------=0A>>> *From:* Mike =
Jones <Michael.Jones@microsoft.com=0A>>> <mailto:Michael.Jones@microsoft.co=
m>>=0A>>> *To:* Justin Richer <jricher@mitre.org <mailto:jricher@mitre.org>=
>;=0A>>> Phil Hunt <phil.hunt@oracle.com <mailto:phil.hunt@oracle.com>>=0A>=
>> *Cc:* IETF oauth WG <oauth@ietf.org <mailto:oauth@ietf.org>>=0A>>> *Sent=
:* Thursday, February 14, 2013 1:44 PM=0A>>> *Subject:* Re: [OAUTH-WG] Minu=
tes from the OAuth Design Team=0A>>> Conference Call - 11th February 2013=
=0A>>>=0A>>> I'm in favor of reusing the JWT work that this WG is also doin=
g. :-)=0A>>>=0A>>> I'm pretty skeptical of us inventing another custom sche=
me for=0A>>> signing HTTP headers. That was the impediment to OAuth 1.0 ado=
ption=0A>>> that OAuth 2.0 solved in the first place.=0A>>>=0A>>> -- Mike=
=0A>>>=0A>>> -----Original Message-----=0A>>> From: oauth-bounces@ietf.org =
<mailto:oauth-bounces@ietf.org>=0A>>> [mailto:oauth-bounces@ietf.org <mailt=
o:oauth-bounces@ietf.org>] On=0A>>> Behalf Of Justin Richer=0A>>> Sent: Tue=
sday, February 12, 2013 9:35 AM=0A>>> To: Phil Hunt=0A>>> Cc: IETF oauth WG=
=0A>>> Subject: Re: [OAUTH-WG] Minutes from the OAuth Design Team Conferenc=
e=0A>>> Call - 11th February 2013=0A>>>=0A>>> That's my reading of it as we=
ll, Phil, thanks for providing the=0A>>> clarification. One motivator behin=
d using a JSON-based token is to be=0A>>> able to re-use some of the great =
work that the JOSE group is doing=0A>>> but apply it to an HTTP payload.=0A=
>>>=0A>>> What neither of us want is a token type that requires stuffing al=
l=0A>>> query, header, and other parameters *into* the JSON object itself,=
=0A>>> which would be a more SOAPy approach.=0A>>>=0A>>> -- Justin=0A>>>=0A=
>>> On 02/12/2013 12:30 PM, Phil Hunt wrote:=0A>>> > Clarification. I think=
 Justin and I were in agreement that we don't=0A>>> want to see a format th=
at requires JSON payloads. We are both=0A>>> interested in a JSON token use=
d in the authorization header that=0A>>> could be based on a computed signa=
ture of some combination of http=0A>>> headers and body if possible.=0A>>> =
>=0A>>> > Phil=0A>>> >=0A>>> > @independentid=0A>>> > www.independentid.com=
 <http://www.independentid.com/>=0A>>> > phil.hunt@oracle.com <mailto:phil.=
hunt@oracle.com>=0A>>> >=0A>>> >=0A>>> >=0A>>> >=0A>>> >=0A>>> > On 2013-02=
-12, at 1:10 AM, Hannes Tschofenig wrote:=0A>>> >=0A>>> >> Here are my note=
s.=0A>>> >>=0A>>> >> Participants:=0A>>> >>=0A>>> >> * John Bradley=0A>>> >=
> * Derek Atkins=0A>>> >> * Phil Hunt=0A>>> >> * Prateek Mishra=0A>>> >> * =
Hannes Tschofenig=0A>>> >> * Mike Jones=0A>>> >> * Antonio Sanso=0A>>> >> *=
 Justin Richer=0A>>> >>=0A>>> >> Notes:=0A>>> >>=0A>>> >> My slides are ava=
ilable here:=0A>>> >> http://www.tschofenig.priv.at/OAuth2-Security-11Feb20=
13.ppt=0A>>> >>=0A>>> >> Slide #2 summarizes earlier discussions during the=
 conference calls.=0A>>> >>=0A>>> >> -- HTTP vs. JSON=0A>>> >>=0A>>> >> Phi=
l noted that he does not like to use the MAC Token draft as a=0A>>> startin=
g point because it does not re-use any of the work done in the=0A>>> JOSE w=
orking group and in particular all the libraries that are=0A>>> available t=
oday. He mentioned that earlier attempts to write the MAC=0A>>> Token code =
lead to problems for implementers.=0A>>> >>=0A>>> >> Justin responded that =
he does not agree with using JSON as a=0A>>> transport mechanism since this=
 would replicate a SOAP style.=0A>>> >>=0A>>> >> Phil noted that he wants t=
o send JSON but the signature shall be=0A>>> computed over the HTTP header =
field.=0A>>> >>=0A>>> >> -- Flexibility for the keyed message digest comput=
ation=0A>>> >>=0A>>> >> From earlier discussion it was clear that the confe=
rence call=0A>>> participants wanted more flexibility regarding the keyed m=
essage=0A>>> digest computation. For this purpose Hannes presented the DKIM=
 based=0A>>> approach, which allows selective header fields to be included =
in the=0A>>> digest. This is shown in slide #4.=0A>>> >>=0A>>> >> After som=
e discussion the conference call participants thought=0A>>> that this would=
 meet their needs. Further investigations would still=0A>>> be useful to de=
termine the degree of failed HMAC calculations due to=0A>>> HTTP proxies mo=
difying the content.=0A>>> >>=0A>>> >> -- Key Distribution=0A>>> >>=0A>>> >=
> Hannes presented the open issue regarding the choice of key=0A>>> >> dist=
ribution. Slides #6-#8 present three techniques and Hannes asked=0A>>> >> f=
or feedback regarding the preferred style. Justin and others didn't=0A>>> >=
> see the need to decide on one mechanism - they wanted to keep the=0A>>> >=
> choice open. Derek indicated that this will not be an acceptable=0A>>> >>=
 approach. Since the resource server and the authorization server may,=0A>>=
> >> in the OAuth 2.0 framework, be entities produced by different vendors=
=0A>>> >> there is an interoperability need. Justin responded that he disag=
rees=0A>>> >> and that the resource server needs to understand the access t=
oken and=0A>>> >> referred to the recent draft submission for the token int=
rospection=0A>>> >> endpoint. Derek indicated that the resource server has =
to understand=0A>>> >> the content of the access token and the token intros=
pection endpoint=0A>>> >> just pushes the problem around: the resource serv=
er has to send the=0A>>> >> access token to the authorization server and th=
en the resource server=0A>>> >> gets the result back (which he the=0A>>> n=
=0A>>> > a=0A>>> >> gain needs to understand) in order to make a meaningful=
=0A>>> authorization decision.=0A>>> >>=0A>>> >> Everyone agreed that the c=
lient must receive the session key from=0A>>> the authorization server and =
that this approach has to be=0A>>> standardized. It was also agreed that th=
is is a common approach among=0A>>> all three key distribution mechanisms.=
=0A>>> >>=0A>>> >> Hannes asked the participants to think about their prefe=
rence.=0A>>> >>=0A>>> >> The questions regarding key naming and the indicat=
ion for the=0A>>> intended resource server the client wants to talk to have=
 been postponed.=0A>>> >>=0A>>> >> Ciao=0A>>> >> Hannes=0A>>> >>=0A>>> >>=
=0A>>> >> _______________________________________________=0A>>> >> OAuth ma=
iling list=0A>>> >> OAuth@ietf.org <mailto:OAuth@ietf.org>=0A>>> >> https:/=
/www.ietf.org/mailman/listinfo/oauth=0A>>> > ______________________________=
_________________=0A>>> > OAuth mailing list=0A>>> > OAuth@ietf.org <mailto=
:OAuth@ietf.org>=0A>>> > https://www.ietf.org/mailman/listinfo/oauth=0A>>>=
=0A>>>=0A>>> _______________________________________________=0A>>> OAuth ma=
iling list=0A>>> OAuth@ietf.org <mailto:OAuth@ietf.org>=0A>>> https://www.i=
etf.org/mailman/listinfo/oauth=0A>>> ______________________________________=
_________=0A>>> OAuth mailing list=0A>>> OAuth@ietf.org <mailto:OAuth@ietf.=
org>=0A>>> https://www.ietf.org/mailman/listinfo/oauth=0A>>>=0A>>>=0A>>> __=
_____________________________________________=0A>>> OAuth mailing list=0A>>=
> OAuth@ietf.org <mailto:OAuth@ietf.org>=0A>>> https://www.ietf.org/mailman=
/listinfo/oauth=0A>>=0A>>=0A>=0A>=0A>=0A>=0A> _____________________________=
__________________=0A> OAuth mailing list=0A> OAuth@ietf.org=0A> https://ww=
w.ietf.org/mailman/listinfo/oauth=0A_______________________________________=
________=0AOAuth mailing list=0AOAuth@ietf.org=0Ahttps://www.ietf.org/mailm=
an/listinfo/oauth
--835683298-2140817601-1360952953=:58617
Content-Type: text/html; charset=iso-8859-1
Content-Transfer-Encoding: quoted-printable

<html><body><div style=3D"color:#000; background-color:#fff; font-family:Co=
urier New, courier, monaco, monospace, sans-serif;font-size:12pt"><div><spa=
n>At this point I am more in favor converting the MAC token format to JWT a=
nd getting the signature envelope added that way. &nbsp;It's really a matte=
r of time.</span></div><div style=3D"color: rgb(0, 0, 0); font-size: 16px; =
font-family: 'Courier New', courier, monaco, monospace, sans-serif; backgro=
und-color: transparent; font-style: normal;"><span><br></span></div><div st=
yle=3D"color: rgb(0, 0, 0); font-size: 16px; font-family: 'Courier New', co=
urier, monaco, monospace, sans-serif; background-color: transparent; font-s=
tyle: normal;"><span>MAC stalled because folks see the HOK tokens as a repl=
acement. &nbsp;</span></div><div style=3D"color: rgb(0, 0, 0); font-size: 1=
6px; font-family: 'Courier New', courier, monaco, monospace, sans-serif; ba=
ckground-color: transparent; font-style:
 normal;"><span><br></span></div><div style=3D"color: rgb(0, 0, 0); font-si=
ze: 16px; font-family: 'Courier New', courier, monaco, monospace, sans-seri=
f; background-color: transparent; font-style: normal;"><span>It's also been=
 a matter of Justin and I having the time to take it up again.</span></div>=
<div style=3D"color: rgb(0, 0, 0); font-size: 16px; font-family: 'Courier N=
ew', courier, monaco, monospace, sans-serif; background-color: transparent;=
 font-style: normal;"><span><br></span></div><div><br></div>  <div style=3D=
"font-family: 'Courier New', courier, monaco, monospace, sans-serif; font-s=
ize: 12pt;"> <div style=3D"font-family: 'times new roman', 'new york', time=
s, serif; font-size: 12pt;"> <div dir=3D"ltr"> <font size=3D"2" face=3D"Ari=
al"> <hr size=3D"1">  <b><span style=3D"font-weight:bold;">From:</span></b>=
 Sergey Beryozkin &lt;sberyozkin@gmail.com&gt;<br> <b><span style=3D"font-w=
eight: bold;">To:</span></b> oauth@ietf.org <br> <b><span style=3D"font-wei=
ght:
 bold;">Sent:</span></b> Friday, February 15, 2013 8:25 AM<br> <b><span sty=
le=3D"font-weight: bold;">Subject:</span></b> Re: [OAUTH-WG] Minutes from t=
he OAuth Design Team Conference Call - 11th February 2013<br> </font> </div=
> <br>=0AI wonder why it is proving so difficult to get a nearly completed =
MAC <br>draft completed ?<br>Is it because:<br>1. JWT was first in OAuth2 a=
nd thus it wins ?<br>2. MAC is not 'capable' enough as JWT is ?<br>3. Not e=
nough motivation for some vendors to push MAC ?<br><br>Example, in cases wh=
ere not a product but a development framework is <br>shipped (as with us fo=
r example), IMHO is it a big motivation to get MAC <br>done for the reasons=
 repeated many times. Or in case of migrating Flickr <br>users to OAuth2.<b=
r>I think I can see why no interest is there where nothing is really <br>ac=
hieved if JWT is used from the get go, no particular need to get OAuth <br>=
1.0 developers out there migrating to the particular products.<br><br>This =
is 3. Re 2, I think there was enough expressed to suggest that it <br>can c=
omplement JWT nicely. So far I'm inclined to think it is 3. and 2. <br>whic=
h stop it from being completed, with 3. 'contributing' indirectly <br>but
 significantly,<br><br>Just my 2c<br>Thanks, Sergey<br><br><br>On 15/02/13 =
16:09, William Mills wrote:<br>&gt; I'll repeat the use case for Flickr, wh=
ich requires OAuth 1.0a type<br>&gt; capabilites that OAuth 2 does not prov=
ide. Simply stating "move to<br>&gt; HTTPS" is not a viable response here.<=
br>&gt;<br>&gt; -----------------------------------------------------------=
-------------<br>&gt; *From:* Torsten Lodderstedt &lt;<a ymailto=3D"mailto:=
torsten@lodderstedt.net" href=3D"mailto:torsten@lodderstedt.net">torsten@lo=
dderstedt.net</a>&gt;<br>&gt; *To:* William Mills &lt;<a ymailto=3D"mailto:=
wmills_92105@yahoo.com" href=3D"mailto:wmills_92105@yahoo.com">wmills_92105=
@yahoo.com</a>&gt;<br>&gt; *Cc:* Mike Jones &lt;<a ymailto=3D"mailto:Michae=
l.Jones@microsoft.com" href=3D"mailto:Michael.Jones@microsoft.com">Michael.=
Jones@microsoft.com</a>&gt;; Justin Richer<br>&gt; &lt;<a ymailto=3D"mailto=
:jricher@mitre.org" href=3D"mailto:jricher@mitre.org">jricher@mitre.org</a>=
&gt;;
 Phil Hunt &lt;<a ymailto=3D"mailto:phil.hunt@oracle.com" href=3D"mailto:ph=
il.hunt@oracle.com">phil.hunt@oracle.com</a>&gt;; IETF oauth WG<br>&gt; &lt=
;<a ymailto=3D"mailto:oauth@ietf.org" href=3D"mailto:oauth@ietf.org">oauth@=
ietf.org</a>&gt;<br>&gt; *Sent:* Friday, February 15, 2013 7:22 AM<br>&gt; =
*Subject:* Re: [OAUTH-WG] Minutes from the OAuth Design Team Conference<br>=
&gt; Call - 11th February 2013<br>&gt;<br>&gt; Hi Bill,<br>&gt;<br>&gt; I t=
hink one needs to compare the costs/impact of HTTPS on one side and<br>&gt;=
 the implementation of integrity protection and replay detection on the<br>=
&gt; other. We had this discussion several times.<br>&gt;<br>&gt; regards,<=
br>&gt; Torsten.<br>&gt;<br>&gt; Am 15.02.2013 um 08:08 schrieb William Mil=
ls &lt;<a ymailto=3D"mailto:wmills_92105@yahoo.com" href=3D"mailto:wmills_9=
2105@yahoo.com">wmills_92105@yahoo.com</a><br>&gt; &lt;mailto:<a ymailto=3D=
"mailto:wmills_92105@yahoo.com"
 href=3D"mailto:wmills_92105@yahoo.com">wmills_92105@yahoo.com</a>&gt;&gt;:=
<br>&gt;<br>&gt;&gt; I fundamentally disagree with that too. OAuth 2 is the=
 *framework*,<br>&gt;&gt; one which supports multiple token types. Bearer t=
okens were the first<br>&gt;&gt; credential type defined.<br>&gt;&gt;<br>&g=
t;&gt; OAuth 1.0a also requires HTTPS transport for authentication and<br>&=
gt;&gt; getting the token.<br>&gt;&gt;<br>&gt;&gt; There are real use cases=
 for tokens usable over plain text with<br>&gt;&gt; integrity protection.<b=
r>&gt;&gt;<br>&gt;&gt; -bill<br>&gt;&gt;<br>&gt;&gt; ----------------------=
--------------------------------------------------<br>&gt;&gt; *From:* Tors=
ten Lodderstedt &lt;<a ymailto=3D"mailto:torsten@lodderstedt.net" href=3D"m=
ailto:torsten@lodderstedt.net">torsten@lodderstedt.net</a><br>&gt;&gt; &lt;=
mailto:<a ymailto=3D"mailto:torsten@lodderstedt.net" href=3D"mailto:torsten=
@lodderstedt.net">torsten@lodderstedt.net</a>&gt;&gt;<br>&gt;&gt; *To:*
 William Mills &lt;<a ymailto=3D"mailto:wmills_92105@yahoo.com" href=3D"mai=
lto:wmills_92105@yahoo.com">wmills_92105@yahoo.com</a><br>&gt;&gt; &lt;mail=
to:<a ymailto=3D"mailto:wmills_92105@yahoo.com" href=3D"mailto:wmills_92105=
@yahoo.com">wmills_92105@yahoo.com</a>&gt;&gt;<br>&gt;&gt; *Cc:* Mike Jones=
 &lt;<a ymailto=3D"mailto:Michael.Jones@microsoft.com" href=3D"mailto:Micha=
el.Jones@microsoft.com">Michael.Jones@microsoft.com</a><br>&gt;&gt; &lt;mai=
lto:<a ymailto=3D"mailto:Michael.Jones@microsoft.com" href=3D"mailto:Michae=
l.Jones@microsoft.com">Michael.Jones@microsoft.com</a>&gt;&gt;; Justin Rich=
er<br>&gt;&gt; &lt;<a ymailto=3D"mailto:jricher@mitre.org" href=3D"mailto:j=
richer@mitre.org">jricher@mitre.org</a> &lt;mailto:<a ymailto=3D"mailto:jri=
cher@mitre.org" href=3D"mailto:jricher@mitre.org">jricher@mitre.org</a>&gt;=
&gt;; Phil Hunt<br>&gt;&gt; &lt;<a ymailto=3D"mailto:phil.hunt@oracle.com" =
href=3D"mailto:phil.hunt@oracle.com">phil.hunt@oracle.com</a> &lt;mailto:<a
 ymailto=3D"mailto:phil.hunt@oracle.com" href=3D"mailto:phil.hunt@oracle.co=
m">phil.hunt@oracle.com</a>&gt;&gt;; IETF oauth WG<br>&gt;&gt; &lt;<a ymail=
to=3D"mailto:oauth@ietf.org" href=3D"mailto:oauth@ietf.org">oauth@ietf.org<=
/a> &lt;mailto:<a ymailto=3D"mailto:oauth@ietf.org" href=3D"mailto:oauth@ie=
tf.org">oauth@ietf.org</a>&gt;&gt;<br>&gt;&gt; *Sent:* Thursday, February 1=
4, 2013 10:05 PM<br>&gt;&gt; *Subject:* Re: [OAUTH-WG] Minutes from the OAu=
th Design Team<br>&gt;&gt; Conference Call - 11th February 2013<br>&gt;&gt;=
<br>&gt;&gt; Hi Bill,<br>&gt;&gt;<br>&gt;&gt; OAuth 2.0 took a different di=
rection by relying on HTTPS to provide<br>&gt;&gt; the basic protection. So=
 the need to have a token, which can be used<br>&gt;&gt; for service reques=
ts over plain HTTP is arguable. My understanding of<br>&gt;&gt; this activi=
ty was, the intend is to provide additional protection on<br>&gt;&gt; top o=
f HTTPS.<br>&gt;&gt;<br>&gt;&gt; regards,<br>&gt;&gt;
 Torsten.<br>&gt;&gt;<br>&gt;&gt; Am 15.02.2013 um 02:31 schrieb William Mi=
lls &lt;<a ymailto=3D"mailto:wmills_92105@yahoo.com" href=3D"mailto:wmills_=
92105@yahoo.com">wmills_92105@yahoo.com</a><br>&gt;&gt; &lt;mailto:<a ymail=
to=3D"mailto:wmills_92105@yahoo.com" href=3D"mailto:wmills_92105@yahoo.com"=
>wmills_92105@yahoo.com</a>&gt;&gt;:<br>&gt;&gt;<br>&gt;&gt;&gt; I disagree=
 with "That was the impediment to OAuth 1.0 adoption that<br>&gt;&gt;&gt; O=
Auth 2.0 solved in the first place.", unless "solving" means does<br>&gt;&g=
t;&gt; not address the need for it at all.<br>&gt;&gt;&gt;<br>&gt;&gt;&gt; =
OAuth 2 does several good things, but it still lacks a defined token<br>&gt=
;&gt;&gt; type that is safe to user over plain text HTTP. 1.0a solved that.=
<br>&gt;&gt;&gt;<br>&gt;&gt;&gt; ------------------------------------------=
------------------------------<br>&gt;&gt;&gt; *From:* Mike Jones &lt;<a ym=
ailto=3D"mailto:Michael.Jones@microsoft.com"
 href=3D"mailto:Michael.Jones@microsoft.com">Michael.Jones@microsoft.com</a=
><br>&gt;&gt;&gt; &lt;mailto:<a ymailto=3D"mailto:Michael.Jones@microsoft.c=
om" href=3D"mailto:Michael.Jones@microsoft.com">Michael.Jones@microsoft.com=
</a>&gt;&gt;<br>&gt;&gt;&gt; *To:* Justin Richer &lt;<a ymailto=3D"mailto:j=
richer@mitre.org" href=3D"mailto:jricher@mitre.org">jricher@mitre.org</a> &=
lt;mailto:<a ymailto=3D"mailto:jricher@mitre.org" href=3D"mailto:jricher@mi=
tre.org">jricher@mitre.org</a>&gt;&gt;;<br>&gt;&gt;&gt; Phil Hunt &lt;<a ym=
ailto=3D"mailto:phil.hunt@oracle.com" href=3D"mailto:phil.hunt@oracle.com">=
phil.hunt@oracle.com</a> &lt;mailto:<a ymailto=3D"mailto:phil.hunt@oracle.c=
om" href=3D"mailto:phil.hunt@oracle.com">phil.hunt@oracle.com</a>&gt;&gt;<b=
r>&gt;&gt;&gt; *Cc:* IETF oauth WG &lt;<a ymailto=3D"mailto:oauth@ietf.org"=
 href=3D"mailto:oauth@ietf.org">oauth@ietf.org</a> &lt;mailto:<a ymailto=3D=
"mailto:oauth@ietf.org" href=3D"mailto:oauth@ietf.org">oauth@ietf.org</a>&g=
t;&gt;<br>&gt;&gt;&gt;
 *Sent:* Thursday, February 14, 2013 1:44 PM<br>&gt;&gt;&gt; *Subject:* Re:=
 [OAUTH-WG] Minutes from the OAuth Design Team<br>&gt;&gt;&gt; Conference C=
all - 11th February 2013<br>&gt;&gt;&gt;<br>&gt;&gt;&gt; I'm in favor of re=
using the JWT work that this WG is also doing. :-)<br>&gt;&gt;&gt;<br>&gt;&=
gt;&gt; I'm pretty skeptical of us inventing another custom scheme for<br>&=
gt;&gt;&gt; signing HTTP headers. That was the impediment to OAuth 1.0 adop=
tion<br>&gt;&gt;&gt; that OAuth 2.0 solved in the first place.<br>&gt;&gt;&=
gt;<br>&gt;&gt;&gt; -- Mike<br>&gt;&gt;&gt;<br>&gt;&gt;&gt; -----Original M=
essage-----<br>&gt;&gt;&gt; From: <a ymailto=3D"mailto:oauth-bounces@ietf.o=
rg" href=3D"mailto:oauth-bounces@ietf.org">oauth-bounces@ietf.org</a> &lt;m=
ailto:<a ymailto=3D"mailto:oauth-bounces@ietf.org" href=3D"mailto:oauth-bou=
nces@ietf.org">oauth-bounces@ietf.org</a>&gt;<br>&gt;&gt;&gt; [mailto:<a ym=
ailto=3D"mailto:oauth-bounces@ietf.org"
 href=3D"mailto:oauth-bounces@ietf.org">oauth-bounces@ietf.org</a> &lt;mail=
to:<a ymailto=3D"mailto:oauth-bounces@ietf.org" href=3D"mailto:oauth-bounce=
s@ietf.org">oauth-bounces@ietf.org</a>&gt;] On<br>&gt;&gt;&gt; Behalf Of Ju=
stin Richer<br>&gt;&gt;&gt; Sent: Tuesday, February 12, 2013 9:35 AM<br>&gt=
;&gt;&gt; To: Phil Hunt<br>&gt;&gt;&gt; Cc: IETF oauth WG<br>&gt;&gt;&gt; S=
ubject: Re: [OAUTH-WG] Minutes from the OAuth Design Team Conference<br>&gt=
;&gt;&gt; Call - 11th February 2013<br>&gt;&gt;&gt;<br>&gt;&gt;&gt; That's =
my reading of it as well, Phil, thanks for providing the<br>&gt;&gt;&gt; cl=
arification. One motivator behind using a JSON-based token is to be<br>&gt;=
&gt;&gt; able to re-use some of the great work that the JOSE group is doing=
<br>&gt;&gt;&gt; but apply it to an HTTP payload.<br>&gt;&gt;&gt;<br>&gt;&g=
t;&gt; What neither of us want is a token type that requires stuffing all<b=
r>&gt;&gt;&gt; query, header, and other parameters *into* the JSON object
 itself,<br>&gt;&gt;&gt; which would be a more SOAPy approach.<br>&gt;&gt;&=
gt;<br>&gt;&gt;&gt; -- Justin<br>&gt;&gt;&gt;<br>&gt;&gt;&gt; On 02/12/2013=
 12:30 PM, Phil Hunt wrote:<br>&gt;&gt;&gt; &gt; Clarification. I think Jus=
tin and I were in agreement that we don't<br>&gt;&gt;&gt; want to see a for=
mat that requires JSON payloads. We are both<br>&gt;&gt;&gt; interested in =
a JSON token used in the authorization header that<br>&gt;&gt;&gt; could be=
 based on a computed signature of some combination of http<br>&gt;&gt;&gt; =
headers and body if possible.<br>&gt;&gt;&gt; &gt;<br>&gt;&gt;&gt; &gt; Phi=
l<br>&gt;&gt;&gt; &gt;<br>&gt;&gt;&gt; &gt; @independentid<br>&gt;&gt;&gt; =
&gt; www.independentid.com &lt;<a href=3D"http://www.independentid.com/" ta=
rget=3D"_blank">http://www.independentid.com/</a>&gt;<br>&gt;&gt;&gt; &gt; =
<a ymailto=3D"mailto:phil.hunt@oracle.com" href=3D"mailto:phil.hunt@oracle.=
com">phil.hunt@oracle.com</a> &lt;mailto:<a
 ymailto=3D"mailto:phil.hunt@oracle.com" href=3D"mailto:phil.hunt@oracle.co=
m">phil.hunt@oracle.com</a>&gt;<br>&gt;&gt;&gt; &gt;<br>&gt;&gt;&gt; &gt;<b=
r>&gt;&gt;&gt; &gt;<br>&gt;&gt;&gt; &gt;<br>&gt;&gt;&gt; &gt;<br>&gt;&gt;&g=
t; &gt; On 2013-02-12, at 1:10 AM, Hannes Tschofenig wrote:<br>&gt;&gt;&gt;=
 &gt;<br>&gt;&gt;&gt; &gt;&gt; Here are my notes.<br>&gt;&gt;&gt; &gt;&gt;<=
br>&gt;&gt;&gt; &gt;&gt; Participants:<br>&gt;&gt;&gt; &gt;&gt;<br>&gt;&gt;=
&gt; &gt;&gt; * John Bradley<br>&gt;&gt;&gt; &gt;&gt; * Derek Atkins<br>&gt=
;&gt;&gt; &gt;&gt; * Phil Hunt<br>&gt;&gt;&gt; &gt;&gt; * Prateek Mishra<br=
>&gt;&gt;&gt; &gt;&gt; * Hannes Tschofenig<br>&gt;&gt;&gt; &gt;&gt; * Mike =
Jones<br>&gt;&gt;&gt; &gt;&gt; * Antonio Sanso<br>&gt;&gt;&gt; &gt;&gt; * J=
ustin Richer<br>&gt;&gt;&gt; &gt;&gt;<br>&gt;&gt;&gt; &gt;&gt; Notes:<br>&g=
t;&gt;&gt; &gt;&gt;<br>&gt;&gt;&gt; &gt;&gt; My slides are available here:<=
br>&gt;&gt;&gt; &gt;&gt; <a
 href=3D"http://www.tschofenig.priv.at/OAuth2-Security-11Feb2013.ppt" targe=
t=3D"_blank">http://www.tschofenig.priv.at/OAuth2-Security-11Feb2013.ppt</a=
><br>&gt;&gt;&gt; &gt;&gt;<br>&gt;&gt;&gt; &gt;&gt; Slide #2 summarizes ear=
lier discussions during the conference calls.<br>&gt;&gt;&gt; &gt;&gt;<br>&=
gt;&gt;&gt; &gt;&gt; -- HTTP vs. JSON<br>&gt;&gt;&gt; &gt;&gt;<br>&gt;&gt;&=
gt; &gt;&gt; Phil noted that he does not like to use the MAC Token draft as=
 a<br>&gt;&gt;&gt; starting point because it does not re-use any of the wor=
k done in the<br>&gt;&gt;&gt; JOSE working group and in particular all the =
libraries that are<br>&gt;&gt;&gt; available today. He mentioned that earli=
er attempts to write the MAC<br>&gt;&gt;&gt; Token code lead to problems fo=
r implementers.<br>&gt;&gt;&gt; &gt;&gt;<br>&gt;&gt;&gt; &gt;&gt; Justin re=
sponded that he does not agree with using JSON as a<br>&gt;&gt;&gt; transpo=
rt mechanism since this would replicate a SOAP style.<br>&gt;&gt;&gt;
 &gt;&gt;<br>&gt;&gt;&gt; &gt;&gt; Phil noted that he wants to send JSON bu=
t the signature shall be<br>&gt;&gt;&gt; computed over the HTTP header fiel=
d.<br>&gt;&gt;&gt; &gt;&gt;<br>&gt;&gt;&gt; &gt;&gt; -- Flexibility for the=
 keyed message digest computation<br>&gt;&gt;&gt; &gt;&gt;<br>&gt;&gt;&gt; =
&gt;&gt; From earlier discussion it was clear that the conference call<br>&=
gt;&gt;&gt; participants wanted more flexibility regarding the keyed messag=
e<br>&gt;&gt;&gt; digest computation. For this purpose Hannes presented the=
 DKIM based<br>&gt;&gt;&gt; approach, which allows selective header fields =
to be included in the<br>&gt;&gt;&gt; digest. This is shown in slide #4.<br=
>&gt;&gt;&gt; &gt;&gt;<br>&gt;&gt;&gt; &gt;&gt; After some discussion the c=
onference call participants thought<br>&gt;&gt;&gt; that this would meet th=
eir needs. Further investigations would still<br>&gt;&gt;&gt; be useful to =
determine the degree of failed HMAC calculations due
 to<br>&gt;&gt;&gt; HTTP proxies modifying the content.<br>&gt;&gt;&gt; &gt=
;&gt;<br>&gt;&gt;&gt; &gt;&gt; -- Key Distribution<br>&gt;&gt;&gt; &gt;&gt;=
<br>&gt;&gt;&gt; &gt;&gt; Hannes presented the open issue regarding the cho=
ice of key<br>&gt;&gt;&gt; &gt;&gt; distribution. Slides #6-#8 present thre=
e techniques and Hannes asked<br>&gt;&gt;&gt; &gt;&gt; for feedback regardi=
ng the preferred style. Justin and others didn't<br>&gt;&gt;&gt; &gt;&gt; s=
ee the need to decide on one mechanism - they wanted to keep the<br>&gt;&gt=
;&gt; &gt;&gt; choice open. Derek indicated that this will not be an accept=
able<br>&gt;&gt;&gt; &gt;&gt; approach. Since the resource server and the a=
uthorization server may,<br>&gt;&gt;&gt; &gt;&gt; in the OAuth 2.0 framewor=
k, be entities produced by different vendors<br>&gt;&gt;&gt; &gt;&gt; there=
 is an interoperability need. Justin responded that he disagrees<br>&gt;&gt=
;&gt; &gt;&gt; and that the resource server needs to understand the
 access token and<br>&gt;&gt;&gt; &gt;&gt; referred to the recent draft sub=
mission for the token introspection<br>&gt;&gt;&gt; &gt;&gt; endpoint. Dere=
k indicated that the resource server has to understand<br>&gt;&gt;&gt; &gt;=
&gt; the content of the access token and the token introspection endpoint<b=
r>&gt;&gt;&gt; &gt;&gt; just pushes the problem around: the resource server=
 has to send the<br>&gt;&gt;&gt; &gt;&gt; access token to the authorization=
 server and then the resource server<br>&gt;&gt;&gt; &gt;&gt; gets the resu=
lt back (which he the<br>&gt;&gt;&gt; n<br>&gt;&gt;&gt; &gt; a<br>&gt;&gt;&=
gt; &gt;&gt; gain needs to understand) in order to make a meaningful<br>&gt=
;&gt;&gt; authorization decision.<br>&gt;&gt;&gt; &gt;&gt;<br>&gt;&gt;&gt; =
&gt;&gt; Everyone agreed that the client must receive the session key from<=
br>&gt;&gt;&gt; the authorization server and that this approach has to be<b=
r>&gt;&gt;&gt; standardized. It was also agreed that this is a
 common approach among<br>&gt;&gt;&gt; all three key distribution mechanism=
s.<br>&gt;&gt;&gt; &gt;&gt;<br>&gt;&gt;&gt; &gt;&gt; Hannes asked the parti=
cipants to think about their preference.<br>&gt;&gt;&gt; &gt;&gt;<br>&gt;&g=
t;&gt; &gt;&gt; The questions regarding key naming and the indication for t=
he<br>&gt;&gt;&gt; intended resource server the client wants to talk to hav=
e been postponed.<br>&gt;&gt;&gt; &gt;&gt;<br>&gt;&gt;&gt; &gt;&gt; Ciao<br=
>&gt;&gt;&gt; &gt;&gt; Hannes<br>&gt;&gt;&gt; &gt;&gt;<br>&gt;&gt;&gt; &gt;=
&gt;<br>&gt;&gt;&gt; &gt;&gt; _____________________________________________=
__<br>&gt;&gt;&gt; &gt;&gt; OAuth mailing list<br>&gt;&gt;&gt; &gt;&gt; <a =
ymailto=3D"mailto:OAuth@ietf.org" href=3D"mailto:OAuth@ietf.org">OAuth@ietf=
.org</a> &lt;mailto:<a ymailto=3D"mailto:OAuth@ietf.org" href=3D"mailto:OAu=
th@ietf.org">OAuth@ietf.org</a>&gt;<br>&gt;&gt;&gt; &gt;&gt; <a href=3D"htt=
ps://www.ietf.org/mailman/listinfo/oauth"
 target=3D"_blank">https://www.ietf.org/mailman/listinfo/oauth</a><br>&gt;&=
gt;&gt; &gt; _______________________________________________<br>&gt;&gt;&gt=
; &gt; OAuth mailing list<br>&gt;&gt;&gt; &gt; <a ymailto=3D"mailto:OAuth@i=
etf.org" href=3D"mailto:OAuth@ietf.org">OAuth@ietf.org</a> &lt;mailto:<a ym=
ailto=3D"mailto:OAuth@ietf.org" href=3D"mailto:OAuth@ietf.org">OAuth@ietf.o=
rg</a>&gt;<br>&gt;&gt;&gt; &gt; <a href=3D"https://www.ietf.org/mailman/lis=
tinfo/oauth" target=3D"_blank">https://www.ietf.org/mailman/listinfo/oauth<=
/a><br>&gt;&gt;&gt;<br>&gt;&gt;&gt;<br>&gt;&gt;&gt; _______________________=
________________________<br>&gt;&gt;&gt; OAuth mailing list<br>&gt;&gt;&gt;=
 <a ymailto=3D"mailto:OAuth@ietf.org" href=3D"mailto:OAuth@ietf.org">OAuth@=
ietf.org</a> &lt;mailto:<a ymailto=3D"mailto:OAuth@ietf.org" href=3D"mailto=
:OAuth@ietf.org">OAuth@ietf.org</a>&gt;<br>&gt;&gt;&gt; <a href=3D"https://=
www.ietf.org/mailman/listinfo/oauth"
 target=3D"_blank">https://www.ietf.org/mailman/listinfo/oauth</a><br>&gt;&=
gt;&gt; _______________________________________________<br>&gt;&gt;&gt; OAu=
th mailing list<br>&gt;&gt;&gt; <a ymailto=3D"mailto:OAuth@ietf.org" href=
=3D"mailto:OAuth@ietf.org">OAuth@ietf.org</a> &lt;mailto:<a ymailto=3D"mail=
to:OAuth@ietf.org" href=3D"mailto:OAuth@ietf.org">OAuth@ietf.org</a>&gt;<br=
>&gt;&gt;&gt; <a href=3D"https://www.ietf.org/mailman/listinfo/oauth" targe=
t=3D"_blank">https://www.ietf.org/mailman/listinfo/oauth</a><br>&gt;&gt;&gt=
;<br>&gt;&gt;&gt;<br>&gt;&gt;&gt; _________________________________________=
______<br>&gt;&gt;&gt; OAuth mailing list<br>&gt;&gt;&gt; <a ymailto=3D"mai=
lto:OAuth@ietf.org" href=3D"mailto:OAuth@ietf.org">OAuth@ietf.org</a> &lt;m=
ailto:<a ymailto=3D"mailto:OAuth@ietf.org" href=3D"mailto:OAuth@ietf.org">O=
Auth@ietf.org</a>&gt;<br>&gt;&gt;&gt; <a href=3D"https://www.ietf.org/mailm=
an/listinfo/oauth"
 target=3D"_blank">https://www.ietf.org/mailman/listinfo/oauth</a><br>&gt;&=
gt;<br>&gt;&gt;<br>&gt;<br>&gt;<br>&gt;<br>&gt;<br>&gt; ___________________=
____________________________<br>&gt; OAuth mailing list<br>&gt; <a ymailto=
=3D"mailto:OAuth@ietf.org" href=3D"mailto:OAuth@ietf.org">OAuth@ietf.org</a=
><br>&gt; <a href=3D"https://www.ietf.org/mailman/listinfo/oauth" target=3D=
"_blank">https://www.ietf.org/mailman/listinfo/oauth</a><br>_______________=
________________________________<br>OAuth mailing list<br><a ymailto=3D"mai=
lto:OAuth@ietf.org" href=3D"mailto:OAuth@ietf.org">OAuth@ietf.org</a><br><a=
 href=3D"https://www.ietf.org/mailman/listinfo/oauth" target=3D"_blank">htt=
ps://www.ietf.org/mailman/listinfo/oauth</a><br><br><br> </div> </div>  </d=
iv></body></html>
--835683298-2140817601-1360952953=:58617--

From wmills_92105@yahoo.com  Fri Feb 15 12:50:45 2013
Return-Path: <wmills_92105@yahoo.com>
X-Original-To: oauth@ietfa.amsl.com
Delivered-To: oauth@ietfa.amsl.com
Received: from localhost (localhost [127.0.0.1]) by ietfa.amsl.com (Postfix) with ESMTP id 7134521F8614 for <oauth@ietfa.amsl.com>; Fri, 15 Feb 2013 12:50:45 -0800 (PST)
X-Virus-Scanned: amavisd-new at amsl.com
X-Spam-Flag: NO
X-Spam-Score: -2.294
X-Spam-Level: 
X-Spam-Status: No, score=-2.294 tagged_above=-999 required=5 tests=[AWL=0.304,  BAYES_00=-2.599, HTML_MESSAGE=0.001]
Received: from mail.ietf.org ([64.170.98.30]) by localhost (ietfa.amsl.com [127.0.0.1]) (amavisd-new, port 10024) with ESMTP id vOwsKXH7sYaW for <oauth@ietfa.amsl.com>; Fri, 15 Feb 2013 12:50:43 -0800 (PST)
Received: from nm14-vm0.bullet.mail.bf1.yahoo.com (nm14-vm0.bullet.mail.bf1.yahoo.com [98.139.213.164]) by ietfa.amsl.com (Postfix) with SMTP id 6776221F85ED for <oauth@ietf.org>; Fri, 15 Feb 2013 12:50:43 -0800 (PST)
Received: from [98.139.215.142] by nm14.bullet.mail.bf1.yahoo.com with NNFMP; 15 Feb 2013 20:50:36 -0000
Received: from [98.139.212.205] by tm13.bullet.mail.bf1.yahoo.com with NNFMP; 15 Feb 2013 20:50:36 -0000
Received: from [127.0.0.1] by omp1014.mail.bf1.yahoo.com with NNFMP; 15 Feb 2013 20:50:36 -0000
X-Yahoo-Newman-Property: ymail-3
X-Yahoo-Newman-Id: 425468.79360.bm@omp1014.mail.bf1.yahoo.com
Received: (qmail 44837 invoked by uid 60001); 15 Feb 2013 20:50:36 -0000
DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=yahoo.com; s=s1024; t=1360961435; bh=WEixqA4rerZbydylAyW56DOw3FOvgO+Ug6fFyDRcwo8=; h=X-YMail-OSG:Received:X-Rocket-MIMEInfo:X-Mailer:References:Message-ID:Date:From:Reply-To:Subject:To:Cc:In-Reply-To:MIME-Version:Content-Type; b=lLeRONyKGvtrHnqsfgUiFZt4yDSyjLwiGeGaKxwSWmyjCEMwi6o9Fkr4OsU/CXTkFHakGpaBzRaj9vsoiJl4c/+6eFs3H3J1sja5iP//0JEE8TvA3sy0+h5U+LzKQvL11vg2uW8mH8357FSC7IK13x3rLHOBmZ4PplKOIk9ip5I=
DomainKey-Signature: a=rsa-sha1; q=dns; c=nofws; s=s1024; d=yahoo.com; h=X-YMail-OSG:Received:X-Rocket-MIMEInfo:X-Mailer:References:Message-ID:Date:From:Reply-To:Subject:To:Cc:In-Reply-To:MIME-Version:Content-Type; b=PR+Tyy2RZsOtQ4WeNKBB3VROzKRfM782e6hY7JYxW2wuw7SsqE7h6Bc4Kv+Ap9XKLfTXoTsPlbBekJl0gfomU0/I42WZD8uFoa8/o+C7+zn6AmKqSchINRp+ZsZpqggbh74BL749QII1wDkrd5C8VWxKtOGhqzE6ygSSuM3ywE0=;
X-YMail-OSG: rDOAlNYVM1mkT_ETVaQcWjaqHLO4xnpbu6lr6.2XDVZjFZj AM5eZWhJ97OlI.fpEwoZXSudOrBBZJin21seBLYnFSYjM08VW62j3mc7PKqy VcdvOC1lQnJGinxU9aDoUrd9nwrIcpjsMl_qLywXdpO88KZuf_rNbUIU0c07 kyxHv89fJueWU82yHhEkq4ZYtMxH4a3gD1RSvN.iXiDfiyrUIjDZA9nSJ4WF 0Mak3OMQpNikpSwBrfiYHrBM7wZSH4usgxZNu04ugOYtwqTJ5YGEhfb.hOZn IU.pMk0xe7pl5bk.bflwhlkuw5jpGrEEjNRNClXJeRlBVdVAloaCKuPtzQto P_b2zbYvf68FZ_C_bimoEIKOCCNpyavsrVdCF.9nRHpJ04cb8XklpPkSSaF8 uXH0l6pf3W7_0iHuzLh8qG09z5BHtBspG_sY_.waFlycPk9TXaguVMNyZb0N ndgzgv6oRYCAuCtrbxRTbhFreaAV_HMHfw97a7n2TqNsfzvlmBYcXl9.TUt. 8lboRqYbjv6jYNGQaFXMWNB9xaAKgNVSHiQ7FqpQsa2OCFtpB.i33alnT39M Sj_2UDYy_.oYCEHIRW4CdYSCtxLz6kKwZIDuPMwJedxmNd_xodgJ3JR._5a0 ZXcu7pgj6JhXV6ToQymF3IHdHo4WssRJhhRD4mNH4_T__CZkRGkx8A0gxDiw o2ZOWZuob.9T6gpmJNDZpCOo0ClFWwYViHBI2DoKhQ2.p.hvlNg--
Received: from [209.131.62.145] by web31801.mail.mud.yahoo.com via HTTP; Fri, 15 Feb 2013 12:50:34 PST
X-Rocket-MIMEInfo: 001.001, QmVjYXVzZSB3ZSdyZSBnb2lnbiB0byB3YW50IGEgc2luZ2xlIGltcGxlbWVudGF0aW9uLCBub3QgTi4KCgpfX19fX19fX19fX19fX19fX19fX19fX19fX19fX19fXwogRnJvbTogVGltIEJyYXkgPHR3YnJheUBnb29nbGUuY29tPgpUbzogV2lsbGlhbSBNaWxscyA8d21pbGxzXzkyMTA1QHlhaG9vLmNvbT4gCkNjOiBUb3JzdGVuIExvZGRlcnN0ZWR0IDx0b3JzdGVuQGxvZGRlcnN0ZWR0Lm5ldD47IElFVEYgb2F1dGggV0cgPG9hdXRoQGlldGYub3JnPiAKU2VudDogRnJpZGF5LCBGZWJydWFyeSAxNSwgMjAxMyABMAEBAQE-
X-Mailer: YahooMailWebService/0.8.134.513
References: <0573984A-8C11-4960-9BC6-F44D4B664C19@gmx.net> <E808B6AC-D5F6-479F-967D-EA6B2586BE64@oracle.com> <511A7D27.8010209@mitre.org> <4E1F6AAD24975D4BA5B16804296739436744BD23@TK5EX14MBXC285.redmond.corp.microsoft.com> <1360891897.14004.YahooMailNeo@web31811.mail.mud.yahoo.com> <E7EBF78C-37EB-4737-8DD5-0F24C9FACA60@lodderstedt.net> <1360912115.36543.YahooMailNeo@web31811.mail.mud.yahoo.com> <2A0F585F-2CEF-418D-9654-5084E6C9BD0D@lodderstedt.net> <1360944589.51724.YahooMailNeo@web31808.mail.mud.yahoo.com> <CA+ZpN24dWAGtZR2aQcqC_N+sHsp7zBVe42LDbrkAsqNVqQPv0w@mail.gmail.com>
Message-ID: <1360961434.42688.YahooMailNeo@web31801.mail.mud.yahoo.com>
Date: Fri, 15 Feb 2013 12:50:34 -0800 (PST)
From: William Mills <wmills_92105@yahoo.com>
To: Tim Bray <twbray@google.com>
In-Reply-To: <CA+ZpN24dWAGtZR2aQcqC_N+sHsp7zBVe42LDbrkAsqNVqQPv0w@mail.gmail.com>
MIME-Version: 1.0
Content-Type: multipart/alternative; boundary="-368338466-484310537-1360961434=:42688"
Cc: IETF oauth WG <oauth@ietf.org>
Subject: Re: [OAUTH-WG] Minutes from the OAuth Design Team Conference Call - 11th February 2013
X-BeenThere: oauth@ietf.org
X-Mailman-Version: 2.1.12
Precedence: list
Reply-To: William Mills <wmills_92105@yahoo.com>
List-Id: OAUTH WG <oauth.ietf.org>
List-Unsubscribe: <https://www.ietf.org/mailman/options/oauth>, <mailto:oauth-request@ietf.org?subject=unsubscribe>
List-Archive: <http://www.ietf.org/mail-archive/web/oauth>
List-Post: <mailto:oauth@ietf.org>
List-Help: <mailto:oauth-request@ietf.org?subject=help>
List-Subscribe: <https://www.ietf.org/mailman/listinfo/oauth>, <mailto:oauth-request@ietf.org?subject=subscribe>
X-List-Received-Date: Fri, 15 Feb 2013 20:50:45 -0000

---368338466-484310537-1360961434=:42688
Content-Type: text/plain; charset=utf-8
Content-Transfer-Encoding: quoted-printable

Because we're goign to want a single implementation, not N.=0A=0A=0A_______=
_________________________=0A From: Tim Bray <twbray@google.com>=0ATo: Willi=
am Mills <wmills_92105@yahoo.com> =0ACc: Torsten Lodderstedt <torsten@lodde=
rstedt.net>; IETF oauth WG <oauth@ietf.org> =0ASent: Friday, February 15, 2=
013 8:49 AM=0ASubject: Re: [OAUTH-WG] Minutes from the OAuth Design Team Co=
nference Call - 11th February 2013=0A =0A=0ANot deeply acquainted with the =
Flickr scenario, but it occurs to me to ask: If OAuth 1.0 is working well f=
or them, why don=E2=80=99t they just keep using it? =C2=A0I.e. if there=E2=
=80=99s already a good solution in place for people who require secure auth=
n/authz over insecure channels, why would we go the extra work of duplicati=
ng that in OAuth 2 territory? -T=0A=0A=0AOn Fri, Feb 15, 2013 at 8:09 AM, W=
illiam Mills <wmills_92105@yahoo.com> wrote:=0A=0AI'll repeat the use case =
for Flickr, which requires OAuth 1.0a type capabilites that OAuth 2 does no=
t provide. =C2=A0Simply stating "move to HTTPS" is not a viable response he=
re. =C2=A0=0A>=0A>=0A>=0A>________________________________=0A> From: Torste=
n Lodderstedt <torsten@lodderstedt.net>=0A>To: William Mills <wmills_92105@=
yahoo.com> =0A>Cc: Mike Jones <Michael.Jones@microsoft.com>; Justin Richer =
<jricher@mitre.org>; Phil Hunt <phil.hunt@oracle.com>; IETF oauth WG <oauth=
@ietf.org> =0A>Sent: Friday, February 15, 2013 7:22 AM=0A>Subject: Re: [OAU=
TH-WG] Minutes from the OAuth Design Team Conference Call - 11th February 2=
013=0A> =0A>=0A>Hi Bill,=0A>=0A>=0A>I think one needs to compare the costs/=
impact of HTTPS on one side and the implementation of integrity protection =
and replay detection on the other. We had this discussion several times.=0A=
>=0A>=0A>regards,=0A>Torsten.=0A>=0A>Am 15.02.2013 um 08:08 schrieb William=
 Mills <wmills_92105@yahoo.com>:=0A>=0A>=0A>I fundamentally disagree with t=
hat too. =C2=A0OAuth 2 is the *framework*, one which supports multiple toke=
n types. =C2=A0Bearer tokens were the first credential type defined.=0A>>=
=0A>>=0A>>OAuth 1.0a also requires HTTPS transport for authentication and g=
etting the token.=0A>>=0A>>=0A>>There are =C2=A0real use cases for tokens u=
sable over plain text with integrity protection.=0A>>=0A>>=0A>>-bill=0A>>=
=0A>>=0A>>=0A>>________________________________=0A>> From: Torsten Lodderst=
edt <torsten@lodderstedt.net>=0A>>To: William Mills <wmills_92105@yahoo.com=
> =0A>>Cc: Mike Jones <Michael.Jones@microsoft.com>; Justin Richer <jricher=
@mitre.org>; Phil Hunt <phil.hunt@oracle.com>; IETF oauth WG <oauth@ietf.or=
g> =0A>>Sent: Thursday, February 14, 2013 10:05 PM=0A>>Subject: Re: [OAUTH-=
WG] Minutes from the OAuth Design Team Conference Call - 11th February 2013=
=0A>> =0A>>=0A>>Hi Bill,=0A>>=0A>>=0A>>OAuth 2.0 took a different direction=
 by relying on HTTPS to provide the basic protection. So the need to have a=
 token, which can be used for service requests over plain HTTP is arguable.=
 My understanding of this activity was, the intend is to provide additional=
 protection on top of HTTPS.=0A>>=0A>>=0A>>regards,=0A>>Torsten.=0A>>=0A>>A=
m 15.02.2013 um 02:31 schrieb William Mills <wmills_92105@yahoo.com>:=0A>>=
=0A>>=0A>>I disagree with "That was the impediment to OAuth 1.0 adoption th=
at OAuth 2.0 solved in the first place.", unless "solving" means does not a=
ddress the need for it at all.=0A>>>=0A>>>=0A>>>OAuth 2 does several good t=
hings, but it still lacks a defined token type that is safe to user over pl=
ain text HTTP. =C2=A01.0a solved that.=0A>>>=0A>>>=0A>>>=0A>>>_____________=
___________________=0A>>> From: Mike Jones <Michael.Jones@microsoft.com>=0A=
>>>To: Justin Richer <jricher@mitre.org>; Phil Hunt <phil.hunt@oracle.com> =
=0A>>>Cc: IETF oauth WG <oauth@ietf.org> =0A>>>Sent: Thursday, February 14,=
 2013 1:44 PM=0A>>>Subject: Re: [OAUTH-WG] Minutes from the OAuth Design Te=
am Conference Call - 11th February 2013=0A>>> =0A>>>I'm in favor of reusing=
 the JWT work that this WG is also doing. :-)=0A>>>=0A>>>I'm pretty skeptic=
al of us inventing another custom scheme for signing HTTP headers.=C2=A0 Th=
at was the impediment to OAuth 1.0 adoption that OAuth 2.0 solved in the fi=
rst place.=0A>>>=0A>>>=C2=A0=C2=A0=C2=A0 =C2=A0=C2=A0=C2=A0 =C2=A0=C2=A0=C2=
=A0 =C2=A0=C2=A0=C2=A0 -- Mike=0A>>>=0A>>>-----Original Message-----=0A>>>F=
rom: oauth-bounces@ietf.org [mailto:oauth-bounces@ietf.org] On Behalf Of Ju=
stin Richer=0A>>>Sent: Tuesday, February 12, 2013 9:35 AM=0A>>>To: Phil Hun=
t=0A>>>Cc: IETF oauth WG=0A>>>Subject: Re: [OAUTH-WG] Minutes from the OAut=
h Design Team Conference Call - 11th February 2013=0A>>>=0A>>>That's my rea=
ding of it as well, Phil, thanks for providing the clarification.=0A One mo=
tivator behind using a JSON-based token is to be able to=0A re-use some of =
the great work that the JOSE group is doing but apply it to an HTTP payload=
.=0A>>>=0A>>>What neither of us want is a token type that requires stuffing=
 all query, header, and other parameters *into* the JSON object itself, whi=
ch would be a more SOAPy approach.=0A>>>=0A>>>=C2=A0 -- Justin=0A>>>=0A>>>O=
n 02/12/2013 12:30 PM, Phil Hunt wrote:=0A>>>> Clarification.=C2=A0 I think=
 Justin and I were in agreement that we don't want to see a format that req=
uires JSON payloads.=C2=A0 We are both interested in a JSON token used in t=
he authorization header that could be based on a computed signature of some=
 combination of http headers and body if possible.=0A>>>>=0A>>>> Phil=0A>>>=
>=0A>>>> @independentid=0A>>>> www.independentid.com=0A>>>> phil.hunt@oracl=
e.com=0A>>>>=0A>>>>=0A>>>>=0A>>>>=0A>>>>=0A>>>> On=0A 2013-02-12, at 1:10 A=
M, Hannes Tschofenig wrote:=0A>>>>=0A>>>>> Here are my notes.=0A>>>>>=0A>>>=
>> Participants:=0A>>>>>=0A>>>>> * John Bradley=0A>>>>> * Derek Atkins=0A>>=
>>> * Phil Hunt=0A>>>>> * Prateek Mishra=0A>>>>> * Hannes Tschofenig=0A>>>>=
> * Mike Jones=0A>>>>> * Antonio Sanso=0A>>>>> * Justin Richer=0A>>>>>=0A>>=
>>> Notes:=0A>>>>>=0A>>>>> My slides are available here: =0A>>>>> http://ww=
w.tschofenig.priv.at/OAuth2-Security-11Feb2013.ppt=0A>>>>>=0A>>>>> Slide #2=
 summarizes earlier discussions during the conference calls.=0A>>>>>=0A>>>>=
> -- HTTP vs. JSON=0A>>>>>=0A>>>>> Phil noted that he does not like to use =
the MAC Token draft as a starting point because it does not re-use any of t=
he work done in the JOSE working group and in particular all the libraries =
that are available today. He mentioned that earlier attempts to write the M=
AC Token code lead to=0A problems for implementers.=0A>>>>>=0A>>>>> Justin =
responded that he does not agree with using JSON as a transport mechanism s=
ince this would replicate a SOAP style.=0A>>>>>=0A>>>>> Phil noted that he =
wants to send JSON but the signature shall be computed over the HTTP header=
 field.=0A>>>>>=0A>>>>> -- Flexibility for the keyed message digest computa=
tion=0A>>>>>=0A>>>>>=C2=A0 From earlier discussion it was clear that the co=
nference call participants wanted more flexibility regarding the keyed mess=
age digest computation. For this purpose Hannes presented the DKIM based ap=
proach, which allows selective header fields to be included in the digest. =
This is shown in slide #4.=0A>>>>>=0A>>>>> After some discussion the confer=
ence call participants thought that this would meet their needs. Further in=
vestigations would still be useful to determine the degree of failed HMAC c=
alculations due to HTTP proxies modifying the=0A content.=0A>>>>>=0A>>>>> -=
- Key Distribution=0A>>>>>=0A>>>>> Hannes presented the open issue regardin=
g the choice of key =0A>>>>> distribution. Slides #6-#8 present three techn=
iques and Hannes asked =0A>>>>> for feedback regarding the preferred style.=
 Justin and others didn't =0A>>>>> see the need to decide on one mechanism =
- they wanted to keep the =0A>>>>> choice open. Derek indicated that this w=
ill not be an acceptable =0A>>>>> approach. Since the resource server and t=
he authorization server may, =0A>>>>> in the OAuth 2.0 framework, be entiti=
es produced by different vendors =0A>>>>> there is an interoperability need=
. Justin responded that he disagrees =0A>>>>> and that the resource server =
needs to understand the access token and =0A>>>>> referred to the recent dr=
aft submission for the token introspection =0A>>>>> endpoint. Derek indicat=
ed that the resource server has to understand =0A>>>>>=0A the content of th=
e access token and the token introspection endpoint =0A>>>>> just pushes th=
e problem around: the resource server has to send the =0A>>>>> access token=
 to the authorization server and then the resource server =0A>>>>> gets the=
 result back (which he the=0A>>>n=0A>>>>=C2=A0 =C2=A0 a=0A>>>>> gain needs =
to understand) in order to make a meaningful authorization decision.=0A>>>>=
>=0A>>>>> Everyone agreed that the client must receive the session key from=
 the authorization server and that this approach has to be standardized. It=
 was also agreed that this is a common approach among all three key distrib=
ution mechanisms.=0A>>>>>=0A>>>>> Hannes asked the participants to think ab=
out their preference.=0A>>>>>=0A>>>>> The questions regarding key naming an=
d the indication for the intended resource server the client wants to talk =
to have been postponed.=0A>>>>>=0A>>>>> Ciao=0A>>>>>=0A Hannes=0A>>>>>=0A>>=
>>>=0A>>>>> _______________________________________________=0A>>>>> OAuth m=
ailing list=0A>>>>> OAuth@ietf.org=0A>>>>> https://www.ietf.org/mailman/lis=
tinfo/oauth=0A>>>> _______________________________________________=0A>>>> O=
Auth mailing list=0A>>>> OAuth@ietf.org=0A>>>> https://www.ietf.org/mailman=
/listinfo/oauth=0A>>>=0A>>>=0A>>>__________________________________________=
_____=0A>>>OAuth mailing list=0A>>>OAuth@ietf.org=0A>>>https://www.ietf.org=
/mailman/listinfo/oauth=0A>>>______________________________________________=
_=0A>>>OAuth mailing list=0A>>>OAuth@ietf.org=0A>>>https://www.ietf.org/mai=
lman/listinfo/oauth=0A>>>=0A>>>=0A>>>=0A>>_________________________________=
______________=0A>>>OAuth mailing list=0A>>>OAuth@ietf.org=0A>>>https://www=
.ietf.org/mailman/listinfo/oauth=0A>>>=0A>>=0A>>=0A>=0A>=0A>_______________=
________________________________=0A>OAuth mailing list=0A>OAuth@ietf.org=0A=
>https://www.ietf.org/mailman/listinfo/oauth=0A>=0A>
---368338466-484310537-1360961434=:42688
Content-Type: text/html; charset=utf-8
Content-Transfer-Encoding: quoted-printable

<html><body><div style=3D"color:#000; background-color:#fff; font-family:Co=
urier New, courier, monaco, monospace, sans-serif;font-size:12pt"><div><spa=
n>Because we're goign to want a single implementation, not N.</span></div><=
div><br></div>  <div style=3D"font-family: 'Courier New', courier, monaco, =
monospace, sans-serif; font-size: 12pt;"> <div style=3D"font-family: 'times=
 new roman', 'new york', times, serif; font-size: 12pt;"> <div dir=3D"ltr">=
 <font size=3D"2" face=3D"Arial"> <hr size=3D"1">  <b><span style=3D"font-w=
eight:bold;">From:</span></b> Tim Bray &lt;twbray@google.com&gt;<br> <b><sp=
an style=3D"font-weight: bold;">To:</span></b> William Mills &lt;wmills_921=
05@yahoo.com&gt; <br><b><span style=3D"font-weight: bold;">Cc:</span></b> T=
orsten Lodderstedt &lt;torsten@lodderstedt.net&gt;; IETF oauth WG &lt;oauth=
@ietf.org&gt; <br> <b><span style=3D"font-weight: bold;">Sent:</span></b> F=
riday, February 15, 2013 8:49 AM<br> <b><span style=3D"font-weight:
 bold;">Subject:</span></b> Re: [OAUTH-WG] Minutes from the OAuth Design Te=
am Conference Call - 11th February 2013<br> </font> </div> <br>=0A<div id=
=3D"yiv1221223570">Not deeply acquainted with the Flickr scenario, but it o=
ccurs to me to ask: If OAuth 1.0 is working well for them, why don=E2=80=99=
t they just keep using it? &nbsp;I.e. if there=E2=80=99s already a good sol=
ution in place for people who require secure authn/authz over insecure chan=
nels, why would we go the extra work of duplicating that in OAuth 2 territo=
ry? -T<br>=0A=0A<br><div class=3D"yiv1221223570gmail_quote">On Fri, Feb 15,=
 2013 at 8:09 AM, William Mills <span dir=3D"ltr">&lt;<a rel=3D"nofollow" y=
mailto=3D"mailto:wmills_92105@yahoo.com" target=3D"_blank" href=3D"mailto:w=
mills_92105@yahoo.com">wmills_92105@yahoo.com</a>&gt;</span> wrote:<br><blo=
ckquote class=3D"yiv1221223570gmail_quote" style=3D"margin:0 0 0 .8ex;borde=
r-left:1px #ccc solid;padding-left:1ex;">=0A=0A<div><div style=3D"font-size=
: 12pt; font-family: 'Courier New', courier, monaco, monospace, sans-serif;=
"><div><span>I'll repeat the use case for Flickr, which requires OAuth 1.0a=
 type capabilites that OAuth 2 does not provide. &nbsp;Simply stating "move=
 to HTTPS" is not a viable response here. &nbsp;</span></div>=0A=0A<div><br=
></div>  <div style=3D"font-size:12pt;"> <div style=3D"font-size:12pt;"> <d=
iv dir=3D"ltr">=0A=0A <font face=3D"Arial"> <hr size=3D"1">  <b><span style=
=3D"font-weight:bold;">From:</span></b> Torsten Lodderstedt &lt;<a rel=3D"n=
ofollow" ymailto=3D"mailto:torsten@lodderstedt.net" target=3D"_blank" href=
=3D"mailto:torsten@lodderstedt.net">torsten@lodderstedt.net</a>&gt;<br> <b>=
<span style=3D"font-weight:bold;">To:</span></b> William Mills &lt;<a rel=
=3D"nofollow" ymailto=3D"mailto:wmills_92105@yahoo.com" target=3D"_blank" h=
ref=3D"mailto:wmills_92105@yahoo.com">wmills_92105@yahoo.com</a>&gt; <br>=
=0A=0A<b><span style=3D"font-weight:bold;">Cc:</span></b> Mike Jones &lt;<a=
 rel=3D"nofollow" ymailto=3D"mailto:Michael.Jones@microsoft.com" target=3D"=
_blank" href=3D"mailto:Michael.Jones@microsoft.com">Michael.Jones@microsoft=
.com</a>&gt;; Justin Richer &lt;<a rel=3D"nofollow" ymailto=3D"mailto:jrich=
er@mitre.org" target=3D"_blank" href=3D"mailto:jricher@mitre.org">jricher@m=
itre.org</a>&gt;; Phil=0A Hunt &lt;<a rel=3D"nofollow" ymailto=3D"mailto:ph=
il.hunt@oracle.com" target=3D"_blank" href=3D"mailto:phil.hunt@oracle.com">=
phil.hunt@oracle.com</a>&gt;; IETF oauth WG &lt;<a rel=3D"nofollow" ymailto=
=3D"mailto:oauth@ietf.org" target=3D"_blank" href=3D"mailto:oauth@ietf.org"=
>oauth@ietf.org</a>&gt; <br> <b><span style=3D"font-weight:bold;">Sent:</sp=
an></b> Friday, February 15, 2013 7:22 AM<br>=0A=0A <b><span style=3D"font-=
weight:bold;">Subject:</span></b> Re: [OAUTH-WG] Minutes from the OAuth Des=
ign Team Conference Call - 11th February 2013<br> </font> </div> <br>=0A<di=
v><div><div>Hi Bill,</div><div><br></div><div>I think one needs to compare =
the costs/impact of HTTPS on one side and the implementation of integrity p=
rotection and replay detection on the other. We had this discussion several=
 times.</div>=0A=0A<div><br></div><div>regards,</div><div>Torsten.</div><di=
v><br>Am 15.02.2013 um 08:08 schrieb William Mills &lt;<a rel=3D"nofollow" =
ymailto=3D"mailto:wmills_92105@yahoo.com" target=3D"_blank" href=3D"mailto:=
wmills_92105@yahoo.com">wmills_92105@yahoo.com</a>&gt;:<br><br>=0A=0A</div>=
<blockquote type=3D"cite"><div><div style=3D"font-size:12pt;"><div><span>I =
fundamentally disagree with that too. &nbsp;OAuth 2 is the *framework*, one=
 which supports multiple token types. &nbsp;Bearer tokens were the first cr=
edential type defined.</span></div>=0A=0A<div style=3D"font-style:normal;fo=
nt-size:16px;background-color:transparent;"><span><br></span></div><div sty=
le=3D"font-style:normal;font-size:16px;background-color:transparent;">=0A=
=0A<span>OAuth 1.0a also requires HTTPS transport for authentication and ge=
tting the token.</span></div><div style=3D"font-style:normal;font-size:16px=
;background-color:transparent;">=0A=0A<span><br></span></div><div style=3D"=
font-style:normal;font-size:16px;background-color:transparent;"><span>There=
 are &nbsp;real use cases for tokens usable over plain text with integrity =
protection.</span></div>=0A=0A<div style=3D"font-style:normal;font-size:16p=
x;background-color:transparent;"><span><br></span></div><div style=3D"font-=
style:normal;font-size:16px;background-color:transparent;">=0A=0A<span>-bil=
l</span></div><div><br></div>  <div style=3D"font-size:12pt;"> <div style=
=3D"font-size:12pt;">=0A=0A <div dir=3D"ltr"> <font face=3D"Arial"> <hr siz=
e=3D"1"> =0A <b><span style=3D"font-weight:bold;">From:</span></b> Torsten =
Lodderstedt &lt;<a rel=3D"nofollow" ymailto=3D"mailto:torsten@lodderstedt.n=
et" target=3D"_blank" href=3D"mailto:torsten@lodderstedt.net">torsten@lodde=
rstedt.net</a>&gt;<br> <b><span style=3D"font-weight:bold;">To:</span></b> =
William Mills &lt;<a rel=3D"nofollow" ymailto=3D"mailto:wmills_92105@yahoo.=
com" target=3D"_blank" href=3D"mailto:wmills_92105@yahoo.com">wmills_92105@=
yahoo.com</a>&gt; <br>=0A=0A<b><span style=3D"font-weight:bold;">Cc:</span>=
</b> Mike Jones &lt;<a rel=3D"nofollow" ymailto=3D"mailto:Michael.Jones@mic=
rosoft.com" target=3D"_blank" href=3D"mailto:Michael.Jones@microsoft.com">M=
ichael.Jones@microsoft.com</a>&gt;; Justin Richer &lt;<a rel=3D"nofollow" y=
mailto=3D"mailto:jricher@mitre.org" target=3D"_blank" href=3D"mailto:jriche=
r@mitre.org">jricher@mitre.org</a>&gt;; Phil Hunt &lt;<a rel=3D"nofollow" y=
mailto=3D"mailto:phil.hunt@oracle.com" target=3D"_blank" href=3D"mailto:phi=
l.hunt@oracle.com">phil.hunt@oracle.com</a>&gt;; IETF=0A oauth WG &lt;<a re=
l=3D"nofollow" ymailto=3D"mailto:oauth@ietf.org" target=3D"_blank" href=3D"=
mailto:oauth@ietf.org">oauth@ietf.org</a>&gt; <br> <b><span style=3D"font-w=
eight:bold;">Sent:</span></b> Thursday, February 14, 2013 10:05 PM<br> <b><=
span style=3D"font-weight:bold;">Subject:</span></b> Re: [OAUTH-WG] Minutes=
 from the OAuth Design Team Conference Call - 11th February 2013<br>=0A=0A =
</font> </div> <br>=0A<div><div><div>Hi Bill,</div><div><br></div><div>OAut=
h 2.0 took a different direction by relying on HTTPS to provide the basic p=
rotection. So the need to have a token, which can be used for service reque=
sts over plain HTTP is arguable. My understanding of this activity was, the=
 intend is to provide additional protection on top of HTTPS.</div>=0A=0A<di=
v><br></div><div>regards,</div><div>Torsten.</div><div><br>Am 15.02.2013 um=
 02:31 schrieb William Mills &lt;<a rel=3D"nofollow" ymailto=3D"mailto:wmil=
ls_92105@yahoo.com" target=3D"_blank" href=3D"mailto:wmills_92105@yahoo.com=
">wmills_92105@yahoo.com</a>&gt;:<br><br>=0A=0A</div><blockquote type=3D"ci=
te"><div><div style=3D"font-size:12pt;"><div><span>I disagree with "</span>=
<span style=3D"font-size:12pt;">That was the impediment to=0A OAuth 1.0 ado=
ption that OAuth 2.0 solved in the first place.", unless "solving" means do=
es not address the need for it at all.</span></div><div style=3D"font-style=
:normal;font-size:12pt;background-color:transparent;">=0A=0A<span style=3D"=
font-size:12pt;"><br></span></div><div style=3D"font-style:normal;font-size=
:16px;background-color:transparent;">=0A=0A<span style=3D"font-size:12pt;">=
OAuth 2 does several=0A good things, but it still lacks a defined token typ=
e that is safe to user over plain text HTTP. &nbsp;1.0a solved that.</span>=
</div><div><br></div>  <div style=3D"font-size:12pt;">=0A=0A <div style=3D"=
font-size:12pt;"> <div dir=3D"ltr"> <font face=3D"Arial"> <hr size=3D"1">  =
<b><span style=3D"font-weight:bold;">From:</span></b> Mike Jones &lt;<a rel=
=3D"nofollow" ymailto=3D"mailto:Michael.Jones@microsoft.com" target=3D"_bla=
nk" href=3D"mailto:Michael.Jones@microsoft.com">Michael.Jones@microsoft.com=
</a>&gt;<br>=0A=0A <b><span style=3D"font-weight:bold;">To:</span></b> Just=
in Richer &lt;<a rel=3D"nofollow" ymailto=3D"mailto:jricher@mitre.org" targ=
et=3D"_blank" href=3D"mailto:jricher@mitre.org">jricher@mitre.org</a>&gt;; =
Phil Hunt &lt;<a rel=3D"nofollow" ymailto=3D"mailto:phil.hunt@oracle.com" t=
arget=3D"_blank" href=3D"mailto:phil.hunt@oracle.com">phil.hunt@oracle.com<=
/a>&gt; <br>=0A=0A<b><span style=3D"font-weight:bold;">Cc:</span></b> IETF =
oauth WG &lt;<a rel=3D"nofollow" ymailto=3D"mailto:oauth@ietf.org" target=
=3D"_blank" href=3D"mailto:oauth@ietf.org">oauth@ietf.org</a>&gt; <br> <b><=
span style=3D"font-weight:bold;">Sent:</span></b> Thursday, February 14, 20=
13 1:44 PM<br>=0A=0A <b><span style=3D"font-weight:bold;">Subject:</span></=
b> Re: [OAUTH-WG] Minutes from the OAuth Design Team Conference Call - 11th=
 February 2013<br>=0A </font> </div> <br>=0AI'm in favor of reusing the JWT=
 work that this WG is also doing. :-)<br><br>I'm pretty skeptical of us inv=
enting another custom scheme for signing HTTP headers.&nbsp; That was the i=
mpediment to OAuth 1.0 adoption that OAuth 2.0 solved in the first place.<b=
r>=0A=0A<br>&nbsp;&nbsp;&nbsp; &nbsp;&nbsp;&nbsp; &nbsp;&nbsp;&nbsp; &nbsp;=
&nbsp;&nbsp; -- Mike<br><br>-----Original Message-----<br>From: <a rel=3D"n=
ofollow" ymailto=3D"mailto:oauth-bounces@ietf.org" target=3D"_blank" href=
=3D"mailto:oauth-bounces@ietf.org">oauth-bounces@ietf.org</a> [mailto:<a re=
l=3D"nofollow" ymailto=3D"mailto:oauth-bounces@ietf.org" target=3D"_blank" =
href=3D"mailto:oauth-bounces@ietf.org">oauth-bounces@ietf.org</a>] On Behal=
f Of Justin Richer<br>=0A=0ASent: Tuesday, February 12, 2013 9:35 AM<br>To:=
 Phil Hunt<br>Cc: IETF oauth WG<br>Subject: Re: [OAUTH-WG] Minutes from the=
 OAuth Design Team Conference Call - 11th February 2013<br><br>That's my re=
ading of it as well, Phil, thanks for providing the clarification.=0A One m=
otivator behind using a JSON-based token is to be able to=0A re-use some of=
 the great work that the JOSE group is doing but apply it to an HTTP payloa=
d.<br><br>What neither of us want is a token type that requires stuffing al=
l query, header, and other parameters *into* the JSON object itself, which =
would be a more SOAPy approach.<br>=0A=0A<br>&nbsp; -- Justin<br><br>On 02/=
12/2013 12:30 PM, Phil Hunt wrote:<br>&gt; Clarification.&nbsp; I think Jus=
tin and I were in agreement that we don't want to see a format that require=
s JSON payloads.&nbsp; We are both interested in a JSON token used in the a=
uthorization header that could be based on a computed signature of some com=
bination of http headers and body if possible.<br>=0A=0A&gt;<br>&gt; Phil<b=
r>&gt;<br>&gt; @independentid<br>&gt; <a rel=3D"nofollow" target=3D"_blank"=
 href=3D"http://www.independentid.com/">www.independentid.com</a><br>&gt; <=
a rel=3D"nofollow" ymailto=3D"mailto:phil.hunt@oracle.com" target=3D"_blank=
" href=3D"mailto:phil.hunt@oracle.com">phil.hunt@oracle.com</a><br>=0A=0A&g=
t;<br>&gt;<br>&gt;<br>&gt;<br>&gt;<br>&gt; On=0A 2013-02-12, at 1:10 AM, Ha=
nnes Tschofenig wrote:<br>&gt;<br>&gt;&gt; Here are my notes.<br>&gt;&gt;<b=
r>&gt;&gt; Participants:<br>&gt;&gt;<br>&gt;&gt; * John Bradley<br>&gt;&gt;=
 * Derek Atkins<br>&gt;&gt; * Phil Hunt<br>=0A=0A&gt;&gt; * Prateek Mishra<=
br>&gt;&gt; * Hannes Tschofenig<br>&gt;&gt; * Mike Jones<br>&gt;&gt; * Anto=
nio Sanso<br>&gt;&gt; * Justin Richer<br>&gt;&gt;<br>&gt;&gt; Notes:<br>&gt=
;&gt;<br>&gt;&gt; My slides are available here: <br>=0A=0A&gt;&gt; <a rel=
=3D"nofollow" target=3D"_blank" href=3D"http://www.tschofenig.priv.at/OAuth=
2-Security-11Feb2013.ppt">http://www.tschofenig.priv.at/OAuth2-Security-11F=
eb2013.ppt</a><br>&gt;&gt;<br>&gt;&gt; Slide #2 summarizes earlier discussi=
ons during the conference calls.<br>=0A=0A&gt;&gt;<br>&gt;&gt; -- HTTP vs. =
JSON<br>&gt;&gt;<br>&gt;&gt; Phil noted that he does not like to use the MA=
C Token draft as a starting point because it does not re-use any of the wor=
k done in the JOSE working group and in particular all the libraries that a=
re available today. He mentioned that earlier attempts to write the MAC Tok=
en code lead to=0A problems for implementers.<br>&gt;&gt;<br>&gt;&gt; Justi=
n responded that he does not agree with using JSON as a transport mechanism=
 since this would replicate a SOAP style.<br>&gt;&gt;<br>&gt;&gt; Phil note=
d that he wants to send JSON but the signature shall be computed over the H=
TTP header field.<br>=0A=0A&gt;&gt;<br>&gt;&gt; -- Flexibility for the keye=
d message digest computation<br>&gt;&gt;<br>&gt;&gt;&nbsp; From earlier dis=
cussion it was clear that the conference call participants wanted more flex=
ibility regarding the keyed message digest computation. For this purpose Ha=
nnes presented the DKIM based approach, which allows selective header field=
s to be included in the digest. This is shown in slide #4.<br>=0A=0A&gt;&gt=
;<br>&gt;&gt; After some discussion the conference call participants though=
t that this would meet their needs. Further investigations would still be u=
seful to determine the degree of failed HMAC calculations due to HTTP proxi=
es modifying the=0A content.<br>&gt;&gt;<br>&gt;&gt; -- Key Distribution<br=
>&gt;&gt;<br>&gt;&gt; Hannes presented the open issue regarding the choice =
of key <br>&gt;&gt; distribution. Slides #6-#8 present three techniques and=
 Hannes asked <br>=0A=0A&gt;&gt; for feedback regarding the preferred style=
. Justin and others didn't <br>&gt;&gt; see the need to decide on one mecha=
nism - they wanted to keep the <br>&gt;&gt; choice open. Derek indicated th=
at this will not be an acceptable <br>=0A=0A&gt;&gt; approach. Since the re=
source server and the authorization server may, <br>&gt;&gt; in the OAuth 2=
.0 framework, be entities produced by different vendors <br>&gt;&gt; there =
is an interoperability need. Justin responded that he disagrees <br>=0A=0A&=
gt;&gt; and that the resource server needs to understand the access token a=
nd <br>&gt;&gt; referred to the recent draft submission for the token intro=
spection <br>&gt;&gt; endpoint. Derek indicated that the resource server ha=
s to understand <br>=0A=0A&gt;&gt;=0A the content of the access token and t=
he token introspection endpoint <br>&gt;&gt; just pushes the problem around=
: the resource server has to send the <br>&gt;&gt; access token to the auth=
orization server and then the resource server <br>=0A=0A&gt;&gt; gets the r=
esult back (which he the<br> n<br>&gt;&nbsp; &nbsp; a<br>&gt;&gt; gain need=
s to understand) in order to make a meaningful authorization decision.<br>&=
gt;&gt;<br>&gt;&gt; Everyone agreed that the client must receive the sessio=
n key from the authorization server and that this approach has to be standa=
rdized. It was also agreed that this is a common approach among all three k=
ey distribution mechanisms.<br>=0A=0A&gt;&gt;<br>&gt;&gt; Hannes asked the =
participants to think about their preference.<br>&gt;&gt;<br>&gt;&gt; The q=
uestions regarding key naming and the indication for the intended resource =
server the client wants to talk to have been postponed.<br>=0A=0A&gt;&gt;<b=
r>&gt;&gt; Ciao<br>&gt;&gt;=0A Hannes<br>&gt;&gt;<br>&gt;&gt;<br>&gt;&gt; _=
______________________________________________<br>&gt;&gt; OAuth mailing li=
st<br>&gt;&gt; <a rel=3D"nofollow" ymailto=3D"mailto:OAuth@ietf.org" target=
=3D"_blank" href=3D"mailto:OAuth@ietf.org">OAuth@ietf.org</a><br>=0A=0A&gt;=
&gt; <a rel=3D"nofollow" target=3D"_blank" href=3D"https://www.ietf.org/mai=
lman/listinfo/oauth">https://www.ietf.org/mailman/listinfo/oauth</a><br>&gt=
; _______________________________________________<br>&gt; OAuth mailing lis=
t<br>=0A=0A&gt; <a rel=3D"nofollow" ymailto=3D"mailto:OAuth@ietf.org" targe=
t=3D"_blank" href=3D"mailto:OAuth@ietf.org">OAuth@ietf.org</a><br>&gt; <a r=
el=3D"nofollow" target=3D"_blank" href=3D"https://www.ietf.org/mailman/list=
info/oauth">https://www.ietf.org/mailman/listinfo/oauth</a><br>=0A=0A<br><b=
r>_______________________________________________<br>OAuth mailing list<br>=
<a rel=3D"nofollow" ymailto=3D"mailto:OAuth@ietf.org" target=3D"_blank" hre=
f=3D"mailto:OAuth@ietf.org">OAuth@ietf.org</a><br><a rel=3D"nofollow" targe=
t=3D"_blank" href=3D"https://www.ietf.org/mailman/listinfo/oauth">https://w=
ww.ietf.org/mailman/listinfo/oauth</a><br>=0A=0A___________________________=
____________________<br>OAuth mailing list<br><a rel=3D"nofollow" ymailto=
=3D"mailto:OAuth@ietf.org" target=3D"_blank" href=3D"mailto:OAuth@ietf.org"=
>OAuth@ietf.org</a><br><a rel=3D"nofollow" target=3D"_blank" href=3D"https:=
//www.ietf.org/mailman/listinfo/oauth">https://www.ietf.org/mailman/listinf=
o/oauth</a><br>=0A=0A<br><br> </div> </div>  </div></div></blockquote><bloc=
kquote type=3D"cite"><div><span>___________________________________________=
____</span><br><span>OAuth mailing list</span><br><span><a rel=3D"nofollow"=
 ymailto=3D"mailto:OAuth@ietf.org" target=3D"_blank" href=3D"mailto:OAuth@i=
etf.org">OAuth@ietf.org</a></span><br>=0A=0A<span><a rel=3D"nofollow" targe=
t=3D"_blank" href=3D"https://www.ietf.org/mailman/listinfo/oauth">https://w=
ww.ietf.org/mailman/listinfo/oauth</a></span><br></div></blockquote></div><=
/div><br><br> </div> </div> =0A </div></div></blockquote></div></div><br><b=
r> </div> </div>  </div></div><br>_________________________________________=
______<br>=0AOAuth mailing list<br>=0A<a rel=3D"nofollow" ymailto=3D"mailto=
:OAuth@ietf.org" target=3D"_blank" href=3D"mailto:OAuth@ietf.org">OAuth@iet=
f.org</a><br>=0A<a rel=3D"nofollow" target=3D"_blank" href=3D"https://www.i=
etf.org/mailman/listinfo/oauth">https://www.ietf.org/mailman/listinfo/oauth=
</a><br>=0A<br></blockquote></div><br>=0A</div><br><br> </div> </div>  </di=
v></body></html>
---368338466-484310537-1360961434=:42688--

From jricher@mitre.org  Fri Feb 15 12:55:51 2013
Return-Path: <jricher@mitre.org>
X-Original-To: oauth@ietfa.amsl.com
Delivered-To: oauth@ietfa.amsl.com
Received: from localhost (localhost [127.0.0.1]) by ietfa.amsl.com (Postfix) with ESMTP id AE88C21F844F for <oauth@ietfa.amsl.com>; Fri, 15 Feb 2013 12:55:51 -0800 (PST)
X-Virus-Scanned: amavisd-new at amsl.com
X-Spam-Flag: NO
X-Spam-Score: -6.572
X-Spam-Level: 
X-Spam-Status: No, score=-6.572 tagged_above=-999 required=5 tests=[AWL=0.026,  BAYES_00=-2.599, HTML_MESSAGE=0.001, RCVD_IN_DNSWL_MED=-4]
Received: from mail.ietf.org ([64.170.98.30]) by localhost (ietfa.amsl.com [127.0.0.1]) (amavisd-new, port 10024) with ESMTP id 6A7zaPO1iJb3 for <oauth@ietfa.amsl.com>; Fri, 15 Feb 2013 12:55:48 -0800 (PST)
Received: from smtpksrv1.mitre.org (smtpksrv1.mitre.org [198.49.146.77]) by ietfa.amsl.com (Postfix) with ESMTP id AC61021E8039 for <oauth@ietf.org>; Fri, 15 Feb 2013 12:55:47 -0800 (PST)
Received: from smtpksrv1.mitre.org (localhost.localdomain [127.0.0.1]) by localhost (Postfix) with SMTP id 239C41F0FB6; Fri, 15 Feb 2013 15:55:47 -0500 (EST)
Received: from IMCCAS04.MITRE.ORG (imccas04.mitre.org [129.83.29.81]) by smtpksrv1.mitre.org (Postfix) with ESMTP id F12471F033D; Fri, 15 Feb 2013 15:55:46 -0500 (EST)
Received: from [10.146.15.29] (129.83.31.58) by IMCCAS04.MITRE.ORG (129.83.29.81) with Microsoft SMTP Server (TLS) id 14.2.318.4; Fri, 15 Feb 2013 15:55:46 -0500
Message-ID: <511EA0A3.7080000@mitre.org>
Date: Fri, 15 Feb 2013 15:54:59 -0500
From: Justin Richer <jricher@mitre.org>
User-Agent: Mozilla/5.0 (X11; Linux i686; rv:17.0) Gecko/20130106 Thunderbird/17.0.2
MIME-Version: 1.0
To: Tim Bray <twbray@google.com>
References: <0573984A-8C11-4960-9BC6-F44D4B664C19@gmx.net> <E808B6AC-D5F6-479F-967D-EA6B2586BE64@oracle.com> <511A7D27.8010209@mitre.org> <4E1F6AAD24975D4BA5B16804296739436744BD23@TK5EX14MBXC285.redmond.corp.microsoft.com> <1360891897.14004.YahooMailNeo@web31811.mail.mud.yahoo.com> <E7EBF78C-37EB-4737-8DD5-0F24C9FACA60@lodderstedt.net> <1360912115.36543.YahooMailNeo@web31811.mail.mud.yahoo.com> <2A0F585F-2CEF-418D-9654-5084E6C9BD0D@lodderstedt.net> <1360944589.51724.YahooMailNeo@web31808.mail.mud.yahoo.com> <CA+ZpN24dWAGtZR2aQcqC_N+sHsp7zBVe42LDbrkAsqNVqQPv0w@mail.gmail.com>
In-Reply-To: <CA+ZpN24dWAGtZR2aQcqC_N+sHsp7zBVe42LDbrkAsqNVqQPv0w@mail.gmail.com>
Content-Type: multipart/alternative; boundary="------------010502060805030305000209"
X-Originating-IP: [129.83.31.58]
Cc: IETF oauth WG <oauth@ietf.org>
Subject: Re: [OAUTH-WG] Minutes from the OAuth Design Team Conference Call - 11th February 2013
X-BeenThere: oauth@ietf.org
X-Mailman-Version: 2.1.12
Precedence: list
List-Id: OAUTH WG <oauth.ietf.org>
List-Unsubscribe: <https://www.ietf.org/mailman/options/oauth>, <mailto:oauth-request@ietf.org?subject=unsubscribe>
List-Archive: <http://www.ietf.org/mail-archive/web/oauth>
List-Post: <mailto:oauth@ietf.org>
List-Help: <mailto:oauth-request@ietf.org?subject=help>
List-Subscribe: <https://www.ietf.org/mailman/listinfo/oauth>, <mailto:oauth-request@ietf.org?subject=subscribe>
X-List-Received-Date: Fri, 15 Feb 2013 20:55:51 -0000

--------------010502060805030305000209
Content-Type: text/plain; charset="ISO-8859-1"; format=flowed
Content-Transfer-Encoding: 7bit

So that you can fetch and manage all your tokens using the same code 
paths as the OAuth2 services. The "get a token" part will be identical 
to Oauth2 Bearer (except for some details of what comes back from the 
token endpoint, of course), it's the "use a token" bit that really 
changes and is up in the air. You get to use scopes, and state, and 
refresh tokens, and all the other good stuff.

I've brought it up before, but I think it might be worthwhile, at least 
as an exercise, to define a method to get OAuth1-style tokens from an 
OAuth2 token endpoint. You'd defer to OAuth1 for how to use them with a 
protected resource.

  -- Justin

On 02/15/2013 11:49 AM, Tim Bray wrote:
> Not deeply acquainted with the Flickr scenario, but it occurs to me to 
> ask: If OAuth 1.0 is working well for them, why don't they just keep 
> using it?  I.e. if there's already a good solution in place for people 
> who require secure authn/authz over insecure channels, why would we go 
> the extra work of duplicating that in OAuth 2 territory? -T
>
> On Fri, Feb 15, 2013 at 8:09 AM, William Mills <wmills_92105@yahoo.com 
> <mailto:wmills_92105@yahoo.com>> wrote:
>
>     I'll repeat the use case for Flickr, which requires OAuth 1.0a
>     type capabilites that OAuth 2 does not provide.  Simply stating
>     "move to HTTPS" is not a viable response here.
>
>     ------------------------------------------------------------------------
>     *From:* Torsten Lodderstedt <torsten@lodderstedt.net
>     <mailto:torsten@lodderstedt.net>>
>     *To:* William Mills <wmills_92105@yahoo.com
>     <mailto:wmills_92105@yahoo.com>>
>     *Cc:* Mike Jones <Michael.Jones@microsoft.com
>     <mailto:Michael.Jones@microsoft.com>>; Justin Richer
>     <jricher@mitre.org <mailto:jricher@mitre.org>>; Phil Hunt
>     <phil.hunt@oracle.com <mailto:phil.hunt@oracle.com>>; IETF oauth
>     WG <oauth@ietf.org <mailto:oauth@ietf.org>>
>     *Sent:* Friday, February 15, 2013 7:22 AM
>     *Subject:* Re: [OAUTH-WG] Minutes from the OAuth Design Team
>     Conference Call - 11th February 2013
>
>     Hi Bill,
>
>     I think one needs to compare the costs/impact of HTTPS on one side
>     and the implementation of integrity protection and replay
>     detection on the other. We had this discussion several times.
>
>     regards,
>     Torsten.
>
>     Am 15.02.2013 um 08:08 schrieb William Mills
>     <wmills_92105@yahoo.com <mailto:wmills_92105@yahoo.com>>:
>
>>     I fundamentally disagree with that too.  OAuth 2 is the
>>     *framework*, one which supports multiple token types.  Bearer
>>     tokens were the first credential type defined.
>>
>>     OAuth 1.0a also requires HTTPS transport for authentication and
>>     getting the token.
>>
>>     There are  real use cases for tokens usable over plain text with
>>     integrity protection.
>>
>>     -bill
>>
>>     ------------------------------------------------------------------------
>>     *From:* Torsten Lodderstedt <torsten@lodderstedt.net
>>     <mailto:torsten@lodderstedt.net>>
>>     *To:* William Mills <wmills_92105@yahoo.com
>>     <mailto:wmills_92105@yahoo.com>>
>>     *Cc:* Mike Jones <Michael.Jones@microsoft.com
>>     <mailto:Michael.Jones@microsoft.com>>; Justin Richer
>>     <jricher@mitre.org <mailto:jricher@mitre.org>>; Phil Hunt
>>     <phil.hunt@oracle.com <mailto:phil.hunt@oracle.com>>; IETF oauth
>>     WG <oauth@ietf.org <mailto:oauth@ietf.org>>
>>     *Sent:* Thursday, February 14, 2013 10:05 PM
>>     *Subject:* Re: [OAUTH-WG] Minutes from the OAuth Design Team
>>     Conference Call - 11th February 2013
>>
>>     Hi Bill,
>>
>>     OAuth 2.0 took a different direction by relying on HTTPS to
>>     provide the basic protection. So the need to have a token, which
>>     can be used for service requests over plain HTTP is arguable. My
>>     understanding of this activity was, the intend is to provide
>>     additional protection on top of HTTPS.
>>
>>     regards,
>>     Torsten.
>>
>>     Am 15.02.2013 um 02:31 schrieb William Mills
>>     <wmills_92105@yahoo.com <mailto:wmills_92105@yahoo.com>>:
>>
>>>     I disagree with "That was the impediment to OAuth 1.0 adoption
>>>     that OAuth 2.0 solved in the first place.", unless "solving"
>>>     means does not address the need for it at all.
>>>
>>>     OAuth 2 does several good things, but it still lacks a defined
>>>     token type that is safe to user over plain text HTTP.  1.0a
>>>     solved that.
>>>
>>>     ------------------------------------------------------------------------
>>>     *From:* Mike Jones <Michael.Jones@microsoft.com
>>>     <mailto:Michael.Jones@microsoft.com>>
>>>     *To:* Justin Richer <jricher@mitre.org
>>>     <mailto:jricher@mitre.org>>; Phil Hunt <phil.hunt@oracle.com
>>>     <mailto:phil.hunt@oracle.com>>
>>>     *Cc:* IETF oauth WG <oauth@ietf.org <mailto:oauth@ietf.org>>
>>>     *Sent:* Thursday, February 14, 2013 1:44 PM
>>>     *Subject:* Re: [OAUTH-WG] Minutes from the OAuth Design Team
>>>     Conference Call - 11th February 2013
>>>
>>>     I'm in favor of reusing the JWT work that this WG is also doing. :-)
>>>
>>>     I'm pretty skeptical of us inventing another custom scheme for
>>>     signing HTTP headers.  That was the impediment to OAuth 1.0
>>>     adoption that OAuth 2.0 solved in the first place.
>>>
>>>                     -- Mike
>>>
>>>     -----Original Message-----
>>>     From: oauth-bounces@ietf.org <mailto:oauth-bounces@ietf.org>
>>>     [mailto:oauth-bounces@ietf.org <mailto:oauth-bounces@ietf.org>]
>>>     On Behalf Of Justin Richer
>>>     Sent: Tuesday, February 12, 2013 9:35 AM
>>>     To: Phil Hunt
>>>     Cc: IETF oauth WG
>>>     Subject: Re: [OAUTH-WG] Minutes from the OAuth Design Team
>>>     Conference Call - 11th February 2013
>>>
>>>     That's my reading of it as well, Phil, thanks for providing the
>>>     clarification. One motivator behind using a JSON-based token is
>>>     to be able to re-use some of the great work that the JOSE group
>>>     is doing but apply it to an HTTP payload.
>>>
>>>     What neither of us want is a token type that requires stuffing
>>>     all query, header, and other parameters *into* the JSON object
>>>     itself, which would be a more SOAPy approach.
>>>
>>>       -- Justin
>>>
>>>     On 02/12/2013 12:30 PM, Phil Hunt wrote:
>>>     > Clarification.  I think Justin and I were in agreement that we
>>>     don't want to see a format that requires JSON payloads. We are
>>>     both interested in a JSON token used in the authorization header
>>>     that could be based on a computed signature of some combination
>>>     of http headers and body if possible.
>>>     >
>>>     > Phil
>>>     >
>>>     > @independentid
>>>     > www.independentid.com <http://www.independentid.com/>
>>>     > phil.hunt@oracle.com <mailto:phil.hunt@oracle.com>
>>>     >
>>>     >
>>>     >
>>>     >
>>>     >
>>>     > On 2013-02-12, at 1:10 AM, Hannes Tschofenig wrote:
>>>     >
>>>     >> Here are my notes.
>>>     >>
>>>     >> Participants:
>>>     >>
>>>     >> * John Bradley
>>>     >> * Derek Atkins
>>>     >> * Phil Hunt
>>>     >> * Prateek Mishra
>>>     >> * Hannes Tschofenig
>>>     >> * Mike Jones
>>>     >> * Antonio Sanso
>>>     >> * Justin Richer
>>>     >>
>>>     >> Notes:
>>>     >>
>>>     >> My slides are available here:
>>>     >> http://www.tschofenig.priv.at/OAuth2-Security-11Feb2013.ppt
>>>     >>
>>>     >> Slide #2 summarizes earlier discussions during the conference
>>>     calls.
>>>     >>
>>>     >> -- HTTP vs. JSON
>>>     >>
>>>     >> Phil noted that he does not like to use the MAC Token draft
>>>     as a starting point because it does not re-use any of the work
>>>     done in the JOSE working group and in particular all the
>>>     libraries that are available today. He mentioned that earlier
>>>     attempts to write the MAC Token code lead to problems for
>>>     implementers.
>>>     >>
>>>     >> Justin responded that he does not agree with using JSON as a
>>>     transport mechanism since this would replicate a SOAP style.
>>>     >>
>>>     >> Phil noted that he wants to send JSON but the signature shall
>>>     be computed over the HTTP header field.
>>>     >>
>>>     >> -- Flexibility for the keyed message digest computation
>>>     >>
>>>     >>  From earlier discussion it was clear that the conference
>>>     call participants wanted more flexibility regarding the keyed
>>>     message digest computation. For this purpose Hannes presented
>>>     the DKIM based approach, which allows selective header fields to
>>>     be included in the digest. This is shown in slide #4.
>>>     >>
>>>     >> After some discussion the conference call participants
>>>     thought that this would meet their needs. Further investigations
>>>     would still be useful to determine the degree of failed HMAC
>>>     calculations due to HTTP proxies modifying the content.
>>>     >>
>>>     >> -- Key Distribution
>>>     >>
>>>     >> Hannes presented the open issue regarding the choice of key
>>>     >> distribution. Slides #6-#8 present three techniques and
>>>     Hannes asked
>>>     >> for feedback regarding the preferred style. Justin and others
>>>     didn't
>>>     >> see the need to decide on one mechanism - they wanted to keep
>>>     the
>>>     >> choice open. Derek indicated that this will not be an acceptable
>>>     >> approach. Since the resource server and the authorization
>>>     server may,
>>>     >> in the OAuth 2.0 framework, be entities produced by different
>>>     vendors
>>>     >> there is an interoperability need. Justin responded that he
>>>     disagrees
>>>     >> and that the resource server needs to understand the access
>>>     token and
>>>     >> referred to the recent draft submission for the token
>>>     introspection
>>>     >> endpoint. Derek indicated that the resource server has to
>>>     understand
>>>     >> the content of the access token and the token introspection
>>>     endpoint
>>>     >> just pushes the problem around: the resource server has to
>>>     send the
>>>     >> access token to the authorization server and then the
>>>     resource server
>>>     >> gets the result back (which he the
>>>     n
>>>     >    a
>>>     >> gain needs to understand) in order to make a meaningful
>>>     authorization decision.
>>>     >>
>>>     >> Everyone agreed that the client must receive the session key
>>>     from the authorization server and that this approach has to be
>>>     standardized. It was also agreed that this is a common approach
>>>     among all three key distribution mechanisms.
>>>     >>
>>>     >> Hannes asked the participants to think about their preference.
>>>     >>
>>>     >> The questions regarding key naming and the indication for the
>>>     intended resource server the client wants to talk to have been
>>>     postponed.
>>>     >>
>>>     >> Ciao
>>>     >> Hannes
>>>     >>
>>>     >>
>>>     >> _______________________________________________
>>>     >> OAuth mailing list
>>>     >> OAuth@ietf.org <mailto:OAuth@ietf.org>
>>>     >> https://www.ietf.org/mailman/listinfo/oauth
>>>     > _______________________________________________
>>>     > OAuth mailing list
>>>     > OAuth@ietf.org <mailto:OAuth@ietf.org>
>>>     > https://www.ietf.org/mailman/listinfo/oauth
>>>
>>>
>>>     _______________________________________________
>>>     OAuth mailing list
>>>     OAuth@ietf.org <mailto:OAuth@ietf.org>
>>>     https://www.ietf.org/mailman/listinfo/oauth
>>>     _______________________________________________
>>>     OAuth mailing list
>>>     OAuth@ietf.org <mailto:OAuth@ietf.org>
>>>     https://www.ietf.org/mailman/listinfo/oauth
>>>
>>>
>>>     _______________________________________________
>>>     OAuth mailing list
>>>     OAuth@ietf.org <mailto:OAuth@ietf.org>
>>>     https://www.ietf.org/mailman/listinfo/oauth
>>
>>
>
>
>
>     _______________________________________________
>     OAuth mailing list
>     OAuth@ietf.org <mailto:OAuth@ietf.org>
>     https://www.ietf.org/mailman/listinfo/oauth
>
>
>
>
> _______________________________________________
> OAuth mailing list
> OAuth@ietf.org
> https://www.ietf.org/mailman/listinfo/oauth


--------------010502060805030305000209
Content-Type: text/html; charset="ISO-8859-1"
Content-Transfer-Encoding: 7bit

<html>
  <head>
    <meta content="text/html; charset=ISO-8859-1"
      http-equiv="Content-Type">
  </head>
  <body bgcolor="#FFFFFF" text="#000000">
    So that you can fetch and manage all your tokens using the same code
    paths as the OAuth2 services. The "get a token" part will be
    identical to Oauth2 Bearer (except for some details of what comes
    back from the token endpoint, of course), it's the "use a token" bit
    that really changes and is up in the air. You get to use scopes, and
    state, and refresh tokens, and all the other good stuff.<br>
    <br>
    I've brought it up before, but I think it might be worthwhile, at
    least as an exercise, to define a method to get OAuth1-style tokens
    from an OAuth2 token endpoint. You'd defer to OAuth1 for how to use
    them with a protected resource.<br>
    <br>
    &nbsp;-- Justin<br>
    <br>
    <div class="moz-cite-prefix">On 02/15/2013 11:49 AM, Tim Bray wrote:<br>
    </div>
    <blockquote
cite="mid:CA+ZpN24dWAGtZR2aQcqC_N+sHsp7zBVe42LDbrkAsqNVqQPv0w@mail.gmail.com"
      type="cite">
      <meta http-equiv="Content-Type" content="text/html;
        charset=ISO-8859-1">
      Not deeply acquainted with the Flickr scenario, but it occurs to
      me to ask: If OAuth 1.0 is working well for them, why don&#8217;t they
      just keep using it? &nbsp;I.e. if there&#8217;s already a good solution in
      place for people who require secure authn/authz over insecure
      channels, why would we go the extra work of duplicating that in
      OAuth 2 territory? -T<br>
      <br>
      <div class="gmail_quote">On Fri, Feb 15, 2013 at 8:09 AM, William
        Mills <span dir="ltr">&lt;<a moz-do-not-send="true"
            href="mailto:wmills_92105@yahoo.com" target="_blank">wmills_92105@yahoo.com</a>&gt;</span>
        wrote:<br>
        <blockquote class="gmail_quote" style="margin:0 0 0
          .8ex;border-left:1px #ccc solid;padding-left:1ex">
          <div>
            <div style="font-size:12pt;font-family:Courier
              New,courier,monaco,monospace,sans-serif">
              <div><span>I'll repeat the use case for Flickr, which
                  requires OAuth 1.0a type capabilites that OAuth 2 does
                  not provide. &nbsp;Simply stating "move to HTTPS" is not a
                  viable response here. &nbsp;</span></div>
              <div><br>
              </div>
              <div style="font-family:'Courier
                New',courier,monaco,monospace,sans-serif;font-size:12pt">
                <div style="font-family:'times new roman','new
                  york',times,serif;font-size:12pt">
                  <div dir="ltr"> <font face="Arial">
                      <hr size="1"> <b><span style="font-weight:bold">From:</span></b>
                      Torsten Lodderstedt &lt;<a moz-do-not-send="true"
                        href="mailto:torsten@lodderstedt.net"
                        target="_blank">torsten@lodderstedt.net</a>&gt;<br>
                      <b><span style="font-weight:bold">To:</span></b>
                      William Mills &lt;<a moz-do-not-send="true"
                        href="mailto:wmills_92105@yahoo.com"
                        target="_blank">wmills_92105@yahoo.com</a>&gt; <br>
                      <b><span style="font-weight:bold">Cc:</span></b>
                      Mike Jones &lt;<a moz-do-not-send="true"
                        href="mailto:Michael.Jones@microsoft.com"
                        target="_blank">Michael.Jones@microsoft.com</a>&gt;;
                      Justin Richer &lt;<a moz-do-not-send="true"
                        href="mailto:jricher@mitre.org" target="_blank">jricher@mitre.org</a>&gt;;
                      Phil Hunt &lt;<a moz-do-not-send="true"
                        href="mailto:phil.hunt@oracle.com"
                        target="_blank">phil.hunt@oracle.com</a>&gt;;
                      IETF oauth WG &lt;<a moz-do-not-send="true"
                        href="mailto:oauth@ietf.org" target="_blank">oauth@ietf.org</a>&gt;
                      <br>
                      <b><span style="font-weight:bold">Sent:</span></b>
                      Friday, February 15, 2013 7:22 AM<br>
                      <b><span style="font-weight:bold">Subject:</span></b>
                      Re: [OAUTH-WG] Minutes from the OAuth Design Team
                      Conference Call - 11th February 2013<br>
                    </font> </div>
                  <br>
                  <div>
                    <div>
                      <div>Hi Bill,</div>
                      <div><br>
                      </div>
                      <div>I think one needs to compare the costs/impact
                        of HTTPS on one side and the implementation of
                        integrity protection and replay detection on the
                        other. We had this discussion several times.</div>
                      <div><br>
                      </div>
                      <div>regards,</div>
                      <div>Torsten.</div>
                      <div><br>
                        Am 15.02.2013 um 08:08 schrieb William Mills
                        &lt;<a moz-do-not-send="true" rel="nofollow"
                          href="mailto:wmills_92105@yahoo.com"
                          target="_blank">wmills_92105@yahoo.com</a>&gt;:<br>
                        <br>
                      </div>
                      <blockquote type="cite">
                        <div>
                          <div
                            style="font-size:12pt;font-family:'Courier
                            New',courier,monaco,monospace,sans-serif">
                            <div><span>I fundamentally disagree with
                                that too. &nbsp;OAuth 2 is the *framework*,
                                one which supports multiple token types.
                                &nbsp;Bearer tokens were the first credential
                                type defined.</span></div>
                            <div
                              style="font-style:normal;font-size:16px;background-color:transparent;font-family:'Courier
                              New',courier,monaco,monospace,sans-serif"><span><br>
                              </span></div>
                            <div
                              style="font-style:normal;font-size:16px;background-color:transparent;font-family:'Courier
                              New',courier,monaco,monospace,sans-serif">
                              <span>OAuth 1.0a also requires HTTPS
                                transport for authentication and getting
                                the token.</span></div>
                            <div
                              style="font-style:normal;font-size:16px;background-color:transparent;font-family:'Courier
                              New',courier,monaco,monospace,sans-serif">
                              <span><br>
                              </span></div>
                            <div
                              style="font-style:normal;font-size:16px;background-color:transparent;font-family:'Courier
                              New',courier,monaco,monospace,sans-serif"><span>There
                                are &nbsp;real use cases for tokens usable
                                over plain text with integrity
                                protection.</span></div>
                            <div
                              style="font-style:normal;font-size:16px;background-color:transparent;font-family:'Courier
                              New',courier,monaco,monospace,sans-serif"><span><br>
                              </span></div>
                            <div
                              style="font-style:normal;font-size:16px;background-color:transparent;font-family:'Courier
                              New',courier,monaco,monospace,sans-serif">
                              <span>-bill</span></div>
                            <div><br>
                            </div>
                            <div style="font-family:'Courier
                              New',courier,monaco,monospace,sans-serif;font-size:12pt">
                              <div style="font-family:'times new
                                roman','new
                                york',times,serif;font-size:12pt">
                                <div dir="ltr"> <font face="Arial">
                                    <hr size="1"> <b><span
                                        style="font-weight:bold">From:</span></b>
                                    Torsten Lodderstedt &lt;<a
                                      moz-do-not-send="true"
                                      rel="nofollow"
                                      href="mailto:torsten@lodderstedt.net"
                                      target="_blank">torsten@lodderstedt.net</a>&gt;<br>
                                    <b><span style="font-weight:bold">To:</span></b>
                                    William Mills &lt;<a
                                      moz-do-not-send="true"
                                      rel="nofollow"
                                      href="mailto:wmills_92105@yahoo.com"
                                      target="_blank">wmills_92105@yahoo.com</a>&gt;
                                    <br>
                                    <b><span style="font-weight:bold">Cc:</span></b>
                                    Mike Jones &lt;<a
                                      moz-do-not-send="true"
                                      rel="nofollow"
                                      href="mailto:Michael.Jones@microsoft.com"
                                      target="_blank">Michael.Jones@microsoft.com</a>&gt;;
                                    Justin Richer &lt;<a
                                      moz-do-not-send="true"
                                      rel="nofollow"
                                      href="mailto:jricher@mitre.org"
                                      target="_blank">jricher@mitre.org</a>&gt;;
                                    Phil Hunt &lt;<a
                                      moz-do-not-send="true"
                                      rel="nofollow"
                                      href="mailto:phil.hunt@oracle.com"
                                      target="_blank">phil.hunt@oracle.com</a>&gt;;
                                    IETF oauth WG &lt;<a
                                      moz-do-not-send="true"
                                      rel="nofollow"
                                      href="mailto:oauth@ietf.org"
                                      target="_blank">oauth@ietf.org</a>&gt;
                                    <br>
                                    <b><span style="font-weight:bold">Sent:</span></b>
                                    Thursday, February 14, 2013 10:05 PM<br>
                                    <b><span style="font-weight:bold">Subject:</span></b>
                                    Re: [OAUTH-WG] Minutes from the
                                    OAuth Design Team Conference Call -
                                    11th February 2013<br>
                                  </font> </div>
                                <br>
                                <div>
                                  <div>
                                    <div>Hi Bill,</div>
                                    <div><br>
                                    </div>
                                    <div>OAuth 2.0 took a different
                                      direction by relying on HTTPS to
                                      provide the basic protection. So
                                      the need to have a token, which
                                      can be used for service requests
                                      over plain HTTP is arguable. My
                                      understanding of this activity
                                      was, the intend is to provide
                                      additional protection on top of
                                      HTTPS.</div>
                                    <div><br>
                                    </div>
                                    <div>regards,</div>
                                    <div>Torsten.</div>
                                    <div><br>
                                      Am 15.02.2013 um 02:31 schrieb
                                      William Mills &lt;<a
                                        moz-do-not-send="true"
                                        rel="nofollow"
                                        href="mailto:wmills_92105@yahoo.com"
                                        target="_blank">wmills_92105@yahoo.com</a>&gt;:<br>
                                      <br>
                                    </div>
                                    <blockquote type="cite">
                                      <div>
                                        <div
                                          style="font-size:12pt;font-family:'Courier
New',courier,monaco,monospace,sans-serif">
                                          <div><span>I disagree with "</span><span
                                              style="font-family:'times
                                              new roman','new
                                              york',times,serif;font-size:12pt">That
                                              was the impediment to
                                              OAuth 1.0 adoption that
                                              OAuth 2.0 solved in the
                                              first place.", unless
                                              "solving" means does not
                                              address the need for it at
                                              all.</span></div>
                                          <div
                                            style="font-style:normal;font-size:12pt;background-color:transparent;font-family:'times
                                            new roman','new
                                            york',times,serif">
                                            <span
                                              style="font-family:'times
                                              new roman','new
                                              york',times,serif;font-size:12pt"><br>
                                            </span></div>
                                          <div
                                            style="font-style:normal;font-size:16px;background-color:transparent;font-family:'times
                                            new roman','new
                                            york',times,serif">
                                            <span
                                              style="font-family:'times
                                              new roman','new
                                              york',times,serif;font-size:12pt">OAuth
                                              2 does several good
                                              things, but it still lacks
                                              a defined token type that
                                              is safe to user over plain
                                              text HTTP. &nbsp;1.0a solved
                                              that.</span></div>
                                          <div><br>
                                          </div>
                                          <div
                                            style="font-family:'Courier
New',courier,monaco,monospace,sans-serif;font-size:12pt">
                                            <div
                                              style="font-family:'times
                                              new roman','new
                                              york',times,serif;font-size:12pt">
                                              <div dir="ltr"> <font
                                                  face="Arial">
                                                  <hr size="1"> <b><span
style="font-weight:bold">From:</span></b> Mike Jones &lt;<a
                                                    moz-do-not-send="true"
                                                    rel="nofollow"
                                                    href="mailto:Michael.Jones@microsoft.com"
                                                    target="_blank">Michael.Jones@microsoft.com</a>&gt;<br>
                                                  <b><span
                                                      style="font-weight:bold">To:</span></b>
                                                  Justin Richer &lt;<a
                                                    moz-do-not-send="true"
                                                    rel="nofollow"
                                                    href="mailto:jricher@mitre.org"
                                                    target="_blank">jricher@mitre.org</a>&gt;;
                                                  Phil Hunt &lt;<a
                                                    moz-do-not-send="true"
                                                    rel="nofollow"
                                                    href="mailto:phil.hunt@oracle.com"
                                                    target="_blank">phil.hunt@oracle.com</a>&gt;
                                                  <br>
                                                  <b><span
                                                      style="font-weight:bold">Cc:</span></b>
                                                  IETF oauth WG &lt;<a
                                                    moz-do-not-send="true"
                                                    rel="nofollow"
                                                    href="mailto:oauth@ietf.org"
                                                    target="_blank">oauth@ietf.org</a>&gt;
                                                  <br>
                                                  <b><span
                                                      style="font-weight:bold">Sent:</span></b>
                                                  Thursday, February 14,
                                                  2013 1:44 PM<br>
                                                  <b><span
                                                      style="font-weight:bold">Subject:</span></b>
                                                  Re: [OAUTH-WG] Minutes
                                                  from the OAuth Design
                                                  Team Conference Call -
                                                  11th February 2013<br>
                                                </font> </div>
                                              <br>
                                              I'm in favor of reusing
                                              the JWT work that this WG
                                              is also doing. :-)<br>
                                              <br>
                                              I'm pretty skeptical of us
                                              inventing another custom
                                              scheme for signing HTTP
                                              headers.&nbsp; That was the
                                              impediment to OAuth 1.0
                                              adoption that OAuth 2.0
                                              solved in the first place.<br>
                                              <br>
                                              &nbsp;&nbsp;&nbsp; &nbsp;&nbsp;&nbsp; &nbsp;&nbsp;&nbsp; &nbsp;&nbsp;&nbsp; -- Mike<br>
                                              <br>
                                              -----Original Message-----<br>
                                              From: <a
                                                moz-do-not-send="true"
                                                rel="nofollow"
                                                href="mailto:oauth-bounces@ietf.org"
                                                target="_blank">oauth-bounces@ietf.org</a>
                                              [mailto:<a
                                                moz-do-not-send="true"
                                                rel="nofollow"
                                                href="mailto:oauth-bounces@ietf.org"
                                                target="_blank">oauth-bounces@ietf.org</a>]
                                              On Behalf Of Justin Richer<br>
                                              Sent: Tuesday, February
                                              12, 2013 9:35 AM<br>
                                              To: Phil Hunt<br>
                                              Cc: IETF oauth WG<br>
                                              Subject: Re: [OAUTH-WG]
                                              Minutes from the OAuth
                                              Design Team Conference
                                              Call - 11th February 2013<br>
                                              <br>
                                              That's my reading of it as
                                              well, Phil, thanks for
                                              providing the
                                              clarification. One
                                              motivator behind using a
                                              JSON-based token is to be
                                              able to re-use some of the
                                              great work that the JOSE
                                              group is doing but apply
                                              it to an HTTP payload.<br>
                                              <br>
                                              What neither of us want is
                                              a token type that requires
                                              stuffing all query,
                                              header, and other
                                              parameters *into* the JSON
                                              object itself, which would
                                              be a more SOAPy approach.<br>
                                              <br>
                                              &nbsp; -- Justin<br>
                                              <br>
                                              On 02/12/2013 12:30 PM,
                                              Phil Hunt wrote:<br>
                                              &gt; Clarification.&nbsp; I
                                              think Justin and I were in
                                              agreement that we don't
                                              want to see a format that
                                              requires JSON payloads.&nbsp;
                                              We are both interested in
                                              a JSON token used in the
                                              authorization header that
                                              could be based on a
                                              computed signature of some
                                              combination of http
                                              headers and body if
                                              possible.<br>
                                              &gt;<br>
                                              &gt; Phil<br>
                                              &gt;<br>
                                              &gt; @independentid<br>
                                              &gt; <a
                                                moz-do-not-send="true"
                                                rel="nofollow"
                                                href="http://www.independentid.com/"
                                                target="_blank">www.independentid.com</a><br>
                                              &gt; <a
                                                moz-do-not-send="true"
                                                rel="nofollow"
                                                href="mailto:phil.hunt@oracle.com"
                                                target="_blank">phil.hunt@oracle.com</a><br>
                                              &gt;<br>
                                              &gt;<br>
                                              &gt;<br>
                                              &gt;<br>
                                              &gt;<br>
                                              &gt; On 2013-02-12, at
                                              1:10 AM, Hannes Tschofenig
                                              wrote:<br>
                                              &gt;<br>
                                              &gt;&gt; Here are my
                                              notes.<br>
                                              &gt;&gt;<br>
                                              &gt;&gt; Participants:<br>
                                              &gt;&gt;<br>
                                              &gt;&gt; * John Bradley<br>
                                              &gt;&gt; * Derek Atkins<br>
                                              &gt;&gt; * Phil Hunt<br>
                                              &gt;&gt; * Prateek Mishra<br>
                                              &gt;&gt; * Hannes
                                              Tschofenig<br>
                                              &gt;&gt; * Mike Jones<br>
                                              &gt;&gt; * Antonio Sanso<br>
                                              &gt;&gt; * Justin Richer<br>
                                              &gt;&gt;<br>
                                              &gt;&gt; Notes:<br>
                                              &gt;&gt;<br>
                                              &gt;&gt; My slides are
                                              available here: <br>
                                              &gt;&gt; <a
                                                moz-do-not-send="true"
                                                href="http://www.tschofenig.priv.at/OAuth2-Security-11Feb2013.ppt"
                                                target="_blank">http://www.tschofenig.priv.at/OAuth2-Security-11Feb2013.ppt</a><br>
                                              &gt;&gt;<br>
                                              &gt;&gt; Slide #2
                                              summarizes earlier
                                              discussions during the
                                              conference calls.<br>
                                              &gt;&gt;<br>
                                              &gt;&gt; -- HTTP vs. JSON<br>
                                              &gt;&gt;<br>
                                              &gt;&gt; Phil noted that
                                              he does not like to use
                                              the MAC Token draft as a
                                              starting point because it
                                              does not re-use any of the
                                              work done in the JOSE
                                              working group and in
                                              particular all the
                                              libraries that are
                                              available today. He
                                              mentioned that earlier
                                              attempts to write the MAC
                                              Token code lead to
                                              problems for implementers.<br>
                                              &gt;&gt;<br>
                                              &gt;&gt; Justin responded
                                              that he does not agree
                                              with using JSON as a
                                              transport mechanism since
                                              this would replicate a
                                              SOAP style.<br>
                                              &gt;&gt;<br>
                                              &gt;&gt; Phil noted that
                                              he wants to send JSON but
                                              the signature shall be
                                              computed over the HTTP
                                              header field.<br>
                                              &gt;&gt;<br>
                                              &gt;&gt; -- Flexibility
                                              for the keyed message
                                              digest computation<br>
                                              &gt;&gt;<br>
                                              &gt;&gt;&nbsp; From earlier
                                              discussion it was clear
                                              that the conference call
                                              participants wanted more
                                              flexibility regarding the
                                              keyed message digest
                                              computation. For this
                                              purpose Hannes presented
                                              the DKIM based approach,
                                              which allows selective
                                              header fields to be
                                              included in the digest.
                                              This is shown in slide #4.<br>
                                              &gt;&gt;<br>
                                              &gt;&gt; After some
                                              discussion the conference
                                              call participants thought
                                              that this would meet their
                                              needs. Further
                                              investigations would still
                                              be useful to determine the
                                              degree of failed HMAC
                                              calculations due to HTTP
                                              proxies modifying the
                                              content.<br>
                                              &gt;&gt;<br>
                                              &gt;&gt; -- Key
                                              Distribution<br>
                                              &gt;&gt;<br>
                                              &gt;&gt; Hannes presented
                                              the open issue regarding
                                              the choice of key <br>
                                              &gt;&gt; distribution.
                                              Slides #6-#8 present three
                                              techniques and Hannes
                                              asked <br>
                                              &gt;&gt; for feedback
                                              regarding the preferred
                                              style. Justin and others
                                              didn't <br>
                                              &gt;&gt; see the need to
                                              decide on one mechanism -
                                              they wanted to keep the <br>
                                              &gt;&gt; choice open.
                                              Derek indicated that this
                                              will not be an acceptable
                                              <br>
                                              &gt;&gt; approach. Since
                                              the resource server and
                                              the authorization server
                                              may, <br>
                                              &gt;&gt; in the OAuth 2.0
                                              framework, be entities
                                              produced by different
                                              vendors <br>
                                              &gt;&gt; there is an
                                              interoperability need.
                                              Justin responded that he
                                              disagrees <br>
                                              &gt;&gt; and that the
                                              resource server needs to
                                              understand the access
                                              token and <br>
                                              &gt;&gt; referred to the
                                              recent draft submission
                                              for the token
                                              introspection <br>
                                              &gt;&gt; endpoint. Derek
                                              indicated that the
                                              resource server has to
                                              understand <br>
                                              &gt;&gt; the content of
                                              the access token and the
                                              token introspection
                                              endpoint <br>
                                              &gt;&gt; just pushes the
                                              problem around: the
                                              resource server has to
                                              send the <br>
                                              &gt;&gt; access token to
                                              the authorization server
                                              and then the resource
                                              server <br>
                                              &gt;&gt; gets the result
                                              back (which he the<br>
                                              n<br>
                                              &gt;&nbsp; &nbsp; a<br>
                                              &gt;&gt; gain needs to
                                              understand) in order to
                                              make a meaningful
                                              authorization decision.<br>
                                              &gt;&gt;<br>
                                              &gt;&gt; Everyone agreed
                                              that the client must
                                              receive the session key
                                              from the authorization
                                              server and that this
                                              approach has to be
                                              standardized. It was also
                                              agreed that this is a
                                              common approach among all
                                              three key distribution
                                              mechanisms.<br>
                                              &gt;&gt;<br>
                                              &gt;&gt; Hannes asked the
                                              participants to think
                                              about their preference.<br>
                                              &gt;&gt;<br>
                                              &gt;&gt; The questions
                                              regarding key naming and
                                              the indication for the
                                              intended resource server
                                              the client wants to talk
                                              to have been postponed.<br>
                                              &gt;&gt;<br>
                                              &gt;&gt; Ciao<br>
                                              &gt;&gt; Hannes<br>
                                              &gt;&gt;<br>
                                              &gt;&gt;<br>
                                              &gt;&gt;
                                              _______________________________________________<br>
                                              &gt;&gt; OAuth mailing
                                              list<br>
                                              &gt;&gt; <a
                                                moz-do-not-send="true"
                                                rel="nofollow"
                                                href="mailto:OAuth@ietf.org"
                                                target="_blank">OAuth@ietf.org</a><br>
                                              &gt;&gt; <a
                                                moz-do-not-send="true"
                                                rel="nofollow"
                                                href="https://www.ietf.org/mailman/listinfo/oauth"
                                                target="_blank">https://www.ietf.org/mailman/listinfo/oauth</a><br>
                                              &gt;
                                              _______________________________________________<br>
                                              &gt; OAuth mailing list<br>
                                              &gt; <a
                                                moz-do-not-send="true"
                                                rel="nofollow"
                                                href="mailto:OAuth@ietf.org"
                                                target="_blank">OAuth@ietf.org</a><br>
                                              &gt; <a
                                                moz-do-not-send="true"
                                                rel="nofollow"
                                                href="https://www.ietf.org/mailman/listinfo/oauth"
                                                target="_blank">https://www.ietf.org/mailman/listinfo/oauth</a><br>
                                              <br>
                                              <br>
_______________________________________________<br>
                                              OAuth mailing list<br>
                                              <a moz-do-not-send="true"
                                                rel="nofollow"
                                                href="mailto:OAuth@ietf.org"
                                                target="_blank">OAuth@ietf.org</a><br>
                                              <a moz-do-not-send="true"
                                                rel="nofollow"
                                                href="https://www.ietf.org/mailman/listinfo/oauth"
                                                target="_blank">https://www.ietf.org/mailman/listinfo/oauth</a><br>
_______________________________________________<br>
                                              OAuth mailing list<br>
                                              <a moz-do-not-send="true"
                                                rel="nofollow"
                                                href="mailto:OAuth@ietf.org"
                                                target="_blank">OAuth@ietf.org</a><br>
                                              <a moz-do-not-send="true"
                                                rel="nofollow"
                                                href="https://www.ietf.org/mailman/listinfo/oauth"
                                                target="_blank">https://www.ietf.org/mailman/listinfo/oauth</a><br>
                                              <br>
                                              <br>
                                            </div>
                                          </div>
                                        </div>
                                      </div>
                                    </blockquote>
                                    <blockquote type="cite">
                                      <div><span>_______________________________________________</span><br>
                                        <span>OAuth mailing list</span><br>
                                        <span><a moz-do-not-send="true"
                                            rel="nofollow"
                                            href="mailto:OAuth@ietf.org"
                                            target="_blank">OAuth@ietf.org</a></span><br>
                                        <span><a moz-do-not-send="true"
                                            rel="nofollow"
                                            href="https://www.ietf.org/mailman/listinfo/oauth"
                                            target="_blank">https://www.ietf.org/mailman/listinfo/oauth</a></span><br>
                                      </div>
                                    </blockquote>
                                  </div>
                                </div>
                                <br>
                                <br>
                              </div>
                            </div>
                          </div>
                        </div>
                      </blockquote>
                    </div>
                  </div>
                  <br>
                  <br>
                </div>
              </div>
            </div>
          </div>
          <br>
          _______________________________________________<br>
          OAuth mailing list<br>
          <a moz-do-not-send="true" href="mailto:OAuth@ietf.org">OAuth@ietf.org</a><br>
          <a moz-do-not-send="true"
            href="https://www.ietf.org/mailman/listinfo/oauth"
            target="_blank">https://www.ietf.org/mailman/listinfo/oauth</a><br>
          <br>
        </blockquote>
      </div>
      <br>
      <br>
      <fieldset class="mimeAttachmentHeader"></fieldset>
      <br>
      <pre wrap="">_______________________________________________
OAuth mailing list
<a class="moz-txt-link-abbreviated" href="mailto:OAuth@ietf.org">OAuth@ietf.org</a>
<a class="moz-txt-link-freetext" href="https://www.ietf.org/mailman/listinfo/oauth">https://www.ietf.org/mailman/listinfo/oauth</a>
</pre>
    </blockquote>
    <br>
  </body>
</html>

--------------010502060805030305000209--

From wmills_92105@yahoo.com  Fri Feb 15 13:04:08 2013
Return-Path: <wmills_92105@yahoo.com>
X-Original-To: oauth@ietfa.amsl.com
Delivered-To: oauth@ietfa.amsl.com
Received: from localhost (localhost [127.0.0.1]) by ietfa.amsl.com (Postfix) with ESMTP id 78A0121F868D for <oauth@ietfa.amsl.com>; Fri, 15 Feb 2013 13:04:08 -0800 (PST)
X-Virus-Scanned: amavisd-new at amsl.com
X-Spam-Flag: NO
X-Spam-Score: -2.311
X-Spam-Level: 
X-Spam-Status: No, score=-2.311 tagged_above=-999 required=5 tests=[AWL=0.287,  BAYES_00=-2.599, HTML_MESSAGE=0.001]
Received: from mail.ietf.org ([64.170.98.30]) by localhost (ietfa.amsl.com [127.0.0.1]) (amavisd-new, port 10024) with ESMTP id DT8hzmq8l9+2 for <oauth@ietfa.amsl.com>; Fri, 15 Feb 2013 13:04:06 -0800 (PST)
Received: from nm7-vm1.bullet.mail.gq1.yahoo.com (nm7-vm1.bullet.mail.gq1.yahoo.com [98.136.218.208]) by ietfa.amsl.com (Postfix) with SMTP id 4C1A221F8686 for <oauth@ietf.org>; Fri, 15 Feb 2013 13:04:04 -0800 (PST)
Received: from [98.137.12.57] by nm7.bullet.mail.gq1.yahoo.com with NNFMP; 15 Feb 2013 21:04:04 -0000
Received: from [98.137.12.52] by tm2.bullet.mail.gq1.yahoo.com with NNFMP; 15 Feb 2013 21:04:04 -0000
Received: from [127.0.0.1] by omp1067.mail.gq1.yahoo.com with NNFMP; 15 Feb 2013 21:04:04 -0000
X-Yahoo-Newman-Property: ymail-3
X-Yahoo-Newman-Id: 90769.86499.bm@omp1067.mail.gq1.yahoo.com
Received: (qmail 19979 invoked by uid 60001); 15 Feb 2013 21:04:03 -0000
DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=yahoo.com; s=s1024; t=1360962243; bh=B+xHw19ra/ALJhNH+vFyHyLs7CrhpyBQWQ5+j0tWubo=; h=X-YMail-OSG:Received:X-Rocket-MIMEInfo:X-Mailer:References:Message-ID:Date:From:Reply-To:Subject:To:Cc:In-Reply-To:MIME-Version:Content-Type; b=ZZ+OtjZ9nNKSWblQBWLtgDS0LWV6cGLKBZb/oT9ETgljbUVBKfPAwSMArxMa0BeFxUL5NtHsyqi7ZAblA7NFFNulxWm3kqCyxQmY2Sgy4nMjrECJCj/JuvB+rTQuve2nIQxU0hcDXD3FoB/G2hIbcMWnV8cSo42zGTeSeUe7dh8=
DomainKey-Signature: a=rsa-sha1; q=dns; c=nofws; s=s1024; d=yahoo.com; h=X-YMail-OSG:Received:X-Rocket-MIMEInfo:X-Mailer:References:Message-ID:Date:From:Reply-To:Subject:To:Cc:In-Reply-To:MIME-Version:Content-Type; b=m0VD5z7RlPzOlaAIUUrZt24gXVJRQw8TPW7bERESE1VfZT2Pnll9Y7S+E7G3HTFjYzpcm+j+lZWGmph3oIwKVr0/0WpOQGIziNThQx2TwVA9cjSZCuBq3d7val/EayIeiOt8oT3o6DQBhWqirjw2iazjqmjJSCLQxY0ZrJrcx4k=;
X-YMail-OSG: LT_EvGsVM1lGu1U3SDANOw30hvEEe6ZMnngvZzDpzkBpfLm _djnSmPPT2ltChap3RF59KFw3jEdSJ.qpunsB4P8Bz20OYPLxYt.npKSGfpT ULHPVHJPACISkC9Z2_acTFknRg9dp4kyhhn9tZCwWWLtBekT1KiNYltu288u AUTbMBFmc4q7xm22ZHwR.MpGkBXjI9FRasWBMzNgmA5cXQogsmUwzJKQOiDd uDkeLDAHOJrEo30FdJ_1jWp3BQA36klfgsvmJaWKEoIZ4cMAWytB6SBbklss J5oe2foPoRPg0ps8f38CqP1X0snww.lqOXjvQGpmyiph.T_bKCbHfZGlYjfy Wvg.q7pG2cg8isV4FtZP.Uhl3AIdrEw18PNBwyZNh_ow.kYmBA1IKL7TFnPi LBvcbIhRlb_nPNdHKZAv4dp3PTr3xny11AkwdTgW1.Z7ejlwVQzWElfai_aC ipR2JxmwWTR06ZFous3zdpZSedIk8A6iqxJ64GT9ulYigYHqtRPH5WO60C3E cZGmqdsFcnsHbFFvVEX.ENXEtUMcXHalL5ykMknZNqhHL0.rqv3HFER.JJMW sZ5PipiY8d2wZXsLFAmf0_PPNMnnE1bTPAnXcRnWXcofIAGAxDr_pIC5l5Y0 5FIpLk4JxzdPe2xsgeWnje44pfHN4WFxG0qlHH1AOQizA9jIQaw2kHzCskah R7S_H2WJ72.qzVvwS71k39474omxD
Received: from [209.131.62.145] by web31805.mail.mud.yahoo.com via HTTP; Fri, 15 Feb 2013 13:04:02 PST
X-Rocket-MIMEInfo: 001.001, PkkndmUgYnJvdWdodCBpdCB1cCBiZWZvcmUsIGJ1dCBJIHRoaW5rIGl0IG1pZ2h0IGJlIHdvcnRod2hpbGUsIGF0IGxlYXN0IGFzIGFuIGV4ZXJjaXNlLCB0byBkZWZpbmUgYSBtZXRob2QgdG8gZ2V0IE9BdXRoMS1zdHlsZSB0b2tlbnMgZnJvbSBhbiBPQXV0aDIgdG9rZW4gZW5kcG9pbnQuIFlvdSdkIGRlZmVyIHRvIE9BdXRoMSBmb3IgaG93IHRvIHVzZSB0aGVtID53aXRoIGEgcHJvdGVjdGVkIHJlc291cmNlLgoKCllFUyEKCgpfX19fX19fX19fX19fX19fX19fX19fX19fX19fX19fXwogRnJvbTogSnVzdGkBMAEBAQE-
X-Mailer: YahooMailWebService/0.8.134.513
References: <0573984A-8C11-4960-9BC6-F44D4B664C19@gmx.net> <E808B6AC-D5F6-479F-967D-EA6B2586BE64@oracle.com> <511A7D27.8010209@mitre.org> <4E1F6AAD24975D4BA5B16804296739436744BD23@TK5EX14MBXC285.redmond.corp.microsoft.com> <1360891897.14004.YahooMailNeo@web31811.mail.mud.yahoo.com> <E7EBF78C-37EB-4737-8DD5-0F24C9FACA60@lodderstedt.net> <1360912115.36543.YahooMailNeo@web31811.mail.mud.yahoo.com> <2A0F585F-2CEF-418D-9654-5084E6C9BD0D@lodderstedt.net> <1360944589.51724.YahooMailNeo@web31808.mail.mud.yahoo.com> <CA+ZpN24dWAGtZR2aQcqC_N+sHsp7zBVe42LDbrkAsqNVqQPv0w@mail.gmail.com> <511EA0A3.7080000@mitre.org>
Message-ID: <1360962242.18571.YahooMailNeo@web31805.mail.mud.yahoo.com>
Date: Fri, 15 Feb 2013 13:04:02 -0800 (PST)
From: William Mills <wmills_92105@yahoo.com>
To: Justin Richer <jricher@mitre.org>, Tim Bray <twbray@google.com>
In-Reply-To: <511EA0A3.7080000@mitre.org>
MIME-Version: 1.0
Content-Type: multipart/alternative; boundary="-551393103-102741512-1360962242=:18571"
Cc: IETF oauth WG <oauth@ietf.org>
Subject: Re: [OAUTH-WG] Minutes from the OAuth Design Team Conference Call - 11th February 2013
X-BeenThere: oauth@ietf.org
X-Mailman-Version: 2.1.12
Precedence: list
Reply-To: William Mills <wmills_92105@yahoo.com>
List-Id: OAUTH WG <oauth.ietf.org>
List-Unsubscribe: <https://www.ietf.org/mailman/options/oauth>, <mailto:oauth-request@ietf.org?subject=unsubscribe>
List-Archive: <http://www.ietf.org/mail-archive/web/oauth>
List-Post: <mailto:oauth@ietf.org>
List-Help: <mailto:oauth-request@ietf.org?subject=help>
List-Subscribe: <https://www.ietf.org/mailman/listinfo/oauth>, <mailto:oauth-request@ietf.org?subject=subscribe>
X-List-Received-Date: Fri, 15 Feb 2013 21:04:08 -0000

---551393103-102741512-1360962242=:18571
Content-Type: text/plain; charset=utf-8
Content-Transfer-Encoding: quoted-printable

>I've brought it up before, but I think it might be worthwhile, at least as=
 an exercise, to define a method to get OAuth1-style tokens from an OAuth2 =
token endpoint. You'd defer to OAuth1 for how to use them >with a protected=
 resource.=0A=0A=0AYES!=0A=0A=0A________________________________=0A From: J=
ustin Richer <jricher@mitre.org>=0ATo: Tim Bray <twbray@google.com> =0ACc: =
William Mills <wmills_92105@yahoo.com>; IETF oauth WG <oauth@ietf.org> =0AS=
ent: Friday, February 15, 2013 12:54 PM=0ASubject: Re: [OAUTH-WG] Minutes f=
rom the OAuth Design Team Conference Call - 11th February 2013=0A =0A=0ASo =
that you can fetch and manage all your tokens using the same code paths as =
the OAuth2 services. The "get a token" part will be identical to Oauth2 Bea=
rer (except for some details of what comes back from the token endpoint, of=
 course), it's the "use a token" bit that really changes and is up in the a=
ir. You get to use scopes, and state, and refresh tokens, and all the other=
 good stuff.=0A=0AI've brought it up before, but I think it might be worthw=
hile, at=0A    least as an exercise, to define a method to get OAuth1-style=
 tokens=0A    from an OAuth2 token endpoint. You'd defer to OAuth1 for how =
to use=0A    them with a protected resource.=0A=0A=C2=A0-- Justin=0A=0A=0AO=
n 02/15/2013 11:49 AM, Tim Bray wrote:=0A=0ANot deeply acquainted with the =
Flickr scenario, but it occurs to me to ask: If OAuth 1.0 is working well f=
or them, why don=E2=80=99t they just keep using it? =C2=A0I.e. if there=E2=
=80=99s already a good solution in place for people who require secure auth=
n/authz over insecure channels, why would we go the extra work of duplicati=
ng that in OAuth 2 territory? -T=0A>=0A>=0A>On Fri, Feb 15, 2013 at 8:09 AM=
, William Mills <wmills_92105@yahoo.com> wrote:=0A>=0A>I'll repeat the use =
case for Flickr, which requires OAuth 1.0a type capabilites that OAuth 2 do=
es not provide. =C2=A0Simply stating "move to HTTPS" is not a viable respon=
se here. =C2=A0=0A>>=0A>>=0A>>=0A>>________________________________=0A>> Fr=
om: Torsten Lodderstedt <torsten@lodderstedt.net>=0A>>To: William Mills <wm=
ills_92105@yahoo.com> =0A>>Cc: Mike Jones <Michael.Jones@microsoft.com>; Ju=
stin Richer <jricher@mitre.org>; Phil Hunt <phil.hunt@oracle.com>; IETF oau=
th WG <oauth@ietf.org> =0A>>Sent: Friday, February 15, 2013 7:22 AM=0A>>Sub=
ject: Re: [OAUTH-WG] Minutes from the OAuth Design Team Conference Call - 1=
1th February 2013=0A>> =0A>>=0A>>Hi Bill,=0A>>=0A>>=0A>>I think one needs t=
o compare the costs/impact of HTTPS on one side and the implementation of i=
ntegrity protection and replay detection on the other. We had this discussi=
on several times.=0A>>=0A>>=0A>>regards,=0A>>Torsten.=0A>>=0A>>Am 15.02.201=
3 um 08:08 schrieb William Mills=0A                        <wmills_92105@ya=
hoo.com>:=0A>>=0A>>=0A>>I fundamentally disagree with that too. =C2=A0OAuth=
 2 is the *framework*, one which supports multiple token types. =C2=A0Beare=
r tokens were the first credential type defined.=0A>>>=0A>>>=0A>>>OAuth 1.0=
a also requires HTTPS transport for authentication and getting the token.=
=0A>>>=0A>>>=0A>>>There are =C2=A0real use cases for tokens usable over pla=
in text with integrity protection.=0A>>>=0A>>>=0A>>>-bill=0A>>>=0A>>>=0A>>>=
=0A>>>________________________________=0A>>> From: Torsten Lodderstedt <tor=
sten@lodderstedt.net>=0A>>>To: William Mills <wmills_92105@yahoo.com> =0A>>=
>Cc: Mike Jones <Michael.Jones@microsoft.com>; Justin Richer <jricher@mitre=
.org>; Phil Hunt <phil.hunt@oracle.com>; IETF oauth WG <oauth@ietf.org> =0A=
>>>Sent: Thursday, February 14, 2013 10:05 PM=0A>>>Subject: Re: [OAUTH-WG] =
Minutes from the OAuth Design Team Conference Call - 11th February 2013=0A>=
>> =0A>>>=0A>>>Hi Bill,=0A>>>=0A>>>=0A>>>OAuth 2.0 took a different directi=
on by relying on HTTPS to provide the basic protection. So the need to have=
 a token, which can be used for service requests over plain HTTP is arguabl=
e. My understanding of this activity was, the intend is to provide addition=
al protection on top of HTTPS.=0A>>>=0A>>>=0A>>>regards,=0A>>>Torsten.=0A>>=
>=0A>>>Am 15.02.2013 um 02:31 schrieb=0A                                   =
   William Mills <wmills_92105@yahoo.com>:=0A>>>=0A>>>=0A>>>I disagree with=
 "That was the impediment to OAuth 1.0 adoption that OAuth 2.0 solved in th=
e first place.", unless "solving" means does not address the need for it at=
 all.=0A>>>>=0A>>>>=0A>>>>OAuth 2 does several good things, but it still la=
cks a defined token type that is safe to user over plain text HTTP. =C2=A01=
.0a solved that.=0A>>>>=0A>>>>=0A>>>>=0A>>>>_______________________________=
_=0A>>>> From: Mike Jones <Michael.Jones@microsoft.com>=0A>>>>To: Justin Ri=
cher <jricher@mitre.org>; Phil Hunt <phil.hunt@oracle.com> =0A>>>>Cc: IETF =
oauth WG <oauth@ietf.org> =0A>>>>Sent: Thursday, February 14, 2013 1:44 PM=
=0A>>>>Subject: Re: [OAUTH-WG] Minutes from the OAuth Design Team Conferenc=
e Call - 11th February 2013=0A>>>> =0A>>>>I'm in favor of reusing=0A       =
                                       the JWT work that this WG=0A        =
                                      is also doing. :-)=0A>>>>=0A>>>>I'm p=
retty skeptical of us=0A                                              inven=
ting another custom=0A                                              scheme =
for signing HTTP=0A                                              headers.=
=C2=A0 That was the=0A                                              impedim=
ent to OAuth 1.0=0A                                              adoption t=
hat OAuth 2.0=0A                                              solved in the=
 first place.=0A>>>>=0A>>>>=C2=A0=C2=A0=C2=A0 =C2=A0=C2=A0=C2=A0 =C2=A0=C2=
=A0=C2=A0 =C2=A0=C2=A0=C2=A0 -- Mike=0A>>>>=0A>>>>-----Original Message----=
-=0A>>>>From: oauth-bounces@ietf.org [mailto:oauth-bounces@ietf.org] On Beh=
alf Of Justin Richer=0A>>>>Sent: Tuesday, February=0A                      =
                        12, 2013 9:35 AM=0A>>>>To: Phil Hunt=0A>>>>Cc: IETF=
 oauth WG=0A>>>>Subject: Re: [OAUTH-WG]=0A                                 =
             Minutes from the OAuth=0A                                     =
         Design Team Conference=0A                                         =
     Call - 11th February 2013=0A>>>>=0A>>>>That's my reading of it as=0A  =
                                            well, Phil, thanks for=0A      =
                                        providing the=0A                   =
                           clarification. One=0A                           =
                   motivator behind using a=0A                             =
                 JSON-based token is to be=0A                              =
                able to re-use some of the=0A                              =
                great work that the JOSE=0A                                =
              group is doing but apply=0A                                  =
            it to an HTTP payload.=0A>>>>=0A>>>>What neither of us want is=
=0A                                              a token type that requires=
=0A                                              stuffing all query,=0A    =
                                          header, and other=0A             =
                                 parameters *into* the JSON=0A             =
                                 object itself, which would=0A             =
                                 be a more SOAPy approach.=0A>>>>=0A>>>>=C2=
=A0 -- Justin=0A>>>>=0A>>>>On 02/12/2013 12:30 PM,=0A                      =
                        Phil Hunt wrote:=0A>>>>> Clarification.=C2=A0 I=0A =
                                             think Justin and I were in=0A =
                                             agreement that we don't=0A    =
                                          want to see a format that=0A     =
                                         requires JSON payloads.=C2=A0=0A  =
                                            We are both interested in=0A   =
                                           a JSON token used in the=0A     =
                                         authorization header that=0A      =
                                        could be based on a=0A             =
                                 computed signature of some=0A             =
                                 combination of http=0A                    =
                          headers and body if=0A                           =
                   possible.=0A>>>>>=0A>>>>> Phil=0A>>>>>=0A>>>>> @independ=
entid=0A>>>>> www.independentid.com=0A>>>>> phil.hunt@oracle.com=0A>>>>>=0A=
>>>>>=0A>>>>>=0A>>>>>=0A>>>>>=0A>>>>> On 2013-02-12, at=0A                 =
                             1:10 AM, Hannes Tschofenig=0A                 =
                             wrote:=0A>>>>>=0A>>>>>> Here are my=0A        =
                                      notes.=0A>>>>>>=0A>>>>>> Participants=
:=0A>>>>>>=0A>>>>>> * John Bradley=0A>>>>>> * Derek Atkins=0A>>>>>> * Phil =
Hunt=0A>>>>>> * Prateek Mishra=0A>>>>>> * Hannes=0A                        =
                      Tschofenig=0A>>>>>> * Mike Jones=0A>>>>>> * Antonio S=
anso=0A>>>>>> * Justin Richer=0A>>>>>>=0A>>>>>> Notes:=0A>>>>>>=0A>>>>>> My=
 slides are=0A                                              available here:=
 =0A>>>>>> http://www.tschofenig.priv.at/OAuth2-Security-11Feb2013.ppt=0A>>=
>>>>=0A>>>>>> Slide #2=0A                                              summ=
arizes earlier=0A                                              discussions =
during the=0A                                              conference calls=
.=0A>>>>>>=0A>>>>>> -- HTTP vs. JSON=0A>>>>>>=0A>>>>>> Phil noted that=0A  =
                                            he does not like to use=0A     =
                                         the MAC Token draft as a=0A       =
                                       starting point because it=0A        =
                                      does not re-use any of the=0A        =
                                      work done in the JOSE=0A             =
                                 working group and in=0A                   =
                           particular all the=0A                           =
                   libraries that are=0A                                   =
           available today. He=0A                                          =
    mentioned that earlier=0A                                              =
attempts to write the MAC=0A                                              T=
oken code lead to=0A                                              problems =
for implementers.=0A>>>>>>=0A>>>>>> Justin responded=0A                    =
                          that he does not agree=0A                        =
                      with using JSON as a=0A                              =
                transport mechanism since=0A                               =
               this would replicate a=0A                                   =
           SOAP style.=0A>>>>>>=0A>>>>>> Phil noted that=0A                =
                              he wants to send JSON but=0A                 =
                             the signature shall be=0A                     =
                         computed over the HTTP=0A                         =
                     header field.=0A>>>>>>=0A>>>>>> -- Flexibility=0A     =
                                         for the keyed message=0A          =
                                    digest computation=0A>>>>>>=0A>>>>>>=C2=
=A0 From earlier=0A                                              discussion=
 it was clear=0A                                              that the conf=
erence call=0A                                              participants wa=
nted more=0A                                              flexibility regar=
ding the=0A                                              keyed message dige=
st=0A                                              computation. For this=0A=
                                              purpose Hannes presented=0A  =
                                            the DKIM based approach,=0A    =
                                          which allows selective=0A        =
                                      header fields to be=0A               =
                               included in the digest.=0A                  =
                            This is shown in slide #4.=0A>>>>>>=0A>>>>>> Af=
ter some=0A                                              discussion the con=
ference=0A                                              call participants t=
hought=0A                                              that this would meet=
 their=0A                                              needs. Further=0A   =
                                           investigations would still=0A   =
                                           be useful to determine the=0A   =
                                           degree of failed HMAC=0A        =
                                      calculations due to HTTP=0A          =
                                    proxies modifying the=0A               =
                               content.=0A>>>>>>=0A>>>>>> -- Key=0A        =
                                      Distribution=0A>>>>>>=0A>>>>>> Hannes=
 presented=0A                                              the open issue r=
egarding=0A                                              the choice of key =
=0A>>>>>> distribution.=0A                                              Sli=
des #6-#8 present three=0A                                              tec=
hniques and Hannes=0A                                              asked =
=0A>>>>>> for feedback=0A                                              rega=
rding the preferred=0A                                              style. =
Justin and others=0A                                              didn't =
=0A>>>>>> see the need to=0A                                              d=
ecide on one mechanism -=0A                                              th=
ey wanted to keep the =0A>>>>>> choice open.=0A                            =
                  Derek indicated that this=0A                             =
                 will not be an acceptable =0A>>>>>> approach. Since=0A    =
                                          the resource server and=0A       =
                                       the authorization server=0A         =
                                     may, =0A>>>>>> in the OAuth 2.0=0A    =
                                          framework, be entities=0A        =
                                      produced by different=0A             =
                                 vendors =0A>>>>>> there is an=0A          =
                                    interoperability need.=0A              =
                                Justin responded that he=0A                =
                              disagrees =0A>>>>>> and that the=0A          =
                                    resource server needs to=0A            =
                                  understand the access=0A                 =
                             token and =0A>>>>>> referred to the=0A        =
                                      recent draft submission=0A           =
                                   for the token=0A                        =
                      introspection =0A>>>>>> endpoint. Derek=0A           =
                                   indicated that the=0A                   =
                           resource server has to=0A                       =
                       understand =0A>>>>>> the content of=0A              =
                                the access token and the=0A                =
                              token introspection=0A                       =
                       endpoint =0A>>>>>> just pushes the=0A               =
                               problem around: the=0A                      =
                        resource server has to=0A                          =
                    send the =0A>>>>>> access token to=0A                  =
                            the authorization server=0A                    =
                          and then the resource=0A                         =
                     server =0A>>>>>> gets the result=0A                   =
                           back (which he the=0A>>>>n=0A>>>>>=C2=A0 =C2=A0 =
a=0A>>>>>> gain needs to=0A                                              un=
derstand) in order to=0A                                              make =
a meaningful=0A                                              authorization =
decision.=0A>>>>>>=0A>>>>>> Everyone agreed=0A                             =
                 that the client must=0A                                   =
           receive the session key=0A                                      =
        from the authorization=0A                                          =
    server and that this=0A                                              ap=
proach has to be=0A                                              standardiz=
ed. It was also=0A                                              agreed that=
 this is a=0A                                              common approach =
among all=0A                                              three key distrib=
ution=0A                                              mechanisms.=0A>>>>>>=
=0A>>>>>> Hannes asked the=0A                                              =
participants to think=0A                                              about=
 their preference.=0A>>>>>>=0A>>>>>> The questions=0A                      =
                        regarding key naming and=0A                        =
                      the indication for the=0A                            =
                  intended resource server=0A                              =
                the client wants to talk=0A                                =
              to have been postponed.=0A>>>>>>=0A>>>>>> Ciao=0A>>>>>> Hanne=
s=0A>>>>>>=0A>>>>>>=0A>>>>>>=0A                                            =
  _______________________________________________=0A>>>>>> OAuth mailing=0A=
                                              list=0A>>>>>> OAuth@ietf.org=
=0A>>>>>> https://www.ietf.org/mailman/listinfo/oauth=0A>>>>>=0A           =
                                   ________________________________________=
_______=0A>>>>> OAuth mailing list=0A>>>>> OAuth@ietf.org=0A>>>>> https://w=
ww.ietf.org/mailman/listinfo/oauth=0A>>>>=0A>>>>=0A>>>>____________________=
___________________________=0A>>>>OAuth mailing list=0A>>>>OAuth@ietf.org=
=0A>>>>https://www.ietf.org/mailman/listinfo/oauth=0A>>>>__________________=
_____________________________=0A>>>>OAuth mailing list=0A>>>>OAuth@ietf.org=
=0A>>>>https://www.ietf.org/mailman/listinfo/oauth=0A>>>>=0A>>>>=0A>>>>=0A>=
>>_______________________________________________=0A>>>>OAuth mailing list=
=0A>>>>OAuth@ietf.org=0A>>>>https://www.ietf.org/mailman/listinfo/oauth=0A>=
>>>=0A>>>=0A>>>=0A>>=0A>>=0A>>_____________________________________________=
__=0A>>OAuth mailing list=0A>>OAuth@ietf.org=0A>>https://www.ietf.org/mailm=
an/listinfo/oauth=0A>>=0A>>=0A>=0A>=0A>=0A>________________________________=
_______________=0AOAuth mailing list OAuth@ietf.org https://www.ietf.org/ma=
ilman/listinfo/oauth 
---551393103-102741512-1360962242=:18571
Content-Type: text/html; charset=utf-8
Content-Transfer-Encoding: quoted-printable

<html><body><div style=3D"color:#000; background-color:#fff; font-family:Co=
urier New, courier, monaco, monospace, sans-serif;font-size:12pt"><div><spa=
n><span style=3D"font-family: 'times new roman', 'new york', times, serif;"=
>&gt;I've brought it up before, but I think it might be worthwhile, at leas=
t as an exercise, to define a method to get OAuth1-style tokens from an OAu=
th2 token endpoint. You'd defer to OAuth1 for how to use them &gt;with a pr=
otected resource.</span><br style=3D"font-family: 'times new roman', 'new y=
ork', times, serif;"></span></div><div><br></div><div style=3D"color: rgb(0=
, 0, 0); font-size: 16px; font-family: 'Courier New', courier, monaco, mono=
space, sans-serif; background-color: transparent; font-style: normal;">YES!=
</div><div style=3D"color: rgb(0, 0, 0); font-size: 16px; font-family: 'Cou=
rier New', courier, monaco, monospace, sans-serif; background-color: transp=
arent; font-style: normal;"><br></div>  <div style=3D"font-family: 'Courier
 New', courier, monaco, monospace, sans-serif; font-size: 12pt;"> <div styl=
e=3D"font-family: 'times new roman', 'new york', times, serif; font-size: 1=
2pt;"> <div dir=3D"ltr"> <font size=3D"2" face=3D"Arial"> <hr size=3D"1">  =
<b><span style=3D"font-weight:bold;">From:</span></b> Justin Richer &lt;jri=
cher@mitre.org&gt;<br> <b><span style=3D"font-weight: bold;">To:</span></b>=
 Tim Bray &lt;twbray@google.com&gt; <br><b><span style=3D"font-weight: bold=
;">Cc:</span></b> William Mills &lt;wmills_92105@yahoo.com&gt;; IETF oauth =
WG &lt;oauth@ietf.org&gt; <br> <b><span style=3D"font-weight: bold;">Sent:<=
/span></b> Friday, February 15, 2013 12:54 PM<br> <b><span style=3D"font-we=
ight: bold;">Subject:</span></b> Re: [OAUTH-WG] Minutes from the OAuth Desi=
gn Team Conference Call - 11th February 2013<br> </font> </div> <br><div id=
=3D"yiv626666927">=0A  =0A=0A    =0A  =0A  <div>=0A    So that you can fetc=
h and manage all your tokens using the same code=0A    paths as the OAuth2 =
services. The "get a token" part will be=0A    identical to Oauth2 Bearer (=
except for some details of what comes=0A    back from the token endpoint, o=
f course), it's the "use a token" bit=0A    that really changes and is up i=
n the air. You get to use scopes, and=0A    state, and refresh tokens, and =
all the other good stuff.<br>=0A    <br>=0A    I've brought it up before, b=
ut I think it might be worthwhile, at=0A    least as an exercise, to define=
 a method to get OAuth1-style tokens=0A    from an OAuth2 token endpoint. Y=
ou'd defer to OAuth1 for how to use=0A    them with a protected resource.<b=
r>=0A    <br>=0A    &nbsp;-- Justin<br>=0A    <br>=0A    <div class=3D"yiv6=
26666927moz-cite-prefix">On 02/15/2013 11:49 AM, Tim Bray wrote:<br>=0A    =
</div>=0A    <blockquote type=3D"cite">=0A      =0A      Not deeply acquain=
ted with the Flickr scenario, but it occurs to=0A      me to ask: If OAuth =
1.0 is working well for them, why don=E2=80=99t they=0A      just keep usin=
g it? &nbsp;I.e. if there=E2=80=99s already a good solution in=0A      plac=
e for people who require secure authn/authz over insecure=0A      channels,=
 why would we go the extra work of duplicating that in=0A      OAuth 2 terr=
itory? -T<br>=0A      <br>=0A      <div class=3D"yiv626666927gmail_quote">O=
n Fri, Feb 15, 2013 at 8:09 AM, William=0A        Mills <span dir=3D"ltr">&=
lt;<a rel=3D"nofollow" ymailto=3D"mailto:wmills_92105@yahoo.com" target=3D"=
_blank" href=3D"mailto:wmills_92105@yahoo.com">wmills_92105@yahoo.com</a>&g=
t;</span>=0A        wrote:<br>=0A        <blockquote class=3D"yiv626666927g=
mail_quote" style=3D"margin:0 0 0 .8ex;border-left:1px #ccc solid;padding-l=
eft:1ex;">=0A          <div>=0A            <div style=3D"font-size: 12pt; f=
ont-family: 'Courier New', courier, monaco, monospace, sans-serif;">=0A    =
          <div><span>I'll repeat the use case for Flickr, which=0A         =
         requires OAuth 1.0a type capabilites that OAuth 2 does=0A         =
         not provide. &nbsp;Simply stating "move to HTTPS" is not a=0A     =
             viable response here. &nbsp;</span></div>=0A              <div=
><br>=0A              </div>=0A              <div style=3D"font-family:'Cou=
rier=0A                New', courier, monaco, monospace, sans-serif;font-si=
ze:12pt;">=0A                <div style=3D"font-family:'times new roman', '=
new=0A                  york', times, serif;font-size:12pt;">=0A           =
       <div dir=3D"ltr"> <font face=3D"Arial">=0A                      <hr =
size=3D"1"> <b><span style=3D"font-weight:bold;">From:</span></b>=0A       =
               Torsten Lodderstedt &lt;<a rel=3D"nofollow" ymailto=3D"mailt=
o:torsten@lodderstedt.net" target=3D"_blank" href=3D"mailto:torsten@lodders=
tedt.net">torsten@lodderstedt.net</a>&gt;<br>=0A                      <b><s=
pan style=3D"font-weight:bold;">To:</span></b>=0A                      Will=
iam Mills &lt;<a rel=3D"nofollow" ymailto=3D"mailto:wmills_92105@yahoo.com"=
 target=3D"_blank" href=3D"mailto:wmills_92105@yahoo.com">wmills_92105@yaho=
o.com</a>&gt; <br>=0A                      <b><span style=3D"font-weight:bo=
ld;">Cc:</span></b>=0A                      Mike Jones &lt;<a rel=3D"nofoll=
ow" ymailto=3D"mailto:Michael.Jones@microsoft.com" target=3D"_blank" href=
=3D"mailto:Michael.Jones@microsoft.com">Michael.Jones@microsoft.com</a>&gt;=
;=0A                      Justin Richer &lt;<a rel=3D"nofollow" ymailto=3D"=
mailto:jricher@mitre.org" target=3D"_blank" href=3D"mailto:jricher@mitre.or=
g">jricher@mitre.org</a>&gt;;=0A                      Phil Hunt &lt;<a rel=
=3D"nofollow" ymailto=3D"mailto:phil.hunt@oracle.com" target=3D"_blank" hre=
f=3D"mailto:phil.hunt@oracle.com">phil.hunt@oracle.com</a>&gt;;=0A         =
             IETF oauth WG &lt;<a rel=3D"nofollow" ymailto=3D"mailto:oauth@=
ietf.org" target=3D"_blank" href=3D"mailto:oauth@ietf.org">oauth@ietf.org</=
a>&gt;=0A                      <br>=0A                      <b><span style=
=3D"font-weight:bold;">Sent:</span></b>=0A                      Friday, Feb=
ruary 15, 2013 7:22 AM<br>=0A                      <b><span style=3D"font-w=
eight:bold;">Subject:</span></b>=0A                      Re: [OAUTH-WG] Min=
utes from the OAuth Design Team=0A                      Conference Call - 1=
1th February 2013<br>=0A                    </font> </div>=0A              =
    <br>=0A                  <div>=0A                    <div>=0A          =
            <div>Hi Bill,</div>=0A                      <div><br>=0A       =
               </div>=0A                      <div>I think one needs to com=
pare the costs/impact=0A                        of HTTPS on one side and th=
e implementation of=0A                        integrity protection and repl=
ay detection on the=0A                        other. We had this discussion=
 several times.</div>=0A                      <div><br>=0A                 =
     </div>=0A                      <div>regards,</div>=0A                 =
     <div>Torsten.</div>=0A                      <div><br>=0A              =
          Am 15.02.2013 um 08:08 schrieb William Mills=0A                  =
      &lt;<a rel=3D"nofollow" ymailto=3D"mailto:wmills_92105@yahoo.com" tar=
get=3D"_blank" href=3D"mailto:wmills_92105@yahoo.com">wmills_92105@yahoo.co=
m</a>&gt;:<br>=0A                        <br>=0A                      </div=
>=0A                      <blockquote type=3D"cite">=0A                    =
    <div>=0A                          <div style=3D"font-size:12pt;font-fam=
ily:'Courier=0A                            New', courier, monaco, monospace=
, sans-serif;">=0A                            <div><span>I fundamentally di=
sagree with=0A                                that too. &nbsp;OAuth 2 is th=
e *framework*,=0A                                one which supports multipl=
e token types.=0A                                &nbsp;Bearer tokens were t=
he first credential=0A                                type defined.</span><=
/div>=0A                            <div style=3D"font-style:normal;font-si=
ze:16px;background-color:transparent;font-family:'Courier=0A               =
               New', courier, monaco, monospace, sans-serif;"><span><br>=0A=
                              </span></div>=0A                            <=
div style=3D"font-style:normal;font-size:16px;background-color:transparent;=
font-family:'Courier=0A                              New', courier, monaco,=
 monospace, sans-serif;">=0A                              <span>OAuth 1.0a =
also requires HTTPS=0A                                transport for authent=
ication and getting=0A                                the token.</span></di=
v>=0A                            <div style=3D"font-style:normal;font-size:=
16px;background-color:transparent;font-family:'Courier=0A                  =
            New', courier, monaco, monospace, sans-serif;">=0A             =
                 <span><br>=0A                              </span></div>=
=0A                            <div style=3D"font-style:normal;font-size:16=
px;background-color:transparent;font-family:'Courier=0A                    =
          New', courier, monaco, monospace, sans-serif;"><span>There=0A    =
                            are &nbsp;real use cases for tokens usable=0A  =
                              over plain text with integrity=0A            =
                    protection.</span></div>=0A                            =
<div style=3D"font-style:normal;font-size:16px;background-color:transparent=
;font-family:'Courier=0A                              New', courier, monaco=
, monospace, sans-serif;"><span><br>=0A                              </span=
></div>=0A                            <div style=3D"font-style:normal;font-=
size:16px;background-color:transparent;font-family:'Courier=0A             =
                 New', courier, monaco, monospace, sans-serif;">=0A        =
                      <span>-bill</span></div>=0A                          =
  <div><br>=0A                            </div>=0A                        =
    <div style=3D"font-family:'Courier=0A                              New'=
, courier, monaco, monospace, sans-serif;font-size:12pt;">=0A              =
                <div style=3D"font-family:'times new=0A                    =
            roman', 'new=0A                                york', times, se=
rif;font-size:12pt;">=0A                                <div dir=3D"ltr"> <=
font face=3D"Arial">=0A                                    <hr size=3D"1"> =
<b><span style=3D"font-weight:bold;">From:</span></b>=0A                   =
                 Torsten Lodderstedt &lt;<a rel=3D"nofollow" ymailto=3D"mai=
lto:torsten@lodderstedt.net" target=3D"_blank" href=3D"mailto:torsten@lodde=
rstedt.net">torsten@lodderstedt.net</a>&gt;<br>=0A                         =
           <b><span style=3D"font-weight:bold;">To:</span></b>=0A          =
                          William Mills &lt;<a rel=3D"nofollow" ymailto=3D"=
mailto:wmills_92105@yahoo.com" target=3D"_blank" href=3D"mailto:wmills_9210=
5@yahoo.com">wmills_92105@yahoo.com</a>&gt;=0A                             =
       <br>=0A                                    <b><span style=3D"font-we=
ight:bold;">Cc:</span></b>=0A                                    Mike Jones=
 &lt;<a rel=3D"nofollow" ymailto=3D"mailto:Michael.Jones@microsoft.com" tar=
get=3D"_blank" href=3D"mailto:Michael.Jones@microsoft.com">Michael.Jones@mi=
crosoft.com</a>&gt;;=0A                                    Justin Richer &l=
t;<a rel=3D"nofollow" ymailto=3D"mailto:jricher@mitre.org" target=3D"_blank=
" href=3D"mailto:jricher@mitre.org">jricher@mitre.org</a>&gt;;=0A          =
                          Phil Hunt &lt;<a rel=3D"nofollow" ymailto=3D"mail=
to:phil.hunt@oracle.com" target=3D"_blank" href=3D"mailto:phil.hunt@oracle.=
com">phil.hunt@oracle.com</a>&gt;;=0A                                    IE=
TF oauth WG &lt;<a rel=3D"nofollow" ymailto=3D"mailto:oauth@ietf.org" targe=
t=3D"_blank" href=3D"mailto:oauth@ietf.org">oauth@ietf.org</a>&gt;=0A      =
                              <br>=0A                                    <b=
><span style=3D"font-weight:bold;">Sent:</span></b>=0A                     =
               Thursday, February 14, 2013 10:05 PM<br>=0A                 =
                   <b><span style=3D"font-weight:bold;">Subject:</span></b>=
=0A                                    Re: [OAUTH-WG] Minutes from the=0A  =
                                  OAuth Design Team Conference Call -=0A   =
                                 11th February 2013<br>=0A                 =
                 </font> </div>=0A                                <br>=0A  =
                              <div>=0A                                  <di=
v>=0A                                    <div>Hi Bill,</div>=0A            =
                        <div><br>=0A                                    </d=
iv>=0A                                    <div>OAuth 2.0 took a different=
=0A                                      direction by relying on HTTPS to=
=0A                                      provide the basic protection. So=
=0A                                      the need to have a token, which=0A=
                                      can be used for service requests=0A  =
                                    over plain HTTP is arguable. My=0A     =
                                 understanding of this activity=0A         =
                             was, the intend is to provide=0A              =
                        additional protection on top of=0A                 =
                     HTTPS.</div>=0A                                    <di=
v><br>=0A                                    </div>=0A                     =
               <div>regards,</div>=0A                                    <d=
iv>Torsten.</div>=0A                                    <div><br>=0A       =
                               Am 15.02.2013 um 02:31 schrieb=0A           =
                           William Mills &lt;<a rel=3D"nofollow" ymailto=3D=
"mailto:wmills_92105@yahoo.com" target=3D"_blank" href=3D"mailto:wmills_921=
05@yahoo.com">wmills_92105@yahoo.com</a>&gt;:<br>=0A                       =
               <br>=0A                                    </div>=0A        =
                            <blockquote type=3D"cite">=0A                  =
                    <div>=0A                                        <div st=
yle=3D"font-size:12pt;font-family:'Courier=0ANew', courier, monaco, monospa=
ce, sans-serif;">=0A                                          <div><span>I =
disagree with "</span><span style=3D"font-family:'times=0A                 =
                             new roman', 'new=0A                           =
                   york', times, serif;font-size:12pt;">That=0A            =
                                  was the impediment to=0A                 =
                             OAuth 1.0 adoption that=0A                    =
                          OAuth 2.0 solved in the=0A                       =
                       first place.", unless=0A                            =
                  "solving" means does not=0A                              =
                address the need for it at=0A                              =
                all.</span></div>=0A                                       =
   <div style=3D"font-style:normal;font-size:12pt;background-color:transpar=
ent;font-family:'times=0A                                            new ro=
man', 'new=0A                                            york', times, seri=
f;">=0A                                            <span style=3D"font-fami=
ly:'times=0A                                              new roman', 'new=
=0A                                              york', times, serif;font-s=
ize:12pt;"><br>=0A                                            </span></div>=
=0A                                          <div style=3D"font-style:norma=
l;font-size:16px;background-color:transparent;font-family:'times=0A        =
                                    new roman', 'new=0A                    =
                        york', times, serif;">=0A                          =
                  <span style=3D"font-family:'times=0A                     =
                         new roman', 'new=0A                               =
               york', times, serif;font-size:12pt;">OAuth=0A               =
                               2 does several good=0A                      =
                        things, but it still lacks=0A                      =
                        a defined token type that=0A                       =
                       is safe to user over plain=0A                       =
                       text HTTP. &nbsp;1.0a solved=0A                     =
                         that.</span></div>=0A                             =
             <div><br>=0A                                          </div>=
=0A                                          <div style=3D"font-family:'Cou=
rier=0ANew', courier, monaco, monospace, sans-serif;font-size:12pt;">=0A   =
                                         <div style=3D"font-family:'times=
=0A                                              new roman', 'new=0A       =
                                       york', times, serif;font-size:12pt;"=
>=0A                                              <div dir=3D"ltr"> <font f=
ace=3D"Arial">=0A                                                  <hr size=
=3D"1"> <b><span style=3D"font-weight:bold;">From:</span></b> Mike Jones &l=
t;<a rel=3D"nofollow" ymailto=3D"mailto:Michael.Jones@microsoft.com" target=
=3D"_blank" href=3D"mailto:Michael.Jones@microsoft.com">Michael.Jones@micro=
soft.com</a>&gt;<br>=0A                                                  <b=
><span style=3D"font-weight:bold;">To:</span></b>=0A                       =
                           Justin Richer &lt;<a rel=3D"nofollow" ymailto=3D=
"mailto:jricher@mitre.org" target=3D"_blank" href=3D"mailto:jricher@mitre.o=
rg">jricher@mitre.org</a>&gt;;=0A                                          =
        Phil Hunt &lt;<a rel=3D"nofollow" ymailto=3D"mailto:phil.hunt@oracl=
e.com" target=3D"_blank" href=3D"mailto:phil.hunt@oracle.com">phil.hunt@ora=
cle.com</a>&gt;=0A                                                  <br>=0A=
                                                  <b><span style=3D"font-we=
ight:bold;">Cc:</span></b>=0A                                              =
    IETF oauth WG &lt;<a rel=3D"nofollow" ymailto=3D"mailto:oauth@ietf.org"=
 target=3D"_blank" href=3D"mailto:oauth@ietf.org">oauth@ietf.org</a>&gt;=0A=
                                                  <br>=0A                  =
                                <b><span style=3D"font-weight:bold;">Sent:<=
/span></b>=0A                                                  Thursday, Fe=
bruary 14,=0A                                                  2013 1:44 PM=
<br>=0A                                                  <b><span style=3D"=
font-weight:bold;">Subject:</span></b>=0A                                  =
                Re: [OAUTH-WG] Minutes=0A                                  =
                from the OAuth Design=0A                                   =
               Team Conference Call -=0A                                   =
               11th February 2013<br>=0A                                   =
             </font> </div>=0A                                             =
 <br>=0A                                              I'm in favor of reusi=
ng=0A                                              the JWT work that this W=
G=0A                                              is also doing. :-)<br>=0A=
                                              <br>=0A                      =
                        I'm pretty skeptical of us=0A                      =
                        inventing another custom=0A                        =
                      scheme for signing HTTP=0A                           =
                   headers.&nbsp; That was the=0A                          =
                    impediment to OAuth 1.0=0A                             =
                 adoption that OAuth 2.0=0A                                =
              solved in the first place.<br>=0A                            =
                  <br>=0A                                              &nbs=
p;&nbsp;&nbsp; &nbsp;&nbsp;&nbsp; &nbsp;&nbsp;&nbsp; &nbsp;&nbsp;&nbsp; -- =
Mike<br>=0A                                              <br>=0A           =
                                   -----Original Message-----<br>=0A       =
                                       From: <a rel=3D"nofollow" ymailto=3D=
"mailto:oauth-bounces@ietf.org" target=3D"_blank" href=3D"mailto:oauth-boun=
ces@ietf.org">oauth-bounces@ietf.org</a>=0A                                =
              [mailto:<a rel=3D"nofollow" ymailto=3D"mailto:oauth-bounces@i=
etf.org" target=3D"_blank" href=3D"mailto:oauth-bounces@ietf.org">oauth-bou=
nces@ietf.org</a>]=0A                                              On Behal=
f Of Justin Richer<br>=0A                                              Sent=
: Tuesday, February=0A                                              12, 201=
3 9:35 AM<br>=0A                                              To: Phil Hunt=
<br>=0A                                              Cc: IETF oauth WG<br>=
=0A                                              Subject: Re: [OAUTH-WG]=0A=
                                              Minutes from the OAuth=0A    =
                                          Design Team Conference=0A        =
                                      Call - 11th February 2013<br>=0A     =
                                         <br>=0A                           =
                   That's my reading of it as=0A                           =
                   well, Phil, thanks for=0A                               =
               providing the=0A                                            =
  clarification. One=0A                                              motiva=
tor behind using a=0A                                              JSON-bas=
ed token is to be=0A                                              able to r=
e-use some of the=0A                                              great wor=
k that the JOSE=0A                                              group is do=
ing but apply=0A                                              it to an HTTP=
 payload.<br>=0A                                              <br>=0A      =
                                        What neither of us want is=0A      =
                                        a token type that requires=0A      =
                                        stuffing all query,=0A             =
                                 header, and other=0A                      =
                        parameters *into* the JSON=0A                      =
                        object itself, which would=0A                      =
                        be a more SOAPy approach.<br>=0A                   =
                           <br>=0A                                         =
     &nbsp; -- Justin<br>=0A                                              <=
br>=0A                                              On 02/12/2013 12:30 PM,=
=0A                                              Phil Hunt wrote:<br>=0A   =
                                           &gt; Clarification.&nbsp; I=0A  =
                                            think Justin and I were in=0A  =
                                            agreement that we don't=0A     =
                                         want to see a format that=0A      =
                                        requires JSON payloads.&nbsp;=0A   =
                                           We are both interested in=0A    =
                                          a JSON token used in the=0A      =
                                        authorization header that=0A       =
                                       could be based on a=0A              =
                                computed signature of some=0A              =
                                combination of http=0A                     =
                         headers and body if=0A                            =
                  possible.<br>=0A                                         =
     &gt;<br>=0A                                              &gt; Phil<br>=
=0A                                              &gt;<br>=0A               =
                               &gt; @independentid<br>=0A                  =
                            &gt; <a rel=3D"nofollow" target=3D"_blank" href=
=3D"http://www.independentid.com/">www.independentid.com</a><br>=0A        =
                                      &gt; <a rel=3D"nofollow" ymailto=3D"m=
ailto:phil.hunt@oracle.com" target=3D"_blank" href=3D"mailto:phil.hunt@orac=
le.com">phil.hunt@oracle.com</a><br>=0A                                    =
          &gt;<br>=0A                                              &gt;<br>=
=0A                                              &gt;<br>=0A               =
                               &gt;<br>=0A                                 =
             &gt;<br>=0A                                              &gt; =
On 2013-02-12, at=0A                                              1:10 AM, =
Hannes Tschofenig=0A                                              wrote:<br=
>=0A                                              &gt;<br>=0A              =
                                &gt;&gt; Here are my=0A                    =
                          notes.<br>=0A                                    =
          &gt;&gt;<br>=0A                                              &gt;=
&gt; Participants:<br>=0A                                              &gt;=
&gt;<br>=0A                                              &gt;&gt; * John Br=
adley<br>=0A                                              &gt;&gt; * Derek =
Atkins<br>=0A                                              &gt;&gt; * Phil =
Hunt<br>=0A                                              &gt;&gt; * Prateek=
 Mishra<br>=0A                                              &gt;&gt; * Hann=
es=0A                                              Tschofenig<br>=0A       =
                                       &gt;&gt; * Mike Jones<br>=0A        =
                                      &gt;&gt; * Antonio Sanso<br>=0A      =
                                        &gt;&gt; * Justin Richer<br>=0A    =
                                          &gt;&gt;<br>=0A                  =
                            &gt;&gt; Notes:<br>=0A                         =
                     &gt;&gt;<br>=0A                                       =
       &gt;&gt; My slides are=0A                                           =
   available here: <br>=0A                                              &gt=
;&gt; <a rel=3D"nofollow" target=3D"_blank" href=3D"http://www.tschofenig.p=
riv.at/OAuth2-Security-11Feb2013.ppt">http://www.tschofenig.priv.at/OAuth2-=
Security-11Feb2013.ppt</a><br>=0A                                          =
    &gt;&gt;<br>=0A                                              &gt;&gt; S=
lide #2=0A                                              summarizes earlier=
=0A                                              discussions during the=0A =
                                             conference calls.<br>=0A      =
                                        &gt;&gt;<br>=0A                    =
                          &gt;&gt; -- HTTP vs. JSON<br>=0A                 =
                             &gt;&gt;<br>=0A                               =
               &gt;&gt; Phil noted that=0A                                 =
             he does not like to use=0A                                    =
          the MAC Token draft as a=0A                                      =
        starting point because it=0A                                       =
       does not re-use any of the=0A                                       =
       work done in the JOSE=0A                                            =
  working group and in=0A                                              part=
icular all the=0A                                              libraries th=
at are=0A                                              available today. He=
=0A                                              mentioned that earlier=0A =
                                             attempts to write the MAC=0A  =
                                            Token code lead to=0A          =
                                    problems for implementers.<br>=0A      =
                                        &gt;&gt;<br>=0A                    =
                          &gt;&gt; Justin responded=0A                     =
                         that he does not agree=0A                         =
                     with using JSON as a=0A                               =
               transport mechanism since=0A                                =
              this would replicate a=0A                                    =
          SOAP style.<br>=0A                                              &=
gt;&gt;<br>=0A                                              &gt;&gt; Phil n=
oted that=0A                                              he wants to send =
JSON but=0A                                              the signature shal=
l be=0A                                              computed over the HTTP=
=0A                                              header field.<br>=0A      =
                                        &gt;&gt;<br>=0A                    =
                          &gt;&gt; -- Flexibility=0A                       =
                       for the keyed message=0A                            =
                  digest computation<br>=0A                                =
              &gt;&gt;<br>=0A                                              =
&gt;&gt;&nbsp; From earlier=0A                                             =
 discussion it was clear=0A                                              th=
at the conference call=0A                                              part=
icipants wanted more=0A                                              flexib=
ility regarding the=0A                                              keyed m=
essage digest=0A                                              computation. =
For this=0A                                              purpose Hannes pre=
sented=0A                                              the DKIM based appro=
ach,=0A                                              which allows selective=
=0A                                              header fields to be=0A    =
                                          included in the digest.=0A       =
                                       This is shown in slide #4.<br>=0A   =
                                           &gt;&gt;<br>=0A                 =
                             &gt;&gt; After some=0A                        =
                      discussion the conference=0A                         =
                     call participants thought=0A                          =
                    that this would meet their=0A                          =
                    needs. Further=0A                                      =
        investigations would still=0A                                      =
        be useful to determine the=0A                                      =
        degree of failed HMAC=0A                                           =
   calculations due to HTTP=0A                                             =
 proxies modifying the=0A                                              cont=
ent.<br>=0A                                              &gt;&gt;<br>=0A   =
                                           &gt;&gt; -- Key=0A              =
                                Distribution<br>=0A                        =
                      &gt;&gt;<br>=0A                                      =
        &gt;&gt; Hannes presented=0A                                       =
       the open issue regarding=0A                                         =
     the choice of key <br>=0A                                             =
 &gt;&gt; distribution.=0A                                              Sli=
des #6-#8 present three=0A                                              tec=
hniques and Hannes=0A                                              asked <b=
r>=0A                                              &gt;&gt; for feedback=0A=
                                              regarding the preferred=0A   =
                                           style. Justin and others=0A     =
                                         didn't <br>=0A                    =
                          &gt;&gt; see the need to=0A                      =
                        decide on one mechanism -=0A                       =
                       they wanted to keep the <br>=0A                     =
                         &gt;&gt; choice open.=0A                          =
                    Derek indicated that this=0A                           =
                   will not be an acceptable=0A                            =
                  <br>=0A                                              &gt;=
&gt; approach. Since=0A                                              the re=
source server and=0A                                              the autho=
rization server=0A                                              may, <br>=
=0A                                              &gt;&gt; in the OAuth 2.0=
=0A                                              framework, be entities=0A =
                                             produced by different=0A      =
                                        vendors <br>=0A                    =
                          &gt;&gt; there is an=0A                          =
                    interoperability need.=0A                              =
                Justin responded that he=0A                                =
              disagrees <br>=0A                                            =
  &gt;&gt; and that the=0A                                              res=
ource server needs to=0A                                              under=
stand the access=0A                                              token and =
<br>=0A                                              &gt;&gt; referred to t=
he=0A                                              recent draft submission=
=0A                                              for the token=0A          =
                                    introspection <br>=0A                  =
                            &gt;&gt; endpoint. Derek=0A                    =
                          indicated that the=0A                            =
                  resource server has to=0A                                =
              understand <br>=0A                                           =
   &gt;&gt; the content of=0A                                              =
the access token and the=0A                                              to=
ken introspection=0A                                              endpoint =
<br>=0A                                              &gt;&gt; just pushes t=
he=0A                                              problem around: the=0A  =
                                            resource server has to=0A      =
                                        send the <br>=0A                   =
                           &gt;&gt; access token to=0A                     =
                         the authorization server=0A                       =
                       and then the resource=0A                            =
                  server <br>=0A                                           =
   &gt;&gt; gets the result=0A                                             =
 back (which he the<br>=0A                                              n<b=
r>=0A                                              &gt;&nbsp; &nbsp; a<br>=
=0A                                              &gt;&gt; gain needs to=0A =
                                             understand) in order to=0A    =
                                          make a meaningful=0A             =
                                 authorization decision.<br>=0A            =
                                  &gt;&gt;<br>=0A                          =
                    &gt;&gt; Everyone agreed=0A                            =
                  that the client must=0A                                  =
            receive the session key=0A                                     =
         from the authorization=0A                                         =
     server and that this=0A                                              a=
pproach has to be=0A                                              standardi=
zed. It was also=0A                                              agreed tha=
t this is a=0A                                              common approach=
 among all=0A                                              three key distri=
bution=0A                                              mechanisms.<br>=0A  =
                                            &gt;&gt;<br>=0A                =
                              &gt;&gt; Hannes asked the=0A                 =
                             participants to think=0A                      =
                        about their preference.<br>=0A                     =
                         &gt;&gt;<br>=0A                                   =
           &gt;&gt; The questions=0A                                       =
       regarding key naming and=0A                                         =
     the indication for the=0A                                             =
 intended resource server=0A                                              t=
he client wants to talk=0A                                              to =
have been postponed.<br>=0A                                              &g=
t;&gt;<br>=0A                                              &gt;&gt; Ciao<br=
>=0A                                              &gt;&gt; Hannes<br>=0A   =
                                           &gt;&gt;<br>=0A                 =
                             &gt;&gt;<br>=0A                               =
               &gt;&gt;=0A                                              ___=
____________________________________________<br>=0A                        =
                      &gt;&gt; OAuth mailing=0A                            =
                  list<br>=0A                                              =
&gt;&gt; <a rel=3D"nofollow" ymailto=3D"mailto:OAuth@ietf.org" target=3D"_b=
lank" href=3D"mailto:OAuth@ietf.org">OAuth@ietf.org</a><br>=0A             =
                                 &gt;&gt; <a rel=3D"nofollow" target=3D"_bl=
ank" href=3D"https://www.ietf.org/mailman/listinfo/oauth">https://www.ietf.=
org/mailman/listinfo/oauth</a><br>=0A                                      =
        &gt;=0A                                              ______________=
_________________________________<br>=0A                                   =
           &gt; OAuth mailing list<br>=0A                                  =
            &gt; <a rel=3D"nofollow" ymailto=3D"mailto:OAuth@ietf.org" targ=
et=3D"_blank" href=3D"mailto:OAuth@ietf.org">OAuth@ietf.org</a><br>=0A     =
                                         &gt; <a rel=3D"nofollow" target=3D=
"_blank" href=3D"https://www.ietf.org/mailman/listinfo/oauth">https://www.i=
etf.org/mailman/listinfo/oauth</a><br>=0A                                  =
            <br>=0A                                              <br>=0A___=
____________________________________________<br>=0A                        =
                      OAuth mailing list<br>=0A                            =
                  <a rel=3D"nofollow" ymailto=3D"mailto:OAuth@ietf.org" tar=
get=3D"_blank" href=3D"mailto:OAuth@ietf.org">OAuth@ietf.org</a><br>=0A    =
                                          <a rel=3D"nofollow" target=3D"_bl=
ank" href=3D"https://www.ietf.org/mailman/listinfo/oauth">https://www.ietf.=
org/mailman/listinfo/oauth</a><br>=0A______________________________________=
_________<br>=0A                                              OAuth mailing=
 list<br>=0A                                              <a rel=3D"nofollo=
w" ymailto=3D"mailto:OAuth@ietf.org" target=3D"_blank" href=3D"mailto:OAuth=
@ietf.org">OAuth@ietf.org</a><br>=0A                                       =
       <a rel=3D"nofollow" target=3D"_blank" href=3D"https://www.ietf.org/m=
ailman/listinfo/oauth">https://www.ietf.org/mailman/listinfo/oauth</a><br>=
=0A                                              <br>=0A                   =
                           <br>=0A                                         =
   </div>=0A                                          </div>=0A            =
                            </div>=0A                                      =
</div>=0A                                    </blockquote>=0A              =
                      <blockquote type=3D"cite">=0A                        =
              <div><span>_______________________________________________</s=
pan><br>=0A                                        <span>OAuth mailing list=
</span><br>=0A                                        <span><a rel=3D"nofol=
low" ymailto=3D"mailto:OAuth@ietf.org" target=3D"_blank" href=3D"mailto:OAu=
th@ietf.org">OAuth@ietf.org</a></span><br>=0A                              =
          <span><a rel=3D"nofollow" target=3D"_blank" href=3D"https://www.i=
etf.org/mailman/listinfo/oauth">https://www.ietf.org/mailman/listinfo/oauth=
</a></span><br>=0A                                      </div>=0A          =
                          </blockquote>=0A                                 =
 </div>=0A                                </div>=0A                        =
        <br>=0A                                <br>=0A                     =
         </div>=0A                            </div>=0A                    =
      </div>=0A                        </div>=0A                      </blo=
ckquote>=0A                    </div>=0A                  </div>=0A        =
          <br>=0A                  <br>=0A                </div>=0A        =
      </div>=0A            </div>=0A          </div>=0A          <br>=0A   =
       _______________________________________________<br>=0A          OAut=
h mailing list<br>=0A          <a rel=3D"nofollow" ymailto=3D"mailto:OAuth@=
ietf.org" target=3D"_blank" href=3D"mailto:OAuth@ietf.org">OAuth@ietf.org</=
a><br>=0A          <a rel=3D"nofollow" target=3D"_blank" href=3D"https://ww=
w.ietf.org/mailman/listinfo/oauth">https://www.ietf.org/mailman/listinfo/oa=
uth</a><br>=0A          <br>=0A        </blockquote>=0A      </div>=0A     =
 <br>=0A      <br>=0A      <fieldset class=3D"yiv626666927mimeAttachmentHea=
der"></fieldset>=0A      <br>=0A      <pre>________________________________=
_______________=0AOAuth mailing list=0A<a rel=3D"nofollow" class=3D"yiv6266=
66927moz-txt-link-abbreviated" ymailto=3D"mailto:OAuth@ietf.org" target=3D"=
_blank" href=3D"mailto:OAuth@ietf.org">OAuth@ietf.org</a>=0A<a rel=3D"nofol=
low" class=3D"yiv626666927moz-txt-link-freetext" target=3D"_blank" href=3D"=
https://www.ietf.org/mailman/listinfo/oauth">https://www.ietf.org/mailman/l=
istinfo/oauth</a>=0A</pre>=0A    </blockquote>=0A    <br>=0A  </div>=0A=0A<=
/div><br><br> </div> </div>  </div></body></html>
---551393103-102741512-1360962242=:18571--

From phil.hunt@oracle.com  Fri Feb 15 13:52:31 2013
Return-Path: <phil.hunt@oracle.com>
X-Original-To: oauth@ietfa.amsl.com
Delivered-To: oauth@ietfa.amsl.com
Received: from localhost (localhost [127.0.0.1]) by ietfa.amsl.com (Postfix) with ESMTP id 64D8821F8581 for <oauth@ietfa.amsl.com>; Fri, 15 Feb 2013 13:52:31 -0800 (PST)
X-Virus-Scanned: amavisd-new at amsl.com
X-Spam-Flag: NO
X-Spam-Score: -5.635
X-Spam-Level: 
X-Spam-Status: No, score=-5.635 tagged_above=-999 required=5 tests=[AWL=-0.433, BAYES_00=-2.599, HTML_MESSAGE=0.001, MIME_QP_LONG_LINE=1.396, RCVD_IN_DNSWL_MED=-4]
Received: from mail.ietf.org ([64.170.98.30]) by localhost (ietfa.amsl.com [127.0.0.1]) (amavisd-new, port 10024) with ESMTP id l8+CS0vtFekQ for <oauth@ietfa.amsl.com>; Fri, 15 Feb 2013 13:52:29 -0800 (PST)
Received: from userp1040.oracle.com (userp1040.oracle.com [156.151.31.81]) by ietfa.amsl.com (Postfix) with ESMTP id 533C621F857A for <oauth@ietf.org>; Fri, 15 Feb 2013 13:52:29 -0800 (PST)
Received: from acsinet22.oracle.com (acsinet22.oracle.com [141.146.126.238]) by userp1040.oracle.com (Sentrion-MTA-4.3.1/Sentrion-MTA-4.3.1) with ESMTP id r1FLqQAm003307 (version=TLSv1/SSLv3 cipher=DHE-RSA-AES256-SHA bits=256 verify=OK); Fri, 15 Feb 2013 21:52:27 GMT
Received: from acsmt358.oracle.com (acsmt358.oracle.com [141.146.40.158]) by acsinet22.oracle.com (8.14.4+Sun/8.14.4) with ESMTP id r1FLqPYc004365 (version=TLSv1/SSLv3 cipher=DHE-RSA-AES256-SHA bits=256 verify=NO); Fri, 15 Feb 2013 21:52:26 GMT
Received: from abhmt110.oracle.com (abhmt110.oracle.com [141.146.116.62]) by acsmt358.oracle.com (8.12.11.20060308/8.12.11) with ESMTP id r1FLqPt3013144; Fri, 15 Feb 2013 15:52:25 -0600
Received: from [192.168.1.125] (/174.7.250.104) by default (Oracle Beehive Gateway v4.0) with ESMTP ; Fri, 15 Feb 2013 13:52:24 -0800
References: <0573984A-8C11-4960-9BC6-F44D4B664C19@gmx.net> <E808B6AC-D5F6-479F-967D-EA6B2586BE64@oracle.com> <511A7D27.8010209@mitre.org> <4E1F6AAD24975D4BA5B16804296739436744BD23@TK5EX14MBXC285.redmond.corp.microsoft.com> <1360891897.14004.YahooMailNeo@web31811.mail.mud.yahoo.com> <E7EBF78C-37EB-4737-8DD5-0F24C9FACA60@lodderstedt.net> <1360912115.36543.YahooMailNeo@web31811.mail.mud.yahoo.com> <2A0F585F-2CEF-418D-9654-5084E6C9BD0D@lodderstedt.net> <1360944589.51724.YahooMailNeo@web31808.mail.mud.yahoo.com> <CA+ZpN24dWAGtZR2aQcqC_N+sHsp7zBVe42LDbrkAsqNVqQPv0w@mail.gmail.com> <511EA0A3.7080000@mitre.org> <1360962242.18571.YahooMailNeo@web31805.mail.mud.yahoo.com>
Mime-Version: 1.0 (1.0)
In-Reply-To: <1360962242.18571.YahooMailNeo@web31805.mail.mud.yahoo.com>
Content-Type: multipart/alternative; boundary=Apple-Mail-2F9021E0-B6B0-475A-89C2-6C02AE340996
Content-Transfer-Encoding: 7bit
Message-Id: <BDE6C674-AEDE-4E73-9122-4F2A90F7F180@oracle.com>
X-Mailer: iPhone Mail (10B142)
From: Phil Hunt <phil.hunt@oracle.com>
Date: Fri, 15 Feb 2013 13:52:23 -0800
To: William Mills <wmills_92105@yahoo.com>
X-Source-IP: acsinet22.oracle.com [141.146.126.238]
Cc: IETF oauth WG <oauth@ietf.org>
Subject: Re: [OAUTH-WG] Minutes from the OAuth Design Team Conference Call - 11th February 2013
X-BeenThere: oauth@ietf.org
X-Mailman-Version: 2.1.12
Precedence: list
List-Id: OAUTH WG <oauth.ietf.org>
List-Unsubscribe: <https://www.ietf.org/mailman/options/oauth>, <mailto:oauth-request@ietf.org?subject=unsubscribe>
List-Archive: <http://www.ietf.org/mail-archive/web/oauth>
List-Post: <mailto:oauth@ietf.org>
List-Help: <mailto:oauth-request@ietf.org?subject=help>
List-Subscribe: <https://www.ietf.org/mailman/listinfo/oauth>, <mailto:oauth-request@ietf.org?subject=subscribe>
X-List-Received-Date: Fri, 15 Feb 2013 21:52:31 -0000

--Apple-Mail-2F9021E0-B6B0-475A-89C2-6C02AE340996
Content-Type: text/plain;
	charset=utf-8
Content-Transfer-Encoding: quoted-printable

Sorry. I have to disagree. The way 1.0 is written, it is not a shortcut to t=
urn it into a token for 2.=20

Phil

Sent from my phone.

On 2013-02-15, at 13:04, William Mills <wmills_92105@yahoo.com> wrote:

> >I've brought it up before, but I think it might be worthwhile, at least a=
s an exercise, to define a method to get OAuth1-style tokens from an OAuth2 t=
oken endpoint. You'd defer to OAuth1 for how to use them >with a protected r=
esource.
>=20
> YES!
>=20
> From: Justin Richer <jricher@mitre.org>
> To: Tim Bray <twbray@google.com>=20
> Cc: William Mills <wmills_92105@yahoo.com>; IETF oauth WG <oauth@ietf.org>=
=20
> Sent: Friday, February 15, 2013 12:54 PM
> Subject: Re: [OAUTH-WG] Minutes from the OAuth Design Team Conference Call=
 - 11th February 2013
>=20
> So that you can fetch and manage all your tokens using the same code     p=
aths as the OAuth2 services. The "get a token" part will be identical to Oau=
th2 Bearer (except for some details of what comes back from the token endpoi=
nt, of course), it's the "use a token" bit that really changes and is up in t=
he air. You get to use scopes, and state, and refresh tokens, and all the ot=
her good stuff.
>=20
> I've brought it up before, but I think it might be worthwhile, at least as=
 an exercise, to define a method to get OAuth1-style tokens from an OAuth2 t=
oken endpoint. You'd defer to OAuth1 for how to use them with a protected re=
source.
>=20
>  -- Justin
>=20
> On 02/15/2013 11:49 AM, Tim Bray wrote:
>> Not deeply acquainted with the Flickr scenario, but it occurs to me to as=
k: If OAuth 1.0 is working well for them, why don=E2=80=99t they just keep u=
sing it?  I.e. if there=E2=80=99s already a good solution in place for peopl=
e who require secure authn/authz over insecure channels, why would we go the=
 extra work of duplicating that in OAuth 2 territory? -T
>>=20
>> On Fri, Feb 15, 2013 at 8:09 AM, William Mills <wmills_92105@yahoo.com> w=
rote:
>> I'll repeat the use case for Flickr, which requires OAuth 1.0a type capab=
ilites that OAuth 2 does not provide.  Simply stating "move to HTTPS" is not=
 a viable response here. =20
>>=20
>> From: Torsten Lodderstedt <torsten@lodderstedt.net>
>> To: William Mills <wmills_92105@yahoo.com>=20
>> Cc: Mike Jones <Michael.Jones@microsoft.com>; Justin Richer <jricher@mitr=
e.org>; Phil Hunt <phil.hunt@oracle.com>; IETF oauth WG <oauth@ietf.org>    =
                  =20
>> Sent: Friday, February 15, 2013 7:22 AM
>> Subject: Re: [OAUTH-WG] Minutes from the OAuth Design Team Conference Cal=
l - 11th February 2013
>>=20
>> Hi Bill,
>>=20
>> I think one needs to compare the costs/impact of HTTPS on one side and th=
e implementation of integrity protection and replay detection on the other. W=
e had this discussion several times.
>>=20
>> regards,
>> Torsten.
>>=20
>> Am 15.02.2013 um 08:08 schrieb William Mills                         <wmi=
lls_92105@yahoo.com>:
>>=20
>>> I fundamentally disagree with that too.  OAuth 2 is the *framework*, one=
 which supports multiple token types.  Bearer tokens were the first credenti=
al type defined.
>>>=20
>>> OAuth 1.0a also requires HTTPS transport for authentication and getting t=
he token.
>>>=20
>>> There are  real use cases for tokens usable                             =
    over plain text with integrity protection.
>>>=20
>>> -bill
>>>=20
>>> From: Torsten Lodderstedt <torsten@lodderstedt.net>
>>> To: William Mills <wmills_92105@yahoo.com>=20
>>> Cc: Mike Jones <Michael.Jones@microsoft.com>; Justin Richer <jricher@mit=
re.org>; Phil Hunt <phil.hunt@oracle.com>; IETF oauth WG <oauth@ietf.org>=20=

>>> Sent: Thursday, February 14, 2013 10:05 PM
>>> Subject: Re: [OAUTH-WG] Minutes from the OAuth Design Team Conference Ca=
ll - 11th February 2013
>>>=20
>>> Hi Bill,
>>>=20
>>> OAuth 2.0 took a different direction by relying on HTTPS to provide the b=
asic protection. So the need to have a token, which can be used for service r=
equests over plain HTTP is arguable. My understanding of this activity was, t=
he intend is to provide                                       additional pro=
tection on top of HTTPS.
>>>=20
>>> regards,
>>> Torsten.
>>>=20
>>> Am 15.02.2013 um 02:31 schrieb William Mills <wmills_92105@yahoo.com>:
>>>=20
>>>> I disagree with "That was the impediment to OAuth 1.0 adoption that OAu=
th 2.0 solved in the first place.", unless "solving" means does not address t=
he need for it at all.
>>>>=20
>>>> OAuth 2 does several good things, but it still lacks a defined token ty=
pe that is safe to user over plain text HTTP.  1.0a solved that.
>>>>=20
>>>> From: Mike Jones <Michael.Jones@microsoft.com>
>>>> To: Justin Richer <jricher@mitre.org>; Phil Hunt <phil.hunt@oracle.com>=
=20
>>>> Cc: IETF oauth WG <oauth@ietf.org>=20
>>>> Sent: Thursday, February 14, 2013 1:44 PM
>>>> Subject: Re: [OAUTH-WG] Minutes from the OAuth Design Team Conference C=
all - 11th February 2013
>>>>=20
>>>> I'm in favor of reusing the JWT work that this WG is also doing. :-)
>>>>=20
>>>> I'm pretty skeptical of us inventing another custom scheme for signing H=
TTP headers.  That was the impediment to OAuth 1.0 adoption that OAuth 2.0 s=
olved in the first place.
>>>>=20
>>>>                 -- Mike
>>>>=20
>>>> -----Original Message-----
>>>> From: oauth-bounces@ietf.org [mailto:oauth-bounces@ietf.org] On Behalf O=
f Justin Richer
>>>> Sent: Tuesday, February 12, 2013 9:35 AM
>>>> To: Phil Hunt
>>>> Cc: IETF oauth WG
>>>> Subject: Re: [OAUTH-WG] Minutes from the OAuth Design Team Conference C=
all - 11th February 2013
>>>>=20
>>>> That's my reading of it as well, Phil, thanks for providing the clarifi=
cation. One motivator behind using a JSON-based token is to be able to re-us=
e some of the                                               great work that t=
he JOSE group is doing but apply it to an HTTP payload.
>>>>=20
>>>> What neither of us want is a token type that requires stuffing all quer=
y, header, and other parameters *into* the JSON object itself, which would b=
e a more SOAPy approach.
>>>>=20
>>>>   -- Justin
>>>>=20
>>>> On 02/12/2013 12:30 PM, Phil Hunt wrote:
>>>> > Clarification.  I think Justin and I were in agreement that we don't w=
ant to see a format that requires JSON payloads.                            =
                    We are both interested in a JSON token used in the autho=
rization header that could be based on a computed signature of some combinat=
ion of http headers and body if possible.
>>>> >
>>>> > Phil
>>>> >
>>>> > @independentid
>>>> > www.independentid.com
>>>> > phil.hunt@oracle.com
>>>> >
>>>> >
>>>> >
>>>> >
>>>> >
>>>> > On 2013-02-12, at 1:10 AM, Hannes Tschofenig wrote:
>>>> >
>>>> >> Here are my notes.
>>>> >>
>>>> >> Participants:
>>>> >>
>>>> >> * John Bradley
>>>> >> * Derek Atkins
>>>> >> * Phil Hunt
>>>> >> * Prateek Mishra
>>>> >> * Hannes Tschofenig
>>>> >> * Mike Jones
>>>> >> * Antonio Sanso
>>>> >> * Justin Richer
>>>> >>
>>>> >> Notes:
>>>> >>
>>>> >> My slides are available here:=20
>>>> >> http://www.tschofenig.priv.at/OAuth2-Security-11Feb2013.ppt
>>>> >>
>>>> >> Slide #2 summarizes earlier discussions during the conference calls.=

>>>> >>
>>>> >> -- HTTP vs. JSON
>>>> >>
>>>> >> Phil noted that he does not like to use                             =
                  the MAC Token draft as a starting point because it does no=
t re-use any of the work done in the JOSE working group and in particular al=
l the libraries that are available today. He mentioned that earlier         =
                                      attempts to write the MAC Token code l=
ead to problems for implementers.
>>>> >>
>>>> >> Justin responded that he does not agree                             =
                  with using JSON as a transport mechanism since this would r=
eplicate a SOAP style.
>>>> >>
>>>> >> Phil noted that he wants to send JSON but the signature shall be com=
puted over the HTTP header field.
>>>> >>
>>>> >> -- Flexibility for the keyed message digest computation
>>>> >>
>>>> >>  =46rom earlier discussion it was clear that the conference call par=
ticipants wanted more flexibility regarding the keyed message digest computa=
tion. For this                                               purpose Hannes p=
resented the DKIM based approach, which allows selective header fields to be=
 included in the digest. This is shown in slide #4.
>>>> >>
>>>> >> After some discussion the conference call participants thought that t=
his would meet their needs. Further investigations would still be useful to d=
etermine the degree of failed HMAC calculations due to HTTP proxies modifyin=
g the content.
>>>> >>
>>>> >> -- Key Distribution
>>>> >>
>>>> >> Hannes presented the open issue regarding the choice of key=20
>>>> >> distribution. Slides #6-#8 present three techniques and Hannes asked=
=20
>>>> >> for feedback regarding the preferred style. Justin and others didn't=
=20
>>>> >> see the need to decide on one mechanism - they wanted to keep the=20=

>>>> >> choice open. Derek indicated that this                              =
                 will not be an acceptable=20
>>>> >> approach. Since the resource server and                             =
                  the authorization server may,=20
>>>> >> in the OAuth 2.0 framework, be entities                             =
                  produced by different vendors=20
>>>> >> there is an interoperability need. Justin responded that he disagree=
s=20
>>>> >> and that the resource server needs to understand the access token an=
d=20
>>>> >> referred to the recent draft submission                             =
                  for the token introspection=20
>>>> >> endpoint. Derek indicated that the resource server has to understand=
=20
>>>> >> the content of the access token and the                             =
                  token introspection endpoint=20
>>>> >> just pushes the problem around: the resource server has to send the=20=

>>>> >> access token to the authorization server and then the resource serve=
r=20
>>>> >> gets the result back (which he the
>>>> n
>>>> >    a
>>>> >> gain needs to understand) in order to make a meaningful authorizatio=
n decision.
>>>> >>
>>>> >> Everyone agreed that the client must receive the session key from th=
e authorization server and that this approach has to be standardized. It was=
 also agreed that this is a common approach among all three key distribution=
 mechanisms.
>>>> >>
>>>> >> Hannes asked the participants to think                              =
                 about their preference.
>>>> >>
>>>> >> The questions regarding key naming and                              =
                 the indication for the intended resource server the client w=
ants to talk to have been postponed.
>>>> >>
>>>> >> Ciao
>>>> >> Hannes
>>>> >>
>>>> >>
>>>> >> _______________________________________________
>>>> >> OAuth mailing list
>>>> >> OAuth@ietf.org
>>>> >> https://www.ietf.org/mailman/listinfo/oauth
>>>> > _______________________________________________
>>>> > OAuth mailing list
>>>> > OAuth@ietf.org
>>>> > https://www.ietf.org/mailman/listinfo/oauth
>>>>=20
>>>>=20
>>>> _______________________________________________
>>>> OAuth mailing list
>>>> OAuth@ietf.org
>>>> https://www.ietf.org/mailman/listinfo/oauth
>>>> _______________________________________________
>>>> OAuth mailing list
>>>> OAuth@ietf.org
>>>> https://www.ietf.org/mailman/listinfo/oauth
>>>> _______________________________________________
>>>> OAuth mailing list
>>>> OAuth@ietf.org
>>>> https://www.ietf.org/mailman/listinfo/oauth
>>=20
>>=20
>>=20
>> _______________________________________________
>> OAuth mailing list
>> OAuth@ietf.org
>> https://www.ietf.org/mailman/listinfo/oauth
>>=20
>>=20
>>=20
>>=20
>> _______________________________________________
>> OAuth mailing list
>> OAuth@ietf.org
>> https://www.ietf.org/mailman/listinfo/oauth
>=20
>=20
>=20
> _______________________________________________
> OAuth mailing list
> OAuth@ietf.org
> https://www.ietf.org/mailman/listinfo/oauth

--Apple-Mail-2F9021E0-B6B0-475A-89C2-6C02AE340996
Content-Type: text/html;
	charset=utf-8
Content-Transfer-Encoding: quoted-printable

<html><head><meta http-equiv=3D"content-type" content=3D"text/html; charset=3D=
utf-8"></head><body dir=3D"auto"><div>Sorry. I have to disagree. The way 1.0=
 is written, it is not a shortcut to turn it into a token for 2.&nbsp;<br><b=
r>Phil<div><br></div><div>Sent from my phone.</div></div><div><br>On 2013-02=
-15, at 13:04, William Mills &lt;<a href=3D"mailto:wmills_92105@yahoo.com">w=
mills_92105@yahoo.com</a>&gt; wrote:<br><br></div><blockquote type=3D"cite">=
<div><div style=3D"color:#000; background-color:#fff; font-family:Courier Ne=
w, courier, monaco, monospace, sans-serif;font-size:12pt"><div><span><span s=
tyle=3D"font-family: 'times new roman', 'new york', times, serif;">&gt;I've b=
rought it up before, but I think it might be worthwhile, at least as an exer=
cise, to define a method to get OAuth1-style tokens from an OAuth2 token end=
point. You'd defer to OAuth1 for how to use them &gt;with a protected resour=
ce.</span><br style=3D"font-family: 'times new roman', 'new york', times, se=
rif;"></span></div><div><br></div><div style=3D"color: rgb(0, 0, 0); font-si=
ze: 16px; font-family: 'Courier New', courier, monaco, monospace, sans-serif=
; background-color: transparent; font-style: normal;">YES!</div><div style=3D=
"color: rgb(0, 0, 0); font-size: 16px; font-family: 'Courier New', courier, m=
onaco, monospace, sans-serif; background-color: transparent; font-style: nor=
mal;"><br></div>  <div style=3D"font-family: 'Courier
 New', courier, monaco, monospace, sans-serif; font-size: 12pt;"> <div style=
=3D"font-family: 'times new roman', 'new york', times, serif; font-size: 12p=
t;"> <div dir=3D"ltr"> <font size=3D"2" face=3D"Arial"> <hr size=3D"1">  <b>=
<span style=3D"font-weight:bold;">From:</span></b> Justin Richer &lt;<a href=
=3D"mailto:jricher@mitre.org">jricher@mitre.org</a>&gt;<br> <b><span style=3D=
"font-weight: bold;">To:</span></b> Tim Bray &lt;<a href=3D"mailto:twbray@go=
ogle.com">twbray@google.com</a>&gt; <br><b><span style=3D"font-weight: bold;=
">Cc:</span></b> William Mills &lt;<a href=3D"mailto:wmills_92105@yahoo.com"=
>wmills_92105@yahoo.com</a>&gt;; IETF oauth WG &lt;<a href=3D"mailto:oauth@i=
etf.org">oauth@ietf.org</a>&gt; <br> <b><span style=3D"font-weight: bold;">S=
ent:</span></b> Friday, February 15, 2013 12:54 PM<br> <b><span style=3D"fon=
t-weight: bold;">Subject:</span></b> Re: [OAUTH-WG] Minutes from the OAuth D=
esign Team Conference Call - 11th February 2013<br> </font> </div> <br><div i=
d=3D"yiv626666927">
 =20

   =20
 =20
  <div>
    So that you can fetch and manage all your tokens using the same code
    paths as the OAuth2 services. The "get a token" part will be
    identical to Oauth2 Bearer (except for some details of what comes
    back from the token endpoint, of course), it's the "use a token" bit
    that really changes and is up in the air. You get to use scopes, and
    state, and refresh tokens, and all the other good stuff.<br>
    <br>
    I've brought it up before, but I think it might be worthwhile, at
    least as an exercise, to define a method to get OAuth1-style tokens
    from an OAuth2 token endpoint. You'd defer to OAuth1 for how to use
    them with a protected resource.<br>
    <br>
    &nbsp;-- Justin<br>
    <br>
    <div class=3D"yiv626666927moz-cite-prefix">On 02/15/2013 11:49 AM, Tim B=
ray wrote:<br>
    </div>
    <blockquote type=3D"cite">
     =20
      Not deeply acquainted with the Flickr scenario, but it occurs to
      me to ask: If OAuth 1.0 is working well for them, why don=E2=80=99t th=
ey
      just keep using it? &nbsp;I.e. if there=E2=80=99s already a good solut=
ion in
      place for people who require secure authn/authz over insecure
      channels, why would we go the extra work of duplicating that in
      OAuth 2 territory? -T<br>
      <br>
      <div class=3D"yiv626666927gmail_quote">On Fri, Feb 15, 2013 at 8:09 AM=
, William
        Mills <span dir=3D"ltr">&lt;<a rel=3D"nofollow" ymailto=3D"mailto:wm=
ills_92105@yahoo.com" target=3D"_blank" href=3D"mailto:wmills_92105@yahoo.co=
m">wmills_92105@yahoo.com</a>&gt;</span>
        wrote:<br>
        <blockquote class=3D"yiv626666927gmail_quote" style=3D"margin:0 0 0 .=
8ex;border-left:1px #ccc solid;padding-left:1ex;">
          <div>
            <div style=3D"font-size: 12pt; font-family: 'Courier New', couri=
er, monaco, monospace, sans-serif;">
              <div><span>I'll repeat the use case for Flickr, which
                  requires OAuth 1.0a type capabilites that OAuth 2 does
                  not provide. &nbsp;Simply stating "move to HTTPS" is not a=

                  viable response here. &nbsp;</span></div>
              <div><br>
              </div>
              <div style=3D"font-family:'Courier
                New', courier, monaco, monospace, sans-serif;font-size:12pt;=
">
                <div style=3D"font-family:'times new roman', 'new
                  york', times, serif;font-size:12pt;">
                  <div dir=3D"ltr"> <font face=3D"Arial">
                      <hr size=3D"1"> <b><span style=3D"font-weight:bold;">From:=
</span></b>
                      Torsten Lodderstedt &lt;<a rel=3D"nofollow" ymailto=3D=
"mailto:torsten@lodderstedt.net" target=3D"_blank" href=3D"mailto:torsten@lo=
dderstedt.net">torsten@lodderstedt.net</a>&gt;<br>
                      <b><span style=3D"font-weight:bold;">To:</span></b>
                      William Mills &lt;<a rel=3D"nofollow" ymailto=3D"mailt=
o:wmills_92105@yahoo.com" target=3D"_blank" href=3D"mailto:wmills_92105@yaho=
o.com">wmills_92105@yahoo.com</a>&gt; <br>
                      <b><span style=3D"font-weight:bold;">Cc:</span></b>
                      Mike Jones &lt;<a rel=3D"nofollow" ymailto=3D"mailto:M=
ichael.Jones@microsoft.com" target=3D"_blank" href=3D"mailto:Michael.Jones@m=
icrosoft.com">Michael.Jones@microsoft.com</a>&gt;;
                      Justin Richer &lt;<a rel=3D"nofollow" ymailto=3D"mailt=
o:jricher@mitre.org" target=3D"_blank" href=3D"mailto:jricher@mitre.org">jri=
cher@mitre.org</a>&gt;;
                      Phil Hunt &lt;<a rel=3D"nofollow" ymailto=3D"mailto:ph=
il.hunt@oracle.com" target=3D"_blank" href=3D"mailto:phil.hunt@oracle.com">p=
hil.hunt@oracle.com</a>&gt;;
                      IETF oauth WG &lt;<a rel=3D"nofollow" ymailto=3D"mailt=
o:oauth@ietf.org" target=3D"_blank" href=3D"mailto:oauth@ietf.org">oauth@iet=
f.org</a>&gt;
                      <br>
                      <b><span style=3D"font-weight:bold;">Sent:</span></b>
                      Friday, February 15, 2013 7:22 AM<br>
                      <b><span style=3D"font-weight:bold;">Subject:</span></=
b>
                      Re: [OAUTH-WG] Minutes from the OAuth Design Team
                      Conference Call - 11th February 2013<br>
                    </font> </div>
                  <br>
                  <div>
                    <div>
                      <div>Hi Bill,</div>
                      <div><br>
                      </div>
                      <div>I think one needs to compare the costs/impact
                        of HTTPS on one side and the implementation of
                        integrity protection and replay detection on the
                        other. We had this discussion several times.</div>
                      <div><br>
                      </div>
                      <div>regards,</div>
                      <div>Torsten.</div>
                      <div><br>
                        Am 15.02.2013 um 08:08 schrieb William Mills
                        &lt;<a rel=3D"nofollow" ymailto=3D"mailto:wmills_921=
05@yahoo.com" target=3D"_blank" href=3D"mailto:wmills_92105@yahoo.com">wmill=
s_92105@yahoo.com</a>&gt;:<br>
                        <br>
                      </div>
                      <blockquote type=3D"cite">
                        <div>
                          <div style=3D"font-size:12pt;font-family:'Courier
                            New', courier, monaco, monospace, sans-serif;">
                            <div><span>I fundamentally disagree with
                                that too. &nbsp;OAuth 2 is the *framework*,
                                one which supports multiple token types.
                                &nbsp;Bearer tokens were the first credentia=
l
                                type defined.</span></div>
                            <div style=3D"font-style:normal;font-size:16px;b=
ackground-color:transparent;font-family:'Courier
                              New', courier, monaco, monospace, sans-serif;"=
><span><br>
                              </span></div>
                            <div style=3D"font-style:normal;font-size:16px;b=
ackground-color:transparent;font-family:'Courier
                              New', courier, monaco, monospace, sans-serif;"=
>
                              <span>OAuth 1.0a also requires HTTPS
                                transport for authentication and getting
                                the token.</span></div>
                            <div style=3D"font-style:normal;font-size:16px;b=
ackground-color:transparent;font-family:'Courier
                              New', courier, monaco, monospace, sans-serif;"=
>
                              <span><br>
                              </span></div>
                            <div style=3D"font-style:normal;font-size:16px;b=
ackground-color:transparent;font-family:'Courier
                              New', courier, monaco, monospace, sans-serif;"=
><span>There
                                are &nbsp;real use cases for tokens usable
                                over plain text with integrity
                                protection.</span></div>
                            <div style=3D"font-style:normal;font-size:16px;b=
ackground-color:transparent;font-family:'Courier
                              New', courier, monaco, monospace, sans-serif;"=
><span><br>
                              </span></div>
                            <div style=3D"font-style:normal;font-size:16px;b=
ackground-color:transparent;font-family:'Courier
                              New', courier, monaco, monospace, sans-serif;"=
>
                              <span>-bill</span></div>
                            <div><br>
                            </div>
                            <div style=3D"font-family:'Courier
                              New', courier, monaco, monospace, sans-serif;f=
ont-size:12pt;">
                              <div style=3D"font-family:'times new
                                roman', 'new
                                york', times, serif;font-size:12pt;">
                                <div dir=3D"ltr"> <font face=3D"Arial">
                                    <hr size=3D"1"> <b><span style=3D"font-w=
eight:bold;">From:</span></b>
                                    Torsten Lodderstedt &lt;<a rel=3D"nofoll=
ow" ymailto=3D"mailto:torsten@lodderstedt.net" target=3D"_blank" href=3D"mai=
lto:torsten@lodderstedt.net">torsten@lodderstedt.net</a>&gt;<br>
                                    <b><span style=3D"font-weight:bold;">To:=
</span></b>
                                    William Mills &lt;<a rel=3D"nofollow" ym=
ailto=3D"mailto:wmills_92105@yahoo.com" target=3D"_blank" href=3D"mailto:wmi=
lls_92105@yahoo.com">wmills_92105@yahoo.com</a>&gt;
                                    <br>
                                    <b><span style=3D"font-weight:bold;">Cc:=
</span></b>
                                    Mike Jones &lt;<a rel=3D"nofollow" ymail=
to=3D"mailto:Michael.Jones@microsoft.com" target=3D"_blank" href=3D"mailto:M=
ichael.Jones@microsoft.com">Michael.Jones@microsoft.com</a>&gt;;
                                    Justin Richer &lt;<a rel=3D"nofollow" ym=
ailto=3D"mailto:jricher@mitre.org" target=3D"_blank" href=3D"mailto:jricher@=
mitre.org">jricher@mitre.org</a>&gt;;
                                    Phil Hunt &lt;<a rel=3D"nofollow" ymailt=
o=3D"mailto:phil.hunt@oracle.com" target=3D"_blank" href=3D"mailto:phil.hunt=
@oracle.com">phil.hunt@oracle.com</a>&gt;;
                                    IETF oauth WG &lt;<a rel=3D"nofollow" ym=
ailto=3D"mailto:oauth@ietf.org" target=3D"_blank" href=3D"mailto:oauth@ietf.=
org">oauth@ietf.org</a>&gt;
                                    <br>
                                    <b><span style=3D"font-weight:bold;">Sen=
t:</span></b>
                                    Thursday, February 14, 2013 10:05 PM<br>=

                                    <b><span style=3D"font-weight:bold;">Sub=
ject:</span></b>
                                    Re: [OAUTH-WG] Minutes from the
                                    OAuth Design Team Conference Call -
                                    11th February 2013<br>
                                  </font> </div>
                                <br>
                                <div>
                                  <div>
                                    <div>Hi Bill,</div>
                                    <div><br>
                                    </div>
                                    <div>OAuth 2.0 took a different
                                      direction by relying on HTTPS to
                                      provide the basic protection. So
                                      the need to have a token, which
                                      can be used for service requests
                                      over plain HTTP is arguable. My
                                      understanding of this activity
                                      was, the intend is to provide
                                      additional protection on top of
                                      HTTPS.</div>
                                    <div><br>
                                    </div>
                                    <div>regards,</div>
                                    <div>Torsten.</div>
                                    <div><br>
                                      Am 15.02.2013 um 02:31 schrieb
                                      William Mills &lt;<a rel=3D"nofollow" y=
mailto=3D"mailto:wmills_92105@yahoo.com" target=3D"_blank" href=3D"mailto:wm=
ills_92105@yahoo.com">wmills_92105@yahoo.com</a>&gt;:<br>
                                      <br>
                                    </div>
                                    <blockquote type=3D"cite">
                                      <div>
                                        <div style=3D"font-size:12pt;font-fa=
mily:'Courier
New', courier, monaco, monospace, sans-serif;">
                                          <div><span>I disagree with "</span=
><span style=3D"font-family:'times
                                              new roman', 'new
                                              york', times, serif;font-size:=
12pt;">That
                                              was the impediment to
                                              OAuth 1.0 adoption that
                                              OAuth 2.0 solved in the
                                              first place.", unless
                                              "solving" means does not
                                              address the need for it at
                                              all.</span></div>
                                          <div style=3D"font-style:normal;fo=
nt-size:12pt;background-color:transparent;font-family:'times
                                            new roman', 'new
                                            york', times, serif;">
                                            <span style=3D"font-family:'time=
s
                                              new roman', 'new
                                              york', times, serif;font-size:=
12pt;"><br>
                                            </span></div>
                                          <div style=3D"font-style:normal;fo=
nt-size:16px;background-color:transparent;font-family:'times
                                            new roman', 'new
                                            york', times, serif;">
                                            <span style=3D"font-family:'time=
s
                                              new roman', 'new
                                              york', times, serif;font-size:=
12pt;">OAuth
                                              2 does several good
                                              things, but it still lacks
                                              a defined token type that
                                              is safe to user over plain
                                              text HTTP. &nbsp;1.0a solved
                                              that.</span></div>
                                          <div><br>
                                          </div>
                                          <div style=3D"font-family:'Courier=

New', courier, monaco, monospace, sans-serif;font-size:12pt;">
                                            <div style=3D"font-family:'times=

                                              new roman', 'new
                                              york', times, serif;font-size:=
12pt;">
                                              <div dir=3D"ltr"> <font face=3D=
"Arial">
                                                  <hr size=3D"1"> <b><span s=
tyle=3D"font-weight:bold;">From:</span></b> Mike Jones &lt;<a rel=3D"nofollo=
w" ymailto=3D"mailto:Michael.Jones@microsoft.com" target=3D"_blank" href=3D"=
mailto:Michael.Jones@microsoft.com">Michael.Jones@microsoft.com</a>&gt;<br>
                                                  <b><span style=3D"font-wei=
ght:bold;">To:</span></b>
                                                  Justin Richer &lt;<a rel=3D=
"nofollow" ymailto=3D"mailto:jricher@mitre.org" target=3D"_blank" href=3D"ma=
ilto:jricher@mitre.org">jricher@mitre.org</a>&gt;;
                                                  Phil Hunt &lt;<a rel=3D"no=
follow" ymailto=3D"mailto:phil.hunt@oracle.com" target=3D"_blank" href=3D"ma=
ilto:phil.hunt@oracle.com">phil.hunt@oracle.com</a>&gt;
                                                  <br>
                                                  <b><span style=3D"font-wei=
ght:bold;">Cc:</span></b>
                                                  IETF oauth WG &lt;<a rel=3D=
"nofollow" ymailto=3D"mailto:oauth@ietf.org" target=3D"_blank" href=3D"mailt=
o:oauth@ietf.org">oauth@ietf.org</a>&gt;
                                                  <br>
                                                  <b><span style=3D"font-wei=
ght:bold;">Sent:</span></b>
                                                  Thursday, February 14,
                                                  2013 1:44 PM<br>
                                                  <b><span style=3D"font-wei=
ght:bold;">Subject:</span></b>
                                                  Re: [OAUTH-WG] Minutes
                                                  from the OAuth Design
                                                  Team Conference Call -
                                                  11th February 2013<br>
                                                </font> </div>
                                              <br>
                                              I'm in favor of reusing
                                              the JWT work that this WG
                                              is also doing. :-)<br>
                                              <br>
                                              I'm pretty skeptical of us
                                              inventing another custom
                                              scheme for signing HTTP
                                              headers.&nbsp; That was the
                                              impediment to OAuth 1.0
                                              adoption that OAuth 2.0
                                              solved in the first place.<br>=

                                              <br>
                                              &nbsp;&nbsp;&nbsp; &nbsp;&nbsp=
;&nbsp; &nbsp;&nbsp;&nbsp; &nbsp;&nbsp;&nbsp; -- Mike<br>
                                              <br>
                                              -----Original Message-----<br>=

                                              From: <a rel=3D"nofollow" ymai=
lto=3D"mailto:oauth-bounces@ietf.org" target=3D"_blank" href=3D"mailto:oauth=
-bounces@ietf.org">oauth-bounces@ietf.org</a>
                                              [mailto:<a rel=3D"nofollow" ym=
ailto=3D"mailto:oauth-bounces@ietf.org" target=3D"_blank" href=3D"mailto:oau=
th-bounces@ietf.org">oauth-bounces@ietf.org</a>]
                                              On Behalf Of Justin Richer<br>=

                                              Sent: Tuesday, February
                                              12, 2013 9:35 AM<br>
                                              To: Phil Hunt<br>
                                              Cc: IETF oauth WG<br>
                                              Subject: Re: [OAUTH-WG]
                                              Minutes from the OAuth
                                              Design Team Conference
                                              Call - 11th February 2013<br>
                                              <br>
                                              That's my reading of it as
                                              well, Phil, thanks for
                                              providing the
                                              clarification. One
                                              motivator behind using a
                                              JSON-based token is to be
                                              able to re-use some of the
                                              great work that the JOSE
                                              group is doing but apply
                                              it to an HTTP payload.<br>
                                              <br>
                                              What neither of us want is
                                              a token type that requires
                                              stuffing all query,
                                              header, and other
                                              parameters *into* the JSON
                                              object itself, which would
                                              be a more SOAPy approach.<br>
                                              <br>
                                              &nbsp; -- Justin<br>
                                              <br>
                                              On 02/12/2013 12:30 PM,
                                              Phil Hunt wrote:<br>
                                              &gt; Clarification.&nbsp; I
                                              think Justin and I were in
                                              agreement that we don't
                                              want to see a format that
                                              requires JSON payloads.&nbsp;
                                              We are both interested in
                                              a JSON token used in the
                                              authorization header that
                                              could be based on a
                                              computed signature of some
                                              combination of http
                                              headers and body if
                                              possible.<br>
                                              &gt;<br>
                                              &gt; Phil<br>
                                              &gt;<br>
                                              &gt; @independentid<br>
                                              &gt; <a rel=3D"nofollow" targe=
t=3D"_blank" href=3D"http://www.independentid.com/">www.independentid.com</a=
><br>
                                              &gt; <a rel=3D"nofollow" ymail=
to=3D"mailto:phil.hunt@oracle.com" target=3D"_blank" href=3D"mailto:phil.hun=
t@oracle.com">phil.hunt@oracle.com</a><br>
                                              &gt;<br>
                                              &gt;<br>
                                              &gt;<br>
                                              &gt;<br>
                                              &gt;<br>
                                              &gt; On 2013-02-12, at
                                              1:10 AM, Hannes Tschofenig
                                              wrote:<br>
                                              &gt;<br>
                                              &gt;&gt; Here are my
                                              notes.<br>
                                              &gt;&gt;<br>
                                              &gt;&gt; Participants:<br>
                                              &gt;&gt;<br>
                                              &gt;&gt; * John Bradley<br>
                                              &gt;&gt; * Derek Atkins<br>
                                              &gt;&gt; * Phil Hunt<br>
                                              &gt;&gt; * Prateek Mishra<br>
                                              &gt;&gt; * Hannes
                                              Tschofenig<br>
                                              &gt;&gt; * Mike Jones<br>
                                              &gt;&gt; * Antonio Sanso<br>
                                              &gt;&gt; * Justin Richer<br>
                                              &gt;&gt;<br>
                                              &gt;&gt; Notes:<br>
                                              &gt;&gt;<br>
                                              &gt;&gt; My slides are
                                              available here: <br>
                                              &gt;&gt; <a rel=3D"nofollow" t=
arget=3D"_blank" href=3D"http://www.tschofenig.priv.at/OAuth2-Security-11Feb=
2013.ppt">http://www.tschofenig.priv.at/OAuth2-Security-11Feb2013.ppt</a><br=
>
                                              &gt;&gt;<br>
                                              &gt;&gt; Slide #2
                                              summarizes earlier
                                              discussions during the
                                              conference calls.<br>
                                              &gt;&gt;<br>
                                              &gt;&gt; -- HTTP vs. JSON<br>
                                              &gt;&gt;<br>
                                              &gt;&gt; Phil noted that
                                              he does not like to use
                                              the MAC Token draft as a
                                              starting point because it
                                              does not re-use any of the
                                              work done in the JOSE
                                              working group and in
                                              particular all the
                                              libraries that are
                                              available today. He
                                              mentioned that earlier
                                              attempts to write the MAC
                                              Token code lead to
                                              problems for implementers.<br>=

                                              &gt;&gt;<br>
                                              &gt;&gt; Justin responded
                                              that he does not agree
                                              with using JSON as a
                                              transport mechanism since
                                              this would replicate a
                                              SOAP style.<br>
                                              &gt;&gt;<br>
                                              &gt;&gt; Phil noted that
                                              he wants to send JSON but
                                              the signature shall be
                                              computed over the HTTP
                                              header field.<br>
                                              &gt;&gt;<br>
                                              &gt;&gt; -- Flexibility
                                              for the keyed message
                                              digest computation<br>
                                              &gt;&gt;<br>
                                              &gt;&gt;&nbsp; =46rom earlier
                                              discussion it was clear
                                              that the conference call
                                              participants wanted more
                                              flexibility regarding the
                                              keyed message digest
                                              computation. For this
                                              purpose Hannes presented
                                              the DKIM based approach,
                                              which allows selective
                                              header fields to be
                                              included in the digest.
                                              This is shown in slide #4.<br>=

                                              &gt;&gt;<br>
                                              &gt;&gt; After some
                                              discussion the conference
                                              call participants thought
                                              that this would meet their
                                              needs. Further
                                              investigations would still
                                              be useful to determine the
                                              degree of failed HMAC
                                              calculations due to HTTP
                                              proxies modifying the
                                              content.<br>
                                              &gt;&gt;<br>
                                              &gt;&gt; -- Key
                                              Distribution<br>
                                              &gt;&gt;<br>
                                              &gt;&gt; Hannes presented
                                              the open issue regarding
                                              the choice of key <br>
                                              &gt;&gt; distribution.
                                              Slides #6-#8 present three
                                              techniques and Hannes
                                              asked <br>
                                              &gt;&gt; for feedback
                                              regarding the preferred
                                              style. Justin and others
                                              didn't <br>
                                              &gt;&gt; see the need to
                                              decide on one mechanism -
                                              they wanted to keep the <br>
                                              &gt;&gt; choice open.
                                              Derek indicated that this
                                              will not be an acceptable
                                              <br>
                                              &gt;&gt; approach. Since
                                              the resource server and
                                              the authorization server
                                              may, <br>
                                              &gt;&gt; in the OAuth 2.0
                                              framework, be entities
                                              produced by different
                                              vendors <br>
                                              &gt;&gt; there is an
                                              interoperability need.
                                              Justin responded that he
                                              disagrees <br>
                                              &gt;&gt; and that the
                                              resource server needs to
                                              understand the access
                                              token and <br>
                                              &gt;&gt; referred to the
                                              recent draft submission
                                              for the token
                                              introspection <br>
                                              &gt;&gt; endpoint. Derek
                                              indicated that the
                                              resource server has to
                                              understand <br>
                                              &gt;&gt; the content of
                                              the access token and the
                                              token introspection
                                              endpoint <br>
                                              &gt;&gt; just pushes the
                                              problem around: the
                                              resource server has to
                                              send the <br>
                                              &gt;&gt; access token to
                                              the authorization server
                                              and then the resource
                                              server <br>
                                              &gt;&gt; gets the result
                                              back (which he the<br>
                                              n<br>
                                              &gt;&nbsp; &nbsp; a<br>
                                              &gt;&gt; gain needs to
                                              understand) in order to
                                              make a meaningful
                                              authorization decision.<br>
                                              &gt;&gt;<br>
                                              &gt;&gt; Everyone agreed
                                              that the client must
                                              receive the session key
                                              from the authorization
                                              server and that this
                                              approach has to be
                                              standardized. It was also
                                              agreed that this is a
                                              common approach among all
                                              three key distribution
                                              mechanisms.<br>
                                              &gt;&gt;<br>
                                              &gt;&gt; Hannes asked the
                                              participants to think
                                              about their preference.<br>
                                              &gt;&gt;<br>
                                              &gt;&gt; The questions
                                              regarding key naming and
                                              the indication for the
                                              intended resource server
                                              the client wants to talk
                                              to have been postponed.<br>
                                              &gt;&gt;<br>
                                              &gt;&gt; Ciao<br>
                                              &gt;&gt; Hannes<br>
                                              &gt;&gt;<br>
                                              &gt;&gt;<br>
                                              &gt;&gt;
                                              ______________________________=
_________________<br>
                                              &gt;&gt; OAuth mailing
                                              list<br>
                                              &gt;&gt; <a rel=3D"nofollow" y=
mailto=3D"mailto:OAuth@ietf.org" target=3D"_blank" href=3D"mailto:OAuth@ietf=
.org">OAuth@ietf.org</a><br>
                                              &gt;&gt; <a rel=3D"nofollow" t=
arget=3D"_blank" href=3D"https://www.ietf.org/mailman/listinfo/oauth">https:=
//www.ietf.org/mailman/listinfo/oauth</a><br>
                                              &gt;
                                              ______________________________=
_________________<br>
                                              &gt; OAuth mailing list<br>
                                              &gt; <a rel=3D"nofollow" ymail=
to=3D"mailto:OAuth@ietf.org" target=3D"_blank" href=3D"mailto:OAuth@ietf.org=
">OAuth@ietf.org</a><br>
                                              &gt; <a rel=3D"nofollow" targe=
t=3D"_blank" href=3D"https://www.ietf.org/mailman/listinfo/oauth">https://ww=
w.ietf.org/mailman/listinfo/oauth</a><br>
                                              <br>
                                              <br>
_______________________________________________<br>
                                              OAuth mailing list<br>
                                              <a rel=3D"nofollow" ymailto=3D=
"mailto:OAuth@ietf.org" target=3D"_blank" href=3D"mailto:OAuth@ietf.org">OAu=
th@ietf.org</a><br>
                                              <a rel=3D"nofollow" target=3D"=
_blank" href=3D"https://www.ietf.org/mailman/listinfo/oauth">https://www.iet=
f.org/mailman/listinfo/oauth</a><br>
_______________________________________________<br>
                                              OAuth mailing list<br>
                                              <a rel=3D"nofollow" ymailto=3D=
"mailto:OAuth@ietf.org" target=3D"_blank" href=3D"mailto:OAuth@ietf.org">OAu=
th@ietf.org</a><br>
                                              <a rel=3D"nofollow" target=3D"=
_blank" href=3D"https://www.ietf.org/mailman/listinfo/oauth">https://www.iet=
f.org/mailman/listinfo/oauth</a><br>
                                              <br>
                                              <br>
                                            </div>
                                          </div>
                                        </div>
                                      </div>
                                    </blockquote>
                                    <blockquote type=3D"cite">
                                      <div><span>___________________________=
____________________</span><br>
                                        <span>OAuth mailing list</span><br>
                                        <span><a rel=3D"nofollow" ymailto=3D=
"mailto:OAuth@ietf.org" target=3D"_blank" href=3D"mailto:OAuth@ietf.org">OAu=
th@ietf.org</a></span><br>
                                        <span><a rel=3D"nofollow" target=3D"=
_blank" href=3D"https://www.ietf.org/mailman/listinfo/oauth">https://www.iet=
f.org/mailman/listinfo/oauth</a></span><br>
                                      </div>
                                    </blockquote>
                                  </div>
                                </div>
                                <br>
                                <br>
                              </div>
                            </div>
                          </div>
                        </div>
                      </blockquote>
                    </div>
                  </div>
                  <br>
                  <br>
                </div>
              </div>
            </div>
          </div>
          <br>
          _______________________________________________<br>
          OAuth mailing list<br>
          <a rel=3D"nofollow" ymailto=3D"mailto:OAuth@ietf.org" target=3D"_b=
lank" href=3D"mailto:OAuth@ietf.org">OAuth@ietf.org</a><br>
          <a rel=3D"nofollow" target=3D"_blank" href=3D"https://www.ietf.org=
/mailman/listinfo/oauth">https://www.ietf.org/mailman/listinfo/oauth</a><br>=

          <br>
        </blockquote>
      </div>
      <br>
      <br>
      <fieldset class=3D"yiv626666927mimeAttachmentHeader"></fieldset>
      <br>
      <pre>_______________________________________________
OAuth mailing list
<a rel=3D"nofollow" class=3D"yiv626666927moz-txt-link-abbreviated" ymailto=3D=
"mailto:OAuth@ietf.org" target=3D"_blank" href=3D"mailto:OAuth@ietf.org">OAu=
th@ietf.org</a>
<a rel=3D"nofollow" class=3D"yiv626666927moz-txt-link-freetext" target=3D"_b=
lank" href=3D"https://www.ietf.org/mailman/listinfo/oauth">https://www.ietf.=
org/mailman/listinfo/oauth</a>
</pre>
    </blockquote>
    <br>
  </div>

</div><br><br> </div> </div>  </div></div></blockquote><blockquote type=3D"c=
ite"><div><span>_______________________________________________</span><br><s=
pan>OAuth mailing list</span><br><span><a href=3D"mailto:OAuth@ietf.org">OAu=
th@ietf.org</a></span><br><span><a href=3D"https://www.ietf.org/mailman/list=
info/oauth">https://www.ietf.org/mailman/listinfo/oauth</a></span><br></div>=
</blockquote></body></html>=

--Apple-Mail-2F9021E0-B6B0-475A-89C2-6C02AE340996--

From internet-drafts@ietf.org  Fri Feb 15 13:54:24 2013
Return-Path: <internet-drafts@ietf.org>
X-Original-To: oauth@ietfa.amsl.com
Delivered-To: oauth@ietfa.amsl.com
Received: from localhost (localhost [127.0.0.1]) by ietfa.amsl.com (Postfix) with ESMTP id 3799F21F8589; Fri, 15 Feb 2013 13:54:24 -0800 (PST)
X-Virus-Scanned: amavisd-new at amsl.com
X-Spam-Flag: NO
X-Spam-Score: -102.599
X-Spam-Level: 
X-Spam-Status: No, score=-102.599 tagged_above=-999 required=5 tests=[BAYES_00=-2.599, USER_IN_WHITELIST=-100]
Received: from mail.ietf.org ([64.170.98.30]) by localhost (ietfa.amsl.com [127.0.0.1]) (amavisd-new, port 10024) with ESMTP id cgIhUGXsZE46; Fri, 15 Feb 2013 13:54:23 -0800 (PST)
Received: from ietfa.amsl.com (localhost [127.0.0.1]) by ietfa.amsl.com (Postfix) with ESMTP id 972D821E8034; Fri, 15 Feb 2013 13:54:23 -0800 (PST)
MIME-Version: 1.0
Content-Type: text/plain; charset="utf-8"
Content-Transfer-Encoding: quoted-printable
From: internet-drafts@ietf.org
To: i-d-announce@ietf.org
X-Test-IDTracker: no
X-IETF-IDTracker: 4.40
Message-ID: <20130215215423.23019.50224.idtracker@ietfa.amsl.com>
Date: Fri, 15 Feb 2013 13:54:23 -0800
Cc: oauth@ietf.org
Subject: [OAUTH-WG] I-D Action: draft-ietf-oauth-dyn-reg-06.txt
X-BeenThere: oauth@ietf.org
X-Mailman-Version: 2.1.12
Precedence: list
List-Id: OAUTH WG <oauth.ietf.org>
List-Unsubscribe: <https://www.ietf.org/mailman/options/oauth>, <mailto:oauth-request@ietf.org?subject=unsubscribe>
List-Archive: <http://www.ietf.org/mail-archive/web/oauth>
List-Post: <mailto:oauth@ietf.org>
List-Help: <mailto:oauth-request@ietf.org?subject=help>
List-Subscribe: <https://www.ietf.org/mailman/listinfo/oauth>, <mailto:oauth-request@ietf.org?subject=subscribe>
X-List-Received-Date: Fri, 15 Feb 2013 21:54:24 -0000

A New Internet-Draft is available from the on-line Internet-Drafts director=
ies.
 This draft is a work item of the Web Authorization Protocol Working Group =
of the IETF.

	Title           : OAuth Dynamic Client Registration Protocol
	Author(s)       : Justin Richer
                          John Bradley
                          Michael B. Jones
                          Maciej Machulak
	Filename        : draft-ietf-oauth-dyn-reg-06.txt
	Pages           : 21
	Date            : 2013-02-15

Abstract:
   This specification defines an endpoint and protocol for dynamic
   registration of OAuth Clients at an Authorization Server.


The IETF datatracker status page for this draft is:
https://datatracker.ietf.org/doc/draft-ietf-oauth-dyn-reg

There's also a htmlized version available at:
http://tools.ietf.org/html/draft-ietf-oauth-dyn-reg-06

A diff from the previous version is available at:
http://www.ietf.org/rfcdiff?url2=3Ddraft-ietf-oauth-dyn-reg-06


Internet-Drafts are also available by anonymous FTP at:
ftp://ftp.ietf.org/internet-drafts/


From jricher@mitre.org  Fri Feb 15 13:57:41 2013
Return-Path: <jricher@mitre.org>
X-Original-To: oauth@ietfa.amsl.com
Delivered-To: oauth@ietfa.amsl.com
Received: from localhost (localhost [127.0.0.1]) by ietfa.amsl.com (Postfix) with ESMTP id 8898E21E8043 for <oauth@ietfa.amsl.com>; Fri, 15 Feb 2013 13:57:41 -0800 (PST)
X-Virus-Scanned: amavisd-new at amsl.com
X-Spam-Flag: NO
X-Spam-Score: -6.572
X-Spam-Level: 
X-Spam-Status: No, score=-6.572 tagged_above=-999 required=5 tests=[AWL=0.026,  BAYES_00=-2.599, HTML_MESSAGE=0.001, RCVD_IN_DNSWL_MED=-4]
Received: from mail.ietf.org ([64.170.98.30]) by localhost (ietfa.amsl.com [127.0.0.1]) (amavisd-new, port 10024) with ESMTP id 5xVPusEIwVLi for <oauth@ietfa.amsl.com>; Fri, 15 Feb 2013 13:57:39 -0800 (PST)
Received: from smtpksrv1.mitre.org (smtpksrv1.mitre.org [198.49.146.77]) by ietfa.amsl.com (Postfix) with ESMTP id 7601021F85B8 for <oauth@ietf.org>; Fri, 15 Feb 2013 13:57:39 -0800 (PST)
Received: from smtpksrv1.mitre.org (localhost.localdomain [127.0.0.1]) by localhost (Postfix) with SMTP id E25DA1F0709; Fri, 15 Feb 2013 16:57:38 -0500 (EST)
Received: from IMCCAS03.MITRE.ORG (imccas03.mitre.org [129.83.29.80]) by smtpksrv1.mitre.org (Postfix) with ESMTP id AB6E21F02D3; Fri, 15 Feb 2013 16:57:38 -0500 (EST)
Received: from IMCMBX01.MITRE.ORG ([169.254.1.25]) by IMCCAS03.MITRE.ORG ([129.83.29.80]) with mapi id 14.02.0318.004; Fri, 15 Feb 2013 16:57:37 -0500
From: "Richer, Justin P." <jricher@mitre.org>
To: Phil Hunt <phil.hunt@oracle.com>
Thread-Topic: [OAUTH-WG] Minutes from the OAuth Design Team Conference Call - 11th February 2013
Thread-Index: AQHOCUdbkfNDf0E+QESmDzChh9il6ph55eFggACTxoCAAEyKAIAAEZyAgACKBACAAA00gIAACwmA///zXjyAAGFPgIAAAXaA
Date: Fri, 15 Feb 2013 21:57:37 +0000
Message-ID: <B33BFB58CCC8BE4998958016839DE27E06894B15@IMCMBX01.MITRE.ORG>
References: <0573984A-8C11-4960-9BC6-F44D4B664C19@gmx.net> <E808B6AC-D5F6-479F-967D-EA6B2586BE64@oracle.com> <511A7D27.8010209@mitre.org> <4E1F6AAD24975D4BA5B16804296739436744BD23@TK5EX14MBXC285.redmond.corp.microsoft.com> <1360891897.14004.YahooMailNeo@web31811.mail.mud.yahoo.com> <E7EBF78C-37EB-4737-8DD5-0F24C9FACA60@lodderstedt.net> <1360912115.36543.YahooMailNeo@web31811.mail.mud.yahoo.com> <2A0F585F-2CEF-418D-9654-5084E6C9BD0D@lodderstedt.net> <1360944589.51724.YahooMailNeo@web31808.mail.mud.yahoo.com> <CA+ZpN24dWAGtZR2aQcqC_N+sHsp7zBVe42LDbrkAsqNVqQPv0w@mail.gmail.com> <511EA0A3.7080000@mitre.org> <1360962242.18571.YahooMailNeo@web31805.mail.mud.yahoo.com> <BDE6C674-AEDE-4E73-9122-4F2A90F7F180@oracle.com>
In-Reply-To: <BDE6C674-AEDE-4E73-9122-4F2A90F7F180@oracle.com>
Accept-Language: en-US
Content-Language: en-US
X-MS-Has-Attach: 
X-MS-TNEF-Correlator: 
x-originating-ip: [10.146.15.65]
Content-Type: multipart/alternative; boundary="_000_B33BFB58CCC8BE4998958016839DE27E06894B15IMCMBX01MITREOR_"
MIME-Version: 1.0
Cc: IETF oauth WG <oauth@ietf.org>
Subject: Re: [OAUTH-WG] Minutes from the OAuth Design Team Conference Call - 11th February 2013
X-BeenThere: oauth@ietf.org
X-Mailman-Version: 2.1.12
Precedence: list
List-Id: OAUTH WG <oauth.ietf.org>
List-Unsubscribe: <https://www.ietf.org/mailman/options/oauth>, <mailto:oauth-request@ietf.org?subject=unsubscribe>
List-Archive: <http://www.ietf.org/mail-archive/web/oauth>
List-Post: <mailto:oauth@ietf.org>
List-Help: <mailto:oauth-request@ietf.org?subject=help>
List-Subscribe: <https://www.ietf.org/mailman/listinfo/oauth>, <mailto:oauth-request@ietf.org?subject=subscribe>
X-List-Received-Date: Fri, 15 Feb 2013 21:57:41 -0000

--_000_B33BFB58CCC8BE4998958016839DE27E06894B15IMCMBX01MITREOR_
Content-Type: text/plain; charset="Windows-1252"
Content-Transfer-Encoding: quoted-printable

It's a pretty good shortcut to not have to deal with request tokens, to be =
able to use scopes, to have access to client assertions and other methods o=
f client auth, and not have to do signing when talking to the AS. It's no s=
hortcut when talking to the RS, that's for sure.

 -- Justin

On Feb 15, 2013, at 4:52 PM, Phil Hunt <phil.hunt@oracle.com<mailto:phil.hu=
nt@oracle.com>> wrote:

Sorry. I have to disagree. The way 1.0 is written, it is not a shortcut to =
turn it into a token for 2.

Phil

Sent from my phone.

On 2013-02-15, at 13:04, William Mills <wmills_92105@yahoo.com<mailto:wmill=
s_92105@yahoo.com>> wrote:

>I've brought it up before, but I think it might be worthwhile, at least as=
 an exercise, to define a method to get OAuth1-style tokens from an OAuth2 =
token endpoint. You'd defer to OAuth1 for how to use them >with a protected=
 resource.

YES!

________________________________
From: Justin Richer <jricher@mitre.org<mailto:jricher@mitre.org>>
To: Tim Bray <twbray@google.com<mailto:twbray@google.com>>
Cc: William Mills <wmills_92105@yahoo.com<mailto:wmills_92105@yahoo.com>>; =
IETF oauth WG <oauth@ietf.org<mailto:oauth@ietf.org>>
Sent: Friday, February 15, 2013 12:54 PM
Subject: Re: [OAUTH-WG] Minutes from the OAuth Design Team Conference Call =
- 11th February 2013

So that you can fetch and manage all your tokens using the same code paths =
as the OAuth2 services. The "get a token" part will be identical to Oauth2 =
Bearer (except for some details of what comes back from the token endpoint,=
 of course), it's the "use a token" bit that really changes and is up in th=
e air. You get to use scopes, and state, and refresh tokens, and all the ot=
her good stuff.

I've brought it up before, but I think it might be worthwhile, at least as =
an exercise, to define a method to get OAuth1-style tokens from an OAuth2 t=
oken endpoint. You'd defer to OAuth1 for how to use them with a protected r=
esource.

 -- Justin

On 02/15/2013 11:49 AM, Tim Bray wrote:
Not deeply acquainted with the Flickr scenario, but it occurs to me to ask:=
 If OAuth 1.0 is working well for them, why don=92t they just keep using it=
?  I.e. if there=92s already a good solution in place for people who requir=
e secure authn/authz over insecure channels, why would we go the extra work=
 of duplicating that in OAuth 2 territory? -T

On Fri, Feb 15, 2013 at 8:09 AM, William Mills <wmills_92105@yahoo.com<mail=
to:wmills_92105@yahoo.com>> wrote:
I'll repeat the use case for Flickr, which requires OAuth 1.0a type capabil=
ites that OAuth 2 does not provide.  Simply stating "move to HTTPS" is not =
a viable response here.

________________________________
From: Torsten Lodderstedt <torsten@lodderstedt.net<mailto:torsten@lodderste=
dt.net>>
To: William Mills <wmills_92105@yahoo.com<mailto:wmills_92105@yahoo.com>>
Cc: Mike Jones <Michael.Jones@microsoft.com<mailto:Michael.Jones@microsoft.=
com>>; Justin Richer <jricher@mitre.org<mailto:jricher@mitre.org>>; Phil Hu=
nt <phil.hunt@oracle.com<mailto:phil.hunt@oracle.com>>; IETF oauth WG <oaut=
h@ietf.org<mailto:oauth@ietf.org>>
Sent: Friday, February 15, 2013 7:22 AM
Subject: Re: [OAUTH-WG] Minutes from the OAuth Design Team Conference Call =
- 11th February 2013

Hi Bill,

I think one needs to compare the costs/impact of HTTPS on one side and the =
implementation of integrity protection and replay detection on the other. W=
e had this discussion several times.

regards,
Torsten.

Am 15.02.2013 um 08:08 schrieb William Mills <wmills_92105@yahoo.com<mailto=
:wmills_92105@yahoo.com>>:

I fundamentally disagree with that too.  OAuth 2 is the *framework*, one wh=
ich supports multiple token types.  Bearer tokens were the first credential=
 type defined.

OAuth 1.0a also requires HTTPS transport for authentication and getting the=
 token.

There are  real use cases for tokens usable over plain text with integrity =
protection.

-bill

________________________________
From: Torsten Lodderstedt <torsten@lodderstedt.net<mailto:torsten@lodderste=
dt.net>>
To: William Mills <wmills_92105@yahoo.com<mailto:wmills_92105@yahoo.com>>
Cc: Mike Jones <Michael.Jones@microsoft.com<mailto:Michael.Jones@microsoft.=
com>>; Justin Richer <jricher@mitre.org<mailto:jricher@mitre.org>>; Phil Hu=
nt <phil.hunt@oracle.com<mailto:phil.hunt@oracle.com>>; IETF oauth WG <oaut=
h@ietf.org<mailto:oauth@ietf.org>>
Sent: Thursday, February 14, 2013 10:05 PM
Subject: Re: [OAUTH-WG] Minutes from the OAuth Design Team Conference Call =
- 11th February 2013

Hi Bill,

OAuth 2.0 took a different direction by relying on HTTPS to provide the bas=
ic protection. So the need to have a token, which can be used for service r=
equests over plain HTTP is arguable. My understanding of this activity was,=
 the intend is to provide additional protection on top of HTTPS.

regards,
Torsten.

Am 15.02.2013 um 02:31 schrieb William Mills <wmills_92105@yahoo.com<mailto=
:wmills_92105@yahoo.com>>:

I disagree with "That was the impediment to OAuth 1.0 adoption that OAuth 2=
.0 solved in the first place.", unless "solving" means does not address the=
 need for it at all.

OAuth 2 does several good things, but it still lacks a defined token type t=
hat is safe to user over plain text HTTP.  1.0a solved that.

________________________________
From: Mike Jones <Michael.Jones@microsoft.com<mailto:Michael.Jones@microsof=
t.com>>
To: Justin Richer <jricher@mitre.org<mailto:jricher@mitre.org>>; Phil Hunt =
<phil.hunt@oracle.com<mailto:phil.hunt@oracle.com>>
Cc: IETF oauth WG <oauth@ietf.org<mailto:oauth@ietf.org>>
Sent: Thursday, February 14, 2013 1:44 PM
Subject: Re: [OAUTH-WG] Minutes from the OAuth Design Team Conference Call =
- 11th February 2013

I'm in favor of reusing the JWT work that this WG is also doing. :-)

I'm pretty skeptical of us inventing another custom scheme for signing HTTP=
 headers.  That was the impediment to OAuth 1.0 adoption that OAuth 2.0 sol=
ved in the first place.

                -- Mike

-----Original Message-----
From: oauth-bounces@ietf.org<mailto:oauth-bounces@ietf.org> [mailto:oauth-b=
ounces@ietf.org<mailto:oauth-bounces@ietf.org>] On Behalf Of Justin Richer
Sent: Tuesday, February 12, 2013 9:35 AM
To: Phil Hunt
Cc: IETF oauth WG
Subject: Re: [OAUTH-WG] Minutes from the OAuth Design Team Conference Call =
- 11th February 2013

That's my reading of it as well, Phil, thanks for providing the clarificati=
on. One motivator behind using a JSON-based token is to be able to re-use s=
ome of the great work that the JOSE group is doing but apply it to an HTTP =
payload.

What neither of us want is a token type that requires stuffing all query, h=
eader, and other parameters *into* the JSON object itself, which would be a=
 more SOAPy approach.

  -- Justin

On 02/12/2013 12:30 PM, Phil Hunt wrote:
> Clarification.  I think Justin and I were in agreement that we don't want=
 to see a format that requires JSON payloads.  We are both interested in a =
JSON token used in the authorization header that could be based on a comput=
ed signature of some combination of http headers and body if possible.
>
> Phil
>
> @independentid
> www.independentid.com<http://www.independentid.com/>
> phil.hunt@oracle.com<mailto:phil.hunt@oracle.com>
>
>
>
>
>
> On 2013-02-12, at 1:10 AM, Hannes Tschofenig wrote:
>
>> Here are my notes.
>>
>> Participants:
>>
>> * John Bradley
>> * Derek Atkins
>> * Phil Hunt
>> * Prateek Mishra
>> * Hannes Tschofenig
>> * Mike Jones
>> * Antonio Sanso
>> * Justin Richer
>>
>> Notes:
>>
>> My slides are available here:
>> http://www.tschofenig.priv.at/OAuth2-Security-11Feb2013.ppt
>>
>> Slide #2 summarizes earlier discussions during the conference calls.
>>
>> -- HTTP vs. JSON
>>
>> Phil noted that he does not like to use the MAC Token draft as a startin=
g point because it does not re-use any of the work done in the JOSE working=
 group and in particular all the libraries that are available today. He men=
tioned that earlier attempts to write the MAC Token code lead to problems f=
or implementers.
>>
>> Justin responded that he does not agree with using JSON as a transport m=
echanism since this would replicate a SOAP style.
>>
>> Phil noted that he wants to send JSON but the signature shall be compute=
d over the HTTP header field.
>>
>> -- Flexibility for the keyed message digest computation
>>
>>  From earlier discussion it was clear that the conference call participa=
nts wanted more flexibility regarding the keyed message digest computation.=
 For this purpose Hannes presented the DKIM based approach, which allows se=
lective header fields to be included in the digest. This is shown in slide =
#4.
>>
>> After some discussion the conference call participants thought that this=
 would meet their needs. Further investigations would still be useful to de=
termine the degree of failed HMAC calculations due to HTTP proxies modifyin=
g the content.
>>
>> -- Key Distribution
>>
>> Hannes presented the open issue regarding the choice of key
>> distribution. Slides #6-#8 present three techniques and Hannes asked
>> for feedback regarding the preferred style. Justin and others didn't
>> see the need to decide on one mechanism - they wanted to keep the
>> choice open. Derek indicated that this will not be an acceptable
>> approach. Since the resource server and the authorization server may,
>> in the OAuth 2.0 framework, be entities produced by different vendors
>> there is an interoperability need. Justin responded that he disagrees
>> and that the resource server needs to understand the access token and
>> referred to the recent draft submission for the token introspection
>> endpoint. Derek indicated that the resource server has to understand
>> the content of the access token and the token introspection endpoint
>> just pushes the problem around: the resource server has to send the
>> access token to the authorization server and then the resource server
>> gets the result back (which he the
n
>    a
>> gain needs to understand) in order to make a meaningful authorization de=
cision.
>>
>> Everyone agreed that the client must receive the session key from the au=
thorization server and that this approach has to be standardized. It was al=
so agreed that this is a common approach among all three key distribution m=
echanisms.
>>
>> Hannes asked the participants to think about their preference.
>>
>> The questions regarding key naming and the indication for the intended r=
esource server the client wants to talk to have been postponed.
>>
>> Ciao
>> Hannes
>>
>>
>> _______________________________________________
>> OAuth mailing list
>> OAuth@ietf.org<mailto:OAuth@ietf.org>
>> https://www.ietf.org/mailman/listinfo/oauth
> _______________________________________________
> OAuth mailing list
> OAuth@ietf.org<mailto:OAuth@ietf.org>
> https://www.ietf.org/mailman/listinfo/oauth


_______________________________________________
OAuth mailing list
OAuth@ietf.org<mailto:OAuth@ietf.org>
https://www.ietf.org/mailman/listinfo/oauth
_______________________________________________
OAuth mailing list
OAuth@ietf.org<mailto:OAuth@ietf.org>
https://www.ietf.org/mailman/listinfo/oauth


_______________________________________________
OAuth mailing list
OAuth@ietf.org<mailto:OAuth@ietf.org>
https://www.ietf.org/mailman/listinfo/oauth





_______________________________________________
OAuth mailing list
OAuth@ietf.org<mailto:OAuth@ietf.org>
https://www.ietf.org/mailman/listinfo/oauth





_______________________________________________
OAuth mailing list
OAuth@ietf.org<mailto:OAuth@ietf.org>
https://www.ietf.org/mailman/listinfo/oauth




_______________________________________________
OAuth mailing list
OAuth@ietf.org<mailto:OAuth@ietf.org>
https://www.ietf.org/mailman/listinfo/oauth


--_000_B33BFB58CCC8BE4998958016839DE27E06894B15IMCMBX01MITREOR_
Content-Type: text/html; charset="Windows-1252"
Content-ID: <684CB53426101046A1ACED8721CA0731@imc.mitre.org>
Content-Transfer-Encoding: quoted-printable

<html>
<head>
<meta http-equiv=3D"Content-Type" content=3D"text/html; charset=3DWindows-1=
252">
</head>
<body style=3D"word-wrap: break-word; -webkit-nbsp-mode: space; -webkit-lin=
e-break: after-white-space; ">
It's a pretty good shortcut to not have to deal with request tokens, to be =
able to use scopes, to have access to client assertions and other methods o=
f client auth, and not have to do signing when talking to the AS. It's no s=
hortcut when talking to the RS,
 that's for sure.
<div><br>
</div>
<div>&nbsp;-- Justin</div>
<div><br>
<div>
<div>On Feb 15, 2013, at 4:52 PM, Phil Hunt &lt;<a href=3D"mailto:phil.hunt=
@oracle.com">phil.hunt@oracle.com</a>&gt; wrote:</div>
<br class=3D"Apple-interchange-newline">
<blockquote type=3D"cite">
<div dir=3D"auto">
<div>Sorry. I have to disagree. The way 1.0 is written, it is not a shortcu=
t to turn it into a token for 2.&nbsp;<br>
<br>
Phil
<div><br>
</div>
<div>Sent from my phone.</div>
</div>
<div><br>
On 2013-02-15, at 13:04, William Mills &lt;<a href=3D"mailto:wmills_92105@y=
ahoo.com">wmills_92105@yahoo.com</a>&gt; wrote:<br>
<br>
</div>
<blockquote type=3D"cite">
<div style=3D"background-color: rgb(255, 255, 255); font-family: 'Courier N=
ew', courier, monaco, monospace, sans-serif; font-size: 12pt; ">
<div><span><span style=3D"font-family: 'times new roman', 'new york', times=
, serif;">&gt;I've brought it up before, but I think it might be worthwhile=
, at least as an exercise, to define a method to get OAuth1-style tokens fr=
om an OAuth2 token endpoint. You'd defer
 to OAuth1 for how to use them &gt;with a protected resource.</span><br sty=
le=3D"font-family: 'times new roman', 'new york', times, serif;">
</span></div>
<div><br>
</div>
<div style=3D"font-size: 16px; font-family: 'Courier New', courier, monaco,=
 monospace, sans-serif; background-color: transparent; font-style: normal; =
">
YES!</div>
<div style=3D"font-size: 16px; font-family: 'Courier New', courier, monaco,=
 monospace, sans-serif; background-color: transparent; font-style: normal; =
">
<br>
</div>
<div style=3D"font-family: 'Courier
 New', courier, monaco, monospace, sans-serif; font-size: 12pt;">
<div style=3D"font-family: 'times new roman', 'new york', times, serif; fon=
t-size: 12pt;">
<div dir=3D"ltr"><font size=3D"2" face=3D"Arial">
<hr size=3D"1">
<b><span style=3D"font-weight:bold;">From:</span></b> Justin Richer &lt;<a =
href=3D"mailto:jricher@mitre.org">jricher@mitre.org</a>&gt;<br>
<b><span style=3D"font-weight: bold;">To:</span></b> Tim Bray &lt;<a href=
=3D"mailto:twbray@google.com">twbray@google.com</a>&gt;
<br>
<b><span style=3D"font-weight: bold;">Cc:</span></b> William Mills &lt;<a h=
ref=3D"mailto:wmills_92105@yahoo.com">wmills_92105@yahoo.com</a>&gt;; IETF =
oauth WG &lt;<a href=3D"mailto:oauth@ietf.org">oauth@ietf.org</a>&gt;
<br>
<b><span style=3D"font-weight: bold;">Sent:</span></b> Friday, February 15,=
 2013 12:54 PM<br>
<b><span style=3D"font-weight: bold;">Subject:</span></b> Re: [OAUTH-WG] Mi=
nutes from the OAuth Design Team Conference Call - 11th February 2013<br>
</font></div>
<br>
<div id=3D"yiv626666927">
<div>So that you can fetch and manage all your tokens using the same code p=
aths as the OAuth2 services. The &quot;get a token&quot; part will be ident=
ical to Oauth2 Bearer (except for some details of what comes back from the =
token endpoint, of course), it's the &quot;use
 a token&quot; bit that really changes and is up in the air. You get to use=
 scopes, and state, and refresh tokens, and all the other good stuff.<br>
<br>
I've brought it up before, but I think it might be worthwhile, at least as =
an exercise, to define a method to get OAuth1-style tokens from an OAuth2 t=
oken endpoint. You'd defer to OAuth1 for how to use them with a protected r=
esource.<br>
<br>
&nbsp;-- Justin<br>
<br>
<div class=3D"yiv626666927moz-cite-prefix">On 02/15/2013 11:49 AM, Tim Bray=
 wrote:<br>
</div>
<blockquote type=3D"cite">Not deeply acquainted with the Flickr scenario, b=
ut it occurs to me to ask: If OAuth 1.0 is working well for them, why don=
=92t they just keep using it? &nbsp;I.e. if there=92s already a good soluti=
on in place for people who require secure authn/authz
 over insecure channels, why would we go the extra work of duplicating that=
 in OAuth 2 territory? -T<br>
<br>
<div class=3D"yiv626666927gmail_quote">On Fri, Feb 15, 2013 at 8:09 AM, Wil=
liam Mills
<span dir=3D"ltr">&lt;<a rel=3D"nofollow" ymailto=3D"mailto:wmills_92105@ya=
hoo.com" target=3D"_blank" href=3D"mailto:wmills_92105@yahoo.com">wmills_92=
105@yahoo.com</a>&gt;</span> wrote:<br>
<blockquote class=3D"yiv626666927gmail_quote" style=3D"margin:0 0 0 .8ex;bo=
rder-left:1px #ccc solid;padding-left:1ex;">
<div>
<div style=3D"font-size: 12pt; font-family: 'Courier New', courier, monaco,=
 monospace, sans-serif;">
<div><span>I'll repeat the use case for Flickr, which requires OAuth 1.0a t=
ype capabilites that OAuth 2 does not provide. &nbsp;Simply stating &quot;m=
ove to HTTPS&quot; is not a viable response here. &nbsp;</span></div>
<div><br>
</div>
<div style=3D"font-family:'Courier
                New', courier, monaco, monospace, sans-serif;font-size:12pt=
;">
<div style=3D"font-family:'times new roman', 'new
                  york', times, serif;font-size:12pt;">
<div dir=3D"ltr"><font face=3D"Arial">
<hr size=3D"1">
<b><span style=3D"font-weight:bold;">From:</span></b> Torsten Lodderstedt &=
lt;<a rel=3D"nofollow" ymailto=3D"mailto:torsten@lodderstedt.net" target=3D=
"_blank" href=3D"mailto:torsten@lodderstedt.net">torsten@lodderstedt.net</a=
>&gt;<br>
<b><span style=3D"font-weight:bold;">To:</span></b> William Mills &lt;<a re=
l=3D"nofollow" ymailto=3D"mailto:wmills_92105@yahoo.com" target=3D"_blank" =
href=3D"mailto:wmills_92105@yahoo.com">wmills_92105@yahoo.com</a>&gt;
<br>
<b><span style=3D"font-weight:bold;">Cc:</span></b> Mike Jones &lt;<a rel=
=3D"nofollow" ymailto=3D"mailto:Michael.Jones@microsoft.com" target=3D"_bla=
nk" href=3D"mailto:Michael.Jones@microsoft.com">Michael.Jones@microsoft.com=
</a>&gt;; Justin Richer &lt;<a rel=3D"nofollow" ymailto=3D"mailto:jricher@m=
itre.org" target=3D"_blank" href=3D"mailto:jricher@mitre.org">jricher@mitre=
.org</a>&gt;;
 Phil Hunt &lt;<a rel=3D"nofollow" ymailto=3D"mailto:phil.hunt@oracle.com" =
target=3D"_blank" href=3D"mailto:phil.hunt@oracle.com">phil.hunt@oracle.com=
</a>&gt;; IETF oauth WG &lt;<a rel=3D"nofollow" ymailto=3D"mailto:oauth@iet=
f.org" target=3D"_blank" href=3D"mailto:oauth@ietf.org">oauth@ietf.org</a>&=
gt;
<br>
<b><span style=3D"font-weight:bold;">Sent:</span></b> Friday, February 15, =
2013 7:22 AM<br>
<b><span style=3D"font-weight:bold;">Subject:</span></b> Re: [OAUTH-WG] Min=
utes from the OAuth Design Team Conference Call - 11th February 2013<br>
</font></div>
<br>
<div>
<div>
<div>Hi Bill,</div>
<div><br>
</div>
<div>I think one needs to compare the costs/impact of HTTPS on one side and=
 the implementation of integrity protection and replay detection on the oth=
er. We had this discussion several times.</div>
<div><br>
</div>
<div>regards,</div>
<div>Torsten.</div>
<div><br>
Am 15.02.2013 um 08:08 schrieb William Mills &lt;<a rel=3D"nofollow" ymailt=
o=3D"mailto:wmills_92105@yahoo.com" target=3D"_blank" href=3D"mailto:wmills=
_92105@yahoo.com">wmills_92105@yahoo.com</a>&gt;:<br>
<br>
</div>
<blockquote type=3D"cite">
<div>
<div style=3D"font-size:12pt;font-family:'Courier
                            New', courier, monaco, monospace, sans-serif;">
<div><span>I fundamentally disagree with that too. &nbsp;OAuth 2 is the *fr=
amework*, one which supports multiple token types. &nbsp;Bearer tokens were=
 the first credential type defined.</span></div>
<div style=3D"font-style:normal;font-size:16px;background-color:transparent=
;font-family:'Courier
                              New', courier, monaco, monospace, sans-serif;=
">
<span><br>
</span></div>
<div style=3D"font-style:normal;font-size:16px;background-color:transparent=
;font-family:'Courier
                              New', courier, monaco, monospace, sans-serif;=
">
<span>OAuth 1.0a also requires HTTPS transport for authentication and getti=
ng the token.</span></div>
<div style=3D"font-style:normal;font-size:16px;background-color:transparent=
;font-family:'Courier
                              New', courier, monaco, monospace, sans-serif;=
">
<span><br>
</span></div>
<div style=3D"font-style:normal;font-size:16px;background-color:transparent=
;font-family:'Courier
                              New', courier, monaco, monospace, sans-serif;=
">
<span>There are &nbsp;real use cases for tokens usable over plain text with=
 integrity protection.</span></div>
<div style=3D"font-style:normal;font-size:16px;background-color:transparent=
;font-family:'Courier
                              New', courier, monaco, monospace, sans-serif;=
">
<span><br>
</span></div>
<div style=3D"font-style:normal;font-size:16px;background-color:transparent=
;font-family:'Courier
                              New', courier, monaco, monospace, sans-serif;=
">
<span>-bill</span></div>
<div><br>
</div>
<div style=3D"font-family:'Courier
                              New', courier, monaco, monospace, sans-serif;=
font-size:12pt;">
<div style=3D"font-family:'times new
                                roman', 'new
                                york', times, serif;font-size:12pt;">
<div dir=3D"ltr"><font face=3D"Arial">
<hr size=3D"1">
<b><span style=3D"font-weight:bold;">From:</span></b> Torsten Lodderstedt &=
lt;<a rel=3D"nofollow" ymailto=3D"mailto:torsten@lodderstedt.net" target=3D=
"_blank" href=3D"mailto:torsten@lodderstedt.net">torsten@lodderstedt.net</a=
>&gt;<br>
<b><span style=3D"font-weight:bold;">To:</span></b> William Mills &lt;<a re=
l=3D"nofollow" ymailto=3D"mailto:wmills_92105@yahoo.com" target=3D"_blank" =
href=3D"mailto:wmills_92105@yahoo.com">wmills_92105@yahoo.com</a>&gt;
<br>
<b><span style=3D"font-weight:bold;">Cc:</span></b> Mike Jones &lt;<a rel=
=3D"nofollow" ymailto=3D"mailto:Michael.Jones@microsoft.com" target=3D"_bla=
nk" href=3D"mailto:Michael.Jones@microsoft.com">Michael.Jones@microsoft.com=
</a>&gt;; Justin Richer &lt;<a rel=3D"nofollow" ymailto=3D"mailto:jricher@m=
itre.org" target=3D"_blank" href=3D"mailto:jricher@mitre.org">jricher@mitre=
.org</a>&gt;;
 Phil Hunt &lt;<a rel=3D"nofollow" ymailto=3D"mailto:phil.hunt@oracle.com" =
target=3D"_blank" href=3D"mailto:phil.hunt@oracle.com">phil.hunt@oracle.com=
</a>&gt;; IETF oauth WG &lt;<a rel=3D"nofollow" ymailto=3D"mailto:oauth@iet=
f.org" target=3D"_blank" href=3D"mailto:oauth@ietf.org">oauth@ietf.org</a>&=
gt;
<br>
<b><span style=3D"font-weight:bold;">Sent:</span></b> Thursday, February 14=
, 2013 10:05 PM<br>
<b><span style=3D"font-weight:bold;">Subject:</span></b> Re: [OAUTH-WG] Min=
utes from the OAuth Design Team Conference Call - 11th February 2013<br>
</font></div>
<br>
<div>
<div>
<div>Hi Bill,</div>
<div><br>
</div>
<div>OAuth 2.0 took a different direction by relying on HTTPS to provide th=
e basic protection. So the need to have a token, which can be used for serv=
ice requests over plain HTTP is arguable. My understanding of this activity=
 was, the intend is to provide additional
 protection on top of HTTPS.</div>
<div><br>
</div>
<div>regards,</div>
<div>Torsten.</div>
<div><br>
Am 15.02.2013 um 02:31 schrieb William Mills &lt;<a rel=3D"nofollow" ymailt=
o=3D"mailto:wmills_92105@yahoo.com" target=3D"_blank" href=3D"mailto:wmills=
_92105@yahoo.com">wmills_92105@yahoo.com</a>&gt;:<br>
<br>
</div>
<blockquote type=3D"cite">
<div>
<div style=3D"font-size:12pt;font-family:'Courier
New', courier, monaco, monospace, sans-serif;">
<div><span>I disagree with &quot;</span><span style=3D"font-family:'times
                                              new roman', 'new
                                              york', times, serif;font-size=
:12pt;">That was the impediment to OAuth 1.0 adoption
 that OAuth 2.0 solved in the first place.&quot;, unless &quot;solving&quot=
; means does not address the need for it at all.</span></div>
<div style=3D"font-style:normal;font-size:12pt;background-color:transparent=
;font-family:'times
                                            new roman', 'new
                                            york', times, serif;">
<span style=3D"font-family:'times
                                              new roman', 'new
                                              york', times, serif;font-size=
:12pt;"><br>
</span></div>
<div style=3D"font-style:normal;font-size:16px;background-color:transparent=
;font-family:'times
                                            new roman', 'new
                                            york', times, serif;">
<span style=3D"font-family:'times
                                              new roman', 'new
                                              york', times, serif;font-size=
:12pt;">OAuth 2 does several good things, but it still lacks a defined toke=
n type that
 is safe to user over plain text HTTP. &nbsp;1.0a solved that.</span></div>
<div><br>
</div>
<div style=3D"font-family:'Courier
New', courier, monaco, monospace, sans-serif;font-size:12pt;">
<div style=3D"font-family:'times
                                              new roman', 'new
                                              york', times, serif;font-size=
:12pt;">
<div dir=3D"ltr"><font face=3D"Arial">
<hr size=3D"1">
<b><span style=3D"font-weight:bold;">From:</span></b> Mike Jones &lt;<a rel=
=3D"nofollow" ymailto=3D"mailto:Michael.Jones@microsoft.com" target=3D"_bla=
nk" href=3D"mailto:Michael.Jones@microsoft.com">Michael.Jones@microsoft.com=
</a>&gt;<br>
<b><span style=3D"font-weight:bold;">To:</span></b> Justin Richer &lt;<a re=
l=3D"nofollow" ymailto=3D"mailto:jricher@mitre.org" target=3D"_blank" href=
=3D"mailto:jricher@mitre.org">jricher@mitre.org</a>&gt;; Phil Hunt &lt;<a r=
el=3D"nofollow" ymailto=3D"mailto:phil.hunt@oracle.com" target=3D"_blank" h=
ref=3D"mailto:phil.hunt@oracle.com">phil.hunt@oracle.com</a>&gt;
<br>
<b><span style=3D"font-weight:bold;">Cc:</span></b> IETF oauth WG &lt;<a re=
l=3D"nofollow" ymailto=3D"mailto:oauth@ietf.org" target=3D"_blank" href=3D"=
mailto:oauth@ietf.org">oauth@ietf.org</a>&gt;
<br>
<b><span style=3D"font-weight:bold;">Sent:</span></b> Thursday, February 14=
, 2013 1:44 PM<br>
<b><span style=3D"font-weight:bold;">Subject:</span></b> Re: [OAUTH-WG] Min=
utes from the OAuth Design Team Conference Call - 11th February 2013<br>
</font></div>
<br>
I'm in favor of reusing the JWT work that this WG is also doing. :-)<br>
<br>
I'm pretty skeptical of us inventing another custom scheme for signing HTTP=
 headers.&nbsp; That was the impediment to OAuth 1.0 adoption that OAuth 2.=
0 solved in the first place.<br>
<br>
&nbsp;&nbsp;&nbsp; &nbsp;&nbsp;&nbsp; &nbsp;&nbsp;&nbsp; &nbsp;&nbsp;&nbsp;=
 -- Mike<br>
<br>
-----Original Message-----<br>
From: <a rel=3D"nofollow" ymailto=3D"mailto:oauth-bounces@ietf.org" target=
=3D"_blank" href=3D"mailto:oauth-bounces@ietf.org">
oauth-bounces@ietf.org</a> [mailto:<a rel=3D"nofollow" ymailto=3D"mailto:oa=
uth-bounces@ietf.org" target=3D"_blank" href=3D"mailto:oauth-bounces@ietf.o=
rg">oauth-bounces@ietf.org</a>] On Behalf Of Justin Richer<br>
Sent: Tuesday, February 12, 2013 9:35 AM<br>
To: Phil Hunt<br>
Cc: IETF oauth WG<br>
Subject: Re: [OAUTH-WG] Minutes from the OAuth Design Team Conference Call =
- 11th February 2013<br>
<br>
That's my reading of it as well, Phil, thanks for providing the clarificati=
on. One motivator behind using a JSON-based token is to be able to re-use s=
ome of the great work that the JOSE group is doing but apply it to an HTTP =
payload.<br>
<br>
What neither of us want is a token type that requires stuffing all query, h=
eader, and other parameters *into* the JSON object itself, which would be a=
 more SOAPy approach.<br>
<br>
&nbsp; -- Justin<br>
<br>
On 02/12/2013 12:30 PM, Phil Hunt wrote:<br>
&gt; Clarification.&nbsp; I think Justin and I were in agreement that we do=
n't want to see a format that requires JSON payloads.&nbsp; We are both int=
erested in a JSON token used in the authorization header that could be base=
d on a computed signature of some combination
 of http headers and body if possible.<br>
&gt;<br>
&gt; Phil<br>
&gt;<br>
&gt; @independentid<br>
&gt; <a rel=3D"nofollow" target=3D"_blank" href=3D"http://www.independentid=
.com/">www.independentid.com</a><br>
&gt; <a rel=3D"nofollow" ymailto=3D"mailto:phil.hunt@oracle.com" target=3D"=
_blank" href=3D"mailto:phil.hunt@oracle.com">
phil.hunt@oracle.com</a><br>
&gt;<br>
&gt;<br>
&gt;<br>
&gt;<br>
&gt;<br>
&gt; On 2013-02-12, at 1:10 AM, Hannes Tschofenig wrote:<br>
&gt;<br>
&gt;&gt; Here are my notes.<br>
&gt;&gt;<br>
&gt;&gt; Participants:<br>
&gt;&gt;<br>
&gt;&gt; * John Bradley<br>
&gt;&gt; * Derek Atkins<br>
&gt;&gt; * Phil Hunt<br>
&gt;&gt; * Prateek Mishra<br>
&gt;&gt; * Hannes Tschofenig<br>
&gt;&gt; * Mike Jones<br>
&gt;&gt; * Antonio Sanso<br>
&gt;&gt; * Justin Richer<br>
&gt;&gt;<br>
&gt;&gt; Notes:<br>
&gt;&gt;<br>
&gt;&gt; My slides are available here: <br>
&gt;&gt; <a rel=3D"nofollow" target=3D"_blank" href=3D"http://www.tschofeni=
g.priv.at/OAuth2-Security-11Feb2013.ppt">
http://www.tschofenig.priv.at/OAuth2-Security-11Feb2013.ppt</a><br>
&gt;&gt;<br>
&gt;&gt; Slide #2 summarizes earlier discussions during the conference call=
s.<br>
&gt;&gt;<br>
&gt;&gt; -- HTTP vs. JSON<br>
&gt;&gt;<br>
&gt;&gt; Phil noted that he does not like to use the MAC Token draft as a s=
tarting point because it does not re-use any of the work done in the JOSE w=
orking group and in particular all the libraries that are available today. =
He mentioned that earlier attempts to
 write the MAC Token code lead to problems for implementers.<br>
&gt;&gt;<br>
&gt;&gt; Justin responded that he does not agree with using JSON as a trans=
port mechanism since this would replicate a SOAP style.<br>
&gt;&gt;<br>
&gt;&gt; Phil noted that he wants to send JSON but the signature shall be c=
omputed over the HTTP header field.<br>
&gt;&gt;<br>
&gt;&gt; -- Flexibility for the keyed message digest computation<br>
&gt;&gt;<br>
&gt;&gt;&nbsp; From earlier discussion it was clear that the conference cal=
l participants wanted more flexibility regarding the keyed message digest c=
omputation. For this purpose Hannes presented the DKIM based approach, whic=
h allows selective header fields to be included
 in the digest. This is shown in slide #4.<br>
&gt;&gt;<br>
&gt;&gt; After some discussion the conference call participants thought tha=
t this would meet their needs. Further investigations would still be useful=
 to determine the degree of failed HMAC calculations due to HTTP proxies mo=
difying the content.<br>
&gt;&gt;<br>
&gt;&gt; -- Key Distribution<br>
&gt;&gt;<br>
&gt;&gt; Hannes presented the open issue regarding the choice of key <br>
&gt;&gt; distribution. Slides #6-#8 present three techniques and Hannes ask=
ed <br>
&gt;&gt; for feedback regarding the preferred style. Justin and others didn=
't <br>
&gt;&gt; see the need to decide on one mechanism - they wanted to keep the =
<br>
&gt;&gt; choice open. Derek indicated that this will not be an acceptable <=
br>
&gt;&gt; approach. Since the resource server and the authorization server m=
ay, <br>
&gt;&gt; in the OAuth 2.0 framework, be entities produced by different vend=
ors <br>
&gt;&gt; there is an interoperability need. Justin responded that he disagr=
ees <br>
&gt;&gt; and that the resource server needs to understand the access token =
and <br>
&gt;&gt; referred to the recent draft submission for the token introspectio=
n <br>
&gt;&gt; endpoint. Derek indicated that the resource server has to understa=
nd <br>
&gt;&gt; the content of the access token and the token introspection endpoi=
nt <br>
&gt;&gt; just pushes the problem around: the resource server has to send th=
e <br>
&gt;&gt; access token to the authorization server and then the resource ser=
ver <br>
&gt;&gt; gets the result back (which he the<br>
n<br>
&gt;&nbsp; &nbsp; a<br>
&gt;&gt; gain needs to understand) in order to make a meaningful authorizat=
ion decision.<br>
&gt;&gt;<br>
&gt;&gt; Everyone agreed that the client must receive the session key from =
the authorization server and that this approach has to be standardized. It =
was also agreed that this is a common approach among all three key distribu=
tion mechanisms.<br>
&gt;&gt;<br>
&gt;&gt; Hannes asked the participants to think about their preference.<br>
&gt;&gt;<br>
&gt;&gt; The questions regarding key naming and the indication for the inte=
nded resource server the client wants to talk to have been postponed.<br>
&gt;&gt;<br>
&gt;&gt; Ciao<br>
&gt;&gt; Hannes<br>
&gt;&gt;<br>
&gt;&gt;<br>
&gt;&gt; _______________________________________________<br>
&gt;&gt; OAuth mailing list<br>
&gt;&gt; <a rel=3D"nofollow" ymailto=3D"mailto:OAuth@ietf.org" target=3D"_b=
lank" href=3D"mailto:OAuth@ietf.org">
OAuth@ietf.org</a><br>
&gt;&gt; <a rel=3D"nofollow" target=3D"_blank" href=3D"https://www.ietf.org=
/mailman/listinfo/oauth">
https://www.ietf.org/mailman/listinfo/oauth</a><br>
&gt; _______________________________________________<br>
&gt; OAuth mailing list<br>
&gt; <a rel=3D"nofollow" ymailto=3D"mailto:OAuth@ietf.org" target=3D"_blank=
" href=3D"mailto:OAuth@ietf.org">
OAuth@ietf.org</a><br>
&gt; <a rel=3D"nofollow" target=3D"_blank" href=3D"https://www.ietf.org/mai=
lman/listinfo/oauth">
https://www.ietf.org/mailman/listinfo/oauth</a><br>
<br>
<br>
_______________________________________________<br>
OAuth mailing list<br>
<a rel=3D"nofollow" ymailto=3D"mailto:OAuth@ietf.org" target=3D"_blank" hre=
f=3D"mailto:OAuth@ietf.org">OAuth@ietf.org</a><br>
<a rel=3D"nofollow" target=3D"_blank" href=3D"https://www.ietf.org/mailman/=
listinfo/oauth">https://www.ietf.org/mailman/listinfo/oauth</a><br>
_______________________________________________<br>
OAuth mailing list<br>
<a rel=3D"nofollow" ymailto=3D"mailto:OAuth@ietf.org" target=3D"_blank" hre=
f=3D"mailto:OAuth@ietf.org">OAuth@ietf.org</a><br>
<a rel=3D"nofollow" target=3D"_blank" href=3D"https://www.ietf.org/mailman/=
listinfo/oauth">https://www.ietf.org/mailman/listinfo/oauth</a><br>
<br>
<br>
</div>
</div>
</div>
</div>
</blockquote>
<blockquote type=3D"cite">
<div><span>_______________________________________________</span><br>
<span>OAuth mailing list</span><br>
<span><a rel=3D"nofollow" ymailto=3D"mailto:OAuth@ietf.org" target=3D"_blan=
k" href=3D"mailto:OAuth@ietf.org">OAuth@ietf.org</a></span><br>
<span><a rel=3D"nofollow" target=3D"_blank" href=3D"https://www.ietf.org/ma=
ilman/listinfo/oauth">https://www.ietf.org/mailman/listinfo/oauth</a></span=
><br>
</div>
</blockquote>
</div>
</div>
<br>
<br>
</div>
</div>
</div>
</div>
</blockquote>
</div>
</div>
<br>
<br>
</div>
</div>
</div>
</div>
<br>
_______________________________________________<br>
OAuth mailing list<br>
<a rel=3D"nofollow" ymailto=3D"mailto:OAuth@ietf.org" target=3D"_blank" hre=
f=3D"mailto:OAuth@ietf.org">OAuth@ietf.org</a><br>
<a rel=3D"nofollow" target=3D"_blank" href=3D"https://www.ietf.org/mailman/=
listinfo/oauth">https://www.ietf.org/mailman/listinfo/oauth</a><br>
<br>
</blockquote>
</div>
<br>
<br>
<fieldset class=3D"yiv626666927mimeAttachmentHeader"></fieldset> <br>
<pre>_______________________________________________
OAuth mailing list
<a rel=3D"nofollow" class=3D"yiv626666927moz-txt-link-abbreviated" ymailto=
=3D"mailto:OAuth@ietf.org" target=3D"_blank" href=3D"mailto:OAuth@ietf.org"=
>OAuth@ietf.org</a>
<a rel=3D"nofollow" class=3D"yiv626666927moz-txt-link-freetext" target=3D"_=
blank" href=3D"https://www.ietf.org/mailman/listinfo/oauth">https://www.iet=
f.org/mailman/listinfo/oauth</a>
</pre>
</blockquote>
<br>
</div>
</div>
<br>
<br>
</div>
</div>
</div>
</blockquote>
<blockquote type=3D"cite"><span>___________________________________________=
____</span><br>
<span>OAuth mailing list</span><br>
<span><a href=3D"mailto:OAuth@ietf.org">OAuth@ietf.org</a></span><br>
<span><a href=3D"https://www.ietf.org/mailman/listinfo/oauth">https://www.i=
etf.org/mailman/listinfo/oauth</a></span><br>
</blockquote>
</div>
</blockquote>
</div>
<br>
</div>
</body>
</html>

--_000_B33BFB58CCC8BE4998958016839DE27E06894B15IMCMBX01MITREOR_--

From jricher@mitre.org  Fri Feb 15 14:00:31 2013
Return-Path: <jricher@mitre.org>
X-Original-To: oauth@ietfa.amsl.com
Delivered-To: oauth@ietfa.amsl.com
Received: from localhost (localhost [127.0.0.1]) by ietfa.amsl.com (Postfix) with ESMTP id 0940B21E803C; Fri, 15 Feb 2013 14:00:31 -0800 (PST)
X-Virus-Scanned: amavisd-new at amsl.com
X-Spam-Flag: NO
X-Spam-Score: -6.573
X-Spam-Level: 
X-Spam-Status: No, score=-6.573 tagged_above=-999 required=5 tests=[AWL=0.026,  BAYES_00=-2.599, RCVD_IN_DNSWL_MED=-4]
Received: from mail.ietf.org ([64.170.98.30]) by localhost (ietfa.amsl.com [127.0.0.1]) (amavisd-new, port 10024) with ESMTP id OhKY+iK7h5FU; Fri, 15 Feb 2013 14:00:30 -0800 (PST)
Received: from smtpksrv1.mitre.org (smtpksrv1.mitre.org [198.49.146.77]) by ietfa.amsl.com (Postfix) with ESMTP id 434A521E8034; Fri, 15 Feb 2013 14:00:30 -0800 (PST)
Received: from smtpksrv1.mitre.org (localhost.localdomain [127.0.0.1]) by localhost (Postfix) with SMTP id 608261F070A; Fri, 15 Feb 2013 17:00:29 -0500 (EST)
Received: from IMCCAS04.MITRE.ORG (imccas04.mitre.org [129.83.29.81]) by smtpksrv1.mitre.org (Postfix) with ESMTP id EA7E953111EA; Fri, 15 Feb 2013 17:00:28 -0500 (EST)
Received: from IMCMBX01.MITRE.ORG ([169.254.1.25]) by IMCCAS04.MITRE.ORG ([129.83.29.81]) with mapi id 14.02.0318.004; Fri, 15 Feb 2013 17:00:28 -0500
From: "Richer, Justin P." <jricher@mitre.org>
To: "internet-drafts@ietf.org" <internet-drafts@ietf.org>
Thread-Topic: [OAUTH-WG] I-D Action: draft-ietf-oauth-dyn-reg-06.txt
Thread-Index: AQHOC8cHzYfMM+l930eNScmFnnKSo5h7y/2A
Date: Fri, 15 Feb 2013 22:00:27 +0000
Message-ID: <B33BFB58CCC8BE4998958016839DE27E06894B4F@IMCMBX01.MITRE.ORG>
References: <20130215215423.23019.50224.idtracker@ietfa.amsl.com>
In-Reply-To: <20130215215423.23019.50224.idtracker@ietfa.amsl.com>
Accept-Language: en-US
Content-Language: en-US
X-MS-Has-Attach: 
X-MS-TNEF-Correlator: 
x-originating-ip: [10.146.15.65]
Content-Type: text/plain; charset="us-ascii"
Content-ID: <8C5D61CC699F3741839821932792E7C8@imc.mitre.org>
Content-Transfer-Encoding: quoted-printable
MIME-Version: 1.0
Cc: "<oauth@ietf.org>" <oauth@ietf.org>, "<i-d-announce@ietf.org>" <i-d-announce@ietf.org>
Subject: Re: [OAUTH-WG] I-D Action: draft-ietf-oauth-dyn-reg-06.txt
X-BeenThere: oauth@ietf.org
X-Mailman-Version: 2.1.12
Precedence: list
List-Id: OAUTH WG <oauth.ietf.org>
List-Unsubscribe: <https://www.ietf.org/mailman/options/oauth>, <mailto:oauth-request@ietf.org?subject=unsubscribe>
List-Archive: <http://www.ietf.org/mail-archive/web/oauth>
List-Post: <mailto:oauth@ietf.org>
List-Help: <mailto:oauth-request@ietf.org?subject=help>
List-Subscribe: <https://www.ietf.org/mailman/listinfo/oauth>, <mailto:oauth-request@ietf.org?subject=subscribe>
X-List-Received-Date: Fri, 15 Feb 2013 22:00:31 -0000

Everyone, there's a new draft of DynReg up on the tracker. This draft tries=
 to codify the discussions so far from this week into something we can all =
read. There are still plenty of open discussion points and items up for deb=
ate. Please read through this latest draft and see what's changed and help =
assure that it properly captures the conversations. If you have any inputs =
for the marked [[ Editor's Note ]] sections, please send them to the list b=
y next Thursday to give me opportunity to get any necessary changes in by t=
he cutoff date of Monday the 22nd.

Thanks for all of your hard work everyone, I think this is *really* coming =
along now.

 -- Justin

On Feb 15, 2013, at 4:54 PM, internet-drafts@ietf.org wrote:

>=20
> A New Internet-Draft is available from the on-line Internet-Drafts direct=
ories.
> This draft is a work item of the Web Authorization Protocol Working Group=
 of the IETF.
>=20
> 	Title           : OAuth Dynamic Client Registration Protocol
> 	Author(s)       : Justin Richer
>                          John Bradley
>                          Michael B. Jones
>                          Maciej Machulak
> 	Filename        : draft-ietf-oauth-dyn-reg-06.txt
> 	Pages           : 21
> 	Date            : 2013-02-15
>=20
> Abstract:
>   This specification defines an endpoint and protocol for dynamic
>   registration of OAuth Clients at an Authorization Server.
>=20
>=20
> The IETF datatracker status page for this draft is:
> https://datatracker.ietf.org/doc/draft-ietf-oauth-dyn-reg
>=20
> There's also a htmlized version available at:
> http://tools.ietf.org/html/draft-ietf-oauth-dyn-reg-06
>=20
> A diff from the previous version is available at:
> http://www.ietf.org/rfcdiff?url2=3Ddraft-ietf-oauth-dyn-reg-06
>=20
>=20
> Internet-Drafts are also available by anonymous FTP at:
> ftp://ftp.ietf.org/internet-drafts/
>=20
> _______________________________________________
> OAuth mailing list
> OAuth@ietf.org
> https://www.ietf.org/mailman/listinfo/oauth


From sberyozkin@gmail.com  Fri Feb 15 14:10:08 2013
Return-Path: <sberyozkin@gmail.com>
X-Original-To: oauth@ietfa.amsl.com
Delivered-To: oauth@ietfa.amsl.com
Received: from localhost (localhost [127.0.0.1]) by ietfa.amsl.com (Postfix) with ESMTP id 31D1521F84BB for <oauth@ietfa.amsl.com>; Fri, 15 Feb 2013 14:10:08 -0800 (PST)
X-Virus-Scanned: amavisd-new at amsl.com
X-Spam-Flag: NO
X-Spam-Score: -3.386
X-Spam-Level: 
X-Spam-Status: No, score=-3.386 tagged_above=-999 required=5 tests=[AWL=0.213,  BAYES_00=-2.599, RCVD_IN_DNSWL_LOW=-1]
Received: from mail.ietf.org ([64.170.98.30]) by localhost (ietfa.amsl.com [127.0.0.1]) (amavisd-new, port 10024) with ESMTP id aQ65pH2-2RX8 for <oauth@ietfa.amsl.com>; Fri, 15 Feb 2013 14:10:06 -0800 (PST)
Received: from mail-wg0-f52.google.com (mail-wg0-f52.google.com [74.125.82.52]) by ietfa.amsl.com (Postfix) with ESMTP id 4DB3721F848B for <oauth@ietf.org>; Fri, 15 Feb 2013 14:10:06 -0800 (PST)
Received: by mail-wg0-f52.google.com with SMTP id 12so3094389wgh.31 for <oauth@ietf.org>; Fri, 15 Feb 2013 14:10:05 -0800 (PST)
DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=gmail.com; s=20120113; h=x-received:message-id:date:from:user-agent:mime-version:to:cc :subject:references:in-reply-to:content-type :content-transfer-encoding; bh=hlJObRsrSbeR4oEzzPP3INAxEnzGzzstM16CQiQFmtw=; b=n7pJp85t5G8WiiqNzysIEWl3ucV7eSGGc7ipe2/gaM1PqkPIeDtg9OVRnsTzOmCr/6 k1SEXNJs2WSncMd0nt551gz4xWPBu0eZKrivkmfhJTj+z+K5UXpjDTIkLpsRpLky7YR3 zzPERY0Tlh82sK7AiPuJB8Rm3Lkd9NJWGFawz/Sj5mNC8kjD/hSGx+JQbtocTu95Fi/h EtW6ULx8PVJ/IELT4m1ONufNlk6PRHBl95yJT2IsPc/VJlatgtrCx33T3yRaKfR8eBnv gBmpFIpUpOCdh7olZmSZ0iIu/tHAt1LX0DD0qCkDEeDuviigfjO0kBHI4Y2dcfm32cBL XnDQ==
X-Received: by 10.180.102.164 with SMTP id fp4mr6913861wib.1.1360966205423; Fri, 15 Feb 2013 14:10:05 -0800 (PST)
Received: from [192.168.2.5] ([89.100.138.67]) by mx.google.com with ESMTPS id du2sm7307344wib.0.2013.02.15.14.10.03 (version=TLSv1 cipher=ECDHE-RSA-RC4-SHA bits=128/128); Fri, 15 Feb 2013 14:10:04 -0800 (PST)
Message-ID: <511EB23A.8000307@gmail.com>
Date: Fri, 15 Feb 2013 22:10:02 +0000
From: Sergey Beryozkin <sberyozkin@gmail.com>
User-Agent: Mozilla/5.0 (X11; Linux x86_64; rv:12.0) Gecko/20120430 Thunderbird/12.0.1
MIME-Version: 1.0
To: William Mills <wmills_92105@yahoo.com>
References: <0573984A-8C11-4960-9BC6-F44D4B664C19@gmx.net> <E808B6AC-D5F6-479F-967D-EA6B2586BE64@oracle.com> <511A7D27.8010209@mitre.org> <4E1F6AAD24975D4BA5B16804296739436744BD23@TK5EX14MBXC285.redmond.corp.microsoft.com> <1360891897.14004.YahooMailNeo@web31811.mail.mud.yahoo.com> <E7EBF78C-37EB-4737-8DD5-0F24C9FACA60@lodderstedt.net> <1360912115.36543.YahooMailNeo@web31811.mail.mud.yahoo.com> <2A0F585F-2CEF-418D-9654-5084E6C9BD0D@lodderstedt.net> <1360944589.51724.YahooMailNeo@web31808.mail.mud.yahoo.com> <511E617A.4000302@gmail.com> <1360952953.58617.YahooMailNeo@web31804.mail.mud.yahoo.com>
In-Reply-To: <1360952953.58617.YahooMailNeo@web31804.mail.mud.yahoo.com>
Content-Type: text/plain; charset=ISO-8859-1; format=flowed
Content-Transfer-Encoding: 7bit
Cc: "oauth@ietf.org" <oauth@ietf.org>
Subject: Re: [OAUTH-WG] Minutes from the OAuth Design Team Conference Call - 11th February 2013
X-BeenThere: oauth@ietf.org
X-Mailman-Version: 2.1.12
Precedence: list
List-Id: OAUTH WG <oauth.ietf.org>
List-Unsubscribe: <https://www.ietf.org/mailman/options/oauth>, <mailto:oauth-request@ietf.org?subject=unsubscribe>
List-Archive: <http://www.ietf.org/mail-archive/web/oauth>
List-Post: <mailto:oauth@ietf.org>
List-Help: <mailto:oauth-request@ietf.org?subject=help>
List-Subscribe: <https://www.ietf.org/mailman/listinfo/oauth>, <mailto:oauth-request@ietf.org?subject=subscribe>
X-List-Received-Date: Fri, 15 Feb 2013 22:10:08 -0000

HI,
On 15/02/13 18:29, William Mills wrote:
> At this point I am more in favor converting the MAC token format to JWT
> and getting the signature envelope added that way. It's really a matter
> of time.
>
> MAC stalled because folks see the HOK tokens as a replacement.
>
> It's also been a matter of Justin and I having the time to take it up again.
>
Sure, thanks for the above info, as I've said before I'm ultimately fine 
with having MAC supported just in our implementation for example, and 
let those users who decide to use know that they actually write a 
compliant OAuth2 code - but not inter-operable unless some other stack 
does it too...Interoperability may not be highly important in some cases 
too, so...

Ultimately whatever the experts decide upon will be good I guess, the 
question will remain though if dropping MAC will help with avoiding 
having N- number of OAuth(s) variants - it appears the sentiment is 
quite strong in oAuth1 community toward this style MAC kind of replicates.

Thanks, Sergey

>
> ------------------------------------------------------------------------
> *From:* Sergey Beryozkin <sberyozkin@gmail.com>
> *To:* oauth@ietf.org
> *Sent:* Friday, February 15, 2013 8:25 AM
> *Subject:* Re: [OAUTH-WG] Minutes from the OAuth Design Team Conference
> Call - 11th February 2013
>
> I wonder why it is proving so difficult to get a nearly completed MAC
> draft completed ?
> Is it because:
> 1. JWT was first in OAuth2 and thus it wins ?
> 2. MAC is not 'capable' enough as JWT is ?
> 3. Not enough motivation for some vendors to push MAC ?
>
> Example, in cases where not a product but a development framework is
> shipped (as with us for example), IMHO is it a big motivation to get MAC
> done for the reasons repeated many times. Or in case of migrating Flickr
> users to OAuth2.
> I think I can see why no interest is there where nothing is really
> achieved if JWT is used from the get go, no particular need to get OAuth
> 1.0 developers out there migrating to the particular products.
>
> This is 3. Re 2, I think there was enough expressed to suggest that it
> can complement JWT nicely. So far I'm inclined to think it is 3. and 2.
> which stop it from being completed, with 3. 'contributing' indirectly
> but significantly,
>
> Just my 2c
> Thanks, Sergey
>
>
> On 15/02/13 16:09, William Mills wrote:
>  > I'll repeat the use case for Flickr, which requires OAuth 1.0a type
>  > capabilites that OAuth 2 does not provide. Simply stating "move to
>  > HTTPS" is not a viable response here.
>  >
>  > ------------------------------------------------------------------------
>  > *From:* Torsten Lodderstedt <torsten@lodderstedt.net
> <mailto:torsten@lodderstedt.net>>
>  > *To:* William Mills <wmills_92105@yahoo.com
> <mailto:wmills_92105@yahoo.com>>
>  > *Cc:* Mike Jones <Michael.Jones@microsoft.com
> <mailto:Michael.Jones@microsoft.com>>; Justin Richer
>  > <jricher@mitre.org <mailto:jricher@mitre.org>>; Phil Hunt
> <phil.hunt@oracle.com <mailto:phil.hunt@oracle.com>>; IETF oauth WG
>  > <oauth@ietf.org <mailto:oauth@ietf.org>>
>  > *Sent:* Friday, February 15, 2013 7:22 AM
>  > *Subject:* Re: [OAUTH-WG] Minutes from the OAuth Design Team Conference
>  > Call - 11th February 2013
>  >
>  > Hi Bill,
>  >
>  > I think one needs to compare the costs/impact of HTTPS on one side and
>  > the implementation of integrity protection and replay detection on the
>  > other. We had this discussion several times.
>  >
>  > regards,
>  > Torsten.
>  >
>  > Am 15.02.2013 um 08:08 schrieb William Mills <wmills_92105@yahoo.com
> <mailto:wmills_92105@yahoo.com>
>  > <mailto:wmills_92105@yahoo.com <mailto:wmills_92105@yahoo.com>>>:
>  >
>  >> I fundamentally disagree with that too. OAuth 2 is the *framework*,
>  >> one which supports multiple token types. Bearer tokens were the first
>  >> credential type defined.
>  >>
>  >> OAuth 1.0a also requires HTTPS transport for authentication and
>  >> getting the token.
>  >>
>  >> There are real use cases for tokens usable over plain text with
>  >> integrity protection.
>  >>
>  >> -bill
>  >>
>  >> ------------------------------------------------------------------------
>  >> *From:* Torsten Lodderstedt <torsten@lodderstedt.net
> <mailto:torsten@lodderstedt.net>
>  >> <mailto:torsten@lodderstedt.net <mailto:torsten@lodderstedt.net>>>
>  >> *To:* William Mills <wmills_92105@yahoo.com
> <mailto:wmills_92105@yahoo.com>
>  >> <mailto:wmills_92105@yahoo.com <mailto:wmills_92105@yahoo.com>>>
>  >> *Cc:* Mike Jones <Michael.Jones@microsoft.com
> <mailto:Michael.Jones@microsoft.com>
>  >> <mailto:Michael.Jones@microsoft.com
> <mailto:Michael.Jones@microsoft.com>>>; Justin Richer
>  >> <jricher@mitre.org <mailto:jricher@mitre.org>
> <mailto:jricher@mitre.org <mailto:jricher@mitre.org>>>; Phil Hunt
>  >> <phil.hunt@oracle.com <mailto:phil.hunt@oracle.com>
> <mailto:phil.hunt@oracle.com <mailto:phil.hunt@oracle.com>>>; IETF oauth WG
>  >> <oauth@ietf.org <mailto:oauth@ietf.org> <mailto:oauth@ietf.org
> <mailto:oauth@ietf.org>>>
>  >> *Sent:* Thursday, February 14, 2013 10:05 PM
>  >> *Subject:* Re: [OAUTH-WG] Minutes from the OAuth Design Team
>  >> Conference Call - 11th February 2013
>  >>
>  >> Hi Bill,
>  >>
>  >> OAuth 2.0 took a different direction by relying on HTTPS to provide
>  >> the basic protection. So the need to have a token, which can be used
>  >> for service requests over plain HTTP is arguable. My understanding of
>  >> this activity was, the intend is to provide additional protection on
>  >> top of HTTPS.
>  >>
>  >> regards,
>  >> Torsten.
>  >>
>  >> Am 15.02.2013 um 02:31 schrieb William Mills <wmills_92105@yahoo.com
> <mailto:wmills_92105@yahoo.com>
>  >> <mailto:wmills_92105@yahoo.com <mailto:wmills_92105@yahoo.com>>>:
>  >>
>  >>> I disagree with "That was the impediment to OAuth 1.0 adoption that
>  >>> OAuth 2.0 solved in the first place.", unless "solving" means does
>  >>> not address the need for it at all.
>  >>>
>  >>> OAuth 2 does several good things, but it still lacks a defined token
>  >>> type that is safe to user over plain text HTTP. 1.0a solved that.
>  >>>
>  >>>
> ------------------------------------------------------------------------
>  >>> *From:* Mike Jones <Michael.Jones@microsoft.com
> <mailto:Michael.Jones@microsoft.com>
>  >>> <mailto:Michael.Jones@microsoft.com
> <mailto:Michael.Jones@microsoft.com>>>
>  >>> *To:* Justin Richer <jricher@mitre.org <mailto:jricher@mitre.org>
> <mailto:jricher@mitre.org <mailto:jricher@mitre.org>>>;
>  >>> Phil Hunt <phil.hunt@oracle.com <mailto:phil.hunt@oracle.com>
> <mailto:phil.hunt@oracle.com <mailto:phil.hunt@oracle.com>>>
>  >>> *Cc:* IETF oauth WG <oauth@ietf.org <mailto:oauth@ietf.org>
> <mailto:oauth@ietf.org <mailto:oauth@ietf.org>>>
>  >>> *Sent:* Thursday, February 14, 2013 1:44 PM
>  >>> *Subject:* Re: [OAUTH-WG] Minutes from the OAuth Design Team
>  >>> Conference Call - 11th February 2013
>  >>>
>  >>> I'm in favor of reusing the JWT work that this WG is also doing. :-)
>  >>>
>  >>> I'm pretty skeptical of us inventing another custom scheme for
>  >>> signing HTTP headers. That was the impediment to OAuth 1.0 adoption
>  >>> that OAuth 2.0 solved in the first place.
>  >>>
>  >>> -- Mike
>  >>>
>  >>> -----Original Message-----
>  >>> From: oauth-bounces@ietf.org <mailto:oauth-bounces@ietf.org>
> <mailto:oauth-bounces@ietf.org <mailto:oauth-bounces@ietf.org>>
>  >>> [mailto:oauth-bounces@ietf.org <mailto:oauth-bounces@ietf.org>
> <mailto:oauth-bounces@ietf.org <mailto:oauth-bounces@ietf.org>>] On
>  >>> Behalf Of Justin Richer
>  >>> Sent: Tuesday, February 12, 2013 9:35 AM
>  >>> To: Phil Hunt
>  >>> Cc: IETF oauth WG
>  >>> Subject: Re: [OAUTH-WG] Minutes from the OAuth Design Team Conference
>  >>> Call - 11th February 2013
>  >>>
>  >>> That's my reading of it as well, Phil, thanks for providing the
>  >>> clarification. One motivator behind using a JSON-based token is to be
>  >>> able to re-use some of the great work that the JOSE group is doing
>  >>> but apply it to an HTTP payload.
>  >>>
>  >>> What neither of us want is a token type that requires stuffing all
>  >>> query, header, and other parameters *into* the JSON object itself,
>  >>> which would be a more SOAPy approach.
>  >>>
>  >>> -- Justin
>  >>>
>  >>> On 02/12/2013 12:30 PM, Phil Hunt wrote:
>  >>> > Clarification. I think Justin and I were in agreement that we don't
>  >>> want to see a format that requires JSON payloads. We are both
>  >>> interested in a JSON token used in the authorization header that
>  >>> could be based on a computed signature of some combination of http
>  >>> headers and body if possible.
>  >>> >
>  >>> > Phil
>  >>> >
>  >>> > @independentid
>  >>> > www.independentid.com <http://www.independentid.com/>
>  >>> > phil.hunt@oracle.com <mailto:phil.hunt@oracle.com>
> <mailto:phil.hunt@oracle.com <mailto:phil.hunt@oracle.com>>
>  >>> >
>  >>> >
>  >>> >
>  >>> >
>  >>> >
>  >>> > On 2013-02-12, at 1:10 AM, Hannes Tschofenig wrote:
>  >>> >
>  >>> >> Here are my notes.
>  >>> >>
>  >>> >> Participants:
>  >>> >>
>  >>> >> * John Bradley
>  >>> >> * Derek Atkins
>  >>> >> * Phil Hunt
>  >>> >> * Prateek Mishra
>  >>> >> * Hannes Tschofenig
>  >>> >> * Mike Jones
>  >>> >> * Antonio Sanso
>  >>> >> * Justin Richer
>  >>> >>
>  >>> >> Notes:
>  >>> >>
>  >>> >> My slides are available here:
>  >>> >> http://www.tschofenig.priv.at/OAuth2-Security-11Feb2013.ppt
>  >>> >>
>  >>> >> Slide #2 summarizes earlier discussions during the conference calls.
>  >>> >>
>  >>> >> -- HTTP vs. JSON
>  >>> >>
>  >>> >> Phil noted that he does not like to use the MAC Token draft as a
>  >>> starting point because it does not re-use any of the work done in the
>  >>> JOSE working group and in particular all the libraries that are
>  >>> available today. He mentioned that earlier attempts to write the MAC
>  >>> Token code lead to problems for implementers.
>  >>> >>
>  >>> >> Justin responded that he does not agree with using JSON as a
>  >>> transport mechanism since this would replicate a SOAP style.
>  >>> >>
>  >>> >> Phil noted that he wants to send JSON but the signature shall be
>  >>> computed over the HTTP header field.
>  >>> >>
>  >>> >> -- Flexibility for the keyed message digest computation
>  >>> >>
>  >>> >> From earlier discussion it was clear that the conference call
>  >>> participants wanted more flexibility regarding the keyed message
>  >>> digest computation. For this purpose Hannes presented the DKIM based
>  >>> approach, which allows selective header fields to be included in the
>  >>> digest. This is shown in slide #4.
>  >>> >>
>  >>> >> After some discussion the conference call participants thought
>  >>> that this would meet their needs. Further investigations would still
>  >>> be useful to determine the degree of failed HMAC calculations due to
>  >>> HTTP proxies modifying the content.
>  >>> >>
>  >>> >> -- Key Distribution
>  >>> >>
>  >>> >> Hannes presented the open issue regarding the choice of key
>  >>> >> distribution. Slides #6-#8 present three techniques and Hannes asked
>  >>> >> for feedback regarding the preferred style. Justin and others didn't
>  >>> >> see the need to decide on one mechanism - they wanted to keep the
>  >>> >> choice open. Derek indicated that this will not be an acceptable
>  >>> >> approach. Since the resource server and the authorization server
> may,
>  >>> >> in the OAuth 2.0 framework, be entities produced by different
> vendors
>  >>> >> there is an interoperability need. Justin responded that he
> disagrees
>  >>> >> and that the resource server needs to understand the access
> token and
>  >>> >> referred to the recent draft submission for the token introspection
>  >>> >> endpoint. Derek indicated that the resource server has to understand
>  >>> >> the content of the access token and the token introspection endpoint
>  >>> >> just pushes the problem around: the resource server has to send the
>  >>> >> access token to the authorization server and then the resource
> server
>  >>> >> gets the result back (which he the
>  >>> n
>  >>> > a
>  >>> >> gain needs to understand) in order to make a meaningful
>  >>> authorization decision.
>  >>> >>
>  >>> >> Everyone agreed that the client must receive the session key from
>  >>> the authorization server and that this approach has to be
>  >>> standardized. It was also agreed that this is a common approach among
>  >>> all three key distribution mechanisms.
>  >>> >>
>  >>> >> Hannes asked the participants to think about their preference.
>  >>> >>
>  >>> >> The questions regarding key naming and the indication for the
>  >>> intended resource server the client wants to talk to have been
> postponed.
>  >>> >>
>  >>> >> Ciao
>  >>> >> Hannes
>  >>> >>
>  >>> >>
>  >>> >> _______________________________________________
>  >>> >> OAuth mailing list
>  >>> >> OAuth@ietf.org <mailto:OAuth@ietf.org> <mailto:OAuth@ietf.org
> <mailto:OAuth@ietf.org>>
>  >>> >> https://www.ietf.org/mailman/listinfo/oauth
>  >>> > _______________________________________________
>  >>> > OAuth mailing list
>  >>> > OAuth@ietf.org <mailto:OAuth@ietf.org> <mailto:OAuth@ietf.org
> <mailto:OAuth@ietf.org>>
>  >>> > https://www.ietf.org/mailman/listinfo/oauth
>  >>>
>  >>>
>  >>> _______________________________________________
>  >>> OAuth mailing list
>  >>> OAuth@ietf.org <mailto:OAuth@ietf.org> <mailto:OAuth@ietf.org
> <mailto:OAuth@ietf.org>>
>  >>> https://www.ietf.org/mailman/listinfo/oauth
>  >>> _______________________________________________
>  >>> OAuth mailing list
>  >>> OAuth@ietf.org <mailto:OAuth@ietf.org> <mailto:OAuth@ietf.org
> <mailto:OAuth@ietf.org>>
>  >>> https://www.ietf.org/mailman/listinfo/oauth
>  >>>
>  >>>
>  >>> _______________________________________________
>  >>> OAuth mailing list
>  >>> OAuth@ietf.org <mailto:OAuth@ietf.org> <mailto:OAuth@ietf.org
> <mailto:OAuth@ietf.org>>
>  >>> https://www.ietf.org/mailman/listinfo/oauth
>  >>
>  >>
>  >
>  >
>  >
>  >
>  > _______________________________________________
>  > OAuth mailing list
>  > OAuth@ietf.org <mailto:OAuth@ietf.org>
>  > https://www.ietf.org/mailman/listinfo/oauth
> _______________________________________________
> OAuth mailing list
> OAuth@ietf.org <mailto:OAuth@ietf.org>
> https://www.ietf.org/mailman/listinfo/oauth
>
>

From Michael.Jones@microsoft.com  Fri Feb 15 14:15:47 2013
Return-Path: <Michael.Jones@microsoft.com>
X-Original-To: oauth@ietfa.amsl.com
Delivered-To: oauth@ietfa.amsl.com
Received: from localhost (localhost [127.0.0.1]) by ietfa.amsl.com (Postfix) with ESMTP id D2A3221E804B; Fri, 15 Feb 2013 14:15:47 -0800 (PST)
X-Virus-Scanned: amavisd-new at amsl.com
X-Spam-Flag: NO
X-Spam-Score: -2.585
X-Spam-Level: 
X-Spam-Status: No, score=-2.585 tagged_above=-999 required=5 tests=[AWL=0.014,  BAYES_00=-2.599]
Received: from mail.ietf.org ([64.170.98.30]) by localhost (ietfa.amsl.com [127.0.0.1]) (amavisd-new, port 10024) with ESMTP id n0Zx+4-VTdPg; Fri, 15 Feb 2013 14:15:47 -0800 (PST)
Received: from na01-by2-obe.outbound.protection.outlook.com (na01-by2-obe.ptr.protection.outlook.com [207.46.100.25]) by ietfa.amsl.com (Postfix) with ESMTP id 319E521E8045; Fri, 15 Feb 2013 14:15:47 -0800 (PST)
Received: from BY2FFO11FD016.protection.gbl (10.1.15.201) by BY2FFO11HUB024.protection.gbl (10.1.14.138) with Microsoft SMTP Server (TLS) id 15.0.620.12; Fri, 15 Feb 2013 22:15:43 +0000
Received: from TK5EX14MLTC104.redmond.corp.microsoft.com (131.107.125.37) by BY2FFO11FD016.mail.protection.outlook.com (10.1.14.148) with Microsoft SMTP Server (TLS) id 15.0.620.12 via Frontend Transport; Fri, 15 Feb 2013 22:15:43 +0000
Received: from TK5EX14MBXC284.redmond.corp.microsoft.com ([169.254.1.96]) by TK5EX14MLTC104.redmond.corp.microsoft.com ([157.54.79.159]) with mapi id 14.02.0318.003; Fri, 15 Feb 2013 22:15:12 +0000
From: Mike Jones <Michael.Jones@microsoft.com>
To: "Richer, Justin P." <jricher@mitre.org>, "internet-drafts@ietf.org" <internet-drafts@ietf.org>
Thread-Topic: [OAUTH-WG] I-D Action: draft-ietf-oauth-dyn-reg-06.txt
Thread-Index: AQHOC8cMkbohP5vU0EO7eTLi/U/hMJh7eCuAgAAEDkA=
Date: Fri, 15 Feb 2013 22:15:11 +0000
Message-ID: <4E1F6AAD24975D4BA5B1680429673943674642E2@TK5EX14MBXC284.redmond.corp.microsoft.com>
References: <20130215215423.23019.50224.idtracker@ietfa.amsl.com> <B33BFB58CCC8BE4998958016839DE27E06894B4F@IMCMBX01.MITRE.ORG>
In-Reply-To: <B33BFB58CCC8BE4998958016839DE27E06894B4F@IMCMBX01.MITRE.ORG>
Accept-Language: en-US
Content-Language: en-US
X-MS-Has-Attach: 
X-MS-TNEF-Correlator: 
x-originating-ip: [157.54.51.70]
Content-Type: text/plain; charset="us-ascii"
Content-Transfer-Encoding: quoted-printable
MIME-Version: 1.0
X-Forefront-Antispam-Report: CIP:131.107.125.37; CTRY:US; IPV:CAL; IPV:NLI; EFV:NLI; SFV:NSPM; SFS:(13464002)(51704002)(377424002)(377454001)(52604002)(69224001)(24454001)(65554002)(44976002)(74662001)(15202345001)(74502001)(76482001)(31966008)(33656001)(5343655001)(56816002)(20776003)(47446002)(66066001)(54316002)(56776001)(49866001)(47736001)(50466001)(47976001)(16406001)(59766001)(77982001)(79102001)(50986001)(65816001)(80022001)(51856001)(55846006)(4396001)(46102001)(23726001)(46406002)(63696002)(53806001)(54356001)(47776003); DIR:OUT; SFP:; SCL:1; SRVR:BY2FFO11HUB024; H:TK5EX14MLTC104.redmond.corp.microsoft.com; LANG:en; 
X-OriginatorOrg: microsoft.onmicrosoft.com
X-Forefront-PRVS: 07584EDBCD
Cc: "<oauth@ietf.org>" <oauth@ietf.org>, "<i-d-announce@ietf.org>" <i-d-announce@ietf.org>
Subject: Re: [OAUTH-WG] I-D Action: draft-ietf-oauth-dyn-reg-06.txt
X-BeenThere: oauth@ietf.org
X-Mailman-Version: 2.1.12
Precedence: list
List-Id: OAUTH WG <oauth.ietf.org>
List-Unsubscribe: <https://www.ietf.org/mailman/options/oauth>, <mailto:oauth-request@ietf.org?subject=unsubscribe>
List-Archive: <http://www.ietf.org/mail-archive/web/oauth>
List-Post: <mailto:oauth@ietf.org>
List-Help: <mailto:oauth-request@ietf.org?subject=help>
List-Subscribe: <https://www.ietf.org/mailman/listinfo/oauth>, <mailto:oauth-request@ietf.org?subject=subscribe>
X-List-Received-Date: Fri, 15 Feb 2013 22:15:48 -0000

+1

Thanks for doing this, Justin!

				-- Mike

-----Original Message-----
From: oauth-bounces@ietf.org [mailto:oauth-bounces@ietf.org] On Behalf Of R=
icher, Justin P.
Sent: Friday, February 15, 2013 2:00 PM
To: internet-drafts@ietf.org
Cc: <oauth@ietf.org>; <i-d-announce@ietf.org>
Subject: Re: [OAUTH-WG] I-D Action: draft-ietf-oauth-dyn-reg-06.txt

Everyone, there's a new draft of DynReg up on the tracker. This draft tries=
 to codify the discussions so far from this week into something we can all =
read. There are still plenty of open discussion points and items up for deb=
ate. Please read through this latest draft and see what's changed and help =
assure that it properly captures the conversations. If you have any inputs =
for the marked [[ Editor's Note ]] sections, please send them to the list b=
y next Thursday to give me opportunity to get any necessary changes in by t=
he cutoff date of Monday the 22nd.

Thanks for all of your hard work everyone, I think this is *really* coming =
along now.

 -- Justin

On Feb 15, 2013, at 4:54 PM, internet-drafts@ietf.org wrote:

>=20
> A New Internet-Draft is available from the on-line Internet-Drafts direct=
ories.
> This draft is a work item of the Web Authorization Protocol Working Group=
 of the IETF.
>=20
> 	Title           : OAuth Dynamic Client Registration Protocol
> 	Author(s)       : Justin Richer
>                          John Bradley
>                          Michael B. Jones
>                          Maciej Machulak
> 	Filename        : draft-ietf-oauth-dyn-reg-06.txt
> 	Pages           : 21
> 	Date            : 2013-02-15
>=20
> Abstract:
>   This specification defines an endpoint and protocol for dynamic
>   registration of OAuth Clients at an Authorization Server.
>=20
>=20
> The IETF datatracker status page for this draft is:
> https://datatracker.ietf.org/doc/draft-ietf-oauth-dyn-reg
>=20
> There's also a htmlized version available at:
> http://tools.ietf.org/html/draft-ietf-oauth-dyn-reg-06
>=20
> A diff from the previous version is available at:
> http://www.ietf.org/rfcdiff?url2=3Ddraft-ietf-oauth-dyn-reg-06
>=20
>=20
> Internet-Drafts are also available by anonymous FTP at:
> ftp://ftp.ietf.org/internet-drafts/
>=20
> _______________________________________________
> OAuth mailing list
> OAuth@ietf.org
> https://www.ietf.org/mailman/listinfo/oauth

_______________________________________________
OAuth mailing list
OAuth@ietf.org
https://www.ietf.org/mailman/listinfo/oauth

From donald.coffin@reminetworks.com  Fri Feb 15 18:03:41 2013
Return-Path: <donald.coffin@reminetworks.com>
X-Original-To: oauth@ietfa.amsl.com
Delivered-To: oauth@ietfa.amsl.com
Received: from localhost (localhost [127.0.0.1]) by ietfa.amsl.com (Postfix) with ESMTP id F181821F85E7 for <oauth@ietfa.amsl.com>; Fri, 15 Feb 2013 18:03:40 -0800 (PST)
X-Virus-Scanned: amavisd-new at amsl.com
X-Spam-Flag: NO
X-Spam-Score: -2.199
X-Spam-Level: 
X-Spam-Status: No, score=-2.199 tagged_above=-999 required=5 tests=[AWL=1.400,  BAYES_00=-2.599, RCVD_IN_DNSWL_LOW=-1]
Received: from mail.ietf.org ([64.170.98.30]) by localhost (ietfa.amsl.com [127.0.0.1]) (amavisd-new, port 10024) with ESMTP id jg7lXblxxu6x for <oauth@ietfa.amsl.com>; Fri, 15 Feb 2013 18:03:39 -0800 (PST)
Received: from oproxy12-pub.bluehost.com (oproxy12-pub.bluehost.com [50.87.16.10]) by ietfa.amsl.com (Postfix) with SMTP id 4D1CB21F8573 for <oauth@ietf.org>; Fri, 15 Feb 2013 18:03:39 -0800 (PST)
Received: (qmail 10308 invoked by uid 0); 16 Feb 2013 02:03:14 -0000
Received: from unknown (HELO host125.hostmonster.com) (74.220.207.125) by oproxy12.bluehost.com with SMTP; 16 Feb 2013 02:03:14 -0000
DKIM-Signature: v=1; a=rsa-sha256; q=dns/txt; c=relaxed/relaxed; d=reminetworks.com; s=default;  h=Content-Transfer-Encoding:Content-Type:MIME-Version:Message-ID:Date:Subject:In-Reply-To:References:Cc:To:From; bh=s/ywkdlWX64xedV52sBJv1lNJgTcrYILCSmnuD25XFU=;  b=F6QyZO8AHsnCsFhKEyMQbGlfQ9sYGiKHFty+BjEFr6+Cpo1Ww6LAN6lOcU8cHtecxVUO7agIK2SaKA2A6xg5g5x8JAzEYez6ohiH7J1dVyGsR0v46Mk4FOjl1z6glXcQ;
Received: from [68.4.207.246] (port=6775 helo=HPPavilionElite) by host125.hostmonster.com with esmtpa (Exim 4.80) (envelope-from <donald.coffin@reminetworks.com>) id 1U6X7S-0008Ey-Gp; Fri, 15 Feb 2013 19:03:14 -0700
From: "Donald F Coffin" <donald.coffin@reminetworks.com>
To: <internet-drafts@ietf.org>, <i-d-announce@ietf.org>
References: <20130215215423.23019.50224.idtracker@ietfa.amsl.com>
In-Reply-To: <20130215215423.23019.50224.idtracker@ietfa.amsl.com>
Date: Fri, 15 Feb 2013 18:01:09 -0800
Message-ID: <00b601ce0be9$7d4fa460$77eeed20$@reminetworks.com>
MIME-Version: 1.0
Content-Type: text/plain; charset="UTF-8"
Content-Transfer-Encoding: quoted-printable
X-Mailer: Microsoft Outlook 14.0
Thread-Index: AQJR1evIYzX2Fhgoge99d7m6DWb3sZd0JhXA
Content-Language: en-us
X-Identified-User: {1395:host125.hostmonster.com:reminetw:reminetworks.com} {sentby:smtp auth 68.4.207.246 authed with donald.coffin@reminetworks.com}
Cc: oauth@ietf.org
Subject: Re: [OAUTH-WG] I-D Action: draft-ietf-oauth-dyn-reg-06.txt
X-BeenThere: oauth@ietf.org
X-Mailman-Version: 2.1.12
Precedence: list
List-Id: OAUTH WG <oauth.ietf.org>
List-Unsubscribe: <https://www.ietf.org/mailman/options/oauth>, <mailto:oauth-request@ietf.org?subject=unsubscribe>
List-Archive: <http://www.ietf.org/mail-archive/web/oauth>
List-Post: <mailto:oauth@ietf.org>
List-Help: <mailto:oauth-request@ietf.org?subject=help>
List-Subscribe: <https://www.ietf.org/mailman/listinfo/oauth>, <mailto:oauth-request@ietf.org?subject=subscribe>
X-List-Received-Date: Sat, 16 Feb 2013 02:03:41 -0000

Justin,

Section 5.1 of RFC6749 "OAuth 2.0 Authorization Framework" states:

	"The authorization server MUST include the HTTP "Cache-Control"
  	 response header field [RFC2616] with a value of "no-store" in any
   	response containing tokens, credentials, or other sensitive
   	information, as well as the "Pragma" response header field [RFC2616]
   	with a value of "no-cache"."

I've noticed several of the response examples in the current and =
previous versions of "draft-ietf-oauth-dyn-reg-xx.txt" fail to include =
the required "Pragma: "no-cache" directive.  I assume this is an =
oversight and am merely pointing out that it needs to be included.

Best regards,
Don
Donald F. Coffin
Founder/CTO

REMI Networks
22751 El Prado Suite 6216
Rancho Santa Margarita, CA  92688-3836

Phone:      (949) 636-8571
Email:       donald.coffin@reminetworks.com


-----Original Message-----
From: internet-drafts@ietf.org [mailto:internet-drafts@ietf.org]=20
Sent: Friday, February 15, 2013 1:54 PM
To: i-d-announce@ietf.org
Cc: oauth@ietf.org
Subject: [OAUTH-WG] I-D Action: draft-ietf-oauth-dyn-reg-06.txt


A New Internet-Draft is available from the on-line Internet-Drafts =
directories.
 This draft is a work item of the Web Authorization Protocol Working =
Group of the IETF.

	Title           : OAuth Dynamic Client Registration Protocol
	Author(s)       : Justin Richer
                          John Bradley
                          Michael B. Jones
                          Maciej Machulak
	Filename        : draft-ietf-oauth-dyn-reg-06.txt
	Pages           : 21
	Date            : 2013-02-15

Abstract:
   This specification defines an endpoint and protocol for dynamic
   registration of OAuth Clients at an Authorization Server.


The IETF datatracker status page for this draft is:
https://datatracker.ietf.org/doc/draft-ietf-oauth-dyn-reg

There's also a htmlized version available at:
http://tools.ietf.org/html/draft-ietf-oauth-dyn-reg-06

A diff from the previous version is available at:
http://www.ietf.org/rfcdiff?url2=3Ddraft-ietf-oauth-dyn-reg-06


Internet-Drafts are also available by anonymous FTP at:
ftp://ftp.ietf.org/internet-drafts/




From wmills_92105@yahoo.com  Fri Feb 15 22:02:55 2013
Return-Path: <wmills_92105@yahoo.com>
X-Original-To: oauth@ietfa.amsl.com
Delivered-To: oauth@ietfa.amsl.com
Received: from localhost (localhost [127.0.0.1]) by ietfa.amsl.com (Postfix) with ESMTP id 9A1BE21F841F for <oauth@ietfa.amsl.com>; Fri, 15 Feb 2013 22:02:55 -0800 (PST)
X-Virus-Scanned: amavisd-new at amsl.com
X-Spam-Flag: NO
X-Spam-Score: -2.165
X-Spam-Level: 
X-Spam-Status: No, score=-2.165 tagged_above=-999 required=5 tests=[AWL=0.433,  BAYES_00=-2.599, HTML_MESSAGE=0.001]
Received: from mail.ietf.org ([64.170.98.30]) by localhost (ietfa.amsl.com [127.0.0.1]) (amavisd-new, port 10024) with ESMTP id w9Nk70G26Ilg for <oauth@ietfa.amsl.com>; Fri, 15 Feb 2013 22:02:53 -0800 (PST)
Received: from nm1.bullet.mail.bf1.yahoo.com (nm1.bullet.mail.bf1.yahoo.com [98.139.212.160]) by ietfa.amsl.com (Postfix) with SMTP id EDDBE21F85C0 for <oauth@ietf.org>; Fri, 15 Feb 2013 22:02:51 -0800 (PST)
Received: from [98.139.212.146] by nm1.bullet.mail.bf1.yahoo.com with NNFMP; 16 Feb 2013 06:02:51 -0000
Received: from [98.139.212.222] by tm3.bullet.mail.bf1.yahoo.com with NNFMP; 16 Feb 2013 06:02:51 -0000
Received: from [127.0.0.1] by omp1031.mail.bf1.yahoo.com with NNFMP; 16 Feb 2013 06:02:51 -0000
X-Yahoo-Newman-Property: ymail-3
X-Yahoo-Newman-Id: 252469.81335.bm@omp1031.mail.bf1.yahoo.com
Received: (qmail 62018 invoked by uid 60001); 16 Feb 2013 06:02:50 -0000
DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=yahoo.com; s=s1024; t=1360994570; bh=CXgW/glPOppt36mqlXKI0FNDhjpnv1kq8HiszxkfwXo=; h=X-YMail-OSG:Received:X-Rocket-MIMEInfo:X-Mailer:References:Message-ID:Date:From:Reply-To:Subject:To:Cc:In-Reply-To:MIME-Version:Content-Type; b=ujXPVwFVYj5D+9Ph9+qv9qDlPfbN01kpA3HIFaDB+8J2NrqlvFJ556Ujw71E5NexySDGAlKq6X3KjgOpyeb+B6eENMJ58LptqUq9EmPSxEes84hhxxM+nKI/8uD8YRzFpClB46buf6iP3ZTJB6FtMb/An2R3mPW3k+KulcwOcls=
DomainKey-Signature: a=rsa-sha1; q=dns; c=nofws; s=s1024; d=yahoo.com; h=X-YMail-OSG:Received:X-Rocket-MIMEInfo:X-Mailer:References:Message-ID:Date:From:Reply-To:Subject:To:Cc:In-Reply-To:MIME-Version:Content-Type; b=LzJFm2MszDSVbots/srVrFfObGIC/y+f2VubeapxGJRDeeIckxnv+v4jOUpY8cpVJhtldEd4iB1zo4T6EAuL2IMtWP1PKFhJG87g+M2tVcYrtyb2L+ZgTC83fbdgUO47eVSqFLlW3+yX9GqtAvD4755oR3OVTFIu/OAdKg0Ev+w=;
X-YMail-OSG: KgpTZCYVM1k9.aVbCS6kuYJCRK99OpjFoo4tGSXVBmQtZEf eQwVPCptZMuxGqkFfzL.D9JwSzk4.TijonYy4WRwFpbv4GxzzRu5VDQrUvKC KMoVnd7yl9xeYS07lCU8PlrlWDXU6Bqg3iTJHBhqnK0Vk5Shr9HAq0x.6leo FvAhkmHUG6nTiZTwLvBMdUAR3yOOLL0le6qAR.66Ddx4hf6.4.fgbLwCubb7 ieyI3.QmTaVmYNxmPJG8YGvVBg0BGLf6M0W9T9K2nQFwv0M0Q0AJOV5t47AK lI3_DRJeYzX31nFQq4fyhy3w8hrUC3FAfKAVDL0RwgWjQaS4bw_AgsXzk0S_ aAXaibNaYVWpfCtQPr4gbmsmpN3cxqxxc.niqK7xETfcHE96pu8y6As8VRQK lMujg5WBxaDAhOf.L7pace6O0AMu3Eqer_jSFzUA9NY2ZafXBS6_tjT4rHSv gLlhlm02GqOGRvo5E7ST.jj5wrAqe6or.S4nOd0q6nvZ3jfO6cPnQAWEvhd8 zvRRvgt6q5h1EqrT_1OdxLCE9UnBb.vovCazRH5AtMA6laMHrxndjGB1vfH8 3cxYGkRdkSw3NuXf1V9TaTZYdD9fdgOjAMa_6zMhuK6xyNMvpcmHHHzYbnj3 eSKHL_XDWiPB4yxRMUwerBWi8YyijpTDoOtP5XPzH.82bv0b33Wl7qSGPi.j QKsqzhtLfm7UlGI9dC8kUO1yKLmqQZso9pjKljN2JLoA1qqXyJA--
Received: from [99.31.212.42] by web31805.mail.mud.yahoo.com via HTTP; Fri, 15 Feb 2013 22:02:50 PST
X-Rocket-MIMEInfo: 001.001, QWxsIHRoZSBzYW1lIGNvbmNlcHRzL2luZm8gYXJlIGF2YWlsYWJsZSBpbiB0aGUgQVM6IGNsaWVudCBJRCwgY2xpZW50IGF1dGgsIGFuZCBjYW4gZGVsaXZlciBib3RoIHRva2VuIGFuZCBzZWNyZXQuIMKgV2hhdCdzIG1hZ2ljIG9uY2UgdGhlIGNsaWVudCBoYXMgdGhlIHRva2VuIHRoYXQncyBtaXNzaW5nPwoKCl9fX19fX19fX19fX19fX19fX19fX19fX19fX19fX19fCiBGcm9tOiBQaGlsIEh1bnQgPHBoaWwuaHVudEBvcmFjbGUuY29tPgpUbzogV2lsbGlhbSBNaWxscyA8d21pbGxzXzkyMTA1QHlhaG9vLmMBMAEBAQE-
X-Mailer: YahooMailWebService/0.8.134.513
References: <0573984A-8C11-4960-9BC6-F44D4B664C19@gmx.net> <E808B6AC-D5F6-479F-967D-EA6B2586BE64@oracle.com> <511A7D27.8010209@mitre.org> <4E1F6AAD24975D4BA5B16804296739436744BD23@TK5EX14MBXC285.redmond.corp.microsoft.com> <1360891897.14004.YahooMailNeo@web31811.mail.mud.yahoo.com> <E7EBF78C-37EB-4737-8DD5-0F24C9FACA60@lodderstedt.net> <1360912115.36543.YahooMailNeo@web31811.mail.mud.yahoo.com> <2A0F585F-2CEF-418D-9654-5084E6C9BD0D@lodderstedt.net> <1360944589.51724.YahooMailNeo@web31808.mail.mud.yahoo.com> <CA+ZpN24dWAGtZR2aQcqC_N+sHsp7zBVe42LDbrkAsqNVqQPv0w@mail.gmail.com> <511EA0A3.7080000@mitre.org> <1360962242.18571.YahooMailNeo@web31805.mail.mud.yahoo.com> <BDE6C674-AEDE-4E73-9122-4F2A90F7F180@oracle.com>
Message-ID: <1360994570.11377.YahooMailNeo@web31805.mail.mud.yahoo.com>
Date: Fri, 15 Feb 2013 22:02:50 -0800 (PST)
From: William Mills <wmills_92105@yahoo.com>
To: Phil Hunt <phil.hunt@oracle.com>
In-Reply-To: <BDE6C674-AEDE-4E73-9122-4F2A90F7F180@oracle.com>
MIME-Version: 1.0
Content-Type: multipart/alternative; boundary="-551393103-308099663-1360994570=:11377"
Cc: IETF oauth WG <oauth@ietf.org>
Subject: Re: [OAUTH-WG] Minutes from the OAuth Design Team Conference Call - 11th February 2013
X-BeenThere: oauth@ietf.org
X-Mailman-Version: 2.1.12
Precedence: list
Reply-To: William Mills <wmills_92105@yahoo.com>
List-Id: OAUTH WG <oauth.ietf.org>
List-Unsubscribe: <https://www.ietf.org/mailman/options/oauth>, <mailto:oauth-request@ietf.org?subject=unsubscribe>
List-Archive: <http://www.ietf.org/mail-archive/web/oauth>
List-Post: <mailto:oauth@ietf.org>
List-Help: <mailto:oauth-request@ietf.org?subject=help>
List-Subscribe: <https://www.ietf.org/mailman/listinfo/oauth>, <mailto:oauth-request@ietf.org?subject=subscribe>
X-List-Received-Date: Sat, 16 Feb 2013 06:02:55 -0000

---551393103-308099663-1360994570=:11377
Content-Type: text/plain; charset=utf-8
Content-Transfer-Encoding: quoted-printable

All the same concepts/info are available in the AS: client ID, client auth,=
 and can deliver both token and secret. =C2=A0What's magic once the client =
has the token that's missing?=0A=0A=0A________________________________=0A F=
rom: Phil Hunt <phil.hunt@oracle.com>=0ATo: William Mills <wmills_92105@yah=
oo.com> =0ACc: Justin Richer <jricher@mitre.org>; Tim Bray <twbray@google.c=
om>; IETF oauth WG <oauth@ietf.org> =0ASent: Friday, February 15, 2013 1:52=
 PM=0ASubject: Re: [OAUTH-WG] Minutes from the OAuth Design Team Conference=
 Call - 11th February 2013=0A =0A=0ASorry. I have to disagree. The way 1.0 =
is written, it is not a shortcut to turn it into a token for 2.=C2=A0=0A=0A=
Phil=0A=0ASent from my phone.=0A=0AOn 2013-02-15, at 13:04, William Mills <=
wmills_92105@yahoo.com> wrote:=0A=0A=0A>I've brought it up before, but I th=
ink it might be worthwhile, at least as an exercise, to define a method to =
get OAuth1-style tokens from an OAuth2 token endpoint. You'd defer to OAuth=
1 for how to use them >with a protected resource.=0A>=0A>=0A>=0A>YES!=0A>=
=0A>=0A>=0A>________________________________=0A> From: Justin Richer <jrich=
er@mitre.org>=0A>To: Tim Bray <twbray@google.com> =0A>Cc: William Mills <wm=
ills_92105@yahoo.com>; IETF oauth WG <oauth@ietf.org> =0A>Sent: Friday, Feb=
ruary 15, 2013 12:54 PM=0A>Subject: Re: [OAUTH-WG] Minutes from the OAuth D=
esign Team Conference Call - 11th February 2013=0A> =0A>=0A>So that you can=
 fetch and manage all your tokens using the same code paths as the OAuth2 s=
ervices. The "get a token" part will be identical to Oauth2 Bearer (except =
for some details of what comes back from the token endpoint, of course), it=
's the "use a token" bit that really changes and is up in the air. You get =
to use scopes, and state, and refresh tokens, and all the other good stuff.=
=0A>=0A>I've brought it up before, but I think it might be worthwhile, at=
=0A    least as an exercise, to define a method to get OAuth1-style tokens=
=0A    from an OAuth2 token endpoint. You'd defer to OAuth1 for how to use=
=0A    them with a protected resource.=0A>=0A>=C2=A0-- Justin=0A>=0A>=0A>On=
 02/15/2013 11:49 AM, Tim Bray wrote:=0A>=0A>Not deeply acquainted with the=
 Flickr scenario, but it occurs to me to ask: If OAuth 1.0 is working well =
for them, why don=E2=80=99t they just keep using it? =C2=A0I.e. if there=E2=
=80=99s already a good solution in place for people who require secure auth=
n/authz over insecure channels, why would we go the extra work of duplicati=
ng that in OAuth 2 territory? -T=0A>>=0A>>=0A>>On Fri, Feb 15, 2013 at 8:09=
 AM, William Mills <wmills_92105@yahoo.com> wrote:=0A>>=0A>>I'll repeat the=
 use case for Flickr, which requires OAuth 1.0a type capabilites that OAuth=
 2 does not provide. =C2=A0Simply stating "move to HTTPS" is not a viable r=
esponse here. =C2=A0=0A>>>=0A>>>=0A>>>=0A>>>_______________________________=
_=0A>>> From: Torsten Lodderstedt <torsten@lodderstedt.net>=0A>>>To: Willia=
m Mills <wmills_92105@yahoo.com> =0A>>>Cc: Mike Jones <Michael.Jones@micros=
oft.com>; Justin Richer <jricher@mitre.org>; Phil Hunt <phil.hunt@oracle.co=
m>; IETF oauth WG <oauth@ietf.org> =0A>>>Sent: Friday, February 15, 2013 7:=
22 AM=0A>>>Subject: Re: [OAUTH-WG] Minutes from the OAuth Design Team Confe=
rence Call - 11th February 2013=0A>>> =0A>>>=0A>>>Hi Bill,=0A>>>=0A>>>=0A>>=
>I think one needs to compare the costs/impact of HTTPS on one side and the=
 implementation of integrity protection and replay detection on the other. =
We had this discussion several times.=0A>>>=0A>>>=0A>>>regards,=0A>>>Torste=
n.=0A>>>=0A>>>Am 15.02.2013 um 08:08 schrieb William Mills=0A              =
          <wmills_92105@yahoo.com>:=0A>>>=0A>>>=0A>>>I fundamentally disagr=
ee with that too. =C2=A0OAuth 2 is the *framework*, one which supports mult=
iple token types. =C2=A0Bearer tokens were the first credential type define=
d.=0A>>>>=0A>>>>=0A>>>>OAuth 1.0a also requires HTTPS transport for authent=
ication and getting the token.=0A>>>>=0A>>>>=0A>>>>There are =C2=A0real use=
 cases for tokens usable over plain text with integrity protection.=0A>>>>=
=0A>>>>=0A>>>>-bill=0A>>>>=0A>>>>=0A>>>>=0A>>>>____________________________=
____=0A>>>> From: Torsten Lodderstedt <torsten@lodderstedt.net>=0A>>>>To: W=
illiam Mills <wmills_92105@yahoo.com> =0A>>>>Cc: Mike Jones <Michael.Jones@=
microsoft.com>; Justin Richer <jricher@mitre.org>; Phil Hunt <phil.hunt@ora=
cle.com>; IETF oauth WG <oauth@ietf.org> =0A>>>>Sent: Thursday, February 14=
, 2013 10:05 PM=0A>>>>Subject: Re: [OAUTH-WG] Minutes from the OAuth Design=
 Team Conference Call - 11th February 2013=0A>>>> =0A>>>>=0A>>>>Hi Bill,=0A=
>>>>=0A>>>>=0A>>>>OAuth 2.0 took a different direction by relying on HTTPS =
to provide the basic protection. So the need to have a token, which can be =
used for service requests over plain HTTP is arguable. My understanding of =
this activity was, the intend is to provide additional protection on top of=
 HTTPS.=0A>>>>=0A>>>>=0A>>>>regards,=0A>>>>Torsten.=0A>>>>=0A>>>>Am 15.02.2=
013 um 02:31 schrieb=0A                                      William Mills =
<wmills_92105@yahoo.com>:=0A>>>>=0A>>>>=0A>>>>I disagree with "That was the=
 impediment to OAuth 1.0 adoption that OAuth 2.0 solved in the first place.=
", unless "solving" means does not address the need for it at all.=0A>>>>>=
=0A>>>>>=0A>>>>>OAuth 2 does several good things, but it still lacks a defi=
ned token type that is safe to user over plain text HTTP. =C2=A01.0a solved=
 that.=0A>>>>>=0A>>>>>=0A>>>>>=0A>>>>>________________________________=0A>>=
>>> From: Mike Jones <Michael.Jones@microsoft.com>=0A>>>>>To: Justin Richer=
 <jricher@mitre.org>; Phil Hunt <phil.hunt@oracle.com> =0A>>>>>Cc: IETF oau=
th WG <oauth@ietf.org> =0A>>>>>Sent: Thursday, February 14, 2013 1:44 PM=0A=
>>>>>Subject: Re: [OAUTH-WG] Minutes from the OAuth Design Team Conference =
Call - 11th February 2013=0A>>>>> =0A>>>>>I'm in favor of reusing=0A       =
                                       the JWT work that this WG=0A        =
                                      is also doing. :-)=0A>>>>>=0A>>>>>I'm=
 pretty skeptical of us=0A                                              inv=
enting another custom=0A                                              schem=
e for signing HTTP=0A                                              headers.=
=C2=A0 That was the=0A                                              impedim=
ent to OAuth 1.0=0A                                              adoption t=
hat OAuth 2.0=0A                                              solved in the=
 first place.=0A>>>>>=0A>>>>>=C2=A0=C2=A0=C2=A0 =C2=A0=C2=A0=C2=A0 =C2=A0=
=C2=A0=C2=A0 =C2=A0=C2=A0=C2=A0 -- Mike=0A>>>>>=0A>>>>>-----Original Messag=
e-----=0A>>>>>From: oauth-bounces@ietf.org [mailto:oauth-bounces@ietf.org] =
On Behalf Of Justin Richer=0A>>>>>Sent: Tuesday, February=0A               =
                               12, 2013 9:35 AM=0A>>>>>To: Phil Hunt=0A>>>>=
>Cc: IETF oauth WG=0A>>>>>Subject: Re: [OAUTH-WG]=0A                       =
                       Minutes from the OAuth=0A                           =
                   Design Team Conference=0A                               =
               Call - 11th February 2013=0A>>>>>=0A>>>>>That's my reading o=
f it as=0A                                              well, Phil, thanks =
for=0A                                              providing the=0A       =
                                       clarification. One=0A               =
                               motivator behind using a=0A                 =
                             JSON-based token is to be=0A                  =
                            able to re-use some of the=0A                  =
                            great work that the JOSE=0A                    =
                          group is doing but apply=0A                      =
                        it to an HTTP payload.=0A>>>>>=0A>>>>>What neither =
of us want is=0A                                              a token type =
that requires=0A                                              stuffing all =
query,=0A                                              header, and other=0A=
                                              parameters *into* the JSON=0A=
                                              object itself, which would=0A=
                                              be a more SOAPy approach.=0A>=
>>>>=0A>>>>>=C2=A0 -- Justin=0A>>>>>=0A>>>>>On 02/12/2013 12:30 PM,=0A     =
                                         Phil Hunt wrote:=0A>>>>>> Clarific=
ation.=C2=A0 I=0A                                              think Justin=
 and I were in=0A                                              agreement th=
at we don't=0A                                              want to see a f=
ormat that=0A                                              requires JSON pa=
yloads.=C2=A0=0A                                              We are both i=
nterested in=0A                                              a JSON token u=
sed in the=0A                                              authorization he=
ader that=0A                                              could be based on=
 a=0A                                              computed signature of so=
me=0A                                              combination of http=0A  =
                                            headers and body if=0A         =
                                     possible.=0A>>>>>>=0A>>>>>> Phil=0A>>>=
>>>=0A>>>>>> @independentid=0A>>>>>> www.independentid.com=0A>>>>>> phil.hu=
nt@oracle.com=0A>>>>>>=0A>>>>>>=0A>>>>>>=0A>>>>>>=0A>>>>>>=0A>>>>>> On 2013=
-02-12, at=0A                                              1:10 AM, Hannes =
Tschofenig=0A                                              wrote:=0A>>>>>>=
=0A>>>>>>> Here are my=0A                                              note=
s.=0A>>>>>>>=0A>>>>>>> Participants:=0A>>>>>>>=0A>>>>>>> * John Bradley=0A>=
>>>>>> * Derek Atkins=0A>>>>>>> * Phil Hunt=0A>>>>>>> * Prateek Mishra=0A>>=
>>>>> * Hannes=0A                                              Tschofenig=
=0A>>>>>>> * Mike Jones=0A>>>>>>> * Antonio Sanso=0A>>>>>>> * Justin Richer=
=0A>>>>>>>=0A>>>>>>> Notes:=0A>>>>>>>=0A>>>>>>> My slides are=0A           =
                                   available here: =0A>>>>>>> http://www.ts=
chofenig.priv.at/OAuth2-Security-11Feb2013.ppt=0A>>>>>>>=0A>>>>>>> Slide #2=
=0A                                              summarizes earlier=0A     =
                                         discussions during the=0A         =
                                     conference calls.=0A>>>>>>>=0A>>>>>>> =
-- HTTP vs. JSON=0A>>>>>>>=0A>>>>>>> Phil noted that=0A                    =
                          he does not like to use=0A                       =
                       the MAC Token draft as a=0A                         =
                     starting point because it=0A                          =
                    does not re-use any of the=0A                          =
                    work done in the JOSE=0A                               =
               working group and in=0A                                     =
         particular all the=0A                                             =
 libraries that are=0A                                              availab=
le today. He=0A                                              mentioned that=
 earlier=0A                                              attempts to write =
the MAC=0A                                              Token code lead to=
=0A                                              problems for implementers.=
=0A>>>>>>>=0A>>>>>>> Justin responded=0A                                   =
           that he does not agree=0A                                       =
       with using JSON as a=0A                                             =
 transport mechanism since=0A                                              =
this would replicate a=0A                                              SOAP=
 style.=0A>>>>>>>=0A>>>>>>> Phil noted that=0A                             =
                 he wants to send JSON but=0A                              =
                the signature shall be=0A                                  =
            computed over the HTTP=0A                                      =
        header field.=0A>>>>>>>=0A>>>>>>> -- Flexibility=0A                =
                              for the keyed message=0A                     =
                         digest computation=0A>>>>>>>=0A>>>>>>>=C2=A0 From =
earlier=0A                                              discussion it was c=
lear=0A                                              that the conference ca=
ll=0A                                              participants wanted more=
=0A                                              flexibility regarding the=
=0A                                              keyed message digest=0A   =
                                           computation. For this=0A        =
                                      purpose Hannes presented=0A          =
                                    the DKIM based approach,=0A            =
                                  which allows selective=0A                =
                              header fields to be=0A                       =
                       included in the digest.=0A                          =
                    This is shown in slide #4.=0A>>>>>>>=0A>>>>>>> After so=
me=0A                                              discussion the conferenc=
e=0A                                              call participants thought=
=0A                                              that this would meet their=
=0A                                              needs. Further=0A         =
                                     investigations would still=0A         =
                                     be useful to determine the=0A         =
                                     degree of failed HMAC=0A              =
                                calculations due to HTTP=0A                =
                              proxies modifying the=0A                     =
                         content.=0A>>>>>>>=0A>>>>>>> -- Key=0A            =
                                  Distribution=0A>>>>>>>=0A>>>>>>> Hannes p=
resented=0A                                              the open issue reg=
arding=0A                                              the choice of key =
=0A>>>>>>> distribution.=0A                                              Sl=
ides #6-#8 present three=0A                                              te=
chniques and Hannes=0A                                              asked =
=0A>>>>>>> for feedback=0A                                              reg=
arding the preferred=0A                                              style.=
 Justin and others=0A                                              didn't =
=0A>>>>>>> see the need to=0A                                              =
decide on one mechanism -=0A                                              t=
hey wanted to keep the =0A>>>>>>> choice open.=0A                          =
                    Derek indicated that this=0A                           =
                   will not be an acceptable =0A>>>>>>> approach. Since=0A =
                                             the resource server and=0A    =
                                          the authorization server=0A      =
                                        may, =0A>>>>>>> in the OAuth 2.0=0A=
                                              framework, be entities=0A    =
                                          produced by different=0A         =
                                     vendors =0A>>>>>>> there is an=0A     =
                                         interoperability need.=0A         =
                                     Justin responded that he=0A           =
                                   disagrees =0A>>>>>>> and that the=0A    =
                                          resource server needs to=0A      =
                                        understand the access=0A           =
                                   token and =0A>>>>>>> referred to the=0A =
                                             recent draft submission=0A    =
                                          for the token=0A                 =
                             introspection =0A>>>>>>> endpoint. Derek=0A   =
                                           indicated that the=0A           =
                                   resource server has to=0A               =
                               understand =0A>>>>>>> the content of=0A     =
                                         the access token and the=0A       =
                                       token introspection=0A              =
                                endpoint =0A>>>>>>> just pushes the=0A     =
                                         problem around: the=0A            =
                                  resource server has to=0A                =
                              send the =0A>>>>>>> access token to=0A       =
                                       the authorization server=0A         =
                                     and then the resource=0A              =
                                server =0A>>>>>>> gets the result=0A       =
                                       back (which he the=0A>>>>>n=0A>>>>>>=
=C2=A0 =C2=A0 a=0A>>>>>>> gain needs to=0A                                 =
             understand) in order to=0A                                    =
          make a meaningful=0A                                             =
 authorization decision.=0A>>>>>>>=0A>>>>>>> Everyone agreed=0A            =
                                  that the client must=0A                  =
                            receive the session key=0A                     =
                         from the authorization=0A                         =
                     server and that this=0A                               =
               approach has to be=0A                                       =
       standardized. It was also=0A                                        =
      agreed that this is a=0A                                             =
 common approach among all=0A                                              =
three key distribution=0A                                              mech=
anisms.=0A>>>>>>>=0A>>>>>>> Hannes asked the=0A                            =
                  participants to think=0A                                 =
             about their preference.=0A>>>>>>>=0A>>>>>>> The questions=0A  =
                                            regarding key naming and=0A    =
                                          the indication for the=0A        =
                                      intended resource server=0A          =
                                    the client wants to talk=0A            =
                                  to have been postponed.=0A>>>>>>>=0A>>>>>=
>> Ciao=0A>>>>>>> Hannes=0A>>>>>>>=0A>>>>>>>=0A>>>>>>>=0A                  =
                            _______________________________________________=
=0A>>>>>>> OAuth mailing=0A                                              li=
st=0A>>>>>>> OAuth@ietf.org=0A>>>>>>> https://www.ietf.org/mailman/listinfo=
/oauth=0A>>>>>>=0A                                              ___________=
____________________________________=0A>>>>>> OAuth mailing list=0A>>>>>> O=
Auth@ietf.org=0A>>>>>> https://www.ietf.org/mailman/listinfo/oauth=0A>>>>>=
=0A>>>>>=0A>>>>>_______________________________________________=0A>>>>>OAut=
h mailing list=0A>>>>>OAuth@ietf.org=0A>>>>>https://www.ietf.org/mailman/li=
stinfo/oauth=0A>>>>>_______________________________________________=0A>>>>>=
OAuth mailing list=0A>>>>>OAuth@ietf.org=0A>>>>>https://www.ietf.org/mailma=
n/listinfo/oauth=0A>>>>>=0A>>>>>=0A>>>>>=0A>>>>____________________________=
___________________=0A>>>>>OAuth mailing list=0A>>>>>OAuth@ietf.org=0A>>>>>=
https://www.ietf.org/mailman/listinfo/oauth=0A>>>>>=0A>>>>=0A>>>>=0A>>>=0A>=
>>=0A>>>_______________________________________________=0A>>>OAuth mailing =
list=0A>>>OAuth@ietf.org=0A>>>https://www.ietf.org/mailman/listinfo/oauth=
=0A>>>=0A>>>=0A>>=0A>>=0A>>=0A>>___________________________________________=
____=0AOAuth mailing list OAuth@ietf.org https://www.ietf.org/mailman/listi=
nfo/oauth =0A>=0A>=0A>=0A_______________________________________________=0A=
>OAuth mailing list=0A>OAuth@ietf.org=0A>https://www.ietf.org/mailman/listi=
nfo/oauth=0A>
---551393103-308099663-1360994570=:11377
Content-Type: text/html; charset=utf-8
Content-Transfer-Encoding: quoted-printable

<html><body><div style=3D"color:#000; background-color:#fff; font-family:Co=
urier New, courier, monaco, monospace, sans-serif;font-size:12pt"><div>All =
the same concepts/info are available in the AS: client ID, client auth, and=
 can deliver both token and secret. &nbsp;What's magic once the client has =
the token that's missing?</div><div><br></div>  <div style=3D"font-family: =
'Courier New', courier, monaco, monospace, sans-serif; font-size: 12pt;"> <=
div style=3D"font-family: 'times new roman', 'new york', times, serif; font=
-size: 12pt;"> <div dir=3D"ltr"> <font size=3D"2" face=3D"Arial"> <hr size=
=3D"1">  <b><span style=3D"font-weight:bold;">From:</span></b> Phil Hunt &l=
t;phil.hunt@oracle.com&gt;<br> <b><span style=3D"font-weight: bold;">To:</s=
pan></b> William Mills &lt;wmills_92105@yahoo.com&gt; <br><b><span style=3D=
"font-weight: bold;">Cc:</span></b> Justin Richer &lt;jricher@mitre.org&gt;=
; Tim Bray &lt;twbray@google.com&gt;; IETF oauth WG &lt;oauth@ietf.org&gt; =
<br> <b><span
 style=3D"font-weight: bold;">Sent:</span></b> Friday, February 15, 2013 1:=
52 PM<br> <b><span style=3D"font-weight: bold;">Subject:</span></b> Re: [OA=
UTH-WG] Minutes from the OAuth Design Team Conference Call - 11th February =
2013<br> </font> </div> <br><div id=3D"yiv821183122"><div><div>Sorry. I hav=
e to disagree. The way 1.0 is written, it is not a shortcut to turn it into=
 a token for 2.&nbsp;<br><br>Phil<div><br></div><div>Sent from my phone.</d=
iv></div><div><br>On 2013-02-15, at 13:04, William Mills &lt;<a rel=3D"nofo=
llow" ymailto=3D"mailto:wmills_92105@yahoo.com" target=3D"_blank" href=3D"m=
ailto:wmills_92105@yahoo.com">wmills_92105@yahoo.com</a>&gt; wrote:<br><br>=
</div><blockquote type=3D"cite"><div><div style=3D"color: rgb(0, 0, 0); bac=
kground-color: rgb(255, 255, 255); font-family: 'Courier New', courier, mon=
aco, monospace, sans-serif; font-size: 12pt;"><div><span><span style=3D"fon=
t-family: 'times new roman', 'new york', times, serif;">&gt;I've brought it=
 up before,
 but I think it might be worthwhile, at least as an exercise, to define a m=
ethod to get OAuth1-style tokens from an OAuth2 token endpoint. You'd defer=
 to OAuth1 for how to use them &gt;with a protected resource.</span><br sty=
le=3D"font-family: 'times new roman', 'new york', times, serif;"></span></d=
iv><div><br></div><div style=3D"color: rgb(0, 0, 0); font-size: 16px; font-=
family: 'Courier New', courier, monaco, monospace, sans-serif; background-c=
olor: transparent; font-style: normal;">YES!</div><div style=3D"color: rgb(=
0, 0, 0); font-size: 16px; font-family: 'Courier New', courier, monaco, mon=
ospace, sans-serif; background-color: transparent; font-style: normal;"><br=
></div>  <div style=3D"font-family:'Courier=0A New', courier, monaco, monos=
pace, sans-serif;font-size:12pt;"> <div style=3D"font-family: 'times new ro=
man', 'new york', times, serif; font-size: 12pt;"> <div dir=3D"ltr"> <font =
size=3D"2" face=3D"Arial"> <hr size=3D"1">  <b><span style=3D"font-weight:b=
old;">From:</span></b> Justin Richer &lt;<a rel=3D"nofollow" ymailto=3D"mai=
lto:jricher@mitre.org" target=3D"_blank" href=3D"mailto:jricher@mitre.org">=
jricher@mitre.org</a>&gt;<br> <b><span style=3D"font-weight:bold;">To:</spa=
n></b> Tim Bray &lt;<a rel=3D"nofollow" ymailto=3D"mailto:twbray@google.com=
" target=3D"_blank" href=3D"mailto:twbray@google.com">twbray@google.com</a>=
&gt; <br><b><span style=3D"font-weight:bold;">Cc:</span></b> William Mills =
&lt;<a rel=3D"nofollow" ymailto=3D"mailto:wmills_92105@yahoo.com" target=3D=
"_blank" href=3D"mailto:wmills_92105@yahoo.com">wmills_92105@yahoo.com</a>&=
gt;; IETF oauth WG &lt;<a rel=3D"nofollow" ymailto=3D"mailto:oauth@ietf.org=
" target=3D"_blank" href=3D"mailto:oauth@ietf.org">oauth@ietf.org</a>&gt; <=
br> <b><span
 style=3D"font-weight:bold;">Sent:</span></b> Friday, February 15, 2013 12:=
54 PM<br> <b><span style=3D"font-weight:bold;">Subject:</span></b> Re: [OAU=
TH-WG] Minutes from the OAuth Design Team Conference Call - 11th February 2=
013<br> </font> </div> <br><div id=3D"yiv821183122">=0A  =0A=0A    =0A  =0A=
  <div>=0A    So that you can fetch and manage all your tokens using the sa=
me code=0A    paths as the OAuth2 services. The "get a token" part will be=
=0A    identical to Oauth2 Bearer (except for some details of what comes=0A=
    back from the token endpoint, of course), it's the "use a token" bit=0A=
    that really changes and is up in the air. You get to use scopes, and=0A=
    state, and refresh tokens, and all the other good stuff.<br>=0A    <br>=
=0A    I've brought it up before, but I think it might be worthwhile, at=0A=
    least as an exercise, to define a method to get OAuth1-style tokens=0A =
   from an OAuth2 token endpoint. You'd defer to OAuth1 for how to use=0A  =
  them with a protected resource.<br>=0A    <br>=0A    &nbsp;-- Justin<br>=
=0A    <br>=0A    <div class=3D"yiv821183122moz-cite-prefix">On 02/15/2013 =
11:49 AM, Tim Bray wrote:<br>=0A    </div>=0A    <blockquote type=3D"cite">=
=0A      =0A      Not deeply acquainted with the Flickr scenario, but it oc=
curs to=0A      me to ask: If OAuth 1.0 is working well for them, why don=
=E2=80=99t they=0A      just keep using it? &nbsp;I.e. if there=E2=80=99s a=
lready a good solution in=0A      place for people who require secure authn=
/authz over insecure=0A      channels, why would we go the extra work of du=
plicating that in=0A      OAuth 2 territory? -T<br>=0A      <br>=0A      <d=
iv class=3D"yiv821183122gmail_quote">On Fri, Feb 15, 2013 at 8:09 AM, Willi=
am=0A        Mills <span dir=3D"ltr">&lt;<a rel=3D"nofollow" ymailto=3D"mai=
lto:wmills_92105@yahoo.com" target=3D"_blank" href=3D"mailto:wmills_92105@y=
ahoo.com">wmills_92105@yahoo.com</a>&gt;</span>=0A        wrote:<br>=0A    =
    <blockquote class=3D"yiv821183122gmail_quote" style=3D"margin:0 0 0 .8e=
x;border-left:1px #ccc solid;padding-left:1ex;">=0A          <div>=0A      =
      <div style=3D"font-size: 12pt; font-family: 'Courier New', courier, m=
onaco, monospace, sans-serif;">=0A              <div><span>I'll repeat the =
use case for Flickr, which=0A                  requires OAuth 1.0a type cap=
abilites that OAuth 2 does=0A                  not provide. &nbsp;Simply st=
ating "move to HTTPS" is not a=0A                  viable response here. &n=
bsp;</span></div>=0A              <div><br>=0A              </div>=0A      =
        <div style=3D"font-family:'Courier=0A                New', courier,=
 monaco, monospace, sans-serif;font-size:12pt;">=0A                <div sty=
le=3D"font-family:'times new roman', 'new=0A                  york', times,=
 serif;font-size:12pt;">=0A                  <div dir=3D"ltr"> <font face=
=3D"Arial">=0A                      <hr size=3D"1"> <b><span style=3D"font-=
weight:bold;">From:</span></b>=0A                      Torsten Lodderstedt =
&lt;<a rel=3D"nofollow" ymailto=3D"mailto:torsten@lodderstedt.net" target=
=3D"_blank" href=3D"mailto:torsten@lodderstedt.net">torsten@lodderstedt.net=
</a>&gt;<br>=0A                      <b><span style=3D"font-weight:bold;">T=
o:</span></b>=0A                      William Mills &lt;<a rel=3D"nofollow"=
 ymailto=3D"mailto:wmills_92105@yahoo.com" target=3D"_blank" href=3D"mailto=
:wmills_92105@yahoo.com">wmills_92105@yahoo.com</a>&gt; <br>=0A            =
          <b><span style=3D"font-weight:bold;">Cc:</span></b>=0A           =
           Mike Jones &lt;<a rel=3D"nofollow" ymailto=3D"mailto:Michael.Jon=
es@microsoft.com" target=3D"_blank" href=3D"mailto:Michael.Jones@microsoft.=
com">Michael.Jones@microsoft.com</a>&gt;;=0A                      Justin Ri=
cher &lt;<a rel=3D"nofollow" ymailto=3D"mailto:jricher@mitre.org" target=3D=
"_blank" href=3D"mailto:jricher@mitre.org">jricher@mitre.org</a>&gt;;=0A   =
                   Phil Hunt &lt;<a rel=3D"nofollow" ymailto=3D"mailto:phil=
.hunt@oracle.com" target=3D"_blank" href=3D"mailto:phil.hunt@oracle.com">ph=
il.hunt@oracle.com</a>&gt;;=0A                      IETF oauth WG &lt;<a re=
l=3D"nofollow" ymailto=3D"mailto:oauth@ietf.org" target=3D"_blank" href=3D"=
mailto:oauth@ietf.org">oauth@ietf.org</a>&gt;=0A                      <br>=
=0A                      <b><span style=3D"font-weight:bold;">Sent:</span><=
/b>=0A                      Friday, February 15, 2013 7:22 AM<br>=0A       =
               <b><span style=3D"font-weight:bold;">Subject:</span></b>=0A =
                     Re: [OAUTH-WG] Minutes from the OAuth Design Team=0A  =
                    Conference Call - 11th February 2013<br>=0A            =
        </font> </div>=0A                  <br>=0A                  <div>=
=0A                    <div>=0A                      <div>Hi Bill,</div>=0A=
                      <div><br>=0A                      </div>=0A          =
            <div>I think one needs to compare the costs/impact=0A          =
              of HTTPS on one side and the implementation of=0A            =
            integrity protection and replay detection on the=0A            =
            other. We had this discussion several times.</div>=0A          =
            <div><br>=0A                      </div>=0A                    =
  <div>regards,</div>=0A                      <div>Torsten.</div>=0A       =
               <div><br>=0A                        Am 15.02.2013 um 08:08 s=
chrieb William Mills=0A                        &lt;<a rel=3D"nofollow" ymai=
lto=3D"mailto:wmills_92105@yahoo.com" target=3D"_blank" href=3D"mailto:wmil=
ls_92105@yahoo.com">wmills_92105@yahoo.com</a>&gt;:<br>=0A                 =
       <br>=0A                      </div>=0A                      <blockqu=
ote type=3D"cite">=0A                        <div>=0A                      =
    <div style=3D"font-size:12pt;font-family:'Courier=0A                   =
         New', courier, monaco, monospace, sans-serif;">=0A                =
            <div><span>I fundamentally disagree with=0A                    =
            that too. &nbsp;OAuth 2 is the *framework*,=0A                 =
               one which supports multiple token types.=0A                 =
               &nbsp;Bearer tokens were the first credential=0A            =
                    type defined.</span></div>=0A                          =
  <div style=3D"font-style:normal;font-size:16px;background-color:transpare=
nt;font-family:'Courier=0A                              New', courier, mona=
co, monospace, sans-serif;"><span><br>=0A                              </sp=
an></div>=0A                            <div style=3D"font-style:normal;fon=
t-size:16px;background-color:transparent;font-family:'Courier=0A           =
                   New', courier, monaco, monospace, sans-serif;">=0A      =
                        <span>OAuth 1.0a also requires HTTPS=0A            =
                    transport for authentication and getting=0A            =
                    the token.</span></div>=0A                            <=
div style=3D"font-style:normal;font-size:16px;background-color:transparent;=
font-family:'Courier=0A                              New', courier, monaco,=
 monospace, sans-serif;">=0A                              <span><br>=0A    =
                          </span></div>=0A                            <div =
style=3D"font-style:normal;font-size:16px;background-color:transparent;font=
-family:'Courier=0A                              New', courier, monaco, mon=
ospace, sans-serif;"><span>There=0A                                are &nbs=
p;real use cases for tokens usable=0A                                over p=
lain text with integrity=0A                                protection.</spa=
n></div>=0A                            <div style=3D"font-style:normal;font=
-size:16px;background-color:transparent;font-family:'Courier=0A            =
                  New', courier, monaco, monospace, sans-serif;"><span><br>=
=0A                              </span></div>=0A                          =
  <div style=3D"font-style:normal;font-size:16px;background-color:transpare=
nt;font-family:'Courier=0A                              New', courier, mona=
co, monospace, sans-serif;">=0A                              <span>-bill</s=
pan></div>=0A                            <div><br>=0A                      =
      </div>=0A                            <div style=3D"font-family:'Couri=
er=0A                              New', courier, monaco, monospace, sans-s=
erif;font-size:12pt;">=0A                              <div style=3D"font-f=
amily:'times new=0A                                roman', 'new=0A         =
                       york', times, serif;font-size:12pt;">=0A            =
                    <div dir=3D"ltr"> <font face=3D"Arial">=0A             =
                       <hr size=3D"1"> <b><span style=3D"font-weight:bold;"=
>From:</span></b>=0A                                    Torsten Lodderstedt=
 &lt;<a rel=3D"nofollow" ymailto=3D"mailto:torsten@lodderstedt.net" target=
=3D"_blank" href=3D"mailto:torsten@lodderstedt.net">torsten@lodderstedt.net=
</a>&gt;<br>=0A                                    <b><span style=3D"font-w=
eight:bold;">To:</span></b>=0A                                    William M=
ills &lt;<a rel=3D"nofollow" ymailto=3D"mailto:wmills_92105@yahoo.com" targ=
et=3D"_blank" href=3D"mailto:wmills_92105@yahoo.com">wmills_92105@yahoo.com=
</a>&gt;=0A                                    <br>=0A                     =
               <b><span style=3D"font-weight:bold;">Cc:</span></b>=0A      =
                              Mike Jones &lt;<a rel=3D"nofollow" ymailto=3D=
"mailto:Michael.Jones@microsoft.com" target=3D"_blank" href=3D"mailto:Micha=
el.Jones@microsoft.com">Michael.Jones@microsoft.com</a>&gt;;=0A            =
                        Justin Richer &lt;<a rel=3D"nofollow" ymailto=3D"ma=
ilto:jricher@mitre.org" target=3D"_blank" href=3D"mailto:jricher@mitre.org"=
>jricher@mitre.org</a>&gt;;=0A                                    Phil Hunt=
 &lt;<a rel=3D"nofollow" ymailto=3D"mailto:phil.hunt@oracle.com" target=3D"=
_blank" href=3D"mailto:phil.hunt@oracle.com">phil.hunt@oracle.com</a>&gt;;=
=0A                                    IETF oauth WG &lt;<a rel=3D"nofollow=
" ymailto=3D"mailto:oauth@ietf.org" target=3D"_blank" href=3D"mailto:oauth@=
ietf.org">oauth@ietf.org</a>&gt;=0A                                    <br>=
=0A                                    <b><span style=3D"font-weight:bold;"=
>Sent:</span></b>=0A                                    Thursday, February =
14, 2013 10:05 PM<br>=0A                                    <b><span style=
=3D"font-weight:bold;">Subject:</span></b>=0A                              =
      Re: [OAUTH-WG] Minutes from the=0A                                   =
 OAuth Design Team Conference Call -=0A                                    =
11th February 2013<br>=0A                                  </font> </div>=
=0A                                <br>=0A                                <=
div>=0A                                  <div>=0A                          =
          <div>Hi Bill,</div>=0A                                    <div><b=
r>=0A                                    </div>=0A                         =
           <div>OAuth 2.0 took a different=0A                              =
        direction by relying on HTTPS to=0A                                =
      provide the basic protection. So=0A                                  =
    the need to have a token, which=0A                                     =
 can be used for service requests=0A                                      o=
ver plain HTTP is arguable. My=0A                                      unde=
rstanding of this activity=0A                                      was, the=
 intend is to provide=0A                                      additional pr=
otection on top of=0A                                      HTTPS.</div>=0A =
                                   <div><br>=0A                            =
        </div>=0A                                    <div>regards,</div>=0A=
                                    <div>Torsten.</div>=0A                 =
                   <div><br>=0A                                      Am 15.=
02.2013 um 02:31 schrieb=0A                                      William Mi=
lls &lt;<a rel=3D"nofollow" ymailto=3D"mailto:wmills_92105@yahoo.com" targe=
t=3D"_blank" href=3D"mailto:wmills_92105@yahoo.com">wmills_92105@yahoo.com<=
/a>&gt;:<br>=0A                                      <br>=0A               =
                     </div>=0A                                    <blockquo=
te type=3D"cite">=0A                                      <div>=0A         =
                               <div style=3D"font-size:12pt;font-family:'Co=
urier=0ANew', courier, monaco, monospace, sans-serif;">=0A                 =
                         <div><span>I disagree with "</span><span style=3D"=
font-family:'times=0A                                              new roma=
n', 'new=0A                                              york', times, seri=
f;font-size:12pt;">That=0A                                              was=
 the impediment to=0A                                              OAuth 1.=
0 adoption that=0A                                              OAuth 2.0 s=
olved in the=0A                                              first place.",=
 unless=0A                                              "solving" means doe=
s not=0A                                              address the need for =
it at=0A                                              all.</span></div>=0A =
                                         <div style=3D"font-style:normal;fo=
nt-size:12pt;background-color:transparent;font-family:'times=0A            =
                                new roman', 'new=0A                        =
                    york', times, serif;">=0A                              =
              <span style=3D"font-family:'times=0A                         =
                     new roman', 'new=0A                                   =
           york', times, serif;font-size:12pt;"><br>=0A                    =
                        </span></div>=0A                                   =
       <div style=3D"font-style:normal;font-size:16px;background-color:tran=
sparent;font-family:'times=0A                                            ne=
w roman', 'new=0A                                            york', times, =
serif;">=0A                                            <span style=3D"font-=
family:'times=0A                                              new roman', '=
new=0A                                              york', times, serif;fon=
t-size:12pt;">OAuth=0A                                              2 does =
several good=0A                                              things, but it=
 still lacks=0A                                              a defined toke=
n type that=0A                                              is safe to user=
 over plain=0A                                              text HTTP. &nbs=
p;1.0a solved=0A                                              that.</span><=
/div>=0A                                          <div><br>=0A             =
                             </div>=0A                                     =
     <div style=3D"font-family:'Courier=0ANew', courier, monaco, monospace,=
 sans-serif;font-size:12pt;">=0A                                           =
 <div style=3D"font-family:'times=0A                                       =
       new roman', 'new=0A                                              yor=
k', times, serif;font-size:12pt;">=0A                                      =
        <div dir=3D"ltr"> <font face=3D"Arial">=0A                         =
                         <hr size=3D"1"> <b><span style=3D"font-weight:bold=
;">From:</span></b> Mike Jones &lt;<a rel=3D"nofollow" ymailto=3D"mailto:Mi=
chael.Jones@microsoft.com" target=3D"_blank" href=3D"mailto:Michael.Jones@m=
icrosoft.com">Michael.Jones@microsoft.com</a>&gt;<br>=0A                   =
                               <b><span style=3D"font-weight:bold;">To:</sp=
an></b>=0A                                                  Justin Richer &=
lt;<a rel=3D"nofollow" ymailto=3D"mailto:jricher@mitre.org" target=3D"_blan=
k" href=3D"mailto:jricher@mitre.org">jricher@mitre.org</a>&gt;;=0A         =
                                         Phil Hunt &lt;<a rel=3D"nofollow" =
ymailto=3D"mailto:phil.hunt@oracle.com" target=3D"_blank" href=3D"mailto:ph=
il.hunt@oracle.com">phil.hunt@oracle.com</a>&gt;=0A                        =
                          <br>=0A                                          =
        <b><span style=3D"font-weight:bold;">Cc:</span></b>=0A             =
                                     IETF oauth WG &lt;<a rel=3D"nofollow" =
ymailto=3D"mailto:oauth@ietf.org" target=3D"_blank" href=3D"mailto:oauth@ie=
tf.org">oauth@ietf.org</a>&gt;=0A                                          =
        <br>=0A                                                  <b><span s=
tyle=3D"font-weight:bold;">Sent:</span></b>=0A                             =
                     Thursday, February 14,=0A                             =
                     2013 1:44 PM<br>=0A                                   =
               <b><span style=3D"font-weight:bold;">Subject:</span></b>=0A =
                                                 Re: [OAUTH-WG] Minutes=0A =
                                                 from the OAuth Design=0A  =
                                                Team Conference Call -=0A  =
                                                11th February 2013<br>=0A  =
                                              </font> </div>=0A            =
                                  <br>=0A                                  =
            I'm in favor of reusing=0A                                     =
         the JWT work that this WG=0A                                      =
        is also doing. :-)<br>=0A                                          =
    <br>=0A                                              I'm pretty skeptic=
al of us=0A                                              inventing another =
custom=0A                                              scheme for signing H=
TTP=0A                                              headers.&nbsp; That was=
 the=0A                                              impediment to OAuth 1.=
0=0A                                              adoption that OAuth 2.0=
=0A                                              solved in the first place.=
<br>=0A                                              <br>=0A               =
                               &nbsp;&nbsp;&nbsp; &nbsp;&nbsp;&nbsp; &nbsp;=
&nbsp;&nbsp; &nbsp;&nbsp;&nbsp; -- Mike<br>=0A                             =
                 <br>=0A                                              -----=
Original Message-----<br>=0A                                              F=
rom: <a rel=3D"nofollow" ymailto=3D"mailto:oauth-bounces@ietf.org" target=
=3D"_blank" href=3D"mailto:oauth-bounces@ietf.org">oauth-bounces@ietf.org</=
a>=0A                                              [mailto:<a rel=3D"nofoll=
ow" ymailto=3D"mailto:oauth-bounces@ietf.org" target=3D"_blank" href=3D"mai=
lto:oauth-bounces@ietf.org">oauth-bounces@ietf.org</a>]=0A                 =
                             On Behalf Of Justin Richer<br>=0A             =
                                 Sent: Tuesday, February=0A                =
                              12, 2013 9:35 AM<br>=0A                      =
                        To: Phil Hunt<br>=0A                               =
               Cc: IETF oauth WG<br>=0A                                    =
          Subject: Re: [OAUTH-WG]=0A                                       =
       Minutes from the OAuth=0A                                           =
   Design Team Conference=0A                                              C=
all - 11th February 2013<br>=0A                                            =
  <br>=0A                                              That's my reading of=
 it as=0A                                              well, Phil, thanks f=
or=0A                                              providing the=0A        =
                                      clarification. One=0A                =
                              motivator behind using a=0A                  =
                            JSON-based token is to be=0A                   =
                           able to re-use some of the=0A                   =
                           great work that the JOSE=0A                     =
                         group is doing but apply=0A                       =
                       it to an HTTP payload.<br>=0A                       =
                       <br>=0A                                             =
 What neither of us want is=0A                                             =
 a token type that requires=0A                                             =
 stuffing all query,=0A                                              header=
, and other=0A                                              parameters *int=
o* the JSON=0A                                              object itself, =
which would=0A                                              be a more SOAPy=
 approach.<br>=0A                                              <br>=0A     =
                                         &nbsp; -- Justin<br>=0A           =
                                   <br>=0A                                 =
             On 02/12/2013 12:30 PM,=0A                                    =
          Phil Hunt wrote:<br>=0A                                          =
    &gt; Clarification.&nbsp; I=0A                                         =
     think Justin and I were in=0A                                         =
     agreement that we don't=0A                                            =
  want to see a format that=0A                                             =
 requires JSON payloads.&nbsp;=0A                                          =
    We are both interested in=0A                                           =
   a JSON token used in the=0A                                             =
 authorization header that=0A                                              =
could be based on a=0A                                              compute=
d signature of some=0A                                              combina=
tion of http=0A                                              headers and bo=
dy if=0A                                              possible.<br>=0A     =
                                         &gt;<br>=0A                       =
                       &gt; Phil<br>=0A                                    =
          &gt;<br>=0A                                              &gt; @in=
dependentid<br>=0A                                              &gt; <a rel=
=3D"nofollow" target=3D"_blank" href=3D"http://www.independentid.com/">www.=
independentid.com</a><br>=0A                                              &=
gt; <a rel=3D"nofollow" ymailto=3D"mailto:phil.hunt@oracle.com" target=3D"_=
blank" href=3D"mailto:phil.hunt@oracle.com">phil.hunt@oracle.com</a><br>=0A=
                                              &gt;<br>=0A                  =
                            &gt;<br>=0A                                    =
          &gt;<br>=0A                                              &gt;<br>=
=0A                                              &gt;<br>=0A               =
                               &gt; On 2013-02-12, at=0A                   =
                           1:10 AM, Hannes Tschofenig=0A                   =
                           wrote:<br>=0A                                   =
           &gt;<br>=0A                                              &gt;&gt=
; Here are my=0A                                              notes.<br>=0A=
                                              &gt;&gt;<br>=0A              =
                                &gt;&gt; Participants:<br>=0A              =
                                &gt;&gt;<br>=0A                            =
                  &gt;&gt; * John Bradley<br>=0A                           =
                   &gt;&gt; * Derek Atkins<br>=0A                          =
                    &gt;&gt; * Phil Hunt<br>=0A                            =
                  &gt;&gt; * Prateek Mishra<br>=0A                         =
                     &gt;&gt; * Hannes=0A                                  =
            Tschofenig<br>=0A                                              =
&gt;&gt; * Mike Jones<br>=0A                                              &=
gt;&gt; * Antonio Sanso<br>=0A                                             =
 &gt;&gt; * Justin Richer<br>=0A                                           =
   &gt;&gt;<br>=0A                                              &gt;&gt; No=
tes:<br>=0A                                              &gt;&gt;<br>=0A   =
                                           &gt;&gt; My slides are=0A       =
                                       available here: <br>=0A             =
                                 &gt;&gt; <a rel=3D"nofollow" target=3D"_bl=
ank" href=3D"http://www.tschofenig.priv.at/OAuth2-Security-11Feb2013.ppt">h=
ttp://www.tschofenig.priv.at/OAuth2-Security-11Feb2013.ppt</a><br>=0A      =
                                        &gt;&gt;<br>=0A                    =
                          &gt;&gt; Slide #2=0A                             =
                 summarizes earlier=0A                                     =
         discussions during the=0A                                         =
     conference calls.<br>=0A                                              =
&gt;&gt;<br>=0A                                              &gt;&gt; -- HT=
TP vs. JSON<br>=0A                                              &gt;&gt;<br=
>=0A                                              &gt;&gt; Phil noted that=
=0A                                              he does not like to use=0A=
                                              the MAC Token draft as a=0A  =
                                            starting point because it=0A   =
                                           does not re-use any of the=0A   =
                                           work done in the JOSE=0A        =
                                      working group and in=0A              =
                                particular all the=0A                      =
                        libraries that are=0A                              =
                available today. He=0A                                     =
         mentioned that earlier=0A                                         =
     attempts to write the MAC=0A                                          =
    Token code lead to=0A                                              prob=
lems for implementers.<br>=0A                                              =
&gt;&gt;<br>=0A                                              &gt;&gt; Justi=
n responded=0A                                              that he does no=
t agree=0A                                              with using JSON as =
a=0A                                              transport mechanism since=
=0A                                              this would replicate a=0A =
                                             SOAP style.<br>=0A            =
                                  &gt;&gt;<br>=0A                          =
                    &gt;&gt; Phil noted that=0A                            =
                  he wants to send JSON but=0A                             =
                 the signature shall be=0A                                 =
             computed over the HTTP=0A                                     =
         header field.<br>=0A                                              =
&gt;&gt;<br>=0A                                              &gt;&gt; -- Fl=
exibility=0A                                              for the keyed mes=
sage=0A                                              digest computation<br>=
=0A                                              &gt;&gt;<br>=0A           =
                                   &gt;&gt;&nbsp; From earlier=0A          =
                                    discussion it was clear=0A             =
                                 that the conference call=0A               =
                               participants wanted more=0A                 =
                             flexibility regarding the=0A                  =
                            keyed message digest=0A                        =
                      computation. For this=0A                             =
                 purpose Hannes presented=0A                               =
               the DKIM based approach,=0A                                 =
             which allows selective=0A                                     =
         header fields to be=0A                                            =
  included in the digest.=0A                                              T=
his is shown in slide #4.<br>=0A                                           =
   &gt;&gt;<br>=0A                                              &gt;&gt; Af=
ter some=0A                                              discussion the con=
ference=0A                                              call participants t=
hought=0A                                              that this would meet=
 their=0A                                              needs. Further=0A   =
                                           investigations would still=0A   =
                                           be useful to determine the=0A   =
                                           degree of failed HMAC=0A        =
                                      calculations due to HTTP=0A          =
                                    proxies modifying the=0A               =
                               content.<br>=0A                             =
                 &gt;&gt;<br>=0A                                           =
   &gt;&gt; -- Key=0A                                              Distribu=
tion<br>=0A                                              &gt;&gt;<br>=0A   =
                                           &gt;&gt; Hannes presented=0A    =
                                          the open issue regarding=0A      =
                                        the choice of key <br>=0A          =
                                    &gt;&gt; distribution.=0A              =
                                Slides #6-#8 present three=0A              =
                                techniques and Hannes=0A                   =
                           asked <br>=0A                                   =
           &gt;&gt; for feedback=0A                                        =
      regarding the preferred=0A                                           =
   style. Justin and others=0A                                             =
 didn't <br>=0A                                              &gt;&gt; see t=
he need to=0A                                              decide on one me=
chanism -=0A                                              they wanted to ke=
ep the <br>=0A                                              &gt;&gt; choice=
 open.=0A                                              Derek indicated that=
 this=0A                                              will not be an accept=
able=0A                                              <br>=0A               =
                               &gt;&gt; approach. Since=0A                 =
                             the resource server and=0A                    =
                          the authorization server=0A                      =
                        may, <br>=0A                                       =
       &gt;&gt; in the OAuth 2.0=0A                                        =
      framework, be entities=0A                                            =
  produced by different=0A                                              ven=
dors <br>=0A                                              &gt;&gt; there is=
 an=0A                                              interoperability need.=
=0A                                              Justin responded that he=
=0A                                              disagrees <br>=0A         =
                                     &gt;&gt; and that the=0A              =
                                resource server needs to=0A                =
                              understand the access=0A                     =
                         token and <br>=0A                                 =
             &gt;&gt; referred to the=0A                                   =
           recent draft submission=0A                                      =
        for the token=0A                                              intro=
spection <br>=0A                                              &gt;&gt; endp=
oint. Derek=0A                                              indicated that =
the=0A                                              resource server has to=
=0A                                              understand <br>=0A        =
                                      &gt;&gt; the content of=0A           =
                                   the access token and the=0A             =
                                 token introspection=0A                    =
                          endpoint <br>=0A                                 =
             &gt;&gt; just pushes the=0A                                   =
           problem around: the=0A                                          =
    resource server has to=0A                                              =
send the <br>=0A                                              &gt;&gt; acce=
ss token to=0A                                              the authorizati=
on server=0A                                              and then the reso=
urce=0A                                              server <br>=0A        =
                                      &gt;&gt; gets the result=0A          =
                                    back (which he the<br>=0A              =
                                n<br>=0A                                   =
           &gt;&nbsp; &nbsp; a<br>=0A                                      =
        &gt;&gt; gain needs to=0A                                          =
    understand) in order to=0A                                             =
 make a meaningful=0A                                              authoriz=
ation decision.<br>=0A                                              &gt;&gt=
;<br>=0A                                              &gt;&gt; Everyone agr=
eed=0A                                              that the client must=0A=
                                              receive the session key=0A   =
                                           from the authorization=0A       =
                                       server and that this=0A             =
                                 approach has to be=0A                     =
                         standardized. It was also=0A                      =
                        agreed that this is a=0A                           =
                   common approach among all=0A                            =
                  three key distribution=0A                                =
              mechanisms.<br>=0A                                           =
   &gt;&gt;<br>=0A                                              &gt;&gt; Ha=
nnes asked the=0A                                              participants=
 to think=0A                                              about their prefe=
rence.<br>=0A                                              &gt;&gt;<br>=0A =
                                             &gt;&gt; The questions=0A     =
                                         regarding key naming and=0A       =
                                       the indication for the=0A           =
                                   intended resource server=0A             =
                                 the client wants to talk=0A               =
                               to have been postponed.<br>=0A              =
                                &gt;&gt;<br>=0A                            =
                  &gt;&gt; Ciao<br>=0A                                     =
         &gt;&gt; Hannes<br>=0A                                            =
  &gt;&gt;<br>=0A                                              &gt;&gt;<br>=
=0A                                              &gt;&gt;=0A               =
                               ____________________________________________=
___<br>=0A                                              &gt;&gt; OAuth mail=
ing=0A                                              list<br>=0A            =
                                  &gt;&gt; <a rel=3D"nofollow" ymailto=3D"m=
ailto:OAuth@ietf.org" target=3D"_blank" href=3D"mailto:OAuth@ietf.org">OAut=
h@ietf.org</a><br>=0A                                              &gt;&gt;=
 <a rel=3D"nofollow" target=3D"_blank" href=3D"https://www.ietf.org/mailman=
/listinfo/oauth">https://www.ietf.org/mailman/listinfo/oauth</a><br>=0A    =
                                          &gt;=0A                          =
                    _______________________________________________<br>=0A =
                                             &gt; OAuth mailing list<br>=0A=
                                              &gt; <a rel=3D"nofollow" ymai=
lto=3D"mailto:OAuth@ietf.org" target=3D"_blank" href=3D"mailto:OAuth@ietf.o=
rg">OAuth@ietf.org</a><br>=0A                                              =
&gt; <a rel=3D"nofollow" target=3D"_blank" href=3D"https://www.ietf.org/mai=
lman/listinfo/oauth">https://www.ietf.org/mailman/listinfo/oauth</a><br>=0A=
                                              <br>=0A                      =
                        <br>=0A____________________________________________=
___<br>=0A                                              OAuth mailing list<=
br>=0A                                              <a rel=3D"nofollow" yma=
ilto=3D"mailto:OAuth@ietf.org" target=3D"_blank" href=3D"mailto:OAuth@ietf.=
org">OAuth@ietf.org</a><br>=0A                                             =
 <a rel=3D"nofollow" target=3D"_blank" href=3D"https://www.ietf.org/mailman=
/listinfo/oauth">https://www.ietf.org/mailman/listinfo/oauth</a><br>=0A____=
___________________________________________<br>=0A                         =
                     OAuth mailing list<br>=0A                             =
                 <a rel=3D"nofollow" ymailto=3D"mailto:OAuth@ietf.org" targ=
et=3D"_blank" href=3D"mailto:OAuth@ietf.org">OAuth@ietf.org</a><br>=0A     =
                                         <a rel=3D"nofollow" target=3D"_bla=
nk" href=3D"https://www.ietf.org/mailman/listinfo/oauth">https://www.ietf.o=
rg/mailman/listinfo/oauth</a><br>=0A                                       =
       <br>=0A                                              <br>=0A        =
                                    </div>=0A                              =
            </div>=0A                                        </div>=0A     =
                                 </div>=0A                                 =
   </blockquote>=0A                                    <blockquote type=3D"=
cite">=0A                                      <div><span>_________________=
______________________________</span><br>=0A                               =
         <span>OAuth mailing list</span><br>=0A                            =
            <span><a rel=3D"nofollow" ymailto=3D"mailto:OAuth@ietf.org" tar=
get=3D"_blank" href=3D"mailto:OAuth@ietf.org">OAuth@ietf.org</a></span><br>=
=0A                                        <span><a rel=3D"nofollow" target=
=3D"_blank" href=3D"https://www.ietf.org/mailman/listinfo/oauth">https://ww=
w.ietf.org/mailman/listinfo/oauth</a></span><br>=0A                        =
              </div>=0A                                    </blockquote>=0A=
                                  </div>=0A                                =
</div>=0A                                <br>=0A                           =
     <br>=0A                              </div>=0A                        =
    </div>=0A                          </div>=0A                        </d=
iv>=0A                      </blockquote>=0A                    </div>=0A  =
                </div>=0A                  <br>=0A                  <br>=0A=
                </div>=0A              </div>=0A            </div>=0A      =
    </div>=0A          <br>=0A          ___________________________________=
____________<br>=0A          OAuth mailing list<br>=0A          <a rel=3D"n=
ofollow" ymailto=3D"mailto:OAuth@ietf.org" target=3D"_blank" href=3D"mailto=
:OAuth@ietf.org">OAuth@ietf.org</a><br>=0A          <a rel=3D"nofollow" tar=
get=3D"_blank" href=3D"https://www.ietf.org/mailman/listinfo/oauth">https:/=
/www.ietf.org/mailman/listinfo/oauth</a><br>=0A          <br>=0A        </b=
lockquote>=0A      </div>=0A      <br>=0A      <br>=0A      <fieldset class=
=3D"yiv821183122mimeAttachmentHeader"></fieldset>=0A      <br>=0A      <pre=
>_______________________________________________=0AOAuth mailing list=0A<a =
rel=3D"nofollow" class=3D"yiv821183122moz-txt-link-abbreviated" ymailto=3D"=
mailto:OAuth@ietf.org" target=3D"_blank" href=3D"mailto:OAuth@ietf.org">OAu=
th@ietf.org</a>=0A<a rel=3D"nofollow" class=3D"yiv821183122moz-txt-link-fre=
etext" target=3D"_blank" href=3D"https://www.ietf.org/mailman/listinfo/oaut=
h">https://www.ietf.org/mailman/listinfo/oauth</a>=0A</pre>=0A    </blockqu=
ote>=0A    <br>=0A  </div>=0A=0A</div><br><br> </div> </div>  </div></div><=
/blockquote><blockquote type=3D"cite"><div><span>__________________________=
_____________________</span><br><span>OAuth mailing list</span><br><span><a=
 rel=3D"nofollow" ymailto=3D"mailto:OAuth@ietf.org" target=3D"_blank" href=
=3D"mailto:OAuth@ietf.org">OAuth@ietf.org</a></span><br><span><a rel=3D"nof=
ollow" target=3D"_blank" href=3D"https://www.ietf.org/mailman/listinfo/oaut=
h">https://www.ietf.org/mailman/listinfo/oauth</a></span><br></div></blockq=
uote></div></div><br><br> </div> </div>  </div></body></html>
---551393103-308099663-1360994570=:11377--

From phil.hunt@oracle.com  Fri Feb 15 23:22:33 2013
Return-Path: <phil.hunt@oracle.com>
X-Original-To: oauth@ietfa.amsl.com
Delivered-To: oauth@ietfa.amsl.com
Received: from localhost (localhost [127.0.0.1]) by ietfa.amsl.com (Postfix) with ESMTP id 4041F21F8314 for <oauth@ietfa.amsl.com>; Fri, 15 Feb 2013 23:22:33 -0800 (PST)
X-Virus-Scanned: amavisd-new at amsl.com
X-Spam-Flag: NO
X-Spam-Score: -5.596
X-Spam-Level: 
X-Spam-Status: No, score=-5.596 tagged_above=-999 required=5 tests=[AWL=-0.394, BAYES_00=-2.599, HTML_MESSAGE=0.001, MIME_QP_LONG_LINE=1.396, RCVD_IN_DNSWL_MED=-4]
Received: from mail.ietf.org ([64.170.98.30]) by localhost (ietfa.amsl.com [127.0.0.1]) (amavisd-new, port 10024) with ESMTP id 0J4p1t8-6aOG for <oauth@ietfa.amsl.com>; Fri, 15 Feb 2013 23:22:31 -0800 (PST)
Received: from aserp1040.oracle.com (aserp1040.oracle.com [141.146.126.69]) by ietfa.amsl.com (Postfix) with ESMTP id F085621F88E4 for <oauth@ietf.org>; Fri, 15 Feb 2013 23:22:30 -0800 (PST)
Received: from acsinet22.oracle.com (acsinet22.oracle.com [141.146.126.238]) by aserp1040.oracle.com (Sentrion-MTA-4.3.1/Sentrion-MTA-4.3.1) with ESMTP id r1G7MPNw026454 (version=TLSv1/SSLv3 cipher=DHE-RSA-AES256-SHA bits=256 verify=OK); Sat, 16 Feb 2013 07:22:26 GMT
Received: from acsmt356.oracle.com (acsmt356.oracle.com [141.146.40.156]) by acsinet22.oracle.com (8.14.4+Sun/8.14.4) with ESMTP id r1G7MPuX008988 (version=TLSv1/SSLv3 cipher=DHE-RSA-AES256-SHA bits=256 verify=NO); Sat, 16 Feb 2013 07:22:25 GMT
Received: from abhmt106.oracle.com (abhmt106.oracle.com [141.146.116.58]) by acsmt356.oracle.com (8.12.11.20060308/8.12.11) with ESMTP id r1G7MOOv026995; Sat, 16 Feb 2013 01:22:24 -0600
Received: from [192.168.1.125] (/174.7.250.104) by default (Oracle Beehive Gateway v4.0) with ESMTP ; Fri, 15 Feb 2013 23:22:23 -0800
References: <0573984A-8C11-4960-9BC6-F44D4B664C19@gmx.net> <E808B6AC-D5F6-479F-967D-EA6B2586BE64@oracle.com> <511A7D27.8010209@mitre.org> <4E1F6AAD24975D4BA5B16804296739436744BD23@TK5EX14MBXC285.redmond.corp.microsoft.com> <1360891897.14004.YahooMailNeo@web31811.mail.mud.yahoo.com> <E7EBF78C-37EB-4737-8DD5-0F24C9FACA60@lodderstedt.net> <1360912115.36543.YahooMailNeo@web31811.mail.mud.yahoo.com> <2A0F585F-2CEF-418D-9654-5084E6C9BD0D@lodderstedt.net> <1360944589.51724.YahooMailNeo@web31808.mail.mud.yahoo.com> <CA+ZpN24dWAGtZR2aQcqC_N+sHsp7zBVe42LDbrkAsqNVqQPv0w@mail.gmail.com> <511EA0A3.7080000@mitre.org> <1360962242.18571.YahooMailNeo@web31805.mail.mud.yahoo.com> <BDE6C674-AEDE-4E73-9122-4F2A90F7F180@oracle.com> <1360994570.11377.YahooMailNeo@web31805.mail.mud.yahoo.com>
Mime-Version: 1.0 (1.0)
In-Reply-To: <1360994570.11377.YahooMailNeo@web31805.mail.mud.yahoo.com>
Content-Type: multipart/alternative; boundary=Apple-Mail-ADA71B80-EC28-4B76-89E1-E468BF4D4FA9
Content-Transfer-Encoding: 7bit
Message-Id: <B4FE425C-B0D2-4D93-9148-CED74C34932E@oracle.com>
X-Mailer: iPhone Mail (10B142)
From: Phil Hunt <phil.hunt@oracle.com>
Date: Fri, 15 Feb 2013 23:22:21 -0800
To: William Mills <wmills_92105@yahoo.com>
X-Source-IP: acsinet22.oracle.com [141.146.126.238]
Cc: IETF oauth WG <oauth@ietf.org>
Subject: Re: [OAUTH-WG] Minutes from the OAuth Design Team Conference Call - 11th February 2013
X-BeenThere: oauth@ietf.org
X-Mailman-Version: 2.1.12
Precedence: list
List-Id: OAUTH WG <oauth.ietf.org>
List-Unsubscribe: <https://www.ietf.org/mailman/options/oauth>, <mailto:oauth-request@ietf.org?subject=unsubscribe>
List-Archive: <http://www.ietf.org/mail-archive/web/oauth>
List-Post: <mailto:oauth@ietf.org>
List-Help: <mailto:oauth-request@ietf.org?subject=help>
List-Subscribe: <https://www.ietf.org/mailman/listinfo/oauth>, <mailto:oauth-request@ietf.org?subject=subscribe>
X-List-Received-Date: Sat, 16 Feb 2013 07:22:33 -0000

--Apple-Mail-ADA71B80-EC28-4B76-89E1-E468BF4D4FA9
Content-Type: text/plain;
	charset=utf-8
Content-Transfer-Encoding: quoted-printable

I don't see oauth1 tokens as a short cut because eran said the token in oaut=
h1 (which is inside the oauth1 spec) had many implementation problems by cli=
ent developers. Why go there and re-invent what jwt could do easily?

Do you need hok? Do you need replay protection? Do you need message signing?=
 Are asymmetric keys needed?  I get the impression the group is less interes=
ted in the last two.=20

There is also key distribution to resource server. I think we have client na=
iled but getting keys to resource server needs some discussion - especially i=
f the path is through the token itself. =20

I suppose we can move faster if we assume rs obtains keys in an unspecified m=
anner like what happened in oauth1.=20

Phil

Sent from my phone.

On 2013-02-15, at 22:02, William Mills <wmills_92105@yahoo.com> wrote:

> All the same concepts/info are available in the AS: client ID, client auth=
, and can deliver both token and secret.  What's magic once the client has t=
he token that's missing?
>=20
> From: Phil Hunt <phil.hunt@oracle.com>
> To: William Mills <wmills_92105@yahoo.com>=20
> Cc: Justin Richer <jricher@mitre.org>; Tim Bray <twbray@google.com>; IETF o=
auth WG <oauth@ietf.org>=20
> Sent: Friday, February 15, 2013 1:52 PM
> Subject: Re: [OAUTH-WG] Minutes from the OAuth Design Team Conference Call=
 - 11th February 2013
>=20
> Sorry. I have to disagree. The way 1.0 is written, it is not a shortcut to=
 turn it into a token for 2.=20
>=20
> Phil
>=20
> Sent from my phone.
>=20
> On 2013-02-15, at 13:04, William Mills <wmills_92105@yahoo.com> wrote:
>=20
>> >I've brought it up before, but I think it might be worthwhile, at least a=
s an exercise, to define a method to get OAuth1-style tokens from an OAuth2 t=
oken endpoint. You'd defer to OAuth1 for how to use them >with a protected r=
esource.
>>=20
>> YES!
>>=20
>> From: Justin Richer <jricher@mitre.org>
>> To: Tim Bray <twbray@google.com>=20
>> Cc: William Mills <wmills_92105@yahoo.com>; IETF oauth WG <oauth@ietf.org=
>=20
>> Sent: Friday, February 15, 2013 12:54 PM
>> Subject: Re: [OAUTH-WG] Minutes from the OAuth Design Team Conference Cal=
l - 11th February 2013
>>=20
>> So that you can fetch and manage all your tokens using the same code path=
s as the OAuth2 services. The "get a token" part will be identical to Oauth2=
 Bearer (except for some details of what comes back from the token endpoint,=
 of course), it's the "use a token" bit that really changes and is up in the=
 air. You get to use scopes, and state, and refresh tokens, and all the othe=
r good stuff.
>>=20
>> I've brought it up before, but I think it might be worthwhile, at least a=
s an exercise, to define a method to get OAuth1-style tokens from an OAuth2 t=
oken endpoint. You'd defer to OAuth1 for how to use them with a protected re=
source.
>>=20
>>  -- Justin
>>=20
>> On 02/15/2013 11:49 AM, Tim Bray wrote:
>>> Not deeply acquainted with the Flickr scenario, but it occurs to me to a=
sk: If OAuth 1.0 is working well for them, why don=E2=80=99t they just keep u=
sing it?  I.e. if there=E2=80=99s already a good solution in place for peopl=
e who require secure authn/authz over insecure channels, why would we go the=
 extra work of duplicating that in OAuth 2 territory? -T
>>>=20
>>> On Fri, Feb 15, 2013 at 8:09 AM, William Mills <wmills_92105@yahoo.com> w=
rote:
>>> I'll repeat the use case for Flickr, which requires OAuth 1.0a type capa=
bilites that OAuth 2 does not provide.  Simply stating "move to HTTPS" is no=
t a viable response here. =20
>>>=20
>>> From: Torsten Lodderstedt <torsten@lodderstedt.net>
>>> To: William Mills <wmills_92105@yahoo.com>=20
>>> Cc: Mike Jones <Michael.Jones@microsoft.com>; Justin Richer <jricher@mit=
re.org>; Phil Hunt <phil.hunt@oracle.com>; IETF oauth WG <oauth@ietf.org>=20=

>>> Sent: Friday, February 15, 2013 7:22 AM
>>> Subject: Re: [OAUTH-WG] Minutes from the OAuth Design Team Conference Ca=
ll - 11th February 2013
>>>=20
>>> Hi Bill,
>>>=20
>>> I think one needs to compare the costs/impact of HTTPS on one side and t=
he implementation of integrity protection and replay detection on the other.=
 We had this discussion several times.
>>>=20
>>> regards,
>>> Torsten.
>>>=20
>>> Am 15.02.2013 um 08:08 schrieb William Mills <wmills_92105@yahoo.com>:
>>>=20
>>>> I fundamentally disagree with that too.  OAuth 2 is the *framework*, on=
e which supports multiple token types.  Bearer tokens were the first credent=
ial type defined.
>>>>=20
>>>> OAuth 1.0a also requires HTTPS transport for authentication and getting=
 the token.
>>>>=20
>>>> There are  real use cases for tokens usable over plain text with integr=
ity                                 protection.
>>>>=20
>>>> -bill
>>>>=20
>>>> From: Torsten Lodderstedt <torsten@lodderstedt.net>
>>>> To: William Mills <wmills_92105@yahoo.com>=20
>>>> Cc: Mike Jones <Michael.Jones@microsoft.com>;                          =
           Justin Richer <jricher@mitre.org>;                               =
      Phil Hunt <phil.hunt@oracle.com>; IETF oauth WG <oauth@ietf.org>=20
>>>> Sent: Thursday, February 14, 2013 10:05 PM
>>>> Subject: Re: [OAUTH-WG] Minutes from the OAuth Design Team Conference C=
all - 11th February 2013
>>>>=20
>>>> Hi Bill,
>>>>=20
>>>> OAuth 2.0 took a different direction by relying on HTTPS to provide the=
 basic protection. So the need to have a token, which can be used for servic=
e requests over plain HTTP is arguable. My understanding of this activity wa=
s, the intend is to provide additional protection on top of HTTPS.
>>>>=20
>>>> regards,
>>>> Torsten.
>>>>=20
>>>> Am 15.02.2013 um 02:31 schrieb William Mills <wmills_92105@yahoo.com>:
>>>>=20
>>>>> I disagree with "That was the impediment to OAuth 1.0 adoption that   =
                                            OAuth 2.0 solved in the         =
                                      first place.", unless "solving" means d=
oes not                                               address the need for i=
t at all.
>>>>>=20
>>>>> OAuth 2 does several good things, but it still lacks a defined token t=
ype that is safe to user over plain text HTTP.  1.0a solved that.
>>>>>=20
>>>>> From: Mike Jones <Michael.Jones@microsoft.com>
>>>>> To: Justin Richer <jricher@mitre.org>; Phil Hunt <phil.hunt@oracle.com=
>=20
>>>>> Cc: IETF oauth WG <oauth@ietf.org>=20
>>>>> Sent: Thursday, February 14, 2013 1:44 PM
>>>>> Subject: Re: [OAUTH-WG] Minutes from the OAuth Design Team Conference C=
all - 11th February 2013
>>>>>=20
>>>>> I'm in favor of reusing                                               t=
he JWT work that this WG is also doing. :-)
>>>>>=20
>>>>> I'm pretty skeptical of us inventing another custom scheme for signing=
 HTTP headers.  That was the impediment to OAuth 1.0 adoption that OAuth 2.0=
 solved in the first place.
>>>>>=20
>>>>>                 -- Mike
>>>>>=20
>>>>> -----Original Message-----
>>>>> From: oauth-bounces@ietf.org [mailto:oauth-bounces@ietf.org] On Behalf=
 Of Justin Richer
>>>>> Sent: Tuesday, February                                               1=
2, 2013 9:35 AM
>>>>> To: Phil Hunt
>>>>> Cc: IETF oauth WG
>>>>> Subject: Re: [OAUTH-WG]                                               M=
inutes from the OAuth Design Team Conference Call - 11th February 2013
>>>>>=20
>>>>> That's my reading of it as well, Phil, thanks for providing the clarif=
ication. One motivator behind using a                                       =
        JSON-based token is to be able to re-use some of the great work that=
 the JOSE group is doing but apply it to an HTTP payload.
>>>>>=20
>>>>> What neither of us want is a token type that requires stuffing all que=
ry, header, and other                                               paramete=
rs *into* the JSON object itself, which would be a more SOAPy approach.
>>>>>=20
>>>>>   -- Justin
>>>>>=20
>>>>> On 02/12/2013 12:30 PM,                                               P=
hil Hunt wrote:
>>>>> > Clarification.  I think Justin and I were in agreement that we don't=
 want to see a format that requires JSON payloads.  We are both interested i=
n a JSON token used in the authorization header that could be based on a    =
                                           computed signature of some combin=
ation of http                                               headers and body=
 if possible.
>>>>> >
>>>>> > Phil
>>>>> >
>>>>> > @independentid
>>>>> > www.independentid.com
>>>>> > phil.hunt@oracle.com
>>>>> >
>>>>> >
>>>>> >
>>>>> >
>>>>> >
>>>>> > On 2013-02-12, at 1:10 AM, Hannes Tschofenig wrote:
>>>>> >
>>>>> >> Here are my notes.
>>>>> >>
>>>>> >> Participants:
>>>>> >>
>>>>> >> * John Bradley
>>>>> >> * Derek Atkins
>>>>> >> * Phil Hunt
>>>>> >> * Prateek Mishra
>>>>> >> * Hannes Tschofenig
>>>>> >> * Mike Jones
>>>>> >> * Antonio Sanso
>>>>> >> * Justin Richer
>>>>> >>
>>>>> >> Notes:
>>>>> >>
>>>>> >> My slides are available here:=20
>>>>> >> http://www.tschofenig.priv.at/OAuth2-Security-11Feb2013.ppt
>>>>> >>
>>>>> >> Slide #2 summarizes earlier discussions during the conference calls=
.
>>>>> >>
>>>>> >> -- HTTP vs. JSON
>>>>> >>
>>>>> >> Phil noted that he does not like to use the MAC Token draft as a st=
arting point because it does not re-use any of the work done in the JOSE wor=
king group and in particular all the libraries that are available today. He m=
entioned that earlier attempts to write the MAC Token code lead to problems f=
or implementers.
>>>>> >>
>>>>> >> Justin responded that he does not agree with using JSON as a transp=
ort mechanism since this would replicate a SOAP style.
>>>>> >>
>>>>> >> Phil noted that he wants to send JSON but the signature shall be co=
mputed over the HTTP header field.
>>>>> >>
>>>>> >> -- Flexibility for the keyed message digest computation
>>>>> >>
>>>>> >>  =46rom earlier discussion it was clear                            =
                   that the conference call                                 =
              participants wanted more                                      =
         flexibility regarding the keyed message digest                     =
                          computation. For this purpose Hannes presented    =
                                           the DKIM based approach,         =
                                      which allows selective header fields t=
o be included in the digest.                                               T=
his is shown in slide #4.
>>>>> >>
>>>>> >> After some discussion the conference call participants thought that=
 this would meet their needs. Further investigations would still be useful t=
o determine the degree of failed HMAC calculations due to HTTP proxies modif=
ying the content.
>>>>> >>
>>>>> >> -- Key Distribution
>>>>> >>
>>>>> >> Hannes presented the open issue regarding the choice of key=20
>>>>> >> distribution. Slides #6-#8 present three techniques and Hannes aske=
d=20
>>>>> >> for feedback regarding the preferred                               =
                style. Justin and others                                    =
           didn't=20
>>>>> >> see the need to decide on one mechanism - they wanted to keep the=20=

>>>>> >> choice open. Derek indicated that this will not be an acceptable=20=

>>>>> >> approach. Since the resource server and the authorization server ma=
y,=20
>>>>> >> in the OAuth 2.0 framework, be entities produced by different vendo=
rs=20
>>>>> >> there is an interoperability need. Justin responded that he        =
                                       disagrees=20
>>>>> >> and that the resource server needs to understand the access token a=
nd=20
>>>>> >> referred to the recent draft submission                            =
                   for the token introspection=20
>>>>> >> endpoint. Derek indicated that the resource server has to understan=
d=20
>>>>> >> the content of the access token and the token introspection endpoin=
t=20
>>>>> >> just pushes the problem around: the resource server has to send the=
=20
>>>>> >> access token to the authorization server and then the resource serv=
er=20
>>>>> >> gets the result back (which he the
>>>>> n
>>>>> >    a
>>>>> >> gain needs to understand) in order to                              =
                 make a meaningful authorization decision.
>>>>> >>
>>>>> >> Everyone agreed that the client must receive the session key from t=
he authorization server and that this approach has to be standardized. It wa=
s also agreed that this is a common approach among all three key distributio=
n mechanisms.
>>>>> >>
>>>>> >> Hannes asked the participants to think about their preference.
>>>>> >>
>>>>> >> The questions regarding key naming and                             =
                  the indication for the intended resource server           =
                                    the client wants to talk                =
                               to have been postponed.
>>>>> >>
>>>>> >> Ciao
>>>>> >> Hannes
>>>>> >>
>>>>> >>
>>>>> >> _______________________________________________
>>>>> >> OAuth mailing list
>>>>> >> OAuth@ietf.org
>>>>> >> https://www.ietf.org/mailman/listinfo/oauth
>>>>> > _______________________________________________
>>>>> > OAuth mailing list
>>>>> > OAuth@ietf.org
>>>>> > https://www.ietf.org/mailman/listinfo/oauth
>>>>>=20
>>>>>=20
>>>>> _______________________________________________
>>>>> OAuth mailing list
>>>>> OAuth@ietf.org
>>>>> https://www.ietf.org/mailman/listinfo/oauth
>>>>> _______________________________________________
>>>>> OAuth mailing list
>>>>> OAuth@ietf.org
>>>>> https://www.ietf.org/mailman/listinfo/oauth
>>>>> _______________________________________________
>>>>> OAuth mailing list
>>>>> OAuth@ietf.org
>>>>> https://www.ietf.org/mailman/listinfo/oauth
>>>=20
>>>=20
>>>=20
>>> _______________________________________________
>>> OAuth mailing list
>>> OAuth@ietf.org
>>> https://www.ietf.org/mailman/listinfo/oauth
>>>=20
>>>=20
>>>=20
>>>=20
>>> _______________________________________________
>>> OAuth mailing list
>>> OAuth@ietf.org
>>> https://www.ietf.org/mailman/listinfo/oauth
>>=20
>>=20
>>=20
>> _______________________________________________
>> OAuth mailing list
>> OAuth@ietf.org
>> https://www.ietf.org/mailman/listinfo/oauth
>=20
>=20

--Apple-Mail-ADA71B80-EC28-4B76-89E1-E468BF4D4FA9
Content-Type: text/html;
	charset=utf-8
Content-Transfer-Encoding: quoted-printable

<html><head><meta http-equiv=3D"content-type" content=3D"text/html; charset=3D=
utf-8"></head><body dir=3D"auto"><div>I don't see oauth1 tokens as a short c=
ut because eran said the token in oauth1 (which is inside the oauth1 spec) h=
ad many implementation problems by client developers. Why go there and re-in=
vent what jwt could do easily?<br><br>Do you need hok? Do you need replay pr=
otection? Do you need message signing? Are asymmetric keys needed? &nbsp;I g=
et the impression the group is less interested in the last two.&nbsp;</div><=
div><br></div><div>There is also key distribution to resource server. I thin=
k we have client nailed but getting keys to resource server needs some discu=
ssion - especially if the path is through the token itself. &nbsp;</div><div=
><br></div><div>I suppose we can move faster if we assume rs obtains&nbsp;ke=
ys in an unspecified manner like what happened in oauth1.&nbsp;</div><div><b=
r></div><div>Phil<div><br></div><div>Sent from my phone.</div></div><div><br=
>On 2013-02-15, at 22:02, William Mills &lt;<a href=3D"mailto:wmills_92105@y=
ahoo.com">wmills_92105@yahoo.com</a>&gt; wrote:<br><br></div><blockquote typ=
e=3D"cite"><div><div style=3D"color:#000; background-color:#fff; font-family=
:Courier New, courier, monaco, monospace, sans-serif;font-size:12pt"><div>Al=
l the same concepts/info are available in the AS: client ID, client auth, an=
d can deliver both token and secret. &nbsp;What's magic once the client has t=
he token that's missing?</div><div><br></div>  <div style=3D"font-family: 'C=
ourier New', courier, monaco, monospace, sans-serif; font-size: 12pt;"> <div=
 style=3D"font-family: 'times new roman', 'new york', times, serif; font-siz=
e: 12pt;"> <div dir=3D"ltr"> <font size=3D"2" face=3D"Arial"> <hr size=3D"1"=
>  <b><span style=3D"font-weight:bold;">From:</span></b> Phil Hunt &lt;<a hr=
ef=3D"mailto:phil.hunt@oracle.com">phil.hunt@oracle.com</a>&gt;<br> <b><span=
 style=3D"font-weight: bold;">To:</span></b> William Mills &lt;<a href=3D"ma=
ilto:wmills_92105@yahoo.com">wmills_92105@yahoo.com</a>&gt; <br><b><span sty=
le=3D"font-weight: bold;">Cc:</span></b> Justin Richer &lt;<a href=3D"mailto=
:jricher@mitre.org">jricher@mitre.org</a>&gt;; Tim Bray &lt;<a href=3D"mailt=
o:twbray@google.com">twbray@google.com</a>&gt;; IETF oauth WG &lt;<a href=3D=
"mailto:oauth@ietf.org">oauth@ietf.org</a>&gt; <br> <b><span style=3D"font-w=
eight: bold;">Sent:</span></b> Friday, February 15, 2013 1:52 PM<br> <b><spa=
n style=3D"font-weight: bold;">Subject:</span></b> Re: [OAUTH-WG] Minutes fr=
om the OAuth Design Team Conference Call - 11th February 2013<br> </font> </=
div> <br><div id=3D"yiv821183122"><div><div>Sorry. I have to disagree. The w=
ay 1.0 is written, it is not a shortcut to turn it into a token for 2.&nbsp;=
<br><br>Phil<div><br></div><div>Sent from my phone.</div></div><div><br>On 2=
013-02-15, at 13:04, William Mills &lt;<a rel=3D"nofollow" ymailto=3D"mailto=
:wmills_92105@yahoo.com" target=3D"_blank" href=3D"mailto:wmills_92105@yahoo=
.com">wmills_92105@yahoo.com</a>&gt; wrote:<br><br></div><blockquote type=3D=
"cite"><div><div style=3D"color: rgb(0, 0, 0); background-color: rgb(255, 25=
5, 255); font-family: 'Courier New', courier, monaco, monospace, sans-serif;=
 font-size: 12pt;"><div><span><span style=3D"font-family: 'times new roman',=
 'new york', times, serif;">&gt;I've brought it up before,
 but I think it might be worthwhile, at least as an exercise, to define a me=
thod to get OAuth1-style tokens from an OAuth2 token endpoint. You'd defer t=
o OAuth1 for how to use them &gt;with a protected resource.</span><br style=3D=
"font-family: 'times new roman', 'new york', times, serif;"></span></div><di=
v><br></div><div style=3D"color: rgb(0, 0, 0); font-size: 16px; font-family:=
 'Courier New', courier, monaco, monospace, sans-serif; background-color: tr=
ansparent; font-style: normal;">YES!</div><div style=3D"color: rgb(0, 0, 0);=
 font-size: 16px; font-family: 'Courier New', courier, monaco, monospace, sa=
ns-serif; background-color: transparent; font-style: normal;"><br></div>  <d=
iv style=3D"font-family:'Courier
 New', courier, monaco, monospace, sans-serif;font-size:12pt;"> <div style=3D=
"font-family: 'times new roman', 'new york', times, serif; font-size: 12pt;"=
> <div dir=3D"ltr"> <font size=3D"2" face=3D"Arial"> <hr size=3D"1">  <b><sp=
an style=3D"font-weight:bold;">From:</span></b> Justin Richer &lt;<a rel=3D"=
nofollow" ymailto=3D"mailto:jricher@mitre.org" target=3D"_blank" href=3D"mai=
lto:jricher@mitre.org">jricher@mitre.org</a>&gt;<br> <b><span style=3D"font-=
weight:bold;">To:</span></b> Tim Bray &lt;<a rel=3D"nofollow" ymailto=3D"mai=
lto:twbray@google.com" target=3D"_blank" href=3D"mailto:twbray@google.com">t=
wbray@google.com</a>&gt; <br><b><span style=3D"font-weight:bold;">Cc:</span>=
</b> William Mills &lt;<a rel=3D"nofollow" ymailto=3D"mailto:wmills_92105@ya=
hoo.com" target=3D"_blank" href=3D"mailto:wmills_92105@yahoo.com">wmills_921=
05@yahoo.com</a>&gt;; IETF oauth WG &lt;<a rel=3D"nofollow" ymailto=3D"mailt=
o:oauth@ietf.org" target=3D"_blank" href=3D"mailto:oauth@ietf.org">oauth@iet=
f.org</a>&gt; <br> <b><span style=3D"font-weight:bold;">Sent:</span></b> Fri=
day, February 15, 2013 12:54 PM<br> <b><span style=3D"font-weight:bold;">Sub=
ject:</span></b> Re: [OAUTH-WG] Minutes from the OAuth Design Team Conferenc=
e Call - 11th February 2013<br> </font> </div> <br><div id=3D"yiv821183122">=

 =20

   =20
 =20
  <div>
    So that you can fetch and manage all your tokens using the same code
    paths as the OAuth2 services. The "get a token" part will be
    identical to Oauth2 Bearer (except for some details of what comes
    back from the token endpoint, of course), it's the "use a token" bit
    that really changes and is up in the air. You get to use scopes, and
    state, and refresh tokens, and all the other good stuff.<br>
    <br>
    I've brought it up before, but I think it might be worthwhile, at
    least as an exercise, to define a method to get OAuth1-style tokens
    from an OAuth2 token endpoint. You'd defer to OAuth1 for how to use
    them with a protected resource.<br>
    <br>
    &nbsp;-- Justin<br>
    <br>
    <div class=3D"yiv821183122moz-cite-prefix">On 02/15/2013 11:49 AM, Tim B=
ray wrote:<br>
    </div>
    <blockquote type=3D"cite">
     =20
      Not deeply acquainted with the Flickr scenario, but it occurs to
      me to ask: If OAuth 1.0 is working well for them, why don=E2=80=99t th=
ey
      just keep using it? &nbsp;I.e. if there=E2=80=99s already a good solut=
ion in
      place for people who require secure authn/authz over insecure
      channels, why would we go the extra work of duplicating that in
      OAuth 2 territory? -T<br>
      <br>
      <div class=3D"yiv821183122gmail_quote">On Fri, Feb 15, 2013 at 8:09 AM=
, William
        Mills <span dir=3D"ltr">&lt;<a rel=3D"nofollow" ymailto=3D"mailto:wm=
ills_92105@yahoo.com" target=3D"_blank" href=3D"mailto:wmills_92105@yahoo.co=
m">wmills_92105@yahoo.com</a>&gt;</span>
        wrote:<br>
        <blockquote class=3D"yiv821183122gmail_quote" style=3D"margin:0 0 0 .=
8ex;border-left:1px #ccc solid;padding-left:1ex;">
          <div>
            <div style=3D"font-size: 12pt; font-family: 'Courier New', couri=
er, monaco, monospace, sans-serif;">
              <div><span>I'll repeat the use case for Flickr, which
                  requires OAuth 1.0a type capabilites that OAuth 2 does
                  not provide. &nbsp;Simply stating "move to HTTPS" is not a=

                  viable response here. &nbsp;</span></div>
              <div><br>
              </div>
              <div style=3D"font-family:'Courier
                New', courier, monaco, monospace, sans-serif;font-size:12pt;=
">
                <div style=3D"font-family:'times new roman', 'new
                  york', times, serif;font-size:12pt;">
                  <div dir=3D"ltr"> <font face=3D"Arial">
                      <hr size=3D"1"> <b><span style=3D"font-weight:bold;">From:=
</span></b>
                      Torsten Lodderstedt &lt;<a rel=3D"nofollow" ymailto=3D=
"mailto:torsten@lodderstedt.net" target=3D"_blank" href=3D"mailto:torsten@lo=
dderstedt.net">torsten@lodderstedt.net</a>&gt;<br>
                      <b><span style=3D"font-weight:bold;">To:</span></b>
                      William Mills &lt;<a rel=3D"nofollow" ymailto=3D"mailt=
o:wmills_92105@yahoo.com" target=3D"_blank" href=3D"mailto:wmills_92105@yaho=
o.com">wmills_92105@yahoo.com</a>&gt; <br>
                      <b><span style=3D"font-weight:bold;">Cc:</span></b>
                      Mike Jones &lt;<a rel=3D"nofollow" ymailto=3D"mailto:M=
ichael.Jones@microsoft.com" target=3D"_blank" href=3D"mailto:Michael.Jones@m=
icrosoft.com">Michael.Jones@microsoft.com</a>&gt;;
                      Justin Richer &lt;<a rel=3D"nofollow" ymailto=3D"mailt=
o:jricher@mitre.org" target=3D"_blank" href=3D"mailto:jricher@mitre.org">jri=
cher@mitre.org</a>&gt;;
                      Phil Hunt &lt;<a rel=3D"nofollow" ymailto=3D"mailto:ph=
il.hunt@oracle.com" target=3D"_blank" href=3D"mailto:phil.hunt@oracle.com">p=
hil.hunt@oracle.com</a>&gt;;
                      IETF oauth WG &lt;<a rel=3D"nofollow" ymailto=3D"mailt=
o:oauth@ietf.org" target=3D"_blank" href=3D"mailto:oauth@ietf.org">oauth@iet=
f.org</a>&gt;
                      <br>
                      <b><span style=3D"font-weight:bold;">Sent:</span></b>
                      Friday, February 15, 2013 7:22 AM<br>
                      <b><span style=3D"font-weight:bold;">Subject:</span></=
b>
                      Re: [OAUTH-WG] Minutes from the OAuth Design Team
                      Conference Call - 11th February 2013<br>
                    </font> </div>
                  <br>
                  <div>
                    <div>
                      <div>Hi Bill,</div>
                      <div><br>
                      </div>
                      <div>I think one needs to compare the costs/impact
                        of HTTPS on one side and the implementation of
                        integrity protection and replay detection on the
                        other. We had this discussion several times.</div>
                      <div><br>
                      </div>
                      <div>regards,</div>
                      <div>Torsten.</div>
                      <div><br>
                        Am 15.02.2013 um 08:08 schrieb William Mills
                        &lt;<a rel=3D"nofollow" ymailto=3D"mailto:wmills_921=
05@yahoo.com" target=3D"_blank" href=3D"mailto:wmills_92105@yahoo.com">wmill=
s_92105@yahoo.com</a>&gt;:<br>
                        <br>
                      </div>
                      <blockquote type=3D"cite">
                        <div>
                          <div style=3D"font-size:12pt;font-family:'Courier
                            New', courier, monaco, monospace, sans-serif;">
                            <div><span>I fundamentally disagree with
                                that too. &nbsp;OAuth 2 is the *framework*,
                                one which supports multiple token types.
                                &nbsp;Bearer tokens were the first credentia=
l
                                type defined.</span></div>
                            <div style=3D"font-style:normal;font-size:16px;b=
ackground-color:transparent;font-family:'Courier
                              New', courier, monaco, monospace, sans-serif;"=
><span><br>
                              </span></div>
                            <div style=3D"font-style:normal;font-size:16px;b=
ackground-color:transparent;font-family:'Courier
                              New', courier, monaco, monospace, sans-serif;"=
>
                              <span>OAuth 1.0a also requires HTTPS
                                transport for authentication and getting
                                the token.</span></div>
                            <div style=3D"font-style:normal;font-size:16px;b=
ackground-color:transparent;font-family:'Courier
                              New', courier, monaco, monospace, sans-serif;"=
>
                              <span><br>
                              </span></div>
                            <div style=3D"font-style:normal;font-size:16px;b=
ackground-color:transparent;font-family:'Courier
                              New', courier, monaco, monospace, sans-serif;"=
><span>There
                                are &nbsp;real use cases for tokens usable
                                over plain text with integrity
                                protection.</span></div>
                            <div style=3D"font-style:normal;font-size:16px;b=
ackground-color:transparent;font-family:'Courier
                              New', courier, monaco, monospace, sans-serif;"=
><span><br>
                              </span></div>
                            <div style=3D"font-style:normal;font-size:16px;b=
ackground-color:transparent;font-family:'Courier
                              New', courier, monaco, monospace, sans-serif;"=
>
                              <span>-bill</span></div>
                            <div><br>
                            </div>
                            <div style=3D"font-family:'Courier
                              New', courier, monaco, monospace, sans-serif;f=
ont-size:12pt;">
                              <div style=3D"font-family:'times new
                                roman', 'new
                                york', times, serif;font-size:12pt;">
                                <div dir=3D"ltr"> <font face=3D"Arial">
                                    <hr size=3D"1"> <b><span style=3D"font-w=
eight:bold;">From:</span></b>
                                    Torsten Lodderstedt &lt;<a rel=3D"nofoll=
ow" ymailto=3D"mailto:torsten@lodderstedt.net" target=3D"_blank" href=3D"mai=
lto:torsten@lodderstedt.net">torsten@lodderstedt.net</a>&gt;<br>
                                    <b><span style=3D"font-weight:bold;">To:=
</span></b>
                                    William Mills &lt;<a rel=3D"nofollow" ym=
ailto=3D"mailto:wmills_92105@yahoo.com" target=3D"_blank" href=3D"mailto:wmi=
lls_92105@yahoo.com">wmills_92105@yahoo.com</a>&gt;
                                    <br>
                                    <b><span style=3D"font-weight:bold;">Cc:=
</span></b>
                                    Mike Jones &lt;<a rel=3D"nofollow" ymail=
to=3D"mailto:Michael.Jones@microsoft.com" target=3D"_blank" href=3D"mailto:M=
ichael.Jones@microsoft.com">Michael.Jones@microsoft.com</a>&gt;;
                                    Justin Richer &lt;<a rel=3D"nofollow" ym=
ailto=3D"mailto:jricher@mitre.org" target=3D"_blank" href=3D"mailto:jricher@=
mitre.org">jricher@mitre.org</a>&gt;;
                                    Phil Hunt &lt;<a rel=3D"nofollow" ymailt=
o=3D"mailto:phil.hunt@oracle.com" target=3D"_blank" href=3D"mailto:phil.hunt=
@oracle.com">phil.hunt@oracle.com</a>&gt;;
                                    IETF oauth WG &lt;<a rel=3D"nofollow" ym=
ailto=3D"mailto:oauth@ietf.org" target=3D"_blank" href=3D"mailto:oauth@ietf.=
org">oauth@ietf.org</a>&gt;
                                    <br>
                                    <b><span style=3D"font-weight:bold;">Sen=
t:</span></b>
                                    Thursday, February 14, 2013 10:05 PM<br>=

                                    <b><span style=3D"font-weight:bold;">Sub=
ject:</span></b>
                                    Re: [OAUTH-WG] Minutes from the
                                    OAuth Design Team Conference Call -
                                    11th February 2013<br>
                                  </font> </div>
                                <br>
                                <div>
                                  <div>
                                    <div>Hi Bill,</div>
                                    <div><br>
                                    </div>
                                    <div>OAuth 2.0 took a different
                                      direction by relying on HTTPS to
                                      provide the basic protection. So
                                      the need to have a token, which
                                      can be used for service requests
                                      over plain HTTP is arguable. My
                                      understanding of this activity
                                      was, the intend is to provide
                                      additional protection on top of
                                      HTTPS.</div>
                                    <div><br>
                                    </div>
                                    <div>regards,</div>
                                    <div>Torsten.</div>
                                    <div><br>
                                      Am 15.02.2013 um 02:31 schrieb
                                      William Mills &lt;<a rel=3D"nofollow" y=
mailto=3D"mailto:wmills_92105@yahoo.com" target=3D"_blank" href=3D"mailto:wm=
ills_92105@yahoo.com">wmills_92105@yahoo.com</a>&gt;:<br>
                                      <br>
                                    </div>
                                    <blockquote type=3D"cite">
                                      <div>
                                        <div style=3D"font-size:12pt;font-fa=
mily:'Courier
New', courier, monaco, monospace, sans-serif;">
                                          <div><span>I disagree with "</span=
><span style=3D"font-family:'times
                                              new roman', 'new
                                              york', times, serif;font-size:=
12pt;">That
                                              was the impediment to
                                              OAuth 1.0 adoption that
                                              OAuth 2.0 solved in the
                                              first place.", unless
                                              "solving" means does not
                                              address the need for it at
                                              all.</span></div>
                                          <div style=3D"font-style:normal;fo=
nt-size:12pt;background-color:transparent;font-family:'times
                                            new roman', 'new
                                            york', times, serif;">
                                            <span style=3D"font-family:'time=
s
                                              new roman', 'new
                                              york', times, serif;font-size:=
12pt;"><br>
                                            </span></div>
                                          <div style=3D"font-style:normal;fo=
nt-size:16px;background-color:transparent;font-family:'times
                                            new roman', 'new
                                            york', times, serif;">
                                            <span style=3D"font-family:'time=
s
                                              new roman', 'new
                                              york', times, serif;font-size:=
12pt;">OAuth
                                              2 does several good
                                              things, but it still lacks
                                              a defined token type that
                                              is safe to user over plain
                                              text HTTP. &nbsp;1.0a solved
                                              that.</span></div>
                                          <div><br>
                                          </div>
                                          <div style=3D"font-family:'Courier=

New', courier, monaco, monospace, sans-serif;font-size:12pt;">
                                            <div style=3D"font-family:'times=

                                              new roman', 'new
                                              york', times, serif;font-size:=
12pt;">
                                              <div dir=3D"ltr"> <font face=3D=
"Arial">
                                                  <hr size=3D"1"> <b><span s=
tyle=3D"font-weight:bold;">From:</span></b> Mike Jones &lt;<a rel=3D"nofollo=
w" ymailto=3D"mailto:Michael.Jones@microsoft.com" target=3D"_blank" href=3D"=
mailto:Michael.Jones@microsoft.com">Michael.Jones@microsoft.com</a>&gt;<br>
                                                  <b><span style=3D"font-wei=
ght:bold;">To:</span></b>
                                                  Justin Richer &lt;<a rel=3D=
"nofollow" ymailto=3D"mailto:jricher@mitre.org" target=3D"_blank" href=3D"ma=
ilto:jricher@mitre.org">jricher@mitre.org</a>&gt;;
                                                  Phil Hunt &lt;<a rel=3D"no=
follow" ymailto=3D"mailto:phil.hunt@oracle.com" target=3D"_blank" href=3D"ma=
ilto:phil.hunt@oracle.com">phil.hunt@oracle.com</a>&gt;
                                                  <br>
                                                  <b><span style=3D"font-wei=
ght:bold;">Cc:</span></b>
                                                  IETF oauth WG &lt;<a rel=3D=
"nofollow" ymailto=3D"mailto:oauth@ietf.org" target=3D"_blank" href=3D"mailt=
o:oauth@ietf.org">oauth@ietf.org</a>&gt;
                                                  <br>
                                                  <b><span style=3D"font-wei=
ght:bold;">Sent:</span></b>
                                                  Thursday, February 14,
                                                  2013 1:44 PM<br>
                                                  <b><span style=3D"font-wei=
ght:bold;">Subject:</span></b>
                                                  Re: [OAUTH-WG] Minutes
                                                  from the OAuth Design
                                                  Team Conference Call -
                                                  11th February 2013<br>
                                                </font> </div>
                                              <br>
                                              I'm in favor of reusing
                                              the JWT work that this WG
                                              is also doing. :-)<br>
                                              <br>
                                              I'm pretty skeptical of us
                                              inventing another custom
                                              scheme for signing HTTP
                                              headers.&nbsp; That was the
                                              impediment to OAuth 1.0
                                              adoption that OAuth 2.0
                                              solved in the first place.<br>=

                                              <br>
                                              &nbsp;&nbsp;&nbsp; &nbsp;&nbsp=
;&nbsp; &nbsp;&nbsp;&nbsp; &nbsp;&nbsp;&nbsp; -- Mike<br>
                                              <br>
                                              -----Original Message-----<br>=

                                              From: <a rel=3D"nofollow" ymai=
lto=3D"mailto:oauth-bounces@ietf.org" target=3D"_blank" href=3D"mailto:oauth=
-bounces@ietf.org">oauth-bounces@ietf.org</a>
                                              [mailto:<a rel=3D"nofollow" ym=
ailto=3D"mailto:oauth-bounces@ietf.org" target=3D"_blank" href=3D"mailto:oau=
th-bounces@ietf.org">oauth-bounces@ietf.org</a>]
                                              On Behalf Of Justin Richer<br>=

                                              Sent: Tuesday, February
                                              12, 2013 9:35 AM<br>
                                              To: Phil Hunt<br>
                                              Cc: IETF oauth WG<br>
                                              Subject: Re: [OAUTH-WG]
                                              Minutes from the OAuth
                                              Design Team Conference
                                              Call - 11th February 2013<br>
                                              <br>
                                              That's my reading of it as
                                              well, Phil, thanks for
                                              providing the
                                              clarification. One
                                              motivator behind using a
                                              JSON-based token is to be
                                              able to re-use some of the
                                              great work that the JOSE
                                              group is doing but apply
                                              it to an HTTP payload.<br>
                                              <br>
                                              What neither of us want is
                                              a token type that requires
                                              stuffing all query,
                                              header, and other
                                              parameters *into* the JSON
                                              object itself, which would
                                              be a more SOAPy approach.<br>
                                              <br>
                                              &nbsp; -- Justin<br>
                                              <br>
                                              On 02/12/2013 12:30 PM,
                                              Phil Hunt wrote:<br>
                                              &gt; Clarification.&nbsp; I
                                              think Justin and I were in
                                              agreement that we don't
                                              want to see a format that
                                              requires JSON payloads.&nbsp;
                                              We are both interested in
                                              a JSON token used in the
                                              authorization header that
                                              could be based on a
                                              computed signature of some
                                              combination of http
                                              headers and body if
                                              possible.<br>
                                              &gt;<br>
                                              &gt; Phil<br>
                                              &gt;<br>
                                              &gt; @independentid<br>
                                              &gt; <a rel=3D"nofollow" targe=
t=3D"_blank" href=3D"http://www.independentid.com/">www.independentid.com</a=
><br>
                                              &gt; <a rel=3D"nofollow" ymail=
to=3D"mailto:phil.hunt@oracle.com" target=3D"_blank" href=3D"mailto:phil.hun=
t@oracle.com">phil.hunt@oracle.com</a><br>
                                              &gt;<br>
                                              &gt;<br>
                                              &gt;<br>
                                              &gt;<br>
                                              &gt;<br>
                                              &gt; On 2013-02-12, at
                                              1:10 AM, Hannes Tschofenig
                                              wrote:<br>
                                              &gt;<br>
                                              &gt;&gt; Here are my
                                              notes.<br>
                                              &gt;&gt;<br>
                                              &gt;&gt; Participants:<br>
                                              &gt;&gt;<br>
                                              &gt;&gt; * John Bradley<br>
                                              &gt;&gt; * Derek Atkins<br>
                                              &gt;&gt; * Phil Hunt<br>
                                              &gt;&gt; * Prateek Mishra<br>
                                              &gt;&gt; * Hannes
                                              Tschofenig<br>
                                              &gt;&gt; * Mike Jones<br>
                                              &gt;&gt; * Antonio Sanso<br>
                                              &gt;&gt; * Justin Richer<br>
                                              &gt;&gt;<br>
                                              &gt;&gt; Notes:<br>
                                              &gt;&gt;<br>
                                              &gt;&gt; My slides are
                                              available here: <br>
                                              &gt;&gt; <a rel=3D"nofollow" t=
arget=3D"_blank" href=3D"http://www.tschofenig.priv.at/OAuth2-Security-11Feb=
2013.ppt">http://www.tschofenig.priv.at/OAuth2-Security-11Feb2013.ppt</a><br=
>
                                              &gt;&gt;<br>
                                              &gt;&gt; Slide #2
                                              summarizes earlier
                                              discussions during the
                                              conference calls.<br>
                                              &gt;&gt;<br>
                                              &gt;&gt; -- HTTP vs. JSON<br>
                                              &gt;&gt;<br>
                                              &gt;&gt; Phil noted that
                                              he does not like to use
                                              the MAC Token draft as a
                                              starting point because it
                                              does not re-use any of the
                                              work done in the JOSE
                                              working group and in
                                              particular all the
                                              libraries that are
                                              available today. He
                                              mentioned that earlier
                                              attempts to write the MAC
                                              Token code lead to
                                              problems for implementers.<br>=

                                              &gt;&gt;<br>
                                              &gt;&gt; Justin responded
                                              that he does not agree
                                              with using JSON as a
                                              transport mechanism since
                                              this would replicate a
                                              SOAP style.<br>
                                              &gt;&gt;<br>
                                              &gt;&gt; Phil noted that
                                              he wants to send JSON but
                                              the signature shall be
                                              computed over the HTTP
                                              header field.<br>
                                              &gt;&gt;<br>
                                              &gt;&gt; -- Flexibility
                                              for the keyed message
                                              digest computation<br>
                                              &gt;&gt;<br>
                                              &gt;&gt;&nbsp; =46rom earlier
                                              discussion it was clear
                                              that the conference call
                                              participants wanted more
                                              flexibility regarding the
                                              keyed message digest
                                              computation. For this
                                              purpose Hannes presented
                                              the DKIM based approach,
                                              which allows selective
                                              header fields to be
                                              included in the digest.
                                              This is shown in slide #4.<br>=

                                              &gt;&gt;<br>
                                              &gt;&gt; After some
                                              discussion the conference
                                              call participants thought
                                              that this would meet their
                                              needs. Further
                                              investigations would still
                                              be useful to determine the
                                              degree of failed HMAC
                                              calculations due to HTTP
                                              proxies modifying the
                                              content.<br>
                                              &gt;&gt;<br>
                                              &gt;&gt; -- Key
                                              Distribution<br>
                                              &gt;&gt;<br>
                                              &gt;&gt; Hannes presented
                                              the open issue regarding
                                              the choice of key <br>
                                              &gt;&gt; distribution.
                                              Slides #6-#8 present three
                                              techniques and Hannes
                                              asked <br>
                                              &gt;&gt; for feedback
                                              regarding the preferred
                                              style. Justin and others
                                              didn't <br>
                                              &gt;&gt; see the need to
                                              decide on one mechanism -
                                              they wanted to keep the <br>
                                              &gt;&gt; choice open.
                                              Derek indicated that this
                                              will not be an acceptable
                                              <br>
                                              &gt;&gt; approach. Since
                                              the resource server and
                                              the authorization server
                                              may, <br>
                                              &gt;&gt; in the OAuth 2.0
                                              framework, be entities
                                              produced by different
                                              vendors <br>
                                              &gt;&gt; there is an
                                              interoperability need.
                                              Justin responded that he
                                              disagrees <br>
                                              &gt;&gt; and that the
                                              resource server needs to
                                              understand the access
                                              token and <br>
                                              &gt;&gt; referred to the
                                              recent draft submission
                                              for the token
                                              introspection <br>
                                              &gt;&gt; endpoint. Derek
                                              indicated that the
                                              resource server has to
                                              understand <br>
                                              &gt;&gt; the content of
                                              the access token and the
                                              token introspection
                                              endpoint <br>
                                              &gt;&gt; just pushes the
                                              problem around: the
                                              resource server has to
                                              send the <br>
                                              &gt;&gt; access token to
                                              the authorization server
                                              and then the resource
                                              server <br>
                                              &gt;&gt; gets the result
                                              back (which he the<br>
                                              n<br>
                                              &gt;&nbsp; &nbsp; a<br>
                                              &gt;&gt; gain needs to
                                              understand) in order to
                                              make a meaningful
                                              authorization decision.<br>
                                              &gt;&gt;<br>
                                              &gt;&gt; Everyone agreed
                                              that the client must
                                              receive the session key
                                              from the authorization
                                              server and that this
                                              approach has to be
                                              standardized. It was also
                                              agreed that this is a
                                              common approach among all
                                              three key distribution
                                              mechanisms.<br>
                                              &gt;&gt;<br>
                                              &gt;&gt; Hannes asked the
                                              participants to think
                                              about their preference.<br>
                                              &gt;&gt;<br>
                                              &gt;&gt; The questions
                                              regarding key naming and
                                              the indication for the
                                              intended resource server
                                              the client wants to talk
                                              to have been postponed.<br>
                                              &gt;&gt;<br>
                                              &gt;&gt; Ciao<br>
                                              &gt;&gt; Hannes<br>
                                              &gt;&gt;<br>
                                              &gt;&gt;<br>
                                              &gt;&gt;
                                              ______________________________=
_________________<br>
                                              &gt;&gt; OAuth mailing
                                              list<br>
                                              &gt;&gt; <a rel=3D"nofollow" y=
mailto=3D"mailto:OAuth@ietf.org" target=3D"_blank" href=3D"mailto:OAuth@ietf=
.org">OAuth@ietf.org</a><br>
                                              &gt;&gt; <a rel=3D"nofollow" t=
arget=3D"_blank" href=3D"https://www.ietf.org/mailman/listinfo/oauth">https:=
//www.ietf.org/mailman/listinfo/oauth</a><br>
                                              &gt;
                                              ______________________________=
_________________<br>
                                              &gt; OAuth mailing list<br>
                                              &gt; <a rel=3D"nofollow" ymail=
to=3D"mailto:OAuth@ietf.org" target=3D"_blank" href=3D"mailto:OAuth@ietf.org=
">OAuth@ietf.org</a><br>
                                              &gt; <a rel=3D"nofollow" targe=
t=3D"_blank" href=3D"https://www.ietf.org/mailman/listinfo/oauth">https://ww=
w.ietf.org/mailman/listinfo/oauth</a><br>
                                              <br>
                                              <br>
_______________________________________________<br>
                                              OAuth mailing list<br>
                                              <a rel=3D"nofollow" ymailto=3D=
"mailto:OAuth@ietf.org" target=3D"_blank" href=3D"mailto:OAuth@ietf.org">OAu=
th@ietf.org</a><br>
                                              <a rel=3D"nofollow" target=3D"=
_blank" href=3D"https://www.ietf.org/mailman/listinfo/oauth">https://www.iet=
f.org/mailman/listinfo/oauth</a><br>
_______________________________________________<br>
                                              OAuth mailing list<br>
                                              <a rel=3D"nofollow" ymailto=3D=
"mailto:OAuth@ietf.org" target=3D"_blank" href=3D"mailto:OAuth@ietf.org">OAu=
th@ietf.org</a><br>
                                              <a rel=3D"nofollow" target=3D"=
_blank" href=3D"https://www.ietf.org/mailman/listinfo/oauth">https://www.iet=
f.org/mailman/listinfo/oauth</a><br>
                                              <br>
                                              <br>
                                            </div>
                                          </div>
                                        </div>
                                      </div>
                                    </blockquote>
                                    <blockquote type=3D"cite">
                                      <div><span>___________________________=
____________________</span><br>
                                        <span>OAuth mailing list</span><br>
                                        <span><a rel=3D"nofollow" ymailto=3D=
"mailto:OAuth@ietf.org" target=3D"_blank" href=3D"mailto:OAuth@ietf.org">OAu=
th@ietf.org</a></span><br>
                                        <span><a rel=3D"nofollow" target=3D"=
_blank" href=3D"https://www.ietf.org/mailman/listinfo/oauth">https://www.iet=
f.org/mailman/listinfo/oauth</a></span><br>
                                      </div>
                                    </blockquote>
                                  </div>
                                </div>
                                <br>
                                <br>
                              </div>
                            </div>
                          </div>
                        </div>
                      </blockquote>
                    </div>
                  </div>
                  <br>
                  <br>
                </div>
              </div>
            </div>
          </div>
          <br>
          _______________________________________________<br>
          OAuth mailing list<br>
          <a rel=3D"nofollow" ymailto=3D"mailto:OAuth@ietf.org" target=3D"_b=
lank" href=3D"mailto:OAuth@ietf.org">OAuth@ietf.org</a><br>
          <a rel=3D"nofollow" target=3D"_blank" href=3D"https://www.ietf.org=
/mailman/listinfo/oauth">https://www.ietf.org/mailman/listinfo/oauth</a><br>=

          <br>
        </blockquote>
      </div>
      <br>
      <br>
      <fieldset class=3D"yiv821183122mimeAttachmentHeader"></fieldset>
      <br>
      <pre>_______________________________________________
OAuth mailing list
<a rel=3D"nofollow" class=3D"yiv821183122moz-txt-link-abbreviated" ymailto=3D=
"mailto:OAuth@ietf.org" target=3D"_blank" href=3D"mailto:OAuth@ietf.org">OAu=
th@ietf.org</a>
<a rel=3D"nofollow" class=3D"yiv821183122moz-txt-link-freetext" target=3D"_b=
lank" href=3D"https://www.ietf.org/mailman/listinfo/oauth">https://www.ietf.=
org/mailman/listinfo/oauth</a>
</pre>
    </blockquote>
    <br>
  </div>

</div><br><br> </div> </div>  </div></div></blockquote><blockquote type=3D"c=
ite"><div><span>_______________________________________________</span><br><s=
pan>OAuth mailing list</span><br><span><a rel=3D"nofollow" ymailto=3D"mailto=
:OAuth@ietf.org" target=3D"_blank" href=3D"mailto:OAuth@ietf.org">OAuth@ietf=
.org</a></span><br><span><a rel=3D"nofollow" target=3D"_blank" href=3D"https=
://www.ietf.org/mailman/listinfo/oauth">https://www.ietf.org/mailman/listinf=
o/oauth</a></span><br></div></blockquote></div></div><br><br> </div> </div> =
 </div></div></blockquote></body></html>=

--Apple-Mail-ADA71B80-EC28-4B76-89E1-E468BF4D4FA9--

From zhou.sujing@zte.com.cn  Sat Feb 16 00:03:05 2013
Return-Path: <zhou.sujing@zte.com.cn>
X-Original-To: oauth@ietfa.amsl.com
Delivered-To: oauth@ietfa.amsl.com
Received: from localhost (localhost [127.0.0.1]) by ietfa.amsl.com (Postfix) with ESMTP id 0E19C21F86CA; Sat, 16 Feb 2013 00:03:05 -0800 (PST)
X-Virus-Scanned: amavisd-new at amsl.com
X-Spam-Flag: NO
X-Spam-Score: -98.095
X-Spam-Level: 
X-Spam-Status: No, score=-98.095 tagged_above=-999 required=5 tests=[AWL=-0.300, BAYES_00=-2.599, HTML_MESSAGE=0.001, J_CHICKENPOX_62=0.6, MIME_BASE64_TEXT=1.753, MIME_CHARSET_FARAWAY=2.45, USER_IN_WHITELIST=-100]
Received: from mail.ietf.org ([64.170.98.30]) by localhost (ietfa.amsl.com [127.0.0.1]) (amavisd-new, port 10024) with ESMTP id T9gLgcF7qaCv; Sat, 16 Feb 2013 00:03:04 -0800 (PST)
Received: from zte.com.cn (mx6.zte.com.cn [95.130.199.165]) by ietfa.amsl.com (Postfix) with ESMTP id 8757B21F8569; Sat, 16 Feb 2013 00:03:03 -0800 (PST)
Received: from zte.com.cn (unknown [192.168.168.119]) by Websense Email Security Gateway with ESMTP id 5D1FE18D3B; Sat, 16 Feb 2013 16:02:34 +0800 (CST)
Received: from mse01.zte.com.cn (unknown [10.30.3.20]) by Websense Email Security Gateway with ESMTPS id 1D9551F9929; Sat, 16 Feb 2013 16:00:09 +0800 (CST)
Received: from notes_smtp.zte.com.cn ([10.30.1.239]) by mse01.zte.com.cn with ESMTP id r1G82cA3055373; Sat, 16 Feb 2013 16:02:38 +0800 (GMT-8) (envelope-from zhou.sujing@zte.com.cn)
In-Reply-To: <0573984A-8C11-4960-9BC6-F44D4B664C19@gmx.net>
To: Hannes Tschofenig <hannes.tschofenig@gmx.net>
MIME-Version: 1.0
X-KeepSent: 79A4CFF7:0B281747-48257B14:00269677; type=4; name=$KeepSent
X-Mailer: Lotus Notes Release 6.5.6 March 06, 2007
Message-ID: <OF79A4CFF7.0B281747-ON48257B14.00269677-48257B14.002C3970@zte.com.cn>
From: zhou.sujing@zte.com.cn
Date: Sat, 16 Feb 2013 16:02:20 +0800
X-MIMETrack: Serialize by Router on notes_smtp/zte_ltd(Release 8.5.3FP1 HF212|May 23, 2012) at 2013-02-16 16:02:17, Serialize complete at 2013-02-16 16:02:17
Content-Type: multipart/alternative; boundary="=_alternative 002C396D48257B14_="
X-MAIL: mse01.zte.com.cn r1G82cA3055373
Cc: IETF oauth WG <oauth@ietf.org>, oauth-bounces@ietf.org
Subject: Re: [OAUTH-WG] Minutes from the OAuth Design Team Conference Call - 11th February 2013
X-BeenThere: oauth@ietf.org
X-Mailman-Version: 2.1.12
Precedence: list
List-Id: OAUTH WG <oauth.ietf.org>
List-Unsubscribe: <https://www.ietf.org/mailman/options/oauth>, <mailto:oauth-request@ietf.org?subject=unsubscribe>
List-Archive: <http://www.ietf.org/mail-archive/web/oauth>
List-Post: <mailto:oauth@ietf.org>
List-Help: <mailto:oauth-request@ietf.org?subject=help>
List-Subscribe: <https://www.ietf.org/mailman/listinfo/oauth>, <mailto:oauth-request@ietf.org?subject=subscribe>
X-List-Received-Date: Sat, 16 Feb 2013 08:03:05 -0000

This is a multipart message in MIME format.
--=_alternative 002C396D48257B14_=
Content-Type: text/plain; charset="GB2312"
Content-Transfer-Encoding: base64
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--=_alternative 002C396D48257B14_=
Content-Type: text/html; charset="GB2312"
Content-Transfer-Encoding: base64
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--=_alternative 002C396D48257B14_=--

From wmills_92105@yahoo.com  Sat Feb 16 09:57:33 2013
Return-Path: <wmills_92105@yahoo.com>
X-Original-To: oauth@ietfa.amsl.com
Delivered-To: oauth@ietfa.amsl.com
Received: from localhost (localhost [127.0.0.1]) by ietfa.amsl.com (Postfix) with ESMTP id EF35421F84E2 for <oauth@ietfa.amsl.com>; Sat, 16 Feb 2013 09:57:32 -0800 (PST)
X-Virus-Scanned: amavisd-new at amsl.com
X-Spam-Flag: NO
X-Spam-Score: -2.327
X-Spam-Level: 
X-Spam-Status: No, score=-2.327 tagged_above=-999 required=5 tests=[AWL=0.271,  BAYES_00=-2.599, HTML_MESSAGE=0.001]
Received: from mail.ietf.org ([64.170.98.30]) by localhost (ietfa.amsl.com [127.0.0.1]) (amavisd-new, port 10024) with ESMTP id 5mllbQfXCZbb for <oauth@ietfa.amsl.com>; Sat, 16 Feb 2013 09:57:30 -0800 (PST)
Received: from nm22-vm0.bullet.mail.bf1.yahoo.com (nm22-vm0.bullet.mail.bf1.yahoo.com [98.139.212.126]) by ietfa.amsl.com (Postfix) with ESMTP id 2AE9821F8473 for <oauth@ietf.org>; Sat, 16 Feb 2013 09:57:30 -0800 (PST)
Received: from [98.139.215.140] by nm22.bullet.mail.bf1.yahoo.com with NNFMP; 16 Feb 2013 17:57:29 -0000
Received: from [98.139.212.219] by tm11.bullet.mail.bf1.yahoo.com with NNFMP; 16 Feb 2013 17:57:29 -0000
Received: from [127.0.0.1] by omp1028.mail.bf1.yahoo.com with NNFMP; 16 Feb 2013 17:57:29 -0000
X-Yahoo-Newman-Property: ymail-3
X-Yahoo-Newman-Id: 348269.60814.bm@omp1028.mail.bf1.yahoo.com
Received: (qmail 16313 invoked by uid 60001); 16 Feb 2013 17:57:28 -0000
DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=yahoo.com; s=s1024; t=1361037448; bh=l2DWkw+K+03UzlAylBNMUi5EURF89oU8XxG124tV9Wo=; h=X-YMail-OSG:Received:X-Rocket-MIMEInfo:X-Mailer:References:Message-ID:Date:From:Reply-To:Subject:To:Cc:In-Reply-To:MIME-Version:Content-Type; b=To3EHZL9/ij8RyBbic0BcT4e4dHT9eWLvofJSVo3USayQVaokj3YIh4Vd9KyoaCGv5Bl3NZqTX3yjkbKSlg8CZ8idYtJtKcaa0NLWbQdM4nNAIOVCpTrk6IjgvlV7YbbimeQifGGkPvsxIFdqCEhfcPv2zCF2EUSXn2uJwfGnRM=
DomainKey-Signature: a=rsa-sha1; q=dns; c=nofws; s=s1024; d=yahoo.com; h=X-YMail-OSG:Received:X-Rocket-MIMEInfo:X-Mailer:References:Message-ID:Date:From:Reply-To:Subject:To:Cc:In-Reply-To:MIME-Version:Content-Type; b=pRo0jRLd2yZSEgIUH8wh0n5/tV1ELQLZf+Ps2RFNJDixIN+pxcH7WmZnYtdrLMk0U6EXWlUdZSDOjWSPatCATW4Wn9y1/0Zgc0zylp+dQeqcRasQhpwfN5ivY0JXQxLTTumonAewwYudOIJZSGDZsy4oW39s4cBgWSJb2HUoDPw=;
X-YMail-OSG: C5k3XocVM1l..NAyKhCD9GhczBiDvfaDlOkKHbTFaMGZMf4 _Y.nWt_T6u4Swe6qgcfv2bI5qk4iaKQXyRs_TVab36qlkS8ri5OkwcAN.83c XP6ONoeydi4Bvxt7C6sF5Hkq2THLWqGhS0MPIKbUwNmwoEDWhJzFktshHGTf izIFZO3pwpxrxhiPiFsUH.JGnBcI.PRFzbJ5vAaTNn4Mfe8gTgMikkcn9hNo MOBkwL3_nGoOkAPqiFWNLRMdUAqK.JBoahUrMYAUQxVDSEFjaXzma95pb3Ih p8iF3vaKcwOlJh1M817VY3DtXFinjAbLsg6DECF9u545.u6LzRHVB9wKwMF0 f_J3I2SN15QVHLAvyt__Bg.9VRsTHOrwbyC58dGmcevsQzBsmy71jGb7GOT0 ip_pIGFZWkJ1_9SljvkP_d3FGgqOAjV8RiN9vIDR4FEAOgllfUdcwZJxUY7P XtOrhznWxH6TYZFAa0p_zjCsh8xQnEpxh9HDNJaCHPWugw0bnSCzMr_tV8rU XVyvYy2OsuAY.0mWno9n77SCckEfbRRcSxOwt6X4gZhlUvGbPk8AmFIWHIkk .U9v8gdqVqPdk2PqT6w23QEmJREamrHmtJBjUs6cTTjaVeFrRzn0c3Gs0FCZ otQRhJmaEa5VbhA6b5ddd7vQn3DMoDNHFiJ9DoVXVyskW8KB8BRuo..MqLwT oVwCZoFQq921r_EoiwUt4qxvCr68gSQ--
Received: from [209.131.62.115] by web31803.mail.mud.yahoo.com via HTTP; Sat, 16 Feb 2013 09:57:28 PST
X-Rocket-MIMEInfo: 001.001, VGhlIHJlYXNvbiB0byBzdXBwb3J0IDEuMGEgdG9rZW5zIGluIDIgaXMgc2ltcGx5IHRvIHByb3ZpZGUgYSBtaWdyYXRpb24gcGF0aCB3aGVuIGEgc2l0ZSBoYXMgMS4wYSBlbmRwb2ludCBpdCB3YW50cyB0byBzdXBwb3J0LgoKCl9fX19fX19fX19fX19fX19fX19fX19fX19fX19fX19fCiBGcm9tOiBQaGlsIEh1bnQgPHBoaWwuaHVudEBvcmFjbGUuY29tPgpUbzogV2lsbGlhbSBNaWxscyA8d21pbGxzXzkyMTA1QHlhaG9vLmNvbT4gCkNjOiBKdXN0aW4gUmljaGVyIDxqcmljaGVyQG1pdHJlLm9yZz47IFRpbSABMAEBAQE-
X-Mailer: YahooMailWebService/0.8.134.513
References: <0573984A-8C11-4960-9BC6-F44D4B664C19@gmx.net> <E808B6AC-D5F6-479F-967D-EA6B2586BE64@oracle.com> <511A7D27.8010209@mitre.org> <4E1F6AAD24975D4BA5B16804296739436744BD23@TK5EX14MBXC285.redmond.corp.microsoft.com> <1360891897.14004.YahooMailNeo@web31811.mail.mud.yahoo.com> <E7EBF78C-37EB-4737-8DD5-0F24C9FACA60@lodderstedt.net> <1360912115.36543.YahooMailNeo@web31811.mail.mud.yahoo.com> <2A0F585F-2CEF-418D-9654-5084E6C9BD0D@lodderstedt.net> <1360944589.51724.YahooMailNeo@web31808.mail.mud.yahoo.com> <CA+ZpN24dWAGtZR2aQcqC_N+sHsp7zBVe42LDbrkAsqNVqQPv0w@mail.gmail.com> <511EA0A3.7080000@mitre.org> <1360962242.18571.YahooMailNeo@web31805.mail.mud.yahoo.com> <BDE6C674-AEDE-4E73-9122-4F2A90F7F180@oracle.com> <1360994570.11377.YahooMailNeo@web31805.mail.mud.yahoo.com> <B4FE425C-B0D2-4D93-9148-CED74C34932E@oracle.com>
Message-ID: <1361037448.95269.YahooMailNeo@web31803.mail.mud.yahoo.com>
Date: Sat, 16 Feb 2013 09:57:28 -0800 (PST)
From: William Mills <wmills_92105@yahoo.com>
To: Phil Hunt <phil.hunt@oracle.com>
In-Reply-To: <B4FE425C-B0D2-4D93-9148-CED74C34932E@oracle.com>
MIME-Version: 1.0
Content-Type: multipart/alternative; boundary="1502656925-1936149940-1361037448=:95269"
Cc: IETF oauth WG <oauth@ietf.org>
Subject: Re: [OAUTH-WG] Minutes from the OAuth Design Team Conference Call - 11th February 2013
X-BeenThere: oauth@ietf.org
X-Mailman-Version: 2.1.12
Precedence: list
Reply-To: William Mills <wmills_92105@yahoo.com>
List-Id: OAUTH WG <oauth.ietf.org>
List-Unsubscribe: <https://www.ietf.org/mailman/options/oauth>, <mailto:oauth-request@ietf.org?subject=unsubscribe>
List-Archive: <http://www.ietf.org/mail-archive/web/oauth>
List-Post: <mailto:oauth@ietf.org>
List-Help: <mailto:oauth-request@ietf.org?subject=help>
List-Subscribe: <https://www.ietf.org/mailman/listinfo/oauth>, <mailto:oauth-request@ietf.org?subject=subscribe>
X-List-Received-Date: Sat, 16 Feb 2013 17:57:33 -0000

--1502656925-1936149940-1361037448=:95269
Content-Type: text/plain; charset=utf-8
Content-Transfer-Encoding: quoted-printable

The reason to support 1.0a tokens in 2 is simply to provide a migration pat=
h when a site has 1.0a endpoint it wants to support.=0A=0A=0A______________=
__________________=0A From: Phil Hunt <phil.hunt@oracle.com>=0ATo: William =
Mills <wmills_92105@yahoo.com> =0ACc: Justin Richer <jricher@mitre.org>; Ti=
m Bray <twbray@google.com>; IETF oauth WG <oauth@ietf.org> =0ASent: Friday,=
 February 15, 2013 11:22 PM=0ASubject: Re: [OAUTH-WG] Minutes from the OAut=
h Design Team Conference Call - 11th February 2013=0A =0A=0AI don't see oau=
th1 tokens as a short cut because eran said the token in oauth1 (which is i=
nside the oauth1 spec) had many implementation problems by client developer=
s. Why go there and re-invent what jwt could do easily?=0A=0ADo you need ho=
k? Do you need replay protection? Do you need message signing? Are asymmetr=
ic keys needed? =C2=A0I get the impression the group is less interested in =
the last two.=C2=A0=0A=0AThere is also key distribution to resource server.=
 I think we have client nailed but getting keys to resource server needs so=
me discussion - especially if the path is through the token itself. =C2=A0=
=0A=0AI suppose we can move faster if we assume rs obtains=C2=A0keys in an =
unspecified manner like what happened in oauth1.=C2=A0=0A=0APhil=0A=0ASent =
from my phone.=0A=0AOn 2013-02-15, at 22:02, William Mills <wmills_92105@ya=
hoo.com> wrote:=0A=0A=0AAll the same concepts/info are available in the AS:=
 client ID, client auth, and can deliver both token and secret. =C2=A0What'=
s magic once the client has the token that's missing?=0A>=0A>=0A>=0A>______=
__________________________=0A> From: Phil Hunt <phil.hunt@oracle.com>=0A>To=
: William Mills <wmills_92105@yahoo.com> =0A>Cc: Justin Richer <jricher@mit=
re.org>; Tim Bray <twbray@google.com>; IETF oauth WG <oauth@ietf.org> =0A>S=
ent: Friday, February 15, 2013 1:52 PM=0A>Subject: Re: [OAUTH-WG] Minutes f=
rom the OAuth Design Team Conference Call - 11th February 2013=0A> =0A>=0A>=
Sorry. I have to disagree. The way 1.0 is written, it is not a shortcut to =
turn it into a token for 2.=C2=A0=0A>=0A>Phil=0A>=0A>=0A>Sent from my phone=
.=0A>=0A>On 2013-02-15, at 13:04, William Mills <wmills_92105@yahoo.com> wr=
ote:=0A>=0A>=0A>>I've brought it up before, but I think it might be worthwh=
ile, at least as an exercise, to define a method to get OAuth1-style tokens=
 from an OAuth2 token endpoint. You'd defer to OAuth1 for how to use them >=
with a protected resource.=0A>>=0A>>=0A>>=0A>>YES!=0A>>=0A>>=0A>>=0A>>_____=
___________________________=0A>> From: Justin Richer <jricher@mitre.org>=0A=
>>To: Tim Bray <twbray@google.com> =0A>>Cc: William Mills <wmills_92105@yah=
oo.com>; IETF oauth WG <oauth@ietf.org> =0A>>Sent: Friday, February 15, 201=
3 12:54 PM=0A>>Subject: Re: [OAUTH-WG] Minutes from the OAuth Design Team C=
onference Call - 11th February 2013=0A>> =0A>>=0A>>So that you can fetch an=
d manage all your tokens using the same code paths as the OAuth2 services. =
The "get a token" part will be identical to Oauth2 Bearer (except for some =
details of what comes back from the token endpoint, of course), it's the "u=
se a token" bit that really changes and is up in the air. You get to use sc=
opes, and state, and refresh tokens, and all the other good stuff.=0A>>=0A>=
>I've brought it up before, but I think it might be worthwhile, at=0A    le=
ast as an exercise, to define a method to get OAuth1-style tokens=0A    fro=
m an OAuth2 token endpoint. You'd defer to OAuth1 for how to use=0A    them=
 with a protected resource.=0A>>=0A>>=C2=A0-- Justin=0A>>=0A>>=0A>>On 02/15=
/2013 11:49 AM, Tim Bray wrote:=0A>>=0A>>Not deeply acquainted with the Fli=
ckr scenario, but it occurs to me to ask: If OAuth 1.0 is working well for =
them, why don=E2=80=99t they just keep using it? =C2=A0I.e. if there=E2=80=
=99s already a good solution in place for people who require secure authn/a=
uthz over insecure channels, why would we go the extra work of duplicating =
that in OAuth 2 territory? -T=0A>>>=0A>>>=0A>>>On Fri, Feb 15, 2013 at 8:09=
 AM, William Mills <wmills_92105@yahoo.com> wrote:=0A>>>=0A>>>I'll repeat t=
he use case for Flickr, which requires OAuth 1.0a type capabilites that OAu=
th 2 does not provide. =C2=A0Simply stating "move to HTTPS" is not a viable=
 response here. =C2=A0=0A>>>>=0A>>>>=0A>>>>=0A>>>>_________________________=
_______=0A>>>> From: Torsten Lodderstedt <torsten@lodderstedt.net>=0A>>>>To=
: William Mills <wmills_92105@yahoo.com> =0A>>>>Cc: Mike Jones <Michael.Jon=
es@microsoft.com>; Justin Richer <jricher@mitre.org>; Phil Hunt <phil.hunt@=
oracle.com>; IETF oauth WG <oauth@ietf.org> =0A>>>>Sent: Friday, February 1=
5, 2013 7:22 AM=0A>>>>Subject: Re: [OAUTH-WG] Minutes from the OAuth Design=
 Team Conference Call - 11th February 2013=0A>>>> =0A>>>>=0A>>>>Hi Bill,=0A=
>>>>=0A>>>>=0A>>>>I think one needs to compare the costs/impact of HTTPS on=
 one side and the implementation of integrity protection and replay detecti=
on on the other. We had this discussion several times.=0A>>>>=0A>>>>=0A>>>>=
regards,=0A>>>>Torsten.=0A>>>>=0A>>>>Am 15.02.2013 um 08:08 schrieb William=
 Mills=0A                        <wmills_92105@yahoo.com>:=0A>>>>=0A>>>>=0A=
>>>>I fundamentally disagree with that too. =C2=A0OAuth 2 is the *framework=
*, one which supports multiple token types. =C2=A0Bearer tokens were the fi=
rst credential type defined.=0A>>>>>=0A>>>>>=0A>>>>>OAuth 1.0a also require=
s HTTPS transport for authentication and getting the token.=0A>>>>>=0A>>>>>=
=0A>>>>>There are =C2=A0real use cases for tokens usable over plain text wi=
th integrity protection.=0A>>>>>=0A>>>>>=0A>>>>>-bill=0A>>>>>=0A>>>>>=0A>>>=
>>=0A>>>>>________________________________=0A>>>>> From: Torsten Loddersted=
t <torsten@lodderstedt.net>=0A>>>>>To: William Mills <wmills_92105@yahoo.co=
m> =0A>>>>>Cc: Mike Jones <Michael.Jones@microsoft.com>; Justin Richer <jri=
cher@mitre.org>; Phil Hunt <phil.hunt@oracle.com>; IETF oauth WG <oauth@iet=
f.org> =0A>>>>>Sent: Thursday, February 14, 2013 10:05 PM=0A>>>>>Subject: R=
e: [OAUTH-WG] Minutes from the OAuth Design Team Conference Call - 11th Feb=
ruary 2013=0A>>>>> =0A>>>>>=0A>>>>>Hi Bill,=0A>>>>>=0A>>>>>=0A>>>>>OAuth 2.=
0 took a different direction by relying on HTTPS to provide the basic prote=
ction. So the need to have a token, which can be used for service requests =
over plain HTTP is arguable. My understanding of this activity was, the int=
end is to provide additional protection on top of HTTPS.=0A>>>>>=0A>>>>>=0A=
>>>>>regards,=0A>>>>>Torsten.=0A>>>>>=0A>>>>>Am 15.02.2013 um 02:31 schrieb=
=0A                                      William Mills <wmills_92105@yahoo.=
com>:=0A>>>>>=0A>>>>>=0A>>>>>I disagree with "That was the impediment to OA=
uth 1.0 adoption that OAuth 2.0 solved in the first place.", unless "solvin=
g" means does not address the need for it at all.=0A>>>>>>=0A>>>>>>=0A>>>>>=
>OAuth 2 does several good things, but it still lacks a defined token type =
that is safe to user over plain text HTTP. =C2=A01.0a solved that.=0A>>>>>>=
=0A>>>>>>=0A>>>>>>=0A>>>>>>________________________________=0A>>>>>> From: =
Mike Jones <Michael.Jones@microsoft.com>=0A>>>>>>To: Justin Richer <jricher=
@mitre.org>; Phil Hunt <phil.hunt@oracle.com> =0A>>>>>>Cc: IETF oauth WG <o=
auth@ietf.org> =0A>>>>>>Sent: Thursday, February 14, 2013 1:44 PM=0A>>>>>>S=
ubject: Re: [OAUTH-WG] Minutes from the OAuth Design Team Conference Call -=
 11th February 2013=0A>>>>>> =0A>>>>>>I'm in favor of reusing=0A           =
                                   the JWT work that this WG=0A            =
                                  is also doing. :-)=0A>>>>>>=0A>>>>>>I'm p=
retty skeptical of us=0A                                              inven=
ting another custom=0A                                              scheme =
for signing HTTP=0A                                              headers.=
=C2=A0 That was the=0A                                              impedim=
ent to OAuth 1.0=0A                                              adoption t=
hat OAuth 2.0=0A                                              solved in the=
 first place.=0A>>>>>>=0A>>>>>>=C2=A0=C2=A0=C2=A0 =C2=A0=C2=A0=C2=A0 =C2=A0=
=C2=A0=C2=A0 =C2=A0=C2=A0=C2=A0 -- Mike=0A>>>>>>=0A>>>>>>-----Original Mess=
age-----=0A>>>>>>From: oauth-bounces@ietf.org [mailto:oauth-bounces@ietf.or=
g] On Behalf Of Justin Richer=0A>>>>>>Sent: Tuesday, February=0A           =
                                   12, 2013 9:35 AM=0A>>>>>>To: Phil Hunt=
=0A>>>>>>Cc: IETF oauth WG=0A>>>>>>Subject: Re: [OAUTH-WG]=0A              =
                                Minutes from the OAuth=0A                  =
                            Design Team Conference=0A                      =
                        Call - 11th February 2013=0A>>>>>>=0A>>>>>>That's m=
y reading of it as=0A                                              well, Ph=
il, thanks for=0A                                              providing th=
e=0A                                              clarification. One=0A    =
                                          motivator behind using a=0A      =
                                        JSON-based token is to be=0A       =
                                       able to re-use some of the=0A       =
                                       great work that the JOSE=0A         =
                                     group is doing but apply=0A           =
                                   it to an HTTP payload.=0A>>>>>>=0A>>>>>>=
What neither of us want is=0A                                              =
a token type that requires=0A                                              =
stuffing all query,=0A                                              header,=
 and other=0A                                              parameters *into=
* the JSON=0A                                              object itself, w=
hich would=0A                                              be a more SOAPy =
approach.=0A>>>>>>=0A>>>>>>=C2=A0 -- Justin=0A>>>>>>=0A>>>>>>On 02/12/2013 =
12:30 PM,=0A                                              Phil Hunt wrote:=
=0A>>>>>>> Clarification.=C2=A0 I=0A                                       =
       think Justin and I were in=0A                                       =
       agreement that we don't=0A                                          =
    want to see a format that=0A                                           =
   requires JSON payloads.=C2=A0=0A                                        =
      We are both interested in=0A                                         =
     a JSON token used in the=0A                                           =
   authorization header that=0A                                            =
  could be based on a=0A                                              compu=
ted signature of some=0A                                              combi=
nation of http=0A                                              headers and =
body if=0A                                              possible.=0A>>>>>>>=
=0A>>>>>>> Phil=0A>>>>>>>=0A>>>>>>> @independentid=0A>>>>>>> www.independen=
tid.com=0A>>>>>>> phil.hunt@oracle.com=0A>>>>>>>=0A>>>>>>>=0A>>>>>>>=0A>>>>=
>>>=0A>>>>>>>=0A>>>>>>> On 2013-02-12, at=0A                               =
               1:10 AM, Hannes Tschofenig=0A                               =
               wrote:=0A>>>>>>>=0A>>>>>>>> Here are my=0A                  =
                            notes.=0A>>>>>>>>=0A>>>>>>>> Participants:=0A>>=
>>>>>>=0A>>>>>>>> * John Bradley=0A>>>>>>>> * Derek Atkins=0A>>>>>>>> * Phi=
l Hunt=0A>>>>>>>> * Prateek Mishra=0A>>>>>>>> * Hannes=0A                  =
                            Tschofenig=0A>>>>>>>> * Mike Jones=0A>>>>>>>> *=
 Antonio Sanso=0A>>>>>>>> * Justin Richer=0A>>>>>>>>=0A>>>>>>>> Notes:=0A>>=
>>>>>>=0A>>>>>>>> My slides are=0A                                         =
     available here: =0A>>>>>>>> http://www.tschofenig.priv.at/OAuth2-Secur=
ity-11Feb2013.ppt=0A>>>>>>>>=0A>>>>>>>> Slide #2=0A                        =
                      summarizes earlier=0A                                =
              discussions during the=0A                                    =
          conference calls.=0A>>>>>>>>=0A>>>>>>>> -- HTTP vs. JSON=0A>>>>>>=
>>=0A>>>>>>>> Phil noted that=0A                                           =
   he does not like to use=0A                                              =
the MAC Token draft as a=0A                                              st=
arting point because it=0A                                              doe=
s not re-use any of the=0A                                              wor=
k done in the JOSE=0A                                              working =
group and in=0A                                              particular all=
 the=0A                                              libraries that are=0A =
                                             available today. He=0A        =
                                      mentioned that earlier=0A            =
                                  attempts to write the MAC=0A             =
                                 Token code lead to=0A                     =
                         problems for implementers.=0A>>>>>>>>=0A>>>>>>>> J=
ustin responded=0A                                              that he doe=
s not agree=0A                                              with using JSON=
 as a=0A                                              transport mechanism s=
ince=0A                                              this would replicate a=
=0A                                              SOAP style.=0A>>>>>>>>=0A>=
>>>>>>> Phil noted that=0A                                              he =
wants to send JSON but=0A                                              the =
signature shall be=0A                                              computed=
 over the HTTP=0A                                              header field=
.=0A>>>>>>>>=0A>>>>>>>> -- Flexibility=0A                                  =
            for the keyed message=0A                                       =
       digest computation=0A>>>>>>>>=0A>>>>>>>>=C2=A0 From earlier=0A      =
                                        discussion it was clear=0A         =
                                     that the conference call=0A           =
                                   participants wanted more=0A             =
                                 flexibility regarding the=0A              =
                                keyed message digest=0A                    =
                          computation. For this=0A                         =
                     purpose Hannes presented=0A                           =
                   the DKIM based approach,=0A                             =
                 which allows selective=0A                                 =
             header fields to be=0A                                        =
      included in the digest.=0A                                           =
   This is shown in slide #4.=0A>>>>>>>>=0A>>>>>>>> After some=0A          =
                                    discussion the conference=0A           =
                                   call participants thought=0A            =
                                  that this would meet their=0A            =
                                  needs. Further=0A                        =
                      investigations would still=0A                        =
                      be useful to determine the=0A                        =
                      degree of failed HMAC=0A                             =
                 calculations due to HTTP=0A                               =
               proxies modifying the=0A                                    =
          content.=0A>>>>>>>>=0A>>>>>>>> -- Key=0A                         =
                     Distribution=0A>>>>>>>>=0A>>>>>>>> Hannes presented=0A=
                                              the open issue regarding=0A  =
                                            the choice of key =0A>>>>>>>> d=
istribution.=0A                                              Slides #6-#8 p=
resent three=0A                                              techniques and=
 Hannes=0A                                              asked =0A>>>>>>>> f=
or feedback=0A                                              regarding the p=
referred=0A                                              style. Justin and =
others=0A                                              didn't =0A>>>>>>>> s=
ee the need to=0A                                              decide on on=
e mechanism -=0A                                              they wanted t=
o keep the =0A>>>>>>>> choice open.=0A                                     =
         Derek indicated that this=0A                                      =
        will not be an acceptable =0A>>>>>>>> approach. Since=0A           =
                                   the resource server and=0A              =
                                the authorization server=0A                =
                              may, =0A>>>>>>>> in the OAuth 2.0=0A         =
                                     framework, be entities=0A             =
                                 produced by different=0A                  =
                            vendors =0A>>>>>>>> there is an=0A             =
                                 interoperability need.=0A                 =
                             Justin responded that he=0A                   =
                           disagrees =0A>>>>>>>> and that the=0A           =
                                   resource server needs to=0A             =
                                 understand the access=0A                  =
                            token and =0A>>>>>>>> referred to the=0A       =
                                       recent draft submission=0A          =
                                    for the token=0A                       =
                       introspection =0A>>>>>>>> endpoint. Derek=0A        =
                                      indicated that the=0A                =
                              resource server has to=0A                    =
                          understand =0A>>>>>>>> the content of=0A         =
                                     the access token and the=0A           =
                                   token introspection=0A                  =
                            endpoint =0A>>>>>>>> just pushes the=0A        =
                                      problem around: the=0A               =
                               resource server has to=0A                   =
                           send the =0A>>>>>>>> access token to=0A         =
                                     the authorization server=0A           =
                                   and then the resource=0A                =
                              server =0A>>>>>>>> gets the result=0A        =
                                      back (which he the=0A>>>>>>n=0A>>>>>>=
>=C2=A0 =C2=A0 a=0A>>>>>>>> gain needs to=0A                               =
               understand) in order to=0A                                  =
            make a meaningful=0A                                           =
   authorization decision.=0A>>>>>>>>=0A>>>>>>>> Everyone agreed=0A        =
                                      that the client must=0A              =
                                receive the session key=0A                 =
                             from the authorization=0A                     =
                         server and that this=0A                           =
                   approach has to be=0A                                   =
           standardized. It was also=0A                                    =
          agreed that this is a=0A                                         =
     common approach among all=0A                                          =
    three key distribution=0A                                              =
mechanisms.=0A>>>>>>>>=0A>>>>>>>> Hannes asked the=0A                      =
                        participants to think=0A                           =
                   about their preference.=0A>>>>>>>>=0A>>>>>>>> The questi=
ons=0A                                              regarding key naming an=
d=0A                                              the indication for the=0A=
                                              intended resource server=0A  =
                                            the client wants to talk=0A    =
                                          to have been postponed.=0A>>>>>>>=
>=0A>>>>>>>> Ciao=0A>>>>>>>> Hannes=0A>>>>>>>>=0A>>>>>>>>=0A>>>>>>>>=0A    =
                                          _________________________________=
______________=0A>>>>>>>> OAuth mailing=0A                                 =
             list=0A>>>>>>>> OAuth@ietf.org=0A>>>>>>>> https://www.ietf.org=
/mailman/listinfo/oauth=0A>>>>>>>=0A                                       =
       _______________________________________________=0A>>>>>>> OAuth mail=
ing list=0A>>>>>>> OAuth@ietf.org=0A>>>>>>> https://www.ietf.org/mailman/li=
stinfo/oauth=0A>>>>>>=0A>>>>>>=0A>>>>>>____________________________________=
___________=0A>>>>>>OAuth mailing list=0A>>>>>>OAuth@ietf.org=0A>>>>>>https=
://www.ietf.org/mailman/listinfo/oauth=0A>>>>>>____________________________=
___________________=0A>>>>>>OAuth mailing list=0A>>>>>>OAuth@ietf.org=0A>>>=
>>>https://www.ietf.org/mailman/listinfo/oauth=0A>>>>>>=0A>>>>>>=0A>>>>>>=
=0A>>>>>_______________________________________________=0A>>>>>>OAuth maili=
ng list=0A>>>>>>OAuth@ietf.org=0A>>>>>>https://www.ietf.org/mailman/listinf=
o/oauth=0A>>>>>>=0A>>>>>=0A>>>>>=0A>>>>=0A>>>>=0A>>>>______________________=
_________________________=0A>>>>OAuth mailing list=0A>>>>OAuth@ietf.org=0A>=
>>>https://www.ietf.org/mailman/listinfo/oauth=0A>>>>=0A>>>>=0A>>>=0A>>>=0A=
>>>=0A>>>_______________________________________________=0AOAuth mailing li=
st OAuth@ietf.org https://www.ietf.org/mailman/listinfo/oauth =0A>>=0A>>=0A=
>>=0A>_______________________________________________=0A>>OAuth mailing lis=
t=0A>>OAuth@ietf.org=0A>>https://www.ietf.org/mailman/listinfo/oauth=0A>>=
=0A>=0A>
--1502656925-1936149940-1361037448=:95269
Content-Type: text/html; charset=utf-8
Content-Transfer-Encoding: quoted-printable

<html><body><div style=3D"color:#000; background-color:#fff; font-family:Co=
urier New, courier, monaco, monospace, sans-serif;font-size:12pt"><div><spa=
n>The reason to support 1.0a tokens in 2 is simply to provide a migration p=
ath when a site has 1.0a endpoint it wants to support.</span></div><div><br=
></div>  <div style=3D"font-family: 'Courier New', courier, monaco, monospa=
ce, sans-serif; font-size: 12pt;"> <div style=3D"font-family: 'times new ro=
man', 'new york', times, serif; font-size: 12pt;"> <div dir=3D"ltr"> <font =
size=3D"2" face=3D"Arial"> <hr size=3D"1">  <b><span style=3D"font-weight:b=
old;">From:</span></b> Phil Hunt &lt;phil.hunt@oracle.com&gt;<br> <b><span =
style=3D"font-weight: bold;">To:</span></b> William Mills &lt;wmills_92105@=
yahoo.com&gt; <br><b><span style=3D"font-weight: bold;">Cc:</span></b> Just=
in Richer &lt;jricher@mitre.org&gt;; Tim Bray &lt;twbray@google.com&gt;; IE=
TF oauth WG &lt;oauth@ietf.org&gt; <br> <b><span style=3D"font-weight:
 bold;">Sent:</span></b> Friday, February 15, 2013 11:22 PM<br> <b><span st=
yle=3D"font-weight: bold;">Subject:</span></b> Re: [OAUTH-WG] Minutes from =
the OAuth Design Team Conference Call - 11th February 2013<br> </font> </di=
v> <br><div id=3D"yiv426951311"><div><div>I don't see oauth1 tokens as a sh=
ort cut because eran said the token in oauth1 (which is inside the oauth1 s=
pec) had many implementation problems by client developers. Why go there an=
d re-invent what jwt could do easily?<br><br>Do you need hok? Do you need r=
eplay protection? Do you need message signing? Are asymmetric keys needed? =
&nbsp;I get the impression the group is less interested in the last two.&nb=
sp;</div><div><br></div><div>There is also key distribution to resource ser=
ver. I think we have client nailed but getting keys to resource server need=
s some discussion - especially if the path is through the token itself. &nb=
sp;</div><div><br></div><div>I suppose we can move faster if we assume
 rs obtains&nbsp;keys in an unspecified manner like what happened in oauth1=
.&nbsp;</div><div><br></div><div>Phil<div><br></div><div>Sent from my phone=
.</div></div><div><br>On 2013-02-15, at 22:02, William Mills &lt;<a rel=3D"=
nofollow" ymailto=3D"mailto:wmills_92105@yahoo.com" target=3D"_blank" href=
=3D"mailto:wmills_92105@yahoo.com">wmills_92105@yahoo.com</a>&gt; wrote:<br=
><br></div><blockquote type=3D"cite"><div><div style=3D"color: rgb(0, 0, 0)=
; background-color: rgb(255, 255, 255); font-family: 'Courier New', courier=
, monaco, monospace, sans-serif; font-size: 12pt;"><div>All the same concep=
ts/info are available in the AS: client ID, client auth, and can deliver bo=
th token and secret. &nbsp;What's magic once the client has the token that'=
s missing?</div><div><br></div>  <div style=3D"font-family: 'Courier New', =
courier, monaco, monospace, sans-serif; font-size: 12pt;"> <div style=3D"fo=
nt-family: 'times new roman', 'new york', times, serif; font-size: 12pt;"> =
<div
 dir=3D"ltr"> <font size=3D"2" face=3D"Arial"> <hr size=3D"1">  <b><span st=
yle=3D"font-weight:bold;">From:</span></b> Phil Hunt &lt;<a rel=3D"nofollow=
" ymailto=3D"mailto:phil.hunt@oracle.com" target=3D"_blank" href=3D"mailto:=
phil.hunt@oracle.com">phil.hunt@oracle.com</a>&gt;<br> <b><span style=3D"fo=
nt-weight:bold;">To:</span></b> William Mills &lt;<a rel=3D"nofollow" ymail=
to=3D"mailto:wmills_92105@yahoo.com" target=3D"_blank" href=3D"mailto:wmill=
s_92105@yahoo.com">wmills_92105@yahoo.com</a>&gt; <br><b><span style=3D"fon=
t-weight:bold;">Cc:</span></b> Justin Richer &lt;<a rel=3D"nofollow" ymailt=
o=3D"mailto:jricher@mitre.org" target=3D"_blank" href=3D"mailto:jricher@mit=
re.org">jricher@mitre.org</a>&gt;; Tim Bray &lt;<a rel=3D"nofollow" ymailto=
=3D"mailto:twbray@google.com" target=3D"_blank" href=3D"mailto:twbray@googl=
e.com">twbray@google.com</a>&gt;; IETF oauth WG &lt;<a rel=3D"nofollow" yma=
ilto=3D"mailto:oauth@ietf.org" target=3D"_blank" href=3D"mailto:oauth@ietf.=
org">oauth@ietf.org</a>&gt; <br> <b><span
 style=3D"font-weight:bold;">Sent:</span></b> Friday, February 15, 2013 1:5=
2 PM<br> <b><span style=3D"font-weight:bold;">Subject:</span></b> Re: [OAUT=
H-WG] Minutes from the OAuth Design Team Conference Call - 11th February 20=
13<br> </font> </div> <br><div id=3D"yiv426951311"><div><div>Sorry. I have =
to disagree. The way 1.0 is written, it is not a shortcut to turn it into a=
 token for 2.&nbsp;<br><br>Phil<div><br></div><div>Sent from my phone.</div=
></div><div><br>On 2013-02-15, at 13:04, William Mills &lt;<a rel=3D"nofoll=
ow" ymailto=3D"mailto:wmills_92105@yahoo.com" target=3D"_blank" href=3D"mai=
lto:wmills_92105@yahoo.com">wmills_92105@yahoo.com</a>&gt; wrote:<br><br></=
div><blockquote type=3D"cite"><div><div style=3D"color: rgb(0, 0, 0); backg=
round-color: rgb(255, 255, 255); font-family: 'Courier New', courier, monac=
o, monospace, sans-serif; font-size: 12pt;"><div><span><span style=3D"font-=
family: 'times new roman', 'new york', times, serif;">&gt;I've brought it u=
p before,=0A but I think it might be worthwhile, at least as an exercise, t=
o define a method to get OAuth1-style tokens from an OAuth2 token endpoint.=
 You'd defer to OAuth1 for how to use them &gt;with a protected resource.</=
span><br style=3D"font-family: 'times new roman', 'new york', times, serif;=
"></span></div><div><br></div><div style=3D"color: rgb(0, 0, 0); font-size:=
 16px; font-family: 'Courier New', courier, monaco, monospace, sans-serif; =
background-color: transparent; font-style: normal;">YES!</div><div style=3D=
"color: rgb(0, 0, 0); font-size: 16px; font-family: 'Courier New', courier,=
 monaco, monospace, sans-serif; background-color: transparent; font-style: =
normal;"><br></div>  <div style=3D"font-family:'Courier=0A New', courier, m=
onaco, monospace, sans-serif;font-size:12pt;"> <div style=3D"font-family: '=
times new roman', 'new york', times, serif; font-size: 12pt;"> <div dir=3D"=
ltr"> <font size=3D"2" face=3D"Arial"> <hr size=3D"1">  <b><span style=3D"f=
ont-weight:bold;">From:</span></b> Justin Richer &lt;<a rel=3D"nofollow" ym=
ailto=3D"mailto:jricher@mitre.org" target=3D"_blank" href=3D"mailto:jricher=
@mitre.org">jricher@mitre.org</a>&gt;<br> <b><span style=3D"font-weight:bol=
d;">To:</span></b> Tim Bray &lt;<a rel=3D"nofollow" ymailto=3D"mailto:twbra=
y@google.com" target=3D"_blank" href=3D"mailto:twbray@google.com">twbray@go=
ogle.com</a>&gt; <br><b><span style=3D"font-weight:bold;">Cc:</span></b> Wi=
lliam Mills &lt;<a rel=3D"nofollow" ymailto=3D"mailto:wmills_92105@yahoo.co=
m" target=3D"_blank" href=3D"mailto:wmills_92105@yahoo.com">wmills_92105@ya=
hoo.com</a>&gt;; IETF oauth WG &lt;<a rel=3D"nofollow" ymailto=3D"mailto:oa=
uth@ietf.org" target=3D"_blank" href=3D"mailto:oauth@ietf.org">oauth@ietf.o=
rg</a>&gt; <br> <b><span
 style=3D"font-weight:bold;">Sent:</span></b> Friday, February 15, 2013 12:=
54 PM<br> <b><span style=3D"font-weight:bold;">Subject:</span></b> Re: [OAU=
TH-WG] Minutes from the OAuth Design Team Conference Call - 11th February 2=
013<br> </font> </div> <br><div id=3D"yiv426951311">=0A  =0A=0A    =0A  =0A=
  <div>=0A    So that you can fetch and manage all your tokens using the sa=
me code=0A    paths as the OAuth2 services. The "get a token" part will be=
=0A    identical to Oauth2 Bearer (except for some details of what comes=0A=
    back from the token endpoint, of course), it's the "use a token" bit=0A=
    that really changes and is up in the air. You get to use scopes, and=0A=
    state, and refresh tokens, and all the other good stuff.<br>=0A    <br>=
=0A    I've brought it up before, but I think it might be worthwhile, at=0A=
    least as an exercise, to define a method to get OAuth1-style tokens=0A =
   from an OAuth2 token endpoint. You'd defer to OAuth1 for how to use=0A  =
  them with a protected resource.<br>=0A    <br>=0A    &nbsp;-- Justin<br>=
=0A    <br>=0A    <div class=3D"yiv426951311moz-cite-prefix">On 02/15/2013 =
11:49 AM, Tim Bray wrote:<br>=0A    </div>=0A    <blockquote type=3D"cite">=
=0A      =0A      Not deeply acquainted with the Flickr scenario, but it oc=
curs to=0A      me to ask: If OAuth 1.0 is working well for them, why don=
=E2=80=99t they=0A      just keep using it? &nbsp;I.e. if there=E2=80=99s a=
lready a good solution in=0A      place for people who require secure authn=
/authz over insecure=0A      channels, why would we go the extra work of du=
plicating that in=0A      OAuth 2 territory? -T<br>=0A      <br>=0A      <d=
iv class=3D"yiv426951311gmail_quote">On Fri, Feb 15, 2013 at 8:09 AM, Willi=
am=0A        Mills <span dir=3D"ltr">&lt;<a rel=3D"nofollow" ymailto=3D"mai=
lto:wmills_92105@yahoo.com" target=3D"_blank" href=3D"mailto:wmills_92105@y=
ahoo.com">wmills_92105@yahoo.com</a>&gt;</span>=0A        wrote:<br>=0A    =
    <blockquote class=3D"yiv426951311gmail_quote" style=3D"margin:0 0 0 .8e=
x;border-left:1px #ccc solid;padding-left:1ex;">=0A          <div>=0A      =
      <div style=3D"font-size: 12pt; font-family: 'Courier New', courier, m=
onaco, monospace, sans-serif;">=0A              <div><span>I'll repeat the =
use case for Flickr, which=0A                  requires OAuth 1.0a type cap=
abilites that OAuth 2 does=0A                  not provide. &nbsp;Simply st=
ating "move to HTTPS" is not a=0A                  viable response here. &n=
bsp;</span></div>=0A              <div><br>=0A              </div>=0A      =
        <div style=3D"font-family:'Courier=0A                New', courier,=
 monaco, monospace, sans-serif;font-size:12pt;">=0A                <div sty=
le=3D"font-family:'times new roman', 'new=0A                  york', times,=
 serif;font-size:12pt;">=0A                  <div dir=3D"ltr"> <font face=
=3D"Arial">=0A                      <hr size=3D"1"> <b><span style=3D"font-=
weight:bold;">From:</span></b>=0A                      Torsten Lodderstedt =
&lt;<a rel=3D"nofollow" ymailto=3D"mailto:torsten@lodderstedt.net" target=
=3D"_blank" href=3D"mailto:torsten@lodderstedt.net">torsten@lodderstedt.net=
</a>&gt;<br>=0A                      <b><span style=3D"font-weight:bold;">T=
o:</span></b>=0A                      William Mills &lt;<a rel=3D"nofollow"=
 ymailto=3D"mailto:wmills_92105@yahoo.com" target=3D"_blank" href=3D"mailto=
:wmills_92105@yahoo.com">wmills_92105@yahoo.com</a>&gt; <br>=0A            =
          <b><span style=3D"font-weight:bold;">Cc:</span></b>=0A           =
           Mike Jones &lt;<a rel=3D"nofollow" ymailto=3D"mailto:Michael.Jon=
es@microsoft.com" target=3D"_blank" href=3D"mailto:Michael.Jones@microsoft.=
com">Michael.Jones@microsoft.com</a>&gt;;=0A                      Justin Ri=
cher &lt;<a rel=3D"nofollow" ymailto=3D"mailto:jricher@mitre.org" target=3D=
"_blank" href=3D"mailto:jricher@mitre.org">jricher@mitre.org</a>&gt;;=0A   =
                   Phil Hunt &lt;<a rel=3D"nofollow" ymailto=3D"mailto:phil=
.hunt@oracle.com" target=3D"_blank" href=3D"mailto:phil.hunt@oracle.com">ph=
il.hunt@oracle.com</a>&gt;;=0A                      IETF oauth WG &lt;<a re=
l=3D"nofollow" ymailto=3D"mailto:oauth@ietf.org" target=3D"_blank" href=3D"=
mailto:oauth@ietf.org">oauth@ietf.org</a>&gt;=0A                      <br>=
=0A                      <b><span style=3D"font-weight:bold;">Sent:</span><=
/b>=0A                      Friday, February 15, 2013 7:22 AM<br>=0A       =
               <b><span style=3D"font-weight:bold;">Subject:</span></b>=0A =
                     Re: [OAUTH-WG] Minutes from the OAuth Design Team=0A  =
                    Conference Call - 11th February 2013<br>=0A            =
        </font> </div>=0A                  <br>=0A                  <div>=
=0A                    <div>=0A                      <div>Hi Bill,</div>=0A=
                      <div><br>=0A                      </div>=0A          =
            <div>I think one needs to compare the costs/impact=0A          =
              of HTTPS on one side and the implementation of=0A            =
            integrity protection and replay detection on the=0A            =
            other. We had this discussion several times.</div>=0A          =
            <div><br>=0A                      </div>=0A                    =
  <div>regards,</div>=0A                      <div>Torsten.</div>=0A       =
               <div><br>=0A                        Am 15.02.2013 um 08:08 s=
chrieb William Mills=0A                        &lt;<a rel=3D"nofollow" ymai=
lto=3D"mailto:wmills_92105@yahoo.com" target=3D"_blank" href=3D"mailto:wmil=
ls_92105@yahoo.com">wmills_92105@yahoo.com</a>&gt;:<br>=0A                 =
       <br>=0A                      </div>=0A                      <blockqu=
ote type=3D"cite">=0A                        <div>=0A                      =
    <div style=3D"font-size:12pt;font-family:'Courier=0A                   =
         New', courier, monaco, monospace, sans-serif;">=0A                =
            <div><span>I fundamentally disagree with=0A                    =
            that too. &nbsp;OAuth 2 is the *framework*,=0A                 =
               one which supports multiple token types.=0A                 =
               &nbsp;Bearer tokens were the first credential=0A            =
                    type defined.</span></div>=0A                          =
  <div style=3D"font-style:normal;font-size:16px;background-color:transpare=
nt;font-family:'Courier=0A                              New', courier, mona=
co, monospace, sans-serif;"><span><br>=0A                              </sp=
an></div>=0A                            <div style=3D"font-style:normal;fon=
t-size:16px;background-color:transparent;font-family:'Courier=0A           =
                   New', courier, monaco, monospace, sans-serif;">=0A      =
                        <span>OAuth 1.0a also requires HTTPS=0A            =
                    transport for authentication and getting=0A            =
                    the token.</span></div>=0A                            <=
div style=3D"font-style:normal;font-size:16px;background-color:transparent;=
font-family:'Courier=0A                              New', courier, monaco,=
 monospace, sans-serif;">=0A                              <span><br>=0A    =
                          </span></div>=0A                            <div =
style=3D"font-style:normal;font-size:16px;background-color:transparent;font=
-family:'Courier=0A                              New', courier, monaco, mon=
ospace, sans-serif;"><span>There=0A                                are &nbs=
p;real use cases for tokens usable=0A                                over p=
lain text with integrity=0A                                protection.</spa=
n></div>=0A                            <div style=3D"font-style:normal;font=
-size:16px;background-color:transparent;font-family:'Courier=0A            =
                  New', courier, monaco, monospace, sans-serif;"><span><br>=
=0A                              </span></div>=0A                          =
  <div style=3D"font-style:normal;font-size:16px;background-color:transpare=
nt;font-family:'Courier=0A                              New', courier, mona=
co, monospace, sans-serif;">=0A                              <span>-bill</s=
pan></div>=0A                            <div><br>=0A                      =
      </div>=0A                            <div style=3D"font-family:'Couri=
er=0A                              New', courier, monaco, monospace, sans-s=
erif;font-size:12pt;">=0A                              <div style=3D"font-f=
amily:'times new=0A                                roman', 'new=0A         =
                       york', times, serif;font-size:12pt;">=0A            =
                    <div dir=3D"ltr"> <font face=3D"Arial">=0A             =
                       <hr size=3D"1"> <b><span style=3D"font-weight:bold;"=
>From:</span></b>=0A                                    Torsten Lodderstedt=
 &lt;<a rel=3D"nofollow" ymailto=3D"mailto:torsten@lodderstedt.net" target=
=3D"_blank" href=3D"mailto:torsten@lodderstedt.net">torsten@lodderstedt.net=
</a>&gt;<br>=0A                                    <b><span style=3D"font-w=
eight:bold;">To:</span></b>=0A                                    William M=
ills &lt;<a rel=3D"nofollow" ymailto=3D"mailto:wmills_92105@yahoo.com" targ=
et=3D"_blank" href=3D"mailto:wmills_92105@yahoo.com">wmills_92105@yahoo.com=
</a>&gt;=0A                                    <br>=0A                     =
               <b><span style=3D"font-weight:bold;">Cc:</span></b>=0A      =
                              Mike Jones &lt;<a rel=3D"nofollow" ymailto=3D=
"mailto:Michael.Jones@microsoft.com" target=3D"_blank" href=3D"mailto:Micha=
el.Jones@microsoft.com">Michael.Jones@microsoft.com</a>&gt;;=0A            =
                        Justin Richer &lt;<a rel=3D"nofollow" ymailto=3D"ma=
ilto:jricher@mitre.org" target=3D"_blank" href=3D"mailto:jricher@mitre.org"=
>jricher@mitre.org</a>&gt;;=0A                                    Phil Hunt=
 &lt;<a rel=3D"nofollow" ymailto=3D"mailto:phil.hunt@oracle.com" target=3D"=
_blank" href=3D"mailto:phil.hunt@oracle.com">phil.hunt@oracle.com</a>&gt;;=
=0A                                    IETF oauth WG &lt;<a rel=3D"nofollow=
" ymailto=3D"mailto:oauth@ietf.org" target=3D"_blank" href=3D"mailto:oauth@=
ietf.org">oauth@ietf.org</a>&gt;=0A                                    <br>=
=0A                                    <b><span style=3D"font-weight:bold;"=
>Sent:</span></b>=0A                                    Thursday, February =
14, 2013 10:05 PM<br>=0A                                    <b><span style=
=3D"font-weight:bold;">Subject:</span></b>=0A                              =
      Re: [OAUTH-WG] Minutes from the=0A                                   =
 OAuth Design Team Conference Call -=0A                                    =
11th February 2013<br>=0A                                  </font> </div>=
=0A                                <br>=0A                                <=
div>=0A                                  <div>=0A                          =
          <div>Hi Bill,</div>=0A                                    <div><b=
r>=0A                                    </div>=0A                         =
           <div>OAuth 2.0 took a different=0A                              =
        direction by relying on HTTPS to=0A                                =
      provide the basic protection. So=0A                                  =
    the need to have a token, which=0A                                     =
 can be used for service requests=0A                                      o=
ver plain HTTP is arguable. My=0A                                      unde=
rstanding of this activity=0A                                      was, the=
 intend is to provide=0A                                      additional pr=
otection on top of=0A                                      HTTPS.</div>=0A =
                                   <div><br>=0A                            =
        </div>=0A                                    <div>regards,</div>=0A=
                                    <div>Torsten.</div>=0A                 =
                   <div><br>=0A                                      Am 15.=
02.2013 um 02:31 schrieb=0A                                      William Mi=
lls &lt;<a rel=3D"nofollow" ymailto=3D"mailto:wmills_92105@yahoo.com" targe=
t=3D"_blank" href=3D"mailto:wmills_92105@yahoo.com">wmills_92105@yahoo.com<=
/a>&gt;:<br>=0A                                      <br>=0A               =
                     </div>=0A                                    <blockquo=
te type=3D"cite">=0A                                      <div>=0A         =
                               <div style=3D"font-size:12pt;font-family:'Co=
urier=0ANew', courier, monaco, monospace, sans-serif;">=0A                 =
                         <div><span>I disagree with "</span><span style=3D"=
font-family:'times=0A                                              new roma=
n', 'new=0A                                              york', times, seri=
f;font-size:12pt;">That=0A                                              was=
 the impediment to=0A                                              OAuth 1.=
0 adoption that=0A                                              OAuth 2.0 s=
olved in the=0A                                              first place.",=
 unless=0A                                              "solving" means doe=
s not=0A                                              address the need for =
it at=0A                                              all.</span></div>=0A =
                                         <div style=3D"font-style:normal;fo=
nt-size:12pt;background-color:transparent;font-family:'times=0A            =
                                new roman', 'new=0A                        =
                    york', times, serif;">=0A                              =
              <span style=3D"font-family:'times=0A                         =
                     new roman', 'new=0A                                   =
           york', times, serif;font-size:12pt;"><br>=0A                    =
                        </span></div>=0A                                   =
       <div style=3D"font-style:normal;font-size:16px;background-color:tran=
sparent;font-family:'times=0A                                            ne=
w roman', 'new=0A                                            york', times, =
serif;">=0A                                            <span style=3D"font-=
family:'times=0A                                              new roman', '=
new=0A                                              york', times, serif;fon=
t-size:12pt;">OAuth=0A                                              2 does =
several good=0A                                              things, but it=
 still lacks=0A                                              a defined toke=
n type that=0A                                              is safe to user=
 over plain=0A                                              text HTTP. &nbs=
p;1.0a solved=0A                                              that.</span><=
/div>=0A                                          <div><br>=0A             =
                             </div>=0A                                     =
     <div style=3D"font-family:'Courier=0ANew', courier, monaco, monospace,=
 sans-serif;font-size:12pt;">=0A                                           =
 <div style=3D"font-family:'times=0A                                       =
       new roman', 'new=0A                                              yor=
k', times, serif;font-size:12pt;">=0A                                      =
        <div dir=3D"ltr"> <font face=3D"Arial">=0A                         =
                         <hr size=3D"1"> <b><span style=3D"font-weight:bold=
;">From:</span></b> Mike Jones &lt;<a rel=3D"nofollow" ymailto=3D"mailto:Mi=
chael.Jones@microsoft.com" target=3D"_blank" href=3D"mailto:Michael.Jones@m=
icrosoft.com">Michael.Jones@microsoft.com</a>&gt;<br>=0A                   =
                               <b><span style=3D"font-weight:bold;">To:</sp=
an></b>=0A                                                  Justin Richer &=
lt;<a rel=3D"nofollow" ymailto=3D"mailto:jricher@mitre.org" target=3D"_blan=
k" href=3D"mailto:jricher@mitre.org">jricher@mitre.org</a>&gt;;=0A         =
                                         Phil Hunt &lt;<a rel=3D"nofollow" =
ymailto=3D"mailto:phil.hunt@oracle.com" target=3D"_blank" href=3D"mailto:ph=
il.hunt@oracle.com">phil.hunt@oracle.com</a>&gt;=0A                        =
                          <br>=0A                                          =
        <b><span style=3D"font-weight:bold;">Cc:</span></b>=0A             =
                                     IETF oauth WG &lt;<a rel=3D"nofollow" =
ymailto=3D"mailto:oauth@ietf.org" target=3D"_blank" href=3D"mailto:oauth@ie=
tf.org">oauth@ietf.org</a>&gt;=0A                                          =
        <br>=0A                                                  <b><span s=
tyle=3D"font-weight:bold;">Sent:</span></b>=0A                             =
                     Thursday, February 14,=0A                             =
                     2013 1:44 PM<br>=0A                                   =
               <b><span style=3D"font-weight:bold;">Subject:</span></b>=0A =
                                                 Re: [OAUTH-WG] Minutes=0A =
                                                 from the OAuth Design=0A  =
                                                Team Conference Call -=0A  =
                                                11th February 2013<br>=0A  =
                                              </font> </div>=0A            =
                                  <br>=0A                                  =
            I'm in favor of reusing=0A                                     =
         the JWT work that this WG=0A                                      =
        is also doing. :-)<br>=0A                                          =
    <br>=0A                                              I'm pretty skeptic=
al of us=0A                                              inventing another =
custom=0A                                              scheme for signing H=
TTP=0A                                              headers.&nbsp; That was=
 the=0A                                              impediment to OAuth 1.=
0=0A                                              adoption that OAuth 2.0=
=0A                                              solved in the first place.=
<br>=0A                                              <br>=0A               =
                               &nbsp;&nbsp;&nbsp; &nbsp;&nbsp;&nbsp; &nbsp;=
&nbsp;&nbsp; &nbsp;&nbsp;&nbsp; -- Mike<br>=0A                             =
                 <br>=0A                                              -----=
Original Message-----<br>=0A                                              F=
rom: <a rel=3D"nofollow" ymailto=3D"mailto:oauth-bounces@ietf.org" target=
=3D"_blank" href=3D"mailto:oauth-bounces@ietf.org">oauth-bounces@ietf.org</=
a>=0A                                              [mailto:<a rel=3D"nofoll=
ow" ymailto=3D"mailto:oauth-bounces@ietf.org" target=3D"_blank" href=3D"mai=
lto:oauth-bounces@ietf.org">oauth-bounces@ietf.org</a>]=0A                 =
                             On Behalf Of Justin Richer<br>=0A             =
                                 Sent: Tuesday, February=0A                =
                              12, 2013 9:35 AM<br>=0A                      =
                        To: Phil Hunt<br>=0A                               =
               Cc: IETF oauth WG<br>=0A                                    =
          Subject: Re: [OAUTH-WG]=0A                                       =
       Minutes from the OAuth=0A                                           =
   Design Team Conference=0A                                              C=
all - 11th February 2013<br>=0A                                            =
  <br>=0A                                              That's my reading of=
 it as=0A                                              well, Phil, thanks f=
or=0A                                              providing the=0A        =
                                      clarification. One=0A                =
                              motivator behind using a=0A                  =
                            JSON-based token is to be=0A                   =
                           able to re-use some of the=0A                   =
                           great work that the JOSE=0A                     =
                         group is doing but apply=0A                       =
                       it to an HTTP payload.<br>=0A                       =
                       <br>=0A                                             =
 What neither of us want is=0A                                             =
 a token type that requires=0A                                             =
 stuffing all query,=0A                                              header=
, and other=0A                                              parameters *int=
o* the JSON=0A                                              object itself, =
which would=0A                                              be a more SOAPy=
 approach.<br>=0A                                              <br>=0A     =
                                         &nbsp; -- Justin<br>=0A           =
                                   <br>=0A                                 =
             On 02/12/2013 12:30 PM,=0A                                    =
          Phil Hunt wrote:<br>=0A                                          =
    &gt; Clarification.&nbsp; I=0A                                         =
     think Justin and I were in=0A                                         =
     agreement that we don't=0A                                            =
  want to see a format that=0A                                             =
 requires JSON payloads.&nbsp;=0A                                          =
    We are both interested in=0A                                           =
   a JSON token used in the=0A                                             =
 authorization header that=0A                                              =
could be based on a=0A                                              compute=
d signature of some=0A                                              combina=
tion of http=0A                                              headers and bo=
dy if=0A                                              possible.<br>=0A     =
                                         &gt;<br>=0A                       =
                       &gt; Phil<br>=0A                                    =
          &gt;<br>=0A                                              &gt; @in=
dependentid<br>=0A                                              &gt; <a rel=
=3D"nofollow" target=3D"_blank" href=3D"http://www.independentid.com/">www.=
independentid.com</a><br>=0A                                              &=
gt; <a rel=3D"nofollow" ymailto=3D"mailto:phil.hunt@oracle.com" target=3D"_=
blank" href=3D"mailto:phil.hunt@oracle.com">phil.hunt@oracle.com</a><br>=0A=
                                              &gt;<br>=0A                  =
                            &gt;<br>=0A                                    =
          &gt;<br>=0A                                              &gt;<br>=
=0A                                              &gt;<br>=0A               =
                               &gt; On 2013-02-12, at=0A                   =
                           1:10 AM, Hannes Tschofenig=0A                   =
                           wrote:<br>=0A                                   =
           &gt;<br>=0A                                              &gt;&gt=
; Here are my=0A                                              notes.<br>=0A=
                                              &gt;&gt;<br>=0A              =
                                &gt;&gt; Participants:<br>=0A              =
                                &gt;&gt;<br>=0A                            =
                  &gt;&gt; * John Bradley<br>=0A                           =
                   &gt;&gt; * Derek Atkins<br>=0A                          =
                    &gt;&gt; * Phil Hunt<br>=0A                            =
                  &gt;&gt; * Prateek Mishra<br>=0A                         =
                     &gt;&gt; * Hannes=0A                                  =
            Tschofenig<br>=0A                                              =
&gt;&gt; * Mike Jones<br>=0A                                              &=
gt;&gt; * Antonio Sanso<br>=0A                                             =
 &gt;&gt; * Justin Richer<br>=0A                                           =
   &gt;&gt;<br>=0A                                              &gt;&gt; No=
tes:<br>=0A                                              &gt;&gt;<br>=0A   =
                                           &gt;&gt; My slides are=0A       =
                                       available here: <br>=0A             =
                                 &gt;&gt; <a rel=3D"nofollow" target=3D"_bl=
ank" href=3D"http://www.tschofenig.priv.at/OAuth2-Security-11Feb2013.ppt">h=
ttp://www.tschofenig.priv.at/OAuth2-Security-11Feb2013.ppt</a><br>=0A      =
                                        &gt;&gt;<br>=0A                    =
                          &gt;&gt; Slide #2=0A                             =
                 summarizes earlier=0A                                     =
         discussions during the=0A                                         =
     conference calls.<br>=0A                                              =
&gt;&gt;<br>=0A                                              &gt;&gt; -- HT=
TP vs. JSON<br>=0A                                              &gt;&gt;<br=
>=0A                                              &gt;&gt; Phil noted that=
=0A                                              he does not like to use=0A=
                                              the MAC Token draft as a=0A  =
                                            starting point because it=0A   =
                                           does not re-use any of the=0A   =
                                           work done in the JOSE=0A        =
                                      working group and in=0A              =
                                particular all the=0A                      =
                        libraries that are=0A                              =
                available today. He=0A                                     =
         mentioned that earlier=0A                                         =
     attempts to write the MAC=0A                                          =
    Token code lead to=0A                                              prob=
lems for implementers.<br>=0A                                              =
&gt;&gt;<br>=0A                                              &gt;&gt; Justi=
n responded=0A                                              that he does no=
t agree=0A                                              with using JSON as =
a=0A                                              transport mechanism since=
=0A                                              this would replicate a=0A =
                                             SOAP style.<br>=0A            =
                                  &gt;&gt;<br>=0A                          =
                    &gt;&gt; Phil noted that=0A                            =
                  he wants to send JSON but=0A                             =
                 the signature shall be=0A                                 =
             computed over the HTTP=0A                                     =
         header field.<br>=0A                                              =
&gt;&gt;<br>=0A                                              &gt;&gt; -- Fl=
exibility=0A                                              for the keyed mes=
sage=0A                                              digest computation<br>=
=0A                                              &gt;&gt;<br>=0A           =
                                   &gt;&gt;&nbsp; From earlier=0A          =
                                    discussion it was clear=0A             =
                                 that the conference call=0A               =
                               participants wanted more=0A                 =
                             flexibility regarding the=0A                  =
                            keyed message digest=0A                        =
                      computation. For this=0A                             =
                 purpose Hannes presented=0A                               =
               the DKIM based approach,=0A                                 =
             which allows selective=0A                                     =
         header fields to be=0A                                            =
  included in the digest.=0A                                              T=
his is shown in slide #4.<br>=0A                                           =
   &gt;&gt;<br>=0A                                              &gt;&gt; Af=
ter some=0A                                              discussion the con=
ference=0A                                              call participants t=
hought=0A                                              that this would meet=
 their=0A                                              needs. Further=0A   =
                                           investigations would still=0A   =
                                           be useful to determine the=0A   =
                                           degree of failed HMAC=0A        =
                                      calculations due to HTTP=0A          =
                                    proxies modifying the=0A               =
                               content.<br>=0A                             =
                 &gt;&gt;<br>=0A                                           =
   &gt;&gt; -- Key=0A                                              Distribu=
tion<br>=0A                                              &gt;&gt;<br>=0A   =
                                           &gt;&gt; Hannes presented=0A    =
                                          the open issue regarding=0A      =
                                        the choice of key <br>=0A          =
                                    &gt;&gt; distribution.=0A              =
                                Slides #6-#8 present three=0A              =
                                techniques and Hannes=0A                   =
                           asked <br>=0A                                   =
           &gt;&gt; for feedback=0A                                        =
      regarding the preferred=0A                                           =
   style. Justin and others=0A                                             =
 didn't <br>=0A                                              &gt;&gt; see t=
he need to=0A                                              decide on one me=
chanism -=0A                                              they wanted to ke=
ep the <br>=0A                                              &gt;&gt; choice=
 open.=0A                                              Derek indicated that=
 this=0A                                              will not be an accept=
able=0A                                              <br>=0A               =
                               &gt;&gt; approach. Since=0A                 =
                             the resource server and=0A                    =
                          the authorization server=0A                      =
                        may, <br>=0A                                       =
       &gt;&gt; in the OAuth 2.0=0A                                        =
      framework, be entities=0A                                            =
  produced by different=0A                                              ven=
dors <br>=0A                                              &gt;&gt; there is=
 an=0A                                              interoperability need.=
=0A                                              Justin responded that he=
=0A                                              disagrees <br>=0A         =
                                     &gt;&gt; and that the=0A              =
                                resource server needs to=0A                =
                              understand the access=0A                     =
                         token and <br>=0A                                 =
             &gt;&gt; referred to the=0A                                   =
           recent draft submission=0A                                      =
        for the token=0A                                              intro=
spection <br>=0A                                              &gt;&gt; endp=
oint. Derek=0A                                              indicated that =
the=0A                                              resource server has to=
=0A                                              understand <br>=0A        =
                                      &gt;&gt; the content of=0A           =
                                   the access token and the=0A             =
                                 token introspection=0A                    =
                          endpoint <br>=0A                                 =
             &gt;&gt; just pushes the=0A                                   =
           problem around: the=0A                                          =
    resource server has to=0A                                              =
send the <br>=0A                                              &gt;&gt; acce=
ss token to=0A                                              the authorizati=
on server=0A                                              and then the reso=
urce=0A                                              server <br>=0A        =
                                      &gt;&gt; gets the result=0A          =
                                    back (which he the<br>=0A              =
                                n<br>=0A                                   =
           &gt;&nbsp; &nbsp; a<br>=0A                                      =
        &gt;&gt; gain needs to=0A                                          =
    understand) in order to=0A                                             =
 make a meaningful=0A                                              authoriz=
ation decision.<br>=0A                                              &gt;&gt=
;<br>=0A                                              &gt;&gt; Everyone agr=
eed=0A                                              that the client must=0A=
                                              receive the session key=0A   =
                                           from the authorization=0A       =
                                       server and that this=0A             =
                                 approach has to be=0A                     =
                         standardized. It was also=0A                      =
                        agreed that this is a=0A                           =
                   common approach among all=0A                            =
                  three key distribution=0A                                =
              mechanisms.<br>=0A                                           =
   &gt;&gt;<br>=0A                                              &gt;&gt; Ha=
nnes asked the=0A                                              participants=
 to think=0A                                              about their prefe=
rence.<br>=0A                                              &gt;&gt;<br>=0A =
                                             &gt;&gt; The questions=0A     =
                                         regarding key naming and=0A       =
                                       the indication for the=0A           =
                                   intended resource server=0A             =
                                 the client wants to talk=0A               =
                               to have been postponed.<br>=0A              =
                                &gt;&gt;<br>=0A                            =
                  &gt;&gt; Ciao<br>=0A                                     =
         &gt;&gt; Hannes<br>=0A                                            =
  &gt;&gt;<br>=0A                                              &gt;&gt;<br>=
=0A                                              &gt;&gt;=0A               =
                               ____________________________________________=
___<br>=0A                                              &gt;&gt; OAuth mail=
ing=0A                                              list<br>=0A            =
                                  &gt;&gt; <a rel=3D"nofollow" ymailto=3D"m=
ailto:OAuth@ietf.org" target=3D"_blank" href=3D"mailto:OAuth@ietf.org">OAut=
h@ietf.org</a><br>=0A                                              &gt;&gt;=
 <a rel=3D"nofollow" target=3D"_blank" href=3D"https://www.ietf.org/mailman=
/listinfo/oauth">https://www.ietf.org/mailman/listinfo/oauth</a><br>=0A    =
                                          &gt;=0A                          =
                    _______________________________________________<br>=0A =
                                             &gt; OAuth mailing list<br>=0A=
                                              &gt; <a rel=3D"nofollow" ymai=
lto=3D"mailto:OAuth@ietf.org" target=3D"_blank" href=3D"mailto:OAuth@ietf.o=
rg">OAuth@ietf.org</a><br>=0A                                              =
&gt; <a rel=3D"nofollow" target=3D"_blank" href=3D"https://www.ietf.org/mai=
lman/listinfo/oauth">https://www.ietf.org/mailman/listinfo/oauth</a><br>=0A=
                                              <br>=0A                      =
                        <br>=0A____________________________________________=
___<br>=0A                                              OAuth mailing list<=
br>=0A                                              <a rel=3D"nofollow" yma=
ilto=3D"mailto:OAuth@ietf.org" target=3D"_blank" href=3D"mailto:OAuth@ietf.=
org">OAuth@ietf.org</a><br>=0A                                             =
 <a rel=3D"nofollow" target=3D"_blank" href=3D"https://www.ietf.org/mailman=
/listinfo/oauth">https://www.ietf.org/mailman/listinfo/oauth</a><br>=0A____=
___________________________________________<br>=0A                         =
                     OAuth mailing list<br>=0A                             =
                 <a rel=3D"nofollow" ymailto=3D"mailto:OAuth@ietf.org" targ=
et=3D"_blank" href=3D"mailto:OAuth@ietf.org">OAuth@ietf.org</a><br>=0A     =
                                         <a rel=3D"nofollow" target=3D"_bla=
nk" href=3D"https://www.ietf.org/mailman/listinfo/oauth">https://www.ietf.o=
rg/mailman/listinfo/oauth</a><br>=0A                                       =
       <br>=0A                                              <br>=0A        =
                                    </div>=0A                              =
            </div>=0A                                        </div>=0A     =
                                 </div>=0A                                 =
   </blockquote>=0A                                    <blockquote type=3D"=
cite">=0A                                      <div><span>_________________=
______________________________</span><br>=0A                               =
         <span>OAuth mailing list</span><br>=0A                            =
            <span><a rel=3D"nofollow" ymailto=3D"mailto:OAuth@ietf.org" tar=
get=3D"_blank" href=3D"mailto:OAuth@ietf.org">OAuth@ietf.org</a></span><br>=
=0A                                        <span><a rel=3D"nofollow" target=
=3D"_blank" href=3D"https://www.ietf.org/mailman/listinfo/oauth">https://ww=
w.ietf.org/mailman/listinfo/oauth</a></span><br>=0A                        =
              </div>=0A                                    </blockquote>=0A=
                                  </div>=0A                                =
</div>=0A                                <br>=0A                           =
     <br>=0A                              </div>=0A                        =
    </div>=0A                          </div>=0A                        </d=
iv>=0A                      </blockquote>=0A                    </div>=0A  =
                </div>=0A                  <br>=0A                  <br>=0A=
                </div>=0A              </div>=0A            </div>=0A      =
    </div>=0A          <br>=0A          ___________________________________=
____________<br>=0A          OAuth mailing list<br>=0A          <a rel=3D"n=
ofollow" ymailto=3D"mailto:OAuth@ietf.org" target=3D"_blank" href=3D"mailto=
:OAuth@ietf.org">OAuth@ietf.org</a><br>=0A          <a rel=3D"nofollow" tar=
get=3D"_blank" href=3D"https://www.ietf.org/mailman/listinfo/oauth">https:/=
/www.ietf.org/mailman/listinfo/oauth</a><br>=0A          <br>=0A        </b=
lockquote>=0A      </div>=0A      <br>=0A      <br>=0A      <fieldset class=
=3D"yiv426951311mimeAttachmentHeader"></fieldset>=0A      <br>=0A      <pre=
>_______________________________________________=0AOAuth mailing list=0A<a =
rel=3D"nofollow" class=3D"yiv426951311moz-txt-link-abbreviated" ymailto=3D"=
mailto:OAuth@ietf.org" target=3D"_blank" href=3D"mailto:OAuth@ietf.org">OAu=
th@ietf.org</a>=0A<a rel=3D"nofollow" class=3D"yiv426951311moz-txt-link-fre=
etext" target=3D"_blank" href=3D"https://www.ietf.org/mailman/listinfo/oaut=
h">https://www.ietf.org/mailman/listinfo/oauth</a>=0A</pre>=0A    </blockqu=
ote>=0A    <br>=0A  </div>=0A=0A</div><br><br> </div> </div>  </div></div><=
/blockquote><blockquote type=3D"cite"><div><span>__________________________=
_____________________</span><br><span>OAuth mailing list</span><br><span><a=
 rel=3D"nofollow" ymailto=3D"mailto:OAuth@ietf.org" target=3D"_blank" href=
=3D"mailto:OAuth@ietf.org">OAuth@ietf.org</a></span><br><span><a rel=3D"nof=
ollow" target=3D"_blank" href=3D"https://www.ietf.org/mailman/listinfo/oaut=
h">https://www.ietf.org/mailman/listinfo/oauth</a></span><br></div></blockq=
uote></div></div><br><br> </div> </div>  </div></div></blockquote></div></d=
iv><br><br> </div> </div>  </div></body></html>
--1502656925-1936149940-1361037448=:95269--

From sakimura@gmail.com  Sat Feb 16 21:53:40 2013
Return-Path: <sakimura@gmail.com>
X-Original-To: oauth@ietfa.amsl.com
Delivered-To: oauth@ietfa.amsl.com
Received: from localhost (localhost [127.0.0.1]) by ietfa.amsl.com (Postfix) with ESMTP id D32DF21F894C for <oauth@ietfa.amsl.com>; Sat, 16 Feb 2013 21:53:40 -0800 (PST)
X-Virus-Scanned: amavisd-new at amsl.com
X-Spam-Flag: NO
X-Spam-Score: -2.809
X-Spam-Level: 
X-Spam-Status: No, score=-2.809 tagged_above=-999 required=5 tests=[AWL=0.190,  BAYES_00=-2.599, J_CHICKENPOX_82=0.6, RCVD_IN_DNSWL_LOW=-1]
Received: from mail.ietf.org ([64.170.98.30]) by localhost (ietfa.amsl.com [127.0.0.1]) (amavisd-new, port 10024) with ESMTP id cSAvnVaSWckX for <oauth@ietfa.amsl.com>; Sat, 16 Feb 2013 21:53:39 -0800 (PST)
Received: from mail-qa0-f46.google.com (mail-qa0-f46.google.com [209.85.216.46]) by ietfa.amsl.com (Postfix) with ESMTP id 6B7AC21F8899 for <oauth@ietf.org>; Sat, 16 Feb 2013 21:53:39 -0800 (PST)
Received: by mail-qa0-f46.google.com with SMTP id o13so862369qaj.12 for <oauth@ietf.org>; Sat, 16 Feb 2013 21:53:38 -0800 (PST)
DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=gmail.com; s=20120113; h=mime-version:x-received:in-reply-to:references:date:message-id :subject:from:to:cc:content-type; bh=7woLvcFs7JphiCD+XykyQMd0oAmJsY5765o4C5OggYk=; b=x6pN9x9CLspUWgxbaHrOcVZvwpScRoPi1B4CjpLjYx/gREtnNu7lG7BWR7owRzgX33 R+6DwxFioxjlC8O19WdFB0Lnp9u6SoqMJFXf7gUfFykIpJmLX0vvZXS6nI86OKx6rUH3 9HsWPgfA8r/2W0xk/6W+0x7XqCaqi/jG9nKNHcXjlWGHuPLSJa9RlI7M6HnKwKhCm1RY I6EPw9/liNaHL8IZYpY5QKCqFv8E+XXPun/HcfsjAhvg8zIIr2gk3/Gz5dCqsbPWJNEk c+HB7BKymx+X1S47i71hqOWjs4hppvpWMz6uGDT57afNXLql3z8UNA/g9jFOuNkXFzqc esWA==
MIME-Version: 1.0
X-Received: by 10.49.12.138 with SMTP id y10mr3124846qeb.64.1361080418797; Sat, 16 Feb 2013 21:53:38 -0800 (PST)
Received: by 10.49.106.161 with HTTP; Sat, 16 Feb 2013 21:53:38 -0800 (PST)
In-Reply-To: <4E1F6AAD24975D4BA5B168042967394367443619@TK5EX14MBXC285.redmond.corp.microsoft.com>
References: <51195F3F.7000704@mitre.org> <4E1F6AAD24975D4BA5B16804296739436743E371@TK5EX14MBXC285.redmond.corp.microsoft.com> <7FB7A108-EA9E-429A-BD86-7E09EA206748@ve7jtb.com> <511A51D6.9040604@mitre.org> <9FC3A5CD-B4EC-4CA2-8082-FAC65C499B3B@ve7jtb.com> <4E1F6AAD24975D4BA5B168042967394367443619@TK5EX14MBXC285.redmond.corp.microsoft.com>
Date: Sun, 17 Feb 2013 14:53:38 +0900
Message-ID: <CABzCy2C_sNPXyvF2T+7JxPi9rHh+QK57+tzVyCaXwphEM1fVWA@mail.gmail.com>
From: Nat Sakimura <sakimura@gmail.com>
To: Mike Jones <Michael.Jones@microsoft.com>
Content-Type: text/plain; charset=ISO-8859-1
Cc: "oauth@ietf.org" <oauth@ietf.org>
Subject: Re: [OAUTH-WG] Registration: Client secret rotation
X-BeenThere: oauth@ietf.org
X-Mailman-Version: 2.1.12
Precedence: list
List-Id: OAUTH WG <oauth.ietf.org>
List-Unsubscribe: <https://www.ietf.org/mailman/options/oauth>, <mailto:oauth-request@ietf.org?subject=unsubscribe>
List-Archive: <http://www.ietf.org/mail-archive/web/oauth>
List-Post: <mailto:oauth@ietf.org>
List-Help: <mailto:oauth-request@ietf.org?subject=help>
List-Subscribe: <https://www.ietf.org/mailman/listinfo/oauth>, <mailto:oauth-request@ietf.org?subject=subscribe>
X-List-Received-Date: Sun, 17 Feb 2013 05:53:40 -0000

Sounds reasonable.

# just started to catch up with the emails of past 6 days...

2013/2/13 Mike Jones <Michael.Jones@microsoft.com>:
> +1
>
> ________________________________
> From: John Bradley
> Sent: 2/12/2013 8:20 AM
> To: Justin Richer
> Cc: Mike Jones; oauth@ietf.org
> Subject: Re: [OAUTH-WG] Registration: Client secret rotation
>
> Yes, that agrees with my thoughts on it.
>
> John B.
> On 2013-02-12, at 11:29 AM, Justin Richer <jricher@mitre.org> wrote:
>
>> This is actually the approach that I favor now as well -- let the server
>> do the secret rotation if it wants to, and have the client be prepared to
>> receive a new client_secret or registration_access_token on any read or
>> update request.
>>
>> This would necessitate changing the returned values, essentially
>> collapsing the returns from the read/update and rotate actions into one
>> structure that's closer to the one returned from initial registration. This
>> has the added benefit of parallelizing the responses for these three
>> actions, which I like as well.
>>
>> -- Justin
>>
>> On 02/11/2013 08:42 PM, John Bradley wrote:
>>> OAuth doesn't say anything about client secrets other than they are
>>> provisioned in a magic realm outside the OAuth spec (Getting in the mood for
>>> the next IETF).
>>>
>>> Rotating client secrets was something I made up for connect because it
>>> seemed like a good idea at the time given that someone breaking in to the
>>> registration endpoint could take over a connection.
>>>
>>> We later separated the authentication to the token endpoint from the
>>> registration endpoint,in what I think was a good move.
>>>
>>> It is sort of up to the authorization server to make decisions about
>>> rotating client secrets, I expect that in the real world a client would try
>>> access ing the token endpoint and get back a invalid_client error response
>>> and then heck it's registration to see if the client_secret has changed.
>>>
>>> I suppose that a client could request rotating its secret if it thinks it
>>> has been compromised,  however the compromiser is more likely to quickly
>>> change the secret to lock out the legitimate clients before the good one
>>> notices.    I think the client wanting to rotate is enough of a edge case
>>> that it could deal with it out of band.
>>>
>>> Letting the server rotate the client secret according to what ever policy
>>> it decides is best is probably safest.
>>>
>>> We didn't have anything for rotating the access token.  I suspect that
>>> rotating it under the clients control is going to create as many problems as
>>> it solves.
>>>
>>> If you want to rotate it,  make it a refresh token that is issues and use
>>> OAuth to provide access tokens from the token endpoint.   Creating a new
>>> endpoint to duplicate existing OAuth functionality is overkill.
>>>
>>> John B.
>>> On 2013-02-11, at 10:18 PM, Mike Jones <Michael.Jones@microsoft.com>
>>> wrote:
>>>
>>>> The rotate_secret operation was added to OpenID Connect Registration as
>>>> a workaround to the fact that registration updates used to be authenticated
>>>> using the client secret, so it seemed overly dangerous to have an update
>>>> operation potentially return an updated secret and have the secret be lost
>>>> due to communication problems - leaving the client stranded.  Since then,
>>>> registration was changed to use a bearer token to authenticate update
>>>> operations, and so this failure mode can't occur anymore.  It was an
>>>> omission not to have deleted the unneeded operation then.
>>>>
>>>> It's been deleted from OpenID Connect Registration and should likewise
>>>> be deleted from OAuth registration, since it is unneeded.  If a new client
>>>> secret is needed, there's nothing stopping the registration server from
>>>> returning it in the result of an update operation.
>>>>
>>>>                              -- Mike
>>>>
>>>> -----Original Message-----
>>>> From: oauth-bounces@ietf.org [mailto:oauth-bounces@ietf.org] On Behalf
>>>> Of Justin Richer
>>>> Sent: Monday, February 11, 2013 1:15 PM
>>>> To: oauth@ietf.org
>>>> Subject: [OAUTH-WG] Registration: Client secret rotation
>>>>
>>>> Draft -05 of OAuth Dynamic Client Registration [1] defines a means of
>>>> the client requesting a new client_secret (if applicable) and a new
>>>> registration_access_token. Client secrets MAY expire after some period of
>>>> time, and this method allows for a refresh of that secret. Draft -00 defined
>>>> no such operation, drafts -01 through -04 defined this operation in terms of
>>>> the operation=rotate_secret parameter, and draft -05 defines it through a
>>>> secondary endpoint, the Client Secret Rotation Endpoint.
>>>> This raises several questions:
>>>>
>>>>  - Should the client be allowed to request rotation of its secret?
>>>>  - Would a client ever take this action of its own accord?
>>>>  - Can a server rotate the secret of the client without the client
>>>> asking? (This seems to be an obvious "yes")
>>>>
>>>> Alternatives that keep this functionality include defining the
>>>> rotate_secret operation in terms of an HTTP verb, a query parameter, or
>>>> separate endpoint. Alternatively, we could drop the rotate_secret operation
>>>> all together. If we do this, we have to decide if the client secret can
>>>> still expire. If it can, then we need a way for the client to get this new
>>>> secret through a means that doesn't require it to request a change in
>>>> secret, such as sending it back as part of the client READ operation (see
>>>> other thread on RESTful verbs).
>>>>
>>>>  -- Justin
>>>>
>>>>
>>>> [1] http://tools.ietf.org/html/draft-ietf-oauth-dyn-reg-05
>>>> _______________________________________________
>>>> OAuth mailing list
>>>> OAuth@ietf.org
>>>> https://www.ietf.org/mailman/listinfo/oauth
>>>> _______________________________________________
>>>> OAuth mailing list
>>>> OAuth@ietf.org
>>>> https://www.ietf.org/mailman/listinfo/oauth
>>
>
>
> _______________________________________________
> OAuth mailing list
> OAuth@ietf.org
> https://www.ietf.org/mailman/listinfo/oauth
>



-- 
Nat Sakimura (=nat)
Chairman, OpenID Foundation
http://nat.sakimura.org/
@_nat_en

From sakimura@gmail.com  Sat Feb 16 21:55:41 2013
Return-Path: <sakimura@gmail.com>
X-Original-To: oauth@ietfa.amsl.com
Delivered-To: oauth@ietfa.amsl.com
Received: from localhost (localhost [127.0.0.1]) by ietfa.amsl.com (Postfix) with ESMTP id F2F8221F894C for <oauth@ietfa.amsl.com>; Sat, 16 Feb 2013 21:55:40 -0800 (PST)
X-Virus-Scanned: amavisd-new at amsl.com
X-Spam-Flag: NO
X-Spam-Score: -3.128
X-Spam-Level: 
X-Spam-Status: No, score=-3.128 tagged_above=-999 required=5 tests=[AWL=0.471,  BAYES_00=-2.599, RCVD_IN_DNSWL_LOW=-1]
Received: from mail.ietf.org ([64.170.98.30]) by localhost (ietfa.amsl.com [127.0.0.1]) (amavisd-new, port 10024) with ESMTP id 839-uT7MZBzN for <oauth@ietfa.amsl.com>; Sat, 16 Feb 2013 21:55:40 -0800 (PST)
Received: from mail-qa0-f45.google.com (mail-qa0-f45.google.com [209.85.216.45]) by ietfa.amsl.com (Postfix) with ESMTP id 5513821F8899 for <oauth@ietf.org>; Sat, 16 Feb 2013 21:55:40 -0800 (PST)
Received: by mail-qa0-f45.google.com with SMTP id g10so866721qah.11 for <oauth@ietf.org>; Sat, 16 Feb 2013 21:55:39 -0800 (PST)
DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=gmail.com; s=20120113; h=mime-version:x-received:in-reply-to:references:date:message-id :subject:from:to:cc:content-type; bh=4rdECwMHvbvjA5UEKT8rMaJQPL4KRVSyDWlgPC5yTwM=; b=ST1CoXEt2P6Rkrf3CAyXEUi25KlV09SGA/GNuq7FaSQhPl4ixaxn2AFFZS11ycHuhj X9rfN4DLWfORfaGC0z0bEDzH9BrLU/siikYMCIwM3lSNvq5KzD1eEphEFRyzZI1Lsbns 2isqcsGogkoYQmmMdR0X3ldTwqkVUXf/3sVT1mogHuARe8BO2qYY/4pVDEmAkLTGZ93Y PpDHl12M3nAYu9mgmeC0q2ocAU/aVvu1sFoXeztPtgAzy4a7NEtM/6gD1kkbl7l7xJsG sVPzxxHRVRbcrPcWDhL8BbolJMDAQi7swiLLbfF6UqrhWJD+LZYcOU/Enfzd6xALM5Tf SIAg==
MIME-Version: 1.0
X-Received: by 10.224.185.148 with SMTP id co20mr3924562qab.94.1361080539790;  Sat, 16 Feb 2013 21:55:39 -0800 (PST)
Received: by 10.49.106.161 with HTTP; Sat, 16 Feb 2013 21:55:39 -0800 (PST)
In-Reply-To: <E520E90A-D183-4944-8F7C-5DB129FDF71B@lodderstedt.net>
References: <51195F39.3040809@mitre.org> <4E1F6AAD24975D4BA5B16804296739436743E3DD@TK5EX14MBXC285.redmond.corp.microsoft.com> <BFDA9345-B4EF-4BA6-8CC6-249D82118D00@lodderstedt.net> <511A586B.9060606@mitre.org> <E520E90A-D183-4944-8F7C-5DB129FDF71B@lodderstedt.net>
Date: Sun, 17 Feb 2013 14:55:39 +0900
Message-ID: <CABzCy2Df61=ZOU3JrCNYPfdApwmHdJ03YxaXurTMH7zvnP6-jQ@mail.gmail.com>
From: Nat Sakimura <sakimura@gmail.com>
To: Torsten Lodderstedt <torsten@lodderstedt.net>
Content-Type: text/plain; charset=ISO-8859-1
Cc: "oauth@ietf.org" <oauth@ietf.org>
Subject: Re: [OAUTH-WG] Registration: Endpoint Definition (& operation parameter)
X-BeenThere: oauth@ietf.org
X-Mailman-Version: 2.1.12
Precedence: list
List-Id: OAUTH WG <oauth.ietf.org>
List-Unsubscribe: <https://www.ietf.org/mailman/options/oauth>, <mailto:oauth-request@ietf.org?subject=unsubscribe>
List-Archive: <http://www.ietf.org/mail-archive/web/oauth>
List-Post: <mailto:oauth@ietf.org>
List-Help: <mailto:oauth-request@ietf.org?subject=help>
List-Subscribe: <https://www.ietf.org/mailman/listinfo/oauth>, <mailto:oauth-request@ietf.org?subject=subscribe>
X-List-Received-Date: Sun, 17 Feb 2013 05:55:41 -0000

+1

2013/2/13 Torsten Lodderstedt <torsten@lodderstedt.net>:
>
> Am 12.02.2013 um 15:57 schrieb Justin Richer <jricher@mitre.org>:
>
>>
>> I think that's a very important difference.
>
> I fully agree.
> _______________________________________________
> OAuth mailing list
> OAuth@ietf.org
> https://www.ietf.org/mailman/listinfo/oauth



-- 
Nat Sakimura (=nat)
Chairman, OpenID Foundation
http://nat.sakimura.org/
@_nat_en

From sakimura@gmail.com  Sat Feb 16 22:04:06 2013
Return-Path: <sakimura@gmail.com>
X-Original-To: oauth@ietfa.amsl.com
Delivered-To: oauth@ietfa.amsl.com
Received: from localhost (localhost [127.0.0.1]) by ietfa.amsl.com (Postfix) with ESMTP id EABD821F8972 for <oauth@ietfa.amsl.com>; Sat, 16 Feb 2013 22:04:05 -0800 (PST)
X-Virus-Scanned: amavisd-new at amsl.com
X-Spam-Flag: NO
X-Spam-Score: -3.171
X-Spam-Level: 
X-Spam-Status: No, score=-3.171 tagged_above=-999 required=5 tests=[AWL=0.428,  BAYES_00=-2.599, RCVD_IN_DNSWL_LOW=-1]
Received: from mail.ietf.org ([64.170.98.30]) by localhost (ietfa.amsl.com [127.0.0.1]) (amavisd-new, port 10024) with ESMTP id YqjNv6NlSHL5 for <oauth@ietfa.amsl.com>; Sat, 16 Feb 2013 22:04:05 -0800 (PST)
Received: from mail-qc0-f179.google.com (mail-qc0-f179.google.com [209.85.216.179]) by ietfa.amsl.com (Postfix) with ESMTP id 00A8B21F894C for <oauth@ietf.org>; Sat, 16 Feb 2013 22:04:04 -0800 (PST)
Received: by mail-qc0-f179.google.com with SMTP id b40so1680586qcq.24 for <oauth@ietf.org>; Sat, 16 Feb 2013 22:04:04 -0800 (PST)
DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=gmail.com; s=20120113; h=mime-version:x-received:in-reply-to:references:date:message-id :subject:from:to:cc:content-type; bh=M+ecvyeyXPxM8RbfdbUxjwzGV5L37idNWHa6gPAfpJA=; b=cD7ZRzRm18ZTz8ASOlGw+XHvPmPdYOBI4BeO5Pfz5FYbUWCA1pa6pKFK8/QmttB7Lf 1vG073yn8qNJUFJNEQnEgDzN/9PAlVUK/FVHJp3EmROSkrfktdK7i++BN4DYPjqcoAsw OPbaU9YhLoHLV4vI7ljHSG96e07wNe8wRxnL/nmb8MEFyPWojMtFs+98FlgUmj8fIiwi T2jT0V/P4Fe34MyO1sYZbUJ2qqt4ix3HiXTTfDkh60DbU1rrub64hzJcrMBGHfhbDx1W Od7Hn8qkpf4SN3NEgxcUlHliN3D89pVglg1/41H6uldjt8eTdUuu8DLUg8G4lNzrTm6s /LzA==
MIME-Version: 1.0
X-Received: by 10.224.185.148 with SMTP id co20mr3930007qab.94.1361081044498;  Sat, 16 Feb 2013 22:04:04 -0800 (PST)
Received: by 10.49.106.161 with HTTP; Sat, 16 Feb 2013 22:04:04 -0800 (PST)
In-Reply-To: <F93467E8-6196-4A65-8A0E-B3897E47FBEB@ve7jtb.com>
References: <51195F36.6040705@mitre.org> <780F8C26-19A4-4301-B350-307D9FFF69CD@ve7jtb.com> <511BAA8B.8030309@mitre.org> <BEBDAFAC-28B0-4959-9FE5-34EC17FC318C@ve7jtb.com> <-4554688250617930935@unknownmsgid> <AF401161-0C7C-4E49-9F44-9982B312FF6D@ve7jtb.com> <CABzCy2BtzA-DJofpSkKJWrwfYtM8a+44VWe1Lx+f_ow=mW8kwg@mail.gmail.com> <4687F290-4855-49DE-892F-F9694BB211D4@ve7jtb.com> <511CF2C9.9040604@mitre.org> <F93467E8-6196-4A65-8A0E-B3897E47FBEB@ve7jtb.com>
Date: Sun, 17 Feb 2013 15:04:04 +0900
Message-ID: <CABzCy2CcmyN_VPBOHZg8oyZdFNj==Nphx5+eVE_b3+bFsU9btQ@mail.gmail.com>
From: Nat Sakimura <sakimura@gmail.com>
To: John Bradley <ve7jtb@ve7jtb.com>
Content-Type: text/plain; charset=ISO-8859-1
Cc: "oauth@ietf.org" <oauth@ietf.org>
Subject: Re: [OAUTH-WG] Registration: RESTful client lifecycle management
X-BeenThere: oauth@ietf.org
X-Mailman-Version: 2.1.12
Precedence: list
List-Id: OAUTH WG <oauth.ietf.org>
List-Unsubscribe: <https://www.ietf.org/mailman/options/oauth>, <mailto:oauth-request@ietf.org?subject=unsubscribe>
List-Archive: <http://www.ietf.org/mail-archive/web/oauth>
List-Post: <mailto:oauth@ietf.org>
List-Help: <mailto:oauth-request@ietf.org?subject=help>
List-Subscribe: <https://www.ietf.org/mailman/listinfo/oauth>, <mailto:oauth-request@ietf.org?subject=subscribe>
X-List-Received-Date: Sun, 17 Feb 2013 06:04:06 -0000

> When sending an update, a client MUST send all metadata fields returned
> from the server in its initial registration or previous read or update
> call, including its client_id. A server MAY replace any missing or
> invalid fields with default values, or it MAY return an error as
> described in the Error Response section. A server MUST return all
> provisioned fields in its response. A server MUST NOT change the
> client_id field. A server MAY change the client_secret and/or
> refresh_access_token fields.

Say the client registered some value. Sometime later, the server
changed a value due to some policy or security reasons etc. The client
when UPDATES with the previously registered value, what is going to
happen to the changed value?

>> DELETE to be used correctly is I think going to delete the client_id and all associated tokens and cause a ripple effect in removing grants associated with that client_id.
>
> This is how I would interpret it as well. It's de-provisioning the
> client, not resetting it.

For DELETE, I can think of an attack such that

1. Register as a client.
2. Send spam links to random users.
3. When user "authorizes", suck the user data such as contacts out.
4. DELETE the registration and disappear.

To prevent something like this, it should probably be something more
akin to "suspend" rather than completely de-provisioning.

From Michael.Jones@microsoft.com  Sat Feb 16 22:12:03 2013
Return-Path: <Michael.Jones@microsoft.com>
X-Original-To: oauth@ietfa.amsl.com
Delivered-To: oauth@ietfa.amsl.com
Received: from localhost (localhost [127.0.0.1]) by ietfa.amsl.com (Postfix) with ESMTP id 47D6C21F89D5 for <oauth@ietfa.amsl.com>; Sat, 16 Feb 2013 22:12:03 -0800 (PST)
X-Virus-Scanned: amavisd-new at amsl.com
X-Spam-Flag: NO
X-Spam-Score: -2.586
X-Spam-Level: 
X-Spam-Status: No, score=-2.586 tagged_above=-999 required=5 tests=[AWL=0.013,  BAYES_00=-2.599]
Received: from mail.ietf.org ([64.170.98.30]) by localhost (ietfa.amsl.com [127.0.0.1]) (amavisd-new, port 10024) with ESMTP id 9t00WtlrtQ6G for <oauth@ietfa.amsl.com>; Sat, 16 Feb 2013 22:12:02 -0800 (PST)
Received: from na01-bl2-obe.outbound.protection.outlook.com (na01-bl2-obe.ptr.protection.outlook.com [65.55.169.31]) by ietfa.amsl.com (Postfix) with ESMTP id 37E2F21F894C for <oauth@ietf.org>; Sat, 16 Feb 2013 22:12:02 -0800 (PST)
Received: from BY2FFO11FD014.protection.gbl (10.1.15.200) by BY2FFO11HUB026.protection.gbl (10.1.14.112) with Microsoft SMTP Server (TLS) id 15.0.620.12; Sun, 17 Feb 2013 06:11:53 +0000
Received: from TK5EX14HUBC104.redmond.corp.microsoft.com (131.107.125.37) by BY2FFO11FD014.mail.protection.outlook.com (10.1.14.76) with Microsoft SMTP Server (TLS) id 15.0.620.12 via Frontend Transport; Sun, 17 Feb 2013 06:11:52 +0000
Received: from TK5EX14MBXC284.redmond.corp.microsoft.com ([169.254.1.96]) by TK5EX14HUBC104.redmond.corp.microsoft.com ([157.54.80.25]) with mapi id 14.02.0318.003; Sun, 17 Feb 2013 06:11:51 +0000
From: Mike Jones <Michael.Jones@microsoft.com>
To: Nat Sakimura <sakimura@gmail.com>, John Bradley <ve7jtb@ve7jtb.com>
Thread-Topic: [OAUTH-WG] Registration: RESTful client lifecycle management
Thread-Index: AQHOCJzxVGwYODuh3UmktcEEXHrfK5h1dc0AgAJusICAAAKVAIAAOFkAgAAd2QCAAHj+gIAAsSiAgAAEXoCAAAQAAIAEKCsAgAABe7A=
Date: Sun, 17 Feb 2013 06:11:50 +0000
Message-ID: <4E1F6AAD24975D4BA5B1680429673943674691FB@TK5EX14MBXC284.redmond.corp.microsoft.com>
References: <51195F36.6040705@mitre.org> <780F8C26-19A4-4301-B350-307D9FFF69CD@ve7jtb.com> <511BAA8B.8030309@mitre.org> <BEBDAFAC-28B0-4959-9FE5-34EC17FC318C@ve7jtb.com> <-4554688250617930935@unknownmsgid> <AF401161-0C7C-4E49-9F44-9982B312FF6D@ve7jtb.com> <CABzCy2BtzA-DJofpSkKJWrwfYtM8a+44VWe1Lx+f_ow=mW8kwg@mail.gmail.com> <4687F290-4855-49DE-892F-F9694BB211D4@ve7jtb.com> <511CF2C9.9040604@mitre.org> <F93467E8-6196-4A65-8A0E-B3897E47FBEB@ve7jtb.com> <CABzCy2CcmyN_VPBOHZg8oyZdFNj==Nphx5+eVE_b3+bFsU9btQ@mail.gmail.com>
In-Reply-To: <CABzCy2CcmyN_VPBOHZg8oyZdFNj==Nphx5+eVE_b3+bFsU9btQ@mail.gmail.com>
Accept-Language: en-US
Content-Language: en-US
X-MS-Has-Attach: 
X-MS-TNEF-Correlator: 
x-originating-ip: [157.54.51.35]
Content-Type: text/plain; charset="us-ascii"
Content-Transfer-Encoding: quoted-printable
MIME-Version: 1.0
X-Forefront-Antispam-Report: CIP:131.107.125.37; CTRY:US; IPV:CAL; IPV:NLI; EFV:NLI; SFV:NSPM; SFS:(13464002)(55885001)(377454001)(189002)(199002)(51704002)(23726001)(46406002)(55846006)(20776003)(31966008)(44976002)(79102001)(54356001)(74662001)(46102001)(47446002)(47776003)(74502001)(16406001)(53806001)(63696002)(66066001)(77982001)(59766001)(51856001)(80022001)(65816001)(50986001)(33656001)(54316002)(47736001)(47976001)(76482001)(56816002)(5343655001)(4396001)(50466001)(56776001)(49866001); DIR:OUT; SFP:; SCL:1; SRVR:BY2FFO11HUB026; H:TK5EX14HUBC104.redmond.corp.microsoft.com; RD:InfoDomainNonexistent; MX:1; A:1; LANG:en; 
X-OriginatorOrg: microsoft.onmicrosoft.com
X-Forefront-PRVS: 07607ED19A
Cc: "oauth@ietf.org" <oauth@ietf.org>
Subject: Re: [OAUTH-WG] Registration: RESTful client lifecycle management
X-BeenThere: oauth@ietf.org
X-Mailman-Version: 2.1.12
Precedence: list
List-Id: OAUTH WG <oauth.ietf.org>
List-Unsubscribe: <https://www.ietf.org/mailman/options/oauth>, <mailto:oauth-request@ietf.org?subject=unsubscribe>
List-Archive: <http://www.ietf.org/mail-archive/web/oauth>
List-Post: <mailto:oauth@ietf.org>
List-Help: <mailto:oauth-request@ietf.org?subject=help>
List-Subscribe: <https://www.ietf.org/mailman/listinfo/oauth>, <mailto:oauth-request@ietf.org?subject=subscribe>
X-List-Received-Date: Sun, 17 Feb 2013 06:12:03 -0000

I agree.  If we have it at all, DELETE should be a declaration by the Clien=
t that requests by it should no longer be honored.  It should be up to the =
Server whether to implement this as suspension or deletion.  At most, I bel=
ieve it should be an optional operation, which MAY be supported.

				-- Mike

-----Original Message-----
From: oauth-bounces@ietf.org [mailto:oauth-bounces@ietf.org] On Behalf Of N=
at Sakimura
Sent: Saturday, February 16, 2013 10:04 PM
To: John Bradley
Cc: oauth@ietf.org
Subject: Re: [OAUTH-WG] Registration: RESTful client lifecycle management

> When sending an update, a client MUST send all metadata fields=20
> returned from the server in its initial registration or previous read=20
> or update call, including its client_id. A server MAY replace any=20
> missing or invalid fields with default values, or it MAY return an=20
> error as described in the Error Response section. A server MUST return=20
> all provisioned fields in its response. A server MUST NOT change the=20
> client_id field. A server MAY change the client_secret and/or=20
> refresh_access_token fields.

Say the client registered some value. Sometime later, the server changed a =
value due to some policy or security reasons etc. The client when UPDATES w=
ith the previously registered value, what is going to happen to the changed=
 value?

>> DELETE to be used correctly is I think going to delete the client_id and=
 all associated tokens and cause a ripple effect in removing grants associa=
ted with that client_id.
>
> This is how I would interpret it as well. It's de-provisioning the=20
> client, not resetting it.

For DELETE, I can think of an attack such that

1. Register as a client.
2. Send spam links to random users.
3. When user "authorizes", suck the user data such as contacts out.
4. DELETE the registration and disappear.

To prevent something like this, it should probably be something more akin t=
o "suspend" rather than completely de-provisioning.
_______________________________________________
OAuth mailing list
OAuth@ietf.org
https://www.ietf.org/mailman/listinfo/oauth

From torsten@lodderstedt.net  Sun Feb 17 02:54:45 2013
Return-Path: <torsten@lodderstedt.net>
X-Original-To: oauth@ietfa.amsl.com
Delivered-To: oauth@ietfa.amsl.com
Received: from localhost (localhost [127.0.0.1]) by ietfa.amsl.com (Postfix) with ESMTP id 1361D21F8845; Sun, 17 Feb 2013 02:54:45 -0800 (PST)
X-Virus-Scanned: amavisd-new at amsl.com
X-Spam-Flag: NO
X-Spam-Score: -1.487
X-Spam-Level: 
X-Spam-Status: No, score=-1.487 tagged_above=-999 required=5 tests=[AWL=0.762,  BAYES_00=-2.599, HELO_EQ_DE=0.35]
Received: from mail.ietf.org ([64.170.98.30]) by localhost (ietfa.amsl.com [127.0.0.1]) (amavisd-new, port 10024) with ESMTP id Pi9KijUFUVqP; Sun, 17 Feb 2013 02:54:44 -0800 (PST)
Received: from smtprelay02.ispgateway.de (smtprelay02.ispgateway.de [80.67.31.36]) by ietfa.amsl.com (Postfix) with ESMTP id E607E21F87D5; Sun, 17 Feb 2013 02:54:43 -0800 (PST)
Received: from [79.253.38.170] (helo=[192.168.71.42]) by smtprelay02.ispgateway.de with esmtpsa (TLSv1:AES256-SHA:256) (Exim 4.68) (envelope-from <torsten@lodderstedt.net>) id 1U71tJ-0001r1-Cg; Sun, 17 Feb 2013 11:54:41 +0100
Message-ID: <5120B6EE.60801@lodderstedt.net>
Date: Sun, 17 Feb 2013 11:54:38 +0100
From: Torsten Lodderstedt <torsten@lodderstedt.net>
User-Agent: Mozilla/5.0 (Windows NT 6.2; rv:17.0) Gecko/20130107 Thunderbird/17.0.2
MIME-Version: 1.0
To: "Richer, Justin P." <jricher@mitre.org>
References: <20130215215423.23019.50224.idtracker@ietfa.amsl.com> <B33BFB58CCC8BE4998958016839DE27E06894B4F@IMCMBX01.MITRE.ORG>
In-Reply-To: <B33BFB58CCC8BE4998958016839DE27E06894B4F@IMCMBX01.MITRE.ORG>
Content-Type: text/plain; charset=ISO-8859-1; format=flowed
Content-Transfer-Encoding: 7bit
X-Df-Sender: dG9yc3RlbkBsb2RkZXJzdGVkdC1vbmxpbmUuZGU=
Cc: "internet-drafts@ietf.org" <internet-drafts@ietf.org>, "<oauth@ietf.org>" <oauth@ietf.org>, "<i-d-announce@ietf.org>" <i-d-announce@ietf.org>
Subject: Re: [OAUTH-WG] I-D Action: draft-ietf-oauth-dyn-reg-06.txt
X-BeenThere: oauth@ietf.org
X-Mailman-Version: 2.1.12
Precedence: list
List-Id: OAUTH WG <oauth.ietf.org>
List-Unsubscribe: <https://www.ietf.org/mailman/options/oauth>, <mailto:oauth-request@ietf.org?subject=unsubscribe>
List-Archive: <http://www.ietf.org/mail-archive/web/oauth>
List-Post: <mailto:oauth@ietf.org>
List-Help: <mailto:oauth-request@ietf.org?subject=help>
List-Subscribe: <https://www.ietf.org/mailman/listinfo/oauth>, <mailto:oauth-request@ietf.org?subject=subscribe>
X-List-Received-Date: Sun, 17 Feb 2013 10:54:45 -0000

Hi Justin,

the new revision seems to catch the state of discussion and is 
consistent. Thank's for bringing this topic forward.

On your editor's not in section 4.2.: In my opinion, the 404 due to a 
none-existing resource should precede the 403. I would suggest to point 
out your thoughts on the access token. But as with any HTTP request, 
there could be other ways to authenticate to this endpoint. I therefore 
would not connect both aspects to much.

section 4.3

"This request MUST include all fields described in Client Metadata
    (Section 2) as returned to the Client from a previous register, read,
    or update operation."

Just to make sure I got it. Any data element omitted in this request is 
deleted/reset by the AS?

section 5.1

Something seems to be missing at

"The response contains the following fields:

    , as well as a Client Secret if this client is a confidential client."

regards,
Torsten.

Am 15.02.2013 23:00, schrieb Richer, Justin P.:
> Everyone, there's a new draft of DynReg up on the tracker. This draft tries to codify the discussions so far from this week into something we can all read. There are still plenty of open discussion points and items up for debate. Please read through this latest draft and see what's changed and help assure that it properly captures the conversations. If you have any inputs for the marked [[ Editor's Note ]] sections, please send them to the list by next Thursday to give me opportunity to get any necessary changes in by the cutoff date of Monday the 22nd.
>
> Thanks for all of your hard work everyone, I think this is *really* coming along now.
>
>   -- Justin
>
> On Feb 15, 2013, at 4:54 PM, internet-drafts@ietf.org wrote:
>
>> A New Internet-Draft is available from the on-line Internet-Drafts directories.
>> This draft is a work item of the Web Authorization Protocol Working Group of the IETF.
>>
>> 	Title           : OAuth Dynamic Client Registration Protocol
>> 	Author(s)       : Justin Richer
>>                           John Bradley
>>                           Michael B. Jones
>>                           Maciej Machulak
>> 	Filename        : draft-ietf-oauth-dyn-reg-06.txt
>> 	Pages           : 21
>> 	Date            : 2013-02-15
>>
>> Abstract:
>>    This specification defines an endpoint and protocol for dynamic
>>    registration of OAuth Clients at an Authorization Server.
>>
>>
>> The IETF datatracker status page for this draft is:
>> https://datatracker.ietf.org/doc/draft-ietf-oauth-dyn-reg
>>
>> There's also a htmlized version available at:
>> http://tools.ietf.org/html/draft-ietf-oauth-dyn-reg-06
>>
>> A diff from the previous version is available at:
>> http://www.ietf.org/rfcdiff?url2=draft-ietf-oauth-dyn-reg-06
>>
>>
>> Internet-Drafts are also available by anonymous FTP at:
>> ftp://ftp.ietf.org/internet-drafts/
>>
>> _______________________________________________
>> OAuth mailing list
>> OAuth@ietf.org
>> https://www.ietf.org/mailman/listinfo/oauth
> _______________________________________________
> OAuth mailing list
> OAuth@ietf.org
> https://www.ietf.org/mailman/listinfo/oauth


From torsten@lodderstedt.net  Sun Feb 17 03:04:02 2013
Return-Path: <torsten@lodderstedt.net>
X-Original-To: oauth@ietfa.amsl.com
Delivered-To: oauth@ietfa.amsl.com
Received: from localhost (localhost [127.0.0.1]) by ietfa.amsl.com (Postfix) with ESMTP id 75F9321F87B1 for <oauth@ietfa.amsl.com>; Sun, 17 Feb 2013 03:04:02 -0800 (PST)
X-Virus-Scanned: amavisd-new at amsl.com
X-Spam-Flag: NO
X-Spam-Score: -1.572
X-Spam-Level: 
X-Spam-Status: No, score=-1.572 tagged_above=-999 required=5 tests=[AWL=0.677,  BAYES_00=-2.599, HELO_EQ_DE=0.35]
Received: from mail.ietf.org ([64.170.98.30]) by localhost (ietfa.amsl.com [127.0.0.1]) (amavisd-new, port 10024) with ESMTP id 5ih6V711lrpk for <oauth@ietfa.amsl.com>; Sun, 17 Feb 2013 03:04:01 -0800 (PST)
Received: from smtprelay05.ispgateway.de (smtprelay05.ispgateway.de [80.67.31.97]) by ietfa.amsl.com (Postfix) with ESMTP id 7E23B21F86D5 for <oauth@ietf.org>; Sun, 17 Feb 2013 03:04:01 -0800 (PST)
Received: from [79.253.38.170] (helo=[192.168.71.42]) by smtprelay05.ispgateway.de with esmtpsa (TLSv1:AES256-SHA:256) (Exim 4.68) (envelope-from <torsten@lodderstedt.net>) id 1U722K-0006pp-4E; Sun, 17 Feb 2013 12:04:00 +0100
Message-ID: <5120B91D.90609@lodderstedt.net>
Date: Sun, 17 Feb 2013 12:03:57 +0100
From: Torsten Lodderstedt <torsten@lodderstedt.net>
User-Agent: Mozilla/5.0 (Windows NT 6.2; rv:17.0) Gecko/20130107 Thunderbird/17.0.2
MIME-Version: 1.0
To: Sergey Beryozkin <sberyozkin@gmail.com>
References: <20130213221326.3987.20729.idtracker@ietfa.amsl.com> <511C1155.6050709@lodderstedt.net> <511CBD2B.3080000@gmail.com>
In-Reply-To: <511CBD2B.3080000@gmail.com>
Content-Type: text/plain; charset=ISO-8859-1; format=flowed
Content-Transfer-Encoding: 7bit
X-Df-Sender: dG9yc3RlbkBsb2RkZXJzdGVkdC1vbmxpbmUuZGU=
Cc: oauth@ietf.org
Subject: Re: [OAUTH-WG] I-D Action: draft-ietf-oauth-revocation-05.txt
X-BeenThere: oauth@ietf.org
X-Mailman-Version: 2.1.12
Precedence: list
List-Id: OAUTH WG <oauth.ietf.org>
List-Unsubscribe: <https://www.ietf.org/mailman/options/oauth>, <mailto:oauth-request@ietf.org?subject=unsubscribe>
List-Archive: <http://www.ietf.org/mail-archive/web/oauth>
List-Post: <mailto:oauth@ietf.org>
List-Help: <mailto:oauth-request@ietf.org?subject=help>
List-Subscribe: <https://www.ietf.org/mailman/listinfo/oauth>, <mailto:oauth-request@ietf.org?subject=subscribe>
X-List-Received-Date: Sun, 17 Feb 2013 11:04:02 -0000

Hi Sergey,

Am 14.02.2013 11:32, schrieb Sergey Beryozkin:
>> - an attempt to revoke an invalid token is now handled like a successful
>> revocation request (status code 200)
> Does it create some precedent, meaning that while people suggest using 
> 4xx statuses to indicate different sort of failures in this case 200 
> is returned, to eliminate a potential security attack. I mean, should 
> it become the recommended practice ?
>
> For example, in the discussion about DELETE, should it be 204 that is 
> returned all the time ?
>
> Sergey 

good point. In this particular case, we decided to go with 200 merely 
because the "error" indicates a state the client anyway wanted to 
achieve for the particular token. I dont know whether this can be 
generalized.

regards,
Torsten.

From sberyozkin@gmail.com  Sun Feb 17 09:31:43 2013
Return-Path: <sberyozkin@gmail.com>
X-Original-To: oauth@ietfa.amsl.com
Delivered-To: oauth@ietfa.amsl.com
Received: from localhost (localhost [127.0.0.1]) by ietfa.amsl.com (Postfix) with ESMTP id 70E4A21F8AF4 for <oauth@ietfa.amsl.com>; Sun, 17 Feb 2013 09:31:43 -0800 (PST)
X-Virus-Scanned: amavisd-new at amsl.com
X-Spam-Flag: NO
X-Spam-Score: -5.599
X-Spam-Level: 
X-Spam-Status: No, score=-5.599 tagged_above=-999 required=5 tests=[BAYES_00=-2.599, GB_I_INVITATION=-2, RCVD_IN_DNSWL_LOW=-1]
Received: from mail.ietf.org ([64.170.98.30]) by localhost (ietfa.amsl.com [127.0.0.1]) (amavisd-new, port 10024) with ESMTP id FZ0pCAXeMwdp for <oauth@ietfa.amsl.com>; Sun, 17 Feb 2013 09:31:41 -0800 (PST)
Received: from mail-wg0-f46.google.com (mail-wg0-f46.google.com [74.125.82.46]) by ietfa.amsl.com (Postfix) with ESMTP id 6477521F8AD0 for <oauth@ietf.org>; Sun, 17 Feb 2013 09:31:41 -0800 (PST)
Received: by mail-wg0-f46.google.com with SMTP id fg15so3937189wgb.25 for <oauth@ietf.org>; Sun, 17 Feb 2013 09:31:40 -0800 (PST)
DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=gmail.com; s=20120113; h=x-received:message-id:date:from:user-agent:mime-version:to:subject :references:in-reply-to:content-type:content-transfer-encoding; bh=+M6L1+o+7QQkrZ2wxjdeJH1QkBjyv7FA0rl0S4QwFx8=; b=FbdLQeVcNvuWffDlDXHAffTqdq/AFQh+HNKe/mNX4XUrNcb/ij0klU7DZCbjnGUrmJ 7T78sQLetRF3Vw2UVfPsEWKy3V8vIJDEqq/ya1ViNso+9VtC0y6SLVs96n3mmXOAhVTw jcG+95bIUA7njg8wOC0E3NJyDnar9JQn87IoCWnCGlCbvZ+eLtBtBT/qkB7tn5mjVDlD 2E5+Ft4f2foEpihYf5tuK7Nr6ZnZbM+XMtF/YjbKFrrPyOX3/+w6K9FEovnupegvoM7K FFh7i/zwGSiWPlUtDjsZi5GfJZjDcns/3TdUFiecpfPDP7mjTi+xwMaxZrsCgeOJfQX3 qnWA==
X-Received: by 10.194.77.129 with SMTP id s1mr14638820wjw.17.1361122300197; Sun, 17 Feb 2013 09:31:40 -0800 (PST)
Received: from [192.168.2.5] ([79.97.76.201]) by mx.google.com with ESMTPS id ex1sm17038752wib.7.2013.02.17.09.31.38 (version=TLSv1 cipher=ECDHE-RSA-RC4-SHA bits=128/128); Sun, 17 Feb 2013 09:31:39 -0800 (PST)
Message-ID: <512113F5.4050909@gmail.com>
Date: Sun, 17 Feb 2013 17:31:33 +0000
From: Sergey Beryozkin <sberyozkin@gmail.com>
User-Agent: Mozilla/5.0 (X11; Linux x86_64; rv:12.0) Gecko/20120430 Thunderbird/12.0.1
MIME-Version: 1.0
To: oauth@ietf.org
References: <0573984A-8C11-4960-9BC6-F44D4B664C19@gmx.net> <E808B6AC-D5F6-479F-967D-EA6B2586BE64@oracle.com> <511A7D27.8010209@mitre.org> <4E1F6AAD24975D4BA5B16804296739436744BD23@TK5EX14MBXC285.redmond.corp.microsoft.com> <1360891897.14004.YahooMailNeo@web31811.mail.mud.yahoo.com> <E7EBF78C-37EB-4737-8DD5-0F24C9FACA60@lodderstedt.net> <1360912115.36543.YahooMailNeo@web31811.mail.mud.yahoo.com> <2A0F585F-2CEF-418D-9654-5084E6C9BD0D@lodderstedt.net> <1360944589.51724.YahooMailNeo@web31808.mail.mud.yahoo.com> <CA+ZpN24dWAGtZR2aQcqC_N+sHsp7zBVe42LDbrkAsqNVqQPv0w@mail.gmail.com> <511EA0A3.7080000@mitre.org> <1360962242.18571.YahooMailNeo@web31805.mail.mud.yahoo.com> <BDE6C674-AEDE-4E73-9122-4F2A90F7F180@oracle.com> <1360994570.11377.YahooMailNeo@web31805.mail.mud.yahoo.com> <B4FE425C-B0D2-4D93-9148-CED74C34932E@oracle.com> <1361037448.95269.YahooMailNeo@web31803.mail.mud.yahoo.com>
In-Reply-To: <1361037448.95269.YahooMailNeo@web31803.mail.mud.yahoo.com>
Content-Type: text/plain; charset=windows-1252; format=flowed
Content-Transfer-Encoding: 8bit
Subject: Re: [OAUTH-WG] Minutes from the OAuth Design Team Conference Call - 11th February 2013
X-BeenThere: oauth@ietf.org
X-Mailman-Version: 2.1.12
Precedence: list
List-Id: OAUTH WG <oauth.ietf.org>
List-Unsubscribe: <https://www.ietf.org/mailman/options/oauth>, <mailto:oauth-request@ietf.org?subject=unsubscribe>
List-Archive: <http://www.ietf.org/mail-archive/web/oauth>
List-Post: <mailto:oauth@ietf.org>
List-Help: <mailto:oauth-request@ietf.org?subject=help>
List-Subscribe: <https://www.ietf.org/mailman/listinfo/oauth>, <mailto:oauth-request@ietf.org?subject=subscribe>
X-List-Received-Date: Sun, 17 Feb 2013 17:31:43 -0000

Hi,
On 16/02/13 17:57, William Mills wrote:
> The reason to support 1.0a tokens in 2 is simply to provide a migration
> path when a site has 1.0a endpoint it wants to support.
>

I really like the idea of having a migration path, which is very 
important to have, but IMHO this approach won't work. Appears to me that 
having a MAC completed (whenever feasible of course) will work better, 
it will be a statement of intent/invitation...

Cheers, Sergey


> ------------------------------------------------------------------------
> *From:* Phil Hunt <phil.hunt@oracle.com>
> *To:* William Mills <wmills_92105@yahoo.com>
> *Cc:* Justin Richer <jricher@mitre.org>; Tim Bray <twbray@google.com>;
> IETF oauth WG <oauth@ietf.org>
> *Sent:* Friday, February 15, 2013 11:22 PM
> *Subject:* Re: [OAUTH-WG] Minutes from the OAuth Design Team Conference
> Call - 11th February 2013
>
> I don't see oauth1 tokens as a short cut because eran said the token in
> oauth1 (which is inside the oauth1 spec) had many implementation
> problems by client developers. Why go there and re-invent what jwt could
> do easily?
>
> Do you need hok? Do you need replay protection? Do you need message
> signing? Are asymmetric keys needed? I get the impression the group is
> less interested in the last two.
>
> There is also key distribution to resource server. I think we have
> client nailed but getting keys to resource server needs some discussion
> - especially if the path is through the token itself.
>
> I suppose we can move faster if we assume rs obtains keys in an
> unspecified manner like what happened in oauth1.
>
> Phil
>
> Sent from my phone.
>
> On 2013-02-15, at 22:02, William Mills <wmills_92105@yahoo.com
> <mailto:wmills_92105@yahoo.com>> wrote:
>
>> All the same concepts/info are available in the AS: client ID, client
>> auth, and can deliver both token and secret. What's magic once the
>> client has the token that's missing?
>>
>> ------------------------------------------------------------------------
>> *From:* Phil Hunt <phil.hunt@oracle.com <mailto:phil.hunt@oracle.com>>
>> *To:* William Mills <wmills_92105@yahoo.com
>> <mailto:wmills_92105@yahoo.com>>
>> *Cc:* Justin Richer <jricher@mitre.org <mailto:jricher@mitre.org>>;
>> Tim Bray <twbray@google.com <mailto:twbray@google.com>>; IETF oauth WG
>> <oauth@ietf.org <mailto:oauth@ietf.org>>
>> *Sent:* Friday, February 15, 2013 1:52 PM
>> *Subject:* Re: [OAUTH-WG] Minutes from the OAuth Design Team
>> Conference Call - 11th February 2013
>>
>> Sorry. I have to disagree. The way 1.0 is written, it is not a
>> shortcut to turn it into a token for 2.
>>
>> Phil
>>
>> Sent from my phone.
>>
>> On 2013-02-15, at 13:04, William Mills <wmills_92105@yahoo.com
>> <mailto:wmills_92105@yahoo.com>> wrote:
>>
>>> >I've brought it up before, but I think it might be worthwhile, at
>>> least as an exercise, to define a method to get OAuth1-style tokens
>>> from an OAuth2 token endpoint. You'd defer to OAuth1 for how to use
>>> them >with a protected resource.
>>>
>>> YES!
>>>
>>> ------------------------------------------------------------------------
>>> *From:* Justin Richer <jricher@mitre.org <mailto:jricher@mitre.org>>
>>> *To:* Tim Bray <twbray@google.com <mailto:twbray@google.com>>
>>> *Cc:* William Mills <wmills_92105@yahoo.com
>>> <mailto:wmills_92105@yahoo.com>>; IETF oauth WG <oauth@ietf.org
>>> <mailto:oauth@ietf.org>>
>>> *Sent:* Friday, February 15, 2013 12:54 PM
>>> *Subject:* Re: [OAUTH-WG] Minutes from the OAuth Design Team
>>> Conference Call - 11th February 2013
>>>
>>> So that you can fetch and manage all your tokens using the same code
>>> paths as the OAuth2 services. The "get a token" part will be
>>> identical to Oauth2 Bearer (except for some details of what comes
>>> back from the token endpoint, of course), it's the "use a token" bit
>>> that really changes and is up in the air. You get to use scopes, and
>>> state, and refresh tokens, and all the other good stuff.
>>>
>>> I've brought it up before, but I think it might be worthwhile, at
>>> least as an exercise, to define a method to get OAuth1-style tokens
>>> from an OAuth2 token endpoint. You'd defer to OAuth1 for how to use
>>> them with a protected resource.
>>>
>>> -- Justin
>>>
>>> On 02/15/2013 11:49 AM, Tim Bray wrote:
>>>> Not deeply acquainted with the Flickr scenario, but it occurs to me
>>>> to ask: If OAuth 1.0 is working well for them, why don’t they just
>>>> keep using it? I.e. if there’s already a good solution in place for
>>>> people who require secure authn/authz over insecure channels, why
>>>> would we go the extra work of duplicating that in OAuth 2 territory? -T
>>>>
>>>> On Fri, Feb 15, 2013 at 8:09 AM, William Mills
>>>> <wmills_92105@yahoo.com <mailto:wmills_92105@yahoo.com>> wrote:
>>>>
>>>>     I'll repeat the use case for Flickr, which requires OAuth 1.0a
>>>>     type capabilites that OAuth 2 does not provide. Simply stating
>>>>     "move to HTTPS" is not a viable response here.
>>>>
>>>>     ------------------------------------------------------------------------
>>>>     *From:* Torsten Lodderstedt <torsten@lodderstedt.net
>>>>     <mailto:torsten@lodderstedt.net>>
>>>>     *To:* William Mills <wmills_92105@yahoo.com
>>>>     <mailto:wmills_92105@yahoo.com>>
>>>>     *Cc:* Mike Jones <Michael.Jones@microsoft.com
>>>>     <mailto:Michael.Jones@microsoft.com>>; Justin Richer
>>>>     <jricher@mitre.org <mailto:jricher@mitre.org>>; Phil Hunt
>>>>     <phil.hunt@oracle.com <mailto:phil.hunt@oracle.com>>; IETF oauth
>>>>     WG <oauth@ietf.org <mailto:oauth@ietf.org>>
>>>>     *Sent:* Friday, February 15, 2013 7:22 AM
>>>>     *Subject:* Re: [OAUTH-WG] Minutes from the OAuth Design Team
>>>>     Conference Call - 11th February 2013
>>>>
>>>>     Hi Bill,
>>>>
>>>>     I think one needs to compare the costs/impact of HTTPS on one
>>>>     side and the implementation of integrity protection and replay
>>>>     detection on the other. We had this discussion several times.
>>>>
>>>>     regards,
>>>>     Torsten.
>>>>
>>>>     Am 15.02.2013 um 08:08 schrieb William Mills
>>>>     <wmills_92105@yahoo.com <mailto:wmills_92105@yahoo.com>>:
>>>>
>>>>>     I fundamentally disagree with that too. OAuth 2 is the
>>>>>     *framework*, one which supports multiple token types. Bearer
>>>>>     tokens were the first credential type defined.
>>>>>
>>>>>     OAuth 1.0a also requires HTTPS transport for authentication and
>>>>>     getting the token.
>>>>>
>>>>>     There are real use cases for tokens usable over plain text with
>>>>>     integrity protection.
>>>>>
>>>>>     -bill
>>>>>
>>>>>     ------------------------------------------------------------------------
>>>>>     *From:* Torsten Lodderstedt <torsten@lodderstedt.net
>>>>>     <mailto:torsten@lodderstedt.net>>
>>>>>     *To:* William Mills <wmills_92105@yahoo.com
>>>>>     <mailto:wmills_92105@yahoo.com>>
>>>>>     *Cc:* Mike Jones <Michael.Jones@microsoft.com
>>>>>     <mailto:Michael.Jones@microsoft.com>>; Justin Richer
>>>>>     <jricher@mitre.org <mailto:jricher@mitre.org>>; Phil Hunt
>>>>>     <phil.hunt@oracle.com <mailto:phil.hunt@oracle.com>>; IETF
>>>>>     oauth WG <oauth@ietf.org <mailto:oauth@ietf.org>>
>>>>>     *Sent:* Thursday, February 14, 2013 10:05 PM
>>>>>     *Subject:* Re: [OAUTH-WG] Minutes from the OAuth Design Team
>>>>>     Conference Call - 11th February 2013
>>>>>
>>>>>     Hi Bill,
>>>>>
>>>>>     OAuth 2.0 took a different direction by relying on HTTPS to
>>>>>     provide the basic protection. So the need to have a token,
>>>>>     which can be used for service requests over plain HTTP is
>>>>>     arguable. My understanding of this activity was, the intend is
>>>>>     to provide additional protection on top of HTTPS.
>>>>>
>>>>>     regards,
>>>>>     Torsten.
>>>>>
>>>>>     Am 15.02.2013 um 02:31 schrieb William Mills
>>>>>     <wmills_92105@yahoo.com <mailto:wmills_92105@yahoo.com>>:
>>>>>
>>>>>>     I disagree with "That was the impediment to OAuth 1.0 adoption
>>>>>>     that OAuth 2.0 solved in the first place.", unless "solving"
>>>>>>     means does not address the need for it at all.
>>>>>>
>>>>>>     OAuth 2 does several good things, but it still lacks a defined
>>>>>>     token type that is safe to user over plain text HTTP. 1.0a
>>>>>>     solved that.
>>>>>>
>>>>>>     ------------------------------------------------------------------------
>>>>>>     *From:* Mike Jones <Michael.Jones@microsoft.com
>>>>>>     <mailto:Michael.Jones@microsoft.com>>
>>>>>>     *To:* Justin Richer <jricher@mitre.org
>>>>>>     <mailto:jricher@mitre.org>>; Phil Hunt <phil.hunt@oracle.com
>>>>>>     <mailto:phil.hunt@oracle.com>>
>>>>>>     *Cc:* IETF oauth WG <oauth@ietf.org <mailto:oauth@ietf.org>>
>>>>>>     *Sent:* Thursday, February 14, 2013 1:44 PM
>>>>>>     *Subject:* Re: [OAUTH-WG] Minutes from the OAuth Design Team
>>>>>>     Conference Call - 11th February 2013
>>>>>>
>>>>>>     I'm in favor of reusing the JWT work that this WG is also
>>>>>>     doing. :-)
>>>>>>
>>>>>>     I'm pretty skeptical of us inventing another custom scheme for
>>>>>>     signing HTTP headers. That was the impediment to OAuth 1.0
>>>>>>     adoption that OAuth 2.0 solved in the first place.
>>>>>>
>>>>>>     -- Mike
>>>>>>
>>>>>>     -----Original Message-----
>>>>>>     From: oauth-bounces@ietf.org <mailto:oauth-bounces@ietf.org>
>>>>>>     [mailto:oauth-bounces@ietf.org
>>>>>>     <mailto:oauth-bounces@ietf.org>] On Behalf Of Justin Richer
>>>>>>     Sent: Tuesday, February 12, 2013 9:35 AM
>>>>>>     To: Phil Hunt
>>>>>>     Cc: IETF oauth WG
>>>>>>     Subject: Re: [OAUTH-WG] Minutes from the OAuth Design Team
>>>>>>     Conference Call - 11th February 2013
>>>>>>
>>>>>>     That's my reading of it as well, Phil, thanks for providing
>>>>>>     the clarification. One motivator behind using a JSON-based
>>>>>>     token is to be able to re-use some of the great work that the
>>>>>>     JOSE group is doing but apply it to an HTTP payload.
>>>>>>
>>>>>>     What neither of us want is a token type that requires stuffing
>>>>>>     all query, header, and other parameters *into* the JSON object
>>>>>>     itself, which would be a more SOAPy approach.
>>>>>>
>>>>>>     -- Justin
>>>>>>
>>>>>>     On 02/12/2013 12:30 PM, Phil Hunt wrote:
>>>>>>     > Clarification. I think Justin and I were in agreement that
>>>>>>     we don't want to see a format that requires JSON payloads. We
>>>>>>     are both interested in a JSON token used in the authorization
>>>>>>     header that could be based on a computed signature of some
>>>>>>     combination of http headers and body if possible.
>>>>>>     >
>>>>>>     > Phil
>>>>>>     >
>>>>>>     > @independentid
>>>>>>     > www.independentid.com <http://www.independentid.com/>
>>>>>>     > phil.hunt@oracle.com <mailto:phil.hunt@oracle.com>
>>>>>>     >
>>>>>>     >
>>>>>>     >
>>>>>>     >
>>>>>>     >
>>>>>>     > On 2013-02-12, at 1:10 AM, Hannes Tschofenig wrote:
>>>>>>     >
>>>>>>     >> Here are my notes.
>>>>>>     >>
>>>>>>     >> Participants:
>>>>>>     >>
>>>>>>     >> * John Bradley
>>>>>>     >> * Derek Atkins
>>>>>>     >> * Phil Hunt
>>>>>>     >> * Prateek Mishra
>>>>>>     >> * Hannes Tschofenig
>>>>>>     >> * Mike Jones
>>>>>>     >> * Antonio Sanso
>>>>>>     >> * Justin Richer
>>>>>>     >>
>>>>>>     >> Notes:
>>>>>>     >>
>>>>>>     >> My slides are available here:
>>>>>>     >> http://www.tschofenig.priv.at/OAuth2-Security-11Feb2013.ppt
>>>>>>     >>
>>>>>>     >> Slide #2 summarizes earlier discussions during the
>>>>>>     conference calls.
>>>>>>     >>
>>>>>>     >> -- HTTP vs. JSON
>>>>>>     >>
>>>>>>     >> Phil noted that he does not like to use the MAC Token draft
>>>>>>     as a starting point because it does not re-use any of the work
>>>>>>     done in the JOSE working group and in particular all the
>>>>>>     libraries that are available today. He mentioned that earlier
>>>>>>     attempts to write the MAC Token code lead to problems for
>>>>>>     implementers.
>>>>>>     >>
>>>>>>     >> Justin responded that he does not agree with using JSON as
>>>>>>     a transport mechanism since this would replicate a SOAP style.
>>>>>>     >>
>>>>>>     >> Phil noted that he wants to send JSON but the signature
>>>>>>     shall be computed over the HTTP header field.
>>>>>>     >>
>>>>>>     >> -- Flexibility for the keyed message digest computation
>>>>>>     >>
>>>>>>     >> From earlier discussion it was clear that the conference
>>>>>>     call participants wanted more flexibility regarding the keyed
>>>>>>     message digest computation. For this purpose Hannes presented
>>>>>>     the DKIM based approach, which allows selective header fields
>>>>>>     to be included in the digest. This is shown in slide #4.
>>>>>>     >>
>>>>>>     >> After some discussion the conference call participants
>>>>>>     thought that this would meet their needs. Further
>>>>>>     investigations would still be useful to determine the degree
>>>>>>     of failed HMAC calculations due to HTTP proxies modifying the
>>>>>>     content.
>>>>>>     >>
>>>>>>     >> -- Key Distribution
>>>>>>     >>
>>>>>>     >> Hannes presented the open issue regarding the choice of key
>>>>>>     >> distribution. Slides #6-#8 present three techniques and
>>>>>>     Hannes asked
>>>>>>     >> for feedback regarding the preferred style. Justin and
>>>>>>     others didn't
>>>>>>     >> see the need to decide on one mechanism - they wanted to
>>>>>>     keep the
>>>>>>     >> choice open. Derek indicated that this will not be an
>>>>>>     acceptable
>>>>>>     >> approach. Since the resource server and the authorization
>>>>>>     server may,
>>>>>>     >> in the OAuth 2.0 framework, be entities produced by
>>>>>>     different vendors
>>>>>>     >> there is an interoperability need. Justin responded that he
>>>>>>     disagrees
>>>>>>     >> and that the resource server needs to understand the access
>>>>>>     token and
>>>>>>     >> referred to the recent draft submission for the token
>>>>>>     introspection
>>>>>>     >> endpoint. Derek indicated that the resource server has to
>>>>>>     understand
>>>>>>     >> the content of the access token and the token introspection
>>>>>>     endpoint
>>>>>>     >> just pushes the problem around: the resource server has to
>>>>>>     send the
>>>>>>     >> access token to the authorization server and then the
>>>>>>     resource server
>>>>>>     >> gets the result back (which he the
>>>>>>     n
>>>>>>     > a
>>>>>>     >> gain needs to understand) in order to make a meaningful
>>>>>>     authorization decision.
>>>>>>     >>
>>>>>>     >> Everyone agreed that the client must receive the session
>>>>>>     key from the authorization server and that this approach has
>>>>>>     to be standardized. It was also agreed that this is a common
>>>>>>     approach among all three key distribution mechanisms.
>>>>>>     >>
>>>>>>     >> Hannes asked the participants to think about their preference.
>>>>>>     >>
>>>>>>     >> The questions regarding key naming and the indication for
>>>>>>     the intended resource server the client wants to talk to have
>>>>>>     been postponed.
>>>>>>     >>
>>>>>>     >> Ciao
>>>>>>     >> Hannes
>>>>>>     >>
>>>>>>     >>
>>>>>>     >> _______________________________________________
>>>>>>     >> OAuth mailing list
>>>>>>     >> OAuth@ietf.org <mailto:OAuth@ietf.org>
>>>>>>     >> https://www.ietf.org/mailman/listinfo/oauth
>>>>>>     > _______________________________________________
>>>>>>     > OAuth mailing list
>>>>>>     > OAuth@ietf.org <mailto:OAuth@ietf.org>
>>>>>>     > https://www.ietf.org/mailman/listinfo/oauth
>>>>>>
>>>>>>
>>>>>>     _______________________________________________
>>>>>>     OAuth mailing list
>>>>>>     OAuth@ietf.org <mailto:OAuth@ietf.org>
>>>>>>     https://www.ietf.org/mailman/listinfo/oauth
>>>>>>     _______________________________________________
>>>>>>     OAuth mailing list
>>>>>>     OAuth@ietf.org <mailto:OAuth@ietf.org>
>>>>>>     https://www.ietf.org/mailman/listinfo/oauth
>>>>>>
>>>>>>
>>>>>>     _______________________________________________
>>>>>>     OAuth mailing list
>>>>>>     OAuth@ietf.org <mailto:OAuth@ietf.org>
>>>>>>     https://www.ietf.org/mailman/listinfo/oauth
>>>>>
>>>>>
>>>>
>>>>
>>>>
>>>>     _______________________________________________
>>>>     OAuth mailing list
>>>>     OAuth@ietf.org <mailto:OAuth@ietf.org>
>>>>     https://www.ietf.org/mailman/listinfo/oauth
>>>>
>>>>
>>>>
>>>>
>>>> _______________________________________________
>>>> OAuth mailing list
>>>> OAuth@ietf.org  <mailto:OAuth@ietf.org>
>>>> https://www.ietf.org/mailman/listinfo/oauth
>>>
>>>
>>>
>>> _______________________________________________
>>> OAuth mailing list
>>> OAuth@ietf.org <mailto:OAuth@ietf.org>
>>> https://www.ietf.org/mailman/listinfo/oauth
>>
>>
>
>
>
>
> _______________________________________________
> OAuth mailing list
> OAuth@ietf.org
> https://www.ietf.org/mailman/listinfo/oauth

From stephen.farrell@cs.tcd.ie  Sun Feb 17 11:25:12 2013
Return-Path: <stephen.farrell@cs.tcd.ie>
X-Original-To: oauth@ietfa.amsl.com
Delivered-To: oauth@ietfa.amsl.com
Received: from localhost (localhost [127.0.0.1]) by ietfa.amsl.com (Postfix) with ESMTP id 7BB8821F84EB for <oauth@ietfa.amsl.com>; Sun, 17 Feb 2013 11:25:12 -0800 (PST)
X-Virus-Scanned: amavisd-new at amsl.com
X-Spam-Flag: NO
X-Spam-Score: -102.599
X-Spam-Level: 
X-Spam-Status: No, score=-102.599 tagged_above=-999 required=5 tests=[BAYES_00=-2.599, USER_IN_WHITELIST=-100]
Received: from mail.ietf.org ([64.170.98.30]) by localhost (ietfa.amsl.com [127.0.0.1]) (amavisd-new, port 10024) with ESMTP id o6s5D77WxVvd for <oauth@ietfa.amsl.com>; Sun, 17 Feb 2013 11:25:12 -0800 (PST)
Received: from mercury.scss.tcd.ie (mercury.scss.tcd.ie [134.226.56.6]) by ietfa.amsl.com (Postfix) with ESMTP id D7DA421F8B2E for <oauth@ietf.org>; Sun, 17 Feb 2013 11:25:02 -0800 (PST)
Received: from localhost (localhost [127.0.0.1]) by mercury.scss.tcd.ie (Postfix) with ESMTP id 47028BE49; Sun, 17 Feb 2013 19:24:41 +0000 (GMT)
X-Virus-Scanned: Debian amavisd-new at scss.tcd.ie
Received: from mercury.scss.tcd.ie ([127.0.0.1]) by localhost (mercury.scss.tcd.ie [127.0.0.1]) (amavisd-new, port 10024) with ESMTP id sYAwTEfuoDey; Sun, 17 Feb 2013 19:24:41 +0000 (GMT)
Received: from [10.87.48.11] (unknown [86.44.73.97]) by mercury.scss.tcd.ie (Postfix) with ESMTPSA id 11521BE3E; Sun, 17 Feb 2013 19:24:41 +0000 (GMT)
Message-ID: <51212E78.1050206@cs.tcd.ie>
Date: Sun, 17 Feb 2013 19:24:40 +0000
From: Stephen Farrell <stephen.farrell@cs.tcd.ie>
User-Agent: Mozilla/5.0 (X11; Linux x86_64; rv:17.0) Gecko/20130106 Thunderbird/17.0.2
MIME-Version: 1.0
To: "oauth@ietf.org" <oauth@ietf.org>
X-Enigmail-Version: 1.5
Content-Type: text/plain; charset=ISO-8859-1
Content-Transfer-Encoding: 7bit
Cc: Barry Leiba <barryleiba@computer.org>, "oauth-chairs@tools.ietf.org" <oauth-chairs@tools.ietf.org>
Subject: [OAUTH-WG] oauth assertions plan
X-BeenThere: oauth@ietf.org
X-Mailman-Version: 2.1.12
Precedence: list
List-Id: OAUTH WG <oauth.ietf.org>
List-Unsubscribe: <https://www.ietf.org/mailman/options/oauth>, <mailto:oauth-request@ietf.org?subject=unsubscribe>
List-Archive: <http://www.ietf.org/mail-archive/web/oauth>
List-Post: <mailto:oauth@ietf.org>
List-Help: <mailto:oauth-request@ietf.org?subject=help>
List-Subscribe: <https://www.ietf.org/mailman/listinfo/oauth>, <mailto:oauth-request@ietf.org?subject=subscribe>
X-List-Received-Date: Sun, 17 Feb 2013 19:25:12 -0000

Hi all,

The OAuth assertion document has received DISCUSSes as you can
see from the data tracker at [1].  I've been chatting with
the chairs and the ADs with those DISCUSSes in the last few
days.

The main concern is that these documents do not sufficiently
specify the functionality that is needed (MTI) in order
to develop an interoperable implementation. This concern is,
unfortunately, also applicable to the two assertion instance
documents, the JWT (draft-ietf-oauth-jwt-bearer) and the SAML
(draft-ietf-oauth-saml2-bearer) documents.

I've therefore decided to send the assertion document back to
the working group and to recommend to the group to resubmit
them for publication once these blocking DISCUSSes have been
addressed satisfactory. I think this will need some consideration
of both the assertions framework and the saml/jwt drafts. (Probably
submitting two or three of those at once makes better sense
anyway.)

To help resolve this we're planning to meet at lunch time on
the Monday of the IETF just before the oauth session. The goal
of that chat is to try to figure out what'll need doing to get
these documents ready, so that that plan can be presented as
a semi-worked out proposal at the oauth session later that day.
I'd like to have the document editors/authors, chairs and
discussing ADs there if possible. (I'll send details.) If
someone else really needs to be there, let me know but I think
starting with the smaller group will be more tractable. If
everyone thinks we need to just work it out at the WG session
that's fine and we can skip the lunchtime meeting, but I'd say
we're likely to end up in the same place but take longer.

However, if this can be sorted on the list beforehand that's
much better of course, so please do try to do that starting
now. (That is, let's not start by quibbling about process
and lunchtime meetings but by discussing the DISCUSSes:-)

Regards,
Stephen.

[1] http://datatracker.ietf.org/doc/draft-ietf-oauth-assertions/ballot/.


From Michael.Jones@microsoft.com  Sun Feb 17 12:41:35 2013
Return-Path: <Michael.Jones@microsoft.com>
X-Original-To: oauth@ietfa.amsl.com
Delivered-To: oauth@ietfa.amsl.com
Received: from localhost (localhost [127.0.0.1]) by ietfa.amsl.com (Postfix) with ESMTP id 178ED21E8041 for <oauth@ietfa.amsl.com>; Sun, 17 Feb 2013 12:41:35 -0800 (PST)
X-Virus-Scanned: amavisd-new at amsl.com
X-Spam-Flag: NO
X-Spam-Score: -2.586
X-Spam-Level: 
X-Spam-Status: No, score=-2.586 tagged_above=-999 required=5 tests=[AWL=0.013,  BAYES_00=-2.599]
Received: from mail.ietf.org ([64.170.98.30]) by localhost (ietfa.amsl.com [127.0.0.1]) (amavisd-new, port 10024) with ESMTP id 32xQWrJSe9vw for <oauth@ietfa.amsl.com>; Sun, 17 Feb 2013 12:41:34 -0800 (PST)
Received: from na01-by2-obe.outbound.protection.outlook.com (na01-by2-obe.ptr.protection.outlook.com [207.46.100.25]) by ietfa.amsl.com (Postfix) with ESMTP id 2B8E421F8A79 for <oauth@ietf.org>; Sun, 17 Feb 2013 12:41:34 -0800 (PST)
Received: from BL2FFO11FD007.protection.gbl (10.173.161.202) by BL2FFO11HUB019.protection.gbl (10.173.160.111) with Microsoft SMTP Server (TLS) id 15.0.620.12; Sun, 17 Feb 2013 20:41:31 +0000
Received: from TK5EX14HUBC104.redmond.corp.microsoft.com (131.107.125.37) by BL2FFO11FD007.mail.protection.outlook.com (10.173.161.3) with Microsoft SMTP Server (TLS) id 15.0.620.12 via Frontend Transport; Sun, 17 Feb 2013 20:41:31 +0000
Received: from TK5EX14MBXC284.redmond.corp.microsoft.com ([169.254.1.96]) by TK5EX14HUBC104.redmond.corp.microsoft.com ([157.54.80.25]) with mapi id 14.02.0318.003; Sun, 17 Feb 2013 20:41:29 +0000
From: Mike Jones <Michael.Jones@microsoft.com>
To: Stephen Farrell <stephen.farrell@cs.tcd.ie>, "oauth@ietf.org" <oauth@ietf.org>
Thread-Topic: [OAUTH-WG] oauth assertions plan
Thread-Index: AQHODUSFJYuGTyHp/UK+QNplisn2A5h+fdTA
Date: Sun, 17 Feb 2013 20:41:29 +0000
Message-ID: <4E1F6AAD24975D4BA5B16804296739436746DC1C@TK5EX14MBXC284.redmond.corp.microsoft.com>
References: <51212E78.1050206@cs.tcd.ie>
In-Reply-To: <51212E78.1050206@cs.tcd.ie>
Accept-Language: en-US
Content-Language: en-US
X-MS-Has-Attach: 
X-MS-TNEF-Correlator: 
x-originating-ip: [157.54.51.35]
Content-Type: text/plain; charset="us-ascii"
Content-Transfer-Encoding: quoted-printable
MIME-Version: 1.0
X-Forefront-Antispam-Report: CIP:131.107.125.37; CTRY:US; IPV:CAL; IPV:NLI; EFV:NLI; SFV:NSPM; SFS:(377454001)(13464002)(199002)(189002)(53754002)(65816001)(74662001)(74502001)(561944001)(76482001)(47446002)(23726001)(15202345001)(44976002)(46406002)(31966008)(16406001)(79102001)(5343655001)(66066001)(33656001)(46102001)(63696002)(80022001)(56776001)(56816002)(20776003)(47776003)(59766001)(54356001)(55846006)(77982001)(53806001)(47976001)(4396001)(47736001)(54316002)(51856001)(50466001)(50986001)(49866001); DIR:OUT; SFP:; SCL:1; SRVR:BL2FFO11HUB019; H:TK5EX14HUBC104.redmond.corp.microsoft.com; RD:InfoDomainNonexistent; A:1; MX:1; LANG:en; 
X-OriginatorOrg: microsoft.onmicrosoft.com
X-Forefront-PRVS: 07607ED19A
Cc: "oauth-chairs@tools.ietf.org" <oauth-chairs@tools.ietf.org>, Barry Leiba <barryleiba@computer.org>
Subject: Re: [OAUTH-WG] oauth assertions plan
X-BeenThere: oauth@ietf.org
X-Mailman-Version: 2.1.12
Precedence: list
List-Id: OAUTH WG <oauth.ietf.org>
List-Unsubscribe: <https://www.ietf.org/mailman/options/oauth>, <mailto:oauth-request@ietf.org?subject=unsubscribe>
List-Archive: <http://www.ietf.org/mail-archive/web/oauth>
List-Post: <mailto:oauth@ietf.org>
List-Help: <mailto:oauth-request@ietf.org?subject=help>
List-Subscribe: <https://www.ietf.org/mailman/listinfo/oauth>, <mailto:oauth-request@ietf.org?subject=subscribe>
X-List-Received-Date: Sun, 17 Feb 2013 20:41:35 -0000

I've been thinking about Barry's DISCUSS for a bit.  No one else has respon=
ded yet, so I guess I'll jump in and share my perspective.

As I see it, the OAuth Assertions spec, the SAML Assertion Profile, and the=
 JWT Assertion Profile are tools used for building applications - not appli=
cations themselves.  As such, there will and should be fields whose precise=
 syntax and interpretation is left up to the applications building built wi=
th them.  Applications can and should be interoperable.  Tools require prof=
iling to achieve interoperability.  This isn't a bug.  It's a feature, as i=
t means that the tool can be used in many different applications.

Let's consider the Audience field as an illustrative example.  For some app=
lications, the Audience field will be the Client ID of an OAuth Client.  Fo=
r some applications, the Audience field will be the URI of an endpoint that=
 the flow is redirected to.  For some applications, the Audience field will=
 be an abstract identifier associated with a group of participating parties=
, for instance, it might be a URN such as urn:incommon:federation-members. =
 All of these are valid uses of the Audience field.  If any of them were ma=
de mandatory values, it would break all the other applications, because tho=
se values aren't applicable or useful in the other applications.

I'll close with an analogy.  The UDP protocol is a tool.  The TCP protocol =
is a tool.  They were standardized as RFCs 768 and 793 without MTI port val=
ues or applications.  They could have required that TFTP and Telnet also be=
 implemented to ensure interoperable implementations of UDP and TCP, but th=
ey did not.  Just like the situation with the OAuth Assertions specs, this =
wasn't a bug - it was a feature.

I'd therefore request that you withdraw the DISCUSS on that basis, Barry.

I'd be glad to talk with you more about this either via e-mail or by phone.=
  I'm looking forward to a useful and productive discussion.

				Cheers,
				-- Mike

P.S.  RFC 768 is amazingly short!  Have a look at it again, if you haven't =
read it in a while.  Good things really can come in small packages!

-----Original Message-----
From: oauth-bounces@ietf.org [mailto:oauth-bounces@ietf.org] On Behalf Of S=
tephen Farrell
Sent: Sunday, February 17, 2013 11:25 AM
To: oauth@ietf.org
Cc: Barry Leiba; oauth-chairs@tools.ietf.org
Subject: [OAUTH-WG] oauth assertions plan


Hi all,

The OAuth assertion document has received DISCUSSes as you can see from the=
 data tracker at [1].  I've been chatting with the chairs and the ADs with =
those DISCUSSes in the last few days.

The main concern is that these documents do not sufficiently specify the fu=
nctionality that is needed (MTI) in order to develop an interoperable imple=
mentation. This concern is, unfortunately, also applicable to the two asser=
tion instance documents, the JWT (draft-ietf-oauth-jwt-bearer) and the SAML
(draft-ietf-oauth-saml2-bearer) documents.

I've therefore decided to send the assertion document back to the working g=
roup and to recommend to the group to resubmit them for publication once th=
ese blocking DISCUSSes have been addressed satisfactory. I think this will =
need some consideration of both the assertions framework and the saml/jwt d=
rafts. (Probably submitting two or three of those at once makes better sens=
e
anyway.)

To help resolve this we're planning to meet at lunch time on the Monday of =
the IETF just before the oauth session. The goal of that chat is to try to =
figure out what'll need doing to get these documents ready, so that that pl=
an can be presented as a semi-worked out proposal at the oauth session late=
r that day.
I'd like to have the document editors/authors, chairs and discussing ADs th=
ere if possible. (I'll send details.) If someone else really needs to be th=
ere, let me know but I think starting with the smaller group will be more t=
ractable. If everyone thinks we need to just work it out at the WG session =
that's fine and we can skip the lunchtime meeting, but I'd say we're likely=
 to end up in the same place but take longer.

However, if this can be sorted on the list beforehand that's much better of=
 course, so please do try to do that starting now. (That is, let's not star=
t by quibbling about process and lunchtime meetings but by discussing the D=
ISCUSSes:-)

Regards,
Stephen.

[1] http://datatracker.ietf.org/doc/draft-ietf-oauth-assertions/ballot/.

_______________________________________________
OAuth mailing list
OAuth@ietf.org
https://www.ietf.org/mailman/listinfo/oauth

From stephen.farrell@cs.tcd.ie  Sun Feb 17 13:26:06 2013
Return-Path: <stephen.farrell@cs.tcd.ie>
X-Original-To: oauth@ietfa.amsl.com
Delivered-To: oauth@ietfa.amsl.com
Received: from localhost (localhost [127.0.0.1]) by ietfa.amsl.com (Postfix) with ESMTP id 5F7F221F8B2E for <oauth@ietfa.amsl.com>; Sun, 17 Feb 2013 13:26:06 -0800 (PST)
X-Virus-Scanned: amavisd-new at amsl.com
X-Spam-Flag: NO
X-Spam-Score: -102.599
X-Spam-Level: 
X-Spam-Status: No, score=-102.599 tagged_above=-999 required=5 tests=[BAYES_00=-2.599, USER_IN_WHITELIST=-100]
Received: from mail.ietf.org ([64.170.98.30]) by localhost (ietfa.amsl.com [127.0.0.1]) (amavisd-new, port 10024) with ESMTP id QIiwkK3vfT1b for <oauth@ietfa.amsl.com>; Sun, 17 Feb 2013 13:26:05 -0800 (PST)
Received: from mercury.scss.tcd.ie (mercury.scss.tcd.ie [134.226.56.6]) by ietfa.amsl.com (Postfix) with ESMTP id 5CB4C21F896B for <oauth@ietf.org>; Sun, 17 Feb 2013 13:25:59 -0800 (PST)
Received: from localhost (localhost [127.0.0.1]) by mercury.scss.tcd.ie (Postfix) with ESMTP id E155CBE47; Sun, 17 Feb 2013 21:25:36 +0000 (GMT)
X-Virus-Scanned: Debian amavisd-new at scss.tcd.ie
Received: from mercury.scss.tcd.ie ([127.0.0.1]) by localhost (mercury.scss.tcd.ie [127.0.0.1]) (amavisd-new, port 10024) with ESMTP id bhFFejNqykyg; Sun, 17 Feb 2013 21:25:34 +0000 (GMT)
Received: from [10.87.48.11] (unknown [86.44.73.97]) by mercury.scss.tcd.ie (Postfix) with ESMTPSA id 0033ABE3E; Sun, 17 Feb 2013 21:25:33 +0000 (GMT)
Message-ID: <51214AC5.3090807@cs.tcd.ie>
Date: Sun, 17 Feb 2013 21:25:25 +0000
From: Stephen Farrell <stephen.farrell@cs.tcd.ie>
User-Agent: Mozilla/5.0 (X11; Linux x86_64; rv:17.0) Gecko/20130106 Thunderbird/17.0.2
MIME-Version: 1.0
To: Mike Jones <Michael.Jones@microsoft.com>
References: <51212E78.1050206@cs.tcd.ie> <4E1F6AAD24975D4BA5B16804296739436746DC1C@TK5EX14MBXC284.redmond.corp.microsoft.com>
In-Reply-To: <4E1F6AAD24975D4BA5B16804296739436746DC1C@TK5EX14MBXC284.redmond.corp.microsoft.com>
X-Enigmail-Version: 1.5
Content-Type: text/plain; charset=ISO-8859-1
Content-Transfer-Encoding: 7bit
Cc: "oauth-chairs@tools.ietf.org" <oauth-chairs@tools.ietf.org>, Barry Leiba <barryleiba@computer.org>, "oauth@ietf.org" <oauth@ietf.org>
Subject: Re: [OAUTH-WG] oauth assertions plan
X-BeenThere: oauth@ietf.org
X-Mailman-Version: 2.1.12
Precedence: list
List-Id: OAUTH WG <oauth.ietf.org>
List-Unsubscribe: <https://www.ietf.org/mailman/options/oauth>, <mailto:oauth-request@ietf.org?subject=unsubscribe>
List-Archive: <http://www.ietf.org/mail-archive/web/oauth>
List-Post: <mailto:oauth@ietf.org>
List-Help: <mailto:oauth-request@ietf.org?subject=help>
List-Subscribe: <https://www.ietf.org/mailman/listinfo/oauth>, <mailto:oauth-request@ietf.org?subject=subscribe>
X-List-Received-Date: Sun, 17 Feb 2013 21:26:06 -0000

Hi Mike,

On 02/17/2013 08:41 PM, Mike Jones wrote:
> I've been thinking about Barry's DISCUSS for a bit.  No one else has responded yet, so I guess I'll jump in and share my perspective.
> 
> As I see it, the OAuth Assertions spec, the SAML Assertion Profile, and the JWT Assertion Profile are tools used for building applications - not applications themselves.  As such, there will and should be fields whose precise syntax and interpretation is left up to the applications building built with them.  Applications can and should be interoperable.  Tools require profiling to achieve interoperability.  This isn't a bug.  It's a feature, as it means that the tool can be used in many different applications.

Declaring something a feature or bug may be in the eye of the
beholder. But the discuss is about interop and you don't address
that.

Please bear in mind that being able to interop (the goal here)
does not mean that field foo MUST have value type bar but that
implementations MUST have the code for handing value type bar.
I see no argument in your mail addressing that.

These specs might also be useful tools in a toolbox but that
is beside the point of this DISCUSSion.

> Let's consider the Audience field as an illustrative example.  For some applications, the Audience field will be the Client ID of an OAuth Client.  For some applications, the Audience field will be the URI of an endpoint that the flow is redirected to.  For some applications, the Audience field will be an abstract identifier associated with a group of participating parties, for instance, it might be a URN such as urn:incommon:federation-members.  All of these are valid uses of the Audience field.  If any of them were made mandatory values, it would break all the other applications, because those values aren't applicable or useful in the other applications.
> 
> I'll close with an analogy.  The UDP protocol is a tool.  The TCP protocol is a tool.  They were standardized as RFCs 768 and 793 without MTI port values or applications.  They could have required that TFTP and Telnet also be implemented to ensure interoperable implementations of UDP and TCP, but they did not.  Just like the situation with the OAuth Assertions specs, this wasn't a bug - it was a feature.

One cannot draw any conclusion from analogies and I don't
think they help this discussion.

> I'd therefore request that you withdraw the DISCUSS on that basis, Barry.

I'd be surprised, but Barry's able to speak for himself. I think
the WG need to address the topic of the discuss and not try to
say that interop isn't important. In this venue, it is.

> I'd be glad to talk with you more about this either via e-mail or by phone.  I'm looking forward to a useful and productive discussion.

Email discussion on this list is where this should mostly happen
I think now that the draft is back with the WG.

Cheers,
S.


> 				Cheers,
> 				-- Mike
> 
> P.S.  RFC 768 is amazingly short!  Have a look at it again, if you haven't read it in a while.  Good things really can come in small packages!
> 
> -----Original Message-----
> From: oauth-bounces@ietf.org [mailto:oauth-bounces@ietf.org] On Behalf Of Stephen Farrell
> Sent: Sunday, February 17, 2013 11:25 AM
> To: oauth@ietf.org
> Cc: Barry Leiba; oauth-chairs@tools.ietf.org
> Subject: [OAUTH-WG] oauth assertions plan
> 
> 
> Hi all,
> 
> The OAuth assertion document has received DISCUSSes as you can see from the data tracker at [1].  I've been chatting with the chairs and the ADs with those DISCUSSes in the last few days.
> 
> The main concern is that these documents do not sufficiently specify the functionality that is needed (MTI) in order to develop an interoperable implementation. This concern is, unfortunately, also applicable to the two assertion instance documents, the JWT (draft-ietf-oauth-jwt-bearer) and the SAML
> (draft-ietf-oauth-saml2-bearer) documents.
> 
> I've therefore decided to send the assertion document back to the working group and to recommend to the group to resubmit them for publication once these blocking DISCUSSes have been addressed satisfactory. I think this will need some consideration of both the assertions framework and the saml/jwt drafts. (Probably submitting two or three of those at once makes better sense
> anyway.)
> 
> To help resolve this we're planning to meet at lunch time on the Monday of the IETF just before the oauth session. The goal of that chat is to try to figure out what'll need doing to get these documents ready, so that that plan can be presented as a semi-worked out proposal at the oauth session later that day.
> I'd like to have the document editors/authors, chairs and discussing ADs there if possible. (I'll send details.) If someone else really needs to be there, let me know but I think starting with the smaller group will be more tractable. If everyone thinks we need to just work it out at the WG session that's fine and we can skip the lunchtime meeting, but I'd say we're likely to end up in the same place but take longer.
> 
> However, if this can be sorted on the list beforehand that's much better of course, so please do try to do that starting now. (That is, let's not start by quibbling about process and lunchtime meetings but by discussing the DISCUSSes:-)
> 
> Regards,
> Stephen.
> 
> [1] http://datatracker.ietf.org/doc/draft-ietf-oauth-assertions/ballot/.
> 
> _______________________________________________
> OAuth mailing list
> OAuth@ietf.org
> https://www.ietf.org/mailman/listinfo/oauth
> 
> 

From Michael.Jones@microsoft.com  Sun Feb 17 13:56:53 2013
Return-Path: <Michael.Jones@microsoft.com>
X-Original-To: oauth@ietfa.amsl.com
Delivered-To: oauth@ietfa.amsl.com
Received: from localhost (localhost [127.0.0.1]) by ietfa.amsl.com (Postfix) with ESMTP id 7F23421F8B35 for <oauth@ietfa.amsl.com>; Sun, 17 Feb 2013 13:56:53 -0800 (PST)
X-Virus-Scanned: amavisd-new at amsl.com
X-Spam-Flag: NO
X-Spam-Score: -2.586
X-Spam-Level: 
X-Spam-Status: No, score=-2.586 tagged_above=-999 required=5 tests=[AWL=0.013,  BAYES_00=-2.599]
Received: from mail.ietf.org ([64.170.98.30]) by localhost (ietfa.amsl.com [127.0.0.1]) (amavisd-new, port 10024) with ESMTP id csduYuStAUq7 for <oauth@ietfa.amsl.com>; Sun, 17 Feb 2013 13:56:52 -0800 (PST)
Received: from na01-bl2-obe.outbound.protection.outlook.com (na01-bl2-obe.ptr.protection.outlook.com [65.55.169.28]) by ietfa.amsl.com (Postfix) with ESMTP id D076721F8B34 for <oauth@ietf.org>; Sun, 17 Feb 2013 13:56:51 -0800 (PST)
Received: from BL2FFO11FD015.protection.gbl (10.173.161.202) by BL2FFO11HUB021.protection.gbl (10.173.161.45) with Microsoft SMTP Server (TLS) id 15.0.620.12; Sun, 17 Feb 2013 21:56:44 +0000
Received: from TK5EX14HUBC107.redmond.corp.microsoft.com (131.107.125.37) by BL2FFO11FD015.mail.protection.outlook.com (10.173.160.223) with Microsoft SMTP Server (TLS) id 15.0.620.12 via Frontend Transport; Sun, 17 Feb 2013 21:56:43 +0000
Received: from TK5EX14MBXC284.redmond.corp.microsoft.com ([169.254.1.96]) by TK5EX14HUBC107.redmond.corp.microsoft.com ([157.54.80.67]) with mapi id 14.02.0318.003; Sun, 17 Feb 2013 21:56:28 +0000
From: Mike Jones <Michael.Jones@microsoft.com>
To: Stephen Farrell <stephen.farrell@cs.tcd.ie>
Thread-Topic: [OAUTH-WG] oauth assertions plan
Thread-Index: AQHODUSFJYuGTyHp/UK+QNplisn2A5h+fdTAgAASPICAAAGIAA==
Date: Sun, 17 Feb 2013 21:56:28 +0000
Message-ID: <4E1F6AAD24975D4BA5B16804296739436746DE40@TK5EX14MBXC284.redmond.corp.microsoft.com>
References: <51212E78.1050206@cs.tcd.ie> <4E1F6AAD24975D4BA5B16804296739436746DC1C@TK5EX14MBXC284.redmond.corp.microsoft.com> <51214AC5.3090807@cs.tcd.ie>
In-Reply-To: <51214AC5.3090807@cs.tcd.ie>
Accept-Language: en-US
Content-Language: en-US
X-MS-Has-Attach: 
X-MS-TNEF-Correlator: 
x-originating-ip: [157.54.51.35]
Content-Type: text/plain; charset="us-ascii"
Content-Transfer-Encoding: quoted-printable
MIME-Version: 1.0
X-Forefront-Antispam-Report: CIP:131.107.125.37; CTRY:US; IPV:CAL; IPV:NLI; EFV:NLI; SFV:NSPM; SFS:(53754002)(13464002)(51704002)(189002)(199002)(377454001)(24454001)(479174001)(561944001)(15202345001)(53806001)(33656001)(47446002)(54356001)(5343655001)(65816001)(74502001)(79102001)(16406001)(80022001)(66066001)(46406002)(59766001)(55846006)(77982001)(31966008)(23726001)(46102001)(54316002)(47776003)(56776001)(50466001)(63696002)(76482001)(49866001)(51856001)(44976002)(74662001)(20776003)(56816002)(47736001)(50986001)(4396001)(47976001); DIR:OUT; SFP:; SCL:1; SRVR:BL2FFO11HUB021; H:TK5EX14HUBC107.redmond.corp.microsoft.com; RD:InfoDomainNonexistent; MX:1; A:1; LANG:en; 
X-OriginatorOrg: microsoft.onmicrosoft.com
X-Forefront-PRVS: 07607ED19A
Cc: "oauth-chairs@tools.ietf.org" <oauth-chairs@tools.ietf.org>, Barry Leiba <barryleiba@computer.org>, "oauth@ietf.org" <oauth@ietf.org>
Subject: Re: [OAUTH-WG] oauth assertions plan
X-BeenThere: oauth@ietf.org
X-Mailman-Version: 2.1.12
Precedence: list
List-Id: OAUTH WG <oauth.ietf.org>
List-Unsubscribe: <https://www.ietf.org/mailman/options/oauth>, <mailto:oauth-request@ietf.org?subject=unsubscribe>
List-Archive: <http://www.ietf.org/mail-archive/web/oauth>
List-Post: <mailto:oauth@ietf.org>
List-Help: <mailto:oauth-request@ietf.org?subject=help>
List-Subscribe: <https://www.ietf.org/mailman/listinfo/oauth>, <mailto:oauth-request@ietf.org?subject=subscribe>
X-List-Received-Date: Sun, 17 Feb 2013 21:56:53 -0000

Hi Stephen,

I disagree with you that I didn't discuss address interop in my note below.=
  I stated that applications built with these specifications can and should=
 be interoperable, but that profiling is (and should be) required to achiev=
e completely interoperable implementations of these specifications.

The contents of an assertion used for different applications will, of neces=
sity, have some differences between them, because they're specific to the n=
eeds of the application.  If we mandate an MTI profile that meets the needs=
 of one application of assertions, we will have rendered the specifications=
 less useful (or unusable) to other applications.  Otherwise (while you may=
 not find analogies useful), it's like declaring that TFTP be an MTI applic=
ation for all UDP implementations, in order to achieve interoperability.

I think it would be useful if we focused the discussion on the merits and d=
ownsides of specific possible changes to increase interop.  For instance, t=
he Audience field (by design) can contain different kinds of things when us=
ed by different applications.

Barry, are you proposing that we require that the Audience contain a specif=
ic data format tailored to a particular application of assertions?  If so, =
what format are you proposing, and for which application of assertions?  Li=
kewise, are you proposing that the Subject field contain a particular data =
format tailored to a particular application?  And also the Issuer field?

To be clear, the Subject, Issuer, and Audience fields are those that requir=
e profiling to achieve full interop.  Is there a concrete proposal that the=
 specs limit the values of those fields in a particular way?  (That would a=
chieve interop without profiling, but would severely limit the applicabilit=
y of the specs.)

Is there some third way that I'm missing?

				-- Mike
=20
-----Original Message-----
From: Stephen Farrell [mailto:stephen.farrell@cs.tcd.ie]=20
Sent: Sunday, February 17, 2013 1:25 PM
To: Mike Jones
Cc: oauth@ietf.org; Barry Leiba; oauth-chairs@tools.ietf.org
Subject: Re: [OAUTH-WG] oauth assertions plan


Hi Mike,

On 02/17/2013 08:41 PM, Mike Jones wrote:
> I've been thinking about Barry's DISCUSS for a bit.  No one else has resp=
onded yet, so I guess I'll jump in and share my perspective.
>=20
> As I see it, the OAuth Assertions spec, the SAML Assertion Profile, and t=
he JWT Assertion Profile are tools used for building applications - not app=
lications themselves.  As such, there will and should be fields whose preci=
se syntax and interpretation is left up to the applications building built =
with them.  Applications can and should be interoperable.  Tools require pr=
ofiling to achieve interoperability.  This isn't a bug.  It's a feature, as=
 it means that the tool can be used in many different applications.

Declaring something a feature or bug may be in the eye of the beholder. But=
 the discuss is about interop and you don't address that.

Please bear in mind that being able to interop (the goal here) does not mea=
n that field foo MUST have value type bar but that implementations MUST hav=
e the code for handing value type bar.
I see no argument in your mail addressing that.

These specs might also be useful tools in a toolbox but that is beside the =
point of this DISCUSSion.

> Let's consider the Audience field as an illustrative example.  For some a=
pplications, the Audience field will be the Client ID of an OAuth Client.  =
For some applications, the Audience field will be the URI of an endpoint th=
at the flow is redirected to.  For some applications, the Audience field wi=
ll be an abstract identifier associated with a group of participating parti=
es, for instance, it might be a URN such as urn:incommon:federation-members=
.  All of these are valid uses of the Audience field.  If any of them were =
made mandatory values, it would break all the other applications, because t=
hose values aren't applicable or useful in the other applications.
>=20
> I'll close with an analogy.  The UDP protocol is a tool.  The TCP protoco=
l is a tool.  They were standardized as RFCs 768 and 793 without MTI port v=
alues or applications.  They could have required that TFTP and Telnet also =
be implemented to ensure interoperable implementations of UDP and TCP, but =
they did not.  Just like the situation with the OAuth Assertions specs, thi=
s wasn't a bug - it was a feature.

One cannot draw any conclusion from analogies and I don't think they help t=
his discussion.

> I'd therefore request that you withdraw the DISCUSS on that basis, Barry.

I'd be surprised, but Barry's able to speak for himself. I think the WG nee=
d to address the topic of the discuss and not try to say that interop isn't=
 important. In this venue, it is.

> I'd be glad to talk with you more about this either via e-mail or by phon=
e.  I'm looking forward to a useful and productive discussion.

Email discussion on this list is where this should mostly happen I think no=
w that the draft is back with the WG.

Cheers,
S.


> 				Cheers,
> 				-- Mike
>=20
> P.S.  RFC 768 is amazingly short!  Have a look at it again, if you haven'=
t read it in a while.  Good things really can come in small packages!
>=20
> -----Original Message-----
> From: oauth-bounces@ietf.org [mailto:oauth-bounces@ietf.org] On Behalf=20
> Of Stephen Farrell
> Sent: Sunday, February 17, 2013 11:25 AM
> To: oauth@ietf.org
> Cc: Barry Leiba; oauth-chairs@tools.ietf.org
> Subject: [OAUTH-WG] oauth assertions plan
>=20
>=20
> Hi all,
>=20
> The OAuth assertion document has received DISCUSSes as you can see from t=
he data tracker at [1].  I've been chatting with the chairs and the ADs wit=
h those DISCUSSes in the last few days.
>=20
> The main concern is that these documents do not sufficiently specify=20
> the functionality that is needed (MTI) in order to develop an=20
> interoperable implementation. This concern is, unfortunately, also=20
> applicable to the two assertion instance documents, the JWT=20
> (draft-ietf-oauth-jwt-bearer) and the SAML
> (draft-ietf-oauth-saml2-bearer) documents.
>=20
> I've therefore decided to send the assertion document back to the=20
> working group and to recommend to the group to resubmit them for=20
> publication once these blocking DISCUSSes have been addressed=20
> satisfactory. I think this will need some consideration of both the=20
> assertions framework and the saml/jwt drafts. (Probably submitting two=20
> or three of those at once makes better sense
> anyway.)
>=20
> To help resolve this we're planning to meet at lunch time on the Monday o=
f the IETF just before the oauth session. The goal of that chat is to try t=
o figure out what'll need doing to get these documents ready, so that that =
plan can be presented as a semi-worked out proposal at the oauth session la=
ter that day.
> I'd like to have the document editors/authors, chairs and discussing ADs =
there if possible. (I'll send details.) If someone else really needs to be =
there, let me know but I think starting with the smaller group will be more=
 tractable. If everyone thinks we need to just work it out at the WG sessio=
n that's fine and we can skip the lunchtime meeting, but I'd say we're like=
ly to end up in the same place but take longer.
>=20
> However, if this can be sorted on the list beforehand that's much=20
> better of course, so please do try to do that starting now. (That is,=20
> let's not start by quibbling about process and lunchtime meetings but=20
> by discussing the DISCUSSes:-)
>=20
> Regards,
> Stephen.
>=20
> [1] http://datatracker.ietf.org/doc/draft-ietf-oauth-assertions/ballot/.
>=20
> _______________________________________________
> OAuth mailing list
> OAuth@ietf.org
> https://www.ietf.org/mailman/listinfo/oauth
>=20
>=20

From stephen.farrell@cs.tcd.ie  Sun Feb 17 16:23:37 2013
Return-Path: <stephen.farrell@cs.tcd.ie>
X-Original-To: oauth@ietfa.amsl.com
Delivered-To: oauth@ietfa.amsl.com
Received: from localhost (localhost [127.0.0.1]) by ietfa.amsl.com (Postfix) with ESMTP id 240FE21F8AF4 for <oauth@ietfa.amsl.com>; Sun, 17 Feb 2013 16:23:37 -0800 (PST)
X-Virus-Scanned: amavisd-new at amsl.com
X-Spam-Flag: NO
X-Spam-Score: -102.599
X-Spam-Level: 
X-Spam-Status: No, score=-102.599 tagged_above=-999 required=5 tests=[AWL=0.000, BAYES_00=-2.599, USER_IN_WHITELIST=-100]
Received: from mail.ietf.org ([64.170.98.30]) by localhost (ietfa.amsl.com [127.0.0.1]) (amavisd-new, port 10024) with ESMTP id tMwYZymIkR9s for <oauth@ietfa.amsl.com>; Sun, 17 Feb 2013 16:23:35 -0800 (PST)
Received: from mercury.scss.tcd.ie (mercury.scss.tcd.ie [134.226.56.6]) by ietfa.amsl.com (Postfix) with ESMTP id 1979E21F8B2B for <oauth@ietf.org>; Sun, 17 Feb 2013 16:23:35 -0800 (PST)
Received: from localhost (localhost [127.0.0.1]) by mercury.scss.tcd.ie (Postfix) with ESMTP id 5C519BE47; Mon, 18 Feb 2013 00:23:13 +0000 (GMT)
X-Virus-Scanned: Debian amavisd-new at scss.tcd.ie
Received: from mercury.scss.tcd.ie ([127.0.0.1]) by localhost (mercury.scss.tcd.ie [127.0.0.1]) (amavisd-new, port 10024) with ESMTP id jeU9fuV26L37; Mon, 18 Feb 2013 00:23:11 +0000 (GMT)
Received: from [10.87.48.11] (unknown [86.44.73.97]) by mercury.scss.tcd.ie (Postfix) with ESMTPSA id 7AA4BBE38; Mon, 18 Feb 2013 00:23:11 +0000 (GMT)
Message-ID: <5121746F.6050503@cs.tcd.ie>
Date: Mon, 18 Feb 2013 00:23:11 +0000
From: Stephen Farrell <stephen.farrell@cs.tcd.ie>
User-Agent: Mozilla/5.0 (X11; Linux x86_64; rv:17.0) Gecko/20130106 Thunderbird/17.0.2
MIME-Version: 1.0
To: Mike Jones <Michael.Jones@microsoft.com>
References: <51212E78.1050206@cs.tcd.ie> <4E1F6AAD24975D4BA5B16804296739436746DC1C@TK5EX14MBXC284.redmond.corp.microsoft.com> <51214AC5.3090807@cs.tcd.ie> <4E1F6AAD24975D4BA5B16804296739436746DE40@TK5EX14MBXC284.redmond.corp.microsoft.com>
In-Reply-To: <4E1F6AAD24975D4BA5B16804296739436746DE40@TK5EX14MBXC284.redmond.corp.microsoft.com>
X-Enigmail-Version: 1.5
Content-Type: text/plain; charset=ISO-8859-1
Content-Transfer-Encoding: 7bit
Cc: "oauth-chairs@tools.ietf.org" <oauth-chairs@tools.ietf.org>, Barry Leiba <barryleiba@computer.org>, "oauth@ietf.org" <oauth@ietf.org>
Subject: Re: [OAUTH-WG] oauth assertions plan
X-BeenThere: oauth@ietf.org
X-Mailman-Version: 2.1.12
Precedence: list
List-Id: OAUTH WG <oauth.ietf.org>
List-Unsubscribe: <https://www.ietf.org/mailman/options/oauth>, <mailto:oauth-request@ietf.org?subject=unsubscribe>
List-Archive: <http://www.ietf.org/mail-archive/web/oauth>
List-Post: <mailto:oauth@ietf.org>
List-Help: <mailto:oauth-request@ietf.org?subject=help>
List-Subscribe: <https://www.ietf.org/mailman/listinfo/oauth>, <mailto:oauth-request@ietf.org?subject=subscribe>
X-List-Received-Date: Mon, 18 Feb 2013 00:23:37 -0000

In some off-list mail between Mike and I, he said:

>> Was TCP a bad idea because it didn't have MTI port numbers?  Would
>> it have improved TCP to add an MTI port or two?

To which I responded:

> Ports are MTI for TCP. [1] They are 16 bit values
> with a well-defined test for equality and a little bit
> more structure/IANA stuff.

We agreed it'd be useful to bring this to the list since it
maybe captures the disconnect.

I'm not sure I quite get it but I think Mike means that no
particular port number (or the associated protocol) needs to
be listened for by all TCP stacks. That's correct, but nothing
to do with TCP interop.

Port numbers do need to be specified by all TCP packets or
those are malformed and all TCP stacks need to know how to
compare those and probably more subtleties but support for
port numbers is definitely not optional - its mandatory.

Cheers,
S.

[1] http://tools.ietf.org/html/rfc793#section-2.7

From ve7jtb@ve7jtb.com  Sun Feb 17 17:20:48 2013
Return-Path: <ve7jtb@ve7jtb.com>
X-Original-To: oauth@ietfa.amsl.com
Delivered-To: oauth@ietfa.amsl.com
Received: from localhost (localhost [127.0.0.1]) by ietfa.amsl.com (Postfix) with ESMTP id 90C6621F8A66 for <oauth@ietfa.amsl.com>; Sun, 17 Feb 2013 17:20:48 -0800 (PST)
X-Virus-Scanned: amavisd-new at amsl.com
X-Spam-Flag: NO
X-Spam-Score: -3.398
X-Spam-Level: 
X-Spam-Status: No, score=-3.398 tagged_above=-999 required=5 tests=[AWL=0.201,  BAYES_00=-2.599, RCVD_IN_DNSWL_LOW=-1]
Received: from mail.ietf.org ([64.170.98.30]) by localhost (ietfa.amsl.com [127.0.0.1]) (amavisd-new, port 10024) with ESMTP id 5Ab7iTBMnDsA for <oauth@ietfa.amsl.com>; Sun, 17 Feb 2013 17:20:47 -0800 (PST)
Received: from mail-qc0-f174.google.com (mail-qc0-f174.google.com [209.85.216.174]) by ietfa.amsl.com (Postfix) with ESMTP id D457821F8A4A for <oauth@ietf.org>; Sun, 17 Feb 2013 17:20:43 -0800 (PST)
Received: by mail-qc0-f174.google.com with SMTP id z24so1873172qcq.19 for <oauth@ietf.org>; Sun, 17 Feb 2013 17:20:43 -0800 (PST)
X-Google-DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=google.com; s=20120113; h=x-received:content-type:mime-version:subject:from:in-reply-to:date :cc:message-id:references:to:x-mailer:x-gm-message-state; bh=IQAu6DXU6xRTe1Zhgo4u5YfhbBdtI3gxOIHTAOs2bgk=; b=IIit8VZsv1YqSa2D86mNVnvaqafqFKZqHRhQPRIghWpk8tenXcGPZOsvrKu5Xq0d4q cnYSLUZ3jdInnAW90fGfInEBXyDTvRSuN4mSCba0/HgYbI1nzLWDEV246P5WAaixkJxP Swi5fkP/o2CCiOYVa22yz/vPETYHiayHw2pFqsnjvnxdf+1crskwQXjHZEr+SaAld2VD Lm4AE1lofR0WvFvPnl53iaXqlHaNNOOQ0yV67QZ2FizK87MTA6HESAFEnLq/myLpvHqx 9gpQYdUQ3jMayohYBKxBIgrWGRvXrw9qlBftHpj6Z5TU5YczwSLonapyb7bjDPH21gsl 8Chw==
X-Received: by 10.229.204.167 with SMTP id fm39mr848854qcb.97.1361150442925; Sun, 17 Feb 2013 17:20:42 -0800 (PST)
Received: from [192.168.1.213] (190-20-56-120.baf.movistar.cl. [190.20.56.120]) by mx.google.com with ESMTPS id 8sm23665905qed.6.2013.02.17.17.20.39 (version=TLSv1 cipher=ECDHE-RSA-RC4-SHA bits=128/128); Sun, 17 Feb 2013 17:20:41 -0800 (PST)
Content-Type: multipart/signed; boundary="Apple-Mail=_F15234AF-249A-45E5-9829-B5BCFA04BD4E"; protocol="application/pkcs7-signature"; micalg=sha1
Mime-Version: 1.0 (Mac OS X Mail 6.2 \(1499\))
From: John Bradley <ve7jtb@ve7jtb.com>
In-Reply-To: <4E1F6AAD24975D4BA5B16804296739436746DE40@TK5EX14MBXC284.redmond.corp.microsoft.com>
Date: Sun, 17 Feb 2013 22:19:43 -0300
Message-Id: <4796A10C-1DAD-4173-B2E3-F514F3A06FAC@ve7jtb.com>
References: <51212E78.1050206@cs.tcd.ie> <4E1F6AAD24975D4BA5B16804296739436746DC1C@TK5EX14MBXC284.redmond.corp.microsoft.com> <51214AC5.3090807@cs.tcd.ie> <4E1F6AAD24975D4BA5B16804296739436746DE40@TK5EX14MBXC284.redmond.corp.microsoft.com>
To: Mike Jones <Michael.Jones@microsoft.com>
X-Mailer: Apple Mail (2.1499)
X-Gm-Message-State: ALoCoQnf1IPECQs74DflnkHggU60lZol9Gw5aZoH/MIxBklw/MQ5v2vlwWgWTKzoeN1k/zTfpAA0
Cc: "oauth-chairs@tools.ietf.org" <oauth-chairs@tools.ietf.org>, Barry Leiba <barryleiba@computer.org>, "oauth@ietf.org" <oauth@ietf.org>
Subject: Re: [OAUTH-WG] oauth assertions plan
X-BeenThere: oauth@ietf.org
X-Mailman-Version: 2.1.12
Precedence: list
List-Id: OAUTH WG <oauth.ietf.org>
List-Unsubscribe: <https://www.ietf.org/mailman/options/oauth>, <mailto:oauth-request@ietf.org?subject=unsubscribe>
List-Archive: <http://www.ietf.org/mail-archive/web/oauth>
List-Post: <mailto:oauth@ietf.org>
List-Help: <mailto:oauth-request@ietf.org?subject=help>
List-Subscribe: <https://www.ietf.org/mailman/listinfo/oauth>, <mailto:oauth-request@ietf.org?subject=subscribe>
X-List-Received-Date: Mon, 18 Feb 2013 01:20:48 -0000

--Apple-Mail=_F15234AF-249A-45E5-9829-B5BCFA04BD4E
Content-Transfer-Encoding: quoted-printable
Content-Type: text/plain;
	charset=us-ascii

I largely agree with Mike, that assertions are going to be used in a =
number of places that have different naming conventions.

Is what Barry looking for a specific profile for how it would be used =
with the token endpoint to authenticate a OAuth confidential client to a =
token endpoint in the OAuth Code flow?

I can see having specifics for particular protocols using assertions for =
them to accede interop.  The debate on that is if that should be in the =
assertions spec , the JWT assertions spec, the SAML assertions spec or =
some other document.

Unless we get down to some specifics I feed we will talk this in =
circles.

In Connect we did profile it for the code flow use-case.   To do that =
interoperable algorithms and some other things needed to be specified.  =20=


It may be useful to look at several ways people intend to use these =
profiles to add perspective to the discussion.

John B.

On 2013-02-17, at 6:56 PM, Mike Jones <Michael.Jones@microsoft.com> =
wrote:

> Hi Stephen,
>=20
> I disagree with you that I didn't discuss address interop in my note =
below.  I stated that applications built with these specifications can =
and should be interoperable, but that profiling is (and should be) =
required to achieve completely interoperable implementations of these =
specifications.
>=20
> The contents of an assertion used for different applications will, of =
necessity, have some differences between them, because they're specific =
to the needs of the application.  If we mandate an MTI profile that =
meets the needs of one application of assertions, we will have rendered =
the specifications less useful (or unusable) to other applications.  =
Otherwise (while you may not find analogies useful), it's like declaring =
that TFTP be an MTI application for all UDP implementations, in order to =
achieve interoperability.
>=20
> I think it would be useful if we focused the discussion on the merits =
and downsides of specific possible changes to increase interop.  For =
instance, the Audience field (by design) can contain different kinds of =
things when used by different applications.
>=20
> Barry, are you proposing that we require that the Audience contain a =
specific data format tailored to a particular application of assertions? =
 If so, what format are you proposing, and for which application of =
assertions?  Likewise, are you proposing that the Subject field contain =
a particular data format tailored to a particular application?  And also =
the Issuer field?
>=20
> To be clear, the Subject, Issuer, and Audience fields are those that =
require profiling to achieve full interop.  Is there a concrete proposal =
that the specs limit the values of those fields in a particular way?  =
(That would achieve interop without profiling, but would severely limit =
the applicability of the specs.)
>=20
> Is there some third way that I'm missing?
>=20
> 				-- Mike
>=20
> -----Original Message-----
> From: Stephen Farrell [mailto:stephen.farrell@cs.tcd.ie]=20
> Sent: Sunday, February 17, 2013 1:25 PM
> To: Mike Jones
> Cc: oauth@ietf.org; Barry Leiba; oauth-chairs@tools.ietf.org
> Subject: Re: [OAUTH-WG] oauth assertions plan
>=20
>=20
> Hi Mike,
>=20
> On 02/17/2013 08:41 PM, Mike Jones wrote:
>> I've been thinking about Barry's DISCUSS for a bit.  No one else has =
responded yet, so I guess I'll jump in and share my perspective.
>>=20
>> As I see it, the OAuth Assertions spec, the SAML Assertion Profile, =
and the JWT Assertion Profile are tools used for building applications - =
not applications themselves.  As such, there will and should be fields =
whose precise syntax and interpretation is left up to the applications =
building built with them.  Applications can and should be interoperable. =
 Tools require profiling to achieve interoperability.  This isn't a bug. =
 It's a feature, as it means that the tool can be used in many different =
applications.
>=20
> Declaring something a feature or bug may be in the eye of the =
beholder. But the discuss is about interop and you don't address that.
>=20
> Please bear in mind that being able to interop (the goal here) does =
not mean that field foo MUST have value type bar but that =
implementations MUST have the code for handing value type bar.
> I see no argument in your mail addressing that.
>=20
> These specs might also be useful tools in a toolbox but that is beside =
the point of this DISCUSSion.
>=20
>> Let's consider the Audience field as an illustrative example.  For =
some applications, the Audience field will be the Client ID of an OAuth =
Client.  For some applications, the Audience field will be the URI of an =
endpoint that the flow is redirected to.  For some applications, the =
Audience field will be an abstract identifier associated with a group of =
participating parties, for instance, it might be a URN such as =
urn:incommon:federation-members.  All of these are valid uses of the =
Audience field.  If any of them were made mandatory values, it would =
break all the other applications, because those values aren't applicable =
or useful in the other applications.
>>=20
>> I'll close with an analogy.  The UDP protocol is a tool.  The TCP =
protocol is a tool.  They were standardized as RFCs 768 and 793 without =
MTI port values or applications.  They could have required that TFTP and =
Telnet also be implemented to ensure interoperable implementations of =
UDP and TCP, but they did not.  Just like the situation with the OAuth =
Assertions specs, this wasn't a bug - it was a feature.
>=20
> One cannot draw any conclusion from analogies and I don't think they =
help this discussion.
>=20
>> I'd therefore request that you withdraw the DISCUSS on that basis, =
Barry.
>=20
> I'd be surprised, but Barry's able to speak for himself. I think the =
WG need to address the topic of the discuss and not try to say that =
interop isn't important. In this venue, it is.
>=20
>> I'd be glad to talk with you more about this either via e-mail or by =
phone.  I'm looking forward to a useful and productive discussion.
>=20
> Email discussion on this list is where this should mostly happen I =
think now that the draft is back with the WG.
>=20
> Cheers,
> S.
>=20
>=20
>> 				Cheers,
>> 				-- Mike
>>=20
>> P.S.  RFC 768 is amazingly short!  Have a look at it again, if you =
haven't read it in a while.  Good things really can come in small =
packages!
>>=20
>> -----Original Message-----
>> From: oauth-bounces@ietf.org [mailto:oauth-bounces@ietf.org] On =
Behalf=20
>> Of Stephen Farrell
>> Sent: Sunday, February 17, 2013 11:25 AM
>> To: oauth@ietf.org
>> Cc: Barry Leiba; oauth-chairs@tools.ietf.org
>> Subject: [OAUTH-WG] oauth assertions plan
>>=20
>>=20
>> Hi all,
>>=20
>> The OAuth assertion document has received DISCUSSes as you can see =
from the data tracker at [1].  I've been chatting with the chairs and =
the ADs with those DISCUSSes in the last few days.
>>=20
>> The main concern is that these documents do not sufficiently specify=20=

>> the functionality that is needed (MTI) in order to develop an=20
>> interoperable implementation. This concern is, unfortunately, also=20
>> applicable to the two assertion instance documents, the JWT=20
>> (draft-ietf-oauth-jwt-bearer) and the SAML
>> (draft-ietf-oauth-saml2-bearer) documents.
>>=20
>> I've therefore decided to send the assertion document back to the=20
>> working group and to recommend to the group to resubmit them for=20
>> publication once these blocking DISCUSSes have been addressed=20
>> satisfactory. I think this will need some consideration of both the=20=

>> assertions framework and the saml/jwt drafts. (Probably submitting =
two=20
>> or three of those at once makes better sense
>> anyway.)
>>=20
>> To help resolve this we're planning to meet at lunch time on the =
Monday of the IETF just before the oauth session. The goal of that chat =
is to try to figure out what'll need doing to get these documents ready, =
so that that plan can be presented as a semi-worked out proposal at the =
oauth session later that day.
>> I'd like to have the document editors/authors, chairs and discussing =
ADs there if possible. (I'll send details.) If someone else really needs =
to be there, let me know but I think starting with the smaller group =
will be more tractable. If everyone thinks we need to just work it out =
at the WG session that's fine and we can skip the lunchtime meeting, but =
I'd say we're likely to end up in the same place but take longer.
>>=20
>> However, if this can be sorted on the list beforehand that's much=20
>> better of course, so please do try to do that starting now. (That is,=20=

>> let's not start by quibbling about process and lunchtime meetings but=20=

>> by discussing the DISCUSSes:-)
>>=20
>> Regards,
>> Stephen.
>>=20
>> [1] =
http://datatracker.ietf.org/doc/draft-ietf-oauth-assertions/ballot/.
>>=20
>> _______________________________________________
>> OAuth mailing list
>> OAuth@ietf.org
>> https://www.ietf.org/mailman/listinfo/oauth
>>=20
>>=20
> _______________________________________________
> OAuth mailing list
> OAuth@ietf.org
> https://www.ietf.org/mailman/listinfo/oauth


--Apple-Mail=_F15234AF-249A-45E5-9829-B5BCFA04BD4E
Content-Disposition: attachment;
	filename=smime.p7s
Content-Type: application/pkcs7-signature;
	name=smime.p7s
Content-Transfer-Encoding: base64
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--Apple-Mail=_F15234AF-249A-45E5-9829-B5BCFA04BD4E--

From barryleiba@gmail.com  Sun Feb 17 21:38:28 2013
Return-Path: <barryleiba@gmail.com>
X-Original-To: oauth@ietfa.amsl.com
Delivered-To: oauth@ietfa.amsl.com
Received: from localhost (localhost [127.0.0.1]) by ietfa.amsl.com (Postfix) with ESMTP id 8DCE621F88AE for <oauth@ietfa.amsl.com>; Sun, 17 Feb 2013 21:38:28 -0800 (PST)
X-Virus-Scanned: amavisd-new at amsl.com
X-Spam-Flag: NO
X-Spam-Score: -102.637
X-Spam-Level: 
X-Spam-Status: No, score=-102.637 tagged_above=-999 required=5 tests=[AWL=-0.260, BAYES_00=-2.599, FM_FORGED_GMAIL=0.622, J_CHICKENPOX_47=0.6, RCVD_IN_DNSWL_LOW=-1, USER_IN_WHITELIST=-100]
Received: from mail.ietf.org ([64.170.98.30]) by localhost (ietfa.amsl.com [127.0.0.1]) (amavisd-new, port 10024) with ESMTP id Qj2ODf3885Hm for <oauth@ietfa.amsl.com>; Sun, 17 Feb 2013 21:38:28 -0800 (PST)
Received: from mail-lb0-f179.google.com (mail-lb0-f179.google.com [209.85.217.179]) by ietfa.amsl.com (Postfix) with ESMTP id 33EFC21F89A6 for <oauth@ietf.org>; Sun, 17 Feb 2013 21:38:27 -0800 (PST)
Received: by mail-lb0-f179.google.com with SMTP id j14so4025830lbo.38 for <oauth@ietf.org>; Sun, 17 Feb 2013 21:38:26 -0800 (PST)
DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=gmail.com; s=20120113; h=mime-version:x-received:sender:in-reply-to:references:date :x-google-sender-auth:message-id:subject:from:to:cc:content-type; bh=ei83U4Kk0IT+TJZUh4Kbh27DMRBciNvVbWFaj+DxGwA=; b=zXTbrcoJbS2hBiVNa+hKsDGDtsUa8wZaQ7rc60SxreS15BP14fUYHcuxXZH3fVreR+ jHBOJ2rHcQY2xqc7vkxO+6+k8Hv8UEUOqH6oMJLylculOqkegM2QUbB0IlJ18Hdu1xIS ZrH7ZjuuSUjghzmN2HKApqiKm/Gk5rnC/EaNPR3y55aAu21YJu0thuAOL6e7qCrQAEuV 8AAKfY+Q9Ya3zeZqbKNQpvlPBNzReZiZ8ECTg8xPeSzpBcjXUGaiarlgxiwNRGVsS8+y qkxSnv54kifsXhyh6dYN38IG3jV9n+6m7EQb7zR/arIlw0bNkkf4B6/Ww5mdoXiSV0z2 mA7g==
MIME-Version: 1.0
X-Received: by 10.152.123.194 with SMTP id mc2mr9530966lab.7.1361165905952; Sun, 17 Feb 2013 21:38:25 -0800 (PST)
Sender: barryleiba@gmail.com
Received: by 10.112.76.98 with HTTP; Sun, 17 Feb 2013 21:38:25 -0800 (PST)
In-Reply-To: <4E1F6AAD24975D4BA5B16804296739436746DE40@TK5EX14MBXC284.redmond.corp.microsoft.com>
References: <51212E78.1050206@cs.tcd.ie> <4E1F6AAD24975D4BA5B16804296739436746DC1C@TK5EX14MBXC284.redmond.corp.microsoft.com> <51214AC5.3090807@cs.tcd.ie> <4E1F6AAD24975D4BA5B16804296739436746DE40@TK5EX14MBXC284.redmond.corp.microsoft.com>
Date: Mon, 18 Feb 2013 00:38:25 -0500
X-Google-Sender-Auth: RdDRwaAnSsoOjuwGjhMwXTZEBE4
Message-ID: <CALaySJ+YM9_DJ5KB1AnF+D-_1=jMhCdsxrgB3jQaaCLsB7w1Kg@mail.gmail.com>
From: Barry Leiba <barryleiba@computer.org>
To: Mike Jones <Michael.Jones@microsoft.com>
Content-Type: text/plain; charset=ISO-8859-1
Cc: "oauth-chairs@tools.ietf.org" <oauth-chairs@tools.ietf.org>, "oauth@ietf.org" <oauth@ietf.org>
Subject: Re: [OAUTH-WG] oauth assertions plan
X-BeenThere: oauth@ietf.org
X-Mailman-Version: 2.1.12
Precedence: list
List-Id: OAUTH WG <oauth.ietf.org>
List-Unsubscribe: <https://www.ietf.org/mailman/options/oauth>, <mailto:oauth-request@ietf.org?subject=unsubscribe>
List-Archive: <http://www.ietf.org/mail-archive/web/oauth>
List-Post: <mailto:oauth@ietf.org>
List-Help: <mailto:oauth-request@ietf.org?subject=help>
List-Subscribe: <https://www.ietf.org/mailman/listinfo/oauth>, <mailto:oauth-request@ietf.org?subject=subscribe>
X-List-Received-Date: Mon, 18 Feb 2013 05:38:28 -0000

OK, I have some time to respond to this on a real computer.

Let's look at the general mechanism that oauth provides, using one use case:
A client asks an authorization server for authorization to do something.
The authorization server responds with an authorization token, which
the client is required to understand.

We have talked about three kinds of tokens: bearer tokens, MAC tokens,
and assertion tokens.
How does a client know what kind of token it will get from a
particular authorization server?
How does a server that supports multiple token types know what kind of
token it should give to a particular client?

Now, suppose that the server decides to give back an assertion:
How does the server know whether to give a SAML assertion or a JWT
assertion?  How does the client know which it's going to get?

And now you're saying that even if everyone knows they're going to get
an assertion token, and specifically a JWT assertion, the semantics of
particular fields in those tokens are undefined.  If you have
different meanings ("different kinds of things", as you've said) for
the Audience field, how is the server supposed to communicate which
meaning *it* is using?  How is there any assurance that a client will
understand it in the same way?

These are the sorts of things I'm concerned about, and this is what I
mean by saying that it's like a Ukrainian doll: you open the oauth
doll and find the token doll; you open the token doll and find the
assertions doll; you open the assertions doll and find the JWT doll;
you open the JWT doll and find the Audience field doll... at what
point do the dolls end and interoperablity begins?

I understand that you want certain things to be handled differently by
different applications, and I'm fine with that in principle.  But the
other part of the principle is that I have to be able to write an
application that interoperates with yours *purely by reading the
specs*.

If you do this by profiling, we need to get to a point where two
things are true: (1) the profile chain has ended, and what's left is
well defined, and (2) I have to be able to, *from the specs and the
protocol alone*, determine what profile will be used.  I don't see how
this protocol gives me any way to determine what to send or what to
expect to receive.  And if an out-of-band understanding is required
for that, that doesn't interoperate.

Now, the way we usually handle the need for "different kinds of
things" is to have different fields for each, or to have one field
tagged so that it's self-defining (as URIs have a scheme that says
what to do with them).  If the Audience field might look like this in
one application:
   urn:ietf:params:banana
...and like this in another
   abra:cadabra
...where the first is understood to be a URI and the second is
something else, then please explain how you and I can each write
applications to that?

For your specific questions:

> Barry, are you proposing that we require that the Audience contain a specific data
> format tailored to a particular application of assertions?  If so, what format are you
> proposing, and for which application of assertions?  Likewise, are you proposing
> that the Subject field contain a particular data format tailored to a particular
> application?  And also the Issuer field?

I am proposing that there must be a way for someone writing an
application to know what to use in these fields that will work with
your application (or will work with a server in the same way as your
application does, or whatever) *without* having to go to the
documentation of your application to figure it out.

That's why I say that as I see it, it's not an issue of MTI.  I'm not
saying that I want you to require that any particular thing be
implemented.  I'm saying that both sides need to be able to know which
variations *are* implemented.  How else do you get interoperability?

Your TCP/ports example is a perfect one to show how this works: the
assignments for port numbers are *exactly* to create the
interoperability I'm talking about here.  TCP doesn't say anything
about the protocol ("profile", perhaps) that's used over it.  But
we've defined that port 110 is used for POP and 143 is used for IMAP
and 25 is used for SMTP, and so on.  So I know that if my IMAP
application wants to talk with your IMAP server, I can accomplish that
by using port 143.  If you decide to run your IMAP server on port 142
instead, or if you run your POP server on port 143, we will not
interoperate.

But all I need to know is (1) how to do IMAP, (2) how to do it over
TCP, and (3) what port to use... and I can build an IMAP client that
will work with any IMAP server that follows the same specs.

Can you do that here?  Please explain how.

Barry

From stephen.farrell@cs.tcd.ie  Mon Feb 18 01:44:27 2013
Return-Path: <stephen.farrell@cs.tcd.ie>
X-Original-To: oauth@ietfa.amsl.com
Delivered-To: oauth@ietfa.amsl.com
Received: from localhost (localhost [127.0.0.1]) by ietfa.amsl.com (Postfix) with ESMTP id 5BFFA21F87D5 for <oauth@ietfa.amsl.com>; Mon, 18 Feb 2013 01:44:27 -0800 (PST)
X-Virus-Scanned: amavisd-new at amsl.com
X-Spam-Flag: NO
X-Spam-Score: -102.599
X-Spam-Level: 
X-Spam-Status: No, score=-102.599 tagged_above=-999 required=5 tests=[BAYES_00=-2.599, USER_IN_WHITELIST=-100]
Received: from mail.ietf.org ([64.170.98.30]) by localhost (ietfa.amsl.com [127.0.0.1]) (amavisd-new, port 10024) with ESMTP id ZPWTrfIdpN6m for <oauth@ietfa.amsl.com>; Mon, 18 Feb 2013 01:44:26 -0800 (PST)
Received: from mercury.scss.tcd.ie (mercury.scss.tcd.ie [134.226.56.6]) by ietfa.amsl.com (Postfix) with ESMTP id A043E21F87D3 for <oauth@ietf.org>; Mon, 18 Feb 2013 01:44:26 -0800 (PST)
Received: from localhost (localhost [127.0.0.1]) by mercury.scss.tcd.ie (Postfix) with ESMTP id 781E8BE51; Mon, 18 Feb 2013 09:44:03 +0000 (GMT)
X-Virus-Scanned: Debian amavisd-new at scss.tcd.ie
Received: from mercury.scss.tcd.ie ([127.0.0.1]) by localhost (mercury.scss.tcd.ie [127.0.0.1]) (amavisd-new, port 10024) with ESMTP id jKEOiyd3NqSX; Mon, 18 Feb 2013 09:44:03 +0000 (GMT)
Received: from [IPv6:2001:770:10:203:70b4:a884:3fa8:8567] (unknown [IPv6:2001:770:10:203:70b4:a884:3fa8:8567]) by mercury.scss.tcd.ie (Postfix) with ESMTPSA id 4C3EDBE4D; Mon, 18 Feb 2013 09:44:03 +0000 (GMT)
Message-ID: <5121F7E3.4080900@cs.tcd.ie>
Date: Mon, 18 Feb 2013 09:44:03 +0000
From: Stephen Farrell <stephen.farrell@cs.tcd.ie>
User-Agent: Mozilla/5.0 (X11; Linux x86_64; rv:17.0) Gecko/20130106 Thunderbird/17.0.2
MIME-Version: 1.0
To: Barry Leiba <barryleiba@computer.org>
References: <51212E78.1050206@cs.tcd.ie> <4E1F6AAD24975D4BA5B16804296739436746DC1C@TK5EX14MBXC284.redmond.corp.microsoft.com> <51214AC5.3090807@cs.tcd.ie> <4E1F6AAD24975D4BA5B16804296739436746DE40@TK5EX14MBXC284.redmond.corp.microsoft.com> <CALaySJ+YM9_DJ5KB1AnF+D-_1=jMhCdsxrgB3jQaaCLsB7w1Kg@mail.gmail.com>
In-Reply-To: <CALaySJ+YM9_DJ5KB1AnF+D-_1=jMhCdsxrgB3jQaaCLsB7w1Kg@mail.gmail.com>
X-Enigmail-Version: 1.5
Content-Type: text/plain; charset=ISO-8859-1
Content-Transfer-Encoding: 7bit
Cc: "oauth-chairs@tools.ietf.org" <oauth-chairs@tools.ietf.org>, "oauth@ietf.org" <oauth@ietf.org>
Subject: Re: [OAUTH-WG] oauth assertions plan
X-BeenThere: oauth@ietf.org
X-Mailman-Version: 2.1.12
Precedence: list
List-Id: OAUTH WG <oauth.ietf.org>
List-Unsubscribe: <https://www.ietf.org/mailman/options/oauth>, <mailto:oauth-request@ietf.org?subject=unsubscribe>
List-Archive: <http://www.ietf.org/mail-archive/web/oauth>
List-Post: <mailto:oauth@ietf.org>
List-Help: <mailto:oauth-request@ietf.org?subject=help>
List-Subscribe: <https://www.ietf.org/mailman/listinfo/oauth>, <mailto:oauth-request@ietf.org?subject=subscribe>
X-List-Received-Date: Mon, 18 Feb 2013 09:44:27 -0000

Hi Barry,

I agree with you generally, but just on one point...

On 02/18/2013 05:38 AM, Barry Leiba wrote:
> That's why I say that as I see it, it's not an issue of MTI.  

I do think there is an issue related to MTI that's affecting
the discussion. Clearing up that issue won't by itself solve
the interop problem but is, I think, needed as a part of doing
that.

The issue is that it seems to me that not everyone is clear
that MTI != MUST-use.

If some field with some syntax is MTI that means that everyone
writing code has to be able to handle that field properly.

It does not mean that everyone has to use that syntax.

But if everyone's code supports handling that syntax, then
we do enable better interoperability.

So as you address Barry's good point, please do not
conflate MTI with MUST-use since they are not the same.

S.

PS: Just in case: MTI == "mandatory to implement"

From jricher@mitre.org  Mon Feb 18 06:23:15 2013
Return-Path: <jricher@mitre.org>
X-Original-To: oauth@ietfa.amsl.com
Delivered-To: oauth@ietfa.amsl.com
Received: from localhost (localhost [127.0.0.1]) by ietfa.amsl.com (Postfix) with ESMTP id 2865421F8946 for <oauth@ietfa.amsl.com>; Mon, 18 Feb 2013 06:23:15 -0800 (PST)
X-Virus-Scanned: amavisd-new at amsl.com
X-Spam-Flag: NO
X-Spam-Score: -6.573
X-Spam-Level: 
X-Spam-Status: No, score=-6.573 tagged_above=-999 required=5 tests=[AWL=0.026,  BAYES_00=-2.599, RCVD_IN_DNSWL_MED=-4]
Received: from mail.ietf.org ([64.170.98.30]) by localhost (ietfa.amsl.com [127.0.0.1]) (amavisd-new, port 10024) with ESMTP id ldg-Haefn7ux for <oauth@ietfa.amsl.com>; Mon, 18 Feb 2013 06:23:13 -0800 (PST)
Received: from smtpksrv1.mitre.org (smtpksrv1.mitre.org [198.49.146.77]) by ietfa.amsl.com (Postfix) with ESMTP id 93B9521F8929 for <oauth@ietf.org>; Mon, 18 Feb 2013 06:23:13 -0800 (PST)
Received: from smtpksrv1.mitre.org (localhost.localdomain [127.0.0.1]) by localhost (Postfix) with SMTP id 13F6A5310B3D; Mon, 18 Feb 2013 09:23:13 -0500 (EST)
Received: from IMCCAS04.MITRE.ORG (imccas04.mitre.org [129.83.29.81]) by smtpksrv1.mitre.org (Postfix) with ESMTP id D8C195310B37; Mon, 18 Feb 2013 09:23:12 -0500 (EST)
Received: from [10.146.15.29] (129.83.31.58) by IMCCAS04.MITRE.ORG (129.83.29.81) with Microsoft SMTP Server (TLS) id 14.2.318.4; Mon, 18 Feb 2013 09:23:12 -0500
Message-ID: <5122391E.9030500@mitre.org>
Date: Mon, 18 Feb 2013 09:22:22 -0500
From: Justin Richer <jricher@mitre.org>
User-Agent: Mozilla/5.0 (X11; Linux i686; rv:17.0) Gecko/20130106 Thunderbird/17.0.2
MIME-Version: 1.0
To: Mike Jones <Michael.Jones@microsoft.com>
References: <51195F36.6040705@mitre.org> <780F8C26-19A4-4301-B350-307D9FFF69CD@ve7jtb.com> <511BAA8B.8030309@mitre.org> <BEBDAFAC-28B0-4959-9FE5-34EC17FC318C@ve7jtb.com> <-4554688250617930935@unknownmsgid> <AF401161-0C7C-4E49-9F44-9982B312FF6D@ve7jtb.com> <CABzCy2BtzA-DJofpSkKJWrwfYtM8a+44VWe1Lx+f_ow=mW8kwg@mail.gmail.com> <4687F290-4855-49DE-892F-F9694BB211D4@ve7jtb.com> <511CF2C9.9040604@mitre.org> <F93467E8-6196-4A65-8A0E-B3897E47FBEB@ve7jtb.com> <CABzCy2CcmyN_VPBOHZg8oyZdFNj==Nphx5+eVE_b3+bFsU9btQ@mail.gmail.com> <4E1F6AAD24975D4BA5B1680429673943674691FB@TK5EX14MBXC284.redmond.corp.microsoft.com>
In-Reply-To: <4E1F6AAD24975D4BA5B1680429673943674691FB@TK5EX14MBXC284.redmond.corp.microsoft.com>
Content-Type: text/plain; charset="ISO-8859-1"; format=flowed
Content-Transfer-Encoding: 7bit
X-Originating-IP: [129.83.31.58]
Cc: "oauth@ietf.org" <oauth@ietf.org>
Subject: Re: [OAUTH-WG] Registration: RESTful client lifecycle management
X-BeenThere: oauth@ietf.org
X-Mailman-Version: 2.1.12
Precedence: list
List-Id: OAUTH WG <oauth.ietf.org>
List-Unsubscribe: <https://www.ietf.org/mailman/options/oauth>, <mailto:oauth-request@ietf.org?subject=unsubscribe>
List-Archive: <http://www.ietf.org/mail-archive/web/oauth>
List-Post: <mailto:oauth@ietf.org>
List-Help: <mailto:oauth-request@ietf.org?subject=help>
List-Subscribe: <https://www.ietf.org/mailman/listinfo/oauth>, <mailto:oauth-request@ietf.org?subject=subscribe>
X-List-Received-Date: Mon, 18 Feb 2013 14:23:15 -0000

Nat's attack vector presumes lack of logging on the server side, where 
doing a "delete" means that you can no longer see anything about who did 
what. You could make the same argument if you have a system where users 
can register themselves and delete their accounts at will -- someone 
creates a fly-by-night account, does bad things, deletes the account. If 
the site doesn't have detailed logs in both of these cases, yes, they'll 
be in the dark about the bad things that happened when the 
account/client was active. It's a valuable security consideration, but I 
don't think that it's enough to say that delete is no longer a valid 
operation.

I think it's up to the server what "delete" means under the hood, but 
the important bit for the protocol is that as far as the client is 
concerned, that client_id is dead now. I don't think it's worthwhile to 
specify it as a "suspend" operation, because to me "suspend" implies an 
ability to "unsuspend", and I really don't think we want to get into the 
complicated zombie OAuth client business. But whether on the server side 
"delete" translates to "delete everything from the database immediately 
and burn all records of it" or instead "set a flag on that client and 
all of its outstanding grants so that it can't be used but 
administrators can still poke it with a stick" is completely up to the 
implementation and its security considerations.

That said, I think it would make sense to at least describe this 
potential problem in the security considerations, and note that the 
client MUST NOT use the client_id again.

  -- Justin

On 02/17/2013 01:11 AM, Mike Jones wrote:
> I agree.  If we have it at all, DELETE should be a declaration by the Client that requests by it should no longer be honored.  It should be up to the Server whether to implement this as suspension or deletion.  At most, I believe it should be an optional operation, which MAY be supported.
>
> 				-- Mike
>
> -----Original Message-----
> From: oauth-bounces@ietf.org [mailto:oauth-bounces@ietf.org] On Behalf Of Nat Sakimura
> Sent: Saturday, February 16, 2013 10:04 PM
> To: John Bradley
> Cc: oauth@ietf.org
> Subject: Re: [OAUTH-WG] Registration: RESTful client lifecycle management
>
>> When sending an update, a client MUST send all metadata fields
>> returned from the server in its initial registration or previous read
>> or update call, including its client_id. A server MAY replace any
>> missing or invalid fields with default values, or it MAY return an
>> error as described in the Error Response section. A server MUST return
>> all provisioned fields in its response. A server MUST NOT change the
>> client_id field. A server MAY change the client_secret and/or
>> refresh_access_token fields.
> Say the client registered some value. Sometime later, the server changed a value due to some policy or security reasons etc. The client when UPDATES with the previously registered value, what is going to happen to the changed value?
>
>>> DELETE to be used correctly is I think going to delete the client_id and all associated tokens and cause a ripple effect in removing grants associated with that client_id.
>> This is how I would interpret it as well. It's de-provisioning the
>> client, not resetting it.
> For DELETE, I can think of an attack such that
>
> 1. Register as a client.
> 2. Send spam links to random users.
> 3. When user "authorizes", suck the user data such as contacts out.
> 4. DELETE the registration and disappear.
>
> To prevent something like this, it should probably be something more akin to "suspend" rather than completely de-provisioning.
> _______________________________________________
> OAuth mailing list
> OAuth@ietf.org
> https://www.ietf.org/mailman/listinfo/oauth
> _______________________________________________
> OAuth mailing list
> OAuth@ietf.org
> https://www.ietf.org/mailman/listinfo/oauth


From jricher@mitre.org  Mon Feb 18 06:25:21 2013
Return-Path: <jricher@mitre.org>
X-Original-To: oauth@ietfa.amsl.com
Delivered-To: oauth@ietfa.amsl.com
Received: from localhost (localhost [127.0.0.1]) by ietfa.amsl.com (Postfix) with ESMTP id E633C21F8929 for <oauth@ietfa.amsl.com>; Mon, 18 Feb 2013 06:25:20 -0800 (PST)
X-Virus-Scanned: amavisd-new at amsl.com
X-Spam-Flag: NO
X-Spam-Score: -6.574
X-Spam-Level: 
X-Spam-Status: No, score=-6.574 tagged_above=-999 required=5 tests=[AWL=0.025,  BAYES_00=-2.599, RCVD_IN_DNSWL_MED=-4]
Received: from mail.ietf.org ([64.170.98.30]) by localhost (ietfa.amsl.com [127.0.0.1]) (amavisd-new, port 10024) with ESMTP id QPCStwRvgg-N for <oauth@ietfa.amsl.com>; Mon, 18 Feb 2013 06:25:20 -0800 (PST)
Received: from smtpksrv1.mitre.org (smtpksrv1.mitre.org [198.49.146.77]) by ietfa.amsl.com (Postfix) with ESMTP id 30EE621F87DF for <oauth@ietf.org>; Mon, 18 Feb 2013 06:25:20 -0800 (PST)
Received: from smtpksrv1.mitre.org (localhost.localdomain [127.0.0.1]) by localhost (Postfix) with SMTP id 9F41E4350241; Mon, 18 Feb 2013 09:25:19 -0500 (EST)
Received: from IMCCAS02.MITRE.ORG (imccas02.mitre.org [129.83.29.79]) by smtpksrv1.mitre.org (Postfix) with ESMTP id 7BCF61F0577; Mon, 18 Feb 2013 09:25:19 -0500 (EST)
Received: from [10.146.15.29] (129.83.31.58) by IMCCAS02.MITRE.ORG (129.83.29.79) with Microsoft SMTP Server (TLS) id 14.2.318.4; Mon, 18 Feb 2013 09:25:19 -0500
Message-ID: <5122399D.5090403@mitre.org>
Date: Mon, 18 Feb 2013 09:24:29 -0500
From: Justin Richer <jricher@mitre.org>
User-Agent: Mozilla/5.0 (X11; Linux i686; rv:17.0) Gecko/20130106 Thunderbird/17.0.2
MIME-Version: 1.0
To: Donald F Coffin <donald.coffin@reminetworks.com>
References: <20130215215423.23019.50224.idtracker@ietfa.amsl.com> <00b601ce0be9$7d4fa460$77eeed20$@reminetworks.com>
In-Reply-To: <00b601ce0be9$7d4fa460$77eeed20$@reminetworks.com>
Content-Type: text/plain; charset="ISO-8859-1"; format=flowed
Content-Transfer-Encoding: 7bit
X-Originating-IP: [129.83.31.58]
Cc: oauth@ietf.org
Subject: Re: [OAUTH-WG] I-D Action: draft-ietf-oauth-dyn-reg-06.txt
X-BeenThere: oauth@ietf.org
X-Mailman-Version: 2.1.12
Precedence: list
List-Id: OAUTH WG <oauth.ietf.org>
List-Unsubscribe: <https://www.ietf.org/mailman/options/oauth>, <mailto:oauth-request@ietf.org?subject=unsubscribe>
List-Archive: <http://www.ietf.org/mail-archive/web/oauth>
List-Post: <mailto:oauth@ietf.org>
List-Help: <mailto:oauth-request@ietf.org?subject=help>
List-Subscribe: <https://www.ietf.org/mailman/listinfo/oauth>, <mailto:oauth-request@ietf.org?subject=subscribe>
X-List-Received-Date: Mon, 18 Feb 2013 14:25:21 -0000

The text in question refers to responses from the Token Endpoint, 
whereas this spec deals with a separate endpoint, the Client 
Registration Endpoint. Therefore, the text doesn't directly apply.

However, it's not bad advice to replicate that here since we are issuing 
a special-use access token along with the response.

  -- Justin

On 02/15/2013 09:01 PM, Donald F Coffin wrote:
> Justin,
>
> Section 5.1 of RFC6749 "OAuth 2.0 Authorization Framework" states:
>
> 	"The authorization server MUST include the HTTP "Cache-Control"
>    	 response header field [RFC2616] with a value of "no-store" in any
>     	response containing tokens, credentials, or other sensitive
>     	information, as well as the "Pragma" response header field [RFC2616]
>     	with a value of "no-cache"."
>
> I've noticed several of the response examples in the current and previous versions of "draft-ietf-oauth-dyn-reg-xx.txt" fail to include the required "Pragma: "no-cache" directive.  I assume this is an oversight and am merely pointing out that it needs to be included.
>
> Best regards,
> Don
> Donald F. Coffin
> Founder/CTO
>
> REMI Networks
> 22751 El Prado Suite 6216
> Rancho Santa Margarita, CA  92688-3836
>
> Phone:      (949) 636-8571
> Email:       donald.coffin@reminetworks.com
>
>
> -----Original Message-----
> From: internet-drafts@ietf.org [mailto:internet-drafts@ietf.org]
> Sent: Friday, February 15, 2013 1:54 PM
> To: i-d-announce@ietf.org
> Cc: oauth@ietf.org
> Subject: [OAUTH-WG] I-D Action: draft-ietf-oauth-dyn-reg-06.txt
>
>
> A New Internet-Draft is available from the on-line Internet-Drafts directories.
>   This draft is a work item of the Web Authorization Protocol Working Group of the IETF.
>
> 	Title           : OAuth Dynamic Client Registration Protocol
> 	Author(s)       : Justin Richer
>                            John Bradley
>                            Michael B. Jones
>                            Maciej Machulak
> 	Filename        : draft-ietf-oauth-dyn-reg-06.txt
> 	Pages           : 21
> 	Date            : 2013-02-15
>
> Abstract:
>     This specification defines an endpoint and protocol for dynamic
>     registration of OAuth Clients at an Authorization Server.
>
>
> The IETF datatracker status page for this draft is:
> https://datatracker.ietf.org/doc/draft-ietf-oauth-dyn-reg
>
> There's also a htmlized version available at:
> http://tools.ietf.org/html/draft-ietf-oauth-dyn-reg-06
>
> A diff from the previous version is available at:
> http://www.ietf.org/rfcdiff?url2=draft-ietf-oauth-dyn-reg-06
>
>
> Internet-Drafts are also available by anonymous FTP at:
> ftp://ftp.ietf.org/internet-drafts/
>
>
>
> _______________________________________________
> OAuth mailing list
> OAuth@ietf.org
> https://www.ietf.org/mailman/listinfo/oauth


From jricher@mitre.org  Mon Feb 18 06:32:50 2013
Return-Path: <jricher@mitre.org>
X-Original-To: oauth@ietfa.amsl.com
Delivered-To: oauth@ietfa.amsl.com
Received: from localhost (localhost [127.0.0.1]) by ietfa.amsl.com (Postfix) with ESMTP id 6F5BF21F8763 for <oauth@ietfa.amsl.com>; Mon, 18 Feb 2013 06:32:50 -0800 (PST)
X-Virus-Scanned: amavisd-new at amsl.com
X-Spam-Flag: NO
X-Spam-Score: -6.574
X-Spam-Level: 
X-Spam-Status: No, score=-6.574 tagged_above=-999 required=5 tests=[AWL=0.025,  BAYES_00=-2.599, RCVD_IN_DNSWL_MED=-4]
Received: from mail.ietf.org ([64.170.98.30]) by localhost (ietfa.amsl.com [127.0.0.1]) (amavisd-new, port 10024) with ESMTP id AugikX3+PRz2 for <oauth@ietfa.amsl.com>; Mon, 18 Feb 2013 06:32:46 -0800 (PST)
Received: from smtpksrv1.mitre.org (smtpksrv1.mitre.org [198.49.146.77]) by ietfa.amsl.com (Postfix) with ESMTP id 48B0321F86A8 for <oauth@ietf.org>; Mon, 18 Feb 2013 06:32:44 -0800 (PST)
Received: from smtpksrv1.mitre.org (localhost.localdomain [127.0.0.1]) by localhost (Postfix) with SMTP id 7F3601F0318; Mon, 18 Feb 2013 09:32:44 -0500 (EST)
Received: from IMCCAS01.MITRE.ORG (imccas01.mitre.org [129.83.29.78]) by smtpksrv1.mitre.org (Postfix) with ESMTP id 755891F1BD5; Mon, 18 Feb 2013 09:32:44 -0500 (EST)
Received: from [10.146.15.29] (129.83.31.58) by IMCCAS01.MITRE.ORG (129.83.29.78) with Microsoft SMTP Server (TLS) id 14.2.318.4; Mon, 18 Feb 2013 09:32:44 -0500
Message-ID: <51223B5A.5050008@mitre.org>
Date: Mon, 18 Feb 2013 09:31:54 -0500
From: Justin Richer <jricher@mitre.org>
User-Agent: Mozilla/5.0 (X11; Linux i686; rv:17.0) Gecko/20130106 Thunderbird/17.0.2
MIME-Version: 1.0
To: Torsten Lodderstedt <torsten@lodderstedt.net>
References: <20130215215423.23019.50224.idtracker@ietfa.amsl.com> <B33BFB58CCC8BE4998958016839DE27E06894B4F@IMCMBX01.MITRE.ORG> <5120B6EE.60801@lodderstedt.net>
In-Reply-To: <5120B6EE.60801@lodderstedt.net>
Content-Type: text/plain; charset="ISO-8859-1"; format=flowed
Content-Transfer-Encoding: 7bit
X-Originating-IP: [129.83.31.58]
Cc: "<oauth@ietf.org>" <oauth@ietf.org>
Subject: Re: [OAUTH-WG] I-D Action: draft-ietf-oauth-dyn-reg-06.txt
X-BeenThere: oauth@ietf.org
X-Mailman-Version: 2.1.12
Precedence: list
List-Id: OAUTH WG <oauth.ietf.org>
List-Unsubscribe: <https://www.ietf.org/mailman/options/oauth>, <mailto:oauth-request@ietf.org?subject=unsubscribe>
List-Archive: <http://www.ietf.org/mail-archive/web/oauth>
List-Post: <mailto:oauth@ietf.org>
List-Help: <mailto:oauth-request@ietf.org?subject=help>
List-Subscribe: <https://www.ietf.org/mailman/listinfo/oauth>, <mailto:oauth-request@ietf.org?subject=subscribe>
X-List-Received-Date: Mon, 18 Feb 2013 14:32:50 -0000

On 02/17/2013 05:54 AM, Torsten Lodderstedt wrote:
> Hi Justin,
>
> the new revision seems to catch the state of discussion and is 
> consistent. Thank's for bringing this topic forward.
>
> On your editor's not in section 4.2.: In my opinion, the 404 due to a 
> none-existing resource should precede the 403. I would suggest to 
> point out your thoughts on the access token. But as with any HTTP 
> request, there could be other ways to authenticate to this endpoint. I 
> therefore would not connect both aspects to much.
>

 From our own implementation, the code that processes the token would 
fire (and fail) long before the code that checks if the client is valid 
gets reached. So for us, checking if the client exists in the first 
place is difficult.

What if we just say it's a 403 if either the client or the token are 
invalid?

> section 4.3
>
> "This request MUST include all fields described in Client Metadata
>    (Section 2) as returned to the Client from a previous register, read,
>    or update operation."
>
> Just to make sure I got it. Any data element omitted in this request 
> is deleted/reset by the AS?

That's the intent. The AS is free to fill in or reject any fields the 
client omits, if it wants to.

>
> section 5.1
>
> Something seems to be missing at
>
> "The response contains the following fields:
>
>    , as well as a Client Secret if this client is a confidential client."
>

Vestigial formatting from shuffling sections around. Thanks for catching 
that!

  -- Justin

> regards,
> Torsten.
>
> Am 15.02.2013 23:00, schrieb Richer, Justin P.:
>> Everyone, there's a new draft of DynReg up on the tracker. This draft 
>> tries to codify the discussions so far from this week into something 
>> we can all read. There are still plenty of open discussion points and 
>> items up for debate. Please read through this latest draft and see 
>> what's changed and help assure that it properly captures the 
>> conversations. If you have any inputs for the marked [[ Editor's Note 
>> ]] sections, please send them to the list by next Thursday to give me 
>> opportunity to get any necessary changes in by the cutoff date of 
>> Monday the 22nd.
>>
>> Thanks for all of your hard work everyone, I think this is *really* 
>> coming along now.
>>
>>   -- Justin
>>
>> On Feb 15, 2013, at 4:54 PM, internet-drafts@ietf.org wrote:
>>
>>> A New Internet-Draft is available from the on-line Internet-Drafts 
>>> directories.
>>> This draft is a work item of the Web Authorization Protocol Working 
>>> Group of the IETF.
>>>
>>>     Title           : OAuth Dynamic Client Registration Protocol
>>>     Author(s)       : Justin Richer
>>>                           John Bradley
>>>                           Michael B. Jones
>>>                           Maciej Machulak
>>>     Filename        : draft-ietf-oauth-dyn-reg-06.txt
>>>     Pages           : 21
>>>     Date            : 2013-02-15
>>>
>>> Abstract:
>>>    This specification defines an endpoint and protocol for dynamic
>>>    registration of OAuth Clients at an Authorization Server.
>>>
>>>
>>> The IETF datatracker status page for this draft is:
>>> https://datatracker.ietf.org/doc/draft-ietf-oauth-dyn-reg
>>>
>>> There's also a htmlized version available at:
>>> http://tools.ietf.org/html/draft-ietf-oauth-dyn-reg-06
>>>
>>> A diff from the previous version is available at:
>>> http://www.ietf.org/rfcdiff?url2=draft-ietf-oauth-dyn-reg-06
>>>
>>>
>>> Internet-Drafts are also available by anonymous FTP at:
>>> ftp://ftp.ietf.org/internet-drafts/
>>>
>>> _______________________________________________
>>> OAuth mailing list
>>> OAuth@ietf.org
>>> https://www.ietf.org/mailman/listinfo/oauth
>> _______________________________________________
>> OAuth mailing list
>> OAuth@ietf.org
>> https://www.ietf.org/mailman/listinfo/oauth
>


From ve7jtb@ve7jtb.com  Mon Feb 18 07:18:34 2013
Return-Path: <ve7jtb@ve7jtb.com>
X-Original-To: oauth@ietfa.amsl.com
Delivered-To: oauth@ietfa.amsl.com
Received: from localhost (localhost [127.0.0.1]) by ietfa.amsl.com (Postfix) with ESMTP id 1096121F87F9 for <oauth@ietfa.amsl.com>; Mon, 18 Feb 2013 07:18:34 -0800 (PST)
X-Virus-Scanned: amavisd-new at amsl.com
X-Spam-Flag: NO
X-Spam-Score: -3.104
X-Spam-Level: 
X-Spam-Status: No, score=-3.104 tagged_above=-999 required=5 tests=[AWL=-0.106, BAYES_00=-2.599, HTML_MESSAGE=0.001, J_CHICKENPOX_47=0.6, RCVD_IN_DNSWL_LOW=-1]
Received: from mail.ietf.org ([64.170.98.30]) by localhost (ietfa.amsl.com [127.0.0.1]) (amavisd-new, port 10024) with ESMTP id UfFauBp2f2j8 for <oauth@ietfa.amsl.com>; Mon, 18 Feb 2013 07:18:32 -0800 (PST)
Received: from mail-qa0-f45.google.com (mail-qa0-f45.google.com [209.85.216.45]) by ietfa.amsl.com (Postfix) with ESMTP id 7E70A21F87C3 for <oauth@ietf.org>; Mon, 18 Feb 2013 07:18:31 -0800 (PST)
Received: by mail-qa0-f45.google.com with SMTP id g10so1322779qah.4 for <oauth@ietf.org>; Mon, 18 Feb 2013 07:18:31 -0800 (PST)
X-Google-DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=google.com; s=20120113; h=x-received:content-type:mime-version:subject:from:in-reply-to:date :cc:message-id:references:to:x-mailer:x-gm-message-state; bh=sWk6e68fITM9/L1VT71HeB3cAoieW0wM3OS170iuQ1I=; b=nc2Rzcd7i+epePfG4ppP1q1X18hxlWxZ/dxQjIb3jXvpuvN1SF+jIBxfYFUcwAgTBe JAO2dVZJesNSRNso4GIKGLc4nvV3D6oz8I6GBPOTrfbWAwx8wKM9DY104RqlJ6npNQyz 8dQpFQ4tJ0eHi8yNb/bVKCYKjit7C7tmDTpUzw/aQIgTX4ckmEfBi0yvPX2/5bQWQT96 5Nohkz/0zUeSuq6+G4xE2i55Nd/S6lSymMNCUhwG+hWKiLc4KtDOiiIyfnIePhSUEyhx 0JXE1SvVVeFdaUKM0ovaZO0wh9R07aZ3VZcTdsS7jihHHef8ye+yP7nIG4GSv0fbCjVJ NgBQ==
X-Received: by 10.224.17.198 with SMTP id t6mr5824661qaa.84.1361200710897; Mon, 18 Feb 2013 07:18:30 -0800 (PST)
Received: from [192.168.1.213] (190-20-56-120.baf.movistar.cl. [190.20.56.120]) by mx.google.com with ESMTPS id ec9sm2521605qab.9.2013.02.18.07.18.26 (version=TLSv1 cipher=ECDHE-RSA-RC4-SHA bits=128/128); Mon, 18 Feb 2013 07:18:28 -0800 (PST)
Content-Type: multipart/signed; boundary="Apple-Mail=_5810A4CF-FD55-4169-944E-2AFECEEFFD23"; protocol="application/pkcs7-signature"; micalg=sha1
Mime-Version: 1.0 (Mac OS X Mail 6.2 \(1499\))
From: John Bradley <ve7jtb@ve7jtb.com>
In-Reply-To: <CALaySJ+YM9_DJ5KB1AnF+D-_1=jMhCdsxrgB3jQaaCLsB7w1Kg@mail.gmail.com>
Date: Mon, 18 Feb 2013 12:17:37 -0300
Message-Id: <37B4C89F-2864-4317-BF87-F562241C176D@ve7jtb.com>
References: <51212E78.1050206@cs.tcd.ie> <4E1F6AAD24975D4BA5B16804296739436746DC1C@TK5EX14MBXC284.redmond.corp.microsoft.com> <51214AC5.3090807@cs.tcd.ie> <4E1F6AAD24975D4BA5B16804296739436746DE40@TK5EX14MBXC284.redmond.corp.microsoft.com> <CALaySJ+YM9_DJ5KB1AnF+D-_1=jMhCdsxrgB3jQaaCLsB7w1Kg@mail.gmail.com>
To: Barry Leiba <barryleiba@computer.org>
X-Mailer: Apple Mail (2.1499)
X-Gm-Message-State: ALoCoQk/+jsgBEn8KVV7OOy296yxU4fCXuwzKKflKQIKi+QvGPJIDI1FqIpGSlurNf5kowUojzOr
Cc: "oauth-chairs@tools.ietf.org" <oauth-chairs@tools.ietf.org>, "oauth@ietf.org" <oauth@ietf.org>
Subject: Re: [OAUTH-WG] oauth assertions plan
X-BeenThere: oauth@ietf.org
X-Mailman-Version: 2.1.12
Precedence: list
List-Id: OAUTH WG <oauth.ietf.org>
List-Unsubscribe: <https://www.ietf.org/mailman/options/oauth>, <mailto:oauth-request@ietf.org?subject=unsubscribe>
List-Archive: <http://www.ietf.org/mail-archive/web/oauth>
List-Post: <mailto:oauth@ietf.org>
List-Help: <mailto:oauth-request@ietf.org?subject=help>
List-Subscribe: <https://www.ietf.org/mailman/listinfo/oauth>, <mailto:oauth-request@ietf.org?subject=subscribe>
X-List-Received-Date: Mon, 18 Feb 2013 15:18:34 -0000

--Apple-Mail=_5810A4CF-FD55-4169-944E-2AFECEEFFD23
Content-Type: multipart/alternative;
	boundary="Apple-Mail=_8D2010F5-AA6A-48C2-B9D0-1769BADCFDA8"


--Apple-Mail=_8D2010F5-AA6A-48C2-B9D0-1769BADCFDA8
Content-Transfer-Encoding: quoted-printable
Content-Type: text/plain;
	charset=us-ascii

Barry,

I will point out that in RFC 6749 the Client is specificity not required =
to understand the access token, it is required to understand the =
token_type in the response from the authorization server in order to =
know how to present the token to the RS.

Perhaps you were speaking metaphorically though.

It seems like the scope of your criticism has more to do with RFC 6749 & =
RFC 6750 overall, than the assertions drafts themselves.

In OpenID Connect we implemented a discovery and registration layer for =
clients to discover what the Authorization server supports. =20

Things like:
token_endpoint_auth_methods_supported  OPTIONAL.  JSON array
      containing a list of authentication types supported by this Token
      Endpoint.  The options are "client_secret_post",
      "client_secret_basic", "client_secret_jwt", and "private_key_jwt",
      as described in Section 2.2.1 of OpenID Connect Messages 1.0
      [OpenID.Messages].  Other authentication types may be defined by
      extension.  If unspecified or omitted, the default is
      "client_secret_basic" -- the HTTP Basic Authentication Scheme as
      specified in Section 2.3.1 of OAuth 2.0 [RFC6749].

token_endpoint_auth_signing_alg_values_supported  OPTIONAL.  JSON
      array containing a list of the JWS signing algorithms ("alg"
      values) supported by the Token Endpoint for the "private_key_jwt"
      and "client_secret_jwt" methods to encode the JWT [JWT].  Servers
      SHOULD support "RS256".


The client can then set in registration what auth method it intends to =
use to prevent downgrade attacks.
token_endpoint_auth_method  OPTIONAL.  Requested authentication
      method for the Token Endpoint.  The options are
      "client_secret_post", "client_secret_basic", "client_secret_jwt",
      and "private_key_jwt", as described in Section 2.2.1 of OpenID
      Connect Messages 1.0 [OpenID.Messages].  Other Authentication
      methods may be defined by extension.  If unspecified or omitted,
      the default is "client_secret_basic" HTTP Basic Authentication
      Scheme as specified in Section 2.3.1 of OAuth 2.0 [RFC6749].


To acceve real interoperability these things need to be profiled or you =
need a negotiation mechanism.

Are you saying that Assertions needs a low level mechanism to negotiate =
capabilities?  =20
Many will argue that specs at a higher level like like Dynamic Client =
Registration https://datatracker.ietf.org/doc/draft-ietf-oauth-dyn-reg/ =
are better places to address these capability negotiations because as =
you point out there is more to be negotiated than just assertions.

In your message you are asking about how the server knows what format of =
assertion the client needs, I think you meant that to be how will a =
client know what format of assertion a token endpoint can accept.   It =
is the client that creates the assertion in the spec under discussion.   =
Signed SAML or JWS assertions from the AS to the RS are a whole separate =
issue.

It has been stated by one of the WG chairs that some of us are anti =
interoperability, so some of us may be a touch sensitive, around this, =
as it is not the case.

I am in-favour of interoperability, but not interoperability theatre.=20

If there are specific improvements we can make to assertions then lets =
discuss them, without downloading all of OAuth's perceived =
interoperability issues on them.

I am also happy to engage in the broader discussion of how OAuth can use =
things like Discovery and dynamic registration to address some of the =
wider interop issues.=20

I am happy to make time for that in Orlando if that works for people.

Regards
John B.

On 2013-02-18, at 2:38 AM, Barry Leiba <barryleiba@computer.org> wrote:

> OK, I have some time to respond to this on a real computer.
>=20
> Let's look at the general mechanism that oauth provides, using one use =
case:
> A client asks an authorization server for authorization to do =
something.
> The authorization server responds with an authorization token, which
> the client is required to understand.
>=20
> We have talked about three kinds of tokens: bearer tokens, MAC tokens,
> and assertion tokens.
> How does a client know what kind of token it will get from a
> particular authorization server?
> How does a server that supports multiple token types know what kind of
> token it should give to a particular client?
>=20
> Now, suppose that the server decides to give back an assertion:
> How does the server know whether to give a SAML assertion or a JWT
> assertion?  How does the client know which it's going to get?
>=20
> And now you're saying that even if everyone knows they're going to get
> an assertion token, and specifically a JWT assertion, the semantics of
> particular fields in those tokens are undefined.  If you have
> different meanings ("different kinds of things", as you've said) for
> the Audience field, how is the server supposed to communicate which
> meaning *it* is using?  How is there any assurance that a client will
> understand it in the same way?
>=20
> These are the sorts of things I'm concerned about, and this is what I
> mean by saying that it's like a Ukrainian doll: you open the oauth
> doll and find the token doll; you open the token doll and find the
> assertions doll; you open the assertions doll and find the JWT doll;
> you open the JWT doll and find the Audience field doll... at what
> point do the dolls end and interoperablity begins?
>=20
> I understand that you want certain things to be handled differently by
> different applications, and I'm fine with that in principle.  But the
> other part of the principle is that I have to be able to write an
> application that interoperates with yours *purely by reading the
> specs*.
>=20
> If you do this by profiling, we need to get to a point where two
> things are true: (1) the profile chain has ended, and what's left is
> well defined, and (2) I have to be able to, *from the specs and the
> protocol alone*, determine what profile will be used.  I don't see how
> this protocol gives me any way to determine what to send or what to
> expect to receive.  And if an out-of-band understanding is required
> for that, that doesn't interoperate.
>=20
> Now, the way we usually handle the need for "different kinds of
> things" is to have different fields for each, or to have one field
> tagged so that it's self-defining (as URIs have a scheme that says
> what to do with them).  If the Audience field might look like this in
> one application:
>   urn:ietf:params:banana
> ...and like this in another
>   abra:cadabra
> ...where the first is understood to be a URI and the second is
> something else, then please explain how you and I can each write
> applications to that?
>=20
> For your specific questions:
>=20
>> Barry, are you proposing that we require that the Audience contain a =
specific data
>> format tailored to a particular application of assertions?  If so, =
what format are you
>> proposing, and for which application of assertions?  Likewise, are =
you proposing
>> that the Subject field contain a particular data format tailored to a =
particular
>> application?  And also the Issuer field?
>=20
> I am proposing that there must be a way for someone writing an
> application to know what to use in these fields that will work with
> your application (or will work with a server in the same way as your
> application does, or whatever) *without* having to go to the
> documentation of your application to figure it out.
>=20
> That's why I say that as I see it, it's not an issue of MTI.  I'm not
> saying that I want you to require that any particular thing be
> implemented.  I'm saying that both sides need to be able to know which
> variations *are* implemented.  How else do you get interoperability?
>=20
> Your TCP/ports example is a perfect one to show how this works: the
> assignments for port numbers are *exactly* to create the
> interoperability I'm talking about here.  TCP doesn't say anything
> about the protocol ("profile", perhaps) that's used over it.  But
> we've defined that port 110 is used for POP and 143 is used for IMAP
> and 25 is used for SMTP, and so on.  So I know that if my IMAP
> application wants to talk with your IMAP server, I can accomplish that
> by using port 143.  If you decide to run your IMAP server on port 142
> instead, or if you run your POP server on port 143, we will not
> interoperate.
>=20
> But all I need to know is (1) how to do IMAP, (2) how to do it over
> TCP, and (3) what port to use... and I can build an IMAP client that
> will work with any IMAP server that follows the same specs.
>=20
> Can you do that here?  Please explain how.
>=20
> Barry
> _______________________________________________
> OAuth mailing list
> OAuth@ietf.org
> https://www.ietf.org/mailman/listinfo/oauth


--Apple-Mail=_8D2010F5-AA6A-48C2-B9D0-1769BADCFDA8
Content-Transfer-Encoding: quoted-printable
Content-Type: text/html;
	charset=us-ascii

<html><head><meta http-equiv=3D"Content-Type" content=3D"text/html =
charset=3Dus-ascii"></head><body style=3D"word-wrap: break-word; =
-webkit-nbsp-mode: space; -webkit-line-break: after-white-space; =
"><div>Barry,</div><div><br></div>I will point out that in RFC 6749 the =
Client is specificity not required to understand the access token, it is =
required to understand the token_type in the response from the =
authorization server in order to know how to present the token to the =
RS.<div><br></div><div>Perhaps you were speaking metaphorically =
though.</div><div><br></div><div>It seems like the scope of your =
criticism has more to do with RFC 6749 &amp; RFC 6750 overall, than the =
assertions drafts themselves.</div><div><br></div><div>In OpenID Connect =
we implemented a discovery and registration layer for clients to =
discover what the Authorization server supports. =
&nbsp;</div><div><br></div><div>Things like:</div><div><dt =
style=3D"background-color: rgb(255, 255, 255); position: static; =
z-index: auto; "><dt><font face=3D"verdana, charcoal, helvetica, arial, =
sans-serif" size=3D"2">token_endpoint_auth_methods_supported =
&nbsp;OPTIONAL. &nbsp;JSON array</font></dt><dt><font face=3D"verdana, =
charcoal, helvetica, arial, sans-serif" size=3D"2">&nbsp; &nbsp; &nbsp; =
containing a list of authentication types supported by this =
Token</font></dt><dt><font face=3D"verdana, charcoal, helvetica, arial, =
sans-serif" size=3D"2">&nbsp; &nbsp; &nbsp; Endpoint. &nbsp;The options =
are "client_secret_post",</font></dt><dt><font face=3D"verdana, =
charcoal, helvetica, arial, sans-serif" size=3D"2">&nbsp; &nbsp; &nbsp; =
"client_secret_basic", "client_secret_jwt", and =
"private_key_jwt",</font></dt><dt><font face=3D"verdana, charcoal, =
helvetica, arial, sans-serif" size=3D"2">&nbsp; &nbsp; &nbsp; as =
described in Section 2.2.1 of OpenID Connect Messages =
1.0</font></dt><dt><font face=3D"verdana, charcoal, helvetica, arial, =
sans-serif" size=3D"2">&nbsp; &nbsp; &nbsp; [OpenID.Messages]. =
&nbsp;Other authentication types may be defined by</font></dt><dt><font =
face=3D"verdana, charcoal, helvetica, arial, sans-serif" size=3D"2">&nbsp;=
 &nbsp; &nbsp; extension. &nbsp;If unspecified or omitted, the default =
is</font></dt><dt><font face=3D"verdana, charcoal, helvetica, arial, =
sans-serif" size=3D"2">&nbsp; &nbsp; &nbsp; "client_secret_basic" -- the =
HTTP Basic Authentication Scheme as</font></dt><dt><font face=3D"verdana, =
charcoal, helvetica, arial, sans-serif" size=3D"2">&nbsp; &nbsp; &nbsp; =
specified in Section 2.3.1 of OAuth 2.0 [RFC6749].</font></dt><dt><font =
face=3D"verdana, charcoal, helvetica, arial, sans-serif" =
size=3D"2"><br></font></dt><dt><font face=3D"verdana, charcoal, =
helvetica, arial, sans-serif" =
size=3D"2">token_endpoint_auth_signing_alg_values_supported =
&nbsp;OPTIONAL. &nbsp;JSON</font></dt><dt><font face=3D"verdana, =
charcoal, helvetica, arial, sans-serif" size=3D"2">&nbsp; &nbsp; &nbsp; =
array containing a list of the JWS signing algorithms =
("alg"</font></dt><dt><font face=3D"verdana, charcoal, helvetica, arial, =
sans-serif" size=3D"2">&nbsp; &nbsp; &nbsp; values) supported by the =
Token Endpoint for the "private_key_jwt"</font></dt><dt><font =
face=3D"verdana, charcoal, helvetica, arial, sans-serif" size=3D"2">&nbsp;=
 &nbsp; &nbsp; and "client_secret_jwt" methods to encode the JWT [JWT]. =
&nbsp;Servers</font></dt><dt><font face=3D"verdana, charcoal, helvetica, =
arial, sans-serif" size=3D"2">&nbsp; &nbsp; &nbsp; SHOULD support =
"RS256".</font></dt><div style=3D"font-family: verdana, charcoal, =
helvetica, arial, sans-serif; font-size: small; =
"><br></div></dt><div><br></div></div><div>The client can then set in =
registration what auth method it intends to use to prevent downgrade =
attacks.</div><div><div>token_endpoint_auth_method &nbsp;OPTIONAL. =
&nbsp;Requested authentication</div><div>&nbsp; &nbsp; &nbsp; method for =
the Token Endpoint. &nbsp;The options are</div><div>&nbsp; &nbsp; &nbsp; =
"client_secret_post", "client_secret_basic", =
"client_secret_jwt",</div><div>&nbsp; &nbsp; &nbsp; and =
"private_key_jwt", as described in Section 2.2.1 of =
OpenID</div><div>&nbsp; &nbsp; &nbsp; Connect Messages 1.0 =
[OpenID.Messages]. &nbsp;Other Authentication</div><div>&nbsp; &nbsp; =
&nbsp; methods may be defined by extension. &nbsp;If unspecified or =
omitted,</div><div>&nbsp; &nbsp; &nbsp; the default is =
"client_secret_basic" HTTP Basic Authentication</div><div>&nbsp; &nbsp; =
&nbsp; Scheme as specified in Section 2.3.1 of OAuth 2.0 =
[RFC6749].</div></div><div><br></div><div><br></div><div>To acceve real =
interoperability these things need to be profiled or you need a =
negotiation mechanism.</div><div><br></div><div>Are you saying that =
Assertions needs a low level mechanism to negotiate capabilities? =
&nbsp;&nbsp;</div><div>Many will argue that specs at a higher level like =
like Dynamic Client Registration&nbsp;<a =
href=3D"https://datatracker.ietf.org/doc/draft-ietf-oauth-dyn-reg/">https:=
//datatracker.ietf.org/doc/draft-ietf-oauth-dyn-reg/</a> are better =
places to address these capability negotiations because as you point out =
there is more to be negotiated than just =
assertions.</div><div><br></div><div>In your message you are asking =
about how the server knows what format of assertion the client needs, I =
think you meant that to be how will a client know what format of =
assertion a token endpoint can accept. &nbsp; It is the client that =
creates the assertion in the spec under discussion. &nbsp; Signed SAML =
or JWS assertions from the AS to the RS are a whole separate =
issue.</div><div><br></div><div>It has been stated by one of the WG =
chairs that some of us are anti interoperability, so some of us may be a =
touch sensitive, around this, as it is not the =
case.</div><div><br></div><div>I am in-favour of interoperability, but =
not interoperability theatre.&nbsp;</div><div><br></div><div>If there =
are specific improvements we can make to assertions then lets discuss =
them, without downloading all of OAuth's perceived interoperability =
issues on them.</div><div><br></div><div>I am also happy to engage in =
the broader discussion of how OAuth can use things like Discovery and =
dynamic registration to address some of the wider interop =
issues.&nbsp;</div><div><br></div><div>I am happy to make time for that =
in Orlando if that works for =
people.</div><div><br></div><div>Regards</div><div>John =
B.</div><div><br></div><div>On 2013-02-18, at 2:38 AM, Barry Leiba =
&lt;<a =
href=3D"mailto:barryleiba@computer.org">barryleiba@computer.org</a>&gt; =
wrote:<div><br class=3D"Apple-interchange-newline"><blockquote =
type=3D"cite">OK, I have some time to respond to this on a real =
computer.<br><br>Let's look at the general mechanism that oauth =
provides, using one use case:<br>A client asks an authorization server =
for authorization to do something.<br>The authorization server responds =
with an authorization token, which<br>the client is required to =
understand.<br><br>We have talked about three kinds of tokens: bearer =
tokens, MAC tokens,<br>and assertion tokens.<br>How does a client know =
what kind of token it will get from a<br>particular authorization =
server?<br>How does a server that supports multiple token types know =
what kind of<br>token it should give to a particular client?<br><br>Now, =
suppose that the server decides to give back an assertion:<br>How does =
the server know whether to give a SAML assertion or a JWT<br>assertion? =
&nbsp;How does the client know which it's going to get?<br><br>And now =
you're saying that even if everyone knows they're going to get<br>an =
assertion token, and specifically a JWT assertion, the semantics =
of<br>particular fields in those tokens are undefined. &nbsp;If you =
have<br>different meanings ("different kinds of things", as you've said) =
for<br>the Audience field, how is the server supposed to communicate =
which<br>meaning *it* is using? &nbsp;How is there any assurance that a =
client will<br>understand it in the same way?<br><br>These are the sorts =
of things I'm concerned about, and this is what I<br>mean by saying that =
it's like a Ukrainian doll: you open the oauth<br>doll and find the =
token doll; you open the token doll and find the<br>assertions doll; you =
open the assertions doll and find the JWT doll;<br>you open the JWT doll =
and find the Audience field doll... at what<br>point do the dolls end =
and interoperablity begins?<br><br>I understand that you want certain =
things to be handled differently by<br>different applications, and I'm =
fine with that in principle. &nbsp;But the<br>other part of the =
principle is that I have to be able to write an<br>application that =
interoperates with yours *purely by reading the<br>specs*.<br><br>If you =
do this by profiling, we need to get to a point where two<br>things are =
true: (1) the profile chain has ended, and what's left is<br>well =
defined, and (2) I have to be able to, *from the specs and =
the<br>protocol alone*, determine what profile will be used. &nbsp;I =
don't see how<br>this protocol gives me any way to determine what to =
send or what to<br>expect to receive. &nbsp;And if an out-of-band =
understanding is required<br>for that, that doesn't =
interoperate.<br><br>Now, the way we usually handle the need for =
"different kinds of<br>things" is to have different fields for each, or =
to have one field<br>tagged so that it's self-defining (as URIs have a =
scheme that says<br>what to do with them). &nbsp;If the Audience field =
might look like this in<br>one application:<br> =
&nbsp;&nbsp;urn:ietf:params:banana<br>...and like this in another<br> =
&nbsp;&nbsp;abra:cadabra<br>...where the first is understood to be a URI =
and the second is<br>something else, then please explain how you and I =
can each write<br>applications to that?<br><br>For your specific =
questions:<br><br><blockquote type=3D"cite">Barry, are you proposing =
that we require that the Audience contain a specific data<br>format =
tailored to a particular application of assertions? &nbsp;If so, what =
format are you<br>proposing, and for which application of assertions? =
&nbsp;Likewise, are you proposing<br>that the Subject field contain a =
particular data format tailored to a particular<br>application? =
&nbsp;And also the Issuer field?<br></blockquote><br>I am proposing that =
there must be a way for someone writing an<br>application to know what =
to use in these fields that will work with<br>your application (or will =
work with a server in the same way as your<br>application does, or =
whatever) *without* having to go to the<br>documentation of your =
application to figure it out.<br><br>That's why I say that as I see it, =
it's not an issue of MTI. &nbsp;I'm not<br>saying that I want you to =
require that any particular thing be<br>implemented. &nbsp;I'm saying =
that both sides need to be able to know which<br>variations *are* =
implemented. &nbsp;How else do you get interoperability?<br><br>Your =
TCP/ports example is a perfect one to show how this works: =
the<br>assignments for port numbers are *exactly* to create =
the<br>interoperability I'm talking about here. &nbsp;TCP doesn't say =
anything<br>about the protocol ("profile", perhaps) that's used over it. =
&nbsp;But<br>we've defined that port 110 is used for POP and 143 is used =
for IMAP<br>and 25 is used for SMTP, and so on. &nbsp;So I know that if =
my IMAP<br>application wants to talk with your IMAP server, I can =
accomplish that<br>by using port 143. &nbsp;If you decide to run your =
IMAP server on port 142<br>instead, or if you run your POP server on =
port 143, we will not<br>interoperate.<br><br>But all I need to know is =
(1) how to do IMAP, (2) how to do it over<br>TCP, and (3) what port to =
use... and I can build an IMAP client that<br>will work with any IMAP =
server that follows the same specs.<br><br>Can you do that here? =
&nbsp;Please explain =
how.<br><br>Barry<br>_______________________________________________<br>OA=
uth mailing list<br><a =
href=3D"mailto:OAuth@ietf.org">OAuth@ietf.org</a><br>https://www.ietf.org/=
mailman/listinfo/oauth<br></blockquote></div><br></div></body></html>=

--Apple-Mail=_8D2010F5-AA6A-48C2-B9D0-1769BADCFDA8--

--Apple-Mail=_5810A4CF-FD55-4169-944E-2AFECEEFFD23
Content-Disposition: attachment;
	filename=smime.p7s
Content-Type: application/pkcs7-signature;
	name=smime.p7s
Content-Transfer-Encoding: base64
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--Apple-Mail=_5810A4CF-FD55-4169-944E-2AFECEEFFD23--

From ve7jtb@ve7jtb.com  Mon Feb 18 07:27:28 2013
Return-Path: <ve7jtb@ve7jtb.com>
X-Original-To: oauth@ietfa.amsl.com
Delivered-To: oauth@ietfa.amsl.com
Received: from localhost (localhost [127.0.0.1]) by ietfa.amsl.com (Postfix) with ESMTP id 3D0A421F8958 for <oauth@ietfa.amsl.com>; Mon, 18 Feb 2013 07:27:26 -0800 (PST)
X-Virus-Scanned: amavisd-new at amsl.com
X-Spam-Flag: NO
X-Spam-Score: -3.401
X-Spam-Level: 
X-Spam-Status: No, score=-3.401 tagged_above=-999 required=5 tests=[AWL=0.198,  BAYES_00=-2.599, RCVD_IN_DNSWL_LOW=-1]
Received: from mail.ietf.org ([64.170.98.30]) by localhost (ietfa.amsl.com [127.0.0.1]) (amavisd-new, port 10024) with ESMTP id gh7C2zACVvca for <oauth@ietfa.amsl.com>; Mon, 18 Feb 2013 07:27:17 -0800 (PST)
Received: from mail-qe0-f48.google.com (mail-qe0-f48.google.com [209.85.128.48]) by ietfa.amsl.com (Postfix) with ESMTP id 4AA7121F87D4 for <oauth@ietf.org>; Mon, 18 Feb 2013 07:27:08 -0800 (PST)
Received: by mail-qe0-f48.google.com with SMTP id 3so2464829qea.7 for <oauth@ietf.org>; Mon, 18 Feb 2013 07:27:07 -0800 (PST)
X-Google-DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=google.com; s=20120113; h=x-received:content-type:mime-version:subject:from:in-reply-to:date :cc:message-id:references:to:x-mailer:x-gm-message-state; bh=D7Fnq3zV/gZc1I5amVmVvTnc62vBYnEL7gmpVU2XCjg=; b=eZbFiYL1C+ROylP0Issf4drIIFRsrIxUBsHaPUKs0/ef3PnDZOuuCxTRbvZ4YSLiph h8l5AiHklLPGx7vtH4VFa+/kXtanlyPy9H/h8EjqdN1tZ4S7ysxrKcTwSaFn6z1DrCHN 3WV6vkL/BVmpBFT/bMSEd6FoCMTTpTw3Fw7HyZGZFHWGhKW5Tfca95weUGZu2O33WCiH mEREswrcLiobPlwLoVtcP36VNXYEeIK9XPJ6uZ0vlxoONbcd/Qv7IoKZJ8Ew28sULXfx O0yQUH7HtlD71Yce3nedsfabHZ2ySZhQOYrYfWtR6KjYSTWhLIXpV09xIMKcCY3t+6bv wcxg==
X-Received: by 10.224.221.81 with SMTP id ib17mr4805076qab.32.1361201227573; Mon, 18 Feb 2013 07:27:07 -0800 (PST)
Received: from [192.168.1.213] (190-20-56-120.baf.movistar.cl. [190.20.56.120]) by mx.google.com with ESMTPS id ei2sm25387554qab.3.2013.02.18.07.27.03 (version=TLSv1 cipher=ECDHE-RSA-RC4-SHA bits=128/128); Mon, 18 Feb 2013 07:27:05 -0800 (PST)
Content-Type: multipart/signed; boundary="Apple-Mail=_A680CF1F-3077-49E0-8ED2-29EE61D8F583"; protocol="application/pkcs7-signature"; micalg=sha1
Mime-Version: 1.0 (Mac OS X Mail 6.2 \(1499\))
From: John Bradley <ve7jtb@ve7jtb.com>
In-Reply-To: <51223B5A.5050008@mitre.org>
Date: Mon, 18 Feb 2013 12:26:20 -0300
Message-Id: <A654FBBD-D968-49A4-871D-7681629D1708@ve7jtb.com>
References: <20130215215423.23019.50224.idtracker@ietfa.amsl.com> <B33BFB58CCC8BE4998958016839DE27E06894B4F@IMCMBX01.MITRE.ORG> <5120B6EE.60801@lodderstedt.net> <51223B5A.5050008@mitre.org>
To: Justin Richer <jricher@mitre.org>
X-Mailer: Apple Mail (2.1499)
X-Gm-Message-State: ALoCoQlP93IiaMvPlVqKnGXg1G+/U+7NJclPPBzX4/zGTBIJoONGUhRmy3nKnbI1kMataRboWcrM
Cc: "<oauth@ietf.org>" <oauth@ietf.org>
Subject: Re: [OAUTH-WG] I-D Action: draft-ietf-oauth-dyn-reg-06.txt
X-BeenThere: oauth@ietf.org
X-Mailman-Version: 2.1.12
Precedence: list
List-Id: OAUTH WG <oauth.ietf.org>
List-Unsubscribe: <https://www.ietf.org/mailman/options/oauth>, <mailto:oauth-request@ietf.org?subject=unsubscribe>
List-Archive: <http://www.ietf.org/mail-archive/web/oauth>
List-Post: <mailto:oauth@ietf.org>
List-Help: <mailto:oauth-request@ietf.org?subject=help>
List-Subscribe: <https://www.ietf.org/mailman/listinfo/oauth>, <mailto:oauth-request@ietf.org?subject=subscribe>
X-List-Received-Date: Mon, 18 Feb 2013 15:27:45 -0000

--Apple-Mail=_A680CF1F-3077-49E0-8ED2-29EE61D8F583
Content-Transfer-Encoding: quoted-printable
Content-Type: text/plain;
	charset=us-ascii

inline
On 2013-02-18, at 11:31 AM, Justin Richer <jricher@mitre.org> wrote:

>=20
> On 02/17/2013 05:54 AM, Torsten Lodderstedt wrote:
>> Hi Justin,
>>=20
>> the new revision seems to catch the state of discussion and is =
consistent. Thank's for bringing this topic forward.
>>=20
>> On your editor's not in section 4.2.: In my opinion, the 404 due to a =
none-existing resource should precede the 403. I would suggest to point =
out your thoughts on the access token. But as with any HTTP request, =
there could be other ways to authenticate to this endpoint. I therefore =
would not connect both aspects to much.
>>=20
>=20
> =46rom our own implementation, the code that processes the token would =
fire (and fail) long before the code that checks if the client is valid =
gets reached. So for us, checking if the client exists in the first =
place is difficult.
>=20
> What if we just say it's a 403 if either the client or the token are =
invalid?

This is the wording I put in the Connect version

When a read error condition occurs, the Client Registration Access =
Endpoint returns a HTTP 403 Forbidden status code. This indicates that =
the Access Token is invalid or the Client record requested is invalid or =
non-existent. Note that for security reasons, to inhibit brute force =
attacks, endpoints MUST NOT return 404 Not Found error codes.

=46rom a security point of view differentiating the two is bad as it =
helps an attacker find valid notes to brute force.  Ideally you want an =
attacker to spend time truing to break into resources that don't exist =
as well as ones that do.

John B.=

--Apple-Mail=_A680CF1F-3077-49E0-8ED2-29EE61D8F583
Content-Disposition: attachment;
	filename=smime.p7s
Content-Type: application/pkcs7-signature;
	name=smime.p7s
Content-Transfer-Encoding: base64
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--Apple-Mail=_A680CF1F-3077-49E0-8ED2-29EE61D8F583--

From sal@idmachines.com  Mon Feb 18 08:02:33 2013
Return-Path: <sal@idmachines.com>
X-Original-To: oauth@ietfa.amsl.com
Delivered-To: oauth@ietfa.amsl.com
Received: from localhost (localhost [127.0.0.1]) by ietfa.amsl.com (Postfix) with ESMTP id 9712521F87F3 for <oauth@ietfa.amsl.com>; Mon, 18 Feb 2013 08:02:33 -0800 (PST)
X-Virus-Scanned: amavisd-new at amsl.com
X-Spam-Flag: NO
X-Spam-Score: 0.002
X-Spam-Level: 
X-Spam-Status: No, score=0.002 tagged_above=-999 required=5 tests=[BAYES_50=0.001, HTML_MESSAGE=0.001]
Received: from mail.ietf.org ([64.170.98.30]) by localhost (ietfa.amsl.com [127.0.0.1]) (amavisd-new, port 10024) with ESMTP id F+mpiawDoEBX for <oauth@ietfa.amsl.com>; Mon, 18 Feb 2013 08:02:32 -0800 (PST)
Received: from atl4mhob04.myregisteredsite.com (atl4mhob04.myregisteredsite.com [209.17.115.42]) by ietfa.amsl.com (Postfix) with ESMTP id 567FC21F86F7 for <oauth@ietf.org>; Mon, 18 Feb 2013 08:02:32 -0800 (PST)
Received: from mailpod1.hostingplatform.com ([10.30.71.118]) by atl4mhob04.myregisteredsite.com (8.14.4/8.14.4) with ESMTP id r1IG2VLZ010246 for <oauth@ietf.org>; Mon, 18 Feb 2013 11:02:31 -0500
Received: (qmail 29280 invoked by uid 0); 18 Feb 2013 16:02:31 -0000
Received: from unknown (HELO salPC) (sal@idmachines.com@74.104.46.177) by 0 with ESMTPA; 18 Feb 2013 16:02:31 -0000
From: "Salvatore D'Agostino" <sal@idmachines.com>
To: <oauth@ietf.org>, "'Justin Richer'" <jricher@mitre.org>
Date: Mon, 18 Feb 2013 11:02:30 -0500
Message-ID: <021401ce0df1$5b303b10$1190b130$@com>
X-Mailer: Microsoft Office Outlook 12.0
MIME-Version: 1.0
Thread-Index: Ac4N8VEivMZhpuPrQ9C0nAMQINM4Ug==
Content-Language: en-us
Content-Type: multipart/signed; protocol="application/x-pkcs7-signature"; micalg=SHA1; boundary="----=_NextPart_000_020C_01CE0DC7.684FB430"
Subject: Re: [OAUTH-WG] Registration: RESTful client lifecycle management
X-BeenThere: oauth@ietf.org
X-Mailman-Version: 2.1.12
Precedence: list
List-Id: OAUTH WG <oauth.ietf.org>
List-Unsubscribe: <https://www.ietf.org/mailman/options/oauth>, <mailto:oauth-request@ietf.org?subject=unsubscribe>
List-Archive: <http://www.ietf.org/mail-archive/web/oauth>
List-Post: <mailto:oauth@ietf.org>
List-Help: <mailto:oauth-request@ietf.org?subject=help>
List-Subscribe: <https://www.ietf.org/mailman/listinfo/oauth>, <mailto:oauth-request@ietf.org?subject=subscribe>
X-List-Received-Date: Mon, 18 Feb 2013 16:02:33 -0000

This is a multi-part message in MIME format.

------=_NextPart_000_020C_01CE0DC7.684FB430
Content-Type: multipart/alternative;
	boundary="----=_NextPart_001_020D_01CE0DC7.684FB430"


------=_NextPart_001_020D_01CE0DC7.684FB430
Content-Type: text/plain;
	charset="us-ascii"
Content-Transfer-Encoding: 7bit

+1 to avoiding suspend 

 

"I don't think it's worthwhile to specify it as a "suspend" operation,
because to me "suspend" implies an ability to "unsuspend", and I really
don't think we want to get into the complicated zombie OAuth client
business."

 

Sal

 

Salvatore D'Agostino, CSCIP

IDmachines LLC |1264 Beacon Street, #5 | Brookline, MA  02446 | USA

http:\\www.idmachines.com <http://www.idmachines.com/>  |
http:\\idmachines.blogspot.com <http://idmachines.blogspot.com/>  |
@idmachines

+1 617.201.4809 ph | +1 617.812.6495 fax

 


------=_NextPart_001_020D_01CE0DC7.684FB430
Content-Type: text/html;
	charset="us-ascii"
Content-Transfer-Encoding: quoted-printable

<html xmlns:v=3D"urn:schemas-microsoft-com:vml" =
xmlns:o=3D"urn:schemas-microsoft-com:office:office" =
xmlns:w=3D"urn:schemas-microsoft-com:office:word" =
xmlns:m=3D"http://schemas.microsoft.com/office/2004/12/omml" =
xmlns=3D"http://www.w3.org/TR/REC-html40"><head><META =
HTTP-EQUIV=3D"Content-Type" CONTENT=3D"text/html; =
charset=3Dus-ascii"><meta name=3DGenerator content=3D"Microsoft Word 12 =
(filtered medium)"><style><!--
/* Font Definitions */
@font-face
	{font-family:"Cambria Math";
	panose-1:2 4 5 3 5 4 6 3 2 4;}
@font-face
	{font-family:Calibri;
	panose-1:2 15 5 2 2 2 4 3 2 4;}
/* Style Definitions */
p.MsoNormal, li.MsoNormal, div.MsoNormal
	{margin:0in;
	margin-bottom:.0001pt;
	font-size:11.0pt;
	font-family:"Calibri","sans-serif";}
a:link, span.MsoHyperlink
	{mso-style-priority:99;
	color:blue;
	text-decoration:underline;}
a:visited, span.MsoHyperlinkFollowed
	{mso-style-priority:99;
	color:purple;
	text-decoration:underline;}
span.EmailStyle17
	{mso-style-type:personal-compose;
	font-family:"Calibri","sans-serif";
	color:windowtext;}
.MsoChpDefault
	{mso-style-type:export-only;}
@page WordSection1
	{size:8.5in 11.0in;
	margin:1.0in 1.0in 1.0in 1.0in;}
div.WordSection1
	{page:WordSection1;}
--></style><!--[if gte mso 9]><xml>
<o:shapedefaults v:ext=3D"edit" spidmax=3D"1026" />
</xml><![endif]--><!--[if gte mso 9]><xml>
<o:shapelayout v:ext=3D"edit">
<o:idmap v:ext=3D"edit" data=3D"1" />
</o:shapelayout></xml><![endif]--></head><body lang=3DEN-US link=3Dblue =
vlink=3Dpurple><div class=3DWordSection1><p class=3DMsoNormal>+1 to =
avoiding suspend <o:p></o:p></p><p =
class=3DMsoNormal><o:p>&nbsp;</o:p></p><p class=3DMsoNormal>&#8220;I =
don't think it's worthwhile to specify it as a &quot;suspend&quot; =
operation, because to me &quot;suspend&quot; implies an ability to =
&quot;unsuspend&quot;, and I really don't think we want to get into the =
complicated zombie OAuth client business.&#8221;<o:p></o:p></p><p =
class=3DMsoNormal><o:p>&nbsp;</o:p></p><p =
class=3DMsoNormal>Sal<o:p></o:p></p><p =
class=3DMsoNormal><o:p>&nbsp;</o:p></p><p class=3DMsoNormal><span =
style=3D'color:#595959'>Salvatore D'Agostino, =
CSCIP<o:p></o:p></span></p><p class=3DMsoNormal><span =
style=3D'color:#595959'>IDmachines LLC |1264 Beacon Street, #5 | =
Brookline, MA&nbsp; 02446 | USA<o:p></o:p></span></p><p =
class=3DMsoNormal><span style=3D'color:#595959'><a =
href=3D"http://www.idmachines.com/">http:\\www.idmachines.com</a> | <a =
href=3D"http://idmachines.blogspot.com/">http:\\idmachines.blogspot.com</=
a> | @idmachines<o:p></o:p></span></p><p class=3DMsoNormal><span =
style=3D'color:#595959'>+1 617.201.4809 ph | +1 617.812.6495 =
fax<o:p></o:p></span></p><p =
class=3DMsoNormal><o:p>&nbsp;</o:p></p></div></body></html>
------=_NextPart_001_020D_01CE0DC7.684FB430--

------=_NextPart_000_020C_01CE0DC7.684FB430
Content-Type: application/x-pkcs7-signature;
	name="smime.p7s"
Content-Transfer-Encoding: base64
Content-Disposition: attachment;
	filename="smime.p7s"
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------=_NextPart_000_020C_01CE0DC7.684FB430--


From sberyozkin@gmail.com  Mon Feb 18 08:13:52 2013
Return-Path: <sberyozkin@gmail.com>
X-Original-To: oauth@ietfa.amsl.com
Delivered-To: oauth@ietfa.amsl.com
Received: from localhost (localhost [127.0.0.1]) by ietfa.amsl.com (Postfix) with ESMTP id D7ED121F8BCE for <oauth@ietfa.amsl.com>; Mon, 18 Feb 2013 08:13:52 -0800 (PST)
X-Virus-Scanned: amavisd-new at amsl.com
X-Spam-Flag: NO
X-Spam-Score: -3.417
X-Spam-Level: 
X-Spam-Status: No, score=-3.417 tagged_above=-999 required=5 tests=[AWL=0.182,  BAYES_00=-2.599, RCVD_IN_DNSWL_LOW=-1]
Received: from mail.ietf.org ([64.170.98.30]) by localhost (ietfa.amsl.com [127.0.0.1]) (amavisd-new, port 10024) with ESMTP id eBl5ZZ1unPsl for <oauth@ietfa.amsl.com>; Mon, 18 Feb 2013 08:13:52 -0800 (PST)
Received: from mail-ea0-f180.google.com (mail-ea0-f180.google.com [209.85.215.180]) by ietfa.amsl.com (Postfix) with ESMTP id F259121F8837 for <oauth@ietf.org>; Mon, 18 Feb 2013 08:13:51 -0800 (PST)
Received: by mail-ea0-f180.google.com with SMTP id c1so2376346eaa.11 for <oauth@ietf.org>; Mon, 18 Feb 2013 08:13:51 -0800 (PST)
DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=gmail.com; s=20120113; h=x-received:message-id:date:from:user-agent:mime-version:to:subject :content-type:content-transfer-encoding; bh=Qra4PsRdWabCW6ibN+0NGrMPWeiUPMaAcJHzZl1DzMo=; b=TB7EGEAOL6qgsF51La2sP47+vH5jnQXCDaAW4ubIh8utH9DcOHBct8nt7yGTwAj/MA h9ZHyrrYOXpeKqPMeF2IyqBtHjDWZsxWwfdO6BVBMN01dEXvJ404dnWL76dj1PZQGA+F TWb3M6wTAJ1+Oi7z4hPD/qm8NcOUHuL+M48uYOA/cIeYJ9WXTxoA3KGCu8rPlJWs1jAl /qun2QUUElZvdyvOl4/8YUwLp7CruohBQw9KHQLIFsqAd2taVoKIfwuEqVdRjKsfT8Qs OH7BhX03xfUPY1cItU/eI3lJ643/4mWcgUicXQzthUOvS5T8eOv2GrtPKy75aeSNpl9M u0Fg==
X-Received: by 10.14.0.73 with SMTP id 49mr46384668eea.21.1361204030835; Mon, 18 Feb 2013 08:13:50 -0800 (PST)
Received: from [10.36.226.5] ([217.173.99.61]) by mx.google.com with ESMTPS id r4sm54858839eeo.12.2013.02.18.08.13.49 (version=TLSv1 cipher=ECDHE-RSA-RC4-SHA bits=128/128); Mon, 18 Feb 2013 08:13:49 -0800 (PST)
Message-ID: <5122533C.8020204@gmail.com>
Date: Mon, 18 Feb 2013 16:13:48 +0000
From: Sergey Beryozkin <sberyozkin@gmail.com>
User-Agent: Mozilla/5.0 (X11; Linux x86_64; rv:12.0) Gecko/20120430 Thunderbird/12.0.1
MIME-Version: 1.0
To: "<oauth@ietf.org>" <oauth@ietf.org>
Content-Type: text/plain; charset=ISO-8859-1; format=flowed
Content-Transfer-Encoding: 7bit
Subject: [OAUTH-WG] Saml2 Bearer and base64url question
X-BeenThere: oauth@ietf.org
X-Mailman-Version: 2.1.12
Precedence: list
List-Id: OAUTH WG <oauth.ietf.org>
List-Unsubscribe: <https://www.ietf.org/mailman/options/oauth>, <mailto:oauth-request@ietf.org?subject=unsubscribe>
List-Archive: <http://www.ietf.org/mail-archive/web/oauth>
List-Post: <mailto:oauth@ietf.org>
List-Help: <mailto:oauth-request@ietf.org?subject=help>
List-Subscribe: <https://www.ietf.org/mailman/listinfo/oauth>, <mailto:oauth-request@ietf.org?subject=subscribe>
X-List-Received-Date: Mon, 18 Feb 2013 16:13:53 -0000

Hi,

RFC4648 [1] says:

"The pad character "=" is typically percent-encoded when used in an
  URI [9], but if the data length is known implicitly, this can be
  avoided by skipping the padding; see section 3.2."

while the SAML2 Bearer token draft says:

"The SAML Assertion XML data MUST be encoded using
    base64url, where the encoding adheres to the definition in Section 5
    of RFC4648 [RFC4648] and where the padding bits are set to zero.  To
    avoid the need for subsequent encoding steps (by "application/
    x-www-form-urlencoded" [W3C.REC-html401-19991224], for example), the
    base64url encoded data SHOULD NOT be line wrapped and pad characters
    ("=") SHOULD NOT be included."

I'd appreciate some clarifications on the above:
- SHOULD NOT implies that actually including the pad characters("=") is 
still going to work, right ? Why was it so important that the spec 
decided to mention it at all ?
- 'SHOULD NOT be included' implies the pad characters ("=") will be 
percent-encoded or not included at all ? If it is the latter, how will 
the decoder correctly read the assertion ?

Thanks, Sergey


[1] http://tools.ietf.org/html/rfc4648#section-5
[2] http://tools.ietf.org/html/draft-ietf-oauth-saml2-bearer-15#section-2.1

From ve7jtb@ve7jtb.com  Mon Feb 18 08:55:34 2013
Return-Path: <ve7jtb@ve7jtb.com>
X-Original-To: oauth@ietfa.amsl.com
Delivered-To: oauth@ietfa.amsl.com
Received: from localhost (localhost [127.0.0.1]) by ietfa.amsl.com (Postfix) with ESMTP id CF05821F8C0C for <oauth@ietfa.amsl.com>; Mon, 18 Feb 2013 08:55:30 -0800 (PST)
X-Virus-Scanned: amavisd-new at amsl.com
X-Spam-Flag: NO
X-Spam-Score: -3.407
X-Spam-Level: 
X-Spam-Status: No, score=-3.407 tagged_above=-999 required=5 tests=[AWL=0.192,  BAYES_00=-2.599, RCVD_IN_DNSWL_LOW=-1]
Received: from mail.ietf.org ([64.170.98.30]) by localhost (ietfa.amsl.com [127.0.0.1]) (amavisd-new, port 10024) with ESMTP id xRAZ9R2gv7Tn for <oauth@ietfa.amsl.com>; Mon, 18 Feb 2013 08:55:24 -0800 (PST)
Received: from mail-qa0-f43.google.com (mail-qa0-f43.google.com [209.85.216.43]) by ietfa.amsl.com (Postfix) with ESMTP id 39A7B21F8C4B for <oauth@ietf.org>; Mon, 18 Feb 2013 08:55:24 -0800 (PST)
Received: by mail-qa0-f43.google.com with SMTP id dx4so1375315qab.2 for <oauth@ietf.org>; Mon, 18 Feb 2013 08:55:23 -0800 (PST)
X-Google-DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=google.com; s=20120113; h=x-received:content-type:mime-version:subject:from:in-reply-to:date :cc:message-id:references:to:x-mailer:x-gm-message-state; bh=sY/l2CEtLksNl+WXaIXhz8blAJOt9X5Q8ovPCiMg+8A=; b=LEPfDs7N8LunQ4pEAtf3SbVT081Dt7RuRgfGYmSUIroBVEgD5wpFWjUCB8HrvsXHgr 4d2VhXOAdq/6cT6z8DlI1se0TlVEvvztujN0oUJls7NDno54N/JHA5sw0QPEQQIttPHF 1RCFnzHxJaiwWJpr+vGdHpsaGQklyA5DoxOR/xPeme0DixWwge5Zi3nj8f1XnIbNiibI j8rmZyVoeMpMfZM3vP/d5bXwIqcr0446DHSRim6fpHirH9SdHsU8bV5d7iR8QHJ7VYzp VPs37qCLDMuExWeniuDaGDjb8F+KPqAsVOsySupYdIgUGZoS2n8jQXjPwZQPU58+Akt3 4F1Q==
X-Received: by 10.224.33.208 with SMTP id i16mr1091510qad.45.1361206523448; Mon, 18 Feb 2013 08:55:23 -0800 (PST)
Received: from [192.168.1.213] (190-20-56-120.baf.movistar.cl. [190.20.56.120]) by mx.google.com with ESMTPS id dt10sm25607741qab.0.2013.02.18.08.55.20 (version=TLSv1 cipher=ECDHE-RSA-RC4-SHA bits=128/128); Mon, 18 Feb 2013 08:55:21 -0800 (PST)
Content-Type: multipart/signed; boundary="Apple-Mail=_7A4C5FC5-8EAA-42A3-9E56-57BBE543B5DF"; protocol="application/pkcs7-signature"; micalg=sha1
Mime-Version: 1.0 (Mac OS X Mail 6.2 \(1499\))
From: John Bradley <ve7jtb@ve7jtb.com>
In-Reply-To: <5122533C.8020204@gmail.com>
Date: Mon, 18 Feb 2013 13:54:49 -0300
Message-Id: <F157FB39-DD7C-485A-B5AC-354C3008AD31@ve7jtb.com>
References: <5122533C.8020204@gmail.com>
To: Sergey Beryozkin <sberyozkin@gmail.com>
X-Mailer: Apple Mail (2.1499)
X-Gm-Message-State: ALoCoQkPsAFf/AWCx4UCxe1L9mSG5x85rsRvxZqq2mp1KI5pR0kAtKkY629JdwcMHQaJ/l4uIOd6
Cc: "<oauth@ietf.org>" <oauth@ietf.org>
Subject: Re: [OAUTH-WG] Saml2 Bearer and base64url question
X-BeenThere: oauth@ietf.org
X-Mailman-Version: 2.1.12
Precedence: list
List-Id: OAUTH WG <oauth.ietf.org>
List-Unsubscribe: <https://www.ietf.org/mailman/options/oauth>, <mailto:oauth-request@ietf.org?subject=unsubscribe>
List-Archive: <http://www.ietf.org/mail-archive/web/oauth>
List-Post: <mailto:oauth@ietf.org>
List-Help: <mailto:oauth-request@ietf.org?subject=help>
List-Subscribe: <https://www.ietf.org/mailman/listinfo/oauth>, <mailto:oauth-request@ietf.org?subject=subscribe>
X-List-Received-Date: Mon, 18 Feb 2013 16:55:35 -0000

--Apple-Mail=_7A4C5FC5-8EAA-42A3-9E56-57BBE543B5DF
Content-Transfer-Encoding: quoted-printable
Content-Type: text/plain;
	charset=us-ascii

A base64url decoder doesn't need the padding bytes in this case.  They =
are really only useful if you are concatenating outputs together.   The =
number of missing pads characters can be calculated from the number of =
base64url encoded octets to be decoded.

So the padding and any other line wraps SHOULD NOT be included.  If the =
recipient is known to have a problem with missing padding then they must =
be %encoded if the transport requires it.  =20

I will grant you that changing it to MUST NOT may be clearer to people.  =
I suspect that it is easier to fix broken decoders than try and =
accommodate them.

John B.

=20
On 2013-02-18, at 1:13 PM, Sergey Beryozkin <sberyozkin@gmail.com> =
wrote:

> Hi,
>=20
> RFC4648 [1] says:
>=20
> "The pad character "=3D" is typically percent-encoded when used in an
> URI [9], but if the data length is known implicitly, this can be
> avoided by skipping the padding; see section 3.2."
>=20
> while the SAML2 Bearer token draft says:
>=20
> "The SAML Assertion XML data MUST be encoded using
>   base64url, where the encoding adheres to the definition in Section 5
>   of RFC4648 [RFC4648] and where the padding bits are set to zero.  To
>   avoid the need for subsequent encoding steps (by "application/
>   x-www-form-urlencoded" [W3C.REC-html401-19991224], for example), the
>   base64url encoded data SHOULD NOT be line wrapped and pad characters
>   ("=3D") SHOULD NOT be included."
>=20
> I'd appreciate some clarifications on the above:
> - SHOULD NOT implies that actually including the pad characters("=3D") =
is still going to work, right ? Why was it so important that the spec =
decided to mention it at all ?
> - 'SHOULD NOT be included' implies the pad characters ("=3D") will be =
percent-encoded or not included at all ? If it is the latter, how will =
the decoder correctly read the assertion ?
>=20
> Thanks, Sergey
>=20
>=20
> [1] http://tools.ietf.org/html/rfc4648#section-5
> [2] =
http://tools.ietf.org/html/draft-ietf-oauth-saml2-bearer-15#section-2.1
> _______________________________________________
> OAuth mailing list
> OAuth@ietf.org
> https://www.ietf.org/mailman/listinfo/oauth


--Apple-Mail=_7A4C5FC5-8EAA-42A3-9E56-57BBE543B5DF
Content-Disposition: attachment;
	filename=smime.p7s
Content-Type: application/pkcs7-signature;
	name=smime.p7s
Content-Transfer-Encoding: base64
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--Apple-Mail=_7A4C5FC5-8EAA-42A3-9E56-57BBE543B5DF--

From sberyozkin@gmail.com  Mon Feb 18 09:00:43 2013
Return-Path: <sberyozkin@gmail.com>
X-Original-To: oauth@ietfa.amsl.com
Delivered-To: oauth@ietfa.amsl.com
Received: from localhost (localhost [127.0.0.1]) by ietfa.amsl.com (Postfix) with ESMTP id 592C421F8C45 for <oauth@ietfa.amsl.com>; Mon, 18 Feb 2013 09:00:42 -0800 (PST)
X-Virus-Scanned: amavisd-new at amsl.com
X-Spam-Flag: NO
X-Spam-Score: -3.44
X-Spam-Level: 
X-Spam-Status: No, score=-3.44 tagged_above=-999 required=5 tests=[AWL=0.159,  BAYES_00=-2.599, RCVD_IN_DNSWL_LOW=-1]
Received: from mail.ietf.org ([64.170.98.30]) by localhost (ietfa.amsl.com [127.0.0.1]) (amavisd-new, port 10024) with ESMTP id G7SFLxZK9xUL for <oauth@ietfa.amsl.com>; Mon, 18 Feb 2013 09:00:41 -0800 (PST)
Received: from mail-bk0-f49.google.com (mail-bk0-f49.google.com [209.85.214.49]) by ietfa.amsl.com (Postfix) with ESMTP id 74E7F21F8AA3 for <oauth@ietf.org>; Mon, 18 Feb 2013 09:00:40 -0800 (PST)
Received: by mail-bk0-f49.google.com with SMTP id w11so2656954bku.8 for <oauth@ietf.org>; Mon, 18 Feb 2013 09:00:39 -0800 (PST)
DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=gmail.com; s=20120113; h=x-received:message-id:date:from:user-agent:mime-version:to:cc :subject:references:in-reply-to:content-type :content-transfer-encoding; bh=a+Nhv+LeDP670cFS5tjnPwcSUEritB7pk4V/fB2GhGo=; b=PdG/KkILUNOkkrBGCKTOJ2XjxqaNHVFfjfdgNBuJ2mZNl7hxptFZUWPC3UYvfYfC/8 84UUSb6f9lKwCWYr/NRHYIaUDtXX8WWbwwLxcGY7oDEA6uiIeyA+QNqDv9oXzGC0b5sU Uu2J22L1CnWUkHK49FYKPGHbgTzMONaEb4i3TLHmDGGug9iV05jQFBGpRzUCpRlLql7q pDCKADOHvHSGLS2/nrPr6o938YjMsA16GzHdz4eTSmoCQSSWV2z/mPXoI+Y0fm+DG/a9 Tlzj0Z74mi9yfoXkIQfRctDhTR5dIFSKV+Byr3x33tKTPaqKnMSAtk9MhBoawpfAXY4S JtKg==
X-Received: by 10.204.13.28 with SMTP id z28mr5046677bkz.83.1361206838639; Mon, 18 Feb 2013 09:00:38 -0800 (PST)
Received: from [10.36.226.5] ([217.173.99.61]) by mx.google.com with ESMTPS id go8sm21155107bkc.20.2013.02.18.09.00.36 (version=TLSv1 cipher=ECDHE-RSA-RC4-SHA bits=128/128); Mon, 18 Feb 2013 09:00:37 -0800 (PST)
Message-ID: <51225E33.3030109@gmail.com>
Date: Mon, 18 Feb 2013 17:00:35 +0000
From: Sergey Beryozkin <sberyozkin@gmail.com>
User-Agent: Mozilla/5.0 (X11; Linux x86_64; rv:12.0) Gecko/20120430 Thunderbird/12.0.1
MIME-Version: 1.0
To: John Bradley <ve7jtb@ve7jtb.com>
References: <5122533C.8020204@gmail.com> <F157FB39-DD7C-485A-B5AC-354C3008AD31@ve7jtb.com>
In-Reply-To: <F157FB39-DD7C-485A-B5AC-354C3008AD31@ve7jtb.com>
Content-Type: text/plain; charset=ISO-8859-1; format=flowed
Content-Transfer-Encoding: 7bit
Cc: "<oauth@ietf.org>" <oauth@ietf.org>
Subject: Re: [OAUTH-WG] Saml2 Bearer and base64url question
X-BeenThere: oauth@ietf.org
X-Mailman-Version: 2.1.12
Precedence: list
List-Id: OAUTH WG <oauth.ietf.org>
List-Unsubscribe: <https://www.ietf.org/mailman/options/oauth>, <mailto:oauth-request@ietf.org?subject=unsubscribe>
List-Archive: <http://www.ietf.org/mail-archive/web/oauth>
List-Post: <mailto:oauth@ietf.org>
List-Help: <mailto:oauth-request@ietf.org?subject=help>
List-Subscribe: <https://www.ietf.org/mailman/listinfo/oauth>, <mailto:oauth-request@ietf.org?subject=subscribe>
X-List-Received-Date: Mon, 18 Feb 2013 17:00:44 -0000

On 18/02/13 16:54, John Bradley wrote:
> A base64url decoder doesn't need the padding bytes in this case.  They are really only useful if you are concatenating outputs together.   The number of missing pads characters can be calculated from the number of base64url encoded octets to be decoded.
>
> So the padding and any other line wraps SHOULD NOT be included.  If the recipient is known to have a problem with missing padding then they must be %encoded if the transport requires it.
>
The above is helpful, thanks

> I will grant you that changing it to MUST NOT may be clearer to people.  I suspect that it is easier to fix broken decoders than try and accommodate them.
>
Now that I have a better understanding, either SHOULD or MUST will work 
for me at least :-)

Cheers, Sergey

> John B.
>
>
> On 2013-02-18, at 1:13 PM, Sergey Beryozkin<sberyozkin@gmail.com>  wrote:
>
>> Hi,
>>
>> RFC4648 [1] says:
>>
>> "The pad character "=" is typically percent-encoded when used in an
>> URI [9], but if the data length is known implicitly, this can be
>> avoided by skipping the padding; see section 3.2."
>>
>> while the SAML2 Bearer token draft says:
>>
>> "The SAML Assertion XML data MUST be encoded using
>>    base64url, where the encoding adheres to the definition in Section 5
>>    of RFC4648 [RFC4648] and where the padding bits are set to zero.  To
>>    avoid the need for subsequent encoding steps (by "application/
>>    x-www-form-urlencoded" [W3C.REC-html401-19991224], for example), the
>>    base64url encoded data SHOULD NOT be line wrapped and pad characters
>>    ("=") SHOULD NOT be included."
>>
>> I'd appreciate some clarifications on the above:
>> - SHOULD NOT implies that actually including the pad characters("=") is still going to work, right ? Why was it so important that the spec decided to mention it at all ?
>> - 'SHOULD NOT be included' implies the pad characters ("=") will be percent-encoded or not included at all ? If it is the latter, how will the decoder correctly read the assertion ?
>>
>> Thanks, Sergey
>>
>>
>> [1] http://tools.ietf.org/html/rfc4648#section-5
>> [2] http://tools.ietf.org/html/draft-ietf-oauth-saml2-bearer-15#section-2.1
>> _______________________________________________
>> OAuth mailing list
>> OAuth@ietf.org
>> https://www.ietf.org/mailman/listinfo/oauth
>



From Michael.Jones@microsoft.com  Mon Feb 18 10:07:06 2013
Return-Path: <Michael.Jones@microsoft.com>
X-Original-To: oauth@ietfa.amsl.com
Delivered-To: oauth@ietfa.amsl.com
Received: from localhost (localhost [127.0.0.1]) by ietfa.amsl.com (Postfix) with ESMTP id 641E921F86D5 for <oauth@ietfa.amsl.com>; Mon, 18 Feb 2013 10:07:06 -0800 (PST)
X-Virus-Scanned: amavisd-new at amsl.com
X-Spam-Flag: NO
X-Spam-Score: -2.286
X-Spam-Level: 
X-Spam-Status: No, score=-2.286 tagged_above=-999 required=5 tests=[AWL=-0.288, BAYES_00=-2.599, HTML_MESSAGE=0.001, J_CHICKENPOX_47=0.6]
Received: from mail.ietf.org ([64.170.98.30]) by localhost (ietfa.amsl.com [127.0.0.1]) (amavisd-new, port 10024) with ESMTP id 8vuLLhQTzK6E for <oauth@ietfa.amsl.com>; Mon, 18 Feb 2013 10:07:01 -0800 (PST)
Received: from na01-bl2-obe.outbound.protection.outlook.com (na01-bl2-obe.ptr.protection.outlook.com [65.55.169.32]) by ietfa.amsl.com (Postfix) with ESMTP id 62AE921F88AE for <oauth@ietf.org>; Mon, 18 Feb 2013 10:07:00 -0800 (PST)
Received: from BL2FFO11FD023.protection.gbl (10.173.161.200) by BL2FFO11HUB019.protection.gbl (10.173.160.111) with Microsoft SMTP Server (TLS) id 15.0.620.12; Mon, 18 Feb 2013 18:06:56 +0000
Received: from TK5EX14MLTC103.redmond.corp.microsoft.com (131.107.125.37) by BL2FFO11FD023.mail.protection.outlook.com (10.173.161.102) with Microsoft SMTP Server (TLS) id 15.0.620.12 via Frontend Transport; Mon, 18 Feb 2013 18:06:55 +0000
Received: from TK5EX14MBXC284.redmond.corp.microsoft.com ([169.254.1.96]) by TK5EX14MLTC103.redmond.corp.microsoft.com ([157.54.79.174]) with mapi id 14.02.0318.003; Mon, 18 Feb 2013 18:06:33 +0000
From: Mike Jones <Michael.Jones@microsoft.com>
To: Barry Leiba <barryleiba@computer.org>
Thread-Topic: [OAUTH-WG] oauth assertions plan
Thread-Index: AQHODUSFJYuGTyHp/UK+QNplisn2A5h+fdTAgAASPICAAAGIAIAAiDaAgADB2bA=
Date: Mon, 18 Feb 2013 18:06:32 +0000
Message-ID: <4E1F6AAD24975D4BA5B16804296739436747042A@TK5EX14MBXC284.redmond.corp.microsoft.com>
References: <51212E78.1050206@cs.tcd.ie> <4E1F6AAD24975D4BA5B16804296739436746DC1C@TK5EX14MBXC284.redmond.corp.microsoft.com> <51214AC5.3090807@cs.tcd.ie> <4E1F6AAD24975D4BA5B16804296739436746DE40@TK5EX14MBXC284.redmond.corp.microsoft.com> <CALaySJ+YM9_DJ5KB1AnF+D-_1=jMhCdsxrgB3jQaaCLsB7w1Kg@mail.gmail.com>
In-Reply-To: <CALaySJ+YM9_DJ5KB1AnF+D-_1=jMhCdsxrgB3jQaaCLsB7w1Kg@mail.gmail.com>
Accept-Language: en-US
Content-Language: en-US
X-MS-Has-Attach: 
X-MS-TNEF-Correlator: 
x-originating-ip: [157.54.51.32]
Content-Type: multipart/alternative; boundary="_000_4E1F6AAD24975D4BA5B16804296739436747042ATK5EX14MBXC284r_"
MIME-Version: 1.0
X-Forefront-Antispam-Report: CIP:131.107.125.37; CTRY:US; IPV:CAL; IPV:NLI; EFV:NLI; SFV:NSPM; SFS:(24454001)(13464002)(189002)(199002)(377454001)(53806001)(77982001)(59766001)(54356001)(16236675001)(55846006)(51856001)(49866001)(47736001)(47976001)(512954001)(50986001)(54316002)(4396001)(76482001)(44976002)(74662001)(74502001)(31966008)(15202345001)(47446002)(65816001)(5343655001)(5343635001)(80022001)(46102001)(66066001)(63696002)(33656001)(20776003)(16406001)(79102001)(56776001)(56816002); DIR:OUT; SFP:; SCL:1; SRVR:BL2FFO11HUB019; H:TK5EX14MLTC103.redmond.corp.microsoft.com; RD:InfoDomainNonexistent; MX:1; A:1; LANG:en; 
X-OriginatorOrg: microsoft.onmicrosoft.com
X-Forefront-PRVS: 0761DE1EDD
Cc: "oauth-chairs@tools.ietf.org" <oauth-chairs@tools.ietf.org>, "oauth@ietf.org" <oauth@ietf.org>
Subject: Re: [OAUTH-WG] oauth assertions plan
X-BeenThere: oauth@ietf.org
X-Mailman-Version: 2.1.12
Precedence: list
List-Id: OAUTH WG <oauth.ietf.org>
List-Unsubscribe: <https://www.ietf.org/mailman/options/oauth>, <mailto:oauth-request@ietf.org?subject=unsubscribe>
List-Archive: <http://www.ietf.org/mail-archive/web/oauth>
List-Post: <mailto:oauth@ietf.org>
List-Help: <mailto:oauth-request@ietf.org?subject=help>
List-Subscribe: <https://www.ietf.org/mailman/listinfo/oauth>, <mailto:oauth-request@ietf.org?subject=subscribe>
X-List-Received-Date: Mon, 18 Feb 2013 18:07:06 -0000

--_000_4E1F6AAD24975D4BA5B16804296739436747042ATK5EX14MBXC284r_
Content-Type: text/plain; charset="us-ascii"
Content-Transfer-Encoding: quoted-printable

Hi Barry.  Thanks for your response.  I believe we share the same goals her=
e (the "what").  Where I think we need to focus the discussion then is on t=
he mechanisms to achieve that (the "how").  Let me fill in the details, as =
I see them, by responding to a few things you wrote:



If you do this by profiling, we need to get to a point where two things are=
 true: (1) the profile chain has ended, and what's left is well defined, an=
d (2) I have to be able to, *from the specs and the protocol alone*, determ=
ine what profile will be used.  I don't see how this protocol gives me any =
way to determine what to send or what to expect to receive.  And if an out-=
of-band understanding is required for that, that doesn't interoperate.



I completely agree with you that the profile chain has to end, with what's =
left being well-defined and that from the protocol specs alone, one can det=
ermine how to interoperate.



Now, the way we usually handle the need for "different kinds of things" is =
to have different fields for each, or to have one field tagged so that it's=
 self-defining (as URIs have a scheme that says what to do with them).  If =
the Audience field might look like this in one application:

   urn:ietf:params:banana

...and like this in another

   abra:cadabra

...where the first is understood to be a URI and the second is something el=
se, then please explain how you and I can each write applications to that?


You can write applications to that by having the profile chain end, and wit=
h the contents of the Audience field being completely specified somewhere i=
n the profile chain being used.  Also, I'll observe that we are using the "=
tagged field" approach that you mention in the assertions specs, using the =
defined tag values urn:ietf:params:oauth:grant-type:saml2-bearer, urn:ietf:=
params:oauth:client-assertion-type:saml2-bearer, urn:ietf:params:oauth:gran=
t-type:jwt-bearer, and urn:ietf:params:oauth:client-assertion-type:jwt-bear=
er to declare the token type and use of that token type.  (The OpenID Conne=
ct profile also uses a "tagged field" which is an OAuth scope value of "ope=
nid" to dynamically declare to the OAuth implementation that the OpenID Con=
nect profile is being used.  Other profiles may similarly indicate their us=
age through different scope values.)



I am proposing that there must be a way for someone writing an application =
to know what to use in these fields that will work with your application (o=
r will work with a server in the same way as your application does, or what=
ever) *without* having to go to the documentation of your application to fi=
gure it out.



I agree with what I think you mean, but possibly not with how you're saying=
 it.  Using the TCP analogy again, in fact, to understand the contents of t=
he TCP stream for port 25, one has to go to the documentation of the applic=
ation communicating on port 25.  In this case, that documentation is RFC 82=
1 and its successors.  SMTP is a profile of TCP that further specifies the =
contents of the data being exchanged.  An analogous situation exists when u=
sing OAuth Assertions.



I'll also observe that the working group is also working on a specification=
 that enables an OAuth client to dynamically register itself with the Autho=
rization Server (draft-ietf-oauth-dyn-reg) and that that registration does =
declare information about what profile is being used, as John Bradley point=
ed out in his response.  That's a key piece of the whole solution to enable=
 interoperable implementations.



So using your Ukrainian dolls analogy, yes, the OAuth Assertions spec and t=
he OAuth SAML2 Profile and OAuth JWT Profile specs are dolls inside other d=
olls - not the outer doll.  That's by design, and not a spec defect, at lea=
st as I see it.  We already do have mechanisms for dynamically declaring wh=
at profile is being used, and we are using them.



I agree with Stephen that we should let this conversation run for a while t=
o make sure everyone comes to a common understanding, but ultimately, I hop=
e that you'll withdraw your DISCUSS, because, in fact, interoperable implem=
entations can be written by reading the specs used alone.



                                                            Best wishes,

                                                            -- Mike



-----Original Message-----
From: barryleiba@gmail.com [mailto:barryleiba@gmail.com] On Behalf Of Barry=
 Leiba
Sent: Sunday, February 17, 2013 9:38 PM
To: Mike Jones
Cc: Stephen Farrell; oauth@ietf.org; oauth-chairs@tools.ietf.org
Subject: Re: [OAUTH-WG] oauth assertions plan



OK, I have some time to respond to this on a real computer.



Let's look at the general mechanism that oauth provides, using one use case=
:

A client asks an authorization server for authorization to do something.

The authorization server responds with an authorization token, which the cl=
ient is required to understand.



We have talked about three kinds of tokens: bearer tokens, MAC tokens, and =
assertion tokens.

How does a client know what kind of token it will get from a particular aut=
horization server?

How does a server that supports multiple token types know what kind of toke=
n it should give to a particular client?



Now, suppose that the server decides to give back an assertion:

How does the server know whether to give a SAML assertion or a JWT assertio=
n?  How does the client know which it's going to get?



And now you're saying that even if everyone knows they're going to get an a=
ssertion token, and specifically a JWT assertion, the semantics of particul=
ar fields in those tokens are undefined.  If you have different meanings ("=
different kinds of things", as you've said) for the Audience field, how is =
the server supposed to communicate which meaning *it* is using?  How is the=
re any assurance that a client will understand it in the same way?



These are the sorts of things I'm concerned about, and this is what I mean =
by saying that it's like a Ukrainian doll: you open the oauth doll and find=
 the token doll; you open the token doll and find the assertions doll; you =
open the assertions doll and find the JWT doll; you open the JWT doll and f=
ind the Audience field doll... at what point do the dolls end and interoper=
ablity begins?



I understand that you want certain things to be handled differently by diff=
erent applications, and I'm fine with that in principle.  But the other par=
t of the principle is that I have to be able to write an application that i=
nteroperates with yours *purely by reading the specs*.



If you do this by profiling, we need to get to a point where two things are=
 true: (1) the profile chain has ended, and what's left is well defined, an=
d (2) I have to be able to, *from the specs and the protocol alone*, determ=
ine what profile will be used.  I don't see how this protocol gives me any =
way to determine what to send or what to expect to receive.  And if an out-=
of-band understanding is required for that, that doesn't interoperate.



Now, the way we usually handle the need for "different kinds of things" is =
to have different fields for each, or to have one field tagged so that it's=
 self-defining (as URIs have a scheme that says what to do with them).  If =
the Audience field might look like this in one application:

   urn:ietf:params:banana

...and like this in another

   abra:cadabra

...where the first is understood to be a URI and the second is something el=
se, then please explain how you and I can each write applications to that?



For your specific questions:



> Barry, are you proposing that we require that the Audience contain a

> specific data format tailored to a particular application of

> assertions?  If so, what format are you proposing, and for which

> application of assertions?  Likewise, are you proposing that the

> Subject field contain a particular data format tailored to a particular a=
pplication?  And also the Issuer field?



I am proposing that there must be a way for someone writing an application =
to know what to use in these fields that will work with your application (o=
r will work with a server in the same way as your application does, or what=
ever) *without* having to go to the documentation of your application to fi=
gure it out.



That's why I say that as I see it, it's not an issue of MTI.  I'm not sayin=
g that I want you to require that any particular thing be implemented.  I'm=
 saying that both sides need to be able to know which variations *are* impl=
emented.  How else do you get interoperability?



Your TCP/ports example is a perfect one to show how this works: the assignm=
ents for port numbers are *exactly* to create the interoperability I'm talk=
ing about here.  TCP doesn't say anything about the protocol ("profile", pe=
rhaps) that's used over it.  But we've defined that port 110 is used for PO=
P and 143 is used for IMAP and 25 is used for SMTP, and so on.  So I know t=
hat if my IMAP application wants to talk with your IMAP server, I can accom=
plish that by using port 143.  If you decide to run your IMAP server on por=
t 142 instead, or if you run your POP server on port 143, we will not inter=
operate.



But all I need to know is (1) how to do IMAP, (2) how to do it over TCP, an=
d (3) what port to use... and I can build an IMAP client that will work wit=
h any IMAP server that follows the same specs.



Can you do that here?  Please explain how.



Barry

--_000_4E1F6AAD24975D4BA5B16804296739436747042ATK5EX14MBXC284r_
Content-Type: text/html; charset="us-ascii"
Content-Transfer-Encoding: quoted-printable

<html xmlns:v=3D"urn:schemas-microsoft-com:vml" xmlns:o=3D"urn:schemas-micr=
osoft-com:office:office" xmlns:w=3D"urn:schemas-microsoft-com:office:word" =
xmlns:m=3D"http://schemas.microsoft.com/office/2004/12/omml" xmlns=3D"http:=
//www.w3.org/TR/REC-html40">
<head>
<meta http-equiv=3D"Content-Type" content=3D"text/html; charset=3Dus-ascii"=
>
<meta name=3D"Generator" content=3D"Microsoft Word 14 (filtered medium)">
<style><!--
/* Font Definitions */
@font-face
	{font-family:Calibri;
	panose-1:2 15 5 2 2 2 4 3 2 4;}
/* Style Definitions */
p.MsoNormal, li.MsoNormal, div.MsoNormal
	{margin:0in;
	margin-bottom:.0001pt;
	font-size:11.0pt;
	font-family:"Calibri","sans-serif";}
a:link, span.MsoHyperlink
	{mso-style-priority:99;
	color:blue;
	text-decoration:underline;}
a:visited, span.MsoHyperlinkFollowed
	{mso-style-priority:99;
	color:purple;
	text-decoration:underline;}
p.MsoPlainText, li.MsoPlainText, div.MsoPlainText
	{mso-style-priority:99;
	mso-style-link:"Plain Text Char";
	margin:0in;
	margin-bottom:.0001pt;
	font-size:11.0pt;
	font-family:"Calibri","sans-serif";}
span.PlainTextChar
	{mso-style-name:"Plain Text Char";
	mso-style-priority:99;
	mso-style-link:"Plain Text";
	font-family:"Calibri","sans-serif";}
.MsoChpDefault
	{mso-style-type:export-only;}
@page WordSection1
	{size:8.5in 11.0in;
	margin:1.0in 1.0in 1.0in 1.0in;}
div.WordSection1
	{page:WordSection1;}
--></style><!--[if gte mso 9]><xml>
<o:shapedefaults v:ext=3D"edit" spidmax=3D"1026" />
</xml><![endif]--><!--[if gte mso 9]><xml>
<o:shapelayout v:ext=3D"edit">
<o:idmap v:ext=3D"edit" data=3D"1" />
</o:shapelayout></xml><![endif]-->
</head>
<body lang=3D"EN-US" link=3D"blue" vlink=3D"purple">
<div class=3D"WordSection1">
<p class=3D"MsoPlainText"><span style=3D"color:#002060">Hi Barry.&nbsp; Tha=
nks for your response.&nbsp; I believe we share the same goals here (the &q=
uot;what&quot;).&nbsp; Where I think we need to focus the discussion then i=
s on the mechanisms to achieve that (the &quot;how&quot;).&nbsp; Let me fil=
l
 in the details, as I see them, by responding to a few things you wrote:<o:=
p></o:p></span></p>
<p class=3D"MsoPlainText"><o:p>&nbsp;</o:p></p>
<p class=3D"MsoPlainText" style=3D"margin-left:.5in">If you do this by prof=
iling, we need to get to a point where two things are true: (1) the profile=
 chain has ended, and what's left is well defined, and (2) I have to be abl=
e to, *from the specs and the protocol
 alone*, determine what profile will be used.&nbsp; I don't see how this pr=
otocol gives me any way to determine what to send or what to expect to rece=
ive.&nbsp; And if an out-of-band understanding is required for that, that d=
oesn't interoperate.<o:p></o:p></p>
<p class=3D"MsoPlainText"><o:p>&nbsp;</o:p></p>
<p class=3D"MsoPlainText"><span style=3D"color:#002060">I completely agree =
with you that the profile chain has to end, with what&#8217;s left being we=
ll-defined and that from the protocol specs alone, one can determine how to=
 interoperate.<o:p></o:p></span></p>
<p class=3D"MsoPlainText"><o:p>&nbsp;</o:p></p>
<p class=3D"MsoPlainText" style=3D"margin-left:.5in">Now, the way we usuall=
y handle the need for &quot;different kinds of things&quot; is to have diff=
erent fields for each, or to have one field tagged so that it's self-defini=
ng (as URIs have a scheme that says what to do
 with them).&nbsp; If the Audience field might look like this in one applic=
ation:<o:p></o:p></p>
<p class=3D"MsoPlainText" style=3D"margin-left:.5in">&nbsp;&nbsp; urn:ietf:=
params:banana<o:p></o:p></p>
<p class=3D"MsoPlainText" style=3D"margin-left:.5in">...and like this in an=
other<o:p></o:p></p>
<p class=3D"MsoPlainText" style=3D"margin-left:.5in">&nbsp;&nbsp; abra:cada=
bra<o:p></o:p></p>
<p class=3D"MsoPlainText" style=3D"margin-left:.5in">...where the first is =
understood to be a URI and the second is something else, then please explai=
n how you and I can each write applications to that?<o:p></o:p></p>
<p class=3D"MsoPlainText"><o:p>&nbsp;</o:p></p>
<p class=3D"MsoNormal"><span style=3D"color:#002060">You can write applicat=
ions to that by having the profile chain end, and with the contents of the =
Audience field being completely specified somewhere in the profile chain be=
ing used.&nbsp; Also, I&#8217;ll observe that we
<i>are</i> using the &#8220;tagged field&#8221; approach that you mention i=
n the assertions specs, using the defined tag values
</span><span style=3D"font-size:10.0pt;font-family:&quot;Courier New&quot;"=
>urn:ietf:params:oauth:grant-type:saml2-bearer</span>,
<span style=3D"font-size:10.0pt;font-family:&quot;Courier New&quot;">urn:ie=
tf:params:oauth:client-assertion-type:saml2-bearer</span>,
<span style=3D"font-size:10.0pt;font-family:&quot;Courier New&quot;">urn:ie=
tf:params:oauth:grant-type:jwt-bearer</span><span style=3D"color:#002060">,=
 and
</span><span style=3D"font-size:10.0pt;font-family:&quot;Courier New&quot;"=
>urn:ietf:params:oauth:client-assertion-type:jwt-bearer</span><span style=
=3D"color:#002060"> to declare the token type and use of that token type.&n=
bsp; (The OpenID Connect profile also uses a &#8220;tagged
 field&#8221; which is an OAuth </span><span style=3D"font-size:10.0pt;font=
-family:&quot;Courier New&quot;">scope</span><span style=3D"color:#002060">=
 value of &#8220;</span><span style=3D"font-size:10.0pt;font-family:&quot;C=
ourier New&quot;">openid</span><span style=3D"color:#002060">&#8221; to dyn=
amically
 declare to the OAuth implementation that the OpenID Connect profile is bei=
ng used.&nbsp; Other profiles may similarly indicate their usage through di=
fferent
</span><span style=3D"font-size:10.0pt;font-family:&quot;Courier New&quot;"=
>scope</span><span style=3D"color:#002060"> values.)<o:p></o:p></span></p>
<p class=3D"MsoPlainText"><o:p>&nbsp;</o:p></p>
<p class=3D"MsoPlainText" style=3D"margin-left:.5in">I am proposing that th=
ere must be a way for someone writing an application to know what to use in=
 these fields that will work with your application (or will work with a ser=
ver in the same way as your application
 does, or whatever) *without* having to go to the documentation of your app=
lication to figure it out.<o:p></o:p></p>
<p class=3D"MsoPlainText"><o:p>&nbsp;</o:p></p>
<p class=3D"MsoPlainText"><span style=3D"color:#002060">I agree with what I=
 think you mean, but possibly not with how you&#8217;re saying it.&nbsp; Us=
ing the TCP analogy again, in fact, to understand the contents of the TCP s=
tream for port 25, one has to go to the documentation
 of the application communicating on port 25.&nbsp; In this case, that docu=
mentation is RFC 821 and its successors.&nbsp; SMTP is a profile of TCP tha=
t further specifies the contents of the data being exchanged.&nbsp; An anal=
ogous situation exists when using OAuth Assertions.<o:p></o:p></span></p>
<p class=3D"MsoPlainText"><span style=3D"color:#002060"><o:p>&nbsp;</o:p></=
span></p>
<p class=3D"MsoPlainText"><span style=3D"color:#002060">I&#8217;ll also obs=
erve that the working group is also working on a specification that enables=
 an OAuth client to dynamically register itself with the Authorization Serv=
er (draft-ietf-oauth-dyn-reg)
<i>and that that registration does declare information about what profile i=
s being used</i>, as John Bradley pointed out in his response.&nbsp; That&#=
8217;s a key piece of the whole solution to enable interoperable implementa=
tions.<o:p></o:p></span></p>
<p class=3D"MsoPlainText"><span style=3D"color:#002060"><o:p>&nbsp;</o:p></=
span></p>
<p class=3D"MsoPlainText"><span style=3D"color:#002060">So using your Ukrai=
nian dolls analogy, yes, the OAuth Assertions spec and the OAuth SAML2 Prof=
ile and OAuth JWT Profile specs are dolls inside other dolls &#8211; not th=
e outer doll.&nbsp; That&#8217;s by design, and not a
 spec defect, at least as I see it.&nbsp; We already do have mechanisms for=
 dynamically declaring what profile is being used, and we are using them.<o=
:p></o:p></span></p>
<p class=3D"MsoPlainText"><span style=3D"color:#002060"><o:p>&nbsp;</o:p></=
span></p>
<p class=3D"MsoPlainText"><span style=3D"color:#002060">I agree with Stephe=
n that we should let this conversation run for a while to make sure everyon=
e comes to a common understanding, but ultimately, I hope that you&#8217;ll=
 withdraw your DISCUSS, because, in fact,
 interoperable implementations can be written by reading the specs used alo=
ne.<o:p></o:p></span></p>
<p class=3D"MsoPlainText"><span style=3D"color:#002060"><o:p>&nbsp;</o:p></=
span></p>
<p class=3D"MsoPlainText"><span style=3D"color:#002060">&nbsp;&nbsp;&nbsp;&=
nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbs=
p;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&=
nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbs=
p;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&=
nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp; Best wishes,<o:p></o:p></span></p>
<p class=3D"MsoPlainText"><span style=3D"color:#002060">&nbsp;&nbsp;&nbsp;&=
nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbs=
p;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&=
nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbs=
p;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&=
nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp; -- Mike<o:p></o:p></span></p>
<p class=3D"MsoPlainText"><span style=3D"color:#002060"><o:p>&nbsp;</o:p></=
span></p>
<p class=3D"MsoPlainText">-----Original Message-----<br>
From: barryleiba@gmail.com [mailto:barryleiba@gmail.com] On Behalf Of Barry=
 Leiba<br>
Sent: Sunday, February 17, 2013 9:38 PM<br>
To: Mike Jones<br>
Cc: Stephen Farrell; oauth@ietf.org; oauth-chairs@tools.ietf.org<br>
Subject: Re: [OAUTH-WG] oauth assertions plan</p>
<p class=3D"MsoPlainText"><o:p>&nbsp;</o:p></p>
<p class=3D"MsoPlainText">OK, I have some time to respond to this on a real=
 computer.<o:p></o:p></p>
<p class=3D"MsoPlainText"><o:p>&nbsp;</o:p></p>
<p class=3D"MsoPlainText">Let's look at the general mechanism that oauth pr=
ovides, using one use case:<o:p></o:p></p>
<p class=3D"MsoPlainText">A client asks an authorization server for authori=
zation to do something.<o:p></o:p></p>
<p class=3D"MsoPlainText">The authorization server responds with an authori=
zation token, which the client is required to understand.<o:p></o:p></p>
<p class=3D"MsoPlainText"><o:p>&nbsp;</o:p></p>
<p class=3D"MsoPlainText">We have talked about three kinds of tokens: beare=
r tokens, MAC tokens, and assertion tokens.<o:p></o:p></p>
<p class=3D"MsoPlainText">How does a client know what kind of token it will=
 get from a particular authorization server?<o:p></o:p></p>
<p class=3D"MsoPlainText">How does a server that supports multiple token ty=
pes know what kind of token it should give to a particular client?<o:p></o:=
p></p>
<p class=3D"MsoPlainText"><o:p>&nbsp;</o:p></p>
<p class=3D"MsoPlainText">Now, suppose that the server decides to give back=
 an assertion:<o:p></o:p></p>
<p class=3D"MsoPlainText">How does the server know whether to give a SAML a=
ssertion or a JWT assertion?&nbsp; How does the client know which it's goin=
g to get?<o:p></o:p></p>
<p class=3D"MsoPlainText"><o:p>&nbsp;</o:p></p>
<p class=3D"MsoPlainText">And now you're saying that even if everyone knows=
 they're going to get an assertion token, and specifically a JWT assertion,=
 the semantics of particular fields in those tokens are undefined.&nbsp; If=
 you have different meanings (&quot;different
 kinds of things&quot;, as you've said) for the Audience field, how is the =
server supposed to communicate which meaning *it* is using?&nbsp; How is th=
ere any assurance that a client will understand it in the same way?<o:p></o=
:p></p>
<p class=3D"MsoPlainText"><o:p>&nbsp;</o:p></p>
<p class=3D"MsoPlainText">These are the sorts of things I'm concerned about=
, and this is what I mean by saying that it's like a Ukrainian doll: you op=
en the oauth doll and find the token doll; you open the token doll and find=
 the assertions doll; you open the
 assertions doll and find the JWT doll; you open the JWT doll and find the =
Audience field doll... at what point do the dolls end and interoperablity b=
egins?<o:p></o:p></p>
<p class=3D"MsoPlainText"><o:p>&nbsp;</o:p></p>
<p class=3D"MsoPlainText">I understand that you want certain things to be h=
andled differently by different applications, and I'm fine with that in pri=
nciple.&nbsp; But the other part of the principle is that I have to be able=
 to write an application that interoperates
 with yours *purely by reading the specs*.<o:p></o:p></p>
<p class=3D"MsoPlainText"><o:p>&nbsp;</o:p></p>
<p class=3D"MsoPlainText">If you do this by profiling, we need to get to a =
point where two things are true: (1) the profile chain has ended, and what'=
s left is well defined, and (2) I have to be able to, *from the specs and t=
he protocol alone*, determine what
 profile will be used.&nbsp; I don't see how this protocol gives me any way=
 to determine what to send or what to expect to receive.&nbsp; And if an ou=
t-of-band understanding is required for that, that doesn't interoperate.<o:=
p></o:p></p>
<p class=3D"MsoPlainText"><o:p>&nbsp;</o:p></p>
<p class=3D"MsoPlainText">Now, the way we usually handle the need for &quot=
;different kinds of things&quot; is to have different fields for each, or t=
o have one field tagged so that it's self-defining (as URIs have a scheme t=
hat says what to do with them).&nbsp; If the Audience
 field might look like this in one application:<o:p></o:p></p>
<p class=3D"MsoPlainText">&nbsp;&nbsp; urn:ietf:params:banana<o:p></o:p></p=
>
<p class=3D"MsoPlainText">...and like this in another<o:p></o:p></p>
<p class=3D"MsoPlainText">&nbsp;&nbsp; abra:cadabra<o:p></o:p></p>
<p class=3D"MsoPlainText">...where the first is understood to be a URI and =
the second is something else, then please explain how you and I can each wr=
ite applications to that?<o:p></o:p></p>
<p class=3D"MsoPlainText"><o:p>&nbsp;</o:p></p>
<p class=3D"MsoPlainText">For your specific questions:<o:p></o:p></p>
<p class=3D"MsoPlainText"><o:p>&nbsp;</o:p></p>
<p class=3D"MsoPlainText">&gt; Barry, are you proposing that we require tha=
t the Audience contain a
<o:p></o:p></p>
<p class=3D"MsoPlainText">&gt; specific data format tailored to a particula=
r application of
<o:p></o:p></p>
<p class=3D"MsoPlainText">&gt; assertions?&nbsp; If so, what format are you=
 proposing, and for which
<o:p></o:p></p>
<p class=3D"MsoPlainText">&gt; application of assertions?&nbsp; Likewise, a=
re you proposing that the
<o:p></o:p></p>
<p class=3D"MsoPlainText">&gt; Subject field contain a particular data form=
at tailored to a particular application?&nbsp; And also the Issuer field?<o=
:p></o:p></p>
<p class=3D"MsoPlainText"><o:p>&nbsp;</o:p></p>
<p class=3D"MsoPlainText">I am proposing that there must be a way for someo=
ne writing an application to know what to use in these fields that will wor=
k with your application (or will work with a server in the same way as your=
 application does, or whatever) *without*
 having to go to the documentation of your application to figure it out.<o:=
p></o:p></p>
<p class=3D"MsoPlainText"><o:p>&nbsp;</o:p></p>
<p class=3D"MsoPlainText">That's why I say that as I see it, it's not an is=
sue of MTI.&nbsp; I'm not saying that I want you to require that any partic=
ular thing be implemented.&nbsp; I'm saying that both sides need to be able=
 to know which variations *are* implemented.&nbsp;
 How else do you get interoperability?<o:p></o:p></p>
<p class=3D"MsoPlainText"><o:p>&nbsp;</o:p></p>
<p class=3D"MsoPlainText">Your TCP/ports example is a perfect one to show h=
ow this works: the assignments for port numbers are *exactly* to create the=
 interoperability I'm talking about here.&nbsp; TCP doesn't say anything ab=
out the protocol (&quot;profile&quot;, perhaps) that's
 used over it.&nbsp; But we've defined that port 110 is used for POP and 14=
3 is used for IMAP and 25 is used for SMTP, and so on.&nbsp; So I know that=
 if my IMAP application wants to talk with your IMAP server, I can accompli=
sh that by using port 143.&nbsp; If you decide
 to run your IMAP server on port 142 instead, or if you run your POP server=
 on port 143, we will not interoperate.<o:p></o:p></p>
<p class=3D"MsoPlainText"><o:p>&nbsp;</o:p></p>
<p class=3D"MsoPlainText">But all I need to know is (1) how to do IMAP, (2)=
 how to do it over TCP, and (3) what port to use... and I can build an IMAP=
 client that will work with any IMAP server that follows the same specs.<o:=
p></o:p></p>
<p class=3D"MsoPlainText"><o:p>&nbsp;</o:p></p>
<p class=3D"MsoPlainText">Can you do that here?&nbsp; Please explain how.<o=
:p></o:p></p>
<p class=3D"MsoPlainText"><o:p>&nbsp;</o:p></p>
<p class=3D"MsoPlainText">Barry<o:p></o:p></p>
</div>
</body>
</html>

--_000_4E1F6AAD24975D4BA5B16804296739436747042ATK5EX14MBXC284r_--

From barryleiba.mailing.lists@gmail.com  Mon Feb 18 10:37:11 2013
Return-Path: <barryleiba.mailing.lists@gmail.com>
X-Original-To: oauth@ietfa.amsl.com
Delivered-To: oauth@ietfa.amsl.com
Received: from localhost (localhost [127.0.0.1]) by ietfa.amsl.com (Postfix) with ESMTP id 37A0221F8B02 for <oauth@ietfa.amsl.com>; Mon, 18 Feb 2013 10:37:11 -0800 (PST)
X-Virus-Scanned: amavisd-new at amsl.com
X-Spam-Flag: NO
X-Spam-Score: -102.931
X-Spam-Level: 
X-Spam-Status: No, score=-102.931 tagged_above=-999 required=5 tests=[AWL=0.045, BAYES_00=-2.599, FM_FORGED_GMAIL=0.622, HTML_MESSAGE=0.001, RCVD_IN_DNSWL_LOW=-1, USER_IN_WHITELIST=-100]
Received: from mail.ietf.org ([64.170.98.30]) by localhost (ietfa.amsl.com [127.0.0.1]) (amavisd-new, port 10024) with ESMTP id UQwiAKQLMPAQ for <oauth@ietfa.amsl.com>; Mon, 18 Feb 2013 10:37:10 -0800 (PST)
Received: from mail-vb0-f52.google.com (mail-vb0-f52.google.com [209.85.212.52]) by ietfa.amsl.com (Postfix) with ESMTP id 3644421F8AD8 for <oauth@ietf.org>; Mon, 18 Feb 2013 10:37:10 -0800 (PST)
Received: by mail-vb0-f52.google.com with SMTP id fa15so3673418vbb.39 for <oauth@ietf.org>; Mon, 18 Feb 2013 10:37:09 -0800 (PST)
DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=gmail.com; s=20120113; h=mime-version:x-received:sender:in-reply-to:references:date :x-google-sender-auth:message-id:subject:from:to:cc:content-type; bh=LD4ilCkLbRjWH+m3Eq1AfJQlJH0Zy8MYFuf8jhEH6fg=; b=PK7US1/hsVf9cSqiUCDbLQFf4+p9nsjj8cbfnz4P6yuc1yrq//Vv/o9yxCg8wBNUX3 M5IsH/Z7xpxQVcgKgd9lorloVjaZRZK8p/ozBhuerU1Tia4rVreVKtCTNJFhEIgo4YwU juwDsfnq5K1XW+O9ZYNIORdgcgCMJST1RD1c/ucs0yjJt5VwTu9efZaPNKIgoioIuXA0 EzoUsuhPXEUW06au2hKr1kqLfqJ1EqaB7hHPp9sWXcxjW17sq87miwOSqkX/gmzFHnaC P60HWmNukBcv+8hVIJbUJ2KubMvbkQeBHnKdrsdfToclouNwWBixS3ODtAiqJ/wq8Qcl MP0g==
MIME-Version: 1.0
X-Received: by 10.59.9.201 with SMTP id du9mr17427662ved.38.1361212629577; Mon, 18 Feb 2013 10:37:09 -0800 (PST)
Sender: barryleiba.mailing.lists@gmail.com
Received: by 10.59.3.41 with HTTP; Mon, 18 Feb 2013 10:37:09 -0800 (PST)
In-Reply-To: <4E1F6AAD24975D4BA5B16804296739436747042A@TK5EX14MBXC284.redmond.corp.microsoft.com>
References: <51212E78.1050206@cs.tcd.ie> <4E1F6AAD24975D4BA5B16804296739436746DC1C@TK5EX14MBXC284.redmond.corp.microsoft.com> <51214AC5.3090807@cs.tcd.ie> <4E1F6AAD24975D4BA5B16804296739436746DE40@TK5EX14MBXC284.redmond.corp.microsoft.com> <CALaySJ+YM9_DJ5KB1AnF+D-_1=jMhCdsxrgB3jQaaCLsB7w1Kg@mail.gmail.com> <4E1F6AAD24975D4BA5B16804296739436747042A@TK5EX14MBXC284.redmond.corp.microsoft.com>
Date: Mon, 18 Feb 2013 13:37:09 -0500
X-Google-Sender-Auth: GsoYlMTEw0dbl7wWDlV-ni76uYw
Message-ID: <CAC4RtVAKUAQosF=tJQLB6FExUriY-WhBv+R_0uX6aP1gegR=QQ@mail.gmail.com>
From: Barry Leiba <barryleiba@computer.org>
To: Mike Jones <Michael.Jones@microsoft.com>
Content-Type: multipart/alternative; boundary=047d7beb971e3feeb104d60403c7
Cc: "oauth-chairs@tools.ietf.org" <oauth-chairs@tools.ietf.org>, Barry Leiba <barryleiba@computer.org>, "oauth@ietf.org" <oauth@ietf.org>
Subject: Re: [OAUTH-WG] oauth assertions plan
X-BeenThere: oauth@ietf.org
X-Mailman-Version: 2.1.12
Precedence: list
List-Id: OAUTH WG <oauth.ietf.org>
List-Unsubscribe: <https://www.ietf.org/mailman/options/oauth>, <mailto:oauth-request@ietf.org?subject=unsubscribe>
List-Archive: <http://www.ietf.org/mail-archive/web/oauth>
List-Post: <mailto:oauth@ietf.org>
List-Help: <mailto:oauth-request@ietf.org?subject=help>
List-Subscribe: <https://www.ietf.org/mailman/listinfo/oauth>, <mailto:oauth-request@ietf.org?subject=subscribe>
X-List-Received-Date: Mon, 18 Feb 2013 18:37:11 -0000

--047d7beb971e3feeb104d60403c7
Content-Type: text/plain; charset=windows-1252
Content-Transfer-Encoding: quoted-printable

I'll get to John's message later, after I digest it more.  I can reply to
this one now.

please explain how you and I can each write applications to that?
>
> **
>
> ** **
>
> You can write applications to that by having the profile chain end, and
> with the contents of the Audience field being completely specified
> somewhere in the profile chain being used.
>
>
In order for that to work, we have to know ("we" being both sides of the
protocol, and also "we" being different implementors of similar
applications) what profile to use.


> I am proposing that there must be a way for someone writing an applicatio=
n
> to know what to use in these fields that will work with your application
> (or will work with a server in the same way as your application does, or
> whatever) *without* having to go to the documentation of your application
> to figure it out.****
>
> ** **
>
> I agree with what I think you mean, but possibly not with how you=92re
> saying it.  Using the TCP analogy again, in fact, to understand the
> contents of the TCP stream for port 25, one has to go to the documentatio=
n
> of the application communicating on port 25.  In this case, that
> documentation is RFC 821 and its successors.
>
> Yeh, here's where we're disconnected.  One does NOT have to go to the
documentation of the application at all.  One has to go to the
specification of SMTP.  But one needn't know *anything* about any other
implementations of SMTP: everything you need is in the SMTP spec (including
that it runs on port 25).

If there were a similar thing here, I'd be happy.  But if there's a similar
thing here, I don't see it.

I=92ll also observe that the working group is also working on a specificati=
on
> that enables an OAuth client to dynamically register itself with the
> Authorization Server (draft-ietf-oauth-dyn-reg) *and that that
> registration does declare information about what profile is being used*,
> as John Bradley pointed out in his response.  That=92s a key piece of the
> whole solution to enable interoperable implementations.****
>
>
It sounds like it is a key piece, and in that case I think that document
needs to come forward along with (or before) the ones that depend on it for
interoperability.  Absent something like that, we can't evaluate whether
it's possible to write interoperable implementations of this spec.

>  We already do have mechanisms for dynamically declaring what profile is
> being used, and we are using them.****
>
>
"Dynamically declaring," in what sense?  Where are those mechanisms
documented?


> I agree with Stephen that we should let this conversation run for a while
> to make sure everyone comes to a common understanding, but ultimately, I
> hope that you=92ll withdraw your DISCUSS, because, in fact, interoperable
> implementations can be written by reading the specs used alone.
>
>
I still don't see that that's true (how did those interoperable
implementations resolve the incompletely specified bits?), but, in any
case, don't obsess over the DISCUSS ballot, because it no longer matters:
Stephen has returned the document to the working group, and when it comes
back to IESG Evaluation again I'm sure Stephen will issue a new ballot and
we'll start the process from a clean slate.

Barry

--047d7beb971e3feeb104d60403c7
Content-Type: text/html; charset=windows-1252
Content-Transfer-Encoding: quoted-printable

I&#39;ll get to John&#39;s message later, after I digest it more. =A0I can =
reply to this one now.<br><br><blockquote class=3D"gmail_quote" style=3D"ma=
rgin:0 0 0 .8ex;border-left:1px #ccc solid;padding-left:1ex"><div lang=3D"E=
N-US" link=3D"blue" vlink=3D"purple">
<div><p style=3D"margin-left:.5in">please explain how you and I can each wr=
ite applications to that?<br></p><p style=3D"margin-left:.5in"><u></u></p>
<p><u></u>=A0<u></u></p>
<p class=3D"MsoNormal"><span style=3D"color:#002060">You can write applicat=
ions to that by having the profile chain end, and with the contents of the =
Audience field being completely specified somewhere in the profile chain be=
ing used.</span></p>
<p class=3D"MsoNormal"><span style=3D"color:#002060"></span></p></div></div=
></blockquote><div><br></div><div>In order for that to work, we have to kno=
w (&quot;we&quot; being both sides of the protocol, and also &quot;we&quot;=
 being different implementors of similar applications) what profile to use.=
</div>
<div>=A0</div><blockquote class=3D"gmail_quote" style=3D"margin:0 0 0 .8ex;=
border-left:1px #ccc solid;padding-left:1ex"><div lang=3D"EN-US" link=3D"bl=
ue" vlink=3D"purple"><div><p style=3D"margin-left:.5in">I am proposing that=
 there must be a way for someone writing an application to know what to use=
 in these fields that will work with your application (or will work with a =
server in the same way as your application
 does, or whatever) *without* having to go to the documentation of your app=
lication to figure it out.<u></u><u></u></p>
<p><u></u>=A0<u></u></p>
<p><span style=3D"color:#002060">I agree with what I think you mean, but po=
ssibly not with how you=92re saying it.=A0 Using the TCP analogy again, in =
fact, to understand the contents of the TCP stream for port 25, one has to =
go to the documentation
 of the application communicating on port 25.=A0 In this case, that documen=
tation is RFC 821 and its successors.</span></p><p><span style=3D"color:#00=
2060"></span></p></div></div></blockquote><div>Yeh, here&#39;s where we&#39=
;re disconnected. =A0One does NOT have to go to the documentation of the ap=
plication at all. =A0One has to go to the specification of SMTP. =A0But one=
 needn&#39;t know *anything* about any other implementations of SMTP: every=
thing you need is in the SMTP spec (including that it runs on port 25).</di=
v>
<div><br></div><div>If there were=A0a similar thing here, I&#39;d be happy.=
 =A0But if there&#39;s a similar thing here, I don&#39;t see it.</div><div>=
<br></div><blockquote class=3D"gmail_quote" style=3D"margin:0 0 0 .8ex;bord=
er-left:1px #ccc solid;padding-left:1ex">
<div lang=3D"EN-US" link=3D"blue" vlink=3D"purple"><div>
<p><span style=3D"color:#002060">I=92ll also observe that the working group=
 is also working on a specification that enables an OAuth client to dynamic=
ally register itself with the Authorization Server (draft-ietf-oauth-dyn-re=
g)
<i>and that that registration does declare information about what profile i=
s being used</i>, as John Bradley pointed out in his response.=A0 That=92s =
a key piece of the whole solution to enable interoperable implementations.<=
u></u><u></u></span></p>
<p></p></div></div></blockquote><div><br></div><div>It sounds like it is a =
key piece, and in that case I think that document needs to come forward alo=
ng with (or before) the ones that depend on it for interoperability. =A0Abs=
ent something like that, we can&#39;t evaluate whether it&#39;s possible to=
 write interoperable implementations of this spec.</div>
<blockquote class=3D"gmail_quote" style=3D"margin:0 0 0 .8ex;border-left:1p=
x #ccc solid;padding-left:1ex"><div lang=3D"EN-US" link=3D"blue" vlink=3D"p=
urple"><div><p><span style=3D"color:#002060">=A0We already do have mechanis=
ms for dynamically declaring what profile is being used, and we are using t=
hem.<u></u><u></u></span></p>
<p></p></div></div></blockquote><div><br></div><div>&quot;Dynamically decla=
ring,&quot; in what sense? =A0Where are those mechanisms documented?</div><=
div>=A0</div><blockquote class=3D"gmail_quote" style=3D"margin:0 0 0 .8ex;b=
order-left:1px #ccc solid;padding-left:1ex">
<div lang=3D"EN-US" link=3D"blue" vlink=3D"purple"><div><p></p>
<p><span style=3D"color:rgb(0,32,96)">I agree with Stephen that we should l=
et this conversation run for a while to make su</span><span style=3D"color:=
rgb(0,32,96)">re everyone comes to a common understanding, but ultimately, =
I hope that you=92ll withdraw your DISCUSS, because, in fact,
 interoperable implementations can be written by reading the specs used alo=
ne.</span></p><p></p></div></div></blockquote><div><br></div><div>I still d=
on&#39;t see that that&#39;s true (how did those interoperable implementati=
ons resolve the incompletely specified bits?<span></span>), but, in any cas=
e, don&#39;t obsess over the DISCUSS ballot, because it no longer matters: =
Stephen has returned the document to the working group, and when it comes b=
ack to IESG Evaluation again I&#39;m sure Stephen will issue a new ballot a=
nd we&#39;ll start the process from a clean slate.</div>
<div><br></div><div>Barry</div><div>=A0</div>

--047d7beb971e3feeb104d60403c7--

From Michael.Jones@microsoft.com  Mon Feb 18 11:02:50 2013
Return-Path: <Michael.Jones@microsoft.com>
X-Original-To: oauth@ietfa.amsl.com
Delivered-To: oauth@ietfa.amsl.com
Received: from localhost (localhost [127.0.0.1]) by ietfa.amsl.com (Postfix) with ESMTP id 834D921F8929 for <oauth@ietfa.amsl.com>; Mon, 18 Feb 2013 11:02:50 -0800 (PST)
X-Virus-Scanned: amavisd-new at amsl.com
X-Spam-Flag: NO
X-Spam-Score: -2.58
X-Spam-Level: 
X-Spam-Status: No, score=-2.58 tagged_above=-999 required=5 tests=[AWL=0.018,  BAYES_00=-2.599, HTML_MESSAGE=0.001]
Received: from mail.ietf.org ([64.170.98.30]) by localhost (ietfa.amsl.com [127.0.0.1]) (amavisd-new, port 10024) with ESMTP id xZhJz0zzXtHy for <oauth@ietfa.amsl.com>; Mon, 18 Feb 2013 11:02:47 -0800 (PST)
Received: from na01-by2-obe.outbound.protection.outlook.com (na01-by2-obe.ptr.protection.outlook.com [207.46.100.31]) by ietfa.amsl.com (Postfix) with ESMTP id 2A4F121F88F0 for <oauth@ietf.org>; Mon, 18 Feb 2013 11:02:47 -0800 (PST)
Received: from BL2FFO11FD014.protection.gbl (10.173.161.204) by BL2FFO11HUB022.protection.gbl (10.173.161.46) with Microsoft SMTP Server (TLS) id 15.0.620.12; Mon, 18 Feb 2013 19:02:40 +0000
Received: from TK5EX14HUBC102.redmond.corp.microsoft.com (131.107.125.37) by BL2FFO11FD014.mail.protection.outlook.com (10.173.160.222) with Microsoft SMTP Server (TLS) id 15.0.620.12 via Frontend Transport; Mon, 18 Feb 2013 19:02:40 +0000
Received: from TK5EX14MBXC284.redmond.corp.microsoft.com ([169.254.1.96]) by TK5EX14HUBC102.redmond.corp.microsoft.com ([157.54.7.154]) with mapi id 14.02.0318.003; Mon, 18 Feb 2013 19:02:12 +0000
From: Mike Jones <Michael.Jones@microsoft.com>
To: Barry Leiba <barryleiba@computer.org>
Thread-Topic: [OAUTH-WG] oauth assertions plan
Thread-Index: AQHODUSFJYuGTyHp/UK+QNplisn2A5h+fdTAgAASPICAAAGIAIAAiDaAgADB2bCAABe6gIAAAWoQ
Date: Mon, 18 Feb 2013 19:02:11 +0000
Message-ID: <4E1F6AAD24975D4BA5B16804296739436747063A@TK5EX14MBXC284.redmond.corp.microsoft.com>
References: <51212E78.1050206@cs.tcd.ie> <4E1F6AAD24975D4BA5B16804296739436746DC1C@TK5EX14MBXC284.redmond.corp.microsoft.com> <51214AC5.3090807@cs.tcd.ie> <4E1F6AAD24975D4BA5B16804296739436746DE40@TK5EX14MBXC284.redmond.corp.microsoft.com> <CALaySJ+YM9_DJ5KB1AnF+D-_1=jMhCdsxrgB3jQaaCLsB7w1Kg@mail.gmail.com> <4E1F6AAD24975D4BA5B16804296739436747042A@TK5EX14MBXC284.redmond.corp.microsoft.com> <CAC4RtVAKUAQosF=tJQLB6FExUriY-WhBv+R_0uX6aP1gegR=QQ@mail.gmail.com>
In-Reply-To: <CAC4RtVAKUAQosF=tJQLB6FExUriY-WhBv+R_0uX6aP1gegR=QQ@mail.gmail.com>
Accept-Language: en-US
Content-Language: en-US
X-MS-Has-Attach: 
X-MS-TNEF-Correlator: 
x-originating-ip: [157.54.51.32]
Content-Type: multipart/alternative; boundary="_000_4E1F6AAD24975D4BA5B16804296739436747063ATK5EX14MBXC284r_"
MIME-Version: 1.0
X-Forefront-Antispam-Report: CIP:131.107.125.37; CTRY:US; IPV:CAL; IPV:NLI; EFV:NLI; SFV:NSPM; SFS:(377454001)(199002)(189002)(51444002)(76482001)(16236675001)(65816001)(63696002)(47976001)(50986001)(77982001)(59766001)(16297215001)(56816002)(20776003)(15202345001)(4396001)(74502001)(47446002)(16406001)(46102001)(44976002)(49866001)(80022001)(47736001)(74662001)(56776001)(54316002)(51856001)(53806001)(31966008)(54356001)(33656001)(512954001)(15395725002)(79102001)(66066001)(5343645001)(5343635001)(55846006)(5343655001); DIR:OUT; SFP:; SCL:1; SRVR:BL2FFO11HUB022; H:TK5EX14HUBC102.redmond.corp.microsoft.com; RD:InfoDomainNonexistent; A:1; MX:1; LANG:en; 
X-OriginatorOrg: microsoft.onmicrosoft.com
X-Forefront-PRVS: 0761DE1EDD
Cc: "oauth-chairs@tools.ietf.org" <oauth-chairs@tools.ietf.org>, "oauth@ietf.org" <oauth@ietf.org>
Subject: Re: [OAUTH-WG] oauth assertions plan
X-BeenThere: oauth@ietf.org
X-Mailman-Version: 2.1.12
Precedence: list
List-Id: OAUTH WG <oauth.ietf.org>
List-Unsubscribe: <https://www.ietf.org/mailman/options/oauth>, <mailto:oauth-request@ietf.org?subject=unsubscribe>
List-Archive: <http://www.ietf.org/mail-archive/web/oauth>
List-Post: <mailto:oauth@ietf.org>
List-Help: <mailto:oauth-request@ietf.org?subject=help>
List-Subscribe: <https://www.ietf.org/mailman/listinfo/oauth>, <mailto:oauth-request@ietf.org?subject=subscribe>
X-List-Received-Date: Mon, 18 Feb 2013 19:02:50 -0000

--_000_4E1F6AAD24975D4BA5B16804296739436747063ATK5EX14MBXC284r_
Content-Type: text/plain; charset="us-ascii"
Content-Transfer-Encoding: quoted-printable

"Dynamically declaring," in what sense?  Where are those mechanisms documen=
ted?

Many of them are documented in draft-ietf-oauth-dyn-reg.

One profile (an outer doll :)) that enables fully interoperable implementat=
ions is documented in draft-hardjono-oauth-umacore.  It uses the "http://do=
cs.kantarainitiative.org/uma/scopes/prot.json" scope value as its "tagged f=
ield" value.  Another related profile that enables fully interoperable impl=
ementations is documented in http://openid.net/specs/openid-connect-message=
s-1_0.html.  It uses the "openid" scope value as its "tagged field" value, =
per http://openid.net/specs/openid-connect-messages-1_0.html#scopes.  I kno=
w that Dick Hardt has another profile that's using the JWT Assertion Profil=
e for a BC Government identity project.  I know of ones used inside of ente=
rprises and at cloud services as well.

                                                            -- Mike

From: barryleiba.mailing.lists@gmail.com [mailto:barryleiba.mailing.lists@g=
mail.com] On Behalf Of Barry Leiba
Sent: Monday, February 18, 2013 10:37 AM
To: Mike Jones
Cc: Barry Leiba; oauth-chairs@tools.ietf.org; oauth@ietf.org
Subject: Re: [OAUTH-WG] oauth assertions plan

I'll get to John's message later, after I digest it more.  I can reply to t=
his one now.

please explain how you and I can each write applications to that?


You can write applications to that by having the profile chain end, and wit=
h the contents of the Audience field being completely specified somewhere i=
n the profile chain being used.

In order for that to work, we have to know ("we" being both sides of the pr=
otocol, and also "we" being different implementors of similar applications)=
 what profile to use.


I am proposing that there must be a way for someone writing an application =
to know what to use in these fields that will work with your application (o=
r will work with a server in the same way as your application does, or what=
ever) *without* having to go to the documentation of your application to fi=
gure it out.



I agree with what I think you mean, but possibly not with how you're saying=
 it.  Using the TCP analogy again, in fact, to understand the contents of t=
he TCP stream for port 25, one has to go to the documentation of the applic=
ation communicating on port 25.  In this case, that documentation is RFC 82=
1 and its successors.
Yeh, here's where we're disconnected.  One does NOT have to go to the docum=
entation of the application at all.  One has to go to the specification of =
SMTP.  But one needn't know *anything* about any other implementations of S=
MTP: everything you need is in the SMTP spec (including that it runs on por=
t 25).

If there were a similar thing here, I'd be happy.  But if there's a similar=
 thing here, I don't see it.


I'll also observe that the working group is also working on a specification=
 that enables an OAuth client to dynamically register itself with the Autho=
rization Server (draft-ietf-oauth-dyn-reg) and that that registration does =
declare information about what profile is being used, as John Bradley point=
ed out in his response.  That's a key piece of the whole solution to enable=
 interoperable implementations.

It sounds like it is a key piece, and in that case I think that document ne=
eds to come forward along with (or before) the ones that depend on it for i=
nteroperability.  Absent something like that, we can't evaluate whether it'=
s possible to write interoperable implementations of this spec.

 We already do have mechanisms for dynamically declaring what profile is be=
ing used, and we are using them.

"Dynamically declaring," in what sense?  Where are those mechanisms documen=
ted?


I agree with Stephen that we should let this conversation run for a while t=
o make sure everyone comes to a common understanding, but ultimately, I hop=
e that you'll withdraw your DISCUSS, because, in fact, interoperable implem=
entations can be written by reading the specs used alone.

I still don't see that that's true (how did those interoperable implementat=
ions resolve the incompletely specified bits?), but, in any case, don't obs=
ess over the DISCUSS ballot, because it no longer matters: Stephen has retu=
rned the document to the working group, and when it comes back to IESG Eval=
uation again I'm sure Stephen will issue a new ballot and we'll start the p=
rocess from a clean slate.

Barry


--_000_4E1F6AAD24975D4BA5B16804296739436747063ATK5EX14MBXC284r_
Content-Type: text/html; charset="us-ascii"
Content-Transfer-Encoding: quoted-printable

<html xmlns:v=3D"urn:schemas-microsoft-com:vml" xmlns:o=3D"urn:schemas-micr=
osoft-com:office:office" xmlns:w=3D"urn:schemas-microsoft-com:office:word" =
xmlns:m=3D"http://schemas.microsoft.com/office/2004/12/omml" xmlns=3D"http:=
//www.w3.org/TR/REC-html40">
<head>
<meta http-equiv=3D"Content-Type" content=3D"text/html; charset=3Dus-ascii"=
>
<meta name=3D"Generator" content=3D"Microsoft Word 14 (filtered medium)">
<style><!--
/* Font Definitions */
@font-face
	{font-family:Wingdings;
	panose-1:5 0 0 0 0 0 0 0 0 0;}
@font-face
	{font-family:Wingdings;
	panose-1:5 0 0 0 0 0 0 0 0 0;}
@font-face
	{font-family:Calibri;
	panose-1:2 15 5 2 2 2 4 3 2 4;}
@font-face
	{font-family:Tahoma;
	panose-1:2 11 6 4 3 5 4 4 2 4;}
/* Style Definitions */
p.MsoNormal, li.MsoNormal, div.MsoNormal
	{margin:0in;
	margin-bottom:.0001pt;
	font-size:12.0pt;
	font-family:"Times New Roman","serif";}
a:link, span.MsoHyperlink
	{mso-style-priority:99;
	color:blue;
	text-decoration:underline;}
a:visited, span.MsoHyperlinkFollowed
	{mso-style-priority:99;
	color:purple;
	text-decoration:underline;}
p
	{mso-style-priority:99;
	mso-margin-top-alt:auto;
	margin-right:0in;
	mso-margin-bottom-alt:auto;
	margin-left:0in;
	font-size:12.0pt;
	font-family:"Times New Roman","serif";}
span.EmailStyle18
	{mso-style-type:personal-reply;
	font-family:"Calibri","sans-serif";
	color:#1F497D;}
.MsoChpDefault
	{mso-style-type:export-only;}
@page WordSection1
	{size:8.5in 11.0in;
	margin:1.0in 1.0in 1.0in 1.0in;}
div.WordSection1
	{page:WordSection1;}
--></style><!--[if gte mso 9]><xml>
<o:shapedefaults v:ext=3D"edit" spidmax=3D"1026" />
</xml><![endif]--><!--[if gte mso 9]><xml>
<o:shapelayout v:ext=3D"edit">
<o:idmap v:ext=3D"edit" data=3D"1" />
</o:shapelayout></xml><![endif]-->
</head>
<body lang=3D"EN-US" link=3D"blue" vlink=3D"purple">
<div class=3D"WordSection1">
<p class=3D"MsoNormal" style=3D"margin-left:.5in">&quot;Dynamically declari=
ng,&quot; in what sense? &nbsp;Where are those mechanisms documented?<o:p><=
/o:p></p>
<p class=3D"MsoNormal"><span style=3D"font-size:11.0pt;font-family:&quot;Ca=
libri&quot;,&quot;sans-serif&quot;;color:#1F497D"><o:p>&nbsp;</o:p></span><=
/p>
<p class=3D"MsoNormal"><span style=3D"font-size:11.0pt;font-family:&quot;Ca=
libri&quot;,&quot;sans-serif&quot;;color:#1F497D">Many of them are document=
ed in draft-ietf-oauth-dyn-reg.<o:p></o:p></span></p>
<p class=3D"MsoNormal"><span style=3D"font-size:11.0pt;font-family:&quot;Ca=
libri&quot;,&quot;sans-serif&quot;;color:#1F497D"><o:p>&nbsp;</o:p></span><=
/p>
<p class=3D"MsoNormal"><span style=3D"font-size:11.0pt;font-family:&quot;Ca=
libri&quot;,&quot;sans-serif&quot;;color:#1F497D">One profile (an outer dol=
l
</span><span style=3D"font-size:11.0pt;font-family:Wingdings;color:#1F497D"=
>J</span><span style=3D"font-size:11.0pt;font-family:&quot;Calibri&quot;,&q=
uot;sans-serif&quot;;color:#1F497D">) that enables fully interoperable impl=
ementations is documented in draft-hardjono-oauth-umacore.&nbsp;
 It uses the &#8220;</span><span style=3D"font-size:10.0pt;font-family:&quo=
t;Courier New&quot;">http://docs.kantarainitiative.org/uma/scopes/prot.json=
</span><span style=3D"font-size:11.0pt;font-family:&quot;Calibri&quot;,&quo=
t;sans-serif&quot;;color:#1F497D">&#8221; scope value as its &#8220;tagged =
field&#8221; value.&nbsp;
 Another related profile that enables fully interoperable implementations i=
s documented in
<a href=3D"http://openid.net/specs/openid-connect-messages-1_0.html">http:/=
/openid.net/specs/openid-connect-messages-1_0.html</a>.&nbsp; It uses the &=
#8220;</span><span style=3D"font-size:10.0pt;font-family:&quot;Courier New&=
quot;">openid</span><span style=3D"font-size:11.0pt;font-family:&quot;Calib=
ri&quot;,&quot;sans-serif&quot;;color:#1F497D">&#8221;
 scope value as its &#8220;tagged field&#8221; value, per <a href=3D"http:/=
/openid.net/specs/openid-connect-messages-1_0.html#scopes">
http://openid.net/specs/openid-connect-messages-1_0.html#scopes</a>.&nbsp; =
I know that Dick Hardt has another profile that&#8217;s using the JWT Asser=
tion Profile for a BC Government identity project.&nbsp; I know of ones use=
d inside of enterprises and at cloud services as
 well.<o:p></o:p></span></p>
<p class=3D"MsoNormal"><span style=3D"font-size:11.0pt;font-family:&quot;Ca=
libri&quot;,&quot;sans-serif&quot;;color:#1F497D"><o:p>&nbsp;</o:p></span><=
/p>
<p class=3D"MsoNormal"><span style=3D"font-size:11.0pt;font-family:&quot;Ca=
libri&quot;,&quot;sans-serif&quot;;color:#1F497D">&nbsp;&nbsp;&nbsp;&nbsp;&=
nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbs=
p;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&=
nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbs=
p;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&=
nbsp;&nbsp;&nbsp;&nbsp;&nbsp; -- Mike<o:p></o:p></span></p>
<p class=3D"MsoNormal"><span style=3D"font-size:11.0pt;font-family:&quot;Ca=
libri&quot;,&quot;sans-serif&quot;;color:#1F497D"><o:p>&nbsp;</o:p></span><=
/p>
<p class=3D"MsoNormal"><b><span style=3D"font-size:10.0pt;font-family:&quot=
;Tahoma&quot;,&quot;sans-serif&quot;">From:</span></b><span style=3D"font-s=
ize:10.0pt;font-family:&quot;Tahoma&quot;,&quot;sans-serif&quot;"> barrylei=
ba.mailing.lists@gmail.com [mailto:barryleiba.mailing.lists@gmail.com]
<b>On Behalf Of </b>Barry Leiba<br>
<b>Sent:</b> Monday, February 18, 2013 10:37 AM<br>
<b>To:</b> Mike Jones<br>
<b>Cc:</b> Barry Leiba; oauth-chairs@tools.ietf.org; oauth@ietf.org<br>
<b>Subject:</b> Re: [OAUTH-WG] oauth assertions plan<o:p></o:p></span></p>
<p class=3D"MsoNormal"><o:p>&nbsp;</o:p></p>
<p class=3D"MsoNormal" style=3D"margin-bottom:12.0pt">I'll get to John's me=
ssage later, after I digest it more. &nbsp;I can reply to this one now.<o:p=
></o:p></p>
<div>
<div>
<p style=3D"margin-left:.5in">please explain how you and I can each write a=
pplications to that?<o:p></o:p></p>
<p>&nbsp;<o:p></o:p></p>
<p class=3D"MsoNormal" style=3D"mso-margin-top-alt:auto;mso-margin-bottom-a=
lt:auto"><span style=3D"color:#002060">You can write applications to that b=
y having the profile chain end, and with the contents of the Audience field=
 being completely specified somewhere
 in the profile chain being used.</span><o:p></o:p></p>
</div>
</div>
<div>
<p class=3D"MsoNormal"><o:p>&nbsp;</o:p></p>
</div>
<div>
<p class=3D"MsoNormal">In order for that to work, we have to know (&quot;we=
&quot; being both sides of the protocol, and also &quot;we&quot; being diff=
erent implementors of similar applications) what profile to use.<o:p></o:p>=
</p>
</div>
<div>
<p class=3D"MsoNormal">&nbsp;<o:p></o:p></p>
</div>
<blockquote style=3D"border:none;border-left:solid #CCCCCC 1.0pt;padding:0i=
n 0in 0in 6.0pt;margin-left:4.8pt;margin-right:0in">
<div>
<div>
<p style=3D"margin-left:.5in">I am proposing that there must be a way for s=
omeone writing an application to know what to use in these fields that will=
 work with your application (or will work with a server in the same way as =
your application does, or whatever)
 *without* having to go to the documentation of your application to figure =
it out.<o:p></o:p></p>
<p>&nbsp;<o:p></o:p></p>
<p><span style=3D"color:#002060">I agree with what I think you mean, but po=
ssibly not with how you&#8217;re saying it.&nbsp; Using the TCP analogy aga=
in, in fact, to understand the contents of the TCP stream for port 25, one =
has to go to the documentation of the application
 communicating on port 25.&nbsp; In this case, that documentation is RFC 82=
1 and its successors.</span><o:p></o:p></p>
</div>
</div>
</blockquote>
<div>
<p class=3D"MsoNormal">Yeh, here's where we're disconnected. &nbsp;One does=
 NOT have to go to the documentation of the application at all. &nbsp;One h=
as to go to the specification of SMTP. &nbsp;But one needn't know *anything=
* about any other implementations of SMTP: everything
 you need is in the SMTP spec (including that it runs on port 25).<o:p></o:=
p></p>
</div>
<div>
<p class=3D"MsoNormal"><o:p>&nbsp;</o:p></p>
</div>
<div>
<p class=3D"MsoNormal">If there were&nbsp;a similar thing here, I'd be happ=
y. &nbsp;But if there's a similar thing here, I don't see it.<o:p></o:p></p=
>
</div>
<div>
<p class=3D"MsoNormal"><o:p>&nbsp;</o:p></p>
</div>
<blockquote style=3D"border:none;border-left:solid #CCCCCC 1.0pt;padding:0i=
n 0in 0in 6.0pt;margin-left:4.8pt;margin-right:0in">
<div>
<div>
<p><span style=3D"color:#002060">I&#8217;ll also observe that the working g=
roup is also working on a specification that enables an OAuth client to dyn=
amically register itself with the Authorization Server (draft-ietf-oauth-dy=
n-reg)
<i>and that that registration does declare information about what profile i=
s being used</i>, as John Bradley pointed out in his response.&nbsp; That&#=
8217;s a key piece of the whole solution to enable interoperable implementa=
tions.</span><o:p></o:p></p>
</div>
</div>
</blockquote>
<div>
<p class=3D"MsoNormal"><o:p>&nbsp;</o:p></p>
</div>
<div>
<p class=3D"MsoNormal">It sounds like it is a key piece, and in that case I=
 think that document needs to come forward along with (or before) the ones =
that depend on it for interoperability. &nbsp;Absent something like that, w=
e can't evaluate whether it's possible
 to write interoperable implementations of this spec.<o:p></o:p></p>
</div>
<blockquote style=3D"border:none;border-left:solid #CCCCCC 1.0pt;padding:0i=
n 0in 0in 6.0pt;margin-left:4.8pt;margin-right:0in">
<div>
<div>
<p><span style=3D"color:#002060">&nbsp;We already do have mechanisms for dy=
namically declaring what profile is being used, and we are using them.</spa=
n><o:p></o:p></p>
</div>
</div>
</blockquote>
<div>
<p class=3D"MsoNormal"><o:p>&nbsp;</o:p></p>
</div>
<div>
<p class=3D"MsoNormal">&quot;Dynamically declaring,&quot; in what sense? &n=
bsp;Where are those mechanisms documented?<o:p></o:p></p>
</div>
<div>
<p class=3D"MsoNormal">&nbsp;<o:p></o:p></p>
</div>
<blockquote style=3D"border:none;border-left:solid #CCCCCC 1.0pt;padding:0i=
n 0in 0in 6.0pt;margin-left:4.8pt;margin-right:0in">
<div>
<div>
<p><span style=3D"color:#002060">I agree with Stephen that we should let th=
is conversation run for a while to make sure everyone comes to a common und=
erstanding, but ultimately, I hope that you&#8217;ll withdraw your DISCUSS,=
 because, in fact, interoperable implementations
 can be written by reading the specs used alone.</span><o:p></o:p></p>
</div>
</div>
</blockquote>
<div>
<p class=3D"MsoNormal"><o:p>&nbsp;</o:p></p>
</div>
<div>
<p class=3D"MsoNormal">I still don't see that that's true (how did those in=
teroperable implementations resolve the incompletely specified bits?), but,=
 in any case, don't obsess over the DISCUSS ballot, because it no longer ma=
tters: Stephen has returned the document
 to the working group, and when it comes back to IESG Evaluation again I'm =
sure Stephen will issue a new ballot and we'll start the process from a cle=
an slate.<o:p></o:p></p>
</div>
<div>
<p class=3D"MsoNormal"><o:p>&nbsp;</o:p></p>
</div>
<div>
<p class=3D"MsoNormal">Barry<o:p></o:p></p>
</div>
<div>
<p class=3D"MsoNormal">&nbsp;<o:p></o:p></p>
</div>
</div>
</body>
</html>

--_000_4E1F6AAD24975D4BA5B16804296739436747063ATK5EX14MBXC284r_--

From barryleiba@gmail.com  Mon Feb 18 11:03:06 2013
Return-Path: <barryleiba@gmail.com>
X-Original-To: oauth@ietfa.amsl.com
Delivered-To: oauth@ietfa.amsl.com
Received: from localhost (localhost [127.0.0.1]) by ietfa.amsl.com (Postfix) with ESMTP id F04A621F8A56 for <oauth@ietfa.amsl.com>; Mon, 18 Feb 2013 11:03:05 -0800 (PST)
X-Virus-Scanned: amavisd-new at amsl.com
X-Spam-Flag: NO
X-Spam-Score: -102.932
X-Spam-Level: 
X-Spam-Status: No, score=-102.932 tagged_above=-999 required=5 tests=[AWL=0.044, BAYES_00=-2.599, FM_FORGED_GMAIL=0.622, HTML_MESSAGE=0.001, RCVD_IN_DNSWL_LOW=-1, USER_IN_WHITELIST=-100]
Received: from mail.ietf.org ([64.170.98.30]) by localhost (ietfa.amsl.com [127.0.0.1]) (amavisd-new, port 10024) with ESMTP id ZX2yQZawYzdf for <oauth@ietfa.amsl.com>; Mon, 18 Feb 2013 11:03:05 -0800 (PST)
Received: from mail-lb0-f178.google.com (mail-lb0-f178.google.com [209.85.217.178]) by ietfa.amsl.com (Postfix) with ESMTP id D64DB21F8A85 for <oauth@ietf.org>; Mon, 18 Feb 2013 11:03:04 -0800 (PST)
Received: by mail-lb0-f178.google.com with SMTP id n1so4424807lba.23 for <oauth@ietf.org>; Mon, 18 Feb 2013 11:03:03 -0800 (PST)
DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=gmail.com; s=20120113; h=mime-version:x-received:sender:in-reply-to:references:date :x-google-sender-auth:message-id:subject:from:to:cc:content-type; bh=amo06yK6s53tsVe2f8Wv3ILhe77vFGBr8mqiUFiUPvI=; b=pbpgA9d5wm12X7iyJcRGsBuMf5j1NNiDmszxtN+zuPF4w59tMtKbnxMa/9hyXJB4RK cebsnPrqLkWXb4z6Q2MufyWxRDbrjH8kqmh3+5iWbT7VP20uaJvbTKGvI6DSM0YELITD x29ISy259jTZAqpz5L0mAcxpsAEDAxTnY+fYkcntFUBYPpLkIdNYcA15Qv3IxakERSw6 HWqiPqH2d5sl2KQv5ChFFXeuGgYxW2X9mqXq6CzYw0r3I7QOg8qls6Ua30GdgZWFWm4b xIIecbfyc8eYO9m+4YTDAgEOjimge38waSLWFRocNP13p9k52J+NHRoE+QyBBXnZ7cYW dfhQ==
MIME-Version: 1.0
X-Received: by 10.112.100.103 with SMTP id ex7mr6050476lbb.80.1361214183835; Mon, 18 Feb 2013 11:03:03 -0800 (PST)
Sender: barryleiba@gmail.com
Received: by 10.112.76.98 with HTTP; Mon, 18 Feb 2013 11:03:03 -0800 (PST)
In-Reply-To: <37B4C89F-2864-4317-BF87-F562241C176D@ve7jtb.com>
References: <51212E78.1050206@cs.tcd.ie> <4E1F6AAD24975D4BA5B16804296739436746DC1C@TK5EX14MBXC284.redmond.corp.microsoft.com> <51214AC5.3090807@cs.tcd.ie> <4E1F6AAD24975D4BA5B16804296739436746DE40@TK5EX14MBXC284.redmond.corp.microsoft.com> <CALaySJ+YM9_DJ5KB1AnF+D-_1=jMhCdsxrgB3jQaaCLsB7w1Kg@mail.gmail.com> <37B4C89F-2864-4317-BF87-F562241C176D@ve7jtb.com>
Date: Mon, 18 Feb 2013 14:03:03 -0500
X-Google-Sender-Auth: a1eVR0NSfLo9YgiRavJqatoK7Q0
Message-ID: <CALaySJ+bcFnn1H8Fx2R71TQMJak84AirJ9+a-KXX9h-FgZ8BtQ@mail.gmail.com>
From: Barry Leiba <barryleiba@computer.org>
To: John Bradley <ve7jtb@ve7jtb.com>
Content-Type: multipart/alternative; boundary=f46d04016b05e408eb04d6045fcd
Cc: "oauth-chairs@tools.ietf.org" <oauth-chairs@tools.ietf.org>, "oauth@ietf.org" <oauth@ietf.org>
Subject: Re: [OAUTH-WG] oauth assertions plan
X-BeenThere: oauth@ietf.org
X-Mailman-Version: 2.1.12
Precedence: list
List-Id: OAUTH WG <oauth.ietf.org>
List-Unsubscribe: <https://www.ietf.org/mailman/options/oauth>, <mailto:oauth-request@ietf.org?subject=unsubscribe>
List-Archive: <http://www.ietf.org/mail-archive/web/oauth>
List-Post: <mailto:oauth@ietf.org>
List-Help: <mailto:oauth-request@ietf.org?subject=help>
List-Subscribe: <https://www.ietf.org/mailman/listinfo/oauth>, <mailto:oauth-request@ietf.org?subject=subscribe>
X-List-Received-Date: Mon, 18 Feb 2013 19:03:06 -0000

--f46d04016b05e408eb04d6045fcd
Content-Type: text/plain; charset=ISO-8859-1

>
> It seems like the scope of your criticism has more to do with RFC 6749 &
> RFC 6750 overall, than the assertions drafts themselves.
>

No, and I'm sorry if it came across that way.  I mentioned the token-type
issue only by way of background.  As it happens, I do think it was a
mistake to publish the oauth framework spec without a mechanism for
discovery/negotiation/communication of token types, but I'm not holding
that against this document at all.


> In OpenID Connect we implemented a discovery and registration layer for
> clients to discover what the Authorization server supports.
>

Great!  I think that each use of the protocol shouldn't have to roll this
on its own, but it's good that OIDC did it.


> To acceve real interoperability these things need to be profiled or you
> need a negotiation mechanism.
>

We do agree on that; cool.


> Are you saying that Assertions needs a low level mechanism to negotiate
> capabilities?
> Many will argue that specs at a higher level like like Dynamic Client
> Registration https://datatracker.ietf.org/doc/draft-ietf-oauth-dyn-reg/are better places to address these capability negotiations because as you
> point out there is more to be negotiated than just assertions.
>

I would be happy to have it done that way, but then I think that needs to
happen first, and this needs to refer to that (normatively) as the (or a)
mechanism that helps this interoperate.


> It has been stated by one of the WG chairs that some of us are anti
> interoperability, so some of us may be a touch sensitive, around this, as
> it is not the case.
>

Yeh, we very much need to keep that kind of rhetoric and questioning of
motives out of the discussion.  You won't hear it from me, certainly.
 Quite the opposite: I'm quite confident that we all share the goal of
developing good specs from which interoperable implementations can be
built.  It's not a question of anti-anything, but of disagreement about how
to accomplish that.

Barry

--f46d04016b05e408eb04d6045fcd
Content-Type: text/html; charset=ISO-8859-1
Content-Transfer-Encoding: quoted-printable

<blockquote class=3D"gmail_quote" style=3D"margin:0 0 0 .8ex;border-left:1p=
x #ccc solid;padding-left:1ex"><div style=3D"word-wrap:break-word"><div>It =
seems like the scope of your criticism has more to do with RFC 6749 &amp; R=
FC 6750 overall, than the assertions drafts themselves.</div>
</div></blockquote><div><br></div><div>No, and I&#39;m sorry if it came acr=
oss that way. =A0I mentioned the token-type issue only by way of background=
. =A0As it happens, I do think it was a mistake to publish the oauth framew=
ork spec without a mechanism for discovery/negotiation/communication of tok=
en types, but I&#39;m not holding that against this document at all.</div>
<div>=A0</div><blockquote class=3D"gmail_quote" style=3D"margin:0 0 0 .8ex;=
border-left:1px #ccc solid;padding-left:1ex"><div style=3D"word-wrap:break-=
word"><div>In OpenID Connect we implemented a discovery and registration la=
yer for clients to discover what the Authorization server supports.</div>
</div></blockquote><div><br></div><div>Great! =A0I think that each use of t=
he protocol shouldn&#39;t have to roll this on its own, but it&#39;s good t=
hat=A0OIDC did it.</div><div>=A0</div><blockquote class=3D"gmail_quote" sty=
le=3D"margin:0 0 0 .8ex;border-left:1px #ccc solid;padding-left:1ex">
<div style=3D"word-wrap:break-word"><div>To acceve real interoperability th=
ese things need to be profiled or you need a negotiation mechanism.<br></di=
v></div></blockquote><div><br></div><div>We do agree on that; cool.</div>
<div>=A0</div><blockquote class=3D"gmail_quote" style=3D"margin:0 0 0 .8ex;=
border-left:1px #ccc solid;padding-left:1ex"><div style=3D"word-wrap:break-=
word"><div>Are you saying that Assertions needs a low level mechanism to ne=
gotiate capabilities? =A0=A0</div>
<div>Many will argue that specs at a higher level like like Dynamic Client =
Registration=A0<a href=3D"https://datatracker.ietf.org/doc/draft-ietf-oauth=
-dyn-reg/" target=3D"_blank">https://datatracker.ietf.org/doc/draft-ietf-oa=
uth-dyn-reg/</a> are better places to address these capability negotiations=
 because as you point out there is more to be negotiated than just assertio=
ns.</div>
</div></blockquote><div><br></div><div>I would be happy to have it done tha=
t way, but then I think that needs to happen first, and this needs to refer=
 to that (normatively) as the (or a) mechanism that helps this interoperate=
.</div>
<div>=A0</div><blockquote class=3D"gmail_quote" style=3D"margin:0 0 0 .8ex;=
border-left:1px #ccc solid;padding-left:1ex"><div style=3D"word-wrap:break-=
word"><div></div><div>It has been stated by one of the WG chairs that some =
of us are anti interoperability, so some of us may be a touch sensitive, ar=
ound this, as it is not the case.</div>
</div></blockquote><div><br></div><div>Yeh, we very much need to keep that =
kind of rhetoric and questioning of motives out of the discussion. =A0You w=
on&#39;t hear it from me, certainly. =A0Quite the opposite: I&#39;m quite c=
onfident that we all share the goal of developing good specs from which int=
eroperable implementations can be built. =A0It&#39;s not a question of anti=
-anything, but of disagreement about how to accomplish that.</div>
<div><br></div><div>Barry<span></span></div><div><br></div><blockquote clas=
s=3D"gmail_quote" style=3D"margin:0 0 0 .8ex;border-left:1px #ccc solid;pad=
ding-left:1ex"><div style=3D"word-wrap:break-word"><div></div></div></block=
quote>

--f46d04016b05e408eb04d6045fcd--

From barryleiba@gmail.com  Mon Feb 18 11:09:53 2013
Return-Path: <barryleiba@gmail.com>
X-Original-To: oauth@ietfa.amsl.com
Delivered-To: oauth@ietfa.amsl.com
Received: from localhost (localhost [127.0.0.1]) by ietfa.amsl.com (Postfix) with ESMTP id 27EF721F8AED for <oauth@ietfa.amsl.com>; Mon, 18 Feb 2013 11:09:53 -0800 (PST)
X-Virus-Scanned: amavisd-new at amsl.com
X-Spam-Flag: NO
X-Spam-Score: -102.933
X-Spam-Level: 
X-Spam-Status: No, score=-102.933 tagged_above=-999 required=5 tests=[AWL=0.043, BAYES_00=-2.599, FM_FORGED_GMAIL=0.622, HTML_MESSAGE=0.001, RCVD_IN_DNSWL_LOW=-1, USER_IN_WHITELIST=-100]
Received: from mail.ietf.org ([64.170.98.30]) by localhost (ietfa.amsl.com [127.0.0.1]) (amavisd-new, port 10024) with ESMTP id 7ELKdhg2L4JW for <oauth@ietfa.amsl.com>; Mon, 18 Feb 2013 11:09:52 -0800 (PST)
Received: from mail-lb0-f180.google.com (mail-lb0-f180.google.com [209.85.217.180]) by ietfa.amsl.com (Postfix) with ESMTP id BC37821F8B07 for <oauth@ietf.org>; Mon, 18 Feb 2013 11:09:51 -0800 (PST)
Received: by mail-lb0-f180.google.com with SMTP id q12so4459341lbc.39 for <oauth@ietf.org>; Mon, 18 Feb 2013 11:09:50 -0800 (PST)
DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=gmail.com; s=20120113; h=mime-version:x-received:sender:in-reply-to:references:date :x-google-sender-auth:message-id:subject:from:to:cc:content-type; bh=n24yvjEZaDiag62uo78VdOmIdwTPqLnQtpAS2YsmNrc=; b=iw9QKjAoyvGC07n8BszH5hSRgydm15VhfclJNws7ifxwt4wJ5kq+uqkCIwfIOEVQeA JD6iq0JiJZmnYBCcHs3D0jv5/yCsTUAnupSgtUDc1FjjFmaHNKcnnWS25RVuzJkb2vGV on1UuzAkozT8wzJNxD53Gk7KYEPyfZNi5F8NhiXIbN5CjMh7vCb+wJfnR8I4seJFWPYG 6N7+zogDnjI5Z9zaRrjJ/KG6VtXuZg2kw/b8hsxT3dR6JAgqJ0n2HX4Prbu5FTjAfqc2 mXBiqUFZagGYdfdZwbex/4s/lQFb6h1KURAxhA1el7lWZqlyvK9dzETthVc74KtLSeND Bn+A==
MIME-Version: 1.0
X-Received: by 10.152.111.67 with SMTP id ig3mr4851811lab.41.1361214590617; Mon, 18 Feb 2013 11:09:50 -0800 (PST)
Sender: barryleiba@gmail.com
Received: by 10.112.76.98 with HTTP; Mon, 18 Feb 2013 11:09:50 -0800 (PST)
In-Reply-To: <4E1F6AAD24975D4BA5B16804296739436747063A@TK5EX14MBXC284.redmond.corp.microsoft.com>
References: <51212E78.1050206@cs.tcd.ie> <4E1F6AAD24975D4BA5B16804296739436746DC1C@TK5EX14MBXC284.redmond.corp.microsoft.com> <51214AC5.3090807@cs.tcd.ie> <4E1F6AAD24975D4BA5B16804296739436746DE40@TK5EX14MBXC284.redmond.corp.microsoft.com> <CALaySJ+YM9_DJ5KB1AnF+D-_1=jMhCdsxrgB3jQaaCLsB7w1Kg@mail.gmail.com> <4E1F6AAD24975D4BA5B16804296739436747042A@TK5EX14MBXC284.redmond.corp.microsoft.com> <CAC4RtVAKUAQosF=tJQLB6FExUriY-WhBv+R_0uX6aP1gegR=QQ@mail.gmail.com> <4E1F6AAD24975D4BA5B16804296739436747063A@TK5EX14MBXC284.redmond.corp.microsoft.com>
Date: Mon, 18 Feb 2013 14:09:50 -0500
X-Google-Sender-Auth: 2UMhM8WNv8s0xcAqxOmT-Ph40HQ
Message-ID: <CALaySJKFkHtPiZ-u43vFShqgQ4__rC8E7hAXyjZ4jTaZ72tEag@mail.gmail.com>
From: Barry Leiba <barryleiba@computer.org>
To: Mike Jones <Michael.Jones@microsoft.com>
Content-Type: multipart/alternative; boundary=f46d04088f172306c904d6047856
Cc: "oauth-chairs@tools.ietf.org" <oauth-chairs@tools.ietf.org>, "oauth@ietf.org" <oauth@ietf.org>
Subject: Re: [OAUTH-WG] oauth assertions plan
X-BeenThere: oauth@ietf.org
X-Mailman-Version: 2.1.12
Precedence: list
List-Id: OAUTH WG <oauth.ietf.org>
List-Unsubscribe: <https://www.ietf.org/mailman/options/oauth>, <mailto:oauth-request@ietf.org?subject=unsubscribe>
List-Archive: <http://www.ietf.org/mail-archive/web/oauth>
List-Post: <mailto:oauth@ietf.org>
List-Help: <mailto:oauth-request@ietf.org?subject=help>
List-Subscribe: <https://www.ietf.org/mailman/listinfo/oauth>, <mailto:oauth-request@ietf.org?subject=subscribe>
X-List-Received-Date: Mon, 18 Feb 2013 19:09:53 -0000

--f46d04088f172306c904d6047856
Content-Type: text/plain; charset=ISO-8859-1

>
> "Dynamically declaring," in what sense?  Where are those mechanisms
> documented?****
>
> ** **
>
> Many of them are documented in draft-ietf-oauth-dyn-reg.****
>
> ** **
>
> One profile (an outer doll J) that enables fully interoperable
> implementations is documented in draft-hardjono-oauth-umacore.
>
> ...

> Another related profile that enables fully interoperable implementations
> is documented in http://openid.net/specs/openid-connect-messages-1_0.html.
>
>
It's possible, then, that this isn't an issue of major changes needed in
this document, but one of document ordering.  It's possible (I'm still not
sure, but maybe) that if some of these other documents came out before or
at the same time as this one, they would all fit together and all would be
clear.

So maybe that's one way through this.

In the end, all I'm saying is that if I hear that everyone is using oauth
to peel bananas, and I want put my banana-peeling application on the market
by adding oauth to it, I need to be able to read a set of specs that say
how to do that, and that's all.  And if I do that, my application will work
when it's slotted into any oauth-based banana-peeling system.

Barry

--f46d04088f172306c904d6047856
Content-Type: text/html; charset=ISO-8859-1
Content-Transfer-Encoding: quoted-printable

<blockquote class=3D"gmail_quote" style=3D"margin:0 0 0 .8ex;border-left:1p=
x #ccc solid;padding-left:1ex"><div lang=3D"EN-US" link=3D"blue" vlink=3D"p=
urple"><div><p class=3D"MsoNormal" style=3D"margin-left:.5in">&quot;Dynamic=
ally declaring,&quot; in what sense? =A0Where are those mechanisms document=
ed?<u></u><u></u></p>

<p class=3D"MsoNormal"><span style=3D"font-size:11.0pt;font-family:&quot;Ca=
libri&quot;,&quot;sans-serif&quot;;color:#1f497d"><u></u>=A0<u></u></span><=
/p>
<p class=3D"MsoNormal"><span style=3D"font-size:11.0pt;font-family:&quot;Ca=
libri&quot;,&quot;sans-serif&quot;;color:#1f497d">Many of them are document=
ed in draft-ietf-oauth-dyn-reg.<u></u><u></u></span></p>
<p class=3D"MsoNormal"><span style=3D"font-size:11.0pt;font-family:&quot;Ca=
libri&quot;,&quot;sans-serif&quot;;color:#1f497d"><u></u>=A0<u></u></span><=
/p>
<p class=3D"MsoNormal"><span style=3D"font-size:11.0pt;font-family:&quot;Ca=
libri&quot;,&quot;sans-serif&quot;;color:#1f497d">One profile (an outer dol=
l
</span><span style=3D"font-size:11.0pt;font-family:Wingdings;color:#1f497d"=
>J</span><span style=3D"font-size:11.0pt;font-family:&quot;Calibri&quot;,&q=
uot;sans-serif&quot;;color:#1f497d">) that enables fully interoperable impl=
ementations is documented in draft-hardjono-oauth-umacore.=A0</span></p>
<p class=3D"MsoNormal"><span style=3D"font-size:11.0pt;font-family:&quot;Ca=
libri&quot;,&quot;sans-serif&quot;;color:#1f497d">
</span></p></div></div></blockquote><div>...</div><blockquote class=3D"gmai=
l_quote" style=3D"margin:0 0 0 .8ex;border-left:1px #ccc solid;padding-left=
:1ex"><div lang=3D"EN-US" link=3D"blue" vlink=3D"purple"><div><p class=3D"M=
soNormal">
<span style=3D"font-size:11.0pt;font-family:&quot;Calibri&quot;,&quot;sans-=
serif&quot;;color:#1f497d">Another related profile that enables fully inter=
operable implementations is documented in
<a href=3D"http://openid.net/specs/openid-connect-messages-1_0.html" target=
=3D"_blank">http://openid.net/specs/openid-connect-messages-1_0.html</a>.</=
span></p><p class=3D"MsoNormal"></p></div></div></blockquote><div><br></div=
>
<div>It&#39;s possible, then, that this isn&#39;t an issue of major changes=
 needed in this document, but one of document ordering. =A0It&#39;s possibl=
e (I&#39;m still not sure, but maybe) that if some of these other documents=
 came out before or at the same time as this one, they would all fit togeth=
er and all would be clear.</div>
<div><br></div><div>So maybe that&#39;s one way through this.</div><div><br=
></div><div>In the end, all I&#39;m saying is that if I hear that everyone =
is using oauth to peel bananas, and I want put my banana-peeling applicatio=
n on the market by adding oauth to it, I need to be able to read a set of s=
pecs that say how to do that, and that&#39;s all. =A0And if I do that, my a=
pplication will work when it&#39;s slotted into any oauth-based banana-peel=
ing system.<span></span></div>
<div><br></div><div>Barry=A0</div>

--f46d04088f172306c904d6047856--

From bcampbell@pingidentity.com  Mon Feb 18 11:34:47 2013
Return-Path: <bcampbell@pingidentity.com>
X-Original-To: oauth@ietfa.amsl.com
Delivered-To: oauth@ietfa.amsl.com
Received: from localhost (localhost [127.0.0.1]) by ietfa.amsl.com (Postfix) with ESMTP id 7031421F8BBB for <oauth@ietfa.amsl.com>; Mon, 18 Feb 2013 11:34:47 -0800 (PST)
X-Virus-Scanned: amavisd-new at amsl.com
X-Spam-Flag: NO
X-Spam-Score: -5.976
X-Spam-Level: 
X-Spam-Status: No, score=-5.976 tagged_above=-999 required=5 tests=[BAYES_00=-2.599, FM_FORGED_GMAIL=0.622, HTML_MESSAGE=0.001, RCVD_IN_DNSWL_MED=-4]
Received: from mail.ietf.org ([64.170.98.30]) by localhost (ietfa.amsl.com [127.0.0.1]) (amavisd-new, port 10024) with ESMTP id V3tehCKWSWYr for <oauth@ietfa.amsl.com>; Mon, 18 Feb 2013 11:34:46 -0800 (PST)
Received: from na3sys009aog104.obsmtp.com (na3sys009aog104.obsmtp.com [74.125.149.73]) by ietfa.amsl.com (Postfix) with ESMTP id DE4D921F8B26 for <oauth@ietf.org>; Mon, 18 Feb 2013 11:34:45 -0800 (PST)
Received: from mail-we0-f199.google.com ([74.125.82.199]) (using TLSv1) by na3sys009aob104.postini.com ([74.125.148.12]) with SMTP ID DSNKUSKCVPYDtk8PVHddIwRW9P5+cPHY4DI/@postini.com; Mon, 18 Feb 2013 11:34:46 PST
Received: by mail-we0-f199.google.com with SMTP id t11so7107231wey.6 for <oauth@ietf.org>; Mon, 18 Feb 2013 11:34:43 -0800 (PST)
X-Google-DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=google.com; s=20120113; h=x-received:x-received:mime-version:in-reply-to:references:from:date :message-id:subject:to:cc:content-type:x-gm-message-state; bh=A6Vc2krnQoSB0DKUG3m0bcDLGGf5oRVHHBX257IBIl0=; b=d3iwh9c7VQxYzqTTVa/8ex7AxjyzbAlEmqv8InZIywcq6Mgp/9wFG/NhHMPMPJ1oDo v7JtX19W4WcH5IWOGtVACKisB3a9rznZL59m0/W2ZCRP5pIPCkulLtNlUOcmob1rpPxq VxnlYpGXq1SQ0W0jdIZG2zfM63FuLwK13OXuDKIQJ8N2Do+UytKgAcvSuesZtCD7Wisb IZDDEilbRGLLZwUwxckwP/BUQPWtaCRAlm17TNSiAFiSF+VpdOcFE6OWc7nLV43B6nss Mi9sk+aoQWtIyFXNMTSPUNt5PhkIbrYH4KlU01bNU6YnXuye73IyyyAkvtCq5Qy48g6V vTbg==
X-Received: by 10.14.183.198 with SMTP id q46mr48416221eem.1.1361216083281; Mon, 18 Feb 2013 11:34:43 -0800 (PST)
X-Received: by 10.14.183.198 with SMTP id q46mr48416190eem.1.1361216083122; Mon, 18 Feb 2013 11:34:43 -0800 (PST)
MIME-Version: 1.0
Received: by 10.14.173.9 with HTTP; Mon, 18 Feb 2013 11:34:13 -0800 (PST)
In-Reply-To: <CALaySJKFkHtPiZ-u43vFShqgQ4__rC8E7hAXyjZ4jTaZ72tEag@mail.gmail.com>
References: <51212E78.1050206@cs.tcd.ie> <4E1F6AAD24975D4BA5B16804296739436746DC1C@TK5EX14MBXC284.redmond.corp.microsoft.com> <51214AC5.3090807@cs.tcd.ie> <4E1F6AAD24975D4BA5B16804296739436746DE40@TK5EX14MBXC284.redmond.corp.microsoft.com> <CALaySJ+YM9_DJ5KB1AnF+D-_1=jMhCdsxrgB3jQaaCLsB7w1Kg@mail.gmail.com> <4E1F6AAD24975D4BA5B16804296739436747042A@TK5EX14MBXC284.redmond.corp.microsoft.com> <CAC4RtVAKUAQosF=tJQLB6FExUriY-WhBv+R_0uX6aP1gegR=QQ@mail.gmail.com> <4E1F6AAD24975D4BA5B16804296739436747063A@TK5EX14MBXC284.redmond.corp.microsoft.com> <CALaySJKFkHtPiZ-u43vFShqgQ4__rC8E7hAXyjZ4jTaZ72tEag@mail.gmail.com>
From: Brian Campbell <bcampbell@pingidentity.com>
Date: Mon, 18 Feb 2013 12:34:13 -0700
Message-ID: <CA+k3eCSUXE4fj3Xa8+0mtd_5NHmQsJ6ScSQxxk0-=k9UR1g+yA@mail.gmail.com>
To: Barry Leiba <barryleiba@computer.org>
Content-Type: multipart/alternative; boundary=047d7b34414218d91a04d604d1f5
X-Gm-Message-State: ALoCoQlsWZXYLq38CxhYN2LytnfusmX6us5kP1p2+nGH3+lMORBwt4WD1vkPDaro1f1eWBsDv4gbOEoKC3f13jROLPbHrUshc0uVMZqePxYNsK9w6QVvi6nk4wrykKPnlHxvbAGYyvro
Cc: "oauth-chairs@tools.ietf.org" <oauth-chairs@tools.ietf.org>, "oauth@ietf.org" <oauth@ietf.org>
Subject: Re: [OAUTH-WG] oauth assertions plan
X-BeenThere: oauth@ietf.org
X-Mailman-Version: 2.1.12
Precedence: list
List-Id: OAUTH WG <oauth.ietf.org>
List-Unsubscribe: <https://www.ietf.org/mailman/options/oauth>, <mailto:oauth-request@ietf.org?subject=unsubscribe>
List-Archive: <http://www.ietf.org/mail-archive/web/oauth>
List-Post: <mailto:oauth@ietf.org>
List-Help: <mailto:oauth-request@ietf.org?subject=help>
List-Subscribe: <https://www.ietf.org/mailman/listinfo/oauth>, <mailto:oauth-request@ietf.org?subject=subscribe>
X-List-Received-Date: Mon, 18 Feb 2013 19:34:47 -0000

--047d7b34414218d91a04d604d1f5
Content-Type: text/plain; charset=ISO-8859-1

I do believe some face to face discussion amongst a smallerish group might
be valuable on this. I'll be in Orlando and plan on contributing to that as
much as I can. Thanks for organizing the lunch discussion Stephen.

I do feel that this conversation has strayed a bit and I'd like to clear up
one important misconception. The three assertion documents do not define an
access token type at all. The questions and concerns around bearer tokens
and MAC tokens and other token types may well be very legitimate but are
completely orthogonal to the scope and intent of the assertion documents.
The assertions drafts define how to trade an assertion for a an access
token at the token endpoint via the extension grant type mechanism provided
by RFC 6749. The assertions drafts also define an alternative means of
client authentication but its scope is very limited and only applies to a
client authenticating to the AS's token endpoint. I believe the documents
are pretty clear on what they seek to accomplish (and what they do not) but
this is definitely not the first time this has come up and that likely
points to the need for some more clarification in docs themselves.

It seems to me that much of the recent discussion here is largely unrelated
to that actual intent and scope of the documents in question. It may well
be valuable discussion but, even if we can find some common ground on it,
these assertion drafts probably aren't the right place to address these
issues.


On Mon, Feb 18, 2013 at 12:09 PM, Barry Leiba <barryleiba@computer.org>wrote:

> "Dynamically declaring," in what sense?  Where are those mechanisms
>> documented?****
>>
>> ** **
>>
>> Many of them are documented in draft-ietf-oauth-dyn-reg.****
>>
>> ** **
>>
>> One profile (an outer doll J) that enables fully interoperable
>> implementations is documented in draft-hardjono-oauth-umacore.
>>
>> ...
>
>>  Another related profile that enables fully interoperable
>> implementations is documented in
>> http://openid.net/specs/openid-connect-messages-1_0.html.
>>
>>
> It's possible, then, that this isn't an issue of major changes needed in
> this document, but one of document ordering.  It's possible (I'm still not
> sure, but maybe) that if some of these other documents came out before or
> at the same time as this one, they would all fit together and all would be
> clear.
>
> So maybe that's one way through this.
>
> In the end, all I'm saying is that if I hear that everyone is using oauth
> to peel bananas, and I want put my banana-peeling application on the market
> by adding oauth to it, I need to be able to read a set of specs that say
> how to do that, and that's all.  And if I do that, my application will work
> when it's slotted into any oauth-based banana-peeling system.
>
> Barry
>
> _______________________________________________
> OAuth mailing list
> OAuth@ietf.org
> https://www.ietf.org/mailman/listinfo/oauth
>
>

--047d7b34414218d91a04d604d1f5
Content-Type: text/html; charset=ISO-8859-1
Content-Transfer-Encoding: quoted-printable

<div dir=3D"ltr"><div><div>I do believe some face to face discussion amongs=
t a smallerish group
 might be valuable on this. I&#39;ll be in Orlando and plan on contributing=
=20
to that as much as I can. Thanks for organizing the lunch discussion=20
Stephen.<br><br></div>I do feel that this conversation has strayed a bit
 and I&#39;d like to clear up one important misconception. The three=20
assertion documents do not define an access token type at all. The=20
questions and concerns around bearer tokens and MAC tokens and other=20
token types may well be very legitimate but are completely orthogonal to
 the scope and intent of the assertion documents. The assertions drafts=20
define how to trade an assertion for a an access token at the token=20
endpoint via the extension grant type mechanism provided by RFC 6749.=20
The assertions drafts also define an alternative means of client=20
authentication but its scope is very limited and only applies to a=20
client authenticating to the AS&#39;s token endpoint. I believe the documen=
ts are pretty clear on what they seek to accomplish (and what they do not) =
but this is definitely not the first time this has come up and that likely =
points to the need for some more clarification in docs themselves.<br>

<br></div>It seems to me that much of the recent discussion here is largely=
 unrelated to that actual intent and scope of the documents in question. It=
 may well be valuable discussion but, even if we can find some common groun=
d on it, these assertion drafts probably aren&#39;t the right place to addr=
ess these issues.<br>

</div><div class=3D"gmail_extra"><br><br><div class=3D"gmail_quote">On Mon,=
 Feb 18, 2013 at 12:09 PM, Barry Leiba <span dir=3D"ltr">&lt;<a href=3D"mai=
lto:barryleiba@computer.org" target=3D"_blank">barryleiba@computer.org</a>&=
gt;</span> wrote:<br>

<blockquote class=3D"gmail_quote" style=3D"margin:0 0 0 .8ex;border-left:1p=
x #ccc solid;padding-left:1ex"><div class=3D"im"><blockquote class=3D"gmail=
_quote" style=3D"margin:0 0 0 .8ex;border-left:1px #ccc solid;padding-left:=
1ex">
<div link=3D"blue" vlink=3D"purple" lang=3D"EN-US">
<div><p class=3D"MsoNormal" style=3D"margin-left:.5in">&quot;Dynamically de=
claring,&quot; in what sense? =A0Where are those mechanisms documented?<u><=
/u><u></u></p>

<p class=3D"MsoNormal"><span style=3D"font-size:11.0pt;font-family:&quot;Ca=
libri&quot;,&quot;sans-serif&quot;;color:#1f497d"><u></u>=A0<u></u></span><=
/p>
<p class=3D"MsoNormal"><span style=3D"font-size:11.0pt;font-family:&quot;Ca=
libri&quot;,&quot;sans-serif&quot;;color:#1f497d">Many of them are document=
ed in draft-ietf-oauth-dyn-reg.<u></u><u></u></span></p>
<p class=3D"MsoNormal"><span style=3D"font-size:11.0pt;font-family:&quot;Ca=
libri&quot;,&quot;sans-serif&quot;;color:#1f497d"><u></u>=A0<u></u></span><=
/p>
<p class=3D"MsoNormal"><span style=3D"font-size:11.0pt;font-family:&quot;Ca=
libri&quot;,&quot;sans-serif&quot;;color:#1f497d">One profile (an outer dol=
l
</span><span style=3D"font-size:11.0pt;font-family:Wingdings;color:#1f497d"=
>J</span><span style=3D"font-size:11.0pt;font-family:&quot;Calibri&quot;,&q=
uot;sans-serif&quot;;color:#1f497d">) that enables fully interoperable impl=
ementations is documented in draft-hardjono-oauth-umacore.=A0</span></p>


<p class=3D"MsoNormal"><span style=3D"font-size:11.0pt;font-family:&quot;Ca=
libri&quot;,&quot;sans-serif&quot;;color:#1f497d">
</span></p></div></div></blockquote></div><div>...</div><div class=3D"im"><=
blockquote class=3D"gmail_quote" style=3D"margin:0 0 0 .8ex;border-left:1px=
 #ccc solid;padding-left:1ex"><div link=3D"blue" vlink=3D"purple" lang=3D"E=
N-US"><div>

<p class=3D"MsoNormal">
<span style=3D"font-size:11.0pt;font-family:&quot;Calibri&quot;,&quot;sans-=
serif&quot;;color:#1f497d">Another related profile that enables fully inter=
operable implementations is documented in
<a href=3D"http://openid.net/specs/openid-connect-messages-1_0.html" target=
=3D"_blank">http://openid.net/specs/openid-connect-messages-1_0.html</a>.</=
span></p><p class=3D"MsoNormal"></p></div></div></blockquote><div><br></div=
>


</div><div>It&#39;s possible, then, that this isn&#39;t an issue of major c=
hanges needed in this document, but one of document ordering. =A0It&#39;s p=
ossible (I&#39;m still not sure, but maybe) that if some of these other doc=
uments came out before or at the same time as this one, they would all fit =
together and all would be clear.</div>


<div><br></div><div>So maybe that&#39;s one way through this.</div><div><br=
></div><div>In the end, all I&#39;m saying is that if I hear that everyone =
is using oauth to peel bananas, and I want put my banana-peeling applicatio=
n on the market by adding oauth to it, I need to be able to read a set of s=
pecs that say how to do that, and that&#39;s all. =A0And if I do that, my a=
pplication will work when it&#39;s slotted into any oauth-based banana-peel=
ing system.<span class=3D"HOEnZb"><font color=3D"#888888"><span></span></fo=
nt></span></div>

<span class=3D"HOEnZb"><font color=3D"#888888">
<div><br></div><div>Barry=A0</div>
</font></span><br>_______________________________________________<br>
OAuth mailing list<br>
<a href=3D"mailto:OAuth@ietf.org">OAuth@ietf.org</a><br>
<a href=3D"https://www.ietf.org/mailman/listinfo/oauth" target=3D"_blank">h=
ttps://www.ietf.org/mailman/listinfo/oauth</a><br>
<br></blockquote></div><br></div>

--047d7b34414218d91a04d604d1f5--

From torsten@lodderstedt.net  Mon Feb 18 12:05:00 2013
Return-Path: <torsten@lodderstedt.net>
X-Original-To: oauth@ietfa.amsl.com
Delivered-To: oauth@ietfa.amsl.com
Received: from localhost (localhost [127.0.0.1]) by ietfa.amsl.com (Postfix) with ESMTP id 1658221F8835 for <oauth@ietfa.amsl.com>; Mon, 18 Feb 2013 12:05:00 -0800 (PST)
X-Virus-Scanned: amavisd-new at amsl.com
X-Spam-Flag: NO
X-Spam-Score: -1.242
X-Spam-Level: 
X-Spam-Status: No, score=-1.242 tagged_above=-999 required=5 tests=[AWL=1.008,  BAYES_00=-2.599, HELO_EQ_DE=0.35]
Received: from mail.ietf.org ([64.170.98.30]) by localhost (ietfa.amsl.com [127.0.0.1]) (amavisd-new, port 10024) with ESMTP id MT8adBd0gPuK for <oauth@ietfa.amsl.com>; Mon, 18 Feb 2013 12:04:59 -0800 (PST)
Received: from smtprelay06.ispgateway.de (smtprelay06.ispgateway.de [80.67.31.104]) by ietfa.amsl.com (Postfix) with ESMTP id 2591B21F87B6 for <oauth@ietf.org>; Mon, 18 Feb 2013 12:04:58 -0800 (PST)
Received: from [80.187.107.137] (helo=[100.93.203.64]) by smtprelay06.ispgateway.de with esmtpsa (TLSv1:RC4-MD5:128) (Exim 4.68) (envelope-from <torsten@lodderstedt.net>) id 1U7WxM-0003lF-HD; Mon, 18 Feb 2013 21:04:56 +0100
User-Agent: K-9 Mail for Android
In-Reply-To: <A654FBBD-D968-49A4-871D-7681629D1708@ve7jtb.com>
References: <20130215215423.23019.50224.idtracker@ietfa.amsl.com> <B33BFB58CCC8BE4998958016839DE27E06894B4F@IMCMBX01.MITRE.ORG> <5120B6EE.60801@lodderstedt.net> <51223B5A.5050008@mitre.org> <A654FBBD-D968-49A4-871D-7681629D1708@ve7jtb.com>
MIME-Version: 1.0
Content-Type: text/plain; charset=UTF-8
Content-Transfer-Encoding: 8bit
From: Torsten Lodderstedt <torsten@lodderstedt.net>
Date: Mon, 18 Feb 2013 21:04:53 +0100
To: John Bradley <ve7jtb@ve7jtb.com>,Justin Richer <jricher@mitre.org>
Message-ID: <711590de-79f4-4054-a379-f74e78d144b2@email.android.com>
X-Df-Sender: dG9yc3RlbkBsb2RkZXJzdGVkdC1vbmxpbmUuZGU=
Cc: "<oauth@ietf.org>" <oauth@ietf.org>
Subject: Re: [OAUTH-WG] I-D Action: draft-ietf-oauth-dyn-reg-06.txt
X-BeenThere: oauth@ietf.org
X-Mailman-Version: 2.1.12
Precedence: list
List-Id: OAUTH WG <oauth.ietf.org>
List-Unsubscribe: <https://www.ietf.org/mailman/options/oauth>, <mailto:oauth-request@ietf.org?subject=unsubscribe>
List-Archive: <http://www.ietf.org/mail-archive/web/oauth>
List-Post: <mailto:oauth@ietf.org>
List-Help: <mailto:oauth-request@ietf.org?subject=help>
List-Subscribe: <https://www.ietf.org/mailman/listinfo/oauth>, <mailto:oauth-request@ietf.org?subject=subscribe>
X-List-Received-Date: Mon, 18 Feb 2013 20:05:00 -0000

>or non-existent. Note that for security reasons, to inhibit brute force
>attacks, endpoints MUST NOT return 404 Not Found error codes.
>
>From a security point of view differentiating the two is bad as it
>helps an attacker find valid notes to brute force.  Ideally you want an
>attacker to spend time truing to break into resources that don't exist
>as well as ones that do.

Good point!


From ve7jtb@ve7jtb.com  Mon Feb 18 12:55:38 2013
Return-Path: <ve7jtb@ve7jtb.com>
X-Original-To: oauth@ietfa.amsl.com
Delivered-To: oauth@ietfa.amsl.com
Received: from localhost (localhost [127.0.0.1]) by ietfa.amsl.com (Postfix) with ESMTP id 0CCDA21F886C for <oauth@ietfa.amsl.com>; Mon, 18 Feb 2013 12:55:38 -0800 (PST)
X-Virus-Scanned: amavisd-new at amsl.com
X-Spam-Flag: NO
X-Spam-Score: -4.412
X-Spam-Level: 
X-Spam-Status: No, score=-4.412 tagged_above=-999 required=5 tests=[AWL=1.186,  BAYES_00=-2.599, GB_I_LETTER=-2, HTML_MESSAGE=0.001, RCVD_IN_DNSWL_LOW=-1]
Received: from mail.ietf.org ([64.170.98.30]) by localhost (ietfa.amsl.com [127.0.0.1]) (amavisd-new, port 10024) with ESMTP id NZZMJQwQGPXT for <oauth@ietfa.amsl.com>; Mon, 18 Feb 2013 12:55:36 -0800 (PST)
Received: from mail-qe0-f41.google.com (mail-qe0-f41.google.com [209.85.128.41]) by ietfa.amsl.com (Postfix) with ESMTP id 90C4221F8812 for <oauth@ietf.org>; Mon, 18 Feb 2013 12:55:36 -0800 (PST)
Received: by mail-qe0-f41.google.com with SMTP id 7so2727867qeb.28 for <oauth@ietf.org>; Mon, 18 Feb 2013 12:55:32 -0800 (PST)
X-Google-DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=google.com; s=20120113; h=x-received:content-type:mime-version:subject:from:in-reply-to:date :cc:message-id:references:to:x-mailer:x-gm-message-state; bh=uemAQlhzsRvhBHZDGP9M7ELfyQJ4t7yrlNe5+LhTxng=; b=jSyMfyKfijaVYfhXiKX3o/1yAWWyg2NfXlrG80y+sUWIpIYNAeo8zyH4YpRhhIHZtI hbQAFhnY2J2BtaaPFvYwiTlQ/uWz54YRkqrhO960KR7muTzyKNBfQpxUQ5R6OfAIyMDE lrUUVUhyk1SZ4gzKFqFHN/GHTkQKSsKfNYglqHRY7QNvDvVB56jAZpGvEs+PZtz+iNEI MtApdK7+BMsK/FJUL27QA0ejObPLxn+/VXik4cxC0Rdmckt1FYXtH0pZPkND9839sKni lEB/2OkR7VCEXIWpOr1Wt8O6GKA+x6BVAxllKVSLEaX+P5CxiLnVXmljjO+I2MbBsjcF jqgg==
X-Received: by 10.224.96.4 with SMTP id f4mr6119250qan.79.1361220932289; Mon, 18 Feb 2013 12:55:32 -0800 (PST)
Received: from [192.168.1.213] (190-20-56-120.baf.movistar.cl. [190.20.56.120]) by mx.google.com with ESMTPS id s6sm6557103qaz.13.2013.02.18.12.55.28 (version=TLSv1 cipher=ECDHE-RSA-RC4-SHA bits=128/128); Mon, 18 Feb 2013 12:55:30 -0800 (PST)
Content-Type: multipart/signed; boundary="Apple-Mail=_87A58D0C-AD37-4D06-9F57-8423414E3B61"; protocol="application/pkcs7-signature"; micalg=sha1
Mime-Version: 1.0 (Mac OS X Mail 6.2 \(1499\))
From: John Bradley <ve7jtb@ve7jtb.com>
In-Reply-To: <CALaySJ+bcFnn1H8Fx2R71TQMJak84AirJ9+a-KXX9h-FgZ8BtQ@mail.gmail.com>
Date: Mon, 18 Feb 2013 17:54:40 -0300
Message-Id: <87A4BE12-AC72-4E35-A95F-E6F161CF170B@ve7jtb.com>
References: <51212E78.1050206@cs.tcd.ie> <4E1F6AAD24975D4BA5B16804296739436746DC1C@TK5EX14MBXC284.redmond.corp.microsoft.com> <51214AC5.3090807@cs.tcd.ie> <4E1F6AAD24975D4BA5B16804296739436746DE40@TK5EX14MBXC284.redmond.corp.microsoft.com> <CALaySJ+YM9_DJ5KB1AnF+D-_1=jMhCdsxrgB3jQaaCLsB7w1Kg@mail.gmail.com> <37B4C89F-2864-4317-BF87-F562241C176D@ve7jtb.com> <CALaySJ+bcFnn1H8Fx2R71TQMJak84AirJ9+a-KXX9h-FgZ8BtQ@mail.gmail.com>
To: Barry Leiba <barryleiba@computer.org>
X-Mailer: Apple Mail (2.1499)
X-Gm-Message-State: ALoCoQm7l5ywQ/lU+KLp9HNq1p2Vy72nyDR5kxX8xj+qF9L4ZJnY/s515FBikj2FhheqGCRChTzJ
Cc: "oauth-chairs@tools.ietf.org" <oauth-chairs@tools.ietf.org>, "oauth@ietf.org" <oauth@ietf.org>
Subject: Re: [OAUTH-WG] oauth assertions plan
X-BeenThere: oauth@ietf.org
X-Mailman-Version: 2.1.12
Precedence: list
List-Id: OAUTH WG <oauth.ietf.org>
List-Unsubscribe: <https://www.ietf.org/mailman/options/oauth>, <mailto:oauth-request@ietf.org?subject=unsubscribe>
List-Archive: <http://www.ietf.org/mail-archive/web/oauth>
List-Post: <mailto:oauth@ietf.org>
List-Help: <mailto:oauth-request@ietf.org?subject=help>
List-Subscribe: <https://www.ietf.org/mailman/listinfo/oauth>, <mailto:oauth-request@ietf.org?subject=subscribe>
X-List-Received-Date: Mon, 18 Feb 2013 20:55:38 -0000

--Apple-Mail=_87A58D0C-AD37-4D06-9F57-8423414E3B61
Content-Type: multipart/alternative;
	boundary="Apple-Mail=_99BBEE36-0B72-4353-80DD-73DCBC9418E3"


--Apple-Mail=_99BBEE36-0B72-4353-80DD-73DCBC9418E3
Content-Transfer-Encoding: quoted-printable
Content-Type: text/plain;
	charset=iso-8859-1

Thanks Barry,

We had to partially roll our own registration spec because there was no =
common one at the time.  We did however partially base ours on the UMA =
one and now we have sever groups working on =
https://datatracker.ietf.org/doc/draft-ietf-oauth-dyn-reg/ based on =
implementation experience to produce a common way to do it.

I don't think this is the first spec to develop that way.

It is a interesting discussion to have on how much negotiation should =
happen at each level.

In some ways this contrasts the approach taken by GSSAPI vs SAML where =
in GSSAPI things are negotiated a a low lever and in SAML they are =
generally preconfigured in some out of band way.  In part it may be the =
difference between something that is session oriented vs OAuth/SAML SSO =
that are using REST like bindings.

Now in SAML as part of the spec there is saml-meta-data that is =
supported in some (not enough) implementations because it is not MTI =
(sone of us would like to change that).

Part of the driving forces between the approaches is that when things =
are federated there needs to be some sort of trust model and that is =
hard to anticipate in the lower levels. =20

I don't think it has to be completely one way or the other, but there =
will be resistance to duplicating things in lower elves that are likely =
to be duplicated anyway as part of the higher level trust model.

In Connect we have the problem that the protocol needs to support simple =
social networks all the way to three letter agencies.
Those have very different trust models and even preferred algorithms.

We have struggled with the Mandatory to Deploy features for =
interoperability,  Mandatory to Implement is not useful if it is not =
also mandatory to deploy.   So in the case of token endpoint =
authentication by HTTP basic it is reasonable to say a OAuth library =
needs to support http basic, it is not reasonable to say that a deployer =
that needs SAML assertions signed with EC keys cross certified with the =
federal bridge has to deploy it.=20

That is where we get into the area Stephen Farrell has been raising =
about MTI not being required to deploy.

That is fine if we are trying to specify library functionality, however =
it may not help real interoperability for applications.

We likely need to have both.  I can see saying that MTI for a library =
calling itself compliant with the specs needs to implement a minimum =
number of algorithms and token types.   That is probably an easy =
agreement to come to.

Agreeing on what features can or should be negotiated at the lower level =
vs pushed down from the configuration of the application using them is =
the harder part.

I look forward to the discussion.

John B.


On 2013-02-18, at 4:03 PM, Barry Leiba <barryleiba@computer.org> wrote:

> It seems like the scope of your criticism has more to do with RFC 6749 =
& RFC 6750 overall, than the assertions drafts themselves.
>=20
> No, and I'm sorry if it came across that way.  I mentioned the =
token-type issue only by way of background.  As it happens, I do think =
it was a mistake to publish the oauth framework spec without a mechanism =
for discovery/negotiation/communication of token types, but I'm not =
holding that against this document at all.
> =20
> In OpenID Connect we implemented a discovery and registration layer =
for clients to discover what the Authorization server supports.
>=20
> Great!  I think that each use of the protocol shouldn't have to roll =
this on its own, but it's good that OIDC did it.
> =20
> To acceve real interoperability these things need to be profiled or =
you need a negotiation mechanism.
>=20
> We do agree on that; cool.
> =20
> Are you saying that Assertions needs a low level mechanism to =
negotiate capabilities?  =20
> Many will argue that specs at a higher level like like Dynamic Client =
Registration https://datatracker.ietf.org/doc/draft-ietf-oauth-dyn-reg/ =
are better places to address these capability negotiations because as =
you point out there is more to be negotiated than just assertions.
>=20
> I would be happy to have it done that way, but then I think that needs =
to happen first, and this needs to refer to that (normatively) as the =
(or a) mechanism that helps this interoperate.
> =20
> It has been stated by one of the WG chairs that some of us are anti =
interoperability, so some of us may be a touch sensitive, around this, =
as it is not the case.
>=20
> Yeh, we very much need to keep that kind of rhetoric and questioning =
of motives out of the discussion.  You won't hear it from me, certainly. =
 Quite the opposite: I'm quite confident that we all share the goal of =
developing good specs from which interoperable implementations can be =
built.  It's not a question of anti-anything, but of disagreement about =
how to accomplish that.
>=20
> Barry
>=20


--Apple-Mail=_99BBEE36-0B72-4353-80DD-73DCBC9418E3
Content-Transfer-Encoding: quoted-printable
Content-Type: text/html;
	charset=iso-8859-1

<html><head><meta http-equiv=3D"Content-Type" content=3D"text/html =
charset=3Diso-8859-1"></head><body style=3D"word-wrap: break-word; =
-webkit-nbsp-mode: space; -webkit-line-break: after-white-space; =
">Thanks Barry,<div><br></div><div>We had to partially roll our own =
registration spec because there was no common one at the time. &nbsp;We =
did however partially base ours on the UMA one and now we have sever =
groups working on&nbsp;<a =
href=3D"https://datatracker.ietf.org/doc/draft-ietf-oauth-dyn-reg/" =
target=3D"_blank">https://datatracker.ietf.org/doc/draft-ietf-oauth-dyn-re=
g/</a>&nbsp;based on implementation experience to produce a common way =
to do it.</div><div><br></div><div>I don't think this is the first spec =
to develop that way.</div><div><br></div><div>It is a interesting =
discussion to have on how much negotiation should happen at each =
level.</div><div><br></div><div>In some ways this contrasts the approach =
taken by GSSAPI vs SAML where in GSSAPI things are negotiated a a low =
lever and in SAML they are generally preconfigured in some out of band =
way. &nbsp;In part it may be the difference between something that is =
session oriented vs OAuth/SAML SSO that are using REST like =
bindings.</div><div><br></div><div>Now in SAML as part of the spec there =
is saml-meta-data that is supported in some (not enough) implementations =
because it is not MTI (sone of us would like to change =
that).</div><div><br></div><div>Part of the driving forces between the =
approaches is that when things are federated there needs to be some sort =
of trust model and that is hard to anticipate in the lower levels. =
&nbsp;</div><div><br></div><div>I don't think it has to be completely =
one way or the other, but there will be resistance to duplicating things =
in lower elves that are likely to be duplicated anyway as part of the =
higher level trust model.</div><div><br></div><div>In Connect we have =
the problem that the protocol needs to support simple social networks =
all the way to three letter agencies.</div><div>Those have very =
different trust models and even preferred =
algorithms.</div><div><br></div><div>We have struggled with the =
Mandatory to Deploy features for interoperability, &nbsp;Mandatory to =
Implement is not useful if it is not also mandatory to deploy. &nbsp; So =
in the case of token endpoint authentication by HTTP basic it is =
reasonable to say a OAuth library needs to support http basic, it is not =
reasonable to say that a deployer that needs SAML assertions signed with =
EC keys cross certified with the federal bridge has to deploy =
it.&nbsp;</div><div><br></div><div>That is where we get into the area =
Stephen Farrell has been raising about MTI not being required to =
deploy.</div><div><br></div><div>That is fine if we are trying to =
specify library functionality, however it may not help real =
interoperability for applications.</div><div><br></div><div>We likely =
need to have both. &nbsp;I can see saying that MTI for a library calling =
itself compliant with the specs needs to implement a minimum number of =
algorithms and token types. &nbsp; That is probably an easy agreement to =
come to.</div><div><br></div><div>Agreeing on what features can or =
should be negotiated at the lower level vs pushed down from the =
configuration of the application using them is the harder =
part.</div><div><br></div><div>I look forward to the =
discussion.</div><div><br></div><div>John =
B.</div><div><br></div><div><br><div><div>On 2013-02-18, at 4:03 PM, =
Barry Leiba &lt;<a =
href=3D"mailto:barryleiba@computer.org">barryleiba@computer.org</a>&gt; =
wrote:</div><br class=3D"Apple-interchange-newline"><blockquote =
type=3D"cite"><blockquote class=3D"gmail_quote" style=3D"margin:0 0 0 =
.8ex;border-left:1px #ccc solid;padding-left:1ex"><div =
style=3D"word-wrap:break-word"><div>It seems like the scope of your =
criticism has more to do with RFC 6749 &amp; RFC 6750 overall, than the =
assertions drafts themselves.</div>
</div></blockquote><div><br></div><div>No, and I'm sorry if it came =
across that way. &nbsp;I mentioned the token-type issue only by way of =
background. &nbsp;As it happens, I do think it was a mistake to publish =
the oauth framework spec without a mechanism for =
discovery/negotiation/communication of token types, but I'm not holding =
that against this document at all.</div>
<div>&nbsp;</div><blockquote class=3D"gmail_quote" style=3D"margin:0 0 0 =
.8ex;border-left:1px #ccc solid;padding-left:1ex"><div =
style=3D"word-wrap:break-word"><div>In OpenID Connect we implemented a =
discovery and registration layer for clients to discover what the =
Authorization server supports.</div>
</div></blockquote><div><br></div><div>Great! &nbsp;I think that each =
use of the protocol shouldn't have to roll this on its own, but it's =
good that&nbsp;OIDC did it.</div><div>&nbsp;</div><blockquote =
class=3D"gmail_quote" style=3D"margin:0 0 0 .8ex;border-left:1px #ccc =
solid;padding-left:1ex">
<div style=3D"word-wrap:break-word">To acceve real interoperability =
these things need to be profiled or you need a negotiation =
mechanism.<br></div></blockquote><div><br></div><div>We do agree on =
that; cool.</div>
<div>&nbsp;</div><blockquote class=3D"gmail_quote" style=3D"margin: 0px =
0px 0px 0.8ex; border-left-width: 1px; border-left-color: rgb(204, 204, =
204); border-left-style: solid; padding-left: 1ex; position: static; =
z-index: auto; "><div style=3D"word-wrap:break-word"><div>Are you saying =
that Assertions needs a low level mechanism to negotiate capabilities? =
&nbsp;&nbsp;</div>
<div>Many will argue that specs at a higher level like like Dynamic =
Client Registration&nbsp;<a =
href=3D"https://datatracker.ietf.org/doc/draft-ietf-oauth-dyn-reg/" =
target=3D"_blank">https://datatracker.ietf.org/doc/draft-ietf-oauth-dyn-re=
g/</a> are better places to address these capability negotiations =
because as you point out there is more to be negotiated than just =
assertions.</div>
</div></blockquote><div><br></div><div>I would be happy to have it done =
that way, but then I think that needs to happen first, and this needs to =
refer to that (normatively) as the (or a) mechanism that helps this =
interoperate.</div>
<div>&nbsp;</div><blockquote class=3D"gmail_quote" style=3D"margin:0 0 0 =
.8ex;border-left:1px #ccc solid;padding-left:1ex"><div =
style=3D"word-wrap:break-word"><div></div><div>It has been stated by one =
of the WG chairs that some of us are anti interoperability, so some of =
us may be a touch sensitive, around this, as it is not the case.</div>
</div></blockquote><div><br></div><div>Yeh, we very much need to keep =
that kind of rhetoric and questioning of motives out of the discussion. =
&nbsp;You won't hear it from me, certainly. &nbsp;Quite the opposite: =
I'm quite confident that we all share the goal of developing good specs =
from which interoperable implementations can be built. &nbsp;It's not a =
question of anti-anything, but of disagreement about how to accomplish =
that.</div>
<div><br></div><div>Barry<span></span></div><div><br></div><blockquote =
class=3D"gmail_quote" style=3D"margin:0 0 0 .8ex;border-left:1px #ccc =
solid;padding-left:1ex"><div =
style=3D"word-wrap:break-word"><div></div></div></blockquote>
</blockquote></div><br></div></body></html>=

--Apple-Mail=_99BBEE36-0B72-4353-80DD-73DCBC9418E3--

--Apple-Mail=_87A58D0C-AD37-4D06-9F57-8423414E3B61
Content-Disposition: attachment;
	filename=smime.p7s
Content-Type: application/pkcs7-signature;
	name=smime.p7s
Content-Transfer-Encoding: base64
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--Apple-Mail=_87A58D0C-AD37-4D06-9F57-8423414E3B61--

From Adam.Lewis@motorolasolutions.com  Mon Feb 18 14:51:40 2013
Return-Path: <Adam.Lewis@motorolasolutions.com>
X-Original-To: oauth@ietfa.amsl.com
Delivered-To: oauth@ietfa.amsl.com
Received: from localhost (localhost [127.0.0.1]) by ietfa.amsl.com (Postfix) with ESMTP id BBEA121E804C for <oauth@ietfa.amsl.com>; Mon, 18 Feb 2013 14:51:36 -0800 (PST)
X-Virus-Scanned: amavisd-new at amsl.com
X-Spam-Flag: NO
X-Spam-Score: -2.766
X-Spam-Level: 
X-Spam-Status: No, score=-2.766 tagged_above=-999 required=5 tests=[AWL=0.700,  BAYES_00=-2.599, HTML_MESSAGE=0.001, RCVD_IN_DNSWL_MED=-4, UNRESOLVED_TEMPLATE=3.132]
Received: from mail.ietf.org ([64.170.98.30]) by localhost (ietfa.amsl.com [127.0.0.1]) (amavisd-new, port 10024) with ESMTP id YIQOxhoDgdMW for <oauth@ietfa.amsl.com>; Mon, 18 Feb 2013 14:51:32 -0800 (PST)
Received: from co9outboundpool.messaging.microsoft.com (co9ehsobe002.messaging.microsoft.com [207.46.163.25]) by ietfa.amsl.com (Postfix) with ESMTP id 8824721E8039 for <oauth@ietf.org>; Mon, 18 Feb 2013 14:51:32 -0800 (PST)
Received: from mail95-co9-R.bigfish.com (10.236.132.227) by CO9EHSOBE042.bigfish.com (10.236.130.105) with Microsoft SMTP Server id 14.1.225.23; Mon, 18 Feb 2013 22:51:25 +0000
Received: from mail95-co9 (localhost [127.0.0.1])	by mail95-co9-R.bigfish.com (Postfix) with ESMTP id 64EB98C01F9	for <oauth@ietf.org>; Mon, 18 Feb 2013 22:51:25 +0000 (UTC)
X-Forefront-Antispam-Report: CIP:192.160.210.14; KIP:(null); UIP:(null); IPV:NLI; H:ct11msg02.am.mot-solutions.com; RD:ct11msg02.mot-solutions.com; EFVD:NLI
X-SpamScore: 0
X-BigFish: VPS0(zzc85fhzz1f42h1ee6h1de0h1202h1e76h1d1ah1d2ahzz17326ah8275bh8275dh18c673hz2fh2a8h683h839hd25hf0ah1288h12a5h12bdh137ah1441h1504h1537h153bh15d0h162dh1631h1758h18e1h1946h19b5h19ceh1155h)
Received-SPF: pass (mail95-co9: domain of motorolasolutions.com designates 192.160.210.14 as permitted sender) client-ip=192.160.210.14; envelope-from=Adam.Lewis@motorolasolutions.com; helo=ct11msg02.am.mot-solutions.com ; olutions.com ; 
X-Forefront-Antispam-Report-Untrusted: CIP:157.56.237.133; KIP:(null); UIP:(null); (null); H:BY2PRD0411HT002.namprd04.prod.outlook.com; R:internal; EFV:INT
Received: from mail95-co9 (localhost.localdomain [127.0.0.1]) by mail95-co9 (MessageSwitch) id 1361227865401562_1751; Mon, 18 Feb 2013 22:51:05 +0000 (UTC)
Received: from CO9EHSMHS003.bigfish.com (unknown [10.236.132.227])	by mail95-co9.bigfish.com (Postfix) with ESMTP id 5E43ACA0057	for <oauth@ietf.org>; Mon, 18 Feb 2013 22:51:05 +0000 (UTC)
Received: from ct11msg02.am.mot-solutions.com (192.160.210.14) by CO9EHSMHS003.bigfish.com (10.236.130.13) with Microsoft SMTP Server (TLS) id 14.1.225.23; Mon, 18 Feb 2013 22:51:04 +0000
Received: from ct11msg02.am.mot-solutions.com (ct11vts02.am.mot.com [10.177.16.160])	by ct11msg02.am.mot-solutions.com (8.14.3/8.14.3) with ESMTP id r1IN0jtD014695	for <oauth@ietf.org>; Mon, 18 Feb 2013 18:00:45 -0500 (EST)
Received: from ch1outboundpool.messaging.microsoft.com (ch1ehsobe003.messaging.microsoft.com [216.32.181.183])	by ct11msg02.am.mot-solutions.com (8.14.3/8.14.3) with ESMTP id r1IN0iLu014692 (version=TLSv1/SSLv3 cipher=AES128-SHA bits=128 verify=FAIL)	for <oauth@ietf.org>; Mon, 18 Feb 2013 18:00:44 -0500 (EST)
Received: from mail10-ch1-R.bigfish.com (10.43.68.225) by CH1EHSOBE017.bigfish.com (10.43.70.67) with Microsoft SMTP Server id 14.1.225.23; Mon, 18 Feb 2013 22:51:02 +0000
Received: from mail10-ch1 (localhost [127.0.0.1])	by mail10-ch1-R.bigfish.com (Postfix) with ESMTP id AD4E62200AF	for <oauth@ietf.org.FOPE.CONNECTOR.OVERRIDE>; Mon, 18 Feb 2013 22:51:02 +0000 (UTC)
Received: from mail10-ch1 (localhost.localdomain [127.0.0.1]) by mail10-ch1 (MessageSwitch) id 1361227834513255_24973; Mon, 18 Feb 2013 22:50:34 +0000 (UTC)
Received: from CH1EHSMHS026.bigfish.com (snatpool3.int.messaging.microsoft.com [10.43.68.227])	by mail10-ch1.bigfish.com (Postfix) with ESMTP id 7AB0F1003CA for <oauth@ietf.org>; Mon, 18 Feb 2013 22:50:34 +0000 (UTC)
Received: from BY2PRD0411HT002.namprd04.prod.outlook.com (157.56.237.133) by CH1EHSMHS026.bigfish.com (10.43.70.26) with Microsoft SMTP Server (TLS) id 14.1.225.23; Mon, 18 Feb 2013 22:50:29 +0000
Received: from BY2PRD0411MB441.namprd04.prod.outlook.com ([169.254.5.136]) by BY2PRD0411HT002.namprd04.prod.outlook.com ([10.255.128.37]) with mapi id 14.16.0263.000; Mon, 18 Feb 2013 22:50:28 +0000
From: Lewis Adam-CAL022 <Adam.Lewis@motorolasolutions.com>
To: "oauth@ietf.org WG" <oauth@ietf.org>
Thread-Topic: JWT grant_type and client_id
Thread-Index: Ac4OKlgNygAJgL9ySFC/PJajtkIVLA==
Date: Mon, 18 Feb 2013 22:50:27 +0000
Message-ID: <59E470B10C4630419ED717AC79FCF9A948D552B8@BY2PRD0411MB441.namprd04.prod.outlook.com>
Accept-Language: en-US
Content-Language: en-US
X-MS-Has-Attach: 
X-MS-TNEF-Correlator: 
x-originating-ip: [150.130.138.231]
Content-Type: multipart/alternative; boundary="_000_59E470B10C4630419ED717AC79FCF9A948D552B8BY2PRD0411MB441_"
MIME-Version: 1.0
X-FOPE-CONNECTOR: Id%0$Dn%*$RO%0$TLS%0$FQDN%$TlsDn%
X-FOPE-CONNECTOR: Id%1294$Dn%IETF.ORG$RO%2$TLS%3$FQDN%msgate.mot-solutions.com$TlsDn%
X-CFilter-Loop: Reflected
X-OriginatorOrg: motorolasolutions.com
Subject: [OAUTH-WG] JWT grant_type and client_id
X-BeenThere: oauth@ietf.org
X-Mailman-Version: 2.1.12
Precedence: list
List-Id: OAUTH WG <oauth.ietf.org>
List-Unsubscribe: <https://www.ietf.org/mailman/options/oauth>, <mailto:oauth-request@ietf.org?subject=unsubscribe>
List-Archive: <http://www.ietf.org/mail-archive/web/oauth>
List-Post: <mailto:oauth@ietf.org>
List-Help: <mailto:oauth-request@ietf.org?subject=help>
List-Subscribe: <https://www.ietf.org/mailman/listinfo/oauth>, <mailto:oauth-request@ietf.org?subject=subscribe>
X-List-Received-Date: Mon, 18 Feb 2013 22:51:43 -0000

--_000_59E470B10C4630419ED717AC79FCF9A948D552B8BY2PRD0411MB441_
Content-Type: text/plain; charset="us-ascii"
Content-Transfer-Encoding: quoted-printable


Is there any guidance on the usage of client_id when using the JWT assertio=
n profile as a grant type?  draft-ietf-oauth-jwt-bearer-04 makes no mention=
 so I assume that it is not required ... but it would be necessary if using=
 in conjunction with a HOK profile where the JWT assertion is issued to - a=
nd may only be used by - the intended client.  Obviously this is straight f=
orward enough, really I'm just looking to be sure that I'm not missing anyt=
hing.

tx
adam

--_000_59E470B10C4630419ED717AC79FCF9A948D552B8BY2PRD0411MB441_
Content-Type: text/html; charset="us-ascii"
Content-Transfer-Encoding: quoted-printable

<html xmlns:v=3D"urn:schemas-microsoft-com:vml" xmlns:o=3D"urn:schemas-micr=
osoft-com:office:office" xmlns:w=3D"urn:schemas-microsoft-com:office:word" =
xmlns:m=3D"http://schemas.microsoft.com/office/2004/12/omml" xmlns=3D"http:=
//www.w3.org/TR/REC-html40">
<head>
<meta http-equiv=3D"Content-Type" content=3D"text/html; charset=3Dus-ascii"=
>
<meta name=3D"Generator" content=3D"Microsoft Word 12 (filtered medium)">
<style><!--
/* Font Definitions */
@font-face
	{font-family:Calibri;
	panose-1:2 15 5 2 2 2 4 3 2 4;}
@font-face
	{font-family:"Book Antiqua";
	panose-1:2 4 6 2 5 3 5 3 3 4;}
/* Style Definitions */
p.MsoNormal, li.MsoNormal, div.MsoNormal
	{margin:0in;
	margin-bottom:.0001pt;
	font-size:11.0pt;
	font-family:"Calibri","sans-serif";}
a:link, span.MsoHyperlink
	{mso-style-priority:99;
	color:blue;
	text-decoration:underline;}
a:visited, span.MsoHyperlinkFollowed
	{mso-style-priority:99;
	color:purple;
	text-decoration:underline;}
pre
	{mso-style-priority:99;
	mso-style-link:"HTML Preformatted Char";
	margin:0in;
	margin-bottom:.0001pt;
	font-size:10.0pt;
	font-family:"Courier New";}
span.EmailStyle17
	{mso-style-type:personal-compose;
	font-family:"Book Antiqua","serif";
	color:windowtext;
	font-weight:normal;
	font-style:normal;
	text-decoration:none none;}
span.HTMLPreformattedChar
	{mso-style-name:"HTML Preformatted Char";
	mso-style-priority:99;
	mso-style-link:"HTML Preformatted";
	font-family:"Courier New";}
.MsoChpDefault
	{mso-style-type:export-only;}
@page WordSection1
	{size:8.5in 11.0in;
	margin:1.0in 1.0in 1.0in 1.0in;}
div.WordSection1
	{page:WordSection1;}
--></style><!--[if gte mso 9]><xml>
<o:shapedefaults v:ext=3D"edit" spidmax=3D"1026" />
</xml><![endif]--><!--[if gte mso 9]><xml>
<o:shapelayout v:ext=3D"edit">
<o:idmap v:ext=3D"edit" data=3D"1" />
</o:shapelayout></xml><![endif]-->
</head>
<body lang=3D"EN-US" link=3D"blue" vlink=3D"purple">
<div class=3D"WordSection1">
<p class=3D"MsoNormal"><span style=3D"font-size:10.5pt;font-family:&quot;Bo=
ok Antiqua&quot;,&quot;serif&quot;"><o:p>&nbsp;</o:p></span></p>
<p class=3D"MsoNormal"><span style=3D"font-size:10.5pt;font-family:&quot;Bo=
ok Antiqua&quot;,&quot;serif&quot;">Is there any guidance on the usage of c=
lient_id when using the JWT assertion profile as a grant type?&nbsp; draft-=
ietf-oauth-jwt-bearer-04 makes no mention so I assume that it
 is not required &#8230; but it would be necessary if using in conjunction =
with a HOK profile where the JWT assertion is issued to &#8211; and may onl=
y be used by &#8211; the intended client.&nbsp; Obviously this is straight =
forward enough, really I&#8217;m just looking to be sure that
 I&#8217;m not missing anything.<o:p></o:p></span></p>
<p class=3D"MsoNormal"><span style=3D"font-size:10.5pt;font-family:&quot;Bo=
ok Antiqua&quot;,&quot;serif&quot;"><o:p>&nbsp;</o:p></span></p>
<p class=3D"MsoNormal"><span style=3D"font-size:10.5pt;font-family:&quot;Bo=
ok Antiqua&quot;,&quot;serif&quot;">tx<o:p></o:p></span></p>
<p class=3D"MsoNormal"><span style=3D"font-size:10.5pt;font-family:&quot;Bo=
ok Antiqua&quot;,&quot;serif&quot;">adam<o:p></o:p></span></p>
</div>
</body>
</html>

--_000_59E470B10C4630419ED717AC79FCF9A948D552B8BY2PRD0411MB441_--

From Michael.Jones@microsoft.com  Mon Feb 18 16:58:32 2013
Return-Path: <Michael.Jones@microsoft.com>
X-Original-To: oauth@ietfa.amsl.com
Delivered-To: oauth@ietfa.amsl.com
Received: from localhost (localhost [127.0.0.1]) by ietfa.amsl.com (Postfix) with ESMTP id 0B4EB21E8051 for <oauth@ietfa.amsl.com>; Mon, 18 Feb 2013 16:58:32 -0800 (PST)
X-Virus-Scanned: amavisd-new at amsl.com
X-Spam-Flag: NO
X-Spam-Score: -2.581
X-Spam-Level: 
X-Spam-Status: No, score=-2.581 tagged_above=-999 required=5 tests=[AWL=0.017,  BAYES_00=-2.599, HTML_MESSAGE=0.001]
Received: from mail.ietf.org ([64.170.98.30]) by localhost (ietfa.amsl.com [127.0.0.1]) (amavisd-new, port 10024) with ESMTP id bJsE19WOme-T for <oauth@ietfa.amsl.com>; Mon, 18 Feb 2013 16:58:30 -0800 (PST)
Received: from na01-by2-obe.outbound.protection.outlook.com (na01-by2-obe.ptr.protection.outlook.com [207.46.100.26]) by ietfa.amsl.com (Postfix) with ESMTP id E2FFC21E8045 for <oauth@ietf.org>; Mon, 18 Feb 2013 16:58:30 -0800 (PST)
Received: from BY2FFO11FD011.protection.gbl (10.1.15.204) by BY2FFO11HUB027.protection.gbl (10.1.14.113) with Microsoft SMTP Server (TLS) id 15.0.620.12; Tue, 19 Feb 2013 00:58:29 +0000
Received: from TK5EX14MLTC103.redmond.corp.microsoft.com (131.107.125.37) by BY2FFO11FD011.mail.protection.outlook.com (10.1.14.129) with Microsoft SMTP Server (TLS) id 15.0.620.12 via Frontend Transport; Tue, 19 Feb 2013 00:58:28 +0000
Received: from TK5EX14MBXC284.redmond.corp.microsoft.com ([169.254.1.96]) by TK5EX14MLTC103.redmond.corp.microsoft.com ([157.54.79.174]) with mapi id 14.02.0318.003; Tue, 19 Feb 2013 00:58:02 +0000
From: Mike Jones <Michael.Jones@microsoft.com>
To: Lewis Adam-CAL022 <Adam.Lewis@motorolasolutions.com>, "oauth@ietf.org WG" <oauth@ietf.org>
Thread-Topic: JWT grant_type and client_id
Thread-Index: Ac4OKlgNygAJgL9ySFC/PJajtkIVLAAEbxLQ
Date: Tue, 19 Feb 2013 00:58:02 +0000
Message-ID: <4E1F6AAD24975D4BA5B168042967394367472284@TK5EX14MBXC284.redmond.corp.microsoft.com>
References: <59E470B10C4630419ED717AC79FCF9A948D552B8@BY2PRD0411MB441.namprd04.prod.outlook.com>
In-Reply-To: <59E470B10C4630419ED717AC79FCF9A948D552B8@BY2PRD0411MB441.namprd04.prod.outlook.com>
Accept-Language: en-US
Content-Language: en-US
X-MS-Has-Attach: 
X-MS-TNEF-Correlator: 
x-originating-ip: [157.54.51.75]
Content-Type: multipart/alternative; boundary="_000_4E1F6AAD24975D4BA5B168042967394367472284TK5EX14MBXC284r_"
MIME-Version: 1.0
X-Forefront-Antispam-Report: CIP:131.107.125.37; CTRY:US; IPV:CAL; IPV:NLI; EFV:NLI; SFV:NSPM; SFS:(377454001)(199002)(189002)(56776001)(63696002)(54316002)(46102001)(31966008)(76482001)(56816002)(20776003)(47736001)(51856001)(16236675001)(47976001)(50986001)(4396001)(44976002)(74662001)(49866001)(512954001)(33656001)(16406001)(5343635001)(54356001)(74502001)(65816001)(15202345001)(5343655001)(79102001)(53806001)(47446002)(77982001)(59766001)(80022001)(55846006)(66066001); DIR:OUT; SFP:; SCL:1; SRVR:BY2FFO11HUB027; H:TK5EX14MLTC103.redmond.corp.microsoft.com; RD:InfoDomainNonexistent; A:1; MX:1; LANG:en; 
X-OriginatorOrg: microsoft.onmicrosoft.com
X-Forefront-PRVS: 0762FFD075
Subject: Re: [OAUTH-WG] JWT grant_type and client_id
X-BeenThere: oauth@ietf.org
X-Mailman-Version: 2.1.12
Precedence: list
List-Id: OAUTH WG <oauth.ietf.org>
List-Unsubscribe: <https://www.ietf.org/mailman/options/oauth>, <mailto:oauth-request@ietf.org?subject=unsubscribe>
List-Archive: <http://www.ietf.org/mail-archive/web/oauth>
List-Post: <mailto:oauth@ietf.org>
List-Help: <mailto:oauth-request@ietf.org?subject=help>
List-Subscribe: <https://www.ietf.org/mailman/listinfo/oauth>, <mailto:oauth-request@ietf.org?subject=subscribe>
X-List-Received-Date: Tue, 19 Feb 2013 00:58:32 -0000

--_000_4E1F6AAD24975D4BA5B168042967394367472284TK5EX14MBXC284r_
Content-Type: text/plain; charset="us-ascii"
Content-Transfer-Encoding: quoted-printable

The client_id value and the access token value are independent.

                                                                -- Mike

From: oauth-bounces@ietf.org [mailto:oauth-bounces@ietf.org] On Behalf Of L=
ewis Adam-CAL022
Sent: Monday, February 18, 2013 2:50 PM
To: oauth@ietf.org WG
Subject: [OAUTH-WG] JWT grant_type and client_id


Is there any guidance on the usage of client_id when using the JWT assertio=
n profile as a grant type?  draft-ietf-oauth-jwt-bearer-04 makes no mention=
 so I assume that it is not required ... but it would be necessary if using=
 in conjunction with a HOK profile where the JWT assertion is issued to - a=
nd may only be used by - the intended client.  Obviously this is straight f=
orward enough, really I'm just looking to be sure that I'm not missing anyt=
hing.

tx
adam

--_000_4E1F6AAD24975D4BA5B168042967394367472284TK5EX14MBXC284r_
Content-Type: text/html; charset="us-ascii"
Content-Transfer-Encoding: quoted-printable

<html xmlns:v=3D"urn:schemas-microsoft-com:vml" xmlns:o=3D"urn:schemas-micr=
osoft-com:office:office" xmlns:w=3D"urn:schemas-microsoft-com:office:word" =
xmlns:m=3D"http://schemas.microsoft.com/office/2004/12/omml" xmlns=3D"http:=
//www.w3.org/TR/REC-html40">
<head>
<meta http-equiv=3D"Content-Type" content=3D"text/html; charset=3Dus-ascii"=
>
<meta name=3D"Generator" content=3D"Microsoft Word 14 (filtered medium)">
<style><!--
/* Font Definitions */
@font-face
	{font-family:Calibri;
	panose-1:2 15 5 2 2 2 4 3 2 4;}
@font-face
	{font-family:Tahoma;
	panose-1:2 11 6 4 3 5 4 4 2 4;}
@font-face
	{font-family:"Book Antiqua";
	panose-1:2 4 6 2 5 3 5 3 3 4;}
/* Style Definitions */
p.MsoNormal, li.MsoNormal, div.MsoNormal
	{margin:0in;
	margin-bottom:.0001pt;
	font-size:11.0pt;
	font-family:"Calibri","sans-serif";}
a:link, span.MsoHyperlink
	{mso-style-priority:99;
	color:blue;
	text-decoration:underline;}
a:visited, span.MsoHyperlinkFollowed
	{mso-style-priority:99;
	color:purple;
	text-decoration:underline;}
pre
	{mso-style-priority:99;
	mso-style-link:"HTML Preformatted Char";
	margin:0in;
	margin-bottom:.0001pt;
	font-size:10.0pt;
	font-family:"Courier New";}
span.HTMLPreformattedChar
	{mso-style-name:"HTML Preformatted Char";
	mso-style-priority:99;
	mso-style-link:"HTML Preformatted";
	font-family:"Courier New";}
span.EmailStyle19
	{mso-style-type:personal;
	font-family:"Book Antiqua","serif";
	color:windowtext;
	font-weight:normal;
	font-style:normal;
	text-decoration:none none;}
span.EmailStyle20
	{mso-style-type:personal-reply;
	font-family:"Calibri","sans-serif";
	color:#1F497D;}
.MsoChpDefault
	{mso-style-type:export-only;
	font-size:10.0pt;}
@page WordSection1
	{size:8.5in 11.0in;
	margin:1.0in 1.0in 1.0in 1.0in;}
div.WordSection1
	{page:WordSection1;}
--></style><!--[if gte mso 9]><xml>
<o:shapedefaults v:ext=3D"edit" spidmax=3D"1026" />
</xml><![endif]--><!--[if gte mso 9]><xml>
<o:shapelayout v:ext=3D"edit">
<o:idmap v:ext=3D"edit" data=3D"1" />
</o:shapelayout></xml><![endif]-->
</head>
<body lang=3D"EN-US" link=3D"blue" vlink=3D"purple">
<div class=3D"WordSection1">
<p class=3D"MsoNormal"><span style=3D"color:#1F497D">The client_id value an=
d the access token value are independent.<o:p></o:p></span></p>
<p class=3D"MsoNormal"><span style=3D"color:#1F497D"><o:p>&nbsp;</o:p></spa=
n></p>
<p class=3D"MsoNormal"><span style=3D"color:#1F497D">&nbsp;&nbsp;&nbsp;&nbs=
p;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&=
nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbs=
p;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&=
nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbs=
p;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp; -- Mike<o:p></o:p>=
</span></p>
<p class=3D"MsoNormal"><span style=3D"color:#1F497D"><o:p>&nbsp;</o:p></spa=
n></p>
<div>
<div style=3D"border:none;border-top:solid #B5C4DF 1.0pt;padding:3.0pt 0in =
0in 0in">
<p class=3D"MsoNormal"><b><span style=3D"font-size:10.0pt;font-family:&quot=
;Tahoma&quot;,&quot;sans-serif&quot;">From:</span></b><span style=3D"font-s=
ize:10.0pt;font-family:&quot;Tahoma&quot;,&quot;sans-serif&quot;"> oauth-bo=
unces@ietf.org [mailto:oauth-bounces@ietf.org]
<b>On Behalf Of </b>Lewis Adam-CAL022<br>
<b>Sent:</b> Monday, February 18, 2013 2:50 PM<br>
<b>To:</b> oauth@ietf.org WG<br>
<b>Subject:</b> [OAUTH-WG] JWT grant_type and client_id<o:p></o:p></span></=
p>
</div>
</div>
<p class=3D"MsoNormal"><o:p>&nbsp;</o:p></p>
<p class=3D"MsoNormal"><span style=3D"font-size:10.5pt;font-family:&quot;Bo=
ok Antiqua&quot;,&quot;serif&quot;"><o:p>&nbsp;</o:p></span></p>
<p class=3D"MsoNormal"><span style=3D"font-size:10.5pt;font-family:&quot;Bo=
ok Antiqua&quot;,&quot;serif&quot;">Is there any guidance on the usage of c=
lient_id when using the JWT assertion profile as a grant type?&nbsp; draft-=
ietf-oauth-jwt-bearer-04 makes no mention so I assume that it
 is not required &#8230; but it would be necessary if using in conjunction =
with a HOK profile where the JWT assertion is issued to &#8211; and may onl=
y be used by &#8211; the intended client.&nbsp; Obviously this is straight =
forward enough, really I&#8217;m just looking to be sure that
 I&#8217;m not missing anything.<o:p></o:p></span></p>
<p class=3D"MsoNormal"><span style=3D"font-size:10.5pt;font-family:&quot;Bo=
ok Antiqua&quot;,&quot;serif&quot;"><o:p>&nbsp;</o:p></span></p>
<p class=3D"MsoNormal"><span style=3D"font-size:10.5pt;font-family:&quot;Bo=
ok Antiqua&quot;,&quot;serif&quot;">tx<o:p></o:p></span></p>
<p class=3D"MsoNormal"><span style=3D"font-size:10.5pt;font-family:&quot;Bo=
ok Antiqua&quot;,&quot;serif&quot;">adam<o:p></o:p></span></p>
</div>
</body>
</html>

--_000_4E1F6AAD24975D4BA5B168042967394367472284TK5EX14MBXC284r_--

From sm@resistor.net  Mon Feb 18 23:25:05 2013
Return-Path: <sm@resistor.net>
X-Original-To: oauth@ietfa.amsl.com
Delivered-To: oauth@ietfa.amsl.com
Received: from localhost (localhost [127.0.0.1]) by ietfa.amsl.com (Postfix) with ESMTP id 0164421F8D02 for <oauth@ietfa.amsl.com>; Mon, 18 Feb 2013 23:25:05 -0800 (PST)
X-Virus-Scanned: amavisd-new at amsl.com
X-Spam-Flag: NO
X-Spam-Score: -102.577
X-Spam-Level: 
X-Spam-Status: No, score=-102.577 tagged_above=-999 required=5 tests=[AWL=0.022, BAYES_00=-2.599, USER_IN_WHITELIST=-100]
Received: from mail.ietf.org ([64.170.98.30]) by localhost (ietfa.amsl.com [127.0.0.1]) (amavisd-new, port 10024) with ESMTP id 7Sig+9F3TusI for <oauth@ietfa.amsl.com>; Mon, 18 Feb 2013 23:25:03 -0800 (PST)
Received: from mx.ipv6.elandsys.com (mx.ipv6.elandsys.com [IPv6:2001:470:f329:1::1]) by ietfa.amsl.com (Postfix) with ESMTP id B828621F8CFB for <oauth@ietf.org>; Mon, 18 Feb 2013 23:25:03 -0800 (PST)
Received: from SUBMAN.resistor.net (IDENT:sm@localhost [127.0.0.1]) (authenticated bits=0) by mx.elandsys.com (8.14.5/8.14.5) with ESMTP id r1J7Ovm3006861; Mon, 18 Feb 2013 23:25:00 -0800 (PST)
DKIM-Signature: v=1; a=rsa-sha256; c=simple/simple; d=opendkim.org; s=mail2010; t=1361258702; bh=dfgtV+eHlCT1lZdp21sWvE/K+EEu5jqZAC/zBao2uYs=; h=Date:To:From:Subject:Cc:In-Reply-To:References; b=QojHLTBHoBvYIl2OB3Fw/1bLQbnDNl35XS1CHnM0wyl98mPGNoZDSpYfhZDbJgiCH NX+cAeUx+SZ9nTDQYfNiaw5KR6gP5tXnqTExArwrMPd3CGdpNLKCO3Tqkan7R7t3cL TdnbBJxa/7CDIQfy9R49/pYIlHgBOOYTV5rbMDUA=
DKIM-Signature: v=1; a=rsa-sha256; c=simple/simple; d=resistor.net; s=mail; t=1361258702; i=@resistor.net; bh=dfgtV+eHlCT1lZdp21sWvE/K+EEu5jqZAC/zBao2uYs=; h=Date:To:From:Subject:Cc:In-Reply-To:References; b=VjIKq1p5S042nD9hAFzacUVhydxFpqVQBaoekXJS/QdBUWnagTTzV3temdCbemkAt 0JXQUMV0li+sRTW6Y9KIwazoibOTVpR/hYgX7g89PbDEr9ekTmmUIU5KNzLMAyoIHp 00fdCm+iH9wbPhbkjaI2jPMnc/ROG6Kao/0L1UjA=
Message-Id: <6.2.5.6.2.20130218225317.09ae39d8@resistor.net>
X-Mailer: QUALCOMM Windows Eudora Version 6.2.5.6
Date: Mon, 18 Feb 2013 23:22:50 -0800
To: John Bradley <ve7jtb@ve7jtb.com>
From: SM <sm@resistor.net>
In-Reply-To: <87A4BE12-AC72-4E35-A95F-E6F161CF170B@ve7jtb.com>
References: <51212E78.1050206@cs.tcd.ie> <4E1F6AAD24975D4BA5B16804296739436746DC1C@TK5EX14MBXC284.redmond.corp.microsoft.com> <51214AC5.3090807@cs.tcd.ie> <4E1F6AAD24975D4BA5B16804296739436746DE40@TK5EX14MBXC284.redmond.corp.microsoft.com> <CALaySJ+YM9_DJ5KB1AnF+D-_1=jMhCdsxrgB3jQaaCLsB7w1Kg@mail.gmail.com> <37B4C89F-2864-4317-BF87-F562241C176D@ve7jtb.com> <CALaySJ+bcFnn1H8Fx2R71TQMJak84AirJ9+a-KXX9h-FgZ8BtQ@mail.gmail.com> <87A4BE12-AC72-4E35-A95F-E6F161CF170B@ve7jtb.com>
Mime-Version: 1.0
Content-Type: text/plain; charset="us-ascii"; format=flowed
Cc: oauth@ietf.org
Subject: [OAUTH-WG] Mandatory to implement (was: oauth assertions plan)
X-BeenThere: oauth@ietf.org
X-Mailman-Version: 2.1.12
Precedence: list
List-Id: OAUTH WG <oauth.ietf.org>
List-Unsubscribe: <https://www.ietf.org/mailman/options/oauth>, <mailto:oauth-request@ietf.org?subject=unsubscribe>
List-Archive: <http://www.ietf.org/mail-archive/web/oauth>
List-Post: <mailto:oauth@ietf.org>
List-Help: <mailto:oauth-request@ietf.org?subject=help>
List-Subscribe: <https://www.ietf.org/mailman/listinfo/oauth>, <mailto:oauth-request@ietf.org?subject=subscribe>
X-List-Received-Date: Tue, 19 Feb 2013 07:25:05 -0000

Hi John,
At 12:54 18-02-2013, John Bradley wrote:
>That is where we get into the area Stephen Farrell has been raising 
>about MTI not being required to deploy.

The topic of mandatory to implement has been discussed previously in 
the working group.
Stephen Farrell explained [1] what it meant.  Barry Leiba explained 
what it meant.

In my humble opinion a mandatory to implement feature is about having 
the code for the feature.  If the code is out there it is easier to 
get what you want.

Regards,
-sm 


From sberyozkin@gmail.com  Tue Feb 19 05:54:34 2013
Return-Path: <sberyozkin@gmail.com>
X-Original-To: oauth@ietfa.amsl.com
Delivered-To: oauth@ietfa.amsl.com
Received: from localhost (localhost [127.0.0.1]) by ietfa.amsl.com (Postfix) with ESMTP id 4FB5221F8CF4 for <oauth@ietfa.amsl.com>; Tue, 19 Feb 2013 05:54:32 -0800 (PST)
X-Virus-Scanned: amavisd-new at amsl.com
X-Spam-Flag: NO
X-Spam-Score: -3.457
X-Spam-Level: 
X-Spam-Status: No, score=-3.457 tagged_above=-999 required=5 tests=[AWL=0.142,  BAYES_00=-2.599, RCVD_IN_DNSWL_LOW=-1]
Received: from mail.ietf.org ([64.170.98.30]) by localhost (ietfa.amsl.com [127.0.0.1]) (amavisd-new, port 10024) with ESMTP id YpuBwv7TX2Sx for <oauth@ietfa.amsl.com>; Tue, 19 Feb 2013 05:54:31 -0800 (PST)
Received: from mail-ea0-f174.google.com (mail-ea0-f174.google.com [209.85.215.174]) by ietfa.amsl.com (Postfix) with ESMTP id 3D30821F88EA for <oauth@ietf.org>; Tue, 19 Feb 2013 05:54:28 -0800 (PST)
Received: by mail-ea0-f174.google.com with SMTP id 1so2827647eaa.33 for <oauth@ietf.org>; Tue, 19 Feb 2013 05:54:27 -0800 (PST)
DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=gmail.com; s=20120113; h=x-received:message-id:date:from:user-agent:mime-version:to:subject :content-type:content-transfer-encoding; bh=o2GpcFH2A80yleovpaqwWMRtHQmhHKDlgsHsmtYIKnk=; b=SofyOivkzS9to5rY6xdLUgK4RbtfnfJloaZvIweCahv2irU4D1BMxerZNj39G/bFIM 4xL5Ik8kcyNb7oit0VQPOesf+QWlDxlWAO036/2lcf9apsBXXE0CUPuLIqR6v0BZmZWa 1I7fl92TQIvRPhrYshtX2Qlu/INCITdXTtX4cE1Z54AP09tj5Ju4+PKxWPcG5OQFqqPM IYhchvsQWeWGGZaS0WLJcSEfOEssH0Pm0V9KGxHxZgTF0IQUD2bhM0IO6OQMMTGc1W/c zBX7NWdpRTWGVkLo/EDs7NUTUTYRJw0tNoBIBGb5NFz+lKAROxoP3qA3R85n9+c8kkju d6ug==
X-Received: by 10.14.210.8 with SMTP id t8mr57236385eeo.35.1361282067184; Tue, 19 Feb 2013 05:54:27 -0800 (PST)
Received: from [10.36.226.5] ([217.173.99.61]) by mx.google.com with ESMTPS id q42sm94827425eem.14.2013.02.19.05.54.25 (version=TLSv1 cipher=ECDHE-RSA-RC4-SHA bits=128/128); Tue, 19 Feb 2013 05:54:26 -0800 (PST)
Message-ID: <51238410.8040705@gmail.com>
Date: Tue, 19 Feb 2013 13:54:24 +0000
From: Sergey Beryozkin <sberyozkin@gmail.com>
User-Agent: Mozilla/5.0 (X11; Linux x86_64; rv:12.0) Gecko/20120430 Thunderbird/12.0.1
MIME-Version: 1.0
To: "<oauth@ietf.org>" <oauth@ietf.org>
Content-Type: text/plain; charset=ISO-8859-1; format=flowed
Content-Transfer-Encoding: 7bit
Subject: [OAUTH-WG] Using SAML2 Bearer for the authentication
X-BeenThere: oauth@ietf.org
X-Mailman-Version: 2.1.12
Precedence: list
List-Id: OAUTH WG <oauth.ietf.org>
List-Unsubscribe: <https://www.ietf.org/mailman/options/oauth>, <mailto:oauth-request@ietf.org?subject=unsubscribe>
List-Archive: <http://www.ietf.org/mail-archive/web/oauth>
List-Post: <mailto:oauth@ietf.org>
List-Help: <mailto:oauth-request@ietf.org?subject=help>
List-Subscribe: <https://www.ietf.org/mailman/listinfo/oauth>, <mailto:oauth-request@ietf.org?subject=subscribe>
X-List-Received-Date: Tue, 19 Feb 2013 13:54:34 -0000

Hi,

Assertions like SAML2 Bearer can be used for authenticating the client.
Why a dedicated Authorization scheme can not be introduced, instead of 
or in addition to "client_assertion" & "client_assertion_type" parameters ?

IMHO, the following

Authorization: SAML "base64url-encoded assertion"

grant_type=authorization_code&code=123456

is more in line with OAuth2 recommending not to prefer including client 
id & secret in the body:

"Including the client credentials in the request-body using the two
parameters is NOT RECOMMENDED and SHOULD be limited to clients unable
to directly utilize the HTTP Basic authentication scheme (or other
password-based HTTP authentication schemes)" - though it talks about a 
password based scheme...

similarly:

Authorization: JWT "encoded jwt assertion"

grant_type=authorization_code&code=123456

Just a thought.

Cheers, Sergey



From bcampbell@pingidentity.com  Tue Feb 19 06:20:42 2013
Return-Path: <bcampbell@pingidentity.com>
X-Original-To: oauth@ietfa.amsl.com
Delivered-To: oauth@ietfa.amsl.com
Received: from localhost (localhost [127.0.0.1]) by ietfa.amsl.com (Postfix) with ESMTP id AA5D021F8DAC for <oauth@ietfa.amsl.com>; Tue, 19 Feb 2013 06:20:42 -0800 (PST)
X-Virus-Scanned: amavisd-new at amsl.com
X-Spam-Flag: NO
X-Spam-Score: -5.984
X-Spam-Level: 
X-Spam-Status: No, score=-5.984 tagged_above=-999 required=5 tests=[AWL=-0.008, BAYES_00=-2.599, FM_FORGED_GMAIL=0.622, HTML_MESSAGE=0.001, RCVD_IN_DNSWL_MED=-4]
Received: from mail.ietf.org ([64.170.98.30]) by localhost (ietfa.amsl.com [127.0.0.1]) (amavisd-new, port 10024) with ESMTP id qiTQY8XDLoM7 for <oauth@ietfa.amsl.com>; Tue, 19 Feb 2013 06:20:41 -0800 (PST)
Received: from na3sys009aog112.obsmtp.com (na3sys009aog112.obsmtp.com [74.125.149.207]) by ietfa.amsl.com (Postfix) with ESMTP id 0A51021F87CD for <oauth@ietf.org>; Tue, 19 Feb 2013 06:20:40 -0800 (PST)
Received: from mail-ie0-f199.google.com ([209.85.223.199]) (using TLSv1) by na3sys009aob112.postini.com ([74.125.148.12]) with SMTP ID DSNKUSOKN0DMyIOdnGOSu34Ua1PJNgztVYU5@postini.com; Tue, 19 Feb 2013 06:20:41 PST
Received: by mail-ie0-f199.google.com with SMTP id c13so32741717ieb.6 for <oauth@ietf.org>; Tue, 19 Feb 2013 06:20:39 -0800 (PST)
X-Google-DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=google.com; s=20120113; h=x-received:x-received:mime-version:in-reply-to:references:from:date :message-id:subject:to:cc:content-type:x-gm-message-state; bh=V9Vta2P282StoxrJjbX4lyoYc0K9xJmmUWn8joCAd10=; b=eulioQtnSZDWZqr/P88jqVd1jiil4X8WDX7r3dFZbAZvKitP28nBZ/3/sDl0nO2WvO JzvSuRDxSSpZGlplrkh1vPC6IbotHn8r1Ts6cFGrg0OPbmGmtRfTZuz2y/i+Jdt4t1IJ ufArnqrCsJzQ8YrKuixwbf1w5FDj+cMUHBEPVnWu61SGBx4gpqHdUxEOFafYdg48kpyM NsFDE+vIkCDpvlHRihEqFYm9/AF2vmkC6/nP9DsgLTNRWQCpI2po0eW/9xcg6CF+ohO4 nrEjyrfmueXmaejwXsfcvBJJSw+W87x/Gvr+TbL3G6Qd+NxcvQ3z17jeOtkn1mwir0iz W6TQ==
X-Received: by 10.50.184.226 with SMTP id ex2mr9677135igc.24.1361283639355; Tue, 19 Feb 2013 06:20:39 -0800 (PST)
X-Received: by 10.50.184.226 with SMTP id ex2mr9677128igc.24.1361283639230; Tue, 19 Feb 2013 06:20:39 -0800 (PST)
MIME-Version: 1.0
Received: by 10.64.63.3 with HTTP; Tue, 19 Feb 2013 06:20:09 -0800 (PST)
In-Reply-To: <4E1F6AAD24975D4BA5B168042967394367472284@TK5EX14MBXC284.redmond.corp.microsoft.com>
References: <59E470B10C4630419ED717AC79FCF9A948D552B8@BY2PRD0411MB441.namprd04.prod.outlook.com> <4E1F6AAD24975D4BA5B168042967394367472284@TK5EX14MBXC284.redmond.corp.microsoft.com>
From: Brian Campbell <bcampbell@pingidentity.com>
Date: Tue, 19 Feb 2013 07:20:09 -0700
Message-ID: <CA+k3eCRceGq9bAg33GNU12V5fwJN1MzG1gJkJFJbKe0w4FYEwg@mail.gmail.com>
To: Mike Jones <Michael.Jones@microsoft.com>
Content-Type: multipart/alternative; boundary=14dae9340dadc1420704d6148b45
X-Gm-Message-State: ALoCoQmOQCenUih8BNrCx2D2NIJFZ4e3ZNcm7Jx0h29a9aZp5cNIVis/GWQOkownFwpPyDNKaZajRNJivc6Jsf9a/Hi6GSdUKMVqs2ishrdeVpCM/dY6pgFTb5Sq0TcdPD8U4ntNdS20
Cc: "oauth@ietf.org WG" <oauth@ietf.org>
Subject: Re: [OAUTH-WG] JWT grant_type and client_id
X-BeenThere: oauth@ietf.org
X-Mailman-Version: 2.1.12
Precedence: list
List-Id: OAUTH WG <oauth.ietf.org>
List-Unsubscribe: <https://www.ietf.org/mailman/options/oauth>, <mailto:oauth-request@ietf.org?subject=unsubscribe>
List-Archive: <http://www.ietf.org/mail-archive/web/oauth>
List-Post: <mailto:oauth@ietf.org>
List-Help: <mailto:oauth-request@ietf.org?subject=help>
List-Subscribe: <https://www.ietf.org/mailman/listinfo/oauth>, <mailto:oauth-request@ietf.org?subject=subscribe>
X-List-Received-Date: Tue, 19 Feb 2013 14:20:42 -0000

--14dae9340dadc1420704d6148b45
Content-Type: text/plain; charset=windows-1252
Content-Transfer-Encoding: quoted-printable

Yeah, in general the client identification/authentication is independent
from the grant being presented. There may be policy (maybe unidentified
clients aren't allowed) or other protocol details (like some kind of HoK
bound to the client, though that doesn't exist yet) that dictate more
requirements on the client identifier.  But in the general case they are
independent and the client_id is not required.


On Mon, Feb 18, 2013 at 5:58 PM, Mike Jones <Michael.Jones@microsoft.com>wr=
ote:

>  The client_id value and the access token value are independent.****
>
> ** **
>
>                                                                 -- Mike**=
*
> *
>
> ** **
>
> *From:* oauth-bounces@ietf.org [mailto:oauth-bounces@ietf.org] *On Behalf
> Of *Lewis Adam-CAL022
> *Sent:* Monday, February 18, 2013 2:50 PM
> *To:* oauth@ietf.org WG
> *Subject:* [OAUTH-WG] JWT grant_type and client_id****
>
> ** **
>
> ** **
>
> Is there any guidance on the usage of client_id when using the JWT
> assertion profile as a grant type?  draft-ietf-oauth-jwt-bearer-04 makes =
no
> mention so I assume that it is not required =85 but it would be necessary=
 if
> using in conjunction with a HOK profile where the JWT assertion is issued
> to =96 and may only be used by =96 the intended client.  Obviously this i=
s
> straight forward enough, really I=92m just looking to be sure that I=92m =
not
> missing anything.****
>
> ** **
>
> tx****
>
> adam****
>
> _______________________________________________
> OAuth mailing list
> OAuth@ietf.org
> https://www.ietf.org/mailman/listinfo/oauth
>
>

--14dae9340dadc1420704d6148b45
Content-Type: text/html; charset=windows-1252
Content-Transfer-Encoding: quoted-printable

<div dir=3D"ltr">Yeah, in general the client identification/authentication =
is independent from the grant being presented. There may be policy (maybe u=
nidentified clients aren&#39;t allowed) or other protocol details (like som=
e kind of HoK bound to the client, though that doesn&#39;t exist yet) that =
dictate more requirements on the client identifier.=A0 But in the general c=
ase they are independent and the client_id is not required.<br>

</div><div class=3D"gmail_extra"><br><br><div class=3D"gmail_quote">On Mon,=
 Feb 18, 2013 at 5:58 PM, Mike Jones <span dir=3D"ltr">&lt;<a href=3D"mailt=
o:Michael.Jones@microsoft.com" target=3D"_blank">Michael.Jones@microsoft.co=
m</a>&gt;</span> wrote:<br>

<blockquote class=3D"gmail_quote" style=3D"margin:0 0 0 .8ex;border-left:1p=
x #ccc solid;padding-left:1ex">





<div link=3D"blue" vlink=3D"purple" lang=3D"EN-US">
<div>
<p class=3D"MsoNormal"><span style=3D"color:#1f497d">The client_id value an=
d the access token value are independent.<u></u><u></u></span></p>
<p class=3D"MsoNormal"><span style=3D"color:#1f497d"><u></u>=A0<u></u></spa=
n></p>
<p class=3D"MsoNormal"><span style=3D"color:#1f497d">=A0=A0=A0=A0=A0=A0=A0=
=A0=A0=A0=A0=A0=A0=A0=A0=A0=A0=A0=A0=A0=A0=A0=A0=A0=A0=A0=A0=A0=A0=A0=A0=A0=
=A0=A0=A0=A0=A0=A0=A0=A0=A0=A0=A0=A0=A0=A0=A0=A0=A0=A0=A0=A0=A0=A0=A0=A0=A0=
=A0=A0=A0=A0=A0=A0 -- Mike<u></u><u></u></span></p>
<p class=3D"MsoNormal"><span style=3D"color:#1f497d"><u></u>=A0<u></u></spa=
n></p>
<div>
<div style=3D"border:none;border-top:solid #b5c4df 1.0pt;padding:3.0pt 0in =
0in 0in">
<p class=3D"MsoNormal"><b><span style=3D"font-size:10.0pt;font-family:&quot=
;Tahoma&quot;,&quot;sans-serif&quot;">From:</span></b><span style=3D"font-s=
ize:10.0pt;font-family:&quot;Tahoma&quot;,&quot;sans-serif&quot;"> <a href=
=3D"mailto:oauth-bounces@ietf.org" target=3D"_blank">oauth-bounces@ietf.org=
</a> [mailto:<a href=3D"mailto:oauth-bounces@ietf.org" target=3D"_blank">oa=
uth-bounces@ietf.org</a>]
<b>On Behalf Of </b>Lewis Adam-CAL022<br>
<b>Sent:</b> Monday, February 18, 2013 2:50 PM<br>
<b>To:</b> <a href=3D"mailto:oauth@ietf.org" target=3D"_blank">oauth@ietf.o=
rg</a> WG<br>
<b>Subject:</b> [OAUTH-WG] JWT grant_type and client_id<u></u><u></u></span=
></p>
</div>
</div><div class=3D"im">
<p class=3D"MsoNormal"><u></u>=A0<u></u></p>
<p class=3D"MsoNormal"><span style=3D"font-size:10.5pt;font-family:&quot;Bo=
ok Antiqua&quot;,&quot;serif&quot;"><u></u>=A0<u></u></span></p>
<p class=3D"MsoNormal"><span style=3D"font-size:10.5pt;font-family:&quot;Bo=
ok Antiqua&quot;,&quot;serif&quot;">Is there any guidance on the usage of c=
lient_id when using the JWT assertion profile as a grant type?=A0 draft-iet=
f-oauth-jwt-bearer-04 makes no mention so I assume that it
 is not required =85 but it would be necessary if using in conjunction with=
 a HOK profile where the JWT assertion is issued to =96 and may only be use=
d by =96 the intended client.=A0 Obviously this is straight forward enough,=
 really I=92m just looking to be sure that
 I=92m not missing anything.<u></u><u></u></span></p>
<p class=3D"MsoNormal"><span style=3D"font-size:10.5pt;font-family:&quot;Bo=
ok Antiqua&quot;,&quot;serif&quot;"><u></u>=A0<u></u></span></p>
<p class=3D"MsoNormal"><span style=3D"font-size:10.5pt;font-family:&quot;Bo=
ok Antiqua&quot;,&quot;serif&quot;">tx<u></u><u></u></span></p>
<p class=3D"MsoNormal"><span style=3D"font-size:10.5pt;font-family:&quot;Bo=
ok Antiqua&quot;,&quot;serif&quot;">adam<u></u><u></u></span></p>
</div></div>
</div>

<br>_______________________________________________<br>
OAuth mailing list<br>
<a href=3D"mailto:OAuth@ietf.org">OAuth@ietf.org</a><br>
<a href=3D"https://www.ietf.org/mailman/listinfo/oauth" target=3D"_blank">h=
ttps://www.ietf.org/mailman/listinfo/oauth</a><br>
<br></blockquote></div><br></div>

--14dae9340dadc1420704d6148b45--

From bcampbell@pingidentity.com  Tue Feb 19 06:27:51 2013
Return-Path: <bcampbell@pingidentity.com>
X-Original-To: oauth@ietfa.amsl.com
Delivered-To: oauth@ietfa.amsl.com
Received: from localhost (localhost [127.0.0.1]) by ietfa.amsl.com (Postfix) with ESMTP id A5F9F21F8A56 for <oauth@ietfa.amsl.com>; Tue, 19 Feb 2013 06:27:51 -0800 (PST)
X-Virus-Scanned: amavisd-new at amsl.com
X-Spam-Flag: NO
X-Spam-Score: -5.15
X-Spam-Level: 
X-Spam-Status: No, score=-5.15 tagged_above=-999 required=5 tests=[AWL=-0.840,  BAYES_00=-2.599, FM_FORGED_GMAIL=0.622, HTML_MESSAGE=0.001, RCVD_IN_DNSWL_MED=-4, SARE_HTML_USL_OBFU=1.666]
Received: from mail.ietf.org ([64.170.98.30]) by localhost (ietfa.amsl.com [127.0.0.1]) (amavisd-new, port 10024) with ESMTP id oj42uZuXxG-w for <oauth@ietfa.amsl.com>; Tue, 19 Feb 2013 06:27:51 -0800 (PST)
Received: from na3sys009aog107.obsmtp.com (na3sys009aog107.obsmtp.com [74.125.149.197]) by ietfa.amsl.com (Postfix) with ESMTP id DFFBB21F89EF for <oauth@ietf.org>; Tue, 19 Feb 2013 06:27:50 -0800 (PST)
Received: from mail-oa0-f69.google.com ([209.85.219.69]) (using TLSv1) by na3sys009aob107.postini.com ([74.125.148.12]) with SMTP ID DSNKUSOL5q9VwH+G7bcxODiSIHKoi/6/PK9/@postini.com; Tue, 19 Feb 2013 06:27:50 PST
Received: by mail-oa0-f69.google.com with SMTP id k14so35220453oag.8 for <oauth@ietf.org>; Tue, 19 Feb 2013 06:27:50 -0800 (PST)
X-Google-DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=google.com; s=20120113; h=x-received:x-received:mime-version:in-reply-to:references:from:date :message-id:subject:to:cc:content-type:x-gm-message-state; bh=gNqtpNVttBJc1TYkfSkS8VhukPbqB+IC4gATjXqrFEI=; b=ov9P9Fc0tHqmXnXhAD/f+A4pQP29AUCXk4j1gzjTETEBy3QfZLfu1pcw/oWBgZuGbJ nd7sjvV10ndjLorWP6e6NA3hFevISKKVgrZqDyf2Z5YYadvszqdkkvivK1Ip/WY46HVO b/ByBqu5JaQ+Ovdee7gMsBwFYjqylPI3tnRBBi4mYDJbUytkniZkeLa/ov2K9QR7XbTY sN2PD97tUe1MUguP4bSNkJWABWe4bQagGz1lkCxcJZmR5jNF/dVNucdZ7A/onHdcqz2X sVpPr36MAXXN9VRc0Zt2+SbL3fgvvhHVQEIl1CqbbtkNBrtgXFIQYgJPiThjgGws7O/l RmFg==
X-Received: by 10.50.193.129 with SMTP id ho1mr2641411igc.94.1361284070023; Tue, 19 Feb 2013 06:27:50 -0800 (PST)
X-Received: by 10.50.193.129 with SMTP id ho1mr2641406igc.94.1361284069885; Tue, 19 Feb 2013 06:27:49 -0800 (PST)
MIME-Version: 1.0
Received: by 10.64.63.3 with HTTP; Tue, 19 Feb 2013 06:27:19 -0800 (PST)
In-Reply-To: <51238410.8040705@gmail.com>
References: <51238410.8040705@gmail.com>
From: Brian Campbell <bcampbell@pingidentity.com>
Date: Tue, 19 Feb 2013 07:27:19 -0700
Message-ID: <CA+k3eCT-78fCzGYNk3JwLihsg6qDmu0LNdmgb_QE83ehdj0THA@mail.gmail.com>
To: Sergey Beryozkin <sberyozkin@gmail.com>
Content-Type: multipart/alternative; boundary=14dae93410896c855604d614a587
X-Gm-Message-State: ALoCoQlND9cUqmGZJs5GD/Plxql3JSqa6TNkgGAcwmJzjpDqjrJBY+TdyUj22NTmgtlO2OdhqKs8FOLIJ5d/zXPll64vP38neOFYTsoXoyP+XbxZ675dnZX/gmfkXJgIo9VgttCH3oR1
Cc: "<oauth@ietf.org>" <oauth@ietf.org>
Subject: Re: [OAUTH-WG] Using SAML2 Bearer for the authentication
X-BeenThere: oauth@ietf.org
X-Mailman-Version: 2.1.12
Precedence: list
List-Id: OAUTH WG <oauth.ietf.org>
List-Unsubscribe: <https://www.ietf.org/mailman/options/oauth>, <mailto:oauth-request@ietf.org?subject=unsubscribe>
List-Archive: <http://www.ietf.org/mail-archive/web/oauth>
List-Post: <mailto:oauth@ietf.org>
List-Help: <mailto:oauth-request@ietf.org?subject=help>
List-Subscribe: <https://www.ietf.org/mailman/listinfo/oauth>, <mailto:oauth-request@ietf.org?subject=subscribe>
X-List-Received-Date: Tue, 19 Feb 2013 14:27:51 -0000

--14dae93410896c855604d614a587
Content-Type: text/plain; charset=ISO-8859-1

The scope of assertion based client authentication is only in OAuth and
only for the client calling the AS's token endpoint. Defining a general
HTTP auth scheme for assertions would have a much broader scope and be much
more difficult to standardize.


On Tue, Feb 19, 2013 at 6:54 AM, Sergey Beryozkin <sberyozkin@gmail.com>wrote:

> Hi,
>
> Assertions like SAML2 Bearer can be used for authenticating the client.
> Why a dedicated Authorization scheme can not be introduced, instead of or
> in addition to "client_assertion" & "client_assertion_type" parameters ?
>
> IMHO, the following
>
> Authorization: SAML "base64url-encoded assertion"
>
> grant_type=authorization_code&**code=123456
>
> is more in line with OAuth2 recommending not to prefer including client id
> & secret in the body:
>
> "Including the client credentials in the request-body using the two
> parameters is NOT RECOMMENDED and SHOULD be limited to clients unable
> to directly utilize the HTTP Basic authentication scheme (or other
> password-based HTTP authentication schemes)" - though it talks about a
> password based scheme...
>
> similarly:
>
> Authorization: JWT "encoded jwt assertion"
>
> grant_type=authorization_code&**code=123456
>
> Just a thought.
>
> Cheers, Sergey
>
>
> ______________________________**_________________
> OAuth mailing list
> OAuth@ietf.org
> https://www.ietf.org/mailman/**listinfo/oauth<https://www.ietf.org/mailman/listinfo/oauth>
>

--14dae93410896c855604d614a587
Content-Type: text/html; charset=ISO-8859-1
Content-Transfer-Encoding: quoted-printable

<div dir=3D"ltr"><div>The scope of assertion based client authentication is=
 only in OAuth and only for the client calling the AS&#39;s token endpoint.=
 Defining a general HTTP auth scheme for assertions would have a much broad=
er scope and be much more difficult to standardize. <br>

</div></div><div class=3D"gmail_extra"><br><br><div class=3D"gmail_quote">O=
n Tue, Feb 19, 2013 at 6:54 AM, Sergey Beryozkin <span dir=3D"ltr">&lt;<a h=
ref=3D"mailto:sberyozkin@gmail.com" target=3D"_blank">sberyozkin@gmail.com<=
/a>&gt;</span> wrote:<br>

<blockquote class=3D"gmail_quote" style=3D"margin:0 0 0 .8ex;border-left:1p=
x #ccc solid;padding-left:1ex">Hi,<br>
<br>
Assertions like SAML2 Bearer can be used for authenticating the client.<br>
Why a dedicated Authorization scheme can not be introduced, instead of or i=
n addition to &quot;client_assertion&quot; &amp; &quot;client_assertion_typ=
e&quot; parameters ?<br>
<br>
IMHO, the following<br>
<br>
Authorization: SAML &quot;base64url-encoded assertion&quot;<br>
<br>
grant_type=3Dauthorization_code&amp;<u></u>code=3D123456<br>
<br>
is more in line with OAuth2 recommending not to prefer including client id =
&amp; secret in the body:<br>
<br>
&quot;Including the client credentials in the request-body using the two<br=
>
parameters is NOT RECOMMENDED and SHOULD be limited to clients unable<br>
to directly utilize the HTTP Basic authentication scheme (or other<br>
password-based HTTP authentication schemes)&quot; - though it talks about a=
 password based scheme...<br>
<br>
similarly:<br>
<br>
Authorization: JWT &quot;encoded jwt assertion&quot;<br>
<br>
grant_type=3Dauthorization_code&amp;<u></u>code=3D123456<br>
<br>
Just a thought.<br>
<br>
Cheers, Sergey<br>
<br>
<br>
______________________________<u></u>_________________<br>
OAuth mailing list<br>
<a href=3D"mailto:OAuth@ietf.org" target=3D"_blank">OAuth@ietf.org</a><br>
<a href=3D"https://www.ietf.org/mailman/listinfo/oauth" target=3D"_blank">h=
ttps://www.ietf.org/mailman/<u></u>listinfo/oauth</a><br>
</blockquote></div><br></div>

--14dae93410896c855604d614a587--

From ve7jtb@ve7jtb.com  Tue Feb 19 06:59:13 2013
Return-Path: <ve7jtb@ve7jtb.com>
X-Original-To: oauth@ietfa.amsl.com
Delivered-To: oauth@ietfa.amsl.com
Received: from localhost (localhost [127.0.0.1]) by ietfa.amsl.com (Postfix) with ESMTP id 9893F21F880F for <oauth@ietfa.amsl.com>; Tue, 19 Feb 2013 06:59:13 -0800 (PST)
X-Virus-Scanned: amavisd-new at amsl.com
X-Spam-Flag: NO
X-Spam-Score: -3.448
X-Spam-Level: 
X-Spam-Status: No, score=-3.448 tagged_above=-999 required=5 tests=[AWL=0.151,  BAYES_00=-2.599, RCVD_IN_DNSWL_LOW=-1]
Received: from mail.ietf.org ([64.170.98.30]) by localhost (ietfa.amsl.com [127.0.0.1]) (amavisd-new, port 10024) with ESMTP id hzkSPfFxpe63 for <oauth@ietfa.amsl.com>; Tue, 19 Feb 2013 06:59:12 -0800 (PST)
Received: from mail-qc0-f180.google.com (mail-qc0-f180.google.com [209.85.216.180]) by ietfa.amsl.com (Postfix) with ESMTP id 4040A21F8806 for <oauth@ietf.org>; Tue, 19 Feb 2013 06:59:12 -0800 (PST)
Received: by mail-qc0-f180.google.com with SMTP id v28so2553462qcm.25 for <oauth@ietf.org>; Tue, 19 Feb 2013 06:59:11 -0800 (PST)
X-Google-DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=google.com; s=20120113; h=x-received:content-type:mime-version:subject:from:in-reply-to:date :cc:message-id:references:to:x-mailer:x-gm-message-state; bh=IWaRhQvHNYt3Sw/Pro03C0xIuVOnQlmDQYVNFH1khoU=; b=YixTNUTMECpiU4hKLGOgpoFl2wfufBsnnlV4T+bXA6zjqewDxkFE49IfDF03FB+Ap1 CWGQF+RyLuKK8CbFknnkT9zfn1O9JXPYr+NMudywY38xuYfPx1qEziUtmhArSXPGsyEa JEMgCEmRcsP0THQMe520oUFXYOb5whnlJ+hx8xkDnsGnguuSh3/aF9xMZ/7n9xtOAiyX ViUu6Z5DMrtNTRcAryHm37bbI0+Dr1hiQJRiejS1PUmQKhHMK/3gMyQbSBYBF/zFXsex yD5gMsY4HekdK17NTyxcFV27U8d5PmMAsNTV4zneVnDcz7KMgbu5JI+ZHKJ6z73W8paz 000Q==
X-Received: by 10.224.188.13 with SMTP id cy13mr7026904qab.53.1361285951556; Tue, 19 Feb 2013 06:59:11 -0800 (PST)
Received: from [192.168.1.213] (190-20-4-185.baf.movistar.cl. [190.20.4.185]) by mx.google.com with ESMTPS id g6sm681039qav.6.2013.02.19.06.59.07 (version=TLSv1 cipher=ECDHE-RSA-RC4-SHA bits=128/128); Tue, 19 Feb 2013 06:59:09 -0800 (PST)
Content-Type: multipart/signed; boundary="Apple-Mail=_CA2D3D2F-6C19-4BEE-A579-95AE2B0A2851"; protocol="application/pkcs7-signature"; micalg=sha1
Mime-Version: 1.0 (Mac OS X Mail 6.2 \(1499\))
From: John Bradley <ve7jtb@ve7jtb.com>
In-Reply-To: <6.2.5.6.2.20130218225317.09ae39d8@resistor.net>
Date: Tue, 19 Feb 2013 11:58:01 -0300
Message-Id: <5766DCFA-2A1B-4E55-AA29-58038C3A4515@ve7jtb.com>
References: <51212E78.1050206@cs.tcd.ie> <4E1F6AAD24975D4BA5B16804296739436746DC1C@TK5EX14MBXC284.redmond.corp.microsoft.com> <51214AC5.3090807@cs.tcd.ie> <4E1F6AAD24975D4BA5B16804296739436746DE40@TK5EX14MBXC284.redmond.corp.microsoft.com> <CALaySJ+YM9_DJ5KB1AnF+D-_1=jMhCdsxrgB3jQaaCLsB7w1Kg@mail.gmail.com> <37B4C89F-2864-4317-BF87-F562241C176D@ve7jtb.com> <CALaySJ+bcFnn1H8Fx2R71TQMJak84AirJ9+a-KXX9h-FgZ8BtQ@mail.gmail.com> <87A4BE12-AC72-4E35-A95F-E6F161CF170B@ve7jtb.com> <6.2.5.6.2.20130218225317.09ae39d8@resistor.net>
To: SM <sm@resistor.net>
X-Mailer: Apple Mail (2.1499)
X-Gm-Message-State: ALoCoQlEcPUw3gJ44h0qWYVu4JnWfAzM45p8EMbCbeX4ZZq1YB5PfiY26I99Zhw2sdIevbOYRafv
Cc: oauth@ietf.org
Subject: Re: [OAUTH-WG] Mandatory to implement (was: oauth assertions plan)
X-BeenThere: oauth@ietf.org
X-Mailman-Version: 2.1.12
Precedence: list
List-Id: OAUTH WG <oauth.ietf.org>
List-Unsubscribe: <https://www.ietf.org/mailman/options/oauth>, <mailto:oauth-request@ietf.org?subject=unsubscribe>
List-Archive: <http://www.ietf.org/mail-archive/web/oauth>
List-Post: <mailto:oauth@ietf.org>
List-Help: <mailto:oauth-request@ietf.org?subject=help>
List-Subscribe: <https://www.ietf.org/mailman/listinfo/oauth>, <mailto:oauth-request@ietf.org?subject=subscribe>
X-List-Received-Date: Tue, 19 Feb 2013 14:59:13 -0000

--Apple-Mail=_CA2D3D2F-6C19-4BEE-A579-95AE2B0A2851
Content-Transfer-Encoding: quoted-printable
Content-Type: text/plain;
	charset=us-ascii

Yes but that contradicts what Barry is appearing to ask for which is run =
time interoperability, by profile or configuration.

While having code available in libraries is generally a good thing, I =
agree.  That is likely not going to address all of Barry's issues.

A number of us recommended that Assertions , JWT-assertions and SAML =
assertions go ahead together because they are interrelated.  The chairs =
decided to send assertions on on it's own and it has been pushed back.
That is not especialy surprising, because it is not intended to be =
complete and interoperable in a end to end system on its own.

The question remains where to make what MTI.   While it may be logical =
to make SAML support MTI in SAML assertions should every library =
supporting assertions have full SAML support even if the applications =
are only using JWT assertions? =20

Where I think Barry and I agree is that we need to look at a group of =
documents that are intended to be used together for MTI rather than =
trying to overload Assertions which is only a small part of the whole.

So where we may disagree is if requiring libraries to have code that =
systems don't use and is effectively dead, helps with overall =
interoperability or is mostly theatre.

I suspect it is a continuum in that having the RS256 algorithm available =
in all the JWT assertion libraries lets applications using assertions =
choose to use it, but that doesn't guarantee all applications will,  or =
allow a client to figure out if that algorithm is available for use.

Hence my position that MTI without additional =
profiles/Discovery/negotiation is interoperability theatre if you are =
pretending it will make arbitrary OAuth deployments automatically work =
together.

Regards
John B.

On 2013-02-19, at 4:22 AM, SM <sm@resistor.net> wrote:

> Hi John,
> At 12:54 18-02-2013, John Bradley wrote:
>> That is where we get into the area Stephen Farrell has been raising =
about MTI not being required to deploy.
>=20
> The topic of mandatory to implement has been discussed previously in =
the working group.
> Stephen Farrell explained [1] what it meant.  Barry Leiba explained =
what it meant.
>=20
> In my humble opinion a mandatory to implement feature is about having =
the code for the feature.  If the code is out there it is easier to get =
what you want.
>=20
> Regards,
> -sm=20


--Apple-Mail=_CA2D3D2F-6C19-4BEE-A579-95AE2B0A2851
Content-Disposition: attachment;
	filename=smime.p7s
Content-Type: application/pkcs7-signature;
	name=smime.p7s
Content-Transfer-Encoding: base64
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--Apple-Mail=_CA2D3D2F-6C19-4BEE-A579-95AE2B0A2851--

From stephen.farrell@cs.tcd.ie  Tue Feb 19 07:15:50 2013
Return-Path: <stephen.farrell@cs.tcd.ie>
X-Original-To: oauth@ietfa.amsl.com
Delivered-To: oauth@ietfa.amsl.com
Received: from localhost (localhost [127.0.0.1]) by ietfa.amsl.com (Postfix) with ESMTP id 6393E21F8DD5 for <oauth@ietfa.amsl.com>; Tue, 19 Feb 2013 07:15:50 -0800 (PST)
X-Virus-Scanned: amavisd-new at amsl.com
X-Spam-Flag: NO
X-Spam-Score: -102.524
X-Spam-Level: 
X-Spam-Status: No, score=-102.524 tagged_above=-999 required=5 tests=[AWL=0.075, BAYES_00=-2.599, USER_IN_WHITELIST=-100]
Received: from mail.ietf.org ([64.170.98.30]) by localhost (ietfa.amsl.com [127.0.0.1]) (amavisd-new, port 10024) with ESMTP id 77GArtc9kb4q for <oauth@ietfa.amsl.com>; Tue, 19 Feb 2013 07:15:49 -0800 (PST)
Received: from mercury.scss.tcd.ie (mercury.scss.tcd.ie [134.226.56.6]) by ietfa.amsl.com (Postfix) with ESMTP id 194E721F8DF1 for <oauth@ietf.org>; Tue, 19 Feb 2013 07:15:49 -0800 (PST)
Received: from localhost (localhost [127.0.0.1]) by mercury.scss.tcd.ie (Postfix) with ESMTP id 3A90BBE1E; Tue, 19 Feb 2013 15:15:26 +0000 (GMT)
X-Virus-Scanned: Debian amavisd-new at scss.tcd.ie
Received: from mercury.scss.tcd.ie ([127.0.0.1]) by localhost (mercury.scss.tcd.ie [127.0.0.1]) (amavisd-new, port 10024) with ESMTP id syzPmZZPeRAz; Tue, 19 Feb 2013 15:15:26 +0000 (GMT)
Received: from [IPv6:2001:770:10:203:8900:f848:d9d4:67b7] (unknown [IPv6:2001:770:10:203:8900:f848:d9d4:67b7]) by mercury.scss.tcd.ie (Postfix) with ESMTPSA id 10195BE1D; Tue, 19 Feb 2013 15:15:26 +0000 (GMT)
Message-ID: <5123970D.6010000@cs.tcd.ie>
Date: Tue, 19 Feb 2013 15:15:25 +0000
From: Stephen Farrell <stephen.farrell@cs.tcd.ie>
User-Agent: Mozilla/5.0 (X11; Linux x86_64; rv:17.0) Gecko/20130106 Thunderbird/17.0.2
MIME-Version: 1.0
To: John Bradley <ve7jtb@ve7jtb.com>
References: <51212E78.1050206@cs.tcd.ie> <4E1F6AAD24975D4BA5B16804296739436746DC1C@TK5EX14MBXC284.redmond.corp.microsoft.com> <51214AC5.3090807@cs.tcd.ie> <4E1F6AAD24975D4BA5B16804296739436746DE40@TK5EX14MBXC284.redmond.corp.microsoft.com> <CALaySJ+YM9_DJ5KB1AnF+D-_1=jMhCdsxrgB3jQaaCLsB7w1Kg@mail.gmail.com> <37B4C89F-2864-4317-BF87-F562241C176D@ve7jtb.com> <CALaySJ+bcFnn1H8Fx2R71TQMJak84AirJ9+a-KXX9h-FgZ8BtQ@mail.gmail.com> <87A4BE12-AC72-4E35-A95F-E6F161CF170B@ve7jtb.com> <6.2.5.6.2.20130218225317.09ae39d8@resistor.net> <5766DCFA-2A1B-4E55-AA29-58038C3A4515@ve7jtb.com>
In-Reply-To: <5766DCFA-2A1B-4E55-AA29-58038C3A4515@ve7jtb.com>
X-Enigmail-Version: 1.5
Content-Type: text/plain; charset=ISO-8859-1
Content-Transfer-Encoding: 7bit
Cc: oauth@ietf.org
Subject: Re: [OAUTH-WG] Mandatory to implement
X-BeenThere: oauth@ietf.org
X-Mailman-Version: 2.1.12
Precedence: list
List-Id: OAUTH WG <oauth.ietf.org>
List-Unsubscribe: <https://www.ietf.org/mailman/options/oauth>, <mailto:oauth-request@ietf.org?subject=unsubscribe>
List-Archive: <http://www.ietf.org/mail-archive/web/oauth>
List-Post: <mailto:oauth@ietf.org>
List-Help: <mailto:oauth-request@ietf.org?subject=help>
List-Subscribe: <https://www.ietf.org/mailman/listinfo/oauth>, <mailto:oauth-request@ietf.org?subject=subscribe>
X-List-Received-Date: Tue, 19 Feb 2013 15:15:50 -0000

On 02/19/2013 02:58 PM, John Bradley wrote:
> Yes but that contradicts what Barry is appearing to ask for which is run time interoperability, by profile or configuration.

I can tell you that I don't think Barry and I are asking for
contradictory things. They are different, but not contradictory,
and have the same goal (interop). I believe Barry would agree
with that.

Saying that field X is MTI can be entirely consistent with
defining a protocol that allow for negotiating whether or
not to use field X for example.

So you seem to be starting from a false dichotomy.

S.

> 
> While having code available in libraries is generally a good thing, I agree.  That is likely not going to address all of Barry's issues.
> 
> A number of us recommended that Assertions , JWT-assertions and SAML assertions go ahead together because they are interrelated.  The chairs decided to send assertions on on it's own and it has been pushed back.
> That is not especialy surprising, because it is not intended to be complete and interoperable in a end to end system on its own.
> 
> The question remains where to make what MTI.   While it may be logical to make SAML support MTI in SAML assertions should every library supporting assertions have full SAML support even if the applications are only using JWT assertions?  
> 
> Where I think Barry and I agree is that we need to look at a group of documents that are intended to be used together for MTI rather than trying to overload Assertions which is only a small part of the whole.
> 
> So where we may disagree is if requiring libraries to have code that systems don't use and is effectively dead, helps with overall interoperability or is mostly theatre.
> 
> I suspect it is a continuum in that having the RS256 algorithm available in all the JWT assertion libraries lets applications using assertions choose to use it, but that doesn't guarantee all applications will,  or allow a client to figure out if that algorithm is available for use.
> 
> Hence my position that MTI without additional profiles/Discovery/negotiation is interoperability theatre if you are pretending it will make arbitrary OAuth deployments automatically work together.
> 
> Regards
> John B.
> 
> On 2013-02-19, at 4:22 AM, SM <sm@resistor.net> wrote:
> 
>> Hi John,
>> At 12:54 18-02-2013, John Bradley wrote:
>>> That is where we get into the area Stephen Farrell has been raising about MTI not being required to deploy.
>>
>> The topic of mandatory to implement has been discussed previously in the working group.
>> Stephen Farrell explained [1] what it meant.  Barry Leiba explained what it meant.
>>
>> In my humble opinion a mandatory to implement feature is about having the code for the feature.  If the code is out there it is easier to get what you want.
>>
>> Regards,
>> -sm 
> 
> 
> 
> _______________________________________________
> OAuth mailing list
> OAuth@ietf.org
> https://www.ietf.org/mailman/listinfo/oauth
> 

From ve7jtb@ve7jtb.com  Tue Feb 19 07:58:16 2013
Return-Path: <ve7jtb@ve7jtb.com>
X-Original-To: oauth@ietfa.amsl.com
Delivered-To: oauth@ietfa.amsl.com
Received: from localhost (localhost [127.0.0.1]) by ietfa.amsl.com (Postfix) with ESMTP id D56DE21F8952 for <oauth@ietfa.amsl.com>; Tue, 19 Feb 2013 07:58:16 -0800 (PST)
X-Virus-Scanned: amavisd-new at amsl.com
X-Spam-Flag: NO
X-Spam-Score: -3.452
X-Spam-Level: 
X-Spam-Status: No, score=-3.452 tagged_above=-999 required=5 tests=[AWL=0.146,  BAYES_00=-2.599, HTML_MESSAGE=0.001, RCVD_IN_DNSWL_LOW=-1]
Received: from mail.ietf.org ([64.170.98.30]) by localhost (ietfa.amsl.com [127.0.0.1]) (amavisd-new, port 10024) with ESMTP id zyUTIHDwjSDR for <oauth@ietfa.amsl.com>; Tue, 19 Feb 2013 07:58:16 -0800 (PST)
Received: from mail-qc0-f175.google.com (mail-qc0-f175.google.com [209.85.216.175]) by ietfa.amsl.com (Postfix) with ESMTP id 7D52B21F87E4 for <oauth@ietf.org>; Tue, 19 Feb 2013 07:58:15 -0800 (PST)
Received: by mail-qc0-f175.google.com with SMTP id j3so2587383qcs.20 for <oauth@ietf.org>; Tue, 19 Feb 2013 07:58:14 -0800 (PST)
X-Google-DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=google.com; s=20120113; h=x-received:content-type:mime-version:subject:from:in-reply-to:date :cc:message-id:references:to:x-mailer:x-gm-message-state; bh=8WRmFHomr7F/1cQiSl/A7xG/KcLC5IuI4iaEEvwJ1hE=; b=jcBYxYr+vGMZhVV0Z/cmxD2eI8mI7qWY9y5HaQ6515HwiKNSfUy4HSlZTO5rnNTW3a neErGnjn7wD7lt9YAPzO0ocVfj/QuzU0a0neHS16XvS/T8ut5KTDCCVIuoVI0y/rGJ4g ktPXem2NtNfgPG32uc2e2mhxqGsTdV9AvW5DVu9A060ZANSzFbcZCsqp4hKM1PgD0JqS pGZ57SM3417XM7UbwmkbOdRNSXlHixqO1s9S/C2jycJswgp6H0Ddbdj/EEKU2AQhA6xV QSnkofBrnUvtRxM1lLqYtz+G7g6AQT3ehK9A3en6qws0aZLzUlJX2PkYs3oZ/Efub/gR DvCg==
X-Received: by 10.49.133.68 with SMTP id pa4mr7624472qeb.50.1361289494766; Tue, 19 Feb 2013 07:58:14 -0800 (PST)
Received: from [192.168.1.213] (190-20-4-185.baf.movistar.cl. [190.20.4.185]) by mx.google.com with ESMTPS id no8sm15032371qeb.0.2013.02.19.07.58.07 (version=TLSv1 cipher=ECDHE-RSA-RC4-SHA bits=128/128); Tue, 19 Feb 2013 07:58:09 -0800 (PST)
Content-Type: multipart/signed; boundary="Apple-Mail=_FB3D99D5-4FB6-4975-888F-48383E7AD92A"; protocol="application/pkcs7-signature"; micalg=sha1
Mime-Version: 1.0 (Mac OS X Mail 6.2 \(1499\))
From: John Bradley <ve7jtb@ve7jtb.com>
In-Reply-To: <59E470B10C4630419ED717AC79FCF9A948D552B8@BY2PRD0411MB441.namprd04.prod.outlook.com>
Date: Tue, 19 Feb 2013 12:57:27 -0300
Message-Id: <91236FDA-46F3-457F-AB60-CC08EF5A4574@ve7jtb.com>
References: <59E470B10C4630419ED717AC79FCF9A948D552B8@BY2PRD0411MB441.namprd04.prod.outlook.com>
To: Lewis Adam-CAL022 <Adam.Lewis@motorolasolutions.com>
X-Mailer: Apple Mail (2.1499)
X-Gm-Message-State: ALoCoQk4CwQrxx0J0NcSkN9k4ZyPbfIUK/6lxEIKM+UR2jVJoQvFDCcne/CLffmsm/TuZ2l86HkA
Cc: "oauth@ietf.org WG" <oauth@ietf.org>
Subject: Re: [OAUTH-WG] JWT grant_type and client_id
X-BeenThere: oauth@ietf.org
X-Mailman-Version: 2.1.12
Precedence: list
List-Id: OAUTH WG <oauth.ietf.org>
List-Unsubscribe: <https://www.ietf.org/mailman/options/oauth>, <mailto:oauth-request@ietf.org?subject=unsubscribe>
List-Archive: <http://www.ietf.org/mail-archive/web/oauth>
List-Post: <mailto:oauth@ietf.org>
List-Help: <mailto:oauth-request@ietf.org?subject=help>
List-Subscribe: <https://www.ietf.org/mailman/listinfo/oauth>, <mailto:oauth-request@ietf.org?subject=subscribe>
X-List-Received-Date: Tue, 19 Feb 2013 15:58:17 -0000

--Apple-Mail=_FB3D99D5-4FB6-4975-888F-48383E7AD92A
Content-Type: multipart/alternative;
	boundary="Apple-Mail=_42D0620B-1CD0-4C9F-A2F5-CA9B394FA241"


--Apple-Mail=_42D0620B-1CD0-4C9F-A2F5-CA9B394FA241
Content-Transfer-Encoding: quoted-printable
Content-Type: text/plain;
	charset=windows-1252

At the moment no,

The HoK work is ongoing.

If you are talking about using an assertion as a authorization grant the =
subject should be the resource owner or some proxy for that. =20

In Connect that would be the user_id not the client_id.  We have added =
Authorized party "azp" to connect id_tokens that would be where the =
client_id of the requester of the token would go.
That however is a Connect extension of JWT and not documented as part of =
assertion processing.

One might expect that in some cases the token endpoint might =
authenticate the client and match the client_id with the value of "azp" =
for increased security.  That can be done now and is a bit like =
symmetric proof of possession where azp is used as a reference.

Once you start crossing trust boundaries things get more complicated as =
the client probably has different client_id for each AS.  So at that =
point you can't use the client_id and need to probably go to asymmetric =
proof of possession and trust that the initial assertion in the chain =
has properly authenticated the client.

This needs more work to flesh out.  I know Justin is also working on =
some token chaining proposals.

John B.



On 2013-02-18, at 7:50 PM, Lewis Adam-CAL022 =
<Adam.Lewis@motorolasolutions.com> wrote:

> =20
> Is there any guidance on the usage of client_id when using the JWT =
assertion profile as a grant type?  draft-ietf-oauth-jwt-bearer-04 makes =
no mention so I assume that it is not required =85 but it would be =
necessary if using in conjunction with a HOK profile where the JWT =
assertion is issued to =96 and may only be used by =96 the intended =
client.  Obviously this is straight forward enough, really I=92m just =
looking to be sure that I=92m not missing anything.
> =20
> tx
> adam
> _______________________________________________
> OAuth mailing list
> OAuth@ietf.org
> https://www.ietf.org/mailman/listinfo/oauth


--Apple-Mail=_42D0620B-1CD0-4C9F-A2F5-CA9B394FA241
Content-Transfer-Encoding: quoted-printable
Content-Type: text/html;
	charset=windows-1252

<html><head><meta http-equiv=3D"Content-Type" content=3D"text/html =
charset=3Dwindows-1252"><base href=3D"x-msg://314/"></head><body =
style=3D"word-wrap: break-word; -webkit-nbsp-mode: space; =
-webkit-line-break: after-white-space; ">At the moment =
no,<div><br></div><div>The HoK work is =
ongoing.</div><div><br></div><div>If you are talking about using an =
assertion as a authorization grant the subject should be the resource =
owner or some proxy for that. &nbsp;</div><div><br></div><div>In Connect =
that would be the user_id not the client_id. &nbsp;We have added =
Authorized party "azp" to connect id_tokens that would be where the =
client_id of the requester of the token would go.</div><div>That however =
is a Connect extension of JWT and not documented as part of assertion =
processing.</div><div><br></div><div>One might expect that in some cases =
the token endpoint might authenticate the client and match the client_id =
with the value of "azp" for increased security. &nbsp;That can be done =
now and is a bit like symmetric proof of possession where azp is used as =
a reference.</div><div><br></div><div>Once you start crossing trust =
boundaries things get more complicated as the client probably has =
different client_id for each AS. &nbsp;So at that point you can't use =
the client_id and need to probably go to asymmetric proof of possession =
and trust that the initial assertion in the chain has properly =
authenticated the client.</div><div><br></div><div>This needs more work =
to flesh out. &nbsp;I know Justin is also working on some token chaining =
proposals.</div><div><br></div><div>John =
B.</div><div><br></div><div><br></div><div><br><div><div>On 2013-02-18, =
at 7:50 PM, Lewis Adam-CAL022 &lt;<a =
href=3D"mailto:Adam.Lewis@motorolasolutions.com">Adam.Lewis@motorolasoluti=
ons.com</a>&gt; wrote:</div><br =
class=3D"Apple-interchange-newline"><blockquote type=3D"cite"><div =
lang=3D"EN-US" link=3D"blue" vlink=3D"purple" style=3D"font-family: =
Helvetica; font-size: medium; font-style: normal; font-variant: normal; =
font-weight: normal; letter-spacing: normal; line-height: normal; =
orphans: 2; text-align: -webkit-auto; text-indent: 0px; text-transform: =
none; white-space: normal; widows: 2; word-spacing: 0px; =
-webkit-text-size-adjust: auto; -webkit-text-stroke-width: 0px; "><div =
class=3D"WordSection1" style=3D"page: WordSection1; "><div =
style=3D"margin: 0in 0in 0.0001pt; font-size: 11pt; font-family: =
Calibri, sans-serif; "><span style=3D"font-size: 10.5pt; font-family: =
'Book Antiqua', serif; ">&nbsp;</span></div><div style=3D"margin: 0in =
0in 0.0001pt; font-size: 11pt; font-family: Calibri, sans-serif; "><span =
style=3D"font-size: 10.5pt; font-family: 'Book Antiqua', serif; ">Is =
there any guidance on the usage of client_id when using the JWT =
assertion profile as a grant type?&nbsp; draft-ietf-oauth-jwt-bearer-04 =
makes no mention so I assume that it is not required =85 but it would be =
necessary if using in conjunction with a HOK profile where the JWT =
assertion is issued to =96 and may only be used by =96 the intended =
client.&nbsp; Obviously this is straight forward enough, really I=92m =
just looking to be sure that I=92m not missing =
anything.<o:p></o:p></span></div><div style=3D"margin: 0in 0in 0.0001pt; =
font-size: 11pt; font-family: Calibri, sans-serif; "><span =
style=3D"font-size: 10.5pt; font-family: 'Book Antiqua', serif; =
">&nbsp;</span></div><div style=3D"margin: 0in 0in 0.0001pt; font-size: =
11pt; font-family: Calibri, sans-serif; "><span style=3D"font-size: =
10.5pt; font-family: 'Book Antiqua', serif; =
">tx<o:p></o:p></span></div><div style=3D"margin: 0in 0in 0.0001pt; =
font-size: 11pt; font-family: Calibri, sans-serif; "><span =
style=3D"font-size: 10.5pt; font-family: 'Book Antiqua', serif; =
">adam<o:p></o:p></span></div></div>______________________________________=
_________<br>OAuth mailing list<br><a href=3D"mailto:OAuth@ietf.org" =
style=3D"color: purple; text-decoration: underline; =
">OAuth@ietf.org</a><br><a =
href=3D"https://www.ietf.org/mailman/listinfo/oauth" style=3D"color: =
purple; text-decoration: underline; =
">https://www.ietf.org/mailman/listinfo/oauth</a></div></blockquote></div>=
<br></div></body></html>=

--Apple-Mail=_42D0620B-1CD0-4C9F-A2F5-CA9B394FA241--

--Apple-Mail=_FB3D99D5-4FB6-4975-888F-48383E7AD92A
Content-Disposition: attachment;
	filename=smime.p7s
Content-Type: application/pkcs7-signature;
	name=smime.p7s
Content-Transfer-Encoding: base64
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--Apple-Mail=_FB3D99D5-4FB6-4975-888F-48383E7AD92A--

From barryleiba.mailing.lists@gmail.com  Tue Feb 19 11:10:27 2013
Return-Path: <barryleiba.mailing.lists@gmail.com>
X-Original-To: oauth@ietfa.amsl.com
Delivered-To: oauth@ietfa.amsl.com
Received: from localhost (localhost [127.0.0.1]) by ietfa.amsl.com (Postfix) with ESMTP id 27C9721F8E79 for <oauth@ietfa.amsl.com>; Tue, 19 Feb 2013 11:10:27 -0800 (PST)
X-Virus-Scanned: amavisd-new at amsl.com
X-Spam-Flag: NO
X-Spam-Score: -102.977
X-Spam-Level: 
X-Spam-Status: No, score=-102.977 tagged_above=-999 required=5 tests=[BAYES_00=-2.599, FM_FORGED_GMAIL=0.622, RCVD_IN_DNSWL_LOW=-1, USER_IN_WHITELIST=-100]
Received: from mail.ietf.org ([64.170.98.30]) by localhost (ietfa.amsl.com [127.0.0.1]) (amavisd-new, port 10024) with ESMTP id PXyxlO3VVpG4 for <oauth@ietfa.amsl.com>; Tue, 19 Feb 2013 11:10:26 -0800 (PST)
Received: from mail-ve0-f178.google.com (mail-ve0-f178.google.com [209.85.128.178]) by ietfa.amsl.com (Postfix) with ESMTP id 6FDDA21F8E5A for <oauth@ietf.org>; Tue, 19 Feb 2013 11:10:26 -0800 (PST)
Received: by mail-ve0-f178.google.com with SMTP id db10so6087692veb.23 for <oauth@ietf.org>; Tue, 19 Feb 2013 11:10:25 -0800 (PST)
DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=gmail.com; s=20120113; h=mime-version:x-received:sender:in-reply-to:references:date :x-google-sender-auth:message-id:subject:from:to:cc:content-type; bh=e9gGNUubkznln0PxUZJdAlncejIDaXnUXiJJKk0ebNc=; b=hwulRwpXfCZiYlf1EJpsSnMMN2kGIW2GiTujXJJkDH5OAvuGpF8FTFgETIHScf/Uss Uoc58M2YNKTOLiTYy22Tc+sm5/LnJ2jptgPN86uPpBAjEVtpHSSEIowi+EWVxaUgqNO3 3TOklUgMrQ9elRld8v4A/OD/9qd24JOf/2OIdoBLzgn8/HENwfK1Mn0fj2zyTrIGQRjJ OlY3tzLojKtrgU6sUqRNfUkPG32uT2ENgaHj6fgmEsC2p0iw2awAqaAFPUKOF1TXgBzt sFu4h/xVVmGV6CTi5uXnaQgRJqM0vj/7Y3l0EVkAVaeLPYz3Z1S+Stcc+efrLR2Po0AC ziLQ==
MIME-Version: 1.0
X-Received: by 10.58.48.231 with SMTP id p7mr22981477ven.11.1361301025823; Tue, 19 Feb 2013 11:10:25 -0800 (PST)
Sender: barryleiba.mailing.lists@gmail.com
Received: by 10.59.3.41 with HTTP; Tue, 19 Feb 2013 11:10:25 -0800 (PST)
In-Reply-To: <5123970D.6010000@cs.tcd.ie>
References: <51212E78.1050206@cs.tcd.ie> <4E1F6AAD24975D4BA5B16804296739436746DC1C@TK5EX14MBXC284.redmond.corp.microsoft.com> <51214AC5.3090807@cs.tcd.ie> <4E1F6AAD24975D4BA5B16804296739436746DE40@TK5EX14MBXC284.redmond.corp.microsoft.com> <CALaySJ+YM9_DJ5KB1AnF+D-_1=jMhCdsxrgB3jQaaCLsB7w1Kg@mail.gmail.com> <37B4C89F-2864-4317-BF87-F562241C176D@ve7jtb.com> <CALaySJ+bcFnn1H8Fx2R71TQMJak84AirJ9+a-KXX9h-FgZ8BtQ@mail.gmail.com> <87A4BE12-AC72-4E35-A95F-E6F161CF170B@ve7jtb.com> <6.2.5.6.2.20130218225317.09ae39d8@resistor.net> <5766DCFA-2A1B-4E55-AA29-58038C3A4515@ve7jtb.com> <5123970D.6010000@cs.tcd.ie>
Date: Tue, 19 Feb 2013 14:10:25 -0500
X-Google-Sender-Auth: FSdphOC2XdtOAhxySZuL3iuTP4s
Message-ID: <CAC4RtVC3p=mF=jvAj6Y0RurKuKwFbKsHBaaJ4OeBbuNkAWB28Q@mail.gmail.com>
From: Barry Leiba <barryleiba@computer.org>
To: Stephen Farrell <stephen.farrell@cs.tcd.ie>
Content-Type: text/plain; charset=ISO-8859-1
Cc: OAuth WG <oauth@ietf.org>
Subject: Re: [OAUTH-WG] Mandatory to implement
X-BeenThere: oauth@ietf.org
X-Mailman-Version: 2.1.12
Precedence: list
List-Id: OAUTH WG <oauth.ietf.org>
List-Unsubscribe: <https://www.ietf.org/mailman/options/oauth>, <mailto:oauth-request@ietf.org?subject=unsubscribe>
List-Archive: <http://www.ietf.org/mail-archive/web/oauth>
List-Post: <mailto:oauth@ietf.org>
List-Help: <mailto:oauth-request@ietf.org?subject=help>
List-Subscribe: <https://www.ietf.org/mailman/listinfo/oauth>, <mailto:oauth-request@ietf.org?subject=subscribe>
X-List-Received-Date: Tue, 19 Feb 2013 19:10:27 -0000

> I can tell you that I don't think Barry and I are asking for
> contradictory things. They are different, but not contradictory,
> and have the same goal (interop). I believe Barry would agree
> with that.
>
> Saying that field X is MTI can be entirely consistent with
> defining a protocol that allow for negotiating whether or
> not to use field X for example.

He would, indeed agree with that -- with all of it.

Barry

From Michael.Jones@microsoft.com  Tue Feb 19 11:16:27 2013
Return-Path: <Michael.Jones@microsoft.com>
X-Original-To: oauth@ietfa.amsl.com
Delivered-To: oauth@ietfa.amsl.com
Received: from localhost (localhost [127.0.0.1]) by ietfa.amsl.com (Postfix) with ESMTP id 57C8C21F8E5E for <oauth@ietfa.amsl.com>; Tue, 19 Feb 2013 11:16:27 -0800 (PST)
X-Virus-Scanned: amavisd-new at amsl.com
X-Spam-Flag: NO
X-Spam-Score: -2.581
X-Spam-Level: 
X-Spam-Status: No, score=-2.581 tagged_above=-999 required=5 tests=[AWL=0.018,  BAYES_00=-2.599]
Received: from mail.ietf.org ([64.170.98.30]) by localhost (ietfa.amsl.com [127.0.0.1]) (amavisd-new, port 10024) with ESMTP id e+Q1pWbFBlB7 for <oauth@ietfa.amsl.com>; Tue, 19 Feb 2013 11:16:26 -0800 (PST)
Received: from na01-by2-obe.outbound.protection.outlook.com (na01-by2-obe.ptr.protection.outlook.com [207.46.100.28]) by ietfa.amsl.com (Postfix) with ESMTP id 5EA7F21F8E54 for <oauth@ietf.org>; Tue, 19 Feb 2013 11:16:26 -0800 (PST)
Received: from BY2FFO11FD002.protection.gbl (10.1.15.201) by BY2FFO11HUB006.protection.gbl (10.1.14.164) with Microsoft SMTP Server (TLS) id 15.0.620.12; Tue, 19 Feb 2013 19:16:24 +0000
Received: from TK5EX14MLTC104.redmond.corp.microsoft.com (131.107.125.37) by BY2FFO11FD002.mail.protection.outlook.com (10.1.14.124) with Microsoft SMTP Server (TLS) id 15.0.620.12 via Frontend Transport; Tue, 19 Feb 2013 19:16:24 +0000
Received: from TK5EX14MBXC284.redmond.corp.microsoft.com ([169.254.1.96]) by TK5EX14MLTC104.redmond.corp.microsoft.com ([157.54.79.159]) with mapi id 14.02.0318.003; Tue, 19 Feb 2013 19:15:56 +0000
From: Mike Jones <Michael.Jones@microsoft.com>
To: Barry Leiba <barryleiba@computer.org>, Stephen Farrell <stephen.farrell@cs.tcd.ie>
Thread-Topic: [OAUTH-WG] Mandatory to implement
Thread-Index: AQHODrQjHisin4DoI0upPaEhiPMf95iBjCKAgAAAQkA=
Date: Tue, 19 Feb 2013 19:15:56 +0000
Message-ID: <4E1F6AAD24975D4BA5B168042967394367476EB0@TK5EX14MBXC284.redmond.corp.microsoft.com>
References: <51212E78.1050206@cs.tcd.ie> <4E1F6AAD24975D4BA5B16804296739436746DC1C@TK5EX14MBXC284.redmond.corp.microsoft.com> <51214AC5.3090807@cs.tcd.ie> <4E1F6AAD24975D4BA5B16804296739436746DE40@TK5EX14MBXC284.redmond.corp.microsoft.com> <CALaySJ+YM9_DJ5KB1AnF+D-_1=jMhCdsxrgB3jQaaCLsB7w1Kg@mail.gmail.com> <37B4C89F-2864-4317-BF87-F562241C176D@ve7jtb.com> <CALaySJ+bcFnn1H8Fx2R71TQMJak84AirJ9+a-KXX9h-FgZ8BtQ@mail.gmail.com> <87A4BE12-AC72-4E35-A95F-E6F161CF170B@ve7jtb.com> <6.2.5.6.2.20130218225317.09ae39d8@resistor.net> <5766DCFA-2A1B-4E55-AA29-58038C3A4515@ve7jtb.com> <5123970D.6010000@cs.tcd.ie> <CAC4RtVC3p=mF=jvAj6Y0RurKuKwFbKsHBaaJ4OeBbuNkAWB28Q@mail.gmail.com>
In-Reply-To: <CAC4RtVC3p=mF=jvAj6Y0RurKuKwFbKsHBaaJ4OeBbuNkAWB28Q@mail.gmail.com>
Accept-Language: en-US
Content-Language: en-US
X-MS-Has-Attach: 
X-MS-TNEF-Correlator: 
x-originating-ip: [157.54.51.32]
Content-Type: text/plain; charset="us-ascii"
Content-Transfer-Encoding: quoted-printable
MIME-Version: 1.0
X-Forefront-Antispam-Report: CIP:131.107.125.37; CTRY:US; IPV:CAL; IPV:NLI; EFV:NLI; SFV:NSPM; SFS:(51704002)(164054002)(13464002)(189002)(199002)(377454001)(50986001)(16406001)(77982001)(79102001)(76482001)(53806001)(59766001)(55846006)(51856001)(23726001)(54316002)(44976002)(56776001)(50466001)(47736001)(47976001)(46406002)(54356001)(49866001)(4396001)(63696002)(20776003)(47776003)(31966008)(56816002)(80022001)(74502001)(74662001)(66066001)(33656001)(47446002)(46102001)(5343655001)(65816001); DIR:OUT; SFP:; SCL:1; SRVR:BY2FFO11HUB006; H:TK5EX14MLTC104.redmond.corp.microsoft.com; RD:InfoDomainNonexistent; MX:1; A:1; LANG:en; 
X-OriginatorOrg: microsoft.onmicrosoft.com
X-Forefront-PRVS: 0762FFD075
Cc: OAuth WG <oauth@ietf.org>
Subject: Re: [OAUTH-WG] Mandatory to implement
X-BeenThere: oauth@ietf.org
X-Mailman-Version: 2.1.12
Precedence: list
List-Id: OAUTH WG <oauth.ietf.org>
List-Unsubscribe: <https://www.ietf.org/mailman/options/oauth>, <mailto:oauth-request@ietf.org?subject=unsubscribe>
List-Archive: <http://www.ietf.org/mail-archive/web/oauth>
List-Post: <mailto:oauth@ietf.org>
List-Help: <mailto:oauth-request@ietf.org?subject=help>
List-Subscribe: <https://www.ietf.org/mailman/listinfo/oauth>, <mailto:oauth-request@ietf.org?subject=subscribe>
X-List-Received-Date: Tue, 19 Feb 2013 19:16:27 -0000

All of this discussion is occurring at a pretty abstract level.  I hope we =
can soon make it concrete, because then it would be actionable.

Do any of you who felt that changes might be needed to the Assertions spec =
or related specs have specific textual changes to propose to any of the spe=
cs, which we could then consider the merits of together?

				Thanks,
				-- Mike

-----Original Message-----
From: oauth-bounces@ietf.org [mailto:oauth-bounces@ietf.org] On Behalf Of B=
arry Leiba
Sent: Tuesday, February 19, 2013 11:10 AM
To: Stephen Farrell
Cc: OAuth WG
Subject: Re: [OAUTH-WG] Mandatory to implement

> I can tell you that I don't think Barry and I are asking for=20
> contradictory things. They are different, but not contradictory, and=20
> have the same goal (interop). I believe Barry would agree with that.
>
> Saying that field X is MTI can be entirely consistent with defining a=20
> protocol that allow for negotiating whether or not to use field X for=20
> example.

He would, indeed agree with that -- with all of it.

Barry
_______________________________________________
OAuth mailing list
OAuth@ietf.org
https://www.ietf.org/mailman/listinfo/oauth

From ve7jtb@ve7jtb.com  Tue Feb 19 11:27:54 2013
Return-Path: <ve7jtb@ve7jtb.com>
X-Original-To: oauth@ietfa.amsl.com
Delivered-To: oauth@ietfa.amsl.com
Received: from localhost (localhost [127.0.0.1]) by ietfa.amsl.com (Postfix) with ESMTP id E9C6D21F8E84 for <oauth@ietfa.amsl.com>; Tue, 19 Feb 2013 11:27:54 -0800 (PST)
X-Virus-Scanned: amavisd-new at amsl.com
X-Spam-Flag: NO
X-Spam-Score: -3.456
X-Spam-Level: 
X-Spam-Status: No, score=-3.456 tagged_above=-999 required=5 tests=[AWL=0.143,  BAYES_00=-2.599, RCVD_IN_DNSWL_LOW=-1]
Received: from mail.ietf.org ([64.170.98.30]) by localhost (ietfa.amsl.com [127.0.0.1]) (amavisd-new, port 10024) with ESMTP id iUQ+TL9goyRi for <oauth@ietfa.amsl.com>; Tue, 19 Feb 2013 11:27:54 -0800 (PST)
Received: from mail-qc0-f173.google.com (mail-qc0-f173.google.com [209.85.216.173]) by ietfa.amsl.com (Postfix) with ESMTP id E5BAD21F8E5A for <oauth@ietf.org>; Tue, 19 Feb 2013 11:27:53 -0800 (PST)
Received: by mail-qc0-f173.google.com with SMTP id b12so2702381qca.18 for <oauth@ietf.org>; Tue, 19 Feb 2013 11:27:53 -0800 (PST)
X-Google-DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=google.com; s=20120113; h=x-received:content-type:mime-version:subject:from:in-reply-to:date :cc:message-id:references:to:x-mailer:x-gm-message-state; bh=vKtCxH512U3QbkRHfvvMkYlp0BQDFRHE3KfjAon0bMc=; b=MD5UKv2nSGo5IIwXvWgtDjynOJUbUABSUT411cOk80rHF0bNY4JahMqKkXUy1dvDzw wtubl2tRHjghYRMioD3iRHEf1BrqzN8nF4ooZHfvFrAY/s6xzp18uuZwLK1/SzdNC2Tv h1gc+N8GVOUcNKDNp6FxPg+6MZSIypJ0ZMhAJDU+goNxqt6ypcC7mfgemqpgqSERJSp0 f+q63IS9l2Hp2GWrAjQaQNMY0vJCBg37XLQgRDVxfH8R3ohfc0du80rBucr5s8EVFhkh Jhw5SoERyfGjQYAr5GBiXX4RMK1soBYs7B8bfG+YTb+4xEU+x22h32YmpyyCqsuPScp4 uvXg==
X-Received: by 10.224.58.147 with SMTP id g19mr8143590qah.22.1361302073369; Tue, 19 Feb 2013 11:27:53 -0800 (PST)
Received: from [192.168.1.213] (190-20-4-185.baf.movistar.cl. [190.20.4.185]) by mx.google.com with ESMTPS id t2sm28552708qav.1.2013.02.19.11.27.49 (version=TLSv1 cipher=ECDHE-RSA-RC4-SHA bits=128/128); Tue, 19 Feb 2013 11:27:50 -0800 (PST)
Content-Type: multipart/signed; boundary="Apple-Mail=_1435B0A5-F4A5-432E-A170-AD01727FFC57"; protocol="application/pkcs7-signature"; micalg=sha1
Mime-Version: 1.0 (Mac OS X Mail 6.2 \(1499\))
From: John Bradley <ve7jtb@ve7jtb.com>
In-Reply-To: <5123970D.6010000@cs.tcd.ie>
Date: Tue, 19 Feb 2013 16:26:37 -0300
Message-Id: <1FF61B36-AF1F-47B9-9D68-7C22EB93449B@ve7jtb.com>
References: <51212E78.1050206@cs.tcd.ie> <4E1F6AAD24975D4BA5B16804296739436746DC1C@TK5EX14MBXC284.redmond.corp.microsoft.com> <51214AC5.3090807@cs.tcd.ie> <4E1F6AAD24975D4BA5B16804296739436746DE40@TK5EX14MBXC284.redmond.corp.microsoft.com> <CALaySJ+YM9_DJ5KB1AnF+D-_1=jMhCdsxrgB3jQaaCLsB7w1Kg@mail.gmail.com> <37B4C89F-2864-4317-BF87-F562241C176D@ve7jtb.com> <CALaySJ+bcFnn1H8Fx2R71TQMJak84AirJ9+a-KXX9h-FgZ8BtQ@mail.gmail.com> <87A4BE12-AC72-4E35-A95F-E6F161CF170B@ve7jtb.com> <6.2.5.6.2.20130218225317.09ae39d8@resistor.net> <5766DCFA-2A1B-4E55-AA29-58038C3A4515@ve7jtb.com> <5123970D.6010000@cs.tcd.ie>
To: Stephen Farrell <stephen.farrell@cs.tcd.ie>
X-Mailer: Apple Mail (2.1499)
X-Gm-Message-State: ALoCoQmiK/26UtdQDdyGzLnUYfUqyUIUK5sbo+l+5dqs4pvRz8/Qj0DcKOIbB4gtThXEX1gcxAe3
Cc: oauth@ietf.org
Subject: Re: [OAUTH-WG] Mandatory to implement
X-BeenThere: oauth@ietf.org
X-Mailman-Version: 2.1.12
Precedence: list
List-Id: OAUTH WG <oauth.ietf.org>
List-Unsubscribe: <https://www.ietf.org/mailman/options/oauth>, <mailto:oauth-request@ietf.org?subject=unsubscribe>
List-Archive: <http://www.ietf.org/mail-archive/web/oauth>
List-Post: <mailto:oauth@ietf.org>
List-Help: <mailto:oauth-request@ietf.org?subject=help>
List-Subscribe: <https://www.ietf.org/mailman/listinfo/oauth>, <mailto:oauth-request@ietf.org?subject=subscribe>
X-List-Received-Date: Tue, 19 Feb 2013 19:27:55 -0000

--Apple-Mail=_1435B0A5-F4A5-432E-A170-AD01727FFC57
Content-Transfer-Encoding: quoted-printable
Content-Type: text/plain;
	charset=iso-8859-1

Sorry I did not intend to imply that what Barry is asking for is =
contradictory to MTI, only that it is different enough that it may =
require more than MTI of the existing features.
As stated in the second line of the message.

I think we need to get down to discussing specific changes.

John B.

On 2013-02-19, at 12:15 PM, Stephen Farrell <stephen.farrell@cs.tcd.ie> =
wrote:

>=20
>=20
> On 02/19/2013 02:58 PM, John Bradley wrote:
>> Yes but that contradicts what Barry is appearing to ask for which is =
run time interoperability, by profile or configuration.
>=20
> I can tell you that I don't think Barry and I are asking for
> contradictory things. They are different, but not contradictory,
> and have the same goal (interop). I believe Barry would agree
> with that.
>=20
> Saying that field X is MTI can be entirely consistent with
> defining a protocol that allow for negotiating whether or
> not to use field X for example.
>=20
> So you seem to be starting from a false dichotomy.
>=20
> S.
>=20
>>=20
>> While having code available in libraries is generally a good thing, I =
agree.  That is likely not going to address all of Barry's issues.
>>=20
>> A number of us recommended that Assertions , JWT-assertions and SAML =
assertions go ahead together because they are interrelated.  The chairs =
decided to send assertions on on it's own and it has been pushed back.
>> That is not especialy surprising, because it is not intended to be =
complete and interoperable in a end to end system on its own.
>>=20
>> The question remains where to make what MTI.   While it may be =
logical to make SAML support MTI in SAML assertions should every library =
supporting assertions have full SAML support even if the applications =
are only using JWT assertions? =20
>>=20
>> Where I think Barry and I agree is that we need to look at a group of =
documents that are intended to be used together for MTI rather than =
trying to overload Assertions which is only a small part of the whole.
>>=20
>> So where we may disagree is if requiring libraries to have code that =
systems don't use and is effectively dead, helps with overall =
interoperability or is mostly theatre.
>>=20
>> I suspect it is a continuum in that having the RS256 algorithm =
available in all the JWT assertion libraries lets applications using =
assertions choose to use it, but that doesn't guarantee all applications =
will,  or allow a client to figure out if that algorithm is available =
for use.
>>=20
>> Hence my position that MTI without additional =
profiles/Discovery/negotiation is interoperability theatre if you are =
pretending it will make arbitrary OAuth deployments automatically work =
together.
>>=20
>> Regards
>> John B.
>>=20
>> On 2013-02-19, at 4:22 AM, SM <sm@resistor.net> wrote:
>>=20
>>> Hi John,
>>> At 12:54 18-02-2013, John Bradley wrote:
>>>> That is where we get into the area Stephen Farrell has been raising =
about MTI not being required to deploy.
>>>=20
>>> The topic of mandatory to implement has been discussed previously in =
the working group.
>>> Stephen Farrell explained [1] what it meant.  Barry Leiba explained =
what it meant.
>>>=20
>>> In my humble opinion a mandatory to implement feature is about =
having the code for the feature.  If the code is out there it is easier =
to get what you want.
>>>=20
>>> Regards,
>>> -sm=20
>>=20
>>=20
>>=20
>> _______________________________________________
>> OAuth mailing list
>> OAuth@ietf.org
>> https://www.ietf.org/mailman/listinfo/oauth
>>=20


--Apple-Mail=_1435B0A5-F4A5-432E-A170-AD01727FFC57
Content-Disposition: attachment;
	filename=smime.p7s
Content-Type: application/pkcs7-signature;
	name=smime.p7s
Content-Transfer-Encoding: base64
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--Apple-Mail=_1435B0A5-F4A5-432E-A170-AD01727FFC57--

From ietf-ipr@ietf.org  Tue Feb 19 11:58:20 2013
Return-Path: <ietf-ipr@ietf.org>
X-Original-To: oauth@ietfa.amsl.com
Delivered-To: oauth@ietfa.amsl.com
Received: from localhost (localhost [127.0.0.1]) by ietfa.amsl.com (Postfix) with ESMTP id 5508C21F8BEC; Tue, 19 Feb 2013 11:58:20 -0800 (PST)
X-Virus-Scanned: amavisd-new at amsl.com
X-Spam-Flag: NO
X-Spam-Score: -102.426
X-Spam-Level: 
X-Spam-Status: No, score=-102.426 tagged_above=-999 required=5 tests=[AWL=0.173, BAYES_00=-2.599, USER_IN_WHITELIST=-100]
Received: from mail.ietf.org ([64.170.98.30]) by localhost (ietfa.amsl.com [127.0.0.1]) (amavisd-new, port 10024) with ESMTP id uWIjnrQhPv9W; Tue, 19 Feb 2013 11:58:19 -0800 (PST)
Received: from ietfa.amsl.com (localhost [127.0.0.1]) by ietfa.amsl.com (Postfix) with ESMTP id 8D2AE21F8878; Tue, 19 Feb 2013 11:58:19 -0800 (PST)
MIME-Version: 1.0
Content-Type: text/plain; charset="utf-8"
Content-Transfer-Encoding: quoted-printable
From: IETF Secretariat <ietf-ipr@ietf.org>
To: mbj@microsoft.com, ve7jtb@ve7jtb.com, n-sakimura@nri.co.jp
X-Test-IDTracker: no
X-IETF-IDTracker: 4.40
Message-ID: <20130219195819.10604.99356.idtracker@ietfa.amsl.com>
Date: Tue, 19 Feb 2013 11:58:19 -0800
Cc: derek@ihtfp.com, oauth@ietf.org, ipr-announce@ietf.org
Subject: [OAUTH-WG] IPR Disclosure: Certicom Corporation's Statement about IPR related to	draft-ietf-oauth-json-web-token-06
X-BeenThere: oauth@ietf.org
X-Mailman-Version: 2.1.12
Precedence: list
List-Id: OAUTH WG <oauth.ietf.org>
List-Unsubscribe: <https://www.ietf.org/mailman/options/oauth>, <mailto:oauth-request@ietf.org?subject=unsubscribe>
List-Archive: <http://www.ietf.org/mail-archive/web/oauth>
List-Post: <mailto:oauth@ietf.org>
List-Help: <mailto:oauth-request@ietf.org?subject=help>
List-Subscribe: <https://www.ietf.org/mailman/listinfo/oauth>, <mailto:oauth-request@ietf.org?subject=subscribe>
X-List-Received-Date: Tue, 19 Feb 2013 19:58:20 -0000

Dear Michael Jones, John Bradley, Nat Sakimura:

 An IPR disclosure that pertains to your Internet-Draft entitled "JSON Web =
Token
(JWT)" (draft-ietf-oauth-json-web-token) was submitted to the IETF Secretar=
iat
on 2013-02-19 and has been posted on the "IETF Page of Intellectual Property
Rights Disclosures" (https://datatracker.ietf.org/ipr/1964/). The title of =
the
IPR disclosure is "Certicom Corporation's Statement about IPR related to dr=
aft-
ietf-oauth-json-web-token-06."");

The IETF Secretariat


From sberyozkin@gmail.com  Wed Feb 20 03:45:34 2013
Return-Path: <sberyozkin@gmail.com>
X-Original-To: oauth@ietfa.amsl.com
Delivered-To: oauth@ietfa.amsl.com
Received: from localhost (localhost [127.0.0.1]) by ietfa.amsl.com (Postfix) with ESMTP id 52E3B21F8759 for <oauth@ietfa.amsl.com>; Wed, 20 Feb 2013 03:45:34 -0800 (PST)
X-Virus-Scanned: amavisd-new at amsl.com
X-Spam-Flag: NO
X-Spam-Score: -4.599
X-Spam-Level: 
X-Spam-Status: No, score=-4.599 tagged_above=-999 required=5 tests=[AWL=-1.000, BAYES_00=-2.599, RCVD_IN_DNSWL_LOW=-1]
Received: from mail.ietf.org ([64.170.98.30]) by localhost (ietfa.amsl.com [127.0.0.1]) (amavisd-new, port 10024) with ESMTP id WHWFenKeA4Gm for <oauth@ietfa.amsl.com>; Wed, 20 Feb 2013 03:45:33 -0800 (PST)
Received: from mail-ea0-f181.google.com (mail-ea0-f181.google.com [209.85.215.181]) by ietfa.amsl.com (Postfix) with ESMTP id 6118D21F8754 for <oauth@ietf.org>; Wed, 20 Feb 2013 03:45:33 -0800 (PST)
Received: by mail-ea0-f181.google.com with SMTP id i13so3243254eaa.26 for <oauth@ietf.org>; Wed, 20 Feb 2013 03:45:32 -0800 (PST)
DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=gmail.com; s=20120113; h=x-received:message-id:date:from:user-agent:mime-version:to:cc :subject:references:in-reply-to:content-type :content-transfer-encoding; bh=xgnIcgmfZpo7i2vAv9Lcx9SKjMQVchjxuaoD6WwW280=; b=ZBOQ47cp/+PZSJvxYLgXJRcqWedbfKrRG6WfDnAtJydmEYCupY73BDDS1pFGH398i1 +rb1oCqMl5tUbiMxYUtfjRCxCXCyI35DJdph0v9cf1ZTDoAq8z/Ry5JDJ0xdMiiWkYIM VAarWEkjY2R6bJxb2gcrnshoHLg90VfKOFirmMjIi442OmWZm37/hXVxwO0akbgv1CV7 7qR+Yxij6Wojk6kxn/Lqlm5uigTzYikKUcmscyL7brRFOQaLav/eBFCgvpxZJZdJEpZx 1W1rCzNkS+dulmdjOn7bvmV3zB4Q70aq+Vz0/qKYax++K3aiCHqXporX6izZloTozSg8 nABg==
X-Received: by 10.14.211.65 with SMTP id v41mr67897229eeo.33.1361360732580; Wed, 20 Feb 2013 03:45:32 -0800 (PST)
Received: from [192.168.2.5] ([79.97.76.201]) by mx.google.com with ESMTPS id s3sm38370095eem.4.2013.02.20.03.45.30 (version=TLSv1 cipher=ECDHE-RSA-RC4-SHA bits=128/128); Wed, 20 Feb 2013 03:45:31 -0800 (PST)
Message-ID: <5124B749.9050402@gmail.com>
Date: Wed, 20 Feb 2013 11:45:13 +0000
From: Sergey Beryozkin <sberyozkin@gmail.com>
User-Agent: Mozilla/5.0 (X11; Linux x86_64; rv:12.0) Gecko/20120430 Thunderbird/12.0.1
MIME-Version: 1.0
To: Brian Campbell <bcampbell@pingidentity.com>
References: <51238410.8040705@gmail.com> <CA+k3eCT-78fCzGYNk3JwLihsg6qDmu0LNdmgb_QE83ehdj0THA@mail.gmail.com>
In-Reply-To: <CA+k3eCT-78fCzGYNk3JwLihsg6qDmu0LNdmgb_QE83ehdj0THA@mail.gmail.com>
Content-Type: text/plain; charset=ISO-8859-1; format=flowed
Content-Transfer-Encoding: 7bit
Cc: "<oauth@ietf.org>" <oauth@ietf.org>
Subject: Re: [OAUTH-WG] Using SAML2 Bearer for the authentication
X-BeenThere: oauth@ietf.org
X-Mailman-Version: 2.1.12
Precedence: list
List-Id: OAUTH WG <oauth.ietf.org>
List-Unsubscribe: <https://www.ietf.org/mailman/options/oauth>, <mailto:oauth-request@ietf.org?subject=unsubscribe>
List-Archive: <http://www.ietf.org/mail-archive/web/oauth>
List-Post: <mailto:oauth@ietf.org>
List-Help: <mailto:oauth-request@ietf.org?subject=help>
List-Subscribe: <https://www.ietf.org/mailman/listinfo/oauth>, <mailto:oauth-request@ietf.org?subject=subscribe>
X-List-Received-Date: Wed, 20 Feb 2013 11:45:34 -0000

On 19/02/13 14:27, Brian Campbell wrote:
> The scope of assertion based client authentication is only in OAuth and
> only for the client calling the AS's token endpoint. Defining a general
> HTTP auth scheme for assertions would have a much broader scope and be
> much more difficult to standardize.
Understood, thanks.

I'd like to ask another question related to the subject of this thread, 
though the same would likely be relevant for using JWT for authenticating.

When the assertion is used for authenticating the client, a form 
"client_id" parameter is said to be optional.
Next, section 6.1 [1] says that "Subject" of the assertion SHOULD be 
"client_id".

I interpret it like this.

If "Subject" is set to "client_id" then there the actual client_id must 
be available as "client_id" form parameter, which will be posted 
alongside the assertion.

If not then the client_id is an actual Subject value and no "client_id" 
form parameter is expected to be available.


Is it correct ?

Thanks, Sergey

[1] http://tools.ietf.org/html/draft-ietf-oauth-assertions-10#section-6.1



>
>
> On Tue, Feb 19, 2013 at 6:54 AM, Sergey Beryozkin <sberyozkin@gmail.com
> <mailto:sberyozkin@gmail.com>> wrote:
>
>     Hi,
>
>     Assertions like SAML2 Bearer can be used for authenticating the client.
>     Why a dedicated Authorization scheme can not be introduced, instead
>     of or in addition to "client_assertion" & "client_assertion_type"
>     parameters ?
>
>     IMHO, the following
>
>     Authorization: SAML "base64url-encoded assertion"
>
>     grant_type=authorization_code&__code=123456
>
>     is more in line with OAuth2 recommending not to prefer including
>     client id & secret in the body:
>
>     "Including the client credentials in the request-body using the two
>     parameters is NOT RECOMMENDED and SHOULD be limited to clients unable
>     to directly utilize the HTTP Basic authentication scheme (or other
>     password-based HTTP authentication schemes)" - though it talks about
>     a password based scheme...
>
>     similarly:
>
>     Authorization: JWT "encoded jwt assertion"
>
>     grant_type=authorization_code&__code=123456
>
>     Just a thought.
>
>     Cheers, Sergey
>
>
>     _________________________________________________
>     OAuth mailing list
>     OAuth@ietf.org <mailto:OAuth@ietf.org>
>     https://www.ietf.org/mailman/__listinfo/oauth
>     <https://www.ietf.org/mailman/listinfo/oauth>
>
>

From sakimura@gmail.com  Wed Feb 20 07:58:27 2013
Return-Path: <sakimura@gmail.com>
X-Original-To: oauth@ietfa.amsl.com
Delivered-To: oauth@ietfa.amsl.com
Received: from localhost (localhost [127.0.0.1]) by ietfa.amsl.com (Postfix) with ESMTP id 2C78021F86C3 for <oauth@ietfa.amsl.com>; Wed, 20 Feb 2013 07:58:27 -0800 (PST)
X-Virus-Scanned: amavisd-new at amsl.com
X-Spam-Flag: NO
X-Spam-Score: -2.316
X-Spam-Level: 
X-Spam-Status: No, score=-2.316 tagged_above=-999 required=5 tests=[AWL=0.283,  BAYES_00=-2.599, HTML_MESSAGE=0.001, NO_RELAYS=-0.001]
Received: from mail.ietf.org ([64.170.98.30]) by localhost (ietfa.amsl.com [127.0.0.1]) (amavisd-new, port 10024) with ESMTP id Ssijo2GDA6xW for <oauth@ietfa.amsl.com>; Wed, 20 Feb 2013 07:58:26 -0800 (PST)
Received: from mail-la0-x234.google.com (mail-la0-x234.google.com [IPv6:2a00:1450:4010:c03::234]) by ietfa.amsl.com (Postfix) with ESMTP id C8D2D21F86BE for <oauth@ietf.org>; Wed, 20 Feb 2013 07:58:25 -0800 (PST)
Received: by mail-la0-f52.google.com with SMTP id fs12so7735068lab.39 for <oauth@ietf.org>; Wed, 20 Feb 2013 07:58:24 -0800 (PST)
DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=gmail.com; s=20120113; h=mime-version:x-received:in-reply-to:references:date:message-id :subject:from:to:content-type; bh=I8wAX7vz37JZHlnlbj3x+onpNqFBpPpS5zmY0BXBYlc=; b=z5Q0UW6Q0pFN4pJNZcgy98H8Gik7K+ECVI2hMpdBL7jQojioOewzFDYzSo2wfaS16x SRtXqPLU/pEiTxTgWTkA299uu4ejMnlnWVoNHj1bkJpa3HjikiSJP9Pb2p6vPokguEQj hHoGZqu5KYj3/ubqDrkLg4BrJ1+Pq1RXWZJ19hKYgw8jo5GIGGOrK9YyH/NYwFy73bZU YWIXE8tMRQw4mvj90zKlGYYTZa3Z5bq6F9QAWNpI/gJ+KWNlJxuC/YlkPDU6sY3M4Nir XPf4xS1+91cJaWHg4jUghVGEz6b47PBY+ySKGD8/DBYmVKUgm0T111r7gNuh2mA6JjQE 2lNQ==
MIME-Version: 1.0
X-Received: by 10.152.48.45 with SMTP id i13mr18148530lan.11.1361375904530; Wed, 20 Feb 2013 07:58:24 -0800 (PST)
Received: by 10.112.14.44 with HTTP; Wed, 20 Feb 2013 07:58:24 -0800 (PST)
In-Reply-To: <B33BFB58CCC8BE4998958016839DE27E06894B4F@IMCMBX01.MITRE.ORG>
References: <20130215215423.23019.50224.idtracker@ietfa.amsl.com> <B33BFB58CCC8BE4998958016839DE27E06894B4F@IMCMBX01.MITRE.ORG>
Date: Wed, 20 Feb 2013 10:58:24 -0500
Message-ID: <CABzCy2CgnAtPrTY37H6vO-+5u3tRmsm+1j86r3w046AhHnNdfw@mail.gmail.com>
From: Nat Sakimura <sakimura@gmail.com>
To: "<oauth@ietf.org>" <oauth@ietf.org>, "Richer, Justin P." <jricher@mitre.org>, John Bradley <ve7jtb@ve7jtb.com>
Content-Type: multipart/alternative; boundary=bcaec5523b2631ff7304d62a0760
Subject: Re: [OAUTH-WG] I-D Action: draft-ietf-oauth-dyn-reg-06.txt
X-BeenThere: oauth@ietf.org
X-Mailman-Version: 2.1.12
Precedence: list
List-Id: OAUTH WG <oauth.ietf.org>
List-Unsubscribe: <https://www.ietf.org/mailman/options/oauth>, <mailto:oauth-request@ietf.org?subject=unsubscribe>
List-Archive: <http://www.ietf.org/mail-archive/web/oauth>
List-Post: <mailto:oauth@ietf.org>
List-Help: <mailto:oauth-request@ietf.org?subject=help>
List-Subscribe: <https://www.ietf.org/mailman/listinfo/oauth>, <mailto:oauth-request@ietf.org?subject=subscribe>
X-List-Received-Date: Wed, 20 Feb 2013 15:58:27 -0000

--bcaec5523b2631ff7304d62a0760
Content-Type: text/plain; charset=ISO-8859-1

Thanks Justin.

Even if we go flat rather than doing JSON Structure, the "Client
Registration Access Endpoint" is not a good representative name.

What it represents is the client metadata/info.
It is not representing "Client Registration Access".
What does "Client Registration Access" mean?
Does UPDATing "Cleint Registration Access" make sense?

Something in the line of "Client Metadata Endpoint" and
something like "client_metadata_url" or "client_info_url" is much better.

Nat

2013/2/15 Richer, Justin P. <jricher@mitre.org>

> Everyone, there's a new draft of DynReg up on the tracker. This draft
> tries to codify the discussions so far from this week into something we can
> all read. There are still plenty of open discussion points and items up for
> debate. Please read through this latest draft and see what's changed and
> help assure that it properly captures the conversations. If you have any
> inputs for the marked [[ Editor's Note ]] sections, please send them to the
> list by next Thursday to give me opportunity to get any necessary changes
> in by the cutoff date of Monday the 22nd.
>
> Thanks for all of your hard work everyone, I think this is *really* coming
> along now.
>
>  -- Justin
>
> On Feb 15, 2013, at 4:54 PM, internet-drafts@ietf.org wrote:
>
> >
> > A New Internet-Draft is available from the on-line Internet-Drafts
> directories.
> > This draft is a work item of the Web Authorization Protocol Working
> Group of the IETF.
> >
> >       Title           : OAuth Dynamic Client Registration Protocol
> >       Author(s)       : Justin Richer
> >                          John Bradley
> >                          Michael B. Jones
> >                          Maciej Machulak
> >       Filename        : draft-ietf-oauth-dyn-reg-06.txt
> >       Pages           : 21
> >       Date            : 2013-02-15
> >
> > Abstract:
> >   This specification defines an endpoint and protocol for dynamic
> >   registration of OAuth Clients at an Authorization Server.
> >
> >
> > The IETF datatracker status page for this draft is:
> > https://datatracker.ietf.org/doc/draft-ietf-oauth-dyn-reg
> >
> > There's also a htmlized version available at:
> > http://tools.ietf.org/html/draft-ietf-oauth-dyn-reg-06
> >
> > A diff from the previous version is available at:
> > http://www.ietf.org/rfcdiff?url2=draft-ietf-oauth-dyn-reg-06
> >
> >
> > Internet-Drafts are also available by anonymous FTP at:
> > ftp://ftp.ietf.org/internet-drafts/
> >
> > _______________________________________________
> > OAuth mailing list
> > OAuth@ietf.org
> > https://www.ietf.org/mailman/listinfo/oauth
>
> _______________________________________________
> OAuth mailing list
> OAuth@ietf.org
> https://www.ietf.org/mailman/listinfo/oauth
>



-- 
Nat Sakimura (=nat)
Chairman, OpenID Foundation
http://nat.sakimura.org/
@_nat_en

--bcaec5523b2631ff7304d62a0760
Content-Type: text/html; charset=ISO-8859-1
Content-Transfer-Encoding: quoted-printable

<span style=3D"color:rgb(34,34,34);font-family:arial,sans-serif;font-size:1=
8px;background-color:rgb(255,255,255)">Thanks Justin.</span><br style=3D"co=
lor:rgb(34,34,34);font-family:arial,sans-serif;font-size:18px;background-co=
lor:rgb(255,255,255)">
<br style=3D"color:rgb(34,34,34);font-family:arial,sans-serif;font-size:18p=
x;background-color:rgb(255,255,255)"><span style=3D"color:rgb(34,34,34);fon=
t-family:arial,sans-serif;font-size:18px;background-color:rgb(255,255,255)"=
>Even if we go flat rather than doing JSON Structure, the &quot;Client</spa=
n><br style=3D"color:rgb(34,34,34);font-family:arial,sans-serif;font-size:1=
8px;background-color:rgb(255,255,255)">
<span style=3D"color:rgb(34,34,34);font-family:arial,sans-serif;font-size:1=
8px;background-color:rgb(255,255,255)">Registration Access Endpoint&quot; i=
s not a good representative name.</span><br style=3D"color:rgb(34,34,34);fo=
nt-family:arial,sans-serif;font-size:18px;background-color:rgb(255,255,255)=
">
<br style=3D"color:rgb(34,34,34);font-family:arial,sans-serif;font-size:18p=
x;background-color:rgb(255,255,255)"><span style=3D"color:rgb(34,34,34);fon=
t-family:arial,sans-serif;font-size:18px;background-color:rgb(255,255,255)"=
>What it represents is the client metadata/info.</span><br style=3D"color:r=
gb(34,34,34);font-family:arial,sans-serif;font-size:18px;background-color:r=
gb(255,255,255)">
<span style=3D"color:rgb(34,34,34);font-family:arial,sans-serif;font-size:1=
8px;background-color:rgb(255,255,255)">It is not representing &quot;Client =
Registration Access&quot;.=A0</span><div>What does &quot;Client Registratio=
n Access&quot; mean?=A0</div>
<div><span style=3D"background-color:rgb(255,255,255);color:rgb(34,34,34);f=
ont-family:arial,sans-serif;font-size:18px">Does UPDATing &quot;Cleint Regi=
stration Access&quot; make sense?</span><br><br style=3D"color:rgb(34,34,34=
);font-family:arial,sans-serif;font-size:18px;background-color:rgb(255,255,=
255)">
<span style=3D"color:rgb(34,34,34);font-family:arial,sans-serif;font-size:1=
8px;background-color:rgb(255,255,255)">Something in the line of &quot;Clien=
t Metadata Endpoint&quot; and</span><br style=3D"color:rgb(34,34,34);font-f=
amily:arial,sans-serif;font-size:18px;background-color:rgb(255,255,255)">
<span style=3D"color:rgb(34,34,34);font-family:arial,sans-serif;font-size:1=
8px;background-color:rgb(255,255,255)">something like &quot;client_metadata=
_url&quot; or=A0</span><span style=3D"color:rgb(34,34,34);font-family:arial=
,sans-serif;font-size:18px;background-color:rgb(255,255,255)">&quot;client_=
info_url&quot; </span><span style=3D"color:rgb(34,34,34);font-family:arial,=
sans-serif;font-size:18px;background-color:rgb(255,255,255)">is much better=
.</span><br style=3D"color:rgb(34,34,34);font-family:arial,sans-serif;font-=
size:18px;background-color:rgb(255,255,255)">
<br style=3D"color:rgb(34,34,34);font-family:arial,sans-serif;font-size:18p=
x;background-color:rgb(255,255,255)"><span style=3D"color:rgb(34,34,34);fon=
t-family:arial,sans-serif;font-size:18px;background-color:rgb(255,255,255)"=
>Nat</span><br>
<br><div class=3D"gmail_quote">2013/2/15 Richer, Justin P. <span dir=3D"ltr=
">&lt;<a href=3D"mailto:jricher@mitre.org" target=3D"_blank">jricher@mitre.=
org</a>&gt;</span><br><blockquote class=3D"gmail_quote" style=3D"margin:0 0=
 0 .8ex;border-left:1px #ccc solid;padding-left:1ex">
Everyone, there&#39;s a new draft of DynReg up on the tracker. This draft t=
ries to codify the discussions so far from this week into something we can =
all read. There are still plenty of open discussion points and items up for=
 debate. Please read through this latest draft and see what&#39;s changed a=
nd help assure that it properly captures the conversations. If you have any=
 inputs for the marked [[ Editor&#39;s Note ]] sections, please send them t=
o the list by next Thursday to give me opportunity to get any necessary cha=
nges in by the cutoff date of Monday the 22nd.<br>

<br>
Thanks for all of your hard work everyone, I think this is *really* coming =
along now.<br>
<span class=3D"HOEnZb"><font color=3D"#888888"><br>
=A0-- Justin<br>
</font></span><div class=3D"HOEnZb"><div class=3D"h5"><br>
On Feb 15, 2013, at 4:54 PM, <a href=3D"mailto:internet-drafts@ietf.org">in=
ternet-drafts@ietf.org</a> wrote:<br>
<br>
&gt;<br>
&gt; A New Internet-Draft is available from the on-line Internet-Drafts dir=
ectories.<br>
&gt; This draft is a work item of the Web Authorization Protocol Working Gr=
oup of the IETF.<br>
&gt;<br>
&gt; =A0 =A0 =A0 Title =A0 =A0 =A0 =A0 =A0 : OAuth Dynamic Client Registrat=
ion Protocol<br>
&gt; =A0 =A0 =A0 Author(s) =A0 =A0 =A0 : Justin Richer<br>
&gt; =A0 =A0 =A0 =A0 =A0 =A0 =A0 =A0 =A0 =A0 =A0 =A0 =A0John Bradley<br>
&gt; =A0 =A0 =A0 =A0 =A0 =A0 =A0 =A0 =A0 =A0 =A0 =A0 =A0Michael B. Jones<br=
>
&gt; =A0 =A0 =A0 =A0 =A0 =A0 =A0 =A0 =A0 =A0 =A0 =A0 =A0Maciej Machulak<br>
&gt; =A0 =A0 =A0 Filename =A0 =A0 =A0 =A0: draft-ietf-oauth-dyn-reg-06.txt<=
br>
&gt; =A0 =A0 =A0 Pages =A0 =A0 =A0 =A0 =A0 : 21<br>
&gt; =A0 =A0 =A0 Date =A0 =A0 =A0 =A0 =A0 =A0: 2013-02-15<br>
&gt;<br>
&gt; Abstract:<br>
&gt; =A0 This specification defines an endpoint and protocol for dynamic<br=
>
&gt; =A0 registration of OAuth Clients at an Authorization Server.<br>
&gt;<br>
&gt;<br>
&gt; The IETF datatracker status page for this draft is:<br>
&gt; <a href=3D"https://datatracker.ietf.org/doc/draft-ietf-oauth-dyn-reg" =
target=3D"_blank">https://datatracker.ietf.org/doc/draft-ietf-oauth-dyn-reg=
</a><br>
&gt;<br>
&gt; There&#39;s also a htmlized version available at:<br>
&gt; <a href=3D"http://tools.ietf.org/html/draft-ietf-oauth-dyn-reg-06" tar=
get=3D"_blank">http://tools.ietf.org/html/draft-ietf-oauth-dyn-reg-06</a><b=
r>
&gt;<br>
&gt; A diff from the previous version is available at:<br>
&gt; <a href=3D"http://www.ietf.org/rfcdiff?url2=3Ddraft-ietf-oauth-dyn-reg=
-06" target=3D"_blank">http://www.ietf.org/rfcdiff?url2=3Ddraft-ietf-oauth-=
dyn-reg-06</a><br>
&gt;<br>
&gt;<br>
&gt; Internet-Drafts are also available by anonymous FTP at:<br>
&gt; <a href=3D"ftp://ftp.ietf.org/internet-drafts/" target=3D"_blank">ftp:=
//ftp.ietf.org/internet-drafts/</a><br>
&gt;<br>
&gt; _______________________________________________<br>
&gt; OAuth mailing list<br>
&gt; <a href=3D"mailto:OAuth@ietf.org">OAuth@ietf.org</a><br>
&gt; <a href=3D"https://www.ietf.org/mailman/listinfo/oauth" target=3D"_bla=
nk">https://www.ietf.org/mailman/listinfo/oauth</a><br>
<br>
_______________________________________________<br>
OAuth mailing list<br>
<a href=3D"mailto:OAuth@ietf.org">OAuth@ietf.org</a><br>
<a href=3D"https://www.ietf.org/mailman/listinfo/oauth" target=3D"_blank">h=
ttps://www.ietf.org/mailman/listinfo/oauth</a><br>
</div></div></blockquote></div><br><br clear=3D"all"><div><br></div>-- <br>=
Nat Sakimura (=3Dnat)<div>Chairman, OpenID Foundation<br><a href=3D"http://=
nat.sakimura.org/" target=3D"_blank">http://nat.sakimura.org/</a><br>@_nat_=
en</div>

</div>

--bcaec5523b2631ff7304d62a0760--

From Michael.Jones@microsoft.com  Wed Feb 20 08:05:15 2013
Return-Path: <Michael.Jones@microsoft.com>
X-Original-To: oauth@ietfa.amsl.com
Delivered-To: oauth@ietfa.amsl.com
Received: from localhost (localhost [127.0.0.1]) by ietfa.amsl.com (Postfix) with ESMTP id 8FACA21F88A0 for <oauth@ietfa.amsl.com>; Wed, 20 Feb 2013 08:05:15 -0800 (PST)
X-Virus-Scanned: amavisd-new at amsl.com
X-Spam-Flag: NO
X-Spam-Score: -2.583
X-Spam-Level: 
X-Spam-Status: No, score=-2.583 tagged_above=-999 required=5 tests=[AWL=0.015,  BAYES_00=-2.599, HTML_MESSAGE=0.001]
Received: from mail.ietf.org ([64.170.98.30]) by localhost (ietfa.amsl.com [127.0.0.1]) (amavisd-new, port 10024) with ESMTP id hButxEVCf-Qf for <oauth@ietfa.amsl.com>; Wed, 20 Feb 2013 08:05:12 -0800 (PST)
Received: from na01-bl2-obe.outbound.protection.outlook.com (na01-bl2-obe.ptr.protection.outlook.com [65.55.169.25]) by ietfa.amsl.com (Postfix) with ESMTP id 86DB821F889C for <oauth@ietf.org>; Wed, 20 Feb 2013 08:05:12 -0800 (PST)
Received: from BL2FFO11FD009.protection.gbl (10.173.161.202) by BL2FFO11HUB023.protection.gbl (10.173.161.47) with Microsoft SMTP Server (TLS) id 15.0.620.12; Wed, 20 Feb 2013 16:05:04 +0000
Received: from TK5EX14HUBC105.redmond.corp.microsoft.com (131.107.125.37) by BL2FFO11FD009.mail.protection.outlook.com (10.173.161.15) with Microsoft SMTP Server (TLS) id 15.0.620.12 via Frontend Transport; Wed, 20 Feb 2013 16:05:03 +0000
Received: from TK5EX14MBXC284.redmond.corp.microsoft.com ([169.254.1.96]) by TK5EX14HUBC105.redmond.corp.microsoft.com ([157.54.80.48]) with mapi id 14.02.0318.003; Wed, 20 Feb 2013 16:04:40 +0000
From: Mike Jones <Michael.Jones@microsoft.com>
To: Nat Sakimura <sakimura@gmail.com>, "<oauth@ietf.org>" <oauth@ietf.org>, "Richer, Justin P." <jricher@mitre.org>, John Bradley <ve7jtb@ve7jtb.com>
Thread-Topic: [OAUTH-WG] I-D Action: draft-ietf-oauth-dyn-reg-06.txt
Thread-Index: AQHOC8cMkbohP5vU0EO7eTLi/U/hMJh7eCuAgAd2gACAAAA6MA==
Date: Wed, 20 Feb 2013 16:04:39 +0000
Message-ID: <4E1F6AAD24975D4BA5B16804296739436747A665@TK5EX14MBXC284.redmond.corp.microsoft.com>
References: <20130215215423.23019.50224.idtracker@ietfa.amsl.com> <B33BFB58CCC8BE4998958016839DE27E06894B4F@IMCMBX01.MITRE.ORG> <CABzCy2CgnAtPrTY37H6vO-+5u3tRmsm+1j86r3w046AhHnNdfw@mail.gmail.com>
In-Reply-To: <CABzCy2CgnAtPrTY37H6vO-+5u3tRmsm+1j86r3w046AhHnNdfw@mail.gmail.com>
Accept-Language: en-US
Content-Language: en-US
X-MS-Has-Attach: 
X-MS-TNEF-Correlator: 
x-originating-ip: [157.54.51.33]
Content-Type: multipart/alternative; boundary="_000_4E1F6AAD24975D4BA5B16804296739436747A665TK5EX14MBXC284r_"
MIME-Version: 1.0
X-Forefront-Antispam-Report: CIP:131.107.125.37; CTRY:US; IPV:CAL; IPV:NLI; EFV:NLI; SFV:NSPM; SFS:(479174001)(199002)(189002)(24454001)(65554002)(69224001)(51704002)(377454001)(377424002)(65816001)(512954001)(31966008)(16406001)(79102001)(59766001)(66066001)(56816002)(77982001)(80022001)(5343635001)(47976001)(55846006)(47736001)(49866001)(33656001)(51856001)(50986001)(56776001)(54356001)(46102001)(53806001)(20776003)(74662001)(16236675001)(4396001)(15202345001)(5343655001)(76482001)(16297215001)(44976002)(47446002)(54316002)(74502001)(63696002)(491001); DIR:OUT; SFP:; SCL:1; SRVR:BL2FFO11HUB023; H:TK5EX14HUBC105.redmond.corp.microsoft.com; RD:InfoDomainNonexistent; A:1; MX:1; LANG:en; 
X-OriginatorOrg: microsoft.onmicrosoft.com
X-Forefront-PRVS: 07630F72AD
Subject: Re: [OAUTH-WG] I-D Action: draft-ietf-oauth-dyn-reg-06.txt
X-BeenThere: oauth@ietf.org
X-Mailman-Version: 2.1.12
Precedence: list
List-Id: OAUTH WG <oauth.ietf.org>
List-Unsubscribe: <https://www.ietf.org/mailman/options/oauth>, <mailto:oauth-request@ietf.org?subject=unsubscribe>
List-Archive: <http://www.ietf.org/mail-archive/web/oauth>
List-Post: <mailto:oauth@ietf.org>
List-Help: <mailto:oauth-request@ietf.org?subject=help>
List-Subscribe: <https://www.ietf.org/mailman/listinfo/oauth>, <mailto:oauth-request@ietf.org?subject=subscribe>
X-List-Received-Date: Wed, 20 Feb 2013 16:05:15 -0000

--_000_4E1F6AAD24975D4BA5B16804296739436747A665TK5EX14MBXC284r_
Content-Type: text/plain; charset="us-ascii"
Content-Transfer-Encoding: quoted-printable

For what it's worth, the name "registration_access_url" was chosen to be pa=
rallel to "registration_access_token".   It's the place you use the access =
token.  And it's where you access an existing registration.  I'm against th=
e name "client_metadata_url" because it's not metadata you're accessing - i=
t's a registration you're accessing.  For the same reason, I don't think th=
e name "client_info_url" gives people the right idea, because it doesn't sa=
y anything it being the registration that you're accessing.

If you really want us to change this, having read what's above, I could liv=
e with "client_registration_url", but I don't think a change is actually ne=
cessary.  (But if we are going to change it, let's do it ASAP, before the O=
penID Connect Implementer's Drafts are published.)

                                                            -- Mike

From: oauth-bounces@ietf.org [mailto:oauth-bounces@ietf.org] On Behalf Of N=
at Sakimura
Sent: Wednesday, February 20, 2013 7:58 AM
To: <oauth@ietf.org>; Richer, Justin P.; John Bradley
Subject: Re: [OAUTH-WG] I-D Action: draft-ietf-oauth-dyn-reg-06.txt

Thanks Justin.

Even if we go flat rather than doing JSON Structure, the "Client
Registration Access Endpoint" is not a good representative name.

What it represents is the client metadata/info.
It is not representing "Client Registration Access".
What does "Client Registration Access" mean?
Does UPDATing "Cleint Registration Access" make sense?

Something in the line of "Client Metadata Endpoint" and
something like "client_metadata_url" or "client_info_url" is much better.

Nat
2013/2/15 Richer, Justin P. <jricher@mitre.org<mailto:jricher@mitre.org>>
Everyone, there's a new draft of DynReg up on the tracker. This draft tries=
 to codify the discussions so far from this week into something we can all =
read. There are still plenty of open discussion points and items up for deb=
ate. Please read through this latest draft and see what's changed and help =
assure that it properly captures the conversations. If you have any inputs =
for the marked [[ Editor's Note ]] sections, please send them to the list b=
y next Thursday to give me opportunity to get any necessary changes in by t=
he cutoff date of Monday the 22nd.

Thanks for all of your hard work everyone, I think this is *really* coming =
along now.

 -- Justin

On Feb 15, 2013, at 4:54 PM, internet-drafts@ietf.org<mailto:internet-draft=
s@ietf.org> wrote:

>
> A New Internet-Draft is available from the on-line Internet-Drafts direct=
ories.
> This draft is a work item of the Web Authorization Protocol Working Group=
 of the IETF.
>
>       Title           : OAuth Dynamic Client Registration Protocol
>       Author(s)       : Justin Richer
>                          John Bradley
>                          Michael B. Jones
>                          Maciej Machulak
>       Filename        : draft-ietf-oauth-dyn-reg-06.txt
>       Pages           : 21
>       Date            : 2013-02-15
>
> Abstract:
>   This specification defines an endpoint and protocol for dynamic
>   registration of OAuth Clients at an Authorization Server.
>
>
> The IETF datatracker status page for this draft is:
> https://datatracker.ietf.org/doc/draft-ietf-oauth-dyn-reg
>
> There's also a htmlized version available at:
> http://tools.ietf.org/html/draft-ietf-oauth-dyn-reg-06
>
> A diff from the previous version is available at:
> http://www.ietf.org/rfcdiff?url2=3Ddraft-ietf-oauth-dyn-reg-06
>
>
> Internet-Drafts are also available by anonymous FTP at:
> ftp://ftp.ietf.org/internet-drafts/
>
> _______________________________________________
> OAuth mailing list
> OAuth@ietf.org<mailto:OAuth@ietf.org>
> https://www.ietf.org/mailman/listinfo/oauth

_______________________________________________
OAuth mailing list
OAuth@ietf.org<mailto:OAuth@ietf.org>
https://www.ietf.org/mailman/listinfo/oauth



--
Nat Sakimura (=3Dnat)
Chairman, OpenID Foundation
http://nat.sakimura.org/
@_nat_en

--_000_4E1F6AAD24975D4BA5B16804296739436747A665TK5EX14MBXC284r_
Content-Type: text/html; charset="us-ascii"
Content-Transfer-Encoding: quoted-printable

<html xmlns:v=3D"urn:schemas-microsoft-com:vml" xmlns:o=3D"urn:schemas-micr=
osoft-com:office:office" xmlns:w=3D"urn:schemas-microsoft-com:office:word" =
xmlns:m=3D"http://schemas.microsoft.com/office/2004/12/omml" xmlns=3D"http:=
//www.w3.org/TR/REC-html40">
<head>
<meta http-equiv=3D"Content-Type" content=3D"text/html; charset=3Dus-ascii"=
>
<meta name=3D"Generator" content=3D"Microsoft Word 14 (filtered medium)">
<style><!--
/* Font Definitions */
@font-face
	{font-family:Calibri;
	panose-1:2 15 5 2 2 2 4 3 2 4;}
@font-face
	{font-family:Tahoma;
	panose-1:2 11 6 4 3 5 4 4 2 4;}
/* Style Definitions */
p.MsoNormal, li.MsoNormal, div.MsoNormal
	{margin:0in;
	margin-bottom:.0001pt;
	font-size:12.0pt;
	font-family:"Times New Roman","serif";}
a:link, span.MsoHyperlink
	{mso-style-priority:99;
	color:blue;
	text-decoration:underline;}
a:visited, span.MsoHyperlinkFollowed
	{mso-style-priority:99;
	color:purple;
	text-decoration:underline;}
span.hoenzb
	{mso-style-name:hoenzb;}
span.EmailStyle18
	{mso-style-type:personal-reply;
	font-family:"Calibri","sans-serif";
	color:#1F497D;}
.MsoChpDefault
	{mso-style-type:export-only;
	font-family:"Calibri","sans-serif";}
@page WordSection1
	{size:8.5in 11.0in;
	margin:1.0in 1.0in 1.0in 1.0in;}
div.WordSection1
	{page:WordSection1;}
--></style><!--[if gte mso 9]><xml>
<o:shapedefaults v:ext=3D"edit" spidmax=3D"1026" />
</xml><![endif]--><!--[if gte mso 9]><xml>
<o:shapelayout v:ext=3D"edit">
<o:idmap v:ext=3D"edit" data=3D"1" />
</o:shapelayout></xml><![endif]-->
</head>
<body lang=3D"EN-US" link=3D"blue" vlink=3D"purple">
<div class=3D"WordSection1">
<p class=3D"MsoNormal"><span style=3D"font-size:11.0pt;font-family:&quot;Ca=
libri&quot;,&quot;sans-serif&quot;;color:#1F497D">For what it&#8217;s worth=
, the name &#8220;registration_access_url&#8221; was chosen to be parallel =
to &#8220;registration_access_token&#8221;.&nbsp;&nbsp; It&#8217;s the plac=
e you use the access token.&nbsp;
 And it&#8217;s where you access an existing registration.&nbsp; I&#8217;m =
against the name &#8220;client_metadata_url&#8221; because it&#8217;s not m=
etadata you&#8217;re accessing &#8211; it&#8217;s a registration you&#8217;=
re accessing.&nbsp; For the same reason, I don&#8217;t think the name &#822=
0;client_info_url&#8221; gives people the
 right idea, because it doesn&#8217;t say anything it being the registratio=
n that you&#8217;re accessing.<o:p></o:p></span></p>
<p class=3D"MsoNormal"><span style=3D"font-size:11.0pt;font-family:&quot;Ca=
libri&quot;,&quot;sans-serif&quot;;color:#1F497D"><o:p>&nbsp;</o:p></span><=
/p>
<p class=3D"MsoNormal"><span style=3D"font-size:11.0pt;font-family:&quot;Ca=
libri&quot;,&quot;sans-serif&quot;;color:#1F497D">If you really want us to =
change this, having read what&#8217;s above, I could live with &#8220;clien=
t_registration_url&#8221;, but I don&#8217;t think a change is actually nec=
essary.&nbsp;
 (But if we are going to change it, let&#8217;s do it ASAP, before the Open=
ID Connect Implementer&#8217;s Drafts are published.)<o:p></o:p></span></p>
<p class=3D"MsoNormal"><span style=3D"font-size:11.0pt;font-family:&quot;Ca=
libri&quot;,&quot;sans-serif&quot;;color:#1F497D"><o:p>&nbsp;</o:p></span><=
/p>
<p class=3D"MsoNormal"><span style=3D"font-size:11.0pt;font-family:&quot;Ca=
libri&quot;,&quot;sans-serif&quot;;color:#1F497D">&nbsp;&nbsp;&nbsp;&nbsp;&=
nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbs=
p;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&=
nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbs=
p;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&=
nbsp;&nbsp;&nbsp;&nbsp;&nbsp; -- Mike<o:p></o:p></span></p>
<p class=3D"MsoNormal"><span style=3D"font-size:11.0pt;font-family:&quot;Ca=
libri&quot;,&quot;sans-serif&quot;;color:#1F497D"><o:p>&nbsp;</o:p></span><=
/p>
<p class=3D"MsoNormal"><b><span style=3D"font-size:10.0pt;font-family:&quot=
;Tahoma&quot;,&quot;sans-serif&quot;">From:</span></b><span style=3D"font-s=
ize:10.0pt;font-family:&quot;Tahoma&quot;,&quot;sans-serif&quot;"> oauth-bo=
unces@ietf.org [mailto:oauth-bounces@ietf.org]
<b>On Behalf Of </b>Nat Sakimura<br>
<b>Sent:</b> Wednesday, February 20, 2013 7:58 AM<br>
<b>To:</b> &lt;oauth@ietf.org&gt;; Richer, Justin P.; John Bradley<br>
<b>Subject:</b> Re: [OAUTH-WG] I-D Action: draft-ietf-oauth-dyn-reg-06.txt<=
o:p></o:p></span></p>
<p class=3D"MsoNormal"><o:p>&nbsp;</o:p></p>
<p class=3D"MsoNormal"><span style=3D"font-size:13.5pt;font-family:&quot;Ar=
ial&quot;,&quot;sans-serif&quot;;color:#222222;background:white">Thanks Jus=
tin.</span><span style=3D"font-size:13.5pt;font-family:&quot;Arial&quot;,&q=
uot;sans-serif&quot;;color:#222222"><br>
<br>
<span style=3D"background:white">Even if we go flat rather than doing JSON =
Structure, the &quot;Client</span><br>
<span style=3D"background:white">Registration Access Endpoint&quot; is not =
a good representative name.</span><br>
<br>
<span style=3D"background:white">What it represents is the client metadata/=
info.</span><br>
<span style=3D"background:white">It is not representing &quot;Client Regist=
ration Access&quot;.&nbsp;</span></span><o:p></o:p></p>
<div>
<p class=3D"MsoNormal">What does &quot;Client Registration Access&quot; mea=
n?&nbsp;<o:p></o:p></p>
</div>
<div>
<p class=3D"MsoNormal" style=3D"margin-bottom:12.0pt"><span style=3D"font-s=
ize:13.5pt;font-family:&quot;Arial&quot;,&quot;sans-serif&quot;;color:#2222=
22;background:white">Does UPDATing &quot;Cleint Registration Access&quot; m=
ake sense?</span><br>
<span style=3D"font-size:13.5pt;font-family:&quot;Arial&quot;,&quot;sans-se=
rif&quot;;color:#222222"><br>
<span style=3D"background:white">Something in the line of &quot;Client Meta=
data Endpoint&quot; and</span><br>
<span style=3D"background:white">something like &quot;client_metadata_url&q=
uot; or&nbsp;&quot;client_info_url&quot; is much better.</span><br>
<br>
<span style=3D"background:white">Nat</span></span><o:p></o:p></p>
<div>
<p class=3D"MsoNormal">2013/2/15 Richer, Justin P. &lt;<a href=3D"mailto:jr=
icher@mitre.org" target=3D"_blank">jricher@mitre.org</a>&gt;<o:p></o:p></p>
<p class=3D"MsoNormal">Everyone, there's a new draft of DynReg up on the tr=
acker. This draft tries to codify the discussions so far from this week int=
o something we can all read. There are still plenty of open discussion poin=
ts and items up for debate. Please
 read through this latest draft and see what's changed and help assure that=
 it properly captures the conversations. If you have any inputs for the mar=
ked [[ Editor's Note ]] sections, please send them to the list by next Thur=
sday to give me opportunity to get
 any necessary changes in by the cutoff date of Monday the 22nd.<br>
<br>
Thanks for all of your hard work everyone, I think this is *really* coming =
along now.<br>
<span style=3D"color:#888888"><br>
<span class=3D"hoenzb">&nbsp;-- Justin</span></span><o:p></o:p></p>
<div>
<div>
<p class=3D"MsoNormal"><br>
On Feb 15, 2013, at 4:54 PM, <a href=3D"mailto:internet-drafts@ietf.org">in=
ternet-drafts@ietf.org</a> wrote:<br>
<br>
&gt;<br>
&gt; A New Internet-Draft is available from the on-line Internet-Drafts dir=
ectories.<br>
&gt; This draft is a work item of the Web Authorization Protocol Working Gr=
oup of the IETF.<br>
&gt;<br>
&gt; &nbsp; &nbsp; &nbsp; Title &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; : OAuth =
Dynamic Client Registration Protocol<br>
&gt; &nbsp; &nbsp; &nbsp; Author(s) &nbsp; &nbsp; &nbsp; : Justin Richer<br=
>
&gt; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; =
&nbsp; &nbsp; &nbsp;John Bradley<br>
&gt; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; =
&nbsp; &nbsp; &nbsp;Michael B. Jones<br>
&gt; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; =
&nbsp; &nbsp; &nbsp;Maciej Machulak<br>
&gt; &nbsp; &nbsp; &nbsp; Filename &nbsp; &nbsp; &nbsp; &nbsp;: draft-ietf-=
oauth-dyn-reg-06.txt<br>
&gt; &nbsp; &nbsp; &nbsp; Pages &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; : 21<br>
&gt; &nbsp; &nbsp; &nbsp; Date &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp;: 2=
013-02-15<br>
&gt;<br>
&gt; Abstract:<br>
&gt; &nbsp; This specification defines an endpoint and protocol for dynamic=
<br>
&gt; &nbsp; registration of OAuth Clients at an Authorization Server.<br>
&gt;<br>
&gt;<br>
&gt; The IETF datatracker status page for this draft is:<br>
&gt; <a href=3D"https://datatracker.ietf.org/doc/draft-ietf-oauth-dyn-reg" =
target=3D"_blank">
https://datatracker.ietf.org/doc/draft-ietf-oauth-dyn-reg</a><br>
&gt;<br>
&gt; There's also a htmlized version available at:<br>
&gt; <a href=3D"http://tools.ietf.org/html/draft-ietf-oauth-dyn-reg-06" tar=
get=3D"_blank">
http://tools.ietf.org/html/draft-ietf-oauth-dyn-reg-06</a><br>
&gt;<br>
&gt; A diff from the previous version is available at:<br>
&gt; <a href=3D"http://www.ietf.org/rfcdiff?url2=3Ddraft-ietf-oauth-dyn-reg=
-06" target=3D"_blank">
http://www.ietf.org/rfcdiff?url2=3Ddraft-ietf-oauth-dyn-reg-06</a><br>
&gt;<br>
&gt;<br>
&gt; Internet-Drafts are also available by anonymous FTP at:<br>
&gt; <a href=3D"ftp://ftp.ietf.org/internet-drafts/" target=3D"_blank">ftp:=
//ftp.ietf.org/internet-drafts/</a><br>
&gt;<br>
&gt; _______________________________________________<br>
&gt; OAuth mailing list<br>
&gt; <a href=3D"mailto:OAuth@ietf.org">OAuth@ietf.org</a><br>
&gt; <a href=3D"https://www.ietf.org/mailman/listinfo/oauth" target=3D"_bla=
nk">https://www.ietf.org/mailman/listinfo/oauth</a><br>
<br>
_______________________________________________<br>
OAuth mailing list<br>
<a href=3D"mailto:OAuth@ietf.org">OAuth@ietf.org</a><br>
<a href=3D"https://www.ietf.org/mailman/listinfo/oauth" target=3D"_blank">h=
ttps://www.ietf.org/mailman/listinfo/oauth</a><o:p></o:p></p>
</div>
</div>
</div>
<p class=3D"MsoNormal"><br>
<br clear=3D"all">
<o:p></o:p></p>
<div>
<p class=3D"MsoNormal"><o:p>&nbsp;</o:p></p>
</div>
<p class=3D"MsoNormal">-- <br>
Nat Sakimura (=3Dnat)<o:p></o:p></p>
<div>
<p class=3D"MsoNormal">Chairman, OpenID Foundation<br>
<a href=3D"http://nat.sakimura.org/" target=3D"_blank">http://nat.sakimura.=
org/</a><br>
@_nat_en<o:p></o:p></p>
</div>
</div>
</div>
</body>
</html>

--_000_4E1F6AAD24975D4BA5B16804296739436747A665TK5EX14MBXC284r_--

From ve7jtb@ve7jtb.com  Wed Feb 20 08:24:09 2013
Return-Path: <ve7jtb@ve7jtb.com>
X-Original-To: oauth@ietfa.amsl.com
Delivered-To: oauth@ietfa.amsl.com
Received: from localhost (localhost [127.0.0.1]) by ietfa.amsl.com (Postfix) with ESMTP id 061E621F88F1 for <oauth@ietfa.amsl.com>; Wed, 20 Feb 2013 08:24:09 -0800 (PST)
X-Virus-Scanned: amavisd-new at amsl.com
X-Spam-Flag: NO
X-Spam-Score: -3.456
X-Spam-Level: 
X-Spam-Status: No, score=-3.456 tagged_above=-999 required=5 tests=[AWL=0.142,  BAYES_00=-2.599, HTML_MESSAGE=0.001, RCVD_IN_DNSWL_LOW=-1]
Received: from mail.ietf.org ([64.170.98.30]) by localhost (ietfa.amsl.com [127.0.0.1]) (amavisd-new, port 10024) with ESMTP id L3cAoiChzuY7 for <oauth@ietfa.amsl.com>; Wed, 20 Feb 2013 08:24:07 -0800 (PST)
Received: from mail-qe0-f48.google.com (mail-qe0-f48.google.com [209.85.128.48]) by ietfa.amsl.com (Postfix) with ESMTP id 5D2B621F88F7 for <oauth@ietf.org>; Wed, 20 Feb 2013 08:24:07 -0800 (PST)
Received: by mail-qe0-f48.google.com with SMTP id 3so3702049qea.21 for <oauth@ietf.org>; Wed, 20 Feb 2013 08:24:06 -0800 (PST)
X-Google-DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=google.com; s=20120113; h=x-received:content-type:mime-version:subject:from:in-reply-to:date :cc:message-id:references:to:x-mailer:x-gm-message-state; bh=T5jaQoqlAEmojPMik+8Xcffi38ctfvc6ac4IZcBU41c=; b=Y3++r1ENMsZfmtlITUlpcznYfJrd2ihlOyaRXsowgsO0rMA/HCku98sF/F6mro5eZs HN7Yst97NDtWWEmK5cNm6/zussf0Ws9EB5U0t4036kZxAZr1zz2/1AMQlKe4ffo6xZN/ +u4sz5luczzGJV6UA8SjNC5j6FmBVgB3/8A4oQxjt1J/jMHawZ/FvdnbpK+pX8s0ox3c hvOdRewphA/7EPimyvvNCGZDm5J6iLf0U0EHXFsExtEBZR8OAhG60mNt3KLhJ21b2dXF xcMZxK6lRX4IHoLhn9U5tGxGp7cfT2xJDRPKRPWD23JICm+WIZWyZ2vqgSkFKK58VYau n6dg==
X-Received: by 10.49.127.15 with SMTP id nc15mr10143607qeb.61.1361377446394; Wed, 20 Feb 2013 08:24:06 -0800 (PST)
Received: from [192.168.1.213] (190-20-41-134.baf.movistar.cl. [190.20.41.134]) by mx.google.com with ESMTPS id bb8sm29962438qeb.5.2013.02.20.08.24.02 (version=TLSv1 cipher=ECDHE-RSA-RC4-SHA bits=128/128); Wed, 20 Feb 2013 08:24:04 -0800 (PST)
Content-Type: multipart/signed; boundary="Apple-Mail=_6E8803B4-655D-4057-B848-CE30D7F8A5C3"; protocol="application/pkcs7-signature"; micalg=sha1
Mime-Version: 1.0 (Mac OS X Mail 6.2 \(1499\))
From: John Bradley <ve7jtb@ve7jtb.com>
In-Reply-To: <4E1F6AAD24975D4BA5B16804296739436747A665@TK5EX14MBXC284.redmond.corp.microsoft.com>
Date: Wed, 20 Feb 2013 13:23:29 -0300
Message-Id: <63255CDA-E93F-4414-B471-B373C4B6F65E@ve7jtb.com>
References: <20130215215423.23019.50224.idtracker@ietfa.amsl.com> <B33BFB58CCC8BE4998958016839DE27E06894B4F@IMCMBX01.MITRE.ORG> <CABzCy2CgnAtPrTY37H6vO-+5u3tRmsm+1j86r3w046AhHnNdfw@mail.gmail.com> <4E1F6AAD24975D4BA5B16804296739436747A665@TK5EX14MBXC284.redmond.corp.microsoft.com>
To: Mike Jones <Michael.Jones@microsoft.com>
X-Mailer: Apple Mail (2.1499)
X-Gm-Message-State: ALoCoQm+Vywlb/FId5+fmz0QqBpenYf4OOhzqom8Thp6MO9lgL7eGxmT7y/LCU+g1xIAc9snLFAb
Cc: "<oauth@ietf.org>" <oauth@ietf.org>
Subject: Re: [OAUTH-WG] I-D Action: draft-ietf-oauth-dyn-reg-06.txt
X-BeenThere: oauth@ietf.org
X-Mailman-Version: 2.1.12
Precedence: list
List-Id: OAUTH WG <oauth.ietf.org>
List-Unsubscribe: <https://www.ietf.org/mailman/options/oauth>, <mailto:oauth-request@ietf.org?subject=unsubscribe>
List-Archive: <http://www.ietf.org/mail-archive/web/oauth>
List-Post: <mailto:oauth@ietf.org>
List-Help: <mailto:oauth-request@ietf.org?subject=help>
List-Subscribe: <https://www.ietf.org/mailman/listinfo/oauth>, <mailto:oauth-request@ietf.org?subject=subscribe>
X-List-Received-Date: Wed, 20 Feb 2013 16:24:09 -0000

--Apple-Mail=_6E8803B4-655D-4057-B848-CE30D7F8A5C3
Content-Type: multipart/alternative;
	boundary="Apple-Mail=_37C5F444-EAA9-40DE-89F8-2EA723325CC7"


--Apple-Mail=_37C5F444-EAA9-40DE-89F8-2EA723325CC7
Content-Transfer-Encoding: quoted-printable
Content-Type: text/plain;
	charset=windows-1252

I think registration_access_url is OK.    I haven't heard any better =
names yet.

John B.
On 2013-02-20, at 1:04 PM, Mike Jones <Michael.Jones@microsoft.com> =
wrote:

> For what it=92s worth, the name =93registration_access_url=94 was =
chosen to be parallel to =93registration_access_token=94.   It=92s the =
place you use the access token.  And it=92s where you access an existing =
registration.  I=92m against the name =93client_metadata_url=94 because =
it=92s not metadata you=92re accessing =96 it=92s a registration you=92re =
accessing.  For the same reason, I don=92t think the name =
=93client_info_url=94 gives people the right idea, because it doesn=92t =
say anything it being the registration that you=92re accessing.
> =20
> If you really want us to change this, having read what=92s above, I =
could live with =93client_registration_url=94, but I don=92t think a =
change is actually necessary.  (But if we are going to change it, let=92s =
do it ASAP, before the OpenID Connect Implementer=92s Drafts are =
published.)
> =20
>                                                             -- Mike
> =20
> From: oauth-bounces@ietf.org [mailto:oauth-bounces@ietf.org] On Behalf =
Of Nat Sakimura
> Sent: Wednesday, February 20, 2013 7:58 AM
> To: <oauth@ietf.org>; Richer, Justin P.; John Bradley
> Subject: Re: [OAUTH-WG] I-D Action: draft-ietf-oauth-dyn-reg-06.txt
> =20
> Thanks Justin.
>=20
> Even if we go flat rather than doing JSON Structure, the "Client
> Registration Access Endpoint" is not a good representative name.
>=20
> What it represents is the client metadata/info.
> It is not representing "Client Registration Access".=20
> What does "Client Registration Access" mean?=20
> Does UPDATing "Cleint Registration Access" make sense?
>=20
> Something in the line of "Client Metadata Endpoint" and
> something like "client_metadata_url" or "client_info_url" is much =
better.
>=20
> Nat
>=20
> 2013/2/15 Richer, Justin P. <jricher@mitre.org>
> Everyone, there's a new draft of DynReg up on the tracker. This draft =
tries to codify the discussions so far from this week into something we =
can all read. There are still plenty of open discussion points and items =
up for debate. Please read through this latest draft and see what's =
changed and help assure that it properly captures the conversations. If =
you have any inputs for the marked [[ Editor's Note ]] sections, please =
send them to the list by next Thursday to give me opportunity to get any =
necessary changes in by the cutoff date of Monday the 22nd.
>=20
> Thanks for all of your hard work everyone, I think this is *really* =
coming along now.
>=20
>  -- Justin
>=20
> On Feb 15, 2013, at 4:54 PM, internet-drafts@ietf.org wrote:
>=20
> >
> > A New Internet-Draft is available from the on-line Internet-Drafts =
directories.
> > This draft is a work item of the Web Authorization Protocol Working =
Group of the IETF.
> >
> >       Title           : OAuth Dynamic Client Registration Protocol
> >       Author(s)       : Justin Richer
> >                          John Bradley
> >                          Michael B. Jones
> >                          Maciej Machulak
> >       Filename        : draft-ietf-oauth-dyn-reg-06.txt
> >       Pages           : 21
> >       Date            : 2013-02-15
> >
> > Abstract:
> >   This specification defines an endpoint and protocol for dynamic
> >   registration of OAuth Clients at an Authorization Server.
> >
> >
> > The IETF datatracker status page for this draft is:
> > https://datatracker.ietf.org/doc/draft-ietf-oauth-dyn-reg
> >
> > There's also a htmlized version available at:
> > http://tools.ietf.org/html/draft-ietf-oauth-dyn-reg-06
> >
> > A diff from the previous version is available at:
> > http://www.ietf.org/rfcdiff?url2=3Ddraft-ietf-oauth-dyn-reg-06
> >
> >
> > Internet-Drafts are also available by anonymous FTP at:
> > ftp://ftp.ietf.org/internet-drafts/
> >
> > _______________________________________________
> > OAuth mailing list
> > OAuth@ietf.org
> > https://www.ietf.org/mailman/listinfo/oauth
>=20
> _______________________________________________
> OAuth mailing list
> OAuth@ietf.org
> https://www.ietf.org/mailman/listinfo/oauth
>=20
>=20
> =20
> --=20
> Nat Sakimura (=3Dnat)
> Chairman, OpenID Foundation
> http://nat.sakimura.org/
> @_nat_en


--Apple-Mail=_37C5F444-EAA9-40DE-89F8-2EA723325CC7
Content-Transfer-Encoding: quoted-printable
Content-Type: text/html;
	charset=windows-1252

<html><head><meta http-equiv=3D"Content-Type" content=3D"text/html =
charset=3Dwindows-1252"><base href=3D"x-msg://249/"></head><body =
style=3D"word-wrap: break-word; -webkit-nbsp-mode: space; =
-webkit-line-break: after-white-space; ">I think registration_access_url =
is OK. &nbsp; &nbsp;I haven't heard any better names =
yet.<div><br></div><div>John B.<br><div><div>On 2013-02-20, at 1:04 PM, =
Mike Jones &lt;<a =
href=3D"mailto:Michael.Jones@microsoft.com">Michael.Jones@microsoft.com</a=
>&gt; wrote:</div><br class=3D"Apple-interchange-newline"><blockquote =
type=3D"cite"><div lang=3D"EN-US" link=3D"blue" vlink=3D"purple" =
style=3D"font-family: Helvetica; font-size: medium; font-style: normal; =
font-variant: normal; font-weight: normal; letter-spacing: normal; =
line-height: normal; orphans: 2; text-align: -webkit-auto; text-indent: =
0px; text-transform: none; white-space: normal; widows: 2; word-spacing: =
0px; -webkit-text-size-adjust: auto; -webkit-text-stroke-width: 0px; =
"><div class=3D"WordSection1" style=3D"page: WordSection1; "><div =
style=3D"margin: 0in 0in 0.0001pt; font-size: 12pt; font-family: 'Times =
New Roman', serif; "><span style=3D"font-size: 11pt; font-family: =
Calibri, sans-serif; color: rgb(31, 73, 125); ">For what it=92s worth, =
the name =93registration_access_url=94 was chosen to be parallel to =
=93registration_access_token=94.&nbsp;&nbsp; It=92s the place you use =
the access token.&nbsp; And it=92s where you access an existing =
registration.&nbsp; I=92m against the name =93client_metadata_url=94 =
because it=92s not metadata you=92re accessing =96 it=92s a registration =
you=92re accessing.&nbsp; For the same reason, I don=92t think the name =
=93client_info_url=94 gives people the right idea, because it doesn=92t =
say anything it being the registration that you=92re =
accessing.<o:p></o:p></span></div><div style=3D"margin: 0in 0in =
0.0001pt; font-size: 12pt; font-family: 'Times New Roman', serif; =
"><span style=3D"font-size: 11pt; font-family: Calibri, sans-serif; =
color: rgb(31, 73, 125); ">&nbsp;</span></div><div style=3D"margin: 0in =
0in 0.0001pt; font-size: 12pt; font-family: 'Times New Roman', serif; =
"><span style=3D"font-size: 11pt; font-family: Calibri, sans-serif; =
color: rgb(31, 73, 125); ">If you really want us to change this, having =
read what=92s above, I could live with =93client_registration_url=94, =
but I don=92t think a change is actually necessary.&nbsp; (But if we are =
going to change it, let=92s do it ASAP, before the OpenID Connect =
Implementer=92s Drafts are published.)<o:p></o:p></span></div><div =
style=3D"margin: 0in 0in 0.0001pt; font-size: 12pt; font-family: 'Times =
New Roman', serif; "><span style=3D"font-size: 11pt; font-family: =
Calibri, sans-serif; color: rgb(31, 73, 125); ">&nbsp;</span></div><div =
style=3D"margin: 0in 0in 0.0001pt; font-size: 12pt; font-family: 'Times =
New Roman', serif; "><span style=3D"font-size: 11pt; font-family: =
Calibri, sans-serif; color: rgb(31, 73, 125); =
">&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;=
&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&n=
bsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbs=
p;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;=
&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp; -- =
Mike<o:p></o:p></span></div><div style=3D"margin: 0in 0in 0.0001pt; =
font-size: 12pt; font-family: 'Times New Roman', serif; "><span =
style=3D"font-size: 11pt; font-family: Calibri, sans-serif; color: =
rgb(31, 73, 125); ">&nbsp;</span></div><div style=3D"margin: 0in 0in =
0.0001pt; font-size: 12pt; font-family: 'Times New Roman', serif; =
"><b><span style=3D"font-size: 10pt; font-family: Tahoma, sans-serif; =
">From:</span></b><span style=3D"font-size: 10pt; font-family: Tahoma, =
sans-serif; "><span class=3D"Apple-converted-space">&nbsp;</span><a =
href=3D"mailto:oauth-bounces@ietf.org">oauth-bounces@ietf.org</a> =
[mailto:oauth-<a =
href=3D"mailto:bounces@ietf.org">bounces@ietf.org</a>]<span =
class=3D"Apple-converted-space">&nbsp;</span><b>On Behalf Of<span =
class=3D"Apple-converted-space">&nbsp;</span></b>Nat =
Sakimura<br><b>Sent:</b><span =
class=3D"Apple-converted-space">&nbsp;</span>Wednesday, February 20, =
2013 7:58 AM<br><b>To:</b><span =
class=3D"Apple-converted-space">&nbsp;</span>&lt;<a =
href=3D"mailto:oauth@ietf.org">oauth@ietf.org</a>&gt;; Richer, Justin =
P.; John Bradley<br><b>Subject:</b><span =
class=3D"Apple-converted-space">&nbsp;</span>Re: [OAUTH-WG] I-D Action: =
draft-ietf-oauth-dyn-reg-06.txt<o:p></o:p></span></div><div =
style=3D"margin: 0in 0in 0.0001pt; font-size: 12pt; font-family: 'Times =
New Roman', serif; "><o:p>&nbsp;</o:p></div><div style=3D"margin: 0in =
0in 0.0001pt; font-size: 12pt; font-family: 'Times New Roman', serif; =
"><span style=3D"font-size: 13.5pt; font-family: Arial, sans-serif; =
color: rgb(34, 34, 34); background-color: white; background-position: =
initial initial; background-repeat: initial initial; ">Thanks =
Justin.</span><span style=3D"font-size: 13.5pt; font-family: Arial, =
sans-serif; color: rgb(34, 34, 34); "><br><br><span =
style=3D"background-color: white; background-position: initial initial; =
background-repeat: initial initial; ">Even if we go flat rather than =
doing JSON Structure, the "Client</span><br><span =
style=3D"background-color: white; background-position: initial initial; =
background-repeat: initial initial; ">Registration Access Endpoint" is =
not a good representative name.</span><br><br><span =
style=3D"background-color: white; background-position: initial initial; =
background-repeat: initial initial; ">What it represents is the client =
metadata/info.</span><br><span style=3D"background-color: white; =
background-position: initial initial; background-repeat: initial =
initial; ">It is not representing "Client Registration =
Access".&nbsp;</span></span><o:p></o:p></div><div><div style=3D"margin: =
0in 0in 0.0001pt; font-size: 12pt; font-family: 'Times New Roman', =
serif; ">What does "Client Registration Access" =
mean?&nbsp;<o:p></o:p></div></div><div><p class=3D"MsoNormal" =
style=3D"margin: 0in 0in 12pt; font-size: 12pt; font-family: 'Times New =
Roman', serif; "><span style=3D"font-size: 13.5pt; font-family: Arial, =
sans-serif; color: rgb(34, 34, 34); background-color: white; =
background-position: initial initial; background-repeat: initial =
initial; ">Does UPDATing "Cleint Registration Access" make =
sense?</span><br><span style=3D"font-size: 13.5pt; font-family: Arial, =
sans-serif; color: rgb(34, 34, 34); "><br><span style=3D"background-color:=
 white; background-position: initial initial; background-repeat: initial =
initial; ">Something in the line of "Client Metadata Endpoint" =
and</span><br><span style=3D"background-color: white; =
background-position: initial initial; background-repeat: initial =
initial; ">something like "client_metadata_url" =
or&nbsp;"client_info_url" is much better.</span><br><br><span =
style=3D"background-color: white; background-position: initial initial; =
background-repeat: initial initial; =
">Nat</span></span><o:p></o:p></p><div><div style=3D"margin: 0in 0in =
0.0001pt; font-size: 12pt; font-family: 'Times New Roman', serif; =
">2013/2/15 Richer, Justin P. &lt;<a href=3D"mailto:jricher@mitre.org" =
target=3D"_blank" style=3D"color: purple; text-decoration: underline; =
">jricher@mitre.org</a>&gt;<o:p></o:p></div><div style=3D"margin: 0in =
0in 0.0001pt; font-size: 12pt; font-family: 'Times New Roman', serif; =
">Everyone, there's a new draft of DynReg up on the tracker. This draft =
tries to codify the discussions so far from this week into something we =
can all read. There are still plenty of open discussion points and items =
up for debate. Please read through this latest draft and see what's =
changed and help assure that it properly captures the conversations. If =
you have any inputs for the marked [[ Editor's Note ]] sections, please =
send them to the list by next Thursday to give me opportunity to get any =
necessary changes in by the cutoff date of Monday the =
22nd.<br><br>Thanks for all of your hard work everyone, I think this is =
*really* coming along now.<br><span style=3D"color: rgb(136, 136, 136); =
"><br><span class=3D"hoenzb">&nbsp;-- =
Justin</span></span><o:p></o:p></div><div><div style=3D"margin: 0in 0in =
0.0001pt; font-size: 12pt; font-family: 'Times New Roman', serif; =
"><br>On Feb 15, 2013, at 4:54 PM,<span =
class=3D"Apple-converted-space">&nbsp;</span><a =
href=3D"mailto:internet-drafts@ietf.org" style=3D"color: purple; =
text-decoration: underline; ">internet-drafts@ietf.org</a><span =
class=3D"Apple-converted-space">&nbsp;</span>wrote:<br><br>&gt;<br>&gt; =
A New Internet-Draft is available from the on-line Internet-Drafts =
directories.<br>&gt; This draft is a work item of the Web Authorization =
Protocol Working Group of the IETF.<br>&gt;<br>&gt; &nbsp; &nbsp; &nbsp; =
Title &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; : OAuth Dynamic Client =
Registration Protocol<br>&gt; &nbsp; &nbsp; &nbsp; Author(s) &nbsp; =
&nbsp; &nbsp; : Justin Richer<br>&gt; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; =
&nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp;John =
Bradley<br>&gt; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; =
&nbsp; &nbsp; &nbsp; &nbsp; &nbsp;Michael B. Jones<br>&gt; &nbsp; &nbsp; =
&nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; =
&nbsp;Maciej Machulak<br>&gt; &nbsp; &nbsp; &nbsp; Filename &nbsp; =
&nbsp; &nbsp; &nbsp;: draft-ietf-oauth-dyn-reg-06.txt<br>&gt; &nbsp; =
&nbsp; &nbsp; Pages &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; : 21<br>&gt; =
&nbsp; &nbsp; &nbsp; Date &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp;: =
2013-02-15<br>&gt;<br>&gt; Abstract:<br>&gt; &nbsp; This specification =
defines an endpoint and protocol for dynamic<br>&gt; &nbsp; registration =
of OAuth Clients at an Authorization Server.<br>&gt;<br>&gt;<br>&gt; The =
IETF datatracker status page for this draft is:<br>&gt;<span =
class=3D"Apple-converted-space">&nbsp;</span><a =
href=3D"https://datatracker.ietf.org/doc/draft-ietf-oauth-dyn-reg" =
target=3D"_blank" style=3D"color: purple; text-decoration: underline; =
">https://datatracker.ietf.org/doc/draft-ietf-oauth-dyn-reg</a><br>&gt;<br=
>&gt; There's also a htmlized version available at:<br>&gt;<span =
class=3D"Apple-converted-space">&nbsp;</span><a =
href=3D"http://tools.ietf.org/html/draft-ietf-oauth-dyn-reg-06" =
target=3D"_blank" style=3D"color: purple; text-decoration: underline; =
">http://tools.ietf.org/html/draft-ietf-oauth-dyn-reg-06</a><br>&gt;<br>&g=
t; A diff from the previous version is available at:<br>&gt;<span =
class=3D"Apple-converted-space">&nbsp;</span><a =
href=3D"http://www.ietf.org/rfcdiff?url2=3Ddraft-ietf-oauth-dyn-reg-06" =
target=3D"_blank" style=3D"color: purple; text-decoration: underline; =
">http://www.ietf.org/rfcdiff?url2=3Ddraft-ietf-oauth-dyn-reg-06</a><br>&g=
t;<br>&gt;<br>&gt; Internet-Drafts are also available by anonymous FTP =
at:<br>&gt;<span class=3D"Apple-converted-space">&nbsp;</span><a =
href=3D"ftp://ftp.ietf.org/internet-drafts/" target=3D"_blank" =
style=3D"color: purple; text-decoration: underline; =
">ftp://ftp.ietf.org/internet-drafts/</a><br>&gt;<br>&gt; =
_______________________________________________<br>&gt; OAuth mailing =
list<br>&gt;<span class=3D"Apple-converted-space">&nbsp;</span><a =
href=3D"mailto:OAuth@ietf.org" style=3D"color: purple; text-decoration: =
underline; ">OAuth@ietf.org</a><br>&gt;<span =
class=3D"Apple-converted-space">&nbsp;</span><a =
href=3D"https://www.ietf.org/mailman/listinfo/oauth" target=3D"_blank" =
style=3D"color: purple; text-decoration: underline; =
">https://www.ietf.org/mailman/listinfo/oauth</a><br><br>_________________=
______________________________<br>OAuth mailing list<br><a =
href=3D"mailto:OAuth@ietf.org" style=3D"color: purple; text-decoration: =
underline; ">OAuth@ietf.org</a><br><a =
href=3D"https://www.ietf.org/mailman/listinfo/oauth" target=3D"_blank" =
style=3D"color: purple; text-decoration: underline; =
">https://www.ietf.org/mailman/listinfo/oauth</a><o:p></o:p></div></div></=
div><div style=3D"margin: 0in 0in 0.0001pt; font-size: 12pt; =
font-family: 'Times New Roman', serif; "><br><br =
clear=3D"all"><o:p></o:p></div><div><div style=3D"margin: 0in 0in =
0.0001pt; font-size: 12pt; font-family: 'Times New Roman', serif; =
"><o:p>&nbsp;</o:p></div></div><div style=3D"margin: 0in 0in 0.0001pt; =
font-size: 12pt; font-family: 'Times New Roman', serif; ">--<span =
class=3D"Apple-converted-space">&nbsp;</span><br>Nat Sakimura =
(=3Dnat)<o:p></o:p></div><div><div style=3D"margin: 0in 0in 0.0001pt; =
font-size: 12pt; font-family: 'Times New Roman', serif; ">Chairman, =
OpenID Foundation<br><a href=3D"http://nat.sakimura.org/" =
target=3D"_blank" style=3D"color: purple; text-decoration: underline; =
">http://nat.sakimura.org/</a><br>@_nat_en</div></div></div></div></div></=
blockquote></div><br></div></body></html>=

--Apple-Mail=_37C5F444-EAA9-40DE-89F8-2EA723325CC7--

--Apple-Mail=_6E8803B4-655D-4057-B848-CE30D7F8A5C3
Content-Disposition: attachment;
	filename=smime.p7s
Content-Type: application/pkcs7-signature;
	name=smime.p7s
Content-Transfer-Encoding: base64
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--Apple-Mail=_6E8803B4-655D-4057-B848-CE30D7F8A5C3--

From twbray@google.com  Wed Feb 20 08:34:50 2013
Return-Path: <twbray@google.com>
X-Original-To: oauth@ietfa.amsl.com
Delivered-To: oauth@ietfa.amsl.com
Received: from localhost (localhost [127.0.0.1]) by ietfa.amsl.com (Postfix) with ESMTP id 40DC321F8816 for <oauth@ietfa.amsl.com>; Wed, 20 Feb 2013 08:34:50 -0800 (PST)
X-Virus-Scanned: amavisd-new at amsl.com
X-Spam-Flag: NO
X-Spam-Score: -101.838
X-Spam-Level: 
X-Spam-Status: No, score=-101.838 tagged_above=-999 required=5 tests=[AWL=0.139, BAYES_00=-2.599, FM_FORGED_GMAIL=0.622, HTML_MESSAGE=0.001, NO_RELAYS=-0.001, USER_IN_WHITELIST=-100]
Received: from mail.ietf.org ([64.170.98.30]) by localhost (ietfa.amsl.com [127.0.0.1]) (amavisd-new, port 10024) with ESMTP id mSJHUsNlOM0v for <oauth@ietfa.amsl.com>; Wed, 20 Feb 2013 08:34:49 -0800 (PST)
Received: from mail-ia0-x230.google.com (ia-in-x0230.1e100.net [IPv6:2607:f8b0:4001:c02::230]) by ietfa.amsl.com (Postfix) with ESMTP id 1A6F921F87FB for <oauth@ietf.org>; Wed, 20 Feb 2013 08:34:48 -0800 (PST)
Received: by mail-ia0-f176.google.com with SMTP id i18so7174506iac.7 for <oauth@ietf.org>; Wed, 20 Feb 2013 08:34:48 -0800 (PST)
DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=google.com; s=20120113; h=x-received:mime-version:in-reply-to:references:from:date:message-id :subject:to:cc:content-type; bh=5/3rA9gTVBgExnyh5hZDS3O5nSZQRQkvDa/hcaVi/Eg=; b=FXd1npma3hd9POMDiw8E6NvDo3zxA2nwQkoZXneqlOeHH6PCEzpLFP18DdRdK4CFhl Niz3B3WczJb2q4Bzl3PvbJLxV4O5FNyKMWtBBdylXQiRAm6NbcAlXO5OIIfDBljAoeA4 45MwyG3xJwf4oLV1gAc5GvtCdCQUVEzrD04QYg2szeuM7Ud3Fvi6gk9d9dN86/V4VRAB FQ7rGMJZ8t4mbtJ/AfRB6gNSyo/jQmFpCnj9JvPN4RGw+DwfrwZ2u4NslxJB1L2UkV8h D5gR047Z3fyYt0bquPrcFYkc/fQPcRcG1SjiEl+9HPIdBmBD3Cpizy05vn/YIqlMaMA5 pL6A==
X-Google-DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=google.com; s=20120113; h=x-received:mime-version:in-reply-to:references:from:date:message-id :subject:to:cc:content-type:x-gm-message-state; bh=5/3rA9gTVBgExnyh5hZDS3O5nSZQRQkvDa/hcaVi/Eg=; b=KiCuFgiYPLesssiGLeFhql2k4+yJNHlVSt05jV7vooiWsViUtS8pTGE6vhRjfsDSP8 g+5ISk3CWkQgPO7PxUIJaN3S12R//yJLU+e7zx6SlU/PWhjF21kIDhPyQKDLCD+FQN6K mLLuwHSawj7vtUxG/j68+eTfa+2HBSoFPbuc9aabi3DTbXmPmI+Cdrr6heJJVL7yinfX Mvnz81+smJUVedJaGMnYNR/w2sv4pxAyLH0QqyZOf6IG/SuPa1C6/+VpUaJSjpuSbEoF TSJPYO1sPkhIiPi7I/pnIPgRuIQXe6wVGbYfDn4364ACW1EqfVujn1D2y/Z+z2Zakrz+ 8PkQ==
X-Received: by 10.50.180.197 with SMTP id dq5mr11347234igc.22.1361378088332; Wed, 20 Feb 2013 08:34:48 -0800 (PST)
MIME-Version: 1.0
Received: by 10.64.63.11 with HTTP; Wed, 20 Feb 2013 08:34:15 -0800 (PST)
In-Reply-To: <63255CDA-E93F-4414-B471-B373C4B6F65E@ve7jtb.com>
References: <20130215215423.23019.50224.idtracker@ietfa.amsl.com> <B33BFB58CCC8BE4998958016839DE27E06894B4F@IMCMBX01.MITRE.ORG> <CABzCy2CgnAtPrTY37H6vO-+5u3tRmsm+1j86r3w046AhHnNdfw@mail.gmail.com> <4E1F6AAD24975D4BA5B16804296739436747A665@TK5EX14MBXC284.redmond.corp.microsoft.com> <63255CDA-E93F-4414-B471-B373C4B6F65E@ve7jtb.com>
From: Tim Bray <twbray@google.com>
Date: Wed, 20 Feb 2013 08:34:15 -0800
Message-ID: <CA+ZpN278s7BRuUV31PzqL9fEK+3rKT6UiQiwmv_pfbK91g+yQg@mail.gmail.com>
To: John Bradley <ve7jtb@ve7jtb.com>
Content-Type: multipart/alternative; boundary=14dae9340b735c2ca704d62a8931
X-Gm-Message-State: ALoCoQnQx3InBBRGm2pfeEB/kQQfsLIA3M9yrDkxDw2Qurb95EPIoZrDBmvOTyoeHSUZs606VfC4+zlRTquHPNrxWiM/28lPArzF19xWNwduMB5WLceN5favsrIN/Gj7Zq1TkoO1/bkSBYnlZ/CJjW9/NLJnQRya7i+NCw52153Ew/MocYzyK8TyiedZpVuJd29aQVWnfKnP
Cc: "<oauth@ietf.org>" <oauth@ietf.org>
Subject: Re: [OAUTH-WG] I-D Action: draft-ietf-oauth-dyn-reg-06.txt
X-BeenThere: oauth@ietf.org
X-Mailman-Version: 2.1.12
Precedence: list
List-Id: OAUTH WG <oauth.ietf.org>
List-Unsubscribe: <https://www.ietf.org/mailman/options/oauth>, <mailto:oauth-request@ietf.org?subject=unsubscribe>
List-Archive: <http://www.ietf.org/mail-archive/web/oauth>
List-Post: <mailto:oauth@ietf.org>
List-Help: <mailto:oauth-request@ietf.org?subject=help>
List-Subscribe: <https://www.ietf.org/mailman/listinfo/oauth>, <mailto:oauth-request@ietf.org?subject=subscribe>
X-List-Received-Date: Wed, 20 Feb 2013 16:34:50 -0000

--14dae9340b735c2ca704d62a8931
Content-Type: text/plain; charset=UTF-8
Content-Transfer-Encoding: quoted-printable

In OAuth, we have redirect_uri not redirect_url; should this be
registration_access_uri for consistency? -T

On Wed, Feb 20, 2013 at 8:23 AM, John Bradley <ve7jtb@ve7jtb.com> wrote:

> I think registration_access_url is OK.    I haven't heard any better name=
s
> yet.
>
> John B.
>
> On 2013-02-20, at 1:04 PM, Mike Jones <Michael.Jones@microsoft.com> wrote=
:
>
>  For what it=E2=80=99s worth, the name =E2=80=9Cregistration_access_url=
=E2=80=9D was chosen to be
> parallel to =E2=80=9Cregistration_access_token=E2=80=9D.   It=E2=80=99s t=
he place you use the
> access token.  And it=E2=80=99s where you access an existing registration=
.  I=E2=80=99m
> against the name =E2=80=9Cclient_metadata_url=E2=80=9D because it=E2=80=
=99s not metadata you=E2=80=99re
> accessing =E2=80=93 it=E2=80=99s a registration you=E2=80=99re accessing.=
  For the same reason, I
> don=E2=80=99t think the name =E2=80=9Cclient_info_url=E2=80=9D gives peop=
le the right idea, because
> it doesn=E2=80=99t say anything it being the registration that you=E2=80=
=99re accessing.**
> **
>
> If you really want us to change this, having read what=E2=80=99s above, I=
 could
> live with =E2=80=9Cclient_registration_url=E2=80=9D, but I don=E2=80=99t =
think a change is actually
> necessary.  (But if we are going to change it, let=E2=80=99s do it ASAP, =
before the
> OpenID Connect Implementer=E2=80=99s Drafts are published.)****
>
>                                                             -- Mike****
>
> *From:* oauth-bounces@ietf.org [mailto:oauth-bounces@ietf.org] *On Behalf
> Of *Nat Sakimura
> *Sent:* Wednesday, February 20, 2013 7:58 AM
> *To:* <oauth@ietf.org>; Richer, Justin P.; John Bradley
> *Subject:* Re: [OAUTH-WG] I-D Action: draft-ietf-oauth-dyn-reg-06.txt****
> ** **
> Thanks Justin.
>
> Even if we go flat rather than doing JSON Structure, the "Client
> Registration Access Endpoint" is not a good representative name.
>
> What it represents is the client metadata/info.
> It is not representing "Client Registration Access". ****
> What does "Client Registration Access" mean? ****
>
> Does UPDATing "Cleint Registration Access" make sense?
>
> Something in the line of "Client Metadata Endpoint" and
> something like "client_metadata_url" or "client_info_url" is much better.
>
> Nat****
> 2013/2/15 Richer, Justin P. <jricher@mitre.org>****
> Everyone, there's a new draft of DynReg up on the tracker. This draft
> tries to codify the discussions so far from this week into something we c=
an
> all read. There are still plenty of open discussion points and items up f=
or
> debate. Please read through this latest draft and see what's changed and
> help assure that it properly captures the conversations. If you have any
> inputs for the marked [[ Editor's Note ]] sections, please send them to t=
he
> list by next Thursday to give me opportunity to get any necessary changes
> in by the cutoff date of Monday the 22nd.
>
> Thanks for all of your hard work everyone, I think this is *really* comin=
g
> along now.
>
>  -- Justin****
>
> On Feb 15, 2013, at 4:54 PM, internet-drafts@ietf.org wrote:
>
> >
> > A New Internet-Draft is available from the on-line Internet-Drafts
> directories.
> > This draft is a work item of the Web Authorization Protocol Working
> Group of the IETF.
> >
> >       Title           : OAuth Dynamic Client Registration Protocol
> >       Author(s)       : Justin Richer
> >                          John Bradley
> >                          Michael B. Jones
> >                          Maciej Machulak
> >       Filename        : draft-ietf-oauth-dyn-reg-06.txt
> >       Pages           : 21
> >       Date            : 2013-02-15
> >
> > Abstract:
> >   This specification defines an endpoint and protocol for dynamic
> >   registration of OAuth Clients at an Authorization Server.
> >
> >
> > The IETF datatracker status page for this draft is:
> > https://datatracker.ietf.org/doc/draft-ietf-oauth-dyn-reg
> >
> > There's also a htmlized version available at:
> > http://tools.ietf.org/html/draft-ietf-oauth-dyn-reg-06
> >
> > A diff from the previous version is available at:
> > http://www.ietf.org/rfcdiff?url2=3Ddraft-ietf-oauth-dyn-reg-06
> >
> >
> > Internet-Drafts are also available by anonymous FTP at:
> > ftp://ftp.ietf.org/internet-drafts/
> >
> > _______________________________________________
> > OAuth mailing list
> > OAuth@ietf.org
> > https://www.ietf.org/mailman/listinfo/oauth
>
> _______________________________________________
> OAuth mailing list
> OAuth@ietf.org
> https://www.ietf.org/mailman/listinfo/oauth****
>
>
> ****
> ** **
> --
> Nat Sakimura (=3Dnat)****
> Chairman, OpenID Foundation
> http://nat.sakimura.org/
> @_nat_en
>
>
>
> _______________________________________________
> OAuth mailing list
> OAuth@ietf.org
> https://www.ietf.org/mailman/listinfo/oauth
>
>

--14dae9340b735c2ca704d62a8931
Content-Type: text/html; charset=UTF-8
Content-Transfer-Encoding: quoted-printable

In OAuth, we have redirect_uri not redirect_url; should this be registratio=
n_access_uri for consistency? -T<br><br><div class=3D"gmail_quote">On Wed, =
Feb 20, 2013 at 8:23 AM, John Bradley <span dir=3D"ltr">&lt;<a href=3D"mail=
to:ve7jtb@ve7jtb.com" target=3D"_blank">ve7jtb@ve7jtb.com</a>&gt;</span> wr=
ote:<br>

<blockquote class=3D"gmail_quote" style=3D"margin:0 0 0 .8ex;border-left:1p=
x #ccc solid;padding-left:1ex"><div style=3D"word-wrap:break-word">I think =
registration_access_url is OK. =C2=A0 =C2=A0I haven&#39;t heard any better =
names yet.<div>

<br></div><div>John B.<div><div class=3D"h5"><br><div><div>On 2013-02-20, a=
t 1:04 PM, Mike Jones &lt;<a href=3D"mailto:Michael.Jones@microsoft.com" ta=
rget=3D"_blank">Michael.Jones@microsoft.com</a>&gt; wrote:</div><br><blockq=
uote type=3D"cite">

<div lang=3D"EN-US" link=3D"blue" vlink=3D"purple" style=3D"font-family:Hel=
vetica;font-size:medium;font-style:normal;font-variant:normal;font-weight:n=
ormal;letter-spacing:normal;line-height:normal;text-align:-webkit-auto;text=
-indent:0px;text-transform:none;white-space:normal;word-spacing:0px">

<div><div style=3D"margin:0in 0in 0.0001pt;font-size:12pt;font-family:&#39;=
Times New Roman&#39;,serif"><span style=3D"font-size:11pt;font-family:Calib=
ri,sans-serif;color:rgb(31,73,125)">For what it=E2=80=99s worth, the name =
=E2=80=9Cregistration_access_url=E2=80=9D was chosen to be parallel to =E2=
=80=9Cregistration_access_token=E2=80=9D.=C2=A0=C2=A0 It=E2=80=99s the plac=
e you use the access token.=C2=A0 And it=E2=80=99s where you access an exis=
ting registration.=C2=A0 I=E2=80=99m against the name =E2=80=9Cclient_metad=
ata_url=E2=80=9D because it=E2=80=99s not metadata you=E2=80=99re accessing=
 =E2=80=93 it=E2=80=99s a registration you=E2=80=99re accessing.=C2=A0 For =
the same reason, I don=E2=80=99t think the name =E2=80=9Cclient_info_url=E2=
=80=9D gives people the right idea, because it doesn=E2=80=99t say anything=
 it being the registration that you=E2=80=99re accessing.<u></u><u></u></sp=
an></div>

<div style=3D"margin:0in 0in 0.0001pt;font-size:12pt;font-family:&#39;Times=
 New Roman&#39;,serif"><span style=3D"font-size:11pt;font-family:Calibri,sa=
ns-serif;color:rgb(31,73,125)">=C2=A0</span></div><div style=3D"margin:0in =
0in 0.0001pt;font-size:12pt;font-family:&#39;Times New Roman&#39;,serif">

<span style=3D"font-size:11pt;font-family:Calibri,sans-serif;color:rgb(31,7=
3,125)">If you really want us to change this, having read what=E2=80=99s ab=
ove, I could live with =E2=80=9Cclient_registration_url=E2=80=9D, but I don=
=E2=80=99t think a change is actually necessary.=C2=A0 (But if we are going=
 to change it, let=E2=80=99s do it ASAP, before the OpenID Connect Implemen=
ter=E2=80=99s Drafts are published.)<u></u><u></u></span></div>

<div style=3D"margin:0in 0in 0.0001pt;font-size:12pt;font-family:&#39;Times=
 New Roman&#39;,serif"><span style=3D"font-size:11pt;font-family:Calibri,sa=
ns-serif;color:rgb(31,73,125)">=C2=A0</span></div><div style=3D"margin:0in =
0in 0.0001pt;font-size:12pt;font-family:&#39;Times New Roman&#39;,serif">

<span style=3D"font-size:11pt;font-family:Calibri,sans-serif;color:rgb(31,7=
3,125)">=C2=A0=C2=A0=C2=A0=C2=A0=C2=A0=C2=A0=C2=A0=C2=A0=C2=A0=C2=A0=C2=A0=
=C2=A0=C2=A0=C2=A0=C2=A0=C2=A0=C2=A0=C2=A0=C2=A0=C2=A0=C2=A0=C2=A0=C2=A0=C2=
=A0=C2=A0=C2=A0=C2=A0=C2=A0=C2=A0=C2=A0=C2=A0=C2=A0=C2=A0=C2=A0=C2=A0=C2=A0=
=C2=A0=C2=A0=C2=A0=C2=A0=C2=A0=C2=A0=C2=A0=C2=A0=C2=A0=C2=A0=C2=A0=C2=A0=C2=
=A0=C2=A0=C2=A0=C2=A0=C2=A0=C2=A0=C2=A0=C2=A0=C2=A0=C2=A0=C2=A0 -- Mike<u><=
/u><u></u></span></div><div style=3D"margin:0in 0in 0.0001pt;font-size:12pt=
;font-family:&#39;Times New Roman&#39;,serif">

<span style=3D"font-size:11pt;font-family:Calibri,sans-serif;color:rgb(31,7=
3,125)">=C2=A0</span></div><div style=3D"margin:0in 0in 0.0001pt;font-size:=
12pt;font-family:&#39;Times New Roman&#39;,serif"><b><span style=3D"font-si=
ze:10pt;font-family:Tahoma,sans-serif">From:</span></b><span style=3D"font-=
size:10pt;font-family:Tahoma,sans-serif"><span>=C2=A0</span><a href=3D"mail=
to:oauth-bounces@ietf.org" target=3D"_blank">oauth-bounces@ietf.org</a> [ma=
ilto:<a href=3D"mailto:oauth-" target=3D"_blank">oauth-</a><a href=3D"mailt=
o:bounces@ietf.org" target=3D"_blank">bounces@ietf.org</a>]<span>=C2=A0</sp=
an><b>On Behalf Of<span>=C2=A0</span></b>Nat Sakimura<br>

<b>Sent:</b><span>=C2=A0</span>Wednesday, February 20, 2013 7:58 AM<br><b>T=
o:</b><span>=C2=A0</span>&lt;<a href=3D"mailto:oauth@ietf.org" target=3D"_b=
lank">oauth@ietf.org</a>&gt;; Richer, Justin P.; John Bradley<br><b>Subject=
:</b><span>=C2=A0</span>Re: [OAUTH-WG] I-D Action: draft-ietf-oauth-dyn-reg=
-06.txt<u></u><u></u></span></div>

<div style=3D"margin:0in 0in 0.0001pt;font-size:12pt;font-family:&#39;Times=
 New Roman&#39;,serif"><u></u>=C2=A0<u></u></div><div style=3D"margin:0in 0=
in 0.0001pt;font-size:12pt;font-family:&#39;Times New Roman&#39;,serif"><sp=
an style=3D"color:rgb(34,34,34);font-size:13.5pt;font-family:Arial,sans-ser=
if;background-repeat:initial initial">Thanks Justin.</span><span style=3D"f=
ont-size:13.5pt;font-family:Arial,sans-serif;color:rgb(34,34,34)"><br>

<br><span style=3D"background-repeat:initial initial">Even if we go flat ra=
ther than doing JSON Structure, the &quot;Client</span><br><span style=3D"b=
ackground-repeat:initial initial">Registration Access Endpoint&quot; is not=
 a good representative name.</span><br>

<br><span style=3D"background-repeat:initial initial">What it represents is=
 the client metadata/info.</span><br><span style=3D"background-repeat:initi=
al initial">It is not representing &quot;Client Registration Access&quot;.=
=C2=A0</span></span><u></u><u></u></div>

<div><div style=3D"margin:0in 0in 0.0001pt;font-size:12pt;font-family:&#39;=
Times New Roman&#39;,serif">What does &quot;Client Registration Access&quot=
; mean?=C2=A0<u></u><u></u></div></div><div><p class=3D"MsoNormal" style=3D=
"margin:0in 0in 12pt;font-size:12pt;font-family:&#39;Times New Roman&#39;,s=
erif">

<span style=3D"color:rgb(34,34,34);font-size:13.5pt;font-family:Arial,sans-=
serif;background-repeat:initial initial">Does UPDATing &quot;Cleint Registr=
ation Access&quot; make sense?</span><br><span style=3D"font-size:13.5pt;fo=
nt-family:Arial,sans-serif;color:rgb(34,34,34)"><br>

<span style=3D"background-repeat:initial initial">Something in the line of =
&quot;Client Metadata Endpoint&quot; and</span><br><span style=3D"backgroun=
d-repeat:initial initial">something like &quot;client_metadata_url&quot; or=
=C2=A0&quot;client_info_url&quot; is much better.</span><br>

<br><span style=3D"background-repeat:initial initial">Nat</span></span><u><=
/u><u></u></p><div><div style=3D"margin:0in 0in 0.0001pt;font-size:12pt;fon=
t-family:&#39;Times New Roman&#39;,serif">2013/2/15 Richer, Justin P. &lt;<=
a href=3D"mailto:jricher@mitre.org" style=3D"color:purple;text-decoration:u=
nderline" target=3D"_blank">jricher@mitre.org</a>&gt;<u></u><u></u></div>

<div style=3D"margin:0in 0in 0.0001pt;font-size:12pt;font-family:&#39;Times=
 New Roman&#39;,serif">Everyone, there&#39;s a new draft of DynReg up on th=
e tracker. This draft tries to codify the discussions so far from this week=
 into something we can all read. There are still plenty of open discussion =
points and items up for debate. Please read through this latest draft and s=
ee what&#39;s changed and help assure that it properly captures the convers=
ations. If you have any inputs for the marked [[ Editor&#39;s Note ]] secti=
ons, please send them to the list by next Thursday to give me opportunity t=
o get any necessary changes in by the cutoff date of Monday the 22nd.<br>

<br>Thanks for all of your hard work everyone, I think this is *really* com=
ing along now.<br><span style=3D"color:rgb(136,136,136)"><br><span>=C2=A0--=
 Justin</span></span><u></u><u></u></div><div><div style=3D"margin:0in 0in =
0.0001pt;font-size:12pt;font-family:&#39;Times New Roman&#39;,serif">

<br>On Feb 15, 2013, at 4:54 PM,<span>=C2=A0</span><a href=3D"mailto:intern=
et-drafts@ietf.org" style=3D"color:purple;text-decoration:underline" target=
=3D"_blank">internet-drafts@ietf.org</a><span>=C2=A0</span>wrote:<br><br>&g=
t;<br>&gt; A New Internet-Draft is available from the on-line Internet-Draf=
ts directories.<br>

&gt; This draft is a work item of the Web Authorization Protocol Working Gr=
oup of the IETF.<br>&gt;<br>&gt; =C2=A0 =C2=A0 =C2=A0 Title =C2=A0 =C2=A0 =
=C2=A0 =C2=A0 =C2=A0 : OAuth Dynamic Client Registration Protocol<br>&gt; =
=C2=A0 =C2=A0 =C2=A0 Author(s) =C2=A0 =C2=A0 =C2=A0 : Justin Richer<br>

&gt; =C2=A0 =C2=A0 =C2=A0 =C2=A0 =C2=A0 =C2=A0 =C2=A0 =C2=A0 =C2=A0 =C2=A0 =
=C2=A0 =C2=A0 =C2=A0John Bradley<br>&gt; =C2=A0 =C2=A0 =C2=A0 =C2=A0 =C2=A0=
 =C2=A0 =C2=A0 =C2=A0 =C2=A0 =C2=A0 =C2=A0 =C2=A0 =C2=A0Michael B. Jones<br=
>&gt; =C2=A0 =C2=A0 =C2=A0 =C2=A0 =C2=A0 =C2=A0 =C2=A0 =C2=A0 =C2=A0 =C2=A0=
 =C2=A0 =C2=A0 =C2=A0Maciej Machulak<br>&gt; =C2=A0 =C2=A0 =C2=A0 Filename =
=C2=A0 =C2=A0 =C2=A0 =C2=A0: draft-ietf-oauth-dyn-reg-06.txt<br>&gt; =C2=A0=
 =C2=A0 =C2=A0 Pages =C2=A0 =C2=A0 =C2=A0 =C2=A0 =C2=A0 : 21<br>

&gt; =C2=A0 =C2=A0 =C2=A0 Date =C2=A0 =C2=A0 =C2=A0 =C2=A0 =C2=A0 =C2=A0: 2=
013-02-15<br>&gt;<br>&gt; Abstract:<br>&gt; =C2=A0 This specification defin=
es an endpoint and protocol for dynamic<br>&gt; =C2=A0 registration of OAut=
h Clients at an Authorization Server.<br>&gt;<br>&gt;<br>

&gt; The IETF datatracker status page for this draft is:<br>&gt;<span>=C2=
=A0</span><a href=3D"https://datatracker.ietf.org/doc/draft-ietf-oauth-dyn-=
reg" style=3D"color:purple;text-decoration:underline" target=3D"_blank">htt=
ps://datatracker.ietf.org/doc/draft-ietf-oauth-dyn-reg</a><br>

&gt;<br>&gt; There&#39;s also a htmlized version available at:<br>&gt;<span=
>=C2=A0</span><a href=3D"http://tools.ietf.org/html/draft-ietf-oauth-dyn-re=
g-06" style=3D"color:purple;text-decoration:underline" target=3D"_blank">ht=
tp://tools.ietf.org/html/draft-ietf-oauth-dyn-reg-06</a><br>

&gt;<br>&gt; A diff from the previous version is available at:<br>&gt;<span=
>=C2=A0</span><a href=3D"http://www.ietf.org/rfcdiff?url2=3Ddraft-ietf-oaut=
h-dyn-reg-06" style=3D"color:purple;text-decoration:underline" target=3D"_b=
lank">http://www.ietf.org/rfcdiff?url2=3Ddraft-ietf-oauth-dyn-reg-06</a><br=
>

&gt;<br>&gt;<br>&gt; Internet-Drafts are also available by anonymous FTP at=
:<br>&gt;<span>=C2=A0</span><a href=3D"ftp://ftp.ietf.org/internet-drafts/"=
 style=3D"color:purple;text-decoration:underline" target=3D"_blank">ftp://f=
tp.ietf.org/internet-drafts/</a><br>

&gt;<br>&gt; _______________________________________________<br>&gt; OAuth =
mailing list<br>&gt;<span>=C2=A0</span><a href=3D"mailto:OAuth@ietf.org" st=
yle=3D"color:purple;text-decoration:underline" target=3D"_blank">OAuth@ietf=
.org</a><br>

&gt;<span>=C2=A0</span><a href=3D"https://www.ietf.org/mailman/listinfo/oau=
th" style=3D"color:purple;text-decoration:underline" target=3D"_blank">http=
s://www.ietf.org/mailman/listinfo/oauth</a><br><br>________________________=
_______________________<br>

OAuth mailing list<br><a href=3D"mailto:OAuth@ietf.org" style=3D"color:purp=
le;text-decoration:underline" target=3D"_blank">OAuth@ietf.org</a><br><a hr=
ef=3D"https://www.ietf.org/mailman/listinfo/oauth" style=3D"color:purple;te=
xt-decoration:underline" target=3D"_blank">https://www.ietf.org/mailman/lis=
tinfo/oauth</a><u></u><u></u></div>

</div></div><div style=3D"margin:0in 0in 0.0001pt;font-size:12pt;font-famil=
y:&#39;Times New Roman&#39;,serif"><br><br clear=3D"all"><u></u><u></u></di=
v><div><div style=3D"margin:0in 0in 0.0001pt;font-size:12pt;font-family:&#3=
9;Times New Roman&#39;,serif">

<u></u>=C2=A0<u></u></div></div><div style=3D"margin:0in 0in 0.0001pt;font-=
size:12pt;font-family:&#39;Times New Roman&#39;,serif">--<span>=C2=A0</span=
><br>Nat Sakimura (=3Dnat)<u></u><u></u></div><div><div style=3D"margin:0in=
 0in 0.0001pt;font-size:12pt;font-family:&#39;Times New Roman&#39;,serif">

Chairman, OpenID Foundation<br><a href=3D"http://nat.sakimura.org/" style=
=3D"color:purple;text-decoration:underline" target=3D"_blank">http://nat.sa=
kimura.org/</a><br>@_nat_en</div></div></div></div></div></blockquote></div=
><br>

</div></div></div></div><br>_______________________________________________=
<br>
OAuth mailing list<br>
<a href=3D"mailto:OAuth@ietf.org">OAuth@ietf.org</a><br>
<a href=3D"https://www.ietf.org/mailman/listinfo/oauth" target=3D"_blank">h=
ttps://www.ietf.org/mailman/listinfo/oauth</a><br>
<br></blockquote></div><br>

--14dae9340b735c2ca704d62a8931--

From sakimura@gmail.com  Wed Feb 20 08:53:43 2013
Return-Path: <sakimura@gmail.com>
X-Original-To: oauth@ietfa.amsl.com
Delivered-To: oauth@ietfa.amsl.com
Received: from localhost (localhost [127.0.0.1]) by ietfa.amsl.com (Postfix) with ESMTP id 5DB8021F84F9 for <oauth@ietfa.amsl.com>; Wed, 20 Feb 2013 08:53:30 -0800 (PST)
X-Virus-Scanned: amavisd-new at amsl.com
X-Spam-Flag: NO
X-Spam-Score: -3.206
X-Spam-Level: 
X-Spam-Status: No, score=-3.206 tagged_above=-999 required=5 tests=[AWL=0.392,  BAYES_00=-2.599, HTML_MESSAGE=0.001, RCVD_IN_DNSWL_LOW=-1]
Received: from mail.ietf.org ([64.170.98.30]) by localhost (ietfa.amsl.com [127.0.0.1]) (amavisd-new, port 10024) with ESMTP id JXXO6UdF8aUY for <oauth@ietfa.amsl.com>; Wed, 20 Feb 2013 08:53:28 -0800 (PST)
Received: from mail-qa0-f54.google.com (mail-qa0-f54.google.com [209.85.216.54]) by ietfa.amsl.com (Postfix) with ESMTP id 7E65321F84F8 for <oauth@ietf.org>; Wed, 20 Feb 2013 08:53:28 -0800 (PST)
Received: by mail-qa0-f54.google.com with SMTP id hg5so2505787qab.20 for <oauth@ietf.org>; Wed, 20 Feb 2013 08:53:28 -0800 (PST)
DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=gmail.com; s=20120113; h=mime-version:x-received:in-reply-to:references:date:message-id :subject:from:to:cc:content-type; bh=F9JMCmdvtjY7Zu5368JkIU2ouMHUjpXkem6E9TOsPzE=; b=effEHqZUw6vPsthYDdU3t4DqqEDnfZ71gPmIYIx8BPp+hxOKvWLqYFjJPTQSrunOIN d8aKpa1c3rrdYDURlDbzailwr9S5ArDpZUzXysTXcpim+buHpAdPe2bwfw7u09wNOZCS XhK+nwHHa6ivCdgPryXcMyf+z3gFIwm8uCLaF/evH5yesYchhrAaWaQmOJeczCGBanyp DNWoT58wzdmVIRmMw+vy1dQZjifPBuuOgTppu36TZWYZlQFmpZqa2PkTjElKvhrVQn2n oh0ZeEZf62zou01H53u01vaO3n+6xOafojXHx6V6AJ73n5MEg5bzjQyJ+gPnn3fZ7tW8 u6jA==
MIME-Version: 1.0
X-Received: by 10.224.222.15 with SMTP id ie15mr10029878qab.75.1361379208016;  Wed, 20 Feb 2013 08:53:28 -0800 (PST)
Received: by 10.49.106.161 with HTTP; Wed, 20 Feb 2013 08:53:27 -0800 (PST)
In-Reply-To: <4E1F6AAD24975D4BA5B16804296739436747A665@TK5EX14MBXC284.redmond.corp.microsoft.com>
References: <20130215215423.23019.50224.idtracker@ietfa.amsl.com> <B33BFB58CCC8BE4998958016839DE27E06894B4F@IMCMBX01.MITRE.ORG> <CABzCy2CgnAtPrTY37H6vO-+5u3tRmsm+1j86r3w046AhHnNdfw@mail.gmail.com> <4E1F6AAD24975D4BA5B16804296739436747A665@TK5EX14MBXC284.redmond.corp.microsoft.com>
Date: Wed, 20 Feb 2013 11:53:27 -0500
Message-ID: <CABzCy2DHvFVmtv9jB-re5efKEVrfBBk4BZ83n_EQLMHOqsnXcA@mail.gmail.com>
From: Nat Sakimura <sakimura@gmail.com>
To: Mike Jones <Michael.Jones@microsoft.com>
Content-Type: multipart/alternative; boundary=20cf3074b51a19334a04d62acc16
Cc: "<oauth@ietf.org>" <oauth@ietf.org>
Subject: Re: [OAUTH-WG] I-D Action: draft-ietf-oauth-dyn-reg-06.txt
X-BeenThere: oauth@ietf.org
X-Mailman-Version: 2.1.12
Precedence: list
List-Id: OAUTH WG <oauth.ietf.org>
List-Unsubscribe: <https://www.ietf.org/mailman/options/oauth>, <mailto:oauth-request@ietf.org?subject=unsubscribe>
List-Archive: <http://www.ietf.org/mail-archive/web/oauth>
List-Post: <mailto:oauth@ietf.org>
List-Help: <mailto:oauth-request@ietf.org?subject=help>
List-Subscribe: <https://www.ietf.org/mailman/listinfo/oauth>, <mailto:oauth-request@ietf.org?subject=subscribe>
X-List-Received-Date: Wed, 20 Feb 2013 16:53:43 -0000

--20cf3074b51a19334a04d62acc16
Content-Type: text/plain; charset=windows-1252
Content-Transfer-Encoding: quoted-printable

I have read the whole thing and still ---

Your argument that it is the place for using "registration access token"
thus should have a parallel name "registration access url" is very weak.
There are several weakness.

First, "registration access token" actually is "registration" + "access
token". Extracting "registration access" from "registration access token"
is broken.

Secondly, access token is used to against any protected
resource. Recommending to use the word "access" in naming protected
resources is broken. Should we rename Userinfo endpoint to something like
"Userinfo Access Endpoint"? I do not think so.

Thirdly, the term "Registration Access" does not seem to be meaningful.
When you say "access", I suppose you are using the noun version of it.
(If you are using the verb, then I am even more against as a URL should not
contain a verb.)

According to the Webster, access (n.) is defined as:

*access **n.*

1
*a* *:* onset <http://www.merriam-webster.com/dictionary/onset> 2
*b* *:* a fit of intense feeling *:*
outburst<http://www.merriam-webster.com/dictionary/outburst>
2
*a* *:* permission, liberty, or ability to enter, approach, or pass to and
from a place or to approach or communicate with a person or thing
*b* *:* freedom or ability to obtain or make use of something
*c* *:* a way or means of access
*d* *:* the act or an instance of
accessing<http://www.merriam-webster.com/dictionary/accessing>
3
*:* an increase by addition <a sudden *access* of wealth>

Replacing "access" with any of the definition above does not seem to work.

Remember, a URL is represents a "thing".
The name of the endpoint should represent the "thing".

I am merginally OK with "client registration url" leveraging on the
definition 2. below (again from Webster -- my OED subscription lapsed for
the time being.)

*registration **n.*

1
*:* the act of registering<http://www.merriam-webster.com/dictionary/regist=
ering>
2
*:* an entry in a register<http://www.merriam-webster.com/dictionary/regist=
er>
3
*:* the number of individuals
registered<http://www.merriam-webster.com/dictionary/registered>
 *:* enrollment <http://www.merriam-webster.com/dictionary/enrollment>
4
*a* *:* the art or act of selecting and adjusting pipe organ stops
*b* *:* the combination of stops selected for performing a particular organ
work
5
*:* a document certifying an act of registering

However, since the most common use of "registration" is actually *1* above,
it still is confusing. If you really want to emphasize the fact that it has
been registered, then something like "registered client info uri" or
"registered client metadata uri" would be better.

Nat


2013/2/20 Mike Jones <Michael.Jones@microsoft.com>

>  For what it=92s worth, the name =93registration_access_url=94 was chosen=
 to be
> parallel to =93registration_access_token=94.   It=92s the place you use t=
he
> access token.  And it=92s where you access an existing registration.  I=
=92m
> against the name =93client_metadata_url=94 because it=92s not metadata yo=
u=92re
> accessing =96 it=92s a registration you=92re accessing.  For the same rea=
son, I
> don=92t think the name =93client_info_url=94 gives people the right idea,=
 because
> it doesn=92t say anything it being the registration that you=92re accessi=
ng.**
> **
>
> ** **
>
> If you really want us to change this, having read what=92s above, I could
> live with =93client_registration_url=94, but I don=92t think a change is =
actually
> necessary.  (But if we are going to change it, let=92s do it ASAP, before=
 the
> OpenID Connect Implementer=92s Drafts are published.)****
>
> ** **
>
>                                                             -- Mike****
>
> ** **
>
> *From:* oauth-bounces@ietf.org [mailto:oauth-bounces@ietf.org] *On Behalf
> Of *Nat Sakimura
> *Sent:* Wednesday, February 20, 2013 7:58 AM
> *To:* <oauth@ietf.org>; Richer, Justin P.; John Bradley
>
> *Subject:* Re: [OAUTH-WG] I-D Action: draft-ietf-oauth-dyn-reg-06.txt****
>
> ** **
>
> Thanks Justin.
>
>
> Even if we go flat rather than doing JSON Structure, the "Client
> Registration Access Endpoint" is not a good representative name.
>
> What it represents is the client metadata/info.
> It is not representing "Client Registration Access". ****
>
>  What does "Client Registration Access" mean? ****
>
> Does UPDATing "Cleint Registration Access" make sense?
>
> Something in the line of "Client Metadata Endpoint" and
> something like "client_metadata_url" or "client_info_url" is much better.
>
> Nat****
>
> 2013/2/15 Richer, Justin P. <jricher@mitre.org>****
>
> Everyone, there's a new draft of DynReg up on the tracker. This draft
> tries to codify the discussions so far from this week into something we c=
an
> all read. There are still plenty of open discussion points and items up f=
or
> debate. Please read through this latest draft and see what's changed and
> help assure that it properly captures the conversations. If you have any
> inputs for the marked [[ Editor's Note ]] sections, please send them to t=
he
> list by next Thursday to give me opportunity to get any necessary changes
> in by the cutoff date of Monday the 22nd.
>
> Thanks for all of your hard work everyone, I think this is *really* comin=
g
> along now.
>
>  -- Justin****
>
>
> On Feb 15, 2013, at 4:54 PM, internet-drafts@ietf.org wrote:
>
> >
> > A New Internet-Draft is available from the on-line Internet-Drafts
> directories.
> > This draft is a work item of the Web Authorization Protocol Working
> Group of the IETF.
> >
> >       Title           : OAuth Dynamic Client Registration Protocol
> >       Author(s)       : Justin Richer
> >                          John Bradley
> >                          Michael B. Jones
> >                          Maciej Machulak
> >       Filename        : draft-ietf-oauth-dyn-reg-06.txt
> >       Pages           : 21
> >       Date            : 2013-02-15
> >
> > Abstract:
> >   This specification defines an endpoint and protocol for dynamic
> >   registration of OAuth Clients at an Authorization Server.
> >
> >
> > The IETF datatracker status page for this draft is:
> > https://datatracker.ietf.org/doc/draft-ietf-oauth-dyn-reg
> >
> > There's also a htmlized version available at:
> > http://tools.ietf.org/html/draft-ietf-oauth-dyn-reg-06
> >
> > A diff from the previous version is available at:
> > http://www.ietf.org/rfcdiff?url2=3Ddraft-ietf-oauth-dyn-reg-06
> >
> >
> > Internet-Drafts are also available by anonymous FTP at:
> > ftp://ftp.ietf.org/internet-drafts/
> >
> > _______________________________________________
> > OAuth mailing list
> > OAuth@ietf.org
> > https://www.ietf.org/mailman/listinfo/oauth
>
> _______________________________________________
> OAuth mailing list
> OAuth@ietf.org
> https://www.ietf.org/mailman/listinfo/oauth****
>
>
>
> ****
>
> ** **
>
> --
> Nat Sakimura (=3Dnat)****
>
> Chairman, OpenID Foundation
> http://nat.sakimura.org/
> @_nat_en****
>



--=20
Nat Sakimura (=3Dnat)
Chairman, OpenID Foundation
http://nat.sakimura.org/
@_nat_en

--20cf3074b51a19334a04d62acc16
Content-Type: text/html; charset=windows-1252
Content-Transfer-Encoding: quoted-printable

I have read the whole thing and still ---=A0<div><br></div><div>Your argume=
nt that it is the place for using &quot;registration access token&quot; thu=
s should have a parallel name &quot;registration access url&quot; is very w=
eak. There are several weakness.=A0</div>
<div><br></div><div>First, &quot;registration access token&quot; actually i=
s &quot;registration&quot; + &quot;access token&quot;. Extracting &quot;reg=
istration access&quot; from &quot;registration access token&quot; is broken=
.=A0</div>
<div><br></div><div>Secondly, access token is used to against any protected=
 resource.=A0Recommending=A0to use the word &quot;access&quot; in naming pr=
otected resources is broken. Should we rename Userinfo endpoint to somethin=
g like &quot;Userinfo Access Endpoint&quot;? I do not think so.=A0</div>
<div><br></div><div>Thirdly, the term &quot;Registration Access&quot; does =
not seem to be meaningful.=A0</div><div>When you say &quot;access&quot;, I =
suppose you are using the noun version of it.=A0</div><div><div>(If you are=
 using the verb, then I am even more against as a URL should not contain a =
verb.)=A0</div>
<div><br></div><div>According to the Webster, access (n.) is defined as:=A0=
</div><div><br></div><div><b>access </b><i>n.</i></div><div><br></div><div>=
<div class=3D"sblk" style=3D"font-family:Verdana,Arial,Helvetica,sans-serif=
;font-size:12.727272033691406px;line-height:20px;background-color:rgb(255,2=
55,255)">
<div class=3D"snum" style=3D"float:left;font-weight:bold">1</div><div class=
=3D"scnt" style=3D"margin-bottom:10px;margin-left:20px"><span class=3D"ssen=
s"><em class=3D"sn" style=3D"font-style:normal;font-weight:bold">a</em>=A0<=
strong>:</strong>=A0<a href=3D"http://www.merriam-webster.com/dictionary/on=
set" style=3D"color:rgb(17,34,204);font-variant:small-caps;text-decoration:=
initial">onset</a>=A02</span><span class=3D"ssens"><div class=3D"break" sty=
le=3D"height:10px">
</div><em class=3D"sn" style=3D"font-style:normal;font-weight:bold">b</em>=
=A0<strong>:</strong>=A0a fit of intense feeling=A0<strong>:</strong>=A0<a =
href=3D"http://www.merriam-webster.com/dictionary/outburst" style=3D"color:=
rgb(17,34,204);font-variant:small-caps;text-decoration:initial">outburst</a=
></span></div>
</div><div class=3D"sblk" style=3D"font-family:Verdana,Arial,Helvetica,sans=
-serif;font-size:12.727272033691406px;line-height:20px;background-color:rgb=
(255,255,255)"><div class=3D"snum" style=3D"float:left;font-weight:bold">2<=
/div>
<div class=3D"scnt" style=3D"margin-bottom:10px;margin-left:20px"><span cla=
ss=3D"ssens"><em class=3D"sn" style=3D"font-style:normal;font-weight:bold">=
a</em>=A0<strong>:</strong>=A0permission, liberty, or ability to enter, app=
roach, or pass to and from a place or to approach or communicate with a per=
son or thing</span><span class=3D"ssens"><div class=3D"break" style=3D"heig=
ht:10px">
</div><em class=3D"sn" style=3D"font-style:normal;font-weight:bold">b</em>=
=A0<strong>:</strong>=A0freedom or ability to obtain or make use of somethi=
ng</span><span class=3D"ssens"><div class=3D"break" style=3D"height:10px"><=
/div><em class=3D"sn" style=3D"font-style:normal;font-weight:bold">c</em>=
=A0<strong>:</strong>=A0a way or means of access</span><span class=3D"ssens=
"><div class=3D"break" style=3D"height:10px">
</div><em class=3D"sn" style=3D"font-style:normal;font-weight:bold">d</em>=
=A0<strong>:</strong>=A0the act or an instance of=A0<a href=3D"http://www.m=
erriam-webster.com/dictionary/accessing" class=3D"formulaic" style=3D"color=
:rgb(17,34,204);font-size:13px;text-decoration:initial">accessing</a></span=
></div>
</div><div class=3D"sblk" style=3D"font-family:Verdana,Arial,Helvetica,sans=
-serif;font-size:12.727272033691406px;line-height:20px;background-color:rgb=
(255,255,255)"><div class=3D"snum" style=3D"float:left;font-weight:bold">3<=
/div>
<div class=3D"scnt" style=3D"margin-bottom:10px;margin-left:20px"><span cla=
ss=3D"ssens"><strong>:</strong>=A0an increase by addition=A0<span class=3D"=
vi">&lt;a sudden=A0<em>access</em>=A0of wealth&gt;</span></span></div></div=
><div><br></div>
<div>Replacing &quot;access&quot; with any of the definition above does not=
 seem to work.=A0</div><div><br></div><div>Remember, a URL is represents a =
&quot;thing&quot;.=A0</div><div>The name of the endpoint should represent t=
he &quot;thing&quot;.=A0</div>
<div><br></div><div>I am merginally OK with &quot;client registration url&q=
uot; leveraging on the definition 2. below (again from Webster -- my OED su=
bscription lapsed for the time being.)=A0</div><div><br></div><div><b>regis=
tration </b><i>n.</i></div>
<div><br></div><div><div class=3D"sblk" style=3D"font-family:Verdana,Arial,=
Helvetica,sans-serif;font-size:12.727272033691406px;line-height:20px;backgr=
ound-color:rgb(255,255,255)"><div class=3D"snum" style=3D"float:left;font-w=
eight:bold">
1</div><div class=3D"scnt" style=3D"margin-bottom:10px;margin-left:20px"><s=
pan class=3D"ssens"><strong>:</strong>=A0the act of=A0<a href=3D"http://www=
.merriam-webster.com/dictionary/registering" class=3D"formulaic" style=3D"c=
olor:rgb(17,34,204);font-size:13px;text-decoration:initial">registering</a>=
</span></div>
</div><div class=3D"sblk" style=3D"font-family:Verdana,Arial,Helvetica,sans=
-serif;font-size:12.727272033691406px;line-height:20px;background-color:rgb=
(255,255,255)"><div class=3D"snum" style=3D"float:left;font-weight:bold">2<=
/div>
<div class=3D"scnt" style=3D"margin-bottom:10px;margin-left:20px"><span cla=
ss=3D"ssens"><strong>:</strong>=A0an entry in a=A0<a href=3D"http://www.mer=
riam-webster.com/dictionary/register" class=3D"formulaic" style=3D"color:rg=
b(17,34,204);font-size:13px;text-decoration:initial">register</a></span></d=
iv>
</div><div class=3D"sblk" style=3D"font-family:Verdana,Arial,Helvetica,sans=
-serif;font-size:12.727272033691406px;line-height:20px;background-color:rgb=
(255,255,255)"><div class=3D"snum" style=3D"float:left;font-weight:bold">3<=
/div>
<div class=3D"scnt" style=3D"margin-bottom:10px;margin-left:20px"><span cla=
ss=3D"ssens"><strong>:</strong>=A0the number of individuals=A0<a href=3D"ht=
tp://www.merriam-webster.com/dictionary/registered" class=3D"formulaic" sty=
le=3D"color:rgb(17,34,204);font-size:13px;text-decoration:initial">register=
ed</a>=A0<strong>:</strong>=A0<a href=3D"http://www.merriam-webster.com/dic=
tionary/enrollment" style=3D"color:rgb(17,34,204);font-variant:small-caps;t=
ext-decoration:initial">enrollment</a></span></div>
</div><div class=3D"sblk" style=3D"font-family:Verdana,Arial,Helvetica,sans=
-serif;font-size:12.727272033691406px;line-height:20px;background-color:rgb=
(255,255,255)"><div class=3D"snum" style=3D"float:left;font-weight:bold">4<=
/div>
<div class=3D"scnt" style=3D"margin-bottom:10px;margin-left:20px"><span cla=
ss=3D"ssens"><em class=3D"sn" style=3D"font-style:normal;font-weight:bold">=
a</em>=A0<strong>:</strong>=A0the art or act of selecting and adjusting pip=
e organ stops</span><span class=3D"ssens"><div class=3D"break" style=3D"hei=
ght:10px">
</div><em class=3D"sn" style=3D"font-style:normal;font-weight:bold">b</em>=
=A0<strong>:</strong>=A0the combination of stops selected for performing a =
particular organ work</span></div></div><div class=3D"sblk" style=3D"font-f=
amily:Verdana,Arial,Helvetica,sans-serif;font-size:12.727272033691406px;lin=
e-height:20px;background-color:rgb(255,255,255)">
<div class=3D"snum" style=3D"float:left;font-weight:bold">5</div><div class=
=3D"scnt" style=3D"margin-bottom:10px;margin-left:20px"><span class=3D"ssen=
s"><strong>:</strong>=A0a document certifying an act of registering</span><=
/div></div>
</div><div><br></div><div>However, since the most common use of &quot;regis=
tration&quot; is actually <b>1</b> above, it still is confusing. If you rea=
lly want to emphasize the fact that it has been registered, then something =
like &quot;registered client info uri&quot; or &quot;registered client meta=
data uri&quot; would be better.=A0</div>
<div><br></div><div>Nat</div><div><br></div><br><div class=3D"gmail_quote">=
2013/2/20 Mike Jones <span dir=3D"ltr">&lt;<a href=3D"mailto:Michael.Jones@=
microsoft.com" target=3D"_blank">Michael.Jones@microsoft.com</a>&gt;</span>=
<br>
<blockquote class=3D"gmail_quote" style=3D"margin:0 0 0 .8ex;border-left:1p=
x #ccc solid;padding-left:1ex">





<div lang=3D"EN-US" link=3D"blue" vlink=3D"purple">
<div>
<p class=3D"MsoNormal"><span style=3D"font-size:11.0pt;font-family:&quot;Ca=
libri&quot;,&quot;sans-serif&quot;;color:#1f497d">For what it=92s worth, th=
e name =93registration_access_url=94 was chosen to be parallel to =93regist=
ration_access_token=94.=A0=A0 It=92s the place you use the access token.=A0
 And it=92s where you access an existing registration.=A0 I=92m against the=
 name =93client_metadata_url=94 because it=92s not metadata you=92re access=
ing =96 it=92s a registration you=92re accessing.=A0 For the same reason, I=
 don=92t think the name =93client_info_url=94 gives people the
 right idea, because it doesn=92t say anything it being the registration th=
at you=92re accessing.<u></u><u></u></span></p>
<p class=3D"MsoNormal"><span style=3D"font-size:11.0pt;font-family:&quot;Ca=
libri&quot;,&quot;sans-serif&quot;;color:#1f497d"><u></u>=A0<u></u></span><=
/p>
<p class=3D"MsoNormal"><span style=3D"font-size:11.0pt;font-family:&quot;Ca=
libri&quot;,&quot;sans-serif&quot;;color:#1f497d">If you really want us to =
change this, having read what=92s above, I could live with =93client_regist=
ration_url=94, but I don=92t think a change is actually necessary.=A0
 (But if we are going to change it, let=92s do it ASAP, before the OpenID C=
onnect Implementer=92s Drafts are published.)<u></u><u></u></span></p>
<p class=3D"MsoNormal"><span style=3D"font-size:11.0pt;font-family:&quot;Ca=
libri&quot;,&quot;sans-serif&quot;;color:#1f497d"><u></u>=A0<u></u></span><=
/p>
<p class=3D"MsoNormal"><span style=3D"font-size:11.0pt;font-family:&quot;Ca=
libri&quot;,&quot;sans-serif&quot;;color:#1f497d">=A0=A0=A0=A0=A0=A0=A0=A0=
=A0=A0=A0=A0=A0=A0=A0=A0=A0=A0=A0=A0=A0=A0=A0=A0=A0=A0=A0=A0=A0=A0=A0=A0=A0=
=A0=A0=A0=A0=A0=A0=A0=A0=A0=A0=A0=A0=A0=A0=A0=A0=A0=A0=A0=A0=A0=A0=A0=A0=A0=
=A0 -- Mike<u></u><u></u></span></p>
<p class=3D"MsoNormal"><span style=3D"font-size:11.0pt;font-family:&quot;Ca=
libri&quot;,&quot;sans-serif&quot;;color:#1f497d"><u></u>=A0<u></u></span><=
/p>
<p class=3D"MsoNormal"><b><span style=3D"font-size:10.0pt;font-family:&quot=
;Tahoma&quot;,&quot;sans-serif&quot;">From:</span></b><span style=3D"font-s=
ize:10.0pt;font-family:&quot;Tahoma&quot;,&quot;sans-serif&quot;"> <a href=
=3D"mailto:oauth-bounces@ietf.org" target=3D"_blank">oauth-bounces@ietf.org=
</a> [mailto:<a href=3D"mailto:oauth-bounces@ietf.org" target=3D"_blank">oa=
uth-bounces@ietf.org</a>]
<b>On Behalf Of </b>Nat Sakimura<br>
<b>Sent:</b> Wednesday, February 20, 2013 7:58 AM<br>
<b>To:</b> &lt;<a href=3D"mailto:oauth@ietf.org" target=3D"_blank">oauth@ie=
tf.org</a>&gt;; Richer, Justin P.; John Bradley</span></p><div class=3D"im"=
><br>
<b>Subject:</b> Re: [OAUTH-WG] I-D Action: draft-ietf-oauth-dyn-reg-06.txt<=
u></u><u></u></div><p></p>
<p class=3D"MsoNormal"><u></u>=A0<u></u></p>
<p class=3D"MsoNormal"><span style=3D"font-size:13.5pt;font-family:&quot;Ar=
ial&quot;,&quot;sans-serif&quot;;color:#222222;background:white">Thanks Jus=
tin.</span></p><div><div class=3D"h5"><span style=3D"font-size:13.5pt;font-=
family:&quot;Arial&quot;,&quot;sans-serif&quot;;color:#222222"><br>

<br>
<span style=3D"background:white">Even if we go flat rather than doing JSON =
Structure, the &quot;Client</span><br>
<span style=3D"background:white">Registration Access Endpoint&quot; is not =
a good representative name.</span><br>
<br>
<span style=3D"background:white">What it represents is the client metadata/=
info.</span><br>
<span style=3D"background:white">It is not representing &quot;Client Regist=
ration Access&quot;.=A0</span></span><u></u><u></u></div></div><p></p><div>=
<div class=3D"h5">
<div>
<p class=3D"MsoNormal">What does &quot;Client Registration Access&quot; mea=
n?=A0<u></u><u></u></p>
</div>
<div>
<p class=3D"MsoNormal" style=3D"margin-bottom:12.0pt"><span style=3D"font-s=
ize:13.5pt;font-family:&quot;Arial&quot;,&quot;sans-serif&quot;;color:#2222=
22;background:white">Does UPDATing &quot;Cleint Registration Access&quot; m=
ake sense?</span><br>

<span style=3D"font-size:13.5pt;font-family:&quot;Arial&quot;,&quot;sans-se=
rif&quot;;color:#222222"><br>
<span style=3D"background:white">Something in the line of &quot;Client Meta=
data Endpoint&quot; and</span><br>
<span style=3D"background:white">something like &quot;client_metadata_url&q=
uot; or=A0&quot;client_info_url&quot; is much better.</span><br>
<br>
<span style=3D"background:white">Nat</span></span><u></u><u></u></p>
<div>
<p class=3D"MsoNormal">2013/2/15 Richer, Justin P. &lt;<a href=3D"mailto:jr=
icher@mitre.org" target=3D"_blank">jricher@mitre.org</a>&gt;<u></u><u></u><=
/p>
<p class=3D"MsoNormal">Everyone, there&#39;s a new draft of DynReg up on th=
e tracker. This draft tries to codify the discussions so far from this week=
 into something we can all read. There are still plenty of open discussion =
points and items up for debate. Please
 read through this latest draft and see what&#39;s changed and help assure =
that it properly captures the conversations. If you have any inputs for the=
 marked [[ Editor&#39;s Note ]] sections, please send them to the list by n=
ext Thursday to give me opportunity to get
 any necessary changes in by the cutoff date of Monday the 22nd.<br>
<br>
Thanks for all of your hard work everyone, I think this is *really* coming =
along now.<br>
<span style=3D"color:#888888"><br>
<span>=A0-- Justin</span></span><u></u><u></u></p>
<div>
<div>
<p class=3D"MsoNormal"><br>
On Feb 15, 2013, at 4:54 PM, <a href=3D"mailto:internet-drafts@ietf.org" ta=
rget=3D"_blank">internet-drafts@ietf.org</a> wrote:<br>
<br>
&gt;<br>
&gt; A New Internet-Draft is available from the on-line Internet-Drafts dir=
ectories.<br>
&gt; This draft is a work item of the Web Authorization Protocol Working Gr=
oup of the IETF.<br>
&gt;<br>
&gt; =A0 =A0 =A0 Title =A0 =A0 =A0 =A0 =A0 : OAuth Dynamic Client Registrat=
ion Protocol<br>
&gt; =A0 =A0 =A0 Author(s) =A0 =A0 =A0 : Justin Richer<br>
&gt; =A0 =A0 =A0 =A0 =A0 =A0 =A0 =A0 =A0 =A0 =A0 =A0 =A0John Bradley<br>
&gt; =A0 =A0 =A0 =A0 =A0 =A0 =A0 =A0 =A0 =A0 =A0 =A0 =A0Michael B. Jones<br=
>
&gt; =A0 =A0 =A0 =A0 =A0 =A0 =A0 =A0 =A0 =A0 =A0 =A0 =A0Maciej Machulak<br>
&gt; =A0 =A0 =A0 Filename =A0 =A0 =A0 =A0: draft-ietf-oauth-dyn-reg-06.txt<=
br>
&gt; =A0 =A0 =A0 Pages =A0 =A0 =A0 =A0 =A0 : 21<br>
&gt; =A0 =A0 =A0 Date =A0 =A0 =A0 =A0 =A0 =A0: 2013-02-15<br>
&gt;<br>
&gt; Abstract:<br>
&gt; =A0 This specification defines an endpoint and protocol for dynamic<br=
>
&gt; =A0 registration of OAuth Clients at an Authorization Server.<br>
&gt;<br>
&gt;<br>
&gt; The IETF datatracker status page for this draft is:<br>
&gt; <a href=3D"https://datatracker.ietf.org/doc/draft-ietf-oauth-dyn-reg" =
target=3D"_blank">
https://datatracker.ietf.org/doc/draft-ietf-oauth-dyn-reg</a><br>
&gt;<br>
&gt; There&#39;s also a htmlized version available at:<br>
&gt; <a href=3D"http://tools.ietf.org/html/draft-ietf-oauth-dyn-reg-06" tar=
get=3D"_blank">
http://tools.ietf.org/html/draft-ietf-oauth-dyn-reg-06</a><br>
&gt;<br>
&gt; A diff from the previous version is available at:<br>
&gt; <a href=3D"http://www.ietf.org/rfcdiff?url2=3Ddraft-ietf-oauth-dyn-reg=
-06" target=3D"_blank">
http://www.ietf.org/rfcdiff?url2=3Ddraft-ietf-oauth-dyn-reg-06</a><br>
&gt;<br>
&gt;<br>
&gt; Internet-Drafts are also available by anonymous FTP at:<br>
&gt; <a href=3D"ftp://ftp.ietf.org/internet-drafts/" target=3D"_blank">ftp:=
//ftp.ietf.org/internet-drafts/</a><br>
&gt;<br>
&gt; _______________________________________________<br>
&gt; OAuth mailing list<br>
&gt; <a href=3D"mailto:OAuth@ietf.org" target=3D"_blank">OAuth@ietf.org</a>=
<br>
&gt; <a href=3D"https://www.ietf.org/mailman/listinfo/oauth" target=3D"_bla=
nk">https://www.ietf.org/mailman/listinfo/oauth</a><br>
<br>
_______________________________________________<br>
OAuth mailing list<br>
<a href=3D"mailto:OAuth@ietf.org" target=3D"_blank">OAuth@ietf.org</a><br>
<a href=3D"https://www.ietf.org/mailman/listinfo/oauth" target=3D"_blank">h=
ttps://www.ietf.org/mailman/listinfo/oauth</a><u></u><u></u></p>
</div>
</div>
</div>
<p class=3D"MsoNormal"><br>
<br clear=3D"all">
<u></u><u></u></p>
<div>
<p class=3D"MsoNormal"><u></u>=A0<u></u></p>
</div>
<p class=3D"MsoNormal">-- <br>
Nat Sakimura (=3Dnat)<u></u><u></u></p>
<div>
<p class=3D"MsoNormal">Chairman, OpenID Foundation<br>
<a href=3D"http://nat.sakimura.org/" target=3D"_blank">http://nat.sakimura.=
org/</a><br>
@_nat_en<u></u><u></u></p>
</div>
</div>
</div></div></div>
</div>

</blockquote></div><br><br clear=3D"all"><div><br></div>-- <br>Nat Sakimura=
 (=3Dnat)<div>Chairman, OpenID Foundation<br><a href=3D"http://nat.sakimura=
.org/" target=3D"_blank">http://nat.sakimura.org/</a><br>@_nat_en</div>
</div></div>

--20cf3074b51a19334a04d62acc16--

From sakimura@gmail.com  Wed Feb 20 08:56:47 2013
Return-Path: <sakimura@gmail.com>
X-Original-To: oauth@ietfa.amsl.com
Delivered-To: oauth@ietfa.amsl.com
Received: from localhost (localhost [127.0.0.1]) by ietfa.amsl.com (Postfix) with ESMTP id 9038321E8048 for <oauth@ietfa.amsl.com>; Wed, 20 Feb 2013 08:56:47 -0800 (PST)
X-Virus-Scanned: amavisd-new at amsl.com
X-Spam-Flag: NO
X-Spam-Score: -3.236
X-Spam-Level: 
X-Spam-Status: No, score=-3.236 tagged_above=-999 required=5 tests=[AWL=0.362,  BAYES_00=-2.599, HTML_MESSAGE=0.001, RCVD_IN_DNSWL_LOW=-1]
Received: from mail.ietf.org ([64.170.98.30]) by localhost (ietfa.amsl.com [127.0.0.1]) (amavisd-new, port 10024) with ESMTP id uWR8Z1bQrTXm for <oauth@ietfa.amsl.com>; Wed, 20 Feb 2013 08:56:46 -0800 (PST)
Received: from mail-qe0-f45.google.com (mail-qe0-f45.google.com [209.85.128.45]) by ietfa.amsl.com (Postfix) with ESMTP id 3FE9421E8051 for <oauth@ietf.org>; Wed, 20 Feb 2013 08:56:46 -0800 (PST)
Received: by mail-qe0-f45.google.com with SMTP id b4so3751346qen.18 for <oauth@ietf.org>; Wed, 20 Feb 2013 08:56:45 -0800 (PST)
DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=gmail.com; s=20120113; h=mime-version:x-received:in-reply-to:references:date:message-id :subject:from:to:cc:content-type; bh=Mi5bueCMZ+cU1OL95VVQ+yMK6Y3+aOu/PIS/6SQ0D64=; b=k4QC3Cxshv6Nti/Mp1080dNae6KLgruaIfR9q7PM6uJBx1xDbZFJMTejqAazAoGOVK q0Jv7oEOfU3mJru7dYWnMmxJVANc+3iSmjJOBbx9hX1WkvhC34sMBDR9kubNmAVlAKEz N0rKLILovFXZmy72Cueco7lTlvQokt0TOW2YvY+mhJrLEPdN9C8cF1E5t3W4zhqsOPsp AKEp7ieoAoESrEstW4JNhWRaEBzcEcOEgYRC3prFzojsubAH4y+cJvfQuqyTfOvRChSU onPouYvUzdZNm2CUiVPMCvQTDzLCV78btenKUamhm7/zGwrXini5Jph1n/u7BMauc2Aj XDhw==
MIME-Version: 1.0
X-Received: by 10.49.75.226 with SMTP id f2mr10205713qew.43.1361379405648; Wed, 20 Feb 2013 08:56:45 -0800 (PST)
Received: by 10.49.106.161 with HTTP; Wed, 20 Feb 2013 08:56:45 -0800 (PST)
In-Reply-To: <CA+ZpN278s7BRuUV31PzqL9fEK+3rKT6UiQiwmv_pfbK91g+yQg@mail.gmail.com>
References: <20130215215423.23019.50224.idtracker@ietfa.amsl.com> <B33BFB58CCC8BE4998958016839DE27E06894B4F@IMCMBX01.MITRE.ORG> <CABzCy2CgnAtPrTY37H6vO-+5u3tRmsm+1j86r3w046AhHnNdfw@mail.gmail.com> <4E1F6AAD24975D4BA5B16804296739436747A665@TK5EX14MBXC284.redmond.corp.microsoft.com> <63255CDA-E93F-4414-B471-B373C4B6F65E@ve7jtb.com> <CA+ZpN278s7BRuUV31PzqL9fEK+3rKT6UiQiwmv_pfbK91g+yQg@mail.gmail.com>
Date: Wed, 20 Feb 2013 11:56:45 -0500
Message-ID: <CABzCy2AYnfxfJ3w6sBWw69LxaHCrJB-GyrT+-G8Ufx4-CQ6gTQ@mail.gmail.com>
From: Nat Sakimura <sakimura@gmail.com>
To: Tim Bray <twbray@google.com>
Content-Type: multipart/alternative; boundary=047d7bdcab52e0d2d404d62ad730
Cc: "<oauth@ietf.org>" <oauth@ietf.org>
Subject: Re: [OAUTH-WG] I-D Action: draft-ietf-oauth-dyn-reg-06.txt
X-BeenThere: oauth@ietf.org
X-Mailman-Version: 2.1.12
Precedence: list
List-Id: OAUTH WG <oauth.ietf.org>
List-Unsubscribe: <https://www.ietf.org/mailman/options/oauth>, <mailto:oauth-request@ietf.org?subject=unsubscribe>
List-Archive: <http://www.ietf.org/mail-archive/web/oauth>
List-Post: <mailto:oauth@ietf.org>
List-Help: <mailto:oauth-request@ietf.org?subject=help>
List-Subscribe: <https://www.ietf.org/mailman/listinfo/oauth>, <mailto:oauth-request@ietf.org?subject=subscribe>
X-List-Received-Date: Wed, 20 Feb 2013 16:56:47 -0000

--047d7bdcab52e0d2d404d62ad730
Content-Type: text/plain; charset=windows-1252
Content-Transfer-Encoding: quoted-printable

You are right. I am in the camp recommending the use of URL when it is a
concrete endpoint and URI when it includes something that is only abstract,
but since OAuth standardized on "uri", we may as well do so here.

Nat

2013/2/20 Tim Bray <twbray@google.com>

> In OAuth, we have redirect_uri not redirect_url; should this be
> registration_access_uri for consistency? -T
>
>
> On Wed, Feb 20, 2013 at 8:23 AM, John Bradley <ve7jtb@ve7jtb.com> wrote:
>
>> I think registration_access_url is OK.    I haven't heard any better
>> names yet.
>>
>> John B.
>>
>> On 2013-02-20, at 1:04 PM, Mike Jones <Michael.Jones@microsoft.com>
>> wrote:
>>
>>  For what it=92s worth, the name =93registration_access_url=94 was chose=
n to
>> be parallel to =93registration_access_token=94.   It=92s the place you u=
se the
>> access token.  And it=92s where you access an existing registration.  I=
=92m
>> against the name =93client_metadata_url=94 because it=92s not metadata y=
ou=92re
>> accessing =96 it=92s a registration you=92re accessing.  For the same re=
ason, I
>> don=92t think the name =93client_info_url=94 gives people the right idea=
, because
>> it doesn=92t say anything it being the registration that you=92re access=
ing.*
>> ***
>>
>> If you really want us to change this, having read what=92s above, I coul=
d
>> live with =93client_registration_url=94, but I don=92t think a change is=
 actually
>> necessary.  (But if we are going to change it, let=92s do it ASAP, befor=
e the
>> OpenID Connect Implementer=92s Drafts are published.)****
>>
>>                                                             -- Mike****
>>
>> *From:* oauth-bounces@ietf.org [mailto:oauth-bounces@ietf.org] *On
>> Behalf Of *Nat Sakimura
>> *Sent:* Wednesday, February 20, 2013 7:58 AM
>> *To:* <oauth@ietf.org>; Richer, Justin P.; John Bradley
>> *Subject:* Re: [OAUTH-WG] I-D Action: draft-ietf-oauth-dyn-reg-06.txt***=
*
>> ** **
>> Thanks Justin.
>>
>> Even if we go flat rather than doing JSON Structure, the "Client
>> Registration Access Endpoint" is not a good representative name.
>>
>> What it represents is the client metadata/info.
>> It is not representing "Client Registration Access". ****
>> What does "Client Registration Access" mean? ****
>>
>> Does UPDATing "Cleint Registration Access" make sense?
>>
>> Something in the line of "Client Metadata Endpoint" and
>> something like "client_metadata_url" or "client_info_url" is much better=
.
>>
>> Nat****
>> 2013/2/15 Richer, Justin P. <jricher@mitre.org>****
>> Everyone, there's a new draft of DynReg up on the tracker. This draft
>> tries to codify the discussions so far from this week into something we =
can
>> all read. There are still plenty of open discussion points and items up =
for
>> debate. Please read through this latest draft and see what's changed and
>> help assure that it properly captures the conversations. If you have any
>> inputs for the marked [[ Editor's Note ]] sections, please send them to =
the
>> list by next Thursday to give me opportunity to get any necessary change=
s
>> in by the cutoff date of Monday the 22nd.
>>
>> Thanks for all of your hard work everyone, I think this is *really*
>> coming along now.
>>
>>  -- Justin****
>>
>> On Feb 15, 2013, at 4:54 PM, internet-drafts@ietf.org wrote:
>>
>> >
>> > A New Internet-Draft is available from the on-line Internet-Drafts
>> directories.
>> > This draft is a work item of the Web Authorization Protocol Working
>> Group of the IETF.
>> >
>> >       Title           : OAuth Dynamic Client Registration Protocol
>> >       Author(s)       : Justin Richer
>> >                          John Bradley
>> >                          Michael B. Jones
>> >                          Maciej Machulak
>> >       Filename        : draft-ietf-oauth-dyn-reg-06.txt
>> >       Pages           : 21
>> >       Date            : 2013-02-15
>> >
>> > Abstract:
>> >   This specification defines an endpoint and protocol for dynamic
>> >   registration of OAuth Clients at an Authorization Server.
>> >
>> >
>> > The IETF datatracker status page for this draft is:
>> > https://datatracker.ietf.org/doc/draft-ietf-oauth-dyn-reg
>> >
>> > There's also a htmlized version available at:
>> > http://tools.ietf.org/html/draft-ietf-oauth-dyn-reg-06
>> >
>> > A diff from the previous version is available at:
>> > http://www.ietf.org/rfcdiff?url2=3Ddraft-ietf-oauth-dyn-reg-06
>> >
>> >
>> > Internet-Drafts are also available by anonymous FTP at:
>> > ftp://ftp.ietf.org/internet-drafts/
>> >
>> > _______________________________________________
>> > OAuth mailing list
>> > OAuth@ietf.org
>> > https://www.ietf.org/mailman/listinfo/oauth
>>
>> _______________________________________________
>> OAuth mailing list
>> OAuth@ietf.org
>> https://www.ietf.org/mailman/listinfo/oauth****
>>
>>
>> ****
>> ** **
>> --
>> Nat Sakimura (=3Dnat)****
>> Chairman, OpenID Foundation
>> http://nat.sakimura.org/
>> @_nat_en
>>
>>
>>
>> _______________________________________________
>> OAuth mailing list
>> OAuth@ietf.org
>> https://www.ietf.org/mailman/listinfo/oauth
>>
>>
>
> _______________________________________________
> OAuth mailing list
> OAuth@ietf.org
> https://www.ietf.org/mailman/listinfo/oauth
>
>


--=20
Nat Sakimura (=3Dnat)
Chairman, OpenID Foundation
http://nat.sakimura.org/
@_nat_en

--047d7bdcab52e0d2d404d62ad730
Content-Type: text/html; charset=windows-1252
Content-Transfer-Encoding: quoted-printable

You are right. I am in the camp recommending the use of URL when it is a co=
ncrete endpoint and URI when it includes something that is only abstract, b=
ut since OAuth standardized on &quot;uri&quot;, we may as well do so here.=
=A0<div>
<br></div><div>Nat<br><br><div class=3D"gmail_quote">2013/2/20 Tim Bray <sp=
an dir=3D"ltr">&lt;<a href=3D"mailto:twbray@google.com" target=3D"_blank">t=
wbray@google.com</a>&gt;</span><br><blockquote class=3D"gmail_quote" style=
=3D"margin:0 0 0 .8ex;border-left:1px #ccc solid;padding-left:1ex">
In OAuth, we have redirect_uri not redirect_url; should this be registratio=
n_access_uri for consistency? -T<div class=3D"HOEnZb"><div class=3D"h5"><br=
><br><div class=3D"gmail_quote">On Wed, Feb 20, 2013 at 8:23 AM, John Bradl=
ey <span dir=3D"ltr">&lt;<a href=3D"mailto:ve7jtb@ve7jtb.com" target=3D"_bl=
ank">ve7jtb@ve7jtb.com</a>&gt;</span> wrote:<br>


<blockquote class=3D"gmail_quote" style=3D"margin:0 0 0 .8ex;border-left:1p=
x #ccc solid;padding-left:1ex"><div style=3D"word-wrap:break-word">I think =
registration_access_url is OK. =A0 =A0I haven&#39;t heard any better names =
yet.<div>


<br></div><div>John B.<div><div><br><div><div>On 2013-02-20, at 1:04 PM, Mi=
ke Jones &lt;<a href=3D"mailto:Michael.Jones@microsoft.com" target=3D"_blan=
k">Michael.Jones@microsoft.com</a>&gt; wrote:</div><br><blockquote type=3D"=
cite">


<div lang=3D"EN-US" link=3D"blue" vlink=3D"purple" style=3D"font-family:Hel=
vetica;font-size:medium;font-style:normal;font-variant:normal;font-weight:n=
ormal;letter-spacing:normal;line-height:normal;text-align:-webkit-auto;text=
-indent:0px;text-transform:none;white-space:normal;word-spacing:0px">


<div><div style=3D"margin:0in 0in 0.0001pt;font-size:12pt;font-family:&#39;=
Times New Roman&#39;,serif"><span style=3D"font-size:11pt;font-family:Calib=
ri,sans-serif;color:rgb(31,73,125)">For what it=92s worth, the name =93regi=
stration_access_url=94 was chosen to be parallel to =93registration_access_=
token=94.=A0=A0 It=92s the place you use the access token.=A0 And it=92s wh=
ere you access an existing registration.=A0 I=92m against the name =93clien=
t_metadata_url=94 because it=92s not metadata you=92re accessing =96 it=92s=
 a registration you=92re accessing.=A0 For the same reason, I don=92t think=
 the name =93client_info_url=94 gives people the right idea, because it doe=
sn=92t say anything it being the registration that you=92re accessing.<u></=
u><u></u></span></div>


<div style=3D"margin:0in 0in 0.0001pt;font-size:12pt;font-family:&#39;Times=
 New Roman&#39;,serif"><span style=3D"font-size:11pt;font-family:Calibri,sa=
ns-serif;color:rgb(31,73,125)">=A0</span></div><div style=3D"margin:0in 0in=
 0.0001pt;font-size:12pt;font-family:&#39;Times New Roman&#39;,serif">


<span style=3D"font-size:11pt;font-family:Calibri,sans-serif;color:rgb(31,7=
3,125)">If you really want us to change this, having read what=92s above, I=
 could live with =93client_registration_url=94, but I don=92t think a chang=
e is actually necessary.=A0 (But if we are going to change it, let=92s do i=
t ASAP, before the OpenID Connect Implementer=92s Drafts are published.)<u>=
</u><u></u></span></div>


<div style=3D"margin:0in 0in 0.0001pt;font-size:12pt;font-family:&#39;Times=
 New Roman&#39;,serif"><span style=3D"font-size:11pt;font-family:Calibri,sa=
ns-serif;color:rgb(31,73,125)">=A0</span></div><div style=3D"margin:0in 0in=
 0.0001pt;font-size:12pt;font-family:&#39;Times New Roman&#39;,serif">


<span style=3D"font-size:11pt;font-family:Calibri,sans-serif;color:rgb(31,7=
3,125)">=A0=A0=A0=A0=A0=A0=A0=A0=A0=A0=A0=A0=A0=A0=A0=A0=A0=A0=A0=A0=A0=A0=
=A0=A0=A0=A0=A0=A0=A0=A0=A0=A0=A0=A0=A0=A0=A0=A0=A0=A0=A0=A0=A0=A0=A0=A0=A0=
=A0=A0=A0=A0=A0=A0=A0=A0=A0=A0=A0=A0 -- Mike<u></u><u></u></span></div><div=
 style=3D"margin:0in 0in 0.0001pt;font-size:12pt;font-family:&#39;Times New=
 Roman&#39;,serif">


<span style=3D"font-size:11pt;font-family:Calibri,sans-serif;color:rgb(31,7=
3,125)">=A0</span></div><div style=3D"margin:0in 0in 0.0001pt;font-size:12p=
t;font-family:&#39;Times New Roman&#39;,serif"><b><span style=3D"font-size:=
10pt;font-family:Tahoma,sans-serif">From:</span></b><span style=3D"font-siz=
e:10pt;font-family:Tahoma,sans-serif"><span>=A0</span><a href=3D"mailto:oau=
th-bounces@ietf.org" target=3D"_blank">oauth-bounces@ietf.org</a> [mailto:<=
a href=3D"mailto:oauth-" target=3D"_blank">oauth-</a><a href=3D"mailto:boun=
ces@ietf.org" target=3D"_blank">bounces@ietf.org</a>]<span>=A0</span><b>On =
Behalf Of<span>=A0</span></b>Nat Sakimura<br>


<b>Sent:</b><span>=A0</span>Wednesday, February 20, 2013 7:58 AM<br><b>To:<=
/b><span>=A0</span>&lt;<a href=3D"mailto:oauth@ietf.org" target=3D"_blank">=
oauth@ietf.org</a>&gt;; Richer, Justin P.; John Bradley<br><b>Subject:</b><=
span>=A0</span>Re: [OAUTH-WG] I-D Action: draft-ietf-oauth-dyn-reg-06.txt<u=
></u><u></u></span></div>


<div style=3D"margin:0in 0in 0.0001pt;font-size:12pt;font-family:&#39;Times=
 New Roman&#39;,serif"><u></u>=A0<u></u></div><div style=3D"margin:0in 0in =
0.0001pt;font-size:12pt;font-family:&#39;Times New Roman&#39;,serif"><span =
style=3D"color:rgb(34,34,34);font-size:13.5pt;font-family:Arial,sans-serif;=
background-repeat:initial initial">Thanks Justin.</span><span style=3D"font=
-size:13.5pt;font-family:Arial,sans-serif;color:rgb(34,34,34)"><br>


<br><span style=3D"background-repeat:initial initial">Even if we go flat ra=
ther than doing JSON Structure, the &quot;Client</span><br><span style=3D"b=
ackground-repeat:initial initial">Registration Access Endpoint&quot; is not=
 a good representative name.</span><br>


<br><span style=3D"background-repeat:initial initial">What it represents is=
 the client metadata/info.</span><br><span style=3D"background-repeat:initi=
al initial">It is not representing &quot;Client Registration Access&quot;.=
=A0</span></span><u></u><u></u></div>


<div><div style=3D"margin:0in 0in 0.0001pt;font-size:12pt;font-family:&#39;=
Times New Roman&#39;,serif">What does &quot;Client Registration Access&quot=
; mean?=A0<u></u><u></u></div></div><div><p class=3D"MsoNormal" style=3D"ma=
rgin:0in 0in 12pt;font-size:12pt;font-family:&#39;Times New Roman&#39;,seri=
f">


<span style=3D"color:rgb(34,34,34);font-size:13.5pt;font-family:Arial,sans-=
serif;background-repeat:initial initial">Does UPDATing &quot;Cleint Registr=
ation Access&quot; make sense?</span><br><span style=3D"font-size:13.5pt;fo=
nt-family:Arial,sans-serif;color:rgb(34,34,34)"><br>


<span style=3D"background-repeat:initial initial">Something in the line of =
&quot;Client Metadata Endpoint&quot; and</span><br><span style=3D"backgroun=
d-repeat:initial initial">something like &quot;client_metadata_url&quot; or=
=A0&quot;client_info_url&quot; is much better.</span><br>


<br><span style=3D"background-repeat:initial initial">Nat</span></span><u><=
/u><u></u></p><div><div style=3D"margin:0in 0in 0.0001pt;font-size:12pt;fon=
t-family:&#39;Times New Roman&#39;,serif">2013/2/15 Richer, Justin P. &lt;<=
a href=3D"mailto:jricher@mitre.org" style=3D"color:purple;text-decoration:u=
nderline" target=3D"_blank">jricher@mitre.org</a>&gt;<u></u><u></u></div>


<div style=3D"margin:0in 0in 0.0001pt;font-size:12pt;font-family:&#39;Times=
 New Roman&#39;,serif">Everyone, there&#39;s a new draft of DynReg up on th=
e tracker. This draft tries to codify the discussions so far from this week=
 into something we can all read. There are still plenty of open discussion =
points and items up for debate. Please read through this latest draft and s=
ee what&#39;s changed and help assure that it properly captures the convers=
ations. If you have any inputs for the marked [[ Editor&#39;s Note ]] secti=
ons, please send them to the list by next Thursday to give me opportunity t=
o get any necessary changes in by the cutoff date of Monday the 22nd.<br>


<br>Thanks for all of your hard work everyone, I think this is *really* com=
ing along now.<br><span style=3D"color:rgb(136,136,136)"><br><span>=A0-- Ju=
stin</span></span><u></u><u></u></div><div><div style=3D"margin:0in 0in 0.0=
001pt;font-size:12pt;font-family:&#39;Times New Roman&#39;,serif">


<br>On Feb 15, 2013, at 4:54 PM,<span>=A0</span><a href=3D"mailto:internet-=
drafts@ietf.org" style=3D"color:purple;text-decoration:underline" target=3D=
"_blank">internet-drafts@ietf.org</a><span>=A0</span>wrote:<br><br>&gt;<br>=
&gt; A New Internet-Draft is available from the on-line Internet-Drafts dir=
ectories.<br>


&gt; This draft is a work item of the Web Authorization Protocol Working Gr=
oup of the IETF.<br>&gt;<br>&gt; =A0 =A0 =A0 Title =A0 =A0 =A0 =A0 =A0 : OA=
uth Dynamic Client Registration Protocol<br>&gt; =A0 =A0 =A0 Author(s) =A0 =
=A0 =A0 : Justin Richer<br>


&gt; =A0 =A0 =A0 =A0 =A0 =A0 =A0 =A0 =A0 =A0 =A0 =A0 =A0John Bradley<br>&gt=
; =A0 =A0 =A0 =A0 =A0 =A0 =A0 =A0 =A0 =A0 =A0 =A0 =A0Michael B. Jones<br>&g=
t; =A0 =A0 =A0 =A0 =A0 =A0 =A0 =A0 =A0 =A0 =A0 =A0 =A0Maciej Machulak<br>&g=
t; =A0 =A0 =A0 Filename =A0 =A0 =A0 =A0: draft-ietf-oauth-dyn-reg-06.txt<br=
>&gt; =A0 =A0 =A0 Pages =A0 =A0 =A0 =A0 =A0 : 21<br>


&gt; =A0 =A0 =A0 Date =A0 =A0 =A0 =A0 =A0 =A0: 2013-02-15<br>&gt;<br>&gt; A=
bstract:<br>&gt; =A0 This specification defines an endpoint and protocol fo=
r dynamic<br>&gt; =A0 registration of OAuth Clients at an Authorization Ser=
ver.<br>&gt;<br>&gt;<br>


&gt; The IETF datatracker status page for this draft is:<br>&gt;<span>=A0</=
span><a href=3D"https://datatracker.ietf.org/doc/draft-ietf-oauth-dyn-reg" =
style=3D"color:purple;text-decoration:underline" target=3D"_blank">https://=
datatracker.ietf.org/doc/draft-ietf-oauth-dyn-reg</a><br>


&gt;<br>&gt; There&#39;s also a htmlized version available at:<br>&gt;<span=
>=A0</span><a href=3D"http://tools.ietf.org/html/draft-ietf-oauth-dyn-reg-0=
6" style=3D"color:purple;text-decoration:underline" target=3D"_blank">http:=
//tools.ietf.org/html/draft-ietf-oauth-dyn-reg-06</a><br>


&gt;<br>&gt; A diff from the previous version is available at:<br>&gt;<span=
>=A0</span><a href=3D"http://www.ietf.org/rfcdiff?url2=3Ddraft-ietf-oauth-d=
yn-reg-06" style=3D"color:purple;text-decoration:underline" target=3D"_blan=
k">http://www.ietf.org/rfcdiff?url2=3Ddraft-ietf-oauth-dyn-reg-06</a><br>


&gt;<br>&gt;<br>&gt; Internet-Drafts are also available by anonymous FTP at=
:<br>&gt;<span>=A0</span><a href=3D"ftp://ftp.ietf.org/internet-drafts/" st=
yle=3D"color:purple;text-decoration:underline" target=3D"_blank">ftp://ftp.=
ietf.org/internet-drafts/</a><br>


&gt;<br>&gt; _______________________________________________<br>&gt; OAuth =
mailing list<br>&gt;<span>=A0</span><a href=3D"mailto:OAuth@ietf.org" style=
=3D"color:purple;text-decoration:underline" target=3D"_blank">OAuth@ietf.or=
g</a><br>


&gt;<span>=A0</span><a href=3D"https://www.ietf.org/mailman/listinfo/oauth"=
 style=3D"color:purple;text-decoration:underline" target=3D"_blank">https:/=
/www.ietf.org/mailman/listinfo/oauth</a><br><br>___________________________=
____________________<br>


OAuth mailing list<br><a href=3D"mailto:OAuth@ietf.org" style=3D"color:purp=
le;text-decoration:underline" target=3D"_blank">OAuth@ietf.org</a><br><a hr=
ef=3D"https://www.ietf.org/mailman/listinfo/oauth" style=3D"color:purple;te=
xt-decoration:underline" target=3D"_blank">https://www.ietf.org/mailman/lis=
tinfo/oauth</a><u></u><u></u></div>


</div></div><div style=3D"margin:0in 0in 0.0001pt;font-size:12pt;font-famil=
y:&#39;Times New Roman&#39;,serif"><br><br clear=3D"all"><u></u><u></u></di=
v><div><div style=3D"margin:0in 0in 0.0001pt;font-size:12pt;font-family:&#3=
9;Times New Roman&#39;,serif">


<u></u>=A0<u></u></div></div><div style=3D"margin:0in 0in 0.0001pt;font-siz=
e:12pt;font-family:&#39;Times New Roman&#39;,serif">--<span>=A0</span><br>N=
at Sakimura (=3Dnat)<u></u><u></u></div><div><div style=3D"margin:0in 0in 0=
.0001pt;font-size:12pt;font-family:&#39;Times New Roman&#39;,serif">


Chairman, OpenID Foundation<br><a href=3D"http://nat.sakimura.org/" style=
=3D"color:purple;text-decoration:underline" target=3D"_blank">http://nat.sa=
kimura.org/</a><br>@_nat_en</div></div></div></div></div></blockquote></div=
><br>


</div></div></div></div><br>_______________________________________________=
<br>
OAuth mailing list<br>
<a href=3D"mailto:OAuth@ietf.org" target=3D"_blank">OAuth@ietf.org</a><br>
<a href=3D"https://www.ietf.org/mailman/listinfo/oauth" target=3D"_blank">h=
ttps://www.ietf.org/mailman/listinfo/oauth</a><br>
<br></blockquote></div><br>
</div></div><br>_______________________________________________<br>
OAuth mailing list<br>
<a href=3D"mailto:OAuth@ietf.org">OAuth@ietf.org</a><br>
<a href=3D"https://www.ietf.org/mailman/listinfo/oauth" target=3D"_blank">h=
ttps://www.ietf.org/mailman/listinfo/oauth</a><br>
<br></blockquote></div><br><br clear=3D"all"><div><br></div>-- <br>Nat Saki=
mura (=3Dnat)<div>Chairman, OpenID Foundation<br><a href=3D"http://nat.saki=
mura.org/" target=3D"_blank">http://nat.sakimura.org/</a><br>@_nat_en</div>
</div>

--047d7bdcab52e0d2d404d62ad730--

From Michael.Jones@microsoft.com  Wed Feb 20 09:01:23 2013
Return-Path: <Michael.Jones@microsoft.com>
X-Original-To: oauth@ietfa.amsl.com
Delivered-To: oauth@ietfa.amsl.com
Received: from localhost (localhost [127.0.0.1]) by ietfa.amsl.com (Postfix) with ESMTP id 1AC8921F88CB for <oauth@ietfa.amsl.com>; Wed, 20 Feb 2013 09:01:23 -0800 (PST)
X-Virus-Scanned: amavisd-new at amsl.com
X-Spam-Flag: NO
X-Spam-Score: -2.584
X-Spam-Level: 
X-Spam-Status: No, score=-2.584 tagged_above=-999 required=5 tests=[AWL=0.014,  BAYES_00=-2.599, HTML_MESSAGE=0.001]
Received: from mail.ietf.org ([64.170.98.30]) by localhost (ietfa.amsl.com [127.0.0.1]) (amavisd-new, port 10024) with ESMTP id tbZ9CWQ5Bls7 for <oauth@ietfa.amsl.com>; Wed, 20 Feb 2013 09:01:06 -0800 (PST)
Received: from na01-bl2-obe.outbound.protection.outlook.com (na01-bl2-obe.ptr.protection.outlook.com [65.55.169.30]) by ietfa.amsl.com (Postfix) with ESMTP id D842421F8836 for <oauth@ietf.org>; Wed, 20 Feb 2013 09:01:03 -0800 (PST)
Received: from BL2FFO11FD005.protection.gbl (10.173.161.202) by BL2FFO11HUB014.protection.gbl (10.173.160.106) with Microsoft SMTP Server (TLS) id 15.0.620.12; Wed, 20 Feb 2013 17:00:55 +0000
Received: from TK5EX14MLTC102.redmond.corp.microsoft.com (131.107.125.37) by BL2FFO11FD005.mail.protection.outlook.com (10.173.161.1) with Microsoft SMTP Server (TLS) id 15.0.620.12 via Frontend Transport; Wed, 20 Feb 2013 17:00:55 +0000
Received: from TK5EX14MBXC284.redmond.corp.microsoft.com ([169.254.1.96]) by TK5EX14MLTC102.redmond.corp.microsoft.com ([157.54.79.180]) with mapi id 14.02.0318.003; Wed, 20 Feb 2013 17:00:17 +0000
From: Mike Jones <Michael.Jones@microsoft.com>
To: Nat Sakimura <sakimura@gmail.com>, Tim Bray <twbray@google.com>
Thread-Topic: [OAUTH-WG] I-D Action: draft-ietf-oauth-dyn-reg-06.txt
Thread-Index: AQHOC8cMkbohP5vU0EO7eTLi/U/hMJh7eCuAgAd2gACAAAA6MIAABsiAgAADAoCAAAZKgIAAAIEA
Date: Wed, 20 Feb 2013 17:00:17 +0000
Message-ID: <4E1F6AAD24975D4BA5B16804296739436747AD87@TK5EX14MBXC284.redmond.corp.microsoft.com>
References: <20130215215423.23019.50224.idtracker@ietfa.amsl.com> <B33BFB58CCC8BE4998958016839DE27E06894B4F@IMCMBX01.MITRE.ORG> <CABzCy2CgnAtPrTY37H6vO-+5u3tRmsm+1j86r3w046AhHnNdfw@mail.gmail.com> <4E1F6AAD24975D4BA5B16804296739436747A665@TK5EX14MBXC284.redmond.corp.microsoft.com> <63255CDA-E93F-4414-B471-B373C4B6F65E@ve7jtb.com> <CA+ZpN278s7BRuUV31PzqL9fEK+3rKT6UiQiwmv_pfbK91g+yQg@mail.gmail.com> <CABzCy2AYnfxfJ3w6sBWw69LxaHCrJB-GyrT+-G8Ufx4-CQ6gTQ@mail.gmail.com>
In-Reply-To: <CABzCy2AYnfxfJ3w6sBWw69LxaHCrJB-GyrT+-G8Ufx4-CQ6gTQ@mail.gmail.com>
Accept-Language: en-US
Content-Language: en-US
X-MS-Has-Attach: 
X-MS-TNEF-Correlator: 
x-originating-ip: [157.54.51.33]
Content-Type: multipart/alternative; boundary="_000_4E1F6AAD24975D4BA5B16804296739436747AD87TK5EX14MBXC284r_"
MIME-Version: 1.0
X-Forefront-Antispam-Report: CIP:131.107.125.37; CTRY:US; IPV:CAL; IPV:NLI; EFV:NLI; SFV:NSPM; SFS:(377424002)(479174001)(377454001)(51704002)(69224001)(199002)(189002)(24454001)(65554002)(5343655001)(74502001)(54356001)(51856001)(74662001)(80022001)(54316002)(66066001)(56776001)(50986001)(16236675001)(56816002)(49866001)(47976001)(55846006)(512954001)(46102001)(47736001)(4396001)(76482001)(77982001)(59766001)(65816001)(79102001)(53806001)(5343635001)(47446002)(44976002)(31966008)(16406001)(15202345001)(20776003)(63696002)(33656001); DIR:OUT; SFP:; SCL:1; SRVR:BL2FFO11HUB014; H:TK5EX14MLTC102.redmond.corp.microsoft.com; RD:InfoDomainNonexistent; A:1; MX:1; LANG:en; 
X-OriginatorOrg: microsoft.onmicrosoft.com
X-Forefront-PRVS: 07630F72AD
Cc: "<oauth@ietf.org>" <oauth@ietf.org>
Subject: Re: [OAUTH-WG] I-D Action: draft-ietf-oauth-dyn-reg-06.txt
X-BeenThere: oauth@ietf.org
X-Mailman-Version: 2.1.12
Precedence: list
List-Id: OAUTH WG <oauth.ietf.org>
List-Unsubscribe: <https://www.ietf.org/mailman/options/oauth>, <mailto:oauth-request@ietf.org?subject=unsubscribe>
List-Archive: <http://www.ietf.org/mail-archive/web/oauth>
List-Post: <mailto:oauth@ietf.org>
List-Help: <mailto:oauth-request@ietf.org?subject=help>
List-Subscribe: <https://www.ietf.org/mailman/listinfo/oauth>, <mailto:oauth-request@ietf.org?subject=subscribe>
X-List-Received-Date: Wed, 20 Feb 2013 17:01:23 -0000

--_000_4E1F6AAD24975D4BA5B16804296739436747AD87TK5EX14MBXC284r_
Content-Type: text/plain; charset="us-ascii"
Content-Transfer-Encoding: quoted-printable

Tim, as background, this came from the OpenID Connect specs, where we tried=
 to consistently use the convention that the locator for any resource that =
can be retrieved from the specified location be called a URL, whereas any i=
dentifier that may not be retrievable is called a URI.  That was done as an=
 aid to developer understanding of the specifications.

If the use of "URL" is deprecated by the IETF in favor of always just using=
 "URI", I suppose we could change that, but if it's going to change, it sho=
uld be soon.

                                                            -- Mike


From: oauth-bounces@ietf.org [mailto:oauth-bounces@ietf.org] On Behalf Of N=
at Sakimura
Sent: Wednesday, February 20, 2013 8:57 AM
To: Tim Bray
Cc: <oauth@ietf.org>
Subject: Re: [OAUTH-WG] I-D Action: draft-ietf-oauth-dyn-reg-06.txt

You are right. I am in the camp recommending the use of URL when it is a co=
ncrete endpoint and URI when it includes something that is only abstract, b=
ut since OAuth standardized on "uri", we may as well do so here.

Nat
2013/2/20 Tim Bray <twbray@google.com<mailto:twbray@google.com>>
In OAuth, we have redirect_uri not redirect_url; should this be registratio=
n_access_uri for consistency? -T

On Wed, Feb 20, 2013 at 8:23 AM, John Bradley <ve7jtb@ve7jtb.com<mailto:ve7=
jtb@ve7jtb.com>> wrote:
I think registration_access_url is OK.    I haven't heard any better names =
yet.

John B.

On 2013-02-20, at 1:04 PM, Mike Jones <Michael.Jones@microsoft.com<mailto:M=
ichael.Jones@microsoft.com>> wrote:


For what it's worth, the name "registration_access_url" was chosen to be pa=
rallel to "registration_access_token".   It's the place you use the access =
token.  And it's where you access an existing registration.  I'm against th=
e name "client_metadata_url" because it's not metadata you're accessing - i=
t's a registration you're accessing.  For the same reason, I don't think th=
e name "client_info_url" gives people the right idea, because it doesn't sa=
y anything it being the registration that you're accessing.

If you really want us to change this, having read what's above, I could liv=
e with "client_registration_url", but I don't think a change is actually ne=
cessary.  (But if we are going to change it, let's do it ASAP, before the O=
penID Connect Implementer's Drafts are published.)

                                                            -- Mike

From: oauth-bounces@ietf.org<mailto:oauth-bounces@ietf.org> [mailto:oauth-<=
mailto:oauth->bounces@ietf.org<mailto:bounces@ietf.org>] On Behalf Of Nat S=
akimura
Sent: Wednesday, February 20, 2013 7:58 AM
To: <oauth@ietf.org<mailto:oauth@ietf.org>>; Richer, Justin P.; John Bradle=
y
Subject: Re: [OAUTH-WG] I-D Action: draft-ietf-oauth-dyn-reg-06.txt

Thanks Justin.

Even if we go flat rather than doing JSON Structure, the "Client
Registration Access Endpoint" is not a good representative name.

What it represents is the client metadata/info.
It is not representing "Client Registration Access".
What does "Client Registration Access" mean?
Does UPDATing "Cleint Registration Access" make sense?

Something in the line of "Client Metadata Endpoint" and
something like "client_metadata_url" or "client_info_url" is much better.

Nat
2013/2/15 Richer, Justin P. <jricher@mitre.org<mailto:jricher@mitre.org>>
Everyone, there's a new draft of DynReg up on the tracker. This draft tries=
 to codify the discussions so far from this week into something we can all =
read. There are still plenty of open discussion points and items up for deb=
ate. Please read through this latest draft and see what's changed and help =
assure that it properly captures the conversations. If you have any inputs =
for the marked [[ Editor's Note ]] sections, please send them to the list b=
y next Thursday to give me opportunity to get any necessary changes in by t=
he cutoff date of Monday the 22nd.

Thanks for all of your hard work everyone, I think this is *really* coming =
along now.

 -- Justin

On Feb 15, 2013, at 4:54 PM, internet-drafts@ietf.org<mailto:internet-draft=
s@ietf.org> wrote:

>
> A New Internet-Draft is available from the on-line Internet-Drafts direct=
ories.
> This draft is a work item of the Web Authorization Protocol Working Group=
 of the IETF.
>
>       Title           : OAuth Dynamic Client Registration Protocol
>       Author(s)       : Justin Richer
>                          John Bradley
>                          Michael B. Jones
>                          Maciej Machulak
>       Filename        : draft-ietf-oauth-dyn-reg-06.txt
>       Pages           : 21
>       Date            : 2013-02-15
>
> Abstract:
>   This specification defines an endpoint and protocol for dynamic
>   registration of OAuth Clients at an Authorization Server.
>
>
> The IETF datatracker status page for this draft is:
> https://datatracker.ietf.org/doc/draft-ietf-oauth-dyn-reg
>
> There's also a htmlized version available at:
> http://tools.ietf.org/html/draft-ietf-oauth-dyn-reg-06
>
> A diff from the previous version is available at:
> http://www.ietf.org/rfcdiff?url2=3Ddraft-ietf-oauth-dyn-reg-06
>
>
> Internet-Drafts are also available by anonymous FTP at:
> ftp://ftp.ietf.org/internet-drafts/
>
> _______________________________________________
> OAuth mailing list
> OAuth@ietf.org<mailto:OAuth@ietf.org>
> https://www.ietf.org/mailman/listinfo/oauth

_______________________________________________
OAuth mailing list
OAuth@ietf.org<mailto:OAuth@ietf.org>
https://www.ietf.org/mailman/listinfo/oauth



--
Nat Sakimura (=3Dnat)
Chairman, OpenID Foundation
http://nat.sakimura.org/
@_nat_en


_______________________________________________
OAuth mailing list
OAuth@ietf.org<mailto:OAuth@ietf.org>
https://www.ietf.org/mailman/listinfo/oauth


_______________________________________________
OAuth mailing list
OAuth@ietf.org<mailto:OAuth@ietf.org>
https://www.ietf.org/mailman/listinfo/oauth



--
Nat Sakimura (=3Dnat)
Chairman, OpenID Foundation
http://nat.sakimura.org/
@_nat_en

--_000_4E1F6AAD24975D4BA5B16804296739436747AD87TK5EX14MBXC284r_
Content-Type: text/html; charset="us-ascii"
Content-Transfer-Encoding: quoted-printable

<html xmlns:v=3D"urn:schemas-microsoft-com:vml" xmlns:o=3D"urn:schemas-micr=
osoft-com:office:office" xmlns:w=3D"urn:schemas-microsoft-com:office:word" =
xmlns:m=3D"http://schemas.microsoft.com/office/2004/12/omml" xmlns=3D"http:=
//www.w3.org/TR/REC-html40">
<head>
<meta http-equiv=3D"Content-Type" content=3D"text/html; charset=3Dus-ascii"=
>
<meta name=3D"Generator" content=3D"Microsoft Word 14 (filtered medium)">
<style><!--
/* Font Definitions */
@font-face
	{font-family:Calibri;
	panose-1:2 15 5 2 2 2 4 3 2 4;}
@font-face
	{font-family:Tahoma;
	panose-1:2 11 6 4 3 5 4 4 2 4;}
/* Style Definitions */
p.MsoNormal, li.MsoNormal, div.MsoNormal
	{margin:0in;
	margin-bottom:.0001pt;
	font-size:12.0pt;
	font-family:"Times New Roman","serif";}
a:link, span.MsoHyperlink
	{mso-style-priority:99;
	color:blue;
	text-decoration:underline;}
a:visited, span.MsoHyperlinkFollowed
	{mso-style-priority:99;
	color:purple;
	text-decoration:underline;}
p.MsoAcetate, li.MsoAcetate, div.MsoAcetate
	{mso-style-priority:99;
	mso-style-link:"Balloon Text Char";
	margin:0in;
	margin-bottom:.0001pt;
	font-size:8.0pt;
	font-family:"Tahoma","sans-serif";}
span.EmailStyle17
	{mso-style-type:personal-reply;
	font-family:"Calibri","sans-serif";
	color:#1F497D;}
span.BalloonTextChar
	{mso-style-name:"Balloon Text Char";
	mso-style-priority:99;
	mso-style-link:"Balloon Text";
	font-family:"Tahoma","sans-serif";}
.MsoChpDefault
	{mso-style-type:export-only;
	font-family:"Calibri","sans-serif";}
@page WordSection1
	{size:8.5in 11.0in;
	margin:1.0in 1.0in 1.0in 1.0in;}
div.WordSection1
	{page:WordSection1;}
--></style><!--[if gte mso 9]><xml>
<o:shapedefaults v:ext=3D"edit" spidmax=3D"1026" />
</xml><![endif]--><!--[if gte mso 9]><xml>
<o:shapelayout v:ext=3D"edit">
<o:idmap v:ext=3D"edit" data=3D"1" />
</o:shapelayout></xml><![endif]-->
</head>
<body lang=3D"EN-US" link=3D"blue" vlink=3D"purple">
<div class=3D"WordSection1">
<p class=3D"MsoNormal"><span style=3D"font-size:11.0pt;font-family:&quot;Ca=
libri&quot;,&quot;sans-serif&quot;;color:#1F497D">Tim, as background, this =
came from the OpenID Connect specs, where we tried to consistently use the =
convention that the locator for any resource that can be
 retrieved from the specified location be called a URL, whereas any identif=
ier that may not be retrievable is called a URI.&nbsp; That was done as an =
aid to developer understanding of the specifications.<o:p></o:p></span></p>
<p class=3D"MsoNormal"><span style=3D"font-size:11.0pt;font-family:&quot;Ca=
libri&quot;,&quot;sans-serif&quot;;color:#1F497D"><o:p>&nbsp;</o:p></span><=
/p>
<p class=3D"MsoNormal"><span style=3D"font-size:11.0pt;font-family:&quot;Ca=
libri&quot;,&quot;sans-serif&quot;;color:#1F497D">If the use of &#8220;URL&=
#8221; is deprecated by the IETF in favor of always just using &#8220;URI&#=
8221;, I suppose we could change that, but if it&#8217;s going to change, i=
t should be
 soon.<o:p></o:p></span></p>
<p class=3D"MsoNormal"><span style=3D"font-size:11.0pt;font-family:&quot;Ca=
libri&quot;,&quot;sans-serif&quot;;color:#1F497D"><o:p>&nbsp;</o:p></span><=
/p>
<p class=3D"MsoNormal"><span style=3D"font-size:11.0pt;font-family:&quot;Ca=
libri&quot;,&quot;sans-serif&quot;;color:#1F497D">&nbsp;&nbsp;&nbsp;&nbsp;&=
nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbs=
p;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&=
nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbs=
p;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&=
nbsp;&nbsp;&nbsp;&nbsp;&nbsp; -- Mike<o:p></o:p></span></p>
<p class=3D"MsoNormal"><span style=3D"font-size:11.0pt;font-family:&quot;Ca=
libri&quot;,&quot;sans-serif&quot;;color:#1F497D"><o:p>&nbsp;</o:p></span><=
/p>
<p class=3D"MsoNormal"><span style=3D"font-size:11.0pt;font-family:&quot;Ca=
libri&quot;,&quot;sans-serif&quot;;color:#1F497D"><o:p>&nbsp;</o:p></span><=
/p>
<p class=3D"MsoNormal"><b><span style=3D"font-size:10.0pt;font-family:&quot=
;Tahoma&quot;,&quot;sans-serif&quot;">From:</span></b><span style=3D"font-s=
ize:10.0pt;font-family:&quot;Tahoma&quot;,&quot;sans-serif&quot;"> oauth-bo=
unces@ietf.org [mailto:oauth-bounces@ietf.org]
<b>On Behalf Of </b>Nat Sakimura<br>
<b>Sent:</b> Wednesday, February 20, 2013 8:57 AM<br>
<b>To:</b> Tim Bray<br>
<b>Cc:</b> &lt;oauth@ietf.org&gt;<br>
<b>Subject:</b> Re: [OAUTH-WG] I-D Action: draft-ietf-oauth-dyn-reg-06.txt<=
o:p></o:p></span></p>
<p class=3D"MsoNormal"><o:p>&nbsp;</o:p></p>
<p class=3D"MsoNormal">You are right. I am in the camp recommending the use=
 of URL when it is a concrete endpoint and URI when it includes something t=
hat is only abstract, but since OAuth standardized on &quot;uri&quot;, we m=
ay as well do so here.&nbsp;<o:p></o:p></p>
<div>
<p class=3D"MsoNormal"><o:p>&nbsp;</o:p></p>
</div>
<div>
<p class=3D"MsoNormal" style=3D"margin-bottom:12.0pt">Nat<o:p></o:p></p>
<div>
<p class=3D"MsoNormal">2013/2/20 Tim Bray &lt;<a href=3D"mailto:twbray@goog=
le.com" target=3D"_blank">twbray@google.com</a>&gt;<o:p></o:p></p>
<p class=3D"MsoNormal">In OAuth, we have redirect_uri not redirect_url; sho=
uld this be registration_access_uri for consistency? -T<o:p></o:p></p>
<div>
<div>
<p class=3D"MsoNormal" style=3D"margin-bottom:12.0pt"><o:p>&nbsp;</o:p></p>
<div>
<p class=3D"MsoNormal">On Wed, Feb 20, 2013 at 8:23 AM, John Bradley &lt;<a=
 href=3D"mailto:ve7jtb@ve7jtb.com" target=3D"_blank">ve7jtb@ve7jtb.com</a>&=
gt; wrote:<o:p></o:p></p>
<div>
<p class=3D"MsoNormal">I think registration_access_url is OK. &nbsp; &nbsp;=
I haven't heard any better names yet.<o:p></o:p></p>
<div>
<p class=3D"MsoNormal"><o:p>&nbsp;</o:p></p>
</div>
<div>
<p class=3D"MsoNormal">John B.<o:p></o:p></p>
<div>
<div>
<p class=3D"MsoNormal"><o:p>&nbsp;</o:p></p>
<div>
<div>
<p class=3D"MsoNormal">On 2013-02-20, at 1:04 PM, Mike Jones &lt;<a href=3D=
"mailto:Michael.Jones@microsoft.com" target=3D"_blank">Michael.Jones@micros=
oft.com</a>&gt; wrote:<o:p></o:p></p>
</div>
<p class=3D"MsoNormal"><br>
<br>
<o:p></o:p></p>
<div>
<div>
<div>
<p class=3D"MsoNormal"><span style=3D"font-size:11.0pt;font-family:&quot;Ca=
libri&quot;,&quot;sans-serif&quot;;color:#1F497D">For what it&#8217;s worth=
, the name &#8220;registration_access_url&#8221; was chosen to be parallel =
to &#8220;registration_access_token&#8221;.&nbsp;&nbsp; It&#8217;s the plac=
e you use the access token.&nbsp;
 And it&#8217;s where you access an existing registration.&nbsp; I&#8217;m =
against the name &#8220;client_metadata_url&#8221; because it&#8217;s not m=
etadata you&#8217;re accessing &#8211; it&#8217;s a registration you&#8217;=
re accessing.&nbsp; For the same reason, I don&#8217;t think the name &#822=
0;client_info_url&#8221; gives people the
 right idea, because it doesn&#8217;t say anything it being the registratio=
n that you&#8217;re accessing.</span><o:p></o:p></p>
</div>
<div>
<p class=3D"MsoNormal"><span style=3D"font-size:11.0pt;font-family:&quot;Ca=
libri&quot;,&quot;sans-serif&quot;;color:#1F497D">&nbsp;</span><o:p></o:p><=
/p>
</div>
<div>
<p class=3D"MsoNormal"><span style=3D"font-size:11.0pt;font-family:&quot;Ca=
libri&quot;,&quot;sans-serif&quot;;color:#1F497D">If you really want us to =
change this, having read what&#8217;s above, I could live with &#8220;clien=
t_registration_url&#8221;, but I don&#8217;t think a change is actually nec=
essary.&nbsp;
 (But if we are going to change it, let&#8217;s do it ASAP, before the Open=
ID Connect Implementer&#8217;s Drafts are published.)</span><o:p></o:p></p>
</div>
<div>
<p class=3D"MsoNormal"><span style=3D"font-size:11.0pt;font-family:&quot;Ca=
libri&quot;,&quot;sans-serif&quot;;color:#1F497D">&nbsp;</span><o:p></o:p><=
/p>
</div>
<div>
<p class=3D"MsoNormal"><span style=3D"font-size:11.0pt;font-family:&quot;Ca=
libri&quot;,&quot;sans-serif&quot;;color:#1F497D">&nbsp;&nbsp;&nbsp;&nbsp;&=
nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbs=
p;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&=
nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbs=
p;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&=
nbsp;&nbsp;&nbsp;&nbsp;&nbsp; -- Mike</span><o:p></o:p></p>
</div>
<div>
<p class=3D"MsoNormal"><span style=3D"font-size:11.0pt;font-family:&quot;Ca=
libri&quot;,&quot;sans-serif&quot;;color:#1F497D">&nbsp;</span><o:p></o:p><=
/p>
</div>
<div>
<p class=3D"MsoNormal"><b><span style=3D"font-size:10.0pt;font-family:&quot=
;Tahoma&quot;,&quot;sans-serif&quot;">From:</span></b><span style=3D"font-s=
ize:10.0pt;font-family:&quot;Tahoma&quot;,&quot;sans-serif&quot;">&nbsp;<a =
href=3D"mailto:oauth-bounces@ietf.org" target=3D"_blank">oauth-bounces@ietf=
.org</a> [mailto:<a href=3D"mailto:oauth-" target=3D"_blank">oauth-</a><a h=
ref=3D"mailto:bounces@ietf.org" target=3D"_blank">bounces@ietf.org</a>]&nbs=
p;<b>On
 Behalf Of&nbsp;</b>Nat Sakimura<br>
<b>Sent:</b>&nbsp;Wednesday, February 20, 2013 7:58 AM<br>
<b>To:</b>&nbsp;&lt;<a href=3D"mailto:oauth@ietf.org" target=3D"_blank">oau=
th@ietf.org</a>&gt;; Richer, Justin P.; John Bradley<br>
<b>Subject:</b>&nbsp;Re: [OAUTH-WG] I-D Action: draft-ietf-oauth-dyn-reg-06=
.txt</span><o:p></o:p></p>
</div>
<div>
<p class=3D"MsoNormal">&nbsp;<o:p></o:p></p>
</div>
<div>
<p class=3D"MsoNormal"><span style=3D"font-size:13.5pt;font-family:&quot;Ar=
ial&quot;,&quot;sans-serif&quot;;color:#222222">Thanks Justin.<br>
<br>
Even if we go flat rather than doing JSON Structure, the &quot;Client<br>
Registration Access Endpoint&quot; is not a good representative name.<br>
<br>
What it represents is the client metadata/info.<br>
It is not representing &quot;Client Registration Access&quot;.&nbsp;</span>=
<o:p></o:p></p>
</div>
<div>
<div>
<p class=3D"MsoNormal">What does &quot;Client Registration Access&quot; mea=
n?&nbsp;<o:p></o:p></p>
</div>
</div>
<div>
<p class=3D"MsoNormal" style=3D"margin-bottom:12.0pt"><span style=3D"font-s=
ize:13.5pt;font-family:&quot;Arial&quot;,&quot;sans-serif&quot;;color:#2222=
22">Does UPDATing &quot;Cleint Registration Access&quot; make sense?</span>=
<br>
<span style=3D"font-size:13.5pt;font-family:&quot;Arial&quot;,&quot;sans-se=
rif&quot;;color:#222222"><br>
Something in the line of &quot;Client Metadata Endpoint&quot; and<br>
something like &quot;client_metadata_url&quot; or&nbsp;&quot;client_info_ur=
l&quot; is much better.<br>
<br>
Nat</span><o:p></o:p></p>
<div>
<div>
<p class=3D"MsoNormal">2013/2/15 Richer, Justin P. &lt;<a href=3D"mailto:jr=
icher@mitre.org" target=3D"_blank"><span style=3D"color:purple">jricher@mit=
re.org</span></a>&gt;<o:p></o:p></p>
</div>
<div>
<p class=3D"MsoNormal">Everyone, there's a new draft of DynReg up on the tr=
acker. This draft tries to codify the discussions so far from this week int=
o something we can all read. There are still plenty of open discussion poin=
ts and items up for debate. Please
 read through this latest draft and see what's changed and help assure that=
 it properly captures the conversations. If you have any inputs for the mar=
ked [[ Editor's Note ]] sections, please send them to the list by next Thur=
sday to give me opportunity to get
 any necessary changes in by the cutoff date of Monday the 22nd.<br>
<br>
Thanks for all of your hard work everyone, I think this is *really* coming =
along now.<br>
<span style=3D"color:#888888"><br>
&nbsp;-- Justin</span><o:p></o:p></p>
</div>
<div>
<div>
<p class=3D"MsoNormal"><br>
On Feb 15, 2013, at 4:54 PM,&nbsp;<a href=3D"mailto:internet-drafts@ietf.or=
g" target=3D"_blank"><span style=3D"color:purple">internet-drafts@ietf.org<=
/span></a>&nbsp;wrote:<br>
<br>
&gt;<br>
&gt; A New Internet-Draft is available from the on-line Internet-Drafts dir=
ectories.<br>
&gt; This draft is a work item of the Web Authorization Protocol Working Gr=
oup of the IETF.<br>
&gt;<br>
&gt; &nbsp; &nbsp; &nbsp; Title &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; : OAuth =
Dynamic Client Registration Protocol<br>
&gt; &nbsp; &nbsp; &nbsp; Author(s) &nbsp; &nbsp; &nbsp; : Justin Richer<br=
>
&gt; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; =
&nbsp; &nbsp; &nbsp;John Bradley<br>
&gt; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; =
&nbsp; &nbsp; &nbsp;Michael B. Jones<br>
&gt; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; =
&nbsp; &nbsp; &nbsp;Maciej Machulak<br>
&gt; &nbsp; &nbsp; &nbsp; Filename &nbsp; &nbsp; &nbsp; &nbsp;: draft-ietf-=
oauth-dyn-reg-06.txt<br>
&gt; &nbsp; &nbsp; &nbsp; Pages &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; : 21<br>
&gt; &nbsp; &nbsp; &nbsp; Date &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp;: 2=
013-02-15<br>
&gt;<br>
&gt; Abstract:<br>
&gt; &nbsp; This specification defines an endpoint and protocol for dynamic=
<br>
&gt; &nbsp; registration of OAuth Clients at an Authorization Server.<br>
&gt;<br>
&gt;<br>
&gt; The IETF datatracker status page for this draft is:<br>
&gt;&nbsp;<a href=3D"https://datatracker.ietf.org/doc/draft-ietf-oauth-dyn-=
reg" target=3D"_blank"><span style=3D"color:purple">https://datatracker.iet=
f.org/doc/draft-ietf-oauth-dyn-reg</span></a><br>
&gt;<br>
&gt; There's also a htmlized version available at:<br>
&gt;&nbsp;<a href=3D"http://tools.ietf.org/html/draft-ietf-oauth-dyn-reg-06=
" target=3D"_blank"><span style=3D"color:purple">http://tools.ietf.org/html=
/draft-ietf-oauth-dyn-reg-06</span></a><br>
&gt;<br>
&gt; A diff from the previous version is available at:<br>
&gt;&nbsp;<a href=3D"http://www.ietf.org/rfcdiff?url2=3Ddraft-ietf-oauth-dy=
n-reg-06" target=3D"_blank"><span style=3D"color:purple">http://www.ietf.or=
g/rfcdiff?url2=3Ddraft-ietf-oauth-dyn-reg-06</span></a><br>
&gt;<br>
&gt;<br>
&gt; Internet-Drafts are also available by anonymous FTP at:<br>
&gt;&nbsp;<a href=3D"ftp://ftp.ietf.org/internet-drafts/" target=3D"_blank"=
><span style=3D"color:purple">ftp://ftp.ietf.org/internet-drafts/</span></a=
><br>
&gt;<br>
&gt; _______________________________________________<br>
&gt; OAuth mailing list<br>
&gt;&nbsp;<a href=3D"mailto:OAuth@ietf.org" target=3D"_blank"><span style=
=3D"color:purple">OAuth@ietf.org</span></a><br>
&gt;&nbsp;<a href=3D"https://www.ietf.org/mailman/listinfo/oauth" target=3D=
"_blank"><span style=3D"color:purple">https://www.ietf.org/mailman/listinfo=
/oauth</span></a><br>
<br>
_______________________________________________<br>
OAuth mailing list<br>
<a href=3D"mailto:OAuth@ietf.org" target=3D"_blank"><span style=3D"color:pu=
rple">OAuth@ietf.org</span></a><br>
<a href=3D"https://www.ietf.org/mailman/listinfo/oauth" target=3D"_blank"><=
span style=3D"color:purple">https://www.ietf.org/mailman/listinfo/oauth</sp=
an></a><o:p></o:p></p>
</div>
</div>
</div>
<div>
<p class=3D"MsoNormal"><br>
<br clear=3D"all">
<o:p></o:p></p>
</div>
<div>
<div>
<p class=3D"MsoNormal">&nbsp;<o:p></o:p></p>
</div>
</div>
<div>
<p class=3D"MsoNormal">--&nbsp;<br>
Nat Sakimura (=3Dnat)<o:p></o:p></p>
</div>
<div>
<div>
<p class=3D"MsoNormal">Chairman, OpenID Foundation<br>
<a href=3D"http://nat.sakimura.org/" target=3D"_blank"><span style=3D"color=
:purple">http://nat.sakimura.org/</span></a><br>
@_nat_en<o:p></o:p></p>
</div>
</div>
</div>
</div>
</div>
</div>
<p class=3D"MsoNormal"><o:p>&nbsp;</o:p></p>
</div>
</div>
</div>
</div>
<p class=3D"MsoNormal" style=3D"margin-bottom:12.0pt"><br>
_______________________________________________<br>
OAuth mailing list<br>
<a href=3D"mailto:OAuth@ietf.org" target=3D"_blank">OAuth@ietf.org</a><br>
<a href=3D"https://www.ietf.org/mailman/listinfo/oauth" target=3D"_blank">h=
ttps://www.ietf.org/mailman/listinfo/oauth</a><o:p></o:p></p>
</div>
<p class=3D"MsoNormal"><o:p>&nbsp;</o:p></p>
</div>
</div>
<p class=3D"MsoNormal" style=3D"margin-bottom:12.0pt"><br>
_______________________________________________<br>
OAuth mailing list<br>
<a href=3D"mailto:OAuth@ietf.org">OAuth@ietf.org</a><br>
<a href=3D"https://www.ietf.org/mailman/listinfo/oauth" target=3D"_blank">h=
ttps://www.ietf.org/mailman/listinfo/oauth</a><o:p></o:p></p>
</div>
<p class=3D"MsoNormal"><br>
<br clear=3D"all">
<o:p></o:p></p>
<div>
<p class=3D"MsoNormal"><o:p>&nbsp;</o:p></p>
</div>
<p class=3D"MsoNormal">-- <br>
Nat Sakimura (=3Dnat)<o:p></o:p></p>
<div>
<p class=3D"MsoNormal">Chairman, OpenID Foundation<br>
<a href=3D"http://nat.sakimura.org/" target=3D"_blank">http://nat.sakimura.=
org/</a><br>
@_nat_en<o:p></o:p></p>
</div>
</div>
</div>
</body>
</html>

--_000_4E1F6AAD24975D4BA5B16804296739436747AD87TK5EX14MBXC284r_--

From Michael.Jones@microsoft.com  Wed Feb 20 09:03:50 2013
Return-Path: <Michael.Jones@microsoft.com>
X-Original-To: oauth@ietfa.amsl.com
Delivered-To: oauth@ietfa.amsl.com
Received: from localhost (localhost [127.0.0.1]) by ietfa.amsl.com (Postfix) with ESMTP id D0B1D21F871C for <oauth@ietfa.amsl.com>; Wed, 20 Feb 2013 09:03:50 -0800 (PST)
X-Virus-Scanned: amavisd-new at amsl.com
X-Spam-Flag: NO
X-Spam-Score: -2.584
X-Spam-Level: 
X-Spam-Status: No, score=-2.584 tagged_above=-999 required=5 tests=[AWL=0.014,  BAYES_00=-2.599, HTML_MESSAGE=0.001]
Received: from mail.ietf.org ([64.170.98.30]) by localhost (ietfa.amsl.com [127.0.0.1]) (amavisd-new, port 10024) with ESMTP id pvlq4GIYcBQZ for <oauth@ietfa.amsl.com>; Wed, 20 Feb 2013 09:03:46 -0800 (PST)
Received: from na01-bl2-obe.outbound.protection.outlook.com (na01-bl2-obe.ptr.protection.outlook.com [65.55.169.27]) by ietfa.amsl.com (Postfix) with ESMTP id A4FAD21F87D7 for <oauth@ietf.org>; Wed, 20 Feb 2013 09:03:24 -0800 (PST)
Received: from BY2FFO11FD008.protection.gbl (10.1.15.204) by BY2FFO11HUB012.protection.gbl (10.1.14.83) with Microsoft SMTP Server (TLS) id 15.0.620.12; Wed, 20 Feb 2013 17:03:21 +0000
Received: from TK5EX14HUBC107.redmond.corp.microsoft.com (131.107.125.37) by BY2FFO11FD008.mail.protection.outlook.com (10.1.14.159) with Microsoft SMTP Server (TLS) id 15.0.620.12 via Frontend Transport; Wed, 20 Feb 2013 17:03:21 +0000
Received: from TK5EX14MBXC284.redmond.corp.microsoft.com ([169.254.1.96]) by TK5EX14HUBC107.redmond.corp.microsoft.com ([157.54.80.67]) with mapi id 14.02.0318.003; Wed, 20 Feb 2013 17:02:50 +0000
From: Mike Jones <Michael.Jones@microsoft.com>
To: Nat Sakimura <sakimura@gmail.com>
Thread-Topic: [OAUTH-WG] I-D Action: draft-ietf-oauth-dyn-reg-06.txt
Thread-Index: AQHOC8cMkbohP5vU0EO7eTLi/U/hMJh7eCuAgAd2gACAAAA6MIAADyiAgAAAlPA=
Date: Wed, 20 Feb 2013 17:02:50 +0000
Message-ID: <4E1F6AAD24975D4BA5B16804296739436747ADDB@TK5EX14MBXC284.redmond.corp.microsoft.com>
References: <20130215215423.23019.50224.idtracker@ietfa.amsl.com> <B33BFB58CCC8BE4998958016839DE27E06894B4F@IMCMBX01.MITRE.ORG> <CABzCy2CgnAtPrTY37H6vO-+5u3tRmsm+1j86r3w046AhHnNdfw@mail.gmail.com> <4E1F6AAD24975D4BA5B16804296739436747A665@TK5EX14MBXC284.redmond.corp.microsoft.com> <CABzCy2DHvFVmtv9jB-re5efKEVrfBBk4BZ83n_EQLMHOqsnXcA@mail.gmail.com>
In-Reply-To: <CABzCy2DHvFVmtv9jB-re5efKEVrfBBk4BZ83n_EQLMHOqsnXcA@mail.gmail.com>
Accept-Language: en-US
Content-Language: en-US
X-MS-Has-Attach: 
X-MS-TNEF-Correlator: 
x-originating-ip: [157.54.51.33]
Content-Type: multipart/alternative; boundary="_000_4E1F6AAD24975D4BA5B16804296739436747ADDBTK5EX14MBXC284r_"
MIME-Version: 1.0
X-Forefront-Antispam-Report: CIP:131.107.125.37; CTRY:US; IPV:CAL; IPV:NLI; EFV:NLI; SFV:NSPM; SFS:(69224001)(51444002)(51704002)(24454001)(65554002)(189002)(199002)(377424002)(377454001)(479174001)(74502001)(47446002)(31966008)(54316002)(74662001)(44976002)(53806001)(16406001)(46102001)(79102001)(63696002)(55846006)(51856001)(77982001)(65816001)(4396001)(47736001)(5343655001)(5343635001)(56776001)(49866001)(1411001)(512954001)(59766001)(76482001)(15202345001)(54356001)(16297215001)(50986001)(47976001)(66066001)(80022001)(56816002)(16236675001)(33656001)(20776003); DIR:OUT; SFP:; SCL:1; SRVR:BY2FFO11HUB012; H:TK5EX14HUBC107.redmond.corp.microsoft.com; RD:InfoDomainNonexistent; MX:1; A:1; LANG:en; 
X-OriginatorOrg: microsoft.onmicrosoft.com
X-Forefront-PRVS: 07630F72AD
Cc: "<oauth@ietf.org>" <oauth@ietf.org>
Subject: Re: [OAUTH-WG] I-D Action: draft-ietf-oauth-dyn-reg-06.txt
X-BeenThere: oauth@ietf.org
X-Mailman-Version: 2.1.12
Precedence: list
List-Id: OAUTH WG <oauth.ietf.org>
List-Unsubscribe: <https://www.ietf.org/mailman/options/oauth>, <mailto:oauth-request@ietf.org?subject=unsubscribe>
List-Archive: <http://www.ietf.org/mail-archive/web/oauth>
List-Post: <mailto:oauth@ietf.org>
List-Help: <mailto:oauth-request@ietf.org?subject=help>
List-Subscribe: <https://www.ietf.org/mailman/listinfo/oauth>, <mailto:oauth-request@ietf.org?subject=subscribe>
X-List-Received-Date: Wed, 20 Feb 2013 17:03:50 -0000

--_000_4E1F6AAD24975D4BA5B16804296739436747ADDBTK5EX14MBXC284r_
Content-Type: text/plain; charset="us-ascii"
Content-Transfer-Encoding: quoted-printable

I could live with "registered_client_url".  I think that adding "_metadata"=
 or "_info" is incorrect, because what's being accessed is the client' regi=
stration - not just metadata or info about the client's registration (altho=
ugh that information can be retrieved as one aspect of the operations on th=
e client's registration).

                                                            -- Mike

From: Nat Sakimura [mailto:sakimura@gmail.com]
Sent: Wednesday, February 20, 2013 8:53 AM
To: Mike Jones
Cc: <oauth@ietf.org>; Richer, Justin P.; John Bradley
Subject: Re: [OAUTH-WG] I-D Action: draft-ietf-oauth-dyn-reg-06.txt

I have read the whole thing and still ---

Your argument that it is the place for using "registration access token" th=
us should have a parallel name "registration access url" is very weak. Ther=
e are several weakness.

First, "registration access token" actually is "registration" + "access tok=
en". Extracting "registration access" from "registration access token" is b=
roken.

Secondly, access token is used to against any protected resource. Recommend=
ing to use the word "access" in naming protected resources is broken. Shoul=
d we rename Userinfo endpoint to something like "Userinfo Access Endpoint"?=
 I do not think so.

Thirdly, the term "Registration Access" does not seem to be meaningful.
When you say "access", I suppose you are using the noun version of it.
(If you are using the verb, then I am even more against as a URL should not=
 contain a verb.)

According to the Webster, access (n.) is defined as:

access n.

1
a : onset<http://www.merriam-webster.com/dictionary/onset> 2
b : a fit of intense feeling : outburst<http://www.merriam-webster.com/dict=
ionary/outburst>
2
a : permission, liberty, or ability to enter, approach, or pass to and from=
 a place or to approach or communicate with a person or thing
b : freedom or ability to obtain or make use of something
c : a way or means of access
d : the act or an instance of accessing<http://www.merriam-webster.com/dict=
ionary/accessing>
3
: an increase by addition <a sudden access of wealth>

Replacing "access" with any of the definition above does not seem to work.

Remember, a URL is represents a "thing".
The name of the endpoint should represent the "thing".

I am merginally OK with "client registration url" leveraging on the definit=
ion 2. below (again from Webster -- my OED subscription lapsed for the time=
 being.)

registration n.

1
: the act of registering<http://www.merriam-webster.com/dictionary/register=
ing>
2
: an entry in a register<http://www.merriam-webster.com/dictionary/register=
>
3
: the number of individuals registered<http://www.merriam-webster.com/dicti=
onary/registered> : enrollment<http://www.merriam-webster.com/dictionary/en=
rollment>
4
a : the art or act of selecting and adjusting pipe organ stops
b : the combination of stops selected for performing a particular organ wor=
k
5
: a document certifying an act of registering

However, since the most common use of "registration" is actually 1 above, i=
t still is confusing. If you really want to emphasize the fact that it has =
been registered, then something like "registered client info uri" or "regis=
tered client metadata uri" would be better.

Nat


2013/2/20 Mike Jones <Michael.Jones@microsoft.com<mailto:Michael.Jones@micr=
osoft.com>>
For what it's worth, the name "registration_access_url" was chosen to be pa=
rallel to "registration_access_token".   It's the place you use the access =
token.  And it's where you access an existing registration.  I'm against th=
e name "client_metadata_url" because it's not metadata you're accessing - i=
t's a registration you're accessing.  For the same reason, I don't think th=
e name "client_info_url" gives people the right idea, because it doesn't sa=
y anything it being the registration that you're accessing.

If you really want us to change this, having read what's above, I could liv=
e with "client_registration_url", but I don't think a change is actually ne=
cessary.  (But if we are going to change it, let's do it ASAP, before the O=
penID Connect Implementer's Drafts are published.)

                                                            -- Mike

From: oauth-bounces@ietf.org<mailto:oauth-bounces@ietf.org> [mailto:oauth-b=
ounces@ietf.org<mailto:oauth-bounces@ietf.org>] On Behalf Of Nat Sakimura
Sent: Wednesday, February 20, 2013 7:58 AM
To: <oauth@ietf.org<mailto:oauth@ietf.org>>; Richer, Justin P.; John Bradle=
y

Subject: Re: [OAUTH-WG] I-D Action: draft-ietf-oauth-dyn-reg-06.txt

Thanks Justin.


Even if we go flat rather than doing JSON Structure, the "Client
Registration Access Endpoint" is not a good representative name.

What it represents is the client metadata/info.
It is not representing "Client Registration Access".
What does "Client Registration Access" mean?
Does UPDATing "Cleint Registration Access" make sense?

Something in the line of "Client Metadata Endpoint" and
something like "client_metadata_url" or "client_info_url" is much better.

Nat
2013/2/15 Richer, Justin P. <jricher@mitre.org<mailto:jricher@mitre.org>>
Everyone, there's a new draft of DynReg up on the tracker. This draft tries=
 to codify the discussions so far from this week into something we can all =
read. There are still plenty of open discussion points and items up for deb=
ate. Please read through this latest draft and see what's changed and help =
assure that it properly captures the conversations. If you have any inputs =
for the marked [[ Editor's Note ]] sections, please send them to the list b=
y next Thursday to give me opportunity to get any necessary changes in by t=
he cutoff date of Monday the 22nd.

Thanks for all of your hard work everyone, I think this is *really* coming =
along now.

 -- Justin

On Feb 15, 2013, at 4:54 PM, internet-drafts@ietf.org<mailto:internet-draft=
s@ietf.org> wrote:

>
> A New Internet-Draft is available from the on-line Internet-Drafts direct=
ories.
> This draft is a work item of the Web Authorization Protocol Working Group=
 of the IETF.
>
>       Title           : OAuth Dynamic Client Registration Protocol
>       Author(s)       : Justin Richer
>                          John Bradley
>                          Michael B. Jones
>                          Maciej Machulak
>       Filename        : draft-ietf-oauth-dyn-reg-06.txt
>       Pages           : 21
>       Date            : 2013-02-15
>
> Abstract:
>   This specification defines an endpoint and protocol for dynamic
>   registration of OAuth Clients at an Authorization Server.
>
>
> The IETF datatracker status page for this draft is:
> https://datatracker.ietf.org/doc/draft-ietf-oauth-dyn-reg
>
> There's also a htmlized version available at:
> http://tools.ietf.org/html/draft-ietf-oauth-dyn-reg-06
>
> A diff from the previous version is available at:
> http://www.ietf.org/rfcdiff?url2=3Ddraft-ietf-oauth-dyn-reg-06
>
>
> Internet-Drafts are also available by anonymous FTP at:
> ftp://ftp.ietf.org/internet-drafts/
>
> _______________________________________________
> OAuth mailing list
> OAuth@ietf.org<mailto:OAuth@ietf.org>
> https://www.ietf.org/mailman/listinfo/oauth

_______________________________________________
OAuth mailing list
OAuth@ietf.org<mailto:OAuth@ietf.org>
https://www.ietf.org/mailman/listinfo/oauth



--
Nat Sakimura (=3Dnat)
Chairman, OpenID Foundation
http://nat.sakimura.org/
@_nat_en



--
Nat Sakimura (=3Dnat)
Chairman, OpenID Foundation
http://nat.sakimura.org/
@_nat_en

--_000_4E1F6AAD24975D4BA5B16804296739436747ADDBTK5EX14MBXC284r_
Content-Type: text/html; charset="us-ascii"
Content-Transfer-Encoding: quoted-printable

<html xmlns:v=3D"urn:schemas-microsoft-com:vml" xmlns:o=3D"urn:schemas-micr=
osoft-com:office:office" xmlns:w=3D"urn:schemas-microsoft-com:office:word" =
xmlns:m=3D"http://schemas.microsoft.com/office/2004/12/omml" xmlns=3D"http:=
//www.w3.org/TR/REC-html40">
<head>
<meta http-equiv=3D"Content-Type" content=3D"text/html; charset=3Dus-ascii"=
>
<meta name=3D"Generator" content=3D"Microsoft Word 14 (filtered medium)">
<style><!--
/* Font Definitions */
@font-face
	{font-family:Calibri;
	panose-1:2 15 5 2 2 2 4 3 2 4;}
@font-face
	{font-family:Tahoma;
	panose-1:2 11 6 4 3 5 4 4 2 4;}
@font-face
	{font-family:Verdana;
	panose-1:2 11 6 4 3 5 4 4 2 4;}
/* Style Definitions */
p.MsoNormal, li.MsoNormal, div.MsoNormal
	{margin:0in;
	margin-bottom:.0001pt;
	font-size:12.0pt;
	font-family:"Times New Roman","serif";}
a:link, span.MsoHyperlink
	{mso-style-priority:99;
	color:blue;
	text-decoration:underline;}
a:visited, span.MsoHyperlinkFollowed
	{mso-style-priority:99;
	color:purple;
	text-decoration:underline;}
p
	{mso-style-priority:99;
	mso-margin-top-alt:auto;
	margin-right:0in;
	mso-margin-bottom-alt:auto;
	margin-left:0in;
	font-size:12.0pt;
	font-family:"Times New Roman","serif";}
p.MsoAcetate, li.MsoAcetate, div.MsoAcetate
	{mso-style-priority:99;
	mso-style-link:"Balloon Text Char";
	margin:0in;
	margin-bottom:.0001pt;
	font-size:8.0pt;
	font-family:"Tahoma","sans-serif";}
span.ssens
	{mso-style-name:ssens;}
span.vi
	{mso-style-name:vi;}
span.BalloonTextChar
	{mso-style-name:"Balloon Text Char";
	mso-style-priority:99;
	mso-style-link:"Balloon Text";
	font-family:"Tahoma","sans-serif";}
span.EmailStyle24
	{mso-style-type:personal-reply;
	font-family:"Calibri","sans-serif";
	color:#1F497D;}
.MsoChpDefault
	{mso-style-type:export-only;
	font-family:"Calibri","sans-serif";}
@page WordSection1
	{size:8.5in 11.0in;
	margin:1.0in 1.0in 1.0in 1.0in;}
div.WordSection1
	{page:WordSection1;}
--></style><!--[if gte mso 9]><xml>
<o:shapedefaults v:ext=3D"edit" spidmax=3D"1026" />
</xml><![endif]--><!--[if gte mso 9]><xml>
<o:shapelayout v:ext=3D"edit">
<o:idmap v:ext=3D"edit" data=3D"1" />
</o:shapelayout></xml><![endif]-->
</head>
<body lang=3D"EN-US" link=3D"blue" vlink=3D"purple">
<div class=3D"WordSection1">
<p class=3D"MsoNormal"><span style=3D"font-size:11.0pt;font-family:&quot;Ca=
libri&quot;,&quot;sans-serif&quot;;color:#1F497D">I could live with &#8220;=
registered_client_url&#8221;.&nbsp; I think that adding &#8220;_metadata&#8=
221; or &#8220;_info&#8221; is incorrect, because what&#8217;s being access=
ed is the client&#8217; registration
 &#8211; not just metadata or info about the client&#8217;s registration (a=
lthough that information can be retrieved as one aspect of the operations o=
n the client&#8217;s registration).<o:p></o:p></span></p>
<p class=3D"MsoNormal"><span style=3D"font-size:11.0pt;font-family:&quot;Ca=
libri&quot;,&quot;sans-serif&quot;;color:#1F497D"><o:p>&nbsp;</o:p></span><=
/p>
<p class=3D"MsoNormal"><span style=3D"font-size:11.0pt;font-family:&quot;Ca=
libri&quot;,&quot;sans-serif&quot;;color:#1F497D">&nbsp;&nbsp;&nbsp;&nbsp;&=
nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbs=
p;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&=
nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbs=
p;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&=
nbsp;&nbsp;&nbsp;&nbsp;&nbsp; -- Mike<o:p></o:p></span></p>
<p class=3D"MsoNormal"><span style=3D"font-size:11.0pt;font-family:&quot;Ca=
libri&quot;,&quot;sans-serif&quot;;color:#1F497D"><o:p>&nbsp;</o:p></span><=
/p>
<p class=3D"MsoNormal"><b><span style=3D"font-size:10.0pt;font-family:&quot=
;Tahoma&quot;,&quot;sans-serif&quot;">From:</span></b><span style=3D"font-s=
ize:10.0pt;font-family:&quot;Tahoma&quot;,&quot;sans-serif&quot;"> Nat Saki=
mura [mailto:sakimura@gmail.com]
<br>
<b>Sent:</b> Wednesday, February 20, 2013 8:53 AM<br>
<b>To:</b> Mike Jones<br>
<b>Cc:</b> &lt;oauth@ietf.org&gt;; Richer, Justin P.; John Bradley<br>
<b>Subject:</b> Re: [OAUTH-WG] I-D Action: draft-ietf-oauth-dyn-reg-06.txt<=
o:p></o:p></span></p>
<p class=3D"MsoNormal"><o:p>&nbsp;</o:p></p>
<p class=3D"MsoNormal">I have read the whole thing and still ---&nbsp;<o:p>=
</o:p></p>
<div>
<p class=3D"MsoNormal"><o:p>&nbsp;</o:p></p>
</div>
<div>
<p class=3D"MsoNormal">Your argument that it is the place for using &quot;r=
egistration access token&quot; thus should have a parallel name &quot;regis=
tration access url&quot; is very weak. There are several weakness.&nbsp;<o:=
p></o:p></p>
</div>
<div>
<p class=3D"MsoNormal"><o:p>&nbsp;</o:p></p>
</div>
<div>
<p class=3D"MsoNormal">First, &quot;registration access token&quot; actuall=
y is &quot;registration&quot; &#43; &quot;access token&quot;. Extracting &q=
uot;registration access&quot; from &quot;registration access token&quot; is=
 broken.&nbsp;<o:p></o:p></p>
</div>
<div>
<p class=3D"MsoNormal"><o:p>&nbsp;</o:p></p>
</div>
<div>
<p class=3D"MsoNormal">Secondly, access token is used to against any protec=
ted resource.&nbsp;Recommending&nbsp;to use the word &quot;access&quot; in =
naming protected resources is broken. Should we rename Userinfo endpoint to=
 something like &quot;Userinfo Access Endpoint&quot;? I do not think
 so.&nbsp;<o:p></o:p></p>
</div>
<div>
<p class=3D"MsoNormal"><o:p>&nbsp;</o:p></p>
</div>
<div>
<p class=3D"MsoNormal">Thirdly, the term &quot;Registration Access&quot; do=
es not seem to be meaningful.&nbsp;<o:p></o:p></p>
</div>
<div>
<p class=3D"MsoNormal">When you say &quot;access&quot;, I suppose you are u=
sing the noun version of it.&nbsp;<o:p></o:p></p>
</div>
<div>
<div>
<p class=3D"MsoNormal">(If you are using the verb, then I am even more agai=
nst as a URL should not contain a verb.)&nbsp;<o:p></o:p></p>
</div>
<div>
<p class=3D"MsoNormal"><o:p>&nbsp;</o:p></p>
</div>
<div>
<p class=3D"MsoNormal">According to the Webster, access (n.) is defined as:=
&nbsp;<o:p></o:p></p>
</div>
<div>
<p class=3D"MsoNormal"><o:p>&nbsp;</o:p></p>
</div>
<div>
<p class=3D"MsoNormal"><b>access </b><i>n.</i><o:p></o:p></p>
</div>
<div>
<p class=3D"MsoNormal"><o:p>&nbsp;</o:p></p>
</div>
<div>
<div>
<div>
<p class=3D"MsoNormal" style=3D"line-height:15.0pt;background:white"><b><sp=
an style=3D"font-size:9.5pt;font-family:&quot;Verdana&quot;,&quot;sans-seri=
f&quot;">1<o:p></o:p></span></b></p>
</div>
<div style=3D"margin-left:15.0pt;margin-bottom:7.5pt">
<p class=3D"MsoNormal" style=3D"line-height:15.0pt;background:white"><em><b=
><span style=3D"font-size:9.5pt;font-family:&quot;Verdana&quot;,&quot;sans-=
serif&quot;;font-style:normal">a</span></b></em><span class=3D"ssens"><span=
 style=3D"font-size:9.5pt;font-family:&quot;Verdana&quot;,&quot;sans-serif&=
quot;">&nbsp;</span></span><strong><span style=3D"font-size:9.5pt;font-fami=
ly:&quot;Verdana&quot;,&quot;sans-serif&quot;">:</span></strong><span class=
=3D"ssens"><span style=3D"font-size:9.5pt;font-family:&quot;Verdana&quot;,&=
quot;sans-serif&quot;">&nbsp;<a href=3D"http://www.merriam-webster.com/dict=
ionary/onset"><span style=3D"font-variant:small-caps;color:#1122CC">onset</=
span></a>&nbsp;2</span><o:p></o:p></span></p>
<p class=3D"MsoNormal" style=3D"line-height:15.0pt;background:white"><em><b=
><span style=3D"font-size:9.5pt;font-family:&quot;Verdana&quot;,&quot;sans-=
serif&quot;;font-style:normal">b</span></b></em><span class=3D"ssens"><span=
 style=3D"font-size:9.5pt;font-family:&quot;Verdana&quot;,&quot;sans-serif&=
quot;">&nbsp;</span></span><strong><span style=3D"font-size:9.5pt;font-fami=
ly:&quot;Verdana&quot;,&quot;sans-serif&quot;">:</span></strong><span class=
=3D"ssens"><span style=3D"font-size:9.5pt;font-family:&quot;Verdana&quot;,&=
quot;sans-serif&quot;">&nbsp;a
 fit of intense feeling&nbsp;</span></span><strong><span style=3D"font-size=
:9.5pt;font-family:&quot;Verdana&quot;,&quot;sans-serif&quot;">:</span></st=
rong><span class=3D"ssens"><span style=3D"font-size:9.5pt;font-family:&quot=
;Verdana&quot;,&quot;sans-serif&quot;">&nbsp;<a href=3D"http://www.merriam-=
webster.com/dictionary/outburst"><span style=3D"font-variant:small-caps;col=
or:#1122CC">outburst</span></a></span></span><o:p></o:p></p>
</div>
</div>
<div>
<div>
<p class=3D"MsoNormal" style=3D"line-height:15.0pt;background:white"><b><sp=
an style=3D"font-size:9.5pt;font-family:&quot;Verdana&quot;,&quot;sans-seri=
f&quot;">2<o:p></o:p></span></b></p>
</div>
<div style=3D"margin-left:15.0pt;margin-bottom:7.5pt">
<p class=3D"MsoNormal" style=3D"line-height:15.0pt;background:white"><em><b=
><span style=3D"font-size:9.5pt;font-family:&quot;Verdana&quot;,&quot;sans-=
serif&quot;;font-style:normal">a</span></b></em><span class=3D"ssens"><span=
 style=3D"font-size:9.5pt;font-family:&quot;Verdana&quot;,&quot;sans-serif&=
quot;">&nbsp;</span></span><strong><span style=3D"font-size:9.5pt;font-fami=
ly:&quot;Verdana&quot;,&quot;sans-serif&quot;">:</span></strong><span class=
=3D"ssens"><span style=3D"font-size:9.5pt;font-family:&quot;Verdana&quot;,&=
quot;sans-serif&quot;">&nbsp;permission,
 liberty, or ability to enter, approach, or pass to and from a place or to =
approach or communicate with a person or thing</span><o:p></o:p></span></p>
<p class=3D"MsoNormal" style=3D"line-height:15.0pt;background:white"><em><b=
><span style=3D"font-size:9.5pt;font-family:&quot;Verdana&quot;,&quot;sans-=
serif&quot;;font-style:normal">b</span></b></em><span class=3D"ssens"><span=
 style=3D"font-size:9.5pt;font-family:&quot;Verdana&quot;,&quot;sans-serif&=
quot;">&nbsp;</span></span><strong><span style=3D"font-size:9.5pt;font-fami=
ly:&quot;Verdana&quot;,&quot;sans-serif&quot;">:</span></strong><span class=
=3D"ssens"><span style=3D"font-size:9.5pt;font-family:&quot;Verdana&quot;,&=
quot;sans-serif&quot;">&nbsp;freedom
 or ability to obtain or make use of something<o:p></o:p></span></span></p>
<p class=3D"MsoNormal" style=3D"line-height:15.0pt;background:white"><em><b=
><span style=3D"font-size:9.5pt;font-family:&quot;Verdana&quot;,&quot;sans-=
serif&quot;;font-style:normal">c</span></b></em><span class=3D"ssens"><span=
 style=3D"font-size:9.5pt;font-family:&quot;Verdana&quot;,&quot;sans-serif&=
quot;">&nbsp;</span></span><strong><span style=3D"font-size:9.5pt;font-fami=
ly:&quot;Verdana&quot;,&quot;sans-serif&quot;">:</span></strong><span class=
=3D"ssens"><span style=3D"font-size:9.5pt;font-family:&quot;Verdana&quot;,&=
quot;sans-serif&quot;">&nbsp;a
 way or means of access<o:p></o:p></span></span></p>
<p class=3D"MsoNormal" style=3D"line-height:15.0pt;background:white"><em><b=
><span style=3D"font-size:9.5pt;font-family:&quot;Verdana&quot;,&quot;sans-=
serif&quot;;font-style:normal">d</span></b></em><span class=3D"ssens"><span=
 style=3D"font-size:9.5pt;font-family:&quot;Verdana&quot;,&quot;sans-serif&=
quot;">&nbsp;</span></span><strong><span style=3D"font-size:9.5pt;font-fami=
ly:&quot;Verdana&quot;,&quot;sans-serif&quot;">:</span></strong><span class=
=3D"ssens"><span style=3D"font-size:9.5pt;font-family:&quot;Verdana&quot;,&=
quot;sans-serif&quot;">&nbsp;the
 act or an instance of&nbsp;<a href=3D"http://www.merriam-webster.com/dicti=
onary/accessing"><span style=3D"font-size:10.0pt;color:#1122CC">accessing</=
span></a></span></span><o:p></o:p></p>
</div>
</div>
<div>
<div>
<p class=3D"MsoNormal" style=3D"line-height:15.0pt;background:white"><b><sp=
an style=3D"font-size:9.5pt;font-family:&quot;Verdana&quot;,&quot;sans-seri=
f&quot;">3<o:p></o:p></span></b></p>
</div>
<div style=3D"margin-left:15.0pt;margin-bottom:7.5pt">
<p class=3D"MsoNormal" style=3D"line-height:15.0pt;background:white"><stron=
g><span style=3D"font-size:9.5pt;font-family:&quot;Verdana&quot;,&quot;sans=
-serif&quot;">:</span></strong><span class=3D"ssens"><span style=3D"font-si=
ze:9.5pt;font-family:&quot;Verdana&quot;,&quot;sans-serif&quot;">&nbsp;an i=
ncrease by addition&nbsp;</span></span><span class=3D"vi"><span style=3D"fo=
nt-size:9.5pt;font-family:&quot;Verdana&quot;,&quot;sans-serif&quot;">&lt;a
 sudden&nbsp;</span></span><em><span style=3D"font-size:9.5pt;font-family:&=
quot;Verdana&quot;,&quot;sans-serif&quot;">access</span></em><span class=3D=
"vi"><span style=3D"font-size:9.5pt;font-family:&quot;Verdana&quot;,&quot;s=
ans-serif&quot;">&nbsp;of wealth&gt;</span></span><span style=3D"font-size:=
9.5pt;font-family:&quot;Verdana&quot;,&quot;sans-serif&quot;"><o:p></o:p></=
span></p>
</div>
</div>
<div>
<p class=3D"MsoNormal"><o:p>&nbsp;</o:p></p>
</div>
<div>
<p class=3D"MsoNormal">Replacing &quot;access&quot; with any of the definit=
ion above does not seem to work.&nbsp;<o:p></o:p></p>
</div>
<div>
<p class=3D"MsoNormal"><o:p>&nbsp;</o:p></p>
</div>
<div>
<p class=3D"MsoNormal">Remember, a URL is represents a &quot;thing&quot;.&n=
bsp;<o:p></o:p></p>
</div>
<div>
<p class=3D"MsoNormal">The name of the endpoint should represent the &quot;=
thing&quot;.&nbsp;<o:p></o:p></p>
</div>
<div>
<p class=3D"MsoNormal"><o:p>&nbsp;</o:p></p>
</div>
<div>
<p class=3D"MsoNormal">I am merginally OK with &quot;client registration ur=
l&quot; leveraging on the definition 2. below (again from Webster -- my OED=
 subscription lapsed for the time being.)&nbsp;<o:p></o:p></p>
</div>
<div>
<p class=3D"MsoNormal"><o:p>&nbsp;</o:p></p>
</div>
<div>
<p class=3D"MsoNormal"><b>registration </b><i>n.</i><o:p></o:p></p>
</div>
<div>
<p class=3D"MsoNormal"><o:p>&nbsp;</o:p></p>
</div>
<div>
<div>
<div>
<p class=3D"MsoNormal" style=3D"line-height:15.0pt;background:white"><b><sp=
an style=3D"font-size:9.5pt;font-family:&quot;Verdana&quot;,&quot;sans-seri=
f&quot;">1<o:p></o:p></span></b></p>
</div>
<div style=3D"margin-left:15.0pt;margin-bottom:7.5pt">
<p class=3D"MsoNormal" style=3D"line-height:15.0pt;background:white"><stron=
g><span style=3D"font-size:9.5pt;font-family:&quot;Verdana&quot;,&quot;sans=
-serif&quot;">:</span></strong><span class=3D"ssens"><span style=3D"font-si=
ze:9.5pt;font-family:&quot;Verdana&quot;,&quot;sans-serif&quot;">&nbsp;the =
act of&nbsp;<a href=3D"http://www.merriam-webster.com/dictionary/registerin=
g"><span style=3D"font-size:10.0pt;color:#1122CC">registering</span></a></s=
pan></span><span style=3D"font-size:9.5pt;font-family:&quot;Verdana&quot;,&=
quot;sans-serif&quot;"><o:p></o:p></span></p>
</div>
</div>
<div>
<div>
<p class=3D"MsoNormal" style=3D"line-height:15.0pt;background:white"><b><sp=
an style=3D"font-size:9.5pt;font-family:&quot;Verdana&quot;,&quot;sans-seri=
f&quot;">2<o:p></o:p></span></b></p>
</div>
<div style=3D"margin-left:15.0pt;margin-bottom:7.5pt">
<p class=3D"MsoNormal" style=3D"line-height:15.0pt;background:white"><stron=
g><span style=3D"font-size:9.5pt;font-family:&quot;Verdana&quot;,&quot;sans=
-serif&quot;">:</span></strong><span class=3D"ssens"><span style=3D"font-si=
ze:9.5pt;font-family:&quot;Verdana&quot;,&quot;sans-serif&quot;">&nbsp;an e=
ntry in a&nbsp;<a href=3D"http://www.merriam-webster.com/dictionary/registe=
r"><span style=3D"font-size:10.0pt;color:#1122CC">register</span></a></span=
></span><span style=3D"font-size:9.5pt;font-family:&quot;Verdana&quot;,&quo=
t;sans-serif&quot;"><o:p></o:p></span></p>
</div>
</div>
<div>
<div>
<p class=3D"MsoNormal" style=3D"line-height:15.0pt;background:white"><b><sp=
an style=3D"font-size:9.5pt;font-family:&quot;Verdana&quot;,&quot;sans-seri=
f&quot;">3<o:p></o:p></span></b></p>
</div>
<div style=3D"margin-left:15.0pt;margin-bottom:7.5pt">
<p class=3D"MsoNormal" style=3D"line-height:15.0pt;background:white"><stron=
g><span style=3D"font-size:9.5pt;font-family:&quot;Verdana&quot;,&quot;sans=
-serif&quot;">:</span></strong><span class=3D"ssens"><span style=3D"font-si=
ze:9.5pt;font-family:&quot;Verdana&quot;,&quot;sans-serif&quot;">&nbsp;the =
number of individuals&nbsp;<a href=3D"http://www.merriam-webster.com/dictio=
nary/registered"><span style=3D"font-size:10.0pt;color:#1122CC">registered<=
/span></a>&nbsp;</span></span><strong><span style=3D"font-size:9.5pt;font-f=
amily:&quot;Verdana&quot;,&quot;sans-serif&quot;">:</span></strong><span cl=
ass=3D"ssens"><span style=3D"font-size:9.5pt;font-family:&quot;Verdana&quot=
;,&quot;sans-serif&quot;">&nbsp;<a href=3D"http://www.merriam-webster.com/d=
ictionary/enrollment"><span style=3D"font-variant:small-caps;color:#1122CC"=
>enrollment</span></a></span></span><span style=3D"font-size:9.5pt;font-fam=
ily:&quot;Verdana&quot;,&quot;sans-serif&quot;"><o:p></o:p></span></p>
</div>
</div>
<div>
<div>
<p class=3D"MsoNormal" style=3D"line-height:15.0pt;background:white"><b><sp=
an style=3D"font-size:9.5pt;font-family:&quot;Verdana&quot;,&quot;sans-seri=
f&quot;">4<o:p></o:p></span></b></p>
</div>
<div style=3D"margin-left:15.0pt;margin-bottom:7.5pt">
<p class=3D"MsoNormal" style=3D"line-height:15.0pt;background:white"><em><b=
><span style=3D"font-size:9.5pt;font-family:&quot;Verdana&quot;,&quot;sans-=
serif&quot;;font-style:normal">a</span></b></em><span class=3D"ssens"><span=
 style=3D"font-size:9.5pt;font-family:&quot;Verdana&quot;,&quot;sans-serif&=
quot;">&nbsp;</span></span><strong><span style=3D"font-size:9.5pt;font-fami=
ly:&quot;Verdana&quot;,&quot;sans-serif&quot;">:</span></strong><span class=
=3D"ssens"><span style=3D"font-size:9.5pt;font-family:&quot;Verdana&quot;,&=
quot;sans-serif&quot;">&nbsp;the
 art or act of selecting and adjusting pipe organ stops</span><o:p></o:p></=
span></p>
<p class=3D"MsoNormal" style=3D"line-height:15.0pt;background:white"><em><b=
><span style=3D"font-size:9.5pt;font-family:&quot;Verdana&quot;,&quot;sans-=
serif&quot;;font-style:normal">b</span></b></em><span class=3D"ssens"><span=
 style=3D"font-size:9.5pt;font-family:&quot;Verdana&quot;,&quot;sans-serif&=
quot;">&nbsp;</span></span><strong><span style=3D"font-size:9.5pt;font-fami=
ly:&quot;Verdana&quot;,&quot;sans-serif&quot;">:</span></strong><span class=
=3D"ssens"><span style=3D"font-size:9.5pt;font-family:&quot;Verdana&quot;,&=
quot;sans-serif&quot;">&nbsp;the
 combination of stops selected for performing a particular organ work</span=
></span><o:p></o:p></p>
</div>
</div>
<div>
<div>
<p class=3D"MsoNormal" style=3D"line-height:15.0pt;background:white"><b><sp=
an style=3D"font-size:9.5pt;font-family:&quot;Verdana&quot;,&quot;sans-seri=
f&quot;">5<o:p></o:p></span></b></p>
</div>
<div style=3D"margin-left:15.0pt;margin-bottom:7.5pt">
<p class=3D"MsoNormal" style=3D"line-height:15.0pt;background:white"><stron=
g><span style=3D"font-size:9.5pt;font-family:&quot;Verdana&quot;,&quot;sans=
-serif&quot;">:</span></strong><span class=3D"ssens"><span style=3D"font-si=
ze:9.5pt;font-family:&quot;Verdana&quot;,&quot;sans-serif&quot;">&nbsp;a do=
cument certifying
 an act of registering</span></span><span style=3D"font-size:9.5pt;font-fam=
ily:&quot;Verdana&quot;,&quot;sans-serif&quot;"><o:p></o:p></span></p>
</div>
</div>
</div>
<div>
<p class=3D"MsoNormal"><o:p>&nbsp;</o:p></p>
</div>
<div>
<p class=3D"MsoNormal">However, since the most common use of &quot;registra=
tion&quot; is actually
<b>1</b> above, it still is confusing. If you really want to emphasize the =
fact that it has been registered, then something like &quot;registered clie=
nt info uri&quot; or &quot;registered client metadata uri&quot; would be be=
tter.&nbsp;<o:p></o:p></p>
</div>
<div>
<p class=3D"MsoNormal"><o:p>&nbsp;</o:p></p>
</div>
<div>
<p class=3D"MsoNormal">Nat<o:p></o:p></p>
</div>
<div>
<p class=3D"MsoNormal"><o:p>&nbsp;</o:p></p>
</div>
<p class=3D"MsoNormal"><o:p>&nbsp;</o:p></p>
<div>
<p class=3D"MsoNormal">2013/2/20 Mike Jones &lt;<a href=3D"mailto:Michael.J=
ones@microsoft.com" target=3D"_blank">Michael.Jones@microsoft.com</a>&gt;<o=
:p></o:p></p>
<div>
<div>
<p class=3D"MsoNormal" style=3D"mso-margin-top-alt:auto;mso-margin-bottom-a=
lt:auto"><span style=3D"font-size:11.0pt;font-family:&quot;Calibri&quot;,&q=
uot;sans-serif&quot;;color:#1F497D">For what it&#8217;s worth, the name &#8=
220;registration_access_url&#8221; was chosen to be parallel to &#8220;regi=
stration_access_token&#8221;.&nbsp;&nbsp;
 It&#8217;s the place you use the access token.&nbsp; And it&#8217;s where =
you access an existing registration.&nbsp; I&#8217;m against the name &#822=
0;client_metadata_url&#8221; because it&#8217;s not metadata you&#8217;re a=
ccessing &#8211; it&#8217;s a registration you&#8217;re accessing.&nbsp; Fo=
r the same reason, I don&#8217;t think
 the name &#8220;client_info_url&#8221; gives people the right idea, becaus=
e it doesn&#8217;t say anything it being the registration that you&#8217;re=
 accessing.</span><o:p></o:p></p>
<p class=3D"MsoNormal" style=3D"mso-margin-top-alt:auto;mso-margin-bottom-a=
lt:auto"><span style=3D"font-size:11.0pt;font-family:&quot;Calibri&quot;,&q=
uot;sans-serif&quot;;color:#1F497D">&nbsp;</span><o:p></o:p></p>
<p class=3D"MsoNormal" style=3D"mso-margin-top-alt:auto;mso-margin-bottom-a=
lt:auto"><span style=3D"font-size:11.0pt;font-family:&quot;Calibri&quot;,&q=
uot;sans-serif&quot;;color:#1F497D">If you really want us to change this, h=
aving read what&#8217;s above, I could live with &#8220;client_registration=
_url&#8221;,
 but I don&#8217;t think a change is actually necessary.&nbsp; (But if we a=
re going to change it, let&#8217;s do it ASAP, before the OpenID Connect Im=
plementer&#8217;s Drafts are published.)</span><o:p></o:p></p>
<p class=3D"MsoNormal" style=3D"mso-margin-top-alt:auto;mso-margin-bottom-a=
lt:auto"><span style=3D"font-size:11.0pt;font-family:&quot;Calibri&quot;,&q=
uot;sans-serif&quot;;color:#1F497D">&nbsp;</span><o:p></o:p></p>
<p class=3D"MsoNormal" style=3D"mso-margin-top-alt:auto;mso-margin-bottom-a=
lt:auto"><span style=3D"font-size:11.0pt;font-family:&quot;Calibri&quot;,&q=
uot;sans-serif&quot;;color:#1F497D">&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nb=
sp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;=
&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nb=
sp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;=
&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nb=
sp;&nbsp;&nbsp; -- Mike</span><o:p></o:p></p>
<p class=3D"MsoNormal" style=3D"mso-margin-top-alt:auto;mso-margin-bottom-a=
lt:auto"><span style=3D"font-size:11.0pt;font-family:&quot;Calibri&quot;,&q=
uot;sans-serif&quot;;color:#1F497D">&nbsp;</span><o:p></o:p></p>
<p class=3D"MsoNormal" style=3D"mso-margin-top-alt:auto;mso-margin-bottom-a=
lt:auto"><b><span style=3D"font-size:10.0pt;font-family:&quot;Tahoma&quot;,=
&quot;sans-serif&quot;">From:</span></b><span style=3D"font-size:10.0pt;fon=
t-family:&quot;Tahoma&quot;,&quot;sans-serif&quot;">
<a href=3D"mailto:oauth-bounces@ietf.org" target=3D"_blank">oauth-bounces@i=
etf.org</a> [mailto:<a href=3D"mailto:oauth-bounces@ietf.org" target=3D"_bl=
ank">oauth-bounces@ietf.org</a>]
<b>On Behalf Of </b>Nat Sakimura<br>
<b>Sent:</b> Wednesday, February 20, 2013 7:58 AM<br>
<b>To:</b> &lt;<a href=3D"mailto:oauth@ietf.org" target=3D"_blank">oauth@ie=
tf.org</a>&gt;; Richer, Justin P.; John Bradley</span><o:p></o:p></p>
<div>
<p class=3D"MsoNormal"><br>
<b>Subject:</b> Re: [OAUTH-WG] I-D Action: draft-ietf-oauth-dyn-reg-06.txt<=
o:p></o:p></p>
</div>
<p class=3D"MsoNormal" style=3D"mso-margin-top-alt:auto;mso-margin-bottom-a=
lt:auto">&nbsp;<o:p></o:p></p>
<p class=3D"MsoNormal" style=3D"mso-margin-top-alt:auto;mso-margin-bottom-a=
lt:auto"><span style=3D"font-size:13.5pt;font-family:&quot;Arial&quot;,&quo=
t;sans-serif&quot;;color:#222222;background:white">Thanks Justin.</span><o:=
p></o:p></p>
<div>
<div>
<p class=3D"MsoNormal"><span style=3D"font-size:13.5pt;font-family:&quot;Ar=
ial&quot;,&quot;sans-serif&quot;;color:#222222"><br>
<br>
<span style=3D"background:white">Even if we go flat rather than doing JSON =
Structure, the &quot;Client</span><br>
<span style=3D"background:white">Registration Access Endpoint&quot; is not =
a good representative name.</span><br>
<br>
<span style=3D"background:white">What it represents is the client metadata/=
info.</span><br>
<span style=3D"background:white">It is not representing &quot;Client Regist=
ration Access&quot;.&nbsp;</span></span><o:p></o:p></p>
</div>
</div>
<div>
<div>
<div>
<p class=3D"MsoNormal" style=3D"mso-margin-top-alt:auto;mso-margin-bottom-a=
lt:auto">What does &quot;Client Registration Access&quot; mean?&nbsp;<o:p><=
/o:p></p>
</div>
<div>
<p class=3D"MsoNormal" style=3D"mso-margin-top-alt:auto;margin-bottom:12.0p=
t"><span style=3D"font-size:13.5pt;font-family:&quot;Arial&quot;,&quot;sans=
-serif&quot;;color:#222222;background:white">Does UPDATing &quot;Cleint Reg=
istration Access&quot; make sense?</span><br>
<span style=3D"font-size:13.5pt;font-family:&quot;Arial&quot;,&quot;sans-se=
rif&quot;;color:#222222"><br>
<span style=3D"background:white">Something in the line of &quot;Client Meta=
data Endpoint&quot; and</span><br>
<span style=3D"background:white">something like &quot;client_metadata_url&q=
uot; or&nbsp;&quot;client_info_url&quot; is much better.</span><br>
<br>
<span style=3D"background:white">Nat</span></span><o:p></o:p></p>
<div>
<p class=3D"MsoNormal" style=3D"mso-margin-top-alt:auto;mso-margin-bottom-a=
lt:auto">2013/2/15 Richer, Justin P. &lt;<a href=3D"mailto:jricher@mitre.or=
g" target=3D"_blank">jricher@mitre.org</a>&gt;<o:p></o:p></p>
<p class=3D"MsoNormal" style=3D"mso-margin-top-alt:auto;mso-margin-bottom-a=
lt:auto">Everyone, there's a new draft of DynReg up on the tracker. This dr=
aft tries to codify the discussions so far from this week into something we=
 can all read. There are still plenty
 of open discussion points and items up for debate. Please read through thi=
s latest draft and see what's changed and help assure that it properly capt=
ures the conversations. If you have any inputs for the marked [[ Editor's N=
ote ]] sections, please send them
 to the list by next Thursday to give me opportunity to get any necessary c=
hanges in by the cutoff date of Monday the 22nd.<br>
<br>
Thanks for all of your hard work everyone, I think this is *really* coming =
along now.<br>
<span style=3D"color:#888888"><br>
&nbsp;-- Justin</span><o:p></o:p></p>
<div>
<div>
<p class=3D"MsoNormal" style=3D"mso-margin-top-alt:auto;mso-margin-bottom-a=
lt:auto"><br>
On Feb 15, 2013, at 4:54 PM, <a href=3D"mailto:internet-drafts@ietf.org" ta=
rget=3D"_blank">
internet-drafts@ietf.org</a> wrote:<br>
<br>
&gt;<br>
&gt; A New Internet-Draft is available from the on-line Internet-Drafts dir=
ectories.<br>
&gt; This draft is a work item of the Web Authorization Protocol Working Gr=
oup of the IETF.<br>
&gt;<br>
&gt; &nbsp; &nbsp; &nbsp; Title &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; : OAuth =
Dynamic Client Registration Protocol<br>
&gt; &nbsp; &nbsp; &nbsp; Author(s) &nbsp; &nbsp; &nbsp; : Justin Richer<br=
>
&gt; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; =
&nbsp; &nbsp; &nbsp;John Bradley<br>
&gt; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; =
&nbsp; &nbsp; &nbsp;Michael B. Jones<br>
&gt; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; =
&nbsp; &nbsp; &nbsp;Maciej Machulak<br>
&gt; &nbsp; &nbsp; &nbsp; Filename &nbsp; &nbsp; &nbsp; &nbsp;: draft-ietf-=
oauth-dyn-reg-06.txt<br>
&gt; &nbsp; &nbsp; &nbsp; Pages &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; : 21<br>
&gt; &nbsp; &nbsp; &nbsp; Date &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp;: 2=
013-02-15<br>
&gt;<br>
&gt; Abstract:<br>
&gt; &nbsp; This specification defines an endpoint and protocol for dynamic=
<br>
&gt; &nbsp; registration of OAuth Clients at an Authorization Server.<br>
&gt;<br>
&gt;<br>
&gt; The IETF datatracker status page for this draft is:<br>
&gt; <a href=3D"https://datatracker.ietf.org/doc/draft-ietf-oauth-dyn-reg" =
target=3D"_blank">
https://datatracker.ietf.org/doc/draft-ietf-oauth-dyn-reg</a><br>
&gt;<br>
&gt; There's also a htmlized version available at:<br>
&gt; <a href=3D"http://tools.ietf.org/html/draft-ietf-oauth-dyn-reg-06" tar=
get=3D"_blank">
http://tools.ietf.org/html/draft-ietf-oauth-dyn-reg-06</a><br>
&gt;<br>
&gt; A diff from the previous version is available at:<br>
&gt; <a href=3D"http://www.ietf.org/rfcdiff?url2=3Ddraft-ietf-oauth-dyn-reg=
-06" target=3D"_blank">
http://www.ietf.org/rfcdiff?url2=3Ddraft-ietf-oauth-dyn-reg-06</a><br>
&gt;<br>
&gt;<br>
&gt; Internet-Drafts are also available by anonymous FTP at:<br>
&gt; <a href=3D"ftp://ftp.ietf.org/internet-drafts/" target=3D"_blank">ftp:=
//ftp.ietf.org/internet-drafts/</a><br>
&gt;<br>
&gt; _______________________________________________<br>
&gt; OAuth mailing list<br>
&gt; <a href=3D"mailto:OAuth@ietf.org" target=3D"_blank">OAuth@ietf.org</a>=
<br>
&gt; <a href=3D"https://www.ietf.org/mailman/listinfo/oauth" target=3D"_bla=
nk">https://www.ietf.org/mailman/listinfo/oauth</a><br>
<br>
_______________________________________________<br>
OAuth mailing list<br>
<a href=3D"mailto:OAuth@ietf.org" target=3D"_blank">OAuth@ietf.org</a><br>
<a href=3D"https://www.ietf.org/mailman/listinfo/oauth" target=3D"_blank">h=
ttps://www.ietf.org/mailman/listinfo/oauth</a><o:p></o:p></p>
</div>
</div>
</div>
<p class=3D"MsoNormal" style=3D"mso-margin-top-alt:auto;mso-margin-bottom-a=
lt:auto"><br>
<br clear=3D"all">
<o:p></o:p></p>
<div>
<p class=3D"MsoNormal" style=3D"mso-margin-top-alt:auto;mso-margin-bottom-a=
lt:auto">&nbsp;<o:p></o:p></p>
</div>
<p class=3D"MsoNormal" style=3D"mso-margin-top-alt:auto;mso-margin-bottom-a=
lt:auto">--
<br>
Nat Sakimura (=3Dnat)<o:p></o:p></p>
<div>
<p class=3D"MsoNormal" style=3D"mso-margin-top-alt:auto;mso-margin-bottom-a=
lt:auto">Chairman, OpenID Foundation<br>
<a href=3D"http://nat.sakimura.org/" target=3D"_blank">http://nat.sakimura.=
org/</a><br>
@_nat_en<o:p></o:p></p>
</div>
</div>
</div>
</div>
</div>
</div>
</div>
<p class=3D"MsoNormal"><br>
<br clear=3D"all">
<o:p></o:p></p>
<div>
<p class=3D"MsoNormal"><o:p>&nbsp;</o:p></p>
</div>
<p class=3D"MsoNormal">-- <br>
Nat Sakimura (=3Dnat)<o:p></o:p></p>
<div>
<p class=3D"MsoNormal">Chairman, OpenID Foundation<br>
<a href=3D"http://nat.sakimura.org/" target=3D"_blank">http://nat.sakimura.=
org/</a><br>
@_nat_en<o:p></o:p></p>
</div>
</div>
</div>
</div>
</body>
</html>

--_000_4E1F6AAD24975D4BA5B16804296739436747ADDBTK5EX14MBXC284r_--

From sakimura@gmail.com  Wed Feb 20 09:20:22 2013
Return-Path: <sakimura@gmail.com>
X-Original-To: oauth@ietfa.amsl.com
Delivered-To: oauth@ietfa.amsl.com
Received: from localhost (localhost [127.0.0.1]) by ietfa.amsl.com (Postfix) with ESMTP id 8738221F8960 for <oauth@ietfa.amsl.com>; Wed, 20 Feb 2013 09:20:22 -0800 (PST)
X-Virus-Scanned: amavisd-new at amsl.com
X-Spam-Flag: NO
X-Spam-Score: -3.262
X-Spam-Level: 
X-Spam-Status: No, score=-3.262 tagged_above=-999 required=5 tests=[AWL=0.336,  BAYES_00=-2.599, HTML_MESSAGE=0.001, RCVD_IN_DNSWL_LOW=-1]
Received: from mail.ietf.org ([64.170.98.30]) by localhost (ietfa.amsl.com [127.0.0.1]) (amavisd-new, port 10024) with ESMTP id d4USAEpLshJA for <oauth@ietfa.amsl.com>; Wed, 20 Feb 2013 09:20:17 -0800 (PST)
Received: from mail-qe0-f44.google.com (mail-qe0-f44.google.com [209.85.128.44]) by ietfa.amsl.com (Postfix) with ESMTP id 5331021F84B9 for <oauth@ietf.org>; Wed, 20 Feb 2013 09:20:17 -0800 (PST)
Received: by mail-qe0-f44.google.com with SMTP id a11so3778615qen.17 for <oauth@ietf.org>; Wed, 20 Feb 2013 09:20:16 -0800 (PST)
DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=gmail.com; s=20120113; h=mime-version:x-received:in-reply-to:references:date:message-id :subject:from:to:cc:content-type; bh=DIBOpMsUle2Xr2MMoUfDndK/aFmqJieQQ+IpnXkeCtU=; b=lpDXjbOlrBU/ZQUEaVDpLxITtxAipMUmazTC/30kDsUpr4o6bQNEqcPOLdv8jEIE7f 0hca4V2EKgquswB/u6Hbt+4NT0xVklJ60VMDM030A9EET7DvRAC6sQRYYJA5IXgy2XXl pnMFmDfZdyfSAevtO+2M3JPTk9OFExgdYSzicz/jfP9zFkI6cOnVOW4zXSiu15YdrbK5 YEk6+EgqYorqq8v2H0bbcAaw+FI4yO7RP3KSprZNXaotk6zUQC5A+fvv7nL7VA2eN97c yZgsQzxTrWt++Cs0nhdaE9MWWQ4ETRFEB0jYsU8hy+TD33Ro6tEeZW7uHAPgpEz3RmF4 XIOQ==
MIME-Version: 1.0
X-Received: by 10.224.177.204 with SMTP id bj12mr4076249qab.67.1361380816817;  Wed, 20 Feb 2013 09:20:16 -0800 (PST)
Received: by 10.49.106.161 with HTTP; Wed, 20 Feb 2013 09:20:16 -0800 (PST)
In-Reply-To: <4E1F6AAD24975D4BA5B16804296739436747ADDB@TK5EX14MBXC284.redmond.corp.microsoft.com>
References: <20130215215423.23019.50224.idtracker@ietfa.amsl.com> <B33BFB58CCC8BE4998958016839DE27E06894B4F@IMCMBX01.MITRE.ORG> <CABzCy2CgnAtPrTY37H6vO-+5u3tRmsm+1j86r3w046AhHnNdfw@mail.gmail.com> <4E1F6AAD24975D4BA5B16804296739436747A665@TK5EX14MBXC284.redmond.corp.microsoft.com> <CABzCy2DHvFVmtv9jB-re5efKEVrfBBk4BZ83n_EQLMHOqsnXcA@mail.gmail.com> <4E1F6AAD24975D4BA5B16804296739436747ADDB@TK5EX14MBXC284.redmond.corp.microsoft.com>
Date: Wed, 20 Feb 2013 12:20:16 -0500
Message-ID: <CABzCy2AyCDxc+Gov7zBnTRquzp+QUMF8riqd_8vcP0rHFQUtkQ@mail.gmail.com>
From: Nat Sakimura <sakimura@gmail.com>
To: Mike Jones <Michael.Jones@microsoft.com>
Content-Type: multipart/alternative; boundary=20cf302ef940fd900604d62b2ba8
Cc: "<oauth@ietf.org>" <oauth@ietf.org>
Subject: Re: [OAUTH-WG] I-D Action: draft-ietf-oauth-dyn-reg-06.txt
X-BeenThere: oauth@ietf.org
X-Mailman-Version: 2.1.12
Precedence: list
List-Id: OAUTH WG <oauth.ietf.org>
List-Unsubscribe: <https://www.ietf.org/mailman/options/oauth>, <mailto:oauth-request@ietf.org?subject=unsubscribe>
List-Archive: <http://www.ietf.org/mail-archive/web/oauth>
List-Post: <mailto:oauth@ietf.org>
List-Help: <mailto:oauth-request@ietf.org?subject=help>
List-Subscribe: <https://www.ietf.org/mailman/listinfo/oauth>, <mailto:oauth-request@ietf.org?subject=subscribe>
X-List-Received-Date: Wed, 20 Feb 2013 17:20:22 -0000

--20cf302ef940fd900604d62b2ba8
Content-Type: text/plain; charset=windows-1252
Content-Transfer-Encoding: quoted-printable

I have thought about that as well. The the reason I added "info" or
"metadata" was that what was behind the URL is not the client itself. By
"client registration", I suppose you mean "client entry in the register"
(cf. *registration **n* 2.) . It is the "registered data/info/metadata"
about the client.

Nat

2013/2/20 Mike Jones <Michael.Jones@microsoft.com>

>  I could live with =93registered_client_url=94.  I think that adding
> =93_metadata=94 or =93_info=94 is incorrect, because what=92s being acces=
sed is the
> client=92 registration =96 not just metadata or info about the client=92s
> registration (although that information can be retrieved as one aspect of
> the operations on the client=92s registration).****
>
> ** **
>
>                                                             -- Mike****
>
> ** **
>
> *From:* Nat Sakimura [mailto:sakimura@gmail.com]
> *Sent:* Wednesday, February 20, 2013 8:53 AM
> *To:* Mike Jones
> *Cc:* <oauth@ietf.org>; Richer, Justin P.; John Bradley
>
> *Subject:* Re: [OAUTH-WG] I-D Action: draft-ietf-oauth-dyn-reg-06.txt****
>
> ** **
>
> I have read the whole thing and still --- ****
>
> ** **
>
> Your argument that it is the place for using "registration access token"
> thus should have a parallel name "registration access url" is very weak.
> There are several weakness. ****
>
> ** **
>
> First, "registration access token" actually is "registration" + "access
> token". Extracting "registration access" from "registration access token"
> is broken. ****
>
> ** **
>
> Secondly, access token is used to against any protected
> resource. Recommending to use the word "access" in naming protected
> resources is broken. Should we rename Userinfo endpoint to something like
> "Userinfo Access Endpoint"? I do not think so. ****
>
> ** **
>
> Thirdly, the term "Registration Access" does not seem to be meaningful. *=
*
> **
>
> When you say "access", I suppose you are using the noun version of it. **=
*
> *
>
> (If you are using the verb, then I am even more against as a URL should
> not contain a verb.) ****
>
> ** **
>
> According to the Webster, access (n.) is defined as: ****
>
> ** **
>
> *access **n.*****
>
> ** **
>
> *1*
>
> *a* *:* onset <http://www.merriam-webster.com/dictionary/onset> 2****
>
> *b* *:* a fit of intense feeling *:* outburst<http://www.merriam-webster.=
com/dictionary/outburst>
> ****
>
> *2*
>
> *a* *:* permission, liberty, or ability to enter, approach, or pass to
> and from a place or to approach or communicate with a person or thing****
>
> *b* *:* freedom or ability to obtain or make use of something****
>
> *c* *:* a way or means of access****
>
> *d* *:* the act or an instance of accessing<http://www.merriam-webster.co=
m/dictionary/accessing>
> ****
>
> *3*
>
> *:* an increase by addition <a sudden *access* of wealth>****
>
> ** **
>
> Replacing "access" with any of the definition above does not seem to work=
.
> ****
>
> ** **
>
> Remember, a URL is represents a "thing". ****
>
> The name of the endpoint should represent the "thing". ****
>
> ** **
>
> I am merginally OK with "client registration url" leveraging on the
> definition 2. below (again from Webster -- my OED subscription lapsed for
> the time being.) ****
>
> ** **
>
> *registration **n.*****
>
> ** **
>
> *1*
>
> *:* the act of registering<http://www.merriam-webster.com/dictionary/regi=
stering>
> ****
>
> *2*
>
> *:* an entry in a register<http://www.merriam-webster.com/dictionary/regi=
ster>
> ****
>
> *3*
>
> *:* the number of individuals registered<http://www.merriam-webster.com/d=
ictionary/registered>
>  *:* enrollment <http://www.merriam-webster.com/dictionary/enrollment>***=
*
>
> *4*
>
> *a* *:* the art or act of selecting and adjusting pipe organ stops****
>
> *b* *:* the combination of stops selected for performing a particular
> organ work****
>
> *5*
>
> *:* a document certifying an act of registering****
>
> ** **
>
> However, since the most common use of "registration" is actually *1*above=
, it still is confusing. If you really want to emphasize the fact that
> it has been registered, then something like "registered client info uri" =
or
> "registered client metadata uri" would be better. ****
>
> ** **
>
> Nat****
>
> ** **
>
> ** **
>
> 2013/2/20 Mike Jones <Michael.Jones@microsoft.com>****
>
> For what it=92s worth, the name =93registration_access_url=94 was chosen =
to be
> parallel to =93registration_access_token=94.   It=92s the place you use t=
he
> access token.  And it=92s where you access an existing registration.  I=
=92m
> against the name =93client_metadata_url=94 because it=92s not metadata yo=
u=92re
> accessing =96 it=92s a registration you=92re accessing.  For the same rea=
son, I
> don=92t think the name =93client_info_url=94 gives people the right idea,=
 because
> it doesn=92t say anything it being the registration that you=92re accessi=
ng.**
> **
>
>  ****
>
> If you really want us to change this, having read what=92s above, I could
> live with =93client_registration_url=94, but I don=92t think a change is =
actually
> necessary.  (But if we are going to change it, let=92s do it ASAP, before=
 the
> OpenID Connect Implementer=92s Drafts are published.)****
>
>  ****
>
>                                                             -- Mike****
>
>  ****
>
> *From:* oauth-bounces@ietf.org [mailto:oauth-bounces@ietf.org] *On Behalf
> Of *Nat Sakimura
> *Sent:* Wednesday, February 20, 2013 7:58 AM
> *To:* <oauth@ietf.org>; Richer, Justin P.; John Bradley****
>
>
> *Subject:* Re: [OAUTH-WG] I-D Action: draft-ietf-oauth-dyn-reg-06.txt****
>
>  ****
>
> Thanks Justin.****
>
>
>
> Even if we go flat rather than doing JSON Structure, the "Client
> Registration Access Endpoint" is not a good representative name.
>
> What it represents is the client metadata/info.
> It is not representing "Client Registration Access". ****
>
> What does "Client Registration Access" mean? ****
>
> Does UPDATing "Cleint Registration Access" make sense?
>
> Something in the line of "Client Metadata Endpoint" and
> something like "client_metadata_url" or "client_info_url" is much better.
>
> Nat****
>
> 2013/2/15 Richer, Justin P. <jricher@mitre.org>****
>
> Everyone, there's a new draft of DynReg up on the tracker. This draft
> tries to codify the discussions so far from this week into something we c=
an
> all read. There are still plenty of open discussion points and items up f=
or
> debate. Please read through this latest draft and see what's changed and
> help assure that it properly captures the conversations. If you have any
> inputs for the marked [[ Editor's Note ]] sections, please send them to t=
he
> list by next Thursday to give me opportunity to get any necessary changes
> in by the cutoff date of Monday the 22nd.
>
> Thanks for all of your hard work everyone, I think this is *really* comin=
g
> along now.
>
>  -- Justin****
>
>
> On Feb 15, 2013, at 4:54 PM, internet-drafts@ietf.org wrote:
>
> >
> > A New Internet-Draft is available from the on-line Internet-Drafts
> directories.
> > This draft is a work item of the Web Authorization Protocol Working
> Group of the IETF.
> >
> >       Title           : OAuth Dynamic Client Registration Protocol
> >       Author(s)       : Justin Richer
> >                          John Bradley
> >                          Michael B. Jones
> >                          Maciej Machulak
> >       Filename        : draft-ietf-oauth-dyn-reg-06.txt
> >       Pages           : 21
> >       Date            : 2013-02-15
> >
> > Abstract:
> >   This specification defines an endpoint and protocol for dynamic
> >   registration of OAuth Clients at an Authorization Server.
> >
> >
> > The IETF datatracker status page for this draft is:
> > https://datatracker.ietf.org/doc/draft-ietf-oauth-dyn-reg
> >
> > There's also a htmlized version available at:
> > http://tools.ietf.org/html/draft-ietf-oauth-dyn-reg-06
> >
> > A diff from the previous version is available at:
> > http://www.ietf.org/rfcdiff?url2=3Ddraft-ietf-oauth-dyn-reg-06
> >
> >
> > Internet-Drafts are also available by anonymous FTP at:
> > ftp://ftp.ietf.org/internet-drafts/
> >
> > _______________________________________________
> > OAuth mailing list
> > OAuth@ietf.org
> > https://www.ietf.org/mailman/listinfo/oauth
>
> _______________________________________________
> OAuth mailing list
> OAuth@ietf.org
> https://www.ietf.org/mailman/listinfo/oauth****
>
>
>
> ****
>
>  ****
>
> --
> Nat Sakimura (=3Dnat)****
>
> Chairman, OpenID Foundation
> http://nat.sakimura.org/
> @_nat_en****
>
>
>
> ****
>
> ** **
>
> --
> Nat Sakimura (=3Dnat)****
>
> Chairman, OpenID Foundation
> http://nat.sakimura.org/
> @_nat_en****
>



--=20
Nat Sakimura (=3Dnat)
Chairman, OpenID Foundation
http://nat.sakimura.org/
@_nat_en

--20cf302ef940fd900604d62b2ba8
Content-Type: text/html; charset=windows-1252
Content-Transfer-Encoding: quoted-printable

I have thought about that as well. The the reason I added &quot;info&quot; =
or &quot;metadata&quot; was that what was behind the URL is not the client =
itself. By &quot;client registration&quot;, I suppose you mean &quot;client=
 entry in the register&quot; (cf. <b>registration </b><i>n</i> 2.) . It is =
the &quot;registered data/info/metadata&quot; about the client.=A0<div>
<br></div><div>Nat<br><br><div class=3D"gmail_quote">2013/2/20 Mike Jones <=
span dir=3D"ltr">&lt;<a href=3D"mailto:Michael.Jones@microsoft.com" target=
=3D"_blank">Michael.Jones@microsoft.com</a>&gt;</span><br><blockquote class=
=3D"gmail_quote" style=3D"margin:0 0 0 .8ex;border-left:1px #ccc solid;padd=
ing-left:1ex">






<div lang=3D"EN-US" link=3D"blue" vlink=3D"purple">
<div>
<p class=3D"MsoNormal"><span style=3D"font-size:11.0pt;font-family:&quot;Ca=
libri&quot;,&quot;sans-serif&quot;;color:#1f497d">I could live with =93regi=
stered_client_url=94.=A0 I think that adding =93_metadata=94 or =93_info=94=
 is incorrect, because what=92s being accessed is the client=92 registratio=
n
 =96 not just metadata or info about the client=92s registration (although =
that information can be retrieved as one aspect of the operations on the cl=
ient=92s registration).<u></u><u></u></span></p>
<p class=3D"MsoNormal"><span style=3D"font-size:11.0pt;font-family:&quot;Ca=
libri&quot;,&quot;sans-serif&quot;;color:#1f497d"><u></u>=A0<u></u></span><=
/p>
<p class=3D"MsoNormal"><span style=3D"font-size:11.0pt;font-family:&quot;Ca=
libri&quot;,&quot;sans-serif&quot;;color:#1f497d">=A0=A0=A0=A0=A0=A0=A0=A0=
=A0=A0=A0=A0=A0=A0=A0=A0=A0=A0=A0=A0=A0=A0=A0=A0=A0=A0=A0=A0=A0=A0=A0=A0=A0=
=A0=A0=A0=A0=A0=A0=A0=A0=A0=A0=A0=A0=A0=A0=A0=A0=A0=A0=A0=A0=A0=A0=A0=A0=A0=
=A0 -- Mike<u></u><u></u></span></p>
<p class=3D"MsoNormal"><span style=3D"font-size:11.0pt;font-family:&quot;Ca=
libri&quot;,&quot;sans-serif&quot;;color:#1f497d"><u></u>=A0<u></u></span><=
/p>
<p class=3D"MsoNormal"><b><span style=3D"font-size:10.0pt;font-family:&quot=
;Tahoma&quot;,&quot;sans-serif&quot;">From:</span></b><span style=3D"font-s=
ize:10.0pt;font-family:&quot;Tahoma&quot;,&quot;sans-serif&quot;"> Nat Saki=
mura [mailto:<a href=3D"mailto:sakimura@gmail.com" target=3D"_blank">sakimu=
ra@gmail.com</a>]
<br>
<b>Sent:</b> Wednesday, February 20, 2013 8:53 AM<br>
<b>To:</b> Mike Jones<br>
<b>Cc:</b> &lt;<a href=3D"mailto:oauth@ietf.org" target=3D"_blank">oauth@ie=
tf.org</a>&gt;; Richer, Justin P.; John Bradley</span></p><div><div class=
=3D"h5"><br>
<b>Subject:</b> Re: [OAUTH-WG] I-D Action: draft-ietf-oauth-dyn-reg-06.txt<=
u></u><u></u></div></div><p></p><div><div class=3D"h5">
<p class=3D"MsoNormal"><u></u>=A0<u></u></p>
<p class=3D"MsoNormal">I have read the whole thing and still ---=A0<u></u><=
u></u></p>
<div>
<p class=3D"MsoNormal"><u></u>=A0<u></u></p>
</div>
<div>
<p class=3D"MsoNormal">Your argument that it is the place for using &quot;r=
egistration access token&quot; thus should have a parallel name &quot;regis=
tration access url&quot; is very weak. There are several weakness.=A0<u></u=
><u></u></p>

</div>
<div>
<p class=3D"MsoNormal"><u></u>=A0<u></u></p>
</div>
<div>
<p class=3D"MsoNormal">First, &quot;registration access token&quot; actuall=
y is &quot;registration&quot; + &quot;access token&quot;. Extracting &quot;=
registration access&quot; from &quot;registration access token&quot; is bro=
ken.=A0<u></u><u></u></p>

</div>
<div>
<p class=3D"MsoNormal"><u></u>=A0<u></u></p>
</div>
<div>
<p class=3D"MsoNormal">Secondly, access token is used to against any protec=
ted resource.=A0Recommending=A0to use the word &quot;access&quot; in naming=
 protected resources is broken. Should we rename Userinfo endpoint to somet=
hing like &quot;Userinfo Access Endpoint&quot;? I do not think
 so.=A0<u></u><u></u></p>
</div>
<div>
<p class=3D"MsoNormal"><u></u>=A0<u></u></p>
</div>
<div>
<p class=3D"MsoNormal">Thirdly, the term &quot;Registration Access&quot; do=
es not seem to be meaningful.=A0<u></u><u></u></p>
</div>
<div>
<p class=3D"MsoNormal">When you say &quot;access&quot;, I suppose you are u=
sing the noun version of it.=A0<u></u><u></u></p>
</div>
<div>
<div>
<p class=3D"MsoNormal">(If you are using the verb, then I am even more agai=
nst as a URL should not contain a verb.)=A0<u></u><u></u></p>
</div>
<div>
<p class=3D"MsoNormal"><u></u>=A0<u></u></p>
</div>
<div>
<p class=3D"MsoNormal">According to the Webster, access (n.) is defined as:=
=A0<u></u><u></u></p>
</div>
<div>
<p class=3D"MsoNormal"><u></u>=A0<u></u></p>
</div>
<div>
<p class=3D"MsoNormal"><b>access </b><i>n.</i><u></u><u></u></p>
</div>
<div>
<p class=3D"MsoNormal"><u></u>=A0<u></u></p>
</div>
<div>
<div>
<div>
<p class=3D"MsoNormal" style=3D"line-height:15.0pt;background:white"><b><sp=
an style=3D"font-size:9.5pt;font-family:&quot;Verdana&quot;,&quot;sans-seri=
f&quot;">1<u></u><u></u></span></b></p>
</div>
<div style=3D"margin-left:15.0pt;margin-bottom:7.5pt">
<p class=3D"MsoNormal" style=3D"line-height:15.0pt;background:white"><em><b=
><span style=3D"font-size:9.5pt;font-family:&quot;Verdana&quot;,&quot;sans-=
serif&quot;;font-style:normal">a</span></b></em><span><span style=3D"font-s=
ize:9.5pt;font-family:&quot;Verdana&quot;,&quot;sans-serif&quot;">=A0</span=
></span><strong><span style=3D"font-size:9.5pt;font-family:&quot;Verdana&qu=
ot;,&quot;sans-serif&quot;">:</span></strong><span><span style=3D"font-size=
:9.5pt;font-family:&quot;Verdana&quot;,&quot;sans-serif&quot;">=A0<a href=
=3D"http://www.merriam-webster.com/dictionary/onset" target=3D"_blank"><spa=
n style=3D"font-variant:small-caps;color:#1122cc">onset</span></a>=A02</spa=
n><u></u><u></u></span></p>

<p class=3D"MsoNormal" style=3D"line-height:15.0pt;background:white"><em><b=
><span style=3D"font-size:9.5pt;font-family:&quot;Verdana&quot;,&quot;sans-=
serif&quot;;font-style:normal">b</span></b></em><span><span style=3D"font-s=
ize:9.5pt;font-family:&quot;Verdana&quot;,&quot;sans-serif&quot;">=A0</span=
></span><strong><span style=3D"font-size:9.5pt;font-family:&quot;Verdana&qu=
ot;,&quot;sans-serif&quot;">:</span></strong><span><span style=3D"font-size=
:9.5pt;font-family:&quot;Verdana&quot;,&quot;sans-serif&quot;">=A0a
 fit of intense feeling=A0</span></span><strong><span style=3D"font-size:9.=
5pt;font-family:&quot;Verdana&quot;,&quot;sans-serif&quot;">:</span></stron=
g><span><span style=3D"font-size:9.5pt;font-family:&quot;Verdana&quot;,&quo=
t;sans-serif&quot;">=A0<a href=3D"http://www.merriam-webster.com/dictionary=
/outburst" target=3D"_blank"><span style=3D"font-variant:small-caps;color:#=
1122cc">outburst</span></a></span></span><u></u><u></u></p>

</div>
</div>
<div>
<div>
<p class=3D"MsoNormal" style=3D"line-height:15.0pt;background:white"><b><sp=
an style=3D"font-size:9.5pt;font-family:&quot;Verdana&quot;,&quot;sans-seri=
f&quot;">2<u></u><u></u></span></b></p>
</div>
<div style=3D"margin-left:15.0pt;margin-bottom:7.5pt">
<p class=3D"MsoNormal" style=3D"line-height:15.0pt;background:white"><em><b=
><span style=3D"font-size:9.5pt;font-family:&quot;Verdana&quot;,&quot;sans-=
serif&quot;;font-style:normal">a</span></b></em><span><span style=3D"font-s=
ize:9.5pt;font-family:&quot;Verdana&quot;,&quot;sans-serif&quot;">=A0</span=
></span><strong><span style=3D"font-size:9.5pt;font-family:&quot;Verdana&qu=
ot;,&quot;sans-serif&quot;">:</span></strong><span><span style=3D"font-size=
:9.5pt;font-family:&quot;Verdana&quot;,&quot;sans-serif&quot;">=A0permissio=
n,
 liberty, or ability to enter, approach, or pass to and from a place or to =
approach or communicate with a person or thing</span><u></u><u></u></span><=
/p>
<p class=3D"MsoNormal" style=3D"line-height:15.0pt;background:white"><em><b=
><span style=3D"font-size:9.5pt;font-family:&quot;Verdana&quot;,&quot;sans-=
serif&quot;;font-style:normal">b</span></b></em><span><span style=3D"font-s=
ize:9.5pt;font-family:&quot;Verdana&quot;,&quot;sans-serif&quot;">=A0</span=
></span><strong><span style=3D"font-size:9.5pt;font-family:&quot;Verdana&qu=
ot;,&quot;sans-serif&quot;">:</span></strong><span><span style=3D"font-size=
:9.5pt;font-family:&quot;Verdana&quot;,&quot;sans-serif&quot;">=A0freedom
 or ability to obtain or make use of something<u></u><u></u></span></span><=
/p>
<p class=3D"MsoNormal" style=3D"line-height:15.0pt;background:white"><em><b=
><span style=3D"font-size:9.5pt;font-family:&quot;Verdana&quot;,&quot;sans-=
serif&quot;;font-style:normal">c</span></b></em><span><span style=3D"font-s=
ize:9.5pt;font-family:&quot;Verdana&quot;,&quot;sans-serif&quot;">=A0</span=
></span><strong><span style=3D"font-size:9.5pt;font-family:&quot;Verdana&qu=
ot;,&quot;sans-serif&quot;">:</span></strong><span><span style=3D"font-size=
:9.5pt;font-family:&quot;Verdana&quot;,&quot;sans-serif&quot;">=A0a
 way or means of access<u></u><u></u></span></span></p>
<p class=3D"MsoNormal" style=3D"line-height:15.0pt;background:white"><em><b=
><span style=3D"font-size:9.5pt;font-family:&quot;Verdana&quot;,&quot;sans-=
serif&quot;;font-style:normal">d</span></b></em><span><span style=3D"font-s=
ize:9.5pt;font-family:&quot;Verdana&quot;,&quot;sans-serif&quot;">=A0</span=
></span><strong><span style=3D"font-size:9.5pt;font-family:&quot;Verdana&qu=
ot;,&quot;sans-serif&quot;">:</span></strong><span><span style=3D"font-size=
:9.5pt;font-family:&quot;Verdana&quot;,&quot;sans-serif&quot;">=A0the
 act or an instance of=A0<a href=3D"http://www.merriam-webster.com/dictiona=
ry/accessing" target=3D"_blank"><span style=3D"font-size:10.0pt;color:#1122=
cc">accessing</span></a></span></span><u></u><u></u></p>
</div>
</div>
<div>
<div>
<p class=3D"MsoNormal" style=3D"line-height:15.0pt;background:white"><b><sp=
an style=3D"font-size:9.5pt;font-family:&quot;Verdana&quot;,&quot;sans-seri=
f&quot;">3<u></u><u></u></span></b></p>
</div>
<div style=3D"margin-left:15.0pt;margin-bottom:7.5pt">
<p class=3D"MsoNormal" style=3D"line-height:15.0pt;background:white"><stron=
g><span style=3D"font-size:9.5pt;font-family:&quot;Verdana&quot;,&quot;sans=
-serif&quot;">:</span></strong><span><span style=3D"font-size:9.5pt;font-fa=
mily:&quot;Verdana&quot;,&quot;sans-serif&quot;">=A0an increase by addition=
=A0</span></span><span><span style=3D"font-size:9.5pt;font-family:&quot;Ver=
dana&quot;,&quot;sans-serif&quot;">&lt;a
 sudden=A0</span></span><em><span style=3D"font-size:9.5pt;font-family:&quo=
t;Verdana&quot;,&quot;sans-serif&quot;">access</span></em><span><span style=
=3D"font-size:9.5pt;font-family:&quot;Verdana&quot;,&quot;sans-serif&quot;"=
>=A0of wealth&gt;</span></span><span style=3D"font-size:9.5pt;font-family:&=
quot;Verdana&quot;,&quot;sans-serif&quot;"><u></u><u></u></span></p>

</div>
</div>
<div>
<p class=3D"MsoNormal"><u></u>=A0<u></u></p>
</div>
<div>
<p class=3D"MsoNormal">Replacing &quot;access&quot; with any of the definit=
ion above does not seem to work.=A0<u></u><u></u></p>
</div>
<div>
<p class=3D"MsoNormal"><u></u>=A0<u></u></p>
</div>
<div>
<p class=3D"MsoNormal">Remember, a URL is represents a &quot;thing&quot;.=
=A0<u></u><u></u></p>
</div>
<div>
<p class=3D"MsoNormal">The name of the endpoint should represent the &quot;=
thing&quot;.=A0<u></u><u></u></p>
</div>
<div>
<p class=3D"MsoNormal"><u></u>=A0<u></u></p>
</div>
<div>
<p class=3D"MsoNormal">I am merginally OK with &quot;client registration ur=
l&quot; leveraging on the definition 2. below (again from Webster -- my OED=
 subscription lapsed for the time being.)=A0<u></u><u></u></p>
</div>
<div>
<p class=3D"MsoNormal"><u></u>=A0<u></u></p>
</div>
<div>
<p class=3D"MsoNormal"><b>registration </b><i>n.</i><u></u><u></u></p>
</div>
<div>
<p class=3D"MsoNormal"><u></u>=A0<u></u></p>
</div>
<div>
<div>
<div>
<p class=3D"MsoNormal" style=3D"line-height:15.0pt;background:white"><b><sp=
an style=3D"font-size:9.5pt;font-family:&quot;Verdana&quot;,&quot;sans-seri=
f&quot;">1<u></u><u></u></span></b></p>
</div>
<div style=3D"margin-left:15.0pt;margin-bottom:7.5pt">
<p class=3D"MsoNormal" style=3D"line-height:15.0pt;background:white"><stron=
g><span style=3D"font-size:9.5pt;font-family:&quot;Verdana&quot;,&quot;sans=
-serif&quot;">:</span></strong><span><span style=3D"font-size:9.5pt;font-fa=
mily:&quot;Verdana&quot;,&quot;sans-serif&quot;">=A0the act of=A0<a href=3D=
"http://www.merriam-webster.com/dictionary/registering" target=3D"_blank"><=
span style=3D"font-size:10.0pt;color:#1122cc">registering</span></a></span>=
</span><span style=3D"font-size:9.5pt;font-family:&quot;Verdana&quot;,&quot=
;sans-serif&quot;"><u></u><u></u></span></p>

</div>
</div>
<div>
<div>
<p class=3D"MsoNormal" style=3D"line-height:15.0pt;background:white"><b><sp=
an style=3D"font-size:9.5pt;font-family:&quot;Verdana&quot;,&quot;sans-seri=
f&quot;">2<u></u><u></u></span></b></p>
</div>
<div style=3D"margin-left:15.0pt;margin-bottom:7.5pt">
<p class=3D"MsoNormal" style=3D"line-height:15.0pt;background:white"><stron=
g><span style=3D"font-size:9.5pt;font-family:&quot;Verdana&quot;,&quot;sans=
-serif&quot;">:</span></strong><span><span style=3D"font-size:9.5pt;font-fa=
mily:&quot;Verdana&quot;,&quot;sans-serif&quot;">=A0an entry in a=A0<a href=
=3D"http://www.merriam-webster.com/dictionary/register" target=3D"_blank"><=
span style=3D"font-size:10.0pt;color:#1122cc">register</span></a></span></s=
pan><span style=3D"font-size:9.5pt;font-family:&quot;Verdana&quot;,&quot;sa=
ns-serif&quot;"><u></u><u></u></span></p>

</div>
</div>
<div>
<div>
<p class=3D"MsoNormal" style=3D"line-height:15.0pt;background:white"><b><sp=
an style=3D"font-size:9.5pt;font-family:&quot;Verdana&quot;,&quot;sans-seri=
f&quot;">3<u></u><u></u></span></b></p>
</div>
<div style=3D"margin-left:15.0pt;margin-bottom:7.5pt">
<p class=3D"MsoNormal" style=3D"line-height:15.0pt;background:white"><stron=
g><span style=3D"font-size:9.5pt;font-family:&quot;Verdana&quot;,&quot;sans=
-serif&quot;">:</span></strong><span><span style=3D"font-size:9.5pt;font-fa=
mily:&quot;Verdana&quot;,&quot;sans-serif&quot;">=A0the number of individua=
ls=A0<a href=3D"http://www.merriam-webster.com/dictionary/registered" targe=
t=3D"_blank"><span style=3D"font-size:10.0pt;color:#1122cc">registered</spa=
n></a>=A0</span></span><strong><span style=3D"font-size:9.5pt;font-family:&=
quot;Verdana&quot;,&quot;sans-serif&quot;">:</span></strong><span><span sty=
le=3D"font-size:9.5pt;font-family:&quot;Verdana&quot;,&quot;sans-serif&quot=
;">=A0<a href=3D"http://www.merriam-webster.com/dictionary/enrollment" targ=
et=3D"_blank"><span style=3D"font-variant:small-caps;color:#1122cc">enrollm=
ent</span></a></span></span><span style=3D"font-size:9.5pt;font-family:&quo=
t;Verdana&quot;,&quot;sans-serif&quot;"><u></u><u></u></span></p>

</div>
</div>
<div>
<div>
<p class=3D"MsoNormal" style=3D"line-height:15.0pt;background:white"><b><sp=
an style=3D"font-size:9.5pt;font-family:&quot;Verdana&quot;,&quot;sans-seri=
f&quot;">4<u></u><u></u></span></b></p>
</div>
<div style=3D"margin-left:15.0pt;margin-bottom:7.5pt">
<p class=3D"MsoNormal" style=3D"line-height:15.0pt;background:white"><em><b=
><span style=3D"font-size:9.5pt;font-family:&quot;Verdana&quot;,&quot;sans-=
serif&quot;;font-style:normal">a</span></b></em><span><span style=3D"font-s=
ize:9.5pt;font-family:&quot;Verdana&quot;,&quot;sans-serif&quot;">=A0</span=
></span><strong><span style=3D"font-size:9.5pt;font-family:&quot;Verdana&qu=
ot;,&quot;sans-serif&quot;">:</span></strong><span><span style=3D"font-size=
:9.5pt;font-family:&quot;Verdana&quot;,&quot;sans-serif&quot;">=A0the
 art or act of selecting and adjusting pipe organ stops</span><u></u><u></u=
></span></p>
<p class=3D"MsoNormal" style=3D"line-height:15.0pt;background:white"><em><b=
><span style=3D"font-size:9.5pt;font-family:&quot;Verdana&quot;,&quot;sans-=
serif&quot;;font-style:normal">b</span></b></em><span><span style=3D"font-s=
ize:9.5pt;font-family:&quot;Verdana&quot;,&quot;sans-serif&quot;">=A0</span=
></span><strong><span style=3D"font-size:9.5pt;font-family:&quot;Verdana&qu=
ot;,&quot;sans-serif&quot;">:</span></strong><span><span style=3D"font-size=
:9.5pt;font-family:&quot;Verdana&quot;,&quot;sans-serif&quot;">=A0the
 combination of stops selected for performing a particular organ work</span=
></span><u></u><u></u></p>
</div>
</div>
<div>
<div>
<p class=3D"MsoNormal" style=3D"line-height:15.0pt;background:white"><b><sp=
an style=3D"font-size:9.5pt;font-family:&quot;Verdana&quot;,&quot;sans-seri=
f&quot;">5<u></u><u></u></span></b></p>
</div>
<div style=3D"margin-left:15.0pt;margin-bottom:7.5pt">
<p class=3D"MsoNormal" style=3D"line-height:15.0pt;background:white"><stron=
g><span style=3D"font-size:9.5pt;font-family:&quot;Verdana&quot;,&quot;sans=
-serif&quot;">:</span></strong><span><span style=3D"font-size:9.5pt;font-fa=
mily:&quot;Verdana&quot;,&quot;sans-serif&quot;">=A0a document certifying
 an act of registering</span></span><span style=3D"font-size:9.5pt;font-fam=
ily:&quot;Verdana&quot;,&quot;sans-serif&quot;"><u></u><u></u></span></p>
</div>
</div>
</div>
<div>
<p class=3D"MsoNormal"><u></u>=A0<u></u></p>
</div>
<div>
<p class=3D"MsoNormal">However, since the most common use of &quot;registra=
tion&quot; is actually
<b>1</b> above, it still is confusing. If you really want to emphasize the =
fact that it has been registered, then something like &quot;registered clie=
nt info uri&quot; or &quot;registered client metadata uri&quot; would be be=
tter.=A0<u></u><u></u></p>

</div>
<div>
<p class=3D"MsoNormal"><u></u>=A0<u></u></p>
</div>
<div>
<p class=3D"MsoNormal">Nat<u></u><u></u></p>
</div>
<div>
<p class=3D"MsoNormal"><u></u>=A0<u></u></p>
</div>
<p class=3D"MsoNormal"><u></u>=A0<u></u></p>
<div>
<p class=3D"MsoNormal">2013/2/20 Mike Jones &lt;<a href=3D"mailto:Michael.J=
ones@microsoft.com" target=3D"_blank">Michael.Jones@microsoft.com</a>&gt;<u=
></u><u></u></p>
<div>
<div>
<p class=3D"MsoNormal"><span style=3D"font-size:11.0pt;font-family:&quot;Ca=
libri&quot;,&quot;sans-serif&quot;;color:#1f497d">For what it=92s worth, th=
e name =93registration_access_url=94 was chosen to be parallel to =93regist=
ration_access_token=94.=A0=A0
 It=92s the place you use the access token.=A0 And it=92s where you access =
an existing registration.=A0 I=92m against the name =93client_metadata_url=
=94 because it=92s not metadata you=92re accessing =96 it=92s a registratio=
n you=92re accessing.=A0 For the same reason, I don=92t think
 the name =93client_info_url=94 gives people the right idea, because it doe=
sn=92t say anything it being the registration that you=92re accessing.</spa=
n><u></u><u></u></p>
<p class=3D"MsoNormal"><span style=3D"font-size:11.0pt;font-family:&quot;Ca=
libri&quot;,&quot;sans-serif&quot;;color:#1f497d">=A0</span><u></u><u></u><=
/p>
<p class=3D"MsoNormal"><span style=3D"font-size:11.0pt;font-family:&quot;Ca=
libri&quot;,&quot;sans-serif&quot;;color:#1f497d">If you really want us to =
change this, having read what=92s above, I could live with =93client_regist=
ration_url=94,
 but I don=92t think a change is actually necessary.=A0 (But if we are goin=
g to change it, let=92s do it ASAP, before the OpenID Connect Implementer=
=92s Drafts are published.)</span><u></u><u></u></p>
<p class=3D"MsoNormal"><span style=3D"font-size:11.0pt;font-family:&quot;Ca=
libri&quot;,&quot;sans-serif&quot;;color:#1f497d">=A0</span><u></u><u></u><=
/p>
<p class=3D"MsoNormal"><span style=3D"font-size:11.0pt;font-family:&quot;Ca=
libri&quot;,&quot;sans-serif&quot;;color:#1f497d">=A0=A0=A0=A0=A0=A0=A0=A0=
=A0=A0=A0=A0=A0=A0=A0=A0=A0=A0=A0=A0=A0=A0=A0=A0=A0=A0=A0=A0=A0=A0=A0=A0=A0=
=A0=A0=A0=A0=A0=A0=A0=A0=A0=A0=A0=A0=A0=A0=A0=A0=A0=A0=A0=A0=A0=A0=A0=A0=A0=
=A0 -- Mike</span><u></u><u></u></p>
<p class=3D"MsoNormal"><span style=3D"font-size:11.0pt;font-family:&quot;Ca=
libri&quot;,&quot;sans-serif&quot;;color:#1f497d">=A0</span><u></u><u></u><=
/p>
<p class=3D"MsoNormal"><b><span style=3D"font-size:10.0pt;font-family:&quot=
;Tahoma&quot;,&quot;sans-serif&quot;">From:</span></b><span style=3D"font-s=
ize:10.0pt;font-family:&quot;Tahoma&quot;,&quot;sans-serif&quot;">
<a href=3D"mailto:oauth-bounces@ietf.org" target=3D"_blank">oauth-bounces@i=
etf.org</a> [mailto:<a href=3D"mailto:oauth-bounces@ietf.org" target=3D"_bl=
ank">oauth-bounces@ietf.org</a>]
<b>On Behalf Of </b>Nat Sakimura<br>
<b>Sent:</b> Wednesday, February 20, 2013 7:58 AM<br>
<b>To:</b> &lt;<a href=3D"mailto:oauth@ietf.org" target=3D"_blank">oauth@ie=
tf.org</a>&gt;; Richer, Justin P.; John Bradley</span><u></u><u></u></p>
<div>
<p class=3D"MsoNormal"><br>
<b>Subject:</b> Re: [OAUTH-WG] I-D Action: draft-ietf-oauth-dyn-reg-06.txt<=
u></u><u></u></p>
</div>
<p class=3D"MsoNormal">=A0<u></u><u></u></p>
<p class=3D"MsoNormal"><span style=3D"font-size:13.5pt;font-family:&quot;Ar=
ial&quot;,&quot;sans-serif&quot;;color:#222222;background:white">Thanks Jus=
tin.</span><u></u><u></u></p>
<div>
<div>
<p class=3D"MsoNormal"><span style=3D"font-size:13.5pt;font-family:&quot;Ar=
ial&quot;,&quot;sans-serif&quot;;color:#222222"><br>
<br>
<span style=3D"background:white">Even if we go flat rather than doing JSON =
Structure, the &quot;Client</span><br>
<span style=3D"background:white">Registration Access Endpoint&quot; is not =
a good representative name.</span><br>
<br>
<span style=3D"background:white">What it represents is the client metadata/=
info.</span><br>
<span style=3D"background:white">It is not representing &quot;Client Regist=
ration Access&quot;.=A0</span></span><u></u><u></u></p>
</div>
</div>
<div>
<div>
<div>
<p class=3D"MsoNormal">What does &quot;Client Registration Access&quot; mea=
n?=A0<u></u><u></u></p>
</div>
<div>
<p class=3D"MsoNormal" style=3D"margin-bottom:12.0pt"><span style=3D"font-s=
ize:13.5pt;font-family:&quot;Arial&quot;,&quot;sans-serif&quot;;color:#2222=
22;background:white">Does UPDATing &quot;Cleint Registration Access&quot; m=
ake sense?</span><br>

<span style=3D"font-size:13.5pt;font-family:&quot;Arial&quot;,&quot;sans-se=
rif&quot;;color:#222222"><br>
<span style=3D"background:white">Something in the line of &quot;Client Meta=
data Endpoint&quot; and</span><br>
<span style=3D"background:white">something like &quot;client_metadata_url&q=
uot; or=A0&quot;client_info_url&quot; is much better.</span><br>
<br>
<span style=3D"background:white">Nat</span></span><u></u><u></u></p>
<div>
<p class=3D"MsoNormal">2013/2/15 Richer, Justin P. &lt;<a href=3D"mailto:jr=
icher@mitre.org" target=3D"_blank">jricher@mitre.org</a>&gt;<u></u><u></u><=
/p>
<p class=3D"MsoNormal">Everyone, there&#39;s a new draft of DynReg up on th=
e tracker. This draft tries to codify the discussions so far from this week=
 into something we can all read. There are still plenty
 of open discussion points and items up for debate. Please read through thi=
s latest draft and see what&#39;s changed and help assure that it properly =
captures the conversations. If you have any inputs for the marked [[ Editor=
&#39;s Note ]] sections, please send them
 to the list by next Thursday to give me opportunity to get any necessary c=
hanges in by the cutoff date of Monday the 22nd.<br>
<br>
Thanks for all of your hard work everyone, I think this is *really* coming =
along now.<br>
<span style=3D"color:#888888"><br>
=A0-- Justin</span><u></u><u></u></p>
<div>
<div>
<p class=3D"MsoNormal"><br>
On Feb 15, 2013, at 4:54 PM, <a href=3D"mailto:internet-drafts@ietf.org" ta=
rget=3D"_blank">
internet-drafts@ietf.org</a> wrote:<br>
<br>
&gt;<br>
&gt; A New Internet-Draft is available from the on-line Internet-Drafts dir=
ectories.<br>
&gt; This draft is a work item of the Web Authorization Protocol Working Gr=
oup of the IETF.<br>
&gt;<br>
&gt; =A0 =A0 =A0 Title =A0 =A0 =A0 =A0 =A0 : OAuth Dynamic Client Registrat=
ion Protocol<br>
&gt; =A0 =A0 =A0 Author(s) =A0 =A0 =A0 : Justin Richer<br>
&gt; =A0 =A0 =A0 =A0 =A0 =A0 =A0 =A0 =A0 =A0 =A0 =A0 =A0John Bradley<br>
&gt; =A0 =A0 =A0 =A0 =A0 =A0 =A0 =A0 =A0 =A0 =A0 =A0 =A0Michael B. Jones<br=
>
&gt; =A0 =A0 =A0 =A0 =A0 =A0 =A0 =A0 =A0 =A0 =A0 =A0 =A0Maciej Machulak<br>
&gt; =A0 =A0 =A0 Filename =A0 =A0 =A0 =A0: draft-ietf-oauth-dyn-reg-06.txt<=
br>
&gt; =A0 =A0 =A0 Pages =A0 =A0 =A0 =A0 =A0 : 21<br>
&gt; =A0 =A0 =A0 Date =A0 =A0 =A0 =A0 =A0 =A0: 2013-02-15<br>
&gt;<br>
&gt; Abstract:<br>
&gt; =A0 This specification defines an endpoint and protocol for dynamic<br=
>
&gt; =A0 registration of OAuth Clients at an Authorization Server.<br>
&gt;<br>
&gt;<br>
&gt; The IETF datatracker status page for this draft is:<br>
&gt; <a href=3D"https://datatracker.ietf.org/doc/draft-ietf-oauth-dyn-reg" =
target=3D"_blank">
https://datatracker.ietf.org/doc/draft-ietf-oauth-dyn-reg</a><br>
&gt;<br>
&gt; There&#39;s also a htmlized version available at:<br>
&gt; <a href=3D"http://tools.ietf.org/html/draft-ietf-oauth-dyn-reg-06" tar=
get=3D"_blank">
http://tools.ietf.org/html/draft-ietf-oauth-dyn-reg-06</a><br>
&gt;<br>
&gt; A diff from the previous version is available at:<br>
&gt; <a href=3D"http://www.ietf.org/rfcdiff?url2=3Ddraft-ietf-oauth-dyn-reg=
-06" target=3D"_blank">
http://www.ietf.org/rfcdiff?url2=3Ddraft-ietf-oauth-dyn-reg-06</a><br>
&gt;<br>
&gt;<br>
&gt; Internet-Drafts are also available by anonymous FTP at:<br>
&gt; <a href=3D"ftp://ftp.ietf.org/internet-drafts/" target=3D"_blank">ftp:=
//ftp.ietf.org/internet-drafts/</a><br>
&gt;<br>
&gt; _______________________________________________<br>
&gt; OAuth mailing list<br>
&gt; <a href=3D"mailto:OAuth@ietf.org" target=3D"_blank">OAuth@ietf.org</a>=
<br>
&gt; <a href=3D"https://www.ietf.org/mailman/listinfo/oauth" target=3D"_bla=
nk">https://www.ietf.org/mailman/listinfo/oauth</a><br>
<br>
_______________________________________________<br>
OAuth mailing list<br>
<a href=3D"mailto:OAuth@ietf.org" target=3D"_blank">OAuth@ietf.org</a><br>
<a href=3D"https://www.ietf.org/mailman/listinfo/oauth" target=3D"_blank">h=
ttps://www.ietf.org/mailman/listinfo/oauth</a><u></u><u></u></p>
</div>
</div>
</div>
<p class=3D"MsoNormal"><br>
<br clear=3D"all">
<u></u><u></u></p>
<div>
<p class=3D"MsoNormal">=A0<u></u><u></u></p>
</div>
<p class=3D"MsoNormal">--
<br>
Nat Sakimura (=3Dnat)<u></u><u></u></p>
<div>
<p class=3D"MsoNormal">Chairman, OpenID Foundation<br>
<a href=3D"http://nat.sakimura.org/" target=3D"_blank">http://nat.sakimura.=
org/</a><br>
@_nat_en<u></u><u></u></p>
</div>
</div>
</div>
</div>
</div>
</div>
</div>
<p class=3D"MsoNormal"><br>
<br clear=3D"all">
<u></u><u></u></p>
<div>
<p class=3D"MsoNormal"><u></u>=A0<u></u></p>
</div>
<p class=3D"MsoNormal">-- <br>
Nat Sakimura (=3Dnat)<u></u><u></u></p>
<div>
<p class=3D"MsoNormal">Chairman, OpenID Foundation<br>
<a href=3D"http://nat.sakimura.org/" target=3D"_blank">http://nat.sakimura.=
org/</a><br>
@_nat_en<u></u><u></u></p>
</div>
</div>
</div>
</div></div></div>
</div>

</blockquote></div><br><br clear=3D"all"><div><br></div>-- <br>Nat Sakimura=
 (=3Dnat)<div>Chairman, OpenID Foundation<br><a href=3D"http://nat.sakimura=
.org/" target=3D"_blank">http://nat.sakimura.org/</a><br>@_nat_en</div>
</div>

--20cf302ef940fd900604d62b2ba8--

From twbray@google.com  Wed Feb 20 09:22:20 2013
Return-Path: <twbray@google.com>
X-Original-To: oauth@ietfa.amsl.com
Delivered-To: oauth@ietfa.amsl.com
Received: from localhost (localhost [127.0.0.1]) by ietfa.amsl.com (Postfix) with ESMTP id 2720E21F8960 for <oauth@ietfa.amsl.com>; Wed, 20 Feb 2013 09:22:20 -0800 (PST)
X-Virus-Scanned: amavisd-new at amsl.com
X-Spam-Flag: NO
X-Spam-Score: -101.858
X-Spam-Level: 
X-Spam-Status: No, score=-101.858 tagged_above=-999 required=5 tests=[AWL=0.119, BAYES_00=-2.599, FM_FORGED_GMAIL=0.622, HTML_MESSAGE=0.001, NO_RELAYS=-0.001, USER_IN_WHITELIST=-100]
Received: from mail.ietf.org ([64.170.98.30]) by localhost (ietfa.amsl.com [127.0.0.1]) (amavisd-new, port 10024) with ESMTP id j7o8mQKJGUHH for <oauth@ietfa.amsl.com>; Wed, 20 Feb 2013 09:22:16 -0800 (PST)
Received: from mail-ia0-x22f.google.com (ia-in-x022f.1e100.net [IPv6:2607:f8b0:4001:c02::22f]) by ietfa.amsl.com (Postfix) with ESMTP id 11AF321F84B9 for <oauth@ietf.org>; Wed, 20 Feb 2013 09:22:15 -0800 (PST)
Received: by mail-ia0-f175.google.com with SMTP id r4so7281264iaj.20 for <oauth@ietf.org>; Wed, 20 Feb 2013 09:22:00 -0800 (PST)
DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=google.com; s=20120113; h=x-received:mime-version:in-reply-to:references:from:date:message-id :subject:to:cc:content-type; bh=Pt96BFbJUTvO1k8SKKJdFhBGjlI1BnoyqxKWHcoQDNY=; b=FnJlnV783h7d0FByOySPSPNO/lXB0MA6yphoBkwUv7Ofb/mlogSH7u5tmBYlfnDdoV dJmkiagoYIa8XOFD4iz5WJ9izuGZE/wP31sUGhvJ0d3iYUVtBGDfeRBWC+pMbj1mgm90 APs5P35r9tQg0/ySvyMQuD4DhykcusULkScoL3mSbwuJE8vP4tWwviC0JnJwRY7yCUZO +MBdS0cCF+s7+bba9QldiXX9Uj7N3KYenLXVn8FgLkXxxROHoZ/24pZikGY33Keo4i8x KHK1C+DbsKIvglkwIlN8P3pV/Xttf6wqzYaYAzGYIcf2nDPkMOyFxEOrPUmWxuevgUo+ uq8Q==
X-Google-DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=google.com; s=20120113; h=x-received:mime-version:in-reply-to:references:from:date:message-id :subject:to:cc:content-type:x-gm-message-state; bh=Pt96BFbJUTvO1k8SKKJdFhBGjlI1BnoyqxKWHcoQDNY=; b=mc7TRUsr/jKYM88VbAgDZCKxuiS4gr3hD+Ck8Xp58Cnh9NgUV0HaDjmA9i6wWRxgI1 qbHeZkdHwu3QD4hlIE4NX2xqOhgku2glkqvn0ubOzlkZVdbIRMX0se1U3uMuFRGUJp6i KLKBrno4oPzjz5Z5yumoR25IAW5FxRh1/e5D5vWhkPzhRQyO2b4dbuUyFTiuDMuEoTeg wkqaXieeQf6ydkT637Ono6ADWIxjutyNf3U5r7OLmGPvZimZxOot0gXujxGAU74WzcbJ R6sLDQVQnhB7ealVtEbnMRpH0objpvnmyqWzCkF5SWNYsUycf3wyAwctrmHZkDBl3bJz EY3Q==
X-Received: by 10.50.181.201 with SMTP id dy9mr9391782igc.18.1361380920495; Wed, 20 Feb 2013 09:22:00 -0800 (PST)
MIME-Version: 1.0
Received: by 10.64.63.11 with HTTP; Wed, 20 Feb 2013 09:21:30 -0800 (PST)
In-Reply-To: <4E1F6AAD24975D4BA5B16804296739436747AD87@TK5EX14MBXC284.redmond.corp.microsoft.com>
References: <20130215215423.23019.50224.idtracker@ietfa.amsl.com> <B33BFB58CCC8BE4998958016839DE27E06894B4F@IMCMBX01.MITRE.ORG> <CABzCy2CgnAtPrTY37H6vO-+5u3tRmsm+1j86r3w046AhHnNdfw@mail.gmail.com> <4E1F6AAD24975D4BA5B16804296739436747A665@TK5EX14MBXC284.redmond.corp.microsoft.com> <63255CDA-E93F-4414-B471-B373C4B6F65E@ve7jtb.com> <CA+ZpN278s7BRuUV31PzqL9fEK+3rKT6UiQiwmv_pfbK91g+yQg@mail.gmail.com> <CABzCy2AYnfxfJ3w6sBWw69LxaHCrJB-GyrT+-G8Ufx4-CQ6gTQ@mail.gmail.com> <4E1F6AAD24975D4BA5B16804296739436747AD87@TK5EX14MBXC284.redmond.corp.microsoft.com>
From: Tim Bray <twbray@google.com>
Date: Wed, 20 Feb 2013 09:21:30 -0800
Message-ID: <CA+ZpN24ot=6Rp663KtA0inc1eSKyfQ1sQ1b+NDNPCg3vu7OL_g@mail.gmail.com>
To: Mike Jones <Michael.Jones@microsoft.com>
Content-Type: multipart/alternative; boundary=14dae934096f2b8d9e04d62b320f
X-Gm-Message-State: ALoCoQlYosDhqN5EDLsJx4v6F3oN/wDY/TJHY4vVDowwvSNmC7ZE0wYQqqvG3zUxlaFpRdyDGw6wS75+to+xY8kVVheYkZQ1KHnKLQCBI+anjj+gx7fbLcchzCtSir8ytKkJBfhRXnt0x68s8m/vhQM8WG5gkE0ofyJBedhIp/nchwoUfzcwkxp/k6654S5Ky8142muTTlu7
Cc: "<oauth@ietf.org>" <oauth@ietf.org>
Subject: Re: [OAUTH-WG] I-D Action: draft-ietf-oauth-dyn-reg-06.txt
X-BeenThere: oauth@ietf.org
X-Mailman-Version: 2.1.12
Precedence: list
List-Id: OAUTH WG <oauth.ietf.org>
List-Unsubscribe: <https://www.ietf.org/mailman/options/oauth>, <mailto:oauth-request@ietf.org?subject=unsubscribe>
List-Archive: <http://www.ietf.org/mail-archive/web/oauth>
List-Post: <mailto:oauth@ietf.org>
List-Help: <mailto:oauth-request@ietf.org?subject=help>
List-Subscribe: <https://www.ietf.org/mailman/listinfo/oauth>, <mailto:oauth-request@ietf.org?subject=subscribe>
X-List-Received-Date: Wed, 20 Feb 2013 17:22:20 -0000

--14dae934096f2b8d9e04d62b320f
Content-Type: text/plain; charset=UTF-8
Content-Transfer-Encoding: quoted-printable

Yes, =E2=80=9CURL=E2=80=9D is strongly and clearly deprecated in RFC3986 se=
ction 1.1.3; one
of the reasons is that the distinction between =E2=80=9Clocator=E2=80=9D an=
d =E2=80=9Cidentifier=E2=80=9D
which sounds like it should be easy, turns out to lead to theological
bikeshed discussions almost inevitably, and in fact be shaky in practice.
 -T

On Wed, Feb 20, 2013 at 9:00 AM, Mike Jones <Michael.Jones@microsoft.com>wr=
ote:

>  Tim, as background, this came from the OpenID Connect specs, where we
> tried to consistently use the convention that the locator for any resourc=
e
> that can be retrieved from the specified location be called a URL, wherea=
s
> any identifier that may not be retrievable is called a URI.  That was don=
e
> as an aid to developer understanding of the specifications.****
>
> ** **
>
> If the use of =E2=80=9CURL=E2=80=9D is deprecated by the IETF in favor of=
 always just
> using =E2=80=9CURI=E2=80=9D, I suppose we could change that, but if it=E2=
=80=99s going to change,
> it should be soon.****
>
> ** **
>
>                                                             -- Mike****
>
> ** **
>
> ** **
>
> *From:* oauth-bounces@ietf.org [mailto:oauth-bounces@ietf.org] *On Behalf
> Of *Nat Sakimura
> *Sent:* Wednesday, February 20, 2013 8:57 AM
> *To:* Tim Bray
> *Cc:* <oauth@ietf.org>
> *Subject:* Re: [OAUTH-WG] I-D Action: draft-ietf-oauth-dyn-reg-06.txt****
>
> ** **
>
> You are right. I am in the camp recommending the use of URL when it is a
> concrete endpoint and URI when it includes something that is only abstrac=
t,
> but since OAuth standardized on "uri", we may as well do so here. ****
>
> ** **
>
> Nat****
>
> 2013/2/20 Tim Bray <twbray@google.com>****
>
> In OAuth, we have redirect_uri not redirect_url; should this be
> registration_access_uri for consistency? -T****
>
> ** **
>
> On Wed, Feb 20, 2013 at 8:23 AM, John Bradley <ve7jtb@ve7jtb.com> wrote:*=
*
> **
>
> I think registration_access_url is OK.    I haven't heard any better name=
s
> yet.****
>
> ** **
>
> John B.****
>
> ** **
>
> On 2013-02-20, at 1:04 PM, Mike Jones <Michael.Jones@microsoft.com> wrote=
:
> ****
>
>
>
> ****
>
> For what it=E2=80=99s worth, the name =E2=80=9Cregistration_access_url=E2=
=80=9D was chosen to be
> parallel to =E2=80=9Cregistration_access_token=E2=80=9D.   It=E2=80=99s t=
he place you use the
> access token.  And it=E2=80=99s where you access an existing registration=
.  I=E2=80=99m
> against the name =E2=80=9Cclient_metadata_url=E2=80=9D because it=E2=80=
=99s not metadata you=E2=80=99re
> accessing =E2=80=93 it=E2=80=99s a registration you=E2=80=99re accessing.=
  For the same reason, I
> don=E2=80=99t think the name =E2=80=9Cclient_info_url=E2=80=9D gives peop=
le the right idea, because
> it doesn=E2=80=99t say anything it being the registration that you=E2=80=
=99re accessing.**
> **
>
>  ****
>
> If you really want us to change this, having read what=E2=80=99s above, I=
 could
> live with =E2=80=9Cclient_registration_url=E2=80=9D, but I don=E2=80=99t =
think a change is actually
> necessary.  (But if we are going to change it, let=E2=80=99s do it ASAP, =
before the
> OpenID Connect Implementer=E2=80=99s Drafts are published.)****
>
>  ****
>
>                                                             -- Mike****
>
>  ****
>
> *From:* oauth-bounces@ietf.org [mailto:oauth-bounces@ietf.org] *On Behalf
> Of *Nat Sakimura
> *Sent:* Wednesday, February 20, 2013 7:58 AM
> *To:* <oauth@ietf.org>; Richer, Justin P.; John Bradley
> *Subject:* Re: [OAUTH-WG] I-D Action: draft-ietf-oauth-dyn-reg-06.txt****
>
>  ****
>
> Thanks Justin.
>
> Even if we go flat rather than doing JSON Structure, the "Client
> Registration Access Endpoint" is not a good representative name.
>
> What it represents is the client metadata/info.
> It is not representing "Client Registration Access". ****
>
> What does "Client Registration Access" mean? ****
>
> Does UPDATing "Cleint Registration Access" make sense?
>
> Something in the line of "Client Metadata Endpoint" and
> something like "client_metadata_url" or "client_info_url" is much better.
>
> Nat****
>
> 2013/2/15 Richer, Justin P. <jricher@mitre.org>****
>
> Everyone, there's a new draft of DynReg up on the tracker. This draft
> tries to codify the discussions so far from this week into something we c=
an
> all read. There are still plenty of open discussion points and items up f=
or
> debate. Please read through this latest draft and see what's changed and
> help assure that it properly captures the conversations. If you have any
> inputs for the marked [[ Editor's Note ]] sections, please send them to t=
he
> list by next Thursday to give me opportunity to get any necessary changes
> in by the cutoff date of Monday the 22nd.
>
> Thanks for all of your hard work everyone, I think this is *really* comin=
g
> along now.
>
>  -- Justin****
>
>
> On Feb 15, 2013, at 4:54 PM, internet-drafts@ietf.org wrote:
>
> >
> > A New Internet-Draft is available from the on-line Internet-Drafts
> directories.
> > This draft is a work item of the Web Authorization Protocol Working
> Group of the IETF.
> >
> >       Title           : OAuth Dynamic Client Registration Protocol
> >       Author(s)       : Justin Richer
> >                          John Bradley
> >                          Michael B. Jones
> >                          Maciej Machulak
> >       Filename        : draft-ietf-oauth-dyn-reg-06.txt
> >       Pages           : 21
> >       Date            : 2013-02-15
> >
> > Abstract:
> >   This specification defines an endpoint and protocol for dynamic
> >   registration of OAuth Clients at an Authorization Server.
> >
> >
> > The IETF datatracker status page for this draft is:
> > https://datatracker.ietf.org/doc/draft-ietf-oauth-dyn-reg
> >
> > There's also a htmlized version available at:
> > http://tools.ietf.org/html/draft-ietf-oauth-dyn-reg-06
> >
> > A diff from the previous version is available at:
> > http://www.ietf.org/rfcdiff?url2=3Ddraft-ietf-oauth-dyn-reg-06
> >
> >
> > Internet-Drafts are also available by anonymous FTP at:
> > ftp://ftp.ietf.org/internet-drafts/
> >
> > _______________________________________________
> > OAuth mailing list
> > OAuth@ietf.org
> > https://www.ietf.org/mailman/listinfo/oauth
>
> _______________________________________________
> OAuth mailing list
> OAuth@ietf.org
> https://www.ietf.org/mailman/listinfo/oauth****
>
>
>
> ****
>
>  ****
>
> --
> Nat Sakimura (=3Dnat)****
>
> Chairman, OpenID Foundation
> http://nat.sakimura.org/
> @_nat_en****
>
> ** **
>
>
> _______________________________________________
> OAuth mailing list
> OAuth@ietf.org
> https://www.ietf.org/mailman/listinfo/oauth****
>
> ** **
>
>
> _______________________________________________
> OAuth mailing list
> OAuth@ietf.org
> https://www.ietf.org/mailman/listinfo/oauth****
>
>
>
> ****
>
> ** **
>
> --
> Nat Sakimura (=3Dnat)****
>
> Chairman, OpenID Foundation
> http://nat.sakimura.org/
> @_nat_en****
>

--14dae934096f2b8d9e04d62b320f
Content-Type: text/html; charset=UTF-8
Content-Transfer-Encoding: quoted-printable

Yes, =E2=80=9CURL=E2=80=9D is strongly and clearly deprecated in RFC3986 se=
ction 1.1.3; one of the reasons is that the distinction between =E2=80=9Clo=
cator=E2=80=9D and =E2=80=9Cidentifier=E2=80=9D which sounds like it should=
 be easy, turns out to lead to theological bikeshed discussions almost inev=
itably, and in fact be shaky in practice. =C2=A0-T<br>

<br><div class=3D"gmail_quote">On Wed, Feb 20, 2013 at 9:00 AM, Mike Jones =
<span dir=3D"ltr">&lt;<a href=3D"mailto:Michael.Jones@microsoft.com" target=
=3D"_blank">Michael.Jones@microsoft.com</a>&gt;</span> wrote:<br><blockquot=
e class=3D"gmail_quote" style=3D"margin:0 0 0 .8ex;border-left:1px #ccc sol=
id;padding-left:1ex">







<div lang=3D"EN-US" link=3D"blue" vlink=3D"purple">
<div>
<p class=3D"MsoNormal"><span style=3D"font-size:11.0pt;font-family:&quot;Ca=
libri&quot;,&quot;sans-serif&quot;;color:#1f497d">Tim, as background, this =
came from the OpenID Connect specs, where we tried to consistently use the =
convention that the locator for any resource that can be
 retrieved from the specified location be called a URL, whereas any identif=
ier that may not be retrievable is called a URI.=C2=A0 That was done as an =
aid to developer understanding of the specifications.<u></u><u></u></span><=
/p>


<p class=3D"MsoNormal"><span style=3D"font-size:11.0pt;font-family:&quot;Ca=
libri&quot;,&quot;sans-serif&quot;;color:#1f497d"><u></u>=C2=A0<u></u></spa=
n></p>
<p class=3D"MsoNormal"><span style=3D"font-size:11.0pt;font-family:&quot;Ca=
libri&quot;,&quot;sans-serif&quot;;color:#1f497d">If the use of =E2=80=9CUR=
L=E2=80=9D is deprecated by the IETF in favor of always just using =E2=80=
=9CURI=E2=80=9D, I suppose we could change that, but if it=E2=80=99s going =
to change, it should be
 soon.<u></u><u></u></span></p>
<p class=3D"MsoNormal"><span style=3D"font-size:11.0pt;font-family:&quot;Ca=
libri&quot;,&quot;sans-serif&quot;;color:#1f497d"><u></u>=C2=A0<u></u></spa=
n></p>
<p class=3D"MsoNormal"><span style=3D"font-size:11.0pt;font-family:&quot;Ca=
libri&quot;,&quot;sans-serif&quot;;color:#1f497d">=C2=A0=C2=A0=C2=A0=C2=A0=
=C2=A0=C2=A0=C2=A0=C2=A0=C2=A0=C2=A0=C2=A0=C2=A0=C2=A0=C2=A0=C2=A0=C2=A0=C2=
=A0=C2=A0=C2=A0=C2=A0=C2=A0=C2=A0=C2=A0=C2=A0=C2=A0=C2=A0=C2=A0=C2=A0=C2=A0=
=C2=A0=C2=A0=C2=A0=C2=A0=C2=A0=C2=A0=C2=A0=C2=A0=C2=A0=C2=A0=C2=A0=C2=A0=C2=
=A0=C2=A0=C2=A0=C2=A0=C2=A0=C2=A0=C2=A0=C2=A0=C2=A0=C2=A0=C2=A0=C2=A0=C2=A0=
=C2=A0=C2=A0=C2=A0=C2=A0=C2=A0 -- Mike<u></u><u></u></span></p>
<p class=3D"MsoNormal"><span style=3D"font-size:11.0pt;font-family:&quot;Ca=
libri&quot;,&quot;sans-serif&quot;;color:#1f497d"><u></u>=C2=A0<u></u></spa=
n></p>
<p class=3D"MsoNormal"><span style=3D"font-size:11.0pt;font-family:&quot;Ca=
libri&quot;,&quot;sans-serif&quot;;color:#1f497d"><u></u>=C2=A0<u></u></spa=
n></p>
<p class=3D"MsoNormal"><b><span style=3D"font-size:10.0pt;font-family:&quot=
;Tahoma&quot;,&quot;sans-serif&quot;">From:</span></b><span style=3D"font-s=
ize:10.0pt;font-family:&quot;Tahoma&quot;,&quot;sans-serif&quot;"> <a href=
=3D"mailto:oauth-bounces@ietf.org" target=3D"_blank">oauth-bounces@ietf.org=
</a> [mailto:<a href=3D"mailto:oauth-bounces@ietf.org" target=3D"_blank">oa=
uth-bounces@ietf.org</a>]
<b>On Behalf Of </b>Nat Sakimura<br>
<b>Sent:</b> Wednesday, February 20, 2013 8:57 AM<br>
<b>To:</b> Tim Bray<br>
<b>Cc:</b> &lt;<a href=3D"mailto:oauth@ietf.org" target=3D"_blank">oauth@ie=
tf.org</a>&gt;<br>
<b>Subject:</b> Re: [OAUTH-WG] I-D Action: draft-ietf-oauth-dyn-reg-06.txt<=
u></u><u></u></span></p>
<p class=3D"MsoNormal"><u></u>=C2=A0<u></u></p>
<p class=3D"MsoNormal">You are right. I am in the camp recommending the use=
 of URL when it is a concrete endpoint and URI when it includes something t=
hat is only abstract, but since OAuth standardized on &quot;uri&quot;, we m=
ay as well do so here.=C2=A0<u></u><u></u></p>


<div>
<p class=3D"MsoNormal"><u></u>=C2=A0<u></u></p>
</div>
<div>
<p class=3D"MsoNormal" style=3D"margin-bottom:12.0pt">Nat<u></u><u></u></p>
<div>
<p class=3D"MsoNormal">2013/2/20 Tim Bray &lt;<a href=3D"mailto:twbray@goog=
le.com" target=3D"_blank">twbray@google.com</a>&gt;<u></u><u></u></p>
<p class=3D"MsoNormal">In OAuth, we have redirect_uri not redirect_url; sho=
uld this be registration_access_uri for consistency? -T<u></u><u></u></p>
<div>
<div>
<p class=3D"MsoNormal" style=3D"margin-bottom:12.0pt"><u></u>=C2=A0<u></u><=
/p>
<div>
<p class=3D"MsoNormal">On Wed, Feb 20, 2013 at 8:23 AM, John Bradley &lt;<a=
 href=3D"mailto:ve7jtb@ve7jtb.com" target=3D"_blank">ve7jtb@ve7jtb.com</a>&=
gt; wrote:<u></u><u></u></p>
<div>
<p class=3D"MsoNormal">I think registration_access_url is OK. =C2=A0 =C2=A0=
I haven&#39;t heard any better names yet.<u></u><u></u></p>
<div>
<p class=3D"MsoNormal"><u></u>=C2=A0<u></u></p>
</div>
<div>
<p class=3D"MsoNormal">John B.<u></u><u></u></p>
<div>
<div>
<p class=3D"MsoNormal"><u></u>=C2=A0<u></u></p>
<div>
<div>
<p class=3D"MsoNormal">On 2013-02-20, at 1:04 PM, Mike Jones &lt;<a href=3D=
"mailto:Michael.Jones@microsoft.com" target=3D"_blank">Michael.Jones@micros=
oft.com</a>&gt; wrote:<u></u><u></u></p>
</div>
<p class=3D"MsoNormal"><br>
<br>
<u></u><u></u></p>
<div>
<div>
<div>
<p class=3D"MsoNormal"><span style=3D"font-size:11.0pt;font-family:&quot;Ca=
libri&quot;,&quot;sans-serif&quot;;color:#1f497d">For what it=E2=80=99s wor=
th, the name =E2=80=9Cregistration_access_url=E2=80=9D was chosen to be par=
allel to =E2=80=9Cregistration_access_token=E2=80=9D.=C2=A0=C2=A0 It=E2=80=
=99s the place you use the access token.=C2=A0
 And it=E2=80=99s where you access an existing registration.=C2=A0 I=E2=80=
=99m against the name =E2=80=9Cclient_metadata_url=E2=80=9D because it=E2=
=80=99s not metadata you=E2=80=99re accessing =E2=80=93 it=E2=80=99s a regi=
stration you=E2=80=99re accessing.=C2=A0 For the same reason, I don=E2=80=
=99t think the name =E2=80=9Cclient_info_url=E2=80=9D gives people the
 right idea, because it doesn=E2=80=99t say anything it being the registrat=
ion that you=E2=80=99re accessing.</span><u></u><u></u></p>
</div>
<div>
<p class=3D"MsoNormal"><span style=3D"font-size:11.0pt;font-family:&quot;Ca=
libri&quot;,&quot;sans-serif&quot;;color:#1f497d">=C2=A0</span><u></u><u></=
u></p>
</div>
<div>
<p class=3D"MsoNormal"><span style=3D"font-size:11.0pt;font-family:&quot;Ca=
libri&quot;,&quot;sans-serif&quot;;color:#1f497d">If you really want us to =
change this, having read what=E2=80=99s above, I could live with =E2=80=9Cc=
lient_registration_url=E2=80=9D, but I don=E2=80=99t think a change is actu=
ally necessary.=C2=A0
 (But if we are going to change it, let=E2=80=99s do it ASAP, before the Op=
enID Connect Implementer=E2=80=99s Drafts are published.)</span><u></u><u><=
/u></p>
</div>
<div>
<p class=3D"MsoNormal"><span style=3D"font-size:11.0pt;font-family:&quot;Ca=
libri&quot;,&quot;sans-serif&quot;;color:#1f497d">=C2=A0</span><u></u><u></=
u></p>
</div>
<div>
<p class=3D"MsoNormal"><span style=3D"font-size:11.0pt;font-family:&quot;Ca=
libri&quot;,&quot;sans-serif&quot;;color:#1f497d">=C2=A0=C2=A0=C2=A0=C2=A0=
=C2=A0=C2=A0=C2=A0=C2=A0=C2=A0=C2=A0=C2=A0=C2=A0=C2=A0=C2=A0=C2=A0=C2=A0=C2=
=A0=C2=A0=C2=A0=C2=A0=C2=A0=C2=A0=C2=A0=C2=A0=C2=A0=C2=A0=C2=A0=C2=A0=C2=A0=
=C2=A0=C2=A0=C2=A0=C2=A0=C2=A0=C2=A0=C2=A0=C2=A0=C2=A0=C2=A0=C2=A0=C2=A0=C2=
=A0=C2=A0=C2=A0=C2=A0=C2=A0=C2=A0=C2=A0=C2=A0=C2=A0=C2=A0=C2=A0=C2=A0=C2=A0=
=C2=A0=C2=A0=C2=A0=C2=A0=C2=A0 -- Mike</span><u></u><u></u></p>
</div>
<div>
<p class=3D"MsoNormal"><span style=3D"font-size:11.0pt;font-family:&quot;Ca=
libri&quot;,&quot;sans-serif&quot;;color:#1f497d">=C2=A0</span><u></u><u></=
u></p>
</div>
<div>
<p class=3D"MsoNormal"><b><span style=3D"font-size:10.0pt;font-family:&quot=
;Tahoma&quot;,&quot;sans-serif&quot;">From:</span></b><span style=3D"font-s=
ize:10.0pt;font-family:&quot;Tahoma&quot;,&quot;sans-serif&quot;">=C2=A0<a =
href=3D"mailto:oauth-bounces@ietf.org" target=3D"_blank">oauth-bounces@ietf=
.org</a> [mailto:<a href=3D"mailto:oauth-" target=3D"_blank">oauth-</a><a h=
ref=3D"mailto:bounces@ietf.org" target=3D"_blank">bounces@ietf.org</a>]=C2=
=A0<b>On
 Behalf Of=C2=A0</b>Nat Sakimura<br>
<b>Sent:</b>=C2=A0Wednesday, February 20, 2013 7:58 AM<br>
<b>To:</b>=C2=A0&lt;<a href=3D"mailto:oauth@ietf.org" target=3D"_blank">oau=
th@ietf.org</a>&gt;; Richer, Justin P.; John Bradley<br>
<b>Subject:</b>=C2=A0Re: [OAUTH-WG] I-D Action: draft-ietf-oauth-dyn-reg-06=
.txt</span><u></u><u></u></p>
</div>
<div>
<p class=3D"MsoNormal">=C2=A0<u></u><u></u></p>
</div>
<div>
<p class=3D"MsoNormal"><span style=3D"font-size:13.5pt;font-family:&quot;Ar=
ial&quot;,&quot;sans-serif&quot;;color:#222222">Thanks Justin.<br>
<br>
Even if we go flat rather than doing JSON Structure, the &quot;Client<br>
Registration Access Endpoint&quot; is not a good representative name.<br>
<br>
What it represents is the client metadata/info.<br>
It is not representing &quot;Client Registration Access&quot;.=C2=A0</span>=
<u></u><u></u></p>
</div>
<div>
<div>
<p class=3D"MsoNormal">What does &quot;Client Registration Access&quot; mea=
n?=C2=A0<u></u><u></u></p>
</div>
</div>
<div>
<p class=3D"MsoNormal" style=3D"margin-bottom:12.0pt"><span style=3D"font-s=
ize:13.5pt;font-family:&quot;Arial&quot;,&quot;sans-serif&quot;;color:#2222=
22">Does UPDATing &quot;Cleint Registration Access&quot; make sense?</span>=
<br>


<span style=3D"font-size:13.5pt;font-family:&quot;Arial&quot;,&quot;sans-se=
rif&quot;;color:#222222"><br>
Something in the line of &quot;Client Metadata Endpoint&quot; and<br>
something like &quot;client_metadata_url&quot; or=C2=A0&quot;client_info_ur=
l&quot; is much better.<br>
<br>
Nat</span><u></u><u></u></p>
<div>
<div>
<p class=3D"MsoNormal">2013/2/15 Richer, Justin P. &lt;<a href=3D"mailto:jr=
icher@mitre.org" target=3D"_blank"><span style=3D"color:purple">jricher@mit=
re.org</span></a>&gt;<u></u><u></u></p>
</div>
<div>
<p class=3D"MsoNormal">Everyone, there&#39;s a new draft of DynReg up on th=
e tracker. This draft tries to codify the discussions so far from this week=
 into something we can all read. There are still plenty of open discussion =
points and items up for debate. Please
 read through this latest draft and see what&#39;s changed and help assure =
that it properly captures the conversations. If you have any inputs for the=
 marked [[ Editor&#39;s Note ]] sections, please send them to the list by n=
ext Thursday to give me opportunity to get
 any necessary changes in by the cutoff date of Monday the 22nd.<br>
<br>
Thanks for all of your hard work everyone, I think this is *really* coming =
along now.<br>
<span style=3D"color:#888888"><br>
=C2=A0-- Justin</span><u></u><u></u></p>
</div>
<div>
<div>
<p class=3D"MsoNormal"><br>
On Feb 15, 2013, at 4:54 PM,=C2=A0<a href=3D"mailto:internet-drafts@ietf.or=
g" target=3D"_blank"><span style=3D"color:purple">internet-drafts@ietf.org<=
/span></a>=C2=A0wrote:<br>
<br>
&gt;<br>
&gt; A New Internet-Draft is available from the on-line Internet-Drafts dir=
ectories.<br>
&gt; This draft is a work item of the Web Authorization Protocol Working Gr=
oup of the IETF.<br>
&gt;<br>
&gt; =C2=A0 =C2=A0 =C2=A0 Title =C2=A0 =C2=A0 =C2=A0 =C2=A0 =C2=A0 : OAuth =
Dynamic Client Registration Protocol<br>
&gt; =C2=A0 =C2=A0 =C2=A0 Author(s) =C2=A0 =C2=A0 =C2=A0 : Justin Richer<br=
>
&gt; =C2=A0 =C2=A0 =C2=A0 =C2=A0 =C2=A0 =C2=A0 =C2=A0 =C2=A0 =C2=A0 =C2=A0 =
=C2=A0 =C2=A0 =C2=A0John Bradley<br>
&gt; =C2=A0 =C2=A0 =C2=A0 =C2=A0 =C2=A0 =C2=A0 =C2=A0 =C2=A0 =C2=A0 =C2=A0 =
=C2=A0 =C2=A0 =C2=A0Michael B. Jones<br>
&gt; =C2=A0 =C2=A0 =C2=A0 =C2=A0 =C2=A0 =C2=A0 =C2=A0 =C2=A0 =C2=A0 =C2=A0 =
=C2=A0 =C2=A0 =C2=A0Maciej Machulak<br>
&gt; =C2=A0 =C2=A0 =C2=A0 Filename =C2=A0 =C2=A0 =C2=A0 =C2=A0: draft-ietf-=
oauth-dyn-reg-06.txt<br>
&gt; =C2=A0 =C2=A0 =C2=A0 Pages =C2=A0 =C2=A0 =C2=A0 =C2=A0 =C2=A0 : 21<br>
&gt; =C2=A0 =C2=A0 =C2=A0 Date =C2=A0 =C2=A0 =C2=A0 =C2=A0 =C2=A0 =C2=A0: 2=
013-02-15<br>
&gt;<br>
&gt; Abstract:<br>
&gt; =C2=A0 This specification defines an endpoint and protocol for dynamic=
<br>
&gt; =C2=A0 registration of OAuth Clients at an Authorization Server.<br>
&gt;<br>
&gt;<br>
&gt; The IETF datatracker status page for this draft is:<br>
&gt;=C2=A0<a href=3D"https://datatracker.ietf.org/doc/draft-ietf-oauth-dyn-=
reg" target=3D"_blank"><span style=3D"color:purple">https://datatracker.iet=
f.org/doc/draft-ietf-oauth-dyn-reg</span></a><br>
&gt;<br>
&gt; There&#39;s also a htmlized version available at:<br>
&gt;=C2=A0<a href=3D"http://tools.ietf.org/html/draft-ietf-oauth-dyn-reg-06=
" target=3D"_blank"><span style=3D"color:purple">http://tools.ietf.org/html=
/draft-ietf-oauth-dyn-reg-06</span></a><br>
&gt;<br>
&gt; A diff from the previous version is available at:<br>
&gt;=C2=A0<a href=3D"http://www.ietf.org/rfcdiff?url2=3Ddraft-ietf-oauth-dy=
n-reg-06" target=3D"_blank"><span style=3D"color:purple">http://www.ietf.or=
g/rfcdiff?url2=3Ddraft-ietf-oauth-dyn-reg-06</span></a><br>
&gt;<br>
&gt;<br>
&gt; Internet-Drafts are also available by anonymous FTP at:<br>
&gt;=C2=A0<a href=3D"ftp://ftp.ietf.org/internet-drafts/" target=3D"_blank"=
><span style=3D"color:purple">ftp://ftp.ietf.org/internet-drafts/</span></a=
><br>
&gt;<br>
&gt; _______________________________________________<br>
&gt; OAuth mailing list<br>
&gt;=C2=A0<a href=3D"mailto:OAuth@ietf.org" target=3D"_blank"><span style=
=3D"color:purple">OAuth@ietf.org</span></a><br>
&gt;=C2=A0<a href=3D"https://www.ietf.org/mailman/listinfo/oauth" target=3D=
"_blank"><span style=3D"color:purple">https://www.ietf.org/mailman/listinfo=
/oauth</span></a><br>
<br>
_______________________________________________<br>
OAuth mailing list<br>
<a href=3D"mailto:OAuth@ietf.org" target=3D"_blank"><span style=3D"color:pu=
rple">OAuth@ietf.org</span></a><br>
<a href=3D"https://www.ietf.org/mailman/listinfo/oauth" target=3D"_blank"><=
span style=3D"color:purple">https://www.ietf.org/mailman/listinfo/oauth</sp=
an></a><u></u><u></u></p>
</div>
</div>
</div>
<div>
<p class=3D"MsoNormal"><br>
<br clear=3D"all">
<u></u><u></u></p>
</div>
<div>
<div>
<p class=3D"MsoNormal">=C2=A0<u></u><u></u></p>
</div>
</div>
<div>
<p class=3D"MsoNormal">--=C2=A0<br>
Nat Sakimura (=3Dnat)<u></u><u></u></p>
</div>
<div>
<div>
<p class=3D"MsoNormal">Chairman, OpenID Foundation<br>
<a href=3D"http://nat.sakimura.org/" target=3D"_blank"><span style=3D"color=
:purple">http://nat.sakimura.org/</span></a><br>
@_nat_en<u></u><u></u></p>
</div>
</div>
</div>
</div>
</div>
</div>
<p class=3D"MsoNormal"><u></u>=C2=A0<u></u></p>
</div>
</div>
</div>
</div>
<p class=3D"MsoNormal" style=3D"margin-bottom:12.0pt"><br>
_______________________________________________<br>
OAuth mailing list<br>
<a href=3D"mailto:OAuth@ietf.org" target=3D"_blank">OAuth@ietf.org</a><br>
<a href=3D"https://www.ietf.org/mailman/listinfo/oauth" target=3D"_blank">h=
ttps://www.ietf.org/mailman/listinfo/oauth</a><u></u><u></u></p>
</div>
<p class=3D"MsoNormal"><u></u>=C2=A0<u></u></p>
</div>
</div>
<p class=3D"MsoNormal" style=3D"margin-bottom:12.0pt"><br>
_______________________________________________<br>
OAuth mailing list<br>
<a href=3D"mailto:OAuth@ietf.org" target=3D"_blank">OAuth@ietf.org</a><br>
<a href=3D"https://www.ietf.org/mailman/listinfo/oauth" target=3D"_blank">h=
ttps://www.ietf.org/mailman/listinfo/oauth</a><span class=3D"HOEnZb"><font =
color=3D"#888888"><u></u><u></u></font></span></p><span class=3D"HOEnZb"><f=
ont color=3D"#888888">
</font></span></div><span class=3D"HOEnZb"><font color=3D"#888888">
<p class=3D"MsoNormal"><br>
<br clear=3D"all">
<u></u><u></u></p>
<div>
<p class=3D"MsoNormal"><u></u>=C2=A0<u></u></p>
</div>
<p class=3D"MsoNormal">-- <br>
Nat Sakimura (=3Dnat)<u></u><u></u></p>
<div>
<p class=3D"MsoNormal">Chairman, OpenID Foundation<br>
<a href=3D"http://nat.sakimura.org/" target=3D"_blank">http://nat.sakimura.=
org/</a><br>
@_nat_en<u></u><u></u></p>
</div>
</font></span></div>
</div>
</div>

</blockquote></div><br>

--14dae934096f2b8d9e04d62b320f--

From Michael.Jones@microsoft.com  Wed Feb 20 09:58:19 2013
Return-Path: <Michael.Jones@microsoft.com>
X-Original-To: oauth@ietfa.amsl.com
Delivered-To: oauth@ietfa.amsl.com
Received: from localhost (localhost [127.0.0.1]) by ietfa.amsl.com (Postfix) with ESMTP id 0687321F8681 for <oauth@ietfa.amsl.com>; Wed, 20 Feb 2013 09:58:19 -0800 (PST)
X-Virus-Scanned: amavisd-new at amsl.com
X-Spam-Flag: NO
X-Spam-Score: -2.584
X-Spam-Level: 
X-Spam-Status: No, score=-2.584 tagged_above=-999 required=5 tests=[AWL=0.014,  BAYES_00=-2.599, HTML_MESSAGE=0.001]
Received: from mail.ietf.org ([64.170.98.30]) by localhost (ietfa.amsl.com [127.0.0.1]) (amavisd-new, port 10024) with ESMTP id 1q0ohMb-ZibB for <oauth@ietfa.amsl.com>; Wed, 20 Feb 2013 09:58:16 -0800 (PST)
Received: from na01-by2-obe.outbound.protection.outlook.com (na01-by2-obe.ptr.protection.outlook.com [207.46.100.24]) by ietfa.amsl.com (Postfix) with ESMTP id 35E8D21F8473 for <oauth@ietf.org>; Wed, 20 Feb 2013 09:58:15 -0800 (PST)
Received: from BY2FFO11FD013.protection.gbl (10.1.15.204) by BY2FFO11HUB011.protection.gbl (10.1.14.82) with Microsoft SMTP Server (TLS) id 15.0.620.12; Wed, 20 Feb 2013 17:58:12 +0000
Received: from TK5EX14HUBC105.redmond.corp.microsoft.com (131.107.125.37) by BY2FFO11FD013.mail.protection.outlook.com (10.1.14.75) with Microsoft SMTP Server (TLS) id 15.0.620.12 via Frontend Transport; Wed, 20 Feb 2013 17:58:12 +0000
Received: from TK5EX14MBXC284.redmond.corp.microsoft.com ([169.254.1.96]) by TK5EX14HUBC105.redmond.corp.microsoft.com ([157.54.80.48]) with mapi id 14.02.0318.003; Wed, 20 Feb 2013 17:57:43 +0000
From: Mike Jones <Michael.Jones@microsoft.com>
To: Tim Bray <twbray@google.com>
Thread-Topic: [OAUTH-WG] I-D Action: draft-ietf-oauth-dyn-reg-06.txt
Thread-Index: AQHOC8cMkbohP5vU0EO7eTLi/U/hMJh7eCuAgAd2gACAAAA6MIAABsiAgAADAoCAAAZKgIAAAIEAgAAGaQCAAAoJgA==
Date: Wed, 20 Feb 2013 17:57:42 +0000
Message-ID: <4E1F6AAD24975D4BA5B16804296739436747B12D@TK5EX14MBXC284.redmond.corp.microsoft.com>
References: <20130215215423.23019.50224.idtracker@ietfa.amsl.com> <B33BFB58CCC8BE4998958016839DE27E06894B4F@IMCMBX01.MITRE.ORG> <CABzCy2CgnAtPrTY37H6vO-+5u3tRmsm+1j86r3w046AhHnNdfw@mail.gmail.com> <4E1F6AAD24975D4BA5B16804296739436747A665@TK5EX14MBXC284.redmond.corp.microsoft.com> <63255CDA-E93F-4414-B471-B373C4B6F65E@ve7jtb.com> <CA+ZpN278s7BRuUV31PzqL9fEK+3rKT6UiQiwmv_pfbK91g+yQg@mail.gmail.com> <CABzCy2AYnfxfJ3w6sBWw69LxaHCrJB-GyrT+-G8Ufx4-CQ6gTQ@mail.gmail.com> <4E1F6AAD24975D4BA5B16804296739436747AD87@TK5EX14MBXC284.redmond.corp.microsoft.com> <CA+ZpN24ot=6Rp663KtA0inc1eSKyfQ1sQ1b+NDNPCg3vu7OL_g@mail.gmail.com>
In-Reply-To: <CA+ZpN24ot=6Rp663KtA0inc1eSKyfQ1sQ1b+NDNPCg3vu7OL_g@mail.gmail.com>
Accept-Language: en-US
Content-Language: en-US
X-MS-Has-Attach: 
X-MS-TNEF-Correlator: 
x-originating-ip: [157.54.51.33]
Content-Type: multipart/alternative; boundary="_000_4E1F6AAD24975D4BA5B16804296739436747B12DTK5EX14MBXC284r_"
MIME-Version: 1.0
X-Forefront-Antispam-Report: CIP:131.107.125.37; CTRY:US; IPV:CAL; IPV:NLI; EFV:NLI; SFV:NSPM; SFS:(199002)(24454001)(65554002)(189002)(377454001)(479174001)(377424002)(69224001)(51704002)(51914002)(54356001)(15202345001)(47976001)(50986001)(59766001)(76482001)(512874001)(56816002)(33656001)(20776003)(16236675001)(80022001)(66066001)(55846006)(63696002)(51856001)(77982001)(79102001)(74662001)(54316002)(31966008)(74502001)(47446002)(44976002)(16406001)(46102001)(65816001)(53806001)(47736001)(5343655001)(5343635001)(56776001)(49866001)(4396001); DIR:OUT; SFP:; SCL:1; SRVR:BY2FFO11HUB011; H:TK5EX14HUBC105.redmond.corp.microsoft.com; RD:InfoDomainNonexistent; A:1; MX:1; LANG:en; 
X-OriginatorOrg: microsoft.onmicrosoft.com
X-Forefront-PRVS: 07630F72AD
Cc: "<oauth@ietf.org>" <oauth@ietf.org>
Subject: Re: [OAUTH-WG] I-D Action: draft-ietf-oauth-dyn-reg-06.txt
X-BeenThere: oauth@ietf.org
X-Mailman-Version: 2.1.12
Precedence: list
List-Id: OAUTH WG <oauth.ietf.org>
List-Unsubscribe: <https://www.ietf.org/mailman/options/oauth>, <mailto:oauth-request@ietf.org?subject=unsubscribe>
List-Archive: <http://www.ietf.org/mail-archive/web/oauth>
List-Post: <mailto:oauth@ietf.org>
List-Help: <mailto:oauth-request@ietf.org?subject=help>
List-Subscribe: <https://www.ietf.org/mailman/listinfo/oauth>, <mailto:oauth-request@ietf.org?subject=subscribe>
X-List-Received-Date: Wed, 20 Feb 2013 17:58:19 -0000

--_000_4E1F6AAD24975D4BA5B16804296739436747B12DTK5EX14MBXC284r_
Content-Type: text/plain; charset="utf-8"
Content-Transfer-Encoding: base64

T0ssIHdlIHNob3VsZCBtYWtlIHRoZSBjaGFuZ2UgdGhlbi4gIFRoYW5rcyBmb3IgdGhlIGlucHV0
Lg0KDQogICAgICAgICAgICAgICAgICAgICAgICAgICAgICAgICAgICAgICAgICAgICAgICAgICAg
ICAgICAgICAtLSBNaWtlDQoNCkZyb206IFRpbSBCcmF5IFttYWlsdG86dHdicmF5QGdvb2dsZS5j
b21dDQpTZW50OiBXZWRuZXNkYXksIEZlYnJ1YXJ5IDIwLCAyMDEzIDk6MjIgQU0NClRvOiBNaWtl
IEpvbmVzDQpDYzogTmF0IFNha2ltdXJhOyA8b2F1dGhAaWV0Zi5vcmc+DQpTdWJqZWN0OiBSZTog
W09BVVRILVdHXSBJLUQgQWN0aW9uOiBkcmFmdC1pZXRmLW9hdXRoLWR5bi1yZWctMDYudHh0DQoN
Clllcywg4oCcVVJM4oCdIGlzIHN0cm9uZ2x5IGFuZCBjbGVhcmx5IGRlcHJlY2F0ZWQgaW4gUkZD
Mzk4NiBzZWN0aW9uIDEuMS4zOyBvbmUgb2YgdGhlIHJlYXNvbnMgaXMgdGhhdCB0aGUgZGlzdGlu
Y3Rpb24gYmV0d2VlbiDigJxsb2NhdG9y4oCdIGFuZCDigJxpZGVudGlmaWVy4oCdIHdoaWNoIHNv
dW5kcyBsaWtlIGl0IHNob3VsZCBiZSBlYXN5LCB0dXJucyBvdXQgdG8gbGVhZCB0byB0aGVvbG9n
aWNhbCBiaWtlc2hlZCBkaXNjdXNzaW9ucyBhbG1vc3QgaW5ldml0YWJseSwgYW5kIGluIGZhY3Qg
YmUgc2hha3kgaW4gcHJhY3RpY2UuICAtVA0KT24gV2VkLCBGZWIgMjAsIDIwMTMgYXQgOTowMCBB
TSwgTWlrZSBKb25lcyA8TWljaGFlbC5Kb25lc0BtaWNyb3NvZnQuY29tPG1haWx0bzpNaWNoYWVs
LkpvbmVzQG1pY3Jvc29mdC5jb20+PiB3cm90ZToNClRpbSwgYXMgYmFja2dyb3VuZCwgdGhpcyBj
YW1lIGZyb20gdGhlIE9wZW5JRCBDb25uZWN0IHNwZWNzLCB3aGVyZSB3ZSB0cmllZCB0byBjb25z
aXN0ZW50bHkgdXNlIHRoZSBjb252ZW50aW9uIHRoYXQgdGhlIGxvY2F0b3IgZm9yIGFueSByZXNv
dXJjZSB0aGF0IGNhbiBiZSByZXRyaWV2ZWQgZnJvbSB0aGUgc3BlY2lmaWVkIGxvY2F0aW9uIGJl
IGNhbGxlZCBhIFVSTCwgd2hlcmVhcyBhbnkgaWRlbnRpZmllciB0aGF0IG1heSBub3QgYmUgcmV0
cmlldmFibGUgaXMgY2FsbGVkIGEgVVJJLiAgVGhhdCB3YXMgZG9uZSBhcyBhbiBhaWQgdG8gZGV2
ZWxvcGVyIHVuZGVyc3RhbmRpbmcgb2YgdGhlIHNwZWNpZmljYXRpb25zLg0KDQpJZiB0aGUgdXNl
IG9mIOKAnFVSTOKAnSBpcyBkZXByZWNhdGVkIGJ5IHRoZSBJRVRGIGluIGZhdm9yIG9mIGFsd2F5
cyBqdXN0IHVzaW5nIOKAnFVSSeKAnSwgSSBzdXBwb3NlIHdlIGNvdWxkIGNoYW5nZSB0aGF0LCBi
dXQgaWYgaXTigJlzIGdvaW5nIHRvIGNoYW5nZSwgaXQgc2hvdWxkIGJlIHNvb24uDQoNCiAgICAg
ICAgICAgICAgICAgICAgICAgICAgICAgICAgICAgICAgICAgICAgICAgICAgICAgICAgICAgIC0t
IE1pa2UNCg0KDQpGcm9tOiBvYXV0aC1ib3VuY2VzQGlldGYub3JnPG1haWx0bzpvYXV0aC1ib3Vu
Y2VzQGlldGYub3JnPiBbbWFpbHRvOm9hdXRoLWJvdW5jZXNAaWV0Zi5vcmc8bWFpbHRvOm9hdXRo
LWJvdW5jZXNAaWV0Zi5vcmc+XSBPbiBCZWhhbGYgT2YgTmF0IFNha2ltdXJhDQpTZW50OiBXZWRu
ZXNkYXksIEZlYnJ1YXJ5IDIwLCAyMDEzIDg6NTcgQU0NClRvOiBUaW0gQnJheQ0KQ2M6IDxvYXV0
aEBpZXRmLm9yZzxtYWlsdG86b2F1dGhAaWV0Zi5vcmc+Pg0KU3ViamVjdDogUmU6IFtPQVVUSC1X
R10gSS1EIEFjdGlvbjogZHJhZnQtaWV0Zi1vYXV0aC1keW4tcmVnLTA2LnR4dA0KDQpZb3UgYXJl
IHJpZ2h0LiBJIGFtIGluIHRoZSBjYW1wIHJlY29tbWVuZGluZyB0aGUgdXNlIG9mIFVSTCB3aGVu
IGl0IGlzIGEgY29uY3JldGUgZW5kcG9pbnQgYW5kIFVSSSB3aGVuIGl0IGluY2x1ZGVzIHNvbWV0
aGluZyB0aGF0IGlzIG9ubHkgYWJzdHJhY3QsIGJ1dCBzaW5jZSBPQXV0aCBzdGFuZGFyZGl6ZWQg
b24gInVyaSIsIHdlIG1heSBhcyB3ZWxsIGRvIHNvIGhlcmUuDQoNCk5hdA0KMjAxMy8yLzIwIFRp
bSBCcmF5IDx0d2JyYXlAZ29vZ2xlLmNvbTxtYWlsdG86dHdicmF5QGdvb2dsZS5jb20+Pg0KSW4g
T0F1dGgsIHdlIGhhdmUgcmVkaXJlY3RfdXJpIG5vdCByZWRpcmVjdF91cmw7IHNob3VsZCB0aGlz
IGJlIHJlZ2lzdHJhdGlvbl9hY2Nlc3NfdXJpIGZvciBjb25zaXN0ZW5jeT8gLVQNCg0KT24gV2Vk
LCBGZWIgMjAsIDIwMTMgYXQgODoyMyBBTSwgSm9obiBCcmFkbGV5IDx2ZTdqdGJAdmU3anRiLmNv
bTxtYWlsdG86dmU3anRiQHZlN2p0Yi5jb20+PiB3cm90ZToNCkkgdGhpbmsgcmVnaXN0cmF0aW9u
X2FjY2Vzc191cmwgaXMgT0suICAgIEkgaGF2ZW4ndCBoZWFyZCBhbnkgYmV0dGVyIG5hbWVzIHll
dC4NCg0KSm9obiBCLg0KDQpPbiAyMDEzLTAyLTIwLCBhdCAxOjA0IFBNLCBNaWtlIEpvbmVzIDxN
aWNoYWVsLkpvbmVzQG1pY3Jvc29mdC5jb208bWFpbHRvOk1pY2hhZWwuSm9uZXNAbWljcm9zb2Z0
LmNvbT4+IHdyb3RlOg0KDQpGb3Igd2hhdCBpdOKAmXMgd29ydGgsIHRoZSBuYW1lIOKAnHJlZ2lz
dHJhdGlvbl9hY2Nlc3NfdXJs4oCdIHdhcyBjaG9zZW4gdG8gYmUgcGFyYWxsZWwgdG8g4oCccmVn
aXN0cmF0aW9uX2FjY2Vzc190b2tlbuKAnS4gICBJdOKAmXMgdGhlIHBsYWNlIHlvdSB1c2UgdGhl
IGFjY2VzcyB0b2tlbi4gIEFuZCBpdOKAmXMgd2hlcmUgeW91IGFjY2VzcyBhbiBleGlzdGluZyBy
ZWdpc3RyYXRpb24uICBJ4oCZbSBhZ2FpbnN0IHRoZSBuYW1lIOKAnGNsaWVudF9tZXRhZGF0YV91
cmzigJ0gYmVjYXVzZSBpdOKAmXMgbm90IG1ldGFkYXRhIHlvdeKAmXJlIGFjY2Vzc2luZyDigJMg
aXTigJlzIGEgcmVnaXN0cmF0aW9uIHlvdeKAmXJlIGFjY2Vzc2luZy4gIEZvciB0aGUgc2FtZSBy
ZWFzb24sIEkgZG9u4oCZdCB0aGluayB0aGUgbmFtZSDigJxjbGllbnRfaW5mb191cmzigJ0gZ2l2
ZXMgcGVvcGxlIHRoZSByaWdodCBpZGVhLCBiZWNhdXNlIGl0IGRvZXNu4oCZdCBzYXkgYW55dGhp
bmcgaXQgYmVpbmcgdGhlIHJlZ2lzdHJhdGlvbiB0aGF0IHlvdeKAmXJlIGFjY2Vzc2luZy4NCg0K
SWYgeW91IHJlYWxseSB3YW50IHVzIHRvIGNoYW5nZSB0aGlzLCBoYXZpbmcgcmVhZCB3aGF04oCZ
cyBhYm92ZSwgSSBjb3VsZCBsaXZlIHdpdGgg4oCcY2xpZW50X3JlZ2lzdHJhdGlvbl91cmzigJ0s
IGJ1dCBJIGRvbuKAmXQgdGhpbmsgYSBjaGFuZ2UgaXMgYWN0dWFsbHkgbmVjZXNzYXJ5LiAgKEJ1
dCBpZiB3ZSBhcmUgZ29pbmcgdG8gY2hhbmdlIGl0LCBsZXTigJlzIGRvIGl0IEFTQVAsIGJlZm9y
ZSB0aGUgT3BlbklEIENvbm5lY3QgSW1wbGVtZW50ZXLigJlzIERyYWZ0cyBhcmUgcHVibGlzaGVk
LikNCg0KICAgICAgICAgICAgICAgICAgICAgICAgICAgICAgICAgICAgICAgICAgICAgICAgICAg
ICAgICAgICAgLS0gTWlrZQ0KDQpGcm9tOiBvYXV0aC1ib3VuY2VzQGlldGYub3JnPG1haWx0bzpv
YXV0aC1ib3VuY2VzQGlldGYub3JnPiBbbWFpbHRvOm9hdXRoLTxtYWlsdG86b2F1dGgtPmJvdW5j
ZXNAaWV0Zi5vcmc8bWFpbHRvOmJvdW5jZXNAaWV0Zi5vcmc+XSBPbiBCZWhhbGYgT2YgTmF0IFNh
a2ltdXJhDQpTZW50OiBXZWRuZXNkYXksIEZlYnJ1YXJ5IDIwLCAyMDEzIDc6NTggQU0NClRvOiA8
b2F1dGhAaWV0Zi5vcmc8bWFpbHRvOm9hdXRoQGlldGYub3JnPj47IFJpY2hlciwgSnVzdGluIFAu
OyBKb2huIEJyYWRsZXkNClN1YmplY3Q6IFJlOiBbT0FVVEgtV0ddIEktRCBBY3Rpb246IGRyYWZ0
LWlldGYtb2F1dGgtZHluLXJlZy0wNi50eHQNCg0KVGhhbmtzIEp1c3Rpbi4NCg0KRXZlbiBpZiB3
ZSBnbyBmbGF0IHJhdGhlciB0aGFuIGRvaW5nIEpTT04gU3RydWN0dXJlLCB0aGUgIkNsaWVudA0K
UmVnaXN0cmF0aW9uIEFjY2VzcyBFbmRwb2ludCIgaXMgbm90IGEgZ29vZCByZXByZXNlbnRhdGl2
ZSBuYW1lLg0KDQpXaGF0IGl0IHJlcHJlc2VudHMgaXMgdGhlIGNsaWVudCBtZXRhZGF0YS9pbmZv
Lg0KSXQgaXMgbm90IHJlcHJlc2VudGluZyAiQ2xpZW50IFJlZ2lzdHJhdGlvbiBBY2Nlc3MiLg0K
V2hhdCBkb2VzICJDbGllbnQgUmVnaXN0cmF0aW9uIEFjY2VzcyIgbWVhbj8NCkRvZXMgVVBEQVRp
bmcgIkNsZWludCBSZWdpc3RyYXRpb24gQWNjZXNzIiBtYWtlIHNlbnNlPw0KDQpTb21ldGhpbmcg
aW4gdGhlIGxpbmUgb2YgIkNsaWVudCBNZXRhZGF0YSBFbmRwb2ludCIgYW5kDQpzb21ldGhpbmcg
bGlrZSAiY2xpZW50X21ldGFkYXRhX3VybCIgb3IgImNsaWVudF9pbmZvX3VybCIgaXMgbXVjaCBi
ZXR0ZXIuDQoNCk5hdA0KMjAxMy8yLzE1IFJpY2hlciwgSnVzdGluIFAuIDxqcmljaGVyQG1pdHJl
Lm9yZzxtYWlsdG86anJpY2hlckBtaXRyZS5vcmc+Pg0KRXZlcnlvbmUsIHRoZXJlJ3MgYSBuZXcg
ZHJhZnQgb2YgRHluUmVnIHVwIG9uIHRoZSB0cmFja2VyLiBUaGlzIGRyYWZ0IHRyaWVzIHRvIGNv
ZGlmeSB0aGUgZGlzY3Vzc2lvbnMgc28gZmFyIGZyb20gdGhpcyB3ZWVrIGludG8gc29tZXRoaW5n
IHdlIGNhbiBhbGwgcmVhZC4gVGhlcmUgYXJlIHN0aWxsIHBsZW50eSBvZiBvcGVuIGRpc2N1c3Np
b24gcG9pbnRzIGFuZCBpdGVtcyB1cCBmb3IgZGViYXRlLiBQbGVhc2UgcmVhZCB0aHJvdWdoIHRo
aXMgbGF0ZXN0IGRyYWZ0IGFuZCBzZWUgd2hhdCdzIGNoYW5nZWQgYW5kIGhlbHAgYXNzdXJlIHRo
YXQgaXQgcHJvcGVybHkgY2FwdHVyZXMgdGhlIGNvbnZlcnNhdGlvbnMuIElmIHlvdSBoYXZlIGFu
eSBpbnB1dHMgZm9yIHRoZSBtYXJrZWQgW1sgRWRpdG9yJ3MgTm90ZSBdXSBzZWN0aW9ucywgcGxl
YXNlIHNlbmQgdGhlbSB0byB0aGUgbGlzdCBieSBuZXh0IFRodXJzZGF5IHRvIGdpdmUgbWUgb3Bw
b3J0dW5pdHkgdG8gZ2V0IGFueSBuZWNlc3NhcnkgY2hhbmdlcyBpbiBieSB0aGUgY3V0b2ZmIGRh
dGUgb2YgTW9uZGF5IHRoZSAyMm5kLg0KDQpUaGFua3MgZm9yIGFsbCBvZiB5b3VyIGhhcmQgd29y
ayBldmVyeW9uZSwgSSB0aGluayB0aGlzIGlzICpyZWFsbHkqIGNvbWluZyBhbG9uZyBub3cuDQoN
CiAtLSBKdXN0aW4NCg0KT24gRmViIDE1LCAyMDEzLCBhdCA0OjU0IFBNLCBpbnRlcm5ldC1kcmFm
dHNAaWV0Zi5vcmc8bWFpbHRvOmludGVybmV0LWRyYWZ0c0BpZXRmLm9yZz4gd3JvdGU6DQoNCj4N
Cj4gQSBOZXcgSW50ZXJuZXQtRHJhZnQgaXMgYXZhaWxhYmxlIGZyb20gdGhlIG9uLWxpbmUgSW50
ZXJuZXQtRHJhZnRzIGRpcmVjdG9yaWVzLg0KPiBUaGlzIGRyYWZ0IGlzIGEgd29yayBpdGVtIG9m
IHRoZSBXZWIgQXV0aG9yaXphdGlvbiBQcm90b2NvbCBXb3JraW5nIEdyb3VwIG9mIHRoZSBJRVRG
Lg0KPg0KPiAgICAgICBUaXRsZSAgICAgICAgICAgOiBPQXV0aCBEeW5hbWljIENsaWVudCBSZWdp
c3RyYXRpb24gUHJvdG9jb2wNCj4gICAgICAgQXV0aG9yKHMpICAgICAgIDogSnVzdGluIFJpY2hl
cg0KPiAgICAgICAgICAgICAgICAgICAgICAgICAgSm9obiBCcmFkbGV5DQo+ICAgICAgICAgICAg
ICAgICAgICAgICAgICBNaWNoYWVsIEIuIEpvbmVzDQo+ICAgICAgICAgICAgICAgICAgICAgICAg
ICBNYWNpZWogTWFjaHVsYWsNCj4gICAgICAgRmlsZW5hbWUgICAgICAgIDogZHJhZnQtaWV0Zi1v
YXV0aC1keW4tcmVnLTA2LnR4dA0KPiAgICAgICBQYWdlcyAgICAgICAgICAgOiAyMQ0KPiAgICAg
ICBEYXRlICAgICAgICAgICAgOiAyMDEzLTAyLTE1DQo+DQo+IEFic3RyYWN0Og0KPiAgIFRoaXMg
c3BlY2lmaWNhdGlvbiBkZWZpbmVzIGFuIGVuZHBvaW50IGFuZCBwcm90b2NvbCBmb3IgZHluYW1p
Yw0KPiAgIHJlZ2lzdHJhdGlvbiBvZiBPQXV0aCBDbGllbnRzIGF0IGFuIEF1dGhvcml6YXRpb24g
U2VydmVyLg0KPg0KPg0KPiBUaGUgSUVURiBkYXRhdHJhY2tlciBzdGF0dXMgcGFnZSBmb3IgdGhp
cyBkcmFmdCBpczoNCj4gaHR0cHM6Ly9kYXRhdHJhY2tlci5pZXRmLm9yZy9kb2MvZHJhZnQtaWV0
Zi1vYXV0aC1keW4tcmVnDQo+DQo+IFRoZXJlJ3MgYWxzbyBhIGh0bWxpemVkIHZlcnNpb24gYXZh
aWxhYmxlIGF0Og0KPiBodHRwOi8vdG9vbHMuaWV0Zi5vcmcvaHRtbC9kcmFmdC1pZXRmLW9hdXRo
LWR5bi1yZWctMDYNCj4NCj4gQSBkaWZmIGZyb20gdGhlIHByZXZpb3VzIHZlcnNpb24gaXMgYXZh
aWxhYmxlIGF0Og0KPiBodHRwOi8vd3d3LmlldGYub3JnL3JmY2RpZmY/dXJsMj1kcmFmdC1pZXRm
LW9hdXRoLWR5bi1yZWctMDYNCj4NCj4NCj4gSW50ZXJuZXQtRHJhZnRzIGFyZSBhbHNvIGF2YWls
YWJsZSBieSBhbm9ueW1vdXMgRlRQIGF0Og0KPiBmdHA6Ly9mdHAuaWV0Zi5vcmcvaW50ZXJuZXQt
ZHJhZnRzLw0KPg0KPiBfX19fX19fX19fX19fX19fX19fX19fX19fX19fX19fX19fX19fX19fX19f
X19fXw0KPiBPQXV0aCBtYWlsaW5nIGxpc3QNCj4gT0F1dGhAaWV0Zi5vcmc8bWFpbHRvOk9BdXRo
QGlldGYub3JnPg0KPiBodHRwczovL3d3dy5pZXRmLm9yZy9tYWlsbWFuL2xpc3RpbmZvL29hdXRo
DQoNCl9fX19fX19fX19fX19fX19fX19fX19fX19fX19fX19fX19fX19fX19fX19fX19fDQpPQXV0
aCBtYWlsaW5nIGxpc3QNCk9BdXRoQGlldGYub3JnPG1haWx0bzpPQXV0aEBpZXRmLm9yZz4NCmh0
dHBzOi8vd3d3LmlldGYub3JnL21haWxtYW4vbGlzdGluZm8vb2F1dGgNCg0KDQoNCi0tDQpOYXQg
U2FraW11cmEgKD1uYXQpDQpDaGFpcm1hbiwgT3BlbklEIEZvdW5kYXRpb24NCmh0dHA6Ly9uYXQu
c2FraW11cmEub3JnLw0KQF9uYXRfZW4NCg0KDQpfX19fX19fX19fX19fX19fX19fX19fX19fX19f
X19fX19fX19fX19fX19fX19fXw0KT0F1dGggbWFpbGluZyBsaXN0DQpPQXV0aEBpZXRmLm9yZzxt
YWlsdG86T0F1dGhAaWV0Zi5vcmc+DQpodHRwczovL3d3dy5pZXRmLm9yZy9tYWlsbWFuL2xpc3Rp
bmZvL29hdXRoDQoNCg0KX19fX19fX19fX19fX19fX19fX19fX19fX19fX19fX19fX19fX19fX19f
X19fX18NCk9BdXRoIG1haWxpbmcgbGlzdA0KT0F1dGhAaWV0Zi5vcmc8bWFpbHRvOk9BdXRoQGll
dGYub3JnPg0KaHR0cHM6Ly93d3cuaWV0Zi5vcmcvbWFpbG1hbi9saXN0aW5mby9vYXV0aA0KDQoN
Cg0KLS0NCk5hdCBTYWtpbXVyYSAoPW5hdCkNCkNoYWlybWFuLCBPcGVuSUQgRm91bmRhdGlvbg0K
aHR0cDovL25hdC5zYWtpbXVyYS5vcmcvDQpAX25hdF9lbg0KDQo=

--_000_4E1F6AAD24975D4BA5B16804296739436747B12DTK5EX14MBXC284r_
Content-Type: text/html; charset="utf-8"
Content-Transfer-Encoding: base64
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--_000_4E1F6AAD24975D4BA5B16804296739436747B12DTK5EX14MBXC284r_--

From jricher@mitre.org  Wed Feb 20 10:11:54 2013
Return-Path: <jricher@mitre.org>
X-Original-To: oauth@ietfa.amsl.com
Delivered-To: oauth@ietfa.amsl.com
Received: from localhost (localhost [127.0.0.1]) by ietfa.amsl.com (Postfix) with ESMTP id 0930821F87CD for <oauth@ietfa.amsl.com>; Wed, 20 Feb 2013 10:11:54 -0800 (PST)
X-Virus-Scanned: amavisd-new at amsl.com
X-Spam-Flag: NO
X-Spam-Score: -6.574
X-Spam-Level: 
X-Spam-Status: No, score=-6.574 tagged_above=-999 required=5 tests=[AWL=0.024,  BAYES_00=-2.599, HTML_MESSAGE=0.001, RCVD_IN_DNSWL_MED=-4]
Received: from mail.ietf.org ([64.170.98.30]) by localhost (ietfa.amsl.com [127.0.0.1]) (amavisd-new, port 10024) with ESMTP id Gg9Cfk-oonef for <oauth@ietfa.amsl.com>; Wed, 20 Feb 2013 10:11:52 -0800 (PST)
Received: from smtpksrv1.mitre.org (smtpksrv1.mitre.org [198.49.146.77]) by ietfa.amsl.com (Postfix) with ESMTP id B889E21F871D for <oauth@ietf.org>; Wed, 20 Feb 2013 10:11:51 -0800 (PST)
Received: from smtpksrv1.mitre.org (localhost.localdomain [127.0.0.1]) by localhost (Postfix) with SMTP id 5201D1F2AF1; Wed, 20 Feb 2013 13:11:50 -0500 (EST)
Received: from IMCCAS04.MITRE.ORG (imccas04.mitre.org [129.83.29.81]) by smtpksrv1.mitre.org (Postfix) with ESMTP id E66D01F2AF9; Wed, 20 Feb 2013 13:11:49 -0500 (EST)
Received: from [10.146.15.29] (129.83.31.58) by IMCCAS04.MITRE.ORG (129.83.29.81) with Microsoft SMTP Server (TLS) id 14.2.318.4; Wed, 20 Feb 2013 13:11:49 -0500
Message-ID: <512511B0.5090102@mitre.org>
Date: Wed, 20 Feb 2013 13:10:56 -0500
From: Justin Richer <jricher@mitre.org>
User-Agent: Mozilla/5.0 (X11; Linux i686; rv:17.0) Gecko/20130106 Thunderbird/17.0.2
MIME-Version: 1.0
To: Nat Sakimura <sakimura@gmail.com>
References: <20130215215423.23019.50224.idtracker@ietfa.amsl.com> <B33BFB58CCC8BE4998958016839DE27E06894B4F@IMCMBX01.MITRE.ORG> <CABzCy2CgnAtPrTY37H6vO-+5u3tRmsm+1j86r3w046AhHnNdfw@mail.gmail.com> <4E1F6AAD24975D4BA5B16804296739436747A665@TK5EX14MBXC284.redmond.corp.microsoft.com> <CABzCy2DHvFVmtv9jB-re5efKEVrfBBk4BZ83n_EQLMHOqsnXcA@mail.gmail.com> <4E1F6AAD24975D4BA5B16804296739436747ADDB@TK5EX14MBXC284.redmond.corp.microsoft.com> <CABzCy2AyCDxc+Gov7zBnTRquzp+QUMF8riqd_8vcP0rHFQUtkQ@mail.gmail.com>
In-Reply-To: <CABzCy2AyCDxc+Gov7zBnTRquzp+QUMF8riqd_8vcP0rHFQUtkQ@mail.gmail.com>
Content-Type: multipart/alternative; boundary="------------040405010901080302000403"
X-Originating-IP: [129.83.31.58]
Cc: "<oauth@ietf.org>" <oauth@ietf.org>
Subject: Re: [OAUTH-WG] I-D Action: draft-ietf-oauth-dyn-reg-06.txt
X-BeenThere: oauth@ietf.org
X-Mailman-Version: 2.1.12
Precedence: list
List-Id: OAUTH WG <oauth.ietf.org>
List-Unsubscribe: <https://www.ietf.org/mailman/options/oauth>, <mailto:oauth-request@ietf.org?subject=unsubscribe>
List-Archive: <http://www.ietf.org/mail-archive/web/oauth>
List-Post: <mailto:oauth@ietf.org>
List-Help: <mailto:oauth-request@ietf.org?subject=help>
List-Subscribe: <https://www.ietf.org/mailman/listinfo/oauth>, <mailto:oauth-request@ietf.org?subject=subscribe>
X-List-Received-Date: Wed, 20 Feb 2013 18:11:54 -0000

--------------040405010901080302000403
Content-Type: text/plain; charset="windows-1252"; format=flowed
Content-Transfer-Encoding: 8bit

I like "registered_client_uri", given all of the other discussions on 
this thread, because:

URL/URI: It *is* a URL, and an https one at that, but if the IETF 
convention is to call it URI, then I'm fine with that.

registered_client/registration_access: The former is a good description 
of what's actually *at* the URL, which fits better with the RESTful 
entity model. I think Nat's criticisms about the original formation of 
the parameter name are spot on, though at the time we hadn't heard 
anything better.


So I'd like to change it to "registered_client_uri" in the next draft.

  -- Justin

On 02/20/2013 12:20 PM, Nat Sakimura wrote:
> I have thought about that as well. The the reason I added "info" or 
> "metadata" was that what was behind the URL is not the client itself. 
> By "client registration", I suppose you mean "client entry in the 
> register" (cf. *registration */n/ 2.) . It is the "registered 
> data/info/metadata" about the client.
>
> Nat
>
> 2013/2/20 Mike Jones <Michael.Jones@microsoft.com 
> <mailto:Michael.Jones@microsoft.com>>
>
>     I could live with “registered_client_url”.  I think that adding
>     “_metadata” or “_info” is incorrect, because what’s being accessed
>     is the client’ registration – not just metadata or info about the
>     client’s registration (although that information can be retrieved
>     as one aspect of the operations on the client’s registration).
>
>     -- Mike
>
>     *From:*Nat Sakimura [mailto:sakimura@gmail.com
>     <mailto:sakimura@gmail.com>]
>     *Sent:* Wednesday, February 20, 2013 8:53 AM
>     *To:* Mike Jones
>     *Cc:* <oauth@ietf.org <mailto:oauth@ietf.org>>; Richer, Justin P.;
>     John Bradley
>
>
>     *Subject:* Re: [OAUTH-WG] I-D Action: draft-ietf-oauth-dyn-reg-06.txt
>
>     I have read the whole thing and still ---
>
>     Your argument that it is the place for using "registration access
>     token" thus should have a parallel name "registration access url"
>     is very weak. There are several weakness.
>
>     First, "registration access token" actually is "registration" +
>     "access token". Extracting "registration access" from
>     "registration access token" is broken.
>
>     Secondly, access token is used to against any protected
>     resource. Recommending to use the word "access" in naming
>     protected resources is broken. Should we rename Userinfo endpoint
>     to something like "Userinfo Access Endpoint"? I do not think so.
>
>     Thirdly, the term "Registration Access" does not seem to be
>     meaningful.
>
>     When you say "access", I suppose you are using the noun version of
>     it.
>
>     (If you are using the verb, then I am even more against as a URL
>     should not contain a verb.)
>
>     According to the Webster, access (n.) is defined as:
>
>     *access */n./
>
>     *1*
>
>     /*a*/*:*onset <http://www.merriam-webster.com/dictionary/onset> 2
>
>     /*b*/*:* a fit of intense feeling *:*outburst
>     <http://www.merriam-webster.com/dictionary/outburst>
>
>     *2*
>
>     /*a*/*:* permission, liberty, or ability to enter, approach, or
>     pass to and from a place or to approach or communicate with a
>     person or thing
>
>     /*b*/*:* freedom or ability to obtain or make use of something
>
>     /*c*/*:* a way or means of access
>
>     /*d*/*:* the act or an instance of accessing
>     <http://www.merriam-webster.com/dictionary/accessing>
>
>     *3*
>
>     *:* an increase by addition <a sudden /access/ of wealth>
>
>     Replacing "access" with any of the definition above does not seem
>     to work.
>
>     Remember, a URL is represents a "thing".
>
>     The name of the endpoint should represent the "thing".
>
>     I am merginally OK with "client registration url" leveraging on
>     the definition 2. below (again from Webster -- my OED subscription
>     lapsed for the time being.)
>
>     *registration */n./
>
>     *1*
>
>     *:* the act of registering
>     <http://www.merriam-webster.com/dictionary/registering>
>
>     *2*
>
>     *:* an entry in a register
>     <http://www.merriam-webster.com/dictionary/register>
>
>     *3*
>
>     *:* the number of individuals registered
>     <http://www.merriam-webster.com/dictionary/registered>
>     *:*enrollment <http://www.merriam-webster.com/dictionary/enrollment>
>
>     *4*
>
>     /*a*/*:* the art or act of selecting and adjusting pipe organ stops
>
>     /*b*/*:* the combination of stops selected for performing a
>     particular organ work
>
>     *5*
>
>     *:* a document certifying an act of registering
>
>     However, since the most common use of "registration" is actually
>     *1* above, it still is confusing. If you really want to emphasize
>     the fact that it has been registered, then something like
>     "registered client info uri" or "registered client metadata uri"
>     would be better.
>
>     Nat
>
>     2013/2/20 Mike Jones <Michael.Jones@microsoft.com
>     <mailto:Michael.Jones@microsoft.com>>
>
>     For what it’s worth, the name “registration_access_url” was chosen
>     to be parallel to “registration_access_token”.   It’s the place
>     you use the access token. And it’s where you access an existing
>     registration.  I’m against the name “client_metadata_url” because
>     it’s not metadata you’re accessing – it’s a registration you’re
>     accessing.  For the same reason, I don’t think the name
>     “client_info_url” gives people the right idea, because it doesn’t
>     say anything it being the registration that you’re accessing.
>
>     If you really want us to change this, having read what’s above, I
>     could live with “client_registration_url”, but I don’t think a
>     change is actually necessary.  (But if we are going to change it,
>     let’s do it ASAP, before the OpenID Connect Implementer’s Drafts
>     are published.)
>
>     -- Mike
>
>     *From:*oauth-bounces@ietf.org <mailto:oauth-bounces@ietf.org>
>     [mailto:oauth-bounces@ietf.org <mailto:oauth-bounces@ietf.org>]
>     *On Behalf Of *Nat Sakimura
>     *Sent:* Wednesday, February 20, 2013 7:58 AM
>     *To:* <oauth@ietf.org <mailto:oauth@ietf.org>>; Richer, Justin P.;
>     John Bradley
>
>
>     *Subject:* Re: [OAUTH-WG] I-D Action: draft-ietf-oauth-dyn-reg-06.txt
>
>     Thanks Justin.
>
>
>
>     Even if we go flat rather than doing JSON Structure, the "Client
>     Registration Access Endpoint" is not a good representative name.
>
>     What it represents is the client metadata/info.
>     It is not representing "Client Registration Access".
>
>     What does "Client Registration Access" mean?
>
>     Does UPDATing "Cleint Registration Access" make sense?
>
>     Something in the line of "Client Metadata Endpoint" and
>     something like "client_metadata_url" or "client_info_url" is much
>     better.
>
>     Nat
>
>     2013/2/15 Richer, Justin P. <jricher@mitre.org
>     <mailto:jricher@mitre.org>>
>
>     Everyone, there's a new draft of DynReg up on the tracker. This
>     draft tries to codify the discussions so far from this week into
>     something we can all read. There are still plenty of open
>     discussion points and items up for debate. Please read through
>     this latest draft and see what's changed and help assure that it
>     properly captures the conversations. If you have any inputs for
>     the marked [[ Editor's Note ]] sections, please send them to the
>     list by next Thursday to give me opportunity to get any necessary
>     changes in by the cutoff date of Monday the 22nd.
>
>     Thanks for all of your hard work everyone, I think this is
>     *really* coming along now.
>
>      -- Justin
>
>
>     On Feb 15, 2013, at 4:54 PM, internet-drafts@ietf.org
>     <mailto:internet-drafts@ietf.org> wrote:
>
>     >
>     > A New Internet-Draft is available from the on-line
>     Internet-Drafts directories.
>     > This draft is a work item of the Web Authorization Protocol
>     Working Group of the IETF.
>     >
>     >       Title           : OAuth Dynamic Client Registration Protocol
>     >       Author(s)       : Justin Richer
>     >  John Bradley
>     >  Michael B. Jones
>     >  Maciej Machulak
>     >       Filename        : draft-ietf-oauth-dyn-reg-06.txt
>     >       Pages           : 21
>     >       Date            : 2013-02-15
>     >
>     > Abstract:
>     >   This specification defines an endpoint and protocol for dynamic
>     >   registration of OAuth Clients at an Authorization Server.
>     >
>     >
>     > The IETF datatracker status page for this draft is:
>     > https://datatracker.ietf.org/doc/draft-ietf-oauth-dyn-reg
>     >
>     > There's also a htmlized version available at:
>     > http://tools.ietf.org/html/draft-ietf-oauth-dyn-reg-06
>     >
>     > A diff from the previous version is available at:
>     > http://www.ietf.org/rfcdiff?url2=draft-ietf-oauth-dyn-reg-06
>     >
>     >
>     > Internet-Drafts are also available by anonymous FTP at:
>     > ftp://ftp.ietf.org/internet-drafts/
>     >
>     > _______________________________________________
>     > OAuth mailing list
>     > OAuth@ietf.org <mailto:OAuth@ietf.org>
>     > https://www.ietf.org/mailman/listinfo/oauth
>
>     _______________________________________________
>     OAuth mailing list
>     OAuth@ietf.org <mailto:OAuth@ietf.org>
>     https://www.ietf.org/mailman/listinfo/oauth
>
>
>
>     -- 
>     Nat Sakimura (=nat)
>
>     Chairman, OpenID Foundation
>     http://nat.sakimura.org/
>     @_nat_en
>
>
>
>     -- 
>     Nat Sakimura (=nat)
>
>     Chairman, OpenID Foundation
>     http://nat.sakimura.org/
>     @_nat_en
>
>
>
>
> -- 
> Nat Sakimura (=nat)
> Chairman, OpenID Foundation
> http://nat.sakimura.org/
> @_nat_en


--------------040405010901080302000403
Content-Type: text/html; charset="windows-1252"
Content-Transfer-Encoding: 8bit

<html>
  <head>
    <meta content="text/html; charset=windows-1252"
      http-equiv="Content-Type">
  </head>
  <body bgcolor="#FFFFFF" text="#000000">
    I like "registered_client_uri", given all of the other discussions
    on this thread, because:<br>
    <br>
    URL/URI: It *is* a URL, and an https one at that, but if the IETF
    convention is to call it URI, then I'm fine with that.<br>
    <br>
    registered_client/registration_access: The former is a good
    description of what's actually *at* the URL, which fits better with
    the RESTful entity model. I think Nat's criticisms about the
    original formation of the parameter name are spot on, though at the
    time we hadn't heard anything better.<br>
    <br>
    <br>
    So I'd like to change it to "registered_client_uri" in the next
    draft.<br>
    <br>
     -- Justin<br>
    <br>
    <div class="moz-cite-prefix">On 02/20/2013 12:20 PM, Nat Sakimura
      wrote:<br>
    </div>
    <blockquote
cite="mid:CABzCy2AyCDxc+Gov7zBnTRquzp+QUMF8riqd_8vcP0rHFQUtkQ@mail.gmail.com"
      type="cite">
      <meta http-equiv="Content-Type" content="text/html;
        charset=windows-1252">
      I have thought about that as well. The the reason I added "info"
      or "metadata" was that what was behind the URL is not the client
      itself. By "client registration", I suppose you mean "client entry
      in the register" (cf. <b>registration </b><i>n</i> 2.) . It is
      the "registered data/info/metadata" about the client. 
      <div>
        <br>
      </div>
      <div>Nat<br>
        <br>
        <div class="gmail_quote">2013/2/20 Mike Jones <span dir="ltr">&lt;<a
              moz-do-not-send="true"
              href="mailto:Michael.Jones@microsoft.com" target="_blank">Michael.Jones@microsoft.com</a>&gt;</span><br>
          <blockquote class="gmail_quote" style="margin:0 0 0
            .8ex;border-left:1px #ccc solid;padding-left:1ex">
            <div link="blue" vlink="purple" lang="EN-US">
              <div>
                <p class="MsoNormal"><span
style="font-size:11.0pt;font-family:&quot;Calibri&quot;,&quot;sans-serif&quot;;color:#1f497d">I
                    could live with “registered_client_url”.  I think
                    that adding “_metadata” or “_info” is incorrect,
                    because what’s being accessed is the client’
                    registration – not just metadata or info about the
                    client’s registration (although that information can
                    be retrieved as one aspect of the operations on the
                    client’s registration).</span></p>
                <p class="MsoNormal"><span
style="font-size:11.0pt;font-family:&quot;Calibri&quot;,&quot;sans-serif&quot;;color:#1f497d"> </span></p>
                <p class="MsoNormal"><span
style="font-size:11.0pt;font-family:&quot;Calibri&quot;,&quot;sans-serif&quot;;color:#1f497d">                                                           
                    -- Mike</span></p>
                <p class="MsoNormal"><span
style="font-size:11.0pt;font-family:&quot;Calibri&quot;,&quot;sans-serif&quot;;color:#1f497d"> </span></p>
                <p class="MsoNormal"><b><span
style="font-size:10.0pt;font-family:&quot;Tahoma&quot;,&quot;sans-serif&quot;">From:</span></b><span
style="font-size:10.0pt;font-family:&quot;Tahoma&quot;,&quot;sans-serif&quot;">
                    Nat Sakimura [mailto:<a moz-do-not-send="true"
                      href="mailto:sakimura@gmail.com" target="_blank">sakimura@gmail.com</a>]
                    <br>
                    <b>Sent:</b> Wednesday, February 20, 2013 8:53 AM<br>
                    <b>To:</b> Mike Jones<br>
                    <b>Cc:</b> &lt;<a moz-do-not-send="true"
                      href="mailto:oauth@ietf.org" target="_blank">oauth@ietf.org</a>&gt;;
                    Richer, Justin P.; John Bradley</span></p>
                <div>
                  <div class="h5"><br>
                    <b>Subject:</b> Re: [OAUTH-WG] I-D Action:
                    draft-ietf-oauth-dyn-reg-06.txt</div>
                </div>
                <div>
                  <div class="h5">
                    <p class="MsoNormal"> </p>
                    <p class="MsoNormal">I have read the whole thing and
                      still --- </p>
                    <div>
                      <p class="MsoNormal"> </p>
                    </div>
                    <div>
                      <p class="MsoNormal">Your argument that it is the
                        place for using "registration access token" thus
                        should have a parallel name "registration access
                        url" is very weak. There are several weakness. </p>
                    </div>
                    <div>
                      <p class="MsoNormal"> </p>
                    </div>
                    <div>
                      <p class="MsoNormal">First, "registration access
                        token" actually is "registration" + "access
                        token". Extracting "registration access" from
                        "registration access token" is broken. </p>
                    </div>
                    <div>
                      <p class="MsoNormal"> </p>
                    </div>
                    <div>
                      <p class="MsoNormal">Secondly, access token is
                        used to against any protected
                        resource. Recommending to use the word "access"
                        in naming protected resources is broken. Should
                        we rename Userinfo endpoint to something like
                        "Userinfo Access Endpoint"? I do not think so. </p>
                    </div>
                    <div>
                      <p class="MsoNormal"> </p>
                    </div>
                    <div>
                      <p class="MsoNormal">Thirdly, the term
                        "Registration Access" does not seem to be
                        meaningful. </p>
                    </div>
                    <div>
                      <p class="MsoNormal">When you say "access", I
                        suppose you are using the noun version of it. </p>
                    </div>
                    <div>
                      <div>
                        <p class="MsoNormal">(If you are using the verb,
                          then I am even more against as a URL should
                          not contain a verb.) </p>
                      </div>
                      <div>
                        <p class="MsoNormal"> </p>
                      </div>
                      <div>
                        <p class="MsoNormal">According to the Webster,
                          access (n.) is defined as: </p>
                      </div>
                      <div>
                        <p class="MsoNormal"> </p>
                      </div>
                      <div>
                        <p class="MsoNormal"><b>access </b><i>n.</i></p>
                      </div>
                      <div>
                        <p class="MsoNormal"> </p>
                      </div>
                      <div>
                        <div>
                          <div>
                            <p class="MsoNormal"
                              style="line-height:15.0pt;background:white"><b><span
style="font-size:9.5pt;font-family:&quot;Verdana&quot;,&quot;sans-serif&quot;">1</span></b></p>
                          </div>
                          <div
                            style="margin-left:15.0pt;margin-bottom:7.5pt">
                            <p class="MsoNormal"
                              style="line-height:15.0pt;background:white"><em><b><span
style="font-size:9.5pt;font-family:&quot;Verdana&quot;,&quot;sans-serif&quot;;font-style:normal">a</span></b></em><span><span
style="font-size:9.5pt;font-family:&quot;Verdana&quot;,&quot;sans-serif&quot;"> </span></span><strong><span
style="font-size:9.5pt;font-family:&quot;Verdana&quot;,&quot;sans-serif&quot;">:</span></strong><span><span
style="font-size:9.5pt;font-family:&quot;Verdana&quot;,&quot;sans-serif&quot;"> <a
                                    moz-do-not-send="true"
                                    href="http://www.merriam-webster.com/dictionary/onset"
                                    target="_blank"><span
                                      style="font-variant:small-caps;color:#1122cc">onset</span></a> 2</span></span></p>
                            <p class="MsoNormal"
                              style="line-height:15.0pt;background:white"><em><b><span
style="font-size:9.5pt;font-family:&quot;Verdana&quot;,&quot;sans-serif&quot;;font-style:normal">b</span></b></em><span><span
style="font-size:9.5pt;font-family:&quot;Verdana&quot;,&quot;sans-serif&quot;"> </span></span><strong><span
style="font-size:9.5pt;font-family:&quot;Verdana&quot;,&quot;sans-serif&quot;">:</span></strong><span><span
style="font-size:9.5pt;font-family:&quot;Verdana&quot;,&quot;sans-serif&quot;"> a

                                  fit of intense feeling </span></span><strong><span
style="font-size:9.5pt;font-family:&quot;Verdana&quot;,&quot;sans-serif&quot;">:</span></strong><span><span
style="font-size:9.5pt;font-family:&quot;Verdana&quot;,&quot;sans-serif&quot;"> <a
                                    moz-do-not-send="true"
                                    href="http://www.merriam-webster.com/dictionary/outburst"
                                    target="_blank"><span
                                      style="font-variant:small-caps;color:#1122cc">outburst</span></a></span></span></p>
                          </div>
                        </div>
                        <div>
                          <div>
                            <p class="MsoNormal"
                              style="line-height:15.0pt;background:white"><b><span
style="font-size:9.5pt;font-family:&quot;Verdana&quot;,&quot;sans-serif&quot;">2</span></b></p>
                          </div>
                          <div
                            style="margin-left:15.0pt;margin-bottom:7.5pt">
                            <p class="MsoNormal"
                              style="line-height:15.0pt;background:white"><em><b><span
style="font-size:9.5pt;font-family:&quot;Verdana&quot;,&quot;sans-serif&quot;;font-style:normal">a</span></b></em><span><span
style="font-size:9.5pt;font-family:&quot;Verdana&quot;,&quot;sans-serif&quot;"> </span></span><strong><span
style="font-size:9.5pt;font-family:&quot;Verdana&quot;,&quot;sans-serif&quot;">:</span></strong><span><span
style="font-size:9.5pt;font-family:&quot;Verdana&quot;,&quot;sans-serif&quot;"> permission,

                                  liberty, or ability to enter,
                                  approach, or pass to and from a place
                                  or to approach or communicate with a
                                  person or thing</span></span></p>
                            <p class="MsoNormal"
                              style="line-height:15.0pt;background:white"><em><b><span
style="font-size:9.5pt;font-family:&quot;Verdana&quot;,&quot;sans-serif&quot;;font-style:normal">b</span></b></em><span><span
style="font-size:9.5pt;font-family:&quot;Verdana&quot;,&quot;sans-serif&quot;"> </span></span><strong><span
style="font-size:9.5pt;font-family:&quot;Verdana&quot;,&quot;sans-serif&quot;">:</span></strong><span><span
style="font-size:9.5pt;font-family:&quot;Verdana&quot;,&quot;sans-serif&quot;"> freedom

                                  or ability to obtain or make use of
                                  something</span></span></p>
                            <p class="MsoNormal"
                              style="line-height:15.0pt;background:white"><em><b><span
style="font-size:9.5pt;font-family:&quot;Verdana&quot;,&quot;sans-serif&quot;;font-style:normal">c</span></b></em><span><span
style="font-size:9.5pt;font-family:&quot;Verdana&quot;,&quot;sans-serif&quot;"> </span></span><strong><span
style="font-size:9.5pt;font-family:&quot;Verdana&quot;,&quot;sans-serif&quot;">:</span></strong><span><span
style="font-size:9.5pt;font-family:&quot;Verdana&quot;,&quot;sans-serif&quot;"> a

                                  way or means of access</span></span></p>
                            <p class="MsoNormal"
                              style="line-height:15.0pt;background:white"><em><b><span
style="font-size:9.5pt;font-family:&quot;Verdana&quot;,&quot;sans-serif&quot;;font-style:normal">d</span></b></em><span><span
style="font-size:9.5pt;font-family:&quot;Verdana&quot;,&quot;sans-serif&quot;"> </span></span><strong><span
style="font-size:9.5pt;font-family:&quot;Verdana&quot;,&quot;sans-serif&quot;">:</span></strong><span><span
style="font-size:9.5pt;font-family:&quot;Verdana&quot;,&quot;sans-serif&quot;"> the

                                  act or an instance of <a
                                    moz-do-not-send="true"
                                    href="http://www.merriam-webster.com/dictionary/accessing"
                                    target="_blank"><span
                                      style="font-size:10.0pt;color:#1122cc">accessing</span></a></span></span></p>
                          </div>
                        </div>
                        <div>
                          <div>
                            <p class="MsoNormal"
                              style="line-height:15.0pt;background:white"><b><span
style="font-size:9.5pt;font-family:&quot;Verdana&quot;,&quot;sans-serif&quot;">3</span></b></p>
                          </div>
                          <div
                            style="margin-left:15.0pt;margin-bottom:7.5pt">
                            <p class="MsoNormal"
                              style="line-height:15.0pt;background:white"><strong><span
style="font-size:9.5pt;font-family:&quot;Verdana&quot;,&quot;sans-serif&quot;">:</span></strong><span><span
style="font-size:9.5pt;font-family:&quot;Verdana&quot;,&quot;sans-serif&quot;"> an
                                  increase by addition </span></span><span><span
style="font-size:9.5pt;font-family:&quot;Verdana&quot;,&quot;sans-serif&quot;">&lt;a

                                  sudden </span></span><em><span
style="font-size:9.5pt;font-family:&quot;Verdana&quot;,&quot;sans-serif&quot;">access</span></em><span><span
style="font-size:9.5pt;font-family:&quot;Verdana&quot;,&quot;sans-serif&quot;"> of
                                  wealth&gt;</span></span><span
style="font-size:9.5pt;font-family:&quot;Verdana&quot;,&quot;sans-serif&quot;"></span></p>
                          </div>
                        </div>
                        <div>
                          <p class="MsoNormal"> </p>
                        </div>
                        <div>
                          <p class="MsoNormal">Replacing "access" with
                            any of the definition above does not seem to
                            work. </p>
                        </div>
                        <div>
                          <p class="MsoNormal"> </p>
                        </div>
                        <div>
                          <p class="MsoNormal">Remember, a URL is
                            represents a "thing". </p>
                        </div>
                        <div>
                          <p class="MsoNormal">The name of the endpoint
                            should represent the "thing". </p>
                        </div>
                        <div>
                          <p class="MsoNormal"> </p>
                        </div>
                        <div>
                          <p class="MsoNormal">I am merginally OK with
                            "client registration url" leveraging on the
                            definition 2. below (again from Webster --
                            my OED subscription lapsed for the time
                            being.) </p>
                        </div>
                        <div>
                          <p class="MsoNormal"> </p>
                        </div>
                        <div>
                          <p class="MsoNormal"><b>registration </b><i>n.</i></p>
                        </div>
                        <div>
                          <p class="MsoNormal"> </p>
                        </div>
                        <div>
                          <div>
                            <div>
                              <p class="MsoNormal"
                                style="line-height:15.0pt;background:white"><b><span
style="font-size:9.5pt;font-family:&quot;Verdana&quot;,&quot;sans-serif&quot;">1</span></b></p>
                            </div>
                            <div
                              style="margin-left:15.0pt;margin-bottom:7.5pt">
                              <p class="MsoNormal"
                                style="line-height:15.0pt;background:white"><strong><span
style="font-size:9.5pt;font-family:&quot;Verdana&quot;,&quot;sans-serif&quot;">:</span></strong><span><span
style="font-size:9.5pt;font-family:&quot;Verdana&quot;,&quot;sans-serif&quot;"> the
                                    act of <a moz-do-not-send="true"
                                      href="http://www.merriam-webster.com/dictionary/registering"
                                      target="_blank"><span
                                        style="font-size:10.0pt;color:#1122cc">registering</span></a></span></span><span
style="font-size:9.5pt;font-family:&quot;Verdana&quot;,&quot;sans-serif&quot;"></span></p>
                            </div>
                          </div>
                          <div>
                            <div>
                              <p class="MsoNormal"
                                style="line-height:15.0pt;background:white"><b><span
style="font-size:9.5pt;font-family:&quot;Verdana&quot;,&quot;sans-serif&quot;">2</span></b></p>
                            </div>
                            <div
                              style="margin-left:15.0pt;margin-bottom:7.5pt">
                              <p class="MsoNormal"
                                style="line-height:15.0pt;background:white"><strong><span
style="font-size:9.5pt;font-family:&quot;Verdana&quot;,&quot;sans-serif&quot;">:</span></strong><span><span
style="font-size:9.5pt;font-family:&quot;Verdana&quot;,&quot;sans-serif&quot;"> an
                                    entry in a <a moz-do-not-send="true"
href="http://www.merriam-webster.com/dictionary/register"
                                      target="_blank"><span
                                        style="font-size:10.0pt;color:#1122cc">register</span></a></span></span><span
style="font-size:9.5pt;font-family:&quot;Verdana&quot;,&quot;sans-serif&quot;"></span></p>
                            </div>
                          </div>
                          <div>
                            <div>
                              <p class="MsoNormal"
                                style="line-height:15.0pt;background:white"><b><span
style="font-size:9.5pt;font-family:&quot;Verdana&quot;,&quot;sans-serif&quot;">3</span></b></p>
                            </div>
                            <div
                              style="margin-left:15.0pt;margin-bottom:7.5pt">
                              <p class="MsoNormal"
                                style="line-height:15.0pt;background:white"><strong><span
style="font-size:9.5pt;font-family:&quot;Verdana&quot;,&quot;sans-serif&quot;">:</span></strong><span><span
style="font-size:9.5pt;font-family:&quot;Verdana&quot;,&quot;sans-serif&quot;"> the
                                    number of individuals <a
                                      moz-do-not-send="true"
                                      href="http://www.merriam-webster.com/dictionary/registered"
                                      target="_blank"><span
                                        style="font-size:10.0pt;color:#1122cc">registered</span></a> </span></span><strong><span
style="font-size:9.5pt;font-family:&quot;Verdana&quot;,&quot;sans-serif&quot;">:</span></strong><span><span
style="font-size:9.5pt;font-family:&quot;Verdana&quot;,&quot;sans-serif&quot;"> <a
                                      moz-do-not-send="true"
                                      href="http://www.merriam-webster.com/dictionary/enrollment"
                                      target="_blank"><span
                                        style="font-variant:small-caps;color:#1122cc">enrollment</span></a></span></span><span
style="font-size:9.5pt;font-family:&quot;Verdana&quot;,&quot;sans-serif&quot;"></span></p>
                            </div>
                          </div>
                          <div>
                            <div>
                              <p class="MsoNormal"
                                style="line-height:15.0pt;background:white"><b><span
style="font-size:9.5pt;font-family:&quot;Verdana&quot;,&quot;sans-serif&quot;">4</span></b></p>
                            </div>
                            <div
                              style="margin-left:15.0pt;margin-bottom:7.5pt">
                              <p class="MsoNormal"
                                style="line-height:15.0pt;background:white"><em><b><span
style="font-size:9.5pt;font-family:&quot;Verdana&quot;,&quot;sans-serif&quot;;font-style:normal">a</span></b></em><span><span
style="font-size:9.5pt;font-family:&quot;Verdana&quot;,&quot;sans-serif&quot;"> </span></span><strong><span
style="font-size:9.5pt;font-family:&quot;Verdana&quot;,&quot;sans-serif&quot;">:</span></strong><span><span
style="font-size:9.5pt;font-family:&quot;Verdana&quot;,&quot;sans-serif&quot;"> the

                                    art or act of selecting and
                                    adjusting pipe organ stops</span></span></p>
                              <p class="MsoNormal"
                                style="line-height:15.0pt;background:white"><em><b><span
style="font-size:9.5pt;font-family:&quot;Verdana&quot;,&quot;sans-serif&quot;;font-style:normal">b</span></b></em><span><span
style="font-size:9.5pt;font-family:&quot;Verdana&quot;,&quot;sans-serif&quot;"> </span></span><strong><span
style="font-size:9.5pt;font-family:&quot;Verdana&quot;,&quot;sans-serif&quot;">:</span></strong><span><span
style="font-size:9.5pt;font-family:&quot;Verdana&quot;,&quot;sans-serif&quot;"> the

                                    combination of stops selected for
                                    performing a particular organ work</span></span></p>
                            </div>
                          </div>
                          <div>
                            <div>
                              <p class="MsoNormal"
                                style="line-height:15.0pt;background:white"><b><span
style="font-size:9.5pt;font-family:&quot;Verdana&quot;,&quot;sans-serif&quot;">5</span></b></p>
                            </div>
                            <div
                              style="margin-left:15.0pt;margin-bottom:7.5pt">
                              <p class="MsoNormal"
                                style="line-height:15.0pt;background:white"><strong><span
style="font-size:9.5pt;font-family:&quot;Verdana&quot;,&quot;sans-serif&quot;">:</span></strong><span><span
style="font-size:9.5pt;font-family:&quot;Verdana&quot;,&quot;sans-serif&quot;"> a
                                    document certifying an act of
                                    registering</span></span><span
style="font-size:9.5pt;font-family:&quot;Verdana&quot;,&quot;sans-serif&quot;"></span></p>
                            </div>
                          </div>
                        </div>
                        <div>
                          <p class="MsoNormal"> </p>
                        </div>
                        <div>
                          <p class="MsoNormal">However, since the most
                            common use of "registration" is actually
                            <b>1</b> above, it still is confusing. If
                            you really want to emphasize the fact that
                            it has been registered, then something like
                            "registered client info uri" or "registered
                            client metadata uri" would be better. </p>
                        </div>
                        <div>
                          <p class="MsoNormal"> </p>
                        </div>
                        <div>
                          <p class="MsoNormal">Nat</p>
                        </div>
                        <div>
                          <p class="MsoNormal"> </p>
                        </div>
                        <p class="MsoNormal"> </p>
                        <div>
                          <p class="MsoNormal">2013/2/20 Mike Jones &lt;<a
                              moz-do-not-send="true"
                              href="mailto:Michael.Jones@microsoft.com"
                              target="_blank">Michael.Jones@microsoft.com</a>&gt;</p>
                          <div>
                            <div>
                              <p class="MsoNormal"><span
style="font-size:11.0pt;font-family:&quot;Calibri&quot;,&quot;sans-serif&quot;;color:#1f497d">For
                                  what it’s worth, the name
                                  “registration_access_url” was chosen
                                  to be parallel to
                                  “registration_access_token”.   It’s
                                  the place you use the access token. 
                                  And it’s where you access an existing
                                  registration.  I’m against the name
                                  “client_metadata_url” because it’s not
                                  metadata you’re accessing – it’s a
                                  registration you’re accessing.  For
                                  the same reason, I don’t think the
                                  name “client_info_url” gives people
                                  the right idea, because it doesn’t say
                                  anything it being the registration
                                  that you’re accessing.</span></p>
                              <p class="MsoNormal"><span
style="font-size:11.0pt;font-family:&quot;Calibri&quot;,&quot;sans-serif&quot;;color:#1f497d"> </span></p>
                              <p class="MsoNormal"><span
style="font-size:11.0pt;font-family:&quot;Calibri&quot;,&quot;sans-serif&quot;;color:#1f497d">If
                                  you really want us to change this,
                                  having read what’s above, I could live
                                  with “client_registration_url”, but I
                                  don’t think a change is actually
                                  necessary.  (But if we are going to
                                  change it, let’s do it ASAP, before
                                  the OpenID Connect Implementer’s
                                  Drafts are published.)</span></p>
                              <p class="MsoNormal"><span
style="font-size:11.0pt;font-family:&quot;Calibri&quot;,&quot;sans-serif&quot;;color:#1f497d"> </span></p>
                              <p class="MsoNormal"><span
style="font-size:11.0pt;font-family:&quot;Calibri&quot;,&quot;sans-serif&quot;;color:#1f497d">                                                           
                                  -- Mike</span></p>
                              <p class="MsoNormal"><span
style="font-size:11.0pt;font-family:&quot;Calibri&quot;,&quot;sans-serif&quot;;color:#1f497d"> </span></p>
                              <p class="MsoNormal"><b><span
style="font-size:10.0pt;font-family:&quot;Tahoma&quot;,&quot;sans-serif&quot;">From:</span></b><span
style="font-size:10.0pt;font-family:&quot;Tahoma&quot;,&quot;sans-serif&quot;">
                                  <a moz-do-not-send="true"
                                    href="mailto:oauth-bounces@ietf.org"
                                    target="_blank">oauth-bounces@ietf.org</a>
                                  [mailto:<a moz-do-not-send="true"
                                    href="mailto:oauth-bounces@ietf.org"
                                    target="_blank">oauth-bounces@ietf.org</a>]
                                  <b>On Behalf Of </b>Nat Sakimura<br>
                                  <b>Sent:</b> Wednesday, February 20,
                                  2013 7:58 AM<br>
                                  <b>To:</b> &lt;<a
                                    moz-do-not-send="true"
                                    href="mailto:oauth@ietf.org"
                                    target="_blank">oauth@ietf.org</a>&gt;;
                                  Richer, Justin P.; John Bradley</span></p>
                              <div>
                                <p class="MsoNormal"><br>
                                  <b>Subject:</b> Re: [OAUTH-WG] I-D
                                  Action:
                                  draft-ietf-oauth-dyn-reg-06.txt</p>
                              </div>
                              <p class="MsoNormal"> </p>
                              <p class="MsoNormal"><span
style="font-size:13.5pt;font-family:&quot;Arial&quot;,&quot;sans-serif&quot;;color:#222222;background:white">Thanks
                                  Justin.</span></p>
                              <div>
                                <div>
                                  <p class="MsoNormal"><span
style="font-size:13.5pt;font-family:&quot;Arial&quot;,&quot;sans-serif&quot;;color:#222222"><br>
                                      <br>
                                      <span style="background:white">Even
                                        if we go flat rather than doing
                                        JSON Structure, the "Client</span><br>
                                      <span style="background:white">Registration
                                        Access Endpoint" is not a good
                                        representative name.</span><br>
                                      <br>
                                      <span style="background:white">What
                                        it represents is the client
                                        metadata/info.</span><br>
                                      <span style="background:white">It
                                        is not representing "Client
                                        Registration Access". </span></span></p>
                                </div>
                              </div>
                              <div>
                                <div>
                                  <div>
                                    <p class="MsoNormal">What does
                                      "Client Registration Access"
                                      mean? </p>
                                  </div>
                                  <div>
                                    <p class="MsoNormal"
                                      style="margin-bottom:12.0pt"><span
style="font-size:13.5pt;font-family:&quot;Arial&quot;,&quot;sans-serif&quot;;color:#222222;background:white">Does
                                        UPDATing "Cleint Registration
                                        Access" make sense?</span><br>
                                      <span
style="font-size:13.5pt;font-family:&quot;Arial&quot;,&quot;sans-serif&quot;;color:#222222"><br>
                                        <span style="background:white">Something
                                          in the line of "Client
                                          Metadata Endpoint" and</span><br>
                                        <span style="background:white">something
                                          like "client_metadata_url"
                                          or "client_info_url" is much
                                          better.</span><br>
                                        <br>
                                        <span style="background:white">Nat</span></span></p>
                                    <div>
                                      <p class="MsoNormal">2013/2/15
                                        Richer, Justin P. &lt;<a
                                          moz-do-not-send="true"
                                          href="mailto:jricher@mitre.org"
                                          target="_blank">jricher@mitre.org</a>&gt;</p>
                                      <p class="MsoNormal">Everyone,
                                        there's a new draft of DynReg up
                                        on the tracker. This draft tries
                                        to codify the discussions so far
                                        from this week into something we
                                        can all read. There are still
                                        plenty of open discussion points
                                        and items up for debate. Please
                                        read through this latest draft
                                        and see what's changed and help
                                        assure that it properly captures
                                        the conversations. If you have
                                        any inputs for the marked [[
                                        Editor's Note ]] sections,
                                        please send them to the list by
                                        next Thursday to give me
                                        opportunity to get any necessary
                                        changes in by the cutoff date of
                                        Monday the 22nd.<br>
                                        <br>
                                        Thanks for all of your hard work
                                        everyone, I think this is
                                        *really* coming along now.<br>
                                        <span style="color:#888888"><br>
                                           -- Justin</span></p>
                                      <div>
                                        <div>
                                          <p class="MsoNormal"><br>
                                            On Feb 15, 2013, at 4:54 PM,
                                            <a moz-do-not-send="true"
                                              href="mailto:internet-drafts@ietf.org"
                                              target="_blank">
                                              internet-drafts@ietf.org</a>
                                            wrote:<br>
                                            <br>
                                            &gt;<br>
                                            &gt; A New Internet-Draft is
                                            available from the on-line
                                            Internet-Drafts directories.<br>
                                            &gt; This draft is a work
                                            item of the Web
                                            Authorization Protocol
                                            Working Group of the IETF.<br>
                                            &gt;<br>
                                            &gt;       Title           :
                                            OAuth Dynamic Client
                                            Registration Protocol<br>
                                            &gt;       Author(s)       :
                                            Justin Richer<br>
                                            &gt;                        
                                             John Bradley<br>
                                            &gt;                        
                                             Michael B. Jones<br>
                                            &gt;                        
                                             Maciej Machulak<br>
                                            &gt;       Filename        :
draft-ietf-oauth-dyn-reg-06.txt<br>
                                            &gt;       Pages           :
                                            21<br>
                                            &gt;       Date            :
                                            2013-02-15<br>
                                            &gt;<br>
                                            &gt; Abstract:<br>
                                            &gt;   This specification
                                            defines an endpoint and
                                            protocol for dynamic<br>
                                            &gt;   registration of OAuth
                                            Clients at an Authorization
                                            Server.<br>
                                            &gt;<br>
                                            &gt;<br>
                                            &gt; The IETF datatracker
                                            status page for this draft
                                            is:<br>
                                            &gt; <a
                                              moz-do-not-send="true"
                                              href="https://datatracker.ietf.org/doc/draft-ietf-oauth-dyn-reg"
                                              target="_blank">
https://datatracker.ietf.org/doc/draft-ietf-oauth-dyn-reg</a><br>
                                            &gt;<br>
                                            &gt; There's also a htmlized
                                            version available at:<br>
                                            &gt; <a
                                              moz-do-not-send="true"
                                              href="http://tools.ietf.org/html/draft-ietf-oauth-dyn-reg-06"
                                              target="_blank">
http://tools.ietf.org/html/draft-ietf-oauth-dyn-reg-06</a><br>
                                            &gt;<br>
                                            &gt; A diff from the
                                            previous version is
                                            available at:<br>
                                            &gt; <a
                                              moz-do-not-send="true"
                                              href="http://www.ietf.org/rfcdiff?url2=draft-ietf-oauth-dyn-reg-06"
                                              target="_blank">
http://www.ietf.org/rfcdiff?url2=draft-ietf-oauth-dyn-reg-06</a><br>
                                            &gt;<br>
                                            &gt;<br>
                                            &gt; Internet-Drafts are
                                            also available by anonymous
                                            FTP at:<br>
                                            &gt; <a
                                              moz-do-not-send="true"
                                              href="ftp://ftp.ietf.org/internet-drafts/"
                                              target="_blank">ftp://ftp.ietf.org/internet-drafts/</a><br>
                                            &gt;<br>
                                            &gt;
                                            _______________________________________________<br>
                                            &gt; OAuth mailing list<br>
                                            &gt; <a
                                              moz-do-not-send="true"
                                              href="mailto:OAuth@ietf.org"
                                              target="_blank">OAuth@ietf.org</a><br>
                                            &gt; <a
                                              moz-do-not-send="true"
                                              href="https://www.ietf.org/mailman/listinfo/oauth"
                                              target="_blank">https://www.ietf.org/mailman/listinfo/oauth</a><br>
                                            <br>
_______________________________________________<br>
                                            OAuth mailing list<br>
                                            <a moz-do-not-send="true"
                                              href="mailto:OAuth@ietf.org"
                                              target="_blank">OAuth@ietf.org</a><br>
                                            <a moz-do-not-send="true"
                                              href="https://www.ietf.org/mailman/listinfo/oauth"
                                              target="_blank">https://www.ietf.org/mailman/listinfo/oauth</a></p>
                                        </div>
                                      </div>
                                    </div>
                                    <p class="MsoNormal"><br>
                                      <br clear="all">
                                    </p>
                                    <div>
                                      <p class="MsoNormal"> </p>
                                    </div>
                                    <p class="MsoNormal">--
                                      <br>
                                      Nat Sakimura (=nat)</p>
                                    <div>
                                      <p class="MsoNormal">Chairman,
                                        OpenID Foundation<br>
                                        <a moz-do-not-send="true"
                                          href="http://nat.sakimura.org/"
                                          target="_blank">http://nat.sakimura.org/</a><br>
                                        @_nat_en</p>
                                    </div>
                                  </div>
                                </div>
                              </div>
                            </div>
                          </div>
                        </div>
                        <p class="MsoNormal"><br>
                          <br clear="all">
                        </p>
                        <div>
                          <p class="MsoNormal"> </p>
                        </div>
                        <p class="MsoNormal">-- <br>
                          Nat Sakimura (=nat)</p>
                        <div>
                          <p class="MsoNormal">Chairman, OpenID
                            Foundation<br>
                            <a moz-do-not-send="true"
                              href="http://nat.sakimura.org/"
                              target="_blank">http://nat.sakimura.org/</a><br>
                            @_nat_en</p>
                        </div>
                      </div>
                    </div>
                  </div>
                </div>
              </div>
            </div>
          </blockquote>
        </div>
        <br>
        <br clear="all">
        <div><br>
        </div>
        -- <br>
        Nat Sakimura (=nat)
        <div>Chairman, OpenID Foundation<br>
          <a moz-do-not-send="true" href="http://nat.sakimura.org/"
            target="_blank">http://nat.sakimura.org/</a><br>
          @_nat_en</div>
      </div>
    </blockquote>
    <br>
  </body>
</html>

--------------040405010901080302000403--

From Michael.Jones@microsoft.com  Wed Feb 20 10:14:19 2013
Return-Path: <Michael.Jones@microsoft.com>
X-Original-To: oauth@ietfa.amsl.com
Delivered-To: oauth@ietfa.amsl.com
Received: from localhost (localhost [127.0.0.1]) by ietfa.amsl.com (Postfix) with ESMTP id D659A21F8881 for <oauth@ietfa.amsl.com>; Wed, 20 Feb 2013 10:14:19 -0800 (PST)
X-Virus-Scanned: amavisd-new at amsl.com
X-Spam-Flag: NO
X-Spam-Score: -2.585
X-Spam-Level: 
X-Spam-Status: No, score=-2.585 tagged_above=-999 required=5 tests=[AWL=0.013,  BAYES_00=-2.599, HTML_MESSAGE=0.001]
Received: from mail.ietf.org ([64.170.98.30]) by localhost (ietfa.amsl.com [127.0.0.1]) (amavisd-new, port 10024) with ESMTP id xxtzMBZNUtGy for <oauth@ietfa.amsl.com>; Wed, 20 Feb 2013 10:14:14 -0800 (PST)
Received: from na01-bl2-obe.outbound.protection.outlook.com (na01-bl2-obe.ptr.protection.outlook.com [65.55.169.25]) by ietfa.amsl.com (Postfix) with ESMTP id 6D7B221F8880 for <oauth@ietf.org>; Wed, 20 Feb 2013 10:14:14 -0800 (PST)
Received: from BL2FFO11FD014.protection.gbl (10.173.161.200) by BL2FFO11HUB009.protection.gbl (10.173.161.111) with Microsoft SMTP Server (TLS) id 15.0.620.12; Wed, 20 Feb 2013 18:14:02 +0000
Received: from TK5EX14HUBC103.redmond.corp.microsoft.com (131.107.125.37) by BL2FFO11FD014.mail.protection.outlook.com (10.173.160.222) with Microsoft SMTP Server (TLS) id 15.0.620.12 via Frontend Transport; Wed, 20 Feb 2013 18:14:02 +0000
Received: from TK5EX14MBXC284.redmond.corp.microsoft.com ([169.254.1.96]) by TK5EX14HUBC103.redmond.corp.microsoft.com ([157.54.86.9]) with mapi id 14.02.0318.003; Wed, 20 Feb 2013 18:13:33 +0000
From: Mike Jones <Michael.Jones@microsoft.com>
To: Justin Richer <jricher@mitre.org>, Nat Sakimura <sakimura@gmail.com>
Thread-Topic: [OAUTH-WG] I-D Action: draft-ietf-oauth-dyn-reg-06.txt
Thread-Index: AQHOC8cMkbohP5vU0EO7eTLi/U/hMJh7eCuAgAd2gACAAAA6MIAADyiAgAAAlPCAAAbqAIAADigAgAAAsbA=
Date: Wed, 20 Feb 2013 18:13:32 +0000
Message-ID: <4E1F6AAD24975D4BA5B16804296739436747B2BB@TK5EX14MBXC284.redmond.corp.microsoft.com>
References: <20130215215423.23019.50224.idtracker@ietfa.amsl.com> <B33BFB58CCC8BE4998958016839DE27E06894B4F@IMCMBX01.MITRE.ORG> <CABzCy2CgnAtPrTY37H6vO-+5u3tRmsm+1j86r3w046AhHnNdfw@mail.gmail.com> <4E1F6AAD24975D4BA5B16804296739436747A665@TK5EX14MBXC284.redmond.corp.microsoft.com> <CABzCy2DHvFVmtv9jB-re5efKEVrfBBk4BZ83n_EQLMHOqsnXcA@mail.gmail.com> <4E1F6AAD24975D4BA5B16804296739436747ADDB@TK5EX14MBXC284.redmond.corp.microsoft.com> <CABzCy2AyCDxc+Gov7zBnTRquzp+QUMF8riqd_8vcP0rHFQUtkQ@mail.gmail.com> <512511B0.5090102@mitre.org>
In-Reply-To: <512511B0.5090102@mitre.org>
Accept-Language: en-US
Content-Language: en-US
X-MS-Has-Attach: 
X-MS-TNEF-Correlator: 
x-originating-ip: [157.54.51.33]
Content-Type: multipart/alternative; boundary="_000_4E1F6AAD24975D4BA5B16804296739436747B2BBTK5EX14MBXC284r_"
MIME-Version: 1.0
X-Forefront-Antispam-Report: CIP:131.107.125.37; CTRY:US; IPV:CAL; IPV:NLI; EFV:NLI; SFV:NSPM; SFS:(51704002)(377424002)(377454001)(51444002)(65554002)(24454001)(69224001)(479174001)(189002)(199002)(56816002)(4396001)(50986001)(16236675001)(31966008)(47736001)(74662001)(66066001)(16297215001)(74502001)(47446002)(80022001)(79102001)(76482001)(49866001)(54316002)(33656001)(15202345001)(46102001)(55846006)(44976002)(63696002)(47976001)(54356001)(512954001)(16406001)(53806001)(59766001)(77982001)(5343635001)(5343655001)(65816001)(51856001)(56776001)(20776003); DIR:OUT; SFP:; SCL:1; SRVR:BL2FFO11HUB009; H:TK5EX14HUBC103.redmond.corp.microsoft.com; RD:InfoDomainNonexistent; MX:1; A:1; LANG:en; 
X-OriginatorOrg: microsoft.onmicrosoft.com
X-Forefront-PRVS: 07630F72AD
Cc: "<oauth@ietf.org>" <oauth@ietf.org>
Subject: Re: [OAUTH-WG] I-D Action: draft-ietf-oauth-dyn-reg-06.txt
X-BeenThere: oauth@ietf.org
X-Mailman-Version: 2.1.12
Precedence: list
List-Id: OAUTH WG <oauth.ietf.org>
List-Unsubscribe: <https://www.ietf.org/mailman/options/oauth>, <mailto:oauth-request@ietf.org?subject=unsubscribe>
List-Archive: <http://www.ietf.org/mail-archive/web/oauth>
List-Post: <mailto:oauth@ietf.org>
List-Help: <mailto:oauth-request@ietf.org?subject=help>
List-Subscribe: <https://www.ietf.org/mailman/listinfo/oauth>, <mailto:oauth-request@ietf.org?subject=subscribe>
X-List-Received-Date: Wed, 20 Feb 2013 18:14:20 -0000

--_000_4E1F6AAD24975D4BA5B16804296739436747B2BBTK5EX14MBXC284r_
Content-Type: text/plain; charset="us-ascii"
Content-Transfer-Encoding: quoted-printable

SGTM

From: Justin Richer [mailto:jricher@mitre.org]
Sent: Wednesday, February 20, 2013 10:11 AM
To: Nat Sakimura
Cc: Mike Jones; <oauth@ietf.org>; John Bradley
Subject: Re: [OAUTH-WG] I-D Action: draft-ietf-oauth-dyn-reg-06.txt

I like "registered_client_uri", given all of the other discussions on this =
thread, because:

URL/URI: It *is* a URL, and an https one at that, but if the IETF conventio=
n is to call it URI, then I'm fine with that.

registered_client/registration_access: The former is a good description of =
what's actually *at* the URL, which fits better with the RESTful entity mod=
el. I think Nat's criticisms about the original formation of the parameter =
name are spot on, though at the time we hadn't heard anything better.


So I'd like to change it to "registered_client_uri" in the next draft.

 -- Justin
On 02/20/2013 12:20 PM, Nat Sakimura wrote:
I have thought about that as well. The the reason I added "info" or "metada=
ta" was that what was behind the URL is not the client itself. By "client r=
egistration", I suppose you mean "client entry in the register" (cf. regist=
ration n 2.) . It is the "registered data/info/metadata" about the client.

Nat
2013/2/20 Mike Jones <Michael.Jones@microsoft.com<mailto:Michael.Jones@micr=
osoft.com>>
I could live with "registered_client_url".  I think that adding "_metadata"=
 or "_info" is incorrect, because what's being accessed is the client' regi=
stration - not just metadata or info about the client's registration (altho=
ugh that information can be retrieved as one aspect of the operations on th=
e client's registration).

                                                            -- Mike

From: Nat Sakimura [mailto:sakimura@gmail.com<mailto:sakimura@gmail.com>]
Sent: Wednesday, February 20, 2013 8:53 AM
To: Mike Jones
Cc: <oauth@ietf.org<mailto:oauth@ietf.org>>; Richer, Justin P.; John Bradle=
y

Subject: Re: [OAUTH-WG] I-D Action: draft-ietf-oauth-dyn-reg-06.txt

I have read the whole thing and still ---

Your argument that it is the place for using "registration access token" th=
us should have a parallel name "registration access url" is very weak. Ther=
e are several weakness.

First, "registration access token" actually is "registration" + "access tok=
en". Extracting "registration access" from "registration access token" is b=
roken.

Secondly, access token is used to against any protected resource. Recommend=
ing to use the word "access" in naming protected resources is broken. Shoul=
d we rename Userinfo endpoint to something like "Userinfo Access Endpoint"?=
 I do not think so.

Thirdly, the term "Registration Access" does not seem to be meaningful.
When you say "access", I suppose you are using the noun version of it.
(If you are using the verb, then I am even more against as a URL should not=
 contain a verb.)

According to the Webster, access (n.) is defined as:

access n.

1
a : onset<http://www.merriam-webster.com/dictionary/onset> 2
b : a fit of intense feeling : outburst<http://www.merriam-webster.com/dict=
ionary/outburst>
2
a : permission, liberty, or ability to enter, approach, or pass to and from=
 a place or to approach or communicate with a person or thing
b : freedom or ability to obtain or make use of something
c : a way or means of access
d : the act or an instance of accessing<http://www.merriam-webster.com/dict=
ionary/accessing>
3
: an increase by addition <a sudden access of wealth>

Replacing "access" with any of the definition above does not seem to work.

Remember, a URL is represents a "thing".
The name of the endpoint should represent the "thing".

I am merginally OK with "client registration url" leveraging on the definit=
ion 2. below (again from Webster -- my OED subscription lapsed for the time=
 being.)

registration n.

1
: the act of registering<http://www.merriam-webster.com/dictionary/register=
ing>
2
: an entry in a register<http://www.merriam-webster.com/dictionary/register=
>
3
: the number of individuals registered<http://www.merriam-webster.com/dicti=
onary/registered> : enrollment<http://www.merriam-webster.com/dictionary/en=
rollment>
4
a : the art or act of selecting and adjusting pipe organ stops
b : the combination of stops selected for performing a particular organ wor=
k
5
: a document certifying an act of registering

However, since the most common use of "registration" is actually 1 above, i=
t still is confusing. If you really want to emphasize the fact that it has =
been registered, then something like "registered client info uri" or "regis=
tered client metadata uri" would be better.

Nat


2013/2/20 Mike Jones <Michael.Jones@microsoft.com<mailto:Michael.Jones@micr=
osoft.com>>
For what it's worth, the name "registration_access_url" was chosen to be pa=
rallel to "registration_access_token".   It's the place you use the access =
token.  And it's where you access an existing registration.  I'm against th=
e name "client_metadata_url" because it's not metadata you're accessing - i=
t's a registration you're accessing.  For the same reason, I don't think th=
e name "client_info_url" gives people the right idea, because it doesn't sa=
y anything it being the registration that you're accessing.

If you really want us to change this, having read what's above, I could liv=
e with "client_registration_url", but I don't think a change is actually ne=
cessary.  (But if we are going to change it, let's do it ASAP, before the O=
penID Connect Implementer's Drafts are published.)

                                                            -- Mike

From: oauth-bounces@ietf.org<mailto:oauth-bounces@ietf.org> [mailto:oauth-b=
ounces@ietf.org<mailto:oauth-bounces@ietf.org>] On Behalf Of Nat Sakimura
Sent: Wednesday, February 20, 2013 7:58 AM
To: <oauth@ietf.org<mailto:oauth@ietf.org>>; Richer, Justin P.; John Bradle=
y

Subject: Re: [OAUTH-WG] I-D Action: draft-ietf-oauth-dyn-reg-06.txt

Thanks Justin.


Even if we go flat rather than doing JSON Structure, the "Client
Registration Access Endpoint" is not a good representative name.

What it represents is the client metadata/info.
It is not representing "Client Registration Access".
What does "Client Registration Access" mean?
Does UPDATing "Cleint Registration Access" make sense?

Something in the line of "Client Metadata Endpoint" and
something like "client_metadata_url" or "client_info_url" is much better.

Nat
2013/2/15 Richer, Justin P. <jricher@mitre.org<mailto:jricher@mitre.org>>
Everyone, there's a new draft of DynReg up on the tracker. This draft tries=
 to codify the discussions so far from this week into something we can all =
read. There are still plenty of open discussion points and items up for deb=
ate. Please read through this latest draft and see what's changed and help =
assure that it properly captures the conversations. If you have any inputs =
for the marked [[ Editor's Note ]] sections, please send them to the list b=
y next Thursday to give me opportunity to get any necessary changes in by t=
he cutoff date of Monday the 22nd.

Thanks for all of your hard work everyone, I think this is *really* coming =
along now.

 -- Justin

On Feb 15, 2013, at 4:54 PM, internet-drafts@ietf.org<mailto:internet-draft=
s@ietf.org> wrote:

>
> A New Internet-Draft is available from the on-line Internet-Drafts direct=
ories.
> This draft is a work item of the Web Authorization Protocol Working Group=
 of the IETF.
>
>       Title           : OAuth Dynamic Client Registration Protocol
>       Author(s)       : Justin Richer
>                          John Bradley
>                          Michael B. Jones
>                          Maciej Machulak
>       Filename        : draft-ietf-oauth-dyn-reg-06.txt
>       Pages           : 21
>       Date            : 2013-02-15
>
> Abstract:
>   This specification defines an endpoint and protocol for dynamic
>   registration of OAuth Clients at an Authorization Server.
>
>
> The IETF datatracker status page for this draft is:
> https://datatracker.ietf.org/doc/draft-ietf-oauth-dyn-reg
>
> There's also a htmlized version available at:
> http://tools.ietf.org/html/draft-ietf-oauth-dyn-reg-06
>
> A diff from the previous version is available at:
> http://www.ietf.org/rfcdiff?url2=3Ddraft-ietf-oauth-dyn-reg-06
>
>
> Internet-Drafts are also available by anonymous FTP at:
> ftp://ftp.ietf.org/internet-drafts/
>
> _______________________________________________
> OAuth mailing list
> OAuth@ietf.org<mailto:OAuth@ietf.org>
> https://www.ietf.org/mailman/listinfo/oauth

_______________________________________________
OAuth mailing list
OAuth@ietf.org<mailto:OAuth@ietf.org>
https://www.ietf.org/mailman/listinfo/oauth



--
Nat Sakimura (=3Dnat)
Chairman, OpenID Foundation
http://nat.sakimura.org/
@_nat_en



--
Nat Sakimura (=3Dnat)
Chairman, OpenID Foundation
http://nat.sakimura.org/
@_nat_en



--
Nat Sakimura (=3Dnat)
Chairman, OpenID Foundation
http://nat.sakimura.org/
@_nat_en


--_000_4E1F6AAD24975D4BA5B16804296739436747B2BBTK5EX14MBXC284r_
Content-Type: text/html; charset="us-ascii"
Content-Transfer-Encoding: quoted-printable

<html xmlns:v=3D"urn:schemas-microsoft-com:vml" xmlns:o=3D"urn:schemas-micr=
osoft-com:office:office" xmlns:w=3D"urn:schemas-microsoft-com:office:word" =
xmlns:m=3D"http://schemas.microsoft.com/office/2004/12/omml" xmlns=3D"http:=
//www.w3.org/TR/REC-html40">
<head>
<meta http-equiv=3D"Content-Type" content=3D"text/html; charset=3Dus-ascii"=
>
<meta name=3D"Generator" content=3D"Microsoft Word 14 (filtered medium)">
<style><!--
/* Font Definitions */
@font-face
	{font-family:Calibri;
	panose-1:2 15 5 2 2 2 4 3 2 4;}
@font-face
	{font-family:Tahoma;
	panose-1:2 11 6 4 3 5 4 4 2 4;}
@font-face
	{font-family:Verdana;
	panose-1:2 11 6 4 3 5 4 4 2 4;}
/* Style Definitions */
p.MsoNormal, li.MsoNormal, div.MsoNormal
	{margin:0in;
	margin-bottom:.0001pt;
	font-size:12.0pt;
	font-family:"Times New Roman","serif";
	color:black;}
a:link, span.MsoHyperlink
	{mso-style-priority:99;
	color:blue;
	text-decoration:underline;}
a:visited, span.MsoHyperlinkFollowed
	{mso-style-priority:99;
	color:purple;
	text-decoration:underline;}
p.MsoAcetate, li.MsoAcetate, div.MsoAcetate
	{mso-style-priority:99;
	mso-style-link:"Balloon Text Char";
	margin:0in;
	margin-bottom:.0001pt;
	font-size:8.0pt;
	font-family:"Tahoma","sans-serif";
	color:black;}
span.EmailStyle19
	{mso-style-type:personal-reply;
	font-family:"Calibri","sans-serif";
	color:#1F497D;}
span.BalloonTextChar
	{mso-style-name:"Balloon Text Char";
	mso-style-priority:99;
	mso-style-link:"Balloon Text";
	font-family:"Tahoma","sans-serif";
	color:black;}
.MsoChpDefault
	{mso-style-type:export-only;
	font-size:10.0pt;}
@page WordSection1
	{size:8.5in 11.0in;
	margin:1.0in 1.0in 1.0in 1.0in;}
div.WordSection1
	{page:WordSection1;}
--></style><!--[if gte mso 9]><xml>
<o:shapedefaults v:ext=3D"edit" spidmax=3D"1026" />
</xml><![endif]--><!--[if gte mso 9]><xml>
<o:shapelayout v:ext=3D"edit">
<o:idmap v:ext=3D"edit" data=3D"1" />
</o:shapelayout></xml><![endif]-->
</head>
<body bgcolor=3D"white" lang=3D"EN-US" link=3D"blue" vlink=3D"purple">
<div class=3D"WordSection1">
<p class=3D"MsoNormal"><span style=3D"font-size:11.0pt;font-family:&quot;Ca=
libri&quot;,&quot;sans-serif&quot;;color:#1F497D">SGTM<o:p></o:p></span></p=
>
<p class=3D"MsoNormal"><span style=3D"font-size:11.0pt;font-family:&quot;Ca=
libri&quot;,&quot;sans-serif&quot;;color:#1F497D"><o:p>&nbsp;</o:p></span><=
/p>
<div>
<div style=3D"border:none;border-top:solid #B5C4DF 1.0pt;padding:3.0pt 0in =
0in 0in">
<p class=3D"MsoNormal"><b><span style=3D"font-size:10.0pt;font-family:&quot=
;Tahoma&quot;,&quot;sans-serif&quot;;color:windowtext">From:</span></b><spa=
n style=3D"font-size:10.0pt;font-family:&quot;Tahoma&quot;,&quot;sans-serif=
&quot;;color:windowtext"> Justin Richer [mailto:jricher@mitre.org]
<br>
<b>Sent:</b> Wednesday, February 20, 2013 10:11 AM<br>
<b>To:</b> Nat Sakimura<br>
<b>Cc:</b> Mike Jones; &lt;oauth@ietf.org&gt;; John Bradley<br>
<b>Subject:</b> Re: [OAUTH-WG] I-D Action: draft-ietf-oauth-dyn-reg-06.txt<=
o:p></o:p></span></p>
</div>
</div>
<p class=3D"MsoNormal"><o:p>&nbsp;</o:p></p>
<p class=3D"MsoNormal" style=3D"margin-bottom:12.0pt">I like &quot;register=
ed_client_uri&quot;, given all of the other discussions on this thread, bec=
ause:<br>
<br>
URL/URI: It *is* a URL, and an https one at that, but if the IETF conventio=
n is to call it URI, then I'm fine with that.<br>
<br>
registered_client/registration_access: The former is a good description of =
what's actually *at* the URL, which fits better with the RESTful entity mod=
el. I think Nat's criticisms about the original formation of the parameter =
name are spot on, though at the
 time we hadn't heard anything better.<br>
<br>
<br>
So I'd like to change it to &quot;registered_client_uri&quot; in the next d=
raft.<br>
<br>
&nbsp;-- Justin<o:p></o:p></p>
<div>
<p class=3D"MsoNormal">On 02/20/2013 12:20 PM, Nat Sakimura wrote:<o:p></o:=
p></p>
</div>
<blockquote style=3D"margin-top:5.0pt;margin-bottom:5.0pt">
<p class=3D"MsoNormal">I have thought about that as well. The the reason I =
added &quot;info&quot; or &quot;metadata&quot; was that what was behind the=
 URL is not the client itself. By &quot;client registration&quot;, I suppos=
e you mean &quot;client entry in the register&quot; (cf.
<b>registration </b><i>n</i> 2.) . It is the &quot;registered data/info/met=
adata&quot; about the client.&nbsp;
<o:p></o:p></p>
<div>
<p class=3D"MsoNormal"><o:p>&nbsp;</o:p></p>
</div>
<div>
<p class=3D"MsoNormal" style=3D"margin-bottom:12.0pt">Nat<o:p></o:p></p>
<div>
<p class=3D"MsoNormal">2013/2/20 Mike Jones &lt;<a href=3D"mailto:Michael.J=
ones@microsoft.com" target=3D"_blank">Michael.Jones@microsoft.com</a>&gt;<o=
:p></o:p></p>
<div>
<div>
<p class=3D"MsoNormal" style=3D"mso-margin-top-alt:auto;mso-margin-bottom-a=
lt:auto"><span style=3D"font-size:11.0pt;font-family:&quot;Calibri&quot;,&q=
uot;sans-serif&quot;;color:#1F497D">I could live with &#8220;registered_cli=
ent_url&#8221;.&nbsp; I think that adding &#8220;_metadata&#8221; or &#8220=
;_info&#8221; is incorrect,
 because what&#8217;s being accessed is the client&#8217; registration &#82=
11; not just metadata or info about the client&#8217;s registration (althou=
gh that information can be retrieved as one aspect of the operations on the=
 client&#8217;s registration).</span><o:p></o:p></p>
<p class=3D"MsoNormal" style=3D"mso-margin-top-alt:auto;mso-margin-bottom-a=
lt:auto"><span style=3D"font-size:11.0pt;font-family:&quot;Calibri&quot;,&q=
uot;sans-serif&quot;;color:#1F497D">&nbsp;</span><o:p></o:p></p>
<p class=3D"MsoNormal" style=3D"mso-margin-top-alt:auto;mso-margin-bottom-a=
lt:auto"><span style=3D"font-size:11.0pt;font-family:&quot;Calibri&quot;,&q=
uot;sans-serif&quot;;color:#1F497D">&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nb=
sp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;=
&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nb=
sp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;=
&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nb=
sp;&nbsp;&nbsp; -- Mike</span><o:p></o:p></p>
<p class=3D"MsoNormal" style=3D"mso-margin-top-alt:auto;mso-margin-bottom-a=
lt:auto"><span style=3D"font-size:11.0pt;font-family:&quot;Calibri&quot;,&q=
uot;sans-serif&quot;;color:#1F497D">&nbsp;</span><o:p></o:p></p>
<p class=3D"MsoNormal" style=3D"mso-margin-top-alt:auto;mso-margin-bottom-a=
lt:auto"><b><span style=3D"font-size:10.0pt;font-family:&quot;Tahoma&quot;,=
&quot;sans-serif&quot;">From:</span></b><span style=3D"font-size:10.0pt;fon=
t-family:&quot;Tahoma&quot;,&quot;sans-serif&quot;"> Nat Sakimura [mailto:<=
a href=3D"mailto:sakimura@gmail.com" target=3D"_blank">sakimura@gmail.com</=
a>]
<br>
<b>Sent:</b> Wednesday, February 20, 2013 8:53 AM<br>
<b>To:</b> Mike Jones<br>
<b>Cc:</b> &lt;<a href=3D"mailto:oauth@ietf.org" target=3D"_blank">oauth@ie=
tf.org</a>&gt;; Richer, Justin P.; John Bradley</span><o:p></o:p></p>
<div>
<div>
<p class=3D"MsoNormal"><br>
<b>Subject:</b> Re: [OAUTH-WG] I-D Action: draft-ietf-oauth-dyn-reg-06.txt<=
o:p></o:p></p>
</div>
</div>
<div>
<div>
<p class=3D"MsoNormal" style=3D"mso-margin-top-alt:auto;mso-margin-bottom-a=
lt:auto">&nbsp;<o:p></o:p></p>
<p class=3D"MsoNormal" style=3D"mso-margin-top-alt:auto;mso-margin-bottom-a=
lt:auto">I have read the whole thing and still ---&nbsp;<o:p></o:p></p>
<div>
<p class=3D"MsoNormal" style=3D"mso-margin-top-alt:auto;mso-margin-bottom-a=
lt:auto">&nbsp;<o:p></o:p></p>
</div>
<div>
<p class=3D"MsoNormal" style=3D"mso-margin-top-alt:auto;mso-margin-bottom-a=
lt:auto">Your argument that it is the place for using &quot;registration ac=
cess token&quot; thus should have a parallel name &quot;registration access=
 url&quot; is very weak. There are several weakness.&nbsp;<o:p></o:p></p>
</div>
<div>
<p class=3D"MsoNormal" style=3D"mso-margin-top-alt:auto;mso-margin-bottom-a=
lt:auto">&nbsp;<o:p></o:p></p>
</div>
<div>
<p class=3D"MsoNormal" style=3D"mso-margin-top-alt:auto;mso-margin-bottom-a=
lt:auto">First, &quot;registration access token&quot; actually is &quot;reg=
istration&quot; &#43; &quot;access token&quot;. Extracting &quot;registrati=
on access&quot; from &quot;registration access token&quot; is broken.&nbsp;=
<o:p></o:p></p>
</div>
<div>
<p class=3D"MsoNormal" style=3D"mso-margin-top-alt:auto;mso-margin-bottom-a=
lt:auto">&nbsp;<o:p></o:p></p>
</div>
<div>
<p class=3D"MsoNormal" style=3D"mso-margin-top-alt:auto;mso-margin-bottom-a=
lt:auto">Secondly, access token is used to against any protected resource.&=
nbsp;Recommending&nbsp;to use the word &quot;access&quot; in naming protect=
ed resources is broken. Should we rename Userinfo endpoint
 to something like &quot;Userinfo Access Endpoint&quot;? I do not think so.=
&nbsp;<o:p></o:p></p>
</div>
<div>
<p class=3D"MsoNormal" style=3D"mso-margin-top-alt:auto;mso-margin-bottom-a=
lt:auto">&nbsp;<o:p></o:p></p>
</div>
<div>
<p class=3D"MsoNormal" style=3D"mso-margin-top-alt:auto;mso-margin-bottom-a=
lt:auto">Thirdly, the term &quot;Registration Access&quot; does not seem to=
 be meaningful.&nbsp;<o:p></o:p></p>
</div>
<div>
<p class=3D"MsoNormal" style=3D"mso-margin-top-alt:auto;mso-margin-bottom-a=
lt:auto">When you say &quot;access&quot;, I suppose you are using the noun =
version of it.&nbsp;<o:p></o:p></p>
</div>
<div>
<div>
<p class=3D"MsoNormal" style=3D"mso-margin-top-alt:auto;mso-margin-bottom-a=
lt:auto">(If you are using the verb, then I am even more against as a URL s=
hould not contain a verb.)&nbsp;<o:p></o:p></p>
</div>
<div>
<p class=3D"MsoNormal" style=3D"mso-margin-top-alt:auto;mso-margin-bottom-a=
lt:auto">&nbsp;<o:p></o:p></p>
</div>
<div>
<p class=3D"MsoNormal" style=3D"mso-margin-top-alt:auto;mso-margin-bottom-a=
lt:auto">According to the Webster, access (n.) is defined as:&nbsp;<o:p></o=
:p></p>
</div>
<div>
<p class=3D"MsoNormal" style=3D"mso-margin-top-alt:auto;mso-margin-bottom-a=
lt:auto">&nbsp;<o:p></o:p></p>
</div>
<div>
<p class=3D"MsoNormal" style=3D"mso-margin-top-alt:auto;mso-margin-bottom-a=
lt:auto"><b>access
</b><i>n.</i><o:p></o:p></p>
</div>
<div>
<p class=3D"MsoNormal" style=3D"mso-margin-top-alt:auto;mso-margin-bottom-a=
lt:auto">&nbsp;<o:p></o:p></p>
</div>
<div>
<div>
<div>
<p class=3D"MsoNormal" style=3D"mso-margin-top-alt:auto;mso-margin-bottom-a=
lt:auto;line-height:15.0pt;background:white">
<b><span style=3D"font-size:9.5pt;font-family:&quot;Verdana&quot;,&quot;san=
s-serif&quot;">1</span></b><o:p></o:p></p>
</div>
<div style=3D"margin-left:15.0pt;margin-bottom:7.5pt">
<p class=3D"MsoNormal" style=3D"mso-margin-top-alt:auto;mso-margin-bottom-a=
lt:auto;line-height:15.0pt;background:white">
<em><b><span style=3D"font-size:9.5pt;font-family:&quot;Verdana&quot;,&quot=
;sans-serif&quot;;font-style:normal">a</span></b></em><span style=3D"font-s=
ize:9.5pt;font-family:&quot;Verdana&quot;,&quot;sans-serif&quot;">&nbsp;<st=
rong><span style=3D"font-family:&quot;Verdana&quot;,&quot;sans-serif&quot;"=
>:</span></strong>&nbsp;<a href=3D"http://www.merriam-webster.com/dictionar=
y/onset" target=3D"_blank"><span style=3D"font-variant:small-caps;color:#11=
22CC">onset</span></a>&nbsp;2</span><o:p></o:p></p>
<p class=3D"MsoNormal" style=3D"mso-margin-top-alt:auto;mso-margin-bottom-a=
lt:auto;line-height:15.0pt;background:white">
<em><b><span style=3D"font-size:9.5pt;font-family:&quot;Verdana&quot;,&quot=
;sans-serif&quot;;font-style:normal">b</span></b></em><span style=3D"font-s=
ize:9.5pt;font-family:&quot;Verdana&quot;,&quot;sans-serif&quot;">&nbsp;<st=
rong><span style=3D"font-family:&quot;Verdana&quot;,&quot;sans-serif&quot;"=
>:</span></strong>&nbsp;a fit of
 intense feeling&nbsp;<strong><span style=3D"font-family:&quot;Verdana&quot=
;,&quot;sans-serif&quot;">:</span></strong>&nbsp;<a href=3D"http://www.merr=
iam-webster.com/dictionary/outburst" target=3D"_blank"><span style=3D"font-=
variant:small-caps;color:#1122CC">outburst</span></a></span><o:p></o:p></p>
</div>
</div>
<div>
<div>
<p class=3D"MsoNormal" style=3D"mso-margin-top-alt:auto;mso-margin-bottom-a=
lt:auto;line-height:15.0pt;background:white">
<b><span style=3D"font-size:9.5pt;font-family:&quot;Verdana&quot;,&quot;san=
s-serif&quot;">2</span></b><o:p></o:p></p>
</div>
<div style=3D"margin-left:15.0pt;margin-bottom:7.5pt">
<p class=3D"MsoNormal" style=3D"mso-margin-top-alt:auto;mso-margin-bottom-a=
lt:auto;line-height:15.0pt;background:white">
<em><b><span style=3D"font-size:9.5pt;font-family:&quot;Verdana&quot;,&quot=
;sans-serif&quot;;font-style:normal">a</span></b></em><span style=3D"font-s=
ize:9.5pt;font-family:&quot;Verdana&quot;,&quot;sans-serif&quot;">&nbsp;<st=
rong><span style=3D"font-family:&quot;Verdana&quot;,&quot;sans-serif&quot;"=
>:</span></strong>&nbsp;permission,
 liberty, or ability to enter, approach, or pass to and from a place or to =
approach or communicate with a person or thing</span><o:p></o:p></p>
<p class=3D"MsoNormal" style=3D"mso-margin-top-alt:auto;mso-margin-bottom-a=
lt:auto;line-height:15.0pt;background:white">
<em><b><span style=3D"font-size:9.5pt;font-family:&quot;Verdana&quot;,&quot=
;sans-serif&quot;;font-style:normal">b</span></b></em><span style=3D"font-s=
ize:9.5pt;font-family:&quot;Verdana&quot;,&quot;sans-serif&quot;">&nbsp;<st=
rong><span style=3D"font-family:&quot;Verdana&quot;,&quot;sans-serif&quot;"=
>:</span></strong>&nbsp;freedom or
 ability to obtain or make use of something</span><o:p></o:p></p>
<p class=3D"MsoNormal" style=3D"mso-margin-top-alt:auto;mso-margin-bottom-a=
lt:auto;line-height:15.0pt;background:white">
<em><b><span style=3D"font-size:9.5pt;font-family:&quot;Verdana&quot;,&quot=
;sans-serif&quot;;font-style:normal">c</span></b></em><span style=3D"font-s=
ize:9.5pt;font-family:&quot;Verdana&quot;,&quot;sans-serif&quot;">&nbsp;<st=
rong><span style=3D"font-family:&quot;Verdana&quot;,&quot;sans-serif&quot;"=
>:</span></strong>&nbsp;a way or
 means of access</span><o:p></o:p></p>
<p class=3D"MsoNormal" style=3D"mso-margin-top-alt:auto;mso-margin-bottom-a=
lt:auto;line-height:15.0pt;background:white">
<em><b><span style=3D"font-size:9.5pt;font-family:&quot;Verdana&quot;,&quot=
;sans-serif&quot;;font-style:normal">d</span></b></em><span style=3D"font-s=
ize:9.5pt;font-family:&quot;Verdana&quot;,&quot;sans-serif&quot;">&nbsp;<st=
rong><span style=3D"font-family:&quot;Verdana&quot;,&quot;sans-serif&quot;"=
>:</span></strong>&nbsp;the act or
 an instance of&nbsp;<a href=3D"http://www.merriam-webster.com/dictionary/a=
ccessing" target=3D"_blank"><span style=3D"font-size:10.0pt;color:#1122CC">=
accessing</span></a></span><o:p></o:p></p>
</div>
</div>
<div>
<div>
<p class=3D"MsoNormal" style=3D"mso-margin-top-alt:auto;mso-margin-bottom-a=
lt:auto;line-height:15.0pt;background:white">
<b><span style=3D"font-size:9.5pt;font-family:&quot;Verdana&quot;,&quot;san=
s-serif&quot;">3</span></b><o:p></o:p></p>
</div>
<div style=3D"margin-left:15.0pt;margin-bottom:7.5pt">
<p class=3D"MsoNormal" style=3D"mso-margin-top-alt:auto;mso-margin-bottom-a=
lt:auto;line-height:15.0pt;background:white">
<strong><span style=3D"font-size:9.5pt;font-family:&quot;Verdana&quot;,&quo=
t;sans-serif&quot;">:</span></strong><span style=3D"font-size:9.5pt;font-fa=
mily:&quot;Verdana&quot;,&quot;sans-serif&quot;">&nbsp;an increase by addit=
ion&nbsp;&lt;a sudden&nbsp;<em><span style=3D"font-family:&quot;Verdana&quo=
t;,&quot;sans-serif&quot;">access</span></em>&nbsp;of
 wealth&gt;</span><o:p></o:p></p>
</div>
</div>
<div>
<p class=3D"MsoNormal" style=3D"mso-margin-top-alt:auto;mso-margin-bottom-a=
lt:auto">&nbsp;<o:p></o:p></p>
</div>
<div>
<p class=3D"MsoNormal" style=3D"mso-margin-top-alt:auto;mso-margin-bottom-a=
lt:auto">Replacing &quot;access&quot; with any of the definition above does=
 not seem to work.&nbsp;<o:p></o:p></p>
</div>
<div>
<p class=3D"MsoNormal" style=3D"mso-margin-top-alt:auto;mso-margin-bottom-a=
lt:auto">&nbsp;<o:p></o:p></p>
</div>
<div>
<p class=3D"MsoNormal" style=3D"mso-margin-top-alt:auto;mso-margin-bottom-a=
lt:auto">Remember, a URL is represents a &quot;thing&quot;.&nbsp;<o:p></o:p=
></p>
</div>
<div>
<p class=3D"MsoNormal" style=3D"mso-margin-top-alt:auto;mso-margin-bottom-a=
lt:auto">The name of the endpoint should represent the &quot;thing&quot;.&n=
bsp;<o:p></o:p></p>
</div>
<div>
<p class=3D"MsoNormal" style=3D"mso-margin-top-alt:auto;mso-margin-bottom-a=
lt:auto">&nbsp;<o:p></o:p></p>
</div>
<div>
<p class=3D"MsoNormal" style=3D"mso-margin-top-alt:auto;mso-margin-bottom-a=
lt:auto">I am merginally OK with &quot;client registration url&quot; levera=
ging on the definition 2. below (again from Webster -- my OED subscription =
lapsed for the time being.)&nbsp;<o:p></o:p></p>
</div>
<div>
<p class=3D"MsoNormal" style=3D"mso-margin-top-alt:auto;mso-margin-bottom-a=
lt:auto">&nbsp;<o:p></o:p></p>
</div>
<div>
<p class=3D"MsoNormal" style=3D"mso-margin-top-alt:auto;mso-margin-bottom-a=
lt:auto"><b>registration
</b><i>n.</i><o:p></o:p></p>
</div>
<div>
<p class=3D"MsoNormal" style=3D"mso-margin-top-alt:auto;mso-margin-bottom-a=
lt:auto">&nbsp;<o:p></o:p></p>
</div>
<div>
<div>
<div>
<p class=3D"MsoNormal" style=3D"mso-margin-top-alt:auto;mso-margin-bottom-a=
lt:auto;line-height:15.0pt;background:white">
<b><span style=3D"font-size:9.5pt;font-family:&quot;Verdana&quot;,&quot;san=
s-serif&quot;">1</span></b><o:p></o:p></p>
</div>
<div style=3D"margin-left:15.0pt;margin-bottom:7.5pt">
<p class=3D"MsoNormal" style=3D"mso-margin-top-alt:auto;mso-margin-bottom-a=
lt:auto;line-height:15.0pt;background:white">
<strong><span style=3D"font-size:9.5pt;font-family:&quot;Verdana&quot;,&quo=
t;sans-serif&quot;">:</span></strong><span style=3D"font-size:9.5pt;font-fa=
mily:&quot;Verdana&quot;,&quot;sans-serif&quot;">&nbsp;the act of&nbsp;<a h=
ref=3D"http://www.merriam-webster.com/dictionary/registering" target=3D"_bl=
ank"><span style=3D"font-size:10.0pt;color:#1122CC">registering</span></a><=
/span><o:p></o:p></p>
</div>
</div>
<div>
<div>
<p class=3D"MsoNormal" style=3D"mso-margin-top-alt:auto;mso-margin-bottom-a=
lt:auto;line-height:15.0pt;background:white">
<b><span style=3D"font-size:9.5pt;font-family:&quot;Verdana&quot;,&quot;san=
s-serif&quot;">2</span></b><o:p></o:p></p>
</div>
<div style=3D"margin-left:15.0pt;margin-bottom:7.5pt">
<p class=3D"MsoNormal" style=3D"mso-margin-top-alt:auto;mso-margin-bottom-a=
lt:auto;line-height:15.0pt;background:white">
<strong><span style=3D"font-size:9.5pt;font-family:&quot;Verdana&quot;,&quo=
t;sans-serif&quot;">:</span></strong><span style=3D"font-size:9.5pt;font-fa=
mily:&quot;Verdana&quot;,&quot;sans-serif&quot;">&nbsp;an entry in a&nbsp;<=
a href=3D"http://www.merriam-webster.com/dictionary/register" target=3D"_bl=
ank"><span style=3D"font-size:10.0pt;color:#1122CC">register</span></a></sp=
an><o:p></o:p></p>
</div>
</div>
<div>
<div>
<p class=3D"MsoNormal" style=3D"mso-margin-top-alt:auto;mso-margin-bottom-a=
lt:auto;line-height:15.0pt;background:white">
<b><span style=3D"font-size:9.5pt;font-family:&quot;Verdana&quot;,&quot;san=
s-serif&quot;">3</span></b><o:p></o:p></p>
</div>
<div style=3D"margin-left:15.0pt;margin-bottom:7.5pt">
<p class=3D"MsoNormal" style=3D"mso-margin-top-alt:auto;mso-margin-bottom-a=
lt:auto;line-height:15.0pt;background:white">
<strong><span style=3D"font-size:9.5pt;font-family:&quot;Verdana&quot;,&quo=
t;sans-serif&quot;">:</span></strong><span style=3D"font-size:9.5pt;font-fa=
mily:&quot;Verdana&quot;,&quot;sans-serif&quot;">&nbsp;the number of indivi=
duals&nbsp;<a href=3D"http://www.merriam-webster.com/dictionary/registered"=
 target=3D"_blank"><span style=3D"font-size:10.0pt;color:#1122CC">registere=
d</span></a>&nbsp;<strong><span style=3D"font-family:&quot;Verdana&quot;,&q=
uot;sans-serif&quot;">:</span></strong>&nbsp;<a href=3D"http://www.merriam-=
webster.com/dictionary/enrollment" target=3D"_blank"><span style=3D"font-va=
riant:small-caps;color:#1122CC">enrollment</span></a></span><o:p></o:p></p>
</div>
</div>
<div>
<div>
<p class=3D"MsoNormal" style=3D"mso-margin-top-alt:auto;mso-margin-bottom-a=
lt:auto;line-height:15.0pt;background:white">
<b><span style=3D"font-size:9.5pt;font-family:&quot;Verdana&quot;,&quot;san=
s-serif&quot;">4</span></b><o:p></o:p></p>
</div>
<div style=3D"margin-left:15.0pt;margin-bottom:7.5pt">
<p class=3D"MsoNormal" style=3D"mso-margin-top-alt:auto;mso-margin-bottom-a=
lt:auto;line-height:15.0pt;background:white">
<em><b><span style=3D"font-size:9.5pt;font-family:&quot;Verdana&quot;,&quot=
;sans-serif&quot;;font-style:normal">a</span></b></em><span style=3D"font-s=
ize:9.5pt;font-family:&quot;Verdana&quot;,&quot;sans-serif&quot;">&nbsp;<st=
rong><span style=3D"font-family:&quot;Verdana&quot;,&quot;sans-serif&quot;"=
>:</span></strong>&nbsp;the art or
 act of selecting and adjusting pipe organ stops</span><o:p></o:p></p>
<p class=3D"MsoNormal" style=3D"mso-margin-top-alt:auto;mso-margin-bottom-a=
lt:auto;line-height:15.0pt;background:white">
<em><b><span style=3D"font-size:9.5pt;font-family:&quot;Verdana&quot;,&quot=
;sans-serif&quot;;font-style:normal">b</span></b></em><span style=3D"font-s=
ize:9.5pt;font-family:&quot;Verdana&quot;,&quot;sans-serif&quot;">&nbsp;<st=
rong><span style=3D"font-family:&quot;Verdana&quot;,&quot;sans-serif&quot;"=
>:</span></strong>&nbsp;the combination
 of stops selected for performing a particular organ work</span><o:p></o:p>=
</p>
</div>
</div>
<div>
<div>
<p class=3D"MsoNormal" style=3D"mso-margin-top-alt:auto;mso-margin-bottom-a=
lt:auto;line-height:15.0pt;background:white">
<b><span style=3D"font-size:9.5pt;font-family:&quot;Verdana&quot;,&quot;san=
s-serif&quot;">5</span></b><o:p></o:p></p>
</div>
<div style=3D"margin-left:15.0pt;margin-bottom:7.5pt">
<p class=3D"MsoNormal" style=3D"mso-margin-top-alt:auto;mso-margin-bottom-a=
lt:auto;line-height:15.0pt;background:white">
<strong><span style=3D"font-size:9.5pt;font-family:&quot;Verdana&quot;,&quo=
t;sans-serif&quot;">:</span></strong><span style=3D"font-size:9.5pt;font-fa=
mily:&quot;Verdana&quot;,&quot;sans-serif&quot;">&nbsp;a document certifyin=
g an act of registering</span><o:p></o:p></p>
</div>
</div>
</div>
<div>
<p class=3D"MsoNormal" style=3D"mso-margin-top-alt:auto;mso-margin-bottom-a=
lt:auto">&nbsp;<o:p></o:p></p>
</div>
<div>
<p class=3D"MsoNormal" style=3D"mso-margin-top-alt:auto;mso-margin-bottom-a=
lt:auto">However, since the most common use of &quot;registration&quot; is =
actually
<b>1</b> above, it still is confusing. If you really want to emphasize the =
fact that it has been registered, then something like &quot;registered clie=
nt info uri&quot; or &quot;registered client metadata uri&quot; would be be=
tter.&nbsp;<o:p></o:p></p>
</div>
<div>
<p class=3D"MsoNormal" style=3D"mso-margin-top-alt:auto;mso-margin-bottom-a=
lt:auto">&nbsp;<o:p></o:p></p>
</div>
<div>
<p class=3D"MsoNormal" style=3D"mso-margin-top-alt:auto;mso-margin-bottom-a=
lt:auto">Nat<o:p></o:p></p>
</div>
<div>
<p class=3D"MsoNormal" style=3D"mso-margin-top-alt:auto;mso-margin-bottom-a=
lt:auto">&nbsp;<o:p></o:p></p>
</div>
<p class=3D"MsoNormal" style=3D"mso-margin-top-alt:auto;mso-margin-bottom-a=
lt:auto">&nbsp;<o:p></o:p></p>
<div>
<p class=3D"MsoNormal" style=3D"mso-margin-top-alt:auto;mso-margin-bottom-a=
lt:auto">2013/2/20 Mike Jones &lt;<a href=3D"mailto:Michael.Jones@microsoft=
.com" target=3D"_blank">Michael.Jones@microsoft.com</a>&gt;<o:p></o:p></p>
<div>
<div>
<p class=3D"MsoNormal" style=3D"mso-margin-top-alt:auto;mso-margin-bottom-a=
lt:auto"><span style=3D"font-size:11.0pt;font-family:&quot;Calibri&quot;,&q=
uot;sans-serif&quot;;color:#1F497D">For what it&#8217;s worth, the name &#8=
220;registration_access_url&#8221; was chosen to be parallel to &#8220;regi=
stration_access_token&#8221;.&nbsp;&nbsp;
 It&#8217;s the place you use the access token.&nbsp; And it&#8217;s where =
you access an existing registration.&nbsp; I&#8217;m against the name &#822=
0;client_metadata_url&#8221; because it&#8217;s not metadata you&#8217;re a=
ccessing &#8211; it&#8217;s a registration you&#8217;re accessing.&nbsp; Fo=
r the same reason, I don&#8217;t think
 the name &#8220;client_info_url&#8221; gives people the right idea, becaus=
e it doesn&#8217;t say anything it being the registration that you&#8217;re=
 accessing.</span><o:p></o:p></p>
<p class=3D"MsoNormal" style=3D"mso-margin-top-alt:auto;mso-margin-bottom-a=
lt:auto"><span style=3D"font-size:11.0pt;font-family:&quot;Calibri&quot;,&q=
uot;sans-serif&quot;;color:#1F497D">&nbsp;</span><o:p></o:p></p>
<p class=3D"MsoNormal" style=3D"mso-margin-top-alt:auto;mso-margin-bottom-a=
lt:auto"><span style=3D"font-size:11.0pt;font-family:&quot;Calibri&quot;,&q=
uot;sans-serif&quot;;color:#1F497D">If you really want us to change this, h=
aving read what&#8217;s above, I could live with &#8220;client_registration=
_url&#8221;,
 but I don&#8217;t think a change is actually necessary.&nbsp; (But if we a=
re going to change it, let&#8217;s do it ASAP, before the OpenID Connect Im=
plementer&#8217;s Drafts are published.)</span><o:p></o:p></p>
<p class=3D"MsoNormal" style=3D"mso-margin-top-alt:auto;mso-margin-bottom-a=
lt:auto"><span style=3D"font-size:11.0pt;font-family:&quot;Calibri&quot;,&q=
uot;sans-serif&quot;;color:#1F497D">&nbsp;</span><o:p></o:p></p>
<p class=3D"MsoNormal" style=3D"mso-margin-top-alt:auto;mso-margin-bottom-a=
lt:auto"><span style=3D"font-size:11.0pt;font-family:&quot;Calibri&quot;,&q=
uot;sans-serif&quot;;color:#1F497D">&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nb=
sp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;=
&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nb=
sp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;=
&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nb=
sp;&nbsp;&nbsp; -- Mike</span><o:p></o:p></p>
<p class=3D"MsoNormal" style=3D"mso-margin-top-alt:auto;mso-margin-bottom-a=
lt:auto"><span style=3D"font-size:11.0pt;font-family:&quot;Calibri&quot;,&q=
uot;sans-serif&quot;;color:#1F497D">&nbsp;</span><o:p></o:p></p>
<p class=3D"MsoNormal" style=3D"mso-margin-top-alt:auto;mso-margin-bottom-a=
lt:auto"><b><span style=3D"font-size:10.0pt;font-family:&quot;Tahoma&quot;,=
&quot;sans-serif&quot;">From:</span></b><span style=3D"font-size:10.0pt;fon=
t-family:&quot;Tahoma&quot;,&quot;sans-serif&quot;">
<a href=3D"mailto:oauth-bounces@ietf.org" target=3D"_blank">oauth-bounces@i=
etf.org</a> [mailto:<a href=3D"mailto:oauth-bounces@ietf.org" target=3D"_bl=
ank">oauth-bounces@ietf.org</a>]
<b>On Behalf Of </b>Nat Sakimura<br>
<b>Sent:</b> Wednesday, February 20, 2013 7:58 AM<br>
<b>To:</b> &lt;<a href=3D"mailto:oauth@ietf.org" target=3D"_blank">oauth@ie=
tf.org</a>&gt;; Richer, Justin P.; John Bradley</span><o:p></o:p></p>
<div>
<p class=3D"MsoNormal" style=3D"mso-margin-top-alt:auto;mso-margin-bottom-a=
lt:auto"><br>
<b>Subject:</b> Re: [OAUTH-WG] I-D Action: draft-ietf-oauth-dyn-reg-06.txt<=
o:p></o:p></p>
</div>
<p class=3D"MsoNormal" style=3D"mso-margin-top-alt:auto;mso-margin-bottom-a=
lt:auto">&nbsp;<o:p></o:p></p>
<p class=3D"MsoNormal" style=3D"mso-margin-top-alt:auto;mso-margin-bottom-a=
lt:auto"><span style=3D"font-size:13.5pt;font-family:&quot;Arial&quot;,&quo=
t;sans-serif&quot;;color:#222222;background:white">Thanks Justin.</span><o:=
p></o:p></p>
<div>
<div>
<p class=3D"MsoNormal" style=3D"mso-margin-top-alt:auto;mso-margin-bottom-a=
lt:auto"><span style=3D"font-size:13.5pt;font-family:&quot;Arial&quot;,&quo=
t;sans-serif&quot;;color:#222222"><br>
<br>
<span style=3D"background:white">Even if we go flat rather than doing JSON =
Structure, the &quot;Client</span><br>
<span style=3D"background:white">Registration Access Endpoint&quot; is not =
a good representative name.</span><br>
<br>
<span style=3D"background:white">What it represents is the client metadata/=
info.</span><br>
<span style=3D"background:white">It is not representing &quot;Client Regist=
ration Access&quot;.&nbsp;</span></span><o:p></o:p></p>
</div>
</div>
<div>
<div>
<div>
<p class=3D"MsoNormal" style=3D"mso-margin-top-alt:auto;mso-margin-bottom-a=
lt:auto">What does &quot;Client Registration Access&quot; mean?&nbsp;<o:p><=
/o:p></p>
</div>
<div>
<p class=3D"MsoNormal" style=3D"mso-margin-top-alt:auto;margin-bottom:12.0p=
t"><span style=3D"font-size:13.5pt;font-family:&quot;Arial&quot;,&quot;sans=
-serif&quot;;color:#222222;background:white">Does UPDATing &quot;Cleint Reg=
istration Access&quot; make sense?</span><br>
<span style=3D"font-size:13.5pt;font-family:&quot;Arial&quot;,&quot;sans-se=
rif&quot;;color:#222222"><br>
<span style=3D"background:white">Something in the line of &quot;Client Meta=
data Endpoint&quot; and</span><br>
<span style=3D"background:white">something like &quot;client_metadata_url&q=
uot; or&nbsp;&quot;client_info_url&quot; is much better.</span><br>
<br>
<span style=3D"background:white">Nat</span></span><o:p></o:p></p>
<div>
<p class=3D"MsoNormal" style=3D"mso-margin-top-alt:auto;mso-margin-bottom-a=
lt:auto">2013/2/15 Richer, Justin P. &lt;<a href=3D"mailto:jricher@mitre.or=
g" target=3D"_blank">jricher@mitre.org</a>&gt;<o:p></o:p></p>
<p class=3D"MsoNormal" style=3D"mso-margin-top-alt:auto;mso-margin-bottom-a=
lt:auto">Everyone, there's a new draft of DynReg up on the tracker. This dr=
aft tries to codify the discussions so far from this week into something we=
 can all read. There are still plenty
 of open discussion points and items up for debate. Please read through thi=
s latest draft and see what's changed and help assure that it properly capt=
ures the conversations. If you have any inputs for the marked [[ Editor's N=
ote ]] sections, please send them
 to the list by next Thursday to give me opportunity to get any necessary c=
hanges in by the cutoff date of Monday the 22nd.<br>
<br>
Thanks for all of your hard work everyone, I think this is *really* coming =
along now.<br>
<span style=3D"color:#888888"><br>
&nbsp;-- Justin</span><o:p></o:p></p>
<div>
<div>
<p class=3D"MsoNormal" style=3D"mso-margin-top-alt:auto;mso-margin-bottom-a=
lt:auto"><br>
On Feb 15, 2013, at 4:54 PM, <a href=3D"mailto:internet-drafts@ietf.org" ta=
rget=3D"_blank">
internet-drafts@ietf.org</a> wrote:<br>
<br>
&gt;<br>
&gt; A New Internet-Draft is available from the on-line Internet-Drafts dir=
ectories.<br>
&gt; This draft is a work item of the Web Authorization Protocol Working Gr=
oup of the IETF.<br>
&gt;<br>
&gt; &nbsp; &nbsp; &nbsp; Title &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; : OAuth =
Dynamic Client Registration Protocol<br>
&gt; &nbsp; &nbsp; &nbsp; Author(s) &nbsp; &nbsp; &nbsp; : Justin Richer<br=
>
&gt; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; =
&nbsp; &nbsp; &nbsp;John Bradley<br>
&gt; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; =
&nbsp; &nbsp; &nbsp;Michael B. Jones<br>
&gt; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; =
&nbsp; &nbsp; &nbsp;Maciej Machulak<br>
&gt; &nbsp; &nbsp; &nbsp; Filename &nbsp; &nbsp; &nbsp; &nbsp;: draft-ietf-=
oauth-dyn-reg-06.txt<br>
&gt; &nbsp; &nbsp; &nbsp; Pages &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; : 21<br>
&gt; &nbsp; &nbsp; &nbsp; Date &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp;: 2=
013-02-15<br>
&gt;<br>
&gt; Abstract:<br>
&gt; &nbsp; This specification defines an endpoint and protocol for dynamic=
<br>
&gt; &nbsp; registration of OAuth Clients at an Authorization Server.<br>
&gt;<br>
&gt;<br>
&gt; The IETF datatracker status page for this draft is:<br>
&gt; <a href=3D"https://datatracker.ietf.org/doc/draft-ietf-oauth-dyn-reg" =
target=3D"_blank">
https://datatracker.ietf.org/doc/draft-ietf-oauth-dyn-reg</a><br>
&gt;<br>
&gt; There's also a htmlized version available at:<br>
&gt; <a href=3D"http://tools.ietf.org/html/draft-ietf-oauth-dyn-reg-06" tar=
get=3D"_blank">
http://tools.ietf.org/html/draft-ietf-oauth-dyn-reg-06</a><br>
&gt;<br>
&gt; A diff from the previous version is available at:<br>
&gt; <a href=3D"http://www.ietf.org/rfcdiff?url2=3Ddraft-ietf-oauth-dyn-reg=
-06" target=3D"_blank">
http://www.ietf.org/rfcdiff?url2=3Ddraft-ietf-oauth-dyn-reg-06</a><br>
&gt;<br>
&gt;<br>
&gt; Internet-Drafts are also available by anonymous FTP at:<br>
&gt; <a href=3D"ftp://ftp.ietf.org/internet-drafts/" target=3D"_blank">ftp:=
//ftp.ietf.org/internet-drafts/</a><br>
&gt;<br>
&gt; _______________________________________________<br>
&gt; OAuth mailing list<br>
&gt; <a href=3D"mailto:OAuth@ietf.org" target=3D"_blank">OAuth@ietf.org</a>=
<br>
&gt; <a href=3D"https://www.ietf.org/mailman/listinfo/oauth" target=3D"_bla=
nk">https://www.ietf.org/mailman/listinfo/oauth</a><br>
<br>
_______________________________________________<br>
OAuth mailing list<br>
<a href=3D"mailto:OAuth@ietf.org" target=3D"_blank">OAuth@ietf.org</a><br>
<a href=3D"https://www.ietf.org/mailman/listinfo/oauth" target=3D"_blank">h=
ttps://www.ietf.org/mailman/listinfo/oauth</a><o:p></o:p></p>
</div>
</div>
</div>
<p class=3D"MsoNormal" style=3D"mso-margin-top-alt:auto;mso-margin-bottom-a=
lt:auto"><br>
<br clear=3D"all">
<o:p></o:p></p>
<div>
<p class=3D"MsoNormal" style=3D"mso-margin-top-alt:auto;mso-margin-bottom-a=
lt:auto">&nbsp;<o:p></o:p></p>
</div>
<p class=3D"MsoNormal" style=3D"mso-margin-top-alt:auto;mso-margin-bottom-a=
lt:auto">--
<br>
Nat Sakimura (=3Dnat)<o:p></o:p></p>
<div>
<p class=3D"MsoNormal" style=3D"mso-margin-top-alt:auto;mso-margin-bottom-a=
lt:auto">Chairman, OpenID Foundation<br>
<a href=3D"http://nat.sakimura.org/" target=3D"_blank">http://nat.sakimura.=
org/</a><br>
@_nat_en<o:p></o:p></p>
</div>
</div>
</div>
</div>
</div>
</div>
</div>
<p class=3D"MsoNormal" style=3D"mso-margin-top-alt:auto;mso-margin-bottom-a=
lt:auto"><br>
<br clear=3D"all">
<o:p></o:p></p>
<div>
<p class=3D"MsoNormal" style=3D"mso-margin-top-alt:auto;mso-margin-bottom-a=
lt:auto">&nbsp;<o:p></o:p></p>
</div>
<p class=3D"MsoNormal" style=3D"mso-margin-top-alt:auto;mso-margin-bottom-a=
lt:auto">--
<br>
Nat Sakimura (=3Dnat)<o:p></o:p></p>
<div>
<p class=3D"MsoNormal" style=3D"mso-margin-top-alt:auto;mso-margin-bottom-a=
lt:auto">Chairman, OpenID Foundation<br>
<a href=3D"http://nat.sakimura.org/" target=3D"_blank">http://nat.sakimura.=
org/</a><br>
@_nat_en<o:p></o:p></p>
</div>
</div>
</div>
</div>
</div>
</div>
</div>
</div>
<p class=3D"MsoNormal"><br>
<br clear=3D"all">
<o:p></o:p></p>
<div>
<p class=3D"MsoNormal"><o:p>&nbsp;</o:p></p>
</div>
<p class=3D"MsoNormal">-- <br>
Nat Sakimura (=3Dnat) <o:p></o:p></p>
<div>
<p class=3D"MsoNormal">Chairman, OpenID Foundation<br>
<a href=3D"http://nat.sakimura.org/" target=3D"_blank">http://nat.sakimura.=
org/</a><br>
@_nat_en<o:p></o:p></p>
</div>
</div>
</blockquote>
<p class=3D"MsoNormal"><o:p>&nbsp;</o:p></p>
</div>
</body>
</html>

--_000_4E1F6AAD24975D4BA5B16804296739436747B2BBTK5EX14MBXC284r_--

From jricher@mitre.org  Wed Feb 20 11:04:09 2013
Return-Path: <jricher@mitre.org>
X-Original-To: oauth@ietfa.amsl.com
Delivered-To: oauth@ietfa.amsl.com
Received: from localhost (localhost [127.0.0.1]) by ietfa.amsl.com (Postfix) with ESMTP id E131A21F886B for <oauth@ietfa.amsl.com>; Wed, 20 Feb 2013 11:04:09 -0800 (PST)
X-Virus-Scanned: amavisd-new at amsl.com
X-Spam-Flag: NO
X-Spam-Score: -6.574
X-Spam-Level: 
X-Spam-Status: No, score=-6.574 tagged_above=-999 required=5 tests=[AWL=0.024,  BAYES_00=-2.599, HTML_MESSAGE=0.001, RCVD_IN_DNSWL_MED=-4]
Received: from mail.ietf.org ([64.170.98.30]) by localhost (ietfa.amsl.com [127.0.0.1]) (amavisd-new, port 10024) with ESMTP id WlbCMxgJscaa for <oauth@ietfa.amsl.com>; Wed, 20 Feb 2013 11:04:06 -0800 (PST)
Received: from smtpksrv1.mitre.org (smtpksrv1.mitre.org [198.49.146.77]) by ietfa.amsl.com (Postfix) with ESMTP id 9B6AC21F87BA for <oauth@ietf.org>; Wed, 20 Feb 2013 11:04:05 -0800 (PST)
Received: from smtpksrv1.mitre.org (localhost.localdomain [127.0.0.1]) by localhost (Postfix) with SMTP id 145EC5310189; Wed, 20 Feb 2013 14:04:05 -0500 (EST)
Received: from IMCCAS04.MITRE.ORG (imccas04.mitre.org [129.83.29.81]) by smtpksrv1.mitre.org (Postfix) with ESMTP id EFA255310176; Wed, 20 Feb 2013 14:04:04 -0500 (EST)
Received: from [10.146.15.29] (129.83.31.58) by IMCCAS04.MITRE.ORG (129.83.29.81) with Microsoft SMTP Server (TLS) id 14.2.318.4; Wed, 20 Feb 2013 14:04:04 -0500
Message-ID: <51251DF0.8000804@mitre.org>
Date: Wed, 20 Feb 2013 14:03:12 -0500
From: Justin Richer <jricher@mitre.org>
User-Agent: Mozilla/5.0 (X11; Linux i686; rv:17.0) Gecko/20130106 Thunderbird/17.0.2
MIME-Version: 1.0
To: Mike Jones <Michael.Jones@microsoft.com>
References: <20130215215423.23019.50224.idtracker@ietfa.amsl.com> <B33BFB58CCC8BE4998958016839DE27E06894B4F@IMCMBX01.MITRE.ORG> <CABzCy2CgnAtPrTY37H6vO-+5u3tRmsm+1j86r3w046AhHnNdfw@mail.gmail.com> <4E1F6AAD24975D4BA5B16804296739436747A665@TK5EX14MBXC284.redmond.corp.microsoft.com> <CABzCy2DHvFVmtv9jB-re5efKEVrfBBk4BZ83n_EQLMHOqsnXcA@mail.gmail.com> <4E1F6AAD24975D4BA5B16804296739436747ADDB@TK5EX14MBXC284.redmond.corp.microsoft.com> <CABzCy2AyCDxc+Gov7zBnTRquzp+QUMF8riqd_8vcP0rHFQUtkQ@mail.gmail.com> <512511B0.5090102@mitre.org> <4E1F6AAD24975D4BA5B16804296739436747B2BB@TK5EX14MBXC284.redmond.corp.microsoft.com>
In-Reply-To: <4E1F6AAD24975D4BA5B16804296739436747B2BB@TK5EX14MBXC284.redmond.corp.microsoft.com>
Content-Type: multipart/alternative; boundary="------------010709050103070701040005"
X-Originating-IP: [129.83.31.58]
Cc: "<oauth@ietf.org>" <oauth@ietf.org>
Subject: Re: [OAUTH-WG] I-D Action: draft-ietf-oauth-dyn-reg-06.txt
X-BeenThere: oauth@ietf.org
X-Mailman-Version: 2.1.12
Precedence: list
List-Id: OAUTH WG <oauth.ietf.org>
List-Unsubscribe: <https://www.ietf.org/mailman/options/oauth>, <mailto:oauth-request@ietf.org?subject=unsubscribe>
List-Archive: <http://www.ietf.org/mail-archive/web/oauth>
List-Post: <mailto:oauth@ietf.org>
List-Help: <mailto:oauth-request@ietf.org?subject=help>
List-Subscribe: <https://www.ietf.org/mailman/listinfo/oauth>, <mailto:oauth-request@ietf.org?subject=subscribe>
X-List-Received-Date: Wed, 20 Feb 2013 19:04:10 -0000

--------------010709050103070701040005
Content-Type: text/plain; charset="ISO-8859-1"; format=flowed
Content-Transfer-Encoding: 7bit

On second thought, how about "registration_client_uri"? It's the URI for 
a particular client's registration. Use of the verb "registered" makes 
it sound like the result of an action that the client took, as if the 
client itself had registered the URI. That's obviously not the case, and 
we don't want to convey that.

So, new proposed name: "registration_client_uri"

This has the nice side effect of being more parallel with 
"reigstration_access_token".

  -- Justin

On 02/20/2013 01:13 PM, Mike Jones wrote:
>
> SGTM
>
> *From:*Justin Richer [mailto:jricher@mitre.org]
> *Sent:* Wednesday, February 20, 2013 10:11 AM
> *To:* Nat Sakimura
> *Cc:* Mike Jones; <oauth@ietf.org>; John Bradley
> *Subject:* Re: [OAUTH-WG] I-D Action: draft-ietf-oauth-dyn-reg-06.txt
>
> I like "registered_client_uri", given all of the other discussions on 
> this thread, because:
>
> URL/URI: It *is* a URL, and an https one at that, but if the IETF 
> convention is to call it URI, then I'm fine with that.
>
> registered_client/registration_access: The former is a good 
> description of what's actually *at* the URL, which fits better with 
> the RESTful entity model. I think Nat's criticisms about the original 
> formation of the parameter name are spot on, though at the time we 
> hadn't heard anything better.
>
>
> So I'd like to change it to "registered_client_uri" in the next draft.
>
>  -- Justin
>
> On 02/20/2013 12:20 PM, Nat Sakimura wrote:
>
>     I have thought about that as well. The the reason I added "info"
>     or "metadata" was that what was behind the URL is not the client
>     itself. By "client registration", I suppose you mean "client entry
>     in the register" (cf. *registration */n/ 2.) . It is the
>     "registered data/info/metadata" about the client.
>
>     Nat
>
>     2013/2/20 Mike Jones <Michael.Jones@microsoft.com
>     <mailto:Michael.Jones@microsoft.com>>
>
>     I could live with "registered_client_url".  I think that adding
>     "_metadata" or "_info" is incorrect, because what's being accessed
>     is the client' registration -- not just metadata or info about the
>     client's registration (although that information can be retrieved
>     as one aspect of the operations on the client's registration).
>
>     -- Mike
>
>     *From:*Nat Sakimura [mailto:sakimura@gmail.com
>     <mailto:sakimura@gmail.com>]
>     *Sent:* Wednesday, February 20, 2013 8:53 AM
>     *To:* Mike Jones
>     *Cc:* <oauth@ietf.org <mailto:oauth@ietf.org>>; Richer, Justin P.;
>     John Bradley
>
>
>     *Subject:* Re: [OAUTH-WG] I-D Action: draft-ietf-oauth-dyn-reg-06.txt
>
>     I have read the whole thing and still ---
>
>     Your argument that it is the place for using "registration access
>     token" thus should have a parallel name "registration access url"
>     is very weak. There are several weakness.
>
>     First, "registration access token" actually is "registration" +
>     "access token". Extracting "registration access" from
>     "registration access token" is broken.
>
>     Secondly, access token is used to against any protected
>     resource. Recommending to use the word "access" in naming
>     protected resources is broken. Should we rename Userinfo endpoint
>     to something like "Userinfo Access Endpoint"? I do not think so.
>
>     Thirdly, the term "Registration Access" does not seem to be
>     meaningful.
>
>     When you say "access", I suppose you are using the noun version of
>     it.
>
>     (If you are using the verb, then I am even more against as a URL
>     should not contain a verb.)
>
>     According to the Webster, access (n.) is defined as:
>
>     *access */n./
>
>     *1*
>
>     /*a*/*:* onset <http://www.merriam-webster.com/dictionary/onset> 2
>
>     /*b*/*:* a fit of intense feeling *:* outburst
>     <http://www.merriam-webster.com/dictionary/outburst>
>
>     *2*
>
>     /*a*/*:* permission, liberty, or ability to enter, approach, or
>     pass to and from a place or to approach or communicate with a
>     person or thing
>
>     /*b*/*:* freedom or ability to obtain or make use of something
>
>     /*c*/*:* a way or means of access
>
>     /*d*/*:* the act or an instance of accessing
>     <http://www.merriam-webster.com/dictionary/accessing>
>
>     *3*
>
>     *:* an increase by addition <a sudden /access/ of wealth>
>
>     Replacing "access" with any of the definition above does not seem
>     to work.
>
>     Remember, a URL is represents a "thing".
>
>     The name of the endpoint should represent the "thing".
>
>     I am merginally OK with "client registration url" leveraging on
>     the definition 2. below (again from Webster -- my OED subscription
>     lapsed for the time being.)
>
>     *registration */n./
>
>     *1*
>
>     *:* the act of registering
>     <http://www.merriam-webster.com/dictionary/registering>
>
>     *2*
>
>     *:* an entry in a register
>     <http://www.merriam-webster.com/dictionary/register>
>
>     *3*
>
>     *:* the number of individuals registered
>     <http://www.merriam-webster.com/dictionary/registered> *:*
>     enrollment <http://www.merriam-webster.com/dictionary/enrollment>
>
>     *4*
>
>     /*a*/*:* the art or act of selecting and adjusting pipe organ stops
>
>     /*b*/*:* the combination of stops selected for performing a
>     particular organ work
>
>     *5*
>
>     *:* a document certifying an act of registering
>
>     However, since the most common use of "registration" is actually
>     *1* above, it still is confusing. If you really want to emphasize
>     the fact that it has been registered, then something like
>     "registered client info uri" or "registered client metadata uri"
>     would be better.
>
>     Nat
>
>     2013/2/20 Mike Jones <Michael.Jones@microsoft.com
>     <mailto:Michael.Jones@microsoft.com>>
>
>     For what it's worth, the name "registration_access_url" was chosen
>     to be parallel to "registration_access_token".   It's the place
>     you use the access token. And it's where you access an existing
>     registration.  I'm against the name "client_metadata_url" because
>     it's not metadata you're accessing -- it's a registration you're
>     accessing.  For the same reason, I don't think the name
>     "client_info_url" gives people the right idea, because it doesn't
>     say anything it being the registration that you're accessing.
>
>     If you really want us to change this, having read what's above, I
>     could live with "client_registration_url", but I don't think a
>     change is actually necessary.  (But if we are going to change it,
>     let's do it ASAP, before the OpenID Connect Implementer's Drafts
>     are published.)
>
>     -- Mike
>
>     *From:*oauth-bounces@ietf.org <mailto:oauth-bounces@ietf.org>
>     [mailto:oauth-bounces@ietf.org <mailto:oauth-bounces@ietf.org>]
>     *On Behalf Of *Nat Sakimura
>     *Sent:* Wednesday, February 20, 2013 7:58 AM
>     *To:* <oauth@ietf.org <mailto:oauth@ietf.org>>; Richer, Justin P.;
>     John Bradley
>
>
>     *Subject:* Re: [OAUTH-WG] I-D Action: draft-ietf-oauth-dyn-reg-06.txt
>
>     Thanks Justin.
>
>
>
>     Even if we go flat rather than doing JSON Structure, the "Client
>     Registration Access Endpoint" is not a good representative name.
>
>     What it represents is the client metadata/info.
>     It is not representing "Client Registration Access".
>
>     What does "Client Registration Access" mean?
>
>     Does UPDATing "Cleint Registration Access" make sense?
>
>     Something in the line of "Client Metadata Endpoint" and
>     something like "client_metadata_url" or "client_info_url" is much
>     better.
>
>     Nat
>
>     2013/2/15 Richer, Justin P. <jricher@mitre.org
>     <mailto:jricher@mitre.org>>
>
>     Everyone, there's a new draft of DynReg up on the tracker. This
>     draft tries to codify the discussions so far from this week into
>     something we can all read. There are still plenty of open
>     discussion points and items up for debate. Please read through
>     this latest draft and see what's changed and help assure that it
>     properly captures the conversations. If you have any inputs for
>     the marked [[ Editor's Note ]] sections, please send them to the
>     list by next Thursday to give me opportunity to get any necessary
>     changes in by the cutoff date of Monday the 22nd.
>
>     Thanks for all of your hard work everyone, I think this is
>     *really* coming along now.
>
>      -- Justin
>
>
>     On Feb 15, 2013, at 4:54 PM, internet-drafts@ietf.org
>     <mailto:internet-drafts@ietf.org> wrote:
>
>     >
>     > A New Internet-Draft is available from the on-line
>     Internet-Drafts directories.
>     > This draft is a work item of the Web Authorization Protocol
>     Working Group of the IETF.
>     >
>     >       Title : OAuth Dynamic Client Registration Protocol
>     >       Author(s) : Justin Richer
>     >    John Bradley
>     >    Michael B. Jones
>     >    Maciej Machulak
>     >       Filename  : draft-ietf-oauth-dyn-reg-06.txt
>     >       Pages : 21
>     >       Date  : 2013-02-15
>     >
>     > Abstract:
>     >   This specification defines an endpoint and protocol for dynamic
>     >   registration of OAuth Clients at an Authorization Server.
>     >
>     >
>     > The IETF datatracker status page for this draft is:
>     > https://datatracker.ietf.org/doc/draft-ietf-oauth-dyn-reg
>     >
>     > There's also a htmlized version available at:
>     > http://tools.ietf.org/html/draft-ietf-oauth-dyn-reg-06
>     >
>     > A diff from the previous version is available at:
>     > http://www.ietf.org/rfcdiff?url2=draft-ietf-oauth-dyn-reg-06
>     >
>     >
>     > Internet-Drafts are also available by anonymous FTP at:
>     > ftp://ftp.ietf.org/internet-drafts/
>     >
>     > _______________________________________________
>     > OAuth mailing list
>     > OAuth@ietf.org <mailto:OAuth@ietf.org>
>     > https://www.ietf.org/mailman/listinfo/oauth
>
>     _______________________________________________
>     OAuth mailing list
>     OAuth@ietf.org <mailto:OAuth@ietf.org>
>     https://www.ietf.org/mailman/listinfo/oauth
>
>
>
>     -- 
>     Nat Sakimura (=nat)
>
>     Chairman, OpenID Foundation
>     http://nat.sakimura.org/
>     @_nat_en
>
>
>
>     -- 
>     Nat Sakimura (=nat)
>
>     Chairman, OpenID Foundation
>     http://nat.sakimura.org/
>     @_nat_en
>
>
>
>     -- 
>     Nat Sakimura (=nat)
>
>     Chairman, OpenID Foundation
>     http://nat.sakimura.org/
>     @_nat_en
>


--------------010709050103070701040005
Content-Type: text/html; charset="ISO-8859-1"
Content-Transfer-Encoding: 7bit

<html>
  <head>
    <meta content="text/html; charset=ISO-8859-1"
      http-equiv="Content-Type">
  </head>
  <body bgcolor="#FFFFFF" text="#000000">
    On second thought, how about "registration_client_uri"? It's the URI
    for a particular client's registration. Use of the verb "registered"
    makes it sound like the result of an action that the client took, as
    if the client itself had registered the URI. That's obviously not
    the case, and we don't want to convey that. <br>
    <br>
    So, new proposed name: "registration_client_uri"<br>
    <br>
    This has the nice side effect of being more parallel with
    "reigstration_access_token". <br>
    <br>
    &nbsp;-- Justin<br>
    <br>
    <div class="moz-cite-prefix">On 02/20/2013 01:13 PM, Mike Jones
      wrote:<br>
    </div>
    <blockquote
cite="mid:4E1F6AAD24975D4BA5B16804296739436747B2BB@TK5EX14MBXC284.redmond.corp.microsoft.com"
      type="cite">
      <meta http-equiv="Content-Type" content="text/html;
        charset=ISO-8859-1">
      <meta name="Generator" content="Microsoft Word 14 (filtered
        medium)">
      <style><!--
/* Font Definitions */
@font-face
	{font-family:Calibri;
	panose-1:2 15 5 2 2 2 4 3 2 4;}
@font-face
	{font-family:Tahoma;
	panose-1:2 11 6 4 3 5 4 4 2 4;}
@font-face
	{font-family:Verdana;
	panose-1:2 11 6 4 3 5 4 4 2 4;}
/* Style Definitions */
p.MsoNormal, li.MsoNormal, div.MsoNormal
	{margin:0in;
	margin-bottom:.0001pt;
	font-size:12.0pt;
	font-family:"Times New Roman","serif";
	color:black;}
a:link, span.MsoHyperlink
	{mso-style-priority:99;
	color:blue;
	text-decoration:underline;}
a:visited, span.MsoHyperlinkFollowed
	{mso-style-priority:99;
	color:purple;
	text-decoration:underline;}
p.MsoAcetate, li.MsoAcetate, div.MsoAcetate
	{mso-style-priority:99;
	mso-style-link:"Balloon Text Char";
	margin:0in;
	margin-bottom:.0001pt;
	font-size:8.0pt;
	font-family:"Tahoma","sans-serif";
	color:black;}
span.EmailStyle19
	{mso-style-type:personal-reply;
	font-family:"Calibri","sans-serif";
	color:#1F497D;}
span.BalloonTextChar
	{mso-style-name:"Balloon Text Char";
	mso-style-priority:99;
	mso-style-link:"Balloon Text";
	font-family:"Tahoma","sans-serif";
	color:black;}
.MsoChpDefault
	{mso-style-type:export-only;
	font-size:10.0pt;}
@page WordSection1
	{size:8.5in 11.0in;
	margin:1.0in 1.0in 1.0in 1.0in;}
div.WordSection1
	{page:WordSection1;}
--></style><!--[if gte mso 9]><xml>
<o:shapedefaults v:ext="edit" spidmax="1026" />
</xml><![endif]--><!--[if gte mso 9]><xml>
<o:shapelayout v:ext="edit">
<o:idmap v:ext="edit" data="1" />
</o:shapelayout></xml><![endif]-->
      <div class="WordSection1">
        <p class="MsoNormal"><span
style="font-size:11.0pt;font-family:&quot;Calibri&quot;,&quot;sans-serif&quot;;color:#1F497D">SGTM<o:p></o:p></span></p>
        <p class="MsoNormal"><span
style="font-size:11.0pt;font-family:&quot;Calibri&quot;,&quot;sans-serif&quot;;color:#1F497D"><o:p>&nbsp;</o:p></span></p>
        <div>
          <div style="border:none;border-top:solid #B5C4DF
            1.0pt;padding:3.0pt 0in 0in 0in">
            <p class="MsoNormal"><b><span
style="font-size:10.0pt;font-family:&quot;Tahoma&quot;,&quot;sans-serif&quot;;color:windowtext">From:</span></b><span
style="font-size:10.0pt;font-family:&quot;Tahoma&quot;,&quot;sans-serif&quot;;color:windowtext">
                Justin Richer [<a class="moz-txt-link-freetext" href="mailto:jricher@mitre.org">mailto:jricher@mitre.org</a>]
                <br>
                <b>Sent:</b> Wednesday, February 20, 2013 10:11 AM<br>
                <b>To:</b> Nat Sakimura<br>
                <b>Cc:</b> Mike Jones; <a class="moz-txt-link-rfc2396E" href="mailto:oauth@ietf.org">&lt;oauth@ietf.org&gt;</a>; John
                Bradley<br>
                <b>Subject:</b> Re: [OAUTH-WG] I-D Action:
                draft-ietf-oauth-dyn-reg-06.txt<o:p></o:p></span></p>
          </div>
        </div>
        <p class="MsoNormal"><o:p>&nbsp;</o:p></p>
        <p class="MsoNormal" style="margin-bottom:12.0pt">I like
          "registered_client_uri", given all of the other discussions on
          this thread, because:<br>
          <br>
          URL/URI: It *is* a URL, and an https one at that, but if the
          IETF convention is to call it URI, then I'm fine with that.<br>
          <br>
          registered_client/registration_access: The former is a good
          description of what's actually *at* the URL, which fits better
          with the RESTful entity model. I think Nat's criticisms about
          the original formation of the parameter name are spot on,
          though at the time we hadn't heard anything better.<br>
          <br>
          <br>
          So I'd like to change it to "registered_client_uri" in the
          next draft.<br>
          <br>
          &nbsp;-- Justin<o:p></o:p></p>
        <div>
          <p class="MsoNormal">On 02/20/2013 12:20 PM, Nat Sakimura
            wrote:<o:p></o:p></p>
        </div>
        <blockquote style="margin-top:5.0pt;margin-bottom:5.0pt">
          <p class="MsoNormal">I have thought about that as well. The
            the reason I added "info" or "metadata" was that what was
            behind the URL is not the client itself. By "client
            registration", I suppose you mean "client entry in the
            register" (cf.
            <b>registration </b><i>n</i> 2.) . It is the "registered
            data/info/metadata" about the client.&nbsp;
            <o:p></o:p></p>
          <div>
            <p class="MsoNormal"><o:p>&nbsp;</o:p></p>
          </div>
          <div>
            <p class="MsoNormal" style="margin-bottom:12.0pt">Nat<o:p></o:p></p>
            <div>
              <p class="MsoNormal">2013/2/20 Mike Jones &lt;<a
                  moz-do-not-send="true"
                  href="mailto:Michael.Jones@microsoft.com"
                  target="_blank">Michael.Jones@microsoft.com</a>&gt;<o:p></o:p></p>
              <div>
                <div>
                  <p class="MsoNormal"
                    style="mso-margin-top-alt:auto;mso-margin-bottom-alt:auto"><span
style="font-size:11.0pt;font-family:&quot;Calibri&quot;,&quot;sans-serif&quot;;color:#1F497D">I
                      could live with &#8220;registered_client_url&#8221;.&nbsp; I think
                      that adding &#8220;_metadata&#8221; or &#8220;_info&#8221; is incorrect,
                      because what&#8217;s being accessed is the client&#8217;
                      registration &#8211; not just metadata or info about the
                      client&#8217;s registration (although that information
                      can be retrieved as one aspect of the operations
                      on the client&#8217;s registration).</span><o:p></o:p></p>
                  <p class="MsoNormal"
                    style="mso-margin-top-alt:auto;mso-margin-bottom-alt:auto"><span
style="font-size:11.0pt;font-family:&quot;Calibri&quot;,&quot;sans-serif&quot;;color:#1F497D">&nbsp;</span><o:p></o:p></p>
                  <p class="MsoNormal"
                    style="mso-margin-top-alt:auto;mso-margin-bottom-alt:auto"><span
style="font-size:11.0pt;font-family:&quot;Calibri&quot;,&quot;sans-serif&quot;;color:#1F497D">&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;
                      -- Mike</span><o:p></o:p></p>
                  <p class="MsoNormal"
                    style="mso-margin-top-alt:auto;mso-margin-bottom-alt:auto"><span
style="font-size:11.0pt;font-family:&quot;Calibri&quot;,&quot;sans-serif&quot;;color:#1F497D">&nbsp;</span><o:p></o:p></p>
                  <p class="MsoNormal"
                    style="mso-margin-top-alt:auto;mso-margin-bottom-alt:auto"><b><span
style="font-size:10.0pt;font-family:&quot;Tahoma&quot;,&quot;sans-serif&quot;">From:</span></b><span
style="font-size:10.0pt;font-family:&quot;Tahoma&quot;,&quot;sans-serif&quot;">
                      Nat Sakimura [mailto:<a moz-do-not-send="true"
                        href="mailto:sakimura@gmail.com" target="_blank">sakimura@gmail.com</a>]
                      <br>
                      <b>Sent:</b> Wednesday, February 20, 2013 8:53 AM<br>
                      <b>To:</b> Mike Jones<br>
                      <b>Cc:</b> &lt;<a moz-do-not-send="true"
                        href="mailto:oauth@ietf.org" target="_blank">oauth@ietf.org</a>&gt;;
                      Richer, Justin P.; John Bradley</span><o:p></o:p></p>
                  <div>
                    <div>
                      <p class="MsoNormal"><br>
                        <b>Subject:</b> Re: [OAUTH-WG] I-D Action:
                        draft-ietf-oauth-dyn-reg-06.txt<o:p></o:p></p>
                    </div>
                  </div>
                  <div>
                    <div>
                      <p class="MsoNormal"
                        style="mso-margin-top-alt:auto;mso-margin-bottom-alt:auto">&nbsp;<o:p></o:p></p>
                      <p class="MsoNormal"
                        style="mso-margin-top-alt:auto;mso-margin-bottom-alt:auto">I
                        have read the whole thing and still ---&nbsp;<o:p></o:p></p>
                      <div>
                        <p class="MsoNormal"
                          style="mso-margin-top-alt:auto;mso-margin-bottom-alt:auto">&nbsp;<o:p></o:p></p>
                      </div>
                      <div>
                        <p class="MsoNormal"
                          style="mso-margin-top-alt:auto;mso-margin-bottom-alt:auto">Your
                          argument that it is the place for using
                          "registration access token" thus should have a
                          parallel name "registration access url" is
                          very weak. There are several weakness.&nbsp;<o:p></o:p></p>
                      </div>
                      <div>
                        <p class="MsoNormal"
                          style="mso-margin-top-alt:auto;mso-margin-bottom-alt:auto">&nbsp;<o:p></o:p></p>
                      </div>
                      <div>
                        <p class="MsoNormal"
                          style="mso-margin-top-alt:auto;mso-margin-bottom-alt:auto">First,
                          "registration access token" actually is
                          "registration" + "access token". Extracting
                          "registration access" from "registration
                          access token" is broken.&nbsp;<o:p></o:p></p>
                      </div>
                      <div>
                        <p class="MsoNormal"
                          style="mso-margin-top-alt:auto;mso-margin-bottom-alt:auto">&nbsp;<o:p></o:p></p>
                      </div>
                      <div>
                        <p class="MsoNormal"
                          style="mso-margin-top-alt:auto;mso-margin-bottom-alt:auto">Secondly,
                          access token is used to against any protected
                          resource.&nbsp;Recommending&nbsp;to use the word
                          "access" in naming protected resources is
                          broken. Should we rename Userinfo endpoint to
                          something like "Userinfo Access Endpoint"? I
                          do not think so.&nbsp;<o:p></o:p></p>
                      </div>
                      <div>
                        <p class="MsoNormal"
                          style="mso-margin-top-alt:auto;mso-margin-bottom-alt:auto">&nbsp;<o:p></o:p></p>
                      </div>
                      <div>
                        <p class="MsoNormal"
                          style="mso-margin-top-alt:auto;mso-margin-bottom-alt:auto">Thirdly,
                          the term "Registration Access" does not seem
                          to be meaningful.&nbsp;<o:p></o:p></p>
                      </div>
                      <div>
                        <p class="MsoNormal"
                          style="mso-margin-top-alt:auto;mso-margin-bottom-alt:auto">When
                          you say "access", I suppose you are using the
                          noun version of it.&nbsp;<o:p></o:p></p>
                      </div>
                      <div>
                        <div>
                          <p class="MsoNormal"
                            style="mso-margin-top-alt:auto;mso-margin-bottom-alt:auto">(If
                            you are using the verb, then I am even more
                            against as a URL should not contain a
                            verb.)&nbsp;<o:p></o:p></p>
                        </div>
                        <div>
                          <p class="MsoNormal"
                            style="mso-margin-top-alt:auto;mso-margin-bottom-alt:auto">&nbsp;<o:p></o:p></p>
                        </div>
                        <div>
                          <p class="MsoNormal"
                            style="mso-margin-top-alt:auto;mso-margin-bottom-alt:auto">According
                            to the Webster, access (n.) is defined as:&nbsp;<o:p></o:p></p>
                        </div>
                        <div>
                          <p class="MsoNormal"
                            style="mso-margin-top-alt:auto;mso-margin-bottom-alt:auto">&nbsp;<o:p></o:p></p>
                        </div>
                        <div>
                          <p class="MsoNormal"
                            style="mso-margin-top-alt:auto;mso-margin-bottom-alt:auto"><b>access
                            </b><i>n.</i><o:p></o:p></p>
                        </div>
                        <div>
                          <p class="MsoNormal"
                            style="mso-margin-top-alt:auto;mso-margin-bottom-alt:auto">&nbsp;<o:p></o:p></p>
                        </div>
                        <div>
                          <div>
                            <div>
                              <p class="MsoNormal"
style="mso-margin-top-alt:auto;mso-margin-bottom-alt:auto;line-height:15.0pt;background:white"><b><span
style="font-size:9.5pt;font-family:&quot;Verdana&quot;,&quot;sans-serif&quot;">1</span></b><o:p></o:p></p>
                            </div>
                            <div
                              style="margin-left:15.0pt;margin-bottom:7.5pt">
                              <p class="MsoNormal"
style="mso-margin-top-alt:auto;mso-margin-bottom-alt:auto;line-height:15.0pt;background:white"><em><b><span
style="font-size:9.5pt;font-family:&quot;Verdana&quot;,&quot;sans-serif&quot;;font-style:normal">a</span></b></em><span
style="font-size:9.5pt;font-family:&quot;Verdana&quot;,&quot;sans-serif&quot;">&nbsp;<strong><span
style="font-family:&quot;Verdana&quot;,&quot;sans-serif&quot;">:</span></strong>&nbsp;<a
                                    moz-do-not-send="true"
                                    href="http://www.merriam-webster.com/dictionary/onset"
                                    target="_blank"><span
                                      style="font-variant:small-caps;color:#1122CC">onset</span></a>&nbsp;2</span><o:p></o:p></p>
                              <p class="MsoNormal"
style="mso-margin-top-alt:auto;mso-margin-bottom-alt:auto;line-height:15.0pt;background:white"><em><b><span
style="font-size:9.5pt;font-family:&quot;Verdana&quot;,&quot;sans-serif&quot;;font-style:normal">b</span></b></em><span
style="font-size:9.5pt;font-family:&quot;Verdana&quot;,&quot;sans-serif&quot;">&nbsp;<strong><span
style="font-family:&quot;Verdana&quot;,&quot;sans-serif&quot;">:</span></strong>&nbsp;a
                                  fit of intense feeling&nbsp;<strong><span
                                      style="font-family:&quot;Verdana&quot;,&quot;sans-serif&quot;">:</span></strong>&nbsp;<a
                                    moz-do-not-send="true"
                                    href="http://www.merriam-webster.com/dictionary/outburst"
                                    target="_blank"><span
                                      style="font-variant:small-caps;color:#1122CC">outburst</span></a></span><o:p></o:p></p>
                            </div>
                          </div>
                          <div>
                            <div>
                              <p class="MsoNormal"
style="mso-margin-top-alt:auto;mso-margin-bottom-alt:auto;line-height:15.0pt;background:white"><b><span
style="font-size:9.5pt;font-family:&quot;Verdana&quot;,&quot;sans-serif&quot;">2</span></b><o:p></o:p></p>
                            </div>
                            <div
                              style="margin-left:15.0pt;margin-bottom:7.5pt">
                              <p class="MsoNormal"
style="mso-margin-top-alt:auto;mso-margin-bottom-alt:auto;line-height:15.0pt;background:white"><em><b><span
style="font-size:9.5pt;font-family:&quot;Verdana&quot;,&quot;sans-serif&quot;;font-style:normal">a</span></b></em><span
style="font-size:9.5pt;font-family:&quot;Verdana&quot;,&quot;sans-serif&quot;">&nbsp;<strong><span
style="font-family:&quot;Verdana&quot;,&quot;sans-serif&quot;">:</span></strong>&nbsp;permission,

                                  liberty, or ability to enter,
                                  approach, or pass to and from a place
                                  or to approach or communicate with a
                                  person or thing</span><o:p></o:p></p>
                              <p class="MsoNormal"
style="mso-margin-top-alt:auto;mso-margin-bottom-alt:auto;line-height:15.0pt;background:white"><em><b><span
style="font-size:9.5pt;font-family:&quot;Verdana&quot;,&quot;sans-serif&quot;;font-style:normal">b</span></b></em><span
style="font-size:9.5pt;font-family:&quot;Verdana&quot;,&quot;sans-serif&quot;">&nbsp;<strong><span
style="font-family:&quot;Verdana&quot;,&quot;sans-serif&quot;">:</span></strong>&nbsp;freedom
                                  or ability to obtain or make use of
                                  something</span><o:p></o:p></p>
                              <p class="MsoNormal"
style="mso-margin-top-alt:auto;mso-margin-bottom-alt:auto;line-height:15.0pt;background:white"><em><b><span
style="font-size:9.5pt;font-family:&quot;Verdana&quot;,&quot;sans-serif&quot;;font-style:normal">c</span></b></em><span
style="font-size:9.5pt;font-family:&quot;Verdana&quot;,&quot;sans-serif&quot;">&nbsp;<strong><span
style="font-family:&quot;Verdana&quot;,&quot;sans-serif&quot;">:</span></strong>&nbsp;a
                                  way or means of access</span><o:p></o:p></p>
                              <p class="MsoNormal"
style="mso-margin-top-alt:auto;mso-margin-bottom-alt:auto;line-height:15.0pt;background:white"><em><b><span
style="font-size:9.5pt;font-family:&quot;Verdana&quot;,&quot;sans-serif&quot;;font-style:normal">d</span></b></em><span
style="font-size:9.5pt;font-family:&quot;Verdana&quot;,&quot;sans-serif&quot;">&nbsp;<strong><span
style="font-family:&quot;Verdana&quot;,&quot;sans-serif&quot;">:</span></strong>&nbsp;the
                                  act or an instance of&nbsp;<a
                                    moz-do-not-send="true"
                                    href="http://www.merriam-webster.com/dictionary/accessing"
                                    target="_blank"><span
                                      style="font-size:10.0pt;color:#1122CC">accessing</span></a></span><o:p></o:p></p>
                            </div>
                          </div>
                          <div>
                            <div>
                              <p class="MsoNormal"
style="mso-margin-top-alt:auto;mso-margin-bottom-alt:auto;line-height:15.0pt;background:white"><b><span
style="font-size:9.5pt;font-family:&quot;Verdana&quot;,&quot;sans-serif&quot;">3</span></b><o:p></o:p></p>
                            </div>
                            <div
                              style="margin-left:15.0pt;margin-bottom:7.5pt">
                              <p class="MsoNormal"
style="mso-margin-top-alt:auto;mso-margin-bottom-alt:auto;line-height:15.0pt;background:white"><strong><span
style="font-size:9.5pt;font-family:&quot;Verdana&quot;,&quot;sans-serif&quot;">:</span></strong><span
style="font-size:9.5pt;font-family:&quot;Verdana&quot;,&quot;sans-serif&quot;">&nbsp;an
                                  increase by addition&nbsp;&lt;a sudden&nbsp;<em><span
style="font-family:&quot;Verdana&quot;,&quot;sans-serif&quot;">access</span></em>&nbsp;of

                                  wealth&gt;</span><o:p></o:p></p>
                            </div>
                          </div>
                          <div>
                            <p class="MsoNormal"
                              style="mso-margin-top-alt:auto;mso-margin-bottom-alt:auto">&nbsp;<o:p></o:p></p>
                          </div>
                          <div>
                            <p class="MsoNormal"
                              style="mso-margin-top-alt:auto;mso-margin-bottom-alt:auto">Replacing
                              "access" with any of the definition above
                              does not seem to work.&nbsp;<o:p></o:p></p>
                          </div>
                          <div>
                            <p class="MsoNormal"
                              style="mso-margin-top-alt:auto;mso-margin-bottom-alt:auto">&nbsp;<o:p></o:p></p>
                          </div>
                          <div>
                            <p class="MsoNormal"
                              style="mso-margin-top-alt:auto;mso-margin-bottom-alt:auto">Remember,
                              a URL is represents a "thing".&nbsp;<o:p></o:p></p>
                          </div>
                          <div>
                            <p class="MsoNormal"
                              style="mso-margin-top-alt:auto;mso-margin-bottom-alt:auto">The
                              name of the endpoint should represent the
                              "thing".&nbsp;<o:p></o:p></p>
                          </div>
                          <div>
                            <p class="MsoNormal"
                              style="mso-margin-top-alt:auto;mso-margin-bottom-alt:auto">&nbsp;<o:p></o:p></p>
                          </div>
                          <div>
                            <p class="MsoNormal"
                              style="mso-margin-top-alt:auto;mso-margin-bottom-alt:auto">I
                              am merginally OK with "client registration
                              url" leveraging on the definition 2. below
                              (again from Webster -- my OED subscription
                              lapsed for the time being.)&nbsp;<o:p></o:p></p>
                          </div>
                          <div>
                            <p class="MsoNormal"
                              style="mso-margin-top-alt:auto;mso-margin-bottom-alt:auto">&nbsp;<o:p></o:p></p>
                          </div>
                          <div>
                            <p class="MsoNormal"
                              style="mso-margin-top-alt:auto;mso-margin-bottom-alt:auto"><b>registration
                              </b><i>n.</i><o:p></o:p></p>
                          </div>
                          <div>
                            <p class="MsoNormal"
                              style="mso-margin-top-alt:auto;mso-margin-bottom-alt:auto">&nbsp;<o:p></o:p></p>
                          </div>
                          <div>
                            <div>
                              <div>
                                <p class="MsoNormal"
style="mso-margin-top-alt:auto;mso-margin-bottom-alt:auto;line-height:15.0pt;background:white"><b><span
style="font-size:9.5pt;font-family:&quot;Verdana&quot;,&quot;sans-serif&quot;">1</span></b><o:p></o:p></p>
                              </div>
                              <div
                                style="margin-left:15.0pt;margin-bottom:7.5pt">
                                <p class="MsoNormal"
style="mso-margin-top-alt:auto;mso-margin-bottom-alt:auto;line-height:15.0pt;background:white"><strong><span
style="font-size:9.5pt;font-family:&quot;Verdana&quot;,&quot;sans-serif&quot;">:</span></strong><span
style="font-size:9.5pt;font-family:&quot;Verdana&quot;,&quot;sans-serif&quot;">&nbsp;the
                                    act of&nbsp;<a moz-do-not-send="true"
                                      href="http://www.merriam-webster.com/dictionary/registering"
                                      target="_blank"><span
                                        style="font-size:10.0pt;color:#1122CC">registering</span></a></span><o:p></o:p></p>
                              </div>
                            </div>
                            <div>
                              <div>
                                <p class="MsoNormal"
style="mso-margin-top-alt:auto;mso-margin-bottom-alt:auto;line-height:15.0pt;background:white"><b><span
style="font-size:9.5pt;font-family:&quot;Verdana&quot;,&quot;sans-serif&quot;">2</span></b><o:p></o:p></p>
                              </div>
                              <div
                                style="margin-left:15.0pt;margin-bottom:7.5pt">
                                <p class="MsoNormal"
style="mso-margin-top-alt:auto;mso-margin-bottom-alt:auto;line-height:15.0pt;background:white"><strong><span
style="font-size:9.5pt;font-family:&quot;Verdana&quot;,&quot;sans-serif&quot;">:</span></strong><span
style="font-size:9.5pt;font-family:&quot;Verdana&quot;,&quot;sans-serif&quot;">&nbsp;an
                                    entry in a&nbsp;<a moz-do-not-send="true"
href="http://www.merriam-webster.com/dictionary/register"
                                      target="_blank"><span
                                        style="font-size:10.0pt;color:#1122CC">register</span></a></span><o:p></o:p></p>
                              </div>
                            </div>
                            <div>
                              <div>
                                <p class="MsoNormal"
style="mso-margin-top-alt:auto;mso-margin-bottom-alt:auto;line-height:15.0pt;background:white"><b><span
style="font-size:9.5pt;font-family:&quot;Verdana&quot;,&quot;sans-serif&quot;">3</span></b><o:p></o:p></p>
                              </div>
                              <div
                                style="margin-left:15.0pt;margin-bottom:7.5pt">
                                <p class="MsoNormal"
style="mso-margin-top-alt:auto;mso-margin-bottom-alt:auto;line-height:15.0pt;background:white"><strong><span
style="font-size:9.5pt;font-family:&quot;Verdana&quot;,&quot;sans-serif&quot;">:</span></strong><span
style="font-size:9.5pt;font-family:&quot;Verdana&quot;,&quot;sans-serif&quot;">&nbsp;the
                                    number of individuals&nbsp;<a
                                      moz-do-not-send="true"
                                      href="http://www.merriam-webster.com/dictionary/registered"
                                      target="_blank"><span
                                        style="font-size:10.0pt;color:#1122CC">registered</span></a>&nbsp;<strong><span
style="font-family:&quot;Verdana&quot;,&quot;sans-serif&quot;">:</span></strong>&nbsp;<a
                                      moz-do-not-send="true"
                                      href="http://www.merriam-webster.com/dictionary/enrollment"
                                      target="_blank"><span
                                        style="font-variant:small-caps;color:#1122CC">enrollment</span></a></span><o:p></o:p></p>
                              </div>
                            </div>
                            <div>
                              <div>
                                <p class="MsoNormal"
style="mso-margin-top-alt:auto;mso-margin-bottom-alt:auto;line-height:15.0pt;background:white"><b><span
style="font-size:9.5pt;font-family:&quot;Verdana&quot;,&quot;sans-serif&quot;">4</span></b><o:p></o:p></p>
                              </div>
                              <div
                                style="margin-left:15.0pt;margin-bottom:7.5pt">
                                <p class="MsoNormal"
style="mso-margin-top-alt:auto;mso-margin-bottom-alt:auto;line-height:15.0pt;background:white"><em><b><span
style="font-size:9.5pt;font-family:&quot;Verdana&quot;,&quot;sans-serif&quot;;font-style:normal">a</span></b></em><span
style="font-size:9.5pt;font-family:&quot;Verdana&quot;,&quot;sans-serif&quot;">&nbsp;<strong><span
style="font-family:&quot;Verdana&quot;,&quot;sans-serif&quot;">:</span></strong>&nbsp;the
                                    art or act of selecting and
                                    adjusting pipe organ stops</span><o:p></o:p></p>
                                <p class="MsoNormal"
style="mso-margin-top-alt:auto;mso-margin-bottom-alt:auto;line-height:15.0pt;background:white"><em><b><span
style="font-size:9.5pt;font-family:&quot;Verdana&quot;,&quot;sans-serif&quot;;font-style:normal">b</span></b></em><span
style="font-size:9.5pt;font-family:&quot;Verdana&quot;,&quot;sans-serif&quot;">&nbsp;<strong><span
style="font-family:&quot;Verdana&quot;,&quot;sans-serif&quot;">:</span></strong>&nbsp;the
                                    combination of stops selected for
                                    performing a particular organ work</span><o:p></o:p></p>
                              </div>
                            </div>
                            <div>
                              <div>
                                <p class="MsoNormal"
style="mso-margin-top-alt:auto;mso-margin-bottom-alt:auto;line-height:15.0pt;background:white"><b><span
style="font-size:9.5pt;font-family:&quot;Verdana&quot;,&quot;sans-serif&quot;">5</span></b><o:p></o:p></p>
                              </div>
                              <div
                                style="margin-left:15.0pt;margin-bottom:7.5pt">
                                <p class="MsoNormal"
style="mso-margin-top-alt:auto;mso-margin-bottom-alt:auto;line-height:15.0pt;background:white"><strong><span
style="font-size:9.5pt;font-family:&quot;Verdana&quot;,&quot;sans-serif&quot;">:</span></strong><span
style="font-size:9.5pt;font-family:&quot;Verdana&quot;,&quot;sans-serif&quot;">&nbsp;a
                                    document certifying an act of
                                    registering</span><o:p></o:p></p>
                              </div>
                            </div>
                          </div>
                          <div>
                            <p class="MsoNormal"
                              style="mso-margin-top-alt:auto;mso-margin-bottom-alt:auto">&nbsp;<o:p></o:p></p>
                          </div>
                          <div>
                            <p class="MsoNormal"
                              style="mso-margin-top-alt:auto;mso-margin-bottom-alt:auto">However,
                              since the most common use of
                              "registration" is actually
                              <b>1</b> above, it still is confusing. If
                              you really want to emphasize the fact that
                              it has been registered, then something
                              like "registered client info uri" or
                              "registered client metadata uri" would be
                              better.&nbsp;<o:p></o:p></p>
                          </div>
                          <div>
                            <p class="MsoNormal"
                              style="mso-margin-top-alt:auto;mso-margin-bottom-alt:auto">&nbsp;<o:p></o:p></p>
                          </div>
                          <div>
                            <p class="MsoNormal"
                              style="mso-margin-top-alt:auto;mso-margin-bottom-alt:auto">Nat<o:p></o:p></p>
                          </div>
                          <div>
                            <p class="MsoNormal"
                              style="mso-margin-top-alt:auto;mso-margin-bottom-alt:auto">&nbsp;<o:p></o:p></p>
                          </div>
                          <p class="MsoNormal"
                            style="mso-margin-top-alt:auto;mso-margin-bottom-alt:auto">&nbsp;<o:p></o:p></p>
                          <div>
                            <p class="MsoNormal"
                              style="mso-margin-top-alt:auto;mso-margin-bottom-alt:auto">2013/2/20
                              Mike Jones &lt;<a moz-do-not-send="true"
                                href="mailto:Michael.Jones@microsoft.com"
                                target="_blank">Michael.Jones@microsoft.com</a>&gt;<o:p></o:p></p>
                            <div>
                              <div>
                                <p class="MsoNormal"
                                  style="mso-margin-top-alt:auto;mso-margin-bottom-alt:auto"><span
style="font-size:11.0pt;font-family:&quot;Calibri&quot;,&quot;sans-serif&quot;;color:#1F497D">For
                                    what it&#8217;s worth, the name
                                    &#8220;registration_access_url&#8221; was chosen
                                    to be parallel to
                                    &#8220;registration_access_token&#8221;.&nbsp;&nbsp; It&#8217;s
                                    the place you use the access token.&nbsp;
                                    And it&#8217;s where you access an
                                    existing registration.&nbsp; I&#8217;m against
                                    the name &#8220;client_metadata_url&#8221;
                                    because it&#8217;s not metadata you&#8217;re
                                    accessing &#8211; it&#8217;s a registration
                                    you&#8217;re accessing.&nbsp; For the same
                                    reason, I don&#8217;t think the name
                                    &#8220;client_info_url&#8221; gives people the
                                    right idea, because it doesn&#8217;t say
                                    anything it being the registration
                                    that you&#8217;re accessing.</span><o:p></o:p></p>
                                <p class="MsoNormal"
                                  style="mso-margin-top-alt:auto;mso-margin-bottom-alt:auto"><span
style="font-size:11.0pt;font-family:&quot;Calibri&quot;,&quot;sans-serif&quot;;color:#1F497D">&nbsp;</span><o:p></o:p></p>
                                <p class="MsoNormal"
                                  style="mso-margin-top-alt:auto;mso-margin-bottom-alt:auto"><span
style="font-size:11.0pt;font-family:&quot;Calibri&quot;,&quot;sans-serif&quot;;color:#1F497D">If
                                    you really want us to change this,
                                    having read what&#8217;s above, I could
                                    live with &#8220;client_registration_url&#8221;,
                                    but I don&#8217;t think a change is
                                    actually necessary.&nbsp; (But if we are
                                    going to change it, let&#8217;s do it
                                    ASAP, before the OpenID Connect
                                    Implementer&#8217;s Drafts are published.)</span><o:p></o:p></p>
                                <p class="MsoNormal"
                                  style="mso-margin-top-alt:auto;mso-margin-bottom-alt:auto"><span
style="font-size:11.0pt;font-family:&quot;Calibri&quot;,&quot;sans-serif&quot;;color:#1F497D">&nbsp;</span><o:p></o:p></p>
                                <p class="MsoNormal"
                                  style="mso-margin-top-alt:auto;mso-margin-bottom-alt:auto"><span
style="font-size:11.0pt;font-family:&quot;Calibri&quot;,&quot;sans-serif&quot;;color:#1F497D">&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;
                                    -- Mike</span><o:p></o:p></p>
                                <p class="MsoNormal"
                                  style="mso-margin-top-alt:auto;mso-margin-bottom-alt:auto"><span
style="font-size:11.0pt;font-family:&quot;Calibri&quot;,&quot;sans-serif&quot;;color:#1F497D">&nbsp;</span><o:p></o:p></p>
                                <p class="MsoNormal"
                                  style="mso-margin-top-alt:auto;mso-margin-bottom-alt:auto"><b><span
style="font-size:10.0pt;font-family:&quot;Tahoma&quot;,&quot;sans-serif&quot;">From:</span></b><span
style="font-size:10.0pt;font-family:&quot;Tahoma&quot;,&quot;sans-serif&quot;">
                                    <a moz-do-not-send="true"
                                      href="mailto:oauth-bounces@ietf.org"
                                      target="_blank">oauth-bounces@ietf.org</a>
                                    [mailto:<a moz-do-not-send="true"
                                      href="mailto:oauth-bounces@ietf.org"
                                      target="_blank">oauth-bounces@ietf.org</a>]
                                    <b>On Behalf Of </b>Nat Sakimura<br>
                                    <b>Sent:</b> Wednesday, February 20,
                                    2013 7:58 AM<br>
                                    <b>To:</b> &lt;<a
                                      moz-do-not-send="true"
                                      href="mailto:oauth@ietf.org"
                                      target="_blank">oauth@ietf.org</a>&gt;;
                                    Richer, Justin P.; John Bradley</span><o:p></o:p></p>
                                <div>
                                  <p class="MsoNormal"
                                    style="mso-margin-top-alt:auto;mso-margin-bottom-alt:auto"><br>
                                    <b>Subject:</b> Re: [OAUTH-WG] I-D
                                    Action:
                                    draft-ietf-oauth-dyn-reg-06.txt<o:p></o:p></p>
                                </div>
                                <p class="MsoNormal"
                                  style="mso-margin-top-alt:auto;mso-margin-bottom-alt:auto">&nbsp;<o:p></o:p></p>
                                <p class="MsoNormal"
                                  style="mso-margin-top-alt:auto;mso-margin-bottom-alt:auto"><span
style="font-size:13.5pt;font-family:&quot;Arial&quot;,&quot;sans-serif&quot;;color:#222222;background:white">Thanks
                                    Justin.</span><o:p></o:p></p>
                                <div>
                                  <div>
                                    <p class="MsoNormal"
                                      style="mso-margin-top-alt:auto;mso-margin-bottom-alt:auto"><span
style="font-size:13.5pt;font-family:&quot;Arial&quot;,&quot;sans-serif&quot;;color:#222222"><br>
                                        <br>
                                        <span style="background:white">Even
                                          if we go flat rather than
                                          doing JSON Structure, the
                                          "Client</span><br>
                                        <span style="background:white">Registration
                                          Access Endpoint" is not a good
                                          representative name.</span><br>
                                        <br>
                                        <span style="background:white">What
                                          it represents is the client
                                          metadata/info.</span><br>
                                        <span style="background:white">It
                                          is not representing "Client
                                          Registration Access".&nbsp;</span></span><o:p></o:p></p>
                                  </div>
                                </div>
                                <div>
                                  <div>
                                    <div>
                                      <p class="MsoNormal"
                                        style="mso-margin-top-alt:auto;mso-margin-bottom-alt:auto">What
                                        does "Client Registration
                                        Access" mean?&nbsp;<o:p></o:p></p>
                                    </div>
                                    <div>
                                      <p class="MsoNormal"
                                        style="mso-margin-top-alt:auto;margin-bottom:12.0pt"><span
style="font-size:13.5pt;font-family:&quot;Arial&quot;,&quot;sans-serif&quot;;color:#222222;background:white">Does
                                          UPDATing "Cleint Registration
                                          Access" make sense?</span><br>
                                        <span
style="font-size:13.5pt;font-family:&quot;Arial&quot;,&quot;sans-serif&quot;;color:#222222"><br>
                                          <span style="background:white">Something
                                            in the line of "Client
                                            Metadata Endpoint" and</span><br>
                                          <span style="background:white">something
                                            like "client_metadata_url"
                                            or&nbsp;"client_info_url" is much
                                            better.</span><br>
                                          <br>
                                          <span style="background:white">Nat</span></span><o:p></o:p></p>
                                      <div>
                                        <p class="MsoNormal"
                                          style="mso-margin-top-alt:auto;mso-margin-bottom-alt:auto">2013/2/15
                                          Richer, Justin P. &lt;<a
                                            moz-do-not-send="true"
                                            href="mailto:jricher@mitre.org"
                                            target="_blank">jricher@mitre.org</a>&gt;<o:p></o:p></p>
                                        <p class="MsoNormal"
                                          style="mso-margin-top-alt:auto;mso-margin-bottom-alt:auto">Everyone,
                                          there's a new draft of DynReg
                                          up on the tracker. This draft
                                          tries to codify the
                                          discussions so far from this
                                          week into something we can all
                                          read. There are still plenty
                                          of open discussion points and
                                          items up for debate. Please
                                          read through this latest draft
                                          and see what's changed and
                                          help assure that it properly
                                          captures the conversations. If
                                          you have any inputs for the
                                          marked [[ Editor's Note ]]
                                          sections, please send them to
                                          the list by next Thursday to
                                          give me opportunity to get any
                                          necessary changes in by the
                                          cutoff date of Monday the
                                          22nd.<br>
                                          <br>
                                          Thanks for all of your hard
                                          work everyone, I think this is
                                          *really* coming along now.<br>
                                          <span style="color:#888888"><br>
                                            &nbsp;-- Justin</span><o:p></o:p></p>
                                        <div>
                                          <div>
                                            <p class="MsoNormal"
                                              style="mso-margin-top-alt:auto;mso-margin-bottom-alt:auto"><br>
                                              On Feb 15, 2013, at 4:54
                                              PM, <a
                                                moz-do-not-send="true"
                                                href="mailto:internet-drafts@ietf.org"
                                                target="_blank">
                                                internet-drafts@ietf.org</a>
                                              wrote:<br>
                                              <br>
                                              &gt;<br>
                                              &gt; A New Internet-Draft
                                              is available from the
                                              on-line Internet-Drafts
                                              directories.<br>
                                              &gt; This draft is a work
                                              item of the Web
                                              Authorization Protocol
                                              Working Group of the IETF.<br>
                                              &gt;<br>
                                              &gt; &nbsp; &nbsp; &nbsp; Title &nbsp; &nbsp; &nbsp; &nbsp; &nbsp;
                                              : OAuth Dynamic Client
                                              Registration Protocol<br>
                                              &gt; &nbsp; &nbsp; &nbsp; Author(s) &nbsp; &nbsp; &nbsp;
                                              : Justin Richer<br>
                                              &gt; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp;
                                              &nbsp; &nbsp;John Bradley<br>
                                              &gt; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp;
                                              &nbsp; &nbsp;Michael B. Jones<br>
                                              &gt; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp;
                                              &nbsp; &nbsp;Maciej Machulak<br>
                                              &gt; &nbsp; &nbsp; &nbsp; Filename &nbsp; &nbsp; &nbsp;
                                              &nbsp;:
                                              draft-ietf-oauth-dyn-reg-06.txt<br>
                                              &gt; &nbsp; &nbsp; &nbsp; Pages &nbsp; &nbsp; &nbsp; &nbsp; &nbsp;
                                              : 21<br>
                                              &gt; &nbsp; &nbsp; &nbsp; Date &nbsp; &nbsp; &nbsp; &nbsp; &nbsp;
                                              &nbsp;: 2013-02-15<br>
                                              &gt;<br>
                                              &gt; Abstract:<br>
                                              &gt; &nbsp; This specification
                                              defines an endpoint and
                                              protocol for dynamic<br>
                                              &gt; &nbsp; registration of
                                              OAuth Clients at an
                                              Authorization Server.<br>
                                              &gt;<br>
                                              &gt;<br>
                                              &gt; The IETF datatracker
                                              status page for this draft
                                              is:<br>
                                              &gt; <a
                                                moz-do-not-send="true"
                                                href="https://datatracker.ietf.org/doc/draft-ietf-oauth-dyn-reg"
                                                target="_blank">
https://datatracker.ietf.org/doc/draft-ietf-oauth-dyn-reg</a><br>
                                              &gt;<br>
                                              &gt; There's also a
                                              htmlized version available
                                              at:<br>
                                              &gt; <a
                                                moz-do-not-send="true"
                                                href="http://tools.ietf.org/html/draft-ietf-oauth-dyn-reg-06"
                                                target="_blank">
http://tools.ietf.org/html/draft-ietf-oauth-dyn-reg-06</a><br>
                                              &gt;<br>
                                              &gt; A diff from the
                                              previous version is
                                              available at:<br>
                                              &gt; <a
                                                moz-do-not-send="true"
                                                href="http://www.ietf.org/rfcdiff?url2=draft-ietf-oauth-dyn-reg-06"
                                                target="_blank">
http://www.ietf.org/rfcdiff?url2=draft-ietf-oauth-dyn-reg-06</a><br>
                                              &gt;<br>
                                              &gt;<br>
                                              &gt; Internet-Drafts are
                                              also available by
                                              anonymous FTP at:<br>
                                              &gt; <a
                                                moz-do-not-send="true"
                                                href="ftp://ftp.ietf.org/internet-drafts/"
                                                target="_blank">ftp://ftp.ietf.org/internet-drafts/</a><br>
                                              &gt;<br>
                                              &gt;
                                              _______________________________________________<br>
                                              &gt; OAuth mailing list<br>
                                              &gt; <a
                                                moz-do-not-send="true"
                                                href="mailto:OAuth@ietf.org"
                                                target="_blank">OAuth@ietf.org</a><br>
                                              &gt; <a
                                                moz-do-not-send="true"
                                                href="https://www.ietf.org/mailman/listinfo/oauth"
                                                target="_blank">https://www.ietf.org/mailman/listinfo/oauth</a><br>
                                              <br>
_______________________________________________<br>
                                              OAuth mailing list<br>
                                              <a moz-do-not-send="true"
href="mailto:OAuth@ietf.org" target="_blank">OAuth@ietf.org</a><br>
                                              <a moz-do-not-send="true"
href="https://www.ietf.org/mailman/listinfo/oauth" target="_blank">https://www.ietf.org/mailman/listinfo/oauth</a><o:p></o:p></p>
                                          </div>
                                        </div>
                                      </div>
                                      <p class="MsoNormal"
                                        style="mso-margin-top-alt:auto;mso-margin-bottom-alt:auto"><br>
                                        <br clear="all">
                                        <o:p></o:p></p>
                                      <div>
                                        <p class="MsoNormal"
                                          style="mso-margin-top-alt:auto;mso-margin-bottom-alt:auto">&nbsp;<o:p></o:p></p>
                                      </div>
                                      <p class="MsoNormal"
                                        style="mso-margin-top-alt:auto;mso-margin-bottom-alt:auto">--
                                        <br>
                                        Nat Sakimura (=nat)<o:p></o:p></p>
                                      <div>
                                        <p class="MsoNormal"
                                          style="mso-margin-top-alt:auto;mso-margin-bottom-alt:auto">Chairman,
                                          OpenID Foundation<br>
                                          <a moz-do-not-send="true"
                                            href="http://nat.sakimura.org/"
                                            target="_blank">http://nat.sakimura.org/</a><br>
                                          @_nat_en<o:p></o:p></p>
                                      </div>
                                    </div>
                                  </div>
                                </div>
                              </div>
                            </div>
                          </div>
                          <p class="MsoNormal"
                            style="mso-margin-top-alt:auto;mso-margin-bottom-alt:auto"><br>
                            <br clear="all">
                            <o:p></o:p></p>
                          <div>
                            <p class="MsoNormal"
                              style="mso-margin-top-alt:auto;mso-margin-bottom-alt:auto">&nbsp;<o:p></o:p></p>
                          </div>
                          <p class="MsoNormal"
                            style="mso-margin-top-alt:auto;mso-margin-bottom-alt:auto">--
                            <br>
                            Nat Sakimura (=nat)<o:p></o:p></p>
                          <div>
                            <p class="MsoNormal"
                              style="mso-margin-top-alt:auto;mso-margin-bottom-alt:auto">Chairman,
                              OpenID Foundation<br>
                              <a moz-do-not-send="true"
                                href="http://nat.sakimura.org/"
                                target="_blank">http://nat.sakimura.org/</a><br>
                              @_nat_en<o:p></o:p></p>
                          </div>
                        </div>
                      </div>
                    </div>
                  </div>
                </div>
              </div>
            </div>
            <p class="MsoNormal"><br>
              <br clear="all">
              <o:p></o:p></p>
            <div>
              <p class="MsoNormal"><o:p>&nbsp;</o:p></p>
            </div>
            <p class="MsoNormal">-- <br>
              Nat Sakimura (=nat) <o:p></o:p></p>
            <div>
              <p class="MsoNormal">Chairman, OpenID Foundation<br>
                <a moz-do-not-send="true"
                  href="http://nat.sakimura.org/" target="_blank">http://nat.sakimura.org/</a><br>
                @_nat_en<o:p></o:p></p>
            </div>
          </div>
        </blockquote>
        <p class="MsoNormal"><o:p>&nbsp;</o:p></p>
      </div>
    </blockquote>
    <br>
  </body>
</html>

--------------010709050103070701040005--

From Michael.Jones@microsoft.com  Wed Feb 20 11:09:29 2013
Return-Path: <Michael.Jones@microsoft.com>
X-Original-To: oauth@ietfa.amsl.com
Delivered-To: oauth@ietfa.amsl.com
Received: from localhost (localhost [127.0.0.1]) by ietfa.amsl.com (Postfix) with ESMTP id CF32A21F8506 for <oauth@ietfa.amsl.com>; Wed, 20 Feb 2013 11:09:29 -0800 (PST)
X-Virus-Scanned: amavisd-new at amsl.com
X-Spam-Flag: NO
X-Spam-Score: -2.585
X-Spam-Level: 
X-Spam-Status: No, score=-2.585 tagged_above=-999 required=5 tests=[AWL=0.013,  BAYES_00=-2.599, HTML_MESSAGE=0.001]
Received: from mail.ietf.org ([64.170.98.30]) by localhost (ietfa.amsl.com [127.0.0.1]) (amavisd-new, port 10024) with ESMTP id ysIM9k9MGgPW for <oauth@ietfa.amsl.com>; Wed, 20 Feb 2013 11:09:24 -0800 (PST)
Received: from na01-bl2-obe.outbound.protection.outlook.com (na01-bl2-obe.ptr.protection.outlook.com [65.55.169.30]) by ietfa.amsl.com (Postfix) with ESMTP id 1027821F852C for <oauth@ietf.org>; Wed, 20 Feb 2013 11:09:23 -0800 (PST)
Received: from BL2FFO11FD017.protection.gbl (10.173.161.204) by BL2FFO11HUB005.protection.gbl (10.173.160.225) with Microsoft SMTP Server (TLS) id 15.0.620.12; Wed, 20 Feb 2013 19:09:12 +0000
Received: from TK5EX14HUBC107.redmond.corp.microsoft.com (131.107.125.37) by BL2FFO11FD017.mail.protection.outlook.com (10.173.161.35) with Microsoft SMTP Server (TLS) id 15.0.620.12 via Frontend Transport; Wed, 20 Feb 2013 19:09:12 +0000
Received: from TK5EX14MBXC284.redmond.corp.microsoft.com ([169.254.1.96]) by TK5EX14HUBC107.redmond.corp.microsoft.com ([157.54.80.67]) with mapi id 14.02.0318.003; Wed, 20 Feb 2013 19:08:44 +0000
From: Mike Jones <Michael.Jones@microsoft.com>
To: Justin Richer <jricher@mitre.org>
Thread-Topic: [OAUTH-WG] I-D Action: draft-ietf-oauth-dyn-reg-06.txt
Thread-Index: AQHOC8cMkbohP5vU0EO7eTLi/U/hMJh7eCuAgAd2gACAAAA6MIAADyiAgAAAlPCAAAbqAIAADigAgAAAsbCAAA3pAIAAAW8Q
Date: Wed, 20 Feb 2013 19:08:43 +0000
Message-ID: <4E1F6AAD24975D4BA5B16804296739436747B78E@TK5EX14MBXC284.redmond.corp.microsoft.com>
References: <20130215215423.23019.50224.idtracker@ietfa.amsl.com> <B33BFB58CCC8BE4998958016839DE27E06894B4F@IMCMBX01.MITRE.ORG> <CABzCy2CgnAtPrTY37H6vO-+5u3tRmsm+1j86r3w046AhHnNdfw@mail.gmail.com> <4E1F6AAD24975D4BA5B16804296739436747A665@TK5EX14MBXC284.redmond.corp.microsoft.com> <CABzCy2DHvFVmtv9jB-re5efKEVrfBBk4BZ83n_EQLMHOqsnXcA@mail.gmail.com> <4E1F6AAD24975D4BA5B16804296739436747ADDB@TK5EX14MBXC284.redmond.corp.microsoft.com> <CABzCy2AyCDxc+Gov7zBnTRquzp+QUMF8riqd_8vcP0rHFQUtkQ@mail.gmail.com> <512511B0.5090102@mitre.org> <4E1F6AAD24975D4BA5B16804296739436747B2BB@TK5EX14MBXC284.redmond.corp.microsoft.com> <51251DF0.8000804@mitre.org>
In-Reply-To: <51251DF0.8000804@mitre.org>
Accept-Language: en-US
Content-Language: en-US
X-MS-Has-Attach: 
X-MS-TNEF-Correlator: 
x-originating-ip: [157.54.51.75]
Content-Type: multipart/alternative; boundary="_000_4E1F6AAD24975D4BA5B16804296739436747B78ETK5EX14MBXC284r_"
MIME-Version: 1.0
X-Forefront-Antispam-Report: CIP:131.107.125.37; CTRY:US; IPV:CAL; IPV:NLI; EFV:NLI; SFV:NSPM; SFS:(199002)(189002)(377424002)(51704002)(377454001)(24454001)(51444002)(69224001)(65554002)(479174001)(20776003)(74662001)(47446002)(16406001)(56816002)(4396001)(54316002)(80022001)(56776001)(77982001)(59766001)(33656001)(63696002)(76482001)(51856001)(15202345001)(512954001)(53806001)(54356001)(74502001)(46102001)(31966008)(66066001)(16297215001)(55846006)(79102001)(47736001)(47976001)(49866001)(5343635001)(65816001)(16236675001)(5343655001)(44976002)(50986001); DIR:OUT; SFP:; SCL:1; SRVR:BL2FFO11HUB005; H:TK5EX14HUBC107.redmond.corp.microsoft.com; RD:InfoDomainNonexistent; A:1; MX:1; LANG:en; 
X-OriginatorOrg: microsoft.onmicrosoft.com
X-Forefront-PRVS: 07630F72AD
Cc: "<oauth@ietf.org>" <oauth@ietf.org>
Subject: Re: [OAUTH-WG] I-D Action: draft-ietf-oauth-dyn-reg-06.txt
X-BeenThere: oauth@ietf.org
X-Mailman-Version: 2.1.12
Precedence: list
List-Id: OAUTH WG <oauth.ietf.org>
List-Unsubscribe: <https://www.ietf.org/mailman/options/oauth>, <mailto:oauth-request@ietf.org?subject=unsubscribe>
List-Archive: <http://www.ietf.org/mail-archive/web/oauth>
List-Post: <mailto:oauth@ietf.org>
List-Help: <mailto:oauth-request@ietf.org?subject=help>
List-Subscribe: <https://www.ietf.org/mailman/listinfo/oauth>, <mailto:oauth-request@ietf.org?subject=subscribe>
X-List-Received-Date: Wed, 20 Feb 2013 19:09:30 -0000

--_000_4E1F6AAD24975D4BA5B16804296739436747B78ETK5EX14MBXC284r_
Content-Type: text/plain; charset="us-ascii"
Content-Transfer-Encoding: quoted-printable

That's OK by me too.

From: Justin Richer [mailto:jricher@mitre.org]
Sent: Wednesday, February 20, 2013 11:03 AM
To: Mike Jones
Cc: Nat Sakimura; <oauth@ietf.org>; John Bradley
Subject: Re: [OAUTH-WG] I-D Action: draft-ietf-oauth-dyn-reg-06.txt

On second thought, how about "registration_client_uri"? It's the URI for a =
particular client's registration. Use of the verb "registered" makes it sou=
nd like the result of an action that the client took, as if the client itse=
lf had registered the URI. That's obviously not the case, and we don't want=
 to convey that.

So, new proposed name: "registration_client_uri"

This has the nice side effect of being more parallel with "reigstration_acc=
ess_token".

 -- Justin
On 02/20/2013 01:13 PM, Mike Jones wrote:
SGTM

From: Justin Richer [mailto:jricher@mitre.org]
Sent: Wednesday, February 20, 2013 10:11 AM
To: Nat Sakimura
Cc: Mike Jones; <oauth@ietf.org><mailto:oauth@ietf.org>; John Bradley
Subject: Re: [OAUTH-WG] I-D Action: draft-ietf-oauth-dyn-reg-06.txt

I like "registered_client_uri", given all of the other discussions on this =
thread, because:

URL/URI: It *is* a URL, and an https one at that, but if the IETF conventio=
n is to call it URI, then I'm fine with that.

registered_client/registration_access: The former is a good description of =
what's actually *at* the URL, which fits better with the RESTful entity mod=
el. I think Nat's criticisms about the original formation of the parameter =
name are spot on, though at the time we hadn't heard anything better.


So I'd like to change it to "registered_client_uri" in the next draft.

 -- Justin
On 02/20/2013 12:20 PM, Nat Sakimura wrote:
I have thought about that as well. The the reason I added "info" or "metada=
ta" was that what was behind the URL is not the client itself. By "client r=
egistration", I suppose you mean "client entry in the register" (cf. regist=
ration n 2.) . It is the "registered data/info/metadata" about the client.

Nat
2013/2/20 Mike Jones <Michael.Jones@microsoft.com<mailto:Michael.Jones@micr=
osoft.com>>
I could live with "registered_client_url".  I think that adding "_metadata"=
 or "_info" is incorrect, because what's being accessed is the client' regi=
stration - not just metadata or info about the client's registration (altho=
ugh that information can be retrieved as one aspect of the operations on th=
e client's registration).

                                                            -- Mike

From: Nat Sakimura [mailto:sakimura@gmail.com<mailto:sakimura@gmail.com>]
Sent: Wednesday, February 20, 2013 8:53 AM
To: Mike Jones
Cc: <oauth@ietf.org<mailto:oauth@ietf.org>>; Richer, Justin P.; John Bradle=
y

Subject: Re: [OAUTH-WG] I-D Action: draft-ietf-oauth-dyn-reg-06.txt

I have read the whole thing and still ---

Your argument that it is the place for using "registration access token" th=
us should have a parallel name "registration access url" is very weak. Ther=
e are several weakness.

First, "registration access token" actually is "registration" + "access tok=
en". Extracting "registration access" from "registration access token" is b=
roken.

Secondly, access token is used to against any protected resource. Recommend=
ing to use the word "access" in naming protected resources is broken. Shoul=
d we rename Userinfo endpoint to something like "Userinfo Access Endpoint"?=
 I do not think so.

Thirdly, the term "Registration Access" does not seem to be meaningful.
When you say "access", I suppose you are using the noun version of it.
(If you are using the verb, then I am even more against as a URL should not=
 contain a verb.)

According to the Webster, access (n.) is defined as:

access n.

1
a : onset<http://www.merriam-webster.com/dictionary/onset> 2
b : a fit of intense feeling : outburst<http://www.merriam-webster.com/dict=
ionary/outburst>
2
a : permission, liberty, or ability to enter, approach, or pass to and from=
 a place or to approach or communicate with a person or thing
b : freedom or ability to obtain or make use of something
c : a way or means of access
d : the act or an instance of accessing<http://www.merriam-webster.com/dict=
ionary/accessing>
3
: an increase by addition <a sudden access of wealth>

Replacing "access" with any of the definition above does not seem to work.

Remember, a URL is represents a "thing".
The name of the endpoint should represent the "thing".

I am merginally OK with "client registration url" leveraging on the definit=
ion 2. below (again from Webster -- my OED subscription lapsed for the time=
 being.)

registration n.

1
: the act of registering<http://www.merriam-webster.com/dictionary/register=
ing>
2
: an entry in a register<http://www.merriam-webster.com/dictionary/register=
>
3
: the number of individuals registered<http://www.merriam-webster.com/dicti=
onary/registered> : enrollment<http://www.merriam-webster.com/dictionary/en=
rollment>
4
a : the art or act of selecting and adjusting pipe organ stops
b : the combination of stops selected for performing a particular organ wor=
k
5
: a document certifying an act of registering

However, since the most common use of "registration" is actually 1 above, i=
t still is confusing. If you really want to emphasize the fact that it has =
been registered, then something like "registered client info uri" or "regis=
tered client metadata uri" would be better.

Nat


2013/2/20 Mike Jones <Michael.Jones@microsoft.com<mailto:Michael.Jones@micr=
osoft.com>>
For what it's worth, the name "registration_access_url" was chosen to be pa=
rallel to "registration_access_token".   It's the place you use the access =
token.  And it's where you access an existing registration.  I'm against th=
e name "client_metadata_url" because it's not metadata you're accessing - i=
t's a registration you're accessing.  For the same reason, I don't think th=
e name "client_info_url" gives people the right idea, because it doesn't sa=
y anything it being the registration that you're accessing.

If you really want us to change this, having read what's above, I could liv=
e with "client_registration_url", but I don't think a change is actually ne=
cessary.  (But if we are going to change it, let's do it ASAP, before the O=
penID Connect Implementer's Drafts are published.)

                                                            -- Mike

From: oauth-bounces@ietf.org<mailto:oauth-bounces@ietf.org> [mailto:oauth-b=
ounces@ietf.org<mailto:oauth-bounces@ietf.org>] On Behalf Of Nat Sakimura
Sent: Wednesday, February 20, 2013 7:58 AM
To: <oauth@ietf.org<mailto:oauth@ietf.org>>; Richer, Justin P.; John Bradle=
y

Subject: Re: [OAUTH-WG] I-D Action: draft-ietf-oauth-dyn-reg-06.txt

Thanks Justin.


Even if we go flat rather than doing JSON Structure, the "Client
Registration Access Endpoint" is not a good representative name.

What it represents is the client metadata/info.
It is not representing "Client Registration Access".
What does "Client Registration Access" mean?
Does UPDATing "Cleint Registration Access" make sense?

Something in the line of "Client Metadata Endpoint" and
something like "client_metadata_url" or "client_info_url" is much better.

Nat
2013/2/15 Richer, Justin P. <jricher@mitre.org<mailto:jricher@mitre.org>>
Everyone, there's a new draft of DynReg up on the tracker. This draft tries=
 to codify the discussions so far from this week into something we can all =
read. There are still plenty of open discussion points and items up for deb=
ate. Please read through this latest draft and see what's changed and help =
assure that it properly captures the conversations. If you have any inputs =
for the marked [[ Editor's Note ]] sections, please send them to the list b=
y next Thursday to give me opportunity to get any necessary changes in by t=
he cutoff date of Monday the 22nd.

Thanks for all of your hard work everyone, I think this is *really* coming =
along now.

 -- Justin

On Feb 15, 2013, at 4:54 PM, internet-drafts@ietf.org<mailto:internet-draft=
s@ietf.org> wrote:

>
> A New Internet-Draft is available from the on-line Internet-Drafts direct=
ories.
> This draft is a work item of the Web Authorization Protocol Working Group=
 of the IETF.
>
>       Title           : OAuth Dynamic Client Registration Protocol
>       Author(s)       : Justin Richer
>                          John Bradley
>                          Michael B. Jones
>                          Maciej Machulak
>       Filename        : draft-ietf-oauth-dyn-reg-06.txt
>       Pages           : 21
>       Date            : 2013-02-15
>
> Abstract:
>   This specification defines an endpoint and protocol for dynamic
>   registration of OAuth Clients at an Authorization Server.
>
>
> The IETF datatracker status page for this draft is:
> https://datatracker.ietf.org/doc/draft-ietf-oauth-dyn-reg
>
> There's also a htmlized version available at:
> http://tools.ietf.org/html/draft-ietf-oauth-dyn-reg-06
>
> A diff from the previous version is available at:
> http://www.ietf.org/rfcdiff?url2=3Ddraft-ietf-oauth-dyn-reg-06
>
>
> Internet-Drafts are also available by anonymous FTP at:
> ftp://ftp.ietf.org/internet-drafts/
>
> _______________________________________________
> OAuth mailing list
> OAuth@ietf.org<mailto:OAuth@ietf.org>
> https://www.ietf.org/mailman/listinfo/oauth

_______________________________________________
OAuth mailing list
OAuth@ietf.org<mailto:OAuth@ietf.org>
https://www.ietf.org/mailman/listinfo/oauth



--
Nat Sakimura (=3Dnat)
Chairman, OpenID Foundation
http://nat.sakimura.org/
@_nat_en



--
Nat Sakimura (=3Dnat)
Chairman, OpenID Foundation
http://nat.sakimura.org/
@_nat_en



--
Nat Sakimura (=3Dnat)
Chairman, OpenID Foundation
http://nat.sakimura.org/
@_nat_en



--_000_4E1F6AAD24975D4BA5B16804296739436747B78ETK5EX14MBXC284r_
Content-Type: text/html; charset="us-ascii"
Content-Transfer-Encoding: quoted-printable

<html xmlns:v=3D"urn:schemas-microsoft-com:vml" xmlns:o=3D"urn:schemas-micr=
osoft-com:office:office" xmlns:w=3D"urn:schemas-microsoft-com:office:word" =
xmlns:m=3D"http://schemas.microsoft.com/office/2004/12/omml" xmlns=3D"http:=
//www.w3.org/TR/REC-html40">
<head>
<meta http-equiv=3D"Content-Type" content=3D"text/html; charset=3Dus-ascii"=
>
<meta name=3D"Generator" content=3D"Microsoft Word 14 (filtered medium)">
<style><!--
/* Font Definitions */
@font-face
	{font-family:Calibri;
	panose-1:2 15 5 2 2 2 4 3 2 4;}
@font-face
	{font-family:Tahoma;
	panose-1:2 11 6 4 3 5 4 4 2 4;}
@font-face
	{font-family:Verdana;
	panose-1:2 11 6 4 3 5 4 4 2 4;}
/* Style Definitions */
p.MsoNormal, li.MsoNormal, div.MsoNormal
	{margin:0in;
	margin-bottom:.0001pt;
	font-size:12.0pt;
	font-family:"Times New Roman","serif";
	color:black;}
a:link, span.MsoHyperlink
	{mso-style-priority:99;
	color:blue;
	text-decoration:underline;}
a:visited, span.MsoHyperlinkFollowed
	{mso-style-priority:99;
	color:purple;
	text-decoration:underline;}
p.MsoAcetate, li.MsoAcetate, div.MsoAcetate
	{mso-style-priority:99;
	mso-style-link:"Balloon Text Char";
	margin:0in;
	margin-bottom:.0001pt;
	font-size:8.0pt;
	font-family:"Tahoma","sans-serif";
	color:black;}
span.BalloonTextChar
	{mso-style-name:"Balloon Text Char";
	mso-style-priority:99;
	mso-style-link:"Balloon Text";
	font-family:"Tahoma","sans-serif";
	color:black;}
span.EmailStyle19
	{mso-style-type:personal;
	font-family:"Calibri","sans-serif";
	color:#1F497D;}
span.EmailStyle22
	{mso-style-type:personal-reply;
	font-family:"Calibri","sans-serif";
	color:#1F497D;}
.MsoChpDefault
	{mso-style-type:export-only;
	font-size:10.0pt;}
@page WordSection1
	{size:8.5in 11.0in;
	margin:1.0in 1.0in 1.0in 1.0in;}
div.WordSection1
	{page:WordSection1;}
--></style><!--[if gte mso 9]><xml>
<o:shapedefaults v:ext=3D"edit" spidmax=3D"1026" />
</xml><![endif]--><!--[if gte mso 9]><xml>
<o:shapelayout v:ext=3D"edit">
<o:idmap v:ext=3D"edit" data=3D"1" />
</o:shapelayout></xml><![endif]-->
</head>
<body bgcolor=3D"white" lang=3D"EN-US" link=3D"blue" vlink=3D"purple">
<div class=3D"WordSection1">
<p class=3D"MsoNormal"><span style=3D"font-size:11.0pt;font-family:&quot;Ca=
libri&quot;,&quot;sans-serif&quot;;color:#1F497D">That&#8217;s OK by me too=
.<o:p></o:p></span></p>
<p class=3D"MsoNormal"><span style=3D"font-size:11.0pt;font-family:&quot;Ca=
libri&quot;,&quot;sans-serif&quot;;color:#1F497D"><o:p>&nbsp;</o:p></span><=
/p>
<div>
<div style=3D"border:none;border-top:solid #B5C4DF 1.0pt;padding:3.0pt 0in =
0in 0in">
<p class=3D"MsoNormal"><b><span style=3D"font-size:10.0pt;font-family:&quot=
;Tahoma&quot;,&quot;sans-serif&quot;;color:windowtext">From:</span></b><spa=
n style=3D"font-size:10.0pt;font-family:&quot;Tahoma&quot;,&quot;sans-serif=
&quot;;color:windowtext"> Justin Richer [mailto:jricher@mitre.org]
<br>
<b>Sent:</b> Wednesday, February 20, 2013 11:03 AM<br>
<b>To:</b> Mike Jones<br>
<b>Cc:</b> Nat Sakimura; &lt;oauth@ietf.org&gt;; John Bradley<br>
<b>Subject:</b> Re: [OAUTH-WG] I-D Action: draft-ietf-oauth-dyn-reg-06.txt<=
o:p></o:p></span></p>
</div>
</div>
<p class=3D"MsoNormal"><o:p>&nbsp;</o:p></p>
<p class=3D"MsoNormal" style=3D"margin-bottom:12.0pt">On second thought, ho=
w about &quot;registration_client_uri&quot;? It's the URI for a particular =
client's registration. Use of the verb &quot;registered&quot; makes it soun=
d like the result of an action that the client took, as
 if the client itself had registered the URI. That's obviously not the case=
, and we don't want to convey that.
<br>
<br>
So, new proposed name: &quot;registration_client_uri&quot;<br>
<br>
This has the nice side effect of being more parallel with &quot;reigstratio=
n_access_token&quot;.
<br>
<br>
&nbsp;-- Justin<o:p></o:p></p>
<div>
<p class=3D"MsoNormal">On 02/20/2013 01:13 PM, Mike Jones wrote:<o:p></o:p>=
</p>
</div>
<blockquote style=3D"margin-top:5.0pt;margin-bottom:5.0pt">
<p class=3D"MsoNormal"><span style=3D"font-size:11.0pt;font-family:&quot;Ca=
libri&quot;,&quot;sans-serif&quot;;color:#1F497D">SGTM</span><o:p></o:p></p=
>
<p class=3D"MsoNormal"><span style=3D"font-size:11.0pt;font-family:&quot;Ca=
libri&quot;,&quot;sans-serif&quot;;color:#1F497D">&nbsp;</span><o:p></o:p><=
/p>
<div>
<div style=3D"border:none;border-top:solid #B5C4DF 1.0pt;padding:3.0pt 0in =
0in 0in">
<p class=3D"MsoNormal"><b><span style=3D"font-size:10.0pt;font-family:&quot=
;Tahoma&quot;,&quot;sans-serif&quot;;color:windowtext">From:</span></b><spa=
n style=3D"font-size:10.0pt;font-family:&quot;Tahoma&quot;,&quot;sans-serif=
&quot;;color:windowtext"> Justin Richer [<a href=3D"mailto:jricher@mitre.or=
g">mailto:jricher@mitre.org</a>]
<br>
<b>Sent:</b> Wednesday, February 20, 2013 10:11 AM<br>
<b>To:</b> Nat Sakimura<br>
<b>Cc:</b> Mike Jones; <a href=3D"mailto:oauth@ietf.org">&lt;oauth@ietf.org=
&gt;</a>; John Bradley<br>
<b>Subject:</b> Re: [OAUTH-WG] I-D Action: draft-ietf-oauth-dyn-reg-06.txt<=
/span><o:p></o:p></p>
</div>
</div>
<p class=3D"MsoNormal">&nbsp;<o:p></o:p></p>
<p class=3D"MsoNormal" style=3D"margin-bottom:12.0pt">I like &quot;register=
ed_client_uri&quot;, given all of the other discussions on this thread, bec=
ause:<br>
<br>
URL/URI: It *is* a URL, and an https one at that, but if the IETF conventio=
n is to call it URI, then I'm fine with that.<br>
<br>
registered_client/registration_access: The former is a good description of =
what's actually *at* the URL, which fits better with the RESTful entity mod=
el. I think Nat's criticisms about the original formation of the parameter =
name are spot on, though at the
 time we hadn't heard anything better.<br>
<br>
<br>
So I'd like to change it to &quot;registered_client_uri&quot; in the next d=
raft.<br>
<br>
&nbsp;-- Justin<o:p></o:p></p>
<div>
<p class=3D"MsoNormal">On 02/20/2013 12:20 PM, Nat Sakimura wrote:<o:p></o:=
p></p>
</div>
<blockquote style=3D"margin-top:5.0pt;margin-bottom:5.0pt">
<p class=3D"MsoNormal">I have thought about that as well. The the reason I =
added &quot;info&quot; or &quot;metadata&quot; was that what was behind the=
 URL is not the client itself. By &quot;client registration&quot;, I suppos=
e you mean &quot;client entry in the register&quot; (cf.
<b>registration </b><i>n</i> 2.) . It is the &quot;registered data/info/met=
adata&quot; about the client.&nbsp;
<o:p></o:p></p>
<div>
<p class=3D"MsoNormal">&nbsp;<o:p></o:p></p>
</div>
<div>
<p class=3D"MsoNormal" style=3D"margin-bottom:12.0pt">Nat<o:p></o:p></p>
<div>
<p class=3D"MsoNormal">2013/2/20 Mike Jones &lt;<a href=3D"mailto:Michael.J=
ones@microsoft.com" target=3D"_blank">Michael.Jones@microsoft.com</a>&gt;<o=
:p></o:p></p>
<div>
<div>
<p class=3D"MsoNormal" style=3D"mso-margin-top-alt:auto;mso-margin-bottom-a=
lt:auto"><span style=3D"font-size:11.0pt;font-family:&quot;Calibri&quot;,&q=
uot;sans-serif&quot;;color:#1F497D">I could live with &#8220;registered_cli=
ent_url&#8221;.&nbsp; I think that adding &#8220;_metadata&#8221; or &#8220=
;_info&#8221; is incorrect,
 because what&#8217;s being accessed is the client&#8217; registration &#82=
11; not just metadata or info about the client&#8217;s registration (althou=
gh that information can be retrieved as one aspect of the operations on the=
 client&#8217;s registration).</span><o:p></o:p></p>
<p class=3D"MsoNormal" style=3D"mso-margin-top-alt:auto;mso-margin-bottom-a=
lt:auto"><span style=3D"font-size:11.0pt;font-family:&quot;Calibri&quot;,&q=
uot;sans-serif&quot;;color:#1F497D">&nbsp;</span><o:p></o:p></p>
<p class=3D"MsoNormal" style=3D"mso-margin-top-alt:auto;mso-margin-bottom-a=
lt:auto"><span style=3D"font-size:11.0pt;font-family:&quot;Calibri&quot;,&q=
uot;sans-serif&quot;;color:#1F497D">&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nb=
sp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;=
&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nb=
sp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;=
&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nb=
sp;&nbsp;&nbsp; -- Mike</span><o:p></o:p></p>
<p class=3D"MsoNormal" style=3D"mso-margin-top-alt:auto;mso-margin-bottom-a=
lt:auto"><span style=3D"font-size:11.0pt;font-family:&quot;Calibri&quot;,&q=
uot;sans-serif&quot;;color:#1F497D">&nbsp;</span><o:p></o:p></p>
<p class=3D"MsoNormal" style=3D"mso-margin-top-alt:auto;mso-margin-bottom-a=
lt:auto"><b><span style=3D"font-size:10.0pt;font-family:&quot;Tahoma&quot;,=
&quot;sans-serif&quot;">From:</span></b><span style=3D"font-size:10.0pt;fon=
t-family:&quot;Tahoma&quot;,&quot;sans-serif&quot;"> Nat Sakimura [mailto:<=
a href=3D"mailto:sakimura@gmail.com" target=3D"_blank">sakimura@gmail.com</=
a>]
<br>
<b>Sent:</b> Wednesday, February 20, 2013 8:53 AM<br>
<b>To:</b> Mike Jones<br>
<b>Cc:</b> &lt;<a href=3D"mailto:oauth@ietf.org" target=3D"_blank">oauth@ie=
tf.org</a>&gt;; Richer, Justin P.; John Bradley</span><o:p></o:p></p>
<div>
<div>
<p class=3D"MsoNormal"><br>
<b>Subject:</b> Re: [OAUTH-WG] I-D Action: draft-ietf-oauth-dyn-reg-06.txt<=
o:p></o:p></p>
</div>
</div>
<div>
<div>
<p class=3D"MsoNormal" style=3D"mso-margin-top-alt:auto;mso-margin-bottom-a=
lt:auto">&nbsp;<o:p></o:p></p>
<p class=3D"MsoNormal" style=3D"mso-margin-top-alt:auto;mso-margin-bottom-a=
lt:auto">I have read the whole thing and still ---&nbsp;<o:p></o:p></p>
<div>
<p class=3D"MsoNormal" style=3D"mso-margin-top-alt:auto;mso-margin-bottom-a=
lt:auto">&nbsp;<o:p></o:p></p>
</div>
<div>
<p class=3D"MsoNormal" style=3D"mso-margin-top-alt:auto;mso-margin-bottom-a=
lt:auto">Your argument that it is the place for using &quot;registration ac=
cess token&quot; thus should have a parallel name &quot;registration access=
 url&quot; is very weak. There are several weakness.&nbsp;<o:p></o:p></p>
</div>
<div>
<p class=3D"MsoNormal" style=3D"mso-margin-top-alt:auto;mso-margin-bottom-a=
lt:auto">&nbsp;<o:p></o:p></p>
</div>
<div>
<p class=3D"MsoNormal" style=3D"mso-margin-top-alt:auto;mso-margin-bottom-a=
lt:auto">First, &quot;registration access token&quot; actually is &quot;reg=
istration&quot; &#43; &quot;access token&quot;. Extracting &quot;registrati=
on access&quot; from &quot;registration access token&quot; is broken.&nbsp;=
<o:p></o:p></p>
</div>
<div>
<p class=3D"MsoNormal" style=3D"mso-margin-top-alt:auto;mso-margin-bottom-a=
lt:auto">&nbsp;<o:p></o:p></p>
</div>
<div>
<p class=3D"MsoNormal" style=3D"mso-margin-top-alt:auto;mso-margin-bottom-a=
lt:auto">Secondly, access token is used to against any protected resource.&=
nbsp;Recommending&nbsp;to use the word &quot;access&quot; in naming protect=
ed resources is broken. Should we rename Userinfo endpoint
 to something like &quot;Userinfo Access Endpoint&quot;? I do not think so.=
&nbsp;<o:p></o:p></p>
</div>
<div>
<p class=3D"MsoNormal" style=3D"mso-margin-top-alt:auto;mso-margin-bottom-a=
lt:auto">&nbsp;<o:p></o:p></p>
</div>
<div>
<p class=3D"MsoNormal" style=3D"mso-margin-top-alt:auto;mso-margin-bottom-a=
lt:auto">Thirdly, the term &quot;Registration Access&quot; does not seem to=
 be meaningful.&nbsp;<o:p></o:p></p>
</div>
<div>
<p class=3D"MsoNormal" style=3D"mso-margin-top-alt:auto;mso-margin-bottom-a=
lt:auto">When you say &quot;access&quot;, I suppose you are using the noun =
version of it.&nbsp;<o:p></o:p></p>
</div>
<div>
<div>
<p class=3D"MsoNormal" style=3D"mso-margin-top-alt:auto;mso-margin-bottom-a=
lt:auto">(If you are using the verb, then I am even more against as a URL s=
hould not contain a verb.)&nbsp;<o:p></o:p></p>
</div>
<div>
<p class=3D"MsoNormal" style=3D"mso-margin-top-alt:auto;mso-margin-bottom-a=
lt:auto">&nbsp;<o:p></o:p></p>
</div>
<div>
<p class=3D"MsoNormal" style=3D"mso-margin-top-alt:auto;mso-margin-bottom-a=
lt:auto">According to the Webster, access (n.) is defined as:&nbsp;<o:p></o=
:p></p>
</div>
<div>
<p class=3D"MsoNormal" style=3D"mso-margin-top-alt:auto;mso-margin-bottom-a=
lt:auto">&nbsp;<o:p></o:p></p>
</div>
<div>
<p class=3D"MsoNormal" style=3D"mso-margin-top-alt:auto;mso-margin-bottom-a=
lt:auto"><b>access
</b><i>n.</i><o:p></o:p></p>
</div>
<div>
<p class=3D"MsoNormal" style=3D"mso-margin-top-alt:auto;mso-margin-bottom-a=
lt:auto">&nbsp;<o:p></o:p></p>
</div>
<div>
<div>
<div>
<p class=3D"MsoNormal" style=3D"mso-margin-top-alt:auto;mso-margin-bottom-a=
lt:auto;line-height:15.0pt;background:white">
<b><span style=3D"font-size:9.5pt;font-family:&quot;Verdana&quot;,&quot;san=
s-serif&quot;">1</span></b><o:p></o:p></p>
</div>
<div style=3D"margin-left:15.0pt;margin-bottom:7.5pt">
<p class=3D"MsoNormal" style=3D"mso-margin-top-alt:auto;mso-margin-bottom-a=
lt:auto;line-height:15.0pt;background:white">
<em><b><span style=3D"font-size:9.5pt;font-family:&quot;Verdana&quot;,&quot=
;sans-serif&quot;;font-style:normal">a</span></b></em><span style=3D"font-s=
ize:9.5pt;font-family:&quot;Verdana&quot;,&quot;sans-serif&quot;">&nbsp;<st=
rong><span style=3D"font-family:&quot;Verdana&quot;,&quot;sans-serif&quot;"=
>:</span></strong>&nbsp;<a href=3D"http://www.merriam-webster.com/dictionar=
y/onset" target=3D"_blank"><span style=3D"font-variant:small-caps;color:#11=
22CC">onset</span></a>&nbsp;2</span><o:p></o:p></p>
<p class=3D"MsoNormal" style=3D"mso-margin-top-alt:auto;mso-margin-bottom-a=
lt:auto;line-height:15.0pt;background:white">
<em><b><span style=3D"font-size:9.5pt;font-family:&quot;Verdana&quot;,&quot=
;sans-serif&quot;;font-style:normal">b</span></b></em><span style=3D"font-s=
ize:9.5pt;font-family:&quot;Verdana&quot;,&quot;sans-serif&quot;">&nbsp;<st=
rong><span style=3D"font-family:&quot;Verdana&quot;,&quot;sans-serif&quot;"=
>:</span></strong>&nbsp;a fit of
 intense feeling&nbsp;<strong><span style=3D"font-family:&quot;Verdana&quot=
;,&quot;sans-serif&quot;">:</span></strong>&nbsp;<a href=3D"http://www.merr=
iam-webster.com/dictionary/outburst" target=3D"_blank"><span style=3D"font-=
variant:small-caps;color:#1122CC">outburst</span></a></span><o:p></o:p></p>
</div>
</div>
<div>
<div>
<p class=3D"MsoNormal" style=3D"mso-margin-top-alt:auto;mso-margin-bottom-a=
lt:auto;line-height:15.0pt;background:white">
<b><span style=3D"font-size:9.5pt;font-family:&quot;Verdana&quot;,&quot;san=
s-serif&quot;">2</span></b><o:p></o:p></p>
</div>
<div style=3D"margin-left:15.0pt;margin-bottom:7.5pt">
<p class=3D"MsoNormal" style=3D"mso-margin-top-alt:auto;mso-margin-bottom-a=
lt:auto;line-height:15.0pt;background:white">
<em><b><span style=3D"font-size:9.5pt;font-family:&quot;Verdana&quot;,&quot=
;sans-serif&quot;;font-style:normal">a</span></b></em><span style=3D"font-s=
ize:9.5pt;font-family:&quot;Verdana&quot;,&quot;sans-serif&quot;">&nbsp;<st=
rong><span style=3D"font-family:&quot;Verdana&quot;,&quot;sans-serif&quot;"=
>:</span></strong>&nbsp;permission,
 liberty, or ability to enter, approach, or pass to and from a place or to =
approach or communicate with a person or thing</span><o:p></o:p></p>
<p class=3D"MsoNormal" style=3D"mso-margin-top-alt:auto;mso-margin-bottom-a=
lt:auto;line-height:15.0pt;background:white">
<em><b><span style=3D"font-size:9.5pt;font-family:&quot;Verdana&quot;,&quot=
;sans-serif&quot;;font-style:normal">b</span></b></em><span style=3D"font-s=
ize:9.5pt;font-family:&quot;Verdana&quot;,&quot;sans-serif&quot;">&nbsp;<st=
rong><span style=3D"font-family:&quot;Verdana&quot;,&quot;sans-serif&quot;"=
>:</span></strong>&nbsp;freedom or
 ability to obtain or make use of something</span><o:p></o:p></p>
<p class=3D"MsoNormal" style=3D"mso-margin-top-alt:auto;mso-margin-bottom-a=
lt:auto;line-height:15.0pt;background:white">
<em><b><span style=3D"font-size:9.5pt;font-family:&quot;Verdana&quot;,&quot=
;sans-serif&quot;;font-style:normal">c</span></b></em><span style=3D"font-s=
ize:9.5pt;font-family:&quot;Verdana&quot;,&quot;sans-serif&quot;">&nbsp;<st=
rong><span style=3D"font-family:&quot;Verdana&quot;,&quot;sans-serif&quot;"=
>:</span></strong>&nbsp;a way or
 means of access</span><o:p></o:p></p>
<p class=3D"MsoNormal" style=3D"mso-margin-top-alt:auto;mso-margin-bottom-a=
lt:auto;line-height:15.0pt;background:white">
<em><b><span style=3D"font-size:9.5pt;font-family:&quot;Verdana&quot;,&quot=
;sans-serif&quot;;font-style:normal">d</span></b></em><span style=3D"font-s=
ize:9.5pt;font-family:&quot;Verdana&quot;,&quot;sans-serif&quot;">&nbsp;<st=
rong><span style=3D"font-family:&quot;Verdana&quot;,&quot;sans-serif&quot;"=
>:</span></strong>&nbsp;the act or
 an instance of&nbsp;<a href=3D"http://www.merriam-webster.com/dictionary/a=
ccessing" target=3D"_blank"><span style=3D"font-size:10.0pt;color:#1122CC">=
accessing</span></a></span><o:p></o:p></p>
</div>
</div>
<div>
<div>
<p class=3D"MsoNormal" style=3D"mso-margin-top-alt:auto;mso-margin-bottom-a=
lt:auto;line-height:15.0pt;background:white">
<b><span style=3D"font-size:9.5pt;font-family:&quot;Verdana&quot;,&quot;san=
s-serif&quot;">3</span></b><o:p></o:p></p>
</div>
<div style=3D"margin-left:15.0pt;margin-bottom:7.5pt">
<p class=3D"MsoNormal" style=3D"mso-margin-top-alt:auto;mso-margin-bottom-a=
lt:auto;line-height:15.0pt;background:white">
<strong><span style=3D"font-size:9.5pt;font-family:&quot;Verdana&quot;,&quo=
t;sans-serif&quot;">:</span></strong><span style=3D"font-size:9.5pt;font-fa=
mily:&quot;Verdana&quot;,&quot;sans-serif&quot;">&nbsp;an increase by addit=
ion&nbsp;&lt;a sudden&nbsp;<em><span style=3D"font-family:&quot;Verdana&quo=
t;,&quot;sans-serif&quot;">access</span></em>&nbsp;of
 wealth&gt;</span><o:p></o:p></p>
</div>
</div>
<div>
<p class=3D"MsoNormal" style=3D"mso-margin-top-alt:auto;mso-margin-bottom-a=
lt:auto">&nbsp;<o:p></o:p></p>
</div>
<div>
<p class=3D"MsoNormal" style=3D"mso-margin-top-alt:auto;mso-margin-bottom-a=
lt:auto">Replacing &quot;access&quot; with any of the definition above does=
 not seem to work.&nbsp;<o:p></o:p></p>
</div>
<div>
<p class=3D"MsoNormal" style=3D"mso-margin-top-alt:auto;mso-margin-bottom-a=
lt:auto">&nbsp;<o:p></o:p></p>
</div>
<div>
<p class=3D"MsoNormal" style=3D"mso-margin-top-alt:auto;mso-margin-bottom-a=
lt:auto">Remember, a URL is represents a &quot;thing&quot;.&nbsp;<o:p></o:p=
></p>
</div>
<div>
<p class=3D"MsoNormal" style=3D"mso-margin-top-alt:auto;mso-margin-bottom-a=
lt:auto">The name of the endpoint should represent the &quot;thing&quot;.&n=
bsp;<o:p></o:p></p>
</div>
<div>
<p class=3D"MsoNormal" style=3D"mso-margin-top-alt:auto;mso-margin-bottom-a=
lt:auto">&nbsp;<o:p></o:p></p>
</div>
<div>
<p class=3D"MsoNormal" style=3D"mso-margin-top-alt:auto;mso-margin-bottom-a=
lt:auto">I am merginally OK with &quot;client registration url&quot; levera=
ging on the definition 2. below (again from Webster -- my OED subscription =
lapsed for the time being.)&nbsp;<o:p></o:p></p>
</div>
<div>
<p class=3D"MsoNormal" style=3D"mso-margin-top-alt:auto;mso-margin-bottom-a=
lt:auto">&nbsp;<o:p></o:p></p>
</div>
<div>
<p class=3D"MsoNormal" style=3D"mso-margin-top-alt:auto;mso-margin-bottom-a=
lt:auto"><b>registration
</b><i>n.</i><o:p></o:p></p>
</div>
<div>
<p class=3D"MsoNormal" style=3D"mso-margin-top-alt:auto;mso-margin-bottom-a=
lt:auto">&nbsp;<o:p></o:p></p>
</div>
<div>
<div>
<div>
<p class=3D"MsoNormal" style=3D"mso-margin-top-alt:auto;mso-margin-bottom-a=
lt:auto;line-height:15.0pt;background:white">
<b><span style=3D"font-size:9.5pt;font-family:&quot;Verdana&quot;,&quot;san=
s-serif&quot;">1</span></b><o:p></o:p></p>
</div>
<div style=3D"margin-left:15.0pt;margin-bottom:7.5pt">
<p class=3D"MsoNormal" style=3D"mso-margin-top-alt:auto;mso-margin-bottom-a=
lt:auto;line-height:15.0pt;background:white">
<strong><span style=3D"font-size:9.5pt;font-family:&quot;Verdana&quot;,&quo=
t;sans-serif&quot;">:</span></strong><span style=3D"font-size:9.5pt;font-fa=
mily:&quot;Verdana&quot;,&quot;sans-serif&quot;">&nbsp;the act of&nbsp;<a h=
ref=3D"http://www.merriam-webster.com/dictionary/registering" target=3D"_bl=
ank"><span style=3D"font-size:10.0pt;color:#1122CC">registering</span></a><=
/span><o:p></o:p></p>
</div>
</div>
<div>
<div>
<p class=3D"MsoNormal" style=3D"mso-margin-top-alt:auto;mso-margin-bottom-a=
lt:auto;line-height:15.0pt;background:white">
<b><span style=3D"font-size:9.5pt;font-family:&quot;Verdana&quot;,&quot;san=
s-serif&quot;">2</span></b><o:p></o:p></p>
</div>
<div style=3D"margin-left:15.0pt;margin-bottom:7.5pt">
<p class=3D"MsoNormal" style=3D"mso-margin-top-alt:auto;mso-margin-bottom-a=
lt:auto;line-height:15.0pt;background:white">
<strong><span style=3D"font-size:9.5pt;font-family:&quot;Verdana&quot;,&quo=
t;sans-serif&quot;">:</span></strong><span style=3D"font-size:9.5pt;font-fa=
mily:&quot;Verdana&quot;,&quot;sans-serif&quot;">&nbsp;an entry in a&nbsp;<=
a href=3D"http://www.merriam-webster.com/dictionary/register" target=3D"_bl=
ank"><span style=3D"font-size:10.0pt;color:#1122CC">register</span></a></sp=
an><o:p></o:p></p>
</div>
</div>
<div>
<div>
<p class=3D"MsoNormal" style=3D"mso-margin-top-alt:auto;mso-margin-bottom-a=
lt:auto;line-height:15.0pt;background:white">
<b><span style=3D"font-size:9.5pt;font-family:&quot;Verdana&quot;,&quot;san=
s-serif&quot;">3</span></b><o:p></o:p></p>
</div>
<div style=3D"margin-left:15.0pt;margin-bottom:7.5pt">
<p class=3D"MsoNormal" style=3D"mso-margin-top-alt:auto;mso-margin-bottom-a=
lt:auto;line-height:15.0pt;background:white">
<strong><span style=3D"font-size:9.5pt;font-family:&quot;Verdana&quot;,&quo=
t;sans-serif&quot;">:</span></strong><span style=3D"font-size:9.5pt;font-fa=
mily:&quot;Verdana&quot;,&quot;sans-serif&quot;">&nbsp;the number of indivi=
duals&nbsp;<a href=3D"http://www.merriam-webster.com/dictionary/registered"=
 target=3D"_blank"><span style=3D"font-size:10.0pt;color:#1122CC">registere=
d</span></a>&nbsp;<strong><span style=3D"font-family:&quot;Verdana&quot;,&q=
uot;sans-serif&quot;">:</span></strong>&nbsp;<a href=3D"http://www.merriam-=
webster.com/dictionary/enrollment" target=3D"_blank"><span style=3D"font-va=
riant:small-caps;color:#1122CC">enrollment</span></a></span><o:p></o:p></p>
</div>
</div>
<div>
<div>
<p class=3D"MsoNormal" style=3D"mso-margin-top-alt:auto;mso-margin-bottom-a=
lt:auto;line-height:15.0pt;background:white">
<b><span style=3D"font-size:9.5pt;font-family:&quot;Verdana&quot;,&quot;san=
s-serif&quot;">4</span></b><o:p></o:p></p>
</div>
<div style=3D"margin-left:15.0pt;margin-bottom:7.5pt">
<p class=3D"MsoNormal" style=3D"mso-margin-top-alt:auto;mso-margin-bottom-a=
lt:auto;line-height:15.0pt;background:white">
<em><b><span style=3D"font-size:9.5pt;font-family:&quot;Verdana&quot;,&quot=
;sans-serif&quot;;font-style:normal">a</span></b></em><span style=3D"font-s=
ize:9.5pt;font-family:&quot;Verdana&quot;,&quot;sans-serif&quot;">&nbsp;<st=
rong><span style=3D"font-family:&quot;Verdana&quot;,&quot;sans-serif&quot;"=
>:</span></strong>&nbsp;the art or
 act of selecting and adjusting pipe organ stops</span><o:p></o:p></p>
<p class=3D"MsoNormal" style=3D"mso-margin-top-alt:auto;mso-margin-bottom-a=
lt:auto;line-height:15.0pt;background:white">
<em><b><span style=3D"font-size:9.5pt;font-family:&quot;Verdana&quot;,&quot=
;sans-serif&quot;;font-style:normal">b</span></b></em><span style=3D"font-s=
ize:9.5pt;font-family:&quot;Verdana&quot;,&quot;sans-serif&quot;">&nbsp;<st=
rong><span style=3D"font-family:&quot;Verdana&quot;,&quot;sans-serif&quot;"=
>:</span></strong>&nbsp;the combination
 of stops selected for performing a particular organ work</span><o:p></o:p>=
</p>
</div>
</div>
<div>
<div>
<p class=3D"MsoNormal" style=3D"mso-margin-top-alt:auto;mso-margin-bottom-a=
lt:auto;line-height:15.0pt;background:white">
<b><span style=3D"font-size:9.5pt;font-family:&quot;Verdana&quot;,&quot;san=
s-serif&quot;">5</span></b><o:p></o:p></p>
</div>
<div style=3D"margin-left:15.0pt;margin-bottom:7.5pt">
<p class=3D"MsoNormal" style=3D"mso-margin-top-alt:auto;mso-margin-bottom-a=
lt:auto;line-height:15.0pt;background:white">
<strong><span style=3D"font-size:9.5pt;font-family:&quot;Verdana&quot;,&quo=
t;sans-serif&quot;">:</span></strong><span style=3D"font-size:9.5pt;font-fa=
mily:&quot;Verdana&quot;,&quot;sans-serif&quot;">&nbsp;a document certifyin=
g an act of registering</span><o:p></o:p></p>
</div>
</div>
</div>
<div>
<p class=3D"MsoNormal" style=3D"mso-margin-top-alt:auto;mso-margin-bottom-a=
lt:auto">&nbsp;<o:p></o:p></p>
</div>
<div>
<p class=3D"MsoNormal" style=3D"mso-margin-top-alt:auto;mso-margin-bottom-a=
lt:auto">However, since the most common use of &quot;registration&quot; is =
actually
<b>1</b> above, it still is confusing. If you really want to emphasize the =
fact that it has been registered, then something like &quot;registered clie=
nt info uri&quot; or &quot;registered client metadata uri&quot; would be be=
tter.&nbsp;<o:p></o:p></p>
</div>
<div>
<p class=3D"MsoNormal" style=3D"mso-margin-top-alt:auto;mso-margin-bottom-a=
lt:auto">&nbsp;<o:p></o:p></p>
</div>
<div>
<p class=3D"MsoNormal" style=3D"mso-margin-top-alt:auto;mso-margin-bottom-a=
lt:auto">Nat<o:p></o:p></p>
</div>
<div>
<p class=3D"MsoNormal" style=3D"mso-margin-top-alt:auto;mso-margin-bottom-a=
lt:auto">&nbsp;<o:p></o:p></p>
</div>
<p class=3D"MsoNormal" style=3D"mso-margin-top-alt:auto;mso-margin-bottom-a=
lt:auto">&nbsp;<o:p></o:p></p>
<div>
<p class=3D"MsoNormal" style=3D"mso-margin-top-alt:auto;mso-margin-bottom-a=
lt:auto">2013/2/20 Mike Jones &lt;<a href=3D"mailto:Michael.Jones@microsoft=
.com" target=3D"_blank">Michael.Jones@microsoft.com</a>&gt;<o:p></o:p></p>
<div>
<div>
<p class=3D"MsoNormal" style=3D"mso-margin-top-alt:auto;mso-margin-bottom-a=
lt:auto"><span style=3D"font-size:11.0pt;font-family:&quot;Calibri&quot;,&q=
uot;sans-serif&quot;;color:#1F497D">For what it&#8217;s worth, the name &#8=
220;registration_access_url&#8221; was chosen to be parallel to &#8220;regi=
stration_access_token&#8221;.&nbsp;&nbsp;
 It&#8217;s the place you use the access token.&nbsp; And it&#8217;s where =
you access an existing registration.&nbsp; I&#8217;m against the name &#822=
0;client_metadata_url&#8221; because it&#8217;s not metadata you&#8217;re a=
ccessing &#8211; it&#8217;s a registration you&#8217;re accessing.&nbsp; Fo=
r the same reason, I don&#8217;t think
 the name &#8220;client_info_url&#8221; gives people the right idea, becaus=
e it doesn&#8217;t say anything it being the registration that you&#8217;re=
 accessing.</span><o:p></o:p></p>
<p class=3D"MsoNormal" style=3D"mso-margin-top-alt:auto;mso-margin-bottom-a=
lt:auto"><span style=3D"font-size:11.0pt;font-family:&quot;Calibri&quot;,&q=
uot;sans-serif&quot;;color:#1F497D">&nbsp;</span><o:p></o:p></p>
<p class=3D"MsoNormal" style=3D"mso-margin-top-alt:auto;mso-margin-bottom-a=
lt:auto"><span style=3D"font-size:11.0pt;font-family:&quot;Calibri&quot;,&q=
uot;sans-serif&quot;;color:#1F497D">If you really want us to change this, h=
aving read what&#8217;s above, I could live with &#8220;client_registration=
_url&#8221;,
 but I don&#8217;t think a change is actually necessary.&nbsp; (But if we a=
re going to change it, let&#8217;s do it ASAP, before the OpenID Connect Im=
plementer&#8217;s Drafts are published.)</span><o:p></o:p></p>
<p class=3D"MsoNormal" style=3D"mso-margin-top-alt:auto;mso-margin-bottom-a=
lt:auto"><span style=3D"font-size:11.0pt;font-family:&quot;Calibri&quot;,&q=
uot;sans-serif&quot;;color:#1F497D">&nbsp;</span><o:p></o:p></p>
<p class=3D"MsoNormal" style=3D"mso-margin-top-alt:auto;mso-margin-bottom-a=
lt:auto"><span style=3D"font-size:11.0pt;font-family:&quot;Calibri&quot;,&q=
uot;sans-serif&quot;;color:#1F497D">&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nb=
sp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;=
&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nb=
sp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;=
&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nb=
sp;&nbsp;&nbsp; -- Mike</span><o:p></o:p></p>
<p class=3D"MsoNormal" style=3D"mso-margin-top-alt:auto;mso-margin-bottom-a=
lt:auto"><span style=3D"font-size:11.0pt;font-family:&quot;Calibri&quot;,&q=
uot;sans-serif&quot;;color:#1F497D">&nbsp;</span><o:p></o:p></p>
<p class=3D"MsoNormal" style=3D"mso-margin-top-alt:auto;mso-margin-bottom-a=
lt:auto"><b><span style=3D"font-size:10.0pt;font-family:&quot;Tahoma&quot;,=
&quot;sans-serif&quot;">From:</span></b><span style=3D"font-size:10.0pt;fon=
t-family:&quot;Tahoma&quot;,&quot;sans-serif&quot;">
<a href=3D"mailto:oauth-bounces@ietf.org" target=3D"_blank">oauth-bounces@i=
etf.org</a> [mailto:<a href=3D"mailto:oauth-bounces@ietf.org" target=3D"_bl=
ank">oauth-bounces@ietf.org</a>]
<b>On Behalf Of </b>Nat Sakimura<br>
<b>Sent:</b> Wednesday, February 20, 2013 7:58 AM<br>
<b>To:</b> &lt;<a href=3D"mailto:oauth@ietf.org" target=3D"_blank">oauth@ie=
tf.org</a>&gt;; Richer, Justin P.; John Bradley</span><o:p></o:p></p>
<div>
<p class=3D"MsoNormal" style=3D"mso-margin-top-alt:auto;mso-margin-bottom-a=
lt:auto"><br>
<b>Subject:</b> Re: [OAUTH-WG] I-D Action: draft-ietf-oauth-dyn-reg-06.txt<=
o:p></o:p></p>
</div>
<p class=3D"MsoNormal" style=3D"mso-margin-top-alt:auto;mso-margin-bottom-a=
lt:auto">&nbsp;<o:p></o:p></p>
<p class=3D"MsoNormal" style=3D"mso-margin-top-alt:auto;mso-margin-bottom-a=
lt:auto"><span style=3D"font-size:13.5pt;font-family:&quot;Arial&quot;,&quo=
t;sans-serif&quot;;color:#222222;background:white">Thanks Justin.</span><o:=
p></o:p></p>
<div>
<div>
<p class=3D"MsoNormal" style=3D"mso-margin-top-alt:auto;mso-margin-bottom-a=
lt:auto"><span style=3D"font-size:13.5pt;font-family:&quot;Arial&quot;,&quo=
t;sans-serif&quot;;color:#222222"><br>
<br>
<span style=3D"background:white">Even if we go flat rather than doing JSON =
Structure, the &quot;Client</span><br>
<span style=3D"background:white">Registration Access Endpoint&quot; is not =
a good representative name.</span><br>
<br>
<span style=3D"background:white">What it represents is the client metadata/=
info.</span><br>
<span style=3D"background:white">It is not representing &quot;Client Regist=
ration Access&quot;.&nbsp;</span></span><o:p></o:p></p>
</div>
</div>
<div>
<div>
<div>
<p class=3D"MsoNormal" style=3D"mso-margin-top-alt:auto;mso-margin-bottom-a=
lt:auto">What does &quot;Client Registration Access&quot; mean?&nbsp;<o:p><=
/o:p></p>
</div>
<div>
<p class=3D"MsoNormal" style=3D"mso-margin-top-alt:auto;margin-bottom:12.0p=
t"><span style=3D"font-size:13.5pt;font-family:&quot;Arial&quot;,&quot;sans=
-serif&quot;;color:#222222;background:white">Does UPDATing &quot;Cleint Reg=
istration Access&quot; make sense?</span><br>
<span style=3D"font-size:13.5pt;font-family:&quot;Arial&quot;,&quot;sans-se=
rif&quot;;color:#222222"><br>
<span style=3D"background:white">Something in the line of &quot;Client Meta=
data Endpoint&quot; and</span><br>
<span style=3D"background:white">something like &quot;client_metadata_url&q=
uot; or&nbsp;&quot;client_info_url&quot; is much better.</span><br>
<br>
<span style=3D"background:white">Nat</span></span><o:p></o:p></p>
<div>
<p class=3D"MsoNormal" style=3D"mso-margin-top-alt:auto;mso-margin-bottom-a=
lt:auto">2013/2/15 Richer, Justin P. &lt;<a href=3D"mailto:jricher@mitre.or=
g" target=3D"_blank">jricher@mitre.org</a>&gt;<o:p></o:p></p>
<p class=3D"MsoNormal" style=3D"mso-margin-top-alt:auto;mso-margin-bottom-a=
lt:auto">Everyone, there's a new draft of DynReg up on the tracker. This dr=
aft tries to codify the discussions so far from this week into something we=
 can all read. There are still plenty
 of open discussion points and items up for debate. Please read through thi=
s latest draft and see what's changed and help assure that it properly capt=
ures the conversations. If you have any inputs for the marked [[ Editor's N=
ote ]] sections, please send them
 to the list by next Thursday to give me opportunity to get any necessary c=
hanges in by the cutoff date of Monday the 22nd.<br>
<br>
Thanks for all of your hard work everyone, I think this is *really* coming =
along now.<br>
<span style=3D"color:#888888"><br>
&nbsp;-- Justin</span><o:p></o:p></p>
<div>
<div>
<p class=3D"MsoNormal" style=3D"mso-margin-top-alt:auto;mso-margin-bottom-a=
lt:auto"><br>
On Feb 15, 2013, at 4:54 PM, <a href=3D"mailto:internet-drafts@ietf.org" ta=
rget=3D"_blank">
internet-drafts@ietf.org</a> wrote:<br>
<br>
&gt;<br>
&gt; A New Internet-Draft is available from the on-line Internet-Drafts dir=
ectories.<br>
&gt; This draft is a work item of the Web Authorization Protocol Working Gr=
oup of the IETF.<br>
&gt;<br>
&gt; &nbsp; &nbsp; &nbsp; Title &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; : OAuth =
Dynamic Client Registration Protocol<br>
&gt; &nbsp; &nbsp; &nbsp; Author(s) &nbsp; &nbsp; &nbsp; : Justin Richer<br=
>
&gt; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; =
&nbsp; &nbsp; &nbsp;John Bradley<br>
&gt; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; =
&nbsp; &nbsp; &nbsp;Michael B. Jones<br>
&gt; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; =
&nbsp; &nbsp; &nbsp;Maciej Machulak<br>
&gt; &nbsp; &nbsp; &nbsp; Filename &nbsp; &nbsp; &nbsp; &nbsp;: draft-ietf-=
oauth-dyn-reg-06.txt<br>
&gt; &nbsp; &nbsp; &nbsp; Pages &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; : 21<br>
&gt; &nbsp; &nbsp; &nbsp; Date &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp;: 2=
013-02-15<br>
&gt;<br>
&gt; Abstract:<br>
&gt; &nbsp; This specification defines an endpoint and protocol for dynamic=
<br>
&gt; &nbsp; registration of OAuth Clients at an Authorization Server.<br>
&gt;<br>
&gt;<br>
&gt; The IETF datatracker status page for this draft is:<br>
&gt; <a href=3D"https://datatracker.ietf.org/doc/draft-ietf-oauth-dyn-reg" =
target=3D"_blank">
https://datatracker.ietf.org/doc/draft-ietf-oauth-dyn-reg</a><br>
&gt;<br>
&gt; There's also a htmlized version available at:<br>
&gt; <a href=3D"http://tools.ietf.org/html/draft-ietf-oauth-dyn-reg-06" tar=
get=3D"_blank">
http://tools.ietf.org/html/draft-ietf-oauth-dyn-reg-06</a><br>
&gt;<br>
&gt; A diff from the previous version is available at:<br>
&gt; <a href=3D"http://www.ietf.org/rfcdiff?url2=3Ddraft-ietf-oauth-dyn-reg=
-06" target=3D"_blank">
http://www.ietf.org/rfcdiff?url2=3Ddraft-ietf-oauth-dyn-reg-06</a><br>
&gt;<br>
&gt;<br>
&gt; Internet-Drafts are also available by anonymous FTP at:<br>
&gt; <a href=3D"ftp://ftp.ietf.org/internet-drafts/" target=3D"_blank">ftp:=
//ftp.ietf.org/internet-drafts/</a><br>
&gt;<br>
&gt; _______________________________________________<br>
&gt; OAuth mailing list<br>
&gt; <a href=3D"mailto:OAuth@ietf.org" target=3D"_blank">OAuth@ietf.org</a>=
<br>
&gt; <a href=3D"https://www.ietf.org/mailman/listinfo/oauth" target=3D"_bla=
nk">https://www.ietf.org/mailman/listinfo/oauth</a><br>
<br>
_______________________________________________<br>
OAuth mailing list<br>
<a href=3D"mailto:OAuth@ietf.org" target=3D"_blank">OAuth@ietf.org</a><br>
<a href=3D"https://www.ietf.org/mailman/listinfo/oauth" target=3D"_blank">h=
ttps://www.ietf.org/mailman/listinfo/oauth</a><o:p></o:p></p>
</div>
</div>
</div>
<p class=3D"MsoNormal" style=3D"mso-margin-top-alt:auto;mso-margin-bottom-a=
lt:auto"><br>
<br clear=3D"all">
<o:p></o:p></p>
<div>
<p class=3D"MsoNormal" style=3D"mso-margin-top-alt:auto;mso-margin-bottom-a=
lt:auto">&nbsp;<o:p></o:p></p>
</div>
<p class=3D"MsoNormal" style=3D"mso-margin-top-alt:auto;mso-margin-bottom-a=
lt:auto">--
<br>
Nat Sakimura (=3Dnat)<o:p></o:p></p>
<div>
<p class=3D"MsoNormal" style=3D"mso-margin-top-alt:auto;mso-margin-bottom-a=
lt:auto">Chairman, OpenID Foundation<br>
<a href=3D"http://nat.sakimura.org/" target=3D"_blank">http://nat.sakimura.=
org/</a><br>
@_nat_en<o:p></o:p></p>
</div>
</div>
</div>
</div>
</div>
</div>
</div>
<p class=3D"MsoNormal" style=3D"mso-margin-top-alt:auto;mso-margin-bottom-a=
lt:auto"><br>
<br clear=3D"all">
<o:p></o:p></p>
<div>
<p class=3D"MsoNormal" style=3D"mso-margin-top-alt:auto;mso-margin-bottom-a=
lt:auto">&nbsp;<o:p></o:p></p>
</div>
<p class=3D"MsoNormal" style=3D"mso-margin-top-alt:auto;mso-margin-bottom-a=
lt:auto">--
<br>
Nat Sakimura (=3Dnat)<o:p></o:p></p>
<div>
<p class=3D"MsoNormal" style=3D"mso-margin-top-alt:auto;mso-margin-bottom-a=
lt:auto">Chairman, OpenID Foundation<br>
<a href=3D"http://nat.sakimura.org/" target=3D"_blank">http://nat.sakimura.=
org/</a><br>
@_nat_en<o:p></o:p></p>
</div>
</div>
</div>
</div>
</div>
</div>
</div>
</div>
<p class=3D"MsoNormal"><br>
<br clear=3D"all">
<o:p></o:p></p>
<div>
<p class=3D"MsoNormal">&nbsp;<o:p></o:p></p>
</div>
<p class=3D"MsoNormal">-- <br>
Nat Sakimura (=3Dnat) <o:p></o:p></p>
<div>
<p class=3D"MsoNormal">Chairman, OpenID Foundation<br>
<a href=3D"http://nat.sakimura.org/" target=3D"_blank">http://nat.sakimura.=
org/</a><br>
@_nat_en<o:p></o:p></p>
</div>
</div>
</blockquote>
<p class=3D"MsoNormal">&nbsp;<o:p></o:p></p>
</blockquote>
<p class=3D"MsoNormal"><o:p>&nbsp;</o:p></p>
</div>
</body>
</html>

--_000_4E1F6AAD24975D4BA5B16804296739436747B78ETK5EX14MBXC284r_--

From donald.coffin@reminetworks.com  Wed Feb 20 11:31:21 2013
Return-Path: <donald.coffin@reminetworks.com>
X-Original-To: oauth@ietfa.amsl.com
Delivered-To: oauth@ietfa.amsl.com
Received: from localhost (localhost [127.0.0.1]) by ietfa.amsl.com (Postfix) with ESMTP id 87D501F0D0C for <oauth@ietfa.amsl.com>; Wed, 20 Feb 2013 11:31:21 -0800 (PST)
X-Virus-Scanned: amavisd-new at amsl.com
X-Spam-Flag: NO
X-Spam-Score: -1.207
X-Spam-Level: 
X-Spam-Status: No, score=-1.207 tagged_above=-999 required=5 tests=[AWL=-0.432, BAYES_05=-1.11, HTML_MESSAGE=0.001, IP_NOT_FRIENDLY=0.334]
Received: from mail.ietf.org ([64.170.98.30]) by localhost (ietfa.amsl.com [127.0.0.1]) (amavisd-new, port 10024) with ESMTP id IU539VcuI7ZU for <oauth@ietfa.amsl.com>; Wed, 20 Feb 2013 11:31:20 -0800 (PST)
Received: from oproxy6-pub.bluehost.com (oproxy6-pub.bluehost.com [67.222.54.6]) by ietfa.amsl.com (Postfix) with SMTP id 0BF341F0D0A for <oauth@ietf.org>; Wed, 20 Feb 2013 11:31:19 -0800 (PST)
Received: (qmail 6058 invoked by uid 0); 20 Feb 2013 19:30:58 -0000
Received: from unknown (HELO host125.hostmonster.com) (74.220.207.125) by cpoproxy3.bluehost.com with SMTP; 20 Feb 2013 19:30:58 -0000
DKIM-Signature: v=1; a=rsa-sha256; q=dns/txt; c=relaxed/relaxed; d=reminetworks.com; s=default;  h=Content-Type:MIME-Version:Message-ID:Date:Subject:Cc:To:From; bh=BKvo1Lrq9rDA58rrpk7PmaClYZS04MdVWZ5W7hxQuLg=;  b=YzSiqUAoRtFvPwO9h0up0wBCojGHHl5WWQR/zIQp+rLGE1+a5hrw2melqQJlaRY9HENUeB+t5D9/W4riWb1XoE+a97CvauvePAPytSoyiGWKLmwiCjKutPr0zK0uHgPS;
Received: from [68.4.207.246] (port=1232 helo=HPPavilionElite) by host125.hostmonster.com with esmtpa (Exim 4.80) (envelope-from <donald.coffin@reminetworks.com>) id 1U8FNa-0001rE-Fz; Wed, 20 Feb 2013 12:30:58 -0700
From: "Donald F Coffin" <donald.coffin@reminetworks.com>
To: "Justin Richer" <jricher@mitre.org>
Date: Wed, 20 Feb 2013 11:29:40 -0800
Message-ID: <00ac01ce0fa0$a1325f20$e3971d60$@reminetworks.com>
MIME-Version: 1.0
Content-Type: multipart/alternative; boundary="----=_NextPart_000_00AD_01CE0F5D.930F1F20"
X-Mailer: Microsoft Outlook 14.0
Thread-Index: Ac4PoKDVLB+L7M/SQmiveWS+IxR60A==
Content-Language: en-us
X-Identified-User: {1395:host125.hostmonster.com:reminetw:reminetworks.com} {sentby:smtp auth 68.4.207.246 authed with donald.coffin@reminetworks.com}
Cc: oauth@ietf.org
Subject: [OAUTH-WG] Additional Oauth Dynamic Client Registration Protocol Information
X-BeenThere: oauth@ietf.org
X-Mailman-Version: 2.1.12
Precedence: list
List-Id: OAUTH WG <oauth.ietf.org>
List-Unsubscribe: <https://www.ietf.org/mailman/options/oauth>, <mailto:oauth-request@ietf.org?subject=unsubscribe>
List-Archive: <http://www.ietf.org/mail-archive/web/oauth>
List-Post: <mailto:oauth@ietf.org>
List-Help: <mailto:oauth-request@ietf.org?subject=help>
List-Subscribe: <https://www.ietf.org/mailman/listinfo/oauth>, <mailto:oauth-request@ietf.org?subject=subscribe>
X-List-Received-Date: Wed, 20 Feb 2013 19:31:21 -0000

This is a multipart message in MIME format.

------=_NextPart_000_00AD_01CE0F5D.930F1F20
Content-Type: text/plain;
	charset="us-ascii"
Content-Transfer-Encoding: 7bit

Justin,

 

I understand the current Client Registration request and response
information is based on the OPENID model for consistency, but has there been
any thought or discussion of adding the AS OAuth 2.0 endpoint URIs as part
of the registration response?  I believe the addition of the endpoint URIs
would make the dynamic client registration process truly a dynamic feature
of OAuth 2.0.

 

If the ability to discover the AS OAuth 2.0 endpoint URIs is being covered
by another IETF draft, I'd appreciate learning which current draft is being
worked on to achieve that result.

 

Best regards,

Don

Donald F. Coffin

Founder/CTO

 

REMI Networks

22751 El Prado Suite 6216

Rancho Santa Margarita, CA  92688-3836

 

Phone:      (949) 636-8571

Email:       donald.coffin@reminetworks.com

 


------=_NextPart_000_00AD_01CE0F5D.930F1F20
Content-Type: text/html;
	charset="us-ascii"
Content-Transfer-Encoding: quoted-printable

<html xmlns:v=3D"urn:schemas-microsoft-com:vml" =
xmlns:o=3D"urn:schemas-microsoft-com:office:office" =
xmlns:w=3D"urn:schemas-microsoft-com:office:word" =
xmlns:m=3D"http://schemas.microsoft.com/office/2004/12/omml" =
xmlns=3D"http://www.w3.org/TR/REC-html40"><head><meta =
http-equiv=3DContent-Type content=3D"text/html; =
charset=3Dus-ascii"><meta name=3DGenerator content=3D"Microsoft Word 14 =
(filtered medium)"><style><!--
/* Font Definitions */
@font-face
	{font-family:"Cambria Math";
	panose-1:2 4 5 3 5 4 6 3 2 4;}
@font-face
	{font-family:Cambria;
	panose-1:2 4 5 3 5 4 6 3 2 4;}
@font-face
	{font-family:Calibri;
	panose-1:2 15 5 2 2 2 4 3 2 4;}
@font-face
	{font-family:"Brush Script MT";
	panose-1:3 6 8 2 4 4 6 7 3 4;}
/* Style Definitions */
p.MsoNormal, li.MsoNormal, div.MsoNormal
	{margin:0in;
	margin-bottom:.0001pt;
	font-size:11.0pt;
	font-family:"Calibri","sans-serif";}
a:link, span.MsoHyperlink
	{mso-style-priority:99;
	color:blue;
	text-decoration:underline;}
a:visited, span.MsoHyperlinkFollowed
	{mso-style-priority:99;
	color:purple;
	text-decoration:underline;}
span.EmailStyle17
	{mso-style-type:personal-compose;
	font-family:"Cambria","serif";
	color:windowtext;}
.MsoChpDefault
	{mso-style-type:export-only;
	font-family:"Calibri","sans-serif";}
@page WordSection1
	{size:8.5in 11.0in;
	margin:1.0in 1.0in 1.0in 1.0in;}
div.WordSection1
	{page:WordSection1;}
--></style><!--[if gte mso 9]><xml>
<o:shapedefaults v:ext=3D"edit" spidmax=3D"1026" />
</xml><![endif]--><!--[if gte mso 9]><xml>
<o:shapelayout v:ext=3D"edit">
<o:idmap v:ext=3D"edit" data=3D"1" />
</o:shapelayout></xml><![endif]--></head><body lang=3DEN-US link=3Dblue =
vlink=3Dpurple><div class=3DWordSection1><p class=3DMsoNormal><span =
style=3D'font-size:12.0pt;font-family:"Cambria","serif"'>Justin,<o:p></o:=
p></span></p><p class=3DMsoNormal><span =
style=3D'font-size:12.0pt;font-family:"Cambria","serif"'><o:p>&nbsp;</o:p=
></span></p><p class=3DMsoNormal><span =
style=3D'font-size:12.0pt;font-family:"Cambria","serif"'>I understand =
the current Client Registration request and response information is =
based on the OPENID model for consistency, but has there been any =
thought or discussion of adding the AS OAuth 2.0 endpoint URIs as part =
of the registration response?&nbsp; I believe the addition of the =
endpoint URIs would make the dynamic client registration process truly a =
dynamic feature of OAuth 2.0.<o:p></o:p></span></p><p =
class=3DMsoNormal><span =
style=3D'font-size:12.0pt;font-family:"Cambria","serif"'><o:p>&nbsp;</o:p=
></span></p><p class=3DMsoNormal><span =
style=3D'font-size:12.0pt;font-family:"Cambria","serif"'>If the ability =
to discover the AS OAuth 2.0 endpoint URIs is being covered by another =
IETF draft, I&#8217;d appreciate learning which current draft is being =
worked on to achieve that result.<o:p></o:p></span></p><p =
class=3DMsoNormal><span =
style=3D'font-size:12.0pt;font-family:"Cambria","serif"'><o:p>&nbsp;</o:p=
></span></p><p class=3DMsoNormal><span style=3D'font-size:12.0pt'>Best =
regards,<o:p></o:p></span></p><p class=3DMsoNormal><span =
style=3D'font-size:24.0pt;font-family:"Brush Script =
MT"'>Don<o:p></o:p></span></p><p class=3DMsoNormal><span =
style=3D'font-size:12.0pt'>Donald F. Coffin<o:p></o:p></span></p><p =
class=3DMsoNormal><span =
style=3D'font-size:12.0pt'>Founder/CTO<o:p></o:p></span></p><p =
class=3DMsoNormal><span =
style=3D'font-size:12.0pt'><o:p>&nbsp;</o:p></span></p><p =
class=3DMsoNormal><span style=3D'font-size:12.0pt'>REMI =
Networks<o:p></o:p></span></p><p class=3DMsoNormal><span =
style=3D'font-size:12.0pt'>22751 El Prado Suite =
6216<o:p></o:p></span></p><p class=3DMsoNormal><span =
style=3D'font-size:12.0pt'>Rancho Santa Margarita, CA&nbsp; =
92688-3836<o:p></o:p></span></p><p class=3DMsoNormal><span =
style=3D'font-size:12.0pt'><o:p>&nbsp;</o:p></span></p><p =
class=3DMsoNormal><span =
style=3D'font-size:12.0pt'>Phone:&nbsp;&nbsp;&nbsp;&nbsp;&nbsp; (949) =
636-8571<o:p></o:p></span></p><p class=3DMsoNormal><span =
style=3D'font-size:12.0pt'>Email:&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp; <a =
href=3D"mailto:donald.coffin@reminetworks.com">donald.coffin@reminetworks=
.com</a><o:p></o:p></span></p><p =
class=3DMsoNormal><o:p>&nbsp;</o:p></p></div></body></html>
------=_NextPart_000_00AD_01CE0F5D.930F1F20--


From Michael.Jones@microsoft.com  Wed Feb 20 11:38:15 2013
Return-Path: <Michael.Jones@microsoft.com>
X-Original-To: oauth@ietfa.amsl.com
Delivered-To: oauth@ietfa.amsl.com
Received: from localhost (localhost [127.0.0.1]) by ietfa.amsl.com (Postfix) with ESMTP id 11F1A21F84D9 for <oauth@ietfa.amsl.com>; Wed, 20 Feb 2013 11:38:15 -0800 (PST)
X-Virus-Scanned: amavisd-new at amsl.com
X-Spam-Flag: NO
X-Spam-Score: -2.585
X-Spam-Level: 
X-Spam-Status: No, score=-2.585 tagged_above=-999 required=5 tests=[AWL=0.013,  BAYES_00=-2.599, HTML_MESSAGE=0.001]
Received: from mail.ietf.org ([64.170.98.30]) by localhost (ietfa.amsl.com [127.0.0.1]) (amavisd-new, port 10024) with ESMTP id hIIBljWnB8V7 for <oauth@ietfa.amsl.com>; Wed, 20 Feb 2013 11:38:13 -0800 (PST)
Received: from na01-by2-obe.outbound.protection.outlook.com (na01-by2-obe.ptr.protection.outlook.com [207.46.100.24]) by ietfa.amsl.com (Postfix) with ESMTP id 227EA21F88CC for <oauth@ietf.org>; Wed, 20 Feb 2013 11:38:12 -0800 (PST)
Received: from BL2FFO11FD001.protection.gbl (10.173.161.204) by BL2FFO11HUB011.protection.gbl (10.173.161.117) with Microsoft SMTP Server (TLS) id 15.0.620.12; Wed, 20 Feb 2013 19:38:10 +0000
Received: from TK5EX14MLTC103.redmond.corp.microsoft.com (131.107.125.37) by BL2FFO11FD001.mail.protection.outlook.com (10.173.160.101) with Microsoft SMTP Server (TLS) id 15.0.620.12 via Frontend Transport; Wed, 20 Feb 2013 19:38:10 +0000
Received: from TK5EX14MBXC284.redmond.corp.microsoft.com ([169.254.1.96]) by TK5EX14MLTC103.redmond.corp.microsoft.com ([157.54.79.174]) with mapi id 14.02.0318.003; Wed, 20 Feb 2013 19:37:49 +0000
From: Mike Jones <Michael.Jones@microsoft.com>
To: Donald F Coffin <donald.coffin@reminetworks.com>, Justin Richer <jricher@mitre.org>
Thread-Topic: [OAUTH-WG] Additional Oauth Dynamic Client Registration Protocol	Information
Thread-Index: Ac4PoKDVLB+L7M/SQmiveWS+IxR60AAAJY5w
Date: Wed, 20 Feb 2013 19:37:48 +0000
Message-ID: <4E1F6AAD24975D4BA5B16804296739436747B862@TK5EX14MBXC284.redmond.corp.microsoft.com>
References: <00ac01ce0fa0$a1325f20$e3971d60$@reminetworks.com>
In-Reply-To: <00ac01ce0fa0$a1325f20$e3971d60$@reminetworks.com>
Accept-Language: en-US
Content-Language: en-US
X-MS-Has-Attach: 
X-MS-TNEF-Correlator: 
x-originating-ip: [157.54.51.75]
Content-Type: multipart/alternative; boundary="_000_4E1F6AAD24975D4BA5B16804296739436747B862TK5EX14MBXC284r_"
MIME-Version: 1.0
X-Forefront-Antispam-Report: CIP:131.107.125.37; CTRY:US; IPV:CAL; IPV:NLI; EFV:NLI; SFV:NSPM; SFS:(189002)(199002)(377454001)(252514003)(47976001)(63696002)(44976002)(54356001)(46102001)(55846006)(16406001)(53806001)(512954001)(54316002)(15395725002)(49866001)(15202345001)(33656001)(51856001)(56776001)(20776003)(77982001)(59766001)(5343635001)(5343655001)(65816001)(66066001)(74502001)(74662001)(31966008)(16236675001)(50986001)(56816002)(4396001)(47736001)(5343645001)(76482001)(79102001)(47446002)(80022001); DIR:OUT; SFP:; SCL:1; SRVR:BL2FFO11HUB011; H:TK5EX14MLTC103.redmond.corp.microsoft.com; RD:InfoDomainNonexistent; MX:1; A:1; LANG:en; 
X-OriginatorOrg: microsoft.onmicrosoft.com
X-Forefront-PRVS: 07630F72AD
Cc: "oauth@ietf.org" <oauth@ietf.org>
Subject: Re: [OAUTH-WG] Additional Oauth Dynamic Client Registration Protocol	Information
X-BeenThere: oauth@ietf.org
X-Mailman-Version: 2.1.12
Precedence: list
List-Id: OAUTH WG <oauth.ietf.org>
List-Unsubscribe: <https://www.ietf.org/mailman/options/oauth>, <mailto:oauth-request@ietf.org?subject=unsubscribe>
List-Archive: <http://www.ietf.org/mail-archive/web/oauth>
List-Post: <mailto:oauth@ietf.org>
List-Help: <mailto:oauth-request@ietf.org?subject=help>
List-Subscribe: <https://www.ietf.org/mailman/listinfo/oauth>, <mailto:oauth-request@ietf.org?subject=subscribe>
X-List-Received-Date: Wed, 20 Feb 2013 19:38:15 -0000

--_000_4E1F6AAD24975D4BA5B16804296739436747B862TK5EX14MBXC284r_
Content-Type: text/plain; charset="us-ascii"
Content-Transfer-Encoding: quoted-printable

Hi Don,

Discovery is a process that happens before Registration, and that's the poi=
nt at which you would return the AS (and registration!) endpoints to the Cl=
ient.  The OAuth WG considered doing its own discovery work but ultimately =
decided to have that happen in the Apps Area WG instead, which is close to =
completing the WebFinger discovery specification.

If you want to see how OpenID Connect is performing discovery using WebFing=
er, including discovery of the AS endpoint, have a look at http://openid.ne=
t/specs/openid-connect-discovery-1_0.html.

                                                                Best wishes=
,
                                                                -- Mike

From: oauth-bounces@ietf.org [mailto:oauth-bounces@ietf.org] On Behalf Of D=
onald F Coffin
Sent: Wednesday, February 20, 2013 11:30 AM
To: Justin Richer
Cc: oauth@ietf.org
Subject: [OAUTH-WG] Additional Oauth Dynamic Client Registration Protocol I=
nformation

Justin,

I understand the current Client Registration request and response informati=
on is based on the OPENID model for consistency, but has there been any tho=
ught or discussion of adding the AS OAuth 2.0 endpoint URIs as part of the =
registration response?  I believe the addition of the endpoint URIs would m=
ake the dynamic client registration process truly a dynamic feature of OAut=
h 2.0.

If the ability to discover the AS OAuth 2.0 endpoint URIs is being covered =
by another IETF draft, I'd appreciate learning which current draft is being=
 worked on to achieve that result.

Best regards,
Don
Donald F. Coffin
Founder/CTO

REMI Networks
22751 El Prado Suite 6216
Rancho Santa Margarita, CA  92688-3836

Phone:      (949) 636-8571
Email:       donald.coffin@reminetworks.com<mailto:donald.coffin@reminetwor=
ks.com>


--_000_4E1F6AAD24975D4BA5B16804296739436747B862TK5EX14MBXC284r_
Content-Type: text/html; charset="us-ascii"
Content-Transfer-Encoding: quoted-printable

<html xmlns:v=3D"urn:schemas-microsoft-com:vml" xmlns:o=3D"urn:schemas-micr=
osoft-com:office:office" xmlns:w=3D"urn:schemas-microsoft-com:office:word" =
xmlns:m=3D"http://schemas.microsoft.com/office/2004/12/omml" xmlns=3D"http:=
//www.w3.org/TR/REC-html40">
<head>
<meta http-equiv=3D"Content-Type" content=3D"text/html; charset=3Dus-ascii"=
>
<meta name=3D"Generator" content=3D"Microsoft Word 14 (filtered medium)">
<style><!--
/* Font Definitions */
@font-face
	{font-family:Cambria;
	panose-1:2 4 5 3 5 4 6 3 2 4;}
@font-face
	{font-family:Calibri;
	panose-1:2 15 5 2 2 2 4 3 2 4;}
@font-face
	{font-family:Tahoma;
	panose-1:2 11 6 4 3 5 4 4 2 4;}
@font-face
	{font-family:"Brush Script MT";
	panose-1:3 6 8 2 4 4 6 7 3 4;}
/* Style Definitions */
p.MsoNormal, li.MsoNormal, div.MsoNormal
	{margin:0in;
	margin-bottom:.0001pt;
	font-size:11.0pt;
	font-family:"Calibri","sans-serif";}
a:link, span.MsoHyperlink
	{mso-style-priority:99;
	color:blue;
	text-decoration:underline;}
a:visited, span.MsoHyperlinkFollowed
	{mso-style-priority:99;
	color:purple;
	text-decoration:underline;}
span.EmailStyle17
	{mso-style-type:personal;
	font-family:"Cambria","serif";
	color:windowtext;}
span.EmailStyle18
	{mso-style-type:personal-reply;
	font-family:"Calibri","sans-serif";
	color:#1F497D;}
.MsoChpDefault
	{mso-style-type:export-only;
	font-size:10.0pt;}
@page WordSection1
	{size:8.5in 11.0in;
	margin:1.0in 1.0in 1.0in 1.0in;}
div.WordSection1
	{page:WordSection1;}
--></style><!--[if gte mso 9]><xml>
<o:shapedefaults v:ext=3D"edit" spidmax=3D"1026" />
</xml><![endif]--><!--[if gte mso 9]><xml>
<o:shapelayout v:ext=3D"edit">
<o:idmap v:ext=3D"edit" data=3D"1" />
</o:shapelayout></xml><![endif]-->
</head>
<body lang=3D"EN-US" link=3D"blue" vlink=3D"purple">
<div class=3D"WordSection1">
<p class=3D"MsoNormal"><span style=3D"color:#1F497D">Hi Don,<o:p></o:p></sp=
an></p>
<p class=3D"MsoNormal"><span style=3D"color:#1F497D"><o:p>&nbsp;</o:p></spa=
n></p>
<p class=3D"MsoNormal"><span style=3D"color:#1F497D">Discovery is a process=
 that happens before Registration, and that&#8217;s the point at which you =
would return the AS (and registration!) endpoints to the Client.&nbsp; The =
OAuth WG considered doing its own discovery work
 but ultimately decided to have that happen in the Apps Area WG instead, wh=
ich is close to completing the WebFinger discovery specification.<o:p></o:p=
></span></p>
<p class=3D"MsoNormal"><span style=3D"color:#1F497D"><o:p>&nbsp;</o:p></spa=
n></p>
<p class=3D"MsoNormal"><span style=3D"color:#1F497D">If you want to see how=
 OpenID Connect is performing discovery using WebFinger, including discover=
y of the AS endpoint, have a look at
<a href=3D"http://openid.net/specs/openid-connect-discovery-1_0.html">http:=
//openid.net/specs/openid-connect-discovery-1_0.html</a>.<o:p></o:p></span>=
</p>
<p class=3D"MsoNormal"><span style=3D"color:#1F497D"><o:p>&nbsp;</o:p></spa=
n></p>
<p class=3D"MsoNormal"><span style=3D"color:#1F497D">&nbsp;&nbsp;&nbsp;&nbs=
p;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&=
nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbs=
p;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&=
nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbs=
p;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp; Best wishes,<o:p><=
/o:p></span></p>
<p class=3D"MsoNormal"><span style=3D"color:#1F497D">&nbsp;&nbsp;&nbsp;&nbs=
p;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&=
nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbs=
p;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&=
nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbs=
p;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp; -- Mike<o:p></o:p>=
</span></p>
<p class=3D"MsoNormal"><span style=3D"color:#1F497D"><o:p>&nbsp;</o:p></spa=
n></p>
<div>
<div style=3D"border:none;border-top:solid #B5C4DF 1.0pt;padding:3.0pt 0in =
0in 0in">
<p class=3D"MsoNormal"><b><span style=3D"font-size:10.0pt;font-family:&quot=
;Tahoma&quot;,&quot;sans-serif&quot;">From:</span></b><span style=3D"font-s=
ize:10.0pt;font-family:&quot;Tahoma&quot;,&quot;sans-serif&quot;"> oauth-bo=
unces@ietf.org [mailto:oauth-bounces@ietf.org]
<b>On Behalf Of </b>Donald F Coffin<br>
<b>Sent:</b> Wednesday, February 20, 2013 11:30 AM<br>
<b>To:</b> Justin Richer<br>
<b>Cc:</b> oauth@ietf.org<br>
<b>Subject:</b> [OAUTH-WG] Additional Oauth Dynamic Client Registration Pro=
tocol Information<o:p></o:p></span></p>
</div>
</div>
<p class=3D"MsoNormal"><o:p>&nbsp;</o:p></p>
<p class=3D"MsoNormal"><span style=3D"font-size:12.0pt;font-family:&quot;Ca=
mbria&quot;,&quot;serif&quot;">Justin,<o:p></o:p></span></p>
<p class=3D"MsoNormal"><span style=3D"font-size:12.0pt;font-family:&quot;Ca=
mbria&quot;,&quot;serif&quot;"><o:p>&nbsp;</o:p></span></p>
<p class=3D"MsoNormal"><span style=3D"font-size:12.0pt;font-family:&quot;Ca=
mbria&quot;,&quot;serif&quot;">I understand the current Client Registration=
 request and response information is based on the OPENID model for consiste=
ncy, but has there been any thought or discussion of adding
 the AS OAuth 2.0 endpoint URIs as part of the registration response?&nbsp;=
 I believe the addition of the endpoint URIs would make the dynamic client =
registration process truly a dynamic feature of OAuth 2.0.<o:p></o:p></span=
></p>
<p class=3D"MsoNormal"><span style=3D"font-size:12.0pt;font-family:&quot;Ca=
mbria&quot;,&quot;serif&quot;"><o:p>&nbsp;</o:p></span></p>
<p class=3D"MsoNormal"><span style=3D"font-size:12.0pt;font-family:&quot;Ca=
mbria&quot;,&quot;serif&quot;">If the ability to discover the AS OAuth 2.0 =
endpoint URIs is being covered by another IETF draft, I&#8217;d appreciate =
learning which current draft is being worked on to achieve that
 result.<o:p></o:p></span></p>
<p class=3D"MsoNormal"><span style=3D"font-size:12.0pt;font-family:&quot;Ca=
mbria&quot;,&quot;serif&quot;"><o:p>&nbsp;</o:p></span></p>
<p class=3D"MsoNormal"><span style=3D"font-size:12.0pt">Best regards,<o:p><=
/o:p></span></p>
<p class=3D"MsoNormal"><span style=3D"font-size:24.0pt;font-family:&quot;Br=
ush Script MT&quot;">Don<o:p></o:p></span></p>
<p class=3D"MsoNormal"><span style=3D"font-size:12.0pt">Donald F. Coffin<o:=
p></o:p></span></p>
<p class=3D"MsoNormal"><span style=3D"font-size:12.0pt">Founder/CTO<o:p></o=
:p></span></p>
<p class=3D"MsoNormal"><span style=3D"font-size:12.0pt"><o:p>&nbsp;</o:p></=
span></p>
<p class=3D"MsoNormal"><span style=3D"font-size:12.0pt">REMI Networks<o:p><=
/o:p></span></p>
<p class=3D"MsoNormal"><span style=3D"font-size:12.0pt">22751 El Prado Suit=
e 6216<o:p></o:p></span></p>
<p class=3D"MsoNormal"><span style=3D"font-size:12.0pt">Rancho Santa Margar=
ita, CA&nbsp; 92688-3836<o:p></o:p></span></p>
<p class=3D"MsoNormal"><span style=3D"font-size:12.0pt"><o:p>&nbsp;</o:p></=
span></p>
<p class=3D"MsoNormal"><span style=3D"font-size:12.0pt">Phone:&nbsp;&nbsp;&=
nbsp;&nbsp;&nbsp; (949) 636-8571<o:p></o:p></span></p>
<p class=3D"MsoNormal"><span style=3D"font-size:12.0pt">Email:&nbsp;&nbsp;&=
nbsp;&nbsp;&nbsp;&nbsp; <a href=3D"mailto:donald.coffin@reminetworks.com">
donald.coffin@reminetworks.com</a><o:p></o:p></span></p>
<p class=3D"MsoNormal"><o:p>&nbsp;</o:p></p>
</div>
</body>
</html>

--_000_4E1F6AAD24975D4BA5B16804296739436747B862TK5EX14MBXC284r_--

From jricher@mitre.org  Wed Feb 20 11:51:04 2013
Return-Path: <jricher@mitre.org>
X-Original-To: oauth@ietfa.amsl.com
Delivered-To: oauth@ietfa.amsl.com
Received: from localhost (localhost [127.0.0.1]) by ietfa.amsl.com (Postfix) with ESMTP id 29E2221F8619 for <oauth@ietfa.amsl.com>; Wed, 20 Feb 2013 11:51:04 -0800 (PST)
X-Virus-Scanned: amavisd-new at amsl.com
X-Spam-Flag: NO
X-Spam-Score: -6.575
X-Spam-Level: 
X-Spam-Status: No, score=-6.575 tagged_above=-999 required=5 tests=[AWL=0.023,  BAYES_00=-2.599, HTML_MESSAGE=0.001, RCVD_IN_DNSWL_MED=-4]
Received: from mail.ietf.org ([64.170.98.30]) by localhost (ietfa.amsl.com [127.0.0.1]) (amavisd-new, port 10024) with ESMTP id T7zKoEOXpzgl for <oauth@ietfa.amsl.com>; Wed, 20 Feb 2013 11:51:02 -0800 (PST)
Received: from smtpksrv1.mitre.org (smtpksrv1.mitre.org [198.49.146.77]) by ietfa.amsl.com (Postfix) with ESMTP id 0878621F85F5 for <oauth@ietf.org>; Wed, 20 Feb 2013 11:51:02 -0800 (PST)
Received: from smtpksrv1.mitre.org (localhost.localdomain [127.0.0.1]) by localhost (Postfix) with SMTP id 7A49E53101E2; Wed, 20 Feb 2013 14:50:59 -0500 (EST)
Received: from IMCCAS01.MITRE.ORG (imccas01.mitre.org [129.83.29.78]) by smtpksrv1.mitre.org (Postfix) with ESMTP id 613F653101EC; Wed, 20 Feb 2013 14:50:59 -0500 (EST)
Received: from [10.146.15.29] (129.83.31.58) by IMCCAS01.MITRE.ORG (129.83.29.78) with Microsoft SMTP Server (TLS) id 14.2.318.4; Wed, 20 Feb 2013 14:50:59 -0500
Message-ID: <512528EE.8000303@mitre.org>
Date: Wed, 20 Feb 2013 14:50:06 -0500
From: Justin Richer <jricher@mitre.org>
User-Agent: Mozilla/5.0 (X11; Linux i686; rv:17.0) Gecko/20130106 Thunderbird/17.0.2
MIME-Version: 1.0
To: Mike Jones <Michael.Jones@microsoft.com>
References: <00ac01ce0fa0$a1325f20$e3971d60$@reminetworks.com> <4E1F6AAD24975D4BA5B16804296739436747B862@TK5EX14MBXC284.redmond.corp.microsoft.com>
In-Reply-To: <4E1F6AAD24975D4BA5B16804296739436747B862@TK5EX14MBXC284.redmond.corp.microsoft.com>
Content-Type: multipart/alternative; boundary="------------060009050904040202070809"
X-Originating-IP: [129.83.31.58]
Cc: Donald F Coffin <donald.coffin@reminetworks.com>, "oauth@ietf.org" <oauth@ietf.org>
Subject: Re: [OAUTH-WG] Additional Oauth Dynamic Client Registration Protocol Information
X-BeenThere: oauth@ietf.org
X-Mailman-Version: 2.1.12
Precedence: list
List-Id: OAUTH WG <oauth.ietf.org>
List-Unsubscribe: <https://www.ietf.org/mailman/options/oauth>, <mailto:oauth-request@ietf.org?subject=unsubscribe>
List-Archive: <http://www.ietf.org/mail-archive/web/oauth>
List-Post: <mailto:oauth@ietf.org>
List-Help: <mailto:oauth-request@ietf.org?subject=help>
List-Subscribe: <https://www.ietf.org/mailman/listinfo/oauth>, <mailto:oauth-request@ietf.org?subject=subscribe>
X-List-Received-Date: Wed, 20 Feb 2013 19:51:04 -0000

--------------060009050904040202070809
Content-Type: text/plain; charset="ISO-8859-1"; format=flowed
Content-Transfer-Encoding: 7bit

Additionally, there is an individual draft that registers LRDD Link 
Types for discovery using LRDD and HostMeta:

http://tools.ietf.org/html/draft-wmills-oauth-lrdd-07

  -- Justin

On 02/20/2013 02:37 PM, Mike Jones wrote:
>
> Hi Don,
>
> Discovery is a process that happens before Registration, and that's 
> the point at which you would return the AS (and registration!) 
> endpoints to the Client.  The OAuth WG considered doing its own 
> discovery work but ultimately decided to have that happen in the Apps 
> Area WG instead, which is close to completing the WebFinger discovery 
> specification.
>
> If you want to see how OpenID Connect is performing discovery using 
> WebFinger, including discovery of the AS endpoint, have a look at 
> http://openid.net/specs/openid-connect-discovery-1_0.html.
>
> Best wishes,
>
> -- Mike
>
> *From:*oauth-bounces@ietf.org [mailto:oauth-bounces@ietf.org] *On 
> Behalf Of *Donald F Coffin
> *Sent:* Wednesday, February 20, 2013 11:30 AM
> *To:* Justin Richer
> *Cc:* oauth@ietf.org
> *Subject:* [OAUTH-WG] Additional Oauth Dynamic Client Registration 
> Protocol Information
>
> Justin,
>
> I understand the current Client Registration request and response 
> information is based on the OPENID model for consistency, but has 
> there been any thought or discussion of adding the AS OAuth 2.0 
> endpoint URIs as part of the registration response?  I believe the 
> addition of the endpoint URIs would make the dynamic client 
> registration process truly a dynamic feature of OAuth 2.0.
>
> If the ability to discover the AS OAuth 2.0 endpoint URIs is being 
> covered by another IETF draft, I'd appreciate learning which current 
> draft is being worked on to achieve that result.
>
> Best regards,
>
> Don
>
> Donald F. Coffin
>
> Founder/CTO
>
> REMI Networks
>
> 22751 El Prado Suite 6216
>
> Rancho Santa Margarita, CA  92688-3836
>
> Phone: (949) 636-8571
>
> Email: donald.coffin@reminetworks.com 
> <mailto:donald.coffin@reminetworks.com>
>


--------------060009050904040202070809
Content-Type: text/html; charset="ISO-8859-1"
Content-Transfer-Encoding: 7bit

<html>
  <head>
    <meta content="text/html; charset=ISO-8859-1"
      http-equiv="Content-Type">
  </head>
  <body bgcolor="#FFFFFF" text="#000000">
    Additionally, there is an individual draft that registers LRDD Link
    Types for discovery using LRDD and HostMeta:<br>
    <br>
    <a class="moz-txt-link-freetext" href="http://tools.ietf.org/html/draft-wmills-oauth-lrdd-07">http://tools.ietf.org/html/draft-wmills-oauth-lrdd-07</a><br>
    <br>
    &nbsp;-- Justin<br>
    <br>
    <div class="moz-cite-prefix">On 02/20/2013 02:37 PM, Mike Jones
      wrote:<br>
    </div>
    <blockquote
cite="mid:4E1F6AAD24975D4BA5B16804296739436747B862@TK5EX14MBXC284.redmond.corp.microsoft.com"
      type="cite">
      <meta http-equiv="Content-Type" content="text/html;
        charset=ISO-8859-1">
      <meta name="Generator" content="Microsoft Word 14 (filtered
        medium)">
      <style><!--
/* Font Definitions */
@font-face
	{font-family:Cambria;
	panose-1:2 4 5 3 5 4 6 3 2 4;}
@font-face
	{font-family:Calibri;
	panose-1:2 15 5 2 2 2 4 3 2 4;}
@font-face
	{font-family:Tahoma;
	panose-1:2 11 6 4 3 5 4 4 2 4;}
@font-face
	{font-family:"Brush Script MT";
	panose-1:3 6 8 2 4 4 6 7 3 4;}
/* Style Definitions */
p.MsoNormal, li.MsoNormal, div.MsoNormal
	{margin:0in;
	margin-bottom:.0001pt;
	font-size:11.0pt;
	font-family:"Calibri","sans-serif";}
a:link, span.MsoHyperlink
	{mso-style-priority:99;
	color:blue;
	text-decoration:underline;}
a:visited, span.MsoHyperlinkFollowed
	{mso-style-priority:99;
	color:purple;
	text-decoration:underline;}
span.EmailStyle17
	{mso-style-type:personal;
	font-family:"Cambria","serif";
	color:windowtext;}
span.EmailStyle18
	{mso-style-type:personal-reply;
	font-family:"Calibri","sans-serif";
	color:#1F497D;}
.MsoChpDefault
	{mso-style-type:export-only;
	font-size:10.0pt;}
@page WordSection1
	{size:8.5in 11.0in;
	margin:1.0in 1.0in 1.0in 1.0in;}
div.WordSection1
	{page:WordSection1;}
--></style><!--[if gte mso 9]><xml>
<o:shapedefaults v:ext="edit" spidmax="1026" />
</xml><![endif]--><!--[if gte mso 9]><xml>
<o:shapelayout v:ext="edit">
<o:idmap v:ext="edit" data="1" />
</o:shapelayout></xml><![endif]-->
      <div class="WordSection1">
        <p class="MsoNormal"><span style="color:#1F497D">Hi Don,<o:p></o:p></span></p>
        <p class="MsoNormal"><span style="color:#1F497D"><o:p>&nbsp;</o:p></span></p>
        <p class="MsoNormal"><span style="color:#1F497D">Discovery is a
            process that happens before Registration, and that&#8217;s the
            point at which you would return the AS (and registration!)
            endpoints to the Client.&nbsp; The OAuth WG considered doing its
            own discovery work but ultimately decided to have that
            happen in the Apps Area WG instead, which is close to
            completing the WebFinger discovery specification.<o:p></o:p></span></p>
        <p class="MsoNormal"><span style="color:#1F497D"><o:p>&nbsp;</o:p></span></p>
        <p class="MsoNormal"><span style="color:#1F497D">If you want to
            see how OpenID Connect is performing discovery using
            WebFinger, including discovery of the AS endpoint, have a
            look at
            <a moz-do-not-send="true"
              href="http://openid.net/specs/openid-connect-discovery-1_0.html">http://openid.net/specs/openid-connect-discovery-1_0.html</a>.<o:p></o:p></span></p>
        <p class="MsoNormal"><span style="color:#1F497D"><o:p>&nbsp;</o:p></span></p>
        <p class="MsoNormal"><span style="color:#1F497D">&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;
            Best wishes,<o:p></o:p></span></p>
        <p class="MsoNormal"><span style="color:#1F497D">&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;
            -- Mike<o:p></o:p></span></p>
        <p class="MsoNormal"><span style="color:#1F497D"><o:p>&nbsp;</o:p></span></p>
        <div>
          <div style="border:none;border-top:solid #B5C4DF
            1.0pt;padding:3.0pt 0in 0in 0in">
            <p class="MsoNormal"><b><span
style="font-size:10.0pt;font-family:&quot;Tahoma&quot;,&quot;sans-serif&quot;">From:</span></b><span
style="font-size:10.0pt;font-family:&quot;Tahoma&quot;,&quot;sans-serif&quot;">
                <a class="moz-txt-link-abbreviated" href="mailto:oauth-bounces@ietf.org">oauth-bounces@ietf.org</a> [<a class="moz-txt-link-freetext" href="mailto:oauth-bounces@ietf.org">mailto:oauth-bounces@ietf.org</a>]
                <b>On Behalf Of </b>Donald F Coffin<br>
                <b>Sent:</b> Wednesday, February 20, 2013 11:30 AM<br>
                <b>To:</b> Justin Richer<br>
                <b>Cc:</b> <a class="moz-txt-link-abbreviated" href="mailto:oauth@ietf.org">oauth@ietf.org</a><br>
                <b>Subject:</b> [OAUTH-WG] Additional Oauth Dynamic
                Client Registration Protocol Information<o:p></o:p></span></p>
          </div>
        </div>
        <p class="MsoNormal"><o:p>&nbsp;</o:p></p>
        <p class="MsoNormal"><span
style="font-size:12.0pt;font-family:&quot;Cambria&quot;,&quot;serif&quot;">Justin,<o:p></o:p></span></p>
        <p class="MsoNormal"><span
style="font-size:12.0pt;font-family:&quot;Cambria&quot;,&quot;serif&quot;"><o:p>&nbsp;</o:p></span></p>
        <p class="MsoNormal"><span
style="font-size:12.0pt;font-family:&quot;Cambria&quot;,&quot;serif&quot;">I
            understand the current Client Registration request and
            response information is based on the OPENID model for
            consistency, but has there been any thought or discussion of
            adding the AS OAuth 2.0 endpoint URIs as part of the
            registration response?&nbsp; I believe the addition of the
            endpoint URIs would make the dynamic client registration
            process truly a dynamic feature of OAuth 2.0.<o:p></o:p></span></p>
        <p class="MsoNormal"><span
style="font-size:12.0pt;font-family:&quot;Cambria&quot;,&quot;serif&quot;"><o:p>&nbsp;</o:p></span></p>
        <p class="MsoNormal"><span
style="font-size:12.0pt;font-family:&quot;Cambria&quot;,&quot;serif&quot;">If
            the ability to discover the AS OAuth 2.0 endpoint URIs is
            being covered by another IETF draft, I&#8217;d appreciate learning
            which current draft is being worked on to achieve that
            result.<o:p></o:p></span></p>
        <p class="MsoNormal"><span
style="font-size:12.0pt;font-family:&quot;Cambria&quot;,&quot;serif&quot;"><o:p>&nbsp;</o:p></span></p>
        <p class="MsoNormal"><span style="font-size:12.0pt">Best
            regards,<o:p></o:p></span></p>
        <p class="MsoNormal"><span
            style="font-size:24.0pt;font-family:&quot;Brush Script
            MT&quot;">Don<o:p></o:p></span></p>
        <p class="MsoNormal"><span style="font-size:12.0pt">Donald F.
            Coffin<o:p></o:p></span></p>
        <p class="MsoNormal"><span style="font-size:12.0pt">Founder/CTO<o:p></o:p></span></p>
        <p class="MsoNormal"><span style="font-size:12.0pt"><o:p>&nbsp;</o:p></span></p>
        <p class="MsoNormal"><span style="font-size:12.0pt">REMI
            Networks<o:p></o:p></span></p>
        <p class="MsoNormal"><span style="font-size:12.0pt">22751 El
            Prado Suite 6216<o:p></o:p></span></p>
        <p class="MsoNormal"><span style="font-size:12.0pt">Rancho Santa
            Margarita, CA&nbsp; 92688-3836<o:p></o:p></span></p>
        <p class="MsoNormal"><span style="font-size:12.0pt"><o:p>&nbsp;</o:p></span></p>
        <p class="MsoNormal"><span style="font-size:12.0pt">Phone:&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;
            (949) 636-8571<o:p></o:p></span></p>
        <p class="MsoNormal"><span style="font-size:12.0pt">Email:&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;
            <a moz-do-not-send="true"
              href="mailto:donald.coffin@reminetworks.com">
              donald.coffin@reminetworks.com</a><o:p></o:p></span></p>
        <p class="MsoNormal"><o:p>&nbsp;</o:p></p>
      </div>
    </blockquote>
    <br>
  </body>
</html>

--------------060009050904040202070809--

From ve7jtb@ve7jtb.com  Wed Feb 20 12:01:01 2013
Return-Path: <ve7jtb@ve7jtb.com>
X-Original-To: oauth@ietfa.amsl.com
Delivered-To: oauth@ietfa.amsl.com
Received: from localhost (localhost [127.0.0.1]) by ietfa.amsl.com (Postfix) with ESMTP id 6312E21E80E6 for <oauth@ietfa.amsl.com>; Wed, 20 Feb 2013 12:01:01 -0800 (PST)
X-Virus-Scanned: amavisd-new at amsl.com
X-Spam-Flag: NO
X-Spam-Score: -3.459
X-Spam-Level: 
X-Spam-Status: No, score=-3.459 tagged_above=-999 required=5 tests=[AWL=0.139,  BAYES_00=-2.599, HTML_MESSAGE=0.001, RCVD_IN_DNSWL_LOW=-1]
Received: from mail.ietf.org ([64.170.98.30]) by localhost (ietfa.amsl.com [127.0.0.1]) (amavisd-new, port 10024) with ESMTP id Ujnj9HetjyrB for <oauth@ietfa.amsl.com>; Wed, 20 Feb 2013 12:00:59 -0800 (PST)
Received: from mail-qa0-f48.google.com (mail-qa0-f48.google.com [209.85.216.48]) by ietfa.amsl.com (Postfix) with ESMTP id DF73D21E80C4 for <oauth@ietf.org>; Wed, 20 Feb 2013 12:00:56 -0800 (PST)
Received: by mail-qa0-f48.google.com with SMTP id j8so2624602qah.0 for <oauth@ietf.org>; Wed, 20 Feb 2013 12:00:56 -0800 (PST)
X-Google-DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=google.com; s=20120113; h=x-received:content-type:mime-version:subject:from:in-reply-to:date :cc:message-id:references:to:x-mailer:x-gm-message-state; bh=uS68PLc7kXwZGlW5cG/Ohqzezr37n4l7A12NPQrtkHQ=; b=Vf7QowREEUc1plfSNB1ZHfSWCRu9dv2zc3s+7WBUktdBuA/M7LhWoLwhJaNNuytHm6 Wg764eaWiB1XmM6PdGZMiGE8Fu0tX+CJOLuttWqwpkLgGG1ofoAC1Yz9k8PS8yqlGra/ qtcKEDIrblwSyAb2myR8AHmDlLho6F0kSiQZwfP6CXu76o9BmK14va/0AwSojHnoryzA wsVoUquVghoCPRd0A+Z8GbaoTO7rG6zWGEcqTqom2fx6A5AYGyZdWBrWlGrdkBGIqH6F RZ5QGfLOtEE5wKoNJ5dv9TIEvq/3U7Ex7rJdGj9K3I9rE2kZD96av1mLgHG+1VJIbsM7 sVdA==
X-Received: by 10.224.176.70 with SMTP id bd6mr10198001qab.26.1361390456248; Wed, 20 Feb 2013 12:00:56 -0800 (PST)
Received: from [192.168.1.213] (190-20-41-134.baf.movistar.cl. [190.20.41.134]) by mx.google.com with ESMTPS id s6sm11554941qaz.13.2013.02.20.12.00.50 (version=TLSv1 cipher=ECDHE-RSA-RC4-SHA bits=128/128); Wed, 20 Feb 2013 12:00:54 -0800 (PST)
Content-Type: multipart/signed; boundary="Apple-Mail=_1F9B7C9B-F76A-4E2F-923C-67CD5FDE1A8F"; protocol="application/pkcs7-signature"; micalg=sha1
Mime-Version: 1.0 (Mac OS X Mail 6.2 \(1499\))
From: John Bradley <ve7jtb@ve7jtb.com>
In-Reply-To: <51251DF0.8000804@mitre.org>
Date: Wed, 20 Feb 2013 17:00:20 -0300
Message-Id: <133FFE3D-70FD-48C3-B95F-AB26DEC1F7E8@ve7jtb.com>
References: <20130215215423.23019.50224.idtracker@ietfa.amsl.com> <B33BFB58CCC8BE4998958016839DE27E06894B4F@IMCMBX01.MITRE.ORG> <CABzCy2CgnAtPrTY37H6vO-+5u3tRmsm+1j86r3w046AhHnNdfw@mail.gmail.com> <4E1F6AAD24975D4BA5B16804296739436747A665@TK5EX14MBXC284.redmond.corp.microsoft.com> <CABzCy2DHvFVmtv9jB-re5efKEVrfBBk4BZ83n_EQLMHOqsnXcA@mail.gmail.com> <4E1F6AAD24975D4BA5B16804296739436747ADDB@TK5EX14MBXC284.redmond.corp.microsoft.com> <CABzCy2AyCDxc+Gov7zBnTRquzp+QUMF8riqd_8vcP0rHFQUtkQ@mail.gmail.com> <512511B0.5090102@mitre.org> <4E1F6AAD24975D4BA5B16804296739436747B2BB@TK5EX14MBXC284.redmond.corp.microsoft.com> <51251DF0.8000804@mitre.org>
To: Justin Richer <jricher@mitre.org>
X-Mailer: Apple Mail (2.1499)
X-Gm-Message-State: ALoCoQlnLpami3Q4knzxi6s0QZK8ikGP3lLgvstYkXvjZrufrAgj5R9rLT/3Eac02dDeoVRKrTnq
Cc: "<oauth@ietf.org>" <oauth@ietf.org>
Subject: Re: [OAUTH-WG] I-D Action: draft-ietf-oauth-dyn-reg-06.txt
X-BeenThere: oauth@ietf.org
X-Mailman-Version: 2.1.12
Precedence: list
List-Id: OAUTH WG <oauth.ietf.org>
List-Unsubscribe: <https://www.ietf.org/mailman/options/oauth>, <mailto:oauth-request@ietf.org?subject=unsubscribe>
List-Archive: <http://www.ietf.org/mail-archive/web/oauth>
List-Post: <mailto:oauth@ietf.org>
List-Help: <mailto:oauth-request@ietf.org?subject=help>
List-Subscribe: <https://www.ietf.org/mailman/listinfo/oauth>, <mailto:oauth-request@ietf.org?subject=subscribe>
X-List-Received-Date: Wed, 20 Feb 2013 20:01:01 -0000

--Apple-Mail=_1F9B7C9B-F76A-4E2F-923C-67CD5FDE1A8F
Content-Type: multipart/alternative;
	boundary="Apple-Mail=_53748FC4-84C5-4596-9D1B-0CB10917D991"


--Apple-Mail=_53748FC4-84C5-4596-9D1B-0CB10917D991
Content-Transfer-Encoding: quoted-printable
Content-Type: text/plain;
	charset=windows-1252

I am OK with that.
On 2013-02-20, at 4:03 PM, Justin Richer <jricher@mitre.org> wrote:

> On second thought, how about "registration_client_uri"? It's the URI =
for a particular client's registration. Use of the verb "registered" =
makes it sound like the result of an action that the client took, as if =
the client itself had registered the URI. That's obviously not the case, =
and we don't want to convey that.=20
>=20
> So, new proposed name: "registration_client_uri"
>=20
> This has the nice side effect of being more parallel with =
"reigstration_access_token".=20
>=20
>  -- Justin
>=20
> On 02/20/2013 01:13 PM, Mike Jones wrote:
>> SGTM
>> =20
>> From: Justin Richer [mailto:jricher@mitre.org]=20
>> Sent: Wednesday, February 20, 2013 10:11 AM
>> To: Nat Sakimura
>> Cc: Mike Jones; <oauth@ietf.org>; John Bradley
>> Subject: Re: [OAUTH-WG] I-D Action: draft-ietf-oauth-dyn-reg-06.txt
>> =20
>> I like "registered_client_uri", given all of the other discussions on =
this thread, because:
>>=20
>> URL/URI: It *is* a URL, and an https one at that, but if the IETF =
convention is to call it URI, then I'm fine with that.
>>=20
>> registered_client/registration_access: The former is a good =
description of what's actually *at* the URL, which fits better with the =
RESTful entity model. I think Nat's criticisms about the original =
formation of the parameter name are spot on, though at the time we =
hadn't heard anything better.
>>=20
>>=20
>> So I'd like to change it to "registered_client_uri" in the next =
draft.
>>=20
>>  -- Justin
>>=20
>> On 02/20/2013 12:20 PM, Nat Sakimura wrote:
>> I have thought about that as well. The the reason I added "info" or =
"metadata" was that what was behind the URL is not the client itself. By =
"client registration", I suppose you mean "client entry in the register" =
(cf. registration n 2.) . It is the "registered data/info/metadata" =
about the client.=20
>> =20
>> Nat
>>=20
>> 2013/2/20 Mike Jones <Michael.Jones@microsoft.com>
>> I could live with =93registered_client_url=94.  I think that adding =
=93_metadata=94 or =93_info=94 is incorrect, because what=92s being =
accessed is the client=92 registration =96 not just metadata or info =
about the client=92s registration (although that information can be =
retrieved as one aspect of the operations on the client=92s =
registration).
>> =20
>>                                                             -- Mike
>> =20
>> From: Nat Sakimura [mailto:sakimura@gmail.com]=20
>> Sent: Wednesday, February 20, 2013 8:53 AM
>> To: Mike Jones
>> Cc: <oauth@ietf.org>; Richer, Justin P.; John Bradley
>>=20
>> Subject: Re: [OAUTH-WG] I-D Action: draft-ietf-oauth-dyn-reg-06.txt
>> =20
>> I have read the whole thing and still ---=20
>> =20
>> Your argument that it is the place for using "registration access =
token" thus should have a parallel name "registration access url" is =
very weak. There are several weakness.=20
>> =20
>> First, "registration access token" actually is "registration" + =
"access token". Extracting "registration access" from "registration =
access token" is broken.=20
>> =20
>> Secondly, access token is used to against any protected resource. =
Recommending to use the word "access" in naming protected resources is =
broken. Should we rename Userinfo endpoint to something like "Userinfo =
Access Endpoint"? I do not think so.=20
>> =20
>> Thirdly, the term "Registration Access" does not seem to be =
meaningful.=20
>> When you say "access", I suppose you are using the noun version of =
it.=20
>> (If you are using the verb, then I am even more against as a URL =
should not contain a verb.)=20
>> =20
>> According to the Webster, access (n.) is defined as:=20
>> =20
>> access n.
>> =20
>> 1
>> a : onset 2
>> b : a fit of intense feeling : outburst
>> 2
>> a : permission, liberty, or ability to enter, approach, or pass to =
and from a place or to approach or communicate with a person or thing
>> b : freedom or ability to obtain or make use of something
>> c : a way or means of access
>> d : the act or an instance of accessing
>> 3
>> : an increase by addition <a sudden access of wealth>
>> =20
>> Replacing "access" with any of the definition above does not seem to =
work.=20
>> =20
>> Remember, a URL is represents a "thing".=20
>> The name of the endpoint should represent the "thing".=20
>> =20
>> I am merginally OK with "client registration url" leveraging on the =
definition 2. below (again from Webster -- my OED subscription lapsed =
for the time being.)=20
>> =20
>> registration n.
>> =20
>> 1
>> : the act of registering
>> 2
>> : an entry in a register
>> 3
>> : the number of individuals registered : enrollment
>> 4
>> a : the art or act of selecting and adjusting pipe organ stops
>> b : the combination of stops selected for performing a particular =
organ work
>> 5
>> : a document certifying an act of registering
>> =20
>> However, since the most common use of "registration" is actually 1 =
above, it still is confusing. If you really want to emphasize the fact =
that it has been registered, then something like "registered client info =
uri" or "registered client metadata uri" would be better.=20
>> =20
>> Nat
>> =20
>> =20
>> 2013/2/20 Mike Jones <Michael.Jones@microsoft.com>
>> For what it=92s worth, the name =93registration_access_url=94 was =
chosen to be parallel to =93registration_access_token=94.   It=92s the =
place you use the access token.  And it=92s where you access an existing =
registration.  I=92m against the name =93client_metadata_url=94 because =
it=92s not metadata you=92re accessing =96 it=92s a registration you=92re =
accessing.  For the same reason, I don=92t think the name =
=93client_info_url=94 gives people the right idea, because it doesn=92t =
say anything it being the registration that you=92re accessing.
>> =20
>> If you really want us to change this, having read what=92s above, I =
could live with =93client_registration_url=94, but I don=92t think a =
change is actually necessary.  (But if we are going to change it, let=92s =
do it ASAP, before the OpenID Connect Implementer=92s Drafts are =
published.)
>> =20
>>                                                             -- Mike
>> =20
>> From: oauth-bounces@ietf.org [mailto:oauth-bounces@ietf.org] On =
Behalf Of Nat Sakimura
>> Sent: Wednesday, February 20, 2013 7:58 AM
>> To: <oauth@ietf.org>; Richer, Justin P.; John Bradley
>>=20
>> Subject: Re: [OAUTH-WG] I-D Action: draft-ietf-oauth-dyn-reg-06.txt
>> =20
>> Thanks Justin.
>>=20
>>=20
>> Even if we go flat rather than doing JSON Structure, the "Client
>> Registration Access Endpoint" is not a good representative name.
>>=20
>> What it represents is the client metadata/info.
>> It is not representing "Client Registration Access".=20
>> What does "Client Registration Access" mean?=20
>> Does UPDATing "Cleint Registration Access" make sense?
>>=20
>> Something in the line of "Client Metadata Endpoint" and
>> something like "client_metadata_url" or "client_info_url" is much =
better.
>>=20
>> Nat
>>=20
>> 2013/2/15 Richer, Justin P. <jricher@mitre.org>
>> Everyone, there's a new draft of DynReg up on the tracker. This draft =
tries to codify the discussions so far from this week into something we =
can all read. There are still plenty of open discussion points and items =
up for debate. Please read through this latest draft and see what's =
changed and help assure that it properly captures the conversations. If =
you have any inputs for the marked [[ Editor's Note ]] sections, please =
send them to the list by next Thursday to give me opportunity to get any =
necessary changes in by the cutoff date of Monday the 22nd.
>>=20
>> Thanks for all of your hard work everyone, I think this is *really* =
coming along now.
>>=20
>>  -- Justin
>>=20
>> On Feb 15, 2013, at 4:54 PM, internet-drafts@ietf.org wrote:
>>=20
>> >
>> > A New Internet-Draft is available from the on-line Internet-Drafts =
directories.
>> > This draft is a work item of the Web Authorization Protocol Working =
Group of the IETF.
>> >
>> >       Title           : OAuth Dynamic Client Registration Protocol
>> >       Author(s)       : Justin Richer
>> >                          John Bradley
>> >                          Michael B. Jones
>> >                          Maciej Machulak
>> >       Filename        : draft-ietf-oauth-dyn-reg-06.txt
>> >       Pages           : 21
>> >       Date            : 2013-02-15
>> >
>> > Abstract:
>> >   This specification defines an endpoint and protocol for dynamic
>> >   registration of OAuth Clients at an Authorization Server.
>> >
>> >
>> > The IETF datatracker status page for this draft is:
>> > https://datatracker.ietf.org/doc/draft-ietf-oauth-dyn-reg
>> >
>> > There's also a htmlized version available at:
>> > http://tools.ietf.org/html/draft-ietf-oauth-dyn-reg-06
>> >
>> > A diff from the previous version is available at:
>> > http://www.ietf.org/rfcdiff?url2=3Ddraft-ietf-oauth-dyn-reg-06
>> >
>> >
>> > Internet-Drafts are also available by anonymous FTP at:
>> > ftp://ftp.ietf.org/internet-drafts/
>> >
>> > _______________________________________________
>> > OAuth mailing list
>> > OAuth@ietf.org
>> > https://www.ietf.org/mailman/listinfo/oauth
>>=20
>> _______________________________________________
>> OAuth mailing list
>> OAuth@ietf.org
>> https://www.ietf.org/mailman/listinfo/oauth
>>=20
>>=20
>> =20
>> --=20
>> Nat Sakimura (=3Dnat)
>> Chairman, OpenID Foundation
>> http://nat.sakimura.org/
>> @_nat_en
>>=20
>>=20
>> =20
>> --=20
>> Nat Sakimura (=3Dnat)
>> Chairman, OpenID Foundation
>> http://nat.sakimura.org/
>> @_nat_en
>>=20
>>=20
>> =20
>> --=20
>> Nat Sakimura (=3Dnat)
>> Chairman, OpenID Foundation
>> http://nat.sakimura.org/
>> @_nat_en
>> =20
>=20


--Apple-Mail=_53748FC4-84C5-4596-9D1B-0CB10917D991
Content-Transfer-Encoding: quoted-printable
Content-Type: text/html;
	charset=windows-1252

<html><head><meta http-equiv=3D"Content-Type" content=3D"text/html =
charset=3Dwindows-1252"></head><body style=3D"word-wrap: break-word; =
-webkit-nbsp-mode: space; -webkit-line-break: after-white-space; ">I am =
OK with that.<br><div><div>On 2013-02-20, at 4:03 PM, Justin Richer =
&lt;<a href=3D"mailto:jricher@mitre.org">jricher@mitre.org</a>&gt; =
wrote:</div><br class=3D"Apple-interchange-newline"><blockquote =
type=3D"cite">
 =20
    <meta content=3D"text/html; charset=3DISO-8859-1" =
http-equiv=3D"Content-Type">
 =20
  <div bgcolor=3D"#FFFFFF" text=3D"#000000">
    On second thought, how about "registration_client_uri"? It's the URI
    for a particular client's registration. Use of the verb "registered"
    makes it sound like the result of an action that the client took, as
    if the client itself had registered the URI. That's obviously not
    the case, and we don't want to convey that. <br>
    <br>
    So, new proposed name: "registration_client_uri"<br>
    <br>
    This has the nice side effect of being more parallel with
    "reigstration_access_token". <br>
    <br>
    &nbsp;-- Justin<br>
    <br>
    <div class=3D"moz-cite-prefix">On 02/20/2013 01:13 PM, Mike Jones
      wrote:<br>
    </div>
    <blockquote =
cite=3D"mid:4E1F6AAD24975D4BA5B16804296739436747B2BB@TK5EX14MBXC284.redmon=
d.corp.microsoft.com" type=3D"cite">
      <meta http-equiv=3D"Content-Type" content=3D"text/html;
        charset=3DISO-8859-1">
      <meta name=3D"Generator" content=3D"Microsoft Word 14 (filtered
        medium)">
      <style><!--
/* Font Definitions */
@font-face
	{font-family:Calibri;
	panose-1:2 15 5 2 2 2 4 3 2 4;}
@font-face
	{font-family:Tahoma;
	panose-1:2 11 6 4 3 5 4 4 2 4;}
@font-face
	{font-family:Verdana;
	panose-1:2 11 6 4 3 5 4 4 2 4;}
/* Style Definitions */
p.MsoNormal, li.MsoNormal, div.MsoNormal
	{margin:0in;
	margin-bottom:.0001pt;
	font-size:12.0pt;
	font-family:"Times New Roman","serif";
	color:black;}
a:link, span.MsoHyperlink
	{mso-style-priority:99;
	color:blue;
	text-decoration:underline;}
a:visited, span.MsoHyperlinkFollowed
	{mso-style-priority:99;
	color:purple;
	text-decoration:underline;}
p.MsoAcetate, li.MsoAcetate, div.MsoAcetate
	{mso-style-priority:99;
	mso-style-link:"Balloon Text Char";
	margin:0in;
	margin-bottom:.0001pt;
	font-size:8.0pt;
	font-family:"Tahoma","sans-serif";
	color:black;}
span.EmailStyle19
	{mso-style-type:personal-reply;
	font-family:"Calibri","sans-serif";
	color:#1F497D;}
span.BalloonTextChar
	{mso-style-name:"Balloon Text Char";
	mso-style-priority:99;
	mso-style-link:"Balloon Text";
	font-family:"Tahoma","sans-serif";
	color:black;}
.MsoChpDefault
	{mso-style-type:export-only;
	font-size:10.0pt;}
@page WordSection1
	{size:8.5in 11.0in;
	margin:1.0in 1.0in 1.0in 1.0in;}
div.WordSection1
	{page:WordSection1;}
--></style><!--[if gte mso 9]><xml>
<o:shapedefaults v:ext=3D"edit" spidmax=3D"1026" />
</xml><![endif]--><!--[if gte mso 9]><xml>
<o:shapelayout v:ext=3D"edit">
<o:idmap v:ext=3D"edit" data=3D"1" />
</o:shapelayout></xml><![endif]-->
      <div class=3D"WordSection1"><p class=3D"MsoNormal"><span =
style=3D"font-size:11.0pt;font-family:&quot;Calibri&quot;,&quot;sans-serif=
&quot;;color:#1F497D">SGTM<o:p></o:p></span></p><p =
class=3D"MsoNormal"><span =
style=3D"font-size:11.0pt;font-family:&quot;Calibri&quot;,&quot;sans-serif=
&quot;;color:#1F497D">&nbsp;</span></p>
        <div>
          <div style=3D"border:none;border-top:solid #B5C4DF
            1.0pt;padding:3.0pt 0in 0in 0in"><p =
class=3D"MsoNormal"><b><span =
style=3D"font-size:10.0pt;font-family:&quot;Tahoma&quot;,&quot;sans-serif&=
quot;;color:windowtext">From:</span></b><span =
style=3D"font-size:10.0pt;font-family:&quot;Tahoma&quot;,&quot;sans-serif&=
quot;;color:windowtext">
                Justin Richer [<a class=3D"moz-txt-link-freetext" =
href=3D"mailto:jricher@mitre.org">mailto:jricher@mitre.org</a>]
                <br>
                <b>Sent:</b> Wednesday, February 20, 2013 10:11 AM<br>
                <b>To:</b> Nat Sakimura<br>
                <b>Cc:</b> Mike Jones; <a class=3D"moz-txt-link-rfc2396E" =
href=3D"mailto:oauth@ietf.org">&lt;oauth@ietf.org&gt;</a>; John
                Bradley<br>
                <b>Subject:</b> Re: [OAUTH-WG] I-D Action:
                draft-ietf-oauth-dyn-reg-06.txt<o:p></o:p></span></p>
          </div>
        </div><p class=3D"MsoNormal"><o:p>&nbsp;</o:p></p><p =
class=3D"MsoNormal" style=3D"margin-bottom:12.0pt">I like
          "registered_client_uri", given all of the other discussions on
          this thread, because:<br>
          <br>
          URL/URI: It *is* a URL, and an https one at that, but if the
          IETF convention is to call it URI, then I'm fine with =
that.<br>
          <br>
          registered_client/registration_access: The former is a good
          description of what's actually *at* the URL, which fits better
          with the RESTful entity model. I think Nat's criticisms about
          the original formation of the parameter name are spot on,
          though at the time we hadn't heard anything better.<br>
          <br>
          <br>
          So I'd like to change it to "registered_client_uri" in the
          next draft.<br>
          <br>
          &nbsp;-- Justin<o:p></o:p></p>
        <div><p class=3D"MsoNormal">On 02/20/2013 12:20 PM, Nat Sakimura
            wrote:<o:p></o:p></p>
        </div>
        <blockquote style=3D"margin-top:5.0pt;margin-bottom:5.0pt"><p =
class=3D"MsoNormal">I have thought about that as well. The
            the reason I added "info" or "metadata" was that what was
            behind the URL is not the client itself. By "client
            registration", I suppose you mean "client entry in the
            register" (cf.
            <b>registration </b><i>n</i> 2.) . It is the "registered
            data/info/metadata" about the client.&nbsp;
            <o:p></o:p></p>
          <div><p class=3D"MsoNormal"><o:p>&nbsp;</o:p></p>
          </div>
          <div><p class=3D"MsoNormal" =
style=3D"margin-bottom:12.0pt">Nat<o:p></o:p></p>
            <div><p class=3D"MsoNormal">2013/2/20 Mike Jones &lt;<a =
moz-do-not-send=3D"true" href=3D"mailto:Michael.Jones@microsoft.com" =
target=3D"_blank">Michael.Jones@microsoft.com</a>&gt;<o:p></o:p></p>
              <div>
                <div><p class=3D"MsoNormal" =
style=3D"mso-margin-top-alt:auto;mso-margin-bottom-alt:auto"><span =
style=3D"font-size:11.0pt;font-family:&quot;Calibri&quot;,&quot;sans-serif=
&quot;;color:#1F497D">I
                      could live with =93registered_client_url=94.&nbsp; =
I think
                      that adding =93_metadata=94 or =93_info=94 is =
incorrect,
                      because what=92s being accessed is the client=92
                      registration =96 not just metadata or info about =
the
                      client=92s registration (although that information
                      can be retrieved as one aspect of the operations
                      on the client=92s =
registration).</span><o:p></o:p></p><p class=3D"MsoNormal" =
style=3D"mso-margin-top-alt:auto;mso-margin-bottom-alt:auto"><span =
style=3D"font-size:11.0pt;font-family:&quot;Calibri&quot;,&quot;sans-serif=
&quot;;color:#1F497D">&nbsp;</span><o:p></o:p></p><p class=3D"MsoNormal" =
style=3D"mso-margin-top-alt:auto;mso-margin-bottom-alt:auto"><span =
style=3D"font-size:11.0pt;font-family:&quot;Calibri&quot;,&quot;sans-serif=
&quot;;color:#1F497D">&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbs=
p;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;=
&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&n=
bsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbs=
p;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;=
&nbsp;
                      -- Mike</span><o:p></o:p></p><p class=3D"MsoNormal" =
style=3D"mso-margin-top-alt:auto;mso-margin-bottom-alt:auto"><span =
style=3D"font-size:11.0pt;font-family:&quot;Calibri&quot;,&quot;sans-serif=
&quot;;color:#1F497D">&nbsp;</span><o:p></o:p></p><p class=3D"MsoNormal" =
style=3D"mso-margin-top-alt:auto;mso-margin-bottom-alt:auto"><b><span =
style=3D"font-size:10.0pt;font-family:&quot;Tahoma&quot;,&quot;sans-serif&=
quot;">From:</span></b><span =
style=3D"font-size:10.0pt;font-family:&quot;Tahoma&quot;,&quot;sans-serif&=
quot;">
                      Nat Sakimura [mailto:<a moz-do-not-send=3D"true" =
href=3D"mailto:sakimura@gmail.com" =
target=3D"_blank">sakimura@gmail.com</a>]
                      <br>
                      <b>Sent:</b> Wednesday, February 20, 2013 8:53 =
AM<br>
                      <b>To:</b> Mike Jones<br>
                      <b>Cc:</b> &lt;<a moz-do-not-send=3D"true" =
href=3D"mailto:oauth@ietf.org" target=3D"_blank">oauth@ietf.org</a>&gt;;
                      Richer, Justin P.; John =
Bradley</span><o:p></o:p></p>
                  <div>
                    <div><p class=3D"MsoNormal"><br>
                        <b>Subject:</b> Re: [OAUTH-WG] I-D Action:
                        draft-ietf-oauth-dyn-reg-06.txt<o:p></o:p></p>
                    </div>
                  </div>
                  <div>
                    <div><p class=3D"MsoNormal" =
style=3D"mso-margin-top-alt:auto;mso-margin-bottom-alt:auto">&nbsp;<o:p></=
o:p></p><p class=3D"MsoNormal" =
style=3D"mso-margin-top-alt:auto;mso-margin-bottom-alt:auto">I
                        have read the whole thing and still =
---&nbsp;<o:p></o:p></p>
                      <div><p class=3D"MsoNormal" =
style=3D"mso-margin-top-alt:auto;mso-margin-bottom-alt:auto">&nbsp;<o:p></=
o:p></p>
                      </div>
                      <div><p class=3D"MsoNormal" =
style=3D"mso-margin-top-alt:auto;mso-margin-bottom-alt:auto">Your
                          argument that it is the place for using
                          "registration access token" thus should have a
                          parallel name "registration access url" is
                          very weak. There are several =
weakness.&nbsp;<o:p></o:p></p>
                      </div>
                      <div><p class=3D"MsoNormal" =
style=3D"mso-margin-top-alt:auto;mso-margin-bottom-alt:auto">&nbsp;<o:p></=
o:p></p>
                      </div>
                      <div><p class=3D"MsoNormal" =
style=3D"mso-margin-top-alt:auto;mso-margin-bottom-alt:auto">First,
                          "registration access token" actually is
                          "registration" + "access token". Extracting
                          "registration access" from "registration
                          access token" is broken.&nbsp;<o:p></o:p></p>
                      </div>
                      <div><p class=3D"MsoNormal" =
style=3D"mso-margin-top-alt:auto;mso-margin-bottom-alt:auto">&nbsp;<o:p></=
o:p></p>
                      </div>
                      <div><p class=3D"MsoNormal" =
style=3D"mso-margin-top-alt:auto;mso-margin-bottom-alt:auto">Secondly,
                          access token is used to against any protected
                          resource.&nbsp;Recommending&nbsp;to use the =
word
                          "access" in naming protected resources is
                          broken. Should we rename Userinfo endpoint to
                          something like "Userinfo Access Endpoint"? I
                          do not think so.&nbsp;<o:p></o:p></p>
                      </div>
                      <div><p class=3D"MsoNormal" =
style=3D"mso-margin-top-alt:auto;mso-margin-bottom-alt:auto">&nbsp;<o:p></=
o:p></p>
                      </div>
                      <div><p class=3D"MsoNormal" =
style=3D"mso-margin-top-alt:auto;mso-margin-bottom-alt:auto">Thirdly,
                          the term "Registration Access" does not seem
                          to be meaningful.&nbsp;<o:p></o:p></p>
                      </div>
                      <div><p class=3D"MsoNormal" =
style=3D"mso-margin-top-alt:auto;mso-margin-bottom-alt:auto">When
                          you say "access", I suppose you are using the
                          noun version of it.&nbsp;<o:p></o:p></p>
                      </div>
                      <div>
                        <div><p class=3D"MsoNormal" =
style=3D"mso-margin-top-alt:auto;mso-margin-bottom-alt:auto">(If
                            you are using the verb, then I am even more
                            against as a URL should not contain a
                            verb.)&nbsp;<o:p></o:p></p>
                        </div>
                        <div><p class=3D"MsoNormal" =
style=3D"mso-margin-top-alt:auto;mso-margin-bottom-alt:auto">&nbsp;<o:p></=
o:p></p>
                        </div>
                        <div><p class=3D"MsoNormal" =
style=3D"mso-margin-top-alt:auto;mso-margin-bottom-alt:auto">According
                            to the Webster, access (n.) is defined =
as:&nbsp;<o:p></o:p></p>
                        </div>
                        <div><p class=3D"MsoNormal" =
style=3D"mso-margin-top-alt:auto;mso-margin-bottom-alt:auto">&nbsp;<o:p></=
o:p></p>
                        </div>
                        <div><p class=3D"MsoNormal" =
style=3D"mso-margin-top-alt:auto;mso-margin-bottom-alt:auto"><b>access
                            </b><i>n.</i><o:p></o:p></p>
                        </div>
                        <div><p class=3D"MsoNormal" =
style=3D"mso-margin-top-alt:auto;mso-margin-bottom-alt:auto">&nbsp;<o:p></=
o:p></p>
                        </div>
                        <div>
                          <div>
                            <div><p class=3D"MsoNormal" =
style=3D"mso-margin-top-alt:auto;mso-margin-bottom-alt:auto;line-height:15=
.0pt;background:white"><b><span =
style=3D"font-size:9.5pt;font-family:&quot;Verdana&quot;,&quot;sans-serif&=
quot;">1</span></b><o:p></o:p></p>
                            </div>
                            <div =
style=3D"margin-left:15.0pt;margin-bottom:7.5pt"><p class=3D"MsoNormal" =
style=3D"mso-margin-top-alt:auto;mso-margin-bottom-alt:auto;line-height:15=
.0pt;background:white"><em><b><span =
style=3D"font-size:9.5pt;font-family:&quot;Verdana&quot;,&quot;sans-serif&=
quot;;font-style:normal">a</span></b></em><span =
style=3D"font-size:9.5pt;font-family:&quot;Verdana&quot;,&quot;sans-serif&=
quot;">&nbsp;<strong><span =
style=3D"font-family:&quot;Verdana&quot;,&quot;sans-serif&quot;">:</span><=
/strong>&nbsp;<a moz-do-not-send=3D"true" =
href=3D"http://www.merriam-webster.com/dictionary/onset" =
target=3D"_blank"><span =
style=3D"font-variant:small-caps;color:#1122CC">onset</span></a>&nbsp;2</s=
pan><o:p></o:p></p><p class=3D"MsoNormal" =
style=3D"mso-margin-top-alt:auto;mso-margin-bottom-alt:auto;line-height:15=
.0pt;background:white"><em><b><span =
style=3D"font-size:9.5pt;font-family:&quot;Verdana&quot;,&quot;sans-serif&=
quot;;font-style:normal">b</span></b></em><span =
style=3D"font-size:9.5pt;font-family:&quot;Verdana&quot;,&quot;sans-serif&=
quot;">&nbsp;<strong><span =
style=3D"font-family:&quot;Verdana&quot;,&quot;sans-serif&quot;">:</span><=
/strong>&nbsp;a
                                  fit of intense =
feeling&nbsp;<strong><span =
style=3D"font-family:&quot;Verdana&quot;,&quot;sans-serif&quot;">:</span><=
/strong>&nbsp;<a moz-do-not-send=3D"true" =
href=3D"http://www.merriam-webster.com/dictionary/outburst" =
target=3D"_blank"><span =
style=3D"font-variant:small-caps;color:#1122CC">outburst</span></a></span>=
<o:p></o:p></p>
                            </div>
                          </div>
                          <div>
                            <div><p class=3D"MsoNormal" =
style=3D"mso-margin-top-alt:auto;mso-margin-bottom-alt:auto;line-height:15=
.0pt;background:white"><b><span =
style=3D"font-size:9.5pt;font-family:&quot;Verdana&quot;,&quot;sans-serif&=
quot;">2</span></b><o:p></o:p></p>
                            </div>
                            <div =
style=3D"margin-left:15.0pt;margin-bottom:7.5pt"><p class=3D"MsoNormal" =
style=3D"mso-margin-top-alt:auto;mso-margin-bottom-alt:auto;line-height:15=
.0pt;background:white"><em><b><span =
style=3D"font-size:9.5pt;font-family:&quot;Verdana&quot;,&quot;sans-serif&=
quot;;font-style:normal">a</span></b></em><span =
style=3D"font-size:9.5pt;font-family:&quot;Verdana&quot;,&quot;sans-serif&=
quot;">&nbsp;<strong><span =
style=3D"font-family:&quot;Verdana&quot;,&quot;sans-serif&quot;">:</span><=
/strong>&nbsp;permission,

                                  liberty, or ability to enter,
                                  approach, or pass to and from a place
                                  or to approach or communicate with a
                                  person or =
thing</span><o:p></o:p></p><p class=3D"MsoNormal" =
style=3D"mso-margin-top-alt:auto;mso-margin-bottom-alt:auto;line-height:15=
.0pt;background:white"><em><b><span =
style=3D"font-size:9.5pt;font-family:&quot;Verdana&quot;,&quot;sans-serif&=
quot;;font-style:normal">b</span></b></em><span =
style=3D"font-size:9.5pt;font-family:&quot;Verdana&quot;,&quot;sans-serif&=
quot;">&nbsp;<strong><span =
style=3D"font-family:&quot;Verdana&quot;,&quot;sans-serif&quot;">:</span><=
/strong>&nbsp;freedom
                                  or ability to obtain or make use of
                                  something</span><o:p></o:p></p><p =
class=3D"MsoNormal" =
style=3D"mso-margin-top-alt:auto;mso-margin-bottom-alt:auto;line-height:15=
.0pt;background:white"><em><b><span =
style=3D"font-size:9.5pt;font-family:&quot;Verdana&quot;,&quot;sans-serif&=
quot;;font-style:normal">c</span></b></em><span =
style=3D"font-size:9.5pt;font-family:&quot;Verdana&quot;,&quot;sans-serif&=
quot;">&nbsp;<strong><span =
style=3D"font-family:&quot;Verdana&quot;,&quot;sans-serif&quot;">:</span><=
/strong>&nbsp;a
                                  way or means of =
access</span><o:p></o:p></p><p class=3D"MsoNormal" =
style=3D"mso-margin-top-alt:auto;mso-margin-bottom-alt:auto;line-height:15=
.0pt;background:white"><em><b><span =
style=3D"font-size:9.5pt;font-family:&quot;Verdana&quot;,&quot;sans-serif&=
quot;;font-style:normal">d</span></b></em><span =
style=3D"font-size:9.5pt;font-family:&quot;Verdana&quot;,&quot;sans-serif&=
quot;">&nbsp;<strong><span =
style=3D"font-family:&quot;Verdana&quot;,&quot;sans-serif&quot;">:</span><=
/strong>&nbsp;the
                                  act or an instance of&nbsp;<a =
moz-do-not-send=3D"true" =
href=3D"http://www.merriam-webster.com/dictionary/accessing" =
target=3D"_blank"><span =
style=3D"font-size:10.0pt;color:#1122CC">accessing</span></a></span><o:p><=
/o:p></p>
                            </div>
                          </div>
                          <div>
                            <div><p class=3D"MsoNormal" =
style=3D"mso-margin-top-alt:auto;mso-margin-bottom-alt:auto;line-height:15=
.0pt;background:white"><b><span =
style=3D"font-size:9.5pt;font-family:&quot;Verdana&quot;,&quot;sans-serif&=
quot;">3</span></b><o:p></o:p></p>
                            </div>
                            <div =
style=3D"margin-left:15.0pt;margin-bottom:7.5pt"><p class=3D"MsoNormal" =
style=3D"mso-margin-top-alt:auto;mso-margin-bottom-alt:auto;line-height:15=
.0pt;background:white"><strong><span =
style=3D"font-size:9.5pt;font-family:&quot;Verdana&quot;,&quot;sans-serif&=
quot;">:</span></strong><span =
style=3D"font-size:9.5pt;font-family:&quot;Verdana&quot;,&quot;sans-serif&=
quot;">&nbsp;an
                                  increase by addition&nbsp;&lt;a =
sudden&nbsp;<em><span =
style=3D"font-family:&quot;Verdana&quot;,&quot;sans-serif&quot;">access</s=
pan></em>&nbsp;of

                                  wealth&gt;</span><o:p></o:p></p>
                            </div>
                          </div>
                          <div><p class=3D"MsoNormal" =
style=3D"mso-margin-top-alt:auto;mso-margin-bottom-alt:auto">&nbsp;<o:p></=
o:p></p>
                          </div>
                          <div><p class=3D"MsoNormal" =
style=3D"mso-margin-top-alt:auto;mso-margin-bottom-alt:auto">Replacing
                              "access" with any of the definition above
                              does not seem to =
work.&nbsp;<o:p></o:p></p>
                          </div>
                          <div><p class=3D"MsoNormal" =
style=3D"mso-margin-top-alt:auto;mso-margin-bottom-alt:auto">&nbsp;<o:p></=
o:p></p>
                          </div>
                          <div><p class=3D"MsoNormal" =
style=3D"mso-margin-top-alt:auto;mso-margin-bottom-alt:auto">Remember,
                              a URL is represents a =
"thing".&nbsp;<o:p></o:p></p>
                          </div>
                          <div><p class=3D"MsoNormal" =
style=3D"mso-margin-top-alt:auto;mso-margin-bottom-alt:auto">The
                              name of the endpoint should represent the
                              "thing".&nbsp;<o:p></o:p></p>
                          </div>
                          <div><p class=3D"MsoNormal" =
style=3D"mso-margin-top-alt:auto;mso-margin-bottom-alt:auto">&nbsp;<o:p></=
o:p></p>
                          </div>
                          <div><p class=3D"MsoNormal" =
style=3D"mso-margin-top-alt:auto;mso-margin-bottom-alt:auto">I
                              am merginally OK with "client registration
                              url" leveraging on the definition 2. below
                              (again from Webster -- my OED subscription
                              lapsed for the time =
being.)&nbsp;<o:p></o:p></p>
                          </div>
                          <div><p class=3D"MsoNormal" =
style=3D"mso-margin-top-alt:auto;mso-margin-bottom-alt:auto">&nbsp;<o:p></=
o:p></p>
                          </div>
                          <div><p class=3D"MsoNormal" =
style=3D"mso-margin-top-alt:auto;mso-margin-bottom-alt:auto"><b>registrati=
on
                              </b><i>n.</i><o:p></o:p></p>
                          </div>
                          <div><p class=3D"MsoNormal" =
style=3D"mso-margin-top-alt:auto;mso-margin-bottom-alt:auto">&nbsp;<o:p></=
o:p></p>
                          </div>
                          <div>
                            <div>
                              <div><p class=3D"MsoNormal" =
style=3D"mso-margin-top-alt:auto;mso-margin-bottom-alt:auto;line-height:15=
.0pt;background:white"><b><span =
style=3D"font-size:9.5pt;font-family:&quot;Verdana&quot;,&quot;sans-serif&=
quot;">1</span></b><o:p></o:p></p>
                              </div>
                              <div =
style=3D"margin-left:15.0pt;margin-bottom:7.5pt"><p class=3D"MsoNormal" =
style=3D"mso-margin-top-alt:auto;mso-margin-bottom-alt:auto;line-height:15=
.0pt;background:white"><strong><span =
style=3D"font-size:9.5pt;font-family:&quot;Verdana&quot;,&quot;sans-serif&=
quot;">:</span></strong><span =
style=3D"font-size:9.5pt;font-family:&quot;Verdana&quot;,&quot;sans-serif&=
quot;">&nbsp;the
                                    act of&nbsp;<a =
moz-do-not-send=3D"true" =
href=3D"http://www.merriam-webster.com/dictionary/registering" =
target=3D"_blank"><span =
style=3D"font-size:10.0pt;color:#1122CC">registering</span></a></span><o:p=
></o:p></p>
                              </div>
                            </div>
                            <div>
                              <div><p class=3D"MsoNormal" =
style=3D"mso-margin-top-alt:auto;mso-margin-bottom-alt:auto;line-height:15=
.0pt;background:white"><b><span =
style=3D"font-size:9.5pt;font-family:&quot;Verdana&quot;,&quot;sans-serif&=
quot;">2</span></b><o:p></o:p></p>
                              </div>
                              <div =
style=3D"margin-left:15.0pt;margin-bottom:7.5pt"><p class=3D"MsoNormal" =
style=3D"mso-margin-top-alt:auto;mso-margin-bottom-alt:auto;line-height:15=
.0pt;background:white"><strong><span =
style=3D"font-size:9.5pt;font-family:&quot;Verdana&quot;,&quot;sans-serif&=
quot;">:</span></strong><span =
style=3D"font-size:9.5pt;font-family:&quot;Verdana&quot;,&quot;sans-serif&=
quot;">&nbsp;an
                                    entry in a&nbsp;<a =
moz-do-not-send=3D"true" =
href=3D"http://www.merriam-webster.com/dictionary/register" =
target=3D"_blank"><span =
style=3D"font-size:10.0pt;color:#1122CC">register</span></a></span><o:p></=
o:p></p>
                              </div>
                            </div>
                            <div>
                              <div><p class=3D"MsoNormal" =
style=3D"mso-margin-top-alt:auto;mso-margin-bottom-alt:auto;line-height:15=
.0pt;background:white"><b><span =
style=3D"font-size:9.5pt;font-family:&quot;Verdana&quot;,&quot;sans-serif&=
quot;">3</span></b><o:p></o:p></p>
                              </div>
                              <div =
style=3D"margin-left:15.0pt;margin-bottom:7.5pt"><p class=3D"MsoNormal" =
style=3D"mso-margin-top-alt:auto;mso-margin-bottom-alt:auto;line-height:15=
.0pt;background:white"><strong><span =
style=3D"font-size:9.5pt;font-family:&quot;Verdana&quot;,&quot;sans-serif&=
quot;">:</span></strong><span =
style=3D"font-size:9.5pt;font-family:&quot;Verdana&quot;,&quot;sans-serif&=
quot;">&nbsp;the
                                    number of individuals&nbsp;<a =
moz-do-not-send=3D"true" =
href=3D"http://www.merriam-webster.com/dictionary/registered" =
target=3D"_blank"><span =
style=3D"font-size:10.0pt;color:#1122CC">registered</span></a>&nbsp;<stron=
g><span =
style=3D"font-family:&quot;Verdana&quot;,&quot;sans-serif&quot;">:</span><=
/strong>&nbsp;<a moz-do-not-send=3D"true" =
href=3D"http://www.merriam-webster.com/dictionary/enrollment" =
target=3D"_blank"><span =
style=3D"font-variant:small-caps;color:#1122CC">enrollment</span></a></spa=
n><o:p></o:p></p>
                              </div>
                            </div>
                            <div>
                              <div><p class=3D"MsoNormal" =
style=3D"mso-margin-top-alt:auto;mso-margin-bottom-alt:auto;line-height:15=
.0pt;background:white"><b><span =
style=3D"font-size:9.5pt;font-family:&quot;Verdana&quot;,&quot;sans-serif&=
quot;">4</span></b><o:p></o:p></p>
                              </div>
                              <div =
style=3D"margin-left:15.0pt;margin-bottom:7.5pt"><p class=3D"MsoNormal" =
style=3D"mso-margin-top-alt:auto;mso-margin-bottom-alt:auto;line-height:15=
.0pt;background:white"><em><b><span =
style=3D"font-size:9.5pt;font-family:&quot;Verdana&quot;,&quot;sans-serif&=
quot;;font-style:normal">a</span></b></em><span =
style=3D"font-size:9.5pt;font-family:&quot;Verdana&quot;,&quot;sans-serif&=
quot;">&nbsp;<strong><span =
style=3D"font-family:&quot;Verdana&quot;,&quot;sans-serif&quot;">:</span><=
/strong>&nbsp;the
                                    art or act of selecting and
                                    adjusting pipe organ =
stops</span><o:p></o:p></p><p class=3D"MsoNormal" =
style=3D"mso-margin-top-alt:auto;mso-margin-bottom-alt:auto;line-height:15=
.0pt;background:white"><em><b><span =
style=3D"font-size:9.5pt;font-family:&quot;Verdana&quot;,&quot;sans-serif&=
quot;;font-style:normal">b</span></b></em><span =
style=3D"font-size:9.5pt;font-family:&quot;Verdana&quot;,&quot;sans-serif&=
quot;">&nbsp;<strong><span =
style=3D"font-family:&quot;Verdana&quot;,&quot;sans-serif&quot;">:</span><=
/strong>&nbsp;the
                                    combination of stops selected for
                                    performing a particular organ =
work</span><o:p></o:p></p>
                              </div>
                            </div>
                            <div>
                              <div><p class=3D"MsoNormal" =
style=3D"mso-margin-top-alt:auto;mso-margin-bottom-alt:auto;line-height:15=
.0pt;background:white"><b><span =
style=3D"font-size:9.5pt;font-family:&quot;Verdana&quot;,&quot;sans-serif&=
quot;">5</span></b><o:p></o:p></p>
                              </div>
                              <div =
style=3D"margin-left:15.0pt;margin-bottom:7.5pt"><p class=3D"MsoNormal" =
style=3D"mso-margin-top-alt:auto;mso-margin-bottom-alt:auto;line-height:15=
.0pt;background:white"><strong><span =
style=3D"font-size:9.5pt;font-family:&quot;Verdana&quot;,&quot;sans-serif&=
quot;">:</span></strong><span =
style=3D"font-size:9.5pt;font-family:&quot;Verdana&quot;,&quot;sans-serif&=
quot;">&nbsp;a
                                    document certifying an act of
                                    registering</span><o:p></o:p></p>
                              </div>
                            </div>
                          </div>
                          <div><p class=3D"MsoNormal" =
style=3D"mso-margin-top-alt:auto;mso-margin-bottom-alt:auto">&nbsp;<o:p></=
o:p></p>
                          </div>
                          <div><p class=3D"MsoNormal" =
style=3D"mso-margin-top-alt:auto;mso-margin-bottom-alt:auto">However,
                              since the most common use of
                              "registration" is actually
                              <b>1</b> above, it still is confusing. If
                              you really want to emphasize the fact that
                              it has been registered, then something
                              like "registered client info uri" or
                              "registered client metadata uri" would be
                              better.&nbsp;<o:p></o:p></p>
                          </div>
                          <div><p class=3D"MsoNormal" =
style=3D"mso-margin-top-alt:auto;mso-margin-bottom-alt:auto">&nbsp;<o:p></=
o:p></p>
                          </div>
                          <div><p class=3D"MsoNormal" =
style=3D"mso-margin-top-alt:auto;mso-margin-bottom-alt:auto">Nat<o:p></o:p=
></p>
                          </div>
                          <div><p class=3D"MsoNormal" =
style=3D"mso-margin-top-alt:auto;mso-margin-bottom-alt:auto">&nbsp;<o:p></=
o:p></p>
                          </div><p class=3D"MsoNormal" =
style=3D"mso-margin-top-alt:auto;mso-margin-bottom-alt:auto">&nbsp;<o:p></=
o:p></p>
                          <div><p class=3D"MsoNormal" =
style=3D"mso-margin-top-alt:auto;mso-margin-bottom-alt:auto">2013/2/20
                              Mike Jones &lt;<a moz-do-not-send=3D"true" =
href=3D"mailto:Michael.Jones@microsoft.com" =
target=3D"_blank">Michael.Jones@microsoft.com</a>&gt;<o:p></o:p></p>
                            <div>
                              <div><p class=3D"MsoNormal" =
style=3D"mso-margin-top-alt:auto;mso-margin-bottom-alt:auto"><span =
style=3D"font-size:11.0pt;font-family:&quot;Calibri&quot;,&quot;sans-serif=
&quot;;color:#1F497D">For
                                    what it=92s worth, the name
                                    =93registration_access_url=94 was =
chosen
                                    to be parallel to
                                    =
=93registration_access_token=94.&nbsp;&nbsp; It=92s
                                    the place you use the access =
token.&nbsp;
                                    And it=92s where you access an
                                    existing registration.&nbsp; I=92m =
against
                                    the name =93client_metadata_url=94
                                    because it=92s not metadata you=92re
                                    accessing =96 it=92s a registration
                                    you=92re accessing.&nbsp; For the =
same
                                    reason, I don=92t think the name
                                    =93client_info_url=94 gives people =
the
                                    right idea, because it doesn=92t say
                                    anything it being the registration
                                    that you=92re =
accessing.</span><o:p></o:p></p><p class=3D"MsoNormal" =
style=3D"mso-margin-top-alt:auto;mso-margin-bottom-alt:auto"><span =
style=3D"font-size:11.0pt;font-family:&quot;Calibri&quot;,&quot;sans-serif=
&quot;;color:#1F497D">&nbsp;</span><o:p></o:p></p><p class=3D"MsoNormal" =
style=3D"mso-margin-top-alt:auto;mso-margin-bottom-alt:auto"><span =
style=3D"font-size:11.0pt;font-family:&quot;Calibri&quot;,&quot;sans-serif=
&quot;;color:#1F497D">If
                                    you really want us to change this,
                                    having read what=92s above, I could
                                    live with =93client_registration_url=94=
,
                                    but I don=92t think a change is
                                    actually necessary.&nbsp; (But if we =
are
                                    going to change it, let=92s do it
                                    ASAP, before the OpenID Connect
                                    Implementer=92s Drafts are =
published.)</span><o:p></o:p></p><p class=3D"MsoNormal" =
style=3D"mso-margin-top-alt:auto;mso-margin-bottom-alt:auto"><span =
style=3D"font-size:11.0pt;font-family:&quot;Calibri&quot;,&quot;sans-serif=
&quot;;color:#1F497D">&nbsp;</span><o:p></o:p></p><p class=3D"MsoNormal" =
style=3D"mso-margin-top-alt:auto;mso-margin-bottom-alt:auto"><span =
style=3D"font-size:11.0pt;font-family:&quot;Calibri&quot;,&quot;sans-serif=
&quot;;color:#1F497D">&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbs=
p;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;=
&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&n=
bsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbs=
p;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;=
&nbsp;
                                    -- Mike</span><o:p></o:p></p><p =
class=3D"MsoNormal" =
style=3D"mso-margin-top-alt:auto;mso-margin-bottom-alt:auto"><span =
style=3D"font-size:11.0pt;font-family:&quot;Calibri&quot;,&quot;sans-serif=
&quot;;color:#1F497D">&nbsp;</span><o:p></o:p></p><p class=3D"MsoNormal" =
style=3D"mso-margin-top-alt:auto;mso-margin-bottom-alt:auto"><b><span =
style=3D"font-size:10.0pt;font-family:&quot;Tahoma&quot;,&quot;sans-serif&=
quot;">From:</span></b><span =
style=3D"font-size:10.0pt;font-family:&quot;Tahoma&quot;,&quot;sans-serif&=
quot;">
                                    <a moz-do-not-send=3D"true" =
href=3D"mailto:oauth-bounces@ietf.org" =
target=3D"_blank">oauth-bounces@ietf.org</a>
                                    [mailto:<a moz-do-not-send=3D"true" =
href=3D"mailto:oauth-bounces@ietf.org" =
target=3D"_blank">oauth-bounces@ietf.org</a>]
                                    <b>On Behalf Of </b>Nat Sakimura<br>
                                    <b>Sent:</b> Wednesday, February 20,
                                    2013 7:58 AM<br>
                                    <b>To:</b> &lt;<a =
moz-do-not-send=3D"true" href=3D"mailto:oauth@ietf.org" =
target=3D"_blank">oauth@ietf.org</a>&gt;;
                                    Richer, Justin P.; John =
Bradley</span><o:p></o:p></p>
                                <div><p class=3D"MsoNormal" =
style=3D"mso-margin-top-alt:auto;mso-margin-bottom-alt:auto"><br>
                                    <b>Subject:</b> Re: [OAUTH-WG] I-D
                                    Action:
                                    =
draft-ietf-oauth-dyn-reg-06.txt<o:p></o:p></p>
                                </div><p class=3D"MsoNormal" =
style=3D"mso-margin-top-alt:auto;mso-margin-bottom-alt:auto">&nbsp;<o:p></=
o:p></p><p class=3D"MsoNormal" =
style=3D"mso-margin-top-alt:auto;mso-margin-bottom-alt:auto"><span =
style=3D"font-size:13.5pt;font-family:&quot;Arial&quot;,&quot;sans-serif&q=
uot;;color:#222222;background:white">Thanks
                                    Justin.</span><o:p></o:p></p>
                                <div>
                                  <div><p class=3D"MsoNormal" =
style=3D"mso-margin-top-alt:auto;mso-margin-bottom-alt:auto"><span =
style=3D"font-size:13.5pt;font-family:&quot;Arial&quot;,&quot;sans-serif&q=
uot;;color:#222222"><br>
                                        <br>
                                        <span =
style=3D"background:white">Even
                                          if we go flat rather than
                                          doing JSON Structure, the
                                          "Client</span><br>
                                        <span =
style=3D"background:white">Registration
                                          Access Endpoint" is not a good
                                          representative =
name.</span><br>
                                        <br>
                                        <span =
style=3D"background:white">What
                                          it represents is the client
                                          metadata/info.</span><br>
                                        <span =
style=3D"background:white">It
                                          is not representing "Client
                                          Registration =
Access".&nbsp;</span></span><o:p></o:p></p>
                                  </div>
                                </div>
                                <div>
                                  <div>
                                    <div><p class=3D"MsoNormal" =
style=3D"mso-margin-top-alt:auto;mso-margin-bottom-alt:auto">What
                                        does "Client Registration
                                        Access" =
mean?&nbsp;<o:p></o:p></p>
                                    </div>
                                    <div><p class=3D"MsoNormal" =
style=3D"mso-margin-top-alt:auto;margin-bottom:12.0pt"><span =
style=3D"font-size:13.5pt;font-family:&quot;Arial&quot;,&quot;sans-serif&q=
uot;;color:#222222;background:white">Does
                                          UPDATing "Cleint Registration
                                          Access" make sense?</span><br>
                                        <span =
style=3D"font-size:13.5pt;font-family:&quot;Arial&quot;,&quot;sans-serif&q=
uot;;color:#222222"><br>
                                          <span =
style=3D"background:white">Something
                                            in the line of "Client
                                            Metadata Endpoint" =
and</span><br>
                                          <span =
style=3D"background:white">something
                                            like "client_metadata_url"
                                            or&nbsp;"client_info_url" is =
much
                                            better.</span><br>
                                          <br>
                                          <span =
style=3D"background:white">Nat</span></span><o:p></o:p></p>
                                      <div><p class=3D"MsoNormal" =
style=3D"mso-margin-top-alt:auto;mso-margin-bottom-alt:auto">2013/2/15
                                          Richer, Justin P. &lt;<a =
moz-do-not-send=3D"true" href=3D"mailto:jricher@mitre.org" =
target=3D"_blank">jricher@mitre.org</a>&gt;<o:p></o:p></p><p =
class=3D"MsoNormal" =
style=3D"mso-margin-top-alt:auto;mso-margin-bottom-alt:auto">Everyone,
                                          there's a new draft of DynReg
                                          up on the tracker. This draft
                                          tries to codify the
                                          discussions so far from this
                                          week into something we can all
                                          read. There are still plenty
                                          of open discussion points and
                                          items up for debate. Please
                                          read through this latest draft
                                          and see what's changed and
                                          help assure that it properly
                                          captures the conversations. If
                                          you have any inputs for the
                                          marked [[ Editor's Note ]]
                                          sections, please send them to
                                          the list by next Thursday to
                                          give me opportunity to get any
                                          necessary changes in by the
                                          cutoff date of Monday the
                                          22nd.<br>
                                          <br>
                                          Thanks for all of your hard
                                          work everyone, I think this is
                                          *really* coming along now.<br>
                                          <span =
style=3D"color:#888888"><br>
                                            &nbsp;-- =
Justin</span><o:p></o:p></p>
                                        <div>
                                          <div><p class=3D"MsoNormal" =
style=3D"mso-margin-top-alt:auto;mso-margin-bottom-alt:auto"><br>
                                              On Feb 15, 2013, at 4:54
                                              PM, <a =
moz-do-not-send=3D"true" href=3D"mailto:internet-drafts@ietf.org" =
target=3D"_blank">
                                                =
internet-drafts@ietf.org</a>
                                              wrote:<br>
                                              <br>
                                              &gt;<br>
                                              &gt; A New Internet-Draft
                                              is available from the
                                              on-line Internet-Drafts
                                              directories.<br>
                                              &gt; This draft is a work
                                              item of the Web
                                              Authorization Protocol
                                              Working Group of the =
IETF.<br>
                                              &gt;<br>
                                              &gt; &nbsp; &nbsp; &nbsp; =
Title &nbsp; &nbsp; &nbsp; &nbsp; &nbsp;
                                              : OAuth Dynamic Client
                                              Registration Protocol<br>
                                              &gt; &nbsp; &nbsp; &nbsp; =
Author(s) &nbsp; &nbsp; &nbsp;
                                              : Justin Richer<br>
                                              &gt; &nbsp; &nbsp; &nbsp; =
&nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp;
                                              &nbsp; &nbsp;John =
Bradley<br>
                                              &gt; &nbsp; &nbsp; &nbsp; =
&nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp;
                                              &nbsp; &nbsp;Michael B. =
Jones<br>
                                              &gt; &nbsp; &nbsp; &nbsp; =
&nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp;
                                              &nbsp; &nbsp;Maciej =
Machulak<br>
                                              &gt; &nbsp; &nbsp; &nbsp; =
Filename &nbsp; &nbsp; &nbsp;
                                              &nbsp;:
                                              =
draft-ietf-oauth-dyn-reg-06.txt<br>
                                              &gt; &nbsp; &nbsp; &nbsp; =
Pages &nbsp; &nbsp; &nbsp; &nbsp; &nbsp;
                                              : 21<br>
                                              &gt; &nbsp; &nbsp; &nbsp; =
Date &nbsp; &nbsp; &nbsp; &nbsp; &nbsp;
                                              &nbsp;: 2013-02-15<br>
                                              &gt;<br>
                                              &gt; Abstract:<br>
                                              &gt; &nbsp; This =
specification
                                              defines an endpoint and
                                              protocol for dynamic<br>
                                              &gt; &nbsp; registration =
of
                                              OAuth Clients at an
                                              Authorization Server.<br>
                                              &gt;<br>
                                              &gt;<br>
                                              &gt; The IETF datatracker
                                              status page for this draft
                                              is:<br>
                                              &gt; <a =
moz-do-not-send=3D"true" =
href=3D"https://datatracker.ietf.org/doc/draft-ietf-oauth-dyn-reg" =
target=3D"_blank">
https://datatracker.ietf.org/doc/draft-ietf-oauth-dyn-reg</a><br>
                                              &gt;<br>
                                              &gt; There's also a
                                              htmlized version available
                                              at:<br>
                                              &gt; <a =
moz-do-not-send=3D"true" =
href=3D"http://tools.ietf.org/html/draft-ietf-oauth-dyn-reg-06" =
target=3D"_blank">
http://tools.ietf.org/html/draft-ietf-oauth-dyn-reg-06</a><br>
                                              &gt;<br>
                                              &gt; A diff from the
                                              previous version is
                                              available at:<br>
                                              &gt; <a =
moz-do-not-send=3D"true" =
href=3D"http://www.ietf.org/rfcdiff?url2=3Ddraft-ietf-oauth-dyn-reg-06" =
target=3D"_blank">
http://www.ietf.org/rfcdiff?url2=3Ddraft-ietf-oauth-dyn-reg-06</a><br>
                                              &gt;<br>
                                              &gt;<br>
                                              &gt; Internet-Drafts are
                                              also available by
                                              anonymous FTP at:<br>
                                              &gt; <a =
moz-do-not-send=3D"true" href=3D"ftp://ftp.ietf.org/internet-drafts/" =
target=3D"_blank">ftp://ftp.ietf.org/internet-drafts/</a><br>
                                              &gt;<br>
                                              &gt;
                                              =
_______________________________________________<br>
                                              &gt; OAuth mailing =
list<br>
                                              &gt; <a =
moz-do-not-send=3D"true" href=3D"mailto:OAuth@ietf.org" =
target=3D"_blank">OAuth@ietf.org</a><br>
                                              &gt; <a =
moz-do-not-send=3D"true" =
href=3D"https://www.ietf.org/mailman/listinfo/oauth" =
target=3D"_blank">https://www.ietf.org/mailman/listinfo/oauth</a><br>
                                              <br>
_______________________________________________<br>
                                              OAuth mailing list<br>
                                              <a moz-do-not-send=3D"true" =
href=3D"mailto:OAuth@ietf.org" target=3D"_blank">OAuth@ietf.org</a><br>
                                              <a moz-do-not-send=3D"true" =
href=3D"https://www.ietf.org/mailman/listinfo/oauth" =
target=3D"_blank">https://www.ietf.org/mailman/listinfo/oauth</a><o:p></o:=
p></p>
                                          </div>
                                        </div>
                                      </div><p class=3D"MsoNormal" =
style=3D"mso-margin-top-alt:auto;mso-margin-bottom-alt:auto"><br>
                                        <br clear=3D"all">
                                        <o:p></o:p></p>
                                      <div><p class=3D"MsoNormal" =
style=3D"mso-margin-top-alt:auto;mso-margin-bottom-alt:auto">&nbsp;<o:p></=
o:p></p>
                                      </div><p class=3D"MsoNormal" =
style=3D"mso-margin-top-alt:auto;mso-margin-bottom-alt:auto">--
                                        <br>
                                        Nat Sakimura =
(=3Dnat)<o:p></o:p></p>
                                      <div><p class=3D"MsoNormal" =
style=3D"mso-margin-top-alt:auto;mso-margin-bottom-alt:auto">Chairman,
                                          OpenID Foundation<br>
                                          <a moz-do-not-send=3D"true" =
href=3D"http://nat.sakimura.org/" =
target=3D"_blank">http://nat.sakimura.org/</a><br>
                                          @_nat_en<o:p></o:p></p>
                                      </div>
                                    </div>
                                  </div>
                                </div>
                              </div>
                            </div>
                          </div><p class=3D"MsoNormal" =
style=3D"mso-margin-top-alt:auto;mso-margin-bottom-alt:auto"><br>
                            <br clear=3D"all">
                            <o:p></o:p></p>
                          <div><p class=3D"MsoNormal" =
style=3D"mso-margin-top-alt:auto;mso-margin-bottom-alt:auto">&nbsp;<o:p></=
o:p></p>
                          </div><p class=3D"MsoNormal" =
style=3D"mso-margin-top-alt:auto;mso-margin-bottom-alt:auto">--
                            <br>
                            Nat Sakimura (=3Dnat)<o:p></o:p></p>
                          <div><p class=3D"MsoNormal" =
style=3D"mso-margin-top-alt:auto;mso-margin-bottom-alt:auto">Chairman,
                              OpenID Foundation<br>
                              <a moz-do-not-send=3D"true" =
href=3D"http://nat.sakimura.org/" =
target=3D"_blank">http://nat.sakimura.org/</a><br>
                              @_nat_en<o:p></o:p></p>
                          </div>
                        </div>
                      </div>
                    </div>
                  </div>
                </div>
              </div>
            </div><p class=3D"MsoNormal"><br>
              <br clear=3D"all">
              <o:p></o:p></p>
            <div><p class=3D"MsoNormal"><o:p>&nbsp;</o:p></p>
            </div><p class=3D"MsoNormal">-- <br>
              Nat Sakimura (=3Dnat) <o:p></o:p></p>
            <div><p class=3D"MsoNormal">Chairman, OpenID Foundation<br>
                <a moz-do-not-send=3D"true" =
href=3D"http://nat.sakimura.org/" =
target=3D"_blank">http://nat.sakimura.org/</a><br>
                @_nat_en<o:p></o:p></p>
            </div>
          </div>
        </blockquote><p class=3D"MsoNormal"><o:p>&nbsp;</o:p></p>
      </div>
    </blockquote>
    <br>
  </div>

</blockquote></div><br></body></html>=

--Apple-Mail=_53748FC4-84C5-4596-9D1B-0CB10917D991--

--Apple-Mail=_1F9B7C9B-F76A-4E2F-923C-67CD5FDE1A8F
Content-Disposition: attachment;
	filename=smime.p7s
Content-Type: application/pkcs7-signature;
	name=smime.p7s
Content-Transfer-Encoding: base64
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--Apple-Mail=_1F9B7C9B-F76A-4E2F-923C-67CD5FDE1A8F--

From sakimura@gmail.com  Wed Feb 20 12:32:30 2013
Return-Path: <sakimura@gmail.com>
X-Original-To: oauth@ietfa.amsl.com
Delivered-To: oauth@ietfa.amsl.com
Received: from localhost (localhost [127.0.0.1]) by ietfa.amsl.com (Postfix) with ESMTP id 344AD21F869F for <oauth@ietfa.amsl.com>; Wed, 20 Feb 2013 12:32:30 -0800 (PST)
X-Virus-Scanned: amavisd-new at amsl.com
X-Spam-Flag: NO
X-Spam-Score: -3.285
X-Spam-Level: 
X-Spam-Status: No, score=-3.285 tagged_above=-999 required=5 tests=[AWL=0.313,  BAYES_00=-2.599, HTML_MESSAGE=0.001, RCVD_IN_DNSWL_LOW=-1]
Received: from mail.ietf.org ([64.170.98.30]) by localhost (ietfa.amsl.com [127.0.0.1]) (amavisd-new, port 10024) with ESMTP id L+i3S5WnEQ-8 for <oauth@ietfa.amsl.com>; Wed, 20 Feb 2013 12:32:28 -0800 (PST)
Received: from mail-qa0-f46.google.com (mail-qa0-f46.google.com [209.85.216.46]) by ietfa.amsl.com (Postfix) with ESMTP id B4C7121F869A for <oauth@ietf.org>; Wed, 20 Feb 2013 12:32:27 -0800 (PST)
Received: by mail-qa0-f46.google.com with SMTP id o13so2637766qaj.5 for <oauth@ietf.org>; Wed, 20 Feb 2013 12:32:27 -0800 (PST)
DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=gmail.com; s=20120113; h=mime-version:x-received:in-reply-to:references:date:message-id :subject:from:to:cc:content-type; bh=I49D/CT8oqV3HCfQYXXjiAcx4hs245PzoZAUNieGa0o=; b=mA4aAu1Qgair0w4HTQcF/hcA51eDd48vsP2fr+AfLAEzH73w+gtVv/HH66ASvjFdzJ 2+jy4adA091ApaC9SfmMW6v9cSo1BlVw1nmD5W2oI6HBqAhHZhqEazeuo2VWMxCv+K5u 7QsXWY4JpBDJabnMeavBEkYrIlYC/2FplafduzDxQJLpP6nZTBG/peUcg9+JqIUNeVdP gmdi1GkZV0c4wwK5QiFYvRDvs7svjTfodk2B1KFYdKdkuAH7Fgarc7sButGHC35/pncQ 7nyhHT/QePqqw9wk1urd2VkJPYlU5H7FafJQtIYAT7nfhawBOzslEN4fxc0bTlsY8GOZ gIsg==
MIME-Version: 1.0
X-Received: by 10.224.177.204 with SMTP id bj12mr4537965qab.67.1361392347011;  Wed, 20 Feb 2013 12:32:27 -0800 (PST)
Received: by 10.49.106.161 with HTTP; Wed, 20 Feb 2013 12:32:26 -0800 (PST)
In-Reply-To: <133FFE3D-70FD-48C3-B95F-AB26DEC1F7E8@ve7jtb.com>
References: <20130215215423.23019.50224.idtracker@ietfa.amsl.com> <B33BFB58CCC8BE4998958016839DE27E06894B4F@IMCMBX01.MITRE.ORG> <CABzCy2CgnAtPrTY37H6vO-+5u3tRmsm+1j86r3w046AhHnNdfw@mail.gmail.com> <4E1F6AAD24975D4BA5B16804296739436747A665@TK5EX14MBXC284.redmond.corp.microsoft.com> <CABzCy2DHvFVmtv9jB-re5efKEVrfBBk4BZ83n_EQLMHOqsnXcA@mail.gmail.com> <4E1F6AAD24975D4BA5B16804296739436747ADDB@TK5EX14MBXC284.redmond.corp.microsoft.com> <CABzCy2AyCDxc+Gov7zBnTRquzp+QUMF8riqd_8vcP0rHFQUtkQ@mail.gmail.com> <512511B0.5090102@mitre.org> <4E1F6AAD24975D4BA5B16804296739436747B2BB@TK5EX14MBXC284.redmond.corp.microsoft.com> <51251DF0.8000804@mitre.org> <133FFE3D-70FD-48C3-B95F-AB26DEC1F7E8@ve7jtb.com>
Date: Wed, 20 Feb 2013 15:32:26 -0500
Message-ID: <CABzCy2Cbb1AzEpaKj9ERrM1tOueNprC26AZyc89SBz+MX3Y0LQ@mail.gmail.com>
From: Nat Sakimura <sakimura@gmail.com>
To: John Bradley <ve7jtb@ve7jtb.com>
Content-Type: multipart/alternative; boundary=20cf302ef9403e5a1004d62ddbdd
Cc: "<oauth@ietf.org>" <oauth@ietf.org>
Subject: Re: [OAUTH-WG] I-D Action: draft-ietf-oauth-dyn-reg-06.txt
X-BeenThere: oauth@ietf.org
X-Mailman-Version: 2.1.12
Precedence: list
List-Id: OAUTH WG <oauth.ietf.org>
List-Unsubscribe: <https://www.ietf.org/mailman/options/oauth>, <mailto:oauth-request@ietf.org?subject=unsubscribe>
List-Archive: <http://www.ietf.org/mail-archive/web/oauth>
List-Post: <mailto:oauth@ietf.org>
List-Help: <mailto:oauth-request@ietf.org?subject=help>
List-Subscribe: <https://www.ietf.org/mailman/listinfo/oauth>, <mailto:oauth-request@ietf.org?subject=subscribe>
X-List-Received-Date: Wed, 20 Feb 2013 20:32:30 -0000

--20cf302ef9403e5a1004d62ddbdd
Content-Type: text/plain; charset=windows-1252
Content-Transfer-Encoding: quoted-printable

Hmmm.

*registered *is adjective, not verb.

registration client is noun + noun, and sounds funny to me.
When expanded, it becomes "an entry in a
register<http://www.merriam-webster.com/dictionary/register> client",
which does not sound right.

Nat


2013/2/20 John Bradley <ve7jtb@ve7jtb.com>

> I am OK with that.
>
> On 2013-02-20, at 4:03 PM, Justin Richer <jricher@mitre.org> wrote:
>
>  On second thought, how about "registration_client_uri"? It's the URI for
> a particular client's registration. Use of the verb "registered" makes it
> sound like the result of an action that the client took, as if the client
> itself had registered the URI. That's obviously not the case, and we don'=
t
> want to convey that.
>
> So, new proposed name: "registration_client_uri"
>
> This has the nice side effect of being more parallel with
> "reigstration_access_token".
>
>  -- Justin
>
> On 02/20/2013 01:13 PM, Mike Jones wrote:
>
> SGTM****
>
>
>
> *From:* Justin Richer [mailto:jricher@mitre.org <jricher@mitre.org>]
> *Sent:* Wednesday, February 20, 2013 10:11 AM
> *To:* Nat Sakimura
> *Cc:* Mike Jones; <oauth@ietf.org> <oauth@ietf.org>; John Bradley
> *Subject:* Re: [OAUTH-WG] I-D Action: draft-ietf-oauth-dyn-reg-06.txt****
>
> ** **
>
> I like "registered_client_uri", given all of the other discussions on thi=
s
> thread, because:
>
> URL/URI: It *is* a URL, and an https one at that, but if the IETF
> convention is to call it URI, then I'm fine with that.
>
> registered_client/registration_access: The former is a good description o=
f
> what's actually *at* the URL, which fits better with the RESTful entity
> model. I think Nat's criticisms about the original formation of the
> parameter name are spot on, though at the time we hadn't heard anything
> better.
>
>
> So I'd like to change it to "registered_client_uri" in the next draft.
>
>  -- Justin****
>
> On 02/20/2013 12:20 PM, Nat Sakimura wrote:****
>
> I have thought about that as well. The the reason I added "info" or
> "metadata" was that what was behind the URL is not the client itself. By
> "client registration", I suppose you mean "client entry in the register"
> (cf. *registration **n* 2.) . It is the "registered data/info/metadata"
> about the client.  ****
>
> ** **
>
> Nat****
>
> 2013/2/20 Mike Jones <Michael.Jones@microsoft.com>****
>
> I could live with =93registered_client_url=94.  I think that adding
> =93_metadata=94 or =93_info=94 is incorrect, because what=92s being acces=
sed is the
> client=92 registration =96 not just metadata or info about the client=92s
> registration (although that information can be retrieved as one aspect of
> the operations on the client=92s registration).****
>
>  ****
>
>                                                             -- Mike****
>
>  ****
>
> *From:* Nat Sakimura [mailto:sakimura@gmail.com]
> *Sent:* Wednesday, February 20, 2013 8:53 AM
> *To:* Mike Jones
> *Cc:* <oauth@ietf.org>; Richer, Justin P.; John Bradley****
>
>
> *Subject:* Re: [OAUTH-WG] I-D Action: draft-ietf-oauth-dyn-reg-06.txt****
>
>  ****
>
> I have read the whole thing and still --- ****
>
>  ****
>
> Your argument that it is the place for using "registration access token"
> thus should have a parallel name "registration access url" is very weak.
> There are several weakness. ****
>
>  ****
>
> First, "registration access token" actually is "registration" + "access
> token". Extracting "registration access" from "registration access token"
> is broken. ****
>
>  ****
>
> Secondly, access token is used to against any protected
> resource. Recommending to use the word "access" in naming protected
> resources is broken. Should we rename Userinfo endpoint to something like
> "Userinfo Access Endpoint"? I do not think so. ****
>
>  ****
>
> Thirdly, the term "Registration Access" does not seem to be meaningful. *=
*
> **
>
> When you say "access", I suppose you are using the noun version of it. **=
*
> *
>
> (If you are using the verb, then I am even more against as a URL should
> not contain a verb.) ****
>
>  ****
>
> According to the Webster, access (n.) is defined as: ****
>
>  ****
>
> *access **n.*****
>
>  ****
>
> *1*****
>
> *a* *:* onset <http://www.merriam-webster.com/dictionary/onset> 2****
>
> *b* *:* a fit of intense feeling *:* outburst<http://www.merriam-webster.=
com/dictionary/outburst>
> ****
>
> *2*****
>
> *a* *:* permission, liberty, or ability to enter, approach, or pass to
> and from a place or to approach or communicate with a person or thing****
>
> *b* *:* freedom or ability to obtain or make use of something****
>
> *c* *:* a way or means of access****
>
> *d* *:* the act or an instance of accessing<http://www.merriam-webster.co=
m/dictionary/accessing>
> ****
>
> *3*****
>
> *:* an increase by addition <a sudden *access* of wealth>****
>
>  ****
>
> Replacing "access" with any of the definition above does not seem to work=
.
> ****
>
>  ****
>
> Remember, a URL is represents a "thing". ****
>
> The name of the endpoint should represent the "thing". ****
>
>  ****
>
> I am merginally OK with "client registration url" leveraging on the
> definition 2. below (again from Webster -- my OED subscription lapsed for
> the time being.) ****
>
>  ****
>
> *registration **n.*****
>
>  ****
>
> *1*****
>
> *:* the act of registering<http://www.merriam-webster.com/dictionary/regi=
stering>
> ****
>
> *2*****
>
> *:* an entry in a register<http://www.merriam-webster.com/dictionary/regi=
ster>
> ****
>
> *3*****
>
> *:* the number of individuals registered<http://www.merriam-webster.com/d=
ictionary/registered>
>  *:* enrollment <http://www.merriam-webster.com/dictionary/enrollment>***=
*
>
> *4*****
>
> *a* *:* the art or act of selecting and adjusting pipe organ stops****
>
> *b* *:* the combination of stops selected for performing a particular
> organ work****
>
> *5*****
>
> *:* a document certifying an act of registering****
>
>  ****
>
> However, since the most common use of "registration" is actually *1*above=
, it still is confusing. If you really want to emphasize the fact that
> it has been registered, then something like "registered client info uri" =
or
> "registered client metadata uri" would be better. ****
>
>  ****
>
> Nat****
>
>  ****
>
>  ****
>
> 2013/2/20 Mike Jones <Michael.Jones@microsoft.com>****
>
> For what it=92s worth, the name =93registration_access_url=94 was chosen =
to be
> parallel to =93registration_access_token=94.   It=92s the place you use t=
he
> access token.  And it=92s where you access an existing registration.  I=
=92m
> against the name =93client_metadata_url=94 because it=92s not metadata yo=
u=92re
> accessing =96 it=92s a registration you=92re accessing.  For the same rea=
son, I
> don=92t think the name =93client_info_url=94 gives people the right idea,=
 because
> it doesn=92t say anything it being the registration that you=92re accessi=
ng.**
> **
>
>  ****
>
> If you really want us to change this, having read what=92s above, I could
> live with =93client_registration_url=94, but I don=92t think a change is =
actually
> necessary.  (But if we are going to change it, let=92s do it ASAP, before=
 the
> OpenID Connect Implementer=92s Drafts are published.)****
>
>  ****
>
>                                                             -- Mike****
>
>  ****
>
> *From:* oauth-bounces@ietf.org [mailto:oauth-bounces@ietf.org] *On Behalf
> Of *Nat Sakimura
> *Sent:* Wednesday, February 20, 2013 7:58 AM
> *To:* <oauth@ietf.org>; Richer, Justin P.; John Bradley****
>
>
> *Subject:* Re: [OAUTH-WG] I-D Action: draft-ietf-oauth-dyn-reg-06.txt****
>
>  ****
>
> Thanks Justin.****
>
>
>
> Even if we go flat rather than doing JSON Structure, the "Client
> Registration Access Endpoint" is not a good representative name.
>
> What it represents is the client metadata/info.
> It is not representing "Client Registration Access". ****
>
> What does "Client Registration Access" mean? ****
>
> Does UPDATing "Cleint Registration Access" make sense?
>
> Something in the line of "Client Metadata Endpoint" and
> something like "client_metadata_url" or "client_info_url" is much better.
>
> Nat****
>
> 2013/2/15 Richer, Justin P. <jricher@mitre.org>****
>
> Everyone, there's a new draft of DynReg up on the tracker. This draft
> tries to codify the discussions so far from this week into something we c=
an
> all read. There are still plenty of open discussion points and items up f=
or
> debate. Please read through this latest draft and see what's changed and
> help assure that it properly captures the conversations. If you have any
> inputs for the marked [[ Editor's Note ]] sections, please send them to t=
he
> list by next Thursday to give me opportunity to get any necessary changes
> in by the cutoff date of Monday the 22nd.
>
> Thanks for all of your hard work everyone, I think this is *really* comin=
g
> along now.
>
>  -- Justin****
>
>
> On Feb 15, 2013, at 4:54 PM, internet-drafts@ietf.org wrote:
>
> >
> > A New Internet-Draft is available from the on-line Internet-Drafts
> directories.
> > This draft is a work item of the Web Authorization Protocol Working
> Group of the IETF.
> >
> >       Title           : OAuth Dynamic Client Registration Protocol
> >       Author(s)       : Justin Richer
> >                          John Bradley
> >                          Michael B. Jones
> >                          Maciej Machulak
> >       Filename        : draft-ietf-oauth-dyn-reg-06.txt
> >       Pages           : 21
> >       Date            : 2013-02-15
> >
> > Abstract:
> >   This specification defines an endpoint and protocol for dynamic
> >   registration of OAuth Clients at an Authorization Server.
> >
> >
> > The IETF datatracker status page for this draft is:
> > https://datatracker.ietf.org/doc/draft-ietf-oauth-dyn-reg
> >
> > There's also a htmlized version available at:
> > http://tools.ietf.org/html/draft-ietf-oauth-dyn-reg-06
> >
> > A diff from the previous version is available at:
> > http://www.ietf.org/rfcdiff?url2=3Ddraft-ietf-oauth-dyn-reg-06
> >
> >
> > Internet-Drafts are also available by anonymous FTP at:
> > ftp://ftp.ietf.org/internet-drafts/
> >
> > _______________________________________________
> > OAuth mailing list
> > OAuth@ietf.org
> > https://www.ietf.org/mailman/listinfo/oauth
>
> _______________________________________________
> OAuth mailing list
> OAuth@ietf.org
> https://www.ietf.org/mailman/listinfo/oauth****
>
>
>
> ****
>
>  ****
>
> --
> Nat Sakimura (=3Dnat)****
>
> Chairman, OpenID Foundation
> http://nat.sakimura.org/
> @_nat_en****
>
>
>
> ****
>
>  ****
>
> --
> Nat Sakimura (=3Dnat)****
>
> Chairman, OpenID Foundation
> http://nat.sakimura.org/
> @_nat_en****
>
>
>
> ****
>
> ** **
>
> --
> Nat Sakimura (=3Dnat) ****
>
> Chairman, OpenID Foundation
> http://nat.sakimura.org/
> @_nat_en****
>
> ** **
>
>
>
>


--=20
Nat Sakimura (=3Dnat)
Chairman, OpenID Foundation
http://nat.sakimura.org/
@_nat_en

--20cf302ef9403e5a1004d62ddbdd
Content-Type: text/html; charset=windows-1252
Content-Transfer-Encoding: quoted-printable

Hmmm.=A0<div><br></div><div><b>registered </b>is adjective, not verb.=A0</d=
iv><div><br></div><div>registration client is noun + noun, and sounds funny=
 to me.=A0</div><div>When expanded, it becomes &quot;<span style=3D"color:r=
gb(85,85,85);font-family:Verdana,Arial,Helvetica,sans-serif;font-size:12.72=
7272033691406px;line-height:20px;background-color:rgb(255,255,255)">an entr=
y in a=A0</span><a href=3D"http://www.merriam-webster.com/dictionary/regist=
er" class=3D"formulaic" style=3D"color:rgb(85,85,85);font-family:Verdana,Ar=
ial,Helvetica,sans-serif;font-size:14px;font-variant:small-caps;text-decora=
tion:initial;line-height:20px;background-color:rgb(255,255,255)">register</=
a>=A0client&quot;, which does not sound right.=A0</div>
<div><br></div><div>Nat</div><div><br><br><div class=3D"gmail_quote">2013/2=
/20 John Bradley <span dir=3D"ltr">&lt;<a href=3D"mailto:ve7jtb@ve7jtb.com"=
 target=3D"_blank">ve7jtb@ve7jtb.com</a>&gt;</span><br><blockquote class=3D=
"gmail_quote" style=3D"margin:0 0 0 .8ex;border-left:1px #ccc solid;padding=
-left:1ex">
<div style=3D"word-wrap:break-word">I am OK with that.<div><div class=3D"h5=
"><br><div><div>On 2013-02-20, at 4:03 PM, Justin Richer &lt;<a href=3D"mai=
lto:jricher@mitre.org" target=3D"_blank">jricher@mitre.org</a>&gt; wrote:</=
div>
<br><blockquote type=3D"cite">
 =20
   =20
 =20
  <div bgcolor=3D"#FFFFFF" text=3D"#000000">
    On second thought, how about &quot;registration_client_uri&quot;? It&#3=
9;s the URI
    for a particular client&#39;s registration. Use of the verb &quot;regis=
tered&quot;
    makes it sound like the result of an action that the client took, as
    if the client itself had registered the URI. That&#39;s obviously not
    the case, and we don&#39;t want to convey that. <br>
    <br>
    So, new proposed name: &quot;registration_client_uri&quot;<br>
    <br>
    This has the nice side effect of being more parallel with
    &quot;reigstration_access_token&quot;. <br>
    <br>
    =A0-- Justin<br>
    <br>
    <div>On 02/20/2013 01:13 PM, Mike Jones
      wrote:<br>
    </div>
    <blockquote type=3D"cite">
     =20
     =20
     =20
      <div><p class=3D"MsoNormal"><span style=3D"font-size:11.0pt;font-fami=
ly:&quot;Calibri&quot;,&quot;sans-serif&quot;;color:#1f497d">SGTM<u></u><u>=
</u></span></p><p class=3D"MsoNormal"><span style=3D"font-size:11.0pt;font-=
family:&quot;Calibri&quot;,&quot;sans-serif&quot;;color:#1f497d">=A0</span>=
</p>

        <div>
          <div style=3D"border:none;border-top:solid #b5c4df 1.0pt;padding:=
3.0pt 0in 0in 0in"><p class=3D"MsoNormal"><b><span style=3D"font-size:10.0p=
t;font-family:&quot;Tahoma&quot;,&quot;sans-serif&quot;;color:windowtext">F=
rom:</span></b><span style=3D"font-size:10.0pt;font-family:&quot;Tahoma&quo=
t;,&quot;sans-serif&quot;;color:windowtext">
                Justin Richer [<a href=3D"mailto:jricher@mitre.org" target=
=3D"_blank">mailto:jricher@mitre.org</a>]
                <br>
                <b>Sent:</b> Wednesday, February 20, 2013 10:11 AM<br>
                <b>To:</b> Nat Sakimura<br>
                <b>Cc:</b> Mike Jones; <a href=3D"mailto:oauth@ietf.org" ta=
rget=3D"_blank">&lt;oauth@ietf.org&gt;</a>; John
                Bradley<br>
                <b>Subject:</b> Re: [OAUTH-WG] I-D Action:
                draft-ietf-oauth-dyn-reg-06.txt<u></u><u></u></span></p>
          </div>
        </div><p class=3D"MsoNormal"><u></u>=A0<u></u></p><p class=3D"MsoNo=
rmal" style=3D"margin-bottom:12.0pt">I like
          &quot;registered_client_uri&quot;, given all of the other discuss=
ions on
          this thread, because:<br>
          <br>
          URL/URI: It *is* a URL, and an https one at that, but if the
          IETF convention is to call it URI, then I&#39;m fine with that.<b=
r>
          <br>
          registered_client/registration_access: The former is a good
          description of what&#39;s actually *at* the URL, which fits bette=
r
          with the RESTful entity model. I think Nat&#39;s criticisms about
          the original formation of the parameter name are spot on,
          though at the time we hadn&#39;t heard anything better.<br>
          <br>
          <br>
          So I&#39;d like to change it to &quot;registered_client_uri&quot;=
 in the
          next draft.<br>
          <br>
          =A0-- Justin<u></u><u></u></p>
        <div><p class=3D"MsoNormal">On 02/20/2013 12:20 PM, Nat Sakimura
            wrote:<u></u><u></u></p>
        </div>
        <blockquote style=3D"margin-top:5.0pt;margin-bottom:5.0pt"><p class=
=3D"MsoNormal">I have thought about that as well. The
            the reason I added &quot;info&quot; or &quot;metadata&quot; was=
 that what was
            behind the URL is not the client itself. By &quot;client
            registration&quot;, I suppose you mean &quot;client entry in th=
e
            register&quot; (cf.
            <b>registration </b><i>n</i> 2.) . It is the &quot;registered
            data/info/metadata&quot; about the client.=A0
            <u></u><u></u></p>
          <div><p class=3D"MsoNormal"><u></u>=A0<u></u></p>
          </div>
          <div><p class=3D"MsoNormal" style=3D"margin-bottom:12.0pt">Nat<u>=
</u><u></u></p>
            <div><p class=3D"MsoNormal">2013/2/20 Mike Jones &lt;<a href=3D=
"mailto:Michael.Jones@microsoft.com" target=3D"_blank">Michael.Jones@micros=
oft.com</a>&gt;<u></u><u></u></p>
              <div>
                <div><p class=3D"MsoNormal"><span style=3D"font-size:11.0pt=
;font-family:&quot;Calibri&quot;,&quot;sans-serif&quot;;color:#1f497d">I
                      could live with =93registered_client_url=94.=A0 I thi=
nk
                      that adding =93_metadata=94 or =93_info=94 is incorre=
ct,
                      because what=92s being accessed is the client=92
                      registration =96 not just metadata or info about the
                      client=92s registration (although that information
                      can be retrieved as one aspect of the operations
                      on the client=92s registration).</span><u></u><u></u>=
</p><p class=3D"MsoNormal"><span style=3D"font-size:11.0pt;font-family:&quo=
t;Calibri&quot;,&quot;sans-serif&quot;;color:#1f497d">=A0</span><u></u><u><=
/u></p>
<p class=3D"MsoNormal"><span style=3D"font-size:11.0pt;font-family:&quot;Ca=
libri&quot;,&quot;sans-serif&quot;;color:#1f497d">=A0=A0=A0=A0=A0=A0=A0=A0=
=A0=A0=A0=A0=A0=A0=A0=A0=A0=A0=A0=A0=A0=A0=A0=A0=A0=A0=A0=A0=A0=A0=A0=A0=A0=
=A0=A0=A0=A0=A0=A0=A0=A0=A0=A0=A0=A0=A0=A0=A0=A0=A0=A0=A0=A0=A0=A0=A0=A0=A0=
=A0
                      -- Mike</span><u></u><u></u></p><p class=3D"MsoNormal=
"><span style=3D"font-size:11.0pt;font-family:&quot;Calibri&quot;,&quot;san=
s-serif&quot;;color:#1f497d">=A0</span><u></u><u></u></p><p class=3D"MsoNor=
mal">
<b><span style=3D"font-size:10.0pt;font-family:&quot;Tahoma&quot;,&quot;san=
s-serif&quot;">From:</span></b><span style=3D"font-size:10.0pt;font-family:=
&quot;Tahoma&quot;,&quot;sans-serif&quot;">
                      Nat Sakimura [mailto:<a href=3D"mailto:sakimura@gmail=
.com" target=3D"_blank">sakimura@gmail.com</a>]
                      <br>
                      <b>Sent:</b> Wednesday, February 20, 2013 8:53 AM<br>
                      <b>To:</b> Mike Jones<br>
                      <b>Cc:</b> &lt;<a href=3D"mailto:oauth@ietf.org" targ=
et=3D"_blank">oauth@ietf.org</a>&gt;;
                      Richer, Justin P.; John Bradley</span><u></u><u></u><=
/p>
                  <div>
                    <div><p class=3D"MsoNormal"><br>
                        <b>Subject:</b> Re: [OAUTH-WG] I-D Action:
                        draft-ietf-oauth-dyn-reg-06.txt<u></u><u></u></p>
                    </div>
                  </div>
                  <div>
                    <div><p class=3D"MsoNormal">=A0<u></u><u></u></p><p cla=
ss=3D"MsoNormal">I
                        have read the whole thing and still ---=A0<u></u><u=
></u></p>
                      <div><p class=3D"MsoNormal">=A0<u></u><u></u></p>
                      </div>
                      <div><p class=3D"MsoNormal">Your
                          argument that it is the place for using
                          &quot;registration access token&quot; thus should=
 have a
                          parallel name &quot;registration access url&quot;=
 is
                          very weak. There are several weakness.=A0<u></u><=
u></u></p>
                      </div>
                      <div><p class=3D"MsoNormal">=A0<u></u><u></u></p>
                      </div>
                      <div><p class=3D"MsoNormal">First,
                          &quot;registration access token&quot; actually is
                          &quot;registration&quot; + &quot;access token&quo=
t;. Extracting
                          &quot;registration access&quot; from &quot;regist=
ration
                          access token&quot; is broken.=A0<u></u><u></u></p=
>
                      </div>
                      <div><p class=3D"MsoNormal">=A0<u></u><u></u></p>
                      </div>
                      <div><p class=3D"MsoNormal">Secondly,
                          access token is used to against any protected
                          resource.=A0Recommending=A0to use the word
                          &quot;access&quot; in naming protected resources =
is
                          broken. Should we rename Userinfo endpoint to
                          something like &quot;Userinfo Access Endpoint&quo=
t;? I
                          do not think so.=A0<u></u><u></u></p>
                      </div>
                      <div><p class=3D"MsoNormal">=A0<u></u><u></u></p>
                      </div>
                      <div><p class=3D"MsoNormal">Thirdly,
                          the term &quot;Registration Access&quot; does not=
 seem
                          to be meaningful.=A0<u></u><u></u></p>
                      </div>
                      <div><p class=3D"MsoNormal">When
                          you say &quot;access&quot;, I suppose you are usi=
ng the
                          noun version of it.=A0<u></u><u></u></p>
                      </div>
                      <div>
                        <div><p class=3D"MsoNormal">(If
                            you are using the verb, then I am even more
                            against as a URL should not contain a
                            verb.)=A0<u></u><u></u></p>
                        </div>
                        <div><p class=3D"MsoNormal">=A0<u></u><u></u></p>
                        </div>
                        <div><p class=3D"MsoNormal">According
                            to the Webster, access (n.) is defined as:=A0<u=
></u><u></u></p>
                        </div>
                        <div><p class=3D"MsoNormal">=A0<u></u><u></u></p>
                        </div>
                        <div><p class=3D"MsoNormal"><b>access
                            </b><i>n.</i><u></u><u></u></p>
                        </div>
                        <div><p class=3D"MsoNormal">=A0<u></u><u></u></p>
                        </div>
                        <div>
                          <div>
                            <div><p class=3D"MsoNormal" style=3D"line-heigh=
t:15.0pt;background:white"><b><span style=3D"font-size:9.5pt;font-family:&q=
uot;Verdana&quot;,&quot;sans-serif&quot;">1</span></b><u></u><u></u></p>
                            </div>
                            <div style=3D"margin-left:15.0pt;margin-bottom:=
7.5pt"><p class=3D"MsoNormal" style=3D"line-height:15.0pt;background:white"=
><em><b><span style=3D"font-size:9.5pt;font-family:&quot;Verdana&quot;,&quo=
t;sans-serif&quot;;font-style:normal">a</span></b></em><span style=3D"font-=
size:9.5pt;font-family:&quot;Verdana&quot;,&quot;sans-serif&quot;">=A0<stro=
ng><span style=3D"font-family:&quot;Verdana&quot;,&quot;sans-serif&quot;">:=
</span></strong>=A0<a href=3D"http://www.merriam-webster.com/dictionary/ons=
et" target=3D"_blank"><span style=3D"font-variant:small-caps;color:#1122cc"=
>onset</span></a>=A02</span><u></u><u></u></p>
<p class=3D"MsoNormal" style=3D"line-height:15.0pt;background:white"><em><b=
><span style=3D"font-size:9.5pt;font-family:&quot;Verdana&quot;,&quot;sans-=
serif&quot;;font-style:normal">b</span></b></em><span style=3D"font-size:9.=
5pt;font-family:&quot;Verdana&quot;,&quot;sans-serif&quot;">=A0<strong><spa=
n style=3D"font-family:&quot;Verdana&quot;,&quot;sans-serif&quot;">:</span>=
</strong>=A0a
                                  fit of intense feeling=A0<strong><span st=
yle=3D"font-family:&quot;Verdana&quot;,&quot;sans-serif&quot;">:</span></st=
rong>=A0<a href=3D"http://www.merriam-webster.com/dictionary/outburst" targ=
et=3D"_blank"><span style=3D"font-variant:small-caps;color:#1122cc">outburs=
t</span></a></span><u></u><u></u></p>

                            </div>
                          </div>
                          <div>
                            <div><p class=3D"MsoNormal" style=3D"line-heigh=
t:15.0pt;background:white"><b><span style=3D"font-size:9.5pt;font-family:&q=
uot;Verdana&quot;,&quot;sans-serif&quot;">2</span></b><u></u><u></u></p>
                            </div>
                            <div style=3D"margin-left:15.0pt;margin-bottom:=
7.5pt"><p class=3D"MsoNormal" style=3D"line-height:15.0pt;background:white"=
><em><b><span style=3D"font-size:9.5pt;font-family:&quot;Verdana&quot;,&quo=
t;sans-serif&quot;;font-style:normal">a</span></b></em><span style=3D"font-=
size:9.5pt;font-family:&quot;Verdana&quot;,&quot;sans-serif&quot;">=A0<stro=
ng><span style=3D"font-family:&quot;Verdana&quot;,&quot;sans-serif&quot;">:=
</span></strong>=A0permission,

                                  liberty, or ability to enter,
                                  approach, or pass to and from a place
                                  or to approach or communicate with a
                                  person or thing</span><u></u><u></u></p><=
p class=3D"MsoNormal" style=3D"line-height:15.0pt;background:white"><em><b>=
<span style=3D"font-size:9.5pt;font-family:&quot;Verdana&quot;,&quot;sans-s=
erif&quot;;font-style:normal">b</span></b></em><span style=3D"font-size:9.5=
pt;font-family:&quot;Verdana&quot;,&quot;sans-serif&quot;">=A0<strong><span=
 style=3D"font-family:&quot;Verdana&quot;,&quot;sans-serif&quot;">:</span><=
/strong>=A0freedom
                                  or ability to obtain or make use of
                                  something</span><u></u><u></u></p><p clas=
s=3D"MsoNormal" style=3D"line-height:15.0pt;background:white"><em><b><span =
style=3D"font-size:9.5pt;font-family:&quot;Verdana&quot;,&quot;sans-serif&q=
uot;;font-style:normal">c</span></b></em><span style=3D"font-size:9.5pt;fon=
t-family:&quot;Verdana&quot;,&quot;sans-serif&quot;">=A0<strong><span style=
=3D"font-family:&quot;Verdana&quot;,&quot;sans-serif&quot;">:</span></stron=
g>=A0a
                                  way or means of access</span><u></u><u></=
u></p><p class=3D"MsoNormal" style=3D"line-height:15.0pt;background:white">=
<em><b><span style=3D"font-size:9.5pt;font-family:&quot;Verdana&quot;,&quot=
;sans-serif&quot;;font-style:normal">d</span></b></em><span style=3D"font-s=
ize:9.5pt;font-family:&quot;Verdana&quot;,&quot;sans-serif&quot;">=A0<stron=
g><span style=3D"font-family:&quot;Verdana&quot;,&quot;sans-serif&quot;">:<=
/span></strong>=A0the
                                  act or an instance of=A0<a href=3D"http:/=
/www.merriam-webster.com/dictionary/accessing" target=3D"_blank"><span styl=
e=3D"font-size:10.0pt;color:#1122cc">accessing</span></a></span><u></u><u><=
/u></p>

                            </div>
                          </div>
                          <div>
                            <div><p class=3D"MsoNormal" style=3D"line-heigh=
t:15.0pt;background:white"><b><span style=3D"font-size:9.5pt;font-family:&q=
uot;Verdana&quot;,&quot;sans-serif&quot;">3</span></b><u></u><u></u></p>
                            </div>
                            <div style=3D"margin-left:15.0pt;margin-bottom:=
7.5pt"><p class=3D"MsoNormal" style=3D"line-height:15.0pt;background:white"=
><strong><span style=3D"font-size:9.5pt;font-family:&quot;Verdana&quot;,&qu=
ot;sans-serif&quot;">:</span></strong><span style=3D"font-size:9.5pt;font-f=
amily:&quot;Verdana&quot;,&quot;sans-serif&quot;">=A0an
                                  increase by addition=A0&lt;a sudden=A0<em=
><span style=3D"font-family:&quot;Verdana&quot;,&quot;sans-serif&quot;">acc=
ess</span></em>=A0of

                                  wealth&gt;</span><u></u><u></u></p>
                            </div>
                          </div>
                          <div><p class=3D"MsoNormal">=A0<u></u><u></u></p>
                          </div>
                          <div><p class=3D"MsoNormal">Replacing
                              &quot;access&quot; with any of the definition=
 above
                              does not seem to work.=A0<u></u><u></u></p>
                          </div>
                          <div><p class=3D"MsoNormal">=A0<u></u><u></u></p>
                          </div>
                          <div><p class=3D"MsoNormal">Remember,
                              a URL is represents a &quot;thing&quot;.=A0<u=
></u><u></u></p>
                          </div>
                          <div><p class=3D"MsoNormal">The
                              name of the endpoint should represent the
                              &quot;thing&quot;.=A0<u></u><u></u></p>
                          </div>
                          <div><p class=3D"MsoNormal">=A0<u></u><u></u></p>
                          </div>
                          <div><p class=3D"MsoNormal">I
                              am merginally OK with &quot;client registrati=
on
                              url&quot; leveraging on the definition 2. bel=
ow
                              (again from Webster -- my OED subscription
                              lapsed for the time being.)=A0<u></u><u></u><=
/p>
                          </div>
                          <div><p class=3D"MsoNormal">=A0<u></u><u></u></p>
                          </div>
                          <div><p class=3D"MsoNormal"><b>registration
                              </b><i>n.</i><u></u><u></u></p>
                          </div>
                          <div><p class=3D"MsoNormal">=A0<u></u><u></u></p>
                          </div>
                          <div>
                            <div>
                              <div><p class=3D"MsoNormal" style=3D"line-hei=
ght:15.0pt;background:white"><b><span style=3D"font-size:9.5pt;font-family:=
&quot;Verdana&quot;,&quot;sans-serif&quot;">1</span></b><u></u><u></u></p>
                              </div>
                              <div style=3D"margin-left:15.0pt;margin-botto=
m:7.5pt"><p class=3D"MsoNormal" style=3D"line-height:15.0pt;background:whit=
e"><strong><span style=3D"font-size:9.5pt;font-family:&quot;Verdana&quot;,&=
quot;sans-serif&quot;">:</span></strong><span style=3D"font-size:9.5pt;font=
-family:&quot;Verdana&quot;,&quot;sans-serif&quot;">=A0the
                                    act of=A0<a href=3D"http://www.merriam-=
webster.com/dictionary/registering" target=3D"_blank"><span style=3D"font-s=
ize:10.0pt;color:#1122cc">registering</span></a></span><u></u><u></u></p>
                              </div>
                            </div>
                            <div>
                              <div><p class=3D"MsoNormal" style=3D"line-hei=
ght:15.0pt;background:white"><b><span style=3D"font-size:9.5pt;font-family:=
&quot;Verdana&quot;,&quot;sans-serif&quot;">2</span></b><u></u><u></u></p>
                              </div>
                              <div style=3D"margin-left:15.0pt;margin-botto=
m:7.5pt"><p class=3D"MsoNormal" style=3D"line-height:15.0pt;background:whit=
e"><strong><span style=3D"font-size:9.5pt;font-family:&quot;Verdana&quot;,&=
quot;sans-serif&quot;">:</span></strong><span style=3D"font-size:9.5pt;font=
-family:&quot;Verdana&quot;,&quot;sans-serif&quot;">=A0an
                                    entry in a=A0<a href=3D"http://www.merr=
iam-webster.com/dictionary/register" target=3D"_blank"><span style=3D"font-=
size:10.0pt;color:#1122cc">register</span></a></span><u></u><u></u></p>
                              </div>
                            </div>
                            <div>
                              <div><p class=3D"MsoNormal" style=3D"line-hei=
ght:15.0pt;background:white"><b><span style=3D"font-size:9.5pt;font-family:=
&quot;Verdana&quot;,&quot;sans-serif&quot;">3</span></b><u></u><u></u></p>
                              </div>
                              <div style=3D"margin-left:15.0pt;margin-botto=
m:7.5pt"><p class=3D"MsoNormal" style=3D"line-height:15.0pt;background:whit=
e"><strong><span style=3D"font-size:9.5pt;font-family:&quot;Verdana&quot;,&=
quot;sans-serif&quot;">:</span></strong><span style=3D"font-size:9.5pt;font=
-family:&quot;Verdana&quot;,&quot;sans-serif&quot;">=A0the
                                    number of individuals=A0<a href=3D"http=
://www.merriam-webster.com/dictionary/registered" target=3D"_blank"><span s=
tyle=3D"font-size:10.0pt;color:#1122cc">registered</span></a>=A0<strong><sp=
an style=3D"font-family:&quot;Verdana&quot;,&quot;sans-serif&quot;">:</span=
></strong>=A0<a href=3D"http://www.merriam-webster.com/dictionary/enrollmen=
t" target=3D"_blank"><span style=3D"font-variant:small-caps;color:#1122cc">=
enrollment</span></a></span><u></u><u></u></p>

                              </div>
                            </div>
                            <div>
                              <div><p class=3D"MsoNormal" style=3D"line-hei=
ght:15.0pt;background:white"><b><span style=3D"font-size:9.5pt;font-family:=
&quot;Verdana&quot;,&quot;sans-serif&quot;">4</span></b><u></u><u></u></p>
                              </div>
                              <div style=3D"margin-left:15.0pt;margin-botto=
m:7.5pt"><p class=3D"MsoNormal" style=3D"line-height:15.0pt;background:whit=
e"><em><b><span style=3D"font-size:9.5pt;font-family:&quot;Verdana&quot;,&q=
uot;sans-serif&quot;;font-style:normal">a</span></b></em><span style=3D"fon=
t-size:9.5pt;font-family:&quot;Verdana&quot;,&quot;sans-serif&quot;">=A0<st=
rong><span style=3D"font-family:&quot;Verdana&quot;,&quot;sans-serif&quot;"=
>:</span></strong>=A0the
                                    art or act of selecting and
                                    adjusting pipe organ stops</span><u></u=
><u></u></p><p class=3D"MsoNormal" style=3D"line-height:15.0pt;background:w=
hite"><em><b><span style=3D"font-size:9.5pt;font-family:&quot;Verdana&quot;=
,&quot;sans-serif&quot;;font-style:normal">b</span></b></em><span style=3D"=
font-size:9.5pt;font-family:&quot;Verdana&quot;,&quot;sans-serif&quot;">=A0=
<strong><span style=3D"font-family:&quot;Verdana&quot;,&quot;sans-serif&quo=
t;">:</span></strong>=A0the
                                    combination of stops selected for
                                    performing a particular organ work</spa=
n><u></u><u></u></p>
                              </div>
                            </div>
                            <div>
                              <div><p class=3D"MsoNormal" style=3D"line-hei=
ght:15.0pt;background:white"><b><span style=3D"font-size:9.5pt;font-family:=
&quot;Verdana&quot;,&quot;sans-serif&quot;">5</span></b><u></u><u></u></p>
                              </div>
                              <div style=3D"margin-left:15.0pt;margin-botto=
m:7.5pt"><p class=3D"MsoNormal" style=3D"line-height:15.0pt;background:whit=
e"><strong><span style=3D"font-size:9.5pt;font-family:&quot;Verdana&quot;,&=
quot;sans-serif&quot;">:</span></strong><span style=3D"font-size:9.5pt;font=
-family:&quot;Verdana&quot;,&quot;sans-serif&quot;">=A0a
                                    document certifying an act of
                                    registering</span><u></u><u></u></p>
                              </div>
                            </div>
                          </div>
                          <div><p class=3D"MsoNormal">=A0<u></u><u></u></p>
                          </div>
                          <div><p class=3D"MsoNormal">However,
                              since the most common use of
                              &quot;registration&quot; is actually
                              <b>1</b> above, it still is confusing. If
                              you really want to emphasize the fact that
                              it has been registered, then something
                              like &quot;registered client info uri&quot; o=
r
                              &quot;registered client metadata uri&quot; wo=
uld be
                              better.=A0<u></u><u></u></p>
                          </div>
                          <div><p class=3D"MsoNormal">=A0<u></u><u></u></p>
                          </div>
                          <div><p class=3D"MsoNormal">Nat<u></u><u></u></p>
                          </div>
                          <div><p class=3D"MsoNormal">=A0<u></u><u></u></p>
                          </div><p class=3D"MsoNormal">=A0<u></u><u></u></p=
>
                          <div><p class=3D"MsoNormal">2013/2/20
                              Mike Jones &lt;<a href=3D"mailto:Michael.Jone=
s@microsoft.com" target=3D"_blank">Michael.Jones@microsoft.com</a>&gt;<u></=
u><u></u></p>
                            <div>
                              <div><p class=3D"MsoNormal"><span style=3D"fo=
nt-size:11.0pt;font-family:&quot;Calibri&quot;,&quot;sans-serif&quot;;color=
:#1f497d">For
                                    what it=92s worth, the name
                                    =93registration_access_url=94 was chose=
n
                                    to be parallel to
                                    =93registration_access_token=94.=A0=A0 =
It=92s
                                    the place you use the access token.=A0
                                    And it=92s where you access an
                                    existing registration.=A0 I=92m against
                                    the name =93client_metadata_url=94
                                    because it=92s not metadata you=92re
                                    accessing =96 it=92s a registration
                                    you=92re accessing.=A0 For the same
                                    reason, I don=92t think the name
                                    =93client_info_url=94 gives people the
                                    right idea, because it doesn=92t say
                                    anything it being the registration
                                    that you=92re accessing.</span><u></u><=
u></u></p><p class=3D"MsoNormal"><span style=3D"font-size:11.0pt;font-famil=
y:&quot;Calibri&quot;,&quot;sans-serif&quot;;color:#1f497d">=A0</span><u></=
u><u></u></p>
<p class=3D"MsoNormal"><span style=3D"font-size:11.0pt;font-family:&quot;Ca=
libri&quot;,&quot;sans-serif&quot;;color:#1f497d">If
                                    you really want us to change this,
                                    having read what=92s above, I could
                                    live with =93client_registration_url=94=
,
                                    but I don=92t think a change is
                                    actually necessary.=A0 (But if we are
                                    going to change it, let=92s do it
                                    ASAP, before the OpenID Connect
                                    Implementer=92s Drafts are published.)<=
/span><u></u><u></u></p><p class=3D"MsoNormal"><span style=3D"font-size:11.=
0pt;font-family:&quot;Calibri&quot;,&quot;sans-serif&quot;;color:#1f497d">=
=A0</span><u></u><u></u></p>
<p class=3D"MsoNormal"><span style=3D"font-size:11.0pt;font-family:&quot;Ca=
libri&quot;,&quot;sans-serif&quot;;color:#1f497d">=A0=A0=A0=A0=A0=A0=A0=A0=
=A0=A0=A0=A0=A0=A0=A0=A0=A0=A0=A0=A0=A0=A0=A0=A0=A0=A0=A0=A0=A0=A0=A0=A0=A0=
=A0=A0=A0=A0=A0=A0=A0=A0=A0=A0=A0=A0=A0=A0=A0=A0=A0=A0=A0=A0=A0=A0=A0=A0=A0=
=A0
                                    -- Mike</span><u></u><u></u></p><p clas=
s=3D"MsoNormal"><span style=3D"font-size:11.0pt;font-family:&quot;Calibri&q=
uot;,&quot;sans-serif&quot;;color:#1f497d">=A0</span><u></u><u></u></p><p c=
lass=3D"MsoNormal">
<b><span style=3D"font-size:10.0pt;font-family:&quot;Tahoma&quot;,&quot;san=
s-serif&quot;">From:</span></b><span style=3D"font-size:10.0pt;font-family:=
&quot;Tahoma&quot;,&quot;sans-serif&quot;">
                                    <a href=3D"mailto:oauth-bounces@ietf.or=
g" target=3D"_blank">oauth-bounces@ietf.org</a>
                                    [mailto:<a href=3D"mailto:oauth-bounces=
@ietf.org" target=3D"_blank">oauth-bounces@ietf.org</a>]
                                    <b>On Behalf Of </b>Nat Sakimura<br>
                                    <b>Sent:</b> Wednesday, February 20,
                                    2013 7:58 AM<br>
                                    <b>To:</b> &lt;<a href=3D"mailto:oauth@=
ietf.org" target=3D"_blank">oauth@ietf.org</a>&gt;;
                                    Richer, Justin P.; John Bradley</span><=
u></u><u></u></p>
                                <div><p class=3D"MsoNormal"><br>
                                    <b>Subject:</b> Re: [OAUTH-WG] I-D
                                    Action:
                                    draft-ietf-oauth-dyn-reg-06.txt<u></u><=
u></u></p>
                                </div><p class=3D"MsoNormal">=A0<u></u><u><=
/u></p><p class=3D"MsoNormal"><span style=3D"font-size:13.5pt;font-family:&=
quot;Arial&quot;,&quot;sans-serif&quot;;color:#222222;background:white">Tha=
nks
                                    Justin.</span><u></u><u></u></p>
                                <div>
                                  <div><p class=3D"MsoNormal"><span style=
=3D"font-size:13.5pt;font-family:&quot;Arial&quot;,&quot;sans-serif&quot;;c=
olor:#222222"><br>
                                        <br>
                                        <span style=3D"background:white">Ev=
en
                                          if we go flat rather than
                                          doing JSON Structure, the
                                          &quot;Client</span><br>
                                        <span style=3D"background:white">Re=
gistration
                                          Access Endpoint&quot; is not a go=
od
                                          representative name.</span><br>
                                        <br>
                                        <span style=3D"background:white">Wh=
at
                                          it represents is the client
                                          metadata/info.</span><br>
                                        <span style=3D"background:white">It
                                          is not representing &quot;Client
                                          Registration Access&quot;.=A0</sp=
an></span><u></u><u></u></p>
                                  </div>
                                </div>
                                <div>
                                  <div>
                                    <div><p class=3D"MsoNormal">What
                                        does &quot;Client Registration
                                        Access&quot; mean?=A0<u></u><u></u>=
</p>
                                    </div>
                                    <div><p class=3D"MsoNormal" style=3D"ma=
rgin-bottom:12.0pt"><span style=3D"font-size:13.5pt;font-family:&quot;Arial=
&quot;,&quot;sans-serif&quot;;color:#222222;background:white">Does
                                          UPDATing &quot;Cleint Registratio=
n
                                          Access&quot; make sense?</span><b=
r>
                                        <span style=3D"font-size:13.5pt;fon=
t-family:&quot;Arial&quot;,&quot;sans-serif&quot;;color:#222222"><br>
                                          <span style=3D"background:white">=
Something
                                            in the line of &quot;Client
                                            Metadata Endpoint&quot; and</sp=
an><br>
                                          <span style=3D"background:white">=
something
                                            like &quot;client_metadata_url&=
quot;
                                            or=A0&quot;client_info_url&quot=
; is much
                                            better.</span><br>
                                          <br>
                                          <span style=3D"background:white">=
Nat</span></span><u></u><u></u></p>
                                      <div><p class=3D"MsoNormal">2013/2/15
                                          Richer, Justin P. &lt;<a href=3D"=
mailto:jricher@mitre.org" target=3D"_blank">jricher@mitre.org</a>&gt;<u></u=
><u></u></p><p class=3D"MsoNormal">Everyone,
                                          there&#39;s a new draft of DynReg
                                          up on the tracker. This draft
                                          tries to codify the
                                          discussions so far from this
                                          week into something we can all
                                          read. There are still plenty
                                          of open discussion points and
                                          items up for debate. Please
                                          read through this latest draft
                                          and see what&#39;s changed and
                                          help assure that it properly
                                          captures the conversations. If
                                          you have any inputs for the
                                          marked [[ Editor&#39;s Note ]]
                                          sections, please send them to
                                          the list by next Thursday to
                                          give me opportunity to get any
                                          necessary changes in by the
                                          cutoff date of Monday the
                                          22nd.<br>
                                          <br>
                                          Thanks for all of your hard
                                          work everyone, I think this is
                                          *really* coming along now.<br>
                                          <span style=3D"color:#888888"><br=
>
                                            =A0-- Justin</span><u></u><u></=
u></p>
                                        <div>
                                          <div><p class=3D"MsoNormal"><br>
                                              On Feb 15, 2013, at 4:54
                                              PM, <a href=3D"mailto:interne=
t-drafts@ietf.org" target=3D"_blank">
                                                internet-drafts@ietf.org</a=
>
                                              wrote:<br>
                                              <br>
                                              &gt;<br>
                                              &gt; A New Internet-Draft
                                              is available from the
                                              on-line Internet-Drafts
                                              directories.<br>
                                              &gt; This draft is a work
                                              item of the Web
                                              Authorization Protocol
                                              Working Group of the IETF.<br=
>
                                              &gt;<br>
                                              &gt; =A0 =A0 =A0 Title =A0 =
=A0 =A0 =A0 =A0
                                              : OAuth Dynamic Client
                                              Registration Protocol<br>
                                              &gt; =A0 =A0 =A0 Author(s) =
=A0 =A0 =A0
                                              : Justin Richer<br>
                                              &gt; =A0 =A0 =A0 =A0 =A0 =A0 =
=A0 =A0 =A0 =A0 =A0
                                              =A0 =A0John Bradley<br>
                                              &gt; =A0 =A0 =A0 =A0 =A0 =A0 =
=A0 =A0 =A0 =A0 =A0
                                              =A0 =A0Michael B. Jones<br>
                                              &gt; =A0 =A0 =A0 =A0 =A0 =A0 =
=A0 =A0 =A0 =A0 =A0
                                              =A0 =A0Maciej Machulak<br>
                                              &gt; =A0 =A0 =A0 Filename =A0=
 =A0 =A0
                                              =A0:
                                              draft-ietf-oauth-dyn-reg-06.t=
xt<br>
                                              &gt; =A0 =A0 =A0 Pages =A0 =
=A0 =A0 =A0 =A0
                                              : 21<br>
                                              &gt; =A0 =A0 =A0 Date =A0 =A0=
 =A0 =A0 =A0
                                              =A0: 2013-02-15<br>
                                              &gt;<br>
                                              &gt; Abstract:<br>
                                              &gt; =A0 This specification
                                              defines an endpoint and
                                              protocol for dynamic<br>
                                              &gt; =A0 registration of
                                              OAuth Clients at an
                                              Authorization Server.<br>
                                              &gt;<br>
                                              &gt;<br>
                                              &gt; The IETF datatracker
                                              status page for this draft
                                              is:<br>
                                              &gt; <a href=3D"https://datat=
racker.ietf.org/doc/draft-ietf-oauth-dyn-reg" target=3D"_blank">
https://datatracker.ietf.org/doc/draft-ietf-oauth-dyn-reg</a><br>
                                              &gt;<br>
                                              &gt; There&#39;s also a
                                              htmlized version available
                                              at:<br>
                                              &gt; <a href=3D"http://tools.=
ietf.org/html/draft-ietf-oauth-dyn-reg-06" target=3D"_blank">
http://tools.ietf.org/html/draft-ietf-oauth-dyn-reg-06</a><br>
                                              &gt;<br>
                                              &gt; A diff from the
                                              previous version is
                                              available at:<br>
                                              &gt; <a href=3D"http://www.ie=
tf.org/rfcdiff?url2=3Ddraft-ietf-oauth-dyn-reg-06" target=3D"_blank">
http://www.ietf.org/rfcdiff?url2=3Ddraft-ietf-oauth-dyn-reg-06</a><br>
                                              &gt;<br>
                                              &gt;<br>
                                              &gt; Internet-Drafts are
                                              also available by
                                              anonymous FTP at:<br>
                                              &gt; <a href=3D"ftp://ftp.iet=
f.org/internet-drafts/" target=3D"_blank">ftp://ftp.ietf.org/internet-draft=
s/</a><br>
                                              &gt;<br>
                                              &gt;
                                              _____________________________=
__________________<br>
                                              &gt; OAuth mailing list<br>
                                              &gt; <a href=3D"mailto:OAuth@=
ietf.org" target=3D"_blank">OAuth@ietf.org</a><br>
                                              &gt; <a href=3D"https://www.i=
etf.org/mailman/listinfo/oauth" target=3D"_blank">https://www.ietf.org/mail=
man/listinfo/oauth</a><br>
                                              <br>
_______________________________________________<br>
                                              OAuth mailing list<br>
                                              <a href=3D"mailto:OAuth@ietf.=
org" target=3D"_blank">OAuth@ietf.org</a><br>
                                              <a href=3D"https://www.ietf.o=
rg/mailman/listinfo/oauth" target=3D"_blank">https://www.ietf.org/mailman/l=
istinfo/oauth</a><u></u><u></u></p>
                                          </div>
                                        </div>
                                      </div><p class=3D"MsoNormal"><br>
                                        <br clear=3D"all">
                                        <u></u><u></u></p>
                                      <div><p class=3D"MsoNormal">=A0<u></u=
><u></u></p>
                                      </div><p class=3D"MsoNormal">--
                                        <br>
                                        Nat Sakimura (=3Dnat)<u></u><u></u>=
</p>
                                      <div><p class=3D"MsoNormal">Chairman,
                                          OpenID Foundation<br>
                                          <a href=3D"http://nat.sakimura.or=
g/" target=3D"_blank">http://nat.sakimura.org/</a><br>
                                          @_nat_en<u></u><u></u></p>
                                      </div>
                                    </div>
                                  </div>
                                </div>
                              </div>
                            </div>
                          </div><p class=3D"MsoNormal"><br>
                            <br clear=3D"all">
                            <u></u><u></u></p>
                          <div><p class=3D"MsoNormal">=A0<u></u><u></u></p>
                          </div><p class=3D"MsoNormal">--
                            <br>
                            Nat Sakimura (=3Dnat)<u></u><u></u></p>
                          <div><p class=3D"MsoNormal">Chairman,
                              OpenID Foundation<br>
                              <a href=3D"http://nat.sakimura.org/" target=
=3D"_blank">http://nat.sakimura.org/</a><br>
                              @_nat_en<u></u><u></u></p>
                          </div>
                        </div>
                      </div>
                    </div>
                  </div>
                </div>
              </div>
            </div><p class=3D"MsoNormal"><br>
              <br clear=3D"all">
              <u></u><u></u></p>
            <div><p class=3D"MsoNormal"><u></u>=A0<u></u></p>
            </div><p class=3D"MsoNormal">-- <br>
              Nat Sakimura (=3Dnat) <u></u><u></u></p>
            <div><p class=3D"MsoNormal">Chairman, OpenID Foundation<br>
                <a href=3D"http://nat.sakimura.org/" target=3D"_blank">http=
://nat.sakimura.org/</a><br>
                @_nat_en<u></u><u></u></p>
            </div>
          </div>
        </blockquote><p class=3D"MsoNormal"><u></u>=A0<u></u></p>
      </div>
    </blockquote>
    <br>
  </div>

</blockquote></div><br></div></div></div></blockquote></div><br><br clear=
=3D"all"><div><br></div>-- <br>Nat Sakimura (=3Dnat)<div>Chairman, OpenID F=
oundation<br><a href=3D"http://nat.sakimura.org/" target=3D"_blank">http://=
nat.sakimura.org/</a><br>
@_nat_en</div>
</div>

--20cf302ef9403e5a1004d62ddbdd--

From Michael.Jones@microsoft.com  Wed Feb 20 12:37:53 2013
Return-Path: <Michael.Jones@microsoft.com>
X-Original-To: oauth@ietfa.amsl.com
Delivered-To: oauth@ietfa.amsl.com
Received: from localhost (localhost [127.0.0.1]) by ietfa.amsl.com (Postfix) with ESMTP id DFF6021E8039 for <oauth@ietfa.amsl.com>; Wed, 20 Feb 2013 12:37:53 -0800 (PST)
X-Virus-Scanned: amavisd-new at amsl.com
X-Spam-Flag: NO
X-Spam-Score: -2.585
X-Spam-Level: 
X-Spam-Status: No, score=-2.585 tagged_above=-999 required=5 tests=[AWL=0.013,  BAYES_00=-2.599, HTML_MESSAGE=0.001]
Received: from mail.ietf.org ([64.170.98.30]) by localhost (ietfa.amsl.com [127.0.0.1]) (amavisd-new, port 10024) with ESMTP id Hr1qMLYlKdFx for <oauth@ietfa.amsl.com>; Wed, 20 Feb 2013 12:37:48 -0800 (PST)
Received: from na01-bl2-obe.outbound.protection.outlook.com (na01-bl2-obe.ptr.protection.outlook.com [65.55.169.30]) by ietfa.amsl.com (Postfix) with ESMTP id 7CCC821F86A5 for <oauth@ietf.org>; Wed, 20 Feb 2013 12:37:47 -0800 (PST)
Received: from BY2FFO11FD012.protection.gbl (10.1.15.200) by BY2FFO11HUB029.protection.gbl (10.1.14.114) with Microsoft SMTP Server (TLS) id 15.0.620.12; Wed, 20 Feb 2013 20:37:37 +0000
Received: from TK5EX14HUBC103.redmond.corp.microsoft.com (131.107.125.37) by BY2FFO11FD012.mail.protection.outlook.com (10.1.14.130) with Microsoft SMTP Server (TLS) id 15.0.620.12 via Frontend Transport; Wed, 20 Feb 2013 20:37:37 +0000
Received: from TK5EX14MBXC284.redmond.corp.microsoft.com ([169.254.1.96]) by TK5EX14HUBC103.redmond.corp.microsoft.com ([157.54.86.9]) with mapi id 14.02.0318.003; Wed, 20 Feb 2013 20:37:10 +0000
From: Mike Jones <Michael.Jones@microsoft.com>
To: Nat Sakimura <sakimura@gmail.com>, John Bradley <ve7jtb@ve7jtb.com>
Thread-Topic: [OAUTH-WG] I-D Action: draft-ietf-oauth-dyn-reg-06.txt
Thread-Index: AQHOC8cMkbohP5vU0EO7eTLi/U/hMJh7eCuAgAd2gACAAAA6MIAADyiAgAAAlPCAAAbqAIAADigAgAAAsbCAAA3pAIAAD/cAgAAI+ACAAAB+cA==
Date: Wed, 20 Feb 2013 20:37:09 +0000
Message-ID: <4E1F6AAD24975D4BA5B16804296739436747BA8E@TK5EX14MBXC284.redmond.corp.microsoft.com>
References: <20130215215423.23019.50224.idtracker@ietfa.amsl.com> <B33BFB58CCC8BE4998958016839DE27E06894B4F@IMCMBX01.MITRE.ORG> <CABzCy2CgnAtPrTY37H6vO-+5u3tRmsm+1j86r3w046AhHnNdfw@mail.gmail.com> <4E1F6AAD24975D4BA5B16804296739436747A665@TK5EX14MBXC284.redmond.corp.microsoft.com> <CABzCy2DHvFVmtv9jB-re5efKEVrfBBk4BZ83n_EQLMHOqsnXcA@mail.gmail.com> <4E1F6AAD24975D4BA5B16804296739436747ADDB@TK5EX14MBXC284.redmond.corp.microsoft.com> <CABzCy2AyCDxc+Gov7zBnTRquzp+QUMF8riqd_8vcP0rHFQUtkQ@mail.gmail.com> <512511B0.5090102@mitre.org> <4E1F6AAD24975D4BA5B16804296739436747B2BB@TK5EX14MBXC284.redmond.corp.microsoft.com> <51251DF0.8000804@mitre.org> <133FFE3D-70FD-48C3-B95F-AB26DEC1F7E8@ve7jtb.com> <CABzCy2Cbb1AzEpaKj9ERrM1tOueNprC26AZyc89SBz+MX3Y0LQ@mail.gmail.com>
In-Reply-To: <CABzCy2Cbb1AzEpaKj9ERrM1tOueNprC26AZyc89SBz+MX3Y0LQ@mail.gmail.com>
Accept-Language: en-US
Content-Language: en-US
X-MS-Has-Attach: 
X-MS-TNEF-Correlator: 
x-originating-ip: [157.54.51.75]
Content-Type: multipart/alternative; boundary="_000_4E1F6AAD24975D4BA5B16804296739436747BA8ETK5EX14MBXC284r_"
MIME-Version: 1.0
X-Forefront-Antispam-Report: CIP:131.107.125.37; CTRY:US; IPV:CAL; IPV:NLI; EFV:NLI; SFV:NSPM; SFS:(377424002)(479174001)(377454001)(51704002)(51444002)(69224001)(199002)(189002)(60454001)(24454001)(65554002)(66066001)(15202345001)(5343635001)(512954001)(76482001)(53806001)(65816001)(80022001)(16406001)(51856001)(46102001)(55846006)(16297215001)(47976001)(50986001)(4396001)(16236675001)(49866001)(47736001)(56816002)(54316002)(74502001)(5343655001)(47446002)(77982001)(54356001)(63696002)(74662001)(79102001)(44976002)(59766001)(56776001)(31966008)(20776003)(33656001); DIR:OUT; SFP:; SCL:1; SRVR:BY2FFO11HUB029; H:TK5EX14HUBC103.redmond.corp.microsoft.com; RD:InfoDomainNonexistent; A:1; MX:1; LANG:en; 
X-OriginatorOrg: microsoft.onmicrosoft.com
X-Forefront-PRVS: 07630F72AD
Cc: "<oauth@ietf.org>" <oauth@ietf.org>
Subject: Re: [OAUTH-WG] I-D Action: draft-ietf-oauth-dyn-reg-06.txt
X-BeenThere: oauth@ietf.org
X-Mailman-Version: 2.1.12
Precedence: list
List-Id: OAUTH WG <oauth.ietf.org>
List-Unsubscribe: <https://www.ietf.org/mailman/options/oauth>, <mailto:oauth-request@ietf.org?subject=unsubscribe>
List-Archive: <http://www.ietf.org/mail-archive/web/oauth>
List-Post: <mailto:oauth@ietf.org>
List-Help: <mailto:oauth-request@ietf.org?subject=help>
List-Subscribe: <https://www.ietf.org/mailman/listinfo/oauth>, <mailto:oauth-request@ietf.org?subject=subscribe>
X-List-Received-Date: Wed, 20 Feb 2013 20:37:54 -0000

--_000_4E1F6AAD24975D4BA5B16804296739436747BA8ETK5EX14MBXC284r_
Content-Type: text/plain; charset="us-ascii"
Content-Transfer-Encoding: quoted-printable

I believe the semantic intent of "registration_client_uri" is "client uri t=
o be used for registration operations", just like the semantic intent of "r=
egistration_access_token" is "access token to be used for registration oper=
ations".  Both perfectly meaningful constructions.


From: Nat Sakimura [mailto:sakimura@gmail.com]
Sent: Wednesday, February 20, 2013 12:32 PM
To: John Bradley
Cc: Justin Richer; Mike Jones; <oauth@ietf.org>
Subject: Re: [OAUTH-WG] I-D Action: draft-ietf-oauth-dyn-reg-06.txt

Hmmm.

registered is adjective, not verb.

registration client is noun + noun, and sounds funny to me.
When expanded, it becomes "an entry in a register<http://www.merriam-webste=
r.com/dictionary/register> client", which does not sound right.

Nat

2013/2/20 John Bradley <ve7jtb@ve7jtb.com<mailto:ve7jtb@ve7jtb.com>>
I am OK with that.

On 2013-02-20, at 4:03 PM, Justin Richer <jricher@mitre.org<mailto:jricher@=
mitre.org>> wrote:


On second thought, how about "registration_client_uri"? It's the URI for a =
particular client's registration. Use of the verb "registered" makes it sou=
nd like the result of an action that the client took, as if the client itse=
lf had registered the URI. That's obviously not the case, and we don't want=
 to convey that.

So, new proposed name: "registration_client_uri"

This has the nice side effect of being more parallel with "reigstration_acc=
ess_token".

 -- Justin
On 02/20/2013 01:13 PM, Mike Jones wrote:
SGTM

From: Justin Richer [mailto:jricher@mitre.org]
Sent: Wednesday, February 20, 2013 10:11 AM
To: Nat Sakimura
Cc: Mike Jones; <oauth@ietf.org><mailto:oauth@ietf.org>; John Bradley
Subject: Re: [OAUTH-WG] I-D Action: draft-ietf-oauth-dyn-reg-06.txt

I like "registered_client_uri", given all of the other discussions on this =
thread, because:

URL/URI: It *is* a URL, and an https one at that, but if the IETF conventio=
n is to call it URI, then I'm fine with that.

registered_client/registration_access: The former is a good description of =
what's actually *at* the URL, which fits better with the RESTful entity mod=
el. I think Nat's criticisms about the original formation of the parameter =
name are spot on, though at the time we hadn't heard anything better.


So I'd like to change it to "registered_client_uri" in the next draft.

 -- Justin
On 02/20/2013 12:20 PM, Nat Sakimura wrote:
I have thought about that as well. The the reason I added "info" or "metada=
ta" was that what was behind the URL is not the client itself. By "client r=
egistration", I suppose you mean "client entry in the register" (cf. regist=
ration n 2.) . It is the "registered data/info/metadata" about the client.

Nat
2013/2/20 Mike Jones <Michael.Jones@microsoft.com<mailto:Michael.Jones@micr=
osoft.com>>
I could live with "registered_client_url".  I think that adding "_metadata"=
 or "_info" is incorrect, because what's being accessed is the client' regi=
stration - not just metadata or info about the client's registration (altho=
ugh that information can be retrieved as one aspect of the operations on th=
e client's registration).

                                                            -- Mike

From: Nat Sakimura [mailto:sakimura@gmail.com<mailto:sakimura@gmail.com>]
Sent: Wednesday, February 20, 2013 8:53 AM
To: Mike Jones
Cc: <oauth@ietf.org<mailto:oauth@ietf.org>>; Richer, Justin P.; John Bradle=
y

Subject: Re: [OAUTH-WG] I-D Action: draft-ietf-oauth-dyn-reg-06.txt

I have read the whole thing and still ---

Your argument that it is the place for using "registration access token" th=
us should have a parallel name "registration access url" is very weak. Ther=
e are several weakness.

First, "registration access token" actually is "registration" + "access tok=
en". Extracting "registration access" from "registration access token" is b=
roken.

Secondly, access token is used to against any protected resource. Recommend=
ing to use the word "access" in naming protected resources is broken. Shoul=
d we rename Userinfo endpoint to something like "Userinfo Access Endpoint"?=
 I do not think so.

Thirdly, the term "Registration Access" does not seem to be meaningful.
When you say "access", I suppose you are using the noun version of it.
(If you are using the verb, then I am even more against as a URL should not=
 contain a verb.)

According to the Webster, access (n.) is defined as:

access n.

1
a : onset<http://www.merriam-webster.com/dictionary/onset> 2
b : a fit of intense feeling : outburst<http://www.merriam-webster.com/dict=
ionary/outburst>
2
a : permission, liberty, or ability to enter, approach, or pass to and from=
 a place or to approach or communicate with a person or thing
b : freedom or ability to obtain or make use of something
c : a way or means of access
d : the act or an instance of accessing<http://www.merriam-webster.com/dict=
ionary/accessing>
3
: an increase by addition <a sudden access of wealth>

Replacing "access" with any of the definition above does not seem to work.

Remember, a URL is represents a "thing".
The name of the endpoint should represent the "thing".

I am merginally OK with "client registration url" leveraging on the definit=
ion 2. below (again from Webster -- my OED subscription lapsed for the time=
 being.)

registration n.

1
: the act of registering<http://www.merriam-webster.com/dictionary/register=
ing>
2
: an entry in a register<http://www.merriam-webster.com/dictionary/register=
>
3
: the number of individuals registered<http://www.merriam-webster.com/dicti=
onary/registered> : enrollment<http://www.merriam-webster.com/dictionary/en=
rollment>
4
a : the art or act of selecting and adjusting pipe organ stops
b : the combination of stops selected for performing a particular organ wor=
k
5
: a document certifying an act of registering

However, since the most common use of "registration" is actually 1 above, i=
t still is confusing. If you really want to emphasize the fact that it has =
been registered, then something like "registered client info uri" or "regis=
tered client metadata uri" would be better.

Nat


2013/2/20 Mike Jones <Michael.Jones@microsoft.com<mailto:Michael.Jones@micr=
osoft.com>>
For what it's worth, the name "registration_access_url" was chosen to be pa=
rallel to "registration_access_token".   It's the place you use the access =
token.  And it's where you access an existing registration.  I'm against th=
e name "client_metadata_url" because it's not metadata you're accessing - i=
t's a registration you're accessing.  For the same reason, I don't think th=
e name "client_info_url" gives people the right idea, because it doesn't sa=
y anything it being the registration that you're accessing.

If you really want us to change this, having read what's above, I could liv=
e with "client_registration_url", but I don't think a change is actually ne=
cessary.  (But if we are going to change it, let's do it ASAP, before the O=
penID Connect Implementer's Drafts are published.)

                                                            -- Mike

From: oauth-bounces@ietf.org<mailto:oauth-bounces@ietf.org> [mailto:oauth-b=
ounces@ietf.org<mailto:oauth-bounces@ietf.org>] On Behalf Of Nat Sakimura
Sent: Wednesday, February 20, 2013 7:58 AM
To: <oauth@ietf.org<mailto:oauth@ietf.org>>; Richer, Justin P.; John Bradle=
y

Subject: Re: [OAUTH-WG] I-D Action: draft-ietf-oauth-dyn-reg-06.txt

Thanks Justin.


Even if we go flat rather than doing JSON Structure, the "Client
Registration Access Endpoint" is not a good representative name.

What it represents is the client metadata/info.
It is not representing "Client Registration Access".
What does "Client Registration Access" mean?
Does UPDATing "Cleint Registration Access" make sense?

Something in the line of "Client Metadata Endpoint" and
something like "client_metadata_url" or "client_info_url" is much better.

Nat
2013/2/15 Richer, Justin P. <jricher@mitre.org<mailto:jricher@mitre.org>>
Everyone, there's a new draft of DynReg up on the tracker. This draft tries=
 to codify the discussions so far from this week into something we can all =
read. There are still plenty of open discussion points and items up for deb=
ate. Please read through this latest draft and see what's changed and help =
assure that it properly captures the conversations. If you have any inputs =
for the marked [[ Editor's Note ]] sections, please send them to the list b=
y next Thursday to give me opportunity to get any necessary changes in by t=
he cutoff date of Monday the 22nd.

Thanks for all of your hard work everyone, I think this is *really* coming =
along now.

 -- Justin

On Feb 15, 2013, at 4:54 PM, internet-drafts@ietf.org<mailto:internet-draft=
s@ietf.org> wrote:

>
> A New Internet-Draft is available from the on-line Internet-Drafts direct=
ories.
> This draft is a work item of the Web Authorization Protocol Working Group=
 of the IETF.
>
>       Title           : OAuth Dynamic Client Registration Protocol
>       Author(s)       : Justin Richer
>                          John Bradley
>                          Michael B. Jones
>                          Maciej Machulak
>       Filename        : draft-ietf-oauth-dyn-reg-06.txt
>       Pages           : 21
>       Date            : 2013-02-15
>
> Abstract:
>   This specification defines an endpoint and protocol for dynamic
>   registration of OAuth Clients at an Authorization Server.
>
>
> The IETF datatracker status page for this draft is:
> https://datatracker.ietf.org/doc/draft-ietf-oauth-dyn-reg
>
> There's also a htmlized version available at:
> http://tools.ietf.org/html/draft-ietf-oauth-dyn-reg-06
>
> A diff from the previous version is available at:
> http://www.ietf.org/rfcdiff?url2=3Ddraft-ietf-oauth-dyn-reg-06
>
>
> Internet-Drafts are also available by anonymous FTP at:
> ftp://ftp.ietf.org/internet-drafts/
>
> _______________________________________________
> OAuth mailing list
> OAuth@ietf.org<mailto:OAuth@ietf.org>
> https://www.ietf.org/mailman/listinfo/oauth

_______________________________________________
OAuth mailing list
OAuth@ietf.org<mailto:OAuth@ietf.org>
https://www.ietf.org/mailman/listinfo/oauth



--
Nat Sakimura (=3Dnat)
Chairman, OpenID Foundation
http://nat.sakimura.org/
@_nat_en



--
Nat Sakimura (=3Dnat)
Chairman, OpenID Foundation
http://nat.sakimura.org/
@_nat_en



--
Nat Sakimura (=3Dnat)
Chairman, OpenID Foundation
http://nat.sakimura.org/
@_nat_en






--
Nat Sakimura (=3Dnat)
Chairman, OpenID Foundation
http://nat.sakimura.org/
@_nat_en

--_000_4E1F6AAD24975D4BA5B16804296739436747BA8ETK5EX14MBXC284r_
Content-Type: text/html; charset="us-ascii"
Content-Transfer-Encoding: quoted-printable

<html xmlns:v=3D"urn:schemas-microsoft-com:vml" xmlns:o=3D"urn:schemas-micr=
osoft-com:office:office" xmlns:w=3D"urn:schemas-microsoft-com:office:word" =
xmlns:m=3D"http://schemas.microsoft.com/office/2004/12/omml" xmlns=3D"http:=
//www.w3.org/TR/REC-html40">
<head>
<meta http-equiv=3D"Content-Type" content=3D"text/html; charset=3Dus-ascii"=
>
<meta name=3D"Generator" content=3D"Microsoft Word 14 (filtered medium)">
<style><!--
/* Font Definitions */
@font-face
	{font-family:Calibri;
	panose-1:2 15 5 2 2 2 4 3 2 4;}
@font-face
	{font-family:Tahoma;
	panose-1:2 11 6 4 3 5 4 4 2 4;}
@font-face
	{font-family:Verdana;
	panose-1:2 11 6 4 3 5 4 4 2 4;}
/* Style Definitions */
p.MsoNormal, li.MsoNormal, div.MsoNormal
	{margin:0in;
	margin-bottom:.0001pt;
	font-size:12.0pt;
	font-family:"Times New Roman","serif";}
a:link, span.MsoHyperlink
	{mso-style-priority:99;
	color:blue;
	text-decoration:underline;}
a:visited, span.MsoHyperlinkFollowed
	{mso-style-priority:99;
	color:purple;
	text-decoration:underline;}
p.MsoAcetate, li.MsoAcetate, div.MsoAcetate
	{mso-style-priority:99;
	mso-style-link:"Balloon Text Char";
	margin:0in;
	margin-bottom:.0001pt;
	font-size:8.0pt;
	font-family:"Tahoma","sans-serif";}
span.BalloonTextChar
	{mso-style-name:"Balloon Text Char";
	mso-style-priority:99;
	mso-style-link:"Balloon Text";
	font-family:"Tahoma","sans-serif";}
span.EmailStyle21
	{mso-style-type:personal-reply;
	font-family:"Calibri","sans-serif";
	color:#1F497D;}
.MsoChpDefault
	{mso-style-type:export-only;
	font-family:"Calibri","sans-serif";}
@page WordSection1
	{size:8.5in 11.0in;
	margin:1.0in 1.0in 1.0in 1.0in;}
div.WordSection1
	{page:WordSection1;}
--></style><!--[if gte mso 9]><xml>
<o:shapedefaults v:ext=3D"edit" spidmax=3D"1026" />
</xml><![endif]--><!--[if gte mso 9]><xml>
<o:shapelayout v:ext=3D"edit">
<o:idmap v:ext=3D"edit" data=3D"1" />
</o:shapelayout></xml><![endif]-->
</head>
<body lang=3D"EN-US" link=3D"blue" vlink=3D"purple">
<div class=3D"WordSection1">
<p class=3D"MsoNormal"><span style=3D"font-size:11.0pt;font-family:&quot;Ca=
libri&quot;,&quot;sans-serif&quot;;color:#1F497D">I believe the semantic in=
tent of &#8220;registration_client_uri&#8221; is &#8220;<b>client uri</b> t=
o be used for
<b>registration</b> operations&#8221;, just like the semantic intent of &#8=
220;registration_access_token&#8221; is &#8220;<b>access token</b> to be us=
ed for
<b>registration</b> operations&#8221;.&nbsp; Both perfectly meaningful cons=
tructions.<o:p></o:p></span></p>
<p class=3D"MsoNormal"><span style=3D"font-size:11.0pt;font-family:&quot;Ca=
libri&quot;,&quot;sans-serif&quot;;color:#1F497D"><o:p>&nbsp;</o:p></span><=
/p>
<p class=3D"MsoNormal"><span style=3D"font-size:11.0pt;font-family:&quot;Ca=
libri&quot;,&quot;sans-serif&quot;;color:#1F497D"><o:p>&nbsp;</o:p></span><=
/p>
<p class=3D"MsoNormal"><b><span style=3D"font-size:10.0pt;font-family:&quot=
;Tahoma&quot;,&quot;sans-serif&quot;">From:</span></b><span style=3D"font-s=
ize:10.0pt;font-family:&quot;Tahoma&quot;,&quot;sans-serif&quot;"> Nat Saki=
mura [mailto:sakimura@gmail.com]
<br>
<b>Sent:</b> Wednesday, February 20, 2013 12:32 PM<br>
<b>To:</b> John Bradley<br>
<b>Cc:</b> Justin Richer; Mike Jones; &lt;oauth@ietf.org&gt;<br>
<b>Subject:</b> Re: [OAUTH-WG] I-D Action: draft-ietf-oauth-dyn-reg-06.txt<=
o:p></o:p></span></p>
<p class=3D"MsoNormal"><o:p>&nbsp;</o:p></p>
<p class=3D"MsoNormal">Hmmm.&nbsp;<o:p></o:p></p>
<div>
<p class=3D"MsoNormal"><o:p>&nbsp;</o:p></p>
</div>
<div>
<p class=3D"MsoNormal"><b>registered </b>is adjective, not verb.&nbsp;<o:p>=
</o:p></p>
</div>
<div>
<p class=3D"MsoNormal"><o:p>&nbsp;</o:p></p>
</div>
<div>
<p class=3D"MsoNormal">registration client is noun &#43; noun, and sounds f=
unny to me.&nbsp;<o:p></o:p></p>
</div>
<div>
<p class=3D"MsoNormal">When expanded, it becomes &quot;<span style=3D"font-=
size:9.5pt;font-family:&quot;Verdana&quot;,&quot;sans-serif&quot;;color:#55=
5555;background:white">an entry in a&nbsp;</span><a href=3D"http://www.merr=
iam-webster.com/dictionary/register"><span style=3D"font-size:10.5pt;font-f=
amily:&quot;Verdana&quot;,&quot;sans-serif&quot;;font-variant:small-caps;co=
lor:#555555;background:white">register</span></a>&nbsp;client&quot;,
 which does not sound right.&nbsp;<o:p></o:p></p>
</div>
<div>
<p class=3D"MsoNormal"><o:p>&nbsp;</o:p></p>
</div>
<div>
<p class=3D"MsoNormal">Nat<o:p></o:p></p>
</div>
<div>
<p class=3D"MsoNormal" style=3D"margin-bottom:12.0pt"><o:p>&nbsp;</o:p></p>
<div>
<p class=3D"MsoNormal">2013/2/20 John Bradley &lt;<a href=3D"mailto:ve7jtb@=
ve7jtb.com" target=3D"_blank">ve7jtb@ve7jtb.com</a>&gt;<o:p></o:p></p>
<div>
<p class=3D"MsoNormal">I am OK with that.<o:p></o:p></p>
<div>
<div>
<p class=3D"MsoNormal"><o:p>&nbsp;</o:p></p>
<div>
<div>
<p class=3D"MsoNormal">On 2013-02-20, at 4:03 PM, Justin Richer &lt;<a href=
=3D"mailto:jricher@mitre.org" target=3D"_blank">jricher@mitre.org</a>&gt; w=
rote:<o:p></o:p></p>
</div>
<p class=3D"MsoNormal"><br>
<br>
<o:p></o:p></p>
<div>
<p class=3D"MsoNormal" style=3D"margin-bottom:12.0pt">On second thought, ho=
w about &quot;registration_client_uri&quot;? It's the URI for a particular =
client's registration. Use of the verb &quot;registered&quot; makes it soun=
d like the result of an action that the client took, as
 if the client itself had registered the URI. That's obviously not the case=
, and we don't want to convey that.
<br>
<br>
So, new proposed name: &quot;registration_client_uri&quot;<br>
<br>
This has the nice side effect of being more parallel with &quot;reigstratio=
n_access_token&quot;.
<br>
<br>
&nbsp;-- Justin<o:p></o:p></p>
<div>
<p class=3D"MsoNormal">On 02/20/2013 01:13 PM, Mike Jones wrote:<o:p></o:p>=
</p>
</div>
<blockquote style=3D"margin-top:5.0pt;margin-bottom:5.0pt">
<div>
<p class=3D"MsoNormal" style=3D"mso-margin-top-alt:auto;mso-margin-bottom-a=
lt:auto"><span style=3D"font-size:11.0pt;font-family:&quot;Calibri&quot;,&q=
uot;sans-serif&quot;;color:#1F497D">SGTM</span><o:p></o:p></p>
<p class=3D"MsoNormal" style=3D"mso-margin-top-alt:auto;mso-margin-bottom-a=
lt:auto"><span style=3D"font-size:11.0pt;font-family:&quot;Calibri&quot;,&q=
uot;sans-serif&quot;;color:#1F497D">&nbsp;</span><o:p></o:p></p>
<div>
<div style=3D"border:none;border-top:solid #B5C4DF 1.0pt;padding:3.0pt 0in =
0in 0in">
<p class=3D"MsoNormal" style=3D"mso-margin-top-alt:auto;mso-margin-bottom-a=
lt:auto"><b><span style=3D"font-size:10.0pt;font-family:&quot;Tahoma&quot;,=
&quot;sans-serif&quot;">From:</span></b><span style=3D"font-size:10.0pt;fon=
t-family:&quot;Tahoma&quot;,&quot;sans-serif&quot;"> Justin Richer [<a href=
=3D"mailto:jricher@mitre.org" target=3D"_blank">mailto:jricher@mitre.org</a=
>]
<br>
<b>Sent:</b> Wednesday, February 20, 2013 10:11 AM<br>
<b>To:</b> Nat Sakimura<br>
<b>Cc:</b> Mike Jones; <a href=3D"mailto:oauth@ietf.org" target=3D"_blank">=
&lt;oauth@ietf.org&gt;</a>; John Bradley<br>
<b>Subject:</b> Re: [OAUTH-WG] I-D Action: draft-ietf-oauth-dyn-reg-06.txt<=
/span><o:p></o:p></p>
</div>
</div>
<p class=3D"MsoNormal" style=3D"mso-margin-top-alt:auto;mso-margin-bottom-a=
lt:auto">&nbsp;<o:p></o:p></p>
<p class=3D"MsoNormal" style=3D"mso-margin-top-alt:auto;margin-bottom:12.0p=
t">I like &quot;registered_client_uri&quot;, given all of the other discuss=
ions on this thread, because:<br>
<br>
URL/URI: It *is* a URL, and an https one at that, but if the IETF conventio=
n is to call it URI, then I'm fine with that.<br>
<br>
registered_client/registration_access: The former is a good description of =
what's actually *at* the URL, which fits better with the RESTful entity mod=
el. I think Nat's criticisms about the original formation of the parameter =
name are spot on, though at the
 time we hadn't heard anything better.<br>
<br>
<br>
So I'd like to change it to &quot;registered_client_uri&quot; in the next d=
raft.<br>
<br>
&nbsp;-- Justin<o:p></o:p></p>
<div>
<p class=3D"MsoNormal" style=3D"mso-margin-top-alt:auto;mso-margin-bottom-a=
lt:auto">On 02/20/2013 12:20 PM, Nat Sakimura wrote:<o:p></o:p></p>
</div>
<blockquote style=3D"margin-top:5.0pt;margin-bottom:5.0pt">
<p class=3D"MsoNormal" style=3D"mso-margin-top-alt:auto;mso-margin-bottom-a=
lt:auto">I have thought about that as well. The the reason I added &quot;in=
fo&quot; or &quot;metadata&quot; was that what was behind the URL is not th=
e client itself. By &quot;client registration&quot;, I suppose you
 mean &quot;client entry in the register&quot; (cf. <b>registration </b><i>=
n</i> 2.) . It is the &quot;registered data/info/metadata&quot; about the c=
lient.&nbsp;
<o:p></o:p></p>
<div>
<p class=3D"MsoNormal" style=3D"mso-margin-top-alt:auto;mso-margin-bottom-a=
lt:auto">&nbsp;<o:p></o:p></p>
</div>
<div>
<p class=3D"MsoNormal" style=3D"mso-margin-top-alt:auto;margin-bottom:12.0p=
t">Nat<o:p></o:p></p>
<div>
<p class=3D"MsoNormal" style=3D"mso-margin-top-alt:auto;mso-margin-bottom-a=
lt:auto">2013/2/20 Mike Jones &lt;<a href=3D"mailto:Michael.Jones@microsoft=
.com" target=3D"_blank">Michael.Jones@microsoft.com</a>&gt;<o:p></o:p></p>
<div>
<div>
<p class=3D"MsoNormal" style=3D"mso-margin-top-alt:auto;mso-margin-bottom-a=
lt:auto"><span style=3D"font-size:11.0pt;font-family:&quot;Calibri&quot;,&q=
uot;sans-serif&quot;;color:#1F497D">I could live with &#8220;registered_cli=
ent_url&#8221;.&nbsp; I think that adding &#8220;_metadata&#8221; or &#8220=
;_info&#8221; is incorrect,
 because what&#8217;s being accessed is the client&#8217; registration &#82=
11; not just metadata or info about the client&#8217;s registration (althou=
gh that information can be retrieved as one aspect of the operations on the=
 client&#8217;s registration).</span><o:p></o:p></p>
<p class=3D"MsoNormal" style=3D"mso-margin-top-alt:auto;mso-margin-bottom-a=
lt:auto"><span style=3D"font-size:11.0pt;font-family:&quot;Calibri&quot;,&q=
uot;sans-serif&quot;;color:#1F497D">&nbsp;</span><o:p></o:p></p>
<p class=3D"MsoNormal" style=3D"mso-margin-top-alt:auto;mso-margin-bottom-a=
lt:auto"><span style=3D"font-size:11.0pt;font-family:&quot;Calibri&quot;,&q=
uot;sans-serif&quot;;color:#1F497D">&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nb=
sp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;=
&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nb=
sp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;=
&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nb=
sp;&nbsp;&nbsp; -- Mike</span><o:p></o:p></p>
<p class=3D"MsoNormal" style=3D"mso-margin-top-alt:auto;mso-margin-bottom-a=
lt:auto"><span style=3D"font-size:11.0pt;font-family:&quot;Calibri&quot;,&q=
uot;sans-serif&quot;;color:#1F497D">&nbsp;</span><o:p></o:p></p>
<p class=3D"MsoNormal" style=3D"mso-margin-top-alt:auto;mso-margin-bottom-a=
lt:auto"><b><span style=3D"font-size:10.0pt;font-family:&quot;Tahoma&quot;,=
&quot;sans-serif&quot;">From:</span></b><span style=3D"font-size:10.0pt;fon=
t-family:&quot;Tahoma&quot;,&quot;sans-serif&quot;"> Nat Sakimura [mailto:<=
a href=3D"mailto:sakimura@gmail.com" target=3D"_blank">sakimura@gmail.com</=
a>]
<br>
<b>Sent:</b> Wednesday, February 20, 2013 8:53 AM<br>
<b>To:</b> Mike Jones<br>
<b>Cc:</b> &lt;<a href=3D"mailto:oauth@ietf.org" target=3D"_blank">oauth@ie=
tf.org</a>&gt;; Richer, Justin P.; John Bradley</span><o:p></o:p></p>
<div>
<div>
<p class=3D"MsoNormal" style=3D"mso-margin-top-alt:auto;mso-margin-bottom-a=
lt:auto"><br>
<b>Subject:</b> Re: [OAUTH-WG] I-D Action: draft-ietf-oauth-dyn-reg-06.txt<=
o:p></o:p></p>
</div>
</div>
<div>
<div>
<p class=3D"MsoNormal" style=3D"mso-margin-top-alt:auto;mso-margin-bottom-a=
lt:auto">&nbsp;<o:p></o:p></p>
<p class=3D"MsoNormal" style=3D"mso-margin-top-alt:auto;mso-margin-bottom-a=
lt:auto">I have read the whole thing and still ---&nbsp;<o:p></o:p></p>
<div>
<p class=3D"MsoNormal" style=3D"mso-margin-top-alt:auto;mso-margin-bottom-a=
lt:auto">&nbsp;<o:p></o:p></p>
</div>
<div>
<p class=3D"MsoNormal" style=3D"mso-margin-top-alt:auto;mso-margin-bottom-a=
lt:auto">Your argument that it is the place for using &quot;registration ac=
cess token&quot; thus should have a parallel name &quot;registration access=
 url&quot; is very weak. There are several weakness.&nbsp;<o:p></o:p></p>
</div>
<div>
<p class=3D"MsoNormal" style=3D"mso-margin-top-alt:auto;mso-margin-bottom-a=
lt:auto">&nbsp;<o:p></o:p></p>
</div>
<div>
<p class=3D"MsoNormal" style=3D"mso-margin-top-alt:auto;mso-margin-bottom-a=
lt:auto">First, &quot;registration access token&quot; actually is &quot;reg=
istration&quot; &#43; &quot;access token&quot;. Extracting &quot;registrati=
on access&quot; from &quot;registration access token&quot; is broken.&nbsp;=
<o:p></o:p></p>
</div>
<div>
<p class=3D"MsoNormal" style=3D"mso-margin-top-alt:auto;mso-margin-bottom-a=
lt:auto">&nbsp;<o:p></o:p></p>
</div>
<div>
<p class=3D"MsoNormal" style=3D"mso-margin-top-alt:auto;mso-margin-bottom-a=
lt:auto">Secondly, access token is used to against any protected resource.&=
nbsp;Recommending&nbsp;to use the word &quot;access&quot; in naming protect=
ed resources is broken. Should we rename Userinfo endpoint
 to something like &quot;Userinfo Access Endpoint&quot;? I do not think so.=
&nbsp;<o:p></o:p></p>
</div>
<div>
<p class=3D"MsoNormal" style=3D"mso-margin-top-alt:auto;mso-margin-bottom-a=
lt:auto">&nbsp;<o:p></o:p></p>
</div>
<div>
<p class=3D"MsoNormal" style=3D"mso-margin-top-alt:auto;mso-margin-bottom-a=
lt:auto">Thirdly, the term &quot;Registration Access&quot; does not seem to=
 be meaningful.&nbsp;<o:p></o:p></p>
</div>
<div>
<p class=3D"MsoNormal" style=3D"mso-margin-top-alt:auto;mso-margin-bottom-a=
lt:auto">When you say &quot;access&quot;, I suppose you are using the noun =
version of it.&nbsp;<o:p></o:p></p>
</div>
<div>
<div>
<p class=3D"MsoNormal" style=3D"mso-margin-top-alt:auto;mso-margin-bottom-a=
lt:auto">(If you are using the verb, then I am even more against as a URL s=
hould not contain a verb.)&nbsp;<o:p></o:p></p>
</div>
<div>
<p class=3D"MsoNormal" style=3D"mso-margin-top-alt:auto;mso-margin-bottom-a=
lt:auto">&nbsp;<o:p></o:p></p>
</div>
<div>
<p class=3D"MsoNormal" style=3D"mso-margin-top-alt:auto;mso-margin-bottom-a=
lt:auto">According to the Webster, access (n.) is defined as:&nbsp;<o:p></o=
:p></p>
</div>
<div>
<p class=3D"MsoNormal" style=3D"mso-margin-top-alt:auto;mso-margin-bottom-a=
lt:auto">&nbsp;<o:p></o:p></p>
</div>
<div>
<p class=3D"MsoNormal" style=3D"mso-margin-top-alt:auto;mso-margin-bottom-a=
lt:auto"><b>access
</b><i>n.</i><o:p></o:p></p>
</div>
<div>
<p class=3D"MsoNormal" style=3D"mso-margin-top-alt:auto;mso-margin-bottom-a=
lt:auto">&nbsp;<o:p></o:p></p>
</div>
<div>
<div>
<div>
<p class=3D"MsoNormal" style=3D"mso-margin-top-alt:auto;mso-margin-bottom-a=
lt:auto;line-height:15.0pt;background:white">
<b><span style=3D"font-size:9.5pt;font-family:&quot;Verdana&quot;,&quot;san=
s-serif&quot;">1</span></b><o:p></o:p></p>
</div>
<div style=3D"margin-left:15.0pt;margin-bottom:7.5pt">
<p class=3D"MsoNormal" style=3D"mso-margin-top-alt:auto;mso-margin-bottom-a=
lt:auto;line-height:15.0pt;background:white">
<em><b><span style=3D"font-size:9.5pt;font-family:&quot;Verdana&quot;,&quot=
;sans-serif&quot;;font-style:normal">a</span></b></em><span style=3D"font-s=
ize:9.5pt;font-family:&quot;Verdana&quot;,&quot;sans-serif&quot;">&nbsp;<st=
rong><span style=3D"font-family:&quot;Verdana&quot;,&quot;sans-serif&quot;"=
>:</span></strong>&nbsp;<a href=3D"http://www.merriam-webster.com/dictionar=
y/onset" target=3D"_blank"><span style=3D"font-variant:small-caps;color:#11=
22CC">onset</span></a>&nbsp;2</span><o:p></o:p></p>
<p class=3D"MsoNormal" style=3D"mso-margin-top-alt:auto;mso-margin-bottom-a=
lt:auto;line-height:15.0pt;background:white">
<em><b><span style=3D"font-size:9.5pt;font-family:&quot;Verdana&quot;,&quot=
;sans-serif&quot;;font-style:normal">b</span></b></em><span style=3D"font-s=
ize:9.5pt;font-family:&quot;Verdana&quot;,&quot;sans-serif&quot;">&nbsp;<st=
rong><span style=3D"font-family:&quot;Verdana&quot;,&quot;sans-serif&quot;"=
>:</span></strong>&nbsp;a fit of
 intense feeling&nbsp;<strong><span style=3D"font-family:&quot;Verdana&quot=
;,&quot;sans-serif&quot;">:</span></strong>&nbsp;<a href=3D"http://www.merr=
iam-webster.com/dictionary/outburst" target=3D"_blank"><span style=3D"font-=
variant:small-caps;color:#1122CC">outburst</span></a></span><o:p></o:p></p>
</div>
</div>
<div>
<div>
<p class=3D"MsoNormal" style=3D"mso-margin-top-alt:auto;mso-margin-bottom-a=
lt:auto;line-height:15.0pt;background:white">
<b><span style=3D"font-size:9.5pt;font-family:&quot;Verdana&quot;,&quot;san=
s-serif&quot;">2</span></b><o:p></o:p></p>
</div>
<div style=3D"margin-left:15.0pt;margin-bottom:7.5pt">
<p class=3D"MsoNormal" style=3D"mso-margin-top-alt:auto;mso-margin-bottom-a=
lt:auto;line-height:15.0pt;background:white">
<em><b><span style=3D"font-size:9.5pt;font-family:&quot;Verdana&quot;,&quot=
;sans-serif&quot;;font-style:normal">a</span></b></em><span style=3D"font-s=
ize:9.5pt;font-family:&quot;Verdana&quot;,&quot;sans-serif&quot;">&nbsp;<st=
rong><span style=3D"font-family:&quot;Verdana&quot;,&quot;sans-serif&quot;"=
>:</span></strong>&nbsp;permission,
 liberty, or ability to enter, approach, or pass to and from a place or to =
approach or communicate with a person or thing</span><o:p></o:p></p>
<p class=3D"MsoNormal" style=3D"mso-margin-top-alt:auto;mso-margin-bottom-a=
lt:auto;line-height:15.0pt;background:white">
<em><b><span style=3D"font-size:9.5pt;font-family:&quot;Verdana&quot;,&quot=
;sans-serif&quot;;font-style:normal">b</span></b></em><span style=3D"font-s=
ize:9.5pt;font-family:&quot;Verdana&quot;,&quot;sans-serif&quot;">&nbsp;<st=
rong><span style=3D"font-family:&quot;Verdana&quot;,&quot;sans-serif&quot;"=
>:</span></strong>&nbsp;freedom or
 ability to obtain or make use of something</span><o:p></o:p></p>
<p class=3D"MsoNormal" style=3D"mso-margin-top-alt:auto;mso-margin-bottom-a=
lt:auto;line-height:15.0pt;background:white">
<em><b><span style=3D"font-size:9.5pt;font-family:&quot;Verdana&quot;,&quot=
;sans-serif&quot;;font-style:normal">c</span></b></em><span style=3D"font-s=
ize:9.5pt;font-family:&quot;Verdana&quot;,&quot;sans-serif&quot;">&nbsp;<st=
rong><span style=3D"font-family:&quot;Verdana&quot;,&quot;sans-serif&quot;"=
>:</span></strong>&nbsp;a way or
 means of access</span><o:p></o:p></p>
<p class=3D"MsoNormal" style=3D"mso-margin-top-alt:auto;mso-margin-bottom-a=
lt:auto;line-height:15.0pt;background:white">
<em><b><span style=3D"font-size:9.5pt;font-family:&quot;Verdana&quot;,&quot=
;sans-serif&quot;;font-style:normal">d</span></b></em><span style=3D"font-s=
ize:9.5pt;font-family:&quot;Verdana&quot;,&quot;sans-serif&quot;">&nbsp;<st=
rong><span style=3D"font-family:&quot;Verdana&quot;,&quot;sans-serif&quot;"=
>:</span></strong>&nbsp;the act or
 an instance of&nbsp;<a href=3D"http://www.merriam-webster.com/dictionary/a=
ccessing" target=3D"_blank"><span style=3D"font-size:10.0pt;color:#1122CC">=
accessing</span></a></span><o:p></o:p></p>
</div>
</div>
<div>
<div>
<p class=3D"MsoNormal" style=3D"mso-margin-top-alt:auto;mso-margin-bottom-a=
lt:auto;line-height:15.0pt;background:white">
<b><span style=3D"font-size:9.5pt;font-family:&quot;Verdana&quot;,&quot;san=
s-serif&quot;">3</span></b><o:p></o:p></p>
</div>
<div style=3D"margin-left:15.0pt;margin-bottom:7.5pt">
<p class=3D"MsoNormal" style=3D"mso-margin-top-alt:auto;mso-margin-bottom-a=
lt:auto;line-height:15.0pt;background:white">
<strong><span style=3D"font-size:9.5pt;font-family:&quot;Verdana&quot;,&quo=
t;sans-serif&quot;">:</span></strong><span style=3D"font-size:9.5pt;font-fa=
mily:&quot;Verdana&quot;,&quot;sans-serif&quot;">&nbsp;an increase by addit=
ion&nbsp;&lt;a sudden&nbsp;<em><span style=3D"font-family:&quot;Verdana&quo=
t;,&quot;sans-serif&quot;">access</span></em>&nbsp;of
 wealth&gt;</span><o:p></o:p></p>
</div>
</div>
<div>
<p class=3D"MsoNormal" style=3D"mso-margin-top-alt:auto;mso-margin-bottom-a=
lt:auto">&nbsp;<o:p></o:p></p>
</div>
<div>
<p class=3D"MsoNormal" style=3D"mso-margin-top-alt:auto;mso-margin-bottom-a=
lt:auto">Replacing &quot;access&quot; with any of the definition above does=
 not seem to work.&nbsp;<o:p></o:p></p>
</div>
<div>
<p class=3D"MsoNormal" style=3D"mso-margin-top-alt:auto;mso-margin-bottom-a=
lt:auto">&nbsp;<o:p></o:p></p>
</div>
<div>
<p class=3D"MsoNormal" style=3D"mso-margin-top-alt:auto;mso-margin-bottom-a=
lt:auto">Remember, a URL is represents a &quot;thing&quot;.&nbsp;<o:p></o:p=
></p>
</div>
<div>
<p class=3D"MsoNormal" style=3D"mso-margin-top-alt:auto;mso-margin-bottom-a=
lt:auto">The name of the endpoint should represent the &quot;thing&quot;.&n=
bsp;<o:p></o:p></p>
</div>
<div>
<p class=3D"MsoNormal" style=3D"mso-margin-top-alt:auto;mso-margin-bottom-a=
lt:auto">&nbsp;<o:p></o:p></p>
</div>
<div>
<p class=3D"MsoNormal" style=3D"mso-margin-top-alt:auto;mso-margin-bottom-a=
lt:auto">I am merginally OK with &quot;client registration url&quot; levera=
ging on the definition 2. below (again from Webster -- my OED subscription =
lapsed for the time being.)&nbsp;<o:p></o:p></p>
</div>
<div>
<p class=3D"MsoNormal" style=3D"mso-margin-top-alt:auto;mso-margin-bottom-a=
lt:auto">&nbsp;<o:p></o:p></p>
</div>
<div>
<p class=3D"MsoNormal" style=3D"mso-margin-top-alt:auto;mso-margin-bottom-a=
lt:auto"><b>registration
</b><i>n.</i><o:p></o:p></p>
</div>
<div>
<p class=3D"MsoNormal" style=3D"mso-margin-top-alt:auto;mso-margin-bottom-a=
lt:auto">&nbsp;<o:p></o:p></p>
</div>
<div>
<div>
<div>
<p class=3D"MsoNormal" style=3D"mso-margin-top-alt:auto;mso-margin-bottom-a=
lt:auto;line-height:15.0pt;background:white">
<b><span style=3D"font-size:9.5pt;font-family:&quot;Verdana&quot;,&quot;san=
s-serif&quot;">1</span></b><o:p></o:p></p>
</div>
<div style=3D"margin-left:15.0pt;margin-bottom:7.5pt">
<p class=3D"MsoNormal" style=3D"mso-margin-top-alt:auto;mso-margin-bottom-a=
lt:auto;line-height:15.0pt;background:white">
<strong><span style=3D"font-size:9.5pt;font-family:&quot;Verdana&quot;,&quo=
t;sans-serif&quot;">:</span></strong><span style=3D"font-size:9.5pt;font-fa=
mily:&quot;Verdana&quot;,&quot;sans-serif&quot;">&nbsp;the act of&nbsp;<a h=
ref=3D"http://www.merriam-webster.com/dictionary/registering" target=3D"_bl=
ank"><span style=3D"font-size:10.0pt;color:#1122CC">registering</span></a><=
/span><o:p></o:p></p>
</div>
</div>
<div>
<div>
<p class=3D"MsoNormal" style=3D"mso-margin-top-alt:auto;mso-margin-bottom-a=
lt:auto;line-height:15.0pt;background:white">
<b><span style=3D"font-size:9.5pt;font-family:&quot;Verdana&quot;,&quot;san=
s-serif&quot;">2</span></b><o:p></o:p></p>
</div>
<div style=3D"margin-left:15.0pt;margin-bottom:7.5pt">
<p class=3D"MsoNormal" style=3D"mso-margin-top-alt:auto;mso-margin-bottom-a=
lt:auto;line-height:15.0pt;background:white">
<strong><span style=3D"font-size:9.5pt;font-family:&quot;Verdana&quot;,&quo=
t;sans-serif&quot;">:</span></strong><span style=3D"font-size:9.5pt;font-fa=
mily:&quot;Verdana&quot;,&quot;sans-serif&quot;">&nbsp;an entry in a&nbsp;<=
a href=3D"http://www.merriam-webster.com/dictionary/register" target=3D"_bl=
ank"><span style=3D"font-size:10.0pt;color:#1122CC">register</span></a></sp=
an><o:p></o:p></p>
</div>
</div>
<div>
<div>
<p class=3D"MsoNormal" style=3D"mso-margin-top-alt:auto;mso-margin-bottom-a=
lt:auto;line-height:15.0pt;background:white">
<b><span style=3D"font-size:9.5pt;font-family:&quot;Verdana&quot;,&quot;san=
s-serif&quot;">3</span></b><o:p></o:p></p>
</div>
<div style=3D"margin-left:15.0pt;margin-bottom:7.5pt">
<p class=3D"MsoNormal" style=3D"mso-margin-top-alt:auto;mso-margin-bottom-a=
lt:auto;line-height:15.0pt;background:white">
<strong><span style=3D"font-size:9.5pt;font-family:&quot;Verdana&quot;,&quo=
t;sans-serif&quot;">:</span></strong><span style=3D"font-size:9.5pt;font-fa=
mily:&quot;Verdana&quot;,&quot;sans-serif&quot;">&nbsp;the number of indivi=
duals&nbsp;<a href=3D"http://www.merriam-webster.com/dictionary/registered"=
 target=3D"_blank"><span style=3D"font-size:10.0pt;color:#1122CC">registere=
d</span></a>&nbsp;<strong><span style=3D"font-family:&quot;Verdana&quot;,&q=
uot;sans-serif&quot;">:</span></strong>&nbsp;<a href=3D"http://www.merriam-=
webster.com/dictionary/enrollment" target=3D"_blank"><span style=3D"font-va=
riant:small-caps;color:#1122CC">enrollment</span></a></span><o:p></o:p></p>
</div>
</div>
<div>
<div>
<p class=3D"MsoNormal" style=3D"mso-margin-top-alt:auto;mso-margin-bottom-a=
lt:auto;line-height:15.0pt;background:white">
<b><span style=3D"font-size:9.5pt;font-family:&quot;Verdana&quot;,&quot;san=
s-serif&quot;">4</span></b><o:p></o:p></p>
</div>
<div style=3D"margin-left:15.0pt;margin-bottom:7.5pt">
<p class=3D"MsoNormal" style=3D"mso-margin-top-alt:auto;mso-margin-bottom-a=
lt:auto;line-height:15.0pt;background:white">
<em><b><span style=3D"font-size:9.5pt;font-family:&quot;Verdana&quot;,&quot=
;sans-serif&quot;;font-style:normal">a</span></b></em><span style=3D"font-s=
ize:9.5pt;font-family:&quot;Verdana&quot;,&quot;sans-serif&quot;">&nbsp;<st=
rong><span style=3D"font-family:&quot;Verdana&quot;,&quot;sans-serif&quot;"=
>:</span></strong>&nbsp;the art or
 act of selecting and adjusting pipe organ stops</span><o:p></o:p></p>
<p class=3D"MsoNormal" style=3D"mso-margin-top-alt:auto;mso-margin-bottom-a=
lt:auto;line-height:15.0pt;background:white">
<em><b><span style=3D"font-size:9.5pt;font-family:&quot;Verdana&quot;,&quot=
;sans-serif&quot;;font-style:normal">b</span></b></em><span style=3D"font-s=
ize:9.5pt;font-family:&quot;Verdana&quot;,&quot;sans-serif&quot;">&nbsp;<st=
rong><span style=3D"font-family:&quot;Verdana&quot;,&quot;sans-serif&quot;"=
>:</span></strong>&nbsp;the combination
 of stops selected for performing a particular organ work</span><o:p></o:p>=
</p>
</div>
</div>
<div>
<div>
<p class=3D"MsoNormal" style=3D"mso-margin-top-alt:auto;mso-margin-bottom-a=
lt:auto;line-height:15.0pt;background:white">
<b><span style=3D"font-size:9.5pt;font-family:&quot;Verdana&quot;,&quot;san=
s-serif&quot;">5</span></b><o:p></o:p></p>
</div>
<div style=3D"margin-left:15.0pt;margin-bottom:7.5pt">
<p class=3D"MsoNormal" style=3D"mso-margin-top-alt:auto;mso-margin-bottom-a=
lt:auto;line-height:15.0pt;background:white">
<strong><span style=3D"font-size:9.5pt;font-family:&quot;Verdana&quot;,&quo=
t;sans-serif&quot;">:</span></strong><span style=3D"font-size:9.5pt;font-fa=
mily:&quot;Verdana&quot;,&quot;sans-serif&quot;">&nbsp;a document certifyin=
g an act of registering</span><o:p></o:p></p>
</div>
</div>
</div>
<div>
<p class=3D"MsoNormal" style=3D"mso-margin-top-alt:auto;mso-margin-bottom-a=
lt:auto">&nbsp;<o:p></o:p></p>
</div>
<div>
<p class=3D"MsoNormal" style=3D"mso-margin-top-alt:auto;mso-margin-bottom-a=
lt:auto">However, since the most common use of &quot;registration&quot; is =
actually
<b>1</b> above, it still is confusing. If you really want to emphasize the =
fact that it has been registered, then something like &quot;registered clie=
nt info uri&quot; or &quot;registered client metadata uri&quot; would be be=
tter.&nbsp;<o:p></o:p></p>
</div>
<div>
<p class=3D"MsoNormal" style=3D"mso-margin-top-alt:auto;mso-margin-bottom-a=
lt:auto">&nbsp;<o:p></o:p></p>
</div>
<div>
<p class=3D"MsoNormal" style=3D"mso-margin-top-alt:auto;mso-margin-bottom-a=
lt:auto">Nat<o:p></o:p></p>
</div>
<div>
<p class=3D"MsoNormal" style=3D"mso-margin-top-alt:auto;mso-margin-bottom-a=
lt:auto">&nbsp;<o:p></o:p></p>
</div>
<p class=3D"MsoNormal" style=3D"mso-margin-top-alt:auto;mso-margin-bottom-a=
lt:auto">&nbsp;<o:p></o:p></p>
<div>
<p class=3D"MsoNormal" style=3D"mso-margin-top-alt:auto;mso-margin-bottom-a=
lt:auto">2013/2/20 Mike Jones &lt;<a href=3D"mailto:Michael.Jones@microsoft=
.com" target=3D"_blank">Michael.Jones@microsoft.com</a>&gt;<o:p></o:p></p>
<div>
<div>
<p class=3D"MsoNormal" style=3D"mso-margin-top-alt:auto;mso-margin-bottom-a=
lt:auto"><span style=3D"font-size:11.0pt;font-family:&quot;Calibri&quot;,&q=
uot;sans-serif&quot;;color:#1F497D">For what it&#8217;s worth, the name &#8=
220;registration_access_url&#8221; was chosen to be parallel to &#8220;regi=
stration_access_token&#8221;.&nbsp;&nbsp;
 It&#8217;s the place you use the access token.&nbsp; And it&#8217;s where =
you access an existing registration.&nbsp; I&#8217;m against the name &#822=
0;client_metadata_url&#8221; because it&#8217;s not metadata you&#8217;re a=
ccessing &#8211; it&#8217;s a registration you&#8217;re accessing.&nbsp; Fo=
r the same reason, I don&#8217;t think
 the name &#8220;client_info_url&#8221; gives people the right idea, becaus=
e it doesn&#8217;t say anything it being the registration that you&#8217;re=
 accessing.</span><o:p></o:p></p>
<p class=3D"MsoNormal" style=3D"mso-margin-top-alt:auto;mso-margin-bottom-a=
lt:auto"><span style=3D"font-size:11.0pt;font-family:&quot;Calibri&quot;,&q=
uot;sans-serif&quot;;color:#1F497D">&nbsp;</span><o:p></o:p></p>
<p class=3D"MsoNormal" style=3D"mso-margin-top-alt:auto;mso-margin-bottom-a=
lt:auto"><span style=3D"font-size:11.0pt;font-family:&quot;Calibri&quot;,&q=
uot;sans-serif&quot;;color:#1F497D">If you really want us to change this, h=
aving read what&#8217;s above, I could live with &#8220;client_registration=
_url&#8221;,
 but I don&#8217;t think a change is actually necessary.&nbsp; (But if we a=
re going to change it, let&#8217;s do it ASAP, before the OpenID Connect Im=
plementer&#8217;s Drafts are published.)</span><o:p></o:p></p>
<p class=3D"MsoNormal" style=3D"mso-margin-top-alt:auto;mso-margin-bottom-a=
lt:auto"><span style=3D"font-size:11.0pt;font-family:&quot;Calibri&quot;,&q=
uot;sans-serif&quot;;color:#1F497D">&nbsp;</span><o:p></o:p></p>
<p class=3D"MsoNormal" style=3D"mso-margin-top-alt:auto;mso-margin-bottom-a=
lt:auto"><span style=3D"font-size:11.0pt;font-family:&quot;Calibri&quot;,&q=
uot;sans-serif&quot;;color:#1F497D">&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nb=
sp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;=
&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nb=
sp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;=
&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nb=
sp;&nbsp;&nbsp; -- Mike</span><o:p></o:p></p>
<p class=3D"MsoNormal" style=3D"mso-margin-top-alt:auto;mso-margin-bottom-a=
lt:auto"><span style=3D"font-size:11.0pt;font-family:&quot;Calibri&quot;,&q=
uot;sans-serif&quot;;color:#1F497D">&nbsp;</span><o:p></o:p></p>
<p class=3D"MsoNormal" style=3D"mso-margin-top-alt:auto;mso-margin-bottom-a=
lt:auto"><b><span style=3D"font-size:10.0pt;font-family:&quot;Tahoma&quot;,=
&quot;sans-serif&quot;">From:</span></b><span style=3D"font-size:10.0pt;fon=
t-family:&quot;Tahoma&quot;,&quot;sans-serif&quot;">
<a href=3D"mailto:oauth-bounces@ietf.org" target=3D"_blank">oauth-bounces@i=
etf.org</a> [mailto:<a href=3D"mailto:oauth-bounces@ietf.org" target=3D"_bl=
ank">oauth-bounces@ietf.org</a>]
<b>On Behalf Of </b>Nat Sakimura<br>
<b>Sent:</b> Wednesday, February 20, 2013 7:58 AM<br>
<b>To:</b> &lt;<a href=3D"mailto:oauth@ietf.org" target=3D"_blank">oauth@ie=
tf.org</a>&gt;; Richer, Justin P.; John Bradley</span><o:p></o:p></p>
<div>
<p class=3D"MsoNormal" style=3D"mso-margin-top-alt:auto;mso-margin-bottom-a=
lt:auto"><br>
<b>Subject:</b> Re: [OAUTH-WG] I-D Action: draft-ietf-oauth-dyn-reg-06.txt<=
o:p></o:p></p>
</div>
<p class=3D"MsoNormal" style=3D"mso-margin-top-alt:auto;mso-margin-bottom-a=
lt:auto">&nbsp;<o:p></o:p></p>
<p class=3D"MsoNormal" style=3D"mso-margin-top-alt:auto;mso-margin-bottom-a=
lt:auto"><span style=3D"font-size:13.5pt;font-family:&quot;Arial&quot;,&quo=
t;sans-serif&quot;;color:#222222;background:white">Thanks Justin.</span><o:=
p></o:p></p>
<div>
<div>
<p class=3D"MsoNormal" style=3D"mso-margin-top-alt:auto;mso-margin-bottom-a=
lt:auto"><span style=3D"font-size:13.5pt;font-family:&quot;Arial&quot;,&quo=
t;sans-serif&quot;;color:#222222"><br>
<br>
<span style=3D"background:white">Even if we go flat rather than doing JSON =
Structure, the &quot;Client</span><br>
<span style=3D"background:white">Registration Access Endpoint&quot; is not =
a good representative name.</span><br>
<br>
<span style=3D"background:white">What it represents is the client metadata/=
info.</span><br>
<span style=3D"background:white">It is not representing &quot;Client Regist=
ration Access&quot;.&nbsp;</span></span><o:p></o:p></p>
</div>
</div>
<div>
<div>
<div>
<p class=3D"MsoNormal" style=3D"mso-margin-top-alt:auto;mso-margin-bottom-a=
lt:auto">What does &quot;Client Registration Access&quot; mean?&nbsp;<o:p><=
/o:p></p>
</div>
<div>
<p class=3D"MsoNormal" style=3D"mso-margin-top-alt:auto;margin-bottom:12.0p=
t"><span style=3D"font-size:13.5pt;font-family:&quot;Arial&quot;,&quot;sans=
-serif&quot;;color:#222222;background:white">Does UPDATing &quot;Cleint Reg=
istration Access&quot; make sense?</span><br>
<span style=3D"font-size:13.5pt;font-family:&quot;Arial&quot;,&quot;sans-se=
rif&quot;;color:#222222"><br>
<span style=3D"background:white">Something in the line of &quot;Client Meta=
data Endpoint&quot; and</span><br>
<span style=3D"background:white">something like &quot;client_metadata_url&q=
uot; or&nbsp;&quot;client_info_url&quot; is much better.</span><br>
<br>
<span style=3D"background:white">Nat</span></span><o:p></o:p></p>
<div>
<p class=3D"MsoNormal" style=3D"mso-margin-top-alt:auto;mso-margin-bottom-a=
lt:auto">2013/2/15 Richer, Justin P. &lt;<a href=3D"mailto:jricher@mitre.or=
g" target=3D"_blank">jricher@mitre.org</a>&gt;<o:p></o:p></p>
<p class=3D"MsoNormal" style=3D"mso-margin-top-alt:auto;mso-margin-bottom-a=
lt:auto">Everyone, there's a new draft of DynReg up on the tracker. This dr=
aft tries to codify the discussions so far from this week into something we=
 can all read. There are still plenty
 of open discussion points and items up for debate. Please read through thi=
s latest draft and see what's changed and help assure that it properly capt=
ures the conversations. If you have any inputs for the marked [[ Editor's N=
ote ]] sections, please send them
 to the list by next Thursday to give me opportunity to get any necessary c=
hanges in by the cutoff date of Monday the 22nd.<br>
<br>
Thanks for all of your hard work everyone, I think this is *really* coming =
along now.<br>
<span style=3D"color:#888888"><br>
&nbsp;-- Justin</span><o:p></o:p></p>
<div>
<div>
<p class=3D"MsoNormal" style=3D"mso-margin-top-alt:auto;mso-margin-bottom-a=
lt:auto"><br>
On Feb 15, 2013, at 4:54 PM, <a href=3D"mailto:internet-drafts@ietf.org" ta=
rget=3D"_blank">
internet-drafts@ietf.org</a> wrote:<br>
<br>
&gt;<br>
&gt; A New Internet-Draft is available from the on-line Internet-Drafts dir=
ectories.<br>
&gt; This draft is a work item of the Web Authorization Protocol Working Gr=
oup of the IETF.<br>
&gt;<br>
&gt; &nbsp; &nbsp; &nbsp; Title &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; : OAuth =
Dynamic Client Registration Protocol<br>
&gt; &nbsp; &nbsp; &nbsp; Author(s) &nbsp; &nbsp; &nbsp; : Justin Richer<br=
>
&gt; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; =
&nbsp; &nbsp; &nbsp;John Bradley<br>
&gt; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; =
&nbsp; &nbsp; &nbsp;Michael B. Jones<br>
&gt; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; =
&nbsp; &nbsp; &nbsp;Maciej Machulak<br>
&gt; &nbsp; &nbsp; &nbsp; Filename &nbsp; &nbsp; &nbsp; &nbsp;: draft-ietf-=
oauth-dyn-reg-06.txt<br>
&gt; &nbsp; &nbsp; &nbsp; Pages &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; : 21<br>
&gt; &nbsp; &nbsp; &nbsp; Date &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp;: 2=
013-02-15<br>
&gt;<br>
&gt; Abstract:<br>
&gt; &nbsp; This specification defines an endpoint and protocol for dynamic=
<br>
&gt; &nbsp; registration of OAuth Clients at an Authorization Server.<br>
&gt;<br>
&gt;<br>
&gt; The IETF datatracker status page for this draft is:<br>
&gt; <a href=3D"https://datatracker.ietf.org/doc/draft-ietf-oauth-dyn-reg" =
target=3D"_blank">
https://datatracker.ietf.org/doc/draft-ietf-oauth-dyn-reg</a><br>
&gt;<br>
&gt; There's also a htmlized version available at:<br>
&gt; <a href=3D"http://tools.ietf.org/html/draft-ietf-oauth-dyn-reg-06" tar=
get=3D"_blank">
http://tools.ietf.org/html/draft-ietf-oauth-dyn-reg-06</a><br>
&gt;<br>
&gt; A diff from the previous version is available at:<br>
&gt; <a href=3D"http://www.ietf.org/rfcdiff?url2=3Ddraft-ietf-oauth-dyn-reg=
-06" target=3D"_blank">
http://www.ietf.org/rfcdiff?url2=3Ddraft-ietf-oauth-dyn-reg-06</a><br>
&gt;<br>
&gt;<br>
&gt; Internet-Drafts are also available by anonymous FTP at:<br>
&gt; <a href=3D"ftp://ftp.ietf.org/internet-drafts/" target=3D"_blank">ftp:=
//ftp.ietf.org/internet-drafts/</a><br>
&gt;<br>
&gt; _______________________________________________<br>
&gt; OAuth mailing list<br>
&gt; <a href=3D"mailto:OAuth@ietf.org" target=3D"_blank">OAuth@ietf.org</a>=
<br>
&gt; <a href=3D"https://www.ietf.org/mailman/listinfo/oauth" target=3D"_bla=
nk">https://www.ietf.org/mailman/listinfo/oauth</a><br>
<br>
_______________________________________________<br>
OAuth mailing list<br>
<a href=3D"mailto:OAuth@ietf.org" target=3D"_blank">OAuth@ietf.org</a><br>
<a href=3D"https://www.ietf.org/mailman/listinfo/oauth" target=3D"_blank">h=
ttps://www.ietf.org/mailman/listinfo/oauth</a><o:p></o:p></p>
</div>
</div>
</div>
<p class=3D"MsoNormal" style=3D"mso-margin-top-alt:auto;mso-margin-bottom-a=
lt:auto"><br>
<br clear=3D"all">
<o:p></o:p></p>
<div>
<p class=3D"MsoNormal" style=3D"mso-margin-top-alt:auto;mso-margin-bottom-a=
lt:auto">&nbsp;<o:p></o:p></p>
</div>
<p class=3D"MsoNormal" style=3D"mso-margin-top-alt:auto;mso-margin-bottom-a=
lt:auto">--
<br>
Nat Sakimura (=3Dnat)<o:p></o:p></p>
<div>
<p class=3D"MsoNormal" style=3D"mso-margin-top-alt:auto;mso-margin-bottom-a=
lt:auto">Chairman, OpenID Foundation<br>
<a href=3D"http://nat.sakimura.org/" target=3D"_blank">http://nat.sakimura.=
org/</a><br>
@_nat_en<o:p></o:p></p>
</div>
</div>
</div>
</div>
</div>
</div>
</div>
<p class=3D"MsoNormal" style=3D"mso-margin-top-alt:auto;mso-margin-bottom-a=
lt:auto"><br>
<br clear=3D"all">
<o:p></o:p></p>
<div>
<p class=3D"MsoNormal" style=3D"mso-margin-top-alt:auto;mso-margin-bottom-a=
lt:auto">&nbsp;<o:p></o:p></p>
</div>
<p class=3D"MsoNormal" style=3D"mso-margin-top-alt:auto;mso-margin-bottom-a=
lt:auto">--
<br>
Nat Sakimura (=3Dnat)<o:p></o:p></p>
<div>
<p class=3D"MsoNormal" style=3D"mso-margin-top-alt:auto;mso-margin-bottom-a=
lt:auto">Chairman, OpenID Foundation<br>
<a href=3D"http://nat.sakimura.org/" target=3D"_blank">http://nat.sakimura.=
org/</a><br>
@_nat_en<o:p></o:p></p>
</div>
</div>
</div>
</div>
</div>
</div>
</div>
</div>
<p class=3D"MsoNormal" style=3D"mso-margin-top-alt:auto;mso-margin-bottom-a=
lt:auto"><br>
<br clear=3D"all">
<o:p></o:p></p>
<div>
<p class=3D"MsoNormal" style=3D"mso-margin-top-alt:auto;mso-margin-bottom-a=
lt:auto">&nbsp;<o:p></o:p></p>
</div>
<p class=3D"MsoNormal" style=3D"mso-margin-top-alt:auto;mso-margin-bottom-a=
lt:auto">--
<br>
Nat Sakimura (=3Dnat) <o:p></o:p></p>
<div>
<p class=3D"MsoNormal" style=3D"mso-margin-top-alt:auto;mso-margin-bottom-a=
lt:auto">Chairman, OpenID Foundation<br>
<a href=3D"http://nat.sakimura.org/" target=3D"_blank">http://nat.sakimura.=
org/</a><br>
@_nat_en<o:p></o:p></p>
</div>
</div>
</blockquote>
<p class=3D"MsoNormal" style=3D"mso-margin-top-alt:auto;mso-margin-bottom-a=
lt:auto">&nbsp;<o:p></o:p></p>
</div>
</blockquote>
<p class=3D"MsoNormal"><o:p>&nbsp;</o:p></p>
</div>
</div>
<p class=3D"MsoNormal"><o:p>&nbsp;</o:p></p>
</div>
</div>
</div>
</div>
<p class=3D"MsoNormal"><br>
<br clear=3D"all">
<o:p></o:p></p>
<div>
<p class=3D"MsoNormal"><o:p>&nbsp;</o:p></p>
</div>
<p class=3D"MsoNormal">-- <br>
Nat Sakimura (=3Dnat)<o:p></o:p></p>
<div>
<p class=3D"MsoNormal">Chairman, OpenID Foundation<br>
<a href=3D"http://nat.sakimura.org/" target=3D"_blank">http://nat.sakimura.=
org/</a><br>
@_nat_en<o:p></o:p></p>
</div>
</div>
</div>
</body>
</html>

--_000_4E1F6AAD24975D4BA5B16804296739436747BA8ETK5EX14MBXC284r_--

From donald.coffin@reminetworks.com  Wed Feb 20 13:08:36 2013
Return-Path: <donald.coffin@reminetworks.com>
X-Original-To: oauth@ietfa.amsl.com
Delivered-To: oauth@ietfa.amsl.com
Received: from localhost (localhost [127.0.0.1]) by ietfa.amsl.com (Postfix) with ESMTP id B14C621F866F for <oauth@ietfa.amsl.com>; Wed, 20 Feb 2013 13:08:36 -0800 (PST)
X-Virus-Scanned: amavisd-new at amsl.com
X-Spam-Flag: NO
X-Spam-Score: -1.912
X-Spam-Level: 
X-Spam-Status: No, score=-1.912 tagged_above=-999 required=5 tests=[AWL=0.352,  BAYES_00=-2.599, HTML_MESSAGE=0.001, IP_NOT_FRIENDLY=0.334]
Received: from mail.ietf.org ([64.170.98.30]) by localhost (ietfa.amsl.com [127.0.0.1]) (amavisd-new, port 10024) with ESMTP id I74elJ9Ljwq0 for <oauth@ietfa.amsl.com>; Wed, 20 Feb 2013 13:08:35 -0800 (PST)
Received: from oproxy13-pub.unifiedlayer.com (oproxy13-pub.unifiedlayer.com [69.89.16.30]) by ietfa.amsl.com (Postfix) with SMTP id 04B1321F84C6 for <oauth@ietf.org>; Wed, 20 Feb 2013 13:08:34 -0800 (PST)
Received: (qmail 16388 invoked by uid 0); 20 Feb 2013 21:08:12 -0000
Received: from unknown (HELO host125.hostmonster.com) (74.220.207.125) by oproxy13.unifiedlayer.com with SMTP; 20 Feb 2013 21:08:12 -0000
DKIM-Signature: v=1; a=rsa-sha256; q=dns/txt; c=relaxed/relaxed; d=reminetworks.com; s=default;  h=Content-Type:MIME-Version:Message-ID:Date:Subject:In-Reply-To:References:Cc:To:From; bh=PKeqb1YftSFhvZ/uNHWymFUEUdDaoc7M22ar+EkUhNI=;  b=Iqan69hjwIr0IRm4iHFFrJNnis15na0eAYdNJ1rv4HScyFyGx8D6g5aQtvTk113W9CCp93Iu0GLv84+06dSAQX1E/2QeVcz+b93fmbsYnNzLT3dCBTF2lzU89ATqxNhs;
Received: from [68.4.207.246] (port=2957 helo=HPPavilionElite) by host125.hostmonster.com with esmtpa (Exim 4.80) (envelope-from <donald.coffin@reminetworks.com>) id 1U8Gtg-0003rc-7Q; Wed, 20 Feb 2013 14:08:12 -0700
From: "Donald F Coffin" <donald.coffin@reminetworks.com>
To: "'Mike Jones'" <Michael.Jones@microsoft.com>, "'Justin Richer'" <jricher@mitre.org>
References: <00ac01ce0fa0$a1325f20$e3971d60$@reminetworks.com> <4E1F6AAD24975D4BA5B16804296739436747B862@TK5EX14MBXC284.redmond.corp.microsoft.com>
In-Reply-To: <4E1F6AAD24975D4BA5B16804296739436747B862@TK5EX14MBXC284.redmond.corp.microsoft.com>
Date: Wed, 20 Feb 2013 13:06:54 -0800
Message-ID: <00ee01ce0fae$36604cd0$a320e670$@reminetworks.com>
MIME-Version: 1.0
Content-Type: multipart/alternative; boundary="----=_NextPart_000_00EF_01CE0F6B.283F56C0"
X-Mailer: Microsoft Outlook 14.0
Thread-Index: AQE1OXACFOQN9aNJEkIF7iLiv9DvKwKF7FRdmaC6C/A=
Content-Language: en-us
X-Identified-User: {1395:host125.hostmonster.com:reminetw:reminetworks.com} {sentby:smtp auth 68.4.207.246 authed with donald.coffin@reminetworks.com}
Cc: oauth@ietf.org
Subject: Re: [OAUTH-WG] Additional Oauth Dynamic Client Registration Protocol	Information
X-BeenThere: oauth@ietf.org
X-Mailman-Version: 2.1.12
Precedence: list
List-Id: OAUTH WG <oauth.ietf.org>
List-Unsubscribe: <https://www.ietf.org/mailman/options/oauth>, <mailto:oauth-request@ietf.org?subject=unsubscribe>
List-Archive: <http://www.ietf.org/mail-archive/web/oauth>
List-Post: <mailto:oauth@ietf.org>
List-Help: <mailto:oauth-request@ietf.org?subject=help>
List-Subscribe: <https://www.ietf.org/mailman/listinfo/oauth>, <mailto:oauth-request@ietf.org?subject=subscribe>
X-List-Received-Date: Wed, 20 Feb 2013 21:08:36 -0000

This is a multipart message in MIME format.

------=_NextPart_000_00EF_01CE0F6B.283F56C0
Content-Type: text/plain;
	charset="us-ascii"
Content-Transfer-Encoding: 7bit

Mike,

 

Thanks for the information.

 

Best regards,

Don

Donald F. Coffin

Founder/CTO

 

REMI Networks

22751 El Prado Suite 6216

Rancho Santa Margarita, CA  92688-3836

 

Phone:      (949) 636-8571

Email:        <mailto:donald.coffin@reminetworks.com>
donald.coffin@reminetworks.com

 

From: Mike Jones [mailto:Michael.Jones@microsoft.com] 
Sent: Wednesday, February 20, 2013 11:38 AM
To: Donald F Coffin; Justin Richer
Cc: oauth@ietf.org
Subject: RE: [OAUTH-WG] Additional Oauth Dynamic Client Registration
Protocol Information

 

Hi Don,

 

Discovery is a process that happens before Registration, and that's the
point at which you would return the AS (and registration!) endpoints to the
Client.  The OAuth WG considered doing its own discovery work but ultimately
decided to have that happen in the Apps Area WG instead, which is close to
completing the WebFinger discovery specification.

 

If you want to see how OpenID Connect is performing discovery using
WebFinger, including discovery of the AS endpoint, have a look at
http://openid.net/specs/openid-connect-discovery-1_0.html.

 

                                                                Best wishes,

                                                                -- Mike

 

From: oauth-bounces@ietf.org [mailto:oauth-bounces@ietf.org] On Behalf Of
Donald F Coffin
Sent: Wednesday, February 20, 2013 11:30 AM
To: Justin Richer
Cc: oauth@ietf.org
Subject: [OAUTH-WG] Additional Oauth Dynamic Client Registration Protocol
Information

 

Justin,

 

I understand the current Client Registration request and response
information is based on the OPENID model for consistency, but has there been
any thought or discussion of adding the AS OAuth 2.0 endpoint URIs as part
of the registration response?  I believe the addition of the endpoint URIs
would make the dynamic client registration process truly a dynamic feature
of OAuth 2.0.

 

If the ability to discover the AS OAuth 2.0 endpoint URIs is being covered
by another IETF draft, I'd appreciate learning which current draft is being
worked on to achieve that result.

 

Best regards,

Don

Donald F. Coffin

Founder/CTO

 

REMI Networks

22751 El Prado Suite 6216

Rancho Santa Margarita, CA  92688-3836

 

Phone:      (949) 636-8571

Email:       donald.coffin@reminetworks.com

 


------=_NextPart_000_00EF_01CE0F6B.283F56C0
Content-Type: text/html;
	charset="us-ascii"
Content-Transfer-Encoding: quoted-printable

<html xmlns:v=3D"urn:schemas-microsoft-com:vml" =
xmlns:o=3D"urn:schemas-microsoft-com:office:office" =
xmlns:w=3D"urn:schemas-microsoft-com:office:word" =
xmlns:m=3D"http://schemas.microsoft.com/office/2004/12/omml" =
xmlns=3D"http://www.w3.org/TR/REC-html40"><head><meta =
http-equiv=3DContent-Type content=3D"text/html; =
charset=3Dus-ascii"><meta name=3DGenerator content=3D"Microsoft Word 14 =
(filtered medium)"><style><!--
/* Font Definitions */
@font-face
	{font-family:"Cambria Math";
	panose-1:2 4 5 3 5 4 6 3 2 4;}
@font-face
	{font-family:Cambria;
	panose-1:2 4 5 3 5 4 6 3 2 4;}
@font-face
	{font-family:Calibri;
	panose-1:2 15 5 2 2 2 4 3 2 4;}
@font-face
	{font-family:Tahoma;
	panose-1:2 11 6 4 3 5 4 4 2 4;}
@font-face
	{font-family:"Brush Script MT";
	panose-1:3 6 8 2 4 4 6 7 3 4;}
/* Style Definitions */
p.MsoNormal, li.MsoNormal, div.MsoNormal
	{margin:0in;
	margin-bottom:.0001pt;
	font-size:11.0pt;
	font-family:"Calibri","sans-serif";}
a:link, span.MsoHyperlink
	{mso-style-priority:99;
	color:blue;
	text-decoration:underline;}
a:visited, span.MsoHyperlinkFollowed
	{mso-style-priority:99;
	color:purple;
	text-decoration:underline;}
p.MsoAcetate, li.MsoAcetate, div.MsoAcetate
	{mso-style-priority:99;
	mso-style-link:"Balloon Text Char";
	margin:0in;
	margin-bottom:.0001pt;
	font-size:8.0pt;
	font-family:"Tahoma","sans-serif";}
span.EmailStyle17
	{mso-style-type:personal;
	font-family:"Cambria","serif";
	color:windowtext;}
span.EmailStyle18
	{mso-style-type:personal;
	font-family:"Calibri","sans-serif";
	color:#1F497D;}
span.BalloonTextChar
	{mso-style-name:"Balloon Text Char";
	mso-style-priority:99;
	mso-style-link:"Balloon Text";
	font-family:"Tahoma","sans-serif";}
span.EmailStyle21
	{mso-style-type:personal-reply;
	font-family:"Cambria","serif";
	color:windowtext;
	font-weight:normal;
	font-style:normal;}
.MsoChpDefault
	{mso-style-type:export-only;
	font-size:10.0pt;}
@page WordSection1
	{size:8.5in 11.0in;
	margin:1.0in 1.0in 1.0in 1.0in;}
div.WordSection1
	{page:WordSection1;}
--></style><!--[if gte mso 9]><xml>
<o:shapedefaults v:ext=3D"edit" spidmax=3D"1026" />
</xml><![endif]--><!--[if gte mso 9]><xml>
<o:shapelayout v:ext=3D"edit">
<o:idmap v:ext=3D"edit" data=3D"1" />
</o:shapelayout></xml><![endif]--></head><body lang=3DEN-US link=3Dblue =
vlink=3Dpurple><div class=3DWordSection1><p class=3DMsoNormal><span =
style=3D'font-size:12.0pt;font-family:"Cambria","serif"'>Mike,<o:p></o:p>=
</span></p><p class=3DMsoNormal><span =
style=3D'font-size:12.0pt;font-family:"Cambria","serif"'><o:p>&nbsp;</o:p=
></span></p><p class=3DMsoNormal><span =
style=3D'font-size:12.0pt;font-family:"Cambria","serif"'>Thanks for the =
information.<o:p></o:p></span></p><p class=3DMsoNormal><span =
style=3D'font-size:12.0pt;font-family:"Cambria","serif"'><o:p>&nbsp;</o:p=
></span></p><div><p class=3DMsoNormal><span =
style=3D'font-size:12.0pt'>Best regards,<o:p></o:p></span></p><p =
class=3DMsoNormal><span style=3D'font-size:24.0pt;font-family:"Brush =
Script MT"'>Don<o:p></o:p></span></p><p class=3DMsoNormal><span =
style=3D'font-size:12.0pt'>Donald F. Coffin<o:p></o:p></span></p><p =
class=3DMsoNormal><span =
style=3D'font-size:12.0pt'>Founder/CTO<o:p></o:p></span></p><p =
class=3DMsoNormal><span =
style=3D'font-size:12.0pt'><o:p>&nbsp;</o:p></span></p><p =
class=3DMsoNormal><span style=3D'font-size:12.0pt'>REMI =
Networks<o:p></o:p></span></p><p class=3DMsoNormal><span =
style=3D'font-size:12.0pt'>22751 El Prado Suite =
6216<o:p></o:p></span></p><p class=3DMsoNormal><span =
style=3D'font-size:12.0pt'>Rancho Santa Margarita, CA&nbsp; =
92688-3836<o:p></o:p></span></p><p class=3DMsoNormal><span =
style=3D'font-size:12.0pt'><o:p>&nbsp;</o:p></span></p><p =
class=3DMsoNormal><span =
style=3D'font-size:12.0pt'>Phone:&nbsp;&nbsp;&nbsp;&nbsp;&nbsp; (949) =
636-8571<o:p></o:p></span></p><p class=3DMsoNormal><span =
style=3D'font-size:12.0pt'>Email:&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp; <a =
href=3D"mailto:donald.coffin@reminetworks.com"><span =
style=3D'color:blue'>donald.coffin@reminetworks.com</span></a><o:p></o:p>=
</span></p></div><p class=3DMsoNormal><span =
style=3D'font-size:12.0pt;font-family:"Cambria","serif"'><o:p>&nbsp;</o:p=
></span></p><div><div style=3D'border:none;border-top:solid #B5C4DF =
1.0pt;padding:3.0pt 0in 0in 0in'><p class=3DMsoNormal><b><span =
style=3D'font-size:10.0pt;font-family:"Tahoma","sans-serif"'>From:</span>=
</b><span style=3D'font-size:10.0pt;font-family:"Tahoma","sans-serif"'> =
Mike Jones [mailto:Michael.Jones@microsoft.com] <br><b>Sent:</b> =
Wednesday, February 20, 2013 11:38 AM<br><b>To:</b> Donald F Coffin; =
Justin Richer<br><b>Cc:</b> oauth@ietf.org<br><b>Subject:</b> RE: =
[OAUTH-WG] Additional Oauth Dynamic Client Registration Protocol =
Information<o:p></o:p></span></p></div></div><p =
class=3DMsoNormal><o:p>&nbsp;</o:p></p><p class=3DMsoNormal><span =
style=3D'color:#1F497D'>Hi Don,<o:p></o:p></span></p><p =
class=3DMsoNormal><span =
style=3D'color:#1F497D'><o:p>&nbsp;</o:p></span></p><p =
class=3DMsoNormal><span style=3D'color:#1F497D'>Discovery is a process =
that happens before Registration, and that&#8217;s the point at which =
you would return the AS (and registration!) endpoints to the =
Client.&nbsp; The OAuth WG considered doing its own discovery work but =
ultimately decided to have that happen in the Apps Area WG instead, =
which is close to completing the WebFinger discovery =
specification.<o:p></o:p></span></p><p class=3DMsoNormal><span =
style=3D'color:#1F497D'><o:p>&nbsp;</o:p></span></p><p =
class=3DMsoNormal><span style=3D'color:#1F497D'>If you want to see how =
OpenID Connect is performing discovery using WebFinger, including =
discovery of the AS endpoint, have a look at <a =
href=3D"http://openid.net/specs/openid-connect-discovery-1_0.html">http:/=
/openid.net/specs/openid-connect-discovery-1_0.html</a>.<o:p></o:p></span=
></p><p class=3DMsoNormal><span =
style=3D'color:#1F497D'><o:p>&nbsp;</o:p></span></p><p =
class=3DMsoNormal><span =
style=3D'color:#1F497D'>&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&=
nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&n=
bsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nb=
sp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbs=
p;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp=
;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp; Best =
wishes,<o:p></o:p></span></p><p class=3DMsoNormal><span =
style=3D'color:#1F497D'>&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&=
nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&n=
bsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nb=
sp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbs=
p;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp=
;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp; -- Mike<o:p></o:p></span></p><p =
class=3DMsoNormal><span =
style=3D'color:#1F497D'><o:p>&nbsp;</o:p></span></p><div><div =
style=3D'border:none;border-top:solid #B5C4DF 1.0pt;padding:3.0pt 0in =
0in 0in'><p class=3DMsoNormal><b><span =
style=3D'font-size:10.0pt;font-family:"Tahoma","sans-serif"'>From:</span>=
</b><span style=3D'font-size:10.0pt;font-family:"Tahoma","sans-serif"'> =
<a href=3D"mailto:oauth-bounces@ietf.org">oauth-bounces@ietf.org</a> [<a =
href=3D"mailto:oauth-bounces@ietf.org">mailto:oauth-bounces@ietf.org</a>]=
 <b>On Behalf Of </b>Donald F Coffin<br><b>Sent:</b> Wednesday, February =
20, 2013 11:30 AM<br><b>To:</b> Justin Richer<br><b>Cc:</b> <a =
href=3D"mailto:oauth@ietf.org">oauth@ietf.org</a><br><b>Subject:</b> =
[OAUTH-WG] Additional Oauth Dynamic Client Registration Protocol =
Information<o:p></o:p></span></p></div></div><p =
class=3DMsoNormal><o:p>&nbsp;</o:p></p><p class=3DMsoNormal><span =
style=3D'font-size:12.0pt;font-family:"Cambria","serif"'>Justin,<o:p></o:=
p></span></p><p class=3DMsoNormal><span =
style=3D'font-size:12.0pt;font-family:"Cambria","serif"'><o:p>&nbsp;</o:p=
></span></p><p class=3DMsoNormal><span =
style=3D'font-size:12.0pt;font-family:"Cambria","serif"'>I understand =
the current Client Registration request and response information is =
based on the OPENID model for consistency, but has there been any =
thought or discussion of adding the AS OAuth 2.0 endpoint URIs as part =
of the registration response?&nbsp; I believe the addition of the =
endpoint URIs would make the dynamic client registration process truly a =
dynamic feature of OAuth 2.0.<o:p></o:p></span></p><p =
class=3DMsoNormal><span =
style=3D'font-size:12.0pt;font-family:"Cambria","serif"'><o:p>&nbsp;</o:p=
></span></p><p class=3DMsoNormal><span =
style=3D'font-size:12.0pt;font-family:"Cambria","serif"'>If the ability =
to discover the AS OAuth 2.0 endpoint URIs is being covered by another =
IETF draft, I&#8217;d appreciate learning which current draft is being =
worked on to achieve that result.<o:p></o:p></span></p><p =
class=3DMsoNormal><span =
style=3D'font-size:12.0pt;font-family:"Cambria","serif"'><o:p>&nbsp;</o:p=
></span></p><p class=3DMsoNormal><span style=3D'font-size:12.0pt'>Best =
regards,<o:p></o:p></span></p><p class=3DMsoNormal><span =
style=3D'font-size:24.0pt;font-family:"Brush Script =
MT"'>Don<o:p></o:p></span></p><p class=3DMsoNormal><span =
style=3D'font-size:12.0pt'>Donald F. Coffin<o:p></o:p></span></p><p =
class=3DMsoNormal><span =
style=3D'font-size:12.0pt'>Founder/CTO<o:p></o:p></span></p><p =
class=3DMsoNormal><span =
style=3D'font-size:12.0pt'><o:p>&nbsp;</o:p></span></p><p =
class=3DMsoNormal><span style=3D'font-size:12.0pt'>REMI =
Networks<o:p></o:p></span></p><p class=3DMsoNormal><span =
style=3D'font-size:12.0pt'>22751 El Prado Suite =
6216<o:p></o:p></span></p><p class=3DMsoNormal><span =
style=3D'font-size:12.0pt'>Rancho Santa Margarita, CA&nbsp; =
92688-3836<o:p></o:p></span></p><p class=3DMsoNormal><span =
style=3D'font-size:12.0pt'><o:p>&nbsp;</o:p></span></p><p =
class=3DMsoNormal><span =
style=3D'font-size:12.0pt'>Phone:&nbsp;&nbsp;&nbsp;&nbsp;&nbsp; (949) =
636-8571<o:p></o:p></span></p><p class=3DMsoNormal><span =
style=3D'font-size:12.0pt'>Email:&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp; <a =
href=3D"mailto:donald.coffin@reminetworks.com">donald.coffin@reminetworks=
.com</a><o:p></o:p></span></p><p =
class=3DMsoNormal><o:p>&nbsp;</o:p></p></div></body></html>
------=_NextPart_000_00EF_01CE0F6B.283F56C0--


From donald.coffin@reminetworks.com  Wed Feb 20 13:09:45 2013
Return-Path: <donald.coffin@reminetworks.com>
X-Original-To: oauth@ietfa.amsl.com
Delivered-To: oauth@ietfa.amsl.com
Received: from localhost (localhost [127.0.0.1]) by ietfa.amsl.com (Postfix) with ESMTP id BA1B521E8048 for <oauth@ietfa.amsl.com>; Wed, 20 Feb 2013 13:09:44 -0800 (PST)
X-Virus-Scanned: amavisd-new at amsl.com
X-Spam-Flag: NO
X-Spam-Score: -2.109
X-Spam-Level: 
X-Spam-Status: No, score=-2.109 tagged_above=-999 required=5 tests=[AWL=0.489,  BAYES_00=-2.599, HTML_MESSAGE=0.001]
Received: from mail.ietf.org ([64.170.98.30]) by localhost (ietfa.amsl.com [127.0.0.1]) (amavisd-new, port 10024) with ESMTP id 1pv4H0myM+yt for <oauth@ietfa.amsl.com>; Wed, 20 Feb 2013 13:09:43 -0800 (PST)
Received: from oproxy1-pub.bluehost.com (oproxy1-pub.bluehost.com [66.147.249.253]) by ietfa.amsl.com (Postfix) with SMTP id ACCED21E803F for <oauth@ietf.org>; Wed, 20 Feb 2013 13:09:19 -0800 (PST)
Received: (qmail 5858 invoked by uid 0); 20 Feb 2013 21:08:58 -0000
Received: from unknown (HELO host125.hostmonster.com) (74.220.207.125) by oproxy1.bluehost.com with SMTP; 20 Feb 2013 21:08:58 -0000
DKIM-Signature: v=1; a=rsa-sha256; q=dns/txt; c=relaxed/relaxed; d=reminetworks.com; s=default;  h=Content-Type:MIME-Version:Message-ID:Date:Subject:In-Reply-To:References:Cc:To:From; bh=16W9eeA8jUEbxe6tReztP1w0og4LtZX+pusHD/apwKk=;  b=wuxZAWzKF3olbr0jZoT/F4Qnpuu+NfrscF5Q0TkkhdPW5TIHmb3X1h2+G2HfUAhyox5KzGo9ZJH12qazVRPxxtpuc9sqA/MX6VUkZplhXjZPFxL14HajCOhzaLfwhqFo;
Received: from [68.4.207.246] (port=2970 helo=HPPavilionElite) by host125.hostmonster.com with esmtpa (Exim 4.80) (envelope-from <donald.coffin@reminetworks.com>) id 1U8GuP-0004Mf-Tx; Wed, 20 Feb 2013 14:08:58 -0700
From: "Donald F Coffin" <donald.coffin@reminetworks.com>
To: "'Justin Richer'" <jricher@mitre.org>, "'Mike Jones'" <Michael.Jones@microsoft.com>
References: <00ac01ce0fa0$a1325f20$e3971d60$@reminetworks.com> <4E1F6AAD24975D4BA5B16804296739436747B862@TK5EX14MBXC284.redmond.corp.microsoft.com> <512528EE.8000303@mitre.org>
In-Reply-To: <512528EE.8000303@mitre.org>
Date: Wed, 20 Feb 2013 13:07:40 -0800
Message-ID: <00f301ce0fae$519ec990$f4dc5cb0$@reminetworks.com>
MIME-Version: 1.0
Content-Type: multipart/alternative; boundary="----=_NextPart_000_00F4_01CE0F6B.437DD380"
X-Mailer: Microsoft Outlook 14.0
Thread-Index: AQE1OXACFOQN9aNJEkIF7iLiv9DvKwKF7FRdAkl7UGmZjm5zMA==
Content-Language: en-us
X-Identified-User: {1395:host125.hostmonster.com:reminetw:reminetworks.com} {sentby:smtp auth 68.4.207.246 authed with donald.coffin@reminetworks.com}
Cc: oauth@ietf.org
Subject: Re: [OAUTH-WG] Additional Oauth Dynamic Client Registration Protocol Information
X-BeenThere: oauth@ietf.org
X-Mailman-Version: 2.1.12
Precedence: list
List-Id: OAUTH WG <oauth.ietf.org>
List-Unsubscribe: <https://www.ietf.org/mailman/options/oauth>, <mailto:oauth-request@ietf.org?subject=unsubscribe>
List-Archive: <http://www.ietf.org/mail-archive/web/oauth>
List-Post: <mailto:oauth@ietf.org>
List-Help: <mailto:oauth-request@ietf.org?subject=help>
List-Subscribe: <https://www.ietf.org/mailman/listinfo/oauth>, <mailto:oauth-request@ietf.org?subject=subscribe>
X-List-Received-Date: Wed, 20 Feb 2013 21:09:45 -0000

This is a multipart message in MIME format.

------=_NextPart_000_00F4_01CE0F6B.437DD380
Content-Type: text/plain;
	charset="us-ascii"
Content-Transfer-Encoding: 7bit

Justin,

 

Thanks for the information.

 

Best regards,

Don

Donald F. Coffin

Founder/CTO

 

REMI Networks

22751 El Prado Suite 6216

Rancho Santa Margarita, CA  92688-3836

 

Phone:      (949) 636-8571

Email:        <mailto:donald.coffin@reminetworks.com>
donald.coffin@reminetworks.com

 

From: Justin Richer [mailto:jricher@mitre.org] 
Sent: Wednesday, February 20, 2013 11:50 AM
To: Mike Jones
Cc: Donald F Coffin; oauth@ietf.org
Subject: Re: [OAUTH-WG] Additional Oauth Dynamic Client Registration
Protocol Information

 

Additionally, there is an individual draft that registers LRDD Link Types
for discovery using LRDD and HostMeta:

http://tools.ietf.org/html/draft-wmills-oauth-lrdd-07

 -- Justin

On 02/20/2013 02:37 PM, Mike Jones wrote:

Hi Don,

 

Discovery is a process that happens before Registration, and that's the
point at which you would return the AS (and registration!) endpoints to the
Client.  The OAuth WG considered doing its own discovery work but ultimately
decided to have that happen in the Apps Area WG instead, which is close to
completing the WebFinger discovery specification.

 

If you want to see how OpenID Connect is performing discovery using
WebFinger, including discovery of the AS endpoint, have a look at
http://openid.net/specs/openid-connect-discovery-1_0.html.

 

                                                                Best wishes,

                                                                -- Mike

 

From: oauth-bounces@ietf.org [mailto:oauth-bounces@ietf.org] On Behalf Of
Donald F Coffin
Sent: Wednesday, February 20, 2013 11:30 AM
To: Justin Richer
Cc: oauth@ietf.org
Subject: [OAUTH-WG] Additional Oauth Dynamic Client Registration Protocol
Information

 

Justin,

 

I understand the current Client Registration request and response
information is based on the OPENID model for consistency, but has there been
any thought or discussion of adding the AS OAuth 2.0 endpoint URIs as part
of the registration response?  I believe the addition of the endpoint URIs
would make the dynamic client registration process truly a dynamic feature
of OAuth 2.0.

 

If the ability to discover the AS OAuth 2.0 endpoint URIs is being covered
by another IETF draft, I'd appreciate learning which current draft is being
worked on to achieve that result.

 

Best regards,

Don

Donald F. Coffin

Founder/CTO

 

REMI Networks

22751 El Prado Suite 6216

Rancho Santa Margarita, CA  92688-3836

 

Phone:      (949) 636-8571

Email:       donald.coffin@reminetworks.com

 

 


------=_NextPart_000_00F4_01CE0F6B.437DD380
Content-Type: text/html;
	charset="us-ascii"
Content-Transfer-Encoding: quoted-printable

<html xmlns:v=3D"urn:schemas-microsoft-com:vml" =
xmlns:o=3D"urn:schemas-microsoft-com:office:office" =
xmlns:w=3D"urn:schemas-microsoft-com:office:word" =
xmlns:m=3D"http://schemas.microsoft.com/office/2004/12/omml" =
xmlns=3D"http://www.w3.org/TR/REC-html40"><head><meta =
http-equiv=3DContent-Type content=3D"text/html; =
charset=3Dus-ascii"><meta name=3DGenerator content=3D"Microsoft Word 14 =
(filtered medium)"><style><!--
/* Font Definitions */
@font-face
	{font-family:"Cambria Math";
	panose-1:2 4 5 3 5 4 6 3 2 4;}
@font-face
	{font-family:Cambria;
	panose-1:2 4 5 3 5 4 6 3 2 4;}
@font-face
	{font-family:Calibri;
	panose-1:2 15 5 2 2 2 4 3 2 4;}
@font-face
	{font-family:Tahoma;
	panose-1:2 11 6 4 3 5 4 4 2 4;}
@font-face
	{font-family:"Brush Script MT";
	panose-1:3 6 8 2 4 4 6 7 3 4;}
/* Style Definitions */
p.MsoNormal, li.MsoNormal, div.MsoNormal
	{margin:0in;
	margin-bottom:.0001pt;
	font-size:11.0pt;
	font-family:"Calibri","sans-serif";
	color:black;}
a:link, span.MsoHyperlink
	{mso-style-priority:99;
	color:blue;
	text-decoration:underline;}
a:visited, span.MsoHyperlinkFollowed
	{mso-style-priority:99;
	color:purple;
	text-decoration:underline;}
p.MsoAcetate, li.MsoAcetate, div.MsoAcetate
	{mso-style-priority:99;
	mso-style-link:"Balloon Text Char";
	margin:0in;
	margin-bottom:.0001pt;
	font-size:8.0pt;
	font-family:"Tahoma","sans-serif";
	color:black;}
span.EmailStyle17
	{mso-style-type:personal;
	font-family:"Cambria","serif";
	color:windowtext;}
span.EmailStyle18
	{mso-style-type:personal;
	font-family:"Calibri","sans-serif";
	color:#1F497D;}
span.BalloonTextChar
	{mso-style-name:"Balloon Text Char";
	mso-style-priority:99;
	mso-style-link:"Balloon Text";
	font-family:"Tahoma","sans-serif";
	color:black;}
span.EmailStyle21
	{mso-style-type:personal-reply;
	font-family:"Cambria","serif";
	color:windowtext;
	font-weight:normal;
	font-style:normal;}
.MsoChpDefault
	{mso-style-type:export-only;
	font-size:10.0pt;}
@page WordSection1
	{size:8.5in 11.0in;
	margin:1.0in 1.0in 1.0in 1.0in;}
div.WordSection1
	{page:WordSection1;}
--></style><!--[if gte mso 9]><xml>
<o:shapedefaults v:ext=3D"edit" spidmax=3D"1026" />
</xml><![endif]--><!--[if gte mso 9]><xml>
<o:shapelayout v:ext=3D"edit">
<o:idmap v:ext=3D"edit" data=3D"1" />
</o:shapelayout></xml><![endif]--></head><body bgcolor=3Dwhite =
lang=3DEN-US link=3Dblue vlink=3Dpurple><div class=3DWordSection1><p =
class=3DMsoNormal><span =
style=3D'font-size:12.0pt;font-family:"Cambria","serif";color:windowtext'=
>Justin,<o:p></o:p></span></p><p class=3DMsoNormal><span =
style=3D'font-size:12.0pt;font-family:"Cambria","serif";color:windowtext'=
><o:p>&nbsp;</o:p></span></p><p class=3DMsoNormal><span =
style=3D'font-size:12.0pt;font-family:"Cambria","serif";color:windowtext'=
>Thanks for the information.<o:p></o:p></span></p><p =
class=3DMsoNormal><span =
style=3D'font-size:12.0pt;font-family:"Cambria","serif";color:windowtext'=
><o:p>&nbsp;</o:p></span></p><div><p class=3DMsoNormal><span =
style=3D'font-size:12.0pt;color:windowtext'>Best =
regards,<o:p></o:p></span></p><p class=3DMsoNormal><span =
style=3D'font-size:24.0pt;font-family:"Brush Script =
MT";color:windowtext'>Don<o:p></o:p></span></p><p =
class=3DMsoNormal><span =
style=3D'font-size:12.0pt;color:windowtext'>Donald F. =
Coffin<o:p></o:p></span></p><p class=3DMsoNormal><span =
style=3D'font-size:12.0pt;color:windowtext'>Founder/CTO<o:p></o:p></span>=
</p><p class=3DMsoNormal><span =
style=3D'font-size:12.0pt;color:windowtext'><o:p>&nbsp;</o:p></span></p><=
p class=3DMsoNormal><span =
style=3D'font-size:12.0pt;color:windowtext'>REMI =
Networks<o:p></o:p></span></p><p class=3DMsoNormal><span =
style=3D'font-size:12.0pt;color:windowtext'>22751 El Prado Suite =
6216<o:p></o:p></span></p><p class=3DMsoNormal><span =
style=3D'font-size:12.0pt;color:windowtext'>Rancho Santa Margarita, =
CA&nbsp; 92688-3836<o:p></o:p></span></p><p class=3DMsoNormal><span =
style=3D'font-size:12.0pt;color:windowtext'><o:p>&nbsp;</o:p></span></p><=
p class=3DMsoNormal><span =
style=3D'font-size:12.0pt;color:windowtext'>Phone:&nbsp;&nbsp;&nbsp;&nbsp=
;&nbsp; (949) 636-8571<o:p></o:p></span></p><p class=3DMsoNormal><span =
style=3D'font-size:12.0pt;color:windowtext'>Email:&nbsp;&nbsp;&nbsp;&nbsp=
;&nbsp;&nbsp; <a href=3D"mailto:donald.coffin@reminetworks.com"><span =
style=3D'color:blue'>donald.coffin@reminetworks.com</span></a><o:p></o:p>=
</span></p></div><p class=3DMsoNormal><span =
style=3D'font-size:12.0pt;font-family:"Cambria","serif";color:windowtext'=
><o:p>&nbsp;</o:p></span></p><div><div =
style=3D'border:none;border-top:solid #B5C4DF 1.0pt;padding:3.0pt 0in =
0in 0in'><p class=3DMsoNormal><b><span =
style=3D'font-size:10.0pt;font-family:"Tahoma","sans-serif";color:windowt=
ext'>From:</span></b><span =
style=3D'font-size:10.0pt;font-family:"Tahoma","sans-serif";color:windowt=
ext'> Justin Richer [mailto:jricher@mitre.org] <br><b>Sent:</b> =
Wednesday, February 20, 2013 11:50 AM<br><b>To:</b> Mike =
Jones<br><b>Cc:</b> Donald F Coffin; oauth@ietf.org<br><b>Subject:</b> =
Re: [OAUTH-WG] Additional Oauth Dynamic Client Registration Protocol =
Information<o:p></o:p></span></p></div></div><p =
class=3DMsoNormal><o:p>&nbsp;</o:p></p><p class=3DMsoNormal =
style=3D'margin-bottom:12.0pt'>Additionally, there is an individual =
draft that registers LRDD Link Types for discovery using LRDD and =
HostMeta:<br><br><a =
href=3D"http://tools.ietf.org/html/draft-wmills-oauth-lrdd-07">http://too=
ls.ietf.org/html/draft-wmills-oauth-lrdd-07</a><br><br>&nbsp;-- =
Justin<o:p></o:p></p><div><p class=3DMsoNormal>On 02/20/2013 02:37 PM, =
Mike Jones wrote:<o:p></o:p></p></div><blockquote =
style=3D'margin-top:5.0pt;margin-bottom:5.0pt'><p =
class=3DMsoNormal><span style=3D'color:#1F497D'>Hi =
Don,</span><o:p></o:p></p><p class=3DMsoNormal><span =
style=3D'color:#1F497D'>&nbsp;</span><o:p></o:p></p><p =
class=3DMsoNormal><span style=3D'color:#1F497D'>Discovery is a process =
that happens before Registration, and that&#8217;s the point at which =
you would return the AS (and registration!) endpoints to the =
Client.&nbsp; The OAuth WG considered doing its own discovery work but =
ultimately decided to have that happen in the Apps Area WG instead, =
which is close to completing the WebFinger discovery =
specification.</span><o:p></o:p></p><p class=3DMsoNormal><span =
style=3D'color:#1F497D'>&nbsp;</span><o:p></o:p></p><p =
class=3DMsoNormal><span style=3D'color:#1F497D'>If you want to see how =
OpenID Connect is performing discovery using WebFinger, including =
discovery of the AS endpoint, have a look at <a =
href=3D"http://openid.net/specs/openid-connect-discovery-1_0.html">http:/=
/openid.net/specs/openid-connect-discovery-1_0.html</a>.</span><o:p></o:p=
></p><p class=3DMsoNormal><span =
style=3D'color:#1F497D'>&nbsp;</span><o:p></o:p></p><p =
class=3DMsoNormal><span =
style=3D'color:#1F497D'>&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&=
nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&n=
bsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nb=
sp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbs=
p;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp=
;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp; Best =
wishes,</span><o:p></o:p></p><p class=3DMsoNormal><span =
style=3D'color:#1F497D'>&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&=
nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&n=
bsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nb=
sp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbs=
p;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp=
;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp; -- Mike</span><o:p></o:p></p><p =
class=3DMsoNormal><span =
style=3D'color:#1F497D'>&nbsp;</span><o:p></o:p></p><div><div =
style=3D'border:none;border-top:solid #B5C4DF 1.0pt;padding:3.0pt 0in =
0in 0in'><p class=3DMsoNormal><b><span =
style=3D'font-size:10.0pt;font-family:"Tahoma","sans-serif"'>From:</span>=
</b><span style=3D'font-size:10.0pt;font-family:"Tahoma","sans-serif"'> =
<a href=3D"mailto:oauth-bounces@ietf.org">oauth-bounces@ietf.org</a> [<a =
href=3D"mailto:oauth-bounces@ietf.org">mailto:oauth-bounces@ietf.org</a>]=
 <b>On Behalf Of </b>Donald F Coffin<br><b>Sent:</b> Wednesday, February =
20, 2013 11:30 AM<br><b>To:</b> Justin Richer<br><b>Cc:</b> <a =
href=3D"mailto:oauth@ietf.org">oauth@ietf.org</a><br><b>Subject:</b> =
[OAUTH-WG] Additional Oauth Dynamic Client Registration Protocol =
Information</span><o:p></o:p></p></div></div><p =
class=3DMsoNormal>&nbsp;<o:p></o:p></p><p class=3DMsoNormal><span =
style=3D'font-size:12.0pt;font-family:"Cambria","serif"'>Justin,</span><o=
:p></o:p></p><p class=3DMsoNormal><span =
style=3D'font-size:12.0pt;font-family:"Cambria","serif"'>&nbsp;</span><o:=
p></o:p></p><p class=3DMsoNormal><span =
style=3D'font-size:12.0pt;font-family:"Cambria","serif"'>I understand =
the current Client Registration request and response information is =
based on the OPENID model for consistency, but has there been any =
thought or discussion of adding the AS OAuth 2.0 endpoint URIs as part =
of the registration response?&nbsp; I believe the addition of the =
endpoint URIs would make the dynamic client registration process truly a =
dynamic feature of OAuth 2.0.</span><o:p></o:p></p><p =
class=3DMsoNormal><span =
style=3D'font-size:12.0pt;font-family:"Cambria","serif"'>&nbsp;</span><o:=
p></o:p></p><p class=3DMsoNormal><span =
style=3D'font-size:12.0pt;font-family:"Cambria","serif"'>If the ability =
to discover the AS OAuth 2.0 endpoint URIs is being covered by another =
IETF draft, I&#8217;d appreciate learning which current draft is being =
worked on to achieve that result.</span><o:p></o:p></p><p =
class=3DMsoNormal><span =
style=3D'font-size:12.0pt;font-family:"Cambria","serif"'>&nbsp;</span><o:=
p></o:p></p><p class=3DMsoNormal><span style=3D'font-size:12.0pt'>Best =
regards,</span><o:p></o:p></p><p class=3DMsoNormal><span =
style=3D'font-size:24.0pt;font-family:"Brush Script =
MT"'>Don</span><o:p></o:p></p><p class=3DMsoNormal><span =
style=3D'font-size:12.0pt'>Donald F. Coffin</span><o:p></o:p></p><p =
class=3DMsoNormal><span =
style=3D'font-size:12.0pt'>Founder/CTO</span><o:p></o:p></p><p =
class=3DMsoNormal><span =
style=3D'font-size:12.0pt'>&nbsp;</span><o:p></o:p></p><p =
class=3DMsoNormal><span style=3D'font-size:12.0pt'>REMI =
Networks</span><o:p></o:p></p><p class=3DMsoNormal><span =
style=3D'font-size:12.0pt'>22751 El Prado Suite =
6216</span><o:p></o:p></p><p class=3DMsoNormal><span =
style=3D'font-size:12.0pt'>Rancho Santa Margarita, CA&nbsp; =
92688-3836</span><o:p></o:p></p><p class=3DMsoNormal><span =
style=3D'font-size:12.0pt'>&nbsp;</span><o:p></o:p></p><p =
class=3DMsoNormal><span =
style=3D'font-size:12.0pt'>Phone:&nbsp;&nbsp;&nbsp;&nbsp;&nbsp; (949) =
636-8571</span><o:p></o:p></p><p class=3DMsoNormal><span =
style=3D'font-size:12.0pt'>Email:&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp; <a =
href=3D"mailto:donald.coffin@reminetworks.com">donald.coffin@reminetworks=
.com</a></span><o:p></o:p></p><p =
class=3DMsoNormal>&nbsp;<o:p></o:p></p></blockquote><p =
class=3DMsoNormal><span style=3D'font-size:12.0pt;font-family:"Times New =
Roman","serif"'><o:p>&nbsp;</o:p></span></p></div></body></html>
------=_NextPart_000_00F4_01CE0F6B.437DD380--


From donald.coffin@reminetworks.com  Wed Feb 20 16:11:14 2013
Return-Path: <donald.coffin@reminetworks.com>
X-Original-To: oauth@ietfa.amsl.com
Delivered-To: oauth@ietfa.amsl.com
Received: from localhost (localhost [127.0.0.1]) by ietfa.amsl.com (Postfix) with ESMTP id 7460921F8CAA for <oauth@ietfa.amsl.com>; Wed, 20 Feb 2013 16:11:14 -0800 (PST)
X-Virus-Scanned: amavisd-new at amsl.com
X-Spam-Flag: NO
X-Spam-Score: -2.646
X-Spam-Level: 
X-Spam-Status: No, score=-2.646 tagged_above=-999 required=5 tests=[AWL=0.952,  BAYES_00=-2.599, HTML_MESSAGE=0.001, RCVD_IN_DNSWL_LOW=-1]
Received: from mail.ietf.org ([64.170.98.30]) by localhost (ietfa.amsl.com [127.0.0.1]) (amavisd-new, port 10024) with ESMTP id xll13+-faBoY for <oauth@ietfa.amsl.com>; Wed, 20 Feb 2013 16:11:11 -0800 (PST)
Received: from oproxy12-pub.bluehost.com (oproxy12-pub.bluehost.com [50.87.16.10]) by ietfa.amsl.com (Postfix) with SMTP id 3687121E8053 for <oauth@ietf.org>; Wed, 20 Feb 2013 16:11:00 -0800 (PST)
Received: (qmail 17820 invoked by uid 0); 21 Feb 2013 00:10:38 -0000
Received: from unknown (HELO host125.hostmonster.com) (74.220.207.125) by oproxy12.bluehost.com with SMTP; 21 Feb 2013 00:10:38 -0000
DKIM-Signature: v=1; a=rsa-sha256; q=dns/txt; c=relaxed/relaxed; d=reminetworks.com; s=default;  h=Content-Type:MIME-Version:Message-ID:Date:Subject:Cc:To:From; bh=T1kNZbmwraymxAWQ9apwVWtWaJqUGrqSVOv1pW+3dzU=;  b=y/1ANA7lf2/A3sd8QhdrK/6ylvIWxjQUmeoScYtJFzpRsj4xkQwrGYJAWykKXTAc1M+MSVab4A2NmeGE8P9TrdCfCoU5blYARsGF87BIzVio5AMUhxIbcgBqkcu/3yL3;
Received: from [68.4.207.246] (port=6637 helo=HPPavilionElite) by host125.hostmonster.com with esmtpa (Exim 4.80) (envelope-from <donald.coffin@reminetworks.com>) id 1U8JkE-0007dR-Lm; Wed, 20 Feb 2013 17:10:38 -0700
From: "Donald F Coffin" <donald.coffin@reminetworks.com>
To: "Torsten Lodderstedt" <torsten@lodderstedt.net>
Date: Wed, 20 Feb 2013 16:09:20 -0800
Message-ID: <013601ce0fc7$b2faea20$18f0be60$@reminetworks.com>
MIME-Version: 1.0
Content-Type: multipart/alternative; boundary="----=_NextPart_000_0137_01CE0F84.A4D930C0"
X-Mailer: Microsoft Outlook 14.0
Thread-Index: Ac4Px7IrfntWGndXSBWfWuqSAWEe0A==
Content-Language: en-us
X-Identified-User: {1395:host125.hostmonster.com:reminetw:reminetworks.com} {sentby:smtp auth 68.4.207.246 authed with donald.coffin@reminetworks.com}
Cc: John Adkins <jva2@pge.com>, Marty Burns <marty@hypertek.us>, Scott Crowder <scott.crowder@qadoenergy.com>, Dave Robin <drobin@automatedlogic.com>, John Teeter <john.teeter@peoplepowerco.com>, pmadsen@pingidentity.com, Edward Denson <ewd7@pge.com>, Jay Mitra <jay@youtilities.com>, Uday Verma <uday.verma@ilinknet.com>, Ray Perlner <ray.perlner@nist.gov>, Anne Hendry <ahendry2@gmail.com>, Lynne Rodoni <mrodoni@semprautilities.com>, oauth@ietf.org
Subject: [OAUTH-WG] draft-ietf-oauth-revocation-05 Questions
X-BeenThere: oauth@ietf.org
X-Mailman-Version: 2.1.12
Precedence: list
List-Id: OAUTH WG <oauth.ietf.org>
List-Unsubscribe: <https://www.ietf.org/mailman/options/oauth>, <mailto:oauth-request@ietf.org?subject=unsubscribe>
List-Archive: <http://www.ietf.org/mail-archive/web/oauth>
List-Post: <mailto:oauth@ietf.org>
List-Help: <mailto:oauth-request@ietf.org?subject=help>
List-Subscribe: <https://www.ietf.org/mailman/listinfo/oauth>, <mailto:oauth-request@ietf.org?subject=subscribe>
X-List-Received-Date: Thu, 21 Feb 2013 00:11:14 -0000

This is a multipart message in MIME format.

------=_NextPart_000_0137_01CE0F84.A4D930C0
Content-Type: text/plain;
	charset="us-ascii"
Content-Transfer-Encoding: 7bit

Torsten,

 

A colleague of mine and I were discussing what should occur when a Retail
Customer desires to change the existing authorized access of a Third Party.
During our discussion they asked "How does the Retail Customer know the
Third Party actually issued a Token revocation request?  Isn't there a
potential trust issue with the current design"? 

 

The current draft provides a Third Party mechanism that "allows a client to
invalidate its tokens if the end-user logs out, changes identity, or
uninstalls the respective application (sic)." While none of these fit the
situation we were discussing they do seem to be based on the assumption a
Third Party application will be a good citizen and stop using access tokens.
Unfortunately, none of the addressed situations require the participation of
a AS for completion, therefore the risk exists that a Retail Customer may
believe they have removed a Third Party application from accessing their
protected data, but in reality there does not seem to be a mechanism to
either force or verify the Third Party can no longer have access to the
protected data.

 

A possible modification to the current draft that would correct this
potential security risk, is to treat a Token revocation using a message flow
similar to the existing authorization_code response type.  A Retail Customer
requesting a change to the Third Party authorized access would be redirected
to an AS endpoint that would allow the Retail Customer to either terminate a
relationship completely or modify the existing Third Party access
authorization.  The successful response from the AS would indicate the Third
Party needs to remove the current Token from its Token store.  In the event
the Retail Customer has changed the Third Party access authorization, the AS
response could include an optional "scope" element, which the Third Party
would then use to obtain a new access token utilizing an Authorization Code
request.

 

There are several other potential implementations that could be developed to
protect a Retail Customer from a "rogue" Third Party application that does
not inform the AS their authorization to access a Retail Customer's
protected data has been revoked, but the above suggestion meets the current
draft's view that Third Parties should be able to request Tokens be revoked.

 

I look forward to your comments on the above topic.

 

 

Best regards,

Don

Donald F. Coffin

Founder/CTO

 

REMI Networks

22751 El Prado Suite 6216

Rancho Santa Margarita, CA  92688-3836

 

Phone:      (949) 636-8571

Email:       donald.coffin@reminetworks.com

 


------=_NextPart_000_0137_01CE0F84.A4D930C0
Content-Type: text/html;
	charset="us-ascii"
Content-Transfer-Encoding: quoted-printable

<html xmlns:v=3D"urn:schemas-microsoft-com:vml" =
xmlns:o=3D"urn:schemas-microsoft-com:office:office" =
xmlns:w=3D"urn:schemas-microsoft-com:office:word" =
xmlns:m=3D"http://schemas.microsoft.com/office/2004/12/omml" =
xmlns=3D"http://www.w3.org/TR/REC-html40"><head><meta =
http-equiv=3DContent-Type content=3D"text/html; =
charset=3Dus-ascii"><meta name=3DGenerator content=3D"Microsoft Word 14 =
(filtered medium)"><style><!--
/* Font Definitions */
@font-face
	{font-family:"Cambria Math";
	panose-1:2 4 5 3 5 4 6 3 2 4;}
@font-face
	{font-family:Cambria;
	panose-1:2 4 5 3 5 4 6 3 2 4;}
@font-face
	{font-family:Calibri;
	panose-1:2 15 5 2 2 2 4 3 2 4;}
@font-face
	{font-family:"Brush Script MT";
	panose-1:3 6 8 2 4 4 6 7 3 4;}
/* Style Definitions */
p.MsoNormal, li.MsoNormal, div.MsoNormal
	{margin:0in;
	margin-bottom:.0001pt;
	font-size:11.0pt;
	font-family:"Calibri","sans-serif";}
a:link, span.MsoHyperlink
	{mso-style-priority:99;
	color:blue;
	text-decoration:underline;}
a:visited, span.MsoHyperlinkFollowed
	{mso-style-priority:99;
	color:purple;
	text-decoration:underline;}
span.EmailStyle17
	{mso-style-type:personal-compose;
	font-family:"Cambria","serif";
	color:windowtext;}
.MsoChpDefault
	{mso-style-type:export-only;
	font-family:"Calibri","sans-serif";}
@page WordSection1
	{size:8.5in 11.0in;
	margin:1.0in 1.0in 1.0in 1.0in;}
div.WordSection1
	{page:WordSection1;}
--></style><!--[if gte mso 9]><xml>
<o:shapedefaults v:ext=3D"edit" spidmax=3D"1026" />
</xml><![endif]--><!--[if gte mso 9]><xml>
<o:shapelayout v:ext=3D"edit">
<o:idmap v:ext=3D"edit" data=3D"1" />
</o:shapelayout></xml><![endif]--></head><body lang=3DEN-US link=3Dblue =
vlink=3Dpurple><div class=3DWordSection1><p class=3DMsoNormal><span =
style=3D'font-size:12.0pt;font-family:"Cambria","serif"'>Torsten,<o:p></o=
:p></span></p><p class=3DMsoNormal><span =
style=3D'font-size:12.0pt;font-family:"Cambria","serif"'><o:p>&nbsp;</o:p=
></span></p><p class=3DMsoNormal><span =
style=3D'font-size:12.0pt;font-family:"Cambria","serif"'>A colleague of =
mine and I were discussing what should occur when a Retail Customer =
desires to change the existing authorized access of a Third Party.&nbsp; =
During our discussion they asked &#8220;How does the Retail Customer =
know the Third Party actually issued a Token revocation request?&nbsp; =
Isn&#8217;t there a potential trust issue with the current =
design&#8221;? <o:p></o:p></span></p><p class=3DMsoNormal><span =
style=3D'font-size:12.0pt;font-family:"Cambria","serif"'><o:p>&nbsp;</o:p=
></span></p><p class=3DMsoNormal><span =
style=3D'font-size:12.0pt;font-family:"Cambria","serif"'>The current =
draft provides a Third Party mechanism that &#8220;allows a client to =
invalidate its tokens if the end-user logs out, changes identity, or =
uninstalls the respective application (sic).&#8221; While none of these =
fit the situation we were discussing they do seem to be based on the =
assumption a Third Party application will be a good citizen and stop =
using access tokens.&nbsp; Unfortunately, none of the addressed =
situations require the participation of a AS for completion, therefore =
the risk exists that a Retail Customer may believe they have removed a =
Third Party application from accessing their protected data, but in =
reality there does not seem to be a mechanism to either force or verify =
the Third Party can no longer have access to the protected =
data.<o:p></o:p></span></p><p class=3DMsoNormal><span =
style=3D'font-size:12.0pt;font-family:"Cambria","serif"'><o:p>&nbsp;</o:p=
></span></p><p class=3DMsoNormal><span =
style=3D'font-size:12.0pt;font-family:"Cambria","serif"'>A possible =
modification to the current draft that would correct this potential =
security risk, is to treat a Token revocation using a message flow =
similar to the existing authorization_code response type.&nbsp; A Retail =
Customer requesting a change to the Third Party authorized access would =
be redirected to an AS endpoint that would allow the Retail Customer to =
either terminate a relationship completely or modify the existing Third =
Party access authorization.&nbsp; The successful response from the AS =
would indicate the Third Party needs to remove the current Token from =
its Token store.&nbsp; In the event the Retail Customer has changed the =
Third Party access authorization, the AS response could include an =
optional &#8220;scope&#8221; element, which the Third Party would then =
use to obtain a new access token utilizing an Authorization Code =
request.<o:p></o:p></span></p><p class=3DMsoNormal><span =
style=3D'font-size:12.0pt;font-family:"Cambria","serif"'><o:p>&nbsp;</o:p=
></span></p><p class=3DMsoNormal><span =
style=3D'font-size:12.0pt;font-family:"Cambria","serif"'>There are =
several other potential implementations that could be developed to =
protect a Retail Customer from a &#8220;rogue&#8221; Third Party =
application that does not inform the AS their authorization to access a =
Retail Customer&#8217;s protected data has been revoked, but the above =
suggestion meets the current draft&#8217;s view that Third Parties =
should be able to request Tokens be revoked.<o:p></o:p></span></p><p =
class=3DMsoNormal><span =
style=3D'font-size:12.0pt;font-family:"Cambria","serif"'><o:p>&nbsp;</o:p=
></span></p><p class=3DMsoNormal><span =
style=3D'font-size:12.0pt;font-family:"Cambria","serif"'>I look forward =
to your comments on the above topic.<o:p></o:p></span></p><p =
class=3DMsoNormal><span =
style=3D'font-size:12.0pt;font-family:"Cambria","serif"'><o:p>&nbsp;</o:p=
></span></p><p class=3DMsoNormal><span =
style=3D'font-size:12.0pt;font-family:"Cambria","serif"'><o:p>&nbsp;</o:p=
></span></p><p class=3DMsoNormal><span style=3D'font-size:12.0pt'>Best =
regards,<o:p></o:p></span></p><p class=3DMsoNormal><span =
style=3D'font-size:24.0pt;font-family:"Brush Script =
MT","serif"'>Don<o:p></o:p></span></p><p class=3DMsoNormal><span =
style=3D'font-size:12.0pt'>Donald F. Coffin<o:p></o:p></span></p><p =
class=3DMsoNormal><span =
style=3D'font-size:12.0pt'>Founder/CTO<o:p></o:p></span></p><p =
class=3DMsoNormal><span =
style=3D'font-size:12.0pt'><o:p>&nbsp;</o:p></span></p><p =
class=3DMsoNormal><span style=3D'font-size:12.0pt'>REMI =
Networks<o:p></o:p></span></p><p class=3DMsoNormal><span =
style=3D'font-size:12.0pt'>22751 El Prado Suite =
6216<o:p></o:p></span></p><p class=3DMsoNormal><span =
style=3D'font-size:12.0pt'>Rancho Santa Margarita, CA&nbsp; =
92688-3836<o:p></o:p></span></p><p class=3DMsoNormal><span =
style=3D'font-size:12.0pt'><o:p>&nbsp;</o:p></span></p><p =
class=3DMsoNormal><span =
style=3D'font-size:12.0pt'>Phone:&nbsp;&nbsp;&nbsp;&nbsp;&nbsp; (949) =
636-8571<o:p></o:p></span></p><p class=3DMsoNormal><span =
style=3D'font-size:12.0pt'>Email:&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp; <a =
href=3D"mailto:donald.coffin@reminetworks.com">donald.coffin@reminetworks=
.com</a><o:p></o:p></span></p><p =
class=3DMsoNormal><o:p>&nbsp;</o:p></p></div></body></html>
------=_NextPart_000_0137_01CE0F84.A4D930C0--


From torsten@lodderstedt.net  Thu Feb 21 00:12:37 2013
Return-Path: <torsten@lodderstedt.net>
X-Original-To: oauth@ietfa.amsl.com
Delivered-To: oauth@ietfa.amsl.com
Received: from localhost (localhost [127.0.0.1]) by ietfa.amsl.com (Postfix) with ESMTP id DF09F21F8E07 for <oauth@ietfa.amsl.com>; Thu, 21 Feb 2013 00:12:37 -0800 (PST)
X-Virus-Scanned: amavisd-new at amsl.com
X-Spam-Flag: NO
X-Spam-Score: -0.569
X-Spam-Level: 
X-Spam-Status: No, score=-0.569 tagged_above=-999 required=5 tests=[AWL=-0.336, BAYES_00=-2.599, HELO_EQ_DE=0.35, HTML_MESSAGE=0.001, MIME_QP_LONG_LINE=1.396, RCVD_IN_SORBS_WEB=0.619]
Received: from mail.ietf.org ([64.170.98.30]) by localhost (ietfa.amsl.com [127.0.0.1]) (amavisd-new, port 10024) with ESMTP id pYwufnVU8uec for <oauth@ietfa.amsl.com>; Thu, 21 Feb 2013 00:12:37 -0800 (PST)
Received: from smtprelay03.ispgateway.de (smtprelay03.ispgateway.de [80.67.29.28]) by ietfa.amsl.com (Postfix) with ESMTP id 7146121F8AB8 for <oauth@ietf.org>; Thu, 21 Feb 2013 00:12:36 -0800 (PST)
Received: from [80.187.106.201] (helo=[192.168.43.3]) by smtprelay03.ispgateway.de with esmtpsa (TLSv1:AES128-SHA:128) (Exim 4.68) (envelope-from <torsten@lodderstedt.net>) id 1U8RGZ-0005nC-Bt; Thu, 21 Feb 2013 09:12:31 +0100
References: <013601ce0fc7$b2faea20$18f0be60$@reminetworks.com>
Mime-Version: 1.0 (1.0)
In-Reply-To: <013601ce0fc7$b2faea20$18f0be60$@reminetworks.com>
Content-Type: multipart/alternative; boundary=Apple-Mail-E90BEB38-6533-4127-963B-451BAB079AD2
Content-Transfer-Encoding: 7bit
Message-Id: <F4E5214A-76C0-468E-BFE5-6578ED22D2A3@lodderstedt.net>
X-Mailer: iPad Mail (10B141)
From: Torsten Lodderstedt <torsten@lodderstedt.net>
Date: Thu, 21 Feb 2013 09:12:30 +0100
To: Donald F Coffin <donald.coffin@reminetworks.com>
X-Df-Sender: dG9yc3RlbkBsb2RkZXJzdGVkdC1vbmxpbmUuZGU=
Cc: John Adkins <jva2@pge.com>, Marty Burns <marty@hypertek.us>, Scott Crowder <scott.crowder@qadoenergy.com>, Dave Robin <drobin@automatedlogic.com>, John Teeter <john.teeter@peoplepowerco.com>, "<pmadsen@pingidentity.com>" <pmadsen@pingidentity.com>, Edward Denson <ewd7@pge.com>, Jay Mitra <jay@youtilities.com>, Uday Verma <uday.verma@ilinknet.com>, Ray Perlner <ray.perlner@nist.gov>, Anne Hendry <ahendry2@gmail.com>, Lynne Rodoni <mrodoni@semprautilities.com>, "<oauth@ietf.org>" <oauth@ietf.org>
Subject: Re: [OAUTH-WG] draft-ietf-oauth-revocation-05 Questions
X-BeenThere: oauth@ietf.org
X-Mailman-Version: 2.1.12
Precedence: list
List-Id: OAUTH WG <oauth.ietf.org>
List-Unsubscribe: <https://www.ietf.org/mailman/options/oauth>, <mailto:oauth-request@ietf.org?subject=unsubscribe>
List-Archive: <http://www.ietf.org/mail-archive/web/oauth>
List-Post: <mailto:oauth@ietf.org>
List-Help: <mailto:oauth-request@ietf.org?subject=help>
List-Subscribe: <https://www.ietf.org/mailman/listinfo/oauth>, <mailto:oauth-request@ietf.org?subject=subscribe>
X-List-Received-Date: Thu, 21 Feb 2013 08:12:38 -0000

--Apple-Mail-E90BEB38-6533-4127-963B-451BAB079AD2
Content-Type: text/plain;
	charset=utf-8
Content-Transfer-Encoding: quoted-printable

Hi Donald,

thank you for sharing your thoughts with us. I've never seen revocation as c=
hange of scope of the authorization, but it sounds reasonable. The current d=
esign handles the issues you raised differently.

The AS is involved in the revocation process as it exposes the revocation en=
dpoint. So if the token is revoked (from a technical perspective), it knows i=
t. If the user wants to check whether the application really sent the reques=
t, she is supposed to visit the respective portal belonging to the AS. There=
 the AS provides a list of all valid authorization grants in its database.=20=


Does this address your issues?

regards,
Torsten.

Am 21.02.2013 um 01:09 schrieb "Donald F Coffin" <donald.coffin@reminetworks=
.com>:

> Torsten,
> =20
> A colleague of mine and I were discussing what should occur when a Retail C=
ustomer desires to change the existing authorized access of a Third Party.  D=
uring our discussion they asked =E2=80=9CHow does the Retail Customer know t=
he Third Party actually issued a Token revocation request?  Isn=E2=80=99t th=
ere a potential trust issue with the current design=E2=80=9D?
> =20
> The current draft provides a Third Party mechanism that =E2=80=9Callows a c=
lient to invalidate its tokens if the end-user logs out, changes identity, o=
r uninstalls the respective application (sic).=E2=80=9D While none of these f=
it the situation we were discussing they do seem to be based on the assumpti=
on a Third Party application will be a good citizen and stop using access to=
kens.  Unfortunately, none of the addressed situations require the participa=
tion of a AS for completion, therefore the risk exists that a Retail Custome=
r may believe they have removed a Third Party application from accessing the=
ir protected data, but in reality there does not seem to be a mechanism to e=
ither force or verify the Third Party can no longer have access to the prote=
cted data.
> =20
> A possible modification to the current draft that would correct this poten=
tial security risk, is to treat a Token revocation using a message flow simi=
lar to the existing authorization_code response type.  A Retail Customer req=
uesting a change to the Third Party authorized access would be redirected to=
 an AS endpoint that would allow the Retail Customer to either terminate a r=
elationship completely or modify the existing Third Party access authorizati=
on.  The successful response from the AS would indicate the Third Party need=
s to remove the current Token from its Token store.  In the event the Retail=
 Customer has changed the Third Party access authorization, the AS response c=
ould include an optional =E2=80=9Cscope=E2=80=9D element, which the Third Pa=
rty would then use to obtain a new access token utilizing an Authorization C=
ode request.
> =20
> There are several other potential implementations that could be developed t=
o protect a Retail Customer from a =E2=80=9Crogue=E2=80=9D Third Party appli=
cation that does not inform the AS their authorization to access a Retail Cu=
stomer=E2=80=99s protected data has been revoked, but the above suggestion m=
eets the current draft=E2=80=99s view that Third Parties should be able to r=
equest Tokens be revoked.
> =20
> I look forward to your comments on the above topic.
> =20
> =20
> Best regards,
> Don
> Donald F. Coffin
> Founder/CTO
> =20
> REMI Networks
> 22751 El Prado Suite 6216
> Rancho Santa Margarita, CA  92688-3836
> =20
> Phone:      (949) 636-8571
> Email:       donald.coffin@reminetworks.com
> =20

--Apple-Mail-E90BEB38-6533-4127-963B-451BAB079AD2
Content-Type: text/html;
	charset=utf-8
Content-Transfer-Encoding: quoted-printable

<html><head><meta http-equiv=3D"content-type" content=3D"text/html; charset=3D=
utf-8"></head><body dir=3D"auto"><div>Hi Donald,</div><div><br></div><div>th=
ank you for sharing your thoughts with us. I've never seen revocation as cha=
nge of scope of the authorization, but it sounds reasonable. The current des=
ign handles the issues you raised differently.</div><div><br></div><div>The A=
S is involved in the revocation process as it exposes the revocation endpoin=
t. So if the token is revoked (from a technical perspective), it knows it. I=
f the user wants to check whether the application really sent the request, s=
he is supposed to visit the respective portal belonging to the AS. There the=
 AS provides a list of all valid authorization grants in its database.&nbsp;=
</div><div><br></div><div>Does this address your issues?</div><div><br></div=
><div>regards,</div><div>Torsten.</div><div><br>Am 21.02.2013 um 01:09 schri=
eb "Donald F Coffin" &lt;<a href=3D"mailto:donald.coffin@reminetworks.com">d=
onald.coffin@reminetworks.com</a>&gt;:<br><br></div><blockquote type=3D"cite=
"><div><meta http-equiv=3D"Content-Type" content=3D"text/html; charset=3Dus-=
ascii"><meta name=3D"Generator" content=3D"Microsoft Word 14 (filtered mediu=
m)"><style><!--
/* Font Definitions */
@font-face
	{font-family:"Cambria Math";
	panose-1:2 4 5 3 5 4 6 3 2 4;}
@font-face
	{font-family:Cambria;
	panose-1:2 4 5 3 5 4 6 3 2 4;}
@font-face
	{font-family:Calibri;
	panose-1:2 15 5 2 2 2 4 3 2 4;}
@font-face
	{font-family:"Brush Script MT";
	panose-1:3 6 8 2 4 4 6 7 3 4;}
/* Style Definitions */
p.MsoNormal, li.MsoNormal, div.MsoNormal
	{margin:0in;
	margin-bottom:.0001pt;
	font-size:11.0pt;
	font-family:"Calibri","sans-serif";}
a:link, span.MsoHyperlink
	{mso-style-priority:99;
	color:blue;
	text-decoration:underline;}
a:visited, span.MsoHyperlinkFollowed
	{mso-style-priority:99;
	color:purple;
	text-decoration:underline;}
span.EmailStyle17
	{mso-style-type:personal-compose;
	font-family:"Cambria","serif";
	color:windowtext;}
.MsoChpDefault
	{mso-style-type:export-only;
	font-family:"Calibri","sans-serif";}
@page WordSection1
	{size:8.5in 11.0in;
	margin:1.0in 1.0in 1.0in 1.0in;}
div.WordSection1
	{page:WordSection1;}
--></style><!--[if gte mso 9]><xml>
<o:shapedefaults v:ext=3D"edit" spidmax=3D"1026" />
</xml><![endif]--><!--[if gte mso 9]><xml>
<o:shapelayout v:ext=3D"edit">
<o:idmap v:ext=3D"edit" data=3D"1" />
</o:shapelayout></xml><![endif]--><div class=3D"WordSection1"><p class=3D"Ms=
oNormal"><span style=3D"font-size:12.0pt;font-family:&quot;Cambria&quot;,&qu=
ot;serif&quot;">Torsten,<o:p></o:p></span></p><p class=3D"MsoNormal"><span s=
tyle=3D"font-size:12.0pt;font-family:&quot;Cambria&quot;,&quot;serif&quot;">=
<o:p>&nbsp;</o:p></span></p><p class=3D"MsoNormal"><span style=3D"font-size:=
12.0pt;font-family:&quot;Cambria&quot;,&quot;serif&quot;">A colleague of min=
e and I were discussing what should occur when a Retail Customer desires to c=
hange the existing authorized access of a Third Party.&nbsp; During our disc=
ussion they asked =E2=80=9CHow does the Retail Customer know the Third Party=
 actually issued a Token revocation request?&nbsp; Isn=E2=80=99t there a pot=
ential trust issue with the current design=E2=80=9D? <o:p></o:p></span></p><=
p class=3D"MsoNormal"><span style=3D"font-size:12.0pt;font-family:&quot;Camb=
ria&quot;,&quot;serif&quot;"><o:p>&nbsp;</o:p></span></p><p class=3D"MsoNorm=
al"><span style=3D"font-size:12.0pt;font-family:&quot;Cambria&quot;,&quot;se=
rif&quot;">The current draft provides a Third Party mechanism that =E2=80=9C=
allows a client to invalidate its tokens if the end-user logs out, changes i=
dentity, or uninstalls the respective application (sic).=E2=80=9D While none=
 of these fit the situation we were discussing they do seem to be based on t=
he assumption a Third Party application will be a good citizen and stop usin=
g access tokens.&nbsp; Unfortunately, none of the addressed situations requi=
re the participation of a AS for completion, therefore the risk exists that a=
 Retail Customer may believe they have removed a Third Party application fro=
m accessing their protected data, but in reality there does not seem to be a=
 mechanism to either force or verify the Third Party can no longer have acce=
ss to the protected data.<o:p></o:p></span></p><p class=3D"MsoNormal"><span s=
tyle=3D"font-size:12.0pt;font-family:&quot;Cambria&quot;,&quot;serif&quot;">=
<o:p>&nbsp;</o:p></span></p><p class=3D"MsoNormal"><span style=3D"font-size:=
12.0pt;font-family:&quot;Cambria&quot;,&quot;serif&quot;">A possible modific=
ation to the current draft that would correct this potential security risk, i=
s to treat a Token revocation using a message flow similar to the existing a=
uthorization_code response type.&nbsp; A Retail Customer requesting a change=
 to the Third Party authorized access would be redirected to an AS endpoint t=
hat would allow the Retail Customer to either terminate a relationship compl=
etely or modify the existing Third Party access authorization.&nbsp; The suc=
cessful response from the AS would indicate the Third Party needs to remove t=
he current Token from its Token store.&nbsp; In the event the Retail Custome=
r has changed the Third Party access authorization, the AS response could in=
clude an optional =E2=80=9Cscope=E2=80=9D element, which the Third Party wou=
ld then use to obtain a new access token utilizing an Authorization Code req=
uest.<o:p></o:p></span></p><p class=3D"MsoNormal"><span style=3D"font-size:1=
2.0pt;font-family:&quot;Cambria&quot;,&quot;serif&quot;"><o:p>&nbsp;</o:p></=
span></p><p class=3D"MsoNormal"><span style=3D"font-size:12.0pt;font-family:=
&quot;Cambria&quot;,&quot;serif&quot;">There are several other potential imp=
lementations that could be developed to protect a Retail Customer from a =E2=
=80=9Crogue=E2=80=9D Third Party application that does not inform the AS the=
ir authorization to access a Retail Customer=E2=80=99s protected data has be=
en revoked, but the above suggestion meets the current draft=E2=80=99s view t=
hat Third Parties should be able to request Tokens be revoked.<o:p></o:p></s=
pan></p><p class=3D"MsoNormal"><span style=3D"font-size:12.0pt;font-family:&=
quot;Cambria&quot;,&quot;serif&quot;"><o:p>&nbsp;</o:p></span></p><p class=3D=
"MsoNormal"><span style=3D"font-size:12.0pt;font-family:&quot;Cambria&quot;,=
&quot;serif&quot;">I look forward to your comments on the above topic.<o:p><=
/o:p></span></p><p class=3D"MsoNormal"><span style=3D"font-size:12.0pt;font-=
family:&quot;Cambria&quot;,&quot;serif&quot;"><o:p>&nbsp;</o:p></span></p><p=
 class=3D"MsoNormal"><span style=3D"font-size:12.0pt;font-family:&quot;Cambr=
ia&quot;,&quot;serif&quot;"><o:p>&nbsp;</o:p></span></p><p class=3D"MsoNorma=
l"><span style=3D"font-size:12.0pt">Best regards,<o:p></o:p></span></p><p cl=
ass=3D"MsoNormal"><span style=3D"font-size:24.0pt;font-family:&quot;Brush Sc=
ript MT&quot;,&quot;serif&quot;">Don<o:p></o:p></span></p><p class=3D"MsoNor=
mal"><span style=3D"font-size:12.0pt">Donald F. Coffin<o:p></o:p></span></p>=
<p class=3D"MsoNormal"><span style=3D"font-size:12.0pt">Founder/CTO<o:p></o:=
p></span></p><p class=3D"MsoNormal"><span style=3D"font-size:12.0pt"><o:p>&n=
bsp;</o:p></span></p><p class=3D"MsoNormal"><span style=3D"font-size:12.0pt"=
>REMI Networks<o:p></o:p></span></p><p class=3D"MsoNormal"><span style=3D"fo=
nt-size:12.0pt">22751 El Prado Suite 6216<o:p></o:p></span></p><p class=3D"M=
soNormal"><span style=3D"font-size:12.0pt">Rancho Santa Margarita, CA&nbsp; 9=
2688-3836<o:p></o:p></span></p><p class=3D"MsoNormal"><span style=3D"font-si=
ze:12.0pt"><o:p>&nbsp;</o:p></span></p><p class=3D"MsoNormal"><span style=3D=
"font-size:12.0pt">Phone:&nbsp;&nbsp;&nbsp;&nbsp;&nbsp; (949) 636-8571<o:p><=
/o:p></span></p><p class=3D"MsoNormal"><span style=3D"font-size:12.0pt">Emai=
l:&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp; <a href=3D"mailto:donald.coffin@remin=
etworks.com">donald.coffin@reminetworks.com</a><o:p></o:p></span></p><p clas=
s=3D"MsoNormal"><o:p>&nbsp;</o:p></p></div></div></blockquote></body></html>=

--Apple-Mail-E90BEB38-6533-4127-963B-451BAB079AD2--

From sberyozkin@gmail.com  Thu Feb 21 02:02:43 2013
Return-Path: <sberyozkin@gmail.com>
X-Original-To: oauth@ietfa.amsl.com
Delivered-To: oauth@ietfa.amsl.com
Received: from localhost (localhost [127.0.0.1]) by ietfa.amsl.com (Postfix) with ESMTP id 24F0421F8DF1 for <oauth@ietfa.amsl.com>; Thu, 21 Feb 2013 02:02:42 -0800 (PST)
X-Virus-Scanned: amavisd-new at amsl.com
X-Spam-Flag: NO
X-Spam-Score: -3.471
X-Spam-Level: 
X-Spam-Status: No, score=-3.471 tagged_above=-999 required=5 tests=[AWL=0.128,  BAYES_00=-2.599, RCVD_IN_DNSWL_LOW=-1]
Received: from mail.ietf.org ([64.170.98.30]) by localhost (ietfa.amsl.com [127.0.0.1]) (amavisd-new, port 10024) with ESMTP id 0eh4vfP7dC38 for <oauth@ietfa.amsl.com>; Thu, 21 Feb 2013 02:02:40 -0800 (PST)
Received: from mail-ea0-f177.google.com (mail-ea0-f177.google.com [209.85.215.177]) by ietfa.amsl.com (Postfix) with ESMTP id B019721F8E38 for <oauth@ietf.org>; Thu, 21 Feb 2013 02:02:39 -0800 (PST)
Received: by mail-ea0-f177.google.com with SMTP id n13so3736239eaa.36 for <oauth@ietf.org>; Thu, 21 Feb 2013 02:02:38 -0800 (PST)
DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=gmail.com; s=20120113; h=x-received:message-id:date:from:user-agent:mime-version:to:subject :references:in-reply-to:content-type:content-transfer-encoding; bh=H5/neoA5NswWX8i7+YnhuWo7cm745RO7QTAy2LjKhpA=; b=Vm+7rvDQ+oiCOR4M6irirXGkbu4uOCDxO5JjNqJvJDe5tbHd0GxcRhj3eEomeDyiS4 rs8YZ9tb8mn+gSmxGEXP5Bb2z1lKR0tAkyzANZoRaTmXqmWz/hoe4un9/Szbym5KGPTH IwMGVlcbloKvXB4DQ3v9GA9/fwh5LEOqAR+jAu+Zkz7m9DhLh3752BtyBvv0UjDGjnrL dqKWpInagPghJvqgzVyz5rCSeiJBHEzKH4BYoYugvXvRwT1BpJ8lPzXLxGrvg649cLov FYOuCeHOk5u/2gq9kQNkEvS7rFO76S2aXw8ZR/1YgDBXCOgGPm7HIKARtYWw/F1/h7AI YQUQ==
X-Received: by 10.14.205.68 with SMTP id i44mr78924635eeo.25.1361440958382; Thu, 21 Feb 2013 02:02:38 -0800 (PST)
Received: from [10.36.226.5] ([217.173.99.61]) by mx.google.com with ESMTPS id 44sm113994307eek.5.2013.02.21.02.02.36 (version=TLSv1 cipher=ECDHE-RSA-RC4-SHA bits=128/128); Thu, 21 Feb 2013 02:02:37 -0800 (PST)
Message-ID: <5125F0A2.6070808@gmail.com>
Date: Thu, 21 Feb 2013 10:02:10 +0000
From: Sergey Beryozkin <sberyozkin@gmail.com>
User-Agent: Mozilla/5.0 (X11; Linux x86_64; rv:12.0) Gecko/20120430 Thunderbird/12.0.1
MIME-Version: 1.0
To: "<oauth@ietf.org>" <oauth@ietf.org>
References: <51238410.8040705@gmail.com> <CA+k3eCT-78fCzGYNk3JwLihsg6qDmu0LNdmgb_QE83ehdj0THA@mail.gmail.com> <5124B749.9050402@gmail.com>
In-Reply-To: <5124B749.9050402@gmail.com>
Content-Type: text/plain; charset=ISO-8859-1; format=flowed
Content-Transfer-Encoding: 7bit
Subject: Re: [OAUTH-WG] Using SAML2 Bearer for the authentication
X-BeenThere: oauth@ietf.org
X-Mailman-Version: 2.1.12
Precedence: list
List-Id: OAUTH WG <oauth.ietf.org>
List-Unsubscribe: <https://www.ietf.org/mailman/options/oauth>, <mailto:oauth-request@ietf.org?subject=unsubscribe>
List-Archive: <http://www.ietf.org/mail-archive/web/oauth>
List-Post: <mailto:oauth@ietf.org>
List-Help: <mailto:oauth-request@ietf.org?subject=help>
List-Subscribe: <https://www.ietf.org/mailman/listinfo/oauth>, <mailto:oauth-request@ietf.org?subject=subscribe>
X-List-Received-Date: Thu, 21 Feb 2013 10:02:44 -0000

On 20/02/13 11:45, Sergey Beryozkin wrote:
> On 19/02/13 14:27, Brian Campbell wrote:
>> The scope of assertion based client authentication is only in OAuth and
>> only for the client calling the AS's token endpoint. Defining a general
>> HTTP auth scheme for assertions would have a much broader scope and be
>> much more difficult to standardize.
> Understood, thanks.
>
> I'd like to ask another question related to the subject of this thread,
> though the same would likely be relevant for using JWT for authenticating.
>
> When the assertion is used for authenticating the client, a form
> "client_id" parameter is said to be optional.
> Next, section 6.1 [1] says that "Subject" of the assertion SHOULD be
> "client_id".
>
> I interpret it like this.
>
> If "Subject" is set to "client_id" then there the actual client_id must
> be available as "client_id" form parameter, which will be posted
> alongside the assertion.
>
> If not then the client_id is an actual Subject value and no "client_id"
> form parameter is expected to be available.
>
>
Continuing on this,

http://tools.ietf.org/html/draft-ietf-oauth-saml2-bearer-15#section-3

says "For client authentication, the Subject MUST be the "client_id" of 
the OAuth client."

This makes me think I may've been wrong with my initial reading of both 
drafts, now I read like this:

"the Subject MUST be the "client_id" of the OAuth client." as per the 
Saml2 bearer draft, which is not the literal "client_id". Next, if 
"client_id" form parameter is available then it must be equal to Subject 
value, as is, or via an AS provided mapping, otherwise it is a 
validation fault.
This is probably in line with the answers to the similar question on the 
use of client_id and JWT grant, though I'm not sure.

I appreciate it is a work in progress, but IMHO some more clarifications 
in the text will help

Cheers, Sergey

> Is it correct ?
>
> Thanks, Sergey
>
> [1] http://tools.ietf.org/html/draft-ietf-oauth-assertions-10#section-6.1
>
>
>
>>
>>
>> On Tue, Feb 19, 2013 at 6:54 AM, Sergey Beryozkin <sberyozkin@gmail.com
>> <mailto:sberyozkin@gmail.com>> wrote:
>>
>> Hi,
>>
>> Assertions like SAML2 Bearer can be used for authenticating the client.
>> Why a dedicated Authorization scheme can not be introduced, instead
>> of or in addition to "client_assertion" & "client_assertion_type"
>> parameters ?
>>
>> IMHO, the following
>>
>> Authorization: SAML "base64url-encoded assertion"
>>
>> grant_type=authorization_code&__code=123456
>>
>> is more in line with OAuth2 recommending not to prefer including
>> client id & secret in the body:
>>
>> "Including the client credentials in the request-body using the two
>> parameters is NOT RECOMMENDED and SHOULD be limited to clients unable
>> to directly utilize the HTTP Basic authentication scheme (or other
>> password-based HTTP authentication schemes)" - though it talks about
>> a password based scheme...
>>
>> similarly:
>>
>> Authorization: JWT "encoded jwt assertion"
>>
>> grant_type=authorization_code&__code=123456
>>
>> Just a thought.
>>
>> Cheers, Sergey
>>
>>
>> _________________________________________________
>> OAuth mailing list
>> OAuth@ietf.org <mailto:OAuth@ietf.org>
>> https://www.ietf.org/mailman/__listinfo/oauth
>> <https://www.ietf.org/mailman/listinfo/oauth>
>>
>>


From jricher@mitre.org  Thu Feb 21 06:05:45 2013
Return-Path: <jricher@mitre.org>
X-Original-To: oauth@ietfa.amsl.com
Delivered-To: oauth@ietfa.amsl.com
Received: from localhost (localhost [127.0.0.1]) by ietfa.amsl.com (Postfix) with ESMTP id D620221F8ABC for <oauth@ietfa.amsl.com>; Thu, 21 Feb 2013 06:05:45 -0800 (PST)
X-Virus-Scanned: amavisd-new at amsl.com
X-Spam-Flag: NO
X-Spam-Score: -6.575
X-Spam-Level: 
X-Spam-Status: No, score=-6.575 tagged_above=-999 required=5 tests=[AWL=0.023,  BAYES_00=-2.599, HTML_MESSAGE=0.001, RCVD_IN_DNSWL_MED=-4]
Received: from mail.ietf.org ([64.170.98.30]) by localhost (ietfa.amsl.com [127.0.0.1]) (amavisd-new, port 10024) with ESMTP id qlfUA5EvPhM9 for <oauth@ietfa.amsl.com>; Thu, 21 Feb 2013 06:05:42 -0800 (PST)
Received: from smtpksrv1.mitre.org (smtpksrv1.mitre.org [198.49.146.77]) by ietfa.amsl.com (Postfix) with ESMTP id 3FB9221F8AB6 for <oauth@ietf.org>; Thu, 21 Feb 2013 06:05:42 -0800 (PST)
Received: from smtpksrv1.mitre.org (localhost.localdomain [127.0.0.1]) by localhost (Postfix) with SMTP id 9D6391F25F4; Thu, 21 Feb 2013 09:05:41 -0500 (EST)
Received: from IMCCAS01.MITRE.ORG (imccas01.mitre.org [129.83.29.78]) by smtpksrv1.mitre.org (Postfix) with ESMTP id 7BF3C1F25F0; Thu, 21 Feb 2013 09:05:41 -0500 (EST)
Received: from [10.146.15.29] (129.83.31.58) by IMCCAS01.MITRE.ORG (129.83.29.78) with Microsoft SMTP Server (TLS) id 14.2.318.4; Thu, 21 Feb 2013 09:05:41 -0500
Message-ID: <5126297F.7070904@mitre.org>
Date: Thu, 21 Feb 2013 09:04:47 -0500
From: Justin Richer <jricher@mitre.org>
User-Agent: Mozilla/5.0 (X11; Linux i686; rv:17.0) Gecko/20130106 Thunderbird/17.0.2
MIME-Version: 1.0
To: Mike Jones <Michael.Jones@microsoft.com>
References: <20130215215423.23019.50224.idtracker@ietfa.amsl.com> <B33BFB58CCC8BE4998958016839DE27E06894B4F@IMCMBX01.MITRE.ORG> <CABzCy2CgnAtPrTY37H6vO-+5u3tRmsm+1j86r3w046AhHnNdfw@mail.gmail.com> <4E1F6AAD24975D4BA5B16804296739436747A665@TK5EX14MBXC284.redmond.corp.microsoft.com> <63255CDA-E93F-4414-B471-B373C4B6F65E@ve7jtb.com> <CA+ZpN278s7BRuUV31PzqL9fEK+3rKT6UiQiwmv_pfbK91g+yQg@mail.gmail.com> <CABzCy2AYnfxfJ3w6sBWw69LxaHCrJB-GyrT+-G8Ufx4-CQ6gTQ@mail.gmail.com> <4E1F6AAD24975D4BA5B16804296739436747AD87@TK5EX14MBXC284.redmond.corp.microsoft.com> <CA+ZpN24ot=6Rp663KtA0inc1eSKyfQ1sQ1b+NDNPCg3vu7OL_g@mail.gmail.com> <4E1F6AAD24975D4BA5B16804296739436747B12D@TK5EX14MBXC284.redmond.corp.microsoft.com>
In-Reply-To: <4E1F6AAD24975D4BA5B16804296739436747B12D@TK5EX14MBXC284.redmond.corp.microsoft.com>
Content-Type: multipart/alternative; boundary="------------030606070303070907060102"
X-Originating-IP: [129.83.31.58]
Cc: "<oauth@ietf.org>" <oauth@ietf.org>
Subject: Re: [OAUTH-WG] I-D Action: draft-ietf-oauth-dyn-reg-06.txt
X-BeenThere: oauth@ietf.org
X-Mailman-Version: 2.1.12
Precedence: list
List-Id: OAUTH WG <oauth.ietf.org>
List-Unsubscribe: <https://www.ietf.org/mailman/options/oauth>, <mailto:oauth-request@ietf.org?subject=unsubscribe>
List-Archive: <http://www.ietf.org/mail-archive/web/oauth>
List-Post: <mailto:oauth@ietf.org>
List-Help: <mailto:oauth-request@ietf.org?subject=help>
List-Subscribe: <https://www.ietf.org/mailman/listinfo/oauth>, <mailto:oauth-request@ietf.org?subject=subscribe>
X-List-Received-Date: Thu, 21 Feb 2013 14:05:46 -0000

--------------030606070303070907060102
Content-Type: text/plain; charset="ISO-8859-1"; format=flowed
Content-Transfer-Encoding: 7bit

With this in mind, we might want to change *all* of the _url parameters 
to _uri instead, not just this new one. Are folks in favor of this?

  -- Justin

On 02/20/2013 12:57 PM, Mike Jones wrote:
>
> OK, we should make the change then.  Thanks for the input.
>
> -- Mike
>
> *From:*Tim Bray [mailto:twbray@google.com]
> *Sent:* Wednesday, February 20, 2013 9:22 AM
> *To:* Mike Jones
> *Cc:* Nat Sakimura; <oauth@ietf.org>
> *Subject:* Re: [OAUTH-WG] I-D Action: draft-ietf-oauth-dyn-reg-06.txt
>
> Yes, "URL" is strongly and clearly deprecated in RFC3986 section 
> 1.1.3; one of the reasons is that the distinction between "locator" 
> and "identifier" which sounds like it should be easy, turns out to 
> lead to theological bikeshed discussions almost inevitably, and in 
> fact be shaky in practice.  -T
>
> On Wed, Feb 20, 2013 at 9:00 AM, Mike Jones 
> <Michael.Jones@microsoft.com <mailto:Michael.Jones@microsoft.com>> wrote:
>
> Tim, as background, this came from the OpenID Connect specs, where we 
> tried to consistently use the convention that the locator for any 
> resource that can be retrieved from the specified location be called a 
> URL, whereas any identifier that may not be retrievable is called a 
> URI.  That was done as an aid to developer understanding of the 
> specifications.
>
> If the use of "URL" is deprecated by the IETF in favor of always just 
> using "URI", I suppose we could change that, but if it's going to 
> change, it should be soon.
>
> -- Mike
>
> *From:*oauth-bounces@ietf.org <mailto:oauth-bounces@ietf.org> 
> [mailto:oauth-bounces@ietf.org <mailto:oauth-bounces@ietf.org>] *On 
> Behalf Of *Nat Sakimura
> *Sent:* Wednesday, February 20, 2013 8:57 AM
> *To:* Tim Bray
> *Cc:* <oauth@ietf.org <mailto:oauth@ietf.org>>
> *Subject:* Re: [OAUTH-WG] I-D Action: draft-ietf-oauth-dyn-reg-06.txt
>
> You are right. I am in the camp recommending the use of URL when it is 
> a concrete endpoint and URI when it includes something that is only 
> abstract, but since OAuth standardized on "uri", we may as well do so 
> here.
>
> Nat
>
> 2013/2/20 Tim Bray <twbray@google.com <mailto:twbray@google.com>>
>
> In OAuth, we have redirect_uri not redirect_url; should this be 
> registration_access_uri for consistency? -T
>
> On Wed, Feb 20, 2013 at 8:23 AM, John Bradley <ve7jtb@ve7jtb.com 
> <mailto:ve7jtb@ve7jtb.com>> wrote:
>
> I think registration_access_url is OK.    I haven't heard any better 
> names yet.
>
> John B.
>
> On 2013-02-20, at 1:04 PM, Mike Jones <Michael.Jones@microsoft.com 
> <mailto:Michael.Jones@microsoft.com>> wrote:
>
> For what it's worth, the name "registration_access_url" was chosen to 
> be parallel to "registration_access_token". It's the place you use the 
> access token.  And it's where you access an existing registration.  
> I'm against the name "client_metadata_url" because it's not metadata 
> you're accessing -- it's a registration you're accessing.  For the 
> same reason, I don't think the name "client_info_url" gives people the 
> right idea, because it doesn't say anything it being the registration 
> that you're accessing.
>
> If you really want us to change this, having read what's above, I 
> could live with "client_registration_url", but I don't think a change 
> is actually necessary.  (But if we are going to change it, let's do it 
> ASAP, before the OpenID Connect Implementer's Drafts are published.)
>
> -- Mike
>
> *From:*oauth-bounces@ietf.org <mailto:oauth-bounces@ietf.org> 
> [mailto:oauth- <mailto:oauth->bounces@ietf.org 
> <mailto:bounces@ietf.org>] *On Behalf Of *Nat Sakimura
> *Sent:* Wednesday, February 20, 2013 7:58 AM
> *To:* <oauth@ietf.org <mailto:oauth@ietf.org>>; Richer, Justin P.; 
> John Bradley
> *Subject:* Re: [OAUTH-WG] I-D Action: draft-ietf-oauth-dyn-reg-06.txt
>
> Thanks Justin.
>
> Even if we go flat rather than doing JSON Structure, the "Client
> Registration Access Endpoint" is not a good representative name.
>
> What it represents is the client metadata/info.
> It is not representing "Client Registration Access".
>
> What does "Client Registration Access" mean?
>
> Does UPDATing "Cleint Registration Access" make sense?
>
> Something in the line of "Client Metadata Endpoint" and
> something like "client_metadata_url" or "client_info_url" is much better.
>
> Nat
>
> 2013/2/15 Richer, Justin P. <jricher@mitre.org <mailto:jricher@mitre.org>>
>
> Everyone, there's a new draft of DynReg up on the tracker. This draft 
> tries to codify the discussions so far from this week into something 
> we can all read. There are still plenty of open discussion points and 
> items up for debate. Please read through this latest draft and see 
> what's changed and help assure that it properly captures the 
> conversations. If you have any inputs for the marked [[ Editor's Note 
> ]] sections, please send them to the list by next Thursday to give me 
> opportunity to get any necessary changes in by the cutoff date of 
> Monday the 22nd.
>
> Thanks for all of your hard work everyone, I think this is *really* 
> coming along now.
>
>  -- Justin
>
>
> On Feb 15, 2013, at 4:54 PM, internet-drafts@ietf.org 
> <mailto:internet-drafts@ietf.org> wrote:
>
> >
> > A New Internet-Draft is available from the on-line Internet-Drafts 
> directories.
> > This draft is a work item of the Web Authorization Protocol Working 
> Group of the IETF.
> >
> >       Title   : OAuth Dynamic Client Registration Protocol
> >       Author(s)   : Justin Richer
> >      John Bradley
> >      Michael B. Jones
> >      Maciej Machulak
> >       Filename    : draft-ietf-oauth-dyn-reg-06.txt
> >       Pages   : 21
> >       Date    : 2013-02-15
> >
> > Abstract:
> >   This specification defines an endpoint and protocol for dynamic
> >   registration of OAuth Clients at an Authorization Server.
> >
> >
> > The IETF datatracker status page for this draft is:
> > https://datatracker.ietf.org/doc/draft-ietf-oauth-dyn-reg
> >
> > There's also a htmlized version available at:
> > http://tools.ietf.org/html/draft-ietf-oauth-dyn-reg-06
> >
> > A diff from the previous version is available at:
> > http://www.ietf.org/rfcdiff?url2=draft-ietf-oauth-dyn-reg-06
> >
> >
> > Internet-Drafts are also available by anonymous FTP at:
> > ftp://ftp.ietf.org/internet-drafts/
> >
> > _______________________________________________
> > OAuth mailing list
> > OAuth@ietf.org <mailto:OAuth@ietf.org>
> > https://www.ietf.org/mailman/listinfo/oauth
>
> _______________________________________________
> OAuth mailing list
> OAuth@ietf.org <mailto:OAuth@ietf.org>
> https://www.ietf.org/mailman/listinfo/oauth
>
>
>
> -- 
> Nat Sakimura (=nat)
>
> Chairman, OpenID Foundation
> http://nat.sakimura.org/
> @_nat_en
>
>
> _______________________________________________
> OAuth mailing list
> OAuth@ietf.org <mailto:OAuth@ietf.org>
> https://www.ietf.org/mailman/listinfo/oauth
>
>
> _______________________________________________
> OAuth mailing list
> OAuth@ietf.org <mailto:OAuth@ietf.org>
> https://www.ietf.org/mailman/listinfo/oauth
>
>
>
> -- 
> Nat Sakimura (=nat)
>
> Chairman, OpenID Foundation
> http://nat.sakimura.org/
> @_nat_en
>
>
>
> _______________________________________________
> OAuth mailing list
> OAuth@ietf.org
> https://www.ietf.org/mailman/listinfo/oauth


--------------030606070303070907060102
Content-Type: text/html; charset="ISO-8859-1"
Content-Transfer-Encoding: 7bit

<html>
  <head>
    <meta content="text/html; charset=ISO-8859-1"
      http-equiv="Content-Type">
  </head>
  <body bgcolor="#FFFFFF" text="#000000">
    With this in mind, we might want to change *all* of the _url
    parameters to _uri instead, not just this new one. Are folks in
    favor of this?<br>
    <br>
    &nbsp;-- Justin<br>
    <br>
    <div class="moz-cite-prefix">On 02/20/2013 12:57 PM, Mike Jones
      wrote:<br>
    </div>
    <blockquote
cite="mid:4E1F6AAD24975D4BA5B16804296739436747B12D@TK5EX14MBXC284.redmond.corp.microsoft.com"
      type="cite">
      <meta http-equiv="Content-Type" content="text/html;
        charset=ISO-8859-1">
      <meta name="Generator" content="Microsoft Word 14 (filtered
        medium)">
      <style><!--
/* Font Definitions */
@font-face
	{font-family:Calibri;
	panose-1:2 15 5 2 2 2 4 3 2 4;}
@font-face
	{font-family:Tahoma;
	panose-1:2 11 6 4 3 5 4 4 2 4;}
/* Style Definitions */
p.MsoNormal, li.MsoNormal, div.MsoNormal
	{margin:0in;
	margin-bottom:.0001pt;
	font-size:12.0pt;
	font-family:"Times New Roman","serif";}
a:link, span.MsoHyperlink
	{mso-style-priority:99;
	color:blue;
	text-decoration:underline;}
a:visited, span.MsoHyperlinkFollowed
	{mso-style-priority:99;
	color:purple;
	text-decoration:underline;}
p.MsoAcetate, li.MsoAcetate, div.MsoAcetate
	{mso-style-priority:99;
	mso-style-link:"Balloon Text Char";
	margin:0in;
	margin-bottom:.0001pt;
	font-size:8.0pt;
	font-family:"Tahoma","sans-serif";}
span.hoenzb
	{mso-style-name:hoenzb;}
span.EmailStyle18
	{mso-style-type:personal-reply;
	font-family:"Calibri","sans-serif";
	color:#1F497D;}
span.BalloonTextChar
	{mso-style-name:"Balloon Text Char";
	mso-style-priority:99;
	mso-style-link:"Balloon Text";
	font-family:"Tahoma","sans-serif";}
.MsoChpDefault
	{mso-style-type:export-only;
	font-family:"Calibri","sans-serif";}
@page WordSection1
	{size:8.5in 11.0in;
	margin:1.0in 1.0in 1.0in 1.0in;}
div.WordSection1
	{page:WordSection1;}
--></style><!--[if gte mso 9]><xml>
<o:shapedefaults v:ext="edit" spidmax="1026" />
</xml><![endif]--><!--[if gte mso 9]><xml>
<o:shapelayout v:ext="edit">
<o:idmap v:ext="edit" data="1" />
</o:shapelayout></xml><![endif]-->
      <div class="WordSection1">
        <p class="MsoNormal"><span
style="font-size:11.0pt;font-family:&quot;Calibri&quot;,&quot;sans-serif&quot;;color:#1F497D">OK,
            we should make the change then.&nbsp; Thanks for the input.<o:p></o:p></span></p>
        <p class="MsoNormal"><span
style="font-size:11.0pt;font-family:&quot;Calibri&quot;,&quot;sans-serif&quot;;color:#1F497D"><o:p>&nbsp;</o:p></span></p>
        <p class="MsoNormal"><span
style="font-size:11.0pt;font-family:&quot;Calibri&quot;,&quot;sans-serif&quot;;color:#1F497D">&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;
            -- Mike<o:p></o:p></span></p>
        <p class="MsoNormal"><span
style="font-size:11.0pt;font-family:&quot;Calibri&quot;,&quot;sans-serif&quot;;color:#1F497D"><o:p>&nbsp;</o:p></span></p>
        <p class="MsoNormal"><b><span
style="font-size:10.0pt;font-family:&quot;Tahoma&quot;,&quot;sans-serif&quot;">From:</span></b><span
style="font-size:10.0pt;font-family:&quot;Tahoma&quot;,&quot;sans-serif&quot;">
            Tim Bray [<a class="moz-txt-link-freetext" href="mailto:twbray@google.com">mailto:twbray@google.com</a>]
            <br>
            <b>Sent:</b> Wednesday, February 20, 2013 9:22 AM<br>
            <b>To:</b> Mike Jones<br>
            <b>Cc:</b> Nat Sakimura; <a class="moz-txt-link-rfc2396E" href="mailto:oauth@ietf.org">&lt;oauth@ietf.org&gt;</a><br>
            <b>Subject:</b> Re: [OAUTH-WG] I-D Action:
            draft-ietf-oauth-dyn-reg-06.txt<o:p></o:p></span></p>
        <p class="MsoNormal"><o:p>&nbsp;</o:p></p>
        <p class="MsoNormal" style="margin-bottom:12.0pt">Yes, &#8220;URL&#8221; is
          strongly and clearly deprecated in RFC3986 section 1.1.3; one
          of the reasons is that the distinction between &#8220;locator&#8221; and
          &#8220;identifier&#8221; which sounds like it should be easy, turns out to
          lead to theological bikeshed discussions almost inevitably,
          and in fact be shaky in practice. &nbsp;-T<o:p></o:p></p>
        <div>
          <p class="MsoNormal">On Wed, Feb 20, 2013 at 9:00 AM, Mike
            Jones &lt;<a moz-do-not-send="true"
              href="mailto:Michael.Jones@microsoft.com" target="_blank">Michael.Jones@microsoft.com</a>&gt;
            wrote:<o:p></o:p></p>
          <div>
            <div>
              <p class="MsoNormal"
                style="mso-margin-top-alt:auto;mso-margin-bottom-alt:auto"><span
style="font-size:11.0pt;font-family:&quot;Calibri&quot;,&quot;sans-serif&quot;;color:#1F497D">Tim,
                  as background, this came from the OpenID Connect
                  specs, where we tried to consistently use the
                  convention that the locator for any resource that can
                  be retrieved from the specified location be called a
                  URL, whereas any identifier that may not be
                  retrievable is called a URI.&nbsp; That was done as an aid
                  to developer understanding of the specifications.</span><o:p></o:p></p>
              <p class="MsoNormal"
                style="mso-margin-top-alt:auto;mso-margin-bottom-alt:auto"><span
style="font-size:11.0pt;font-family:&quot;Calibri&quot;,&quot;sans-serif&quot;;color:#1F497D">&nbsp;</span><o:p></o:p></p>
              <p class="MsoNormal"
                style="mso-margin-top-alt:auto;mso-margin-bottom-alt:auto"><span
style="font-size:11.0pt;font-family:&quot;Calibri&quot;,&quot;sans-serif&quot;;color:#1F497D">If
                  the use of &#8220;URL&#8221; is deprecated by the IETF in favor of
                  always just using &#8220;URI&#8221;, I suppose we could change
                  that, but if it&#8217;s going to change, it should be soon.</span><o:p></o:p></p>
              <p class="MsoNormal"
                style="mso-margin-top-alt:auto;mso-margin-bottom-alt:auto"><span
style="font-size:11.0pt;font-family:&quot;Calibri&quot;,&quot;sans-serif&quot;;color:#1F497D">&nbsp;</span><o:p></o:p></p>
              <p class="MsoNormal"
                style="mso-margin-top-alt:auto;mso-margin-bottom-alt:auto"><span
style="font-size:11.0pt;font-family:&quot;Calibri&quot;,&quot;sans-serif&quot;;color:#1F497D">&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;
                  -- Mike</span><o:p></o:p></p>
              <p class="MsoNormal"
                style="mso-margin-top-alt:auto;mso-margin-bottom-alt:auto"><span
style="font-size:11.0pt;font-family:&quot;Calibri&quot;,&quot;sans-serif&quot;;color:#1F497D">&nbsp;</span><o:p></o:p></p>
              <p class="MsoNormal"
                style="mso-margin-top-alt:auto;mso-margin-bottom-alt:auto"><span
style="font-size:11.0pt;font-family:&quot;Calibri&quot;,&quot;sans-serif&quot;;color:#1F497D">&nbsp;</span><o:p></o:p></p>
              <p class="MsoNormal"
                style="mso-margin-top-alt:auto;mso-margin-bottom-alt:auto"><b><span
style="font-size:10.0pt;font-family:&quot;Tahoma&quot;,&quot;sans-serif&quot;">From:</span></b><span
style="font-size:10.0pt;font-family:&quot;Tahoma&quot;,&quot;sans-serif&quot;">
                  <a moz-do-not-send="true"
                    href="mailto:oauth-bounces@ietf.org" target="_blank">oauth-bounces@ietf.org</a>
                  [mailto:<a moz-do-not-send="true"
                    href="mailto:oauth-bounces@ietf.org" target="_blank">oauth-bounces@ietf.org</a>]
                  <b>On Behalf Of </b>Nat Sakimura<br>
                  <b>Sent:</b> Wednesday, February 20, 2013 8:57 AM<br>
                  <b>To:</b> Tim Bray<br>
                  <b>Cc:</b> &lt;<a moz-do-not-send="true"
                    href="mailto:oauth@ietf.org" target="_blank">oauth@ietf.org</a>&gt;<br>
                  <b>Subject:</b> Re: [OAUTH-WG] I-D Action:
                  draft-ietf-oauth-dyn-reg-06.txt</span><o:p></o:p></p>
              <p class="MsoNormal"
                style="mso-margin-top-alt:auto;mso-margin-bottom-alt:auto">&nbsp;<o:p></o:p></p>
              <p class="MsoNormal"
                style="mso-margin-top-alt:auto;mso-margin-bottom-alt:auto">You
                are right. I am in the camp recommending the use of URL
                when it is a concrete endpoint and URI when it includes
                something that is only abstract, but since OAuth
                standardized on "uri", we may as well do so here.&nbsp;<o:p></o:p></p>
              <div>
                <p class="MsoNormal"
                  style="mso-margin-top-alt:auto;mso-margin-bottom-alt:auto">&nbsp;<o:p></o:p></p>
              </div>
              <div>
                <p class="MsoNormal"
                  style="mso-margin-top-alt:auto;margin-bottom:12.0pt">Nat<o:p></o:p></p>
                <div>
                  <p class="MsoNormal"
                    style="mso-margin-top-alt:auto;mso-margin-bottom-alt:auto">2013/2/20
                    Tim Bray &lt;<a moz-do-not-send="true"
                      href="mailto:twbray@google.com" target="_blank">twbray@google.com</a>&gt;<o:p></o:p></p>
                  <p class="MsoNormal"
                    style="mso-margin-top-alt:auto;mso-margin-bottom-alt:auto">In
                    OAuth, we have redirect_uri not redirect_url; should
                    this be registration_access_uri for consistency? -T<o:p></o:p></p>
                  <div>
                    <div>
                      <p class="MsoNormal"
                        style="mso-margin-top-alt:auto;margin-bottom:12.0pt">&nbsp;<o:p></o:p></p>
                      <div>
                        <p class="MsoNormal"
                          style="mso-margin-top-alt:auto;mso-margin-bottom-alt:auto">On
                          Wed, Feb 20, 2013 at 8:23 AM, John Bradley
                          &lt;<a moz-do-not-send="true"
                            href="mailto:ve7jtb@ve7jtb.com"
                            target="_blank">ve7jtb@ve7jtb.com</a>&gt;
                          wrote:<o:p></o:p></p>
                        <div>
                          <p class="MsoNormal"
                            style="mso-margin-top-alt:auto;mso-margin-bottom-alt:auto">I
                            think registration_access_url is OK. &nbsp; &nbsp;I
                            haven't heard any better names yet.<o:p></o:p></p>
                          <div>
                            <p class="MsoNormal"
                              style="mso-margin-top-alt:auto;mso-margin-bottom-alt:auto">&nbsp;<o:p></o:p></p>
                          </div>
                          <div>
                            <p class="MsoNormal"
                              style="mso-margin-top-alt:auto;mso-margin-bottom-alt:auto">John
                              B.<o:p></o:p></p>
                            <div>
                              <div>
                                <p class="MsoNormal"
                                  style="mso-margin-top-alt:auto;mso-margin-bottom-alt:auto">&nbsp;<o:p></o:p></p>
                                <div>
                                  <div>
                                    <p class="MsoNormal"
                                      style="mso-margin-top-alt:auto;mso-margin-bottom-alt:auto">On
                                      2013-02-20, at 1:04 PM, Mike Jones
                                      &lt;<a moz-do-not-send="true"
                                        href="mailto:Michael.Jones@microsoft.com"
                                        target="_blank">Michael.Jones@microsoft.com</a>&gt;
                                      wrote:<o:p></o:p></p>
                                  </div>
                                  <p class="MsoNormal"
                                    style="mso-margin-top-alt:auto;margin-bottom:12.0pt"><o:p>&nbsp;</o:p></p>
                                  <div>
                                    <div>
                                      <div>
                                        <p class="MsoNormal"
                                          style="mso-margin-top-alt:auto;mso-margin-bottom-alt:auto"><span
style="font-size:11.0pt;font-family:&quot;Calibri&quot;,&quot;sans-serif&quot;;color:#1F497D">For
                                            what it&#8217;s worth, the name
                                            &#8220;registration_access_url&#8221;
                                            was chosen to be parallel to
                                            &#8220;registration_access_token&#8221;.&nbsp;&nbsp;

                                            It&#8217;s the place you use the
                                            access token.&nbsp; And it&#8217;s
                                            where you access an existing
                                            registration.&nbsp; I&#8217;m against
                                            the name
                                            &#8220;client_metadata_url&#8221;
                                            because it&#8217;s not metadata
                                            you&#8217;re accessing &#8211; it&#8217;s a
                                            registration you&#8217;re
                                            accessing.&nbsp; For the same
                                            reason, I don&#8217;t think the
                                            name &#8220;client_info_url&#8221; gives
                                            people the right idea,
                                            because it doesn&#8217;t say
                                            anything it being the
                                            registration that you&#8217;re
                                            accessing.</span><o:p></o:p></p>
                                      </div>
                                      <div>
                                        <p class="MsoNormal"
                                          style="mso-margin-top-alt:auto;mso-margin-bottom-alt:auto"><span
style="font-size:11.0pt;font-family:&quot;Calibri&quot;,&quot;sans-serif&quot;;color:#1F497D">&nbsp;</span><o:p></o:p></p>
                                      </div>
                                      <div>
                                        <p class="MsoNormal"
                                          style="mso-margin-top-alt:auto;mso-margin-bottom-alt:auto"><span
style="font-size:11.0pt;font-family:&quot;Calibri&quot;,&quot;sans-serif&quot;;color:#1F497D">If
                                            you really want us to change
                                            this, having read what&#8217;s
                                            above, I could live with
                                            &#8220;client_registration_url&#8221;,
                                            but I don&#8217;t think a change
                                            is actually necessary.&nbsp; (But
                                            if we are going to change
                                            it, let&#8217;s do it ASAP, before
                                            the OpenID Connect
                                            Implementer&#8217;s Drafts are
                                            published.)</span><o:p></o:p></p>
                                      </div>
                                      <div>
                                        <p class="MsoNormal"
                                          style="mso-margin-top-alt:auto;mso-margin-bottom-alt:auto"><span
style="font-size:11.0pt;font-family:&quot;Calibri&quot;,&quot;sans-serif&quot;;color:#1F497D">&nbsp;</span><o:p></o:p></p>
                                      </div>
                                      <div>
                                        <p class="MsoNormal"
                                          style="mso-margin-top-alt:auto;mso-margin-bottom-alt:auto"><span
style="font-size:11.0pt;font-family:&quot;Calibri&quot;,&quot;sans-serif&quot;;color:#1F497D">&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;
                                            -- Mike</span><o:p></o:p></p>
                                      </div>
                                      <div>
                                        <p class="MsoNormal"
                                          style="mso-margin-top-alt:auto;mso-margin-bottom-alt:auto"><span
style="font-size:11.0pt;font-family:&quot;Calibri&quot;,&quot;sans-serif&quot;;color:#1F497D">&nbsp;</span><o:p></o:p></p>
                                      </div>
                                      <div>
                                        <p class="MsoNormal"
                                          style="mso-margin-top-alt:auto;mso-margin-bottom-alt:auto"><b><span
style="font-size:10.0pt;font-family:&quot;Tahoma&quot;,&quot;sans-serif&quot;">From:</span></b><span
style="font-size:10.0pt;font-family:&quot;Tahoma&quot;,&quot;sans-serif&quot;">&nbsp;<a
                                              moz-do-not-send="true"
                                              href="mailto:oauth-bounces@ietf.org"
                                              target="_blank">oauth-bounces@ietf.org</a>
                                            [mailto:<a
                                              moz-do-not-send="true"
                                              href="mailto:oauth-"
                                              target="_blank">oauth-</a><a
                                              moz-do-not-send="true"
                                              href="mailto:bounces@ietf.org"
                                              target="_blank">bounces@ietf.org</a>]&nbsp;<b>On
                                              Behalf Of&nbsp;</b>Nat Sakimura<br>
                                            <b>Sent:</b>&nbsp;Wednesday,
                                            February 20, 2013 7:58 AM<br>
                                            <b>To:</b>&nbsp;&lt;<a
                                              moz-do-not-send="true"
                                              href="mailto:oauth@ietf.org"
                                              target="_blank">oauth@ietf.org</a>&gt;;
                                            Richer, Justin P.; John
                                            Bradley<br>
                                            <b>Subject:</b>&nbsp;Re:
                                            [OAUTH-WG] I-D Action:
                                            draft-ietf-oauth-dyn-reg-06.txt</span><o:p></o:p></p>
                                      </div>
                                      <div>
                                        <p class="MsoNormal"
                                          style="mso-margin-top-alt:auto;mso-margin-bottom-alt:auto">&nbsp;<o:p></o:p></p>
                                      </div>
                                      <div>
                                        <p class="MsoNormal"
                                          style="mso-margin-top-alt:auto;mso-margin-bottom-alt:auto"><span
style="font-size:13.5pt;font-family:&quot;Arial&quot;,&quot;sans-serif&quot;;color:#222222">Thanks
                                            Justin.<br>
                                            <br>
                                            Even if we go flat rather
                                            than doing JSON Structure,
                                            the "Client<br>
                                            Registration Access
                                            Endpoint" is not a good
                                            representative name.<br>
                                            <br>
                                            What it represents is the
                                            client metadata/info.<br>
                                            It is not representing
                                            "Client Registration
                                            Access".&nbsp;</span><o:p></o:p></p>
                                      </div>
                                      <div>
                                        <div>
                                          <p class="MsoNormal"
                                            style="mso-margin-top-alt:auto;mso-margin-bottom-alt:auto">What
                                            does "Client Registration
                                            Access" mean?&nbsp;<o:p></o:p></p>
                                        </div>
                                      </div>
                                      <div>
                                        <p class="MsoNormal"
                                          style="mso-margin-top-alt:auto;margin-bottom:12.0pt"><span
style="font-size:13.5pt;font-family:&quot;Arial&quot;,&quot;sans-serif&quot;;color:#222222">Does
                                            UPDATing "Cleint
                                            Registration Access" make
                                            sense?</span><br>
                                          <span
style="font-size:13.5pt;font-family:&quot;Arial&quot;,&quot;sans-serif&quot;;color:#222222"><br>
                                            Something in the line of
                                            "Client Metadata Endpoint"
                                            and<br>
                                            something like
                                            "client_metadata_url"
                                            or&nbsp;"client_info_url" is much
                                            better.<br>
                                            <br>
                                            Nat</span><o:p></o:p></p>
                                        <div>
                                          <div>
                                            <p class="MsoNormal"
                                              style="mso-margin-top-alt:auto;mso-margin-bottom-alt:auto">2013/2/15
                                              Richer, Justin P. &lt;<a
                                                moz-do-not-send="true"
                                                href="mailto:jricher@mitre.org"
                                                target="_blank"><span
                                                  style="color:purple">jricher@mitre.org</span></a>&gt;<o:p></o:p></p>
                                          </div>
                                          <div>
                                            <p class="MsoNormal"
                                              style="mso-margin-top-alt:auto;mso-margin-bottom-alt:auto">Everyone,
                                              there's a new draft of
                                              DynReg up on the tracker.
                                              This draft tries to codify
                                              the discussions so far
                                              from this week into
                                              something we can all read.
                                              There are still plenty of
                                              open discussion points and
                                              items up for debate.
                                              Please read through this
                                              latest draft and see
                                              what's changed and help
                                              assure that it properly
                                              captures the
                                              conversations. If you have
                                              any inputs for the marked
                                              [[ Editor's Note ]]
                                              sections, please send them
                                              to the list by next
                                              Thursday to give me
                                              opportunity to get any
                                              necessary changes in by
                                              the cutoff date of Monday
                                              the 22nd.<br>
                                              <br>
                                              Thanks for all of your
                                              hard work everyone, I
                                              think this is *really*
                                              coming along now.<br>
                                              <span
                                                style="color:#888888"><br>
                                                &nbsp;-- Justin</span><o:p></o:p></p>
                                          </div>
                                          <div>
                                            <div>
                                              <p class="MsoNormal"
                                                style="mso-margin-top-alt:auto;mso-margin-bottom-alt:auto"><br>
                                                On Feb 15, 2013, at 4:54
                                                PM,&nbsp;<a
                                                  moz-do-not-send="true"
href="mailto:internet-drafts@ietf.org" target="_blank"><span
                                                    style="color:purple">internet-drafts@ietf.org</span></a>&nbsp;wrote:<br>
                                                <br>
                                                &gt;<br>
                                                &gt; A New
                                                Internet-Draft is
                                                available from the
                                                on-line Internet-Drafts
                                                directories.<br>
                                                &gt; This draft is a
                                                work item of the Web
                                                Authorization Protocol
                                                Working Group of the
                                                IETF.<br>
                                                &gt;<br>
                                                &gt; &nbsp; &nbsp; &nbsp; Title &nbsp; &nbsp; &nbsp; &nbsp;
                                                &nbsp; : OAuth Dynamic Client
                                                Registration Protocol<br>
                                                &gt; &nbsp; &nbsp; &nbsp; Author(s) &nbsp; &nbsp;
                                                &nbsp; : Justin Richer<br>
                                                &gt; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp;
                                                &nbsp; &nbsp; &nbsp;John Bradley<br>
                                                &gt; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp;
                                                &nbsp; &nbsp; &nbsp;Michael B. Jones<br>
                                                &gt; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp;
                                                &nbsp; &nbsp; &nbsp;Maciej Machulak<br>
                                                &gt; &nbsp; &nbsp; &nbsp; Filename &nbsp; &nbsp;
                                                &nbsp; &nbsp;:
                                                draft-ietf-oauth-dyn-reg-06.txt<br>
                                                &gt; &nbsp; &nbsp; &nbsp; Pages &nbsp; &nbsp; &nbsp; &nbsp;
                                                &nbsp; : 21<br>
                                                &gt; &nbsp; &nbsp; &nbsp; Date &nbsp; &nbsp; &nbsp; &nbsp;
                                                &nbsp; &nbsp;: 2013-02-15<br>
                                                &gt;<br>
                                                &gt; Abstract:<br>
                                                &gt; &nbsp; This
                                                specification defines an
                                                endpoint and protocol
                                                for dynamic<br>
                                                &gt; &nbsp; registration of
                                                OAuth Clients at an
                                                Authorization Server.<br>
                                                &gt;<br>
                                                &gt;<br>
                                                &gt; The IETF
                                                datatracker status page
                                                for this draft is:<br>
                                                &gt;&nbsp;<a
                                                  moz-do-not-send="true"
href="https://datatracker.ietf.org/doc/draft-ietf-oauth-dyn-reg"
                                                  target="_blank"><span
                                                    style="color:purple">https://datatracker.ietf.org/doc/draft-ietf-oauth-dyn-reg</span></a><br>
                                                &gt;<br>
                                                &gt; There's also a
                                                htmlized version
                                                available at:<br>
                                                &gt;&nbsp;<a
                                                  moz-do-not-send="true"
href="http://tools.ietf.org/html/draft-ietf-oauth-dyn-reg-06"
                                                  target="_blank"><span
                                                    style="color:purple">http://tools.ietf.org/html/draft-ietf-oauth-dyn-reg-06</span></a><br>
                                                &gt;<br>
                                                &gt; A diff from the
                                                previous version is
                                                available at:<br>
                                                &gt;&nbsp;<a
                                                  moz-do-not-send="true"
href="http://www.ietf.org/rfcdiff?url2=draft-ietf-oauth-dyn-reg-06"
                                                  target="_blank"><span
                                                    style="color:purple">http://www.ietf.org/rfcdiff?url2=draft-ietf-oauth-dyn-reg-06</span></a><br>
                                                &gt;<br>
                                                &gt;<br>
                                                &gt; Internet-Drafts are
                                                also available by
                                                anonymous FTP at:<br>
                                                &gt;&nbsp;<a
                                                  moz-do-not-send="true"
href="ftp://ftp.ietf.org/internet-drafts/" target="_blank"><span
                                                    style="color:purple">ftp://ftp.ietf.org/internet-drafts/</span></a><br>
                                                &gt;<br>
                                                &gt;
                                                _______________________________________________<br>
                                                &gt; OAuth mailing list<br>
                                                &gt;&nbsp;<a
                                                  moz-do-not-send="true"
href="mailto:OAuth@ietf.org" target="_blank"><span style="color:purple">OAuth@ietf.org</span></a><br>
                                                &gt;&nbsp;<a
                                                  moz-do-not-send="true"
href="https://www.ietf.org/mailman/listinfo/oauth" target="_blank"><span
                                                    style="color:purple">https://www.ietf.org/mailman/listinfo/oauth</span></a><br>
                                                <br>
_______________________________________________<br>
                                                OAuth mailing list<br>
                                                <a
                                                  moz-do-not-send="true"
href="mailto:OAuth@ietf.org" target="_blank"><span style="color:purple">OAuth@ietf.org</span></a><br>
                                                <a
                                                  moz-do-not-send="true"
href="https://www.ietf.org/mailman/listinfo/oauth" target="_blank"><span
                                                    style="color:purple">https://www.ietf.org/mailman/listinfo/oauth</span></a><o:p></o:p></p>
                                            </div>
                                          </div>
                                        </div>
                                        <div>
                                          <p class="MsoNormal"
                                            style="mso-margin-top-alt:auto;mso-margin-bottom-alt:auto"><br>
                                            <br clear="all">
                                            <o:p></o:p></p>
                                        </div>
                                        <div>
                                          <div>
                                            <p class="MsoNormal"
                                              style="mso-margin-top-alt:auto;mso-margin-bottom-alt:auto">&nbsp;<o:p></o:p></p>
                                          </div>
                                        </div>
                                        <div>
                                          <p class="MsoNormal"
                                            style="mso-margin-top-alt:auto;mso-margin-bottom-alt:auto">--&nbsp;<br>
                                            Nat Sakimura (=nat)<o:p></o:p></p>
                                        </div>
                                        <div>
                                          <div>
                                            <p class="MsoNormal"
                                              style="mso-margin-top-alt:auto;mso-margin-bottom-alt:auto">Chairman,
                                              OpenID Foundation<br>
                                              <a moz-do-not-send="true"
href="http://nat.sakimura.org/" target="_blank"><span
                                                  style="color:purple">http://nat.sakimura.org/</span></a><br>
                                              @_nat_en<o:p></o:p></p>
                                          </div>
                                        </div>
                                      </div>
                                    </div>
                                  </div>
                                </div>
                                <p class="MsoNormal"
                                  style="mso-margin-top-alt:auto;mso-margin-bottom-alt:auto">&nbsp;<o:p></o:p></p>
                              </div>
                            </div>
                          </div>
                        </div>
                        <p class="MsoNormal"
                          style="mso-margin-top-alt:auto;margin-bottom:12.0pt"><br>
_______________________________________________<br>
                          OAuth mailing list<br>
                          <a moz-do-not-send="true"
                            href="mailto:OAuth@ietf.org" target="_blank">OAuth@ietf.org</a><br>
                          <a moz-do-not-send="true"
                            href="https://www.ietf.org/mailman/listinfo/oauth"
                            target="_blank">https://www.ietf.org/mailman/listinfo/oauth</a><o:p></o:p></p>
                      </div>
                      <p class="MsoNormal"
                        style="mso-margin-top-alt:auto;mso-margin-bottom-alt:auto">&nbsp;<o:p></o:p></p>
                    </div>
                  </div>
                  <p class="MsoNormal"
                    style="mso-margin-top-alt:auto;margin-bottom:12.0pt"><br>
                    _______________________________________________<br>
                    OAuth mailing list<br>
                    <a moz-do-not-send="true"
                      href="mailto:OAuth@ietf.org" target="_blank">OAuth@ietf.org</a><br>
                    <a moz-do-not-send="true"
                      href="https://www.ietf.org/mailman/listinfo/oauth"
                      target="_blank">https://www.ietf.org/mailman/listinfo/oauth</a><o:p></o:p></p>
                </div>
                <p class="MsoNormal"
                  style="mso-margin-top-alt:auto;mso-margin-bottom-alt:auto"><span
                    style="color:#888888"><br>
                    <br clear="all">
                    <o:p></o:p></span></p>
                <div>
                  <p class="MsoNormal"
                    style="mso-margin-top-alt:auto;mso-margin-bottom-alt:auto"><span
                      style="color:#888888">&nbsp;<o:p></o:p></span></p>
                </div>
                <p class="MsoNormal"
                  style="mso-margin-top-alt:auto;mso-margin-bottom-alt:auto"><span
                    style="color:#888888">--
                    <br>
                    Nat Sakimura (=nat)<o:p></o:p></span></p>
                <div>
                  <p class="MsoNormal"
                    style="mso-margin-top-alt:auto;mso-margin-bottom-alt:auto"><span
                      style="color:#888888">Chairman, OpenID Foundation<br>
                      <a moz-do-not-send="true"
                        href="http://nat.sakimura.org/" target="_blank">http://nat.sakimura.org/</a><br>
                      @_nat_en<o:p></o:p></span></p>
                </div>
              </div>
            </div>
          </div>
        </div>
        <p class="MsoNormal"><o:p>&nbsp;</o:p></p>
      </div>
      <br>
      <fieldset class="mimeAttachmentHeader"></fieldset>
      <br>
      <pre wrap="">_______________________________________________
OAuth mailing list
<a class="moz-txt-link-abbreviated" href="mailto:OAuth@ietf.org">OAuth@ietf.org</a>
<a class="moz-txt-link-freetext" href="https://www.ietf.org/mailman/listinfo/oauth">https://www.ietf.org/mailman/listinfo/oauth</a>
</pre>
    </blockquote>
    <br>
  </body>
</html>

--------------030606070303070907060102--

From donald.coffin@reminetworks.com  Thu Feb 21 07:44:28 2013
Return-Path: <donald.coffin@reminetworks.com>
X-Original-To: oauth@ietfa.amsl.com
Delivered-To: oauth@ietfa.amsl.com
Received: from localhost (localhost [127.0.0.1]) by ietfa.amsl.com (Postfix) with ESMTP id 3114A21F8E9B for <oauth@ietfa.amsl.com>; Thu, 21 Feb 2013 07:44:28 -0800 (PST)
X-Virus-Scanned: amavisd-new at amsl.com
X-Spam-Flag: NO
X-Spam-Score: -2.047
X-Spam-Level: 
X-Spam-Status: No, score=-2.047 tagged_above=-999 required=5 tests=[AWL=0.217,  BAYES_00=-2.599, HTML_MESSAGE=0.001, IP_NOT_FRIENDLY=0.334]
Received: from mail.ietf.org ([64.170.98.30]) by localhost (ietfa.amsl.com [127.0.0.1]) (amavisd-new, port 10024) with ESMTP id x3wV7auVgqec for <oauth@ietfa.amsl.com>; Thu, 21 Feb 2013 07:44:26 -0800 (PST)
Received: from oproxy7-pub.bluehost.com (oproxy7-pub.bluehost.com [67.222.55.9]) by ietfa.amsl.com (Postfix) with SMTP id 739CB21F8E97 for <oauth@ietf.org>; Thu, 21 Feb 2013 07:44:26 -0800 (PST)
Received: (qmail 11368 invoked by uid 0); 21 Feb 2013 15:43:58 -0000
Received: from unknown (HELO host125.hostmonster.com) (74.220.207.125) by oproxy7.bluehost.com with SMTP; 21 Feb 2013 15:43:58 -0000
DKIM-Signature: v=1; a=rsa-sha256; q=dns/txt; c=relaxed/relaxed; d=reminetworks.com; s=default;  h=Content-Type:MIME-Version:Message-ID:Date:Subject:In-Reply-To:References:Cc:To:From; bh=Q7rfQPszNmF9+InjZXGJigfKPVKK24ma1JSlvl09HJw=;  b=HGJNURGr00WeUeRNF8N2m8wtqrS82T1gBwWS6FaQ2CVh1BY0THgvslROWJ6G3PBIUkuo2hHEv496ajqRtRsWoxr0Rk/wAY1SuJRGau8slI0V2vUNya+YBCk/UTdRuMtE;
Received: from [68.4.207.246] (port=1155 helo=HPPavilionElite) by host125.hostmonster.com with esmtpa (Exim 4.80) (envelope-from <donald.coffin@reminetworks.com>) id 1U8YJS-0000ht-9z; Thu, 21 Feb 2013 08:43:58 -0700
From: "Donald F Coffin" <donald.coffin@reminetworks.com>
To: "'Torsten Lodderstedt'" <torsten@lodderstedt.net>
References: <013601ce0fc7$b2faea20$18f0be60$@reminetworks.com> <F4E5214A-76C0-468E-BFE5-6578ED22D2A3@lodderstedt.net>
In-Reply-To: <F4E5214A-76C0-468E-BFE5-6578ED22D2A3@lodderstedt.net>
Date: Thu, 21 Feb 2013 07:42:20 -0800
Message-ID: <004f01ce104a$097c79e0$1c756da0$@reminetworks.com>
MIME-Version: 1.0
Content-Type: multipart/alternative; boundary="----=_NextPart_000_0050_01CE1006.FB5BAAE0"
X-Mailer: Microsoft Outlook 14.0
Thread-Index: AQJjjcb25qbAdii4kOnGObWIAqRIYwHsW6Rdl0oU45A=
Content-Language: en-us
X-Identified-User: {1395:host125.hostmonster.com:reminetw:reminetworks.com} {sentby:smtp auth 68.4.207.246 authed with donald.coffin@reminetworks.com}
Cc: 'John Adkins' <jva2@pge.com>, 'Marty Burns' <marty@hypertek.us>, 'Scott Crowder' <scott.crowder@qadoenergy.com>, 'Dave Robin' <drobin@automatedlogic.com>, 'John Teeter' <john.teeter@peoplepowerco.com>, pmadsen@pingidentity.com, 'Edward Denson' <ewd7@pge.com>, 'Jay Mitra' <jay@youtilities.com>, 'Uday Verma' <uday.verma@ilinknet.com>, 'Ray Perlner' <ray.perlner@nist.gov>, 'Anne Hendry' <ahendry2@gmail.com>, 'Lynne Rodoni' <mrodoni@semprautilities.com>, oauth@ietf.org
Subject: Re: [OAUTH-WG] draft-ietf-oauth-revocation-05 Questions
X-BeenThere: oauth@ietf.org
X-Mailman-Version: 2.1.12
Precedence: list
List-Id: OAUTH WG <oauth.ietf.org>
List-Unsubscribe: <https://www.ietf.org/mailman/options/oauth>, <mailto:oauth-request@ietf.org?subject=unsubscribe>
List-Archive: <http://www.ietf.org/mail-archive/web/oauth>
List-Post: <mailto:oauth@ietf.org>
List-Help: <mailto:oauth-request@ietf.org?subject=help>
List-Subscribe: <https://www.ietf.org/mailman/listinfo/oauth>, <mailto:oauth-request@ietf.org?subject=subscribe>
X-List-Received-Date: Thu, 21 Feb 2013 15:44:28 -0000

This is a multipart message in MIME format.

------=_NextPart_000_0050_01CE1006.FB5BAAE0
Content-Type: text/plain;
	charset="utf-8"
Content-Transfer-Encoding: quoted-printable

Torsten,

=20

Thanks for the response.  What is the =E2=80=9Crespective portal =
belonging to the AS=E2=80=9D?  I haven=E2=80=99t seen anything in the =
OAuth 2.0 Authorization Framework that describes a =
=E2=80=9Cportal=E2=80=9D on the AS a Resource Owner can log into to view =
a valid list of authorization grants.  Is this an out-of-band =
implementation suggestion?

=20

Best regards,

Don

Donald F. Coffin

Founder/CTO

=20

REMI Networks

22751 El Prado Suite 6216

Rancho Santa Margarita, CA  92688-3836

=20

Phone:      (949) 636-8571

Email:        <mailto:donald.coffin@reminetworks.com> =
donald.coffin@reminetworks.com

=20

From: Torsten Lodderstedt [mailto:torsten@lodderstedt.net]=20
Sent: Thursday, February 21, 2013 12:13 AM
To: Donald F Coffin
Cc: <oauth@ietf.org>; Anne Hendry; Dave Robin; Edward Denson; Jay Mitra; =
John Adkins; John Teeter; Lynne Rodoni; Marty Burns; =
<pmadsen@pingidentity.com>; Ray Perlner; Scott Crowder; Uday Verma
Subject: Re: draft-ietf-oauth-revocation-05 Questions

=20

Hi Donald,

=20

thank you for sharing your thoughts with us. I've never seen revocation =
as change of scope of the authorization, but it sounds reasonable. The =
current design handles the issues you raised differently.

=20

The AS is involved in the revocation process as it exposes the =
revocation endpoint. So if the token is revoked (from a technical =
perspective), it knows it. If the user wants to check whether the =
application really sent the request, she is supposed to visit the =
respective portal belonging to the AS. There the AS provides a list of =
all valid authorization grants in its database.=20

=20

Does this address your issues?

=20

regards,

Torsten.


Am 21.02.2013 um 01:09 schrieb "Donald F Coffin" =
<donald.coffin@reminetworks.com>:

Torsten,

=20

A colleague of mine and I were discussing what should occur when a =
Retail Customer desires to change the existing authorized access of a =
Third Party.  During our discussion they asked =E2=80=9CHow does the =
Retail Customer know the Third Party actually issued a Token revocation =
request?  Isn=E2=80=99t there a potential trust issue with the current =
design=E2=80=9D?=20

=20

The current draft provides a Third Party mechanism that =E2=80=9Callows =
a client to invalidate its tokens if the end-user logs out, changes =
identity, or uninstalls the respective application (sic).=E2=80=9D While =
none of these fit the situation we were discussing they do seem to be =
based on the assumption a Third Party application will be a good citizen =
and stop using access tokens.  Unfortunately, none of the addressed =
situations require the participation of a AS for completion, therefore =
the risk exists that a Retail Customer may believe they have removed a =
Third Party application from accessing their protected data, but in =
reality there does not seem to be a mechanism to either force or verify =
the Third Party can no longer have access to the protected data.

=20

A possible modification to the current draft that would correct this =
potential security risk, is to treat a Token revocation using a message =
flow similar to the existing authorization_code response type.  A Retail =
Customer requesting a change to the Third Party authorized access would =
be redirected to an AS endpoint that would allow the Retail Customer to =
either terminate a relationship completely or modify the existing Third =
Party access authorization.  The successful response from the AS would =
indicate the Third Party needs to remove the current Token from its =
Token store.  In the event the Retail Customer has changed the Third =
Party access authorization, the AS response could include an optional =
=E2=80=9Cscope=E2=80=9D element, which the Third Party would then use to =
obtain a new access token utilizing an Authorization Code request.

=20

There are several other potential implementations that could be =
developed to protect a Retail Customer from a =E2=80=9Crogue=E2=80=9D =
Third Party application that does not inform the AS their authorization =
to access a Retail Customer=E2=80=99s protected data has been revoked, =
but the above suggestion meets the current draft=E2=80=99s view that =
Third Parties should be able to request Tokens be revoked.

=20

I look forward to your comments on the above topic.

=20

=20

Best regards,

Don

Donald F. Coffin

Founder/CTO

=20

REMI Networks

22751 El Prado Suite 6216

Rancho Santa Margarita, CA  92688-3836

=20

Phone:      (949) 636-8571

Email:       donald.coffin@reminetworks.com

=20


------=_NextPart_000_0050_01CE1006.FB5BAAE0
Content-Type: text/html;
	charset="utf-8"
Content-Transfer-Encoding: quoted-printable

<html xmlns:v=3D"urn:schemas-microsoft-com:vml" =
xmlns:o=3D"urn:schemas-microsoft-com:office:office" =
xmlns:w=3D"urn:schemas-microsoft-com:office:word" =
xmlns:m=3D"http://schemas.microsoft.com/office/2004/12/omml" =
xmlns=3D"http://www.w3.org/TR/REC-html40"><head><meta =
http-equiv=3DContent-Type content=3D"text/html; charset=3Dutf-8"><meta =
name=3DGenerator content=3D"Microsoft Word 14 (filtered =
medium)"><style><!--
/* Font Definitions */
@font-face
	{font-family:"Cambria Math";
	panose-1:2 4 5 3 5 4 6 3 2 4;}
@font-face
	{font-family:Cambria;
	panose-1:2 4 5 3 5 4 6 3 2 4;}
@font-face
	{font-family:Calibri;
	panose-1:2 15 5 2 2 2 4 3 2 4;}
@font-face
	{font-family:Tahoma;
	panose-1:2 11 6 4 3 5 4 4 2 4;}
@font-face
	{font-family:"Brush Script MT";
	panose-1:3 6 8 2 4 4 6 7 3 4;}
/* Style Definitions */
p.MsoNormal, li.MsoNormal, div.MsoNormal
	{margin:0in;
	margin-bottom:.0001pt;
	font-size:11.0pt;
	font-family:"Calibri","sans-serif";}
a:link, span.MsoHyperlink
	{mso-style-priority:99;
	color:blue;
	text-decoration:underline;}
a:visited, span.MsoHyperlinkFollowed
	{mso-style-priority:99;
	color:purple;
	text-decoration:underline;}
span.EmailStyle17
	{mso-style-type:personal;
	font-family:"Cambria","serif";
	color:windowtext;}
span.EmailStyle18
	{mso-style-type:personal-reply;
	font-family:"Cambria","serif";
	color:windowtext;
	font-weight:normal;
	font-style:normal;}
.MsoChpDefault
	{mso-style-type:export-only;
	font-size:10.0pt;}
@page WordSection1
	{size:8.5in 11.0in;
	margin:1.0in 1.0in 1.0in 1.0in;}
div.WordSection1
	{page:WordSection1;}
--></style><!--[if gte mso 9]><xml>
<o:shapedefaults v:ext=3D"edit" spidmax=3D"1026" />
</xml><![endif]--><!--[if gte mso 9]><xml>
<o:shapelayout v:ext=3D"edit">
<o:idmap v:ext=3D"edit" data=3D"1" />
</o:shapelayout></xml><![endif]--></head><body lang=3DEN-US link=3Dblue =
vlink=3Dpurple><div class=3DWordSection1><p class=3DMsoNormal><span =
style=3D'font-size:12.0pt;font-family:"Cambria","serif"'>Torsten,<o:p></o=
:p></span></p><p class=3DMsoNormal><span =
style=3D'font-size:12.0pt;font-family:"Cambria","serif"'><o:p>&nbsp;</o:p=
></span></p><p class=3DMsoNormal><span =
style=3D'font-size:12.0pt;font-family:"Cambria","serif"'>Thanks for the =
response.=C2=A0 What is the =E2=80=9Crespective portal belonging to the =
AS=E2=80=9D?=C2=A0 I haven=E2=80=99t seen anything in the OAuth 2.0 =
Authorization Framework that describes a =E2=80=9Cportal=E2=80=9D on the =
AS a Resource Owner can log into to view a valid list of authorization =
grants.=C2=A0 Is this an out-of-band implementation =
suggestion?<o:p></o:p></span></p><p class=3DMsoNormal><span =
style=3D'font-size:12.0pt;font-family:"Cambria","serif"'><o:p>&nbsp;</o:p=
></span></p><div><p class=3DMsoNormal><span =
style=3D'font-size:12.0pt'>Best regards,<o:p></o:p></span></p><p =
class=3DMsoNormal><span style=3D'font-size:24.0pt;font-family:"Brush =
Script MT"'>Don<o:p></o:p></span></p><p class=3DMsoNormal><span =
style=3D'font-size:12.0pt'>Donald F. Coffin<o:p></o:p></span></p><p =
class=3DMsoNormal><span =
style=3D'font-size:12.0pt'>Founder/CTO<o:p></o:p></span></p><p =
class=3DMsoNormal><span =
style=3D'font-size:12.0pt'><o:p>&nbsp;</o:p></span></p><p =
class=3DMsoNormal><span style=3D'font-size:12.0pt'>REMI =
Networks<o:p></o:p></span></p><p class=3DMsoNormal><span =
style=3D'font-size:12.0pt'>22751 El Prado Suite =
6216<o:p></o:p></span></p><p class=3DMsoNormal><span =
style=3D'font-size:12.0pt'>Rancho Santa Margarita, CA=C2=A0 =
92688-3836<o:p></o:p></span></p><p class=3DMsoNormal><span =
style=3D'font-size:12.0pt'><o:p>&nbsp;</o:p></span></p><p =
class=3DMsoNormal><span =
style=3D'font-size:12.0pt'>Phone:=C2=A0=C2=A0=C2=A0=C2=A0=C2=A0 (949) =
636-8571<o:p></o:p></span></p><p class=3DMsoNormal><span =
style=3D'font-size:12.0pt'>Email:=C2=A0=C2=A0=C2=A0=C2=A0=C2=A0=C2=A0 <a =
href=3D"mailto:donald.coffin@reminetworks.com"><span =
style=3D'color:blue'>donald.coffin@reminetworks.com</span></a><o:p></o:p>=
</span></p></div><p class=3DMsoNormal><span =
style=3D'font-size:12.0pt;font-family:"Cambria","serif"'><o:p>&nbsp;</o:p=
></span></p><div><div style=3D'border:none;border-top:solid #B5C4DF =
1.0pt;padding:3.0pt 0in 0in 0in'><p class=3DMsoNormal><b><span =
style=3D'font-size:10.0pt;font-family:"Tahoma","sans-serif"'>From:</span>=
</b><span style=3D'font-size:10.0pt;font-family:"Tahoma","sans-serif"'> =
Torsten Lodderstedt [mailto:torsten@lodderstedt.net] <br><b>Sent:</b> =
Thursday, February 21, 2013 12:13 AM<br><b>To:</b> Donald F =
Coffin<br><b>Cc:</b> &lt;oauth@ietf.org&gt;; Anne Hendry; Dave Robin; =
Edward Denson; Jay Mitra; John Adkins; John Teeter; Lynne Rodoni; Marty =
Burns; &lt;pmadsen@pingidentity.com&gt;; Ray Perlner; Scott Crowder; =
Uday Verma<br><b>Subject:</b> Re: draft-ietf-oauth-revocation-05 =
Questions<o:p></o:p></span></p></div></div><p =
class=3DMsoNormal><o:p>&nbsp;</o:p></p><div><p class=3DMsoNormal>Hi =
Donald,<o:p></o:p></p></div><div><p =
class=3DMsoNormal><o:p>&nbsp;</o:p></p></div><div><p =
class=3DMsoNormal>thank you for sharing your thoughts with us. I've =
never seen revocation as change of scope of the authorization, but it =
sounds reasonable. The current design handles the issues you raised =
differently.<o:p></o:p></p></div><div><p =
class=3DMsoNormal><o:p>&nbsp;</o:p></p></div><div><p =
class=3DMsoNormal>The AS is involved in the revocation process as it =
exposes the revocation endpoint. So if the token is revoked (from a =
technical perspective), it knows it. If the user wants to check whether =
the application really sent the request, she is supposed to visit the =
respective portal belonging to the AS. There the AS provides a list of =
all valid authorization grants in its =
database.&nbsp;<o:p></o:p></p></div><div><p =
class=3DMsoNormal><o:p>&nbsp;</o:p></p></div><div><p =
class=3DMsoNormal>Does this address your =
issues?<o:p></o:p></p></div><div><p =
class=3DMsoNormal><o:p>&nbsp;</o:p></p></div><div><p =
class=3DMsoNormal>regards,<o:p></o:p></p></div><div><p =
class=3DMsoNormal>Torsten.<o:p></o:p></p></div><div><p class=3DMsoNormal =
style=3D'margin-bottom:12.0pt'><br>Am 21.02.2013 um 01:09 schrieb =
&quot;Donald F Coffin&quot; &lt;<a =
href=3D"mailto:donald.coffin@reminetworks.com">donald.coffin@reminetworks=
.com</a>&gt;:<o:p></o:p></p></div><blockquote =
style=3D'margin-top:5.0pt;margin-bottom:5.0pt'><div><p =
class=3DMsoNormal><span =
style=3D'font-size:12.0pt;font-family:"Cambria","serif"'>Torsten,</span><=
o:p></o:p></p><p class=3DMsoNormal><span =
style=3D'font-size:12.0pt;font-family:"Cambria","serif"'>&nbsp;</span><o:=
p></o:p></p><p class=3DMsoNormal><span =
style=3D'font-size:12.0pt;font-family:"Cambria","serif"'>A colleague of =
mine and I were discussing what should occur when a Retail Customer =
desires to change the existing authorized access of a Third Party.&nbsp; =
During our discussion they asked =E2=80=9CHow does the Retail Customer =
know the Third Party actually issued a Token revocation request?&nbsp; =
Isn=E2=80=99t there a potential trust issue with the current =
design=E2=80=9D? </span><o:p></o:p></p><p class=3DMsoNormal><span =
style=3D'font-size:12.0pt;font-family:"Cambria","serif"'>&nbsp;</span><o:=
p></o:p></p><p class=3DMsoNormal><span =
style=3D'font-size:12.0pt;font-family:"Cambria","serif"'>The current =
draft provides a Third Party mechanism that =E2=80=9Callows a client to =
invalidate its tokens if the end-user logs out, changes identity, or =
uninstalls the respective application (sic).=E2=80=9D While none of =
these fit the situation we were discussing they do seem to be based on =
the assumption a Third Party application will be a good citizen and stop =
using access tokens.&nbsp; Unfortunately, none of the addressed =
situations require the participation of a AS for completion, therefore =
the risk exists that a Retail Customer may believe they have removed a =
Third Party application from accessing their protected data, but in =
reality there does not seem to be a mechanism to either force or verify =
the Third Party can no longer have access to the protected =
data.</span><o:p></o:p></p><p class=3DMsoNormal><span =
style=3D'font-size:12.0pt;font-family:"Cambria","serif"'>&nbsp;</span><o:=
p></o:p></p><p class=3DMsoNormal><span =
style=3D'font-size:12.0pt;font-family:"Cambria","serif"'>A possible =
modification to the current draft that would correct this potential =
security risk, is to treat a Token revocation using a message flow =
similar to the existing authorization_code response type.&nbsp; A Retail =
Customer requesting a change to the Third Party authorized access would =
be redirected to an AS endpoint that would allow the Retail Customer to =
either terminate a relationship completely or modify the existing Third =
Party access authorization.&nbsp; The successful response from the AS =
would indicate the Third Party needs to remove the current Token from =
its Token store.&nbsp; In the event the Retail Customer has changed the =
Third Party access authorization, the AS response could include an =
optional =E2=80=9Cscope=E2=80=9D element, which the Third Party would =
then use to obtain a new access token utilizing an Authorization Code =
request.</span><o:p></o:p></p><p class=3DMsoNormal><span =
style=3D'font-size:12.0pt;font-family:"Cambria","serif"'>&nbsp;</span><o:=
p></o:p></p><p class=3DMsoNormal><span =
style=3D'font-size:12.0pt;font-family:"Cambria","serif"'>There are =
several other potential implementations that could be developed to =
protect a Retail Customer from a =E2=80=9Crogue=E2=80=9D Third Party =
application that does not inform the AS their authorization to access a =
Retail Customer=E2=80=99s protected data has been revoked, but the above =
suggestion meets the current draft=E2=80=99s view that Third Parties =
should be able to request Tokens be revoked.</span><o:p></o:p></p><p =
class=3DMsoNormal><span =
style=3D'font-size:12.0pt;font-family:"Cambria","serif"'>&nbsp;</span><o:=
p></o:p></p><p class=3DMsoNormal><span =
style=3D'font-size:12.0pt;font-family:"Cambria","serif"'>I look forward =
to your comments on the above topic.</span><o:p></o:p></p><p =
class=3DMsoNormal><span =
style=3D'font-size:12.0pt;font-family:"Cambria","serif"'>&nbsp;</span><o:=
p></o:p></p><p class=3DMsoNormal><span =
style=3D'font-size:12.0pt;font-family:"Cambria","serif"'>&nbsp;</span><o:=
p></o:p></p><p class=3DMsoNormal><span style=3D'font-size:12.0pt'>Best =
regards,</span><o:p></o:p></p><p class=3DMsoNormal><span =
style=3D'font-size:24.0pt;font-family:"Brush Script =
MT"'>Don</span><o:p></o:p></p><p class=3DMsoNormal><span =
style=3D'font-size:12.0pt'>Donald F. Coffin</span><o:p></o:p></p><p =
class=3DMsoNormal><span =
style=3D'font-size:12.0pt'>Founder/CTO</span><o:p></o:p></p><p =
class=3DMsoNormal><span =
style=3D'font-size:12.0pt'>&nbsp;</span><o:p></o:p></p><p =
class=3DMsoNormal><span style=3D'font-size:12.0pt'>REMI =
Networks</span><o:p></o:p></p><p class=3DMsoNormal><span =
style=3D'font-size:12.0pt'>22751 El Prado Suite =
6216</span><o:p></o:p></p><p class=3DMsoNormal><span =
style=3D'font-size:12.0pt'>Rancho Santa Margarita, CA&nbsp; =
92688-3836</span><o:p></o:p></p><p class=3DMsoNormal><span =
style=3D'font-size:12.0pt'>&nbsp;</span><o:p></o:p></p><p =
class=3DMsoNormal><span =
style=3D'font-size:12.0pt'>Phone:&nbsp;&nbsp;&nbsp;&nbsp;&nbsp; (949) =
636-8571</span><o:p></o:p></p><p class=3DMsoNormal><span =
style=3D'font-size:12.0pt'>Email:&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp; <a =
href=3D"mailto:donald.coffin@reminetworks.com">donald.coffin@reminetworks=
.com</a></span><o:p></o:p></p><p =
class=3DMsoNormal>&nbsp;<o:p></o:p></p></div></blockquote></div></body></=
html>
------=_NextPart_000_0050_01CE1006.FB5BAAE0--


From jricher@mitre.org  Thu Feb 21 08:03:01 2013
Return-Path: <jricher@mitre.org>
X-Original-To: oauth@ietfa.amsl.com
Delivered-To: oauth@ietfa.amsl.com
Received: from localhost (localhost [127.0.0.1]) by ietfa.amsl.com (Postfix) with ESMTP id C4B2521F8EB3 for <oauth@ietfa.amsl.com>; Thu, 21 Feb 2013 08:02:57 -0800 (PST)
X-Virus-Scanned: amavisd-new at amsl.com
X-Spam-Flag: NO
X-Spam-Score: -6.575
X-Spam-Level: 
X-Spam-Status: No, score=-6.575 tagged_above=-999 required=5 tests=[AWL=0.023,  BAYES_00=-2.599, HTML_MESSAGE=0.001, RCVD_IN_DNSWL_MED=-4]
Received: from mail.ietf.org ([64.170.98.30]) by localhost (ietfa.amsl.com [127.0.0.1]) (amavisd-new, port 10024) with ESMTP id DHLAMZhsljq3 for <oauth@ietfa.amsl.com>; Thu, 21 Feb 2013 08:02:52 -0800 (PST)
Received: from smtpksrv1.mitre.org (smtpksrv1.mitre.org [198.49.146.77]) by ietfa.amsl.com (Postfix) with ESMTP id 149A621F8EB6 for <oauth@ietf.org>; Thu, 21 Feb 2013 08:02:52 -0800 (PST)
Received: from smtpksrv1.mitre.org (localhost.localdomain [127.0.0.1]) by localhost (Postfix) with SMTP id 7C0DB1F1296; Thu, 21 Feb 2013 11:02:51 -0500 (EST)
Received: from IMCCAS01.MITRE.ORG (imccas01.mitre.org [129.83.29.78]) by smtpksrv1.mitre.org (Postfix) with ESMTP id 587621F1273; Thu, 21 Feb 2013 11:02:51 -0500 (EST)
Received: from [10.146.15.29] (129.83.31.58) by IMCCAS01.MITRE.ORG (129.83.29.78) with Microsoft SMTP Server (TLS) id 14.2.318.4; Thu, 21 Feb 2013 11:02:50 -0500
Message-ID: <512644F5.9090505@mitre.org>
Date: Thu, 21 Feb 2013 11:01:57 -0500
From: Justin Richer <jricher@mitre.org>
User-Agent: Mozilla/5.0 (X11; Linux i686; rv:17.0) Gecko/20130106 Thunderbird/17.0.2
MIME-Version: 1.0
To: Donald F Coffin <donald.coffin@reminetworks.com>
References: <013601ce0fc7$b2faea20$18f0be60$@reminetworks.com> <F4E5214A-76C0-468E-BFE5-6578ED22D2A3@lodderstedt.net> <004f01ce104a$097c79e0$1c756da0$@reminetworks.com>
In-Reply-To: <004f01ce104a$097c79e0$1c756da0$@reminetworks.com>
Content-Type: multipart/alternative; boundary="------------000200060200010804070508"
X-Originating-IP: [129.83.31.58]
Cc: 'John Adkins' <jva2@pge.com>, 'Marty Burns' <marty@hypertek.us>, 'Scott Crowder' <scott.crowder@qadoenergy.com>, 'Dave Robin' <drobin@automatedlogic.com>, 'John Teeter' <john.teeter@peoplepowerco.com>, pmadsen@pingidentity.com, 'Edward Denson' <ewd7@pge.com>, oauth@ietf.org, 'Jay Mitra' <jay@youtilities.com>, 'Ray Perlner' <ray.perlner@nist.gov>, 'Anne Hendry' <ahendry2@gmail.com>, 'Lynne Rodoni' <mrodoni@semprautilities.com>, 'Uday Verma' <uday.verma@ilinknet.com>
Subject: Re: [OAUTH-WG] draft-ietf-oauth-revocation-05 Questions
X-BeenThere: oauth@ietf.org
X-Mailman-Version: 2.1.12
Precedence: list
List-Id: OAUTH WG <oauth.ietf.org>
List-Unsubscribe: <https://www.ietf.org/mailman/options/oauth>, <mailto:oauth-request@ietf.org?subject=unsubscribe>
List-Archive: <http://www.ietf.org/mail-archive/web/oauth>
List-Post: <mailto:oauth@ietf.org>
List-Help: <mailto:oauth-request@ietf.org?subject=help>
List-Subscribe: <https://www.ietf.org/mailman/listinfo/oauth>, <mailto:oauth-request@ietf.org?subject=subscribe>
X-List-Received-Date: Thu, 21 Feb 2013 16:03:01 -0000

--------------000200060200010804070508
Content-Type: text/plain; charset="ISO-8859-1"; format=flowed
Content-Transfer-Encoding: 7bit

OAuth doesn't get into the business of what the UI for managing grants 
is like. Having the user, admin, or resource owner revoke, downscope, or 
otherwise alter a grant needs to happen with user interactions that are 
going to be different depending on the provider and use case.

  -- Justin

On 02/21/2013 10:42 AM, Donald F Coffin wrote:
>
> Torsten,
>
> Thanks for the response.  What is the "respective portal belonging to 
> the AS"?  I haven't seen anything in the OAuth 2.0 Authorization 
> Framework that describes a "portal" on the AS a Resource Owner can log 
> into to view a valid list of authorization grants.  Is this an 
> out-of-band implementation suggestion?
>
> Best regards,
>
> Don
>
> Donald F. Coffin
>
> Founder/CTO
>
> REMI Networks
>
> 22751 El Prado Suite 6216
>
> Rancho Santa Margarita, CA  92688-3836
>
> Phone: (949) 636-8571
>
> Email: donald.coffin@reminetworks.com 
> <mailto:donald.coffin@reminetworks.com>
>
> *From:*Torsten Lodderstedt [mailto:torsten@lodderstedt.net]
> *Sent:* Thursday, February 21, 2013 12:13 AM
> *To:* Donald F Coffin
> *Cc:* <oauth@ietf.org>; Anne Hendry; Dave Robin; Edward Denson; Jay 
> Mitra; John Adkins; John Teeter; Lynne Rodoni; Marty Burns; 
> <pmadsen@pingidentity.com>; Ray Perlner; Scott Crowder; Uday Verma
> *Subject:* Re: draft-ietf-oauth-revocation-05 Questions
>
> Hi Donald,
>
> thank you for sharing your thoughts with us. I've never seen 
> revocation as change of scope of the authorization, but it sounds 
> reasonable. The current design handles the issues you raised differently.
>
> The AS is involved in the revocation process as it exposes the 
> revocation endpoint. So if the token is revoked (from a technical 
> perspective), it knows it. If the user wants to check whether the 
> application really sent the request, she is supposed to visit the 
> respective portal belonging to the AS. There the AS provides a list of 
> all valid authorization grants in its database.
>
> Does this address your issues?
>
> regards,
>
> Torsten.
>
>
> Am 21.02.2013 um 01:09 schrieb "Donald F Coffin" 
> <donald.coffin@reminetworks.com <mailto:donald.coffin@reminetworks.com>>:
>
>     Torsten,
>
>     A colleague of mine and I were discussing what should occur when a
>     Retail Customer desires to change the existing authorized access
>     of a Third Party.  During our discussion they asked "How does the
>     Retail Customer know the Third Party actually issued a Token
>     revocation request?  Isn't there a potential trust issue with the
>     current design"?
>
>     The current draft provides a Third Party mechanism that "allows a
>     client to invalidate its tokens if the end-user logs out, changes
>     identity, or uninstalls the respective application (sic)." While
>     none of these fit the situation we were discussing they do seem to
>     be based on the assumption a Third Party application will be a
>     good citizen and stop using access tokens. Unfortunately, none of
>     the addressed situations require the participation of a AS for
>     completion, therefore the risk exists that a Retail Customer may
>     believe they have removed a Third Party application from accessing
>     their protected data, but in reality there does not seem to be a
>     mechanism to either force or verify the Third Party can no longer
>     have access to the protected data.
>
>     A possible modification to the current draft that would correct
>     this potential security risk, is to treat a Token revocation using
>     a message flow similar to the existing authorization_code response
>     type.  A Retail Customer requesting a change to the Third Party
>     authorized access would be redirected to an AS endpoint that would
>     allow the Retail Customer to either terminate a relationship
>     completely or modify the existing Third Party access
>     authorization.  The successful response from the AS would indicate
>     the Third Party needs to remove the current Token from its Token
>     store.  In the event the Retail Customer has changed the Third
>     Party access authorization, the AS response could include an
>     optional "scope" element, which the Third Party would then use to
>     obtain a new access token utilizing an Authorization Code request.
>
>     There are several other potential implementations that could be
>     developed to protect a Retail Customer from a "rogue" Third Party
>     application that does not inform the AS their authorization to
>     access a Retail Customer's protected data has been revoked, but
>     the above suggestion meets the current draft's view that Third
>     Parties should be able to request Tokens be revoked.
>
>     I look forward to your comments on the above topic.
>
>     Best regards,
>
>     Don
>
>     Donald F. Coffin
>
>     Founder/CTO
>
>     REMI Networks
>
>     22751 El Prado Suite 6216
>
>     Rancho Santa Margarita, CA  92688-3836
>
>     Phone: (949) 636-8571
>
>     Email: donald.coffin@reminetworks.com
>     <mailto:donald.coffin@reminetworks.com>
>
>
>
> _______________________________________________
> OAuth mailing list
> OAuth@ietf.org
> https://www.ietf.org/mailman/listinfo/oauth


--------------000200060200010804070508
Content-Type: text/html; charset="ISO-8859-1"
Content-Transfer-Encoding: 7bit

<html>
  <head>
    <meta content="text/html; charset=ISO-8859-1"
      http-equiv="Content-Type">
  </head>
  <body bgcolor="#FFFFFF" text="#000000">
    OAuth doesn't get into the business of what the UI for managing
    grants is like. Having the user, admin, or resource owner revoke,
    downscope, or otherwise alter a grant needs to happen with user
    interactions that are going to be different depending on the
    provider and use case. <br>
    <br>
    &nbsp;-- Justin<br>
    <br>
    <div class="moz-cite-prefix">On 02/21/2013 10:42 AM, Donald F Coffin
      wrote:<br>
    </div>
    <blockquote
      cite="mid:004f01ce104a$097c79e0$1c756da0$@reminetworks.com"
      type="cite">
      <meta http-equiv="Content-Type" content="text/html;
        charset=ISO-8859-1">
      <meta name="Generator" content="Microsoft Word 14 (filtered
        medium)">
      <style><!--
/* Font Definitions */
@font-face
	{font-family:"Cambria Math";
	panose-1:2 4 5 3 5 4 6 3 2 4;}
@font-face
	{font-family:Cambria;
	panose-1:2 4 5 3 5 4 6 3 2 4;}
@font-face
	{font-family:Calibri;
	panose-1:2 15 5 2 2 2 4 3 2 4;}
@font-face
	{font-family:Tahoma;
	panose-1:2 11 6 4 3 5 4 4 2 4;}
@font-face
	{font-family:"Brush Script MT";
	panose-1:3 6 8 2 4 4 6 7 3 4;}
/* Style Definitions */
p.MsoNormal, li.MsoNormal, div.MsoNormal
	{margin:0in;
	margin-bottom:.0001pt;
	font-size:11.0pt;
	font-family:"Calibri","sans-serif";}
a:link, span.MsoHyperlink
	{mso-style-priority:99;
	color:blue;
	text-decoration:underline;}
a:visited, span.MsoHyperlinkFollowed
	{mso-style-priority:99;
	color:purple;
	text-decoration:underline;}
span.EmailStyle17
	{mso-style-type:personal;
	font-family:"Cambria","serif";
	color:windowtext;}
span.EmailStyle18
	{mso-style-type:personal-reply;
	font-family:"Cambria","serif";
	color:windowtext;
	font-weight:normal;
	font-style:normal;}
.MsoChpDefault
	{mso-style-type:export-only;
	font-size:10.0pt;}
@page WordSection1
	{size:8.5in 11.0in;
	margin:1.0in 1.0in 1.0in 1.0in;}
div.WordSection1
	{page:WordSection1;}
--></style><!--[if gte mso 9]><xml>
<o:shapedefaults v:ext="edit" spidmax="1026" />
</xml><![endif]--><!--[if gte mso 9]><xml>
<o:shapelayout v:ext="edit">
<o:idmap v:ext="edit" data="1" />
</o:shapelayout></xml><![endif]-->
      <div class="WordSection1">
        <p class="MsoNormal"><span
style="font-size:12.0pt;font-family:&quot;Cambria&quot;,&quot;serif&quot;">Torsten,<o:p></o:p></span></p>
        <p class="MsoNormal"><span
style="font-size:12.0pt;font-family:&quot;Cambria&quot;,&quot;serif&quot;"><o:p>&nbsp;</o:p></span></p>
        <p class="MsoNormal"><span
style="font-size:12.0pt;font-family:&quot;Cambria&quot;,&quot;serif&quot;">Thanks
            for the response.&nbsp; What is the &#8220;respective portal belonging
            to the AS&#8221;?&nbsp; I haven&#8217;t seen anything in the OAuth 2.0
            Authorization Framework that describes a &#8220;portal&#8221; on the AS
            a Resource Owner can log into to view a valid list of
            authorization grants.&nbsp; Is this an out-of-band implementation
            suggestion?<o:p></o:p></span></p>
        <p class="MsoNormal"><span
style="font-size:12.0pt;font-family:&quot;Cambria&quot;,&quot;serif&quot;"><o:p>&nbsp;</o:p></span></p>
        <div>
          <p class="MsoNormal"><span style="font-size:12.0pt">Best
              regards,<o:p></o:p></span></p>
          <p class="MsoNormal"><span
              style="font-size:24.0pt;font-family:&quot;Brush Script
              MT&quot;">Don<o:p></o:p></span></p>
          <p class="MsoNormal"><span style="font-size:12.0pt">Donald F.
              Coffin<o:p></o:p></span></p>
          <p class="MsoNormal"><span style="font-size:12.0pt">Founder/CTO<o:p></o:p></span></p>
          <p class="MsoNormal"><span style="font-size:12.0pt"><o:p>&nbsp;</o:p></span></p>
          <p class="MsoNormal"><span style="font-size:12.0pt">REMI
              Networks<o:p></o:p></span></p>
          <p class="MsoNormal"><span style="font-size:12.0pt">22751 El
              Prado Suite 6216<o:p></o:p></span></p>
          <p class="MsoNormal"><span style="font-size:12.0pt">Rancho
              Santa Margarita, CA&nbsp; 92688-3836<o:p></o:p></span></p>
          <p class="MsoNormal"><span style="font-size:12.0pt"><o:p>&nbsp;</o:p></span></p>
          <p class="MsoNormal"><span style="font-size:12.0pt">Phone:&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;
              (949) 636-8571<o:p></o:p></span></p>
          <p class="MsoNormal"><span style="font-size:12.0pt">Email:&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;
              <a moz-do-not-send="true"
                href="mailto:donald.coffin@reminetworks.com"><span
                  style="color:blue">donald.coffin@reminetworks.com</span></a><o:p></o:p></span></p>
        </div>
        <p class="MsoNormal"><span
style="font-size:12.0pt;font-family:&quot;Cambria&quot;,&quot;serif&quot;"><o:p>&nbsp;</o:p></span></p>
        <div>
          <div style="border:none;border-top:solid #B5C4DF
            1.0pt;padding:3.0pt 0in 0in 0in">
            <p class="MsoNormal"><b><span
style="font-size:10.0pt;font-family:&quot;Tahoma&quot;,&quot;sans-serif&quot;">From:</span></b><span
style="font-size:10.0pt;font-family:&quot;Tahoma&quot;,&quot;sans-serif&quot;">
                Torsten Lodderstedt [<a class="moz-txt-link-freetext" href="mailto:torsten@lodderstedt.net">mailto:torsten@lodderstedt.net</a>] <br>
                <b>Sent:</b> Thursday, February 21, 2013 12:13 AM<br>
                <b>To:</b> Donald F Coffin<br>
                <b>Cc:</b> <a class="moz-txt-link-rfc2396E" href="mailto:oauth@ietf.org">&lt;oauth@ietf.org&gt;</a>; Anne Hendry; Dave
                Robin; Edward Denson; Jay Mitra; John Adkins; John
                Teeter; Lynne Rodoni; Marty Burns;
                <a class="moz-txt-link-rfc2396E" href="mailto:pmadsen@pingidentity.com">&lt;pmadsen@pingidentity.com&gt;</a>; Ray Perlner; Scott
                Crowder; Uday Verma<br>
                <b>Subject:</b> Re: draft-ietf-oauth-revocation-05
                Questions<o:p></o:p></span></p>
          </div>
        </div>
        <p class="MsoNormal"><o:p>&nbsp;</o:p></p>
        <div>
          <p class="MsoNormal">Hi Donald,<o:p></o:p></p>
        </div>
        <div>
          <p class="MsoNormal"><o:p>&nbsp;</o:p></p>
        </div>
        <div>
          <p class="MsoNormal">thank you for sharing your thoughts with
            us. I've never seen revocation as change of scope of the
            authorization, but it sounds reasonable. The current design
            handles the issues you raised differently.<o:p></o:p></p>
        </div>
        <div>
          <p class="MsoNormal"><o:p>&nbsp;</o:p></p>
        </div>
        <div>
          <p class="MsoNormal">The AS is involved in the revocation
            process as it exposes the revocation endpoint. So if the
            token is revoked (from a technical perspective), it knows
            it. If the user wants to check whether the application
            really sent the request, she is supposed to visit the
            respective portal belonging to the AS. There the AS provides
            a list of all valid authorization grants in its database.&nbsp;<o:p></o:p></p>
        </div>
        <div>
          <p class="MsoNormal"><o:p>&nbsp;</o:p></p>
        </div>
        <div>
          <p class="MsoNormal">Does this address your issues?<o:p></o:p></p>
        </div>
        <div>
          <p class="MsoNormal"><o:p>&nbsp;</o:p></p>
        </div>
        <div>
          <p class="MsoNormal">regards,<o:p></o:p></p>
        </div>
        <div>
          <p class="MsoNormal">Torsten.<o:p></o:p></p>
        </div>
        <div>
          <p class="MsoNormal" style="margin-bottom:12.0pt"><br>
            Am 21.02.2013 um 01:09 schrieb "Donald F Coffin" &lt;<a
              moz-do-not-send="true"
              href="mailto:donald.coffin@reminetworks.com">donald.coffin@reminetworks.com</a>&gt;:<o:p></o:p></p>
        </div>
        <blockquote style="margin-top:5.0pt;margin-bottom:5.0pt">
          <div>
            <p class="MsoNormal"><span
style="font-size:12.0pt;font-family:&quot;Cambria&quot;,&quot;serif&quot;">Torsten,</span><o:p></o:p></p>
            <p class="MsoNormal"><span
style="font-size:12.0pt;font-family:&quot;Cambria&quot;,&quot;serif&quot;">&nbsp;</span><o:p></o:p></p>
            <p class="MsoNormal"><span
style="font-size:12.0pt;font-family:&quot;Cambria&quot;,&quot;serif&quot;">A
                colleague of mine and I were discussing what should
                occur when a Retail Customer desires to change the
                existing authorized access of a Third Party.&nbsp; During our
                discussion they asked &#8220;How does the Retail Customer know
                the Third Party actually issued a Token revocation
                request?&nbsp; Isn&#8217;t there a potential trust issue with the
                current design&#8221;? </span><o:p></o:p></p>
            <p class="MsoNormal"><span
style="font-size:12.0pt;font-family:&quot;Cambria&quot;,&quot;serif&quot;">&nbsp;</span><o:p></o:p></p>
            <p class="MsoNormal"><span
style="font-size:12.0pt;font-family:&quot;Cambria&quot;,&quot;serif&quot;">The
                current draft provides a Third Party mechanism that
                &#8220;allows a client to invalidate its tokens if the
                end-user logs out, changes identity, or uninstalls the
                respective application (sic).&#8221; While none of these fit
                the situation we were discussing they do seem to be
                based on the assumption a Third Party application will
                be a good citizen and stop using access tokens.&nbsp;
                Unfortunately, none of the addressed situations require
                the participation of a AS for completion, therefore the
                risk exists that a Retail Customer may believe they have
                removed a Third Party application from accessing their
                protected data, but in reality there does not seem to be
                a mechanism to either force or verify the Third Party
                can no longer have access to the protected data.</span><o:p></o:p></p>
            <p class="MsoNormal"><span
style="font-size:12.0pt;font-family:&quot;Cambria&quot;,&quot;serif&quot;">&nbsp;</span><o:p></o:p></p>
            <p class="MsoNormal"><span
style="font-size:12.0pt;font-family:&quot;Cambria&quot;,&quot;serif&quot;">A
                possible modification to the current draft that would
                correct this potential security risk, is to treat a
                Token revocation using a message flow similar to the
                existing authorization_code response type.&nbsp; A Retail
                Customer requesting a change to the Third Party
                authorized access would be redirected to an AS endpoint
                that would allow the Retail Customer to either terminate
                a relationship completely or modify the existing Third
                Party access authorization.&nbsp; The successful response
                from the AS would indicate the Third Party needs to
                remove the current Token from its Token store.&nbsp; In the
                event the Retail Customer has changed the Third Party
                access authorization, the AS response could include an
                optional &#8220;scope&#8221; element, which the Third Party would
                then use to obtain a new access token utilizing an
                Authorization Code request.</span><o:p></o:p></p>
            <p class="MsoNormal"><span
style="font-size:12.0pt;font-family:&quot;Cambria&quot;,&quot;serif&quot;">&nbsp;</span><o:p></o:p></p>
            <p class="MsoNormal"><span
style="font-size:12.0pt;font-family:&quot;Cambria&quot;,&quot;serif&quot;">There
                are several other potential implementations that could
                be developed to protect a Retail Customer from a &#8220;rogue&#8221;
                Third Party application that does not inform the AS
                their authorization to access a Retail Customer&#8217;s
                protected data has been revoked, but the above
                suggestion meets the current draft&#8217;s view that Third
                Parties should be able to request Tokens be revoked.</span><o:p></o:p></p>
            <p class="MsoNormal"><span
style="font-size:12.0pt;font-family:&quot;Cambria&quot;,&quot;serif&quot;">&nbsp;</span><o:p></o:p></p>
            <p class="MsoNormal"><span
style="font-size:12.0pt;font-family:&quot;Cambria&quot;,&quot;serif&quot;">I
                look forward to your comments on the above topic.</span><o:p></o:p></p>
            <p class="MsoNormal"><span
style="font-size:12.0pt;font-family:&quot;Cambria&quot;,&quot;serif&quot;">&nbsp;</span><o:p></o:p></p>
            <p class="MsoNormal"><span
style="font-size:12.0pt;font-family:&quot;Cambria&quot;,&quot;serif&quot;">&nbsp;</span><o:p></o:p></p>
            <p class="MsoNormal"><span style="font-size:12.0pt">Best
                regards,</span><o:p></o:p></p>
            <p class="MsoNormal"><span
                style="font-size:24.0pt;font-family:&quot;Brush Script
                MT&quot;">Don</span><o:p></o:p></p>
            <p class="MsoNormal"><span style="font-size:12.0pt">Donald
                F. Coffin</span><o:p></o:p></p>
            <p class="MsoNormal"><span style="font-size:12.0pt">Founder/CTO</span><o:p></o:p></p>
            <p class="MsoNormal"><span style="font-size:12.0pt">&nbsp;</span><o:p></o:p></p>
            <p class="MsoNormal"><span style="font-size:12.0pt">REMI
                Networks</span><o:p></o:p></p>
            <p class="MsoNormal"><span style="font-size:12.0pt">22751 El
                Prado Suite 6216</span><o:p></o:p></p>
            <p class="MsoNormal"><span style="font-size:12.0pt">Rancho
                Santa Margarita, CA&nbsp; 92688-3836</span><o:p></o:p></p>
            <p class="MsoNormal"><span style="font-size:12.0pt">&nbsp;</span><o:p></o:p></p>
            <p class="MsoNormal"><span style="font-size:12.0pt">Phone:&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;
                (949) 636-8571</span><o:p></o:p></p>
            <p class="MsoNormal"><span style="font-size:12.0pt">Email:&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;
                <a moz-do-not-send="true"
                  href="mailto:donald.coffin@reminetworks.com">donald.coffin@reminetworks.com</a></span><o:p></o:p></p>
            <p class="MsoNormal">&nbsp;<o:p></o:p></p>
          </div>
        </blockquote>
      </div>
      <br>
      <fieldset class="mimeAttachmentHeader"></fieldset>
      <br>
      <pre wrap="">_______________________________________________
OAuth mailing list
<a class="moz-txt-link-abbreviated" href="mailto:OAuth@ietf.org">OAuth@ietf.org</a>
<a class="moz-txt-link-freetext" href="https://www.ietf.org/mailman/listinfo/oauth">https://www.ietf.org/mailman/listinfo/oauth</a>
</pre>
    </blockquote>
    <br>
  </body>
</html>

--------------000200060200010804070508--

From donald.coffin@reminetworks.com  Thu Feb 21 08:23:38 2013
Return-Path: <donald.coffin@reminetworks.com>
X-Original-To: oauth@ietfa.amsl.com
Delivered-To: oauth@ietfa.amsl.com
Received: from localhost (localhost [127.0.0.1]) by ietfa.amsl.com (Postfix) with ESMTP id EB5AE21F84D5 for <oauth@ietfa.amsl.com>; Thu, 21 Feb 2013 08:23:37 -0800 (PST)
X-Virus-Scanned: amavisd-new at amsl.com
X-Spam-Flag: NO
X-Spam-Score: -2.062
X-Spam-Level: 
X-Spam-Status: No, score=-2.062 tagged_above=-999 required=5 tests=[AWL=0.202,  BAYES_00=-2.599, HTML_MESSAGE=0.001, IP_NOT_FRIENDLY=0.334]
Received: from mail.ietf.org ([64.170.98.30]) by localhost (ietfa.amsl.com [127.0.0.1]) (amavisd-new, port 10024) with ESMTP id vowAGXFaSeKD for <oauth@ietfa.amsl.com>; Thu, 21 Feb 2013 08:23:34 -0800 (PST)
Received: from oproxy6-pub.bluehost.com (oproxy6-pub.bluehost.com [67.222.54.6]) by ietfa.amsl.com (Postfix) with SMTP id 30E2621F87C5 for <oauth@ietf.org>; Thu, 21 Feb 2013 08:23:32 -0800 (PST)
Received: (qmail 21672 invoked by uid 0); 21 Feb 2013 16:23:06 -0000
Received: from unknown (HELO host125.hostmonster.com) (74.220.207.125) by cpoproxy3.bluehost.com with SMTP; 21 Feb 2013 16:23:06 -0000
DKIM-Signature: v=1; a=rsa-sha256; q=dns/txt; c=relaxed/relaxed; d=reminetworks.com; s=default;  h=Content-Type:MIME-Version:Message-ID:Date:Subject:In-Reply-To:References:Cc:To:From; bh=qJh/X6q4xj8CYZPowmD8Ime0PMIqQtZQFAPM1saFGiE=;  b=aYb68gzfuFX8fXBZOw8/KG22Yx0vgcmMjtMYAOsBSMZkGH0ePJu/mPSQNOY0NLO3zS7S5uS8xlSYDef7KEUEE396MKrMfb00CbwUF+MVvPRRxudTQoz9PUu7TfMTeQJE;
Received: from [68.4.207.246] (port=1271 helo=HPPavilionElite) by host125.hostmonster.com with esmtpa (Exim 4.80) (envelope-from <donald.coffin@reminetworks.com>) id 1U8YvJ-0008Fr-LS; Thu, 21 Feb 2013 09:23:05 -0700
From: "Donald F Coffin" <donald.coffin@reminetworks.com>
To: "'Justin Richer'" <jricher@mitre.org>
References: <013601ce0fc7$b2faea20$18f0be60$@reminetworks.com> <F4E5214A-76C0-468E-BFE5-6578ED22D2A3@lodderstedt.net> <004f01ce104a$097c79e0$1c756da0$@reminetworks.com> <512644F5.9090505@mitre.org>
In-Reply-To: <512644F5.9090505@mitre.org>
Date: Thu, 21 Feb 2013 08:21:27 -0800
Message-ID: <006201ce104f$809df760$81d9e620$@reminetworks.com>
MIME-Version: 1.0
Content-Type: multipart/alternative; boundary="----=_NextPart_000_0063_01CE100C.727F7250"
X-Mailer: Microsoft Outlook 14.0
Thread-Index: AQJjjcb25qbAdii4kOnGObWIAqRIYwHsW6RdAjUcDecCseN0aJci50dQ
Content-Language: en-us
X-Identified-User: {1395:host125.hostmonster.com:reminetw:reminetworks.com} {sentby:smtp auth 68.4.207.246 authed with donald.coffin@reminetworks.com}
Cc: 'John Adkins' <jva2@pge.com>, 'Marty Burns' <marty@hypertek.us>, 'Scott Crowder' <scott.crowder@qadoenergy.com>, 'Dave Robin' <drobin@automatedlogic.com>, 'John Teeter' <john.teeter@peoplepowerco.com>, pmadsen@pingidentity.com, 'Edward Denson' <ewd7@pge.com>, oauth@ietf.org, 'Jay Mitra' <jay@youtilities.com>, 'Ray Perlner' <ray.perlner@nist.gov>, 'Anne Hendry' <ahendry2@gmail.com>, 'Lynne Rodoni' <mrodoni@semprautilities.com>, 'Uday Verma' <uday.verma@ilinknet.com>
Subject: Re: [OAUTH-WG] draft-ietf-oauth-revocation-05 Questions
X-BeenThere: oauth@ietf.org
X-Mailman-Version: 2.1.12
Precedence: list
List-Id: OAUTH WG <oauth.ietf.org>
List-Unsubscribe: <https://www.ietf.org/mailman/options/oauth>, <mailto:oauth-request@ietf.org?subject=unsubscribe>
List-Archive: <http://www.ietf.org/mail-archive/web/oauth>
List-Post: <mailto:oauth@ietf.org>
List-Help: <mailto:oauth-request@ietf.org?subject=help>
List-Subscribe: <https://www.ietf.org/mailman/listinfo/oauth>, <mailto:oauth-request@ietf.org?subject=subscribe>
X-List-Received-Date: Thu, 21 Feb 2013 16:23:38 -0000

This is a multipart message in MIME format.

------=_NextPart_000_0063_01CE100C.727F7250
Content-Type: text/plain;
	charset="us-ascii"
Content-Transfer-Encoding: 7bit

Justin,

 

My response was not meant to ask the UI of the "respective portal belonging
to the AS".  The question was where in the various OAuth 2.0 Authorization
Framework is such a portal even discussed?  Clearly if it is NOT discussed
in any existing OAuth 2.0 Authorization Framework RFC or existing draft,
then it must be an out-of-band customized implementation.

 

Best regards,

Don

Donald F. Coffin

Founder/CTO

 

REMI Networks

22751 El Prado Suite 6216

Rancho Santa Margarita, CA  92688-3836

 

Phone:      (949) 636-8571

Email:        <mailto:donald.coffin@reminetworks.com>
donald.coffin@reminetworks.com

 

From: Justin Richer [mailto:jricher@mitre.org] 
Sent: Thursday, February 21, 2013 8:02 AM
To: Donald F Coffin
Cc: 'Torsten Lodderstedt'; 'John Adkins'; 'Marty Burns'; 'Scott Crowder';
'Dave Robin'; 'John Teeter'; pmadsen@pingidentity.com; 'Edward Denson'; 'Jay
Mitra'; 'Uday Verma'; 'Ray Perlner'; 'Anne Hendry'; 'Lynne Rodoni';
oauth@ietf.org
Subject: Re: [OAUTH-WG] draft-ietf-oauth-revocation-05 Questions

 

OAuth doesn't get into the business of what the UI for managing grants is
like. Having the user, admin, or resource owner revoke, downscope, or
otherwise alter a grant needs to happen with user interactions that are
going to be different depending on the provider and use case. 

 -- Justin

On 02/21/2013 10:42 AM, Donald F Coffin wrote:

Torsten,

 

Thanks for the response.  What is the "respective portal belonging to the
AS"?  I haven't seen anything in the OAuth 2.0 Authorization Framework that
describes a "portal" on the AS a Resource Owner can log into to view a valid
list of authorization grants.  Is this an out-of-band implementation
suggestion?

 

Best regards,

Don

Donald F. Coffin

Founder/CTO

 

REMI Networks

22751 El Prado Suite 6216

Rancho Santa Margarita, CA  92688-3836

 

Phone:      (949) 636-8571

Email:       donald.coffin@reminetworks.com

 

From: Torsten Lodderstedt [mailto:torsten@lodderstedt.net] 
Sent: Thursday, February 21, 2013 12:13 AM
To: Donald F Coffin
Cc:  <mailto:oauth@ietf.org> <oauth@ietf.org>; Anne Hendry; Dave Robin;
Edward Denson; Jay Mitra; John Adkins; John Teeter; Lynne Rodoni; Marty
Burns;  <mailto:pmadsen@pingidentity.com> <pmadsen@pingidentity.com>; Ray
Perlner; Scott Crowder; Uday Verma
Subject: Re: draft-ietf-oauth-revocation-05 Questions

 

Hi Donald,

 

thank you for sharing your thoughts with us. I've never seen revocation as
change of scope of the authorization, but it sounds reasonable. The current
design handles the issues you raised differently.

 

The AS is involved in the revocation process as it exposes the revocation
endpoint. So if the token is revoked (from a technical perspective), it
knows it. If the user wants to check whether the application really sent the
request, she is supposed to visit the respective portal belonging to the AS.
There the AS provides a list of all valid authorization grants in its
database. 

 

Does this address your issues?

 

regards,

Torsten.


Am 21.02.2013 um 01:09 schrieb "Donald F Coffin"
<donald.coffin@reminetworks.com>:

Torsten,

 

A colleague of mine and I were discussing what should occur when a Retail
Customer desires to change the existing authorized access of a Third Party.
During our discussion they asked "How does the Retail Customer know the
Third Party actually issued a Token revocation request?  Isn't there a
potential trust issue with the current design"? 

 

The current draft provides a Third Party mechanism that "allows a client to
invalidate its tokens if the end-user logs out, changes identity, or
uninstalls the respective application (sic)." While none of these fit the
situation we were discussing they do seem to be based on the assumption a
Third Party application will be a good citizen and stop using access tokens.
Unfortunately, none of the addressed situations require the participation of
a AS for completion, therefore the risk exists that a Retail Customer may
believe they have removed a Third Party application from accessing their
protected data, but in reality there does not seem to be a mechanism to
either force or verify the Third Party can no longer have access to the
protected data.

 

A possible modification to the current draft that would correct this
potential security risk, is to treat a Token revocation using a message flow
similar to the existing authorization_code response type.  A Retail Customer
requesting a change to the Third Party authorized access would be redirected
to an AS endpoint that would allow the Retail Customer to either terminate a
relationship completely or modify the existing Third Party access
authorization.  The successful response from the AS would indicate the Third
Party needs to remove the current Token from its Token store.  In the event
the Retail Customer has changed the Third Party access authorization, the AS
response could include an optional "scope" element, which the Third Party
would then use to obtain a new access token utilizing an Authorization Code
request.

 

There are several other potential implementations that could be developed to
protect a Retail Customer from a "rogue" Third Party application that does
not inform the AS their authorization to access a Retail Customer's
protected data has been revoked, but the above suggestion meets the current
draft's view that Third Parties should be able to request Tokens be revoked.

 

I look forward to your comments on the above topic.

 

 

Best regards,

Don

Donald F. Coffin

Founder/CTO

 

REMI Networks

22751 El Prado Suite 6216

Rancho Santa Margarita, CA  92688-3836

 

Phone:      (949) 636-8571

Email:       donald.coffin@reminetworks.com

 






_______________________________________________
OAuth mailing list
OAuth@ietf.org
https://www.ietf.org/mailman/listinfo/oauth

 


------=_NextPart_000_0063_01CE100C.727F7250
Content-Type: text/html;
	charset="us-ascii"
Content-Transfer-Encoding: quoted-printable

<html xmlns:v=3D"urn:schemas-microsoft-com:vml" =
xmlns:o=3D"urn:schemas-microsoft-com:office:office" =
xmlns:w=3D"urn:schemas-microsoft-com:office:word" =
xmlns:m=3D"http://schemas.microsoft.com/office/2004/12/omml" =
xmlns=3D"http://www.w3.org/TR/REC-html40"><head><meta =
http-equiv=3DContent-Type content=3D"text/html; =
charset=3Dus-ascii"><meta name=3DGenerator content=3D"Microsoft Word 14 =
(filtered medium)"><style><!--
/* Font Definitions */
@font-face
	{font-family:"Cambria Math";
	panose-1:2 4 5 3 5 4 6 3 2 4;}
@font-face
	{font-family:Cambria;
	panose-1:2 4 5 3 5 4 6 3 2 4;}
@font-face
	{font-family:Calibri;
	panose-1:2 15 5 2 2 2 4 3 2 4;}
@font-face
	{font-family:Tahoma;
	panose-1:2 11 6 4 3 5 4 4 2 4;}
@font-face
	{font-family:"Brush Script MT";
	panose-1:3 6 8 2 4 4 6 7 3 4;}
@font-face
	{font-family:Consolas;
	panose-1:2 11 6 9 2 2 4 3 2 4;}
/* Style Definitions */
p.MsoNormal, li.MsoNormal, div.MsoNormal
	{margin:0in;
	margin-bottom:.0001pt;
	font-size:11.0pt;
	font-family:"Calibri","sans-serif";
	color:black;}
a:link, span.MsoHyperlink
	{mso-style-priority:99;
	color:blue;
	text-decoration:underline;}
a:visited, span.MsoHyperlinkFollowed
	{mso-style-priority:99;
	color:purple;
	text-decoration:underline;}
pre
	{mso-style-priority:99;
	mso-style-link:"HTML Preformatted Char";
	margin:0in;
	margin-bottom:.0001pt;
	font-size:10.0pt;
	font-family:"Courier New";
	color:black;}
p.MsoAcetate, li.MsoAcetate, div.MsoAcetate
	{mso-style-priority:99;
	mso-style-link:"Balloon Text Char";
	margin:0in;
	margin-bottom:.0001pt;
	font-size:8.0pt;
	font-family:"Tahoma","sans-serif";
	color:black;}
span.EmailStyle17
	{mso-style-type:personal;
	font-family:"Cambria","serif";
	color:windowtext;}
span.EmailStyle18
	{mso-style-type:personal;
	font-family:"Cambria","serif";
	color:windowtext;
	font-weight:normal;
	font-style:normal;}
span.HTMLPreformattedChar
	{mso-style-name:"HTML Preformatted Char";
	mso-style-priority:99;
	mso-style-link:"HTML Preformatted";
	font-family:"Consolas","serif";
	color:black;}
span.BalloonTextChar
	{mso-style-name:"Balloon Text Char";
	mso-style-priority:99;
	mso-style-link:"Balloon Text";
	font-family:"Tahoma","sans-serif";
	color:black;}
span.EmailStyle23
	{mso-style-type:personal-reply;
	font-family:"Cambria","serif";
	color:windowtext;
	font-weight:normal;
	font-style:normal;}
.MsoChpDefault
	{mso-style-type:export-only;
	font-size:10.0pt;}
@page WordSection1
	{size:8.5in 11.0in;
	margin:1.0in 1.0in 1.0in 1.0in;}
div.WordSection1
	{page:WordSection1;}
--></style><!--[if gte mso 9]><xml>
<o:shapedefaults v:ext=3D"edit" spidmax=3D"1026" />
</xml><![endif]--><!--[if gte mso 9]><xml>
<o:shapelayout v:ext=3D"edit">
<o:idmap v:ext=3D"edit" data=3D"1" />
</o:shapelayout></xml><![endif]--></head><body bgcolor=3Dwhite =
lang=3DEN-US link=3Dblue vlink=3Dpurple><div class=3DWordSection1><p =
class=3DMsoNormal><span =
style=3D'font-size:12.0pt;font-family:"Cambria","serif";color:windowtext'=
>Justin,<o:p></o:p></span></p><p class=3DMsoNormal><span =
style=3D'font-size:12.0pt;font-family:"Cambria","serif";color:windowtext'=
><o:p>&nbsp;</o:p></span></p><p class=3DMsoNormal><span =
style=3D'font-size:12.0pt;font-family:"Cambria","serif";color:windowtext'=
>My response was not meant to ask the UI of the &#8220;respective portal =
belonging to the AS&#8221;.&nbsp; The question was where in the various =
OAuth 2.0 Authorization Framework is such a portal even discussed?&nbsp; =
Clearly if it is NOT discussed in any existing OAuth 2.0 Authorization =
Framework RFC or existing draft, then it must be an out-of-band =
customized implementation.<o:p></o:p></span></p><p =
class=3DMsoNormal><span =
style=3D'font-size:12.0pt;font-family:"Cambria","serif";color:windowtext'=
><o:p>&nbsp;</o:p></span></p><div><p class=3DMsoNormal><span =
style=3D'font-size:12.0pt;color:windowtext'>Best =
regards,<o:p></o:p></span></p><p class=3DMsoNormal><span =
style=3D'font-size:24.0pt;font-family:"Brush Script =
MT","serif";color:windowtext'>Don<o:p></o:p></span></p><p =
class=3DMsoNormal><span =
style=3D'font-size:12.0pt;color:windowtext'>Donald F. =
Coffin<o:p></o:p></span></p><p class=3DMsoNormal><span =
style=3D'font-size:12.0pt;color:windowtext'>Founder/CTO<o:p></o:p></span>=
</p><p class=3DMsoNormal><span =
style=3D'font-size:12.0pt;color:windowtext'><o:p>&nbsp;</o:p></span></p><=
p class=3DMsoNormal><span =
style=3D'font-size:12.0pt;color:windowtext'>REMI =
Networks<o:p></o:p></span></p><p class=3DMsoNormal><span =
style=3D'font-size:12.0pt;color:windowtext'>22751 El Prado Suite =
6216<o:p></o:p></span></p><p class=3DMsoNormal><span =
style=3D'font-size:12.0pt;color:windowtext'>Rancho Santa Margarita, =
CA&nbsp; 92688-3836<o:p></o:p></span></p><p class=3DMsoNormal><span =
style=3D'font-size:12.0pt;color:windowtext'><o:p>&nbsp;</o:p></span></p><=
p class=3DMsoNormal><span =
style=3D'font-size:12.0pt;color:windowtext'>Phone:&nbsp;&nbsp;&nbsp;&nbsp=
;&nbsp; (949) 636-8571<o:p></o:p></span></p><p class=3DMsoNormal><span =
style=3D'font-size:12.0pt;color:windowtext'>Email:&nbsp;&nbsp;&nbsp;&nbsp=
;&nbsp;&nbsp; <a href=3D"mailto:donald.coffin@reminetworks.com"><span =
style=3D'color:blue'>donald.coffin@reminetworks.com</span></a><o:p></o:p>=
</span></p></div><p class=3DMsoNormal><span =
style=3D'font-size:12.0pt;font-family:"Cambria","serif";color:windowtext'=
><o:p>&nbsp;</o:p></span></p><div><div =
style=3D'border:none;border-top:solid #B5C4DF 1.0pt;padding:3.0pt 0in =
0in 0in'><p class=3DMsoNormal><b><span =
style=3D'font-size:10.0pt;font-family:"Tahoma","sans-serif";color:windowt=
ext'>From:</span></b><span =
style=3D'font-size:10.0pt;font-family:"Tahoma","sans-serif";color:windowt=
ext'> Justin Richer [mailto:jricher@mitre.org] <br><b>Sent:</b> =
Thursday, February 21, 2013 8:02 AM<br><b>To:</b> Donald F =
Coffin<br><b>Cc:</b> 'Torsten Lodderstedt'; 'John Adkins'; 'Marty =
Burns'; 'Scott Crowder'; 'Dave Robin'; 'John Teeter'; =
pmadsen@pingidentity.com; 'Edward Denson'; 'Jay Mitra'; 'Uday Verma'; =
'Ray Perlner'; 'Anne Hendry'; 'Lynne Rodoni'; =
oauth@ietf.org<br><b>Subject:</b> Re: [OAUTH-WG] =
draft-ietf-oauth-revocation-05 =
Questions<o:p></o:p></span></p></div></div><p =
class=3DMsoNormal><o:p>&nbsp;</o:p></p><p class=3DMsoNormal =
style=3D'margin-bottom:12.0pt'>OAuth doesn't get into the business of =
what the UI for managing grants is like. Having the user, admin, or =
resource owner revoke, downscope, or otherwise alter a grant needs to =
happen with user interactions that are going to be different depending =
on the provider and use case. <br><br>&nbsp;-- =
Justin<o:p></o:p></p><div><p class=3DMsoNormal>On 02/21/2013 10:42 AM, =
Donald F Coffin wrote:<o:p></o:p></p></div><blockquote =
style=3D'margin-top:5.0pt;margin-bottom:5.0pt'><p =
class=3DMsoNormal><span =
style=3D'font-size:12.0pt;font-family:"Cambria","serif"'>Torsten,</span><=
o:p></o:p></p><p class=3DMsoNormal><span =
style=3D'font-size:12.0pt;font-family:"Cambria","serif"'>&nbsp;</span><o:=
p></o:p></p><p class=3DMsoNormal><span =
style=3D'font-size:12.0pt;font-family:"Cambria","serif"'>Thanks for the =
response.&nbsp; What is the &#8220;respective portal belonging to the =
AS&#8221;?&nbsp; I haven&#8217;t seen anything in the OAuth 2.0 =
Authorization Framework that describes a &#8220;portal&#8221; on the AS =
a Resource Owner can log into to view a valid list of authorization =
grants.&nbsp; Is this an out-of-band implementation =
suggestion?</span><o:p></o:p></p><p class=3DMsoNormal><span =
style=3D'font-size:12.0pt;font-family:"Cambria","serif"'>&nbsp;</span><o:=
p></o:p></p><div><p class=3DMsoNormal><span =
style=3D'font-size:12.0pt'>Best regards,</span><o:p></o:p></p><p =
class=3DMsoNormal><span style=3D'font-size:24.0pt;font-family:"Brush =
Script MT","serif"'>Don</span><o:p></o:p></p><p class=3DMsoNormal><span =
style=3D'font-size:12.0pt'>Donald F. Coffin</span><o:p></o:p></p><p =
class=3DMsoNormal><span =
style=3D'font-size:12.0pt'>Founder/CTO</span><o:p></o:p></p><p =
class=3DMsoNormal><span =
style=3D'font-size:12.0pt'>&nbsp;</span><o:p></o:p></p><p =
class=3DMsoNormal><span style=3D'font-size:12.0pt'>REMI =
Networks</span><o:p></o:p></p><p class=3DMsoNormal><span =
style=3D'font-size:12.0pt'>22751 El Prado Suite =
6216</span><o:p></o:p></p><p class=3DMsoNormal><span =
style=3D'font-size:12.0pt'>Rancho Santa Margarita, CA&nbsp; =
92688-3836</span><o:p></o:p></p><p class=3DMsoNormal><span =
style=3D'font-size:12.0pt'>&nbsp;</span><o:p></o:p></p><p =
class=3DMsoNormal><span =
style=3D'font-size:12.0pt'>Phone:&nbsp;&nbsp;&nbsp;&nbsp;&nbsp; (949) =
636-8571</span><o:p></o:p></p><p class=3DMsoNormal><span =
style=3D'font-size:12.0pt'>Email:&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp; <a =
href=3D"mailto:donald.coffin@reminetworks.com">donald.coffin@reminetworks=
.com</a></span><o:p></o:p></p></div><p class=3DMsoNormal><span =
style=3D'font-size:12.0pt;font-family:"Cambria","serif"'>&nbsp;</span><o:=
p></o:p></p><div><div style=3D'border:none;border-top:solid #B5C4DF =
1.0pt;padding:3.0pt 0in 0in 0in'><p class=3DMsoNormal><b><span =
style=3D'font-size:10.0pt;font-family:"Tahoma","sans-serif"'>From:</span>=
</b><span style=3D'font-size:10.0pt;font-family:"Tahoma","sans-serif"'> =
Torsten Lodderstedt [<a =
href=3D"mailto:torsten@lodderstedt.net">mailto:torsten@lodderstedt.net</a=
>] <br><b>Sent:</b> Thursday, February 21, 2013 12:13 AM<br><b>To:</b> =
Donald F Coffin<br><b>Cc:</b> <a =
href=3D"mailto:oauth@ietf.org">&lt;oauth@ietf.org&gt;</a>; Anne Hendry; =
Dave Robin; Edward Denson; Jay Mitra; John Adkins; John Teeter; Lynne =
Rodoni; Marty Burns; <a =
href=3D"mailto:pmadsen@pingidentity.com">&lt;pmadsen@pingidentity.com&gt;=
</a>; Ray Perlner; Scott Crowder; Uday Verma<br><b>Subject:</b> Re: =
draft-ietf-oauth-revocation-05 =
Questions</span><o:p></o:p></p></div></div><p =
class=3DMsoNormal>&nbsp;<o:p></o:p></p><div><p class=3DMsoNormal>Hi =
Donald,<o:p></o:p></p></div><div><p =
class=3DMsoNormal>&nbsp;<o:p></o:p></p></div><div><p =
class=3DMsoNormal>thank you for sharing your thoughts with us. I've =
never seen revocation as change of scope of the authorization, but it =
sounds reasonable. The current design handles the issues you raised =
differently.<o:p></o:p></p></div><div><p =
class=3DMsoNormal>&nbsp;<o:p></o:p></p></div><div><p =
class=3DMsoNormal>The AS is involved in the revocation process as it =
exposes the revocation endpoint. So if the token is revoked (from a =
technical perspective), it knows it. If the user wants to check whether =
the application really sent the request, she is supposed to visit the =
respective portal belonging to the AS. There the AS provides a list of =
all valid authorization grants in its =
database.&nbsp;<o:p></o:p></p></div><div><p =
class=3DMsoNormal>&nbsp;<o:p></o:p></p></div><div><p =
class=3DMsoNormal>Does this address your =
issues?<o:p></o:p></p></div><div><p =
class=3DMsoNormal>&nbsp;<o:p></o:p></p></div><div><p =
class=3DMsoNormal>regards,<o:p></o:p></p></div><div><p =
class=3DMsoNormal>Torsten.<o:p></o:p></p></div><div><p class=3DMsoNormal =
style=3D'margin-bottom:12.0pt'><br>Am 21.02.2013 um 01:09 schrieb =
&quot;Donald F Coffin&quot; &lt;<a =
href=3D"mailto:donald.coffin@reminetworks.com">donald.coffin@reminetworks=
.com</a>&gt;:<o:p></o:p></p></div><blockquote =
style=3D'margin-top:5.0pt;margin-bottom:5.0pt'><div><p =
class=3DMsoNormal><span =
style=3D'font-size:12.0pt;font-family:"Cambria","serif"'>Torsten,</span><=
o:p></o:p></p><p class=3DMsoNormal><span =
style=3D'font-size:12.0pt;font-family:"Cambria","serif"'>&nbsp;</span><o:=
p></o:p></p><p class=3DMsoNormal><span =
style=3D'font-size:12.0pt;font-family:"Cambria","serif"'>A colleague of =
mine and I were discussing what should occur when a Retail Customer =
desires to change the existing authorized access of a Third Party.&nbsp; =
During our discussion they asked &#8220;How does the Retail Customer =
know the Third Party actually issued a Token revocation request?&nbsp; =
Isn&#8217;t there a potential trust issue with the current =
design&#8221;? </span><o:p></o:p></p><p class=3DMsoNormal><span =
style=3D'font-size:12.0pt;font-family:"Cambria","serif"'>&nbsp;</span><o:=
p></o:p></p><p class=3DMsoNormal><span =
style=3D'font-size:12.0pt;font-family:"Cambria","serif"'>The current =
draft provides a Third Party mechanism that &#8220;allows a client to =
invalidate its tokens if the end-user logs out, changes identity, or =
uninstalls the respective application (sic).&#8221; While none of these =
fit the situation we were discussing they do seem to be based on the =
assumption a Third Party application will be a good citizen and stop =
using access tokens.&nbsp; Unfortunately, none of the addressed =
situations require the participation of a AS for completion, therefore =
the risk exists that a Retail Customer may believe they have removed a =
Third Party application from accessing their protected data, but in =
reality there does not seem to be a mechanism to either force or verify =
the Third Party can no longer have access to the protected =
data.</span><o:p></o:p></p><p class=3DMsoNormal><span =
style=3D'font-size:12.0pt;font-family:"Cambria","serif"'>&nbsp;</span><o:=
p></o:p></p><p class=3DMsoNormal><span =
style=3D'font-size:12.0pt;font-family:"Cambria","serif"'>A possible =
modification to the current draft that would correct this potential =
security risk, is to treat a Token revocation using a message flow =
similar to the existing authorization_code response type.&nbsp; A Retail =
Customer requesting a change to the Third Party authorized access would =
be redirected to an AS endpoint that would allow the Retail Customer to =
either terminate a relationship completely or modify the existing Third =
Party access authorization.&nbsp; The successful response from the AS =
would indicate the Third Party needs to remove the current Token from =
its Token store.&nbsp; In the event the Retail Customer has changed the =
Third Party access authorization, the AS response could include an =
optional &#8220;scope&#8221; element, which the Third Party would then =
use to obtain a new access token utilizing an Authorization Code =
request.</span><o:p></o:p></p><p class=3DMsoNormal><span =
style=3D'font-size:12.0pt;font-family:"Cambria","serif"'>&nbsp;</span><o:=
p></o:p></p><p class=3DMsoNormal><span =
style=3D'font-size:12.0pt;font-family:"Cambria","serif"'>There are =
several other potential implementations that could be developed to =
protect a Retail Customer from a &#8220;rogue&#8221; Third Party =
application that does not inform the AS their authorization to access a =
Retail Customer&#8217;s protected data has been revoked, but the above =
suggestion meets the current draft&#8217;s view that Third Parties =
should be able to request Tokens be revoked.</span><o:p></o:p></p><p =
class=3DMsoNormal><span =
style=3D'font-size:12.0pt;font-family:"Cambria","serif"'>&nbsp;</span><o:=
p></o:p></p><p class=3DMsoNormal><span =
style=3D'font-size:12.0pt;font-family:"Cambria","serif"'>I look forward =
to your comments on the above topic.</span><o:p></o:p></p><p =
class=3DMsoNormal><span =
style=3D'font-size:12.0pt;font-family:"Cambria","serif"'>&nbsp;</span><o:=
p></o:p></p><p class=3DMsoNormal><span =
style=3D'font-size:12.0pt;font-family:"Cambria","serif"'>&nbsp;</span><o:=
p></o:p></p><p class=3DMsoNormal><span style=3D'font-size:12.0pt'>Best =
regards,</span><o:p></o:p></p><p class=3DMsoNormal><span =
style=3D'font-size:24.0pt;font-family:"Brush Script =
MT","serif"'>Don</span><o:p></o:p></p><p class=3DMsoNormal><span =
style=3D'font-size:12.0pt'>Donald F. Coffin</span><o:p></o:p></p><p =
class=3DMsoNormal><span =
style=3D'font-size:12.0pt'>Founder/CTO</span><o:p></o:p></p><p =
class=3DMsoNormal><span =
style=3D'font-size:12.0pt'>&nbsp;</span><o:p></o:p></p><p =
class=3DMsoNormal><span style=3D'font-size:12.0pt'>REMI =
Networks</span><o:p></o:p></p><p class=3DMsoNormal><span =
style=3D'font-size:12.0pt'>22751 El Prado Suite =
6216</span><o:p></o:p></p><p class=3DMsoNormal><span =
style=3D'font-size:12.0pt'>Rancho Santa Margarita, CA&nbsp; =
92688-3836</span><o:p></o:p></p><p class=3DMsoNormal><span =
style=3D'font-size:12.0pt'>&nbsp;</span><o:p></o:p></p><p =
class=3DMsoNormal><span =
style=3D'font-size:12.0pt'>Phone:&nbsp;&nbsp;&nbsp;&nbsp;&nbsp; (949) =
636-8571</span><o:p></o:p></p><p class=3DMsoNormal><span =
style=3D'font-size:12.0pt'>Email:&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp; <a =
href=3D"mailto:donald.coffin@reminetworks.com">donald.coffin@reminetworks=
.com</a></span><o:p></o:p></p><p =
class=3DMsoNormal>&nbsp;<o:p></o:p></p></div></blockquote><p =
class=3DMsoNormal><span style=3D'font-size:12.0pt;font-family:"Times New =
Roman","serif"'><br><br><br><o:p></o:p></span></p><pre>__________________=
_____________________________<o:p></o:p></pre><pre>OAuth mailing =
list<o:p></o:p></pre><pre><a =
href=3D"mailto:OAuth@ietf.org">OAuth@ietf.org</a><o:p></o:p></pre><pre><a=
 =
href=3D"https://www.ietf.org/mailman/listinfo/oauth">https://www.ietf.org=
/mailman/listinfo/oauth</a><o:p></o:p></pre></blockquote><p =
class=3DMsoNormal><span style=3D'font-size:12.0pt;font-family:"Times New =
Roman","serif"'><o:p>&nbsp;</o:p></span></p></div></body></html>
------=_NextPart_000_0063_01CE100C.727F7250--


From jricher@mitre.org  Thu Feb 21 08:41:16 2013
Return-Path: <jricher@mitre.org>
X-Original-To: oauth@ietfa.amsl.com
Delivered-To: oauth@ietfa.amsl.com
Received: from localhost (localhost [127.0.0.1]) by ietfa.amsl.com (Postfix) with ESMTP id 3D28521F8EA5 for <oauth@ietfa.amsl.com>; Thu, 21 Feb 2013 08:41:16 -0800 (PST)
X-Virus-Scanned: amavisd-new at amsl.com
X-Spam-Flag: NO
X-Spam-Score: -6.575
X-Spam-Level: 
X-Spam-Status: No, score=-6.575 tagged_above=-999 required=5 tests=[AWL=0.023,  BAYES_00=-2.599, HTML_MESSAGE=0.001, RCVD_IN_DNSWL_MED=-4]
Received: from mail.ietf.org ([64.170.98.30]) by localhost (ietfa.amsl.com [127.0.0.1]) (amavisd-new, port 10024) with ESMTP id 2ndy1oLDKBSq for <oauth@ietfa.amsl.com>; Thu, 21 Feb 2013 08:41:13 -0800 (PST)
Received: from smtpksrv1.mitre.org (smtpksrv1.mitre.org [198.49.146.77]) by ietfa.amsl.com (Postfix) with ESMTP id 24EE021F8E97 for <oauth@ietf.org>; Thu, 21 Feb 2013 08:41:13 -0800 (PST)
Received: from smtpksrv1.mitre.org (localhost.localdomain [127.0.0.1]) by localhost (Postfix) with SMTP id 5B6151F2C3F; Thu, 21 Feb 2013 11:41:12 -0500 (EST)
Received: from IMCCAS04.MITRE.ORG (imccas04.mitre.org [129.83.29.81]) by smtpksrv1.mitre.org (Postfix) with ESMTP id 281764390239; Thu, 21 Feb 2013 11:41:09 -0500 (EST)
Received: from [10.146.15.29] (129.83.31.58) by IMCCAS04.MITRE.ORG (129.83.29.81) with Microsoft SMTP Server (TLS) id 14.2.318.4; Thu, 21 Feb 2013 11:41:03 -0500
Message-ID: <51264DEA.6080808@mitre.org>
Date: Thu, 21 Feb 2013 11:40:10 -0500
From: Justin Richer <jricher@mitre.org>
User-Agent: Mozilla/5.0 (X11; Linux i686; rv:17.0) Gecko/20130106 Thunderbird/17.0.2
MIME-Version: 1.0
To: Donald F Coffin <donald.coffin@reminetworks.com>
References: <013601ce0fc7$b2faea20$18f0be60$@reminetworks.com> <F4E5214A-76C0-468E-BFE5-6578ED22D2A3@lodderstedt.net> <004f01ce104a$097c79e0$1c756da0$@reminetworks.com> <512644F5.9090505@mitre.org> <006201ce104f$809df760$81d9e620$@reminetworks.com>
In-Reply-To: <006201ce104f$809df760$81d9e620$@reminetworks.com>
Content-Type: multipart/alternative; boundary="------------060401020109030309010204"
X-Originating-IP: [129.83.31.58]
Cc: 'John Adkins' <jva2@pge.com>, 'Marty Burns' <marty@hypertek.us>, 'Scott Crowder' <scott.crowder@qadoenergy.com>, 'Dave Robin' <drobin@automatedlogic.com>, 'John Teeter' <john.teeter@peoplepowerco.com>, pmadsen@pingidentity.com, 'Edward Denson' <ewd7@pge.com>, oauth@ietf.org, 'Jay Mitra' <jay@youtilities.com>, 'Ray Perlner' <ray.perlner@nist.gov>, 'Anne Hendry' <ahendry2@gmail.com>, 'Lynne Rodoni' <mrodoni@semprautilities.com>, 'Uday Verma' <uday.verma@ilinknet.com>
Subject: Re: [OAUTH-WG] draft-ietf-oauth-revocation-05 Questions
X-BeenThere: oauth@ietf.org
X-Mailman-Version: 2.1.12
Precedence: list
List-Id: OAUTH WG <oauth.ietf.org>
List-Unsubscribe: <https://www.ietf.org/mailman/options/oauth>, <mailto:oauth-request@ietf.org?subject=unsubscribe>
List-Archive: <http://www.ietf.org/mail-archive/web/oauth>
List-Post: <mailto:oauth@ietf.org>
List-Help: <mailto:oauth-request@ietf.org?subject=help>
List-Subscribe: <https://www.ietf.org/mailman/listinfo/oauth>, <mailto:oauth-request@ietf.org?subject=subscribe>
X-List-Received-Date: Thu, 21 Feb 2013 16:41:16 -0000

--------------060401020109030309010204
Content-Type: text/plain; charset="ISO-8859-1"; format=flowed
Content-Transfer-Encoding: 7bit

Yes, that's correct, the actions you've described and the "portal/UI" 
components are of band as far as the OAuth 2 protocol is concerned. In 
fact, you don't *have* to have anything of the sort, though many 
deployments and implementations do have it in some fashion.

To bring it back to the original question: the token revocation endpoint 
is meant to service well-meaning clients who want to clean up any tokens 
they have in the wild. It's not meant for something end-users or 
resource owners would be dealing with directly.

  -- Justin

On 02/21/2013 11:21 AM, Donald F Coffin wrote:
>
> Justin,
>
> My response was not meant to ask the UI of the "respective portal 
> belonging to the AS".  The question was where in the various OAuth 2.0 
> Authorization Framework is such a portal even discussed?  Clearly if 
> it is NOT discussed in any existing OAuth 2.0 Authorization Framework 
> RFC or existing draft, then it must be an out-of-band customized 
> implementation.
>
> Best regards,
>
> Don
>
> Donald F. Coffin
>
> Founder/CTO
>
> REMI Networks
>
> 22751 El Prado Suite 6216
>
> Rancho Santa Margarita, CA  92688-3836
>
> Phone: (949) 636-8571
>
> Email: donald.coffin@reminetworks.com 
> <mailto:donald.coffin@reminetworks.com>
>
> *From:*Justin Richer [mailto:jricher@mitre.org]
> *Sent:* Thursday, February 21, 2013 8:02 AM
> *To:* Donald F Coffin
> *Cc:* 'Torsten Lodderstedt'; 'John Adkins'; 'Marty Burns'; 'Scott 
> Crowder'; 'Dave Robin'; 'John Teeter'; pmadsen@pingidentity.com; 
> 'Edward Denson'; 'Jay Mitra'; 'Uday Verma'; 'Ray Perlner'; 'Anne 
> Hendry'; 'Lynne Rodoni'; oauth@ietf.org
> *Subject:* Re: [OAUTH-WG] draft-ietf-oauth-revocation-05 Questions
>
> OAuth doesn't get into the business of what the UI for managing grants 
> is like. Having the user, admin, or resource owner revoke, downscope, 
> or otherwise alter a grant needs to happen with user interactions that 
> are going to be different depending on the provider and use case.
>
>  -- Justin
>
> On 02/21/2013 10:42 AM, Donald F Coffin wrote:
>
>     Torsten,
>
>     Thanks for the response.  What is the "respective portal belonging
>     to the AS"?  I haven't seen anything in the OAuth 2.0
>     Authorization Framework that describes a "portal" on the AS a
>     Resource Owner can log into to view a valid list of authorization
>     grants.  Is this an out-of-band implementation suggestion?
>
>     Best regards,
>
>     Don
>
>     Donald F. Coffin
>
>     Founder/CTO
>
>     REMI Networks
>
>     22751 El Prado Suite 6216
>
>     Rancho Santa Margarita, CA  92688-3836
>
>     Phone: (949) 636-8571
>
>     Email: donald.coffin@reminetworks.com
>     <mailto:donald.coffin@reminetworks.com>
>
>     *From:*Torsten Lodderstedt [mailto:torsten@lodderstedt.net]
>     *Sent:* Thursday, February 21, 2013 12:13 AM
>     *To:* Donald F Coffin
>     *Cc:* <oauth@ietf.org> <mailto:oauth@ietf.org>; Anne Hendry; Dave
>     Robin; Edward Denson; Jay Mitra; John Adkins; John Teeter; Lynne
>     Rodoni; Marty Burns; <pmadsen@pingidentity.com>
>     <mailto:pmadsen@pingidentity.com>; Ray Perlner; Scott Crowder;
>     Uday Verma
>     *Subject:* Re: draft-ietf-oauth-revocation-05 Questions
>
>     Hi Donald,
>
>     thank you for sharing your thoughts with us. I've never seen
>     revocation as change of scope of the authorization, but it sounds
>     reasonable. The current design handles the issues you raised
>     differently.
>
>     The AS is involved in the revocation process as it exposes the
>     revocation endpoint. So if the token is revoked (from a technical
>     perspective), it knows it. If the user wants to check whether the
>     application really sent the request, she is supposed to visit the
>     respective portal belonging to the AS. There the AS provides a
>     list of all valid authorization grants in its database.
>
>     Does this address your issues?
>
>     regards,
>
>     Torsten.
>
>
>     Am 21.02.2013 um 01:09 schrieb "Donald F Coffin"
>     <donald.coffin@reminetworks.com
>     <mailto:donald.coffin@reminetworks.com>>:
>
>         Torsten,
>
>         A colleague of mine and I were discussing what should occur
>         when a Retail Customer desires to change the existing
>         authorized access of a Third Party.  During our discussion
>         they asked "How does the Retail Customer know the Third Party
>         actually issued a Token revocation request?  Isn't there a
>         potential trust issue with the current design"?
>
>         The current draft provides a Third Party mechanism that
>         "allows a client to invalidate its tokens if the end-user logs
>         out, changes identity, or uninstalls the respective
>         application (sic)." While none of these fit the situation we
>         were discussing they do seem to be based on the assumption a
>         Third Party application will be a good citizen and stop using
>         access tokens. Unfortunately, none of the addressed situations
>         require the participation of a AS for completion, therefore
>         the risk exists that a Retail Customer may believe they have
>         removed a Third Party application from accessing their
>         protected data, but in reality there does not seem to be a
>         mechanism to either force or verify the Third Party can no
>         longer have access to the protected data.
>
>         A possible modification to the current draft that would
>         correct this potential security risk, is to treat a Token
>         revocation using a message flow similar to the existing
>         authorization_code response type.  A Retail Customer
>         requesting a change to the Third Party authorized access would
>         be redirected to an AS endpoint that would allow the Retail
>         Customer to either terminate a relationship completely or
>         modify the existing Third Party access authorization.  The
>         successful response from the AS would indicate the Third Party
>         needs to remove the current Token from its Token store.  In
>         the event the Retail Customer has changed the Third Party
>         access authorization, the AS response could include an
>         optional "scope" element, which the Third Party would then use
>         to obtain a new access token utilizing an Authorization Code
>         request.
>
>         There are several other potential implementations that could
>         be developed to protect a Retail Customer from a "rogue" Third
>         Party application that does not inform the AS their
>         authorization to access a Retail Customer's protected data has
>         been revoked, but the above suggestion meets the current
>         draft's view that Third Parties should be able to request
>         Tokens be revoked.
>
>         I look forward to your comments on the above topic.
>
>         Best regards,
>
>         Don
>
>         Donald F. Coffin
>
>         Founder/CTO
>
>         REMI Networks
>
>         22751 El Prado Suite 6216
>
>         Rancho Santa Margarita, CA  92688-3836
>
>         Phone: (949) 636-8571
>
>         Email: donald.coffin@reminetworks.com
>         <mailto:donald.coffin@reminetworks.com>
>
>
>
>
>     _______________________________________________
>
>     OAuth mailing list
>
>     OAuth@ietf.org  <mailto:OAuth@ietf.org>
>
>     https://www.ietf.org/mailman/listinfo/oauth
>


--------------060401020109030309010204
Content-Type: text/html; charset="ISO-8859-1"
Content-Transfer-Encoding: 7bit

<html>
  <head>
    <meta content="text/html; charset=ISO-8859-1"
      http-equiv="Content-Type">
  </head>
  <body bgcolor="#FFFFFF" text="#000000">
    Yes, that's correct, the actions you've described and the
    "portal/UI" components are of band as far as the OAuth 2 protocol is
    concerned. In fact, you don't *have* to have anything of the sort,
    though many deployments and implementations do have it in some
    fashion. <br>
    <br>
    To bring it back to the original question: the token revocation
    endpoint is meant to service well-meaning clients who want to clean
    up any tokens they have in the wild. It's not meant for something
    end-users or resource owners would be dealing with directly. <br>
    <br>
    &nbsp;-- Justin<br>
    <br>
    <div class="moz-cite-prefix">On 02/21/2013 11:21 AM, Donald F Coffin
      wrote:<br>
    </div>
    <blockquote
      cite="mid:006201ce104f$809df760$81d9e620$@reminetworks.com"
      type="cite">
      <meta http-equiv="Content-Type" content="text/html;
        charset=ISO-8859-1">
      <meta name="Generator" content="Microsoft Word 14 (filtered
        medium)">
      <style><!--
/* Font Definitions */
@font-face
	{font-family:"Cambria Math";
	panose-1:2 4 5 3 5 4 6 3 2 4;}
@font-face
	{font-family:Cambria;
	panose-1:2 4 5 3 5 4 6 3 2 4;}
@font-face
	{font-family:Calibri;
	panose-1:2 15 5 2 2 2 4 3 2 4;}
@font-face
	{font-family:Tahoma;
	panose-1:2 11 6 4 3 5 4 4 2 4;}
@font-face
	{font-family:"Brush Script MT";
	panose-1:3 6 8 2 4 4 6 7 3 4;}
@font-face
	{font-family:Consolas;
	panose-1:2 11 6 9 2 2 4 3 2 4;}
/* Style Definitions */
p.MsoNormal, li.MsoNormal, div.MsoNormal
	{margin:0in;
	margin-bottom:.0001pt;
	font-size:11.0pt;
	font-family:"Calibri","sans-serif";
	color:black;}
a:link, span.MsoHyperlink
	{mso-style-priority:99;
	color:blue;
	text-decoration:underline;}
a:visited, span.MsoHyperlinkFollowed
	{mso-style-priority:99;
	color:purple;
	text-decoration:underline;}
pre
	{mso-style-priority:99;
	mso-style-link:"HTML Preformatted Char";
	margin:0in;
	margin-bottom:.0001pt;
	font-size:10.0pt;
	font-family:"Courier New";
	color:black;}
p.MsoAcetate, li.MsoAcetate, div.MsoAcetate
	{mso-style-priority:99;
	mso-style-link:"Balloon Text Char";
	margin:0in;
	margin-bottom:.0001pt;
	font-size:8.0pt;
	font-family:"Tahoma","sans-serif";
	color:black;}
span.EmailStyle17
	{mso-style-type:personal;
	font-family:"Cambria","serif";
	color:windowtext;}
span.EmailStyle18
	{mso-style-type:personal;
	font-family:"Cambria","serif";
	color:windowtext;
	font-weight:normal;
	font-style:normal;}
span.HTMLPreformattedChar
	{mso-style-name:"HTML Preformatted Char";
	mso-style-priority:99;
	mso-style-link:"HTML Preformatted";
	font-family:"Consolas","serif";
	color:black;}
span.BalloonTextChar
	{mso-style-name:"Balloon Text Char";
	mso-style-priority:99;
	mso-style-link:"Balloon Text";
	font-family:"Tahoma","sans-serif";
	color:black;}
span.EmailStyle23
	{mso-style-type:personal-reply;
	font-family:"Cambria","serif";
	color:windowtext;
	font-weight:normal;
	font-style:normal;}
.MsoChpDefault
	{mso-style-type:export-only;
	font-size:10.0pt;}
@page WordSection1
	{size:8.5in 11.0in;
	margin:1.0in 1.0in 1.0in 1.0in;}
div.WordSection1
	{page:WordSection1;}
--></style><!--[if gte mso 9]><xml>
<o:shapedefaults v:ext="edit" spidmax="1026" />
</xml><![endif]--><!--[if gte mso 9]><xml>
<o:shapelayout v:ext="edit">
<o:idmap v:ext="edit" data="1" />
</o:shapelayout></xml><![endif]-->
      <div class="WordSection1">
        <p class="MsoNormal"><span
style="font-size:12.0pt;font-family:&quot;Cambria&quot;,&quot;serif&quot;;color:windowtext">Justin,<o:p></o:p></span></p>
        <p class="MsoNormal"><span
style="font-size:12.0pt;font-family:&quot;Cambria&quot;,&quot;serif&quot;;color:windowtext"><o:p>&nbsp;</o:p></span></p>
        <p class="MsoNormal"><span
style="font-size:12.0pt;font-family:&quot;Cambria&quot;,&quot;serif&quot;;color:windowtext">My
            response was not meant to ask the UI of the &#8220;respective
            portal belonging to the AS&#8221;.&nbsp; The question was where in the
            various OAuth 2.0 Authorization Framework is such a portal
            even discussed?&nbsp; Clearly if it is NOT discussed in any
            existing OAuth 2.0 Authorization Framework RFC or existing
            draft, then it must be an out-of-band customized
            implementation.<o:p></o:p></span></p>
        <p class="MsoNormal"><span
style="font-size:12.0pt;font-family:&quot;Cambria&quot;,&quot;serif&quot;;color:windowtext"><o:p>&nbsp;</o:p></span></p>
        <div>
          <p class="MsoNormal"><span
              style="font-size:12.0pt;color:windowtext">Best regards,<o:p></o:p></span></p>
          <p class="MsoNormal"><span
              style="font-size:24.0pt;font-family:&quot;Brush Script
              MT&quot;,&quot;serif&quot;;color:windowtext">Don<o:p></o:p></span></p>
          <p class="MsoNormal"><span
              style="font-size:12.0pt;color:windowtext">Donald F. Coffin<o:p></o:p></span></p>
          <p class="MsoNormal"><span
              style="font-size:12.0pt;color:windowtext">Founder/CTO<o:p></o:p></span></p>
          <p class="MsoNormal"><span
              style="font-size:12.0pt;color:windowtext"><o:p>&nbsp;</o:p></span></p>
          <p class="MsoNormal"><span
              style="font-size:12.0pt;color:windowtext">REMI Networks<o:p></o:p></span></p>
          <p class="MsoNormal"><span
              style="font-size:12.0pt;color:windowtext">22751 El Prado
              Suite 6216<o:p></o:p></span></p>
          <p class="MsoNormal"><span
              style="font-size:12.0pt;color:windowtext">Rancho Santa
              Margarita, CA&nbsp; 92688-3836<o:p></o:p></span></p>
          <p class="MsoNormal"><span
              style="font-size:12.0pt;color:windowtext"><o:p>&nbsp;</o:p></span></p>
          <p class="MsoNormal"><span
              style="font-size:12.0pt;color:windowtext">Phone:&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;
              (949) 636-8571<o:p></o:p></span></p>
          <p class="MsoNormal"><span
              style="font-size:12.0pt;color:windowtext">Email:&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp; <a
                moz-do-not-send="true"
                href="mailto:donald.coffin@reminetworks.com"><span
                  style="color:blue">donald.coffin@reminetworks.com</span></a><o:p></o:p></span></p>
        </div>
        <p class="MsoNormal"><span
style="font-size:12.0pt;font-family:&quot;Cambria&quot;,&quot;serif&quot;;color:windowtext"><o:p>&nbsp;</o:p></span></p>
        <div>
          <div style="border:none;border-top:solid #B5C4DF
            1.0pt;padding:3.0pt 0in 0in 0in">
            <p class="MsoNormal"><b><span
style="font-size:10.0pt;font-family:&quot;Tahoma&quot;,&quot;sans-serif&quot;;color:windowtext">From:</span></b><span
style="font-size:10.0pt;font-family:&quot;Tahoma&quot;,&quot;sans-serif&quot;;color:windowtext">
                Justin Richer [<a class="moz-txt-link-freetext" href="mailto:jricher@mitre.org">mailto:jricher@mitre.org</a>] <br>
                <b>Sent:</b> Thursday, February 21, 2013 8:02 AM<br>
                <b>To:</b> Donald F Coffin<br>
                <b>Cc:</b> 'Torsten Lodderstedt'; 'John Adkins'; 'Marty
                Burns'; 'Scott Crowder'; 'Dave Robin'; 'John Teeter';
                <a class="moz-txt-link-abbreviated" href="mailto:pmadsen@pingidentity.com">pmadsen@pingidentity.com</a>; 'Edward Denson'; 'Jay Mitra';
                'Uday Verma'; 'Ray Perlner'; 'Anne Hendry'; 'Lynne
                Rodoni'; <a class="moz-txt-link-abbreviated" href="mailto:oauth@ietf.org">oauth@ietf.org</a><br>
                <b>Subject:</b> Re: [OAUTH-WG]
                draft-ietf-oauth-revocation-05 Questions<o:p></o:p></span></p>
          </div>
        </div>
        <p class="MsoNormal"><o:p>&nbsp;</o:p></p>
        <p class="MsoNormal" style="margin-bottom:12.0pt">OAuth doesn't
          get into the business of what the UI for managing grants is
          like. Having the user, admin, or resource owner revoke,
          downscope, or otherwise alter a grant needs to happen with
          user interactions that are going to be different depending on
          the provider and use case. <br>
          <br>
          &nbsp;-- Justin<o:p></o:p></p>
        <div>
          <p class="MsoNormal">On 02/21/2013 10:42 AM, Donald F Coffin
            wrote:<o:p></o:p></p>
        </div>
        <blockquote style="margin-top:5.0pt;margin-bottom:5.0pt">
          <p class="MsoNormal"><span
style="font-size:12.0pt;font-family:&quot;Cambria&quot;,&quot;serif&quot;">Torsten,</span><o:p></o:p></p>
          <p class="MsoNormal"><span
style="font-size:12.0pt;font-family:&quot;Cambria&quot;,&quot;serif&quot;">&nbsp;</span><o:p></o:p></p>
          <p class="MsoNormal"><span
style="font-size:12.0pt;font-family:&quot;Cambria&quot;,&quot;serif&quot;">Thanks
              for the response.&nbsp; What is the &#8220;respective portal
              belonging to the AS&#8221;?&nbsp; I haven&#8217;t seen anything in the
              OAuth 2.0 Authorization Framework that describes a
              &#8220;portal&#8221; on the AS a Resource Owner can log into to view a
              valid list of authorization grants.&nbsp; Is this an
              out-of-band implementation suggestion?</span><o:p></o:p></p>
          <p class="MsoNormal"><span
style="font-size:12.0pt;font-family:&quot;Cambria&quot;,&quot;serif&quot;">&nbsp;</span><o:p></o:p></p>
          <div>
            <p class="MsoNormal"><span style="font-size:12.0pt">Best
                regards,</span><o:p></o:p></p>
            <p class="MsoNormal"><span
                style="font-size:24.0pt;font-family:&quot;Brush Script
                MT&quot;,&quot;serif&quot;">Don</span><o:p></o:p></p>
            <p class="MsoNormal"><span style="font-size:12.0pt">Donald
                F. Coffin</span><o:p></o:p></p>
            <p class="MsoNormal"><span style="font-size:12.0pt">Founder/CTO</span><o:p></o:p></p>
            <p class="MsoNormal"><span style="font-size:12.0pt">&nbsp;</span><o:p></o:p></p>
            <p class="MsoNormal"><span style="font-size:12.0pt">REMI
                Networks</span><o:p></o:p></p>
            <p class="MsoNormal"><span style="font-size:12.0pt">22751 El
                Prado Suite 6216</span><o:p></o:p></p>
            <p class="MsoNormal"><span style="font-size:12.0pt">Rancho
                Santa Margarita, CA&nbsp; 92688-3836</span><o:p></o:p></p>
            <p class="MsoNormal"><span style="font-size:12.0pt">&nbsp;</span><o:p></o:p></p>
            <p class="MsoNormal"><span style="font-size:12.0pt">Phone:&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;
                (949) 636-8571</span><o:p></o:p></p>
            <p class="MsoNormal"><span style="font-size:12.0pt">Email:&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;
                <a moz-do-not-send="true"
                  href="mailto:donald.coffin@reminetworks.com">donald.coffin@reminetworks.com</a></span><o:p></o:p></p>
          </div>
          <p class="MsoNormal"><span
style="font-size:12.0pt;font-family:&quot;Cambria&quot;,&quot;serif&quot;">&nbsp;</span><o:p></o:p></p>
          <div>
            <div style="border:none;border-top:solid #B5C4DF
              1.0pt;padding:3.0pt 0in 0in 0in">
              <p class="MsoNormal"><b><span
style="font-size:10.0pt;font-family:&quot;Tahoma&quot;,&quot;sans-serif&quot;">From:</span></b><span
style="font-size:10.0pt;font-family:&quot;Tahoma&quot;,&quot;sans-serif&quot;">
                  Torsten Lodderstedt [<a moz-do-not-send="true"
                    href="mailto:torsten@lodderstedt.net">mailto:torsten@lodderstedt.net</a>]
                  <br>
                  <b>Sent:</b> Thursday, February 21, 2013 12:13 AM<br>
                  <b>To:</b> Donald F Coffin<br>
                  <b>Cc:</b> <a moz-do-not-send="true"
                    href="mailto:oauth@ietf.org">&lt;oauth@ietf.org&gt;</a>;
                  Anne Hendry; Dave Robin; Edward Denson; Jay Mitra;
                  John Adkins; John Teeter; Lynne Rodoni; Marty Burns; <a
                    moz-do-not-send="true"
                    href="mailto:pmadsen@pingidentity.com">&lt;pmadsen@pingidentity.com&gt;</a>;
                  Ray Perlner; Scott Crowder; Uday Verma<br>
                  <b>Subject:</b> Re: draft-ietf-oauth-revocation-05
                  Questions</span><o:p></o:p></p>
            </div>
          </div>
          <p class="MsoNormal">&nbsp;<o:p></o:p></p>
          <div>
            <p class="MsoNormal">Hi Donald,<o:p></o:p></p>
          </div>
          <div>
            <p class="MsoNormal">&nbsp;<o:p></o:p></p>
          </div>
          <div>
            <p class="MsoNormal">thank you for sharing your thoughts
              with us. I've never seen revocation as change of scope of
              the authorization, but it sounds reasonable. The current
              design handles the issues you raised differently.<o:p></o:p></p>
          </div>
          <div>
            <p class="MsoNormal">&nbsp;<o:p></o:p></p>
          </div>
          <div>
            <p class="MsoNormal">The AS is involved in the revocation
              process as it exposes the revocation endpoint. So if the
              token is revoked (from a technical perspective), it knows
              it. If the user wants to check whether the application
              really sent the request, she is supposed to visit the
              respective portal belonging to the AS. There the AS
              provides a list of all valid authorization grants in its
              database.&nbsp;<o:p></o:p></p>
          </div>
          <div>
            <p class="MsoNormal">&nbsp;<o:p></o:p></p>
          </div>
          <div>
            <p class="MsoNormal">Does this address your issues?<o:p></o:p></p>
          </div>
          <div>
            <p class="MsoNormal">&nbsp;<o:p></o:p></p>
          </div>
          <div>
            <p class="MsoNormal">regards,<o:p></o:p></p>
          </div>
          <div>
            <p class="MsoNormal">Torsten.<o:p></o:p></p>
          </div>
          <div>
            <p class="MsoNormal" style="margin-bottom:12.0pt"><br>
              Am 21.02.2013 um 01:09 schrieb "Donald F Coffin" &lt;<a
                moz-do-not-send="true"
                href="mailto:donald.coffin@reminetworks.com">donald.coffin@reminetworks.com</a>&gt;:<o:p></o:p></p>
          </div>
          <blockquote style="margin-top:5.0pt;margin-bottom:5.0pt">
            <div>
              <p class="MsoNormal"><span
style="font-size:12.0pt;font-family:&quot;Cambria&quot;,&quot;serif&quot;">Torsten,</span><o:p></o:p></p>
              <p class="MsoNormal"><span
style="font-size:12.0pt;font-family:&quot;Cambria&quot;,&quot;serif&quot;">&nbsp;</span><o:p></o:p></p>
              <p class="MsoNormal"><span
style="font-size:12.0pt;font-family:&quot;Cambria&quot;,&quot;serif&quot;">A
                  colleague of mine and I were discussing what should
                  occur when a Retail Customer desires to change the
                  existing authorized access of a Third Party.&nbsp; During
                  our discussion they asked &#8220;How does the Retail
                  Customer know the Third Party actually issued a Token
                  revocation request?&nbsp; Isn&#8217;t there a potential trust
                  issue with the current design&#8221;? </span><o:p></o:p></p>
              <p class="MsoNormal"><span
style="font-size:12.0pt;font-family:&quot;Cambria&quot;,&quot;serif&quot;">&nbsp;</span><o:p></o:p></p>
              <p class="MsoNormal"><span
style="font-size:12.0pt;font-family:&quot;Cambria&quot;,&quot;serif&quot;">The
                  current draft provides a Third Party mechanism that
                  &#8220;allows a client to invalidate its tokens if the
                  end-user logs out, changes identity, or uninstalls the
                  respective application (sic).&#8221; While none of these fit
                  the situation we were discussing they do seem to be
                  based on the assumption a Third Party application will
                  be a good citizen and stop using access tokens.&nbsp;
                  Unfortunately, none of the addressed situations
                  require the participation of a AS for completion,
                  therefore the risk exists that a Retail Customer may
                  believe they have removed a Third Party application
                  from accessing their protected data, but in reality
                  there does not seem to be a mechanism to either force
                  or verify the Third Party can no longer have access to
                  the protected data.</span><o:p></o:p></p>
              <p class="MsoNormal"><span
style="font-size:12.0pt;font-family:&quot;Cambria&quot;,&quot;serif&quot;">&nbsp;</span><o:p></o:p></p>
              <p class="MsoNormal"><span
style="font-size:12.0pt;font-family:&quot;Cambria&quot;,&quot;serif&quot;">A
                  possible modification to the current draft that would
                  correct this potential security risk, is to treat a
                  Token revocation using a message flow similar to the
                  existing authorization_code response type.&nbsp; A Retail
                  Customer requesting a change to the Third Party
                  authorized access would be redirected to an AS
                  endpoint that would allow the Retail Customer to
                  either terminate a relationship completely or modify
                  the existing Third Party access authorization.&nbsp; The
                  successful response from the AS would indicate the
                  Third Party needs to remove the current Token from its
                  Token store.&nbsp; In the event the Retail Customer has
                  changed the Third Party access authorization, the AS
                  response could include an optional &#8220;scope&#8221; element,
                  which the Third Party would then use to obtain a new
                  access token utilizing an Authorization Code request.</span><o:p></o:p></p>
              <p class="MsoNormal"><span
style="font-size:12.0pt;font-family:&quot;Cambria&quot;,&quot;serif&quot;">&nbsp;</span><o:p></o:p></p>
              <p class="MsoNormal"><span
style="font-size:12.0pt;font-family:&quot;Cambria&quot;,&quot;serif&quot;">There
                  are several other potential implementations that could
                  be developed to protect a Retail Customer from a
                  &#8220;rogue&#8221; Third Party application that does not inform
                  the AS their authorization to access a Retail
                  Customer&#8217;s protected data has been revoked, but the
                  above suggestion meets the current draft&#8217;s view that
                  Third Parties should be able to request Tokens be
                  revoked.</span><o:p></o:p></p>
              <p class="MsoNormal"><span
style="font-size:12.0pt;font-family:&quot;Cambria&quot;,&quot;serif&quot;">&nbsp;</span><o:p></o:p></p>
              <p class="MsoNormal"><span
style="font-size:12.0pt;font-family:&quot;Cambria&quot;,&quot;serif&quot;">I
                  look forward to your comments on the above topic.</span><o:p></o:p></p>
              <p class="MsoNormal"><span
style="font-size:12.0pt;font-family:&quot;Cambria&quot;,&quot;serif&quot;">&nbsp;</span><o:p></o:p></p>
              <p class="MsoNormal"><span
style="font-size:12.0pt;font-family:&quot;Cambria&quot;,&quot;serif&quot;">&nbsp;</span><o:p></o:p></p>
              <p class="MsoNormal"><span style="font-size:12.0pt">Best
                  regards,</span><o:p></o:p></p>
              <p class="MsoNormal"><span
                  style="font-size:24.0pt;font-family:&quot;Brush Script
                  MT&quot;,&quot;serif&quot;">Don</span><o:p></o:p></p>
              <p class="MsoNormal"><span style="font-size:12.0pt">Donald
                  F. Coffin</span><o:p></o:p></p>
              <p class="MsoNormal"><span style="font-size:12.0pt">Founder/CTO</span><o:p></o:p></p>
              <p class="MsoNormal"><span style="font-size:12.0pt">&nbsp;</span><o:p></o:p></p>
              <p class="MsoNormal"><span style="font-size:12.0pt">REMI
                  Networks</span><o:p></o:p></p>
              <p class="MsoNormal"><span style="font-size:12.0pt">22751
                  El Prado Suite 6216</span><o:p></o:p></p>
              <p class="MsoNormal"><span style="font-size:12.0pt">Rancho
                  Santa Margarita, CA&nbsp; 92688-3836</span><o:p></o:p></p>
              <p class="MsoNormal"><span style="font-size:12.0pt">&nbsp;</span><o:p></o:p></p>
              <p class="MsoNormal"><span style="font-size:12.0pt">Phone:&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;
                  (949) 636-8571</span><o:p></o:p></p>
              <p class="MsoNormal"><span style="font-size:12.0pt">Email:&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;
                  <a moz-do-not-send="true"
                    href="mailto:donald.coffin@reminetworks.com">donald.coffin@reminetworks.com</a></span><o:p></o:p></p>
              <p class="MsoNormal">&nbsp;<o:p></o:p></p>
            </div>
          </blockquote>
          <p class="MsoNormal"><span
              style="font-size:12.0pt;font-family:&quot;Times New
              Roman&quot;,&quot;serif&quot;"><br>
              <br>
              <br>
              <o:p></o:p></span></p>
          <pre>_______________________________________________<o:p></o:p></pre>
          <pre>OAuth mailing list<o:p></o:p></pre>
          <pre><a moz-do-not-send="true" href="mailto:OAuth@ietf.org">OAuth@ietf.org</a><o:p></o:p></pre>
          <pre><a moz-do-not-send="true" href="https://www.ietf.org/mailman/listinfo/oauth">https://www.ietf.org/mailman/listinfo/oauth</a><o:p></o:p></pre>
        </blockquote>
        <p class="MsoNormal"><span
            style="font-size:12.0pt;font-family:&quot;Times New
            Roman&quot;,&quot;serif&quot;"><o:p>&nbsp;</o:p></span></p>
      </div>
    </blockquote>
    <br>
  </body>
</html>

--------------060401020109030309010204--

From Michael.Jones@microsoft.com  Thu Feb 21 09:32:13 2013
Return-Path: <Michael.Jones@microsoft.com>
X-Original-To: oauth@ietfa.amsl.com
Delivered-To: oauth@ietfa.amsl.com
Received: from localhost (localhost [127.0.0.1]) by ietfa.amsl.com (Postfix) with ESMTP id 6771B21F8EDE for <oauth@ietfa.amsl.com>; Thu, 21 Feb 2013 09:32:13 -0800 (PST)
X-Virus-Scanned: amavisd-new at amsl.com
X-Spam-Flag: NO
X-Spam-Score: -2.585
X-Spam-Level: 
X-Spam-Status: No, score=-2.585 tagged_above=-999 required=5 tests=[AWL=0.013,  BAYES_00=-2.599, HTML_MESSAGE=0.001]
Received: from mail.ietf.org ([64.170.98.30]) by localhost (ietfa.amsl.com [127.0.0.1]) (amavisd-new, port 10024) with ESMTP id Tw9sKnsZhzIE for <oauth@ietfa.amsl.com>; Thu, 21 Feb 2013 09:32:08 -0800 (PST)
Received: from na01-bl2-obe.outbound.protection.outlook.com (na01-bl2-obe.ptr.protection.outlook.com [65.55.169.24]) by ietfa.amsl.com (Postfix) with ESMTP id 26C1921F8EC3 for <oauth@ietf.org>; Thu, 21 Feb 2013 09:32:08 -0800 (PST)
Received: from BY2FFO11FD010.protection.gbl (10.1.15.204) by BY2FFO11HUB008.protection.gbl (10.1.14.166) with Microsoft SMTP Server (TLS) id 15.0.620.12; Thu, 21 Feb 2013 17:32:04 +0000
Received: from TK5EX14HUBC101.redmond.corp.microsoft.com (131.107.125.37) by BY2FFO11FD010.mail.protection.outlook.com (10.1.14.74) with Microsoft SMTP Server (TLS) id 15.0.620.12 via Frontend Transport; Thu, 21 Feb 2013 17:32:04 +0000
Received: from TK5EX14MBXC284.redmond.corp.microsoft.com ([169.254.1.96]) by TK5EX14HUBC101.redmond.corp.microsoft.com ([157.54.7.153]) with mapi id 14.02.0318.003; Thu, 21 Feb 2013 17:31:22 +0000
From: Mike Jones <Michael.Jones@microsoft.com>
To: Justin Richer <jricher@mitre.org>
Thread-Topic: [OAUTH-WG] I-D Action: draft-ietf-oauth-dyn-reg-06.txt
Thread-Index: AQHOC8cMkbohP5vU0EO7eTLi/U/hMJh7eCuAgAd2gACAAAA6MIAABsiAgAADAoCAAAZKgIAAAIEAgAAGaQCAAAoJgIABUVWAgAA5XrA=
Date: Thu, 21 Feb 2013 17:31:21 +0000
Message-ID: <4E1F6AAD24975D4BA5B1680429673943674800D6@TK5EX14MBXC284.redmond.corp.microsoft.com>
References: <20130215215423.23019.50224.idtracker@ietfa.amsl.com> <B33BFB58CCC8BE4998958016839DE27E06894B4F@IMCMBX01.MITRE.ORG> <CABzCy2CgnAtPrTY37H6vO-+5u3tRmsm+1j86r3w046AhHnNdfw@mail.gmail.com> <4E1F6AAD24975D4BA5B16804296739436747A665@TK5EX14MBXC284.redmond.corp.microsoft.com> <63255CDA-E93F-4414-B471-B373C4B6F65E@ve7jtb.com> <CA+ZpN278s7BRuUV31PzqL9fEK+3rKT6UiQiwmv_pfbK91g+yQg@mail.gmail.com> <CABzCy2AYnfxfJ3w6sBWw69LxaHCrJB-GyrT+-G8Ufx4-CQ6gTQ@mail.gmail.com> <4E1F6AAD24975D4BA5B16804296739436747AD87@TK5EX14MBXC284.redmond.corp.microsoft.com> <CA+ZpN24ot=6Rp663KtA0inc1eSKyfQ1sQ1b+NDNPCg3vu7OL_g@mail.gmail.com> <4E1F6AAD24975D4BA5B16804296739436747B12D@TK5EX14MBXC284.redmond.corp.microsoft.com> <5126297F.7070904@mitre.org>
In-Reply-To: <5126297F.7070904@mitre.org>
Accept-Language: en-US
Content-Language: en-US
X-MS-Has-Attach: 
X-MS-TNEF-Correlator: 
x-originating-ip: [157.54.51.35]
Content-Type: multipart/alternative; boundary="_000_4E1F6AAD24975D4BA5B1680429673943674800D6TK5EX14MBXC284r_"
MIME-Version: 1.0
X-Forefront-Antispam-Report: CIP:131.107.125.37; CTRY:US; IPV:CAL; IPV:NLI; EFV:NLI; SFV:NSPM; SFS:(69234002)(479174001)(65554002)(377424002)(377454001)(199002)(189002)(69224001)(51704002)(51914002)(24454001)(53806001)(16406001)(16236675001)(4396001)(65816001)(54356001)(47976001)(15202345001)(31966008)(47736001)(56816002)(74662001)(5343635001)(46102001)(33656001)(5343655001)(47446002)(74502001)(80022001)(66066001)(50986001)(55846006)(20776003)(49866001)(63696002)(79102001)(76482001)(56776001)(77982001)(44976002)(512954001)(59766001)(54316002)(51856001); DIR:OUT; SFP:; SCL:1; SRVR:BY2FFO11HUB008; H:TK5EX14HUBC101.redmond.corp.microsoft.com; RD:InfoDomainNonexistent; A:1; MX:1; LANG:en; 
X-OriginatorOrg: microsoft.onmicrosoft.com
X-Forefront-PRVS: 0764C4A8CD
Cc: "<oauth@ietf.org>" <oauth@ietf.org>
Subject: Re: [OAUTH-WG] I-D Action: draft-ietf-oauth-dyn-reg-06.txt
X-BeenThere: oauth@ietf.org
X-Mailman-Version: 2.1.12
Precedence: list
List-Id: OAUTH WG <oauth.ietf.org>
List-Unsubscribe: <https://www.ietf.org/mailman/options/oauth>, <mailto:oauth-request@ietf.org?subject=unsubscribe>
List-Archive: <http://www.ietf.org/mail-archive/web/oauth>
List-Post: <mailto:oauth@ietf.org>
List-Help: <mailto:oauth-request@ietf.org?subject=help>
List-Subscribe: <https://www.ietf.org/mailman/listinfo/oauth>, <mailto:oauth-request@ietf.org?subject=subscribe>
X-List-Received-Date: Thu, 21 Feb 2013 17:32:13 -0000

--_000_4E1F6AAD24975D4BA5B1680429673943674800D6TK5EX14MBXC284r_
Content-Type: text/plain; charset="us-ascii"
Content-Transfer-Encoding: quoted-printable

Yes - per Tim's reference, we'll likely be required to do this at some poin=
t before achieving RFC status, so better to do it now than later.

FYI, OpenID Connect Registration just made these changes, for exactly this =
reason.

                                                            Cheers,
                                                            -- Mike

From: Justin Richer [mailto:jricher@mitre.org]
Sent: Thursday, February 21, 2013 6:05 AM
To: Mike Jones
Cc: Tim Bray; <oauth@ietf.org>
Subject: Re: [OAUTH-WG] I-D Action: draft-ietf-oauth-dyn-reg-06.txt

With this in mind, we might want to change *all* of the _url parameters to =
_uri instead, not just this new one. Are folks in favor of this?

 -- Justin
On 02/20/2013 12:57 PM, Mike Jones wrote:
OK, we should make the change then.  Thanks for the input.

                                                            -- Mike

From: Tim Bray [mailto:twbray@google.com]
Sent: Wednesday, February 20, 2013 9:22 AM
To: Mike Jones
Cc: Nat Sakimura; <oauth@ietf.org><mailto:oauth@ietf.org>
Subject: Re: [OAUTH-WG] I-D Action: draft-ietf-oauth-dyn-reg-06.txt

Yes, "URL" is strongly and clearly deprecated in RFC3986 section 1.1.3; one=
 of the reasons is that the distinction between "locator" and "identifier" =
which sounds like it should be easy, turns out to lead to theological bikes=
hed discussions almost inevitably, and in fact be shaky in practice.  -T
On Wed, Feb 20, 2013 at 9:00 AM, Mike Jones <Michael.Jones@microsoft.com<ma=
ilto:Michael.Jones@microsoft.com>> wrote:
Tim, as background, this came from the OpenID Connect specs, where we tried=
 to consistently use the convention that the locator for any resource that =
can be retrieved from the specified location be called a URL, whereas any i=
dentifier that may not be retrievable is called a URI.  That was done as an=
 aid to developer understanding of the specifications.

If the use of "URL" is deprecated by the IETF in favor of always just using=
 "URI", I suppose we could change that, but if it's going to change, it sho=
uld be soon.

                                                            -- Mike


From: oauth-bounces@ietf.org<mailto:oauth-bounces@ietf.org> [mailto:oauth-b=
ounces@ietf.org<mailto:oauth-bounces@ietf.org>] On Behalf Of Nat Sakimura
Sent: Wednesday, February 20, 2013 8:57 AM
To: Tim Bray
Cc: <oauth@ietf.org<mailto:oauth@ietf.org>>
Subject: Re: [OAUTH-WG] I-D Action: draft-ietf-oauth-dyn-reg-06.txt

You are right. I am in the camp recommending the use of URL when it is a co=
ncrete endpoint and URI when it includes something that is only abstract, b=
ut since OAuth standardized on "uri", we may as well do so here.

Nat
2013/2/20 Tim Bray <twbray@google.com<mailto:twbray@google.com>>
In OAuth, we have redirect_uri not redirect_url; should this be registratio=
n_access_uri for consistency? -T

On Wed, Feb 20, 2013 at 8:23 AM, John Bradley <ve7jtb@ve7jtb.com<mailto:ve7=
jtb@ve7jtb.com>> wrote:
I think registration_access_url is OK.    I haven't heard any better names =
yet.

John B.

On 2013-02-20, at 1:04 PM, Mike Jones <Michael.Jones@microsoft.com<mailto:M=
ichael.Jones@microsoft.com>> wrote:

For what it's worth, the name "registration_access_url" was chosen to be pa=
rallel to "registration_access_token".   It's the place you use the access =
token.  And it's where you access an existing registration.  I'm against th=
e name "client_metadata_url" because it's not metadata you're accessing - i=
t's a registration you're accessing.  For the same reason, I don't think th=
e name "client_info_url" gives people the right idea, because it doesn't sa=
y anything it being the registration that you're accessing.

If you really want us to change this, having read what's above, I could liv=
e with "client_registration_url", but I don't think a change is actually ne=
cessary.  (But if we are going to change it, let's do it ASAP, before the O=
penID Connect Implementer's Drafts are published.)

                                                            -- Mike

From: oauth-bounces@ietf.org<mailto:oauth-bounces@ietf.org> [mailto:oauth-<=
mailto:oauth->bounces@ietf.org<mailto:bounces@ietf.org>] On Behalf Of Nat S=
akimura
Sent: Wednesday, February 20, 2013 7:58 AM
To: <oauth@ietf.org<mailto:oauth@ietf.org>>; Richer, Justin P.; John Bradle=
y
Subject: Re: [OAUTH-WG] I-D Action: draft-ietf-oauth-dyn-reg-06.txt

Thanks Justin.

Even if we go flat rather than doing JSON Structure, the "Client
Registration Access Endpoint" is not a good representative name.

What it represents is the client metadata/info.
It is not representing "Client Registration Access".
What does "Client Registration Access" mean?
Does UPDATing "Cleint Registration Access" make sense?

Something in the line of "Client Metadata Endpoint" and
something like "client_metadata_url" or "client_info_url" is much better.

Nat
2013/2/15 Richer, Justin P. <jricher@mitre.org<mailto:jricher@mitre.org>>
Everyone, there's a new draft of DynReg up on the tracker. This draft tries=
 to codify the discussions so far from this week into something we can all =
read. There are still plenty of open discussion points and items up for deb=
ate. Please read through this latest draft and see what's changed and help =
assure that it properly captures the conversations. If you have any inputs =
for the marked [[ Editor's Note ]] sections, please send them to the list b=
y next Thursday to give me opportunity to get any necessary changes in by t=
he cutoff date of Monday the 22nd.

Thanks for all of your hard work everyone, I think this is *really* coming =
along now.

 -- Justin

On Feb 15, 2013, at 4:54 PM, internet-drafts@ietf.org<mailto:internet-draft=
s@ietf.org> wrote:

>
> A New Internet-Draft is available from the on-line Internet-Drafts direct=
ories.
> This draft is a work item of the Web Authorization Protocol Working Group=
 of the IETF.
>
>       Title           : OAuth Dynamic Client Registration Protocol
>       Author(s)       : Justin Richer
>                          John Bradley
>                          Michael B. Jones
>                          Maciej Machulak
>       Filename        : draft-ietf-oauth-dyn-reg-06.txt
>       Pages           : 21
>       Date            : 2013-02-15
>
> Abstract:
>   This specification defines an endpoint and protocol for dynamic
>   registration of OAuth Clients at an Authorization Server.
>
>
> The IETF datatracker status page for this draft is:
> https://datatracker.ietf.org/doc/draft-ietf-oauth-dyn-reg
>
> There's also a htmlized version available at:
> http://tools.ietf.org/html/draft-ietf-oauth-dyn-reg-06
>
> A diff from the previous version is available at:
> http://www.ietf.org/rfcdiff?url2=3Ddraft-ietf-oauth-dyn-reg-06
>
>
> Internet-Drafts are also available by anonymous FTP at:
> ftp://ftp.ietf.org/internet-drafts/
>
> _______________________________________________
> OAuth mailing list
> OAuth@ietf.org<mailto:OAuth@ietf.org>
> https://www.ietf.org/mailman/listinfo/oauth

_______________________________________________
OAuth mailing list
OAuth@ietf.org<mailto:OAuth@ietf.org>
https://www.ietf.org/mailman/listinfo/oauth



--
Nat Sakimura (=3Dnat)
Chairman, OpenID Foundation
http://nat.sakimura.org/
@_nat_en


_______________________________________________
OAuth mailing list
OAuth@ietf.org<mailto:OAuth@ietf.org>
https://www.ietf.org/mailman/listinfo/oauth


_______________________________________________
OAuth mailing list
OAuth@ietf.org<mailto:OAuth@ietf.org>
https://www.ietf.org/mailman/listinfo/oauth



--
Nat Sakimura (=3Dnat)
Chairman, OpenID Foundation
http://nat.sakimura.org/
@_nat_en





_______________________________________________

OAuth mailing list

OAuth@ietf.org<mailto:OAuth@ietf.org>

https://www.ietf.org/mailman/listinfo/oauth


--_000_4E1F6AAD24975D4BA5B1680429673943674800D6TK5EX14MBXC284r_
Content-Type: text/html; charset="us-ascii"
Content-Transfer-Encoding: quoted-printable

<html xmlns:v=3D"urn:schemas-microsoft-com:vml" xmlns:o=3D"urn:schemas-micr=
osoft-com:office:office" xmlns:w=3D"urn:schemas-microsoft-com:office:word" =
xmlns:m=3D"http://schemas.microsoft.com/office/2004/12/omml" xmlns=3D"http:=
//www.w3.org/TR/REC-html40">
<head>
<meta http-equiv=3D"Content-Type" content=3D"text/html; charset=3Dus-ascii"=
>
<meta name=3D"Generator" content=3D"Microsoft Word 14 (filtered medium)">
<style><!--
/* Font Definitions */
@font-face
	{font-family:Calibri;
	panose-1:2 15 5 2 2 2 4 3 2 4;}
@font-face
	{font-family:Tahoma;
	panose-1:2 11 6 4 3 5 4 4 2 4;}
@font-face
	{font-family:Consolas;
	panose-1:2 11 6 9 2 2 4 3 2 4;}
/* Style Definitions */
p.MsoNormal, li.MsoNormal, div.MsoNormal
	{margin:0in;
	margin-bottom:.0001pt;
	font-size:12.0pt;
	font-family:"Times New Roman","serif";
	color:black;}
a:link, span.MsoHyperlink
	{mso-style-priority:99;
	color:blue;
	text-decoration:underline;}
a:visited, span.MsoHyperlinkFollowed
	{mso-style-priority:99;
	color:purple;
	text-decoration:underline;}
pre
	{mso-style-priority:99;
	mso-style-link:"HTML Preformatted Char";
	margin:0in;
	margin-bottom:.0001pt;
	font-size:10.0pt;
	font-family:"Courier New";
	color:black;}
p.MsoAcetate, li.MsoAcetate, div.MsoAcetate
	{mso-style-priority:99;
	mso-style-link:"Balloon Text Char";
	margin:0in;
	margin-bottom:.0001pt;
	font-size:8.0pt;
	font-family:"Tahoma","sans-serif";
	color:black;}
span.BalloonTextChar
	{mso-style-name:"Balloon Text Char";
	mso-style-priority:99;
	mso-style-link:"Balloon Text";
	font-family:"Tahoma","sans-serif";}
span.hoenzb
	{mso-style-name:hoenzb;}
span.EmailStyle20
	{mso-style-type:personal;
	font-family:"Calibri","sans-serif";
	color:#1F497D;}
span.HTMLPreformattedChar
	{mso-style-name:"HTML Preformatted Char";
	mso-style-priority:99;
	mso-style-link:"HTML Preformatted";
	font-family:Consolas;
	color:black;}
span.EmailStyle23
	{mso-style-type:personal-reply;
	font-family:"Calibri","sans-serif";
	color:#1F497D;}
.MsoChpDefault
	{mso-style-type:export-only;
	font-size:10.0pt;}
@page WordSection1
	{size:8.5in 11.0in;
	margin:1.0in 1.0in 1.0in 1.0in;}
div.WordSection1
	{page:WordSection1;}
--></style><!--[if gte mso 9]><xml>
<o:shapedefaults v:ext=3D"edit" spidmax=3D"1026" />
</xml><![endif]--><!--[if gte mso 9]><xml>
<o:shapelayout v:ext=3D"edit">
<o:idmap v:ext=3D"edit" data=3D"1" />
</o:shapelayout></xml><![endif]-->
</head>
<body bgcolor=3D"white" lang=3D"EN-US" link=3D"blue" vlink=3D"purple">
<div class=3D"WordSection1">
<p class=3D"MsoNormal"><span style=3D"font-size:11.0pt;font-family:&quot;Ca=
libri&quot;,&quot;sans-serif&quot;;color:#1F497D">Yes &#8211; per Tim&#8217=
;s reference, we&#8217;ll likely be required to do this at some point befor=
e achieving RFC status, so better to do it now than later.<o:p></o:p></span=
></p>
<p class=3D"MsoNormal"><span style=3D"font-size:11.0pt;font-family:&quot;Ca=
libri&quot;,&quot;sans-serif&quot;;color:#1F497D"><o:p>&nbsp;</o:p></span><=
/p>
<p class=3D"MsoNormal"><span style=3D"font-size:11.0pt;font-family:&quot;Ca=
libri&quot;,&quot;sans-serif&quot;;color:#1F497D">FYI, OpenID Connect Regis=
tration just made these changes, for exactly this reason.<o:p></o:p></span>=
</p>
<p class=3D"MsoNormal"><span style=3D"font-size:11.0pt;font-family:&quot;Ca=
libri&quot;,&quot;sans-serif&quot;;color:#1F497D"><o:p>&nbsp;</o:p></span><=
/p>
<p class=3D"MsoNormal"><span style=3D"font-size:11.0pt;font-family:&quot;Ca=
libri&quot;,&quot;sans-serif&quot;;color:#1F497D">&nbsp;&nbsp;&nbsp;&nbsp;&=
nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbs=
p;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&=
nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbs=
p;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&=
nbsp;&nbsp;&nbsp;&nbsp;&nbsp; Cheers,<o:p></o:p></span></p>
<p class=3D"MsoNormal"><span style=3D"font-size:11.0pt;font-family:&quot;Ca=
libri&quot;,&quot;sans-serif&quot;;color:#1F497D">&nbsp;&nbsp;&nbsp;&nbsp;&=
nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbs=
p;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&=
nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbs=
p;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&=
nbsp;&nbsp;&nbsp;&nbsp;&nbsp; -- Mike<o:p></o:p></span></p>
<p class=3D"MsoNormal"><span style=3D"font-size:11.0pt;font-family:&quot;Ca=
libri&quot;,&quot;sans-serif&quot;;color:#1F497D"><o:p>&nbsp;</o:p></span><=
/p>
<div>
<div style=3D"border:none;border-top:solid #B5C4DF 1.0pt;padding:3.0pt 0in =
0in 0in">
<p class=3D"MsoNormal"><b><span style=3D"font-size:10.0pt;font-family:&quot=
;Tahoma&quot;,&quot;sans-serif&quot;;color:windowtext">From:</span></b><spa=
n style=3D"font-size:10.0pt;font-family:&quot;Tahoma&quot;,&quot;sans-serif=
&quot;;color:windowtext"> Justin Richer [mailto:jricher@mitre.org]
<br>
<b>Sent:</b> Thursday, February 21, 2013 6:05 AM<br>
<b>To:</b> Mike Jones<br>
<b>Cc:</b> Tim Bray; &lt;oauth@ietf.org&gt;<br>
<b>Subject:</b> Re: [OAUTH-WG] I-D Action: draft-ietf-oauth-dyn-reg-06.txt<=
o:p></o:p></span></p>
</div>
</div>
<p class=3D"MsoNormal"><o:p>&nbsp;</o:p></p>
<p class=3D"MsoNormal" style=3D"margin-bottom:12.0pt">With this in mind, we=
 might want to change *all* of the _url parameters to _uri instead, not jus=
t this new one. Are folks in favor of this?<br>
<br>
&nbsp;-- Justin<o:p></o:p></p>
<div>
<p class=3D"MsoNormal">On 02/20/2013 12:57 PM, Mike Jones wrote:<o:p></o:p>=
</p>
</div>
<blockquote style=3D"margin-top:5.0pt;margin-bottom:5.0pt">
<p class=3D"MsoNormal"><span style=3D"font-size:11.0pt;font-family:&quot;Ca=
libri&quot;,&quot;sans-serif&quot;;color:#1F497D">OK, we should make the ch=
ange then.&nbsp; Thanks for the input.</span><o:p></o:p></p>
<p class=3D"MsoNormal"><span style=3D"font-size:11.0pt;font-family:&quot;Ca=
libri&quot;,&quot;sans-serif&quot;;color:#1F497D">&nbsp;</span><o:p></o:p><=
/p>
<p class=3D"MsoNormal"><span style=3D"font-size:11.0pt;font-family:&quot;Ca=
libri&quot;,&quot;sans-serif&quot;;color:#1F497D">&nbsp;&nbsp;&nbsp;&nbsp;&=
nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbs=
p;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&=
nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbs=
p;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&=
nbsp;&nbsp;&nbsp;&nbsp;&nbsp; -- Mike</span><o:p></o:p></p>
<p class=3D"MsoNormal"><span style=3D"font-size:11.0pt;font-family:&quot;Ca=
libri&quot;,&quot;sans-serif&quot;;color:#1F497D">&nbsp;</span><o:p></o:p><=
/p>
<p class=3D"MsoNormal"><b><span style=3D"font-size:10.0pt;font-family:&quot=
;Tahoma&quot;,&quot;sans-serif&quot;">From:</span></b><span style=3D"font-s=
ize:10.0pt;font-family:&quot;Tahoma&quot;,&quot;sans-serif&quot;"> Tim Bray=
 [<a href=3D"mailto:twbray@google.com">mailto:twbray@google.com</a>]
<br>
<b>Sent:</b> Wednesday, February 20, 2013 9:22 AM<br>
<b>To:</b> Mike Jones<br>
<b>Cc:</b> Nat Sakimura; <a href=3D"mailto:oauth@ietf.org">&lt;oauth@ietf.o=
rg&gt;</a><br>
<b>Subject:</b> Re: [OAUTH-WG] I-D Action: draft-ietf-oauth-dyn-reg-06.txt<=
/span><o:p></o:p></p>
<p class=3D"MsoNormal">&nbsp;<o:p></o:p></p>
<p class=3D"MsoNormal" style=3D"margin-bottom:12.0pt">Yes, &#8220;URL&#8221=
; is strongly and clearly deprecated in RFC3986 section 1.1.3; one of the r=
easons is that the distinction between &#8220;locator&#8221; and &#8220;ide=
ntifier&#8221; which sounds like it should be easy, turns out to lead to
 theological bikeshed discussions almost inevitably, and in fact be shaky i=
n practice. &nbsp;-T<o:p></o:p></p>
<div>
<p class=3D"MsoNormal">On Wed, Feb 20, 2013 at 9:00 AM, Mike Jones &lt;<a h=
ref=3D"mailto:Michael.Jones@microsoft.com" target=3D"_blank">Michael.Jones@=
microsoft.com</a>&gt; wrote:<o:p></o:p></p>
<div>
<div>
<p class=3D"MsoNormal" style=3D"mso-margin-top-alt:auto;mso-margin-bottom-a=
lt:auto"><span style=3D"font-size:11.0pt;font-family:&quot;Calibri&quot;,&q=
uot;sans-serif&quot;;color:#1F497D">Tim, as background, this came from the =
OpenID Connect specs, where we tried to consistently use the
 convention that the locator for any resource that can be retrieved from th=
e specified location be called a URL, whereas any identifier that may not b=
e retrievable is called a URI.&nbsp; That was done as an aid to developer u=
nderstanding of the specifications.</span><o:p></o:p></p>
<p class=3D"MsoNormal" style=3D"mso-margin-top-alt:auto;mso-margin-bottom-a=
lt:auto"><span style=3D"font-size:11.0pt;font-family:&quot;Calibri&quot;,&q=
uot;sans-serif&quot;;color:#1F497D">&nbsp;</span><o:p></o:p></p>
<p class=3D"MsoNormal" style=3D"mso-margin-top-alt:auto;mso-margin-bottom-a=
lt:auto"><span style=3D"font-size:11.0pt;font-family:&quot;Calibri&quot;,&q=
uot;sans-serif&quot;;color:#1F497D">If the use of &#8220;URL&#8221; is depr=
ecated by the IETF in favor of always just using &#8220;URI&#8221;, I suppo=
se we could
 change that, but if it&#8217;s going to change, it should be soon.</span><=
o:p></o:p></p>
<p class=3D"MsoNormal" style=3D"mso-margin-top-alt:auto;mso-margin-bottom-a=
lt:auto"><span style=3D"font-size:11.0pt;font-family:&quot;Calibri&quot;,&q=
uot;sans-serif&quot;;color:#1F497D">&nbsp;</span><o:p></o:p></p>
<p class=3D"MsoNormal" style=3D"mso-margin-top-alt:auto;mso-margin-bottom-a=
lt:auto"><span style=3D"font-size:11.0pt;font-family:&quot;Calibri&quot;,&q=
uot;sans-serif&quot;;color:#1F497D">&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nb=
sp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;=
&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nb=
sp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;=
&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nb=
sp;&nbsp;&nbsp; -- Mike</span><o:p></o:p></p>
<p class=3D"MsoNormal" style=3D"mso-margin-top-alt:auto;mso-margin-bottom-a=
lt:auto"><span style=3D"font-size:11.0pt;font-family:&quot;Calibri&quot;,&q=
uot;sans-serif&quot;;color:#1F497D">&nbsp;</span><o:p></o:p></p>
<p class=3D"MsoNormal" style=3D"mso-margin-top-alt:auto;mso-margin-bottom-a=
lt:auto"><span style=3D"font-size:11.0pt;font-family:&quot;Calibri&quot;,&q=
uot;sans-serif&quot;;color:#1F497D">&nbsp;</span><o:p></o:p></p>
<p class=3D"MsoNormal" style=3D"mso-margin-top-alt:auto;mso-margin-bottom-a=
lt:auto"><b><span style=3D"font-size:10.0pt;font-family:&quot;Tahoma&quot;,=
&quot;sans-serif&quot;">From:</span></b><span style=3D"font-size:10.0pt;fon=
t-family:&quot;Tahoma&quot;,&quot;sans-serif&quot;">
<a href=3D"mailto:oauth-bounces@ietf.org" target=3D"_blank">oauth-bounces@i=
etf.org</a> [mailto:<a href=3D"mailto:oauth-bounces@ietf.org" target=3D"_bl=
ank">oauth-bounces@ietf.org</a>]
<b>On Behalf Of </b>Nat Sakimura<br>
<b>Sent:</b> Wednesday, February 20, 2013 8:57 AM<br>
<b>To:</b> Tim Bray<br>
<b>Cc:</b> &lt;<a href=3D"mailto:oauth@ietf.org" target=3D"_blank">oauth@ie=
tf.org</a>&gt;<br>
<b>Subject:</b> Re: [OAUTH-WG] I-D Action: draft-ietf-oauth-dyn-reg-06.txt<=
/span><o:p></o:p></p>
<p class=3D"MsoNormal" style=3D"mso-margin-top-alt:auto;mso-margin-bottom-a=
lt:auto">&nbsp;<o:p></o:p></p>
<p class=3D"MsoNormal" style=3D"mso-margin-top-alt:auto;mso-margin-bottom-a=
lt:auto">You are right. I am in the camp recommending the use of URL when i=
t is a concrete endpoint and URI when it includes something that is only ab=
stract, but since OAuth standardized
 on &quot;uri&quot;, we may as well do so here.&nbsp;<o:p></o:p></p>
<div>
<p class=3D"MsoNormal" style=3D"mso-margin-top-alt:auto;mso-margin-bottom-a=
lt:auto">&nbsp;<o:p></o:p></p>
</div>
<div>
<p class=3D"MsoNormal" style=3D"mso-margin-top-alt:auto;margin-bottom:12.0p=
t">Nat<o:p></o:p></p>
<div>
<p class=3D"MsoNormal" style=3D"mso-margin-top-alt:auto;mso-margin-bottom-a=
lt:auto">2013/2/20 Tim Bray &lt;<a href=3D"mailto:twbray@google.com" target=
=3D"_blank">twbray@google.com</a>&gt;<o:p></o:p></p>
<p class=3D"MsoNormal" style=3D"mso-margin-top-alt:auto;mso-margin-bottom-a=
lt:auto">In OAuth, we have redirect_uri not redirect_url; should this be re=
gistration_access_uri for consistency? -T<o:p></o:p></p>
<div>
<div>
<p class=3D"MsoNormal" style=3D"mso-margin-top-alt:auto;margin-bottom:12.0p=
t">&nbsp;<o:p></o:p></p>
<div>
<p class=3D"MsoNormal" style=3D"mso-margin-top-alt:auto;mso-margin-bottom-a=
lt:auto">On Wed, Feb 20, 2013 at 8:23 AM, John Bradley &lt;<a href=3D"mailt=
o:ve7jtb@ve7jtb.com" target=3D"_blank">ve7jtb@ve7jtb.com</a>&gt; wrote:<o:p=
></o:p></p>
<div>
<p class=3D"MsoNormal" style=3D"mso-margin-top-alt:auto;mso-margin-bottom-a=
lt:auto">I think registration_access_url is OK. &nbsp; &nbsp;I haven't hear=
d any better names yet.<o:p></o:p></p>
<div>
<p class=3D"MsoNormal" style=3D"mso-margin-top-alt:auto;mso-margin-bottom-a=
lt:auto">&nbsp;<o:p></o:p></p>
</div>
<div>
<p class=3D"MsoNormal" style=3D"mso-margin-top-alt:auto;mso-margin-bottom-a=
lt:auto">John B.<o:p></o:p></p>
<div>
<div>
<p class=3D"MsoNormal" style=3D"mso-margin-top-alt:auto;mso-margin-bottom-a=
lt:auto">&nbsp;<o:p></o:p></p>
<div>
<div>
<p class=3D"MsoNormal" style=3D"mso-margin-top-alt:auto;mso-margin-bottom-a=
lt:auto">On 2013-02-20, at 1:04 PM, Mike Jones &lt;<a href=3D"mailto:Michae=
l.Jones@microsoft.com" target=3D"_blank">Michael.Jones@microsoft.com</a>&gt=
; wrote:<o:p></o:p></p>
</div>
<p class=3D"MsoNormal" style=3D"mso-margin-top-alt:auto;margin-bottom:12.0p=
t">&nbsp;<o:p></o:p></p>
<div>
<div>
<div>
<p class=3D"MsoNormal" style=3D"mso-margin-top-alt:auto;mso-margin-bottom-a=
lt:auto"><span style=3D"font-size:11.0pt;font-family:&quot;Calibri&quot;,&q=
uot;sans-serif&quot;;color:#1F497D">For what it&#8217;s worth, the name &#8=
220;registration_access_url&#8221; was chosen to be parallel to &#8220;regi=
stration_access_token&#8221;.&nbsp;&nbsp;
 It&#8217;s the place you use the access token.&nbsp; And it&#8217;s where =
you access an existing registration.&nbsp; I&#8217;m against the name &#822=
0;client_metadata_url&#8221; because it&#8217;s not metadata you&#8217;re a=
ccessing &#8211; it&#8217;s a registration you&#8217;re accessing.&nbsp; Fo=
r the same reason, I don&#8217;t think
 the name &#8220;client_info_url&#8221; gives people the right idea, becaus=
e it doesn&#8217;t say anything it being the registration that you&#8217;re=
 accessing.</span><o:p></o:p></p>
</div>
<div>
<p class=3D"MsoNormal" style=3D"mso-margin-top-alt:auto;mso-margin-bottom-a=
lt:auto"><span style=3D"font-size:11.0pt;font-family:&quot;Calibri&quot;,&q=
uot;sans-serif&quot;;color:#1F497D">&nbsp;</span><o:p></o:p></p>
</div>
<div>
<p class=3D"MsoNormal" style=3D"mso-margin-top-alt:auto;mso-margin-bottom-a=
lt:auto"><span style=3D"font-size:11.0pt;font-family:&quot;Calibri&quot;,&q=
uot;sans-serif&quot;;color:#1F497D">If you really want us to change this, h=
aving read what&#8217;s above, I could live with &#8220;client_registration=
_url&#8221;,
 but I don&#8217;t think a change is actually necessary.&nbsp; (But if we a=
re going to change it, let&#8217;s do it ASAP, before the OpenID Connect Im=
plementer&#8217;s Drafts are published.)</span><o:p></o:p></p>
</div>
<div>
<p class=3D"MsoNormal" style=3D"mso-margin-top-alt:auto;mso-margin-bottom-a=
lt:auto"><span style=3D"font-size:11.0pt;font-family:&quot;Calibri&quot;,&q=
uot;sans-serif&quot;;color:#1F497D">&nbsp;</span><o:p></o:p></p>
</div>
<div>
<p class=3D"MsoNormal" style=3D"mso-margin-top-alt:auto;mso-margin-bottom-a=
lt:auto"><span style=3D"font-size:11.0pt;font-family:&quot;Calibri&quot;,&q=
uot;sans-serif&quot;;color:#1F497D">&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nb=
sp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;=
&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nb=
sp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;=
&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nb=
sp;&nbsp;&nbsp; -- Mike</span><o:p></o:p></p>
</div>
<div>
<p class=3D"MsoNormal" style=3D"mso-margin-top-alt:auto;mso-margin-bottom-a=
lt:auto"><span style=3D"font-size:11.0pt;font-family:&quot;Calibri&quot;,&q=
uot;sans-serif&quot;;color:#1F497D">&nbsp;</span><o:p></o:p></p>
</div>
<div>
<p class=3D"MsoNormal" style=3D"mso-margin-top-alt:auto;mso-margin-bottom-a=
lt:auto"><b><span style=3D"font-size:10.0pt;font-family:&quot;Tahoma&quot;,=
&quot;sans-serif&quot;">From:</span></b><span style=3D"font-size:10.0pt;fon=
t-family:&quot;Tahoma&quot;,&quot;sans-serif&quot;">&nbsp;<a href=3D"mailto=
:oauth-bounces@ietf.org" target=3D"_blank">oauth-bounces@ietf.org</a>
 [mailto:<a href=3D"mailto:oauth-" target=3D"_blank">oauth-</a><a href=3D"m=
ailto:bounces@ietf.org" target=3D"_blank">bounces@ietf.org</a>]&nbsp;<b>On =
Behalf Of&nbsp;</b>Nat Sakimura<br>
<b>Sent:</b>&nbsp;Wednesday, February 20, 2013 7:58 AM<br>
<b>To:</b>&nbsp;&lt;<a href=3D"mailto:oauth@ietf.org" target=3D"_blank">oau=
th@ietf.org</a>&gt;; Richer, Justin P.; John Bradley<br>
<b>Subject:</b>&nbsp;Re: [OAUTH-WG] I-D Action: draft-ietf-oauth-dyn-reg-06=
.txt</span><o:p></o:p></p>
</div>
<div>
<p class=3D"MsoNormal" style=3D"mso-margin-top-alt:auto;mso-margin-bottom-a=
lt:auto">&nbsp;<o:p></o:p></p>
</div>
<div>
<p class=3D"MsoNormal" style=3D"mso-margin-top-alt:auto;mso-margin-bottom-a=
lt:auto"><span style=3D"font-size:13.5pt;font-family:&quot;Arial&quot;,&quo=
t;sans-serif&quot;;color:#222222">Thanks Justin.<br>
<br>
Even if we go flat rather than doing JSON Structure, the &quot;Client<br>
Registration Access Endpoint&quot; is not a good representative name.<br>
<br>
What it represents is the client metadata/info.<br>
It is not representing &quot;Client Registration Access&quot;.&nbsp;</span>=
<o:p></o:p></p>
</div>
<div>
<div>
<p class=3D"MsoNormal" style=3D"mso-margin-top-alt:auto;mso-margin-bottom-a=
lt:auto">What does &quot;Client Registration Access&quot; mean?&nbsp;<o:p><=
/o:p></p>
</div>
</div>
<div>
<p class=3D"MsoNormal" style=3D"mso-margin-top-alt:auto;margin-bottom:12.0p=
t"><span style=3D"font-size:13.5pt;font-family:&quot;Arial&quot;,&quot;sans=
-serif&quot;;color:#222222">Does UPDATing &quot;Cleint Registration Access&=
quot; make sense?</span><br>
<span style=3D"font-size:13.5pt;font-family:&quot;Arial&quot;,&quot;sans-se=
rif&quot;;color:#222222"><br>
Something in the line of &quot;Client Metadata Endpoint&quot; and<br>
something like &quot;client_metadata_url&quot; or&nbsp;&quot;client_info_ur=
l&quot; is much better.<br>
<br>
Nat</span><o:p></o:p></p>
<div>
<div>
<p class=3D"MsoNormal" style=3D"mso-margin-top-alt:auto;mso-margin-bottom-a=
lt:auto">2013/2/15 Richer, Justin P. &lt;<a href=3D"mailto:jricher@mitre.or=
g" target=3D"_blank"><span style=3D"color:purple">jricher@mitre.org</span><=
/a>&gt;<o:p></o:p></p>
</div>
<div>
<p class=3D"MsoNormal" style=3D"mso-margin-top-alt:auto;mso-margin-bottom-a=
lt:auto">Everyone, there's a new draft of DynReg up on the tracker. This dr=
aft tries to codify the discussions so far from this week into something we=
 can all read. There are still plenty
 of open discussion points and items up for debate. Please read through thi=
s latest draft and see what's changed and help assure that it properly capt=
ures the conversations. If you have any inputs for the marked [[ Editor's N=
ote ]] sections, please send them
 to the list by next Thursday to give me opportunity to get any necessary c=
hanges in by the cutoff date of Monday the 22nd.<br>
<br>
Thanks for all of your hard work everyone, I think this is *really* coming =
along now.<br>
<span style=3D"color:#888888"><br>
&nbsp;-- Justin</span><o:p></o:p></p>
</div>
<div>
<div>
<p class=3D"MsoNormal" style=3D"mso-margin-top-alt:auto;mso-margin-bottom-a=
lt:auto"><br>
On Feb 15, 2013, at 4:54 PM,&nbsp;<a href=3D"mailto:internet-drafts@ietf.or=
g" target=3D"_blank"><span style=3D"color:purple">internet-drafts@ietf.org<=
/span></a>&nbsp;wrote:<br>
<br>
&gt;<br>
&gt; A New Internet-Draft is available from the on-line Internet-Drafts dir=
ectories.<br>
&gt; This draft is a work item of the Web Authorization Protocol Working Gr=
oup of the IETF.<br>
&gt;<br>
&gt; &nbsp; &nbsp; &nbsp; Title &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; : OAuth =
Dynamic Client Registration Protocol<br>
&gt; &nbsp; &nbsp; &nbsp; Author(s) &nbsp; &nbsp; &nbsp; : Justin Richer<br=
>
&gt; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; =
&nbsp; &nbsp; &nbsp;John Bradley<br>
&gt; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; =
&nbsp; &nbsp; &nbsp;Michael B. Jones<br>
&gt; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; =
&nbsp; &nbsp; &nbsp;Maciej Machulak<br>
&gt; &nbsp; &nbsp; &nbsp; Filename &nbsp; &nbsp; &nbsp; &nbsp;: draft-ietf-=
oauth-dyn-reg-06.txt<br>
&gt; &nbsp; &nbsp; &nbsp; Pages &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; : 21<br>
&gt; &nbsp; &nbsp; &nbsp; Date &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp;: 2=
013-02-15<br>
&gt;<br>
&gt; Abstract:<br>
&gt; &nbsp; This specification defines an endpoint and protocol for dynamic=
<br>
&gt; &nbsp; registration of OAuth Clients at an Authorization Server.<br>
&gt;<br>
&gt;<br>
&gt; The IETF datatracker status page for this draft is:<br>
&gt;&nbsp;<a href=3D"https://datatracker.ietf.org/doc/draft-ietf-oauth-dyn-=
reg" target=3D"_blank"><span style=3D"color:purple">https://datatracker.iet=
f.org/doc/draft-ietf-oauth-dyn-reg</span></a><br>
&gt;<br>
&gt; There's also a htmlized version available at:<br>
&gt;&nbsp;<a href=3D"http://tools.ietf.org/html/draft-ietf-oauth-dyn-reg-06=
" target=3D"_blank"><span style=3D"color:purple">http://tools.ietf.org/html=
/draft-ietf-oauth-dyn-reg-06</span></a><br>
&gt;<br>
&gt; A diff from the previous version is available at:<br>
&gt;&nbsp;<a href=3D"http://www.ietf.org/rfcdiff?url2=3Ddraft-ietf-oauth-dy=
n-reg-06" target=3D"_blank"><span style=3D"color:purple">http://www.ietf.or=
g/rfcdiff?url2=3Ddraft-ietf-oauth-dyn-reg-06</span></a><br>
&gt;<br>
&gt;<br>
&gt; Internet-Drafts are also available by anonymous FTP at:<br>
&gt;&nbsp;<a href=3D"ftp://ftp.ietf.org/internet-drafts/" target=3D"_blank"=
><span style=3D"color:purple">ftp://ftp.ietf.org/internet-drafts/</span></a=
><br>
&gt;<br>
&gt; _______________________________________________<br>
&gt; OAuth mailing list<br>
&gt;&nbsp;<a href=3D"mailto:OAuth@ietf.org" target=3D"_blank"><span style=
=3D"color:purple">OAuth@ietf.org</span></a><br>
&gt;&nbsp;<a href=3D"https://www.ietf.org/mailman/listinfo/oauth" target=3D=
"_blank"><span style=3D"color:purple">https://www.ietf.org/mailman/listinfo=
/oauth</span></a><br>
<br>
_______________________________________________<br>
OAuth mailing list<br>
<a href=3D"mailto:OAuth@ietf.org" target=3D"_blank"><span style=3D"color:pu=
rple">OAuth@ietf.org</span></a><br>
<a href=3D"https://www.ietf.org/mailman/listinfo/oauth" target=3D"_blank"><=
span style=3D"color:purple">https://www.ietf.org/mailman/listinfo/oauth</sp=
an></a><o:p></o:p></p>
</div>
</div>
</div>
<div>
<p class=3D"MsoNormal" style=3D"mso-margin-top-alt:auto;mso-margin-bottom-a=
lt:auto"><br>
<br clear=3D"all">
<o:p></o:p></p>
</div>
<div>
<div>
<p class=3D"MsoNormal" style=3D"mso-margin-top-alt:auto;mso-margin-bottom-a=
lt:auto">&nbsp;<o:p></o:p></p>
</div>
</div>
<div>
<p class=3D"MsoNormal" style=3D"mso-margin-top-alt:auto;mso-margin-bottom-a=
lt:auto">--&nbsp;<br>
Nat Sakimura (=3Dnat)<o:p></o:p></p>
</div>
<div>
<div>
<p class=3D"MsoNormal" style=3D"mso-margin-top-alt:auto;mso-margin-bottom-a=
lt:auto">Chairman, OpenID Foundation<br>
<a href=3D"http://nat.sakimura.org/" target=3D"_blank"><span style=3D"color=
:purple">http://nat.sakimura.org/</span></a><br>
@_nat_en<o:p></o:p></p>
</div>
</div>
</div>
</div>
</div>
</div>
<p class=3D"MsoNormal" style=3D"mso-margin-top-alt:auto;mso-margin-bottom-a=
lt:auto">&nbsp;<o:p></o:p></p>
</div>
</div>
</div>
</div>
<p class=3D"MsoNormal" style=3D"mso-margin-top-alt:auto;margin-bottom:12.0p=
t"><br>
_______________________________________________<br>
OAuth mailing list<br>
<a href=3D"mailto:OAuth@ietf.org" target=3D"_blank">OAuth@ietf.org</a><br>
<a href=3D"https://www.ietf.org/mailman/listinfo/oauth" target=3D"_blank">h=
ttps://www.ietf.org/mailman/listinfo/oauth</a><o:p></o:p></p>
</div>
<p class=3D"MsoNormal" style=3D"mso-margin-top-alt:auto;mso-margin-bottom-a=
lt:auto">&nbsp;<o:p></o:p></p>
</div>
</div>
<p class=3D"MsoNormal" style=3D"mso-margin-top-alt:auto;margin-bottom:12.0p=
t"><br>
_______________________________________________<br>
OAuth mailing list<br>
<a href=3D"mailto:OAuth@ietf.org" target=3D"_blank">OAuth@ietf.org</a><br>
<a href=3D"https://www.ietf.org/mailman/listinfo/oauth" target=3D"_blank">h=
ttps://www.ietf.org/mailman/listinfo/oauth</a><o:p></o:p></p>
</div>
<p class=3D"MsoNormal" style=3D"mso-margin-top-alt:auto;mso-margin-bottom-a=
lt:auto"><span style=3D"color:#888888"><br>
<br clear=3D"all">
</span><o:p></o:p></p>
<div>
<p class=3D"MsoNormal" style=3D"mso-margin-top-alt:auto;mso-margin-bottom-a=
lt:auto"><span style=3D"color:#888888">&nbsp;</span><o:p></o:p></p>
</div>
<p class=3D"MsoNormal" style=3D"mso-margin-top-alt:auto;mso-margin-bottom-a=
lt:auto"><span style=3D"color:#888888">--
<br>
Nat Sakimura (=3Dnat)</span><o:p></o:p></p>
<div>
<p class=3D"MsoNormal" style=3D"mso-margin-top-alt:auto;mso-margin-bottom-a=
lt:auto"><span style=3D"color:#888888">Chairman, OpenID Foundation<br>
<a href=3D"http://nat.sakimura.org/" target=3D"_blank">http://nat.sakimura.=
org/</a><br>
@_nat_en</span><o:p></o:p></p>
</div>
</div>
</div>
</div>
</div>
<p class=3D"MsoNormal">&nbsp;<o:p></o:p></p>
<p class=3D"MsoNormal"><br>
<br>
<br>
<o:p></o:p></p>
<pre>_______________________________________________<o:p></o:p></pre>
<pre>OAuth mailing list<o:p></o:p></pre>
<pre><a href=3D"mailto:OAuth@ietf.org">OAuth@ietf.org</a><o:p></o:p></pre>
<pre><a href=3D"https://www.ietf.org/mailman/listinfo/oauth">https://www.ie=
tf.org/mailman/listinfo/oauth</a><o:p></o:p></pre>
</blockquote>
<p class=3D"MsoNormal"><o:p>&nbsp;</o:p></p>
</div>
</body>
</html>

--_000_4E1F6AAD24975D4BA5B1680429673943674800D6TK5EX14MBXC284r_--

From donald.coffin@reminetworks.com  Thu Feb 21 10:04:16 2013
Return-Path: <donald.coffin@reminetworks.com>
X-Original-To: oauth@ietfa.amsl.com
Delivered-To: oauth@ietfa.amsl.com
Received: from localhost (localhost [127.0.0.1]) by ietfa.amsl.com (Postfix) with ESMTP id 6424B21F8EBC for <oauth@ietfa.amsl.com>; Thu, 21 Feb 2013 10:04:16 -0800 (PST)
X-Virus-Scanned: amavisd-new at amsl.com
X-Spam-Flag: NO
X-Spam-Score: -2.074
X-Spam-Level: 
X-Spam-Status: No, score=-2.074 tagged_above=-999 required=5 tests=[AWL=0.190,  BAYES_00=-2.599, HTML_MESSAGE=0.001, IP_NOT_FRIENDLY=0.334]
Received: from mail.ietf.org ([64.170.98.30]) by localhost (ietfa.amsl.com [127.0.0.1]) (amavisd-new, port 10024) with ESMTP id fPO8eibAzZJn for <oauth@ietfa.amsl.com>; Thu, 21 Feb 2013 10:04:11 -0800 (PST)
Received: from oproxy13-pub.unifiedlayer.com (oproxy13-pub.unifiedlayer.com [69.89.16.30]) by ietfa.amsl.com (Postfix) with SMTP id B301D21F8EA1 for <oauth@ietf.org>; Thu, 21 Feb 2013 10:04:11 -0800 (PST)
Received: (qmail 3193 invoked by uid 0); 21 Feb 2013 18:03:50 -0000
Received: from unknown (HELO host125.hostmonster.com) (74.220.207.125) by oproxy13.unifiedlayer.com with SMTP; 21 Feb 2013 18:03:50 -0000
DKIM-Signature: v=1; a=rsa-sha256; q=dns/txt; c=relaxed/relaxed; d=reminetworks.com; s=default;  h=Content-Type:MIME-Version:Message-ID:Date:Subject:In-Reply-To:References:Cc:To:From; bh=kJA8bRhM2TVYEo7uahjOVulRUOp/PgTxJ/r/jtOjm1Q=;  b=IsH530CIrMYYxAwTpaC4GQzjaUb1255lFXwj68hETdzMfE89so4yy2KzdAFibYjzTXygzXbBKyPXYNSNKiy0XLyL6yWicswIFT9k9VAaz33i8HygyFtTg3JsctwUfe03;
Received: from [68.4.207.246] (port=3146 helo=HPPavilionElite) by host125.hostmonster.com with esmtpa (Exim 4.80) (envelope-from <donald.coffin@reminetworks.com>) id 1U8aUo-0001vC-25; Thu, 21 Feb 2013 11:03:50 -0700
From: "Donald F Coffin" <donald.coffin@reminetworks.com>
To: "'Justin Richer'" <jricher@mitre.org>
References: <013601ce0fc7$b2faea20$18f0be60$@reminetworks.com> <F4E5214A-76C0-468E-BFE5-6578ED22D2A3@lodderstedt.net> <004f01ce104a$097c79e0$1c756da0$@reminetworks.com> <512644F5.9090505@mitre.org> <006201ce104f$809df760$81d9e620$@reminetworks.com> <51264DEA.6080808@mitre.org>
In-Reply-To: <51264DEA.6080808@mitre.org>
Date: Thu, 21 Feb 2013 10:02:12 -0800
Message-ID: <008d01ce105d$935ef580$ba1ce080$@reminetworks.com>
MIME-Version: 1.0
Content-Type: multipart/alternative; boundary="----=_NextPart_000_008E_01CE101A.853FD430"
X-Mailer: Microsoft Outlook 14.0
Thread-Index: AQJjjcb25qbAdii4kOnGObWIAqRIYwHsW6RdAjUcDecCseN0aAINAa9SAZV6NViXBeGoAA==
Content-Language: en-us
X-Identified-User: {1395:host125.hostmonster.com:reminetw:reminetworks.com} {sentby:smtp auth 68.4.207.246 authed with donald.coffin@reminetworks.com}
Cc: 'John Adkins' <jva2@pge.com>, 'Marty Burns' <marty@hypertek.us>, 'Scott Crowder' <scott.crowder@qadoenergy.com>, 'Dave Robin' <drobin@automatedlogic.com>, 'John Teeter' <john.teeter@peoplepowerco.com>, pmadsen@pingidentity.com, 'Edward Denson' <ewd7@pge.com>, oauth@ietf.org, 'Jay Mitra' <jay@youtilities.com>, 'Ray Perlner' <ray.perlner@nist.gov>, 'Anne Hendry' <ahendry2@gmail.com>, 'Lynne Rodoni' <mrodoni@semprautilities.com>, 'Uday Verma' <uday.verma@ilinknet.com>
Subject: Re: [OAUTH-WG] draft-ietf-oauth-revocation-05 Questions
X-BeenThere: oauth@ietf.org
X-Mailman-Version: 2.1.12
Precedence: list
List-Id: OAUTH WG <oauth.ietf.org>
List-Unsubscribe: <https://www.ietf.org/mailman/options/oauth>, <mailto:oauth-request@ietf.org?subject=unsubscribe>
List-Archive: <http://www.ietf.org/mail-archive/web/oauth>
List-Post: <mailto:oauth@ietf.org>
List-Help: <mailto:oauth-request@ietf.org?subject=help>
List-Subscribe: <https://www.ietf.org/mailman/listinfo/oauth>, <mailto:oauth-request@ietf.org?subject=subscribe>
X-List-Received-Date: Thu, 21 Feb 2013 18:04:16 -0000

This is a multipart message in MIME format.

------=_NextPart_000_008E_01CE101A.853FD430
Content-Type: text/plain;
	charset="us-ascii"
Content-Transfer-Encoding: 7bit

Thanks for the clarification.

 

I was not envisioning the end-user directly referencing the token revocation
endpoint.  The question is how does the end-user know the client did in fact
revoke a token using the token revocation endpoint. 

 

Best regards,

Don

Donald F. Coffin

Founder/CTO

 

REMI Networks

22751 El Prado Suite 6216

Rancho Santa Margarita, CA  92688-3836

 

Phone:      (949) 636-8571

Email:        <mailto:donald.coffin@reminetworks.com>
donald.coffin@reminetworks.com

 

From: Justin Richer [mailto:jricher@mitre.org] 
Sent: Thursday, February 21, 2013 8:40 AM
To: Donald F Coffin
Cc: 'Torsten Lodderstedt'; 'John Adkins'; 'Marty Burns'; 'Scott Crowder';
'Dave Robin'; 'John Teeter'; pmadsen@pingidentity.com; 'Edward Denson'; 'Jay
Mitra'; 'Uday Verma'; 'Ray Perlner'; 'Anne Hendry'; 'Lynne Rodoni';
oauth@ietf.org
Subject: Re: [OAUTH-WG] draft-ietf-oauth-revocation-05 Questions

 

Yes, that's correct, the actions you've described and the "portal/UI"
components are of band as far as the OAuth 2 protocol is concerned. In fact,
you don't *have* to have anything of the sort, though many deployments and
implementations do have it in some fashion. 

To bring it back to the original question: the token revocation endpoint is
meant to service well-meaning clients who want to clean up any tokens they
have in the wild. It's not meant for something end-users or resource owners
would be dealing with directly. 

 -- Justin

On 02/21/2013 11:21 AM, Donald F Coffin wrote:

Justin,

 

My response was not meant to ask the UI of the "respective portal belonging
to the AS".  The question was where in the various OAuth 2.0 Authorization
Framework is such a portal even discussed?  Clearly if it is NOT discussed
in any existing OAuth 2.0 Authorization Framework RFC or existing draft,
then it must be an out-of-band customized implementation.

 

Best regards,

Don

Donald F. Coffin

Founder/CTO

 

REMI Networks

22751 El Prado Suite 6216

Rancho Santa Margarita, CA  92688-3836

 

Phone:      (949) 636-8571

Email:       donald.coffin@reminetworks.com

 

From: Justin Richer [mailto:jricher@mitre.org] 
Sent: Thursday, February 21, 2013 8:02 AM
To: Donald F Coffin
Cc: 'Torsten Lodderstedt'; 'John Adkins'; 'Marty Burns'; 'Scott Crowder';
'Dave Robin'; 'John Teeter'; pmadsen@pingidentity.com; 'Edward Denson'; 'Jay
Mitra'; 'Uday Verma'; 'Ray Perlner'; 'Anne Hendry'; 'Lynne Rodoni';
oauth@ietf.org
Subject: Re: [OAUTH-WG] draft-ietf-oauth-revocation-05 Questions

 

OAuth doesn't get into the business of what the UI for managing grants is
like. Having the user, admin, or resource owner revoke, downscope, or
otherwise alter a grant needs to happen with user interactions that are
going to be different depending on the provider and use case. 

 -- Justin

On 02/21/2013 10:42 AM, Donald F Coffin wrote:

Torsten,

 

Thanks for the response.  What is the "respective portal belonging to the
AS"?  I haven't seen anything in the OAuth 2.0 Authorization Framework that
describes a "portal" on the AS a Resource Owner can log into to view a valid
list of authorization grants.  Is this an out-of-band implementation
suggestion?

 

Best regards,

Don

Donald F. Coffin

Founder/CTO

 

REMI Networks

22751 El Prado Suite 6216

Rancho Santa Margarita, CA  92688-3836

 

Phone:      (949) 636-8571

Email:       donald.coffin@reminetworks.com

 

From: Torsten Lodderstedt [mailto:torsten@lodderstedt.net] 
Sent: Thursday, February 21, 2013 12:13 AM
To: Donald F Coffin
Cc:  <mailto:oauth@ietf.org> <oauth@ietf.org>; Anne Hendry; Dave Robin;
Edward Denson; Jay Mitra; John Adkins; John Teeter; Lynne Rodoni; Marty
Burns;  <mailto:pmadsen@pingidentity.com> <pmadsen@pingidentity.com>; Ray
Perlner; Scott Crowder; Uday Verma
Subject: Re: draft-ietf-oauth-revocation-05 Questions

 

Hi Donald,

 

thank you for sharing your thoughts with us. I've never seen revocation as
change of scope of the authorization, but it sounds reasonable. The current
design handles the issues you raised differently.

 

The AS is involved in the revocation process as it exposes the revocation
endpoint. So if the token is revoked (from a technical perspective), it
knows it. If the user wants to check whether the application really sent the
request, she is supposed to visit the respective portal belonging to the AS.
There the AS provides a list of all valid authorization grants in its
database. 

 

Does this address your issues?

 

regards,

Torsten.


Am 21.02.2013 um 01:09 schrieb "Donald F Coffin"
<donald.coffin@reminetworks.com>:

Torsten,

 

A colleague of mine and I were discussing what should occur when a Retail
Customer desires to change the existing authorized access of a Third Party.
During our discussion they asked "How does the Retail Customer know the
Third Party actually issued a Token revocation request?  Isn't there a
potential trust issue with the current design"? 

 

The current draft provides a Third Party mechanism that "allows a client to
invalidate its tokens if the end-user logs out, changes identity, or
uninstalls the respective application (sic)." While none of these fit the
situation we were discussing they do seem to be based on the assumption a
Third Party application will be a good citizen and stop using access tokens.
Unfortunately, none of the addressed situations require the participation of
a AS for completion, therefore the risk exists that a Retail Customer may
believe they have removed a Third Party application from accessing their
protected data, but in reality there does not seem to be a mechanism to
either force or verify the Third Party can no longer have access to the
protected data.

 

A possible modification to the current draft that would correct this
potential security risk, is to treat a Token revocation using a message flow
similar to the existing authorization_code response type.  A Retail Customer
requesting a change to the Third Party authorized access would be redirected
to an AS endpoint that would allow the Retail Customer to either terminate a
relationship completely or modify the existing Third Party access
authorization.  The successful response from the AS would indicate the Third
Party needs to remove the current Token from its Token store.  In the event
the Retail Customer has changed the Third Party access authorization, the AS
response could include an optional "scope" element, which the Third Party
would then use to obtain a new access token utilizing an Authorization Code
request.

 

There are several other potential implementations that could be developed to
protect a Retail Customer from a "rogue" Third Party application that does
not inform the AS their authorization to access a Retail Customer's
protected data has been revoked, but the above suggestion meets the current
draft's view that Third Parties should be able to request Tokens be revoked.

 

I look forward to your comments on the above topic.

 

 

Best regards,

Don

Donald F. Coffin

Founder/CTO

 

REMI Networks

22751 El Prado Suite 6216

Rancho Santa Margarita, CA  92688-3836

 

Phone:      (949) 636-8571

Email:       donald.coffin@reminetworks.com

 







_______________________________________________
OAuth mailing list
OAuth@ietf.org
https://www.ietf.org/mailman/listinfo/oauth

 

 


------=_NextPart_000_008E_01CE101A.853FD430
Content-Type: text/html;
	charset="us-ascii"
Content-Transfer-Encoding: quoted-printable

<html xmlns:v=3D"urn:schemas-microsoft-com:vml" =
xmlns:o=3D"urn:schemas-microsoft-com:office:office" =
xmlns:w=3D"urn:schemas-microsoft-com:office:word" =
xmlns:m=3D"http://schemas.microsoft.com/office/2004/12/omml" =
xmlns=3D"http://www.w3.org/TR/REC-html40"><head><meta =
http-equiv=3DContent-Type content=3D"text/html; =
charset=3Dus-ascii"><meta name=3DGenerator content=3D"Microsoft Word 14 =
(filtered medium)"><style><!--
/* Font Definitions */
@font-face
	{font-family:"Cambria Math";
	panose-1:2 4 5 3 5 4 6 3 2 4;}
@font-face
	{font-family:Cambria;
	panose-1:2 4 5 3 5 4 6 3 2 4;}
@font-face
	{font-family:Calibri;
	panose-1:2 15 5 2 2 2 4 3 2 4;}
@font-face
	{font-family:Tahoma;
	panose-1:2 11 6 4 3 5 4 4 2 4;}
@font-face
	{font-family:"Brush Script MT";
	panose-1:3 6 8 2 4 4 6 7 3 4;}
@font-face
	{font-family:Consolas;
	panose-1:2 11 6 9 2 2 4 3 2 4;}
@font-face
	{font-family:"Brush Script MT \, serif";
	panose-1:0 0 0 0 0 0 0 0 0 0;}
@font-face
	{font-family:"Times New Roman \, serif";
	panose-1:0 0 0 0 0 0 0 0 0 0;}
/* Style Definitions */
p.MsoNormal, li.MsoNormal, div.MsoNormal
	{margin:0in;
	margin-bottom:.0001pt;
	font-size:11.0pt;
	font-family:"Calibri","sans-serif";
	color:black;}
a:link, span.MsoHyperlink
	{mso-style-priority:99;
	color:blue;
	text-decoration:underline;}
a:visited, span.MsoHyperlinkFollowed
	{mso-style-priority:99;
	color:purple;
	text-decoration:underline;}
pre
	{mso-style-priority:99;
	mso-style-link:"HTML Preformatted Char";
	margin:0in;
	margin-bottom:.0001pt;
	font-size:10.0pt;
	font-family:"Courier New";
	color:black;}
p.MsoAcetate, li.MsoAcetate, div.MsoAcetate
	{mso-style-priority:99;
	mso-style-link:"Balloon Text Char";
	margin:0in;
	margin-bottom:.0001pt;
	font-size:8.0pt;
	font-family:"Tahoma","sans-serif";
	color:black;}
span.HTMLPreformattedChar
	{mso-style-name:"HTML Preformatted Char";
	mso-style-priority:99;
	mso-style-link:"HTML Preformatted";
	font-family:Consolas;
	color:black;}
span.BalloonTextChar
	{mso-style-name:"Balloon Text Char";
	mso-style-priority:99;
	mso-style-link:"Balloon Text";
	font-family:"Tahoma","sans-serif";
	color:black;}
span.EmailStyle21
	{mso-style-type:personal;
	font-family:"Cambria","serif";
	color:windowtext;}
span.EmailStyle22
	{mso-style-type:personal;
	font-family:"Cambria","serif";
	color:windowtext;
	font-weight:normal;
	font-style:normal;}
span.EmailStyle23
	{mso-style-type:personal;
	font-family:"Cambria","serif";
	color:windowtext;
	font-weight:normal;
	font-style:normal;}
span.EmailStyle24
	{mso-style-type:personal-reply;
	font-family:"Cambria","serif";
	color:windowtext;
	font-weight:normal;
	font-style:normal;}
.MsoChpDefault
	{mso-style-type:export-only;
	font-size:10.0pt;}
@page WordSection1
	{size:8.5in 11.0in;
	margin:1.0in 1.0in 1.0in 1.0in;}
div.WordSection1
	{page:WordSection1;}
--></style><!--[if gte mso 9]><xml>
<o:shapedefaults v:ext=3D"edit" spidmax=3D"1026" />
</xml><![endif]--><!--[if gte mso 9]><xml>
<o:shapelayout v:ext=3D"edit">
<o:idmap v:ext=3D"edit" data=3D"1" />
</o:shapelayout></xml><![endif]--></head><body bgcolor=3Dwhite =
lang=3DEN-US link=3Dblue vlink=3Dpurple><div class=3DWordSection1><p =
class=3DMsoNormal><span =
style=3D'font-size:12.0pt;font-family:"Cambria","serif";color:windowtext'=
>Thanks for the clarification.<o:p></o:p></span></p><p =
class=3DMsoNormal><span =
style=3D'font-size:12.0pt;font-family:"Cambria","serif";color:windowtext'=
><o:p>&nbsp;</o:p></span></p><p class=3DMsoNormal><span =
style=3D'font-size:12.0pt;font-family:"Cambria","serif";color:windowtext'=
>I was not envisioning the end-user directly referencing the token =
revocation endpoint.&nbsp; The question is how does the end-user know =
the client did in fact revoke a token using the token revocation =
endpoint. <o:p></o:p></span></p><p class=3DMsoNormal><span =
style=3D'font-size:12.0pt;font-family:"Cambria","serif";color:windowtext'=
><o:p>&nbsp;</o:p></span></p><div><p class=3DMsoNormal><span =
style=3D'font-size:12.0pt;color:windowtext'>Best =
regards,<o:p></o:p></span></p><p class=3DMsoNormal><span =
style=3D'font-size:24.0pt;font-family:"Brush Script =
MT";color:windowtext'>Don<o:p></o:p></span></p><p =
class=3DMsoNormal><span =
style=3D'font-size:12.0pt;color:windowtext'>Donald F. =
Coffin<o:p></o:p></span></p><p class=3DMsoNormal><span =
style=3D'font-size:12.0pt;color:windowtext'>Founder/CTO<o:p></o:p></span>=
</p><p class=3DMsoNormal><span =
style=3D'font-size:12.0pt;color:windowtext'><o:p>&nbsp;</o:p></span></p><=
p class=3DMsoNormal><span =
style=3D'font-size:12.0pt;color:windowtext'>REMI =
Networks<o:p></o:p></span></p><p class=3DMsoNormal><span =
style=3D'font-size:12.0pt;color:windowtext'>22751 El Prado Suite =
6216<o:p></o:p></span></p><p class=3DMsoNormal><span =
style=3D'font-size:12.0pt;color:windowtext'>Rancho Santa Margarita, =
CA&nbsp; 92688-3836<o:p></o:p></span></p><p class=3DMsoNormal><span =
style=3D'font-size:12.0pt;color:windowtext'><o:p>&nbsp;</o:p></span></p><=
p class=3DMsoNormal><span =
style=3D'font-size:12.0pt;color:windowtext'>Phone:&nbsp;&nbsp;&nbsp;&nbsp=
;&nbsp; (949) 636-8571<o:p></o:p></span></p><p class=3DMsoNormal><span =
style=3D'font-size:12.0pt;color:windowtext'>Email:&nbsp;&nbsp;&nbsp;&nbsp=
;&nbsp;&nbsp; <a href=3D"mailto:donald.coffin@reminetworks.com"><span =
style=3D'color:blue'>donald.coffin@reminetworks.com</span></a><o:p></o:p>=
</span></p></div><p class=3DMsoNormal><span =
style=3D'font-size:12.0pt;font-family:"Cambria","serif";color:windowtext'=
><o:p>&nbsp;</o:p></span></p><div><div =
style=3D'border:none;border-top:solid #B5C4DF 1.0pt;padding:3.0pt 0in =
0in 0in'><p class=3DMsoNormal><b><span =
style=3D'font-size:10.0pt;font-family:"Tahoma","sans-serif";color:windowt=
ext'>From:</span></b><span =
style=3D'font-size:10.0pt;font-family:"Tahoma","sans-serif";color:windowt=
ext'> Justin Richer [mailto:jricher@mitre.org] <br><b>Sent:</b> =
Thursday, February 21, 2013 8:40 AM<br><b>To:</b> Donald F =
Coffin<br><b>Cc:</b> 'Torsten Lodderstedt'; 'John Adkins'; 'Marty =
Burns'; 'Scott Crowder'; 'Dave Robin'; 'John Teeter'; =
pmadsen@pingidentity.com; 'Edward Denson'; 'Jay Mitra'; 'Uday Verma'; =
'Ray Perlner'; 'Anne Hendry'; 'Lynne Rodoni'; =
oauth@ietf.org<br><b>Subject:</b> Re: [OAUTH-WG] =
draft-ietf-oauth-revocation-05 =
Questions<o:p></o:p></span></p></div></div><p =
class=3DMsoNormal><o:p>&nbsp;</o:p></p><p class=3DMsoNormal =
style=3D'margin-bottom:12.0pt'>Yes, that's correct, the actions you've =
described and the &quot;portal/UI&quot; components are of band as far as =
the OAuth 2 protocol is concerned. In fact, you don't *have* to have =
anything of the sort, though many deployments and implementations do =
have it in some fashion. <br><br>To bring it back to the original =
question: the token revocation endpoint is meant to service well-meaning =
clients who want to clean up any tokens they have in the wild. It's not =
meant for something end-users or resource owners would be dealing with =
directly. <br><br>&nbsp;-- Justin<o:p></o:p></p><div><p =
class=3DMsoNormal>On 02/21/2013 11:21 AM, Donald F Coffin =
wrote:<o:p></o:p></p></div><blockquote =
style=3D'margin-top:5.0pt;margin-bottom:5.0pt'><p =
class=3DMsoNormal><span =
style=3D'font-size:12.0pt;font-family:"Cambria","serif";color:windowtext'=
>Justin,</span><o:p></o:p></p><p class=3DMsoNormal><span =
style=3D'font-size:12.0pt;font-family:"Cambria","serif";color:windowtext'=
>&nbsp;</span><o:p></o:p></p><p class=3DMsoNormal><span =
style=3D'font-size:12.0pt;font-family:"Cambria","serif";color:windowtext'=
>My response was not meant to ask the UI of the &#8220;respective portal =
belonging to the AS&#8221;.&nbsp; The question was where in the various =
OAuth 2.0 Authorization Framework is such a portal even discussed?&nbsp; =
Clearly if it is NOT discussed in any existing OAuth 2.0 Authorization =
Framework RFC or existing draft, then it must be an out-of-band =
customized implementation.</span><o:p></o:p></p><p =
class=3DMsoNormal><span =
style=3D'font-size:12.0pt;font-family:"Cambria","serif";color:windowtext'=
>&nbsp;</span><o:p></o:p></p><div><p class=3DMsoNormal><span =
style=3D'font-size:12.0pt;color:windowtext'>Best =
regards,</span><o:p></o:p></p><p class=3DMsoNormal><span =
style=3D'font-size:24.0pt'>Don</span><o:p></o:p></p><p =
class=3DMsoNormal><span =
style=3D'font-size:12.0pt;color:windowtext'>Donald F. =
Coffin</span><o:p></o:p></p><p class=3DMsoNormal><span =
style=3D'font-size:12.0pt;color:windowtext'>Founder/CTO</span><o:p></o:p>=
</p><p class=3DMsoNormal><span =
style=3D'font-size:12.0pt;color:windowtext'>&nbsp;</span><o:p></o:p></p><=
p class=3DMsoNormal><span =
style=3D'font-size:12.0pt;color:windowtext'>REMI =
Networks</span><o:p></o:p></p><p class=3DMsoNormal><span =
style=3D'font-size:12.0pt;color:windowtext'>22751 El Prado Suite =
6216</span><o:p></o:p></p><p class=3DMsoNormal><span =
style=3D'font-size:12.0pt;color:windowtext'>Rancho Santa Margarita, =
CA&nbsp; 92688-3836</span><o:p></o:p></p><p class=3DMsoNormal><span =
style=3D'font-size:12.0pt;color:windowtext'>&nbsp;</span><o:p></o:p></p><=
p class=3DMsoNormal><span =
style=3D'font-size:12.0pt;color:windowtext'>Phone:&nbsp;&nbsp;&nbsp;&nbsp=
;&nbsp; (949) 636-8571</span><o:p></o:p></p><p class=3DMsoNormal><span =
style=3D'font-size:12.0pt;color:windowtext'>Email:&nbsp;&nbsp;&nbsp;&nbsp=
;&nbsp;&nbsp; <a =
href=3D"mailto:donald.coffin@reminetworks.com">donald.coffin@reminetworks=
.com</a></span><o:p></o:p></p></div><p class=3DMsoNormal><span =
style=3D'font-size:12.0pt;font-family:"Cambria","serif";color:windowtext'=
>&nbsp;</span><o:p></o:p></p><div><div =
style=3D'border:none;border-top:solid #B5C4DF 1.0pt;padding:3.0pt 0in =
0in 0in'><p class=3DMsoNormal><b><span =
style=3D'font-size:10.0pt;font-family:"Tahoma","sans-serif";color:windowt=
ext'>From:</span></b><span =
style=3D'font-size:10.0pt;font-family:"Tahoma","sans-serif";color:windowt=
ext'> Justin Richer [<a =
href=3D"mailto:jricher@mitre.org">mailto:jricher@mitre.org</a>] =
<br><b>Sent:</b> Thursday, February 21, 2013 8:02 AM<br><b>To:</b> =
Donald F Coffin<br><b>Cc:</b> 'Torsten Lodderstedt'; 'John Adkins'; =
'Marty Burns'; 'Scott Crowder'; 'Dave Robin'; 'John Teeter'; <a =
href=3D"mailto:pmadsen@pingidentity.com">pmadsen@pingidentity.com</a>; =
'Edward Denson'; 'Jay Mitra'; 'Uday Verma'; 'Ray Perlner'; 'Anne =
Hendry'; 'Lynne Rodoni'; <a =
href=3D"mailto:oauth@ietf.org">oauth@ietf.org</a><br><b>Subject:</b> Re: =
[OAUTH-WG] draft-ietf-oauth-revocation-05 =
Questions</span><o:p></o:p></p></div></div><p =
class=3DMsoNormal>&nbsp;<o:p></o:p></p><p class=3DMsoNormal =
style=3D'margin-bottom:12.0pt'>OAuth doesn't get into the business of =
what the UI for managing grants is like. Having the user, admin, or =
resource owner revoke, downscope, or otherwise alter a grant needs to =
happen with user interactions that are going to be different depending =
on the provider and use case. <br><br>&nbsp;-- =
Justin<o:p></o:p></p><div><p class=3DMsoNormal>On 02/21/2013 10:42 AM, =
Donald F Coffin wrote:<o:p></o:p></p></div><blockquote =
style=3D'margin-top:5.0pt;margin-bottom:5.0pt'><p =
class=3DMsoNormal><span =
style=3D'font-size:12.0pt;font-family:"Cambria","serif"'>Torsten,</span><=
o:p></o:p></p><p class=3DMsoNormal><span =
style=3D'font-size:12.0pt;font-family:"Cambria","serif"'>&nbsp;</span><o:=
p></o:p></p><p class=3DMsoNormal><span =
style=3D'font-size:12.0pt;font-family:"Cambria","serif"'>Thanks for the =
response.&nbsp; What is the &#8220;respective portal belonging to the =
AS&#8221;?&nbsp; I haven&#8217;t seen anything in the OAuth 2.0 =
Authorization Framework that describes a &#8220;portal&#8221; on the AS =
a Resource Owner can log into to view a valid list of authorization =
grants.&nbsp; Is this an out-of-band implementation =
suggestion?</span><o:p></o:p></p><p class=3DMsoNormal><span =
style=3D'font-size:12.0pt;font-family:"Cambria","serif"'>&nbsp;</span><o:=
p></o:p></p><div><p class=3DMsoNormal><span =
style=3D'font-size:12.0pt'>Best regards,</span><o:p></o:p></p><p =
class=3DMsoNormal><span style=3D'font-size:24.0pt;font-family:"Brush =
Script MT , serif","serif"'>Don</span><o:p></o:p></p><p =
class=3DMsoNormal><span style=3D'font-size:12.0pt'>Donald F. =
Coffin</span><o:p></o:p></p><p class=3DMsoNormal><span =
style=3D'font-size:12.0pt'>Founder/CTO</span><o:p></o:p></p><p =
class=3DMsoNormal><span =
style=3D'font-size:12.0pt'>&nbsp;</span><o:p></o:p></p><p =
class=3DMsoNormal><span style=3D'font-size:12.0pt'>REMI =
Networks</span><o:p></o:p></p><p class=3DMsoNormal><span =
style=3D'font-size:12.0pt'>22751 El Prado Suite =
6216</span><o:p></o:p></p><p class=3DMsoNormal><span =
style=3D'font-size:12.0pt'>Rancho Santa Margarita, CA&nbsp; =
92688-3836</span><o:p></o:p></p><p class=3DMsoNormal><span =
style=3D'font-size:12.0pt'>&nbsp;</span><o:p></o:p></p><p =
class=3DMsoNormal><span =
style=3D'font-size:12.0pt'>Phone:&nbsp;&nbsp;&nbsp;&nbsp;&nbsp; (949) =
636-8571</span><o:p></o:p></p><p class=3DMsoNormal><span =
style=3D'font-size:12.0pt'>Email:&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp; <a =
href=3D"mailto:donald.coffin@reminetworks.com">donald.coffin@reminetworks=
.com</a></span><o:p></o:p></p></div><p class=3DMsoNormal><span =
style=3D'font-size:12.0pt;font-family:"Cambria","serif"'>&nbsp;</span><o:=
p></o:p></p><div><div style=3D'border:none;border-top:solid #B5C4DF =
1.0pt;padding:3.0pt 0in 0in 0in'><p class=3DMsoNormal><b><span =
style=3D'font-size:10.0pt;font-family:"Tahoma","sans-serif"'>From:</span>=
</b><span style=3D'font-size:10.0pt;font-family:"Tahoma","sans-serif"'> =
Torsten Lodderstedt [<a =
href=3D"mailto:torsten@lodderstedt.net">mailto:torsten@lodderstedt.net</a=
>] <br><b>Sent:</b> Thursday, February 21, 2013 12:13 AM<br><b>To:</b> =
Donald F Coffin<br><b>Cc:</b> <a =
href=3D"mailto:oauth@ietf.org">&lt;oauth@ietf.org&gt;</a>; Anne Hendry; =
Dave Robin; Edward Denson; Jay Mitra; John Adkins; John Teeter; Lynne =
Rodoni; Marty Burns; <a =
href=3D"mailto:pmadsen@pingidentity.com">&lt;pmadsen@pingidentity.com&gt;=
</a>; Ray Perlner; Scott Crowder; Uday Verma<br><b>Subject:</b> Re: =
draft-ietf-oauth-revocation-05 =
Questions</span><o:p></o:p></p></div></div><p =
class=3DMsoNormal>&nbsp;<o:p></o:p></p><div><p class=3DMsoNormal>Hi =
Donald,<o:p></o:p></p></div><div><p =
class=3DMsoNormal>&nbsp;<o:p></o:p></p></div><div><p =
class=3DMsoNormal>thank you for sharing your thoughts with us. I've =
never seen revocation as change of scope of the authorization, but it =
sounds reasonable. The current design handles the issues you raised =
differently.<o:p></o:p></p></div><div><p =
class=3DMsoNormal>&nbsp;<o:p></o:p></p></div><div><p =
class=3DMsoNormal>The AS is involved in the revocation process as it =
exposes the revocation endpoint. So if the token is revoked (from a =
technical perspective), it knows it. If the user wants to check whether =
the application really sent the request, she is supposed to visit the =
respective portal belonging to the AS. There the AS provides a list of =
all valid authorization grants in its =
database.&nbsp;<o:p></o:p></p></div><div><p =
class=3DMsoNormal>&nbsp;<o:p></o:p></p></div><div><p =
class=3DMsoNormal>Does this address your =
issues?<o:p></o:p></p></div><div><p =
class=3DMsoNormal>&nbsp;<o:p></o:p></p></div><div><p =
class=3DMsoNormal>regards,<o:p></o:p></p></div><div><p =
class=3DMsoNormal>Torsten.<o:p></o:p></p></div><div><p class=3DMsoNormal =
style=3D'margin-bottom:12.0pt'><br>Am 21.02.2013 um 01:09 schrieb =
&quot;Donald F Coffin&quot; &lt;<a =
href=3D"mailto:donald.coffin@reminetworks.com">donald.coffin@reminetworks=
.com</a>&gt;:<o:p></o:p></p></div><blockquote =
style=3D'margin-top:5.0pt;margin-bottom:5.0pt'><div><p =
class=3DMsoNormal><span =
style=3D'font-size:12.0pt;font-family:"Cambria","serif"'>Torsten,</span><=
o:p></o:p></p><p class=3DMsoNormal><span =
style=3D'font-size:12.0pt;font-family:"Cambria","serif"'>&nbsp;</span><o:=
p></o:p></p><p class=3DMsoNormal><span =
style=3D'font-size:12.0pt;font-family:"Cambria","serif"'>A colleague of =
mine and I were discussing what should occur when a Retail Customer =
desires to change the existing authorized access of a Third Party.&nbsp; =
During our discussion they asked &#8220;How does the Retail Customer =
know the Third Party actually issued a Token revocation request?&nbsp; =
Isn&#8217;t there a potential trust issue with the current =
design&#8221;? </span><o:p></o:p></p><p class=3DMsoNormal><span =
style=3D'font-size:12.0pt;font-family:"Cambria","serif"'>&nbsp;</span><o:=
p></o:p></p><p class=3DMsoNormal><span =
style=3D'font-size:12.0pt;font-family:"Cambria","serif"'>The current =
draft provides a Third Party mechanism that &#8220;allows a client to =
invalidate its tokens if the end-user logs out, changes identity, or =
uninstalls the respective application (sic).&#8221; While none of these =
fit the situation we were discussing they do seem to be based on the =
assumption a Third Party application will be a good citizen and stop =
using access tokens.&nbsp; Unfortunately, none of the addressed =
situations require the participation of a AS for completion, therefore =
the risk exists that a Retail Customer may believe they have removed a =
Third Party application from accessing their protected data, but in =
reality there does not seem to be a mechanism to either force or verify =
the Third Party can no longer have access to the protected =
data.</span><o:p></o:p></p><p class=3DMsoNormal><span =
style=3D'font-size:12.0pt;font-family:"Cambria","serif"'>&nbsp;</span><o:=
p></o:p></p><p class=3DMsoNormal><span =
style=3D'font-size:12.0pt;font-family:"Cambria","serif"'>A possible =
modification to the current draft that would correct this potential =
security risk, is to treat a Token revocation using a message flow =
similar to the existing authorization_code response type.&nbsp; A Retail =
Customer requesting a change to the Third Party authorized access would =
be redirected to an AS endpoint that would allow the Retail Customer to =
either terminate a relationship completely or modify the existing Third =
Party access authorization.&nbsp; The successful response from the AS =
would indicate the Third Party needs to remove the current Token from =
its Token store.&nbsp; In the event the Retail Customer has changed the =
Third Party access authorization, the AS response could include an =
optional &#8220;scope&#8221; element, which the Third Party would then =
use to obtain a new access token utilizing an Authorization Code =
request.</span><o:p></o:p></p><p class=3DMsoNormal><span =
style=3D'font-size:12.0pt;font-family:"Cambria","serif"'>&nbsp;</span><o:=
p></o:p></p><p class=3DMsoNormal><span =
style=3D'font-size:12.0pt;font-family:"Cambria","serif"'>There are =
several other potential implementations that could be developed to =
protect a Retail Customer from a &#8220;rogue&#8221; Third Party =
application that does not inform the AS their authorization to access a =
Retail Customer&#8217;s protected data has been revoked, but the above =
suggestion meets the current draft&#8217;s view that Third Parties =
should be able to request Tokens be revoked.</span><o:p></o:p></p><p =
class=3DMsoNormal><span =
style=3D'font-size:12.0pt;font-family:"Cambria","serif"'>&nbsp;</span><o:=
p></o:p></p><p class=3DMsoNormal><span =
style=3D'font-size:12.0pt;font-family:"Cambria","serif"'>I look forward =
to your comments on the above topic.</span><o:p></o:p></p><p =
class=3DMsoNormal><span =
style=3D'font-size:12.0pt;font-family:"Cambria","serif"'>&nbsp;</span><o:=
p></o:p></p><p class=3DMsoNormal><span =
style=3D'font-size:12.0pt;font-family:"Cambria","serif"'>&nbsp;</span><o:=
p></o:p></p><p class=3DMsoNormal><span style=3D'font-size:12.0pt'>Best =
regards,</span><o:p></o:p></p><p class=3DMsoNormal><span =
style=3D'font-size:24.0pt;font-family:"Brush Script MT , =
serif","serif"'>Don</span><o:p></o:p></p><p class=3DMsoNormal><span =
style=3D'font-size:12.0pt'>Donald F. Coffin</span><o:p></o:p></p><p =
class=3DMsoNormal><span =
style=3D'font-size:12.0pt'>Founder/CTO</span><o:p></o:p></p><p =
class=3DMsoNormal><span =
style=3D'font-size:12.0pt'>&nbsp;</span><o:p></o:p></p><p =
class=3DMsoNormal><span style=3D'font-size:12.0pt'>REMI =
Networks</span><o:p></o:p></p><p class=3DMsoNormal><span =
style=3D'font-size:12.0pt'>22751 El Prado Suite =
6216</span><o:p></o:p></p><p class=3DMsoNormal><span =
style=3D'font-size:12.0pt'>Rancho Santa Margarita, CA&nbsp; =
92688-3836</span><o:p></o:p></p><p class=3DMsoNormal><span =
style=3D'font-size:12.0pt'>&nbsp;</span><o:p></o:p></p><p =
class=3DMsoNormal><span =
style=3D'font-size:12.0pt'>Phone:&nbsp;&nbsp;&nbsp;&nbsp;&nbsp; (949) =
636-8571</span><o:p></o:p></p><p class=3DMsoNormal><span =
style=3D'font-size:12.0pt'>Email:&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp; <a =
href=3D"mailto:donald.coffin@reminetworks.com">donald.coffin@reminetworks=
.com</a></span><o:p></o:p></p><p =
class=3DMsoNormal>&nbsp;<o:p></o:p></p></div></blockquote><p =
class=3DMsoNormal><span style=3D'font-size:12.0pt;font-family:"Times New =
Roman , =
serif","serif"'><br><br><br><br></span><o:p></o:p></p><pre>______________=
_________________________________<o:p></o:p></pre><pre>OAuth mailing =
list<o:p></o:p></pre><pre><a =
href=3D"mailto:OAuth@ietf.org">OAuth@ietf.org</a><o:p></o:p></pre><pre><a=
 =
href=3D"https://www.ietf.org/mailman/listinfo/oauth">https://www.ietf.org=
/mailman/listinfo/oauth</a><o:p></o:p></pre></blockquote><p =
class=3DMsoNormal><span style=3D'font-size:12.0pt;font-family:"Times New =
Roman , serif","serif"'>&nbsp;</span><o:p></o:p></p></blockquote><p =
class=3DMsoNormal><span style=3D'font-size:12.0pt;font-family:"Times New =
Roman","serif"'><o:p>&nbsp;</o:p></span></p></div></body></html>
------=_NextPart_000_008E_01CE101A.853FD430--


From bcampbell@pingidentity.com  Thu Feb 21 10:31:12 2013
Return-Path: <bcampbell@pingidentity.com>
X-Original-To: oauth@ietfa.amsl.com
Delivered-To: oauth@ietfa.amsl.com
Received: from localhost (localhost [127.0.0.1]) by ietfa.amsl.com (Postfix) with ESMTP id E16F221F8F41 for <oauth@ietfa.amsl.com>; Thu, 21 Feb 2013 10:31:12 -0800 (PST)
X-Virus-Scanned: amavisd-new at amsl.com
X-Spam-Flag: NO
X-Spam-Score: -5.121
X-Spam-Level: 
X-Spam-Status: No, score=-5.121 tagged_above=-999 required=5 tests=[AWL=-0.811, BAYES_00=-2.599, FM_FORGED_GMAIL=0.622, HTML_MESSAGE=0.001, RCVD_IN_DNSWL_MED=-4, SARE_HTML_USL_OBFU=1.666]
Received: from mail.ietf.org ([64.170.98.30]) by localhost (ietfa.amsl.com [127.0.0.1]) (amavisd-new, port 10024) with ESMTP id Q2w-yoPPj-UN for <oauth@ietfa.amsl.com>; Thu, 21 Feb 2013 10:31:12 -0800 (PST)
Received: from na3sys009aog115.obsmtp.com (na3sys009aog115.obsmtp.com [74.125.149.238]) by ietfa.amsl.com (Postfix) with ESMTP id B2C0B21F8F31 for <oauth@ietf.org>; Thu, 21 Feb 2013 10:31:11 -0800 (PST)
Received: from mail-ob0-f200.google.com ([209.85.214.200]) (using TLSv1) by na3sys009aob115.postini.com ([74.125.148.12]) with SMTP ID DSNKUSZn72qGhMI1g79ynuYy3VM1cTtp1DzT@postini.com; Thu, 21 Feb 2013 10:31:11 PST
Received: by mail-ob0-f200.google.com with SMTP id un3so45949329obb.3 for <oauth@ietf.org>; Thu, 21 Feb 2013 10:31:10 -0800 (PST)
X-Google-DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=google.com; s=20120113; h=x-received:x-received:mime-version:in-reply-to:references:from:date :message-id:subject:to:cc:content-type:x-gm-message-state; bh=mEDHTO+trjoDRLuF707RsJei3EknRs1hIeP77KF1O8w=; b=oo0MxNEbRjAYf/BV3x6zRqQYX3fKvX2TIInahUDBBvWJP4GfVx96yppf3UUkzYWom2 hleTTMRg+fJn0euWFzGcooz4QCuSHXUeX6fvLqaZAWNjfB3/QFfVGnOpNsaqaT8WUtcE UqK/VguTBRsH7fA624+BmG/9I2WJr4GUZ1cJHM4qJ28RHgCfqkdWu8B1V3c0DotlPQ2H W/pNA1dwSvnVxaT4QfvvRQ0txdCN18nuDhekjRqnCOYg6roxcw90d39VHdkaPKc/IDHI 5Z0+Am4+y3Et2xAObBtCOS04vi4eXaJiYtkBzDS1pmsvRTVm8TrQXg9UdfwnLNr58LWf ae/A==
X-Received: by 10.50.193.129 with SMTP id ho1mr6788142igc.94.1361471470876; Thu, 21 Feb 2013 10:31:10 -0800 (PST)
X-Received: by 10.50.193.129 with SMTP id ho1mr6788139igc.94.1361471470752; Thu, 21 Feb 2013 10:31:10 -0800 (PST)
MIME-Version: 1.0
Received: by 10.64.63.3 with HTTP; Thu, 21 Feb 2013 10:30:39 -0800 (PST)
In-Reply-To: <5125F0A2.6070808@gmail.com>
References: <51238410.8040705@gmail.com> <CA+k3eCT-78fCzGYNk3JwLihsg6qDmu0LNdmgb_QE83ehdj0THA@mail.gmail.com> <5124B749.9050402@gmail.com> <5125F0A2.6070808@gmail.com>
From: Brian Campbell <bcampbell@pingidentity.com>
Date: Thu, 21 Feb 2013 11:30:39 -0700
Message-ID: <CA+k3eCRP=frQ7gY-4s3ifASxXBB+hQpWMOv8VGt29Geg9c4XRQ@mail.gmail.com>
To: Sergey Beryozkin <sberyozkin@gmail.com>
Content-Type: multipart/alternative; boundary=14dae934108962d3f704d640476d
X-Gm-Message-State: ALoCoQk58WxnkxE1ug/2ambHDaMId2nmbjtIZKN5YX+ufmVilYhozhXBarQK5oRcPpSM/GSb1t6TZLNszVVVJ4IXENsLfr1m57gEP8eMkJga0wQYyH9F7IvthqaIGckQ24vkL2WC1NXv
Cc: "<oauth@ietf.org>" <oauth@ietf.org>
Subject: Re: [OAUTH-WG] Using SAML2 Bearer for the authentication
X-BeenThere: oauth@ietf.org
X-Mailman-Version: 2.1.12
Precedence: list
List-Id: OAUTH WG <oauth.ietf.org>
List-Unsubscribe: <https://www.ietf.org/mailman/options/oauth>, <mailto:oauth-request@ietf.org?subject=unsubscribe>
List-Archive: <http://www.ietf.org/mail-archive/web/oauth>
List-Post: <mailto:oauth@ietf.org>
List-Help: <mailto:oauth-request@ietf.org?subject=help>
List-Subscribe: <https://www.ietf.org/mailman/listinfo/oauth>, <mailto:oauth-request@ietf.org?subject=subscribe>
X-List-Received-Date: Thu, 21 Feb 2013 18:31:13 -0000

--14dae934108962d3f704d640476d
Content-Type: text/plain; charset=ISO-8859-1

Yeah Sergey, your second interpretation is more along the lines of what the
draft(s) intended to convey.

The drafts are all due (overdue really) for an update and I'll try and and
some clarifications around this when I get to doing the edits.

Thanks for the feedback.




On Thu, Feb 21, 2013 at 3:02 AM, Sergey Beryozkin <sberyozkin@gmail.com>wrote:

> On 20/02/13 11:45, Sergey Beryozkin wrote:
>
>> On 19/02/13 14:27, Brian Campbell wrote:
>>
>>> The scope of assertion based client authentication is only in OAuth and
>>> only for the client calling the AS's token endpoint. Defining a general
>>> HTTP auth scheme for assertions would have a much broader scope and be
>>> much more difficult to standardize.
>>>
>> Understood, thanks.
>>
>> I'd like to ask another question related to the subject of this thread,
>> though the same would likely be relevant for using JWT for authenticating.
>>
>> When the assertion is used for authenticating the client, a form
>> "client_id" parameter is said to be optional.
>> Next, section 6.1 [1] says that "Subject" of the assertion SHOULD be
>> "client_id".
>>
>> I interpret it like this.
>>
>> If "Subject" is set to "client_id" then there the actual client_id must
>> be available as "client_id" form parameter, which will be posted
>> alongside the assertion.
>>
>> If not then the client_id is an actual Subject value and no "client_id"
>> form parameter is expected to be available.
>>
>>
>>  Continuing on this,
>
> http://tools.ietf.org/html/**draft-ietf-oauth-saml2-bearer-**15#section-3<http://tools.ietf.org/html/draft-ietf-oauth-saml2-bearer-15#section-3>
>
> says "For client authentication, the Subject MUST be the "client_id" of
> the OAuth client."
>
> This makes me think I may've been wrong with my initial reading of both
> drafts, now I read like this:
>
> "the Subject MUST be the "client_id" of the OAuth client." as per the
> Saml2 bearer draft, which is not the literal "client_id". Next, if
> "client_id" form parameter is available then it must be equal to Subject
> value, as is, or via an AS provided mapping, otherwise it is a validation
> fault.
> This is probably in line with the answers to the similar question on the
> use of client_id and JWT grant, though I'm not sure.
>
> I appreciate it is a work in progress, but IMHO some more clarifications
> in the text will help
>
> Cheers, Sergey
>
>
>  Is it correct ?
>>
>> Thanks, Sergey
>>
>> [1] http://tools.ietf.org/html/**draft-ietf-oauth-assertions-**
>> 10#section-6.1<http://tools.ietf.org/html/draft-ietf-oauth-assertions-10#section-6.1>
>>
>>
>>
>>
>>>
>>> On Tue, Feb 19, 2013 at 6:54 AM, Sergey Beryozkin <sberyozkin@gmail.com
>>> <mailto:sberyozkin@gmail.com>> wrote:
>>>
>>> Hi,
>>>
>>> Assertions like SAML2 Bearer can be used for authenticating the client.
>>> Why a dedicated Authorization scheme can not be introduced, instead
>>> of or in addition to "client_assertion" & "client_assertion_type"
>>> parameters ?
>>>
>>> IMHO, the following
>>>
>>> Authorization: SAML "base64url-encoded assertion"
>>>
>>> grant_type=authorization_code&**__code=123456
>>>
>>> is more in line with OAuth2 recommending not to prefer including
>>> client id & secret in the body:
>>>
>>> "Including the client credentials in the request-body using the two
>>> parameters is NOT RECOMMENDED and SHOULD be limited to clients unable
>>> to directly utilize the HTTP Basic authentication scheme (or other
>>> password-based HTTP authentication schemes)" - though it talks about
>>> a password based scheme...
>>>
>>> similarly:
>>>
>>> Authorization: JWT "encoded jwt assertion"
>>>
>>> grant_type=authorization_code&**__code=123456
>>>
>>> Just a thought.
>>>
>>> Cheers, Sergey
>>>
>>>
>>> ______________________________**___________________
>>> OAuth mailing list
>>> OAuth@ietf.org <mailto:OAuth@ietf.org>
>>> https://www.ietf.org/mailman/_**_listinfo/oauth<https://www.ietf.org/mailman/__listinfo/oauth>
>>> <https://www.ietf.org/mailman/**listinfo/oauth<https://www.ietf.org/mailman/listinfo/oauth>
>>> >
>>>
>>>
>>>
> ______________________________**_________________
> OAuth mailing list
> OAuth@ietf.org
> https://www.ietf.org/mailman/**listinfo/oauth<https://www.ietf.org/mailman/listinfo/oauth>
>

--14dae934108962d3f704d640476d
Content-Type: text/html; charset=ISO-8859-1
Content-Transfer-Encoding: quoted-printable

<div dir=3D"ltr"><div>Yeah Sergey, your second interpretation is more along=
 the lines of what the draft(s) intended to convey. <br><br></div>The draft=
s are all due (overdue really) for an update and I&#39;ll try and and some =
clarifications around this when I get to doing the edits.<br>

<br>Thanks for the feedback.<br><br><br></div><div class=3D"gmail_extra"><b=
r><br><div class=3D"gmail_quote">On Thu, Feb 21, 2013 at 3:02 AM, Sergey Be=
ryozkin <span dir=3D"ltr">&lt;<a href=3D"mailto:sberyozkin@gmail.com" targe=
t=3D"_blank">sberyozkin@gmail.com</a>&gt;</span> wrote:<br>

<blockquote class=3D"gmail_quote" style=3D"margin:0 0 0 .8ex;border-left:1p=
x #ccc solid;padding-left:1ex"><div class=3D"im">On 20/02/13 11:45, Sergey =
Beryozkin wrote:<br>
<blockquote class=3D"gmail_quote" style=3D"margin:0 0 0 .8ex;border-left:1p=
x #ccc solid;padding-left:1ex">
On 19/02/13 14:27, Brian Campbell wrote:<br>
<blockquote class=3D"gmail_quote" style=3D"margin:0 0 0 .8ex;border-left:1p=
x #ccc solid;padding-left:1ex">
The scope of assertion based client authentication is only in OAuth and<br>
only for the client calling the AS&#39;s token endpoint. Defining a general=
<br>
HTTP auth scheme for assertions would have a much broader scope and be<br>
much more difficult to standardize.<br>
</blockquote>
Understood, thanks.<br>
<br>
I&#39;d like to ask another question related to the subject of this thread,=
<br>
though the same would likely be relevant for using JWT for authenticating.<=
br>
<br>
When the assertion is used for authenticating the client, a form<br>
&quot;client_id&quot; parameter is said to be optional.<br>
Next, section 6.1 [1] says that &quot;Subject&quot; of the assertion SHOULD=
 be<br>
&quot;client_id&quot;.<br>
<br>
I interpret it like this.<br>
<br>
If &quot;Subject&quot; is set to &quot;client_id&quot; then there the actua=
l client_id must<br>
be available as &quot;client_id&quot; form parameter, which will be posted<=
br>
alongside the assertion.<br>
<br>
If not then the client_id is an actual Subject value and no &quot;client_id=
&quot;<br>
form parameter is expected to be available.<br>
<br>
<br>
</blockquote></div>
Continuing on this,<br>
<br>
<a href=3D"http://tools.ietf.org/html/draft-ietf-oauth-saml2-bearer-15#sect=
ion-3" target=3D"_blank">http://tools.ietf.org/html/<u></u>draft-ietf-oauth=
-saml2-bearer-<u></u>15#section-3</a><br>
<br>
says &quot;For client authentication, the Subject MUST be the &quot;client_=
id&quot; of the OAuth client.&quot;<br>
<br>
This makes me think I may&#39;ve been wrong with my initial reading of both=
 drafts, now I read like this:<br>
<br>
&quot;the Subject MUST be the &quot;client_id&quot; of the OAuth client.&qu=
ot; as per the Saml2 bearer draft, which is not the literal &quot;client_id=
&quot;. Next, if &quot;client_id&quot; form parameter is available then it =
must be equal to Subject value, as is, or via an AS provided mapping, other=
wise it is a validation fault.<br>


This is probably in line with the answers to the similar question on the us=
e of client_id and JWT grant, though I&#39;m not sure.<br>
<br>
I appreciate it is a work in progress, but IMHO some more clarifications in=
 the text will help<br>
<br>
Cheers, Sergey<div class=3D"HOEnZb"><div class=3D"h5"><br>
<br>
<blockquote class=3D"gmail_quote" style=3D"margin:0 0 0 .8ex;border-left:1p=
x #ccc solid;padding-left:1ex">
Is it correct ?<br>
<br>
Thanks, Sergey<br>
<br>
[1] <a href=3D"http://tools.ietf.org/html/draft-ietf-oauth-assertions-10#se=
ction-6.1" target=3D"_blank">http://tools.ietf.org/html/<u></u>draft-ietf-o=
auth-assertions-<u></u>10#section-6.1</a><br>
<br>
<br>
<br>
<blockquote class=3D"gmail_quote" style=3D"margin:0 0 0 .8ex;border-left:1p=
x #ccc solid;padding-left:1ex">
<br>
<br>
On Tue, Feb 19, 2013 at 6:54 AM, Sergey Beryozkin &lt;<a href=3D"mailto:sbe=
ryozkin@gmail.com" target=3D"_blank">sberyozkin@gmail.com</a><br>
&lt;mailto:<a href=3D"mailto:sberyozkin@gmail.com" target=3D"_blank">sberyo=
zkin@gmail.com</a>&gt;&gt; wrote:<br>
<br>
Hi,<br>
<br>
Assertions like SAML2 Bearer can be used for authenticating the client.<br>
Why a dedicated Authorization scheme can not be introduced, instead<br>
of or in addition to &quot;client_assertion&quot; &amp; &quot;client_assert=
ion_type&quot;<br>
parameters ?<br>
<br>
IMHO, the following<br>
<br>
Authorization: SAML &quot;base64url-encoded assertion&quot;<br>
<br>
grant_type=3Dauthorization_code&amp;<u></u>__code=3D123456<br>
<br>
is more in line with OAuth2 recommending not to prefer including<br>
client id &amp; secret in the body:<br>
<br>
&quot;Including the client credentials in the request-body using the two<br=
>
parameters is NOT RECOMMENDED and SHOULD be limited to clients unable<br>
to directly utilize the HTTP Basic authentication scheme (or other<br>
password-based HTTP authentication schemes)&quot; - though it talks about<b=
r>
a password based scheme...<br>
<br>
similarly:<br>
<br>
Authorization: JWT &quot;encoded jwt assertion&quot;<br>
<br>
grant_type=3Dauthorization_code&amp;<u></u>__code=3D123456<br>
<br>
Just a thought.<br>
<br>
Cheers, Sergey<br>
<br>
<br>
______________________________<u></u>___________________<br>
OAuth mailing list<br>
<a href=3D"mailto:OAuth@ietf.org" target=3D"_blank">OAuth@ietf.org</a> &lt;=
mailto:<a href=3D"mailto:OAuth@ietf.org" target=3D"_blank">OAuth@ietf.org</=
a>&gt;<br>
<a href=3D"https://www.ietf.org/mailman/__listinfo/oauth" target=3D"_blank"=
>https://www.ietf.org/mailman/_<u></u>_listinfo/oauth</a><br>
&lt;<a href=3D"https://www.ietf.org/mailman/listinfo/oauth" target=3D"_blan=
k">https://www.ietf.org/mailman/<u></u>listinfo/oauth</a>&gt;<br>
<br>
<br>
</blockquote></blockquote>
<br></div></div><div class=3D"HOEnZb"><div class=3D"h5">
______________________________<u></u>_________________<br>
OAuth mailing list<br>
<a href=3D"mailto:OAuth@ietf.org" target=3D"_blank">OAuth@ietf.org</a><br>
<a href=3D"https://www.ietf.org/mailman/listinfo/oauth" target=3D"_blank">h=
ttps://www.ietf.org/mailman/<u></u>listinfo/oauth</a><br>
</div></div></blockquote></div><br></div>

--14dae934108962d3f704d640476d--

From jricher@mitre.org  Thu Feb 21 12:34:52 2013
Return-Path: <jricher@mitre.org>
X-Original-To: oauth@ietfa.amsl.com
Delivered-To: oauth@ietfa.amsl.com
Received: from localhost (localhost [127.0.0.1]) by ietfa.amsl.com (Postfix) with ESMTP id 2AB7021F8ED4 for <oauth@ietfa.amsl.com>; Thu, 21 Feb 2013 12:34:52 -0800 (PST)
X-Virus-Scanned: amavisd-new at amsl.com
X-Spam-Flag: NO
X-Spam-Score: -6.576
X-Spam-Level: 
X-Spam-Status: No, score=-6.576 tagged_above=-999 required=5 tests=[AWL=0.022,  BAYES_00=-2.599, HTML_MESSAGE=0.001, RCVD_IN_DNSWL_MED=-4]
Received: from mail.ietf.org ([64.170.98.30]) by localhost (ietfa.amsl.com [127.0.0.1]) (amavisd-new, port 10024) with ESMTP id qpIEFamRR71f for <oauth@ietfa.amsl.com>; Thu, 21 Feb 2013 12:34:51 -0800 (PST)
Received: from smtpksrv1.mitre.org (smtpksrv1.mitre.org [198.49.146.77]) by ietfa.amsl.com (Postfix) with ESMTP id 5F01E21F8EC6 for <oauth@ietf.org>; Thu, 21 Feb 2013 12:34:51 -0800 (PST)
Received: from smtpksrv1.mitre.org (localhost.localdomain [127.0.0.1]) by localhost (Postfix) with SMTP id 9432543900B1 for <oauth@ietf.org>; Thu, 21 Feb 2013 15:34:50 -0500 (EST)
Received: from IMCCAS04.MITRE.ORG (imccas04.mitre.org [129.83.29.81]) by smtpksrv1.mitre.org (Postfix) with ESMTP id 7F65343900A6 for <oauth@ietf.org>; Thu, 21 Feb 2013 15:34:50 -0500 (EST)
Received: from [10.146.15.29] (129.83.31.58) by IMCCAS04.MITRE.ORG (129.83.29.81) with Microsoft SMTP Server (TLS) id 14.2.318.4; Thu, 21 Feb 2013 15:34:50 -0500
Message-ID: <512684B4.2050407@mitre.org>
Date: Thu, 21 Feb 2013 15:33:56 -0500
From: Justin Richer <jricher@mitre.org>
User-Agent: Mozilla/5.0 (X11; Linux i686; rv:17.0) Gecko/20130106 Thunderbird/17.0.2
MIME-Version: 1.0
To: "oauth@ietf.org" <oauth@ietf.org>
References: <20130221184415.2302.42295.idtracker@ietfa.amsl.com>
In-Reply-To: <20130221184415.2302.42295.idtracker@ietfa.amsl.com>
X-Forwarded-Message-Id: <20130221184415.2302.42295.idtracker@ietfa.amsl.com>
Content-Type: multipart/alternative; boundary="------------090202070809000803060509"
X-Originating-IP: [129.83.31.58]
Subject: [OAUTH-WG] Fwd: New Version Notification for draft-richer-oauth-introspection-03.txt
X-BeenThere: oauth@ietf.org
X-Mailman-Version: 2.1.12
Precedence: list
List-Id: OAUTH WG <oauth.ietf.org>
List-Unsubscribe: <https://www.ietf.org/mailman/options/oauth>, <mailto:oauth-request@ietf.org?subject=unsubscribe>
List-Archive: <http://www.ietf.org/mail-archive/web/oauth>
List-Post: <mailto:oauth@ietf.org>
List-Help: <mailto:oauth-request@ietf.org?subject=help>
List-Subscribe: <https://www.ietf.org/mailman/listinfo/oauth>, <mailto:oauth-request@ietf.org?subject=subscribe>
X-List-Received-Date: Thu, 21 Feb 2013 20:34:52 -0000

--------------090202070809000803060509
Content-Type: text/plain; charset="UTF-8"; format=flowed
Content-Transfer-Encoding: 7bit

New version of the introspection draft is up. Only change here is 
changing the "valid" parameter to "active", due to the former term being 
confused for whether or not the token was used in a valid manner at the 
RP (which introspection can't directly tell you).

  -- Justin


-------- Original Message --------
Subject: 	New Version Notification for 
draft-richer-oauth-introspection-03.txt
Date: 	Thu, 21 Feb 2013 10:44:15 -0800
From: 	<internet-drafts@ietf.org>
To: 	<jricher@mitre.org>



A new version of I-D, draft-richer-oauth-introspection-03.txt
has been successfully submitted by Justin Richer and posted to the
IETF repository.

Filename:	 draft-richer-oauth-introspection
Revision:	 03
Title:		 OAuth Token Introspection
Creation date:	 2013-02-21
Group:		 Individual Submission
Number of pages: 6
URL:             http://www.ietf.org/internet-drafts/draft-richer-oauth-introspection-03.txt
Status:          http://datatracker.ietf.org/doc/draft-richer-oauth-introspection
Htmlized:        http://tools.ietf.org/html/draft-richer-oauth-introspection-03
Diff:            http://www.ietf.org/rfcdiff?url2=draft-richer-oauth-introspection-03

Abstract:
    This specification defines a method for a client or protected
    resource to query an OAuth authorization server to determine meta-
    information about an OAuth token.


                                                                                   


The IETF Secretariat




--------------090202070809000803060509
Content-Type: text/html; charset="UTF-8"
Content-Transfer-Encoding: 8bit

<html>
  <head>

    <meta http-equiv="content-type" content="text/html; charset=UTF-8">
  </head>
  <body bgcolor="#FFFFFF" text="#000000">
    New version of the introspection draft is up. Only change here is
    changing the "valid" parameter to "active", due to the former term
    being confused for whether or not the token was used in a valid
    manner at the RP (which introspection can't directly tell you).<br>
    <br>
    Â -- Justin<br>
    <div class="moz-forward-container"><br>
      <br>
      -------- Original Message --------
      <table class="moz-email-headers-table" border="0" cellpadding="0"
        cellspacing="0">
        <tbody>
          <tr>
            <th align="RIGHT" nowrap="nowrap" valign="BASELINE">Subject:
            </th>
            <td>New Version Notification for
              draft-richer-oauth-introspection-03.txt</td>
          </tr>
          <tr>
            <th align="RIGHT" nowrap="nowrap" valign="BASELINE">Date: </th>
            <td>Thu, 21 Feb 2013 10:44:15 -0800</td>
          </tr>
          <tr>
            <th align="RIGHT" nowrap="nowrap" valign="BASELINE">From: </th>
            <td><a class="moz-txt-link-rfc2396E" href="mailto:internet-drafts@ietf.org">&lt;internet-drafts@ietf.org&gt;</a></td>
          </tr>
          <tr>
            <th align="RIGHT" nowrap="nowrap" valign="BASELINE">To: </th>
            <td><a class="moz-txt-link-rfc2396E" href="mailto:jricher@mitre.org">&lt;jricher@mitre.org&gt;</a></td>
          </tr>
        </tbody>
      </table>
      <br>
      <br>
      <pre>A new version of I-D, draft-richer-oauth-introspection-03.txt
has been successfully submitted by Justin Richer and posted to the
IETF repository.

Filename:	 draft-richer-oauth-introspection
Revision:	 03
Title:		 OAuth Token Introspection
Creation date:	 2013-02-21
Group:		 Individual Submission
Number of pages: 6
URL:             <a class="moz-txt-link-freetext" href="http://www.ietf.org/internet-drafts/draft-richer-oauth-introspection-03.txt">http://www.ietf.org/internet-drafts/draft-richer-oauth-introspection-03.txt</a>
Status:          <a class="moz-txt-link-freetext" href="http://datatracker.ietf.org/doc/draft-richer-oauth-introspection">http://datatracker.ietf.org/doc/draft-richer-oauth-introspection</a>
Htmlized:        <a class="moz-txt-link-freetext" href="http://tools.ietf.org/html/draft-richer-oauth-introspection-03">http://tools.ietf.org/html/draft-richer-oauth-introspection-03</a>
Diff:            <a class="moz-txt-link-freetext" href="http://www.ietf.org/rfcdiff?url2=draft-richer-oauth-introspection-03">http://www.ietf.org/rfcdiff?url2=draft-richer-oauth-introspection-03</a>

Abstract:
   This specification defines a method for a client or protected
   resource to query an OAuth authorization server to determine meta-
   information about an OAuth token.


                                                                                  


The IETF Secretariat

</pre>
      <br>
    </div>
    <br>
  </body>
</html>

--------------090202070809000803060509--

From internet-drafts@ietf.org  Thu Feb 21 12:35:01 2013
Return-Path: <internet-drafts@ietf.org>
X-Original-To: oauth@ietfa.amsl.com
Delivered-To: oauth@ietfa.amsl.com
Received: from localhost (localhost [127.0.0.1]) by ietfa.amsl.com (Postfix) with ESMTP id A9D8B21F8F47; Thu, 21 Feb 2013 12:35:01 -0800 (PST)
X-Virus-Scanned: amavisd-new at amsl.com
X-Spam-Flag: NO
X-Spam-Score: -102.554
X-Spam-Level: 
X-Spam-Status: No, score=-102.554 tagged_above=-999 required=5 tests=[AWL=0.045, BAYES_00=-2.599, USER_IN_WHITELIST=-100]
Received: from mail.ietf.org ([64.170.98.30]) by localhost (ietfa.amsl.com [127.0.0.1]) (amavisd-new, port 10024) with ESMTP id ia9aP8YQyNvU; Thu, 21 Feb 2013 12:35:01 -0800 (PST)
Received: from ietfa.amsl.com (localhost [127.0.0.1]) by ietfa.amsl.com (Postfix) with ESMTP id C7ED121F8F4B; Thu, 21 Feb 2013 12:35:00 -0800 (PST)
MIME-Version: 1.0
Content-Type: text/plain; charset="utf-8"
Content-Transfer-Encoding: quoted-printable
From: internet-drafts@ietf.org
To: i-d-announce@ietf.org
X-Test-IDTracker: no
X-IETF-IDTracker: 4.40
Message-ID: <20130221203500.30877.85502.idtracker@ietfa.amsl.com>
Date: Thu, 21 Feb 2013 12:35:00 -0800
Cc: oauth@ietf.org
Subject: [OAUTH-WG] I-D Action: draft-ietf-oauth-dyn-reg-07.txt
X-BeenThere: oauth@ietf.org
X-Mailman-Version: 2.1.12
Precedence: list
List-Id: OAUTH WG <oauth.ietf.org>
List-Unsubscribe: <https://www.ietf.org/mailman/options/oauth>, <mailto:oauth-request@ietf.org?subject=unsubscribe>
List-Archive: <http://www.ietf.org/mail-archive/web/oauth>
List-Post: <mailto:oauth@ietf.org>
List-Help: <mailto:oauth-request@ietf.org?subject=help>
List-Subscribe: <https://www.ietf.org/mailman/listinfo/oauth>, <mailto:oauth-request@ietf.org?subject=subscribe>
X-List-Received-Date: Thu, 21 Feb 2013 20:35:01 -0000

A New Internet-Draft is available from the on-line Internet-Drafts director=
ies.
 This draft is a work item of the Web Authorization Protocol Working Group =
of the IETF.

	Title           : OAuth Dynamic Client Registration Protocol
	Author(s)       : Justin Richer
                          John Bradley
                          Michael B. Jones
                          Maciej Machulak
	Filename        : draft-ietf-oauth-dyn-reg-07.txt
	Pages           : 21
	Date            : 2013-02-21

Abstract:
   This specification defines an endpoint and protocol for dynamic
   registration of OAuth Clients at an Authorization Server.


The IETF datatracker status page for this draft is:
https://datatracker.ietf.org/doc/draft-ietf-oauth-dyn-reg

There's also a htmlized version available at:
http://tools.ietf.org/html/draft-ietf-oauth-dyn-reg-07

A diff from the previous version is available at:
http://www.ietf.org/rfcdiff?url2=3Ddraft-ietf-oauth-dyn-reg-07


Internet-Drafts are also available by anonymous FTP at:
ftp://ftp.ietf.org/internet-drafts/


From jricher@mitre.org  Thu Feb 21 12:50:20 2013
Return-Path: <jricher@mitre.org>
X-Original-To: oauth@ietfa.amsl.com
Delivered-To: oauth@ietfa.amsl.com
Received: from localhost (localhost [127.0.0.1]) by ietfa.amsl.com (Postfix) with ESMTP id 7C08321F8F51 for <oauth@ietfa.amsl.com>; Thu, 21 Feb 2013 12:50:20 -0800 (PST)
X-Virus-Scanned: amavisd-new at amsl.com
X-Spam-Flag: NO
X-Spam-Score: -6.576
X-Spam-Level: 
X-Spam-Status: No, score=-6.576 tagged_above=-999 required=5 tests=[AWL=0.023,  BAYES_00=-2.599, RCVD_IN_DNSWL_MED=-4]
Received: from mail.ietf.org ([64.170.98.30]) by localhost (ietfa.amsl.com [127.0.0.1]) (amavisd-new, port 10024) with ESMTP id ZHncj3O4-3kT for <oauth@ietfa.amsl.com>; Thu, 21 Feb 2013 12:50:17 -0800 (PST)
Received: from smtpksrv1.mitre.org (smtpksrv1.mitre.org [198.49.146.77]) by ietfa.amsl.com (Postfix) with ESMTP id 78AA321F8F35 for <oauth@ietf.org>; Thu, 21 Feb 2013 12:50:15 -0800 (PST)
Received: from smtpksrv1.mitre.org (localhost.localdomain [127.0.0.1]) by localhost (Postfix) with SMTP id 108F91F13C3 for <oauth@ietf.org>; Thu, 21 Feb 2013 15:50:15 -0500 (EST)
Received: from IMCCAS04.MITRE.ORG (imccas04.mitre.org [129.83.29.81]) by smtpksrv1.mitre.org (Postfix) with ESMTP id E2BA11F14D3 for <oauth@ietf.org>; Thu, 21 Feb 2013 15:50:14 -0500 (EST)
Received: from [10.146.15.29] (129.83.31.58) by IMCCAS04.MITRE.ORG (129.83.29.81) with Microsoft SMTP Server (TLS) id 14.2.318.4; Thu, 21 Feb 2013 15:50:14 -0500
Message-ID: <51268850.4020305@mitre.org>
Date: Thu, 21 Feb 2013 15:49:20 -0500
From: Justin Richer <jricher@mitre.org>
User-Agent: Mozilla/5.0 (X11; Linux i686; rv:17.0) Gecko/20130106 Thunderbird/17.0.2
MIME-Version: 1.0
To: <oauth@ietf.org>
References: <20130221203500.30877.85502.idtracker@ietfa.amsl.com>
In-Reply-To: <20130221203500.30877.85502.idtracker@ietfa.amsl.com>
Content-Type: text/plain; charset="ISO-8859-1"; format=flowed
Content-Transfer-Encoding: 7bit
X-Originating-IP: [129.83.31.58]
Subject: Re: [OAUTH-WG] I-D Action: draft-ietf-oauth-dyn-reg-07.txt
X-BeenThere: oauth@ietf.org
X-Mailman-Version: 2.1.12
Precedence: list
List-Id: OAUTH WG <oauth.ietf.org>
List-Unsubscribe: <https://www.ietf.org/mailman/options/oauth>, <mailto:oauth-request@ietf.org?subject=unsubscribe>
List-Archive: <http://www.ietf.org/mail-archive/web/oauth>
List-Post: <mailto:oauth@ietf.org>
List-Help: <mailto:oauth-request@ietf.org?subject=help>
List-Subscribe: <https://www.ietf.org/mailman/listinfo/oauth>, <mailto:oauth-request@ietf.org?subject=subscribe>
X-List-Received-Date: Thu, 21 Feb 2013 20:50:20 -0000

New version of Dynamic Registration, just in time for IETF86's 
submission deadline.

Changes to the document reflect conversation over the last week, and 
include:

    o  Changed registration_access_url to registration_client_uri
    o  Fixed missing text in 5.1
    o  Added Pragma: no-cache to examples
    o  Changed "no such client" error to 403
    o  Renamed Client Registration Access Endpoint to Client
       Configuration Endpoint
    o  Changed all the parameter names containing "_url" to instead use
       "_uri"
    o  Updated example text for forming Client Configuration Endpoint URL


Please take a look, both over the change sets and the document as a 
whole. If there's anything drastic that needs patching prior to Monday, 
I'll try to do that, but I'm assuming that this will be the last update 
prior to IETF86. In my personal opinion, I think this is getting close 
to a final form.

My group plans to update our dynamic registration server implementation 
to reflect this new spec in the coming weeks, and I'd encourage other 
implementors to do the same so we can try some honest-to-goodness 
interop testing.

  -- Justin

On 02/21/2013 03:35 PM, internet-drafts@ietf.org wrote:
> A New Internet-Draft is available from the on-line Internet-Drafts directories.
>   This draft is a work item of the Web Authorization Protocol Working Group of the IETF.
>
> 	Title           : OAuth Dynamic Client Registration Protocol
> 	Author(s)       : Justin Richer
>                            John Bradley
>                            Michael B. Jones
>                            Maciej Machulak
> 	Filename        : draft-ietf-oauth-dyn-reg-07.txt
> 	Pages           : 21
> 	Date            : 2013-02-21
>
> Abstract:
>     This specification defines an endpoint and protocol for dynamic
>     registration of OAuth Clients at an Authorization Server.
>
>
> The IETF datatracker status page for this draft is:
> https://datatracker.ietf.org/doc/draft-ietf-oauth-dyn-reg
>
> There's also a htmlized version available at:
> http://tools.ietf.org/html/draft-ietf-oauth-dyn-reg-07
>
> A diff from the previous version is available at:
> http://www.ietf.org/rfcdiff?url2=draft-ietf-oauth-dyn-reg-07
>
>
> Internet-Drafts are also available by anonymous FTP at:
> ftp://ftp.ietf.org/internet-drafts/
>
> _______________________________________________
> OAuth mailing list
> OAuth@ietf.org
> https://www.ietf.org/mailman/listinfo/oauth


From sakimura@gmail.com  Fri Feb 22 14:56:29 2013
Return-Path: <sakimura@gmail.com>
X-Original-To: oauth@ietfa.amsl.com
Delivered-To: oauth@ietfa.amsl.com
Received: from localhost (localhost [127.0.0.1]) by ietfa.amsl.com (Postfix) with ESMTP id D908121E804B for <oauth@ietfa.amsl.com>; Fri, 22 Feb 2013 14:56:29 -0800 (PST)
X-Virus-Scanned: amavisd-new at amsl.com
X-Spam-Flag: NO
X-Spam-Score: -2.471
X-Spam-Level: 
X-Spam-Status: No, score=-2.471 tagged_above=-999 required=5 tests=[AWL=-0.539, BAYES_00=-2.599, HTML_MESSAGE=0.001, RCVD_IN_DNSWL_LOW=-1, SARE_HTML_USL_OBFU=1.666]
Received: from mail.ietf.org ([64.170.98.30]) by localhost (ietfa.amsl.com [127.0.0.1]) (amavisd-new, port 10024) with ESMTP id pVwieW51X2hV for <oauth@ietfa.amsl.com>; Fri, 22 Feb 2013 14:56:28 -0800 (PST)
Received: from mail-lb0-f182.google.com (mail-lb0-f182.google.com [209.85.217.182]) by ietfa.amsl.com (Postfix) with ESMTP id 647D721E8047 for <oauth@ietf.org>; Fri, 22 Feb 2013 14:56:28 -0800 (PST)
Received: by mail-lb0-f182.google.com with SMTP id gg6so913492lbb.41 for <oauth@ietf.org>; Fri, 22 Feb 2013 14:56:27 -0800 (PST)
DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=gmail.com; s=20120113; h=mime-version:x-received:in-reply-to:references:date:message-id :subject:from:to:cc:content-type; bh=PPz5d41d3HIFiO8hDRxp39UQGGHSu9bIEMZIoT9Tnko=; b=Blp4wwvpEVOdF1m3aceRbtwdKF8VT6+XGNgKJ1+u/9bzHrUYgFonb21givKsYbACQO gbrt2h956cX5RWPh33cw1AqEceRYs3TaulktmGPqwXD9nJpEIh2DwRgkh7R8aReSokzd LOzP7A94xX/D+fh2L42U8b9WIGX6JWRs6UQu/FDz7qmfm+W5aabyZEzCfxvv/Poj6EaZ 03nt+NXofoQcC2FMBfJ+e5mMxvdKzGA+Qe/SBEElokBWOREkjEe2D/FTNYyoVwDmUyi9 6Mbp57R41hanaEhek3wS7CIsNCnPyjYVSI2bLFliuQ+46A9o3jbwZQUyy700atDJjPaY rKqQ==
MIME-Version: 1.0
X-Received: by 10.152.105.38 with SMTP id gj6mr3161205lab.25.1361573787258; Fri, 22 Feb 2013 14:56:27 -0800 (PST)
Received: by 10.112.14.44 with HTTP; Fri, 22 Feb 2013 14:56:27 -0800 (PST)
In-Reply-To: <5122391E.9030500@mitre.org>
References: <51195F36.6040705@mitre.org> <780F8C26-19A4-4301-B350-307D9FFF69CD@ve7jtb.com> <511BAA8B.8030309@mitre.org> <BEBDAFAC-28B0-4959-9FE5-34EC17FC318C@ve7jtb.com> <-4554688250617930935@unknownmsgid> <AF401161-0C7C-4E49-9F44-9982B312FF6D@ve7jtb.com> <CABzCy2BtzA-DJofpSkKJWrwfYtM8a+44VWe1Lx+f_ow=mW8kwg@mail.gmail.com> <4687F290-4855-49DE-892F-F9694BB211D4@ve7jtb.com> <511CF2C9.9040604@mitre.org> <F93467E8-6196-4A65-8A0E-B3897E47FBEB@ve7jtb.com> <CABzCy2CcmyN_VPBOHZg8oyZdFNj==Nphx5+eVE_b3+bFsU9btQ@mail.gmail.com> <4E1F6AAD24975D4BA5B1680429673943674691FB@TK5EX14MBXC284.redmond.corp.microsoft.com> <5122391E.9030500@mitre.org>
Date: Sat, 23 Feb 2013 07:56:27 +0900
Message-ID: <CABzCy2Ax_EUR9Gyioi7W+2isnQ3k8EYPhDdo=L55SwFy1pX_2g@mail.gmail.com>
From: Nat Sakimura <sakimura@gmail.com>
To: Justin Richer <jricher@mitre.org>
Content-Type: multipart/alternative; boundary=f46d0408d3f7eccfb204d65819e4
Cc: "oauth@ietf.org" <oauth@ietf.org>
Subject: Re: [OAUTH-WG] Registration: RESTful client lifecycle management
X-BeenThere: oauth@ietf.org
X-Mailman-Version: 2.1.12
Precedence: list
List-Id: OAUTH WG <oauth.ietf.org>
List-Unsubscribe: <https://www.ietf.org/mailman/options/oauth>, <mailto:oauth-request@ietf.org?subject=unsubscribe>
List-Archive: <http://www.ietf.org/mail-archive/web/oauth>
List-Post: <mailto:oauth@ietf.org>
List-Help: <mailto:oauth-request@ietf.org?subject=help>
List-Subscribe: <https://www.ietf.org/mailman/listinfo/oauth>, <mailto:oauth-request@ietf.org?subject=subscribe>
X-List-Received-Date: Fri, 22 Feb 2013 22:56:30 -0000

--f46d0408d3f7eccfb204d65819e4
Content-Type: text/plain; charset=ISO-8859-1

Agreed with the security consideration.

Just for the record:
The life cycle as I understand would include the following.

   1. registration (creation)
   2. activation
   3. de-activation
   4. re-activation
   5. archival
   6. deletion

In the above thread, I was talking more about "3. archive".
We do not have to have the full life-cycle model here, but it may be a good
idea to document why we would not.

Nat


2013/2/18 Justin Richer <jricher@mitre.org>

> Nat's attack vector presumes lack of logging on the server side, where
> doing a "delete" means that you can no longer see anything about who did
> what. You could make the same argument if you have a system where users can
> register themselves and delete their accounts at will -- someone creates a
> fly-by-night account, does bad things, deletes the account. If the site
> doesn't have detailed logs in both of these cases, yes, they'll be in the
> dark about the bad things that happened when the account/client was active.
> It's a valuable security consideration, but I don't think that it's enough
> to say that delete is no longer a valid operation.
>
> I think it's up to the server what "delete" means under the hood, but the
> important bit for the protocol is that as far as the client is concerned,
> that client_id is dead now. I don't think it's worthwhile to specify it as
> a "suspend" operation, because to me "suspend" implies an ability to
> "unsuspend", and I really don't think we want to get into the complicated
> zombie OAuth client business. But whether on the server side "delete"
> translates to "delete everything from the database immediately and burn all
> records of it" or instead "set a flag on that client and all of its
> outstanding grants so that it can't be used but administrators can still
> poke it with a stick" is completely up to the implementation and its
> security considerations.
>
> That said, I think it would make sense to at least describe this potential
> problem in the security considerations, and note that the client MUST NOT
> use the client_id again.
>
>  -- Justin
>
>
> On 02/17/2013 01:11 AM, Mike Jones wrote:
>
>> I agree.  If we have it at all, DELETE should be a declaration by the
>> Client that requests by it should no longer be honored.  It should be up to
>> the Server whether to implement this as suspension or deletion.  At most, I
>> believe it should be an optional operation, which MAY be supported.
>>
>>                                 -- Mike
>>
>> -----Original Message-----
>> From: oauth-bounces@ietf.org [mailto:oauth-bounces@ietf.org**] On Behalf
>> Of Nat Sakimura
>> Sent: Saturday, February 16, 2013 10:04 PM
>> To: John Bradley
>> Cc: oauth@ietf.org
>> Subject: Re: [OAUTH-WG] Registration: RESTful client lifecycle management
>>
>>  When sending an update, a client MUST send all metadata fields
>>> returned from the server in its initial registration or previous read
>>> or update call, including its client_id. A server MAY replace any
>>> missing or invalid fields with default values, or it MAY return an
>>> error as described in the Error Response section. A server MUST return
>>> all provisioned fields in its response. A server MUST NOT change the
>>> client_id field. A server MAY change the client_secret and/or
>>> refresh_access_token fields.
>>>
>> Say the client registered some value. Sometime later, the server changed
>> a value due to some policy or security reasons etc. The client when UPDATES
>> with the previously registered value, what is going to happen to the
>> changed value?
>>
>>  DELETE to be used correctly is I think going to delete the client_id and
>>>> all associated tokens and cause a ripple effect in removing grants
>>>> associated with that client_id.
>>>>
>>> This is how I would interpret it as well. It's de-provisioning the
>>> client, not resetting it.
>>>
>> For DELETE, I can think of an attack such that
>>
>> 1. Register as a client.
>> 2. Send spam links to random users.
>> 3. When user "authorizes", suck the user data such as contacts out.
>> 4. DELETE the registration and disappear.
>>
>> To prevent something like this, it should probably be something more akin
>> to "suspend" rather than completely de-provisioning.
>> ______________________________**_________________
>> OAuth mailing list
>> OAuth@ietf.org
>> https://www.ietf.org/mailman/**listinfo/oauth<https://www.ietf.org/mailman/listinfo/oauth>
>> ______________________________**_________________
>> OAuth mailing list
>> OAuth@ietf.org
>> https://www.ietf.org/mailman/**listinfo/oauth<https://www.ietf.org/mailman/listinfo/oauth>
>>
>
>


-- 
Nat Sakimura (=nat)
Chairman, OpenID Foundation
http://nat.sakimura.org/
@_nat_en

--f46d0408d3f7eccfb204d65819e4
Content-Type: text/html; charset=ISO-8859-1
Content-Transfer-Encoding: quoted-printable

<div>Agreed with the security consideration.=A0</div><div><br></div>Just fo=
r the record:=A0<div>The life cycle as I understand would include the follo=
wing.=A0</div><div><ol><li>registration (creation)</li><li>activation</li><=
li>
de-activation</li><li>re-activation</li><li>archival=A0</li><li>deletion</l=
i></ol></div><div>In the above thread, I was talking more about &quot;3. ar=
chive&quot;.=A0</div><div>We do not have to have the full life-cycle model =
here, but it may be a good idea to document why we would not.=A0</div>
<div><br></div><div>Nat</div><div><br><br><div class=3D"gmail_quote">2013/2=
/18 Justin Richer <span dir=3D"ltr">&lt;<a href=3D"mailto:jricher@mitre.org=
" target=3D"_blank">jricher@mitre.org</a>&gt;</span><br><blockquote class=
=3D"gmail_quote" style=3D"margin:0 0 0 .8ex;border-left:1px #ccc solid;padd=
ing-left:1ex">
Nat&#39;s attack vector presumes lack of logging on the server side, where =
doing a &quot;delete&quot; means that you can no longer see anything about =
who did what. You could make the same argument if you have a system where u=
sers can register themselves and delete their accounts at will -- someone c=
reates a fly-by-night account, does bad things, deletes the account. If the=
 site doesn&#39;t have detailed logs in both of these cases, yes, they&#39;=
ll be in the dark about the bad things that happened when the account/clien=
t was active. It&#39;s a valuable security consideration, but I don&#39;t t=
hink that it&#39;s enough to say that delete is no longer a valid operation=
.<br>

<br>
I think it&#39;s up to the server what &quot;delete&quot; means under the h=
ood, but the important bit for the protocol is that as far as the client is=
 concerned, that client_id is dead now. I don&#39;t think it&#39;s worthwhi=
le to specify it as a &quot;suspend&quot; operation, because to me &quot;su=
spend&quot; implies an ability to &quot;unsuspend&quot;, and I really don&#=
39;t think we want to get into the complicated zombie OAuth client business=
. But whether on the server side &quot;delete&quot; translates to &quot;del=
ete everything from the database immediately and burn all records of it&quo=
t; or instead &quot;set a flag on that client and all of its outstanding gr=
ants so that it can&#39;t be used but administrators can still poke it with=
 a stick&quot; is completely up to the implementation and its security cons=
iderations.<br>

<br>
That said, I think it would make sense to at least describe this potential =
problem in the security considerations, and note that the client MUST NOT u=
se the client_id again.<span class=3D"HOEnZb"><font color=3D"#888888"><br>

<br>
=A0-- Justin</font></span><div class=3D"HOEnZb"><div class=3D"h5"><br>
<br>
On 02/17/2013 01:11 AM, Mike Jones wrote:<br>
<blockquote class=3D"gmail_quote" style=3D"margin:0 0 0 .8ex;border-left:1p=
x #ccc solid;padding-left:1ex">
I agree. =A0If we have it at all, DELETE should be a declaration by the Cli=
ent that requests by it should no longer be honored. =A0It should be up to =
the Server whether to implement this as suspension or deletion. =A0At most,=
 I believe it should be an optional operation, which MAY be supported.<br>

<br>
=A0 =A0 =A0 =A0 =A0 =A0 =A0 =A0 =A0 =A0 =A0 =A0 =A0 =A0 =A0 =A0 -- Mike<br>
<br>
-----Original Message-----<br>
From: <a href=3D"mailto:oauth-bounces@ietf.org" target=3D"_blank">oauth-bou=
nces@ietf.org</a> [mailto:<a href=3D"mailto:oauth-bounces@ietf.org" target=
=3D"_blank">oauth-bounces@ietf.org</a><u></u>] On Behalf Of Nat Sakimura<br=
>
Sent: Saturday, February 16, 2013 10:04 PM<br>
To: John Bradley<br>
Cc: <a href=3D"mailto:oauth@ietf.org" target=3D"_blank">oauth@ietf.org</a><=
br>
Subject: Re: [OAUTH-WG] Registration: RESTful client lifecycle management<b=
r>
<br>
<blockquote class=3D"gmail_quote" style=3D"margin:0 0 0 .8ex;border-left:1p=
x #ccc solid;padding-left:1ex">
When sending an update, a client MUST send all metadata fields<br>
returned from the server in its initial registration or previous read<br>
or update call, including its client_id. A server MAY replace any<br>
missing or invalid fields with default values, or it MAY return an<br>
error as described in the Error Response section. A server MUST return<br>
all provisioned fields in its response. A server MUST NOT change the<br>
client_id field. A server MAY change the client_secret and/or<br>
refresh_access_token fields.<br>
</blockquote>
Say the client registered some value. Sometime later, the server changed a =
value due to some policy or security reasons etc. The client when UPDATES w=
ith the previously registered value, what is going to happen to the changed=
 value?<br>

<br>
<blockquote class=3D"gmail_quote" style=3D"margin:0 0 0 .8ex;border-left:1p=
x #ccc solid;padding-left:1ex"><blockquote class=3D"gmail_quote" style=3D"m=
argin:0 0 0 .8ex;border-left:1px #ccc solid;padding-left:1ex">
DELETE to be used correctly is I think going to delete the client_id and al=
l associated tokens and cause a ripple effect in removing grants associated=
 with that client_id.<br>
</blockquote>
This is how I would interpret it as well. It&#39;s de-provisioning the<br>
client, not resetting it.<br>
</blockquote>
For DELETE, I can think of an attack such that<br>
<br>
1. Register as a client.<br>
2. Send spam links to random users.<br>
3. When user &quot;authorizes&quot;, suck the user data such as contacts ou=
t.<br>
4. DELETE the registration and disappear.<br>
<br>
To prevent something like this, it should probably be something more akin t=
o &quot;suspend&quot; rather than completely de-provisioning.<br>
______________________________<u></u>_________________<br>
OAuth mailing list<br>
<a href=3D"mailto:OAuth@ietf.org" target=3D"_blank">OAuth@ietf.org</a><br>
<a href=3D"https://www.ietf.org/mailman/listinfo/oauth" target=3D"_blank">h=
ttps://www.ietf.org/mailman/<u></u>listinfo/oauth</a><br>
______________________________<u></u>_________________<br>
OAuth mailing list<br>
<a href=3D"mailto:OAuth@ietf.org" target=3D"_blank">OAuth@ietf.org</a><br>
<a href=3D"https://www.ietf.org/mailman/listinfo/oauth" target=3D"_blank">h=
ttps://www.ietf.org/mailman/<u></u>listinfo/oauth</a><br>
</blockquote>
<br>
</div></div></blockquote></div><br><br clear=3D"all"><div><br></div>-- <br>=
Nat Sakimura (=3Dnat)<div>Chairman, OpenID Foundation<br><a href=3D"http://=
nat.sakimura.org/" target=3D"_blank">http://nat.sakimura.org/</a><br>@_nat_=
en</div>

</div>

--f46d0408d3f7eccfb204d65819e4--

From internet-drafts@ietf.org  Mon Feb 25 04:46:43 2013
Return-Path: <internet-drafts@ietf.org>
X-Original-To: oauth@ietfa.amsl.com
Delivered-To: oauth@ietfa.amsl.com
Received: from localhost (localhost [127.0.0.1]) by ietfa.amsl.com (Postfix) with ESMTP id 3658E21F9305; Mon, 25 Feb 2013 04:46:43 -0800 (PST)
X-Virus-Scanned: amavisd-new at amsl.com
X-Spam-Flag: NO
X-Spam-Score: -102.504
X-Spam-Level: 
X-Spam-Status: No, score=-102.504 tagged_above=-999 required=5 tests=[AWL=0.095, BAYES_00=-2.599, USER_IN_WHITELIST=-100]
Received: from mail.ietf.org ([64.170.98.30]) by localhost (ietfa.amsl.com [127.0.0.1]) (amavisd-new, port 10024) with ESMTP id yJ1GZwYqlu1q; Mon, 25 Feb 2013 04:46:42 -0800 (PST)
Received: from ietfa.amsl.com (localhost [127.0.0.1]) by ietfa.amsl.com (Postfix) with ESMTP id 810CD21F9308; Mon, 25 Feb 2013 04:46:42 -0800 (PST)
MIME-Version: 1.0
Content-Type: text/plain; charset="utf-8"
Content-Transfer-Encoding: quoted-printable
From: internet-drafts@ietf.org
To: i-d-announce@ietf.org
X-Test-IDTracker: no
X-IETF-IDTracker: 4.40
Message-ID: <20130225124642.7425.65145.idtracker@ietfa.amsl.com>
Date: Mon, 25 Feb 2013 04:46:42 -0800
Cc: oauth@ietf.org
Subject: [OAUTH-WG] I-D Action: draft-ietf-oauth-v2-http-mac-03.txt
X-BeenThere: oauth@ietf.org
X-Mailman-Version: 2.1.12
Precedence: list
List-Id: OAUTH WG <oauth.ietf.org>
List-Unsubscribe: <https://www.ietf.org/mailman/options/oauth>, <mailto:oauth-request@ietf.org?subject=unsubscribe>
List-Archive: <http://www.ietf.org/mail-archive/web/oauth>
List-Post: <mailto:oauth@ietf.org>
List-Help: <mailto:oauth-request@ietf.org?subject=help>
List-Subscribe: <https://www.ietf.org/mailman/listinfo/oauth>, <mailto:oauth-request@ietf.org?subject=subscribe>
X-List-Received-Date: Mon, 25 Feb 2013 12:46:43 -0000

A New Internet-Draft is available from the on-line Internet-Drafts director=
ies.
 This draft is a work item of the Web Authorization Protocol Working Group =
of the IETF.

	Title           : OAuth 2.0 Message Authentication Code (MAC) Tokens
	Author(s)       : Justin Richer
                          William Mills
                          Hannes Tschofenig
	Filename        : draft-ietf-oauth-v2-http-mac-03.txt
	Pages           : 26
	Date            : 2013-02-25

Abstract:
   This specification describes how to use MAC Tokens in HTTP requests
   to access OAuth 2.0 protected resources.  An OAuth client willing to
   access a protected resource needs to demonstrate possession of a
   crytographic key by using it with a keyed message digest function to
   the request.

   The document also defines a key distribution protocol for obtaining a
   fresh session key.


The IETF datatracker status page for this draft is:
https://datatracker.ietf.org/doc/draft-ietf-oauth-v2-http-mac

There's also a htmlized version available at:
http://tools.ietf.org/html/draft-ietf-oauth-v2-http-mac-03

A diff from the previous version is available at:
http://www.ietf.org/rfcdiff?url2=3Ddraft-ietf-oauth-v2-http-mac-03


Internet-Drafts are also available by anonymous FTP at:
ftp://ftp.ietf.org/internet-drafts/


From hannes.tschofenig@gmx.net  Mon Feb 25 04:47:30 2013
Return-Path: <hannes.tschofenig@gmx.net>
X-Original-To: oauth@ietfa.amsl.com
Delivered-To: oauth@ietfa.amsl.com
Received: from localhost (localhost [127.0.0.1]) by ietfa.amsl.com (Postfix) with ESMTP id 2881521F9316 for <oauth@ietfa.amsl.com>; Mon, 25 Feb 2013 04:47:30 -0800 (PST)
X-Virus-Scanned: amavisd-new at amsl.com
X-Spam-Flag: NO
X-Spam-Score: -102.532
X-Spam-Level: 
X-Spam-Status: No, score=-102.532 tagged_above=-999 required=5 tests=[AWL=0.067, BAYES_00=-2.599, USER_IN_WHITELIST=-100]
Received: from mail.ietf.org ([64.170.98.30]) by localhost (ietfa.amsl.com [127.0.0.1]) (amavisd-new, port 10024) with ESMTP id LHQbQFgH1kjU for <oauth@ietfa.amsl.com>; Mon, 25 Feb 2013 04:47:29 -0800 (PST)
Received: from mout.gmx.net (mout.gmx.net [212.227.15.18]) by ietfa.amsl.com (Postfix) with ESMTP id 2407221F9317 for <oauth@ietf.org>; Mon, 25 Feb 2013 04:47:26 -0800 (PST)
Received: from mailout-de.gmx.net ([10.1.76.32]) by mrigmx.server.lan (mrigmx002) with ESMTP (Nemesis) id 0LqGSs-1Unfyg3dbM-00dlm6 for <oauth@ietf.org>; Mon, 25 Feb 2013 13:46:22 +0100
Received: (qmail invoked by alias); 25 Feb 2013 12:46:22 -0000
Received: from a88-115-219-140.elisa-laajakaista.fi (EHLO [192.168.100.100]) [88.115.219.140] by mail.gmx.net (mp032) with SMTP; 25 Feb 2013 13:46:22 +0100
X-Authenticated: #29516787
X-Provags-ID: V01U2FsdGVkX1+1lpYQFQa1WpbMXbG9lhAtBjXnsc1+XwUHFNT94O rwVethJpw7V65e
From: Hannes Tschofenig <hannes.tschofenig@gmx.net>
Content-Type: text/plain; charset=us-ascii
Content-Transfer-Encoding: quoted-printable
Date: Mon, 25 Feb 2013 14:46:19 +0200
Message-Id: <AECF561A-BD17-4FF0-B60A-FB8594159EA9@gmx.net>
To: IETF oauth WG <oauth@ietf.org>
Mime-Version: 1.0 (Apple Message framework v1085)
X-Mailer: Apple Mail (2.1085)
X-Y-GMX-Trusted: 0
Subject: [OAUTH-WG] draft-ietf-oauth-v2-http-mac and draft-tschofenig-oauth-hotk re-submitted
X-BeenThere: oauth@ietf.org
X-Mailman-Version: 2.1.12
Precedence: list
List-Id: OAUTH WG <oauth.ietf.org>
List-Unsubscribe: <https://www.ietf.org/mailman/options/oauth>, <mailto:oauth-request@ietf.org?subject=unsubscribe>
List-Archive: <http://www.ietf.org/mail-archive/web/oauth>
List-Post: <mailto:oauth@ietf.org>
List-Help: <mailto:oauth-request@ietf.org?subject=help>
List-Subscribe: <https://www.ietf.org/mailman/listinfo/oauth>, <mailto:oauth-request@ietf.org?subject=subscribe>
X-List-Received-Date: Mon, 25 Feb 2013 12:47:30 -0000

Hi all,=20

I just submitted an updated version of the =
draft-ietf-oauth-v2-http-mac-03.txt.=20

I would like to point out that this is **discussion input** -- not =
agreed content. Anything in the document is subject to change!
You also may notice that there are a few questions in the writeup.=20

I was trying to more specific about some of the design aspects that =
folks had proposed during the last few months.=20
I have also re-submitted the draft-tschofenig-oauth-hotk, which includes =
a TLS and a JSON-based solution approach.=20

In general, the open questions still seem to be related to=20
* Key distribution: What should be described in a document? What is =
mandatory to implement?=20
* Selective header field protection: This is something that was brought =
forward in discussions and I have included a proposal of how this could =
look like.
* Channel Binding: Functionality is also included to deal with =
man-in-the-middle attacks against TLS. There are, however, two types of =
channel bindings defined in RFC 5929. Are both needed? If not, which one =
should be selected?=20
* Integrity protection and data origin authentication in both =
directions: The current writeup allows the protection to be extended to =
messages beyond the initial request. This also offers key confirmation =
by the server and protection of any responses. =20

Writing the text I also noticed that I do not quite understand how =
nested JWT documents are supposed to look like. For example, how do I =
encrypt the mac_key carried inside the JWT plus add a signature of all =
other fields? Currently, I have just encrypted the entire payload.=20

I hope to have some discussions prior to the IETF meeting so that we =
have a more fruitful discussion at the face-to-face meeting.

Ciao
Hannes


From wmills_92105@yahoo.com  Mon Feb 25 14:22:42 2013
Return-Path: <wmills_92105@yahoo.com>
X-Original-To: oauth@ietfa.amsl.com
Delivered-To: oauth@ietfa.amsl.com
Received: from localhost (localhost [127.0.0.1]) by ietfa.amsl.com (Postfix) with ESMTP id 9747C21E80FA for <oauth@ietfa.amsl.com>; Mon, 25 Feb 2013 14:22:42 -0800 (PST)
X-Virus-Scanned: amavisd-new at amsl.com
X-Spam-Flag: NO
X-Spam-Score: -1.054
X-Spam-Level: 
X-Spam-Status: No, score=-1.054 tagged_above=-999 required=5 tests=[AWL=-1.056, BAYES_50=0.001, HTML_MESSAGE=0.001]
Received: from mail.ietf.org ([64.170.98.30]) by localhost (ietfa.amsl.com [127.0.0.1]) (amavisd-new, port 10024) with ESMTP id 60quMqtvx8Pn for <oauth@ietfa.amsl.com>; Mon, 25 Feb 2013 14:22:42 -0800 (PST)
Received: from nm19.bullet.mail.ne1.yahoo.com (nm19.bullet.mail.ne1.yahoo.com [98.138.90.82]) by ietfa.amsl.com (Postfix) with ESMTP id 65F1521E80F6 for <oauth@ietf.org>; Mon, 25 Feb 2013 14:22:29 -0800 (PST)
Received: from [98.138.226.180] by nm19.bullet.mail.ne1.yahoo.com with NNFMP; 25 Feb 2013 22:22:25 -0000
Received: from [98.138.87.8] by tm15.bullet.mail.ne1.yahoo.com with NNFMP; 25 Feb 2013 22:22:25 -0000
Received: from [127.0.0.1] by omp1008.mail.ne1.yahoo.com with NNFMP; 25 Feb 2013 22:22:25 -0000
X-Yahoo-Newman-Property: ymail-3
X-Yahoo-Newman-Id: 190259.53793.bm@omp1008.mail.ne1.yahoo.com
Received: (qmail 23725 invoked by uid 60001); 25 Feb 2013 22:22:24 -0000
DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=yahoo.com; s=s1024; t=1361830944; bh=QO7T0D/i8NQRKUFueX46qmtTNtDae6rJfaC5v+ho65I=; h=X-YMail-OSG:Received:X-Rocket-MIMEInfo:X-Mailer:Message-ID:Date:From:Reply-To:Subject:To:MIME-Version:Content-Type; b=r6S0aV76pw2acfTqNyEjD2PeD43+Kw6oZVy4vXev9H+fsXBIztue2SUqSr0MPqnH3w3bVIPuTG2Q8SEITuatP/cBnABDWiIvx0wWi7YRNM5VMHFh3o5LpGq9Z2QYUEIEGcl35yzPGU5iWL8hy6LeKzDS+mgj9S65B4Y+bB9mQUQ=
DomainKey-Signature: a=rsa-sha1; q=dns; c=nofws; s=s1024; d=yahoo.com; h=X-YMail-OSG:Received:X-Rocket-MIMEInfo:X-Mailer:Message-ID:Date:From:Reply-To:Subject:To:MIME-Version:Content-Type; b=fenGg/5K8eRTidbdQTJjihaz2J2vwyQY7Mge+pHBSERoxjiui0s29Vc3sbOl/gbAFCC1TV/2fdSNjXBFmCjxs9EHJmF4IDh3wSaBBdnQ5BNLD5nelTCoa+AUZ1BM2nS+n7bKl4eY/HMSitSslgr2e6j23jH82Onuh083MJY7+cU=;
X-YMail-OSG: EqjgQGkVM1nHCxWQek5tJHJKKgr9AwxBnf_ygSnsQ0toxg2 Tvow0QnP.2EVuYA.yB1wzxPn229vCZce_YiCqjG8pxJ55G19A2EeAfz6yjJv Gn6Bkws.tylEvO908Kc4bMX76YbqeBYD2fIkKstiRHJkgZthDtJX3LaccCSu FjjsiFAY0Kv7aPjhHg.kJtZgJwhgkdWEULy1jvWmgo4iBZ2XqEt1Eu7vIfYK t3rRNWtv7jBSPJlomBJ7lDkELz.NHhXORQEsz5O.wi2RBgtfYE._Lpe7_arZ EBxEy01E7eOVVYUtCeYYuAGFc151.gJEmyTMBRvl09eZu7C0l5pM47fJUxEe qk9WCdfBaa_jbLtq8lGsHPaa.m63l6YVheCrg8k2TC2cwVNqWEdhY9jrTHu5 cG9KniIL4TKv7z1oYQElJhl2Au1pa5X1a06HxxdZm8LCYbdWmCp575goStKv 5ETvgKC7SRIcRpuXnIsSLOlFjbEjgH2DvCeXTEeD7UiKzhEWw6cjawb94k_U w5slz56I2DFHfdZ82ky9pCW0-
Received: from [209.131.62.113] by web31812.mail.mud.yahoo.com via HTTP; Mon, 25 Feb 2013 14:22:24 PST
X-Rocket-MIMEInfo: 001.001, SSB0aGluayB0aGlzIGlzIHdvcnRoIGEgcmVhZCwgSSBkb24ndCBoYXZlIHRpbWUgdG8gZGl2ZSBpbnRvIHRoaXMgOigBMAEBAQE-
X-Mailer: YahooMailWebService/0.8.135.514
Message-ID: <1361830944.13340.YahooMailNeo@web31812.mail.mud.yahoo.com>
Date: Mon, 25 Feb 2013 14:22:24 -0800 (PST)
From: William Mills <wmills_92105@yahoo.com>
To: O Auth WG <oauth@ietf.org>
MIME-Version: 1.0
Content-Type: multipart/alternative; boundary="1458549034-398514229-1361830944=:13340"
Subject: [OAUTH-WG] OAuth2 attack surface....
X-BeenThere: oauth@ietf.org
X-Mailman-Version: 2.1.12
Precedence: list
Reply-To: William Mills <wmills_92105@yahoo.com>
List-Id: OAUTH WG <oauth.ietf.org>
List-Unsubscribe: <https://www.ietf.org/mailman/options/oauth>, <mailto:oauth-request@ietf.org?subject=unsubscribe>
List-Archive: <http://www.ietf.org/mail-archive/web/oauth>
List-Post: <mailto:oauth@ietf.org>
List-Help: <mailto:oauth-request@ietf.org?subject=help>
List-Subscribe: <https://www.ietf.org/mailman/listinfo/oauth>, <mailto:oauth-request@ietf.org?subject=subscribe>
X-List-Received-Date: Mon, 25 Feb 2013 22:22:42 -0000

--1458549034-398514229-1361830944=:13340
Content-Type: text/plain; charset=us-ascii

I think this is worth a read, I don't have time to dive into this :(
--1458549034-398514229-1361830944=:13340
Content-Type: text/html; charset=us-ascii

<html><body><div style="color:#000; background-color:#fff; font-family:Courier New, courier, monaco, monospace, sans-serif;font-size:12pt"><div>I think this is worth a read, I don't have time to dive into this :(</div></div></body></html>
--1458549034-398514229-1361830944=:13340--

From wmills_92105@yahoo.com  Mon Feb 25 14:42:15 2013
Return-Path: <wmills_92105@yahoo.com>
X-Original-To: oauth@ietfa.amsl.com
Delivered-To: oauth@ietfa.amsl.com
Received: from localhost (localhost [127.0.0.1]) by ietfa.amsl.com (Postfix) with ESMTP id 8F24121E80FE for <oauth@ietfa.amsl.com>; Mon, 25 Feb 2013 14:42:15 -0800 (PST)
X-Virus-Scanned: amavisd-new at amsl.com
X-Spam-Flag: NO
X-Spam-Score: -2.304
X-Spam-Level: 
X-Spam-Status: No, score=-2.304 tagged_above=-999 required=5 tests=[AWL=0.294,  BAYES_00=-2.599, HTML_MESSAGE=0.001]
Received: from mail.ietf.org ([64.170.98.30]) by localhost (ietfa.amsl.com [127.0.0.1]) (amavisd-new, port 10024) with ESMTP id d2IP-sc8l2lE for <oauth@ietfa.amsl.com>; Mon, 25 Feb 2013 14:42:15 -0800 (PST)
Received: from nm21-vm1.bullet.mail.ne1.yahoo.com (nm21-vm1.bullet.mail.ne1.yahoo.com [98.138.91.46]) by ietfa.amsl.com (Postfix) with ESMTP id E6EC821E8104 for <oauth@ietf.org>; Mon, 25 Feb 2013 14:42:14 -0800 (PST)
Received: from [98.138.226.180] by nm21.bullet.mail.ne1.yahoo.com with NNFMP; 25 Feb 2013 22:42:14 -0000
Received: from [98.138.88.237] by tm15.bullet.mail.ne1.yahoo.com with NNFMP; 25 Feb 2013 22:42:14 -0000
Received: from [127.0.0.1] by omp1037.mail.ne1.yahoo.com with NNFMP; 25 Feb 2013 22:42:14 -0000
X-Yahoo-Newman-Property: ymail-3
X-Yahoo-Newman-Id: 365688.98898.bm@omp1037.mail.ne1.yahoo.com
Received: (qmail 3143 invoked by uid 60001); 25 Feb 2013 22:42:14 -0000
DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=yahoo.com; s=s1024; t=1361832133; bh=QSxzc1ronDdTL5FkazdSoaxqpQ8BAqbiNmyjs9vshkM=; h=X-YMail-OSG:Received:X-Rocket-MIMEInfo:X-Mailer:References:Message-ID:Date:From:Reply-To:Subject:To:In-Reply-To:MIME-Version:Content-Type; b=hF9sb2A2qclUmKumGuCp3lgiquigVEyrbMjt8ITDFiCEaxJqDOT7QqT+OpV7PooxWglF+gP6rkdqK3BHXBHyMdpcVGRuLACUNA60GvzWMlmZOs+QAbkTqyyEFOhhYwUbHgm99ySNojxMMwPAwTLwGbyeT5giIq0SbUy7+d7kzL8=
DomainKey-Signature: a=rsa-sha1; q=dns; c=nofws; s=s1024; d=yahoo.com; h=X-YMail-OSG:Received:X-Rocket-MIMEInfo:X-Mailer:References:Message-ID:Date:From:Reply-To:Subject:To:In-Reply-To:MIME-Version:Content-Type; b=nXH6NmEb3oEtbgZhrBKm2M7YnfNMw3sOaj9TIBUPoe1Zv5NOi01DbjbrJld/PaNgqsvfBf5wzZVoCYgD0Hgs2fMwa3cwTC7kbeOG2DaOoBGdv8H88ChJ21zcjigZ0dS633mSFAFczEWLUVHovap6FUw4/1bJiZAqYZQdeje0Pbg=;
X-YMail-OSG: FhrYC54VM1njfTm1DqhVqb.m5PLtUK86UZVb5TuwJy7zq58 dOOb9_jdf89EvjSt4RgvV10hhmbQ_L9KCmV1ApVMcz3DHQvKF_VsQPqEgGz8 HKt2cbsjoYu_W4fR4fvZVhUc46ae5aH.87zpD00D6T1ETUGZzAb7owTzoEfp j.SAIjBckiNpzqx8WOoQ8ohAL_uHeHs7gyjoyU4D1vMq90bWW8EY9AGWw56P RTcLdC5aEZZItuT1JZdoip2jBrCtmaQxWT9AS680pLu8FTAiJjyCJcRvZimD eqyCRs61gKJeI.9k04Sc8sI6zlmsRXdX_h8HcsYijeIqLSkHn0cDQLOSkW_B XujS9..YtX1MEO91u_6OhDU4BACLBSJA1SIdlXd3hhRPWr7l.RCb5zAlvub4 y29bcTF1y0M2eTMJm8MTuW8AAfYTR3ecqlKoFgtKHY_T921sfcIO_KKov6PD lCVKw72fxqOiaV7mV0ppRVp.Z3lnSk8QQj1KijW89Z9zlUthct8hpT5_RFkQ Vvy0wSUQqoDHJxquLqpzsTieWLeTIT_VPb662qRZT8wL_YifYAhsIXJ5zb1A 3RJygv55JJQ4LmTI9czWG0P.FnlszcSSRdNI76ZC338.ZffWjFBFtRJirogy Wv20w.Lz8KgEovDwJ7JffawKUjTuXZwemIVmwhNDrt37KfBMDyxyFBHW6XRd BIJzMDFXXi8DgqnXQr43SZjFnhQHyvXuZnl_yxN_rpSHUmH2W.SY-
Received: from [209.131.62.145] by web31816.mail.mud.yahoo.com via HTTP; Mon, 25 Feb 2013 14:42:13 PST
X-Rocket-MIMEInfo: 001.001, CgoKCkRPSCEhISDCoGh0dHA6Ly9ob21ha292LmJsb2dzcG90LmNvLnVrLzIwMTMvMDIvaGFja2luZy1mYWNlYm9vay13aXRoLW9hdXRoMi1hbmQtY2hyb21lLmh0bWwKCgpfX19fX19fX19fX19fX19fX19fX19fX19fX19fX19fXwogRnJvbTogUGhpbCBIdW50IDxwaGlsLmh1bnRAb3JhY2xlLmNvbT4KVG86IFdpbGxpYW0gTWlsbHMgPHdtaWxsc185MjEwNUB5YWhvby5jb20.IApTZW50OiBNb25kYXksIEZlYnJ1YXJ5IDI1LCAyMDEzIDI6MjggUE0KU3ViamVjdDogUmU6IFtPQVVUSC1XR10gT0F1dGgyIGF0dGEBMAEBAQE-
X-Mailer: YahooMailWebService/0.8.135.514
References: <1361830944.13340.YahooMailNeo@web31812.mail.mud.yahoo.com> <E4A6D91D-2BC8-4F2E-9B1C-D1362A0E3608@oracle.com> <1361831644.50183.YahooMailNeo@web31801.mail.mud.yahoo.com>
Message-ID: <1361832133.97884.YahooMailNeo@web31816.mail.mud.yahoo.com>
Date: Mon, 25 Feb 2013 14:42:13 -0800 (PST)
From: William Mills <wmills_92105@yahoo.com>
To: Phil Hunt <phil.hunt@oracle.com>, O Auth WG <oauth@ietf.org>
In-Reply-To: <1361831644.50183.YahooMailNeo@web31801.mail.mud.yahoo.com>
MIME-Version: 1.0
Content-Type: multipart/alternative; boundary="-1238014912-1521137038-1361832133=:97884"
Subject: Re: [OAUTH-WG] OAuth2 attack surface....
X-BeenThere: oauth@ietf.org
X-Mailman-Version: 2.1.12
Precedence: list
Reply-To: William Mills <wmills_92105@yahoo.com>
List-Id: OAUTH WG <oauth.ietf.org>
List-Unsubscribe: <https://www.ietf.org/mailman/options/oauth>, <mailto:oauth-request@ietf.org?subject=unsubscribe>
List-Archive: <http://www.ietf.org/mail-archive/web/oauth>
List-Post: <mailto:oauth@ietf.org>
List-Help: <mailto:oauth-request@ietf.org?subject=help>
List-Subscribe: <https://www.ietf.org/mailman/listinfo/oauth>, <mailto:oauth-request@ietf.org?subject=subscribe>
X-List-Received-Date: Mon, 25 Feb 2013 22:42:15 -0000

---1238014912-1521137038-1361832133=:97884
Content-Type: text/plain; charset=iso-8859-1
Content-Transfer-Encoding: quoted-printable

=0A=0A=0A=0ADOH!!! =A0http://homakov.blogspot.co.uk/2013/02/hacking-faceboo=
k-with-oauth2-and-chrome.html=0A=0A=0A________________________________=0A F=
rom: Phil Hunt <phil.hunt@oracle.com>=0ATo: William Mills <wmills_92105@yah=
oo.com> =0ASent: Monday, February 25, 2013 2:28 PM=0ASubject: Re: [OAUTH-WG=
] OAuth2 attack surface....=0A =0A=0AWhats the link?=0A=0APhil=0A=0ASent fr=
om my phone.=0A=0AOn 2013-02-25, at 14:22, William Mills <wmills_92105@yaho=
o.com> wrote:=0A=0A=0AI think this is worth a read, I don't have time to di=
ve into this :(=0A_______________________________________________=0A>OAuth =
mailing list=0A>OAuth@ietf.org=0A>https://www.ietf.org/mailman/listinfo/oau=
th=0A>
---1238014912-1521137038-1361832133=:97884
Content-Type: text/html; charset=iso-8859-1
Content-Transfer-Encoding: quoted-printable

<html><body><div style=3D"color:#000; background-color:#fff; font-family:Co=
urier New, courier, monaco, monospace, sans-serif;font-size:12pt"><div><br>=
</div><div style=3D"font-family: 'Courier New', courier, monaco, monospace,=
 sans-serif; font-size: 12pt;"><div style=3D"font-family: 'times new roman'=
, 'new york', times, serif; font-size: 12pt;"><div dir=3D"ltr"> </div> <br>=
=0A<div id=3D"yiv721280462"><div><div style=3D"color: rgb(0, 0, 0); backgro=
und-color: rgb(255, 255, 255); font-family: 'Courier New', courier, monaco,=
 monospace, sans-serif; font-size: 12pt;"><div><span>DOH!!! &nbsp;</span><a=
 rel=3D"nofollow" target=3D"_blank" href=3D"http://homakov.blogspot.co.uk/2=
013/02/hacking-facebook-with-oauth2-and-chrome.html" style=3D"font-size:12p=
t;">http://homakov.blogspot.co.uk/2013/02/hacking-facebook-with-oauth2-and-=
chrome.html</a></div><div><br></div>  <div style=3D"font-family: 'Courier N=
ew', courier, monaco, monospace, sans-serif; font-size: 12pt;"> <div style=
=3D"font-family: 'times new roman', 'new york', times, serif; font-size: 12=
pt;"> <div dir=3D"ltr"> <font size=3D"2" face=3D"Arial"> <hr size=3D"1">  <=
b><span style=3D"font-weight:bold;">From:</span></b> Phil Hunt &lt;phil.hun=
t@oracle.com&gt;<br> <b><span style=3D"font-weight:bold;">To:</span></b> Wi=
lliam Mills &lt;wmills_92105@yahoo.com&gt; <br> <b><span style=3D"font-weig=
ht:bold;">Sent:</span></b>
 Monday, February 25, 2013 2:28 PM<br>=0A <b><span style=3D"font-weight:bol=
d;">Subject:</span></b> Re: [OAUTH-WG] OAuth2 attack surface....<br> </font=
> </div> <br>=0A<div id=3D"yiv721280462"><div><div>Whats the link?<br><br>P=
hil<div><br></div><div>Sent from my phone.</div></div><div><br>On 2013-02-2=
5, at 14:22, William Mills &lt;<a rel=3D"nofollow" ymailto=3D"mailto:wmills=
_92105@yahoo.com" target=3D"_blank" href=3D"mailto:wmills_92105@yahoo.com">=
wmills_92105@yahoo.com</a>&gt; wrote:<br><br></div><blockquote type=3D"cite=
"><div><div style=3D"color: rgb(0, 0, 0); background-color: rgb(255, 255, 2=
55); font-family: 'Courier New', courier, monaco, monospace, sans-serif; fo=
nt-size: 12pt;"><div>I think this is worth a read, I don't have time to div=
e into this :(</div></div></div></blockquote><blockquote type=3D"cite"><div=
><span>_______________________________________________</span><br><span>OAut=
h mailing list</span><br><span><a rel=3D"nofollow" ymailto=3D"mailto:OAuth@=
ietf.org" target=3D"_blank" href=3D"mailto:OAuth@ietf.org">OAuth@ietf.org</=
a></span><br><span><a rel=3D"nofollow" target=3D"_blank"
 href=3D"https://www.ietf.org/mailman/listinfo/oauth">https://www.ietf.org/=
mailman/listinfo/oauth</a></span><br></div></blockquote></div></div><br><br=
> </div> </div>  </div></div></div><br><br> </div> </div>  </div></body></h=
tml>
---1238014912-1521137038-1361832133=:97884--

From jricher@mitre.org  Mon Feb 25 14:58:50 2013
Return-Path: <jricher@mitre.org>
X-Original-To: oauth@ietfa.amsl.com
Delivered-To: oauth@ietfa.amsl.com
Received: from localhost (localhost [127.0.0.1]) by ietfa.amsl.com (Postfix) with ESMTP id 4557A21E8140 for <oauth@ietfa.amsl.com>; Mon, 25 Feb 2013 14:58:50 -0800 (PST)
X-Virus-Scanned: amavisd-new at amsl.com
X-Spam-Flag: NO
X-Spam-Score: -6.576
X-Spam-Level: 
X-Spam-Status: No, score=-6.576 tagged_above=-999 required=5 tests=[AWL=0.022,  BAYES_00=-2.599, HTML_MESSAGE=0.001, RCVD_IN_DNSWL_MED=-4]
Received: from mail.ietf.org ([64.170.98.30]) by localhost (ietfa.amsl.com [127.0.0.1]) (amavisd-new, port 10024) with ESMTP id mbcv2-ipsCjx for <oauth@ietfa.amsl.com>; Mon, 25 Feb 2013 14:58:49 -0800 (PST)
Received: from smtpksrv1.mitre.org (smtpksrv1.mitre.org [198.49.146.77]) by ietfa.amsl.com (Postfix) with ESMTP id 63A6321E80FE for <oauth@ietf.org>; Mon, 25 Feb 2013 14:58:49 -0800 (PST)
Received: from smtpksrv1.mitre.org (localhost.localdomain [127.0.0.1]) by localhost (Postfix) with SMTP id B4F97531022A; Mon, 25 Feb 2013 17:58:48 -0500 (EST)
Received: from IMCCAS01.MITRE.ORG (imccas01.mitre.org [129.83.29.78]) by smtpksrv1.mitre.org (Postfix) with ESMTP id A4402531022B; Mon, 25 Feb 2013 17:58:48 -0500 (EST)
Received: from IMCMBX01.MITRE.ORG ([169.254.1.25]) by IMCCAS01.MITRE.ORG ([129.83.29.68]) with mapi id 14.02.0318.004; Mon, 25 Feb 2013 17:58:48 -0500
From: "Richer, Justin P." <jricher@mitre.org>
To: William Mills <wmills_92105@yahoo.com>
Thread-Topic: [OAUTH-WG] OAuth2 attack surface....
Thread-Index: AQHOE6ur3a6hedYEIU2GnoIHTEpY3A==
Date: Mon, 25 Feb 2013 22:58:48 +0000
Message-ID: <B33BFB58CCC8BE4998958016839DE27E068A104F@IMCMBX01.MITRE.ORG>
References: <1361830944.13340.YahooMailNeo@web31812.mail.mud.yahoo.com> <E4A6D91D-2BC8-4F2E-9B1C-D1362A0E3608@oracle.com> <1361831644.50183.YahooMailNeo@web31801.mail.mud.yahoo.com> <1361832133.97884.YahooMailNeo@web31816.mail.mud.yahoo.com>
In-Reply-To: <1361832133.97884.YahooMailNeo@web31816.mail.mud.yahoo.com>
Accept-Language: en-US
Content-Language: en-US
X-MS-Has-Attach: 
X-MS-TNEF-Correlator: 
x-originating-ip: [172.31.18.27]
Content-Type: multipart/alternative; boundary="_000_B33BFB58CCC8BE4998958016839DE27E068A104FIMCMBX01MITREOR_"
MIME-Version: 1.0
Cc: O Auth WG <oauth@ietf.org>
Subject: Re: [OAUTH-WG] OAuth2 attack surface....
X-BeenThere: oauth@ietf.org
X-Mailman-Version: 2.1.12
Precedence: list
List-Id: OAUTH WG <oauth.ietf.org>
List-Unsubscribe: <https://www.ietf.org/mailman/options/oauth>, <mailto:oauth-request@ietf.org?subject=unsubscribe>
List-Archive: <http://www.ietf.org/mail-archive/web/oauth>
List-Post: <mailto:oauth@ietf.org>
List-Help: <mailto:oauth-request@ietf.org?subject=help>
List-Subscribe: <https://www.ietf.org/mailman/listinfo/oauth>, <mailto:oauth-request@ietf.org?subject=subscribe>
X-List-Received-Date: Mon, 25 Feb 2013 22:58:50 -0000

--_000_B33BFB58CCC8BE4998958016839DE27E068A104FIMCMBX01MITREOR_
Content-Type: text/plain; charset="iso-8859-1"
Content-Transfer-Encoding: quoted-printable

>From my read, it's a combination of browser bugs (it only affects Chrome) a=
nd Facebook's insistence on using the Implicit flow for everything.

While I don't at all care for the "sky is falling" rhetoric that seems to f=
ollow OAuth2, the author has some good suggestions for implementations: bin=
ding redirect URIs to particular flows, preference for the code flow, not u=
sing a default redirect_uri on a hosted domain with user-generated content.

But all of these are implementation issues that the OAuth2 protocol can't r=
eally address directly.

-- Justin


On Feb 25, 2013, at 5:42 PM, William Mills <wmills_92105@yahoo.com<mailto:w=
mills_92105@yahoo.com>> wrote:



DOH!!!  http://homakov.blogspot.co.uk/2013/02/hacking-facebook-with-oauth2-=
and-chrome.html

________________________________
From: Phil Hunt <phil.hunt@oracle.com<mailto:phil.hunt@oracle.com>>
To: William Mills <wmills_92105@yahoo.com<mailto:wmills_92105@yahoo.com>>
Sent: Monday, February 25, 2013 2:28 PM
Subject: Re: [OAUTH-WG] OAuth2 attack surface....

Whats the link?

Phil

Sent from my phone.

On 2013-02-25, at 14:22, William Mills <wmills_92105@yahoo.com<mailto:wmill=
s_92105@yahoo.com>> wrote:

I think this is worth a read, I don't have time to dive into this :(
_______________________________________________
OAuth mailing list
OAuth@ietf.org<mailto:OAuth@ietf.org>
https://www.ietf.org/mailman/listinfo/oauth




_______________________________________________
OAuth mailing list
OAuth@ietf.org<mailto:OAuth@ietf.org>
https://www.ietf.org/mailman/listinfo/oauth


--_000_B33BFB58CCC8BE4998958016839DE27E068A104FIMCMBX01MITREOR_
Content-Type: text/html; charset="iso-8859-1"
Content-ID: <ECC850B4E116BA42A4E27D20CF9B8C5A@imc.mitre.org>
Content-Transfer-Encoding: quoted-printable

<html>
<head>
<meta http-equiv=3D"Content-Type" content=3D"text/html; charset=3Diso-8859-=
1">
</head>
<body style=3D"word-wrap: break-word; -webkit-nbsp-mode: space; -webkit-lin=
e-break: after-white-space; ">
>From my read, it's a combination of browser bugs (it only affects Chrome) a=
nd Facebook's insistence on using the Implicit flow for everything.&nbsp;
<div><br>
</div>
<div>While I don't at all care for the &quot;sky is falling&quot; rhetoric =
that seems to follow OAuth2, the author has some good suggestions for imple=
mentations: binding redirect URIs to particular flows, preference for the c=
ode flow, not using a default redirect_uri
 on a hosted domain with user-generated content.</div>
<div><br>
</div>
<div>But all of these are implementation issues that the OAuth2 protocol ca=
n't really address directly.</div>
<div><br>
</div>
<div>-- Justin</div>
<div><br>
</div>
<div><br>
<div>
<div>On Feb 25, 2013, at 5:42 PM, William Mills &lt;<a href=3D"mailto:wmill=
s_92105@yahoo.com">wmills_92105@yahoo.com</a>&gt; wrote:</div>
<br class=3D"Apple-interchange-newline">
<blockquote type=3D"cite">
<div>
<div style=3D"background-color: rgb(255, 255, 255); font-family: 'Courier N=
ew', courier, monaco, monospace, sans-serif; font-size: 12pt; ">
<div><br>
</div>
<div style=3D"font-family: 'Courier New', courier, monaco, monospace, sans-=
serif; font-size: 12pt;">
<div style=3D"font-family: 'times new roman', 'new york', times, serif; fon=
t-size: 12pt;">
<div dir=3D"ltr"></div>
<br>
<div id=3D"yiv721280462">
<div style=3D"background-color: rgb(255, 255, 255); font-family: 'Courier N=
ew', courier, monaco, monospace, sans-serif; font-size: 12pt; ">
<div><span>DOH!!! &nbsp;</span><a rel=3D"nofollow" target=3D"_blank" href=
=3D"http://homakov.blogspot.co.uk/2013/02/hacking-facebook-with-oauth2-and-=
chrome.html" style=3D"font-size:12pt;">http://homakov.blogspot.co.uk/2013/0=
2/hacking-facebook-with-oauth2-and-chrome.html</a></div>
<div><br>
</div>
<div style=3D"font-family: 'Courier New', courier, monaco, monospace, sans-=
serif; font-size: 12pt;">
<div style=3D"font-family: 'times new roman', 'new york', times, serif; fon=
t-size: 12pt;">
<div dir=3D"ltr"><font size=3D"2" face=3D"Arial">
<hr size=3D"1">
<b><span style=3D"font-weight:bold;">From:</span></b> Phil Hunt &lt;<a href=
=3D"mailto:phil.hunt@oracle.com">phil.hunt@oracle.com</a>&gt;<br>
<b><span style=3D"font-weight:bold;">To:</span></b> William Mills &lt;<a hr=
ef=3D"mailto:wmills_92105@yahoo.com">wmills_92105@yahoo.com</a>&gt;
<br>
<b><span style=3D"font-weight:bold;">Sent:</span></b> Monday, February 25, =
2013 2:28 PM<br>
<b><span style=3D"font-weight:bold;">Subject:</span></b> Re: [OAUTH-WG] OAu=
th2 attack surface....<br>
</font></div>
<br>
<div id=3D"yiv721280462">
<div>Whats the link?<br>
<br>
Phil
<div><br>
</div>
<div>Sent from my phone.</div>
</div>
<div><br>
On 2013-02-25, at 14:22, William Mills &lt;<a rel=3D"nofollow" ymailto=3D"m=
ailto:wmills_92105@yahoo.com" target=3D"_blank" href=3D"mailto:wmills_92105=
@yahoo.com">wmills_92105@yahoo.com</a>&gt; wrote:<br>
<br>
</div>
<blockquote type=3D"cite">
<div style=3D"background-color: rgb(255, 255, 255); font-family: 'Courier N=
ew', courier, monaco, monospace, sans-serif; font-size: 12pt; ">
I think this is worth a read, I don't have time to dive into this :(</div>
</blockquote>
<blockquote type=3D"cite"><span>___________________________________________=
____</span><br>
<span>OAuth mailing list</span><br>
<span><a rel=3D"nofollow" ymailto=3D"mailto:OAuth@ietf.org" target=3D"_blan=
k" href=3D"mailto:OAuth@ietf.org">OAuth@ietf.org</a></span><br>
<span><a rel=3D"nofollow" target=3D"_blank" href=3D"https://www.ietf.org/ma=
ilman/listinfo/oauth">https://www.ietf.org/mailman/listinfo/oauth</a></span=
><br>
</blockquote>
</div>
<br>
<br>
</div>
</div>
</div>
</div>
<br>
<br>
</div>
</div>
</div>
</div>
_______________________________________________<br>
OAuth mailing list<br>
<a href=3D"mailto:OAuth@ietf.org">OAuth@ietf.org</a><br>
https://www.ietf.org/mailman/listinfo/oauth<br>
</blockquote>
</div>
<br>
</div>
</body>
</html>

--_000_B33BFB58CCC8BE4998958016839DE27E068A104FIMCMBX01MITREOR_--

From ve7jtb@ve7jtb.com  Mon Feb 25 15:18:34 2013
Return-Path: <ve7jtb@ve7jtb.com>
X-Original-To: oauth@ietfa.amsl.com
Delivered-To: oauth@ietfa.amsl.com
Received: from localhost (localhost [127.0.0.1]) by ietfa.amsl.com (Postfix) with ESMTP id 8ADC821E80DA for <oauth@ietfa.amsl.com>; Mon, 25 Feb 2013 15:18:34 -0800 (PST)
X-Virus-Scanned: amavisd-new at amsl.com
X-Spam-Flag: NO
X-Spam-Score: -3.598
X-Spam-Level: 
X-Spam-Status: No, score=-3.598 tagged_above=-999 required=5 tests=[BAYES_00=-2.599, HTML_MESSAGE=0.001, RCVD_IN_DNSWL_LOW=-1]
Received: from mail.ietf.org ([64.170.98.30]) by localhost (ietfa.amsl.com [127.0.0.1]) (amavisd-new, port 10024) with ESMTP id NCXPRdeUHPdO for <oauth@ietfa.amsl.com>; Mon, 25 Feb 2013 15:18:32 -0800 (PST)
Received: from mail-da0-f42.google.com (mail-da0-f42.google.com [209.85.210.42]) by ietfa.amsl.com (Postfix) with ESMTP id 746CF21E80E2 for <oauth@ietf.org>; Mon, 25 Feb 2013 15:18:32 -0800 (PST)
Received: by mail-da0-f42.google.com with SMTP id z17so1692975dal.15 for <oauth@ietf.org>; Mon, 25 Feb 2013 15:18:32 -0800 (PST)
X-Google-DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=google.com; s=20120113; h=x-received:content-type:mime-version:subject:from:in-reply-to:date :cc:message-id:references:to:x-mailer:x-gm-message-state; bh=G/IhSTdcyjgd4yJBzzCnn1JpPm0zu6VV0a+oQ2sDjL4=; b=UH7lYCmaGbdt0qoyszERt1GLvqSN9FcrR4xAAdqAoioAnuUnDDLCaw9ch6743BzWvU yGReD/B6tJnpYFgslq/hHaBlCx9X1PWLrZf+L/qR42ovDwknE0vev7tBmwVTLDAmX/Xb Y2+NJTvdqmG1aZx5CEBj0x/CVjEkh2nlFcQXFeL8+yJVkeqo+4ZrDR1P+9sjGEonIfCo jPFGAgD/ArMBjH+h8O6yJQyJW/Zao1z11aSz2g8MkaTEgxtsvl8zcv7xTqmrbfZjHaKS sKS3D9EXalyudzEnhZOxnni5gD6L7boN4CCNfX1CyA4br7Zkpf/3Wi2jaNFJjDfwnKH/ 6IFg==
X-Received: by 10.68.237.165 with SMTP id vd5mr20883678pbc.52.1361834311657; Mon, 25 Feb 2013 15:18:31 -0800 (PST)
Received: from [10.10.2.32] ([12.144.179.211]) by mx.google.com with ESMTPS id 1sm14131082pba.32.2013.02.25.15.18.28 (version=TLSv1 cipher=ECDHE-RSA-RC4-SHA bits=128/128); Mon, 25 Feb 2013 15:18:29 -0800 (PST)
Content-Type: multipart/signed; boundary="Apple-Mail=_413CF6BC-6713-4A55-8B56-68250B2605F3"; protocol="application/pkcs7-signature"; micalg=sha1
Mime-Version: 1.0 (Mac OS X Mail 6.2 \(1499\))
From: John Bradley <ve7jtb@ve7jtb.com>
In-Reply-To: <B33BFB58CCC8BE4998958016839DE27E068A104F@IMCMBX01.MITRE.ORG>
Date: Mon, 25 Feb 2013 15:18:26 -0800
Message-Id: <F6BDBB59-8832-4C50-89E9-6844B83BD97E@ve7jtb.com>
References: <1361830944.13340.YahooMailNeo@web31812.mail.mud.yahoo.com> <E4A6D91D-2BC8-4F2E-9B1C-D1362A0E3608@oracle.com> <1361831644.50183.YahooMailNeo@web31801.mail.mud.yahoo.com> <1361832133.97884.YahooMailNeo@web31816.mail.mud.yahoo.com> <B33BFB58CCC8BE4998958016839DE27E068A104F@IMCMBX01.MITRE.ORG>
To: "Richer, Justin P." <jricher@mitre.org>
X-Mailer: Apple Mail (2.1499)
X-Gm-Message-State: ALoCoQnVwe5T3gaDgyF9IZMbjVSMKeVFw3cQ5J83tShNBSszWB5tf8NL/Pw8QDR+61BEbtGOB9hu
Cc: O Auth WG <oauth@ietf.org>
Subject: Re: [OAUTH-WG] OAuth2 attack surface....
X-BeenThere: oauth@ietf.org
X-Mailman-Version: 2.1.12
Precedence: list
List-Id: OAUTH WG <oauth.ietf.org>
List-Unsubscribe: <https://www.ietf.org/mailman/options/oauth>, <mailto:oauth-request@ietf.org?subject=unsubscribe>
List-Archive: <http://www.ietf.org/mail-archive/web/oauth>
List-Post: <mailto:oauth@ietf.org>
List-Help: <mailto:oauth-request@ietf.org?subject=help>
List-Subscribe: <https://www.ietf.org/mailman/listinfo/oauth>, <mailto:oauth-request@ietf.org?subject=subscribe>
X-List-Received-Date: Mon, 25 Feb 2013 23:18:34 -0000

--Apple-Mail=_413CF6BC-6713-4A55-8B56-68250B2605F3
Content-Type: multipart/alternative;
	boundary="Apple-Mail=_63E32935-8AB5-4B87-BC35-D76F9100757B"


--Apple-Mail=_63E32935-8AB5-4B87-BC35-D76F9100757B
Content-Transfer-Encoding: quoted-printable
Content-Type: text/plain;
	charset=iso-8859-1

Agreed, though we can't assume that there won't be other browser bugs =
that can be exploited in similar ways.=20

Facebook automatically adding there debug page to the redirect URI of =
every client was...

We need to reenforce care around redirect URI, Connect is much more =
restrictive than OAuth.=20

I think client registering it's response types is a good idea,  I see it =
is already in the IETF registration spec.

John B.

On 2013-02-25, at 2:58 PM, "Richer, Justin P." <jricher@mitre.org> =
wrote:

> =46rom my read, it's a combination of browser bugs (it only affects =
Chrome) and Facebook's insistence on using the Implicit flow for =
everything.=20
>=20
> While I don't at all care for the "sky is falling" rhetoric that seems =
to follow OAuth2, the author has some good suggestions for =
implementations: binding redirect URIs to particular flows, preference =
for the code flow, not using a default redirect_uri on a hosted domain =
with user-generated content.
>=20
> But all of these are implementation issues that the OAuth2 protocol =
can't really address directly.
>=20
> -- Justin
>=20
>=20
> On Feb 25, 2013, at 5:42 PM, William Mills <wmills_92105@yahoo.com> =
wrote:
>=20
>>=20
>>=20
>> DOH!!!  =
http://homakov.blogspot.co.uk/2013/02/hacking-facebook-with-oauth2-and-chr=
ome.html
>>=20
>> From: Phil Hunt <phil.hunt@oracle.com>
>> To: William Mills <wmills_92105@yahoo.com>=20
>> Sent: Monday, February 25, 2013 2:28 PM
>> Subject: Re: [OAUTH-WG] OAuth2 attack surface....
>>=20
>> Whats the link?
>>=20
>> Phil
>>=20
>> Sent from my phone.
>>=20
>> On 2013-02-25, at 14:22, William Mills <wmills_92105@yahoo.com> =
wrote:
>>=20
>>> I think this is worth a read, I don't have time to dive into this :(
>>> _______________________________________________
>>> OAuth mailing list
>>> OAuth@ietf.org
>>> https://www.ietf.org/mailman/listinfo/oauth
>>=20
>>=20
>>=20
>>=20
>> _______________________________________________
>> OAuth mailing list
>> OAuth@ietf.org
>> https://www.ietf.org/mailman/listinfo/oauth
>=20
> _______________________________________________
> OAuth mailing list
> OAuth@ietf.org
> https://www.ietf.org/mailman/listinfo/oauth


--Apple-Mail=_63E32935-8AB5-4B87-BC35-D76F9100757B
Content-Transfer-Encoding: quoted-printable
Content-Type: text/html;
	charset=iso-8859-1

<html><head><meta http-equiv=3D"Content-Type" content=3D"text/html =
charset=3Diso-8859-1"></head><body style=3D"word-wrap: break-word; =
-webkit-nbsp-mode: space; -webkit-line-break: after-white-space; =
">Agreed, though we can't assume that there won't be other browser bugs =
that can be exploited in similar ways.&nbsp;<div><br></div><div>Facebook =
automatically adding there debug page to the redirect URI of every =
client was...</div><div><br></div><div>We need to reenforce care around =
redirect URI, Connect is much more restrictive than =
OAuth.&nbsp;</div><div><br></div><div>I think client registering it's =
response types is a good idea, &nbsp;I see it is already in the IETF =
registration spec.</div><div><br></div><div>John =
B.</div><div><br></div><div><div><div>On 2013-02-25, at 2:58 PM, =
"Richer, Justin P." &lt;<a =
href=3D"mailto:jricher@mitre.org">jricher@mitre.org</a>&gt; =
wrote:</div><br class=3D"Apple-interchange-newline"><blockquote =
type=3D"cite">

<meta http-equiv=3D"Content-Type" content=3D"text/html; =
charset=3Diso-8859-1">

<div style=3D"word-wrap: break-word; -webkit-nbsp-mode: space; =
-webkit-line-break: after-white-space; ">
=46rom my read, it's a combination of browser bugs (it only affects =
Chrome) and Facebook's insistence on using the Implicit flow for =
everything.&nbsp;
<div><br>
</div>
<div>While I don't at all care for the "sky is falling" rhetoric that =
seems to follow OAuth2, the author has some good suggestions for =
implementations: binding redirect URIs to particular flows, preference =
for the code flow, not using a default redirect_uri
 on a hosted domain with user-generated content.</div>
<div><br>
</div>
<div>But all of these are implementation issues that the OAuth2 protocol =
can't really address directly.</div>
<div><br>
</div>
<div>-- Justin</div>
<div><br>
</div>
<div><br>
<div>
<div>On Feb 25, 2013, at 5:42 PM, William Mills &lt;<a =
href=3D"mailto:wmills_92105@yahoo.com">wmills_92105@yahoo.com</a>&gt; =
wrote:</div>
<br class=3D"Apple-interchange-newline">
<blockquote type=3D"cite">
<div>
<div style=3D"background-color: rgb(255, 255, 255); font-family: =
'Courier New', courier, monaco, monospace, sans-serif; font-size: 12pt; =
">
<div><br>
</div>
<div style=3D"font-family: 'Courier New', courier, monaco, monospace, =
sans-serif; font-size: 12pt;">
<div style=3D"font-family: 'times new roman', 'new york', times, serif; =
font-size: 12pt;">
<div dir=3D"ltr"></div>
<br>
<div id=3D"yiv721280462">
<div style=3D"background-color: rgb(255, 255, 255); font-family: =
'Courier New', courier, monaco, monospace, sans-serif; font-size: 12pt; =
">
<div><span>DOH!!! &nbsp;</span><a rel=3D"nofollow" target=3D"_blank" =
href=3D"http://homakov.blogspot.co.uk/2013/02/hacking-facebook-with-oauth2=
-and-chrome.html" =
style=3D"font-size:12pt;">http://homakov.blogspot.co.uk/2013/02/hacking-fa=
cebook-with-oauth2-and-chrome.html</a></div>
<div><br>
</div>
<div style=3D"font-family: 'Courier New', courier, monaco, monospace, =
sans-serif; font-size: 12pt;">
<div style=3D"font-family: 'times new roman', 'new york', times, serif; =
font-size: 12pt;">
<div dir=3D"ltr"><font size=3D"2" face=3D"Arial">
<hr size=3D"1">
<b><span style=3D"font-weight:bold;">From:</span></b> Phil Hunt &lt;<a =
href=3D"mailto:phil.hunt@oracle.com">phil.hunt@oracle.com</a>&gt;<br>
<b><span style=3D"font-weight:bold;">To:</span></b> William Mills &lt;<a =
href=3D"mailto:wmills_92105@yahoo.com">wmills_92105@yahoo.com</a>&gt;
<br>
<b><span style=3D"font-weight:bold;">Sent:</span></b> Monday, February =
25, 2013 2:28 PM<br>
<b><span style=3D"font-weight:bold;">Subject:</span></b> Re: [OAUTH-WG] =
OAuth2 attack surface....<br>
</font></div>
<br>
<div id=3D"yiv721280462">
<div>Whats the link?<br>
<br>
Phil
<div><br>
</div>
<div>Sent from my phone.</div>
</div>
<div><br>
On 2013-02-25, at 14:22, William Mills &lt;<a rel=3D"nofollow" =
ymailto=3D"mailto:wmills_92105@yahoo.com" target=3D"_blank" =
href=3D"mailto:wmills_92105@yahoo.com">wmills_92105@yahoo.com</a>&gt; =
wrote:<br>
<br>
</div>
<blockquote type=3D"cite">
<div style=3D"background-color: rgb(255, 255, 255); font-family: =
'Courier New', courier, monaco, monospace, sans-serif; font-size: 12pt; =
">
I think this is worth a read, I don't have time to dive into this =
:(</div>
</blockquote>
<blockquote =
type=3D"cite"><span>_______________________________________________</span>=
<br>
<span>OAuth mailing list</span><br>
<span><a rel=3D"nofollow" ymailto=3D"mailto:OAuth@ietf.org" =
target=3D"_blank" =
href=3D"mailto:OAuth@ietf.org">OAuth@ietf.org</a></span><br>
<span><a rel=3D"nofollow" target=3D"_blank" =
href=3D"https://www.ietf.org/mailman/listinfo/oauth">https://www.ietf.org/=
mailman/listinfo/oauth</a></span><br>
</blockquote>
</div>
<br>
<br>
</div>
</div>
</div>
</div>
<br>
<br>
</div>
</div>
</div>
</div>
_______________________________________________<br>
OAuth mailing list<br>
<a href=3D"mailto:OAuth@ietf.org">OAuth@ietf.org</a><br>
<a =
href=3D"https://www.ietf.org/mailman/listinfo/oauth">https://www.ietf.org/=
mailman/listinfo/oauth</a><br>
</blockquote>
</div>
<br>
</div>
</div>

_______________________________________________<br>OAuth mailing =
list<br><a =
href=3D"mailto:OAuth@ietf.org">OAuth@ietf.org</a><br>https://www.ietf.org/=
mailman/listinfo/oauth<br></blockquote></div><br></div></body></html>=

--Apple-Mail=_63E32935-8AB5-4B87-BC35-D76F9100757B--

--Apple-Mail=_413CF6BC-6713-4A55-8B56-68250B2605F3
Content-Disposition: attachment;
	filename=smime.p7s
Content-Type: application/pkcs7-signature;
	name=smime.p7s
Content-Transfer-Encoding: base64
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--Apple-Mail=_413CF6BC-6713-4A55-8B56-68250B2605F3--

From dick.hardt@gmail.com  Mon Feb 25 17:42:58 2013
Return-Path: <dick.hardt@gmail.com>
X-Original-To: oauth@ietfa.amsl.com
Delivered-To: oauth@ietfa.amsl.com
Received: from localhost (localhost [127.0.0.1]) by ietfa.amsl.com (Postfix) with ESMTP id DBF241F0D11 for <oauth@ietfa.amsl.com>; Mon, 25 Feb 2013 17:42:54 -0800 (PST)
X-Virus-Scanned: amavisd-new at amsl.com
X-Spam-Flag: NO
X-Spam-Score: -3.598
X-Spam-Level: 
X-Spam-Status: No, score=-3.598 tagged_above=-999 required=5 tests=[BAYES_00=-2.599, HTML_MESSAGE=0.001, RCVD_IN_DNSWL_LOW=-1]
Received: from mail.ietf.org ([64.170.98.30]) by localhost (ietfa.amsl.com [127.0.0.1]) (amavisd-new, port 10024) with ESMTP id guw-2LCZYqRO for <oauth@ietfa.amsl.com>; Mon, 25 Feb 2013 17:42:53 -0800 (PST)
Received: from mail-pa0-f48.google.com (mail-pa0-f48.google.com [209.85.220.48]) by ietfa.amsl.com (Postfix) with ESMTP id A337E21E8127 for <oauth@ietf.org>; Mon, 25 Feb 2013 17:42:53 -0800 (PST)
Received: by mail-pa0-f48.google.com with SMTP id hz10so2082036pad.21 for <oauth@ietf.org>; Mon, 25 Feb 2013 17:42:53 -0800 (PST)
DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=gmail.com; s=20120113; h=x-received:content-type:mime-version:subject:from:in-reply-to:date :cc:message-id:references:to:x-mailer; bh=/i9NJNFSHSW3tctsvCu2EbAjv6tsYPOuOl79/KKHmGU=; b=NVOx96ZtbwrqAME0Z676EdLCFR4d2vF2+ouyH2kBQB17oKzb+RIZzMZAAtbPlBi2jO /GLejbMw/lvHXtXyESzcLHkIKL7E9tEWAloLZQXyTayCy1RpJfTrKpyw5HFc/hBuUBAQ 4njoiAo+PXMsIGVyVzzK5LTf/lmPudNB85PofCAlUbnVzxApNYZXvjPTzXwRQT2I69IP dyDK3rWyyCm8eF4I+mtLxVU4U5EbPGPqA1T8k1irTt2Y03sPiZfhsgO4wXabrRHJMOYc Y55EMyBNrEMPSJZoMBvJDrTNI9I5wb+EavIbjsC5vWnfFN1FAq0r6mFW738Q6p5wIc1w sUcA==
X-Received: by 10.66.251.162 with SMTP id zl2mr22398866pac.36.1361842973487; Mon, 25 Feb 2013 17:42:53 -0800 (PST)
Received: from airstream.lan (S01061caff7df80fa.vc.shawcable.net. [24.85.86.234]) by mx.google.com with ESMTPS id hs8sm14505549pbc.27.2013.02.25.17.42.48 (version=TLSv1 cipher=ECDHE-RSA-RC4-SHA bits=128/128); Mon, 25 Feb 2013 17:42:51 -0800 (PST)
Content-Type: multipart/alternative; boundary="Apple-Mail=_E7673573-BBBD-4563-8472-742E32E336EA"
Mime-Version: 1.0 (Mac OS X Mail 6.2 \(1499\))
From: Dick Hardt <dick.hardt@gmail.com>
In-Reply-To: <B33BFB58CCC8BE4998958016839DE27E068A104F@IMCMBX01.MITRE.ORG>
Date: Mon, 25 Feb 2013 17:42:05 -0800
Message-Id: <535B0BAF-DA71-4B8E-914C-1523714EF0C6@gmail.com>
References: <1361830944.13340.YahooMailNeo@web31812.mail.mud.yahoo.com> <E4A6D91D-2BC8-4F2E-9B1C-D1362A0E3608@oracle.com> <1361831644.50183.YahooMailNeo@web31801.mail.mud.yahoo.com> <1361832133.97884.YahooMailNeo@web31816.mail.mud.yahoo.com> <B33BFB58CCC8BE4998958016839DE27E068A104F@IMCMBX01.MITRE.ORG>
To: "Richer, Justin P." <jricher@mitre.org>
X-Mailer: Apple Mail (2.1499)
Cc: O Auth WG <oauth@ietf.org>
Subject: Re: [OAUTH-WG] OAuth2 attack surface....
X-BeenThere: oauth@ietf.org
X-Mailman-Version: 2.1.12
Precedence: list
List-Id: OAUTH WG <oauth.ietf.org>
List-Unsubscribe: <https://www.ietf.org/mailman/options/oauth>, <mailto:oauth-request@ietf.org?subject=unsubscribe>
List-Archive: <http://www.ietf.org/mail-archive/web/oauth>
List-Post: <mailto:oauth@ietf.org>
List-Help: <mailto:oauth-request@ietf.org?subject=help>
List-Subscribe: <https://www.ietf.org/mailman/listinfo/oauth>, <mailto:oauth-request@ietf.org?subject=subscribe>
X-List-Received-Date: Tue, 26 Feb 2013 01:42:58 -0000

--Apple-Mail=_E7673573-BBBD-4563-8472-742E32E336EA
Content-Transfer-Encoding: quoted-printable
Content-Type: text/plain;
	charset=windows-1252

I once again kick myself for not noticing the implicit flow was inserted =
into the spec =85 hopefully the warning labels keep others from =
supporting the implicit flow =85 but additional messaging about not =
supporting implicit flow would be useful.

I can see why Facebook wanted it for the content merging it provides, =
but it should likely have been a different API and authorization =
process.

On Feb 25, 2013, at 2:58 PM, "Richer, Justin P." <jricher@mitre.org> =
wrote:

> =46rom my read, it's a combination of browser bugs (it only affects =
Chrome) and Facebook's insistence on using the Implicit flow for =
everything.=20
>=20
> While I don't at all care for the "sky is falling" rhetoric that seems =
to follow OAuth2, the author has some good suggestions for =
implementations: binding redirect URIs to particular flows, preference =
for the code flow, not using a default redirect_uri on a hosted domain =
with user-generated content.
>=20
> But all of these are implementation issues that the OAuth2 protocol =
can't really address directly.
>=20
> -- Justin
>=20
>=20
> On Feb 25, 2013, at 5:42 PM, William Mills <wmills_92105@yahoo.com> =
wrote:
>=20
>>=20
>>=20
>> DOH!!!  =
http://homakov.blogspot.co.uk/2013/02/hacking-facebook-with-oauth2-and-chr=
ome.html
>>=20
>> From: Phil Hunt <phil.hunt@oracle.com>
>> To: William Mills <wmills_92105@yahoo.com>=20
>> Sent: Monday, February 25, 2013 2:28 PM
>> Subject: Re: [OAUTH-WG] OAuth2 attack surface....
>>=20
>> Whats the link?
>>=20
>> Phil
>>=20
>> Sent from my phone.
>>=20
>> On 2013-02-25, at 14:22, William Mills <wmills_92105@yahoo.com> =
wrote:
>>=20
>>> I think this is worth a read, I don't have time to dive into this :(
>>> _______________________________________________
>>> OAuth mailing list
>>> OAuth@ietf.org
>>> https://www.ietf.org/mailman/listinfo/oauth
>>=20
>>=20
>>=20
>>=20
>> _______________________________________________
>> OAuth mailing list
>> OAuth@ietf.org
>> https://www.ietf.org/mailman/listinfo/oauth
>=20
> _______________________________________________
> OAuth mailing list
> OAuth@ietf.org
> https://www.ietf.org/mailman/listinfo/oauth


--Apple-Mail=_E7673573-BBBD-4563-8472-742E32E336EA
Content-Transfer-Encoding: quoted-printable
Content-Type: text/html;
	charset=windows-1252

<html><head><meta http-equiv=3D"Content-Type" content=3D"text/html =
charset=3Dwindows-1252"></head><body style=3D"word-wrap: break-word; =
-webkit-nbsp-mode: space; -webkit-line-break: after-white-space; ">I =
once again kick myself for not noticing the implicit flow was inserted =
into the spec =85 hopefully the warning labels keep others from =
supporting the implicit flow =85 but additional messaging about not =
supporting implicit flow would be useful.<div><br></div><div>I can see =
why Facebook wanted it for the content merging it provides, but it =
should likely have been a different API and authorization =
process.<br><div><br><div><div>On Feb 25, 2013, at 2:58 PM, "Richer, =
Justin P." &lt;<a =
href=3D"mailto:jricher@mitre.org">jricher@mitre.org</a>&gt; =
wrote:</div><br class=3D"Apple-interchange-newline"><blockquote =
type=3D"cite">

<meta http-equiv=3D"Content-Type" content=3D"text/html; =
charset=3Diso-8859-1">

<div style=3D"word-wrap: break-word; -webkit-nbsp-mode: space; =
-webkit-line-break: after-white-space; ">
=46rom my read, it's a combination of browser bugs (it only affects =
Chrome) and Facebook's insistence on using the Implicit flow for =
everything.&nbsp;
<div><br>
</div>
<div>While I don't at all care for the "sky is falling" rhetoric that =
seems to follow OAuth2, the author has some good suggestions for =
implementations: binding redirect URIs to particular flows, preference =
for the code flow, not using a default redirect_uri
 on a hosted domain with user-generated content.</div>
<div><br>
</div>
<div>But all of these are implementation issues that the OAuth2 protocol =
can't really address directly.</div>
<div><br>
</div>
<div>-- Justin</div>
<div><br>
</div>
<div><br>
<div>
<div>On Feb 25, 2013, at 5:42 PM, William Mills &lt;<a =
href=3D"mailto:wmills_92105@yahoo.com">wmills_92105@yahoo.com</a>&gt; =
wrote:</div>
<br class=3D"Apple-interchange-newline">
<blockquote type=3D"cite">
<div>
<div style=3D"background-color: rgb(255, 255, 255); font-family: =
'Courier New', courier, monaco, monospace, sans-serif; font-size: 12pt; =
">
<div><br>
</div>
<div style=3D"font-family: 'Courier New', courier, monaco, monospace, =
sans-serif; font-size: 12pt;">
<div style=3D"font-family: 'times new roman', 'new york', times, serif; =
font-size: 12pt;">
<div dir=3D"ltr"></div>
<br>
<div id=3D"yiv721280462">
<div style=3D"background-color: rgb(255, 255, 255); font-family: =
'Courier New', courier, monaco, monospace, sans-serif; font-size: 12pt; =
">
<div><span>DOH!!! &nbsp;</span><a rel=3D"nofollow" target=3D"_blank" =
href=3D"http://homakov.blogspot.co.uk/2013/02/hacking-facebook-with-oauth2=
-and-chrome.html" =
style=3D"font-size:12pt;">http://homakov.blogspot.co.uk/2013/02/hacking-fa=
cebook-with-oauth2-and-chrome.html</a></div>
<div><br>
</div>
<div style=3D"font-family: 'Courier New', courier, monaco, monospace, =
sans-serif; font-size: 12pt;">
<div style=3D"font-family: 'times new roman', 'new york', times, serif; =
font-size: 12pt;">
<div dir=3D"ltr"><font size=3D"2" face=3D"Arial">
<hr size=3D"1">
<b><span style=3D"font-weight:bold;">From:</span></b> Phil Hunt &lt;<a =
href=3D"mailto:phil.hunt@oracle.com">phil.hunt@oracle.com</a>&gt;<br>
<b><span style=3D"font-weight:bold;">To:</span></b> William Mills &lt;<a =
href=3D"mailto:wmills_92105@yahoo.com">wmills_92105@yahoo.com</a>&gt;
<br>
<b><span style=3D"font-weight:bold;">Sent:</span></b> Monday, February =
25, 2013 2:28 PM<br>
<b><span style=3D"font-weight:bold;">Subject:</span></b> Re: [OAUTH-WG] =
OAuth2 attack surface....<br>
</font></div>
<br>
<div id=3D"yiv721280462">
<div>Whats the link?<br>
<br>
Phil
<div><br>
</div>
<div>Sent from my phone.</div>
</div>
<div><br>
On 2013-02-25, at 14:22, William Mills &lt;<a rel=3D"nofollow" =
ymailto=3D"mailto:wmills_92105@yahoo.com" target=3D"_blank" =
href=3D"mailto:wmills_92105@yahoo.com">wmills_92105@yahoo.com</a>&gt; =
wrote:<br>
<br>
</div>
<blockquote type=3D"cite">
<div style=3D"background-color: rgb(255, 255, 255); font-family: =
'Courier New', courier, monaco, monospace, sans-serif; font-size: 12pt; =
">
I think this is worth a read, I don't have time to dive into this =
:(</div>
</blockquote>
<blockquote =
type=3D"cite"><span>_______________________________________________</span>=
<br>
<span>OAuth mailing list</span><br>
<span><a rel=3D"nofollow" ymailto=3D"mailto:OAuth@ietf.org" =
target=3D"_blank" =
href=3D"mailto:OAuth@ietf.org">OAuth@ietf.org</a></span><br>
<span><a rel=3D"nofollow" target=3D"_blank" =
href=3D"https://www.ietf.org/mailman/listinfo/oauth">https://www.ietf.org/=
mailman/listinfo/oauth</a></span><br>
</blockquote>
</div>
<br>
<br>
</div>
</div>
</div>
</div>
<br>
<br>
</div>
</div>
</div>
</div>
_______________________________________________<br>
OAuth mailing list<br>
<a href=3D"mailto:OAuth@ietf.org">OAuth@ietf.org</a><br>
<a =
href=3D"https://www.ietf.org/mailman/listinfo/oauth">https://www.ietf.org/=
mailman/listinfo/oauth</a><br>
</blockquote>
</div>
<br>
</div>
</div>

_______________________________________________<br>OAuth mailing =
list<br><a =
href=3D"mailto:OAuth@ietf.org">OAuth@ietf.org</a><br>https://www.ietf.org/=
mailman/listinfo/oauth<br></blockquote></div><br></div></div></body></html=
>=

--Apple-Mail=_E7673573-BBBD-4563-8472-742E32E336EA--

From asanso@adobe.com  Mon Feb 25 23:23:11 2013
Return-Path: <asanso@adobe.com>
X-Original-To: oauth@ietfa.amsl.com
Delivered-To: oauth@ietfa.amsl.com
Received: from localhost (localhost [127.0.0.1]) by ietfa.amsl.com (Postfix) with ESMTP id C90D021F9048 for <oauth@ietfa.amsl.com>; Mon, 25 Feb 2013 23:23:10 -0800 (PST)
X-Virus-Scanned: amavisd-new at amsl.com
X-Spam-Flag: NO
X-Spam-Score: -106.598
X-Spam-Level: 
X-Spam-Status: No, score=-106.598 tagged_above=-999 required=5 tests=[AWL=-0.000, BAYES_00=-2.599, HTML_MESSAGE=0.001, RCVD_IN_DNSWL_MED=-4, USER_IN_WHITELIST=-100]
Received: from mail.ietf.org ([64.170.98.30]) by localhost (ietfa.amsl.com [127.0.0.1]) (amavisd-new, port 10024) with ESMTP id pdkdTnUZBMQs for <oauth@ietfa.amsl.com>; Mon, 25 Feb 2013 23:23:10 -0800 (PST)
Received: from exprod6og116.obsmtp.com (exprod6og116.obsmtp.com [64.18.1.37]) by ietfa.amsl.com (Postfix) with ESMTP id C3A5121F8202 for <oauth@ietf.org>; Mon, 25 Feb 2013 23:22:56 -0800 (PST)
Received: from outbound-smtp-1.corp.adobe.com ([192.150.11.134]) by exprod6ob116.postini.com ([64.18.5.12]) with SMTP ID DSNKUSxi0HAKOKgAQGj4lSPpQNq6XnUTnHHZ@postini.com; Mon, 25 Feb 2013 23:22:57 PST
Received: from inner-relay-4.eur.adobe.com (inner-relay-4.adobe.com [193.104.215.14]) by outbound-smtp-1.corp.adobe.com (8.12.10/8.12.10) with ESMTP id r1Q7Jp1v009739; Mon, 25 Feb 2013 23:19:52 -0800 (PST)
Received: from nahub02.corp.adobe.com (nahub02.corp.adobe.com [10.8.189.98]) by inner-relay-4.eur.adobe.com (8.12.10/8.12.9) with ESMTP id r1Q7MrXL008650; Mon, 25 Feb 2013 23:22:54 -0800 (PST)
Received: from eurhub01.eur.adobe.com (10.128.4.30) by nahub02.corp.adobe.com (10.8.189.98) with Microsoft SMTP Server (TLS) id 8.3.298.1; Mon, 25 Feb 2013 23:22:53 -0800
Received: from eurmbx01.eur.adobe.com ([10.128.4.32]) by eurhub01.eur.adobe.com ([10.128.4.30]) with mapi; Tue, 26 Feb 2013 07:22:51 +0000
From: Antonio Sanso <asanso@adobe.com>
To: William Mills <wmills_92105@yahoo.com>
Date: Tue, 26 Feb 2013 07:22:43 +0000
Thread-Topic: [OAUTH-WG] OAuth2 attack surface....
Thread-Index: Ac4T8hX+ornJ06p4Q/GOM6EBidUikg==
Message-ID: <140EEABC-2787-4D9A-A1C5-6C973FED5BC8@adobe.com>
References: <1361830944.13340.YahooMailNeo@web31812.mail.mud.yahoo.com> <E4A6D91D-2BC8-4F2E-9B1C-D1362A0E3608@oracle.com> <1361831644.50183.YahooMailNeo@web31801.mail.mud.yahoo.com> <1361832133.97884.YahooMailNeo@web31816.mail.mud.yahoo.com>
In-Reply-To: <1361832133.97884.YahooMailNeo@web31816.mail.mud.yahoo.com>
Accept-Language: en-US
Content-Language: en-US
X-MS-Has-Attach: 
X-MS-TNEF-Correlator: 
acceptlanguage: en-US
Content-Type: multipart/alternative; boundary="_000_140EEABC27874D9AA1C56C973FED5BC8adobecom_"
MIME-Version: 1.0
Cc: O Auth WG <oauth@ietf.org>
Subject: Re: [OAUTH-WG] OAuth2 attack surface....
X-BeenThere: oauth@ietf.org
X-Mailman-Version: 2.1.12
Precedence: list
List-Id: OAUTH WG <oauth.ietf.org>
List-Unsubscribe: <https://www.ietf.org/mailman/options/oauth>, <mailto:oauth-request@ietf.org?subject=unsubscribe>
List-Archive: <http://www.ietf.org/mail-archive/web/oauth>
List-Post: <mailto:oauth@ietf.org>
List-Help: <mailto:oauth-request@ietf.org?subject=help>
List-Subscribe: <https://www.ietf.org/mailman/listinfo/oauth>, <mailto:oauth-request@ietf.org?subject=subscribe>
X-List-Received-Date: Tue, 26 Feb 2013 07:23:11 -0000

--_000_140EEABC27874D9AA1C56C973FED5BC8adobecom_
Content-Type: text/plain; charset="us-ascii"
Content-Transfer-Encoding: quoted-printable

And a different one (still exploiting redirection and still implementation =
mistake) http://www.nirgoldshlager.com/2013/02/how-i-hacked-facebook-oauth-=
to-get-full.html

Regards

Antonio

On Feb 25, 2013, at 11:42 PM, William Mills wrote:



DOH!!!  http://homakov.blogspot.co.uk/2013/02/hacking-facebook-with-oauth2-=
and-chrome.html

________________________________
From: Phil Hunt <phil.hunt@oracle.com<mailto:phil.hunt@oracle.com>>
To: William Mills <wmills_92105@yahoo.com<mailto:wmills_92105@yahoo.com>>
Sent: Monday, February 25, 2013 2:28 PM
Subject: Re: [OAUTH-WG] OAuth2 attack surface....

Whats the link?

Phil

Sent from my phone.

On 2013-02-25, at 14:22, William Mills <wmills_92105@yahoo.com<mailto:wmill=
s_92105@yahoo.com>> wrote:

I think this is worth a read, I don't have time to dive into this :(
_______________________________________________
OAuth mailing list
OAuth@ietf.org<mailto:OAuth@ietf.org>
https://www.ietf.org/mailman/listinfo/oauth




_______________________________________________
OAuth mailing list
OAuth@ietf.org<mailto:OAuth@ietf.org>
https://www.ietf.org/mailman/listinfo/oauth


--_000_140EEABC27874D9AA1C56C973FED5BC8adobecom_
Content-Type: text/html; charset="us-ascii"
Content-Transfer-Encoding: quoted-printable

<html><head></head><body style=3D"word-wrap: break-word; -webkit-nbsp-mode:=
 space; -webkit-line-break: after-white-space; ">And a different one (still=
 exploiting redirection and still implementation mistake)&nbsp;<a href=3D"h=
ttp://www.nirgoldshlager.com/2013/02/how-i-hacked-facebook-oauth-to-get-ful=
l.html">http://www.nirgoldshlager.com/2013/02/how-i-hacked-facebook-oauth-t=
o-get-full.html</a><div><br></div><div>Regards</div><div><br></div><div>Ant=
onio</div><div><br></div><div><div><div>On Feb 25, 2013, at 11:42 PM, Willi=
am Mills wrote:</div><br class=3D"Apple-interchange-newline"><blockquote ty=
pe=3D"cite"><div><div style=3D"color:#000; background-color:#fff; font-fami=
ly:Courier New, courier, monaco, monospace, sans-serif;font-size:12pt"><div=
><br></div><div style=3D"font-family: 'Courier New', courier, monaco, monos=
pace, sans-serif; font-size: 12pt;"><div style=3D"font-family: 'times new r=
oman', 'new york', times, serif; font-size: 12pt;"><div dir=3D"ltr"> </div>=
 <br>
<div id=3D"yiv721280462"><div><div style=3D"color: rgb(0, 0, 0); background=
-color: rgb(255, 255, 255); font-family: 'Courier New', courier, monaco, mo=
nospace, sans-serif; font-size: 12pt;"><div><span>DOH!!! &nbsp;</span><a re=
l=3D"nofollow" target=3D"_blank" href=3D"http://homakov.blogspot.co.uk/2013=
/02/hacking-facebook-with-oauth2-and-chrome.html" style=3D"font-size:12pt;"=
>http://homakov.blogspot.co.uk/2013/02/hacking-facebook-with-oauth2-and-chr=
ome.html</a></div><div><br></div>  <div style=3D"font-family: 'Courier New'=
, courier, monaco, monospace, sans-serif; font-size: 12pt;"> <div style=3D"=
font-family: 'times new roman', 'new york', times, serif; font-size: 12pt;"=
> <div dir=3D"ltr"> <font size=3D"2" face=3D"Arial"> <hr size=3D"1">  <b><s=
pan style=3D"font-weight:bold;">From:</span></b> Phil Hunt &lt;<a href=3D"m=
ailto:phil.hunt@oracle.com">phil.hunt@oracle.com</a>&gt;<br> <b><span style=
=3D"font-weight:bold;">To:</span></b> William Mills &lt;<a href=3D"mailto:w=
mills_92105@yahoo.com">wmills_92105@yahoo.com</a>&gt; <br> <b><span style=
=3D"font-weight:bold;">Sent:</span></b>
 Monday, February 25, 2013 2:28 PM<br>
 <b><span style=3D"font-weight:bold;">Subject:</span></b> Re: [OAUTH-WG] OA=
uth2 attack surface....<br> </font> </div> <br>
<div id=3D"yiv721280462"><div><div>Whats the link?<br><br>Phil<div><br></di=
v><div>Sent from my phone.</div></div><div><br>On 2013-02-25, at 14:22, Wil=
liam Mills &lt;<a rel=3D"nofollow" ymailto=3D"mailto:wmills_92105@yahoo.com=
" target=3D"_blank" href=3D"mailto:wmills_92105@yahoo.com">wmills_92105@yah=
oo.com</a>&gt; wrote:<br><br></div><blockquote type=3D"cite"><div><div styl=
e=3D"color: rgb(0, 0, 0); background-color: rgb(255, 255, 255); font-family=
: 'Courier New', courier, monaco, monospace, sans-serif; font-size: 12pt;">=
<div>I think this is worth a read, I don't have time to dive into this :(</=
div></div></div></blockquote><blockquote type=3D"cite"><div><span>_________=
______________________________________</span><br><span>OAuth mailing list</=
span><br><span><a rel=3D"nofollow" ymailto=3D"mailto:OAuth@ietf.org" target=
=3D"_blank" href=3D"mailto:OAuth@ietf.org">OAuth@ietf.org</a></span><br><sp=
an><a rel=3D"nofollow" target=3D"_blank" href=3D"https://www.ietf.org/mailm=
an/listinfo/oauth">https://www.ietf.org/mailman/listinfo/oauth</a></span><b=
r></div></blockquote></div></div><br><br> </div> </div>  </div></div></div>=
<br><br> </div> </div>  </div></div>_______________________________________=
________<br>OAuth mailing list<br><a href=3D"mailto:OAuth@ietf.org">OAuth@i=
etf.org</a><br>https://www.ietf.org/mailman/listinfo/oauth<br></blockquote>=
</div><br></div></body></html>=

--_000_140EEABC27874D9AA1C56C973FED5BC8adobecom_--

From sberyozkin@gmail.com  Tue Feb 26 04:36:29 2013
Return-Path: <sberyozkin@gmail.com>
X-Original-To: oauth@ietfa.amsl.com
Delivered-To: oauth@ietfa.amsl.com
Received: from localhost (localhost [127.0.0.1]) by ietfa.amsl.com (Postfix) with ESMTP id 5609121F8921 for <oauth@ietfa.amsl.com>; Tue, 26 Feb 2013 04:36:29 -0800 (PST)
X-Virus-Scanned: amavisd-new at amsl.com
X-Spam-Flag: NO
X-Spam-Score: -2.883
X-Spam-Level: 
X-Spam-Status: No, score=-2.883 tagged_above=-999 required=5 tests=[AWL=-0.484, BAYES_00=-2.599, J_CHICKENPOX_33=0.6, J_CHICKENPOX_63=0.6, RCVD_IN_DNSWL_LOW=-1]
Received: from mail.ietf.org ([64.170.98.30]) by localhost (ietfa.amsl.com [127.0.0.1]) (amavisd-new, port 10024) with ESMTP id KdMkO6HyFTA3 for <oauth@ietfa.amsl.com>; Tue, 26 Feb 2013 04:36:28 -0800 (PST)
Received: from mail-ee0-f48.google.com (mail-ee0-f48.google.com [74.125.83.48]) by ietfa.amsl.com (Postfix) with ESMTP id E421C21F8821 for <oauth@ietf.org>; Tue, 26 Feb 2013 04:36:27 -0800 (PST)
Received: by mail-ee0-f48.google.com with SMTP id t10so2322209eei.21 for <oauth@ietf.org>; Tue, 26 Feb 2013 04:36:27 -0800 (PST)
DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=gmail.com; s=20120113; h=x-received:message-id:date:from:user-agent:mime-version:to:subject :references:in-reply-to:content-type:content-transfer-encoding; bh=2N+sUPYNTjrofbOg4L4q5DZLIb4kXuJPbCLH8QQ7jIA=; b=IHPEkg0MPu3de+hhFey94iOsclDxUHFaxR0g6jEQ22xl9Xfoqj/9SkX8UaMKA+6k1F sX953R46aldL2G34XOUC1U404kTzlBOckx0q6mRM/MdOWsshr0ifOg4Xpvrkvw8EG/Ps uoy/+SdVGn4/nCp6+1Y0MaHfWuxfLPaQQWlB649hSZQD6s3eF4thejM1FNdwy7HhpwhU N//JwkSuQ2uq5drjn4CyQxm+B8bhrj8KoXQqxWhQe+v1lA5kPNkZpq9UHZkafkaE0nmy kTxXncd5HoZyDZBmhqmK5EWQQYOouC22jlq1c35aEcvl2eQ0eoQA72+mI2y1xE0+W7NL YdKg==
X-Received: by 10.14.194.198 with SMTP id m46mr49404552een.8.1361882184709; Tue, 26 Feb 2013 04:36:24 -0800 (PST)
Received: from [10.36.226.5] ([217.173.99.61]) by mx.google.com with ESMTPS id o3sm1252248eem.15.2013.02.26.04.36.23 (version=TLSv1 cipher=ECDHE-RSA-RC4-SHA bits=128/128); Tue, 26 Feb 2013 04:36:23 -0800 (PST)
Message-ID: <512CAC45.9070501@gmail.com>
Date: Tue, 26 Feb 2013 12:36:21 +0000
From: Sergey Beryozkin <sberyozkin@gmail.com>
User-Agent: Mozilla/5.0 (X11; Linux x86_64; rv:12.0) Gecko/20120430 Thunderbird/12.0.1
MIME-Version: 1.0
To: oauth@ietf.org
References: <AECF561A-BD17-4FF0-B60A-FB8594159EA9@gmx.net>
In-Reply-To: <AECF561A-BD17-4FF0-B60A-FB8594159EA9@gmx.net>
Content-Type: text/plain; charset=ISO-8859-1; format=flowed
Content-Transfer-Encoding: 7bit
Subject: Re: [OAUTH-WG] draft-ietf-oauth-v2-http-mac and draft-tschofenig-oauth-hotk re-submitted
X-BeenThere: oauth@ietf.org
X-Mailman-Version: 2.1.12
Precedence: list
List-Id: OAUTH WG <oauth.ietf.org>
List-Unsubscribe: <https://www.ietf.org/mailman/options/oauth>, <mailto:oauth-request@ietf.org?subject=unsubscribe>
List-Archive: <http://www.ietf.org/mail-archive/web/oauth>
List-Post: <mailto:oauth@ietf.org>
List-Help: <mailto:oauth-request@ietf.org?subject=help>
List-Subscribe: <https://www.ietf.org/mailman/listinfo/oauth>, <mailto:oauth-request@ietf.org?subject=subscribe>
X-List-Received-Date: Tue, 26 Feb 2013 12:36:29 -0000

Hi Hannes
On 25/02/13 12:46, Hannes Tschofenig wrote:
> Hi all,
>
> I just submitted an updated version of the draft-ietf-oauth-v2-http-mac-03.txt.
>

It definitely has more interesting content (about architecture, session 
keys, etc) - this is really useful IMHO.

What I'm not really understanding is why a 2-way TLS transport for the 
session key is not even considered.
Instead this uber-complex (in the context of this spec, IMHO) JWT thing 
is there once again. I appreciate why it may be the case, primarily to 
do with reusing the work done around JWT and having some 
common/recommended access token representation, but disallowing a basic 
bearer token be 'enhanced' with MAC over two-way TLS seems like not 
ideal at all IMHO.
To be honest, I'm not sure why would anyone use JWT+MAC instead of just 
JWE, in cases when people are really comfortable with doing JWT. I guess 
we may be talking now about better security characteristics, but this 
will help a very limited audience as compared to a wider one which can 
use Bearer+MAC over 2-way TLS, straightforward, very cheap effort to get 
started.

just my 2c
Thanks, Sergey

> I would like to point out that this is **discussion input** -- not agreed content. Anything in the document is subject to change!
> You also may notice that there are a few questions in the writeup.
>
> I was trying to more specific about some of the design aspects that folks had proposed during the last few months.
> I have also re-submitted the draft-tschofenig-oauth-hotk, which includes a TLS and a JSON-based solution approach.
>
> In general, the open questions still seem to be related to
> * Key distribution: What should be described in a document? What is mandatory to implement?
> * Selective header field protection: This is something that was brought forward in discussions and I have included a proposal of how this could look like.
> * Channel Binding: Functionality is also included to deal with man-in-the-middle attacks against TLS. There are, however, two types of channel bindings defined in RFC 5929. Are both needed? If not, which one should be selected?
> * Integrity protection and data origin authentication in both directions: The current writeup allows the protection to be extended to messages beyond the initial request. This also offers key confirmation by the server and protection of any responses.
>
> Writing the text I also noticed that I do not quite understand how nested JWT documents are supposed to look like. For example, how do I encrypt the mac_key carried inside the JWT plus add a signature of all other fields? Currently, I have just encrypted the entire payload.
>
> I hope to have some discussions prior to the IETF meeting so that we have a more fruitful discussion at the face-to-face meeting.
>
> Ciao
> Hannes
>
> _______________________________________________
> OAuth mailing list
> OAuth@ietf.org
> https://www.ietf.org/mailman/listinfo/oauth


From sberyozkin@gmail.com  Tue Feb 26 04:49:29 2013
Return-Path: <sberyozkin@gmail.com>
X-Original-To: oauth@ietfa.amsl.com
Delivered-To: oauth@ietfa.amsl.com
Received: from localhost (localhost [127.0.0.1]) by ietfa.amsl.com (Postfix) with ESMTP id 7DA7921F858E for <oauth@ietfa.amsl.com>; Tue, 26 Feb 2013 04:49:29 -0800 (PST)
X-Virus-Scanned: amavisd-new at amsl.com
X-Spam-Flag: NO
X-Spam-Score: -2.843
X-Spam-Level: 
X-Spam-Status: No, score=-2.843 tagged_above=-999 required=5 tests=[AWL=-0.444, BAYES_00=-2.599, J_CHICKENPOX_33=0.6, J_CHICKENPOX_63=0.6, RCVD_IN_DNSWL_LOW=-1]
Received: from mail.ietf.org ([64.170.98.30]) by localhost (ietfa.amsl.com [127.0.0.1]) (amavisd-new, port 10024) with ESMTP id GD3H2L9ydveS for <oauth@ietfa.amsl.com>; Tue, 26 Feb 2013 04:49:28 -0800 (PST)
Received: from mail-ee0-f51.google.com (mail-ee0-f51.google.com [74.125.83.51]) by ietfa.amsl.com (Postfix) with ESMTP id 6EE4D21F8552 for <oauth@ietf.org>; Tue, 26 Feb 2013 04:49:28 -0800 (PST)
Received: by mail-ee0-f51.google.com with SMTP id d17so2234826eek.38 for <oauth@ietf.org>; Tue, 26 Feb 2013 04:49:27 -0800 (PST)
DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=gmail.com; s=20120113; h=x-received:message-id:date:from:user-agent:mime-version:to:subject :references:in-reply-to:content-type:content-transfer-encoding; bh=f8CUZNTqHZwethf2IhylAv2omjG8TTBVYZO3ODagqcY=; b=EV2OJvDQN3ZD+KI2mnwtkfMjGRRdS81VpY4iQIz7P6vPu4GEW89A/cNPXOYVbtu/Wm 9q5egOYT+wjzE6P6WTTWtFfrTi3/3Txc4FAPwPkDDF300StMzMyEKd0sy96f6/wLzpcS VXnXiyedWEOsmG1ByHeY5tCy0HnnWfiwUCvIHG4MIq51WIc59vsX+x7g9YcPC9B+DpcZ tLmdti+3WUeIcqZCkjDLT7dDmTIJ6tGnPOCPyHIx1d/fsJeedEeX4sYB0+R+JzsjpMCp 6SaGaYaWLxV9gl+npemK1z7J1X2BPf8z8I3EFlm/5oLqA/YPnmtUsZ7n/KFn991QZvnS ndXw==
X-Received: by 10.14.184.68 with SMTP id r44mr49373204eem.40.1361882967539; Tue, 26 Feb 2013 04:49:27 -0800 (PST)
Received: from [10.36.226.5] ([217.173.99.61]) by mx.google.com with ESMTPS id u44sm1332824eel.7.2013.02.26.04.49.26 (version=TLSv1 cipher=ECDHE-RSA-RC4-SHA bits=128/128); Tue, 26 Feb 2013 04:49:26 -0800 (PST)
Message-ID: <512CAF54.1060204@gmail.com>
Date: Tue, 26 Feb 2013 12:49:24 +0000
From: Sergey Beryozkin <sberyozkin@gmail.com>
User-Agent: Mozilla/5.0 (X11; Linux x86_64; rv:12.0) Gecko/20120430 Thunderbird/12.0.1
MIME-Version: 1.0
To: oauth@ietf.org
References: <AECF561A-BD17-4FF0-B60A-FB8594159EA9@gmx.net> <512CAC45.9070501@gmail.com>
In-Reply-To: <512CAC45.9070501@gmail.com>
Content-Type: text/plain; charset=ISO-8859-1; format=flowed
Content-Transfer-Encoding: 7bit
Subject: Re: [OAUTH-WG] draft-ietf-oauth-v2-http-mac and draft-tschofenig-oauth-hotk re-submitted
X-BeenThere: oauth@ietf.org
X-Mailman-Version: 2.1.12
Precedence: list
List-Id: OAUTH WG <oauth.ietf.org>
List-Unsubscribe: <https://www.ietf.org/mailman/options/oauth>, <mailto:oauth-request@ietf.org?subject=unsubscribe>
List-Archive: <http://www.ietf.org/mail-archive/web/oauth>
List-Post: <mailto:oauth@ietf.org>
List-Help: <mailto:oauth-request@ietf.org?subject=help>
List-Subscribe: <https://www.ietf.org/mailman/listinfo/oauth>, <mailto:oauth-request@ietf.org?subject=subscribe>
X-List-Received-Date: Tue, 26 Feb 2013 12:49:29 -0000

Hi Again
On 26/02/13 12:36, Sergey Beryozkin wrote:
> Hi Hannes
> On 25/02/13 12:46, Hannes Tschofenig wrote:
>> Hi all,
>>
>> I just submitted an updated version of the
>> draft-ietf-oauth-v2-http-mac-03.txt.
>>
>
> It definitely has more interesting content (about architecture, session
> keys, etc) - this is really useful IMHO.
>
> What I'm not really understanding is why a 2-way TLS transport for the
> session key is not even considered.
> Instead this uber-complex (in the context of this spec, IMHO) JWT thing
> is there once again. I appreciate why it may be the case, primarily to
> do with reusing the work done around JWT and having some
> common/recommended access token representation, but disallowing a basic
> bearer token be 'enhanced' with MAC over two-way TLS seems like not
> ideal at all IMHO.
> To be honest, I'm not sure why would anyone use JWT+MAC instead of just
> JWE, in cases when people are really comfortable with doing JWT. I guess
> we may be talking now about better security characteristics, but this
> will help a very limited audience as compared to a wider one which can
> use Bearer+MAC over 2-way TLS, straightforward, very cheap effort to get
> started.
>
Oops, I've misread, I think I did, I was reading a Session Key Transport 
to Resource Server section [1] where using JWT seems just OK, while a 
transport to the client section [2] does not enforce the use of JWT.

Sorry for a noise :-)

By the way, should the server be able to enforce the use of MAC as 
opposed to having a client preferring it with its audience info ? If the 
client does not understand it then it does not have the capabilities to 
work with this specific server.

Thanks, Sergey

[1] http://tools.ietf.org/html/draft-ietf-oauth-v2-http-mac-03#section-4.2
[2] http://tools.ietf.org/html/draft-ietf-oauth-v2-http-mac-03#section-4.1

> just my 2c
> Thanks, Sergey
>
>> I would like to point out that this is **discussion input** -- not
>> agreed content. Anything in the document is subject to change!
>> You also may notice that there are a few questions in the writeup.
>>
>> I was trying to more specific about some of the design aspects that
>> folks had proposed during the last few months.
>> I have also re-submitted the draft-tschofenig-oauth-hotk, which
>> includes a TLS and a JSON-based solution approach.
>>
>> In general, the open questions still seem to be related to
>> * Key distribution: What should be described in a document? What is
>> mandatory to implement?
>> * Selective header field protection: This is something that was
>> brought forward in discussions and I have included a proposal of how
>> this could look like.
>> * Channel Binding: Functionality is also included to deal with
>> man-in-the-middle attacks against TLS. There are, however, two types
>> of channel bindings defined in RFC 5929. Are both needed? If not,
>> which one should be selected?
>> * Integrity protection and data origin authentication in both
>> directions: The current writeup allows the protection to be extended
>> to messages beyond the initial request. This also offers key
>> confirmation by the server and protection of any responses.
>>
>> Writing the text I also noticed that I do not quite understand how
>> nested JWT documents are supposed to look like. For example, how do I
>> encrypt the mac_key carried inside the JWT plus add a signature of all
>> other fields? Currently, I have just encrypted the entire payload.
>>
>> I hope to have some discussions prior to the IETF meeting so that we
>> have a more fruitful discussion at the face-to-face meeting.
>>
>> Ciao
>> Hannes
>>
>> _______________________________________________
>> OAuth mailing list
>> OAuth@ietf.org
>> https://www.ietf.org/mailman/listinfo/oauth
>



From hannes.tschofenig@gmx.net  Tue Feb 26 05:16:39 2013
Return-Path: <hannes.tschofenig@gmx.net>
X-Original-To: oauth@ietfa.amsl.com
Delivered-To: oauth@ietfa.amsl.com
Received: from localhost (localhost [127.0.0.1]) by ietfa.amsl.com (Postfix) with ESMTP id 4E64621F88BE for <oauth@ietfa.amsl.com>; Tue, 26 Feb 2013 05:16:39 -0800 (PST)
X-Virus-Scanned: amavisd-new at amsl.com
X-Spam-Flag: NO
X-Spam-Score: -100.775
X-Spam-Level: 
X-Spam-Status: No, score=-100.775 tagged_above=-999 required=5 tests=[AWL=-0.755, BAYES_00=-2.599, RCVD_IN_BL_SPAMCOP_NET=1.96, RCVD_IN_SORBS_WEB=0.619, USER_IN_WHITELIST=-100]
Received: from mail.ietf.org ([64.170.98.30]) by localhost (ietfa.amsl.com [127.0.0.1]) (amavisd-new, port 10024) with ESMTP id xMKJthN00c42 for <oauth@ietfa.amsl.com>; Tue, 26 Feb 2013 05:16:38 -0800 (PST)
Received: from mout.gmx.net (mout.gmx.net [212.227.15.18]) by ietfa.amsl.com (Postfix) with ESMTP id 9C72321F8A8B for <oauth@ietf.org>; Tue, 26 Feb 2013 05:16:21 -0800 (PST)
Received: from mailout-de.gmx.net ([10.1.76.19]) by mrigmx.server.lan (mrigmx002) with ESMTP (Nemesis) id 0MNfCm-1UD4TP2Vi6-007CGk for <oauth@ietf.org>; Tue, 26 Feb 2013 14:16:13 +0100
Received: (qmail invoked by alias); 26 Feb 2013 13:16:13 -0000
Received: from unknown (EHLO [10.255.131.117]) [194.251.119.201] by mail.gmx.net (mp019) with SMTP; 26 Feb 2013 14:16:13 +0100
X-Authenticated: #29516787
X-Provags-ID: V01U2FsdGVkX1+oNt884NuoDoxVCHspMukMPjGEPLIrTukqwcxjIS mnoZXYoPwk72mM
From: Hannes Tschofenig <Hannes.Tschofenig@gmx.net>
Content-Type: text/plain; charset=us-ascii
Content-Transfer-Encoding: quoted-printable
Date: Tue, 26 Feb 2013 15:16:11 +0200
Message-Id: <1959D58A-1463-4368-B306-CCCD00FFBC09@gmx.net>
To: IETF oauth WG <oauth@ietf.org>
Mime-Version: 1.0 (Apple Message framework v1085)
X-Mailer: Apple Mail (2.1085)
X-Y-GMX-Trusted: 0
Subject: [OAUTH-WG] IETF#86 OAuth Agenda -- First Strawman Proposal
X-BeenThere: oauth@ietf.org
X-Mailman-Version: 2.1.12
Precedence: list
List-Id: OAUTH WG <oauth.ietf.org>
List-Unsubscribe: <https://www.ietf.org/mailman/options/oauth>, <mailto:oauth-request@ietf.org?subject=unsubscribe>
List-Archive: <http://www.ietf.org/mail-archive/web/oauth>
List-Post: <mailto:oauth@ietf.org>
List-Help: <mailto:oauth-request@ietf.org?subject=help>
List-Subscribe: <https://www.ietf.org/mailman/listinfo/oauth>, <mailto:oauth-request@ietf.org?subject=subscribe>
X-List-Received-Date: Tue, 26 Feb 2013 13:16:40 -0000

Hi guys,=20

please see the agenda proposal for the IETF#86 meeting. Let us know =
whether you have additional items or changes for existing items. =20

Ciao
Hannes & Derek

---

Web Authorization Protocol (oauth)

1540-1710 	Monday Afternoon Session II=20
Room: Boca 2

1. Assertions
30 min
Mike Jones?/Brian Campbell?

Relevant document:
http://datatracker.ietf.org/doc/draft-ietf-oauth-jwt-bearer/
http://datatracker.ietf.org/doc/draft-ietf-oauth-assertions/
http://datatracker.ietf.org/doc/draft-ietf-oauth-saml2-bearer/


2. Dynamic Registration
30 min
Justin Richer

Relevant document:
http://datatracker.ietf.org/doc/draft-ietf-oauth-dyn-reg/


2. Interoperability Testing of OAuth 2.0 Specifications=20
30 min
Roland Hedberg

Relevant document:
https://github.com/andreassolberg/oictest


1730-1830 	Thursday Afternoon Session III
Room: Boca 1=09

3. OAuth Security
60 min
Phil Hunt

Relevant documents:
http://datatracker.ietf.org/doc/draft-tschofenig-oauth-security/
http://datatracker.ietf.org/doc/draft-ietf-oauth-v2-http-mac/
http://datatracker.ietf.org/doc/draft-tschofenig-oauth-audience/
http://datatracker.ietf.org/doc/draft-tschofenig-oauth-hotk/




From hannes.tschofenig@gmx.net  Tue Feb 26 05:35:44 2013
Return-Path: <hannes.tschofenig@gmx.net>
X-Original-To: oauth@ietfa.amsl.com
Delivered-To: oauth@ietfa.amsl.com
Received: from localhost (localhost [127.0.0.1]) by ietfa.amsl.com (Postfix) with ESMTP id 6840321F8A48 for <oauth@ietfa.amsl.com>; Tue, 26 Feb 2013 05:35:44 -0800 (PST)
X-Virus-Scanned: amavisd-new at amsl.com
X-Spam-Flag: NO
X-Spam-Score: -100.745
X-Spam-Level: 
X-Spam-Status: No, score=-100.745 tagged_above=-999 required=5 tests=[AWL=-0.725, BAYES_00=-2.599, RCVD_IN_BL_SPAMCOP_NET=1.96, RCVD_IN_SORBS_WEB=0.619, USER_IN_WHITELIST=-100]
Received: from mail.ietf.org ([64.170.98.30]) by localhost (ietfa.amsl.com [127.0.0.1]) (amavisd-new, port 10024) with ESMTP id yKGFYr4UgqMh for <oauth@ietfa.amsl.com>; Tue, 26 Feb 2013 05:35:43 -0800 (PST)
Received: from mout.gmx.net (mout.gmx.net [212.227.17.20]) by ietfa.amsl.com (Postfix) with ESMTP id 79B0521F8A55 for <oauth@ietf.org>; Tue, 26 Feb 2013 05:35:43 -0800 (PST)
Received: from mailout-de.gmx.net ([10.1.76.27]) by mrigmx.server.lan (mrigmx001) with ESMTP (Nemesis) id 0LmQuq-1UjwQW2G1K-00a19X for <oauth@ietf.org>; Tue, 26 Feb 2013 14:35:42 +0100
Received: (qmail invoked by alias); 26 Feb 2013 13:35:42 -0000
Received: from unknown (EHLO [10.255.131.117]) [194.251.119.201] by mail.gmx.net (mp027) with SMTP; 26 Feb 2013 14:35:42 +0100
X-Authenticated: #29516787
X-Provags-ID: V01U2FsdGVkX1/TQJFlZZLTzNakzHiKzzOSuzytZJBjriqJHoU6rS JcaiRazOO9C3kR
From: Hannes Tschofenig <hannes.tschofenig@gmx.net>
Content-Type: text/plain; charset=us-ascii
Content-Transfer-Encoding: quoted-printable
Date: Tue, 26 Feb 2013 15:35:40 +0200
Message-Id: <0220BD89-A928-437B-907B-E36FB8843698@gmx.net>
To: IETF oauth WG <oauth@ietf.org>
Mime-Version: 1.0 (Apple Message framework v1085)
X-Mailer: Apple Mail (2.1085)
X-Y-GMX-Trusted: 0
Subject: [OAUTH-WG] OAuth WG Milestone Update
X-BeenThere: oauth@ietf.org
X-Mailman-Version: 2.1.12
Precedence: list
List-Id: OAUTH WG <oauth.ietf.org>
List-Unsubscribe: <https://www.ietf.org/mailman/options/oauth>, <mailto:oauth-request@ietf.org?subject=unsubscribe>
List-Archive: <http://www.ietf.org/mail-archive/web/oauth>
List-Post: <mailto:oauth@ietf.org>
List-Help: <mailto:oauth-request@ietf.org?subject=help>
List-Subscribe: <https://www.ietf.org/mailman/listinfo/oauth>, <mailto:oauth-request@ietf.org?subject=subscribe>
X-List-Received-Date: Tue, 26 Feb 2013 13:35:44 -0000

Hi all,=20

we would like to submit an update of the milestones.=20

Here is the current milestone list:=20

---------

Done	Submit 'OAuth 2.0 Threat Model and Security Considerations' as a =
working group item
Done	Submit 'HTTP Authentication: MAC Authentication' as a working =
group item
Done	Submit 'The OAuth 2.0 Protocol: Bearer Tokens' to the IESG for =
consideration as a Proposed Standard
Done	Submit 'The OAuth 2.0 Authorization Protocol' to the IESG for =
consideration as a Proposed Standard
May 2012	Submit 'SAML 2.0 Bearer Assertion Profiles for OAuth =
2.0' to the IESG for consideration as a Proposed Standard
May 2012	Submit 'OAuth 2.0 Assertion Profile' to the IESG for =
consideration as a Proposed Standard
May 2012	Submit 'An IETF URN Sub-Namespace for OAuth' to the IESG =
for consideration as a Proposed Standard
May 2012	Submit 'OAuth 2.0 Threat Model and Security =
Considerations' to the IESG for consideration as an Informational RFC
Aug 2012	Submit 'Token Revocation' to the IESG for consideration =
as a Proposed Standard [Starting point for the work will be =
http://datatracker.ietf.org/doc/draft-lodderstedt-oauth-revocation/]
Nov 2012	Submit 'JSON Web Token (JWT)' to the IESG for =
consideration as a Proposed Standard [Starting point for the work will =
be http://tools.ietf.org/html/draft-jones-json-web-token]
Nov 2012	Submit 'JSON Web Token (JWT) Bearer Token Profiles for =
OAuth 2.0' to the IESG for consideration as a Proposed Standard =
[Starting point for the work will be =
http://tools.ietf.org/html/draft-jones-oauth-jwt-bearer]
Dec 2012	Submit 'HTTP Authentication: MAC Authentication' to the =
IESG for consideration as a Proposed Standard
Dec 2012	Submit 'OAuth Use Cases' to the IESG for consideration =
as an Informational RFC [Starting point for the work will be =
http://tools.ietf.org/html/draft-zeltsan-oauth-use-cases] =20
Jul 2013	Submit 'OAuth Dynamic Client Registration Protocol' to =
the IESG for consideration as a Proposed Standard [Starting point for =
the work will be http://tools.ietf.org/html/draft-hardjono-oauth-dynreg]

---------

Here is our proposal

---------

Done	Submit 'OAuth 2.0 Threat Model and Security Considerations' as a =
working group item
Done	Submit 'HTTP Authentication: MAC Authentication' as a working =
group item
Done	Submit 'The OAuth 2.0 Protocol: Bearer Tokens' to the IESG for =
consideration as a Proposed Standard
Done	Submit 'The OAuth 2.0 Authorization Protocol' to the IESG for =
consideration as a Proposed Standard
Done	Submit 'An IETF URN Sub-Namespace for OAuth' to the IESG for =
consideration as a Proposed Standard
Done	Submit 'OAuth 2.0 Threat Model and Security Considerations' to =
the IESG for consideration as an Informational RFC
Mar 2013	Submit 'Token Revocation' to the IESG for consideration =
as a Proposed Standard
Apr 2013	Submit 'SAML 2.0 Bearer Assertion Profiles for OAuth =
2.0' to the IESG for consideration as a Proposed Standard
Apr 2013	Submit 'OAuth 2.0 Assertion Profile' to the IESG for =
consideration as a Proposed Standard
Aug 2013	Submit 'JSON Web Token (JWT) Bearer Token Profiles for =
OAuth 2.0' to the IESG for consideration as a Proposed Standard
Aug 2013	Submit 'JSON Web Token (JWT)' to the IESG for =
consideration as a Proposed Standard
Jul 2013		Submit 'HTTP Authentication: MAC Authentication' =
to the IESG for consideration as a Proposed Standard

???	Submit 'OAuth Use Cases' to the IESG for consideration as an =
Informational RFC
???	Submit 'OAuth Dynamic Client Registration Protocol' to the IESG =
for consideration as a Proposed Standard

---------

As you can see your input is needed.=20

Ciao
Hannes & Derek


From jricher@mitre.org  Tue Feb 26 07:06:23 2013
Return-Path: <jricher@mitre.org>
X-Original-To: oauth@ietfa.amsl.com
Delivered-To: oauth@ietfa.amsl.com
Received: from localhost (localhost [127.0.0.1]) by ietfa.amsl.com (Postfix) with ESMTP id 9815B21F8880 for <oauth@ietfa.amsl.com>; Tue, 26 Feb 2013 07:06:23 -0800 (PST)
X-Virus-Scanned: amavisd-new at amsl.com
X-Spam-Flag: NO
X-Spam-Score: -6.577
X-Spam-Level: 
X-Spam-Status: No, score=-6.577 tagged_above=-999 required=5 tests=[AWL=0.022,  BAYES_00=-2.599, RCVD_IN_DNSWL_MED=-4]
Received: from mail.ietf.org ([64.170.98.30]) by localhost (ietfa.amsl.com [127.0.0.1]) (amavisd-new, port 10024) with ESMTP id Na7RZC47qYbP for <oauth@ietfa.amsl.com>; Tue, 26 Feb 2013 07:06:23 -0800 (PST)
Received: from smtpksrv1.mitre.org (smtpksrv1.mitre.org [198.49.146.77]) by ietfa.amsl.com (Postfix) with ESMTP id 2816621F887D for <oauth@ietf.org>; Tue, 26 Feb 2013 07:06:23 -0800 (PST)
Received: from smtpksrv1.mitre.org (localhost.localdomain [127.0.0.1]) by localhost (Postfix) with SMTP id 8FD4C1F25B3 for <oauth@ietf.org>; Tue, 26 Feb 2013 10:06:22 -0500 (EST)
Received: from IMCCAS04.MITRE.ORG (imccas04.mitre.org [129.83.29.81]) by smtpksrv1.mitre.org (Postfix) with ESMTP id 828511F2497 for <oauth@ietf.org>; Tue, 26 Feb 2013 10:06:22 -0500 (EST)
Received: from [10.146.15.29] (129.83.31.58) by IMCCAS04.MITRE.ORG (129.83.29.81) with Microsoft SMTP Server (TLS) id 14.2.318.4; Tue, 26 Feb 2013 10:06:22 -0500
Message-ID: <512CCF33.1090207@mitre.org>
Date: Tue, 26 Feb 2013 10:05:23 -0500
From: Justin Richer <jricher@mitre.org>
User-Agent: Mozilla/5.0 (X11; Linux i686; rv:17.0) Gecko/20130106 Thunderbird/17.0.2
MIME-Version: 1.0
To: "oauth@ietf.org" <oauth@ietf.org>
Content-Type: text/plain; charset="ISO-8859-1"; format=flowed
Content-Transfer-Encoding: 7bit
X-Originating-IP: [129.83.31.58]
Subject: [OAUTH-WG] Registration: JWK Urls
X-BeenThere: oauth@ietf.org
X-Mailman-Version: 2.1.12
Precedence: list
List-Id: OAUTH WG <oauth.ietf.org>
List-Unsubscribe: <https://www.ietf.org/mailman/options/oauth>, <mailto:oauth-request@ietf.org?subject=unsubscribe>
List-Archive: <http://www.ietf.org/mail-archive/web/oauth>
List-Post: <mailto:oauth@ietf.org>
List-Help: <mailto:oauth-request@ietf.org?subject=help>
List-Subscribe: <https://www.ietf.org/mailman/listinfo/oauth>, <mailto:oauth-request@ietf.org?subject=subscribe>
X-List-Received-Date: Tue, 26 Feb 2013 15:06:23 -0000

Right now, the Dynamic Registration draft has four URLs that deal with 
registering public keys for the client:

jwk_uri
jwk_encryption_uri
x509_uri
x509_encryption_uri

These are for use in things like JWK-based assertions for client 
authentication and signing/encryption with higher-level protocols.

Recent and impending changes in the JWK specification allow it to 
specify what a given key can be used for, and provide different formats 
for the keys including an x509 encoded certificate. These changes seem 
to get rid of the need for specifying for separate URLs for each format 
and function in registration.

It's been proposed, from the OIDC working group, to collapse all of 
these into a single, new parameter:

jwks_uri

Which would point specifically to a "JWK Set" as defined in the JWK draft.

I'm in favor of this simplifying change, and OIDC has already adopted it 
on their end. Thoughts?

  -- Justin

From bcampbell@pingidentity.com  Tue Feb 26 07:11:36 2013
Return-Path: <bcampbell@pingidentity.com>
X-Original-To: oauth@ietfa.amsl.com
Delivered-To: oauth@ietfa.amsl.com
Received: from localhost (localhost [127.0.0.1]) by ietfa.amsl.com (Postfix) with ESMTP id E264321F8815 for <oauth@ietfa.amsl.com>; Tue, 26 Feb 2013 07:11:36 -0800 (PST)
X-Virus-Scanned: amavisd-new at amsl.com
X-Spam-Flag: NO
X-Spam-Score: -5.095
X-Spam-Level: 
X-Spam-Status: No, score=-5.095 tagged_above=-999 required=5 tests=[AWL=-0.785, BAYES_00=-2.599, FM_FORGED_GMAIL=0.622, HTML_MESSAGE=0.001, RCVD_IN_DNSWL_MED=-4, SARE_HTML_USL_OBFU=1.666]
Received: from mail.ietf.org ([64.170.98.30]) by localhost (ietfa.amsl.com [127.0.0.1]) (amavisd-new, port 10024) with ESMTP id TLcSpKJpOuHn for <oauth@ietfa.amsl.com>; Tue, 26 Feb 2013 07:11:36 -0800 (PST)
Received: from na3sys009aog138.obsmtp.com (na3sys009aog138.obsmtp.com [74.125.149.19]) by ietfa.amsl.com (Postfix) with ESMTP id F23EC21F8735 for <oauth@ietf.org>; Tue, 26 Feb 2013 07:11:35 -0800 (PST)
Received: from mail-ia0-f200.google.com ([209.85.210.200]) (using TLSv1) by na3sys009aob138.postini.com ([74.125.148.12]) with SMTP ID DSNKUSzQp/26zH+7eSWQKj9O2dVQ1vJ+Kjqq@postini.com; Tue, 26 Feb 2013 07:11:36 PST
Received: by mail-ia0-f200.google.com with SMTP id u20so14857302iag.3 for <oauth@ietf.org>; Tue, 26 Feb 2013 07:11:35 -0800 (PST)
X-Google-DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=google.com; s=20120113; h=x-received:x-received:mime-version:in-reply-to:references:from:date :message-id:subject:to:cc:content-type:x-gm-message-state; bh=KMCj8hd7Tu4FDc30ECb1sdvVCr9vxGCTDJSX41HQE4I=; b=B8SisZxp4Hb45hCCZwR1MveGGxN53czURIQpeYxKDQUPOVOUopA4H81EnX0y3Pga1D fMKKC9nF2jF/HruxqcEeKiuw4ABvW3dPMz2t5Y+l9cSzpXBiwqMGT8Ow6OuovJpe95kQ 3eyeAK40gsaWCJAfBpxr8HwOfJHCqfa1m6dMiWPRnUrGaI5es/3spF/Jqwgukayl7w2m EYzvi4s4r9/0PwONrZz8o+AELXtHCEi+FhSGRFPyATfRAEgDTa2mxhUy4dmgrkkzrqGo QmIp6KWRgUQD2k62o1EYYa/mDVG7mcIHkADsmagNDdrfKIbTlujJ4tJwH4hqj6wyM9Xo Quog==
X-Received: by 10.50.184.226 with SMTP id ex2mr5796770igc.24.1361891495206; Tue, 26 Feb 2013 07:11:35 -0800 (PST)
X-Received: by 10.50.184.226 with SMTP id ex2mr5796766igc.24.1361891495107; Tue, 26 Feb 2013 07:11:35 -0800 (PST)
MIME-Version: 1.0
Received: by 10.64.63.3 with HTTP; Tue, 26 Feb 2013 07:11:05 -0800 (PST)
In-Reply-To: <512CCF33.1090207@mitre.org>
References: <512CCF33.1090207@mitre.org>
From: Brian Campbell <bcampbell@pingidentity.com>
Date: Tue, 26 Feb 2013 08:11:05 -0700
Message-ID: <CA+k3eCSCJnjrdBO5eUcSBDQa5M0U4dtjd253sUUYsUBuQofEsA@mail.gmail.com>
To: Justin Richer <jricher@mitre.org>
Content-Type: multipart/alternative; boundary=14dae9340dadc9fbf104d6a212e1
X-Gm-Message-State: ALoCoQlbT9c325SCRplmDjW9L6X5xTu1tH4ys+P3d0Wq/msqpYoZPPA+8eS6e7hZTPpA1TWRhCUYrQ2s+d60Gm+C//+PFHL4DX4BFAdpwU40bJnPI3Ya4FHwmtQw6BpbcdLPqT22028C
Cc: "oauth@ietf.org" <oauth@ietf.org>
Subject: Re: [OAUTH-WG] Registration: JWK Urls
X-BeenThere: oauth@ietf.org
X-Mailman-Version: 2.1.12
Precedence: list
List-Id: OAUTH WG <oauth.ietf.org>
List-Unsubscribe: <https://www.ietf.org/mailman/options/oauth>, <mailto:oauth-request@ietf.org?subject=unsubscribe>
List-Archive: <http://www.ietf.org/mail-archive/web/oauth>
List-Post: <mailto:oauth@ietf.org>
List-Help: <mailto:oauth-request@ietf.org?subject=help>
List-Subscribe: <https://www.ietf.org/mailman/listinfo/oauth>, <mailto:oauth-request@ietf.org?subject=subscribe>
X-List-Received-Date: Tue, 26 Feb 2013 15:11:37 -0000

--14dae9340dadc9fbf104d6a212e1
Content-Type: text/plain; charset=ISO-8859-1

+1


On Tue, Feb 26, 2013 at 8:05 AM, Justin Richer <jricher@mitre.org> wrote:

> Right now, the Dynamic Registration draft has four URLs that deal with
> registering public keys for the client:
>
> jwk_uri
> jwk_encryption_uri
> x509_uri
> x509_encryption_uri
>
> These are for use in things like JWK-based assertions for client
> authentication and signing/encryption with higher-level protocols.
>
> Recent and impending changes in the JWK specification allow it to specify
> what a given key can be used for, and provide different formats for the
> keys including an x509 encoded certificate. These changes seem to get rid
> of the need for specifying for separate URLs for each format and function
> in registration.
>
> It's been proposed, from the OIDC working group, to collapse all of these
> into a single, new parameter:
>
> jwks_uri
>
> Which would point specifically to a "JWK Set" as defined in the JWK draft.
>
> I'm in favor of this simplifying change, and OIDC has already adopted it
> on their end. Thoughts?
>
>  -- Justin
> ______________________________**_________________
> OAuth mailing list
> OAuth@ietf.org
> https://www.ietf.org/mailman/**listinfo/oauth<https://www.ietf.org/mailman/listinfo/oauth>
>

--14dae9340dadc9fbf104d6a212e1
Content-Type: text/html; charset=ISO-8859-1
Content-Transfer-Encoding: quoted-printable

<div dir=3D"ltr">+1<br></div><div class=3D"gmail_extra"><br><br><div class=
=3D"gmail_quote">On Tue, Feb 26, 2013 at 8:05 AM, Justin Richer <span dir=
=3D"ltr">&lt;<a href=3D"mailto:jricher@mitre.org" target=3D"_blank">jricher=
@mitre.org</a>&gt;</span> wrote:<br>

<blockquote class=3D"gmail_quote" style=3D"margin:0 0 0 .8ex;border-left:1p=
x #ccc solid;padding-left:1ex">Right now, the Dynamic Registration draft ha=
s four URLs that deal with registering public keys for the client:<br>
<br>
jwk_uri<br>
jwk_encryption_uri<br>
x509_uri<br>
x509_encryption_uri<br>
<br>
These are for use in things like JWK-based assertions for client authentica=
tion and signing/encryption with higher-level protocols.<br>
<br>
Recent and impending changes in the JWK specification allow it to specify w=
hat a given key can be used for, and provide different formats for the keys=
 including an x509 encoded certificate. These changes seem to get rid of th=
e need for specifying for separate URLs for each format and function in reg=
istration.<br>


<br>
It&#39;s been proposed, from the OIDC working group, to collapse all of the=
se into a single, new parameter:<br>
<br>
jwks_uri<br>
<br>
Which would point specifically to a &quot;JWK Set&quot; as defined in the J=
WK draft.<br>
<br>
I&#39;m in favor of this simplifying change, and OIDC has already adopted i=
t on their end. Thoughts?<br>
<br>
=A0-- Justin<br>
______________________________<u></u>_________________<br>
OAuth mailing list<br>
<a href=3D"mailto:OAuth@ietf.org" target=3D"_blank">OAuth@ietf.org</a><br>
<a href=3D"https://www.ietf.org/mailman/listinfo/oauth" target=3D"_blank">h=
ttps://www.ietf.org/mailman/<u></u>listinfo/oauth</a><br>
</blockquote></div><br></div>

--14dae9340dadc9fbf104d6a212e1--

From ve7jtb@ve7jtb.com  Tue Feb 26 07:23:31 2013
Return-Path: <ve7jtb@ve7jtb.com>
X-Original-To: oauth@ietfa.amsl.com
Delivered-To: oauth@ietfa.amsl.com
Received: from localhost (localhost [127.0.0.1]) by ietfa.amsl.com (Postfix) with ESMTP id 17A8F21F86FB for <oauth@ietfa.amsl.com>; Tue, 26 Feb 2013 07:23:31 -0800 (PST)
X-Virus-Scanned: amavisd-new at amsl.com
X-Spam-Flag: NO
X-Spam-Score: -3.599
X-Spam-Level: 
X-Spam-Status: No, score=-3.599 tagged_above=-999 required=5 tests=[AWL=0.001,  BAYES_00=-2.599, RCVD_IN_DNSWL_LOW=-1]
Received: from mail.ietf.org ([64.170.98.30]) by localhost (ietfa.amsl.com [127.0.0.1]) (amavisd-new, port 10024) with ESMTP id pIKy4Tn0ijO9 for <oauth@ietfa.amsl.com>; Tue, 26 Feb 2013 07:23:30 -0800 (PST)
Received: from mail-da0-f42.google.com (mail-da0-f42.google.com [209.85.210.42]) by ietfa.amsl.com (Postfix) with ESMTP id 75E3621F86DD for <oauth@ietf.org>; Tue, 26 Feb 2013 07:23:30 -0800 (PST)
Received: by mail-da0-f42.google.com with SMTP id z17so2065158dal.15 for <oauth@ietf.org>; Tue, 26 Feb 2013 07:23:30 -0800 (PST)
X-Google-DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=google.com; s=20120113; h=x-received:content-type:mime-version:subject:from:in-reply-to:date :cc:message-id:references:to:x-mailer:x-gm-message-state; bh=X2iFNol2VoYR411B/zzUj6SN+zAMnpGP6MpXOIX7UkU=; b=TtjeqoCXzz+fIgZcxkpwm31wZjdKYvzIumQjhP4lpnOTvijkxTlmFbSgSxjNIp9Q3m PT10XkbUOmWxtL4uvLKfwLkUkXNCHcDtBUhuFJKl2bja8c995KT4Pm3evNi77zJczpLc iBNfZDwe6rUSt4mWAFVgjZJJ26XlpnTpV7vytJnaSbVUa2g0nW6SQo07Yu/SVVtixXHc IYk2pFuOG4XjPTRezLpBY1Jfeo0OpjfWJVH1TI//nOB39iVyDRZCUSCprv7+tBKugvf/ 1NLvO0Zfuugs3MstRS5t14lV4gTbpMU+jxM9KMjEttzPQY7tHSnQ1lZ5C2360USksiqQ 8D3A==
X-Received: by 10.68.204.97 with SMTP id kx1mr24408509pbc.117.1361892210092; Tue, 26 Feb 2013 07:23:30 -0800 (PST)
Received: from [192.168.11.96] (ip-64-134-220-185.public.wayport.net. [64.134.220.185]) by mx.google.com with ESMTPS id 1sm1230487pba.32.2013.02.26.07.23.24 (version=TLSv1 cipher=ECDHE-RSA-RC4-SHA bits=128/128); Tue, 26 Feb 2013 07:23:28 -0800 (PST)
Content-Type: multipart/signed; boundary="Apple-Mail=_BBB53384-18C7-4C6E-8CA6-BE48FEFC76BC"; protocol="application/pkcs7-signature"; micalg=sha1
Mime-Version: 1.0 (Mac OS X Mail 6.2 \(1499\))
From: John Bradley <ve7jtb@ve7jtb.com>
In-Reply-To: <512CCF33.1090207@mitre.org>
Date: Tue, 26 Feb 2013 07:23:15 -0800
Message-Id: <C0D21084-0471-44AD-968A-A29A20EE099A@ve7jtb.com>
References: <512CCF33.1090207@mitre.org>
To: Justin Richer <jricher@mitre.org>
X-Mailer: Apple Mail (2.1499)
X-Gm-Message-State: ALoCoQllNsZ5MIzkDCL12MRqbE7uLuNML5biq7XcDFNAZPoJyhGwT7i+zEAyL5Ii9EqEMvSP5uuR
Cc: "oauth@ietf.org" <oauth@ietf.org>
Subject: Re: [OAUTH-WG] Registration: JWK Urls
X-BeenThere: oauth@ietf.org
X-Mailman-Version: 2.1.12
Precedence: list
List-Id: OAUTH WG <oauth.ietf.org>
List-Unsubscribe: <https://www.ietf.org/mailman/options/oauth>, <mailto:oauth-request@ietf.org?subject=unsubscribe>
List-Archive: <http://www.ietf.org/mail-archive/web/oauth>
List-Post: <mailto:oauth@ietf.org>
List-Help: <mailto:oauth-request@ietf.org?subject=help>
List-Subscribe: <https://www.ietf.org/mailman/listinfo/oauth>, <mailto:oauth-request@ietf.org?subject=subscribe>
X-List-Received-Date: Tue, 26 Feb 2013 15:23:31 -0000

--Apple-Mail=_BBB53384-18C7-4C6E-8CA6-BE48FEFC76BC
Content-Transfer-Encoding: quoted-printable
Content-Type: text/plain;
	charset=us-ascii

One of the goals on the JWK side was to be able to simplify it.

I support the change.

John B.
On 2013-02-26, at 7:05 AM, Justin Richer <jricher@mitre.org> wrote:

> Right now, the Dynamic Registration draft has four URLs that deal with =
registering public keys for the client:
>=20
> jwk_uri
> jwk_encryption_uri
> x509_uri
> x509_encryption_uri
>=20
> These are for use in things like JWK-based assertions for client =
authentication and signing/encryption with higher-level protocols.
>=20
> Recent and impending changes in the JWK specification allow it to =
specify what a given key can be used for, and provide different formats =
for the keys including an x509 encoded certificate. These changes seem =
to get rid of the need for specifying for separate URLs for each format =
and function in registration.
>=20
> It's been proposed, from the OIDC working group, to collapse all of =
these into a single, new parameter:
>=20
> jwks_uri
>=20
> Which would point specifically to a "JWK Set" as defined in the JWK =
draft.
>=20
> I'm in favor of this simplifying change, and OIDC has already adopted =
it on their end. Thoughts?
>=20
> -- Justin
> _______________________________________________
> OAuth mailing list
> OAuth@ietf.org
> https://www.ietf.org/mailman/listinfo/oauth


--Apple-Mail=_BBB53384-18C7-4C6E-8CA6-BE48FEFC76BC
Content-Disposition: attachment;
	filename=smime.p7s
Content-Type: application/pkcs7-signature;
	name=smime.p7s
Content-Transfer-Encoding: base64
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--Apple-Mail=_BBB53384-18C7-4C6E-8CA6-BE48FEFC76BC--

From wwwrun@rfc-editor.org  Tue Feb 26 09:08:25 2013
Return-Path: <wwwrun@rfc-editor.org>
X-Original-To: oauth@ietfa.amsl.com
Delivered-To: oauth@ietfa.amsl.com
Received: from localhost (localhost [127.0.0.1]) by ietfa.amsl.com (Postfix) with ESMTP id 170F121F8704 for <oauth@ietfa.amsl.com>; Tue, 26 Feb 2013 09:08:25 -0800 (PST)
X-Virus-Scanned: amavisd-new at amsl.com
X-Spam-Flag: NO
X-Spam-Score: -102.326
X-Spam-Level: 
X-Spam-Status: No, score=-102.326 tagged_above=-999 required=5 tests=[AWL=0.274, BAYES_00=-2.599, NO_RELAYS=-0.001, USER_IN_WHITELIST=-100]
Received: from mail.ietf.org ([64.170.98.30]) by localhost (ietfa.amsl.com [127.0.0.1]) (amavisd-new, port 10024) with ESMTP id lrEcZ8qdZA1G for <oauth@ietfa.amsl.com>; Tue, 26 Feb 2013 09:08:24 -0800 (PST)
Received: from rfc-editor.org (unknown [IPv6:2001:1890:123a::1:2f]) by ietfa.amsl.com (Postfix) with ESMTP id 110C621F8700 for <oauth@ietf.org>; Tue, 26 Feb 2013 09:08:24 -0800 (PST)
Received: by rfc-editor.org (Postfix, from userid 30) id 9FB6072E12F; Tue, 26 Feb 2013 09:07:11 -0800 (PST)
To: dick.hardt@gmail.com, stephen.farrell@cs.tcd.ie, turners@ieca.com, Hannes.Tschofenig@gmx.net, derek@ihtfp.com
From: RFC Errata System <rfc-editor@rfc-editor.org>
Message-Id: <20130226170711.9FB6072E12F@rfc-editor.org>
Date: Tue, 26 Feb 2013 09:07:11 -0800 (PST)
Cc: johnp.field@emc.com, oauth@ietf.org, rfc-editor@rfc-editor.org
Subject: [OAUTH-WG] [Editorial Errata Reported] RFC6749 (3500)
X-BeenThere: oauth@ietf.org
X-Mailman-Version: 2.1.12
Precedence: list
List-Id: OAUTH WG <oauth.ietf.org>
List-Unsubscribe: <https://www.ietf.org/mailman/options/oauth>, <mailto:oauth-request@ietf.org?subject=unsubscribe>
List-Archive: <http://www.ietf.org/mail-archive/web/oauth>
List-Post: <mailto:oauth@ietf.org>
List-Help: <mailto:oauth-request@ietf.org?subject=help>
List-Subscribe: <https://www.ietf.org/mailman/listinfo/oauth>, <mailto:oauth-request@ietf.org?subject=subscribe>
X-List-Received-Date: Tue, 26 Feb 2013 17:08:25 -0000

The following errata report has been submitted for RFC6749,
"The OAuth 2.0 Authorization Framework".

--------------------------------------
You may review the report below and at:
http://www.rfc-editor.org/errata_search.php?rfc=6749&eid=3500

--------------------------------------
Type: Editorial
Reported by: John Field <johnp.field@emc.com>

Section: 4.1

Original Text
-------------
(E)  The authorization server authenticates the client, validates the
     authorization code, and ensures that the redirection URI
     received matches the URI used to redirect the client in
     step (C).  If valid, the authorization server responds back with
     an access token and, optionally, a refresh token.

Corrected Text
--------------
(E)  The authorization server authenticates the client, validates the
     authorization code, and ensures that the redirection URI
     received matches the URI used to redirect (the resource owner's user-agent) 
     to the client in step (C).  If valid, the authorization server 
     responds back with an access token and, optionally, a refresh token.

Notes
-----
The URI in question is the URI that was used to redirect the resource owner's user-agent back to the client to deliver the code.  The original text in step (E) seems to say that this URI was used to redirect the client, but I think this is an ambiguous/imprecise use of the word "client."  It was not the OAuth client that was redirected using that URI, it was the resource owner's user-agent that was redirected, *to* the client.

The parenthetical (the resource owner's user-agent) is more precise but may perhaps be too verbose.  I think, at minimum, we must say "....the URI used to redirect *to* the client in step (C)."

Instructions:
-------------
This errata is currently posted as "Reported". If necessary, please
use "Reply All" to discuss whether it should be verified or
rejected. When a decision is reached, the verifying party (IESG)
can log in to change the status and edit the report, if necessary. 

--------------------------------------
RFC6749 (draft-ietf-oauth-v2-31)
--------------------------------------
Title               : The OAuth 2.0 Authorization Framework
Publication Date    : October 2012
Author(s)           : D. Hardt, Ed.
Category            : PROPOSED STANDARD
Source              : Web Authorization Protocol
Area                : Security
Stream              : IETF
Verifying Party     : IESG

From hannes.tschofenig@gmx.net  Wed Feb 27 00:46:37 2013
Return-Path: <hannes.tschofenig@gmx.net>
X-Original-To: oauth@ietfa.amsl.com
Delivered-To: oauth@ietfa.amsl.com
Received: from localhost (localhost [127.0.0.1]) by ietfa.amsl.com (Postfix) with ESMTP id 6AEFB21F850C for <oauth@ietfa.amsl.com>; Wed, 27 Feb 2013 00:46:37 -0800 (PST)
X-Virus-Scanned: amavisd-new at amsl.com
X-Spam-Flag: NO
X-Spam-Score: -100.117
X-Spam-Level: 
X-Spam-Status: No, score=-100.117 tagged_above=-999 required=5 tests=[AWL=-1.297, BAYES_00=-2.599, J_CHICKENPOX_33=0.6, J_CHICKENPOX_63=0.6, RCVD_IN_BL_SPAMCOP_NET=1.96, RCVD_IN_SORBS_WEB=0.619, USER_IN_WHITELIST=-100]
Received: from mail.ietf.org ([64.170.98.30]) by localhost (ietfa.amsl.com [127.0.0.1]) (amavisd-new, port 10024) with ESMTP id 6YNe1FPIFj6Y for <oauth@ietfa.amsl.com>; Wed, 27 Feb 2013 00:46:36 -0800 (PST)
Received: from mout.gmx.net (mout.gmx.net [212.227.15.18]) by ietfa.amsl.com (Postfix) with ESMTP id 95E1B21F8506 for <oauth@ietf.org>; Wed, 27 Feb 2013 00:46:36 -0800 (PST)
Received: from mailout-de.gmx.net ([10.1.76.29]) by mrigmx.server.lan (mrigmx001) with ESMTP (Nemesis) id 0LxIqi-1UvDiz2ABu-0170zh for <oauth@ietf.org>; Wed, 27 Feb 2013 09:46:35 +0100
Received: (qmail invoked by alias); 27 Feb 2013 08:46:35 -0000
Received: from unknown (EHLO [10.255.128.80]) [194.251.119.201] by mail.gmx.net (mp029) with SMTP; 27 Feb 2013 09:46:35 +0100
X-Authenticated: #29516787
X-Provags-ID: V01U2FsdGVkX1/ycJpiBhXyyKdZqNsuFdOko0jIUYA5wtwv/aqS7G SkPu+Br37N06x6
Mime-Version: 1.0 (Apple Message framework v1085)
Content-Type: text/plain; charset=us-ascii
From: Hannes Tschofenig <hannes.tschofenig@gmx.net>
In-Reply-To: <512CAC45.9070501@gmail.com>
Date: Wed, 27 Feb 2013 10:46:30 +0200
Content-Transfer-Encoding: quoted-printable
Message-Id: <7E351B5A-5609-46B0-A15A-CF3FA1D97D56@gmx.net>
References: <AECF561A-BD17-4FF0-B60A-FB8594159EA9@gmx.net> <512CAC45.9070501@gmail.com>
To: Sergey Beryozkin <sberyozkin@gmail.com>
X-Mailer: Apple Mail (2.1085)
X-Y-GMX-Trusted: 0
Cc: oauth@ietf.org
Subject: Re: [OAUTH-WG] draft-ietf-oauth-v2-http-mac and draft-tschofenig-oauth-hotk re-submitted
X-BeenThere: oauth@ietf.org
X-Mailman-Version: 2.1.12
Precedence: list
List-Id: OAUTH WG <oauth.ietf.org>
List-Unsubscribe: <https://www.ietf.org/mailman/options/oauth>, <mailto:oauth-request@ietf.org?subject=unsubscribe>
List-Archive: <http://www.ietf.org/mail-archive/web/oauth>
List-Post: <mailto:oauth@ietf.org>
List-Help: <mailto:oauth-request@ietf.org?subject=help>
List-Subscribe: <https://www.ietf.org/mailman/listinfo/oauth>, <mailto:oauth-request@ietf.org?subject=subscribe>
X-List-Received-Date: Wed, 27 Feb 2013 08:46:37 -0000

Hi Sergey,=20

thanks for your input.=20

On Feb 26, 2013, at 2:36 PM, Sergey Beryozkin wrote:

> Hi Hannes
> On 25/02/13 12:46, Hannes Tschofenig wrote:
>> Hi all,
>>=20
>> I just submitted an updated version of the =
draft-ietf-oauth-v2-http-mac-03.txt.
>>=20
>=20
> It definitely has more interesting content (about architecture, =
session keys, etc) - this is really useful IMHO.
>=20
> What I'm not really understanding is why a 2-way TLS transport for the =
session key is not even considered.

Could you explain how this would look like?=20

> Instead this uber-complex (in the context of this spec, IMHO) JWT =
thing is there once again. I appreciate why it may be the case, =
primarily to do with reusing the work done around JWT and having some =
common/recommended access token representation, but disallowing a basic =
bearer token be 'enhanced' with MAC over two-way TLS seems like not =
ideal at all IMHO.

Note that JWT is used only for the access token encoding.=20

> To be honest, I'm not sure why would anyone use JWT+MAC instead of =
just JWE,

Actually, the authorization server encrypts the access token using JWE =
and the client uses MAC.=20
So, using JWT + MAC is actually not possible since the security =
mechanisms are used by different entities: the MAC is used by the client =
and the access token protection is accomplished by the authorization =
server.=20

> in cases when people are really comfortable with doing JWT. I guess we =
may be talking now about better security characteristics, but this will =
help a very limited audience as compared to a wider one which can use =
Bearer+MAC over 2-way TLS, straightforward, very cheap effort to get =
started.
>=20

Ciao
Hannes

> just my 2c
> Thanks, Sergey
>=20
>> I would like to point out that this is **discussion input** -- not =
agreed content. Anything in the document is subject to change!
>> You also may notice that there are a few questions in the writeup.
>>=20
>> I was trying to more specific about some of the design aspects that =
folks had proposed during the last few months.
>> I have also re-submitted the draft-tschofenig-oauth-hotk, which =
includes a TLS and a JSON-based solution approach.
>>=20
>> In general, the open questions still seem to be related to
>> * Key distribution: What should be described in a document? What is =
mandatory to implement?
>> * Selective header field protection: This is something that was =
brought forward in discussions and I have included a proposal of how =
this could look like.
>> * Channel Binding: Functionality is also included to deal with =
man-in-the-middle attacks against TLS. There are, however, two types of =
channel bindings defined in RFC 5929. Are both needed? If not, which one =
should be selected?
>> * Integrity protection and data origin authentication in both =
directions: The current writeup allows the protection to be extended to =
messages beyond the initial request. This also offers key confirmation =
by the server and protection of any responses.
>>=20
>> Writing the text I also noticed that I do not quite understand how =
nested JWT documents are supposed to look like. For example, how do I =
encrypt the mac_key carried inside the JWT plus add a signature of all =
other fields? Currently, I have just encrypted the entire payload.
>>=20
>> I hope to have some discussions prior to the IETF meeting so that we =
have a more fruitful discussion at the face-to-face meeting.
>>=20
>> Ciao
>> Hannes
>>=20
>> _______________________________________________
>> OAuth mailing list
>> OAuth@ietf.org
>> https://www.ietf.org/mailman/listinfo/oauth
>=20
> _______________________________________________
> OAuth mailing list
> OAuth@ietf.org
> https://www.ietf.org/mailman/listinfo/oauth


From hannes.tschofenig@gmx.net  Wed Feb 27 00:58:01 2013
Return-Path: <hannes.tschofenig@gmx.net>
X-Original-To: oauth@ietfa.amsl.com
Delivered-To: oauth@ietfa.amsl.com
Received: from localhost (localhost [127.0.0.1]) by ietfa.amsl.com (Postfix) with ESMTP id 00AB321F85D6 for <oauth@ietfa.amsl.com>; Wed, 27 Feb 2013 00:58:01 -0800 (PST)
X-Virus-Scanned: amavisd-new at amsl.com
X-Spam-Flag: NO
X-Spam-Score: -100.069
X-Spam-Level: 
X-Spam-Status: No, score=-100.069 tagged_above=-999 required=5 tests=[AWL=-1.249, BAYES_00=-2.599, J_CHICKENPOX_33=0.6, J_CHICKENPOX_63=0.6, RCVD_IN_BL_SPAMCOP_NET=1.96, RCVD_IN_SORBS_WEB=0.619, USER_IN_WHITELIST=-100]
Received: from mail.ietf.org ([64.170.98.30]) by localhost (ietfa.amsl.com [127.0.0.1]) (amavisd-new, port 10024) with ESMTP id ploQgRBvqzwK for <oauth@ietfa.amsl.com>; Wed, 27 Feb 2013 00:58:00 -0800 (PST)
Received: from mout.gmx.net (mout.gmx.net [212.227.17.20]) by ietfa.amsl.com (Postfix) with ESMTP id 1707E21F85EB for <oauth@ietf.org>; Wed, 27 Feb 2013 00:57:59 -0800 (PST)
Received: from mailout-de.gmx.net ([10.1.76.27]) by mrigmx.server.lan (mrigmx001) with ESMTP (Nemesis) id 0LrXxT-1UosA749an-013Q9E for <oauth@ietf.org>; Wed, 27 Feb 2013 09:57:59 +0100
Received: (qmail invoked by alias); 27 Feb 2013 08:57:58 -0000
Received: from unknown (EHLO [10.255.128.80]) [194.251.119.201] by mail.gmx.net (mp027) with SMTP; 27 Feb 2013 09:57:58 +0100
X-Authenticated: #29516787
X-Provags-ID: V01U2FsdGVkX19ouNkj7YtomCMNYVJTHKtor4Iam1D1sK2D3ZTc2D mqYoAPspn7XPDK
Mime-Version: 1.0 (Apple Message framework v1085)
Content-Type: text/plain; charset=us-ascii
From: Hannes Tschofenig <hannes.tschofenig@gmx.net>
In-Reply-To: <512CAF54.1060204@gmail.com>
Date: Wed, 27 Feb 2013 10:54:42 +0200
Content-Transfer-Encoding: quoted-printable
Message-Id: <1EE69E99-6051-4078-8CDE-63558075FE16@gmx.net>
References: <AECF561A-BD17-4FF0-B60A-FB8594159EA9@gmx.net> <512CAC45.9070501@gmail.com> <512CAF54.1060204@gmail.com>
To: Sergey Beryozkin <sberyozkin@gmail.com>
X-Mailer: Apple Mail (2.1085)
X-Y-GMX-Trusted: 0
Cc: oauth@ietf.org
Subject: Re: [OAUTH-WG] draft-ietf-oauth-v2-http-mac and draft-tschofenig-oauth-hotk re-submitted
X-BeenThere: oauth@ietf.org
X-Mailman-Version: 2.1.12
Precedence: list
List-Id: OAUTH WG <oauth.ietf.org>
List-Unsubscribe: <https://www.ietf.org/mailman/options/oauth>, <mailto:oauth-request@ietf.org?subject=unsubscribe>
List-Archive: <http://www.ietf.org/mail-archive/web/oauth>
List-Post: <mailto:oauth@ietf.org>
List-Help: <mailto:oauth-request@ietf.org?subject=help>
List-Subscribe: <https://www.ietf.org/mailman/listinfo/oauth>, <mailto:oauth-request@ietf.org?subject=subscribe>
X-List-Received-Date: Wed, 27 Feb 2013 08:58:01 -0000

Hi Sergey,=20

good that this issue got clarified.=20

Regarding:=20

> By the way, should the server be able to enforce the use of MAC as =
opposed to having a client preferring it with its audience info ? If the =
client does not understand it then it does not have the capabilities to =
work with this specific server.

Currently, the authorization server decides about the use of a certain =
token type. The audience field is used to allow the client to tell the =
server which resource  server it wants to talk to. This is of value not =
only for this specification but also for the bearer token specification. =
In this specification the resource server uses this audience field for =
selecting the appropriate key to encrypt the access token. If the client =
is tricked in sending the access token to a different resource server =
then that server will not be able to decrypt the access token and will =
not be able to retrieve the session key. Consequently, it will not be =
able to impersonate the client towards another resource server.=20

Ciao
Hannes

On Feb 26, 2013, at 2:49 PM, Sergey Beryozkin wrote:

> Hi Again
> On 26/02/13 12:36, Sergey Beryozkin wrote:
>> Hi Hannes
>> On 25/02/13 12:46, Hannes Tschofenig wrote:
>>> Hi all,
>>>=20
>>> I just submitted an updated version of the
>>> draft-ietf-oauth-v2-http-mac-03.txt.
>>>=20
>>=20
>> It definitely has more interesting content (about architecture, =
session
>> keys, etc) - this is really useful IMHO.
>>=20
>> What I'm not really understanding is why a 2-way TLS transport for =
the
>> session key is not even considered.
>> Instead this uber-complex (in the context of this spec, IMHO) JWT =
thing
>> is there once again. I appreciate why it may be the case, primarily =
to
>> do with reusing the work done around JWT and having some
>> common/recommended access token representation, but disallowing a =
basic
>> bearer token be 'enhanced' with MAC over two-way TLS seems like not
>> ideal at all IMHO.
>> To be honest, I'm not sure why would anyone use JWT+MAC instead of =
just
>> JWE, in cases when people are really comfortable with doing JWT. I =
guess
>> we may be talking now about better security characteristics, but this
>> will help a very limited audience as compared to a wider one which =
can
>> use Bearer+MAC over 2-way TLS, straightforward, very cheap effort to =
get
>> started.
>>=20
> Oops, I've misread, I think I did, I was reading a Session Key =
Transport to Resource Server section [1] where using JWT seems just OK, =
while a transport to the client section [2] does not enforce the use of =
JWT.
>=20
> Sorry for a noise :-)
>=20
> By the way, should the server be able to enforce the use of MAC as =
opposed to having a client preferring it with its audience info ? If the =
client does not understand it then it does not have the capabilities to =
work with this specific server.
>=20
> Thanks, Sergey
>=20
> [1] =
http://tools.ietf.org/html/draft-ietf-oauth-v2-http-mac-03#section-4.2
> [2] =
http://tools.ietf.org/html/draft-ietf-oauth-v2-http-mac-03#section-4.1
>=20
>> just my 2c
>> Thanks, Sergey
>>=20
>>> I would like to point out that this is **discussion input** -- not
>>> agreed content. Anything in the document is subject to change!
>>> You also may notice that there are a few questions in the writeup.
>>>=20
>>> I was trying to more specific about some of the design aspects that
>>> folks had proposed during the last few months.
>>> I have also re-submitted the draft-tschofenig-oauth-hotk, which
>>> includes a TLS and a JSON-based solution approach.
>>>=20
>>> In general, the open questions still seem to be related to
>>> * Key distribution: What should be described in a document? What is
>>> mandatory to implement?
>>> * Selective header field protection: This is something that was
>>> brought forward in discussions and I have included a proposal of how
>>> this could look like.
>>> * Channel Binding: Functionality is also included to deal with
>>> man-in-the-middle attacks against TLS. There are, however, two types
>>> of channel bindings defined in RFC 5929. Are both needed? If not,
>>> which one should be selected?
>>> * Integrity protection and data origin authentication in both
>>> directions: The current writeup allows the protection to be extended
>>> to messages beyond the initial request. This also offers key
>>> confirmation by the server and protection of any responses.
>>>=20
>>> Writing the text I also noticed that I do not quite understand how
>>> nested JWT documents are supposed to look like. For example, how do =
I
>>> encrypt the mac_key carried inside the JWT plus add a signature of =
all
>>> other fields? Currently, I have just encrypted the entire payload.
>>>=20
>>> I hope to have some discussions prior to the IETF meeting so that we
>>> have a more fruitful discussion at the face-to-face meeting.
>>>=20
>>> Ciao
>>> Hannes
>>>=20
>>> _______________________________________________
>>> OAuth mailing list
>>> OAuth@ietf.org
>>> https://www.ietf.org/mailman/listinfo/oauth
>>=20
>=20
>=20
> _______________________________________________
> OAuth mailing list
> OAuth@ietf.org
> https://www.ietf.org/mailman/listinfo/oauth


From wmills_92105@yahoo.com  Wed Feb 27 01:12:56 2013
Return-Path: <wmills_92105@yahoo.com>
X-Original-To: oauth@ietfa.amsl.com
Delivered-To: oauth@ietfa.amsl.com
Received: from localhost (localhost [127.0.0.1]) by ietfa.amsl.com (Postfix) with ESMTP id CBFC721F85F5 for <oauth@ietfa.amsl.com>; Wed, 27 Feb 2013 01:12:56 -0800 (PST)
X-Virus-Scanned: amavisd-new at amsl.com
X-Spam-Flag: NO
X-Spam-Score: -2.318
X-Spam-Level: 
X-Spam-Status: No, score=-2.318 tagged_above=-999 required=5 tests=[AWL=0.280,  BAYES_00=-2.599, HTML_MESSAGE=0.001]
Received: from mail.ietf.org ([64.170.98.30]) by localhost (ietfa.amsl.com [127.0.0.1]) (amavisd-new, port 10024) with ESMTP id uMz-Xf6bk9HK for <oauth@ietfa.amsl.com>; Wed, 27 Feb 2013 01:12:56 -0800 (PST)
Received: from nm37.bullet.mail.bf1.yahoo.com (nm37.bullet.mail.bf1.yahoo.com [72.30.239.57]) by ietfa.amsl.com (Postfix) with ESMTP id B14E221F85FC for <oauth@ietf.org>; Wed, 27 Feb 2013 01:12:55 -0800 (PST)
Received: from [98.139.212.147] by nm37.bullet.mail.bf1.yahoo.com with NNFMP; 27 Feb 2013 09:12:55 -0000
Received: from [98.139.212.211] by tm4.bullet.mail.bf1.yahoo.com with NNFMP; 27 Feb 2013 09:12:55 -0000
Received: from [127.0.0.1] by omp1020.mail.bf1.yahoo.com with NNFMP; 27 Feb 2013 09:12:55 -0000
X-Yahoo-Newman-Property: ymail-3
X-Yahoo-Newman-Id: 26450.59172.bm@omp1020.mail.bf1.yahoo.com
Received: (qmail 14502 invoked by uid 60001); 27 Feb 2013 09:12:54 -0000
DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=yahoo.com; s=s1024; t=1361956374; bh=p2ZwHfjuBl1zmun2uVOdtNAuhfGD6TBBfTFP4EnuZaU=; h=X-YMail-OSG:Received:X-Rocket-MIMEInfo:X-Mailer:References:Message-ID:Date:From:Reply-To:Subject:To:In-Reply-To:MIME-Version:Content-Type; b=hs/8wmGV42lxczLviTQEfiM0tvl+eB4w6TU4+J4E3xZSSl/L7wMZxb/fSJ/cT90rff7LqbjPOWTFl1T4JAWXNO6sIlZFTgbLv6OJo6FcwtOxuxII0CBsLDrV9URqUXZVPR7ukHqFawhy6FpiroU7vjtDI3jV5tbqRM4VVcIPJbU=
DomainKey-Signature: a=rsa-sha1; q=dns; c=nofws; s=s1024; d=yahoo.com; h=X-YMail-OSG:Received:X-Rocket-MIMEInfo:X-Mailer:References:Message-ID:Date:From:Reply-To:Subject:To:In-Reply-To:MIME-Version:Content-Type; b=45NZveOZWiAcnBD0zRrJblflQHn2rebOMGEcvzMb7TYJGDklf3o16CNZtQPk7zUlZ7kZBqFv3Hb9YKQN86LkWf4pZ/lNP4ekO7CNjSHpgkJ6DKgnnkk4S1VqZBKv/j5lKtgg1tWdoEEwu4+6IKmMo1+LZMqD2ZAmTGSsK1UwTGM=;
X-YMail-OSG: X1KNjWsVM1n6doj7Lw6rC66liX8jGGoCkn5fR.K3c2jESGK 8A2.N92wGUWIqkYo.fIup5Ye7_fNH49Ge_u2apjscYwafJ8W2ZZyRadPNsNo xUv.R0360jyLW7Kp9cRXEvto0oyjiCPc9K33SlAawWdSi4Hez6HNf.mmisG8 yLwJfLaBipa64DBdZK.mNlYyLxodJJ7ibWEOxx88OsnRgzJNlpKYcTIUJ52k o2SegfgQ6AI9DtOeYD.zt_3svpFcebzGIIBN1mFDWvUYAUM5PBQLme6UPABC Ln2.q_qiXrlRejJ3nLzMWWHG.rDgevW85PywuYGa80xXzFmvbo9LLROwPLAN 8xbBVukU4mYKRoOjF2v6XVsJTElOrFaNG1oR2UXhf3drYUcouMofNVl4UNa0 ev2xnqdFY2JHYyCGFDEed6v5oTizuWk4PBGbpOmm.i0vC.leexgupruNIPRb C7kqEdoVWeg88SM.Kg0pmxYDsYhiECwcbG87XXrAlq72OtnOiSIUZ75c0baU 93LxXG_ipBjTejFFz8KHA7wAfad5mufSJegeIb4IetXHD_R0bCRyVTq0eFOJ x
Received: from [209.131.62.115] by web31807.mail.mud.yahoo.com via HTTP; Wed, 27 Feb 2013 01:12:53 PST
X-Rocket-MIMEInfo: 001.001, SnVzdCByZWFkIHRoZSBkcmFmdCBxdWlja2x5LiDCoAoKU2luY2Ugd2UncmUgbm93IGxlYW5pbmcgb24gSldUIGRvIHdlIG5lZWQgdG8gaW5jbHVkZSB0aGUgdG9rZW4gaW4gdGhpcz8gwqBXaHkgbm90IGp1c3QgbWFrZSBhbiBhZGRpdGlvbmFsICJFbnZlbG9wZSBNQUMiIHRoaW5nIGFuZCBoYXZlIHRoZSBzaWduYXR1cmUgaW5jbHVkZSB0aGUgMyBKV1QgcGFydHMgaW4gdGhlIHNpZ25hdHVyZSBiYXNlIHN0cmluZz8gwqBUaGF0IG9iamVjdCB0aGVuIGp1c3QgYmVjb21lcyBhIEpTT04gY29udGFpbmVyIGZvciABMAEBAQE-
X-Mailer: YahooMailWebService/0.8.135.514
References: <20130225124642.7425.65145.idtracker@ietfa.amsl.com>
Message-ID: <1361956373.9883.YahooMailNeo@web31807.mail.mud.yahoo.com>
Date: Wed, 27 Feb 2013 01:12:53 -0800 (PST)
From: William Mills <wmills_92105@yahoo.com>
To: "oauth@ietf.org" <oauth@ietf.org>, Hannes Tschofenig <hannes.tschofenig@gmx.net>
In-Reply-To: <20130225124642.7425.65145.idtracker@ietfa.amsl.com>
MIME-Version: 1.0
Content-Type: multipart/alternative; boundary="-125733401-455653446-1361956373=:9883"
Subject: Re: [OAUTH-WG] I-D Action: draft-ietf-oauth-v2-http-mac-03.txt
X-BeenThere: oauth@ietf.org
X-Mailman-Version: 2.1.12
Precedence: list
Reply-To: William Mills <wmills_92105@yahoo.com>
List-Id: OAUTH WG <oauth.ietf.org>
List-Unsubscribe: <https://www.ietf.org/mailman/options/oauth>, <mailto:oauth-request@ietf.org?subject=unsubscribe>
List-Archive: <http://www.ietf.org/mail-archive/web/oauth>
List-Post: <mailto:oauth@ietf.org>
List-Help: <mailto:oauth-request@ietf.org?subject=help>
List-Subscribe: <https://www.ietf.org/mailman/listinfo/oauth>, <mailto:oauth-request@ietf.org?subject=subscribe>
X-List-Received-Date: Wed, 27 Feb 2013 09:12:56 -0000

---125733401-455653446-1361956373=:9883
Content-Type: text/plain; charset=iso-8859-1
Content-Transfer-Encoding: quoted-printable

Just read the draft quickly. =A0=0A=0ASince we're now leaning on JWT do we =
need to include the token in this? =A0Why not just make an additional "Enve=
lope MAC" thing and have the signature include the 3 JWT parts in the signa=
ture base string? =A0That object then just becomes a JSON container for the=
 kid, timestamp, signature method, signature etc. That thing then is a 4th =
base64 encoded JSON thing in the auth header.=0A=0AHow header fields get in=
cluded in the signature needs definition.=0A=0AWhy did you kill the port nu=
mber, nonce, and extension parameter out of the signature base string?=0A=
=0AThe BNF appears to have no separators between values.=0A=0A-bill=0A=0A=
=0A=0A________________________________=0A From: "internet-drafts@ietf.org" =
<internet-drafts@ietf.org>=0ATo: i-d-announce@ietf.org =0ACc: oauth@ietf.or=
g =0ASent: Monday, February 25, 2013 4:46 AM=0ASubject: [OAUTH-WG] I-D Acti=
on: draft-ietf-oauth-v2-http-mac-03.txt=0A =0A=0AA New Internet-Draft is av=
ailable from the on-line Internet-Drafts directories.=0AThis draft is a wor=
k item of the Web Authorization Protocol Working Group of the IETF.=0A=0A=
=A0=A0=A0 Title=A0 =A0 =A0 =A0 =A0  : OAuth 2.0 Message Authentication Code=
 (MAC) Tokens=0A=A0=A0=A0 Author(s)=A0 =A0 =A0  : Justin Richer=0A=A0 =A0 =
=A0 =A0 =A0 =A0 =A0 =A0 =A0 =A0 =A0 =A0 =A0 William Mills=0A=A0 =A0 =A0 =A0=
 =A0 =A0 =A0 =A0 =A0 =A0 =A0 =A0 =A0 Hannes Tschofenig=0A=A0=A0=A0 Filename=
=A0 =A0 =A0 =A0 : draft-ietf-oauth-v2-http-mac-03.txt=0A=A0=A0=A0 Pages=A0 =
=A0 =A0 =A0 =A0  : 26=0A=A0=A0=A0 Date=A0 =A0 =A0 =A0 =A0 =A0 : 2013-02-25=
=0A=0AAbstract:=0A=A0  This specification describes how to use MAC Tokens i=
n HTTP requests=0A=A0  to access OAuth 2.0 protected resources.=A0 An OAuth=
 client willing to=0A=A0  access a protected resource needs to demonstrate =
possession of a=0A=A0  crytographic key by using it with a keyed message di=
gest function to=0A=A0  the request.=0A=0A=A0  The document also defines a =
key distribution protocol for obtaining a=0A=A0  fresh session key.=0A=0A=
=0AThe IETF datatracker status page for this draft is:=0Ahttps://datatracke=
r.ietf.org/doc/draft-ietf-oauth-v2-http-mac=0A=0AThere's also a htmlized ve=
rsion available at:=0Ahttp://tools.ietf.org/html/draft-ietf-oauth-v2-http-m=
ac-03=0A=0AA diff from the previous version is available at:=0Ahttp://www.i=
etf.org/rfcdiff?url2=3Ddraft-ietf-oauth-v2-http-mac-03=0A=0A=0AInternet-Dra=
fts are also available by anonymous FTP at:=0Aftp://ftp.ietf.org/internet-d=
rafts/=0A=0A_______________________________________________=0AOAuth mailing=
 list=0AOAuth@ietf.org=0Ahttps://www.ietf.org/mailman/listinfo/oauth
---125733401-455653446-1361956373=:9883
Content-Type: text/html; charset=iso-8859-1
Content-Transfer-Encoding: quoted-printable

<html><body><div style=3D"color:#000; background-color:#fff; font-family:Co=
urier New, courier, monaco, monospace, sans-serif;font-size:12pt"><div><spa=
n>Just read the draft quickly. &nbsp;</span></div><div style=3D"color: rgb(=
0, 0, 0); font-size: 16px; font-family: 'Courier New', courier, monaco, mon=
ospace, sans-serif; background-color: transparent; font-style: normal;"><sp=
an><br></span></div><div style=3D"color: rgb(0, 0, 0); font-size: 16px; fon=
t-family: 'Courier New', courier, monaco, monospace, sans-serif; background=
-color: transparent; font-style: normal;"><span>Since we're now leaning on =
JWT do we need to include the token in this? &nbsp;Why not just make an add=
itional "Envelope MAC" thing and have the signature include the 3 JWT parts=
 in the signature base string? &nbsp;That object then just becomes a JSON c=
ontainer for the kid, timestamp, signature method, signature etc. That thin=
g then is a 4th base64 encoded JSON thing in the auth
 header.</span></div><div style=3D"color: rgb(0, 0, 0); font-size: 16px; fo=
nt-family: 'Courier New', courier, monaco, monospace, sans-serif; backgroun=
d-color: transparent; font-style: normal;"><span><br></span></div><div styl=
e=3D"color: rgb(0, 0, 0); font-size: 16px; font-family: 'Courier New', cour=
ier, monaco, monospace, sans-serif; background-color: transparent; font-sty=
le: normal;"><span>How header fields get included in the signature needs de=
finition.</span></div><div style=3D"color: rgb(0, 0, 0); font-size: 16px; f=
ont-family: 'Courier New', courier, monaco, monospace, sans-serif; backgrou=
nd-color: transparent; font-style: normal;"><span><br></span></div><div sty=
le=3D"color: rgb(0, 0, 0); font-size: 16px; font-family: 'Courier New', cou=
rier, monaco, monospace, sans-serif; background-color: transparent; font-st=
yle: normal;"><span>Why did you kill the port number, nonce, and extension =
parameter out of the signature base string?</span></div><div style=3D"color=
:
 rgb(0, 0, 0); font-size: 16px; font-family: 'Courier New', courier, monaco=
, monospace, sans-serif; background-color: transparent; font-style: normal;=
"><span><br></span></div><div style=3D"color: rgb(0, 0, 0); font-size: 16px=
; font-family: 'Courier New', courier, monaco, monospace, sans-serif; backg=
round-color: transparent; font-style: normal;"><span>The BNF appears to hav=
e no separators between values.</span></div><div style=3D"color: rgb(0, 0, =
0); font-size: 16px; font-family: 'Courier New', courier, monaco, monospace=
, sans-serif; background-color: transparent; font-style: normal;"><span><br=
></span></div><div style=3D"color: rgb(0, 0, 0); font-size: 16px; font-fami=
ly: 'Courier New', courier, monaco, monospace, sans-serif; background-color=
: transparent; font-style: normal;"><span>-bill</span></div><div style=3D"c=
olor: rgb(0, 0, 0); font-size: 16px; font-family: 'Courier New', courier, m=
onaco, monospace, sans-serif; background-color: transparent; font-style:
 normal;"><span><br></span></div><div><br></div>  <div style=3D"font-family=
: 'Courier New', courier, monaco, monospace, sans-serif; font-size: 12pt;">=
 <div style=3D"font-family: 'times new roman', 'new york', times, serif; fo=
nt-size: 12pt;"> <div dir=3D"ltr"> <font size=3D"2" face=3D"Arial"> <hr siz=
e=3D"1">  <b><span style=3D"font-weight:bold;">From:</span></b> "internet-d=
rafts@ietf.org" &lt;internet-drafts@ietf.org&gt;<br> <b><span style=3D"font=
-weight: bold;">To:</span></b> i-d-announce@ietf.org <br><b><span style=3D"=
font-weight: bold;">Cc:</span></b> oauth@ietf.org <br> <b><span style=3D"fo=
nt-weight: bold;">Sent:</span></b> Monday, February 25, 2013 4:46 AM<br> <b=
><span style=3D"font-weight: bold;">Subject:</span></b> [OAUTH-WG] I-D Acti=
on: draft-ietf-oauth-v2-http-mac-03.txt<br> </font> </div> <br>=0A<br>A New=
 Internet-Draft is available from the on-line Internet-Drafts directories.<=
br> This draft is a work item of the Web Authorization Protocol Working Gro=
up of the IETF.<br><br>&nbsp;&nbsp;&nbsp; Title&nbsp; &nbsp; &nbsp; &nbsp; =
&nbsp;  : OAuth 2.0 Message Authentication Code (MAC) Tokens<br>&nbsp;&nbsp=
;&nbsp; Author(s)&nbsp; &nbsp; &nbsp;  : Justin Richer<br>&nbsp; &nbsp; &nb=
sp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; W=
illiam Mills<br>&nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nb=
sp; &nbsp; &nbsp; &nbsp; &nbsp; Hannes Tschofenig<br>&nbsp;&nbsp;&nbsp; Fil=
ename&nbsp; &nbsp; &nbsp; &nbsp; : draft-ietf-oauth-v2-http-mac-03.txt<br>&=
nbsp;&nbsp;&nbsp; Pages&nbsp; &nbsp; &nbsp; &nbsp; &nbsp;  : 26<br>&nbsp;&n=
bsp;&nbsp; Date&nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; : 2013-02-25<br><b=
r>Abstract:<br>&nbsp;  This specification describes how to use MAC Tokens i=
n HTTP requests<br>&nbsp;  to access OAuth 2.0 protected
 resources.&nbsp; An OAuth client willing to<br>&nbsp;  access a protected =
resource needs to demonstrate possession of a<br>&nbsp;  crytographic key b=
y using it with a keyed message digest function to<br>&nbsp;  the request.<=
br><br>&nbsp;  The document also defines a key distribution protocol for ob=
taining a<br>&nbsp;  fresh session key.<br><br><br>The IETF datatracker sta=
tus page for this draft is:<br><a href=3D"https://datatracker.ietf.org/doc/=
draft-ietf-oauth-v2-http-mac" target=3D"_blank">https://datatracker.ietf.or=
g/doc/draft-ietf-oauth-v2-http-mac</a><br><br>There's also a htmlized versi=
on available at:<br>http://tools.ietf.org/html/draft-ietf-oauth-v2-http-mac=
-03<br><br>A diff from the previous version is available at:<br>http://www.=
ietf.org/rfcdiff?url2=3Ddraft-ietf-oauth-v2-http-mac-03<br><br><br>Internet=
-Drafts are also available by anonymous FTP at:<br><a href=3D"ftp://ftp.iet=
f.org/internet-drafts/"
 target=3D"_blank">ftp://ftp.ietf.org/internet-drafts/</a><br><br>_________=
______________________________________<br>OAuth mailing list<br><a ymailto=
=3D"mailto:OAuth@ietf.org" href=3D"mailto:OAuth@ietf.org">OAuth@ietf.org</a=
><br><a href=3D"https://www.ietf.org/mailman/listinfo/oauth" target=3D"_bla=
nk">https://www.ietf.org/mailman/listinfo/oauth</a><br><br><br> </div> </di=
v>  </div></body></html>
---125733401-455653446-1361956373=:9883--

From wmills_92105@yahoo.com  Wed Feb 27 01:18:56 2013
Return-Path: <wmills_92105@yahoo.com>
X-Original-To: oauth@ietfa.amsl.com
Delivered-To: oauth@ietfa.amsl.com
Received: from localhost (localhost [127.0.0.1]) by ietfa.amsl.com (Postfix) with ESMTP id 9173221F84C9 for <oauth@ietfa.amsl.com>; Wed, 27 Feb 2013 01:18:56 -0800 (PST)
X-Virus-Scanned: amavisd-new at amsl.com
X-Spam-Flag: NO
X-Spam-Score: -2.33
X-Spam-Level: 
X-Spam-Status: No, score=-2.33 tagged_above=-999 required=5 tests=[AWL=0.268,  BAYES_00=-2.599, HTML_MESSAGE=0.001]
Received: from mail.ietf.org ([64.170.98.30]) by localhost (ietfa.amsl.com [127.0.0.1]) (amavisd-new, port 10024) with ESMTP id mXyNH0NiqlBY for <oauth@ietfa.amsl.com>; Wed, 27 Feb 2013 01:18:55 -0800 (PST)
Received: from nm5-vm1.bullet.mail.ne1.yahoo.com (nm5-vm1.bullet.mail.ne1.yahoo.com [98.138.91.32]) by ietfa.amsl.com (Postfix) with ESMTP id 6C9FB21F8491 for <oauth@ietf.org>; Wed, 27 Feb 2013 01:18:55 -0800 (PST)
Received: from [98.138.90.54] by nm5.bullet.mail.ne1.yahoo.com with NNFMP; 27 Feb 2013 09:18:55 -0000
Received: from [98.138.89.252] by tm7.bullet.mail.ne1.yahoo.com with NNFMP; 27 Feb 2013 09:18:55 -0000
Received: from [127.0.0.1] by omp1044.mail.ne1.yahoo.com with NNFMP; 27 Feb 2013 09:18:55 -0000
X-Yahoo-Newman-Property: ymail-3
X-Yahoo-Newman-Id: 7401.43848.bm@omp1044.mail.ne1.yahoo.com
Received: (qmail 77804 invoked by uid 60001); 27 Feb 2013 09:18:54 -0000
DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=yahoo.com; s=s1024; t=1361956734; bh=N6/wP1/O5is5HBfl3sHIFMrVxAz0t/2uqvqkQrrXhuc=; h=X-YMail-OSG:Received:X-Rocket-MIMEInfo:X-Mailer:References:Message-ID:Date:From:Reply-To:Subject:To:In-Reply-To:MIME-Version:Content-Type; b=QTkTrDw4RoWzSlAzcB+jubU8GcXcZQ8B8eFQz0ihwSHc+ZGXylJdW80faPQWyD+vl/1QRvGXGj74eMYKYhTLgPQuv3i5PjaTRoZxXygS7Fib0FEHEUJHXaVM6kC0cc4zSCU9LIcDWDVCC1zq+LhJ5yOPeSrxnm7tE/h9m3pbU3k=
DomainKey-Signature: a=rsa-sha1; q=dns; c=nofws; s=s1024; d=yahoo.com; h=X-YMail-OSG:Received:X-Rocket-MIMEInfo:X-Mailer:References:Message-ID:Date:From:Reply-To:Subject:To:In-Reply-To:MIME-Version:Content-Type; b=WXcKRAjKp+muO5cTOwdNfe6uCrOf70sz9P8ls7PlaQR6ODvnodsY2j5rYtDEqlF0/00Hss0lDjqNEPu8N9ZqwAuskMYTlBgypowYiVMP8CbG+uPksL5mViCK8jQL+GtIIATrrAO3xcUzws7TxqiFXlGauDXEk/7JcCX+uow2fxo=;
X-YMail-OSG: XdtjHh0VM1lJNyxfEJgWKU9JSziyWNRVDxbK7kOR4B07V2u bDDyKl9VwuIrcVZ1dmrVl6eM6tpRWpSAOTVFymoQtV_zNcdbBd7UtWx8aXaT ptLsRaU7faZORmq4_kLUARhk2FquIa_bmjCowhS36HBSEq6mZ529yaxCd3is m7..1bVCUUVNQKrhFW7R58F4sUa8roIpNWCeMv3ZyoQ0XlJKVhdDqZGEc50k zRqoUwGcw29u8YZQ1e7o5zUHe8ZvrYtTvKi5iowe.lC3.iIyF.._GpN.UrRu 2lBacfMsexjWu7a_jNeu8Ku.oit28vQCdRJCSn9lzdBGyh23.fghIoMIdG4a pFlpRRFSnil1JtuyUzAa7Zul3sIHoFcnnHmu9kqsLLrn79WjOiaYvolK1Y5w fEaLhUITSTyu_vXez5_F4X4jjxcaRpVnFul3PakoXpm04o7QNvVWTSD9iTZn 0QRnXtxm3wkTfYJv775hwqOc_WZotrROujnm3LqID3.pRIuxD3u12aQvtQ2B mx_G6dCKTjQ5cVT5s3ds0PJrO4uB47MrDmzcNBNTJ.Q--
Received: from [209.131.62.115] by web31802.mail.mud.yahoo.com via HTTP; Wed, 27 Feb 2013 01:18:54 PST
X-Rocket-MIMEInfo: 001.001, QW5kIGFsc28uLi4KCkhvdyB3b3VsZCB0aGUgc2VydmVyIG1hbmRhdGUgYSBzZXQgb2YgaGVhZGVyIGZpZWxkcyByZXF1aXJpbmcgc2lnbmF0dXJlPyDCoEhvdyBjYW4gdGhlIHNlcnZlciBtYW5kYXRlIGEgc2lnbmF0dXJlIG1ldGhvZCBvciBkbyB3ZSBqdXN0IHN0YXkgd2l0aCB0aGUgdHdvIG9wdGlvbnMgYW5kIGFsbG93IGVpdGhlcj8gwqBJdCBtaWdodCB3YW50IHRvIGVuZm9yY2UgU0EtMjU2PwoKLWJpbGwKCgpfX19fX19fX19fX19fX19fX19fX19fX19fX19fX19fXwogRnJvbTogV2lsbGlhbSBNaWxscyABMAEBAQE-
X-Mailer: YahooMailWebService/0.8.135.514
References: <20130225124642.7425.65145.idtracker@ietfa.amsl.com> <1361956373.9883.YahooMailNeo@web31807.mail.mud.yahoo.com>
Message-ID: <1361956734.73841.YahooMailNeo@web31802.mail.mud.yahoo.com>
Date: Wed, 27 Feb 2013 01:18:54 -0800 (PST)
From: William Mills <wmills_92105@yahoo.com>
To: "oauth@ietf.org" <oauth@ietf.org>, Hannes Tschofenig <hannes.tschofenig@gmx.net>
In-Reply-To: <1361956373.9883.YahooMailNeo@web31807.mail.mud.yahoo.com>
MIME-Version: 1.0
Content-Type: multipart/alternative; boundary="-1036955950-403965553-1361956734=:73841"
Subject: Re: [OAUTH-WG] I-D Action: draft-ietf-oauth-v2-http-mac-03.txt
X-BeenThere: oauth@ietf.org
X-Mailman-Version: 2.1.12
Precedence: list
Reply-To: William Mills <wmills_92105@yahoo.com>
List-Id: OAUTH WG <oauth.ietf.org>
List-Unsubscribe: <https://www.ietf.org/mailman/options/oauth>, <mailto:oauth-request@ietf.org?subject=unsubscribe>
List-Archive: <http://www.ietf.org/mail-archive/web/oauth>
List-Post: <mailto:oauth@ietf.org>
List-Help: <mailto:oauth-request@ietf.org?subject=help>
List-Subscribe: <https://www.ietf.org/mailman/listinfo/oauth>, <mailto:oauth-request@ietf.org?subject=subscribe>
X-List-Received-Date: Wed, 27 Feb 2013 09:18:56 -0000

---1036955950-403965553-1361956734=:73841
Content-Type: text/plain; charset=iso-8859-1
Content-Transfer-Encoding: quoted-printable

And also...=0A=0AHow would the server mandate a set of header fields requir=
ing signature? =A0How can the server mandate a signature method or do we ju=
st stay with the two options and allow either? =A0It might want to enforce =
SA-256?=0A=0A-bill=0A=0A=0A________________________________=0A From: Willia=
m Mills <wmills_92105@yahoo.com>=0ATo: "oauth@ietf.org" <oauth@ietf.org>; H=
annes Tschofenig <hannes.tschofenig@gmx.net> =0ASent: Wednesday, February 2=
7, 2013 1:12 AM=0ASubject: Re: [OAUTH-WG] I-D Action: draft-ietf-oauth-v2-h=
ttp-mac-03.txt=0A =0A=0AJust read the draft quickly. =A0=0A=0ASince we're n=
ow leaning on JWT do we need to include the token in this? =A0Why not just =
make an additional "Envelope MAC" thing and have the signature include the =
3 JWT parts in the signature base string? =A0That object then just becomes =
a JSON container for the kid, timestamp, signature method, signature etc. T=
hat thing then is a 4th base64 encoded JSON thing in the auth header.=0A=0A=
How header fields get included in the signature needs definition.=0A=0AWhy =
did you kill the port number, nonce, and extension parameter out of the sig=
nature base string?=0A=0AThe BNF appears to have no separators between valu=
es.=0A=0A-bill=0A=0A=0A=0A________________________________=0A From: "intern=
et-drafts@ietf.org" <internet-drafts@ietf.org>=0ATo: i-d-announce@ietf.org =
=0ACc: oauth@ietf.org =0ASent: Monday, February 25, 2013 4:46 AM=0ASubject:=
 [OAUTH-WG] I-D Action: draft-ietf-oauth-v2-http-mac-03.txt=0A =0A=0AA New =
Internet-Draft is available from the on-line Internet-Drafts directories.=
=0AThis draft is a work item of the Web Authorization Protocol Working Grou=
p of the IETF.=0A=0A=A0=A0=A0 Title=A0 =A0 =A0 =A0 =A0  : OAuth 2.0 Message=
 Authentication Code (MAC) Tokens=0A=A0=A0=A0 Author(s)=A0 =A0 =A0  : Justi=
n Richer=0A=A0 =A0 =A0 =A0 =A0 =A0 =A0 =A0 =A0 =A0 =A0 =A0 =A0 William Mill=
s=0A=A0 =A0 =A0 =A0 =A0 =A0 =A0 =A0 =A0 =A0 =A0 =A0 =A0 Hannes Tschofenig=
=0A=A0=A0=A0 Filename=A0 =A0 =A0 =A0 : draft-ietf-oauth-v2-http-mac-03.txt=
=0A=A0=A0=A0 Pages=A0 =A0 =A0 =A0 =A0  : 26=0A=A0=A0=A0 Date=A0 =A0 =A0 =A0=
 =A0 =A0 : 2013-02-25=0A=0AAbstract:=0A=A0  This specification describes ho=
w to use MAC Tokens in HTTP requests=0A=A0  to access OAuth 2.0 protected=
=0A resources.=A0 An OAuth client willing to=0A=A0  access a protected reso=
urce needs to demonstrate possession of a=0A=A0  crytographic key by using =
it with a keyed message digest function to=0A=A0  the request.=0A=0A=A0  Th=
e document also defines a key distribution protocol for obtaining a=0A=A0  =
fresh session key.=0A=0A=0AThe IETF datatracker status page for this draft =
is:=0Ahttps://datatracker.ietf.org/doc/draft-ietf-oauth-v2-http-mac=0A=0ATh=
ere's also a htmlized version available at:=0Ahttp://tools.ietf.org/html/dr=
aft-ietf-oauth-v2-http-mac-03=0A=0AA diff from the previous version is avai=
lable at:=0Ahttp://www.ietf.org/rfcdiff?url2=3Ddraft-ietf-oauth-v2-http-mac=
-03=0A=0A=0AInternet-Drafts are also available by anonymous FTP at:=0Aftp:/=
/ftp.ietf.org/internet-drafts/=0A=0A_______________________________________=
________=0AOAuth mailing list=0AOAuth@ietf.org=0Ahttps://www.ietf.org/mailm=
an/listinfo/oauth
---1036955950-403965553-1361956734=:73841
Content-Type: text/html; charset=iso-8859-1
Content-Transfer-Encoding: quoted-printable

<html><body><div style=3D"color:#000; background-color:#fff; font-family:Co=
urier New, courier, monaco, monospace, sans-serif;font-size:12pt"><div><spa=
n>And also...</span></div><div style=3D"color: rgb(0, 0, 0); font-size: 16p=
x; font-family: 'Courier New', courier, monaco, monospace, sans-serif; back=
ground-color: transparent; font-style: normal;"><span><br></span></div><div=
 style=3D"color: rgb(0, 0, 0); font-size: 16px; font-family: 'Courier New',=
 courier, monaco, monospace, sans-serif; background-color: transparent; fon=
t-style: normal;">How would the server mandate a set of header fields requi=
ring signature? &nbsp;How can the server mandate a signature method or do w=
e just stay with the two options and allow either? &nbsp;It might want to e=
nforce SA-256?</div><div style=3D"color: rgb(0, 0, 0); font-size: 16px; fon=
t-family: 'Courier New', courier, monaco, monospace, sans-serif; background=
-color: transparent; font-style: normal;"><br></div><div style=3D"color:
 rgb(0, 0, 0); font-size: 16px; font-family: 'Courier New', courier, monaco=
, monospace, sans-serif; background-color: transparent; font-style: normal;=
">-bill</div><div><br></div>  <div style=3D"font-family: 'Courier New', cou=
rier, monaco, monospace, sans-serif; font-size: 12pt;"> <div style=3D"font-=
family: 'times new roman', 'new york', times, serif; font-size: 12pt;"> <di=
v dir=3D"ltr"> <font size=3D"2" face=3D"Arial"> <hr size=3D"1">  <b><span s=
tyle=3D"font-weight:bold;">From:</span></b> William Mills &lt;wmills_92105@=
yahoo.com&gt;<br> <b><span style=3D"font-weight: bold;">To:</span></b> "oau=
th@ietf.org" &lt;oauth@ietf.org&gt;; Hannes Tschofenig &lt;hannes.tschofeni=
g@gmx.net&gt; <br> <b><span style=3D"font-weight: bold;">Sent:</span></b> W=
ednesday, February 27, 2013 1:12 AM<br> <b><span style=3D"font-weight: bold=
;">Subject:</span></b> Re: [OAUTH-WG] I-D Action: draft-ietf-oauth-v2-http-=
mac-03.txt<br> </font> </div> <br>=0A<div id=3D"yiv194167897"><div><div sty=
le=3D"color: rgb(0, 0, 0); background-color: rgb(255, 255, 255); font-famil=
y: 'Courier New', courier, monaco, monospace, sans-serif; font-size: 12pt;"=
><div><span>Just read the draft quickly. &nbsp;</span></div><div style=3D"c=
olor: rgb(0, 0, 0); font-size: 16px; font-family: 'Courier New', courier, m=
onaco, monospace, sans-serif; background-color: transparent; font-style: no=
rmal;"><span><br></span></div><div style=3D"color: rgb(0, 0, 0); font-size:=
 16px; font-family: 'Courier New', courier, monaco, monospace, sans-serif; =
background-color: transparent; font-style: normal;"><span>Since we're now l=
eaning on JWT do we need to include the token in this? &nbsp;Why not just m=
ake an additional "Envelope MAC" thing and have the signature include the 3=
 JWT parts in the signature base string? &nbsp;That object then just become=
s a JSON container for the kid, timestamp, signature method, signature etc.=
 That thing then is a 4th base64
 encoded JSON thing in the auth=0A header.</span></div><div style=3D"color:=
 rgb(0, 0, 0); font-size: 16px; font-family: 'Courier New', courier, monaco=
, monospace, sans-serif; background-color: transparent; font-style: normal;=
"><span><br></span></div><div style=3D"color: rgb(0, 0, 0); font-size: 16px=
; font-family: 'Courier New', courier, monaco, monospace, sans-serif; backg=
round-color: transparent; font-style: normal;"><span>How header fields get =
included in the signature needs definition.</span></div><div style=3D"color=
: rgb(0, 0, 0); font-size: 16px; font-family: 'Courier New', courier, monac=
o, monospace, sans-serif; background-color: transparent; font-style: normal=
;"><span><br></span></div><div style=3D"color: rgb(0, 0, 0); font-size: 16p=
x; font-family: 'Courier New', courier, monaco, monospace, sans-serif; back=
ground-color: transparent; font-style: normal;"><span>Why did you kill the =
port number, nonce, and extension parameter out of the signature base strin=
g?</span></div><div style=3D"color:
 rgb(0, 0, 0); font-size: 16px; font-family: 'Courier New', courier, monaco=
, monospace, sans-serif; background-color: transparent; font-style: normal;=
"><span><br></span></div><div style=3D"color: rgb(0, 0, 0); font-size: 16px=
; font-family: 'Courier New', courier, monaco, monospace, sans-serif; backg=
round-color: transparent; font-style: normal;"><span>The BNF appears to hav=
e no separators between values.</span></div><div style=3D"color: rgb(0, 0, =
0); font-size: 16px; font-family: 'Courier New', courier, monaco, monospace=
, sans-serif; background-color: transparent; font-style: normal;"><span><br=
></span></div><div style=3D"color: rgb(0, 0, 0); font-size: 16px; font-fami=
ly: 'Courier New', courier, monaco, monospace, sans-serif; background-color=
: transparent; font-style: normal;"><span>-bill</span></div><div style=3D"c=
olor: rgb(0, 0, 0); font-size: 16px; font-family: 'Courier New', courier, m=
onaco, monospace, sans-serif; background-color: transparent; font-style:
 normal;"><span><br></span></div><div><br></div>  <div style=3D"font-family=
: 'Courier New', courier, monaco, monospace, sans-serif; font-size: 12pt;">=
 <div style=3D"font-family: 'times new roman', 'new york', times, serif; fo=
nt-size: 12pt;"> <div dir=3D"ltr"> <font size=3D"2" face=3D"Arial"> <hr siz=
e=3D"1">  <b><span style=3D"font-weight:bold;">From:</span></b> "internet-d=
rafts@ietf.org" &lt;internet-drafts@ietf.org&gt;<br> <b><span style=3D"font=
-weight:bold;">To:</span></b> i-d-announce@ietf.org <br><b><span style=3D"f=
ont-weight:bold;">Cc:</span></b> oauth@ietf.org <br> <b><span style=3D"font=
-weight:bold;">Sent:</span></b> Monday, February 25, 2013 4:46 AM<br> <b><s=
pan style=3D"font-weight:bold;">Subject:</span></b> [OAUTH-WG] I-D Action: =
draft-ietf-oauth-v2-http-mac-03.txt<br> </font> </div> <br>=0A<br>A New Int=
ernet-Draft is available from the on-line Internet-Drafts directories.<br> =
This draft is a work item of the Web Authorization Protocol Working Group o=
f the IETF.<br><br>&nbsp;&nbsp;&nbsp; Title&nbsp; &nbsp; &nbsp; &nbsp; &nbs=
p;  : OAuth 2.0 Message Authentication Code (MAC) Tokens<br>&nbsp;&nbsp;&nb=
sp; Author(s)&nbsp; &nbsp; &nbsp;  : Justin Richer<br>&nbsp; &nbsp; &nbsp; =
&nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; Willi=
am Mills<br>&nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; =
&nbsp; &nbsp; &nbsp; &nbsp; Hannes Tschofenig<br>&nbsp;&nbsp;&nbsp; Filenam=
e&nbsp; &nbsp; &nbsp; &nbsp; : draft-ietf-oauth-v2-http-mac-03.txt<br>&nbsp=
;&nbsp;&nbsp; Pages&nbsp; &nbsp; &nbsp; &nbsp; &nbsp;  : 26<br>&nbsp;&nbsp;=
&nbsp; Date&nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; : 2013-02-25<br><br>Ab=
stract:<br>&nbsp;  This specification describes how to use MAC Tokens in HT=
TP requests<br>&nbsp;  to access OAuth 2.0 protected=0A resources.&nbsp; An=
 OAuth client willing to<br>&nbsp;  access a protected resource needs to de=
monstrate possession of a<br>&nbsp;  crytographic key by using it with a ke=
yed message digest function to<br>&nbsp;  the request.<br><br>&nbsp;  The d=
ocument also defines a key distribution protocol for obtaining a<br>&nbsp; =
 fresh session key.<br><br><br>The IETF datatracker status page for this dr=
aft is:<br><a rel=3D"nofollow" target=3D"_blank" href=3D"https://datatracke=
r.ietf.org/doc/draft-ietf-oauth-v2-http-mac">https://datatracker.ietf.org/d=
oc/draft-ietf-oauth-v2-http-mac</a><br><br>There's also a htmlized version =
available at:<br>http://tools.ietf.org/html/draft-ietf-oauth-v2-http-mac-03=
<br><br>A diff from the previous version is available at:<br>http://www.iet=
f.org/rfcdiff?url2=3Ddraft-ietf-oauth-v2-http-mac-03<br><br><br>Internet-Dr=
afts are also available by anonymous FTP at:<br><a rel=3D"nofollow" target=
=3D"_blank"
 href=3D"ftp://ftp.ietf.org/internet-drafts/">ftp://ftp.ietf.org/internet-d=
rafts/</a><br><br>_______________________________________________<br>OAuth =
mailing list<br><a rel=3D"nofollow" ymailto=3D"mailto:OAuth@ietf.org" targe=
t=3D"_blank" href=3D"mailto:OAuth@ietf.org">OAuth@ietf.org</a><br><a rel=3D=
"nofollow" target=3D"_blank" href=3D"https://www.ietf.org/mailman/listinfo/=
oauth">https://www.ietf.org/mailman/listinfo/oauth</a><br><br><br> </div> <=
/div>  </div></div></div><br><br> </div> </div>  </div></body></html>
---1036955950-403965553-1361956734=:73841--

From jricher@mitre.org  Wed Feb 27 08:01:08 2013
Return-Path: <jricher@mitre.org>
X-Original-To: oauth@ietfa.amsl.com
Delivered-To: oauth@ietfa.amsl.com
Received: from localhost (localhost [127.0.0.1]) by ietfa.amsl.com (Postfix) with ESMTP id BB2DA21F859D for <oauth@ietfa.amsl.com>; Wed, 27 Feb 2013 08:01:08 -0800 (PST)
X-Virus-Scanned: amavisd-new at amsl.com
X-Spam-Flag: NO
X-Spam-Score: -6.577
X-Spam-Level: 
X-Spam-Status: No, score=-6.577 tagged_above=-999 required=5 tests=[AWL=0.021,  BAYES_00=-2.599, HTML_MESSAGE=0.001, RCVD_IN_DNSWL_MED=-4]
Received: from mail.ietf.org ([64.170.98.30]) by localhost (ietfa.amsl.com [127.0.0.1]) (amavisd-new, port 10024) with ESMTP id iu-ZlZfW5hsd for <oauth@ietfa.amsl.com>; Wed, 27 Feb 2013 08:01:08 -0800 (PST)
Received: from smtpksrv1.mitre.org (smtpksrv1.mitre.org [198.49.146.77]) by ietfa.amsl.com (Postfix) with ESMTP id C0E4721F858A for <oauth@ietf.org>; Wed, 27 Feb 2013 08:01:07 -0800 (PST)
Received: from smtpksrv1.mitre.org (localhost.localdomain [127.0.0.1]) by localhost (Postfix) with SMTP id 98854531147A for <oauth@ietf.org>; Wed, 27 Feb 2013 11:01:02 -0500 (EST)
Received: from IMCCAS03.MITRE.ORG (imccas03.mitre.org [129.83.29.80]) by smtpksrv1.mitre.org (Postfix) with ESMTP id 66E4F5311477 for <oauth@ietf.org>; Wed, 27 Feb 2013 11:01:00 -0500 (EST)
Received: from [10.146.15.29] (129.83.31.58) by IMCCAS03.MITRE.ORG (129.83.29.80) with Microsoft SMTP Server (TLS) id 14.2.318.4; Wed, 27 Feb 2013 11:00:59 -0500
Message-ID: <512E2D7F.6060903@mitre.org>
Date: Wed, 27 Feb 2013 10:59:59 -0500
From: Justin Richer <jricher@mitre.org>
User-Agent: Mozilla/5.0 (X11; Linux i686; rv:17.0) Gecko/20130106 Thunderbird/17.0.2
MIME-Version: 1.0
To: "oauth@ietf.org" <oauth@ietf.org>
Content-Type: multipart/alternative; boundary="------------090205020200050509060703"
X-Originating-IP: [129.83.31.58]
Subject: [OAUTH-WG] Registration: grant_types and response_types
X-BeenThere: oauth@ietf.org
X-Mailman-Version: 2.1.12
Precedence: list
List-Id: OAUTH WG <oauth.ietf.org>
List-Unsubscribe: <https://www.ietf.org/mailman/options/oauth>, <mailto:oauth-request@ietf.org?subject=unsubscribe>
List-Archive: <http://www.ietf.org/mail-archive/web/oauth>
List-Post: <mailto:oauth@ietf.org>
List-Help: <mailto:oauth-request@ietf.org?subject=help>
List-Subscribe: <https://www.ietf.org/mailman/listinfo/oauth>, <mailto:oauth-request@ietf.org?subject=subscribe>
X-List-Received-Date: Wed, 27 Feb 2013 16:01:08 -0000

--------------090205020200050509060703
Content-Type: text/plain; charset="ISO-8859-1"; format=flowed
Content-Transfer-Encoding: 7bit

There has been some press lately about clients being able to use an 
implicit flow to get tokens when they really ought to only use a code 
flow, since the security considerations and protections for both are 
very different. With this in mind, it makes sense that a dynamically 
registered client should be limited to use only certain flows, if at all 
possible.

The dynamic registration document currently handles this using the 
grant_type parameter (introduced in draft -03), which is defined in 
section 2 as follows:

    grant_type
       OPTIONAL.  Array of grant types that a client may use.  These
       grant types are defined as follows:

       *  "authorization_code": The Authorization Code Grant described in
          OAuth2Section 4.1  <http://tools.ietf.org/html/draft-ietf-oauth-dyn-reg-07#section-4.1>.

       *  "implicit": The Implicit Grant described in OAuth2Section 4.2  <http://tools.ietf.org/html/draft-ietf-oauth-dyn-reg-07#section-4.2>.

       *  "password": The Resource Owner Password Credentials Grant
          described in OAuth2Section 4.3  <http://tools.ietf.org/html/draft-ietf-oauth-dyn-reg-07#section-4.3>

       *  "client_credentials": The Client Credentials Grant described in
          OAuth2Section 4.4  <http://tools.ietf.org/html/draft-ietf-oauth-dyn-reg-07#section-4.4>

       *  "refresh_token": The Refresh Token Grant described in OAuth2
          Section 6  <http://tools.ietf.org/html/draft-ietf-oauth-dyn-reg-07#section-6>.

       Authorization Servers MAY allow for other values as defined in
       grant type extensions to OAuth2.  The extension process is
       described in OAuth2Section 2.5  <http://tools.ietf.org/html/draft-ietf-oauth-dyn-reg-07#section-2.5>, and the value of this parameter
       MUST be the same as the value of the "grant_type" parameter
       defined in the extension.


This allows the client to specify which flows it wants to be able to use 
(including any extensions), and allows the server to to tell the client 
in the client configuration response what flows it can expect to work.

OpenID Connect's registration has recently introduced the use of a 
different parameter, response_type, for a similar but slightly different 
purpose. The parameter is defined in the latest draft in source control as:

    response_types
        OPTIONAL. JSON array containing a list of the OAuth 2.0
        response_type
        values that this Client uses. If omitted, the default is that
        the Client
        uses only the coderesponse type. 


OIDC makes use of response_types beyond just "code" and "token", 
defining several new ones including combinations like "code idtoken".

So my question to the group is this: Should we incorporate the OIDC 
response_types parameter? Do we need both parameters specified in the 
registration or is one sufficient? They're defined separately in the 
OAuth2 protocol (one is on the Auth endpoint and one is on the Token 
endpoint), but can only be used legally in particular combinations so 
there would have to be normative text around particular values.

In my opinion, I don't think we can get rid of grant_type, since that's 
the only way to specify things like client_credentials flows and most 
extensions. There might be value in also specifying response_type, but I 
don't want to add extra fields unless there's a clearly defined need for it.

  -- Justin

--------------090205020200050509060703
Content-Type: text/html; charset="ISO-8859-1"
Content-Transfer-Encoding: 7bit

<html>
  <head>

    <meta http-equiv="content-type" content="text/html; charset=ISO-8859-1">
  </head>
  <body bgcolor="#FFFFFF" text="#000000">
    There has been some press lately about clients being able to use an
    implicit flow to get tokens when they really ought to only use a
    code flow, since the security considerations and protections for
    both are very different. With this in mind, it makes sense that a
    dynamically registered client should be limited to use only certain
    flows, if at all possible. <br>
    <br>
    The dynamic registration document currently handles this using the
    grant_type parameter (introduced in draft -03), which is defined in
    section 2 as follows:<br>
    <br>
    <pre class="newpage">   grant_type
      OPTIONAL.  Array of grant types that a client may use.  These
      grant types are defined as follows:

      *  "authorization_code": The Authorization Code Grant described in
         OAuth2 <a href="http://tools.ietf.org/html/draft-ietf-oauth-dyn-reg-07#section-4.1">Section 4.1</a>.

      *  "implicit": The Implicit Grant described in OAuth2 <a href="http://tools.ietf.org/html/draft-ietf-oauth-dyn-reg-07#section-4.2">Section 4.2</a>.

      *  "password": The Resource Owner Password Credentials Grant
         described in OAuth2 <a href="http://tools.ietf.org/html/draft-ietf-oauth-dyn-reg-07#section-4.3">Section 4.3</a>

      *  "client_credentials": The Client Credentials Grant described in
         OAuth2 <a href="http://tools.ietf.org/html/draft-ietf-oauth-dyn-reg-07#section-4.4">Section 4.4</a>

      *  "refresh_token": The Refresh Token Grant described in OAuth2
         <a href="http://tools.ietf.org/html/draft-ietf-oauth-dyn-reg-07#section-6">Section 6</a>.

      Authorization Servers MAY allow for other values as defined in
      grant type extensions to OAuth2.  The extension process is
      described in OAuth2 <a href="http://tools.ietf.org/html/draft-ietf-oauth-dyn-reg-07#section-2.5">Section 2.5</a>, and the value of this parameter
      MUST be the same as the value of the "grant_type" parameter
      defined in the extension.</pre>
    <br>
    This allows the client to specify which flows it wants to be able to
    use (including any extensions), and allows the server to to tell the
    client in the client configuration response what flows it can expect
    to work. <br>
    <br>
    OpenID Connect's registration has recently introduced the use of a
    different parameter, response_type, for a similar but slightly
    different purpose. The parameter is defined in the latest draft in
    source control as:<br>
    <br>
    <blockquote>
      <dl>
        <dt><tt>response_types</tt></dt>
        <dd><tt> OPTIONAL. JSON array containing a list of the OAuth 2.0
          </tt><tt>response_type</tt><tt> </tt><tt><br>
          </tt></dd>
        <dd><tt>values that this Client uses. If omitted, the default is
            that the Client <br>
          </tt></dd>
        <dd><tt>uses only the </tt><tt>code</tt><tt> response type.
          </tt></dd>
      </dl>
    </blockquote>
    <p><br>
      OIDC makes use of response_types beyond just "code" and "token",
      defining several new ones including combinations like "code
      idtoken". <br>
    </p>
    So my question to the group is this: Should we incorporate the OIDC
    response_types parameter? Do we need both parameters specified in
    the registration or is one sufficient? They're defined separately in
    the OAuth2 protocol (one is on the Auth endpoint and one is on the
    Token endpoint), but can only be used legally in particular
    combinations so there would have to be normative text around
    particular values.<br>
    <br>
    In my opinion, I don't think we can get rid of grant_type, since
    that's the only way to specify things like client_credentials flows
    and most extensions. There might be value in also specifying
    response_type, but I don't want to add extra fields unless there's a
    clearly defined need for it.<br>
    <br>
    &nbsp;-- Justin<br>
  </body>
</html>

--------------090205020200050509060703--

From ve7jtb@ve7jtb.com  Wed Feb 27 08:47:59 2013
Return-Path: <ve7jtb@ve7jtb.com>
X-Original-To: oauth@ietfa.amsl.com
Delivered-To: oauth@ietfa.amsl.com
Received: from localhost (localhost [127.0.0.1]) by ietfa.amsl.com (Postfix) with ESMTP id 9AFC421F868B for <oauth@ietfa.amsl.com>; Wed, 27 Feb 2013 08:47:59 -0800 (PST)
X-Virus-Scanned: amavisd-new at amsl.com
X-Spam-Flag: NO
X-Spam-Score: -2.9
X-Spam-Level: 
X-Spam-Status: No, score=-2.9 tagged_above=-999 required=5 tests=[AWL=-0.698,  BAYES_00=-2.599, HTML_MESSAGE=0.001, MIME_QP_LONG_LINE=1.396, RCVD_IN_DNSWL_LOW=-1]
Received: from mail.ietf.org ([64.170.98.30]) by localhost (ietfa.amsl.com [127.0.0.1]) (amavisd-new, port 10024) with ESMTP id 4Ew1ZjdRnNZo for <oauth@ietfa.amsl.com>; Wed, 27 Feb 2013 08:47:58 -0800 (PST)
Received: from mail-pa0-f52.google.com (mail-pa0-f52.google.com [209.85.220.52]) by ietfa.amsl.com (Postfix) with ESMTP id AB1CE21F8667 for <oauth@ietf.org>; Wed, 27 Feb 2013 08:47:58 -0800 (PST)
Received: by mail-pa0-f52.google.com with SMTP id fb1so532265pad.39 for <oauth@ietf.org>; Wed, 27 Feb 2013 08:47:58 -0800 (PST)
X-Google-DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=google.com; s=20120113; h=x-received:references:mime-version:in-reply-to:content-type :content-transfer-encoding:message-id:cc:x-mailer:from:subject:date :to:x-gm-message-state; bh=4XuMK9Y0bTB2ql2fQmw82hfRpUWrDnwhP7JtWFnulik=; b=ZRaRIHoj3kOBISpPnKWo073++Hq8wID837qwYlsZCEugeqEIaXe+5lAElOya6xWd5D g0an9XMXmDgmJlrEpH9HvGOUcbNdcr1oCKHXvwHn6Ka6YzLcSJy+rJji3klKW8O9RsUV iNsxeZfQ+7yGcYuiPBXU+YzIMkut8+UnvmO1Zsh2bBH3tqVwfgIBaQeTGjI2XKHFTA94 Vq+a1fTHQMUBf7D2/cXcifnJv88sIdev80ySsoa92SSn0gvdou9z4pHQnlad9fgE3UTd cyxWs3p0BBZPOBO7pfmpaT/FsLOlYiqpVwjkaF35n3gP5Fmo1xd3YoN9MZNMTvUjEGh+ 0E9A==
X-Received: by 10.66.218.131 with SMTP id pg3mr8488899pac.89.1361983678362; Wed, 27 Feb 2013 08:47:58 -0800 (PST)
Received: from [192.168.43.229] (mobile-166-137-184-219.mycingular.net. [166.137.184.219]) by mx.google.com with ESMTPS id i6sm5902979paw.19.2013.02.27.08.47.53 (version=TLSv1 cipher=ECDHE-RSA-RC4-SHA bits=128/128); Wed, 27 Feb 2013 08:47:56 -0800 (PST)
References: <512E2D7F.6060903@mitre.org>
Mime-Version: 1.0 (1.0)
In-Reply-To: <512E2D7F.6060903@mitre.org>
Content-Type: multipart/signed; micalg=sha1; boundary=Apple-Mail-1919B7D6-B725-40E8-8067-9CA2D70F5512; protocol="application/pkcs7-signature"
Content-Transfer-Encoding: 7bit
Message-Id: <B8CF193B-42FC-4792-A528-17CCC77E3E9C@ve7jtb.com>
X-Mailer: iPhone Mail (10B146)
From: John Bradley <ve7jtb@ve7jtb.com>
Date: Wed, 27 Feb 2013 08:47:50 -0800
To: Justin Richer <jricher@mitre.org>
X-Gm-Message-State: ALoCoQnX+xpNnJbSxcX8rnExAYMJPJNCI34DZngDt+fL4+BGxN9AzrJvPRo0haFJpygXcVxtD4sr
Cc: "oauth@ietf.org" <oauth@ietf.org>
Subject: Re: [OAUTH-WG] Registration: grant_types and response_types
X-BeenThere: oauth@ietf.org
X-Mailman-Version: 2.1.12
Precedence: list
List-Id: OAUTH WG <oauth.ietf.org>
List-Unsubscribe: <https://www.ietf.org/mailman/options/oauth>, <mailto:oauth-request@ietf.org?subject=unsubscribe>
List-Archive: <http://www.ietf.org/mail-archive/web/oauth>
List-Post: <mailto:oauth@ietf.org>
List-Help: <mailto:oauth-request@ietf.org?subject=help>
List-Subscribe: <https://www.ietf.org/mailman/listinfo/oauth>, <mailto:oauth-request@ietf.org?subject=subscribe>
X-List-Received-Date: Wed, 27 Feb 2013 16:47:59 -0000

--Apple-Mail-1919B7D6-B725-40E8-8067-9CA2D70F5512
Content-Type: multipart/alternative;
	boundary=Apple-Mail-B67756A7-03AD-49C8-9A56-128B03E96ED1
Content-Transfer-Encoding: 7bit


--Apple-Mail-B67756A7-03AD-49C8-9A56-128B03E96ED1
Content-Type: text/plain;
	charset=us-ascii
Content-Transfer-Encoding: quoted-printable

For grant_type you have to make up implicit as a grant_type.=20

They are sort of separate things and are both extendable in the case of asse=
rtions for the token endpoint, and new response types like "code id_token" o=
r "token code" for response type.=20

Both could be used to not allow implicit but also have other value.=20

I would like to combine them, but that may be more confusing than directly m=
apping them to the OAuth functionality.=20

It may be sufficient to have response_type and grant_type in discovery but o=
nly grant_type in registration.=20

We need to agree on what grant_type/s are required for a response_type of "c=
ode id_token" that is returned in a fragment but uses the token endpoint.=20=


John B.=20

Sent from my iPhone

On 2013-02-27, at 7:59 AM, Justin Richer <jricher@mitre.org> wrote:

> There has been some press lately about clients being able to use an implic=
it flow to get tokens when they really ought to only use a code flow, since t=
he security considerations and protections for both are very different. With=
 this in mind, it makes sense that a dynamically registered client should be=
 limited to use only certain flows, if at all possible.=20
>=20
> The dynamic registration document currently handles this using the grant_t=
ype parameter (introduced in draft -03), which is defined in section 2 as fo=
llows:
>=20
>    grant_type
>       OPTIONAL.  Array of grant types that a client may use.  These
>       grant types are defined as follows:
>=20
>       *  "authorization_code": The Authorization Code Grant described in
>          OAuth2 Section 4.1.
>=20
>       *  "implicit": The Implicit Grant described in OAuth2 Section 4.2.
>=20
>       *  "password": The Resource Owner Password Credentials Grant
>          described in OAuth2 Section 4.3
>=20
>       *  "client_credentials": The Client Credentials Grant described in
>          OAuth2 Section 4.4
>=20
>       *  "refresh_token": The Refresh Token Grant described in OAuth2
>          Section 6.
>=20
>       Authorization Servers MAY allow for other values as defined in
>       grant type extensions to OAuth2.  The extension process is
>       described in OAuth2 Section 2.5, and the value of this parameter
>       MUST be the same as the value of the "grant_type" parameter
>       defined in the extension.
>=20
> This allows the client to specify which flows it wants to be able to use (=
including any extensions), and allows the server to to tell the client in th=
e client configuration response what flows it can expect to work.=20
>=20
> OpenID Connect's registration has recently introduced the use of a differe=
nt parameter, response_type, for a similar but slightly different purpose. T=
he parameter is defined in the latest draft in source control as:
>=20
> response_types
> OPTIONAL. JSON array containing a list of the OAuth 2.0 response_type=20
> values that this Client uses. If omitted, the default is that the Client=20=

> uses only the code response type.
>=20
> OIDC makes use of response_types beyond just "code" and "token", defining s=
everal new ones including combinations like "code idtoken".=20
> So my question to the group is this: Should we incorporate the OIDC respon=
se_types parameter? Do we need both parameters specified in the registration=
 or is one sufficient? They're defined separately in the OAuth2 protocol (on=
e is on the Auth endpoint and one is on the Token endpoint), but can only be=
 used legally in particular combinations so there would have to be normative=
 text around particular values.
>=20
> In my opinion, I don't think we can get rid of grant_type, since that's th=
e only way to specify things like client_credentials flows and most extensio=
ns. There might be value in also specifying response_type, but I don't want t=
o add extra fields unless there's a clearly defined need for it.
>=20
>  -- Justin
> _______________________________________________
> OAuth mailing list
> OAuth@ietf.org
> https://www.ietf.org/mailman/listinfo/oauth

--Apple-Mail-B67756A7-03AD-49C8-9A56-128B03E96ED1
Content-Type: text/html;
	charset=utf-8
Content-Transfer-Encoding: quoted-printable

<html><head><meta http-equiv=3D"content-type" content=3D"text/html; charset=3D=
utf-8"></head><body dir=3D"auto"><div>For grant_type you have to make up imp=
licit as a grant_type.&nbsp;</div><div><br></div><div>They are sort of separ=
ate things and are both extendable in the case of assertions for the token e=
ndpoint, and new response types like "code id_token" or "token code" for res=
ponse type.&nbsp;</div><div><br></div><div>Both could be used to not allow i=
mplicit but also have other value.&nbsp;</div><div><br></div><div>I would li=
ke to combine them, but that may be more confusing than directly mapping the=
m to the OAuth functionality.&nbsp;</div><div><br></div><div>It may be suffi=
cient to have response_type and grant_type in discovery but only grant_type i=
n registration.&nbsp;</div><div><br></div><div>We need to agree on what gran=
t_type/s are required for a response_type of "code id_token" that is returne=
d in a fragment but uses the token endpoint.&nbsp;</div><div><br></div><div>=
John B.&nbsp;<br><br>Sent from my iPhone</div><div><br>On 2013-02-27, at 7:5=
9 AM, Justin Richer &lt;<a href=3D"mailto:jricher@mitre.org">jricher@mitre.o=
rg</a>&gt; wrote:<br><br></div><blockquote type=3D"cite"><div>
 =20

    <meta http-equiv=3D"content-type" content=3D"text/html; charset=3DISO-88=
59-1">
 =20
 =20
    There has been some press lately about clients being able to use an
    implicit flow to get tokens when they really ought to only use a
    code flow, since the security considerations and protections for
    both are very different. With this in mind, it makes sense that a
    dynamically registered client should be limited to use only certain
    flows, if at all possible. <br>
    <br>
    The dynamic registration document currently handles this using the
    grant_type parameter (introduced in draft -03), which is defined in
    section 2 as follows:<br>
    <br>
    <pre class=3D"newpage">   grant_type
      OPTIONAL.  Array of grant types that a client may use.  These
      grant types are defined as follows:

      *  "authorization_code": The Authorization Code Grant described in
         OAuth2 <a href=3D"http://tools.ietf.org/html/draft-ietf-oauth-dyn-r=
eg-07#section-4.1">Section 4.1</a>.

      *  "implicit": The Implicit Grant described in OAuth2 <a href=3D"http:=
//tools.ietf.org/html/draft-ietf-oauth-dyn-reg-07#section-4.2">Section 4.2</=
a>.

      *  "password": The Resource Owner Password Credentials Grant
         described in OAuth2 <a href=3D"http://tools.ietf.org/html/draft-iet=
f-oauth-dyn-reg-07#section-4.3">Section 4.3</a>

      *  "client_credentials": The Client Credentials Grant described in
         OAuth2 <a href=3D"http://tools.ietf.org/html/draft-ietf-oauth-dyn-r=
eg-07#section-4.4">Section 4.4</a>

      *  "refresh_token": The Refresh Token Grant described in OAuth2
         <a href=3D"http://tools.ietf.org/html/draft-ietf-oauth-dyn-reg-07#s=
ection-6">Section 6</a>.

      Authorization Servers MAY allow for other values as defined in
      grant type extensions to OAuth2.  The extension process is
      described in OAuth2 <a href=3D"http://tools.ietf.org/html/draft-ietf-o=
auth-dyn-reg-07#section-2.5">Section 2.5</a>, and the value of this paramete=
r
      MUST be the same as the value of the "grant_type" parameter
      defined in the extension.</pre>
    <br>
    This allows the client to specify which flows it wants to be able to
    use (including any extensions), and allows the server to to tell the
    client in the client configuration response what flows it can expect
    to work. <br>
    <br>
    OpenID Connect's registration has recently introduced the use of a
    different parameter, response_type, for a similar but slightly
    different purpose. The parameter is defined in the latest draft in
    source control as:<br>
    <br>
    <blockquote>
      <dl>
        <dt><tt>response_types</tt></dt>
        <dd><tt> OPTIONAL. JSON array containing a list of the OAuth 2.0
          </tt><tt>response_type</tt><tt> </tt><tt><br>
          </tt></dd>
        <dd><tt>values that this Client uses. If omitted, the default is
            that the Client <br>
          </tt></dd>
        <dd><tt>uses only the </tt><tt>code</tt><tt> response type.
          </tt></dd>
      </dl>
    </blockquote>
    <p><br>
      OIDC makes use of response_types beyond just "code" and "token",
      defining several new ones including combinations like "code
      idtoken". <br>
    </p>
    So my question to the group is this: Should we incorporate the OIDC
    response_types parameter? Do we need both parameters specified in
    the registration or is one sufficient? They're defined separately in
    the OAuth2 protocol (one is on the Auth endpoint and one is on the
    Token endpoint), but can only be used legally in particular
    combinations so there would have to be normative text around
    particular values.<br>
    <br>
    In my opinion, I don't think we can get rid of grant_type, since
    that's the only way to specify things like client_credentials flows
    and most extensions. There might be value in also specifying
    response_type, but I don't want to add extra fields unless there's a
    clearly defined need for it.<br>
    <br>
    &nbsp;-- Justin<br>
 =20

</div></blockquote><blockquote type=3D"cite"><div><span>____________________=
___________________________</span><br><span>OAuth mailing list</span><br><sp=
an><a href=3D"mailto:OAuth@ietf.org">OAuth@ietf.org</a></span><br><span><a h=
ref=3D"https://www.ietf.org/mailman/listinfo/oauth">https://www.ietf.org/mai=
lman/listinfo/oauth</a></span><br></div></blockquote></body></html>=

--Apple-Mail-B67756A7-03AD-49C8-9A56-128B03E96ED1--

--Apple-Mail-1919B7D6-B725-40E8-8067-9CA2D70F5512
Content-Type: application/pkcs7-signature;
	name=smime.p7s
Content-Disposition: attachment;
	filename=smime.p7s
Content-Transfer-Encoding: base64
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--Apple-Mail-1919B7D6-B725-40E8-8067-9CA2D70F5512--

From ietf-ipr@ietf.org  Wed Feb 27 13:16:38 2013
Return-Path: <ietf-ipr@ietf.org>
X-Original-To: oauth@ietfa.amsl.com
Delivered-To: oauth@ietfa.amsl.com
Received: from localhost (localhost [127.0.0.1]) by ietfa.amsl.com (Postfix) with ESMTP id D0E6121F88EE; Wed, 27 Feb 2013 13:16:37 -0800 (PST)
X-Virus-Scanned: amavisd-new at amsl.com
X-Spam-Flag: NO
X-Spam-Score: -102.409
X-Spam-Level: 
X-Spam-Status: No, score=-102.409 tagged_above=-999 required=5 tests=[AWL=0.190, BAYES_00=-2.599, USER_IN_WHITELIST=-100]
Received: from mail.ietf.org ([64.170.98.30]) by localhost (ietfa.amsl.com [127.0.0.1]) (amavisd-new, port 10024) with ESMTP id pmfWdzO6uwEO; Wed, 27 Feb 2013 13:16:36 -0800 (PST)
Received: from ietfa.amsl.com (localhost [127.0.0.1]) by ietfa.amsl.com (Postfix) with ESMTP id B4AE721F867A; Wed, 27 Feb 2013 13:16:36 -0800 (PST)
MIME-Version: 1.0
Content-Type: text/plain; charset="utf-8"
Content-Transfer-Encoding: quoted-printable
From: IETF Secretariat <ietf-ipr@ietf.org>
To: mbj@microsoft.com, ve7jtb@ve7jtb.com, n-sakimura@nri.co.jp
X-Test-IDTracker: no
X-IETF-IDTracker: 4.40p1
Message-ID: <20130227211636.16096.19408.idtracker@ietfa.amsl.com>
Date: Wed, 27 Feb 2013 13:16:36 -0800
Cc: derek@ihtfp.com, oauth@ietf.org, ipr-announce@ietf.org
Subject: [OAUTH-WG] IPR Disclosure: Certicom Corporation's Statement about IPR related to	draft-ietf-oauth-json-web-token-06 (2)
X-BeenThere: oauth@ietf.org
X-Mailman-Version: 2.1.12
Precedence: list
List-Id: OAUTH WG <oauth.ietf.org>
List-Unsubscribe: <https://www.ietf.org/mailman/options/oauth>, <mailto:oauth-request@ietf.org?subject=unsubscribe>
List-Archive: <http://www.ietf.org/mail-archive/web/oauth>
List-Post: <mailto:oauth@ietf.org>
List-Help: <mailto:oauth-request@ietf.org?subject=help>
List-Subscribe: <https://www.ietf.org/mailman/listinfo/oauth>, <mailto:oauth-request@ietf.org?subject=subscribe>
X-List-Received-Date: Wed, 27 Feb 2013 21:16:38 -0000

Dear Michael Jones, John Bradley, Nat Sakimura:

 An IPR disclosure that pertains to your Internet-Draft entitled "JSON Web =
Token
(JWT)" (draft-ietf-oauth-json-web-token) was submitted to the IETF Secretar=
iat
on 2013-02-20 and has been posted on the "IETF Page of Intellectual Property
Rights Disclosures" (https://datatracker.ietf.org/ipr/1968/). The title of =
the
IPR disclosure is "Certicom Corporation's Statement about IPR related to dr=
aft-
ietf-oauth-json-web-token-06 (2)."");

The IETF Secretariat


From Michael.Jones@microsoft.com  Wed Feb 27 14:52:47 2013
Return-Path: <Michael.Jones@microsoft.com>
X-Original-To: oauth@ietfa.amsl.com
Delivered-To: oauth@ietfa.amsl.com
Received: from localhost (localhost [127.0.0.1]) by ietfa.amsl.com (Postfix) with ESMTP id 8311821F87D5 for <oauth@ietfa.amsl.com>; Wed, 27 Feb 2013 14:52:47 -0800 (PST)
X-Virus-Scanned: amavisd-new at amsl.com
X-Spam-Flag: NO
X-Spam-Score: -2.587
X-Spam-Level: 
X-Spam-Status: No, score=-2.587 tagged_above=-999 required=5 tests=[AWL=0.011,  BAYES_00=-2.599, HTML_MESSAGE=0.001]
Received: from mail.ietf.org ([64.170.98.30]) by localhost (ietfa.amsl.com [127.0.0.1]) (amavisd-new, port 10024) with ESMTP id C1o7BJMTBKhI for <oauth@ietfa.amsl.com>; Wed, 27 Feb 2013 14:52:44 -0800 (PST)
Received: from na01-by2-obe.outbound.protection.outlook.com (na01-by2-obe.ptr.protection.outlook.com [207.46.100.26]) by ietfa.amsl.com (Postfix) with ESMTP id 76D4421F87D2 for <oauth@ietf.org>; Wed, 27 Feb 2013 14:52:44 -0800 (PST)
Received: from BY2FFO11FD026.protection.gbl (10.1.15.201) by BY2FFO11HUB012.protection.gbl (10.1.14.83) with Microsoft SMTP Server (TLS) id 15.0.620.12; Wed, 27 Feb 2013 22:52:41 +0000
Received: from TK5EX14MLTC102.redmond.corp.microsoft.com (131.107.125.37) by BY2FFO11FD026.mail.protection.outlook.com (10.1.15.215) with Microsoft SMTP Server (TLS) id 15.0.620.12 via Frontend Transport; Wed, 27 Feb 2013 22:52:41 +0000
Received: from TK5EX14MBXC283.redmond.corp.microsoft.com ([169.254.2.132]) by TK5EX14MLTC102.redmond.corp.microsoft.com ([157.54.79.180]) with mapi id 14.02.0318.003; Wed, 27 Feb 2013 22:52:17 +0000
From: Mike Jones <Michael.Jones@microsoft.com>
To: Justin Richer <jricher@mitre.org>, "oauth@ietf.org" <oauth@ietf.org>
Thread-Topic: [OAUTH-WG] Registration: grant_types and response_types
Thread-Index: AQHOFQO5d+0IWPQvz0CRM0gUCtYnPJiOSukw
Date: Wed, 27 Feb 2013 22:52:16 +0000
Message-ID: <4E1F6AAD24975D4BA5B1680429673943674BC644@TK5EX14MBXC283.redmond.corp.microsoft.com>
References: <512E2D7F.6060903@mitre.org>
In-Reply-To: <512E2D7F.6060903@mitre.org>
Accept-Language: en-US
Content-Language: en-US
X-MS-Has-Attach: 
X-MS-TNEF-Correlator: 
x-originating-ip: [157.54.51.70]
Content-Type: multipart/alternative; boundary="_000_4E1F6AAD24975D4BA5B1680429673943674BC644TK5EX14MBXC283r_"
MIME-Version: 1.0
X-Forefront-Antispam-Report: CIP:131.107.125.37; CTRY:US; IPV:CAL; IPV:NLI; EFV:NLI; SFV:NSPM; SFS:(199002)(55885001)(189002)(57704001)(377454001)(54356001)(63696002)(79102001)(51856001)(31966008)(5343645001)(16236675001)(20776003)(44976002)(54316002)(16297215001)(56776001)(551544001)(56816002)(5343655001)(74662001)(5343635001)(50986001)(47976001)(16406001)(47446002)(46102001)(15395725002)(55846006)(74502001)(47736001)(49866001)(65816001)(53806001)(512954001)(66066001)(4396001)(15202345001)(76482001)(80022001)(33656001)(77982001)(59766001); DIR:OUT; SFP:; SCL:1; SRVR:BY2FFO11HUB012; H:TK5EX14MLTC102.redmond.corp.microsoft.com; RD:InfoDomainNonexistent; A:1; MX:1; LANG:en; 
X-OriginatorOrg: microsoft.onmicrosoft.com
X-Forefront-PRVS: 0770F75EA9
Subject: Re: [OAUTH-WG] Registration: grant_types and response_types
X-BeenThere: oauth@ietf.org
X-Mailman-Version: 2.1.12
Precedence: list
List-Id: OAUTH WG <oauth.ietf.org>
List-Unsubscribe: <https://www.ietf.org/mailman/options/oauth>, <mailto:oauth-request@ietf.org?subject=unsubscribe>
List-Archive: <http://www.ietf.org/mail-archive/web/oauth>
List-Post: <mailto:oauth@ietf.org>
List-Help: <mailto:oauth-request@ietf.org?subject=help>
List-Subscribe: <https://www.ietf.org/mailman/listinfo/oauth>, <mailto:oauth-request@ietf.org?subject=subscribe>
X-List-Received-Date: Wed, 27 Feb 2013 22:52:47 -0000

--_000_4E1F6AAD24975D4BA5B1680429673943674BC644TK5EX14MBXC283r_
Content-Type: text/plain; charset="us-ascii"
Content-Transfer-Encoding: quoted-printable

John Bradley and I just talked about this during a side meeting at RSA.  We=
 think that this is the mapping of grant types and defined response types. =
 (The additional response_type values are registered with IANA and defined =
in http://openid.net/specs/oauth-v2-multiple-response-types-1_0.html.)

response_type value

grant_types

code

authorization_code

token

implicit

id_token

implicit

token id_token

implicit

code token

authorization_code implicit

code id_token

authorization_code implicit

code token id_token

authorization_code implicit

none

none


If people agree that this is the mapping, and that it conveys sufficient in=
formation, then conceivably OpenID Connect could drop the response_types re=
gistration parameter and instead just use the OAuth Registration "grant_typ=
es" parameter.

What do others think?

                                                            -- Mike

P.S.  There's a typo in the OAuth Registration spec section quoted below.  =
The name "grant_type" should have been "grant_types", since the value is a =
list.  We should correct that in the next version of the spec.

From: oauth-bounces@ietf.org [mailto:oauth-bounces@ietf.org] On Behalf Of J=
ustin Richer
Sent: Wednesday, February 27, 2013 8:00 AM
To: oauth@ietf.org
Subject: [OAUTH-WG] Registration: grant_types and response_types

There has been some press lately about clients being able to use an implici=
t flow to get tokens when they really ought to only use a code flow, since =
the security considerations and protections for both are very different. Wi=
th this in mind, it makes sense that a dynamically registered client should=
 be limited to use only certain flows, if at all possible.

The dynamic registration document currently handles this using the grant_ty=
pe parameter (introduced in draft -03), which is defined in section 2 as fo=
llows:

   grant_type

      OPTIONAL.  Array of grant types that a client may use.  These

      grant types are defined as follows:



      *  "authorization_code": The Authorization Code Grant described in

         OAuth2 Section 4.1<http://tools.ietf.org/html/draft-ietf-oauth-dyn=
-reg-07#section-4.1>.



      *  "implicit": The Implicit Grant described in OAuth2 Section 4.2<htt=
p://tools.ietf.org/html/draft-ietf-oauth-dyn-reg-07#section-4.2>.



      *  "password": The Resource Owner Password Credentials Grant

         described in OAuth2 Section 4.3<http://tools.ietf.org/html/draft-i=
etf-oauth-dyn-reg-07#section-4.3>



      *  "client_credentials": The Client Credentials Grant described in

         OAuth2 Section 4.4<http://tools.ietf.org/html/draft-ietf-oauth-dyn=
-reg-07#section-4.4>



      *  "refresh_token": The Refresh Token Grant described in OAuth2

         Section 6<http://tools.ietf.org/html/draft-ietf-oauth-dyn-reg-07#s=
ection-6>.



      Authorization Servers MAY allow for other values as defined in

      grant type extensions to OAuth2.  The extension process is

      described in OAuth2 Section 2.5<http://tools.ietf.org/html/draft-ietf=
-oauth-dyn-reg-07#section-2.5>, and the value of this parameter

      MUST be the same as the value of the "grant_type" parameter

      defined in the extension.

This allows the client to specify which flows it wants to be able to use (i=
ncluding any extensions), and allows the server to to tell the client in th=
e client configuration response what flows it can expect to work.

OpenID Connect's registration has recently introduced the use of a differen=
t parameter, response_type, for a similar but slightly different purpose. T=
he parameter is defined in the latest draft in source control as:
response_types
OPTIONAL. JSON array containing a list of the OAuth 2.0 response_type
values that this Client uses. If omitted, the default is that the Client
uses only the code response type.

OIDC makes use of response_types beyond just "code" and "token", defining s=
everal new ones including combinations like "code idtoken".
So my question to the group is this: Should we incorporate the OIDC respons=
e_types parameter? Do we need both parameters specified in the registration=
 or is one sufficient? They're defined separately in the OAuth2 protocol (o=
ne is on the Auth endpoint and one is on the Token endpoint), but can only =
be used legally in particular combinations so there would have to be normat=
ive text around particular values.

In my opinion, I don't think we can get rid of grant_type, since that's the=
 only way to specify things like client_credentials flows and most extensio=
ns. There might be value in also specifying response_type, but I don't want=
 to add extra fields unless there's a clearly defined need for it.

 -- Justin

--_000_4E1F6AAD24975D4BA5B1680429673943674BC644TK5EX14MBXC283r_
Content-Type: text/html; charset="us-ascii"
Content-Transfer-Encoding: quoted-printable

<html xmlns:v=3D"urn:schemas-microsoft-com:vml" xmlns:o=3D"urn:schemas-micr=
osoft-com:office:office" xmlns:w=3D"urn:schemas-microsoft-com:office:word" =
xmlns:m=3D"http://schemas.microsoft.com/office/2004/12/omml" xmlns=3D"http:=
//www.w3.org/TR/REC-html40">
<head>
<meta http-equiv=3D"Content-Type" content=3D"text/html; charset=3Dus-ascii"=
>
<meta name=3D"Generator" content=3D"Microsoft Word 14 (filtered medium)">
<style><!--
/* Font Definitions */
@font-face
	{font-family:Calibri;
	panose-1:2 15 5 2 2 2 4 3 2 4;}
@font-face
	{font-family:Tahoma;
	panose-1:2 11 6 4 3 5 4 4 2 4;}
@font-face
	{font-family:Consolas;
	panose-1:2 11 6 9 2 2 4 3 2 4;}
/* Style Definitions */
p.MsoNormal, li.MsoNormal, div.MsoNormal
	{margin:0in;
	margin-bottom:.0001pt;
	font-size:12.0pt;
	font-family:"Times New Roman","serif";
	color:black;}
a:link, span.MsoHyperlink
	{mso-style-priority:99;
	color:blue;
	text-decoration:underline;}
a:visited, span.MsoHyperlinkFollowed
	{mso-style-priority:99;
	color:purple;
	text-decoration:underline;}
p
	{mso-style-priority:99;
	mso-margin-top-alt:auto;
	margin-right:0in;
	mso-margin-bottom-alt:auto;
	margin-left:0in;
	font-size:12.0pt;
	font-family:"Times New Roman","serif";
	color:black;}
pre
	{mso-style-priority:99;
	mso-style-link:"HTML Preformatted Char";
	margin:0in;
	margin-bottom:.0001pt;
	font-size:10.0pt;
	font-family:"Courier New";
	color:black;}
tt
	{mso-style-priority:99;
	font-family:"Courier New";}
span.HTMLPreformattedChar
	{mso-style-name:"HTML Preformatted Char";
	mso-style-priority:99;
	mso-style-link:"HTML Preformatted";
	font-family:Consolas;
	color:black;}
span.EmailStyle21
	{mso-style-type:personal-reply;
	font-family:"Calibri","sans-serif";
	color:#1F497D;}
.MsoChpDefault
	{mso-style-type:export-only;
	font-size:10.0pt;}
@page WordSection1
	{size:8.5in 11.0in;
	margin:1.0in 1.0in 1.0in 1.0in;}
div.WordSection1
	{page:WordSection1;}
--></style><!--[if gte mso 9]><xml>
<o:shapedefaults v:ext=3D"edit" spidmax=3D"1026" />
</xml><![endif]--><!--[if gte mso 9]><xml>
<o:shapelayout v:ext=3D"edit">
<o:idmap v:ext=3D"edit" data=3D"1" />
</o:shapelayout></xml><![endif]-->
</head>
<body bgcolor=3D"white" lang=3D"EN-US" link=3D"blue" vlink=3D"purple">
<div class=3D"WordSection1">
<p class=3D"MsoNormal"><span style=3D"font-size:11.0pt;font-family:&quot;Ca=
libri&quot;,&quot;sans-serif&quot;;color:#1F497D">John Bradley and I just t=
alked about this during a side meeting at RSA.&nbsp; We think that this is =
the mapping of grant types and defined response types.&nbsp; (The
 additional response_type values are registered with IANA and defined in <a=
 href=3D"http://openid.net/specs/oauth-v2-multiple-response-types-1_0.html"=
>
http://openid.net/specs/oauth-v2-multiple-response-types-1_0.html</a>.)<o:p=
></o:p></span></p>
<p class=3D"MsoNormal"><span style=3D"font-size:11.0pt;font-family:&quot;Ca=
libri&quot;,&quot;sans-serif&quot;;color:#1F497D"><o:p>&nbsp;</o:p></span><=
/p>
<table class=3D"MsoTableGrid" border=3D"1" cellspacing=3D"0" cellpadding=3D=
"0" style=3D"border-collapse:collapse;border:none">
<tbody>
<tr>
<td width=3D"399" valign=3D"top" style=3D"width:239.4pt;border:solid window=
text 1.0pt;padding:0in 5.4pt 0in 5.4pt">
<p class=3D"MsoNormal"><b><span style=3D"font-size:11.0pt;font-family:&quot=
;Calibri&quot;,&quot;sans-serif&quot;;color:#1F497D">response_type value<o:=
p></o:p></span></b></p>
</td>
<td width=3D"399" valign=3D"top" style=3D"width:239.4pt;border:solid window=
text 1.0pt;border-left:none;padding:0in 5.4pt 0in 5.4pt">
<p class=3D"MsoNormal"><b><span style=3D"font-size:11.0pt;font-family:&quot=
;Calibri&quot;,&quot;sans-serif&quot;;color:#1F497D">grant_types<o:p></o:p>=
</span></b></p>
</td>
</tr>
<tr>
<td width=3D"399" valign=3D"top" style=3D"width:239.4pt;border:solid window=
text 1.0pt;border-top:none;padding:0in 5.4pt 0in 5.4pt">
<p class=3D"MsoNormal"><span style=3D"font-size:11.0pt;font-family:&quot;Ca=
libri&quot;,&quot;sans-serif&quot;;color:#1F497D">code<o:p></o:p></span></p=
>
</td>
<td width=3D"399" valign=3D"top" style=3D"width:239.4pt;border-top:none;bor=
der-left:none;border-bottom:solid windowtext 1.0pt;border-right:solid windo=
wtext 1.0pt;padding:0in 5.4pt 0in 5.4pt">
<p class=3D"MsoNormal"><span style=3D"font-size:11.0pt;font-family:&quot;Ca=
libri&quot;,&quot;sans-serif&quot;;color:#1F497D">authorization_code<o:p></=
o:p></span></p>
</td>
</tr>
<tr>
<td width=3D"399" valign=3D"top" style=3D"width:239.4pt;border:solid window=
text 1.0pt;border-top:none;padding:0in 5.4pt 0in 5.4pt">
<p class=3D"MsoNormal"><span style=3D"font-size:11.0pt;font-family:&quot;Ca=
libri&quot;,&quot;sans-serif&quot;;color:#1F497D">token<o:p></o:p></span></=
p>
</td>
<td width=3D"399" valign=3D"top" style=3D"width:239.4pt;border-top:none;bor=
der-left:none;border-bottom:solid windowtext 1.0pt;border-right:solid windo=
wtext 1.0pt;padding:0in 5.4pt 0in 5.4pt">
<p class=3D"MsoNormal"><span style=3D"font-size:11.0pt;font-family:&quot;Ca=
libri&quot;,&quot;sans-serif&quot;;color:#1F497D">implicit<o:p></o:p></span=
></p>
</td>
</tr>
<tr>
<td width=3D"399" valign=3D"top" style=3D"width:239.4pt;border:solid window=
text 1.0pt;border-top:none;padding:0in 5.4pt 0in 5.4pt">
<p class=3D"MsoNormal"><span style=3D"font-size:11.0pt;font-family:&quot;Ca=
libri&quot;,&quot;sans-serif&quot;;color:#1F497D">id_token<o:p></o:p></span=
></p>
</td>
<td width=3D"399" valign=3D"top" style=3D"width:239.4pt;border-top:none;bor=
der-left:none;border-bottom:solid windowtext 1.0pt;border-right:solid windo=
wtext 1.0pt;padding:0in 5.4pt 0in 5.4pt">
<p class=3D"MsoNormal"><span style=3D"font-size:11.0pt;font-family:&quot;Ca=
libri&quot;,&quot;sans-serif&quot;;color:#1F497D">implicit<o:p></o:p></span=
></p>
</td>
</tr>
<tr>
<td width=3D"399" valign=3D"top" style=3D"width:239.4pt;border:solid window=
text 1.0pt;border-top:none;padding:0in 5.4pt 0in 5.4pt">
<p class=3D"MsoNormal"><span style=3D"font-size:11.0pt;font-family:&quot;Ca=
libri&quot;,&quot;sans-serif&quot;;color:#1F497D">token id_token<o:p></o:p>=
</span></p>
</td>
<td width=3D"399" valign=3D"top" style=3D"width:239.4pt;border-top:none;bor=
der-left:none;border-bottom:solid windowtext 1.0pt;border-right:solid windo=
wtext 1.0pt;padding:0in 5.4pt 0in 5.4pt">
<p class=3D"MsoNormal"><span style=3D"font-size:11.0pt;font-family:&quot;Ca=
libri&quot;,&quot;sans-serif&quot;;color:#1F497D">implicit<o:p></o:p></span=
></p>
</td>
</tr>
<tr>
<td width=3D"399" valign=3D"top" style=3D"width:239.4pt;border:solid window=
text 1.0pt;border-top:none;padding:0in 5.4pt 0in 5.4pt">
<p class=3D"MsoNormal"><span style=3D"font-size:11.0pt;font-family:&quot;Ca=
libri&quot;,&quot;sans-serif&quot;;color:#1F497D">code token<o:p></o:p></sp=
an></p>
</td>
<td width=3D"399" valign=3D"top" style=3D"width:239.4pt;border-top:none;bor=
der-left:none;border-bottom:solid windowtext 1.0pt;border-right:solid windo=
wtext 1.0pt;padding:0in 5.4pt 0in 5.4pt">
<p class=3D"MsoNormal"><span style=3D"font-size:11.0pt;font-family:&quot;Ca=
libri&quot;,&quot;sans-serif&quot;;color:#1F497D">authorization_code implic=
it<o:p></o:p></span></p>
</td>
</tr>
<tr>
<td width=3D"399" valign=3D"top" style=3D"width:239.4pt;border:solid window=
text 1.0pt;border-top:none;padding:0in 5.4pt 0in 5.4pt">
<p class=3D"MsoNormal"><span style=3D"font-size:11.0pt;font-family:&quot;Ca=
libri&quot;,&quot;sans-serif&quot;;color:#1F497D">code id_token<o:p></o:p><=
/span></p>
</td>
<td width=3D"399" valign=3D"top" style=3D"width:239.4pt;border-top:none;bor=
der-left:none;border-bottom:solid windowtext 1.0pt;border-right:solid windo=
wtext 1.0pt;padding:0in 5.4pt 0in 5.4pt">
<p class=3D"MsoNormal"><span style=3D"font-size:11.0pt;font-family:&quot;Ca=
libri&quot;,&quot;sans-serif&quot;;color:#1F497D">authorization_code implic=
it<o:p></o:p></span></p>
</td>
</tr>
<tr>
<td width=3D"399" valign=3D"top" style=3D"width:239.4pt;border:solid window=
text 1.0pt;border-top:none;padding:0in 5.4pt 0in 5.4pt">
<p class=3D"MsoNormal"><span style=3D"font-size:11.0pt;font-family:&quot;Ca=
libri&quot;,&quot;sans-serif&quot;;color:#1F497D">code token id_token<o:p><=
/o:p></span></p>
</td>
<td width=3D"399" valign=3D"top" style=3D"width:239.4pt;border-top:none;bor=
der-left:none;border-bottom:solid windowtext 1.0pt;border-right:solid windo=
wtext 1.0pt;padding:0in 5.4pt 0in 5.4pt">
<p class=3D"MsoNormal"><span style=3D"font-size:11.0pt;font-family:&quot;Ca=
libri&quot;,&quot;sans-serif&quot;;color:#1F497D">authorization_code implic=
it<o:p></o:p></span></p>
</td>
</tr>
<tr>
<td width=3D"399" valign=3D"top" style=3D"width:239.4pt;border:solid window=
text 1.0pt;border-top:none;padding:0in 5.4pt 0in 5.4pt">
<p class=3D"MsoNormal"><span style=3D"font-size:11.0pt;font-family:&quot;Ca=
libri&quot;,&quot;sans-serif&quot;;color:#1F497D">none<o:p></o:p></span></p=
>
</td>
<td width=3D"399" valign=3D"top" style=3D"width:239.4pt;border-top:none;bor=
der-left:none;border-bottom:solid windowtext 1.0pt;border-right:solid windo=
wtext 1.0pt;padding:0in 5.4pt 0in 5.4pt">
<p class=3D"MsoNormal"><span style=3D"font-size:11.0pt;font-family:&quot;Ca=
libri&quot;,&quot;sans-serif&quot;;color:#1F497D">none<o:p></o:p></span></p=
>
</td>
</tr>
</tbody>
</table>
<p class=3D"MsoNormal"><span style=3D"font-size:11.0pt;font-family:&quot;Ca=
libri&quot;,&quot;sans-serif&quot;;color:#1F497D"><o:p>&nbsp;</o:p></span><=
/p>
<p class=3D"MsoNormal"><span style=3D"font-size:11.0pt;font-family:&quot;Ca=
libri&quot;,&quot;sans-serif&quot;;color:#1F497D">If people agree that this=
 is the mapping, and that it conveys sufficient information, then conceivab=
ly OpenID Connect could drop the response_types registration
 parameter and instead just use the OAuth Registration &#8220;grant_types&#=
8221; parameter.<o:p></o:p></span></p>
<p class=3D"MsoNormal"><span style=3D"font-size:11.0pt;font-family:&quot;Ca=
libri&quot;,&quot;sans-serif&quot;;color:#1F497D"><o:p>&nbsp;</o:p></span><=
/p>
<p class=3D"MsoNormal"><span style=3D"font-size:11.0pt;font-family:&quot;Ca=
libri&quot;,&quot;sans-serif&quot;;color:#1F497D">What do others think?<o:p=
></o:p></span></p>
<p class=3D"MsoNormal"><span style=3D"font-size:11.0pt;font-family:&quot;Ca=
libri&quot;,&quot;sans-serif&quot;;color:#1F497D"><o:p>&nbsp;</o:p></span><=
/p>
<p class=3D"MsoNormal"><span style=3D"font-size:11.0pt;font-family:&quot;Ca=
libri&quot;,&quot;sans-serif&quot;;color:#1F497D">&nbsp;&nbsp;&nbsp;&nbsp;&=
nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbs=
p;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&=
nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbs=
p;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&=
nbsp;&nbsp;&nbsp;&nbsp;&nbsp; -- Mike<o:p></o:p></span></p>
<p class=3D"MsoNormal"><span style=3D"font-size:11.0pt;font-family:&quot;Ca=
libri&quot;,&quot;sans-serif&quot;;color:#1F497D"><o:p>&nbsp;</o:p></span><=
/p>
<p class=3D"MsoNormal"><span style=3D"font-size:11.0pt;font-family:&quot;Ca=
libri&quot;,&quot;sans-serif&quot;;color:#1F497D">P.S.&nbsp; There&#8217;s =
a typo in the OAuth Registration spec section quoted below.&nbsp; The name =
&#8220;grant_type&#8221; should have been &#8220;grant_types&#8221;, since =
the value is a list.&nbsp;
 We should correct that in the next version of the spec.<o:p></o:p></span><=
/p>
<p class=3D"MsoNormal"><span style=3D"font-size:11.0pt;font-family:&quot;Ca=
libri&quot;,&quot;sans-serif&quot;;color:#1F497D"><o:p>&nbsp;</o:p></span><=
/p>
<div>
<div style=3D"border:none;border-top:solid #B5C4DF 1.0pt;padding:3.0pt 0in =
0in 0in">
<p class=3D"MsoNormal"><b><span style=3D"font-size:10.0pt;font-family:&quot=
;Tahoma&quot;,&quot;sans-serif&quot;;color:windowtext">From:</span></b><spa=
n style=3D"font-size:10.0pt;font-family:&quot;Tahoma&quot;,&quot;sans-serif=
&quot;;color:windowtext"> oauth-bounces@ietf.org [mailto:oauth-bounces@ietf=
.org]
<b>On Behalf Of </b>Justin Richer<br>
<b>Sent:</b> Wednesday, February 27, 2013 8:00 AM<br>
<b>To:</b> oauth@ietf.org<br>
<b>Subject:</b> [OAUTH-WG] Registration: grant_types and response_types<o:p=
></o:p></span></p>
</div>
</div>
<p class=3D"MsoNormal"><o:p>&nbsp;</o:p></p>
<p class=3D"MsoNormal" style=3D"margin-bottom:12.0pt">There has been some p=
ress lately about clients being able to use an implicit flow to get tokens =
when they really ought to only use a code flow, since the security consider=
ations and protections for both are
 very different. With this in mind, it makes sense that a dynamically regis=
tered client should be limited to use only certain flows, if at all possibl=
e.
<br>
<br>
The dynamic registration document currently handles this using the grant_ty=
pe parameter (introduced in draft -03), which is defined in section 2 as fo=
llows:<o:p></o:p></p>
<pre>&nbsp;&nbsp; grant_type<o:p></o:p></pre>
<pre>&nbsp;&nbsp;&nbsp;&nbsp;&nbsp; OPTIONAL.&nbsp; Array of grant types th=
at a client may use.&nbsp; These<o:p></o:p></pre>
<pre>&nbsp;&nbsp;&nbsp;&nbsp;&nbsp; grant types are defined as follows:<o:p=
></o:p></pre>
<pre><o:p>&nbsp;</o:p></pre>
<pre>&nbsp;&nbsp;&nbsp;&nbsp;&nbsp; *&nbsp; &quot;authorization_code&quot;:=
 The Authorization Code Grant described in<o:p></o:p></pre>
<pre>&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp; OAuth2 <a href=3D"htt=
p://tools.ietf.org/html/draft-ietf-oauth-dyn-reg-07#section-4.1">Section 4.=
1</a>.<o:p></o:p></pre>
<pre><o:p>&nbsp;</o:p></pre>
<pre>&nbsp;&nbsp;&nbsp;&nbsp;&nbsp; *&nbsp; &quot;implicit&quot;: The Impli=
cit Grant described in OAuth2 <a href=3D"http://tools.ietf.org/html/draft-i=
etf-oauth-dyn-reg-07#section-4.2">Section 4.2</a>.<o:p></o:p></pre>
<pre><o:p>&nbsp;</o:p></pre>
<pre>&nbsp;&nbsp;&nbsp;&nbsp;&nbsp; *&nbsp; &quot;password&quot;: The Resou=
rce Owner Password Credentials Grant<o:p></o:p></pre>
<pre>&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp; described in OAuth2 <=
a href=3D"http://tools.ietf.org/html/draft-ietf-oauth-dyn-reg-07#section-4.=
3">Section 4.3</a><o:p></o:p></pre>
<pre><o:p>&nbsp;</o:p></pre>
<pre>&nbsp;&nbsp;&nbsp;&nbsp;&nbsp; *&nbsp; &quot;client_credentials&quot;:=
 The Client Credentials Grant described in<o:p></o:p></pre>
<pre>&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp; OAuth2 <a href=3D"htt=
p://tools.ietf.org/html/draft-ietf-oauth-dyn-reg-07#section-4.4">Section 4.=
4</a><o:p></o:p></pre>
<pre><o:p>&nbsp;</o:p></pre>
<pre>&nbsp;&nbsp;&nbsp;&nbsp;&nbsp; *&nbsp; &quot;refresh_token&quot;: The =
Refresh Token Grant described in OAuth2<o:p></o:p></pre>
<pre>&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp; <a href=3D"http://too=
ls.ietf.org/html/draft-ietf-oauth-dyn-reg-07#section-6">Section 6</a>.<o:p>=
</o:p></pre>
<pre><o:p>&nbsp;</o:p></pre>
<pre>&nbsp; &nbsp;&nbsp;&nbsp;&nbsp;Authorization Servers MAY allow for oth=
er values as defined in<o:p></o:p></pre>
<pre>&nbsp;&nbsp;&nbsp;&nbsp;&nbsp; grant type extensions to OAuth2.&nbsp; =
The extension process is<o:p></o:p></pre>
<pre>&nbsp;&nbsp;&nbsp;&nbsp;&nbsp; described in OAuth2 <a href=3D"http://t=
ools.ietf.org/html/draft-ietf-oauth-dyn-reg-07#section-2.5">Section 2.5</a>=
, and the value of this parameter<o:p></o:p></pre>
<pre>&nbsp;&nbsp;&nbsp;&nbsp;&nbsp; MUST be the same as the value of the &q=
uot;grant_type&quot; parameter<o:p></o:p></pre>
<pre>&nbsp;&nbsp;&nbsp;&nbsp;&nbsp; defined in the extension.<o:p></o:p></p=
re>
<p class=3D"MsoNormal" style=3D"margin-bottom:12.0pt"><br>
This allows the client to specify which flows it wants to be able to use (i=
ncluding any extensions), and allows the server to to tell the client in th=
e client configuration response what flows it can expect to work.
<br>
<br>
OpenID Connect's registration has recently introduced the use of a differen=
t parameter, response_type, for a similar but slightly different purpose. T=
he parameter is defined in the latest draft in source control as:<o:p></o:p=
></p>
<p class=3D"MsoNormal"><tt><span style=3D"font-size:10.0pt">response_types<=
/span></tt><o:p></o:p></p>
<p class=3D"MsoNormal" style=3D"margin-left:.5in"><tt><span style=3D"font-s=
ize:10.0pt">OPTIONAL. JSON array containing a list of the OAuth 2.0 respons=
e_type
</span></tt><o:p></o:p></p>
<p class=3D"MsoNormal" style=3D"margin-left:.5in"><tt><span style=3D"font-s=
ize:10.0pt">values that this Client uses. If omitted, the default is that t=
he Client
</span></tt><o:p></o:p></p>
<p class=3D"MsoNormal" style=3D"margin-left:.5in"><tt><span style=3D"font-s=
ize:10.0pt">uses only the code response type.
</span></tt><o:p></o:p></p>
<p><br>
OIDC makes use of response_types beyond just &quot;code&quot; and &quot;tok=
en&quot;, defining several new ones including combinations like &quot;code =
idtoken&quot;.
<o:p></o:p></p>
<p class=3D"MsoNormal">So my question to the group is this: Should we incor=
porate the OIDC response_types parameter? Do we need both parameters specif=
ied in the registration or is one sufficient? They're defined separately in=
 the OAuth2 protocol (one is on the
 Auth endpoint and one is on the Token endpoint), but can only be used lega=
lly in particular combinations so there would have to be normative text aro=
und particular values.<br>
<br>
In my opinion, I don't think we can get rid of grant_type, since that's the=
 only way to specify things like client_credentials flows and most extensio=
ns. There might be value in also specifying response_type, but I don't want=
 to add extra fields unless there's
 a clearly defined need for it.<br>
<br>
&nbsp;-- Justin<o:p></o:p></p>
</div>
</body>
</html>

--_000_4E1F6AAD24975D4BA5B1680429673943674BC644TK5EX14MBXC283r_--

From hannes.tschofenig@gmx.net  Thu Feb 28 02:28:22 2013
Return-Path: <hannes.tschofenig@gmx.net>
X-Original-To: oauth@ietfa.amsl.com
Delivered-To: oauth@ietfa.amsl.com
Received: from localhost (localhost [127.0.0.1]) by ietfa.amsl.com (Postfix) with ESMTP id BAC8421F8B8D for <oauth@ietfa.amsl.com>; Thu, 28 Feb 2013 02:28:22 -0800 (PST)
X-Virus-Scanned: amavisd-new at amsl.com
X-Spam-Flag: NO
X-Spam-Score: -101.604
X-Spam-Level: 
X-Spam-Status: No, score=-101.604 tagged_above=-999 required=5 tests=[AWL=0.376, BAYES_00=-2.599, RCVD_IN_SORBS_WEB=0.619, USER_IN_WHITELIST=-100]
Received: from mail.ietf.org ([64.170.98.30]) by localhost (ietfa.amsl.com [127.0.0.1]) (amavisd-new, port 10024) with ESMTP id pWaaqqL83+tL for <oauth@ietfa.amsl.com>; Thu, 28 Feb 2013 02:28:22 -0800 (PST)
Received: from mout.gmx.net (mout.gmx.net [212.227.15.18]) by ietfa.amsl.com (Postfix) with ESMTP id BF89921F8B6D for <oauth@ietf.org>; Thu, 28 Feb 2013 02:28:21 -0800 (PST)
Received: from mailout-de.gmx.net ([10.1.76.32]) by mrigmx.server.lan (mrigmx002) with ESMTP (Nemesis) id 0MTdbK-1UJqPU1HCy-00QULq for <oauth@ietf.org>; Thu, 28 Feb 2013 11:28:20 +0100
Received: (qmail invoked by alias); 28 Feb 2013 10:28:20 -0000
Received: from unknown (EHLO [10.255.133.93]) [194.251.119.201] by mail.gmx.net (mp032) with SMTP; 28 Feb 2013 11:28:20 +0100
X-Authenticated: #29516787
X-Provags-ID: V01U2FsdGVkX1/DiyML8+zDw/M53m40zSy2LtfzUprwRJSJPSlet9 dt69aZKUOFwrth
Mime-Version: 1.0 (Apple Message framework v1085)
Content-Type: text/plain; charset=us-ascii
From: Hannes Tschofenig <hannes.tschofenig@gmx.net>
In-Reply-To: <1361956373.9883.YahooMailNeo@web31807.mail.mud.yahoo.com>
Date: Thu, 28 Feb 2013 12:28:18 +0200
Content-Transfer-Encoding: quoted-printable
Message-Id: <21030204-8EA7-4FB0-9DD3-2B6C8CA57E02@gmx.net>
References: <20130225124642.7425.65145.idtracker@ietfa.amsl.com> <1361956373.9883.YahooMailNeo@web31807.mail.mud.yahoo.com>
To: William Mills <wmills_92105@yahoo.com>
X-Mailer: Apple Mail (2.1085)
X-Y-GMX-Trusted: 0
Cc: "oauth@ietf.org" <oauth@ietf.org>
Subject: Re: [OAUTH-WG] I-D Action: draft-ietf-oauth-v2-http-mac-03.txt
X-BeenThere: oauth@ietf.org
X-Mailman-Version: 2.1.12
Precedence: list
List-Id: OAUTH WG <oauth.ietf.org>
List-Unsubscribe: <https://www.ietf.org/mailman/options/oauth>, <mailto:oauth-request@ietf.org?subject=unsubscribe>
List-Archive: <http://www.ietf.org/mail-archive/web/oauth>
List-Post: <mailto:oauth@ietf.org>
List-Help: <mailto:oauth-request@ietf.org?subject=help>
List-Subscribe: <https://www.ietf.org/mailman/listinfo/oauth>, <mailto:oauth-request@ietf.org?subject=subscribe>
X-List-Received-Date: Thu, 28 Feb 2013 10:28:22 -0000

Hi Bill,=20

I believe you are misreading the document. In =
draft-ietf-oauth-v2-http-mac the client still uses the MAC when it =
accesses a protected resource.=20
The only place where the JWT comes into the picture is with the =
description of the access token. This matters from a key distribution =
point of view. The session key for the MAC is included in the encrypted =
JWT. The JWT is encrypted by the authorization server and decrypted by =
the resource server.=20

Information about how header fields get included in the MAC is described =
in Section 5.

The nonce isn't killed it is just called differently: seq-nr. The stuff =
in the original MAC specification actually wasn't a nonce (from the =
semantic point of view).=20
The extension parameter is there implicitly by allowing additional =
header fields to be included in the MAC computation.

I need to look at the port number field again.=20

Ciao
Hannes

On Feb 27, 2013, at 11:12 AM, William Mills wrote:

> Just read the draft quickly. =20
>=20
> Since we're now leaning on JWT do we need to include the token in =
this?  Why not just make an additional "Envelope MAC" thing and have the =
signature include the 3 JWT parts in the signature base string?  That =
object then just becomes a JSON container for the kid, timestamp, =
signature method, signature etc. That thing then is a 4th base64 encoded =
JSON thing in the auth header.
>=20
> How header fields get included in the signature needs definition.
>=20
> Why did you kill the port number, nonce, and extension parameter out =
of the signature base string?
>=20
> The BNF appears to have no separators between values.
>=20
> -bill
>=20
>=20
> From: "internet-drafts@ietf.org" <internet-drafts@ietf.org>
> To: i-d-announce@ietf.org=20
> Cc: oauth@ietf.org=20
> Sent: Monday, February 25, 2013 4:46 AM
> Subject: [OAUTH-WG] I-D Action: draft-ietf-oauth-v2-http-mac-03.txt
>=20
>=20
> A New Internet-Draft is available from the on-line Internet-Drafts =
directories.
> This draft is a work item of the Web Authorization Protocol Working =
Group of the IETF.
>=20
>     Title          : OAuth 2.0 Message Authentication Code (MAC) =
Tokens
>     Author(s)      : Justin Richer
>                           William Mills
>                           Hannes Tschofenig
>     Filename        : draft-ietf-oauth-v2-http-mac-03.txt
>     Pages          : 26
>     Date            : 2013-02-25
>=20
> Abstract:
>   This specification describes how to use MAC Tokens in HTTP requests
>   to access OAuth 2.0 protected resources.  An OAuth client willing to
>   access a protected resource needs to demonstrate possession of a
>   crytographic key by using it with a keyed message digest function to
>   the request.
>=20
>   The document also defines a key distribution protocol for obtaining =
a
>   fresh session key.
>=20
>=20
> The IETF datatracker status page for this draft is:
> https://datatracker.ietf.org/doc/draft-ietf-oauth-v2-http-mac
>=20
> There's also a htmlized version available at:
> http://tools.ietf.org/html/draft-ietf-oauth-v2-http-mac-03
>=20
> A diff from the previous version is available at:
> http://www.ietf.org/rfcdiff?url2=3Ddraft-ietf-oauth-v2-http-mac-03
>=20
>=20
> Internet-Drafts are also available by anonymous FTP at:
> ftp://ftp.ietf.org/internet-drafts/
>=20
> _______________________________________________
> OAuth mailing list
> OAuth@ietf.org
> https://www.ietf.org/mailman/listinfo/oauth
>=20
>=20


From hannes.tschofenig@gmx.net  Thu Feb 28 02:29:41 2013
Return-Path: <hannes.tschofenig@gmx.net>
X-Original-To: oauth@ietfa.amsl.com
Delivered-To: oauth@ietfa.amsl.com
Received: from localhost (localhost [127.0.0.1]) by ietfa.amsl.com (Postfix) with ESMTP id E763221F8B6D for <oauth@ietfa.amsl.com>; Thu, 28 Feb 2013 02:29:41 -0800 (PST)
X-Virus-Scanned: amavisd-new at amsl.com
X-Spam-Flag: NO
X-Spam-Score: -101.617
X-Spam-Level: 
X-Spam-Status: No, score=-101.617 tagged_above=-999 required=5 tests=[AWL=0.363, BAYES_00=-2.599, RCVD_IN_SORBS_WEB=0.619, USER_IN_WHITELIST=-100]
Received: from mail.ietf.org ([64.170.98.30]) by localhost (ietfa.amsl.com [127.0.0.1]) (amavisd-new, port 10024) with ESMTP id RpZ6rGLDEK2k for <oauth@ietfa.amsl.com>; Thu, 28 Feb 2013 02:29:41 -0800 (PST)
Received: from mout.gmx.net (mout.gmx.net [212.227.15.19]) by ietfa.amsl.com (Postfix) with ESMTP id 447B021F84C9 for <oauth@ietf.org>; Thu, 28 Feb 2013 02:29:41 -0800 (PST)
Received: from mailout-de.gmx.net ([10.1.76.16]) by mrigmx.server.lan (mrigmx001) with ESMTP (Nemesis) id 0M7WX3-1V4Tbf2CRj-00xLi8 for <oauth@ietf.org>; Thu, 28 Feb 2013 11:29:40 +0100
Received: (qmail invoked by alias); 28 Feb 2013 10:29:40 -0000
Received: from unknown (EHLO [10.255.133.93]) [194.251.119.201] by mail.gmx.net (mp016) with SMTP; 28 Feb 2013 11:29:40 +0100
X-Authenticated: #29516787
X-Provags-ID: V01U2FsdGVkX18Oy75qg+UO6539fxxI/Gg8CVugeBBC/axwChRCLB wcjxzHqJZsnxXS
From: Hannes Tschofenig <hannes.tschofenig@gmx.net>
Content-Type: text/plain; charset=us-ascii
Content-Transfer-Encoding: quoted-printable
Date: Thu, 28 Feb 2013 12:29:38 +0200
Message-Id: <0EC2404F-E3C5-4AD1-88B4-E74AA0394DD9@gmx.net>
To: "oauth@ietf.org WG" <oauth@ietf.org>
Mime-Version: 1.0 (Apple Message framework v1085)
X-Mailer: Apple Mail (2.1085)
X-Y-GMX-Trusted: 0
Subject: [OAUTH-WG] JWT - scope claim missing
X-BeenThere: oauth@ietf.org
X-Mailman-Version: 2.1.12
Precedence: list
List-Id: OAUTH WG <oauth.ietf.org>
List-Unsubscribe: <https://www.ietf.org/mailman/options/oauth>, <mailto:oauth-request@ietf.org?subject=unsubscribe>
List-Archive: <http://www.ietf.org/mail-archive/web/oauth>
List-Post: <mailto:oauth@ietf.org>
List-Help: <mailto:oauth-request@ietf.org?subject=help>
List-Subscribe: <https://www.ietf.org/mailman/listinfo/oauth>, <mailto:oauth-request@ietf.org?subject=subscribe>
X-List-Received-Date: Thu, 28 Feb 2013 10:29:42 -0000

Hi Mike,=20

when I worked on the MAC specification I noticed that the JWT does not =
have a claim for the scope. I believe that this would be needed to allow =
the resource server to verify whether the scope the authorization server =
authorized is indeed what the client is asking for.=20

Ciao
Hannes


From hannes.tschofenig@gmx.net  Thu Feb 28 02:37:48 2013
Return-Path: <hannes.tschofenig@gmx.net>
X-Original-To: oauth@ietfa.amsl.com
Delivered-To: oauth@ietfa.amsl.com
Received: from localhost (localhost [127.0.0.1]) by ietfa.amsl.com (Postfix) with ESMTP id 6914721F8ADC for <oauth@ietfa.amsl.com>; Thu, 28 Feb 2013 02:37:48 -0800 (PST)
X-Virus-Scanned: amavisd-new at amsl.com
X-Spam-Flag: NO
X-Spam-Score: -101.629
X-Spam-Level: 
X-Spam-Status: No, score=-101.629 tagged_above=-999 required=5 tests=[AWL=0.351, BAYES_00=-2.599, RCVD_IN_SORBS_WEB=0.619, USER_IN_WHITELIST=-100]
Received: from mail.ietf.org ([64.170.98.30]) by localhost (ietfa.amsl.com [127.0.0.1]) (amavisd-new, port 10024) with ESMTP id Gc5PKKAU7J6q for <oauth@ietfa.amsl.com>; Thu, 28 Feb 2013 02:37:47 -0800 (PST)
Received: from mout.gmx.net (mout.gmx.net [212.227.15.19]) by ietfa.amsl.com (Postfix) with ESMTP id E0C6021F8AB4 for <oauth@ietf.org>; Thu, 28 Feb 2013 02:37:46 -0800 (PST)
Received: from mailout-de.gmx.net ([10.1.76.4]) by mrigmx.server.lan (mrigmx001) with ESMTP (Nemesis) id 0Ltkst-1UroJY4Bef-011E82 for <oauth@ietf.org>; Thu, 28 Feb 2013 11:37:46 +0100
Received: (qmail invoked by alias); 28 Feb 2013 10:37:45 -0000
Received: from unknown (EHLO [10.255.133.93]) [194.251.119.201] by mail.gmx.net (mp004) with SMTP; 28 Feb 2013 11:37:45 +0100
X-Authenticated: #29516787
X-Provags-ID: V01U2FsdGVkX19FAdc1bGhFWXKLO5jiZ5Ym3mAR7S47s2ifkATtDl Fco9oQRCzv91Ks
From: Hannes Tschofenig <hannes.tschofenig@gmx.net>
Content-Type: text/plain; charset=us-ascii
Content-Transfer-Encoding: quoted-printable
Date: Thu, 28 Feb 2013 12:37:44 +0200
Message-Id: <C61D03BE-5324-4B49-AE98-5B46804A9566@gmx.net>
To: "oauth@ietf.org WG" <oauth@ietf.org>
Mime-Version: 1.0 (Apple Message framework v1085)
X-Mailer: Apple Mail (2.1085)
X-Y-GMX-Trusted: 0
Subject: [OAUTH-WG] JWT & Token Introspection Relationship
X-BeenThere: oauth@ietf.org
X-Mailman-Version: 2.1.12
Precedence: list
List-Id: OAUTH WG <oauth.ietf.org>
List-Unsubscribe: <https://www.ietf.org/mailman/options/oauth>, <mailto:oauth-request@ietf.org?subject=unsubscribe>
List-Archive: <http://www.ietf.org/mail-archive/web/oauth>
List-Post: <mailto:oauth@ietf.org>
List-Help: <mailto:oauth-request@ietf.org?subject=help>
List-Subscribe: <https://www.ietf.org/mailman/listinfo/oauth>, <mailto:oauth-request@ietf.org?subject=subscribe>
X-List-Received-Date: Thu, 28 Feb 2013 10:37:48 -0000

Hi Mike, Hi Justin,=20

when I looked at the JWT and the draft-richer-oauth-introspection =
documents I noticed that the two are not aligned (neither from the =
fields that are supported nor from the way how the fields are defined).=20=


IMHO  draft-richer-oauth-introspection must not define new elements =
since those are already defined in the JWT.=20

You could compare the relationship between the JWT and the =
draft-richer-oauth-introspection in the following way:

The JWT passes the content per value from the AS via the client to the =
RS.=20
The draft-richer-oauth-introspection passes a reference to the content =
from the AS via the client to the RS and since the RS ultimately needs =
to know the content it has to resolve the reference so that it gets the =
content.=20

Therefore, the content (the different JSON encoded structures) should =
only be defined once and could then be used in both specs.=20

Ciao
Hannes


From asanso@adobe.com  Thu Feb 28 02:37:55 2013
Return-Path: <asanso@adobe.com>
X-Original-To: oauth@ietfa.amsl.com
Delivered-To: oauth@ietfa.amsl.com
Received: from localhost (localhost [127.0.0.1]) by ietfa.amsl.com (Postfix) with ESMTP id BA94821F8B7D for <oauth@ietfa.amsl.com>; Thu, 28 Feb 2013 02:37:55 -0800 (PST)
X-Virus-Scanned: amavisd-new at amsl.com
X-Spam-Flag: NO
X-Spam-Score: -103.599
X-Spam-Level: 
X-Spam-Status: No, score=-103.599 tagged_above=-999 required=5 tests=[BAYES_00=-2.599, RCVD_IN_DNSWL_LOW=-1, USER_IN_WHITELIST=-100]
Received: from mail.ietf.org ([64.170.98.30]) by localhost (ietfa.amsl.com [127.0.0.1]) (amavisd-new, port 10024) with ESMTP id j60VtvZ8lBHO for <oauth@ietfa.amsl.com>; Thu, 28 Feb 2013 02:37:55 -0800 (PST)
Received: from exprod6og121.obsmtp.com (exprod6og121.obsmtp.com [64.18.1.237]) by ietfa.amsl.com (Postfix) with ESMTP id E9F5721F8AB4 for <oauth@ietf.org>; Thu, 28 Feb 2013 02:37:48 -0800 (PST)
Received: from outbound-smtp-2.corp.adobe.com ([193.104.215.16]) by exprod6ob121.postini.com ([64.18.5.12]) with SMTP ID DSNKUS8zfJ7Bz9AJWMYWvNFockZHxVuXAkLR@postini.com; Thu, 28 Feb 2013 02:37:54 PST
Received: from inner-relay-1.corp.adobe.com (inner-relay-1.sea.adobe.com [153.32.1.51]) by outbound-smtp-2.corp.adobe.com (8.12.10/8.12.10) with ESMTP id r1SAbknT019876; Thu, 28 Feb 2013 02:37:47 -0800 (PST)
Received: from nahub01.corp.adobe.com (nahub01.corp.adobe.com [10.8.189.97]) by inner-relay-1.corp.adobe.com (8.12.10/8.12.10) with ESMTP id r1SAbkAV016733; Thu, 28 Feb 2013 02:37:46 -0800 (PST)
Received: from eurhub01.eur.adobe.com (10.128.4.30) by nahub01.corp.adobe.com (10.8.189.97) with Microsoft SMTP Server (TLS) id 8.3.298.1; Thu, 28 Feb 2013 02:37:46 -0800
Received: from eurmbx01.eur.adobe.com ([10.128.4.32]) by eurhub01.eur.adobe.com ([10.128.4.30]) with mapi; Thu, 28 Feb 2013 10:37:44 +0000
From: Antonio Sanso <asanso@adobe.com>
To: Hannes Tschofenig <hannes.tschofenig@gmx.net>
Date: Thu, 28 Feb 2013 10:37:44 +0000
Thread-Topic: [OAUTH-WG] I-D Action: draft-ietf-oauth-v2-http-mac-03.txt
Thread-Index: Ac4Vn6RT73QpgH4KReGKXzvRaa9TYA==
Message-ID: <98272BAD-131B-4151-BBB8-0937E8D6781A@adobe.com>
References: <20130225124642.7425.65145.idtracker@ietfa.amsl.com> <1361956373.9883.YahooMailNeo@web31807.mail.mud.yahoo.com> <21030204-8EA7-4FB0-9DD3-2B6C8CA57E02@gmx.net>
In-Reply-To: <21030204-8EA7-4FB0-9DD3-2B6C8CA57E02@gmx.net>
Accept-Language: en-US
Content-Language: en-US
X-MS-Has-Attach: 
X-MS-TNEF-Correlator: 
acceptlanguage: en-US
Content-Type: text/plain; charset="us-ascii"
Content-Transfer-Encoding: quoted-printable
MIME-Version: 1.0
Cc: "oauth@ietf.org" <oauth@ietf.org>
Subject: Re: [OAUTH-WG] I-D Action: draft-ietf-oauth-v2-http-mac-03.txt
X-BeenThere: oauth@ietf.org
X-Mailman-Version: 2.1.12
Precedence: list
List-Id: OAUTH WG <oauth.ietf.org>
List-Unsubscribe: <https://www.ietf.org/mailman/options/oauth>, <mailto:oauth-request@ietf.org?subject=unsubscribe>
List-Archive: <http://www.ietf.org/mail-archive/web/oauth>
List-Post: <mailto:oauth@ietf.org>
List-Help: <mailto:oauth-request@ietf.org?subject=help>
List-Subscribe: <https://www.ietf.org/mailman/listinfo/oauth>, <mailto:oauth-request@ietf.org?subject=subscribe>
X-List-Received-Date: Thu, 28 Feb 2013 10:37:55 -0000

Hi Hannes,

apologies if I do the same question again but there is still one point that=
 is a little obscure to me.

As long I did understand the situation for MAC is the following one.

The communication between the client and the authentication server must be =
https but this is not true for the communication between authentication ser=
ver and resource server.
Hence the need of this key exchange.

Is it correct? Should be the case why we do not have the same problem in th=
e JWT Bearer case? Is because in that case https is as well mandatory betwe=
en authentication server and resource server?

Thanks a lot and regards

Antonio


On Feb 28, 2013, at 11:28 AM, Hannes Tschofenig wrote:

> Hi Bill,=20
>=20
> I believe you are misreading the document. In draft-ietf-oauth-v2-http-ma=
c the client still uses the MAC when it accesses a protected resource.=20
> The only place where the JWT comes into the picture is with the descripti=
on of the access token. This matters from a key distribution point of view.=
 The session key for the MAC is included in the encrypted JWT. The JWT is e=
ncrypted by the authorization server and decrypted by the resource server.=
=20
>=20
> Information about how header fields get included in the MAC is described =
in Section 5.
>=20
> The nonce isn't killed it is just called differently: seq-nr. The stuff i=
n the original MAC specification actually wasn't a nonce (from the semantic=
 point of view).=20
> The extension parameter is there implicitly by allowing additional header=
 fields to be included in the MAC computation.
>=20
> I need to look at the port number field again.=20
>=20
> Ciao
> Hannes
>=20
> On Feb 27, 2013, at 11:12 AM, William Mills wrote:
>=20
>> Just read the draft quickly. =20
>>=20
>> Since we're now leaning on JWT do we need to include the token in this? =
 Why not just make an additional "Envelope MAC" thing and have the signatur=
e include the 3 JWT parts in the signature base string?  That object then j=
ust becomes a JSON container for the kid, timestamp, signature method, sign=
ature etc. That thing then is a 4th base64 encoded JSON thing in the auth h=
eader.
>>=20
>> How header fields get included in the signature needs definition.
>>=20
>> Why did you kill the port number, nonce, and extension parameter out of =
the signature base string?
>>=20
>> The BNF appears to have no separators between values.
>>=20
>> -bill
>>=20
>>=20
>> From: "internet-drafts@ietf.org" <internet-drafts@ietf.org>
>> To: i-d-announce@ietf.org=20
>> Cc: oauth@ietf.org=20
>> Sent: Monday, February 25, 2013 4:46 AM
>> Subject: [OAUTH-WG] I-D Action: draft-ietf-oauth-v2-http-mac-03.txt
>>=20
>>=20
>> A New Internet-Draft is available from the on-line Internet-Drafts direc=
tories.
>> This draft is a work item of the Web Authorization Protocol Working Grou=
p of the IETF.
>>=20
>>    Title          : OAuth 2.0 Message Authentication Code (MAC) Tokens
>>    Author(s)      : Justin Richer
>>                          William Mills
>>                          Hannes Tschofenig
>>    Filename        : draft-ietf-oauth-v2-http-mac-03.txt
>>    Pages          : 26
>>    Date            : 2013-02-25
>>=20
>> Abstract:
>>  This specification describes how to use MAC Tokens in HTTP requests
>>  to access OAuth 2.0 protected resources.  An OAuth client willing to
>>  access a protected resource needs to demonstrate possession of a
>>  crytographic key by using it with a keyed message digest function to
>>  the request.
>>=20
>>  The document also defines a key distribution protocol for obtaining a
>>  fresh session key.
>>=20
>>=20
>> The IETF datatracker status page for this draft is:
>> https://datatracker.ietf.org/doc/draft-ietf-oauth-v2-http-mac
>>=20
>> There's also a htmlized version available at:
>> http://tools.ietf.org/html/draft-ietf-oauth-v2-http-mac-03
>>=20
>> A diff from the previous version is available at:
>> http://www.ietf.org/rfcdiff?url2=3Ddraft-ietf-oauth-v2-http-mac-03
>>=20
>>=20
>> Internet-Drafts are also available by anonymous FTP at:
>> ftp://ftp.ietf.org/internet-drafts/
>>=20
>> _______________________________________________
>> OAuth mailing list
>> OAuth@ietf.org
>> https://www.ietf.org/mailman/listinfo/oauth
>>=20
>>=20
>=20
> _______________________________________________
> OAuth mailing list
> OAuth@ietf.org
> https://www.ietf.org/mailman/listinfo/oauth


From wmills_92105@yahoo.com  Thu Feb 28 05:15:04 2013
Return-Path: <wmills_92105@yahoo.com>
X-Original-To: oauth@ietfa.amsl.com
Delivered-To: oauth@ietfa.amsl.com
Received: from localhost (localhost [127.0.0.1]) by ietfa.amsl.com (Postfix) with ESMTP id F059F21F8439 for <oauth@ietfa.amsl.com>; Thu, 28 Feb 2013 05:15:04 -0800 (PST)
X-Virus-Scanned: amavisd-new at amsl.com
X-Spam-Flag: NO
X-Spam-Score: -2.227
X-Spam-Level: 
X-Spam-Status: No, score=-2.227 tagged_above=-999 required=5 tests=[AWL=0.371,  BAYES_00=-2.599, HTML_MESSAGE=0.001]
Received: from mail.ietf.org ([64.170.98.30]) by localhost (ietfa.amsl.com [127.0.0.1]) (amavisd-new, port 10024) with ESMTP id SVW-Jcw1Lu-t for <oauth@ietfa.amsl.com>; Thu, 28 Feb 2013 05:15:03 -0800 (PST)
Received: from nm7-vm1.bullet.mail.ne1.yahoo.com (nm7-vm1.bullet.mail.ne1.yahoo.com [98.138.90.250]) by ietfa.amsl.com (Postfix) with ESMTP id BAA6921F8496 for <oauth@ietf.org>; Thu, 28 Feb 2013 05:14:56 -0800 (PST)
Received: from [98.138.90.55] by nm7.bullet.mail.ne1.yahoo.com with NNFMP; 28 Feb 2013 13:14:56 -0000
Received: from [98.138.89.249] by tm8.bullet.mail.ne1.yahoo.com with NNFMP; 28 Feb 2013 13:14:56 -0000
Received: from [127.0.0.1] by omp1041.mail.ne1.yahoo.com with NNFMP; 28 Feb 2013 13:14:56 -0000
X-Yahoo-Newman-Property: ymail-3
X-Yahoo-Newman-Id: 131801.79837.bm@omp1041.mail.ne1.yahoo.com
Received: (qmail 52212 invoked by uid 60001); 28 Feb 2013 13:14:55 -0000
DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=yahoo.com; s=s1024; t=1362057295; bh=t7ejJTdHy+s/rKgcXizHr0euT1IwzdKiKuSrXx2IzrM=; h=X-YMail-OSG:Received:X-Rocket-MIMEInfo:X-Mailer:References:Message-ID:Date:From:Reply-To:Subject:To:Cc:In-Reply-To:MIME-Version:Content-Type; b=VErfqpGhr81EfZOzsZv85kMG8fAaOu1nqZm2tifYLUBIl9f2xrEGz1gOsx7qxD7dcx63oXIw49wIKtOWgJC44NmohIvFHpJPqwLc85t2x++C/BcZdC2ko3UotArK4bpBbTzcY2ngyis3vZI3i8/PD8WSW5ZMdqpBj/j3OeFD4nQ=
DomainKey-Signature: a=rsa-sha1; q=dns; c=nofws; s=s1024; d=yahoo.com; h=X-YMail-OSG:Received:X-Rocket-MIMEInfo:X-Mailer:References:Message-ID:Date:From:Reply-To:Subject:To:Cc:In-Reply-To:MIME-Version:Content-Type; b=fG+lYTSQvTvtoD79hpkOaPgZvnrXuRu64/CGGTG7bTBpBfU/IPuZWPbpuJBdw3suIYrsLMgLv86nJxUK5YsSaItU7zfga7YmOn5oYYJYCYvb+s05imhPWuW3exdK8hQfnv4KFU13kOP/kcd48q7k7RqI6wzYXgI2RMEgZvYNHkQ=;
X-YMail-OSG: yyRsn4QVM1l0U5LXcF07Vt0YRU_X.rbvgqV4z5kPWU6ZKaz zXgZ_iUooBmsSJXEzbjnJBnxkOogzSMAb_n6gG_OekHMw_BzveA0Y7lhvb8l cSY2D0lNETvwPnJ3Kyz7DbqiMCld3iRSly2dVMwDWcirMOhRbd0Fsvk1UJ7_ EiiuXTblwf7GYJc9LPa1GFnO0dInCad51nUxFczMe9dA6QRTraSYL72JlFCW SXhiLYEYSeVjnSLkm4jr8kbDnJjdjLvUcl6bToZ6zKEdhlG5dOacRtjIwbvT SEPqh9NNhxLuM4AJbGBurpVwsU2h_m2GGHHh86wC3VYFrGmPxHNNlEl1ytNd xTCAWFM_1lqDzCorMJrNwH53ZlIM.5DOD5ZrVwlhMTqmcPq3ylTy.Vkg_l45 QYEU1LRgBvR.vmB5kgxaC.tqmk719CYXd3LI9LnzsYkPqDfjXW6BKd8DIsc. AGQso1agnO50Eocsm1DDk7mBuFo.hiVoeht67k5GWshVSA.8w2NxKq9secAl 6r2STVLicXTeYxAehIPE-
Received: from [99.31.212.42] by web31809.mail.mud.yahoo.com via HTTP; Thu, 28 Feb 2013 05:14:55 PST
X-Rocket-MIMEInfo: 001.001, SSdtIGFjdHVhbGx5IGFkdm9jYXRpbmcgdGhhdCB3ZSBjaGFuZ2UgTUFDIHRvIGJlIGEgSldUIGV4dGVuc2lvbi4KCgpfX19fX19fX19fX19fX19fX19fX19fX19fX19fX19fXwogRnJvbTogSGFubmVzIFRzY2hvZmVuaWcgPGhhbm5lcy50c2Nob2ZlbmlnQGdteC5uZXQ.ClRvOiBXaWxsaWFtIE1pbGxzIDx3bWlsbHNfOTIxMDVAeWFob28uY29tPiAKQ2M6IEhhbm5lcyBUc2Nob2ZlbmlnIDxoYW5uZXMudHNjaG9mZW5pZ0BnbXgubmV0PjsgIm9hdXRoQGlldGYub3JnIiA8b2F1dGhAaWV0Zi5vcmc.IApTZW50OiABMAEBAQE-
X-Mailer: YahooMailWebService/0.8.135.514
References: <20130225124642.7425.65145.idtracker@ietfa.amsl.com> <1361956373.9883.YahooMailNeo@web31807.mail.mud.yahoo.com> <21030204-8EA7-4FB0-9DD3-2B6C8CA57E02@gmx.net>
Message-ID: <1362057295.36069.YahooMailNeo@web31809.mail.mud.yahoo.com>
Date: Thu, 28 Feb 2013 05:14:55 -0800 (PST)
From: William Mills <wmills_92105@yahoo.com>
To: Hannes Tschofenig <hannes.tschofenig@gmx.net>
In-Reply-To: <21030204-8EA7-4FB0-9DD3-2B6C8CA57E02@gmx.net>
MIME-Version: 1.0
Content-Type: multipart/alternative; boundary="-1395015409-141367223-1362057295=:36069"
Cc: "oauth@ietf.org" <oauth@ietf.org>
Subject: Re: [OAUTH-WG] I-D Action: draft-ietf-oauth-v2-http-mac-03.txt
X-BeenThere: oauth@ietf.org
X-Mailman-Version: 2.1.12
Precedence: list
Reply-To: William Mills <wmills_92105@yahoo.com>
List-Id: OAUTH WG <oauth.ietf.org>
List-Unsubscribe: <https://www.ietf.org/mailman/options/oauth>, <mailto:oauth-request@ietf.org?subject=unsubscribe>
List-Archive: <http://www.ietf.org/mail-archive/web/oauth>
List-Post: <mailto:oauth@ietf.org>
List-Help: <mailto:oauth-request@ietf.org?subject=help>
List-Subscribe: <https://www.ietf.org/mailman/listinfo/oauth>, <mailto:oauth-request@ietf.org?subject=subscribe>
X-List-Received-Date: Thu, 28 Feb 2013 13:15:05 -0000

---1395015409-141367223-1362057295=:36069
Content-Type: text/plain; charset=iso-8859-1
Content-Transfer-Encoding: quoted-printable

I'm actually advocating that we change MAC to be a JWT extension.=0A=0A=0A_=
_______________________________=0A From: Hannes Tschofenig <hannes.tschofen=
ig@gmx.net>=0ATo: William Mills <wmills_92105@yahoo.com> =0ACc: Hannes Tsch=
ofenig <hannes.tschofenig@gmx.net>; "oauth@ietf.org" <oauth@ietf.org> =0ASe=
nt: Thursday, February 28, 2013 2:28 AM=0ASubject: Re: [OAUTH-WG] I-D Actio=
n: draft-ietf-oauth-v2-http-mac-03.txt=0A =0AHi Bill, =0A=0AI believe you a=
re misreading the document. In draft-ietf-oauth-v2-http-mac the client stil=
l uses the MAC when it accesses a protected resource. =0AThe only place whe=
re the JWT comes into the picture is with the description of the access tok=
en. This matters from a key distribution point of view. The session key for=
 the MAC is included in the encrypted JWT. The JWT is encrypted by the auth=
orization server and decrypted by the resource server. =0A=0AInformation ab=
out how header fields get included in the MAC is described in Section 5.=0A=
=0AThe nonce isn't killed it is just called differently: seq-nr. The stuff =
in the original MAC specification actually wasn't a nonce (from the semanti=
c point of view). =0AThe extension parameter is there implicitly by allowin=
g additional header fields to be included in the MAC computation.=0A=0AI ne=
ed to look at the port number field again. =0A=0ACiao=0AHannes=0A=0AOn Feb =
27, 2013, at 11:12 AM, William Mills wrote:=0A=0A> Just read the draft quic=
kly.=A0 =0A> =0A> Since we're now leaning on JWT do we need to include the =
token in this?=A0 Why not just make an additional "Envelope MAC" thing and =
have the signature include the 3 JWT parts in the signature base string?=A0=
 That object then just becomes a JSON container for the kid, timestamp, sig=
nature method, signature etc. That thing then is a 4th base64 encoded JSON =
thing in the auth header.=0A> =0A> How header fields get included in the si=
gnature needs definition.=0A> =0A> Why did you kill the port number, nonce,=
 and extension parameter out of the signature base string?=0A> =0A> The BNF=
 appears to have no separators between values.=0A> =0A> -bill=0A> =0A> =0A>=
 From: "internet-drafts@ietf.org" <internet-drafts@ietf.org>=0A> To: i-d-an=
nounce@ietf.org =0A> Cc: oauth@ietf.org =0A> Sent: Monday, February 25, 201=
3 4:46 AM=0A> Subject: [OAUTH-WG] I-D Action: draft-ietf-oauth-v2-http-mac-=
03.txt=0A> =0A> =0A> A New Internet-Draft is available from the on-line Int=
ernet-Drafts directories.=0A> This draft is a work item of the Web Authoriz=
ation Protocol Working Group of the IETF.=0A> =0A>=A0 =A0  Title=A0 =A0 =A0=
 =A0 =A0 : OAuth 2.0 Message Authentication Code (MAC) Tokens=0A>=A0 =A0  A=
uthor(s)=A0 =A0 =A0 : Justin Richer=0A>=A0 =A0 =A0 =A0 =A0 =A0 =A0 =A0 =A0 =
=A0 =A0 =A0 =A0  William Mills=0A>=A0 =A0 =A0 =A0 =A0 =A0 =A0 =A0 =A0 =A0 =
=A0 =A0 =A0  Hannes Tschofenig=0A>=A0 =A0  Filename=A0 =A0 =A0 =A0 : draft-=
ietf-oauth-v2-http-mac-03.txt=0A>=A0 =A0  Pages=A0 =A0 =A0 =A0 =A0 : 26=0A>=
=A0 =A0  Date=A0 =A0 =A0 =A0 =A0 =A0 : 2013-02-25=0A> =0A> Abstract:=0A>=A0=
  This specification describes how to use MAC Tokens in HTTP requests=0A>=
=A0  to access OAuth 2.0 protected resources.=A0 An OAuth client willing to=
=0A>=A0  access a protected resource needs to demonstrate possession of a=
=0A>=A0  crytographic key by using it with a keyed message digest function =
to=0A>=A0  the request.=0A> =0A>=A0  The document also defines a key distri=
bution protocol for obtaining a=0A>=A0  fresh session key.=0A> =0A> =0A> Th=
e IETF datatracker status page for this draft is:=0A> https://datatracker.i=
etf.org/doc/draft-ietf-oauth-v2-http-mac=0A> =0A> There's also a htmlized v=
ersion available at:=0A> http://tools.ietf.org/html/draft-ietf-oauth-v2-htt=
p-mac-03=0A> =0A> A diff from the previous version is available at:=0A> htt=
p://www.ietf.org/rfcdiff?url2=3Ddraft-ietf-oauth-v2-http-mac-03=0A> =0A> =
=0A> Internet-Drafts are also available by anonymous FTP at:=0A> ftp://ftp.=
ietf.org/internet-drafts/=0A> =0A> ________________________________________=
_______=0A> OAuth mailing list=0A> OAuth@ietf.org=0A> https://www.ietf.org/=
mailman/listinfo/oauth=0A> =0A> 
---1395015409-141367223-1362057295=:36069
Content-Type: text/html; charset=iso-8859-1
Content-Transfer-Encoding: quoted-printable

<html><body><div style=3D"color:#000; background-color:#fff; font-family:Co=
urier New, courier, monaco, monospace, sans-serif;font-size:12pt"><div><spa=
n>I'm actually advocating that we change MAC to be a JWT extension.</span><=
/div><div><br></div>  <div style=3D"font-family: 'Courier New', courier, mo=
naco, monospace, sans-serif; font-size: 12pt;"> <div style=3D"font-family: =
'times new roman', 'new york', times, serif; font-size: 12pt;"> <div dir=3D=
"ltr"> <font size=3D"2" face=3D"Arial"> <hr size=3D"1">  <b><span style=3D"=
font-weight:bold;">From:</span></b> Hannes Tschofenig &lt;hannes.tschofenig=
@gmx.net&gt;<br> <b><span style=3D"font-weight: bold;">To:</span></b> Willi=
am Mills &lt;wmills_92105@yahoo.com&gt; <br><b><span style=3D"font-weight: =
bold;">Cc:</span></b> Hannes Tschofenig &lt;hannes.tschofenig@gmx.net&gt;; =
"oauth@ietf.org" &lt;oauth@ietf.org&gt; <br> <b><span style=3D"font-weight:=
 bold;">Sent:</span></b> Thursday, February 28, 2013 2:28 AM<br> <b><span
 style=3D"font-weight: bold;">Subject:</span></b> Re: [OAUTH-WG] I-D Action=
: draft-ietf-oauth-v2-http-mac-03.txt<br> </font> </div> <br>=0AHi Bill, <b=
r><br>I believe you are misreading the document. In draft-ietf-oauth-v2-htt=
p-mac the client still uses the MAC when it accesses a protected resource. =
<br>The only place where the JWT comes into the picture is with the descrip=
tion of the access token. This matters from a key distribution point of vie=
w. The session key for the MAC is included in the encrypted JWT. The JWT is=
 encrypted by the authorization server and decrypted by the resource server=
. <br><br>Information about how header fields get included in the MAC is de=
scribed in Section 5.<br><br>The nonce isn't killed it is just called diffe=
rently: seq-nr. The stuff in the original MAC specification actually wasn't=
 a nonce (from the semantic point of view). <br>The extension parameter is =
there implicitly by allowing additional header fields to be included in the=
 MAC computation.<br><br>I need to look at the port number field again. <br=
><br>Ciao<br>Hannes<br><br>On Feb 27, 2013, at 11:12 AM,
 William Mills wrote:<br><br>&gt; Just read the draft quickly.&nbsp; <br>&g=
t; <br>&gt; Since we're now leaning on JWT do we need to include the token =
in this?&nbsp; Why not just make an additional "Envelope MAC" thing and hav=
e the signature include the 3 JWT parts in the signature base string?&nbsp;=
 That object then just becomes a JSON container for the kid, timestamp, sig=
nature method, signature etc. That thing then is a 4th base64 encoded JSON =
thing in the auth header.<br>&gt; <br>&gt; How header fields get included i=
n the signature needs definition.<br>&gt; <br>&gt; Why did you kill the por=
t number, nonce, and extension parameter out of the signature base string?<=
br>&gt; <br>&gt; The BNF appears to have no separators between values.<br>&=
gt; <br>&gt; -bill<br>&gt; <br>&gt; <br>&gt; From: "<a ymailto=3D"mailto:in=
ternet-drafts@ietf.org" href=3D"mailto:internet-drafts@ietf.org">internet-d=
rafts@ietf.org</a>" &lt;<a ymailto=3D"mailto:internet-drafts@ietf.org"
 href=3D"mailto:internet-drafts@ietf.org">internet-drafts@ietf.org</a>&gt;<=
br>&gt; To: <a ymailto=3D"mailto:i-d-announce@ietf.org" href=3D"mailto:i-d-=
announce@ietf.org">i-d-announce@ietf.org</a> <br>&gt; Cc: <a ymailto=3D"mai=
lto:oauth@ietf.org" href=3D"mailto:oauth@ietf.org">oauth@ietf.org</a> <br>&=
gt; Sent: Monday, February 25, 2013 4:46 AM<br>&gt; Subject: [OAUTH-WG] I-D=
 Action: draft-ietf-oauth-v2-http-mac-03.txt<br>&gt; <br>&gt; <br>&gt; A Ne=
w Internet-Draft is available from the on-line Internet-Drafts directories.=
<br>&gt; This draft is a work item of the Web Authorization Protocol Workin=
g Group of the IETF.<br>&gt; <br>&gt;&nbsp; &nbsp;  Title&nbsp; &nbsp; &nbs=
p; &nbsp; &nbsp; : OAuth 2.0 Message Authentication Code (MAC) Tokens<br>&g=
t;&nbsp; &nbsp;  Author(s)&nbsp; &nbsp; &nbsp; : Justin Richer<br>&gt;&nbsp=
; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nb=
sp; &nbsp;  William Mills<br>&gt;&nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp;
 &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp;  Hannes Tschofenig<br>&gt=
;&nbsp; &nbsp;  Filename&nbsp; &nbsp; &nbsp; &nbsp; : draft-ietf-oauth-v2-h=
ttp-mac-03.txt<br>&gt;&nbsp; &nbsp;  Pages&nbsp; &nbsp; &nbsp; &nbsp; &nbsp=
; : 26<br>&gt;&nbsp; &nbsp;  Date&nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; =
: 2013-02-25<br>&gt; <br>&gt; Abstract:<br>&gt;&nbsp;  This specification d=
escribes how to use MAC Tokens in HTTP requests<br>&gt;&nbsp;  to access OA=
uth 2.0 protected resources.&nbsp; An OAuth client willing to<br>&gt;&nbsp;=
  access a protected resource needs to demonstrate possession of a<br>&gt;&=
nbsp;  crytographic key by using it with a keyed message digest function to=
<br>&gt;&nbsp;  the request.<br>&gt; <br>&gt;&nbsp;  The document also defi=
nes a key distribution protocol for obtaining a<br>&gt;&nbsp;  fresh sessio=
n key.<br>&gt; <br>&gt; <br>&gt; The IETF datatracker status page for this =
draft is:<br>&gt; <a
 href=3D"https://datatracker.ietf.org/doc/draft-ietf-oauth-v2-http-mac" tar=
get=3D"_blank">https://datatracker.ietf.org/doc/draft-ietf-oauth-v2-http-ma=
c</a><br>&gt; <br>&gt; There's also a htmlized version available at:<br>&gt=
; http://tools.ietf.org/html/draft-ietf-oauth-v2-http-mac-03<br>&gt; <br>&g=
t; A diff from the previous version is available at:<br>&gt; http://www.iet=
f.org/rfcdiff?url2=3Ddraft-ietf-oauth-v2-http-mac-03<br>&gt; <br>&gt; <br>&=
gt; Internet-Drafts are also available by anonymous FTP at:<br>&gt; <a href=
=3D"ftp://ftp.ietf.org/internet-drafts/" target=3D"_blank">ftp://ftp.ietf.o=
rg/internet-drafts/</a><br>&gt; <br>&gt; __________________________________=
_____________<br>&gt; OAuth mailing list<br>&gt; <a ymailto=3D"mailto:OAuth=
@ietf.org" href=3D"mailto:OAuth@ietf.org">OAuth@ietf.org</a><br>&gt; <a hre=
f=3D"https://www.ietf.org/mailman/listinfo/oauth" target=3D"_blank">https:/=
/www.ietf.org/mailman/listinfo/oauth</a><br>&gt; <br>&gt; <br><br><br><br> =
</div>
 </div>  </div></body></html>
---1395015409-141367223-1362057295=:36069--

From jricher@mitre.org  Thu Feb 28 07:42:50 2013
Return-Path: <jricher@mitre.org>
X-Original-To: oauth@ietfa.amsl.com
Delivered-To: oauth@ietfa.amsl.com
Received: from localhost (localhost [127.0.0.1]) by ietfa.amsl.com (Postfix) with ESMTP id 561C021F8738 for <oauth@ietfa.amsl.com>; Thu, 28 Feb 2013 07:42:50 -0800 (PST)
X-Virus-Scanned: amavisd-new at amsl.com
X-Spam-Flag: NO
X-Spam-Score: -6.577
X-Spam-Level: 
X-Spam-Status: No, score=-6.577 tagged_above=-999 required=5 tests=[AWL=0.021,  BAYES_00=-2.599, HTML_MESSAGE=0.001, RCVD_IN_DNSWL_MED=-4]
Received: from mail.ietf.org ([64.170.98.30]) by localhost (ietfa.amsl.com [127.0.0.1]) (amavisd-new, port 10024) with ESMTP id QF5Yyl4hcroR for <oauth@ietfa.amsl.com>; Thu, 28 Feb 2013 07:42:47 -0800 (PST)
Received: from smtpksrv1.mitre.org (smtpksrv1.mitre.org [198.49.146.77]) by ietfa.amsl.com (Postfix) with ESMTP id 80D3221F85DF for <oauth@ietf.org>; Thu, 28 Feb 2013 07:42:47 -0800 (PST)
Received: from smtpksrv1.mitre.org (localhost.localdomain [127.0.0.1]) by localhost (Postfix) with SMTP id DABC15311B24; Thu, 28 Feb 2013 10:42:46 -0500 (EST)
Received: from IMCCAS02.MITRE.ORG (imccas02.mitre.org [129.83.29.79]) by smtpksrv1.mitre.org (Postfix) with ESMTP id C6AFC5311B43; Thu, 28 Feb 2013 10:42:46 -0500 (EST)
Received: from [10.146.15.29] (129.83.31.58) by IMCCAS02.MITRE.ORG (129.83.29.79) with Microsoft SMTP Server (TLS) id 14.2.318.4; Thu, 28 Feb 2013 10:42:46 -0500
Message-ID: <512F7AB8.7080109@mitre.org>
Date: Thu, 28 Feb 2013 10:41:44 -0500
From: Justin Richer <jricher@mitre.org>
User-Agent: Mozilla/5.0 (X11; Linux i686; rv:17.0) Gecko/20130106 Thunderbird/17.0.2
MIME-Version: 1.0
To: Mike Jones <Michael.Jones@microsoft.com>
References: <512E2D7F.6060903@mitre.org> <4E1F6AAD24975D4BA5B1680429673943674BC644@TK5EX14MBXC283.redmond.corp.microsoft.com>
In-Reply-To: <4E1F6AAD24975D4BA5B1680429673943674BC644@TK5EX14MBXC283.redmond.corp.microsoft.com>
Content-Type: multipart/alternative; boundary="------------060300080802060605070906"
X-Originating-IP: [129.83.31.58]
Cc: "oauth@ietf.org" <oauth@ietf.org>
Subject: Re: [OAUTH-WG] Registration: grant_types and response_types
X-BeenThere: oauth@ietf.org
X-Mailman-Version: 2.1.12
Precedence: list
List-Id: OAUTH WG <oauth.ietf.org>
List-Unsubscribe: <https://www.ietf.org/mailman/options/oauth>, <mailto:oauth-request@ietf.org?subject=unsubscribe>
List-Archive: <http://www.ietf.org/mail-archive/web/oauth>
List-Post: <mailto:oauth@ietf.org>
List-Help: <mailto:oauth-request@ietf.org?subject=help>
List-Subscribe: <https://www.ietf.org/mailman/listinfo/oauth>, <mailto:oauth-request@ietf.org?subject=subscribe>
X-List-Received-Date: Thu, 28 Feb 2013 15:42:50 -0000

--------------060300080802060605070906
Content-Type: text/plain; charset="ISO-8859-1"; format=flowed
Content-Transfer-Encoding: 7bit

The good thing about having two fields is that they map to the two 
different parameter names directly. The trouble is that you could get in 
a situation where a client can't actually do anything, say if you 
register response type "token" and grant type "authorization_code". With 
a table like the one below, we can help developers see what the right 
mappings should be and help servers to enforce this.

Thoughts?

  -- Justin

On 02/27/2013 05:52 PM, Mike Jones wrote:
>
> John Bradley and I just talked about this during a side meeting at 
> RSA.  We think that this is the mapping of grant types and defined 
> response types.  (The additional response_type values are registered 
> with IANA and defined in 
> http://openid.net/specs/oauth-v2-multiple-response-types-1_0.html.)
>
> *response_type value*
>
> 	
>
> *grant_types*
>
> code
>
> 	
>
> authorization_code
>
> token
>
> 	
>
> implicit
>
> id_token
>
> 	
>
> implicit
>
> token id_token
>
> 	
>
> implicit
>
> code token
>
> 	
>
> authorization_code implicit
>
> code id_token
>
> 	
>
> authorization_code implicit
>
> code token id_token
>
> 	
>
> authorization_code implicit
>
> none
>
> 	
>
> none
>
> If people agree that this is the mapping, and that it conveys 
> sufficient information, then conceivably OpenID Connect could drop the 
> response_types registration parameter and instead just use the OAuth 
> Registration "grant_types" parameter.
>
> What do others think?
>
> -- Mike
>
> P.S. There's a typo in the OAuth Registration spec section quoted 
> below.  The name "grant_type" should have been "grant_types", since 
> the value is a list.  We should correct that in the next version of 
> the spec.
>
> *From:*oauth-bounces@ietf.org [mailto:oauth-bounces@ietf.org] *On 
> Behalf Of *Justin Richer
> *Sent:* Wednesday, February 27, 2013 8:00 AM
> *To:* oauth@ietf.org
> *Subject:* [OAUTH-WG] Registration: grant_types and response_types
>
> There has been some press lately about clients being able to use an 
> implicit flow to get tokens when they really ought to only use a code 
> flow, since the security considerations and protections for both are 
> very different. With this in mind, it makes sense that a dynamically 
> registered client should be limited to use only certain flows, if at 
> all possible.
>
> The dynamic registration document currently handles this using the 
> grant_type parameter (introduced in draft -03), which is defined in 
> section 2 as follows:
>
>     grant_type
>        OPTIONAL.  Array of grant types that a client may use.  These
>        grant types are defined as follows:
>   
>        *  "authorization_code": The Authorization Code Grant described in
>           OAuth2Section 4.1  <http://tools.ietf.org/html/draft-ietf-oauth-dyn-reg-07#section-4.1>.
>   
>        *  "implicit": The Implicit Grant described in OAuth2Section 4.2  <http://tools.ietf.org/html/draft-ietf-oauth-dyn-reg-07#section-4.2>.
>   
>        *  "password": The Resource Owner Password Credentials Grant
>           described in OAuth2Section 4.3  <http://tools.ietf.org/html/draft-ietf-oauth-dyn-reg-07#section-4.3>
>   
>        *  "client_credentials": The Client Credentials Grant described in
>           OAuth2Section 4.4  <http://tools.ietf.org/html/draft-ietf-oauth-dyn-reg-07#section-4.4>
>   
>        *  "refresh_token": The Refresh Token Grant described in OAuth2
>           Section 6  <http://tools.ietf.org/html/draft-ietf-oauth-dyn-reg-07#section-6>.
>   
>        Authorization Servers MAY allow for other values as defined in
>        grant type extensions to OAuth2.  The extension process is
>        described in OAuth2Section 2.5  <http://tools.ietf.org/html/draft-ietf-oauth-dyn-reg-07#section-2.5>, and the value of this parameter
>        MUST be the same as the value of the "grant_type" parameter
>        defined in the extension.
>
>
> This allows the client to specify which flows it wants to be able to 
> use (including any extensions), and allows the server to to tell the 
> client in the client configuration response what flows it can expect 
> to work.
>
> OpenID Connect's registration has recently introduced the use of a 
> different parameter, response_type, for a similar but slightly 
> different purpose. The parameter is defined in the latest draft in 
> source control as:
>
> response_types
>
> OPTIONAL. JSON array containing a list of the OAuth 2.0 response_type
>
> values that this Client uses. If omitted, the default is that the Client
>
> uses only the code response type.
>
>
> OIDC makes use of response_types beyond just "code" and "token", 
> defining several new ones including combinations like "code idtoken".
>
> So my question to the group is this: Should we incorporate the OIDC 
> response_types parameter? Do we need both parameters specified in the 
> registration or is one sufficient? They're defined separately in the 
> OAuth2 protocol (one is on the Auth endpoint and one is on the Token 
> endpoint), but can only be used legally in particular combinations so 
> there would have to be normative text around particular values.
>
> In my opinion, I don't think we can get rid of grant_type, since 
> that's the only way to specify things like client_credentials flows 
> and most extensions. There might be value in also specifying 
> response_type, but I don't want to add extra fields unless there's a 
> clearly defined need for it.
>
>  -- Justin
>


--------------060300080802060605070906
Content-Type: text/html; charset="ISO-8859-1"
Content-Transfer-Encoding: 7bit

<html>
  <head>
    <meta content="text/html; charset=ISO-8859-1"
      http-equiv="Content-Type">
  </head>
  <body bgcolor="#FFFFFF" text="#000000">
    The good thing about having two fields is that they map to the two
    different parameter names directly. The trouble is that you could
    get in a situation where a client can't actually do anything, say if
    you register response type "token" and grant type
    "authorization_code". With a table like the one below, we can help
    developers see what the right mappings should be and help servers to
    enforce this.<br>
    <br>
    Thoughts?<br>
    <br>
    &nbsp;-- Justin<br>
    <br>
    <div class="moz-cite-prefix">On 02/27/2013 05:52 PM, Mike Jones
      wrote:<br>
    </div>
    <blockquote
cite="mid:4E1F6AAD24975D4BA5B1680429673943674BC644@TK5EX14MBXC283.redmond.corp.microsoft.com"
      type="cite">
      <meta http-equiv="Content-Type" content="text/html;
        charset=ISO-8859-1">
      <meta name="Generator" content="Microsoft Word 14 (filtered
        medium)">
      <style><!--
/* Font Definitions */
@font-face
	{font-family:Calibri;
	panose-1:2 15 5 2 2 2 4 3 2 4;}
@font-face
	{font-family:Tahoma;
	panose-1:2 11 6 4 3 5 4 4 2 4;}
@font-face
	{font-family:Consolas;
	panose-1:2 11 6 9 2 2 4 3 2 4;}
/* Style Definitions */
p.MsoNormal, li.MsoNormal, div.MsoNormal
	{margin:0in;
	margin-bottom:.0001pt;
	font-size:12.0pt;
	font-family:"Times New Roman","serif";
	color:black;}
a:link, span.MsoHyperlink
	{mso-style-priority:99;
	color:blue;
	text-decoration:underline;}
a:visited, span.MsoHyperlinkFollowed
	{mso-style-priority:99;
	color:purple;
	text-decoration:underline;}
p
	{mso-style-priority:99;
	mso-margin-top-alt:auto;
	margin-right:0in;
	mso-margin-bottom-alt:auto;
	margin-left:0in;
	font-size:12.0pt;
	font-family:"Times New Roman","serif";
	color:black;}
pre
	{mso-style-priority:99;
	mso-style-link:"HTML Preformatted Char";
	margin:0in;
	margin-bottom:.0001pt;
	font-size:10.0pt;
	font-family:"Courier New";
	color:black;}
tt
	{mso-style-priority:99;
	font-family:"Courier New";}
span.HTMLPreformattedChar
	{mso-style-name:"HTML Preformatted Char";
	mso-style-priority:99;
	mso-style-link:"HTML Preformatted";
	font-family:Consolas;
	color:black;}
span.EmailStyle21
	{mso-style-type:personal-reply;
	font-family:"Calibri","sans-serif";
	color:#1F497D;}
.MsoChpDefault
	{mso-style-type:export-only;
	font-size:10.0pt;}
@page WordSection1
	{size:8.5in 11.0in;
	margin:1.0in 1.0in 1.0in 1.0in;}
div.WordSection1
	{page:WordSection1;}
--></style><!--[if gte mso 9]><xml>
<o:shapedefaults v:ext="edit" spidmax="1026" />
</xml><![endif]--><!--[if gte mso 9]><xml>
<o:shapelayout v:ext="edit">
<o:idmap v:ext="edit" data="1" />
</o:shapelayout></xml><![endif]-->
      <div class="WordSection1">
        <p class="MsoNormal"><span
style="font-size:11.0pt;font-family:&quot;Calibri&quot;,&quot;sans-serif&quot;;color:#1F497D">John
            Bradley and I just talked about this during a side meeting
            at RSA.&nbsp; We think that this is the mapping of grant types
            and defined response types.&nbsp; (The additional response_type
            values are registered with IANA and defined in <a
              moz-do-not-send="true"
              href="http://openid.net/specs/oauth-v2-multiple-response-types-1_0.html">
http://openid.net/specs/oauth-v2-multiple-response-types-1_0.html</a>.)<o:p></o:p></span></p>
        <p class="MsoNormal"><span
style="font-size:11.0pt;font-family:&quot;Calibri&quot;,&quot;sans-serif&quot;;color:#1F497D"><o:p>&nbsp;</o:p></span></p>
        <table class="MsoTableGrid"
          style="border-collapse:collapse;border:none" border="1"
          cellpadding="0" cellspacing="0">
          <tbody>
            <tr>
              <td style="width:239.4pt;border:solid windowtext
                1.0pt;padding:0in 5.4pt 0in 5.4pt" valign="top"
                width="399">
                <p class="MsoNormal"><b><span
style="font-size:11.0pt;font-family:&quot;Calibri&quot;,&quot;sans-serif&quot;;color:#1F497D">response_type
                      value<o:p></o:p></span></b></p>
              </td>
              <td style="width:239.4pt;border:solid windowtext
                1.0pt;border-left:none;padding:0in 5.4pt 0in 5.4pt"
                valign="top" width="399">
                <p class="MsoNormal"><b><span
style="font-size:11.0pt;font-family:&quot;Calibri&quot;,&quot;sans-serif&quot;;color:#1F497D">grant_types<o:p></o:p></span></b></p>
              </td>
            </tr>
            <tr>
              <td style="width:239.4pt;border:solid windowtext
                1.0pt;border-top:none;padding:0in 5.4pt 0in 5.4pt"
                valign="top" width="399">
                <p class="MsoNormal"><span
style="font-size:11.0pt;font-family:&quot;Calibri&quot;,&quot;sans-serif&quot;;color:#1F497D">code<o:p></o:p></span></p>
              </td>
              <td
                style="width:239.4pt;border-top:none;border-left:none;border-bottom:solid
                windowtext 1.0pt;border-right:solid windowtext
                1.0pt;padding:0in 5.4pt 0in 5.4pt" valign="top"
                width="399">
                <p class="MsoNormal"><span
style="font-size:11.0pt;font-family:&quot;Calibri&quot;,&quot;sans-serif&quot;;color:#1F497D">authorization_code<o:p></o:p></span></p>
              </td>
            </tr>
            <tr>
              <td style="width:239.4pt;border:solid windowtext
                1.0pt;border-top:none;padding:0in 5.4pt 0in 5.4pt"
                valign="top" width="399">
                <p class="MsoNormal"><span
style="font-size:11.0pt;font-family:&quot;Calibri&quot;,&quot;sans-serif&quot;;color:#1F497D">token<o:p></o:p></span></p>
              </td>
              <td
                style="width:239.4pt;border-top:none;border-left:none;border-bottom:solid
                windowtext 1.0pt;border-right:solid windowtext
                1.0pt;padding:0in 5.4pt 0in 5.4pt" valign="top"
                width="399">
                <p class="MsoNormal"><span
style="font-size:11.0pt;font-family:&quot;Calibri&quot;,&quot;sans-serif&quot;;color:#1F497D">implicit<o:p></o:p></span></p>
              </td>
            </tr>
            <tr>
              <td style="width:239.4pt;border:solid windowtext
                1.0pt;border-top:none;padding:0in 5.4pt 0in 5.4pt"
                valign="top" width="399">
                <p class="MsoNormal"><span
style="font-size:11.0pt;font-family:&quot;Calibri&quot;,&quot;sans-serif&quot;;color:#1F497D">id_token<o:p></o:p></span></p>
              </td>
              <td
                style="width:239.4pt;border-top:none;border-left:none;border-bottom:solid
                windowtext 1.0pt;border-right:solid windowtext
                1.0pt;padding:0in 5.4pt 0in 5.4pt" valign="top"
                width="399">
                <p class="MsoNormal"><span
style="font-size:11.0pt;font-family:&quot;Calibri&quot;,&quot;sans-serif&quot;;color:#1F497D">implicit<o:p></o:p></span></p>
              </td>
            </tr>
            <tr>
              <td style="width:239.4pt;border:solid windowtext
                1.0pt;border-top:none;padding:0in 5.4pt 0in 5.4pt"
                valign="top" width="399">
                <p class="MsoNormal"><span
style="font-size:11.0pt;font-family:&quot;Calibri&quot;,&quot;sans-serif&quot;;color:#1F497D">token
                    id_token<o:p></o:p></span></p>
              </td>
              <td
                style="width:239.4pt;border-top:none;border-left:none;border-bottom:solid
                windowtext 1.0pt;border-right:solid windowtext
                1.0pt;padding:0in 5.4pt 0in 5.4pt" valign="top"
                width="399">
                <p class="MsoNormal"><span
style="font-size:11.0pt;font-family:&quot;Calibri&quot;,&quot;sans-serif&quot;;color:#1F497D">implicit<o:p></o:p></span></p>
              </td>
            </tr>
            <tr>
              <td style="width:239.4pt;border:solid windowtext
                1.0pt;border-top:none;padding:0in 5.4pt 0in 5.4pt"
                valign="top" width="399">
                <p class="MsoNormal"><span
style="font-size:11.0pt;font-family:&quot;Calibri&quot;,&quot;sans-serif&quot;;color:#1F497D">code
                    token<o:p></o:p></span></p>
              </td>
              <td
                style="width:239.4pt;border-top:none;border-left:none;border-bottom:solid
                windowtext 1.0pt;border-right:solid windowtext
                1.0pt;padding:0in 5.4pt 0in 5.4pt" valign="top"
                width="399">
                <p class="MsoNormal"><span
style="font-size:11.0pt;font-family:&quot;Calibri&quot;,&quot;sans-serif&quot;;color:#1F497D">authorization_code
                    implicit<o:p></o:p></span></p>
              </td>
            </tr>
            <tr>
              <td style="width:239.4pt;border:solid windowtext
                1.0pt;border-top:none;padding:0in 5.4pt 0in 5.4pt"
                valign="top" width="399">
                <p class="MsoNormal"><span
style="font-size:11.0pt;font-family:&quot;Calibri&quot;,&quot;sans-serif&quot;;color:#1F497D">code
                    id_token<o:p></o:p></span></p>
              </td>
              <td
                style="width:239.4pt;border-top:none;border-left:none;border-bottom:solid
                windowtext 1.0pt;border-right:solid windowtext
                1.0pt;padding:0in 5.4pt 0in 5.4pt" valign="top"
                width="399">
                <p class="MsoNormal"><span
style="font-size:11.0pt;font-family:&quot;Calibri&quot;,&quot;sans-serif&quot;;color:#1F497D">authorization_code
                    implicit<o:p></o:p></span></p>
              </td>
            </tr>
            <tr>
              <td style="width:239.4pt;border:solid windowtext
                1.0pt;border-top:none;padding:0in 5.4pt 0in 5.4pt"
                valign="top" width="399">
                <p class="MsoNormal"><span
style="font-size:11.0pt;font-family:&quot;Calibri&quot;,&quot;sans-serif&quot;;color:#1F497D">code
                    token id_token<o:p></o:p></span></p>
              </td>
              <td
                style="width:239.4pt;border-top:none;border-left:none;border-bottom:solid
                windowtext 1.0pt;border-right:solid windowtext
                1.0pt;padding:0in 5.4pt 0in 5.4pt" valign="top"
                width="399">
                <p class="MsoNormal"><span
style="font-size:11.0pt;font-family:&quot;Calibri&quot;,&quot;sans-serif&quot;;color:#1F497D">authorization_code
                    implicit<o:p></o:p></span></p>
              </td>
            </tr>
            <tr>
              <td style="width:239.4pt;border:solid windowtext
                1.0pt;border-top:none;padding:0in 5.4pt 0in 5.4pt"
                valign="top" width="399">
                <p class="MsoNormal"><span
style="font-size:11.0pt;font-family:&quot;Calibri&quot;,&quot;sans-serif&quot;;color:#1F497D">none<o:p></o:p></span></p>
              </td>
              <td
                style="width:239.4pt;border-top:none;border-left:none;border-bottom:solid
                windowtext 1.0pt;border-right:solid windowtext
                1.0pt;padding:0in 5.4pt 0in 5.4pt" valign="top"
                width="399">
                <p class="MsoNormal"><span
style="font-size:11.0pt;font-family:&quot;Calibri&quot;,&quot;sans-serif&quot;;color:#1F497D">none<o:p></o:p></span></p>
              </td>
            </tr>
          </tbody>
        </table>
        <p class="MsoNormal"><span
style="font-size:11.0pt;font-family:&quot;Calibri&quot;,&quot;sans-serif&quot;;color:#1F497D"><o:p>&nbsp;</o:p></span></p>
        <p class="MsoNormal"><span
style="font-size:11.0pt;font-family:&quot;Calibri&quot;,&quot;sans-serif&quot;;color:#1F497D">If
            people agree that this is the mapping, and that it conveys
            sufficient information, then conceivably OpenID Connect
            could drop the response_types registration parameter and
            instead just use the OAuth Registration &#8220;grant_types&#8221;
            parameter.<o:p></o:p></span></p>
        <p class="MsoNormal"><span
style="font-size:11.0pt;font-family:&quot;Calibri&quot;,&quot;sans-serif&quot;;color:#1F497D"><o:p>&nbsp;</o:p></span></p>
        <p class="MsoNormal"><span
style="font-size:11.0pt;font-family:&quot;Calibri&quot;,&quot;sans-serif&quot;;color:#1F497D">What
            do others think?<o:p></o:p></span></p>
        <p class="MsoNormal"><span
style="font-size:11.0pt;font-family:&quot;Calibri&quot;,&quot;sans-serif&quot;;color:#1F497D"><o:p>&nbsp;</o:p></span></p>
        <p class="MsoNormal"><span
style="font-size:11.0pt;font-family:&quot;Calibri&quot;,&quot;sans-serif&quot;;color:#1F497D">&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;
            -- Mike<o:p></o:p></span></p>
        <p class="MsoNormal"><span
style="font-size:11.0pt;font-family:&quot;Calibri&quot;,&quot;sans-serif&quot;;color:#1F497D"><o:p>&nbsp;</o:p></span></p>
        <p class="MsoNormal"><span
style="font-size:11.0pt;font-family:&quot;Calibri&quot;,&quot;sans-serif&quot;;color:#1F497D">P.S.&nbsp;
            There&#8217;s a typo in the OAuth Registration spec section quoted
            below.&nbsp; The name &#8220;grant_type&#8221; should have been
            &#8220;grant_types&#8221;, since the value is a list.&nbsp; We should correct
            that in the next version of the spec.<o:p></o:p></span></p>
        <p class="MsoNormal"><span
style="font-size:11.0pt;font-family:&quot;Calibri&quot;,&quot;sans-serif&quot;;color:#1F497D"><o:p>&nbsp;</o:p></span></p>
        <div>
          <div style="border:none;border-top:solid #B5C4DF
            1.0pt;padding:3.0pt 0in 0in 0in">
            <p class="MsoNormal"><b><span
style="font-size:10.0pt;font-family:&quot;Tahoma&quot;,&quot;sans-serif&quot;;color:windowtext">From:</span></b><span
style="font-size:10.0pt;font-family:&quot;Tahoma&quot;,&quot;sans-serif&quot;;color:windowtext">
                <a class="moz-txt-link-abbreviated" href="mailto:oauth-bounces@ietf.org">oauth-bounces@ietf.org</a> [<a class="moz-txt-link-freetext" href="mailto:oauth-bounces@ietf.org">mailto:oauth-bounces@ietf.org</a>]
                <b>On Behalf Of </b>Justin Richer<br>
                <b>Sent:</b> Wednesday, February 27, 2013 8:00 AM<br>
                <b>To:</b> <a class="moz-txt-link-abbreviated" href="mailto:oauth@ietf.org">oauth@ietf.org</a><br>
                <b>Subject:</b> [OAUTH-WG] Registration: grant_types and
                response_types<o:p></o:p></span></p>
          </div>
        </div>
        <p class="MsoNormal"><o:p>&nbsp;</o:p></p>
        <p class="MsoNormal" style="margin-bottom:12.0pt">There has been
          some press lately about clients being able to use an implicit
          flow to get tokens when they really ought to only use a code
          flow, since the security considerations and protections for
          both are very different. With this in mind, it makes sense
          that a dynamically registered client should be limited to use
          only certain flows, if at all possible.
          <br>
          <br>
          The dynamic registration document currently handles this using
          the grant_type parameter (introduced in draft -03), which is
          defined in section 2 as follows:<o:p></o:p></p>
        <pre>&nbsp;&nbsp; grant_type<o:p></o:p></pre>
        <pre>&nbsp;&nbsp;&nbsp;&nbsp;&nbsp; OPTIONAL.&nbsp; Array of grant types that a client may use.&nbsp; These<o:p></o:p></pre>
        <pre>&nbsp;&nbsp;&nbsp;&nbsp;&nbsp; grant types are defined as follows:<o:p></o:p></pre>
        <pre><o:p>&nbsp;</o:p></pre>
        <pre>&nbsp;&nbsp;&nbsp;&nbsp;&nbsp; *&nbsp; "authorization_code": The Authorization Code Grant described in<o:p></o:p></pre>
        <pre>&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp; OAuth2 <a moz-do-not-send="true" href="http://tools.ietf.org/html/draft-ietf-oauth-dyn-reg-07#section-4.1">Section 4.1</a>.<o:p></o:p></pre>
        <pre><o:p>&nbsp;</o:p></pre>
        <pre>&nbsp;&nbsp;&nbsp;&nbsp;&nbsp; *&nbsp; "implicit": The Implicit Grant described in OAuth2 <a moz-do-not-send="true" href="http://tools.ietf.org/html/draft-ietf-oauth-dyn-reg-07#section-4.2">Section 4.2</a>.<o:p></o:p></pre>
        <pre><o:p>&nbsp;</o:p></pre>
        <pre>&nbsp;&nbsp;&nbsp;&nbsp;&nbsp; *&nbsp; "password": The Resource Owner Password Credentials Grant<o:p></o:p></pre>
        <pre>&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp; described in OAuth2 <a moz-do-not-send="true" href="http://tools.ietf.org/html/draft-ietf-oauth-dyn-reg-07#section-4.3">Section 4.3</a><o:p></o:p></pre>
        <pre><o:p>&nbsp;</o:p></pre>
        <pre>&nbsp;&nbsp;&nbsp;&nbsp;&nbsp; *&nbsp; "client_credentials": The Client Credentials Grant described in<o:p></o:p></pre>
        <pre>&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp; OAuth2 <a moz-do-not-send="true" href="http://tools.ietf.org/html/draft-ietf-oauth-dyn-reg-07#section-4.4">Section 4.4</a><o:p></o:p></pre>
        <pre><o:p>&nbsp;</o:p></pre>
        <pre>&nbsp;&nbsp;&nbsp;&nbsp;&nbsp; *&nbsp; "refresh_token": The Refresh Token Grant described in OAuth2<o:p></o:p></pre>
        <pre>&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp; <a moz-do-not-send="true" href="http://tools.ietf.org/html/draft-ietf-oauth-dyn-reg-07#section-6">Section 6</a>.<o:p></o:p></pre>
        <pre><o:p>&nbsp;</o:p></pre>
        <pre>&nbsp; &nbsp;&nbsp;&nbsp;&nbsp;Authorization Servers MAY allow for other values as defined in<o:p></o:p></pre>
        <pre>&nbsp;&nbsp;&nbsp;&nbsp;&nbsp; grant type extensions to OAuth2.&nbsp; The extension process is<o:p></o:p></pre>
        <pre>&nbsp;&nbsp;&nbsp;&nbsp;&nbsp; described in OAuth2 <a moz-do-not-send="true" href="http://tools.ietf.org/html/draft-ietf-oauth-dyn-reg-07#section-2.5">Section 2.5</a>, and the value of this parameter<o:p></o:p></pre>
        <pre>&nbsp;&nbsp;&nbsp;&nbsp;&nbsp; MUST be the same as the value of the "grant_type" parameter<o:p></o:p></pre>
        <pre>&nbsp;&nbsp;&nbsp;&nbsp;&nbsp; defined in the extension.<o:p></o:p></pre>
        <p class="MsoNormal" style="margin-bottom:12.0pt"><br>
          This allows the client to specify which flows it wants to be
          able to use (including any extensions), and allows the server
          to to tell the client in the client configuration response
          what flows it can expect to work.
          <br>
          <br>
          OpenID Connect's registration has recently introduced the use
          of a different parameter, response_type, for a similar but
          slightly different purpose. The parameter is defined in the
          latest draft in source control as:<o:p></o:p></p>
        <p class="MsoNormal"><tt><span style="font-size:10.0pt">response_types</span></tt><o:p></o:p></p>
        <p class="MsoNormal" style="margin-left:.5in"><tt><span
              style="font-size:10.0pt">OPTIONAL. JSON array containing a
              list of the OAuth 2.0 response_type
            </span></tt><o:p></o:p></p>
        <p class="MsoNormal" style="margin-left:.5in"><tt><span
              style="font-size:10.0pt">values that this Client uses. If
              omitted, the default is that the Client
            </span></tt><o:p></o:p></p>
        <p class="MsoNormal" style="margin-left:.5in"><tt><span
              style="font-size:10.0pt">uses only the code response type.
            </span></tt><o:p></o:p></p>
        <p><br>
          OIDC makes use of response_types beyond just "code" and
          "token", defining several new ones including combinations like
          "code idtoken".
          <o:p></o:p></p>
        <p class="MsoNormal">So my question to the group is this: Should
          we incorporate the OIDC response_types parameter? Do we need
          both parameters specified in the registration or is one
          sufficient? They're defined separately in the OAuth2 protocol
          (one is on the Auth endpoint and one is on the Token
          endpoint), but can only be used legally in particular
          combinations so there would have to be normative text around
          particular values.<br>
          <br>
          In my opinion, I don't think we can get rid of grant_type,
          since that's the only way to specify things like
          client_credentials flows and most extensions. There might be
          value in also specifying response_type, but I don't want to
          add extra fields unless there's a clearly defined need for it.<br>
          <br>
          &nbsp;-- Justin<o:p></o:p></p>
      </div>
    </blockquote>
    <br>
  </body>
</html>

--------------060300080802060605070906--

From ve7jtb@ve7jtb.com  Thu Feb 28 08:17:52 2013
Return-Path: <ve7jtb@ve7jtb.com>
X-Original-To: oauth@ietfa.amsl.com
Delivered-To: oauth@ietfa.amsl.com
Received: from localhost (localhost [127.0.0.1]) by ietfa.amsl.com (Postfix) with ESMTP id 8CAFC21F8A7B for <oauth@ietfa.amsl.com>; Thu, 28 Feb 2013 08:17:52 -0800 (PST)
X-Virus-Scanned: amavisd-new at amsl.com
X-Spam-Flag: NO
X-Spam-Score: -3.599
X-Spam-Level: 
X-Spam-Status: No, score=-3.599 tagged_above=-999 required=5 tests=[AWL=0.000,  BAYES_00=-2.599, RCVD_IN_DNSWL_LOW=-1]
Received: from mail.ietf.org ([64.170.98.30]) by localhost (ietfa.amsl.com [127.0.0.1]) (amavisd-new, port 10024) with ESMTP id BDAfvuFQupGF for <oauth@ietfa.amsl.com>; Thu, 28 Feb 2013 08:17:52 -0800 (PST)
Received: from mail-pb0-f48.google.com (mail-pb0-f48.google.com [209.85.160.48]) by ietfa.amsl.com (Postfix) with ESMTP id 065A821F8ABC for <oauth@ietf.org>; Thu, 28 Feb 2013 08:17:51 -0800 (PST)
Received: by mail-pb0-f48.google.com with SMTP id wy12so1149744pbc.21 for <oauth@ietf.org>; Thu, 28 Feb 2013 08:17:49 -0800 (PST)
X-Google-DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=google.com; s=20120113; h=x-received:content-type:mime-version:subject:from:in-reply-to:date :cc:message-id:references:to:x-mailer:x-gm-message-state; bh=KymjLGuOuzNFx6+PdevK03325chDIJKQG6qFPJNMaK4=; b=LjahNJFks0qVUKXqsDnys4uGAMtNQ+UUhTtfjU7frfRtEBCh0i8cA+SFmB3zQSEnI7 82AknQFqXqBB33ocpbInFZ1EPNIec7wqfVCN1u5phN9lfn8rPrHFkESkwOXX41tLF20R WA1TcrIkja29hFGWKtXC0dxlk8czVhiyBEyYP3pNH0mQgVdk/Zq2Tg3DiJHXcJlEeH6f zcw2LhQWvgcCrx82Q2WkDw/bcg/4PR5Bo5SBUDE+sgsIJ6DSKNqY/S5QYFLnTHFbxyEL l4FDr4nHqYUJemHIgNZqbkZyYKZVvyeciz8VTtYc2Kg3L1r37+c24xs73sDJg7VIOT9l No4g==
X-Received: by 10.66.147.137 with SMTP id tk9mr14070231pab.106.1362068269195;  Thu, 28 Feb 2013 08:17:49 -0800 (PST)
Received: from [192.168.41.99] (ip-64-134-220-138.public.wayport.net. [64.134.220.138]) by mx.google.com with ESMTPS id zv5sm7976062pab.2.2013.02.28.08.17.45 (version=TLSv1 cipher=ECDHE-RSA-RC4-SHA bits=128/128); Thu, 28 Feb 2013 08:17:47 -0800 (PST)
Content-Type: multipart/signed; boundary="Apple-Mail=_13F3981D-CB3C-4E89-BA41-1074262C1707"; protocol="application/pkcs7-signature"; micalg=sha1
Mime-Version: 1.0 (Mac OS X Mail 6.2 \(1499\))
From: John Bradley <ve7jtb@ve7jtb.com>
In-Reply-To: <0EC2404F-E3C5-4AD1-88B4-E74AA0394DD9@gmx.net>
Date: Thu, 28 Feb 2013 08:17:44 -0800
Message-Id: <C75E4871-E907-4EF7-BAF0-9D1A172D581B@ve7jtb.com>
References: <0EC2404F-E3C5-4AD1-88B4-E74AA0394DD9@gmx.net>
To: Hannes Tschofenig <hannes.tschofenig@gmx.net>
X-Mailer: Apple Mail (2.1499)
X-Gm-Message-State: ALoCoQnUO6rLjT3DZNonKtNrPo78a33rmfiEHAwERoiFKOEDGOGWggi0pZ8B53i+leZeDupkbVAz
Cc: "oauth@ietf.org WG" <oauth@ietf.org>
Subject: Re: [OAUTH-WG] JWT - scope claim missing
X-BeenThere: oauth@ietf.org
X-Mailman-Version: 2.1.12
Precedence: list
List-Id: OAUTH WG <oauth.ietf.org>
List-Unsubscribe: <https://www.ietf.org/mailman/options/oauth>, <mailto:oauth-request@ietf.org?subject=unsubscribe>
List-Archive: <http://www.ietf.org/mail-archive/web/oauth>
List-Post: <mailto:oauth@ietf.org>
List-Help: <mailto:oauth-request@ietf.org?subject=help>
List-Subscribe: <https://www.ietf.org/mailman/listinfo/oauth>, <mailto:oauth-request@ietf.org?subject=subscribe>
X-List-Received-Date: Thu, 28 Feb 2013 16:17:52 -0000

--Apple-Mail=_13F3981D-CB3C-4E89-BA41-1074262C1707
Content-Transfer-Encoding: quoted-printable
Content-Type: text/plain;
	charset=us-ascii

While scope is one method that a AS could communicate authorization to a =
RS, it is not the only or perhaps even the most likely one.
Using scope requires a relatively tight binding between the RS and AS,  =
UMA uses a different mechanism that describes finer grained operations. =20=

The AS may include roles, user, or other more abstract claims that the =
the client may (god help them) pass on to EXCML for processing.

While having a scopes claim is possible, like any other claim it is not =
part of the JWT core security processing claims, and needs to be defined =
by extension.

John B.
On 2013-02-28, at 2:29 AM, Hannes Tschofenig <hannes.tschofenig@gmx.net> =
wrote:

> Hi Mike,=20
>=20
> when I worked on the MAC specification I noticed that the JWT does not =
have a claim for the scope. I believe that this would be needed to allow =
the resource server to verify whether the scope the authorization server =
authorized is indeed what the client is asking for.=20
>=20
> Ciao
> Hannes
>=20
> _______________________________________________
> OAuth mailing list
> OAuth@ietf.org
> https://www.ietf.org/mailman/listinfo/oauth


--Apple-Mail=_13F3981D-CB3C-4E89-BA41-1074262C1707
Content-Disposition: attachment;
	filename=smime.p7s
Content-Type: application/pkcs7-signature;
	name=smime.p7s
Content-Transfer-Encoding: base64
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--Apple-Mail=_13F3981D-CB3C-4E89-BA41-1074262C1707--

From phil.hunt@oracle.com  Thu Feb 28 08:24:49 2013
Return-Path: <phil.hunt@oracle.com>
X-Original-To: oauth@ietfa.amsl.com
Delivered-To: oauth@ietfa.amsl.com
Received: from localhost (localhost [127.0.0.1]) by ietfa.amsl.com (Postfix) with ESMTP id 5194F21F85F5 for <oauth@ietfa.amsl.com>; Thu, 28 Feb 2013 08:24:49 -0800 (PST)
X-Virus-Scanned: amavisd-new at amsl.com
X-Spam-Flag: NO
X-Spam-Score: -5.538
X-Spam-Level: 
X-Spam-Status: No, score=-5.538 tagged_above=-999 required=5 tests=[AWL=-0.335, BAYES_00=-2.599, MIME_QP_LONG_LINE=1.396, RCVD_IN_DNSWL_MED=-4]
Received: from mail.ietf.org ([64.170.98.30]) by localhost (ietfa.amsl.com [127.0.0.1]) (amavisd-new, port 10024) with ESMTP id MpKWwISNJ83m for <oauth@ietfa.amsl.com>; Thu, 28 Feb 2013 08:24:48 -0800 (PST)
Received: from userp1040.oracle.com (userp1040.oracle.com [156.151.31.81]) by ietfa.amsl.com (Postfix) with ESMTP id 82ADC21F854F for <oauth@ietf.org>; Thu, 28 Feb 2013 08:24:46 -0800 (PST)
Received: from acsinet21.oracle.com (acsinet21.oracle.com [141.146.126.237]) by userp1040.oracle.com (Sentrion-MTA-4.3.1/Sentrion-MTA-4.3.1) with ESMTP id r1SGOcot020620 (version=TLSv1/SSLv3 cipher=DHE-RSA-AES256-SHA bits=256 verify=OK); Thu, 28 Feb 2013 16:24:39 GMT
Received: from acsmt356.oracle.com (acsmt356.oracle.com [141.146.40.156]) by acsinet21.oracle.com (8.14.4+Sun/8.14.4) with ESMTP id r1SGObg3018557 (version=TLSv1/SSLv3 cipher=DHE-RSA-AES256-SHA bits=256 verify=NO); Thu, 28 Feb 2013 16:24:38 GMT
Received: from abhmt112.oracle.com (abhmt112.oracle.com [141.146.116.64]) by acsmt356.oracle.com (8.12.11.20060308/8.12.11) with ESMTP id r1SGOZSE018410; Thu, 28 Feb 2013 10:24:37 -0600
Received: from [192.168.1.125] (/174.7.250.104) by default (Oracle Beehive Gateway v4.0) with ESMTP ; Thu, 28 Feb 2013 08:24:35 -0800
References: <0EC2404F-E3C5-4AD1-88B4-E74AA0394DD9@gmx.net> <C75E4871-E907-4EF7-BAF0-9D1A172D581B@ve7jtb.com>
Mime-Version: 1.0 (1.0)
In-Reply-To: <C75E4871-E907-4EF7-BAF0-9D1A172D581B@ve7jtb.com>
Content-Type: text/plain; charset=us-ascii
Content-Transfer-Encoding: quoted-printable
Message-Id: <CA6A6425-D0CE-469F-B51E-9F296DA8041C@oracle.com>
X-Mailer: iPhone Mail (10B146)
From: Phil Hunt <phil.hunt@oracle.com>
Date: Thu, 28 Feb 2013 08:24:32 -0800
To: John Bradley <ve7jtb@ve7jtb.com>
X-Source-IP: acsinet21.oracle.com [141.146.126.237]
Cc: "oauth@ietf.org WG" <oauth@ietf.org>
Subject: Re: [OAUTH-WG] JWT - scope claim missing
X-BeenThere: oauth@ietf.org
X-Mailman-Version: 2.1.12
Precedence: list
List-Id: OAUTH WG <oauth.ietf.org>
List-Unsubscribe: <https://www.ietf.org/mailman/options/oauth>, <mailto:oauth-request@ietf.org?subject=unsubscribe>
List-Archive: <http://www.ietf.org/mail-archive/web/oauth>
List-Post: <mailto:oauth@ietf.org>
List-Help: <mailto:oauth-request@ietf.org?subject=help>
List-Subscribe: <https://www.ietf.org/mailman/listinfo/oauth>, <mailto:oauth-request@ietf.org?subject=subscribe>
X-List-Received-Date: Thu, 28 Feb 2013 16:24:50 -0000

Are you advocating TWO systems? That seems like a bad choice.=20

I would rather fix scope than go to a two system approach.

Phil

Sent from my phone.

On 2013-02-28, at 8:17, John Bradley <ve7jtb@ve7jtb.com> wrote:

> While scope is one method that a AS could communicate authorization to a R=
S, it is not the only or perhaps even the most likely one.
> Using scope requires a relatively tight binding between the RS and AS,  UM=
A uses a different mechanism that describes finer grained operations. =20
> The AS may include roles, user, or other more abstract claims that the the=
 client may (god help them) pass on to EXCML for processing.
>=20
> While having a scopes claim is possible, like any other claim it is not pa=
rt of the JWT core security processing claims, and needs to be defined by ex=
tension.
>=20
> John B.
> On 2013-02-28, at 2:29 AM, Hannes Tschofenig <hannes.tschofenig@gmx.net> w=
rote:
>=20
>> Hi Mike,=20
>>=20
>> when I worked on the MAC specification I noticed that the JWT does not ha=
ve a claim for the scope. I believe that this would be needed to allow the r=
esource server to verify whether the scope the authorization server authoriz=
ed is indeed what the client is asking for.=20
>>=20
>> Ciao
>> Hannes
>>=20
>> _______________________________________________
>> OAuth mailing list
>> OAuth@ietf.org
>> https://www.ietf.org/mailman/listinfo/oauth
>=20
> _______________________________________________
> OAuth mailing list
> OAuth@ietf.org
> https://www.ietf.org/mailman/listinfo/oauth

From phil.hunt@oracle.com  Thu Feb 28 08:29:45 2013
Return-Path: <phil.hunt@oracle.com>
X-Original-To: oauth@ietfa.amsl.com
Delivered-To: oauth@ietfa.amsl.com
Received: from localhost (localhost [127.0.0.1]) by ietfa.amsl.com (Postfix) with ESMTP id DADCD21F8C0C for <oauth@ietfa.amsl.com>; Thu, 28 Feb 2013 08:29:45 -0800 (PST)
X-Virus-Scanned: amavisd-new at amsl.com
X-Spam-Flag: NO
X-Spam-Score: -5.517
X-Spam-Level: 
X-Spam-Status: No, score=-5.517 tagged_above=-999 required=5 tests=[AWL=-0.314, BAYES_00=-2.599, MIME_QP_LONG_LINE=1.396, RCVD_IN_DNSWL_MED=-4]
Received: from mail.ietf.org ([64.170.98.30]) by localhost (ietfa.amsl.com [127.0.0.1]) (amavisd-new, port 10024) with ESMTP id fanGIlsBD5cd for <oauth@ietfa.amsl.com>; Thu, 28 Feb 2013 08:29:44 -0800 (PST)
Received: from aserp1040.oracle.com (aserp1040.oracle.com [141.146.126.69]) by ietfa.amsl.com (Postfix) with ESMTP id 900EA21F8C09 for <oauth@ietf.org>; Thu, 28 Feb 2013 08:29:43 -0800 (PST)
Received: from ucsinet22.oracle.com (ucsinet22.oracle.com [156.151.31.94]) by aserp1040.oracle.com (Sentrion-MTA-4.3.1/Sentrion-MTA-4.3.1) with ESMTP id r1SGTbYU006116 (version=TLSv1/SSLv3 cipher=DHE-RSA-AES256-SHA bits=256 verify=OK); Thu, 28 Feb 2013 16:29:38 GMT
Received: from acsmt358.oracle.com (acsmt358.oracle.com [141.146.40.158]) by ucsinet22.oracle.com (8.14.4+Sun/8.14.4) with ESMTP id r1SGTaqY012856 (version=TLSv1/SSLv3 cipher=DHE-RSA-AES256-SHA bits=256 verify=NO); Thu, 28 Feb 2013 16:29:36 GMT
Received: from abhmt102.oracle.com (abhmt102.oracle.com [141.146.116.54]) by acsmt358.oracle.com (8.12.11.20060308/8.12.11) with ESMTP id r1SGTaQn004001; Thu, 28 Feb 2013 10:29:36 -0600
Received: from [192.168.1.125] (/174.7.250.104) by default (Oracle Beehive Gateway v4.0) with ESMTP ; Thu, 28 Feb 2013 08:29:36 -0800
References: <0EC2404F-E3C5-4AD1-88B4-E74AA0394DD9@gmx.net> <C75E4871-E907-4EF7-BAF0-9D1A172D581B@ve7jtb.com>
Mime-Version: 1.0 (1.0)
In-Reply-To: <C75E4871-E907-4EF7-BAF0-9D1A172D581B@ve7jtb.com>
Content-Type: text/plain; charset=us-ascii
Content-Transfer-Encoding: quoted-printable
Message-Id: <117150EA-E7D6-47EF-A8DB-BF07962B6E11@oracle.com>
X-Mailer: iPhone Mail (10B146)
From: Phil Hunt <phil.hunt@oracle.com>
Date: Thu, 28 Feb 2013 08:29:34 -0800
To: John Bradley <ve7jtb@ve7jtb.com>
X-Source-IP: ucsinet22.oracle.com [156.151.31.94]
Cc: "oauth@ietf.org WG" <oauth@ietf.org>
Subject: Re: [OAUTH-WG] JWT - scope claim missing
X-BeenThere: oauth@ietf.org
X-Mailman-Version: 2.1.12
Precedence: list
List-Id: OAUTH WG <oauth.ietf.org>
List-Unsubscribe: <https://www.ietf.org/mailman/options/oauth>, <mailto:oauth-request@ietf.org?subject=unsubscribe>
List-Archive: <http://www.ietf.org/mail-archive/web/oauth>
List-Post: <mailto:oauth@ietf.org>
List-Help: <mailto:oauth-request@ietf.org?subject=help>
List-Subscribe: <https://www.ietf.org/mailman/listinfo/oauth>, <mailto:oauth-request@ietf.org?subject=subscribe>
X-List-Received-Date: Thu, 28 Feb 2013 16:29:46 -0000

Personally I am starting to feel strongly that access tokens should be highl=
y contextual and therefore tightly bound to specific resources.=20

It seems to me trust will get incredibly complex if we start federating acce=
ss tokens. My belief is that uma needs to still chain to local authorization=
 servers and should never expect a federated token to be accepted directly.=20=


I hope to blog on this in more detail. But i wanted to express concerns abou=
t trust with federated authorization vs federated authn.=20

Scope is just the tip of the iceberg.=20

Phil

Sent from my phone.

On 2013-02-28, at 8:17, John Bradley <ve7jtb@ve7jtb.com> wrote:

> While scope is one method that a AS could communicate authorization to a R=
S, it is not the only or perhaps even the most likely one.
> Using scope requires a relatively tight binding between the RS and AS,  UM=
A uses a different mechanism that describes finer grained operations. =20
> The AS may include roles, user, or other more abstract claims that the the=
 client may (god help them) pass on to EXCML for processing.
>=20
> While having a scopes claim is possible, like any other claim it is not pa=
rt of the JWT core security processing claims, and needs to be defined by ex=
tension.
>=20
> John B.
> On 2013-02-28, at 2:29 AM, Hannes Tschofenig <hannes.tschofenig@gmx.net> w=
rote:
>=20
>> Hi Mike,=20
>>=20
>> when I worked on the MAC specification I noticed that the JWT does not ha=
ve a claim for the scope. I believe that this would be needed to allow the r=
esource server to verify whether the scope the authorization server authoriz=
ed is indeed what the client is asking for.=20
>>=20
>> Ciao
>> Hannes
>>=20
>> _______________________________________________
>> OAuth mailing list
>> OAuth@ietf.org
>> https://www.ietf.org/mailman/listinfo/oauth
>=20
> _______________________________________________
> OAuth mailing list
> OAuth@ietf.org
> https://www.ietf.org/mailman/listinfo/oauth

From bcampbell@pingidentity.com  Thu Feb 28 08:45:11 2013
Return-Path: <bcampbell@pingidentity.com>
X-Original-To: oauth@ietfa.amsl.com
Delivered-To: oauth@ietfa.amsl.com
Received: from localhost (localhost [127.0.0.1]) by ietfa.amsl.com (Postfix) with ESMTP id D42F821F8996 for <oauth@ietfa.amsl.com>; Thu, 28 Feb 2013 08:45:10 -0800 (PST)
X-Virus-Scanned: amavisd-new at amsl.com
X-Spam-Flag: NO
X-Spam-Score: -5.903
X-Spam-Level: 
X-Spam-Status: No, score=-5.903 tagged_above=-999 required=5 tests=[AWL=0.073,  BAYES_00=-2.599, FM_FORGED_GMAIL=0.622, HTML_MESSAGE=0.001, RCVD_IN_DNSWL_MED=-4]
Received: from mail.ietf.org ([64.170.98.30]) by localhost (ietfa.amsl.com [127.0.0.1]) (amavisd-new, port 10024) with ESMTP id l3gBswWXDB8C for <oauth@ietfa.amsl.com>; Thu, 28 Feb 2013 08:45:02 -0800 (PST)
Received: from na3sys009aog133.obsmtp.com (na3sys009aog133.obsmtp.com [74.125.149.82]) by ietfa.amsl.com (Postfix) with ESMTP id C84F521F886A for <oauth@ietf.org>; Thu, 28 Feb 2013 08:44:52 -0800 (PST)
Received: from mail-ie0-f199.google.com ([209.85.223.199]) (using TLSv1) by na3sys009aob133.postini.com ([74.125.148.12]) with SMTP ID DSNKUS+JhEy4pqJq3WkgpyFR4Vj8VqO540Se@postini.com; Thu, 28 Feb 2013 08:44:52 PST
Received: by mail-ie0-f199.google.com with SMTP id c13so12605736ieb.2 for <oauth@ietf.org>; Thu, 28 Feb 2013 08:44:51 -0800 (PST)
X-Google-DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=google.com; s=20120113; h=x-received:x-received:mime-version:in-reply-to:references:from:date :message-id:subject:to:cc:content-type:x-gm-message-state; bh=w4xU3WDta08Wu7itTzvqp+4weI7hczo1UQ5ra0S0zas=; b=euEB6rtFqhbh0sYCwXc6tXu82ElmOlM8WbwZxOV9N9wCnn/bp2m4P6DzUoeX059GQB RC3PE9YRSHDd5iUabLHakWrBx8EbK0JIgPPFQTOHFUKzXUoMbhyNLfqgWCw1lygIeMdD m5vwr9jknlVhpy6HIG1CK1u2GgwCJ258y8HAHz8hdngH0M888jLprlvuhkQREHqVPqU+ WNIQPfq3isVL17x8YBv5z1Db4JlCwKJvuTe9AFgrKmE59yuXPiEkOnR28N9ualGkNOpy TKZj+yLDZiukeztUFwjHwAshFwnTb/tb1mIugD4+gdtzr+0fHUjlhAlMPtBLihwHEuhb tyIA==
X-Received: by 10.42.30.132 with SMTP id v4mr3687424icc.34.1362069891576; Thu, 28 Feb 2013 08:44:51 -0800 (PST)
X-Received: by 10.42.30.132 with SMTP id v4mr3687415icc.34.1362069891435; Thu, 28 Feb 2013 08:44:51 -0800 (PST)
MIME-Version: 1.0
Received: by 10.64.32.106 with HTTP; Thu, 28 Feb 2013 08:44:21 -0800 (PST)
In-Reply-To: <CA6A6425-D0CE-469F-B51E-9F296DA8041C@oracle.com>
References: <0EC2404F-E3C5-4AD1-88B4-E74AA0394DD9@gmx.net> <C75E4871-E907-4EF7-BAF0-9D1A172D581B@ve7jtb.com> <CA6A6425-D0CE-469F-B51E-9F296DA8041C@oracle.com>
From: Brian Campbell <bcampbell@pingidentity.com>
Date: Thu, 28 Feb 2013 09:44:21 -0700
Message-ID: <CA+k3eCREgN+6z+U=jjJcPo0nZVR0GWn5zXeecZRO+rg=xd-gZg@mail.gmail.com>
To: Phil Hunt <phil.hunt@oracle.com>
Content-Type: multipart/alternative; boundary=20cf301d420e09fbbf04d6cb9c9d
X-Gm-Message-State: ALoCoQk3QYqSBmpM4AUGCTLWPGyzvSo84tkW4wWNjMv1/V9h+ZY5KYtSqww5Sk0YYxKuSgt1soOtdd5ZOiIIs6zWSpMrfxqFHXc0Agl0lX6gnzIzJKvMslgtigApTk2XUkxt+5bdCMDC
Cc: "oauth@ietf.org WG" <oauth@ietf.org>
Subject: Re: [OAUTH-WG] JWT - scope claim missing
X-BeenThere: oauth@ietf.org
X-Mailman-Version: 2.1.12
Precedence: list
List-Id: OAUTH WG <oauth.ietf.org>
List-Unsubscribe: <https://www.ietf.org/mailman/options/oauth>, <mailto:oauth-request@ietf.org?subject=unsubscribe>
List-Archive: <http://www.ietf.org/mail-archive/web/oauth>
List-Post: <mailto:oauth@ietf.org>
List-Help: <mailto:oauth-request@ietf.org?subject=help>
List-Subscribe: <https://www.ietf.org/mailman/listinfo/oauth>, <mailto:oauth-request@ietf.org?subject=subscribe>
X-List-Received-Date: Thu, 28 Feb 2013 16:45:11 -0000

--20cf301d420e09fbbf04d6cb9c9d
Content-Type: text/plain; charset=ISO-8859-1

I think John's point was more that scope is something rather specific to an
OAuth access token and, while JWT is can be used to represent an access
token, it's not the only application of JWT. The 'standard' claims in JWT
are those that are believed (right or wrong) to be widely applicable across
different applications of JWT. One could argue about it but scope is
probably not one of those.

It would probably make sense to try and build a profile of JWT specifically
for OAuth access tokens (though I suspect there are some turtles and
dragons in there), which might be the appropriate place to define/register
a scope claim.


On Thu, Feb 28, 2013 at 9:24 AM, Phil Hunt <phil.hunt@oracle.com> wrote:

> Are you advocating TWO systems? That seems like a bad choice.
>
> I would rather fix scope than go to a two system approach.
>
> Phil
>
> Sent from my phone.
>
> On 2013-02-28, at 8:17, John Bradley <ve7jtb@ve7jtb.com> wrote:
>
> > While scope is one method that a AS could communicate authorization to a
> RS, it is not the only or perhaps even the most likely one.
> > Using scope requires a relatively tight binding between the RS and AS,
>  UMA uses a different mechanism that describes finer grained operations.
> > The AS may include roles, user, or other more abstract claims that the
> the client may (god help them) pass on to EXCML for processing.
> >
> > While having a scopes claim is possible, like any other claim it is not
> part of the JWT core security processing claims, and needs to be defined by
> extension.
> >
> > John B.
> > On 2013-02-28, at 2:29 AM, Hannes Tschofenig <hannes.tschofenig@gmx.net>
> wrote:
> >
> >> Hi Mike,
> >>
> >> when I worked on the MAC specification I noticed that the JWT does not
> have a claim for the scope. I believe that this would be needed to allow
> the resource server to verify whether the scope the authorization server
> authorized is indeed what the client is asking for.
> >>
> >> Ciao
> >> Hannes
> >>
> >> _______________________________________________
> >> OAuth mailing list
> >> OAuth@ietf.org
> >> https://www.ietf.org/mailman/listinfo/oauth
> >
> > _______________________________________________
> > OAuth mailing list
> > OAuth@ietf.org
> > https://www.ietf.org/mailman/listinfo/oauth
> _______________________________________________
> OAuth mailing list
> OAuth@ietf.org
> https://www.ietf.org/mailman/listinfo/oauth
>

--20cf301d420e09fbbf04d6cb9c9d
Content-Type: text/html; charset=ISO-8859-1
Content-Transfer-Encoding: quoted-printable

<div dir=3D"ltr"><div>I think John&#39;s point was more that scope is somet=
hing rather specific to an OAuth access token and, while JWT is can be used=
 to represent an access token, it&#39;s not the only application of JWT. Th=
e &#39;standard&#39; claims in JWT are those that are believed (right or wr=
ong) to be widely applicable across different applications of JWT. One coul=
d argue about it but scope is probably not one of those.<br>

<br></div>It would probably make sense to try and build a profile of JWT sp=
ecifically for OAuth access tokens (though I suspect there are some turtles=
 and dragons in there), which might be the appropriate place to define/regi=
ster a scope claim.<br>


</div><div class=3D"gmail_extra"><br><br><div class=3D"gmail_quote">On Thu,=
 Feb 28, 2013 at 9:24 AM, Phil Hunt <span dir=3D"ltr">&lt;<a href=3D"mailto=
:phil.hunt@oracle.com" target=3D"_blank">phil.hunt@oracle.com</a>&gt;</span=
> wrote:<br>

<blockquote class=3D"gmail_quote" style=3D"margin:0 0 0 .8ex;border-left:1p=
x #ccc solid;padding-left:1ex">Are you advocating TWO systems? That seems l=
ike a bad choice.<br>
<br>
I would rather fix scope than go to a two system approach.<br>
<br>
Phil<br>
<br>
Sent from my phone.<br>
<br>
On 2013-02-28, at 8:17, John Bradley &lt;<a href=3D"mailto:ve7jtb@ve7jtb.co=
m">ve7jtb@ve7jtb.com</a>&gt; wrote:<br>
<br>
&gt; While scope is one method that a AS could communicate authorization to=
 a RS, it is not the only or perhaps even the most likely one.<br>
&gt; Using scope requires a relatively tight binding between the RS and AS,=
 =A0UMA uses a different mechanism that describes finer grained operations.=
<br>
&gt; The AS may include roles, user, or other more abstract claims that the=
 the client may (god help them) pass on to EXCML for processing.<br>
&gt;<br>
&gt; While having a scopes claim is possible, like any other claim it is no=
t part of the JWT core security processing claims, and needs to be defined =
by extension.<br>
&gt;<br>
&gt; John B.<br>
&gt; On 2013-02-28, at 2:29 AM, Hannes Tschofenig &lt;<a href=3D"mailto:han=
nes.tschofenig@gmx.net">hannes.tschofenig@gmx.net</a>&gt; wrote:<br>
&gt;<br>
&gt;&gt; Hi Mike,<br>
&gt;&gt;<br>
&gt;&gt; when I worked on the MAC specification I noticed that the JWT does=
 not have a claim for the scope. I believe that this would be needed to all=
ow the resource server to verify whether the scope the authorization server=
 authorized is indeed what the client is asking for.<br>


&gt;&gt;<br>
&gt;&gt; Ciao<br>
&gt;&gt; Hannes<br>
&gt;&gt;<br>
&gt;&gt; _______________________________________________<br>
&gt;&gt; OAuth mailing list<br>
&gt;&gt; <a href=3D"mailto:OAuth@ietf.org">OAuth@ietf.org</a><br>
&gt;&gt; <a href=3D"https://www.ietf.org/mailman/listinfo/oauth" target=3D"=
_blank">https://www.ietf.org/mailman/listinfo/oauth</a><br>
&gt;<br>
&gt; _______________________________________________<br>
&gt; OAuth mailing list<br>
&gt; <a href=3D"mailto:OAuth@ietf.org">OAuth@ietf.org</a><br>
&gt; <a href=3D"https://www.ietf.org/mailman/listinfo/oauth" target=3D"_bla=
nk">https://www.ietf.org/mailman/listinfo/oauth</a><br>
_______________________________________________<br>
OAuth mailing list<br>
<a href=3D"mailto:OAuth@ietf.org">OAuth@ietf.org</a><br>
<a href=3D"https://www.ietf.org/mailman/listinfo/oauth" target=3D"_blank">h=
ttps://www.ietf.org/mailman/listinfo/oauth</a><br>
</blockquote></div><br></div>

--20cf301d420e09fbbf04d6cb9c9d--

From sberyozkin@gmail.com  Thu Feb 28 08:52:39 2013
Return-Path: <sberyozkin@gmail.com>
X-Original-To: oauth@ietfa.amsl.com
Delivered-To: oauth@ietfa.amsl.com
Received: from localhost (localhost [127.0.0.1]) by ietfa.amsl.com (Postfix) with ESMTP id A26B521F8C12 for <oauth@ietfa.amsl.com>; Thu, 28 Feb 2013 08:52:39 -0800 (PST)
X-Virus-Scanned: amavisd-new at amsl.com
X-Spam-Flag: NO
X-Spam-Score: -3.499
X-Spam-Level: 
X-Spam-Status: No, score=-3.499 tagged_above=-999 required=5 tests=[AWL=-1.100, BAYES_00=-2.599, J_CHICKENPOX_33=0.6, J_CHICKENPOX_63=0.6, RCVD_IN_DNSWL_LOW=-1]
Received: from mail.ietf.org ([64.170.98.30]) by localhost (ietfa.amsl.com [127.0.0.1]) (amavisd-new, port 10024) with ESMTP id OUE8RO6p4n3Y for <oauth@ietfa.amsl.com>; Thu, 28 Feb 2013 08:52:38 -0800 (PST)
Received: from mail-ee0-f50.google.com (mail-ee0-f50.google.com [74.125.83.50]) by ietfa.amsl.com (Postfix) with ESMTP id BF67B21F8C1E for <oauth@ietf.org>; Thu, 28 Feb 2013 08:52:37 -0800 (PST)
Received: by mail-ee0-f50.google.com with SMTP id e51so1710852eek.23 for <oauth@ietf.org>; Thu, 28 Feb 2013 08:52:32 -0800 (PST)
DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=gmail.com; s=20120113; h=x-received:message-id:date:from:user-agent:mime-version:to:cc :subject:references:in-reply-to:content-type :content-transfer-encoding; bh=UaGQ2ctUg1Esx+a2I3agQMwa1DVO8/sDAFBR7HQxc7s=; b=EwmsTNqdPzEhNa2Zt1pe99OPDj1CAQ0TPqSBpghc7tWW7M8hGEHgmXjQ890vzqDH8W 2OITYb9l0Yqq1W3ZR5xA9lOXbtA7VhM3HlyrcFrSo7Uuzahfi2VsvRH3WX382UXEo5by wp863ZdAVcBnPG/I843EWzdJePELhHcsf3WgNidp0pGv6YF+cE/mFQDMj/my5lWbn/Ea 0vKbu/w2c2tJDF+RFZRHcLxb3kExUFrAwudizdP/HTWdfAqJEF64+I4MKrTxJNzEq99N PhjsQ23kPcyAABUSkT4f1AV3LHypPSRZOjTSEpY7iHZa53ne83TBMHxK4xsEJXdg+r9X zBWw==
X-Received: by 10.14.200.137 with SMTP id z9mr18455256een.20.1362070352155; Thu, 28 Feb 2013 08:52:32 -0800 (PST)
Received: from [192.168.2.5] ([79.97.76.201]) by mx.google.com with ESMTPS id r4sm12747826eeo.12.2013.02.28.08.52.30 (version=TLSv1 cipher=ECDHE-RSA-RC4-SHA bits=128/128); Thu, 28 Feb 2013 08:52:31 -0800 (PST)
Message-ID: <512F8B4D.60102@gmail.com>
Date: Thu, 28 Feb 2013 16:52:29 +0000
From: Sergey Beryozkin <sberyozkin@gmail.com>
User-Agent: Mozilla/5.0 (X11; Linux x86_64; rv:12.0) Gecko/20120430 Thunderbird/12.0.1
MIME-Version: 1.0
To: Hannes Tschofenig <hannes.tschofenig@gmx.net>
References: <AECF561A-BD17-4FF0-B60A-FB8594159EA9@gmx.net> <512CAC45.9070501@gmail.com> <512CAF54.1060204@gmail.com> <1EE69E99-6051-4078-8CDE-63558075FE16@gmx.net>
In-Reply-To: <1EE69E99-6051-4078-8CDE-63558075FE16@gmx.net>
Content-Type: text/plain; charset=ISO-8859-1; format=flowed
Content-Transfer-Encoding: 7bit
Cc: oauth@ietf.org
Subject: Re: [OAUTH-WG] draft-ietf-oauth-v2-http-mac and draft-tschofenig-oauth-hotk re-submitted
X-BeenThere: oauth@ietf.org
X-Mailman-Version: 2.1.12
Precedence: list
List-Id: OAUTH WG <oauth.ietf.org>
List-Unsubscribe: <https://www.ietf.org/mailman/options/oauth>, <mailto:oauth-request@ietf.org?subject=unsubscribe>
List-Archive: <http://www.ietf.org/mail-archive/web/oauth>
List-Post: <mailto:oauth@ietf.org>
List-Help: <mailto:oauth-request@ietf.org?subject=help>
List-Subscribe: <https://www.ietf.org/mailman/listinfo/oauth>, <mailto:oauth-request@ietf.org?subject=subscribe>
X-List-Received-Date: Thu, 28 Feb 2013 16:52:39 -0000

Hi Hannes


On 27/02/13 08:54, Hannes Tschofenig wrote:
> Hi Sergey,
>
> good that this issue got clarified.
>
> Regarding:
>
>> By the way, should the server be able to enforce the use of MAC as opposed to having a client preferring it with its audience info ? If the client does not understand it then it does not have the capabilities to work with this specific server.
>
> Currently, the authorization server decides about the use of a certain token type. The audience field is used to allow the client to tell the server which resource  server it wants to talk to. This is of value not only for this specification but also for the bearer token specification. In this specification the resource server uses this audience field for selecting the appropriate key to encrypt the access token. If the client is tricked in sending the access token to a different resource server then that server will not be able to decrypt the access token and will not be able to retrieve the session key. Consequently, it will not be able to impersonate the client towards another resource server.
Thanks for the explanation, I should've read better, 'audience' is a 
useful attribute.

What confused me was this text: "Authorization servers issue MAC Tokens 
based on requests from clients." - it kind of reads to me that the 
clients drive whether it is MAC or some other token type is issued in 
exchange for a grant while I'd expect the AS administrators deciding on 
what sort of token type is used.

As for "MUST" and audience - might it make sense to replace it with 
SHOULD or RECOMMENDED ? I wonder if some issues like port number of 
individual resource servers comprising the bigger resource server 
application, etc, might make it difficult to use 'audience' - not sure 
if it of real concern or not :-)

Thanks, Sergey

>
> Ciao
> Hannes
>
> On Feb 26, 2013, at 2:49 PM, Sergey Beryozkin wrote:
>
>> Hi Again
>> On 26/02/13 12:36, Sergey Beryozkin wrote:
>>> Hi Hannes
>>> On 25/02/13 12:46, Hannes Tschofenig wrote:
>>>> Hi all,
>>>>
>>>> I just submitted an updated version of the
>>>> draft-ietf-oauth-v2-http-mac-03.txt.
>>>>
>>>
>>> It definitely has more interesting content (about architecture, session
>>> keys, etc) - this is really useful IMHO.
>>>
>>> What I'm not really understanding is why a 2-way TLS transport for the
>>> session key is not even considered.
>>> Instead this uber-complex (in the context of this spec, IMHO) JWT thing
>>> is there once again. I appreciate why it may be the case, primarily to
>>> do with reusing the work done around JWT and having some
>>> common/recommended access token representation, but disallowing a basic
>>> bearer token be 'enhanced' with MAC over two-way TLS seems like not
>>> ideal at all IMHO.
>>> To be honest, I'm not sure why would anyone use JWT+MAC instead of just
>>> JWE, in cases when people are really comfortable with doing JWT. I guess
>>> we may be talking now about better security characteristics, but this
>>> will help a very limited audience as compared to a wider one which can
>>> use Bearer+MAC over 2-way TLS, straightforward, very cheap effort to get
>>> started.
>>>
>> Oops, I've misread, I think I did, I was reading a Session Key Transport to Resource Server section [1] where using JWT seems just OK, while a transport to the client section [2] does not enforce the use of JWT.
>>
>> Sorry for a noise :-)
>>
>> By the way, should the server be able to enforce the use of MAC as opposed to having a client preferring it with its audience info ? If the client does not understand it then it does not have the capabilities to work with this specific server.
>>
>> Thanks, Sergey
>>
>> [1] http://tools.ietf.org/html/draft-ietf-oauth-v2-http-mac-03#section-4.2
>> [2] http://tools.ietf.org/html/draft-ietf-oauth-v2-http-mac-03#section-4.1
>>
>>> just my 2c
>>> Thanks, Sergey
>>>
>>>> I would like to point out that this is **discussion input** -- not
>>>> agreed content. Anything in the document is subject to change!
>>>> You also may notice that there are a few questions in the writeup.
>>>>
>>>> I was trying to more specific about some of the design aspects that
>>>> folks had proposed during the last few months.
>>>> I have also re-submitted the draft-tschofenig-oauth-hotk, which
>>>> includes a TLS and a JSON-based solution approach.
>>>>
>>>> In general, the open questions still seem to be related to
>>>> * Key distribution: What should be described in a document? What is
>>>> mandatory to implement?
>>>> * Selective header field protection: This is something that was
>>>> brought forward in discussions and I have included a proposal of how
>>>> this could look like.
>>>> * Channel Binding: Functionality is also included to deal with
>>>> man-in-the-middle attacks against TLS. There are, however, two types
>>>> of channel bindings defined in RFC 5929. Are both needed? If not,
>>>> which one should be selected?
>>>> * Integrity protection and data origin authentication in both
>>>> directions: The current writeup allows the protection to be extended
>>>> to messages beyond the initial request. This also offers key
>>>> confirmation by the server and protection of any responses.
>>>>
>>>> Writing the text I also noticed that I do not quite understand how
>>>> nested JWT documents are supposed to look like. For example, how do I
>>>> encrypt the mac_key carried inside the JWT plus add a signature of all
>>>> other fields? Currently, I have just encrypted the entire payload.
>>>>
>>>> I hope to have some discussions prior to the IETF meeting so that we
>>>> have a more fruitful discussion at the face-to-face meeting.
>>>>
>>>> Ciao
>>>> Hannes
>>>>
>>>> _______________________________________________
>>>> OAuth mailing list
>>>> OAuth@ietf.org
>>>> https://www.ietf.org/mailman/listinfo/oauth
>>>
>>
>>
>> _______________________________________________
>> OAuth mailing list
>> OAuth@ietf.org
>> https://www.ietf.org/mailman/listinfo/oauth
>


From jricher@mitre.org  Thu Feb 28 08:58:11 2013
Return-Path: <jricher@mitre.org>
X-Original-To: oauth@ietfa.amsl.com
Delivered-To: oauth@ietfa.amsl.com
Received: from localhost (localhost [127.0.0.1]) by ietfa.amsl.com (Postfix) with ESMTP id 1AB4F21F8BB6 for <oauth@ietfa.amsl.com>; Thu, 28 Feb 2013 08:58:11 -0800 (PST)
X-Virus-Scanned: amavisd-new at amsl.com
X-Spam-Flag: NO
X-Spam-Score: -6.578
X-Spam-Level: 
X-Spam-Status: No, score=-6.578 tagged_above=-999 required=5 tests=[AWL=0.021,  BAYES_00=-2.599, RCVD_IN_DNSWL_MED=-4]
Received: from mail.ietf.org ([64.170.98.30]) by localhost (ietfa.amsl.com [127.0.0.1]) (amavisd-new, port 10024) with ESMTP id b5T5NyXdpGCp for <oauth@ietfa.amsl.com>; Thu, 28 Feb 2013 08:58:10 -0800 (PST)
Received: from smtpksrv1.mitre.org (smtpksrv1.mitre.org [198.49.146.77]) by ietfa.amsl.com (Postfix) with ESMTP id 2A8DD21F8C08 for <oauth@ietf.org>; Thu, 28 Feb 2013 08:57:59 -0800 (PST)
Received: from smtpksrv1.mitre.org (localhost.localdomain [127.0.0.1]) by localhost (Postfix) with SMTP id 9B37D1F1B66; Thu, 28 Feb 2013 11:57:58 -0500 (EST)
Received: from IMCCAS01.MITRE.ORG (imccas01.mitre.org [129.83.29.78]) by smtpksrv1.mitre.org (Postfix) with ESMTP id 7D9B51F1B31; Thu, 28 Feb 2013 11:57:58 -0500 (EST)
Received: from [10.146.15.29] (129.83.31.58) by IMCCAS01.MITRE.ORG (129.83.29.78) with Microsoft SMTP Server (TLS) id 14.2.318.4; Thu, 28 Feb 2013 11:57:58 -0500
Message-ID: <512F8C57.2000901@mitre.org>
Date: Thu, 28 Feb 2013 11:56:55 -0500
From: Justin Richer <jricher@mitre.org>
User-Agent: Mozilla/5.0 (X11; Linux i686; rv:17.0) Gecko/20130106 Thunderbird/17.0.2
MIME-Version: 1.0
To: Hannes Tschofenig <hannes.tschofenig@gmx.net>
References: <C61D03BE-5324-4B49-AE98-5B46804A9566@gmx.net>
In-Reply-To: <C61D03BE-5324-4B49-AE98-5B46804A9566@gmx.net>
Content-Type: text/plain; charset="ISO-8859-1"; format=flowed
Content-Transfer-Encoding: 7bit
X-Originating-IP: [129.83.31.58]
Cc: "oauth@ietf.org WG" <oauth@ietf.org>
Subject: Re: [OAUTH-WG] JWT & Token Introspection Relationship
X-BeenThere: oauth@ietf.org
X-Mailman-Version: 2.1.12
Precedence: list
List-Id: OAUTH WG <oauth.ietf.org>
List-Unsubscribe: <https://www.ietf.org/mailman/options/oauth>, <mailto:oauth-request@ietf.org?subject=unsubscribe>
List-Archive: <http://www.ietf.org/mail-archive/web/oauth>
List-Post: <mailto:oauth@ietf.org>
List-Help: <mailto:oauth-request@ietf.org?subject=help>
List-Subscribe: <https://www.ietf.org/mailman/listinfo/oauth>, <mailto:oauth-request@ietf.org?subject=subscribe>
X-List-Received-Date: Thu, 28 Feb 2013 16:58:11 -0000

Hannes,

The main issue here is that JWT has been built to be used for things 
other than OAuth tokens (assertions, for instance), and that the 
introspection endpoint is very specifically tied to OAuth. At Torsten's 
suggestion, I've tried to align the output of the introspection endpoint 
to the appropriate claims from a JWT field, but this is a case of making 
the syntax match and not a normative tie in. JWT has no place for 
"client_id" or "scope", which I think are vital for the token 
introspection.

This endpoint is not simply about unpacking information that's already 
contained in a token for clients that don't want to parse the token 
themselves, it's about providing metadata that the server has about the 
token and its surrounding grant/session to the requestor. The normal 
requestor, in my view, is going to be an RS, but it can really be anyone 
who has the permission to do so.

  -- Justin

On 02/28/2013 05:37 AM, Hannes Tschofenig wrote:
> Hi Mike, Hi Justin,
>
> when I looked at the JWT and the draft-richer-oauth-introspection documents I noticed that the two are not aligned (neither from the fields that are supported nor from the way how the fields are defined).
>
> IMHO  draft-richer-oauth-introspection must not define new elements since those are already defined in the JWT.
>
> You could compare the relationship between the JWT and the draft-richer-oauth-introspection in the following way:
>
> The JWT passes the content per value from the AS via the client to the RS.
> The draft-richer-oauth-introspection passes a reference to the content from the AS via the client to the RS and since the RS ultimately needs to know the content it has to resolve the reference so that it gets the content.
>
> Therefore, the content (the different JSON encoded structures) should only be defined once and could then be used in both specs.
>
> Ciao
> Hannes
>
> _______________________________________________
> OAuth mailing list
> OAuth@ietf.org
> https://www.ietf.org/mailman/listinfo/oauth


From ve7jtb@ve7jtb.com  Thu Feb 28 08:58:56 2013
Return-Path: <ve7jtb@ve7jtb.com>
X-Original-To: oauth@ietfa.amsl.com
Delivered-To: oauth@ietfa.amsl.com
Received: from localhost (localhost [127.0.0.1]) by ietfa.amsl.com (Postfix) with ESMTP id 4F31C21F8C08 for <oauth@ietfa.amsl.com>; Thu, 28 Feb 2013 08:58:51 -0800 (PST)
X-Virus-Scanned: amavisd-new at amsl.com
X-Spam-Flag: NO
X-Spam-Score: -3.598
X-Spam-Level: 
X-Spam-Status: No, score=-3.598 tagged_above=-999 required=5 tests=[AWL=-0.000, BAYES_00=-2.599, HTML_MESSAGE=0.001, RCVD_IN_DNSWL_LOW=-1]
Received: from mail.ietf.org ([64.170.98.30]) by localhost (ietfa.amsl.com [127.0.0.1]) (amavisd-new, port 10024) with ESMTP id StWkK-aanb7i for <oauth@ietfa.amsl.com>; Thu, 28 Feb 2013 08:58:48 -0800 (PST)
Received: from mail-pb0-f45.google.com (mail-pb0-f45.google.com [209.85.160.45]) by ietfa.amsl.com (Postfix) with ESMTP id C188721F8A09 for <oauth@ietf.org>; Thu, 28 Feb 2013 08:58:48 -0800 (PST)
Received: by mail-pb0-f45.google.com with SMTP id ro8so1181799pbb.18 for <oauth@ietf.org>; Thu, 28 Feb 2013 08:58:48 -0800 (PST)
X-Google-DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=google.com; s=20120113; h=x-received:content-type:mime-version:subject:from:in-reply-to:date :cc:message-id:references:to:x-mailer:x-gm-message-state; bh=hk3crOGbvC6Nsy71SR2vv93kllcVyVjGmEvwLwUtAkk=; b=M31hkgpBeNCHjNAjkzWS43orQA5T9F2r/YlnpSI04NTL/tStn/72dGAHn3fbzJHSkr bBpwPYJOjDUYeup2AuwU/VXLaMDzy2mXIf0+lHmfZmKfAkQ3LiYvcf/l2yNE8ouZl3qO 241xD2LwZJl69E4FhOq9Lrq+1mPZPlLAyNI6x6pkgoeZ7H5q+bPWpFBMjeUtqdJSF9jd BoUfqFBXzFWM1cvvrSQT1tXgoB4GtKdjbUSiKgtkGIVOccsd5hBgmbzItC4yzi79t7+p J3QcuVyhA6b/aJ2Mw2wT/QVqCzeg1WBaXKqEwCQCNb2J4+l6g6WLnXcN2Mh4Ex/ntOAr /Dpw==
X-Received: by 10.68.194.37 with SMTP id ht5mr9783166pbc.194.1362070727850; Thu, 28 Feb 2013 08:58:47 -0800 (PST)
Received: from [192.168.41.99] (ip-64-134-220-138.public.wayport.net. [64.134.220.138]) by mx.google.com with ESMTPS id t6sm9820423paz.11.2013.02.28.08.58.44 (version=TLSv1 cipher=ECDHE-RSA-RC4-SHA bits=128/128); Thu, 28 Feb 2013 08:58:46 -0800 (PST)
Content-Type: multipart/signed; boundary="Apple-Mail=_71F7F8CC-D00C-4DAE-89A1-EBE7F79F3E78"; protocol="application/pkcs7-signature"; micalg=sha1
Mime-Version: 1.0 (Mac OS X Mail 6.2 \(1499\))
From: John Bradley <ve7jtb@ve7jtb.com>
In-Reply-To: <CA+k3eCREgN+6z+U=jjJcPo0nZVR0GWn5zXeecZRO+rg=xd-gZg@mail.gmail.com>
Date: Thu, 28 Feb 2013 08:58:42 -0800
Message-Id: <A2375FE9-946F-46B3-9356-0709DD56BD4A@ve7jtb.com>
References: <0EC2404F-E3C5-4AD1-88B4-E74AA0394DD9@gmx.net> <C75E4871-E907-4EF7-BAF0-9D1A172D581B@ve7jtb.com> <CA6A6425-D0CE-469F-B51E-9F296DA8041C@oracle.com> <CA+k3eCREgN+6z+U=jjJcPo0nZVR0GWn5zXeecZRO+rg=xd-gZg@mail.gmail.com>
To: Brian Campbell <bcampbell@pingidentity.com>
X-Mailer: Apple Mail (2.1499)
X-Gm-Message-State: ALoCoQnQ2uI3veQZGvWQhX6IDfGEq8+/oG+d1tyvno+TU3obOsGCjL502kqauoJjncE/zdZPD4x4
Cc: "oauth@ietf.org WG" <oauth@ietf.org>
Subject: Re: [OAUTH-WG] JWT - scope claim missing
X-BeenThere: oauth@ietf.org
X-Mailman-Version: 2.1.12
Precedence: list
List-Id: OAUTH WG <oauth.ietf.org>
List-Unsubscribe: <https://www.ietf.org/mailman/options/oauth>, <mailto:oauth-request@ietf.org?subject=unsubscribe>
List-Archive: <http://www.ietf.org/mail-archive/web/oauth>
List-Post: <mailto:oauth@ietf.org>
List-Help: <mailto:oauth-request@ietf.org?subject=help>
List-Subscribe: <https://www.ietf.org/mailman/listinfo/oauth>, <mailto:oauth-request@ietf.org?subject=subscribe>
X-List-Received-Date: Thu, 28 Feb 2013 16:58:56 -0000

--Apple-Mail=_71F7F8CC-D00C-4DAE-89A1-EBE7F79F3E78
Content-Type: multipart/alternative;
	boundary="Apple-Mail=_96588381-45ED-4309-B59F-01C748193BD9"


--Apple-Mail=_96588381-45ED-4309-B59F-01C748193BD9
Content-Transfer-Encoding: quoted-printable
Content-Type: text/plain;
	charset=iso-8859-1

Yes, defining scope in JWT is the wrong place.   JWT needs to stick to =
the security claims needed to process JWT.

I also don't know how far you get requiring a specific authorization =
format for JWT, some AS will wan to use a opaque reference, some might =
want to use a user claim or role claim, others may use scopes,  =
combining scopes and claims is also possible.

Right now it is up to a AS RS pair to agree on how to communicate =
authorization.   I don't want MAC to be more restrictive than bearer =
when it comes to authorization between AS and RS.

Hannes wanted to know why JWT didn't define scope.  The simple answer is =
that it is out of scope for JWT itself.   It might be defined in a OAuth =
access token profile for JWT but it should not be specific to MAC.

John B.
On 2013-02-28, at 8:44 AM, Brian Campbell <bcampbell@pingidentity.com> =
wrote:

> I think John's point was more that scope is something rather specific =
to an OAuth access token and, while JWT is can be used to represent an =
access token, it's not the only application of JWT. The 'standard' =
claims in JWT are those that are believed (right or wrong) to be widely =
applicable across different applications of JWT. One could argue about =
it but scope is probably not one of those.
>=20
> It would probably make sense to try and build a profile of JWT =
specifically for OAuth access tokens (though I suspect there are some =
turtles and dragons in there), which might be the appropriate place to =
define/register a scope claim.
>=20
>=20
> On Thu, Feb 28, 2013 at 9:24 AM, Phil Hunt <phil.hunt@oracle.com> =
wrote:
> Are you advocating TWO systems? That seems like a bad choice.
>=20
> I would rather fix scope than go to a two system approach.
>=20
> Phil
>=20
> Sent from my phone.
>=20
> On 2013-02-28, at 8:17, John Bradley <ve7jtb@ve7jtb.com> wrote:
>=20
> > While scope is one method that a AS could communicate authorization =
to a RS, it is not the only or perhaps even the most likely one.
> > Using scope requires a relatively tight binding between the RS and =
AS,  UMA uses a different mechanism that describes finer grained =
operations.
> > The AS may include roles, user, or other more abstract claims that =
the the client may (god help them) pass on to EXCML for processing.
> >
> > While having a scopes claim is possible, like any other claim it is =
not part of the JWT core security processing claims, and needs to be =
defined by extension.
> >
> > John B.
> > On 2013-02-28, at 2:29 AM, Hannes Tschofenig =
<hannes.tschofenig@gmx.net> wrote:
> >
> >> Hi Mike,
> >>
> >> when I worked on the MAC specification I noticed that the JWT does =
not have a claim for the scope. I believe that this would be needed to =
allow the resource server to verify whether the scope the authorization =
server authorized is indeed what the client is asking for.
> >>
> >> Ciao
> >> Hannes
> >>
> >> _______________________________________________
> >> OAuth mailing list
> >> OAuth@ietf.org
> >> https://www.ietf.org/mailman/listinfo/oauth
> >
> > _______________________________________________
> > OAuth mailing list
> > OAuth@ietf.org
> > https://www.ietf.org/mailman/listinfo/oauth
> _______________________________________________
> OAuth mailing list
> OAuth@ietf.org
> https://www.ietf.org/mailman/listinfo/oauth
>=20


--Apple-Mail=_96588381-45ED-4309-B59F-01C748193BD9
Content-Transfer-Encoding: quoted-printable
Content-Type: text/html;
	charset=iso-8859-1

<html><head><meta http-equiv=3D"Content-Type" content=3D"text/html =
charset=3Diso-8859-1"></head><body style=3D"word-wrap: break-word; =
-webkit-nbsp-mode: space; -webkit-line-break: after-white-space; ">Yes, =
defining scope in JWT is the wrong place. &nbsp; JWT needs to stick to =
the security claims needed to process JWT.<div><br></div><div>I also =
don't know how far you get requiring a specific authorization format for =
JWT, some AS will wan to use a opaque reference, some might want to use =
a user claim or role claim, others may use scopes, &nbsp;combining =
scopes and claims is also possible.</div><div><br></div><div>Right now =
it is up to a AS RS pair to agree on how to communicate authorization. =
&nbsp; I don't want MAC to be more restrictive than bearer when it comes =
to authorization between AS and RS.<br><div><br></div><div>Hannes wanted =
to know why JWT didn't define scope. &nbsp;The simple answer is that it =
is out of scope for JWT itself. &nbsp; It might be defined in a OAuth =
access token profile for JWT but it should not be specific to =
MAC.</div><div><br></div><div>John B.</div><div><div><div>On 2013-02-28, =
at 8:44 AM, Brian Campbell &lt;<a =
href=3D"mailto:bcampbell@pingidentity.com">bcampbell@pingidentity.com</a>&=
gt; wrote:</div><br class=3D"Apple-interchange-newline"><blockquote =
type=3D"cite"><div dir=3D"ltr"><div>I think John's point was more that =
scope is something rather specific to an OAuth access token and, while =
JWT is can be used to represent an access token, it's not the only =
application of JWT. The 'standard' claims in JWT are those that are =
believed (right or wrong) to be widely applicable across different =
applications of JWT. One could argue about it but scope is probably not =
one of those.<br>

<br></div>It would probably make sense to try and build a profile of JWT =
specifically for OAuth access tokens (though I suspect there are some =
turtles and dragons in there), which might be the appropriate place to =
define/register a scope claim.<br>


</div><div class=3D"gmail_extra"><br><br><div class=3D"gmail_quote">On =
Thu, Feb 28, 2013 at 9:24 AM, Phil Hunt <span dir=3D"ltr">&lt;<a =
href=3D"mailto:phil.hunt@oracle.com" =
target=3D"_blank">phil.hunt@oracle.com</a>&gt;</span> wrote:<br>

<blockquote class=3D"gmail_quote" style=3D"margin:0 0 0 =
.8ex;border-left:1px #ccc solid;padding-left:1ex">Are you advocating TWO =
systems? That seems like a bad choice.<br>
<br>
I would rather fix scope than go to a two system approach.<br>
<br>
Phil<br>
<br>
Sent from my phone.<br>
<br>
On 2013-02-28, at 8:17, John Bradley &lt;<a =
href=3D"mailto:ve7jtb@ve7jtb.com">ve7jtb@ve7jtb.com</a>&gt; wrote:<br>
<br>
&gt; While scope is one method that a AS could communicate authorization =
to a RS, it is not the only or perhaps even the most likely one.<br>
&gt; Using scope requires a relatively tight binding between the RS and =
AS, &nbsp;UMA uses a different mechanism that describes finer grained =
operations.<br>
&gt; The AS may include roles, user, or other more abstract claims that =
the the client may (god help them) pass on to EXCML for processing.<br>
&gt;<br>
&gt; While having a scopes claim is possible, like any other claim it is =
not part of the JWT core security processing claims, and needs to be =
defined by extension.<br>
&gt;<br>
&gt; John B.<br>
&gt; On 2013-02-28, at 2:29 AM, Hannes Tschofenig &lt;<a =
href=3D"mailto:hannes.tschofenig@gmx.net">hannes.tschofenig@gmx.net</a>&gt=
; wrote:<br>
&gt;<br>
&gt;&gt; Hi Mike,<br>
&gt;&gt;<br>
&gt;&gt; when I worked on the MAC specification I noticed that the JWT =
does not have a claim for the scope. I believe that this would be needed =
to allow the resource server to verify whether the scope the =
authorization server authorized is indeed what the client is asking =
for.<br>


&gt;&gt;<br>
&gt;&gt; Ciao<br>
&gt;&gt; Hannes<br>
&gt;&gt;<br>
&gt;&gt; _______________________________________________<br>
&gt;&gt; OAuth mailing list<br>
&gt;&gt; <a href=3D"mailto:OAuth@ietf.org">OAuth@ietf.org</a><br>
&gt;&gt; <a href=3D"https://www.ietf.org/mailman/listinfo/oauth" =
target=3D"_blank">https://www.ietf.org/mailman/listinfo/oauth</a><br>
&gt;<br>
&gt; _______________________________________________<br>
&gt; OAuth mailing list<br>
&gt; <a href=3D"mailto:OAuth@ietf.org">OAuth@ietf.org</a><br>
&gt; <a href=3D"https://www.ietf.org/mailman/listinfo/oauth" =
target=3D"_blank">https://www.ietf.org/mailman/listinfo/oauth</a><br>
_______________________________________________<br>
OAuth mailing list<br>
<a href=3D"mailto:OAuth@ietf.org">OAuth@ietf.org</a><br>
<a href=3D"https://www.ietf.org/mailman/listinfo/oauth" =
target=3D"_blank">https://www.ietf.org/mailman/listinfo/oauth</a><br>
</blockquote></div><br></div>
</blockquote></div><br></div></div></body></html>=

--Apple-Mail=_96588381-45ED-4309-B59F-01C748193BD9--

--Apple-Mail=_71F7F8CC-D00C-4DAE-89A1-EBE7F79F3E78
Content-Disposition: attachment;
	filename=smime.p7s
Content-Type: application/pkcs7-signature;
	name=smime.p7s
Content-Transfer-Encoding: base64
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--Apple-Mail=_71F7F8CC-D00C-4DAE-89A1-EBE7F79F3E78--

From sberyozkin@gmail.com  Thu Feb 28 09:00:32 2013
Return-Path: <sberyozkin@gmail.com>
X-Original-To: oauth@ietfa.amsl.com
Delivered-To: oauth@ietfa.amsl.com
Received: from localhost (localhost [127.0.0.1]) by ietfa.amsl.com (Postfix) with ESMTP id 92EBB21F8860 for <oauth@ietfa.amsl.com>; Thu, 28 Feb 2013 09:00:32 -0800 (PST)
X-Virus-Scanned: amavisd-new at amsl.com
X-Spam-Flag: NO
X-Spam-Score: -3.132
X-Spam-Level: 
X-Spam-Status: No, score=-3.132 tagged_above=-999 required=5 tests=[AWL=-0.733, BAYES_00=-2.599, J_CHICKENPOX_33=0.6, J_CHICKENPOX_63=0.6, RCVD_IN_DNSWL_LOW=-1]
Received: from mail.ietf.org ([64.170.98.30]) by localhost (ietfa.amsl.com [127.0.0.1]) (amavisd-new, port 10024) with ESMTP id xRUhP5i7BGLA for <oauth@ietfa.amsl.com>; Thu, 28 Feb 2013 09:00:31 -0800 (PST)
Received: from mail-ee0-f45.google.com (mail-ee0-f45.google.com [74.125.83.45]) by ietfa.amsl.com (Postfix) with ESMTP id D1A6021F84A4 for <oauth@ietf.org>; Thu, 28 Feb 2013 09:00:30 -0800 (PST)
Received: by mail-ee0-f45.google.com with SMTP id b57so1642085eek.4 for <oauth@ietf.org>; Thu, 28 Feb 2013 09:00:30 -0800 (PST)
DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=gmail.com; s=20120113; h=x-received:message-id:date:from:user-agent:mime-version:to:cc :subject:references:in-reply-to:content-type :content-transfer-encoding; bh=pqSoO6ao0e9yKoVFXwk8KmOoB95O7RQtMtx0TS699JI=; b=TKIbgD2MReSYoDiuYi0cN86J+78RI8cwWH9Zp5hNNu6fBWVm1+r5+gVEglw5XExPm3 y/PBNB4xznjnK6zbA5QXukeh3VaBbuzHCR9q81clD347eSRnSHp2Vol4igy+bJdAnCzH I3AqIuLKgj+RHj+u1GlzFkhaTOUxF+9C9y6rvD6PtBLLqVe1rQRYe4sMtv3bROx0U5yA 0PLDBN0EOtKPCQTIq7IHYdpRs5FnGGWpeafuH/yZLEShOBtdxr+3UNlaxdDH+LjX7B5H quc6meQosspaXsinYMTML8fRnD78q+sqdjzzEgHcAmMLqqMRfZwUNvQJ21Fb/CRlxtJd sPTw==
X-Received: by 10.14.216.198 with SMTP id g46mr18449568eep.30.1362070830015; Thu, 28 Feb 2013 09:00:30 -0800 (PST)
Received: from [192.168.2.5] ([79.97.76.201]) by mx.google.com with ESMTPS id o3sm12780800eem.15.2013.02.28.09.00.28 (version=TLSv1 cipher=ECDHE-RSA-RC4-SHA bits=128/128); Thu, 28 Feb 2013 09:00:29 -0800 (PST)
Message-ID: <512F8D24.8020303@gmail.com>
Date: Thu, 28 Feb 2013 17:00:20 +0000
From: Sergey Beryozkin <sberyozkin@gmail.com>
User-Agent: Mozilla/5.0 (X11; Linux x86_64; rv:12.0) Gecko/20120430 Thunderbird/12.0.1
MIME-Version: 1.0
To: Hannes Tschofenig <hannes.tschofenig@gmx.net>
References: <AECF561A-BD17-4FF0-B60A-FB8594159EA9@gmx.net> <512CAC45.9070501@gmail.com> <7E351B5A-5609-46B0-A15A-CF3FA1D97D56@gmx.net>
In-Reply-To: <7E351B5A-5609-46B0-A15A-CF3FA1D97D56@gmx.net>
Content-Type: text/plain; charset=ISO-8859-1; format=flowed
Content-Transfer-Encoding: 7bit
Cc: oauth@ietf.org
Subject: Re: [OAUTH-WG] draft-ietf-oauth-v2-http-mac and draft-tschofenig-oauth-hotk re-submitted
X-BeenThere: oauth@ietf.org
X-Mailman-Version: 2.1.12
Precedence: list
List-Id: OAUTH WG <oauth.ietf.org>
List-Unsubscribe: <https://www.ietf.org/mailman/options/oauth>, <mailto:oauth-request@ietf.org?subject=unsubscribe>
List-Archive: <http://www.ietf.org/mail-archive/web/oauth>
List-Post: <mailto:oauth@ietf.org>
List-Help: <mailto:oauth-request@ietf.org?subject=help>
List-Subscribe: <https://www.ietf.org/mailman/listinfo/oauth>, <mailto:oauth-request@ietf.org?subject=subscribe>
X-List-Received-Date: Thu, 28 Feb 2013 17:00:33 -0000

Hi Hannes
On 27/02/13 08:46, Hannes Tschofenig wrote:
> Hi Sergey,
>
> thanks for your input.
>
> On Feb 26, 2013, at 2:36 PM, Sergey Beryozkin wrote:
>
>> Hi Hannes
>> On 25/02/13 12:46, Hannes Tschofenig wrote:
>>> Hi all,
>>>
>>> I just submitted an updated version of the draft-ietf-oauth-v2-http-mac-03.txt.
>>>
>>
>> It definitely has more interesting content (about architecture, session keys, etc) - this is really useful IMHO.
>>
>> What I'm not really understanding is why a 2-way TLS transport for the session key is not even considered.
>
> Could you explain how this would look like?
>
Given my earlier confusion, and knowing it is a path between AS and RS, 
what would prevent RS and AS exchanging their certificates and admins 
configuring both to require a client certificate authentication ?

and then basically use some simple name/value exchange ? I don't mind 
against having a JWT profile supported at the AS-to-RS path

What I find a bit unusual is the fact that this AS to RS path is even 
covered - this is probably the first attempt AFAIK :-), though I guess 
it must be important to do it

>> Instead this uber-complex (in the context of this spec, IMHO) JWT thing is there once again. I appreciate why it may be the case, primarily to do with reusing the work done around JWT and having some common/recommended access token representation, but disallowing a basic bearer token be 'enhanced' with MAC over two-way TLS seems like not ideal at all IMHO.
>
> Note that JWT is used only for the access token encoding.
>
>> To be honest, I'm not sure why would anyone use JWT+MAC instead of just JWE,
>
> Actually, the authorization server encrypts the access token using JWE and the client uses MAC.
> So, using JWT + MAC is actually not possible since the security mechanisms are used by different entities: the MAC is used by the client and the access token protection is accomplished by the authorization server.
>
Sorry, I got confused earlier :-)
thanks, Sergey

>> in cases when people are really comfortable with doing JWT. I guess we may be talking now about better security characteristics, but this will help a very limited audience as compared to a wider one which can use Bearer+MAC over 2-way TLS, straightforward, very cheap effort to get started.
>>
>
> Ciao
> Hannes
>
>> just my 2c
>> Thanks, Sergey
>>
>>> I would like to point out that this is **discussion input** -- not agreed content. Anything in the document is subject to change!
>>> You also may notice that there are a few questions in the writeup.
>>>
>>> I was trying to more specific about some of the design aspects that folks had proposed during the last few months.
>>> I have also re-submitted the draft-tschofenig-oauth-hotk, which includes a TLS and a JSON-based solution approach.
>>>
>>> In general, the open questions still seem to be related to
>>> * Key distribution: What should be described in a document? What is mandatory to implement?
>>> * Selective header field protection: This is something that was brought forward in discussions and I have included a proposal of how this could look like.
>>> * Channel Binding: Functionality is also included to deal with man-in-the-middle attacks against TLS. There are, however, two types of channel bindings defined in RFC 5929. Are both needed? If not, which one should be selected?
>>> * Integrity protection and data origin authentication in both directions: The current writeup allows the protection to be extended to messages beyond the initial request. This also offers key confirmation by the server and protection of any responses.
>>>
>>> Writing the text I also noticed that I do not quite understand how nested JWT documents are supposed to look like. For example, how do I encrypt the mac_key carried inside the JWT plus add a signature of all other fields? Currently, I have just encrypted the entire payload.
>>>
>>> I hope to have some discussions prior to the IETF meeting so that we have a more fruitful discussion at the face-to-face meeting.
>>>
>>> Ciao
>>> Hannes
>>>
>>> _______________________________________________
>>> OAuth mailing list
>>> OAuth@ietf.org
>>> https://www.ietf.org/mailman/listinfo/oauth
>>
>> _______________________________________________
>> OAuth mailing list
>> OAuth@ietf.org
>> https://www.ietf.org/mailman/listinfo/oauth
>


From sberyozkin@gmail.com  Thu Feb 28 09:04:35 2013
Return-Path: <sberyozkin@gmail.com>
X-Original-To: oauth@ietfa.amsl.com
Delivered-To: oauth@ietfa.amsl.com
Received: from localhost (localhost [127.0.0.1]) by ietfa.amsl.com (Postfix) with ESMTP id 456F521F8835 for <oauth@ietfa.amsl.com>; Thu, 28 Feb 2013 09:04:35 -0800 (PST)
X-Virus-Scanned: amavisd-new at amsl.com
X-Spam-Flag: NO
X-Spam-Score: -3.549
X-Spam-Level: 
X-Spam-Status: No, score=-3.549 tagged_above=-999 required=5 tests=[AWL=0.050,  BAYES_00=-2.599, RCVD_IN_DNSWL_LOW=-1]
Received: from mail.ietf.org ([64.170.98.30]) by localhost (ietfa.amsl.com [127.0.0.1]) (amavisd-new, port 10024) with ESMTP id t5Aay08QQHuR for <oauth@ietfa.amsl.com>; Thu, 28 Feb 2013 09:04:34 -0800 (PST)
Received: from mail-ee0-f52.google.com (mail-ee0-f52.google.com [74.125.83.52]) by ietfa.amsl.com (Postfix) with ESMTP id 6CF4921F8860 for <oauth@ietf.org>; Thu, 28 Feb 2013 09:04:33 -0800 (PST)
Received: by mail-ee0-f52.google.com with SMTP id b15so1651865eek.39 for <oauth@ietf.org>; Thu, 28 Feb 2013 09:04:32 -0800 (PST)
DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=gmail.com; s=20120113; h=x-received:message-id:date:from:user-agent:mime-version:to:subject :references:in-reply-to:content-type:content-transfer-encoding; bh=rF+Y62vNF+e9NT29OoWBC+OB35Dp3T3/SbbOuVqHlUQ=; b=RSvaHYGsfTeYmBSXcGwmj6APu7U81HdPqIXWkNOLQ6+JW5liBLlG00WeeRTnTrSkzq xoZ/XCgBwaaZEtfROlhbZWDMSjXuz0tB1QgOVCFE4K4vCatttdgK1hmvTS+WNUH4+vAN Ehc9Kmz1lZQSd44tunax0sYpEruQlC15ZG7OpgxOjW214oF0K24qANJHVqErbM/eMVRb +3sPzBYX3mmNWNO3wUcMUhuYN3EiPQWDCd/8qsjAvuTAjP5sBmFNlr5TKbNfCBnMNdOl PFZPvZ6gDN1wOyVs+UrXMJertDnVFGUOyK3p+7LjWr7tFI6P4SC6fCkO39G18K2cF8vH pmyg==
X-Received: by 10.14.0.73 with SMTP id 49mr18713173eea.21.1362071071874; Thu, 28 Feb 2013 09:04:31 -0800 (PST)
Received: from [192.168.2.5] ([79.97.76.201]) by mx.google.com with ESMTPS id t4sm12828045eel.0.2013.02.28.09.04.30 (version=TLSv1 cipher=ECDHE-RSA-RC4-SHA bits=128/128); Thu, 28 Feb 2013 09:04:31 -0800 (PST)
Message-ID: <512F8E1D.2060408@gmail.com>
Date: Thu, 28 Feb 2013 17:04:29 +0000
From: Sergey Beryozkin <sberyozkin@gmail.com>
User-Agent: Mozilla/5.0 (X11; Linux x86_64; rv:12.0) Gecko/20120430 Thunderbird/12.0.1
MIME-Version: 1.0
To: oauth@ietf.org
References: <20130225124642.7425.65145.idtracker@ietfa.amsl.com> <1361956373.9883.YahooMailNeo@web31807.mail.mud.yahoo.com> <21030204-8EA7-4FB0-9DD3-2B6C8CA57E02@gmx.net> <1362057295.36069.YahooMailNeo@web31809.mail.mud.yahoo.com>
In-Reply-To: <1362057295.36069.YahooMailNeo@web31809.mail.mud.yahoo.com>
Content-Type: text/plain; charset=ISO-8859-1; format=flowed
Content-Transfer-Encoding: 7bit
Subject: Re: [OAUTH-WG] I-D Action: draft-ietf-oauth-v2-http-mac-03.txt
X-BeenThere: oauth@ietf.org
X-Mailman-Version: 2.1.12
Precedence: list
List-Id: OAUTH WG <oauth.ietf.org>
List-Unsubscribe: <https://www.ietf.org/mailman/options/oauth>, <mailto:oauth-request@ietf.org?subject=unsubscribe>
List-Archive: <http://www.ietf.org/mail-archive/web/oauth>
List-Post: <mailto:oauth@ietf.org>
List-Help: <mailto:oauth-request@ietf.org?subject=help>
List-Subscribe: <https://www.ietf.org/mailman/listinfo/oauth>, <mailto:oauth-request@ietf.org?subject=subscribe>
X-List-Received-Date: Thu, 28 Feb 2013 17:04:35 -0000

Hi
On 28/02/13 13:14, William Mills wrote:
> I'm actually advocating that we change MAC to be a JWT extension.
IMHO, having a simpler option, plus, going forward, a possible JWT 
profile (client to RS path) would work better -

Why would JWT completely take over ? May be it should be possible indeed 
to have it as a JWT extension - should it be part of the relevant JWT 
assertion spec, where JWT is used as a possible grant ?

Thanks, Sergey
>
> ------------------------------------------------------------------------
> *From:* Hannes Tschofenig <hannes.tschofenig@gmx.net>
> *To:* William Mills <wmills_92105@yahoo.com>
> *Cc:* Hannes Tschofenig <hannes.tschofenig@gmx.net>; "oauth@ietf.org"
> <oauth@ietf.org>
> *Sent:* Thursday, February 28, 2013 2:28 AM
> *Subject:* Re: [OAUTH-WG] I-D Action: draft-ietf-oauth-v2-http-mac-03.txt
>
> Hi Bill,
>
> I believe you are misreading the document. In
> draft-ietf-oauth-v2-http-mac the client still uses the MAC when it
> accesses a protected resource.
> The only place where the JWT comes into the picture is with the
> description of the access token. This matters from a key distribution
> point of view. The session key for the MAC is included in the encrypted
> JWT. The JWT is encrypted by the authorization server and decrypted by
> the resource server.
>
> Information about how header fields get included in the MAC is described
> in Section 5.
>
> The nonce isn't killed it is just called differently: seq-nr. The stuff
> in the original MAC specification actually wasn't a nonce (from the
> semantic point of view).
> The extension parameter is there implicitly by allowing additional
> header fields to be included in the MAC computation.
>
> I need to look at the port number field again.
>
> Ciao
> Hannes
>
> On Feb 27, 2013, at 11:12 AM, William Mills wrote:
>
>  > Just read the draft quickly.
>  >
>  > Since we're now leaning on JWT do we need to include the token in
> this? Why not just make an additional "Envelope MAC" thing and have the
> signature include the 3 JWT parts in the signature base string? That
> object then just becomes a JSON container for the kid, timestamp,
> signature method, signature etc. That thing then is a 4th base64 encoded
> JSON thing in the auth header.
>  >
>  > How header fields get included in the signature needs definition.
>  >
>  > Why did you kill the port number, nonce, and extension parameter out
> of the signature base string?
>  >
>  > The BNF appears to have no separators between values.
>  >
>  > -bill
>  >
>  >
>  > From: "internet-drafts@ietf.org <mailto:internet-drafts@ietf.org>"
> <internet-drafts@ietf.org <mailto:internet-drafts@ietf.org>>
>  > To: i-d-announce@ietf.org <mailto:i-d-announce@ietf.org>
>  > Cc: oauth@ietf.org <mailto:oauth@ietf.org>
>  > Sent: Monday, February 25, 2013 4:46 AM
>  > Subject: [OAUTH-WG] I-D Action: draft-ietf-oauth-v2-http-mac-03.txt
>  >
>  >
>  > A New Internet-Draft is available from the on-line Internet-Drafts
> directories.
>  > This draft is a work item of the Web Authorization Protocol Working
> Group of the IETF.
>  >
>  > Title : OAuth 2.0 Message Authentication Code (MAC) Tokens
>  > Author(s) : Justin Richer
>  > William Mills
>  > Hannes Tschofenig
>  > Filename : draft-ietf-oauth-v2-http-mac-03.txt
>  > Pages : 26
>  > Date : 2013-02-25
>  >
>  > Abstract:
>  > This specification describes how to use MAC Tokens in HTTP requests
>  > to access OAuth 2.0 protected resources. An OAuth client willing to
>  > access a protected resource needs to demonstrate possession of a
>  > crytographic key by using it with a keyed message digest function to
>  > the request.
>  >
>  > The document also defines a key distribution protocol for obtaining a
>  > fresh session key.
>  >
>  >
>  > The IETF datatracker status page for this draft is:
>  > https://datatracker.ietf.org/doc/draft-ietf-oauth-v2-http-mac
>  >
>  > There's also a htmlized version available at:
>  > http://tools.ietf.org/html/draft-ietf-oauth-v2-http-mac-03
>  >
>  > A diff from the previous version is available at:
>  > http://www.ietf.org/rfcdiff?url2=draft-ietf-oauth-v2-http-mac-03
>  >
>  >
>  > Internet-Drafts are also available by anonymous FTP at:
>  > ftp://ftp.ietf.org/internet-drafts/
>  >
>  > _______________________________________________
>  > OAuth mailing list
>  > OAuth@ietf.org <mailto:OAuth@ietf.org>
>  > https://www.ietf.org/mailman/listinfo/oauth
>  >
>  >
>
>
>
>
>
> _______________________________________________
> OAuth mailing list
> OAuth@ietf.org
> https://www.ietf.org/mailman/listinfo/oauth



From ve7jtb@ve7jtb.com  Thu Feb 28 09:07:56 2013
Return-Path: <ve7jtb@ve7jtb.com>
X-Original-To: oauth@ietfa.amsl.com
Delivered-To: oauth@ietfa.amsl.com
Received: from localhost (localhost [127.0.0.1]) by ietfa.amsl.com (Postfix) with ESMTP id BB5E721F8C48 for <oauth@ietfa.amsl.com>; Thu, 28 Feb 2013 09:07:56 -0800 (PST)
X-Virus-Scanned: amavisd-new at amsl.com
X-Spam-Flag: NO
X-Spam-Score: -3.599
X-Spam-Level: 
X-Spam-Status: No, score=-3.599 tagged_above=-999 required=5 tests=[AWL=0.000,  BAYES_00=-2.599, RCVD_IN_DNSWL_LOW=-1]
Received: from mail.ietf.org ([64.170.98.30]) by localhost (ietfa.amsl.com [127.0.0.1]) (amavisd-new, port 10024) with ESMTP id 8NSkeetHxg2J for <oauth@ietfa.amsl.com>; Thu, 28 Feb 2013 09:07:56 -0800 (PST)
Received: from mail-pa0-f42.google.com (mail-pa0-f42.google.com [209.85.220.42]) by ietfa.amsl.com (Postfix) with ESMTP id 062D521F8C5B for <oauth@ietf.org>; Thu, 28 Feb 2013 09:07:54 -0800 (PST)
Received: by mail-pa0-f42.google.com with SMTP id kq12so1251704pab.29 for <oauth@ietf.org>; Thu, 28 Feb 2013 09:07:54 -0800 (PST)
X-Google-DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=google.com; s=20120113; h=x-received:content-type:mime-version:subject:from:in-reply-to:date :cc:message-id:references:to:x-mailer:x-gm-message-state; bh=NYx77//WswqgXiyuOR/RgrZr1Kw83Fg+utw/ltLBswA=; b=d2131yvzjb6AqYSExo31NcJCbXB6c2tmIlIzJhGMnlCR4P1Gy2MJwhsM/ct5XSERye sWLqiGHD93WEt+hdDhMH1n9tTRjt2mDmzcA8WAunZU4KRPUMdqKXp5JAEXPPwvkrxaWj bVw/mXJ81ebr/2gTeozXSZA39MSWif4/MTidC1d99UnqrEgOZzxXr7A0ZJKRuwu1TXXK 0yRF/gZ9Aq1GcVkneu/u01cvJ5P3t4e5qtNfKkYc7HW8+9KWNU6BBQyWyHmESE7f6AUh wrY2nFo23psS0Zo8mRAiDbXxpBFsiQybgMlvLuX7IveD7+DBH4yNdxN8UOz39oOSVPer lrAQ==
X-Received: by 10.68.224.225 with SMTP id rf1mr10286789pbc.9.1362071274761; Thu, 28 Feb 2013 09:07:54 -0800 (PST)
Received: from [192.168.41.99] (ip-64-134-220-138.public.wayport.net. [64.134.220.138]) by mx.google.com with ESMTPS id z6sm9858434pav.3.2013.02.28.09.07.50 (version=TLSv1 cipher=ECDHE-RSA-RC4-SHA bits=128/128); Thu, 28 Feb 2013 09:07:51 -0800 (PST)
Content-Type: multipart/signed; boundary="Apple-Mail=_01BF8427-BDE4-40FE-A5E2-3162C25A4184"; protocol="application/pkcs7-signature"; micalg=sha1
Mime-Version: 1.0 (Mac OS X Mail 6.2 \(1499\))
From: John Bradley <ve7jtb@ve7jtb.com>
In-Reply-To: <CA6A6425-D0CE-469F-B51E-9F296DA8041C@oracle.com>
Date: Thu, 28 Feb 2013 09:07:48 -0800
Message-Id: <EAD4F55D-7A02-4209-BB15-21BA5AB512AC@ve7jtb.com>
References: <0EC2404F-E3C5-4AD1-88B4-E74AA0394DD9@gmx.net> <C75E4871-E907-4EF7-BAF0-9D1A172D581B@ve7jtb.com> <CA6A6425-D0CE-469F-B51E-9F296DA8041C@oracle.com>
To: Phil Hunt <phil.hunt@oracle.com>
X-Mailer: Apple Mail (2.1499)
X-Gm-Message-State: ALoCoQkLIzKlLVnNb9rAvzIM7+GsfI1TJRXV7Sws9m+8vHPLLKrIK+jTWEqhY0KVBA8B6kA70d3O
Cc: "oauth@ietf.org WG" <oauth@ietf.org>
Subject: Re: [OAUTH-WG] JWT - scope claim missing
X-BeenThere: oauth@ietf.org
X-Mailman-Version: 2.1.12
Precedence: list
List-Id: OAUTH WG <oauth.ietf.org>
List-Unsubscribe: <https://www.ietf.org/mailman/options/oauth>, <mailto:oauth-request@ietf.org?subject=unsubscribe>
List-Archive: <http://www.ietf.org/mail-archive/web/oauth>
List-Post: <mailto:oauth@ietf.org>
List-Help: <mailto:oauth-request@ietf.org?subject=help>
List-Subscribe: <https://www.ietf.org/mailman/listinfo/oauth>, <mailto:oauth-request@ietf.org?subject=subscribe>
X-List-Received-Date: Thu, 28 Feb 2013 17:07:56 -0000

--Apple-Mail=_01BF8427-BDE4-40FE-A5E2-3162C25A4184
Content-Transfer-Encoding: quoted-printable
Content-Type: text/plain;
	charset=us-ascii

I am not advocating anything, only sting what people are doing now.

How authorization is communicated between the AS and RS via a token that =
is opaque to the client is out of scope fro OAuth core, it might be =
magic pixy dust.

This has lead to a number of ways people are doing it.

JWT along with  JOSE provide a container to get some claims from the AS =
to the RS though the JWT is not specific to this and is used in the =
assertions profile and other specs for many things other than access =
tokens.

Yes a profile of JWT for an access token as an access token is needed, =
Yes further profiling is required for a JWT access token using MAC.

The format of the authorization claims is not tightly bound to MAC and =
might be used with other bearer JWT tokens.

I don't know that there will be only one way to communicate those claims =
because different sorts of implementations need different information =
for the RS to act on.
Recommendations are fine but defining a field called scope and passing =
on exactly the scopes the client was granted is not going to work for =
everyone for lots of good reasons.

John B.
On 2013-02-28, at 8:24 AM, Phil Hunt <phil.hunt@oracle.com> wrote:

> Are you advocating TWO systems? That seems like a bad choice.=20
>=20
> I would rather fix scope than go to a two system approach.
>=20
> Phil
>=20
> Sent from my phone.
>=20
> On 2013-02-28, at 8:17, John Bradley <ve7jtb@ve7jtb.com> wrote:
>=20
>> While scope is one method that a AS could communicate authorization =
to a RS, it is not the only or perhaps even the most likely one.
>> Using scope requires a relatively tight binding between the RS and =
AS,  UMA uses a different mechanism that describes finer grained =
operations. =20
>> The AS may include roles, user, or other more abstract claims that =
the the client may (god help them) pass on to EXCML for processing.
>>=20
>> While having a scopes claim is possible, like any other claim it is =
not part of the JWT core security processing claims, and needs to be =
defined by extension.
>>=20
>> John B.
>> On 2013-02-28, at 2:29 AM, Hannes Tschofenig =
<hannes.tschofenig@gmx.net> wrote:
>>=20
>>> Hi Mike,=20
>>>=20
>>> when I worked on the MAC specification I noticed that the JWT does =
not have a claim for the scope. I believe that this would be needed to =
allow the resource server to verify whether the scope the authorization =
server authorized is indeed what the client is asking for.=20
>>>=20
>>> Ciao
>>> Hannes
>>>=20
>>> _______________________________________________
>>> OAuth mailing list
>>> OAuth@ietf.org
>>> https://www.ietf.org/mailman/listinfo/oauth
>>=20
>> _______________________________________________
>> OAuth mailing list
>> OAuth@ietf.org
>> https://www.ietf.org/mailman/listinfo/oauth


--Apple-Mail=_01BF8427-BDE4-40FE-A5E2-3162C25A4184
Content-Disposition: attachment;
	filename=smime.p7s
Content-Type: application/pkcs7-signature;
	name=smime.p7s
Content-Transfer-Encoding: base64
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--Apple-Mail=_01BF8427-BDE4-40FE-A5E2-3162C25A4184--

From jricher@mitre.org  Thu Feb 28 09:09:49 2013
Return-Path: <jricher@mitre.org>
X-Original-To: oauth@ietfa.amsl.com
Delivered-To: oauth@ietfa.amsl.com
Received: from localhost (localhost [127.0.0.1]) by ietfa.amsl.com (Postfix) with ESMTP id E849C21F85D8 for <oauth@ietfa.amsl.com>; Thu, 28 Feb 2013 09:09:49 -0800 (PST)
X-Virus-Scanned: amavisd-new at amsl.com
X-Spam-Flag: NO
X-Spam-Score: -6.577
X-Spam-Level: 
X-Spam-Status: No, score=-6.577 tagged_above=-999 required=5 tests=[AWL=0.021,  BAYES_00=-2.599, HTML_MESSAGE=0.001, RCVD_IN_DNSWL_MED=-4]
Received: from mail.ietf.org ([64.170.98.30]) by localhost (ietfa.amsl.com [127.0.0.1]) (amavisd-new, port 10024) with ESMTP id rTvYP4nH1p5Z for <oauth@ietfa.amsl.com>; Thu, 28 Feb 2013 09:09:49 -0800 (PST)
Received: from smtpksrv1.mitre.org (smtpksrv1.mitre.org [198.49.146.77]) by ietfa.amsl.com (Postfix) with ESMTP id B3ECA21F856F for <oauth@ietf.org>; Thu, 28 Feb 2013 09:09:48 -0800 (PST)
Received: from smtpksrv1.mitre.org (localhost.localdomain [127.0.0.1]) by localhost (Postfix) with SMTP id 582675311DBF; Thu, 28 Feb 2013 12:09:48 -0500 (EST)
Received: from IMCCAS03.MITRE.ORG (imccas03.mitre.org [129.83.29.80]) by smtpksrv1.mitre.org (Postfix) with ESMTP id 3C4F95311DBC; Thu, 28 Feb 2013 12:09:48 -0500 (EST)
Received: from [10.146.15.29] (129.83.31.58) by IMCCAS03.MITRE.ORG (129.83.29.80) with Microsoft SMTP Server (TLS) id 14.2.318.4; Thu, 28 Feb 2013 12:09:47 -0500
Message-ID: <512F8F1E.3020400@mitre.org>
Date: Thu, 28 Feb 2013 12:08:46 -0500
From: Justin Richer <jricher@mitre.org>
User-Agent: Mozilla/5.0 (X11; Linux i686; rv:17.0) Gecko/20130106 Thunderbird/17.0.2
MIME-Version: 1.0
To: William Mills <wmills_92105@yahoo.com>
References: <20130225124642.7425.65145.idtracker@ietfa.amsl.com> <1361956373.9883.YahooMailNeo@web31807.mail.mud.yahoo.com> <21030204-8EA7-4FB0-9DD3-2B6C8CA57E02@gmx.net> <1362057295.36069.YahooMailNeo@web31809.mail.mud.yahoo.com>
In-Reply-To: <1362057295.36069.YahooMailNeo@web31809.mail.mud.yahoo.com>
Content-Type: multipart/alternative; boundary="------------050206090801030609090305"
X-Originating-IP: [129.83.31.58]
Cc: "oauth@ietf.org" <oauth@ietf.org>
Subject: Re: [OAUTH-WG] I-D Action: draft-ietf-oauth-v2-http-mac-03.txt
X-BeenThere: oauth@ietf.org
X-Mailman-Version: 2.1.12
Precedence: list
List-Id: OAUTH WG <oauth.ietf.org>
List-Unsubscribe: <https://www.ietf.org/mailman/options/oauth>, <mailto:oauth-request@ietf.org?subject=unsubscribe>
List-Archive: <http://www.ietf.org/mail-archive/web/oauth>
List-Post: <mailto:oauth@ietf.org>
List-Help: <mailto:oauth-request@ietf.org?subject=help>
List-Subscribe: <https://www.ietf.org/mailman/listinfo/oauth>, <mailto:oauth-request@ietf.org?subject=subscribe>
X-List-Received-Date: Thu, 28 Feb 2013 17:09:50 -0000

--------------050206090801030609090305
Content-Type: text/plain; charset="ISO-8859-1"; format=flowed
Content-Transfer-Encoding: 7bit

What I don't quite get is what exactly would be presented and processed 
at each step. Who needs to know what piece? We don't want to have to 
push everything into JSON for the signing to take place (that much is 
clear), and we don't want the client to be pushing the MAC secret to the 
RS every time (that would make it a lot less secret, after all). But if 
we can reuse JWT, JWS, and other JOSE mechanisms to make some parts of 
the MAC pattern easier for programmers, I'm for it.

  -- Justin

On 02/28/2013 08:14 AM, William Mills wrote:
> I'm actually advocating that we change MAC to be a JWT extension.
>
> ------------------------------------------------------------------------
> *From:* Hannes Tschofenig <hannes.tschofenig@gmx.net>
> *To:* William Mills <wmills_92105@yahoo.com>
> *Cc:* Hannes Tschofenig <hannes.tschofenig@gmx.net>; "oauth@ietf.org" 
> <oauth@ietf.org>
> *Sent:* Thursday, February 28, 2013 2:28 AM
> *Subject:* Re: [OAUTH-WG] I-D Action: draft-ietf-oauth-v2-http-mac-03.txt
>
> Hi Bill,
>
> I believe you are misreading the document. In 
> draft-ietf-oauth-v2-http-mac the client still uses the MAC when it 
> accesses a protected resource.
> The only place where the JWT comes into the picture is with the 
> description of the access token. This matters from a key distribution 
> point of view. The session key for the MAC is included in the 
> encrypted JWT. The JWT is encrypted by the authorization server and 
> decrypted by the resource server.
>
> Information about how header fields get included in the MAC is 
> described in Section 5.
>
> The nonce isn't killed it is just called differently: seq-nr. The 
> stuff in the original MAC specification actually wasn't a nonce (from 
> the semantic point of view).
> The extension parameter is there implicitly by allowing additional 
> header fields to be included in the MAC computation.
>
> I need to look at the port number field again.
>
> Ciao
> Hannes
>
> On Feb 27, 2013, at 11:12 AM, William Mills wrote:
>
> > Just read the draft quickly.
> >
> > Since we're now leaning on JWT do we need to include the token in 
> this?  Why not just make an additional "Envelope MAC" thing and have 
> the signature include the 3 JWT parts in the signature base string?  
> That object then just becomes a JSON container for the kid, timestamp, 
> signature method, signature etc. That thing then is a 4th base64 
> encoded JSON thing in the auth header.
> >
> > How header fields get included in the signature needs definition.
> >
> > Why did you kill the port number, nonce, and extension parameter out 
> of the signature base string?
> >
> > The BNF appears to have no separators between values.
> >
> > -bill
> >
> >
> > From: "internet-drafts@ietf.org <mailto:internet-drafts@ietf.org>" 
> <internet-drafts@ietf.org <mailto:internet-drafts@ietf.org>>
> > To: i-d-announce@ietf.org <mailto:i-d-announce@ietf.org>
> > Cc: oauth@ietf.org <mailto:oauth@ietf.org>
> > Sent: Monday, February 25, 2013 4:46 AM
> > Subject: [OAUTH-WG] I-D Action: draft-ietf-oauth-v2-http-mac-03.txt
> >
> >
> > A New Internet-Draft is available from the on-line Internet-Drafts 
> directories.
> > This draft is a work item of the Web Authorization Protocol Working 
> Group of the IETF.
> >
> >    Title          : OAuth 2.0 Message Authentication Code (MAC) Tokens
> >    Author(s)      : Justin Richer
> >                          William Mills
> >                          Hannes Tschofenig
> >    Filename        : draft-ietf-oauth-v2-http-mac-03.txt
> >    Pages          : 26
> >    Date            : 2013-02-25
> >
> > Abstract:
> >  This specification describes how to use MAC Tokens in HTTP requests
> >  to access OAuth 2.0 protected resources.  An OAuth client willing to
> >  access a protected resource needs to demonstrate possession of a
> >  crytographic key by using it with a keyed message digest function to
> >  the request.
> >
> >  The document also defines a key distribution protocol for obtaining a
> >  fresh session key.
> >
> >
> > The IETF datatracker status page for this draft is:
> > https://datatracker.ietf.org/doc/draft-ietf-oauth-v2-http-mac
> >
> > There's also a htmlized version available at:
> > http://tools.ietf.org/html/draft-ietf-oauth-v2-http-mac-03
> >
> > A diff from the previous version is available at:
> > http://www.ietf.org/rfcdiff?url2=draft-ietf-oauth-v2-http-mac-03
> >
> >
> > Internet-Drafts are also available by anonymous FTP at:
> > ftp://ftp.ietf.org/internet-drafts/
> >
> > _______________________________________________
> > OAuth mailing list
> > OAuth@ietf.org <mailto:OAuth@ietf.org>
> > https://www.ietf.org/mailman/listinfo/oauth
> >
> >
>
>
>
>
>
> _______________________________________________
> OAuth mailing list
> OAuth@ietf.org
> https://www.ietf.org/mailman/listinfo/oauth


--------------050206090801030609090305
Content-Type: text/html; charset="ISO-8859-1"
Content-Transfer-Encoding: 7bit

<html>
  <head>
    <meta content="text/html; charset=ISO-8859-1"
      http-equiv="Content-Type">
  </head>
  <body bgcolor="#FFFFFF" text="#000000">
    What I don't quite get is what exactly would be presented and
    processed at each step. Who needs to know what piece? We don't want
    to have to push everything into JSON for the signing to take place
    (that much is clear), and we don't want the client to be pushing the
    MAC secret to the RS every time (that would make it a lot less
    secret, after all). But if we can reuse JWT, JWS, and other JOSE
    mechanisms to make some parts of the MAC pattern easier for
    programmers, I'm for it.<br>
    <br>
    &nbsp;-- Justin<br>
    <br>
    <div class="moz-cite-prefix">On 02/28/2013 08:14 AM, William Mills
      wrote:<br>
    </div>
    <blockquote
      cite="mid:1362057295.36069.YahooMailNeo@web31809.mail.mud.yahoo.com"
      type="cite">
      <meta http-equiv="Content-Type" content="text/html;
        charset=ISO-8859-1">
      <div style="color:#000; background-color:#fff; font-family:Courier
        New, courier, monaco, monospace, sans-serif;font-size:12pt">
        <div><span>I'm actually advocating that we change MAC to be a
            JWT extension.</span></div>
        <div><br>
        </div>
        <div style="font-family: 'Courier New', courier, monaco,
          monospace, sans-serif; font-size: 12pt;">
          <div style="font-family: 'times new roman', 'new york', times,
            serif; font-size: 12pt;">
            <div dir="ltr"> <font face="Arial" size="2">
                <hr size="1"> <b><span style="font-weight:bold;">From:</span></b>
                Hannes Tschofenig <a class="moz-txt-link-rfc2396E" href="mailto:hannes.tschofenig@gmx.net">&lt;hannes.tschofenig@gmx.net&gt;</a><br>
                <b><span style="font-weight: bold;">To:</span></b>
                William Mills <a class="moz-txt-link-rfc2396E" href="mailto:wmills_92105@yahoo.com">&lt;wmills_92105@yahoo.com&gt;</a> <br>
                <b><span style="font-weight: bold;">Cc:</span></b>
                Hannes Tschofenig <a class="moz-txt-link-rfc2396E" href="mailto:hannes.tschofenig@gmx.net">&lt;hannes.tschofenig@gmx.net&gt;</a>;
                <a class="moz-txt-link-rfc2396E" href="mailto:oauth@ietf.org">"oauth@ietf.org"</a> <a class="moz-txt-link-rfc2396E" href="mailto:oauth@ietf.org">&lt;oauth@ietf.org&gt;</a> <br>
                <b><span style="font-weight: bold;">Sent:</span></b>
                Thursday, February 28, 2013 2:28 AM<br>
                <b><span style="font-weight: bold;">Subject:</span></b>
                Re: [OAUTH-WG] I-D Action:
                draft-ietf-oauth-v2-http-mac-03.txt<br>
              </font> </div>
            <br>
            Hi Bill, <br>
            <br>
            I believe you are misreading the document. In
            draft-ietf-oauth-v2-http-mac the client still uses the MAC
            when it accesses a protected resource. <br>
            The only place where the JWT comes into the picture is with
            the description of the access token. This matters from a key
            distribution point of view. The session key for the MAC is
            included in the encrypted JWT. The JWT is encrypted by the
            authorization server and decrypted by the resource server. <br>
            <br>
            Information about how header fields get included in the MAC
            is described in Section 5.<br>
            <br>
            The nonce isn't killed it is just called differently:
            seq-nr. The stuff in the original MAC specification actually
            wasn't a nonce (from the semantic point of view). <br>
            The extension parameter is there implicitly by allowing
            additional header fields to be included in the MAC
            computation.<br>
            <br>
            I need to look at the port number field again. <br>
            <br>
            Ciao<br>
            Hannes<br>
            <br>
            On Feb 27, 2013, at 11:12 AM, William Mills wrote:<br>
            <br>
            &gt; Just read the draft quickly.&nbsp; <br>
            &gt; <br>
            &gt; Since we're now leaning on JWT do we need to include
            the token in this?&nbsp; Why not just make an additional
            "Envelope MAC" thing and have the signature include the 3
            JWT parts in the signature base string?&nbsp; That object then
            just becomes a JSON container for the kid, timestamp,
            signature method, signature etc. That thing then is a 4th
            base64 encoded JSON thing in the auth header.<br>
            &gt; <br>
            &gt; How header fields get included in the signature needs
            definition.<br>
            &gt; <br>
            &gt; Why did you kill the port number, nonce, and extension
            parameter out of the signature base string?<br>
            &gt; <br>
            &gt; The BNF appears to have no separators between values.<br>
            &gt; <br>
            &gt; -bill<br>
            &gt; <br>
            &gt; <br>
            &gt; From: "<a moz-do-not-send="true"
              ymailto="mailto:internet-drafts@ietf.org"
              href="mailto:internet-drafts@ietf.org">internet-drafts@ietf.org</a>"
            &lt;<a moz-do-not-send="true"
              ymailto="mailto:internet-drafts@ietf.org"
              href="mailto:internet-drafts@ietf.org">internet-drafts@ietf.org</a>&gt;<br>
            &gt; To: <a moz-do-not-send="true"
              ymailto="mailto:i-d-announce@ietf.org"
              href="mailto:i-d-announce@ietf.org">i-d-announce@ietf.org</a>
            <br>
            &gt; Cc: <a moz-do-not-send="true"
              ymailto="mailto:oauth@ietf.org"
              href="mailto:oauth@ietf.org">oauth@ietf.org</a> <br>
            &gt; Sent: Monday, February 25, 2013 4:46 AM<br>
            &gt; Subject: [OAUTH-WG] I-D Action:
            draft-ietf-oauth-v2-http-mac-03.txt<br>
            &gt; <br>
            &gt; <br>
            &gt; A New Internet-Draft is available from the on-line
            Internet-Drafts directories.<br>
            &gt; This draft is a work item of the Web Authorization
            Protocol Working Group of the IETF.<br>
            &gt; <br>
            &gt;&nbsp; &nbsp; Title&nbsp; &nbsp; &nbsp; &nbsp; &nbsp; : OAuth 2.0 Message Authentication
            Code (MAC) Tokens<br>
            &gt;&nbsp; &nbsp; Author(s)&nbsp; &nbsp; &nbsp; : Justin Richer<br>
            &gt;&nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; William Mills<br>
            &gt;&nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; Hannes Tschofenig<br>
            &gt;&nbsp; &nbsp; Filename&nbsp; &nbsp; &nbsp; &nbsp; :
            draft-ietf-oauth-v2-http-mac-03.txt<br>
            &gt;&nbsp; &nbsp; Pages&nbsp; &nbsp; &nbsp; &nbsp; &nbsp; : 26<br>
            &gt;&nbsp; &nbsp; Date&nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; : 2013-02-25<br>
            &gt; <br>
            &gt; Abstract:<br>
            &gt;&nbsp; This specification describes how to use MAC Tokens in
            HTTP requests<br>
            &gt;&nbsp; to access OAuth 2.0 protected resources.&nbsp; An OAuth
            client willing to<br>
            &gt;&nbsp; access a protected resource needs to demonstrate
            possession of a<br>
            &gt;&nbsp; crytographic key by using it with a keyed message
            digest function to<br>
            &gt;&nbsp; the request.<br>
            &gt; <br>
            &gt;&nbsp; The document also defines a key distribution protocol
            for obtaining a<br>
            &gt;&nbsp; fresh session key.<br>
            &gt; <br>
            &gt; <br>
            &gt; The IETF datatracker status page for this draft is:<br>
            &gt; <a moz-do-not-send="true"
              href="https://datatracker.ietf.org/doc/draft-ietf-oauth-v2-http-mac"
              target="_blank">https://datatracker.ietf.org/doc/draft-ietf-oauth-v2-http-mac</a><br>
            &gt; <br>
            &gt; There's also a htmlized version available at:<br>
            &gt;
            <a class="moz-txt-link-freetext" href="http://tools.ietf.org/html/draft-ietf-oauth-v2-http-mac-03">http://tools.ietf.org/html/draft-ietf-oauth-v2-http-mac-03</a><br>
            &gt; <br>
            &gt; A diff from the previous version is available at:<br>
            &gt;
            <a class="moz-txt-link-freetext" href="http://www.ietf.org/rfcdiff?url2=draft-ietf-oauth-v2-http-mac-03">http://www.ietf.org/rfcdiff?url2=draft-ietf-oauth-v2-http-mac-03</a><br>
            &gt; <br>
            &gt; <br>
            &gt; Internet-Drafts are also available by anonymous FTP at:<br>
            &gt; <a moz-do-not-send="true"
              href="ftp://ftp.ietf.org/internet-drafts/" target="_blank">ftp://ftp.ietf.org/internet-drafts/</a><br>
            &gt; <br>
            &gt; _______________________________________________<br>
            &gt; OAuth mailing list<br>
            &gt; <a moz-do-not-send="true"
              ymailto="mailto:OAuth@ietf.org"
              href="mailto:OAuth@ietf.org">OAuth@ietf.org</a><br>
            &gt; <a moz-do-not-send="true"
              href="https://www.ietf.org/mailman/listinfo/oauth"
              target="_blank">https://www.ietf.org/mailman/listinfo/oauth</a><br>
            &gt; <br>
            &gt; <br>
            <br>
            <br>
            <br>
          </div>
        </div>
      </div>
      <br>
      <fieldset class="mimeAttachmentHeader"></fieldset>
      <br>
      <pre wrap="">_______________________________________________
OAuth mailing list
<a class="moz-txt-link-abbreviated" href="mailto:OAuth@ietf.org">OAuth@ietf.org</a>
<a class="moz-txt-link-freetext" href="https://www.ietf.org/mailman/listinfo/oauth">https://www.ietf.org/mailman/listinfo/oauth</a>
</pre>
    </blockquote>
    <br>
  </body>
</html>

--------------050206090801030609090305--

From ve7jtb@ve7jtb.com  Thu Feb 28 09:23:27 2013
Return-Path: <ve7jtb@ve7jtb.com>
X-Original-To: oauth@ietfa.amsl.com
Delivered-To: oauth@ietfa.amsl.com
Received: from localhost (localhost [127.0.0.1]) by ietfa.amsl.com (Postfix) with ESMTP id 0AE8821F8B04 for <oauth@ietfa.amsl.com>; Thu, 28 Feb 2013 09:23:27 -0800 (PST)
X-Virus-Scanned: amavisd-new at amsl.com
X-Spam-Flag: NO
X-Spam-Score: -2.371
X-Spam-Level: 
X-Spam-Status: No, score=-2.371 tagged_above=-999 required=5 tests=[AWL=-1.227, BAYES_00=-2.599, FRT_ADOBE2=2.455, RCVD_IN_DNSWL_LOW=-1]
Received: from mail.ietf.org ([64.170.98.30]) by localhost (ietfa.amsl.com [127.0.0.1]) (amavisd-new, port 10024) with ESMTP id pyKrIXeBeRVy for <oauth@ietfa.amsl.com>; Thu, 28 Feb 2013 09:23:25 -0800 (PST)
Received: from mail-pb0-f53.google.com (mail-pb0-f53.google.com [209.85.160.53]) by ietfa.amsl.com (Postfix) with ESMTP id 88B4A21F8AC3 for <oauth@ietf.org>; Thu, 28 Feb 2013 09:23:25 -0800 (PST)
Received: by mail-pb0-f53.google.com with SMTP id un1so1193756pbc.12 for <oauth@ietf.org>; Thu, 28 Feb 2013 09:23:25 -0800 (PST)
X-Google-DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=google.com; s=20120113; h=x-received:content-type:mime-version:subject:from:in-reply-to:date :cc:message-id:references:to:x-mailer:x-gm-message-state; bh=Ao98uxVG8wm/54d16hqL4gwqsND8SRze0C0ReJ9B/6k=; b=V5mefsLY6mScswsBN6gVNaYvYBnIpM8HWi6ovhFNIo60vGOzjQyzDSawG1eVhY8fpG SHgO7KoiYikxhwR2TYIQ6QBO22Y6L94oMSs1LAg8yO2+HNGjvWig2lBgkjLy/5vtHzR2 R6/+he8jdFhPwkxBCWnQPkuoZQHin7aFdAoBeC77Zsz4DR2v9ehyvRtrEsr1x+pIoA2M WaOTma/hqpHN0F9jzMv+24ns7U7vROmyrBt0nzXS430YEpc+ZVrCrMppwwCxKdZbfomu cczq08c4TzM4ysP76XaI7rAgzqrjY5M6viBlhllopSU7mVzed3WwNoG9XXlOHY+OXMg9 Qhag==
X-Received: by 10.66.158.230 with SMTP id wx6mr14166997pab.147.1362072205243;  Thu, 28 Feb 2013 09:23:25 -0800 (PST)
Received: from [192.168.41.99] (ip-64-134-220-138.public.wayport.net. [64.134.220.138]) by mx.google.com with ESMTPS id pn9sm8976855pbb.22.2013.02.28.09.23.22 (version=TLSv1 cipher=ECDHE-RSA-RC4-SHA bits=128/128); Thu, 28 Feb 2013 09:23:23 -0800 (PST)
Content-Type: multipart/signed; boundary="Apple-Mail=_DB38E877-9011-49F7-A88E-0C87BCC6708B"; protocol="application/pkcs7-signature"; micalg=sha1
Mime-Version: 1.0 (Mac OS X Mail 6.2 \(1499\))
From: John Bradley <ve7jtb@ve7jtb.com>
In-Reply-To: <98272BAD-131B-4151-BBB8-0937E8D6781A@adobe.com>
Date: Thu, 28 Feb 2013 09:23:20 -0800
Message-Id: <0F47E4EE-7482-45C9-B0C4-D8B0A21E63AF@ve7jtb.com>
References: <20130225124642.7425.65145.idtracker@ietfa.amsl.com> <1361956373.9883.YahooMailNeo@web31807.mail.mud.yahoo.com> <21030204-8EA7-4FB0-9DD3-2B6C8CA57E02@gmx.net> <98272BAD-131B-4151-BBB8-0937E8D6781A@adobe.com>
To: Antonio Sanso <asanso@adobe.com>
X-Mailer: Apple Mail (2.1499)
X-Gm-Message-State: ALoCoQltgOXCsg+pNUnwZhcWxUFyxV5IDwWxnXxK/XtehWH4aj4RLsaLMjv2SfDIOaTzdheIUdRh
Cc: "oauth@ietf.org" <oauth@ietf.org>
Subject: Re: [OAUTH-WG] I-D Action: draft-ietf-oauth-v2-http-mac-03.txt
X-BeenThere: oauth@ietf.org
X-Mailman-Version: 2.1.12
Precedence: list
List-Id: OAUTH WG <oauth.ietf.org>
List-Unsubscribe: <https://www.ietf.org/mailman/options/oauth>, <mailto:oauth-request@ietf.org?subject=unsubscribe>
List-Archive: <http://www.ietf.org/mail-archive/web/oauth>
List-Post: <mailto:oauth@ietf.org>
List-Help: <mailto:oauth-request@ietf.org?subject=help>
List-Subscribe: <https://www.ietf.org/mailman/listinfo/oauth>, <mailto:oauth-request@ietf.org?subject=subscribe>
X-List-Received-Date: Thu, 28 Feb 2013 17:23:27 -0000

--Apple-Mail=_DB38E877-9011-49F7-A88E-0C87BCC6708B
Content-Transfer-Encoding: quoted-printable
Content-Type: text/plain;
	charset=us-ascii

The communication between AS and RS is not direct it is through the =
client in this case.   If TLS covers all the connections and is =
sufficient you probably don't need MAC:)

If you were to send the symmetric key in the JWT unencrypted than there =
is no real point in signing anything as any one intercepting the request =
can just sign a new one.

For symmetric keys being distributed through the access token the key =
needs to be encrypted to the intended RS to provide value.

John B.

On 2013-02-28, at 2:37 AM, Antonio Sanso <asanso@adobe.com> wrote:

> Hi Hannes,
>=20
> apologies if I do the same question again but there is still one point =
that is a little obscure to me.
>=20
> As long I did understand the situation for MAC is the following one.
>=20
> The communication between the client and the authentication server =
must be https but this is not true for the communication between =
authentication server and resource server.
> Hence the need of this key exchange.
>=20
> Is it correct? Should be the case why we do not have the same problem =
in the JWT Bearer case? Is because in that case https is as well =
mandatory between authentication server and resource server?
>=20
> Thanks a lot and regards
>=20
> Antonio
>=20
>=20
> On Feb 28, 2013, at 11:28 AM, Hannes Tschofenig wrote:
>=20
>> Hi Bill,=20
>>=20
>> I believe you are misreading the document. In =
draft-ietf-oauth-v2-http-mac the client still uses the MAC when it =
accesses a protected resource.=20
>> The only place where the JWT comes into the picture is with the =
description of the access token. This matters from a key distribution =
point of view. The session key for the MAC is included in the encrypted =
JWT. The JWT is encrypted by the authorization server and decrypted by =
the resource server.=20
>>=20
>> Information about how header fields get included in the MAC is =
described in Section 5.
>>=20
>> The nonce isn't killed it is just called differently: seq-nr. The =
stuff in the original MAC specification actually wasn't a nonce (from =
the semantic point of view).=20
>> The extension parameter is there implicitly by allowing additional =
header fields to be included in the MAC computation.
>>=20
>> I need to look at the port number field again.=20
>>=20
>> Ciao
>> Hannes
>>=20
>> On Feb 27, 2013, at 11:12 AM, William Mills wrote:
>>=20
>>> Just read the draft quickly. =20
>>>=20
>>> Since we're now leaning on JWT do we need to include the token in =
this?  Why not just make an additional "Envelope MAC" thing and have the =
signature include the 3 JWT parts in the signature base string?  That =
object then just becomes a JSON container for the kid, timestamp, =
signature method, signature etc. That thing then is a 4th base64 encoded =
JSON thing in the auth header.
>>>=20
>>> How header fields get included in the signature needs definition.
>>>=20
>>> Why did you kill the port number, nonce, and extension parameter out =
of the signature base string?
>>>=20
>>> The BNF appears to have no separators between values.
>>>=20
>>> -bill
>>>=20
>>>=20
>>> From: "internet-drafts@ietf.org" <internet-drafts@ietf.org>
>>> To: i-d-announce@ietf.org=20
>>> Cc: oauth@ietf.org=20
>>> Sent: Monday, February 25, 2013 4:46 AM
>>> Subject: [OAUTH-WG] I-D Action: draft-ietf-oauth-v2-http-mac-03.txt
>>>=20
>>>=20
>>> A New Internet-Draft is available from the on-line Internet-Drafts =
directories.
>>> This draft is a work item of the Web Authorization Protocol Working =
Group of the IETF.
>>>=20
>>>   Title          : OAuth 2.0 Message Authentication Code (MAC) =
Tokens
>>>   Author(s)      : Justin Richer
>>>                         William Mills
>>>                         Hannes Tschofenig
>>>   Filename        : draft-ietf-oauth-v2-http-mac-03.txt
>>>   Pages          : 26
>>>   Date            : 2013-02-25
>>>=20
>>> Abstract:
>>> This specification describes how to use MAC Tokens in HTTP requests
>>> to access OAuth 2.0 protected resources.  An OAuth client willing to
>>> access a protected resource needs to demonstrate possession of a
>>> crytographic key by using it with a keyed message digest function to
>>> the request.
>>>=20
>>> The document also defines a key distribution protocol for obtaining =
a
>>> fresh session key.
>>>=20
>>>=20
>>> The IETF datatracker status page for this draft is:
>>> https://datatracker.ietf.org/doc/draft-ietf-oauth-v2-http-mac
>>>=20
>>> There's also a htmlized version available at:
>>> http://tools.ietf.org/html/draft-ietf-oauth-v2-http-mac-03
>>>=20
>>> A diff from the previous version is available at:
>>> http://www.ietf.org/rfcdiff?url2=3Ddraft-ietf-oauth-v2-http-mac-03
>>>=20
>>>=20
>>> Internet-Drafts are also available by anonymous FTP at:
>>> ftp://ftp.ietf.org/internet-drafts/
>>>=20
>>> _______________________________________________
>>> OAuth mailing list
>>> OAuth@ietf.org
>>> https://www.ietf.org/mailman/listinfo/oauth
>>>=20
>>>=20
>>=20
>> _______________________________________________
>> OAuth mailing list
>> OAuth@ietf.org
>> https://www.ietf.org/mailman/listinfo/oauth
>=20
> _______________________________________________
> OAuth mailing list
> OAuth@ietf.org
> https://www.ietf.org/mailman/listinfo/oauth


--Apple-Mail=_DB38E877-9011-49F7-A88E-0C87BCC6708B
Content-Disposition: attachment;
	filename=smime.p7s
Content-Type: application/pkcs7-signature;
	name=smime.p7s
Content-Transfer-Encoding: base64
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--Apple-Mail=_DB38E877-9011-49F7-A88E-0C87BCC6708B--

From phil.hunt@oracle.com  Thu Feb 28 09:27:32 2013
Return-Path: <phil.hunt@oracle.com>
X-Original-To: oauth@ietfa.amsl.com
Delivered-To: oauth@ietfa.amsl.com
Received: from localhost (localhost [127.0.0.1]) by ietfa.amsl.com (Postfix) with ESMTP id 9526921F89C0 for <oauth@ietfa.amsl.com>; Thu, 28 Feb 2013 09:27:32 -0800 (PST)
X-Virus-Scanned: amavisd-new at amsl.com
X-Spam-Flag: NO
X-Spam-Score: -5.202
X-Spam-Level: 
X-Spam-Status: No, score=-5.202 tagged_above=-999 required=5 tests=[BAYES_00=-2.599, HTML_MESSAGE=0.001, MIME_QP_LONG_LINE=1.396, RCVD_IN_DNSWL_MED=-4]
Received: from mail.ietf.org ([64.170.98.30]) by localhost (ietfa.amsl.com [127.0.0.1]) (amavisd-new, port 10024) with ESMTP id l5S7iV+UWhKt for <oauth@ietfa.amsl.com>; Thu, 28 Feb 2013 09:27:31 -0800 (PST)
Received: from aserp1040.oracle.com (aserp1040.oracle.com [141.146.126.69]) by ietfa.amsl.com (Postfix) with ESMTP id 9513721F88CF for <oauth@ietf.org>; Thu, 28 Feb 2013 09:27:31 -0800 (PST)
Received: from acsinet22.oracle.com (acsinet22.oracle.com [141.146.126.238]) by aserp1040.oracle.com (Sentrion-MTA-4.3.1/Sentrion-MTA-4.3.1) with ESMTP id r1SHRUhN015008 (version=TLSv1/SSLv3 cipher=DHE-RSA-AES256-SHA bits=256 verify=OK); Thu, 28 Feb 2013 17:27:30 GMT
Received: from acsmt358.oracle.com (acsmt358.oracle.com [141.146.40.158]) by acsinet22.oracle.com (8.14.4+Sun/8.14.4) with ESMTP id r1SHRT4N024940 (version=TLSv1/SSLv3 cipher=DHE-RSA-AES256-SHA bits=256 verify=NO); Thu, 28 Feb 2013 17:27:29 GMT
Received: from abhmt109.oracle.com (abhmt109.oracle.com [141.146.116.61]) by acsmt358.oracle.com (8.12.11.20060308/8.12.11) with ESMTP id r1SHRT4W020042; Thu, 28 Feb 2013 11:27:29 -0600
Received: from [25.73.5.188] (/74.198.150.188) by default (Oracle Beehive Gateway v4.0) with ESMTP ; Thu, 28 Feb 2013 09:27:29 -0800
References: <0EC2404F-E3C5-4AD1-88B4-E74AA0394DD9@gmx.net> <C75E4871-E907-4EF7-BAF0-9D1A172D581B@ve7jtb.com> <CA6A6425-D0CE-469F-B51E-9F296DA8041C@oracle.com> <CA+k3eCREgN+6z+U=jjJcPo0nZVR0GWn5zXeecZRO+rg=xd-gZg@mail.gmail.com>
Mime-Version: 1.0 (1.0)
In-Reply-To: <CA+k3eCREgN+6z+U=jjJcPo0nZVR0GWn5zXeecZRO+rg=xd-gZg@mail.gmail.com>
Content-Type: multipart/alternative; boundary=Apple-Mail-691D97B1-1920-4E15-898E-694D86016413
Content-Transfer-Encoding: 7bit
Message-Id: <39016EC6-D3E3-4812-9825-B1C95A5D9AED@oracle.com>
X-Mailer: iPhone Mail (10B146)
From: Phil Hunt <phil.hunt@oracle.com>
Date: Thu, 28 Feb 2013 09:27:22 -0800
To: Brian Campbell <bcampbell@pingidentity.com>
X-Source-IP: acsinet22.oracle.com [141.146.126.238]
Cc: "oauth@ietf.org WG" <oauth@ietf.org>
Subject: Re: [OAUTH-WG] JWT - scope claim missing
X-BeenThere: oauth@ietf.org
X-Mailman-Version: 2.1.12
Precedence: list
List-Id: OAUTH WG <oauth.ietf.org>
List-Unsubscribe: <https://www.ietf.org/mailman/options/oauth>, <mailto:oauth-request@ietf.org?subject=unsubscribe>
List-Archive: <http://www.ietf.org/mail-archive/web/oauth>
List-Post: <mailto:oauth@ietf.org>
List-Help: <mailto:oauth-request@ietf.org?subject=help>
List-Subscribe: <https://www.ietf.org/mailman/listinfo/oauth>, <mailto:oauth-request@ietf.org?subject=subscribe>
X-List-Received-Date: Thu, 28 Feb 2013 17:27:32 -0000

--Apple-Mail-691D97B1-1920-4E15-898E-694D86016413
Content-Type: text/plain;
	charset=us-ascii
Content-Transfer-Encoding: quoted-printable

Am I missing something. JWT is firstly an oauth spec. Otherwise why isnt it i=
n jose wg?

Phil

Sent from my phone.

On 2013-02-28, at 8:44, Brian Campbell <bcampbell@pingidentity.com> wrote:

> I think John's point was more that scope is something rather specific to a=
n OAuth access token and, while JWT is can be used to represent an access to=
ken, it's not the only application of JWT. The 'standard' claims in JWT are t=
hose that are believed (right or wrong) to be widely applicable across diffe=
rent applications of JWT. One could argue about it but scope is probably not=
 one of those.
>=20
> It would probably make sense to try and build a profile of JWT specificall=
y for OAuth access tokens (though I suspect there are some turtles and drago=
ns in there), which might be the appropriate place to define/register a scop=
e claim.
>=20
>=20
> On Thu, Feb 28, 2013 at 9:24 AM, Phil Hunt <phil.hunt@oracle.com> wrote:
>> Are you advocating TWO systems? That seems like a bad choice.
>>=20
>> I would rather fix scope than go to a two system approach.
>>=20
>> Phil
>>=20
>> Sent from my phone.
>>=20
>> On 2013-02-28, at 8:17, John Bradley <ve7jtb@ve7jtb.com> wrote:
>>=20
>> > While scope is one method that a AS could communicate authorization to a=
 RS, it is not the only or perhaps even the most likely one.
>> > Using scope requires a relatively tight binding between the RS and AS, =
 UMA uses a different mechanism that describes finer grained operations.
>> > The AS may include roles, user, or other more abstract claims that the t=
he client may (god help them) pass on to EXCML for processing.
>> >
>> > While having a scopes claim is possible, like any other claim it is not=
 part of the JWT core security processing claims, and needs to be defined by=
 extension.
>> >
>> > John B.
>> > On 2013-02-28, at 2:29 AM, Hannes Tschofenig <hannes.tschofenig@gmx.net=
> wrote:
>> >
>> >> Hi Mike,
>> >>
>> >> when I worked on the MAC specification I noticed that the JWT does not=
 have a claim for the scope. I believe that this would be needed to allow th=
e resource server to verify whether the scope the authorization server autho=
rized is indeed what the client is asking for.
>> >>
>> >> Ciao
>> >> Hannes
>> >>
>> >> _______________________________________________
>> >> OAuth mailing list
>> >> OAuth@ietf.org
>> >> https://www.ietf.org/mailman/listinfo/oauth
>> >
>> > _______________________________________________
>> > OAuth mailing list
>> > OAuth@ietf.org
>> > https://www.ietf.org/mailman/listinfo/oauth
>> _______________________________________________
>> OAuth mailing list
>> OAuth@ietf.org
>> https://www.ietf.org/mailman/listinfo/oauth
>=20

--Apple-Mail-691D97B1-1920-4E15-898E-694D86016413
Content-Type: text/html;
	charset=utf-8
Content-Transfer-Encoding: 7bit

<html><head><meta http-equiv="content-type" content="text/html; charset=utf-8"></head><body dir="auto"><div>Am I missing something. JWT is firstly an oauth spec. Otherwise why isnt it in jose wg?<br><br>Phil<div><br></div><div>Sent from my phone.</div></div><div><br>On 2013-02-28, at 8:44, Brian Campbell &lt;<a href="mailto:bcampbell@pingidentity.com">bcampbell@pingidentity.com</a>&gt; wrote:<br><br></div><blockquote type="cite"><div><div dir="ltr"><div>I think John's point was more that scope is something rather specific to an OAuth access token and, while JWT is can be used to represent an access token, it's not the only application of JWT. The 'standard' claims in JWT are those that are believed (right or wrong) to be widely applicable across different applications of JWT. One could argue about it but scope is probably not one of those.<br>

<br></div>It would probably make sense to try and build a profile of JWT specifically for OAuth access tokens (though I suspect there are some turtles and dragons in there), which might be the appropriate place to define/register a scope claim.<br>


</div><div class="gmail_extra"><br><br><div class="gmail_quote">On Thu, Feb 28, 2013 at 9:24 AM, Phil Hunt <span dir="ltr">&lt;<a href="mailto:phil.hunt@oracle.com" target="_blank">phil.hunt@oracle.com</a>&gt;</span> wrote:<br>

<blockquote class="gmail_quote" style="margin:0 0 0 .8ex;border-left:1px #ccc solid;padding-left:1ex">Are you advocating TWO systems? That seems like a bad choice.<br>
<br>
I would rather fix scope than go to a two system approach.<br>
<br>
Phil<br>
<br>
Sent from my phone.<br>
<br>
On 2013-02-28, at 8:17, John Bradley &lt;<a href="mailto:ve7jtb@ve7jtb.com">ve7jtb@ve7jtb.com</a>&gt; wrote:<br>
<br>
&gt; While scope is one method that a AS could communicate authorization to a RS, it is not the only or perhaps even the most likely one.<br>
&gt; Using scope requires a relatively tight binding between the RS and AS, &nbsp;UMA uses a different mechanism that describes finer grained operations.<br>
&gt; The AS may include roles, user, or other more abstract claims that the the client may (god help them) pass on to EXCML for processing.<br>
&gt;<br>
&gt; While having a scopes claim is possible, like any other claim it is not part of the JWT core security processing claims, and needs to be defined by extension.<br>
&gt;<br>
&gt; John B.<br>
&gt; On 2013-02-28, at 2:29 AM, Hannes Tschofenig &lt;<a href="mailto:hannes.tschofenig@gmx.net">hannes.tschofenig@gmx.net</a>&gt; wrote:<br>
&gt;<br>
&gt;&gt; Hi Mike,<br>
&gt;&gt;<br>
&gt;&gt; when I worked on the MAC specification I noticed that the JWT does not have a claim for the scope. I believe that this would be needed to allow the resource server to verify whether the scope the authorization server authorized is indeed what the client is asking for.<br>


&gt;&gt;<br>
&gt;&gt; Ciao<br>
&gt;&gt; Hannes<br>
&gt;&gt;<br>
&gt;&gt; _______________________________________________<br>
&gt;&gt; OAuth mailing list<br>
&gt;&gt; <a href="mailto:OAuth@ietf.org">OAuth@ietf.org</a><br>
&gt;&gt; <a href="https://www.ietf.org/mailman/listinfo/oauth" target="_blank">https://www.ietf.org/mailman/listinfo/oauth</a><br>
&gt;<br>
&gt; _______________________________________________<br>
&gt; OAuth mailing list<br>
&gt; <a href="mailto:OAuth@ietf.org">OAuth@ietf.org</a><br>
&gt; <a href="https://www.ietf.org/mailman/listinfo/oauth" target="_blank">https://www.ietf.org/mailman/listinfo/oauth</a><br>
_______________________________________________<br>
OAuth mailing list<br>
<a href="mailto:OAuth@ietf.org">OAuth@ietf.org</a><br>
<a href="https://www.ietf.org/mailman/listinfo/oauth" target="_blank">https://www.ietf.org/mailman/listinfo/oauth</a><br>
</blockquote></div><br></div>
</div></blockquote></body></html>
--Apple-Mail-691D97B1-1920-4E15-898E-694D86016413--

From phil.hunt@oracle.com  Thu Feb 28 09:28:14 2013
Return-Path: <phil.hunt@oracle.com>
X-Original-To: oauth@ietfa.amsl.com
Delivered-To: oauth@ietfa.amsl.com
Received: from localhost (localhost [127.0.0.1]) by ietfa.amsl.com (Postfix) with ESMTP id 4086721F8BA1 for <oauth@ietfa.amsl.com>; Thu, 28 Feb 2013 09:28:14 -0800 (PST)
X-Virus-Scanned: amavisd-new at amsl.com
X-Spam-Flag: NO
X-Spam-Score: -5.202
X-Spam-Level: 
X-Spam-Status: No, score=-5.202 tagged_above=-999 required=5 tests=[BAYES_00=-2.599, HTML_MESSAGE=0.001, MIME_QP_LONG_LINE=1.396, RCVD_IN_DNSWL_MED=-4]
Received: from mail.ietf.org ([64.170.98.30]) by localhost (ietfa.amsl.com [127.0.0.1]) (amavisd-new, port 10024) with ESMTP id MdoQvowscl1N for <oauth@ietfa.amsl.com>; Thu, 28 Feb 2013 09:28:13 -0800 (PST)
Received: from aserp1040.oracle.com (aserp1040.oracle.com [141.146.126.69]) by ietfa.amsl.com (Postfix) with ESMTP id 1472721F8B8F for <oauth@ietf.org>; Thu, 28 Feb 2013 09:28:09 -0800 (PST)
Received: from acsinet22.oracle.com (acsinet22.oracle.com [141.146.126.238]) by aserp1040.oracle.com (Sentrion-MTA-4.3.1/Sentrion-MTA-4.3.1) with ESMTP id r1SHS8JV015825 (version=TLSv1/SSLv3 cipher=DHE-RSA-AES256-SHA bits=256 verify=OK); Thu, 28 Feb 2013 17:28:08 GMT
Received: from acsmt356.oracle.com (acsmt356.oracle.com [141.146.40.156]) by acsinet22.oracle.com (8.14.4+Sun/8.14.4) with ESMTP id r1SHS7Rt026160 (version=TLSv1/SSLv3 cipher=DHE-RSA-AES256-SHA bits=256 verify=NO); Thu, 28 Feb 2013 17:28:07 GMT
Received: from abhmt109.oracle.com (abhmt109.oracle.com [141.146.116.61]) by acsmt356.oracle.com (8.12.11.20060308/8.12.11) with ESMTP id r1SHS7Rl006303; Thu, 28 Feb 2013 11:28:07 -0600
Received: from [25.73.5.188] (/74.198.150.188) by default (Oracle Beehive Gateway v4.0) with ESMTP ; Thu, 28 Feb 2013 09:28:07 -0800
References: <0EC2404F-E3C5-4AD1-88B4-E74AA0394DD9@gmx.net> <C75E4871-E907-4EF7-BAF0-9D1A172D581B@ve7jtb.com> <CA6A6425-D0CE-469F-B51E-9F296DA8041C@oracle.com> <CA+k3eCREgN+6z+U=jjJcPo0nZVR0GWn5zXeecZRO+rg=xd-gZg@mail.gmail.com> <A2375FE9-946F-46B3-9356-0709DD56BD4A@ve7jtb.com>
Mime-Version: 1.0 (1.0)
In-Reply-To: <A2375FE9-946F-46B3-9356-0709DD56BD4A@ve7jtb.com>
Content-Type: multipart/alternative; boundary=Apple-Mail-E01B3F4E-4353-4E42-8BE5-FEAB776E1BA2
Content-Transfer-Encoding: 7bit
Message-Id: <48FD87D1-4DF4-4289-99B7-40A515F31890@oracle.com>
X-Mailer: iPhone Mail (10B146)
From: Phil Hunt <phil.hunt@oracle.com>
Date: Thu, 28 Feb 2013 09:28:03 -0800
To: John Bradley <ve7jtb@ve7jtb.com>
X-Source-IP: acsinet22.oracle.com [141.146.126.238]
Cc: "oauth@ietf.org WG" <oauth@ietf.org>
Subject: Re: [OAUTH-WG] JWT - scope claim missing
X-BeenThere: oauth@ietf.org
X-Mailman-Version: 2.1.12
Precedence: list
List-Id: OAUTH WG <oauth.ietf.org>
List-Unsubscribe: <https://www.ietf.org/mailman/options/oauth>, <mailto:oauth-request@ietf.org?subject=unsubscribe>
List-Archive: <http://www.ietf.org/mail-archive/web/oauth>
List-Post: <mailto:oauth@ietf.org>
List-Help: <mailto:oauth-request@ietf.org?subject=help>
List-Subscribe: <https://www.ietf.org/mailman/listinfo/oauth>, <mailto:oauth-request@ietf.org?subject=subscribe>
X-List-Received-Date: Thu, 28 Feb 2013 17:28:14 -0000

--Apple-Mail-E01B3F4E-4353-4E42-8BE5-FEAB776E1BA2
Content-Type: text/plain;
	charset=us-ascii
Content-Transfer-Encoding: quoted-printable

Are you saying jwt is not an access token type?

Phil

Sent from my phone.

On 2013-02-28, at 8:58, John Bradley <ve7jtb@ve7jtb.com> wrote:

> Yes, defining scope in JWT is the wrong place.   JWT needs to stick to the=
 security claims needed to process JWT.
>=20
> I also don't know how far you get requiring a specific authorization forma=
t for JWT, some AS will wan to use a opaque reference, some might want to us=
e a user claim or role claim, others may use scopes,  combining scopes and c=
laims is also possible.
>=20
> Right now it is up to a AS RS pair to agree on how to communicate authoriz=
ation.   I don't want MAC to be more restrictive than bearer when it comes t=
o authorization between AS and RS.
>=20
> Hannes wanted to know why JWT didn't define scope.  The simple answer is t=
hat it is out of scope for JWT itself.   It might be defined in a OAuth acce=
ss token profile for JWT but it should not be specific to MAC.
>=20
> John B.
> On 2013-02-28, at 8:44 AM, Brian Campbell <bcampbell@pingidentity.com> wro=
te:
>=20
>> I think John's point was more that scope is something rather specific to a=
n OAuth access token and, while JWT is can be used to represent an access to=
ken, it's not the only application of JWT. The 'standard' claims in JWT are t=
hose that are believed (right or wrong) to be widely applicable across diffe=
rent applications of JWT. One could argue about it but scope is probably not=
 one of those.
>>=20
>> It would probably make sense to try and build a profile of JWT specifical=
ly for OAuth access tokens (though I suspect there are some turtles and drag=
ons in there), which might be the appropriate place to define/register a sco=
pe claim.
>>=20
>>=20
>> On Thu, Feb 28, 2013 at 9:24 AM, Phil Hunt <phil.hunt@oracle.com> wrote:
>>> Are you advocating TWO systems? That seems like a bad choice.
>>>=20
>>> I would rather fix scope than go to a two system approach.
>>>=20
>>> Phil
>>>=20
>>> Sent from my phone.
>>>=20
>>> On 2013-02-28, at 8:17, John Bradley <ve7jtb@ve7jtb.com> wrote:
>>>=20
>>> > While scope is one method that a AS could communicate authorization to=
 a RS, it is not the only or perhaps even the most likely one.
>>> > Using scope requires a relatively tight binding between the RS and AS,=
  UMA uses a different mechanism that describes finer grained operations.
>>> > The AS may include roles, user, or other more abstract claims that the=
 the client may (god help them) pass on to EXCML for processing.
>>> >
>>> > While having a scopes claim is possible, like any other claim it is no=
t part of the JWT core security processing claims, and needs to be defined b=
y extension.
>>> >
>>> > John B.
>>> > On 2013-02-28, at 2:29 AM, Hannes Tschofenig <hannes.tschofenig@gmx.ne=
t> wrote:
>>> >
>>> >> Hi Mike,
>>> >>
>>> >> when I worked on the MAC specification I noticed that the JWT does no=
t have a claim for the scope. I believe that this would be needed to allow t=
he resource server to verify whether the scope the authorization server auth=
orized is indeed what the client is asking for.
>>> >>
>>> >> Ciao
>>> >> Hannes
>>> >>
>>> >> _______________________________________________
>>> >> OAuth mailing list
>>> >> OAuth@ietf.org
>>> >> https://www.ietf.org/mailman/listinfo/oauth
>>> >
>>> > _______________________________________________
>>> > OAuth mailing list
>>> > OAuth@ietf.org
>>> > https://www.ietf.org/mailman/listinfo/oauth
>>> _______________________________________________
>>> OAuth mailing list
>>> OAuth@ietf.org
>>> https://www.ietf.org/mailman/listinfo/oauth
>=20

--Apple-Mail-E01B3F4E-4353-4E42-8BE5-FEAB776E1BA2
Content-Type: text/html;
	charset=utf-8
Content-Transfer-Encoding: quoted-printable

<html><head><meta http-equiv=3D"content-type" content=3D"text/html; charset=3D=
utf-8"></head><body dir=3D"auto"><div>Are you saying jwt is not an access to=
ken type?<br><br>Phil<div><br></div><div>Sent from my phone.</div></div><div=
><br>On 2013-02-28, at 8:58, John Bradley &lt;<a href=3D"mailto:ve7jtb@ve7jt=
b.com">ve7jtb@ve7jtb.com</a>&gt; wrote:<br><br></div><blockquote type=3D"cit=
e"><div><meta http-equiv=3D"Content-Type" content=3D"text/html charset=3Diso=
-8859-1">Yes, defining scope in JWT is the wrong place. &nbsp; JWT needs to s=
tick to the security claims needed to process JWT.<div><br></div><div>I also=
 don't know how far you get requiring a specific authorization format for JW=
T, some AS will wan to use a opaque reference, some might want to use a user=
 claim or role claim, others may use scopes, &nbsp;combining scopes and clai=
ms is also possible.</div><div><br></div><div>Right now it is up to a AS RS p=
air to agree on how to communicate authorization. &nbsp; I don't want MAC to=
 be more restrictive than bearer when it comes to authorization between AS a=
nd RS.<br><div><br></div><div>Hannes wanted to know why JWT didn't define sc=
ope. &nbsp;The simple answer is that it is out of scope for JWT itself. &nbs=
p; It might be defined in a OAuth access token profile for JWT but it should=
 not be specific to MAC.</div><div><br></div><div>John B.</div><div><div><di=
v>On 2013-02-28, at 8:44 AM, Brian Campbell &lt;<a href=3D"mailto:bcampbell@=
pingidentity.com">bcampbell@pingidentity.com</a>&gt; wrote:</div><br class=3D=
"Apple-interchange-newline"><blockquote type=3D"cite"><div dir=3D"ltr"><div>=
I think John's point was more that scope is something rather specific to an O=
Auth access token and, while JWT is can be used to represent an access token=
, it's not the only application of JWT. The 'standard' claims in JWT are tho=
se that are believed (right or wrong) to be widely applicable across differe=
nt applications of JWT. One could argue about it but scope is probably not o=
ne of those.<br>

<br></div>It would probably make sense to try and build a profile of JWT spe=
cifically for OAuth access tokens (though I suspect there are some turtles a=
nd dragons in there), which might be the appropriate place to define/registe=
r a scope claim.<br>


</div><div class=3D"gmail_extra"><br><br><div class=3D"gmail_quote">On Thu, =
Feb 28, 2013 at 9:24 AM, Phil Hunt <span dir=3D"ltr">&lt;<a href=3D"mailto:p=
hil.hunt@oracle.com" target=3D"_blank">phil.hunt@oracle.com</a>&gt;</span> w=
rote:<br>

<blockquote class=3D"gmail_quote" style=3D"margin:0 0 0 .8ex;border-left:1px=
 #ccc solid;padding-left:1ex">Are you advocating TWO systems? That seems lik=
e a bad choice.<br>
<br>
I would rather fix scope than go to a two system approach.<br>
<br>
Phil<br>
<br>
Sent from my phone.<br>
<br>
On 2013-02-28, at 8:17, John Bradley &lt;<a href=3D"mailto:ve7jtb@ve7jtb.com=
">ve7jtb@ve7jtb.com</a>&gt; wrote:<br>
<br>
&gt; While scope is one method that a AS could communicate authorization to a=
 RS, it is not the only or perhaps even the most likely one.<br>
&gt; Using scope requires a relatively tight binding between the RS and AS, &=
nbsp;UMA uses a different mechanism that describes finer grained operations.=
<br>
&gt; The AS may include roles, user, or other more abstract claims that the t=
he client may (god help them) pass on to EXCML for processing.<br>
&gt;<br>
&gt; While having a scopes claim is possible, like any other claim it is not=
 part of the JWT core security processing claims, and needs to be defined by=
 extension.<br>
&gt;<br>
&gt; John B.<br>
&gt; On 2013-02-28, at 2:29 AM, Hannes Tschofenig &lt;<a href=3D"mailto:hann=
es.tschofenig@gmx.net">hannes.tschofenig@gmx.net</a>&gt; wrote:<br>
&gt;<br>
&gt;&gt; Hi Mike,<br>
&gt;&gt;<br>
&gt;&gt; when I worked on the MAC specification I noticed that the JWT does n=
ot have a claim for the scope. I believe that this would be needed to allow t=
he resource server to verify whether the scope the authorization server auth=
orized is indeed what the client is asking for.<br>


&gt;&gt;<br>
&gt;&gt; Ciao<br>
&gt;&gt; Hannes<br>
&gt;&gt;<br>
&gt;&gt; _______________________________________________<br>
&gt;&gt; OAuth mailing list<br>
&gt;&gt; <a href=3D"mailto:OAuth@ietf.org">OAuth@ietf.org</a><br>
&gt;&gt; <a href=3D"https://www.ietf.org/mailman/listinfo/oauth" target=3D"_=
blank">https://www.ietf.org/mailman/listinfo/oauth</a><br>
&gt;<br>
&gt; _______________________________________________<br>
&gt; OAuth mailing list<br>
&gt; <a href=3D"mailto:OAuth@ietf.org">OAuth@ietf.org</a><br>
&gt; <a href=3D"https://www.ietf.org/mailman/listinfo/oauth" target=3D"_blan=
k">https://www.ietf.org/mailman/listinfo/oauth</a><br>
_______________________________________________<br>
OAuth mailing list<br>
<a href=3D"mailto:OAuth@ietf.org">OAuth@ietf.org</a><br>
<a href=3D"https://www.ietf.org/mailman/listinfo/oauth" target=3D"_blank">ht=
tps://www.ietf.org/mailman/listinfo/oauth</a><br>
</blockquote></div><br></div>
</blockquote></div><br></div></div></div></blockquote></body></html>=

--Apple-Mail-E01B3F4E-4353-4E42-8BE5-FEAB776E1BA2--

From phil.hunt@oracle.com  Thu Feb 28 09:29:57 2013
Return-Path: <phil.hunt@oracle.com>
X-Original-To: oauth@ietfa.amsl.com
Delivered-To: oauth@ietfa.amsl.com
Received: from localhost (localhost [127.0.0.1]) by ietfa.amsl.com (Postfix) with ESMTP id DA3DC21F868B for <oauth@ietfa.amsl.com>; Thu, 28 Feb 2013 09:29:57 -0800 (PST)
X-Virus-Scanned: amavisd-new at amsl.com
X-Spam-Flag: NO
X-Spam-Score: -5.203
X-Spam-Level: 
X-Spam-Status: No, score=-5.203 tagged_above=-999 required=5 tests=[AWL=0.001,  BAYES_00=-2.599, MIME_QP_LONG_LINE=1.396, RCVD_IN_DNSWL_MED=-4]
Received: from mail.ietf.org ([64.170.98.30]) by localhost (ietfa.amsl.com [127.0.0.1]) (amavisd-new, port 10024) with ESMTP id iSRQrxOjGAoa for <oauth@ietfa.amsl.com>; Thu, 28 Feb 2013 09:29:57 -0800 (PST)
Received: from userp1040.oracle.com (userp1040.oracle.com [156.151.31.81]) by ietfa.amsl.com (Postfix) with ESMTP id 42F4721F867A for <oauth@ietf.org>; Thu, 28 Feb 2013 09:29:57 -0800 (PST)
Received: from acsinet22.oracle.com (acsinet22.oracle.com [141.146.126.238]) by userp1040.oracle.com (Sentrion-MTA-4.3.1/Sentrion-MTA-4.3.1) with ESMTP id r1SHTrfq007994 (version=TLSv1/SSLv3 cipher=DHE-RSA-AES256-SHA bits=256 verify=OK); Thu, 28 Feb 2013 17:29:54 GMT
Received: from acsmt357.oracle.com (acsmt357.oracle.com [141.146.40.157]) by acsinet22.oracle.com (8.14.4+Sun/8.14.4) with ESMTP id r1SHTq4W029649 (version=TLSv1/SSLv3 cipher=DHE-RSA-AES256-SHA bits=256 verify=NO); Thu, 28 Feb 2013 17:29:53 GMT
Received: from abhmt106.oracle.com (abhmt106.oracle.com [141.146.116.58]) by acsmt357.oracle.com (8.12.11.20060308/8.12.11) with ESMTP id r1SHTqAS004746; Thu, 28 Feb 2013 11:29:52 -0600
Received: from [25.73.5.188] (/74.198.150.188) by default (Oracle Beehive Gateway v4.0) with ESMTP ; Thu, 28 Feb 2013 09:29:52 -0800
References: <0EC2404F-E3C5-4AD1-88B4-E74AA0394DD9@gmx.net> <C75E4871-E907-4EF7-BAF0-9D1A172D581B@ve7jtb.com> <CA6A6425-D0CE-469F-B51E-9F296DA8041C@oracle.com> <EAD4F55D-7A02-4209-BB15-21BA5AB512AC@ve7jtb.com>
Mime-Version: 1.0 (1.0)
In-Reply-To: <EAD4F55D-7A02-4209-BB15-21BA5AB512AC@ve7jtb.com>
Content-Type: text/plain; charset=us-ascii
Content-Transfer-Encoding: quoted-printable
Message-Id: <1BDBAFF3-6B2D-45EE-8A7E-B0B2572C8A01@oracle.com>
X-Mailer: iPhone Mail (10B146)
From: Phil Hunt <phil.hunt@oracle.com>
Date: Thu, 28 Feb 2013 09:29:47 -0800
To: John Bradley <ve7jtb@ve7jtb.com>
X-Source-IP: acsinet22.oracle.com [141.146.126.238]
Cc: "oauth@ietf.org WG" <oauth@ietf.org>
Subject: Re: [OAUTH-WG] JWT - scope claim missing
X-BeenThere: oauth@ietf.org
X-Mailman-Version: 2.1.12
Precedence: list
List-Id: OAUTH WG <oauth.ietf.org>
List-Unsubscribe: <https://www.ietf.org/mailman/options/oauth>, <mailto:oauth-request@ietf.org?subject=unsubscribe>
List-Archive: <http://www.ietf.org/mail-archive/web/oauth>
List-Post: <mailto:oauth@ietf.org>
List-Help: <mailto:oauth-request@ietf.org?subject=help>
List-Subscribe: <https://www.ietf.org/mailman/listinfo/oauth>, <mailto:oauth-request@ietf.org?subject=subscribe>
X-List-Received-Date: Thu, 28 Feb 2013 17:29:58 -0000

What people are doing now is often issuing saml like assertions. Thats not n=
ecessarily indicating intent. It just indicates transition.=20

Phil

Sent from my phone.

On 2013-02-28, at 9:07, John Bradley <ve7jtb@ve7jtb.com> wrote:

> I am not advocating anything, only sting what people are doing now.
>=20
> How authorization is communicated between the AS and RS via a token that i=
s opaque to the client is out of scope fro OAuth core, it might be magic pix=
y dust.
>=20
> This has lead to a number of ways people are doing it.
>=20
> JWT along with  JOSE provide a container to get some claims from the AS to=
 the RS though the JWT is not specific to this and is used in the assertions=
 profile and other specs for many things other than access tokens.
>=20
> Yes a profile of JWT for an access token as an access token is needed, Yes=
 further profiling is required for a JWT access token using MAC.
>=20
> The format of the authorization claims is not tightly bound to MAC and mig=
ht be used with other bearer JWT tokens.
>=20
> I don't know that there will be only one way to communicate those claims b=
ecause different sorts of implementations need different information for the=
 RS to act on.
> Recommendations are fine but defining a field called scope and passing on e=
xactly the scopes the client was granted is not going to work for everyone f=
or lots of good reasons.
>=20
> John B.
> On 2013-02-28, at 8:24 AM, Phil Hunt <phil.hunt@oracle.com> wrote:
>=20
>> Are you advocating TWO systems? That seems like a bad choice.=20
>>=20
>> I would rather fix scope than go to a two system approach.
>>=20
>> Phil
>>=20
>> Sent from my phone.
>>=20
>> On 2013-02-28, at 8:17, John Bradley <ve7jtb@ve7jtb.com> wrote:
>>=20
>>> While scope is one method that a AS could communicate authorization to a=
 RS, it is not the only or perhaps even the most likely one.
>>> Using scope requires a relatively tight binding between the RS and AS,  U=
MA uses a different mechanism that describes finer grained operations. =20
>>> The AS may include roles, user, or other more abstract claims that the t=
he client may (god help them) pass on to EXCML for processing.
>>>=20
>>> While having a scopes claim is possible, like any other claim it is not p=
art of the JWT core security processing claims, and needs to be defined by e=
xtension.
>>>=20
>>> John B.
>>> On 2013-02-28, at 2:29 AM, Hannes Tschofenig <hannes.tschofenig@gmx.net>=
 wrote:
>>>=20
>>>> Hi Mike,=20
>>>>=20
>>>> when I worked on the MAC specification I noticed that the JWT does not h=
ave a claim for the scope. I believe that this would be needed to allow the r=
esource server to verify whether the scope the authorization server authoriz=
ed is indeed what the client is asking for.=20
>>>>=20
>>>> Ciao
>>>> Hannes
>>>>=20
>>>> _______________________________________________
>>>> OAuth mailing list
>>>> OAuth@ietf.org
>>>> https://www.ietf.org/mailman/listinfo/oauth
>>>=20
>>> _______________________________________________
>>> OAuth mailing list
>>> OAuth@ietf.org
>>> https://www.ietf.org/mailman/listinfo/oauth
>=20

From sberyozkin@gmail.com  Thu Feb 28 09:30:33 2013
Return-Path: <sberyozkin@gmail.com>
X-Original-To: oauth@ietfa.amsl.com
Delivered-To: oauth@ietfa.amsl.com
Received: from localhost (localhost [127.0.0.1]) by ietfa.amsl.com (Postfix) with ESMTP id 5644721F8B33 for <oauth@ietfa.amsl.com>; Thu, 28 Feb 2013 09:30:33 -0800 (PST)
X-Virus-Scanned: amavisd-new at amsl.com
X-Spam-Flag: NO
X-Spam-Score: -3.559
X-Spam-Level: 
X-Spam-Status: No, score=-3.559 tagged_above=-999 required=5 tests=[AWL=0.040,  BAYES_00=-2.599, RCVD_IN_DNSWL_LOW=-1]
Received: from mail.ietf.org ([64.170.98.30]) by localhost (ietfa.amsl.com [127.0.0.1]) (amavisd-new, port 10024) with ESMTP id dM0vRFSavZ7l for <oauth@ietfa.amsl.com>; Thu, 28 Feb 2013 09:30:32 -0800 (PST)
Received: from mail-ee0-f42.google.com (mail-ee0-f42.google.com [74.125.83.42]) by ietfa.amsl.com (Postfix) with ESMTP id 997B321F88C1 for <oauth@ietf.org>; Thu, 28 Feb 2013 09:30:31 -0800 (PST)
Received: by mail-ee0-f42.google.com with SMTP id b47so1676281eek.15 for <oauth@ietf.org>; Thu, 28 Feb 2013 09:30:29 -0800 (PST)
DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=gmail.com; s=20120113; h=x-received:message-id:date:from:user-agent:mime-version:to:subject :references:in-reply-to:content-type:content-transfer-encoding; bh=RuWuUqmiRyaWx6xbe9X3J3C+De4NKiPbnTQNEorWsIg=; b=rCnm38eG6R+QBQEHbpAO4nrpezm8pGsRAEVMBE37xLQUNcrY+I44s3IKKXUygmQVwl pJbffzpgQr8/hfdmbnwDwXQOuIbVc4guoy/K+kOQ9ml+8tu/ZtnX+8nZLqZhfe0tnGq2 T2vcqO6GhWyhWojfl1Yt5vz2TTGodQvh/TdSDqf+UZmwir/4Yuk/+M+m0GUT8EI3qNO3 9Efco8a9jZDhg2jmz7iPX0ZMUSjhgkFQibk5cktPR2DoAVoEpmwwnByt5XqSUmI3dym9 HMoM/zpJFL1hrwIAdU00RoW1T6Z0t908JrPNPg2AQvDtfqr1eBcW5TyzI9wQUTloKA+g c46Q==
X-Received: by 10.14.182.137 with SMTP id o9mr18793162eem.13.1362072629286; Thu, 28 Feb 2013 09:30:29 -0800 (PST)
Received: from [192.168.2.5] ([79.97.76.201]) by mx.google.com with ESMTPS id u44sm12918262eel.7.2013.02.28.09.30.27 (version=TLSv1 cipher=ECDHE-RSA-RC4-SHA bits=128/128); Thu, 28 Feb 2013 09:30:28 -0800 (PST)
Message-ID: <512F9432.3000701@gmail.com>
Date: Thu, 28 Feb 2013 17:30:26 +0000
From: Sergey Beryozkin <sberyozkin@gmail.com>
User-Agent: Mozilla/5.0 (X11; Linux x86_64; rv:12.0) Gecko/20120430 Thunderbird/12.0.1
MIME-Version: 1.0
To: oauth@ietf.org
References: <20130225124642.7425.65145.idtracker@ietfa.amsl.com> <1361956373.9883.YahooMailNeo@web31807.mail.mud.yahoo.com> <21030204-8EA7-4FB0-9DD3-2B6C8CA57E02@gmx.net> <1362057295.36069.YahooMailNeo@web31809.mail.mud.yahoo.com> <512F8E1D.2060408@gmail.com>
In-Reply-To: <512F8E1D.2060408@gmail.com>
Content-Type: text/plain; charset=ISO-8859-1; format=flowed
Content-Transfer-Encoding: 7bit
Subject: Re: [OAUTH-WG] I-D Action: draft-ietf-oauth-v2-http-mac-03.txt
X-BeenThere: oauth@ietf.org
X-Mailman-Version: 2.1.12
Precedence: list
List-Id: OAUTH WG <oauth.ietf.org>
List-Unsubscribe: <https://www.ietf.org/mailman/options/oauth>, <mailto:oauth-request@ietf.org?subject=unsubscribe>
List-Archive: <http://www.ietf.org/mail-archive/web/oauth>
List-Post: <mailto:oauth@ietf.org>
List-Help: <mailto:oauth-request@ietf.org?subject=help>
List-Subscribe: <https://www.ietf.org/mailman/listinfo/oauth>, <mailto:oauth-request@ietf.org?subject=subscribe>
X-List-Received-Date: Thu, 28 Feb 2013 17:30:33 -0000

On 28/02/13 17:04, Sergey Beryozkin wrote:
> Hi
> On 28/02/13 13:14, William Mills wrote:
>> I'm actually advocating that we change MAC to be a JWT extension.
> IMHO, having a simpler option, plus, going forward, a possible JWT
> profile (client to RS path) would work better -
>
> Why would JWT completely take over ? May be it should be possible indeed
> to have it as a JWT extension - should it be part of the relevant JWT
> assertion spec, where JWT is used as a possible grant ?
We are talking about access tokens here I've just realized, looking at 
other emails...still may be JWT assertion spec may be expanded in 
principle...

Sergey


>
> Thanks, Sergey
>>
>> ------------------------------------------------------------------------
>> *From:* Hannes Tschofenig <hannes.tschofenig@gmx.net>
>> *To:* William Mills <wmills_92105@yahoo.com>
>> *Cc:* Hannes Tschofenig <hannes.tschofenig@gmx.net>; "oauth@ietf.org"
>> <oauth@ietf.org>
>> *Sent:* Thursday, February 28, 2013 2:28 AM
>> *Subject:* Re: [OAUTH-WG] I-D Action: draft-ietf-oauth-v2-http-mac-03.txt
>>
>> Hi Bill,
>>
>> I believe you are misreading the document. In
>> draft-ietf-oauth-v2-http-mac the client still uses the MAC when it
>> accesses a protected resource.
>> The only place where the JWT comes into the picture is with the
>> description of the access token. This matters from a key distribution
>> point of view. The session key for the MAC is included in the encrypted
>> JWT. The JWT is encrypted by the authorization server and decrypted by
>> the resource server.
>>
>> Information about how header fields get included in the MAC is described
>> in Section 5.
>>
>> The nonce isn't killed it is just called differently: seq-nr. The stuff
>> in the original MAC specification actually wasn't a nonce (from the
>> semantic point of view).
>> The extension parameter is there implicitly by allowing additional
>> header fields to be included in the MAC computation.
>>
>> I need to look at the port number field again.
>>
>> Ciao
>> Hannes
>>
>> On Feb 27, 2013, at 11:12 AM, William Mills wrote:
>>
>> > Just read the draft quickly.
>> >
>> > Since we're now leaning on JWT do we need to include the token in
>> this? Why not just make an additional "Envelope MAC" thing and have the
>> signature include the 3 JWT parts in the signature base string? That
>> object then just becomes a JSON container for the kid, timestamp,
>> signature method, signature etc. That thing then is a 4th base64 encoded
>> JSON thing in the auth header.
>> >
>> > How header fields get included in the signature needs definition.
>> >
>> > Why did you kill the port number, nonce, and extension parameter out
>> of the signature base string?
>> >
>> > The BNF appears to have no separators between values.
>> >
>> > -bill
>> >
>> >
>> > From: "internet-drafts@ietf.org <mailto:internet-drafts@ietf.org>"
>> <internet-drafts@ietf.org <mailto:internet-drafts@ietf.org>>
>> > To: i-d-announce@ietf.org <mailto:i-d-announce@ietf.org>
>> > Cc: oauth@ietf.org <mailto:oauth@ietf.org>
>> > Sent: Monday, February 25, 2013 4:46 AM
>> > Subject: [OAUTH-WG] I-D Action: draft-ietf-oauth-v2-http-mac-03.txt
>> >
>> >
>> > A New Internet-Draft is available from the on-line Internet-Drafts
>> directories.
>> > This draft is a work item of the Web Authorization Protocol Working
>> Group of the IETF.
>> >
>> > Title : OAuth 2.0 Message Authentication Code (MAC) Tokens
>> > Author(s) : Justin Richer
>> > William Mills
>> > Hannes Tschofenig
>> > Filename : draft-ietf-oauth-v2-http-mac-03.txt
>> > Pages : 26
>> > Date : 2013-02-25
>> >
>> > Abstract:
>> > This specification describes how to use MAC Tokens in HTTP requests
>> > to access OAuth 2.0 protected resources. An OAuth client willing to
>> > access a protected resource needs to demonstrate possession of a
>> > crytographic key by using it with a keyed message digest function to
>> > the request.
>> >
>> > The document also defines a key distribution protocol for obtaining a
>> > fresh session key.
>> >
>> >
>> > The IETF datatracker status page for this draft is:
>> > https://datatracker.ietf.org/doc/draft-ietf-oauth-v2-http-mac
>> >
>> > There's also a htmlized version available at:
>> > http://tools.ietf.org/html/draft-ietf-oauth-v2-http-mac-03
>> >
>> > A diff from the previous version is available at:
>> > http://www.ietf.org/rfcdiff?url2=draft-ietf-oauth-v2-http-mac-03
>> >
>> >
>> > Internet-Drafts are also available by anonymous FTP at:
>> > ftp://ftp.ietf.org/internet-drafts/
>> >
>> > _______________________________________________
>> > OAuth mailing list
>> > OAuth@ietf.org <mailto:OAuth@ietf.org>
>> > https://www.ietf.org/mailman/listinfo/oauth
>> >
>> >
>>
>>
>>
>>
>>
>> _______________________________________________
>> OAuth mailing list
>> OAuth@ietf.org
>> https://www.ietf.org/mailman/listinfo/oauth
>
>


From ve7jtb@ve7jtb.com  Thu Feb 28 09:34:33 2013
Return-Path: <ve7jtb@ve7jtb.com>
X-Original-To: oauth@ietfa.amsl.com
Delivered-To: oauth@ietfa.amsl.com
Received: from localhost (localhost [127.0.0.1]) by ietfa.amsl.com (Postfix) with ESMTP id 29B3721F8BF0 for <oauth@ietfa.amsl.com>; Thu, 28 Feb 2013 09:34:33 -0800 (PST)
X-Virus-Scanned: amavisd-new at amsl.com
X-Spam-Flag: NO
X-Spam-Score: -3.394
X-Spam-Level: 
X-Spam-Status: No, score=-3.394 tagged_above=-999 required=5 tests=[AWL=0.204,  BAYES_00=-2.599, HTML_MESSAGE=0.001, RCVD_IN_DNSWL_LOW=-1]
Received: from mail.ietf.org ([64.170.98.30]) by localhost (ietfa.amsl.com [127.0.0.1]) (amavisd-new, port 10024) with ESMTP id GrcFXkdwq6S5 for <oauth@ietfa.amsl.com>; Thu, 28 Feb 2013 09:34:32 -0800 (PST)
Received: from mail-pa0-f41.google.com (mail-pa0-f41.google.com [209.85.220.41]) by ietfa.amsl.com (Postfix) with ESMTP id 54C4621F8BEC for <oauth@ietf.org>; Thu, 28 Feb 2013 09:34:32 -0800 (PST)
Received: by mail-pa0-f41.google.com with SMTP id fb11so1274248pad.0 for <oauth@ietf.org>; Thu, 28 Feb 2013 09:34:32 -0800 (PST)
X-Google-DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=google.com; s=20120113; h=x-received:content-type:mime-version:subject:from:in-reply-to:date :cc:message-id:references:to:x-mailer:x-gm-message-state; bh=e/JIuWzNuR+u0P/MObBiv0/L+VPZIPdQaQa4u5dm/Ko=; b=BKknCj9TBOOP1ctTJ7lZoNayHqRXB41Qi7QSjTMGJbGtz+BBMIdnUmGYknhckL86Az RQlW1id22T2dWDFeCKHzAuZXnVX8eHcLxLnWUVfcUsXYyqOxf5evVsGsZfRtCWwybayI Ht6j7w/5Q1HnVzR5MYGEvo9fXZgDDHxGKAKtvHLOXAcjzb+Z5hsoz7lTXKSLoAoT+cmY 3+evet+6v9z3yG7XoP+63G8aMsg6rZuP1ntHlUqrIob++kQrTj44gJ2DoBgKnh3E5crF ovpzPTTrdDUP30l+mPJS3mVZUIK/1d1zGbXs0JpxWq147nmn2Ix5vCcGtokj2gM+ve0H 86VQ==
X-Received: by 10.68.143.167 with SMTP id sf7mr10304089pbb.21.1362072872112; Thu, 28 Feb 2013 09:34:32 -0800 (PST)
Received: from [192.168.41.99] (ip-64-134-220-138.public.wayport.net. [64.134.220.138]) by mx.google.com with ESMTPS id zm1sm8999512pbc.26.2013.02.28.09.34.28 (version=TLSv1 cipher=ECDHE-RSA-RC4-SHA bits=128/128); Thu, 28 Feb 2013 09:34:30 -0800 (PST)
Content-Type: multipart/signed; boundary="Apple-Mail=_1F5C6D51-B15F-4EC9-BECD-C8B29BCC9943"; protocol="application/pkcs7-signature"; micalg=sha1
Mime-Version: 1.0 (Mac OS X Mail 6.2 \(1499\))
From: John Bradley <ve7jtb@ve7jtb.com>
In-Reply-To: <39016EC6-D3E3-4812-9825-B1C95A5D9AED@oracle.com>
Date: Thu, 28 Feb 2013 09:34:27 -0800
Message-Id: <637841B2-C50C-444D-960F-CABB0CEC889D@ve7jtb.com>
References: <0EC2404F-E3C5-4AD1-88B4-E74AA0394DD9@gmx.net> <C75E4871-E907-4EF7-BAF0-9D1A172D581B@ve7jtb.com> <CA6A6425-D0CE-469F-B51E-9F296DA8041C@oracle.com> <CA+k3eCREgN+6z+U=jjJcPo0nZVR0GWn5zXeecZRO+rg=xd-gZg@mail.gmail.com> <39016EC6-D3E3-4812-9825-B1C95A5D9AED@oracle.com>
To: Phil Hunt <phil.hunt@oracle.com>
X-Mailer: Apple Mail (2.1499)
X-Gm-Message-State: ALoCoQmJ2stAk9wid4P15cShs99eUFz87L57MMKCJNtN1oB1ze5MKRAHF6YyUMFczFleGgKq2R7P
Cc: "oauth@ietf.org WG" <oauth@ietf.org>
Subject: Re: [OAUTH-WG] JWT - scope claim missing
X-BeenThere: oauth@ietf.org
X-Mailman-Version: 2.1.12
Precedence: list
List-Id: OAUTH WG <oauth.ietf.org>
List-Unsubscribe: <https://www.ietf.org/mailman/options/oauth>, <mailto:oauth-request@ietf.org?subject=unsubscribe>
List-Archive: <http://www.ietf.org/mail-archive/web/oauth>
List-Post: <mailto:oauth@ietf.org>
List-Help: <mailto:oauth-request@ietf.org?subject=help>
List-Subscribe: <https://www.ietf.org/mailman/listinfo/oauth>, <mailto:oauth-request@ietf.org?subject=subscribe>
X-List-Received-Date: Thu, 28 Feb 2013 17:34:33 -0000

--Apple-Mail=_1F5C6D51-B15F-4EC9-BECD-C8B29BCC9943
Content-Type: multipart/alternative;
	boundary="Apple-Mail=_92D6E276-4B99-4D8F-A2E9-055D9D2479E7"


--Apple-Mail=_92D6E276-4B99-4D8F-A2E9-055D9D2479E7
Content-Transfer-Encoding: quoted-printable
Content-Type: text/plain;
	charset=us-ascii

Yes IETF WG politics:)

Should JWT and JOSE  be together ?  Through a number of twists and turns =
they are not, lets not go there.

But to the point a number of us have made JWT is used in OAuth for more =
than access tokens. =20
Currently it's only use in OAuth is in the JWT assertions profile that =
has nothing to do with access tokens.

John B.

On 2013-02-28, at 9:27 AM, Phil Hunt <phil.hunt@oracle.com> wrote:

> Am I missing something. JWT is firstly an oauth spec. Otherwise why =
isnt it in jose wg?
>=20
> Phil
>=20
> Sent from my phone.
>=20
> On 2013-02-28, at 8:44, Brian Campbell <bcampbell@pingidentity.com> =
wrote:
>=20
>> I think John's point was more that scope is something rather specific =
to an OAuth access token and, while JWT is can be used to represent an =
access token, it's not the only application of JWT. The 'standard' =
claims in JWT are those that are believed (right or wrong) to be widely =
applicable across different applications of JWT. One could argue about =
it but scope is probably not one of those.
>>=20
>> It would probably make sense to try and build a profile of JWT =
specifically for OAuth access tokens (though I suspect there are some =
turtles and dragons in there), which might be the appropriate place to =
define/register a scope claim.
>>=20
>>=20
>> On Thu, Feb 28, 2013 at 9:24 AM, Phil Hunt <phil.hunt@oracle.com> =
wrote:
>> Are you advocating TWO systems? That seems like a bad choice.
>>=20
>> I would rather fix scope than go to a two system approach.
>>=20
>> Phil
>>=20
>> Sent from my phone.
>>=20
>> On 2013-02-28, at 8:17, John Bradley <ve7jtb@ve7jtb.com> wrote:
>>=20
>> > While scope is one method that a AS could communicate authorization =
to a RS, it is not the only or perhaps even the most likely one.
>> > Using scope requires a relatively tight binding between the RS and =
AS,  UMA uses a different mechanism that describes finer grained =
operations.
>> > The AS may include roles, user, or other more abstract claims that =
the the client may (god help them) pass on to EXCML for processing.
>> >
>> > While having a scopes claim is possible, like any other claim it is =
not part of the JWT core security processing claims, and needs to be =
defined by extension.
>> >
>> > John B.
>> > On 2013-02-28, at 2:29 AM, Hannes Tschofenig =
<hannes.tschofenig@gmx.net> wrote:
>> >
>> >> Hi Mike,
>> >>
>> >> when I worked on the MAC specification I noticed that the JWT does =
not have a claim for the scope. I believe that this would be needed to =
allow the resource server to verify whether the scope the authorization =
server authorized is indeed what the client is asking for.
>> >>
>> >> Ciao
>> >> Hannes
>> >>
>> >> _______________________________________________
>> >> OAuth mailing list
>> >> OAuth@ietf.org
>> >> https://www.ietf.org/mailman/listinfo/oauth
>> >
>> > _______________________________________________
>> > OAuth mailing list
>> > OAuth@ietf.org
>> > https://www.ietf.org/mailman/listinfo/oauth
>> _______________________________________________
>> OAuth mailing list
>> OAuth@ietf.org
>> https://www.ietf.org/mailman/listinfo/oauth
>>=20


--Apple-Mail=_92D6E276-4B99-4D8F-A2E9-055D9D2479E7
Content-Transfer-Encoding: quoted-printable
Content-Type: text/html;
	charset=us-ascii

<html><head><meta http-equiv=3D"Content-Type" content=3D"text/html =
charset=3Dus-ascii"></head><body style=3D"word-wrap: break-word; =
-webkit-nbsp-mode: space; -webkit-line-break: after-white-space; ">Yes =
IETF WG politics:)<div><br></div><div>Should JWT and JOSE &nbsp;be =
together ? &nbsp;Through a number of twists and turns they are not, lets =
not go there.</div><div><br></div><div>But to the point a number of us =
have made JWT is used in OAuth for more than access tokens. =
&nbsp;</div><div>Currently it's only use in OAuth is in the JWT =
assertions profile that has nothing to do with access =
tokens.</div><div><br></div><div>John B.</div><div><br><div><div>On =
2013-02-28, at 9:27 AM, Phil Hunt &lt;<a =
href=3D"mailto:phil.hunt@oracle.com">phil.hunt@oracle.com</a>&gt; =
wrote:</div><br class=3D"Apple-interchange-newline"><blockquote =
type=3D"cite"><meta http-equiv=3D"content-type" content=3D"text/html; =
charset=3Dutf-8"><div dir=3D"auto"><div>Am I missing something. JWT is =
firstly an oauth spec. Otherwise why isnt it in jose =
wg?<br><br>Phil<div><br></div><div>Sent from my =
phone.</div></div><div><br>On 2013-02-28, at 8:44, Brian Campbell &lt;<a =
href=3D"mailto:bcampbell@pingidentity.com">bcampbell@pingidentity.com</a>&=
gt; wrote:<br><br></div><blockquote type=3D"cite"><div dir=3D"ltr"><div>I =
think John's point was more that scope is something rather specific to =
an OAuth access token and, while JWT is can be used to represent an =
access token, it's not the only application of JWT. The 'standard' =
claims in JWT are those that are believed (right or wrong) to be widely =
applicable across different applications of JWT. One could argue about =
it but scope is probably not one of those.<br>

<br></div>It would probably make sense to try and build a profile of JWT =
specifically for OAuth access tokens (though I suspect there are some =
turtles and dragons in there), which might be the appropriate place to =
define/register a scope claim.<br>


</div><div class=3D"gmail_extra"><br><br><div class=3D"gmail_quote">On =
Thu, Feb 28, 2013 at 9:24 AM, Phil Hunt <span dir=3D"ltr">&lt;<a =
href=3D"mailto:phil.hunt@oracle.com" =
target=3D"_blank">phil.hunt@oracle.com</a>&gt;</span> wrote:<br>

<blockquote class=3D"gmail_quote" style=3D"margin:0 0 0 =
.8ex;border-left:1px #ccc solid;padding-left:1ex">Are you advocating TWO =
systems? That seems like a bad choice.<br>
<br>
I would rather fix scope than go to a two system approach.<br>
<br>
Phil<br>
<br>
Sent from my phone.<br>
<br>
On 2013-02-28, at 8:17, John Bradley &lt;<a =
href=3D"mailto:ve7jtb@ve7jtb.com">ve7jtb@ve7jtb.com</a>&gt; wrote:<br>
<br>
&gt; While scope is one method that a AS could communicate authorization =
to a RS, it is not the only or perhaps even the most likely one.<br>
&gt; Using scope requires a relatively tight binding between the RS and =
AS, &nbsp;UMA uses a different mechanism that describes finer grained =
operations.<br>
&gt; The AS may include roles, user, or other more abstract claims that =
the the client may (god help them) pass on to EXCML for processing.<br>
&gt;<br>
&gt; While having a scopes claim is possible, like any other claim it is =
not part of the JWT core security processing claims, and needs to be =
defined by extension.<br>
&gt;<br>
&gt; John B.<br>
&gt; On 2013-02-28, at 2:29 AM, Hannes Tschofenig &lt;<a =
href=3D"mailto:hannes.tschofenig@gmx.net">hannes.tschofenig@gmx.net</a>&gt=
; wrote:<br>
&gt;<br>
&gt;&gt; Hi Mike,<br>
&gt;&gt;<br>
&gt;&gt; when I worked on the MAC specification I noticed that the JWT =
does not have a claim for the scope. I believe that this would be needed =
to allow the resource server to verify whether the scope the =
authorization server authorized is indeed what the client is asking =
for.<br>


&gt;&gt;<br>
&gt;&gt; Ciao<br>
&gt;&gt; Hannes<br>
&gt;&gt;<br>
&gt;&gt; _______________________________________________<br>
&gt;&gt; OAuth mailing list<br>
&gt;&gt; <a href=3D"mailto:OAuth@ietf.org">OAuth@ietf.org</a><br>
&gt;&gt; <a href=3D"https://www.ietf.org/mailman/listinfo/oauth" =
target=3D"_blank">https://www.ietf.org/mailman/listinfo/oauth</a><br>
&gt;<br>
&gt; _______________________________________________<br>
&gt; OAuth mailing list<br>
&gt; <a href=3D"mailto:OAuth@ietf.org">OAuth@ietf.org</a><br>
&gt; <a href=3D"https://www.ietf.org/mailman/listinfo/oauth" =
target=3D"_blank">https://www.ietf.org/mailman/listinfo/oauth</a><br>
_______________________________________________<br>
OAuth mailing list<br>
<a href=3D"mailto:OAuth@ietf.org">OAuth@ietf.org</a><br>
<a href=3D"https://www.ietf.org/mailman/listinfo/oauth" =
target=3D"_blank">https://www.ietf.org/mailman/listinfo/oauth</a><br>
</blockquote></div><br></div>
</blockquote></div></blockquote></div><br></div></body></html>=

--Apple-Mail=_92D6E276-4B99-4D8F-A2E9-055D9D2479E7--

--Apple-Mail=_1F5C6D51-B15F-4EC9-BECD-C8B29BCC9943
Content-Disposition: attachment;
	filename=smime.p7s
Content-Type: application/pkcs7-signature;
	name=smime.p7s
Content-Transfer-Encoding: base64
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--Apple-Mail=_1F5C6D51-B15F-4EC9-BECD-C8B29BCC9943--

From ve7jtb@ve7jtb.com  Thu Feb 28 09:40:33 2013
Return-Path: <ve7jtb@ve7jtb.com>
X-Original-To: oauth@ietfa.amsl.com
Delivered-To: oauth@ietfa.amsl.com
Received: from localhost (localhost [127.0.0.1]) by ietfa.amsl.com (Postfix) with ESMTP id 353BD21F8A55 for <oauth@ietfa.amsl.com>; Thu, 28 Feb 2013 09:40:33 -0800 (PST)
X-Virus-Scanned: amavisd-new at amsl.com
X-Spam-Flag: NO
X-Spam-Score: -3.423
X-Spam-Level: 
X-Spam-Status: No, score=-3.423 tagged_above=-999 required=5 tests=[AWL=0.175,  BAYES_00=-2.599, HTML_MESSAGE=0.001, RCVD_IN_DNSWL_LOW=-1]
Received: from mail.ietf.org ([64.170.98.30]) by localhost (ietfa.amsl.com [127.0.0.1]) (amavisd-new, port 10024) with ESMTP id bAEmA9bB2wyB for <oauth@ietfa.amsl.com>; Thu, 28 Feb 2013 09:40:32 -0800 (PST)
Received: from mail-pb0-f41.google.com (mail-pb0-f41.google.com [209.85.160.41]) by ietfa.amsl.com (Postfix) with ESMTP id 3CED721F88A9 for <oauth@ietf.org>; Thu, 28 Feb 2013 09:40:32 -0800 (PST)
Received: by mail-pb0-f41.google.com with SMTP id um15so1211082pbc.0 for <oauth@ietf.org>; Thu, 28 Feb 2013 09:40:32 -0800 (PST)
X-Google-DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=google.com; s=20120113; h=x-received:content-type:mime-version:subject:from:in-reply-to:date :cc:message-id:references:to:x-mailer:x-gm-message-state; bh=ZAXMql53Ww9syxB6ysT35ZIFGEqNw2PMercy5UXoK5Y=; b=ExRc7KpaCJTlyDwNBvMRA/5xIvbyAfQzGY/+Oevjn1heJPBhXD4TB+I/FJ+tBoIO7B 3wqf5X9dEz56lCdER+XPclTrQrgJ/isFIjpEoHQbBTz3nAZdTG7UYtNWHa5XU6a5n2+R Qh1lqp5MWlq3GjXK82gFC9LaX7SiIEzjP5HzFVWEHn3s6AWYC24EB5by4MlljqgHFhNi TGFkErQRbTW61ezghLSMPWO3FUJrRb9reFiN0weB4FYZ61nkmn8noyReFo9fDZY0PZ1e jXFRtXwEahRSamMuJq8i0PxbMk2NRO4ga3B3KVOknMc1UiITfprmswq9sGRkXh0+QhSI JlpQ==
X-Received: by 10.68.201.227 with SMTP id kd3mr10179371pbc.65.1362073231953; Thu, 28 Feb 2013 09:40:31 -0800 (PST)
Received: from [192.168.41.99] (ip-64-134-220-138.public.wayport.net. [64.134.220.138]) by mx.google.com with ESMTPS id ww9sm9000888pbc.41.2013.02.28.09.40.28 (version=TLSv1 cipher=ECDHE-RSA-RC4-SHA bits=128/128); Thu, 28 Feb 2013 09:40:30 -0800 (PST)
Content-Type: multipart/signed; boundary="Apple-Mail=_4748AC50-AF64-4040-8475-53ACC1A9C937"; protocol="application/pkcs7-signature"; micalg=sha1
Mime-Version: 1.0 (Mac OS X Mail 6.2 \(1499\))
From: John Bradley <ve7jtb@ve7jtb.com>
In-Reply-To: <48FD87D1-4DF4-4289-99B7-40A515F31890@oracle.com>
Date: Thu, 28 Feb 2013 09:40:26 -0800
Message-Id: <3E472720-31A4-40A0-AAA4-402CF850831A@ve7jtb.com>
References: <0EC2404F-E3C5-4AD1-88B4-E74AA0394DD9@gmx.net> <C75E4871-E907-4EF7-BAF0-9D1A172D581B@ve7jtb.com> <CA6A6425-D0CE-469F-B51E-9F296DA8041C@oracle.com> <CA+k3eCREgN+6z+U=jjJcPo0nZVR0GWn5zXeecZRO+rg=xd-gZg@mail.gmail.com> <A2375FE9-946F-46B3-9356-0709DD56BD4A@ve7jtb.com> <48FD87D1-4DF4-4289-99B7-40A515F31890@oracle.com>
To: Phil Hunt <phil.hunt@oracle.com>
X-Mailer: Apple Mail (2.1499)
X-Gm-Message-State: ALoCoQnRSNa4ymFxo5y145zP24ub6O4YYexkVU4zQSGgAqtzvSsFgSxW2I2FBlE+XUrUHkk2U9Dj
Cc: "oauth@ietf.org WG" <oauth@ietf.org>
Subject: Re: [OAUTH-WG] JWT - scope claim missing
X-BeenThere: oauth@ietf.org
X-Mailman-Version: 2.1.12
Precedence: list
List-Id: OAUTH WG <oauth.ietf.org>
List-Unsubscribe: <https://www.ietf.org/mailman/options/oauth>, <mailto:oauth-request@ietf.org?subject=unsubscribe>
List-Archive: <http://www.ietf.org/mail-archive/web/oauth>
List-Post: <mailto:oauth@ietf.org>
List-Help: <mailto:oauth-request@ietf.org?subject=help>
List-Subscribe: <https://www.ietf.org/mailman/listinfo/oauth>, <mailto:oauth-request@ietf.org?subject=subscribe>
X-List-Received-Date: Thu, 28 Feb 2013 17:40:33 -0000

--Apple-Mail=_4748AC50-AF64-4040-8475-53ACC1A9C937
Content-Type: multipart/alternative;
	boundary="Apple-Mail=_25E7786C-AB10-4B66-AE08-E5610AA605F3"


--Apple-Mail=_25E7786C-AB10-4B66-AE08-E5610AA605F3
Content-Transfer-Encoding: quoted-printable
Content-Type: text/plain;
	charset=us-ascii

JWT is an assertion( I am probably going to regret using that word).

It is used in openID connect for id_tokens, it is used in OAuth for =
Assertion grant types and authentication of the client to the token =
endpoint.
http://tools.ietf.org/html/draft-ietf-oauth-jwt-bearer-04

JSON Web Token (JWT) Bearer Token Profiles for OAuth 2.0

Dosen't define JWT's use for access tokens for the RS.  =20

Bottom line JWT is for more than access tokens.

John B.

On 2013-02-28, at 9:28 AM, Phil Hunt <phil.hunt@oracle.com> wrote:

> Are you saying jwt is not an access token type?
>=20
> Phil
>=20
> Sent from my phone.
>=20
> On 2013-02-28, at 8:58, John Bradley <ve7jtb@ve7jtb.com> wrote:
>=20
>> Yes, defining scope in JWT is the wrong place.   JWT needs to stick =
to the security claims needed to process JWT.
>>=20
>> I also don't know how far you get requiring a specific authorization =
format for JWT, some AS will wan to use a opaque reference, some might =
want to use a user claim or role claim, others may use scopes,  =
combining scopes and claims is also possible.
>>=20
>> Right now it is up to a AS RS pair to agree on how to communicate =
authorization.   I don't want MAC to be more restrictive than bearer =
when it comes to authorization between AS and RS.
>>=20
>> Hannes wanted to know why JWT didn't define scope.  The simple answer =
is that it is out of scope for JWT itself.   It might be defined in a =
OAuth access token profile for JWT but it should not be specific to MAC.
>>=20
>> John B.
>> On 2013-02-28, at 8:44 AM, Brian Campbell =
<bcampbell@pingidentity.com> wrote:
>>=20
>>> I think John's point was more that scope is something rather =
specific to an OAuth access token and, while JWT is can be used to =
represent an access token, it's not the only application of JWT. The =
'standard' claims in JWT are those that are believed (right or wrong) to =
be widely applicable across different applications of JWT. One could =
argue about it but scope is probably not one of those.
>>>=20
>>> It would probably make sense to try and build a profile of JWT =
specifically for OAuth access tokens (though I suspect there are some =
turtles and dragons in there), which might be the appropriate place to =
define/register a scope claim.
>>>=20
>>>=20
>>> On Thu, Feb 28, 2013 at 9:24 AM, Phil Hunt <phil.hunt@oracle.com> =
wrote:
>>> Are you advocating TWO systems? That seems like a bad choice.
>>>=20
>>> I would rather fix scope than go to a two system approach.
>>>=20
>>> Phil
>>>=20
>>> Sent from my phone.
>>>=20
>>> On 2013-02-28, at 8:17, John Bradley <ve7jtb@ve7jtb.com> wrote:
>>>=20
>>> > While scope is one method that a AS could communicate =
authorization to a RS, it is not the only or perhaps even the most =
likely one.
>>> > Using scope requires a relatively tight binding between the RS and =
AS,  UMA uses a different mechanism that describes finer grained =
operations.
>>> > The AS may include roles, user, or other more abstract claims that =
the the client may (god help them) pass on to EXCML for processing.
>>> >
>>> > While having a scopes claim is possible, like any other claim it =
is not part of the JWT core security processing claims, and needs to be =
defined by extension.
>>> >
>>> > John B.
>>> > On 2013-02-28, at 2:29 AM, Hannes Tschofenig =
<hannes.tschofenig@gmx.net> wrote:
>>> >
>>> >> Hi Mike,
>>> >>
>>> >> when I worked on the MAC specification I noticed that the JWT =
does not have a claim for the scope. I believe that this would be needed =
to allow the resource server to verify whether the scope the =
authorization server authorized is indeed what the client is asking for.
>>> >>
>>> >> Ciao
>>> >> Hannes
>>> >>
>>> >> _______________________________________________
>>> >> OAuth mailing list
>>> >> OAuth@ietf.org
>>> >> https://www.ietf.org/mailman/listinfo/oauth
>>> >
>>> > _______________________________________________
>>> > OAuth mailing list
>>> > OAuth@ietf.org
>>> > https://www.ietf.org/mailman/listinfo/oauth
>>> _______________________________________________
>>> OAuth mailing list
>>> OAuth@ietf.org
>>> https://www.ietf.org/mailman/listinfo/oauth
>>>=20
>>=20


--Apple-Mail=_25E7786C-AB10-4B66-AE08-E5610AA605F3
Content-Transfer-Encoding: quoted-printable
Content-Type: text/html;
	charset=us-ascii

<html><head><meta http-equiv=3D"Content-Type" content=3D"text/html =
charset=3Dus-ascii"></head><body style=3D"word-wrap: break-word; =
-webkit-nbsp-mode: space; -webkit-line-break: after-white-space; ">JWT =
is an assertion( I am probably going to regret using that =
word).<div><br></div><div>It is used in openID connect for id_tokens, it =
is used in OAuth for Assertion grant types and authentication of the =
client to the token endpoint.</div><div><a =
href=3D"http://tools.ietf.org/html/draft-ietf-oauth-jwt-bearer-04">http://=
tools.ietf.org/html/draft-ietf-oauth-jwt-bearer-04</a></div><div><br></div=
><div><pre style=3D"font-size: 1em; margin-top: 0px; margin-bottom: 0px; =
"><span class=3D"h1" style=3D"line-height: 0pt; display: inline; =
font-size: 1em; font-weight: bold; "><h1 style=3D"line-height: 0pt; =
display: inline; font-size: 1em; ">JSON Web Token (JWT) Bearer Token =
Profiles for OAuth 2.0</h1></span></pre><div><br></div><div>Dosen't =
define JWT's use for access tokens for the RS. =
&nbsp;&nbsp;</div><div><br></div><div>Bottom line JWT is for more than =
access tokens.</div><div><br></div><div>John =
B.</div><div><br></div><div><div>On 2013-02-28, at 9:28 AM, Phil Hunt =
&lt;<a href=3D"mailto:phil.hunt@oracle.com">phil.hunt@oracle.com</a>&gt; =
wrote:</div><br class=3D"Apple-interchange-newline"><blockquote =
type=3D"cite"><meta http-equiv=3D"content-type" content=3D"text/html; =
charset=3Dutf-8"><div dir=3D"auto"><div>Are you saying jwt is not an =
access token type?<br><br>Phil<div><br></div><div>Sent from my =
phone.</div></div><div><br>On 2013-02-28, at 8:58, John Bradley &lt;<a =
href=3D"mailto:ve7jtb@ve7jtb.com">ve7jtb@ve7jtb.com</a>&gt; =
wrote:<br><br></div><blockquote type=3D"cite"><meta =
http-equiv=3D"Content-Type" content=3D"text/html =
charset=3Diso-8859-1">Yes, defining scope in JWT is the wrong place. =
&nbsp; JWT needs to stick to the security claims needed to process =
JWT.<div><br></div><div>I also don't know how far you get requiring a =
specific authorization format for JWT, some AS will wan to use a opaque =
reference, some might want to use a user claim or role claim, others may =
use scopes, &nbsp;combining scopes and claims is also =
possible.</div><div><br></div><div>Right now it is up to a AS RS pair to =
agree on how to communicate authorization. &nbsp; I don't want MAC to be =
more restrictive than bearer when it comes to authorization between AS =
and RS.<br><div><br></div><div>Hannes wanted to know why JWT didn't =
define scope. &nbsp;The simple answer is that it is out of scope for JWT =
itself. &nbsp; It might be defined in a OAuth access token profile for =
JWT but it should not be specific to MAC.</div><div><br></div><div>John =
B.</div><div><div><div>On 2013-02-28, at 8:44 AM, Brian Campbell &lt;<a =
href=3D"mailto:bcampbell@pingidentity.com">bcampbell@pingidentity.com</a>&=
gt; wrote:</div><br class=3D"Apple-interchange-newline"><blockquote =
type=3D"cite"><div dir=3D"ltr"><div>I think John's point was more that =
scope is something rather specific to an OAuth access token and, while =
JWT is can be used to represent an access token, it's not the only =
application of JWT. The 'standard' claims in JWT are those that are =
believed (right or wrong) to be widely applicable across different =
applications of JWT. One could argue about it but scope is probably not =
one of those.<br>

<br></div>It would probably make sense to try and build a profile of JWT =
specifically for OAuth access tokens (though I suspect there are some =
turtles and dragons in there), which might be the appropriate place to =
define/register a scope claim.<br>


</div><div class=3D"gmail_extra"><br><br><div class=3D"gmail_quote">On =
Thu, Feb 28, 2013 at 9:24 AM, Phil Hunt <span dir=3D"ltr">&lt;<a =
href=3D"mailto:phil.hunt@oracle.com" =
target=3D"_blank">phil.hunt@oracle.com</a>&gt;</span> wrote:<br>

<blockquote class=3D"gmail_quote" style=3D"margin:0 0 0 =
.8ex;border-left:1px #ccc solid;padding-left:1ex">Are you advocating TWO =
systems? That seems like a bad choice.<br>
<br>
I would rather fix scope than go to a two system approach.<br>
<br>
Phil<br>
<br>
Sent from my phone.<br>
<br>
On 2013-02-28, at 8:17, John Bradley &lt;<a =
href=3D"mailto:ve7jtb@ve7jtb.com">ve7jtb@ve7jtb.com</a>&gt; wrote:<br>
<br>
&gt; While scope is one method that a AS could communicate authorization =
to a RS, it is not the only or perhaps even the most likely one.<br>
&gt; Using scope requires a relatively tight binding between the RS and =
AS, &nbsp;UMA uses a different mechanism that describes finer grained =
operations.<br>
&gt; The AS may include roles, user, or other more abstract claims that =
the the client may (god help them) pass on to EXCML for processing.<br>
&gt;<br>
&gt; While having a scopes claim is possible, like any other claim it is =
not part of the JWT core security processing claims, and needs to be =
defined by extension.<br>
&gt;<br>
&gt; John B.<br>
&gt; On 2013-02-28, at 2:29 AM, Hannes Tschofenig &lt;<a =
href=3D"mailto:hannes.tschofenig@gmx.net">hannes.tschofenig@gmx.net</a>&gt=
; wrote:<br>
&gt;<br>
&gt;&gt; Hi Mike,<br>
&gt;&gt;<br>
&gt;&gt; when I worked on the MAC specification I noticed that the JWT =
does not have a claim for the scope. I believe that this would be needed =
to allow the resource server to verify whether the scope the =
authorization server authorized is indeed what the client is asking =
for.<br>


&gt;&gt;<br>
&gt;&gt; Ciao<br>
&gt;&gt; Hannes<br>
&gt;&gt;<br>
&gt;&gt; _______________________________________________<br>
&gt;&gt; OAuth mailing list<br>
&gt;&gt; <a href=3D"mailto:OAuth@ietf.org">OAuth@ietf.org</a><br>
&gt;&gt; <a href=3D"https://www.ietf.org/mailman/listinfo/oauth" =
target=3D"_blank">https://www.ietf.org/mailman/listinfo/oauth</a><br>
&gt;<br>
&gt; _______________________________________________<br>
&gt; OAuth mailing list<br>
&gt; <a href=3D"mailto:OAuth@ietf.org">OAuth@ietf.org</a><br>
&gt; <a href=3D"https://www.ietf.org/mailman/listinfo/oauth" =
target=3D"_blank">https://www.ietf.org/mailman/listinfo/oauth</a><br>
_______________________________________________<br>
OAuth mailing list<br>
<a href=3D"mailto:OAuth@ietf.org">OAuth@ietf.org</a><br>
<a href=3D"https://www.ietf.org/mailman/listinfo/oauth" =
target=3D"_blank">https://www.ietf.org/mailman/listinfo/oauth</a><br>
</blockquote></div><br></div>
=
</blockquote></div><br></div></div></blockquote></div></blockquote></div><=
br></div></body></html>=

--Apple-Mail=_25E7786C-AB10-4B66-AE08-E5610AA605F3--

--Apple-Mail=_4748AC50-AF64-4040-8475-53ACC1A9C937
Content-Disposition: attachment;
	filename=smime.p7s
Content-Type: application/pkcs7-signature;
	name=smime.p7s
Content-Transfer-Encoding: base64
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--Apple-Mail=_4748AC50-AF64-4040-8475-53ACC1A9C937--

From wmills_92105@yahoo.com  Thu Feb 28 09:43:53 2013
Return-Path: <wmills_92105@yahoo.com>
X-Original-To: oauth@ietfa.amsl.com
Delivered-To: oauth@ietfa.amsl.com
Received: from localhost (localhost [127.0.0.1]) by ietfa.amsl.com (Postfix) with ESMTP id E789321F8C06 for <oauth@ietfa.amsl.com>; Thu, 28 Feb 2013 09:43:53 -0800 (PST)
X-Virus-Scanned: amavisd-new at amsl.com
X-Spam-Flag: NO
X-Spam-Score: -2.341
X-Spam-Level: 
X-Spam-Status: No, score=-2.341 tagged_above=-999 required=5 tests=[AWL=0.257,  BAYES_00=-2.599, HTML_MESSAGE=0.001]
Received: from mail.ietf.org ([64.170.98.30]) by localhost (ietfa.amsl.com [127.0.0.1]) (amavisd-new, port 10024) with ESMTP id U5COVv6tRQKH for <oauth@ietfa.amsl.com>; Thu, 28 Feb 2013 09:43:51 -0800 (PST)
Received: from nm37-vm7.bullet.mail.ne1.yahoo.com (nm37-vm7.bullet.mail.ne1.yahoo.com [98.138.229.135]) by ietfa.amsl.com (Postfix) with ESMTP id 7364921F8C08 for <oauth@ietf.org>; Thu, 28 Feb 2013 09:43:51 -0800 (PST)
Received: from [98.138.226.177] by nm37.bullet.mail.ne1.yahoo.com with NNFMP; 28 Feb 2013 17:43:43 -0000
Received: from [98.138.89.253] by tm12.bullet.mail.ne1.yahoo.com with NNFMP; 28 Feb 2013 17:43:43 -0000
Received: from [127.0.0.1] by omp1045.mail.ne1.yahoo.com with NNFMP; 28 Feb 2013 17:43:43 -0000
X-Yahoo-Newman-Property: ymail-3
X-Yahoo-Newman-Id: 516844.42324.bm@omp1045.mail.ne1.yahoo.com
Received: (qmail 38930 invoked by uid 60001); 28 Feb 2013 17:43:43 -0000
DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=yahoo.com; s=s1024; t=1362073422; bh=n1n/sU7A+rVWbVrMKggsRv8N4CvlmZ0uQ3tt+DDDfOI=; h=X-YMail-OSG:Received:X-Rocket-MIMEInfo:X-Mailer:References:Message-ID:Date:From:Reply-To:Subject:To:Cc:In-Reply-To:MIME-Version:Content-Type; b=YG1Okq3avJlOkxStGQOoAwViTXOTRtngRszaCKd/YLR8Y9QUIhXRQ3qrMPoInmTWvgQjPeIMlP1ai2OFrj8dSALe2F5Mssny4xvxSR3h0rYYl9ty27dWpNuPRYKPPd36f2HNoQokTtf+ilINc1OwJYwhMXog/TptuG8IzT6Xl6M=
DomainKey-Signature: a=rsa-sha1; q=dns; c=nofws; s=s1024; d=yahoo.com; h=X-YMail-OSG:Received:X-Rocket-MIMEInfo:X-Mailer:References:Message-ID:Date:From:Reply-To:Subject:To:Cc:In-Reply-To:MIME-Version:Content-Type; b=W/Ksl4fCN9X/ETCYAxVbJbke7u3iTMn0qV404FDq40l7RAWvPUB1s99BAlfs/4mbuM1z5fcy00V+xf/ExlBZaJ1P4qgvs9rfucBRhKVajChaITrylJZ5nNLYubjoI8bN+bD9STvDX+PTW3L3z86mBEyHQwd0yKT81Zd0MY3lRIc=;
X-YMail-OSG: nK8j0zUVM1loAz_tdyB1EW0v.ovh5CfcZZbHCrKQH7jnaAP TYP_hZVCZsiL5WZUqmf10NpngLpAzmuVqqR2uPZW.rOU0EEkvQVuogwf7egx Twe0U4UcaMjtHw7sqOse5iiFLAfHyJhbz9qPtmvQFgJ0Ku8KIycp40camppK gKzPzizOG5PxQ_g7Oz8NjQdNkjcJs3NIm1TQJri4KsiR6zJtGDQMyUBPTjs7 Hi0WVlWnilmDZ.iFVTKceBQx.n8JPzcW_PQzQWySrpEpYweZWoZNY00_B801 mw1osuV.6y0p6Rkmma561DJ.Qnd189ZtuQ6.UpLBIfHysChyIUZ88SMt.b9M Qmf.lzEwkybynVz0utRY__6IC4c0IPQiQQ6H6HZC4zBsWyMkaXUPOcCIHT6i 7Z8wVHbXQ03tLiNFApTBd5g76Ehn8p9p6WsYcy.qGKlgOxpMlGZLlZo3fCIP s5WeEacjymAEzKMPUdV4VRzTbAvB3xRnmlLgbVAjvFY7cD4vSSu6hLh6QTf3 SoiSe6AbTXgh.kYvGHcTuv4nwYVamhJnzMS_9IU652A--
Received: from [209.131.62.115] by web31810.mail.mud.yahoo.com via HTTP; Thu, 28 Feb 2013 09:43:42 PST
X-Rocket-MIMEInfo: 001.001, MSkgQVMgaXNzdWVzIEpXVCArIHNlY3JldCB0byBjbGllbnQuCjIpIENsaWVudCBkZWNpZGVzIHRvIGFjY2VzcyByZXNvdXJjZSwgY3JlYXRlcyB0aGUgSldUIE1BQyBKU09OIG9iamVjdCB3aGljaCBjb250YWlucyBzdHVmZiBhYm91dCB0aGUgc2lnbmF0dXJlIGFuZCB0aGUgc2lnbmF0dXJlIGl0c2VsZi4KMykgY2xpZW50IGFwcGVuZHMgdGhhdCBiYXNlNjQgZW5jb2RlZCB0aGluZyB0byB0aGUgSldUCgoxKSBTZXJ2ZXIgZ2V0cyBhIEpXVE1BQyB0b2tlbiwgdGFrZXMgYXBhcnQgdGhlIEpXVCBwYXJ0IHRvIGcBMAEBAQE-
X-Mailer: YahooMailWebService/0.8.135.514
References: <20130225124642.7425.65145.idtracker@ietfa.amsl.com> <1361956373.9883.YahooMailNeo@web31807.mail.mud.yahoo.com> <21030204-8EA7-4FB0-9DD3-2B6C8CA57E02@gmx.net> <1362057295.36069.YahooMailNeo@web31809.mail.mud.yahoo.com> <512F8F1E.3020400@mitre.org>
Message-ID: <1362073422.89847.YahooMailNeo@web31810.mail.mud.yahoo.com>
Date: Thu, 28 Feb 2013 09:43:42 -0800 (PST)
From: William Mills <wmills_92105@yahoo.com>
To: Justin Richer <jricher@mitre.org>
In-Reply-To: <512F8F1E.3020400@mitre.org>
MIME-Version: 1.0
Content-Type: multipart/alternative; boundary="1935884094-986886612-1362073422=:89847"
Cc: "oauth@ietf.org" <oauth@ietf.org>
Subject: Re: [OAUTH-WG] I-D Action: draft-ietf-oauth-v2-http-mac-03.txt
X-BeenThere: oauth@ietf.org
X-Mailman-Version: 2.1.12
Precedence: list
Reply-To: William Mills <wmills_92105@yahoo.com>
List-Id: OAUTH WG <oauth.ietf.org>
List-Unsubscribe: <https://www.ietf.org/mailman/options/oauth>, <mailto:oauth-request@ietf.org?subject=unsubscribe>
List-Archive: <http://www.ietf.org/mail-archive/web/oauth>
List-Post: <mailto:oauth@ietf.org>
List-Help: <mailto:oauth-request@ietf.org?subject=help>
List-Subscribe: <https://www.ietf.org/mailman/listinfo/oauth>, <mailto:oauth-request@ietf.org?subject=subscribe>
X-List-Received-Date: Thu, 28 Feb 2013 17:43:54 -0000

--1935884094-986886612-1362073422=:89847
Content-Type: text/plain; charset=iso-8859-1
Content-Transfer-Encoding: quoted-printable

1) AS issues JWT + secret to client.=0A2) Client decides to access resource=
, creates the JWT MAC JSON object which contains stuff about the signature =
and the signature itself.=0A3) client appends that base64 encoded thing to =
the JWT=0A=0A1) Server gets a JWTMAC token, takes apart the JWT part to get=
 the signing key=0A2) Server looks at the JWTMAC to figure out what all it =
has to do to create the signature base string=A0=0A3) server constructs the=
 SBS computes and checks the sig.=0A=0AThe only hairy bit right now is an a=
rbitrary HTTP header list that may be included in the signature.=0A=0ANo da=
ta in the JWTMAC is duplicated from anywhere else.=0A=0A=0A________________=
________________=0A From: Justin Richer <jricher@mitre.org>=0ATo: William M=
ills <wmills_92105@yahoo.com> =0ACc: Hannes Tschofenig <hannes.tschofenig@g=
mx.net>; "oauth@ietf.org" <oauth@ietf.org> =0ASent: Thursday, February 28, =
2013 9:08 AM=0ASubject: Re: [OAUTH-WG] I-D Action: draft-ietf-oauth-v2-http=
-mac-03.txt=0A =0A=0AWhat I don't quite get is what exactly would be presen=
ted and processed at each step. Who needs to know what piece? We don't want=
 to have to push everything into JSON for the signing to take place (that m=
uch is clear), and we don't want the client to be pushing the MAC secret to=
 the RS every time (that would make it a lot less secret, after all). But i=
f we can reuse JWT, JWS, and other JOSE mechanisms to make some parts of th=
e MAC pattern easier for programmers, I'm for it.=0A=0A=A0-- Justin=0A=0A=
=0AOn 02/28/2013 08:14 AM, William Mills wrote:=0A=0AI'm actually advocatin=
g that we change MAC to be a JWT extension.=0A>=0A>=0A>=0A>________________=
________________=0A> From: Hannes Tschofenig <hannes.tschofenig@gmx.net>=0A=
>To: William Mills <wmills_92105@yahoo.com> =0A>Cc: Hannes Tschofenig <hann=
es.tschofenig@gmx.net>; "oauth@ietf.org" <oauth@ietf.org> =0A>Sent: Thursda=
y, February 28, 2013 2:28 AM=0A>Subject: Re: [OAUTH-WG] I-D Action: draft-i=
etf-oauth-v2-http-mac-03.txt=0A> =0A>Hi Bill, =0A>=0A>I believe you are mis=
reading the document. In=0A            draft-ietf-oauth-v2-http-mac the cli=
ent still uses the MAC=0A            when it accesses a protected resource.=
 =0A>The only place where the JWT comes into the picture is with=0A        =
    the description of the access token. This matters from a key=0A        =
    distribution point of view. The session key for the MAC is=0A          =
  included in the encrypted JWT. The JWT is encrypted by the=0A            =
authorization server and decrypted by the resource server. =0A>=0A>Informat=
ion about how header fields get included in the MAC=0A            is descri=
bed in Section 5.=0A>=0A>The nonce isn't killed it is just called different=
ly:=0A            seq-nr. The stuff in the original MAC specification actua=
lly=0A            wasn't a nonce (from the semantic point of view). =0A>The=
 extension parameter is there implicitly by allowing=0A            addition=
al header fields to be included in the MAC=0A            computation.=0A>=
=0A>I need to look at the port number field again. =0A>=0A>Ciao=0A>Hannes=
=0A>=0A>On Feb 27, 2013, at 11:12 AM, William Mills wrote:=0A>=0A>> Just re=
ad the draft quickly.=A0 =0A>> =0A>> Since we're now leaning on JWT do we n=
eed to include=0A            the token in this?=A0 Why not just make an add=
itional=0A            "Envelope MAC" thing and have the signature include t=
he 3=0A            JWT parts in the signature base string?=A0 That object t=
hen=0A            just becomes a JSON container for the kid, timestamp,=0A =
           signature method, signature etc. That thing then is a 4th=0A    =
        base64 encoded JSON thing in the auth header.=0A>> =0A>> How header=
 fields get included in the signature needs=0A            definition.=0A>> =
=0A>> Why did you kill the port number, nonce, and extension=0A            =
parameter out of the signature base string?=0A>> =0A>> The BNF appears to h=
ave no separators between values.=0A>> =0A>> -bill=0A>> =0A>> =0A>> From: "=
internet-drafts@ietf.org" <internet-drafts@ietf.org>=0A>> To: i-d-announce@=
ietf.org =0A>> Cc: oauth@ietf.org =0A>> Sent: Monday, February 25, 2013 4:4=
6 AM=0A>> Subject: [OAUTH-WG] I-D Action:=0A            draft-ietf-oauth-v2=
-http-mac-03.txt=0A>> =0A>> =0A>> A New Internet-Draft is available from th=
e on-line=0A            Internet-Drafts directories.=0A>> This draft is a w=
ork item of the Web Authorization=0A            Protocol Working Group of t=
he IETF.=0A>> =0A>>=A0 =A0 Title=A0 =A0 =A0 =A0 =A0 : OAuth 2.0 Message Aut=
hentication=0A            Code (MAC) Tokens=0A>>=A0 =A0 Author(s)=A0 =A0 =
=A0 : Justin Richer=0A>>=A0 =A0 =A0 =A0 =A0 =A0 =A0 =A0 =A0 =A0 =A0 =A0 =A0=
 William Mills=0A>>=A0 =A0 =A0 =A0 =A0 =A0 =A0 =A0 =A0 =A0 =A0 =A0 =A0 Hann=
es Tschofenig=0A>>=A0 =A0 Filename=A0 =A0 =A0 =A0 :=0A            draft-iet=
f-oauth-v2-http-mac-03.txt=0A>>=A0 =A0 Pages=A0 =A0 =A0 =A0 =A0 : 26=0A>>=
=A0 =A0 Date=A0 =A0 =A0 =A0 =A0 =A0 : 2013-02-25=0A>> =0A>> Abstract:=0A>>=
=A0 This specification describes how to use MAC Tokens in=0A            HTT=
P requests=0A>>=A0 to access OAuth 2.0 protected resources.=A0 An OAuth=0A =
           client willing to=0A>>=A0 access a protected resource needs to d=
emonstrate=0A            possession of a=0A>>=A0 crytographic key by using =
it with a keyed message=0A            digest function to=0A>>=A0 the reques=
t.=0A>> =0A>>=A0 The document also defines a key distribution protocol=0A  =
          for obtaining a=0A>>=A0 fresh session key.=0A>> =0A>> =0A>> The I=
ETF datatracker status page for this draft is:=0A>> https://datatracker.iet=
f.org/doc/draft-ietf-oauth-v2-http-mac=0A>> =0A>> There's also a htmlized v=
ersion available at:=0A>>=0A            http://tools.ietf.org/html/draft-ie=
tf-oauth-v2-http-mac-03=0A>> =0A>> A diff from the previous version is avai=
lable at:=0A>>=0A            http://www.ietf.org/rfcdiff?url2=3Ddraft-ietf-=
oauth-v2-http-mac-03=0A>> =0A>> =0A>> Internet-Drafts are also available by=
 anonymous FTP at:=0A>> ftp://ftp.ietf.org/internet-drafts/=0A>> =0A>> ____=
___________________________________________=0A>> OAuth mailing list=0A>> OA=
uth@ietf.org=0A>> https://www.ietf.org/mailman/listinfo/oauth=0A>> =0A>> =
=0A>=0A>=0A>=0A>=0A>=0A>=0A>_______________________________________________=
=0AOAuth mailing list OAuth@ietf.org https://www.ietf.org/mailman/listinfo/=
oauth 
--1935884094-986886612-1362073422=:89847
Content-Type: text/html; charset=iso-8859-1
Content-Transfer-Encoding: quoted-printable

<html><body><div style=3D"color:#000; background-color:#fff; font-family:Co=
urier New, courier, monaco, monospace, sans-serif;font-size:12pt"><div><spa=
n>1) AS issues JWT + secret to client.</span></div><div style=3D"color: rgb=
(0, 0, 0); font-size: 16px; font-family: 'Courier New', courier, monaco, mo=
nospace, sans-serif; background-color: transparent; font-style: normal;"><s=
pan>2) Client decides to access resource, creates the JWT MAC JSON object w=
hich contains stuff about the signature and the signature itself.</span></d=
iv><div style=3D"color: rgb(0, 0, 0); font-size: 16px; font-family: 'Courie=
r New', courier, monaco, monospace, sans-serif; background-color: transpare=
nt; font-style: normal;"><span>3) client appends that base64 encoded thing =
to the JWT</span></div><div style=3D"color: rgb(0, 0, 0); font-size: 16px; =
font-family: 'Courier New', courier, monaco, monospace, sans-serif; backgro=
und-color: transparent; font-style: normal;"><span><br></span></div><div
 style=3D"color: rgb(0, 0, 0); font-size: 16px; font-family: 'Courier New',=
 courier, monaco, monospace, sans-serif; background-color: transparent; fon=
t-style: normal;">1) Server gets a JWTMAC token, takes apart the JWT part t=
o get the signing key</div><div style=3D"color: rgb(0, 0, 0); font-size: 16=
px; font-family: 'Courier New', courier, monaco, monospace, sans-serif; bac=
kground-color: transparent; font-style: normal;">2) Server looks at the JWT=
MAC to figure out what all it has to do to create the signature base string=
&nbsp;</div><div style=3D"color: rgb(0, 0, 0); font-size: 16px; font-family=
: 'Courier New', courier, monaco, monospace, sans-serif; background-color: =
transparent; font-style: normal;">3) server constructs the SBS computes and=
 checks the sig.</div><div style=3D"color: rgb(0, 0, 0); font-size: 16px; f=
ont-family: 'Courier New', courier, monaco, monospace, sans-serif; backgrou=
nd-color: transparent; font-style: normal;"><br></div><div style=3D"color:
 rgb(0, 0, 0); font-size: 16px; font-family: 'Courier New', courier, monaco=
, monospace, sans-serif; background-color: transparent; font-style: normal;=
">The only hairy bit right now is an arbitrary HTTP header list that may be=
 included in the signature.</div><div style=3D"color: rgb(0, 0, 0); font-si=
ze: 16px; font-family: 'Courier New', courier, monaco, monospace, sans-seri=
f; background-color: transparent; font-style: normal;"><br></div><div style=
=3D"color: rgb(0, 0, 0); font-size: 16px; font-family: 'Courier New', couri=
er, monaco, monospace, sans-serif; background-color: transparent; font-styl=
e: normal;">No data in the JWTMAC is duplicated from anywhere else.</div><d=
iv><br></div>  <div style=3D"font-family: 'Courier New', courier, monaco, m=
onospace, sans-serif; font-size: 12pt;"> <div style=3D"font-family: 'times =
new roman', 'new york', times, serif; font-size: 12pt;"> <div dir=3D"ltr"> =
<font size=3D"2" face=3D"Arial"> <hr size=3D"1">  <b><span
 style=3D"font-weight:bold;">From:</span></b> Justin Richer &lt;jricher@mit=
re.org&gt;<br> <b><span style=3D"font-weight: bold;">To:</span></b> William=
 Mills &lt;wmills_92105@yahoo.com&gt; <br><b><span style=3D"font-weight: bo=
ld;">Cc:</span></b> Hannes Tschofenig &lt;hannes.tschofenig@gmx.net&gt;; "o=
auth@ietf.org" &lt;oauth@ietf.org&gt; <br> <b><span style=3D"font-weight: b=
old;">Sent:</span></b> Thursday, February 28, 2013 9:08 AM<br> <b><span sty=
le=3D"font-weight: bold;">Subject:</span></b> Re: [OAUTH-WG] I-D Action: dr=
aft-ietf-oauth-v2-http-mac-03.txt<br> </font> </div> <br>=0A<div id=3D"yiv3=
09116819">=0A  =0A=0A    =0A  =0A  <div>=0A    What I don't quite get is wh=
at exactly would be presented and=0A    processed at each step. Who needs t=
o know what piece? We don't want=0A    to have to push everything into JSON=
 for the signing to take place=0A    (that much is clear), and we don't wan=
t the client to be pushing the=0A    MAC secret to the RS every time (that =
would make it a lot less=0A    secret, after all). But if we can reuse JWT,=
 JWS, and other JOSE=0A    mechanisms to make some parts of the MAC pattern=
 easier for=0A    programmers, I'm for it.<br>=0A    <br>=0A    &nbsp;-- Ju=
stin<br>=0A    <br>=0A    <div class=3D"yiv309116819moz-cite-prefix">On 02/=
28/2013 08:14 AM, William Mills=0A      wrote:<br>=0A    </div>=0A    <bloc=
kquote type=3D"cite">=0A      =0A      <div style=3D"color: rgb(0, 0, 0); b=
ackground-color: rgb(255, 255, 255); font-family: 'Courier New', courier, m=
onaco, monospace, sans-serif; font-size: 12pt;">=0A        <div><span>I'm a=
ctually advocating that we change MAC to be a=0A            JWT extension.<=
/span></div>=0A        <div><br>=0A        </div>=0A        <div style=3D"f=
ont-family: 'Courier New', courier, monaco, monospace, sans-serif; font-siz=
e: 12pt;">=0A          <div style=3D"font-family: 'times new roman', 'new y=
ork', times, serif; font-size: 12pt;">=0A            <div dir=3D"ltr"> <fon=
t face=3D"Arial" size=3D"2">=0A                <hr size=3D"1"> <b><span sty=
le=3D"font-weight:bold;">From:</span></b>=0A                Hannes Tschofen=
ig <a rel=3D"nofollow" class=3D"yiv309116819moz-txt-link-rfc2396E" ymailto=
=3D"mailto:hannes.tschofenig@gmx.net" target=3D"_blank" href=3D"mailto:hann=
es.tschofenig@gmx.net">&lt;hannes.tschofenig@gmx.net&gt;</a><br>=0A        =
        <b><span style=3D"font-weight:bold;">To:</span></b>=0A             =
   William Mills <a rel=3D"nofollow" class=3D"yiv309116819moz-txt-link-rfc2=
396E" ymailto=3D"mailto:wmills_92105@yahoo.com" target=3D"_blank" href=3D"m=
ailto:wmills_92105@yahoo.com">&lt;wmills_92105@yahoo.com&gt;</a> <br>=0A   =
             <b><span style=3D"font-weight:bold;">Cc:</span></b>=0A        =
        Hannes Tschofenig <a rel=3D"nofollow" class=3D"yiv309116819moz-txt-=
link-rfc2396E" ymailto=3D"mailto:hannes.tschofenig@gmx.net" target=3D"_blan=
k" href=3D"mailto:hannes.tschofenig@gmx.net">&lt;hannes.tschofenig@gmx.net&=
gt;</a>;=0A                <a rel=3D"nofollow" class=3D"yiv309116819moz-txt=
-link-rfc2396E" ymailto=3D"mailto:oauth@ietf.org" target=3D"_blank" href=3D=
"mailto:oauth@ietf.org">"oauth@ietf.org"</a> <a rel=3D"nofollow" class=3D"y=
iv309116819moz-txt-link-rfc2396E" ymailto=3D"mailto:oauth@ietf.org" target=
=3D"_blank" href=3D"mailto:oauth@ietf.org">&lt;oauth@ietf.org&gt;</a> <br>=
=0A                <b><span style=3D"font-weight:bold;">Sent:</span></b>=0A=
                Thursday, February 28, 2013 2:28 AM<br>=0A                <=
b><span style=3D"font-weight:bold;">Subject:</span></b>=0A                R=
e: [OAUTH-WG] I-D Action:=0A                draft-ietf-oauth-v2-http-mac-03=
.txt<br>=0A              </font> </div>=0A            <br>=0A            Hi=
 Bill, <br>=0A            <br>=0A            I believe you are misreading t=
he document. In=0A            draft-ietf-oauth-v2-http-mac the client still=
 uses the MAC=0A            when it accesses a protected resource. <br>=0A =
           The only place where the JWT comes into the picture is with=0A  =
          the description of the access token. This matters from a key=0A  =
          distribution point of view. The session key for the MAC is=0A    =
        included in the encrypted JWT. The JWT is encrypted by the=0A      =
      authorization server and decrypted by the resource server. <br>=0A   =
         <br>=0A            Information about how header fields get include=
d in the MAC=0A            is described in Section 5.<br>=0A            <br=
>=0A            The nonce isn't killed it is just called differently:=0A   =
         seq-nr. The stuff in the original MAC specification actually=0A   =
         wasn't a nonce (from the semantic point of view). <br>=0A         =
   The extension parameter is there implicitly by allowing=0A            ad=
ditional header fields to be included in the MAC=0A            computation.=
<br>=0A            <br>=0A            I need to look at the port number fie=
ld again. <br>=0A            <br>=0A            Ciao<br>=0A            Hann=
es<br>=0A            <br>=0A            On Feb 27, 2013, at 11:12 AM, Willi=
am Mills wrote:<br>=0A            <br>=0A            &gt; Just read the dra=
ft quickly.&nbsp; <br>=0A            &gt; <br>=0A            &gt; Since we'=
re now leaning on JWT do we need to include=0A            the token in this=
?&nbsp; Why not just make an additional=0A            "Envelope MAC" thing =
and have the signature include the 3=0A            JWT parts in the signatu=
re base string?&nbsp; That object then=0A            just becomes a JSON co=
ntainer for the kid, timestamp,=0A            signature method, signature e=
tc. That thing then is a 4th=0A            base64 encoded JSON thing in the=
 auth header.<br>=0A            &gt; <br>=0A            &gt; How header fie=
lds get included in the signature needs=0A            definition.<br>=0A   =
         &gt; <br>=0A            &gt; Why did you kill the port number, non=
ce, and extension=0A            parameter out of the signature base string?=
<br>=0A            &gt; <br>=0A            &gt; The BNF appears to have no =
separators between values.<br>=0A            &gt; <br>=0A            &gt; -=
bill<br>=0A            &gt; <br>=0A            &gt; <br>=0A            &gt;=
 From: "<a rel=3D"nofollow" ymailto=3D"mailto:internet-drafts@ietf.org" tar=
get=3D"_blank" href=3D"mailto:internet-drafts@ietf.org">internet-drafts@iet=
f.org</a>"=0A            &lt;<a rel=3D"nofollow" ymailto=3D"mailto:internet=
-drafts@ietf.org" target=3D"_blank" href=3D"mailto:internet-drafts@ietf.org=
">internet-drafts@ietf.org</a>&gt;<br>=0A            &gt; To: <a rel=3D"nof=
ollow" ymailto=3D"mailto:i-d-announce@ietf.org" target=3D"_blank" href=3D"m=
ailto:i-d-announce@ietf.org">i-d-announce@ietf.org</a>=0A            <br>=
=0A            &gt; Cc: <a rel=3D"nofollow" ymailto=3D"mailto:oauth@ietf.or=
g" target=3D"_blank" href=3D"mailto:oauth@ietf.org">oauth@ietf.org</a> <br>=
=0A            &gt; Sent: Monday, February 25, 2013 4:46 AM<br>=0A         =
   &gt; Subject: [OAUTH-WG] I-D Action:=0A            draft-ietf-oauth-v2-h=
ttp-mac-03.txt<br>=0A            &gt; <br>=0A            &gt; <br>=0A      =
      &gt; A New Internet-Draft is available from the on-line=0A           =
 Internet-Drafts directories.<br>=0A            &gt; This draft is a work i=
tem of the Web Authorization=0A            Protocol Working Group of the IE=
TF.<br>=0A            &gt; <br>=0A            &gt;&nbsp; &nbsp; Title&nbsp;=
 &nbsp; &nbsp; &nbsp; &nbsp; : OAuth 2.0 Message Authentication=0A         =
   Code (MAC) Tokens<br>=0A            &gt;&nbsp; &nbsp; Author(s)&nbsp; &n=
bsp; &nbsp; : Justin Richer<br>=0A            &gt;&nbsp; &nbsp; &nbsp; &nbs=
p; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; William M=
ills<br>=0A            &gt;&nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp;=
 &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; Hannes Tschofenig<br>=0A        =
    &gt;&nbsp; &nbsp; Filename&nbsp; &nbsp; &nbsp; &nbsp; :=0A            d=
raft-ietf-oauth-v2-http-mac-03.txt<br>=0A            &gt;&nbsp; &nbsp; Page=
s&nbsp; &nbsp; &nbsp; &nbsp; &nbsp; : 26<br>=0A            &gt;&nbsp; &nbsp=
; Date&nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; : 2013-02-25<br>=0A        =
    &gt; <br>=0A            &gt; Abstract:<br>=0A            &gt;&nbsp; Thi=
s specification describes how to use MAC Tokens in=0A            HTTP reque=
sts<br>=0A            &gt;&nbsp; to access OAuth 2.0 protected resources.&n=
bsp; An OAuth=0A            client willing to<br>=0A            &gt;&nbsp; =
access a protected resource needs to demonstrate=0A            possession o=
f a<br>=0A            &gt;&nbsp; crytographic key by using it with a keyed =
message=0A            digest function to<br>=0A            &gt;&nbsp; the r=
equest.<br>=0A            &gt; <br>=0A            &gt;&nbsp; The document a=
lso defines a key distribution protocol=0A            for obtaining a<br>=
=0A            &gt;&nbsp; fresh session key.<br>=0A            &gt; <br>=0A=
            &gt; <br>=0A            &gt; The IETF datatracker status page f=
or this draft is:<br>=0A            &gt; <a rel=3D"nofollow" target=3D"_bla=
nk" href=3D"https://datatracker.ietf.org/doc/draft-ietf-oauth-v2-http-mac">=
https://datatracker.ietf.org/doc/draft-ietf-oauth-v2-http-mac</a><br>=0A   =
         &gt; <br>=0A            &gt; There's also a htmlized version avail=
able at:<br>=0A            &gt;=0A            http://tools.ietf.org/html/dr=
aft-ietf-oauth-v2-http-mac-03<br>=0A            &gt; <br>=0A            &gt=
; A diff from the previous version is available at:<br>=0A            &gt;=
=0A            http://www.ietf.org/rfcdiff?url2=3Ddraft-ietf-oauth-v2-http-=
mac-03<br>=0A            &gt; <br>=0A            &gt; <br>=0A            &g=
t; Internet-Drafts are also available by anonymous FTP at:<br>=0A          =
  &gt; <a rel=3D"nofollow" target=3D"_blank" href=3D"ftp://ftp.ietf.org/int=
ernet-drafts/">ftp://ftp.ietf.org/internet-drafts/</a><br>=0A            &g=
t; <br>=0A            &gt; _______________________________________________<=
br>=0A            &gt; OAuth mailing list<br>=0A            &gt; <a rel=3D"=
nofollow" ymailto=3D"mailto:OAuth@ietf.org" target=3D"_blank" href=3D"mailt=
o:OAuth@ietf.org">OAuth@ietf.org</a><br>=0A            &gt; <a rel=3D"nofol=
low" target=3D"_blank" href=3D"https://www.ietf.org/mailman/listinfo/oauth"=
>https://www.ietf.org/mailman/listinfo/oauth</a><br>=0A            &gt; <br=
>=0A            &gt; <br>=0A            <br>=0A            <br>=0A         =
   <br>=0A          </div>=0A        </div>=0A      </div>=0A      <br>=0A =
     <fieldset class=3D"yiv309116819mimeAttachmentHeader"></fieldset>=0A   =
   <br>=0A      <pre>_______________________________________________=0AOAut=
h mailing list=0A<a rel=3D"nofollow" class=3D"yiv309116819moz-txt-link-abbr=
eviated" ymailto=3D"mailto:OAuth@ietf.org" target=3D"_blank" href=3D"mailto=
:OAuth@ietf.org">OAuth@ietf.org</a>=0A<a rel=3D"nofollow" class=3D"yiv30911=
6819moz-txt-link-freetext" target=3D"_blank" href=3D"https://www.ietf.org/m=
ailman/listinfo/oauth">https://www.ietf.org/mailman/listinfo/oauth</a>=0A</=
pre>=0A    </blockquote>=0A    <br>=0A  </div>=0A=0A</div><br><br> </div> <=
/div>  </div></body></html>
--1935884094-986886612-1362073422=:89847--

From wmills_92105@yahoo.com  Thu Feb 28 09:49:06 2013
Return-Path: <wmills_92105@yahoo.com>
X-Original-To: oauth@ietfa.amsl.com
Delivered-To: oauth@ietfa.amsl.com
Received: from localhost (localhost [127.0.0.1]) by ietfa.amsl.com (Postfix) with ESMTP id 995B521F8C3D for <oauth@ietfa.amsl.com>; Thu, 28 Feb 2013 09:49:06 -0800 (PST)
X-Virus-Scanned: amavisd-new at amsl.com
X-Spam-Flag: NO
X-Spam-Score: -2.351
X-Spam-Level: 
X-Spam-Status: No, score=-2.351 tagged_above=-999 required=5 tests=[AWL=0.247,  BAYES_00=-2.599, HTML_MESSAGE=0.001]
Received: from mail.ietf.org ([64.170.98.30]) by localhost (ietfa.amsl.com [127.0.0.1]) (amavisd-new, port 10024) with ESMTP id GWCWYfDm8yqb for <oauth@ietfa.amsl.com>; Thu, 28 Feb 2013 09:49:05 -0800 (PST)
Received: from nm23-vm3.bullet.mail.ne1.yahoo.com (nm23-vm3.bullet.mail.ne1.yahoo.com [98.138.91.153]) by ietfa.amsl.com (Postfix) with ESMTP id 1CFF721F8C1E for <oauth@ietf.org>; Thu, 28 Feb 2013 09:49:05 -0800 (PST)
Received: from [98.138.226.179] by nm23.bullet.mail.ne1.yahoo.com with NNFMP; 28 Feb 2013 17:49:04 -0000
Received: from [98.138.89.249] by tm14.bullet.mail.ne1.yahoo.com with NNFMP; 28 Feb 2013 17:49:04 -0000
Received: from [127.0.0.1] by omp1041.mail.ne1.yahoo.com with NNFMP; 28 Feb 2013 17:49:04 -0000
X-Yahoo-Newman-Property: ymail-3
X-Yahoo-Newman-Id: 479363.66503.bm@omp1041.mail.ne1.yahoo.com
Received: (qmail 16724 invoked by uid 60001); 28 Feb 2013 17:49:04 -0000
DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=yahoo.com; s=s1024; t=1362073744; bh=mrYomm8vFQW2hD3V7yfztnCCG1bIqPyW9zBJ7g9mptU=; h=X-YMail-OSG:Received:X-Rocket-MIMEInfo:X-Mailer:References:Message-ID:Date:From:Reply-To:Subject:To:In-Reply-To:MIME-Version:Content-Type; b=umapFkEeTwJLhQ5lRFWomxGqOhIiMjMPjToIuzQeXl8M1b0Aj5v7eoVuPa/Nls0oqRR/5GgjSHjfUMHLPoPFzXABk9Zqqn7nooAR1nBSBki/PeX+d3/La81TqlAOe1zdRiteiE0NcpQpKOv7PgbPhsI5ifoMhpn/IbSeQs+MnGY=
DomainKey-Signature: a=rsa-sha1; q=dns; c=nofws; s=s1024; d=yahoo.com; h=X-YMail-OSG:Received:X-Rocket-MIMEInfo:X-Mailer:References:Message-ID:Date:From:Reply-To:Subject:To:In-Reply-To:MIME-Version:Content-Type; b=jXhvUnMU0cxVRZQJWzPeFfju54ldJuVGJjG3S2rJ2dNDWxIAEzuxXE7v4cVtQIQeh4ybHJRHauo6lAnB9d97RKuqSadfsbX6fk6CN17XL97FZ+FYaNrljJti44+DUoTLUTklGhN2cIHO3HwcEmRKlZHVV1FKvEz/kvpK4WJnCoM=;
X-YMail-OSG: eA1c8oQVM1mwMzlttLvZTR1eTlAVgD1UjikSmyR6fjnyw0B zorWI_FPnbSeMsPfZiWbNA6OdUSoKucxDnwMxB.lWVew9xqqGwPypd7qtWTj 3x1_FMXdZs0jknTv1GMtrYVNUxhycn8fob5.Ne_EpL_IwzmmGvUZAqc4jFFb YmNGdtQp89p8ixyVQzYbrrtPtPAieqXNsFcU41eJmIZPxFr8XVVMwdTa0Prg Qe3IEswwhV1bZfoeO6sv6foceqvSYIjFC30ASDbyGGbT0F91_xXHX3l2LOiR hCmFqb7L4pVuUJv9s02qdkI83HTxvWWlhOdUnnyLu2AtA4rc.16jcu_2ua4O myUmxEpNJ9TF2ereZLC0h66Xf5GCHMNB_yVrGuVgcJHKvrcNLtLvZzJ2DdIE dUBW7Ms1UOAp3k_Ag7xbJboL7bLdJGzDEXTh1wY4sGW6balhqiHHnDVTzkjO ZoadyoMbwVvjIjFJgvdvdMYg_NDQZlyzonyH2HIvJCGWUbEisv9nxIWy9NyZ nIlHHsVzVysWfA2bSqCWjZwEAhUa53kXu8znH8eFEA9iGJHISck9wwhGHRsZ d
Received: from [209.131.62.115] by web31802.mail.mud.yahoo.com via HTTP; Thu, 28 Feb 2013 09:49:03 PST
X-Rocket-MIMEInfo: 001.001, VGhlIEpXVCByZXBsYWNlcyB0aGUgb2F1dGhfdG9rZW4gZGF0YSBlbGVtZW50IGluIHRoZSBvbGQgTUFDIHN0dWZmLiDCoEkganVzdCB3YW50IHRvIHRha2UgYWxsIHRoZSBvdGhlciBvYXV0aF8qIHZhcmlhYmxlcyBhbmQgc3R1ZmYgdGhlbSBpbiBhIHNlcGFyYXRlIEpTT04gb2JqZWN0IGFuZCBjb21wbGV0ZWx5IGtpbGwgdGhlICJmdW4gd2l0aCBzb3J0aW5nIHZhcmlhYmxlcyIgd2hlbiB0aGUgb2F1dGhfKiB0aGluZ3MgY2FuIGJlIGNhcnJpZWQgaW4gdGhlIHF1ZXJ5IHN0cmluZyBvciBoZWFkZXIgb3IgcG8BMAEBAQE-
X-Mailer: YahooMailWebService/0.8.135.514
References: <20130225124642.7425.65145.idtracker@ietfa.amsl.com> <1361956373.9883.YahooMailNeo@web31807.mail.mud.yahoo.com> <21030204-8EA7-4FB0-9DD3-2B6C8CA57E02@gmx.net> <1362057295.36069.YahooMailNeo@web31809.mail.mud.yahoo.com> <512F8E1D.2060408@gmail.com>
Message-ID: <1362073743.15800.YahooMailNeo@web31802.mail.mud.yahoo.com>
Date: Thu, 28 Feb 2013 09:49:03 -0800 (PST)
From: William Mills <wmills_92105@yahoo.com>
To: Sergey Beryozkin <sberyozkin@gmail.com>, "oauth@ietf.org" <oauth@ietf.org>
In-Reply-To: <512F8E1D.2060408@gmail.com>
MIME-Version: 1.0
Content-Type: multipart/alternative; boundary="-1036955950-98993306-1362073743=:15800"
Subject: Re: [OAUTH-WG] I-D Action: draft-ietf-oauth-v2-http-mac-03.txt
X-BeenThere: oauth@ietf.org
X-Mailman-Version: 2.1.12
Precedence: list
Reply-To: William Mills <wmills_92105@yahoo.com>
List-Id: OAUTH WG <oauth.ietf.org>
List-Unsubscribe: <https://www.ietf.org/mailman/options/oauth>, <mailto:oauth-request@ietf.org?subject=unsubscribe>
List-Archive: <http://www.ietf.org/mail-archive/web/oauth>
List-Post: <mailto:oauth@ietf.org>
List-Help: <mailto:oauth-request@ietf.org?subject=help>
List-Subscribe: <https://www.ietf.org/mailman/listinfo/oauth>, <mailto:oauth-request@ietf.org?subject=subscribe>
X-List-Received-Date: Thu, 28 Feb 2013 17:49:06 -0000

---1036955950-98993306-1362073743=:15800
Content-Type: text/plain; charset=iso-8859-1
Content-Transfer-Encoding: quoted-printable

The JWT replaces the oauth_token data element in the old MAC stuff. =A0I ju=
st want to take all the other oauth_* variables and stuff them in a separat=
e JSON object and completely kill the "fun with sorting variables" when the=
 oauth_* things can be carried in the query string or header or post body.=
=0A=0A=0A________________________________=0A From: Sergey Beryozkin <sberyo=
zkin@gmail.com>=0ATo: oauth@ietf.org =0ASent: Thursday, February 28, 2013 9=
:04 AM=0ASubject: Re: [OAUTH-WG] I-D Action: draft-ietf-oauth-v2-http-mac-0=
3.txt=0A =0AHi=0AOn 28/02/13 13:14, William Mills wrote:=0A> I'm actually a=
dvocating that we change MAC to be a JWT extension.=0AIMHO, having a simple=
r option, plus, going forward, a possible JWT =0Aprofile (client to RS path=
) would work better -=0A=0AWhy would JWT completely take over ? May be it s=
hould be possible indeed =0Ato have it as a JWT extension - should it be pa=
rt of the relevant JWT =0Aassertion spec, where JWT is used as a possible g=
rant ?=0A=0AThanks, Sergey=0A>=0A> ----------------------------------------=
--------------------------------=0A> *From:* Hannes Tschofenig <hannes.tsch=
ofenig@gmx.net>=0A> *To:* William Mills <wmills_92105@yahoo.com>=0A> *Cc:* =
Hannes Tschofenig <hannes.tschofenig@gmx.net>; "oauth@ietf.org"=0A> <oauth@=
ietf.org>=0A> *Sent:* Thursday, February 28, 2013 2:28 AM=0A> *Subject:* Re=
: [OAUTH-WG] I-D Action: draft-ietf-oauth-v2-http-mac-03.txt=0A>=0A> Hi Bil=
l,=0A>=0A> I believe you are misreading the document. In=0A> draft-ietf-oau=
th-v2-http-mac the client still uses the MAC when it=0A> accesses a protect=
ed resource.=0A> The only place where the JWT comes into the picture is wit=
h the=0A> description of the access token. This matters from a key distribu=
tion=0A> point of view. The session key for the MAC is included in the encr=
ypted=0A> JWT. The JWT is encrypted by the authorization server and decrypt=
ed by=0A> the resource server.=0A>=0A> Information about how header fields =
get included in the MAC is described=0A> in Section 5.=0A>=0A> The nonce is=
n't killed it is just called differently: seq-nr. The stuff=0A> in the orig=
inal MAC specification actually wasn't a nonce (from the=0A> semantic point=
 of view).=0A> The extension parameter is there implicitly by allowing addi=
tional=0A> header fields to be included in the MAC computation.=0A>=0A> I n=
eed to look at the port number field again.=0A>=0A> Ciao=0A> Hannes=0A>=0A>=
 On Feb 27, 2013, at 11:12 AM, William Mills wrote:=0A>=0A>=A0 > Just read =
the draft quickly.=0A>=A0 >=0A>=A0 > Since we're now leaning on JWT do we n=
eed to include the token in=0A> this? Why not just make an additional "Enve=
lope MAC" thing and have the=0A> signature include the 3 JWT parts in the s=
ignature base string? That=0A> object then just becomes a JSON container fo=
r the kid, timestamp,=0A> signature method, signature etc. That thing then =
is a 4th base64 encoded=0A> JSON thing in the auth header.=0A>=A0 >=0A>=A0 =
> How header fields get included in the signature needs definition.=0A>=A0 =
>=0A>=A0 > Why did you kill the port number, nonce, and extension parameter=
 out=0A> of the signature base string?=0A>=A0 >=0A>=A0 > The BNF appears to=
 have no separators between values.=0A>=A0 >=0A>=A0 > -bill=0A>=A0 >=0A>=A0=
 >=0A>=A0 > From: "internet-drafts@ietf.org <mailto:internet-drafts@ietf.or=
g>"=0A> <internet-drafts@ietf.org <mailto:internet-drafts@ietf.org>>=0A>=A0=
 > To: i-d-announce@ietf.org <mailto:i-d-announce@ietf.org>=0A>=A0 > Cc: oa=
uth@ietf.org <mailto:oauth@ietf.org>=0A>=A0 > Sent: Monday, February 25, 20=
13 4:46 AM=0A>=A0 > Subject: [OAUTH-WG] I-D Action: draft-ietf-oauth-v2-htt=
p-mac-03.txt=0A>=A0 >=0A>=A0 >=0A>=A0 > A New Internet-Draft is available f=
rom the on-line Internet-Drafts=0A> directories.=0A>=A0 > This draft is a w=
ork item of the Web Authorization Protocol Working=0A> Group of the IETF.=
=0A>=A0 >=0A>=A0 > Title : OAuth 2.0 Message Authentication Code (MAC) Toke=
ns=0A>=A0 > Author(s) : Justin Richer=0A>=A0 > William Mills=0A>=A0 > Hanne=
s Tschofenig=0A>=A0 > Filename : draft-ietf-oauth-v2-http-mac-03.txt=0A>=A0=
 > Pages : 26=0A>=A0 > Date : 2013-02-25=0A>=A0 >=0A>=A0 > Abstract:=0A>=A0=
 > This specification describes how to use MAC Tokens in HTTP requests=0A>=
=A0 > to access OAuth 2.0 protected resources. An OAuth client willing to=
=0A>=A0 > access a protected resource needs to demonstrate possession of a=
=0A>=A0 > crytographic key by using it with a keyed message digest function=
 to=0A>=A0 > the request.=0A>=A0 >=0A>=A0 > The document also defines a key=
 distribution protocol for obtaining a=0A>=A0 > fresh session key.=0A>=A0 >=
=0A>=A0 >=0A>=A0 > The IETF datatracker status page for this draft is:=0A>=
=A0 > https://datatracker.ietf.org/doc/draft-ietf-oauth-v2-http-mac=0A>=A0 =
>=0A>=A0 > There's also a htmlized version available at:=0A>=A0 > http://to=
ols.ietf.org/html/draft-ietf-oauth-v2-http-mac-03=0A>=A0 >=0A>=A0 > A diff =
from the previous version is available at:=0A>=A0 > http://www.ietf.org/rfc=
diff?url2=3Ddraft-ietf-oauth-v2-http-mac-03=0A>=A0 >=0A>=A0 >=0A>=A0 > Inte=
rnet-Drafts are also available by anonymous FTP at:=0A>=A0 > ftp://ftp.ietf=
.org/internet-drafts/=0A>=A0 >=0A>=A0 > ___________________________________=
____________=0A>=A0 > OAuth mailing list=0A>=A0 > OAuth@ietf.org <mailto:OA=
uth@ietf.org>=0A>=A0 > https://www.ietf.org/mailman/listinfo/oauth=0A>=A0 >=
=0A>=A0 >=0A>=0A>=0A>=0A>=0A>=0A> _________________________________________=
______=0A> OAuth mailing list=0A> OAuth@ietf.org=0A> https://www.ietf.org/m=
ailman/listinfo/oauth=0A=0A=0A_____________________________________________=
__=0AOAuth mailing list=0AOAuth@ietf.org=0Ahttps://www.ietf.org/mailman/lis=
tinfo/oauth
---1036955950-98993306-1362073743=:15800
Content-Type: text/html; charset=iso-8859-1
Content-Transfer-Encoding: quoted-printable

<html><body><div style=3D"color:#000; background-color:#fff; font-family:Co=
urier New, courier, monaco, monospace, sans-serif;font-size:12pt"><div><spa=
n>The JWT replaces the oauth_token data element in the old MAC stuff. &nbsp=
;I just want to take all the other oauth_* variables and stuff them in a se=
parate JSON object and completely kill the "fun with sorting variables" whe=
n the oauth_* things can be carried in the query string or header or post b=
ody.</span></div><div><br></div>  <div style=3D"font-family: 'Courier New',=
 courier, monaco, monospace, sans-serif; font-size: 12pt;"> <div style=3D"f=
ont-family: 'times new roman', 'new york', times, serif; font-size: 12pt;">=
 <div dir=3D"ltr"> <font size=3D"2" face=3D"Arial"> <hr size=3D"1">  <b><sp=
an style=3D"font-weight:bold;">From:</span></b> Sergey Beryozkin &lt;sberyo=
zkin@gmail.com&gt;<br> <b><span style=3D"font-weight: bold;">To:</span></b>=
 oauth@ietf.org <br> <b><span style=3D"font-weight: bold;">Sent:</span></b>=
 Thursday,
 February 28, 2013 9:04 AM<br> <b><span style=3D"font-weight: bold;">Subjec=
t:</span></b> Re: [OAUTH-WG] I-D Action: draft-ietf-oauth-v2-http-mac-03.tx=
t<br> </font> </div> <br>=0AHi<br>On 28/02/13 13:14, William Mills wrote:<b=
r>&gt; I'm actually advocating that we change MAC to be a JWT extension.<br=
>IMHO, having a simpler option, plus, going forward, a possible JWT <br>pro=
file (client to RS path) would work better -<br><br>Why would JWT completel=
y take over ? May be it should be possible indeed <br>to have it as a JWT e=
xtension - should it be part of the relevant JWT <br>assertion spec, where =
JWT is used as a possible grant ?<br><br>Thanks, Sergey<br>&gt;<br>&gt; ---=
---------------------------------------------------------------------<br>&g=
t; *From:* Hannes Tschofenig &lt;<a ymailto=3D"mailto:hannes.tschofenig@gmx=
.net" href=3D"mailto:hannes.tschofenig@gmx.net">hannes.tschofenig@gmx.net</=
a>&gt;<br>&gt; *To:* William Mills &lt;<a ymailto=3D"mailto:wmills_92105@ya=
hoo.com" href=3D"mailto:wmills_92105@yahoo.com">wmills_92105@yahoo.com</a>&=
gt;<br>&gt; *Cc:* Hannes Tschofenig &lt;<a ymailto=3D"mailto:hannes.tschofe=
nig@gmx.net"
 href=3D"mailto:hannes.tschofenig@gmx.net">hannes.tschofenig@gmx.net</a>&gt=
;; "<a ymailto=3D"mailto:oauth@ietf.org" href=3D"mailto:oauth@ietf.org">oau=
th@ietf.org</a>"<br>&gt; &lt;<a ymailto=3D"mailto:oauth@ietf.org" href=3D"m=
ailto:oauth@ietf.org">oauth@ietf.org</a>&gt;<br>&gt; *Sent:* Thursday, Febr=
uary 28, 2013 2:28 AM<br>&gt; *Subject:* Re: [OAUTH-WG] I-D Action: draft-i=
etf-oauth-v2-http-mac-03.txt<br>&gt;<br>&gt; Hi Bill,<br>&gt;<br>&gt; I bel=
ieve you are misreading the document. In<br>&gt; draft-ietf-oauth-v2-http-m=
ac the client still uses the MAC when it<br>&gt; accesses a protected resou=
rce.<br>&gt; The only place where the JWT comes into the picture is with th=
e<br>&gt; description of the access token. This matters from a key distribu=
tion<br>&gt; point of view. The session key for the MAC is included in the =
encrypted<br>&gt; JWT. The JWT is encrypted by the authorization server and=
 decrypted by<br>&gt; the resource server.<br>&gt;<br>&gt; Information abou=
t
 how header fields get included in the MAC is described<br>&gt; in Section =
5.<br>&gt;<br>&gt; The nonce isn't killed it is just called differently: se=
q-nr. The stuff<br>&gt; in the original MAC specification actually wasn't a=
 nonce (from the<br>&gt; semantic point of view).<br>&gt; The extension par=
ameter is there implicitly by allowing additional<br>&gt; header fields to =
be included in the MAC computation.<br>&gt;<br>&gt; I need to look at the p=
ort number field again.<br>&gt;<br>&gt; Ciao<br>&gt; Hannes<br>&gt;<br>&gt;=
 On Feb 27, 2013, at 11:12 AM, William Mills wrote:<br>&gt;<br>&gt;&nbsp; &=
gt; Just read the draft quickly.<br>&gt;&nbsp; &gt;<br>&gt;&nbsp; &gt; Sinc=
e we're now leaning on JWT do we need to include the token in<br>&gt; this?=
 Why not just make an additional "Envelope MAC" thing and have the<br>&gt; =
signature include the 3 JWT parts in the signature base string? That<br>&gt=
; object then just becomes a JSON container for the kid,
 timestamp,<br>&gt; signature method, signature etc. That thing then is a 4=
th base64 encoded<br>&gt; JSON thing in the auth header.<br>&gt;&nbsp; &gt;=
<br>&gt;&nbsp; &gt; How header fields get included in the signature needs d=
efinition.<br>&gt;&nbsp; &gt;<br>&gt;&nbsp; &gt; Why did you kill the port =
number, nonce, and extension parameter out<br>&gt; of the signature base st=
ring?<br>&gt;&nbsp; &gt;<br>&gt;&nbsp; &gt; The BNF appears to have no sepa=
rators between values.<br>&gt;&nbsp; &gt;<br>&gt;&nbsp; &gt; -bill<br>&gt;&=
nbsp; &gt;<br>&gt;&nbsp; &gt;<br>&gt;&nbsp; &gt; From: "<a ymailto=3D"mailt=
o:internet-drafts@ietf.org" href=3D"mailto:internet-drafts@ietf.org">intern=
et-drafts@ietf.org</a> &lt;mailto:<a ymailto=3D"mailto:internet-drafts@ietf=
.org" href=3D"mailto:internet-drafts@ietf.org">internet-drafts@ietf.org</a>=
&gt;"<br>&gt; &lt;<a ymailto=3D"mailto:internet-drafts@ietf.org" href=3D"ma=
ilto:internet-drafts@ietf.org">internet-drafts@ietf.org</a> &lt;mailto:<a
 ymailto=3D"mailto:internet-drafts@ietf.org" href=3D"mailto:internet-drafts=
@ietf.org">internet-drafts@ietf.org</a>&gt;&gt;<br>&gt;&nbsp; &gt; To: <a y=
mailto=3D"mailto:i-d-announce@ietf.org" href=3D"mailto:i-d-announce@ietf.or=
g">i-d-announce@ietf.org</a> &lt;mailto:<a ymailto=3D"mailto:i-d-announce@i=
etf.org" href=3D"mailto:i-d-announce@ietf.org">i-d-announce@ietf.org</a>&gt=
;<br>&gt;&nbsp; &gt; Cc: <a ymailto=3D"mailto:oauth@ietf.org" href=3D"mailt=
o:oauth@ietf.org">oauth@ietf.org</a> &lt;mailto:<a ymailto=3D"mailto:oauth@=
ietf.org" href=3D"mailto:oauth@ietf.org">oauth@ietf.org</a>&gt;<br>&gt;&nbs=
p; &gt; Sent: Monday, February 25, 2013 4:46 AM<br>&gt;&nbsp; &gt; Subject:=
 [OAUTH-WG] I-D Action: draft-ietf-oauth-v2-http-mac-03.txt<br>&gt;&nbsp; &=
gt;<br>&gt;&nbsp; &gt;<br>&gt;&nbsp; &gt; A New Internet-Draft is available=
 from the on-line Internet-Drafts<br>&gt; directories.<br>&gt;&nbsp; &gt; T=
his draft is a work item of the Web Authorization Protocol Working<br>&gt; =
Group of the
 IETF.<br>&gt;&nbsp; &gt;<br>&gt;&nbsp; &gt; Title : OAuth 2.0 Message Auth=
entication Code (MAC) Tokens<br>&gt;&nbsp; &gt; Author(s) : Justin Richer<b=
r>&gt;&nbsp; &gt; William Mills<br>&gt;&nbsp; &gt; Hannes Tschofenig<br>&gt=
;&nbsp; &gt; Filename : draft-ietf-oauth-v2-http-mac-03.txt<br>&gt;&nbsp; &=
gt; Pages : 26<br>&gt;&nbsp; &gt; Date : 2013-02-25<br>&gt;&nbsp; &gt;<br>&=
gt;&nbsp; &gt; Abstract:<br>&gt;&nbsp; &gt; This specification describes ho=
w to use MAC Tokens in HTTP requests<br>&gt;&nbsp; &gt; to access OAuth 2.0=
 protected resources. An OAuth client willing to<br>&gt;&nbsp; &gt; access =
a protected resource needs to demonstrate possession of a<br>&gt;&nbsp; &gt=
; crytographic key by using it with a keyed message digest function to<br>&=
gt;&nbsp; &gt; the request.<br>&gt;&nbsp; &gt;<br>&gt;&nbsp; &gt; The docum=
ent also defines a key distribution protocol for obtaining a<br>&gt;&nbsp; =
&gt; fresh session key.<br>&gt;&nbsp; &gt;<br>&gt;&nbsp;
 &gt;<br>&gt;&nbsp; &gt; The IETF datatracker status page for this draft is=
:<br>&gt;&nbsp; &gt; <a href=3D"https://datatracker.ietf.org/doc/draft-ietf=
-oauth-v2-http-mac" target=3D"_blank">https://datatracker.ietf.org/doc/draf=
t-ietf-oauth-v2-http-mac</a><br>&gt;&nbsp; &gt;<br>&gt;&nbsp; &gt; There's =
also a htmlized version available at:<br>&gt;&nbsp; &gt; http://tools.ietf.=
org/html/draft-ietf-oauth-v2-http-mac-03<br>&gt;&nbsp; &gt;<br>&gt;&nbsp; &=
gt; A diff from the previous version is available at:<br>&gt;&nbsp; &gt; ht=
tp://www.ietf.org/rfcdiff?url2=3Ddraft-ietf-oauth-v2-http-mac-03<br>&gt;&nb=
sp; &gt;<br>&gt;&nbsp; &gt;<br>&gt;&nbsp; &gt; Internet-Drafts are also ava=
ilable by anonymous FTP at:<br>&gt;&nbsp; &gt; <a href=3D"ftp://ftp.ietf.or=
g/internet-drafts/" target=3D"_blank">ftp://ftp.ietf.org/internet-drafts/</=
a><br>&gt;&nbsp; &gt;<br>&gt;&nbsp; &gt; __________________________________=
_____________<br>&gt;&nbsp; &gt; OAuth mailing list<br>&gt;&nbsp; &gt; <a
 ymailto=3D"mailto:OAuth@ietf.org" href=3D"mailto:OAuth@ietf.org">OAuth@iet=
f.org</a> &lt;mailto:<a ymailto=3D"mailto:OAuth@ietf.org" href=3D"mailto:OA=
uth@ietf.org">OAuth@ietf.org</a>&gt;<br>&gt;&nbsp; &gt; <a href=3D"https://=
www.ietf.org/mailman/listinfo/oauth" target=3D"_blank">https://www.ietf.org=
/mailman/listinfo/oauth</a><br>&gt;&nbsp; &gt;<br>&gt;&nbsp; &gt;<br>&gt;<b=
r>&gt;<br>&gt;<br>&gt;<br>&gt;<br>&gt; ____________________________________=
___________<br>&gt; OAuth mailing list<br>&gt; <a ymailto=3D"mailto:OAuth@i=
etf.org" href=3D"mailto:OAuth@ietf.org">OAuth@ietf.org</a><br>&gt; <a href=
=3D"https://www.ietf.org/mailman/listinfo/oauth" target=3D"_blank">https://=
www.ietf.org/mailman/listinfo/oauth</a><br><br><br>________________________=
_______________________<br>OAuth mailing list<br><a ymailto=3D"mailto:OAuth=
@ietf.org" href=3D"mailto:OAuth@ietf.org">OAuth@ietf.org</a><br><a href=3D"=
https://www.ietf.org/mailman/listinfo/oauth"
 target=3D"_blank">https://www.ietf.org/mailman/listinfo/oauth</a><br><br><=
br> </div> </div>  </div></body></html>
---1036955950-98993306-1362073743=:15800--

From jricher@mitre.org  Thu Feb 28 09:51:02 2013
Return-Path: <jricher@mitre.org>
X-Original-To: oauth@ietfa.amsl.com
Delivered-To: oauth@ietfa.amsl.com
Received: from localhost (localhost [127.0.0.1]) by ietfa.amsl.com (Postfix) with ESMTP id 38E7221F87AA for <oauth@ietfa.amsl.com>; Thu, 28 Feb 2013 09:51:01 -0800 (PST)
X-Virus-Scanned: amavisd-new at amsl.com
X-Spam-Flag: NO
X-Spam-Score: -6.578
X-Spam-Level: 
X-Spam-Status: No, score=-6.578 tagged_above=-999 required=5 tests=[AWL=0.020,  BAYES_00=-2.599, HTML_MESSAGE=0.001, RCVD_IN_DNSWL_MED=-4]
Received: from mail.ietf.org ([64.170.98.30]) by localhost (ietfa.amsl.com [127.0.0.1]) (amavisd-new, port 10024) with ESMTP id NwA9xJogVF9J for <oauth@ietfa.amsl.com>; Thu, 28 Feb 2013 09:51:00 -0800 (PST)
Received: from smtpksrv1.mitre.org (smtpksrv1.mitre.org [198.49.146.77]) by ietfa.amsl.com (Postfix) with ESMTP id BEC6E21F87A3 for <oauth@ietf.org>; Thu, 28 Feb 2013 09:50:43 -0800 (PST)
Received: from smtpksrv1.mitre.org (localhost.localdomain [127.0.0.1]) by localhost (Postfix) with SMTP id 2E8E45311B94; Thu, 28 Feb 2013 12:50:43 -0500 (EST)
Received: from IMCCAS02.MITRE.ORG (imccas02.mitre.org [129.83.29.79]) by smtpksrv1.mitre.org (Postfix) with ESMTP id 0BD2D5311B8F; Thu, 28 Feb 2013 12:50:43 -0500 (EST)
Received: from [10.146.15.29] (129.83.31.58) by IMCCAS02.MITRE.ORG (129.83.29.79) with Microsoft SMTP Server (TLS) id 14.2.318.4; Thu, 28 Feb 2013 12:50:42 -0500
Message-ID: <512F98B4.3070303@mitre.org>
Date: Thu, 28 Feb 2013 12:49:40 -0500
From: Justin Richer <jricher@mitre.org>
User-Agent: Mozilla/5.0 (X11; Linux i686; rv:17.0) Gecko/20130106 Thunderbird/17.0.2
MIME-Version: 1.0
To: William Mills <wmills_92105@yahoo.com>
References: <20130225124642.7425.65145.idtracker@ietfa.amsl.com> <1361956373.9883.YahooMailNeo@web31807.mail.mud.yahoo.com> <21030204-8EA7-4FB0-9DD3-2B6C8CA57E02@gmx.net> <1362057295.36069.YahooMailNeo@web31809.mail.mud.yahoo.com> <512F8F1E.3020400@mitre.org> <1362073422.89847.YahooMailNeo@web31810.mail.mud.yahoo.com>
In-Reply-To: <1362073422.89847.YahooMailNeo@web31810.mail.mud.yahoo.com>
Content-Type: multipart/alternative; boundary="------------070904010300040105030308"
X-Originating-IP: [129.83.31.58]
Cc: "oauth@ietf.org" <oauth@ietf.org>
Subject: Re: [OAUTH-WG] I-D Action: draft-ietf-oauth-v2-http-mac-03.txt
X-BeenThere: oauth@ietf.org
X-Mailman-Version: 2.1.12
Precedence: list
List-Id: OAUTH WG <oauth.ietf.org>
List-Unsubscribe: <https://www.ietf.org/mailman/options/oauth>, <mailto:oauth-request@ietf.org?subject=unsubscribe>
List-Archive: <http://www.ietf.org/mail-archive/web/oauth>
List-Post: <mailto:oauth@ietf.org>
List-Help: <mailto:oauth-request@ietf.org?subject=help>
List-Subscribe: <https://www.ietf.org/mailman/listinfo/oauth>, <mailto:oauth-request@ietf.org?subject=subscribe>
X-List-Received-Date: Thu, 28 Feb 2013 17:51:02 -0000

--------------070904010300040105030308
Content-Type: text/plain; charset="ISO-8859-1"; format=flowed
Content-Transfer-Encoding: 7bit

OK, so it still runs the signature over HTTP elements (query, url, 
headers, etc) but all of the structured components are *communicated* 
via a JWT/JOSE structure. That makes sense to me, on the surface at least.

  -- Justin


On 02/28/2013 12:43 PM, William Mills wrote:
> 1) AS issues JWT + secret to client.
> 2) Client decides to access resource, creates the JWT MAC JSON object 
> which contains stuff about the signature and the signature itself.
> 3) client appends that base64 encoded thing to the JWT
>
> 1) Server gets a JWTMAC token, takes apart the JWT part to get the 
> signing key
> 2) Server looks at the JWTMAC to figure out what all it has to do to 
> create the signature base string
> 3) server constructs the SBS computes and checks the sig.
>
> The only hairy bit right now is an arbitrary HTTP header list that may 
> be included in the signature.
>
> No data in the JWTMAC is duplicated from anywhere else.
>
> ------------------------------------------------------------------------
> *From:* Justin Richer <jricher@mitre.org>
> *To:* William Mills <wmills_92105@yahoo.com>
> *Cc:* Hannes Tschofenig <hannes.tschofenig@gmx.net>; "oauth@ietf.org" 
> <oauth@ietf.org>
> *Sent:* Thursday, February 28, 2013 9:08 AM
> *Subject:* Re: [OAUTH-WG] I-D Action: draft-ietf-oauth-v2-http-mac-03.txt
>
> What I don't quite get is what exactly would be presented and 
> processed at each step. Who needs to know what piece? We don't want to 
> have to push everything into JSON for the signing to take place (that 
> much is clear), and we don't want the client to be pushing the MAC 
> secret to the RS every time (that would make it a lot less secret, 
> after all). But if we can reuse JWT, JWS, and other JOSE mechanisms to 
> make some parts of the MAC pattern easier for programmers, I'm for it.
>
>  -- Justin
>
> On 02/28/2013 08:14 AM, William Mills wrote:
>> I'm actually advocating that we change MAC to be a JWT extension.
>>
>> ------------------------------------------------------------------------
>> *From:* Hannes Tschofenig <hannes.tschofenig@gmx.net> 
>> <mailto:hannes.tschofenig@gmx.net>
>> *To:* William Mills <wmills_92105@yahoo.com> 
>> <mailto:wmills_92105@yahoo.com>
>> *Cc:* Hannes Tschofenig <hannes.tschofenig@gmx.net> 
>> <mailto:hannes.tschofenig@gmx.net>; "oauth@ietf.org" 
>> <mailto:oauth@ietf.org> <oauth@ietf.org> <mailto:oauth@ietf.org>
>> *Sent:* Thursday, February 28, 2013 2:28 AM
>> *Subject:* Re: [OAUTH-WG] I-D Action: draft-ietf-oauth-v2-http-mac-03.txt
>>
>> Hi Bill,
>>
>> I believe you are misreading the document. In 
>> draft-ietf-oauth-v2-http-mac the client still uses the MAC when it 
>> accesses a protected resource.
>> The only place where the JWT comes into the picture is with the 
>> description of the access token. This matters from a key distribution 
>> point of view. The session key for the MAC is included in the 
>> encrypted JWT. The JWT is encrypted by the authorization server and 
>> decrypted by the resource server.
>>
>> Information about how header fields get included in the MAC is 
>> described in Section 5.
>>
>> The nonce isn't killed it is just called differently: seq-nr. The 
>> stuff in the original MAC specification actually wasn't a nonce (from 
>> the semantic point of view).
>> The extension parameter is there implicitly by allowing additional 
>> header fields to be included in the MAC computation.
>>
>> I need to look at the port number field again.
>>
>> Ciao
>> Hannes
>>
>> On Feb 27, 2013, at 11:12 AM, William Mills wrote:
>>
>> > Just read the draft quickly.
>> >
>> > Since we're now leaning on JWT do we need to include the token in 
>> this?  Why not just make an additional "Envelope MAC" thing and have 
>> the signature include the 3 JWT parts in the signature base string?  
>> That object then just becomes a JSON container for the kid, 
>> timestamp, signature method, signature etc. That thing then is a 4th 
>> base64 encoded JSON thing in the auth header.
>> >
>> > How header fields get included in the signature needs definition.
>> >
>> > Why did you kill the port number, nonce, and extension parameter 
>> out of the signature base string?
>> >
>> > The BNF appears to have no separators between values.
>> >
>> > -bill
>> >
>> >
>> > From: "internet-drafts@ietf.org <mailto:internet-drafts@ietf.org>" 
>> <internet-drafts@ietf.org <mailto:internet-drafts@ietf.org>>
>> > To: i-d-announce@ietf.org <mailto:i-d-announce@ietf.org>
>> > Cc: oauth@ietf.org <mailto:oauth@ietf.org>
>> > Sent: Monday, February 25, 2013 4:46 AM
>> > Subject: [OAUTH-WG] I-D Action: draft-ietf-oauth-v2-http-mac-03.txt
>> >
>> >
>> > A New Internet-Draft is available from the on-line Internet-Drafts 
>> directories.
>> > This draft is a work item of the Web Authorization Protocol Working 
>> Group of the IETF.
>> >
>> >    Title          : OAuth 2.0 Message Authentication Code (MAC) Tokens
>> >    Author(s)      : Justin Richer
>> >                          William Mills
>> >                          Hannes Tschofenig
>> >    Filename        : draft-ietf-oauth-v2-http-mac-03.txt
>> >    Pages          : 26
>> >    Date            : 2013-02-25
>> >
>> > Abstract:
>> >  This specification describes how to use MAC Tokens in HTTP requests
>> >  to access OAuth 2.0 protected resources. An OAuth client willing to
>> >  access a protected resource needs to demonstrate possession of a
>> >  crytographic key by using it with a keyed message digest function to
>> >  the request.
>> >
>> >  The document also defines a key distribution protocol for obtaining a
>> >  fresh session key.
>> >
>> >
>> > The IETF datatracker status page for this draft is:
>> > https://datatracker.ietf.org/doc/draft-ietf-oauth-v2-http-mac
>> >
>> > There's also a htmlized version available at:
>> > http://tools.ietf.org/html/draft-ietf-oauth-v2-http-mac-03
>> >
>> > A diff from the previous version is available at:
>> > http://www.ietf.org/rfcdiff?url2=draft-ietf-oauth-v2-http-mac-03
>> >
>> >
>> > Internet-Drafts are also available by anonymous FTP at:
>> > ftp://ftp.ietf.org/internet-drafts/
>> >
>> > _______________________________________________
>> > OAuth mailing list
>> > OAuth@ietf.org <mailto:OAuth@ietf.org>
>> > https://www.ietf.org/mailman/listinfo/oauth
>> >
>> >
>>
>>
>>
>>
>>
>> _______________________________________________
>> OAuth mailing list
>> OAuth@ietf.org  <mailto:OAuth@ietf.org>
>> https://www.ietf.org/mailman/listinfo/oauth
>
>
>


--------------070904010300040105030308
Content-Type: text/html; charset="ISO-8859-1"
Content-Transfer-Encoding: 7bit

<html>
  <head>
    <meta content="text/html; charset=ISO-8859-1"
      http-equiv="Content-Type">
  </head>
  <body bgcolor="#FFFFFF" text="#000000">
    OK, so it still runs the signature over HTTP elements (query, url,
    headers, etc) but all of the structured components are
    *communicated* via a JWT/JOSE structure. That makes sense to me, on
    the surface at least.<br>
    <br>
    &nbsp;-- Justin<br>
    <br>
    <br>
    <div class="moz-cite-prefix">On 02/28/2013 12:43 PM, William Mills
      wrote:<br>
    </div>
    <blockquote
      cite="mid:1362073422.89847.YahooMailNeo@web31810.mail.mud.yahoo.com"
      type="cite">
      <meta http-equiv="Content-Type" content="text/html;
        charset=ISO-8859-1">
      <div style="color:#000; background-color:#fff; font-family:Courier
        New, courier, monaco, monospace, sans-serif;font-size:12pt">
        <div><span>1) AS issues JWT + secret to client.</span></div>
        <div style="color: rgb(0, 0, 0); font-size: 16px; font-family:
          'Courier New', courier, monaco, monospace, sans-serif;
          background-color: transparent; font-style: normal;"><span>2)
            Client decides to access resource, creates the JWT MAC JSON
            object which contains stuff about the signature and the
            signature itself.</span></div>
        <div style="color: rgb(0, 0, 0); font-size: 16px; font-family:
          'Courier New', courier, monaco, monospace, sans-serif;
          background-color: transparent; font-style: normal;"><span>3)
            client appends that base64 encoded thing to the JWT</span></div>
        <div style="color: rgb(0, 0, 0); font-size: 16px; font-family:
          'Courier New', courier, monaco, monospace, sans-serif;
          background-color: transparent; font-style: normal;"><span><br>
          </span></div>
        <div style="color: rgb(0, 0, 0); font-size: 16px; font-family:
          'Courier New', courier, monaco, monospace, sans-serif;
          background-color: transparent; font-style: normal;">1) Server
          gets a JWTMAC token, takes apart the JWT part to get the
          signing key</div>
        <div style="color: rgb(0, 0, 0); font-size: 16px; font-family:
          'Courier New', courier, monaco, monospace, sans-serif;
          background-color: transparent; font-style: normal;">2) Server
          looks at the JWTMAC to figure out what all it has to do to
          create the signature base string&nbsp;</div>
        <div style="color: rgb(0, 0, 0); font-size: 16px; font-family:
          'Courier New', courier, monaco, monospace, sans-serif;
          background-color: transparent; font-style: normal;">3) server
          constructs the SBS computes and checks the sig.</div>
        <div style="color: rgb(0, 0, 0); font-size: 16px; font-family:
          'Courier New', courier, monaco, monospace, sans-serif;
          background-color: transparent; font-style: normal;"><br>
        </div>
        <div style="color: rgb(0, 0, 0); font-size: 16px; font-family:
          'Courier New', courier, monaco, monospace, sans-serif;
          background-color: transparent; font-style: normal;">The only
          hairy bit right now is an arbitrary HTTP header list that may
          be included in the signature.</div>
        <div style="color: rgb(0, 0, 0); font-size: 16px; font-family:
          'Courier New', courier, monaco, monospace, sans-serif;
          background-color: transparent; font-style: normal;"><br>
        </div>
        <div style="color: rgb(0, 0, 0); font-size: 16px; font-family:
          'Courier New', courier, monaco, monospace, sans-serif;
          background-color: transparent; font-style: normal;">No data in
          the JWTMAC is duplicated from anywhere else.</div>
        <div><br>
        </div>
        <div style="font-family: 'Courier New', courier, monaco,
          monospace, sans-serif; font-size: 12pt;">
          <div style="font-family: 'times new roman', 'new york', times,
            serif; font-size: 12pt;">
            <div dir="ltr"> <font face="Arial" size="2">
                <hr size="1"> <b><span style="font-weight:bold;">From:</span></b>
                Justin Richer <a class="moz-txt-link-rfc2396E" href="mailto:jricher@mitre.org">&lt;jricher@mitre.org&gt;</a><br>
                <b><span style="font-weight: bold;">To:</span></b>
                William Mills <a class="moz-txt-link-rfc2396E" href="mailto:wmills_92105@yahoo.com">&lt;wmills_92105@yahoo.com&gt;</a> <br>
                <b><span style="font-weight: bold;">Cc:</span></b>
                Hannes Tschofenig <a class="moz-txt-link-rfc2396E" href="mailto:hannes.tschofenig@gmx.net">&lt;hannes.tschofenig@gmx.net&gt;</a>;
                <a class="moz-txt-link-rfc2396E" href="mailto:oauth@ietf.org">"oauth@ietf.org"</a> <a class="moz-txt-link-rfc2396E" href="mailto:oauth@ietf.org">&lt;oauth@ietf.org&gt;</a> <br>
                <b><span style="font-weight: bold;">Sent:</span></b>
                Thursday, February 28, 2013 9:08 AM<br>
                <b><span style="font-weight: bold;">Subject:</span></b>
                Re: [OAUTH-WG] I-D Action:
                draft-ietf-oauth-v2-http-mac-03.txt<br>
              </font> </div>
            <br>
            <div id="yiv309116819">
              <div> What I don't quite get is what exactly would be
                presented and processed at each step. Who needs to know
                what piece? We don't want to have to push everything
                into JSON for the signing to take place (that much is
                clear), and we don't want the client to be pushing the
                MAC secret to the RS every time (that would make it a
                lot less secret, after all). But if we can reuse JWT,
                JWS, and other JOSE mechanisms to make some parts of the
                MAC pattern easier for programmers, I'm for it.<br>
                <br>
                &nbsp;-- Justin<br>
                <br>
                <div class="yiv309116819moz-cite-prefix">On 02/28/2013
                  08:14 AM, William Mills wrote:<br>
                </div>
                <blockquote type="cite">
                  <div style="color: rgb(0, 0, 0); background-color:
                    rgb(255, 255, 255); font-family: 'Courier New',
                    courier, monaco, monospace, sans-serif; font-size:
                    12pt;">
                    <div><span>I'm actually advocating that we change
                        MAC to be a JWT extension.</span></div>
                    <div><br>
                    </div>
                    <div style="font-family: 'Courier New', courier,
                      monaco, monospace, sans-serif; font-size: 12pt;">
                      <div style="font-family: 'times new roman', 'new
                        york', times, serif; font-size: 12pt;">
                        <div dir="ltr"> <font face="Arial" size="2">
                            <hr size="1"> <b><span
                                style="font-weight:bold;">From:</span></b>
                            Hannes Tschofenig <a moz-do-not-send="true"
                              rel="nofollow"
                              class="yiv309116819moz-txt-link-rfc2396E"
                              ymailto="mailto:hannes.tschofenig@gmx.net"
                              target="_blank"
                              href="mailto:hannes.tschofenig@gmx.net">&lt;hannes.tschofenig@gmx.net&gt;</a><br>
                            <b><span style="font-weight:bold;">To:</span></b>
                            William Mills <a moz-do-not-send="true"
                              rel="nofollow"
                              class="yiv309116819moz-txt-link-rfc2396E"
                              ymailto="mailto:wmills_92105@yahoo.com"
                              target="_blank"
                              href="mailto:wmills_92105@yahoo.com">&lt;wmills_92105@yahoo.com&gt;</a>
                            <br>
                            <b><span style="font-weight:bold;">Cc:</span></b>
                            Hannes Tschofenig <a moz-do-not-send="true"
                              rel="nofollow"
                              class="yiv309116819moz-txt-link-rfc2396E"
                              ymailto="mailto:hannes.tschofenig@gmx.net"
                              target="_blank"
                              href="mailto:hannes.tschofenig@gmx.net">&lt;hannes.tschofenig@gmx.net&gt;</a>;
                            <a moz-do-not-send="true" rel="nofollow"
                              class="yiv309116819moz-txt-link-rfc2396E"
                              ymailto="mailto:oauth@ietf.org"
                              target="_blank"
                              href="mailto:oauth@ietf.org">"oauth@ietf.org"</a>
                            <a moz-do-not-send="true" rel="nofollow"
                              class="yiv309116819moz-txt-link-rfc2396E"
                              ymailto="mailto:oauth@ietf.org"
                              target="_blank"
                              href="mailto:oauth@ietf.org">&lt;oauth@ietf.org&gt;</a>
                            <br>
                            <b><span style="font-weight:bold;">Sent:</span></b>
                            Thursday, February 28, 2013 2:28 AM<br>
                            <b><span style="font-weight:bold;">Subject:</span></b>
                            Re: [OAUTH-WG] I-D Action:
                            draft-ietf-oauth-v2-http-mac-03.txt<br>
                          </font> </div>
                        <br>
                        Hi Bill, <br>
                        <br>
                        I believe you are misreading the document. In
                        draft-ietf-oauth-v2-http-mac the client still
                        uses the MAC when it accesses a protected
                        resource. <br>
                        The only place where the JWT comes into the
                        picture is with the description of the access
                        token. This matters from a key distribution
                        point of view. The session key for the MAC is
                        included in the encrypted JWT. The JWT is
                        encrypted by the authorization server and
                        decrypted by the resource server. <br>
                        <br>
                        Information about how header fields get included
                        in the MAC is described in Section 5.<br>
                        <br>
                        The nonce isn't killed it is just called
                        differently: seq-nr. The stuff in the original
                        MAC specification actually wasn't a nonce (from
                        the semantic point of view). <br>
                        The extension parameter is there implicitly by
                        allowing additional header fields to be included
                        in the MAC computation.<br>
                        <br>
                        I need to look at the port number field again. <br>
                        <br>
                        Ciao<br>
                        Hannes<br>
                        <br>
                        On Feb 27, 2013, at 11:12 AM, William Mills
                        wrote:<br>
                        <br>
                        &gt; Just read the draft quickly.&nbsp; <br>
                        &gt; <br>
                        &gt; Since we're now leaning on JWT do we need
                        to include the token in this?&nbsp; Why not just make
                        an additional "Envelope MAC" thing and have the
                        signature include the 3 JWT parts in the
                        signature base string?&nbsp; That object then just
                        becomes a JSON container for the kid, timestamp,
                        signature method, signature etc. That thing then
                        is a 4th base64 encoded JSON thing in the auth
                        header.<br>
                        &gt; <br>
                        &gt; How header fields get included in the
                        signature needs definition.<br>
                        &gt; <br>
                        &gt; Why did you kill the port number, nonce,
                        and extension parameter out of the signature
                        base string?<br>
                        &gt; <br>
                        &gt; The BNF appears to have no separators
                        between values.<br>
                        &gt; <br>
                        &gt; -bill<br>
                        &gt; <br>
                        &gt; <br>
                        &gt; From: "<a moz-do-not-send="true"
                          rel="nofollow"
                          ymailto="mailto:internet-drafts@ietf.org"
                          target="_blank"
                          href="mailto:internet-drafts@ietf.org">internet-drafts@ietf.org</a>"
                        &lt;<a moz-do-not-send="true" rel="nofollow"
                          ymailto="mailto:internet-drafts@ietf.org"
                          target="_blank"
                          href="mailto:internet-drafts@ietf.org">internet-drafts@ietf.org</a>&gt;<br>
                        &gt; To: <a moz-do-not-send="true"
                          rel="nofollow"
                          ymailto="mailto:i-d-announce@ietf.org"
                          target="_blank"
                          href="mailto:i-d-announce@ietf.org">i-d-announce@ietf.org</a>
                        <br>
                        &gt; Cc: <a moz-do-not-send="true"
                          rel="nofollow" ymailto="mailto:oauth@ietf.org"
                          target="_blank" href="mailto:oauth@ietf.org">oauth@ietf.org</a>
                        <br>
                        &gt; Sent: Monday, February 25, 2013 4:46 AM<br>
                        &gt; Subject: [OAUTH-WG] I-D Action:
                        draft-ietf-oauth-v2-http-mac-03.txt<br>
                        &gt; <br>
                        &gt; <br>
                        &gt; A New Internet-Draft is available from the
                        on-line Internet-Drafts directories.<br>
                        &gt; This draft is a work item of the Web
                        Authorization Protocol Working Group of the
                        IETF.<br>
                        &gt; <br>
                        &gt;&nbsp; &nbsp; Title&nbsp; &nbsp; &nbsp; &nbsp; &nbsp; : OAuth 2.0 Message
                        Authentication Code (MAC) Tokens<br>
                        &gt;&nbsp; &nbsp; Author(s)&nbsp; &nbsp; &nbsp; : Justin Richer<br>
                        &gt;&nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; William Mills<br>
                        &gt;&nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; Hannes Tschofenig<br>
                        &gt;&nbsp; &nbsp; Filename&nbsp; &nbsp; &nbsp; &nbsp; :
                        draft-ietf-oauth-v2-http-mac-03.txt<br>
                        &gt;&nbsp; &nbsp; Pages&nbsp; &nbsp; &nbsp; &nbsp; &nbsp; : 26<br>
                        &gt;&nbsp; &nbsp; Date&nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; : 2013-02-25<br>
                        &gt; <br>
                        &gt; Abstract:<br>
                        &gt;&nbsp; This specification describes how to use
                        MAC Tokens in HTTP requests<br>
                        &gt;&nbsp; to access OAuth 2.0 protected resources.&nbsp;
                        An OAuth client willing to<br>
                        &gt;&nbsp; access a protected resource needs to
                        demonstrate possession of a<br>
                        &gt;&nbsp; crytographic key by using it with a keyed
                        message digest function to<br>
                        &gt;&nbsp; the request.<br>
                        &gt; <br>
                        &gt;&nbsp; The document also defines a key
                        distribution protocol for obtaining a<br>
                        &gt;&nbsp; fresh session key.<br>
                        &gt; <br>
                        &gt; <br>
                        &gt; The IETF datatracker status page for this
                        draft is:<br>
                        &gt; <a moz-do-not-send="true" rel="nofollow"
                          target="_blank"
                          href="https://datatracker.ietf.org/doc/draft-ietf-oauth-v2-http-mac">https://datatracker.ietf.org/doc/draft-ietf-oauth-v2-http-mac</a><br>
                        &gt; <br>
                        &gt; There's also a htmlized version available
                        at:<br>
                        &gt;
                        <a class="moz-txt-link-freetext" href="http://tools.ietf.org/html/draft-ietf-oauth-v2-http-mac-03">http://tools.ietf.org/html/draft-ietf-oauth-v2-http-mac-03</a><br>
                        &gt; <br>
                        &gt; A diff from the previous version is
                        available at:<br>
                        &gt;
                        <a class="moz-txt-link-freetext" href="http://www.ietf.org/rfcdiff?url2=draft-ietf-oauth-v2-http-mac-03">http://www.ietf.org/rfcdiff?url2=draft-ietf-oauth-v2-http-mac-03</a><br>
                        &gt; <br>
                        &gt; <br>
                        &gt; Internet-Drafts are also available by
                        anonymous FTP at:<br>
                        &gt; <a moz-do-not-send="true" rel="nofollow"
                          target="_blank"
                          href="ftp://ftp.ietf.org/internet-drafts/">ftp://ftp.ietf.org/internet-drafts/</a><br>
                        &gt; <br>
                        &gt;
                        _______________________________________________<br>
                        &gt; OAuth mailing list<br>
                        &gt; <a moz-do-not-send="true" rel="nofollow"
                          ymailto="mailto:OAuth@ietf.org"
                          target="_blank" href="mailto:OAuth@ietf.org">OAuth@ietf.org</a><br>
                        &gt; <a moz-do-not-send="true" rel="nofollow"
                          target="_blank"
                          href="https://www.ietf.org/mailman/listinfo/oauth">https://www.ietf.org/mailman/listinfo/oauth</a><br>
                        &gt; <br>
                        &gt; <br>
                        <br>
                        <br>
                        <br>
                      </div>
                    </div>
                  </div>
                  <br>
                  <fieldset class="yiv309116819mimeAttachmentHeader"></fieldset>
                  <br>
                  <pre>_______________________________________________
OAuth mailing list
<a moz-do-not-send="true" rel="nofollow" class="yiv309116819moz-txt-link-abbreviated" ymailto="mailto:OAuth@ietf.org" target="_blank" href="mailto:OAuth@ietf.org">OAuth@ietf.org</a>
<a moz-do-not-send="true" rel="nofollow" class="yiv309116819moz-txt-link-freetext" target="_blank" href="https://www.ietf.org/mailman/listinfo/oauth">https://www.ietf.org/mailman/listinfo/oauth</a>
</pre>
                </blockquote>
                <br>
              </div>
            </div>
            <br>
            <br>
          </div>
        </div>
      </div>
    </blockquote>
    <br>
  </body>
</html>

--------------070904010300040105030308--

From hannes.tschofenig@gmx.net  Thu Feb 28 09:56:51 2013
Return-Path: <hannes.tschofenig@gmx.net>
X-Original-To: oauth@ietfa.amsl.com
Delivered-To: oauth@ietfa.amsl.com
Received: from localhost (localhost [127.0.0.1]) by ietfa.amsl.com (Postfix) with ESMTP id 04A8C21F8835 for <oauth@ietfa.amsl.com>; Thu, 28 Feb 2013 09:56:51 -0800 (PST)
X-Virus-Scanned: amavisd-new at amsl.com
X-Spam-Flag: NO
X-Spam-Score: -102.533
X-Spam-Level: 
X-Spam-Status: No, score=-102.533 tagged_above=-999 required=5 tests=[AWL=0.066, BAYES_00=-2.599, USER_IN_WHITELIST=-100]
Received: from mail.ietf.org ([64.170.98.30]) by localhost (ietfa.amsl.com [127.0.0.1]) (amavisd-new, port 10024) with ESMTP id fhVjXKSkEqD2 for <oauth@ietfa.amsl.com>; Thu, 28 Feb 2013 09:56:50 -0800 (PST)
Received: from mout.gmx.net (mout.gmx.net [212.227.15.19]) by ietfa.amsl.com (Postfix) with ESMTP id 06E1221F8801 for <oauth@ietf.org>; Thu, 28 Feb 2013 09:56:50 -0800 (PST)
Received: from mailout-de.gmx.net ([10.1.76.19]) by mrigmx.server.lan (mrigmx002) with ESMTP (Nemesis) id 0MW5VH-1ULvTM06kz-00XLiq for <oauth@ietf.org>; Thu, 28 Feb 2013 18:56:49 +0100
Received: (qmail invoked by alias); 28 Feb 2013 17:56:48 -0000
Received: from a88-115-219-140.elisa-laajakaista.fi (EHLO [192.168.100.200]) [88.115.219.140] by mail.gmx.net (mp019) with SMTP; 28 Feb 2013 18:56:48 +0100
X-Authenticated: #29516787
X-Provags-ID: V01U2FsdGVkX1/qA+AIv83qY78549ETKXbQ4F8uymmYECbhMvKtk5 L82/hJjvJF9nDv
Message-ID: <512F9A5C.1070900@gmx.net>
Date: Thu, 28 Feb 2013 19:56:44 +0200
From: Hannes Tschofenig <hannes.tschofenig@gmx.net>
User-Agent: Mozilla/5.0 (X11; Linux x86_64; rv:17.0) Gecko/20130106 Thunderbird/17.0.2
MIME-Version: 1.0
To: Phil Hunt <phil.hunt@oracle.com>
References: <0EC2404F-E3C5-4AD1-88B4-E74AA0394DD9@gmx.net> <C75E4871-E907-4EF7-BAF0-9D1A172D581B@ve7jtb.com> <CA6A6425-D0CE-469F-B51E-9F296DA8041C@oracle.com> <EAD4F55D-7A02-4209-BB15-21BA5AB512AC@ve7jtb.com> <1BDBAFF3-6B2D-45EE-8A7E-B0B2572C8A01@oracle.com>
In-Reply-To: <1BDBAFF3-6B2D-45EE-8A7E-B0B2572C8A01@oracle.com>
Content-Type: text/plain; charset=ISO-8859-1; format=flowed
Content-Transfer-Encoding: 7bit
X-Y-GMX-Trusted: 0
Cc: "oauth@ietf.org WG" <oauth@ietf.org>
Subject: Re: [OAUTH-WG] JWT - scope claim missing
X-BeenThere: oauth@ietf.org
X-Mailman-Version: 2.1.12
Precedence: list
List-Id: OAUTH WG <oauth.ietf.org>
List-Unsubscribe: <https://www.ietf.org/mailman/options/oauth>, <mailto:oauth-request@ietf.org?subject=unsubscribe>
List-Archive: <http://www.ietf.org/mail-archive/web/oauth>
List-Post: <mailto:oauth@ietf.org>
List-Help: <mailto:oauth-request@ietf.org?subject=help>
List-Subscribe: <https://www.ietf.org/mailman/listinfo/oauth>, <mailto:oauth-request@ietf.org?subject=subscribe>
X-List-Received-Date: Thu, 28 Feb 2013 17:56:51 -0000

I guess we first have to agree whether there is a security benefit of 
communicating the scope from the AS to the RS (in a way that it cannot 
be modified by the client or any other party).

The scope indicates permissions (for example, whether the resource owner 
allowed read access to a certain resource or write access).

Do you agree that there is a security benefit (or to put it the other 
way around: do you see the security vulnerability if this information is 
not communicated to the RS and checked against what the resource owner 
accepted?

Then, a secondary question is what the right mechanism is.

Ciao
Hannes


On 02/28/2013 07:29 PM, Phil Hunt wrote:
> What people are doing now is often issuing saml like assertions. Thats not necessarily indicating intent. It just indicates transition.
>
> Phil
>
> Sent from my phone.
>
> On 2013-02-28, at 9:07, John Bradley <ve7jtb@ve7jtb.com> wrote:
>
>> I am not advocating anything, only sting what people are doing now.
>>
>> How authorization is communicated between the AS and RS via a token that is opaque to the client is out of scope fro OAuth core, it might be magic pixy dust.
>>
>> This has lead to a number of ways people are doing it.
>>
>> JWT along with  JOSE provide a container to get some claims from the AS to the RS though the JWT is not specific to this and is used in the assertions profile and other specs for many things other than access tokens.
>>
>> Yes a profile of JWT for an access token as an access token is needed, Yes further profiling is required for a JWT access token using MAC.
>>
>> The format of the authorization claims is not tightly bound to MAC and might be used with other bearer JWT tokens.
>>
>> I don't know that there will be only one way to communicate those claims because different sorts of implementations need different information for the RS to act on.
>> Recommendations are fine but defining a field called scope and passing on exactly the scopes the client was granted is not going to work for everyone for lots of good reasons.
>>
>> John B.
>> On 2013-02-28, at 8:24 AM, Phil Hunt <phil.hunt@oracle.com> wrote:
>>
>>> Are you advocating TWO systems? That seems like a bad choice.
>>>
>>> I would rather fix scope than go to a two system approach.
>>>
>>> Phil
>>>
>>> Sent from my phone.
>>>
>>> On 2013-02-28, at 8:17, John Bradley <ve7jtb@ve7jtb.com> wrote:
>>>
>>>> While scope is one method that a AS could communicate authorization to a RS, it is not the only or perhaps even the most likely one.
>>>> Using scope requires a relatively tight binding between the RS and AS,  UMA uses a different mechanism that describes finer grained operations.
>>>> The AS may include roles, user, or other more abstract claims that the the client may (god help them) pass on to EXCML for processing.
>>>>
>>>> While having a scopes claim is possible, like any other claim it is not part of the JWT core security processing claims, and needs to be defined by extension.
>>>>
>>>> John B.
>>>> On 2013-02-28, at 2:29 AM, Hannes Tschofenig <hannes.tschofenig@gmx.net> wrote:
>>>>
>>>>> Hi Mike,
>>>>>
>>>>> when I worked on the MAC specification I noticed that the JWT does not have a claim for the scope. I believe that this would be needed to allow the resource server to verify whether the scope the authorization server authorized is indeed what the client is asking for.
>>>>>
>>>>> Ciao
>>>>> Hannes
>>>>>
>>>>> _______________________________________________
>>>>> OAuth mailing list
>>>>> OAuth@ietf.org
>>>>> https://www.ietf.org/mailman/listinfo/oauth
>>>>
>>>> _______________________________________________
>>>> OAuth mailing list
>>>> OAuth@ietf.org
>>>> https://www.ietf.org/mailman/listinfo/oauth
>>


From Adam.Lewis@motorolasolutions.com  Thu Feb 28 09:57:56 2013
Return-Path: <Adam.Lewis@motorolasolutions.com>
X-Original-To: oauth@ietfa.amsl.com
Delivered-To: oauth@ietfa.amsl.com
Received: from localhost (localhost [127.0.0.1]) by ietfa.amsl.com (Postfix) with ESMTP id 667D321F8C2A for <oauth@ietfa.amsl.com>; Thu, 28 Feb 2013 09:57:56 -0800 (PST)
X-Virus-Scanned: amavisd-new at amsl.com
X-Spam-Flag: NO
X-Spam-Score: -0.466
X-Spam-Level: 
X-Spam-Status: No, score=-0.466 tagged_above=-999 required=5 tests=[BAYES_00=-2.599, HTML_MESSAGE=0.001, RCVD_IN_DNSWL_LOW=-1, UNRESOLVED_TEMPLATE=3.132]
Received: from mail.ietf.org ([64.170.98.30]) by localhost (ietfa.amsl.com [127.0.0.1]) (amavisd-new, port 10024) with ESMTP id VnlauyydH5J9 for <oauth@ietfa.amsl.com>; Thu, 28 Feb 2013 09:57:53 -0800 (PST)
Received: from va3outboundpool.messaging.microsoft.com (va3ehsobe003.messaging.microsoft.com [216.32.180.13]) by ietfa.amsl.com (Postfix) with ESMTP id 47C7C21F8835 for <oauth@ietf.org>; Thu, 28 Feb 2013 09:57:53 -0800 (PST)
Received: from mail100-va3-R.bigfish.com (10.7.14.238) by VA3EHSOBE012.bigfish.com (10.7.40.62) with Microsoft SMTP Server id 14.1.225.23; Thu, 28 Feb 2013 17:57:52 +0000
Received: from mail100-va3 (localhost [127.0.0.1])	by mail100-va3-R.bigfish.com (Postfix) with ESMTP id 7F6631A0281	for <oauth@ietf.org>; Thu, 28 Feb 2013 17:57:52 +0000 (UTC)
X-Forefront-Antispam-Report: CIP:192.160.210.20; KIP:(null); UIP:(null); IPV:NLI; H:ct11msg01.am.mot-solutions.com; RD:ct11msg01.mot-solutions.com; EFVD:NLI
X-SpamScore: -25
X-BigFish: VPS-25(zz98dI9371I936eIc85fhc430I1432Izz1f42h1ee6h1de0h1202h1e76h1d1ah1d2ahzz8275ch1033IL177df4h17326ah8275dh18c673h8275bhz2fh2a8h683h839hd25hf0ah1288h12a5h12bdh137ah1441h1504h1537h153bh15d0h162dh1631h1758h18e1h1946h19b5h19ceh1155h)
Received-SPF: pass (mail100-va3: domain of motorolasolutions.com designates 192.160.210.20 as permitted sender) client-ip=192.160.210.20; envelope-from=Adam.Lewis@motorolasolutions.com; helo=ct11msg01.am.mot-solutions.com ; olutions.com ; 
X-Forefront-Antispam-Report-Untrusted: CIP:157.56.237.133; KIP:(null); UIP:(null); (null); H:BY2PRD0411HT003.namprd04.prod.outlook.com; R:internal; EFV:INT
Received: from mail100-va3 (localhost.localdomain [127.0.0.1]) by mail100-va3 (MessageSwitch) id 1362074268614835_24100; Thu, 28 Feb 2013 17:57:48 +0000 (UTC)
Received: from VA3EHSMHS017.bigfish.com (unknown [10.7.14.229])	by mail100-va3.bigfish.com (Postfix) with ESMTP id 7729D260066	for <oauth@ietf.org>; Thu, 28 Feb 2013 17:57:48 +0000 (UTC)
Received: from ct11msg01.am.mot-solutions.com (192.160.210.20) by VA3EHSMHS017.bigfish.com (10.7.99.27) with Microsoft SMTP Server (TLS) id 14.1.225.23; Thu, 28 Feb 2013 17:57:47 +0000
Received: from ct11msg01.am.mot-solutions.com (ct11vts03.am.mot.com [10.177.16.162])	by ct11msg01.am.mot-solutions.com (8.14.3/8.14.3) with ESMTP id r1SILtmf003500	for <oauth@ietf.org>; Thu, 28 Feb 2013 12:21:55 -0600 (CST)
Received: from CO9EHSOBE020.bigfish.com (co9ehsobe002.messaging.microsoft.com [207.46.163.25])	by ct11msg01.am.mot-solutions.com (8.14.3/8.14.3) with ESMTP id r1SILs05003492	(version=TLSv1/SSLv3 cipher=AES128-SHA bits=128 verify=FAIL)	for <oauth@ietf.org>; Thu, 28 Feb 2013 12:21:55 -0600 (CST)
Received: from mail143-co9-R.bigfish.com (10.236.132.254) by CO9EHSOBE020.bigfish.com (10.236.130.83) with Microsoft SMTP Server id 14.1.225.23; Thu, 28 Feb 2013 17:57:45 +0000
Received: from mail143-co9 (localhost [127.0.0.1])	by mail143-co9-R.bigfish.com (Postfix) with ESMTP id EC7441E0240	for <oauth@ietf.org.FOPE.CONNECTOR.OVERRIDE>; Thu, 28 Feb 2013 17:57:44 +0000 (UTC)
Received: from mail143-co9 (localhost.localdomain [127.0.0.1]) by mail143-co9 (MessageSwitch) id 1362074263216252_3227; Thu, 28 Feb 2013 17:57:43 +0000 (UTC)
Received: from CO9EHSMHS027.bigfish.com (unknown [10.236.132.245])	by mail143-co9.bigfish.com (Postfix) with ESMTP id 311AB400D6; Thu, 28 Feb 2013 17:57:43 +0000 (UTC)
Received: from BY2PRD0411HT003.namprd04.prod.outlook.com (157.56.237.133) by CO9EHSMHS027.bigfish.com (10.236.130.37) with Microsoft SMTP Server (TLS) id 14.1.225.23; Thu, 28 Feb 2013 17:57:40 +0000
Received: from BY2PRD0411MB441.namprd04.prod.outlook.com ([169.254.5.225]) by BY2PRD0411HT003.namprd04.prod.outlook.com ([10.255.128.38]) with mapi id 14.16.0263.000; Thu, 28 Feb 2013 17:57:40 +0000
From: Lewis Adam-CAL022 <Adam.Lewis@motorolasolutions.com>
To: John Bradley <ve7jtb@ve7jtb.com>, Phil Hunt <phil.hunt@oracle.com>
Thread-Topic: [OAUTH-WG] JWT - scope claim missing
Thread-Index: AQHOFZ6Qe5ExGqoPnkOeJlU0r70rz5iPcwoAgAAB5gCAAAWJgIAADAUAgAAB+4CAAAU18IAAATlA
Date: Thu, 28 Feb 2013 17:57:40 +0000
Message-ID: <59E470B10C4630419ED717AC79FCF9A948D58AFA@BY2PRD0411MB441.namprd04.prod.outlook.com>
References: <0EC2404F-E3C5-4AD1-88B4-E74AA0394DD9@gmx.net> <C75E4871-E907-4EF7-BAF0-9D1A172D581B@ve7jtb.com> <CA6A6425-D0CE-469F-B51E-9F296DA8041C@oracle.com> <CA+k3eCREgN+6z+U=jjJcPo0nZVR0GWn5zXeecZRO+rg=xd-gZg@mail.gmail.com> <39016EC6-D3E3-4812-9825-B1C95A5D9AED@oracle.com> <637841B2-C50C-444D-960F-CABB0CEC889D@ve7jtb.com> 
Accept-Language: en-US
Content-Language: en-US
X-MS-Has-Attach: 
X-MS-TNEF-Correlator: 
x-originating-ip: [184.78.105.93]
Content-Type: multipart/alternative; boundary="_000_59E470B10C4630419ED717AC79FCF9A948D58AFABY2PRD0411MB441_"
MIME-Version: 1.0
X-FOPE-CONNECTOR: Id%0$Dn%*$RO%0$TLS%0$FQDN%$TlsDn%
X-FOPE-CONNECTOR: Id%1294$Dn%VE7JTB.COM$RO%2$TLS%3$FQDN%msgate.mot-solutions.com$TlsDn%
X-FOPE-CONNECTOR: Id%1294$Dn%ORACLE.COM$RO%2$TLS%3$FQDN%msgate.mot-solutions.com$TlsDn%
X-FOPE-CONNECTOR: Id%1294$Dn%IETF.ORG$RO%2$TLS%3$FQDN%msgate.mot-solutions.com$TlsDn%
X-CFilter-Loop: Reflected
X-OriginatorOrg: motorolasolutions.com
Cc: "oauth@ietf.org WG" <oauth@ietf.org>
Subject: Re: [OAUTH-WG] JWT - scope claim missing
X-BeenThere: oauth@ietf.org
X-Mailman-Version: 2.1.12
Precedence: list
List-Id: OAUTH WG <oauth.ietf.org>
List-Unsubscribe: <https://www.ietf.org/mailman/options/oauth>, <mailto:oauth-request@ietf.org?subject=unsubscribe>
List-Archive: <http://www.ietf.org/mail-archive/web/oauth>
List-Post: <mailto:oauth@ietf.org>
List-Help: <mailto:oauth-request@ietf.org?subject=help>
List-Subscribe: <https://www.ietf.org/mailman/listinfo/oauth>, <mailto:oauth-request@ietf.org?subject=subscribe>
X-List-Received-Date: Thu, 28 Feb 2013 17:57:56 -0000

--_000_59E470B10C4630419ED717AC79FCF9A948D58AFABY2PRD0411MB441_
Content-Type: text/plain; charset="us-ascii"
Content-Transfer-Encoding: quoted-printable

Adding my 2 cents ...

I am looking to use JWT as the structure for my access tokens, and will lik=
ely profile it to look just like an id_token, plus the scope claim which tr=
iggered this thread :-)

I am also looking at JWT as a grant type.

I am also looking into federating my access tokens (one of the main reasons=
 I am looking to use JWT as the structure for the AT).

All is subject to change, but that is where my head is today.

adam

From: oauth-bounces@ietf.org [mailto:oauth-bounces@ietf.org] On Behalf Of J=
ohn Bradley
Sent: Thursday, February 28, 2013 11:34 AM
To: Phil Hunt
Cc: "WG <oauth@ietf.org>"@il06exr02.mot.com
Subject: Re: [OAUTH-WG] JWT - scope claim missing

Yes IETF WG politics:)

Should JWT and JOSE  be together ?  Through a number of twists and turns th=
ey are not, lets not go there.

But to the point a number of us have made JWT is used in OAuth for more tha=
n access tokens.
Currently it's only use in OAuth is in the JWT assertions profile that has =
nothing to do with access tokens.

John B.

On 2013-02-28, at 9:27 AM, Phil Hunt <phil.hunt@oracle.com<mailto:phil.hunt=
@oracle.com>> wrote:

Am I missing something. JWT is firstly an oauth spec. Otherwise why isnt it=
 in jose wg?

Phil

Sent from my phone.

On 2013-02-28, at 8:44, Brian Campbell <bcampbell@pingidentity.com<mailto:b=
campbell@pingidentity.com>> wrote:
I think John's point was more that scope is something rather specific to an=
 OAuth access token and, while JWT is can be used to represent an access to=
ken, it's not the only application of JWT. The 'standard' claims in JWT are=
 those that are believed (right or wrong) to be widely applicable across di=
fferent applications of JWT. One could argue about it but scope is probably=
 not one of those.
It would probably make sense to try and build a profile of JWT specifically=
 for OAuth access tokens (though I suspect there are some turtles and drago=
ns in there), which might be the appropriate place to define/register a sco=
pe claim.

On Thu, Feb 28, 2013 at 9:24 AM, Phil Hunt <phil.hunt@oracle.com<mailto:phi=
l.hunt@oracle.com>> wrote:
Are you advocating TWO systems? That seems like a bad choice.

I would rather fix scope than go to a two system approach.

Phil

Sent from my phone.

On 2013-02-28, at 8:17, John Bradley <ve7jtb@ve7jtb.com<mailto:ve7jtb@ve7jt=
b.com>> wrote:

> While scope is one method that a AS could communicate authorization to a =
RS, it is not the only or perhaps even the most likely one.
> Using scope requires a relatively tight binding between the RS and AS,  U=
MA uses a different mechanism that describes finer grained operations.
> The AS may include roles, user, or other more abstract claims that the th=
e client may (god help them) pass on to EXCML for processing.
>
> While having a scopes claim is possible, like any other claim it is not p=
art of the JWT core security processing claims, and needs to be defined by =
extension.
>
> John B.
> On 2013-02-28, at 2:29 AM, Hannes Tschofenig <hannes.tschofenig@gmx.net<m=
ailto:hannes.tschofenig@gmx.net>> wrote:
>
>> Hi Mike,
>>
>> when I worked on the MAC specification I noticed that the JWT does not h=
ave a claim for the scope. I believe that this would be needed to allow the=
 resource server to verify whether the scope the authorization server autho=
rized is indeed what the client is asking for.
>>
>> Ciao
>> Hannes
>>
>> _______________________________________________
>> OAuth mailing list
>> OAuth@ietf.org<mailto:OAuth@ietf.org>
>> https://www.ietf.org/mailman/listinfo/oauth
>
> _______________________________________________
> OAuth mailing list
> OAuth@ietf.org<mailto:OAuth@ietf.org>
> https://www.ietf.org/mailman/listinfo/oauth
_______________________________________________
OAuth mailing list
OAuth@ietf.org<mailto:OAuth@ietf.org>
https://www.ietf.org/mailman/listinfo/oauth



--_000_59E470B10C4630419ED717AC79FCF9A948D58AFABY2PRD0411MB441_
Content-Type: text/html; charset="us-ascii"
Content-Transfer-Encoding: quoted-printable

<html xmlns:v=3D"urn:schemas-microsoft-com:vml" xmlns:o=3D"urn:schemas-micr=
osoft-com:office:office" xmlns:w=3D"urn:schemas-microsoft-com:office:word" =
xmlns:x=3D"urn:schemas-microsoft-com:office:excel" xmlns:p=3D"urn:schemas-m=
icrosoft-com:office:powerpoint" xmlns:a=3D"urn:schemas-microsoft-com:office=
:access" xmlns:dt=3D"uuid:C2F41010-65B3-11d1-A29F-00AA00C14882" xmlns:s=3D"=
uuid:BDC6E3F0-6DA3-11d1-A2A3-00AA00C14882" xmlns:rs=3D"urn:schemas-microsof=
t-com:rowset" xmlns:z=3D"#RowsetSchema" xmlns:b=3D"urn:schemas-microsoft-co=
m:office:publisher" xmlns:ss=3D"urn:schemas-microsoft-com:office:spreadshee=
t" xmlns:c=3D"urn:schemas-microsoft-com:office:component:spreadsheet" xmlns=
:odc=3D"urn:schemas-microsoft-com:office:odc" xmlns:oa=3D"urn:schemas-micro=
soft-com:office:activation" xmlns:html=3D"http://www.w3.org/TR/REC-html40" =
xmlns:q=3D"http://schemas.xmlsoap.org/soap/envelope/" xmlns:rtc=3D"http://m=
icrosoft.com/officenet/conferencing" xmlns:D=3D"DAV:" xmlns:Repl=3D"http://=
schemas.microsoft.com/repl/" xmlns:mt=3D"http://schemas.microsoft.com/share=
point/soap/meetings/" xmlns:x2=3D"http://schemas.microsoft.com/office/excel=
/2003/xml" xmlns:ppda=3D"http://www.passport.com/NameSpace.xsd" xmlns:ois=
=3D"http://schemas.microsoft.com/sharepoint/soap/ois/" xmlns:dir=3D"http://=
schemas.microsoft.com/sharepoint/soap/directory/" xmlns:ds=3D"http://www.w3=
.org/2000/09/xmldsig#" xmlns:dsp=3D"http://schemas.microsoft.com/sharepoint=
/dsp" xmlns:udc=3D"http://schemas.microsoft.com/data/udc" xmlns:xsd=3D"http=
://www.w3.org/2001/XMLSchema" xmlns:sub=3D"http://schemas.microsoft.com/sha=
repoint/soap/2002/1/alerts/" xmlns:ec=3D"http://www.w3.org/2001/04/xmlenc#"=
 xmlns:sp=3D"http://schemas.microsoft.com/sharepoint/" xmlns:sps=3D"http://=
schemas.microsoft.com/sharepoint/soap/" xmlns:xsi=3D"http://www.w3.org/2001=
/XMLSchema-instance" xmlns:udcs=3D"http://schemas.microsoft.com/data/udc/so=
ap" xmlns:udcxf=3D"http://schemas.microsoft.com/data/udc/xmlfile" xmlns:udc=
p2p=3D"http://schemas.microsoft.com/data/udc/parttopart" xmlns:wf=3D"http:/=
/schemas.microsoft.com/sharepoint/soap/workflow/" xmlns:dsss=3D"http://sche=
mas.microsoft.com/office/2006/digsig-setup" xmlns:dssi=3D"http://schemas.mi=
crosoft.com/office/2006/digsig" xmlns:mdssi=3D"http://schemas.openxmlformat=
s.org/package/2006/digital-signature" xmlns:mver=3D"http://schemas.openxmlf=
ormats.org/markup-compatibility/2006" xmlns:m=3D"http://schemas.microsoft.c=
om/office/2004/12/omml" xmlns:mrels=3D"http://schemas.openxmlformats.org/pa=
ckage/2006/relationships" xmlns:spwp=3D"http://microsoft.com/sharepoint/web=
partpages" xmlns:ex12t=3D"http://schemas.microsoft.com/exchange/services/20=
06/types" xmlns:ex12m=3D"http://schemas.microsoft.com/exchange/services/200=
6/messages" xmlns:pptsl=3D"http://schemas.microsoft.com/sharepoint/soap/Sli=
deLibrary/" xmlns:spsl=3D"http://microsoft.com/webservices/SharePointPortal=
Server/PublishedLinksService" xmlns:Z=3D"urn:schemas-microsoft-com:" xmlns:=
st=3D"&#1;" xmlns=3D"http://www.w3.org/TR/REC-html40">
<head>
<meta http-equiv=3D"Content-Type" content=3D"text/html; charset=3Dus-ascii"=
>
<meta name=3D"Generator" content=3D"Microsoft Word 12 (filtered medium)">
<style><!--
/* Font Definitions */
@font-face
	{font-family:Calibri;
	panose-1:2 15 5 2 2 2 4 3 2 4;}
@font-face
	{font-family:Tahoma;
	panose-1:2 11 6 4 3 5 4 4 2 4;}
@font-face
	{font-family:"Book Antiqua";
	panose-1:2 4 6 2 5 3 5 3 3 4;}
/* Style Definitions */
p.MsoNormal, li.MsoNormal, div.MsoNormal
	{margin:0in;
	margin-bottom:.0001pt;
	font-size:12.0pt;
	font-family:"Times New Roman","serif";}
a:link, span.MsoHyperlink
	{mso-style-priority:99;
	color:blue;
	text-decoration:underline;}
a:visited, span.MsoHyperlinkFollowed
	{mso-style-priority:99;
	color:purple;
	text-decoration:underline;}
span.EmailStyle17
	{mso-style-type:personal;
	font-family:"Book Antiqua","serif";
	color:olive;
	font-weight:normal;
	font-style:normal;
	text-decoration:none none;}
span.EmailStyle18
	{mso-style-type:personal-reply;
	font-family:"Book Antiqua","serif";
	color:olive;
	font-weight:normal;
	font-style:normal;
	text-decoration:none none;}
.MsoChpDefault
	{mso-style-type:export-only;
	font-size:10.0pt;}
@page WordSection1
	{size:8.5in 11.0in;
	margin:1.0in 1.0in 1.0in 1.0in;}
div.WordSection1
	{page:WordSection1;}
--></style><!--[if gte mso 9]><xml>
<o:shapedefaults v:ext=3D"edit" spidmax=3D"1026" />
</xml><![endif]--><!--[if gte mso 9]><xml>
<o:shapelayout v:ext=3D"edit">
<o:idmap v:ext=3D"edit" data=3D"1" />
</o:shapelayout></xml><![endif]-->
</head>
<body lang=3D"EN-US" link=3D"blue" vlink=3D"purple" style=3D"word-wrap: bre=
ak-word;-webkit-nbsp-mode: space;-webkit-line-break: after-white-space">
<div class=3D"WordSection1">
<p class=3D"MsoNormal"><span style=3D"font-size:10.5pt;font-family:&quot;Bo=
ok Antiqua&quot;,&quot;serif&quot;;color:olive">Adding my 2 cents &#8230;
<o:p></o:p></span></p>
<p class=3D"MsoNormal"><span style=3D"font-size:10.5pt;font-family:&quot;Bo=
ok Antiqua&quot;,&quot;serif&quot;;color:olive"><o:p>&nbsp;</o:p></span></p=
>
<p class=3D"MsoNormal"><span style=3D"font-size:10.5pt;font-family:&quot;Bo=
ok Antiqua&quot;,&quot;serif&quot;;color:olive">I am looking to use JWT as =
the structure for my access tokens, and will likely profile it to look just=
 like an id_token, plus the scope claim which triggered
 this thread :-)<o:p></o:p></span></p>
<p class=3D"MsoNormal"><span style=3D"font-size:10.5pt;font-family:&quot;Bo=
ok Antiqua&quot;,&quot;serif&quot;;color:olive"><o:p>&nbsp;</o:p></span></p=
>
<p class=3D"MsoNormal"><span style=3D"font-size:10.5pt;font-family:&quot;Bo=
ok Antiqua&quot;,&quot;serif&quot;;color:olive">I am also looking at JWT as=
 a grant type.<o:p></o:p></span></p>
<p class=3D"MsoNormal"><span style=3D"font-size:10.5pt;font-family:&quot;Bo=
ok Antiqua&quot;,&quot;serif&quot;;color:olive"><o:p>&nbsp;</o:p></span></p=
>
<p class=3D"MsoNormal"><span style=3D"font-size:10.5pt;font-family:&quot;Bo=
ok Antiqua&quot;,&quot;serif&quot;;color:olive">I am also looking into fede=
rating my access tokens (one of the main reasons I am looking to use JWT as=
 the structure for the AT).&nbsp;
<o:p></o:p></span></p>
<p class=3D"MsoNormal"><span style=3D"font-size:10.5pt;font-family:&quot;Bo=
ok Antiqua&quot;,&quot;serif&quot;;color:olive"><o:p>&nbsp;</o:p></span></p=
>
<p class=3D"MsoNormal"><span style=3D"font-size:10.5pt;font-family:&quot;Bo=
ok Antiqua&quot;,&quot;serif&quot;;color:olive">All is subject to change, b=
ut that is where my head is today.&nbsp;
<o:p></o:p></span></p>
<p class=3D"MsoNormal"><span style=3D"font-size:10.5pt;font-family:&quot;Bo=
ok Antiqua&quot;,&quot;serif&quot;;color:olive"><o:p>&nbsp;</o:p></span></p=
>
<p class=3D"MsoNormal"><span style=3D"font-size:10.5pt;font-family:&quot;Bo=
ok Antiqua&quot;,&quot;serif&quot;;color:olive">adam<o:p></o:p></span></p>
<p class=3D"MsoNormal"><span style=3D"font-size:10.5pt;font-family:&quot;Bo=
ok Antiqua&quot;,&quot;serif&quot;;color:olive"><o:p>&nbsp;</o:p></span></p=
>
<div>
<div style=3D"border:none;border-top:solid #B5C4DF 1.0pt;padding:3.0pt 0in =
0in 0in">
<p class=3D"MsoNormal"><b><span style=3D"font-size:10.0pt;font-family:&quot=
;Tahoma&quot;,&quot;sans-serif&quot;">From:</span></b><span style=3D"font-s=
ize:10.0pt;font-family:&quot;Tahoma&quot;,&quot;sans-serif&quot;"> oauth-bo=
unces@ietf.org [mailto:oauth-bounces@ietf.org]
<b>On Behalf Of </b>John Bradley<br>
<b>Sent:</b> Thursday, February 28, 2013 11:34 AM<br>
<b>To:</b> Phil Hunt<br>
<b>Cc:</b> &quot;WG &lt;oauth@ietf.org&gt;&quot;@il06exr02.mot.com<br>
<b>Subject:</b> Re: [OAUTH-WG] JWT - scope claim missing<o:p></o:p></span><=
/p>
</div>
</div>
<p class=3D"MsoNormal"><o:p>&nbsp;</o:p></p>
<p class=3D"MsoNormal">Yes IETF WG politics:)<o:p></o:p></p>
<div>
<p class=3D"MsoNormal"><o:p>&nbsp;</o:p></p>
</div>
<div>
<p class=3D"MsoNormal">Should JWT and JOSE &nbsp;be together ? &nbsp;Throug=
h a number of twists and turns they are not, lets not go there.<o:p></o:p><=
/p>
</div>
<div>
<p class=3D"MsoNormal"><o:p>&nbsp;</o:p></p>
</div>
<div>
<p class=3D"MsoNormal">But to the point a number of us have made JWT is use=
d in OAuth for more than access tokens. &nbsp;<o:p></o:p></p>
</div>
<div>
<p class=3D"MsoNormal">Currently it's only use in OAuth is in the JWT asser=
tions profile that has nothing to do with access tokens.<o:p></o:p></p>
</div>
<div>
<p class=3D"MsoNormal"><o:p>&nbsp;</o:p></p>
</div>
<div>
<p class=3D"MsoNormal">John B.<o:p></o:p></p>
</div>
<div>
<p class=3D"MsoNormal"><o:p>&nbsp;</o:p></p>
<div>
<div>
<p class=3D"MsoNormal">On 2013-02-28, at 9:27 AM, Phil Hunt &lt;<a href=3D"=
mailto:phil.hunt@oracle.com">phil.hunt@oracle.com</a>&gt; wrote:<o:p></o:p>=
</p>
</div>
<p class=3D"MsoNormal" style=3D"margin-bottom:12.0pt"><o:p>&nbsp;</o:p></p>
<div>
<div>
<p class=3D"MsoNormal">Am I missing something. JWT is firstly an oauth spec=
. Otherwise why isnt it in jose wg?<br>
<br>
Phil<o:p></o:p></p>
<div>
<p class=3D"MsoNormal"><o:p>&nbsp;</o:p></p>
</div>
<div>
<p class=3D"MsoNormal">Sent from my phone.<o:p></o:p></p>
</div>
</div>
<div>
<p class=3D"MsoNormal" style=3D"margin-bottom:12.0pt"><br>
On 2013-02-28, at 8:44, Brian Campbell &lt;<a href=3D"mailto:bcampbell@ping=
identity.com">bcampbell@pingidentity.com</a>&gt; wrote:<o:p></o:p></p>
</div>
<blockquote style=3D"margin-top:5.0pt;margin-bottom:5.0pt">
<div>
<div>
<p class=3D"MsoNormal" style=3D"margin-bottom:12.0pt">I think John's point =
was more that scope is something rather specific to an OAuth access token a=
nd, while JWT is can be used to represent an access token, it's not the onl=
y application of JWT. The 'standard'
 claims in JWT are those that are believed (right or wrong) to be widely ap=
plicable across different applications of JWT. One could argue about it but=
 scope is probably not one of those.<o:p></o:p></p>
</div>
<p class=3D"MsoNormal">It would probably make sense to try and build a prof=
ile of JWT specifically for OAuth access tokens (though I suspect there are=
 some turtles and dragons in there), which might be the appropriate place t=
o define/register a scope claim.<o:p></o:p></p>
</div>
<div>
<p class=3D"MsoNormal" style=3D"margin-bottom:12.0pt"><o:p>&nbsp;</o:p></p>
<div>
<p class=3D"MsoNormal">On Thu, Feb 28, 2013 at 9:24 AM, Phil Hunt &lt;<a hr=
ef=3D"mailto:phil.hunt@oracle.com" target=3D"_blank">phil.hunt@oracle.com</=
a>&gt; wrote:<o:p></o:p></p>
<p class=3D"MsoNormal">Are you advocating TWO systems? That seems like a ba=
d choice.<br>
<br>
I would rather fix scope than go to a two system approach.<br>
<br>
Phil<br>
<br>
Sent from my phone.<br>
<br>
On 2013-02-28, at 8:17, John Bradley &lt;<a href=3D"mailto:ve7jtb@ve7jtb.co=
m">ve7jtb@ve7jtb.com</a>&gt; wrote:<br>
<br>
&gt; While scope is one method that a AS could communicate authorization to=
 a RS, it is not the only or perhaps even the most likely one.<br>
&gt; Using scope requires a relatively tight binding between the RS and AS,=
 &nbsp;UMA uses a different mechanism that describes finer grained operatio=
ns.<br>
&gt; The AS may include roles, user, or other more abstract claims that the=
 the client may (god help them) pass on to EXCML for processing.<br>
&gt;<br>
&gt; While having a scopes claim is possible, like any other claim it is no=
t part of the JWT core security processing claims, and needs to be defined =
by extension.<br>
&gt;<br>
&gt; John B.<br>
&gt; On 2013-02-28, at 2:29 AM, Hannes Tschofenig &lt;<a href=3D"mailto:han=
nes.tschofenig@gmx.net">hannes.tschofenig@gmx.net</a>&gt; wrote:<br>
&gt;<br>
&gt;&gt; Hi Mike,<br>
&gt;&gt;<br>
&gt;&gt; when I worked on the MAC specification I noticed that the JWT does=
 not have a claim for the scope. I believe that this would be needed to all=
ow the resource server to verify whether the scope the authorization server=
 authorized is indeed what the client
 is asking for.<br>
&gt;&gt;<br>
&gt;&gt; Ciao<br>
&gt;&gt; Hannes<br>
&gt;&gt;<br>
&gt;&gt; _______________________________________________<br>
&gt;&gt; OAuth mailing list<br>
&gt;&gt; <a href=3D"mailto:OAuth@ietf.org">OAuth@ietf.org</a><br>
&gt;&gt; <a href=3D"https://www.ietf.org/mailman/listinfo/oauth" target=3D"=
_blank">https://www.ietf.org/mailman/listinfo/oauth</a><br>
&gt;<br>
&gt; _______________________________________________<br>
&gt; OAuth mailing list<br>
&gt; <a href=3D"mailto:OAuth@ietf.org">OAuth@ietf.org</a><br>
&gt; <a href=3D"https://www.ietf.org/mailman/listinfo/oauth" target=3D"_bla=
nk">https://www.ietf.org/mailman/listinfo/oauth</a><br>
_______________________________________________<br>
OAuth mailing list<br>
<a href=3D"mailto:OAuth@ietf.org">OAuth@ietf.org</a><br>
<a href=3D"https://www.ietf.org/mailman/listinfo/oauth" target=3D"_blank">h=
ttps://www.ietf.org/mailman/listinfo/oauth</a><o:p></o:p></p>
</div>
<p class=3D"MsoNormal"><o:p>&nbsp;</o:p></p>
</div>
</blockquote>
</div>
</div>
<p class=3D"MsoNormal"><o:p>&nbsp;</o:p></p>
</div>
</div>
</body>
</html>

--_000_59E470B10C4630419ED717AC79FCF9A948D58AFABY2PRD0411MB441_--

From sberyozkin@gmail.com  Thu Feb 28 10:02:33 2013
Return-Path: <sberyozkin@gmail.com>
X-Original-To: oauth@ietfa.amsl.com
Delivered-To: oauth@ietfa.amsl.com
Received: from localhost (localhost [127.0.0.1]) by ietfa.amsl.com (Postfix) with ESMTP id 7411821F8B70 for <oauth@ietfa.amsl.com>; Thu, 28 Feb 2013 10:02:33 -0800 (PST)
X-Virus-Scanned: amavisd-new at amsl.com
X-Spam-Flag: NO
X-Spam-Score: -3.566
X-Spam-Level: 
X-Spam-Status: No, score=-3.566 tagged_above=-999 required=5 tests=[AWL=0.033,  BAYES_00=-2.599, RCVD_IN_DNSWL_LOW=-1]
Received: from mail.ietf.org ([64.170.98.30]) by localhost (ietfa.amsl.com [127.0.0.1]) (amavisd-new, port 10024) with ESMTP id s5VI1ftTQo0f for <oauth@ietfa.amsl.com>; Thu, 28 Feb 2013 10:02:32 -0800 (PST)
Received: from mail-ee0-f41.google.com (mail-ee0-f41.google.com [74.125.83.41]) by ietfa.amsl.com (Postfix) with ESMTP id 1D9FF21F8B4A for <oauth@ietf.org>; Thu, 28 Feb 2013 10:02:31 -0800 (PST)
Received: by mail-ee0-f41.google.com with SMTP id c13so1786462eek.0 for <oauth@ietf.org>; Thu, 28 Feb 2013 10:02:31 -0800 (PST)
DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=gmail.com; s=20120113; h=x-received:message-id:date:from:user-agent:mime-version:to:cc :subject:references:in-reply-to:content-type :content-transfer-encoding; bh=Si6VoxlVpVxtN9XT9DI9HhAA5c+aOz8Jf9sALTnyU3U=; b=psuczaLlg/woguY0VUoArA5f2cydRTzaSPIHF811ka+xvTdBaX0oNSp91VMgVyux6b JWYXHS4FWsdRZ7S2oRh+zIZs+n94E7jvhUyYdYrdyAh+cq/AeFpsOHqTJF9Cb/dUIxYN WtlpP1j1nmKuCZlCddzUqSkqy8x5COQ9ZfGLPzwJh7wU2Gv6JiXrBc4DyXwdW+vZdDbC 1QO2L6q6IAlDdMYYZm4HQIuYmB7fpVZxToxz8ZAwsYQLvu1FHLtrBXvKRREiNzSOwGyw v01tgK4uUpEUjjl84oa3f8orrp+ONHQxYW3YLRgShrvhlMO6NIvM9pdVeIZmWpMZC2wT ai7w==
X-Received: by 10.14.207.73 with SMTP id m49mr19169646eeo.24.1362074551011; Thu, 28 Feb 2013 10:02:31 -0800 (PST)
Received: from [192.168.2.5] ([79.97.76.201]) by mx.google.com with ESMTPS id r4sm13047644eeo.12.2013.02.28.10.02.28 (version=TLSv1 cipher=ECDHE-RSA-RC4-SHA bits=128/128); Thu, 28 Feb 2013 10:02:29 -0800 (PST)
Message-ID: <512F9BB3.2010201@gmail.com>
Date: Thu, 28 Feb 2013 18:02:27 +0000
From: Sergey Beryozkin <sberyozkin@gmail.com>
User-Agent: Mozilla/5.0 (X11; Linux x86_64; rv:12.0) Gecko/20120430 Thunderbird/12.0.1
MIME-Version: 1.0
To: William Mills <wmills_92105@yahoo.com>
References: <20130225124642.7425.65145.idtracker@ietfa.amsl.com> <1361956373.9883.YahooMailNeo@web31807.mail.mud.yahoo.com> <21030204-8EA7-4FB0-9DD3-2B6C8CA57E02@gmx.net> <1362057295.36069.YahooMailNeo@web31809.mail.mud.yahoo.com> <512F8E1D.2060408@gmail.com> <1362073743.15800.YahooMailNeo@web31802.mail.mud.yahoo.com>
In-Reply-To: <1362073743.15800.YahooMailNeo@web31802.mail.mud.yahoo.com>
Content-Type: text/plain; charset=ISO-8859-1; format=flowed
Content-Transfer-Encoding: 7bit
Cc: "oauth@ietf.org" <oauth@ietf.org>
Subject: Re: [OAUTH-WG] I-D Action: draft-ietf-oauth-v2-http-mac-03.txt
X-BeenThere: oauth@ietf.org
X-Mailman-Version: 2.1.12
Precedence: list
List-Id: OAUTH WG <oauth.ietf.org>
List-Unsubscribe: <https://www.ietf.org/mailman/options/oauth>, <mailto:oauth-request@ietf.org?subject=unsubscribe>
List-Archive: <http://www.ietf.org/mail-archive/web/oauth>
List-Post: <mailto:oauth@ietf.org>
List-Help: <mailto:oauth-request@ietf.org?subject=help>
List-Subscribe: <https://www.ietf.org/mailman/listinfo/oauth>, <mailto:oauth-request@ietf.org?subject=subscribe>
X-List-Received-Date: Thu, 28 Feb 2013 18:02:33 -0000

On 28/02/13 17:49, William Mills wrote:
> The JWT replaces the oauth_token data element in the old MAC stuff. I
> just want to take all the other oauth_* variables and stuff them in a
> separate JSON object and completely kill the "fun with sorting
> variables" when the oauth_* things can be carried in the query string or
> header or post body.
As far as the client accessing RS is concerned, should it be limited to 
using a header, same as for other OAuth2 tokens ?

Cheers, Sergey

>
> ------------------------------------------------------------------------
> *From:* Sergey Beryozkin <sberyozkin@gmail.com>
> *To:* oauth@ietf.org
> *Sent:* Thursday, February 28, 2013 9:04 AM
> *Subject:* Re: [OAUTH-WG] I-D Action: draft-ietf-oauth-v2-http-mac-03.txt
>
> Hi
> On 28/02/13 13:14, William Mills wrote:
>  > I'm actually advocating that we change MAC to be a JWT extension.
> IMHO, having a simpler option, plus, going forward, a possible JWT
> profile (client to RS path) would work better -
>
> Why would JWT completely take over ? May be it should be possible indeed
> to have it as a JWT extension - should it be part of the relevant JWT
> assertion spec, where JWT is used as a possible grant ?
>
> Thanks, Sergey
>  >
>  > ------------------------------------------------------------------------
>  > *From:* Hannes Tschofenig <hannes.tschofenig@gmx.net
> <mailto:hannes.tschofenig@gmx.net>>
>  > *To:* William Mills <wmills_92105@yahoo.com
> <mailto:wmills_92105@yahoo.com>>
>  > *Cc:* Hannes Tschofenig <hannes.tschofenig@gmx.net
> <mailto:hannes.tschofenig@gmx.net>>; "oauth@ietf.org
> <mailto:oauth@ietf.org>"
>  > <oauth@ietf.org <mailto:oauth@ietf.org>>
>  > *Sent:* Thursday, February 28, 2013 2:28 AM
>  > *Subject:* Re: [OAUTH-WG] I-D Action: draft-ietf-oauth-v2-http-mac-03.txt
>  >
>  > Hi Bill,
>  >
>  > I believe you are misreading the document. In
>  > draft-ietf-oauth-v2-http-mac the client still uses the MAC when it
>  > accesses a protected resource.
>  > The only place where the JWT comes into the picture is with the
>  > description of the access token. This matters from a key distribution
>  > point of view. The session key for the MAC is included in the encrypted
>  > JWT. The JWT is encrypted by the authorization server and decrypted by
>  > the resource server.
>  >
>  > Information about how header fields get included in the MAC is described
>  > in Section 5.
>  >
>  > The nonce isn't killed it is just called differently: seq-nr. The stuff
>  > in the original MAC specification actually wasn't a nonce (from the
>  > semantic point of view).
>  > The extension parameter is there implicitly by allowing additional
>  > header fields to be included in the MAC computation.
>  >
>  > I need to look at the port number field again.
>  >
>  > Ciao
>  > Hannes
>  >
>  > On Feb 27, 2013, at 11:12 AM, William Mills wrote:
>  >
>  > > Just read the draft quickly.
>  > >
>  > > Since we're now leaning on JWT do we need to include the token in
>  > this? Why not just make an additional "Envelope MAC" thing and have the
>  > signature include the 3 JWT parts in the signature base string? That
>  > object then just becomes a JSON container for the kid, timestamp,
>  > signature method, signature etc. That thing then is a 4th base64 encoded
>  > JSON thing in the auth header.
>  > >
>  > > How header fields get included in the signature needs definition.
>  > >
>  > > Why did you kill the port number, nonce, and extension parameter out
>  > of the signature base string?
>  > >
>  > > The BNF appears to have no separators between values.
>  > >
>  > > -bill
>  > >
>  > >
>  > > From: "internet-drafts@ietf.org <mailto:internet-drafts@ietf.org>
> <mailto:internet-drafts@ietf.org <mailto:internet-drafts@ietf.org>>"
>  > <internet-drafts@ietf.org <mailto:internet-drafts@ietf.org>
> <mailto:internet-drafts@ietf.org <mailto:internet-drafts@ietf.org>>>
>  > > To: i-d-announce@ietf.org <mailto:i-d-announce@ietf.org>
> <mailto:i-d-announce@ietf.org <mailto:i-d-announce@ietf.org>>
>  > > Cc: oauth@ietf.org <mailto:oauth@ietf.org> <mailto:oauth@ietf.org
> <mailto:oauth@ietf.org>>
>  > > Sent: Monday, February 25, 2013 4:46 AM
>  > > Subject: [OAUTH-WG] I-D Action: draft-ietf-oauth-v2-http-mac-03.txt
>  > >
>  > >
>  > > A New Internet-Draft is available from the on-line Internet-Drafts
>  > directories.
>  > > This draft is a work item of the Web Authorization Protocol Working
>  > Group of the IETF.
>  > >
>  > > Title : OAuth 2.0 Message Authentication Code (MAC) Tokens
>  > > Author(s) : Justin Richer
>  > > William Mills
>  > > Hannes Tschofenig
>  > > Filename : draft-ietf-oauth-v2-http-mac-03.txt
>  > > Pages : 26
>  > > Date : 2013-02-25
>  > >
>  > > Abstract:
>  > > This specification describes how to use MAC Tokens in HTTP requests
>  > > to access OAuth 2.0 protected resources. An OAuth client willing to
>  > > access a protected resource needs to demonstrate possession of a
>  > > crytographic key by using it with a keyed message digest function to
>  > > the request.
>  > >
>  > > The document also defines a key distribution protocol for obtaining a
>  > > fresh session key.
>  > >
>  > >
>  > > The IETF datatracker status page for this draft is:
>  > > https://datatracker.ietf.org/doc/draft-ietf-oauth-v2-http-mac
>  > >
>  > > There's also a htmlized version available at:
>  > > http://tools.ietf.org/html/draft-ietf-oauth-v2-http-mac-03
>  > >
>  > > A diff from the previous version is available at:
>  > > http://www.ietf.org/rfcdiff?url2=draft-ietf-oauth-v2-http-mac-03
>  > >
>  > >
>  > > Internet-Drafts are also available by anonymous FTP at:
>  > > ftp://ftp.ietf.org/internet-drafts/
>  > >
>  > > _______________________________________________
>  > > OAuth mailing list
>  > > OAuth@ietf.org <mailto:OAuth@ietf.org> <mailto:OAuth@ietf.org
> <mailto:OAuth@ietf.org>>
>  > > https://www.ietf.org/mailman/listinfo/oauth
>  > >
>  > >
>  >
>  >
>  >
>  >
>  >
>  > _______________________________________________
>  > OAuth mailing list
>  > OAuth@ietf.org <mailto:OAuth@ietf.org>
>  > https://www.ietf.org/mailman/listinfo/oauth
>
>
> _______________________________________________
> OAuth mailing list
> OAuth@ietf.org <mailto:OAuth@ietf.org>
> https://www.ietf.org/mailman/listinfo/oauth
>
>

From wmills_92105@yahoo.com  Thu Feb 28 10:06:07 2013
Return-Path: <wmills_92105@yahoo.com>
X-Original-To: oauth@ietfa.amsl.com
Delivered-To: oauth@ietfa.amsl.com
Received: from localhost (localhost [127.0.0.1]) by ietfa.amsl.com (Postfix) with ESMTP id AB37F21F8B1E for <oauth@ietfa.amsl.com>; Thu, 28 Feb 2013 10:06:07 -0800 (PST)
X-Virus-Scanned: amavisd-new at amsl.com
X-Spam-Flag: NO
X-Spam-Score: -2.361
X-Spam-Level: 
X-Spam-Status: No, score=-2.361 tagged_above=-999 required=5 tests=[AWL=0.237,  BAYES_00=-2.599, HTML_MESSAGE=0.001]
Received: from mail.ietf.org ([64.170.98.30]) by localhost (ietfa.amsl.com [127.0.0.1]) (amavisd-new, port 10024) with ESMTP id VDvECQZ8wOwk for <oauth@ietfa.amsl.com>; Thu, 28 Feb 2013 10:06:06 -0800 (PST)
Received: from nm32-vm2.bullet.mail.bf1.yahoo.com (nm32-vm2.bullet.mail.bf1.yahoo.com [72.30.239.138]) by ietfa.amsl.com (Postfix) with ESMTP id 0FD5821F8A5F for <oauth@ietf.org>; Thu, 28 Feb 2013 10:06:05 -0800 (PST)
Received: from [98.139.212.144] by nm32.bullet.mail.bf1.yahoo.com with NNFMP; 28 Feb 2013 18:06:05 -0000
Received: from [98.139.212.232] by tm1.bullet.mail.bf1.yahoo.com with NNFMP; 28 Feb 2013 18:06:05 -0000
Received: from [127.0.0.1] by omp1041.mail.bf1.yahoo.com with NNFMP; 28 Feb 2013 18:06:05 -0000
X-Yahoo-Newman-Property: ymail-3
X-Yahoo-Newman-Id: 487990.29584.bm@omp1041.mail.bf1.yahoo.com
Received: (qmail 43209 invoked by uid 60001); 28 Feb 2013 18:06:04 -0000
DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=yahoo.com; s=s1024; t=1362074764; bh=mCXNd9Vh7jT11daU1+veM5odseX6Jfo4kulsfIRlZTw=; h=X-YMail-OSG:Received:X-Rocket-MIMEInfo:X-Mailer:References:Message-ID:Date:From:Reply-To:Subject:To:Cc:In-Reply-To:MIME-Version:Content-Type; b=BsPbxej8KsezKpyYEDd9e6GDVeWvLL8MzbgV7+0RfH7y3A6SED6hcQw2DNE9BLFhBEUBx//frY3J/atOBNqbNVaQ7PQ1CEQQZFBEqfn+p3z7JFZvsqK0hn74yB/IOHBmCwXP1umEul/hdXKRJK5R/ypRmHTbDrLWuZyiBkmHDYs=
DomainKey-Signature: a=rsa-sha1; q=dns; c=nofws; s=s1024; d=yahoo.com; h=X-YMail-OSG:Received:X-Rocket-MIMEInfo:X-Mailer:References:Message-ID:Date:From:Reply-To:Subject:To:Cc:In-Reply-To:MIME-Version:Content-Type; b=PrnTCaTCUGc3PKEtpGBK6lcP8c5sPs0UDb9J+kcvn0fbyuv095xgFbDHV60wFhqUHPtaXLkouh6dBGO7lD+NRP701SNOeaz6T+ZnDWfj6VrqrWe35g0CY4DWuhn+D9gk2xU58rg7oCLFZYQUet+R2Zsj2yA2Lb6mkJTsqKXV64U=;
X-YMail-OSG: zUdjpcMVM1nVVZvq3rx23yZAJw7oLQBsYG9HHtGq73W2i4s 9T_y1QXRgaGNtp1UM3MnYfI9xriNtgZ3GfHRlzevzHiQNLkIhrp4AqC8ZvPj fu5A9YxsC8t0.OO.G5uj1cI9720_3.m6YfDNOxcMup8qmxsygjpvjlK3nYcr 9GwWlPJ1Xh53wnevzv2Xze35TFSbQOlPhNvFoStBL4GF_.iYJOmr9m5hhdq3 Z3zzlQo0OrWTpe61JGWkHCz5L0qBTZn60ojLQ1YDxbFo2uheOPdIhGX7RxBZ HjG_RcVLG9hLudPUVksWLENB2vRSFRXmRZbbwhmt_f3JRXTXMhiYyOmh2FxN lvd_qi8SjBDscx83Sys6BO9n65B5upxFX247PGNqWNi1bQhjSvfBnlRi8KRY Q6qpem_nn0J1mhMcoxs9U1WorSqzi1N_pG24PKc4sSFUHA4k816sxQSRU3vw cimBpEYZ2fg3RcwZzOouK0PxEhIkrpVpKqXTQFchALwV4E8ibAch08s3wOcy Mejyq_oE0dXZcJkEUwYsaP5jqIFhVcgQ4Bo4wNfIRZDk-
Received: from [209.131.62.115] by web31806.mail.mud.yahoo.com via HTTP; Thu, 28 Feb 2013 10:06:04 PST
X-Rocket-MIMEInfo: 001.001, SSBjZXJ0YWlubHkgaG9wZSBzby4KCgpfX19fX19fX19fX19fX19fX19fX19fX19fX19fX19fXwogRnJvbTogU2VyZ2V5IEJlcnlvemtpbiA8c2JlcnlvemtpbkBnbWFpbC5jb20.ClRvOiBXaWxsaWFtIE1pbGxzIDx3bWlsbHNfOTIxMDVAeWFob28uY29tPiAKQ2M6ICJvYXV0aEBpZXRmLm9yZyIgPG9hdXRoQGlldGYub3JnPiAKU2VudDogVGh1cnNkYXksIEZlYnJ1YXJ5IDI4LCAyMDEzIDEwOjAyIEFNClN1YmplY3Q6IFJlOiBbT0FVVEgtV0ddIEktRCBBY3Rpb246IGRyYWZ0LWlldGYtb2F1dGgtdjItaHR0cC0BMAEBAQE-
X-Mailer: YahooMailWebService/0.8.135.514
References: <20130225124642.7425.65145.idtracker@ietfa.amsl.com> <1361956373.9883.YahooMailNeo@web31807.mail.mud.yahoo.com> <21030204-8EA7-4FB0-9DD3-2B6C8CA57E02@gmx.net> <1362057295.36069.YahooMailNeo@web31809.mail.mud.yahoo.com> <512F8E1D.2060408@gmail.com> <1362073743.15800.YahooMailNeo@web31802.mail.mud.yahoo.com> <512F9BB3.2010201@gmail.com>
Message-ID: <1362074764.35520.YahooMailNeo@web31806.mail.mud.yahoo.com>
Date: Thu, 28 Feb 2013 10:06:04 -0800 (PST)
From: William Mills <wmills_92105@yahoo.com>
To: Sergey Beryozkin <sberyozkin@gmail.com>
In-Reply-To: <512F9BB3.2010201@gmail.com>
MIME-Version: 1.0
Content-Type: multipart/alternative; boundary="-1055047407-710131732-1362074764=:35520"
Cc: "oauth@ietf.org" <oauth@ietf.org>
Subject: Re: [OAUTH-WG] I-D Action: draft-ietf-oauth-v2-http-mac-03.txt
X-BeenThere: oauth@ietf.org
X-Mailman-Version: 2.1.12
Precedence: list
Reply-To: William Mills <wmills_92105@yahoo.com>
List-Id: OAUTH WG <oauth.ietf.org>
List-Unsubscribe: <https://www.ietf.org/mailman/options/oauth>, <mailto:oauth-request@ietf.org?subject=unsubscribe>
List-Archive: <http://www.ietf.org/mail-archive/web/oauth>
List-Post: <mailto:oauth@ietf.org>
List-Help: <mailto:oauth-request@ietf.org?subject=help>
List-Subscribe: <https://www.ietf.org/mailman/listinfo/oauth>, <mailto:oauth-request@ietf.org?subject=subscribe>
X-List-Received-Date: Thu, 28 Feb 2013 18:06:07 -0000

---1055047407-710131732-1362074764=:35520
Content-Type: text/plain; charset=iso-8859-1
Content-Transfer-Encoding: quoted-printable

I certainly hope so.=0A=0A=0A________________________________=0A From: Serg=
ey Beryozkin <sberyozkin@gmail.com>=0ATo: William Mills <wmills_92105@yahoo=
.com> =0ACc: "oauth@ietf.org" <oauth@ietf.org> =0ASent: Thursday, February =
28, 2013 10:02 AM=0ASubject: Re: [OAUTH-WG] I-D Action: draft-ietf-oauth-v2=
-http-mac-03.txt=0A =0AOn 28/02/13 17:49, William Mills wrote:=0A> The JWT =
replaces the oauth_token data element in the old MAC stuff. I=0A> just want=
 to take all the other oauth_* variables and stuff them in a=0A> separate J=
SON object and completely kill the "fun with sorting=0A> variables" when th=
e oauth_* things can be carried in the query string or=0A> header or post b=
ody.=0AAs far as the client accessing RS is concerned, should it be limited=
 to =0Ausing a header, same as for other OAuth2 tokens ?=0A=0ACheers, Serge=
y=0A=0A>=0A> --------------------------------------------------------------=
----------=0A> *From:* Sergey Beryozkin <sberyozkin@gmail.com>=0A> *To:* oa=
uth@ietf.org=0A> *Sent:* Thursday, February 28, 2013 9:04 AM=0A> *Subject:*=
 Re: [OAUTH-WG] I-D Action: draft-ietf-oauth-v2-http-mac-03.txt=0A>=0A> Hi=
=0A> On 28/02/13 13:14, William Mills wrote:=0A>=A0 > I'm actually advocati=
ng that we change MAC to be a JWT extension.=0A> IMHO, having a simpler opt=
ion, plus, going forward, a possible JWT=0A> profile (client to RS path) wo=
uld work better -=0A>=0A> Why would JWT completely take over ? May be it sh=
ould be possible indeed=0A> to have it as a JWT extension - should it be pa=
rt of the relevant JWT=0A> assertion spec, where JWT is used as a possible =
grant ?=0A>=0A> Thanks, Sergey=0A>=A0 >=0A>=A0 > --------------------------=
----------------------------------------------=0A>=A0 > *From:* Hannes Tsch=
ofenig <hannes.tschofenig@gmx.net=0A> <mailto:hannes.tschofenig@gmx.net>>=
=0A>=A0 > *To:* William Mills <wmills_92105@yahoo.com=0A> <mailto:wmills_92=
105@yahoo.com>>=0A>=A0 > *Cc:* Hannes Tschofenig <hannes.tschofenig@gmx.net=
=0A> <mailto:hannes.tschofenig@gmx.net>>; "oauth@ietf.org=0A> <mailto:oauth=
@ietf.org>"=0A>=A0 > <oauth@ietf.org <mailto:oauth@ietf.org>>=0A>=A0 > *Sen=
t:* Thursday, February 28, 2013 2:28 AM=0A>=A0 > *Subject:* Re: [OAUTH-WG] =
I-D Action: draft-ietf-oauth-v2-http-mac-03.txt=0A>=A0 >=0A>=A0 > Hi Bill,=
=0A>=A0 >=0A>=A0 > I believe you are misreading the document. In=0A>=A0 > d=
raft-ietf-oauth-v2-http-mac the client still uses the MAC when it=0A>=A0 > =
accesses a protected resource.=0A>=A0 > The only place where the JWT comes =
into the picture is with the=0A>=A0 > description of the access token. This=
 matters from a key distribution=0A>=A0 > point of view. The session key fo=
r the MAC is included in the encrypted=0A>=A0 > JWT. The JWT is encrypted b=
y the authorization server and decrypted by=0A>=A0 > the resource server.=
=0A>=A0 >=0A>=A0 > Information about how header fields get included in the =
MAC is described=0A>=A0 > in Section 5.=0A>=A0 >=0A>=A0 > The nonce isn't k=
illed it is just called differently: seq-nr. The stuff=0A>=A0 > in the orig=
inal MAC specification actually wasn't a nonce (from the=0A>=A0 > semantic =
point of view).=0A>=A0 > The extension parameter is there implicitly by all=
owing additional=0A>=A0 > header fields to be included in the MAC computati=
on.=0A>=A0 >=0A>=A0 > I need to look at the port number field again.=0A>=A0=
 >=0A>=A0 > Ciao=0A>=A0 > Hannes=0A>=A0 >=0A>=A0 > On Feb 27, 2013, at 11:1=
2 AM, William Mills wrote:=0A>=A0 >=0A>=A0 > > Just read the draft quickly.=
=0A>=A0 > >=0A>=A0 > > Since we're now leaning on JWT do we need to include=
 the token in=0A>=A0 > this? Why not just make an additional "Envelope MAC"=
 thing and have the=0A>=A0 > signature include the 3 JWT parts in the signa=
ture base string? That=0A>=A0 > object then just becomes a JSON container f=
or the kid, timestamp,=0A>=A0 > signature method, signature etc. That thing=
 then is a 4th base64 encoded=0A>=A0 > JSON thing in the auth header.=0A>=
=A0 > >=0A>=A0 > > How header fields get included in the signature needs de=
finition.=0A>=A0 > >=0A>=A0 > > Why did you kill the port number, nonce, an=
d extension parameter out=0A>=A0 > of the signature base string?=0A>=A0 > >=
=0A>=A0 > > The BNF appears to have no separators between values.=0A>=A0 > =
>=0A>=A0 > > -bill=0A>=A0 > >=0A>=A0 > >=0A>=A0 > > From: "internet-drafts@=
ietf.org <mailto:internet-drafts@ietf.org>=0A> <mailto:internet-drafts@ietf=
.org <mailto:internet-drafts@ietf.org>>"=0A>=A0 > <internet-drafts@ietf.org=
 <mailto:internet-drafts@ietf.org>=0A> <mailto:internet-drafts@ietf.org <ma=
ilto:internet-drafts@ietf.org>>>=0A>=A0 > > To: i-d-announce@ietf.org <mail=
to:i-d-announce@ietf.org>=0A> <mailto:i-d-announce@ietf.org <mailto:i-d-ann=
ounce@ietf.org>>=0A>=A0 > > Cc: oauth@ietf.org <mailto:oauth@ietf.org> <mai=
lto:oauth@ietf.org=0A> <mailto:oauth@ietf.org>>=0A>=A0 > > Sent: Monday, Fe=
bruary 25, 2013 4:46 AM=0A>=A0 > > Subject: [OAUTH-WG] I-D Action: draft-ie=
tf-oauth-v2-http-mac-03.txt=0A>=A0 > >=0A>=A0 > >=0A>=A0 > > A New Internet=
-Draft is available from the on-line Internet-Drafts=0A>=A0 > directories.=
=0A>=A0 > > This draft is a work item of the Web Authorization Protocol Wor=
king=0A>=A0 > Group of the IETF.=0A>=A0 > >=0A>=A0 > > Title : OAuth 2.0 Me=
ssage Authentication Code (MAC) Tokens=0A>=A0 > > Author(s) : Justin Richer=
=0A>=A0 > > William Mills=0A>=A0 > > Hannes Tschofenig=0A>=A0 > > Filename =
: draft-ietf-oauth-v2-http-mac-03.txt=0A>=A0 > > Pages : 26=0A>=A0 > > Date=
 : 2013-02-25=0A>=A0 > >=0A>=A0 > > Abstract:=0A>=A0 > > This specification=
 describes how to use MAC Tokens in HTTP requests=0A>=A0 > > to access OAut=
h 2.0 protected resources. An OAuth client willing to=0A>=A0 > > access a p=
rotected resource needs to demonstrate possession of a=0A>=A0 > > crytograp=
hic key by using it with a keyed message digest function to=0A>=A0 > > the =
request.=0A>=A0 > >=0A>=A0 > > The document also defines a key distribution=
 protocol for obtaining a=0A>=A0 > > fresh session key.=0A>=A0 > >=0A>=A0 >=
 >=0A>=A0 > > The IETF datatracker status page for this draft is:=0A>=A0 > =
> https://datatracker.ietf.org/doc/draft-ietf-oauth-v2-http-mac=0A>=A0 > >=
=0A>=A0 > > There's also a htmlized version available at:=0A>=A0 > > http:/=
/tools.ietf.org/html/draft-ietf-oauth-v2-http-mac-03=0A>=A0 > >=0A>=A0 > > =
A diff from the previous version is available at:=0A>=A0 > > http://www.iet=
f.org/rfcdiff?url2=3Ddraft-ietf-oauth-v2-http-mac-03=0A>=A0 > >=0A>=A0 > >=
=0A>=A0 > > Internet-Drafts are also available by anonymous FTP at:=0A>=A0 =
> > ftp://ftp.ietf.org/internet-drafts/=0A>=A0 > >=0A>=A0 > > _____________=
__________________________________=0A>=A0 > > OAuth mailing list=0A>=A0 > >=
 OAuth@ietf.org <mailto:OAuth@ietf.org> <mailto:OAuth@ietf.org=0A> <mailto:=
OAuth@ietf.org>>=0A>=A0 > > https://www.ietf.org/mailman/listinfo/oauth=0A>=
=A0 > >=0A>=A0 > >=0A>=A0 >=0A>=A0 >=0A>=A0 >=0A>=A0 >=0A>=A0 >=0A>=A0 > __=
_____________________________________________=0A>=A0 > OAuth mailing list=
=0A>=A0 > OAuth@ietf.org <mailto:OAuth@ietf.org>=0A>=A0 > https://www.ietf.=
org/mailman/listinfo/oauth=0A>=0A>=0A> ____________________________________=
___________=0A> OAuth mailing list=0A> OAuth@ietf.org <mailto:OAuth@ietf.or=
g>=0A> https://www.ietf.org/mailman/listinfo/oauth=0A>=0A>
---1055047407-710131732-1362074764=:35520
Content-Type: text/html; charset=iso-8859-1
Content-Transfer-Encoding: quoted-printable

<html><body><div style=3D"color:#000; background-color:#fff; font-family:Co=
urier New, courier, monaco, monospace, sans-serif;font-size:12pt"><div><spa=
n>I certainly hope so.</span></div><div><br></div>  <div style=3D"font-fami=
ly: 'Courier New', courier, monaco, monospace, sans-serif; font-size: 12pt;=
"> <div style=3D"font-family: 'times new roman', 'new york', times, serif; =
font-size: 12pt;"> <div dir=3D"ltr"> <font size=3D"2" face=3D"Arial"> <hr s=
ize=3D"1">  <b><span style=3D"font-weight:bold;">From:</span></b> Sergey Be=
ryozkin &lt;sberyozkin@gmail.com&gt;<br> <b><span style=3D"font-weight: bol=
d;">To:</span></b> William Mills &lt;wmills_92105@yahoo.com&gt; <br><b><spa=
n style=3D"font-weight: bold;">Cc:</span></b> "oauth@ietf.org" &lt;oauth@ie=
tf.org&gt; <br> <b><span style=3D"font-weight: bold;">Sent:</span></b> Thur=
sday, February 28, 2013 10:02 AM<br> <b><span style=3D"font-weight: bold;">=
Subject:</span></b> Re: [OAUTH-WG] I-D Action: draft-ietf-oauth-v2-http-mac=
-03.txt<br>
 </font> </div> <br>=0AOn 28/02/13 17:49, William Mills wrote:<br>&gt; The =
JWT replaces the oauth_token data element in the old MAC stuff. I<br>&gt; j=
ust want to take all the other oauth_* variables and stuff them in a<br>&gt=
; separate JSON object and completely kill the "fun with sorting<br>&gt; va=
riables" when the oauth_* things can be carried in the query string or<br>&=
gt; header or post body.<br>As far as the client accessing RS is concerned,=
 should it be limited to <br>using a header, same as for other OAuth2 token=
s ?<br><br>Cheers, Sergey<br><br>&gt;<br>&gt; -----------------------------=
-------------------------------------------<br>&gt; *From:* Sergey Beryozki=
n &lt;<a ymailto=3D"mailto:sberyozkin@gmail.com" href=3D"mailto:sberyozkin@=
gmail.com">sberyozkin@gmail.com</a>&gt;<br>&gt; *To:* <a ymailto=3D"mailto:=
oauth@ietf.org" href=3D"mailto:oauth@ietf.org">oauth@ietf.org</a><br>&gt; *=
Sent:* Thursday, February 28, 2013 9:04 AM<br>&gt; *Subject:* Re: [OAUTH-WG=
] I-D Action:
 draft-ietf-oauth-v2-http-mac-03.txt<br>&gt;<br>&gt; Hi<br>&gt; On 28/02/13=
 13:14, William Mills wrote:<br>&gt;&nbsp; &gt; I'm actually advocating tha=
t we change MAC to be a JWT extension.<br>&gt; IMHO, having a simpler optio=
n, plus, going forward, a possible JWT<br>&gt; profile (client to RS path) =
would work better -<br>&gt;<br>&gt; Why would JWT completely take over ? Ma=
y be it should be possible indeed<br>&gt; to have it as a JWT extension - s=
hould it be part of the relevant JWT<br>&gt; assertion spec, where JWT is u=
sed as a possible grant ?<br>&gt;<br>&gt; Thanks, Sergey<br>&gt;&nbsp; &gt;=
<br>&gt;&nbsp; &gt; -------------------------------------------------------=
-----------------<br>&gt;&nbsp; &gt; *From:* Hannes Tschofenig &lt;<a ymail=
to=3D"mailto:hannes.tschofenig@gmx.net" href=3D"mailto:hannes.tschofenig@gm=
x.net">hannes.tschofenig@gmx.net</a><br>&gt; &lt;mailto:<a ymailto=3D"mailt=
o:hannes.tschofenig@gmx.net"
 href=3D"mailto:hannes.tschofenig@gmx.net">hannes.tschofenig@gmx.net</a>&gt=
;&gt;<br>&gt;&nbsp; &gt; *To:* William Mills &lt;<a ymailto=3D"mailto:wmill=
s_92105@yahoo.com" href=3D"mailto:wmills_92105@yahoo.com">wmills_92105@yaho=
o.com</a><br>&gt; &lt;mailto:<a ymailto=3D"mailto:wmills_92105@yahoo.com" h=
ref=3D"mailto:wmills_92105@yahoo.com">wmills_92105@yahoo.com</a>&gt;&gt;<br=
>&gt;&nbsp; &gt; *Cc:* Hannes Tschofenig &lt;<a ymailto=3D"mailto:hannes.ts=
chofenig@gmx.net" href=3D"mailto:hannes.tschofenig@gmx.net">hannes.tschofen=
ig@gmx.net</a><br>&gt; &lt;mailto:<a ymailto=3D"mailto:hannes.tschofenig@gm=
x.net" href=3D"mailto:hannes.tschofenig@gmx.net">hannes.tschofenig@gmx.net<=
/a>&gt;&gt;; "<a ymailto=3D"mailto:oauth@ietf.org" href=3D"mailto:oauth@iet=
f.org">oauth@ietf.org</a><br>&gt; &lt;mailto:<a ymailto=3D"mailto:oauth@iet=
f.org" href=3D"mailto:oauth@ietf.org">oauth@ietf.org</a>&gt;"<br>&gt;&nbsp;=
 &gt; &lt;<a ymailto=3D"mailto:oauth@ietf.org" href=3D"mailto:oauth@ietf.or=
g">oauth@ietf.org</a>
 &lt;mailto:<a ymailto=3D"mailto:oauth@ietf.org" href=3D"mailto:oauth@ietf.=
org">oauth@ietf.org</a>&gt;&gt;<br>&gt;&nbsp; &gt; *Sent:* Thursday, Februa=
ry 28, 2013 2:28 AM<br>&gt;&nbsp; &gt; *Subject:* Re: [OAUTH-WG] I-D Action=
: draft-ietf-oauth-v2-http-mac-03.txt<br>&gt;&nbsp; &gt;<br>&gt;&nbsp; &gt;=
 Hi Bill,<br>&gt;&nbsp; &gt;<br>&gt;&nbsp; &gt; I believe you are misreadin=
g the document. In<br>&gt;&nbsp; &gt; draft-ietf-oauth-v2-http-mac the clie=
nt still uses the MAC when it<br>&gt;&nbsp; &gt; accesses a protected resou=
rce.<br>&gt;&nbsp; &gt; The only place where the JWT comes into the picture=
 is with the<br>&gt;&nbsp; &gt; description of the access token. This matte=
rs from a key distribution<br>&gt;&nbsp; &gt; point of view. The session ke=
y for the MAC is included in the encrypted<br>&gt;&nbsp; &gt; JWT. The JWT =
is encrypted by the authorization server and decrypted by<br>&gt;&nbsp; &gt=
; the resource server.<br>&gt;&nbsp; &gt;<br>&gt;&nbsp; &gt; Information
 about how header fields get included in the MAC is described<br>&gt;&nbsp;=
 &gt; in Section 5.<br>&gt;&nbsp; &gt;<br>&gt;&nbsp; &gt; The nonce isn't k=
illed it is just called differently: seq-nr. The stuff<br>&gt;&nbsp; &gt; i=
n the original MAC specification actually wasn't a nonce (from the<br>&gt;&=
nbsp; &gt; semantic point of view).<br>&gt;&nbsp; &gt; The extension parame=
ter is there implicitly by allowing additional<br>&gt;&nbsp; &gt; header fi=
elds to be included in the MAC computation.<br>&gt;&nbsp; &gt;<br>&gt;&nbsp=
; &gt; I need to look at the port number field again.<br>&gt;&nbsp; &gt;<br=
>&gt;&nbsp; &gt; Ciao<br>&gt;&nbsp; &gt; Hannes<br>&gt;&nbsp; &gt;<br>&gt;&=
nbsp; &gt; On Feb 27, 2013, at 11:12 AM, William Mills wrote:<br>&gt;&nbsp;=
 &gt;<br>&gt;&nbsp; &gt; &gt; Just read the draft quickly.<br>&gt;&nbsp; &g=
t; &gt;<br>&gt;&nbsp; &gt; &gt; Since we're now leaning on JWT do we need t=
o include the token in<br>&gt;&nbsp; &gt; this? Why not just make an
 additional "Envelope MAC" thing and have the<br>&gt;&nbsp; &gt; signature =
include the 3 JWT parts in the signature base string? That<br>&gt;&nbsp; &g=
t; object then just becomes a JSON container for the kid, timestamp,<br>&gt=
;&nbsp; &gt; signature method, signature etc. That thing then is a 4th base=
64 encoded<br>&gt;&nbsp; &gt; JSON thing in the auth header.<br>&gt;&nbsp; =
&gt; &gt;<br>&gt;&nbsp; &gt; &gt; How header fields get included in the sig=
nature needs definition.<br>&gt;&nbsp; &gt; &gt;<br>&gt;&nbsp; &gt; &gt; Wh=
y did you kill the port number, nonce, and extension parameter out<br>&gt;&=
nbsp; &gt; of the signature base string?<br>&gt;&nbsp; &gt; &gt;<br>&gt;&nb=
sp; &gt; &gt; The BNF appears to have no separators between values.<br>&gt;=
&nbsp; &gt; &gt;<br>&gt;&nbsp; &gt; &gt; -bill<br>&gt;&nbsp; &gt; &gt;<br>&=
gt;&nbsp; &gt; &gt;<br>&gt;&nbsp; &gt; &gt; From: "<a ymailto=3D"mailto:int=
ernet-drafts@ietf.org"
 href=3D"mailto:internet-drafts@ietf.org">internet-drafts@ietf.org</a> &lt;=
mailto:<a ymailto=3D"mailto:internet-drafts@ietf.org" href=3D"mailto:intern=
et-drafts@ietf.org">internet-drafts@ietf.org</a>&gt;<br>&gt; &lt;mailto:<a =
ymailto=3D"mailto:internet-drafts@ietf.org" href=3D"mailto:internet-drafts@=
ietf.org">internet-drafts@ietf.org</a> &lt;mailto:<a ymailto=3D"mailto:inte=
rnet-drafts@ietf.org" href=3D"mailto:internet-drafts@ietf.org">internet-dra=
fts@ietf.org</a>&gt;&gt;"<br>&gt;&nbsp; &gt; &lt;<a ymailto=3D"mailto:inter=
net-drafts@ietf.org" href=3D"mailto:internet-drafts@ietf.org">internet-draf=
ts@ietf.org</a> &lt;mailto:<a ymailto=3D"mailto:internet-drafts@ietf.org" h=
ref=3D"mailto:internet-drafts@ietf.org">internet-drafts@ietf.org</a>&gt;<br=
>&gt; &lt;mailto:<a ymailto=3D"mailto:internet-drafts@ietf.org" href=3D"mai=
lto:internet-drafts@ietf.org">internet-drafts@ietf.org</a> &lt;mailto:<a ym=
ailto=3D"mailto:internet-drafts@ietf.org"
 href=3D"mailto:internet-drafts@ietf.org">internet-drafts@ietf.org</a>&gt;&=
gt;&gt;<br>&gt;&nbsp; &gt; &gt; To: <a ymailto=3D"mailto:i-d-announce@ietf.=
org" href=3D"mailto:i-d-announce@ietf.org">i-d-announce@ietf.org</a> &lt;ma=
ilto:<a ymailto=3D"mailto:i-d-announce@ietf.org" href=3D"mailto:i-d-announc=
e@ietf.org">i-d-announce@ietf.org</a>&gt;<br>&gt; &lt;mailto:<a ymailto=3D"=
mailto:i-d-announce@ietf.org" href=3D"mailto:i-d-announce@ietf.org">i-d-ann=
ounce@ietf.org</a> &lt;mailto:<a ymailto=3D"mailto:i-d-announce@ietf.org" h=
ref=3D"mailto:i-d-announce@ietf.org">i-d-announce@ietf.org</a>&gt;&gt;<br>&=
gt;&nbsp; &gt; &gt; Cc: <a ymailto=3D"mailto:oauth@ietf.org" href=3D"mailto=
:oauth@ietf.org">oauth@ietf.org</a> &lt;mailto:<a ymailto=3D"mailto:oauth@i=
etf.org" href=3D"mailto:oauth@ietf.org">oauth@ietf.org</a>&gt; &lt;mailto:<=
a ymailto=3D"mailto:oauth@ietf.org" href=3D"mailto:oauth@ietf.org">oauth@ie=
tf.org</a><br>&gt; &lt;mailto:<a ymailto=3D"mailto:oauth@ietf.org"
 href=3D"mailto:oauth@ietf.org">oauth@ietf.org</a>&gt;&gt;<br>&gt;&nbsp; &g=
t; &gt; Sent: Monday, February 25, 2013 4:46 AM<br>&gt;&nbsp; &gt; &gt; Sub=
ject: [OAUTH-WG] I-D Action: draft-ietf-oauth-v2-http-mac-03.txt<br>&gt;&nb=
sp; &gt; &gt;<br>&gt;&nbsp; &gt; &gt;<br>&gt;&nbsp; &gt; &gt; A New Interne=
t-Draft is available from the on-line Internet-Drafts<br>&gt;&nbsp; &gt; di=
rectories.<br>&gt;&nbsp; &gt; &gt; This draft is a work item of the Web Aut=
horization Protocol Working<br>&gt;&nbsp; &gt; Group of the IETF.<br>&gt;&n=
bsp; &gt; &gt;<br>&gt;&nbsp; &gt; &gt; Title : OAuth 2.0 Message Authentica=
tion Code (MAC) Tokens<br>&gt;&nbsp; &gt; &gt; Author(s) : Justin Richer<br=
>&gt;&nbsp; &gt; &gt; William Mills<br>&gt;&nbsp; &gt; &gt; Hannes Tschofen=
ig<br>&gt;&nbsp; &gt; &gt; Filename : draft-ietf-oauth-v2-http-mac-03.txt<b=
r>&gt;&nbsp; &gt; &gt; Pages : 26<br>&gt;&nbsp; &gt; &gt; Date : 2013-02-25=
<br>&gt;&nbsp; &gt; &gt;<br>&gt;&nbsp; &gt; &gt;
 Abstract:<br>&gt;&nbsp; &gt; &gt; This specification describes how to use =
MAC Tokens in HTTP requests<br>&gt;&nbsp; &gt; &gt; to access OAuth 2.0 pro=
tected resources. An OAuth client willing to<br>&gt;&nbsp; &gt; &gt; access=
 a protected resource needs to demonstrate possession of a<br>&gt;&nbsp; &g=
t; &gt; crytographic key by using it with a keyed message digest function t=
o<br>&gt;&nbsp; &gt; &gt; the request.<br>&gt;&nbsp; &gt; &gt;<br>&gt;&nbsp=
; &gt; &gt; The document also defines a key distribution protocol for obtai=
ning a<br>&gt;&nbsp; &gt; &gt; fresh session key.<br>&gt;&nbsp; &gt; &gt;<b=
r>&gt;&nbsp; &gt; &gt;<br>&gt;&nbsp; &gt; &gt; The IETF datatracker status =
page for this draft is:<br>&gt;&nbsp; &gt; &gt; <a href=3D"https://datatrac=
ker.ietf.org/doc/draft-ietf-oauth-v2-http-mac" target=3D"_blank">https://da=
tatracker.ietf.org/doc/draft-ietf-oauth-v2-http-mac</a><br>&gt;&nbsp; &gt; =
&gt;<br>&gt;&nbsp; &gt; &gt; There's also a htmlized version available
 at:<br>&gt;&nbsp; &gt; &gt; <a href=3D"http://tools.ietf.org/html/draft-ie=
tf-oauth-v2-http-mac-03" target=3D"_blank">http://tools.ietf.org/html/draft=
-ietf-oauth-v2-http-mac-03</a><br>&gt;&nbsp; &gt; &gt;<br>&gt;&nbsp; &gt; &=
gt; A diff from the previous version is available at:<br>&gt;&nbsp; &gt; &g=
t; <a href=3D"http://www.ietf.org/rfcdiff?url2=3Ddraft-ietf-oauth-v2-http-m=
ac-03" target=3D"_blank">http://www.ietf.org/rfcdiff?url2=3Ddraft-ietf-oaut=
h-v2-http-mac-03</a><br>&gt;&nbsp; &gt; &gt;<br>&gt;&nbsp; &gt; &gt;<br>&gt=
;&nbsp; &gt; &gt; Internet-Drafts are also available by anonymous FTP at:<b=
r>&gt;&nbsp; &gt; &gt; <a href=3D"ftp://ftp.ietf.org/internet-drafts/" targ=
et=3D"_blank">ftp://ftp.ietf.org/internet-drafts/</a><br>&gt;&nbsp; &gt; &g=
t;<br>&gt;&nbsp; &gt; &gt; _______________________________________________<=
br>&gt;&nbsp; &gt; &gt; OAuth mailing list<br>&gt;&nbsp; &gt; &gt; <a ymail=
to=3D"mailto:OAuth@ietf.org" href=3D"mailto:OAuth@ietf.org">OAuth@ietf.org<=
/a>
 &lt;mailto:<a ymailto=3D"mailto:OAuth@ietf.org" href=3D"mailto:OAuth@ietf.=
org">OAuth@ietf.org</a>&gt; &lt;mailto:<a ymailto=3D"mailto:OAuth@ietf.org"=
 href=3D"mailto:OAuth@ietf.org">OAuth@ietf.org</a><br>&gt; &lt;mailto:<a ym=
ailto=3D"mailto:OAuth@ietf.org" href=3D"mailto:OAuth@ietf.org">OAuth@ietf.o=
rg</a>&gt;&gt;<br>&gt;&nbsp; &gt; &gt; <a href=3D"https://www.ietf.org/mail=
man/listinfo/oauth" target=3D"_blank">https://www.ietf.org/mailman/listinfo=
/oauth</a><br>&gt;&nbsp; &gt; &gt;<br>&gt;&nbsp; &gt; &gt;<br>&gt;&nbsp; &g=
t;<br>&gt;&nbsp; &gt;<br>&gt;&nbsp; &gt;<br>&gt;&nbsp; &gt;<br>&gt;&nbsp; &=
gt;<br>&gt;&nbsp; &gt; _______________________________________________<br>&=
gt;&nbsp; &gt; OAuth mailing list<br>&gt;&nbsp; &gt; <a ymailto=3D"mailto:O=
Auth@ietf.org" href=3D"mailto:OAuth@ietf.org">OAuth@ietf.org</a> &lt;mailto=
:<a ymailto=3D"mailto:OAuth@ietf.org" href=3D"mailto:OAuth@ietf.org">OAuth@=
ietf.org</a>&gt;<br>&gt;&nbsp; &gt; <a href=3D"https://www.ietf.org/mailman=
/listinfo/oauth"
 target=3D"_blank">https://www.ietf.org/mailman/listinfo/oauth</a><br>&gt;<=
br>&gt;<br>&gt; _______________________________________________<br>&gt; OAu=
th mailing list<br>&gt; <a ymailto=3D"mailto:OAuth@ietf.org" href=3D"mailto=
:OAuth@ietf.org">OAuth@ietf.org</a> &lt;mailto:<a ymailto=3D"mailto:OAuth@i=
etf.org" href=3D"mailto:OAuth@ietf.org">OAuth@ietf.org</a>&gt;<br>&gt; <a h=
ref=3D"https://www.ietf.org/mailman/listinfo/oauth" target=3D"_blank">https=
://www.ietf.org/mailman/listinfo/oauth</a><br>&gt;<br>&gt;<br><br><br> </di=
v> </div>  </div></body></html>
---1055047407-710131732-1362074764=:35520--

From phil.hunt@oracle.com  Thu Feb 28 10:12:39 2013
Return-Path: <phil.hunt@oracle.com>
X-Original-To: oauth@ietfa.amsl.com
Delivered-To: oauth@ietfa.amsl.com
Received: from localhost (localhost [127.0.0.1]) by ietfa.amsl.com (Postfix) with ESMTP id 1846C21F8BCC for <oauth@ietfa.amsl.com>; Thu, 28 Feb 2013 10:12:39 -0800 (PST)
X-Virus-Scanned: amavisd-new at amsl.com
X-Spam-Flag: NO
X-Spam-Score: -5.498
X-Spam-Level: 
X-Spam-Status: No, score=-5.498 tagged_above=-999 required=5 tests=[AWL=-0.296, BAYES_00=-2.599, HTML_MESSAGE=0.001, MIME_QP_LONG_LINE=1.396, RCVD_IN_DNSWL_MED=-4]
Received: from mail.ietf.org ([64.170.98.30]) by localhost (ietfa.amsl.com [127.0.0.1]) (amavisd-new, port 10024) with ESMTP id 6OEE9TaizjjJ for <oauth@ietfa.amsl.com>; Thu, 28 Feb 2013 10:12:37 -0800 (PST)
Received: from userp1040.oracle.com (userp1040.oracle.com [156.151.31.81]) by ietfa.amsl.com (Postfix) with ESMTP id A584A21F8B9C for <oauth@ietf.org>; Thu, 28 Feb 2013 10:12:37 -0800 (PST)
Received: from acsinet22.oracle.com (acsinet22.oracle.com [141.146.126.238]) by userp1040.oracle.com (Sentrion-MTA-4.3.1/Sentrion-MTA-4.3.1) with ESMTP id r1SICava027054 (version=TLSv1/SSLv3 cipher=DHE-RSA-AES256-SHA bits=256 verify=OK); Thu, 28 Feb 2013 18:12:37 GMT
Received: from acsmt357.oracle.com (acsmt357.oracle.com [141.146.40.157]) by acsinet22.oracle.com (8.14.4+Sun/8.14.4) with ESMTP id r1SICZSR025681 (version=TLSv1/SSLv3 cipher=DHE-RSA-AES256-SHA bits=256 verify=NO); Thu, 28 Feb 2013 18:12:35 GMT
Received: from abhmt113.oracle.com (abhmt113.oracle.com [141.146.116.65]) by acsmt357.oracle.com (8.12.11.20060308/8.12.11) with ESMTP id r1SICZMP005954; Thu, 28 Feb 2013 12:12:35 -0600
Received: from [192.168.1.125] (/174.7.250.104) by default (Oracle Beehive Gateway v4.0) with ESMTP ; Thu, 28 Feb 2013 10:12:34 -0800
References: <0EC2404F-E3C5-4AD1-88B4-E74AA0394DD9@gmx.net> <C75E4871-E907-4EF7-BAF0-9D1A172D581B@ve7jtb.com> <CA6A6425-D0CE-469F-B51E-9F296DA8041C@oracle.com> <CA+k3eCREgN+6z+U=jjJcPo0nZVR0GWn5zXeecZRO+rg=xd-gZg@mail.gmail.com> <A2375FE9-946F-46B3-9356-0709DD56BD4A@ve7jtb.com> <48FD87D1-4DF4-4289-99B7-40A515F31890@oracle.com> <3E472720-31A4-40A0-AAA4-402CF850831A@ve7jtb.com>
Mime-Version: 1.0 (1.0)
In-Reply-To: <3E472720-31A4-40A0-AAA4-402CF850831A@ve7jtb.com>
Content-Type: multipart/alternative; boundary=Apple-Mail-A2BF8484-4D45-4678-87B3-7208DE2BEF12
Content-Transfer-Encoding: 7bit
Message-Id: <7127843B-D7B0-4AB6-87F1-1604D1EFFA79@oracle.com>
X-Mailer: iPhone Mail (10B146)
From: Phil Hunt <phil.hunt@oracle.com>
Date: Thu, 28 Feb 2013 10:12:31 -0800
To: John Bradley <ve7jtb@ve7jtb.com>
X-Source-IP: acsinet22.oracle.com [141.146.126.238]
Cc: "oauth@ietf.org WG" <oauth@ietf.org>
Subject: Re: [OAUTH-WG] JWT - scope claim missing
X-BeenThere: oauth@ietf.org
X-Mailman-Version: 2.1.12
Precedence: list
List-Id: OAUTH WG <oauth.ietf.org>
List-Unsubscribe: <https://www.ietf.org/mailman/options/oauth>, <mailto:oauth-request@ietf.org?subject=unsubscribe>
List-Archive: <http://www.ietf.org/mail-archive/web/oauth>
List-Post: <mailto:oauth@ietf.org>
List-Help: <mailto:oauth-request@ietf.org?subject=help>
List-Subscribe: <https://www.ietf.org/mailman/listinfo/oauth>, <mailto:oauth-request@ietf.org?subject=subscribe>
X-List-Received-Date: Thu, 28 Feb 2013 18:12:39 -0000

--Apple-Mail-A2BF8484-4D45-4678-87B3-7208DE2BEF12
Content-Type: text/plain;
	charset=us-ascii
Content-Transfer-Encoding: quoted-printable

JSON Web Token (JWT) Bearer Token Profiles for OAuth 2.0

Note the title says "for OAuth2"

Sorry. Couldn't resist.=20

Phil

Sent from my phone.

On 2013-02-28, at 9:40, John Bradley <ve7jtb@ve7jtb.com> wrote:

> JWT is an assertion( I am probably going to regret using that word).
>=20
> It is used in openID connect for id_tokens, it is used in OAuth for Assert=
ion grant types and authentication of the client to the token endpoint.
> http://tools.ietf.org/html/draft-ietf-oauth-jwt-bearer-04
>=20
> JSON Web Token (JWT) Bearer Token Profiles for OAuth 2.0
>=20
> Dosen't define JWT's use for access tokens for the RS.  =20
>=20
> Bottom line JWT is for more than access tokens.
>=20
> John B.
>=20
> On 2013-02-28, at 9:28 AM, Phil Hunt <phil.hunt@oracle.com> wrote:
>=20
>> Are you saying jwt is not an access token type?
>>=20
>> Phil
>>=20
>> Sent from my phone.
>>=20
>> On 2013-02-28, at 8:58, John Bradley <ve7jtb@ve7jtb.com> wrote:
>>=20
>>> Yes, defining scope in JWT is the wrong place.   JWT needs to stick to t=
he security claims needed to process JWT.
>>>=20
>>> I also don't know how far you get requiring a specific authorization for=
mat for JWT, some AS will wan to use a opaque reference, some might want to u=
se a user claim or role claim, others may use scopes,  combining scopes and c=
laims is also possible.
>>>=20
>>> Right now it is up to a AS RS pair to agree on how to communicate author=
ization.   I don't want MAC to be more restrictive than bearer when it comes=
 to authorization between AS and RS.
>>>=20
>>> Hannes wanted to know why JWT didn't define scope.  The simple answer is=
 that it is out of scope for JWT itself.   It might be defined in a OAuth ac=
cess token profile for JWT but it should not be specific to MAC.
>>>=20
>>> John B.
>>> On 2013-02-28, at 8:44 AM, Brian Campbell <bcampbell@pingidentity.com> w=
rote:
>>>=20
>>>> I think John's point was more that scope is something rather specific t=
o an OAuth access token and, while JWT is can be used to represent an access=
 token, it's not the only application of JWT. The 'standard' claims in JWT a=
re those that are believed (right or wrong) to be widely applicable across d=
ifferent applications of JWT. One could argue about it but scope is probably=
 not one of those.
>>>>=20
>>>> It would probably make sense to try and build a profile of JWT specific=
ally for OAuth access tokens (though I suspect there are some turtles and dr=
agons in there), which might be the appropriate place to define/register a s=
cope claim.
>>>>=20
>>>>=20
>>>> On Thu, Feb 28, 2013 at 9:24 AM, Phil Hunt <phil.hunt@oracle.com> wrote=
:
>>>>> Are you advocating TWO systems? That seems like a bad choice.
>>>>>=20
>>>>> I would rather fix scope than go to a two system approach.
>>>>>=20
>>>>> Phil
>>>>>=20
>>>>> Sent from my phone.
>>>>>=20
>>>>> On 2013-02-28, at 8:17, John Bradley <ve7jtb@ve7jtb.com> wrote:
>>>>>=20
>>>>> > While scope is one method that a AS could communicate authorization t=
o a RS, it is not the only or perhaps even the most likely one.
>>>>> > Using scope requires a relatively tight binding between the RS and A=
S,  UMA uses a different mechanism that describes finer grained operations.
>>>>> > The AS may include roles, user, or other more abstract claims that t=
he the client may (god help them) pass on to EXCML for processing.
>>>>> >
>>>>> > While having a scopes claim is possible, like any other claim it is n=
ot part of the JWT core security processing claims, and needs to be defined b=
y extension.
>>>>> >
>>>>> > John B.
>>>>> > On 2013-02-28, at 2:29 AM, Hannes Tschofenig <hannes.tschofenig@gmx.=
net> wrote:
>>>>> >
>>>>> >> Hi Mike,
>>>>> >>
>>>>> >> when I worked on the MAC specification I noticed that the JWT does n=
ot have a claim for the scope. I believe that this would be needed to allow t=
he resource server to verify whether the scope the authorization server auth=
orized is indeed what the client is asking for.
>>>>> >>
>>>>> >> Ciao
>>>>> >> Hannes
>>>>> >>
>>>>> >> _______________________________________________
>>>>> >> OAuth mailing list
>>>>> >> OAuth@ietf.org
>>>>> >> https://www.ietf.org/mailman/listinfo/oauth
>>>>> >
>>>>> > _______________________________________________
>>>>> > OAuth mailing list
>>>>> > OAuth@ietf.org
>>>>> > https://www.ietf.org/mailman/listinfo/oauth
>>>>> _______________________________________________
>>>>> OAuth mailing list
>>>>> OAuth@ietf.org
>>>>> https://www.ietf.org/mailman/listinfo/oauth
>=20

--Apple-Mail-A2BF8484-4D45-4678-87B3-7208DE2BEF12
Content-Type: text/html;
	charset=utf-8
Content-Transfer-Encoding: quoted-printable

<html><head><meta http-equiv=3D"content-type" content=3D"text/html; charset=3D=
utf-8"></head><body dir=3D"auto"><div><pre style=3D"margin-top: 0px; margin-=
bottom: 0px; "><font face=3D"Helvetica"><span style=3D"white-space: normal; -=
webkit-text-size-adjust: auto; background-color: rgba(255, 255, 255, 0);">  =
      <span class=3D"h1" style=3D"display: inline; font-weight: bold; "><h1 s=
tyle=3D"display: inline; ">JSON Web Token (JWT) Bearer Token Profiles for OA=
uth 2.0</h1></span></span></font></pre><br><span style=3D"-webkit-text-size-=
adjust: auto;">Note the title says "for OAuth2"</span></div><div><span style=
=3D"-webkit-text-size-adjust: auto;"><br></span></div><div><span style=3D"-w=
ebkit-text-size-adjust: auto;">Sorry. Couldn't resist.&nbsp;</span></div><di=
v><span style=3D"-webkit-text-size-adjust: auto;"><br></span></div><div><spa=
n style=3D"-webkit-text-size-adjust: auto;">Phil</span><div style=3D"-webkit=
-text-size-adjust: auto; "><br></div><div style=3D"-webkit-text-size-adjust:=
 auto; ">Sent from my phone.</div></div><div style=3D"-webkit-text-size-adju=
st: auto; "><br>On 2013-02-28, at 9:40, John Bradley &lt;<a href=3D"mailto:v=
e7jtb@ve7jtb.com">ve7jtb@ve7jtb.com</a>&gt; wrote:<br><br></div><blockquote t=
ype=3D"cite" style=3D"-webkit-text-size-adjust: auto; "><div><meta http-equi=
v=3D"Content-Type" content=3D"text/html charset=3Dus-ascii">JWT is an assert=
ion( I am probably going to regret using that word).<div><br></div><div>It i=
s used in openID connect for id_tokens, it is used in OAuth for Assertion gr=
ant types and authentication of the client to the token endpoint.</div><div>=
<a href=3D"http://tools.ietf.org/html/draft-ietf-oauth-jwt-bearer-04">http:/=
/tools.ietf.org/html/draft-ietf-oauth-jwt-bearer-04</a></div><div><br></div>=
<div><pre style=3D"font-size: 1em; margin-top: 0px; margin-bottom: 0px; "><s=
pan class=3D"h1" style=3D"line-height: 0pt; display: inline; font-size: 1em;=
 font-weight: bold; "><h1 style=3D"line-height: 0pt; display: inline; font-s=
ize: 1em; ">JSON Web Token (JWT) Bearer Token Profiles for OAuth 2.0</h1></s=
pan></pre><div><br></div><div>Dosen't define JWT's use for access tokens for=
 the RS. &nbsp;&nbsp;</div><div><br></div><div>Bottom line JWT is for more t=
han access tokens.</div><div><br></div><div>John B.</div><div><br></div><div=
><div>On 2013-02-28, at 9:28 AM, Phil Hunt &lt;<a href=3D"mailto:phil.hunt@o=
racle.com">phil.hunt@oracle.com</a>&gt; wrote:</div><br class=3D"Apple-inter=
change-newline"><blockquote type=3D"cite"><meta http-equiv=3D"content-type" c=
ontent=3D"text/html; charset=3Dutf-8"><div dir=3D"auto"><div>Are you saying j=
wt is not an access token type?<br><br>Phil<div><br></div><div>Sent from my p=
hone.</div></div><div><br>On 2013-02-28, at 8:58, John Bradley &lt;<a href=3D=
"mailto:ve7jtb@ve7jtb.com">ve7jtb@ve7jtb.com</a>&gt; wrote:<br><br></div><bl=
ockquote type=3D"cite"><meta http-equiv=3D"Content-Type" content=3D"text/htm=
l charset=3Diso-8859-1">Yes, defining scope in JWT is the wrong place. &nbsp=
; JWT needs to stick to the security claims needed to process JWT.<div><br><=
/div><div>I also don't know how far you get requiring a specific authorizati=
on format for JWT, some AS will wan to use a opaque reference, some might wa=
nt to use a user claim or role claim, others may use scopes, &nbsp;combining=
 scopes and claims is also possible.</div><div><br></div><div>Right now it i=
s up to a AS RS pair to agree on how to communicate authorization. &nbsp; I d=
on't want MAC to be more restrictive than bearer when it comes to authorizat=
ion between AS and RS.<br><div><br></div><div>Hannes wanted to know why JWT d=
idn't define scope. &nbsp;The simple answer is that it is out of scope for J=
WT itself. &nbsp; It might be defined in a OAuth access token profile for JW=
T but it should not be specific to MAC.</div><div><br></div><div>John B.</di=
v><div><div><div>On 2013-02-28, at 8:44 AM, Brian Campbell &lt;<a href=3D"ma=
ilto:bcampbell@pingidentity.com">bcampbell@pingidentity.com</a>&gt; wrote:</=
div><br class=3D"Apple-interchange-newline"><blockquote type=3D"cite"><div d=
ir=3D"ltr"><div>I think John's point was more that scope is something rather=
 specific to an OAuth access token and, while JWT is can be used to represen=
t an access token, it's not the only application of JWT. The 'standard' clai=
ms in JWT are those that are believed (right or wrong) to be widely applicab=
le across different applications of JWT. One could argue about it but scope i=
s probably not one of those.<br>

<br></div>It would probably make sense to try and build a profile of JWT spe=
cifically for OAuth access tokens (though I suspect there are some turtles a=
nd dragons in there), which might be the appropriate place to define/registe=
r a scope claim.<br>


</div><div class=3D"gmail_extra"><br><br><div class=3D"gmail_quote">On Thu, =
Feb 28, 2013 at 9:24 AM, Phil Hunt <span dir=3D"ltr">&lt;<a href=3D"mailto:p=
hil.hunt@oracle.com" target=3D"_blank">phil.hunt@oracle.com</a>&gt;</span> w=
rote:<br>

<blockquote class=3D"gmail_quote" style=3D"margin:0 0 0 .8ex;border-left:1px=
 #ccc solid;padding-left:1ex">Are you advocating TWO systems? That seems lik=
e a bad choice.<br>
<br>
I would rather fix scope than go to a two system approach.<br>
<br>
Phil<br>
<br>
Sent from my phone.<br>
<br>
On 2013-02-28, at 8:17, John Bradley &lt;<a href=3D"mailto:ve7jtb@ve7jtb.com=
">ve7jtb@ve7jtb.com</a>&gt; wrote:<br>
<br>
&gt; While scope is one method that a AS could communicate authorization to a=
 RS, it is not the only or perhaps even the most likely one.<br>
&gt; Using scope requires a relatively tight binding between the RS and AS, &=
nbsp;UMA uses a different mechanism that describes finer grained operations.=
<br>
&gt; The AS may include roles, user, or other more abstract claims that the t=
he client may (god help them) pass on to EXCML for processing.<br>
&gt;<br>
&gt; While having a scopes claim is possible, like any other claim it is not=
 part of the JWT core security processing claims, and needs to be defined by=
 extension.<br>
&gt;<br>
&gt; John B.<br>
&gt; On 2013-02-28, at 2:29 AM, Hannes Tschofenig &lt;<a href=3D"mailto:hann=
es.tschofenig@gmx.net">hannes.tschofenig@gmx.net</a>&gt; wrote:<br>
&gt;<br>
&gt;&gt; Hi Mike,<br>
&gt;&gt;<br>
&gt;&gt; when I worked on the MAC specification I noticed that the JWT does n=
ot have a claim for the scope. I believe that this would be needed to allow t=
he resource server to verify whether the scope the authorization server auth=
orized is indeed what the client is asking for.<br>


&gt;&gt;<br>
&gt;&gt; Ciao<br>
&gt;&gt; Hannes<br>
&gt;&gt;<br>
&gt;&gt; _______________________________________________<br>
&gt;&gt; OAuth mailing list<br>
&gt;&gt; <a href=3D"mailto:OAuth@ietf.org">OAuth@ietf.org</a><br>
&gt;&gt; <a href=3D"https://www.ietf.org/mailman/listinfo/oauth" target=3D"_=
blank">https://www.ietf.org/mailman/listinfo/oauth</a><br>
&gt;<br>
&gt; _______________________________________________<br>
&gt; OAuth mailing list<br>
&gt; <a href=3D"mailto:OAuth@ietf.org">OAuth@ietf.org</a><br>
&gt; <a href=3D"https://www.ietf.org/mailman/listinfo/oauth" target=3D"_blan=
k">https://www.ietf.org/mailman/listinfo/oauth</a><br>
_______________________________________________<br>
OAuth mailing list<br>
<a href=3D"mailto:OAuth@ietf.org">OAuth@ietf.org</a><br>
<a href=3D"https://www.ietf.org/mailman/listinfo/oauth" target=3D"_blank">ht=
tps://www.ietf.org/mailman/listinfo/oauth</a><br>
</blockquote></div><br></div>
</blockquote></div><br></div></div></blockquote></div></blockquote></div><br=
></div></div></blockquote></body></html>=

--Apple-Mail-A2BF8484-4D45-4678-87B3-7208DE2BEF12--

From phil.hunt@oracle.com  Thu Feb 28 10:16:06 2013
Return-Path: <phil.hunt@oracle.com>
X-Original-To: oauth@ietfa.amsl.com
Delivered-To: oauth@ietfa.amsl.com
Received: from localhost (localhost [127.0.0.1]) by ietfa.amsl.com (Postfix) with ESMTP id 62FF821F8B7D for <oauth@ietfa.amsl.com>; Thu, 28 Feb 2013 10:16:06 -0800 (PST)
X-Virus-Scanned: amavisd-new at amsl.com
X-Spam-Flag: NO
X-Spam-Score: -5.482
X-Spam-Level: 
X-Spam-Status: No, score=-5.482 tagged_above=-999 required=5 tests=[AWL=-0.280, BAYES_00=-2.599, HTML_MESSAGE=0.001, MIME_QP_LONG_LINE=1.396, RCVD_IN_DNSWL_MED=-4]
Received: from mail.ietf.org ([64.170.98.30]) by localhost (ietfa.amsl.com [127.0.0.1]) (amavisd-new, port 10024) with ESMTP id 0kHDRlaT5lRK for <oauth@ietfa.amsl.com>; Thu, 28 Feb 2013 10:16:05 -0800 (PST)
Received: from aserp1040.oracle.com (aserp1040.oracle.com [141.146.126.69]) by ietfa.amsl.com (Postfix) with ESMTP id 0251C21F897F for <oauth@ietf.org>; Thu, 28 Feb 2013 10:16:04 -0800 (PST)
Received: from acsinet21.oracle.com (acsinet21.oracle.com [141.146.126.237]) by aserp1040.oracle.com (Sentrion-MTA-4.3.1/Sentrion-MTA-4.3.1) with ESMTP id r1SIG3kD008924 (version=TLSv1/SSLv3 cipher=DHE-RSA-AES256-SHA bits=256 verify=OK); Thu, 28 Feb 2013 18:16:04 GMT
Received: from acsmt358.oracle.com (acsmt358.oracle.com [141.146.40.158]) by acsinet21.oracle.com (8.14.4+Sun/8.14.4) with ESMTP id r1SIG3jO028333 (version=TLSv1/SSLv3 cipher=DHE-RSA-AES256-SHA bits=256 verify=NO); Thu, 28 Feb 2013 18:16:03 GMT
Received: from abhmt120.oracle.com (abhmt120.oracle.com [141.146.116.72]) by acsmt358.oracle.com (8.12.11.20060308/8.12.11) with ESMTP id r1SIG2At025573; Thu, 28 Feb 2013 12:16:02 -0600
Received: from [192.168.1.125] (/174.7.250.104) by default (Oracle Beehive Gateway v4.0) with ESMTP ; Thu, 28 Feb 2013 10:16:02 -0800
References: <20130225124642.7425.65145.idtracker@ietfa.amsl.com> <1361956373.9883.YahooMailNeo@web31807.mail.mud.yahoo.com> <21030204-8EA7-4FB0-9DD3-2B6C8CA57E02@gmx.net> <1362057295.36069.YahooMailNeo@web31809.mail.mud.yahoo.com> <512F8F1E.3020400@mitre.org> <1362073422.89847.YahooMailNeo@web31810.mail.mud.yahoo.com> <512F98B4.3070303@mitre.org>
Mime-Version: 1.0 (1.0)
In-Reply-To: <512F98B4.3070303@mitre.org>
Content-Type: multipart/alternative; boundary=Apple-Mail-D62079BB-A0D4-4FFE-BB3A-1DA61342DD52
Content-Transfer-Encoding: 7bit
Message-Id: <455450D5-B54F-4DDE-9DEC-5681715336DB@oracle.com>
X-Mailer: iPhone Mail (10B146)
From: Phil Hunt <phil.hunt@oracle.com>
Date: Thu, 28 Feb 2013 10:15:59 -0800
To: Justin Richer <jricher@mitre.org>
X-Source-IP: acsinet21.oracle.com [141.146.126.237]
Cc: "oauth@ietf.org" <oauth@ietf.org>
Subject: Re: [OAUTH-WG] I-D Action: draft-ietf-oauth-v2-http-mac-03.txt
X-BeenThere: oauth@ietf.org
X-Mailman-Version: 2.1.12
Precedence: list
List-Id: OAUTH WG <oauth.ietf.org>
List-Unsubscribe: <https://www.ietf.org/mailman/options/oauth>, <mailto:oauth-request@ietf.org?subject=unsubscribe>
List-Archive: <http://www.ietf.org/mail-archive/web/oauth>
List-Post: <mailto:oauth@ietf.org>
List-Help: <mailto:oauth-request@ietf.org?subject=help>
List-Subscribe: <https://www.ietf.org/mailman/listinfo/oauth>, <mailto:oauth-request@ietf.org?subject=subscribe>
X-List-Received-Date: Thu, 28 Feb 2013 18:16:06 -0000

--Apple-Mail-D62079BB-A0D4-4FFE-BB3A-1DA61342DD52
Content-Type: text/plain;
	charset=us-ascii
Content-Transfer-Encoding: quoted-printable

Yes. That is my understanding.=20

Phil

Sent from my phone.

On 2013-02-28, at 9:49, Justin Richer <jricher@mitre.org> wrote:

> OK, so it still runs the signature over HTTP elements (query, url, headers=
, etc) but all of the structured components are *communicated* via a JWT/JOS=
E structure. That makes sense to me, on the surface at least.
>=20
>  -- Justin
>=20
>=20
> On 02/28/2013 12:43 PM, William Mills wrote:
>> 1) AS issues JWT + secret to client.
>> 2) Client decides to access resource, creates the JWT MAC JSON object whi=
ch contains stuff about the signature and the signature itself.
>> 3) client appends that base64 encoded thing to the JWT
>>=20
>> 1) Server gets a JWTMAC token, takes apart the JWT part to get the signin=
g key
>> 2) Server looks at the JWTMAC to figure out what all it has to do to crea=
te the signature base string=20
>> 3) server constructs the SBS computes and checks the sig.
>>=20
>> The only hairy bit right now is an arbitrary HTTP header list that may be=
 included in the signature.
>>=20
>> No data in the JWTMAC is duplicated from anywhere else.
>>=20
>> From: Justin Richer <jricher@mitre.org>
>> To: William Mills <wmills_92105@yahoo.com>=20
>> Cc: Hannes Tschofenig <hannes.tschofenig@gmx.net>; "oauth@ietf.org" <oaut=
h@ietf.org>=20
>> Sent: Thursday, February 28, 2013 9:08 AM
>> Subject: Re: [OAUTH-WG] I-D Action: draft-ietf-oauth-v2-http-mac-03.txt
>>=20
>> What I don't quite get is what exactly would be presented and processed a=
t each step. Who needs to know what piece? We don't want to have to push eve=
rything into JSON for the signing to take place (that much is clear), and we=
 don't want the client to be pushing the MAC secret to the RS every time (th=
at would make it a lot less secret, after all). But if we can reuse JWT, JWS=
, and other JOSE mechanisms to make some parts of the MAC pattern easier for=
 programmers, I'm for it.
>>=20
>>  -- Justin
>>=20
>> On 02/28/2013 08:14 AM, William Mills wrote:
>>> I'm actually advocating that we change MAC to be a JWT extension.
>>>=20
>>> From: Hannes Tschofenig <hannes.tschofenig@gmx.net>
>>> To: William Mills <wmills_92105@yahoo.com>=20
>>> Cc: Hannes Tschofenig <hannes.tschofenig@gmx.net>; "oauth@ietf.org" <oau=
th@ietf.org>=20
>>> Sent: Thursday, February 28, 2013 2:28 AM
>>> Subject: Re: [OAUTH-WG] I-D Action: draft-ietf-oauth-v2-http-mac-03.txt
>>>=20
>>> Hi Bill,=20
>>>=20
>>> I believe you are misreading the document. In draft-ietf-oauth-v2-http-m=
ac the client still uses the MAC when it accesses a protected resource.=20
>>> The only place where the JWT comes into the picture is with the descript=
ion of the access token. This matters from a key distribution point of view.=
 The session key for the MAC is included in the encrypted JWT. The JWT is en=
crypted by the authorization server and decrypted by the resource server.=20=

>>>=20
>>> Information about how header fields get included in the MAC is described=
 in Section 5.
>>>=20
>>> The nonce isn't killed it is just called differently: seq-nr. The stuff i=
n the original MAC specification actually wasn't a nonce (from the semantic p=
oint of view).=20
>>> The extension parameter is there implicitly by allowing additional heade=
r fields to be included in the MAC computation.
>>>=20
>>> I need to look at the port number field again.=20
>>>=20
>>> Ciao
>>> Hannes
>>>=20
>>> On Feb 27, 2013, at 11:12 AM, William Mills wrote:
>>>=20
>>> > Just read the draft quickly. =20
>>> >=20
>>> > Since we're now leaning on JWT do we need to include the token in this=
?  Why not just make an additional "Envelope MAC" thing and have the signatu=
re include the 3 JWT parts in the signature base string?  That object then j=
ust becomes a JSON container for the kid, timestamp, signature method, signa=
ture etc. That thing then is a 4th base64 encoded JSON thing in the auth hea=
der.
>>> >=20
>>> > How header fields get included in the signature needs definition.
>>> >=20
>>> > Why did you kill the port number, nonce, and extension parameter out o=
f the signature base string?
>>> >=20
>>> > The BNF appears to have no separators between values.
>>> >=20
>>> > -bill
>>> >=20
>>> >=20
>>> > From: "internet-drafts@ietf.org" <internet-drafts@ietf.org>
>>> > To: i-d-announce@ietf.org                        =20
>>> > Cc: oauth@ietf.org=20
>>> > Sent: Monday, February 25, 2013 4:46 AM
>>> > Subject: [OAUTH-WG] I-D Action: draft-ietf-oauth-v2-http-mac-03.txt
>>> >=20
>>> >=20
>>> > A New Internet-Draft is available from the on-line Internet-Drafts dir=
ectories.
>>> > This draft is a work item of the Web Authorization Protocol Working Gr=
oup of the IETF.
>>> >=20
>>> >    Title          : OAuth 2.0 Message Authentication Code (MAC) Tokens=

>>> >    Author(s)      : Justin Richer
>>> >                          William Mills
>>> >                          Hannes Tschofenig
>>> >    Filename        : draft-ietf-oauth-v2-http-mac-03.txt
>>> >    Pages          : 26
>>> >    Date            : 2013-02-25
>>> >=20
>>> > Abstract:
>>> >  This specification describes how to use MAC Tokens in HTTP requests
>>> >  to access OAuth 2.0 protected resources.  An OAuth client willing to
>>> >  access a protected resource needs to demonstrate possession of a
>>> >  crytographic key by using it with a keyed message digest function to
>>> >  the request.
>>> >=20
>>> >  The document also defines a key distribution protocol for obtaining a=

>>> >  fresh session key.
>>> >=20
>>> >=20
>>> > The IETF datatracker status page for this draft is:
>>> > https://datatracker.ietf.org/doc/draft-ietf-oauth-v2-http-mac
>>> >=20
>>> > There's also a htmlized version available at:
>>> > http://tools.ietf.org/html/draft-ietf-oauth-v2-http-mac-03
>>> >=20
>>> > A diff from the previous version is available at:
>>> > http://www.ietf.org/rfcdiff?url2=3Ddraft-ietf-oauth-v2-http-mac-03
>>> >=20
>>> >=20
>>> > Internet-Drafts are also available by anonymous FTP at:
>>> > ftp://ftp.ietf.org/internet-drafts/
>>> >=20
>>> > _______________________________________________
>>> > OAuth mailing list
>>> > OAuth@ietf.org
>>> > https://www.ietf.org/mailman/listinfo/oauth
>>> >=20
>>> >=20
>>>=20
>>>=20
>>>=20
>>>=20
>>>=20
>>> _______________________________________________
>>> OAuth mailing list
>>> OAuth@ietf.org
>>> https://www.ietf.org/mailman/listinfo/oauth
>=20
> _______________________________________________
> OAuth mailing list
> OAuth@ietf.org
> https://www.ietf.org/mailman/listinfo/oauth

--Apple-Mail-D62079BB-A0D4-4FFE-BB3A-1DA61342DD52
Content-Type: text/html;
	charset=utf-8
Content-Transfer-Encoding: 7bit

<html><head><meta http-equiv="content-type" content="text/html; charset=utf-8"></head><body dir="auto"><div>Yes. That is my understanding.&nbsp;<br><br>Phil<div><br></div><div>Sent from my phone.</div></div><div><br>On 2013-02-28, at 9:49, Justin Richer &lt;<a href="mailto:jricher@mitre.org">jricher@mitre.org</a>&gt; wrote:<br><br></div><blockquote type="cite"><div>
  
    <meta content="text/html; charset=ISO-8859-1" http-equiv="Content-Type">
  
  
    OK, so it still runs the signature over HTTP elements (query, url,
    headers, etc) but all of the structured components are
    *communicated* via a JWT/JOSE structure. That makes sense to me, on
    the surface at least.<br>
    <br>
    &nbsp;-- Justin<br>
    <br>
    <br>
    <div class="moz-cite-prefix">On 02/28/2013 12:43 PM, William Mills
      wrote:<br>
    </div>
    <blockquote cite="mid:1362073422.89847.YahooMailNeo@web31810.mail.mud.yahoo.com" type="cite">
      <meta http-equiv="Content-Type" content="text/html;
        charset=ISO-8859-1">
      <div style="color:#000; background-color:#fff; font-family:Courier
        New, courier, monaco, monospace, sans-serif;font-size:12pt">
        <div><span>1) AS issues JWT + secret to client.</span></div>
        <div style="color: rgb(0, 0, 0); font-size: 16px; font-family:
          'Courier New', courier, monaco, monospace, sans-serif;
          background-color: transparent; font-style: normal;"><span>2)
            Client decides to access resource, creates the JWT MAC JSON
            object which contains stuff about the signature and the
            signature itself.</span></div>
        <div style="color: rgb(0, 0, 0); font-size: 16px; font-family:
          'Courier New', courier, monaco, monospace, sans-serif;
          background-color: transparent; font-style: normal;"><span>3)
            client appends that base64 encoded thing to the JWT</span></div>
        <div style="color: rgb(0, 0, 0); font-size: 16px; font-family:
          'Courier New', courier, monaco, monospace, sans-serif;
          background-color: transparent; font-style: normal;"><span><br>
          </span></div>
        <div style="color: rgb(0, 0, 0); font-size: 16px; font-family:
          'Courier New', courier, monaco, monospace, sans-serif;
          background-color: transparent; font-style: normal;">1) Server
          gets a JWTMAC token, takes apart the JWT part to get the
          signing key</div>
        <div style="color: rgb(0, 0, 0); font-size: 16px; font-family:
          'Courier New', courier, monaco, monospace, sans-serif;
          background-color: transparent; font-style: normal;">2) Server
          looks at the JWTMAC to figure out what all it has to do to
          create the signature base string&nbsp;</div>
        <div style="color: rgb(0, 0, 0); font-size: 16px; font-family:
          'Courier New', courier, monaco, monospace, sans-serif;
          background-color: transparent; font-style: normal;">3) server
          constructs the SBS computes and checks the sig.</div>
        <div style="color: rgb(0, 0, 0); font-size: 16px; font-family:
          'Courier New', courier, monaco, monospace, sans-serif;
          background-color: transparent; font-style: normal;"><br>
        </div>
        <div style="color: rgb(0, 0, 0); font-size: 16px; font-family:
          'Courier New', courier, monaco, monospace, sans-serif;
          background-color: transparent; font-style: normal;">The only
          hairy bit right now is an arbitrary HTTP header list that may
          be included in the signature.</div>
        <div style="color: rgb(0, 0, 0); font-size: 16px; font-family:
          'Courier New', courier, monaco, monospace, sans-serif;
          background-color: transparent; font-style: normal;"><br>
        </div>
        <div style="color: rgb(0, 0, 0); font-size: 16px; font-family:
          'Courier New', courier, monaco, monospace, sans-serif;
          background-color: transparent; font-style: normal;">No data in
          the JWTMAC is duplicated from anywhere else.</div>
        <div><br>
        </div>
        <div style="font-family: 'Courier New', courier, monaco,
          monospace, sans-serif; font-size: 12pt;">
          <div style="font-family: 'times new roman', 'new york', times,
            serif; font-size: 12pt;">
            <div dir="ltr"> <font face="Arial" size="2">
                <hr size="1"> <b><span style="font-weight:bold;">From:</span></b>
                Justin Richer <a class="moz-txt-link-rfc2396E" href="mailto:jricher@mitre.org">&lt;jricher@mitre.org&gt;</a><br>
                <b><span style="font-weight: bold;">To:</span></b>
                William Mills <a class="moz-txt-link-rfc2396E" href="mailto:wmills_92105@yahoo.com">&lt;wmills_92105@yahoo.com&gt;</a> <br>
                <b><span style="font-weight: bold;">Cc:</span></b>
                Hannes Tschofenig <a class="moz-txt-link-rfc2396E" href="mailto:hannes.tschofenig@gmx.net">&lt;hannes.tschofenig@gmx.net&gt;</a>;
                <a class="moz-txt-link-rfc2396E" href="mailto:oauth@ietf.org">"oauth@ietf.org"</a> <a class="moz-txt-link-rfc2396E" href="mailto:oauth@ietf.org">&lt;oauth@ietf.org&gt;</a> <br>
                <b><span style="font-weight: bold;">Sent:</span></b>
                Thursday, February 28, 2013 9:08 AM<br>
                <b><span style="font-weight: bold;">Subject:</span></b>
                Re: [OAUTH-WG] I-D Action:
                draft-ietf-oauth-v2-http-mac-03.txt<br>
              </font> </div>
            <br>
            <div id="yiv309116819">
              <div> What I don't quite get is what exactly would be
                presented and processed at each step. Who needs to know
                what piece? We don't want to have to push everything
                into JSON for the signing to take place (that much is
                clear), and we don't want the client to be pushing the
                MAC secret to the RS every time (that would make it a
                lot less secret, after all). But if we can reuse JWT,
                JWS, and other JOSE mechanisms to make some parts of the
                MAC pattern easier for programmers, I'm for it.<br>
                <br>
                &nbsp;-- Justin<br>
                <br>
                <div class="yiv309116819moz-cite-prefix">On 02/28/2013
                  08:14 AM, William Mills wrote:<br>
                </div>
                <blockquote type="cite">
                  <div style="color: rgb(0, 0, 0); background-color:
                    rgb(255, 255, 255); font-family: 'Courier New',
                    courier, monaco, monospace, sans-serif; font-size:
                    12pt;">
                    <div><span>I'm actually advocating that we change
                        MAC to be a JWT extension.</span></div>
                    <div><br>
                    </div>
                    <div style="font-family: 'Courier New', courier,
                      monaco, monospace, sans-serif; font-size: 12pt;">
                      <div style="font-family: 'times new roman', 'new
                        york', times, serif; font-size: 12pt;">
                        <div dir="ltr"> <font face="Arial" size="2">
                            <hr size="1"> <b><span style="font-weight:bold;">From:</span></b>
                            Hannes Tschofenig <a moz-do-not-send="true" rel="nofollow" class="yiv309116819moz-txt-link-rfc2396E" ymailto="mailto:hannes.tschofenig@gmx.net" target="_blank" href="mailto:hannes.tschofenig@gmx.net">&lt;hannes.tschofenig@gmx.net&gt;</a><br>
                            <b><span style="font-weight:bold;">To:</span></b>
                            William Mills <a moz-do-not-send="true" rel="nofollow" class="yiv309116819moz-txt-link-rfc2396E" ymailto="mailto:wmills_92105@yahoo.com" target="_blank" href="mailto:wmills_92105@yahoo.com">&lt;wmills_92105@yahoo.com&gt;</a>
                            <br>
                            <b><span style="font-weight:bold;">Cc:</span></b>
                            Hannes Tschofenig <a moz-do-not-send="true" rel="nofollow" class="yiv309116819moz-txt-link-rfc2396E" ymailto="mailto:hannes.tschofenig@gmx.net" target="_blank" href="mailto:hannes.tschofenig@gmx.net">&lt;hannes.tschofenig@gmx.net&gt;</a>;
                            <a moz-do-not-send="true" rel="nofollow" class="yiv309116819moz-txt-link-rfc2396E" ymailto="mailto:oauth@ietf.org" target="_blank" href="mailto:oauth@ietf.org">"oauth@ietf.org"</a>
                            <a moz-do-not-send="true" rel="nofollow" class="yiv309116819moz-txt-link-rfc2396E" ymailto="mailto:oauth@ietf.org" target="_blank" href="mailto:oauth@ietf.org">&lt;oauth@ietf.org&gt;</a>
                            <br>
                            <b><span style="font-weight:bold;">Sent:</span></b>
                            Thursday, February 28, 2013 2:28 AM<br>
                            <b><span style="font-weight:bold;">Subject:</span></b>
                            Re: [OAUTH-WG] I-D Action:
                            draft-ietf-oauth-v2-http-mac-03.txt<br>
                          </font> </div>
                        <br>
                        Hi Bill, <br>
                        <br>
                        I believe you are misreading the document. In
                        draft-ietf-oauth-v2-http-mac the client still
                        uses the MAC when it accesses a protected
                        resource. <br>
                        The only place where the JWT comes into the
                        picture is with the description of the access
                        token. This matters from a key distribution
                        point of view. The session key for the MAC is
                        included in the encrypted JWT. The JWT is
                        encrypted by the authorization server and
                        decrypted by the resource server. <br>
                        <br>
                        Information about how header fields get included
                        in the MAC is described in Section 5.<br>
                        <br>
                        The nonce isn't killed it is just called
                        differently: seq-nr. The stuff in the original
                        MAC specification actually wasn't a nonce (from
                        the semantic point of view). <br>
                        The extension parameter is there implicitly by
                        allowing additional header fields to be included
                        in the MAC computation.<br>
                        <br>
                        I need to look at the port number field again. <br>
                        <br>
                        Ciao<br>
                        Hannes<br>
                        <br>
                        On Feb 27, 2013, at 11:12 AM, William Mills
                        wrote:<br>
                        <br>
                        &gt; Just read the draft quickly.&nbsp; <br>
                        &gt; <br>
                        &gt; Since we're now leaning on JWT do we need
                        to include the token in this?&nbsp; Why not just make
                        an additional "Envelope MAC" thing and have the
                        signature include the 3 JWT parts in the
                        signature base string?&nbsp; That object then just
                        becomes a JSON container for the kid, timestamp,
                        signature method, signature etc. That thing then
                        is a 4th base64 encoded JSON thing in the auth
                        header.<br>
                        &gt; <br>
                        &gt; How header fields get included in the
                        signature needs definition.<br>
                        &gt; <br>
                        &gt; Why did you kill the port number, nonce,
                        and extension parameter out of the signature
                        base string?<br>
                        &gt; <br>
                        &gt; The BNF appears to have no separators
                        between values.<br>
                        &gt; <br>
                        &gt; -bill<br>
                        &gt; <br>
                        &gt; <br>
                        &gt; From: "<a moz-do-not-send="true" rel="nofollow" ymailto="mailto:internet-drafts@ietf.org" target="_blank" href="mailto:internet-drafts@ietf.org">internet-drafts@ietf.org</a>"
                        &lt;<a moz-do-not-send="true" rel="nofollow" ymailto="mailto:internet-drafts@ietf.org" target="_blank" href="mailto:internet-drafts@ietf.org">internet-drafts@ietf.org</a>&gt;<br>
                        &gt; To: <a moz-do-not-send="true" rel="nofollow" ymailto="mailto:i-d-announce@ietf.org" target="_blank" href="mailto:i-d-announce@ietf.org">i-d-announce@ietf.org</a>
                        <br>
                        &gt; Cc: <a moz-do-not-send="true" rel="nofollow" ymailto="mailto:oauth@ietf.org" target="_blank" href="mailto:oauth@ietf.org">oauth@ietf.org</a>
                        <br>
                        &gt; Sent: Monday, February 25, 2013 4:46 AM<br>
                        &gt; Subject: [OAUTH-WG] I-D Action:
                        draft-ietf-oauth-v2-http-mac-03.txt<br>
                        &gt; <br>
                        &gt; <br>
                        &gt; A New Internet-Draft is available from the
                        on-line Internet-Drafts directories.<br>
                        &gt; This draft is a work item of the Web
                        Authorization Protocol Working Group of the
                        IETF.<br>
                        &gt; <br>
                        &gt;&nbsp; &nbsp; Title&nbsp; &nbsp; &nbsp; &nbsp; &nbsp; : OAuth 2.0 Message
                        Authentication Code (MAC) Tokens<br>
                        &gt;&nbsp; &nbsp; Author(s)&nbsp; &nbsp; &nbsp; : Justin Richer<br>
                        &gt;&nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; William Mills<br>
                        &gt;&nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; Hannes Tschofenig<br>
                        &gt;&nbsp; &nbsp; Filename&nbsp; &nbsp; &nbsp; &nbsp; :
                        draft-ietf-oauth-v2-http-mac-03.txt<br>
                        &gt;&nbsp; &nbsp; Pages&nbsp; &nbsp; &nbsp; &nbsp; &nbsp; : 26<br>
                        &gt;&nbsp; &nbsp; Date&nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; : 2013-02-25<br>
                        &gt; <br>
                        &gt; Abstract:<br>
                        &gt;&nbsp; This specification describes how to use
                        MAC Tokens in HTTP requests<br>
                        &gt;&nbsp; to access OAuth 2.0 protected resources.&nbsp;
                        An OAuth client willing to<br>
                        &gt;&nbsp; access a protected resource needs to
                        demonstrate possession of a<br>
                        &gt;&nbsp; crytographic key by using it with a keyed
                        message digest function to<br>
                        &gt;&nbsp; the request.<br>
                        &gt; <br>
                        &gt;&nbsp; The document also defines a key
                        distribution protocol for obtaining a<br>
                        &gt;&nbsp; fresh session key.<br>
                        &gt; <br>
                        &gt; <br>
                        &gt; The IETF datatracker status page for this
                        draft is:<br>
                        &gt; <a moz-do-not-send="true" rel="nofollow" target="_blank" href="https://datatracker.ietf.org/doc/draft-ietf-oauth-v2-http-mac">https://datatracker.ietf.org/doc/draft-ietf-oauth-v2-http-mac</a><br>
                        &gt; <br>
                        &gt; There's also a htmlized version available
                        at:<br>
                        &gt;
                        <a class="moz-txt-link-freetext" href="http://tools.ietf.org/html/draft-ietf-oauth-v2-http-mac-03">http://tools.ietf.org/html/draft-ietf-oauth-v2-http-mac-03</a><br>
                        &gt; <br>
                        &gt; A diff from the previous version is
                        available at:<br>
                        &gt;
                        <a class="moz-txt-link-freetext" href="http://www.ietf.org/rfcdiff?url2=draft-ietf-oauth-v2-http-mac-03">http://www.ietf.org/rfcdiff?url2=draft-ietf-oauth-v2-http-mac-03</a><br>
                        &gt; <br>
                        &gt; <br>
                        &gt; Internet-Drafts are also available by
                        anonymous FTP at:<br>
                        &gt; <a moz-do-not-send="true" rel="nofollow" target="_blank" href="ftp://ftp.ietf.org/internet-drafts/">ftp://ftp.ietf.org/internet-drafts/</a><br>
                        &gt; <br>
                        &gt;
                        _______________________________________________<br>
                        &gt; OAuth mailing list<br>
                        &gt; <a moz-do-not-send="true" rel="nofollow" ymailto="mailto:OAuth@ietf.org" target="_blank" href="mailto:OAuth@ietf.org">OAuth@ietf.org</a><br>
                        &gt; <a moz-do-not-send="true" rel="nofollow" target="_blank" href="https://www.ietf.org/mailman/listinfo/oauth">https://www.ietf.org/mailman/listinfo/oauth</a><br>
                        &gt; <br>
                        &gt; <br>
                        <br>
                        <br>
                        <br>
                      </div>
                    </div>
                  </div>
                  <br>
                  <fieldset class="yiv309116819mimeAttachmentHeader"></fieldset>
                  <br>
                  <pre>_______________________________________________
OAuth mailing list
<a moz-do-not-send="true" rel="nofollow" class="yiv309116819moz-txt-link-abbreviated" ymailto="mailto:OAuth@ietf.org" target="_blank" href="mailto:OAuth@ietf.org">OAuth@ietf.org</a>
<a moz-do-not-send="true" rel="nofollow" class="yiv309116819moz-txt-link-freetext" target="_blank" href="https://www.ietf.org/mailman/listinfo/oauth">https://www.ietf.org/mailman/listinfo/oauth</a>
</pre>
                </blockquote>
                <br>
              </div>
            </div>
            <br>
            <br>
          </div>
        </div>
      </div>
    </blockquote>
    <br>
  

</div></blockquote><blockquote type="cite"><div><span>_______________________________________________</span><br><span>OAuth mailing list</span><br><span><a href="mailto:OAuth@ietf.org">OAuth@ietf.org</a></span><br><span><a href="https://www.ietf.org/mailman/listinfo/oauth">https://www.ietf.org/mailman/listinfo/oauth</a></span><br></div></blockquote></body></html>
--Apple-Mail-D62079BB-A0D4-4FFE-BB3A-1DA61342DD52--

From ve7jtb@ve7jtb.com  Thu Feb 28 10:36:18 2013
Return-Path: <ve7jtb@ve7jtb.com>
X-Original-To: oauth@ietfa.amsl.com
Delivered-To: oauth@ietfa.amsl.com
Received: from localhost (localhost [127.0.0.1]) by ietfa.amsl.com (Postfix) with ESMTP id C3AF521F8899 for <oauth@ietfa.amsl.com>; Thu, 28 Feb 2013 10:36:18 -0800 (PST)
X-Virus-Scanned: amavisd-new at amsl.com
X-Spam-Flag: NO
X-Spam-Score: -3.445
X-Spam-Level: 
X-Spam-Status: No, score=-3.445 tagged_above=-999 required=5 tests=[AWL=0.153,  BAYES_00=-2.599, HTML_MESSAGE=0.001, RCVD_IN_DNSWL_LOW=-1]
Received: from mail.ietf.org ([64.170.98.30]) by localhost (ietfa.amsl.com [127.0.0.1]) (amavisd-new, port 10024) with ESMTP id 5kS8UiGjAKl7 for <oauth@ietfa.amsl.com>; Thu, 28 Feb 2013 10:36:17 -0800 (PST)
Received: from mail-pa0-f54.google.com (mail-pa0-f54.google.com [209.85.220.54]) by ietfa.amsl.com (Postfix) with ESMTP id F293F21F86C4 for <oauth@ietf.org>; Thu, 28 Feb 2013 10:36:08 -0800 (PST)
Received: by mail-pa0-f54.google.com with SMTP id fa10so1296546pad.27 for <oauth@ietf.org>; Thu, 28 Feb 2013 10:36:08 -0800 (PST)
X-Google-DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=google.com; s=20120113; h=x-received:content-type:mime-version:subject:from:in-reply-to:date :cc:message-id:references:to:x-mailer:x-gm-message-state; bh=AlH6AqDfaC6IFqA4C75IzUJ6T8Wwrot/52jeOBmqNqo=; b=FALMzYEMAv2bWROiWswqlkvzUixuFHHpCL4Aplis1vcO0+z9mBtmFVt97YQEV98PZK U5eFqwcDQO8boiBMFy+vyVxZ0xJyFu+gmjhvyYUcrb24dja0mFqfuxHG7wN+LsKhbVbY zqd3W2G6/TCe588siuBg/3GNnro2FJ1H/3m8DkbRVGc3IrOnmXPJ94zGrLCJCw3cz4Ht 1osATpyee5W4S7uBPvL4w2CgRDiqRRoGV2DZa724vKuXFz2+xB6pMRUjfhvQWrkA/f8a +wJYkm5T6MEPbIpbtjxccsGsVqHal/ogaimFFEEBihgajugAgJpfrTISXC7puVGuryEf yPZw==
X-Received: by 10.66.158.105 with SMTP id wt9mr14523556pab.156.1362076568624;  Thu, 28 Feb 2013 10:36:08 -0800 (PST)
Received: from [192.168.41.99] (ip-64-134-220-138.public.wayport.net. [64.134.220.138]) by mx.google.com with ESMTPS id i6sm10044759paw.19.2013.02.28.10.36.03 (version=TLSv1 cipher=ECDHE-RSA-RC4-SHA bits=128/128); Thu, 28 Feb 2013 10:36:05 -0800 (PST)
Content-Type: multipart/signed; boundary="Apple-Mail=_9B76360D-5ECC-47AC-B18F-5AADB5182FBF"; protocol="application/pkcs7-signature"; micalg=sha1
Mime-Version: 1.0 (Mac OS X Mail 6.2 \(1499\))
From: John Bradley <ve7jtb@ve7jtb.com>
In-Reply-To: <7127843B-D7B0-4AB6-87F1-1604D1EFFA79@oracle.com>
Date: Thu, 28 Feb 2013 10:36:01 -0800
Message-Id: <50DA292F-32F0-4266-8401-006AD837B775@ve7jtb.com>
References: <0EC2404F-E3C5-4AD1-88B4-E74AA0394DD9@gmx.net> <C75E4871-E907-4EF7-BAF0-9D1A172D581B@ve7jtb.com> <CA6A6425-D0CE-469F-B51E-9F296DA8041C@oracle.com> <CA+k3eCREgN+6z+U=jjJcPo0nZVR0GWn5zXeecZRO+rg=xd-gZg@mail.gmail.com> <A2375FE9-946F-46B3-9356-0709DD56BD4A@ve7jtb.com> <48FD87D1-4DF4-4289-99B7-40A515F31890@oracle.com> <3E472720-31A4-40A0-AAA4-402CF850831A@ve7jtb.com> <7127843B-D7B0-4AB6-87F1-1604D1EFFA79@oracle.com>
To: Phil Hunt <phil.hunt@oracle.com>
X-Mailer: Apple Mail (2.1499)
X-Gm-Message-State: ALoCoQmSk3WKm1w7iGEjdMwSC0CkMFoOzizUhWWby5mt3DZJfwpeTaph+vD8mmLNkxmpM4mC8gdj
Cc: "oauth@ietf.org WG" <oauth@ietf.org>
Subject: Re: [OAUTH-WG] JWT - scope claim missing
X-BeenThere: oauth@ietf.org
X-Mailman-Version: 2.1.12
Precedence: list
List-Id: OAUTH WG <oauth.ietf.org>
List-Unsubscribe: <https://www.ietf.org/mailman/options/oauth>, <mailto:oauth-request@ietf.org?subject=unsubscribe>
List-Archive: <http://www.ietf.org/mail-archive/web/oauth>
List-Post: <mailto:oauth@ietf.org>
List-Help: <mailto:oauth-request@ietf.org?subject=help>
List-Subscribe: <https://www.ietf.org/mailman/listinfo/oauth>, <mailto:oauth-request@ietf.org?subject=subscribe>
X-List-Received-Date: Thu, 28 Feb 2013 18:36:18 -0000

--Apple-Mail=_9B76360D-5ECC-47AC-B18F-5AADB5182FBF
Content-Type: multipart/alternative;
	boundary="Apple-Mail=_6B5A46A7-C593-4720-BAA7-FD9BE76EB427"


--Apple-Mail=_6B5A46A7-C593-4720-BAA7-FD9BE76EB427
Content-Transfer-Encoding: quoted-printable
Content-Type: text/plain;
	charset=us-ascii

Yes the title likely adds to the confusion given that the bearer tokens =
are not access tokens.

Things as separate from OAuth as the Firefox browerID spec use JWS =
signed JWTs. =20

The bearer token profiles for OAuth 2 are for OAuth2.

The JSON Web Token (JWT) spec did not start in OAuth and is not OAuth =
specific.

A JWT is:
JSON Web Token (JWT)  A string representing a set of claims as a JSON
      object that is encoded in a JWS or JWE, enabling the claims to be
      digitally signed or MACed and/or encrypted.

So OAuth or other profiles may define claims to go in a JWT, but the JWT =
needs to itself only define the claims necessary for security =
processing. =20

John B.
PS that was a soft ball If you hadn't responded I would have been =
disappointed.  I din't pick the title for the bearer token profiles.


On 2013-02-28, at 10:12 AM, Phil Hunt <phil.hunt@oracle.com> wrote:

> JSON Web Token (JWT) Bearer Token Profiles for OAuth 2.0
>=20
> Note the title says "for OAuth2"
>=20
> Sorry. Couldn't resist.=20
>=20
> Phil
>=20
> Sent from my phone.
>=20
> On 2013-02-28, at 9:40, John Bradley <ve7jtb@ve7jtb.com> wrote:
>=20
>> JWT is an assertion( I am probably going to regret using that word).
>>=20
>> It is used in openID connect for id_tokens, it is used in OAuth for =
Assertion grant types and authentication of the client to the token =
endpoint.
>> http://tools.ietf.org/html/draft-ietf-oauth-jwt-bearer-04
>>=20
>> JSON Web Token (JWT) Bearer Token Profiles for OAuth 2.0
>>=20
>> Dosen't define JWT's use for access tokens for the RS.  =20
>>=20
>> Bottom line JWT is for more than access tokens.
>>=20
>> John B.
>>=20
>> On 2013-02-28, at 9:28 AM, Phil Hunt <phil.hunt@oracle.com> wrote:
>>=20
>>> Are you saying jwt is not an access token type?
>>>=20
>>> Phil
>>>=20
>>> Sent from my phone.
>>>=20
>>> On 2013-02-28, at 8:58, John Bradley <ve7jtb@ve7jtb.com> wrote:
>>>=20
>>>> Yes, defining scope in JWT is the wrong place.   JWT needs to stick =
to the security claims needed to process JWT.
>>>>=20
>>>> I also don't know how far you get requiring a specific =
authorization format for JWT, some AS will wan to use a opaque =
reference, some might want to use a user claim or role claim, others may =
use scopes,  combining scopes and claims is also possible.
>>>>=20
>>>> Right now it is up to a AS RS pair to agree on how to communicate =
authorization.   I don't want MAC to be more restrictive than bearer =
when it comes to authorization between AS and RS.
>>>>=20
>>>> Hannes wanted to know why JWT didn't define scope.  The simple =
answer is that it is out of scope for JWT itself.   It might be defined =
in a OAuth access token profile for JWT but it should not be specific to =
MAC.
>>>>=20
>>>> John B.
>>>> On 2013-02-28, at 8:44 AM, Brian Campbell =
<bcampbell@pingidentity.com> wrote:
>>>>=20
>>>>> I think John's point was more that scope is something rather =
specific to an OAuth access token and, while JWT is can be used to =
represent an access token, it's not the only application of JWT. The =
'standard' claims in JWT are those that are believed (right or wrong) to =
be widely applicable across different applications of JWT. One could =
argue about it but scope is probably not one of those.
>>>>>=20
>>>>> It would probably make sense to try and build a profile of JWT =
specifically for OAuth access tokens (though I suspect there are some =
turtles and dragons in there), which might be the appropriate place to =
define/register a scope claim.
>>>>>=20
>>>>>=20
>>>>> On Thu, Feb 28, 2013 at 9:24 AM, Phil Hunt <phil.hunt@oracle.com> =
wrote:
>>>>> Are you advocating TWO systems? That seems like a bad choice.
>>>>>=20
>>>>> I would rather fix scope than go to a two system approach.
>>>>>=20
>>>>> Phil
>>>>>=20
>>>>> Sent from my phone.
>>>>>=20
>>>>> On 2013-02-28, at 8:17, John Bradley <ve7jtb@ve7jtb.com> wrote:
>>>>>=20
>>>>> > While scope is one method that a AS could communicate =
authorization to a RS, it is not the only or perhaps even the most =
likely one.
>>>>> > Using scope requires a relatively tight binding between the RS =
and AS,  UMA uses a different mechanism that describes finer grained =
operations.
>>>>> > The AS may include roles, user, or other more abstract claims =
that the the client may (god help them) pass on to EXCML for processing.
>>>>> >
>>>>> > While having a scopes claim is possible, like any other claim it =
is not part of the JWT core security processing claims, and needs to be =
defined by extension.
>>>>> >
>>>>> > John B.
>>>>> > On 2013-02-28, at 2:29 AM, Hannes Tschofenig =
<hannes.tschofenig@gmx.net> wrote:
>>>>> >
>>>>> >> Hi Mike,
>>>>> >>
>>>>> >> when I worked on the MAC specification I noticed that the JWT =
does not have a claim for the scope. I believe that this would be needed =
to allow the resource server to verify whether the scope the =
authorization server authorized is indeed what the client is asking for.
>>>>> >>
>>>>> >> Ciao
>>>>> >> Hannes
>>>>> >>
>>>>> >> _______________________________________________
>>>>> >> OAuth mailing list
>>>>> >> OAuth@ietf.org
>>>>> >> https://www.ietf.org/mailman/listinfo/oauth
>>>>> >
>>>>> > _______________________________________________
>>>>> > OAuth mailing list
>>>>> > OAuth@ietf.org
>>>>> > https://www.ietf.org/mailman/listinfo/oauth
>>>>> _______________________________________________
>>>>> OAuth mailing list
>>>>> OAuth@ietf.org
>>>>> https://www.ietf.org/mailman/listinfo/oauth
>>>>>=20
>>>>=20
>>=20


--Apple-Mail=_6B5A46A7-C593-4720-BAA7-FD9BE76EB427
Content-Transfer-Encoding: quoted-printable
Content-Type: text/html;
	charset=us-ascii

<html><head><meta http-equiv=3D"Content-Type" content=3D"text/html =
charset=3Dus-ascii"></head><body style=3D"word-wrap: break-word; =
-webkit-nbsp-mode: space; -webkit-line-break: after-white-space; ">Yes =
the title likely adds to the confusion given that the bearer tokens are =
not access tokens.<div><br></div><div>Things as separate from OAuth as =
the Firefox browerID spec use JWS signed JWTs. =
&nbsp;</div><div><br></div><div>The bearer token profiles for OAuth 2 =
are for OAuth2.</div><div><br></div><div>The&nbsp;<a =
href=3D"http://tools.ietf.org/html/draft-ietf-oauth-json-web-token-06">JSO=
N Web Token (JWT)</a>&nbsp;spec did not start in OAuth and is not OAuth =
specific.</div><div><br></div><div>A JWT is:</div><div><pre =
class=3D"newpage" style=3D"font-size: 1em; margin-top: 0px; =
margin-bottom: 0px; page-break-before: always; ">JSON Web Token (JWT)  A =
string representing a set of claims as a JSON
      object that is encoded in a JWS or JWE, enabling the claims to be
      digitally signed or MACed and/or encrypted.
</pre><div><br></div><div>So OAuth or other profiles may define claims =
to go in a JWT, but the JWT needs to itself only define the claims =
necessary for security processing. &nbsp;</div><div><br></div><div>John =
B.</div><div>PS that was a soft ball If you hadn't responded I would =
have been disappointed. &nbsp;I din't pick the title for the bearer =
token profiles.</div><div><br></div><div><br></div><div><div>On =
2013-02-28, at 10:12 AM, Phil Hunt &lt;<a =
href=3D"mailto:phil.hunt@oracle.com">phil.hunt@oracle.com</a>&gt; =
wrote:</div><br class=3D"Apple-interchange-newline"><blockquote =
type=3D"cite"><meta http-equiv=3D"content-type" content=3D"text/html; =
charset=3Dutf-8"><div dir=3D"auto"><div><pre style=3D"margin-top: 0px; =
margin-bottom: 0px; "><font face=3D"Helvetica"><span style=3D"white-space:=
 normal; -webkit-text-size-adjust: auto; background-color: rgba(255, =
255, 255, 0);">        <span class=3D"h1" style=3D"display: inline; =
font-weight: bold; "><h1 style=3D"display: inline; ">JSON Web Token =
(JWT) Bearer Token Profiles for OAuth =
2.0</h1></span></span></font></pre><br><span =
style=3D"-webkit-text-size-adjust: auto;">Note the title says "for =
OAuth2"</span></div><div><span style=3D"-webkit-text-size-adjust: =
auto;"><br></span></div><div><span style=3D"-webkit-text-size-adjust: =
auto;">Sorry. Couldn't resist.&nbsp;</span></div><div><span =
style=3D"-webkit-text-size-adjust: auto;"><br></span></div><div><span =
style=3D"-webkit-text-size-adjust: auto;">Phil</span><div =
style=3D"-webkit-text-size-adjust: auto; "><br></div><div =
style=3D"-webkit-text-size-adjust: auto; ">Sent from my =
phone.</div></div><div style=3D"-webkit-text-size-adjust: auto; "><br>On =
2013-02-28, at 9:40, John Bradley &lt;<a =
href=3D"mailto:ve7jtb@ve7jtb.com">ve7jtb@ve7jtb.com</a>&gt; =
wrote:<br><br></div><blockquote type=3D"cite" =
style=3D"-webkit-text-size-adjust: auto; "><meta =
http-equiv=3D"Content-Type" content=3D"text/html charset=3Dus-ascii">JWT =
is an assertion( I am probably going to regret using that =
word).<div><br></div><div>It is used in openID connect for id_tokens, it =
is used in OAuth for Assertion grant types and authentication of the =
client to the token endpoint.</div><div><a =
href=3D"http://tools.ietf.org/html/draft-ietf-oauth-jwt-bearer-04">http://=
tools.ietf.org/html/draft-ietf-oauth-jwt-bearer-04</a></div><div><br></div=
><div><pre style=3D"font-size: 1em; margin-top: 0px; margin-bottom: 0px; =
"><span class=3D"h1" style=3D"line-height: 0pt; display: inline; =
font-size: 1em; font-weight: bold; "><h1 style=3D"line-height: 0pt; =
display: inline; font-size: 1em; ">JSON Web Token (JWT) Bearer Token =
Profiles for OAuth 2.0</h1></span></pre><div><br></div><div>Dosen't =
define JWT's use for access tokens for the RS. =
&nbsp;&nbsp;</div><div><br></div><div>Bottom line JWT is for more than =
access tokens.</div><div><br></div><div>John =
B.</div><div><br></div><div><div>On 2013-02-28, at 9:28 AM, Phil Hunt =
&lt;<a href=3D"mailto:phil.hunt@oracle.com">phil.hunt@oracle.com</a>&gt; =
wrote:</div><br class=3D"Apple-interchange-newline"><blockquote =
type=3D"cite"><meta http-equiv=3D"content-type" content=3D"text/html; =
charset=3Dutf-8"><div dir=3D"auto"><div>Are you saying jwt is not an =
access token type?<br><br>Phil<div><br></div><div>Sent from my =
phone.</div></div><div><br>On 2013-02-28, at 8:58, John Bradley &lt;<a =
href=3D"mailto:ve7jtb@ve7jtb.com">ve7jtb@ve7jtb.com</a>&gt; =
wrote:<br><br></div><blockquote type=3D"cite"><meta =
http-equiv=3D"Content-Type" content=3D"text/html =
charset=3Diso-8859-1">Yes, defining scope in JWT is the wrong place. =
&nbsp; JWT needs to stick to the security claims needed to process =
JWT.<div><br></div><div>I also don't know how far you get requiring a =
specific authorization format for JWT, some AS will wan to use a opaque =
reference, some might want to use a user claim or role claim, others may =
use scopes, &nbsp;combining scopes and claims is also =
possible.</div><div><br></div><div>Right now it is up to a AS RS pair to =
agree on how to communicate authorization. &nbsp; I don't want MAC to be =
more restrictive than bearer when it comes to authorization between AS =
and RS.<br><div><br></div><div>Hannes wanted to know why JWT didn't =
define scope. &nbsp;The simple answer is that it is out of scope for JWT =
itself. &nbsp; It might be defined in a OAuth access token profile for =
JWT but it should not be specific to MAC.</div><div><br></div><div>John =
B.</div><div><div><div>On 2013-02-28, at 8:44 AM, Brian Campbell &lt;<a =
href=3D"mailto:bcampbell@pingidentity.com">bcampbell@pingidentity.com</a>&=
gt; wrote:</div><br class=3D"Apple-interchange-newline"><blockquote =
type=3D"cite"><div dir=3D"ltr"><div>I think John's point was more that =
scope is something rather specific to an OAuth access token and, while =
JWT is can be used to represent an access token, it's not the only =
application of JWT. The 'standard' claims in JWT are those that are =
believed (right or wrong) to be widely applicable across different =
applications of JWT. One could argue about it but scope is probably not =
one of those.<br>

<br></div>It would probably make sense to try and build a profile of JWT =
specifically for OAuth access tokens (though I suspect there are some =
turtles and dragons in there), which might be the appropriate place to =
define/register a scope claim.<br>


</div><div class=3D"gmail_extra"><br><br><div class=3D"gmail_quote">On =
Thu, Feb 28, 2013 at 9:24 AM, Phil Hunt <span dir=3D"ltr">&lt;<a =
href=3D"mailto:phil.hunt@oracle.com" =
target=3D"_blank">phil.hunt@oracle.com</a>&gt;</span> wrote:<br>

<blockquote class=3D"gmail_quote" style=3D"margin:0 0 0 =
.8ex;border-left:1px #ccc solid;padding-left:1ex">Are you advocating TWO =
systems? That seems like a bad choice.<br>
<br>
I would rather fix scope than go to a two system approach.<br>
<br>
Phil<br>
<br>
Sent from my phone.<br>
<br>
On 2013-02-28, at 8:17, John Bradley &lt;<a =
href=3D"mailto:ve7jtb@ve7jtb.com">ve7jtb@ve7jtb.com</a>&gt; wrote:<br>
<br>
&gt; While scope is one method that a AS could communicate authorization =
to a RS, it is not the only or perhaps even the most likely one.<br>
&gt; Using scope requires a relatively tight binding between the RS and =
AS, &nbsp;UMA uses a different mechanism that describes finer grained =
operations.<br>
&gt; The AS may include roles, user, or other more abstract claims that =
the the client may (god help them) pass on to EXCML for processing.<br>
&gt;<br>
&gt; While having a scopes claim is possible, like any other claim it is =
not part of the JWT core security processing claims, and needs to be =
defined by extension.<br>
&gt;<br>
&gt; John B.<br>
&gt; On 2013-02-28, at 2:29 AM, Hannes Tschofenig &lt;<a =
href=3D"mailto:hannes.tschofenig@gmx.net">hannes.tschofenig@gmx.net</a>&gt=
; wrote:<br>
&gt;<br>
&gt;&gt; Hi Mike,<br>
&gt;&gt;<br>
&gt;&gt; when I worked on the MAC specification I noticed that the JWT =
does not have a claim for the scope. I believe that this would be needed =
to allow the resource server to verify whether the scope the =
authorization server authorized is indeed what the client is asking =
for.<br>


&gt;&gt;<br>
&gt;&gt; Ciao<br>
&gt;&gt; Hannes<br>
&gt;&gt;<br>
&gt;&gt; _______________________________________________<br>
&gt;&gt; OAuth mailing list<br>
&gt;&gt; <a href=3D"mailto:OAuth@ietf.org">OAuth@ietf.org</a><br>
&gt;&gt; <a href=3D"https://www.ietf.org/mailman/listinfo/oauth" =
target=3D"_blank">https://www.ietf.org/mailman/listinfo/oauth</a><br>
&gt;<br>
&gt; _______________________________________________<br>
&gt; OAuth mailing list<br>
&gt; <a href=3D"mailto:OAuth@ietf.org">OAuth@ietf.org</a><br>
&gt; <a href=3D"https://www.ietf.org/mailman/listinfo/oauth" =
target=3D"_blank">https://www.ietf.org/mailman/listinfo/oauth</a><br>
_______________________________________________<br>
OAuth mailing list<br>
<a href=3D"mailto:OAuth@ietf.org">OAuth@ietf.org</a><br>
<a href=3D"https://www.ietf.org/mailman/listinfo/oauth" =
target=3D"_blank">https://www.ietf.org/mailman/listinfo/oauth</a><br>
</blockquote></div><br></div>
=
</blockquote></div><br></div></div></blockquote></div></blockquote></div><=
br></div></blockquote></div></blockquote></div><br></div></body></html>=

--Apple-Mail=_6B5A46A7-C593-4720-BAA7-FD9BE76EB427--

--Apple-Mail=_9B76360D-5ECC-47AC-B18F-5AADB5182FBF
Content-Disposition: attachment;
	filename=smime.p7s
Content-Type: application/pkcs7-signature;
	name=smime.p7s
Content-Transfer-Encoding: base64
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--Apple-Mail=_9B76360D-5ECC-47AC-B18F-5AADB5182FBF--

From bcampbell@pingidentity.com  Thu Feb 28 11:03:49 2013
Return-Path: <bcampbell@pingidentity.com>
X-Original-To: oauth@ietfa.amsl.com
Delivered-To: oauth@ietfa.amsl.com
Received: from localhost (localhost [127.0.0.1]) by ietfa.amsl.com (Postfix) with ESMTP id B248A21F8AB4 for <oauth@ietfa.amsl.com>; Thu, 28 Feb 2013 11:03:48 -0800 (PST)
X-Virus-Scanned: amavisd-new at amsl.com
X-Spam-Flag: NO
X-Spam-Score: -5.905
X-Spam-Level: 
X-Spam-Status: No, score=-5.905 tagged_above=-999 required=5 tests=[AWL=0.071,  BAYES_00=-2.599, FM_FORGED_GMAIL=0.622, HTML_MESSAGE=0.001, RCVD_IN_DNSWL_MED=-4]
Received: from mail.ietf.org ([64.170.98.30]) by localhost (ietfa.amsl.com [127.0.0.1]) (amavisd-new, port 10024) with ESMTP id TUXm-eoFfX6o for <oauth@ietfa.amsl.com>; Thu, 28 Feb 2013 11:03:44 -0800 (PST)
Received: from na3sys009aog103.obsmtp.com (na3sys009aog103.obsmtp.com [74.125.149.71]) by ietfa.amsl.com (Postfix) with ESMTP id 2009F21F8A96 for <oauth@ietf.org>; Thu, 28 Feb 2013 11:03:44 -0800 (PST)
Received: from mail-oa0-f71.google.com ([209.85.219.71]) (using TLSv1) by na3sys009aob103.postini.com ([74.125.148.12]) with SMTP ID DSNKUS+qD5MUUyvnJeIzYl46DvhxwIIG0glF@postini.com; Thu, 28 Feb 2013 11:03:44 PST
Received: by mail-oa0-f71.google.com with SMTP id o6so14043446oag.6 for <oauth@ietf.org>; Thu, 28 Feb 2013 11:03:43 -0800 (PST)
X-Google-DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=google.com; s=20120113; h=x-received:x-received:mime-version:in-reply-to:references:from:date :message-id:subject:to:cc:content-type:x-gm-message-state; bh=FNNoDKeEHc/SN0qI+leQi6DuO/CT2o/CCKh0qWnk04E=; b=creNvZOlfBFr9iVZ7uwRQ33F2eDwR0shAyUJHrbfCNMeiyjW3hJX305bixu9KXhEsW 4zinWPzjUvW9eWCgFCADrEc0u4JdxX3eoKghS48a4IGDekKOX7c6IQCDFd1ZMUbTzAgN 0ZewezW6Yar6UKSNs/2Gni8bjGr5bF49Gaa1x30ANHFyit5GRfiQFG/oT8/n2G17ZyVS ht8oFz01WyeHQeomD3qMTQoy6Mouj/ux42KFX8suU44iCOrpcCamck21PZwgeEg+UMO5 ybngmZ/MvYM15n1u5tNOC9FdvTMHOf4Ze1BDzM1cXMhy8DUA80ykIWDQOYZhZ+l/VhwP mZ9w==
X-Received: by 10.50.37.162 with SMTP id z2mr4544261igj.13.1362078222869; Thu, 28 Feb 2013 11:03:42 -0800 (PST)
X-Received: by 10.50.37.162 with SMTP id z2mr4544129igj.13.1362078220186; Thu, 28 Feb 2013 11:03:40 -0800 (PST)
MIME-Version: 1.0
Received: by 10.64.32.106 with HTTP; Thu, 28 Feb 2013 11:03:10 -0800 (PST)
In-Reply-To: <50DA292F-32F0-4266-8401-006AD837B775@ve7jtb.com>
References: <0EC2404F-E3C5-4AD1-88B4-E74AA0394DD9@gmx.net> <C75E4871-E907-4EF7-BAF0-9D1A172D581B@ve7jtb.com> <CA6A6425-D0CE-469F-B51E-9F296DA8041C@oracle.com> <CA+k3eCREgN+6z+U=jjJcPo0nZVR0GWn5zXeecZRO+rg=xd-gZg@mail.gmail.com> <A2375FE9-946F-46B3-9356-0709DD56BD4A@ve7jtb.com> <48FD87D1-4DF4-4289-99B7-40A515F31890@oracle.com> <3E472720-31A4-40A0-AAA4-402CF850831A@ve7jtb.com> <7127843B-D7B0-4AB6-87F1-1604D1EFFA79@oracle.com> <50DA292F-32F0-4266-8401-006AD837B775@ve7jtb.com>
From: Brian Campbell <bcampbell@pingidentity.com>
Date: Thu, 28 Feb 2013 12:03:10 -0700
Message-ID: <CA+k3eCSyE3cPMh17XuivbUZUtHY=RAtjV1UeCdW6gGFk+gv02A@mail.gmail.com>
To: John Bradley <ve7jtb@ve7jtb.com>
Content-Type: multipart/alternative; boundary=f46d04446b297c44bf04d6cd8c9a
X-Gm-Message-State: ALoCoQmSWCw5BSrrkfOGZrTGVmNXCHVR0YrzksLY7TStbLypTxIJPYSh4kaKkh10rGyuUnBwdJYC+ofJw/FO04zTs1CzY9PmKHB8pfKdEm6lIQ/FT9BRieJkxWEZZhGmTXEPzJD/C6ad
Cc: "oauth@ietf.org WG" <oauth@ietf.org>
Subject: Re: [OAUTH-WG] JWT - scope claim missing
X-BeenThere: oauth@ietf.org
X-Mailman-Version: 2.1.12
Precedence: list
List-Id: OAUTH WG <oauth.ietf.org>
List-Unsubscribe: <https://www.ietf.org/mailman/options/oauth>, <mailto:oauth-request@ietf.org?subject=unsubscribe>
List-Archive: <http://www.ietf.org/mail-archive/web/oauth>
List-Post: <mailto:oauth@ietf.org>
List-Help: <mailto:oauth-request@ietf.org?subject=help>
List-Subscribe: <https://www.ietf.org/mailman/listinfo/oauth>, <mailto:oauth-request@ietf.org?subject=subscribe>
X-List-Received-Date: Thu, 28 Feb 2013 19:03:49 -0000

--f46d04446b297c44bf04d6cd8c9a
Content-Type: text/plain; charset=ISO-8859-1

I'm not sure anyone really "picked" the titles for the bearer token
profiles. They just kind of evolved. And evolved in funny ways especially
when client authn to the AS was added.

You won't hear me argue that the titles are "good" and this is not the
first time there's been confusion about what they actually do. They define
new grant types and new client authentication methods. They *do not* define
an access token format or anything else about access tokens. JWT and SAML
could be used for that but that's not what these drafts do.

Suggestions for better title(s) would be more than welcome.

Here's what they are now:

SAML 2.0 Bearer Assertion Profiles for OAuth 2.0
draft-ietf-oauth-saml2-bearer

JSON Web Token (JWT) Bearer Token Profiles for OAuth 2.0
draft-ietf-oauth-jwt-bearer

Assertion Framework for OAuth 2.0
draft-ietf-oauth-assertions

On Thu, Feb 28, 2013 at 11:36 AM, John Bradley <ve7jtb@ve7jtb.com> wrote:

> Yes the title likely adds to the confusion given that the bearer tokens
> are not access tokens.
>
> Things as separate from OAuth as the Firefox browerID spec use JWS signed
> JWTs.
>
> The bearer token profiles for OAuth 2 are for OAuth2.
>
> The JSON Web Token (JWT)<http://tools.ietf.org/html/draft-ietf-oauth-json-web-token-06> spec
> did not start in OAuth and is not OAuth specific.
>
> A JWT is:
>
> JSON Web Token (JWT)  A string representing a set of claims as a JSON
>       object that is encoded in a JWS or JWE, enabling the claims to be
>       digitally signed or MACed and/or encrypted.
>
>
> So OAuth or other profiles may define claims to go in a JWT, but the JWT
> needs to itself only define the claims necessary for security processing.
>
> John B.
> PS that was a soft ball If you hadn't responded I would have been
> disappointed.  I din't pick the title for the bearer token profiles.
>
>
> On 2013-02-28, at 10:12 AM, Phil Hunt <phil.hunt@oracle.com> wrote:
>
>
>
> JSON Web Token (JWT) Bearer Token Profiles for OAuth 2.0
>
>
> Note the title says "for OAuth2"
>
> Sorry. Couldn't resist.
>
> Phil
>
> Sent from my phone.
>
> On 2013-02-28, at 9:40, John Bradley <ve7jtb@ve7jtb.com> wrote:
>
> JWT is an assertion( I am probably going to regret using that word).
>
> It is used in openID connect for id_tokens, it is used in OAuth for
> Assertion grant types and authentication of the client to the token
> endpoint.
> http://tools.ietf.org/html/draft-ietf-oauth-jwt-bearer-04
>
> JSON Web Token (JWT) Bearer Token Profiles for OAuth 2.0
>
>
> Dosen't define JWT's use for access tokens for the RS.
>
> Bottom line JWT is for more than access tokens.
>
> John B.
>
> On 2013-02-28, at 9:28 AM, Phil Hunt <phil.hunt@oracle.com> wrote:
>
> Are you saying jwt is not an access token type?
>
> Phil
>
> Sent from my phone.
>
> On 2013-02-28, at 8:58, John Bradley <ve7jtb@ve7jtb.com> wrote:
>
> Yes, defining scope in JWT is the wrong place.   JWT needs to stick to the
> security claims needed to process JWT.
>
> I also don't know how far you get requiring a specific authorization
> format for JWT, some AS will wan to use a opaque reference, some might want
> to use a user claim or role claim, others may use scopes,  combining scopes
> and claims is also possible.
>
> Right now it is up to a AS RS pair to agree on how to communicate
> authorization.   I don't want MAC to be more restrictive than bearer when
> it comes to authorization between AS and RS.
>
> Hannes wanted to know why JWT didn't define scope.  The simple answer is
> that it is out of scope for JWT itself.   It might be defined in a OAuth
> access token profile for JWT but it should not be specific to MAC.
>
> John B.
> On 2013-02-28, at 8:44 AM, Brian Campbell <bcampbell@pingidentity.com>
> wrote:
>
> I think John's point was more that scope is something rather specific to
> an OAuth access token and, while JWT is can be used to represent an access
> token, it's not the only application of JWT. The 'standard' claims in JWT
> are those that are believed (right or wrong) to be widely applicable across
> different applications of JWT. One could argue about it but scope is
> probably not one of those.
>
> It would probably make sense to try and build a profile of JWT
> specifically for OAuth access tokens (though I suspect there are some
> turtles and dragons in there), which might be the appropriate place to
> define/register a scope claim.
>
>
> On Thu, Feb 28, 2013 at 9:24 AM, Phil Hunt <phil.hunt@oracle.com> wrote:
>
>> Are you advocating TWO systems? That seems like a bad choice.
>>
>> I would rather fix scope than go to a two system approach.
>>
>> Phil
>>
>> Sent from my phone.
>>
>> On 2013-02-28, at 8:17, John Bradley <ve7jtb@ve7jtb.com> wrote:
>>
>> > While scope is one method that a AS could communicate authorization to
>> a RS, it is not the only or perhaps even the most likely one.
>> > Using scope requires a relatively tight binding between the RS and AS,
>>  UMA uses a different mechanism that describes finer grained operations.
>> > The AS may include roles, user, or other more abstract claims that the
>> the client may (god help them) pass on to EXCML for processing.
>> >
>> > While having a scopes claim is possible, like any other claim it is not
>> part of the JWT core security processing claims, and needs to be defined by
>> extension.
>> >
>> > John B.
>> > On 2013-02-28, at 2:29 AM, Hannes Tschofenig <hannes.tschofenig@gmx.net>
>> wrote:
>> >
>> >> Hi Mike,
>> >>
>> >> when I worked on the MAC specification I noticed that the JWT does not
>> have a claim for the scope. I believe that this would be needed to allow
>> the resource server to verify whether the scope the authorization server
>> authorized is indeed what the client is asking for.
>> >>
>> >> Ciao
>> >> Hannes
>> >>
>> >> _______________________________________________
>> >> OAuth mailing list
>> >> OAuth@ietf.org
>> >> https://www.ietf.org/mailman/listinfo/oauth
>> >
>> > _______________________________________________
>> > OAuth mailing list
>> > OAuth@ietf.org
>> > https://www.ietf.org/mailman/listinfo/oauth
>> _______________________________________________
>> OAuth mailing list
>> OAuth@ietf.org
>> https://www.ietf.org/mailman/listinfo/oauth
>>
>
>
>
>
>

--f46d04446b297c44bf04d6cd8c9a
Content-Type: text/html; charset=ISO-8859-1
Content-Transfer-Encoding: quoted-printable

<div dir=3D"ltr"><div>I&#39;m not sure anyone really &quot;picked&quot; the=
 titles for the bearer token profiles. They just kind of evolved. And evolv=
ed in funny ways especially when client authn to the AS was added. <br><br>


</div><div>You won&#39;t hear me argue that the titles are &quot;good&quot;=
 and this is not the first time there&#39;s been confusion about what they =
actually do. They define new grant types and new client authentication meth=
ods. They *do not* define an access token format or anything else about acc=
ess tokens. JWT and SAML could be used for that but that&#39;s not what the=
se drafts do. <br>

<br></div><div>Suggestions for better title(s) would be more than welcome.<=
br>
</div><div><div><br></div><div>Here&#39;s what they are now:<br></div><div>=
<br>SAML 2.0 Bearer Assertion Profiles for OAuth 2.0<br>draft-ietf-oauth-sa=
ml2-bearer<br><br>JSON Web Token (JWT) Bearer Token Profiles for OAuth 2.0<=
br>

draft-ietf-oauth-jwt-bearer<br><br>Assertion Framework for OAuth 2.0<br>dra=
ft-ietf-oauth-assertions<br><div class=3D"gmail_extra"><br><div class=3D"gm=
ail_quote">On Thu, Feb 28, 2013 at 11:36 AM, John Bradley <span dir=3D"ltr"=
>&lt;<a href=3D"mailto:ve7jtb@ve7jtb.com" target=3D"_blank">ve7jtb@ve7jtb.c=
om</a>&gt;</span> wrote:<br>

<blockquote class=3D"gmail_quote" style=3D"margin:0px 0px 0px 0.8ex;border-=
left:1px solid rgb(204,204,204);padding-left:1ex">
<div style=3D"word-wrap:break-word">Yes the title likely adds to the confus=
ion given that the bearer tokens are not access tokens.<div><br></div><div>=
Things as separate from OAuth as the Firefox browerID spec use JWS signed J=
WTs. =A0</div>


<div><br></div><div>The bearer token profiles for OAuth 2 are for OAuth2.</=
div><div><br></div><div>The=A0<a href=3D"http://tools.ietf.org/html/draft-i=
etf-oauth-json-web-token-06" target=3D"_blank">JSON Web Token (JWT)</a>=A0s=
pec did not start in OAuth and is not OAuth specific.</div>


<div><br></div><div>A JWT is:</div><div><pre style=3D"font-size:1em;margin-=
top:0px;margin-bottom:0px">JSON Web Token (JWT)  A string representing a se=
t of claims as a JSON
      object that is encoded in a JWS or JWE, enabling the claims to be
      digitally signed or MACed and/or encrypted.
</pre><div><br></div><div>So OAuth or other profiles may define claims to g=
o in a JWT, but the JWT needs to itself only define the claims necessary fo=
r security processing. =A0</div><div><br></div><div>John B.</div><div>PS th=
at was a soft ball If you hadn&#39;t responded I would have been disappoint=
ed. =A0I din&#39;t pick the title for the bearer token profiles.</div>


<div><div><div><br></div><div><br></div><div><div>On 2013-02-28, at 10:12 A=
M, Phil Hunt &lt;<a href=3D"mailto:phil.hunt@oracle.com" target=3D"_blank">=
phil.hunt@oracle.com</a>&gt; wrote:</div><br><blockquote type=3D"cite">
<div dir=3D"auto"><div><pre style=3D"margin-top:0px;margin-bottom:0px"><fon=
t face=3D"Helvetica"><span style=3D"white-space:normal;background-color:rgb=
a(255,255,255,0)">        <span style=3D"display:inline;font-weight:bold"><=
h1 style=3D"display:inline">


JSON Web Token (JWT) Bearer Token Profiles for OAuth 2.0</h1></span></span>=
</font></pre><br><span>Note the title says &quot;for OAuth2&quot;</span></d=
iv><div><span><br></span></div><div><span>Sorry. Couldn&#39;t resist.=A0</s=
pan></div>


<div><span><br></span></div><div><span>Phil</span><div><br></div><div>Sent =
from my phone.</div></div><div><br>On 2013-02-28, at 9:40, John Bradley &lt=
;<a href=3D"mailto:ve7jtb@ve7jtb.com" target=3D"_blank">ve7jtb@ve7jtb.com</=
a>&gt; wrote:<br>


<br></div><blockquote type=3D"cite">JWT is an assertion( I am probably goin=
g to regret using that word).<div><br></div><div>It is used in openID conne=
ct for id_tokens, it is used in OAuth for Assertion grant types and authent=
ication of the client to the token endpoint.</div>


<div><a href=3D"http://tools.ietf.org/html/draft-ietf-oauth-jwt-bearer-04" =
target=3D"_blank">http://tools.ietf.org/html/draft-ietf-oauth-jwt-bearer-04=
</a></div><div><br></div><div><pre style=3D"font-size:1em;margin-top:0px;ma=
rgin-bottom:0px">

<span style=3D"line-height:0pt;display:inline;font-size:1em;font-weight:bol=
d"><h1 style=3D"line-height:0pt;display:inline;font-size:1em">JSON Web Toke=
n (JWT) Bearer Token Profiles for OAuth 2.0</h1></span></pre><div><br></div=
>


<div>Dosen&#39;t define JWT&#39;s use for access tokens for the RS. =A0=A0<=
/div><div><br></div><div>Bottom line JWT is for more than access tokens.</d=
iv><div><br></div><div>John B.</div><div><br></div><div><div>On 2013-02-28,=
 at 9:28 AM, Phil Hunt &lt;<a href=3D"mailto:phil.hunt@oracle.com" target=
=3D"_blank">phil.hunt@oracle.com</a>&gt; wrote:</div>


<br><blockquote type=3D"cite"><div dir=3D"auto"><div>Are you saying jwt is =
not an access token type?<br><br>Phil<div><br></div><div>Sent from my phone=
.</div></div><div><br>On 2013-02-28, at 8:58, John Bradley &lt;<a href=3D"m=
ailto:ve7jtb@ve7jtb.com" target=3D"_blank">ve7jtb@ve7jtb.com</a>&gt; wrote:=
<br>


<br></div><blockquote type=3D"cite">Yes, defining scope in JWT is the wrong=
 place. =A0 JWT needs to stick to the security claims needed to process JWT=
.<div><br></div><div>I also don&#39;t know how far you get requiring a spec=
ific authorization format for JWT, some AS will wan to use a opaque referen=
ce, some might want to use a user claim or role claim, others may use scope=
s, =A0combining scopes and claims is also possible.</div>


<div><br></div><div>Right now it is up to a AS RS pair to agree on how to c=
ommunicate authorization. =A0 I don&#39;t want MAC to be more restrictive t=
han bearer when it comes to authorization between AS and RS.<br><div><br>


</div><div>Hannes wanted to know why JWT didn&#39;t define scope. =A0The si=
mple answer is that it is out of scope for JWT itself. =A0 It might be defi=
ned in a OAuth access token profile for JWT but it should not be specific t=
o MAC.</div>


<div><br></div><div>John B.</div><div><div><div>On 2013-02-28, at 8:44 AM, =
Brian Campbell &lt;<a href=3D"mailto:bcampbell@pingidentity.com" target=3D"=
_blank">bcampbell@pingidentity.com</a>&gt; wrote:</div><br><blockquote type=
=3D"cite">


<div dir=3D"ltr"><div>I think John&#39;s point was more that scope is somet=
hing rather specific to an OAuth access token and, while JWT is can be used=
 to represent an access token, it&#39;s not the only application of JWT. Th=
e &#39;standard&#39; claims in JWT are those that are believed (right or wr=
ong) to be widely applicable across different applications of JWT. One coul=
d argue about it but scope is probably not one of those.<br>




<br></div>It would probably make sense to try and build a profile of JWT sp=
ecifically for OAuth access tokens (though I suspect there are some turtles=
 and dragons in there), which might be the appropriate place to define/regi=
ster a scope claim.<br>





</div><div class=3D"gmail_extra"><br><br><div class=3D"gmail_quote">On Thu,=
 Feb 28, 2013 at 9:24 AM, Phil Hunt <span dir=3D"ltr">&lt;<a href=3D"mailto=
:phil.hunt@oracle.com" target=3D"_blank">phil.hunt@oracle.com</a>&gt;</span=
> wrote:<br>




<blockquote class=3D"gmail_quote" style=3D"margin:0px 0px 0px 0.8ex;border-=
left:1px solid rgb(204,204,204);padding-left:1ex">Are you advocating TWO sy=
stems? That seems like a bad choice.<br>
<br>
I would rather fix scope than go to a two system approach.<br>
<br>
Phil<br>
<br>
Sent from my phone.<br>
<br>
On 2013-02-28, at 8:17, John Bradley &lt;<a href=3D"mailto:ve7jtb@ve7jtb.co=
m" target=3D"_blank">ve7jtb@ve7jtb.com</a>&gt; wrote:<br>
<br>
&gt; While scope is one method that a AS could communicate authorization to=
 a RS, it is not the only or perhaps even the most likely one.<br>
&gt; Using scope requires a relatively tight binding between the RS and AS,=
 =A0UMA uses a different mechanism that describes finer grained operations.=
<br>
&gt; The AS may include roles, user, or other more abstract claims that the=
 the client may (god help them) pass on to EXCML for processing.<br>
&gt;<br>
&gt; While having a scopes claim is possible, like any other claim it is no=
t part of the JWT core security processing claims, and needs to be defined =
by extension.<br>
&gt;<br>
&gt; John B.<br>
&gt; On 2013-02-28, at 2:29 AM, Hannes Tschofenig &lt;<a href=3D"mailto:han=
nes.tschofenig@gmx.net" target=3D"_blank">hannes.tschofenig@gmx.net</a>&gt;=
 wrote:<br>
&gt;<br>
&gt;&gt; Hi Mike,<br>
&gt;&gt;<br>
&gt;&gt; when I worked on the MAC specification I noticed that the JWT does=
 not have a claim for the scope. I believe that this would be needed to all=
ow the resource server to verify whether the scope the authorization server=
 authorized is indeed what the client is asking for.<br>





&gt;&gt;<br>
&gt;&gt; Ciao<br>
&gt;&gt; Hannes<br>
&gt;&gt;<br>
&gt;&gt; _______________________________________________<br>
&gt;&gt; OAuth mailing list<br>
&gt;&gt; <a href=3D"mailto:OAuth@ietf.org" target=3D"_blank">OAuth@ietf.org=
</a><br>
&gt;&gt; <a href=3D"https://www.ietf.org/mailman/listinfo/oauth" target=3D"=
_blank">https://www.ietf.org/mailman/listinfo/oauth</a><br>
&gt;<br>
&gt; _______________________________________________<br>
&gt; OAuth mailing list<br>
&gt; <a href=3D"mailto:OAuth@ietf.org" target=3D"_blank">OAuth@ietf.org</a>=
<br>
&gt; <a href=3D"https://www.ietf.org/mailman/listinfo/oauth" target=3D"_bla=
nk">https://www.ietf.org/mailman/listinfo/oauth</a><br>
_______________________________________________<br>
OAuth mailing list<br>
<a href=3D"mailto:OAuth@ietf.org" target=3D"_blank">OAuth@ietf.org</a><br>
<a href=3D"https://www.ietf.org/mailman/listinfo/oauth" target=3D"_blank">h=
ttps://www.ietf.org/mailman/listinfo/oauth</a><br>
</blockquote></div><br></div>
</blockquote></div><br></div></div></blockquote></div></blockquote></div><b=
r></div></blockquote></div></blockquote></div><br></div></div></div></div><=
/blockquote></div><br></div></div></div></div>

--f46d04446b297c44bf04d6cd8c9a--

From jricher@mitre.org  Thu Feb 28 11:13:24 2013
Return-Path: <jricher@mitre.org>
X-Original-To: oauth@ietfa.amsl.com
Delivered-To: oauth@ietfa.amsl.com
Received: from localhost (localhost [127.0.0.1]) by ietfa.amsl.com (Postfix) with ESMTP id 9575E21F89FC for <oauth@ietfa.amsl.com>; Thu, 28 Feb 2013 11:13:24 -0800 (PST)
X-Virus-Scanned: amavisd-new at amsl.com
X-Spam-Flag: NO
X-Spam-Score: -6.578
X-Spam-Level: 
X-Spam-Status: No, score=-6.578 tagged_above=-999 required=5 tests=[AWL=0.020,  BAYES_00=-2.599, HTML_MESSAGE=0.001, RCVD_IN_DNSWL_MED=-4]
Received: from mail.ietf.org ([64.170.98.30]) by localhost (ietfa.amsl.com [127.0.0.1]) (amavisd-new, port 10024) with ESMTP id XZ3XxJogSv7h for <oauth@ietfa.amsl.com>; Thu, 28 Feb 2013 11:13:19 -0800 (PST)
Received: from smtpksrv1.mitre.org (smtpksrv1.mitre.org [198.49.146.77]) by ietfa.amsl.com (Postfix) with ESMTP id 0FC7321F88E8 for <oauth@ietf.org>; Thu, 28 Feb 2013 11:13:19 -0800 (PST)
Received: from smtpksrv1.mitre.org (localhost.localdomain [127.0.0.1]) by localhost (Postfix) with SMTP id 3B0BB435032D; Thu, 28 Feb 2013 14:13:18 -0500 (EST)
Received: from IMCCAS01.MITRE.ORG (imccas01.mitre.org [129.83.29.78]) by smtpksrv1.mitre.org (Postfix) with ESMTP id 175A31F0539; Thu, 28 Feb 2013 14:13:18 -0500 (EST)
Received: from [10.146.15.29] (129.83.31.58) by IMCCAS01.MITRE.ORG (129.83.29.78) with Microsoft SMTP Server (TLS) id 14.2.318.4; Thu, 28 Feb 2013 14:13:17 -0500
Message-ID: <512FAC0F.5070409@mitre.org>
Date: Thu, 28 Feb 2013 14:12:15 -0500
From: Justin Richer <jricher@mitre.org>
User-Agent: Mozilla/5.0 (X11; Linux i686; rv:17.0) Gecko/20130106 Thunderbird/17.0.2
MIME-Version: 1.0
To: Brian Campbell <bcampbell@pingidentity.com>
References: <0EC2404F-E3C5-4AD1-88B4-E74AA0394DD9@gmx.net> <C75E4871-E907-4EF7-BAF0-9D1A172D581B@ve7jtb.com> <CA6A6425-D0CE-469F-B51E-9F296DA8041C@oracle.com> <CA+k3eCREgN+6z+U=jjJcPo0nZVR0GWn5zXeecZRO+rg=xd-gZg@mail.gmail.com> <A2375FE9-946F-46B3-9356-0709DD56BD4A@ve7jtb.com> <48FD87D1-4DF4-4289-99B7-40A515F31890@oracle.com> <3E472720-31A4-40A0-AAA4-402CF850831A@ve7jtb.com> <7127843B-D7B0-4AB6-87F1-1604D1EFFA79@oracle.com> <50DA292F-32F0-4266-8401-006AD837B775@ve7jtb.com> <CA+k3eCSyE3cPMh17XuivbUZUtHY=RAtjV1UeCdW6gGFk+gv02A@mail.gmail.com>
In-Reply-To: <CA+k3eCSyE3cPMh17XuivbUZUtHY=RAtjV1UeCdW6gGFk+gv02A@mail.gmail.com>
Content-Type: multipart/alternative; boundary="------------000007040907010705090907"
X-Originating-IP: [129.83.31.58]
Cc: "oauth@ietf.org WG" <oauth@ietf.org>
Subject: Re: [OAUTH-WG] JWT - scope claim missing
X-BeenThere: oauth@ietf.org
X-Mailman-Version: 2.1.12
Precedence: list
List-Id: OAUTH WG <oauth.ietf.org>
List-Unsubscribe: <https://www.ietf.org/mailman/options/oauth>, <mailto:oauth-request@ietf.org?subject=unsubscribe>
List-Archive: <http://www.ietf.org/mail-archive/web/oauth>
List-Post: <mailto:oauth@ietf.org>
List-Help: <mailto:oauth-request@ietf.org?subject=help>
List-Subscribe: <https://www.ietf.org/mailman/listinfo/oauth>, <mailto:oauth-request@ietf.org?subject=subscribe>
X-List-Received-Date: Thu, 28 Feb 2013 19:13:24 -0000

--------------000007040907010705090907
Content-Type: text/plain; charset="ISO-8859-1"; format=flowed
Content-Transfer-Encoding: 7bit

Brian, I think you're conflating two things (and John might be, too). On 
the one hand, we've got the JWT document, which talks about what goes 
into the token itself. This can be used as an assertion, as an access 
token, as a floor wax / dessert topping. JWT doesn't really care, and 
this is really only in the OAuth WG thanks to IETF politics. Then we 
have the assertion profiles which say how to use things like JWT to do 
specific things in OAuth, and these are what Brian's talking about below.

Ultimately, this conversation is about the former and not the latter. 
That said, since an OAuth access token is a valid (and common) use of 
JWT, I think that having a common way to put things like "scope" and 
"client_id" and other OAuthy things into a JWT makes a whole heck of a 
lot of sense. Whether or not that is inside of the base JWT draft (since 
it's supposed to be for many use cases), I don't particularly care, and 
I can see the arguments from both sides.

  -- Justin

On 02/28/2013 02:03 PM, Brian Campbell wrote:
> I'm not sure anyone really "picked" the titles for the bearer token 
> profiles. They just kind of evolved. And evolved in funny ways 
> especially when client authn to the AS was added.
>
> You won't hear me argue that the titles are "good" and this is not the 
> first time there's been confusion about what they actually do. They 
> define new grant types and new client authentication methods. They *do 
> not* define an access token format or anything else about access 
> tokens. JWT and SAML could be used for that but that's not what these 
> drafts do.
>
> Suggestions for better title(s) would be more than welcome.
>
> Here's what they are now:
>
> SAML 2.0 Bearer Assertion Profiles for OAuth 2.0
> draft-ietf-oauth-saml2-bearer
>
> JSON Web Token (JWT) Bearer Token Profiles for OAuth 2.0
> draft-ietf-oauth-jwt-bearer
>
> Assertion Framework for OAuth 2.0
> draft-ietf-oauth-assertions
>
> On Thu, Feb 28, 2013 at 11:36 AM, John Bradley <ve7jtb@ve7jtb.com 
> <mailto:ve7jtb@ve7jtb.com>> wrote:
>
>     Yes the title likely adds to the confusion given that the bearer
>     tokens are not access tokens.
>
>     Things as separate from OAuth as the Firefox browerID spec use JWS
>     signed JWTs.
>
>     The bearer token profiles for OAuth 2 are for OAuth2.
>
>     The JSON Web Token (JWT)
>     <http://tools.ietf.org/html/draft-ietf-oauth-json-web-token-06> spec
>     did not start in OAuth and is not OAuth specific.
>
>     A JWT is:
>
>     JSON Web Token (JWT)  A string representing a set of claims as a JSON
>            object that is encoded in a JWS or JWE, enabling the claims to be
>            digitally signed or MACed and/or encrypted.
>
>
>     So OAuth or other profiles may define claims to go in a JWT, but
>     the JWT needs to itself only define the claims necessary for
>     security processing.
>
>     John B.
>     PS that was a soft ball If you hadn't responded I would have been
>     disappointed.  I din't pick the title for the bearer token profiles.
>
>
>     On 2013-02-28, at 10:12 AM, Phil Hunt <phil.hunt@oracle.com
>     <mailto:phil.hunt@oracle.com>> wrote:
>
>>              
>>
>>
>>       JSON Web Token (JWT) Bearer Token Profiles for OAuth 2.0
>>
>>
>>     Note the title says "for OAuth2"
>>
>>     Sorry. Couldn't resist.
>>
>>     Phil
>>
>>     Sent from my phone.
>>
>>     On 2013-02-28, at 9:40, John Bradley <ve7jtb@ve7jtb.com
>>     <mailto:ve7jtb@ve7jtb.com>> wrote:
>>
>>>     JWT is an assertion( I am probably going to regret using that
>>>     word).
>>>
>>>     It is used in openID connect for id_tokens, it is used in OAuth
>>>     for Assertion grant types and authentication of the client to
>>>     the token endpoint.
>>>     http://tools.ietf.org/html/draft-ietf-oauth-jwt-bearer-04
>>>
>>>
>>>       JSON Web Token (JWT) Bearer Token Profiles for OAuth 2.0
>>>
>>>
>>>     Dosen't define JWT's use for access tokens for the RS.
>>>
>>>     Bottom line JWT is for more than access tokens.
>>>
>>>     John B.
>>>
>>>     On 2013-02-28, at 9:28 AM, Phil Hunt <phil.hunt@oracle.com
>>>     <mailto:phil.hunt@oracle.com>> wrote:
>>>
>>>>     Are you saying jwt is not an access token type?
>>>>
>>>>     Phil
>>>>
>>>>     Sent from my phone.
>>>>
>>>>     On 2013-02-28, at 8:58, John Bradley <ve7jtb@ve7jtb.com
>>>>     <mailto:ve7jtb@ve7jtb.com>> wrote:
>>>>
>>>>>     Yes, defining scope in JWT is the wrong place.   JWT needs to
>>>>>     stick to the security claims needed to process JWT.
>>>>>
>>>>>     I also don't know how far you get requiring a specific
>>>>>     authorization format for JWT, some AS will wan to use a opaque
>>>>>     reference, some might want to use a user claim or role claim,
>>>>>     others may use scopes,  combining scopes and claims is also
>>>>>     possible.
>>>>>
>>>>>     Right now it is up to a AS RS pair to agree on how to
>>>>>     communicate authorization.   I don't want MAC to be more
>>>>>     restrictive than bearer when it comes to authorization between
>>>>>     AS and RS.
>>>>>
>>>>>     Hannes wanted to know why JWT didn't define scope.  The simple
>>>>>     answer is that it is out of scope for JWT itself.   It might
>>>>>     be defined in a OAuth access token profile for JWT but it
>>>>>     should not be specific to MAC.
>>>>>
>>>>>     John B.
>>>>>     On 2013-02-28, at 8:44 AM, Brian Campbell
>>>>>     <bcampbell@pingidentity.com
>>>>>     <mailto:bcampbell@pingidentity.com>> wrote:
>>>>>
>>>>>>     I think John's point was more that scope is something rather
>>>>>>     specific to an OAuth access token and, while JWT is can be
>>>>>>     used to represent an access token, it's not the only
>>>>>>     application of JWT. The 'standard' claims in JWT are those
>>>>>>     that are believed (right or wrong) to be widely applicable
>>>>>>     across different applications of JWT. One could argue about
>>>>>>     it but scope is probably not one of those.
>>>>>>
>>>>>>     It would probably make sense to try and build a profile of
>>>>>>     JWT specifically for OAuth access tokens (though I suspect
>>>>>>     there are some turtles and dragons in there), which might be
>>>>>>     the appropriate place to define/register a scope claim.
>>>>>>
>>>>>>
>>>>>>     On Thu, Feb 28, 2013 at 9:24 AM, Phil Hunt
>>>>>>     <phil.hunt@oracle.com <mailto:phil.hunt@oracle.com>> wrote:
>>>>>>
>>>>>>         Are you advocating TWO systems? That seems like a bad choice.
>>>>>>
>>>>>>         I would rather fix scope than go to a two system approach.
>>>>>>
>>>>>>         Phil
>>>>>>
>>>>>>         Sent from my phone.
>>>>>>
>>>>>>         On 2013-02-28, at 8:17, John Bradley <ve7jtb@ve7jtb.com
>>>>>>         <mailto:ve7jtb@ve7jtb.com>> wrote:
>>>>>>
>>>>>>         > While scope is one method that a AS could communicate
>>>>>>         authorization to a RS, it is not the only or perhaps even
>>>>>>         the most likely one.
>>>>>>         > Using scope requires a relatively tight binding between
>>>>>>         the RS and AS,  UMA uses a different mechanism that
>>>>>>         describes finer grained operations.
>>>>>>         > The AS may include roles, user, or other more abstract
>>>>>>         claims that the the client may (god help them) pass on to
>>>>>>         EXCML for processing.
>>>>>>         >
>>>>>>         > While having a scopes claim is possible, like any other
>>>>>>         claim it is not part of the JWT core security processing
>>>>>>         claims, and needs to be defined by extension.
>>>>>>         >
>>>>>>         > John B.
>>>>>>         > On 2013-02-28, at 2:29 AM, Hannes Tschofenig
>>>>>>         <hannes.tschofenig@gmx.net
>>>>>>         <mailto:hannes.tschofenig@gmx.net>> wrote:
>>>>>>         >
>>>>>>         >> Hi Mike,
>>>>>>         >>
>>>>>>         >> when I worked on the MAC specification I noticed that
>>>>>>         the JWT does not have a claim for the scope. I believe
>>>>>>         that this would be needed to allow the resource server to
>>>>>>         verify whether the scope the authorization server
>>>>>>         authorized is indeed what the client is asking for.
>>>>>>         >>
>>>>>>         >> Ciao
>>>>>>         >> Hannes
>>>>>>         >>
>>>>>>         >> _______________________________________________
>>>>>>         >> OAuth mailing list
>>>>>>         >> OAuth@ietf.org <mailto:OAuth@ietf.org>
>>>>>>         >> https://www.ietf.org/mailman/listinfo/oauth
>>>>>>         >
>>>>>>         > _______________________________________________
>>>>>>         > OAuth mailing list
>>>>>>         > OAuth@ietf.org <mailto:OAuth@ietf.org>
>>>>>>         > https://www.ietf.org/mailman/listinfo/oauth
>>>>>>         _______________________________________________
>>>>>>         OAuth mailing list
>>>>>>         OAuth@ietf.org <mailto:OAuth@ietf.org>
>>>>>>         https://www.ietf.org/mailman/listinfo/oauth
>>>>>>
>>>>>>
>>>>>
>>>
>
>
>
>
> _______________________________________________
> OAuth mailing list
> OAuth@ietf.org
> https://www.ietf.org/mailman/listinfo/oauth


--------------000007040907010705090907
Content-Type: text/html; charset="ISO-8859-1"
Content-Transfer-Encoding: 7bit

<html>
  <head>
    <meta content="text/html; charset=ISO-8859-1"
      http-equiv="Content-Type">
  </head>
  <body bgcolor="#FFFFFF" text="#000000">
    Brian, I think you're conflating two things (and John might be,
    too). On the one hand, we've got the JWT document, which talks about
    what goes into the token itself. This can be used as an assertion,
    as an access token, as a floor wax / dessert topping. JWT doesn't
    really care, and this is really only in the OAuth WG thanks to IETF
    politics. Then we have the assertion profiles which say how to use
    things like JWT to do specific things in OAuth, and these are what
    Brian's talking about below.<br>
    <br>
    Ultimately, this conversation is about the former and not the
    latter. That said, since an OAuth access token is a valid (and
    common) use of JWT, I think that having a common way to put things
    like "scope" and "client_id" and other OAuthy things into a JWT
    makes a whole heck of a lot of sense. Whether or not that is inside
    of the base JWT draft (since it's supposed to be for many use
    cases), I don't particularly care, and I can see the arguments from
    both sides.<br>
    <br>
    &nbsp;-- Justin<br>
    <br>
    <div class="moz-cite-prefix">On 02/28/2013 02:03 PM, Brian Campbell
      wrote:<br>
    </div>
    <blockquote
cite="mid:CA+k3eCSyE3cPMh17XuivbUZUtHY=RAtjV1UeCdW6gGFk+gv02A@mail.gmail.com"
      type="cite">
      <meta http-equiv="Content-Type" content="text/html;
        charset=ISO-8859-1">
      <div dir="ltr">
        <div>I'm not sure anyone really "picked" the titles for the
          bearer token profiles. They just kind of evolved. And evolved
          in funny ways especially when client authn to the AS was
          added. <br>
          <br>
        </div>
        <div>You won't hear me argue that the titles are "good" and this
          is not the first time there's been confusion about what they
          actually do. They define new grant types and new client
          authentication methods. They *do not* define an access token
          format or anything else about access tokens. JWT and SAML
          could be used for that but that's not what these drafts do. <br>
          <br>
        </div>
        <div>Suggestions for better title(s) would be more than welcome.<br>
        </div>
        <div>
          <div><br>
          </div>
          <div>Here's what they are now:<br>
          </div>
          <div><br>
            SAML 2.0 Bearer Assertion Profiles for OAuth 2.0<br>
            draft-ietf-oauth-saml2-bearer<br>
            <br>
            JSON Web Token (JWT) Bearer Token Profiles for OAuth 2.0<br>
            draft-ietf-oauth-jwt-bearer<br>
            <br>
            Assertion Framework for OAuth 2.0<br>
            draft-ietf-oauth-assertions<br>
            <div class="gmail_extra"><br>
              <div class="gmail_quote">On Thu, Feb 28, 2013 at 11:36 AM,
                John Bradley <span dir="ltr">&lt;<a
                    moz-do-not-send="true"
                    href="mailto:ve7jtb@ve7jtb.com" target="_blank">ve7jtb@ve7jtb.com</a>&gt;</span>
                wrote:<br>
                <blockquote class="gmail_quote" style="margin:0px 0px
                  0px 0.8ex;border-left:1px solid
                  rgb(204,204,204);padding-left:1ex">
                  <div style="word-wrap:break-word">Yes the title likely
                    adds to the confusion given that the bearer tokens
                    are not access tokens.
                    <div><br>
                    </div>
                    <div>Things as separate from OAuth as the Firefox
                      browerID spec use JWS signed JWTs. &nbsp;</div>
                    <div><br>
                    </div>
                    <div>The bearer token profiles for OAuth 2 are for
                      OAuth2.</div>
                    <div><br>
                    </div>
                    <div>The&nbsp;<a moz-do-not-send="true"
                        href="http://tools.ietf.org/html/draft-ietf-oauth-json-web-token-06"
                        target="_blank">JSON Web Token (JWT)</a>&nbsp;spec
                      did not start in OAuth and is not OAuth specific.</div>
                    <div><br>
                    </div>
                    <div>A JWT is:</div>
                    <div>
                      <pre style="font-size:1em;margin-top:0px;margin-bottom:0px">JSON Web Token (JWT)  A string representing a set of claims as a JSON
      object that is encoded in a JWS or JWE, enabling the claims to be
      digitally signed or MACed and/or encrypted.
</pre>
                      <div><br>
                      </div>
                      <div>So OAuth or other profiles may define claims
                        to go in a JWT, but the JWT needs to itself only
                        define the claims necessary for security
                        processing. &nbsp;</div>
                      <div><br>
                      </div>
                      <div>John B.</div>
                      <div>PS that was a soft ball If you hadn't
                        responded I would have been disappointed. &nbsp;I
                        din't pick the title for the bearer token
                        profiles.</div>
                      <div>
                        <div>
                          <div><br>
                          </div>
                          <div><br>
                          </div>
                          <div>
                            <div>On 2013-02-28, at 10:12 AM, Phil Hunt
                              &lt;<a moz-do-not-send="true"
                                href="mailto:phil.hunt@oracle.com"
                                target="_blank">phil.hunt@oracle.com</a>&gt;
                              wrote:</div>
                            <br>
                            <blockquote type="cite">
                              <div dir="auto">
                                <div>
                                  <pre style="margin-top:0px;margin-bottom:0px"><font face="Helvetica"><span style="white-space:normal;background-color:rgba(255,255,255,0)">        <span style="display:inline;font-weight:bold"><h1 style="display:inline">


JSON Web Token (JWT) Bearer Token Profiles for OAuth 2.0</h1></span></span></font></pre>
                                  <br>
                                  <span>Note the title says "for OAuth2"</span></div>
                                <div><span><br>
                                  </span></div>
                                <div><span>Sorry. Couldn't resist.&nbsp;</span></div>
                                <div><span><br>
                                  </span></div>
                                <div><span>Phil</span>
                                  <div><br>
                                  </div>
                                  <div>Sent from my phone.</div>
                                </div>
                                <div><br>
                                  On 2013-02-28, at 9:40, John Bradley
                                  &lt;<a moz-do-not-send="true"
                                    href="mailto:ve7jtb@ve7jtb.com"
                                    target="_blank">ve7jtb@ve7jtb.com</a>&gt;
                                  wrote:<br>
                                  <br>
                                </div>
                                <blockquote type="cite">JWT is an
                                  assertion( I am probably going to
                                  regret using that word).
                                  <div><br>
                                  </div>
                                  <div>It is used in openID connect for
                                    id_tokens, it is used in OAuth for
                                    Assertion grant types and
                                    authentication of the client to the
                                    token endpoint.</div>
                                  <div><a moz-do-not-send="true"
                                      href="http://tools.ietf.org/html/draft-ietf-oauth-jwt-bearer-04"
                                      target="_blank">http://tools.ietf.org/html/draft-ietf-oauth-jwt-bearer-04</a></div>
                                  <div><br>
                                  </div>
                                  <div>
                                    <pre style="font-size:1em;margin-top:0px;margin-bottom:0px">
<span style="line-height:0pt;display:inline;font-size:1em;font-weight:bold"><h1 style="line-height:0pt;display:inline;font-size:1em">JSON Web Token (JWT) Bearer Token Profiles for OAuth 2.0</h1></span></pre>
                                    <div><br>
                                    </div>
                                    <div>Dosen't define JWT's use for
                                      access tokens for the RS. &nbsp;&nbsp;</div>
                                    <div><br>
                                    </div>
                                    <div>Bottom line JWT is for more
                                      than access tokens.</div>
                                    <div><br>
                                    </div>
                                    <div>John B.</div>
                                    <div><br>
                                    </div>
                                    <div>
                                      <div>On 2013-02-28, at 9:28 AM,
                                        Phil Hunt &lt;<a
                                          moz-do-not-send="true"
                                          href="mailto:phil.hunt@oracle.com"
                                          target="_blank">phil.hunt@oracle.com</a>&gt;
                                        wrote:</div>
                                      <br>
                                      <blockquote type="cite">
                                        <div dir="auto">
                                          <div>Are you saying jwt is not
                                            an access token type?<br>
                                            <br>
                                            Phil
                                            <div><br>
                                            </div>
                                            <div>Sent from my phone.</div>
                                          </div>
                                          <div><br>
                                            On 2013-02-28, at 8:58, John
                                            Bradley &lt;<a
                                              moz-do-not-send="true"
                                              href="mailto:ve7jtb@ve7jtb.com"
                                              target="_blank">ve7jtb@ve7jtb.com</a>&gt;
                                            wrote:<br>
                                            <br>
                                          </div>
                                          <blockquote type="cite">Yes,
                                            defining scope in JWT is the
                                            wrong place. &nbsp; JWT needs to
                                            stick to the security claims
                                            needed to process JWT.
                                            <div><br>
                                            </div>
                                            <div>I also don't know how
                                              far you get requiring a
                                              specific authorization
                                              format for JWT, some AS
                                              will wan to use a opaque
                                              reference, some might want
                                              to use a user claim or
                                              role claim, others may use
                                              scopes, &nbsp;combining scopes
                                              and claims is also
                                              possible.</div>
                                            <div><br>
                                            </div>
                                            <div>Right now it is up to a
                                              AS RS pair to agree on how
                                              to communicate
                                              authorization. &nbsp; I don't
                                              want MAC to be more
                                              restrictive than bearer
                                              when it comes to
                                              authorization between AS
                                              and RS.<br>
                                              <div><br>
                                              </div>
                                              <div>Hannes wanted to know
                                                why JWT didn't define
                                                scope. &nbsp;The simple
                                                answer is that it is out
                                                of scope for JWT itself.
                                                &nbsp; It might be defined in
                                                a OAuth access token
                                                profile for JWT but it
                                                should not be specific
                                                to MAC.</div>
                                              <div><br>
                                              </div>
                                              <div>John B.</div>
                                              <div>
                                                <div>
                                                  <div>On 2013-02-28, at
                                                    8:44 AM, Brian
                                                    Campbell &lt;<a
                                                      moz-do-not-send="true"
href="mailto:bcampbell@pingidentity.com" target="_blank">bcampbell@pingidentity.com</a>&gt;
                                                    wrote:</div>
                                                  <br>
                                                  <blockquote
                                                    type="cite">
                                                    <div dir="ltr">
                                                      <div>I think
                                                        John's point was
                                                        more that scope
                                                        is something
                                                        rather specific
                                                        to an OAuth
                                                        access token
                                                        and, while JWT
                                                        is can be used
                                                        to represent an
                                                        access token,
                                                        it's not the
                                                        only application
                                                        of JWT. The
                                                        'standard'
                                                        claims in JWT
                                                        are those that
                                                        are believed
                                                        (right or wrong)
                                                        to be widely
                                                        applicable
                                                        across different
                                                        applications of
                                                        JWT. One could
                                                        argue about it
                                                        but scope is
                                                        probably not one
                                                        of those.<br>
                                                        <br>
                                                      </div>
                                                      It would probably
                                                      make sense to try
                                                      and build a
                                                      profile of JWT
                                                      specifically for
                                                      OAuth access
                                                      tokens (though I
                                                      suspect there are
                                                      some turtles and
                                                      dragons in there),
                                                      which might be the
                                                      appropriate place
                                                      to define/register
                                                      a scope claim.<br>
                                                    </div>
                                                    <div
                                                      class="gmail_extra"><br>
                                                      <br>
                                                      <div
                                                        class="gmail_quote">On
                                                        Thu, Feb 28,
                                                        2013 at 9:24 AM,
                                                        Phil Hunt <span
                                                          dir="ltr">&lt;<a
moz-do-not-send="true" href="mailto:phil.hunt@oracle.com"
                                                          target="_blank">phil.hunt@oracle.com</a>&gt;</span>
                                                        wrote:<br>
                                                        <blockquote
                                                          class="gmail_quote"
                                                          style="margin:0px
                                                          0px 0px
                                                          0.8ex;border-left:1px
                                                          solid
                                                          rgb(204,204,204);padding-left:1ex">Are
                                                          you advocating
                                                          TWO systems?
                                                          That seems
                                                          like a bad
                                                          choice.<br>
                                                          <br>
                                                          I would rather
                                                          fix scope than
                                                          go to a two
                                                          system
                                                          approach.<br>
                                                          <br>
                                                          Phil<br>
                                                          <br>
                                                          Sent from my
                                                          phone.<br>
                                                          <br>
                                                          On 2013-02-28,
                                                          at 8:17, John
                                                          Bradley &lt;<a
moz-do-not-send="true" href="mailto:ve7jtb@ve7jtb.com" target="_blank">ve7jtb@ve7jtb.com</a>&gt;
                                                          wrote:<br>
                                                          <br>
                                                          &gt; While
                                                          scope is one
                                                          method that a
                                                          AS could
                                                          communicate
                                                          authorization
                                                          to a RS, it is
                                                          not the only
                                                          or perhaps
                                                          even the most
                                                          likely one.<br>
                                                          &gt; Using
                                                          scope requires
                                                          a relatively
                                                          tight binding
                                                          between the RS
                                                          and AS, &nbsp;UMA
                                                          uses a
                                                          different
                                                          mechanism that
                                                          describes
                                                          finer grained
                                                          operations.<br>
                                                          &gt; The AS
                                                          may include
                                                          roles, user,
                                                          or other more
                                                          abstract
                                                          claims that
                                                          the the client
                                                          may (god help
                                                          them) pass on
                                                          to EXCML for
                                                          processing.<br>
                                                          &gt;<br>
                                                          &gt; While
                                                          having a
                                                          scopes claim
                                                          is possible,
                                                          like any other
                                                          claim it is
                                                          not part of
                                                          the JWT core
                                                          security
                                                          processing
                                                          claims, and
                                                          needs to be
                                                          defined by
                                                          extension.<br>
                                                          &gt;<br>
                                                          &gt; John B.<br>
                                                          &gt; On
                                                          2013-02-28, at
                                                          2:29 AM,
                                                          Hannes
                                                          Tschofenig
                                                          &lt;<a
                                                          moz-do-not-send="true"
href="mailto:hannes.tschofenig@gmx.net" target="_blank">hannes.tschofenig@gmx.net</a>&gt;
                                                          wrote:<br>
                                                          &gt;<br>
                                                          &gt;&gt; Hi
                                                          Mike,<br>
                                                          &gt;&gt;<br>
                                                          &gt;&gt; when
                                                          I worked on
                                                          the MAC
                                                          specification
                                                          I noticed that
                                                          the JWT does
                                                          not have a
                                                          claim for the
                                                          scope. I
                                                          believe that
                                                          this would be
                                                          needed to
                                                          allow the
                                                          resource
                                                          server to
                                                          verify whether
                                                          the scope the
                                                          authorization
                                                          server
                                                          authorized is
                                                          indeed what
                                                          the client is
                                                          asking for.<br>
                                                          &gt;&gt;<br>
                                                          &gt;&gt; Ciao<br>
                                                          &gt;&gt;
                                                          Hannes<br>
                                                          &gt;&gt;<br>
                                                          &gt;&gt;
                                                          _______________________________________________<br>
                                                          &gt;&gt; OAuth
                                                          mailing list<br>
                                                          &gt;&gt; <a
                                                          moz-do-not-send="true"
href="mailto:OAuth@ietf.org" target="_blank">OAuth@ietf.org</a><br>
                                                          &gt;&gt; <a
                                                          moz-do-not-send="true"
href="https://www.ietf.org/mailman/listinfo/oauth" target="_blank">https://www.ietf.org/mailman/listinfo/oauth</a><br>
                                                          &gt;<br>
                                                          &gt;
                                                          _______________________________________________<br>
                                                          &gt; OAuth
                                                          mailing list<br>
                                                          &gt; <a
                                                          moz-do-not-send="true"
href="mailto:OAuth@ietf.org" target="_blank">OAuth@ietf.org</a><br>
                                                          &gt; <a
                                                          moz-do-not-send="true"
href="https://www.ietf.org/mailman/listinfo/oauth" target="_blank">https://www.ietf.org/mailman/listinfo/oauth</a><br>
_______________________________________________<br>
                                                          OAuth mailing
                                                          list<br>
                                                          <a
                                                          moz-do-not-send="true"
href="mailto:OAuth@ietf.org" target="_blank">OAuth@ietf.org</a><br>
                                                          <a
                                                          moz-do-not-send="true"
href="https://www.ietf.org/mailman/listinfo/oauth" target="_blank">https://www.ietf.org/mailman/listinfo/oauth</a><br>
                                                        </blockquote>
                                                      </div>
                                                      <br>
                                                    </div>
                                                  </blockquote>
                                                </div>
                                                <br>
                                              </div>
                                            </div>
                                          </blockquote>
                                        </div>
                                      </blockquote>
                                    </div>
                                    <br>
                                  </div>
                                </blockquote>
                              </div>
                            </blockquote>
                          </div>
                          <br>
                        </div>
                      </div>
                    </div>
                  </div>
                </blockquote>
              </div>
              <br>
            </div>
          </div>
        </div>
      </div>
      <br>
      <fieldset class="mimeAttachmentHeader"></fieldset>
      <br>
      <pre wrap="">_______________________________________________
OAuth mailing list
<a class="moz-txt-link-abbreviated" href="mailto:OAuth@ietf.org">OAuth@ietf.org</a>
<a class="moz-txt-link-freetext" href="https://www.ietf.org/mailman/listinfo/oauth">https://www.ietf.org/mailman/listinfo/oauth</a>
</pre>
    </blockquote>
    <br>
  </body>
</html>

--------------000007040907010705090907--

From Adam.Lewis@motorolasolutions.com  Thu Feb 28 11:13:44 2013
Return-Path: <Adam.Lewis@motorolasolutions.com>
X-Original-To: oauth@ietfa.amsl.com
Delivered-To: oauth@ietfa.amsl.com
Received: from localhost (localhost [127.0.0.1]) by ietfa.amsl.com (Postfix) with ESMTP id DED4F21F8A85 for <oauth@ietfa.amsl.com>; Thu, 28 Feb 2013 11:13:43 -0800 (PST)
X-Virus-Scanned: amavisd-new at amsl.com
X-Spam-Flag: NO
X-Spam-Score: -0.466
X-Spam-Level: 
X-Spam-Status: No, score=-0.466 tagged_above=-999 required=5 tests=[BAYES_00=-2.599, HTML_MESSAGE=0.001, RCVD_IN_DNSWL_LOW=-1, UNRESOLVED_TEMPLATE=3.132]
Received: from mail.ietf.org ([64.170.98.30]) by localhost (ietfa.amsl.com [127.0.0.1]) (amavisd-new, port 10024) with ESMTP id KAbHOe557DZc for <oauth@ietfa.amsl.com>; Thu, 28 Feb 2013 11:13:38 -0800 (PST)
Received: from co1outboundpool.messaging.microsoft.com (co1ehsobe001.messaging.microsoft.com [216.32.180.184]) by ietfa.amsl.com (Postfix) with ESMTP id 82F9E21F8A8E for <oauth@ietf.org>; Thu, 28 Feb 2013 11:13:38 -0800 (PST)
Received: from mail182-co1-R.bigfish.com (10.243.78.232) by CO1EHSOBE014.bigfish.com (10.243.66.77) with Microsoft SMTP Server id 14.1.225.23; Thu, 28 Feb 2013 19:13:37 +0000
Received: from mail182-co1 (localhost [127.0.0.1])	by mail182-co1-R.bigfish.com (Postfix) with ESMTP id 0D57B880094	for <oauth@ietf.org>; Thu, 28 Feb 2013 19:13:37 +0000 (UTC)
X-Forefront-Antispam-Report: CIP:129.188.136.18; KIP:(null); UIP:(null); IPV:NLI; H:il06msg02.am.mot-solutions.com; RD:none; EFVD:NLI
X-SpamScore: -24
X-BigFish: VPS-24(zz98dI9371Ic89bh936eIc85dh1432Izz1f42h1ee6h1de0h1202h1e76h1d1ah1d2ahzz8275ch1033IL177df4h17326ah8275dh18c673h8275bhz2fh2a8h683h839hd25hf0ah1288h12a5h12bdh137ah1441h1504h1537h153bh15d0h162dh1631h1758h18e1h1946h19b5h19ceh1ad9h1155h)
Received-SPF: pass (mail182-co1: domain of motorolasolutions.com designates 129.188.136.18 as permitted sender) client-ip=129.188.136.18; envelope-from=Adam.Lewis@motorolasolutions.com; helo=il06msg02.am.mot-solutions.com ; olutions.com ; 
X-Forefront-Antispam-Report-Untrusted: CIP:157.56.237.133; KIP:(null); UIP:(null); (null); H:BY2PRD0411HT001.namprd04.prod.outlook.com; R:internal; EFV:INT
Received: from mail182-co1 (localhost.localdomain [127.0.0.1]) by mail182-co1 (MessageSwitch) id 1362078814896178_30950; Thu, 28 Feb 2013 19:13:34 +0000 (UTC)
Received: from CO1EHSMHS009.bigfish.com (unknown [10.243.78.230])	by mail182-co1.bigfish.com (Postfix) with ESMTP id D863080057	for <oauth@ietf.org>; Thu, 28 Feb 2013 19:13:34 +0000 (UTC)
Received: from il06msg02.am.mot-solutions.com (129.188.136.18) by CO1EHSMHS009.bigfish.com (10.243.66.19) with Microsoft SMTP Server (TLS) id 14.1.225.23; Thu, 28 Feb 2013 19:13:31 +0000
Received: from il06msg02.am.mot-solutions.com (il06vts03.mot.com [129.188.137.143])	by il06msg02.am.mot-solutions.com (8.14.3/8.14.3) with ESMTP id r1SJDUQq002243	for <oauth@ietf.org>; Thu, 28 Feb 2013 14:13:30 -0500 (EST)
Received: from va3outboundpool.messaging.microsoft.com (va3ehsobe005.messaging.microsoft.com [216.32.180.31])	by il06msg02.am.mot-solutions.com (8.14.3/8.14.3) with ESMTP id r1SJDTD2002237 (version=TLSv1/SSLv3 cipher=AES128-SHA bits=128 verify=FAIL)	for <oauth@ietf.org>; Thu, 28 Feb 2013 14:13:30 -0500 (EST)
Received: from mail72-va3-R.bigfish.com (10.7.14.233) by VA3EHSOBE005.bigfish.com (10.7.40.25) with Microsoft SMTP Server id 14.1.225.23; Thu, 28 Feb 2013 19:13:29 +0000
Received: from mail72-va3 (localhost [127.0.0.1])	by mail72-va3-R.bigfish.com (Postfix) with ESMTP id A82BDC02AC	for <oauth@ietf.org.FOPE.CONNECTOR.OVERRIDE>; Thu, 28 Feb 2013 19:13:29 +0000 (UTC)
Received: from mail72-va3 (localhost.localdomain [127.0.0.1]) by mail72-va3 (MessageSwitch) id 1362078807355111_2387; Thu, 28 Feb 2013 19:13:27 +0000 (UTC)
Received: from VA3EHSMHS002.bigfish.com (unknown [10.7.14.254])	by mail72-va3.bigfish.com (Postfix) with ESMTP id 4D3E6A028D; Thu, 28 Feb 2013 19:13:27 +0000 (UTC)
Received: from BY2PRD0411HT001.namprd04.prod.outlook.com (157.56.237.133) by VA3EHSMHS002.bigfish.com (10.7.99.12) with Microsoft SMTP Server (TLS) id 14.1.225.23; Thu, 28 Feb 2013 19:13:23 +0000
Received: from BY2PRD0411MB441.namprd04.prod.outlook.com ([169.254.5.225]) by BY2PRD0411HT001.namprd04.prod.outlook.com ([10.255.128.36]) with mapi id 14.16.0275.006; Thu, 28 Feb 2013 19:13:20 +0000
From: Lewis Adam-CAL022 <Adam.Lewis@motorolasolutions.com>
To: Brian Campbell <bcampbell@pingidentity.com>, John Bradley <ve7jtb@ve7jtb.com>
Thread-Topic: [OAUTH-WG] JWT - scope claim missing
Thread-Index: AQHOFZ6Qe5ExGqoPnkOeJlU0r70rz5iPcwoAgAAB5gCAAAWJgIAABAMAgAAIM4CAAAN2AIAACPeAgAAGkICAAAeWAIAAAR2A
Date: Thu, 28 Feb 2013 19:13:20 +0000
Message-ID: <59E470B10C4630419ED717AC79FCF9A948D58BEE@BY2PRD0411MB441.namprd04.prod.outlook.com>
References: <0EC2404F-E3C5-4AD1-88B4-E74AA0394DD9@gmx.net> <C75E4871-E907-4EF7-BAF0-9D1A172D581B@ve7jtb.com> <CA6A6425-D0CE-469F-B51E-9F296DA8041C@oracle.com> <CA+k3eCREgN+6z+U=jjJcPo0nZVR0GWn5zXeecZRO+rg=xd-gZg@mail.gmail.com> <A2375FE9-946F-46B3-9356-0709DD56BD4A@ve7jtb.com> <48FD87D1-4DF4-4289-99B7-40A515F31890@oracle.com> <3E472720-31A4-40A0-AAA4-402CF850831A@ve7jtb.com> <7127843B-D7B0-4AB6-87F1-1604D1EFFA79@oracle.com> <50DA292F-32F0-4266-8401-006AD837B775@ve7jtb.com> <CA+k3eCSyE3cPMh17XuivbUZUtHY=RAtjV1UeCdW6gGFk+gv02A@mail.gmail.com>
In-Reply-To: <CA+k3eCSyE3cPMh17XuivbUZUtHY=RAtjV1UeCdW6gGFk+gv02A@mail.gmail.com>
Accept-Language: en-US
Content-Language: en-US
X-MS-Has-Attach: 
X-MS-TNEF-Correlator: 
x-originating-ip: [184.78.105.93]
Content-Type: multipart/alternative; boundary="_000_59E470B10C4630419ED717AC79FCF9A948D58BEEBY2PRD0411MB441_"
MIME-Version: 1.0
X-FOPE-CONNECTOR: Id%0$Dn%*$RO%0$TLS%0$FQDN%$TlsDn%
X-FOPE-CONNECTOR: Id%1294$Dn%PINGIDENTITY.COM$RO%2$TLS%3$FQDN%msgate.mot-solutions.com$TlsDn%
X-FOPE-CONNECTOR: Id%1294$Dn%VE7JTB.COM$RO%2$TLS%3$FQDN%msgate.mot-solutions.com$TlsDn%
X-FOPE-CONNECTOR: Id%1294$Dn%IETF.ORG$RO%2$TLS%3$FQDN%msgate.mot-solutions.com$TlsDn%
X-CFilter-Loop: Reflected
X-OriginatorOrg: motorolasolutions.com
Cc: "oauth@ietf.org WG" <oauth@ietf.org>
Subject: Re: [OAUTH-WG] JWT - scope claim missing
X-BeenThere: oauth@ietf.org
X-Mailman-Version: 2.1.12
Precedence: list
List-Id: OAUTH WG <oauth.ietf.org>
List-Unsubscribe: <https://www.ietf.org/mailman/options/oauth>, <mailto:oauth-request@ietf.org?subject=unsubscribe>
List-Archive: <http://www.ietf.org/mail-archive/web/oauth>
List-Post: <mailto:oauth@ietf.org>
List-Help: <mailto:oauth-request@ietf.org?subject=help>
List-Subscribe: <https://www.ietf.org/mailman/listinfo/oauth>, <mailto:oauth-request@ietf.org?subject=subscribe>
X-List-Received-Date: Thu, 28 Feb 2013 19:13:44 -0000

--_000_59E470B10C4630419ED717AC79FCF9A948D58BEEBY2PRD0411MB441_
Content-Type: text/plain; charset="iso-8859-1"
Content-Transfer-Encoding: quoted-printable

Hi Brian, a few thoughts from somebody outside of the WG ...

As a newcomer to OAuth last year, I was initially confused by the titles.  =
It was confusing because we have SAML bearer *assertions* and JWT bearer *t=
okens* ... and as John just (begrudgingly) stated in this thread, the JWT i=
s being used as an assertion in this profile (and in OIDC).  I think it wil=
l be difficult to find a good name for these profiles since they do two ent=
irely different things (e.g. define a new grant type and define a new metho=
d of client authentication).  One could argue that as long as the WG is at =
it, then why not add a third section to the JWT profile, which talks about =
usage of JWT-structured bearer access tokens: it would not be any less rela=
ted than the other two focuses of the doc.  Then the document could be call=
ed something simple like "profiles of JWT usage in OAuth" or something like=
 that.

On one hand, it is probably na=EFve to think that an access token can be st=
andardized in a profile given how many have already been released into the =
wild, but on the other hand, a WG profile of a JWT-structured access token =
could lend itself to interoperability, where AS implementations can adverti=
se conformance to the profile and who knows ... maybe the RS's of the futur=
e will be good with this.

adam

From: oauth-bounces@ietf.org [mailto:oauth-bounces@ietf.org] On Behalf Of B=
rian Campbell
Sent: Thursday, February 28, 2013 1:03 PM
To: John Bradley
Cc: oauth@ietf.org WG
Subject: Re: [OAUTH-WG] JWT - scope claim missing

I'm not sure anyone really "picked" the titles for the bearer token profile=
s. They just kind of evolved. And evolved in funny ways especially when cli=
ent authn to the AS was added.
You won't hear me argue that the titles are "good" and this is not the firs=
t time there's been confusion about what they actually do. They define new =
grant types and new client authentication methods. They *do not* define an =
access token format or anything else about access tokens. JWT and SAML coul=
d be used for that but that's not what these drafts do.
Suggestions for better title(s) would be more than welcome.

Here's what they are now:

SAML 2.0 Bearer Assertion Profiles for OAuth 2.0
draft-ietf-oauth-saml2-bearer

JSON Web Token (JWT) Bearer Token Profiles for OAuth 2.0
draft-ietf-oauth-jwt-bearer

Assertion Framework for OAuth 2.0
draft-ietf-oauth-assertions

On Thu, Feb 28, 2013 at 11:36 AM, John Bradley <ve7jtb@ve7jtb.com<mailto:ve=
7jtb@ve7jtb.com>> wrote:
Yes the title likely adds to the confusion given that the bearer tokens are=
 not access tokens.

Things as separate from OAuth as the Firefox browerID spec use JWS signed J=
WTs.

The bearer token profiles for OAuth 2 are for OAuth2.

The JSON Web Token (JWT)<http://tools.ietf.org/html/draft-ietf-oauth-json-w=
eb-token-06> spec did not start in OAuth and is not OAuth specific.

A JWT is:

JSON Web Token (JWT)  A string representing a set of claims as a JSON

      object that is encoded in a JWS or JWE, enabling the claims to be

      digitally signed or MACed and/or encrypted.

So OAuth or other profiles may define claims to go in a JWT, but the JWT ne=
eds to itself only define the claims necessary for security processing.

John B.
PS that was a soft ball If you hadn't responded I would have been disappoin=
ted.  I din't pick the title for the bearer token profiles.


On 2013-02-28, at 10:12 AM, Phil Hunt <phil.hunt@oracle.com<mailto:phil.hun=
t@oracle.com>> wrote:


JSON Web Token (JWT) Bearer Token Profiles for OAuth 2.0

Note the title says "for OAuth2"

Sorry. Couldn't resist.

Phil

Sent from my phone.

On 2013-02-28, at 9:40, John Bradley <ve7jtb@ve7jtb.com<mailto:ve7jtb@ve7jt=
b.com>> wrote:
JWT is an assertion( I am probably going to regret using that word).

It is used in openID connect for id_tokens, it is used in OAuth for Asserti=
on grant types and authentication of the client to the token endpoint.
http://tools.ietf.org/html/draft-ietf-oauth-jwt-bearer-04






JSON Web Token (JWT) Bearer Token Profiles for OAuth 2.0

Dosen't define JWT's use for access tokens for the RS.

Bottom line JWT is for more than access tokens.

John B.

On 2013-02-28, at 9:28 AM, Phil Hunt <phil.hunt@oracle.com<mailto:phil.hunt=
@oracle.com>> wrote:


Are you saying jwt is not an access token type?

Phil

Sent from my phone.

On 2013-02-28, at 8:58, John Bradley <ve7jtb@ve7jtb.com<mailto:ve7jtb@ve7jt=
b.com>> wrote:
Yes, defining scope in JWT is the wrong place.   JWT needs to stick to the =
security claims needed to process JWT.

I also don't know how far you get requiring a specific authorization format=
 for JWT, some AS will wan to use a opaque reference, some might want to us=
e a user claim or role claim, others may use scopes,  combining scopes and =
claims is also possible.

Right now it is up to a AS RS pair to agree on how to communicate authoriza=
tion.   I don't want MAC to be more restrictive than bearer when it comes t=
o authorization between AS and RS.

Hannes wanted to know why JWT didn't define scope.  The simple answer is th=
at it is out of scope for JWT itself.   It might be defined in a OAuth acce=
ss token profile for JWT but it should not be specific to MAC.

John B.
On 2013-02-28, at 8:44 AM, Brian Campbell <bcampbell@pingidentity.com<mailt=
o:bcampbell@pingidentity.com>> wrote:


I think John's point was more that scope is something rather specific to an=
 OAuth access token and, while JWT is can be used to represent an access to=
ken, it's not the only application of JWT. The 'standard' claims in JWT are=
 those that are believed (right or wrong) to be widely applicable across di=
fferent applications of JWT. One could argue about it but scope is probably=
 not one of those.
It would probably make sense to try and build a profile of JWT specifically=
 for OAuth access tokens (though I suspect there are some turtles and drago=
ns in there), which might be the appropriate place to define/register a sco=
pe claim.

On Thu, Feb 28, 2013 at 9:24 AM, Phil Hunt <phil.hunt@oracle.com<mailto:phi=
l.hunt@oracle.com>> wrote:
Are you advocating TWO systems? That seems like a bad choice.

I would rather fix scope than go to a two system approach.

Phil

Sent from my phone.

On 2013-02-28, at 8:17, John Bradley <ve7jtb@ve7jtb.com<mailto:ve7jtb@ve7jt=
b.com>> wrote:

> While scope is one method that a AS could communicate authorization to a =
RS, it is not the only or perhaps even the most likely one.
> Using scope requires a relatively tight binding between the RS and AS,  U=
MA uses a different mechanism that describes finer grained operations.
> The AS may include roles, user, or other more abstract claims that the th=
e client may (god help them) pass on to EXCML for processing.
>
> While having a scopes claim is possible, like any other claim it is not p=
art of the JWT core security processing claims, and needs to be defined by =
extension.
>
> John B.
> On 2013-02-28, at 2:29 AM, Hannes Tschofenig <hannes.tschofenig@gmx.net<m=
ailto:hannes.tschofenig@gmx.net>> wrote:
>
>> Hi Mike,
>>
>> when I worked on the MAC specification I noticed that the JWT does not h=
ave a claim for the scope. I believe that this would be needed to allow the=
 resource server to verify whether the scope the authorization server autho=
rized is indeed what the client is asking for.
>>
>> Ciao
>> Hannes
>>
>> _______________________________________________
>> OAuth mailing list
>> OAuth@ietf.org<mailto:OAuth@ietf.org>
>> https://www.ietf.org/mailman/listinfo/oauth
>
> _______________________________________________
> OAuth mailing list
> OAuth@ietf.org<mailto:OAuth@ietf.org>
> https://www.ietf.org/mailman/listinfo/oauth
_______________________________________________
OAuth mailing list
OAuth@ietf.org<mailto:OAuth@ietf.org>
https://www.ietf.org/mailman/listinfo/oauth






--_000_59E470B10C4630419ED717AC79FCF9A948D58BEEBY2PRD0411MB441_
Content-Type: text/html; charset="iso-8859-1"
Content-Transfer-Encoding: quoted-printable

<html xmlns:v=3D"urn:schemas-microsoft-com:vml" xmlns:o=3D"urn:schemas-micr=
osoft-com:office:office" xmlns:w=3D"urn:schemas-microsoft-com:office:word" =
xmlns:x=3D"urn:schemas-microsoft-com:office:excel" xmlns:p=3D"urn:schemas-m=
icrosoft-com:office:powerpoint" xmlns:a=3D"urn:schemas-microsoft-com:office=
:access" xmlns:dt=3D"uuid:C2F41010-65B3-11d1-A29F-00AA00C14882" xmlns:s=3D"=
uuid:BDC6E3F0-6DA3-11d1-A2A3-00AA00C14882" xmlns:rs=3D"urn:schemas-microsof=
t-com:rowset" xmlns:z=3D"#RowsetSchema" xmlns:b=3D"urn:schemas-microsoft-co=
m:office:publisher" xmlns:ss=3D"urn:schemas-microsoft-com:office:spreadshee=
t" xmlns:c=3D"urn:schemas-microsoft-com:office:component:spreadsheet" xmlns=
:odc=3D"urn:schemas-microsoft-com:office:odc" xmlns:oa=3D"urn:schemas-micro=
soft-com:office:activation" xmlns:html=3D"http://www.w3.org/TR/REC-html40" =
xmlns:q=3D"http://schemas.xmlsoap.org/soap/envelope/" xmlns:rtc=3D"http://m=
icrosoft.com/officenet/conferencing" xmlns:D=3D"DAV:" xmlns:Repl=3D"http://=
schemas.microsoft.com/repl/" xmlns:mt=3D"http://schemas.microsoft.com/share=
point/soap/meetings/" xmlns:x2=3D"http://schemas.microsoft.com/office/excel=
/2003/xml" xmlns:ppda=3D"http://www.passport.com/NameSpace.xsd" xmlns:ois=
=3D"http://schemas.microsoft.com/sharepoint/soap/ois/" xmlns:dir=3D"http://=
schemas.microsoft.com/sharepoint/soap/directory/" xmlns:ds=3D"http://www.w3=
.org/2000/09/xmldsig#" xmlns:dsp=3D"http://schemas.microsoft.com/sharepoint=
/dsp" xmlns:udc=3D"http://schemas.microsoft.com/data/udc" xmlns:xsd=3D"http=
://www.w3.org/2001/XMLSchema" xmlns:sub=3D"http://schemas.microsoft.com/sha=
repoint/soap/2002/1/alerts/" xmlns:ec=3D"http://www.w3.org/2001/04/xmlenc#"=
 xmlns:sp=3D"http://schemas.microsoft.com/sharepoint/" xmlns:sps=3D"http://=
schemas.microsoft.com/sharepoint/soap/" xmlns:xsi=3D"http://www.w3.org/2001=
/XMLSchema-instance" xmlns:udcs=3D"http://schemas.microsoft.com/data/udc/so=
ap" xmlns:udcxf=3D"http://schemas.microsoft.com/data/udc/xmlfile" xmlns:udc=
p2p=3D"http://schemas.microsoft.com/data/udc/parttopart" xmlns:wf=3D"http:/=
/schemas.microsoft.com/sharepoint/soap/workflow/" xmlns:dsss=3D"http://sche=
mas.microsoft.com/office/2006/digsig-setup" xmlns:dssi=3D"http://schemas.mi=
crosoft.com/office/2006/digsig" xmlns:mdssi=3D"http://schemas.openxmlformat=
s.org/package/2006/digital-signature" xmlns:mver=3D"http://schemas.openxmlf=
ormats.org/markup-compatibility/2006" xmlns:m=3D"http://schemas.microsoft.c=
om/office/2004/12/omml" xmlns:mrels=3D"http://schemas.openxmlformats.org/pa=
ckage/2006/relationships" xmlns:spwp=3D"http://microsoft.com/sharepoint/web=
partpages" xmlns:ex12t=3D"http://schemas.microsoft.com/exchange/services/20=
06/types" xmlns:ex12m=3D"http://schemas.microsoft.com/exchange/services/200=
6/messages" xmlns:pptsl=3D"http://schemas.microsoft.com/sharepoint/soap/Sli=
deLibrary/" xmlns:spsl=3D"http://microsoft.com/webservices/SharePointPortal=
Server/PublishedLinksService" xmlns:Z=3D"urn:schemas-microsoft-com:" xmlns:=
st=3D"&#1;" xmlns=3D"http://www.w3.org/TR/REC-html40">
<head>
<meta http-equiv=3D"Content-Type" content=3D"text/html; charset=3Diso-8859-=
1">
<meta name=3D"Generator" content=3D"Microsoft Word 12 (filtered medium)">
<style><!--
/* Font Definitions */
@font-face
	{font-family:Helvetica;
	panose-1:2 11 6 4 2 2 2 2 2 4;}
@font-face
	{font-family:Helvetica;
	panose-1:2 11 6 4 2 2 2 2 2 4;}
@font-face
	{font-family:Calibri;
	panose-1:2 15 5 2 2 2 4 3 2 4;}
@font-face
	{font-family:Tahoma;
	panose-1:2 11 6 4 3 5 4 4 2 4;}
@font-face
	{font-family:Consolas;
	panose-1:2 11 6 9 2 2 4 3 2 4;}
@font-face
	{font-family:"Book Antiqua";
	panose-1:2 4 6 2 5 3 5 3 3 4;}
/* Style Definitions */
p.MsoNormal, li.MsoNormal, div.MsoNormal
	{margin:0in;
	margin-bottom:.0001pt;
	font-size:12.0pt;
	font-family:"Times New Roman","serif";}
h1
	{mso-style-priority:9;
	mso-style-link:"Heading 1 Char";
	mso-margin-top-alt:auto;
	margin-right:0in;
	mso-margin-bottom-alt:auto;
	margin-left:0in;
	font-size:24.0pt;
	font-family:"Times New Roman","serif";}
a:link, span.MsoHyperlink
	{mso-style-priority:99;
	color:blue;
	text-decoration:underline;}
a:visited, span.MsoHyperlinkFollowed
	{mso-style-priority:99;
	color:purple;
	text-decoration:underline;}
pre
	{mso-style-priority:99;
	mso-style-link:"HTML Preformatted Char";
	margin:0in;
	margin-bottom:.0001pt;
	font-size:10.0pt;
	font-family:"Courier New";}
span.HTMLPreformattedChar
	{mso-style-name:"HTML Preformatted Char";
	mso-style-priority:99;
	mso-style-link:"HTML Preformatted";
	font-family:Consolas;}
span.Heading1Char
	{mso-style-name:"Heading 1 Char";
	mso-style-priority:9;
	mso-style-link:"Heading 1";
	font-family:"Cambria","serif";
	color:#365F91;
	font-weight:bold;}
span.EmailStyle20
	{mso-style-type:personal-reply;
	font-family:"Book Antiqua","serif";
	color:olive;
	font-weight:normal;
	font-style:normal;
	text-decoration:none none;}
.MsoChpDefault
	{mso-style-type:export-only;}
@page WordSection1
	{size:8.5in 11.0in;
	margin:1.0in 1.0in 1.0in 1.0in;}
div.WordSection1
	{page:WordSection1;}
--></style><!--[if gte mso 9]><xml>
<o:shapedefaults v:ext=3D"edit" spidmax=3D"1026" />
</xml><![endif]--><!--[if gte mso 9]><xml>
<o:shapelayout v:ext=3D"edit">
<o:idmap v:ext=3D"edit" data=3D"1" />
</o:shapelayout></xml><![endif]-->
</head>
<body lang=3D"EN-US" link=3D"blue" vlink=3D"purple">
<div class=3D"WordSection1">
<p class=3D"MsoNormal"><span style=3D"font-size:10.5pt;font-family:&quot;Bo=
ok Antiqua&quot;,&quot;serif&quot;;color:olive">Hi Brian, a few thoughts fr=
om somebody outside of the WG &#8230;
<o:p></o:p></span></p>
<p class=3D"MsoNormal"><span style=3D"font-size:10.5pt;font-family:&quot;Bo=
ok Antiqua&quot;,&quot;serif&quot;;color:olive"><o:p>&nbsp;</o:p></span></p=
>
<p class=3D"MsoNormal"><span style=3D"font-size:10.5pt;font-family:&quot;Bo=
ok Antiqua&quot;,&quot;serif&quot;;color:olive">As a newcomer to OAuth last=
 year, I was initially confused by the titles.&nbsp; It was confusing becau=
se we have SAML bearer *<b>assertions</b>* and JWT bearer *<b>tokens</b>*
 &#8230; and as John just (begrudgingly) stated in this thread, the JWT is =
being used as an assertion in this profile (and in OIDC).&nbsp; I think it =
will be difficult to find a good name for these profiles since they do two =
entirely different things (e.g. define a new
 grant type and define a new method of client authentication).&nbsp; One co=
uld argue that as long as the WG is at it, then why not add a third section=
 to the JWT profile, which talks about usage of JWT-structured bearer acces=
s tokens: it would not be any less related
 than the other two focuses of the doc.&nbsp; Then the document could be ca=
lled something simple like &#8220;profiles of JWT usage in OAuth&#8221; or =
something like that.&nbsp;
<o:p></o:p></span></p>
<p class=3D"MsoNormal"><span style=3D"font-size:10.5pt;font-family:&quot;Bo=
ok Antiqua&quot;,&quot;serif&quot;;color:olive"><o:p>&nbsp;</o:p></span></p=
>
<p class=3D"MsoNormal"><span style=3D"font-size:10.5pt;font-family:&quot;Bo=
ok Antiqua&quot;,&quot;serif&quot;;color:olive">On one hand, it is probably=
 na=EFve to think that an access token can be standardized in a profile giv=
en how many have already been released into the wild, but
 on the other hand, a WG profile of a JWT-structured access token could len=
d itself to interoperability, where AS implementations can advertise confor=
mance to the profile and who knows &#8230; maybe the RS&#8217;s of the futu=
re will be good with this.&nbsp;
<o:p></o:p></span></p>
<p class=3D"MsoNormal"><span style=3D"font-size:10.5pt;font-family:&quot;Bo=
ok Antiqua&quot;,&quot;serif&quot;;color:olive"><o:p>&nbsp;</o:p></span></p=
>
<p class=3D"MsoNormal"><span style=3D"font-size:10.5pt;font-family:&quot;Bo=
ok Antiqua&quot;,&quot;serif&quot;;color:olive">adam<o:p></o:p></span></p>
<p class=3D"MsoNormal"><span style=3D"font-size:10.5pt;font-family:&quot;Bo=
ok Antiqua&quot;,&quot;serif&quot;;color:olive"><o:p>&nbsp;</o:p></span></p=
>
<div style=3D"border:none;border-top:solid #B5C4DF 1.0pt;padding:3.0pt 0in =
0in 0in">
<p class=3D"MsoNormal"><b><span style=3D"font-size:10.0pt;font-family:&quot=
;Tahoma&quot;,&quot;sans-serif&quot;">From:</span></b><span style=3D"font-s=
ize:10.0pt;font-family:&quot;Tahoma&quot;,&quot;sans-serif&quot;"> oauth-bo=
unces@ietf.org [mailto:oauth-bounces@ietf.org]
<b>On Behalf Of </b>Brian Campbell<br>
<b>Sent:</b> Thursday, February 28, 2013 1:03 PM<br>
<b>To:</b> John Bradley<br>
<b>Cc:</b> oauth@ietf.org WG<br>
<b>Subject:</b> Re: [OAUTH-WG] JWT - scope claim missing<o:p></o:p></span><=
/p>
</div>
<p class=3D"MsoNormal"><o:p>&nbsp;</o:p></p>
<div>
<div>
<p class=3D"MsoNormal" style=3D"margin-bottom:12.0pt">I'm not sure anyone r=
eally &quot;picked&quot; the titles for the bearer token profiles. They jus=
t kind of evolved. And evolved in funny ways especially when client authn t=
o the AS was added.
<o:p></o:p></p>
</div>
<div>
<p class=3D"MsoNormal" style=3D"margin-bottom:12.0pt">You won't hear me arg=
ue that the titles are &quot;good&quot; and this is not the first time ther=
e's been confusion about what they actually do. They define new grant types=
 and new client authentication methods. They *do
 not* define an access token format or anything else about access tokens. J=
WT and SAML could be used for that but that's not what these drafts do.
<o:p></o:p></p>
</div>
<div>
<p class=3D"MsoNormal">Suggestions for better title(s) would be more than w=
elcome.<o:p></o:p></p>
</div>
<div>
<div>
<p class=3D"MsoNormal"><o:p>&nbsp;</o:p></p>
</div>
<div>
<p class=3D"MsoNormal">Here's what they are now:<o:p></o:p></p>
</div>
<div>
<p class=3D"MsoNormal"><br>
SAML 2.0 Bearer Assertion Profiles for OAuth 2.0<br>
draft-ietf-oauth-saml2-bearer<br>
<br>
JSON Web Token (JWT) Bearer Token Profiles for OAuth 2.0<br>
draft-ietf-oauth-jwt-bearer<br>
<br>
Assertion Framework for OAuth 2.0<br>
draft-ietf-oauth-assertions<o:p></o:p></p>
<div>
<p class=3D"MsoNormal"><o:p>&nbsp;</o:p></p>
<div>
<p class=3D"MsoNormal">On Thu, Feb 28, 2013 at 11:36 AM, John Bradley &lt;<=
a href=3D"mailto:ve7jtb@ve7jtb.com" target=3D"_blank">ve7jtb@ve7jtb.com</a>=
&gt; wrote:<o:p></o:p></p>
<div>
<p class=3D"MsoNormal">Yes the title likely adds to the confusion given tha=
t the bearer tokens are not access tokens.<o:p></o:p></p>
<div>
<p class=3D"MsoNormal"><o:p>&nbsp;</o:p></p>
</div>
<div>
<p class=3D"MsoNormal">Things as separate from OAuth as the Firefox browerI=
D spec use JWS signed JWTs. &nbsp;<o:p></o:p></p>
</div>
<div>
<p class=3D"MsoNormal"><o:p>&nbsp;</o:p></p>
</div>
<div>
<p class=3D"MsoNormal">The bearer token profiles for OAuth 2 are for OAuth2=
.<o:p></o:p></p>
</div>
<div>
<p class=3D"MsoNormal"><o:p>&nbsp;</o:p></p>
</div>
<div>
<p class=3D"MsoNormal">The&nbsp;<a href=3D"http://tools.ietf.org/html/draft=
-ietf-oauth-json-web-token-06" target=3D"_blank">JSON Web Token (JWT)</a>&n=
bsp;spec did not start in OAuth and is not OAuth specific.<o:p></o:p></p>
</div>
<div>
<p class=3D"MsoNormal"><o:p>&nbsp;</o:p></p>
</div>
<div>
<p class=3D"MsoNormal">A JWT is:<o:p></o:p></p>
</div>
<div>
<pre><span style=3D"font-size:12.0pt">JSON Web Token (JWT)&nbsp; A string r=
epresenting a set of claims as a JSON<o:p></o:p></span></pre>
<pre><span style=3D"font-size:12.0pt">&nbsp;&nbsp;&nbsp;&nbsp;&nbsp; object=
 that is encoded in a JWS or JWE, enabling the claims to be<o:p></o:p></spa=
n></pre>
<pre><span style=3D"font-size:12.0pt">&nbsp;&nbsp;&nbsp;&nbsp;&nbsp; digita=
lly signed or MACed and/or encrypted.<o:p></o:p></span></pre>
<div>
<p class=3D"MsoNormal"><o:p>&nbsp;</o:p></p>
</div>
<div>
<p class=3D"MsoNormal">So OAuth or other profiles may define claims to go i=
n a JWT, but the JWT needs to itself only define the claims necessary for s=
ecurity processing. &nbsp;<o:p></o:p></p>
</div>
<div>
<p class=3D"MsoNormal"><o:p>&nbsp;</o:p></p>
</div>
<div>
<p class=3D"MsoNormal">John B.<o:p></o:p></p>
</div>
<div>
<p class=3D"MsoNormal">PS that was a soft ball If you hadn't responded I wo=
uld have been disappointed. &nbsp;I din't pick the title for the bearer tok=
en profiles.<o:p></o:p></p>
</div>
<div>
<div>
<div>
<p class=3D"MsoNormal"><o:p>&nbsp;</o:p></p>
</div>
<div>
<p class=3D"MsoNormal"><o:p>&nbsp;</o:p></p>
</div>
<div>
<div>
<p class=3D"MsoNormal">On 2013-02-28, at 10:12 AM, Phil Hunt &lt;<a href=3D=
"mailto:phil.hunt@oracle.com" target=3D"_blank">phil.hunt@oracle.com</a>&gt=
; wrote:<o:p></o:p></p>
</div>
<p class=3D"MsoNormal"><br>
<br>
<o:p></o:p></p>
<div>
<div>
<h1><span style=3D"font-family:&quot;Helvetica&quot;,&quot;sans-serif&quot;=
">JSON Web Token (JWT) Bearer Token Profiles for OAuth 2.0<o:p></o:p></span=
></h1>
<p class=3D"MsoNormal"><br>
Note the title says &quot;for OAuth2&quot;<o:p></o:p></p>
</div>
<div>
<p class=3D"MsoNormal"><o:p>&nbsp;</o:p></p>
</div>
<div>
<p class=3D"MsoNormal">Sorry. Couldn't resist.&nbsp;<o:p></o:p></p>
</div>
<div>
<p class=3D"MsoNormal"><o:p>&nbsp;</o:p></p>
</div>
<div>
<p class=3D"MsoNormal">Phil<o:p></o:p></p>
<div>
<p class=3D"MsoNormal"><o:p>&nbsp;</o:p></p>
</div>
<div>
<p class=3D"MsoNormal">Sent from my phone.<o:p></o:p></p>
</div>
</div>
<div>
<p class=3D"MsoNormal" style=3D"margin-bottom:12.0pt"><br>
On 2013-02-28, at 9:40, John Bradley &lt;<a href=3D"mailto:ve7jtb@ve7jtb.co=
m" target=3D"_blank">ve7jtb@ve7jtb.com</a>&gt; wrote:<o:p></o:p></p>
</div>
<blockquote style=3D"margin-top:5.0pt;margin-bottom:5.0pt">
<p class=3D"MsoNormal">JWT is an assertion( I am probably going to regret u=
sing that word).<o:p></o:p></p>
<div>
<p class=3D"MsoNormal"><o:p>&nbsp;</o:p></p>
</div>
<div>
<p class=3D"MsoNormal">It is used in openID connect for id_tokens, it is us=
ed in OAuth for Assertion grant types and authentication of the client to t=
he token endpoint.<o:p></o:p></p>
</div>
<div>
<p class=3D"MsoNormal"><a href=3D"http://tools.ietf.org/html/draft-ietf-oau=
th-jwt-bearer-04" target=3D"_blank">http://tools.ietf.org/html/draft-ietf-o=
auth-jwt-bearer-04</a><o:p></o:p></p>
</div>
<div>
<p class=3D"MsoNormal"><o:p>&nbsp;</o:p></p>
</div>
<div>
<pre><span style=3D"font-size:12.0pt"><o:p>&nbsp;</o:p></span></pre>
<pre><span style=3D"font-size:12.0pt"><o:p>&nbsp;</o:p></span></pre>
<h1 style=3D"mso-line-height-alt:0pt"><span style=3D"font-size:12.0pt;font-=
family:&quot;Courier New&quot;">JSON Web Token (JWT) Bearer Token Profiles =
for OAuth 2.0<o:p></o:p></span></h1>
<div>
<p class=3D"MsoNormal"><o:p>&nbsp;</o:p></p>
</div>
<div>
<p class=3D"MsoNormal">Dosen't define JWT's use for access tokens for the R=
S. &nbsp;&nbsp;<o:p></o:p></p>
</div>
<div>
<p class=3D"MsoNormal"><o:p>&nbsp;</o:p></p>
</div>
<div>
<p class=3D"MsoNormal">Bottom line JWT is for more than access tokens.<o:p>=
</o:p></p>
</div>
<div>
<p class=3D"MsoNormal"><o:p>&nbsp;</o:p></p>
</div>
<div>
<p class=3D"MsoNormal">John B.<o:p></o:p></p>
</div>
<div>
<p class=3D"MsoNormal"><o:p>&nbsp;</o:p></p>
</div>
<div>
<div>
<p class=3D"MsoNormal">On 2013-02-28, at 9:28 AM, Phil Hunt &lt;<a href=3D"=
mailto:phil.hunt@oracle.com" target=3D"_blank">phil.hunt@oracle.com</a>&gt;=
 wrote:<o:p></o:p></p>
</div>
<p class=3D"MsoNormal"><br>
<br>
<o:p></o:p></p>
<div>
<div>
<p class=3D"MsoNormal">Are you saying jwt is not an access token type?<br>
<br>
Phil<o:p></o:p></p>
<div>
<p class=3D"MsoNormal"><o:p>&nbsp;</o:p></p>
</div>
<div>
<p class=3D"MsoNormal">Sent from my phone.<o:p></o:p></p>
</div>
</div>
<div>
<p class=3D"MsoNormal" style=3D"margin-bottom:12.0pt"><br>
On 2013-02-28, at 8:58, John Bradley &lt;<a href=3D"mailto:ve7jtb@ve7jtb.co=
m" target=3D"_blank">ve7jtb@ve7jtb.com</a>&gt; wrote:<o:p></o:p></p>
</div>
<blockquote style=3D"margin-top:5.0pt;margin-bottom:5.0pt">
<p class=3D"MsoNormal">Yes, defining scope in JWT is the wrong place. &nbsp=
; JWT needs to stick to the security claims needed to process JWT.<o:p></o:=
p></p>
<div>
<p class=3D"MsoNormal"><o:p>&nbsp;</o:p></p>
</div>
<div>
<p class=3D"MsoNormal">I also don't know how far you get requiring a specif=
ic authorization format for JWT, some AS will wan to use a opaque reference=
, some might want to use a user claim or role claim, others may use scopes,=
 &nbsp;combining scopes and claims is also
 possible.<o:p></o:p></p>
</div>
<div>
<p class=3D"MsoNormal"><o:p>&nbsp;</o:p></p>
</div>
<div>
<p class=3D"MsoNormal">Right now it is up to a AS RS pair to agree on how t=
o communicate authorization. &nbsp; I don't want MAC to be more restrictive=
 than bearer when it comes to authorization between AS and RS.<o:p></o:p></=
p>
<div>
<p class=3D"MsoNormal"><o:p>&nbsp;</o:p></p>
</div>
<div>
<p class=3D"MsoNormal">Hannes wanted to know why JWT didn't define scope. &=
nbsp;The simple answer is that it is out of scope for JWT itself. &nbsp; It=
 might be defined in a OAuth access token profile for JWT but it should not=
 be specific to MAC.<o:p></o:p></p>
</div>
<div>
<p class=3D"MsoNormal"><o:p>&nbsp;</o:p></p>
</div>
<div>
<p class=3D"MsoNormal">John B.<o:p></o:p></p>
</div>
<div>
<div>
<div>
<p class=3D"MsoNormal">On 2013-02-28, at 8:44 AM, Brian Campbell &lt;<a hre=
f=3D"mailto:bcampbell@pingidentity.com" target=3D"_blank">bcampbell@pingide=
ntity.com</a>&gt; wrote:<o:p></o:p></p>
</div>
<p class=3D"MsoNormal"><br>
<br>
<o:p></o:p></p>
<div>
<div>
<p class=3D"MsoNormal" style=3D"margin-bottom:12.0pt">I think John's point =
was more that scope is something rather specific to an OAuth access token a=
nd, while JWT is can be used to represent an access token, it's not the onl=
y application of JWT. The 'standard'
 claims in JWT are those that are believed (right or wrong) to be widely ap=
plicable across different applications of JWT. One could argue about it but=
 scope is probably not one of those.<o:p></o:p></p>
</div>
<p class=3D"MsoNormal">It would probably make sense to try and build a prof=
ile of JWT specifically for OAuth access tokens (though I suspect there are=
 some turtles and dragons in there), which might be the appropriate place t=
o define/register a scope claim.<o:p></o:p></p>
</div>
<div>
<p class=3D"MsoNormal" style=3D"margin-bottom:12.0pt"><o:p>&nbsp;</o:p></p>
<div>
<p class=3D"MsoNormal">On Thu, Feb 28, 2013 at 9:24 AM, Phil Hunt &lt;<a hr=
ef=3D"mailto:phil.hunt@oracle.com" target=3D"_blank">phil.hunt@oracle.com</=
a>&gt; wrote:<o:p></o:p></p>
<p class=3D"MsoNormal">Are you advocating TWO systems? That seems like a ba=
d choice.<br>
<br>
I would rather fix scope than go to a two system approach.<br>
<br>
Phil<br>
<br>
Sent from my phone.<br>
<br>
On 2013-02-28, at 8:17, John Bradley &lt;<a href=3D"mailto:ve7jtb@ve7jtb.co=
m" target=3D"_blank">ve7jtb@ve7jtb.com</a>&gt; wrote:<br>
<br>
&gt; While scope is one method that a AS could communicate authorization to=
 a RS, it is not the only or perhaps even the most likely one.<br>
&gt; Using scope requires a relatively tight binding between the RS and AS,=
 &nbsp;UMA uses a different mechanism that describes finer grained operatio=
ns.<br>
&gt; The AS may include roles, user, or other more abstract claims that the=
 the client may (god help them) pass on to EXCML for processing.<br>
&gt;<br>
&gt; While having a scopes claim is possible, like any other claim it is no=
t part of the JWT core security processing claims, and needs to be defined =
by extension.<br>
&gt;<br>
&gt; John B.<br>
&gt; On 2013-02-28, at 2:29 AM, Hannes Tschofenig &lt;<a href=3D"mailto:han=
nes.tschofenig@gmx.net" target=3D"_blank">hannes.tschofenig@gmx.net</a>&gt;=
 wrote:<br>
&gt;<br>
&gt;&gt; Hi Mike,<br>
&gt;&gt;<br>
&gt;&gt; when I worked on the MAC specification I noticed that the JWT does=
 not have a claim for the scope. I believe that this would be needed to all=
ow the resource server to verify whether the scope the authorization server=
 authorized is indeed what the client
 is asking for.<br>
&gt;&gt;<br>
&gt;&gt; Ciao<br>
&gt;&gt; Hannes<br>
&gt;&gt;<br>
&gt;&gt; _______________________________________________<br>
&gt;&gt; OAuth mailing list<br>
&gt;&gt; <a href=3D"mailto:OAuth@ietf.org" target=3D"_blank">OAuth@ietf.org=
</a><br>
&gt;&gt; <a href=3D"https://www.ietf.org/mailman/listinfo/oauth" target=3D"=
_blank">https://www.ietf.org/mailman/listinfo/oauth</a><br>
&gt;<br>
&gt; _______________________________________________<br>
&gt; OAuth mailing list<br>
&gt; <a href=3D"mailto:OAuth@ietf.org" target=3D"_blank">OAuth@ietf.org</a>=
<br>
&gt; <a href=3D"https://www.ietf.org/mailman/listinfo/oauth" target=3D"_bla=
nk">https://www.ietf.org/mailman/listinfo/oauth</a><br>
_______________________________________________<br>
OAuth mailing list<br>
<a href=3D"mailto:OAuth@ietf.org" target=3D"_blank">OAuth@ietf.org</a><br>
<a href=3D"https://www.ietf.org/mailman/listinfo/oauth" target=3D"_blank">h=
ttps://www.ietf.org/mailman/listinfo/oauth</a><o:p></o:p></p>
</div>
<p class=3D"MsoNormal"><o:p>&nbsp;</o:p></p>
</div>
</div>
<p class=3D"MsoNormal"><o:p>&nbsp;</o:p></p>
</div>
</div>
</blockquote>
</div>
</div>
<p class=3D"MsoNormal"><o:p>&nbsp;</o:p></p>
</div>
</blockquote>
</div>
</div>
<p class=3D"MsoNormal"><o:p>&nbsp;</o:p></p>
</div>
</div>
</div>
</div>
</div>
<p class=3D"MsoNormal"><o:p>&nbsp;</o:p></p>
</div>
</div>
</div>
</div>
</div>
</body>
</html>

--_000_59E470B10C4630419ED717AC79FCF9A948D58BEEBY2PRD0411MB441_--

From oleg_gryb@yahoo.com  Thu Feb 28 11:21:08 2013
Return-Path: <oleg_gryb@yahoo.com>
X-Original-To: oauth@ietfa.amsl.com
Delivered-To: oauth@ietfa.amsl.com
Received: from localhost (localhost [127.0.0.1]) by ietfa.amsl.com (Postfix) with ESMTP id DC11821F8B0A for <oauth@ietfa.amsl.com>; Thu, 28 Feb 2013 11:21:08 -0800 (PST)
X-Virus-Scanned: amavisd-new at amsl.com
X-Spam-Flag: NO
X-Spam-Score: -2.598
X-Spam-Level: 
X-Spam-Status: No, score=-2.598 tagged_above=-999 required=5 tests=[BAYES_00=-2.599, HTML_MESSAGE=0.001]
Received: from mail.ietf.org ([64.170.98.30]) by localhost (ietfa.amsl.com [127.0.0.1]) (amavisd-new, port 10024) with ESMTP id fFNpVlNp79Hb for <oauth@ietfa.amsl.com>; Thu, 28 Feb 2013 11:21:07 -0800 (PST)
Received: from nm18-vm0.bullet.mail.bf1.yahoo.com (nm18-vm0.bullet.mail.bf1.yahoo.com [98.139.213.138]) by ietfa.amsl.com (Postfix) with SMTP id 7DEFE21F89A4 for <oauth@ietf.org>; Thu, 28 Feb 2013 11:21:07 -0800 (PST)
Received: from [98.139.212.147] by nm18.bullet.mail.bf1.yahoo.com with NNFMP; 28 Feb 2013 19:21:06 -0000
Received: from [98.139.212.202] by tm4.bullet.mail.bf1.yahoo.com with NNFMP; 28 Feb 2013 19:21:06 -0000
Received: from [127.0.0.1] by omp1011.mail.bf1.yahoo.com with NNFMP; 28 Feb 2013 19:21:06 -0000
X-Yahoo-Newman-Property: ymail-3
X-Yahoo-Newman-Id: 941986.26418.bm@omp1011.mail.bf1.yahoo.com
Received: (qmail 29395 invoked by uid 60001); 28 Feb 2013 19:21:06 -0000
DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=yahoo.com; s=s1024; t=1362079266; bh=Vwgggfgx4DflXHKDIa/xWfku98jB/JxiGYMgUIcsTYk=; h=X-YMail-OSG:Received:X-Rocket-MIMEInfo:X-Mailer:Message-ID:Date:From:Reply-To:Subject:To:MIME-Version:Content-Type; b=ibtU4j7gsr+axYQsVEIgl+YyxF/ZTfbRpAFUY6JkkLBFLpACzcB0JGkH20vibp9yE62jsi/DudBvJj0iHw4fF808jig0bV/wH3jYBee6pcHgHvAhxVx/x11ZG/4fKolU+Cd0tbKIODkjJH3/Sut9WqgEIngWJ1ujL38GqxJMaMY=
DomainKey-Signature: a=rsa-sha1; q=dns; c=nofws; s=s1024; d=yahoo.com; h=X-YMail-OSG:Received:X-Rocket-MIMEInfo:X-Mailer:Message-ID:Date:From:Reply-To:Subject:To:MIME-Version:Content-Type; b=sYvzLERWXEy1c7ziSyiO2XmkdZ45UWjJv2fZH9RyQTaFSRU5mmPrHbRQSiu9vc/0GPoao/HscuKORtA+Ue1+ngmpNnX6Vt4Khs9tEJtkxh/U0CUSljcHn6a2WtRb6Bj+wIiOVSPytDBjpmfZjPlC/kJBn4gmhF6QhP6uuwFDY7M=;
X-YMail-OSG: kfI_PtYVM1nO3OUP1TbbgaLeC.DTXkd4CrxgzPlsKRf0H66 _mHJwwUffdF8TDxkW9.4MblRdPDW7d6csehlN5WEAfK64IC3i.UJ5PvJs.Tc GHY0BVNZJg4i88SiXxKSeMWFoddYbHIOslhlmU7zuiHXTTfuJMecPha92VoV R6Csxkta_NrLcV2Xlj9aIstU6ejHZx5XXEkLezsXBzH4n.qKa_lnx4yYXK1w L139WT6yn1ROwpbhFuh0Vd3JLlFaxI4qH5LyLUUSjdhIuCjENYFmy69GIZHe M3GDI51UfAvxhKUbnUvDCQ8ThtlshvINOX3xHAXD9E6PF1A9VEYz1ksTgO5r _njSB6nVqF6qXImmI1HHXnrUmgda.CEFn.8UrwObMX0ZEfM0clWrL4X4Gv8_ 9fhCDxvb0W4VO0bkqbfdPGvoyVpWYJ5g.vnPp6SbzA2ayoUwUSC8lR5Pw_8n Oxqo4Q.yTRi08OxiK7ioYVWzHSPYI1wgtDdVBuJLhTTlLrVXeBvMnrVVhdJ9 OYdsuV3QdulN38hI-
Received: from [199.16.140.28] by web141002.mail.bf1.yahoo.com via HTTP; Thu, 28 Feb 2013 11:21:06 PST
X-Rocket-MIMEInfo: 001.001, RGVhciBPQXV0aCBXRyBhbmQgQ2hhaXJzLA0KDQpDYW4gc29tZWJvZHkgcGxlYXNlIGNvbW1lbnQgdGhlIENlcnRpY29tJ3MgZGlzY2xvc3VyZSBiZWxvdz8gSWYgdGhlIHB1cnBvc2Ugb2YgdGhpcyBkaXNjbG9zdXJlIGlzIHRvIGluZm9ybSB1cyB0aGF0IEpXVCBjYW4gYmUgcG90ZW50aWFsbHkgYSBzdWJqZWN0IG9mIHJveWFsdGllcyBhbmQgb3RoZXIgcG9zc2libGUgbGVnYWwgYWN0aW9ucywgdGhlIHZhbHVlIG9mIGFkb3B0aW5nIEpXVCBpbiB0aGUgc2NvcGUgb2YgT0F1dGggMi4wIElFVEYgc3RhbmRhcmQBMAEBAQE-
X-Mailer: YahooMailClassic/15.1.4 YahooMailWebService/0.8.135.514
Message-ID: <1362079266.8952.YahooMailClassic@web141002.mail.bf1.yahoo.com>
Date: Thu, 28 Feb 2013 11:21:06 -0800 (PST)
From: Oleg Gryb <oleg_gryb@yahoo.com>
To: oauth@ietf.org
MIME-Version: 1.0
Content-Type: multipart/alternative; boundary="348076277-717348825-1362079266=:8952"
Subject: [OAUTH-WG] Fw:  IPR Disclosure: - What to Do with JWT ?
X-BeenThere: oauth@ietf.org
X-Mailman-Version: 2.1.12
Precedence: list
Reply-To: oleg@gryb.info
List-Id: OAUTH WG <oauth.ietf.org>
List-Unsubscribe: <https://www.ietf.org/mailman/options/oauth>, <mailto:oauth-request@ietf.org?subject=unsubscribe>
List-Archive: <http://www.ietf.org/mail-archive/web/oauth>
List-Post: <mailto:oauth@ietf.org>
List-Help: <mailto:oauth-request@ietf.org?subject=help>
List-Subscribe: <https://www.ietf.org/mailman/listinfo/oauth>, <mailto:oauth-request@ietf.org?subject=subscribe>
X-List-Received-Date: Thu, 28 Feb 2013 19:21:09 -0000

--348076277-717348825-1362079266=:8952
Content-Type: text/plain; charset=iso-8859-1
Content-Transfer-Encoding: quoted-printable

Dear OAuth WG and Chairs,

Can somebody please comment the Certicom's disclosure below? If the purpose=
 of this disclosure is to inform us that JWT can be potentially a subject o=
f royalties and other possible legal actions, the value of adopting JWT in =
the scope of OAuth 2.0 IETF standard would definitely diminish and if this =
is the case shouldn't we consider replacing it with something similar, but =
different, which would not be a subject of the future possible litigation?=
=A0 =A0=20

I'm not a lawyer and might not understand the statement below correctly, so=
 please let me know if/where I'm wrong. Please keep in mind also that the p=
opularity of JWT is growing fast along with the implementations, so we need=
 to do something quickly.

Thanks,
Oleg.


--- On Wed, 2/27/13, IETF Secretariat <ietf-ipr@ietf.org> wrote:

From: IETF Secretariat <ietf-ipr@ietf.org>
Subject: [OAUTH-WG] IPR Disclosure: Certicom Corporation's Statement about =
IPR related to draft-ietf-oauth-json-web-token-06 (2)
To: mbj@microsoft.com, ve7jtb@ve7jtb.com, n-sakimura@nri.co.jp
Cc: derek@ihtfp.com, oauth@ietf.org, ipr-announce@ietf.org
Date: Wednesday, February 27, 2013, 4:16 PM


Dear Michael Jones, John Bradley, Nat Sakimura:

 An IPR disclosure that pertains to your Internet-Draft entitled "JSON Web =
Token
(JWT)" (draft-ietf-oauth-json-web-token) was submitted to the IETF Secretar=
iat
on 2013-02-20 and has been posted on the "IETF Page of Intellectual Propert=
y
Rights Disclosures" (https://datatracker.ietf.org/ipr/1968/). The title of =
the
IPR disclosure is "Certicom Corporation's Statement about IPR related to dr=
aft-
ietf-oauth-json-web-token-06 (2)."");

The IETF Secretariat

_______________________________________________
OAuth mailing list
OAuth@ietf.org
https://www.ietf.org/mailman/listinfo/oauth

--348076277-717348825-1362079266=:8952
Content-Type: text/html; charset=iso-8859-1
Content-Transfer-Encoding: quoted-printable

<table cellspacing=3D"0" cellpadding=3D"0" border=3D"0" ><tr><td valign=3D"=
top" style=3D"font: inherit;">Dear OAuth WG and Chairs,<br><br>Can somebody=
 please comment the Certicom's disclosure below? If the purpose of this dis=
closure is to inform us that JWT can be potentially a subject of royalties =
and other possible legal actions, the value of adopting JWT in the scope of=
 OAuth 2.0 IETF standard would definitely diminish and if this is the case =
shouldn't we consider replacing it with something similar, but different, w=
hich would not be a subject of the future possible litigation?&nbsp; &nbsp;=
 <br><br>I'm not a lawyer and might not understand the statement below corr=
ectly, so please let me know if/where I'm wrong. Please keep in mind also t=
hat the popularity of JWT is growing fast along with the implementations, s=
o we need to do something quickly.<br><br>Thanks,<br>Oleg.<br><br><br>--- O=
n <b>Wed, 2/27/13, IETF Secretariat <i>&lt;ietf-ipr@ietf.org&gt;</i></b>
 wrote:<br><blockquote style=3D"border-left: 2px solid rgb(16, 16, 255); ma=
rgin-left: 5px; padding-left: 5px;"><br>From: IETF Secretariat &lt;ietf-ipr=
@ietf.org&gt;<br>Subject: [OAUTH-WG] IPR Disclosure: Certicom Corporation's=
 Statement about IPR related to draft-ietf-oauth-json-web-token-06 (2)<br>T=
o: mbj@microsoft.com, ve7jtb@ve7jtb.com, n-sakimura@nri.co.jp<br>Cc: derek@=
ihtfp.com, oauth@ietf.org, ipr-announce@ietf.org<br>Date: Wednesday, Februa=
ry 27, 2013, 4:16 PM<br><br><div class=3D"plainMail"><br>Dear Michael Jones=
, John Bradley, Nat Sakimura:<br><br> An IPR disclosure that pertains to yo=
ur Internet-Draft entitled "JSON Web Token<br>(JWT)" (draft-ietf-oauth-json=
-web-token) was submitted to the IETF Secretariat<br>on 2013-02-20 and has =
been posted on the "IETF Page of Intellectual Property<br>Rights Disclosure=
s" (<a href=3D"https://datatracker.ietf.org/ipr/1968/" target=3D"_blank">ht=
tps://datatracker.ietf.org/ipr/1968/</a>). The title of the<br>IPR
 disclosure is "Certicom Corporation's Statement about IPR related to draft=
-<br>ietf-oauth-json-web-token-06 (2)."");<br><br>The IETF Secretariat<br><=
br>_______________________________________________<br>OAuth mailing list<br=
><a ymailto=3D"mailto:OAuth@ietf.org" href=3D"/mc/compose?to=3DOAuth@ietf.o=
rg">OAuth@ietf.org</a><br><a href=3D"https://www.ietf.org/mailman/listinfo/=
oauth" target=3D"_blank">https://www.ietf.org/mailman/listinfo/oauth</a><br=
></div></blockquote></td></tr></table>
--348076277-717348825-1362079266=:8952--

From bcampbell@pingidentity.com  Thu Feb 28 11:25:12 2013
Return-Path: <bcampbell@pingidentity.com>
X-Original-To: oauth@ietfa.amsl.com
Delivered-To: oauth@ietfa.amsl.com
Received: from localhost (localhost [127.0.0.1]) by ietfa.amsl.com (Postfix) with ESMTP id B704121F8519 for <oauth@ietfa.amsl.com>; Thu, 28 Feb 2013 11:25:12 -0800 (PST)
X-Virus-Scanned: amavisd-new at amsl.com
X-Spam-Flag: NO
X-Spam-Score: -5.907
X-Spam-Level: 
X-Spam-Status: No, score=-5.907 tagged_above=-999 required=5 tests=[AWL=0.069,  BAYES_00=-2.599, FM_FORGED_GMAIL=0.622, HTML_MESSAGE=0.001, RCVD_IN_DNSWL_MED=-4]
Received: from mail.ietf.org ([64.170.98.30]) by localhost (ietfa.amsl.com [127.0.0.1]) (amavisd-new, port 10024) with ESMTP id dgyrMoz1dsjq for <oauth@ietfa.amsl.com>; Thu, 28 Feb 2013 11:25:03 -0800 (PST)
Received: from na3sys009aog122.obsmtp.com (na3sys009aog122.obsmtp.com [74.125.149.147]) by ietfa.amsl.com (Postfix) with ESMTP id C39C021F8501 for <oauth@ietf.org>; Thu, 28 Feb 2013 11:25:02 -0800 (PST)
Received: from mail-ob0-f199.google.com ([209.85.214.199]) (using TLSv1) by na3sys009aob122.postini.com ([74.125.148.12]) with SMTP ID DSNKUS+vDnZFRZp4PtbmTC2zqlfqdtTA47M1@postini.com; Thu, 28 Feb 2013 11:25:02 PST
Received: by mail-ob0-f199.google.com with SMTP id wd20so2000158obb.6 for <oauth@ietf.org>; Thu, 28 Feb 2013 11:25:02 -0800 (PST)
X-Google-DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=google.com; s=20120113; h=x-received:x-received:mime-version:in-reply-to:references:from:date :message-id:subject:to:cc:content-type:x-gm-message-state; bh=BxaUrJmrhPFsm3lcTPKZMV63YyT799hB7vFYsCZ01xQ=; b=CExtaGsM4TV3yF2/wdbycoATD+n6oA5hKckP5TWSw4WBzlPzXSiebV32cbr965RGtx cmUn/6tOy5SmTkQOV+QsxNTkoVM60vueN+yt79FiR7A6xeeW2YR5mFAUP0Fg4virYHm0 r11AujqPL4SS2CGJP6DNbsd6nXOj+VihBg3pvQraO5uVRaHuOJT3q8hdyRF2kWN/FE0M 5r1bj9JB+kSMWxoSPXQ3xAVQhKf4q9jWvvWsKIPyXguNpS9pdJDkzP19L3dc1U9h4huH QNQKY5LwXdAWsz1Jv0xaxdgozqesi26NAaGHffn7FRMIFir7ZapaCl1Pynx5oxtY5KMO xiMA==
X-Received: by 10.50.151.179 with SMTP id ur19mr10855482igb.79.1362079501785;  Thu, 28 Feb 2013 11:25:01 -0800 (PST)
X-Received: by 10.50.151.179 with SMTP id ur19mr10855472igb.79.1362079501644;  Thu, 28 Feb 2013 11:25:01 -0800 (PST)
MIME-Version: 1.0
Received: by 10.64.32.106 with HTTP; Thu, 28 Feb 2013 11:24:31 -0800 (PST)
In-Reply-To: <CA+k3eCSyE3cPMh17XuivbUZUtHY=RAtjV1UeCdW6gGFk+gv02A@mail.gmail.com>
References: <0EC2404F-E3C5-4AD1-88B4-E74AA0394DD9@gmx.net> <C75E4871-E907-4EF7-BAF0-9D1A172D581B@ve7jtb.com> <CA6A6425-D0CE-469F-B51E-9F296DA8041C@oracle.com> <CA+k3eCREgN+6z+U=jjJcPo0nZVR0GWn5zXeecZRO+rg=xd-gZg@mail.gmail.com> <A2375FE9-946F-46B3-9356-0709DD56BD4A@ve7jtb.com> <48FD87D1-4DF4-4289-99B7-40A515F31890@oracle.com> <3E472720-31A4-40A0-AAA4-402CF850831A@ve7jtb.com> <7127843B-D7B0-4AB6-87F1-1604D1EFFA79@oracle.com> <50DA292F-32F0-4266-8401-006AD837B775@ve7jtb.com> <CA+k3eCSyE3cPMh17XuivbUZUtHY=RAtjV1UeCdW6gGFk+gv02A@mail.gmail.com>
From: Brian Campbell <bcampbell@pingidentity.com>
Date: Thu, 28 Feb 2013 12:24:31 -0700
Message-ID: <CA+k3eCTyr7o9qmPKeL_-s9QHyNRQGO+kpB=jqUkgtYOWsC1=Tw@mail.gmail.com>
To: John Bradley <ve7jtb@ve7jtb.com>
Content-Type: multipart/alternative; boundary=e89a8f3b9ff5da0e5c04d6cdd863
X-Gm-Message-State: ALoCoQl4/y6fUmcNShLYiGtgNqQZMFAF1Bgm8HjqoSLtMjkS0ZYmx2lEjC2h/60mKsO1jZJDNP9vhp+DDeVTwBxC9kJVxOzu/3gsag3qfhD8aR8SrTgWNFwm6lQnDCJttbeXoje1ROIR
Cc: "oauth@ietf.org WG" <oauth@ietf.org>
Subject: Re: [OAUTH-WG] JWT - scope claim missing
X-BeenThere: oauth@ietf.org
X-Mailman-Version: 2.1.12
Precedence: list
List-Id: OAUTH WG <oauth.ietf.org>
List-Unsubscribe: <https://www.ietf.org/mailman/options/oauth>, <mailto:oauth-request@ietf.org?subject=unsubscribe>
List-Archive: <http://www.ietf.org/mail-archive/web/oauth>
List-Post: <mailto:oauth@ietf.org>
List-Help: <mailto:oauth-request@ietf.org?subject=help>
List-Subscribe: <https://www.ietf.org/mailman/listinfo/oauth>, <mailto:oauth-request@ietf.org?subject=subscribe>
X-List-Received-Date: Thu, 28 Feb 2013 19:25:12 -0000

--e89a8f3b9ff5da0e5c04d6cdd863
Content-Type: text/plain; charset=ISO-8859-1

To be fair, I think it was Phil who first conflated the things :) I just
picked up the ball and ran with it. But you are right, I did kind of hijack
the thread which was originally about if a scope claim should be defined in
draft-ietf-oauth-json-web-token. I'd say no but I can see how an argument
could be made the other way.


On Thu, Feb 28, 2013 at 12:03 PM, Brian Campbell <bcampbell@pingidentity.com
> wrote:

> I'm not sure anyone really "picked" the titles for the bearer token
> profiles. They just kind of evolved. And evolved in funny ways especially
> when client authn to the AS was added.
>
> You won't hear me argue that the titles are "good" and this is not the
> first time there's been confusion about what they actually do. They define
> new grant types and new client authentication methods. They *do not* define
> an access token format or anything else about access tokens. JWT and SAML
> could be used for that but that's not what these drafts do.
>
> Suggestions for better title(s) would be more than welcome.
>
> Here's what they are now:
>
> SAML 2.0 Bearer Assertion Profiles for OAuth 2.0
> draft-ietf-oauth-saml2-bearer
>
>
> JSON Web Token (JWT) Bearer Token Profiles for OAuth 2.0
>  draft-ietf-oauth-jwt-bearer
>
> Assertion Framework for OAuth 2.0
> draft-ietf-oauth-assertions
>
>
> On Thu, Feb 28, 2013 at 11:36 AM, John Bradley <ve7jtb@ve7jtb.com> wrote:
>
>> Yes the title likely adds to the confusion given that the bearer tokens
>> are not access tokens.
>>
>> Things as separate from OAuth as the Firefox browerID spec use JWS signed
>> JWTs.
>>
>> The bearer token profiles for OAuth 2 are for OAuth2.
>>
>> The JSON Web Token (JWT)<http://tools.ietf.org/html/draft-ietf-oauth-json-web-token-06> spec
>> did not start in OAuth and is not OAuth specific.
>>
>> A JWT is:
>>
>> JSON Web Token (JWT)  A string representing a set of claims as a JSON
>>       object that is encoded in a JWS or JWE, enabling the claims to be
>>       digitally signed or MACed and/or encrypted.
>>
>>
>> So OAuth or other profiles may define claims to go in a JWT, but the JWT
>> needs to itself only define the claims necessary for security processing.
>>
>> John B.
>> PS that was a soft ball If you hadn't responded I would have been
>> disappointed.  I din't pick the title for the bearer token profiles.
>>
>>
>> On 2013-02-28, at 10:12 AM, Phil Hunt <phil.hunt@oracle.com> wrote:
>>
>>
>>
>>
>> JSON Web Token (JWT) Bearer Token Profiles for OAuth 2.0
>>
>>
>> Note the title says "for OAuth2"
>>
>> Sorry. Couldn't resist.
>>
>> Phil
>>
>> Sent from my phone.
>>
>> On 2013-02-28, at 9:40, John Bradley <ve7jtb@ve7jtb.com> wrote:
>>
>> JWT is an assertion( I am probably going to regret using that word).
>>
>> It is used in openID connect for id_tokens, it is used in OAuth for
>> Assertion grant types and authentication of the client to the token
>> endpoint.
>> http://tools.ietf.org/html/draft-ietf-oauth-jwt-bearer-04
>>
>> JSON Web Token (JWT) Bearer Token Profiles for OAuth 2.0
>>
>>
>> Dosen't define JWT's use for access tokens for the RS.
>>
>> Bottom line JWT is for more than access tokens.
>>
>> John B.
>>
>> On 2013-02-28, at 9:28 AM, Phil Hunt <phil.hunt@oracle.com> wrote:
>>
>> Are you saying jwt is not an access token type?
>>
>> Phil
>>
>> Sent from my phone.
>>
>> On 2013-02-28, at 8:58, John Bradley <ve7jtb@ve7jtb.com> wrote:
>>
>> Yes, defining scope in JWT is the wrong place.   JWT needs to stick to
>> the security claims needed to process JWT.
>>
>> I also don't know how far you get requiring a specific authorization
>> format for JWT, some AS will wan to use a opaque reference, some might want
>> to use a user claim or role claim, others may use scopes,  combining scopes
>> and claims is also possible.
>>
>> Right now it is up to a AS RS pair to agree on how to communicate
>> authorization.   I don't want MAC to be more restrictive than bearer when
>> it comes to authorization between AS and RS.
>>
>> Hannes wanted to know why JWT didn't define scope.  The simple answer is
>> that it is out of scope for JWT itself.   It might be defined in a OAuth
>> access token profile for JWT but it should not be specific to MAC.
>>
>> John B.
>> On 2013-02-28, at 8:44 AM, Brian Campbell <bcampbell@pingidentity.com>
>> wrote:
>>
>> I think John's point was more that scope is something rather specific to
>> an OAuth access token and, while JWT is can be used to represent an access
>> token, it's not the only application of JWT. The 'standard' claims in JWT
>> are those that are believed (right or wrong) to be widely applicable across
>> different applications of JWT. One could argue about it but scope is
>> probably not one of those.
>>
>> It would probably make sense to try and build a profile of JWT
>> specifically for OAuth access tokens (though I suspect there are some
>> turtles and dragons in there), which might be the appropriate place to
>> define/register a scope claim.
>>
>>
>> On Thu, Feb 28, 2013 at 9:24 AM, Phil Hunt <phil.hunt@oracle.com> wrote:
>>
>>> Are you advocating TWO systems? That seems like a bad choice.
>>>
>>> I would rather fix scope than go to a two system approach.
>>>
>>> Phil
>>>
>>> Sent from my phone.
>>>
>>> On 2013-02-28, at 8:17, John Bradley <ve7jtb@ve7jtb.com> wrote:
>>>
>>> > While scope is one method that a AS could communicate authorization to
>>> a RS, it is not the only or perhaps even the most likely one.
>>> > Using scope requires a relatively tight binding between the RS and AS,
>>>  UMA uses a different mechanism that describes finer grained operations.
>>> > The AS may include roles, user, or other more abstract claims that the
>>> the client may (god help them) pass on to EXCML for processing.
>>> >
>>> > While having a scopes claim is possible, like any other claim it is
>>> not part of the JWT core security processing claims, and needs to be
>>> defined by extension.
>>> >
>>> > John B.
>>> > On 2013-02-28, at 2:29 AM, Hannes Tschofenig <
>>> hannes.tschofenig@gmx.net> wrote:
>>> >
>>> >> Hi Mike,
>>> >>
>>> >> when I worked on the MAC specification I noticed that the JWT does
>>> not have a claim for the scope. I believe that this would be needed to
>>> allow the resource server to verify whether the scope the authorization
>>> server authorized is indeed what the client is asking for.
>>> >>
>>> >> Ciao
>>> >> Hannes
>>> >>
>>> >> _______________________________________________
>>> >> OAuth mailing list
>>> >> OAuth@ietf.org
>>> >> https://www.ietf.org/mailman/listinfo/oauth
>>> >
>>> > _______________________________________________
>>> > OAuth mailing list
>>> > OAuth@ietf.org
>>> > https://www.ietf.org/mailman/listinfo/oauth
>>> _______________________________________________
>>> OAuth mailing list
>>> OAuth@ietf.org
>>> https://www.ietf.org/mailman/listinfo/oauth
>>>
>>
>>
>>
>>
>>
>

--e89a8f3b9ff5da0e5c04d6cdd863
Content-Type: text/html; charset=ISO-8859-1
Content-Transfer-Encoding: quoted-printable

<div dir=3D"ltr">To be fair, I think it was Phil who first conflated the th=
ings :) I just picked up the ball and ran with it. But you are right, I did=
 kind of hijack the thread which was originally about if a scope claim shou=
ld be defined in draft-ietf-oauth-json-web-token. I&#39;d say no but I can =
see how an argument could be made the other way.<br>

</div><div class=3D"gmail_extra"><br><br><div class=3D"gmail_quote">On Thu,=
 Feb 28, 2013 at 12:03 PM, Brian Campbell <span dir=3D"ltr">&lt;<a href=3D"=
mailto:bcampbell@pingidentity.com" target=3D"_blank">bcampbell@pingidentity=
.com</a>&gt;</span> wrote:<br>

<blockquote class=3D"gmail_quote" style=3D"margin:0 0 0 .8ex;border-left:1p=
x #ccc solid;padding-left:1ex"><div dir=3D"ltr"><div>I&#39;m not sure anyon=
e really &quot;picked&quot; the titles for the bearer token profiles. They =
just kind of evolved. And evolved in funny ways especially when client auth=
n to the AS was added. <br>

<br>

</div><div>You won&#39;t hear me argue that the titles are &quot;good&quot;=
 and this is not the first time there&#39;s been confusion about what they =
actually do. They define new grant types and new client authentication meth=
ods. They *do not* define an access token format or anything else about acc=
ess tokens. JWT and SAML could be used for that but that&#39;s not what the=
se drafts do. <br>


<br></div><div>Suggestions for better title(s) would be more than welcome.<=
br>
</div><div><div><br></div><div>Here&#39;s what they are now:<br></div><div>=
<br>SAML 2.0 Bearer Assertion Profiles for OAuth 2.0<br>draft-ietf-oauth-sa=
ml2-bearer<div class=3D"im"><br><br>JSON Web Token (JWT) Bearer Token Profi=
les for OAuth 2.0<br>

</div>
draft-ietf-oauth-jwt-bearer<br><br>Assertion Framework for OAuth 2.0<br>dra=
ft-ietf-oauth-assertions<div><div class=3D"h5"><br><div class=3D"gmail_extr=
a"><br><div class=3D"gmail_quote">On Thu, Feb 28, 2013 at 11:36 AM, John Br=
adley <span dir=3D"ltr">&lt;<a href=3D"mailto:ve7jtb@ve7jtb.com" target=3D"=
_blank">ve7jtb@ve7jtb.com</a>&gt;</span> wrote:<br>


<blockquote class=3D"gmail_quote" style=3D"margin:0px 0px 0px 0.8ex;border-=
left:1px solid rgb(204,204,204);padding-left:1ex">
<div style=3D"word-wrap:break-word">Yes the title likely adds to the confus=
ion given that the bearer tokens are not access tokens.<div><br></div><div>=
Things as separate from OAuth as the Firefox browerID spec use JWS signed J=
WTs. =A0</div>



<div><br></div><div>The bearer token profiles for OAuth 2 are for OAuth2.</=
div><div><br></div><div>The=A0<a href=3D"http://tools.ietf.org/html/draft-i=
etf-oauth-json-web-token-06" target=3D"_blank">JSON Web Token (JWT)</a>=A0s=
pec did not start in OAuth and is not OAuth specific.</div>



<div><br></div><div>A JWT is:</div><div><pre style=3D"font-size:1em;margin-=
top:0px;margin-bottom:0px">JSON Web Token (JWT)  A string representing a se=
t of claims as a JSON
      object that is encoded in a JWS or JWE, enabling the claims to be
      digitally signed or MACed and/or encrypted.
</pre><div><br></div><div>So OAuth or other profiles may define claims to g=
o in a JWT, but the JWT needs to itself only define the claims necessary fo=
r security processing. =A0</div><div><br></div><div>John B.</div><div>PS th=
at was a soft ball If you hadn&#39;t responded I would have been disappoint=
ed. =A0I din&#39;t pick the title for the bearer token profiles.</div>



<div><div><div><br></div><div><br></div><div><div>On 2013-02-28, at 10:12 A=
M, Phil Hunt &lt;<a href=3D"mailto:phil.hunt@oracle.com" target=3D"_blank">=
phil.hunt@oracle.com</a>&gt; wrote:</div><br><blockquote type=3D"cite">
<div dir=3D"auto"><div><pre style=3D"margin-top:0px;margin-bottom:0px"><fon=
t face=3D"Helvetica"><span style=3D"white-space:normal;background-color:rgb=
a(255,255,255,0)">        <span style=3D"display:inline;font-weight:bold"><=
h1 style=3D"display:inline">



JSON Web Token (JWT) Bearer Token Profiles for OAuth 2.0</h1></span></span>=
</font></pre><br><span>Note the title says &quot;for OAuth2&quot;</span></d=
iv><div><span><br></span></div><div><span>Sorry. Couldn&#39;t resist.=A0</s=
pan></div>



<div><span><br></span></div><div><span>Phil</span><div><br></div><div>Sent =
from my phone.</div></div><div><br>On 2013-02-28, at 9:40, John Bradley &lt=
;<a href=3D"mailto:ve7jtb@ve7jtb.com" target=3D"_blank">ve7jtb@ve7jtb.com</=
a>&gt; wrote:<br>



<br></div><blockquote type=3D"cite">JWT is an assertion( I am probably goin=
g to regret using that word).<div><br></div><div>It is used in openID conne=
ct for id_tokens, it is used in OAuth for Assertion grant types and authent=
ication of the client to the token endpoint.</div>



<div><a href=3D"http://tools.ietf.org/html/draft-ietf-oauth-jwt-bearer-04" =
target=3D"_blank">http://tools.ietf.org/html/draft-ietf-oauth-jwt-bearer-04=
</a></div><div><br></div><div><pre style=3D"font-size:1em;margin-top:0px;ma=
rgin-bottom:0px">

<span style=3D"line-height:0pt;display:inline;font-size:1em;font-weight:bol=
d"><h1 style=3D"line-height:0pt;display:inline;font-size:1em">JSON Web Toke=
n (JWT) Bearer Token Profiles for OAuth 2.0</h1></span></pre><div><br></div=
>



<div>Dosen&#39;t define JWT&#39;s use for access tokens for the RS. =A0=A0<=
/div><div><br></div><div>Bottom line JWT is for more than access tokens.</d=
iv><div><br></div><div>John B.</div><div><br></div><div><div>On 2013-02-28,=
 at 9:28 AM, Phil Hunt &lt;<a href=3D"mailto:phil.hunt@oracle.com" target=
=3D"_blank">phil.hunt@oracle.com</a>&gt; wrote:</div>



<br><blockquote type=3D"cite"><div dir=3D"auto"><div>Are you saying jwt is =
not an access token type?<br><br>Phil<div><br></div><div>Sent from my phone=
.</div></div><div><br>On 2013-02-28, at 8:58, John Bradley &lt;<a href=3D"m=
ailto:ve7jtb@ve7jtb.com" target=3D"_blank">ve7jtb@ve7jtb.com</a>&gt; wrote:=
<br>



<br></div><blockquote type=3D"cite">Yes, defining scope in JWT is the wrong=
 place. =A0 JWT needs to stick to the security claims needed to process JWT=
.<div><br></div><div>I also don&#39;t know how far you get requiring a spec=
ific authorization format for JWT, some AS will wan to use a opaque referen=
ce, some might want to use a user claim or role claim, others may use scope=
s, =A0combining scopes and claims is also possible.</div>



<div><br></div><div>Right now it is up to a AS RS pair to agree on how to c=
ommunicate authorization. =A0 I don&#39;t want MAC to be more restrictive t=
han bearer when it comes to authorization between AS and RS.<br><div><br>



</div><div>Hannes wanted to know why JWT didn&#39;t define scope. =A0The si=
mple answer is that it is out of scope for JWT itself. =A0 It might be defi=
ned in a OAuth access token profile for JWT but it should not be specific t=
o MAC.</div>



<div><br></div><div>John B.</div><div><div><div>On 2013-02-28, at 8:44 AM, =
Brian Campbell &lt;<a href=3D"mailto:bcampbell@pingidentity.com" target=3D"=
_blank">bcampbell@pingidentity.com</a>&gt; wrote:</div><br><blockquote type=
=3D"cite">



<div dir=3D"ltr"><div>I think John&#39;s point was more that scope is somet=
hing rather specific to an OAuth access token and, while JWT is can be used=
 to represent an access token, it&#39;s not the only application of JWT. Th=
e &#39;standard&#39; claims in JWT are those that are believed (right or wr=
ong) to be widely applicable across different applications of JWT. One coul=
d argue about it but scope is probably not one of those.<br>





<br></div>It would probably make sense to try and build a profile of JWT sp=
ecifically for OAuth access tokens (though I suspect there are some turtles=
 and dragons in there), which might be the appropriate place to define/regi=
ster a scope claim.<br>






</div><div class=3D"gmail_extra"><br><br><div class=3D"gmail_quote">On Thu,=
 Feb 28, 2013 at 9:24 AM, Phil Hunt <span dir=3D"ltr">&lt;<a href=3D"mailto=
:phil.hunt@oracle.com" target=3D"_blank">phil.hunt@oracle.com</a>&gt;</span=
> wrote:<br>





<blockquote class=3D"gmail_quote" style=3D"margin:0px 0px 0px 0.8ex;border-=
left:1px solid rgb(204,204,204);padding-left:1ex">Are you advocating TWO sy=
stems? That seems like a bad choice.<br>
<br>
I would rather fix scope than go to a two system approach.<br>
<br>
Phil<br>
<br>
Sent from my phone.<br>
<br>
On 2013-02-28, at 8:17, John Bradley &lt;<a href=3D"mailto:ve7jtb@ve7jtb.co=
m" target=3D"_blank">ve7jtb@ve7jtb.com</a>&gt; wrote:<br>
<br>
&gt; While scope is one method that a AS could communicate authorization to=
 a RS, it is not the only or perhaps even the most likely one.<br>
&gt; Using scope requires a relatively tight binding between the RS and AS,=
 =A0UMA uses a different mechanism that describes finer grained operations.=
<br>
&gt; The AS may include roles, user, or other more abstract claims that the=
 the client may (god help them) pass on to EXCML for processing.<br>
&gt;<br>
&gt; While having a scopes claim is possible, like any other claim it is no=
t part of the JWT core security processing claims, and needs to be defined =
by extension.<br>
&gt;<br>
&gt; John B.<br>
&gt; On 2013-02-28, at 2:29 AM, Hannes Tschofenig &lt;<a href=3D"mailto:han=
nes.tschofenig@gmx.net" target=3D"_blank">hannes.tschofenig@gmx.net</a>&gt;=
 wrote:<br>
&gt;<br>
&gt;&gt; Hi Mike,<br>
&gt;&gt;<br>
&gt;&gt; when I worked on the MAC specification I noticed that the JWT does=
 not have a claim for the scope. I believe that this would be needed to all=
ow the resource server to verify whether the scope the authorization server=
 authorized is indeed what the client is asking for.<br>






&gt;&gt;<br>
&gt;&gt; Ciao<br>
&gt;&gt; Hannes<br>
&gt;&gt;<br>
&gt;&gt; _______________________________________________<br>
&gt;&gt; OAuth mailing list<br>
&gt;&gt; <a href=3D"mailto:OAuth@ietf.org" target=3D"_blank">OAuth@ietf.org=
</a><br>
&gt;&gt; <a href=3D"https://www.ietf.org/mailman/listinfo/oauth" target=3D"=
_blank">https://www.ietf.org/mailman/listinfo/oauth</a><br>
&gt;<br>
&gt; _______________________________________________<br>
&gt; OAuth mailing list<br>
&gt; <a href=3D"mailto:OAuth@ietf.org" target=3D"_blank">OAuth@ietf.org</a>=
<br>
&gt; <a href=3D"https://www.ietf.org/mailman/listinfo/oauth" target=3D"_bla=
nk">https://www.ietf.org/mailman/listinfo/oauth</a><br>
_______________________________________________<br>
OAuth mailing list<br>
<a href=3D"mailto:OAuth@ietf.org" target=3D"_blank">OAuth@ietf.org</a><br>
<a href=3D"https://www.ietf.org/mailman/listinfo/oauth" target=3D"_blank">h=
ttps://www.ietf.org/mailman/listinfo/oauth</a><br>
</blockquote></div><br></div>
</blockquote></div><br></div></div></blockquote></div></blockquote></div><b=
r></div></blockquote></div></blockquote></div><br></div></div></div></div><=
/blockquote></div><br></div></div></div></div></div></div>
</blockquote></div><br></div>

--e89a8f3b9ff5da0e5c04d6cdd863--

From bcampbell@pingidentity.com  Thu Feb 28 11:36:58 2013
Return-Path: <bcampbell@pingidentity.com>
X-Original-To: oauth@ietfa.amsl.com
Delivered-To: oauth@ietfa.amsl.com
Received: from localhost (localhost [127.0.0.1]) by ietfa.amsl.com (Postfix) with ESMTP id 6021621F86F4 for <oauth@ietfa.amsl.com>; Thu, 28 Feb 2013 11:36:58 -0800 (PST)
X-Virus-Scanned: amavisd-new at amsl.com
X-Spam-Flag: NO
X-Spam-Score: -5.909
X-Spam-Level: 
X-Spam-Status: No, score=-5.909 tagged_above=-999 required=5 tests=[AWL=0.067,  BAYES_00=-2.599, FM_FORGED_GMAIL=0.622, HTML_MESSAGE=0.001, RCVD_IN_DNSWL_MED=-4]
Received: from mail.ietf.org ([64.170.98.30]) by localhost (ietfa.amsl.com [127.0.0.1]) (amavisd-new, port 10024) with ESMTP id lwry3F1n8Pb8 for <oauth@ietfa.amsl.com>; Thu, 28 Feb 2013 11:36:56 -0800 (PST)
Received: from na3sys009aog101.obsmtp.com (na3sys009aog101.obsmtp.com [74.125.149.67]) by ietfa.amsl.com (Postfix) with ESMTP id 8CE6721F8698 for <oauth@ietf.org>; Thu, 28 Feb 2013 11:36:56 -0800 (PST)
Received: from mail-ia0-f199.google.com ([209.85.210.199]) (using TLSv1) by na3sys009aob101.postini.com ([74.125.148.12]) with SMTP ID DSNKUS+x2BVj59i5mNh936UERvqkYt5vL6Cj@postini.com; Thu, 28 Feb 2013 11:36:56 PST
Received: by mail-ia0-f199.google.com with SMTP id o25so8656975iad.6 for <oauth@ietf.org>; Thu, 28 Feb 2013 11:36:55 -0800 (PST)
X-Google-DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=google.com; s=20120113; h=x-received:x-received:mime-version:in-reply-to:references:from:date :message-id:subject:to:cc:content-type:x-gm-message-state; bh=YHH1w6t4CMa5QM1aRTCrtKbKeaTTA9K6N0NUwut3wLY=; b=RFfiEq/qR5qWeSHdfMlV14fEnPfCsOJigVMgBE218viV5xl3ziK8RUWKVFb0MdDkRw WswabRB6to9pjyGlFdjWUu9ponlDN7lapZk+la15SeMRRig6JEyOv5iV9xyQHxHSSg+x gRtrWkBaxcmx956YtCvfIQh4JrRWB8x6YHgGt57AwOaVv2ov5ErDWY8EETby7yPObAlZ GVOLM+DP7xfY900zhdCwRvzM0GpleumOk2gvjchvEsp8Vj2XMxZkMW5f6Pw8MAULRzNY Im6zs3lrchpOV0kU/22IEEDCjsE70nxExODxNQ/qCHZUKOH3LvPDTcahPeP+vD8qok1K 90Og==
X-Received: by 10.42.122.66 with SMTP id m2mr4101042icr.15.1362080215667; Thu, 28 Feb 2013 11:36:55 -0800 (PST)
X-Received: by 10.42.122.66 with SMTP id m2mr4101036icr.15.1362080215497; Thu, 28 Feb 2013 11:36:55 -0800 (PST)
MIME-Version: 1.0
Received: by 10.64.32.106 with HTTP; Thu, 28 Feb 2013 11:36:25 -0800 (PST)
In-Reply-To: <59E470B10C4630419ED717AC79FCF9A948D58BEE@BY2PRD0411MB441.namprd04.prod.outlook.com>
References: <0EC2404F-E3C5-4AD1-88B4-E74AA0394DD9@gmx.net> <C75E4871-E907-4EF7-BAF0-9D1A172D581B@ve7jtb.com> <CA6A6425-D0CE-469F-B51E-9F296DA8041C@oracle.com> <CA+k3eCREgN+6z+U=jjJcPo0nZVR0GWn5zXeecZRO+rg=xd-gZg@mail.gmail.com> <A2375FE9-946F-46B3-9356-0709DD56BD4A@ve7jtb.com> <48FD87D1-4DF4-4289-99B7-40A515F31890@oracle.com> <3E472720-31A4-40A0-AAA4-402CF850831A@ve7jtb.com> <7127843B-D7B0-4AB6-87F1-1604D1EFFA79@oracle.com> <50DA292F-32F0-4266-8401-006AD837B775@ve7jtb.com> <CA+k3eCSyE3cPMh17XuivbUZUtHY=RAtjV1UeCdW6gGFk+gv02A@mail.gmail.com> <59E470B10C4630419ED717AC79FCF9A948D58BEE@BY2PRD0411MB441.namprd04.prod.outlook.com>
From: Brian Campbell <bcampbell@pingidentity.com>
Date: Thu, 28 Feb 2013 12:36:25 -0700
Message-ID: <CA+k3eCSD3EqtNC0Z--+HKwENW9pbzCNGp2_LyVp0bAphvThnRA@mail.gmail.com>
To: Lewis Adam-CAL022 <Adam.Lewis@motorolasolutions.com>
Content-Type: multipart/alternative; boundary=20cf3003bbb6669a1204d6ce0317
X-Gm-Message-State: ALoCoQnKSnePp3KCWtzEIaku4VZhLlJRIP5Zm1IqmSsmJ5NwIfxCLRv3JpcTGprvMJDRwueoXEoES6naFb/57W3qoyD6wUZa7FkDuiULp3Ny7yWDsVV7+NKFcZFVDL7jeA5HxqWtR/LY
Cc: "oauth@ietf.org WG" <oauth@ietf.org>
Subject: Re: [OAUTH-WG] JWT - scope claim missing
X-BeenThere: oauth@ietf.org
X-Mailman-Version: 2.1.12
Precedence: list
List-Id: OAUTH WG <oauth.ietf.org>
List-Unsubscribe: <https://www.ietf.org/mailman/options/oauth>, <mailto:oauth-request@ietf.org?subject=unsubscribe>
List-Archive: <http://www.ietf.org/mail-archive/web/oauth>
List-Post: <mailto:oauth@ietf.org>
List-Help: <mailto:oauth-request@ietf.org?subject=help>
List-Subscribe: <https://www.ietf.org/mailman/listinfo/oauth>, <mailto:oauth-request@ietf.org?subject=subscribe>
X-List-Received-Date: Thu, 28 Feb 2013 19:36:58 -0000

--20cf3003bbb6669a1204d6ce0317
Content-Type: text/plain; charset=windows-1252
Content-Transfer-Encoding: quoted-printable

I do agree that a WG profile of a JWT-structured access token could lend
itself to interoperability and ultimately be a useful thing. But you are
right that there already are many implementations out there in the wild
(heck, I've written one myself) and that might make it difficult to
standardize on something.

Because of that, and many other reasons, I don't want to try and add that
to existing assertion drafts.


On Thu, Feb 28, 2013 at 12:13 PM, Lewis Adam-CAL022 <
Adam.Lewis@motorolasolutions.com> wrote:

>  Hi Brian, a few thoughts from somebody outside of the WG =85 ****
>
> ** **
>
> As a newcomer to OAuth last year, I was initially confused by the titles.
> It was confusing because we have SAML bearer **assertions** and JWT
> bearer **tokens** =85 and as John just (begrudgingly) stated in this
> thread, the JWT is being used as an assertion in this profile (and in
> OIDC).  I think it will be difficult to find a good name for these profil=
es
> since they do two entirely different things (e.g. define a new grant type
> and define a new method of client authentication).  One could argue that =
as
> long as the WG is at it, then why not add a third section to the JWT
> profile, which talks about usage of JWT-structured bearer access tokens: =
it
> would not be any less related than the other two focuses of the doc.  The=
n
> the document could be called something simple like =93profiles of JWT usa=
ge
> in OAuth=94 or something like that.  ****
>
> ** **
>
> On one hand, it is probably na=EFve to think that an access token can be
> standardized in a profile given how many have already been released into
> the wild, but on the other hand, a WG profile of a JWT-structured access
> token could lend itself to interoperability, where AS implementations can
> advertise conformance to the profile and who knows =85 maybe the RS=92s o=
f the
> future will be good with this.  ****
>
> ** **
>
> adam****
>
> ** **
>
> *From:* oauth-bounces@ietf.org [mailto:oauth-bounces@ietf.org] *On Behalf
> Of *Brian Campbell
> *Sent:* Thursday, February 28, 2013 1:03 PM
> *To:* John Bradley
> *Cc:* oauth@ietf.org WG
>
> *Subject:* Re: [OAUTH-WG] JWT - scope claim missing****
>
>  ** **
>
> I'm not sure anyone really "picked" the titles for the bearer token
> profiles. They just kind of evolved. And evolved in funny ways especially
> when client authn to the AS was added. ****
>
> You won't hear me argue that the titles are "good" and this is not the
> first time there's been confusion about what they actually do. They defin=
e
> new grant types and new client authentication methods. They *do not* defi=
ne
> an access token format or anything else about access tokens. JWT and SAML
> could be used for that but that's not what these drafts do. ****
>
> Suggestions for better title(s) would be more than welcome.****
>
> ** **
>
> Here's what they are now:****
>
>
> SAML 2.0 Bearer Assertion Profiles for OAuth 2.0
> draft-ietf-oauth-saml2-bearer
>
> JSON Web Token (JWT) Bearer Token Profiles for OAuth 2.0
> draft-ietf-oauth-jwt-bearer
>
> Assertion Framework for OAuth 2.0
> draft-ietf-oauth-assertions****
>
> ** **
>
> On Thu, Feb 28, 2013 at 11:36 AM, John Bradley <ve7jtb@ve7jtb.com> wrote:=
*
> ***
>
> Yes the title likely adds to the confusion given that the bearer tokens
> are not access tokens.****
>
> ** **
>
> Things as separate from OAuth as the Firefox browerID spec use JWS signed
> JWTs.  ****
>
> ** **
>
> The bearer token profiles for OAuth 2 are for OAuth2.****
>
> ** **
>
> The JSON Web Token (JWT)<http://tools.ietf.org/html/draft-ietf-oauth-json=
-web-token-06> spec
> did not start in OAuth and is not OAuth specific.****
>
> ** **
>
> A JWT is:****
>
> JSON Web Token (JWT)  A string representing a set of claims as a JSON****
>
>       object that is encoded in a JWS or JWE, enabling the claims to be**=
**
>
>       digitally signed or MACed and/or encrypted.****
>
>  ** **
>
> So OAuth or other profiles may define claims to go in a JWT, but the JWT
> needs to itself only define the claims necessary for security processing.
> ****
>
> ** **
>
> John B.****
>
> PS that was a soft ball If you hadn't responded I would have been
> disappointed.  I din't pick the title for the bearer token profiles.****
>
> ** **
>
> ** **
>
> On 2013-02-28, at 10:12 AM, Phil Hunt <phil.hunt@oracle.com> wrote:****
>
>
>
> ****
>  JSON Web Token (JWT) Bearer Token Profiles for OAuth 2.0****
>
>
> Note the title says "for OAuth2"****
>
> ** **
>
> Sorry. Couldn't resist. ****
>
> ** **
>
> Phil****
>
> ** **
>
> Sent from my phone.****
>
>
> On 2013-02-28, at 9:40, John Bradley <ve7jtb@ve7jtb.com> wrote:****
>
> JWT is an assertion( I am probably going to regret using that word).****
>
> ** **
>
> It is used in openID connect for id_tokens, it is used in OAuth for
> Assertion grant types and authentication of the client to the token
> endpoint.****
>
> http://tools.ietf.org/html/draft-ietf-oauth-jwt-bearer-04****
>
> ** **
>
> ** **
>
> ** **
>
> JSON Web Token (JWT) Bearer Token Profiles for OAuth 2.0****
>
> ** **
>
> Dosen't define JWT's use for access tokens for the RS.   ****
>
> ** **
>
> Bottom line JWT is for more than access tokens.****
>
> ** **
>
> John B.****
>
> ** **
>
> On 2013-02-28, at 9:28 AM, Phil Hunt <phil.hunt@oracle.com> wrote:****
>
>
>
> ****
>
> Are you saying jwt is not an access token type?
>
> Phil****
>
> ** **
>
> Sent from my phone.****
>
>
> On 2013-02-28, at 8:58, John Bradley <ve7jtb@ve7jtb.com> wrote:****
>
> Yes, defining scope in JWT is the wrong place.   JWT needs to stick to th=
e
> security claims needed to process JWT.****
>
> ** **
>
> I also don't know how far you get requiring a specific authorization
> format for JWT, some AS will wan to use a opaque reference, some might wa=
nt
> to use a user claim or role claim, others may use scopes,  combining scop=
es
> and claims is also possible.****
>
> ** **
>
> Right now it is up to a AS RS pair to agree on how to communicate
> authorization.   I don't want MAC to be more restrictive than bearer when
> it comes to authorization between AS and RS.****
>
> ** **
>
> Hannes wanted to know why JWT didn't define scope.  The simple answer is
> that it is out of scope for JWT itself.   It might be defined in a OAuth
> access token profile for JWT but it should not be specific to MAC.****
>
> ** **
>
> John B.****
>
> On 2013-02-28, at 8:44 AM, Brian Campbell <bcampbell@pingidentity.com>
> wrote:****
>
>
>
> ****
>
> I think John's point was more that scope is something rather specific to
> an OAuth access token and, while JWT is can be used to represent an acces=
s
> token, it's not the only application of JWT. The 'standard' claims in JWT
> are those that are believed (right or wrong) to be widely applicable acro=
ss
> different applications of JWT. One could argue about it but scope is
> probably not one of those.****
>
> It would probably make sense to try and build a profile of JWT
> specifically for OAuth access tokens (though I suspect there are some
> turtles and dragons in there), which might be the appropriate place to
> define/register a scope claim.****
>
> ** **
>
> On Thu, Feb 28, 2013 at 9:24 AM, Phil Hunt <phil.hunt@oracle.com> wrote:*=
*
> **
>
> Are you advocating TWO systems? That seems like a bad choice.
>
> I would rather fix scope than go to a two system approach.
>
> Phil
>
> Sent from my phone.
>
> On 2013-02-28, at 8:17, John Bradley <ve7jtb@ve7jtb.com> wrote:
>
> > While scope is one method that a AS could communicate authorization to =
a
> RS, it is not the only or perhaps even the most likely one.
> > Using scope requires a relatively tight binding between the RS and AS,
>  UMA uses a different mechanism that describes finer grained operations.
> > The AS may include roles, user, or other more abstract claims that the
> the client may (god help them) pass on to EXCML for processing.
> >
> > While having a scopes claim is possible, like any other claim it is not
> part of the JWT core security processing claims, and needs to be defined =
by
> extension.
> >
> > John B.
> > On 2013-02-28, at 2:29 AM, Hannes Tschofenig <hannes.tschofenig@gmx.net=
>
> wrote:
> >
> >> Hi Mike,
> >>
> >> when I worked on the MAC specification I noticed that the JWT does not
> have a claim for the scope. I believe that this would be needed to allow
> the resource server to verify whether the scope the authorization server
> authorized is indeed what the client is asking for.
> >>
> >> Ciao
> >> Hannes
> >>
> >> _______________________________________________
> >> OAuth mailing list
> >> OAuth@ietf.org
> >> https://www.ietf.org/mailman/listinfo/oauth
> >
> > _______________________________________________
> > OAuth mailing list
> > OAuth@ietf.org
> > https://www.ietf.org/mailman/listinfo/oauth
> _______________________________________________
> OAuth mailing list
> OAuth@ietf.org
> https://www.ietf.org/mailman/listinfo/oauth****
>
> ** **
>
> ** **
>
>  ** **
>
>  ** **
>
> ** **
>

--20cf3003bbb6669a1204d6ce0317
Content-Type: text/html; charset=windows-1252
Content-Transfer-Encoding: quoted-printable

<div dir=3D"ltr"><div>I do agree that a WG profile of a JWT-structured acce=
ss token could lend itself to interoperability and ultimately be a useful t=
hing. But you are right that there already are many implementations out the=
re in the wild (heck, I&#39;ve written one myself) and that might make it d=
ifficult to standardize on something.<br>


<br></div>Because of that, and many other reasons, I don&#39;t want to try =
and add that to existing assertion drafts.<br><div class=3D"gmail_extra"><b=
r><br><div class=3D"gmail_quote">On Thu, Feb 28, 2013 at 12:13 PM, Lewis Ad=
am-CAL022 <span dir=3D"ltr">&lt;<a href=3D"mailto:Adam.Lewis@motorolasoluti=
ons.com" target=3D"_blank">Adam.Lewis@motorolasolutions.com</a>&gt;</span> =
wrote:<br>


<blockquote class=3D"gmail_quote" style=3D"margin:0 0 0 .8ex;border-left:1p=
x #ccc solid;padding-left:1ex">





<div link=3D"blue" vlink=3D"purple" lang=3D"EN-US">
<div>
<p class=3D"MsoNormal"><span style=3D"font-size:10.5pt;font-family:&quot;Bo=
ok Antiqua&quot;,&quot;serif&quot;;color:olive">Hi Brian, a few thoughts fr=
om somebody outside of the WG =85
<u></u><u></u></span></p>
<p class=3D"MsoNormal"><span style=3D"font-size:10.5pt;font-family:&quot;Bo=
ok Antiqua&quot;,&quot;serif&quot;;color:olive"><u></u>=A0<u></u></span></p=
>
<p class=3D"MsoNormal"><span style=3D"font-size:10.5pt;font-family:&quot;Bo=
ok Antiqua&quot;,&quot;serif&quot;;color:olive">As a newcomer to OAuth last=
 year, I was initially confused by the titles.=A0 It was confusing because =
we have SAML bearer *<b>assertions</b>* and JWT bearer *<b>tokens</b>*
 =85 and as John just (begrudgingly) stated in this thread, the JWT is bein=
g used as an assertion in this profile (and in OIDC).=A0 I think it will be=
 difficult to find a good name for these profiles since they do two entirel=
y different things (e.g. define a new
 grant type and define a new method of client authentication).=A0 One could=
 argue that as long as the WG is at it, then why not add a third section to=
 the JWT profile, which talks about usage of JWT-structured bearer access t=
okens: it would not be any less related
 than the other two focuses of the doc.=A0 Then the document could be calle=
d something simple like =93profiles of JWT usage in OAuth=94 or something l=
ike that.=A0
<u></u><u></u></span></p>
<p class=3D"MsoNormal"><span style=3D"font-size:10.5pt;font-family:&quot;Bo=
ok Antiqua&quot;,&quot;serif&quot;;color:olive"><u></u>=A0<u></u></span></p=
>
<p class=3D"MsoNormal"><span style=3D"font-size:10.5pt;font-family:&quot;Bo=
ok Antiqua&quot;,&quot;serif&quot;;color:olive">On one hand, it is probably=
 na=EFve to think that an access token can be standardized in a profile giv=
en how many have already been released into the wild, but
 on the other hand, a WG profile of a JWT-structured access token could len=
d itself to interoperability, where AS implementations can advertise confor=
mance to the profile and who knows =85 maybe the RS=92s of the future will =
be good with this.=A0
<u></u><u></u></span></p>
<p class=3D"MsoNormal"><span style=3D"font-size:10.5pt;font-family:&quot;Bo=
ok Antiqua&quot;,&quot;serif&quot;;color:olive"><u></u>=A0<u></u></span></p=
>
<p class=3D"MsoNormal"><span style=3D"font-size:10.5pt;font-family:&quot;Bo=
ok Antiqua&quot;,&quot;serif&quot;;color:olive">adam<u></u><u></u></span></=
p>
<p class=3D"MsoNormal"><span style=3D"font-size:10.5pt;font-family:&quot;Bo=
ok Antiqua&quot;,&quot;serif&quot;;color:olive"><u></u>=A0<u></u></span></p=
>
<div style=3D"border:none;border-top:solid #b5c4df 1.0pt;padding:3.0pt 0in =
0in 0in">
<p class=3D"MsoNormal"><b><span style=3D"font-size:10.0pt;font-family:&quot=
;Tahoma&quot;,&quot;sans-serif&quot;">From:</span></b><span style=3D"font-s=
ize:10.0pt;font-family:&quot;Tahoma&quot;,&quot;sans-serif&quot;"> <a href=
=3D"mailto:oauth-bounces@ietf.org" target=3D"_blank">oauth-bounces@ietf.org=
</a> [mailto:<a href=3D"mailto:oauth-bounces@ietf.org" target=3D"_blank">oa=
uth-bounces@ietf.org</a>]
<b>On Behalf Of </b>Brian Campbell<br>
<b>Sent:</b> Thursday, February 28, 2013 1:03 PM<br>
<b>To:</b> John Bradley<br>
<b>Cc:</b> <a href=3D"mailto:oauth@ietf.org" target=3D"_blank">oauth@ietf.o=
rg</a> WG</span></p><div><br>
<b>Subject:</b> Re: [OAUTH-WG] JWT - scope claim missing<u></u><u></u></div=
><p></p>
</div>
<p class=3D"MsoNormal"><u></u>=A0<u></u></p>
<div>
<div>
<p class=3D"MsoNormal" style=3D"margin-bottom:12.0pt">I&#39;m not sure anyo=
ne really &quot;picked&quot; the titles for the bearer token profiles. They=
 just kind of evolved. And evolved in funny ways especially when client aut=
hn to the AS was added.
<u></u><u></u></p>
</div><div><div>
<div>
<p class=3D"MsoNormal" style=3D"margin-bottom:12.0pt">You won&#39;t hear me=
 argue that the titles are &quot;good&quot; and this is not the first time =
there&#39;s been confusion about what they actually do. They define new gra=
nt types and new client authentication methods. They *do
 not* define an access token format or anything else about access tokens. J=
WT and SAML could be used for that but that&#39;s not what these drafts do.
<u></u><u></u></p>
</div>
<div>
<p class=3D"MsoNormal">Suggestions for better title(s) would be more than w=
elcome.<u></u><u></u></p>
</div>
<div>
<div>
<p class=3D"MsoNormal"><u></u>=A0<u></u></p>
</div>
<div>
<p class=3D"MsoNormal">Here&#39;s what they are now:<u></u><u></u></p>
</div>
<div>
<p class=3D"MsoNormal"><br>
SAML 2.0 Bearer Assertion Profiles for OAuth 2.0<br>
draft-ietf-oauth-saml2-bearer<br>
<br>
JSON Web Token (JWT) Bearer Token Profiles for OAuth 2.0<br>
draft-ietf-oauth-jwt-bearer<br>
<br>
Assertion Framework for OAuth 2.0<br>
draft-ietf-oauth-assertions<u></u><u></u></p>
<div>
<p class=3D"MsoNormal"><u></u>=A0<u></u></p>
<div>
<p class=3D"MsoNormal">On Thu, Feb 28, 2013 at 11:36 AM, John Bradley &lt;<=
a href=3D"mailto:ve7jtb@ve7jtb.com" target=3D"_blank">ve7jtb@ve7jtb.com</a>=
&gt; wrote:<u></u><u></u></p>
<div>
<p class=3D"MsoNormal">Yes the title likely adds to the confusion given tha=
t the bearer tokens are not access tokens.<u></u><u></u></p>
<div>
<p class=3D"MsoNormal"><u></u>=A0<u></u></p>
</div>
<div>
<p class=3D"MsoNormal">Things as separate from OAuth as the Firefox browerI=
D spec use JWS signed JWTs. =A0<u></u><u></u></p>
</div>
<div>
<p class=3D"MsoNormal"><u></u>=A0<u></u></p>
</div>
<div>
<p class=3D"MsoNormal">The bearer token profiles for OAuth 2 are for OAuth2=
.<u></u><u></u></p>
</div>
<div>
<p class=3D"MsoNormal"><u></u>=A0<u></u></p>
</div>
<div>
<p class=3D"MsoNormal">The=A0<a href=3D"http://tools.ietf.org/html/draft-ie=
tf-oauth-json-web-token-06" target=3D"_blank">JSON Web Token (JWT)</a>=A0sp=
ec did not start in OAuth and is not OAuth specific.<u></u><u></u></p>
</div>
<div>
<p class=3D"MsoNormal"><u></u>=A0<u></u></p>
</div>
<div>
<p class=3D"MsoNormal">A JWT is:<u></u><u></u></p>
</div>
<div>
<pre><span style=3D"font-size:12.0pt">JSON Web Token (JWT)=A0 A string repr=
esenting a set of claims as a JSON<u></u><u></u></span></pre>
<pre><span style=3D"font-size:12.0pt">=A0=A0=A0=A0=A0 object that is encode=
d in a JWS or JWE, enabling the claims to be<u></u><u></u></span></pre>
<pre><span style=3D"font-size:12.0pt">=A0=A0=A0=A0=A0 digitally signed or M=
ACed and/or encrypted.<u></u><u></u></span></pre>
<div>
<p class=3D"MsoNormal"><u></u>=A0<u></u></p>
</div>
<div>
<p class=3D"MsoNormal">So OAuth or other profiles may define claims to go i=
n a JWT, but the JWT needs to itself only define the claims necessary for s=
ecurity processing. =A0<u></u><u></u></p>
</div>
<div>
<p class=3D"MsoNormal"><u></u>=A0<u></u></p>
</div>
<div>
<p class=3D"MsoNormal">John B.<u></u><u></u></p>
</div>
<div>
<p class=3D"MsoNormal">PS that was a soft ball If you hadn&#39;t responded =
I would have been disappointed. =A0I din&#39;t pick the title for the beare=
r token profiles.<u></u><u></u></p>
</div>
<div>
<div>
<div>
<p class=3D"MsoNormal"><u></u>=A0<u></u></p>
</div>
<div>
<p class=3D"MsoNormal"><u></u>=A0<u></u></p>
</div>
<div>
<div>
<p class=3D"MsoNormal">On 2013-02-28, at 10:12 AM, Phil Hunt &lt;<a href=3D=
"mailto:phil.hunt@oracle.com" target=3D"_blank">phil.hunt@oracle.com</a>&gt=
; wrote:<u></u><u></u></p>
</div>
<p class=3D"MsoNormal"><br>
<br>
<u></u><u></u></p>
<div>
<div>
<h1><span style=3D"font-family:&quot;Helvetica&quot;,&quot;sans-serif&quot;=
">JSON Web Token (JWT) Bearer Token Profiles for OAuth 2.0<u></u><u></u></s=
pan></h1>
<p class=3D"MsoNormal"><br>
Note the title says &quot;for OAuth2&quot;<u></u><u></u></p>
</div>
<div>
<p class=3D"MsoNormal"><u></u>=A0<u></u></p>
</div>
<div>
<p class=3D"MsoNormal">Sorry. Couldn&#39;t resist.=A0<u></u><u></u></p>
</div>
<div>
<p class=3D"MsoNormal"><u></u>=A0<u></u></p>
</div>
<div>
<p class=3D"MsoNormal">Phil<u></u><u></u></p>
<div>
<p class=3D"MsoNormal"><u></u>=A0<u></u></p>
</div>
<div>
<p class=3D"MsoNormal">Sent from my phone.<u></u><u></u></p>
</div>
</div>
<div>
<p class=3D"MsoNormal" style=3D"margin-bottom:12.0pt"><br>
On 2013-02-28, at 9:40, John Bradley &lt;<a href=3D"mailto:ve7jtb@ve7jtb.co=
m" target=3D"_blank">ve7jtb@ve7jtb.com</a>&gt; wrote:<u></u><u></u></p>
</div>
<blockquote style=3D"margin-top:5.0pt;margin-bottom:5.0pt">
<p class=3D"MsoNormal">JWT is an assertion( I am probably going to regret u=
sing that word).<u></u><u></u></p>
<div>
<p class=3D"MsoNormal"><u></u>=A0<u></u></p>
</div>
<div>
<p class=3D"MsoNormal">It is used in openID connect for id_tokens, it is us=
ed in OAuth for Assertion grant types and authentication of the client to t=
he token endpoint.<u></u><u></u></p>
</div>
<div>
<p class=3D"MsoNormal"><a href=3D"http://tools.ietf.org/html/draft-ietf-oau=
th-jwt-bearer-04" target=3D"_blank">http://tools.ietf.org/html/draft-ietf-o=
auth-jwt-bearer-04</a><u></u><u></u></p>
</div>
<div>
<p class=3D"MsoNormal"><u></u>=A0<u></u></p>
</div>
<div>
<pre><span style=3D"font-size:12.0pt"><u></u>=A0<u></u></span></pre>
<pre><span style=3D"font-size:12.0pt"><u></u>=A0<u></u></span></pre>
<h1><span style=3D"font-size:12.0pt;font-family:&quot;Courier New&quot;">JS=
ON Web Token (JWT) Bearer Token Profiles for OAuth 2.0<u></u><u></u></span>=
</h1>
<div>
<p class=3D"MsoNormal"><u></u>=A0<u></u></p>
</div>
<div>
<p class=3D"MsoNormal">Dosen&#39;t define JWT&#39;s use for access tokens f=
or the RS. =A0=A0<u></u><u></u></p>
</div>
<div>
<p class=3D"MsoNormal"><u></u>=A0<u></u></p>
</div>
<div>
<p class=3D"MsoNormal">Bottom line JWT is for more than access tokens.<u></=
u><u></u></p>
</div>
<div>
<p class=3D"MsoNormal"><u></u>=A0<u></u></p>
</div>
<div>
<p class=3D"MsoNormal">John B.<u></u><u></u></p>
</div>
<div>
<p class=3D"MsoNormal"><u></u>=A0<u></u></p>
</div>
<div>
<div>
<p class=3D"MsoNormal">On 2013-02-28, at 9:28 AM, Phil Hunt &lt;<a href=3D"=
mailto:phil.hunt@oracle.com" target=3D"_blank">phil.hunt@oracle.com</a>&gt;=
 wrote:<u></u><u></u></p>
</div>
<p class=3D"MsoNormal"><br>
<br>
<u></u><u></u></p>
<div>
<div>
<p class=3D"MsoNormal">Are you saying jwt is not an access token type?<br>
<br>
Phil<u></u><u></u></p>
<div>
<p class=3D"MsoNormal"><u></u>=A0<u></u></p>
</div>
<div>
<p class=3D"MsoNormal">Sent from my phone.<u></u><u></u></p>
</div>
</div>
<div>
<p class=3D"MsoNormal" style=3D"margin-bottom:12.0pt"><br>
On 2013-02-28, at 8:58, John Bradley &lt;<a href=3D"mailto:ve7jtb@ve7jtb.co=
m" target=3D"_blank">ve7jtb@ve7jtb.com</a>&gt; wrote:<u></u><u></u></p>
</div>
<blockquote style=3D"margin-top:5.0pt;margin-bottom:5.0pt">
<p class=3D"MsoNormal">Yes, defining scope in JWT is the wrong place. =A0 J=
WT needs to stick to the security claims needed to process JWT.<u></u><u></=
u></p>
<div>
<p class=3D"MsoNormal"><u></u>=A0<u></u></p>
</div>
<div>
<p class=3D"MsoNormal">I also don&#39;t know how far you get requiring a sp=
ecific authorization format for JWT, some AS will wan to use a opaque refer=
ence, some might want to use a user claim or role claim, others may use sco=
pes, =A0combining scopes and claims is also
 possible.<u></u><u></u></p>
</div>
<div>
<p class=3D"MsoNormal"><u></u>=A0<u></u></p>
</div>
<div>
<p class=3D"MsoNormal">Right now it is up to a AS RS pair to agree on how t=
o communicate authorization. =A0 I don&#39;t want MAC to be more restrictiv=
e than bearer when it comes to authorization between AS and RS.<u></u><u></=
u></p>



<div>
<p class=3D"MsoNormal"><u></u>=A0<u></u></p>
</div>
<div>
<p class=3D"MsoNormal">Hannes wanted to know why JWT didn&#39;t define scop=
e. =A0The simple answer is that it is out of scope for JWT itself. =A0 It m=
ight be defined in a OAuth access token profile for JWT but it should not b=
e specific to MAC.<u></u><u></u></p>



</div>
<div>
<p class=3D"MsoNormal"><u></u>=A0<u></u></p>
</div>
<div>
<p class=3D"MsoNormal">John B.<u></u><u></u></p>
</div>
<div>
<div>
<div>
<p class=3D"MsoNormal">On 2013-02-28, at 8:44 AM, Brian Campbell &lt;<a hre=
f=3D"mailto:bcampbell@pingidentity.com" target=3D"_blank">bcampbell@pingide=
ntity.com</a>&gt; wrote:<u></u><u></u></p>
</div>
<p class=3D"MsoNormal"><br>
<br>
<u></u><u></u></p>
<div>
<div>
<p class=3D"MsoNormal" style=3D"margin-bottom:12.0pt">I think John&#39;s po=
int was more that scope is something rather specific to an OAuth access tok=
en and, while JWT is can be used to represent an access token, it&#39;s not=
 the only application of JWT. The &#39;standard&#39;
 claims in JWT are those that are believed (right or wrong) to be widely ap=
plicable across different applications of JWT. One could argue about it but=
 scope is probably not one of those.<u></u><u></u></p>
</div>
<p class=3D"MsoNormal">It would probably make sense to try and build a prof=
ile of JWT specifically for OAuth access tokens (though I suspect there are=
 some turtles and dragons in there), which might be the appropriate place t=
o define/register a scope claim.<u></u><u></u></p>



</div>
<div>
<p class=3D"MsoNormal" style=3D"margin-bottom:12.0pt"><u></u>=A0<u></u></p>
<div>
<p class=3D"MsoNormal">On Thu, Feb 28, 2013 at 9:24 AM, Phil Hunt &lt;<a hr=
ef=3D"mailto:phil.hunt@oracle.com" target=3D"_blank">phil.hunt@oracle.com</=
a>&gt; wrote:<u></u><u></u></p>
<p class=3D"MsoNormal">Are you advocating TWO systems? That seems like a ba=
d choice.<br>
<br>
I would rather fix scope than go to a two system approach.<br>
<br>
Phil<br>
<br>
Sent from my phone.<br>
<br>
On 2013-02-28, at 8:17, John Bradley &lt;<a href=3D"mailto:ve7jtb@ve7jtb.co=
m" target=3D"_blank">ve7jtb@ve7jtb.com</a>&gt; wrote:<br>
<br>
&gt; While scope is one method that a AS could communicate authorization to=
 a RS, it is not the only or perhaps even the most likely one.<br>
&gt; Using scope requires a relatively tight binding between the RS and AS,=
 =A0UMA uses a different mechanism that describes finer grained operations.=
<br>
&gt; The AS may include roles, user, or other more abstract claims that the=
 the client may (god help them) pass on to EXCML for processing.<br>
&gt;<br>
&gt; While having a scopes claim is possible, like any other claim it is no=
t part of the JWT core security processing claims, and needs to be defined =
by extension.<br>
&gt;<br>
&gt; John B.<br>
&gt; On 2013-02-28, at 2:29 AM, Hannes Tschofenig &lt;<a href=3D"mailto:han=
nes.tschofenig@gmx.net" target=3D"_blank">hannes.tschofenig@gmx.net</a>&gt;=
 wrote:<br>
&gt;<br>
&gt;&gt; Hi Mike,<br>
&gt;&gt;<br>
&gt;&gt; when I worked on the MAC specification I noticed that the JWT does=
 not have a claim for the scope. I believe that this would be needed to all=
ow the resource server to verify whether the scope the authorization server=
 authorized is indeed what the client
 is asking for.<br>
&gt;&gt;<br>
&gt;&gt; Ciao<br>
&gt;&gt; Hannes<br>
&gt;&gt;<br>
&gt;&gt; _______________________________________________<br>
&gt;&gt; OAuth mailing list<br>
&gt;&gt; <a href=3D"mailto:OAuth@ietf.org" target=3D"_blank">OAuth@ietf.org=
</a><br>
&gt;&gt; <a href=3D"https://www.ietf.org/mailman/listinfo/oauth" target=3D"=
_blank">https://www.ietf.org/mailman/listinfo/oauth</a><br>
&gt;<br>
&gt; _______________________________________________<br>
&gt; OAuth mailing list<br>
&gt; <a href=3D"mailto:OAuth@ietf.org" target=3D"_blank">OAuth@ietf.org</a>=
<br>
&gt; <a href=3D"https://www.ietf.org/mailman/listinfo/oauth" target=3D"_bla=
nk">https://www.ietf.org/mailman/listinfo/oauth</a><br>
_______________________________________________<br>
OAuth mailing list<br>
<a href=3D"mailto:OAuth@ietf.org" target=3D"_blank">OAuth@ietf.org</a><br>
<a href=3D"https://www.ietf.org/mailman/listinfo/oauth" target=3D"_blank">h=
ttps://www.ietf.org/mailman/listinfo/oauth</a><u></u><u></u></p>
</div>
<p class=3D"MsoNormal"><u></u>=A0<u></u></p>
</div>
</div>
<p class=3D"MsoNormal"><u></u>=A0<u></u></p>
</div>
</div>
</blockquote>
</div>
</div>
<p class=3D"MsoNormal"><u></u>=A0<u></u></p>
</div>
</blockquote>
</div>
</div>
<p class=3D"MsoNormal"><u></u>=A0<u></u></p>
</div>
</div>
</div>
</div>
</div>
<p class=3D"MsoNormal"><u></u>=A0<u></u></p>
</div>
</div>
</div>
</div></div></div>
</div>
</div>

</blockquote></div><br></div></div>

--20cf3003bbb6669a1204d6ce0317--

From jricher@mitre.org  Thu Feb 28 11:40:44 2013
Return-Path: <jricher@mitre.org>
X-Original-To: oauth@ietfa.amsl.com
Delivered-To: oauth@ietfa.amsl.com
Received: from localhost (localhost [127.0.0.1]) by ietfa.amsl.com (Postfix) with ESMTP id 4481421F86F4 for <oauth@ietfa.amsl.com>; Thu, 28 Feb 2013 11:40:44 -0800 (PST)
X-Virus-Scanned: amavisd-new at amsl.com
X-Spam-Flag: NO
X-Spam-Score: -6.578
X-Spam-Level: 
X-Spam-Status: No, score=-6.578 tagged_above=-999 required=5 tests=[AWL=0.020,  BAYES_00=-2.599, HTML_MESSAGE=0.001, RCVD_IN_DNSWL_MED=-4]
Received: from mail.ietf.org ([64.170.98.30]) by localhost (ietfa.amsl.com [127.0.0.1]) (amavisd-new, port 10024) with ESMTP id zVpsRu43ERor for <oauth@ietfa.amsl.com>; Thu, 28 Feb 2013 11:40:39 -0800 (PST)
Received: from smtpksrv1.mitre.org (smtpksrv1.mitre.org [198.49.146.77]) by ietfa.amsl.com (Postfix) with ESMTP id 4130B21F8717 for <oauth@ietf.org>; Thu, 28 Feb 2013 11:40:29 -0800 (PST)
Received: from smtpksrv1.mitre.org (localhost.localdomain [127.0.0.1]) by localhost (Postfix) with SMTP id 509301F04A7; Thu, 28 Feb 2013 14:40:28 -0500 (EST)
Received: from IMCCAS04.MITRE.ORG (imccas04.mitre.org [129.83.29.81]) by smtpksrv1.mitre.org (Postfix) with ESMTP id 2FB4C1F0499; Thu, 28 Feb 2013 14:40:28 -0500 (EST)
Received: from [10.146.15.29] (129.83.31.58) by IMCCAS04.MITRE.ORG (129.83.29.81) with Microsoft SMTP Server (TLS) id 14.2.318.4; Thu, 28 Feb 2013 14:40:27 -0500
Message-ID: <512FB26D.5030401@mitre.org>
Date: Thu, 28 Feb 2013 14:39:25 -0500
From: Justin Richer <jricher@mitre.org>
User-Agent: Mozilla/5.0 (X11; Linux i686; rv:17.0) Gecko/20130106 Thunderbird/17.0.2
MIME-Version: 1.0
To: Brian Campbell <bcampbell@pingidentity.com>
References: <0EC2404F-E3C5-4AD1-88B4-E74AA0394DD9@gmx.net> <C75E4871-E907-4EF7-BAF0-9D1A172D581B@ve7jtb.com> <CA6A6425-D0CE-469F-B51E-9F296DA8041C@oracle.com> <CA+k3eCREgN+6z+U=jjJcPo0nZVR0GWn5zXeecZRO+rg=xd-gZg@mail.gmail.com> <A2375FE9-946F-46B3-9356-0709DD56BD4A@ve7jtb.com> <48FD87D1-4DF4-4289-99B7-40A515F31890@oracle.com> <3E472720-31A4-40A0-AAA4-402CF850831A@ve7jtb.com> <7127843B-D7B0-4AB6-87F1-1604D1EFFA79@oracle.com> <50DA292F-32F0-4266-8401-006AD837B775@ve7jtb.com> <CA+k3eCSyE3cPMh17XuivbUZUtHY=RAtjV1UeCdW6gGFk+gv02A@mail.gmail.com> <59E470B10C4630419ED717AC79FCF9A948D58BEE@BY2PRD0411MB441.namprd04.prod.outlook.com> <CA+k3eCSD3EqtNC0Z--+HKwENW9pbzCNGp2_LyVp0bAphvThnRA@mail.gmail.com>
In-Reply-To: <CA+k3eCSD3EqtNC0Z--+HKwENW9pbzCNGp2_LyVp0bAphvThnRA@mail.gmail.com>
Content-Type: multipart/alternative; boundary="------------080405010908090104000606"
X-Originating-IP: [129.83.31.58]
Cc: "oauth@ietf.org WG" <oauth@ietf.org>
Subject: Re: [OAUTH-WG] JWT - scope claim missing
X-BeenThere: oauth@ietf.org
X-Mailman-Version: 2.1.12
Precedence: list
List-Id: OAUTH WG <oauth.ietf.org>
List-Unsubscribe: <https://www.ietf.org/mailman/options/oauth>, <mailto:oauth-request@ietf.org?subject=unsubscribe>
List-Archive: <http://www.ietf.org/mail-archive/web/oauth>
List-Post: <mailto:oauth@ietf.org>
List-Help: <mailto:oauth-request@ietf.org?subject=help>
List-Subscribe: <https://www.ietf.org/mailman/listinfo/oauth>, <mailto:oauth-request@ietf.org?subject=subscribe>
X-List-Received-Date: Thu, 28 Feb 2013 19:40:44 -0000

--------------080405010908090104000606
Content-Type: text/plain; charset="ISO-8859-1"; format=flowed
Content-Transfer-Encoding: 8bit

It doesn't belong in the assertion drafts, but maybe it can be combined 
with the token introspection piece I've started (but isn't an item yet)? 
I think that would address the other thread that Hannes was talking 
about as well. We'd essentially be defining one set of token metadata 
(including scopes, client_id, subject, audience, expiration and a few 
others) and two methods to get at it: either by making an introspection 
call, or by packing it into the token directly. And the two could even 
work together if you wanted to.

  -- Justin

On 02/28/2013 02:36 PM, Brian Campbell wrote:
> I do agree that a WG profile of a JWT-structured access token could 
> lend itself to interoperability and ultimately be a useful thing. But 
> you are right that there already are many implementations out there in 
> the wild (heck, I've written one myself) and that might make it 
> difficult to standardize on something.
>
> Because of that, and many other reasons, I don't want to try and add 
> that to existing assertion drafts.
>
>
> On Thu, Feb 28, 2013 at 12:13 PM, Lewis Adam-CAL022 
> <Adam.Lewis@motorolasolutions.com 
> <mailto:Adam.Lewis@motorolasolutions.com>> wrote:
>
>     Hi Brian, a few thoughts from somebody outside of the WG ...
>
>     As a newcomer to OAuth last year, I was initially confused by the
>     titles.  It was confusing because we have SAML bearer
>     **assertions** and JWT bearer **tokens** ... and as John just
>     (begrudgingly) stated in this thread, the JWT is being used as an
>     assertion in this profile (and in OIDC).  I think it will be
>     difficult to find a good name for these profiles since they do two
>     entirely different things (e.g. define a new grant type and define
>     a new method of client authentication).  One could argue that as
>     long as the WG is at it, then why not add a third section to the
>     JWT profile, which talks about usage of JWT-structured bearer
>     access tokens: it would not be any less related than the other two
>     focuses of the doc.  Then the document could be called something
>     simple like "profiles of JWT usage in OAuth" or something like that.
>
>     On one hand, it is probably naïve to think that an access token
>     can be standardized in a profile given how many have already been
>     released into the wild, but on the other hand, a WG profile of a
>     JWT-structured access token could lend itself to interoperability,
>     where AS implementations can advertise conformance to the profile
>     and who knows ... maybe the RS's of the future will be good with
>     this.
>
>     adam
>
>     *From:*oauth-bounces@ietf.org <mailto:oauth-bounces@ietf.org>
>     [mailto:oauth-bounces@ietf.org <mailto:oauth-bounces@ietf.org>]
>     *On Behalf Of *Brian Campbell
>     *Sent:* Thursday, February 28, 2013 1:03 PM
>     *To:* John Bradley
>     *Cc:* oauth@ietf.org <mailto:oauth@ietf.org> WG
>
>
>     *Subject:* Re: [OAUTH-WG] JWT - scope claim missing
>
>     I'm not sure anyone really "picked" the titles for the bearer
>     token profiles. They just kind of evolved. And evolved in funny
>     ways especially when client authn to the AS was added.
>
>     You won't hear me argue that the titles are "good" and this is not
>     the first time there's been confusion about what they actually do.
>     They define new grant types and new client authentication methods.
>     They *do not* define an access token format or anything else about
>     access tokens. JWT and SAML could be used for that but that's not
>     what these drafts do.
>
>     Suggestions for better title(s) would be more than welcome.
>
>     Here's what they are now:
>
>
>     SAML 2.0 Bearer Assertion Profiles for OAuth 2.0
>     draft-ietf-oauth-saml2-bearer
>
>     JSON Web Token (JWT) Bearer Token Profiles for OAuth 2.0
>     draft-ietf-oauth-jwt-bearer
>
>     Assertion Framework for OAuth 2.0
>     draft-ietf-oauth-assertions
>
>     On Thu, Feb 28, 2013 at 11:36 AM, John Bradley <ve7jtb@ve7jtb.com
>     <mailto:ve7jtb@ve7jtb.com>> wrote:
>
>     Yes the title likely adds to the confusion given that the bearer
>     tokens are not access tokens.
>
>     Things as separate from OAuth as the Firefox browerID spec use JWS
>     signed JWTs.
>
>     The bearer token profiles for OAuth 2 are for OAuth2.
>
>     The JSON Web Token (JWT)
>     <http://tools.ietf.org/html/draft-ietf-oauth-json-web-token-06> spec
>     did not start in OAuth and is not OAuth specific.
>
>     A JWT is:
>
>     JSON Web Token (JWT)  A string representing a set of claims as a JSON
>
>            object that is encoded in a JWS or JWE, enabling the claims to be
>
>            digitally signed or MACed and/or encrypted.
>
>     So OAuth or other profiles may define claims to go in a JWT, but
>     the JWT needs to itself only define the claims necessary for
>     security processing.
>
>     John B.
>
>     PS that was a soft ball If you hadn't responded I would have been
>     disappointed.  I din't pick the title for the bearer token profiles.
>
>     On 2013-02-28, at 10:12 AM, Phil Hunt <phil.hunt@oracle.com
>     <mailto:phil.hunt@oracle.com>> wrote:
>
>
>
>       JSON Web Token (JWT) Bearer Token Profiles for OAuth 2.0
>
>
>     Note the title says "for OAuth2"
>
>     Sorry. Couldn't resist.
>
>     Phil
>
>     Sent from my phone.
>
>
>     On 2013-02-28, at 9:40, John Bradley <ve7jtb@ve7jtb.com
>     <mailto:ve7jtb@ve7jtb.com>> wrote:
>
>         JWT is an assertion( I am probably going to regret using that
>         word).
>
>         It is used in openID connect for id_tokens, it is used in
>         OAuth for Assertion grant types and authentication of the
>         client to the token endpoint.
>
>         http://tools.ietf.org/html/draft-ietf-oauth-jwt-bearer-04
>
>           
>
>           
>
>
>           JSON Web Token (JWT) Bearer Token Profiles for OAuth 2.0
>
>         Dosen't define JWT's use for access tokens for the RS.
>
>         Bottom line JWT is for more than access tokens.
>
>         John B.
>
>         On 2013-02-28, at 9:28 AM, Phil Hunt <phil.hunt@oracle.com
>         <mailto:phil.hunt@oracle.com>> wrote:
>
>
>
>         Are you saying jwt is not an access token type?
>
>         Phil
>
>         Sent from my phone.
>
>
>         On 2013-02-28, at 8:58, John Bradley <ve7jtb@ve7jtb.com
>         <mailto:ve7jtb@ve7jtb.com>> wrote:
>
>             Yes, defining scope in JWT is the wrong place. JWT needs
>             to stick to the security claims needed to process JWT.
>
>             I also don't know how far you get requiring a specific
>             authorization format for JWT, some AS will wan to use a
>             opaque reference, some might want to use a user claim or
>             role claim, others may use scopes,  combining scopes and
>             claims is also possible.
>
>             Right now it is up to a AS RS pair to agree on how to
>             communicate authorization.   I don't want MAC to be more
>             restrictive than bearer when it comes to authorization
>             between AS and RS.
>
>             Hannes wanted to know why JWT didn't define scope.  The
>             simple answer is that it is out of scope for JWT itself.  
>             It might be defined in a OAuth access token profile for
>             JWT but it should not be specific to MAC.
>
>             John B.
>
>             On 2013-02-28, at 8:44 AM, Brian Campbell
>             <bcampbell@pingidentity.com
>             <mailto:bcampbell@pingidentity.com>> wrote:
>
>
>
>             I think John's point was more that scope is something
>             rather specific to an OAuth access token and, while JWT is
>             can be used to represent an access token, it's not the
>             only application of JWT. The 'standard' claims in JWT are
>             those that are believed (right or wrong) to be widely
>             applicable across different applications of JWT. One could
>             argue about it but scope is probably not one of those.
>
>             It would probably make sense to try and build a profile of
>             JWT specifically for OAuth access tokens (though I suspect
>             there are some turtles and dragons in there), which might
>             be the appropriate place to define/register a scope claim.
>
>             On Thu, Feb 28, 2013 at 9:24 AM, Phil Hunt
>             <phil.hunt@oracle.com <mailto:phil.hunt@oracle.com>> wrote:
>
>             Are you advocating TWO systems? That seems like a bad choice.
>
>             I would rather fix scope than go to a two system approach.
>
>             Phil
>
>             Sent from my phone.
>
>             On 2013-02-28, at 8:17, John Bradley <ve7jtb@ve7jtb.com
>             <mailto:ve7jtb@ve7jtb.com>> wrote:
>
>             > While scope is one method that a AS could communicate
>             authorization to a RS, it is not the only or perhaps even
>             the most likely one.
>             > Using scope requires a relatively tight binding between
>             the RS and AS,  UMA uses a different mechanism that
>             describes finer grained operations.
>             > The AS may include roles, user, or other more abstract
>             claims that the the client may (god help them) pass on to
>             EXCML for processing.
>             >
>             > While having a scopes claim is possible, like any other
>             claim it is not part of the JWT core security processing
>             claims, and needs to be defined by extension.
>             >
>             > John B.
>             > On 2013-02-28, at 2:29 AM, Hannes Tschofenig
>             <hannes.tschofenig@gmx.net
>             <mailto:hannes.tschofenig@gmx.net>> wrote:
>             >
>             >> Hi Mike,
>             >>
>             >> when I worked on the MAC specification I noticed that
>             the JWT does not have a claim for the scope. I believe
>             that this would be needed to allow the resource server to
>             verify whether the scope the authorization server
>             authorized is indeed what the client is asking for.
>             >>
>             >> Ciao
>             >> Hannes
>             >>
>             >> _______________________________________________
>             >> OAuth mailing list
>             >> OAuth@ietf.org <mailto:OAuth@ietf.org>
>             >> https://www.ietf.org/mailman/listinfo/oauth
>             >
>             > _______________________________________________
>             > OAuth mailing list
>             > OAuth@ietf.org <mailto:OAuth@ietf.org>
>             > https://www.ietf.org/mailman/listinfo/oauth
>             _______________________________________________
>             OAuth mailing list
>             OAuth@ietf.org <mailto:OAuth@ietf.org>
>             https://www.ietf.org/mailman/listinfo/oauth
>
>
>
>
> _______________________________________________
> OAuth mailing list
> OAuth@ietf.org
> https://www.ietf.org/mailman/listinfo/oauth


--------------080405010908090104000606
Content-Type: text/html; charset="ISO-8859-1"
Content-Transfer-Encoding: 7bit

<html>
  <head>
    <meta content="text/html; charset=ISO-8859-1"
      http-equiv="Content-Type">
  </head>
  <body bgcolor="#FFFFFF" text="#000000">
    It doesn't belong in the assertion drafts, but maybe it can be
    combined with the token introspection piece I've started (but isn't
    an item yet)? I think that would address the other thread that
    Hannes was talking about as well. We'd essentially be defining one
    set of token metadata (including scopes, client_id, subject,
    audience, expiration and a few others) and two methods to get at it:
    either by making an introspection call, or by packing it into the
    token directly. And the two could even work together if you wanted
    to.<br>
    <br>
    &nbsp;-- Justin<br>
    <br>
    <div class="moz-cite-prefix">On 02/28/2013 02:36 PM, Brian Campbell
      wrote:<br>
    </div>
    <blockquote
cite="mid:CA+k3eCSD3EqtNC0Z--+HKwENW9pbzCNGp2_LyVp0bAphvThnRA@mail.gmail.com"
      type="cite">
      <meta http-equiv="Content-Type" content="text/html;
        charset=ISO-8859-1">
      <div dir="ltr">
        <div>I do agree that a WG profile of a JWT-structured access
          token could lend itself to interoperability and ultimately be
          a useful thing. But you are right that there already are many
          implementations out there in the wild (heck, I've written one
          myself) and that might make it difficult to standardize on
          something.<br>
          <br>
        </div>
        Because of that, and many other reasons, I don't want to try and
        add that to existing assertion drafts.<br>
        <div class="gmail_extra"><br>
          <br>
          <div class="gmail_quote">On Thu, Feb 28, 2013 at 12:13 PM,
            Lewis Adam-CAL022 <span dir="ltr">&lt;<a
                moz-do-not-send="true"
                href="mailto:Adam.Lewis@motorolasolutions.com"
                target="_blank">Adam.Lewis@motorolasolutions.com</a>&gt;</span>
            wrote:<br>
            <blockquote class="gmail_quote" style="margin:0 0 0
              .8ex;border-left:1px #ccc solid;padding-left:1ex">
              <div link="blue" vlink="purple" lang="EN-US">
                <div>
                  <p class="MsoNormal"><span
                      style="font-size:10.5pt;font-family:&quot;Book
                      Antiqua&quot;,&quot;serif&quot;;color:olive">Hi
                      Brian, a few thoughts from somebody outside of the
                      WG &#8230;
                    </span></p>
                  <p class="MsoNormal"><span
                      style="font-size:10.5pt;font-family:&quot;Book
                      Antiqua&quot;,&quot;serif&quot;;color:olive">&nbsp;</span></p>
                  <p class="MsoNormal"><span
                      style="font-size:10.5pt;font-family:&quot;Book
                      Antiqua&quot;,&quot;serif&quot;;color:olive">As a
                      newcomer to OAuth last year, I was initially
                      confused by the titles.&nbsp; It was confusing because
                      we have SAML bearer *<b>assertions</b>* and JWT
                      bearer *<b>tokens</b>* &#8230; and as John just
                      (begrudgingly) stated in this thread, the JWT is
                      being used as an assertion in this profile (and in
                      OIDC).&nbsp; I think it will be difficult to find a
                      good name for these profiles since they do two
                      entirely different things (e.g. define a new grant
                      type and define a new method of client
                      authentication).&nbsp; One could argue that as long as
                      the WG is at it, then why not add a third section
                      to the JWT profile, which talks about usage of
                      JWT-structured bearer access tokens: it would not
                      be any less related than the other two focuses of
                      the doc.&nbsp; Then the document could be called
                      something simple like &#8220;profiles of JWT usage in
                      OAuth&#8221; or something like that.&nbsp;
                    </span></p>
                  <p class="MsoNormal"><span
                      style="font-size:10.5pt;font-family:&quot;Book
                      Antiqua&quot;,&quot;serif&quot;;color:olive">&nbsp;</span></p>
                  <p class="MsoNormal"><span
                      style="font-size:10.5pt;font-family:&quot;Book
                      Antiqua&quot;,&quot;serif&quot;;color:olive">On
                      one hand, it is probably na&iuml;ve to think that an
                      access token can be standardized in a profile
                      given how many have already been released into the
                      wild, but on the other hand, a WG profile of a
                      JWT-structured access token could lend itself to
                      interoperability, where AS implementations can
                      advertise conformance to the profile and who knows
                      &#8230; maybe the RS&#8217;s of the future will be good with
                      this.&nbsp;
                    </span></p>
                  <p class="MsoNormal"><span
                      style="font-size:10.5pt;font-family:&quot;Book
                      Antiqua&quot;,&quot;serif&quot;;color:olive">&nbsp;</span></p>
                  <p class="MsoNormal"><span
                      style="font-size:10.5pt;font-family:&quot;Book
                      Antiqua&quot;,&quot;serif&quot;;color:olive">adam</span></p>
                  <p class="MsoNormal"><span
                      style="font-size:10.5pt;font-family:&quot;Book
                      Antiqua&quot;,&quot;serif&quot;;color:olive">&nbsp;</span></p>
                  <div style="border:none;border-top:solid #b5c4df
                    1.0pt;padding:3.0pt 0in 0in 0in">
                    <p class="MsoNormal"><b><span
style="font-size:10.0pt;font-family:&quot;Tahoma&quot;,&quot;sans-serif&quot;">From:</span></b><span
style="font-size:10.0pt;font-family:&quot;Tahoma&quot;,&quot;sans-serif&quot;">
                        <a moz-do-not-send="true"
                          href="mailto:oauth-bounces@ietf.org"
                          target="_blank">oauth-bounces@ietf.org</a>
                        [mailto:<a moz-do-not-send="true"
                          href="mailto:oauth-bounces@ietf.org"
                          target="_blank">oauth-bounces@ietf.org</a>]
                        <b>On Behalf Of </b>Brian Campbell<br>
                        <b>Sent:</b> Thursday, February 28, 2013 1:03 PM<br>
                        <b>To:</b> John Bradley<br>
                        <b>Cc:</b> <a moz-do-not-send="true"
                          href="mailto:oauth@ietf.org" target="_blank">oauth@ietf.org</a>
                        WG</span></p>
                    <div><br>
                      <b>Subject:</b> Re: [OAUTH-WG] JWT - scope claim
                      missing</div>
                  </div>
                  <p class="MsoNormal">&nbsp;</p>
                  <div>
                    <div>
                      <p class="MsoNormal" style="margin-bottom:12.0pt">I'm
                        not sure anyone really "picked" the titles for
                        the bearer token profiles. They just kind of
                        evolved. And evolved in funny ways especially
                        when client authn to the AS was added.
                      </p>
                    </div>
                    <div>
                      <div>
                        <div>
                          <p class="MsoNormal"
                            style="margin-bottom:12.0pt">You won't hear
                            me argue that the titles are "good" and this
                            is not the first time there's been confusion
                            about what they actually do. They define new
                            grant types and new client authentication
                            methods. They *do not* define an access
                            token format or anything else about access
                            tokens. JWT and SAML could be used for that
                            but that's not what these drafts do.
                          </p>
                        </div>
                        <div>
                          <p class="MsoNormal">Suggestions for better
                            title(s) would be more than welcome.</p>
                        </div>
                        <div>
                          <div>
                            <p class="MsoNormal">&nbsp;</p>
                          </div>
                          <div>
                            <p class="MsoNormal">Here's what they are
                              now:</p>
                          </div>
                          <div>
                            <p class="MsoNormal"><br>
                              SAML 2.0 Bearer Assertion Profiles for
                              OAuth 2.0<br>
                              draft-ietf-oauth-saml2-bearer<br>
                              <br>
                              JSON Web Token (JWT) Bearer Token Profiles
                              for OAuth 2.0<br>
                              draft-ietf-oauth-jwt-bearer<br>
                              <br>
                              Assertion Framework for OAuth 2.0<br>
                              draft-ietf-oauth-assertions</p>
                            <div>
                              <p class="MsoNormal">&nbsp;</p>
                              <div>
                                <p class="MsoNormal">On Thu, Feb 28,
                                  2013 at 11:36 AM, John Bradley &lt;<a
                                    moz-do-not-send="true"
                                    href="mailto:ve7jtb@ve7jtb.com"
                                    target="_blank">ve7jtb@ve7jtb.com</a>&gt;
                                  wrote:</p>
                                <div>
                                  <p class="MsoNormal">Yes the title
                                    likely adds to the confusion given
                                    that the bearer tokens are not
                                    access tokens.</p>
                                  <div>
                                    <p class="MsoNormal">&nbsp;</p>
                                  </div>
                                  <div>
                                    <p class="MsoNormal">Things as
                                      separate from OAuth as the Firefox
                                      browerID spec use JWS signed JWTs.
                                      &nbsp;</p>
                                  </div>
                                  <div>
                                    <p class="MsoNormal">&nbsp;</p>
                                  </div>
                                  <div>
                                    <p class="MsoNormal">The bearer
                                      token profiles for OAuth 2 are for
                                      OAuth2.</p>
                                  </div>
                                  <div>
                                    <p class="MsoNormal">&nbsp;</p>
                                  </div>
                                  <div>
                                    <p class="MsoNormal">The&nbsp;<a
                                        moz-do-not-send="true"
                                        href="http://tools.ietf.org/html/draft-ietf-oauth-json-web-token-06"
                                        target="_blank">JSON Web Token
                                        (JWT)</a>&nbsp;spec did not start in
                                      OAuth and is not OAuth specific.</p>
                                  </div>
                                  <div>
                                    <p class="MsoNormal">&nbsp;</p>
                                  </div>
                                  <div>
                                    <p class="MsoNormal">A JWT is:</p>
                                  </div>
                                  <div>
                                    <pre><span style="font-size:12.0pt">JSON Web Token (JWT)&nbsp; A string representing a set of claims as a JSON</span></pre>
                                    <pre><span style="font-size:12.0pt">&nbsp;&nbsp;&nbsp;&nbsp;&nbsp; object that is encoded in a JWS or JWE, enabling the claims to be</span></pre>
                                    <pre><span style="font-size:12.0pt">&nbsp;&nbsp;&nbsp;&nbsp;&nbsp; digitally signed or MACed and/or encrypted.</span></pre>
                                    <div>
                                      <p class="MsoNormal">&nbsp;</p>
                                    </div>
                                    <div>
                                      <p class="MsoNormal">So OAuth or
                                        other profiles may define claims
                                        to go in a JWT, but the JWT
                                        needs to itself only define the
                                        claims necessary for security
                                        processing. &nbsp;</p>
                                    </div>
                                    <div>
                                      <p class="MsoNormal">&nbsp;</p>
                                    </div>
                                    <div>
                                      <p class="MsoNormal">John B.</p>
                                    </div>
                                    <div>
                                      <p class="MsoNormal">PS that was a
                                        soft ball If you hadn't
                                        responded I would have been
                                        disappointed. &nbsp;I din't pick the
                                        title for the bearer token
                                        profiles.</p>
                                    </div>
                                    <div>
                                      <div>
                                        <div>
                                          <p class="MsoNormal">&nbsp;</p>
                                        </div>
                                        <div>
                                          <p class="MsoNormal">&nbsp;</p>
                                        </div>
                                        <div>
                                          <div>
                                            <p class="MsoNormal">On
                                              2013-02-28, at 10:12 AM,
                                              Phil Hunt &lt;<a
                                                moz-do-not-send="true"
                                                href="mailto:phil.hunt@oracle.com"
                                                target="_blank">phil.hunt@oracle.com</a>&gt;
                                              wrote:</p>
                                          </div>
                                          <p class="MsoNormal"><br>
                                            <br>
                                          </p>
                                          <div>
                                            <div>
                                              <h1><span
                                                  style="font-family:&quot;Helvetica&quot;,&quot;sans-serif&quot;">JSON
                                                  Web Token (JWT) Bearer
                                                  Token Profiles for
                                                  OAuth 2.0</span></h1>
                                              <p class="MsoNormal"><br>
                                                Note the title says "for
                                                OAuth2"</p>
                                            </div>
                                            <div>
                                              <p class="MsoNormal">&nbsp;</p>
                                            </div>
                                            <div>
                                              <p class="MsoNormal">Sorry.
                                                Couldn't resist.&nbsp;</p>
                                            </div>
                                            <div>
                                              <p class="MsoNormal">&nbsp;</p>
                                            </div>
                                            <div>
                                              <p class="MsoNormal">Phil</p>
                                              <div>
                                                <p class="MsoNormal">&nbsp;</p>
                                              </div>
                                              <div>
                                                <p class="MsoNormal">Sent
                                                  from my phone.</p>
                                              </div>
                                            </div>
                                            <div>
                                              <p class="MsoNormal"
                                                style="margin-bottom:12.0pt"><br>
                                                On 2013-02-28, at 9:40,
                                                John Bradley &lt;<a
                                                  moz-do-not-send="true"
href="mailto:ve7jtb@ve7jtb.com" target="_blank">ve7jtb@ve7jtb.com</a>&gt;
                                                wrote:</p>
                                            </div>
                                            <blockquote
                                              style="margin-top:5.0pt;margin-bottom:5.0pt">
                                              <p class="MsoNormal">JWT
                                                is an assertion( I am
                                                probably going to regret
                                                using that word).</p>
                                              <div>
                                                <p class="MsoNormal">&nbsp;</p>
                                              </div>
                                              <div>
                                                <p class="MsoNormal">It
                                                  is used in openID
                                                  connect for id_tokens,
                                                  it is used in OAuth
                                                  for Assertion grant
                                                  types and
                                                  authentication of the
                                                  client to the token
                                                  endpoint.</p>
                                              </div>
                                              <div>
                                                <p class="MsoNormal"><a
moz-do-not-send="true"
                                                    href="http://tools.ietf.org/html/draft-ietf-oauth-jwt-bearer-04"
                                                    target="_blank">http://tools.ietf.org/html/draft-ietf-oauth-jwt-bearer-04</a></p>
                                              </div>
                                              <div>
                                                <p class="MsoNormal">&nbsp;</p>
                                              </div>
                                              <div>
                                                <pre><span style="font-size:12.0pt">&nbsp;</span></pre>
                                                <pre><span style="font-size:12.0pt">&nbsp;</span></pre>
                                                <h1><span
                                                    style="font-size:12.0pt;font-family:&quot;Courier
                                                    New&quot;">JSON Web
                                                    Token (JWT) Bearer
                                                    Token Profiles for
                                                    OAuth 2.0</span></h1>
                                                <div>
                                                  <p class="MsoNormal">&nbsp;</p>
                                                </div>
                                                <div>
                                                  <p class="MsoNormal">Dosen't
                                                    define JWT's use for
                                                    access tokens for
                                                    the RS. &nbsp;&nbsp;</p>
                                                </div>
                                                <div>
                                                  <p class="MsoNormal">&nbsp;</p>
                                                </div>
                                                <div>
                                                  <p class="MsoNormal">Bottom
                                                    line JWT is for more
                                                    than access tokens.</p>
                                                </div>
                                                <div>
                                                  <p class="MsoNormal">&nbsp;</p>
                                                </div>
                                                <div>
                                                  <p class="MsoNormal">John
                                                    B.</p>
                                                </div>
                                                <div>
                                                  <p class="MsoNormal">&nbsp;</p>
                                                </div>
                                                <div>
                                                  <div>
                                                    <p class="MsoNormal">On
                                                      2013-02-28, at
                                                      9:28 AM, Phil Hunt
                                                      &lt;<a
                                                        moz-do-not-send="true"
href="mailto:phil.hunt@oracle.com" target="_blank">phil.hunt@oracle.com</a>&gt;
                                                      wrote:</p>
                                                  </div>
                                                  <p class="MsoNormal"><br>
                                                    <br>
                                                  </p>
                                                  <div>
                                                    <div>
                                                      <p
                                                        class="MsoNormal">Are
                                                        you saying jwt
                                                        is not an access
                                                        token type?<br>
                                                        <br>
                                                        Phil</p>
                                                      <div>
                                                        <p
                                                          class="MsoNormal">&nbsp;</p>
                                                      </div>
                                                      <div>
                                                        <p
                                                          class="MsoNormal">Sent
                                                          from my phone.</p>
                                                      </div>
                                                    </div>
                                                    <div>
                                                      <p
                                                        class="MsoNormal"
style="margin-bottom:12.0pt"><br>
                                                        On 2013-02-28,
                                                        at 8:58, John
                                                        Bradley &lt;<a
                                                          moz-do-not-send="true"
href="mailto:ve7jtb@ve7jtb.com" target="_blank">ve7jtb@ve7jtb.com</a>&gt;
                                                        wrote:</p>
                                                    </div>
                                                    <blockquote
                                                      style="margin-top:5.0pt;margin-bottom:5.0pt">
                                                      <p
                                                        class="MsoNormal">Yes,
                                                        defining scope
                                                        in JWT is the
                                                        wrong place. &nbsp;
                                                        JWT needs to
                                                        stick to the
                                                        security claims
                                                        needed to
                                                        process JWT.</p>
                                                      <div>
                                                        <p
                                                          class="MsoNormal">&nbsp;</p>
                                                      </div>
                                                      <div>
                                                        <p
                                                          class="MsoNormal">I
                                                          also don't
                                                          know how far
                                                          you get
                                                          requiring a
                                                          specific
                                                          authorization
                                                          format for
                                                          JWT, some AS
                                                          will wan to
                                                          use a opaque
                                                          reference,
                                                          some might
                                                          want to use a
                                                          user claim or
                                                          role claim,
                                                          others may use
                                                          scopes,
                                                          &nbsp;combining
                                                          scopes and
                                                          claims is also
                                                          possible.</p>
                                                      </div>
                                                      <div>
                                                        <p
                                                          class="MsoNormal">&nbsp;</p>
                                                      </div>
                                                      <div>
                                                        <p
                                                          class="MsoNormal">Right
                                                          now it is up
                                                          to a AS RS
                                                          pair to agree
                                                          on how to
                                                          communicate
                                                          authorization.
                                                          &nbsp; I don't want
                                                          MAC to be more
                                                          restrictive
                                                          than bearer
                                                          when it comes
                                                          to
                                                          authorization
                                                          between AS and
                                                          RS.</p>
                                                        <div>
                                                          <p
                                                          class="MsoNormal">&nbsp;</p>
                                                        </div>
                                                        <div>
                                                          <p
                                                          class="MsoNormal">Hannes
                                                          wanted to know
                                                          why JWT didn't
                                                          define scope.
                                                          &nbsp;The simple
                                                          answer is that
                                                          it is out of
                                                          scope for JWT
                                                          itself. &nbsp; It
                                                          might be
                                                          defined in a
                                                          OAuth access
                                                          token profile
                                                          for JWT but it
                                                          should not be
                                                          specific to
                                                          MAC.</p>
                                                        </div>
                                                        <div>
                                                          <p
                                                          class="MsoNormal">&nbsp;</p>
                                                        </div>
                                                        <div>
                                                          <p
                                                          class="MsoNormal">John
                                                          B.</p>
                                                        </div>
                                                        <div>
                                                          <div>
                                                          <div>
                                                          <p
                                                          class="MsoNormal">On
                                                          2013-02-28, at
                                                          8:44 AM, Brian
                                                          Campbell &lt;<a
moz-do-not-send="true" href="mailto:bcampbell@pingidentity.com"
                                                          target="_blank">bcampbell@pingidentity.com</a>&gt;
                                                          wrote:</p>
                                                          </div>
                                                          <p
                                                          class="MsoNormal"><br>
                                                          <br>
                                                          </p>
                                                          <div>
                                                          <div>
                                                          <p
                                                          class="MsoNormal"
style="margin-bottom:12.0pt">I think John's point was more that scope is
                                                          something
                                                          rather
                                                          specific to an
                                                          OAuth access
                                                          token and,
                                                          while JWT is
                                                          can be used to
                                                          represent an
                                                          access token,
                                                          it's not the
                                                          only
                                                          application of
                                                          JWT. The
                                                          'standard'
                                                          claims in JWT
                                                          are those that
                                                          are believed
                                                          (right or
                                                          wrong) to be
                                                          widely
                                                          applicable
                                                          across
                                                          different
                                                          applications
                                                          of JWT. One
                                                          could argue
                                                          about it but
                                                          scope is
                                                          probably not
                                                          one of those.</p>
                                                          </div>
                                                          <p
                                                          class="MsoNormal">It
                                                          would probably
                                                          make sense to
                                                          try and build
                                                          a profile of
                                                          JWT
                                                          specifically
                                                          for OAuth
                                                          access tokens
                                                          (though I
                                                          suspect there
                                                          are some
                                                          turtles and
                                                          dragons in
                                                          there), which
                                                          might be the
                                                          appropriate
                                                          place to
                                                          define/register
                                                          a scope claim.</p>
                                                          </div>
                                                          <div>
                                                          <p
                                                          class="MsoNormal"
style="margin-bottom:12.0pt">&nbsp;</p>
                                                          <div>
                                                          <p
                                                          class="MsoNormal">On
                                                          Thu, Feb 28,
                                                          2013 at 9:24
                                                          AM, Phil Hunt
                                                          &lt;<a
                                                          moz-do-not-send="true"
href="mailto:phil.hunt@oracle.com" target="_blank">phil.hunt@oracle.com</a>&gt;
                                                          wrote:</p>
                                                          <p
                                                          class="MsoNormal">Are
                                                          you advocating
                                                          TWO systems?
                                                          That seems
                                                          like a bad
                                                          choice.<br>
                                                          <br>
                                                          I would rather
                                                          fix scope than
                                                          go to a two
                                                          system
                                                          approach.<br>
                                                          <br>
                                                          Phil<br>
                                                          <br>
                                                          Sent from my
                                                          phone.<br>
                                                          <br>
                                                          On 2013-02-28,
                                                          at 8:17, John
                                                          Bradley &lt;<a
moz-do-not-send="true" href="mailto:ve7jtb@ve7jtb.com" target="_blank">ve7jtb@ve7jtb.com</a>&gt;
                                                          wrote:<br>
                                                          <br>
                                                          &gt; While
                                                          scope is one
                                                          method that a
                                                          AS could
                                                          communicate
                                                          authorization
                                                          to a RS, it is
                                                          not the only
                                                          or perhaps
                                                          even the most
                                                          likely one.<br>
                                                          &gt; Using
                                                          scope requires
                                                          a relatively
                                                          tight binding
                                                          between the RS
                                                          and AS, &nbsp;UMA
                                                          uses a
                                                          different
                                                          mechanism that
                                                          describes
                                                          finer grained
                                                          operations.<br>
                                                          &gt; The AS
                                                          may include
                                                          roles, user,
                                                          or other more
                                                          abstract
                                                          claims that
                                                          the the client
                                                          may (god help
                                                          them) pass on
                                                          to EXCML for
                                                          processing.<br>
                                                          &gt;<br>
                                                          &gt; While
                                                          having a
                                                          scopes claim
                                                          is possible,
                                                          like any other
                                                          claim it is
                                                          not part of
                                                          the JWT core
                                                          security
                                                          processing
                                                          claims, and
                                                          needs to be
                                                          defined by
                                                          extension.<br>
                                                          &gt;<br>
                                                          &gt; John B.<br>
                                                          &gt; On
                                                          2013-02-28, at
                                                          2:29 AM,
                                                          Hannes
                                                          Tschofenig
                                                          &lt;<a
                                                          moz-do-not-send="true"
href="mailto:hannes.tschofenig@gmx.net" target="_blank">hannes.tschofenig@gmx.net</a>&gt;
                                                          wrote:<br>
                                                          &gt;<br>
                                                          &gt;&gt; Hi
                                                          Mike,<br>
                                                          &gt;&gt;<br>
                                                          &gt;&gt; when
                                                          I worked on
                                                          the MAC
                                                          specification
                                                          I noticed that
                                                          the JWT does
                                                          not have a
                                                          claim for the
                                                          scope. I
                                                          believe that
                                                          this would be
                                                          needed to
                                                          allow the
                                                          resource
                                                          server to
                                                          verify whether
                                                          the scope the
                                                          authorization
                                                          server
                                                          authorized is
                                                          indeed what
                                                          the client is
                                                          asking for.<br>
                                                          &gt;&gt;<br>
                                                          &gt;&gt; Ciao<br>
                                                          &gt;&gt;
                                                          Hannes<br>
                                                          &gt;&gt;<br>
                                                          &gt;&gt;
                                                          _______________________________________________<br>
                                                          &gt;&gt; OAuth
                                                          mailing list<br>
                                                          &gt;&gt; <a
                                                          moz-do-not-send="true"
href="mailto:OAuth@ietf.org" target="_blank">OAuth@ietf.org</a><br>
                                                          &gt;&gt; <a
                                                          moz-do-not-send="true"
href="https://www.ietf.org/mailman/listinfo/oauth" target="_blank">https://www.ietf.org/mailman/listinfo/oauth</a><br>
                                                          &gt;<br>
                                                          &gt;
                                                          _______________________________________________<br>
                                                          &gt; OAuth
                                                          mailing list<br>
                                                          &gt; <a
                                                          moz-do-not-send="true"
href="mailto:OAuth@ietf.org" target="_blank">OAuth@ietf.org</a><br>
                                                          &gt; <a
                                                          moz-do-not-send="true"
href="https://www.ietf.org/mailman/listinfo/oauth" target="_blank">https://www.ietf.org/mailman/listinfo/oauth</a><br>
_______________________________________________<br>
                                                          OAuth mailing
                                                          list<br>
                                                          <a
                                                          moz-do-not-send="true"
href="mailto:OAuth@ietf.org" target="_blank">OAuth@ietf.org</a><br>
                                                          <a
                                                          moz-do-not-send="true"
href="https://www.ietf.org/mailman/listinfo/oauth" target="_blank">https://www.ietf.org/mailman/listinfo/oauth</a></p>
                                                          </div>
                                                          <p
                                                          class="MsoNormal">&nbsp;</p>
                                                          </div>
                                                          </div>
                                                          <p
                                                          class="MsoNormal">&nbsp;</p>
                                                        </div>
                                                      </div>
                                                    </blockquote>
                                                  </div>
                                                </div>
                                                <p class="MsoNormal">&nbsp;</p>
                                              </div>
                                            </blockquote>
                                          </div>
                                        </div>
                                        <p class="MsoNormal">&nbsp;</p>
                                      </div>
                                    </div>
                                  </div>
                                </div>
                              </div>
                              <p class="MsoNormal">&nbsp;</p>
                            </div>
                          </div>
                        </div>
                      </div>
                    </div>
                  </div>
                </div>
              </div>
            </blockquote>
          </div>
          <br>
        </div>
      </div>
      <br>
      <fieldset class="mimeAttachmentHeader"></fieldset>
      <br>
      <pre wrap="">_______________________________________________
OAuth mailing list
<a class="moz-txt-link-abbreviated" href="mailto:OAuth@ietf.org">OAuth@ietf.org</a>
<a class="moz-txt-link-freetext" href="https://www.ietf.org/mailman/listinfo/oauth">https://www.ietf.org/mailman/listinfo/oauth</a>
</pre>
    </blockquote>
    <br>
  </body>
</html>

--------------080405010908090104000606--

From Michael.Jones@microsoft.com  Thu Feb 28 11:46:07 2013
Return-Path: <Michael.Jones@microsoft.com>
X-Original-To: oauth@ietfa.amsl.com
Delivered-To: oauth@ietfa.amsl.com
Received: from localhost (localhost [127.0.0.1]) by ietfa.amsl.com (Postfix) with ESMTP id EEC4421F8756 for <oauth@ietfa.amsl.com>; Thu, 28 Feb 2013 11:46:06 -0800 (PST)
X-Virus-Scanned: amavisd-new at amsl.com
X-Spam-Flag: NO
X-Spam-Score: -2.587
X-Spam-Level: 
X-Spam-Status: No, score=-2.587 tagged_above=-999 required=5 tests=[AWL=0.011,  BAYES_00=-2.599, HTML_MESSAGE=0.001]
Received: from mail.ietf.org ([64.170.98.30]) by localhost (ietfa.amsl.com [127.0.0.1]) (amavisd-new, port 10024) with ESMTP id bd7stYJJ+g2W for <oauth@ietfa.amsl.com>; Thu, 28 Feb 2013 11:46:02 -0800 (PST)
Received: from na01-by2-obe.outbound.protection.outlook.com (na01-by2-obe.ptr.protection.outlook.com [207.46.100.24]) by ietfa.amsl.com (Postfix) with ESMTP id 674E621F8749 for <oauth@ietf.org>; Thu, 28 Feb 2013 11:46:02 -0800 (PST)
Received: from BY2FFO11FD022.protection.gbl (10.1.15.200) by BY2FFO11HUB026.protection.gbl (10.1.14.112) with Microsoft SMTP Server (TLS) id 15.0.620.12; Thu, 28 Feb 2013 19:45:59 +0000
Received: from TK5EX14MLTC103.redmond.corp.microsoft.com (131.107.125.37) by BY2FFO11FD022.mail.protection.outlook.com (10.1.15.211) with Microsoft SMTP Server (TLS) id 15.0.620.12 via Frontend Transport; Thu, 28 Feb 2013 19:45:59 +0000
Received: from TK5EX14MBXC283.redmond.corp.microsoft.com ([169.254.2.132]) by TK5EX14MLTC103.redmond.corp.microsoft.com ([157.54.79.174]) with mapi id 14.02.0318.003; Thu, 28 Feb 2013 19:45:38 +0000
From: Mike Jones <Michael.Jones@microsoft.com>
To: Brian Campbell <bcampbell@pingidentity.com>, John Bradley <ve7jtb@ve7jtb.com>
Thread-Topic: [OAUTH-WG] JWT - scope claim missing
Thread-Index: AQHOFZ6hIxtkb1+gY0y+b2wB9BjwWJiPcwkAgAAB5wCAAAWJgIAABAMAgAAIM4CAAAN2AIAACPaAgAAGkYCAAAeWAIAABfeAgAAA29A=
Date: Thu, 28 Feb 2013 19:45:37 +0000
Message-ID: <4E1F6AAD24975D4BA5B1680429673943674C40B7@TK5EX14MBXC283.redmond.corp.microsoft.com>
References: <0EC2404F-E3C5-4AD1-88B4-E74AA0394DD9@gmx.net> <C75E4871-E907-4EF7-BAF0-9D1A172D581B@ve7jtb.com> <CA6A6425-D0CE-469F-B51E-9F296DA8041C@oracle.com> <CA+k3eCREgN+6z+U=jjJcPo0nZVR0GWn5zXeecZRO+rg=xd-gZg@mail.gmail.com> <A2375FE9-946F-46B3-9356-0709DD56BD4A@ve7jtb.com> <48FD87D1-4DF4-4289-99B7-40A515F31890@oracle.com> <3E472720-31A4-40A0-AAA4-402CF850831A@ve7jtb.com> <7127843B-D7B0-4AB6-87F1-1604D1EFFA79@oracle.com> <50DA292F-32F0-4266-8401-006AD837B775@ve7jtb.com> <CA+k3eCSyE3cPMh17XuivbUZUtHY=RAtjV1UeCdW6gGFk+gv02A@mail.gmail.com> <CA+k3eCTyr7o9qmPKeL_-s9QHyNRQGO+kpB=jqUkgtYOWsC1=Tw@mail.gmail.com>
In-Reply-To: <CA+k3eCTyr7o9qmPKeL_-s9QHyNRQGO+kpB=jqUkgtYOWsC1=Tw@mail.gmail.com>
Accept-Language: en-US
Content-Language: en-US
X-MS-Has-Attach: 
X-MS-TNEF-Correlator: 
x-originating-ip: [157.54.51.36]
Content-Type: multipart/alternative; boundary="_000_4E1F6AAD24975D4BA5B1680429673943674C40B7TK5EX14MBXC283r_"
MIME-Version: 1.0
X-Forefront-Antispam-Report: CIP:131.107.125.37; CTRY:US; IPV:CAL; IPV:NLI; EFV:NLI; SFV:NSPM; SFS:(377424002)(51704002)(199002)(189002)(377454001)(24454001)(56776001)(4396001)(33656001)(16236675001)(512954001)(50986001)(31966008)(63696002)(74502001)(20776003)(77982001)(66066001)(76482001)(74662001)(49866001)(56816002)(79102001)(5343635001)(5343655001)(65816001)(59766001)(44976002)(54356001)(53806001)(47446002)(15202345001)(16406001)(54316002)(80022001)(47736001)(47976001)(46102001)(5343645001)(51856001)(55846006)(550254004); DIR:OUT; SFP:; SCL:1; SRVR:BY2FFO11HUB026; H:TK5EX14MLTC103.redmond.corp.microsoft.com; RD:InfoDomainNonexistent; A:1; MX:1; LANG:en; 
X-OriginatorOrg: microsoft.onmicrosoft.com
X-Forefront-PRVS: 0771670921
Cc: "oauth@ietf.org WG" <oauth@ietf.org>
Subject: Re: [OAUTH-WG] JWT - scope claim missing
X-BeenThere: oauth@ietf.org
X-Mailman-Version: 2.1.12
Precedence: list
List-Id: OAUTH WG <oauth.ietf.org>
List-Unsubscribe: <https://www.ietf.org/mailman/options/oauth>, <mailto:oauth-request@ietf.org?subject=unsubscribe>
List-Archive: <http://www.ietf.org/mail-archive/web/oauth>
List-Post: <mailto:oauth@ietf.org>
List-Help: <mailto:oauth-request@ietf.org?subject=help>
List-Subscribe: <https://www.ietf.org/mailman/listinfo/oauth>, <mailto:oauth-request@ietf.org?subject=subscribe>
X-List-Received-Date: Thu, 28 Feb 2013 19:46:07 -0000

--_000_4E1F6AAD24975D4BA5B1680429673943674C40B7TK5EX14MBXC283r_
Content-Type: text/plain; charset="us-ascii"
Content-Transfer-Encoding: quoted-printable

I believe that a "scope" claim should be defined by a particular profile or=
 profiles that use JWT in a way that needs it, since it's not of general ap=
plicability.  The JSON Web Token Claims Registry (http://tools.ietf.org/htm=
l/draft-ietf-oauth-json-web-token-06#section-9.1) is defined exactly for th=
e purpose of registering claims that aren't in the base JWT spec.  Let's us=
e that, once there's a profile written that needs a "scope" claim.

                                                            Cheers,
                                                            -- Mike

From: oauth-bounces@ietf.org [mailto:oauth-bounces@ietf.org] On Behalf Of B=
rian Campbell
Sent: Thursday, February 28, 2013 11:25 AM
To: John Bradley
Cc: oauth@ietf.org WG
Subject: Re: [OAUTH-WG] JWT - scope claim missing

To be fair, I think it was Phil who first conflated the things :) I just pi=
cked up the ball and ran with it. But you are right, I did kind of hijack t=
he thread which was originally about if a scope claim should be defined in =
draft-ietf-oauth-json-web-token. I'd say no but I can see how an argument c=
ould be made the other way.

On Thu, Feb 28, 2013 at 12:03 PM, Brian Campbell <bcampbell@pingidentity.co=
m<mailto:bcampbell@pingidentity.com>> wrote:
I'm not sure anyone really "picked" the titles for the bearer token profile=
s. They just kind of evolved. And evolved in funny ways especially when cli=
ent authn to the AS was added.
You won't hear me argue that the titles are "good" and this is not the firs=
t time there's been confusion about what they actually do. They define new =
grant types and new client authentication methods. They *do not* define an =
access token format or anything else about access tokens. JWT and SAML coul=
d be used for that but that's not what these drafts do.
Suggestions for better title(s) would be more than welcome.

Here's what they are now:

SAML 2.0 Bearer Assertion Profiles for OAuth 2.0
draft-ietf-oauth-saml2-bearer


JSON Web Token (JWT) Bearer Token Profiles for OAuth 2.0
draft-ietf-oauth-jwt-bearer

Assertion Framework for OAuth 2.0
draft-ietf-oauth-assertions


On Thu, Feb 28, 2013 at 11:36 AM, John Bradley <ve7jtb@ve7jtb.com<mailto:ve=
7jtb@ve7jtb.com>> wrote:
Yes the title likely adds to the confusion given that the bearer tokens are=
 not access tokens.

Things as separate from OAuth as the Firefox browerID spec use JWS signed J=
WTs.

The bearer token profiles for OAuth 2 are for OAuth2.

The JSON Web Token (JWT)<http://tools.ietf.org/html/draft-ietf-oauth-json-w=
eb-token-06> spec did not start in OAuth and is not OAuth specific.

A JWT is:

JSON Web Token (JWT)  A string representing a set of claims as a JSON

      object that is encoded in a JWS or JWE, enabling the claims to be

      digitally signed or MACed and/or encrypted.

So OAuth or other profiles may define claims to go in a JWT, but the JWT ne=
eds to itself only define the claims necessary for security processing.

John B.
PS that was a soft ball If you hadn't responded I would have been disappoin=
ted.  I din't pick the title for the bearer token profiles.


On 2013-02-28, at 10:12 AM, Phil Hunt <phil.hunt@oracle.com<mailto:phil.hun=
t@oracle.com>> wrote:


JSON Web Token (JWT) Bearer Token Profiles for OAuth 2.0

Note the title says "for OAuth2"

Sorry. Couldn't resist.

Phil

Sent from my phone.

On 2013-02-28, at 9:40, John Bradley <ve7jtb@ve7jtb.com<mailto:ve7jtb@ve7jt=
b.com>> wrote:
JWT is an assertion( I am probably going to regret using that word).

It is used in openID connect for id_tokens, it is used in OAuth for Asserti=
on grant types and authentication of the client to the token endpoint.
http://tools.ietf.org/html/draft-ietf-oauth-jwt-bearer-04






JSON Web Token (JWT) Bearer Token Profiles for OAuth 2.0

Dosen't define JWT's use for access tokens for the RS.

Bottom line JWT is for more than access tokens.

John B.

On 2013-02-28, at 9:28 AM, Phil Hunt <phil.hunt@oracle.com<mailto:phil.hunt=
@oracle.com>> wrote:


Are you saying jwt is not an access token type?

Phil

Sent from my phone.

On 2013-02-28, at 8:58, John Bradley <ve7jtb@ve7jtb.com<mailto:ve7jtb@ve7jt=
b.com>> wrote:
Yes, defining scope in JWT is the wrong place.   JWT needs to stick to the =
security claims needed to process JWT.

I also don't know how far you get requiring a specific authorization format=
 for JWT, some AS will wan to use a opaque reference, some might want to us=
e a user claim or role claim, others may use scopes,  combining scopes and =
claims is also possible.

Right now it is up to a AS RS pair to agree on how to communicate authoriza=
tion.   I don't want MAC to be more restrictive than bearer when it comes t=
o authorization between AS and RS.

Hannes wanted to know why JWT didn't define scope.  The simple answer is th=
at it is out of scope for JWT itself.   It might be defined in a OAuth acce=
ss token profile for JWT but it should not be specific to MAC.

John B.
On 2013-02-28, at 8:44 AM, Brian Campbell <bcampbell@pingidentity.com<mailt=
o:bcampbell@pingidentity.com>> wrote:


I think John's point was more that scope is something rather specific to an=
 OAuth access token and, while JWT is can be used to represent an access to=
ken, it's not the only application of JWT. The 'standard' claims in JWT are=
 those that are believed (right or wrong) to be widely applicable across di=
fferent applications of JWT. One could argue about it but scope is probably=
 not one of those.
It would probably make sense to try and build a profile of JWT specifically=
 for OAuth access tokens (though I suspect there are some turtles and drago=
ns in there), which might be the appropriate place to define/register a sco=
pe claim.

On Thu, Feb 28, 2013 at 9:24 AM, Phil Hunt <phil.hunt@oracle.com<mailto:phi=
l.hunt@oracle.com>> wrote:
Are you advocating TWO systems? That seems like a bad choice.

I would rather fix scope than go to a two system approach.

Phil

Sent from my phone.

On 2013-02-28, at 8:17, John Bradley <ve7jtb@ve7jtb.com<mailto:ve7jtb@ve7jt=
b.com>> wrote:

> While scope is one method that a AS could communicate authorization to a =
RS, it is not the only or perhaps even the most likely one.
> Using scope requires a relatively tight binding between the RS and AS,  U=
MA uses a different mechanism that describes finer grained operations.
> The AS may include roles, user, or other more abstract claims that the th=
e client may (god help them) pass on to EXCML for processing.
>
> While having a scopes claim is possible, like any other claim it is not p=
art of the JWT core security processing claims, and needs to be defined by =
extension.
>
> John B.
> On 2013-02-28, at 2:29 AM, Hannes Tschofenig <hannes.tschofenig@gmx.net<m=
ailto:hannes.tschofenig@gmx.net>> wrote:
>
>> Hi Mike,
>>
>> when I worked on the MAC specification I noticed that the JWT does not h=
ave a claim for the scope. I believe that this would be needed to allow the=
 resource server to verify whether the scope the authorization server autho=
rized is indeed what the client is asking for.
>>
>> Ciao
>> Hannes
>>
>> _______________________________________________
>> OAuth mailing list
>> OAuth@ietf.org<mailto:OAuth@ietf.org>
>> https://www.ietf.org/mailman/listinfo/oauth
>
> _______________________________________________
> OAuth mailing list
> OAuth@ietf.org<mailto:OAuth@ietf.org>
> https://www.ietf.org/mailman/listinfo/oauth
_______________________________________________
OAuth mailing list
OAuth@ietf.org<mailto:OAuth@ietf.org>
https://www.ietf.org/mailman/listinfo/oauth







--_000_4E1F6AAD24975D4BA5B1680429673943674C40B7TK5EX14MBXC283r_
Content-Type: text/html; charset="us-ascii"
Content-Transfer-Encoding: quoted-printable

<html xmlns:v=3D"urn:schemas-microsoft-com:vml" xmlns:o=3D"urn:schemas-micr=
osoft-com:office:office" xmlns:w=3D"urn:schemas-microsoft-com:office:word" =
xmlns:m=3D"http://schemas.microsoft.com/office/2004/12/omml" xmlns=3D"http:=
//www.w3.org/TR/REC-html40">
<head>
<meta http-equiv=3D"Content-Type" content=3D"text/html; charset=3Dus-ascii"=
>
<meta name=3D"Generator" content=3D"Microsoft Word 14 (filtered medium)">
<style><!--
/* Font Definitions */
@font-face
	{font-family:Helvetica;
	panose-1:2 11 6 4 2 2 2 2 2 4;}
@font-face
	{font-family:Helvetica;
	panose-1:2 11 6 4 2 2 2 2 2 4;}
@font-face
	{font-family:Calibri;
	panose-1:2 15 5 2 2 2 4 3 2 4;}
@font-face
	{font-family:Tahoma;
	panose-1:2 11 6 4 3 5 4 4 2 4;}
@font-face
	{font-family:Consolas;
	panose-1:2 11 6 9 2 2 4 3 2 4;}
/* Style Definitions */
p.MsoNormal, li.MsoNormal, div.MsoNormal
	{margin:0in;
	margin-bottom:.0001pt;
	font-size:12.0pt;
	font-family:"Times New Roman","serif";}
h1
	{mso-style-priority:9;
	mso-style-link:"Heading 1 Char";
	mso-margin-top-alt:auto;
	margin-right:0in;
	mso-margin-bottom-alt:auto;
	margin-left:0in;
	font-size:24.0pt;
	font-family:"Times New Roman","serif";}
a:link, span.MsoHyperlink
	{mso-style-priority:99;
	color:blue;
	text-decoration:underline;}
a:visited, span.MsoHyperlinkFollowed
	{mso-style-priority:99;
	color:purple;
	text-decoration:underline;}
pre
	{mso-style-priority:99;
	mso-style-link:"HTML Preformatted Char";
	margin:0in;
	margin-bottom:.0001pt;
	font-size:10.0pt;
	font-family:"Courier New","serif";}
span.HTMLPreformattedChar
	{mso-style-name:"HTML Preformatted Char";
	mso-style-priority:99;
	mso-style-link:"HTML Preformatted";
	font-family:"Consolas","serif";}
span.Heading1Char
	{mso-style-name:"Heading 1 Char";
	mso-style-priority:9;
	mso-style-link:"Heading 1";
	font-family:"Cambria","serif";
	color:#365F91;
	font-weight:bold;}
span.EmailStyle20
	{mso-style-type:personal-reply;
	font-family:"Calibri","sans-serif";
	color:#1F497D;}
.MsoChpDefault
	{mso-style-type:export-only;
	font-family:"Calibri","sans-serif";}
@page WordSection1
	{size:8.5in 11.0in;
	margin:1.0in 1.0in 1.0in 1.0in;}
div.WordSection1
	{page:WordSection1;}
--></style><!--[if gte mso 9]><xml>
<o:shapedefaults v:ext=3D"edit" spidmax=3D"1026" />
</xml><![endif]--><!--[if gte mso 9]><xml>
<o:shapelayout v:ext=3D"edit">
<o:idmap v:ext=3D"edit" data=3D"1" />
</o:shapelayout></xml><![endif]-->
</head>
<body lang=3D"EN-US" link=3D"blue" vlink=3D"purple">
<div class=3D"WordSection1">
<p class=3D"MsoNormal"><span style=3D"font-size:11.0pt;font-family:&quot;Ca=
libri&quot;,&quot;sans-serif&quot;;color:#1F497D">I believe that a &#8220;s=
cope&#8221; claim should be defined by a particular profile or profiles tha=
t use JWT in a way that needs it, since it&#8217;s not of general applicabi=
lity.&nbsp;
 The JSON Web Token Claims Registry (<a href=3D"http://tools.ietf.org/html/=
draft-ietf-oauth-json-web-token-06#section-9.1">http://tools.ietf.org/html/=
draft-ietf-oauth-json-web-token-06#section-9.1</a>) is defined exactly for =
the purpose of registering claims
 that aren&#8217;t in the base JWT spec.&nbsp; Let&#8217;s use that, once t=
here&#8217;s a profile written that needs a &#8220;scope&#8221; claim.<o:p>=
</o:p></span></p>
<p class=3D"MsoNormal"><span style=3D"font-size:11.0pt;font-family:&quot;Ca=
libri&quot;,&quot;sans-serif&quot;;color:#1F497D"><o:p>&nbsp;</o:p></span><=
/p>
<p class=3D"MsoNormal"><span style=3D"font-size:11.0pt;font-family:&quot;Ca=
libri&quot;,&quot;sans-serif&quot;;color:#1F497D">&nbsp;&nbsp;&nbsp;&nbsp;&=
nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbs=
p;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&=
nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbs=
p;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&=
nbsp;&nbsp;&nbsp;&nbsp;&nbsp; Cheers,<o:p></o:p></span></p>
<p class=3D"MsoNormal"><span style=3D"font-size:11.0pt;font-family:&quot;Ca=
libri&quot;,&quot;sans-serif&quot;;color:#1F497D">&nbsp;&nbsp;&nbsp;&nbsp;&=
nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbs=
p;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&=
nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbs=
p;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&=
nbsp;&nbsp;&nbsp;&nbsp;&nbsp; -- Mike<o:p></o:p></span></p>
<p class=3D"MsoNormal"><span style=3D"font-size:11.0pt;font-family:&quot;Ca=
libri&quot;,&quot;sans-serif&quot;;color:#1F497D"><o:p>&nbsp;</o:p></span><=
/p>
<p class=3D"MsoNormal"><b><span style=3D"font-size:10.0pt;font-family:&quot=
;Tahoma&quot;,&quot;sans-serif&quot;">From:</span></b><span style=3D"font-s=
ize:10.0pt;font-family:&quot;Tahoma&quot;,&quot;sans-serif&quot;"> oauth-bo=
unces@ietf.org [mailto:oauth-bounces@ietf.org]
<b>On Behalf Of </b>Brian Campbell<br>
<b>Sent:</b> Thursday, February 28, 2013 11:25 AM<br>
<b>To:</b> John Bradley<br>
<b>Cc:</b> oauth@ietf.org WG<br>
<b>Subject:</b> Re: [OAUTH-WG] JWT - scope claim missing<o:p></o:p></span><=
/p>
<p class=3D"MsoNormal"><o:p>&nbsp;</o:p></p>
<div>
<p class=3D"MsoNormal">To be fair, I think it was Phil who first conflated =
the things :) I just picked up the ball and ran with it. But you are right,=
 I did kind of hijack the thread which was originally about if a scope clai=
m should be defined in draft-ietf-oauth-json-web-token.
 I'd say no but I can see how an argument could be made the other way.<o:p>=
</o:p></p>
</div>
<div>
<p class=3D"MsoNormal" style=3D"margin-bottom:12.0pt"><o:p>&nbsp;</o:p></p>
<div>
<p class=3D"MsoNormal">On Thu, Feb 28, 2013 at 12:03 PM, Brian Campbell &lt=
;<a href=3D"mailto:bcampbell@pingidentity.com" target=3D"_blank">bcampbell@=
pingidentity.com</a>&gt; wrote:<o:p></o:p></p>
<div>
<div>
<p class=3D"MsoNormal" style=3D"margin-bottom:12.0pt">I'm not sure anyone r=
eally &quot;picked&quot; the titles for the bearer token profiles. They jus=
t kind of evolved. And evolved in funny ways especially when client authn t=
o the AS was added.
<o:p></o:p></p>
</div>
<div>
<p class=3D"MsoNormal" style=3D"margin-bottom:12.0pt">You won't hear me arg=
ue that the titles are &quot;good&quot; and this is not the first time ther=
e's been confusion about what they actually do. They define new grant types=
 and new client authentication methods. They *do
 not* define an access token format or anything else about access tokens. J=
WT and SAML could be used for that but that's not what these drafts do.
<o:p></o:p></p>
</div>
<div>
<p class=3D"MsoNormal">Suggestions for better title(s) would be more than w=
elcome.<o:p></o:p></p>
</div>
<div>
<div>
<p class=3D"MsoNormal"><o:p>&nbsp;</o:p></p>
</div>
<div>
<p class=3D"MsoNormal">Here's what they are now:<o:p></o:p></p>
</div>
<div>
<p class=3D"MsoNormal"><br>
SAML 2.0 Bearer Assertion Profiles for OAuth 2.0<br>
draft-ietf-oauth-saml2-bearer<o:p></o:p></p>
<div>
<p class=3D"MsoNormal"><br>
<br>
JSON Web Token (JWT) Bearer Token Profiles for OAuth 2.0<o:p></o:p></p>
</div>
<p class=3D"MsoNormal">draft-ietf-oauth-jwt-bearer<br>
<br>
Assertion Framework for OAuth 2.0<br>
draft-ietf-oauth-assertions<o:p></o:p></p>
<div>
<div>
<p class=3D"MsoNormal"><o:p>&nbsp;</o:p></p>
<div>
<p class=3D"MsoNormal"><o:p>&nbsp;</o:p></p>
<div>
<p class=3D"MsoNormal">On Thu, Feb 28, 2013 at 11:36 AM, John Bradley &lt;<=
a href=3D"mailto:ve7jtb@ve7jtb.com" target=3D"_blank">ve7jtb@ve7jtb.com</a>=
&gt; wrote:<o:p></o:p></p>
<div>
<p class=3D"MsoNormal">Yes the title likely adds to the confusion given tha=
t the bearer tokens are not access tokens.<o:p></o:p></p>
<div>
<p class=3D"MsoNormal"><o:p>&nbsp;</o:p></p>
</div>
<div>
<p class=3D"MsoNormal">Things as separate from OAuth as the Firefox browerI=
D spec use JWS signed JWTs. &nbsp;<o:p></o:p></p>
</div>
<div>
<p class=3D"MsoNormal"><o:p>&nbsp;</o:p></p>
</div>
<div>
<p class=3D"MsoNormal">The bearer token profiles for OAuth 2 are for OAuth2=
.<o:p></o:p></p>
</div>
<div>
<p class=3D"MsoNormal"><o:p>&nbsp;</o:p></p>
</div>
<div>
<p class=3D"MsoNormal">The&nbsp;<a href=3D"http://tools.ietf.org/html/draft=
-ietf-oauth-json-web-token-06" target=3D"_blank">JSON Web Token (JWT)</a>&n=
bsp;spec did not start in OAuth and is not OAuth specific.<o:p></o:p></p>
</div>
<div>
<p class=3D"MsoNormal"><o:p>&nbsp;</o:p></p>
</div>
<div>
<p class=3D"MsoNormal">A JWT is:<o:p></o:p></p>
</div>
<div>
<pre><span style=3D"font-size:12.0pt">JSON Web Token (JWT)&nbsp; A string r=
epresenting a set of claims as a JSON<o:p></o:p></span></pre>
<pre><span style=3D"font-size:12.0pt">&nbsp;&nbsp;&nbsp;&nbsp;&nbsp; object=
 that is encoded in a JWS or JWE, enabling the claims to be<o:p></o:p></spa=
n></pre>
<pre><span style=3D"font-size:12.0pt">&nbsp;&nbsp;&nbsp;&nbsp;&nbsp; digita=
lly signed or MACed and/or encrypted.<o:p></o:p></span></pre>
<div>
<p class=3D"MsoNormal"><o:p>&nbsp;</o:p></p>
</div>
<div>
<p class=3D"MsoNormal">So OAuth or other profiles may define claims to go i=
n a JWT, but the JWT needs to itself only define the claims necessary for s=
ecurity processing. &nbsp;<o:p></o:p></p>
</div>
<div>
<p class=3D"MsoNormal"><o:p>&nbsp;</o:p></p>
</div>
<div>
<p class=3D"MsoNormal">John B.<o:p></o:p></p>
</div>
<div>
<p class=3D"MsoNormal">PS that was a soft ball If you hadn't responded I wo=
uld have been disappointed. &nbsp;I din't pick the title for the bearer tok=
en profiles.<o:p></o:p></p>
</div>
<div>
<div>
<div>
<p class=3D"MsoNormal"><o:p>&nbsp;</o:p></p>
</div>
<div>
<p class=3D"MsoNormal"><o:p>&nbsp;</o:p></p>
</div>
<div>
<div>
<p class=3D"MsoNormal">On 2013-02-28, at 10:12 AM, Phil Hunt &lt;<a href=3D=
"mailto:phil.hunt@oracle.com" target=3D"_blank">phil.hunt@oracle.com</a>&gt=
; wrote:<o:p></o:p></p>
</div>
<p class=3D"MsoNormal"><br>
<br>
<o:p></o:p></p>
<div>
<div>
<h1><span style=3D"font-family:&quot;Helvetica&quot;,&quot;sans-serif&quot;=
">JSON Web Token (JWT) Bearer Token Profiles for OAuth 2.0<o:p></o:p></span=
></h1>
<p class=3D"MsoNormal"><br>
Note the title says &quot;for OAuth2&quot;<o:p></o:p></p>
</div>
<div>
<p class=3D"MsoNormal"><o:p>&nbsp;</o:p></p>
</div>
<div>
<p class=3D"MsoNormal">Sorry. Couldn't resist.&nbsp;<o:p></o:p></p>
</div>
<div>
<p class=3D"MsoNormal"><o:p>&nbsp;</o:p></p>
</div>
<div>
<p class=3D"MsoNormal">Phil<o:p></o:p></p>
<div>
<p class=3D"MsoNormal"><o:p>&nbsp;</o:p></p>
</div>
<div>
<p class=3D"MsoNormal">Sent from my phone.<o:p></o:p></p>
</div>
</div>
<div>
<p class=3D"MsoNormal" style=3D"margin-bottom:12.0pt"><br>
On 2013-02-28, at 9:40, John Bradley &lt;<a href=3D"mailto:ve7jtb@ve7jtb.co=
m" target=3D"_blank">ve7jtb@ve7jtb.com</a>&gt; wrote:<o:p></o:p></p>
</div>
<blockquote style=3D"margin-top:5.0pt;margin-bottom:5.0pt">
<p class=3D"MsoNormal">JWT is an assertion( I am probably going to regret u=
sing that word).<o:p></o:p></p>
<div>
<p class=3D"MsoNormal"><o:p>&nbsp;</o:p></p>
</div>
<div>
<p class=3D"MsoNormal">It is used in openID connect for id_tokens, it is us=
ed in OAuth for Assertion grant types and authentication of the client to t=
he token endpoint.<o:p></o:p></p>
</div>
<div>
<p class=3D"MsoNormal"><a href=3D"http://tools.ietf.org/html/draft-ietf-oau=
th-jwt-bearer-04" target=3D"_blank">http://tools.ietf.org/html/draft-ietf-o=
auth-jwt-bearer-04</a><o:p></o:p></p>
</div>
<div>
<p class=3D"MsoNormal"><o:p>&nbsp;</o:p></p>
</div>
<div>
<pre><span style=3D"font-size:12.0pt"><o:p>&nbsp;</o:p></span></pre>
<pre><span style=3D"font-size:12.0pt"><o:p>&nbsp;</o:p></span></pre>
<h1 style=3D"mso-line-height-alt:0pt"><span style=3D"font-size:12.0pt;font-=
family:&quot;Courier New&quot;,&quot;serif&quot;">JSON Web Token (JWT) Bear=
er Token Profiles for OAuth 2.0<o:p></o:p></span></h1>
<div>
<p class=3D"MsoNormal"><o:p>&nbsp;</o:p></p>
</div>
<div>
<p class=3D"MsoNormal">Dosen't define JWT's use for access tokens for the R=
S. &nbsp;&nbsp;<o:p></o:p></p>
</div>
<div>
<p class=3D"MsoNormal"><o:p>&nbsp;</o:p></p>
</div>
<div>
<p class=3D"MsoNormal">Bottom line JWT is for more than access tokens.<o:p>=
</o:p></p>
</div>
<div>
<p class=3D"MsoNormal"><o:p>&nbsp;</o:p></p>
</div>
<div>
<p class=3D"MsoNormal">John B.<o:p></o:p></p>
</div>
<div>
<p class=3D"MsoNormal"><o:p>&nbsp;</o:p></p>
</div>
<div>
<div>
<p class=3D"MsoNormal">On 2013-02-28, at 9:28 AM, Phil Hunt &lt;<a href=3D"=
mailto:phil.hunt@oracle.com" target=3D"_blank">phil.hunt@oracle.com</a>&gt;=
 wrote:<o:p></o:p></p>
</div>
<p class=3D"MsoNormal"><br>
<br>
<o:p></o:p></p>
<div>
<div>
<p class=3D"MsoNormal">Are you saying jwt is not an access token type?<br>
<br>
Phil<o:p></o:p></p>
<div>
<p class=3D"MsoNormal"><o:p>&nbsp;</o:p></p>
</div>
<div>
<p class=3D"MsoNormal">Sent from my phone.<o:p></o:p></p>
</div>
</div>
<div>
<p class=3D"MsoNormal" style=3D"margin-bottom:12.0pt"><br>
On 2013-02-28, at 8:58, John Bradley &lt;<a href=3D"mailto:ve7jtb@ve7jtb.co=
m" target=3D"_blank">ve7jtb@ve7jtb.com</a>&gt; wrote:<o:p></o:p></p>
</div>
<blockquote style=3D"margin-top:5.0pt;margin-bottom:5.0pt">
<p class=3D"MsoNormal">Yes, defining scope in JWT is the wrong place. &nbsp=
; JWT needs to stick to the security claims needed to process JWT.<o:p></o:=
p></p>
<div>
<p class=3D"MsoNormal"><o:p>&nbsp;</o:p></p>
</div>
<div>
<p class=3D"MsoNormal">I also don't know how far you get requiring a specif=
ic authorization format for JWT, some AS will wan to use a opaque reference=
, some might want to use a user claim or role claim, others may use scopes,=
 &nbsp;combining scopes and claims is also
 possible.<o:p></o:p></p>
</div>
<div>
<p class=3D"MsoNormal"><o:p>&nbsp;</o:p></p>
</div>
<div>
<p class=3D"MsoNormal">Right now it is up to a AS RS pair to agree on how t=
o communicate authorization. &nbsp; I don't want MAC to be more restrictive=
 than bearer when it comes to authorization between AS and RS.<o:p></o:p></=
p>
<div>
<p class=3D"MsoNormal"><o:p>&nbsp;</o:p></p>
</div>
<div>
<p class=3D"MsoNormal">Hannes wanted to know why JWT didn't define scope. &=
nbsp;The simple answer is that it is out of scope for JWT itself. &nbsp; It=
 might be defined in a OAuth access token profile for JWT but it should not=
 be specific to MAC.<o:p></o:p></p>
</div>
<div>
<p class=3D"MsoNormal"><o:p>&nbsp;</o:p></p>
</div>
<div>
<p class=3D"MsoNormal">John B.<o:p></o:p></p>
</div>
<div>
<div>
<div>
<p class=3D"MsoNormal">On 2013-02-28, at 8:44 AM, Brian Campbell &lt;<a hre=
f=3D"mailto:bcampbell@pingidentity.com" target=3D"_blank">bcampbell@pingide=
ntity.com</a>&gt; wrote:<o:p></o:p></p>
</div>
<p class=3D"MsoNormal"><br>
<br>
<o:p></o:p></p>
<div>
<div>
<p class=3D"MsoNormal" style=3D"margin-bottom:12.0pt">I think John's point =
was more that scope is something rather specific to an OAuth access token a=
nd, while JWT is can be used to represent an access token, it's not the onl=
y application of JWT. The 'standard'
 claims in JWT are those that are believed (right or wrong) to be widely ap=
plicable across different applications of JWT. One could argue about it but=
 scope is probably not one of those.<o:p></o:p></p>
</div>
<p class=3D"MsoNormal">It would probably make sense to try and build a prof=
ile of JWT specifically for OAuth access tokens (though I suspect there are=
 some turtles and dragons in there), which might be the appropriate place t=
o define/register a scope claim.<o:p></o:p></p>
</div>
<div>
<p class=3D"MsoNormal" style=3D"margin-bottom:12.0pt"><o:p>&nbsp;</o:p></p>
<div>
<p class=3D"MsoNormal">On Thu, Feb 28, 2013 at 9:24 AM, Phil Hunt &lt;<a hr=
ef=3D"mailto:phil.hunt@oracle.com" target=3D"_blank">phil.hunt@oracle.com</=
a>&gt; wrote:<o:p></o:p></p>
<p class=3D"MsoNormal">Are you advocating TWO systems? That seems like a ba=
d choice.<br>
<br>
I would rather fix scope than go to a two system approach.<br>
<br>
Phil<br>
<br>
Sent from my phone.<br>
<br>
On 2013-02-28, at 8:17, John Bradley &lt;<a href=3D"mailto:ve7jtb@ve7jtb.co=
m" target=3D"_blank">ve7jtb@ve7jtb.com</a>&gt; wrote:<br>
<br>
&gt; While scope is one method that a AS could communicate authorization to=
 a RS, it is not the only or perhaps even the most likely one.<br>
&gt; Using scope requires a relatively tight binding between the RS and AS,=
 &nbsp;UMA uses a different mechanism that describes finer grained operatio=
ns.<br>
&gt; The AS may include roles, user, or other more abstract claims that the=
 the client may (god help them) pass on to EXCML for processing.<br>
&gt;<br>
&gt; While having a scopes claim is possible, like any other claim it is no=
t part of the JWT core security processing claims, and needs to be defined =
by extension.<br>
&gt;<br>
&gt; John B.<br>
&gt; On 2013-02-28, at 2:29 AM, Hannes Tschofenig &lt;<a href=3D"mailto:han=
nes.tschofenig@gmx.net" target=3D"_blank">hannes.tschofenig@gmx.net</a>&gt;=
 wrote:<br>
&gt;<br>
&gt;&gt; Hi Mike,<br>
&gt;&gt;<br>
&gt;&gt; when I worked on the MAC specification I noticed that the JWT does=
 not have a claim for the scope. I believe that this would be needed to all=
ow the resource server to verify whether the scope the authorization server=
 authorized is indeed what the client
 is asking for.<br>
&gt;&gt;<br>
&gt;&gt; Ciao<br>
&gt;&gt; Hannes<br>
&gt;&gt;<br>
&gt;&gt; _______________________________________________<br>
&gt;&gt; OAuth mailing list<br>
&gt;&gt; <a href=3D"mailto:OAuth@ietf.org" target=3D"_blank">OAuth@ietf.org=
</a><br>
&gt;&gt; <a href=3D"https://www.ietf.org/mailman/listinfo/oauth" target=3D"=
_blank">https://www.ietf.org/mailman/listinfo/oauth</a><br>
&gt;<br>
&gt; _______________________________________________<br>
&gt; OAuth mailing list<br>
&gt; <a href=3D"mailto:OAuth@ietf.org" target=3D"_blank">OAuth@ietf.org</a>=
<br>
&gt; <a href=3D"https://www.ietf.org/mailman/listinfo/oauth" target=3D"_bla=
nk">https://www.ietf.org/mailman/listinfo/oauth</a><br>
_______________________________________________<br>
OAuth mailing list<br>
<a href=3D"mailto:OAuth@ietf.org" target=3D"_blank">OAuth@ietf.org</a><br>
<a href=3D"https://www.ietf.org/mailman/listinfo/oauth" target=3D"_blank">h=
ttps://www.ietf.org/mailman/listinfo/oauth</a><o:p></o:p></p>
</div>
<p class=3D"MsoNormal"><o:p>&nbsp;</o:p></p>
</div>
</div>
<p class=3D"MsoNormal"><o:p>&nbsp;</o:p></p>
</div>
</div>
</blockquote>
</div>
</div>
<p class=3D"MsoNormal"><o:p>&nbsp;</o:p></p>
</div>
</blockquote>
</div>
</div>
<p class=3D"MsoNormal"><o:p>&nbsp;</o:p></p>
</div>
</div>
</div>
</div>
</div>
<p class=3D"MsoNormal"><o:p>&nbsp;</o:p></p>
</div>
</div>
</div>
</div>
</div>
</div>
</div>
<p class=3D"MsoNormal"><o:p>&nbsp;</o:p></p>
</div>
</div>
</body>
</html>

--_000_4E1F6AAD24975D4BA5B1680429673943674C40B7TK5EX14MBXC283r_--

From ve7jtb@ve7jtb.com  Thu Feb 28 11:57:15 2013
Return-Path: <ve7jtb@ve7jtb.com>
X-Original-To: oauth@ietfa.amsl.com
Delivered-To: oauth@ietfa.amsl.com
Received: from localhost (localhost [127.0.0.1]) by ietfa.amsl.com (Postfix) with ESMTP id CDBD421F88E1 for <oauth@ietfa.amsl.com>; Thu, 28 Feb 2013 11:57:15 -0800 (PST)
X-Virus-Scanned: amavisd-new at amsl.com
X-Spam-Flag: NO
X-Spam-Score: -3.365
X-Spam-Level: 
X-Spam-Status: No, score=-3.365 tagged_above=-999 required=5 tests=[AWL=0.233,  BAYES_00=-2.599, HTML_MESSAGE=0.001, RCVD_IN_DNSWL_LOW=-1]
Received: from mail.ietf.org ([64.170.98.30]) by localhost (ietfa.amsl.com [127.0.0.1]) (amavisd-new, port 10024) with ESMTP id 9cmlOhnXJfC1 for <oauth@ietfa.amsl.com>; Thu, 28 Feb 2013 11:57:14 -0800 (PST)
Received: from mail-pa0-f44.google.com (mail-pa0-f44.google.com [209.85.220.44]) by ietfa.amsl.com (Postfix) with ESMTP id 38C6721F88DD for <oauth@ietf.org>; Thu, 28 Feb 2013 11:57:14 -0800 (PST)
Received: by mail-pa0-f44.google.com with SMTP id kp1so1332576pab.31 for <oauth@ietf.org>; Thu, 28 Feb 2013 11:57:13 -0800 (PST)
X-Google-DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=google.com; s=20120113; h=x-received:content-type:mime-version:subject:from:in-reply-to:date :cc:message-id:references:to:x-mailer:x-gm-message-state; bh=dj2nr+7RHeK8+E6BCXxTTQciUeD7CRqN7NL0Fo3lcYc=; b=cEKDktBIfNKS27/KurdZGYFDQ3snJCRd3wz0Wm/gbVCm/17A7G3Jv5W7ug101dna6v J644HN0u6eIPFQ7t4zBY1t2yEvqWLCwqcwIDJ/fbUuV3/aoKkMWR/FjeanEHqUd5FuKI +PQjHVcOGD1VLED3L6nKqaZypvz1EdvB+RTJiH0vuvRUCiXxuY8dL4yVDfq7Oexdxsil 5xKuRe82oH7fTcT9qlGbMtZKjDsq0/q+VhBhrQlVx6q//BugW9Q+1xk9fmmh5b09NXIN gvA1jORnpkEUKDWfBzY5uc7wqmH/JHfYGIymk3JV3V3C+5OwKzkyYhAHZP/XSjNhgd1n mngA==
X-Received: by 10.66.145.130 with SMTP id su2mr14904682pab.74.1362081433734; Thu, 28 Feb 2013 11:57:13 -0800 (PST)
Received: from [192.168.43.179] (mobile-166-137-184-056.mycingular.net. [166.137.184.56]) by mx.google.com with ESMTPS id a4sm10226976paw.21.2013.02.28.11.57.10 (version=TLSv1 cipher=ECDHE-RSA-RC4-SHA bits=128/128); Thu, 28 Feb 2013 11:57:12 -0800 (PST)
Content-Type: multipart/signed; boundary="Apple-Mail=_B7B7849C-52AA-447C-84F4-2002C676ECE2"; protocol="application/pkcs7-signature"; micalg=sha1
Mime-Version: 1.0 (Mac OS X Mail 6.2 \(1499\))
From: John Bradley <ve7jtb@ve7jtb.com>
In-Reply-To: <512FAC0F.5070409@mitre.org>
Date: Thu, 28 Feb 2013 11:57:08 -0800
Message-Id: <3D9DC9D6-35E4-4C86-8891-ED5420D2602E@ve7jtb.com>
References: <0EC2404F-E3C5-4AD1-88B4-E74AA0394DD9@gmx.net> <C75E4871-E907-4EF7-BAF0-9D1A172D581B@ve7jtb.com> <CA6A6425-D0CE-469F-B51E-9F296DA8041C@oracle.com> <CA+k3eCREgN+6z+U=jjJcPo0nZVR0GWn5zXeecZRO+rg=xd-gZg@mail.gmail.com> <A2375FE9-946F-46B3-9356-0709DD56BD4A@ve7jtb.com> <48FD87D1-4DF4-4289-99B7-40A515F31890@oracle.com> <3E472720-31A4-40A0-AAA4-402CF850831A@ve7jtb.com> <7127843B-D7B0-4AB6-87F1-1604D1EFFA79@oracle.com> <50DA292F-32F0-4266-8401-006AD837B775@ve7jtb.com> <CA+k3eCSyE3cPMh17XuivbUZUtHY=RAtjV1UeCdW6gGFk+gv02A@mail.gmail.com> <512FAC0F.5070409@mitre.org>
To: Justin Richer <jricher@mitre.org>
X-Mailer: Apple Mail (2.1499)
X-Gm-Message-State: ALoCoQn9+ivznjaPOspwKlGfECdGpsHKbQObr7jZHY91WiVIKsJWkLFSlEeNQkhequGIftcwwB0/
Cc: "oauth@ietf.org WG" <oauth@ietf.org>
Subject: Re: [OAUTH-WG] JWT - scope claim missing
X-BeenThere: oauth@ietf.org
X-Mailman-Version: 2.1.12
Precedence: list
List-Id: OAUTH WG <oauth.ietf.org>
List-Unsubscribe: <https://www.ietf.org/mailman/options/oauth>, <mailto:oauth-request@ietf.org?subject=unsubscribe>
List-Archive: <http://www.ietf.org/mail-archive/web/oauth>
List-Post: <mailto:oauth@ietf.org>
List-Help: <mailto:oauth-request@ietf.org?subject=help>
List-Subscribe: <https://www.ietf.org/mailman/listinfo/oauth>, <mailto:oauth-request@ietf.org?subject=subscribe>
X-List-Received-Date: Thu, 28 Feb 2013 19:57:16 -0000

--Apple-Mail=_B7B7849C-52AA-447C-84F4-2002C676ECE2
Content-Type: multipart/alternative;
	boundary="Apple-Mail=_04C55B8F-B6D1-4038-94E4-6132B5266687"


--Apple-Mail=_04C55B8F-B6D1-4038-94E4-6132B5266687
Content-Transfer-Encoding: quoted-printable
Content-Type: text/plain;
	charset=iso-8859-1

Agreed profiling needs to happen for access tokens someplace.   In the =
MAC spec is probably not the best place if the claims are used outside =
of MAC as well.

There is a separate issue once we get to that profile about scope.   I =
don't know many RS that do a 1 to 1 mapping of scope at the AS.  Not =
that they couldn't.
I just don't want to start the access token profiling assuming a one to =
one mapping of scopes is the only way to do it.

John B.
On 2013-02-28, at 11:12 AM, Justin Richer <jricher@mitre.org> wrote:

> Brian, I think you're conflating two things (and John might be, too). =
On the one hand, we've got the JWT document, which talks about what goes =
into the token itself. This can be used as an assertion, as an access =
token, as a floor wax / dessert topping. JWT doesn't really care, and =
this is really only in the OAuth WG thanks to IETF politics. Then we =
have the assertion profiles which say how to use things like JWT to do =
specific things in OAuth, and these are what Brian's talking about =
below.
>=20
> Ultimately, this conversation is about the former and not the latter. =
That said, since an OAuth access token is a valid (and common) use of =
JWT, I think that having a common way to put things like "scope" and =
"client_id" and other OAuthy things into a JWT makes a whole heck of a =
lot of sense. Whether or not that is inside of the base JWT draft (since =
it's supposed to be for many use cases), I don't particularly care, and =
I can see the arguments from both sides.
>=20
>  -- Justin
>=20
> On 02/28/2013 02:03 PM, Brian Campbell wrote:
>> I'm not sure anyone really "picked" the titles for the bearer token =
profiles. They just kind of evolved. And evolved in funny ways =
especially when client authn to the AS was added.=20
>>=20
>> You won't hear me argue that the titles are "good" and this is not =
the first time there's been confusion about what they actually do. They =
define new grant types and new client authentication methods. They *do =
not* define an access token format or anything else about access tokens. =
JWT and SAML could be used for that but that's not what these drafts do.=20=

>>=20
>> Suggestions for better title(s) would be more than welcome.
>>=20
>> Here's what they are now:
>>=20
>> SAML 2.0 Bearer Assertion Profiles for OAuth 2.0
>> draft-ietf-oauth-saml2-bearer
>>=20
>> JSON Web Token (JWT) Bearer Token Profiles for OAuth 2.0
>> draft-ietf-oauth-jwt-bearer
>>=20
>> Assertion Framework for OAuth 2.0
>> draft-ietf-oauth-assertions
>>=20
>> On Thu, Feb 28, 2013 at 11:36 AM, John Bradley <ve7jtb@ve7jtb.com> =
wrote:
>> Yes the title likely adds to the confusion given that the bearer =
tokens are not access tokens.
>>=20
>> Things as separate from OAuth as the Firefox browerID spec use JWS =
signed JWTs. =20
>>=20
>> The bearer token profiles for OAuth 2 are for OAuth2.
>>=20
>> The JSON Web Token (JWT) spec did not start in OAuth and is not OAuth =
specific.
>>=20
>> A JWT is:
>> JSON Web Token (JWT)  A string representing a set of claims as a JSON
>>       object that is encoded in a JWS or JWE, enabling the claims to =
be
>>       digitally signed or MACed and/or encrypted.
>>=20
>> So OAuth or other profiles may define claims to go in a JWT, but the =
JWT needs to itself only define the claims necessary for security =
processing. =20
>>=20
>> John B.
>> PS that was a soft ball If you hadn't responded I would have been =
disappointed.  I din't pick the title for the bearer token profiles.
>>=20
>>=20
>> On 2013-02-28, at 10:12 AM, Phil Hunt <phil.hunt@oracle.com> wrote:
>>=20
>>> JSON Web Token (JWT) Bearer Token Profiles for OAuth 2.0
>>>=20
>>> Note the title says "for OAuth2"
>>>=20
>>> Sorry. Couldn't resist.=20
>>>=20
>>> Phil
>>>=20
>>> Sent from my phone.
>>>=20
>>> On 2013-02-28, at 9:40, John Bradley <ve7jtb@ve7jtb.com> wrote:
>>>=20
>>>> JWT is an assertion( I am probably going to regret using that =
word).
>>>>=20
>>>> It is used in openID connect for id_tokens, it is used in OAuth for =
Assertion grant types and authentication of the client to the token =
endpoint.
>>>> http://tools.ietf.org/html/draft-ietf-oauth-jwt-bearer-04
>>>>=20
>>>> JSON Web Token (JWT) Bearer Token Profiles for OAuth 2.0
>>>>=20
>>>> Dosen't define JWT's use for access tokens for the RS.  =20
>>>>=20
>>>> Bottom line JWT is for more than access tokens.
>>>>=20
>>>> John B.
>>>>=20
>>>> On 2013-02-28, at 9:28 AM, Phil Hunt <phil.hunt@oracle.com> wrote:
>>>>=20
>>>>> Are you saying jwt is not an access token type?
>>>>>=20
>>>>> Phil
>>>>>=20
>>>>> Sent from my phone.
>>>>>=20
>>>>> On 2013-02-28, at 8:58, John Bradley <ve7jtb@ve7jtb.com> wrote:
>>>>>=20
>>>>>> Yes, defining scope in JWT is the wrong place.   JWT needs to =
stick to the security claims needed to process JWT.
>>>>>>=20
>>>>>> I also don't know how far you get requiring a specific =
authorization format for JWT, some AS will wan to use a opaque =
reference, some might want to use a user claim or role claim, others may =
use scopes,  combining scopes and claims is also possible.
>>>>>>=20
>>>>>> Right now it is up to a AS RS pair to agree on how to communicate =
authorization.   I don't want MAC to be more restrictive than bearer =
when it comes to authorization between AS and RS.
>>>>>>=20
>>>>>> Hannes wanted to know why JWT didn't define scope.  The simple =
answer is that it is out of scope for JWT itself.   It might be defined =
in a OAuth access token profile for JWT but it should not be specific to =
MAC.
>>>>>>=20
>>>>>> John B.
>>>>>> On 2013-02-28, at 8:44 AM, Brian Campbell =
<bcampbell@pingidentity.com> wrote:
>>>>>>=20
>>>>>>> I think John's point was more that scope is something rather =
specific to an OAuth access token and, while JWT is can be used to =
represent an access token, it's not the only application of JWT. The =
'standard' claims in JWT are those that are believed (right or wrong) to =
be widely applicable across different applications of JWT. One could =
argue about it but scope is probably not one of those.
>>>>>>>=20
>>>>>>> It would probably make sense to try and build a profile of JWT =
specifically for OAuth access tokens (though I suspect there are some =
turtles and dragons in there), which might be the appropriate place to =
define/register a scope claim.
>>>>>>>=20
>>>>>>>=20
>>>>>>> On Thu, Feb 28, 2013 at 9:24 AM, Phil Hunt =
<phil.hunt@oracle.com> wrote:
>>>>>>> Are you advocating TWO systems? That seems like a bad choice.
>>>>>>>=20
>>>>>>> I would rather fix scope than go to a two system approach.
>>>>>>>=20
>>>>>>> Phil
>>>>>>>=20
>>>>>>> Sent from my phone.
>>>>>>>=20
>>>>>>> On 2013-02-28, at 8:17, John Bradley <ve7jtb@ve7jtb.com> wrote:
>>>>>>>=20
>>>>>>> > While scope is one method that a AS could communicate =
authorization to a RS, it is not the only or perhaps even the most =
likely one.
>>>>>>> > Using scope requires a relatively tight binding between the RS =
and AS,  UMA uses a different mechanism that describes finer grained =
operations.
>>>>>>> > The AS may include roles, user, or other more abstract claims =
that the the client may (god help them) pass on to EXCML for processing.
>>>>>>> >
>>>>>>> > While having a scopes claim is possible, like any other claim =
it is not part of the JWT core security processing claims, and needs to =
be defined by extension.
>>>>>>> >
>>>>>>> > John B.
>>>>>>> > On 2013-02-28, at 2:29 AM, Hannes Tschofenig =
<hannes.tschofenig@gmx.net> wrote:
>>>>>>> >
>>>>>>> >> Hi Mike,
>>>>>>> >>
>>>>>>> >> when I worked on the MAC specification I noticed that the JWT =
does not have a claim for the scope. I believe that this would be needed =
to allow the resource server to verify whether the scope the =
authorization server authorized is indeed what the client is asking for.
>>>>>>> >>
>>>>>>> >> Ciao
>>>>>>> >> Hannes
>>>>>>> >>
>>>>>>> >> _______________________________________________
>>>>>>> >> OAuth mailing list
>>>>>>> >> OAuth@ietf.org
>>>>>>> >> https://www.ietf.org/mailman/listinfo/oauth
>>>>>>> >
>>>>>>> > _______________________________________________
>>>>>>> > OAuth mailing list
>>>>>>> > OAuth@ietf.org
>>>>>>> > https://www.ietf.org/mailman/listinfo/oauth
>>>>>>> _______________________________________________
>>>>>>> OAuth mailing list
>>>>>>> OAuth@ietf.org
>>>>>>> https://www.ietf.org/mailman/listinfo/oauth
>>>>>>>=20
>>>>>>=20
>>>>=20
>>=20
>>=20
>>=20
>>=20
>> _______________________________________________
>> OAuth mailing list
>> OAuth@ietf.org
>> https://www.ietf.org/mailman/listinfo/oauth
>=20


--Apple-Mail=_04C55B8F-B6D1-4038-94E4-6132B5266687
Content-Transfer-Encoding: 7bit
Content-Type: text/html;
	charset=iso-8859-1

<html><head><meta http-equiv="Content-Type" content="text/html charset=iso-8859-1"></head><body style="word-wrap: break-word; -webkit-nbsp-mode: space; -webkit-line-break: after-white-space; ">Agreed profiling needs to happen for access tokens someplace. &nbsp; In the MAC spec is probably not the best place if the claims are used outside of MAC as well.<div><br></div><div>There is a separate issue once we get to that profile about scope. &nbsp; I don't know many RS that do a 1 to 1 mapping of scope at the AS. &nbsp;Not that they couldn't.</div><div>I just don't want to start the access token profiling assuming a one to one mapping of scopes is the only way to do it.</div><div><br></div><div>John B.<br><div><div>On 2013-02-28, at 11:12 AM, Justin Richer &lt;<a href="mailto:jricher@mitre.org">jricher@mitre.org</a>&gt; wrote:</div><br class="Apple-interchange-newline"><blockquote type="cite">
  
    <meta content="text/html; charset=ISO-8859-1" http-equiv="Content-Type">
  
  <div bgcolor="#FFFFFF" text="#000000">
    Brian, I think you're conflating two things (and John might be,
    too). On the one hand, we've got the JWT document, which talks about
    what goes into the token itself. This can be used as an assertion,
    as an access token, as a floor wax / dessert topping. JWT doesn't
    really care, and this is really only in the OAuth WG thanks to IETF
    politics. Then we have the assertion profiles which say how to use
    things like JWT to do specific things in OAuth, and these are what
    Brian's talking about below.<br>
    <br>
    Ultimately, this conversation is about the former and not the
    latter. That said, since an OAuth access token is a valid (and
    common) use of JWT, I think that having a common way to put things
    like "scope" and "client_id" and other OAuthy things into a JWT
    makes a whole heck of a lot of sense. Whether or not that is inside
    of the base JWT draft (since it's supposed to be for many use
    cases), I don't particularly care, and I can see the arguments from
    both sides.<br>
    <br>
    &nbsp;-- Justin<br>
    <br>
    <div class="moz-cite-prefix">On 02/28/2013 02:03 PM, Brian Campbell
      wrote:<br>
    </div>
    <blockquote cite="mid:CA+k3eCSyE3cPMh17XuivbUZUtHY=RAtjV1UeCdW6gGFk+gv02A@mail.gmail.com" type="cite">
      <meta http-equiv="Content-Type" content="text/html;
        charset=ISO-8859-1">
      <div dir="ltr">
        <div>I'm not sure anyone really "picked" the titles for the
          bearer token profiles. They just kind of evolved. And evolved
          in funny ways especially when client authn to the AS was
          added. <br>
          <br>
        </div>
        <div>You won't hear me argue that the titles are "good" and this
          is not the first time there's been confusion about what they
          actually do. They define new grant types and new client
          authentication methods. They *do not* define an access token
          format or anything else about access tokens. JWT and SAML
          could be used for that but that's not what these drafts do. <br>
          <br>
        </div>
        <div>Suggestions for better title(s) would be more than welcome.<br>
        </div>
        <div>
          <div><br>
          </div>
          <div>Here's what they are now:<br>
          </div>
          <div><br>
            SAML 2.0 Bearer Assertion Profiles for OAuth 2.0<br>
            draft-ietf-oauth-saml2-bearer<br>
            <br>
            JSON Web Token (JWT) Bearer Token Profiles for OAuth 2.0<br>
            draft-ietf-oauth-jwt-bearer<br>
            <br>
            Assertion Framework for OAuth 2.0<br>
            draft-ietf-oauth-assertions<br>
            <div class="gmail_extra"><br>
              <div class="gmail_quote">On Thu, Feb 28, 2013 at 11:36 AM,
                John Bradley <span dir="ltr">&lt;<a moz-do-not-send="true" href="mailto:ve7jtb@ve7jtb.com" target="_blank">ve7jtb@ve7jtb.com</a>&gt;</span>
                wrote:<br>
                <blockquote class="gmail_quote" style="margin:0px 0px
                  0px 0.8ex;border-left:1px solid
                  rgb(204,204,204);padding-left:1ex">
                  <div style="word-wrap:break-word">Yes the title likely
                    adds to the confusion given that the bearer tokens
                    are not access tokens.
                    <div><br>
                    </div>
                    <div>Things as separate from OAuth as the Firefox
                      browerID spec use JWS signed JWTs. &nbsp;</div>
                    <div><br>
                    </div>
                    <div>The bearer token profiles for OAuth 2 are for
                      OAuth2.</div>
                    <div><br>
                    </div>
                    <div>The&nbsp;<a moz-do-not-send="true" href="http://tools.ietf.org/html/draft-ietf-oauth-json-web-token-06" target="_blank">JSON Web Token (JWT)</a>&nbsp;spec
                      did not start in OAuth and is not OAuth specific.</div>
                    <div><br>
                    </div>
                    <div>A JWT is:</div>
                    <div>
                      <pre style="font-size:1em;margin-top:0px;margin-bottom:0px">JSON Web Token (JWT)  A string representing a set of claims as a JSON
      object that is encoded in a JWS or JWE, enabling the claims to be
      digitally signed or MACed and/or encrypted.
</pre>
                      <div><br>
                      </div>
                      <div>So OAuth or other profiles may define claims
                        to go in a JWT, but the JWT needs to itself only
                        define the claims necessary for security
                        processing. &nbsp;</div>
                      <div><br>
                      </div>
                      <div>John B.</div>
                      <div>PS that was a soft ball If you hadn't
                        responded I would have been disappointed. &nbsp;I
                        din't pick the title for the bearer token
                        profiles.</div>
                      <div>
                        <div>
                          <div><br>
                          </div>
                          <div><br>
                          </div>
                          <div>
                            <div>On 2013-02-28, at 10:12 AM, Phil Hunt
                              &lt;<a moz-do-not-send="true" href="mailto:phil.hunt@oracle.com" target="_blank">phil.hunt@oracle.com</a>&gt;
                              wrote:</div>
                            <br>
                            <blockquote type="cite">
                              <div dir="auto">
                                <div>
                                  <pre style="margin-top:0px;margin-bottom:0px"><font face="Helvetica"><span style="white-space:normal;background-color:rgba(255,255,255,0)">        <span style="display:inline;font-weight:bold"><h1 style="display:inline">


JSON Web Token (JWT) Bearer Token Profiles for OAuth 2.0</h1></span></span></font></pre>
                                  <br>
                                  <span>Note the title says "for OAuth2"</span></div>
                                <div><span><br>
                                  </span></div>
                                <div><span>Sorry. Couldn't resist.&nbsp;</span></div>
                                <div><span><br>
                                  </span></div>
                                <div><span>Phil</span>
                                  <div><br>
                                  </div>
                                  <div>Sent from my phone.</div>
                                </div>
                                <div><br>
                                  On 2013-02-28, at 9:40, John Bradley
                                  &lt;<a moz-do-not-send="true" href="mailto:ve7jtb@ve7jtb.com" target="_blank">ve7jtb@ve7jtb.com</a>&gt;
                                  wrote:<br>
                                  <br>
                                </div>
                                <blockquote type="cite">JWT is an
                                  assertion( I am probably going to
                                  regret using that word).
                                  <div><br>
                                  </div>
                                  <div>It is used in openID connect for
                                    id_tokens, it is used in OAuth for
                                    Assertion grant types and
                                    authentication of the client to the
                                    token endpoint.</div>
                                  <div><a moz-do-not-send="true" href="http://tools.ietf.org/html/draft-ietf-oauth-jwt-bearer-04" target="_blank">http://tools.ietf.org/html/draft-ietf-oauth-jwt-bearer-04</a></div>
                                  <div><br>
                                  </div>
                                  <div>
                                    <pre style="font-size:1em;margin-top:0px;margin-bottom:0px"><span style="line-height:0pt;display:inline;font-size:1em;font-weight:bold"><h1 style="line-height:0pt;display:inline;font-size:1em">JSON Web Token (JWT) Bearer Token Profiles for OAuth 2.0</h1></span></pre>
                                    <div><br>
                                    </div>
                                    <div>Dosen't define JWT's use for
                                      access tokens for the RS. &nbsp;&nbsp;</div>
                                    <div><br>
                                    </div>
                                    <div>Bottom line JWT is for more
                                      than access tokens.</div>
                                    <div><br>
                                    </div>
                                    <div>John B.</div>
                                    <div><br>
                                    </div>
                                    <div>
                                      <div>On 2013-02-28, at 9:28 AM,
                                        Phil Hunt &lt;<a moz-do-not-send="true" href="mailto:phil.hunt@oracle.com" target="_blank">phil.hunt@oracle.com</a>&gt;
                                        wrote:</div>
                                      <br>
                                      <blockquote type="cite">
                                        <div dir="auto">
                                          <div>Are you saying jwt is not
                                            an access token type?<br>
                                            <br>
                                            Phil
                                            <div><br>
                                            </div>
                                            <div>Sent from my phone.</div>
                                          </div>
                                          <div><br>
                                            On 2013-02-28, at 8:58, John
                                            Bradley &lt;<a moz-do-not-send="true" href="mailto:ve7jtb@ve7jtb.com" target="_blank">ve7jtb@ve7jtb.com</a>&gt;
                                            wrote:<br>
                                            <br>
                                          </div>
                                          <blockquote type="cite">Yes,
                                            defining scope in JWT is the
                                            wrong place. &nbsp; JWT needs to
                                            stick to the security claims
                                            needed to process JWT.
                                            <div><br>
                                            </div>
                                            <div>I also don't know how
                                              far you get requiring a
                                              specific authorization
                                              format for JWT, some AS
                                              will wan to use a opaque
                                              reference, some might want
                                              to use a user claim or
                                              role claim, others may use
                                              scopes, &nbsp;combining scopes
                                              and claims is also
                                              possible.</div>
                                            <div><br>
                                            </div>
                                            <div>Right now it is up to a
                                              AS RS pair to agree on how
                                              to communicate
                                              authorization. &nbsp; I don't
                                              want MAC to be more
                                              restrictive than bearer
                                              when it comes to
                                              authorization between AS
                                              and RS.<br>
                                              <div><br>
                                              </div>
                                              <div>Hannes wanted to know
                                                why JWT didn't define
                                                scope. &nbsp;The simple
                                                answer is that it is out
                                                of scope for JWT itself.
                                                &nbsp; It might be defined in
                                                a OAuth access token
                                                profile for JWT but it
                                                should not be specific
                                                to MAC.</div>
                                              <div><br>
                                              </div>
                                              <div>John B.</div>
                                              <div>
                                                <div>
                                                  <div>On 2013-02-28, at
                                                    8:44 AM, Brian
                                                    Campbell &lt;<a moz-do-not-send="true" href="mailto:bcampbell@pingidentity.com" target="_blank">bcampbell@pingidentity.com</a>&gt;
                                                    wrote:</div>
                                                  <br>
                                                  <blockquote type="cite">
                                                    <div dir="ltr">
                                                      <div>I think
                                                        John's point was
                                                        more that scope
                                                        is something
                                                        rather specific
                                                        to an OAuth
                                                        access token
                                                        and, while JWT
                                                        is can be used
                                                        to represent an
                                                        access token,
                                                        it's not the
                                                        only application
                                                        of JWT. The
                                                        'standard'
                                                        claims in JWT
                                                        are those that
                                                        are believed
                                                        (right or wrong)
                                                        to be widely
                                                        applicable
                                                        across different
                                                        applications of
                                                        JWT. One could
                                                        argue about it
                                                        but scope is
                                                        probably not one
                                                        of those.<br>
                                                        <br>
                                                      </div>
                                                      It would probably
                                                      make sense to try
                                                      and build a
                                                      profile of JWT
                                                      specifically for
                                                      OAuth access
                                                      tokens (though I
                                                      suspect there are
                                                      some turtles and
                                                      dragons in there),
                                                      which might be the
                                                      appropriate place
                                                      to define/register
                                                      a scope claim.<br>
                                                    </div>
                                                    <div class="gmail_extra"><br>
                                                      <br>
                                                      <div class="gmail_quote">On
                                                        Thu, Feb 28,
                                                        2013 at 9:24 AM,
                                                        Phil Hunt <span dir="ltr">&lt;<a moz-do-not-send="true" href="mailto:phil.hunt@oracle.com" target="_blank">phil.hunt@oracle.com</a>&gt;</span>
                                                        wrote:<br>
                                                        <blockquote class="gmail_quote" style="margin:0px
                                                          0px 0px
                                                          0.8ex;border-left:1px
                                                          solid
                                                          rgb(204,204,204);padding-left:1ex">Are
                                                          you advocating
                                                          TWO systems?
                                                          That seems
                                                          like a bad
                                                          choice.<br>
                                                          <br>
                                                          I would rather
                                                          fix scope than
                                                          go to a two
                                                          system
                                                          approach.<br>
                                                          <br>
                                                          Phil<br>
                                                          <br>
                                                          Sent from my
                                                          phone.<br>
                                                          <br>
                                                          On 2013-02-28,
                                                          at 8:17, John
                                                          Bradley &lt;<a moz-do-not-send="true" href="mailto:ve7jtb@ve7jtb.com" target="_blank">ve7jtb@ve7jtb.com</a>&gt;
                                                          wrote:<br>
                                                          <br>
                                                          &gt; While
                                                          scope is one
                                                          method that a
                                                          AS could
                                                          communicate
                                                          authorization
                                                          to a RS, it is
                                                          not the only
                                                          or perhaps
                                                          even the most
                                                          likely one.<br>
                                                          &gt; Using
                                                          scope requires
                                                          a relatively
                                                          tight binding
                                                          between the RS
                                                          and AS, &nbsp;UMA
                                                          uses a
                                                          different
                                                          mechanism that
                                                          describes
                                                          finer grained
                                                          operations.<br>
                                                          &gt; The AS
                                                          may include
                                                          roles, user,
                                                          or other more
                                                          abstract
                                                          claims that
                                                          the the client
                                                          may (god help
                                                          them) pass on
                                                          to EXCML for
                                                          processing.<br>
                                                          &gt;<br>
                                                          &gt; While
                                                          having a
                                                          scopes claim
                                                          is possible,
                                                          like any other
                                                          claim it is
                                                          not part of
                                                          the JWT core
                                                          security
                                                          processing
                                                          claims, and
                                                          needs to be
                                                          defined by
                                                          extension.<br>
                                                          &gt;<br>
                                                          &gt; John B.<br>
                                                          &gt; On
                                                          2013-02-28, at
                                                          2:29 AM,
                                                          Hannes
                                                          Tschofenig
                                                          &lt;<a moz-do-not-send="true" href="mailto:hannes.tschofenig@gmx.net" target="_blank">hannes.tschofenig@gmx.net</a>&gt;
                                                          wrote:<br>
                                                          &gt;<br>
                                                          &gt;&gt; Hi
                                                          Mike,<br>
                                                          &gt;&gt;<br>
                                                          &gt;&gt; when
                                                          I worked on
                                                          the MAC
                                                          specification
                                                          I noticed that
                                                          the JWT does
                                                          not have a
                                                          claim for the
                                                          scope. I
                                                          believe that
                                                          this would be
                                                          needed to
                                                          allow the
                                                          resource
                                                          server to
                                                          verify whether
                                                          the scope the
                                                          authorization
                                                          server
                                                          authorized is
                                                          indeed what
                                                          the client is
                                                          asking for.<br>
                                                          &gt;&gt;<br>
                                                          &gt;&gt; Ciao<br>
                                                          &gt;&gt;
                                                          Hannes<br>
                                                          &gt;&gt;<br>
                                                          &gt;&gt;
                                                          _______________________________________________<br>
                                                          &gt;&gt; OAuth
                                                          mailing list<br>
                                                          &gt;&gt; <a moz-do-not-send="true" href="mailto:OAuth@ietf.org" target="_blank">OAuth@ietf.org</a><br>
                                                          &gt;&gt; <a moz-do-not-send="true" href="https://www.ietf.org/mailman/listinfo/oauth" target="_blank">https://www.ietf.org/mailman/listinfo/oauth</a><br>
                                                          &gt;<br>
                                                          &gt;
                                                          _______________________________________________<br>
                                                          &gt; OAuth
                                                          mailing list<br>
                                                          &gt; <a moz-do-not-send="true" href="mailto:OAuth@ietf.org" target="_blank">OAuth@ietf.org</a><br>
                                                          &gt; <a moz-do-not-send="true" href="https://www.ietf.org/mailman/listinfo/oauth" target="_blank">https://www.ietf.org/mailman/listinfo/oauth</a><br>
_______________________________________________<br>
                                                          OAuth mailing
                                                          list<br>
                                                          <a moz-do-not-send="true" href="mailto:OAuth@ietf.org" target="_blank">OAuth@ietf.org</a><br>
                                                          <a moz-do-not-send="true" href="https://www.ietf.org/mailman/listinfo/oauth" target="_blank">https://www.ietf.org/mailman/listinfo/oauth</a><br>
                                                        </blockquote>
                                                      </div>
                                                      <br>
                                                    </div>
                                                  </blockquote>
                                                </div>
                                                <br>
                                              </div>
                                            </div>
                                          </blockquote>
                                        </div>
                                      </blockquote>
                                    </div>
                                    <br>
                                  </div>
                                </blockquote>
                              </div>
                            </blockquote>
                          </div>
                          <br>
                        </div>
                      </div>
                    </div>
                  </div>
                </blockquote>
              </div>
              <br>
            </div>
          </div>
        </div>
      </div>
      <br>
      <fieldset class="mimeAttachmentHeader"></fieldset>
      <br>
      <pre wrap="">_______________________________________________
OAuth mailing list
<a class="moz-txt-link-abbreviated" href="mailto:OAuth@ietf.org">OAuth@ietf.org</a>
<a class="moz-txt-link-freetext" href="https://www.ietf.org/mailman/listinfo/oauth">https://www.ietf.org/mailman/listinfo/oauth</a>
</pre>
    </blockquote>
    <br>
  </div>

</blockquote></div><br></div></body></html>
--Apple-Mail=_04C55B8F-B6D1-4038-94E4-6132B5266687--

--Apple-Mail=_B7B7849C-52AA-447C-84F4-2002C676ECE2
Content-Disposition: attachment;
	filename=smime.p7s
Content-Type: application/pkcs7-signature;
	name=smime.p7s
Content-Transfer-Encoding: base64
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--Apple-Mail=_B7B7849C-52AA-447C-84F4-2002C676ECE2--

From ve7jtb@ve7jtb.com  Thu Feb 28 11:59:18 2013
Return-Path: <ve7jtb@ve7jtb.com>
X-Original-To: oauth@ietfa.amsl.com
Delivered-To: oauth@ietfa.amsl.com
Received: from localhost (localhost [127.0.0.1]) by ietfa.amsl.com (Postfix) with ESMTP id C864921F891C for <oauth@ietfa.amsl.com>; Thu, 28 Feb 2013 11:59:18 -0800 (PST)
X-Virus-Scanned: amavisd-new at amsl.com
X-Spam-Flag: NO
X-Spam-Score: -3.424
X-Spam-Level: 
X-Spam-Status: No, score=-3.424 tagged_above=-999 required=5 tests=[AWL=0.174,  BAYES_00=-2.599, HTML_MESSAGE=0.001, RCVD_IN_DNSWL_LOW=-1]
Received: from mail.ietf.org ([64.170.98.30]) by localhost (ietfa.amsl.com [127.0.0.1]) (amavisd-new, port 10024) with ESMTP id R7AlUcfJPGRV for <oauth@ietfa.amsl.com>; Thu, 28 Feb 2013 11:59:17 -0800 (PST)
Received: from mail-pa0-f52.google.com (mail-pa0-f52.google.com [209.85.220.52]) by ietfa.amsl.com (Postfix) with ESMTP id DFE7921F88E1 for <oauth@ietf.org>; Thu, 28 Feb 2013 11:59:16 -0800 (PST)
Received: by mail-pa0-f52.google.com with SMTP id fb1so1334003pad.25 for <oauth@ietf.org>; Thu, 28 Feb 2013 11:59:16 -0800 (PST)
X-Google-DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=google.com; s=20120113; h=x-received:content-type:mime-version:subject:from:in-reply-to:date :cc:message-id:references:to:x-mailer:x-gm-message-state; bh=0tF5I2blCMhnWU3h+Tszbc0btrTc9rDVA9E9NupSRWM=; b=fJjEGWNfpAddMh7i2pi0reo3uO+n06Mu6CedkHCZOZJRgpXLtiLFnb7BfHIfeX4BhF TCanReF/Ya+id3+owvbY9wdzCP/DV1y7kQTxevcPINydP5z2dP9gt0zEcYxl01bQsEd2 Kvu2Z7bigKos5dvBZQg8OyAoMvPgyI+TOfWoKd7XTBiCSi3yrbBUaSqPMSL+wMIaUEV2 yMwZEXnZ7yERV+JA63YQgpPlAUuDch2318YS2uIwf2pyHNx8nEmn5NEAT1EMWUsL3o6/ 3SWSmgohRrLW2/AHKktIlHp5nZGF7agJehLVLnCQYiaNe5yBUoVirLjyExuTqp+nvBbb N1FA==
X-Received: by 10.66.4.193 with SMTP id m1mr14748433pam.214.1362081556266; Thu, 28 Feb 2013 11:59:16 -0800 (PST)
Received: from [192.168.43.179] (mobile-166-137-184-056.mycingular.net. [166.137.184.56]) by mx.google.com with ESMTPS id i6sm10234900paw.19.2013.02.28.11.59.10 (version=TLSv1 cipher=ECDHE-RSA-RC4-SHA bits=128/128); Thu, 28 Feb 2013 11:59:14 -0800 (PST)
Content-Type: multipart/signed; boundary="Apple-Mail=_C1163A94-0DDC-4C53-8B2D-1FF0203C2F90"; protocol="application/pkcs7-signature"; micalg=sha1
Mime-Version: 1.0 (Mac OS X Mail 6.2 \(1499\))
From: John Bradley <ve7jtb@ve7jtb.com>
In-Reply-To: <512FB26D.5030401@mitre.org>
Date: Thu, 28 Feb 2013 11:59:08 -0800
Message-Id: <3E71DC94-44AF-40BC-B9B9-3D09606BA2B0@ve7jtb.com>
References: <0EC2404F-E3C5-4AD1-88B4-E74AA0394DD9@gmx.net> <C75E4871-E907-4EF7-BAF0-9D1A172D581B@ve7jtb.com> <CA6A6425-D0CE-469F-B51E-9F296DA8041C@oracle.com> <CA+k3eCREgN+6z+U=jjJcPo0nZVR0GWn5zXeecZRO+rg=xd-gZg@mail.gmail.com> <A2375FE9-946F-46B3-9356-0709DD56BD4A@ve7jtb.com> <48FD87D1-4DF4-4289-99B7-40A515F31890@oracle.com> <3E472720-31A4-40A0-AAA4-402CF850831A@ve7jtb.com> <7127843B-D7B0-4AB6-87F1-1604D1EFFA79@oracle.com> <50DA292F-32F0-4266-8401-006AD837B775@ve7jtb.com> <CA+k3eCSyE3cPMh17XuivbUZUtHY=RAtjV1UeCdW6gGFk+gv02A@mail.gmail.com> <59E470B10C4630419ED717AC79FCF9A948D58BEE@BY2PRD0411MB441.namprd04.prod.outlook.com> <CA+k3eCSD3EqtNC0Z--+HKwENW9pbzCNGp2_LyVp0bAphvThnRA@mail.gmail.com> <512FB26D.5030401@mitre.org>
To: Justin Richer <jricher@mitre.org>
X-Mailer: Apple Mail (2.1499)
X-Gm-Message-State: ALoCoQltimbE70yIbk+PEl99N1V7hAk7q1SNe9zqevHU1STgzFrKXLGXm8OxKdNQXNFT+W/HHo/4
Cc: "oauth@ietf.org WG" <oauth@ietf.org>
Subject: Re: [OAUTH-WG] JWT - scope claim missing
X-BeenThere: oauth@ietf.org
X-Mailman-Version: 2.1.12
Precedence: list
List-Id: OAUTH WG <oauth.ietf.org>
List-Unsubscribe: <https://www.ietf.org/mailman/options/oauth>, <mailto:oauth-request@ietf.org?subject=unsubscribe>
List-Archive: <http://www.ietf.org/mail-archive/web/oauth>
List-Post: <mailto:oauth@ietf.org>
List-Help: <mailto:oauth-request@ietf.org?subject=help>
List-Subscribe: <https://www.ietf.org/mailman/listinfo/oauth>, <mailto:oauth-request@ietf.org?subject=subscribe>
X-List-Received-Date: Thu, 28 Feb 2013 19:59:18 -0000

--Apple-Mail=_C1163A94-0DDC-4C53-8B2D-1FF0203C2F90
Content-Type: multipart/alternative;
	boundary="Apple-Mail=_D5978521-803D-4BAE-A5F6-3EB39A01B565"


--Apple-Mail=_D5978521-803D-4BAE-A5F6-3EB39A01B565
Content-Transfer-Encoding: quoted-printable
Content-Type: text/plain;
	charset=windows-1252

Yes that may be the best place for it.

John B.
On 2013-02-28, at 11:39 AM, Justin Richer <jricher@mitre.org> wrote:

> It doesn't belong in the assertion drafts, but maybe it can be =
combined with the token introspection piece I've started (but isn't an =
item yet)? I think that would address the other thread that Hannes was =
talking about as well. We'd essentially be defining one set of token =
metadata (including scopes, client_id, subject, audience, expiration and =
a few others) and two methods to get at it: either by making an =
introspection call, or by packing it into the token directly. And the =
two could even work together if you wanted to.
>=20
>  -- Justin
>=20
> On 02/28/2013 02:36 PM, Brian Campbell wrote:
>> I do agree that a WG profile of a JWT-structured access token could =
lend itself to interoperability and ultimately be a useful thing. But =
you are right that there already are many implementations out there in =
the wild (heck, I've written one myself) and that might make it =
difficult to standardize on something.
>>=20
>> Because of that, and many other reasons, I don't want to try and add =
that to existing assertion drafts.
>>=20
>>=20
>> On Thu, Feb 28, 2013 at 12:13 PM, Lewis Adam-CAL022 =
<Adam.Lewis@motorolasolutions.com> wrote:
>> Hi Brian, a few thoughts from somebody outside of the WG =85
>>=20
>> =20
>> As a newcomer to OAuth last year, I was initially confused by the =
titles.  It was confusing because we have SAML bearer *assertions* and =
JWT bearer *tokens* =85 and as John just (begrudgingly) stated in this =
thread, the JWT is being used as an assertion in this profile (and in =
OIDC).  I think it will be difficult to find a good name for these =
profiles since they do two entirely different things (e.g. define a new =
grant type and define a new method of client authentication).  One could =
argue that as long as                       the WG is at it, then why =
not add a third section to the JWT profile, which talks about usage of =
JWT-structured bearer access tokens: it would not be any less related =
than the other two focuses of the doc.  Then the document could be =
called something simple like =93profiles of JWT usage in OAuth=94 or =
something like that.=20
>>=20
>> =20
>> On one hand, it is probably na=EFve to think that an access token can =
be standardized in a profile given how many have already been released =
into the wild, but on the other hand, a WG profile of a JWT-structured =
access token could lend itself to interoperability, where AS =
implementations can advertise conformance to the profile and who knows =85=
 maybe the RS=92s of the future will be good with this.=20
>>=20
>> =20
>> adam
>>=20
>> =20
>> From: oauth-bounces@ietf.org [mailto:oauth-bounces@ietf.org] On =
Behalf Of Brian Campbell
>> Sent: Thursday, February 28, 2013 1:03 PM
>> To: John Bradley
>> Cc: oauth@ietf.org WG
>>=20
>>=20
>> Subject: Re: [OAUTH-WG] JWT - scope claim missing
>> =20
>> I'm not sure anyone really "picked" the titles for the bearer token =
profiles. They just kind of evolved. And evolved in funny ways =
especially when client authn to the AS was added.
>>=20
>> You won't hear me argue that the titles are "good" and this is not =
the first time there's been confusion about what they actually do. They =
define new grant types and new client authentication methods. They *do =
not* define an access token format or anything else about access tokens. =
JWT and SAML could be used for that but that's not what these drafts do.
>>=20
>> Suggestions for better title(s) would be more than welcome.
>>=20
>> =20
>> Here's what they are now:
>>=20
>>=20
>> SAML 2.0 Bearer Assertion Profiles for OAuth 2.0
>> draft-ietf-oauth-saml2-bearer
>>=20
>> JSON Web Token (JWT) Bearer Token Profiles for OAuth 2.0
>> draft-ietf-oauth-jwt-bearer
>>=20
>> Assertion Framework for OAuth 2.0
>> draft-ietf-oauth-assertions
>>=20
>> =20
>> On Thu, Feb 28, 2013 at 11:36 AM, John Bradley <ve7jtb@ve7jtb.com> =
wrote:
>>=20
>> Yes the title likely adds to the confusion given that the bearer =
tokens are not access tokens.
>>=20
>> =20
>> Things as separate from OAuth as the Firefox browerID spec use JWS =
signed JWTs. =20
>>=20
>> =20
>> The bearer token profiles for OAuth 2 are for OAuth2.
>>=20
>> =20
>> The JSON Web Token (JWT) spec did not start in OAuth and is not OAuth =
specific.
>>=20
>> =20
>> A JWT is:
>>=20
>> JSON Web Token (JWT)  A string representing a set of claims as a JSON
>>       object that is encoded in a JWS or JWE, enabling the claims to =
be
>>       digitally signed or MACed and/or encrypted.
>> =20
>> So OAuth or other profiles may define claims to go in a JWT, but the =
JWT needs to itself only define the claims necessary for security =
processing. =20
>>=20
>> =20
>> John B.
>>=20
>> PS that was a soft ball If you hadn't responded I would have been =
disappointed.  I din't pick the title for the bearer token profiles.
>>=20
>> =20
>> =20
>> On 2013-02-28, at 10:12 AM, Phil Hunt <phil.hunt@oracle.com> wrote:
>>=20
>>=20
>>=20
>> JSON Web Token (JWT) Bearer Token Profiles for OAuth 2.0
>>=20
>>=20
>> Note the title says "for OAuth2"
>>=20
>> =20
>> Sorry. Couldn't resist.=20
>>=20
>> =20
>> Phil
>>=20
>> =20
>> Sent from my phone.
>>=20
>>=20
>> On 2013-02-28, at 9:40, John Bradley <ve7jtb@ve7jtb.com> wrote:
>>=20
>> JWT is an assertion( I am probably going to regret using that word).
>>=20
>> =20
>> It is used in openID connect for id_tokens, it is used in OAuth for =
Assertion grant types and authentication of the client to the token =
endpoint.
>>=20
>> http://tools.ietf.org/html/draft-ietf-oauth-jwt-bearer-04
>>=20
>> =20
>> =20
>> =20
>> JSON Web Token (JWT) Bearer Token Profiles for OAuth 2.0
>>=20
>> =20
>> Dosen't define JWT's use for access tokens for the RS.  =20
>>=20
>> =20
>> Bottom line JWT is for more than access tokens.
>>=20
>> =20
>> John B.
>>=20
>> =20
>> On 2013-02-28, at 9:28 AM, Phil Hunt <phil.hunt@oracle.com> wrote:
>>=20
>>=20
>>=20
>> Are you saying jwt is not an access token type?
>>=20
>> Phil
>>=20
>> =20
>> Sent from my phone.
>>=20
>>=20
>> On 2013-02-28, at 8:58, John Bradley <ve7jtb@ve7jtb.com> wrote:
>>=20
>> Yes, defining scope in JWT is the wrong place.   JWT needs to stick =
to the security claims needed to process JWT.
>>=20
>> =20
>> I also don't know how far you get requiring a specific authorization =
format for JWT, some AS will wan to use a opaque reference, some might =
want to use a user claim or                                              =
             role claim, others may use scopes,  combining scopes and =
claims is also possible.
>>=20
>> =20
>> Right now it is up to a AS RS pair to agree on how to communicate =
authorization.   I don't want MAC to be more restrictive than bearer =
when it comes to authorization between AS and RS.
>>=20
>> =20
>> Hannes wanted to know why JWT didn't define scope.  The simple answer =
is that it is out of scope for JWT itself.   It might be defined in a =
OAuth access token profile for JWT but it should not be specific to MAC.
>>=20
>> =20
>> John B.
>>=20
>> On 2013-02-28, at 8:44 AM, Brian Campbell =
<bcampbell@pingidentity.com> wrote:
>>=20
>>=20
>>=20
>> I think John's point was more that scope is something rather specific =
to an OAuth access token and, while JWT is can be used to represent an =
access token, it's not the only application of JWT. The 'standard' =
claims in JWT are those that are believed (right or wrong) to be widely =
applicable across different applications of JWT. One could argue about =
it but scope is probably not one of those.
>>=20
>> It would probably make sense to try and build a profile of JWT =
specifically for OAuth access tokens (though I suspect there are some =
turtles and dragons in there), which                                     =
                      might be the appropriate place to define/register =
a scope claim.
>>=20
>> =20
>> On Thu, Feb 28, 2013 at 9:24 AM, Phil Hunt <phil.hunt@oracle.com> =
wrote:
>>=20
>> Are you advocating TWO systems? That seems like a bad choice.
>>=20
>> I would rather fix scope than go to a two system approach.
>>=20
>> Phil
>>=20
>> Sent from my phone.
>>=20
>> On 2013-02-28, at 8:17, John Bradley <ve7jtb@ve7jtb.com> wrote:
>>=20
>> > While scope is one method that a AS could communicate authorization =
to a RS, it is not the only or perhaps even the most likely one.
>> > Using scope requires a relatively tight binding between the RS and =
AS,  UMA uses a different mechanism that describes finer grained =
operations.
>> > The AS may include roles, user, or other more abstract claims that =
the the client may (god help them) pass on to EXCML for processing.
>> >
>> > While having a scopes claim is possible, like any other claim it is =
not part of the JWT core security processing claims, and needs to be =
defined by extension.
>> >
>> > John B.
>> > On 2013-02-28, at 2:29 AM, Hannes Tschofenig =
<hannes.tschofenig@gmx.net> wrote:
>> >
>> >> Hi Mike,
>> >>
>> >> when I worked on the MAC specification I noticed that the JWT does =
not have a claim for the scope. I believe that this would be needed to =
allow the resource server to verify whether the scope the authorization =
server authorized is indeed what the client is asking for.
>> >>
>> >> Ciao
>> >> Hannes
>> >>
>> >> _______________________________________________
>> >> OAuth mailing list
>> >> OAuth@ietf.org
>> >> https://www.ietf.org/mailman/listinfo/oauth
>> >
>> > _______________________________________________
>> > OAuth mailing list
>> > OAuth@ietf.org
>> > https://www.ietf.org/mailman/listinfo/oauth
>> _______________________________________________
>> OAuth mailing list
>> OAuth@ietf.org
>> https://www.ietf.org/mailman/listinfo/oauth
>>=20
>> =20
>> =20
>> =20
>> =20
>> =20
>>=20
>>=20
>>=20
>> _______________________________________________
>> OAuth mailing list
>> OAuth@ietf.org
>> https://www.ietf.org/mailman/listinfo/oauth
>=20
> _______________________________________________
> OAuth mailing list
> OAuth@ietf.org
> https://www.ietf.org/mailman/listinfo/oauth


--Apple-Mail=_D5978521-803D-4BAE-A5F6-3EB39A01B565
Content-Transfer-Encoding: quoted-printable
Content-Type: text/html;
	charset=windows-1252

<html><head><meta http-equiv=3D"Content-Type" content=3D"text/html =
charset=3Dwindows-1252"></head><body style=3D"word-wrap: break-word; =
-webkit-nbsp-mode: space; -webkit-line-break: after-white-space; ">Yes =
that may be the best place for it.<div><br></div><div>John =
B.<br><div><div>On 2013-02-28, at 11:39 AM, Justin Richer &lt;<a =
href=3D"mailto:jricher@mitre.org">jricher@mitre.org</a>&gt; =
wrote:</div><br class=3D"Apple-interchange-newline"><blockquote =
type=3D"cite">
 =20
    <meta content=3D"text/html; charset=3DISO-8859-1" =
http-equiv=3D"Content-Type">
 =20
  <div bgcolor=3D"#FFFFFF" text=3D"#000000">
    It doesn't belong in the assertion drafts, but maybe it can be
    combined with the token introspection piece I've started (but isn't
    an item yet)? I think that would address the other thread that
    Hannes was talking about as well. We'd essentially be defining one
    set of token metadata (including scopes, client_id, subject,
    audience, expiration and a few others) and two methods to get at it:
    either by making an introspection call, or by packing it into the
    token directly. And the two could even work together if you wanted
    to.<br>
    <br>
    &nbsp;-- Justin<br>
    <br>
    <div class=3D"moz-cite-prefix">On 02/28/2013 02:36 PM, Brian =
Campbell
      wrote:<br>
    </div>
    <blockquote =
cite=3D"mid:CA+k3eCSD3EqtNC0Z--+HKwENW9pbzCNGp2_LyVp0bAphvThnRA@mail.gmail=
.com" type=3D"cite">
      <meta http-equiv=3D"Content-Type" content=3D"text/html;
        charset=3DISO-8859-1">
      <div dir=3D"ltr">
        <div>I do agree that a WG profile of a JWT-structured access
          token could lend itself to interoperability and ultimately be
          a useful thing. But you are right that there already are many
          implementations out there in the wild (heck, I've written one
          myself) and that might make it difficult to standardize on
          something.<br>
          <br>
        </div>
        Because of that, and many other reasons, I don't want to try and
        add that to existing assertion drafts.<br>
        <div class=3D"gmail_extra"><br>
          <br>
          <div class=3D"gmail_quote">On Thu, Feb 28, 2013 at 12:13 PM,
            Lewis Adam-CAL022 <span dir=3D"ltr">&lt;<a =
moz-do-not-send=3D"true" href=3D"mailto:Adam.Lewis@motorolasolutions.com" =
target=3D"_blank">Adam.Lewis@motorolasolutions.com</a>&gt;</span>
            wrote:<br>
            <blockquote class=3D"gmail_quote" style=3D"margin:0 0 0
              .8ex;border-left:1px #ccc solid;padding-left:1ex">
              <div link=3D"blue" vlink=3D"purple" lang=3D"EN-US">
                <div><p class=3D"MsoNormal"><span =
style=3D"font-size:10.5pt;font-family:&quot;Book
                      Antiqua&quot;,&quot;serif&quot;;color:olive">Hi
                      Brian, a few thoughts from somebody outside of the
                      WG =85
                    </span></p><div><span =
style=3D"font-size:10.5pt;font-family:&quot;Book
                      =
Antiqua&quot;,&quot;serif&quot;;color:olive">&nbsp;</span><br =
class=3D"webkit-block-placeholder"></div><p class=3D"MsoNormal"><span =
style=3D"font-size:10.5pt;font-family:&quot;Book
                      Antiqua&quot;,&quot;serif&quot;;color:olive">As a
                      newcomer to OAuth last year, I was initially
                      confused by the titles.&nbsp; It was confusing =
because
                      we have SAML bearer *<b>assertions</b>* and JWT
                      bearer *<b>tokens</b>* =85 and as John just
                      (begrudgingly) stated in this thread, the JWT is
                      being used as an assertion in this profile (and in
                      OIDC).&nbsp; I think it will be difficult to find =
a
                      good name for these profiles since they do two
                      entirely different things (e.g. define a new grant
                      type and define a new method of client
                      authentication).&nbsp; One could argue that as =
long as
                      the WG is at it, then why not add a third section
                      to the JWT profile, which talks about usage of
                      JWT-structured bearer access tokens: it would not
                      be any less related than the other two focuses of
                      the doc.&nbsp; Then the document could be called
                      something simple like =93profiles of JWT usage in
                      OAuth=94 or something like that.&nbsp;
                    </span></p><div><span =
style=3D"font-size:10.5pt;font-family:&quot;Book
                      =
Antiqua&quot;,&quot;serif&quot;;color:olive">&nbsp;</span><br =
class=3D"webkit-block-placeholder"></div><p class=3D"MsoNormal"><span =
style=3D"font-size:10.5pt;font-family:&quot;Book
                      Antiqua&quot;,&quot;serif&quot;;color:olive">On
                      one hand, it is probably na=EFve to think that an
                      access token can be standardized in a profile
                      given how many have already been released into the
                      wild, but on the other hand, a WG profile of a
                      JWT-structured access token could lend itself to
                      interoperability, where AS implementations can
                      advertise conformance to the profile and who knows
                      =85 maybe the RS=92s of the future will be good =
with
                      this.&nbsp;
                    </span></p><div><span =
style=3D"font-size:10.5pt;font-family:&quot;Book
                      =
Antiqua&quot;,&quot;serif&quot;;color:olive">&nbsp;</span><br =
class=3D"webkit-block-placeholder"></div><p class=3D"MsoNormal"><span =
style=3D"font-size:10.5pt;font-family:&quot;Book
                      =
Antiqua&quot;,&quot;serif&quot;;color:olive">adam</span></p><div><span =
style=3D"font-size:10.5pt;font-family:&quot;Book
                      =
Antiqua&quot;,&quot;serif&quot;;color:olive">&nbsp;</span><br =
class=3D"webkit-block-placeholder"></div>
                  <div style=3D"border:none;border-top:solid #b5c4df
                    1.0pt;padding:3.0pt 0in 0in 0in"><p =
class=3D"MsoNormal"><b><span =
style=3D"font-size:10.0pt;font-family:&quot;Tahoma&quot;,&quot;sans-serif&=
quot;">From:</span></b><span =
style=3D"font-size:10.0pt;font-family:&quot;Tahoma&quot;,&quot;sans-serif&=
quot;">
                        <a moz-do-not-send=3D"true" =
href=3D"mailto:oauth-bounces@ietf.org" =
target=3D"_blank">oauth-bounces@ietf.org</a>
                        [mailto:<a moz-do-not-send=3D"true" =
href=3D"mailto:oauth-bounces@ietf.org" =
target=3D"_blank">oauth-bounces@ietf.org</a>]
                        <b>On Behalf Of </b>Brian Campbell<br>
                        <b>Sent:</b> Thursday, February 28, 2013 1:03 =
PM<br>
                        <b>To:</b> John Bradley<br>
                        <b>Cc:</b> <a moz-do-not-send=3D"true" =
href=3D"mailto:oauth@ietf.org" target=3D"_blank">oauth@ietf.org</a>
                        WG</span></p>
                    <div><br>
                      <b>Subject:</b> Re: [OAUTH-WG] JWT - scope claim
                      missing</div>
                  </div><div>&nbsp;<br =
class=3D"webkit-block-placeholder"></div>
                  <div>
                    <div><p class=3D"MsoNormal" =
style=3D"margin-bottom:12.0pt">I'm
                        not sure anyone really "picked" the titles for
                        the bearer token profiles. They just kind of
                        evolved. And evolved in funny ways especially
                        when client authn to the AS was added.
                      </p>
                    </div>
                    <div>
                      <div>
                        <div><p class=3D"MsoNormal" =
style=3D"margin-bottom:12.0pt">You won't hear
                            me argue that the titles are "good" and this
                            is not the first time there's been confusion
                            about what they actually do. They define new
                            grant types and new client authentication
                            methods. They *do not* define an access
                            token format or anything else about access
                            tokens. JWT and SAML could be used for that
                            but that's not what these drafts do.
                          </p>
                        </div>
                        <div><p class=3D"MsoNormal">Suggestions for =
better
                            title(s) would be more than welcome.</p>
                        </div>
                        <div>
                          <div><div>&nbsp;<br =
class=3D"webkit-block-placeholder"></div>
                          </div>
                          <div><p class=3D"MsoNormal">Here's what they =
are
                              now:</p>
                          </div>
                          <div><p class=3D"MsoNormal"><br>
                              SAML 2.0 Bearer Assertion Profiles for
                              OAuth 2.0<br>
                              draft-ietf-oauth-saml2-bearer<br>
                              <br>
                              JSON Web Token (JWT) Bearer Token Profiles
                              for OAuth 2.0<br>
                              draft-ietf-oauth-jwt-bearer<br>
                              <br>
                              Assertion Framework for OAuth 2.0<br>
                              draft-ietf-oauth-assertions</p>
                            <div><div>&nbsp;<br =
class=3D"webkit-block-placeholder"></div>
                              <div><p class=3D"MsoNormal">On Thu, Feb =
28,
                                  2013 at 11:36 AM, John Bradley &lt;<a =
moz-do-not-send=3D"true" href=3D"mailto:ve7jtb@ve7jtb.com" =
target=3D"_blank">ve7jtb@ve7jtb.com</a>&gt;
                                  wrote:</p>
                                <div><p class=3D"MsoNormal">Yes the =
title
                                    likely adds to the confusion given
                                    that the bearer tokens are not
                                    access tokens.</p>
                                  <div><div>&nbsp;<br =
class=3D"webkit-block-placeholder"></div>
                                  </div>
                                  <div><p class=3D"MsoNormal">Things as
                                      separate from OAuth as the Firefox
                                      browerID spec use JWS signed JWTs.
                                      &nbsp;</p>
                                  </div>
                                  <div><div>&nbsp;<br =
class=3D"webkit-block-placeholder"></div>
                                  </div>
                                  <div><p class=3D"MsoNormal">The bearer
                                      token profiles for OAuth 2 are for
                                      OAuth2.</p>
                                  </div>
                                  <div><div>&nbsp;<br =
class=3D"webkit-block-placeholder"></div>
                                  </div>
                                  <div><p class=3D"MsoNormal">The&nbsp;<a =
moz-do-not-send=3D"true" =
href=3D"http://tools.ietf.org/html/draft-ietf-oauth-json-web-token-06" =
target=3D"_blank">JSON Web Token
                                        (JWT)</a>&nbsp;spec did not =
start in
                                      OAuth and is not OAuth =
specific.</p>
                                  </div>
                                  <div><div>&nbsp;<br =
class=3D"webkit-block-placeholder"></div>
                                  </div>
                                  <div><p class=3D"MsoNormal">A JWT =
is:</p>
                                  </div>
                                  <div>
                                    <pre><span =
style=3D"font-size:12.0pt">JSON Web Token (JWT)&nbsp; A string =
representing a set of claims as a JSON</span></pre>
                                    <pre><span =
style=3D"font-size:12.0pt">&nbsp;&nbsp;&nbsp;&nbsp;&nbsp; object that is =
encoded in a JWS or JWE, enabling the claims to be</span></pre>
                                    <pre><span =
style=3D"font-size:12.0pt">&nbsp;&nbsp;&nbsp;&nbsp;&nbsp; digitally =
signed or MACed and/or encrypted.</span></pre>
                                    <div><div>&nbsp;<br =
class=3D"webkit-block-placeholder"></div>
                                    </div>
                                    <div><p class=3D"MsoNormal">So OAuth =
or
                                        other profiles may define claims
                                        to go in a JWT, but the JWT
                                        needs to itself only define the
                                        claims necessary for security
                                        processing. &nbsp;</p>
                                    </div>
                                    <div><div>&nbsp;<br =
class=3D"webkit-block-placeholder"></div>
                                    </div>
                                    <div><p class=3D"MsoNormal">John =
B.</p>
                                    </div>
                                    <div><p class=3D"MsoNormal">PS that =
was a
                                        soft ball If you hadn't
                                        responded I would have been
                                        disappointed. &nbsp;I din't pick =
the
                                        title for the bearer token
                                        profiles.</p>
                                    </div>
                                    <div>
                                      <div>
                                        <div><div>&nbsp;<br =
class=3D"webkit-block-placeholder"></div>
                                        </div>
                                        <div><div>&nbsp;<br =
class=3D"webkit-block-placeholder"></div>
                                        </div>
                                        <div>
                                          <div><p class=3D"MsoNormal">On
                                              2013-02-28, at 10:12 AM,
                                              Phil Hunt &lt;<a =
moz-do-not-send=3D"true" href=3D"mailto:phil.hunt@oracle.com" =
target=3D"_blank">phil.hunt@oracle.com</a>&gt;
                                              wrote:</p>
                                          </div><p =
class=3D"MsoNormal"><br>
                                            <br>
                                          </p>
                                          <div>
                                            <div>
                                              <h1><span =
style=3D"font-family:&quot;Helvetica&quot;,&quot;sans-serif&quot;">JSON
                                                  Web Token (JWT) Bearer
                                                  Token Profiles for
                                                  OAuth =
2.0</span></h1><p class=3D"MsoNormal"><br>
                                                Note the title says "for
                                                OAuth2"</p>
                                            </div>
                                            <div><div>&nbsp;<br =
class=3D"webkit-block-placeholder"></div>
                                            </div>
                                            <div><p =
class=3D"MsoNormal">Sorry.
                                                Couldn't =
resist.&nbsp;</p>
                                            </div>
                                            <div><div>&nbsp;<br =
class=3D"webkit-block-placeholder"></div>
                                            </div>
                                            <div><p =
class=3D"MsoNormal">Phil</p>
                                              <div><div>&nbsp;<br =
class=3D"webkit-block-placeholder"></div>
                                              </div>
                                              <div><p =
class=3D"MsoNormal">Sent
                                                  from my phone.</p>
                                              </div>
                                            </div>
                                            <div><p class=3D"MsoNormal" =
style=3D"margin-bottom:12.0pt"><br>
                                                On 2013-02-28, at 9:40,
                                                John Bradley &lt;<a =
moz-do-not-send=3D"true" href=3D"mailto:ve7jtb@ve7jtb.com" =
target=3D"_blank">ve7jtb@ve7jtb.com</a>&gt;
                                                wrote:</p>
                                            </div>
                                            <blockquote =
style=3D"margin-top:5.0pt;margin-bottom:5.0pt"><p class=3D"MsoNormal">JWT
                                                is an assertion( I am
                                                probably going to regret
                                                using that word).</p>
                                              <div><div>&nbsp;<br =
class=3D"webkit-block-placeholder"></div>
                                              </div>
                                              <div><p =
class=3D"MsoNormal">It
                                                  is used in openID
                                                  connect for id_tokens,
                                                  it is used in OAuth
                                                  for Assertion grant
                                                  types and
                                                  authentication of the
                                                  client to the token
                                                  endpoint.</p>
                                              </div>
                                              <div><p =
class=3D"MsoNormal"><a moz-do-not-send=3D"true" =
href=3D"http://tools.ietf.org/html/draft-ietf-oauth-jwt-bearer-04" =
target=3D"_blank">http://tools.ietf.org/html/draft-ietf-oauth-jwt-bearer-0=
4</a></p>
                                              </div>
                                              <div><div>&nbsp;<br =
class=3D"webkit-block-placeholder"></div>
                                              </div>
                                              <div>
                                                <pre><span =
style=3D"font-size:12.0pt">&nbsp;</span></pre>
                                                <pre><span =
style=3D"font-size:12.0pt">&nbsp;</span></pre>
                                                <h1><span =
style=3D"font-size:12.0pt;font-family:&quot;Courier
                                                    New&quot;">JSON Web
                                                    Token (JWT) Bearer
                                                    Token Profiles for
                                                    OAuth =
2.0</span></h1>
                                                <div><div>&nbsp;<br =
class=3D"webkit-block-placeholder"></div>
                                                </div>
                                                <div><p =
class=3D"MsoNormal">Dosen't
                                                    define JWT's use for
                                                    access tokens for
                                                    the RS. =
&nbsp;&nbsp;</p>
                                                </div>
                                                <div><div>&nbsp;<br =
class=3D"webkit-block-placeholder"></div>
                                                </div>
                                                <div><p =
class=3D"MsoNormal">Bottom
                                                    line JWT is for more
                                                    than access =
tokens.</p>
                                                </div>
                                                <div><div>&nbsp;<br =
class=3D"webkit-block-placeholder"></div>
                                                </div>
                                                <div><p =
class=3D"MsoNormal">John
                                                    B.</p>
                                                </div>
                                                <div><div>&nbsp;<br =
class=3D"webkit-block-placeholder"></div>
                                                </div>
                                                <div>
                                                  <div><p =
class=3D"MsoNormal">On
                                                      2013-02-28, at
                                                      9:28 AM, Phil Hunt
                                                      &lt;<a =
moz-do-not-send=3D"true" href=3D"mailto:phil.hunt@oracle.com" =
target=3D"_blank">phil.hunt@oracle.com</a>&gt;
                                                      wrote:</p>
                                                  </div><p =
class=3D"MsoNormal"><br>
                                                    <br>
                                                  </p>
                                                  <div>
                                                    <div><p =
class=3D"MsoNormal">Are
                                                        you saying jwt
                                                        is not an access
                                                        token type?<br>
                                                        <br>
                                                        Phil</p>
                                                      =
<div><div>&nbsp;<br class=3D"webkit-block-placeholder"></div>
                                                      </div>
                                                      <div><p =
class=3D"MsoNormal">Sent
                                                          from my =
phone.</p>
                                                      </div>
                                                    </div>
                                                    <div><p =
class=3D"MsoNormal" style=3D"margin-bottom:12.0pt"><br>
                                                        On 2013-02-28,
                                                        at 8:58, John
                                                        Bradley &lt;<a =
moz-do-not-send=3D"true" href=3D"mailto:ve7jtb@ve7jtb.com" =
target=3D"_blank">ve7jtb@ve7jtb.com</a>&gt;
                                                        wrote:</p>
                                                    </div>
                                                    <blockquote =
style=3D"margin-top:5.0pt;margin-bottom:5.0pt"><p class=3D"MsoNormal">Yes,=

                                                        defining scope
                                                        in JWT is the
                                                        wrong place. =
&nbsp;
                                                        JWT needs to
                                                        stick to the
                                                        security claims
                                                        needed to
                                                        process JWT.</p>
                                                      =
<div><div>&nbsp;<br class=3D"webkit-block-placeholder"></div>
                                                      </div>
                                                      <div><p =
class=3D"MsoNormal">I
                                                          also don't
                                                          know how far
                                                          you get
                                                          requiring a
                                                          specific
                                                          authorization
                                                          format for
                                                          JWT, some AS
                                                          will wan to
                                                          use a opaque
                                                          reference,
                                                          some might
                                                          want to use a
                                                          user claim or
                                                          role claim,
                                                          others may use
                                                          scopes,
                                                          =
&nbsp;combining
                                                          scopes and
                                                          claims is also
                                                          possible.</p>
                                                      </div>
                                                      =
<div><div>&nbsp;<br class=3D"webkit-block-placeholder"></div>
                                                      </div>
                                                      <div><p =
class=3D"MsoNormal">Right
                                                          now it is up
                                                          to a AS RS
                                                          pair to agree
                                                          on how to
                                                          communicate
                                                          authorization.
                                                          &nbsp; I don't =
want
                                                          MAC to be more
                                                          restrictive
                                                          than bearer
                                                          when it comes
                                                          to
                                                          authorization
                                                          between AS and
                                                          RS.</p>
                                                        =
<div><div>&nbsp;<br class=3D"webkit-block-placeholder"></div>
                                                        </div>
                                                        <div><p =
class=3D"MsoNormal">Hannes
                                                          wanted to know
                                                          why JWT didn't
                                                          define scope.
                                                          &nbsp;The =
simple
                                                          answer is that
                                                          it is out of
                                                          scope for JWT
                                                          itself. &nbsp; =
It
                                                          might be
                                                          defined in a
                                                          OAuth access
                                                          token profile
                                                          for JWT but it
                                                          should not be
                                                          specific to
                                                          MAC.</p>
                                                        </div>
                                                        =
<div><div>&nbsp;<br class=3D"webkit-block-placeholder"></div>
                                                        </div>
                                                        <div><p =
class=3D"MsoNormal">John
                                                          B.</p>
                                                        </div>
                                                        <div>
                                                          <div>
                                                          <div><p =
class=3D"MsoNormal">On
                                                          2013-02-28, at
                                                          8:44 AM, Brian
                                                          Campbell =
&lt;<a moz-do-not-send=3D"true" href=3D"mailto:bcampbell@pingidentity.com"=
 target=3D"_blank">bcampbell@pingidentity.com</a>&gt;
                                                          wrote:</p>
                                                          </div><p =
class=3D"MsoNormal"><br>
                                                          <br>
                                                          </p>
                                                          <div>
                                                          <div><p =
class=3D"MsoNormal" style=3D"margin-bottom:12.0pt">I think John's point =
was more that scope is
                                                          something
                                                          rather
                                                          specific to an
                                                          OAuth access
                                                          token and,
                                                          while JWT is
                                                          can be used to
                                                          represent an
                                                          access token,
                                                          it's not the
                                                          only
                                                          application of
                                                          JWT. The
                                                          'standard'
                                                          claims in JWT
                                                          are those that
                                                          are believed
                                                          (right or
                                                          wrong) to be
                                                          widely
                                                          applicable
                                                          across
                                                          different
                                                          applications
                                                          of JWT. One
                                                          could argue
                                                          about it but
                                                          scope is
                                                          probably not
                                                          one of =
those.</p>
                                                          </div><p =
class=3D"MsoNormal">It
                                                          would probably
                                                          make sense to
                                                          try and build
                                                          a profile of
                                                          JWT
                                                          specifically
                                                          for OAuth
                                                          access tokens
                                                          (though I
                                                          suspect there
                                                          are some
                                                          turtles and
                                                          dragons in
                                                          there), which
                                                          might be the
                                                          appropriate
                                                          place to
                                                          =
define/register
                                                          a scope =
claim.</p>
                                                          </div>
                                                          <div><div =
style=3D"margin-bottom: 12pt; ">&nbsp;<br =
class=3D"webkit-block-placeholder"></div>
                                                          <div><p =
class=3D"MsoNormal">On
                                                          Thu, Feb 28,
                                                          2013 at 9:24
                                                          AM, Phil Hunt
                                                          &lt;<a =
moz-do-not-send=3D"true" href=3D"mailto:phil.hunt@oracle.com" =
target=3D"_blank">phil.hunt@oracle.com</a>&gt;
                                                          wrote:</p><p =
class=3D"MsoNormal">Are
                                                          you advocating
                                                          TWO systems?
                                                          That seems
                                                          like a bad
                                                          choice.<br>
                                                          <br>
                                                          I would rather
                                                          fix scope than
                                                          go to a two
                                                          system
                                                          approach.<br>
                                                          <br>
                                                          Phil<br>
                                                          <br>
                                                          Sent from my
                                                          phone.<br>
                                                          <br>
                                                          On 2013-02-28,
                                                          at 8:17, John
                                                          Bradley &lt;<a =
moz-do-not-send=3D"true" href=3D"mailto:ve7jtb@ve7jtb.com" =
target=3D"_blank">ve7jtb@ve7jtb.com</a>&gt;
                                                          wrote:<br>
                                                          <br>
                                                          &gt; While
                                                          scope is one
                                                          method that a
                                                          AS could
                                                          communicate
                                                          authorization
                                                          to a RS, it is
                                                          not the only
                                                          or perhaps
                                                          even the most
                                                          likely =
one.<br>
                                                          &gt; Using
                                                          scope requires
                                                          a relatively
                                                          tight binding
                                                          between the RS
                                                          and AS, =
&nbsp;UMA
                                                          uses a
                                                          different
                                                          mechanism that
                                                          describes
                                                          finer grained
                                                          =
operations.<br>
                                                          &gt; The AS
                                                          may include
                                                          roles, user,
                                                          or other more
                                                          abstract
                                                          claims that
                                                          the the client
                                                          may (god help
                                                          them) pass on
                                                          to EXCML for
                                                          =
processing.<br>
                                                          &gt;<br>
                                                          &gt; While
                                                          having a
                                                          scopes claim
                                                          is possible,
                                                          like any other
                                                          claim it is
                                                          not part of
                                                          the JWT core
                                                          security
                                                          processing
                                                          claims, and
                                                          needs to be
                                                          defined by
                                                          extension.<br>
                                                          &gt;<br>
                                                          &gt; John =
B.<br>
                                                          &gt; On
                                                          2013-02-28, at
                                                          2:29 AM,
                                                          Hannes
                                                          Tschofenig
                                                          &lt;<a =
moz-do-not-send=3D"true" href=3D"mailto:hannes.tschofenig@gmx.net" =
target=3D"_blank">hannes.tschofenig@gmx.net</a>&gt;
                                                          wrote:<br>
                                                          &gt;<br>
                                                          &gt;&gt; Hi
                                                          Mike,<br>
                                                          &gt;&gt;<br>
                                                          &gt;&gt; when
                                                          I worked on
                                                          the MAC
                                                          specification
                                                          I noticed that
                                                          the JWT does
                                                          not have a
                                                          claim for the
                                                          scope. I
                                                          believe that
                                                          this would be
                                                          needed to
                                                          allow the
                                                          resource
                                                          server to
                                                          verify whether
                                                          the scope the
                                                          authorization
                                                          server
                                                          authorized is
                                                          indeed what
                                                          the client is
                                                          asking =
for.<br>
                                                          &gt;&gt;<br>
                                                          &gt;&gt; =
Ciao<br>
                                                          &gt;&gt;
                                                          Hannes<br>
                                                          &gt;&gt;<br>
                                                          &gt;&gt;
                                                          =
_______________________________________________<br>
                                                          &gt;&gt; OAuth
                                                          mailing =
list<br>
                                                          &gt;&gt; <a =
moz-do-not-send=3D"true" href=3D"mailto:OAuth@ietf.org" =
target=3D"_blank">OAuth@ietf.org</a><br>
                                                          &gt;&gt; <a =
moz-do-not-send=3D"true" =
href=3D"https://www.ietf.org/mailman/listinfo/oauth" =
target=3D"_blank">https://www.ietf.org/mailman/listinfo/oauth</a><br>
                                                          &gt;<br>
                                                          &gt;
                                                          =
_______________________________________________<br>
                                                          &gt; OAuth
                                                          mailing =
list<br>
                                                          &gt; <a =
moz-do-not-send=3D"true" href=3D"mailto:OAuth@ietf.org" =
target=3D"_blank">OAuth@ietf.org</a><br>
                                                          &gt; <a =
moz-do-not-send=3D"true" =
href=3D"https://www.ietf.org/mailman/listinfo/oauth" =
target=3D"_blank">https://www.ietf.org/mailman/listinfo/oauth</a><br>
_______________________________________________<br>
                                                          OAuth mailing
                                                          list<br>
                                                          <a =
moz-do-not-send=3D"true" href=3D"mailto:OAuth@ietf.org" =
target=3D"_blank">OAuth@ietf.org</a><br>
                                                          <a =
moz-do-not-send=3D"true" =
href=3D"https://www.ietf.org/mailman/listinfo/oauth" =
target=3D"_blank">https://www.ietf.org/mailman/listinfo/oauth</a></p>
                                                          =
</div><div>&nbsp;<br class=3D"webkit-block-placeholder"></div>
                                                          </div>
                                                          =
</div><div>&nbsp;<br class=3D"webkit-block-placeholder"></div>
                                                        </div>
                                                      </div>
                                                    </blockquote>
                                                  </div>
                                                </div><div>&nbsp;<br =
class=3D"webkit-block-placeholder"></div>
                                              </div>
                                            </blockquote>
                                          </div>
                                        </div><div>&nbsp;<br =
class=3D"webkit-block-placeholder"></div>
                                      </div>
                                    </div>
                                  </div>
                                </div>
                              </div><div>&nbsp;<br =
class=3D"webkit-block-placeholder"></div>
                            </div>
                          </div>
                        </div>
                      </div>
                    </div>
                  </div>
                </div>
              </div>
            </blockquote>
          </div>
          <br>
        </div>
      </div>
      <br>
      <fieldset class=3D"mimeAttachmentHeader"></fieldset>
      <br>
      <pre wrap=3D"">_______________________________________________
OAuth mailing list
<a class=3D"moz-txt-link-abbreviated" =
href=3D"mailto:OAuth@ietf.org">OAuth@ietf.org</a>
<a class=3D"moz-txt-link-freetext" =
href=3D"https://www.ietf.org/mailman/listinfo/oauth">https://www.ietf.org/=
mailman/listinfo/oauth</a>
</pre>
    </blockquote>
    <br>
  </div>

_______________________________________________<br>OAuth mailing =
list<br><a =
href=3D"mailto:OAuth@ietf.org">OAuth@ietf.org</a><br>https://www.ietf.org/=
mailman/listinfo/oauth<br></blockquote></div><br></div></body></html>=

--Apple-Mail=_D5978521-803D-4BAE-A5F6-3EB39A01B565--

--Apple-Mail=_C1163A94-0DDC-4C53-8B2D-1FF0203C2F90
Content-Disposition: attachment;
	filename=smime.p7s
Content-Type: application/pkcs7-signature;
	name=smime.p7s
Content-Transfer-Encoding: base64
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--Apple-Mail=_C1163A94-0DDC-4C53-8B2D-1FF0203C2F90--

From leifj@mnt.se  Thu Feb 28 12:13:28 2013
Return-Path: <leifj@mnt.se>
X-Original-To: oauth@ietfa.amsl.com
Delivered-To: oauth@ietfa.amsl.com
Received: from localhost (localhost [127.0.0.1]) by ietfa.amsl.com (Postfix) with ESMTP id CAB5621F89FC for <oauth@ietfa.amsl.com>; Thu, 28 Feb 2013 12:13:28 -0800 (PST)
X-Virus-Scanned: amavisd-new at amsl.com
X-Spam-Flag: NO
X-Spam-Score: -1.733
X-Spam-Level: 
X-Spam-Status: No, score=-1.733 tagged_above=-999 required=5 tests=[BAYES_00=-2.599, FH_HOST_EQ_D_D_D_D=0.765, HTML_MESSAGE=0.001, RDNS_DYNAMIC=0.1]
Received: from mail.ietf.org ([64.170.98.30]) by localhost (ietfa.amsl.com [127.0.0.1]) (amavisd-new, port 10024) with ESMTP id Ff3KuYyaXxFv for <oauth@ietfa.amsl.com>; Thu, 28 Feb 2013 12:13:28 -0800 (PST)
Received: from mail-la0-x22a.google.com (mail-la0-x22a.google.com [IPv6:2a00:1450:4010:c03::22a]) by ietfa.amsl.com (Postfix) with ESMTP id D3F4521F8845 for <oauth@ietf.org>; Thu, 28 Feb 2013 12:13:27 -0800 (PST)
Received: by mail-la0-f42.google.com with SMTP id fe20so2228916lab.15 for <oauth@ietf.org>; Thu, 28 Feb 2013 12:13:26 -0800 (PST)
X-Google-DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=google.com; s=20120113; h=x-received:message-id:date:from:user-agent:mime-version:to:subject :references:in-reply-to:content-type:x-gm-message-state; bh=8KXu85yGHq/pbzFW2Zwkyk6+Z8jq6DgJwmcri7YeUfQ=; b=opFBzfXxLtlZAo/aC1d5hjN2EExfQnqMbAWVxsDfcjdFRBAXCYMBzDQrS4jFLr9yKX XfrG6p/AKwAvy1hN/4m9KiebV/7wMMvEQDR9KHx2YM9blo1Ncktk1tHjhc3/YAlrVhT/ xsLjtYgaq4/LTXetbs0QYdNi2BdmSGtND3xUBSFc9DJoY7+wGrmAh6xX0+Jsm/cxEsDP ada4EELt8RovMSn/VHnaC6iF+fUGuFlrpuQXazDRMQBXDPK9yW8QXkZk/ezXlOsIiY/9 2eJCyeDh8p1KOa9QCh+L5sDOiKtrtM/yMnnCVlXM3tJT0wIOWF2YlQSamnBu7WZRAlDT DGew==
X-Received: by 10.112.28.41 with SMTP id y9mr4083620lbg.133.1362082406698; Thu, 28 Feb 2013 12:13:26 -0800 (PST)
Received: from [10.0.0.244] (tb62-102-145-131.cust.teknikbyran.com. [62.102.145.131]) by mx.google.com with ESMTPS id gm20sm5325292lab.7.2013.02.28.12.13.25 (version=TLSv1 cipher=ECDHE-RSA-RC4-SHA bits=128/128); Thu, 28 Feb 2013 12:13:25 -0800 (PST)
Message-ID: <512FBA63.4060108@mnt.se>
Date: Thu, 28 Feb 2013 21:13:23 +0100
From: Leif Johansson <leifj@mnt.se>
User-Agent: Mozilla/5.0 (X11; Linux x86_64; rv:17.0) Gecko/20130221 Thunderbird/17.0.3
MIME-Version: 1.0
To: oauth@ietf.org
References: <1362079266.8952.YahooMailClassic@web141002.mail.bf1.yahoo.com>
In-Reply-To: <1362079266.8952.YahooMailClassic@web141002.mail.bf1.yahoo.com>
Content-Type: multipart/alternative; boundary="------------040905060306030803090703"
X-Gm-Message-State: ALoCoQnwCCcGd+J6B2ibT1k+C40kwYaAurtDTUA2VEgxNizWnhGuszEZIoKYYkLo2Rd0rQNKzkW8
Subject: Re: [OAUTH-WG] Fw:  IPR Disclosure: - What to Do with JWT ?
X-BeenThere: oauth@ietf.org
X-Mailman-Version: 2.1.12
Precedence: list
List-Id: OAUTH WG <oauth.ietf.org>
List-Unsubscribe: <https://www.ietf.org/mailman/options/oauth>, <mailto:oauth-request@ietf.org?subject=unsubscribe>
List-Archive: <http://www.ietf.org/mail-archive/web/oauth>
List-Post: <mailto:oauth@ietf.org>
List-Help: <mailto:oauth-request@ietf.org?subject=help>
List-Subscribe: <https://www.ietf.org/mailman/listinfo/oauth>, <mailto:oauth-request@ietf.org?subject=subscribe>
X-List-Received-Date: Thu, 28 Feb 2013 20:13:29 -0000

This is a multi-part message in MIME format.
--------------040905060306030803090703
Content-Type: text/plain; charset=ISO-8859-1
Content-Transfer-Encoding: 7bit

On 02/28/2013 08:21 PM, Oleg Gryb wrote:
> Dear OAuth WG and Chairs,
>
> Can somebody please comment the Certicom's disclosure below? If the
> purpose of this disclosure is to inform us that JWT can be potentially
> a subject of royalties and other possible legal actions, the value of
> adopting JWT in the scope of OAuth 2.0 IETF standard would definitely
> diminish and if this is the case shouldn't we consider replacing it
> with something similar, but different, which would not be a subject of
> the future possible litigation?   
>
> I'm not a lawyer and might not understand the statement below
> correctly, so please let me know if/where I'm wrong. Please keep in
> mind also that the popularity of JWT is growing fast along with the
> implementations, so we need to do something quickly.
>
I'm curious too.

Skimming through the summaries on google patents of the cited patents I
couldn't immediately see
the relationship with JWTs but then again I'm not a patent lawyer (nor
do I play one on the net).

        Cheers Leif


--------------040905060306030803090703
Content-Type: text/html; charset=ISO-8859-1
Content-Transfer-Encoding: 7bit

<html>
  <head>
    <meta content="text/html; charset=ISO-8859-1"
      http-equiv="Content-Type">
  </head>
  <body bgcolor="#FFFFFF" text="#000000">
    <div class="moz-cite-prefix">On 02/28/2013 08:21 PM, Oleg Gryb
      wrote:<br>
    </div>
    <blockquote
      cite="mid:1362079266.8952.YahooMailClassic@web141002.mail.bf1.yahoo.com"
      type="cite">
      <table border="0" cellpadding="0" cellspacing="0">
        <tbody>
          <tr>
            <td style="font: inherit;" valign="top">Dear OAuth WG and
              Chairs,<br>
              <br>
              Can somebody please comment the Certicom's disclosure
              below? If the purpose of this disclosure is to inform us
              that JWT can be potentially a subject of royalties and
              other possible legal actions, the value of adopting JWT in
              the scope of OAuth 2.0 IETF standard would definitely
              diminish and if this is the case shouldn't we consider
              replacing it with something similar, but different, which
              would not be a subject of the future possible litigation?&nbsp;
              &nbsp; <br>
              <br>
              I'm not a lawyer and might not understand the statement
              below correctly, so please let me know if/where I'm wrong.
              Please keep in mind also that the popularity of JWT is
              growing fast along with the implementations, so we need to
              do something quickly.<br>
            </td>
          </tr>
        </tbody>
      </table>
    </blockquote>
    I'm curious too. <br>
    <br>
    Skimming through the summaries on google patents of the cited
    patents I couldn't immediately see <br>
    the relationship with JWTs but then again I'm not a patent lawyer
    (nor do I play one on the net).<br>
    <br>
    &nbsp;&nbsp;&nbsp; &nbsp;&nbsp;&nbsp; Cheers Leif<br>
    <br>
  </body>
</html>

--------------040905060306030803090703--

From prateek.mishra@oracle.com  Thu Feb 28 12:44:06 2013
Return-Path: <prateek.mishra@oracle.com>
X-Original-To: oauth@ietfa.amsl.com
Delivered-To: oauth@ietfa.amsl.com
Received: from localhost (localhost [127.0.0.1]) by ietfa.amsl.com (Postfix) with ESMTP id 909A121F89B2 for <oauth@ietfa.amsl.com>; Thu, 28 Feb 2013 12:44:06 -0800 (PST)
X-Virus-Scanned: amavisd-new at amsl.com
X-Spam-Flag: NO
X-Spam-Score: -6.565
X-Spam-Level: 
X-Spam-Status: No, score=-6.565 tagged_above=-999 required=5 tests=[AWL=0.033,  BAYES_00=-2.599, HTML_MESSAGE=0.001, RCVD_IN_DNSWL_MED=-4]
Received: from mail.ietf.org ([64.170.98.30]) by localhost (ietfa.amsl.com [127.0.0.1]) (amavisd-new, port 10024) with ESMTP id KMHFl3lMnFdW for <oauth@ietfa.amsl.com>; Thu, 28 Feb 2013 12:44:05 -0800 (PST)
Received: from aserp1040.oracle.com (aserp1040.oracle.com [141.146.126.69]) by ietfa.amsl.com (Postfix) with ESMTP id B9CCF21F89CC for <oauth@ietf.org>; Thu, 28 Feb 2013 12:44:03 -0800 (PST)
Received: from ucsinet22.oracle.com (ucsinet22.oracle.com [156.151.31.94]) by aserp1040.oracle.com (Sentrion-MTA-4.3.1/Sentrion-MTA-4.3.1) with ESMTP id r1SKi2V6016227 (version=TLSv1/SSLv3 cipher=DHE-RSA-AES256-SHA bits=256 verify=OK); Thu, 28 Feb 2013 20:44:03 GMT
Received: from acsmt357.oracle.com (acsmt357.oracle.com [141.146.40.157]) by ucsinet22.oracle.com (8.14.4+Sun/8.14.4) with ESMTP id r1SKi1ha015048 (version=TLSv1/SSLv3 cipher=DHE-RSA-AES256-SHA bits=256 verify=NO); Thu, 28 Feb 2013 20:44:02 GMT
Received: from abhmt110.oracle.com (abhmt110.oracle.com [141.146.116.62]) by acsmt357.oracle.com (8.12.11.20060308/8.12.11) with ESMTP id r1SKi1Ad023595; Thu, 28 Feb 2013 14:44:01 -0600
Received: from [10.152.55.88] (/10.152.55.88) by default (Oracle Beehive Gateway v4.0) with ESMTP ; Thu, 28 Feb 2013 12:44:00 -0800
Message-ID: <512FC18D.1020803@oracle.com>
Date: Thu, 28 Feb 2013 15:43:57 -0500
From: prateek mishra <prateek.mishra@oracle.com>
Organization: Oracle Corporation
User-Agent: Mozilla/5.0 (Windows NT 5.1; rv:17.0) Gecko/20130107 Thunderbird/17.0.2
MIME-Version: 1.0
To: oauth@ietf.org, Brian Campbell <bcampbell@pingidentity.com>
References: <0EC2404F-E3C5-4AD1-88B4-E74AA0394DD9@gmx.net> <C75E4871-E907-4EF7-BAF0-9D1A172D581B@ve7jtb.com> <CA6A6425-D0CE-469F-B51E-9F296DA8041C@oracle.com> <CA+k3eCREgN+6z+U=jjJcPo0nZVR0GWn5zXeecZRO+rg=xd-gZg@mail.gmail.com> <A2375FE9-946F-46B3-9356-0709DD56BD4A@ve7jtb.com> <48FD87D1-4DF4-4289-99B7-40A515F31890@oracle.com> <3E472720-31A4-40A0-AAA4-402CF850831A@ve7jtb.com> <7127843B-D7B0-4AB6-87F1-1604D1EFFA79@oracle.com> <50DA292F-32F0-4266-8401-006AD837B775@ve7jtb.com> <CA+k3eCSyE3cPMh17XuivbUZUtHY=RAtjV1UeCdW6gGFk+gv02A@mail.gmail.com>
In-Reply-To: <CA+k3eCSyE3cPMh17XuivbUZUtHY=RAtjV1UeCdW6gGFk+gv02A@mail.gmail.com>
Content-Type: multipart/alternative; boundary="------------010101070200010105050902"
X-Source-IP: ucsinet22.oracle.com [156.151.31.94]
Subject: Re: [OAUTH-WG] JWT - scope claim missing
X-BeenThere: oauth@ietf.org
X-Mailman-Version: 2.1.12
Precedence: list
List-Id: OAUTH WG <oauth.ietf.org>
List-Unsubscribe: <https://www.ietf.org/mailman/options/oauth>, <mailto:oauth-request@ietf.org?subject=unsubscribe>
List-Archive: <http://www.ietf.org/mail-archive/web/oauth>
List-Post: <mailto:oauth@ietf.org>
List-Help: <mailto:oauth-request@ietf.org?subject=help>
List-Subscribe: <https://www.ietf.org/mailman/listinfo/oauth>, <mailto:oauth-request@ietf.org?subject=subscribe>
X-List-Received-Date: Thu, 28 Feb 2013 20:44:06 -0000

This is a multi-part message in MIME format.
--------------010101070200010105050902
Content-Type: text/plain; charset=ISO-8859-1; format=flowed
Content-Transfer-Encoding: 7bit

SAML 2.0 Profile for OAuth 2.0 Client Authentication and Authorization 
Grants
JWT Profile for OAuth 2.0 Client Authentication and Authorization Grants
Assertion Framework for OAuth 2.0 <as above>

a bit wordy, but does get the point across IMO

- prateek
> I'm not sure anyone really "picked" the titles for the bearer token 
> profiles. They just kind of evolved. And evolved in funny ways 
> especially when client authn to the AS was added.
>
> You won't hear me argue that the titles are "good" and this is not the 
> first time there's been confusion about what they actually do. They 
> define new grant types and new client authentication methods. They *do 
> not* define an access token format or anything else about access 
> tokens. JWT and SAML could be used for that but that's not what these 
> drafts do.
>
> Suggestions for better title(s) would be more than welcome.
>
> Here's what they are now:
>
> SAML 2.0 Bearer Assertion Profiles for OAuth 2.0
> draft-ietf-oauth-saml2-bearer
>
> JSON Web Token (JWT) Bearer Token Profiles for OAuth 2.0
> draft-ietf-oauth-jwt-bearer
>
> Assertion Framework for OAuth 2.0
> draft-ietf-oauth-assertions
>
> On Thu, Feb 28, 2013 at 11:36 AM, John Bradley <ve7jtb@ve7jtb.com 
> <mailto:ve7jtb@ve7jtb.com>> wrote:
>
>     Yes the title likely adds to the confusion given that the bearer
>     tokens are not access tokens.
>
>     Things as separate from OAuth as the Firefox browerID spec use JWS
>     signed JWTs.
>
>     The bearer token profiles for OAuth 2 are for OAuth2.
>
>     The JSON Web Token (JWT)
>     <http://tools.ietf.org/html/draft-ietf-oauth-json-web-token-06> spec
>     did not start in OAuth and is not OAuth specific.
>
>     A JWT is:
>
>     JSON Web Token (JWT)  A string representing a set of claims as a JSON
>            object that is encoded in a JWS or JWE, enabling the claims to be
>            digitally signed or MACed and/or encrypted.
>
>
>     So OAuth or other profiles may define claims to go in a JWT, but
>     the JWT needs to itself only define the claims necessary for
>     security processing.
>
>     John B.
>     PS that was a soft ball If you hadn't responded I would have been
>     disappointed.  I din't pick the title for the bearer token profiles.
>
>
>     On 2013-02-28, at 10:12 AM, Phil Hunt <phil.hunt@oracle.com
>     <mailto:phil.hunt@oracle.com>> wrote:
>
>>              
>>
>>
>>       JSON Web Token (JWT) Bearer Token Profiles for OAuth 2.0
>>
>>
>>     Note the title says "for OAuth2"
>>
>>     Sorry. Couldn't resist.
>>
>>     Phil
>>
>>     Sent from my phone.
>>
>>     On 2013-02-28, at 9:40, John Bradley <ve7jtb@ve7jtb.com
>>     <mailto:ve7jtb@ve7jtb.com>> wrote:
>>
>>>     JWT is an assertion( I am probably going to regret using that
>>>     word).
>>>
>>>     It is used in openID connect for id_tokens, it is used in OAuth
>>>     for Assertion grant types and authentication of the client to
>>>     the token endpoint.
>>>     http://tools.ietf.org/html/draft-ietf-oauth-jwt-bearer-04
>>>
>>>
>>>       JSON Web Token (JWT) Bearer Token Profiles for OAuth 2.0
>>>
>>>
>>>     Dosen't define JWT's use for access tokens for the RS.
>>>
>>>     Bottom line JWT is for more than access tokens.
>>>
>>>     John B.
>>>
>>>     On 2013-02-28, at 9:28 AM, Phil Hunt <phil.hunt@oracle.com
>>>     <mailto:phil.hunt@oracle.com>> wrote:
>>>
>>>>     Are you saying jwt is not an access token type?
>>>>
>>>>     Phil
>>>>
>>>>     Sent from my phone.
>>>>
>>>>     On 2013-02-28, at 8:58, John Bradley <ve7jtb@ve7jtb.com
>>>>     <mailto:ve7jtb@ve7jtb.com>> wrote:
>>>>
>>>>>     Yes, defining scope in JWT is the wrong place.   JWT needs to
>>>>>     stick to the security claims needed to process JWT.
>>>>>
>>>>>     I also don't know how far you get requiring a specific
>>>>>     authorization format for JWT, some AS will wan to use a opaque
>>>>>     reference, some might want to use a user claim or role claim,
>>>>>     others may use scopes,  combining scopes and claims is also
>>>>>     possible.
>>>>>
>>>>>     Right now it is up to a AS RS pair to agree on how to
>>>>>     communicate authorization.   I don't want MAC to be more
>>>>>     restrictive than bearer when it comes to authorization between
>>>>>     AS and RS.
>>>>>
>>>>>     Hannes wanted to know why JWT didn't define scope.  The simple
>>>>>     answer is that it is out of scope for JWT itself.   It might
>>>>>     be defined in a OAuth access token profile for JWT but it
>>>>>     should not be specific to MAC.
>>>>>
>>>>>     John B.
>>>>>     On 2013-02-28, at 8:44 AM, Brian Campbell
>>>>>     <bcampbell@pingidentity.com
>>>>>     <mailto:bcampbell@pingidentity.com>> wrote:
>>>>>
>>>>>>     I think John's point was more that scope is something rather
>>>>>>     specific to an OAuth access token and, while JWT is can be
>>>>>>     used to represent an access token, it's not the only
>>>>>>     application of JWT. The 'standard' claims in JWT are those
>>>>>>     that are believed (right or wrong) to be widely applicable
>>>>>>     across different applications of JWT. One could argue about
>>>>>>     it but scope is probably not one of those.
>>>>>>
>>>>>>     It would probably make sense to try and build a profile of
>>>>>>     JWT specifically for OAuth access tokens (though I suspect
>>>>>>     there are some turtles and dragons in there), which might be
>>>>>>     the appropriate place to define/register a scope claim.
>>>>>>
>>>>>>
>>>>>>     On Thu, Feb 28, 2013 at 9:24 AM, Phil Hunt
>>>>>>     <phil.hunt@oracle.com <mailto:phil.hunt@oracle.com>> wrote:
>>>>>>
>>>>>>         Are you advocating TWO systems? That seems like a bad choice.
>>>>>>
>>>>>>         I would rather fix scope than go to a two system approach.
>>>>>>
>>>>>>         Phil
>>>>>>
>>>>>>         Sent from my phone.
>>>>>>
>>>>>>         On 2013-02-28, at 8:17, John Bradley <ve7jtb@ve7jtb.com
>>>>>>         <mailto:ve7jtb@ve7jtb.com>> wrote:
>>>>>>
>>>>>>         > While scope is one method that a AS could communicate
>>>>>>         authorization to a RS, it is not the only or perhaps even
>>>>>>         the most likely one.
>>>>>>         > Using scope requires a relatively tight binding between
>>>>>>         the RS and AS,  UMA uses a different mechanism that
>>>>>>         describes finer grained operations.
>>>>>>         > The AS may include roles, user, or other more abstract
>>>>>>         claims that the the client may (god help them) pass on to
>>>>>>         EXCML for processing.
>>>>>>         >
>>>>>>         > While having a scopes claim is possible, like any other
>>>>>>         claim it is not part of the JWT core security processing
>>>>>>         claims, and needs to be defined by extension.
>>>>>>         >
>>>>>>         > John B.
>>>>>>         > On 2013-02-28, at 2:29 AM, Hannes Tschofenig
>>>>>>         <hannes.tschofenig@gmx.net
>>>>>>         <mailto:hannes.tschofenig@gmx.net>> wrote:
>>>>>>         >
>>>>>>         >> Hi Mike,
>>>>>>         >>
>>>>>>         >> when I worked on the MAC specification I noticed that
>>>>>>         the JWT does not have a claim for the scope. I believe
>>>>>>         that this would be needed to allow the resource server to
>>>>>>         verify whether the scope the authorization server
>>>>>>         authorized is indeed what the client is asking for.
>>>>>>         >>
>>>>>>         >> Ciao
>>>>>>         >> Hannes
>>>>>>         >>
>>>>>>         >> _______________________________________________
>>>>>>         >> OAuth mailing list
>>>>>>         >> OAuth@ietf.org <mailto:OAuth@ietf.org>
>>>>>>         >> https://www.ietf.org/mailman/listinfo/oauth
>>>>>>         >
>>>>>>         > _______________________________________________
>>>>>>         > OAuth mailing list
>>>>>>         > OAuth@ietf.org <mailto:OAuth@ietf.org>
>>>>>>         > https://www.ietf.org/mailman/listinfo/oauth
>>>>>>         _______________________________________________
>>>>>>         OAuth mailing list
>>>>>>         OAuth@ietf.org <mailto:OAuth@ietf.org>
>>>>>>         https://www.ietf.org/mailman/listinfo/oauth
>>>>>>
>>>>>>
>>>>>
>>>
>
>
>
>
> _______________________________________________
> OAuth mailing list
> OAuth@ietf.org
> https://www.ietf.org/mailman/listinfo/oauth


--------------010101070200010105050902
Content-Type: text/html; charset=ISO-8859-1
Content-Transfer-Encoding: 7bit

<html>
  <head>
    <meta content="text/html; charset=ISO-8859-1"
      http-equiv="Content-Type">
  </head>
  <body bgcolor="#FFFFFF" text="#000000">
    SAML 2.0 Profile for OAuth 2.0 Client Authentication and
    Authorization Grants <br>
    JWT Profile for OAuth 2.0 Client Authentication and Authorization
    Grants <br>
    Assertion Framework for OAuth 2.0 &lt;as above&gt; <br>
    <br>
    a bit wordy, but does get the point across IMO<br>
    <br>
    - prateek<br>
    <blockquote
cite="mid:CA+k3eCSyE3cPMh17XuivbUZUtHY=RAtjV1UeCdW6gGFk+gv02A@mail.gmail.com"
      type="cite">
      <div dir="ltr">
        <div>I'm not sure anyone really "picked" the titles for the
          bearer token profiles. They just kind of evolved. And evolved
          in funny ways especially when client authn to the AS was
          added. <br>
          <br>
        </div>
        <div>You won't hear me argue that the titles are "good" and this
          is not the first time there's been confusion about what they
          actually do. They define new grant types and new client
          authentication methods. They *do not* define an access token
          format or anything else about access tokens. JWT and SAML
          could be used for that but that's not what these drafts do. <br>
          <br>
        </div>
        <div>Suggestions for better title(s) would be more than welcome.<br>
        </div>
        <div>
          <div><br>
          </div>
          <div>Here's what they are now:<br>
          </div>
          <div><br>
            SAML 2.0 Bearer Assertion Profiles for OAuth 2.0<br>
            draft-ietf-oauth-saml2-bearer<br>
            <br>
            JSON Web Token (JWT) Bearer Token Profiles for OAuth 2.0<br>
            draft-ietf-oauth-jwt-bearer<br>
            <br>
            Assertion Framework for OAuth 2.0<br>
            draft-ietf-oauth-assertions<br>
            <div class="gmail_extra"><br>
              <div class="gmail_quote">On Thu, Feb 28, 2013 at 11:36 AM,
                John Bradley <span dir="ltr">&lt;<a
                    moz-do-not-send="true"
                    href="mailto:ve7jtb@ve7jtb.com" target="_blank">ve7jtb@ve7jtb.com</a>&gt;</span>
                wrote:<br>
                <blockquote class="gmail_quote" style="margin:0px 0px
                  0px 0.8ex;border-left:1px solid
                  rgb(204,204,204);padding-left:1ex">
                  <div style="word-wrap:break-word">Yes the title likely
                    adds to the confusion given that the bearer tokens
                    are not access tokens.
                    <div><br>
                    </div>
                    <div>Things as separate from OAuth as the Firefox
                      browerID spec use JWS signed JWTs. &nbsp;</div>
                    <div><br>
                    </div>
                    <div>The bearer token profiles for OAuth 2 are for
                      OAuth2.</div>
                    <div><br>
                    </div>
                    <div>The&nbsp;<a moz-do-not-send="true"
                        href="http://tools.ietf.org/html/draft-ietf-oauth-json-web-token-06"
                        target="_blank">JSON Web Token (JWT)</a>&nbsp;spec
                      did not start in OAuth and is not OAuth specific.</div>
                    <div><br>
                    </div>
                    <div>A JWT is:</div>
                    <div>
                      <pre style="font-size:1em;margin-top:0px;margin-bottom:0px">JSON Web Token (JWT)  A string representing a set of claims as a JSON
      object that is encoded in a JWS or JWE, enabling the claims to be
      digitally signed or MACed and/or encrypted.
</pre>
                      <div><br>
                      </div>
                      <div>So OAuth or other profiles may define claims
                        to go in a JWT, but the JWT needs to itself only
                        define the claims necessary for security
                        processing. &nbsp;</div>
                      <div><br>
                      </div>
                      <div>John B.</div>
                      <div>PS that was a soft ball If you hadn't
                        responded I would have been disappointed. &nbsp;I
                        din't pick the title for the bearer token
                        profiles.</div>
                      <div>
                        <div>
                          <div><br>
                          </div>
                          <div><br>
                          </div>
                          <div>
                            <div>On 2013-02-28, at 10:12 AM, Phil Hunt
                              &lt;<a moz-do-not-send="true"
                                href="mailto:phil.hunt@oracle.com"
                                target="_blank">phil.hunt@oracle.com</a>&gt;
                              wrote:</div>
                            <br>
                            <blockquote type="cite">
                              <div dir="auto">
                                <div>
                                  <pre style="margin-top:0px;margin-bottom:0px"><font face="Helvetica"><span style="white-space:normal;background-color:rgba(255,255,255,0)">        <span style="display:inline;font-weight:bold"><h1 style="display:inline">


JSON Web Token (JWT) Bearer Token Profiles for OAuth 2.0</h1></span></span></font></pre>
                                  <br>
                                  <span>Note the title says "for OAuth2"</span></div>
                                <div><span><br>
                                  </span></div>
                                <div><span>Sorry. Couldn't resist.&nbsp;</span></div>
                                <div><span><br>
                                  </span></div>
                                <div><span>Phil</span>
                                  <div><br>
                                  </div>
                                  <div>Sent from my phone.</div>
                                </div>
                                <div><br>
                                  On 2013-02-28, at 9:40, John Bradley
                                  &lt;<a moz-do-not-send="true"
                                    href="mailto:ve7jtb@ve7jtb.com"
                                    target="_blank">ve7jtb@ve7jtb.com</a>&gt;
                                  wrote:<br>
                                  <br>
                                </div>
                                <blockquote type="cite">JWT is an
                                  assertion( I am probably going to
                                  regret using that word).
                                  <div><br>
                                  </div>
                                  <div>It is used in openID connect for
                                    id_tokens, it is used in OAuth for
                                    Assertion grant types and
                                    authentication of the client to the
                                    token endpoint.</div>
                                  <div><a moz-do-not-send="true"
                                      href="http://tools.ietf.org/html/draft-ietf-oauth-jwt-bearer-04"
                                      target="_blank">http://tools.ietf.org/html/draft-ietf-oauth-jwt-bearer-04</a></div>
                                  <div><br>
                                  </div>
                                  <div>
                                    <pre style="font-size:1em;margin-top:0px;margin-bottom:0px">
<span style="line-height:0pt;display:inline;font-size:1em;font-weight:bold"><h1 style="line-height:0pt;display:inline;font-size:1em">JSON Web Token (JWT) Bearer Token Profiles for OAuth 2.0</h1></span></pre>
                                    <div><br>
                                    </div>
                                    <div>Dosen't define JWT's use for
                                      access tokens for the RS. &nbsp;&nbsp;</div>
                                    <div><br>
                                    </div>
                                    <div>Bottom line JWT is for more
                                      than access tokens.</div>
                                    <div><br>
                                    </div>
                                    <div>John B.</div>
                                    <div><br>
                                    </div>
                                    <div>
                                      <div>On 2013-02-28, at 9:28 AM,
                                        Phil Hunt &lt;<a
                                          moz-do-not-send="true"
                                          href="mailto:phil.hunt@oracle.com"
                                          target="_blank">phil.hunt@oracle.com</a>&gt;
                                        wrote:</div>
                                      <br>
                                      <blockquote type="cite">
                                        <div dir="auto">
                                          <div>Are you saying jwt is not
                                            an access token type?<br>
                                            <br>
                                            Phil
                                            <div><br>
                                            </div>
                                            <div>Sent from my phone.</div>
                                          </div>
                                          <div><br>
                                            On 2013-02-28, at 8:58, John
                                            Bradley &lt;<a
                                              moz-do-not-send="true"
                                              href="mailto:ve7jtb@ve7jtb.com"
                                              target="_blank">ve7jtb@ve7jtb.com</a>&gt;
                                            wrote:<br>
                                            <br>
                                          </div>
                                          <blockquote type="cite">Yes,
                                            defining scope in JWT is the
                                            wrong place. &nbsp; JWT needs to
                                            stick to the security claims
                                            needed to process JWT.
                                            <div><br>
                                            </div>
                                            <div>I also don't know how
                                              far you get requiring a
                                              specific authorization
                                              format for JWT, some AS
                                              will wan to use a opaque
                                              reference, some might want
                                              to use a user claim or
                                              role claim, others may use
                                              scopes, &nbsp;combining scopes
                                              and claims is also
                                              possible.</div>
                                            <div><br>
                                            </div>
                                            <div>Right now it is up to a
                                              AS RS pair to agree on how
                                              to communicate
                                              authorization. &nbsp; I don't
                                              want MAC to be more
                                              restrictive than bearer
                                              when it comes to
                                              authorization between AS
                                              and RS.<br>
                                              <div><br>
                                              </div>
                                              <div>Hannes wanted to know
                                                why JWT didn't define
                                                scope. &nbsp;The simple
                                                answer is that it is out
                                                of scope for JWT itself.
                                                &nbsp; It might be defined in
                                                a OAuth access token
                                                profile for JWT but it
                                                should not be specific
                                                to MAC.</div>
                                              <div><br>
                                              </div>
                                              <div>John B.</div>
                                              <div>
                                                <div>
                                                  <div>On 2013-02-28, at
                                                    8:44 AM, Brian
                                                    Campbell &lt;<a
                                                      moz-do-not-send="true"
href="mailto:bcampbell@pingidentity.com" target="_blank">bcampbell@pingidentity.com</a>&gt;
                                                    wrote:</div>
                                                  <br>
                                                  <blockquote
                                                    type="cite">
                                                    <div dir="ltr">
                                                      <div>I think
                                                        John's point was
                                                        more that scope
                                                        is something
                                                        rather specific
                                                        to an OAuth
                                                        access token
                                                        and, while JWT
                                                        is can be used
                                                        to represent an
                                                        access token,
                                                        it's not the
                                                        only application
                                                        of JWT. The
                                                        'standard'
                                                        claims in JWT
                                                        are those that
                                                        are believed
                                                        (right or wrong)
                                                        to be widely
                                                        applicable
                                                        across different
                                                        applications of
                                                        JWT. One could
                                                        argue about it
                                                        but scope is
                                                        probably not one
                                                        of those.<br>
                                                        <br>
                                                      </div>
                                                      It would probably
                                                      make sense to try
                                                      and build a
                                                      profile of JWT
                                                      specifically for
                                                      OAuth access
                                                      tokens (though I
                                                      suspect there are
                                                      some turtles and
                                                      dragons in there),
                                                      which might be the
                                                      appropriate place
                                                      to define/register
                                                      a scope claim.<br>
                                                    </div>
                                                    <div
                                                      class="gmail_extra"><br>
                                                      <br>
                                                      <div
                                                        class="gmail_quote">On
                                                        Thu, Feb 28,
                                                        2013 at 9:24 AM,
                                                        Phil Hunt <span
                                                          dir="ltr">&lt;<a
moz-do-not-send="true" href="mailto:phil.hunt@oracle.com"
                                                          target="_blank">phil.hunt@oracle.com</a>&gt;</span>
                                                        wrote:<br>
                                                        <blockquote
                                                          class="gmail_quote"
                                                          style="margin:0px
                                                          0px 0px
                                                          0.8ex;border-left:1px
                                                          solid
                                                          rgb(204,204,204);padding-left:1ex">Are
                                                          you advocating
                                                          TWO systems?
                                                          That seems
                                                          like a bad
                                                          choice.<br>
                                                          <br>
                                                          I would rather
                                                          fix scope than
                                                          go to a two
                                                          system
                                                          approach.<br>
                                                          <br>
                                                          Phil<br>
                                                          <br>
                                                          Sent from my
                                                          phone.<br>
                                                          <br>
                                                          On 2013-02-28,
                                                          at 8:17, John
                                                          Bradley &lt;<a
moz-do-not-send="true" href="mailto:ve7jtb@ve7jtb.com" target="_blank">ve7jtb@ve7jtb.com</a>&gt;
                                                          wrote:<br>
                                                          <br>
                                                          &gt; While
                                                          scope is one
                                                          method that a
                                                          AS could
                                                          communicate
                                                          authorization
                                                          to a RS, it is
                                                          not the only
                                                          or perhaps
                                                          even the most
                                                          likely one.<br>
                                                          &gt; Using
                                                          scope requires
                                                          a relatively
                                                          tight binding
                                                          between the RS
                                                          and AS, &nbsp;UMA
                                                          uses a
                                                          different
                                                          mechanism that
                                                          describes
                                                          finer grained
                                                          operations.<br>
                                                          &gt; The AS
                                                          may include
                                                          roles, user,
                                                          or other more
                                                          abstract
                                                          claims that
                                                          the the client
                                                          may (god help
                                                          them) pass on
                                                          to EXCML for
                                                          processing.<br>
                                                          &gt;<br>
                                                          &gt; While
                                                          having a
                                                          scopes claim
                                                          is possible,
                                                          like any other
                                                          claim it is
                                                          not part of
                                                          the JWT core
                                                          security
                                                          processing
                                                          claims, and
                                                          needs to be
                                                          defined by
                                                          extension.<br>
                                                          &gt;<br>
                                                          &gt; John B.<br>
                                                          &gt; On
                                                          2013-02-28, at
                                                          2:29 AM,
                                                          Hannes
                                                          Tschofenig
                                                          &lt;<a
                                                          moz-do-not-send="true"
href="mailto:hannes.tschofenig@gmx.net" target="_blank">hannes.tschofenig@gmx.net</a>&gt;
                                                          wrote:<br>
                                                          &gt;<br>
                                                          &gt;&gt; Hi
                                                          Mike,<br>
                                                          &gt;&gt;<br>
                                                          &gt;&gt; when
                                                          I worked on
                                                          the MAC
                                                          specification
                                                          I noticed that
                                                          the JWT does
                                                          not have a
                                                          claim for the
                                                          scope. I
                                                          believe that
                                                          this would be
                                                          needed to
                                                          allow the
                                                          resource
                                                          server to
                                                          verify whether
                                                          the scope the
                                                          authorization
                                                          server
                                                          authorized is
                                                          indeed what
                                                          the client is
                                                          asking for.<br>
                                                          &gt;&gt;<br>
                                                          &gt;&gt; Ciao<br>
                                                          &gt;&gt;
                                                          Hannes<br>
                                                          &gt;&gt;<br>
                                                          &gt;&gt;
                                                          _______________________________________________<br>
                                                          &gt;&gt; OAuth
                                                          mailing list<br>
                                                          &gt;&gt; <a
                                                          moz-do-not-send="true"
href="mailto:OAuth@ietf.org" target="_blank">OAuth@ietf.org</a><br>
                                                          &gt;&gt; <a
                                                          moz-do-not-send="true"
href="https://www.ietf.org/mailman/listinfo/oauth" target="_blank">https://www.ietf.org/mailman/listinfo/oauth</a><br>
                                                          &gt;<br>
                                                          &gt;
                                                          _______________________________________________<br>
                                                          &gt; OAuth
                                                          mailing list<br>
                                                          &gt; <a
                                                          moz-do-not-send="true"
href="mailto:OAuth@ietf.org" target="_blank">OAuth@ietf.org</a><br>
                                                          &gt; <a
                                                          moz-do-not-send="true"
href="https://www.ietf.org/mailman/listinfo/oauth" target="_blank">https://www.ietf.org/mailman/listinfo/oauth</a><br>
_______________________________________________<br>
                                                          OAuth mailing
                                                          list<br>
                                                          <a
                                                          moz-do-not-send="true"
href="mailto:OAuth@ietf.org" target="_blank">OAuth@ietf.org</a><br>
                                                          <a
                                                          moz-do-not-send="true"
href="https://www.ietf.org/mailman/listinfo/oauth" target="_blank">https://www.ietf.org/mailman/listinfo/oauth</a><br>
                                                        </blockquote>
                                                      </div>
                                                      <br>
                                                    </div>
                                                  </blockquote>
                                                </div>
                                                <br>
                                              </div>
                                            </div>
                                          </blockquote>
                                        </div>
                                      </blockquote>
                                    </div>
                                    <br>
                                  </div>
                                </blockquote>
                              </div>
                            </blockquote>
                          </div>
                          <br>
                        </div>
                      </div>
                    </div>
                  </div>
                </blockquote>
              </div>
              <br>
            </div>
          </div>
        </div>
      </div>
      <br>
      <fieldset class="mimeAttachmentHeader"></fieldset>
      <br>
      <pre wrap="">_______________________________________________
OAuth mailing list
<a class="moz-txt-link-abbreviated" href="mailto:OAuth@ietf.org">OAuth@ietf.org</a>
<a class="moz-txt-link-freetext" href="https://www.ietf.org/mailman/listinfo/oauth">https://www.ietf.org/mailman/listinfo/oauth</a>
</pre>
    </blockquote>
    <br>
  </body>
</html>

--------------010101070200010105050902--

From phil.hunt@oracle.com  Thu Feb 28 12:51:50 2013
Return-Path: <phil.hunt@oracle.com>
X-Original-To: oauth@ietfa.amsl.com
Delivered-To: oauth@ietfa.amsl.com
Received: from localhost (localhost [127.0.0.1]) by ietfa.amsl.com (Postfix) with ESMTP id 644E821F8967 for <oauth@ietfa.amsl.com>; Thu, 28 Feb 2013 12:51:50 -0800 (PST)
X-Virus-Scanned: amavisd-new at amsl.com
X-Spam-Flag: NO
X-Spam-Score: -6.165
X-Spam-Level: 
X-Spam-Status: No, score=-6.165 tagged_above=-999 required=5 tests=[AWL=0.434,  BAYES_00=-2.599, RCVD_IN_DNSWL_MED=-4]
Received: from mail.ietf.org ([64.170.98.30]) by localhost (ietfa.amsl.com [127.0.0.1]) (amavisd-new, port 10024) with ESMTP id GTO49aT5JawS for <oauth@ietfa.amsl.com>; Thu, 28 Feb 2013 12:51:49 -0800 (PST)
Received: from userp1040.oracle.com (userp1040.oracle.com [156.151.31.81]) by ietfa.amsl.com (Postfix) with ESMTP id 63DA821F87D2 for <oauth@ietf.org>; Thu, 28 Feb 2013 12:51:49 -0800 (PST)
Received: from acsinet22.oracle.com (acsinet22.oracle.com [141.146.126.238]) by userp1040.oracle.com (Sentrion-MTA-4.3.1/Sentrion-MTA-4.3.1) with ESMTP id r1SKpjYa018171 (version=TLSv1/SSLv3 cipher=DHE-RSA-AES256-SHA bits=256 verify=OK); Thu, 28 Feb 2013 20:51:46 GMT
Received: from acsmt358.oracle.com (acsmt358.oracle.com [141.146.40.158]) by acsinet22.oracle.com (8.14.4+Sun/8.14.4) with ESMTP id r1SKpjLV004085 (version=TLSv1/SSLv3 cipher=DHE-RSA-AES256-SHA bits=256 verify=NO); Thu, 28 Feb 2013 20:51:45 GMT
Received: from abhmt116.oracle.com (abhmt116.oracle.com [141.146.116.68]) by acsmt358.oracle.com (8.12.11.20060308/8.12.11) with ESMTP id r1SKpi96013981; Thu, 28 Feb 2013 14:51:44 -0600
Received: from [192.168.1.14] (/174.7.250.104) by default (Oracle Beehive Gateway v4.0) with ESMTP ; Thu, 28 Feb 2013 12:51:44 -0800
Mime-Version: 1.0 (Apple Message framework v1283)
Content-Type: text/plain; charset=iso-8859-1
From: Phil Hunt <phil.hunt@oracle.com>
In-Reply-To: <512F9A5C.1070900@gmx.net>
Date: Thu, 28 Feb 2013 12:51:42 -0800
Content-Transfer-Encoding: quoted-printable
Message-Id: <65953ADA-B947-4C16-A746-F184C0DAC3C2@oracle.com>
References: <0EC2404F-E3C5-4AD1-88B4-E74AA0394DD9@gmx.net> <C75E4871-E907-4EF7-BAF0-9D1A172D581B@ve7jtb.com> <CA6A6425-D0CE-469F-B51E-9F296DA8041C@oracle.com> <EAD4F55D-7A02-4209-BB15-21BA5AB512AC@ve7jtb.com> <1BDBAFF3-6B2D-45EE-8A7E-B0B2572C8A01@oracle.com> <512F9A5C.1070900@gmx.net>
To: Hannes Tschofenig <hannes.tschofenig@gmx.net>
X-Mailer: Apple Mail (2.1283)
X-Source-IP: acsinet22.oracle.com [141.146.126.238]
Cc: "oauth@ietf.org WG" <oauth@ietf.org>
Subject: Re: [OAUTH-WG] JWT - scope claim missing
X-BeenThere: oauth@ietf.org
X-Mailman-Version: 2.1.12
Precedence: list
List-Id: OAUTH WG <oauth.ietf.org>
List-Unsubscribe: <https://www.ietf.org/mailman/options/oauth>, <mailto:oauth-request@ietf.org?subject=unsubscribe>
List-Archive: <http://www.ietf.org/mail-archive/web/oauth>
List-Post: <mailto:oauth@ietf.org>
List-Help: <mailto:oauth-request@ietf.org?subject=help>
List-Subscribe: <https://www.ietf.org/mailman/listinfo/oauth>, <mailto:oauth-request@ietf.org?subject=subscribe>
X-List-Received-Date: Thu, 28 Feb 2013 20:51:50 -0000

I believe that depending on the resource server that scope is important =
for both the security layers and application function layers.  For =
example, an application may wish to use scope as a set of entitlements.  =
Does client have entitlement "readProfile".

It makes no sense to me to have a scope in the authorization request and =
then not make it available to the resource endpoint except via back =
channels.  If that was the case why would I use anything other than an =
artifact?

That said, I think scope is way underdefined. But that's another issue.

Phil

@independentid
www.independentid.com
phil.hunt@oracle.com





On 2013-02-28, at 9:56 AM, Hannes Tschofenig wrote:

> I guess we first have to agree whether there is a security benefit of =
communicating the scope from the AS to the RS (in a way that it cannot =
be modified by the client or any other party).
>=20
> The scope indicates permissions (for example, whether the resource =
owner allowed read access to a certain resource or write access).
>=20
> Do you agree that there is a security benefit (or to put it the other =
way around: do you see the security vulnerability if this information is =
not communicated to the RS and checked against what the resource owner =
accepted?
>=20
> Then, a secondary question is what the right mechanism is.
>=20
> Ciao
> Hannes
>=20
>=20
> On 02/28/2013 07:29 PM, Phil Hunt wrote:
>> What people are doing now is often issuing saml like assertions. =
Thats not necessarily indicating intent. It just indicates transition.
>>=20
>> Phil
>>=20
>> Sent from my phone.
>>=20
>> On 2013-02-28, at 9:07, John Bradley <ve7jtb@ve7jtb.com> wrote:
>>=20
>>> I am not advocating anything, only sting what people are doing now.
>>>=20
>>> How authorization is communicated between the AS and RS via a token =
that is opaque to the client is out of scope fro OAuth core, it might be =
magic pixy dust.
>>>=20
>>> This has lead to a number of ways people are doing it.
>>>=20
>>> JWT along with  JOSE provide a container to get some claims from the =
AS to the RS though the JWT is not specific to this and is used in the =
assertions profile and other specs for many things other than access =
tokens.
>>>=20
>>> Yes a profile of JWT for an access token as an access token is =
needed, Yes further profiling is required for a JWT access token using =
MAC.
>>>=20
>>> The format of the authorization claims is not tightly bound to MAC =
and might be used with other bearer JWT tokens.
>>>=20
>>> I don't know that there will be only one way to communicate those =
claims because different sorts of implementations need different =
information for the RS to act on.
>>> Recommendations are fine but defining a field called scope and =
passing on exactly the scopes the client was granted is not going to =
work for everyone for lots of good reasons.
>>>=20
>>> John B.
>>> On 2013-02-28, at 8:24 AM, Phil Hunt <phil.hunt@oracle.com> wrote:
>>>=20
>>>> Are you advocating TWO systems? That seems like a bad choice.
>>>>=20
>>>> I would rather fix scope than go to a two system approach.
>>>>=20
>>>> Phil
>>>>=20
>>>> Sent from my phone.
>>>>=20
>>>> On 2013-02-28, at 8:17, John Bradley <ve7jtb@ve7jtb.com> wrote:
>>>>=20
>>>>> While scope is one method that a AS could communicate =
authorization to a RS, it is not the only or perhaps even the most =
likely one.
>>>>> Using scope requires a relatively tight binding between the RS and =
AS,  UMA uses a different mechanism that describes finer grained =
operations.
>>>>> The AS may include roles, user, or other more abstract claims that =
the the client may (god help them) pass on to EXCML for processing.
>>>>>=20
>>>>> While having a scopes claim is possible, like any other claim it =
is not part of the JWT core security processing claims, and needs to be =
defined by extension.
>>>>>=20
>>>>> John B.
>>>>> On 2013-02-28, at 2:29 AM, Hannes Tschofenig =
<hannes.tschofenig@gmx.net> wrote:
>>>>>=20
>>>>>> Hi Mike,
>>>>>>=20
>>>>>> when I worked on the MAC specification I noticed that the JWT =
does not have a claim for the scope. I believe that this would be needed =
to allow the resource server to verify whether the scope the =
authorization server authorized is indeed what the client is asking for.
>>>>>>=20
>>>>>> Ciao
>>>>>> Hannes
>>>>>>=20
>>>>>> _______________________________________________
>>>>>> OAuth mailing list
>>>>>> OAuth@ietf.org
>>>>>> https://www.ietf.org/mailman/listinfo/oauth
>>>>>=20
>>>>> _______________________________________________
>>>>> OAuth mailing list
>>>>> OAuth@ietf.org
>>>>> https://www.ietf.org/mailman/listinfo/oauth
>>>=20
>=20


From bcampbell@pingidentity.com  Thu Feb 28 13:00:22 2013
Return-Path: <bcampbell@pingidentity.com>
X-Original-To: oauth@ietfa.amsl.com
Delivered-To: oauth@ietfa.amsl.com
Received: from localhost (localhost [127.0.0.1]) by ietfa.amsl.com (Postfix) with ESMTP id E183A21F863C for <oauth@ietfa.amsl.com>; Thu, 28 Feb 2013 13:00:22 -0800 (PST)
X-Virus-Scanned: amavisd-new at amsl.com
X-Spam-Flag: NO
X-Spam-Score: -5.911
X-Spam-Level: 
X-Spam-Status: No, score=-5.911 tagged_above=-999 required=5 tests=[AWL=0.065,  BAYES_00=-2.599, FM_FORGED_GMAIL=0.622, HTML_MESSAGE=0.001, RCVD_IN_DNSWL_MED=-4]
Received: from mail.ietf.org ([64.170.98.30]) by localhost (ietfa.amsl.com [127.0.0.1]) (amavisd-new, port 10024) with ESMTP id OnpgoHQr3UdA for <oauth@ietfa.amsl.com>; Thu, 28 Feb 2013 13:00:21 -0800 (PST)
Received: from na3sys009aog129.obsmtp.com (na3sys009aog129.obsmtp.com [74.125.149.142]) by ietfa.amsl.com (Postfix) with ESMTP id 14F5B21F8540 for <oauth@ietf.org>; Thu, 28 Feb 2013 13:00:21 -0800 (PST)
Received: from mail-oa0-f70.google.com ([209.85.219.70]) (using TLSv1) by na3sys009aob129.postini.com ([74.125.148.12]) with SMTP ID DSNKUS/FYwZJU1lsFLL31p5eZECH88XClNVz@postini.com; Thu, 28 Feb 2013 13:00:21 PST
Received: by mail-oa0-f70.google.com with SMTP id h2so14849232oag.5 for <oauth@ietf.org>; Thu, 28 Feb 2013 13:00:19 -0800 (PST)
X-Google-DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=google.com; s=20120113; h=x-received:x-received:mime-version:in-reply-to:references:from:date :message-id:subject:to:cc:content-type:x-gm-message-state; bh=x5t95WElj43QHzDGkdt3hXJEiz3S0LqnKnOjp2AgMwY=; b=A7ULgv4X5WiiETAmsXzAZXhfHWMmYVi3ABZbMTSUHPINJ5UETp6NAk5CQ46FElW5p/ RkAg9gZH9BpYmEkOBCKLEiD+mlzLQIM2rMQodf6IGA4FfSlrLnraT2cNu72nVtET7vX2 lnB5D1T5H7Y4AZqSPSTYGAxvKlpjeMA9twu1H42OxgedFaieU6HnZdCdzu8zCxg0igx0 KJ3y/ZedVfU7PY1wpq0YC5GKbKzJvz3mZKoSG38Z8zAorgweg+Mj7a9IUZnFEUlnJHAb SjNuok9sNaWIGDb6/HkaiGfimTSfmHNHRi5WrhWxL+6GBtkyKG6vkv0XfMfHEWnOd43U TG8g==
X-Received: by 10.42.30.132 with SMTP id v4mr4256360icc.34.1362085218944; Thu, 28 Feb 2013 13:00:18 -0800 (PST)
X-Received: by 10.42.30.132 with SMTP id v4mr4256357icc.34.1362085218816; Thu, 28 Feb 2013 13:00:18 -0800 (PST)
MIME-Version: 1.0
Received: by 10.64.32.106 with HTTP; Thu, 28 Feb 2013 12:59:48 -0800 (PST)
In-Reply-To: <512FC18D.1020803@oracle.com>
References: <0EC2404F-E3C5-4AD1-88B4-E74AA0394DD9@gmx.net> <C75E4871-E907-4EF7-BAF0-9D1A172D581B@ve7jtb.com> <CA6A6425-D0CE-469F-B51E-9F296DA8041C@oracle.com> <CA+k3eCREgN+6z+U=jjJcPo0nZVR0GWn5zXeecZRO+rg=xd-gZg@mail.gmail.com> <A2375FE9-946F-46B3-9356-0709DD56BD4A@ve7jtb.com> <48FD87D1-4DF4-4289-99B7-40A515F31890@oracle.com> <3E472720-31A4-40A0-AAA4-402CF850831A@ve7jtb.com> <7127843B-D7B0-4AB6-87F1-1604D1EFFA79@oracle.com> <50DA292F-32F0-4266-8401-006AD837B775@ve7jtb.com> <CA+k3eCSyE3cPMh17XuivbUZUtHY=RAtjV1UeCdW6gGFk+gv02A@mail.gmail.com> <512FC18D.1020803@oracle.com>
From: Brian Campbell <bcampbell@pingidentity.com>
Date: Thu, 28 Feb 2013 13:59:48 -0700
Message-ID: <CA+k3eCTnbJsdtvA=VJWd0ob+s4qGco4O30M4=crpXb1tizDj9A@mail.gmail.com>
To: prateek mishra <prateek.mishra@oracle.com>
Content-Type: multipart/alternative; boundary=20cf301d420e9f2fa804d6cf2d44
X-Gm-Message-State: ALoCoQmfS1M7gan+gAl+nXDwf7jzPOvyise6eSXBc3nZGLNCNHMLh7FgfIDPTGHSbwWBXoO3s7d63GYooUCFQMrqqiHLW6R4HteiXJnmUxFy1NJmL8qgo7lue/93uQa9KXvx7ANLxz4y
Cc: oauth <oauth@ietf.org>
Subject: Re: [OAUTH-WG] JWT - scope claim missing
X-BeenThere: oauth@ietf.org
X-Mailman-Version: 2.1.12
Precedence: list
List-Id: OAUTH WG <oauth.ietf.org>
List-Unsubscribe: <https://www.ietf.org/mailman/options/oauth>, <mailto:oauth-request@ietf.org?subject=unsubscribe>
List-Archive: <http://www.ietf.org/mail-archive/web/oauth>
List-Post: <mailto:oauth@ietf.org>
List-Help: <mailto:oauth-request@ietf.org?subject=help>
List-Subscribe: <https://www.ietf.org/mailman/listinfo/oauth>, <mailto:oauth-request@ietf.org?subject=subscribe>
X-List-Received-Date: Thu, 28 Feb 2013 21:00:23 -0000

--20cf301d420e9f2fa804d6cf2d44
Content-Type: text/plain; charset=ISO-8859-1

Thanks Prateek. I like it and I think wordy might be the way to go here.


On Thu, Feb 28, 2013 at 1:43 PM, prateek mishra
<prateek.mishra@oracle.com>wrote:

>  SAML 2.0 Profile for OAuth 2.0 Client Authentication and Authorization
> Grants
> JWT Profile for OAuth 2.0 Client Authentication and Authorization Grants
> Assertion Framework for OAuth 2.0 <as above>
>
> a bit wordy, but does get the point across IMO
>
> - prateek
>
>  I'm not sure anyone really "picked" the titles for the bearer token
> profiles. They just kind of evolved. And evolved in funny ways especially
> when client authn to the AS was added.
>
>  You won't hear me argue that the titles are "good" and this is not the
> first time there's been confusion about what they actually do. They define
> new grant types and new client authentication methods. They *do not* define
> an access token format or anything else about access tokens. JWT and SAML
> could be used for that but that's not what these drafts do.
>
>  Suggestions for better title(s) would be more than welcome.
>
>  Here's what they are now:
>
> SAML 2.0 Bearer Assertion Profiles for OAuth 2.0
> draft-ietf-oauth-saml2-bearer
>
> JSON Web Token (JWT) Bearer Token Profiles for OAuth 2.0
> draft-ietf-oauth-jwt-bearer
>
> Assertion Framework for OAuth 2.0
> draft-ietf-oauth-assertions
>
> On Thu, Feb 28, 2013 at 11:36 AM, John Bradley <ve7jtb@ve7jtb.com> wrote:
>
>> Yes the title likely adds to the confusion given that the bearer tokens
>> are not access tokens.
>>
>>  Things as separate from OAuth as the Firefox browerID spec use JWS
>> signed JWTs.
>>
>>  The bearer token profiles for OAuth 2 are for OAuth2.
>>
>>  The JSON Web Token (JWT)<http://tools.ietf.org/html/draft-ietf-oauth-json-web-token-06> spec
>> did not start in OAuth and is not OAuth specific.
>>
>>  A JWT is:
>>
>> JSON Web Token (JWT)  A string representing a set of claims as a JSON
>>       object that is encoded in a JWS or JWE, enabling the claims to be
>>       digitally signed or MACed and/or encrypted.
>>
>>
>>  So OAuth or other profiles may define claims to go in a JWT, but the
>> JWT needs to itself only define the claims necessary for security
>> processing.
>>
>>  John B.
>> PS that was a soft ball If you hadn't responded I would have been
>> disappointed.  I din't pick the title for the bearer token profiles.
>>
>>
>>  On 2013-02-28, at 10:12 AM, Phil Hunt <phil.hunt@oracle.com> wrote:
>>
>>
>>
>>
>>
>> JSON Web Token (JWT) Bearer Token Profiles for OAuth 2.0
>>
>>
>> Note the title says "for OAuth2"
>>
>>  Sorry. Couldn't resist.
>>
>>  Phil
>>
>>  Sent from my phone.
>>
>> On 2013-02-28, at 9:40, John Bradley <ve7jtb@ve7jtb.com> wrote:
>>
>>  JWT is an assertion( I am probably going to regret using that word).
>>
>>  It is used in openID connect for id_tokens, it is used in OAuth for
>> Assertion grant types and authentication of the client to the token
>> endpoint.
>> http://tools.ietf.org/html/draft-ietf-oauth-jwt-bearer-04
>>
>>
>> JSON Web Token (JWT) Bearer Token Profiles for OAuth 2.0
>>
>>
>>  Dosen't define JWT's use for access tokens for the RS.
>>
>>  Bottom line JWT is for more than access tokens.
>>
>>  John B.
>>
>>  On 2013-02-28, at 9:28 AM, Phil Hunt <phil.hunt@oracle.com> wrote:
>>
>>  Are you saying jwt is not an access token type?
>>
>> Phil
>>
>>  Sent from my phone.
>>
>> On 2013-02-28, at 8:58, John Bradley <ve7jtb@ve7jtb.com> wrote:
>>
>>  Yes, defining scope in JWT is the wrong place.   JWT needs to stick to
>> the security claims needed to process JWT.
>>
>>  I also don't know how far you get requiring a specific authorization
>> format for JWT, some AS will wan to use a opaque reference, some might want
>> to use a user claim or role claim, others may use scopes,  combining scopes
>> and claims is also possible.
>>
>>  Right now it is up to a AS RS pair to agree on how to communicate
>> authorization.   I don't want MAC to be more restrictive than bearer when
>> it comes to authorization between AS and RS.
>>
>>  Hannes wanted to know why JWT didn't define scope.  The simple answer
>> is that it is out of scope for JWT itself.   It might be defined in a OAuth
>> access token profile for JWT but it should not be specific to MAC.
>>
>>  John B.
>>  On 2013-02-28, at 8:44 AM, Brian Campbell <bcampbell@pingidentity.com>
>> wrote:
>>
>>  I think John's point was more that scope is something rather specific
>> to an OAuth access token and, while JWT is can be used to represent an
>> access token, it's not the only application of JWT. The 'standard' claims
>> in JWT are those that are believed (right or wrong) to be widely applicable
>> across different applications of JWT. One could argue about it but scope is
>> probably not one of those.
>>
>>  It would probably make sense to try and build a profile of JWT
>> specifically for OAuth access tokens (though I suspect there are some
>> turtles and dragons in there), which might be the appropriate place to
>> define/register a scope claim.
>>
>>
>> On Thu, Feb 28, 2013 at 9:24 AM, Phil Hunt <phil.hunt@oracle.com> wrote:
>>
>>> Are you advocating TWO systems? That seems like a bad choice.
>>>
>>> I would rather fix scope than go to a two system approach.
>>>
>>> Phil
>>>
>>> Sent from my phone.
>>>
>>> On 2013-02-28, at 8:17, John Bradley <ve7jtb@ve7jtb.com> wrote:
>>>
>>> > While scope is one method that a AS could communicate authorization to
>>> a RS, it is not the only or perhaps even the most likely one.
>>> > Using scope requires a relatively tight binding between the RS and AS,
>>>  UMA uses a different mechanism that describes finer grained operations.
>>> > The AS may include roles, user, or other more abstract claims that the
>>> the client may (god help them) pass on to EXCML for processing.
>>> >
>>> > While having a scopes claim is possible, like any other claim it is
>>> not part of the JWT core security processing claims, and needs to be
>>> defined by extension.
>>> >
>>> > John B.
>>> > On 2013-02-28, at 2:29 AM, Hannes Tschofenig <
>>> hannes.tschofenig@gmx.net> wrote:
>>> >
>>> >> Hi Mike,
>>> >>
>>> >> when I worked on the MAC specification I noticed that the JWT does
>>> not have a claim for the scope. I believe that this would be needed to
>>> allow the resource server to verify whether the scope the authorization
>>> server authorized is indeed what the client is asking for.
>>> >>
>>> >> Ciao
>>> >> Hannes
>>> >>
>>> >> _______________________________________________
>>> >> OAuth mailing list
>>> >> OAuth@ietf.org
>>> >> https://www.ietf.org/mailman/listinfo/oauth
>>> >
>>> > _______________________________________________
>>> > OAuth mailing list
>>> > OAuth@ietf.org
>>> > https://www.ietf.org/mailman/listinfo/oauth
>>> _______________________________________________
>>> OAuth mailing list
>>> OAuth@ietf.org
>>> https://www.ietf.org/mailman/listinfo/oauth
>>>
>>
>>
>>
>>
>>
>
>
> _______________________________________________
> OAuth mailing listOAuth@ietf.orghttps://www.ietf.org/mailman/listinfo/oauth
>
>
>

--20cf301d420e9f2fa804d6cf2d44
Content-Type: text/html; charset=ISO-8859-1
Content-Transfer-Encoding: quoted-printable

<div dir=3D"ltr">Thanks Prateek. I like it and I think wordy might be the w=
ay to go here. <br></div><div class=3D"gmail_extra"><br><br><div class=3D"g=
mail_quote">On Thu, Feb 28, 2013 at 1:43 PM, prateek mishra <span dir=3D"lt=
r">&lt;<a href=3D"mailto:prateek.mishra@oracle.com" target=3D"_blank">prate=
ek.mishra@oracle.com</a>&gt;</span> wrote:<br>

<blockquote class=3D"gmail_quote" style=3D"margin:0 0 0 .8ex;border-left:1p=
x #ccc solid;padding-left:1ex">
 =20
   =20
 =20
  <div bgcolor=3D"#FFFFFF" text=3D"#000000">
    SAML 2.0 Profile for OAuth 2.0 Client Authentication and
    Authorization Grants <br>
    JWT Profile for OAuth 2.0 Client Authentication and Authorization
    Grants <br>
    Assertion Framework for OAuth 2.0 &lt;as above&gt; <br>
    <br>
    a bit wordy, but does get the point across IMO<span class=3D"HOEnZb"><f=
ont color=3D"#888888"><br>
    <br>
    - prateek</font></span><div><div class=3D"h5"><br>
    <blockquote type=3D"cite">
      <div dir=3D"ltr">
        <div>I&#39;m not sure anyone really &quot;picked&quot; the titles f=
or the
          bearer token profiles. They just kind of evolved. And evolved
          in funny ways especially when client authn to the AS was
          added. <br>
          <br>
        </div>
        <div>You won&#39;t hear me argue that the titles are &quot;good&quo=
t; and this
          is not the first time there&#39;s been confusion about what they
          actually do. They define new grant types and new client
          authentication methods. They *do not* define an access token
          format or anything else about access tokens. JWT and SAML
          could be used for that but that&#39;s not what these drafts do. <=
br>
          <br>
        </div>
        <div>Suggestions for better title(s) would be more than welcome.<br=
>
        </div>
        <div>
          <div><br>
          </div>
          <div>Here&#39;s what they are now:<br>
          </div>
          <div><br>
            SAML 2.0 Bearer Assertion Profiles for OAuth 2.0<br>
            draft-ietf-oauth-saml2-bearer<br>
            <br>
            JSON Web Token (JWT) Bearer Token Profiles for OAuth 2.0<br>
            draft-ietf-oauth-jwt-bearer<br>
            <br>
            Assertion Framework for OAuth 2.0<br>
            draft-ietf-oauth-assertions<br>
            <div class=3D"gmail_extra"><br>
              <div class=3D"gmail_quote">On Thu, Feb 28, 2013 at 11:36 AM,
                John Bradley <span dir=3D"ltr">&lt;<a href=3D"mailto:ve7jtb=
@ve7jtb.com" target=3D"_blank">ve7jtb@ve7jtb.com</a>&gt;</span>
                wrote:<br>
                <blockquote class=3D"gmail_quote" style=3D"margin:0px 0px 0=
px 0.8ex;border-left:1px solid rgb(204,204,204);padding-left:1ex">
                  <div style=3D"word-wrap:break-word">Yes the title likely
                    adds to the confusion given that the bearer tokens
                    are not access tokens.
                    <div><br>
                    </div>
                    <div>Things as separate from OAuth as the Firefox
                      browerID spec use JWS signed JWTs. =A0</div>
                    <div><br>
                    </div>
                    <div>The bearer token profiles for OAuth 2 are for
                      OAuth2.</div>
                    <div><br>
                    </div>
                    <div>The=A0<a href=3D"http://tools.ietf.org/html/draft-=
ietf-oauth-json-web-token-06" target=3D"_blank">JSON Web Token (JWT)</a>=A0=
spec
                      did not start in OAuth and is not OAuth specific.</di=
v>
                    <div><br>
                    </div>
                    <div>A JWT is:</div>
                    <div>
                      <pre style=3D"font-size:1em;margin-top:0px;margin-bot=
tom:0px">JSON Web Token (JWT)  A string representing a set of claims as a J=
SON
      object that is encoded in a JWS or JWE, enabling the claims to be
      digitally signed or MACed and/or encrypted.
</pre>
                      <div><br>
                      </div>
                      <div>So OAuth or other profiles may define claims
                        to go in a JWT, but the JWT needs to itself only
                        define the claims necessary for security
                        processing. =A0</div>
                      <div><br>
                      </div>
                      <div>John B.</div>
                      <div>PS that was a soft ball If you hadn&#39;t
                        responded I would have been disappointed. =A0I
                        din&#39;t pick the title for the bearer token
                        profiles.</div>
                      <div>
                        <div>
                          <div><br>
                          </div>
                          <div><br>
                          </div>
                          <div>
                            <div>On 2013-02-28, at 10:12 AM, Phil Hunt
                              &lt;<a href=3D"mailto:phil.hunt@oracle.com" t=
arget=3D"_blank">phil.hunt@oracle.com</a>&gt;
                              wrote:</div>
                            <br>
                            <blockquote type=3D"cite">
                              <div dir=3D"auto">
                                <div>
                                  <pre style=3D"margin-top:0px;margin-botto=
m:0px"><font face=3D"Helvetica"><span style=3D"white-space:normal;backgroun=
d-color:rgba(255,255,255,0)">        <span style=3D"display:inline;font-wei=
ght:bold"><h1 style=3D"display:inline">




JSON Web Token (JWT) Bearer Token Profiles for OAuth 2.0</h1></span></span>=
</font></pre>
                                  <br>
                                  <span>Note the title says &quot;for OAuth=
2&quot;</span></div>
                                <div><span><br>
                                  </span></div>
                                <div><span>Sorry. Couldn&#39;t resist.=A0</=
span></div>
                                <div><span><br>
                                  </span></div>
                                <div><span>Phil</span>
                                  <div><br>
                                  </div>
                                  <div>Sent from my phone.</div>
                                </div>
                                <div><br>
                                  On 2013-02-28, at 9:40, John Bradley
                                  &lt;<a href=3D"mailto:ve7jtb@ve7jtb.com" =
target=3D"_blank">ve7jtb@ve7jtb.com</a>&gt;
                                  wrote:<br>
                                  <br>
                                </div>
                                <blockquote type=3D"cite">JWT is an
                                  assertion( I am probably going to
                                  regret using that word).
                                  <div><br>
                                  </div>
                                  <div>It is used in openID connect for
                                    id_tokens, it is used in OAuth for
                                    Assertion grant types and
                                    authentication of the client to the
                                    token endpoint.</div>
                                  <div><a href=3D"http://tools.ietf.org/htm=
l/draft-ietf-oauth-jwt-bearer-04" target=3D"_blank">http://tools.ietf.org/h=
tml/draft-ietf-oauth-jwt-bearer-04</a></div>
                                  <div><br>
                                  </div>
                                  <div>
                                    <pre style=3D"font-size:1em;margin-top:=
0px;margin-bottom:0px"><span style=3D"line-height:0pt;display:inline;font-s=
ize:1em;font-weight:bold"><h1 style=3D"line-height:0pt;display:inline;font-=
size:1em">

JSON Web Token (JWT) Bearer Token Profiles for OAuth 2.0</h1></span></pre>
                                    <div><br>
                                    </div>
                                    <div>Dosen&#39;t define JWT&#39;s use f=
or
                                      access tokens for the RS. =A0=A0</div=
>
                                    <div><br>
                                    </div>
                                    <div>Bottom line JWT is for more
                                      than access tokens.</div>
                                    <div><br>
                                    </div>
                                    <div>John B.</div>
                                    <div><br>
                                    </div>
                                    <div>
                                      <div>On 2013-02-28, at 9:28 AM,
                                        Phil Hunt &lt;<a href=3D"mailto:phi=
l.hunt@oracle.com" target=3D"_blank">phil.hunt@oracle.com</a>&gt;
                                        wrote:</div>
                                      <br>
                                      <blockquote type=3D"cite">
                                        <div dir=3D"auto">
                                          <div>Are you saying jwt is not
                                            an access token type?<br>
                                            <br>
                                            Phil
                                            <div><br>
                                            </div>
                                            <div>Sent from my phone.</div>
                                          </div>
                                          <div><br>
                                            On 2013-02-28, at 8:58, John
                                            Bradley &lt;<a href=3D"mailto:v=
e7jtb@ve7jtb.com" target=3D"_blank">ve7jtb@ve7jtb.com</a>&gt;
                                            wrote:<br>
                                            <br>
                                          </div>
                                          <blockquote type=3D"cite">Yes,
                                            defining scope in JWT is the
                                            wrong place. =A0 JWT needs to
                                            stick to the security claims
                                            needed to process JWT.
                                            <div><br>
                                            </div>
                                            <div>I also don&#39;t know how
                                              far you get requiring a
                                              specific authorization
                                              format for JWT, some AS
                                              will wan to use a opaque
                                              reference, some might want
                                              to use a user claim or
                                              role claim, others may use
                                              scopes, =A0combining scopes
                                              and claims is also
                                              possible.</div>
                                            <div><br>
                                            </div>
                                            <div>Right now it is up to a
                                              AS RS pair to agree on how
                                              to communicate
                                              authorization. =A0 I don&#39;=
t
                                              want MAC to be more
                                              restrictive than bearer
                                              when it comes to
                                              authorization between AS
                                              and RS.<br>
                                              <div><br>
                                              </div>
                                              <div>Hannes wanted to know
                                                why JWT didn&#39;t define
                                                scope. =A0The simple
                                                answer is that it is out
                                                of scope for JWT itself.
                                                =A0 It might be defined in
                                                a OAuth access token
                                                profile for JWT but it
                                                should not be specific
                                                to MAC.</div>
                                              <div><br>
                                              </div>
                                              <div>John B.</div>
                                              <div>
                                                <div>
                                                  <div>On 2013-02-28, at
                                                    8:44 AM, Brian
                                                    Campbell &lt;<a href=3D=
"mailto:bcampbell@pingidentity.com" target=3D"_blank">bcampbell@pingidentit=
y.com</a>&gt;
                                                    wrote:</div>
                                                  <br>
                                                  <blockquote type=3D"cite"=
>
                                                    <div dir=3D"ltr">
                                                      <div>I think
                                                        John&#39;s point wa=
s
                                                        more that scope
                                                        is something
                                                        rather specific
                                                        to an OAuth
                                                        access token
                                                        and, while JWT
                                                        is can be used
                                                        to represent an
                                                        access token,
                                                        it&#39;s not the
                                                        only application
                                                        of JWT. The
                                                        &#39;standard&#39;
                                                        claims in JWT
                                                        are those that
                                                        are believed
                                                        (right or wrong)
                                                        to be widely
                                                        applicable
                                                        across different
                                                        applications of
                                                        JWT. One could
                                                        argue about it
                                                        but scope is
                                                        probably not one
                                                        of those.<br>
                                                        <br>
                                                      </div>
                                                      It would probably
                                                      make sense to try
                                                      and build a
                                                      profile of JWT
                                                      specifically for
                                                      OAuth access
                                                      tokens (though I
                                                      suspect there are
                                                      some turtles and
                                                      dragons in there),
                                                      which might be the
                                                      appropriate place
                                                      to define/register
                                                      a scope claim.<br>
                                                    </div>
                                                    <div class=3D"gmail_ext=
ra"><br>
                                                      <br>
                                                      <div class=3D"gmail_q=
uote">On
                                                        Thu, Feb 28,
                                                        2013 at 9:24 AM,
                                                        Phil Hunt <span dir=
=3D"ltr">&lt;<a href=3D"mailto:phil.hunt@oracle.com" target=3D"_blank">phil=
.hunt@oracle.com</a>&gt;</span>
                                                        wrote:<br>
                                                        <blockquote class=
=3D"gmail_quote" style=3D"margin:0px 0px 0px 0.8ex;border-left:1px solid rg=
b(204,204,204);padding-left:1ex">Are
                                                          you advocating
                                                          TWO systems?
                                                          That seems
                                                          like a bad
                                                          choice.<br>
                                                          <br>
                                                          I would rather
                                                          fix scope than
                                                          go to a two
                                                          system
                                                          approach.<br>
                                                          <br>
                                                          Phil<br>
                                                          <br>
                                                          Sent from my
                                                          phone.<br>
                                                          <br>
                                                          On 2013-02-28,
                                                          at 8:17, John
                                                          Bradley &lt;<a hr=
ef=3D"mailto:ve7jtb@ve7jtb.com" target=3D"_blank">ve7jtb@ve7jtb.com</a>&gt;
                                                          wrote:<br>
                                                          <br>
                                                          &gt; While
                                                          scope is one
                                                          method that a
                                                          AS could
                                                          communicate
                                                          authorization
                                                          to a RS, it is
                                                          not the only
                                                          or perhaps
                                                          even the most
                                                          likely one.<br>
                                                          &gt; Using
                                                          scope requires
                                                          a relatively
                                                          tight binding
                                                          between the RS
                                                          and AS, =A0UMA
                                                          uses a
                                                          different
                                                          mechanism that
                                                          describes
                                                          finer grained
                                                          operations.<br>
                                                          &gt; The AS
                                                          may include
                                                          roles, user,
                                                          or other more
                                                          abstract
                                                          claims that
                                                          the the client
                                                          may (god help
                                                          them) pass on
                                                          to EXCML for
                                                          processing.<br>
                                                          &gt;<br>
                                                          &gt; While
                                                          having a
                                                          scopes claim
                                                          is possible,
                                                          like any other
                                                          claim it is
                                                          not part of
                                                          the JWT core
                                                          security
                                                          processing
                                                          claims, and
                                                          needs to be
                                                          defined by
                                                          extension.<br>
                                                          &gt;<br>
                                                          &gt; John B.<br>
                                                          &gt; On
                                                          2013-02-28, at
                                                          2:29 AM,
                                                          Hannes
                                                          Tschofenig
                                                          &lt;<a href=3D"ma=
ilto:hannes.tschofenig@gmx.net" target=3D"_blank">hannes.tschofenig@gmx.net=
</a>&gt;
                                                          wrote:<br>
                                                          &gt;<br>
                                                          &gt;&gt; Hi
                                                          Mike,<br>
                                                          &gt;&gt;<br>
                                                          &gt;&gt; when
                                                          I worked on
                                                          the MAC
                                                          specification
                                                          I noticed that
                                                          the JWT does
                                                          not have a
                                                          claim for the
                                                          scope. I
                                                          believe that
                                                          this would be
                                                          needed to
                                                          allow the
                                                          resource
                                                          server to
                                                          verify whether
                                                          the scope the
                                                          authorization
                                                          server
                                                          authorized is
                                                          indeed what
                                                          the client is
                                                          asking for.<br>
                                                          &gt;&gt;<br>
                                                          &gt;&gt; Ciao<br>
                                                          &gt;&gt;
                                                          Hannes<br>
                                                          &gt;&gt;<br>
                                                          &gt;&gt;
                                                          _________________=
______________________________<br>
                                                          &gt;&gt; OAuth
                                                          mailing list<br>
                                                          &gt;&gt; <a href=
=3D"mailto:OAuth@ietf.org" target=3D"_blank">OAuth@ietf.org</a><br>
                                                          &gt;&gt; <a href=
=3D"https://www.ietf.org/mailman/listinfo/oauth" target=3D"_blank">https://=
www.ietf.org/mailman/listinfo/oauth</a><br>
                                                          &gt;<br>
                                                          &gt;
                                                          _________________=
______________________________<br>
                                                          &gt; OAuth
                                                          mailing list<br>
                                                          &gt; <a href=3D"m=
ailto:OAuth@ietf.org" target=3D"_blank">OAuth@ietf.org</a><br>
                                                          &gt; <a href=3D"h=
ttps://www.ietf.org/mailman/listinfo/oauth" target=3D"_blank">https://www.i=
etf.org/mailman/listinfo/oauth</a><br>
_______________________________________________<br>
                                                          OAuth mailing
                                                          list<br>
                                                          <a href=3D"mailto=
:OAuth@ietf.org" target=3D"_blank">OAuth@ietf.org</a><br>
                                                          <a href=3D"https:=
//www.ietf.org/mailman/listinfo/oauth" target=3D"_blank">https://www.ietf.o=
rg/mailman/listinfo/oauth</a><br>
                                                        </blockquote>
                                                      </div>
                                                      <br>
                                                    </div>
                                                  </blockquote>
                                                </div>
                                                <br>
                                              </div>
                                            </div>
                                          </blockquote>
                                        </div>
                                      </blockquote>
                                    </div>
                                    <br>
                                  </div>
                                </blockquote>
                              </div>
                            </blockquote>
                          </div>
                          <br>
                        </div>
                      </div>
                    </div>
                  </div>
                </blockquote>
              </div>
              <br>
            </div>
          </div>
        </div>
      </div>
      <br>
      <fieldset></fieldset>
      <br>
      <pre>_______________________________________________
OAuth mailing list
<a href=3D"mailto:OAuth@ietf.org" target=3D"_blank">OAuth@ietf.org</a>
<a href=3D"https://www.ietf.org/mailman/listinfo/oauth" target=3D"_blank">h=
ttps://www.ietf.org/mailman/listinfo/oauth</a>
</pre>
    </blockquote>
    <br>
  </div></div></div>

</blockquote></div><br></div>

--20cf301d420e9f2fa804d6cf2d44--

From hannes.tschofenig@gmx.net  Thu Feb 28 13:36:52 2013
Return-Path: <hannes.tschofenig@gmx.net>
X-Original-To: oauth@ietfa.amsl.com
Delivered-To: oauth@ietfa.amsl.com
Received: from localhost (localhost [127.0.0.1]) by ietfa.amsl.com (Postfix) with ESMTP id 8BD5F21F863C for <oauth@ietfa.amsl.com>; Thu, 28 Feb 2013 13:36:52 -0800 (PST)
X-Virus-Scanned: amavisd-new at amsl.com
X-Spam-Flag: NO
X-Spam-Score: -102.534
X-Spam-Level: 
X-Spam-Status: No, score=-102.534 tagged_above=-999 required=5 tests=[AWL=0.065, BAYES_00=-2.599, USER_IN_WHITELIST=-100]
Received: from mail.ietf.org ([64.170.98.30]) by localhost (ietfa.amsl.com [127.0.0.1]) (amavisd-new, port 10024) with ESMTP id 5ZWoJM-gwJJo for <oauth@ietfa.amsl.com>; Thu, 28 Feb 2013 13:36:52 -0800 (PST)
Received: from mout.gmx.net (mout.gmx.net [212.227.17.22]) by ietfa.amsl.com (Postfix) with ESMTP id AE8FA21F859A for <oauth@ietf.org>; Thu, 28 Feb 2013 13:36:51 -0800 (PST)
Received: from mailout-de.gmx.net ([10.1.76.28]) by mrigmx.server.lan (mrigmx001) with ESMTP (Nemesis) id 0MFOSw-1U5j663Bfo-00ELmr for <oauth@ietf.org>; Thu, 28 Feb 2013 22:36:50 +0100
Received: (qmail invoked by alias); 28 Feb 2013 21:36:50 -0000
Received: from a88-115-219-140.elisa-laajakaista.fi (EHLO [192.168.100.115]) [88.115.219.140] by mail.gmx.net (mp028) with SMTP; 28 Feb 2013 22:36:50 +0100
X-Authenticated: #29516787
X-Provags-ID: V01U2FsdGVkX184/GVU+Xs4uPURILEdZpTYqvAuSqbjgrqh/pzPQx iBCPMHl4HyKhk4
Message-ID: <512FCDF0.6010807@gmx.net>
Date: Thu, 28 Feb 2013 23:36:48 +0200
From: Hannes Tschofenig <hannes.tschofenig@gmx.net>
User-Agent: Mozilla/5.0 (X11; Linux i686; rv:17.0) Gecko/20130221 Thunderbird/17.0.3
MIME-Version: 1.0
To: oleg@gryb.info
References: <1362079266.8952.YahooMailClassic@web141002.mail.bf1.yahoo.com>
In-Reply-To: <1362079266.8952.YahooMailClassic@web141002.mail.bf1.yahoo.com>
Content-Type: text/plain; charset=ISO-8859-1; format=flowed
Content-Transfer-Encoding: 7bit
X-Y-GMX-Trusted: 0
Cc: oauth@ietf.org
Subject: Re: [OAUTH-WG] Fw:  IPR Disclosure: - What to Do with JWT ?
X-BeenThere: oauth@ietf.org
X-Mailman-Version: 2.1.12
Precedence: list
List-Id: OAUTH WG <oauth.ietf.org>
List-Unsubscribe: <https://www.ietf.org/mailman/options/oauth>, <mailto:oauth-request@ietf.org?subject=unsubscribe>
List-Archive: <http://www.ietf.org/mail-archive/web/oauth>
List-Post: <mailto:oauth@ietf.org>
List-Help: <mailto:oauth-request@ietf.org?subject=help>
List-Subscribe: <https://www.ietf.org/mailman/listinfo/oauth>, <mailto:oauth-request@ietf.org?subject=subscribe>
X-List-Received-Date: Thu, 28 Feb 2013 21:36:52 -0000

Hi Oleg,

my personal experience with Certicom's IPR disclosures is that they 
focus on Elliptic Curve Cryptography. There were several IPR disclosures 
on documents in the JOSE WG and some of them contain ECC algorithms.

The JWT does not list an ECC algorithm but the referenced documents do.

Having said that the two cited IPRs seem to be:
http://www.google.com/patents/US6704870
http://www.google.com/patents/US7215773

Take a look at it and make your assessment whether there is anything we 
can change.

Ciao
Hannes


On 02/28/2013 09:21 PM, Oleg Gryb wrote:
> Dear OAuth WG and Chairs,
>
> Can somebody please comment the Certicom's disclosure below? If the
> purpose of this disclosure is to inform us that JWT can be potentially a
> subject of royalties and other possible legal actions, the value of
> adopting JWT in the scope of OAuth 2.0 IETF standard would definitely
> diminish and if this is the case shouldn't we consider replacing it with
> something similar, but different, which would not be a subject of the
> future possible litigation?
>
> I'm not a lawyer and might not understand the statement below correctly,
> so please let me know if/where I'm wrong. Please keep in mind also that
> the popularity of JWT is growing fast along with the implementations, so
> we need to do something quickly.
>
> Thanks,
> Oleg.
>
>
> --- On *Wed, 2/27/13, IETF Secretariat /<ietf-ipr@ietf.org>/* wrote:
>
>
>     From: IETF Secretariat <ietf-ipr@ietf.org>
>     Subject: [OAUTH-WG] IPR Disclosure: Certicom Corporation's Statement
>     about IPR related to draft-ietf-oauth-json-web-token-06 (2)
>     To: mbj@microsoft.com, ve7jtb@ve7jtb.com, n-sakimura@nri.co.jp
>     Cc: derek@ihtfp.com, oauth@ietf.org, ipr-announce@ietf.org
>     Date: Wednesday, February 27, 2013, 4:16 PM
>
>
>     Dear Michael Jones, John Bradley, Nat Sakimura:
>
>     An IPR disclosure that pertains to your Internet-Draft entitled
>     "JSON Web Token
>     (JWT)" (draft-ietf-oauth-json-web-token) was submitted to the IETF
>     Secretariat
>     on 2013-02-20 and has been posted on the "IETF Page of Intellectual
>     Property
>     Rights Disclosures" (https://datatracker.ietf.org/ipr/1968/). The
>     title of the
>     IPR disclosure is "Certicom Corporation's Statement about IPR
>     related to draft-
>     ietf-oauth-json-web-token-06 (2)."");
>
>     The IETF Secretariat
>
>     _______________________________________________
>     OAuth mailing list
>     OAuth@ietf.org </mc/compose?to=OAuth@ietf.org>
>     https://www.ietf.org/mailman/listinfo/oauth
>
>
>
> _______________________________________________
> OAuth mailing list
> OAuth@ietf.org
> https://www.ietf.org/mailman/listinfo/oauth
>

From prateek.mishra@oracle.com  Thu Feb 28 13:54:15 2013
Return-Path: <prateek.mishra@oracle.com>
X-Original-To: oauth@ietfa.amsl.com
Delivered-To: oauth@ietfa.amsl.com
Received: from localhost (localhost [127.0.0.1]) by ietfa.amsl.com (Postfix) with ESMTP id 0F76821F8B83 for <oauth@ietfa.amsl.com>; Thu, 28 Feb 2013 13:54:15 -0800 (PST)
X-Virus-Scanned: amavisd-new at amsl.com
X-Spam-Flag: NO
X-Spam-Score: -6.569
X-Spam-Level: 
X-Spam-Status: No, score=-6.569 tagged_above=-999 required=5 tests=[AWL=0.030,  BAYES_00=-2.599, RCVD_IN_DNSWL_MED=-4]
Received: from mail.ietf.org ([64.170.98.30]) by localhost (ietfa.amsl.com [127.0.0.1]) (amavisd-new, port 10024) with ESMTP id UeundtApvkpU for <oauth@ietfa.amsl.com>; Thu, 28 Feb 2013 13:54:14 -0800 (PST)
Received: from userp1040.oracle.com (userp1040.oracle.com [156.151.31.81]) by ietfa.amsl.com (Postfix) with ESMTP id 5ED2D21F8B2F for <oauth@ietf.org>; Thu, 28 Feb 2013 13:54:14 -0800 (PST)
Received: from acsinet22.oracle.com (acsinet22.oracle.com [141.146.126.238]) by userp1040.oracle.com (Sentrion-MTA-4.3.1/Sentrion-MTA-4.3.1) with ESMTP id r1SLrEJD019070 (version=TLSv1/SSLv3 cipher=DHE-RSA-AES256-SHA bits=256 verify=OK); Thu, 28 Feb 2013 21:53:15 GMT
Received: from acsmt356.oracle.com (acsmt356.oracle.com [141.146.40.156]) by acsinet22.oracle.com (8.14.4+Sun/8.14.4) with ESMTP id r1SLrDWm019599 (version=TLSv1/SSLv3 cipher=DHE-RSA-AES256-SHA bits=256 verify=NO); Thu, 28 Feb 2013 21:53:14 GMT
Received: from abhmt103.oracle.com (abhmt103.oracle.com [141.146.116.55]) by acsmt356.oracle.com (8.12.11.20060308/8.12.11) with ESMTP id r1SLrDLm009394; Thu, 28 Feb 2013 15:53:13 -0600
Received: from [10.152.55.88] (/10.152.55.88) by default (Oracle Beehive Gateway v4.0) with ESMTP ; Thu, 28 Feb 2013 13:53:13 -0800
Message-ID: <512FD1C5.2070100@oracle.com>
Date: Thu, 28 Feb 2013 16:53:09 -0500
From: prateek mishra <prateek.mishra@oracle.com>
Organization: Oracle Corporation
User-Agent: Mozilla/5.0 (Windows NT 5.1; rv:17.0) Gecko/20130107 Thunderbird/17.0.2
MIME-Version: 1.0
To: Hannes Tschofenig <hannes.tschofenig@gmx.net>
References: <1362079266.8952.YahooMailClassic@web141002.mail.bf1.yahoo.com> <512FCDF0.6010807@gmx.net>
In-Reply-To: <512FCDF0.6010807@gmx.net>
Content-Type: text/plain; charset=ISO-8859-1; format=flowed
Content-Transfer-Encoding: 7bit
X-Source-IP: acsinet22.oracle.com [141.146.126.238]
Cc: oleg@gryb.info, oauth@ietf.org
Subject: Re: [OAUTH-WG] Fw:  IPR Disclosure: - What to Do with JWT ?
X-BeenThere: oauth@ietf.org
X-Mailman-Version: 2.1.12
Precedence: list
List-Id: OAUTH WG <oauth.ietf.org>
List-Unsubscribe: <https://www.ietf.org/mailman/options/oauth>, <mailto:oauth-request@ietf.org?subject=unsubscribe>
List-Archive: <http://www.ietf.org/mail-archive/web/oauth>
List-Post: <mailto:oauth@ietf.org>
List-Help: <mailto:oauth-request@ietf.org?subject=help>
List-Subscribe: <https://www.ietf.org/mailman/listinfo/oauth>, <mailto:oauth-request@ietf.org?subject=subscribe>
X-List-Received-Date: Thu, 28 Feb 2013 21:54:15 -0000

Two points  -

1) I request that this mailing list NOT be used for any substantive 
discussion of patent claims and so on. This will create difficulties for 
many participants and
I dont believe is within the charter of this effort.

2) I would encourage interested parties to review the following 
document, which may be relevant to this discussion

http://www.w3.org/2011/xmlsec-pag/

- prateek

> Hi Oleg,
>
> my personal experience with Certicom's IPR disclosures is that they 
> focus on Elliptic Curve Cryptography. There were several IPR 
> disclosures on documents in the JOSE WG and some of them contain ECC 
> algorithms.
>
> The JWT does not list an ECC algorithm but the referenced documents do.
>
> Having said that the two cited IPRs seem to be:
> http://www.google.com/patents/US6704870
> http://www.google.com/patents/US7215773
>
> Take a look at it and make your assessment whether there is anything 
> we can change.
>
> Ciao
> Hannes
>
>
> On 02/28/2013 09:21 PM, Oleg Gryb wrote:
>> Dear OAuth WG and Chairs,
>>
>> Can somebody please comment the Certicom's disclosure below? If the
>> purpose of this disclosure is to inform us that JWT can be potentially a
>> subject of royalties and other possible legal actions, the value of
>> adopting JWT in the scope of OAuth 2.0 IETF standard would definitely
>> diminish and if this is the case shouldn't we consider replacing it with
>> something similar, but different, which would not be a subject of the
>> future possible litigation?
>>
>> I'm not a lawyer and might not understand the statement below correctly,
>> so please let me know if/where I'm wrong. Please keep in mind also that
>> the popularity of JWT is growing fast along with the implementations, so
>> we need to do something quickly.
>>
>> Thanks,
>> Oleg.
>>
>>
>> --- On *Wed, 2/27/13, IETF Secretariat /<ietf-ipr@ietf.org>/* wrote:
>>
>>
>>     From: IETF Secretariat <ietf-ipr@ietf.org>
>>     Subject: [OAUTH-WG] IPR Disclosure: Certicom Corporation's Statement
>>     about IPR related to draft-ietf-oauth-json-web-token-06 (2)
>>     To: mbj@microsoft.com, ve7jtb@ve7jtb.com, n-sakimura@nri.co.jp
>>     Cc: derek@ihtfp.com, oauth@ietf.org, ipr-announce@ietf.org
>>     Date: Wednesday, February 27, 2013, 4:16 PM
>>
>>
>>     Dear Michael Jones, John Bradley, Nat Sakimura:
>>
>>     An IPR disclosure that pertains to your Internet-Draft entitled
>>     "JSON Web Token
>>     (JWT)" (draft-ietf-oauth-json-web-token) was submitted to the IETF
>>     Secretariat
>>     on 2013-02-20 and has been posted on the "IETF Page of Intellectual
>>     Property
>>     Rights Disclosures" (https://datatracker.ietf.org/ipr/1968/). The
>>     title of the
>>     IPR disclosure is "Certicom Corporation's Statement about IPR
>>     related to draft-
>>     ietf-oauth-json-web-token-06 (2)."");
>>
>>     The IETF Secretariat
>>
>>     _______________________________________________
>>     OAuth mailing list
>>     OAuth@ietf.org </mc/compose?to=OAuth@ietf.org>
>>     https://www.ietf.org/mailman/listinfo/oauth
>>
>>
>>
>> _______________________________________________
>> OAuth mailing list
>> OAuth@ietf.org
>> https://www.ietf.org/mailman/listinfo/oauth
>>
> _______________________________________________
> OAuth mailing list
> OAuth@ietf.org
> https://www.ietf.org/mailman/listinfo/oauth


From hannes.tschofenig@gmx.net  Thu Feb 28 13:57:04 2013
Return-Path: <hannes.tschofenig@gmx.net>
X-Original-To: oauth@ietfa.amsl.com
Delivered-To: oauth@ietfa.amsl.com
Received: from localhost (localhost [127.0.0.1]) by ietfa.amsl.com (Postfix) with ESMTP id 17CBB21F89B2 for <oauth@ietfa.amsl.com>; Thu, 28 Feb 2013 13:57:04 -0800 (PST)
X-Virus-Scanned: amavisd-new at amsl.com
X-Spam-Flag: NO
X-Spam-Score: -102.535
X-Spam-Level: 
X-Spam-Status: No, score=-102.535 tagged_above=-999 required=5 tests=[AWL=0.064, BAYES_00=-2.599, USER_IN_WHITELIST=-100]
Received: from mail.ietf.org ([64.170.98.30]) by localhost (ietfa.amsl.com [127.0.0.1]) (amavisd-new, port 10024) with ESMTP id APmx3mmzuSLb for <oauth@ietfa.amsl.com>; Thu, 28 Feb 2013 13:57:03 -0800 (PST)
Received: from mout.gmx.net (mout.gmx.net [212.227.17.20]) by ietfa.amsl.com (Postfix) with ESMTP id 28EE121F89CC for <oauth@ietf.org>; Thu, 28 Feb 2013 13:57:03 -0800 (PST)
Received: from mailout-de.gmx.net ([10.1.76.24]) by mrigmx.server.lan (mrigmx001) with ESMTP (Nemesis) id 0MB0kk-1U1K6E1SBI-009wGG for <oauth@ietf.org>; Thu, 28 Feb 2013 22:57:02 +0100
Received: (qmail invoked by alias); 28 Feb 2013 21:57:02 -0000
Received: from a88-115-219-140.elisa-laajakaista.fi (EHLO [192.168.100.115]) [88.115.219.140] by mail.gmx.net (mp024) with SMTP; 28 Feb 2013 22:57:02 +0100
X-Authenticated: #29516787
X-Provags-ID: V01U2FsdGVkX1+BSx1C5eSBC1YtDvtwGyQ4H9n0lCRKQWOcdfGnKz OqBjZ5iI3gDxLK
Message-ID: <512FD2AC.2000607@gmx.net>
Date: Thu, 28 Feb 2013 23:57:00 +0200
From: Hannes Tschofenig <hannes.tschofenig@gmx.net>
User-Agent: Mozilla/5.0 (X11; Linux i686; rv:17.0) Gecko/20130221 Thunderbird/17.0.3
MIME-Version: 1.0
To: prateek mishra <prateek.mishra@oracle.com>
References: <1362079266.8952.YahooMailClassic@web141002.mail.bf1.yahoo.com> <512FCDF0.6010807@gmx.net> <512FD1C5.2070100@oracle.com>
In-Reply-To: <512FD1C5.2070100@oracle.com>
Content-Type: text/plain; charset=ISO-8859-1; format=flowed
Content-Transfer-Encoding: 7bit
X-Y-GMX-Trusted: 0
Cc: oleg@gryb.info, oauth@ietf.org
Subject: Re: [OAUTH-WG] Fw:  IPR Disclosure: - What to Do with JWT ?
X-BeenThere: oauth@ietf.org
X-Mailman-Version: 2.1.12
Precedence: list
List-Id: OAUTH WG <oauth.ietf.org>
List-Unsubscribe: <https://www.ietf.org/mailman/options/oauth>, <mailto:oauth-request@ietf.org?subject=unsubscribe>
List-Archive: <http://www.ietf.org/mail-archive/web/oauth>
List-Post: <mailto:oauth@ietf.org>
List-Help: <mailto:oauth-request@ietf.org?subject=help>
List-Subscribe: <https://www.ietf.org/mailman/listinfo/oauth>, <mailto:oauth-request@ietf.org?subject=subscribe>
X-List-Received-Date: Thu, 28 Feb 2013 21:57:04 -0000

This is certainly a good point. Stating whether certain claims are valid 
or not valid is not a good use of our time and may lead to legal 
problems later on.

So, read through the patents and make your own assessment whether this 
IPRs are a concern for you and whether you want anything in the drafts 
to be changed.

On 02/28/2013 11:53 PM, prateek mishra wrote:
> Two points  -
>
> 1) I request that this mailing list NOT be used for any substantive
> discussion of patent claims and so on. This will create difficulties for
> many participants and
> I dont believe is within the charter of this effort.
>
> 2) I would encourage interested parties to review the following
> document, which may be relevant to this discussion
>
> http://www.w3.org/2011/xmlsec-pag/
>
> - prateek
>
>> Hi Oleg,
>>
>> my personal experience with Certicom's IPR disclosures is that they
>> focus on Elliptic Curve Cryptography. There were several IPR
>> disclosures on documents in the JOSE WG and some of them contain ECC
>> algorithms.
>>
>> The JWT does not list an ECC algorithm but the referenced documents do.
>>
>> Having said that the two cited IPRs seem to be:
>> http://www.google.com/patents/US6704870
>> http://www.google.com/patents/US7215773
>>
>> Take a look at it and make your assessment whether there is anything
>> we can change.
>>
>> Ciao
>> Hannes
>>
>>
>> On 02/28/2013 09:21 PM, Oleg Gryb wrote:
>>> Dear OAuth WG and Chairs,
>>>
>>> Can somebody please comment the Certicom's disclosure below? If the
>>> purpose of this disclosure is to inform us that JWT can be potentially a
>>> subject of royalties and other possible legal actions, the value of
>>> adopting JWT in the scope of OAuth 2.0 IETF standard would definitely
>>> diminish and if this is the case shouldn't we consider replacing it with
>>> something similar, but different, which would not be a subject of the
>>> future possible litigation?
>>>
>>> I'm not a lawyer and might not understand the statement below correctly,
>>> so please let me know if/where I'm wrong. Please keep in mind also that
>>> the popularity of JWT is growing fast along with the implementations, so
>>> we need to do something quickly.
>>>
>>> Thanks,
>>> Oleg.
>>>
>>>
>>> --- On *Wed, 2/27/13, IETF Secretariat /<ietf-ipr@ietf.org>/* wrote:
>>>
>>>
>>>     From: IETF Secretariat <ietf-ipr@ietf.org>
>>>     Subject: [OAUTH-WG] IPR Disclosure: Certicom Corporation's Statement
>>>     about IPR related to draft-ietf-oauth-json-web-token-06 (2)
>>>     To: mbj@microsoft.com, ve7jtb@ve7jtb.com, n-sakimura@nri.co.jp
>>>     Cc: derek@ihtfp.com, oauth@ietf.org, ipr-announce@ietf.org
>>>     Date: Wednesday, February 27, 2013, 4:16 PM
>>>
>>>
>>>     Dear Michael Jones, John Bradley, Nat Sakimura:
>>>
>>>     An IPR disclosure that pertains to your Internet-Draft entitled
>>>     "JSON Web Token
>>>     (JWT)" (draft-ietf-oauth-json-web-token) was submitted to the IETF
>>>     Secretariat
>>>     on 2013-02-20 and has been posted on the "IETF Page of Intellectual
>>>     Property
>>>     Rights Disclosures" (https://datatracker.ietf.org/ipr/1968/). The
>>>     title of the
>>>     IPR disclosure is "Certicom Corporation's Statement about IPR
>>>     related to draft-
>>>     ietf-oauth-json-web-token-06 (2)."");
>>>
>>>     The IETF Secretariat
>>>
>>>     _______________________________________________
>>>     OAuth mailing list
>>>     OAuth@ietf.org </mc/compose?to=OAuth@ietf.org>
>>>     https://www.ietf.org/mailman/listinfo/oauth
>>>
>>>
>>>
>>> _______________________________________________
>>> OAuth mailing list
>>> OAuth@ietf.org
>>> https://www.ietf.org/mailman/listinfo/oauth
>>>
>> _______________________________________________
>> OAuth mailing list
>> OAuth@ietf.org
>> https://www.ietf.org/mailman/listinfo/oauth
>

From Adam.Lewis@motorolasolutions.com  Thu Feb 28 14:13:59 2013
Return-Path: <Adam.Lewis@motorolasolutions.com>
X-Original-To: oauth@ietfa.amsl.com
Delivered-To: oauth@ietfa.amsl.com
Received: from localhost (localhost [127.0.0.1]) by ietfa.amsl.com (Postfix) with ESMTP id 1F19F21F8B06 for <oauth@ietfa.amsl.com>; Thu, 28 Feb 2013 14:13:59 -0800 (PST)
X-Virus-Scanned: amavisd-new at amsl.com
X-Spam-Flag: NO
X-Spam-Score: -0.466
X-Spam-Level: 
X-Spam-Status: No, score=-0.466 tagged_above=-999 required=5 tests=[BAYES_00=-2.599, HTML_MESSAGE=0.001, RCVD_IN_DNSWL_LOW=-1, UNRESOLVED_TEMPLATE=3.132]
Received: from mail.ietf.org ([64.170.98.30]) by localhost (ietfa.amsl.com [127.0.0.1]) (amavisd-new, port 10024) with ESMTP id xy5cbUgMqzjZ for <oauth@ietfa.amsl.com>; Thu, 28 Feb 2013 14:13:53 -0800 (PST)
Received: from co1outboundpool.messaging.microsoft.com (co1ehsobe006.messaging.microsoft.com [216.32.180.189]) by ietfa.amsl.com (Postfix) with ESMTP id 78E8F21F85B4 for <oauth@ietf.org>; Thu, 28 Feb 2013 14:13:53 -0800 (PST)
Received: from mail14-co1-R.bigfish.com (10.243.78.237) by CO1EHSOBE003.bigfish.com (10.243.66.66) with Microsoft SMTP Server id 14.1.225.23; Thu, 28 Feb 2013 22:13:52 +0000
Received: from mail14-co1 (localhost [127.0.0.1])	by mail14-co1-R.bigfish.com (Postfix) with ESMTP id A60829C0218	for <oauth@ietf.org>; Thu, 28 Feb 2013 22:13:52 +0000 (UTC)
X-Forefront-Antispam-Report: CIP:129.188.136.18; KIP:(null); UIP:(null); IPV:NLI; H:il06msg02.am.mot-solutions.com; RD:none; EFVD:NLI
X-SpamScore: -30
X-BigFish: VPS-30(zz98dI9371Ic89bh936eIc85dh1432I179dNzz1f42h1ee6h1de0h1202h1e76h1d1ah1d2ahzz8275ch1033IL177df4h17326ah8275dh18c673h8275bhz2fh2a8h683h839hd25hf0ah1288h12a5h12bdh137ah1441h1504h1537h153bh15d0h162dh1631h1758h18e1h1946h19b5h19ceh1ad9h1155h)
Received-SPF: pass (mail14-co1: domain of motorolasolutions.com designates 129.188.136.18 as permitted sender) client-ip=129.188.136.18; envelope-from=Adam.Lewis@motorolasolutions.com; helo=il06msg02.am.mot-solutions.com ; olutions.com ; 
X-Forefront-Antispam-Report-Untrusted: CIP:157.56.237.133; KIP:(null); UIP:(null); (null); H:BY2PRD0411HT002.namprd04.prod.outlook.com; R:internal; EFV:INT
Received: from mail14-co1 (localhost.localdomain [127.0.0.1]) by mail14-co1 (MessageSwitch) id 1362089630126889_2552; Thu, 28 Feb 2013 22:13:50 +0000 (UTC)
Received: from CO1EHSMHS028.bigfish.com (unknown [10.243.78.242])	by mail14-co1.bigfish.com (Postfix) with ESMTP id 11F644600A2	for <oauth@ietf.org>; Thu, 28 Feb 2013 22:13:50 +0000 (UTC)
Received: from il06msg02.am.mot-solutions.com (129.188.136.18) by CO1EHSMHS028.bigfish.com (10.243.66.38) with Microsoft SMTP Server (TLS) id 14.1.225.23; Thu, 28 Feb 2013 22:13:49 +0000
Received: from il06msg02.am.mot-solutions.com (il06vts01.mot.com [129.188.137.141])	by il06msg02.am.mot-solutions.com (8.14.3/8.14.3) with ESMTP id r1SMDmWM000294	for <oauth@ietf.org>; Thu, 28 Feb 2013 17:13:48 -0500 (EST)
Received: from tx2outboundpool.messaging.microsoft.com (tx2ehsobe004.messaging.microsoft.com [65.55.88.14])	by il06msg02.am.mot-solutions.com (8.14.3/8.14.3) with ESMTP id r1SMDlxN000287 (version=TLSv1/SSLv3 cipher=AES128-SHA bits=128 verify=FAIL)	for <oauth@ietf.org>; Thu, 28 Feb 2013 17:13:47 -0500 (EST)
Received: from mail47-tx2-R.bigfish.com (10.9.14.240) by TX2EHSOBE002.bigfish.com (10.9.40.22) with Microsoft SMTP Server id 14.1.225.23; Thu, 28 Feb 2013 22:13:47 +0000
Received: from mail47-tx2 (localhost [127.0.0.1])	by mail47-tx2-R.bigfish.com (Postfix) with ESMTP id F1775420179	for <oauth@ietf.org.FOPE.CONNECTOR.OVERRIDE>; Thu, 28 Feb 2013 22:13:46 +0000 (UTC)
Received: from mail47-tx2 (localhost.localdomain [127.0.0.1]) by mail47-tx2 (MessageSwitch) id 1362089616175957_2521; Thu, 28 Feb 2013 22:13:36 +0000 (UTC)
Received: from TX2EHSMHS044.bigfish.com (unknown [10.9.14.254])	by mail47-tx2.bigfish.com (Postfix) with ESMTP id 253094C0095; Thu, 28 Feb 2013 22:13:36 +0000 (UTC)
Received: from BY2PRD0411HT002.namprd04.prod.outlook.com (157.56.237.133) by TX2EHSMHS044.bigfish.com (10.9.99.144) with Microsoft SMTP Server (TLS) id 14.1.225.23; Thu, 28 Feb 2013 22:13:36 +0000
Received: from BY2PRD0411MB441.namprd04.prod.outlook.com ([169.254.5.225]) by BY2PRD0411HT002.namprd04.prod.outlook.com ([10.255.128.37]) with mapi id 14.16.0275.006; Thu, 28 Feb 2013 22:13:32 +0000
From: Lewis Adam-CAL022 <Adam.Lewis@motorolasolutions.com>
To: Brian Campbell <bcampbell@pingidentity.com>
Thread-Topic: [OAUTH-WG] JWT - scope claim missing
Thread-Index: AQHOFZ6Qe5ExGqoPnkOeJlU0r70rz5iPcwoAgAAB5gCAAAWJgIAABAMAgAAIM4CAAAN2AIAACPeAgAAGkICAAAeWAIAAAR2AgAAILoCAACqKMA==
Date: Thu, 28 Feb 2013 22:13:31 +0000
Message-ID: <59E470B10C4630419ED717AC79FCF9A948D58DC0@BY2PRD0411MB441.namprd04.prod.outlook.com>
References: <0EC2404F-E3C5-4AD1-88B4-E74AA0394DD9@gmx.net> <C75E4871-E907-4EF7-BAF0-9D1A172D581B@ve7jtb.com> <CA6A6425-D0CE-469F-B51E-9F296DA8041C@oracle.com> <CA+k3eCREgN+6z+U=jjJcPo0nZVR0GWn5zXeecZRO+rg=xd-gZg@mail.gmail.com> <A2375FE9-946F-46B3-9356-0709DD56BD4A@ve7jtb.com> <48FD87D1-4DF4-4289-99B7-40A515F31890@oracle.com> <3E472720-31A4-40A0-AAA4-402CF850831A@ve7jtb.com> <7127843B-D7B0-4AB6-87F1-1604D1EFFA79@oracle.com> <50DA292F-32F0-4266-8401-006AD837B775@ve7jtb.com> <CA+k3eCSyE3cPMh17XuivbUZUtHY=RAtjV1UeCdW6gGFk+gv02A@mail.gmail.com> <59E470B10C4630419ED717AC79FCF9A948D58BEE@BY2PRD0411MB441.namprd04.prod.outlook.com> <CA+k3eCSD3EqtNC0Z--+HKwENW9pbzCNGp2_LyVp0bAphvThnRA@mail.gmail.com>
In-Reply-To: <CA+k3eCSD3EqtNC0Z--+HKwENW9pbzCNGp2_LyVp0bAphvThnRA@mail.gmail.com>
Accept-Language: en-US
Content-Language: en-US
X-MS-Has-Attach: 
X-MS-TNEF-Correlator: 
x-originating-ip: [184.78.105.93]
Content-Type: multipart/alternative; boundary="_000_59E470B10C4630419ED717AC79FCF9A948D58DC0BY2PRD0411MB441_"
MIME-Version: 1.0
X-FOPE-CONNECTOR: Id%0$Dn%*$RO%0$TLS%0$FQDN%$TlsDn%
X-FOPE-CONNECTOR: Id%1294$Dn%PINGIDENTITY.COM$RO%2$TLS%3$FQDN%msgate.mot-solutions.com$TlsDn%
X-FOPE-CONNECTOR: Id%1294$Dn%VE7JTB.COM$RO%2$TLS%3$FQDN%msgate.mot-solutions.com$TlsDn%
X-FOPE-CONNECTOR: Id%1294$Dn%IETF.ORG$RO%2$TLS%3$FQDN%msgate.mot-solutions.com$TlsDn%
X-CFilter-Loop: Reflected
X-OriginatorOrg: motorolasolutions.com
Cc: "oauth@ietf.org WG" <oauth@ietf.org>
Subject: Re: [OAUTH-WG] JWT - scope claim missing
X-BeenThere: oauth@ietf.org
X-Mailman-Version: 2.1.12
Precedence: list
List-Id: OAUTH WG <oauth.ietf.org>
List-Unsubscribe: <https://www.ietf.org/mailman/options/oauth>, <mailto:oauth-request@ietf.org?subject=unsubscribe>
List-Archive: <http://www.ietf.org/mail-archive/web/oauth>
List-Post: <mailto:oauth@ietf.org>
List-Help: <mailto:oauth-request@ietf.org?subject=help>
List-Subscribe: <https://www.ietf.org/mailman/listinfo/oauth>, <mailto:oauth-request@ietf.org?subject=subscribe>
X-List-Received-Date: Thu, 28 Feb 2013 22:13:59 -0000

--_000_59E470B10C4630419ED717AC79FCF9A948D58DC0BY2PRD0411MB441_
Content-Type: text/plain; charset="iso-8859-1"
Content-Transfer-Encoding: quoted-printable

Hmmm, I'm not so sure.  It depends where we all think OAuth is on its traje=
ctory.  On one hand, OAuth has already seen an insanely massive amount of d=
eployment.  On the other hand, RESTful APIs see no sign of slowing down.   =
Now I'm not going to go so far as Craig B. and say that everything and ever=
yone will be API enabled in the future, but it sure is going to be a lot.  =
That being said, one could argue that even with all the OAuth implementatio=
n we've seen, that this is just the infancy of it.  Obviously a WG profile =
of a JWT-structured AT could not deprecate other forms (unstructured, SAML,=
 etc.) but going forward new developers may choose to embrace this, and in =
fact this could even be the guidance.   I agree with previous comments that=
 Justin's introspection draft might be a good place to explore this.

adam

From: Brian Campbell [mailto:bcampbell@pingidentity.com]
Sent: Thursday, February 28, 2013 1:36 PM
To: Lewis Adam-CAL022
Cc: John Bradley; oauth@ietf.org WG
Subject: Re: [OAUTH-WG] JWT - scope claim missing

I do agree that a WG profile of a JWT-structured access token could lend it=
self to interoperability and ultimately be a useful thing. But you are righ=
t that there already are many implementations out there in the wild (heck, =
I've written one myself) and that might make it difficult to standardize on=
 something.
Because of that, and many other reasons, I don't want to try and add that t=
o existing assertion drafts.

On Thu, Feb 28, 2013 at 12:13 PM, Lewis Adam-CAL022 <Adam.Lewis@motorolasol=
utions.com<mailto:Adam.Lewis@motorolasolutions.com>> wrote:
Hi Brian, a few thoughts from somebody outside of the WG ...

As a newcomer to OAuth last year, I was initially confused by the titles.  =
It was confusing because we have SAML bearer *assertions* and JWT bearer *t=
okens* ... and as John just (begrudgingly) stated in this thread, the JWT i=
s being used as an assertion in this profile (and in OIDC).  I think it wil=
l be difficult to find a good name for these profiles since they do two ent=
irely different things (e.g. define a new grant type and define a new metho=
d of client authentication).  One could argue that as long as the WG is at =
it, then why not add a third section to the JWT profile, which talks about =
usage of JWT-structured bearer access tokens: it would not be any less rela=
ted than the other two focuses of the doc.  Then the document could be call=
ed something simple like "profiles of JWT usage in OAuth" or something like=
 that.

On one hand, it is probably na=EFve to think that an access token can be st=
andardized in a profile given how many have already been released into the =
wild, but on the other hand, a WG profile of a JWT-structured access token =
could lend itself to interoperability, where AS implementations can adverti=
se conformance to the profile and who knows ... maybe the RS's of the futur=
e will be good with this.

adam

From: oauth-bounces@ietf.org<mailto:oauth-bounces@ietf.org> [mailto:oauth-b=
ounces@ietf.org<mailto:oauth-bounces@ietf.org>] On Behalf Of Brian Campbell
Sent: Thursday, February 28, 2013 1:03 PM
To: John Bradley
Cc: oauth@ietf.org<mailto:oauth@ietf.org> WG

Subject: Re: [OAUTH-WG] JWT - scope claim missing

I'm not sure anyone really "picked" the titles for the bearer token profile=
s. They just kind of evolved. And evolved in funny ways especially when cli=
ent authn to the AS was added.
You won't hear me argue that the titles are "good" and this is not the firs=
t time there's been confusion about what they actually do. They define new =
grant types and new client authentication methods. They *do not* define an =
access token format or anything else about access tokens. JWT and SAML coul=
d be used for that but that's not what these drafts do.
Suggestions for better title(s) would be more than welcome.

Here's what they are now:

SAML 2.0 Bearer Assertion Profiles for OAuth 2.0
draft-ietf-oauth-saml2-bearer

JSON Web Token (JWT) Bearer Token Profiles for OAuth 2.0
draft-ietf-oauth-jwt-bearer

Assertion Framework for OAuth 2.0
draft-ietf-oauth-assertions

On Thu, Feb 28, 2013 at 11:36 AM, John Bradley <ve7jtb@ve7jtb.com<mailto:ve=
7jtb@ve7jtb.com>> wrote:
Yes the title likely adds to the confusion given that the bearer tokens are=
 not access tokens.

Things as separate from OAuth as the Firefox browerID spec use JWS signed J=
WTs.

The bearer token profiles for OAuth 2 are for OAuth2.

The JSON Web Token (JWT)<http://tools.ietf.org/html/draft-ietf-oauth-json-w=
eb-token-06> spec did not start in OAuth and is not OAuth specific.

A JWT is:

JSON Web Token (JWT)  A string representing a set of claims as a JSON

      object that is encoded in a JWS or JWE, enabling the claims to be

      digitally signed or MACed and/or encrypted.

So OAuth or other profiles may define claims to go in a JWT, but the JWT ne=
eds to itself only define the claims necessary for security processing.

John B.
PS that was a soft ball If you hadn't responded I would have been disappoin=
ted.  I din't pick the title for the bearer token profiles.


On 2013-02-28, at 10:12 AM, Phil Hunt <phil.hunt@oracle.com<mailto:phil.hun=
t@oracle.com>> wrote:

JSON Web Token (JWT) Bearer Token Profiles for OAuth 2.0

Note the title says "for OAuth2"

Sorry. Couldn't resist.

Phil

Sent from my phone.

On 2013-02-28, at 9:40, John Bradley <ve7jtb@ve7jtb.com<mailto:ve7jtb@ve7jt=
b.com>> wrote:
JWT is an assertion( I am probably going to regret using that word).

It is used in openID connect for id_tokens, it is used in OAuth for Asserti=
on grant types and authentication of the client to the token endpoint.
http://tools.ietf.org/html/draft-ietf-oauth-jwt-bearer-04






JSON Web Token (JWT) Bearer Token Profiles for OAuth 2.0

Dosen't define JWT's use for access tokens for the RS.

Bottom line JWT is for more than access tokens.

John B.

On 2013-02-28, at 9:28 AM, Phil Hunt <phil.hunt@oracle.com<mailto:phil.hunt=
@oracle.com>> wrote:

Are you saying jwt is not an access token type?

Phil

Sent from my phone.

On 2013-02-28, at 8:58, John Bradley <ve7jtb@ve7jtb.com<mailto:ve7jtb@ve7jt=
b.com>> wrote:
Yes, defining scope in JWT is the wrong place.   JWT needs to stick to the =
security claims needed to process JWT.

I also don't know how far you get requiring a specific authorization format=
 for JWT, some AS will wan to use a opaque reference, some might want to us=
e a user claim or role claim, others may use scopes,  combining scopes and =
claims is also possible.

Right now it is up to a AS RS pair to agree on how to communicate authoriza=
tion.   I don't want MAC to be more restrictive than bearer when it comes t=
o authorization between AS and RS.

Hannes wanted to know why JWT didn't define scope.  The simple answer is th=
at it is out of scope for JWT itself.   It might be defined in a OAuth acce=
ss token profile for JWT but it should not be specific to MAC.

John B.
On 2013-02-28, at 8:44 AM, Brian Campbell <bcampbell@pingidentity.com<mailt=
o:bcampbell@pingidentity.com>> wrote:

I think John's point was more that scope is something rather specific to an=
 OAuth access token and, while JWT is can be used to represent an access to=
ken, it's not the only application of JWT. The 'standard' claims in JWT are=
 those that are believed (right or wrong) to be widely applicable across di=
fferent applications of JWT. One could argue about it but scope is probably=
 not one of those.
It would probably make sense to try and build a profile of JWT specifically=
 for OAuth access tokens (though I suspect there are some turtles and drago=
ns in there), which might be the appropriate place to define/register a sco=
pe claim.

On Thu, Feb 28, 2013 at 9:24 AM, Phil Hunt <phil.hunt@oracle.com<mailto:phi=
l.hunt@oracle.com>> wrote:
Are you advocating TWO systems? That seems like a bad choice.

I would rather fix scope than go to a two system approach.

Phil

Sent from my phone.

On 2013-02-28, at 8:17, John Bradley <ve7jtb@ve7jtb.com<mailto:ve7jtb@ve7jt=
b.com>> wrote:

> While scope is one method that a AS could communicate authorization to a =
RS, it is not the only or perhaps even the most likely one.
> Using scope requires a relatively tight binding between the RS and AS,  U=
MA uses a different mechanism that describes finer grained operations.
> The AS may include roles, user, or other more abstract claims that the th=
e client may (god help them) pass on to EXCML for processing.
>
> While having a scopes claim is possible, like any other claim it is not p=
art of the JWT core security processing claims, and needs to be defined by =
extension.
>
> John B.
> On 2013-02-28, at 2:29 AM, Hannes Tschofenig <hannes.tschofenig@gmx.net<m=
ailto:hannes.tschofenig@gmx.net>> wrote:
>
>> Hi Mike,
>>
>> when I worked on the MAC specification I noticed that the JWT does not h=
ave a claim for the scope. I believe that this would be needed to allow the=
 resource server to verify whether the scope the authorization server autho=
rized is indeed what the client is asking for.
>>
>> Ciao
>> Hannes
>>
>> _______________________________________________
>> OAuth mailing list
>> OAuth@ietf.org<mailto:OAuth@ietf.org>
>> https://www.ietf.org/mailman/listinfo/oauth
>
> _______________________________________________
> OAuth mailing list
> OAuth@ietf.org<mailto:OAuth@ietf.org>
> https://www.ietf.org/mailman/listinfo/oauth
_______________________________________________
OAuth mailing list
OAuth@ietf.org<mailto:OAuth@ietf.org>
https://www.ietf.org/mailman/listinfo/oauth







--_000_59E470B10C4630419ED717AC79FCF9A948D58DC0BY2PRD0411MB441_
Content-Type: text/html; charset="iso-8859-1"
Content-Transfer-Encoding: quoted-printable

<html xmlns:v=3D"urn:schemas-microsoft-com:vml" xmlns:o=3D"urn:schemas-micr=
osoft-com:office:office" xmlns:w=3D"urn:schemas-microsoft-com:office:word" =
xmlns:x=3D"urn:schemas-microsoft-com:office:excel" xmlns:p=3D"urn:schemas-m=
icrosoft-com:office:powerpoint" xmlns:a=3D"urn:schemas-microsoft-com:office=
:access" xmlns:dt=3D"uuid:C2F41010-65B3-11d1-A29F-00AA00C14882" xmlns:s=3D"=
uuid:BDC6E3F0-6DA3-11d1-A2A3-00AA00C14882" xmlns:rs=3D"urn:schemas-microsof=
t-com:rowset" xmlns:z=3D"#RowsetSchema" xmlns:b=3D"urn:schemas-microsoft-co=
m:office:publisher" xmlns:ss=3D"urn:schemas-microsoft-com:office:spreadshee=
t" xmlns:c=3D"urn:schemas-microsoft-com:office:component:spreadsheet" xmlns=
:odc=3D"urn:schemas-microsoft-com:office:odc" xmlns:oa=3D"urn:schemas-micro=
soft-com:office:activation" xmlns:html=3D"http://www.w3.org/TR/REC-html40" =
xmlns:q=3D"http://schemas.xmlsoap.org/soap/envelope/" xmlns:rtc=3D"http://m=
icrosoft.com/officenet/conferencing" xmlns:D=3D"DAV:" xmlns:Repl=3D"http://=
schemas.microsoft.com/repl/" xmlns:mt=3D"http://schemas.microsoft.com/share=
point/soap/meetings/" xmlns:x2=3D"http://schemas.microsoft.com/office/excel=
/2003/xml" xmlns:ppda=3D"http://www.passport.com/NameSpace.xsd" xmlns:ois=
=3D"http://schemas.microsoft.com/sharepoint/soap/ois/" xmlns:dir=3D"http://=
schemas.microsoft.com/sharepoint/soap/directory/" xmlns:ds=3D"http://www.w3=
.org/2000/09/xmldsig#" xmlns:dsp=3D"http://schemas.microsoft.com/sharepoint=
/dsp" xmlns:udc=3D"http://schemas.microsoft.com/data/udc" xmlns:xsd=3D"http=
://www.w3.org/2001/XMLSchema" xmlns:sub=3D"http://schemas.microsoft.com/sha=
repoint/soap/2002/1/alerts/" xmlns:ec=3D"http://www.w3.org/2001/04/xmlenc#"=
 xmlns:sp=3D"http://schemas.microsoft.com/sharepoint/" xmlns:sps=3D"http://=
schemas.microsoft.com/sharepoint/soap/" xmlns:xsi=3D"http://www.w3.org/2001=
/XMLSchema-instance" xmlns:udcs=3D"http://schemas.microsoft.com/data/udc/so=
ap" xmlns:udcxf=3D"http://schemas.microsoft.com/data/udc/xmlfile" xmlns:udc=
p2p=3D"http://schemas.microsoft.com/data/udc/parttopart" xmlns:wf=3D"http:/=
/schemas.microsoft.com/sharepoint/soap/workflow/" xmlns:dsss=3D"http://sche=
mas.microsoft.com/office/2006/digsig-setup" xmlns:dssi=3D"http://schemas.mi=
crosoft.com/office/2006/digsig" xmlns:mdssi=3D"http://schemas.openxmlformat=
s.org/package/2006/digital-signature" xmlns:mver=3D"http://schemas.openxmlf=
ormats.org/markup-compatibility/2006" xmlns:m=3D"http://schemas.microsoft.c=
om/office/2004/12/omml" xmlns:mrels=3D"http://schemas.openxmlformats.org/pa=
ckage/2006/relationships" xmlns:spwp=3D"http://microsoft.com/sharepoint/web=
partpages" xmlns:ex12t=3D"http://schemas.microsoft.com/exchange/services/20=
06/types" xmlns:ex12m=3D"http://schemas.microsoft.com/exchange/services/200=
6/messages" xmlns:pptsl=3D"http://schemas.microsoft.com/sharepoint/soap/Sli=
deLibrary/" xmlns:spsl=3D"http://microsoft.com/webservices/SharePointPortal=
Server/PublishedLinksService" xmlns:Z=3D"urn:schemas-microsoft-com:" xmlns:=
st=3D"&#1;" xmlns=3D"http://www.w3.org/TR/REC-html40">
<head>
<meta http-equiv=3D"Content-Type" content=3D"text/html; charset=3Diso-8859-=
1">
<meta name=3D"Generator" content=3D"Microsoft Word 12 (filtered medium)">
<style><!--
/* Font Definitions */
@font-face
	{font-family:Helvetica;
	panose-1:2 11 6 4 2 2 2 2 2 4;}
@font-face
	{font-family:Helvetica;
	panose-1:2 11 6 4 2 2 2 2 2 4;}
@font-face
	{font-family:Calibri;
	panose-1:2 15 5 2 2 2 4 3 2 4;}
@font-face
	{font-family:Tahoma;
	panose-1:2 11 6 4 3 5 4 4 2 4;}
@font-face
	{font-family:Consolas;
	panose-1:2 11 6 9 2 2 4 3 2 4;}
@font-face
	{font-family:"Book Antiqua";
	panose-1:2 4 6 2 5 3 5 3 3 4;}
/* Style Definitions */
p.MsoNormal, li.MsoNormal, div.MsoNormal
	{margin:0in;
	margin-bottom:.0001pt;
	font-size:12.0pt;
	font-family:"Times New Roman","serif";}
h1
	{mso-style-priority:9;
	mso-style-link:"Heading 1 Char";
	mso-margin-top-alt:auto;
	margin-right:0in;
	mso-margin-bottom-alt:auto;
	margin-left:0in;
	font-size:24.0pt;
	font-family:"Times New Roman","serif";
	font-weight:bold;}
a:link, span.MsoHyperlink
	{mso-style-priority:99;
	color:blue;
	text-decoration:underline;}
a:visited, span.MsoHyperlinkFollowed
	{mso-style-priority:99;
	color:purple;
	text-decoration:underline;}
p
	{mso-style-priority:99;
	mso-margin-top-alt:auto;
	margin-right:0in;
	mso-margin-bottom-alt:auto;
	margin-left:0in;
	font-size:12.0pt;
	font-family:"Times New Roman","serif";}
pre
	{mso-style-priority:99;
	mso-style-link:"HTML Preformatted Char";
	margin:0in;
	margin-bottom:.0001pt;
	font-size:10.0pt;
	font-family:"Courier New";}
span.HTMLPreformattedChar
	{mso-style-name:"HTML Preformatted Char";
	mso-style-priority:99;
	mso-style-link:"HTML Preformatted";
	font-family:Consolas;}
span.Heading1Char
	{mso-style-name:"Heading 1 Char";
	mso-style-priority:9;
	mso-style-link:"Heading 1";
	font-family:"Cambria","serif";
	color:#365F91;
	font-weight:bold;}
span.EmailStyle21
	{mso-style-type:personal-reply;
	font-family:"Book Antiqua","serif";
	color:olive;
	font-weight:normal;
	font-style:normal;
	text-decoration:none none;}
.MsoChpDefault
	{mso-style-type:export-only;}
@page WordSection1
	{size:8.5in 11.0in;
	margin:1.0in 1.0in 1.0in 1.0in;}
div.WordSection1
	{page:WordSection1;}
--></style><!--[if gte mso 9]><xml>
<o:shapedefaults v:ext=3D"edit" spidmax=3D"1026" />
</xml><![endif]--><!--[if gte mso 9]><xml>
<o:shapelayout v:ext=3D"edit">
<o:idmap v:ext=3D"edit" data=3D"1" />
</o:shapelayout></xml><![endif]-->
</head>
<body lang=3D"EN-US" link=3D"blue" vlink=3D"purple">
<div class=3D"WordSection1">
<p class=3D"MsoNormal"><span style=3D"font-size:10.5pt;font-family:&quot;Bo=
ok Antiqua&quot;,&quot;serif&quot;;color:olive">Hmmm, I&#8217;m not so sure=
.&nbsp; It depends where we all think OAuth is on its trajectory.&nbsp; On =
one hand, OAuth has already seen an insanely massive amount of deployment.&=
nbsp;
 On the other hand, RESTful APIs see no sign of slowing down.&nbsp;&nbsp; N=
ow I&#8217;m not going to go so far as Craig B. and say that everything and=
 everyone will be API enabled in the future, but it sure is going to be a l=
ot.&nbsp; That being said, one could argue that even
 with all the OAuth implementation we&#8217;ve seen, that this is just the =
infancy of it.&nbsp; Obviously a WG profile of a JWT-structured AT could no=
t deprecate other forms (unstructured, SAML, etc.) but going forward new de=
velopers may choose to embrace this, and in
 fact this could even be the guidance. &nbsp;&nbsp;I agree with previous co=
mments that Justin&#8217;s introspection draft might be a good place to exp=
lore this.<o:p></o:p></span></p>
<p class=3D"MsoNormal"><span style=3D"font-size:10.5pt;font-family:&quot;Bo=
ok Antiqua&quot;,&quot;serif&quot;;color:olive"><o:p>&nbsp;</o:p></span></p=
>
<p class=3D"MsoNormal"><span style=3D"font-size:10.5pt;font-family:&quot;Bo=
ok Antiqua&quot;,&quot;serif&quot;;color:olive">adam<o:p></o:p></span></p>
<p class=3D"MsoNormal"><span style=3D"font-size:10.5pt;font-family:&quot;Bo=
ok Antiqua&quot;,&quot;serif&quot;;color:olive"><o:p>&nbsp;</o:p></span></p=
>
<div style=3D"border:none;border-top:solid #B5C4DF 1.0pt;padding:3.0pt 0in =
0in 0in">
<p class=3D"MsoNormal"><b><span style=3D"font-size:10.0pt;font-family:&quot=
;Tahoma&quot;,&quot;sans-serif&quot;">From:</span></b><span style=3D"font-s=
ize:10.0pt;font-family:&quot;Tahoma&quot;,&quot;sans-serif&quot;"> Brian Ca=
mpbell [mailto:bcampbell@pingidentity.com]
<br>
<b>Sent:</b> Thursday, February 28, 2013 1:36 PM<br>
<b>To:</b> Lewis Adam-CAL022<br>
<b>Cc:</b> John Bradley; oauth@ietf.org WG<br>
<b>Subject:</b> Re: [OAUTH-WG] JWT - scope claim missing<o:p></o:p></span><=
/p>
</div>
<p class=3D"MsoNormal"><o:p>&nbsp;</o:p></p>
<div>
<div>
<p class=3D"MsoNormal" style=3D"margin-bottom:12.0pt">I do agree that a WG =
profile of a JWT-structured access token could lend itself to interoperabil=
ity and ultimately be a useful thing. But you are right that there already =
are many implementations out there in
 the wild (heck, I've written one myself) and that might make it difficult =
to standardize on something.<o:p></o:p></p>
</div>
<p class=3D"MsoNormal">Because of that, and many other reasons, I don't wan=
t to try and add that to existing assertion drafts.<o:p></o:p></p>
<div>
<p class=3D"MsoNormal" style=3D"margin-bottom:12.0pt"><o:p>&nbsp;</o:p></p>
<div>
<p class=3D"MsoNormal">On Thu, Feb 28, 2013 at 12:13 PM, Lewis Adam-CAL022 =
&lt;<a href=3D"mailto:Adam.Lewis@motorolasolutions.com" target=3D"_blank">A=
dam.Lewis@motorolasolutions.com</a>&gt; wrote:<o:p></o:p></p>
<div>
<div>
<p class=3D"MsoNormal" style=3D"mso-margin-top-alt:auto;mso-margin-bottom-a=
lt:auto"><span style=3D"font-size:10.5pt;font-family:&quot;Book Antiqua&quo=
t;,&quot;serif&quot;;color:olive">Hi Brian, a few thoughts from somebody ou=
tside of the WG &#8230;
</span><o:p></o:p></p>
<p class=3D"MsoNormal" style=3D"mso-margin-top-alt:auto;mso-margin-bottom-a=
lt:auto"><span style=3D"font-size:10.5pt;font-family:&quot;Book Antiqua&quo=
t;,&quot;serif&quot;;color:olive">&nbsp;</span><o:p></o:p></p>
<p class=3D"MsoNormal" style=3D"mso-margin-top-alt:auto;mso-margin-bottom-a=
lt:auto"><span style=3D"font-size:10.5pt;font-family:&quot;Book Antiqua&quo=
t;,&quot;serif&quot;;color:olive">As a newcomer to OAuth last year, I was i=
nitially confused by the titles.&nbsp; It was confusing because
 we have SAML bearer *<b>assertions</b>* and JWT bearer *<b>tokens</b>* &#8=
230; and as John just (begrudgingly) stated in this thread, the JWT is bein=
g used as an assertion in this profile (and in OIDC).&nbsp; I think it will=
 be difficult to find a good name for these
 profiles since they do two entirely different things (e.g. define a new gr=
ant type and define a new method of client authentication).&nbsp; One could=
 argue that as long as the WG is at it, then why not add a third section to=
 the JWT profile, which talks about usage
 of JWT-structured bearer access tokens: it would not be any less related t=
han the other two focuses of the doc.&nbsp; Then the document could be call=
ed something simple like &#8220;profiles of JWT usage in OAuth&#8221; or so=
mething like that.&nbsp;
</span><o:p></o:p></p>
<p class=3D"MsoNormal" style=3D"mso-margin-top-alt:auto;mso-margin-bottom-a=
lt:auto"><span style=3D"font-size:10.5pt;font-family:&quot;Book Antiqua&quo=
t;,&quot;serif&quot;;color:olive">&nbsp;</span><o:p></o:p></p>
<p class=3D"MsoNormal" style=3D"mso-margin-top-alt:auto;mso-margin-bottom-a=
lt:auto"><span style=3D"font-size:10.5pt;font-family:&quot;Book Antiqua&quo=
t;,&quot;serif&quot;;color:olive">On one hand, it is probably na=EFve to th=
ink that an access token can be standardized in a profile given
 how many have already been released into the wild, but on the other hand, =
a WG profile of a JWT-structured access token could lend itself to interope=
rability, where AS implementations can advertise conformance to the profile=
 and who knows &#8230; maybe the RS&#8217;s
 of the future will be good with this.&nbsp; </span><o:p></o:p></p>
<p class=3D"MsoNormal" style=3D"mso-margin-top-alt:auto;mso-margin-bottom-a=
lt:auto"><span style=3D"font-size:10.5pt;font-family:&quot;Book Antiqua&quo=
t;,&quot;serif&quot;;color:olive">&nbsp;</span><o:p></o:p></p>
<p class=3D"MsoNormal" style=3D"mso-margin-top-alt:auto;mso-margin-bottom-a=
lt:auto"><span style=3D"font-size:10.5pt;font-family:&quot;Book Antiqua&quo=
t;,&quot;serif&quot;;color:olive">adam</span><o:p></o:p></p>
<p class=3D"MsoNormal" style=3D"mso-margin-top-alt:auto;mso-margin-bottom-a=
lt:auto"><span style=3D"font-size:10.5pt;font-family:&quot;Book Antiqua&quo=
t;,&quot;serif&quot;;color:olive">&nbsp;</span><o:p></o:p></p>
<div style=3D"border:none;border-top:solid #B5C4DF 1.0pt;padding:3.0pt 0in =
0in 0in">
<p class=3D"MsoNormal" style=3D"mso-margin-top-alt:auto;mso-margin-bottom-a=
lt:auto"><b><span style=3D"font-size:10.0pt;font-family:&quot;Tahoma&quot;,=
&quot;sans-serif&quot;">From:</span></b><span style=3D"font-size:10.0pt;fon=
t-family:&quot;Tahoma&quot;,&quot;sans-serif&quot;">
<a href=3D"mailto:oauth-bounces@ietf.org" target=3D"_blank">oauth-bounces@i=
etf.org</a> [mailto:<a href=3D"mailto:oauth-bounces@ietf.org" target=3D"_bl=
ank">oauth-bounces@ietf.org</a>]
<b>On Behalf Of </b>Brian Campbell<br>
<b>Sent:</b> Thursday, February 28, 2013 1:03 PM<br>
<b>To:</b> John Bradley<br>
<b>Cc:</b> <a href=3D"mailto:oauth@ietf.org" target=3D"_blank">oauth@ietf.o=
rg</a> WG</span><o:p></o:p></p>
<div>
<p class=3D"MsoNormal"><br>
<b>Subject:</b> Re: [OAUTH-WG] JWT - scope claim missing<o:p></o:p></p>
</div>
</div>
<p class=3D"MsoNormal" style=3D"mso-margin-top-alt:auto;mso-margin-bottom-a=
lt:auto">&nbsp;<o:p></o:p></p>
<div>
<div>
<p class=3D"MsoNormal" style=3D"mso-margin-top-alt:auto;margin-bottom:12.0p=
t">I'm not sure anyone really &quot;picked&quot; the titles for the bearer =
token profiles. They just kind of evolved. And evolved in funny ways especi=
ally when client authn to the AS was added.
<o:p></o:p></p>
</div>
<div>
<div>
<div>
<p class=3D"MsoNormal" style=3D"mso-margin-top-alt:auto;margin-bottom:12.0p=
t">You won't hear me argue that the titles are &quot;good&quot; and this is=
 not the first time there's been confusion about what they actually do. The=
y define new grant types and new client authentication
 methods. They *do not* define an access token format or anything else abou=
t access tokens. JWT and SAML could be used for that but that's not what th=
ese drafts do.
<o:p></o:p></p>
</div>
<div>
<p class=3D"MsoNormal" style=3D"mso-margin-top-alt:auto;mso-margin-bottom-a=
lt:auto">Suggestions for better title(s) would be more than welcome.<o:p></=
o:p></p>
</div>
<div>
<div>
<p class=3D"MsoNormal" style=3D"mso-margin-top-alt:auto;mso-margin-bottom-a=
lt:auto">&nbsp;<o:p></o:p></p>
</div>
<div>
<p class=3D"MsoNormal" style=3D"mso-margin-top-alt:auto;mso-margin-bottom-a=
lt:auto">Here's what they are now:<o:p></o:p></p>
</div>
<div>
<p class=3D"MsoNormal" style=3D"mso-margin-top-alt:auto;mso-margin-bottom-a=
lt:auto"><br>
SAML 2.0 Bearer Assertion Profiles for OAuth 2.0<br>
draft-ietf-oauth-saml2-bearer<br>
<br>
JSON Web Token (JWT) Bearer Token Profiles for OAuth 2.0<br>
draft-ietf-oauth-jwt-bearer<br>
<br>
Assertion Framework for OAuth 2.0<br>
draft-ietf-oauth-assertions<o:p></o:p></p>
<div>
<p class=3D"MsoNormal" style=3D"mso-margin-top-alt:auto;mso-margin-bottom-a=
lt:auto">&nbsp;<o:p></o:p></p>
<div>
<p class=3D"MsoNormal" style=3D"mso-margin-top-alt:auto;mso-margin-bottom-a=
lt:auto">On Thu, Feb 28, 2013 at 11:36 AM, John Bradley &lt;<a href=3D"mail=
to:ve7jtb@ve7jtb.com" target=3D"_blank">ve7jtb@ve7jtb.com</a>&gt; wrote:<o:=
p></o:p></p>
<div>
<p class=3D"MsoNormal" style=3D"mso-margin-top-alt:auto;mso-margin-bottom-a=
lt:auto">Yes the title likely adds to the confusion given that the bearer t=
okens are not access tokens.<o:p></o:p></p>
<div>
<p class=3D"MsoNormal" style=3D"mso-margin-top-alt:auto;mso-margin-bottom-a=
lt:auto">&nbsp;<o:p></o:p></p>
</div>
<div>
<p class=3D"MsoNormal" style=3D"mso-margin-top-alt:auto;mso-margin-bottom-a=
lt:auto">Things as separate from OAuth as the Firefox browerID spec use JWS=
 signed JWTs. &nbsp;<o:p></o:p></p>
</div>
<div>
<p class=3D"MsoNormal" style=3D"mso-margin-top-alt:auto;mso-margin-bottom-a=
lt:auto">&nbsp;<o:p></o:p></p>
</div>
<div>
<p class=3D"MsoNormal" style=3D"mso-margin-top-alt:auto;mso-margin-bottom-a=
lt:auto">The bearer token profiles for OAuth 2 are for OAuth2.<o:p></o:p></=
p>
</div>
<div>
<p class=3D"MsoNormal" style=3D"mso-margin-top-alt:auto;mso-margin-bottom-a=
lt:auto">&nbsp;<o:p></o:p></p>
</div>
<div>
<p class=3D"MsoNormal" style=3D"mso-margin-top-alt:auto;mso-margin-bottom-a=
lt:auto">The&nbsp;<a href=3D"http://tools.ietf.org/html/draft-ietf-oauth-js=
on-web-token-06" target=3D"_blank">JSON Web Token (JWT)</a>&nbsp;spec did n=
ot start in OAuth and is not OAuth specific.<o:p></o:p></p>
</div>
<div>
<p class=3D"MsoNormal" style=3D"mso-margin-top-alt:auto;mso-margin-bottom-a=
lt:auto">&nbsp;<o:p></o:p></p>
</div>
<div>
<p class=3D"MsoNormal" style=3D"mso-margin-top-alt:auto;mso-margin-bottom-a=
lt:auto">A JWT is:<o:p></o:p></p>
</div>
<div>
<pre><span style=3D"font-size:12.0pt">JSON Web Token (JWT)&nbsp; A string r=
epresenting a set of claims as a JSON</span><o:p></o:p></pre>
<pre><span style=3D"font-size:12.0pt">&nbsp;&nbsp;&nbsp;&nbsp;&nbsp; object=
 that is encoded in a JWS or JWE, enabling the claims to be</span><o:p></o:=
p></pre>
<pre><span style=3D"font-size:12.0pt">&nbsp;&nbsp;&nbsp;&nbsp;&nbsp; digita=
lly signed or MACed and/or encrypted.</span><o:p></o:p></pre>
<div>
<p class=3D"MsoNormal" style=3D"mso-margin-top-alt:auto;mso-margin-bottom-a=
lt:auto">&nbsp;<o:p></o:p></p>
</div>
<div>
<p class=3D"MsoNormal" style=3D"mso-margin-top-alt:auto;mso-margin-bottom-a=
lt:auto">So OAuth or other profiles may define claims to go in a JWT, but t=
he JWT needs to itself only define the claims necessary for security proces=
sing. &nbsp;<o:p></o:p></p>
</div>
<div>
<p class=3D"MsoNormal" style=3D"mso-margin-top-alt:auto;mso-margin-bottom-a=
lt:auto">&nbsp;<o:p></o:p></p>
</div>
<div>
<p class=3D"MsoNormal" style=3D"mso-margin-top-alt:auto;mso-margin-bottom-a=
lt:auto">John B.<o:p></o:p></p>
</div>
<div>
<p class=3D"MsoNormal" style=3D"mso-margin-top-alt:auto;mso-margin-bottom-a=
lt:auto">PS that was a soft ball If you hadn't responded I would have been =
disappointed. &nbsp;I din't pick the title for the bearer token profiles.<o=
:p></o:p></p>
</div>
<div>
<div>
<div>
<p class=3D"MsoNormal" style=3D"mso-margin-top-alt:auto;mso-margin-bottom-a=
lt:auto">&nbsp;<o:p></o:p></p>
</div>
<div>
<p class=3D"MsoNormal" style=3D"mso-margin-top-alt:auto;mso-margin-bottom-a=
lt:auto">&nbsp;<o:p></o:p></p>
</div>
<div>
<div>
<p class=3D"MsoNormal" style=3D"mso-margin-top-alt:auto;mso-margin-bottom-a=
lt:auto">On 2013-02-28, at 10:12 AM, Phil Hunt &lt;<a href=3D"mailto:phil.h=
unt@oracle.com" target=3D"_blank">phil.hunt@oracle.com</a>&gt; wrote:<o:p><=
/o:p></p>
</div>
<p class=3D"MsoNormal" style=3D"mso-margin-top-alt:auto;margin-bottom:12.0p=
t"><o:p>&nbsp;</o:p></p>
<div>
<div>
<h1><span style=3D"font-family:&quot;Helvetica&quot;,&quot;sans-serif&quot;=
">JSON Web Token (JWT) Bearer Token Profiles for OAuth 2.0</span><o:p></o:p=
></h1>
<p class=3D"MsoNormal" style=3D"mso-margin-top-alt:auto;mso-margin-bottom-a=
lt:auto"><br>
Note the title says &quot;for OAuth2&quot;<o:p></o:p></p>
</div>
<div>
<p class=3D"MsoNormal" style=3D"mso-margin-top-alt:auto;mso-margin-bottom-a=
lt:auto">&nbsp;<o:p></o:p></p>
</div>
<div>
<p class=3D"MsoNormal" style=3D"mso-margin-top-alt:auto;mso-margin-bottom-a=
lt:auto">Sorry. Couldn't resist.&nbsp;<o:p></o:p></p>
</div>
<div>
<p class=3D"MsoNormal" style=3D"mso-margin-top-alt:auto;mso-margin-bottom-a=
lt:auto">&nbsp;<o:p></o:p></p>
</div>
<div>
<p class=3D"MsoNormal" style=3D"mso-margin-top-alt:auto;mso-margin-bottom-a=
lt:auto">Phil<o:p></o:p></p>
<div>
<p class=3D"MsoNormal" style=3D"mso-margin-top-alt:auto;mso-margin-bottom-a=
lt:auto">&nbsp;<o:p></o:p></p>
</div>
<div>
<p class=3D"MsoNormal" style=3D"mso-margin-top-alt:auto;mso-margin-bottom-a=
lt:auto">Sent from my phone.<o:p></o:p></p>
</div>
</div>
<div>
<p class=3D"MsoNormal" style=3D"mso-margin-top-alt:auto;margin-bottom:12.0p=
t"><br>
On 2013-02-28, at 9:40, John Bradley &lt;<a href=3D"mailto:ve7jtb@ve7jtb.co=
m" target=3D"_blank">ve7jtb@ve7jtb.com</a>&gt; wrote:<o:p></o:p></p>
</div>
<blockquote style=3D"margin-top:5.0pt;margin-bottom:5.0pt">
<p class=3D"MsoNormal" style=3D"mso-margin-top-alt:auto;mso-margin-bottom-a=
lt:auto">JWT is an assertion( I am probably going to regret using that word=
).<o:p></o:p></p>
<div>
<p class=3D"MsoNormal" style=3D"mso-margin-top-alt:auto;mso-margin-bottom-a=
lt:auto">&nbsp;<o:p></o:p></p>
</div>
<div>
<p class=3D"MsoNormal" style=3D"mso-margin-top-alt:auto;mso-margin-bottom-a=
lt:auto">It is used in openID connect for id_tokens, it is used in OAuth fo=
r Assertion grant types and authentication of the client to the token endpo=
int.<o:p></o:p></p>
</div>
<div>
<p class=3D"MsoNormal" style=3D"mso-margin-top-alt:auto;mso-margin-bottom-a=
lt:auto"><a href=3D"http://tools.ietf.org/html/draft-ietf-oauth-jwt-bearer-=
04" target=3D"_blank">http://tools.ietf.org/html/draft-ietf-oauth-jwt-beare=
r-04</a><o:p></o:p></p>
</div>
<div>
<p class=3D"MsoNormal" style=3D"mso-margin-top-alt:auto;mso-margin-bottom-a=
lt:auto">&nbsp;<o:p></o:p></p>
</div>
<div>
<pre><span style=3D"font-size:12.0pt">&nbsp;</span><o:p></o:p></pre>
<pre><span style=3D"font-size:12.0pt">&nbsp;</span><o:p></o:p></pre>
<h1><span style=3D"font-size:12.0pt;font-family:&quot;Courier New&quot;">JS=
ON Web Token (JWT) Bearer Token Profiles for OAuth 2.0</span><o:p></o:p></h=
1>
<div>
<p class=3D"MsoNormal" style=3D"mso-margin-top-alt:auto;mso-margin-bottom-a=
lt:auto">&nbsp;<o:p></o:p></p>
</div>
<div>
<p class=3D"MsoNormal" style=3D"mso-margin-top-alt:auto;mso-margin-bottom-a=
lt:auto">Dosen't define JWT's use for access tokens for the RS. &nbsp;&nbsp=
;<o:p></o:p></p>
</div>
<div>
<p class=3D"MsoNormal" style=3D"mso-margin-top-alt:auto;mso-margin-bottom-a=
lt:auto">&nbsp;<o:p></o:p></p>
</div>
<div>
<p class=3D"MsoNormal" style=3D"mso-margin-top-alt:auto;mso-margin-bottom-a=
lt:auto">Bottom line JWT is for more than access tokens.<o:p></o:p></p>
</div>
<div>
<p class=3D"MsoNormal" style=3D"mso-margin-top-alt:auto;mso-margin-bottom-a=
lt:auto">&nbsp;<o:p></o:p></p>
</div>
<div>
<p class=3D"MsoNormal" style=3D"mso-margin-top-alt:auto;mso-margin-bottom-a=
lt:auto">John B.<o:p></o:p></p>
</div>
<div>
<p class=3D"MsoNormal" style=3D"mso-margin-top-alt:auto;mso-margin-bottom-a=
lt:auto">&nbsp;<o:p></o:p></p>
</div>
<div>
<div>
<p class=3D"MsoNormal" style=3D"mso-margin-top-alt:auto;mso-margin-bottom-a=
lt:auto">On 2013-02-28, at 9:28 AM, Phil Hunt &lt;<a href=3D"mailto:phil.hu=
nt@oracle.com" target=3D"_blank">phil.hunt@oracle.com</a>&gt; wrote:<o:p></=
o:p></p>
</div>
<p class=3D"MsoNormal" style=3D"mso-margin-top-alt:auto;margin-bottom:12.0p=
t"><o:p>&nbsp;</o:p></p>
<div>
<div>
<p class=3D"MsoNormal" style=3D"mso-margin-top-alt:auto;mso-margin-bottom-a=
lt:auto">Are you saying jwt is not an access token type?<br>
<br>
Phil<o:p></o:p></p>
<div>
<p class=3D"MsoNormal" style=3D"mso-margin-top-alt:auto;mso-margin-bottom-a=
lt:auto">&nbsp;<o:p></o:p></p>
</div>
<div>
<p class=3D"MsoNormal" style=3D"mso-margin-top-alt:auto;mso-margin-bottom-a=
lt:auto">Sent from my phone.<o:p></o:p></p>
</div>
</div>
<div>
<p class=3D"MsoNormal" style=3D"mso-margin-top-alt:auto;margin-bottom:12.0p=
t"><br>
On 2013-02-28, at 8:58, John Bradley &lt;<a href=3D"mailto:ve7jtb@ve7jtb.co=
m" target=3D"_blank">ve7jtb@ve7jtb.com</a>&gt; wrote:<o:p></o:p></p>
</div>
<blockquote style=3D"margin-top:5.0pt;margin-bottom:5.0pt">
<p class=3D"MsoNormal" style=3D"mso-margin-top-alt:auto;mso-margin-bottom-a=
lt:auto">Yes, defining scope in JWT is the wrong place. &nbsp; JWT needs to=
 stick to the security claims needed to process JWT.<o:p></o:p></p>
<div>
<p class=3D"MsoNormal" style=3D"mso-margin-top-alt:auto;mso-margin-bottom-a=
lt:auto">&nbsp;<o:p></o:p></p>
</div>
<div>
<p class=3D"MsoNormal" style=3D"mso-margin-top-alt:auto;mso-margin-bottom-a=
lt:auto">I also don't know how far you get requiring a specific authorizati=
on format for JWT, some AS will wan to use a opaque reference, some might w=
ant to use a user claim or role claim,
 others may use scopes, &nbsp;combining scopes and claims is also possible.=
<o:p></o:p></p>
</div>
<div>
<p class=3D"MsoNormal" style=3D"mso-margin-top-alt:auto;mso-margin-bottom-a=
lt:auto">&nbsp;<o:p></o:p></p>
</div>
<div>
<p class=3D"MsoNormal" style=3D"mso-margin-top-alt:auto;mso-margin-bottom-a=
lt:auto">Right now it is up to a AS RS pair to agree on how to communicate =
authorization. &nbsp; I don't want MAC to be more restrictive than bearer w=
hen it comes to authorization between AS
 and RS.<o:p></o:p></p>
<div>
<p class=3D"MsoNormal" style=3D"mso-margin-top-alt:auto;mso-margin-bottom-a=
lt:auto">&nbsp;<o:p></o:p></p>
</div>
<div>
<p class=3D"MsoNormal" style=3D"mso-margin-top-alt:auto;mso-margin-bottom-a=
lt:auto">Hannes wanted to know why JWT didn't define scope. &nbsp;The simpl=
e answer is that it is out of scope for JWT itself. &nbsp; It might be defi=
ned in a OAuth access token profile for JWT but
 it should not be specific to MAC.<o:p></o:p></p>
</div>
<div>
<p class=3D"MsoNormal" style=3D"mso-margin-top-alt:auto;mso-margin-bottom-a=
lt:auto">&nbsp;<o:p></o:p></p>
</div>
<div>
<p class=3D"MsoNormal" style=3D"mso-margin-top-alt:auto;mso-margin-bottom-a=
lt:auto">John B.<o:p></o:p></p>
</div>
<div>
<div>
<div>
<p class=3D"MsoNormal" style=3D"mso-margin-top-alt:auto;mso-margin-bottom-a=
lt:auto">On 2013-02-28, at 8:44 AM, Brian Campbell &lt;<a href=3D"mailto:bc=
ampbell@pingidentity.com" target=3D"_blank">bcampbell@pingidentity.com</a>&=
gt; wrote:<o:p></o:p></p>
</div>
<p class=3D"MsoNormal" style=3D"mso-margin-top-alt:auto;margin-bottom:12.0p=
t"><o:p>&nbsp;</o:p></p>
<div>
<div>
<p class=3D"MsoNormal" style=3D"mso-margin-top-alt:auto;margin-bottom:12.0p=
t">I think John's point was more that scope is something rather specific to=
 an OAuth access token and, while JWT is can be used to represent an access=
 token, it's not the only application
 of JWT. The 'standard' claims in JWT are those that are believed (right or=
 wrong) to be widely applicable across different applications of JWT. One c=
ould argue about it but scope is probably not one of those.<o:p></o:p></p>
</div>
<p class=3D"MsoNormal" style=3D"mso-margin-top-alt:auto;mso-margin-bottom-a=
lt:auto">It would probably make sense to try and build a profile of JWT spe=
cifically for OAuth access tokens (though I suspect there are some turtles =
and dragons in there), which might be
 the appropriate place to define/register a scope claim.<o:p></o:p></p>
</div>
<div>
<p class=3D"MsoNormal" style=3D"mso-margin-top-alt:auto;margin-bottom:12.0p=
t">&nbsp;<o:p></o:p></p>
<div>
<p class=3D"MsoNormal" style=3D"mso-margin-top-alt:auto;mso-margin-bottom-a=
lt:auto">On Thu, Feb 28, 2013 at 9:24 AM, Phil Hunt &lt;<a href=3D"mailto:p=
hil.hunt@oracle.com" target=3D"_blank">phil.hunt@oracle.com</a>&gt; wrote:<=
o:p></o:p></p>
<p class=3D"MsoNormal" style=3D"mso-margin-top-alt:auto;mso-margin-bottom-a=
lt:auto">Are you advocating TWO systems? That seems like a bad choice.<br>
<br>
I would rather fix scope than go to a two system approach.<br>
<br>
Phil<br>
<br>
Sent from my phone.<br>
<br>
On 2013-02-28, at 8:17, John Bradley &lt;<a href=3D"mailto:ve7jtb@ve7jtb.co=
m" target=3D"_blank">ve7jtb@ve7jtb.com</a>&gt; wrote:<br>
<br>
&gt; While scope is one method that a AS could communicate authorization to=
 a RS, it is not the only or perhaps even the most likely one.<br>
&gt; Using scope requires a relatively tight binding between the RS and AS,=
 &nbsp;UMA uses a different mechanism that describes finer grained operatio=
ns.<br>
&gt; The AS may include roles, user, or other more abstract claims that the=
 the client may (god help them) pass on to EXCML for processing.<br>
&gt;<br>
&gt; While having a scopes claim is possible, like any other claim it is no=
t part of the JWT core security processing claims, and needs to be defined =
by extension.<br>
&gt;<br>
&gt; John B.<br>
&gt; On 2013-02-28, at 2:29 AM, Hannes Tschofenig &lt;<a href=3D"mailto:han=
nes.tschofenig@gmx.net" target=3D"_blank">hannes.tschofenig@gmx.net</a>&gt;=
 wrote:<br>
&gt;<br>
&gt;&gt; Hi Mike,<br>
&gt;&gt;<br>
&gt;&gt; when I worked on the MAC specification I noticed that the JWT does=
 not have a claim for the scope. I believe that this would be needed to all=
ow the resource server to verify whether the scope the authorization server=
 authorized is indeed what the client
 is asking for.<br>
&gt;&gt;<br>
&gt;&gt; Ciao<br>
&gt;&gt; Hannes<br>
&gt;&gt;<br>
&gt;&gt; _______________________________________________<br>
&gt;&gt; OAuth mailing list<br>
&gt;&gt; <a href=3D"mailto:OAuth@ietf.org" target=3D"_blank">OAuth@ietf.org=
</a><br>
&gt;&gt; <a href=3D"https://www.ietf.org/mailman/listinfo/oauth" target=3D"=
_blank">https://www.ietf.org/mailman/listinfo/oauth</a><br>
&gt;<br>
&gt; _______________________________________________<br>
&gt; OAuth mailing list<br>
&gt; <a href=3D"mailto:OAuth@ietf.org" target=3D"_blank">OAuth@ietf.org</a>=
<br>
&gt; <a href=3D"https://www.ietf.org/mailman/listinfo/oauth" target=3D"_bla=
nk">https://www.ietf.org/mailman/listinfo/oauth</a><br>
_______________________________________________<br>
OAuth mailing list<br>
<a href=3D"mailto:OAuth@ietf.org" target=3D"_blank">OAuth@ietf.org</a><br>
<a href=3D"https://www.ietf.org/mailman/listinfo/oauth" target=3D"_blank">h=
ttps://www.ietf.org/mailman/listinfo/oauth</a><o:p></o:p></p>
</div>
<p class=3D"MsoNormal" style=3D"mso-margin-top-alt:auto;mso-margin-bottom-a=
lt:auto">&nbsp;<o:p></o:p></p>
</div>
</div>
<p class=3D"MsoNormal" style=3D"mso-margin-top-alt:auto;mso-margin-bottom-a=
lt:auto">&nbsp;<o:p></o:p></p>
</div>
</div>
</blockquote>
</div>
</div>
<p class=3D"MsoNormal" style=3D"mso-margin-top-alt:auto;mso-margin-bottom-a=
lt:auto">&nbsp;<o:p></o:p></p>
</div>
</blockquote>
</div>
</div>
<p class=3D"MsoNormal" style=3D"mso-margin-top-alt:auto;mso-margin-bottom-a=
lt:auto">&nbsp;<o:p></o:p></p>
</div>
</div>
</div>
</div>
</div>
<p class=3D"MsoNormal" style=3D"mso-margin-top-alt:auto;mso-margin-bottom-a=
lt:auto">&nbsp;<o:p></o:p></p>
</div>
</div>
</div>
</div>
</div>
</div>
</div>
</div>
</div>
<p class=3D"MsoNormal"><o:p>&nbsp;</o:p></p>
</div>
</div>
</div>
</body>
</html>

--_000_59E470B10C4630419ED717AC79FCF9A948D58DC0BY2PRD0411MB441_--

From leifj@mnt.se  Thu Feb 28 14:23:52 2013
Return-Path: <leifj@mnt.se>
X-Original-To: oauth@ietfa.amsl.com
Delivered-To: oauth@ietfa.amsl.com
Received: from localhost (localhost [127.0.0.1]) by ietfa.amsl.com (Postfix) with ESMTP id 830D321F8BCE for <oauth@ietfa.amsl.com>; Thu, 28 Feb 2013 14:23:52 -0800 (PST)
X-Virus-Scanned: amavisd-new at amsl.com
X-Spam-Flag: NO
X-Spam-Score: -1.734
X-Spam-Level: 
X-Spam-Status: No, score=-1.734 tagged_above=-999 required=5 tests=[AWL=0.000,  BAYES_00=-2.599, FH_HOST_EQ_D_D_D_D=0.765, RDNS_DYNAMIC=0.1]
Received: from mail.ietf.org ([64.170.98.30]) by localhost (ietfa.amsl.com [127.0.0.1]) (amavisd-new, port 10024) with ESMTP id i0d914dos+od for <oauth@ietfa.amsl.com>; Thu, 28 Feb 2013 14:23:52 -0800 (PST)
Received: from mail-la0-x22e.google.com (mail-la0-x22e.google.com [IPv6:2a00:1450:4010:c03::22e]) by ietfa.amsl.com (Postfix) with ESMTP id B952421F8BCD for <oauth@ietf.org>; Thu, 28 Feb 2013 14:23:51 -0800 (PST)
Received: by mail-la0-f46.google.com with SMTP id fq12so2330111lab.33 for <oauth@ietf.org>; Thu, 28 Feb 2013 14:23:48 -0800 (PST)
X-Google-DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=google.com; s=20120113; h=x-received:message-id:date:from:user-agent:mime-version:to:subject :references:in-reply-to:content-type:content-transfer-encoding :x-gm-message-state; bh=0vr4A+BNHFrWCYxH3RLly/DH5TvBag+8zGARx1vrXbE=; b=LmDYmBJe+5QVoAzf1X5rVhgUWtliGc7PowlzrPYXKqwDQclWtqvxz0ZECwKq+3Nki4 XEkbRwelMYjMEcgRuztY9wdoRLIKHUNAsQO94pxGFpzuasH9dae4NJibFciWk0aKo9qf OA9rsfLrzwa4dXsBs1ziu04716clCNBFzmWUpfYPepnAll3AtcU2aPr8AvulkEBHuAt7 GOmePZWrQBbd676nW+UH27xrC2XWZdHO0w4ZIT6oSw13f/hf1QM3AhiOybt0Xu8Cms/3 3bCoFL7Iwhkh082y65Wn9RB70MndIW4BIx63LlGaTYN0uCfYHP8e42PnnUgLl7BYkVQy w6SQ==
X-Received: by 10.152.133.130 with SMTP id pc2mr6937819lab.51.1362090228645; Thu, 28 Feb 2013 14:23:48 -0800 (PST)
Received: from [10.0.0.244] (tb62-102-145-131.cust.teknikbyran.com. [62.102.145.131]) by mx.google.com with ESMTPS id gm20sm5477641lab.7.2013.02.28.14.23.45 (version=TLSv1 cipher=ECDHE-RSA-RC4-SHA bits=128/128); Thu, 28 Feb 2013 14:23:47 -0800 (PST)
Message-ID: <512FD8F0.6080109@mnt.se>
Date: Thu, 28 Feb 2013 23:23:44 +0100
From: Leif Johansson <leifj@mnt.se>
User-Agent: Mozilla/5.0 (X11; Linux x86_64; rv:17.0) Gecko/20130221 Thunderbird/17.0.3
MIME-Version: 1.0
To: oauth@ietf.org
References: <1362079266.8952.YahooMailClassic@web141002.mail.bf1.yahoo.com> <512FCDF0.6010807@gmx.net> <512FD1C5.2070100@oracle.com> <512FD2AC.2000607@gmx.net>
In-Reply-To: <512FD2AC.2000607@gmx.net>
Content-Type: text/plain; charset=ISO-8859-1
Content-Transfer-Encoding: 7bit
X-Gm-Message-State: ALoCoQlrdvjzMjIHligOL/kSIXBYvuDDqEex+tQtuyoE4B2frWEgAwWbxYH7S1R0IQBWhgAOt7v8
Subject: Re: [OAUTH-WG] Fw:  IPR Disclosure: - What to Do with JWT ?
X-BeenThere: oauth@ietf.org
X-Mailman-Version: 2.1.12
Precedence: list
List-Id: OAUTH WG <oauth.ietf.org>
List-Unsubscribe: <https://www.ietf.org/mailman/options/oauth>, <mailto:oauth-request@ietf.org?subject=unsubscribe>
List-Archive: <http://www.ietf.org/mail-archive/web/oauth>
List-Post: <mailto:oauth@ietf.org>
List-Help: <mailto:oauth-request@ietf.org?subject=help>
List-Subscribe: <https://www.ietf.org/mailman/listinfo/oauth>, <mailto:oauth-request@ietf.org?subject=subscribe>
X-List-Received-Date: Thu, 28 Feb 2013 22:23:52 -0000

On 02/28/2013 10:57 PM, Hannes Tschofenig wrote:
> This is certainly a good point. Stating whether certain claims are
> valid or not valid is not a good use of our time and may lead to legal
> problems later on.
>
> So, read through the patents and make your own assessment whether this
> IPRs are a concern for you and whether you want anything in the drafts
> to be changed.
>
good point. thx

From Michael.Jones@microsoft.com  Thu Feb 28 14:54:33 2013
Return-Path: <Michael.Jones@microsoft.com>
X-Original-To: oauth@ietfa.amsl.com
Delivered-To: oauth@ietfa.amsl.com
Received: from localhost (localhost [127.0.0.1]) by ietfa.amsl.com (Postfix) with ESMTP id 0CC0E21F8922 for <oauth@ietfa.amsl.com>; Thu, 28 Feb 2013 14:54:33 -0800 (PST)
X-Virus-Scanned: amavisd-new at amsl.com
X-Spam-Flag: NO
X-Spam-Score: -2.51
X-Spam-Level: 
X-Spam-Status: No, score=-2.51 tagged_above=-999 required=5 tests=[AWL=0.088,  BAYES_00=-2.599, HTML_MESSAGE=0.001]
Received: from mail.ietf.org ([64.170.98.30]) by localhost (ietfa.amsl.com [127.0.0.1]) (amavisd-new, port 10024) with ESMTP id p+V4abcdjk86 for <oauth@ietfa.amsl.com>; Thu, 28 Feb 2013 14:54:27 -0800 (PST)
Received: from na01-by2-obe.outbound.protection.outlook.com (na01-by2-obe.ptr.protection.outlook.com [207.46.100.26]) by ietfa.amsl.com (Postfix) with ESMTP id 3EAE221F886B for <oauth@ietf.org>; Thu, 28 Feb 2013 14:54:26 -0800 (PST)
Received: from BL2FFO11FD005.protection.gbl (10.173.161.201) by BL2FFO11HUB008.protection.gbl (10.173.160.228) with Microsoft SMTP Server (TLS) id 15.0.620.12; Thu, 28 Feb 2013 22:54:23 +0000
Received: from TK5EX14MLTC102.redmond.corp.microsoft.com (131.107.125.37) by BL2FFO11FD005.mail.protection.outlook.com (10.173.161.1) with Microsoft SMTP Server (TLS) id 15.0.620.12 via Frontend Transport; Thu, 28 Feb 2013 22:54:23 +0000
Received: from TK5EX14MBXC283.redmond.corp.microsoft.com ([169.254.2.132]) by TK5EX14MLTC102.redmond.corp.microsoft.com ([157.54.79.180]) with mapi id 14.02.0318.003; Thu, 28 Feb 2013 22:53:54 +0000
From: Mike Jones <Michael.Jones@microsoft.com>
To: Brian Campbell <bcampbell@pingidentity.com>, prateek mishra <prateek.mishra@oracle.com>
Thread-Topic: [OAUTH-WG] JWT - scope claim missing
Thread-Index: AQHOFZ6hIxtkb1+gY0y+b2wB9BjwWJiPcwkAgAAB5wCAAAWJgIAABAMAgAAIM4CAAAN2AIAACPaAgAAGkYCAAAeWAIAAHCmAgAAEbQCAAB/izw==
Date: Thu, 28 Feb 2013 22:53:53 +0000
Message-ID: <4E1F6AAD24975D4BA5B1680429673943674C4DB1@TK5EX14MBXC283.redmond.corp.microsoft.com>
References: <0EC2404F-E3C5-4AD1-88B4-E74AA0394DD9@gmx.net> <C75E4871-E907-4EF7-BAF0-9D1A172D581B@ve7jtb.com> <CA6A6425-D0CE-469F-B51E-9F296DA8041C@oracle.com> <CA+k3eCREgN+6z+U=jjJcPo0nZVR0GWn5zXeecZRO+rg=xd-gZg@mail.gmail.com> <A2375FE9-946F-46B3-9356-0709DD56BD4A@ve7jtb.com> <48FD87D1-4DF4-4289-99B7-40A515F31890@oracle.com> <3E472720-31A4-40A0-AAA4-402CF850831A@ve7jtb.com> <7127843B-D7B0-4AB6-87F1-1604D1EFFA79@oracle.com> <50DA292F-32F0-4266-8401-006AD837B775@ve7jtb.com> <CA+k3eCSyE3cPMh17XuivbUZUtHY=RAtjV1UeCdW6gGFk+gv02A@mail.gmail.com> <512FC18D.1020803@oracle.com>, <CA+k3eCTnbJsdtvA=VJWd0ob+s4qGco4O30M4=crpXb1tizDj9A@mail.gmail.com>
In-Reply-To: <CA+k3eCTnbJsdtvA=VJWd0ob+s4qGco4O30M4=crpXb1tizDj9A@mail.gmail.com>
Accept-Language: en-US
Content-Language: en-US
X-MS-Has-Attach: 
X-MS-TNEF-Correlator: 
Content-Type: multipart/alternative; boundary="_000_4E1F6AAD24975D4BA5B1680429673943674C4DB1TK5EX14MBXC283r_"
MIME-Version: 1.0
X-Forefront-Antispam-Report: CIP:131.107.125.37; CTRY:US; IPV:CAL; IPV:NLI; EFV:NLI; SFV:NSPM; SFS:(24454001)(479174001)(189002)(199002)(51704002)(377424002)(377454001)(56776001)(5343645001)(56816002)(512934001)(33656001)(5343635001)(79102001)(5343655001)(63696002)(50986001)(47976001)(54316002)(51856001)(46102001)(54356001)(4396001)(49866001)(47736001)(53806001)(55846006)(74662001)(65816001)(80022001)(44976002)(16236675001)(16406001)(76482001)(20776003)(47446002)(59766001)(77982001)(74502001)(15202345001)(31966008)(550254004); DIR:OUT; SFP:; SCL:1; SRVR:BL2FFO11HUB008; H:TK5EX14MLTC102.redmond.corp.microsoft.com; RD:InfoDomainNonexistent; MX:1; A:1; LANG:en; 
X-OriginatorOrg: microsoft.onmicrosoft.com
X-Forefront-PRVS: 0771670921
Cc: oauth <oauth@ietf.org>
Subject: Re: [OAUTH-WG] JWT - scope claim missing
X-BeenThere: oauth@ietf.org
X-Mailman-Version: 2.1.12
Precedence: list
List-Id: OAUTH WG <oauth.ietf.org>
List-Unsubscribe: <https://www.ietf.org/mailman/options/oauth>, <mailto:oauth-request@ietf.org?subject=unsubscribe>
List-Archive: <http://www.ietf.org/mail-archive/web/oauth>
List-Post: <mailto:oauth@ietf.org>
List-Help: <mailto:oauth-request@ietf.org?subject=help>
List-Subscribe: <https://www.ietf.org/mailman/listinfo/oauth>, <mailto:oauth-request@ietf.org?subject=subscribe>
X-List-Received-Date: Thu, 28 Feb 2013 22:54:33 -0000

--_000_4E1F6AAD24975D4BA5B1680429673943674C4DB1TK5EX14MBXC283r_
Content-Type: text/plain; charset="iso-8859-1"
Content-Transfer-Encoding: quoted-printable

+1

________________________________
From: Brian Campbell
Sent: 2/28/2013 1:00 PM
To: prateek mishra
Cc: oauth
Subject: Re: [OAUTH-WG] JWT - scope claim missing

Thanks Prateek. I like it and I think wordy might be the way to go here.


On Thu, Feb 28, 2013 at 1:43 PM, prateek mishra <prateek.mishra@oracle.com<=
mailto:prateek.mishra@oracle.com>> wrote:
SAML 2.0 Profile for OAuth 2.0 Client Authentication and Authorization Gran=
ts
JWT Profile for OAuth 2.0 Client Authentication and Authorization Grants
Assertion Framework for OAuth 2.0 <as above>

a bit wordy, but does get the point across IMO

- prateek

I'm not sure anyone really "picked" the titles for the bearer token profile=
s. They just kind of evolved. And evolved in funny ways especially when cli=
ent authn to the AS was added.

You won't hear me argue that the titles are "good" and this is not the firs=
t time there's been confusion about what they actually do. They define new =
grant types and new client authentication methods. They *do not* define an =
access token format or anything else about access tokens. JWT and SAML coul=
d be used for that but that's not what these drafts do.

Suggestions for better title(s) would be more than welcome.

Here's what they are now:

SAML 2.0 Bearer Assertion Profiles for OAuth 2.0
draft-ietf-oauth-saml2-bearer

JSON Web Token (JWT) Bearer Token Profiles for OAuth 2.0
draft-ietf-oauth-jwt-bearer

Assertion Framework for OAuth 2.0
draft-ietf-oauth-assertions

On Thu, Feb 28, 2013 at 11:36 AM, John Bradley <ve7jtb@ve7jtb.com<mailto:ve=
7jtb@ve7jtb.com>> wrote:
Yes the title likely adds to the confusion given that the bearer tokens are=
 not access tokens.

Things as separate from OAuth as the Firefox browerID spec use JWS signed J=
WTs.

The bearer token profiles for OAuth 2 are for OAuth2.

The JSON Web Token (JWT)<http://tools.ietf.org/html/draft-ietf-oauth-json-w=
eb-token-06> spec did not start in OAuth and is not OAuth specific.

A JWT is:

JSON Web Token (JWT)  A string representing a set of claims as a JSON
      object that is encoded in a JWS or JWE, enabling the claims to be
      digitally signed or MACed and/or encrypted.


So OAuth or other profiles may define claims to go in a JWT, but the JWT ne=
eds to itself only define the claims necessary for security processing.

John B.
PS that was a soft ball If you hadn't responded I would have been disappoin=
ted.  I din't pick the title for the bearer token profiles.


On 2013-02-28, at 10:12 AM, Phil Hunt <phil.hunt@oracle.com<mailto:phil.hun=
t@oracle.com>> wrote:








JSON Web Token (JWT) Bearer Token Profiles for OAuth 2.0

Note the title says "for OAuth2"

Sorry. Couldn't resist.

Phil

Sent from my phone.

On 2013-02-28, at 9:40, John Bradley <ve7jtb@ve7jtb.com<mailto:ve7jtb@ve7jt=
b.com>> wrote:

JWT is an assertion( I am probably going to regret using that word).

It is used in openID connect for id_tokens, it is used in OAuth for Asserti=
on grant types and authentication of the client to the token endpoint.
http://tools.ietf.org/html/draft-ietf-oauth-jwt-bearer-04




JSON Web Token (JWT) Bearer Token Profiles for OAuth 2.0

Dosen't define JWT's use for access tokens for the RS.

Bottom line JWT is for more than access tokens.

John B.

On 2013-02-28, at 9:28 AM, Phil Hunt <phil.hunt@oracle.com<mailto:phil.hunt=
@oracle.com>> wrote:

Are you saying jwt is not an access token type?

Phil

Sent from my phone.

On 2013-02-28, at 8:58, John Bradley <ve7jtb@ve7jtb.com<mailto:ve7jtb@ve7jt=
b.com>> wrote:

Yes, defining scope in JWT is the wrong place.   JWT needs to stick to the =
security claims needed to process JWT.

I also don't know how far you get requiring a specific authorization format=
 for JWT, some AS will wan to use a opaque reference, some might want to us=
e a user claim or role claim, others may use scopes,  combining scopes and =
claims is also possible.

Right now it is up to a AS RS pair to agree on how to communicate authoriza=
tion.   I don't want MAC to be more restrictive than bearer when it comes t=
o authorization between AS and RS.

Hannes wanted to know why JWT didn't define scope.  The simple answer is th=
at it is out of scope for JWT itself.   It might be defined in a OAuth acce=
ss token profile for JWT but it should not be specific to MAC.

John B.
On 2013-02-28, at 8:44 AM, Brian Campbell <bcampbell@pingidentity.com<mailt=
o:bcampbell@pingidentity.com>> wrote:

I think John's point was more that scope is something rather specific to an=
 OAuth access token and, while JWT is can be used to represent an access to=
ken, it's not the only application of JWT. The 'standard' claims in JWT are=
 those that are believed (right or wrong) to be widely applicable across di=
fferent applications of JWT. One could argue about it but scope is probably=
 not one of those.

It would probably make sense to try and build a profile of JWT specifically=
 for OAuth access tokens (though I suspect there are some turtles and drago=
ns in there), which might be the appropriate place to define/register a sco=
pe claim.


On Thu, Feb 28, 2013 at 9:24 AM, Phil Hunt <phil.hunt@oracle.com<mailto:phi=
l.hunt@oracle.com>> wrote:
Are you advocating TWO systems? That seems like a bad choice.

I would rather fix scope than go to a two system approach.

Phil

Sent from my phone.

On 2013-02-28, at 8:17, John Bradley <ve7jtb@ve7jtb.com<mailto:ve7jtb@ve7jt=
b.com>> wrote:

> While scope is one method that a AS could communicate authorization to a =
RS, it is not the only or perhaps even the most likely one.
> Using scope requires a relatively tight binding between the RS and AS,  U=
MA uses a different mechanism that describes finer grained operations.
> The AS may include roles, user, or other more abstract claims that the th=
e client may (god help them) pass on to EXCML for processing.
>
> While having a scopes claim is possible, like any other claim it is not p=
art of the JWT core security processing claims, and needs to be defined by =
extension.
>
> John B.
> On 2013-02-28, at 2:29 AM, Hannes Tschofenig <hannes.tschofenig@gmx.net<m=
ailto:hannes.tschofenig@gmx.net>> wrote:
>
>> Hi Mike,
>>
>> when I worked on the MAC specification I noticed that the JWT does not h=
ave a claim for the scope. I believe that this would be needed to allow the=
 resource server to verify whether the scope the authorization server autho=
rized is indeed what the client is asking for.
>>
>> Ciao
>> Hannes
>>
>> _______________________________________________
>> OAuth mailing list
>> OAuth@ietf.org<mailto:OAuth@ietf.org>
>> https://www.ietf.org/mailman/listinfo/oauth
>
> _______________________________________________
> OAuth mailing list
> OAuth@ietf.org<mailto:OAuth@ietf.org>
> https://www.ietf.org/mailman/listinfo/oauth
_______________________________________________
OAuth mailing list
OAuth@ietf.org<mailto:OAuth@ietf.org>
https://www.ietf.org/mailman/listinfo/oauth








_______________________________________________
OAuth mailing list
OAuth@ietf.org<mailto:OAuth@ietf.org>
https://www.ietf.org/mailman/listinfo/oauth




--_000_4E1F6AAD24975D4BA5B1680429673943674C4DB1TK5EX14MBXC283r_
Content-Type: text/html; charset="iso-8859-1"
Content-Transfer-Encoding: quoted-printable

<html>
<head>
<meta http-equiv=3D"Content-Type" content=3D"text/html; charset=3Diso-8859-=
1">
</head>
<body>
<div>
<div style=3D"font-family:Calibri,sans-serif; font-size:11pt">&#43;1<br>
<br>
</div>
</div>
<hr>
<span style=3D"font-family:Tahoma,sans-serif; font-size:10pt; font-weight:b=
old">From:
</span><span style=3D"font-family:Tahoma,sans-serif; font-size:10pt">Brian =
Campbell</span><br>
<span style=3D"font-family:Tahoma,sans-serif; font-size:10pt; font-weight:b=
old">Sent:
</span><span style=3D"font-family:Tahoma,sans-serif; font-size:10pt">2/28/2=
013 1:00 PM</span><br>
<span style=3D"font-family:Tahoma,sans-serif; font-size:10pt; font-weight:b=
old">To:
</span><span style=3D"font-family:Tahoma,sans-serif; font-size:10pt">pratee=
k mishra</span><br>
<span style=3D"font-family:Tahoma,sans-serif; font-size:10pt; font-weight:b=
old">Cc:
</span><span style=3D"font-family:Tahoma,sans-serif; font-size:10pt">oauth<=
/span><br>
<span style=3D"font-family:Tahoma,sans-serif; font-size:10pt; font-weight:b=
old">Subject:
</span><span style=3D"font-family:Tahoma,sans-serif; font-size:10pt">Re: [O=
AUTH-WG] JWT - scope claim missing</span><br>
<br>
<div>
<div dir=3D"ltr">Thanks Prateek. I like it and I think wordy might be the w=
ay to go here.
<br>
</div>
<div class=3D"gmail_extra"><br>
<br>
<div class=3D"gmail_quote">On Thu, Feb 28, 2013 at 1:43 PM, prateek mishra =
<span dir=3D"ltr">
&lt;<a href=3D"mailto:prateek.mishra@oracle.com" target=3D"_blank">prateek.=
mishra@oracle.com</a>&gt;</span> wrote:<br>
<blockquote class=3D"gmail_quote" style=3D"margin:0 0 0 .8ex; border-left:1=
px #ccc solid; padding-left:1ex">
<div bgcolor=3D"#FFFFFF">SAML 2.0 Profile for OAuth 2.0 Client Authenticati=
on and Authorization Grants
<br>
JWT Profile for OAuth 2.0 Client Authentication and Authorization Grants <b=
r>
Assertion Framework for OAuth 2.0 &lt;as above&gt; <br>
<br>
a bit wordy, but does get the point across IMO<span class=3D"HOEnZb"><font =
color=3D"#888888"><br>
<br>
- prateek</font></span>
<div>
<div class=3D"h5"><br>
<blockquote type=3D"cite">
<div dir=3D"ltr">
<div>I'm not sure anyone really &quot;picked&quot; the titles for the beare=
r token profiles. They just kind of evolved. And evolved in funny ways espe=
cially when client authn to the AS was added.
<br>
<br>
</div>
<div>You won't hear me argue that the titles are &quot;good&quot; and this =
is not the first time there's been confusion about what they actually do. T=
hey define new grant types and new client authentication methods. They *do =
not* define an access token format or anything
 else about access tokens. JWT and SAML could be used for that but that's n=
ot what these drafts do.
<br>
<br>
</div>
<div>Suggestions for better title(s) would be more than welcome.<br>
</div>
<div>
<div><br>
</div>
<div>Here's what they are now:<br>
</div>
<div><br>
SAML 2.0 Bearer Assertion Profiles for OAuth 2.0<br>
draft-ietf-oauth-saml2-bearer<br>
<br>
JSON Web Token (JWT) Bearer Token Profiles for OAuth 2.0<br>
draft-ietf-oauth-jwt-bearer<br>
<br>
Assertion Framework for OAuth 2.0<br>
draft-ietf-oauth-assertions<br>
<div class=3D"gmail_extra"><br>
<div class=3D"gmail_quote">On Thu, Feb 28, 2013 at 11:36 AM, John Bradley <=
span dir=3D"ltr">
&lt;<a href=3D"mailto:ve7jtb@ve7jtb.com" target=3D"_blank">ve7jtb@ve7jtb.co=
m</a>&gt;</span> wrote:<br>
<blockquote class=3D"gmail_quote" style=3D"margin:0px 0px 0px 0.8ex; border=
-left:1px solid rgb(204,204,204); padding-left:1ex">
<div style=3D"word-wrap:break-word">Yes the title likely adds to the confus=
ion given that the bearer tokens are not access tokens.
<div><br>
</div>
<div>Things as separate from OAuth as the Firefox browerID spec use JWS sig=
ned JWTs. &nbsp;</div>
<div><br>
</div>
<div>The bearer token profiles for OAuth 2 are for OAuth2.</div>
<div><br>
</div>
<div>The&nbsp;<a href=3D"http://tools.ietf.org/html/draft-ietf-oauth-json-w=
eb-token-06" target=3D"_blank">JSON Web Token (JWT)</a>&nbsp;spec did not s=
tart in OAuth and is not OAuth specific.</div>
<div><br>
</div>
<div>A JWT is:</div>
<div>
<pre style=3D"font-size:1em; margin-top:0px; margin-bottom:0px">JSON Web To=
ken (JWT)  A string representing a set of claims as a JSON
      object that is encoded in a JWS or JWE, enabling the claims to be
      digitally signed or MACed and/or encrypted.
</pre>
<div><br>
</div>
<div>So OAuth or other profiles may define claims to go in a JWT, but the J=
WT needs to itself only define the claims necessary for security processing=
. &nbsp;</div>
<div><br>
</div>
<div>John B.</div>
<div>PS that was a soft ball If you hadn't responded I would have been disa=
ppointed. &nbsp;I din't pick the title for the bearer token profiles.</div>
<div>
<div>
<div><br>
</div>
<div><br>
</div>
<div>
<div>On 2013-02-28, at 10:12 AM, Phil Hunt &lt;<a href=3D"mailto:phil.hunt@=
oracle.com" target=3D"_blank">phil.hunt@oracle.com</a>&gt; wrote:</div>
<br>
<blockquote type=3D"cite">
<div dir=3D"auto">
<div>
<pre style=3D"margin-top:0px; margin-bottom:0px"><font face=3D"Helvetica"><=
span style=3D"white-space:normal">        <span style=3D"display:inline; fo=
nt-weight:bold"><h1 style=3D"display:inline">




JSON Web Token (JWT) Bearer Token Profiles for OAuth 2.0</h1></span></span>=
</font></pre>
<br>
<span>Note the title says &quot;for OAuth2&quot;</span></div>
<div><span><br>
</span></div>
<div><span>Sorry. Couldn't resist.&nbsp;</span></div>
<div><span><br>
</span></div>
<div><span>Phil</span>
<div><br>
</div>
<div>Sent from my phone.</div>
</div>
<div><br>
On 2013-02-28, at 9:40, John Bradley &lt;<a href=3D"mailto:ve7jtb@ve7jtb.co=
m" target=3D"_blank">ve7jtb@ve7jtb.com</a>&gt; wrote:<br>
<br>
</div>
<blockquote type=3D"cite">JWT is an assertion( I am probably going to regre=
t using that word).
<div><br>
</div>
<div>It is used in openID connect for id_tokens, it is used in OAuth for As=
sertion grant types and authentication of the client to the token endpoint.=
</div>
<div><a href=3D"http://tools.ietf.org/html/draft-ietf-oauth-jwt-bearer-04" =
target=3D"_blank">http://tools.ietf.org/html/draft-ietf-oauth-jwt-bearer-04=
</a></div>
<div><br>
</div>
<div>
<pre style=3D"font-size:1em; margin-top:0px; margin-bottom:0px"><span style=
=3D"line-height:0pt; display:inline; font-size:1em; font-weight:bold"><h1 s=
tyle=3D"line-height:0pt; display:inline; font-size:1em">

JSON Web Token (JWT) Bearer Token Profiles for OAuth 2.0</h1></span></pre>
<div><br>
</div>
<div>Dosen't define JWT's use for access tokens for the RS. &nbsp;&nbsp;</d=
iv>
<div><br>
</div>
<div>Bottom line JWT is for more than access tokens.</div>
<div><br>
</div>
<div>John B.</div>
<div><br>
</div>
<div>
<div>On 2013-02-28, at 9:28 AM, Phil Hunt &lt;<a href=3D"mailto:phil.hunt@o=
racle.com" target=3D"_blank">phil.hunt@oracle.com</a>&gt; wrote:</div>
<br>
<blockquote type=3D"cite">
<div dir=3D"auto">
<div>Are you saying jwt is not an access token type?<br>
<br>
Phil
<div><br>
</div>
<div>Sent from my phone.</div>
</div>
<div><br>
On 2013-02-28, at 8:58, John Bradley &lt;<a href=3D"mailto:ve7jtb@ve7jtb.co=
m" target=3D"_blank">ve7jtb@ve7jtb.com</a>&gt; wrote:<br>
<br>
</div>
<blockquote type=3D"cite">Yes, defining scope in JWT is the wrong place. &n=
bsp; JWT needs to stick to the security claims needed to process JWT.
<div><br>
</div>
<div>I also don't know how far you get requiring a specific authorization f=
ormat for JWT, some AS will wan to use a opaque reference, some might want =
to use a user claim or role claim, others may use scopes, &nbsp;combining s=
copes and claims is also possible.</div>
<div><br>
</div>
<div>Right now it is up to a AS RS pair to agree on how to communicate auth=
orization. &nbsp; I don't want MAC to be more restrictive than bearer when =
it comes to authorization between AS and RS.<br>
<div><br>
</div>
<div>Hannes wanted to know why JWT didn't define scope. &nbsp;The simple an=
swer is that it is out of scope for JWT itself. &nbsp; It might be defined =
in a OAuth access token profile for JWT but it should not be specific to MA=
C.</div>
<div><br>
</div>
<div>John B.</div>
<div>
<div>
<div>On 2013-02-28, at 8:44 AM, Brian Campbell &lt;<a href=3D"mailto:bcampb=
ell@pingidentity.com" target=3D"_blank">bcampbell@pingidentity.com</a>&gt; =
wrote:</div>
<br>
<blockquote type=3D"cite">
<div dir=3D"ltr">
<div>I think John's point was more that scope is something rather specific =
to an OAuth access token and, while JWT is can be used to represent an acce=
ss token, it's not the only application of JWT. The 'standard' claims in JW=
T are those that are believed (right
 or wrong) to be widely applicable across different applications of JWT. On=
e could argue about it but scope is probably not one of those.<br>
<br>
</div>
It would probably make sense to try and build a profile of JWT specifically=
 for OAuth access tokens (though I suspect there are some turtles and drago=
ns in there), which might be the appropriate place to define/register a sco=
pe claim.<br>
</div>
<div class=3D"gmail_extra"><br>
<br>
<div class=3D"gmail_quote">On Thu, Feb 28, 2013 at 9:24 AM, Phil Hunt <span=
 dir=3D"ltr">
&lt;<a href=3D"mailto:phil.hunt@oracle.com" target=3D"_blank">phil.hunt@ora=
cle.com</a>&gt;</span> wrote:<br>
<blockquote class=3D"gmail_quote" style=3D"margin:0px 0px 0px 0.8ex; border=
-left:1px solid rgb(204,204,204); padding-left:1ex">
Are you advocating TWO systems? That seems like a bad choice.<br>
<br>
I would rather fix scope than go to a two system approach.<br>
<br>
Phil<br>
<br>
Sent from my phone.<br>
<br>
On 2013-02-28, at 8:17, John Bradley &lt;<a href=3D"mailto:ve7jtb@ve7jtb.co=
m" target=3D"_blank">ve7jtb@ve7jtb.com</a>&gt; wrote:<br>
<br>
&gt; While scope is one method that a AS could communicate authorization to=
 a RS, it is not the only or perhaps even the most likely one.<br>
&gt; Using scope requires a relatively tight binding between the RS and AS,=
 &nbsp;UMA uses a different mechanism that describes finer grained operatio=
ns.<br>
&gt; The AS may include roles, user, or other more abstract claims that the=
 the client may (god help them) pass on to EXCML for processing.<br>
&gt;<br>
&gt; While having a scopes claim is possible, like any other claim it is no=
t part of the JWT core security processing claims, and needs to be defined =
by extension.<br>
&gt;<br>
&gt; John B.<br>
&gt; On 2013-02-28, at 2:29 AM, Hannes Tschofenig &lt;<a href=3D"mailto:han=
nes.tschofenig@gmx.net" target=3D"_blank">hannes.tschofenig@gmx.net</a>&gt;=
 wrote:<br>
&gt;<br>
&gt;&gt; Hi Mike,<br>
&gt;&gt;<br>
&gt;&gt; when I worked on the MAC specification I noticed that the JWT does=
 not have a claim for the scope. I believe that this would be needed to all=
ow the resource server to verify whether the scope the authorization server=
 authorized is indeed what the client
 is asking for.<br>
&gt;&gt;<br>
&gt;&gt; Ciao<br>
&gt;&gt; Hannes<br>
&gt;&gt;<br>
&gt;&gt; _______________________________________________<br>
&gt;&gt; OAuth mailing list<br>
&gt;&gt; <a href=3D"mailto:OAuth@ietf.org" target=3D"_blank">OAuth@ietf.org=
</a><br>
&gt;&gt; <a href=3D"https://www.ietf.org/mailman/listinfo/oauth" target=3D"=
_blank">https://www.ietf.org/mailman/listinfo/oauth</a><br>
&gt;<br>
&gt; _______________________________________________<br>
&gt; OAuth mailing list<br>
&gt; <a href=3D"mailto:OAuth@ietf.org" target=3D"_blank">OAuth@ietf.org</a>=
<br>
&gt; <a href=3D"https://www.ietf.org/mailman/listinfo/oauth" target=3D"_bla=
nk">https://www.ietf.org/mailman/listinfo/oauth</a><br>
_______________________________________________<br>
OAuth mailing list<br>
<a href=3D"mailto:OAuth@ietf.org" target=3D"_blank">OAuth@ietf.org</a><br>
<a href=3D"https://www.ietf.org/mailman/listinfo/oauth" target=3D"_blank">h=
ttps://www.ietf.org/mailman/listinfo/oauth</a><br>
</blockquote>
</div>
<br>
</div>
</blockquote>
</div>
<br>
</div>
</div>
</blockquote>
</div>
</blockquote>
</div>
<br>
</div>
</blockquote>
</div>
</blockquote>
</div>
<br>
</div>
</div>
</div>
</div>
</blockquote>
</div>
<br>
</div>
</div>
</div>
</div>
<br>
<fieldset></fieldset> <br>
<pre>_______________________________________________
OAuth mailing list
<a href=3D"mailto:OAuth@ietf.org" target=3D"_blank">OAuth@ietf.org</a>
<a href=3D"https://www.ietf.org/mailman/listinfo/oauth" target=3D"_blank">h=
ttps://www.ietf.org/mailman/listinfo/oauth</a>
</pre>
</blockquote>
<br>
</div>
</div>
</div>
</blockquote>
</div>
<br>
</div>
</div>
</body>
</html>

--_000_4E1F6AAD24975D4BA5B1680429673943674C4DB1TK5EX14MBXC283r_--

From prateek.mishra@oracle.com  Thu Feb 28 14:56:30 2013
Return-Path: <prateek.mishra@oracle.com>
X-Original-To: oauth@ietfa.amsl.com
Delivered-To: oauth@ietfa.amsl.com
Received: from localhost (localhost [127.0.0.1]) by ietfa.amsl.com (Postfix) with ESMTP id CB98321F8A09 for <oauth@ietfa.amsl.com>; Thu, 28 Feb 2013 14:56:30 -0800 (PST)
X-Virus-Scanned: amavisd-new at amsl.com
X-Spam-Flag: NO
X-Spam-Score: -6.571
X-Spam-Level: 
X-Spam-Status: No, score=-6.571 tagged_above=-999 required=5 tests=[AWL=0.027,  BAYES_00=-2.599, HTML_MESSAGE=0.001, RCVD_IN_DNSWL_MED=-4]
Received: from mail.ietf.org ([64.170.98.30]) by localhost (ietfa.amsl.com [127.0.0.1]) (amavisd-new, port 10024) with ESMTP id SO+TCwlaQwEN for <oauth@ietfa.amsl.com>; Thu, 28 Feb 2013 14:56:30 -0800 (PST)
Received: from userp1040.oracle.com (userp1040.oracle.com [156.151.31.81]) by ietfa.amsl.com (Postfix) with ESMTP id A3FA621F89B5 for <oauth@ietf.org>; Thu, 28 Feb 2013 14:56:29 -0800 (PST)
Received: from acsinet22.oracle.com (acsinet22.oracle.com [141.146.126.238]) by userp1040.oracle.com (Sentrion-MTA-4.3.1/Sentrion-MTA-4.3.1) with ESMTP id r1SMuM1B015382 (version=TLSv1/SSLv3 cipher=DHE-RSA-AES256-SHA bits=256 verify=OK) for <oauth@ietf.org>; Thu, 28 Feb 2013 22:56:23 GMT
Received: from acsmt356.oracle.com (acsmt356.oracle.com [141.146.40.156]) by acsinet22.oracle.com (8.14.4+Sun/8.14.4) with ESMTP id r1SMuMeM029769 (version=TLSv1/SSLv3 cipher=DHE-RSA-AES256-SHA bits=256 verify=NO) for <oauth@ietf.org>; Thu, 28 Feb 2013 22:56:22 GMT
Received: from abhmt119.oracle.com (abhmt119.oracle.com [141.146.116.71]) by acsmt356.oracle.com (8.12.11.20060308/8.12.11) with ESMTP id r1SMuMOf018264 for <oauth@ietf.org>; Thu, 28 Feb 2013 16:56:22 -0600
Received: from [10.152.55.88] (/10.152.55.88) by default (Oracle Beehive Gateway v4.0) with ESMTP ; Thu, 28 Feb 2013 14:56:21 -0800
Message-ID: <512FE091.9030508@oracle.com>
Date: Thu, 28 Feb 2013 17:56:17 -0500
From: prateek mishra <prateek.mishra@oracle.com>
Organization: Oracle Corporation
User-Agent: Mozilla/5.0 (Windows NT 5.1; rv:17.0) Gecko/20130107 Thunderbird/17.0.2
MIME-Version: 1.0
To: "oauth@ietf.org" <oauth@ietf.org>
References: <1361830944.13340.YahooMailNeo@web31812.mail.mud.yahoo.com> <E4A6D91D-2BC8-4F2E-9B1C-D1362A0E3608@oracle.com> <1361831644.50183.YahooMailNeo@web31801.mail.mud.yahoo.com> <1361832133.97884.YahooMailNeo@web31816.mail.mud.yahoo.com> <140EEABC-2787-4D9A-A1C5-6C973FED5BC8@adobe.com>
In-Reply-To: <140EEABC-2787-4D9A-A1C5-6C973FED5BC8@adobe.com>
Content-Type: multipart/alternative; boundary="------------090104060409020309040405"
X-Source-IP: acsinet22.oracle.com [141.146.126.238]
Subject: Re: [OAUTH-WG] OAuth2 attack surface....
X-BeenThere: oauth@ietf.org
X-Mailman-Version: 2.1.12
Precedence: list
List-Id: OAUTH WG <oauth.ietf.org>
List-Unsubscribe: <https://www.ietf.org/mailman/options/oauth>, <mailto:oauth-request@ietf.org?subject=unsubscribe>
List-Archive: <http://www.ietf.org/mail-archive/web/oauth>
List-Post: <mailto:oauth@ietf.org>
List-Help: <mailto:oauth-request@ietf.org?subject=help>
List-Subscribe: <https://www.ietf.org/mailman/listinfo/oauth>, <mailto:oauth-request@ietf.org?subject=subscribe>
X-List-Received-Date: Thu, 28 Feb 2013 22:56:31 -0000

This is a multi-part message in MIME format.
--------------090104060409020309040405
Content-Type: text/plain; charset=ISO-8859-1; format=flowed
Content-Transfer-Encoding: 7bit

Characteristics of both these attacks -

1) Use of implicit flow (access token passed on the URL)
2) changes to redirect uri (specification does allow some flexibility here)
3) applications with long-lived access tokens with broad scope (in one 
case only)

- prateek
> And a different one (still exploiting redirection and still 
> implementation mistake) 
> http://www.nirgoldshlager.com/2013/02/how-i-hacked-facebook-oauth-to-get-full.html 
>
>
> Regards
>
> Antonio
>
> On Feb 25, 2013, at 11:42 PM, William Mills wrote:
>
>>
>>
>> DOH!!! 
>> http://homakov.blogspot.co.uk/2013/02/hacking-facebook-with-oauth2-and-chrome.html
>>
>> ------------------------------------------------------------------------
>> *From:* Phil Hunt <phil.hunt@oracle.com <mailto:phil.hunt@oracle.com>>
>> *To:* William Mills <wmills_92105@yahoo.com 
>> <mailto:wmills_92105@yahoo.com>>
>> *Sent:* Monday, February 25, 2013 2:28 PM
>> *Subject:* Re: [OAUTH-WG] OAuth2 attack surface....
>>
>> Whats the link?
>>
>> Phil
>>
>> Sent from my phone.
>>
>> On 2013-02-25, at 14:22, William Mills <wmills_92105@yahoo.com 
>> <mailto:wmills_92105@yahoo.com>> wrote:
>>
>>> I think this is worth a read, I don't have time to dive into this :(
>>> _______________________________________________
>>> OAuth mailing list
>>> OAuth@ietf.org <mailto:OAuth@ietf.org>
>>> https://www.ietf.org/mailman/listinfo/oauth
>>
>>
>>
>>
>> _______________________________________________
>> OAuth mailing list
>> OAuth@ietf.org <mailto:OAuth@ietf.org>
>> https://www.ietf.org/mailman/listinfo/oauth
>
>
>
> _______________________________________________
> OAuth mailing list
> OAuth@ietf.org
> https://www.ietf.org/mailman/listinfo/oauth


--------------090104060409020309040405
Content-Type: text/html; charset=ISO-8859-1
Content-Transfer-Encoding: 7bit

<html>
  <head>
    <meta content="text/html; charset=ISO-8859-1"
      http-equiv="Content-Type">
  </head>
  <body bgcolor="#FFFFFF" text="#000000">
    Characteristics of both these attacks -<br>
    <br>
    1) Use of implicit flow (access token passed on the URL)<br>
    2) changes to redirect uri (specification does allow some
    flexibility here)<br>
    3) applications with long-lived access tokens with broad scope (in
    one case only)<br>
    <br>
    - prateek<br>
    <blockquote
      cite="mid:140EEABC-2787-4D9A-A1C5-6C973FED5BC8@adobe.com"
      type="cite">And a different one (still exploiting redirection and
      still implementation mistake)&nbsp;<a moz-do-not-send="true"
href="http://www.nirgoldshlager.com/2013/02/how-i-hacked-facebook-oauth-to-get-full.html">http://www.nirgoldshlager.com/2013/02/how-i-hacked-facebook-oauth-to-get-full.html</a>
      <div><br>
      </div>
      <div>Regards</div>
      <div><br>
      </div>
      <div>Antonio</div>
      <div><br>
      </div>
      <div>
        <div>
          <div>On Feb 25, 2013, at 11:42 PM, William Mills wrote:</div>
          <br class="Apple-interchange-newline">
          <blockquote type="cite">
            <div>
              <div style="color:#000; background-color:#fff;
                font-family:Courier New, courier, monaco, monospace,
                sans-serif;font-size:12pt">
                <div><br>
                </div>
                <div style="font-family: 'Courier New', courier, monaco,
                  monospace, sans-serif; font-size: 12pt;">
                  <div style="font-family: 'times new roman', 'new
                    york', times, serif; font-size: 12pt;">
                    <div dir="ltr"> </div>
                    <br>
                    <div id="yiv721280462">
                      <div>
                        <div style="color: rgb(0, 0, 0);
                          background-color: rgb(255, 255, 255);
                          font-family: 'Courier New', courier, monaco,
                          monospace, sans-serif; font-size: 12pt;">
                          <div><span>DOH!!! &nbsp;</span><a
                              moz-do-not-send="true" rel="nofollow"
                              target="_blank"
href="http://homakov.blogspot.co.uk/2013/02/hacking-facebook-with-oauth2-and-chrome.html"
                              style="font-size:12pt;">http://homakov.blogspot.co.uk/2013/02/hacking-facebook-with-oauth2-and-chrome.html</a></div>
                          <div><br>
                          </div>
                          <div style="font-family: 'Courier New',
                            courier, monaco, monospace, sans-serif;
                            font-size: 12pt;">
                            <div style="font-family: 'times new roman',
                              'new york', times, serif; font-size:
                              12pt;">
                              <div dir="ltr"> <font face="Arial"
                                  size="2">
                                  <hr size="1"> <b><span
                                      style="font-weight:bold;">From:</span></b>
                                  Phil Hunt &lt;<a
                                    moz-do-not-send="true"
                                    href="mailto:phil.hunt@oracle.com">phil.hunt@oracle.com</a>&gt;<br>
                                  <b><span style="font-weight:bold;">To:</span></b>
                                  William Mills &lt;<a
                                    moz-do-not-send="true"
                                    href="mailto:wmills_92105@yahoo.com">wmills_92105@yahoo.com</a>&gt;
                                  <br>
                                  <b><span style="font-weight:bold;">Sent:</span></b>
                                  Monday, February 25, 2013 2:28 PM<br>
                                  <b><span style="font-weight:bold;">Subject:</span></b>
                                  Re: [OAUTH-WG] OAuth2 attack
                                  surface....<br>
                                </font> </div>
                              <br>
                              <div id="yiv721280462">
                                <div>
                                  <div>Whats the link?<br>
                                    <br>
                                    Phil
                                    <div><br>
                                    </div>
                                    <div>Sent from my phone.</div>
                                  </div>
                                  <div><br>
                                    On 2013-02-25, at 14:22, William
                                    Mills &lt;<a moz-do-not-send="true"
                                      rel="nofollow"
                                      ymailto="mailto:wmills_92105@yahoo.com"
                                      target="_blank"
                                      href="mailto:wmills_92105@yahoo.com">wmills_92105@yahoo.com</a>&gt;
                                    wrote:<br>
                                    <br>
                                  </div>
                                  <blockquote type="cite">
                                    <div>
                                      <div style="color: rgb(0, 0, 0);
                                        background-color: rgb(255, 255,
                                        255); font-family: 'Courier
                                        New', courier, monaco,
                                        monospace, sans-serif;
                                        font-size: 12pt;">
                                        <div>I think this is worth a
                                          read, I don't have time to
                                          dive into this :(</div>
                                      </div>
                                    </div>
                                  </blockquote>
                                  <blockquote type="cite">
                                    <div><span>_______________________________________________</span><br>
                                      <span>OAuth mailing list</span><br>
                                      <span><a moz-do-not-send="true"
                                          rel="nofollow"
                                          ymailto="mailto:OAuth@ietf.org"
                                          target="_blank"
                                          href="mailto:OAuth@ietf.org">OAuth@ietf.org</a></span><br>
                                      <span><a moz-do-not-send="true"
                                          rel="nofollow" target="_blank"
href="https://www.ietf.org/mailman/listinfo/oauth">https://www.ietf.org/mailman/listinfo/oauth</a></span><br>
                                    </div>
                                  </blockquote>
                                </div>
                              </div>
                              <br>
                              <br>
                            </div>
                          </div>
                        </div>
                      </div>
                    </div>
                    <br>
                    <br>
                  </div>
                </div>
              </div>
            </div>
            _______________________________________________<br>
            OAuth mailing list<br>
            <a moz-do-not-send="true" href="mailto:OAuth@ietf.org">OAuth@ietf.org</a><br>
            <a class="moz-txt-link-freetext" href="https://www.ietf.org/mailman/listinfo/oauth">https://www.ietf.org/mailman/listinfo/oauth</a><br>
          </blockquote>
        </div>
        <br>
      </div>
      <br>
      <fieldset class="mimeAttachmentHeader"></fieldset>
      <br>
      <pre wrap="">_______________________________________________
OAuth mailing list
<a class="moz-txt-link-abbreviated" href="mailto:OAuth@ietf.org">OAuth@ietf.org</a>
<a class="moz-txt-link-freetext" href="https://www.ietf.org/mailman/listinfo/oauth">https://www.ietf.org/mailman/listinfo/oauth</a>
</pre>
    </blockquote>
    <br>
  </body>
</html>

--------------090104060409020309040405--

From oleg_gryb@yahoo.com  Thu Feb 28 16:26:20 2013
Return-Path: <oleg_gryb@yahoo.com>
X-Original-To: oauth@ietfa.amsl.com
Delivered-To: oauth@ietfa.amsl.com
Received: from localhost (localhost [127.0.0.1]) by ietfa.amsl.com (Postfix) with ESMTP id A4F4C21F8A3F for <oauth@ietfa.amsl.com>; Thu, 28 Feb 2013 16:26:20 -0800 (PST)
X-Virus-Scanned: amavisd-new at amsl.com
X-Spam-Flag: NO
X-Spam-Score: -2.598
X-Spam-Level: 
X-Spam-Status: No, score=-2.598 tagged_above=-999 required=5 tests=[BAYES_00=-2.599, HTML_MESSAGE=0.001]
Received: from mail.ietf.org ([64.170.98.30]) by localhost (ietfa.amsl.com [127.0.0.1]) (amavisd-new, port 10024) with ESMTP id L5Ah1yFYnXL0 for <oauth@ietfa.amsl.com>; Thu, 28 Feb 2013 16:26:18 -0800 (PST)
Received: from nm16-vm0.bullet.mail.bf1.yahoo.com (nm16-vm0.bullet.mail.bf1.yahoo.com [98.139.212.253]) by ietfa.amsl.com (Postfix) with SMTP id 44FE021F85D7 for <oauth@ietf.org>; Thu, 28 Feb 2013 16:26:18 -0800 (PST)
Received: from [98.139.212.147] by nm16.bullet.mail.bf1.yahoo.com with NNFMP; 01 Mar 2013 00:26:17 -0000
Received: from [98.139.212.224] by tm4.bullet.mail.bf1.yahoo.com with NNFMP; 01 Mar 2013 00:26:17 -0000
Received: from [127.0.0.1] by omp1033.mail.bf1.yahoo.com with NNFMP; 01 Mar 2013 00:26:17 -0000
X-Yahoo-Newman-Property: ymail-3
X-Yahoo-Newman-Id: 680698.12576.bm@omp1033.mail.bf1.yahoo.com
Received: (qmail 41683 invoked by uid 60001); 1 Mar 2013 00:26:17 -0000
DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=yahoo.com; s=s1024; t=1362097577; bh=GLygl1IbgL5zBidyyPm5xHK04RlvBal060C3Daq2Aew=; h=X-YMail-OSG:Received:X-Rocket-MIMEInfo:X-Mailer:Message-ID:Date:From:Reply-To:Subject:To:Cc:In-Reply-To:MIME-Version:Content-Type; b=4TS81MDXrAHXdd0gy2Z8SngqW5qUtZXy0GmjgcWVE9yxY/4aR/bRwQXxH+YjwAkMEbo83vpkoTVENtN3LuS0BPTlgygBjhMLykm74PE0i7WNErSx553PJpwbKNOajA0luJQsrYfREZOtZh5z3lr9uePJuhfx9OzS8avmv2guXtI=
DomainKey-Signature: a=rsa-sha1; q=dns; c=nofws; s=s1024; d=yahoo.com; h=X-YMail-OSG:Received:X-Rocket-MIMEInfo:X-Mailer:Message-ID:Date:From:Reply-To:Subject:To:Cc:In-Reply-To:MIME-Version:Content-Type; b=Fr/7gzXC9TD3VNvwUOUHUKSt9zFZl9A8m0WOds3x9uuP6tiNy7ImsbdgJK8qg/U+pm0AOfL/WH3Fl9abZ4gDOyrhfF3XCguqhvL2CkXLDyRdI1TwUOi4ByCTGAJiXPbYVy/dZ4sPa3zhuTpXgL9E/GiuYDq6zqix65QrpdaqMgg=;
X-YMail-OSG: ckskuSkVM1lfxUjMOH.Q6NOoLhFajMT1HXzRwBmEZ4goR9D Ukp769tcl8tJTITEW2f_WvGaykrC4Cqu1MN3EjWf6BBKqiYnADVnczyTgNoH bwml0fv88BLA5fJaGD82PEwQCpx96G5isZxJ8yxvOA_I0MoIQc7Yrn2samsd I3F1c5S1LT4I.yk4XmpcWYgdD61U2gRchPUbO9bWDhUV718sF1PHetddRm2B e9R.aplkcKTD5yqjWr4tbPVACrqHc1h2JgjXOFAXf9JVoWcwQwS9q52oxoB3 4fz7AoUVHz_DBYmSiZjo80ANd9dCTGxdEjvUlDXNgto.7Y7YlumvkFJgEpow 5xqN6Txoo.KD4kn8_TwvhoFh2Tg.1RbOCj_X7vYNLHJWLoNeU8zhTUbwysL8 3S14rYVkk2ImsB.KLxMrM7VWE_NnrlYXJWoKaCBFdj5Yp0iw2igp177ij84M 8rlQNNWxMqBD6QBr9fEsrKx697l9NMXsc86TvRfzLk9_u19PetQ8e5kDA5uJ 3AvVTnjunwT9BbIPuzR4PiVZ1e3bcx4BzfKryMqqUDbPBK0tmW4y7vWhNSFs tkfHuZLxW.VnhrA06RdReFrkwdWxeIGAN_4ciUEiLih5RJoIW03yMSdaZg.G k3GpVOjOSGTBRXZUnZIbvDEnVVUfMG2y6.Z15b.n5JQOr
Received: from [199.16.140.28] by web141006.mail.bf1.yahoo.com via HTTP; Thu, 28 Feb 2013 16:26:17 PST
X-Rocket-MIMEInfo: 001.001, UHJhdGVlaywNCg0KSXQncyBub3Qgc28gbXVjaCBhICJwYXRlbnQgY2xhaW0iIGRpc2N1c3Npb24gYXMgYSBzdWdnZXN0aW9uIHRvIGRvIHNvbWV0aGluZyBkaWZmZXJlbnQgdGhhbiBKV1QgaWYgaXQncyByZWFsbHkgcHJvdGVjdGVkIGJ5IHNvbWVib2R5J3MgcGF0ZW50cy4gSXQncyBhIHB1YmxpYyBzdGFuZGFyZCBhZnRlciBhbGwgYW5kIGl0J3MgaW4gdGhlIGludGVyZXN0cyBvZiBldmVyeW9uZSB0byBrZWVwIGl0IHRoaXMgd2F5LsKgIA0KDQotLS0gT24gVGh1LCAyLzI4LzEzLCBwcmF0ZWVrIG1pc2hyYSABMAEBAQE-
X-Mailer: YahooMailClassic/15.1.4 YahooMailWebService/0.8.135.514
Message-ID: <1362097577.15771.YahooMailClassic@web141006.mail.bf1.yahoo.com>
Date: Thu, 28 Feb 2013 16:26:17 -0800 (PST)
From: Oleg Gryb <oleg_gryb@yahoo.com>
To: Hannes Tschofenig <hannes.tschofenig@gmx.net>, prateek mishra <prateek.mishra@oracle.com>
In-Reply-To: <512FD1C5.2070100@oracle.com>
MIME-Version: 1.0
Content-Type: multipart/alternative; boundary="1694620066-184547543-1362097577=:15771"
Cc: oleg@gryb.info, oauth@ietf.org
Subject: Re: [OAUTH-WG] Fw:  IPR Disclosure: - What to Do with JWT ?
X-BeenThere: oauth@ietf.org
X-Mailman-Version: 2.1.12
Precedence: list
Reply-To: oleg@gryb.info
List-Id: OAUTH WG <oauth.ietf.org>
List-Unsubscribe: <https://www.ietf.org/mailman/options/oauth>, <mailto:oauth-request@ietf.org?subject=unsubscribe>
List-Archive: <http://www.ietf.org/mail-archive/web/oauth>
List-Post: <mailto:oauth@ietf.org>
List-Help: <mailto:oauth-request@ietf.org?subject=help>
List-Subscribe: <https://www.ietf.org/mailman/listinfo/oauth>, <mailto:oauth-request@ietf.org?subject=subscribe>
X-List-Received-Date: Fri, 01 Mar 2013 00:26:20 -0000

--1694620066-184547543-1362097577=:15771
Content-Type: text/plain; charset=iso-8859-1
Content-Transfer-Encoding: quoted-printable

Prateek,

It's not so much a "patent claim" discussion as a suggestion to do somethin=
g different than JWT if it's really protected by somebody's patents. It's a=
 public standard after all and it's in the interests of everyone to keep it=
 this way.=A0=20

--- On Thu, 2/28/13, prateek mishra <prateek.mishra@oracle.com> wrote:

From: prateek mishra <prateek.mishra@oracle.com>
Subject: Re: [OAUTH-WG] Fw:  IPR Disclosure: - What to Do with JWT ?
To: "Hannes Tschofenig" <hannes.tschofenig@gmx.net>
Cc: oleg@gryb.info, oauth@ietf.org
Date: Thursday, February 28, 2013, 4:53 PM

Two points=A0 -

1) I request that this mailing list NOT be used for any substantive=20
discussion of patent claims and so on. This will create difficulties for=20
many participants and
I dont believe is within the charter of this effort.

2) I would encourage interested parties to review the following=20
document, which may be relevant to this discussion

http://www.w3.org/2011/xmlsec-pag/

- prateek

> Hi Oleg,
>
> my personal experience with Certicom's IPR disclosures is that they=20
> focus on Elliptic Curve Cryptography. There were several IPR=20
> disclosures on documents in the JOSE WG and some of them contain ECC=20
> algorithms.
>
> The JWT does not list an ECC algorithm but the referenced documents do.
>
> Having said that the two cited IPRs seem to be:
> http://www.google.com/patents/US6704870
> http://www.google.com/patents/US7215773
>
> Take a look at it and make your assessment whether there is anything=20
> we can change.
>
> Ciao
> Hannes
>
>
> On 02/28/2013 09:21 PM, Oleg Gryb wrote:
>> Dear OAuth WG and Chairs,
>>
>> Can somebody please comment the Certicom's disclosure below? If the
>> purpose of this disclosure is to inform us that JWT can be potentially a
>> subject of royalties and other possible legal actions, the value of
>> adopting JWT in the scope of OAuth 2.0 IETF standard would definitely
>> diminish and if this is the case shouldn't we consider replacing it with
>> something similar, but different, which would not be a subject of the
>> future possible litigation?
>>
>> I'm not a lawyer and might not understand the statement below correctly,
>> so please let me know if/where I'm wrong. Please keep in mind also that
>> the popularity of JWT is growing fast along with the implementations, so
>> we need to do something quickly.
>>
>> Thanks,
>> Oleg.
>>
>>
>> --- On *Wed, 2/27/13, IETF Secretariat /<ietf-ipr@ietf.org>/* wrote:
>>
>>
>>=A0 =A0=A0=A0From: IETF Secretariat <ietf-ipr@ietf.org>
>>=A0 =A0=A0=A0Subject: [OAUTH-WG] IPR Disclosure: Certicom Corporation's S=
tatement
>>=A0 =A0=A0=A0about IPR related to draft-ietf-oauth-json-web-token-06 (2)
>>=A0 =A0=A0=A0To: mbj@microsoft.com, ve7jtb@ve7jtb.com, n-sakimura@nri.co.=
jp
>>=A0 =A0=A0=A0Cc: derek@ihtfp.com, oauth@ietf.org, ipr-announce@ietf.org
>>=A0 =A0=A0=A0Date: Wednesday, February 27, 2013, 4:16 PM
>>
>>
>>=A0 =A0=A0=A0Dear Michael Jones, John Bradley, Nat Sakimura:
>>
>>=A0 =A0=A0=A0An IPR disclosure that pertains to your Internet-Draft entit=
led
>>=A0 =A0=A0=A0"JSON Web Token
>>=A0 =A0=A0=A0(JWT)" (draft-ietf-oauth-json-web-token) was submitted to th=
e IETF
>>=A0 =A0=A0=A0Secretariat
>>=A0 =A0=A0=A0on 2013-02-20 and has been posted on the "IETF Page of Intel=
lectual
>>=A0 =A0=A0=A0Property
>>=A0 =A0=A0=A0Rights Disclosures" (https://datatracker.ietf.org/ipr/1968/)=
. The
>>=A0 =A0=A0=A0title of the
>>=A0 =A0=A0=A0IPR disclosure is "Certicom Corporation's Statement about IP=
R
>>=A0 =A0=A0=A0related to draft-
>>=A0 =A0=A0=A0ietf-oauth-json-web-token-06 (2)."");
>>
>>=A0 =A0=A0=A0The IETF Secretariat
>>
>>=A0 =A0=A0=A0_______________________________________________
>>=A0 =A0=A0=A0OAuth mailing list
>>=A0 =A0=A0=A0OAuth@ietf.org </mc/compose?to=3DOAuth@ietf.org>
>>=A0 =A0=A0=A0https://www.ietf.org/mailman/listinfo/oauth
>>
>>
>>
>> _______________________________________________
>> OAuth mailing list
>> OAuth@ietf.org
>> https://www.ietf.org/mailman/listinfo/oauth
>>
> _______________________________________________
> OAuth mailing list
> OAuth@ietf.org
> https://www.ietf.org/mailman/listinfo/oauth

_______________________________________________
OAuth mailing list
OAuth@ietf.org
https://www.ietf.org/mailman/listinfo/oauth

--1694620066-184547543-1362097577=:15771
Content-Type: text/html; charset=iso-8859-1
Content-Transfer-Encoding: quoted-printable

<table cellspacing=3D"0" cellpadding=3D"0" border=3D"0" ><tr><td valign=3D"=
top" style=3D"font: inherit;">Prateek,<br><br>It's not so much a "patent cl=
aim" discussion as a suggestion to do something different than JWT if it's =
really protected by somebody's patents. It's a public standard after all an=
d it's in the interests of everyone to keep it this way.&nbsp; <br><br>--- =
On <b>Thu, 2/28/13, prateek mishra <i>&lt;prateek.mishra@oracle.com&gt;</i>=
</b> wrote:<br><blockquote style=3D"border-left: 2px solid rgb(16, 16, 255)=
; margin-left: 5px; padding-left: 5px;"><br>From: prateek mishra &lt;pratee=
k.mishra@oracle.com&gt;<br>Subject: Re: [OAUTH-WG] Fw:  IPR Disclosure: - W=
hat to Do with JWT ?<br>To: "Hannes Tschofenig" &lt;hannes.tschofenig@gmx.n=
et&gt;<br>Cc: oleg@gryb.info, oauth@ietf.org<br>Date: Thursday, February 28=
, 2013, 4:53 PM<br><br><div class=3D"plainMail">Two points&nbsp; -<br><br>1=
) I request that this mailing list NOT be used for any substantive <br>disc=
ussion
 of patent claims and so on. This will create difficulties for <br>many par=
ticipants and<br>I dont believe is within the charter of this effort.<br><b=
r>2) I would encourage interested parties to review the following <br>docum=
ent, which may be relevant to this discussion<br><br><a href=3D"http://www.=
w3.org/2011/xmlsec-pag/" target=3D"_blank">http://www.w3.org/2011/xmlsec-pa=
g/</a><br><br>- prateek<br><br>&gt; Hi Oleg,<br>&gt;<br>&gt; my personal ex=
perience with Certicom's IPR disclosures is that they <br>&gt; focus on Ell=
iptic Curve Cryptography. There were several IPR <br>&gt; disclosures on do=
cuments in the JOSE WG and some of them contain ECC <br>&gt; algorithms.<br=
>&gt;<br>&gt; The JWT does not list an ECC algorithm but the referenced doc=
uments do.<br>&gt;<br>&gt; Having said that the two cited IPRs seem to be:<=
br>&gt; <a href=3D"http://www.google.com/patents/US6704870" target=3D"_blan=
k">http://www.google.com/patents/US6704870</a><br>&gt; <a
 href=3D"http://www.google.com/patents/US7215773" target=3D"_blank">http://=
www.google.com/patents/US7215773</a><br>&gt;<br>&gt; Take a look at it and =
make your assessment whether there is anything <br>&gt; we can change.<br>&=
gt;<br>&gt; Ciao<br>&gt; Hannes<br>&gt;<br>&gt;<br>&gt; On 02/28/2013 09:21=
 PM, Oleg Gryb wrote:<br>&gt;&gt; Dear OAuth WG and Chairs,<br>&gt;&gt;<br>=
&gt;&gt; Can somebody please comment the Certicom's disclosure below? If th=
e<br>&gt;&gt; purpose of this disclosure is to inform us that JWT can be po=
tentially a<br>&gt;&gt; subject of royalties and other possible legal actio=
ns, the value of<br>&gt;&gt; adopting JWT in the scope of OAuth 2.0 IETF st=
andard would definitely<br>&gt;&gt; diminish and if this is the case should=
n't we consider replacing it with<br>&gt;&gt; something similar, but differ=
ent, which would not be a subject of the<br>&gt;&gt; future possible litiga=
tion?<br>&gt;&gt;<br>&gt;&gt; I'm not a lawyer and might not understand
 the statement below correctly,<br>&gt;&gt; so please let me know if/where =
I'm wrong. Please keep in mind also that<br>&gt;&gt; the popularity of JWT =
is growing fast along with the implementations, so<br>&gt;&gt; we need to d=
o something quickly.<br>&gt;&gt;<br>&gt;&gt; Thanks,<br>&gt;&gt; Oleg.<br>&=
gt;&gt;<br>&gt;&gt;<br>&gt;&gt; --- On *Wed, 2/27/13, IETF Secretariat /&lt=
;<a ymailto=3D"mailto:ietf-ipr@ietf.org" href=3D"/mc/compose?to=3Dietf-ipr@=
ietf.org">ietf-ipr@ietf.org</a>&gt;/* wrote:<br>&gt;&gt;<br>&gt;&gt;<br>&gt=
;&gt;&nbsp; &nbsp;&nbsp;&nbsp;From: IETF Secretariat &lt;<a ymailto=3D"mail=
to:ietf-ipr@ietf.org" href=3D"/mc/compose?to=3Dietf-ipr@ietf.org">ietf-ipr@=
ietf.org</a>&gt;<br>&gt;&gt;&nbsp; &nbsp;&nbsp;&nbsp;Subject: [OAUTH-WG] IP=
R Disclosure: Certicom Corporation's Statement<br>&gt;&gt;&nbsp; &nbsp;&nbs=
p;&nbsp;about IPR related to draft-ietf-oauth-json-web-token-06 (2)<br>&gt;=
&gt;&nbsp; &nbsp;&nbsp;&nbsp;To: <a ymailto=3D"mailto:mbj@microsoft.com"
 href=3D"/mc/compose?to=3Dmbj@microsoft.com">mbj@microsoft.com</a>, <a ymai=
lto=3D"mailto:ve7jtb@ve7jtb.com" href=3D"/mc/compose?to=3Dve7jtb@ve7jtb.com=
">ve7jtb@ve7jtb.com</a>, <a ymailto=3D"mailto:n-sakimura@nri.co.jp" href=3D=
"/mc/compose?to=3Dn-sakimura@nri.co.jp">n-sakimura@nri.co.jp</a><br>&gt;&gt=
;&nbsp; &nbsp;&nbsp;&nbsp;Cc: <a ymailto=3D"mailto:derek@ihtfp.com" href=3D=
"/mc/compose?to=3Dderek@ihtfp.com">derek@ihtfp.com</a>, <a ymailto=3D"mailt=
o:oauth@ietf.org" href=3D"/mc/compose?to=3Doauth@ietf.org">oauth@ietf.org</=
a>, <a ymailto=3D"mailto:ipr-announce@ietf.org" href=3D"/mc/compose?to=3Dip=
r-announce@ietf.org">ipr-announce@ietf.org</a><br>&gt;&gt;&nbsp; &nbsp;&nbs=
p;&nbsp;Date: Wednesday, February 27, 2013, 4:16 PM<br>&gt;&gt;<br>&gt;&gt;=
<br>&gt;&gt;&nbsp; &nbsp;&nbsp;&nbsp;Dear Michael Jones, John Bradley, Nat =
Sakimura:<br>&gt;&gt;<br>&gt;&gt;&nbsp; &nbsp;&nbsp;&nbsp;An IPR disclosure=
 that pertains to your Internet-Draft entitled<br>&gt;&gt;&nbsp; &nbsp;&nbs=
p;&nbsp;"JSON Web
 Token<br>&gt;&gt;&nbsp; &nbsp;&nbsp;&nbsp;(JWT)" (draft-ietf-oauth-json-we=
b-token) was submitted to the IETF<br>&gt;&gt;&nbsp; &nbsp;&nbsp;&nbsp;Secr=
etariat<br>&gt;&gt;&nbsp; &nbsp;&nbsp;&nbsp;on 2013-02-20 and has been post=
ed on the "IETF Page of Intellectual<br>&gt;&gt;&nbsp; &nbsp;&nbsp;&nbsp;Pr=
operty<br>&gt;&gt;&nbsp; &nbsp;&nbsp;&nbsp;Rights Disclosures" (<a href=3D"=
https://datatracker.ietf.org/ipr/1968/" target=3D"_blank">https://datatrack=
er.ietf.org/ipr/1968/</a>). The<br>&gt;&gt;&nbsp; &nbsp;&nbsp;&nbsp;title o=
f the<br>&gt;&gt;&nbsp; &nbsp;&nbsp;&nbsp;IPR disclosure is "Certicom Corpo=
ration's Statement about IPR<br>&gt;&gt;&nbsp; &nbsp;&nbsp;&nbsp;related to=
 draft-<br>&gt;&gt;&nbsp; &nbsp;&nbsp;&nbsp;ietf-oauth-json-web-token-06 (2=
)."");<br>&gt;&gt;<br>&gt;&gt;&nbsp; &nbsp;&nbsp;&nbsp;The IETF Secretariat=
<br>&gt;&gt;<br>&gt;&gt;&nbsp; &nbsp;&nbsp;&nbsp;__________________________=
_____________________<br>&gt;&gt;&nbsp; &nbsp;&nbsp;&nbsp;OAuth mailing
 list<br>&gt;&gt;&nbsp; &nbsp;&nbsp;&nbsp;<a ymailto=3D"mailto:OAuth@ietf.o=
rg" href=3D"/mc/compose?to=3DOAuth@ietf.org">OAuth@ietf.org</a> &lt;/mc/com=
pose?to=3D<a ymailto=3D"mailto:OAuth@ietf.org" href=3D"/mc/compose?to=3DOAu=
th@ietf.org">OAuth@ietf.org</a>&gt;<br>&gt;&gt;&nbsp; &nbsp;&nbsp;&nbsp;<a =
href=3D"https://www.ietf.org/mailman/listinfo/oauth" target=3D"_blank">http=
s://www.ietf.org/mailman/listinfo/oauth</a><br>&gt;&gt;<br>&gt;&gt;<br>&gt;=
&gt;<br>&gt;&gt; _______________________________________________<br>&gt;&gt=
; OAuth mailing list<br>&gt;&gt; <a ymailto=3D"mailto:OAuth@ietf.org" href=
=3D"/mc/compose?to=3DOAuth@ietf.org">OAuth@ietf.org</a><br>&gt;&gt; <a href=
=3D"https://www.ietf.org/mailman/listinfo/oauth" target=3D"_blank">https://=
www.ietf.org/mailman/listinfo/oauth</a><br>&gt;&gt;<br>&gt; _______________=
________________________________<br>&gt; OAuth mailing list<br>&gt; <a ymai=
lto=3D"mailto:OAuth@ietf.org" href=3D"/mc/compose?to=3DOAuth@ietf.org">OAut=
h@ietf.org</a><br>&gt; <a
 href=3D"https://www.ietf.org/mailman/listinfo/oauth" target=3D"_blank">htt=
ps://www.ietf.org/mailman/listinfo/oauth</a><br><br>_______________________=
________________________<br>OAuth mailing list<br><a ymailto=3D"mailto:OAut=
h@ietf.org" href=3D"/mc/compose?to=3DOAuth@ietf.org">OAuth@ietf.org</a><br>=
<a href=3D"https://www.ietf.org/mailman/listinfo/oauth" target=3D"_blank">h=
ttps://www.ietf.org/mailman/listinfo/oauth</a><br></div></blockquote></td><=
/tr></table>
--1694620066-184547543-1362097577=:15771--

From oleg_gryb@yahoo.com  Thu Feb 28 17:45:51 2013
Return-Path: <oleg_gryb@yahoo.com>
X-Original-To: oauth@ietfa.amsl.com
Delivered-To: oauth@ietfa.amsl.com
Received: from localhost (localhost [127.0.0.1]) by ietfa.amsl.com (Postfix) with ESMTP id 349B421F8824 for <oauth@ietfa.amsl.com>; Thu, 28 Feb 2013 17:45:51 -0800 (PST)
X-Virus-Scanned: amavisd-new at amsl.com
X-Spam-Flag: NO
X-Spam-Score: -2.598
X-Spam-Level: 
X-Spam-Status: No, score=-2.598 tagged_above=-999 required=5 tests=[BAYES_00=-2.599, HTML_MESSAGE=0.001]
Received: from mail.ietf.org ([64.170.98.30]) by localhost (ietfa.amsl.com [127.0.0.1]) (amavisd-new, port 10024) with ESMTP id 2iuw6m0hQFpM for <oauth@ietfa.amsl.com>; Thu, 28 Feb 2013 17:45:50 -0800 (PST)
Received: from nm22.bullet.mail.bf1.yahoo.com (nm22.bullet.mail.bf1.yahoo.com [98.139.212.181]) by ietfa.amsl.com (Postfix) with ESMTP id E0A9D21F8802 for <oauth@ietf.org>; Thu, 28 Feb 2013 17:45:49 -0800 (PST)
Received: from [98.139.212.153] by nm22.bullet.mail.bf1.yahoo.com with NNFMP; 01 Mar 2013 01:45:49 -0000
Received: from [98.139.212.233] by tm10.bullet.mail.bf1.yahoo.com with NNFMP; 01 Mar 2013 01:45:49 -0000
Received: from [127.0.0.1] by omp1042.mail.bf1.yahoo.com with NNFMP; 01 Mar 2013 01:45:49 -0000
X-Yahoo-Newman-Property: ymail-3
X-Yahoo-Newman-Id: 242381.11219.bm@omp1042.mail.bf1.yahoo.com
Received: (qmail 44557 invoked by uid 60001); 1 Mar 2013 01:45:49 -0000
DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=yahoo.com; s=s1024; t=1362102349; bh=b6IrXova/1HYfpj5ortLy+lD6RaLOmUR+IARX079lCM=; h=X-YMail-OSG:Received:X-Rocket-MIMEInfo:X-Mailer:Message-ID:Date:From:Reply-To:Subject:To:In-Reply-To:MIME-Version:Content-Type; b=tNO6DPiA0XeqLRxdy8ejPZwqDWgghJHw6m7xkZTvkjhZNwyowDmQMvhJ1M3YOpfWo3+WjP1j+pr+HDsfcruAZylgzumRapejks6RobbtvjzEf015/PID98QIqgwwDLwf7EsTAO2GiHBSq1HGpDIyuIWq0SN3Ju8fugzhv+bCw4Y=
DomainKey-Signature: a=rsa-sha1; q=dns; c=nofws; s=s1024; d=yahoo.com; h=X-YMail-OSG:Received:X-Rocket-MIMEInfo:X-Mailer:Message-ID:Date:From:Reply-To:Subject:To:In-Reply-To:MIME-Version:Content-Type; b=2/9BnU7hhqzXMnKlp/iFfOIiMqhl7nh3GoHPxVXuUOBBA25zUTyxxKp3pKKziEAY4XslTo5EMFiBpwZ3VYadIF4nFCZDXnXX4iKss8lY5s3kU7Ac+w0UhdHWZ+va6RlpRETJD3MUmiVxSEstzmXCoNiq8IyRC42YRtVBpWtzC4I=;
X-YMail-OSG: nEb0DIMVM1k9hjo4GlPQwVtDQ6M10IeiN8FhsvZZ9EQkK_k pwEUD8nXEZp5pkvOCEpoZnMq.cgRRKCa9iL5dP29.sdrA107Db6ulGTvg9MG 8AhLWlpirelwA7Mee9_Dj19vN2UP2RO8FMv_R9APSMbPswOdBnbU84x3v6t3 HiTPsWnFVTG_8tqqxyN924M9L2OqrPrGyK_nerUulewViUwNcKdXM7yIejhK 55agan4wcIFLO5jUv4BLLsFa0VUxaYfuVILotbDcEIHkTEGg52dhpgmqnG0C XJklJzVxOOY3Q2XrYn6EXQ5SmoWbv0qkWis6mU..W50yHn4j4mSVwtOeIlh8 yII3q8MsT2b7iH8YTR2gwdghD80pN0.0nWsuBcXEmR5fNqgBQq3m3YZMK5La KU7CN_FyGHPX5Z0vs9z3aeGrOiapjxmwGTaOloS8gGbZeJSFzvYo2c8WKW6X a2x7s8VquAu3bZwHjHdH.utgSeUUmjtN6CwdDItIIYhFyVLKyrZ5y0shS6oS 4tl34fnx1Xx7SihmycI0MNGtggrfpQ0Uth24jC0uKDt2jUXIMbNn6Dq7hQLf rDdRDiAZ69IyhJ2lEwNbUAM9e4NPiIkVrXxrHQXm0_4tQ1tJ9T30hsS3y8zs dVpMBO2aQ.NdLxRnygxj_Nh50eDHEjiu3oLA4xgp91aAgGSXrDdkd_ulHHNp YbHBjglO_2kOoLpgtcjaRxOyEMUwg9ObRePNeLP3iFt31YhyCSyifKabDtdE klp97dhJneiiCTzZsn_oc3vVvlDeCnvBwLSE1VxaMZ6qteb6mvaepUbaAjxS JpeGRX35q5nJTd7_CoSQU
Received: from [199.16.140.28] by web141001.mail.bf1.yahoo.com via HTTP; Thu, 28 Feb 2013 17:45:48 PST
X-Rocket-MIMEInfo: 001.001, SSBkb24ndCBsaWtlIHRoYXQgImltcGxpY2l0IGZsb3ciIG9yIGZvcm1lciB1c2VyLWFnZW50IG11Y2ggYW5kIHdyb3RlIGFib3V0IGl0IDIgeWVhcnMgYWdvLCBidXQgdGhhdCBhdHRhY2sgaXMgcmF0aGVyIHJlbGF0ZWQgdG8gaW1wbGVtZW50YXRpb24gYnVncywgbm90IHRvIHByb3RvY29sIGl0c2VsZi4gQSByb290IGNhdXNlIC0gYSBidWcgaW4gcmVkaXJlY3QgVVJMIHZlcmlmaWNhdGlvbiAocHJvYmFibHnCoCBhIHJlZ2V4cCBmbGF3KS4NCg0KRW5mb3JjaW5nIHRva2VuJ3MgbGlmZSB0aW1lIGF0IGEgcHIBMAEBAQE-
X-Mailer: YahooMailClassic/15.1.4 YahooMailWebService/0.8.135.514
Message-ID: <1362102348.20747.YahooMailClassic@web141001.mail.bf1.yahoo.com>
Date: Thu, 28 Feb 2013 17:45:48 -0800 (PST)
From: Oleg Gryb <oleg_gryb@yahoo.com>
To: "oauth@ietf.org" <oauth@ietf.org>, prateek mishra <prateek.mishra@oracle.com>
In-Reply-To: <512FE091.9030508@oracle.com>
MIME-Version: 1.0
Content-Type: multipart/alternative; boundary="1278998794-1153535670-1362102348=:20747"
Subject: Re: [OAUTH-WG] OAuth2 attack surface....
X-BeenThere: oauth@ietf.org
X-Mailman-Version: 2.1.12
Precedence: list
Reply-To: oleg@gryb.info
List-Id: OAUTH WG <oauth.ietf.org>
List-Unsubscribe: <https://www.ietf.org/mailman/options/oauth>, <mailto:oauth-request@ietf.org?subject=unsubscribe>
List-Archive: <http://www.ietf.org/mail-archive/web/oauth>
List-Post: <mailto:oauth@ietf.org>
List-Help: <mailto:oauth-request@ietf.org?subject=help>
List-Subscribe: <https://www.ietf.org/mailman/listinfo/oauth>, <mailto:oauth-request@ietf.org?subject=subscribe>
X-List-Received-Date: Fri, 01 Mar 2013 01:45:51 -0000

--1278998794-1153535670-1362102348=:20747
Content-Type: text/plain; charset=iso-8859-1
Content-Transfer-Encoding: quoted-printable

I don't like that "implicit flow" or former user-agent much and wrote about=
 it 2 years ago, but that attack is rather related to implementation bugs, =
not to protocol itself. A root cause - a bug in redirect URL verification (=
probably=A0 a regexp flaw).

Enforcing token's life time at a protocol level doesn't make too much sense=
 either, because it should depend on sensitivity of protected data.=20

The same is true about the scope.

I think, the latter two issues have been already reflected in the Torsten's=
 TM.

--- On Thu, 2/28/13, prateek mishra <prateek.mishra@oracle.com> wrote:

From: prateek mishra <prateek.mishra@oracle.com>
Subject: Re: [OAUTH-WG] OAuth2 attack surface....
To: "oauth@ietf.org" <oauth@ietf.org>
Date: Thursday, February 28, 2013, 5:56 PM

=0A  =0A=0A    =0A  =0A  =0A    Characteristics of both these attacks -
=0A   =20
=0A    1) Use of implicit flow (access token passed on the URL)
=0A    2) changes to redirect uri (specification does allow some=0A    flex=
ibility here)
=0A    3) applications with long-lived access tokens with broad scope (in=
=0A    one case only)
=0A   =20
=0A    - prateek
=0A    And a different one (still exploiting redirection and=0A      still =
implementation mistake)=A0http://www.nirgoldshlager.com/2013/02/how-i-hacke=
d-facebook-oauth-to-get-full.html=0A     =20
=0A      =0A      Regards=0A     =20
=0A      =0A      Antonio=0A     =20
=0A      =0A      =0A        =0A          On Feb 25, 2013, at 11:42 PM, Wil=
liam Mills wrote:=0A         =20
=0A          =0A            =0A              =0A               =20
=0A                =0A                =0A                  =0A             =
        =0A                   =20
=0A                    =0A                      =0A                        =
=0A                          DOH!!! =A0http://homakov.blogspot.co.uk/2013/0=
2/hacking-facebook-with-oauth2-and-chrome.html=0A                         =
=20
=0A                          =0A                          =0A              =
              =0A                               =0A                        =
           From:=0A                                  Phil Hunt <phil.hunt@o=
racle.com>
=0A                                  To:=0A                                =
  William Mills <wmills_92105@yahoo.com>=0A                                =
 =20
=0A                                  Sent:=0A                              =
    Monday, February 25, 2013 2:28 PM
=0A                                  Subject:=0A                           =
       Re: [OAUTH-WG] OAuth2 attack=0A                                  sur=
face....
=0A                                 =0A                             =20
=0A                              =0A                                =0A    =
                              Whats the link?
=0A                                   =20
=0A                                    Phil=0A                             =
      =20
=0A                                    =0A                                 =
   Sent from my phone.=0A                                  =0A             =
                    =20
=0A                                    On 2013-02-25, at 14:22, William=0A =
                                   Mills <wmills_92105@yahoo.com>=0A       =
                             wrote:
=0A                                   =20
=0A                                  =0A                                  =
=0A                                    =0A                                 =
     =0A                                        I think this is worth a=0A =
                                         read, I don't have time to=0A     =
                                     dive into this :(=0A                  =
                    =0A                                    =0A             =
                     =0A                                  =0A              =
                      _______________________________________________
=0A                                      OAuth mailing list
=0A                                      OAuth@ietf.org
=0A                                      https://www.ietf.org/mailman/listi=
nfo/oauth
=0A                                    =0A                                 =
 =0A                                =0A                              =0A   =
                          =20
=0A                             =20
=0A                            =0A                          =0A            =
            =0A                      =0A                    =0A            =
       =20
=0A                   =20
=0A                  =0A                =0A              =0A            =0A=
            _______________________________________________
=0A            OAuth mailing list
=0A            OAuth@ietf.org
=0A            https://www.ietf.org/mailman/listinfo/oauth
=0A          =0A        =0A       =20
=0A      =0A     =20
=0A      =0A     =20
=0A      _______________________________________________=0AOAuth mailing li=
st=0AOAuth@ietf.org=0Ahttps://www.ietf.org/mailman/listinfo/oauth=0A=0A    =
=0A   =20
=0A  =0A=0A
-----Inline Attachment Follows-----

_______________________________________________
OAuth mailing list
OAuth@ietf.org
https://www.ietf.org/mailman/listinfo/oauth

--1278998794-1153535670-1362102348=:20747
Content-Type: text/html; charset=iso-8859-1
Content-Transfer-Encoding: quoted-printable

<table cellspacing=3D"0" cellpadding=3D"0" border=3D"0" ><tr><td valign=3D"=
top" style=3D"font: inherit;">I don't like that "implicit flow" or former u=
ser-agent much and wrote about it 2 years ago, but that attack is rather re=
lated to implementation bugs, not to protocol itself. A root cause - a bug =
in redirect URL verification (probably&nbsp; a regexp flaw).<br><br>Enforci=
ng token's life time at a protocol level doesn't make too much sense either=
, because it should depend on sensitivity of protected data. <br><br>The sa=
me is true about the scope.<br><br>I think, the latter two issues have been=
 already reflected in the Torsten's TM.<br><div><br></div>--- On <b>Thu, 2/=
28/13, prateek mishra <i>&lt;prateek.mishra@oracle.com&gt;</i></b> wrote:<b=
r><blockquote style=3D"border-left: 2px solid rgb(16, 16, 255); margin-left=
: 5px; padding-left: 5px;"><br>From: prateek mishra &lt;prateek.mishra@orac=
le.com&gt;<br>Subject: Re: [OAUTH-WG] OAuth2 attack surface....<br>To:
 "oauth@ietf.org" &lt;oauth@ietf.org&gt;<br>Date: Thursday, February 28, 20=
13, 5:56 PM<br><br><div id=3D"yiv2141692096">=0A  =0A=0A    =0A  =0A  <div>=
=0A    Characteristics of both these attacks -<br>=0A    <br>=0A    1) Use =
of implicit flow (access token passed on the URL)<br>=0A    2) changes to r=
edirect uri (specification does allow some=0A    flexibility here)<br>=0A  =
  3) applications with long-lived access tokens with broad scope (in=0A    =
one case only)<br>=0A    <br>=0A    - prateek<br>=0A    <blockquote type=3D=
"cite">And a different one (still exploiting redirection and=0A      still =
implementation mistake)&nbsp;<a rel=3D"nofollow" target=3D"_blank" href=3D"=
http://www.nirgoldshlager.com/2013/02/how-i-hacked-facebook-oauth-to-get-fu=
ll.html">http://www.nirgoldshlager.com/2013/02/how-i-hacked-facebook-oauth-=
to-get-full.html</a>=0A      <div><br>=0A      </div>=0A      <div>Regards<=
/div>=0A      <div><br>=0A      </div>=0A      <div>Antonio</div>=0A      <=
div><br>=0A      </div>=0A      <div>=0A        <div>=0A          <div>On F=
eb 25, 2013, at 11:42 PM, William Mills wrote:</div>=0A          <br class=
=3D"yiv2141692096Apple-interchange-newline">=0A          <blockquote type=
=3D"cite">=0A            <div>=0A              <div style=3D"color:#000;bac=
kground-color:#fff;font-family:Courier New, courier, monaco, monospace, san=
s-serif;font-size:12pt;">=0A                <div><br>=0A                </d=
iv>=0A                <div style=3D"font-family:'Courier New', courier, mon=
aco, monospace, sans-serif;font-size:12pt;">=0A                  <div style=
=3D"font-family:'times new roman', 'new=0A                    york', times,=
 serif;font-size:12pt;">=0A                    <div dir=3D"ltr"> </div>=0A =
                   <br>=0A                    <div id=3D"yiv2141692096">=0A=
                      <div>=0A                        <div style=3D"color:r=
gb(0, 0, 0);background-color:rgb(255, 255, 255);font-family:'Courier New', =
courier, monaco, monospace, sans-serif;font-size:12pt;">=0A                =
          <div><span>DOH!!! &nbsp;</span><a rel=3D"nofollow" target=3D"_bla=
nk" href=3D"http://homakov.blogspot.co.uk/2013/02/hacking-facebook-with-oau=
th2-and-chrome.html" style=3D"font-size:12pt;">http://homakov.blogspot.co.u=
k/2013/02/hacking-facebook-with-oauth2-and-chrome.html</a></div>=0A        =
                  <div><br>=0A                          </div>=0A          =
                <div style=3D"font-family:'Courier New', courier, monaco, m=
onospace, sans-serif;font-size:12pt;">=0A                            <div s=
tyle=3D"font-family:'times new roman', 'new york', times, serif;=0Afont-siz=
e:12pt;">=0A                              <div dir=3D"ltr"> <font face=3D"A=
rial" size=3D"2">=0A                                  <hr size=3D"1"> <b><s=
pan style=3D"font-weight:bold;">From:</span></b>=0A                        =
          Phil Hunt &lt;<a rel=3D"nofollow" ymailto=3D"mailto:phil.hunt@ora=
cle.com" target=3D"_blank" href=3D"/mc/compose?to=3Dphil.hunt@oracle.com">p=
hil.hunt@oracle.com</a>&gt;<br>=0A                                  <b><spa=
n style=3D"font-weight:bold;">To:</span></b>=0A                            =
      William Mills &lt;<a rel=3D"nofollow" ymailto=3D"mailto:wmills_92105@=
yahoo.com" target=3D"_blank" href=3D"/mc/compose?to=3Dwmills_92105@yahoo.co=
m">wmills_92105@yahoo.com</a>&gt;=0A                                  <br>=
=0A                                  <b><span style=3D"font-weight:bold;">S=
ent:</span></b>=0A                                  Monday, February 25, 20=
13 2:28 PM<br>=0A                                  <b><span style=3D"font-w=
eight:bold;">Subject:</span></b>=0A                                  Re: [O=
AUTH-WG] OAuth2 attack=0A                                  surface....<br>=
=0A                                </font> </div>=0A                       =
       <br>=0A                              <div id=3D"yiv2141692096">=0A  =
                              <div>=0A                                  <di=
v>Whats the link?<br>=0A                                    <br>=0A        =
                            Phil=0A                                    <div=
><br>=0A                                    </div>=0A                      =
              <div>Sent from my phone.</div>=0A                            =
      </div>=0A                                  <div><br>=0A              =
                      On 2013-02-25, at 14:22, William=0A                  =
                  Mills &lt;<a rel=3D"nofollow" ymailto=3D"mailto:wmills_92=
105@yahoo.com" target=3D"_blank" href=3D"/mc/compose?to=3Dwmills_92105@yaho=
o.com">wmills_92105@yahoo.com</a>&gt;=0A                                   =
 wrote:<br>=0A                                    <br>=0A                  =
                </div>=0A                                  <blockquote type=
=3D"cite">=0A                                    <div>=0A                  =
                    <div style=3D"color:rgb(0, 0, 0);background-color:rgb(2=
55, 255,=0A                                        255);font-family:'Courie=
r=0A                                        New', courier, monaco, monospac=
e, sans-serif;font-size:12pt;">=0A                                        <=
div>I think this is worth a=0A                                          rea=
d, I don't have time to=0A                                          dive in=
to this :(</div>=0A                                      </div>=0A         =
                           </div>=0A                                  </blo=
ckquote>=0A                                  <blockquote type=3D"cite">=0A =
                                   <div><span>_____________________________=
__________________</span><br>=0A                                      <span=
>OAuth mailing list</span><br>=0A                                      <spa=
n><a rel=3D"nofollow" ymailto=3D"mailto:OAuth@ietf.org" target=3D"_blank" h=
ref=3D"/mc/compose?to=3DOAuth@ietf.org">OAuth@ietf.org</a></span><br>=0A   =
                                   <span><a rel=3D"nofollow" target=3D"_bla=
nk" href=3D"https://www.ietf.org/mailman/listinfo/oauth">https://www.ietf.o=
rg/mailman/listinfo/oauth</a></span><br>=0A                                =
    </div>=0A                                  </blockquote>=0A            =
                    </div>=0A                              </div>=0A       =
                       <br>=0A                              <br>=0A        =
                    </div>=0A                          </div>=0A           =
             </div>=0A                      </div>=0A                    </=
div>=0A                    <br>=0A                    <br>=0A              =
    </div>=0A                </div>=0A              </div>=0A            </=
div>=0A            _______________________________________________<br>=0A  =
          OAuth mailing list<br>=0A            <a rel=3D"nofollow" ymailto=
=3D"mailto:OAuth@ietf.org" target=3D"_blank" href=3D"/mc/compose?to=3DOAuth=
@ietf.org">OAuth@ietf.org</a><br>=0A            <a rel=3D"nofollow" class=
=3D"yiv2141692096moz-txt-link-freetext" target=3D"_blank" href=3D"https://w=
ww.ietf.org/mailman/listinfo/oauth">https://www.ietf.org/mailman/listinfo/o=
auth</a><br>=0A          </blockquote>=0A        </div>=0A        <br>=0A  =
    </div>=0A      <br>=0A      <fieldset class=3D"yiv2141692096mimeAttachm=
entHeader"></fieldset>=0A      <br>=0A      <pre>__________________________=
_____________________=0AOAuth mailing list=0A<a rel=3D"nofollow" class=3D"y=
iv2141692096moz-txt-link-abbreviated" ymailto=3D"mailto:OAuth@ietf.org" tar=
get=3D"_blank" href=3D"/mc/compose?to=3DOAuth@ietf.org">OAuth@ietf.org</a>=
=0A<a rel=3D"nofollow" class=3D"yiv2141692096moz-txt-link-freetext" target=
=3D"_blank" href=3D"https://www.ietf.org/mailman/listinfo/oauth">https://ww=
w.ietf.org/mailman/listinfo/oauth</a>=0A</pre>=0A    </blockquote>=0A    <b=
r>=0A  </div>=0A=0A</div><br>-----Inline Attachment Follows-----<br><br><di=
v class=3D"plainMail">_______________________________________________<br>OA=
uth mailing list<br><a ymailto=3D"mailto:OAuth@ietf.org" href=3D"/mc/compos=
e?to=3DOAuth@ietf.org">OAuth@ietf.org</a><br><a href=3D"https://www.ietf.or=
g/mailman/listinfo/oauth" target=3D"_blank">https://www.ietf.org/mailman/li=
stinfo/oauth</a><br></div></blockquote></td></tr></table>
--1278998794-1153535670-1362102348=:20747--

From Michael.Jones@microsoft.com  Thu Feb 28 18:34:09 2013
Return-Path: <Michael.Jones@microsoft.com>
X-Original-To: oauth@ietfa.amsl.com
Delivered-To: oauth@ietfa.amsl.com
Received: from localhost (localhost [127.0.0.1]) by ietfa.amsl.com (Postfix) with ESMTP id 4F12021F884F for <oauth@ietfa.amsl.com>; Thu, 28 Feb 2013 18:34:09 -0800 (PST)
X-Virus-Scanned: amavisd-new at amsl.com
X-Spam-Flag: NO
X-Spam-Score: -2.587
X-Spam-Level: 
X-Spam-Status: No, score=-2.587 tagged_above=-999 required=5 tests=[AWL=0.012,  BAYES_00=-2.599]
Received: from mail.ietf.org ([64.170.98.30]) by localhost (ietfa.amsl.com [127.0.0.1]) (amavisd-new, port 10024) with ESMTP id SIHMlX6DsWya for <oauth@ietfa.amsl.com>; Thu, 28 Feb 2013 18:34:08 -0800 (PST)
Received: from na01-bl2-obe.outbound.protection.outlook.com (mail-bl2lp0206.outbound.protection.outlook.com [207.46.163.206]) by ietfa.amsl.com (Postfix) with ESMTP id 4081921F8858 for <oauth@ietf.org>; Thu, 28 Feb 2013 18:34:08 -0800 (PST)
Received: from BY2FFO11FD006.protection.gbl (10.1.15.201) by BY2FFO11HUB039.protection.gbl (10.1.14.122) with Microsoft SMTP Server (TLS) id 15.0.620.12; Fri, 1 Mar 2013 02:34:05 +0000
Received: from TK5EX14MLTC102.redmond.corp.microsoft.com (131.107.125.37) by BY2FFO11FD006.mail.protection.outlook.com (10.1.14.127) with Microsoft SMTP Server (TLS) id 15.0.620.12 via Frontend Transport; Fri, 1 Mar 2013 02:34:05 +0000
Received: from TK5EX14MBXC283.redmond.corp.microsoft.com ([169.254.2.132]) by TK5EX14MLTC102.redmond.corp.microsoft.com ([157.54.79.180]) with mapi id 14.02.0318.003; Fri, 1 Mar 2013 02:33:34 +0000
From: Mike Jones <Michael.Jones@microsoft.com>
To: prateek mishra <prateek.mishra@oracle.com>, Hannes Tschofenig <hannes.tschofenig@gmx.net>
Thread-Topic: [OAUTH-WG] Fw:  IPR Disclosure: - What to Do with JWT ?
Thread-Index: AQHOFejVUFJvFi9ZK06BAjjJMvlNTZiPy5oAgAAEkoCAAE2soA==
Date: Fri, 1 Mar 2013 02:33:33 +0000
Message-ID: <4E1F6AAD24975D4BA5B1680429673943674C7198@TK5EX14MBXC283.redmond.corp.microsoft.com>
References: <1362079266.8952.YahooMailClassic@web141002.mail.bf1.yahoo.com> <512FCDF0.6010807@gmx.net> <512FD1C5.2070100@oracle.com>
In-Reply-To: <512FD1C5.2070100@oracle.com>
Accept-Language: en-US
Content-Language: en-US
X-MS-Has-Attach: 
X-MS-TNEF-Correlator: 
x-originating-ip: [157.54.51.36]
Content-Type: text/plain; charset="us-ascii"
Content-Transfer-Encoding: quoted-printable
MIME-Version: 1.0
X-Forefront-Antispam-Report: CIP:131.107.125.37; CTRY:US; IPV:CAL; IPV:NLI; EFV:NLI; SFV:NSPM; SFS:(164054002)(13464002)(189002)(479174001)(24454001)(199002)(51704002)(377424002)(377454001)(56816002)(76482001)(54356001)(15202345001)(23726001)(47736001)(20776003)(33656001)(54316002)(77982001)(5343655001)(46406002)(44976002)(47976001)(5343635001)(74662001)(4396001)(63696002)(47776003)(55846006)(16406001)(50466001)(79102001)(65816001)(66066001)(50986001)(47446002)(74502001)(46102001)(80022001)(51856001)(53806001)(56776001)(31966008)(49866001)(59766001)(16940595002); DIR:OUT; SFP:; SCL:1; SRVR:BY2FFO11HUB039; H:TK5EX14MLTC102.redmond.corp.microsoft.com; RD:InfoDomainNonexistent; MX:1; A:1; LANG:en; 
X-OriginatorOrg: microsoft.onmicrosoft.com
X-Forefront-PRVS: 0772E5DAD5
Cc: "oleg@gryb.info" <oleg@gryb.info>, "oauth@ietf.org" <oauth@ietf.org>
Subject: Re: [OAUTH-WG] Fw:  IPR Disclosure: - What to Do with JWT ?
X-BeenThere: oauth@ietf.org
X-Mailman-Version: 2.1.12
Precedence: list
List-Id: OAUTH WG <oauth.ietf.org>
List-Unsubscribe: <https://www.ietf.org/mailman/options/oauth>, <mailto:oauth-request@ietf.org?subject=unsubscribe>
List-Archive: <http://www.ietf.org/mail-archive/web/oauth>
List-Post: <mailto:oauth@ietf.org>
List-Help: <mailto:oauth-request@ietf.org?subject=help>
List-Subscribe: <https://www.ietf.org/mailman/listinfo/oauth>, <mailto:oauth-request@ietf.org?subject=subscribe>
X-List-Received-Date: Fri, 01 Mar 2013 02:34:09 -0000

With the caveat that I have not read the patent disclosures, I will add tha=
t if they pertain to Elliptic Curve Cryptography, RFC 6090 is likely releva=
nt - especially http://tools.ietf.org/html/rfc6090#section-7.1 on ECDH and =
http://tools.ietf.org/html/rfc6090#section-7.2 on ECDSA.

				-- Mike

-----Original Message-----
From: oauth-bounces@ietf.org [mailto:oauth-bounces@ietf.org] On Behalf Of p=
rateek mishra
Sent: Thursday, February 28, 2013 1:53 PM
To: Hannes Tschofenig
Cc: oleg@gryb.info; oauth@ietf.org
Subject: Re: [OAUTH-WG] Fw: IPR Disclosure: - What to Do with JWT ?

Two points  -

1) I request that this mailing list NOT be used for any substantive discuss=
ion of patent claims and so on. This will create difficulties for many part=
icipants and I dont believe is within the charter of this effort.

2) I would encourage interested parties to review the following document, w=
hich may be relevant to this discussion

http://www.w3.org/2011/xmlsec-pag/

- prateek

> Hi Oleg,
>
> my personal experience with Certicom's IPR disclosures is that they=20
> focus on Elliptic Curve Cryptography. There were several IPR=20
> disclosures on documents in the JOSE WG and some of them contain ECC=20
> algorithms.
>
> The JWT does not list an ECC algorithm but the referenced documents do.
>
> Having said that the two cited IPRs seem to be:
> http://www.google.com/patents/US6704870
> http://www.google.com/patents/US7215773
>
> Take a look at it and make your assessment whether there is anything=20
> we can change.
>
> Ciao
> Hannes
>
>
> On 02/28/2013 09:21 PM, Oleg Gryb wrote:
>> Dear OAuth WG and Chairs,
>>
>> Can somebody please comment the Certicom's disclosure below? If the=20
>> purpose of this disclosure is to inform us that JWT can be=20
>> potentially a subject of royalties and other possible legal actions,=20
>> the value of adopting JWT in the scope of OAuth 2.0 IETF standard=20
>> would definitely diminish and if this is the case shouldn't we=20
>> consider replacing it with something similar, but different, which=20
>> would not be a subject of the future possible litigation?
>>
>> I'm not a lawyer and might not understand the statement below=20
>> correctly, so please let me know if/where I'm wrong. Please keep in=20
>> mind also that the popularity of JWT is growing fast along with the=20
>> implementations, so we need to do something quickly.
>>
>> Thanks,
>> Oleg.
>>
>>
>> --- On *Wed, 2/27/13, IETF Secretariat /<ietf-ipr@ietf.org>/* wrote:
>>
>>
>>     From: IETF Secretariat <ietf-ipr@ietf.org>
>>     Subject: [OAUTH-WG] IPR Disclosure: Certicom Corporation's Statement
>>     about IPR related to draft-ietf-oauth-json-web-token-06 (2)
>>     To: mbj@microsoft.com, ve7jtb@ve7jtb.com, n-sakimura@nri.co.jp
>>     Cc: derek@ihtfp.com, oauth@ietf.org, ipr-announce@ietf.org
>>     Date: Wednesday, February 27, 2013, 4:16 PM
>>
>>
>>     Dear Michael Jones, John Bradley, Nat Sakimura:
>>
>>     An IPR disclosure that pertains to your Internet-Draft entitled
>>     "JSON Web Token
>>     (JWT)" (draft-ietf-oauth-json-web-token) was submitted to the IETF
>>     Secretariat
>>     on 2013-02-20 and has been posted on the "IETF Page of Intellectual
>>     Property
>>     Rights Disclosures" (https://datatracker.ietf.org/ipr/1968/). The
>>     title of the
>>     IPR disclosure is "Certicom Corporation's Statement about IPR
>>     related to draft-
>>     ietf-oauth-json-web-token-06 (2)."");
>>
>>     The IETF Secretariat
>>
>>     _______________________________________________
>>     OAuth mailing list
>>     OAuth@ietf.org </mc/compose?to=3DOAuth@ietf.org>
>>     https://www.ietf.org/mailman/listinfo/oauth
>>
>>
>>
>> _______________________________________________
>> OAuth mailing list
>> OAuth@ietf.org
>> https://www.ietf.org/mailman/listinfo/oauth
>>
> _______________________________________________
> OAuth mailing list
> OAuth@ietf.org
> https://www.ietf.org/mailman/listinfo/oauth

_______________________________________________
OAuth mailing list
OAuth@ietf.org
https://www.ietf.org/mailman/listinfo/oauth

From ve7jtb@ve7jtb.com  Thu Feb 28 19:21:51 2013
Return-Path: <ve7jtb@ve7jtb.com>
X-Original-To: oauth@ietfa.amsl.com
Delivered-To: oauth@ietfa.amsl.com
Received: from localhost (localhost [127.0.0.1]) by ietfa.amsl.com (Postfix) with ESMTP id DC32421F8697 for <oauth@ietfa.amsl.com>; Thu, 28 Feb 2013 19:21:51 -0800 (PST)
X-Virus-Scanned: amavisd-new at amsl.com
X-Spam-Flag: NO
X-Spam-Score: -3.462
X-Spam-Level: 
X-Spam-Status: No, score=-3.462 tagged_above=-999 required=5 tests=[AWL=0.136,  BAYES_00=-2.599, HTML_MESSAGE=0.001, RCVD_IN_DNSWL_LOW=-1]
Received: from mail.ietf.org ([64.170.98.30]) by localhost (ietfa.amsl.com [127.0.0.1]) (amavisd-new, port 10024) with ESMTP id 2rLKdmwao6vp for <oauth@ietfa.amsl.com>; Thu, 28 Feb 2013 19:21:50 -0800 (PST)
Received: from mail-da0-f43.google.com (mail-da0-f43.google.com [209.85.210.43]) by ietfa.amsl.com (Postfix) with ESMTP id 89DD521F8585 for <oauth@ietf.org>; Thu, 28 Feb 2013 19:21:50 -0800 (PST)
Received: by mail-da0-f43.google.com with SMTP id u36so1176797dak.30 for <oauth@ietf.org>; Thu, 28 Feb 2013 19:21:50 -0800 (PST)
X-Google-DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=google.com; s=20120113; h=x-received:content-type:mime-version:subject:from:in-reply-to:date :cc:message-id:references:to:x-mailer:x-gm-message-state; bh=DYeAdJ7gr4xMt1Hke3hILEW2bDGMBQldRSN9qwg0kGA=; b=Wc7eENp+mvQyrm/CbO0QIayKvC0s0UQj+s0H638r86rwr+Bs0Fdg7BJSGEzXNivgSk Ad6ApynI1qpd7scqAvSiEVg19HIUTy5KvVOrr2TlStpmMrM/05NILJvu83wak/v3fJbg nqEOyI1D+e1IWi6r3iRg9NNyr3yPU8JgsfpkuKCbCI2BnwTSATUU2q6txrkPvCkynKER MpsvQwsRnsrrb4wwn/38X6IrpRwz7s72bAy/PZvNizOvzzeEQj6HfKohaqQaQylEjUIL 3jKYW78sfVy24p11gIZ/5Jjh0OONNfaCLtGrOW+XR6ANwLKAIHBixEUO7XLGjkzC3RCz ILKQ==
X-Received: by 10.68.211.37 with SMTP id mz5mr12723543pbc.83.1362108110115; Thu, 28 Feb 2013 19:21:50 -0800 (PST)
Received: from [192.168.6.157] (ip-64-134-220-138.public.wayport.net. [64.134.220.138]) by mx.google.com with ESMTPS id gf6sm10397395pbc.24.2013.02.28.19.21.47 (version=TLSv1 cipher=ECDHE-RSA-RC4-SHA bits=128/128); Thu, 28 Feb 2013 19:21:48 -0800 (PST)
Content-Type: multipart/signed; boundary="Apple-Mail=_072EFAA3-E14E-4AE9-B852-EC14BEECF043"; protocol="application/pkcs7-signature"; micalg=sha1
Mime-Version: 1.0 (Mac OS X Mail 6.2 \(1499\))
From: John Bradley <ve7jtb@ve7jtb.com>
In-Reply-To: <512FE091.9030508@oracle.com>
Date: Thu, 28 Feb 2013 19:21:45 -0800
Message-Id: <9C445AAF-BEE8-44F5-8FE6-43CA843906CC@ve7jtb.com>
References: <1361830944.13340.YahooMailNeo@web31812.mail.mud.yahoo.com> <E4A6D91D-2BC8-4F2E-9B1C-D1362A0E3608@oracle.com> <1361831644.50183.YahooMailNeo@web31801.mail.mud.yahoo.com> <1361832133.97884.YahooMailNeo@web31816.mail.mud.yahoo.com> <140EEABC-2787-4D9A-A1C5-6C973FED5BC8@adobe.com> <512FE091.9030508@oracle.com>
To: prateek mishra <prateek.mishra@oracle.com>
X-Mailer: Apple Mail (2.1499)
X-Gm-Message-State: ALoCoQk/uoIuUKCrzZwdQ01HwhMDHe1wgG4JAzr2aPEI7qRJ9knHWYW5r5SvE1s892ibypdJX1f4
Cc: "oauth@ietf.org" <oauth@ietf.org>
Subject: Re: [OAUTH-WG] OAuth2 attack surface....
X-BeenThere: oauth@ietf.org
X-Mailman-Version: 2.1.12
Precedence: list
List-Id: OAUTH WG <oauth.ietf.org>
List-Unsubscribe: <https://www.ietf.org/mailman/options/oauth>, <mailto:oauth-request@ietf.org?subject=unsubscribe>
List-Archive: <http://www.ietf.org/mail-archive/web/oauth>
List-Post: <mailto:oauth@ietf.org>
List-Help: <mailto:oauth-request@ietf.org?subject=help>
List-Subscribe: <https://www.ietf.org/mailman/listinfo/oauth>, <mailto:oauth-request@ietf.org?subject=subscribe>
X-List-Received-Date: Fri, 01 Mar 2013 03:21:52 -0000

--Apple-Mail=_072EFAA3-E14E-4AE9-B852-EC14BEECF043
Content-Type: multipart/alternative;
	boundary="Apple-Mail=_AF284984-FE44-492D-A6BB-C321A4685BA1"


--Apple-Mail=_AF284984-FE44-492D-A6BB-C321A4685BA1
Content-Transfer-Encoding: quoted-printable
Content-Type: text/plain;
	charset=iso-8859-1

While implicit is what they are attacking, this is in principal also =
possible to do with a code flow if the client is public.
It is only confidential clients using the code flow that have reasonable =
protection from open redirectors.

In openID Connect we made registered redirect_uri and full comparison of =
the URI including query parameters a requirement.

Allowing path or query parameters outside of the redirect comparison =
leaves too large of an uncontrolled attack surface.

Implementation mistakes are almost inevitable.=20

John B.
On 2013-02-28, at 2:56 PM, prateek mishra <prateek.mishra@oracle.com> =
wrote:

> Characteristics of both these attacks -
>=20
> 1) Use of implicit flow (access token passed on the URL)
> 2) changes to redirect uri (specification does allow some flexibility =
here)
> 3) applications with long-lived access tokens with broad scope (in one =
case only)
>=20
> - prateek
>> And a different one (still exploiting redirection and still =
implementation mistake) =
http://www.nirgoldshlager.com/2013/02/how-i-hacked-facebook-oauth-to-get-f=
ull.html
>>=20
>> Regards
>>=20
>> Antonio
>>=20
>> On Feb 25, 2013, at 11:42 PM, William Mills wrote:
>>=20
>>>=20
>>>=20
>>> DOH!!!  =
http://homakov.blogspot.co.uk/2013/02/hacking-facebook-with-oauth2-and-chr=
ome.html
>>>=20
>>> From: Phil Hunt <phil.hunt@oracle.com>
>>> To: William Mills <wmills_92105@yahoo.com>=20
>>> Sent: Monday, February 25, 2013 2:28 PM
>>> Subject: Re: [OAUTH-WG] OAuth2 attack surface....
>>>=20
>>> Whats the link?
>>>=20
>>> Phil
>>>=20
>>> Sent from my phone.
>>>=20
>>> On 2013-02-25, at 14:22, William Mills <wmills_92105@yahoo.com> =
wrote:
>>>=20
>>>> I think this is worth a read, I don't have time to dive into this =
:(
>>>> _______________________________________________
>>>> OAuth mailing list
>>>> OAuth@ietf.org
>>>> https://www.ietf.org/mailman/listinfo/oauth
>>>=20
>>>=20
>>>=20
>>>=20
>>> _______________________________________________
>>> OAuth mailing list
>>> OAuth@ietf.org
>>> https://www.ietf.org/mailman/listinfo/oauth
>>=20
>>=20
>>=20
>> _______________________________________________
>> OAuth mailing list
>> OAuth@ietf.org
>> https://www.ietf.org/mailman/listinfo/oauth
>=20
> _______________________________________________
> OAuth mailing list
> OAuth@ietf.org
> https://www.ietf.org/mailman/listinfo/oauth


--Apple-Mail=_AF284984-FE44-492D-A6BB-C321A4685BA1
Content-Transfer-Encoding: quoted-printable
Content-Type: text/html;
	charset=iso-8859-1

<html><head><meta http-equiv=3D"Content-Type" content=3D"text/html =
charset=3Diso-8859-1"></head><body style=3D"word-wrap: break-word; =
-webkit-nbsp-mode: space; -webkit-line-break: after-white-space; ">While =
implicit is what they are attacking, this is in principal also possible =
to do with a code flow if the client is public.<div>It is only =
confidential clients using the code flow that have reasonable protection =
from open redirectors.</div><div><br></div><div>In openID Connect we =
made registered redirect_uri and full comparison of the URI including =
query parameters a requirement.</div><div><br></div><div>Allowing path =
or query parameters outside of the redirect comparison leaves too large =
of an uncontrolled attack =
surface.</div><div><br></div><div>Implementation mistakes are almost =
inevitable.&nbsp;</div><div><br></div><div>John =
B.</div><div><div><div>On 2013-02-28, at 2:56 PM, prateek mishra &lt;<a =
href=3D"mailto:prateek.mishra@oracle.com">prateek.mishra@oracle.com</a>&gt=
; wrote:</div><br class=3D"Apple-interchange-newline"><blockquote =
type=3D"cite">
 =20
    <meta content=3D"text/html; charset=3DISO-8859-1" =
http-equiv=3D"Content-Type">
 =20
  <div bgcolor=3D"#FFFFFF" text=3D"#000000">
    Characteristics of both these attacks -<br>
    <br>
    1) Use of implicit flow (access token passed on the URL)<br>
    2) changes to redirect uri (specification does allow some
    flexibility here)<br>
    3) applications with long-lived access tokens with broad scope (in
    one case only)<br>
    <br>
    - prateek<br>
    <blockquote =
cite=3D"mid:140EEABC-2787-4D9A-A1C5-6C973FED5BC8@adobe.com" =
type=3D"cite">And a different one (still exploiting redirection and
      still implementation mistake)&nbsp;<a moz-do-not-send=3D"true" =
href=3D"http://www.nirgoldshlager.com/2013/02/how-i-hacked-facebook-oauth-=
to-get-full.html">http://www.nirgoldshlager.com/2013/02/how-i-hacked-faceb=
ook-oauth-to-get-full.html</a>
      <div><br>
      </div>
      <div>Regards</div>
      <div><br>
      </div>
      <div>Antonio</div>
      <div><br>
      </div>
      <div>
        <div>
          <div>On Feb 25, 2013, at 11:42 PM, William Mills wrote:</div>
          <br class=3D"Apple-interchange-newline">
          <blockquote type=3D"cite">
            <div>
              <div style=3D"background-color: rgb(255, 255, 255); =
font-family: 'Courier New', courier, monaco, monospace, sans-serif; =
font-size: 12pt; ">
                <div><br>
                </div>
                <div style=3D"font-family: 'Courier New', courier, =
monaco,
                  monospace, sans-serif; font-size: 12pt;">
                  <div style=3D"font-family: 'times new roman', 'new
                    york', times, serif; font-size: 12pt;">
                    <div dir=3D"ltr"> </div>
                    <br>
                    <div id=3D"yiv721280462">
                      <div>
                        <div style=3D"background-color: rgb(255, 255, =
255); font-family: 'Courier New', courier, monaco, monospace, =
sans-serif; font-size: 12pt; ">
                          <div><span>DOH!!! &nbsp;</span><a =
moz-do-not-send=3D"true" rel=3D"nofollow" target=3D"_blank" =
href=3D"http://homakov.blogspot.co.uk/2013/02/hacking-facebook-with-oauth2=
-and-chrome.html" =
style=3D"font-size:12pt;">http://homakov.blogspot.co.uk/2013/02/hacking-fa=
cebook-with-oauth2-and-chrome.html</a></div>
                          <div><br>
                          </div>
                          <div style=3D"font-family: 'Courier New',
                            courier, monaco, monospace, sans-serif;
                            font-size: 12pt;">
                            <div style=3D"font-family: 'times new =
roman',
                              'new york', times, serif; font-size:
                              12pt;">
                              <div dir=3D"ltr"> <font face=3D"Arial" =
size=3D"2">
                                  <hr size=3D"1"> <b><span =
style=3D"font-weight:bold;">From:</span></b>
                                  Phil Hunt &lt;<a =
moz-do-not-send=3D"true" =
href=3D"mailto:phil.hunt@oracle.com">phil.hunt@oracle.com</a>&gt;<br>
                                  <b><span =
style=3D"font-weight:bold;">To:</span></b>
                                  William Mills &lt;<a =
moz-do-not-send=3D"true" =
href=3D"mailto:wmills_92105@yahoo.com">wmills_92105@yahoo.com</a>&gt;
                                  <br>
                                  <b><span =
style=3D"font-weight:bold;">Sent:</span></b>
                                  Monday, February 25, 2013 2:28 PM<br>
                                  <b><span =
style=3D"font-weight:bold;">Subject:</span></b>
                                  Re: [OAUTH-WG] OAuth2 attack
                                  surface....<br>
                                </font> </div>
                              <br>
                              <div id=3D"yiv721280462">
                                <div>
                                  <div>Whats the link?<br>
                                    <br>
                                    Phil
                                    <div><br>
                                    </div>
                                    <div>Sent from my phone.</div>
                                  </div>
                                  <div><br>
                                    On 2013-02-25, at 14:22, William
                                    Mills &lt;<a moz-do-not-send=3D"true" =
rel=3D"nofollow" ymailto=3D"mailto:wmills_92105@yahoo.com" =
target=3D"_blank" =
href=3D"mailto:wmills_92105@yahoo.com">wmills_92105@yahoo.com</a>&gt;
                                    wrote:<br>
                                    <br>
                                  </div>
                                  <blockquote type=3D"cite">
                                    <div>
                                      <div style=3D"background-color: =
rgb(255, 255, 255); font-size: 12pt; ">
                                        <div>I think this is worth a
                                          read, I don't have time to
                                          dive into this :(</div>
                                      </div>
                                    </div>
                                  </blockquote>
                                  <blockquote type=3D"cite">
                                    =
<div><span>_______________________________________________</span><br>
                                      <span>OAuth mailing =
list</span><br>
                                      <span><a moz-do-not-send=3D"true" =
rel=3D"nofollow" ymailto=3D"mailto:OAuth@ietf.org" target=3D"_blank" =
href=3D"mailto:OAuth@ietf.org">OAuth@ietf.org</a></span><br>
                                      <span><a moz-do-not-send=3D"true" =
rel=3D"nofollow" target=3D"_blank" =
href=3D"https://www.ietf.org/mailman/listinfo/oauth">https://www.ietf.org/=
mailman/listinfo/oauth</a></span><br>
                                    </div>
                                  </blockquote>
                                </div>
                              </div>
                              <br>
                              <br>
                            </div>
                          </div>
                        </div>
                      </div>
                    </div>
                    <br>
                    <br>
                  </div>
                </div>
              </div>
            </div>
            _______________________________________________<br>
            OAuth mailing list<br>
            <a moz-do-not-send=3D"true" =
href=3D"mailto:OAuth@ietf.org">OAuth@ietf.org</a><br>
            <a class=3D"moz-txt-link-freetext" =
href=3D"https://www.ietf.org/mailman/listinfo/oauth">https://www.ietf.org/=
mailman/listinfo/oauth</a><br>
          </blockquote>
        </div>
        <br>
      </div>
      <br>
      <fieldset class=3D"mimeAttachmentHeader"></fieldset>
      <br>
      <pre wrap=3D"">_______________________________________________
OAuth mailing list
<a class=3D"moz-txt-link-abbreviated" =
href=3D"mailto:OAuth@ietf.org">OAuth@ietf.org</a>
<a class=3D"moz-txt-link-freetext" =
href=3D"https://www.ietf.org/mailman/listinfo/oauth">https://www.ietf.org/=
mailman/listinfo/oauth</a>
</pre>
    </blockquote>
    <br>
  </div>

_______________________________________________<br>OAuth mailing =
list<br><a =
href=3D"mailto:OAuth@ietf.org">OAuth@ietf.org</a><br>https://www.ietf.org/=
mailman/listinfo/oauth<br></blockquote></div><br></div></body></html>=

--Apple-Mail=_AF284984-FE44-492D-A6BB-C321A4685BA1--

--Apple-Mail=_072EFAA3-E14E-4AE9-B852-EC14BEECF043
Content-Disposition: attachment;
	filename=smime.p7s
Content-Type: application/pkcs7-signature;
	name=smime.p7s
Content-Transfer-Encoding: base64
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--Apple-Mail=_072EFAA3-E14E-4AE9-B852-EC14BEECF043--

From oleg_gryb@yahoo.com  Thu Feb 28 20:15:57 2013
Return-Path: <oleg_gryb@yahoo.com>
X-Original-To: oauth@ietfa.amsl.com
Delivered-To: oauth@ietfa.amsl.com
Received: from localhost (localhost [127.0.0.1]) by ietfa.amsl.com (Postfix) with ESMTP id AD10821F87C5 for <oauth@ietfa.amsl.com>; Thu, 28 Feb 2013 20:15:57 -0800 (PST)
X-Virus-Scanned: amavisd-new at amsl.com
X-Spam-Flag: NO
X-Spam-Score: -2.598
X-Spam-Level: 
X-Spam-Status: No, score=-2.598 tagged_above=-999 required=5 tests=[BAYES_00=-2.599, HTML_MESSAGE=0.001]
Received: from mail.ietf.org ([64.170.98.30]) by localhost (ietfa.amsl.com [127.0.0.1]) (amavisd-new, port 10024) with ESMTP id fJMaWdDPyRre for <oauth@ietfa.amsl.com>; Thu, 28 Feb 2013 20:15:56 -0800 (PST)
Received: from nm13.bullet.mail.bf1.yahoo.com (nm13.bullet.mail.bf1.yahoo.com [98.139.212.172]) by ietfa.amsl.com (Postfix) with SMTP id 209E721F8749 for <oauth@ietf.org>; Thu, 28 Feb 2013 20:15:56 -0800 (PST)
Received: from [98.139.215.142] by nm13.bullet.mail.bf1.yahoo.com with NNFMP; 01 Mar 2013 04:15:55 -0000
Received: from [98.139.212.205] by tm13.bullet.mail.bf1.yahoo.com with NNFMP; 01 Mar 2013 04:15:54 -0000
Received: from [127.0.0.1] by omp1014.mail.bf1.yahoo.com with NNFMP; 01 Mar 2013 04:15:54 -0000
X-Yahoo-Newman-Property: ymail-3
X-Yahoo-Newman-Id: 800365.93586.bm@omp1014.mail.bf1.yahoo.com
Received: (qmail 99765 invoked by uid 60001); 1 Mar 2013 04:15:54 -0000
DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=yahoo.com; s=s1024; t=1362111354; bh=sRwvubH0sYFg8GzhVoOTJ86GVGyLU2yqqAx8NBuUAEg=; h=X-YMail-OSG:Received:X-Rocket-MIMEInfo:X-Mailer:Message-ID:Date:From:Reply-To:Subject:To:Cc:In-Reply-To:MIME-Version:Content-Type; b=NEIqxecrJhyc/6GIQRyjkIpsyS7cKESfrs09TZjbLi4DoHMzGGFwF7/G1o1bMiX2it6rauU0j8wBleh/BGYvUe3sSArCflwe1nagRHi+/RHsM9QO9fmW2KJCLVg9NsarFh+P/UqHhsifjYvIEUCT/W6Vyq8AGM2wk57cMoNTGUU=
DomainKey-Signature: a=rsa-sha1; q=dns; c=nofws; s=s1024; d=yahoo.com; h=X-YMail-OSG:Received:X-Rocket-MIMEInfo:X-Mailer:Message-ID:Date:From:Reply-To:Subject:To:Cc:In-Reply-To:MIME-Version:Content-Type; b=26ndDkFfbO0mUeZ4CkVOW3C5VOvDTGLImtvzbL7iGsvftmzZgVH7XUOROBnjLOgXU3RnUaurvAPUgX13Uu9t8bXyfKNWgGtUbzOmQQJncRIlfxljuDLXal4UDQvbL1G4pPxk2gD/qt7uo8jGS4e0/qsvJGs4uZviI9yHjvbFHtY=;
X-YMail-OSG: cZxz2xEVM1nrUzAzZEJh2hj9W2UUcfXdfiPhGxfpAqikANT 2Eu.dNrnA1gWkei9ZOzGidYcSjbphQYggW3V_UYh0aTsZ.rEzN22qSRYGtT6 zt0RVHjT_lYE7_O64p99uj_CjYF.yLZCtAJ_GCtHHSMpzwuFp68l_lQVr7jO _2Yqheo_ZWQZMzICvzaco.jpQtOzcu1dqNtkx6eAwC8dmUwTMG9NQ2HlTvQo sr3i45pzz.ovojwE_hNU2VGYb8m2c8oTfjdruXbNiiKL0iD1Od4x0UTvrDTZ WhDccGLfqde5PUhPkMHf4ZOC5Qpn.hLSdM1K1Pb86c2q41J6_p0APHKJiR2G mC3o_7hTdaCVBLACUt818ZqusDJsVcyrCOVtutUwZbXFYmc_h6tdVFdsRyXJ zNM1KqGWXxIGlEANeJe3V.VMn_kQt_eJyLI16c8VRrmXMeM0UdjJGangby9m jhFGLS56SJcstCQMzE8QsObowlDoZVIRGmSedTRuUNlv_uMz.CWsOGcm8_rp VZ.gMF9ZBQqIXeeAW0YzfJa4oPIx7RyM36KgkQlsgdZ8uDhMLHUddNFTNDJK 3MjWOqANkF0QATUTRtgRIcpstMWBCti.Qfl33d0jPxNmwkPYczajWbpys3oa SSVrKgCuWH6pNVSkWTJ85GRy_i32df0I1BfgfWqs7p1TpjA--
Received: from [67.116.255.151] by web141004.mail.bf1.yahoo.com via HTTP; Thu, 28 Feb 2013 20:15:54 PST
X-Rocket-MIMEInfo: 001.001, TWlrZSBhbmQgSGFubmVzLA0KDQpUaGFua3MuIFZlcnkgdXNlZnVsIGluZm8gdGhhdCBuZWVkcyB0byBiZSBleHBsb3JlZCBmdXJ0aGVyLiBJIGFjdHVhbGx5IGxpa2UgdGhlIFczQyBhcHByb2FjaCB0byB0aGUgc2ltaWxhciBwcm9ibGVtLiBJdCdzIGRlc2NyaWJlZCBoZXJlOiBodHRwOi8vd3d3LnczLm9yZy8yMDExL3htbHNlYy1wYWcvcGFncmVwb3J0Lmh0bWwgDQoNCjEuIFRoZXkndmUgY3JlYXRlZCBQQUcuDQoyLiBDb250YWN0ZWQgdGhlIHBhdGVudCBob2xkZXIuIA0KMy4gUmV2aWV3ZWQgcGF0ZW50IGgBMAEBAQE-
X-Mailer: YahooMailClassic/15.1.4 YahooMailWebService/0.8.135.514
Message-ID: <1362111354.59175.YahooMailClassic@web141004.mail.bf1.yahoo.com>
Date: Thu, 28 Feb 2013 20:15:54 -0800 (PST)
From: Oleg Gryb <oleg_gryb@yahoo.com>
To: prateek mishra <prateek.mishra@oracle.com>, Hannes Tschofenig <hannes.tschofenig@gmx.net>, Mike Jones <Michael.Jones@microsoft.com>
In-Reply-To: <4E1F6AAD24975D4BA5B1680429673943674C7198@TK5EX14MBXC283.redmond.corp.microsoft.com>
MIME-Version: 1.0
Content-Type: multipart/alternative; boundary="-262101065-859756872-1362111354=:59175"
Cc: "oleg@gryb.info" <oleg@gryb.info>, "oauth@ietf.org" <oauth@ietf.org>
Subject: Re: [OAUTH-WG] Fw:  IPR Disclosure: - What to Do with JWT ?
X-BeenThere: oauth@ietf.org
X-Mailman-Version: 2.1.12
Precedence: list
Reply-To: oleg@gryb.info
List-Id: OAUTH WG <oauth.ietf.org>
List-Unsubscribe: <https://www.ietf.org/mailman/options/oauth>, <mailto:oauth-request@ietf.org?subject=unsubscribe>
List-Archive: <http://www.ietf.org/mail-archive/web/oauth>
List-Post: <mailto:oauth@ietf.org>
List-Help: <mailto:oauth-request@ietf.org?subject=help>
List-Subscribe: <https://www.ietf.org/mailman/listinfo/oauth>, <mailto:oauth-request@ietf.org?subject=subscribe>
X-List-Received-Date: Fri, 01 Mar 2013 04:15:57 -0000

---262101065-859756872-1362111354=:59175
Content-Type: text/plain; charset=iso-8859-1
Content-Transfer-Encoding: quoted-printable

Mike and Hannes,

Thanks. Very useful info that needs to be explored further. I actually like=
 the W3C approach to the similar problem. It's described here: http://www.w=
3.org/2011/xmlsec-pag/pagreport.html=20

1. They've created PAG.
2. Contacted the patent holder.=20
3. Reviewed patent holder's proposal and rejected it as the one that doesn'=
t meet W3C standards.
4. Created recommendations for the standard implementers, which is very imp=
ortant in my view.
5. Announced a decision that the work on the standard should go on.

Can we expect this kind of engagement from IETF and OAuth-WG or are we on o=
ur own and should do our own research as has been suggested below?



--- On Thu, 2/28/13, Mike Jones <Michael.Jones@microsoft.com> wrote:

From: Mike Jones <Michael.Jones@microsoft.com>
Subject: Re: [OAUTH-WG] Fw:  IPR Disclosure: - What to Do with JWT ?
To: "prateek mishra" <prateek.mishra@oracle.com>, "Hannes Tschofenig" <hann=
es.tschofenig@gmx.net>
Cc: "oleg@gryb.info" <oleg@gryb.info>, "oauth@ietf.org" <oauth@ietf.org>
Date: Thursday, February 28, 2013, 9:33 PM

With the caveat that I have not read the patent disclosures, I will add tha=
t if they pertain to Elliptic Curve Cryptography, RFC 6090 is likely releva=
nt - especially http://tools.ietf.org/html/rfc6090#section-7.1 on ECDH and =
http://tools.ietf.org/html/rfc6090#section-7.2 on ECDSA.

=A0=A0=A0 =A0=A0=A0 =A0=A0=A0 =A0=A0=A0 -- Mike

-----Original Message-----
From: oauth-bounces@ietf.org [mailto:oauth-bounces@ietf.org] On Behalf Of p=
rateek mishra
Sent: Thursday, February 28, 2013 1:53 PM
To: Hannes Tschofenig
Cc: oleg@gryb.info; oauth@ietf.org
Subject: Re: [OAUTH-WG] Fw: IPR Disclosure: - What to Do with JWT ?

Two points=A0 -

1) I request that this mailing list NOT be used for any substantive discuss=
ion of patent claims and so on. This will create difficulties for many part=
icipants and I dont believe is within the charter of this effort.

2) I would encourage interested parties to review the following document, w=
hich may be relevant to this discussion

http://www.w3.org/2011/xmlsec-pag/

- prateek

> Hi Oleg,
>
> my personal experience with Certicom's IPR disclosures is that they=20
> focus on Elliptic Curve Cryptography. There were several IPR=20
> disclosures on documents in the JOSE WG and some of them contain ECC=20
> algorithms.
>
> The JWT does not list an ECC algorithm but the referenced documents do.
>
> Having said that the two cited IPRs seem to be:
> http://www.google.com/patents/US6704870
> http://www.google.com/patents/US7215773
>
> Take a look at it and make your assessment whether there is anything=20
> we can change.
>
> Ciao
> Hannes
>
>
> On 02/28/2013 09:21 PM, Oleg Gryb wrote:
>> Dear OAuth WG and Chairs,
>>
>> Can somebody please comment the Certicom's disclosure below? If the=20
>> purpose of this disclosure is to inform us that JWT can be=20
>> potentially a subject of royalties and other possible legal actions,=20
>> the value of adopting JWT in the scope of OAuth 2.0 IETF standard=20
>> would definitely diminish and if this is the case shouldn't we=20
>> consider replacing it with something similar, but different, which=20
>> would not be a subject of the future possible litigation?
>>
>> I'm not a lawyer and might not understand the statement below=20
>> correctly, so please let me know if/where I'm wrong. Please keep in=20
>> mind also that the popularity of JWT is growing fast along with the=20
>> implementations, so we need to do something quickly.
>>
>> Thanks,
>> Oleg.
>>
>>
>> --- On *Wed, 2/27/13, IETF Secretariat /<ietf-ipr@ietf.org>/* wrote:
>>
>>
>>=A0 =A0=A0=A0From: IETF Secretariat <ietf-ipr@ietf.org>
>>=A0 =A0=A0=A0Subject: [OAUTH-WG] IPR Disclosure: Certicom Corporation's S=
tatement
>>=A0 =A0=A0=A0about IPR related to draft-ietf-oauth-json-web-token-06 (2)
>>=A0 =A0=A0=A0To: mbj@microsoft.com, ve7jtb@ve7jtb.com, n-sakimura@nri.co.=
jp
>>=A0 =A0=A0=A0Cc: derek@ihtfp.com, oauth@ietf.org, ipr-announce@ietf.org
>>=A0 =A0=A0=A0Date: Wednesday, February 27, 2013, 4:16 PM
>>
>>
>>=A0 =A0=A0=A0Dear Michael Jones, John Bradley, Nat Sakimura:
>>
>>=A0 =A0=A0=A0An IPR disclosure that pertains to your Internet-Draft entit=
led
>>=A0 =A0=A0=A0"JSON Web Token
>>=A0 =A0=A0=A0(JWT)" (draft-ietf-oauth-json-web-token) was submitted to th=
e IETF
>>=A0 =A0=A0=A0Secretariat
>>=A0 =A0=A0=A0on 2013-02-20 and has been posted on the "IETF Page of Intel=
lectual
>>=A0 =A0=A0=A0Property
>>=A0 =A0=A0=A0Rights Disclosures" (https://datatracker.ietf.org/ipr/1968/)=
. The
>>=A0 =A0=A0=A0title of the
>>=A0 =A0=A0=A0IPR disclosure is "Certicom Corporation's Statement about IP=
R
>>=A0 =A0=A0=A0related to draft-
>>=A0 =A0=A0=A0ietf-oauth-json-web-token-06 (2)."");
>>
>>=A0 =A0=A0=A0The IETF Secretariat
>>
>>=A0 =A0=A0=A0_______________________________________________
>>=A0 =A0=A0=A0OAuth mailing list
>>=A0 =A0=A0=A0OAuth@ietf.org </mc/compose?to=3DOAuth@ietf.org>
>>=A0 =A0=A0=A0https://www.ietf.org/mailman/listinfo/oauth
>>
>>
>>
>> _______________________________________________
>> OAuth mailing list
>> OAuth@ietf.org
>> https://www.ietf.org/mailman/listinfo/oauth
>>
> _______________________________________________
> OAuth mailing list
> OAuth@ietf.org
> https://www.ietf.org/mailman/listinfo/oauth

_______________________________________________
OAuth mailing list
OAuth@ietf.org
https://www.ietf.org/mailman/listinfo/oauth
_______________________________________________
OAuth mailing list
OAuth@ietf.org
https://www.ietf.org/mailman/listinfo/oauth

---262101065-859756872-1362111354=:59175
Content-Type: text/html; charset=iso-8859-1
Content-Transfer-Encoding: quoted-printable

<table cellspacing=3D"0" cellpadding=3D"0" border=3D"0" ><tr><td valign=3D"=
top" style=3D"font: inherit;">Mike and Hannes,<br><br>Thanks. Very useful i=
nfo that needs to be explored further. I actually like the W3C approach to =
the similar problem. It's described here: http://www.w3.org/2011/xmlsec-pag=
/pagreport.html <br><br>1. They've created PAG.<br>2. Contacted the patent =
holder. <br>3. Reviewed patent holder's proposal and rejected it as the one=
 that doesn't meet W3C standards.<br>4. Created recommendations for the sta=
ndard implementers, which is very important in my view.<br>5. Announced a d=
ecision that the work on the standard should go on.<br><br>Can we expect th=
is kind of engagement from IETF and OAuth-WG or are we on our own and shoul=
d do our own research as has been suggested below?<br><br><br><br>--- On <b=
>Thu, 2/28/13, Mike Jones <i>&lt;Michael.Jones@microsoft.com&gt;</i></b> wr=
ote:<br><blockquote style=3D"border-left: 2px solid rgb(16, 16, 255);
 margin-left: 5px; padding-left: 5px;"><br>From: Mike Jones &lt;Michael.Jon=
es@microsoft.com&gt;<br>Subject: Re: [OAUTH-WG] Fw:  IPR Disclosure: - What=
 to Do with JWT ?<br>To: "prateek mishra" &lt;prateek.mishra@oracle.com&gt;=
, "Hannes Tschofenig" &lt;hannes.tschofenig@gmx.net&gt;<br>Cc: "oleg@gryb.i=
nfo" &lt;oleg@gryb.info&gt;, "oauth@ietf.org" &lt;oauth@ietf.org&gt;<br>Dat=
e: Thursday, February 28, 2013, 9:33 PM<br><br><div class=3D"plainMail">Wit=
h the caveat that I have not read the patent disclosures, I will add that i=
f they pertain to Elliptic Curve Cryptography, RFC 6090 is likely relevant =
- especially <a href=3D"http://tools.ietf.org/html/rfc6090#section-7.1" tar=
get=3D"_blank">http://tools.ietf.org/html/rfc6090#section-7.1</a> on ECDH a=
nd <a href=3D"http://tools.ietf.org/html/rfc6090#section-7.2" target=3D"_bl=
ank">http://tools.ietf.org/html/rfc6090#section-7.2</a> on ECDSA.<br><br>&n=
bsp;&nbsp;&nbsp; &nbsp;&nbsp;&nbsp; &nbsp;&nbsp;&nbsp; &nbsp;&nbsp;&nbsp; -=
-
 Mike<br><br>-----Original Message-----<br>From: <a ymailto=3D"mailto:oauth=
-bounces@ietf.org" href=3D"/mc/compose?to=3Doauth-bounces@ietf.org">oauth-b=
ounces@ietf.org</a> [mailto:<a ymailto=3D"mailto:oauth-bounces@ietf.org" hr=
ef=3D"/mc/compose?to=3Doauth-bounces@ietf.org">oauth-bounces@ietf.org</a>] =
On Behalf Of prateek mishra<br>Sent: Thursday, February 28, 2013 1:53 PM<br=
>To: Hannes Tschofenig<br>Cc: <a ymailto=3D"mailto:oleg@gryb.info" href=3D"=
/mc/compose?to=3Doleg@gryb.info">oleg@gryb.info</a>; <a ymailto=3D"mailto:o=
auth@ietf.org" href=3D"/mc/compose?to=3Doauth@ietf.org">oauth@ietf.org</a><=
br>Subject: Re: [OAUTH-WG] Fw: IPR Disclosure: - What to Do with JWT ?<br><=
br>Two points&nbsp; -<br><br>1) I request that this mailing list NOT be use=
d for any substantive discussion of patent claims and so on. This will crea=
te difficulties for many participants and I dont believe is within the char=
ter of this effort.<br><br>2) I would encourage interested parties to revie=
w the following
 document, which may be relevant to this discussion<br><br><a href=3D"http:=
//www.w3.org/2011/xmlsec-pag/" target=3D"_blank">http://www.w3.org/2011/xml=
sec-pag/</a><br><br>- prateek<br><br>&gt; Hi Oleg,<br>&gt;<br>&gt; my perso=
nal experience with Certicom's IPR disclosures is that they <br>&gt; focus =
on Elliptic Curve Cryptography. There were several IPR <br>&gt; disclosures=
 on documents in the JOSE WG and some of them contain ECC <br>&gt; algorith=
ms.<br>&gt;<br>&gt; The JWT does not list an ECC algorithm but the referenc=
ed documents do.<br>&gt;<br>&gt; Having said that the two cited IPRs seem t=
o be:<br>&gt; <a href=3D"http://www.google.com/patents/US6704870" target=3D=
"_blank">http://www.google.com/patents/US6704870</a><br>&gt; <a href=3D"htt=
p://www.google.com/patents/US7215773" target=3D"_blank">http://www.google.c=
om/patents/US7215773</a><br>&gt;<br>&gt; Take a look at it and make your as=
sessment whether there is anything <br>&gt; we can change.<br>&gt;<br>&gt;
 Ciao<br>&gt; Hannes<br>&gt;<br>&gt;<br>&gt; On 02/28/2013 09:21 PM, Oleg G=
ryb wrote:<br>&gt;&gt; Dear OAuth WG and Chairs,<br>&gt;&gt;<br>&gt;&gt; Ca=
n somebody please comment the Certicom's disclosure below? If the <br>&gt;&=
gt; purpose of this disclosure is to inform us that JWT can be <br>&gt;&gt;=
 potentially a subject of royalties and other possible legal actions, <br>&=
gt;&gt; the value of adopting JWT in the scope of OAuth 2.0 IETF standard <=
br>&gt;&gt; would definitely diminish and if this is the case shouldn't we =
<br>&gt;&gt; consider replacing it with something similar, but different, w=
hich <br>&gt;&gt; would not be a subject of the future possible litigation?=
<br>&gt;&gt;<br>&gt;&gt; I'm not a lawyer and might not understand the stat=
ement below <br>&gt;&gt; correctly, so please let me know if/where I'm wron=
g. Please keep in <br>&gt;&gt; mind also that the popularity of JWT is grow=
ing fast along with the <br>&gt;&gt; implementations, so we need to
 do something quickly.<br>&gt;&gt;<br>&gt;&gt; Thanks,<br>&gt;&gt; Oleg.<br=
>&gt;&gt;<br>&gt;&gt;<br>&gt;&gt; --- On *Wed, 2/27/13, IETF Secretariat /&=
lt;<a ymailto=3D"mailto:ietf-ipr@ietf.org" href=3D"/mc/compose?to=3Dietf-ip=
r@ietf.org">ietf-ipr@ietf.org</a>&gt;/* wrote:<br>&gt;&gt;<br>&gt;&gt;<br>&=
gt;&gt;&nbsp; &nbsp;&nbsp;&nbsp;From: IETF Secretariat &lt;<a ymailto=3D"ma=
ilto:ietf-ipr@ietf.org" href=3D"/mc/compose?to=3Dietf-ipr@ietf.org">ietf-ip=
r@ietf.org</a>&gt;<br>&gt;&gt;&nbsp; &nbsp;&nbsp;&nbsp;Subject: [OAUTH-WG] =
IPR Disclosure: Certicom Corporation's Statement<br>&gt;&gt;&nbsp; &nbsp;&n=
bsp;&nbsp;about IPR related to draft-ietf-oauth-json-web-token-06 (2)<br>&g=
t;&gt;&nbsp; &nbsp;&nbsp;&nbsp;To: <a ymailto=3D"mailto:mbj@microsoft.com" =
href=3D"/mc/compose?to=3Dmbj@microsoft.com">mbj@microsoft.com</a>, <a ymail=
to=3D"mailto:ve7jtb@ve7jtb.com" href=3D"/mc/compose?to=3Dve7jtb@ve7jtb.com"=
>ve7jtb@ve7jtb.com</a>, <a ymailto=3D"mailto:n-sakimura@nri.co.jp"
 href=3D"/mc/compose?to=3Dn-sakimura@nri.co.jp">n-sakimura@nri.co.jp</a><br=
>&gt;&gt;&nbsp; &nbsp;&nbsp;&nbsp;Cc: <a ymailto=3D"mailto:derek@ihtfp.com"=
 href=3D"/mc/compose?to=3Dderek@ihtfp.com">derek@ihtfp.com</a>, <a ymailto=
=3D"mailto:oauth@ietf.org" href=3D"/mc/compose?to=3Doauth@ietf.org">oauth@i=
etf.org</a>, <a ymailto=3D"mailto:ipr-announce@ietf.org" href=3D"/mc/compos=
e?to=3Dipr-announce@ietf.org">ipr-announce@ietf.org</a><br>&gt;&gt;&nbsp; &=
nbsp;&nbsp;&nbsp;Date: Wednesday, February 27, 2013, 4:16 PM<br>&gt;&gt;<br=
>&gt;&gt;<br>&gt;&gt;&nbsp; &nbsp;&nbsp;&nbsp;Dear Michael Jones, John Brad=
ley, Nat Sakimura:<br>&gt;&gt;<br>&gt;&gt;&nbsp; &nbsp;&nbsp;&nbsp;An IPR d=
isclosure that pertains to your Internet-Draft entitled<br>&gt;&gt;&nbsp; &=
nbsp;&nbsp;&nbsp;"JSON Web Token<br>&gt;&gt;&nbsp; &nbsp;&nbsp;&nbsp;(JWT)"=
 (draft-ietf-oauth-json-web-token) was submitted to the IETF<br>&gt;&gt;&nb=
sp; &nbsp;&nbsp;&nbsp;Secretariat<br>&gt;&gt;&nbsp; &nbsp;&nbsp;&nbsp;on 20=
13-02-20 and has
 been posted on the "IETF Page of Intellectual<br>&gt;&gt;&nbsp; &nbsp;&nbs=
p;&nbsp;Property<br>&gt;&gt;&nbsp; &nbsp;&nbsp;&nbsp;Rights Disclosures" (<=
a href=3D"https://datatracker.ietf.org/ipr/1968/" target=3D"_blank">https:/=
/datatracker.ietf.org/ipr/1968/</a>). The<br>&gt;&gt;&nbsp; &nbsp;&nbsp;&nb=
sp;title of the<br>&gt;&gt;&nbsp; &nbsp;&nbsp;&nbsp;IPR disclosure is "Cert=
icom Corporation's Statement about IPR<br>&gt;&gt;&nbsp; &nbsp;&nbsp;&nbsp;=
related to draft-<br>&gt;&gt;&nbsp; &nbsp;&nbsp;&nbsp;ietf-oauth-json-web-t=
oken-06 (2)."");<br>&gt;&gt;<br>&gt;&gt;&nbsp; &nbsp;&nbsp;&nbsp;The IETF S=
ecretariat<br>&gt;&gt;<br>&gt;&gt;&nbsp; &nbsp;&nbsp;&nbsp;________________=
_______________________________<br>&gt;&gt;&nbsp; &nbsp;&nbsp;&nbsp;OAuth m=
ailing list<br>&gt;&gt;&nbsp; &nbsp;&nbsp;&nbsp;<a ymailto=3D"mailto:OAuth@=
ietf.org" href=3D"/mc/compose?to=3DOAuth@ietf.org">OAuth@ietf.org</a> &lt;/=
mc/compose?to=3D<a ymailto=3D"mailto:OAuth@ietf.org"
 href=3D"/mc/compose?to=3DOAuth@ietf.org">OAuth@ietf.org</a>&gt;<br>&gt;&gt=
;&nbsp; &nbsp;&nbsp;&nbsp;<a href=3D"https://www.ietf.org/mailman/listinfo/=
oauth" target=3D"_blank">https://www.ietf.org/mailman/listinfo/oauth</a><br=
>&gt;&gt;<br>&gt;&gt;<br>&gt;&gt;<br>&gt;&gt; _____________________________=
__________________<br>&gt;&gt; OAuth mailing list<br>&gt;&gt; <a ymailto=3D=
"mailto:OAuth@ietf.org" href=3D"/mc/compose?to=3DOAuth@ietf.org">OAuth@ietf=
.org</a><br>&gt;&gt; <a href=3D"https://www.ietf.org/mailman/listinfo/oauth=
" target=3D"_blank">https://www.ietf.org/mailman/listinfo/oauth</a><br>&gt;=
&gt;<br>&gt; _______________________________________________<br>&gt; OAuth =
mailing list<br>&gt; <a ymailto=3D"mailto:OAuth@ietf.org" href=3D"/mc/compo=
se?to=3DOAuth@ietf.org">OAuth@ietf.org</a><br>&gt; <a href=3D"https://www.i=
etf.org/mailman/listinfo/oauth" target=3D"_blank">https://www.ietf.org/mail=
man/listinfo/oauth</a><br><br>_____________________________________________=
__<br>OAuth mailing
 list<br><a ymailto=3D"mailto:OAuth@ietf.org" href=3D"/mc/compose?to=3DOAut=
h@ietf.org">OAuth@ietf.org</a><br><a href=3D"https://www.ietf.org/mailman/l=
istinfo/oauth" target=3D"_blank">https://www.ietf.org/mailman/listinfo/oaut=
h</a><br>_______________________________________________<br>OAuth mailing l=
ist<br><a ymailto=3D"mailto:OAuth@ietf.org" href=3D"/mc/compose?to=3DOAuth@=
ietf.org">OAuth@ietf.org</a><br><a href=3D"https://www.ietf.org/mailman/lis=
tinfo/oauth" target=3D"_blank">https://www.ietf.org/mailman/listinfo/oauth<=
/a><br></div></blockquote></td></tr></table>
---262101065-859756872-1362111354=:59175--
